Professional Documents
Culture Documents
Trainee Name:
Ceragon Training Agenda
Dear Customer,
Please find below a detailed course agenda and setup requirements. We would appreciate your
efforts in reviewing and confirming the enclosed information prior to conducting the course.
Avner Baruch
Ceragon Training Manager
General
Product IP-10G
Duration 4 days
Number of trainees 10
Item Quantity
IP-10G IDU 6
ODU 6
-48 VDC power supply (capable of feeding at least 2 IDUs) 2
Page 2
Ceragon Training Agenda
DAY 1
Introduction to Ceragon Company
Introduction to IP-10G
Commissioning:
Frequencies
Modulation Script
TSL, RSL & MSE
ATPC
Link ID
Local & Remote frequency change
MAC Header Compression
Local Radio Mute
Remote Radio Settings
Introduction to ACM
Single Pipe
Managed Switch
Creating VLANs in Switch Database
Metro Mode
Interface Configuration:
Page 3
Ceragon Training Agenda
DAY 2
Performance Monitoring:
Radio Loopbacks
Line Loopbacks
Configuration file
Unit information file
Setting IDU to factory defaults
SW download
Page 4
Ceragon Training Agenda
DAY 3
Enabling RSTP
Investigating Bridge Mode per IDU
Investigating Port State (Edge / Non-Edge / Blocked / Forwarding)
Page 5
Ceragon Training Agenda
DAY 4
Exam
Evaluation Form
Course Summary
Page 6
6/9/2010
June 2010
Ceragon Networks
• Incorporation: 1996
• Personnel: 500
• Revenues in 2009: $184M
• NASDAQ: CRNT
Page 7 1
6/9/2010
Global Sales
(Reflecting FY2009 results)
EMEA: 38%
NA: 16%
APAC: 37%
CALA: 9%
Page 8 2
6/9/2010
Where We Play
Private Networks
• Enterprise Networks
• Governments: Local and State
• Utilities
We Focus on Backhaul
High Capacity LTE/4G-Ready Wireless Backhaul Networks
Any access technology: Wire line or wireless, GSM, CDMA, HSPA, LTE or WiMAX
Access Backhaul / Metro Core
Any service: Voice, data, personal broadband
Page 9 3
6/9/2010
OEM 2
OEM 3
Service
Providers
WiMAX Carriers
Private Networks
Over 200 Service Provider and hundreds of Private Networks in more than 130 Countries:*
Page 10 4
6/9/2010
Capacity optimisation
Cost Efficiency
FibeAir IP-10 G
FibeAir® Family
Split Mount All Indoor Full Outdoor
Radio Units: From compact to high power Compact and modular Full outdoor Nodal site,
From 1+0/1+1 to N+1/N+0 Trunk solutions All indoor solutions N+0 to N+N, fully redundant,
All RF units applicable
Carrier Ethernet / Native2
IP‐10
3200T
IP‐10
Page 11 5
6/9/2010
PolyView:
Network Management System for Wireless Backhaul Networks
Plan :
• Network design, Service design, Radio
g , Synchronization
Design, y design,
g , Power
Consumption, Rack Layout, Project
deployment plan
Build:
• Project Management, Site Survey,
Installation and Commissioning,
Documentation - As Built Site folder
Operate :
• Full Training Program, Expert on Site
throughout initial operation, Managed
Services - Take part in Network operation
Maintain:
• Remote Technical Support 24/7, S/W Repair,
H/W Repair , Advanced Replacements, Stock
Management, On Site Support, S/W Updates,
Review and Preventive Activities
Page 12 6
6/9/2010
Why Ceragon
Company:
• Market leadership in migration of radio to packet
• Widely deployed with top 3 position in high capacity radios
• Global reach and breadth of portfolio
• Culture of innovation
• Financially sound
Products:
• Risk free migration path from TDM to Ethernet
• True packet microwave, MEF certified
• Integrated networking functions, TDM and Ethernet
• Highest possible capacities
• Exceptional system gain and spectral efficiency
14
Page 13 7
6/9/2010
Tata Indicom:
14K Links serving access and aggregation. All IP ready
Telcel:
2600+ links migration to packet with LTE in mind
Optimize :
Tree to Rings
Page 14 8
6/9/2010
Digitel:
1350+ links Delivering high capacity, anywhere.
Rogers :
850 Links long haul Enable 3G in rural
BTS/NB
A
Ethernet
TDM
FibeAir IP-10 A
BSC/RNC
BTS/NB
B
Ceragon
FibeAir IP-10
packet/Hybrid
MW Network set
FibeAir IP-10
in a physical B
BSC/RNC
BTS/NB A
FibeAir IP-10
FibeAir IP-10
FibeAir IP-10
Page 15 9
6/9/2010
19
Page 16 10
6/9/2010
• Challenge: Native
Ethernet
Native
Ethernet
Native
Ethernet
•
RIPI
High Capacity and flexibility .6
8
km 057 51 41.00 W
34 30 58.00 S
056 49 07.00 W
37
.5
49 5
km
• Why Trunk
• Highest possible capacities
• Risk free migration for both all in
door and split
• Advanced Carrier Ethernet
features
• Native2 for native legacy and
packet support during the
migration path to all packet
Page 17 11
6/9/2010
• Challenge:
AGUINALDO
Malacanang Antipolo
CAPINPIN
backbone GUINYANGAN
PASACAO PILI
• Connectingg the Philippines
pp islands with manyy 20'
IRIGA
CAMALIG
over the water links with distances of up to
100km 30'
MATNOG
• Solutions CEBU
MACTAN
CAMOTES
• 7 GHz BOHOL
• Link
Li k IInterface:
t f STM 1
STM-1 10' CAMIGUIN
CDO
PAGADIAN
• High power split configuration 1+1 GANYANGAN
LACAUAN PULACAN
BALABAGAN
30' LINUGWAYAN
• Integrated offering through a channel with TAGUITE
PC HILL
AWANG
networking, terminal and support ZAMBOANGA MERCEDES UPI
6° 40'
120° 50' 40' 30' 20' 10' 125°
24
Page 18 12
6/9/2010
Case Study
Adam Internet - Australia
Case Study
Adam Internet - Australia Gaw ler
5 .0
7 km
Smithfield (Sa)
79
km
Smithfield
Ceragon? Elizabeth m
6k
Uley Reserv e
4.12 km
6 .3
Burton 6 00
6.
ELIZABETH VALE
48 York Terrace
Parafield Gardens
3.09 k
m
5.2 1 km 9 km
(native Ethernet)
3.06 km
3.1
5 km Greenw ith Vf
OSBOURNEGreenfields Salisbury East 4 .1
Modbury North
7k
Pooraka Vf
km
m
Gepps Cross
5.66 km
4.04
4. 32 km Gilles Plains
km Hope Valley West
km
5 .8 7
(Ring) 5 km
West Lakes 7.49 3.0
4.14
Ottow aykm
GREENACRE
km ATHELSTONE
3.09
Bev erley km .0 6
km
Glynde3
Dudley Park New ton
4
4.2
ST PETERS
4. 72
km
4.
Henley Beach km
Mile End
27
3.23 km
Wattle Park
km
km
m
Unley 4. 32
9k
Adelaide Airport
km
Plympton
3.29 k m
62
3.
capabilities
2. 5
8 km
2 .53 km
km
4.20 Daw Park
Somerton Park Vf
Eden Hills
Marion East 4.14 km
Coromandel Valley Vf
km
3
3.59
Flagstaff
HILL Hill
2
3.3
O'HALLORAN
km
2.6
6.1 8 km
4 km
3.39 km
5 km
SHEIDOW PARK
2.6
3.
Aberfoyle Park Cherry Gardens
67
km
HAPPY VALLEY
6 km
LONSDALE 3.0 3
2.9
km
km
MOANA VF
4
73 km
1 1.1
Page 19 13
6/9/2010
Case Study
Allegro: Business services for Queensland’s
outer metro areas
Case Study
PtP Ethernet microwave for Backhaul and high
capacity services
Business Access : Backhaul:
Service aware Ethernet microwave IP/MPLS based ring topology service
enhanced with Adaptive Modulation aware Ethernet microwave enhanced
Or PtMP WiMAX with Adaptive Modulation
PtMP -
WiMAX
IP/MPLS
WiMAX router
Base
Station
Page 20 14
6/9/2010
Case Study
South East Asia: National broaband based on
WiMAX
WiMAX Fi
Fixed/Mobile
d/M bil applications
li ti
• Broadband Access
• VoIP – Fixed and VoIP handset
• IP TV
Value proposition:
• Access to a true Broadband service
• Coverage and mobility
Page 21 15
6/9/2010
Case Study
Aerea/WorldMAX: 1st Mobile WiMAX launch
already live in Amsterdam
Services: 512Kbps-8Mbps
• USB WiMAX Dongle
• 10-40Euro
BS site
Switch
Router Ceragon
FibeAir
Core Site
Low Capacity Link Ethernet Aggregation XC
XC
1+1
Ceragon
FibeAir
BS site
PSN
Ethernet
Switch Ceragon
FibeAir Microwave Link
Router
Aggregation
Site
BS site
Page 22 16
6/9/2010
33
Page 23 17
6/9/2010
Case Study
Australia: Police, Fire & Emergency Services
Public Safety
• Challenge:
• Provide reliable digital voice communications and
data traffic
• 99.997% monthly average availability. (Equipment
reliability and propagation performance) Police
HQ
• Low latency (275 m/s)
• Small antenna to reduce wind load
• Cost effective 1+0 space diversity configuration in
ring topology
• Solution
• FibeAir 1500R in ring topology
• Management and VoIP EOW via 2Mb/s Ethernet
wayside channel
• Why Ceragon?
• High power split radio with integrated space diversity Local
• Performance in ring topologies Police
Station Local Police
• Extremely reliable hardware Station
• Versatile auxiliary channels fiber
Case Study
Australia: South Australian Forestry
Municipality
• Challenge:
• Create a robust high capacity video
surveillance network for , bush fire
monitoring
• Low visual foot print to reduce
vandalism and impact scenery
enjoyment
• Solutions
• 6 hops 1+0 split (IP-10)
• Link Interface: Ethernet
• Some of the links are tree mounted…
• Why Ceragon?
• Cost efficient high capacity native
Ethernet in a 1+0 configuration
• Adaptive Coding and Modulation (ACM)
• Integrated offering through a channel
(MIMP) with networking, services and South Australian Forest
Photo: Forestry SA
support
Page 24 18
6/9/2010
Case Study
Australia: Housing Commission, Melbourne
Municipality
• Challenge:
• Create a high capacity network between 8
campuses in the city
• Need to support closed circuit TV and
Telemetry monitoring for public housing
• Solutions
• 8 link 1+0 ring
• Link Interface: Ethernet
• 400Mbps all IP
• 53 u unlicensed
ce sed spurs
spu s
• Why Ceragon?
• Cost efficient high capacity native Ethernet in
a 2+0 ready configuration
• Upgradeable and modular
• Integrated offering through a channel
(Integrators Australia) with networking,
services and support
Case Study
Philippines: An army network backbone
15° 0'
AGUINALDO
Defense Malacanang Antipolo
CAPINPIN
10' LUCBAN
TAGAYTAY
GUINYANGAN
• Challenge: PASACAO PILI
IRIGA
• Build an army military grade long microwave 20'
CAMALIG
backbone
MATNOG
30'
• Connecting the Philippines islands with many over CALBAYOG
the water links with distances of up to 100km CATBALOGAN
40'
• Cost-effective voice, data, and video conferencing
services to satisfy command and control TACLOBAN
ORMOC
50'
requirements CAMOTES
• Solutions
CEBU
MACTAN
10° 0'
• 36 hops 1+1 all indoor BOHOL
PC HILL
networking, terminal and support ZAMBOANGA MERCEDES
AWANG
UPI
6° 40'
120° 50' 40' 30' 20' 10' 125°
Page 25 19
6/9/2010
Case Study
Australia: Wireless connectivity to SCADA for
Water Management solutions
Utility
• Challenge:
• Connect rural fully automated water gates
wirelessly to a SCADA (Supervisory Control
And Data Acquisition)
• Provide reliability in extreme weather conations
where systems is required the most to open or
close the water gates
• Rural and rough terrain
• Solutions
• 7 hops 1+1
• Link Interface: Ethernet
• Why Ceragon?
• Cost efficient high power radio units
• Highly available radio link
SlipGateTM
Case Study
Spain: Water UTelco
Utility
• Challenge:
• Create a reliable high capacity multi service
network
• Provide both internal data requirements such
as intra-communication voice, data, SCADA,
and surveillance systems while serving the
local government telecom needs
• Solutions
• 60 hops 1+0/1+1/2+0 split
• Link Interface: Ethernet
• Multiple topology schemes
• Why Ceragon?
• Cost efficient high capacity native Ethernet in a
2+0 configuration
• Adaptive Coding and Modulation (ACM)
• Integrated offering through a channel with
networking, services and support
Page 26 20
6/9/2010
Case Study
Australia: Power utility data protection
Utility
• Challenge:
g
• Create an completely reliable low capacity
backbone for power surges monitoring and
protection serving rural power substation
• Leverage highly available excessive capacity
to up sell telecom services: Voice and Data
• Rural and rough terrain
• Solutions
• 16 hops 2+1 all indoor
• Link Interface: STM-1
• Serves as a Main link
• Why Ceragon?
• Cost efficient high power all indoor 2+1
configuration (upgradeable to 4+1)
• Integrated offering through a channel with
networking, services and support
Case Study
USA: Rural electrical cooperative
Utility
• Challenge:
• Create a reliable backbone to connect SCI’s
20 substations and metering points
• Serving SCADA, Land Mobile Radio, Video
Advanced Metering Infrastructure traffic.
• Solutions
• 8 hops all indoor
• Link Interface: Ethernet
• Serves as a Main link
• Ring g topology
opo ogy
• Why Ceragon?
• Cost efficient, Upgradeable split Native2
solution.
• Integrated offering through a channel –
Maplenet Wireless with networking, services
and support
South Central Indiana REMC (“SCI”)
Page 27 21
6/9/2010
Case Study
Australia: Alinta Gas pipeline
OPG
• Challenge:
• A long mission critical communication link
1,300km
for a SCADA system
• Rural and rough terrain
• Solutions
• 43 hops 1+1
• Link Interface: STM-1
• Why Ceragon?
• Cost efficient high power radio units
• Highly available radio link
Case Study
France: Broadcast TV
Broadcast
• Challenge:
• Build a robust backup for a fiber
installation for the distribution of high
quality live video content along Nice
coast line
• Solutions
• All indoor, all packet 1+1
• Alternate path for fiber
• Why Ceragon? MONTAGEL
Page 28 22
6/9/2010
Case Study
Australia: TV network Intra-studio
communication
Broadcast
XC
XC
• Challenge: Broadcast
Studio Site B
• Create a reliable high capacity contribution site
network Ceragon
Ethernet switch
• Leverage highly available excessive capacity to FibeAir
up sell telecom services: Voice and Data
• Rural and rough terrain
• Solutions
• 4 hops 1+0 split space diversity
Native Ethernet Fiber as a
• Link Interface: Ethernet Microwave as an primary
• Alternate path with links up to 70km with alternate path path
• Why Ceragon?
XC
• Cost efficient high power highly available native XC
Case Study
US: Operation Green Light - Kansas
Municipality
• Challenge:
• Intelligent Traffic Systems (ITS) where the
stoplights are connected to a wireless network
with IP video cameras and backhauled
wirelessly to their Traffic Management center.
• Create a reliable high capacity packet
aggregation network
• Low impact and integration with last mile
technologies such as WiMAX
• Solutions
• 2+0
2 0 split
li
• Link Interface: Ethernet in rings
• Why Ceragon?
• The highest possible capacities
• Service protection support
• Integrated offering through a channel with
networking, services and support
Page 29 23
6/9/2010
Case Study
US: Intermountain Health Care - Utah
Health
• Challenge:
• Develop a high capacity network that fits
into their disaster recovery plan (mainly
earthquakes)
• Needed control over network with back
using local Telco leased lines
• Solutions
• 1+0 in Ring topology
• Link Interface: Ethernet
• Why Ceragon?
• Cost efficient high power, high capacity
radio units
• Modular and upgradable
Utility
Challenge:
Connecting radar stations and light towers on the shore
Long haul over water
Solutions:
70 packet links
7Ghz high power with Space diversity
Why Ceragon?
High capacity long haul packet radio
Built in Space Diversity
Single turnkey supplier (Telent) for the compete network (offered by two of the bidders)
Page 30 24
6/9/2010
Utility
Challenge:
Carrier grade radio backhaul to suit smart grid requirements (IP based) but also supports
traditional TDM based services i.e SCADA
Solutions:
80 links IP-10 1+1 radios over 4 years
Polyview NMS
Native2: Ethernet and E1
Why Ceragon?
Advanced Native Ethernet capabilities for smart grid & Native E1 for SCADA (Native2)
Outdoor cabinet installations with WIMAX requirement
Flexible, future proof solution
Single turnkey supplier (Motorola) for the compete network
Challenge:
Create a high capacity network between 75 campuses in the city
Support closed circuit TV, Voice and Telemetry monitoring for public
housing
Solutions:
8 link 1+0 ring
Link Interface: Ethernet
400Mbps all IP
53 unlicensed spurs
Why Ceragon?
Cost efficient high capacity native Ethernet
Upgradeable and modular, 2+0 ready configuration
Integrated offering through a channel (Integrators Australia)
Page 31 25
6/9/2010
Thank You
51
Page 32 26
Introduction to Radio
Agenda
• RF Principals
• Parameters Affecting Propagation
• Atmospheric Refraction
• Multipath
• Duct
• Rain Fading
• Fresnel
• RF Li kB
Link i C
Basic Components
• Link Calculation
• Modulation
2
Proprietary and Confidential
Local Remote
3
Proprietary and Confidential
Why Radio?
4
Proprietary and Confidential
5
Proprietary and Confidential
RF Principals
We can see the relationship between colour, wavelength and amplitude using
this animation
6
Proprietary and Confidential
7
Proprietary and Confidential
• Dispersion
• Humidity/gas
H midit /gas absorption
• Multipath/ducting
• Atmospheric conditions (refraction)
• Terrain (flatness, type, Fresnel zone clearance, diffraction)
• Climatic conditions (rain zone, temperature)
• Rain attenuation
8
Proprietary and Confidential
9
Proprietary and Confidential
With Atmosphere
No Atmosphere
10
Proprietary and Confidential
• Multipath occurs when there is more then one beam reaching the receiver
with
ith different amplit
amplitude
de or phase
• Multipath transmission is the main cause of fading in low frequencies
Direct beam
Delayed beam
11
Proprietary and Confidential
Atmospheric duct refers to a horizontal layer in the lower atmosphere with vertical refractive
index gradients causing radio signals:
• Remain within the duct
• Follow the curvature of the Earth
• Experience less attenuation in the ducts than they would if the ducts were not present
D tL
Duct Layer
Duct Layer
Terrain
12
Proprietary and Confidential
Hi h FQ >> Higher
Higher Hi h Attenuation
Att ti
Duct Layer0
Terrain
15
Proprietary and Confidential
Odd numbered zones are constructive and even numbered zones are destructive.
16
Proprietary and Confidential
If this area were blocked by an obstruction, e.g. a tree or a building, the signal
arriving at the far end would be diminished.
When building wireless links, we therefore need to be sure that these zones be
kept free of obstructions.
In wireless networking we should check that that the area containing about 40-60
percent of the first Fresnel zone should be kept free.
3rd
2nd
1st RX
TX
17
Proprietary and Confidential
The radiation pattern contains small minor lobes (weak with little effect on
the main radiation pattern)
A feeder receives the microwaves from the WG and then transmits them
towards a parabolic dish (reflecting surface)
The wave-front reaches the reflecting surface of the antenna, and then it
leaves the antenna in parallel paths
+Gant1 +Gant2
+Lfsf
TX
IDU TX Losses RX Losses IDU RSL
RSL = TX – TX + Gain
Losses
‐ L + Gain
Ant. 1
‐ RXAnt. 2 Losses
fs
Digital Modulation
Modulation
Because QPSK has 4 possible states, QPSK is able to encode two bits per
symbol
QPSK is more tolerant of link degradation than 8PSK, but does not provide as
much data capacity
45 degrees Binary 00
135 degrees Binary 01
225 degrees Binary 11
315 degrees Binary 10
QAM Modulation
The input stream is divided into groups of bits based on the number of
modulation states used.
In 8QAM, each three bits of input, which provides eight values (0-7) alters
the phase and amplitude of the carrier to derive eight unique modulation states
The various flavors of QAM offer higher data rates then 8‐PSK
8 PSK
This is because QAM achieves a greater distance between adjacent points in the I‐Q
plane by distributing the points more evenly
The points on the constellation are more distinct and data errors are reduced
The symbols are determined by modulating The symbols are determined by modulating
the Phase, and Amplitude of the carrier the Phase of the carrier signal.
signal.
8QAM
29
29 Proprietary and Confidential
128QAM Modulation
30
Proprietary and Confidential
31
Proprietary and Confidential
Thank You !
training@ceragon com
training@ceragon.com
Agenda
• Definition
• E
Example l
• MSE & ACM
• MSE values at 56MHz (case study)
• MSE values at 28MHz (case study)
• Troubleshooting examples
1 Page 49
Introduction
Definition | Example
MSE - Definition
2 Page 50
To simplify….
We took a few of parts and measured them to see how many can
fit in….
3
3
2
1
width
6mm 7mm 10mm 12mm 16mm
To evaluate how accurate our machine is, we need to know how many parts
differ from the expected value
3 Page 51
The difference from Expected value…
Quantity
Error = 0 mm
Error = + 2 mm
Error = - 3 mm
Error = + 6 mm
Error = - 4 mm
width
6mm 7mm 10mm 12mm 16mm
To evaluate the inaccuracy (how sever the situation is) we measure how
much the errors differ from expected value
+ 2 mm = 4
-3 mm = 9
- 4 mm = 16 + 6 mm = 36
width
6mm 7mm 10mm 12mm 16mm
The squared values give bigger differences more weight than smaller
differences, resulting in a more powerful statistics tool:
16cm parts are 36 ”units” away than 2cm parts which are only 4 units away
4 Page 52
Calculating MSE
Quantity
Error = 0 mm
+ 2 mm = 4
-3 mm = 9
- 4 mm = 16 + 6 mm = 36
width
To evaluate the total errors, we sum all the squared errors and take the
average:
The bigger the errors (differences) >> the bigger MSE becomes
Calculating MSE
Quantity Error = 0 mm
width
10mm
If all parts were perfectly produced than each error would be 0
5 Page 53
MSE in digital modulation (Radios)
Let us use QPSK (4QAM) as an
example:
Q
QPSK = 2 bits per symbol
01 00
2 possible states for I signal
2 possible states for Q signal
I
Similarly to the previous
example we can say that the
example,
bigger the errors are – the
harder it becomes for the
11 10 receiver to detect & recover the
transmitted signal
6 Page 54
MSE in digital modulation (Radios)
Q
01 00 MSE would be the average
e1 errors of e1 + e2 + e3 + e4….
e2
I
When MSE is very small the
4
e4 actual signal is very close to
e3
the expected signal
11 10
Q
01 00 When MSE is too big, the
e1 actual signal (amplitude &
e2 phase) is too far from the
expected signal
I
4
e4
e3
11 10
7 Page 55
Using MSE
Commissioning | Troubleshooting
8 Page 56
MSE and ACM
For example –
h greatt capacity
256QAM has it but
b t
poor immune to noise
9 Page 57
Triggering ACM with MSE
When ACM is enabled, MSE values are analyzed on each side of the link
5 dB security window
10 Page 58
ACM & MSE: Another approach…
In this graph we refer to a 56MHz channel. It is easier to observe the
hysteresis of changing the ACM profile with respect to measured MSE.
ACM
Profile
‐32.5
‐30
MSE
‐31 ‐28.5 ‐26.1 ‐23.1 ‐20.8 ‐16.6 ‐ 15.5 ‐10 .2
When RF signal degrades and MSE does not pass the upgrade point (green point) – ACM
waits
it till MSE improves
i to
t the
th point
i t off nextt available
il bl upgrade
d point
i t (takes
(t k longer
l time
ti to
t
switch back to the higher profile).
ACM
Profile
‐32.5 ‐30
11 Page 59
Troubleshooting wrong modulation
When different settings of Modulation are set, MSE will be showing -
99.99dB (Modulation Mismatch):
Thank You !
t i i @
training@ceragon.com
24
12 Page 60
9/13/2010
odu at o range:
Modulation a ge QQPSK
S - 256QAM
56Q
Page 61 1
9/13/2010
services
Page 62 2
9/13/2010
256 QAM
170 Mbps
Best Effort
128 QAM
112 Mbps
Silvver
Premium
32 QAM
Page 63 3
9/13/2010
64 45%
96 29%
128 22%
256 11%
512 5%
Page 64 4
9/13/2010
nXT1/E1
?
99.99… %
Fewer Hops
10
Proprietary and Confidential
Page 65 5
9/13/2010
12
Proprietary and Confidential
Page 66 6
9/13/2010
Traffic Prioritization
When ACM is enabled and link degrades, highest priority services are
maintained while low services are dropped
13
Proprietary and Confidential
14
Proprietary and Confidential
Page 67 7
9/13/2010
• Ethernet L2 capacity - Total bit rate of net Ethernet frames running over
the Ethernet user port. Taking into account the Ethernet frame without the
IFG and preamble fields.
• Radio throughput
g p - Total bit rate supported
pp by
y the radio link running
g in a
specific channel/modulation including radio frame overhead, etc.
Page 68 8
9/13/2010
3.5 MHz
P fil
Profile M d l ti
Modulation Mi i
Minimum M # off Ethernet
Max Eth t capacity
it Eth
Ethernett L2 Frames per
F R di
Radio
required capacity supported (Mbps) capacity (Mbps) seconds Throughput
license E1s (Mbps)
2 16 QAM 10 4 13.60 10.36 20233.77 10.50
4 64 QAM 25 6 20.14 15.35 29974.03 15.00
7 MHz
Profile Modulation Minimum Max # of Ethernet capacity Ethernet L2 Frames per Radio
required capacity supported (Mbps) capacity (Mbps) seconds Throughput
license E1s (Mbps)
0 QPSK 10 4 13 42
13.42 10 23
10.23 19976 45
19976.45 10 38
10.38
1 8 PSK 25 6 20.18 15.38 30034.94 15.03
2 16 QAM 25 8 27.87 21.24 41475.26 20.31
3 32 QAM 25 10 34.48 26.27 51304.87 24.85
4 64 QAM 25 12 40.44 30.81 60175.21 28.95
5 128 QAM 50 13 46.60 35.50 69339.64 33.19
6 256 QAM 50 16 54.53 41.55 81151.77 38.64
7 256 QAM 50 17 57.38 43.72 85389.21 40.60
14 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
required capacity support E1s (Mbps) capacity (Mbps) seconds Throughput
license (Mbps)
0 QPSK 25 8 28.90 22.02 43001.18 21.02
1 8 PSK 25 12 40.90 31.16 60857.98 29.27
2 16 QAM 50 18 60.36 45.99 89823.89 42.65
3 32 QAM 50 20 70.35 53.60 104693.80 49.52
4 64 QAM 50 24 81.78 62.31 121693.09 57.37
5 128 QAM 100 29 98.43 74.99 146471.17 68.82
6 256 QAM 100 34 115.15 87.73 171347.98 80.31
7 256 QAM 100 37 124.52 94.87 185297.74 86.76
28 MHz
Profile Modulation Minimum required Number of Ethernet capacity Ethernet L2 Frames per Radio
capacity
it lilicense supportt E1s
E1 (Mb )
(Mbps) capacity
it (Mb
(Mbps)) seconds
d Throughput
Th h t
(Mbps)
0 QPSK 50 17 57.86 44.08 86099.43 40.93
1 8 PSK 50 23 77.86 59.32 115860.75 54.68
2 16 QAM 100 33 111.32 84.81 165648.63 77.68
3 32 QAM 100 44 150.76 114.87 224346.79 104.80
4 64 QAM 150 55 187.55 142.90 279093.55 130.09
5 128 QAM 150 68 228.81 174.33 340488.46 158.46
6 256 QAM 200 76 254.71 194.07 379034.79 176.27
7 256 QAM 200 80 268.45 204.53 399476.94 185.71
Page 69 9
9/13/2010
40 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
required capacity support E1s (Mbps) capacity (Mbps) seconds Throughput
license (Mbps)
0 QPSK 50 23 79 64
79.64 60 68
60.68 118506 13
118506.13 55 90
55.90
1 8 PSK 100 35 119.11 90.75 177239.65 83.04
2 16 QAM 100 51 174.14 132.68 259136.72 120.87
3 32 QAM 150 65 218.49 166.47 325132.27 151.36
4 64 QAM 150 81 273.67 208.51 407254.05 189.30
5 128 QAM 200 84 305.49 232.76 454605.63 211.18
6 256 QAM 200 84 346.84 264.26 516135.41 239.61
7 256 QAM 300 84 369.96 281.87 550529.12 255.50
56 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
i d capacity
required it supportt E1s
E1 (Mb )
(Mbps) it (Mb
capacity (Mbps)) d
seconds Th h t
Throughput
license (Mbps)
0 QPSK 100 32 108.86 82.94 161994.37 75.99
1 8 PSK 100 48 163.37 124.48 243116.10 113.47
2 16 QAM 150 64 216.60 165.03 322318.52 150.06
3 32 QAM 200 84 288.50 219.81 429314.58 199.50
4 64 QAM 300 84 358.49 273.14 533473.73 247.62
5 128 QAM 300 84 430.43 327.95 640527.34 297.08
6 256 QAM 400 84 489.77 373.16 728824.51 337.87
7 256 QAM 400 84 531.82 405.20 791403.86 366.78
19
Proprietary and Confidential
2 8 PSK 10 19 – 27 2 8 PSK 22 39 - 56
3 16 QAM 16 28 – 40 3 16 QAM 32 57 - 81
4 32 QAM 18 32 – 46 4 32 QAM 38 67 - 96
Page 70 10
9/13/2010
Thank You !
training@ceragon.com
training@ceragon com
21
Page 71 11
Introduction to 802.1 P/Q
Prerequisites
• Ethernet Topologies
• OSI 7 Layers model
What is VLAN?
Advantages for using VLAN
Regular Ethernet frame
Tagged frame structure
Types of VLAN
Types of connections
802.1P implementations
What is VLAN?
• Prioritization
• Filtering
• Provisioning
• Mapping (e.g. - ATM to/from ETH)
What is VLAN?
VLAN 1
Switch ports
VLAN 547
4 Bytes
8 Bytes 6 Bytes 6 Bytes 2 Bytes 46 - 1500 Bytes (32-bit
CRC)
4 Bytes
• CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over
ETH backbones (some vendors may use CFI for internal purposes)
ARP 0x0806
p
It is important that yyou understand the Q i Q (CISCO)
Q‐in‐Q 0 8100
0x8100
meaning and usage of this parameter
Q‐in‐Q (other vendors) 0x88A8
Q‐in‐Q (other vendors) 0x9100
For example – ports 1,2 & # can see each other but cannot PING
other ports (different VLAN membership)
1 2 3 4 5 6 7 8
VLAN 22
VLAN 5
VLAN 9
VLAN 333
VLAN 100
VLAN 1
00:33:ef:38:01:23
00:33:ef:38:01:a0
00:33:ef:38:01:25
VLAN 5
10.10.10.12
10.10.10.122
10.10.10.13
VLAN 44
11.1.1.10.12
11.1.1.10
11.1.1.10.23
VLAN 5
Port Types
Device unaware of VLANs Switch tags the ingress frames with VID according to
transmits untagged specific Tagging mechanism
(regular) ETH frames
Switch un-tags frames with VID received from network
and delivers untagged frames to Access ports
Port Types
4 Bytes 4 Bytes
TPID = 0x88A8
0 88A8 TCI TPID = 0x8100
0 8100 TCI
Port Types
Q-in-Q (A.K.A. Double Tagging…VLAN Encapsulation…)
+
VLAN
aware Switch
CN PN
E h
Enhanced
d security
it – nott exposing
i original
i i l VID
21
To match the priority level with the appropriate ATM service class and other parameters, the
switch then consults a mapping table with pre-defined settings.
P-Tag 6 CBR
P-Tag 4 VBR
P-Tag 0 UBR
Hub
GE
Site
FE/GE RNC
GE
STM1/
n x T1/E1
FibeAir OC3
Tail site IP-10 MPLS
IP-10 ATM Router
Router Core
Site BSC/MSC
Hub
GE
Site
FE/GE RNC
GE
STM1/
n x T1/E1
FibeAir OC3
STM1/
Tail site IP-10 OC3
MPLS
IP-10 MPLS Router
Router
Core
Site BSC/MSC
IEEE Recommendation
Ingress Number of Available Traffic Classes
The following
Th f ll i table
t bl shows
h P‐Tags
IEEE definition of traffic 1 2 3 4 5 6 7 8
classes 0 (default) 0 0 0 0 0 1 1 1
• With a single queue, there are no choices. All traffic is Best Effort
• Multiple queues are needed to isolate Network Control from the user data traffic
Acronyms
• ETH – Ethernet
• NIC – Network Internet Card
• VID – Vlan
Vl ID
• VLAN – Virtual LAN
• P-TAG – Priority Tag, Priority Bits
• CFI – Canonical Format Indicator
• TPID – Tag Protocol Identifier
• FCS – Frame Check Sequence
• DA – Destination Address
• SA – Source Address
• QoS – Quality of Service
Thank You !
training@ceragon.com
Ceragon in a Nutshell
RFU (6-38GHz)
Page 86 1
6/13/2010
RFUs
FibeAir RFU-HP FibeAir RFU-HS FibeAir RFU-P FibeAir RFU-C FibeAir RFU-D
PDH
Page 87 2
6/13/2010
6
Proprietary and Confidential
Page 88 3
6/13/2010
Ethernet Ethernet
Radio Radio
User interface User interface
Interfaces Interface
Carrier Ethernet
Switch
8
Proprietary and Confidential
Page 89 4
6/13/2010
N x GE/FE N x GE/FE
Wireless
Carrier Ethernet
Ring
(up to 500Mbps)
Integrated Ethernet
Switching
9
Proprietary and Confidential
N x GE/FE
Page 90 5
6/13/2010
Native Ethernet
Ethernet over SDH/SONET
Hub
GE
Site
FE/GE RNC
GE
FibeAir
Tail site IP-10 FibeAir NG-SDH
IP-10 NG-SDH MSPP
MSPP
Core
Site
11
Proprietary and Confidential
Native Ethernet
Ethernet PWs or IP routing
Hub
GE
Site
FE/GE RNC
GE
FibeAir
Tail site IP-10 FibeAir MPLS
IP-10 MPLS Router
Router
Core
Site
12
Proprietary and Confidential
Page 91 6
6/13/2010
• VLAN ID
Classify
• IPv4 DSCP/TOS, IPv6 TC Arrivals W2
Scheduling
departures
• Highest priority to BPDUs
• Advanced ingress traffic rate-limiting W3
per CoS/priority
• Flexible scheduling scheme per port
• Strict priority (SP)
W4 – lowest priority
• Weighted Round Robin (WRR)
• Hybrid – any combination of SP & WRR
• Shaping per port
Support differentiated Ethernet services
with SLA assurance
13
Proprietary and Confidential
Page 92 7
6/13/2010
Cellular traffic
(TDM)
STM
Rings
Page 93 8
6/13/2010
IP-10F IDU
Fans
drawer
Craft 16 x E1s
Terminal External GND
(optional)
(DB9) Alarms RFU
(DB9) interface Power
Protection
5 x FE (N-Type) -48V DC
Interface
(RJ45) Electrical
(RJ45)
Page 94 9
6/13/2010
500Mbps
Max radio capacity 100 Mbps
1Gbps using 2+0/XPIC
Multi-radio support - Yes
5 x FE RJ-45+
# of Ethernet interfaces 5 x FE RJ-45
2 x GE combo (RJ-45/SFP)
# of E1/T1 integrated IDU interfaces option 16 E1, None 16 E1, 16T1, None
Page 95 10
6/13/2010
Higher Spectral-Efficiency
What’s in it for The Operator?
Typical IP10
Microwave Radio Microwave Radio
High
HighSystem
SystemGain
Gain 1.80 m 30 km 128QAM STM‐1/OC‐3
Spectral Efficiency
should always be coupled with
System Gain
22 Proprietary and Confidential
Page 96 11
6/13/2010
IP-10 FibeAir
“Tree Topology”
Page 97 12
6/13/2010
Thank You!
training@ceragon.com
Page 98 13
FibeAir ® IP-10 G-Series
Front Panel Description
GUI Example)
Baud: 115200
Data bits: 8
Parity: None
Stop bits: 1
Flow Control: None
LED Indications
Each asynchronous channel will make use of its own RJ-45 external
interface
Modes of operation:
Allowed configurations:
> All settings are copied to Mate when working in Protected mode
The FE protection port is static (only used for protection, not traffic). Its switching is performed
electrically. If the unit is a stand-alone, an external connection is made through the front panel. If the
unit is connected to a backplane, the connection is through the backplane, while the front panel port
is unused.
GbE Ports
Port #2 Port #1
5 FE ports:
Port 3: Data
Port 4: Data or WSC (2 Mbps Wayside Channel)
Port 5,6 &7: Data or local management
In addition –
• Grounding
• -48vdc Power Connector
• Fan Drawer
as stand-alone units.
The role an IDU plays is determined during installation by its position in the
traffic interconnection topology
General
Site Requirements
• IDU must be located indoors
• Available power source of -48 VDC, and the site must comply with
National Electric Code (NEC) standards.
The IP-10 IDU overall heat dissipation is 25W max (~85 BTU/h).
The ODU heat dissipation
p is 100W max.
Antenna Location:
As with any type of construction, a local permit may be required before installing
an antenna. It is the owner’s responsibility to obtain any and all permits.
The equipment is prepared for public transportation. The cargo must be kept dry
during transportation.
Keep items in their original boxes till they reach their final destination.
When unpacking
Wh ki –
Check the packing lists, and ensure that the
correct part numbers and quantities of
components arrived.
Upon delivery, make sure that the following items are included:
Required Tools
• Philips screwdriver #2 (for mounting the IDU to the rack and grounding screw)
Connector spec, cable spec & interface pin layout can be found in our complete
PDF installation guide
IDU Dimensions
42.60mm
Step #1:
Install the IP-10 Main enclosure
in the 19 inch rack using 4
screws.
Step #1:
Install the IP-10 Main enclosure
in the 19 inch rack using 4
screws.
Step #2:
Slide down the 2nd extension
enclosure. Male connector
should plug in smoothly into the
Main enclosure.
Step #1:
Install the IP-10 Main enclosure
in the 19 inch rack using 4
screws.
Step #2:
Slide down the 2nd extension
enclosure. Male connector
should plug in smoothly into the
Main enclosure.
Step #3:
Slide down the 2nd extension
enclosure. Male connector
should be plugged in smoothly
into the Main enclosure.
Step #4:
Secure the 2nd extension into
the Main enclosure. Use the
built-in screw.
Step #4:
Secure the 2nd extension
into the Main enclosure.
Use the built-in screw.
Step #5:
Add the 3rd extension
when needed
Grounding Wire
• FibeAir provides a ground for each IDU, via a one-hole mounted lug onto a
single-point stud.
Th stud
• The t d mustt b
be iinstalled
t ll d using
i a UL li t d ring
UL-listed i ttongue tterminal,
i l and
d ttwo star
t
washers for anti-rotation.
Lightning Protection
4. The DC supply system is to be local, i.e. within the same premises as the
equipment
Power Requirements
When selecting a power source, the following must be considered:
• Whether or not the power source provides constant power (i.e., power is
secured on weekends or is shut off frequently and consistently).
• The power supply must have grounding points on the AC and DC sides.
• The
Th user power supply
l GND mustt be
b connected
t d to
t the
th positive
iti pole
l iin th
the IDU
power supply.
Make sure to use a circuit breaker to protect the circuit from damage by
short or overload.
Dual DC Feed
In boards with dual DC feed hardware, the system will indicate whether received
voltage in each connector is above or below the threshold power (40.5v
approximately).
This will
Thi ill b
be shown
h iin ttwo ways:
1. The LED (and its WEB representation) will only be ON if the voltage is above
the threshold
2. If voltage is below the threshold an alarm will be raised
User may configure the system not to raise an alarm in case of under-voltage
for any of the supplies.
This is used for cases where the dual feed hardware is used
used, but in the
installation only one of them is actually connected, so that no alarm is
permanently raised.
Note: Make sure you fasten the cable along the ladder!
Make sure that the inner pin of the connector does not exceed the
edge of the connector.
Thank You !
training@ceragon.com
Preliminary Questions
Wh t iis the
What th required
i d length?
l th? [ /ft]
________ [m/ft]
Page 125 1
9/5/2010
ETHERNET CABLES
Protection Cable
X-WSC-E1 WA-0242-0
X-WSC-T1 WA-0242-0
Page 126 2
9/5/2010
Connection Cables
X-2FE-CON WA-0235-0
ETH Y-Cables
15P-PROT-CBL WA-0244-0
15P‐PROT‐CBL
X‐2FE‐CON
Page 127 3
9/5/2010
PDH CABLES
E1 Extension Cable
IP10-CBL-16E1-OE-3M WA-0400-0
• In use to connect to the IP-10 16E1 connector on one end and have open
ends for the 16E1 on the other side ((on 120 ohm))
• A male SCSI68 Left angle120 OHM cable
• When conversion to 75 ohm is required a special adaptation panel is
needed
• Length 3M
Page 128 4
9/5/2010
T1 Extension Cable
IP10-CBL-16T1-OE-3M WA-0413-0
• In use to connect to the IP-10 16E1 connector on one end and have open
ends for the 16T1 on the other side ((on 100 ohm))
• A male SCSI68 Left angle100 OHM cable
• Length 3M
Additional Optional length (5, 10, 15 meter):
• IP10-CBL-16T1-10M
• IP10-CBL-16T1-25M
• IP10-CBL-16T1-5M
E1 Y-Cable
IP10-CBL-16E1-PROT-Y WA-0391-0
IP10‐CBL‐16E1‐OE‐3M
Page 129 5
9/5/2010
T1 Y-Cable
IP10-CBL-16T1-PROT-Y WA-0398-0
IP10‐CBL‐16T1‐OE‐3M
Page 130 6
9/5/2010
…
• A male SCSI68 Left angled 120 OHM cable with
RJ 45 Adaptors
• 2 kits of 8 female-female adaptors should be …
ordered for 16T1 (optional)
• Length 1.5M
• Optional length
• IP10-CBL-16T1-MDRLA-RJ45-XD1.5m
• IP10-CBL-16T1-MDRLA-RJ45-XD3m
…
• A male SCSI68 Left angled100 OHM cable with
RJ 45 Adaptors
• 2 kits of 8 female-female adaptors should be …
ordered for 16T1 (optional)
• Length 1.5M
• Optional length
• IP10-CBL-16T1-MDRLA-RJ45-XD1.5m
• IP10-CBL-16T1-MDRLA-RJ45-XD3m
Page 131 7
9/5/2010
Page 132 8
9/5/2010
Page 133 9
9/5/2010
OPTICAL CABLES
20
Page 134 10
9/5/2010
Page 135 11
9/5/2010
Page 136 12
9/5/2010
• H Optical cable
• Used to interconnect between two protected terminals (logically equivalent to two
Y splitters connected to each other via their common port)
• 2 cables should be ordered
• TX of 1 device should be connected to RX of the other
Page 137 13
9/5/2010
ALARMS CABLES
27
Page 138 14
9/5/2010
30
Page 139 15
9/5/2010
15R-USER-CHAN-ASYNC-CBL-2.5M
15P-PROT-CB
Page 140 16
9/5/2010
• SYNC Cable
• Used when working on 1+0 user channel connection
• Length 2.5 M
• SYNC Cable
• Used when working on 1+1 or 2+2 for the user channel connection
• Length 2.5 M
• Uses the Y cable 15P-PROT-CBL
• Two Y cables should be ordered to support protection mode
Page 141 17
9/5/2010
IF CABLES
35
IDU-ODU IF CABLE
IDU_ODU_CBL WA-0098-0
N_TYPE WA-0037-0
• BNC Connector
• N
N-Type
Type
• Needs two per cable
Page 142 18
9/5/2010
PART NUMBERS
37
E1
Page 143 19
9/5/2010
E1
E1 RJ45 male termination cables/panels
Ceragon P/N Marketing Model Marketing Description Item description
CABLE,SCSI68 Male TO 4xRJ45 Male
WA‐0396‐0 IP10‐CBL‐4E1‐MDR‐RJ45‐XED‐0.3m IP‐10 4E1 cable MDR68‐RJ45 0.3M, cross
CROSS,0.3M,120 OHM
CABLE,SCSI68
, Male TO 8xRJ45 Male
WA 0395 0
WA‐0395‐0 IP10 CBL 8E1 MDR RJ45 XED 0 3
IP10‐CBL‐8E1‐MDR‐RJ45‐XED‐0.3m IP 10 8E1 cable
IP‐10 bl MDR68
MDR68‐RJ45
RJ45 0
0.3M,
3M cross
CROSS,0.3M,120 OHM
CABLE,SCSI68 Male TO 8xRJ45 Male
WA‐0392‐1 IP10‐CBL‐8E1‐MDR‐RJ45‐XED‐1.5m IP‐10 8E1 cable MDR68‐RJ45 1.5M, cross
CROSS,1.5M,120 OHM
CABLE,SCSI68 Male TO 8xRJ45 Male
WA‐0394‐1 IP10‐CBL‐8E1‐MDR‐RJ45‐XED‐3m IP‐10 8E1 cable MDR68‐RJ45 3M, cross
CROSS,3M,120 OHM
WA‐0409‐1 IP10‐CBL‐16E1‐MDR‐LA‐RJ45‐XD3m IP‐10 16E1 cable MDR68‐RJ45 3M,LA,cross
E1
E1 RJ45 couplers/panels
Status Ceragon P/N Marketing Model Marketing Description
NPI EN‐0268‐0 IP10‐PANEL‐32E1/T1‐RJ45 IP‐10 32E1/T1 panel, for RJ45F adapters
Released NM‐0153‐0 IP10‐ADAP‐RJ45F‐E1/T1‐XED
/ x8 IP‐10 RJ45F/RJ45F
/ adapter,E1/T1,cross
p , / , x8
Released NM‐0154‐0 IP10‐ADAP‐RJ45F‐RJ45F x8 IP‐10 RJ45F/RJ45F adapter, straight x8
Page 144 20
9/5/2010
E1
E1 Protection panels/cables
Ceragon P/N Marketing Model Marketing Description
WA‐0391‐0 IP10‐CBL‐16E1‐PROT‐Y IP‐10 16E1 protection Y‐cable, MDR68
T1
WA‐0358‐0 IP10‐CBL‐16T1‐5M IP10 16 T1 ports cable open 5M CABLE,SCSI68 LEFT ANGLE TO OE,25M,100OHM
WA‐0359‐0 IP10‐CBL‐16T1‐10M IP10 16 T1 ports cable open 10M CABLE,SCSI68 LEFT ANGLE TO OE,10M,100 OHM
WA‐0360‐0 IP10‐CBL‐16T1‐25M IP10 16 T1 ports cable open 25M CABLE,SCSI68 LEFT ANGLE TO OE,5M,100 OHM
Page 145 21
9/5/2010
T1
T1 Protection panels/cables
Ceragon P/N Marketing Model Marketing Description
T1
Page 146 22
9/5/2010
OPTICAL
ETHERNET
Page 147 23
9/5/2010
ETHERNET
External Alarms
Ceragon P/N Marketing Model Marketing Description Item description
CABLE,D‐9F TO OE,2.5M,EXT
WA‐0374‐0 IP10‐EXT‐ALARMS‐CBL‐2.5m IP‐10 Ext. Alarms open cable 2.5m
ALARMS
CABLE,D‐9Fx2 TO
WA‐0369‐0 IP10‐EXT‐ALARMS‐CBL‐2.5m‐PROT Ext. Alarms cable 2.5m – with protection
OE,2.5M,EXT ALARMS
Page 148 24
9/5/2010
Thank You
Should you require further information, please contact us at –
training@ceragon.com
Page 149 25
6/16/2010
FibeAir® Family
RFUs Carrier Ethernet EMS & NMS
6-38 GHz IP-10 IP-MAX2 3200T PolyView (NMS)
RFU-C
Multi-Service
RFU-HP IP-10 IP-MAX2 640P
CeraView (EMS)
2
Proprietary and Confidential
Page 150 1
6/16/2010
RFU-C IP-10
1500R
RFU-P, RFU-SP
RFU-HP
IP-IP-MAX2
RFU-SP
640P
1500P
3
Proprietary and Confidential
1500R 1500R
IP-10
IP 10 IP-10
1500P 1500R
IP-MAX/IP-MAX2 IP-10
Page 151 2
6/16/2010
1+0 direct
5
Proprietary and Confidential
1+1 direct
6
Proprietary and Confidential
Page 152 3
6/16/2010
1+0 remote
7
Proprietary and Confidential
1+1 remote
8
Proprietary and Confidential
Page 153 4
6/16/2010
9
Proprietary and Confidential
10
Proprietary and Confidential
Page 154 5
6/16/2010
11
Proprietary and Confidential
• 1.30vdc = -30dBm
• 1.45vdc = -45dBm
• 1.60vdc = -60dBm
• etc
12
Proprietary and Confidential
Page 155 6
6/16/2010
13
Proprietary and Confidential
training@ceragon.com
g@ You
Thank g !
14
Proprietary and Confidential
Page 156 7
FibeAir ® IP‐10 G‐Series
Setting Management
Agenda
• Getting started
• General notes
• General commands
• Command historyy
• Reading current IP
• Setting new IP
• Connecting PC to IDU
• Troubleshooting
• Factory Defaults
2
Proprietary and Confidential
• Baud: 115200
• Data bits: 8 You may use any Serial
• Parity: None Application such as Hyper
• Stop
St bits:
bit 1 Terminal PuTTY,
Terminal, PuTTY TeraTerm
etc…
• Flow Control: None
3
Proprietary and Confidential
IP-10:/>
Note that the > sign indicates your current directory in the CLI tree
All functions & features can be configured faster and easier using the WEB
based EMS
4
Proprietary and Confidential
IP-10:/ > cd
IP-10:/ > cd ..
5
Proprietary and Confidential
Command History
6
Proprietary and Confidential
IP-10:/>cd management/networking/ip-address/
IP-10:/ management/networking/ip-address>
Note that the prompt has changed. Now, type get ip-address:
7
Proprietary and Confidential
Setting new IP
Now, let us set a new IP for the MNG:
You may lose remote management connection to the unit if this value
is changed incorrectly.
Are you sure? (yes/no):
8
Proprietary and Confidential
9
Proprietary and Confidential
Management Troubleshooting
In case PC cannot PING IDU –
1. Check your ETH cable – it might not be inserted properly (broken PIN)
2. Verify the management port is enabled in the EMS General/Management
configuration
3. Make sure you connect to a management-enabled port (7, 6 or 5)
4. Verify right LED is ON (see below)
5. Verify your PC is in the same subnet as the IDU
6. In case your IDU is connected to a router: set the IDU’s Default GW = Router IP
7. In case your PC is connected to several IDUs (through switch/hub) – make sure
every IDU has a unique IP
When ON (Green) = Port is set to Management
When OFF = Port is set to Data
10
Proprietary and Confidential
IP-10:/> cd management/mng-services/cfg-service
IP-10:/management/mng-services/cfg-service>set-to-default
11
Proprietary and Confidential
Thank You !
training@ceragon.com
Agenda
Faults:
• Current Alarms
• Event Log
PM & Counters:
• Remote Monitoring
• TDM Trails
• TDM interfaces
• Radio (RSL, TSL, MRMC and MSE)
• Radio TDM
• Radio ETH
Page 163 1
4/16/2010
EMS - General
Easy access – simply type the IP address of the IDU on your web page
Page 164 2
4/16/2010
Page 165 3
4/16/2010
8
Proprietary and Confidential
Page 166 4
4/16/2010
Faults - CAS
• Probable cause
• Corrective Actions
9
Proprietary and Confidential
Page 167 5
4/16/2010
TDM PM in Radio
(allocated E1s)
TDM
(16 E1s)
11
Proprietary and Confidential
12
Proprietary and Confidential
Page 168 6
4/16/2010
13
Proprietary and Confidential
ETH PM – RMON
The system supports Ethernet statistics counters (RMON) display (depends on
port availability). The counters are designed to support:
Page 169 7
4/16/2010
16
Proprietary and Confidential
Page 170 8
4/16/2010
A Tagging T No membership
T A
Site B Ingress port (Radio) receives the frame and checks the Egress port VID
membership
Egress port default VID is 300, therefore frame is filtered by the remote Radio port
17
Proprietary and Confidential
Site A Site B
T T T A
When ingress frames exceed the maximum frame size, RMON counter “Oversized frames
received” is updated accordingly
18
Proprietary and Confidential
Page 171 9
4/16/2010
Site A Site B
T T T A
Discarding Examples:
19
Proprietary and Confidential
Monitor
20
Proprietary and Confidential
Page 172 10
4/16/2010
A one-second period with one or more errored blocks or at least one defect
Page 173 11
4/16/2010
Page 174 12
4/16/2010
The number of times the IP-10 switched from Primary Path to Secondary Path
and vice versa (per 15min or 24hrs interval)
Page 175 13
4/16/2010
Integrity:
For example – if clock was changed or system was restarted during this interval
then information is not reliable
28
Proprietary and Confidential
Page 176 14
4/16/2010
29
Proprietary and Confidential
PM – STM-1 Interface
30
Proprietary and Confidential
Page 177 15
4/16/2010
PM – Radio
• Associated Script
• Available Bit rate
• Available Radio VCs
MSE analysis
31
Proprietary and Confidential
Page 178 16
4/16/2010
RSL
-40
-50
-68
-99 T [sec]
10 5 10
33
Proprietary and Confidential
PM – Radio - Aggregate
34
Proprietary and Confidential
Page 179 17
4/16/2010
PM – Radio - MRMC
The information displayed in this page is derived from the license and script
assigned to the radio.
35
Proprietary and Confidential
PM – Radio - MSE
The information displayed in this page is derived from the license and script
assigned to the radio. When link quality degrades or improves, the MSE reading
is updated accordingly. Differences of 3dB trigger ACM modulation changing.
36
Proprietary and Confidential
Page 180 18
4/16/2010
PM – Ethernet
ETH Traffic + Threshold settings:
A frame viewed on the actual physical wire would show Preamble and Start Frame
Delimiter,, in addition to the other data (required
( q by
y the p
physical
y hardware).
)
However, these bits are stripped away at OSI Layer 1 by the Ethernet adapter before
being passed on to the OSI Layer 2 which is where data is detected.
38
Proprietary and Confidential
Page 181 19
4/16/2010
Throughput = 77 Mbps
Radio Capacity =
(license) = 400Mbps
Utilization = Throughput = 77 = 20 %
Radio Capacity 400
40
Proprietary and Confidential
Page 182 20
4/16/2010
PM – Ethernet
41
Proprietary and Confidential
Thank You !
training@ceragon.com
training@ceragon com
42
Page 183 21
6/13/2010
Agenda
Menu
Page 184 1
6/13/2010
Configure specific
information that may
assist you later
VDC reading
Page 185 2
6/13/2010
Celsius (metric) or
Fahrenheit (Imperial)
Page 186 3
6/13/2010
Versions
Page 187 4
6/13/2010
Versions
• The IDU running SW is displayed in the aidu line and currently it is 3.0.92
3 0 92
Th IDU holds
The h ld all
ll th fil for
the SW files f all
ll the
th
components (IDU + ODU)
Page 188 5
6/13/2010
5 Inputs
1 Output
Page 189 6
6/13/2010
Equipment – Alarms related to: HW / FAN / RFU mute / Power Supply / Inventory.
All Groups.
Page 190 7
6/13/2010
The IDU has 3 ports for local management: Port 7, Port 6 and Port 5.
Page 191 8
6/13/2010
These parameters
allow you setting the
managementt capacity it
and port properties
Page 192 9
6/13/2010
capacities
Page 193 10
6/13/2010
• Expected Status:
2. “Local” – if the NTP client is locked to the local element’s real-time clock
3. “NA” - if not synchronized with any clock (valid only when Admin is set to
Disable).
NTP Properties
Page 194 11
6/13/2010
NTP Properties
When using NTP with external protection 1+1, both “Active” and “Standby”
units
nits sho
should
ld be locked independentl
independently on the “NTP ser
server”,
er” and report
Time & Date are not copied from the “Active” unit to the “Standby” unit
standby main units) are automatically synchronized to the active main unit’s
clock.
IP Table
Page 195 12
6/13/2010
SNMP
• V1
• V3
• No security
• Authentication
• Authentication privacy
• SHA
• MD5
• No Authentication
All ODU
This feature is used to feed the integrated fans of a 3rd party Outdoor
Enclosure (standalone outdoor rack)
When enabled,
enabled the Ext.
Ext Alarms connector is modified to provide the required
power feed.
Page 196 13
6/13/2010
Thank You !
training@ceragon.com
training@ceragon com
27
Page 197 14
3/7/2010
Agenda
2. Guidelines
Page 198 1
3/7/2010
Switch Modes
This application allows only single GbE interface as traffic interface (Optical
GbE-SFP or Electrical GbE - 10/100/1000).
Any traffic coming from any GbE interface will be sent directly to the radio and
vice versa.
Switch Modes
All Ethernet ports are allowed for traffic. Each traffic port can be configured to
be "access" port or "trunk" port:
Allowed Egress
Type VLANs Allowed Ingress Frames
Frames
Page 199 2
3/7/2010
Switch Modes
Guidelines
Page 200 3
3/7/2010
Single Pipe
Configuration
Untagged
VID 4 45
VID 51 IP-10 Switch
VID 100
Page 201 4
3/7/2010
Port 3 (RJ45)
No need to configure
VID membership
10 Proprietary and Confidential
Page 202 5
3/7/2010
Managed Mode
Configuration
IDU-B
IDU-A
Radios as Trunk by
default Port #2 as Trunk
Port #3 as Trunk
(VID 200, VID 300)
(VID 300)
Page 203 6
3/7/2010
Next steps:
1. Go to Interfaces page
Page 204 7
3/7/2010
2
1
4
15 Proprietary and Confidential
IP-10
Transmits and
receives
Transmits and Untagged PC
receives frames
Untagged PC
frames 192.168.1.200
192.168.1.100
Page 205 8
3/7/2010
IP-10
Trunk Port
Multiple L2
streams, each Traffic
identified with
unique VID Generator
Trunk Port
Thank You !
training@ceragon.com
18
Page 206 9
4/17/2010
FibeAir ® IP-10
Trunk VS. Access
Agenda
2. Access Port
3. Trunk Port
5. General Guidelines
Page 207 1
4/17/2010
Access Port
• Ingress
g traffic is expected to be Untagged,
gg e.g.
g – no VLAN
information exists within the received Ethernet frame
• All frames that are received through this port are tagged with
default VLAN (VID + P bits)
• All frames that exit through this port towards customer devices are
untagged (VLAN is removed)
Page 208 2
4/17/2010
Access Port
L2 ETH SW
Tagging
Port #8
Port #1
Tagged frame
DA SA Type Payload FCS
Page 209 3
4/17/2010
Access Port –
Utagging frames towards customer interfacing ports
Untagging
Port #8
Port #1
Tagged frame
DA SA Type Payload FCS
• The switch can individually tag multiple Access ports with same VID or
unique VID
Tagging
Port #8
Port #1 Port #2
DA SA VLAN TAG = 10 Type Payload FCS
Page 210 4
4/17/2010
• To be able to transmit & receive multiple VLANs, the common port has to
be configured as a Trunk Port
Trunk Port
Port #8
Port #1 Port #2
DA SA VLAN TAG = 10 Type Payload FCS
Trunk Port
Port #8
Port #2
DA SA VLAN TAG = 10 Type Payload FCS
SA VLAN
DA Untagged TAG = 33
frames Type Payload FCS
10 Proprietary and Confidential
Page 211 5
4/17/2010
• A certain VLAN can be extracted out of a Trunk via Access port assigned
with specific VLAN membership (Default VID)
SA
DA Untagged VLAN TAG = 33
frames Type Payload FCS
General guidelines
• Access port can only receive untagged frames from customer device
• Access port can only transmit untagged frames towards customer device
Page 212 6
4/17/2010
2
1
3
Thank You !
training@ceragon.com
training@ceragon com
14
Page 213 7
4/21/2010
Agenda
Page 214 1
4/21/2010
Configuration guidelines
Network #1
C-VLAN 100
S-VLAN 9 C-VLAN 101
Radio Network 1 C-VLAN 102
C-VLAN 103
Ports C-VLAN 100
(PN) S-VLAN 8
Network 2
C-VLAN 101
C-VLAN 102
C-VLAN 103
Network #2
Page 215 2
4/21/2010
Simplified Flow
IP-10
S-VLAN 1000
S-VLAN 222
S-VLAN 1000
S-VLAN 222
PN CN CN
Radio Port
CN-PN-PN-CN
C-VLAN 100
S-VLAN 9 C-VLAN 101
Radio BTS 2 C-VLAN 102
C-VLAN 103
BTS #2:
C-VLAN 100
Ports C-VLAN 100
C-VLAN 101 (PN) S-VLAN 8
BTS 1
C-VLAN 101
C-VLAN 102
C-VLAN 102 C-VLAN 103
C-VLAN 103
CN
CN
CN
BTS #1:
C-VLAN 100 CN
C-VLAN 101
C-VLAN 102
C-VLAN 103
Page 216 3
4/21/2010
CN-PN-PN-PN
C-VLAN 100
S-VLAN 9 C-VLAN 101
Radio BTS 2 C-VLAN 102
C-VLAN 103
BTS #2:
C-VLAN 100
Ports C-VLAN 100
C-VLAN 101 (PN) S-VLAN 8
BTS 1
C-VLAN 101
C-VLAN 102
C-VLAN 102 C-VLAN 103
C-VLAN 103
CN
CN
PN
BTS #1:
C-VLAN 100
C-VLAN 101
Customer Network Provider Network
C-VLAN 102
C-VLAN 103
Page 217 4
4/21/2010
CN Port Configuration
CN Port Configuration
1
3
4
5
Page 218 5
4/21/2010
PN Port Configuration
PN Port Configuration
1
3
6
5
Page 219 6
4/21/2010
• 0x88A8
• 0x8100
7 • 0x9100
• 0x9200
13 Proprietary and Confidential
Page 220 7
4/21/2010
Thank You !
training@ceragon.com
15
Page 221 8
3/7/2010
Agenda
• Student Perquisites
• General Overview
• Limitations
• Switchover Criteria
• In Band Management
• Configuration Example
Page 222 1
3/7/2010
Student Perquisites
General Overview
Ceragon Networks ring solution enhances the RSTP algorithm for ring
topologies, accelerating the failure propagation relative to the regular
RSTP:
• Relations between Root and Designated bridges when ring is converged in the
first time is the same as defined in the standard RSTP. Ring-RSTP itself is
different than “classic” RSTP, as it exploits the topology of the ring, in order to
accelerate convergence.
• The ring is revertible. When the ring is set up, it is converged according to
RSTP definitions. When a failure appears (e.g. LOF is raised), the ring is
converged. When the failure is removed (e.g. LOF is cleared) the ring reverts
back to its original state, still maintaining service disruption limitations.
• RSTP PDUs coming from “Edge” ports are discarded (and not processed or
broadcasted).
4 Proprietary and Confidential
Page 223 2
3/7/2010
2. Ring RSTP can be activated only in “Managed Switch” application, and is not
available in any other switch application (“Single Pipe” or “Metro”).
1. Node/Site Type A:
• The site is connected to the ring with one Radio interface (e.g. East) and one
Line interface (e.g. West).
• The site contains only one IP-10 IDU. The Radio interface towards one
direction (e.g. East), and one of the Gigabit (Copper or Optical) interfaces,
towards the second direction (e.g. West).
• Other line interfaces are in “edge” mode, meaning, they are user interfaces,
and are not part of the ring itself.
Page 224 3
3/7/2010
2. Node/Site Type B:
• The site is connected with Radios to both directions of the ring (e.g. East &
West).
• Site contains two IDUs. Each IDU support the Radio in one direction
• One IDU runs with the “Ring RSTP”, and the second
runs in “Single pipe” mode.
• Radio LOF
• Link ID mismatch.
• Line LOC
Page 225 4
3/7/2010
• “Single Pipe” nodes will be connected with external Ethernet cable to the
“Managed Switch” for management.
Page 226 5
3/7/2010
Page 227 6
3/7/2010
Configuration
Example
13 Proprietary and Confidential
3 4 5 6 7 3 4 5 6 7
Pipe (slot #2) Pipe (slot #3)
3 4 5 6 7 3 4 5 6 7
MNG (slot #1) Pipe (slot #2)
3 4 5 6 7
MNG (slot #1)
X Site #3
3 4 5 6 7
Pipe (slot #2)
3 4 5 6 7
MNG (slot #1)
Page 228 7
3/7/2010
3 4 5 6 7 3 4 5 6 7
Pipe (slot #2) Pipe (slot #3)
3 4 5 6 7 3 4 5 6 7
MNG (slot #1) Pipe (slot #2)
3 4 5 6 7
MNG (slot #1)
X Site #3
3 4 5 6 7
Pipe (slot #2)
3 4 5 6 7
MNG (slot #1)
• Configure Port 3 (& port 4 of site #2) of Main units as trunks members of VID 200
to transport the management packets
15 Proprietary and Confidential
3 4 5 6 7 3 4 5 6 7
Pipe (slot #2) Pipe (slot #3)
3 4 5 6 7 3 4 5 6 7
MNG (slot #1) Pipe (slot #2)
3 4 5 6 7
MNG (slot #1)
Site #3
3 4 5 6 7
Pipe (slot #2)
3 4 5 6 7
MNG (slot #1)
Page 229 8
3/7/2010
• Use the EMS to learn which switch is the Root Bridge and which ports are the Root Ports.
• Verify that the ring is set up properly (one Root)
• Identify the Edge Ports and Non-Edge ports in your scheme and make sure they are
configured the same in your setup
Page 230 9
3/7/2010
• Identify the Edge Ports and Non-Edge ports in your scheme and make sure they are
configured the same in your setup
Page 231 10
3/7/2010
• Disconnect a radio link and make sure PING to all Main units is maintained
• Restore connectivity.
• Disconnect a different radio link and make sure PING to all Main units is maintained
Thank You !
training@ceragon.com
22
Page 232 11
6/1/2010
Agenda
• Introduction
• QoS in IP-10
Page 233 1
6/1/2010
Introduction (1)
IP-10 is more than a Radio:
Introduction (2)
MW
Radio
Page 234 2
6/1/2010
Understanding QoS
Page 235 3
6/1/2010
GE
WiMAX / 4G / LTE
Cellular site
WiMAX
STM-1 / OC-3
Ceragon Ceragon
Hub / Aggregation site
TDM
E1/T1
Fundamental Fact
Static
Dynamic WWW
WWW
Multimedia
emails
FTP
Who’s first?
8 Proprietary and Confidential
Page 236 4
6/1/2010
Static
Dynamic WWW
What is the BW requirement per service ? WWW
• Data
D t requires
i lless th
than video
id
• FTP requires more than emails…
emails
What is the delay sensitivity of each service? FTP
• Delayed Voice is inacceptable…
• FTP can tolerate delays
Skype
Your 2nd assignment is grouping services into SLAs:
• Video & Multimedia – Low Services (Best Effort)
• FTP – Moderate Service
• Skype – Highest Service
QoS in IP-10
Page 237 5
6/1/2010
QoS Process
Q4 Q4
25
10 50
Q1 Q3
Q2
Page 238 6
6/1/2010
Ingress Egress
port port
Customer Provider
Network Network
Egress Ingress
port port
Customer Provider
Network Network
Ingress
Egress
Radio Radio
Egress
Ingress
Page 239 7
6/1/2010
FE Max. 100Mbps
Rate
25 Discard
Max. Allowed
10 50 R
Rate
t
Pass
Actual
Customer
Traffic
Time
Using Queues
Every port of the L2 switch examines the ingress traffic and then it sorts it in a
buffer according to classification criteria
Users can configure up to 4 queues where Q4 has the max. priority and Q1
has the lowest priority
Q4 High
Q3
Q2
Q1 Low
Page 240 8
6/1/2010
Using Queuing
Scheduling (1)
Once the queues are filled with information, we need to empty them
Round-Robin:
Emptying cycle is fixed – all queues are treated equally
Q4 High
Q3
Q4 Q3
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
Q2 Q1 Q2
Pro: no “queue starvation”
Q1 Low Con: no prioritization
Page 241 9
6/1/2010
Scheduling (2)
Weighted Round-Robin:
Emptying cycle is configurable – every queue can be given specific weight
Q4 High
Q4 Q4
Q3
Q3 Q4 Q4 Q1 Q2 Q3 Q4 Q4
Q1 Q3
Q2
Q2
Pro: no “queue starvation”
Q1 Low
Scheduling (3)
4th Strict Priority:
Q4 High
Q3 Q1 Q3
Q3 Q4 Q4 Q1 Q2 Q3 Q4 Q4
Q2 Q2
Pro: Optimized Prioritization
Q1 Low Con: “Queue starvation”
Page 242 10
6/1/2010
Scheduling (4)
All Strict Priority:
The switch will empty a queue as long as the higher queue is empty
Q4 High
Q3
Q3 Q4 Q4 Q1 Q2 Q3 Q4 Q4
Q2
Shaping
Bursts beyond a EIR (Excessive Information Rate) can be buffered and
retransmitted when capacity frees up, and only when shaping buffers are full
will packets be dropped.
Page 243 11
6/1/2010
Possible Scenarios
No need for
f
Ingress Queuing
Radio Radio
Possible Scenarios
Ingress Queuing is
required in port 8
Radio Radio
Page 244 12
6/1/2010
Thank You !
training@ceragon.com
training@ceragon com
25
Page 245 13
3/7/2010
Perquisites
• Introduction to Ethernet
• 802.1p/q
• QoS (Concept)
Page 246 1
3/7/2010
Agenda
• Introduction
• Process Review
• Basic Configurations
Introduction (2)
In this presentation we shall focus on the L2 ETH switch:
• Traffic shaping
Page 247 2
3/7/2010
Page 248 3
3/7/2010
Page 249 4
3/7/2010
Process Review
25
10 50
Rate Limit
Page 250 5
3/7/2010
Queuing
Q4 Q4
Q1 Q3
Q2
Scheduling
Page 251 6
3/7/2010
Shaping
Basic Configurations
Page 252 7
3/7/2010
Page 253 8
3/7/2010
Page 254 9
3/7/2010
Page 255 10
3/7/2010
Frames with MAC that do not comply to the table will be classified by the 2nd &
3rd classifiers
21 Proprietary and Confidential
Page 256 11
3/7/2010
Page 257 12
3/7/2010
Frames with VID that do not comply to the table will be classified by the 3rd
classifier
26 Proprietary and Confidential
Page 258 13
3/7/2010
7. Egress Shaper
• Reducing the egress rate to a value between 64kbps and 1Mbps requires
setting it in steps of 64kbps
• Reducing the egress rate to a value between 1Mbps and 100Mbps requires
setting it in steps of 1Mbps
• Reducing the egress rate to a value between 100Mbps and 1Gbps requires
setting it in steps of 10Mbps
Thank You !
training@ceragon.com
28
Page 259 14
3/7/2010
Agenda
• Queuing + Re-Map
Page 260 1
3/7/2010
• Can be used to guaranty certain Customer priorities are reserved for specific
purposes
P-Bit Service P-Bit* Service
0-2 Video 0-5 Best
3–4 Data Effort
L2 Switch
Customer (IP-10) Provider
network network
Page 261 2
3/7/2010
Ingress
Tagged
frame Queuing
Ingress Egress Egress
VID P-bit according VID P-bit
Rate Limit Scheduler Shaper
to classifier
Page 262 3
3/7/2010
Conditional Classification
Page 263 4
3/7/2010
Otherwise the switch will apply the Default Configuration (Queue number).
Otherwise the switch will apply the Default Configuration (Queue number).
Page 264 5
3/7/2010
As long as the ingress frames comply to the higher conditions, the system will
not check lower conditions (Classifiers)
If higher condition is not matched, the system will proceed to the lower
condition and so on…
Otherwise –
2nd criteria: VLAN ID
100 Highest
If ingress VID does not qualify (100 or 200)
100 or 200 100 Highest
then skip to - 100 Highest
100 Highest
200 Lowest
Audit VLAN P-bits Ingress
VID = ?
frames 3rd criteria: P-Tag
7 Highest
6
3
Different than 2
100 or 200
0 Lowest
Page 265 6
3/7/2010
Thank You !
training@ceragon.com
13
Page 266 7
6/10/2010
FibeAir ®IP‐10
Commissioning the Radio Link
Page 267 1
6/10/2010
LINK ID
# 101
# 101
# 102
“Link ID
Mismatch”
# 101
“Link ID Mismatch”
Page 268 2
6/10/2010
# 101
# 101
# 102
“Link ID
Mismatch”
# 101
“Link ID Mismatch”
ATPC
Page 269 3
6/10/2010
Main Lobe
Side Lobe
In ATPC, each node builds a model for each of its neighbors, describing the
correlation between transmission power and link quality.
Page 270 4
6/10/2010
2. Set reference RSL (min. possible RSL to maintain the radio link)
3. ATPC on both ends establish a Feedback Channel through the radio link (1byte)
5. Power reduction stops when RSL in remote receiver reaches Ref. level
Page 271 5
6/10/2010
ATPC ON =
Reduced Power, cost & long-term maintenance
Monitored RSL: -60 dBm (before 53) Monitored RSL: -63 dBm (before 56)
MRMC Scripts
Page 272 6
6/10/2010
2 Non
2. N ACM scripts
i t ((old)
ld) are still
till available
il bl tto supportt N
Non-ACM
ACM radios
di
Page 273 7
6/10/2010
In other words, when link suffers signal degradation, modulation may change from
256QAM to QPSK. However, Max. power will be limited to the value corresponding as
Max. TX in 256QAM.
Page 274 8
6/10/2010
Signal Degradation
= Lower bit/symbol
Signal Degradation
= Lower bit/symbol
Page 275 9
6/10/2010
• Class 2
• Class 4
• Class 5B
• Class 6A
• FCC
RFU C should
RFU-C h ld h i 2.01
have version 2 01 (or
( hi h ) ffor proper ffunctionality
higher) ti lit off
“Adaptive TX Power” feature.
The Effective Isotropic Radiated Power (EIRP) is the apparent power transmitted towards the
receiver assuming that the signal power is radiated equally in all directions
Configuration
Page 276 10
6/10/2010
Spectrum Mask
FQ spacing (gap) between channels
Monitored transmission power
Monitored received signal
Monitored Mean Square Error
Required value = zero
Enable / Disable
Min. target RSL (local)
Enable = no transmission
Value depends on MRMC settings
Page 277 11
6/10/2010
Remote Un-Mute
Simplified scheme
Sit B is
Site i NOT transmitting
t itti
Site A is
transmitting
Site B
Site A
24 Proprietary and Confidential
Page 278 12
6/10/2010
Radio Thresholds
MRMC Configuration
Page 279 13
6/10/2010
MAX. Capacity
(w/out compression)
Spectrum
Mask
ACM is on
Spectrum
Class Type
Page 280 14
6/10/2010
Thank You !
training@ceragon.com
training@ceragon com
29
Page 281 15
9/19/2010
FibeAir RFU-HP
Green Mode
Page 282 1
9/19/2010
The HP Radios
Single RX /
1500HP
Dual RX X
RFU‐HP Single RX
Single RX /
RFU‐A
Dual RX
Please note –
ATPC:
• Used to reduce interference to other radios in a dense MW
environment
Green Mode:
• Green Mode is environmentally friendly
• Saves OPEX and CAPEX through lower power consumption
• Once fading becomes severe, acts like ATPC
Page 283 2
9/19/2010
Monitored TX Consumed
Power State
Power power [W]
Normal ATPC
5 dB
15
10
0
RX: ‐41dBm
Reference level: ‐40dBm
Page 284 3
9/19/2010
15
10
5
0 dB
RX: ‐47dBm
‐37dBm
‐42dBm
‐52dBm
Green level: ‐50dBm
50dBm
15 dB
RX: ‐50dBm
‐52dBm
Green level: -50dBm
50dBm
Page 285 4
9/19/2010
Thank You!
training@ceragon.com
Page 286 5
3/7/2010
Agenda
• Ethernet Interfaces
• TDM Interfaces
• AIS Detection
• AIS Signaling (STM-1)
• STM-1 Interface
• Auxiliary Channels
• Wayside Channel (Various Configurations)
Page 287 1
3/7/2010
• Switch Configuration
• Trunk VS. Access
• Metro Switch Configuration
• QoS Configuration
Page 288 2
3/7/2010
Supported PHYs:
• E1
• DS1
Dynamic allocation:
Radio bandwidth (which may vary in ACM) is automatically allocated in the
following order:
Page 289 3
3/7/2010
• Signal failure is generated at the corresponding trail – this will cause the
far end not to receive a signal (including trail ID indications) and the trail
status to show “signal failure” and “trail ID mismatch”.
Page 290 4
3/7/2010
Page 291 5
3/7/2010
“111111111” “111111111”
Page 292 6
3/7/2010
Auxiliary Interfaces
WSC Interface
• WSC interface is limited to 1628 bytes.
• 2.048Mbps (Wide) or 64Kbps (Narrow)
• Consumes BW from the total link BW
On both local & remote units, Wayside channel will be connected to management port
(using cross Ethernet cable).
Page 293 7
3/7/2010
One port for local management, and 2nd port that will be connected to Wayside port.
Page 294 8
3/7/2010
Thank You !
training@ceragon.com
18
Page 295 9
9/13/2010
Introduction
Page 296 1
9/13/2010
• Individual E1/T1 trails will be protected by defining two separate trails, with the same
end-points, which are routed through two different paths in the network
• The end-points may be line interfaces or radio VCs, so partial path protection can
be p
provided for a trail in a network where full p
path redundancy
y topology
p gy is not
available
Main Path
Protective Path
Page 297 2
9/13/2010
Rear
Page 298 3
9/13/2010
Page 299 4
9/13/2010
• The main unit performs the cross-connect, switching and management functions for
all the units in the node
• Mandatory “active” main unit can be located in any of the 2 slots
• Optional “standby” main unit can be installed in other slot
• Switchover time <50msecs for all traffic affecting functions
Integrated
g Ethernet Switching
g
Native2
1+0
Integrated
g Ethernet Switching
g E
E
Integrated TDM cross-connect E Native2
E 2+0/XPIC
M Main unit
M
E
Expansion unit M Native2
1+1 HSB
Page 300 5
9/13/2010
2 All Trails
2. T il are transported
t t d through
th h main
i unit(s)
it( )
4. T-Cards (TDM / SDH) are not hot-swappable, do not extract / insert card
when IDU is powered up
Page 301 6
9/13/2010
• Radio to Line
• Line to Radio
• Radio to Radio
9 Maximum
9. M i b off T
number il per R
Trails di = 84
Radio
IP‐10 Bypass
site Protected Trail
(Automatic)
IP‐10
Trail starts here:
For SNCP we shall
need to define 3
Radio Link interfaces
Page 302 7
9/13/2010
2 IP‐10
The Trail Start/End points should
be configured first (interface #1) 3
IP‐10 Bypass
site
Interfaces #2 and #3 can be
configured in a random order
Protected Trail
(Automatic)
2 3
IP‐10
Page 303 8
9/13/2010
Page 304 9
9/13/2010
• PDH to PDH
• PDH to Radio (above)
• PDH to SDH
• SDH to Radio
• SDH to Radio
• Radio to SDH
• Radio to PDH
Page 305 10
9/13/2010
Page 306 11
9/13/2010
• Enable Protection when you configure the Trails (excluding Bypass Nodes)
PDH interface
IP‐10
Bypass
Node IP‐10
IP‐10
SDH interface
Page 307 12
9/13/2010
1st Node
PDH interface
IP‐10
IP‐10
Bypass
site
SDH iinterface
t f #1
Bypass Node
PDH interface
Radio CH #48
IP‐10
Bypass IP‐10
Node
Radio CH #1
IP‐10
SDH iinterface
t f
Page 308 13
9/13/2010
3rd Node
PDH interface
Radio CH #48
IP‐10
Bypass IP‐10
site Radio CH #26
IP‐10
SDH interface
Page 309 14
9/13/2010
• Ethernet L2 capacity - Total bit rate of net Ethernet frames running over
the Ethernet user port. Taking into account the Ethernet frame without the
IFG and preamble fields.
• Radio throughput
g p - Total bit rate supported
pp by
y the radio link running
g in a
specific channel/modulation including radio frame overhead, etc.
3.5 MHz
P fil
Profile M d l ti
Modulation Mi i
Minimum M # off Ethernet
Max Eth t capacity
it Eth
Ethernett L2 Frames per
F R di
Radio
required capacity supported (Mbps) capacity (Mbps) seconds Throughput
license E1s (Mbps)
2 16 QAM 10 4 13.60 10.36 20233.77 10.50
4 64 QAM 25 6 20.14 15.35 29974.03 15.00
7 MHz
Profile Modulation Minimum Max # of Ethernet capacity Ethernet L2 Frames per Radio
required capacity supported (Mbps) capacity (Mbps) seconds Throughput
license E1s (Mbps)
0 QPSK 10 4 13 42
13.42 10 23
10.23 19976 45
19976.45 10 38
10.38
1 8 PSK 25 6 20.18 15.38 30034.94 15.03
2 16 QAM 25 8 27.87 21.24 41475.26 20.31
3 32 QAM 25 10 34.48 26.27 51304.87 24.85
4 64 QAM 25 12 40.44 30.81 60175.21 28.95
5 128 QAM 50 13 46.60 35.50 69339.64 33.19
6 256 QAM 50 16 54.53 41.55 81151.77 38.64
7 256 QAM 50 17 57.38 43.72 85389.21 40.60
Page 310 15
9/13/2010
14 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
required capacity support E1s (Mbps) capacity (Mbps) seconds Throughput
license (Mbps)
0 QPSK 25 8 28.90 22.02 43001.18 21.02
1 8 PSK 25 12 40.90 31.16 60857.98 29.27
2 16 QAM 50 18 60.36 45.99 89823.89 42.65
3 32 QAM 50 20 70.35 53.60 104693.80 49.52
4 64 QAM 50 24 81.78 62.31 121693.09 57.37
5 128 QAM 100 29 98.43 74.99 146471.17 68.82
6 256 QAM 100 34 115.15 87.73 171347.98 80.31
7 256 QAM 100 37 124.52 94.87 185297.74 86.76
28 MHz
Profile Modulation Minimum required Number of Ethernet capacity Ethernet L2 Frames per Radio
capacity
it lilicense supportt E1s
E1 (Mb )
(Mbps) capacity
it (Mb
(Mbps)) seconds
d Throughput
Th h t
(Mbps)
0 QPSK 50 17 57.86 44.08 86099.43 40.93
1 8 PSK 50 23 77.86 59.32 115860.75 54.68
2 16 QAM 100 33 111.32 84.81 165648.63 77.68
3 32 QAM 100 44 150.76 114.87 224346.79 104.80
4 64 QAM 150 55 187.55 142.90 279093.55 130.09
5 128 QAM 150 68 228.81 174.33 340488.46 158.46
6 256 QAM 200 76 254.71 194.07 379034.79 176.27
7 256 QAM 200 80 268.45 204.53 399476.94 185.71
40 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
required capacity support E1s (Mbps) capacity (Mbps) seconds Throughput
license (Mbps)
0 QPSK 50 23 79 64
79.64 60 68
60.68 118506 13
118506.13 55 90
55.90
1 8 PSK 100 35 119.11 90.75 177239.65 83.04
2 16 QAM 100 51 174.14 132.68 259136.72 120.87
3 32 QAM 150 65 218.49 166.47 325132.27 151.36
4 64 QAM 150 81 273.67 208.51 407254.05 189.30
5 128 QAM 200 84 305.49 232.76 454605.63 211.18
6 256 QAM 200 84 346.84 264.26 516135.41 239.61
7 256 QAM 300 84 369.96 281.87 550529.12 255.50
56 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
i d capacity
required it supportt E1s
E1 (Mb )
(Mbps) it (Mb
capacity (Mbps)) d
seconds Th h t
Throughput
license (Mbps)
0 QPSK 100 32 108.86 82.94 161994.37 75.99
1 8 PSK 100 48 163.37 124.48 243116.10 113.47
2 16 QAM 150 64 216.60 165.03 322318.52 150.06
3 32 QAM 200 84 288.50 219.81 429314.58 199.50
4 64 QAM 300 84 358.49 273.14 533473.73 247.62
5 128 QAM 300 84 430.43 327.95 640527.34 297.08
6 256 QAM 400 84 489.77 373.16 728824.51 337.87
7 256 QAM 400 84 531.82 405.20 791403.86 366.78
32
Proprietary and Confidential
Page 311 16
9/13/2010
2 8 PSK 10 19 – 27 2 8 PSK 22 39 - 56
3 16 QAM 16 28 – 40 3 16 QAM 32 57 - 81
4 32 QAM 18 32 – 46 4 32 QAM 38 67 - 96
Thank You !
training@ceragon.com
training@ceragon com
34
Page 312 17
4/30/2010
Agenda
• Introduction
• Interfacing IP-10 with external devices
• Configuration VS
VS. Functionality
• Dead Lock Example
• ASP in Managed / Metro Mode
Page 313 1
4/30/2010
Introduction
“Automatic State Propagation” ("GigE Tx mute override") enables propagation of radio
failures back to the line, to improve the recovery performance of resiliency protocols
(such as xSTP).
The feature allows the user to configure which criteria will force GbE port (or ports in case
of “remote fault”) to be muted / shut down, in order to allow the network find alternative
paths.
Radio LOF
Need to find
alternative path
Page 314 2
4/30/2010
TX RX
RX TX
Page 315 3
4/30/2010
TX RX LOC
RX TX
TX RX LOC
RX X TX
Page 316 4
4/30/2010
TX RX LOC
LOC
RX X TX
TX LOC
X RX
LOC
RX X TX
Page 317 5
4/30/2010
11
1 8 8 1
Actions: Actions:
Mute port 1 (GbE ‐SFP) Mute port 1 (GbE ‐SFP)
Page 318 6
4/30/2010
8 8
Actions: Actions:
Shut down Elec. Shut down Elec.
port port
1. ASP Enabled
2. ACM profile threshold
3. Excessive BER enabled
Portt is
P i logically
l i ll closed
l dbbutt nott
shut down
LOC will not trigger port shut Remote LOC will not trigger
down (it will not be possible to port shut down (it will not be
enable the port when LOC is possible to enable the port
cleared) when LOC is cleared)
Page 319 7
4/30/2010
15
Page 320 8
4/30/2010
1. ASP Enabled
2. ACM profile threshold
3. Excessive BER enabled
Local Criteria:
• Radio LOF
• LINK ID Mismatch
• Excessive BER
• ACM profile is below threshold
8 8
Actions:
Shut down Radio
1. ASP Enabled
2. ACM profile threshold
3. Excessive BER enabled
Local criteria: 8 8
• GbE LOC Actions:
No action taken
Shut down Radio
Page 321 9
4/30/2010
Thank You !
training@ceragon.com
training@ceragon com
19
Page 322 10
Link Aggregation
(IEEE 802.3ad)
Agenda
Agenda
Definition
Advantages
Feature Review
Applications
IEEE Definition:
• Traffic
T ffi sentt tto th
the ports
t iin such
h a group iis di
distributed
t ib t d th
through
h
a load balancing function
Advantages
g
The capacity of the multiple links is combined into one logical link.
100 Mbps
2. Improved Resiliency
In case of a failed link, remaining links take over utilization of new available BW
When multiple ports are allocated between two ETH switches, broadcast storms are
created due to p
physical
y loops.
p STP is required
q to eliminate loops
p by
y blocking
g the redundant
port.
When multiple ports are allocated between 2 Routers, Routing Protocols are required to
control traffic paths.
With LA – STP or routing protocols are not needed, therefore, less processing is involved.
4. Reduced Cost
For sites with limited IP address space that nevertheless require large amounts of
bandwidth, you need only one IP address for a large aggregation of interfaces.
For sites that need to hide the existence of internal interfaces, the IP address of
the aggregation hides its interfaces from external applications.
Multiple
Interfaces
Single
Interface
Customer Public
Network Network
9 Proprietary and Confidential
Feature Review
Two methods are available for Link Aggregation Group traffic distribution:
1. Simple XOR:
In this method the 3 LSBs of DA and SA are XORed and the result is used to select
one of the ports in the group.
2. Hash (default):
In this method the hash function (used by the traffic switch for address table lookups)
is used to select one of the ports in the group.
Stream MAC (HEX) Last 3 bits XOR result Assigned LAG Port
SA ‐> 00:20:8f:0a:02:01 001
000 (0) Link #1
‐ > DA 00:20:8f:0a:01:01 001
SA ‐> 00:20:8f:0a:02:02 010
‐ > DA 00:20:8f:0a:01:02 010
000 (0) Link #1
SA ‐> 00:20:8f:0a:02:03 011
‐ > DA 00:20:8f:0a:01:03 011
000 (0) Link #1
SA ‐>> 00:20:8f:0b:e1:03 011
‐ > DA
001 (1) Link #2
00:20:8f:0a:e1:04 010
SA ‐> 00:20:8f:0b:e1:03 010
‐ > DA 00:20:8f:0a:e1:01 101
010 (2) Link #3
SA ‐> 00:20:8f:0b:e1:07 111
‐ > DA 00:20:8f:0a:e1:04 100
011 (3) Link #4
8. LAGs are virtual ports that do not permanently exist in the system
10. The LAG will initially receive default values for these parameters
GbE FE GbE FE
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
GbE FE GbE FE
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
GbE
1 2 3 4 5 6 7 8 PHY
Multiple FE
ports as a LAG
GbE
PHY Port #2 and Radio
form a LAG
1 2 3 4 5 6 7 8
Static LAG
3rd party
Switch or Router
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
3rd party
No need for LAG
Switch or Router
1 2 3 4 5 6 7 8
Static LAG 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
3rd party
Switch or Router Static LAG
Static LAG 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
3rd party
Switch or Router Static LAG
• Any failure in the local GbE interfaces will be handled by the link aggregation
mechanism without triggering switch-over to the “back-up” IP-10 unit!
1 2 3 4 5 6 7 8 50%
P
1 2 3 4 5 6 7 8
S
GbE 50%
PHY
Port #2 and Radio
form a LAG
Traffic injected via GbE port #1 is distributed evenly between Port #2 & Port #8
Port #2 is linked to a Pipe IDU, hence, a Multi-Radio system is achieved:
GbE port #1 = (50% via Radio #1) + (50% via Radio #2)
1 2 3 4 5 6 7 8
S
1 2 3 4 5 6 7 8
S
GbE X
50% 100%
PHY
100%
To improve system resiliency, Automatic State Propagation can shut down the
LAG interface when ACM degrades below a pre-determined profile.
Thank You !
training@ceragon.com
Agenda
Agenda
Guidelines Review
EMS Configuration
Using PM (RMON)
8. LAGs are virtual ports that do not permanently exist in the system
10. The LAG will initially receive default values for these parameters
GbE FE GbE FE
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
GbE FE GbE FE
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Please note - ports with CFM MEP/MIPs will not be added to a LAG (which may
have its own MEP/MIPs).
• Admin status
• Flow control
• Ingress rate limiting Policer name
• Shaper (egress rate limiting)
• Peer port parameters
• MAC address
• IP address
• Slot ID
• Port number
• Description
:
• Ports removed from a LAG will keep the existing port parameters, but will
be initially disabled in order to prevent loops.
• In addition, when the last port is removed from a LAG, the LAG will be
deleted.
EMS Configuration
g
Open page:
Configuration
g / Ethernet Switch
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Data stream
Data stream
Proprietary and Confidential
Please note:
Slight differences may appear
since EMS is a web based
application and data is
accumulating
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
Data stream
Proprietary and Confidential
+
=
FibeAir ® IP‐10G
HSB / 1+1 Protection
Agenda
General Guidelines
Protection Panel
Floating IP
Troubleshooting
Page 346 1
8/12/2010
General Guidelines
2. When a switchover occurs, the Active IDU becomes “Standby” and the
“Standby”
Standby IDU becomes “Active”
Active
3. Accessing a “Mate” IDU can only be done via the Active IDU
6. ETH Cross Cable (Protection Cable) is used to connect the protection ports
of both IDUs:
Protection Panel
high low
Active Active
Coupler Coupler
Mate Mate
high low
Page 347 2
8/12/2010
External Protection
high low
Coupler Coupler
high low
Shelf Protection
When enabling a Shelf Protection, the following rules should be applied:
6 ‐ Mate
5 ‐ Active Standalone
4 ‐Mate
Example:
Standalone
3 ‐ Active
2 ‐Mate
Standalone
1‐Active
Page 348 3
8/12/2010
Floating IP
The Floating IP address feature is meant to provide a single IP address that will
always give direct access to the current active main unit.
1. The Floating IP and Unique IDU IPs must be in the same subnet
2
2. The Floating IP and Unique IDU IPs are user
user-configurable
configurable
3. The Floating IP is copied from Active to Mate (following “Copy to Mate” command)
4. When Protection is applied, the Floating IP is assigned to the STBY IDU which
becomes the Active
5. The extension IPs are irrelevant (unseen by network)
6. OSS & NMS can access all IDUs (Main and Extension) via SNMP
7. Alternatively, users may access any of the units using their local IP addresses
IDU
IDU
192.168.1.75
192.168.1.72
IDU
192.168.1.71
192.168.1.100
Page 349 4
8/12/2010
EMS GUI
EMS GUI
1. Configure unique IPs to slot 1 and slot 2 (when not in installed in shelf)
2. You may use a floating IP
3. Make sure all IPs are in the same subnet
Page 350 5
8/12/2010
EMS GUI
EMS GUI
Protection
mode status
Page 351 6
8/12/2010
EMS GUI
EMS GUI
To force a switchover
regardless to 2nd IDU Admin State Lock
qualifying status –
change to “ON” and click
“Apply”
Page 352 7
8/12/2010
EMS GUI
To request a switchover –
click here.
EMS GUI
Please note –
The following parameters are not copied :
Page 353 8
8/12/2010
2 When
2. Wh IDU
IDUs complete
l t th
the b
booting
ti sequence, verify:
if
Note:
The IDU, which is connected to the ODU fed by the
lower attenuation channel of the RF coupler, is the
IDU that should be selected as "Active“.
18 Proprietary and Confidential
Page 354 9
8/12/2010
ODU ODU
5. Lock Protection on both IDUs (to avoid unnecessary switchover when 2nd IDU
is enabled)
ODU ODU
ODU ODU
ODU ODU
ODU ODU
ODU ODU
PC
ODU ODU
Page 355 10
8/12/2010
15. In Active IDU: click “Copy to Mate” and verify Mate is restarting
Page 356 11
8/12/2010
1. Assuming 1st link operates well, configure the 2nd IDUs to match
Active IDUs:
Active Link:
ODU ODU
3 Lock
3. L kPProtection
t ti on b
both
th A
Active
ti IDU
IDUs (to avoid unnecessary switchover
when 2nd IDU is enabled)
4. Install 2nd IDU in each site (verify TX is muted before physical installation)
ODU ODU
ODU ODU
Page 357 12
8/12/2010
ODU ODU
ODU ODU
13. In Active IDU: click “Copy to Mate” and verify Mate is restarting
Page 358 13
8/12/2010
Troubleshooting Protection
Common issues followed by CLI commands
Troubleshooting
Alarm / Error Probable Cause / Workaround
C commands to verify
Use CLI f this IDU is in S
STBY mode, iff
“Main IDU does not respond to PING”
so, use CLI to recover IDU
Page 359 14
8/12/2010
General commands:
IP-10:/> cd platform/mate-idu
Page 360 15
8/12/2010
IP-10:/platform/mate-idu> manual-switch-cmd
IP-10:/platform/mate-idu> copy-to-mate-cmd
Post-Configuration Changes
Page 361 16
8/12/2010
Thank You !
training@ceragon.com
training@ceragon com
33
Page 362 17
CFM (OAM IEEE 802.1ag)
Connectivity Fault Management
Perquisites
• CFM: Why?
• Preliminary configuration
• Setup Review
• Configuration Flow
• Configuration Review
• Manual PING
• Manual Linktrace
• Automatic Linktrace
CFM: WHY ?
• By definition, L3 IP or L2 ETH are Connection-less networks
IN ? IN
Connection-Less Connection-Oriented
4 Proprietary and Confidential
• Such technologies are too expensive and sometimes not feasible for Mobile
Operators / Mobile Backhaul solutions
Connection-Oriented
5 Proprietary and Confidential
Preliminary Configuration
1. Make sure you define the required VLAN IDs in the Switch DB prior to OAM
configuration
4. Make sure IP-10 Interfaces are configured according to your Network Criteria
(Trunk / Port VID Membership ).
5. Every CFM interface (including Radio) must be aware of the required VIDs
(Port membership)
6. CFM requires physical connection, therefore – make sure your interfaces are
enabled on both sides (DCE and DTE)
Domain 1 Services:
D1S1:
MEP 1 to MEP 2, Level 3, VLAN 1000
1
D1S2:
MEP 3 to MEP 4, Level 3, VLAN 2000
3
4
Domain 2 Services:
D2S2: 5
MEP 5 to MEP 6, Level 2, VLAN 1000 6
MEP
MIP
7 Proprietary and Confidential
3 Assign MIPs
Creating MAIDs
Click on the Add button to add domains
(use the setup diagram as a reference)
1. Domain Name
2. Level (1 to 7)
3. Association Name
4. VLAN ID
Domains defined…
You should see the following status on your MAID list page (on both IDUs):
If you point your cursor to the “No MEPs” indication LED, you will be notified that MEPs
need to created as well
Defining MEPs
Port #3
MEP ID: 1
Port #3
MEP ID: 2
As you can see, CCM enables auto-learning, hence – both MEPs discover each other
(MAC and remote MEP ID are now known)
New alarms indicate that process of creating the remote MEP is not fully complete
Port #3
Local MEP ID: 1
Remote MEP: 2
Port #3
Local MEP ID: 2
Remote MEP: 1
MEP1
MEP 3
MEP 4
MEP 2
MEP 3 to MEP 4
Level 3
VLAN 2000
MEP 3
MEP 4
MEP 3
MEP 4
MEP 3
MEP 4
MEP 3
MEP 4
“D2S2”
5
6
Local MEP 5
Remote MEP 6
Local MEP 6
Remote MEP 5
Please make a note of the Radio MAC address of each IDU – we shall need it later
00:0A:25:56:27:AC 00:0A:25:56:27:C6
00:0A:25:56:27:C2
Manual Linktrace
To trace an interface , you will need to set the following parameters:
Automatic Linktrace
To enable Auto Linktrace – select the checkbox next to the target Remote MEP
and then click “ADD SELECTED”
Thank You !
training.ceragon.com
44
Agenda
Page 385 1
3/7/2010
RFU RF Loopback
RFU RF LB
RFU RF Loopback
Use it to verify communication from Line to ODU is OK (including ODU)
Page 386 2
3/7/2010
IF Loopback
IDU IF LB
IF Loopback
Use it to verify communication from Line to IF cable is OK
Page 387 3
3/7/2010
Page 388 4
3/7/2010
Tester
Page 389 5
3/7/2010
Page 390 6
3/7/2010
Before you leave the site, make sure that these registers are elapsed (zero)\
In such case, perform the Loopbacks we have just covered to narrow down the
probable causes for the errors
Page 391 7
3/7/2010
Thank You !
training@ceragon.com
15
Page 392 8
3/7/2010
Agenda
1. Configuration File
2. Unit Information File
3. FTP Server
Page 393 1
3/7/2010
Configuration File
The Configuration file stores the following parameters:
• License
• External Alarms
• SNMP Trap Destination
• NTP Server Properties
• Radio properties: Frequency, RSL, TSL, ATPC, etc.
• Switch Mode and database: Port types, VLAN membership, etc.
• Interface Configuration: PDH, TDM, Ethernet Switch
•Trail Configurations
• Service OAM
• Security: user accounts, login properties, etc.
Page 394 2
3/7/2010
Uploading or Downloading the CFG & Unit files requires an FTP Server
You may assign a remote server to host the configuration and unit files
Page 395 3
3/7/2010
Examples for
SW packages
Examples for
CFG & Unit
Files
2
8 Proprietary and Confidential
Page 396 4
3/7/2010
Upload /
Download using
standalone IP-10G
9 Proprietary and Confidential
Page 397 5
3/7/2010
Next step:
Click “Upload Archive” to allow
the IP-10G transferring the
zipped file to your server
Page 398 6
3/7/2010
(Configuration Files)
Page 399 7
3/7/2010
1 2
Page 400 8
3/7/2010
Please note – if the file does not exist in the root directory action will fail !
1 2
17 Proprietary and Confidential
Upload /
Download in
a shelf
18 Proprietary and Confidential
Page 401 9
3/7/2010
2. After creating the CFG files, you need to upload them to your
FTP directory
Page 402 10
3/7/2010
To download a file to a
certain slot, select the
unit number and click
this button
Page 403 11
3/7/2010
Page 404 12
3/7/2010
Page 405 13
3/7/2010
Thank You !
training@ceragon.com
27
Page 406 14
4/21/2010
Agenda
FTP Properties
Standalone SW Download
Standalone SW Upgrade
Page 407 1
4/21/2010
Configure the FTP properties to point to your local server root directory
If you do not have an FTP Server installed locally on your PC, you may
configure an IP address of a remote server.
Page 408 2
4/21/2010
Examples for
SW packages
Page 409 3
4/21/2010
SW Upgrade on a
standalone IP-10G
Page 410 4
4/21/2010
Standalone SW Download
Click on the “Download” button and wait till “Succeeded” message is
displayed (next slide)
Standalone SW Download
Download was successfully completed, you may proceed to upgrade
the IDU
Page 411 5
4/21/2010
Standalone Upgrade
Click on the “Upgrade” button. When upgrades completes successfully,
the IDU will restart automatically.
Page 412 6
4/21/2010
SW Upgrade in a
shelf (Node)
Shelf Configuration
1. Make sure your main unit (Slot 1) is upgraded with the latest version
2. If not, it is recommended to upgrade the main unit as a standalone IDU
3. Verify you are familiar with the slot number(s)
Slot 6
Slot 5
Slot 4
Slot 3
Slot 2
Slot 1
Page 413 7
4/21/2010
Shelf SW Download
Shelf SW Upgrade
Select the target slot and then click the
“Upgrade” button
Please note –
Page 414 8
4/21/2010
Shelf SW Upgrade
Select the target slot and then click the
“Upgrade” button
Please note –
Rollback
VS. Downgrade
Page 415 9
4/21/2010
Rollback
1 2
Upgrade #1 Upgrade #2
Rollback 4 3
Downgrade
Thank You !
training@ceragon.com
20
Page 416 10
3/7/2010
Agenda
• SSH
• HTTPS
• SFTP
• Password
Page 417 1
3/7/2010
Security Configuration
Update first FTP connection
Page 418 2
3/7/2010
HTTPS
In order to manage the system using HTTPS protocol, user should
follow the following steps:
Page 419 3
3/7/2010
The status of the download operation can be monitored. The returned status
values are: “ready”, “in-progress”, “success”, “failed”.
To apply the new certificate, the WEB server should be restarted (“Admin”
privilege). WEB server will be automatically restarted when it is configured to
HTTPS.
Page 420 4
3/7/2010
HTTPS - Activation
Note:
This parameter is NOT copied when “copy to mate” operation is initiated,
for security reasons (unsecured unit should not be able to override security
parameters of secured unit).
• Configuration upload/download,
• Upload the unit info.
• Upload public key.
• Download certificate files.
• SW download
Page 421 5
3/7/2010
USERS,
GROUPS
&
PASSWORD
Proprietary and Confidential
Adding Users
Page 422 6
3/7/2010
Adding Users
Adding Users
Page 423 7
3/7/2010
Changing Password
A valid password should be a mix of upper and lower case letters, digits, and other
characters.
You can use an 8 character long password with characters from at least 3 of these 4
classes. An upper case letter that begins the password and a digit that ends it do not
count towards the number of character classes used.
Changing Password
Good example:
L00pBack – using capital letters, small letters and digits (zeros instead of “O”)
Bad example:
Loopback – missing digits or other characters
Page 424 8
3/7/2010
Thank You !
training@ceragon.com
17
Page 425 9
FibeAir® IP-10
License
Management
Guide
Page 426
Notice
This document contains information that is proprietary to Ceragon Networks Ltd.
No part of this publication may be reproduced, modified, or distributed without prior written
authorization of Ceragon Networks Ltd.
This document is provided as is, without warranty of any kind.
Registered TradeMarks
Ceragon Networks® is a registered trademark of Ceragon Networks Ltd.
FibeAir® is a registered trademark of Ceragon Networks Ltd.
CeraView® is a registered trademark of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
TradeMarks
CeraMapTM, PolyViewTM, EncryptAirTM, ConfigAirTM, CeraMonTM, EtherAirTM, and MicroWave
FiberTM, are trademarks of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
Statement of Conditions
The information contained in this document is subject to change without notice.
Ceragon Networks Ltd. shall not be liable for errors contained herein or for incidental or
consequential damage in connection with the furnishing, performance, or use of this
document or equipment supplied with it.
Information to User
Any changes or modifications of equipment not expressly approved by the manufacturer
could void the user’s authority to operate the equipment and the warranty for such equipment.
Copyright © 2008 by Ceragon Networks Ltd. All rights reserved.
Page 427
Contents
General .......................................................................................................... 1
Settings ............................................................................................................... 23
Page 428
General
This guide explains how to work with the FibeAir® IP-10 web based License Management System.
The system enables authorised users to obtain license-related information and perform license-related
operations.
Getting Started
To start the management application:
2. To log in to the system, enter your user name and password, and then click Login.
Note the following user name rules:
3a. If you enter as an OEM user, the following web page appears:
3b. If you enter as a non-OEM user the following web page appears:
Note that a channel or OEM user can also enter as one of their customers. In this case, the system
identifies the user as a channel/OEM user and will display a drop-down list to enable entry under the
user's name. This will be done to allow operations for devices that the user sent to his/her customers.
When you select an item within a group, the relevant web page will open with the details concerning that
item.
At the top of the web page for the item, a line appears with buttons that you can click to perform a particular
operation.
From within an item web page, you do not have to return to the main web page. Instead, use the tabs at the
top (Devices, Licenses, etc.) to obtain a list of items for the particluar group.
Note that in any web page, you can click Print to send the contents of the page to the printer.
Device List
The list includes all the devices you purchased from Ceragon.
In this page, you can assign the current ID to an end user, using the drop-down list in the Assign to
Customer field.
In the main device list web page, you can click Search to locate a particular device that is
registered in the system.
Select the criteria (filters) you want for the search, and then click Search.
To clear the criteria you selected, click Clear.
In the toolbar, click Import to import a list of devices from an external source.
You will be prompted to locate the file with the device list. Once you locate and select the file, click Import.
The device list file must be a text file with the following columns:
Region /
Device ID Customer Country Link Side
Network
To delete a device, select the device in the list, and click Delete .
The list will be saved in an Excel file with the extension csv (Comma Separated Values).
Generating Keys
To generate license keys for one or more devices, select the devices in the main list by marking the
checkboxes beside them, and click Generate Keys .
In this web page, only the devices you selected will appear.
Capacity Upgrade
License Name in License
Value Description
Type Management Site
3 0 IP10-CAP-010 Feature disabled
3 1 IP10-CAP-025 Radio Cap. Upgrade 10->25 Mbps
3 2 IP10-CAP-050 Radio Cap. Upgrade 10->50 Mbps
3 3 IP10-CAP-100 Radio Cap. Upgrade 10->100 Mbps
3 4 IP10-CAP-150 Radio Cap. Upgrade 10->150 Mbps
3 5 IP10-CAP-200 Radio Cap Upgrade 10->200 Mbps
3 6 IP10-CAP-300 Radio Cap Upgrade 10->300 Mbps
3 7 IP10-CAP-400 Radio Cap Upgrade 10->400 Mbps
3 8 IP10-UPG-025-050 Radio Cap. Upgrade 25->50 Mbps
3 9 IP10-UPG-025-100 Radio Cap. Upgrade 25->100 Mbps
3 10 IP10-UPG-025-150 Radio Cap. Upgrade 25->150 Mbps
3 11 IP10-UPG-025-200 Radio Cap. Upgrade 25->200 Mbps
3 12 IP10-UPG-025-300 Radio Cap Upgrade 25->300 Mbps
3 13 IP10-UPG-025-400 Radio Cap Upgrade 25->400 Mbps
3 14 IP10-UPG-050-100 Radio Cap. Upgrade 50->100 Mbps
3 15 IP10-UPG-050-150 Radio Cap. Upgrade 50->150 Mbps
3 16 IP10-UPG-050-200 Radio Cap. Upgrade 50->200 Mbps
3 17 IP10-UPG-050-300 Radio Cap Upgrade 50->300 Mbps
3 18 IP10-UPG-050-400 Radio Cap Upgrade 50->400 Mbps
3 19 IP10-UPG-100-150 Radio Cap. Upgrade 100->150 Mbps
3 20 IP10-UPG-100-200 Radio Cap. Upgrade 100->200 Mbps
3 21 IP10-UPG-100-300 Radio Cap Upgrade 100->300 Mbps
3 22 IP10-UPG-100-400 Radio Cap Upgrade 100->400 Mbps
3 23 IP10-UPG-150-200 Radio Cap. Upgrade 150->200 Mbps
3 24 IP10-UPG-150-300 Radio Cap Upgrade 150->300 Mbps
3 25 IP10-UPG-150-400 Radio Cap Upgrade 150->400 Mbps
3 26 IP10-UPG-200-300 Radio Cap Upgrade 200->300 Mbps
3 27 IP10-UPG-200-400 Radio Cap Upgrade 200->400 Mbps
3 28 IP10-UPG-300-400 Radio Cap Upgrade 300->400 Mbps
To add a license for which you want to generate a key, select the license in the All Relevant Licenses area
and click Add to add it to the Selected Licenses area.
Important! You can only select one license from each category (ACM, Networking, Capacity Upgrade). If
you select a capacity upgrade license and want to add a different capacity upgrade license, you must first
remove the first capacity upgrade license and then add the other one.
Once you select the licenses you want, click Generate Keys.
After you confirm your selection, the following example web page appears.
For OEM users, you can assign devices to other users by selecting Assign Devices to a Customer in the
main web page Devices group. Or, you can click Assign to Customer at the top of the
page.
In the Select Customer field, use the drop-down list to choose the customer you want to assign the devices
to.
Click Show Available Devices for a list of devices you can choose from.
In the available list of devices, click Filter & Sort to customize the device list, as shown in the following
example page.
After you click Go to generate the list, in the Available Devices list, select the devices you want to assign to
the user, and click Add to add them to the Assigned Devices list.
The device list page will appear with the updated information.
The web page displays all the licenses you currently own.
To search for a particular license, click Search, specify the criteria you want, and click Search again.
Click the number in the Qty Assigned column for a list of licenses assigned to customers.
To add a license for which you want to generate a key, select the license in the All Available Licenses area
and click Add to add it to the Selected Licenses area.
Click Show Relevant Devices for a list of devices associated with the licenses you chose.
Once you select the devices you want, click Generate Keys.
The keys will be generated, as shown in the following example page, and the database will be updated.
For OEM users, you can assign licences to other users by selecting Assign Licenses to a Customer. Or, you
can click the Assign to Customer button at the top of the page.
In the Select Customer field, use the drop-down list to choose the customer you want to assign the licenses
to.
Click Show Available Licenses for a list of licenses you can choose from.
For License Code, click the drop-down list and choose the license specifications.
For Quantity to Assign, enter the amount of licenses you want to assign to that customer. The maximum
quantity is limited to the available quantity for the license you choose.
After you complete the filter options, click Add to add the licenses to the Assigned Licenses list. You can
repeat this procedure more than once to add other license types.
For Quantity to Return, enter the amount of unused licenses you would like to return (if relevant).
A page will appear informing you that the operation was successful, and the main license list will be updated
with the information.
Managing Users
Select the Manage Users item to define users and modify their properties. You can also access this item by
clicking the Settings tab at the top of the page (if it appears).
To delete one or more users, in the user list, mark the checkboxes beside the users you want to delete, and
click Delete . Confirm your choice(s) in the page that appears and the users will be deleted.
In the main Settings page, select the My Profile item to modify your personal information.
The same page appears as that for a new user. Modify the information as desired and click Save.
To generate a report, select Orders Report or Devices & Activations Report in the main web page, or click
the Reports tab at the top of the page (if it appears).
For Order No., you can select All or Between. If you select Between, specify the range of order numbers
you want to include in the report.
For Order Date, you can select All or Between. If you select Between, you will need to specify the range of
dates you want to include in the report.
In the Include field, you can select All for all types of orders, Closed orders only, or Open orders only.
When you are done selecting the report criteria, click Create Report.
For Devices, you can select All or Between. If you select Between, specify the range of device IDs you want
to include in the report.
For Activation Date, you can select All or Between. If you select Between, specify the range of activation
dates you want to include in the report.
When you are done selecting the report criteria, click Create Report.
Page 455
6/13/2010
© CERAGON NETWORKS LTD. Proprietary and Confidential information of Ceragon Networks Ltd
Page 456 1
6/13/2010
© CERAGON NETWORKS LTD. Proprietary and Confidential information of Ceragon Networks Ltd
Page 457 2
6/13/2010
© CERAGON NETWORKS LTD. Proprietary and Confidential information of Ceragon Networks Ltd
© CERAGON NETWORKS LTD. Proprietary and Confidential information of Ceragon Networks Ltd
Page 458 3
6/13/2010
IP IP
protection classes
55 – What does that mean ?
First Characteristics Numeral IP XY - Foreign Bodies Protection, Solids
Index
Protection against
Protection against solid objects (foreign bodies)
Human/Tool Contact
0 No special protection
1 Back of hand, Fist Large foreign bodies, diam. >50mm
2 Finger Medium-sized foreign bodies, diam. >12
3
Tools and wires etc with a
Small foreign bodies, diam. >2.5mm
thickness >2.5mm
4
Tools and wires etc with a
Granular foreign
g bodies,, diam. >1mm
thickness >1mm
5
Complete protection, Dust protected; dust deposits are permitted, but their
(limited ingress permitted) volume must not affect the function of the unit.
7
© CERAGON NETWORKS LTD. Proprietary and Confidential information of Ceragon Networks Ltd
IP IP
protection classes
55 – What does that mean ?
8
© CERAGON NETWORKS LTD. Proprietary and Confidential information of Ceragon Networks Ltd
Page 459 4
6/13/2010
• General Dimensions
• H: 18.5 in / 47 cm
• W: 24 in / 61 cm
• D: 17 in / 43 cm
• Weight
• 55 Pounds / 25Kg
© CERAGON NETWORKS LTD. Proprietary and Confidential information of Ceragon Networks Ltd
Accessories list
(*) all IP-10 standard accessories can be used. Enclosure space should be taken into consideration
© CERAGON NETWORKS LTD. Proprietary and Confidential information of Ceragon Networks Ltd
Page 460 5
6/13/2010
Thank You
Page 461 6
RF Units
Ceragon's RF Units were designed with sturdiness, power, simplicity, and compatibility in mind. These advanced systems
provide high-power transmission for short and long distances and can be assembled and installed quickly and easily. In
addition, the RFUs can operate with different FibeAir Indoor Units, depending on the desired configuration.
FibeAir RFUs (Radio Frequency Unit) delivers the maximum capacity over 7-56 MHz channels with configurable
modulation schemes from QPSK to 256QAM. The RFU supports low to high capacities for traditional voice, mission
critical and for emerging Ethernet services, with any mix of interfaces pure Ethernet, Pure TDM or hybrid Ethernet and
TDM interfaces (Native2)
High spectral efficiency is ensured using the same bandwidth for double the capacity, via a single carrier, with vertical
and horizontal polarizations. This feature is implemented by a built-in Cross Polarization Interference Canceller (XPIC)
mechanism.
Ceragon range of RFUs address any network need be it Mobile backhaul, Backbone networks, Rural Broadband or
private networks applications.
RFU-C
FibeAir ® RFU-C
High Performance, small footprint 6-38 GHz Radio Frequency Unit
RFU-C is a fully software configurable, state-of-the-art RFU (Radio Frequency Unit) that supports a broad range of
interfaces and capacities from 10Mbps up to 500Mbps . This innovative and compact unit uses an “on-the-fly” upgrade
method, whereby network operators only buy capacity as needed, savings on initial investments and ongoing OPEX.
With RFU-C traffic capacity throughput and spectral efficiency are optimized with the desired channel bandwidth. For
maximum user choice flexibility, channel bandwidths can be selected together with a range of modulations from QPSK to
256 QAM over 7-56 MHz channels bandwidth
• More power in a Smaller package
Up to 24 dBm for extended distance, enhanced availability, use of smaller antennas
• Broad Capacity range – from Low to High
Delivers 10 Mbps up to 500 Mbps over a single carrier
• Compact, lightweight form factor
Reduces installation and warehousing costs
• Supported configurations:
1+0,1+1,2+0 ,2+2
• Efficient and easy installation
Direct mount installation with different antenna types
Ceragon RF Units 1
Page 462
RFU-HS
FibeAir® RFU-HS
High capacity and High Power, 6-8 GHz Radio Frequency Unit
The FibeAir RFU-HS is a high transmit power RFU (Radio Frequency Unit) for long-haul applications. Based on
Ceragon’s field-proven RFU-HP technology, this RF unit supports capacities of up to 500 Mbps for TDM and IP
interfaces.
With its high transmit power, FibeAir RFU-HS is designed to enable high quality wireless communication in the most
cost-effective manner, reaching over longer distances while enabling the use of smaller antennas.
RFU-HP
FibeAir RFU-HP (1500HP) is a high transmit power RFU (Radio Frequency Unit). Within its unique branching design,
RFU-HP can chain up to five carriers per single antenna port, making it ideal for Trunk or Multi Carrier applications.
Depending on customer preference, the RFU-HP can be installed in either indoor or outdoor configurations.
In order to ensure the maximum flexibility and transmission efficiency, FibeAir RFU-HP includes two receivers and one
transmitter in a single transceiver unit. This design gives it a built-in Diversity capability which increases the reliability of
the link.
Authors:
Ron Nadiv, VP Technology & System Engineering
Ceragon Networks
Page 465
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
1 INTRODUCTION
The demand for new high-speed mobile data services has caused network planners to
re-evaluate backhaul capacity requirements and TDM-to-packet migration plans. The
planning process must take complex network topology considerations into account.
In this paper, we focus on microwave-based backhauling topologies. Selecting the
right topology for wireless backhaul networks is an especially complicated task. Here, we
take a close look at the pros and cons of tree and ring topologies, with special attention
to cost considerations. We provide a case study based on the mobile backhauling
requirements of a large Latin American mobile provider, and explain how the Ceragon
FibeAir® IP-10 microwave backhauling platform provides an ideal solution, offering
excellent adaptability to a variety of topological models.
2 BACKHAUL TOPOLOGIES
There are many parameters to be considered when selecting a network topology, and
even more when it comes to radio networks – where Line-Of-Sight (LOS), rain zone and
other propagation factors are taken into account, as well as infrastructural considerations
such as antenna sites and towers. The common topology choices for radio networks are
trees or rings, or a combination of both. The tree topology in itself is a combination of two
other basic topologies – the chain and the star, as shown below in Figure 1.
Star topologies use a separate link from a hub to each site. This is very simple, but
inefficient for microwave systems, as it requires longer radio links and an LOS for each
link (which may be impossible). The star topology also makes for very poor frequency
reuse, since all the links originate at the same point, and interference is more likely to
occur between links using the same frequency.
In chain topologies, all sites reside on a single path – solving the problems inherent to
star topologies, but resulting in a very sensitive topology in which the first link
malfunction can cause a complete network failure. Therefore, most of the links should
be protected.
Combining the chain and the star yields a tree topology, in which fewer links can cause
major network failures, and only those links require protection schemes. Alternatively,
©
Ceragon Networks - Aug 2010 2
Page 466
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
closing the chain yields the ring, which is the most efficient topology in terms of
protection.
Focusing on the ring and the tree, we will discuss the advantages and disadvantages of
each topology type in the following test case.
3 TEST CASE
Our test case describes a typical radio cluster with one fiber site and 10 cell sites
requiring 50Mbps each and aggregated to a total of 400Mbps. Also, it assumes that
every link that supports more than one site needs to be protected. Several aggregation
topologies are suggested - tree, single ring, and a hybrid "tree of rings", consisting of two
smaller rings. The tree uses protected links wherever a link failure affects more than a
single site.
• 4x 200 Mbps
©
Ceragon Networks - Aug 2010 3
Page 467
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
3.1 CAPEX
Comparing the networks’ fixed assets costs (CAPEX), we can see that the ring requires
fewer microwave links. On the other hand, rings require higher-capacity links, usually at
a higher cost and consuming more spectrum. The ring also requires some additional
antennas, therefore the cost comparison is not straight forward, and can vary depending
on the particular case. Another factor influencing cost is spectrum reuse. Since rings
have no more than two links at every node, better frequency reuse is usually achieved
and rings are often implemented using only a single pair of frequency channels.
3.2 Resiliency
A clear cut advantage of ring topology is its superior resiliency. The protected tree is
indeed protected against equipment failures, but does not provide any path redundancy.
Thus it is more vulnerable to heavy fade conditions, as well as to complete site failure
(due to an electricity outage, or weather-related disturbances).
Consider the storm scenario shown in Figure 3. In the test case, this site is subject to
complete failure (due to heavy rain or power failure), causing failure in four other sites in
the tree, but no other sites in the ring.
3.3 Availability
The ring also provides superior availability, due to the ring’s inherent path diversity. In a
ring topology, service failures occur only when both paths fail. Thus, in order to achieve
the same end-to-end target availability within a tree and a ring, the ring links can be
designed for lower availability than the tree links. Operators can therefore reduce
expenses by deploying smaller antennas, and by reducing power at the ring link sites.
©
Ceragon Networks - Aug 2010 4
Page 468
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
3.4 Latency
A disadvantage of the ring topology is that it takes more radio hops to reach distant
sites. If designed properly, the shortest path can be selected for each traffic flow, but in
case of a protection switch due to a cut in the ring, traffic can flow over N-1 hops in an
N-node ring. The number of hops can be an issue when considering latency and delay
variation, adversely affecting the delivery of synchronization signals. Still, when
considering the smaller number of hops in the tree, one should remember that some of
the tree’s links offer lower bandwidth than those in the ring, with negative implications for
delay variation, so this drawback is subject to debate. As an alternative, the maximum
number of hops can be limited using a ring-tree combination, employing several smaller
rings, as shown above.
©
Ceragon Networks - Aug 2010 5
Page 469
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
To conclude, there is no single "correct" topology. Network planners should consider the
relevant environmental and business conditions (such as available spectrum, and radio
and antenna costs), reliability requirements, and application characteristics, in order to
determine the best solution for their needs.
CAPEX
Resiliency
Availability
Latency
Scalability
Capacity
©
Ceragon Networks - Aug 2010 6
Page 470
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
©
Ceragon Networks - Aug 2010 7
Page 471
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
Topology
20
# of Wireless Links 12
(1+1 protected links are counted as 2 links)
# of Antennas 20 24
99.97% 99.9999%
Remote Site • Immunity from equipment failure • Immunity from site failure (e.g. power
Availability • During site failure in a Hub-site the whole supply), equipment failure and heavy fade
Calculation branch is affected conditions (e.g. bad weather conditions)
(percent of uptime) Note: 5x9s target availability requires larger Note: 5x9s target availability can be reached
antennas => additional cost! using smaller antennas => cost reduction!
Medium High
Required Channel
Bandwidth • 7x 7MHz @ 128QAM • 12x 28MHz @ 128QAM
• 3x 28MHz @ 128QAM
Total Cost of
• CAPEX – 19% Less
Ownership --- • OPEX – 38% Less
(CAPEX & OPEX)
©
Ceragon Networks - Aug 2010 8
Page 472
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
From the case study comparison in Table 3, we can see that by maintaining a
comprehensive, network-wide perspective, (rather than a link-by-link approach), and by
adoption of a ring-based topology, mobile operators can reduce their Total Cost of
Ownership (TCO), while adhering to backhaul capacity requirements and planning
constraints. The example above does not require a complete renovation of the backhaul
network in order to build a ring. In fact, it can be implemented as a local optimization
either at the access backhaul or at the aggregation backhaul to achieve better TCO.
Unlike the theoretical test-case presented in section 3, the real-life customer demanded
that all the links in the network be 1+1 protected. This added to the total number of links
required in the network, and made the ring topology even more attractive. Using a Ring,
the number of links is significantly reduced – from 20 links to only 12 (assuming 1+1 is
counted as two links).
The real-life scenario offers CAPEX reduction of 19% and OPEX reduction of 38%.
CAPEX includes microwave radio equipment and antennas, while the OPEX includes
maintenance costs, power consumption, and frequency license fees.
The bandwidth capacity and high availability requirements, as well as the scarce
frequency resource constraints, are all complied with by manipulating traffic flows over
the ring, using ring-inherent diverse routes as illustrated in Figure 5 below.
©
Ceragon Networks - Aug 2010 9
Page 473
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
Mobile operators can reallocate redundant protection bandwidth over the ring for other
uses, such as low-priority, high-volume data transfers. During this reallocation, real-time
services are not compromised.
Figure 6: Service Resiliency - Reserved & Alocated versus Reserved but not Alocated
©
Ceragon Networks - Aug 2010 10
Page 474
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
5 SUMMARY
The rapid growth in demand for bandwidth-hungry mobile data services requires
operators to rethink the backhaul networks that support those services. Traditionally,
microwave backhaul networks have been based on tree topologies. However, as they
rethink their backhaul networks, operators are finding that they can enhance quality and
minimize costs by introducing ring configurations.
The shift to Ethernet transport technologies has changed the economics of the
microwave ring architecture. Unlike with traditional TDM-based SONET/SDH rings,
network operators can optimize network resources by using statistical multiplexing and
differentiated classes of service. This approach allows all of the cell sites on the ring to
share the ring’s bandwidth, prioritizing time-sensitive traffic such as voice, and
supporting bursts of lower priority traffic from individual sites when sufficient bandwidth is
available.
As the full efficiencies of Ethernet-based mobile backhaul are realized, ring architectures
become less costly than tree topologies, while providing higher levels of reliability. The
case study presented in this document does not necessarily require a complete
renovation of the backhaul network, but rather is implemented as a local optimization
either at the access or aggregation backhaul level in order to achieve better TCO.
The purpose of this document was to provide general, high-level design concepts for
planning microwave backhaul networks, without taking into account operator-specific
network planning constraints. Ceragon wishes to play an active role in the design and
implementation of backhaul networks, and therefore offers service providers the
opportunity to focus on service provisioning and revenue enhancement, as they free
themselves from the task of the network architecture specialist.
For more information, please visit our web site: www.ceragon.com.
©
Ceragon Networks - Aug 2010 11
Page 475
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
FibeAir® IP-10, as a one-box, multi-service solution, reduces footprint size at the cell site,
lowering rack-space leasing costs. It also reduces electricity costs, automatically suiting
power consumption in accordance with current traffic loads and environmental
conditions.
In addition, the FibeAir one-box approach saves on maintenance costs, requires less
cabling, and reduces network down-time.
©
Ceragon Networks - Aug 2010 12
Page 476
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
6.3 Capacity
The FibeAir® IP-10 family of microwave backhauling products covers the entire licensed
frequency spectrum and offers a wide capacity range, from 10Mbps to 500Mbps (full
duplex) over a single radio carrier, using a single RF unit. FibeAir allows carriers to
expand capacity to 1 Gbps, using XPIC (Cross Polarization Interference Cancellation).
6.4 Availability
6.5 Scalability
Ceragon’s FibeAir® IP-10 is a unique, modular nodal solution that enables carriers to
cost-effectively scale their backhaul networks. Multiple FibeAir IP-10 indoor units (IDUs)
can be combined in a modular way to form highly integrated and fully redundant nodal
configurations with an extended number of supported radios, TDM and Ethernet
interfaces. Using this approach, any tail site can be seamlessly upgraded to become
chain or node sites, fully re-using the installed equipment.
©
Ceragon Networks - Aug 2010 13
Page 477
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
7 GLOSSARY
©
Ceragon Networks - Aug 2010 14
Page 478
Wireless Backhaul Topologies: Analyzing Backhaul Topology Strategies
8 REFERENCES
©
Ceragon Networks - Aug 2010 15
Page 479
Doubling Wireless Ring Capacity: Protected ABR
Abstract
Native2 (“Native Squared”) is Ceragon’s unique, innovative TDM-to-packet migration approach that
allows for the forwarding of TDM and packet-based traffic over microwave backhauling links –
“natively”, without using expensive encapsulation methods – supported by the Ceragon FibeAir®
IP-10 platform.
Ceragon’s native support for TDM traffic leverages the resiliency advantages of wireless SDH
1
rings , with their intrinsic Sub-Network Connection Protection (SNCP) path-protection
capabilities. In SNCP, information is redundantly transmitted on the ring in both “east” and
“west” directions, while the receiver selects which transmission to receive.
In today’s super-competitive mobile industry, many carriers wish to reallocate the redundant
protection bandwidth for other uses, such as low-priority, high-volume data transfer. The
benefits are clear – exciting sales opportunities arise as newly-generated capacity can be sold
to support the interpersonal communications shift to Facebook, as well as the ever-growing
demand for YouTube access.
No less importantly, this reallocation of bandwidth from TDM to Ethernet – and back – must be
risk-free, with no interruption of revenue-generating services.
For the purposes of this paper, we suggest to differentiate between the terms “fully protected”
and “fully reserved.” While in legacy systems, processing power could not allow the delivery
of protected services without fully reserving all the capacity, modern systems, such as
Ceragon’s FibeAir IP-10, are capable of protecting TDM services without reserving large
quantities of bandwidth.
In response to the needs described above, Ceragon proposes a novel approach to improve the
efficiency of ring-based protection, using a technique called Protected Adaptive Bandwidth
Recovery (“ABR”), which enables full utilization of the bidirectional capabilities inherent in ring
technologies. With ABR, the TDM-based information is transmitted in one direction only, while
the unused protection capacity is allocated for Ethernet traffic. In the event of a failure, the
unused capacity is re-allocated for TDM transmission. In this paper, we take a closer look at
this solution, and at the technologies that are used to implement it. This technique extends the
Native2 approach to dynamic allocation of link capacity between TDM and Ethernet flows to the
network level.
1
For a detailed discussion on wireless network topologies and a comparison between them, please refer
to Ceragon’s publication, “Wireless Backhaul Topologies: Tree vs. Ring.”
Page 480
Doubling Wireless Ring Capacity: Protected ABR
A major drawback of ring topology is the allocation of redundant bandwidth in order to ensure
network availability. For example, the widely-implemented SNCP 1+1 unidirectional protection
scheme, which requires the simultaneous transmission of information in both directions on the
ring, causes a loss of up to 50% of the ring’s total bandwidth capacity.
A number of techniques have been devised for recovering and utilizing the lost bandwidth. The
techniques are described in the following sections.
The rapid advance in Ethernet-based technologies has made the eventual migration of
transport networks from SONET/SDH to packet a foregone conclusion. This move to packet
transport has challenged the Ethernet community to exploit the resilience benefits of the
physical ring structure, while adhering to the logical tree structure required by Ethernet
networks, thus ensuring a loop-free topology and avoiding broadcast storms. These conflicting
requirements have led to the development and widespread adoption of the Rapid Spanning
Tree Protocol (RSTP) and its variations.
In order to forward TDM-based traffic over Ethernet-based rings, vendors have had to adopt
Pseudowire technologies. Pseudowire, the emulation of a native service over a Packet
Switched Network (PSN), is used to map Legacy TDM or ATM services (such as E1 traffic), by
creating TDM tunnels over the PSN. While Pseudowire helped accomplish the goal of creating
an Ethernet infrastructure for TDM services, it significantly raised network cost and reduced
total capacity due to the heavy encapsulation requirements.
Some microwave equipment vendors, including Ceragon, are able to provide complete, ring-
based transport networks, without the need for external networking equipment such as switches
and routers. These networks use a ring-optimized RSTP to form a logical tree over the physical
wireless ring. This logical tree topology increases the ring’s efficiency, allowing operators to
leverage the bidirectional characteristic of the ring in order to double its bandwidth capacity, as
illustrated in Figure 1 below.
Page 481
Doubling Wireless Ring Capacity: Protected ABR
Hybrid systems that support the native transmission of both TDM and Ethernet flows can also
be used to reduce wasted protection bandwidth. Ceragon’s Native2 (“Native Squared”)
migration strategy offers a unique hybrid approach, in which both Carrier Ethernet and TDM
traffic are carried natively over microwave links without using expensive encapsulation methods
– resulting in significant cost savings, while smoothing the way to a future all-IP network.
Native2 allows unparalleled flexibility in the dynamic allocation of the link’s bandwidth into
TDM and Ethernet flows. The bandwidth available to each flow can be easily re-allocated in
real time using Ceragon’s PolyView™ Network Management System – without resetting the
link!
As the volume of data transfer in mobile networks continues to grow, the percentage of time-
critical voice & TDM traffic in these networks continues to drop. By limiting native TDM traffic to
a minimum, the amount of redundant protection-path bandwidth can be significantly minimized.
As the trend toward packet-based networks gains momentum, there remains a huge demand
for legacy E1 transport solutions that offer path protection. A variety of protection schemes are
listed here:
Diverse Path. Usually involving redundant equipment and/or links, this scheme depends
on the availability of alternative ports, cell sites, and base stations.
Bidirectional Line Switch Ring (BLSR). A bidirectional ring, in which logical “working”
and “protection” rings forward traffic in opposite directions. Protection switching is
Page 482
Doubling Wireless Ring Capacity: Protected ABR
performed on a per-link basis (not per E1), and is often wasteful of bandwidth capacity,
while possibly increasing delay.
SNCP 1+1 Unidirectional Protection. The most widely implemented of ring-based
protection schemes. Each E1 flow consists of a primary path and a protection or standby
path, represented in Figure 2 by the blue arrow and the green arrow, respectively.
SNCP 1:1 Based. A protection scheme developed exclusively by Ceragon Networks (and
described in detail in this paper). Each E1 flow consists of a primary path, and a protection
path whose bandwidth is used for protection signaling and Ethernet traffic, represented in
Figure 2 by the blue arrow and the gray-white arrow, respectively.
Page 483
Doubling Wireless Ring Capacity: Protected ABR
The following table compares each of the TDM-based ring protection schemes in regard to
resiliency and capacity:
SNCP 1+1 Very Fast. Phone service and For 100% recovery, ring must
Unidirectional synchronization not affected. reserve 50% spare capacity.
These protections schemes must be able to deal with additional challenges that add complexity
to TDM ring protection:
Hybrid Fiber/Microwave Rings. Microwave rings containing fiber segments must be able
to propagate E1 frames, fault indications, and other signals vital to the network.
Dual Homing. Protection rings remain vulnerable in situations where a fiber node suffers
an equipment failure. In order to ensure network availability, protection schemes must be
able to handle the forwarding of primary and standby transmissions from 2 different points
of entry, as shown in Figure 3 below.
Page 484
Doubling Wireless Ring Capacity: Protected ABR
In a typical SDH network, the receiving node monitors the transmission quality at its “east” and
“west” link interfaces, and selects the direction from which it will receive transmissions. The
transmitting node, therefore, sends traffic in both the east and west directions, causing the
redundant use of bandwidth. This form of protection is known as SNCP 1+1 Unidirectional
Protection, and while it can generally provide 50 millisecond protection switching, it does so by
reserving large quantities of bandwidth over a very expensive wireless spectrum.
The following section provides technological details on the implementation of this innovative
feature, in which Protected Adaptive Bandwidth Recovery (“ABR”) is applied to enable
better spectrum utilization for Ethernet services.
Page 485
Doubling Wireless Ring Capacity: Protected ABR
In the standby direction, the transmitting node – along with all the nodes in the standby path to
the receiver – removes the E1 bandwidth allocation, and sends periodic signals to the receiver
to help it monitor the transmissions from east and west. (Note: This requires special handling in
hybrid fiber / microwave networks). The de-allocated (recovered) E1 bandwidth can now be
utilized by Ethernet traffic.
The receiving node continues to accept information flows from either the east or west direction,
and detects the path in which the E1 payload is actually transmitted.
When a failure occurs in the working direction, the receiving node sends a Reverse Defect
Indication (RDI) signal to the transmitter, which automatically switches to the standby path.
ABR can be selected for any number of E1 channels, and the resulting path co-exists with all
other paths in the network – be they unidirectional, bidirectional, protected, or unprotected. The
case study below describes a real-life example of how ABR delivers normal-state Ethernet
capacity that may triple the Ethernet capacity delivered when using SNCP 1+1. While
malfunctions under SNCP 1+1 automatically result in network degradation to a worst-case
scenario (known as “failure state”), a network fault under ABR results in a level of degradation
that depends on the exact location of the failure, and worst-case degradation is usually avoided.
Dual Homing
ABR can also be used in a dual homing configuration – in which there are 2 possible points of
entry into the ring network. This provides added resiliency in case of failure in the transmitting
node. In dual homing mode, one transmission node sends the E1 payload, while the other
transmission node sends “standby” signaling as mentioned earlier.
In segments of a microwave network that are connected by fiber-optic links, E1 frames must be
propagated onto the optical cable, and restored again on the next microwave segment. The
same goes for fault indicators. When a wireless E1 is de-allocated and its bandwidth freed for
Ethernet traffic, the periodic signals sent from the transmitter to the receiver are also
propagated optically and then regenerated on the next microwave segment.
ACM
2
Ceragon’s Native technology enables the implementation of highly-efficient Adaptive Coding
Modulation (ACM) techniques in order to optimize network availability. When the received
Signal-to-Noise Ratio (SNR) degrades to a predetermined threshold, the system will pre-
emptively switch to a lower modulation level. When implemented correctly, ACM allows the
platform to adjust itself, allocating capacity in favor of high-priority traffic, and reducing the
Page 486
Doubling Wireless Ring Capacity: Protected ABR
possibility of a total service outage. Ceragon’s implementation enables hitless and errorless
operation, and it can be enhanced with QoS mechanisms to ensure that only pre-defined low-
priority traffic is dropped. For both TDM traffic and Ethernet traffic, the operator can define
traffic priorities based on network planning and on the current stage of migration. For example,
in new 3G Node Bs, voice traffic is carried by Ethernet, requiring changes in drop precedence
(giving higher priority to some Ethernet flows vis-a-vis TDM), and in path protection as well.
Trail Management
In order to enable full utilization of the FibeAir platform’s networking capabilities, Ceragon offers
PolyView™ - Ceragon’s innovative, user-friendly Network Management System (NMS),
designed for managing large-scale wireless backhaul networks. PolyView, a fully integrated
radio and networking management platform, provides complete trail management support.
PolyView’s efficient trail maintenance capabilities allow network technicians to create, delete,
modify, and monitor TDM trails. Trails can be built either automatically, based on user-defined
trail endpoints, or manually, according to varying degrees of manual input, with full resource
control.
In this scenario, the main question is how to migrate the network to support 3G-based data
services, given the severe spectrum limitations. This common legacy configuration leaves us
with almost no capacity for Ethernet traffic – in this case, approximately 1.7 Mbps per site of
guaranteed Ethernet traffic.
Page 487
Doubling Wireless Ring Capacity: Protected ABR
Figure 5: TDM-only Aggregation Ring with 100% Protection Based on SNCP 1+1
In the simple, TDM-only, SNCP 1+1 case presented in Figure 5 above, all E1s flow in both
directions, meaning that 50% of the total capacity is reserved for failure states. In case of such
a failure, E1s traffic is forwarded in the opposite direction. From a capacity point of view, there
is no difference between normal state and failure state.
Figure 6: TDM Aggregation Ring - SNCP 1:1 Protection Bandwidth is used for Ethernet
In the SNCP 1:1 scenario depicted in Figure 6, TDM-only E1s flow only in one direction. An
alternate path is reserved, but no capacity is allocated. In case of a failure, E1s are re-routed in
the opposite direction over the reserved path, receiving the non-allocated capacity.
When planning a data network for broadband services, one should compute the guaranteed
traffic (Committed Information Rate – CIR), as well as the possible upside (Excess Information
Rate – EIR). Given the availability of bandwidth for both classes, we can determine the
subscriber’s overall Quality of Experience.
Page 488
Doubling Wireless Ring Capacity: Protected ABR
Figure 7: A Native Ethernet Ring with 100% or partial protection based on STP
In the scenario that appears in Figure 7 above, when applying 100% protection – or in case of a
worst case failure, up to 10 Mbps of Ethernet capacity are available per site. The whole ring
can support 190 Mbps of traffic. So if the 190 Mbps of protected path bandwidth is reserved but
not allocated, Ethernet capacity is increased to 21 Mbps per site. In Ethernet, the various
failure state scenarios each have a different effect on capacity, as described in the next section.
Non-Affecting Failure. The failure in link A3 does not affect traffic, as STP has in any
case blocked this link. Ethernet traffic does not traverse this link.
Medium-Severity Failure. The link failure at A2 causes some traffic to flow normally, while
some traffic uses the reserved alternate path.
Worst-Case Scenario Failure – A failure in link A1 causes all traffic to flow over the
reserved alternate path
Page 489
Doubling Wireless Ring Capacity: Protected ABR
There no need for an STP block in any of the failure scenarios (1-3), since at least one link in
the ring is in any case out of service.
Traditional protection schemes include bandwidth reservation and actual allocation of capacity
for the alternate path. The reasoning for this was simple – in failure state, the network would
not be able to restore connectivity in a timely fashion. Today, higher processing speeds and
improved network recovery algorithms allow products such as Ceragon’s FibeAir IP-10 to
restore connectivity instantly – without pre-allocation of capacity. Therefore, while high-priority
E1 traffic is protected, alternate path capacity is reserved, but the unused capacity can be
utilized for the delivery of broadband services, allowing data users to enjoy additional capacity
when it becomes available. Let’s review an example:
Page 490
Doubling Wireless Ring Capacity: Protected ABR
While 72 E1s lines are delivered all the time, only the relevant 36 E1s are actually carried on
each path. On the Ethernet side, up to 190 Mbps of data are available in normal state, while 30
Mbps guaranteed at failure (in the worst case scenario).
In summary, ABR can provide much higher capacities in all scenarios, with the exception of
worst case failures. The increased capacity allows operators to improve customer stratification,
and enhance subscribers’ overall Quality-of-Experience (QoE) with better performance in mail
delivery, content sharing, backup services, Facebook access, and video streaming.
Ceragon’s ABR feature allows operators to reclaim unused E1 bandwidth and re-allocate it for
Ethernet traffic – without putting critical revenue-generating services at risk.
Synchronization and other critical signaling systems are preserved.
ABR Benefits
Ceragon’s ABR approach has significant benefits over Pseudowire-based techniques when
applied in a 2G-to-3G migration environment. It enables an operator to enjoy the inherent
benefits of hybrid TDM and Ethernet Microwave environments:
Page 491
Doubling Wireless Ring Capacity: Protected ABR
Figure 10: ABR Benefits: Double Data Capacity, with no Impact on TDM in Failure State
Doubles ring capacity by using the TDM protection path to provide extra capacity for
Ethernet services.
Leaves revenue-generating 2G voice traffic unaffected in the migration process, with no
need for protocol conversion.
Protects network synchronization and clock using currently deployed E1s, without the need
to test and verify new clock recovery mechanisms. Clock recovery techniques are sensitive
to delay and delay variation, and therefore have a severe impact on the operator’s
deployment strategy, often limiting the number of links in a chain or a ring.
Streamlines the phase-out of legacy E1s in the network, easing the preparation for
deployment of all-packet backhaul networks.
QoS awareness enables the operator to associate the appropriate class of availability and
class of service to each traffic type:
o Protected or not protected
o Special low delay considerations
o Low, medium, or high priority – TDM or Ethernet
Page 492
Doubling Wireless Ring Capacity: Protected ABR
Summary
Mobile carriers operating wireless backhaul networks are discovering the advantages of
deploying ring-based topologies, which include enhanced quality and reduced costs. While
carriers can exploit the inherent strengths of such networks – such as unequalled reliability, it is
understood that the price to be paid in bandwidth capacity may be too high.
Ceragon offers a range of solutions for capacity recovery, based on its Native2 TDM-to-packet
migration strategy, and on the Protected Adaptive Bandwidth Recovery (ABR) feature described
in the previous sections.
The flexibility of Ceragon’s FibeAir® IP-10 family allows carriers to implement a wide range of
backhauling strategies – whether TDM-based, packet, or a combination thereof. Designed to
help carriers reach their IP migration goals, Ceragon’s Native2 solution is an excellent platform
for capacity optimizations – in any topology.
Ceragon Networks Ltd. (NASDAQ/TASE: CRNT) is a leading provider of high-capacity LTE-ready wireless backhaul
solutions for cellular and fixed wireless operators, enterprises and government organizations. Ceragon’s FibeAir®
product family offers scalable solutions for wireless transport of broadband services. Operating across multiple
frequencies for IP and SONET/SDH protocols, FibeAir systems support the emerging needs of next-generation
networks that are evolving to all-IP based services. Ceragon leads the market in IP backhaul, offering a unique, native
IP solution that provides the efficient, robust connectivity required for LTE, WiMAX and converged networks. More
information is available at www.ceragon.com.
Ceragon Networks®, CeraView®, FibeAir® and the FibeAir® design mark are registered trademarks of Ceragon Networks Ltd., and Ceragon™, PolyView™,
ConfigAir™, CeraMon™, EtherAir™, QuickAir™, QuickAir Partner Program™, QuickAir Partner Certification Program™, QuickAir Partner Zone™, EncryptAir™
and Microwave Fiber™ are trademarks of Ceragon Networks Ltd. All rights reserved.
Page 493
Basic Questionnaire for Microwave Opportunities
Ceragon Networks
Questionnaire Introduction
Ceragon Networks is a leading provider of high-capacity wireless backhaul solutions. Ceragon offers a
broad portfolio of solutions for wireless service providers as well as private businesses. These solutions
are designed to deliver voice and premium data services, eliminate the backhaul capacity bottleneck,
significantly reduce backhaul costs and transition to next generation IP-based networks.
Ceragon's focus on backhaul is a significant advantage as it serves all types of access technologies, and
any type of network. The main driver of Ceragon's business is its modular FibeAir® product family, for
wireless backhaul transport of broadband services over IP and SONET/SDH networks.
This Basic Questionnaire for Microwave Opportunities document will assist in better understanding our
customers’ backhaul requirements and planning constraints, allowing us to provide the right solution
that meets their specific backhaul needs
Ceragon offers Networks, not just point-to-point links. Therefore, before you ask your customer: “How
Many?” and the customer asks: “How Much?” make sure you answer these three questions:
1. Why?
Identify the Drivers - Business model, Type of Services, etc.
2. What?
Understand the Network Concept - Network Topology, Future plans, etc.
3. How?
Gather the Details – Available frequencies, Planning Constraints, 3rd Party Integrations, etc.
1. Wireless Solution - Ceragon provides high-capacity wireless backhaul networks using Point-to-
Point wireless links that require Line-of-Sight between two end points.
4. Frequency Bands – Ceragon supports 6GHz - 38GHz licensed band frequencies with 3.5MHz -
56MHz channel bandwidth (ETSI & FCC).
6. Network Topology – Ceragon’s microwave solution is suitable for Tree/Star, Ring and Mesh
topologies.
7. Resiliency - Ceragon wireless backhaul solution supports radio, service and network resiliencies
as follows:
(a) Radio – radio hot-stand-by protection (1+1)
(c) Indoor unit protection – including 1+1 Ethernet switch protection. The switchover in the
wireless link is transparent to external routers
(d) Network Topology – Ring-optimized RSTP for all Packet data, while in the Native2 (Hybrid)
mode it also supports SNCP for TDM traffic
8. Installation schemes - Ceragon wireless radio supports the following installation schemes:
• Most common microwave • Simple integration and • Full wireless solution with
installation maintenance zero footprint
• cost efficient in terms of - Compact, integrated network and - All outdoor nodal or ring
accessories radio functions configurations
• Scalable nodal solution for • Minimal inventory and • Lower overall costs
aggregation sites training - Installation, rent, power and easier
- Similar units may serve any maintenance
topology or installation • Instant wireless site set-up
- Pole-mount, wall or roof-top
• Improved network uptime
installation
- Robust redundant design for
• Environment-friendly
increased resiliency
- Saves power, space and air
• Commonly used in North conditioning
America • Risk-free solution
- Water and dust proofing
9. Network Management Systems - Ceragon provides full NETWORK management tools that
integrates into any new or existing management system or network
10. Adaptive Modulation (Optional) – Adaptive Coding and Modulation (ACM), is a term used in
wireless communications to denote the matching of the modulation, coding and other signal
and protocol parameters to the conditions on the radio link (e.g. extreme bad weather
conditions)
o Does the customer consider using Adaptive Modulation in order to better utilities the
available frequency resources?
11. Traffic and QoS aware – NOT just a dumb wireless pipe…
Ceragon's Adaptive Modulation has a synergy with the equipment's built-in Ethernet switch
Quality of Service (QoS) mechanism. Since QoS provides priority support for different classes of
service, according to a wide range of criteria, it is possible to configure the wireless link to
discard only low priority packets as weather conditions deteriorate.
User Guide
August 2010
Page 500
Notice
This document contains information that is proprietary to Ceragon Networks Ltd.
No part of this publication may be reproduced, modified, or distributed without prior written authorization of
Ceragon Networks Ltd.
Registered TradeMarks
Ceragon Networks® is a registered trademark of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
TradeMarks
CeraMapTM, PolyViewTM, EncryptAirTM, ConfigAirTM, CeraMonTM, EtherAirTM, and MicroWave FiberTM, are
trademarks of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
Statement of Conditions
The information contained in this document is subject to change without notice.
Ceragon Networks Ltd. shall not be liable for errors contained herein or for incidental or consequential
damage in connection with the furnishing, performance, or use of this document or equipment supplied
with it.
Information to User
Any changes or modifications of equipment not expressly approved by the manufacturer could void the
user’s authority to operate the equipment and the warranty for such equipment.
General ............................................................................................................................................. 5
The CLI is used to perform IP-10 configuration and obtain system statistical and performance information.
Using the CLI, you can perform configuration operations for single IP-10 units, as well as configure several
IP-10 units in a single batch command.
Access Rights
IP-10 CLI access is granted for the following user groups:
Viewer This user only has read-only access. The user can only view parameters and their values, not
modify them.
Operator This user has read-write access. The user can read parameters and their values, and modify
them. However, this user cannot add or remove other users.
Admin This user has read-write access. The user can read parameters and their values, modify them,
and add/remove other users.
Technician This user has read-write access to the OS CLI.
User access is controlled by the system Administrator and configured via the Management command group
(shown in the Command Groups section).
Getting Help
Once you are logged in, you can go to a main command group and its sub groups, type the command you
want, and press Tab twice for a list of possible parameter values.
In addition, you can type a command and then type a question mark (?) for location-specific information for
the command. For example, for the set command, typing set ? and pressing Enter will display a list of
optional parameters and a help line.
Wherever you are in the command tree, you can obtain a list of available commands by typing Help or ?.
The commands that are available are different for each location in the CLI tree and the type of user.
ls list entities
get get parameter
set set parameter
help help
cd change directory
exit exit CLI
logout logout from CLI
cli-ver cli version
cls clear screen
write write the current switch configuration to the configuration file
show-tree show entity tree
find search for a string in the parameter name and information fields
lsp list entity parameters and commands
In addition, you can use the up/down arrow keys, or the “q” key, when the word “END” appears at the end of
the screen.
Setting IP Addresses
To define a new IP address, do the following:
1. Log in as follows:
User: Admin or Operator
Password: Admin
Command Example
The following example shows how you can find a command within a sub-group, and then execute the
command. The example starts with the lsp (list parameters) command, and ends with the activation of an
interface loopback test.
-----------------------------------------------
IP-10:/> cd diagnostics/loopback/radio-loopback/
IP-10:/diagnostics/loopback/radio-loopback> lsp
*********** configuration ********
timeout rw Loopback timeout in minutes
*********** statuses *************
counter ro Loopback time left
if-loopback rw IF loopback activation
rfu-rf-loopback rw RFU RF Loopback Enable Command
-----------------------------------------------
Important!
Note that bridge related commands need to be followed by a “write” command to be saved.
Otherwise, the commands will not be saved following a reset in the system.
Management
Platform
Radio
Interfaces
Diagnostics
Some groups include sub groups that enable setup operations relevant to that category.
Management
Management
Radio
Diagnostics
Note that when you enter a group or sub group, you can type a command and then press the Tab key twice
(or type a question mark) for a list of values relevant to that command.
account
users show-users Show information about admin
exist users account
users change-password Change user's password. rw
syntax:
change-password
(without parameters)
floating-ip-address set-fip-lock-timer Set Floating IP lock timer operator
mng-protocols status-show Show Management operator
Protocols status
mng-protocols web-restart restart the web server admin
Snmp status-show Show SNMP status operator
snmp change-user-settings Change the settings of the admin
SNMPv3 user (security
level / username /
password)
idc-board reset-idc-hw Reset the IDC - cold operator
(HW) reset
idc-board create-archive Create archive file on operator
target
idc-board install-archive Install the requested admin
archive file on target
idc-board upload-archive Upload the archive file to operator
the PC
(host). Before activating
this command, make sure
to set host-ip, host-path,
user-name and user-
password
idc-board download-archive Get the archive file from operator
the PC (host) onto the
target. Before activating
this command, make sure
to set host-ip, host-path,
user-name and user-
password
eth-port Throughput rw
throughput-threshold Operator
threshold [Mbps]
eth-port type Port's type Operator rw
eth-port Utilization threshold rw
utilization-threshold Operator
[%]
eth-port vlan Default VLAN ID Operator rw
eth-port designated-path-cost Designated path cost VIEWER RO
eth-port The number of VIEWER
frames dropped in
the transmit MAC
because the frame
excess-collision-drop experienced 16 RO
consecutive
collisions. This
counter is applicable
in half-duplex only.
eth-port Management port VIEWER
management-auto-negotiation RO
auto negotiation
eth-port Management port VIEWER
management-capacity RO
capacity
eth-port Management port VIEWER
management-duplex RO
duplex
eth-port Management port VIEWER
management-ethernet-rate RO
Ethernet rate (Mbps)
eth-port management-only Management only VIEWER RO
eth-port management-port-admin Port's admin VIEWER RO
eth-port Management VLAN VIEWER
management-vlan RO
id
eth-port 15 Minute PM VIEWER
pm-15 RO
minutes monitoring
eth-port 24 Hour PM hours VIEWER
pm-24 RO
monitoring
configuration
stm1 signal-degrade-threshold STM-1 signal OPERATOR rw
degrade threshold
configuration
stm1 loopback-timeout Loopback timeout in OPERATOR rw
minutes (0 for
unlimited)
stm1 node-to-node-connection The indication OPERATOR rw
whether the STM-1
interface connects
IP-10 nodes in a
network
stm1 peer-ip-address IP address of the OPERATOR rw
remote STM1
element
stm1 peer-port-number Remote STM-1 port OPERATOR rw
number
stm1 peer-slot-id Slot ID of the remote OPERATOR rw
STM1 port
stm1 ais-vc-signaling-admin Enabling or disabling OPERATOR rw
the signaling of AIS
upon receiving such
from
stm1 line-loopback Type of loopback in OPERATOR rw
the STM-1 interface
CLI (Command Line Interface) is used to perform IP-10 configuration and obtain system statistical and
performance information.
Using the CLI, you can perform configuration operations for stand-alone IP-10 units or units connected in a
stacked configuration, as well as configure several IP-10 units in a single batch command.
In a stacked configuration, all commands are available both in the main and extension units unless otherwise
stated.
Basic Commands
The following basic commands are available when you first log in, if you belong to the Operator
user group:
ls List entities
get Get parameter
set Set parameter
help Help
cd Change directory
exit Exit CLI
logout Logout from CLI
cli-ver CLI version
cls Clear screen
shell Enter secondary shell
write Write the current switch configuration to the configuration file
show-tree Show entity tree
find Search for a string in the parameter's entity name and information fields
lsp List entity parameters and commands
echo echoing free text to the console
In order to get help on a specific command, add a question mark or the parameter “--help” after
the command.
In addition, you can use the up and down arrow keys, or the “q” key, when the word “END”
appears at the end of the screen.
Setting IP Addresses
To define a new IP address, do the following at the main unit:
1. Log in as follows:
3. Type: get ip-address, and press Enter. This will give you the current IP address.
4. Type: set ip-address <ip> (the new IP address), and press Enter.
Adding Users
To define a new user, do the following:
1. Log in.
3. Type: add-user <name> <group> <password aging days> <expiration date>, and press
Enter.
1. Log in.
The prompt will change according to the relevant slot ID. For example, the prompt for a unit
located in slot 3 will show:
IP-10-SLOT-3:/>
1. Log in.
Adding Users
To define a new user, do the following:
1. Log in.
Performing Resets
In Stacked Configuration
In order to reset a specific unit in the shelf, do the following at the main unit:
1. Log in.
Arguments description:
In order to reset all extension units (but not the main unit), do the following at the main unit:
1. Log in.
In order to reset all units (including the main unit), do the following at the main unit:
1. Log in.
1. Log in.
1. Log in.
Arguments description:
• Operational/reserved: reserved trails are introduced in the database and the bandwidth
won’t be used for TDM traffic (it may be used for ethernet traffic) but traffic does not flow.
For operational trails bandwidth is fully allocated and traffic flows
• Interface slot: slot number of the IDU containing the interface (from 1 to 6)
o For radio, the maximum number depends on the radio script being used
1. Log in.
4. To show a specific trail by its ID type: show-trail-by-id <trail ID>, and press Enter.
5. To show a specific trail by its source interface type: show-trail-by-src <interface 1 slot #>
<interface 1 type> <interface 1 number>, and press Enter.
The trails will be shown in a table as follows (this is an example of a trail from E1#1 in slot 2 to
radio VC#1 in slot 3:
================================================================
================================================================
Source Dest1 Dest2 Dest3 Dest4 Dest5 Dest6 Dest7 Dest8 Dest9
------------------------------------------------------------------------------
------------------------------------------------------------------------------
Deleting Trails
There are several ways to delete trails:
1. Log in.
4. To delete a specific trail by its ID type: del-trail-by-id <trail ID>, and press Enter.
4. To delete a specific trail by its source interface type: del-trail-by-src <interface 1 slot #>
<interface 1 type> <interface 1 number>, and press Enter.
Activating/Deactivating Trails
Trails mode can be toggled between active and reserved, as follows:
1. Log in.
4. To activate/reserve a specific trail by its ID type: act-trail-by-id <trail ID>, and press Enter.
1. Log in.
Arguments description:
• Operational/reserved: reserved trails are introduced in the database and the bandwidth
won’t be used for TDM traffic (it may be used for ethernet traffic) but traffic does not flow.
For operational trails bandwidth is fully allocated and traffic flows
• Interface slot: slot number of the IDU containing the interface (from 1 to 6)
o For radio, the maximum number depends on the radio script being used
1. Log in.
3. To force all trails to one of their paths type: protected-trail-force-active <Id> <path>, and
press Enter.
4. To force a specific trail by its ID type to one of its paths type: protected-trail-force-active-by-
id <Id> <path>, and press Enter.
<Id> - trail ID
1. Log in.
4. To show a specific trail’s PMs by its ID type: show-trail-pms-by-id <trail ID> <15 min
interval> <24h interval>, and press Enter.
<15min/24h interval> is the interval number to be shown, where 0 is the current interval, 1 is
the previous one and so on. If no interval is selected, the current one will be shown.
1. Log in.
Single Pipe - Ethernet switching is disabled, whereby only a single Ethernet interface is used for
traffic and the unit operates as a point-to-point microwave Ethernet radio.
1. Log in.
3. Type: set ethernet-application <Ethernet application type> (Single pipe, Managed switch,
or Metro switch), and press Enter.
Management Ports
2. Type set type < in-band or out-of-band >, and press Enter.
Port Configuration
2. Type set ethernet-rate <Rate> (10, 100 or 1000 Mbps), and press Enter.
2. Type set duplex < full-duplex / half-duplex > ,and press Enter.
3. Type set-allowed-vlans <add, except, remove> <VLAN no.>, and press Enter.
2. Type vlan <VLAN no.> <add, remove, enable, disable>, and press Enter.
2. Type vlan <VLAN no.> name <VLAN name>, and press Enter.
QoS Configuration
Ingress Classifier
Egress Scheduler
Egress Shaper
Policer
2. Type: qos-policer-class <add, remove> <policer class name> <policer name> <matching
type: all, arp, first-queue, second-queue, third-queue, fourth-queue, broadcast,
multicast, non-tcp-udp, tcp-control, tcp-data, udp, unicast, unknown-unicast, unknown-
multicast> <rate> <CBS> <exceed action: drop>, and press Enter.
QoS Tables
Wayside Channel
User Channel
To set Automatic state Propagation (also called GBE-mute-override) in “Single Pipe application”:
1. Type: set eth-shutdown-threshold-profile < profile-0 to profile-7 >, and press Enter.
2. At the new prompt, type set ethernet-application metro-switch, and press Enter.
2. At the new prompt, type set type customer-network (or provider-network), and press Enter.
2. At the new prompt, type set vlan <VLAN ID>, and press Enter.
2. At the new prompt, type set provider-port-ethertype <0x88a8, 0x8100, 0x9100, 0x9200>,
and press Enter.
2. At the new prompt, type change-script-cmd < Script's name> < Operational mode>
<Maximum profile> disable-adaptive-power, then press Enter.
Script Name
10Mbps-6.5MHz-4QAM-Grade-1
155Mbps-26MHz-128QAM-Grade-1
181Mbps-26MHz-256QAM-Grade-1
20Mbps-6.5MHz-16QAM-Grade-1
39Mbps-26MHz-4QAM-Grade-1
39Mbps-6.5MHz-256QAM-Grade-1
47Mbps-9MHz-64QAM-Grade-1
ACM_181Mbps-26MHz-256QAM-Grade-1
ACM_367Mbps-52MHz-256QAM-Grade-1
ACM_42Mbps-6.5MHz-256QAM-Grade-1
ACM_87Mbps-12.5MHz-256QAM-Grade-1
Operational Mode
acm-adaptive-mode
acm-fixed-mode
regular-mode (for non ACM scripts)
Maximum Profile
Note: For ,choose a specific profile for “ACM fixed mode” . In “regular mode” only “profile-0” is
available.
profile-0
profile-1
profile-2
profile-3
profile-4
profile-5
profile-6
profile-7
2. Type: set set host-ip <ip> (the client’s IP address), and press Enter.
3. Type: set host-path <path> (the site to the desired file location at the client), and press Enter.
4. Type: set set user-name <user-name> (the user name expected from client), and press
Enter.
5. Type: change-user-password and press Enter; upon prompt write the password expected
from client, and press Enter.
2. In order to create the backup file for a certain slot, type: config-backup --unit <slot number>,
and press Enter.
2. In order to create the backup file for a all the slots in the shelf, type: config-backup --all, and
press Enter.
2. In order to upload the file to the FTP client, type: upload-archive configuration, and press
Enter.
3. In order to see the upload status, type: get config-upload-status, and press Enter.
2. In order to download the file from the FTP client, type: download-archive configuration, and
press Enter.
• For a certain slot, type: config-restore --unit <slot number>, and press Enter.
• For all the slots in the shelf, type: config-restore --all, and press Enter.
• For a certain slot, type: reset-unit <slot number>, and press Enter.
• For all the slots in the shelf, type: reset-shelf, and press Enter.
• For all the extension slots in the shelf, type: reset-extensions, and press Enter.
2. Type: set server-url <ip/path> (the client’s IP address and files path), and press Enter.
3. Type: set server-login <user-name> (the user name expected from client), and press Enter.
5. Type: change-server-password and press Enter; upon prompt write the password expected
from client, and press Enter.
• For all the slots in the shelf, type: upgrade --all, and press Enter.
• For a certain slot, type: downgrade --unit <slot number>, and press Enter.
• For all the slots in the shelf, type: downgrade --all, and press Enter.
Rollback Procedure
In order to rollback to the previously installed version:
• For a certain slot, type: rollback --unit <slot number>, and press Enter.
• For all the slots in the shelf, type: rollback --all, and press Enter.
2. Type: set set host-ip <ip> (the client’s IP address), and press Enter.
3. Type: set host-path <path> (the site to the desired file location at the client), and press Enter.
4. Type: set set user-name <user-name> (the user name expected from client), and press
Enter.
5. Type: change-user-password and press Enter; upon prompt write the password expected
from client, and press Enter.
2. Type: set cli-script-file-name<file name> (the script’s file name), and press Enter.
3. In order to download the file from the FTP client, type: download-archive cli-script, and press
Enter.
4. In order to see the upload status, type: get download-cli-script-status, and press Enter.
2. In order to execute the currently loaded script, type: cli-script execute, and press Enter.
3. In order to delete the currently loaded script, type: cli-script delete, and press Enter.
To set RX frequency:
1. Type cd /radio/rfu/ set atpc-ref-rx-level <reference level in dBm>, then press Enter.
To enable ATPC:
To set Link-ID:
NTP
To set NTP service enable/disable:
To set Date and Time, whereby the time and date format are day-month-year,hours:mins:secs:
SNMP
To set SNMP enable/disable:
2. Type set version v3 (or “v1” for SNMP version 1), and press Enter.
To set the security mode to authentication, and the authentication algorithm to sha:
To set the security mode to authentication-privacy, and the Authentication algorithm to md5:
To set the security mode to no-security, and the authentication algorithm to no authentication:
The following steps are used to define the web protocol that will work with HTTPS
Step 1: Create the NE certificate based on the NE's public key. The public key receives the public
key file through upload.
You can find your public_key file (such as 192.168.1.18_pub_key) in your host path directory.
Note: Before you download the certificate, copy your NE certificate to your ftp host path directory.
4. Type set security-file-name <MYCERT.crt> (your certificate file name), and press Enter.
Note: Enter the URL in the WEB GUI, such as https://192.168.1.1 to use the https protocol.
Domain
Under service-oam level
Creation:
IP-10:/interfaces/ethernet/bridge/service-oam> domain add <Domain name> <Domain level [1-7]>
, and press Enter.
Deletion:
IP-10:/interfaces/ethernet/bridge/service-oam> domain remove <Domain name> <Domain level
[1-7]> , and press Enter.
Creation:
IP-10:/interfaces/ethernet/bridge/service-oam> domain add <Domain name> <Domain level [1-7]>
<Association name> <VLAN ID [1-4090]> , and press Enter.
Deletion:
IP-10:/interfaces/ethernet/bridge/service-oam> domain remove <Domain name> <Domain level
[1-7]> <Association name> <VLAN ID [1-4090]> , and press Enter.
Association
Under service-oam level:
Creation
IP-10:/interfaces/ethernet/bridge/service-oam> association add <Association name> <Domain
name> <VLAN ID [1-4090]> , and press Enter.
Deletion
IP-10:/interfaces/ethernet/bridge/service-oam> association remove <Association name>
<Domain name> <VLAN ID [1-4090]> , and press Enter.
CCM
Under service-oam level
On
IP-10:/interfaces/ethernet/bridge/service-oam> ccm-admin enable <Domain level [1-7]> <VLAN
ID [1-4090]> , and press Enter.
Off
IP-10:/interfaces/ethernet/bridge/service-oam> ccm-admin disable <Domain level [1-7]> <VLAN
ID [1-4090]> , and press Enter.
Creation
1. IP-10:/interfaces/ethernet/bridge/eth-port [x]> mep set < MEP ID [1-8191]> < Domain level [1-
7]> <VLAN ID [1-4090]> < Direction [up/down]> <CCM VLAN Pbit priority [0-7]> , and press
Enter.
2. IP-10:/interfaces/ethernet/bridge/eth-port [x]> mep set < MEP ID [1-8191]> < Domain level [1-
7]> <VLAN ID [1-4090]> < Direction [up/down]> , and press Enter.
Deletion
IP-10:/interfaces/ethernet/bridge/eth-port [x]> mep remove < MEP ID [1-8191]> < Domain level [1-
7]> <VLAN ID [1-4090]> < Direction [up/down]> , and press Enter.
Remote MEP
Under service-oam level
Creation
1. IP-10:/interfaces/ethernet/bridge/service-oam> remote-mep set <Remote MEP ID [1-8191]>
<Domain name> <VLAN ID [1-4090]> <MAC address [xx:xx:xx:xx:xx:xx]> , and press Enter.
2. IP-10:/interfaces/ethernet/bridge/service-oam> remote-mep set <Remote MEP ID [1-8191]>
<Domain name> <VLAN ID [1-4090]> , and press Enter.
Deletion
MIP
Under interfaces level
Creation
IP-10:/interfaces/ethernet/bridge/eth-port[x]> mip add <Domain level [1-7]> , and press Enter.
Deletion
IP-10:/interfaces/ethernet/bridge/eth-port[x]> mip remove <Domain level [1-7]> , and press Enter.
Loopback (Ping)
Under service-oam level
1. IP-10:/interfaces/ethernet/bridge/service-oam> ping mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-name <Domain name> <VLAN ID[1-4090]> <VLAN Pbit priority[0-7]> ,
and press Enter.
2. IP-10:/interfaces/ethernet/bridge/service-oam> ping mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-name <Domain name> <VLAN ID[1-4090]> , and press Enter.
Link Trace
Under service-oam level
1. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-name <Domain name> <VLAN ID[1-4090]> <VLAN Pbit priority[0-7]> ,
and press Enter.
2. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-name <Domain name> <VLAN ID[1-4090]> , and press Enter.
3. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-level <Domain level[1-7]> <VLAN ID[1-4090]> <VLAN Pbit priority[0-
7]> , and press Enter.
4. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-level <Domain level[1-7]> <VLAN ID[1-4090]> , and press Enter.
5. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mep-id <Remote MEP ID[1-8191]>
md-name <Domain name> <VLAN ID[1-4090]> <VLAN Pbit priority[0-7]> , and press Enter.
6. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mep-id <Remote MEP ID[1-8191]>
md-name <Domain name> <VLAN ID[1-4090]> , and press Enter.
7. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mep-id <Remote MEP ID[1-8191]>
md-level <Domain level[1-7]> <VLAN ID[1-4090]> <VLAN Pbit priority[0-7]> , and press Enter.
8. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mep-id <Remote MEP ID[1-8191]>
md-level <Domain level[1-7]> <VLAN ID[1-4090]> , and press Enter.
Creation
1. IP-10:/interfaces/ethernet/bridge/service-oam> auto-linktrace add <Remote MEP ID [1-8191]>
md-name <Domain name> <VLAN ID[1-4090]> <VLAN Pbit priority[0-7]> , and press Enter.
2. IP-10:/interfaces/ethernet/bridge/service-oam> auto-linktrace add <Remote MEP ID [1-8191]>
md-name <Domain name> <VLAN ID[1-4090]> , and press Enter.
Deletion
1. IP-10:/interfaces/ethernet/bridge/service-oam> auto-linktrace remove <Remote MEP ID [1-
8191]> md-name <Domain name> <VLAN ID[1-4090]> , and press Enter.
2. IP-10:/interfaces/ethernet/bridge/service-oam> auto-linktrace remove <Remote MEP ID [1-
8191]> md-level <Domain level[1-7]> <VLAN ID[1-4090]> , and press Enter.
CCM Interval
Under service-oam level
Modification
IP-10:/interfaces/ethernet/bridge/service-oam> ccm-interval <interval time: 1-sec, 10-sec, 1-min,
10-min> <Domain level [1-7]> <VLAN ID [1-4090]> , and press Enter.
Modification
IP-10:/interfaces/ethernet/bridge/service-oam> set auto-linktrace-interval [seconds: range 60-
3600] , and press Enter.
Modification
IP-10:/interfaces/ethernet/bridge/service-oam> set remote-meps-learning-time [seconds: range
60-3600] , and press Enter.
Ring RSTP
Type cd /interfaces/ethernet/bridge/ set priority <priority no: range 0-61440, steps of 4096>,
and press Enter.
Page 598
QoS Exercises Handbook
List of exercises
• Exercise #1: VID Queuing
• Exercise #2: P-Bit Queuing
• Exercise #3: HRR as Egress Scheduling
• Exercise #4: IP-ToS (Precedence) Queuing
• Exercise #5: IP-ToS over VLAN P-Bits Queuing
• Exercise #6: VLAN P-Bits over IP-ToS Queuing
• Exercise #7: Applying an Egress Shaper
• Exercise #8: Applying an Egress Shaper with HRR
• Exercise #9: Applying a Policer
• Exercise #10: Queuing MACs
• Exercise #11: QoS using VLC Media Player
Required Setup
• N2X traffic generator*
• 2 IP-10R1/IP-10G IDUs
• 2 ODUs
• 1 Test kit (2 30 dB attenuators, SMA cable, 2 RF to WG adaptors)
• PC (EMS)
• 2 ETH straight cables / or FO with SFPs installed in IP-10
• 2 ETH Cross Cables
• VLC Media version 0.9.9 (freeware)
* Any traffic generator may be in use as long as it supports the following features:
• L2 802.1p/q
• L3 ToS / DSCP
• Multiple streams
• SFP GbE / RJ45 GbE
• RJ45 FE
Page 599
Guidelines
1. Establish a single link system
2. Set switch mode to Managed Switch on both IDUs
3. Assign a radio script as shown in diagram below
4. Make sure radio properties provide optimal capacity (RSL ~ -45dBm, MSE< -36dB)
5. Configure out of band management
6. Disable all TDM/auxiliary channels
7. Configure the N2X traffic generator to generate streams as shown below. 2 Main streams
(60Mbps) are transported from Left IDU to Right IDU. Secondary streams (1Mbps) are
transported from Right IDU to Left IDU.
8. Make sure you configure the exact parameters as depicted in each step.
9. It is strongly recommended to follow the exercises in the order of appearance.
3 8 8 3
N2X Configuration
MAC IP
stream VID P-Bit ToS
SA DA SA DA
S1 100 00:00:C0:01:01:02 00:00:00:00:00:02 1 192.1.1.2 192.2.1.2 111
MAC IP
stream VID P-Bit ToS
SA DA SA DA
S3 100 00:00:00:00:00:02 00:00:C0:01:01:02 1 192.2.1.2 192.1.1.2 111
Page 600
Exercise #1: VID Queuing
1. We apply QoS to left IDU to optimize the radio link (transport high priority services and
discard lower priority frames).
2. The radio script allows max. 42Mbps (L1) or 32 Mbps (L2, data rate). For detailed
explanation please review “PM presentation”.
3. In this exercise we prioritize the ingress services (port 3 left IDU) by VLAN ID.
4. Since both streams are forwarded to port 8, we apply the Egress Scheduling to port 8.
5. There is no need to apply QoS on right IDU since the radio link is already optimized.
QoS Configuration
Left IDU, Port 3 Ingress Queuing
st
1. 1 criteria (MAC): Disabled
nd
2. 2 criteria (VID): Queue Decision
rd
3. 3 criteria: VLAN P-Bits
4. Default classification: 1st queue
th
Left IDU, Port 8 Egress Queuing: 4 queue S.P.
Expected Results
Page 601
Exercise #2: P-Bit Queuing
1. In this exercise we maintain ingress transmission but apply a different Ingress Queuing
classification: by VLAN P-Bit.
2. To classify according to VLAN P-Bit, we need to configure first the VLAN P-Bit to Queue
Table (see below).
QoS Configuration
Left IDU, Port 3 Ingress Queuing
st
1. 1 criteria (MAC): Disabled
nd
2. 2 criteria (VID): Disabled
rd
3. 3 criteria: VLAN P-Bits
4. Default classification: 1st Queue
th
Left IDU, Port 8 Egress Queuing: 4 queue S.P.
• Default settings
st
• P-Bit 1 = 1 Queue
th
• P-Bit 7 = 4 Queue
Expected Results
Page 602
Exercise #3: HRR as Egress Scheduling
1. In this exercise we maintain ingress transmission but apply a different Egress Scheduling
to port 8: HRR.
2. To apply HRR, we need to configure first the Queue Weights Table (see below).
QoS Configuration
Left IDU, Port 3 Ingress Queuing
st
1. 1 criteria (MAC): Disabled
nd
2. 2 criteria (VID): Queue Decision
rd
3. 3 criteria: VLAN P-Bits
4. Default classification: 1st queue
Expected Results
Page 603
Exercise #4: IP-ToS (Precedence) Queuing
1. In this exercise we maintain ingress transmission but apply a different Ingress Queuing:
we classify packets according to Precedence bits (3).
2. To apply IP-ToS Queuing, we need to configure first the IP-Bits to Queue Table (see
below).
QoS Configuration
Left IDU, Port 3 Ingress Queuing
st
3. 1 criteria (MAC): Disabled
nd
4. 2 criteria (VID): Disabled
rd
5. 3 criteria: IP-TOS
6. Default classification: 1st queue
th
Left IDU, Port 8 Egress Queuing: 4 Queue S.P.
• Default settings
• 111 to Q4
• 101 to Q3
Expected Results
Page 604
Exercise #5: IP-ToS over VLAN P-Bits Queuing
rd
1. Change the 3 criteria to “IP-ToS over VLAN P-Bits”
2. There should not be any impact on received streams since we generate IP packets over
ETH frames (Switch is instructed to queue according to IP overhead).
Expected Results
Page 605
Exercise #6: VLAN P-Bits over IP-ToS Queuing
rd
1. Change the 3 criteria to “VLAN P-Bits over P-ToS”
2. Now the Switch is instructed to queue according to VLAN Tag – therefore the expected
results are as shown below
Expected Results
Page 606
Exercise #7: Applying an Egress Shaper
1. In this exercise we examine the functionality of the Egress Shaper
2. We maintain the same configuration for the left IDU
3. We apply a shaper to the egress port of right IDU (port 3)
4. If you followed the previous exercises according to the specified steps, Left IDU Queuing
policy would be “VLAN P-Bits over ToS” which means :
• Stream S1 is partially received (~17 Mbps)
• Stream S2 is fully received (~22 Mbps)
5. When we apply the shaper on port 3, the scheduler will empty the streams according to
their ingress queuing rules (port 8).
6. The default queuing classification for port 8 (right IDU) is VLAN P-Bits, same as the
ingress queuing classification on port 3 (left IDU).
7. This ingress queuing is only effective when BW of port 3 (Egress) is not sufficient
(Shaper is on).
Page 607
QoS Configuration
Left IDU, Port 3 Ingress Queuing
st
7. 1 criteria (MAC): Disabled
nd
8. 2 criteria (VID): Disabled
rd
9. 3 criteria: VLAN P-Bits over IP-TOS
10. Default classification: 1st queue
th
Left IDU, Port 8 Egress Queuing: 4 Queue S.P.
• Default settings
st
• P-Bit 1 = 1 Queue
th
• P-Bit 7 = 4 Queue
Right IDU, Port 3 Egress Shaper is ON, Shaping rate set to 10,000Kbps (10Mbps)
Expected Results
• Port 3 egress rate is reduced to 7.7Mbps (Data rate @64 bytes per frame)
• Only Stream S2 is partially received (higher P-Bit)
• Stream S1 is discarded (lower P-Bit)
Page 608
Exercise #8: Applying an Egress Shaper with HRR
1. In this exercise we apply HRR scheduling to the Egress port (port 3, right IDU)
2. As a result, egress traffic should be balanced according to your HRR settings (Queue
Weight Table).
3. It is therefore recommended to configure first the Queue Weight Table.
QoS Configuration
Left IDU, Port 3 Ingress Queuing
st
11. 1 criteria (MAC): Disabled
nd
12. 2 criteria (VID): Disabled
rd
13. 3 criteria: VLAN P-Bits over IP-TOS
14. Default classification: 1st queue
th
Left IDU, Port 8 Egress Queuing: 4 Queue S.P.
• Default settings
st
• P-Bit 1 = 1 Queue
th
• P-Bit 7 = 4 Queue
Right IDU, Port 3 Egress Queuing: HRR (set your preferred weights)
Right IDU, Port 3 Egress Shaper is ON, Shaping rate set to 10,000Kbps (10Mbps)
Expected Results
• Port 3 egress rate is reduced to ~7.7Mbps (Data rate @64 bytes per frame)
• Streams S1 & S2 are balanced according to HRR settings
Page 609
Exercise #9: Applying a Policer
1. In this exercise we apply a Rate Limiter on port 3 (left IDU).
2. Before we apply the Policer, we set off the Shaper to recover original settings
3. Policers can be configured to limit traffic according to their Ether-type: MC, unicast, etc.
4. We shall apply a generic condition as shown below.
QoS Configuration
Left IDU, Port 3 Ingress Queuing
st
1. 1 criteria (MAC): Disabled
nd
2. 2 criteria (VID): Disabled
rd
3. 3 criteria: VLAN P-Bits over IP-TOS
4. Default classification: 1st queue
th
Left IDU, Port 8 Egress Queuing: 4 Queue S.P.
• Default settings
st
• P-Bit 1 = 1 Queue
th
• P-Bit 7 = 4 Queue
Left IDU ports 3 – create & assign a Policer with the following criteria:
Expected Results
• Due to the Leaky Bucket characteristics of the Policer mechanism, the actual egress rate
(CIR) is reduced to a lower figure than configured CIR (users are advised to increase the
CBS to improve the CIR).
Page 610
Exercise #10: Queuing MACs
1. In this exercise we queue the ingress frames according to their MAC DA
2. We configure the MAC table to assign P-Bit 7 to all ingress frames with DA =
00:00:00:00:00:02
3. The N2X generates S1 with the required MAC DA and P-bit 1
4. The switch will overwrite the P-Bit and assign the frame to the queue we set in the Static
MAC table
MAC IP
stream VID P-Bit ToS
SA DA SA DA
S1 100 00:00:C0:01:01:02 00:00:00:00:00:02 1 192.1.1.2 192.2.1.2 111
QoS Configuration
Left IDU, Port 3 Ingress Queuing
st
1. 1 criteria (MAC): Queue Decision
nd
2. 2 criteria (VID): Disabled
rd
3. 3 criteria: VLAN P-Bits over IP-TOS
4. Default classification: 1st queue
th
Left IDU, Port 8 Egress Queuing: 4 Queue S.P.
MAC 00:00:00:00:00:02 with VID 100 is forwarded to ETH port 8 with P-Bit 7 (overwritten)
Expected Results
• Now S1 and S2 have the same queuing criteria (Q4). Therefore, both streams will be
received equally.
Page 611
QoS Demonstration
using VLC Media
Player
Page 612
Preliminary Configuration- VLC Server Configuration
1. Launch VLC application
2. In the main window – select Media / Streaming:
Click
here
Page 613
4. Configure the following settings:
Click
here
The video will now play on your server screen (delays may occurs due to insufficient
RAM)
Page 614
Preliminary Configuration- VLC Clients’ Configuration
1. Launch the VLC application
2. Select Media / Open Network:
3. In the Open Network window, configure the following and click PLAY:
Click
here
Page 615
Exercise #11: QoS Demo using VLC
Brief:
• The plan is to stream a video through the radio link to the remote IDU
• Client users connect their laptop to the remote IDU and observe live streaming
• The traffic generator will consume gradually the available BW of the radio
• As a result of specific QoS settings, the video will freeze / pixelize according to the ETH
traffic transmission rate
• Using the variable attenuator, we can also simulate link losses. With ACM enabled, the
video stream with lower priority will suffer first.
VLC Server
Port 4:
Access 200Mbps
VLAN 10 ACM enabled
Link with Variable Attenuator
Port 3:
Port 2 (GbE): Access
Trunk VLAN 10
VLAN 20 N2X Traffic Port 2 (GbE):
Generator Trunk
VLAN 20 Port 3:
Access
VLAN 20
VLAN 10
VLC VLC
Client Client
Page 616
1. Establish the setup as depicted in the diagram
2. N2X Configuration
• Connect port 1 (TX) to Left IDU Port 2 with the following attributes -
MAC IP
Stream VID P-Bit ToS
SA DA SA DA
S1 20 00:00:C0:01:01:02 00:00:00:00:00:02 1 192.1.1.2 192.2.1.2 111
Expected Results
1. Video streaming will die first and ETH will suffer losses
Page 617
6. Resume full radio capacity & Increase ETH Traffic to ~200
Mbps
Expected Results
Page 618
L2 Automatic State Propagation
Trainee Name:
Page 619
L2 GbE Automatic State Propagation Exercises Handbook
Required Setup
N2X traffic generator*
2 IP-10R1/IP-10G IDUs
2 ODUs
1 Test kit (2 30 dB attenuators, SMA cable, 2 RF to WG adaptors)
Variable attenuator
PC (EMS)
2 ETH straight cables / or FO with SFPs installed in IP-10
2 ETH Cross Cables
* Any traffic generator may be in use as long as it supports the following features:
L2 802.1p/q
RJ45 FE
Guidelines
1. Establish a single link system
2. Set switch mode to Managed Switch on both IDUs
3. Assign a radio script as shown in diagram below
4. Make sure radio properties provide optimal capacity (RSL ~ -45dBm, MSE< -36dB)
5. Configure out of band management
6. Disable all TDM/auxiliary channels
7. Configure the N2X traffic generator to generate streams as shown below. 2 Main streams
(60Mbps) are transported from Left IDU to Right IDU. Secondary streams (1Mbps) are
transported from Right IDU to Left IDU.
8. Make sure you configure the exact parameters as depicted in each step.
9. It is strongly recommended to follow the exercises in the order of appearance.
Page620
Page 1
Setup Diagram & Configuration
1 8 8 1
Variable attenuator
Please note – the enclosed exercises require that you change the physical settings of port 1
(RJ45 / SFPs). Please make sure you are familiar with such configuration prior to commencing
the exercises.
MAC
Stream VID P-Bit
SA DA
S1 100 00:00:C0:01:01:02 00:00:00:00:00:02 0
Right IDU
MAC
Stream VID P-Bit
SA DA
S2 100 00:00:00:00:00:02 00:00:C0:01:01:02 1
Page621
Page 2
Exercise #1: Automatic State Propagation | Single Pipe | SFP
In this exercise we simulate local LOC propagation triggered by Link ID mismatch
Expected Results
1. Check Current Alarms and expect for “Link ID Mismatch” alarm
2. GbE SFPs (GbE ports on both IDUs) are muted
3. Link is down
4. Management to Remote unit is down
5. Traffic is down on both ends
Your comments:
Page622
Page 3
Exercise #2: ASP OFF | Single Pipe | SFP
In this exercise we simulate normal link operation without ASP
Expected Results
1. Check Current Alarms and expect for “Link ID Mismatch” alarm
2. GbE SFPs (GbE ports on both IDUs) are NOT muted
3. Traffic is down on both ends
Your comments
Page623
Page 4
Exercise #3: Automatic State Propagation | Single Pipe | SFP
In this exercise we simulate how Remote fault LOC impacts local SFP
Expected Results
1. Both SFPs on both IDUs are shut down (link down)
2. Local EMS shows “Gigabit ETH LOC on port 1”
3. Remote EMS shows “GbE TX Mute override on port 1”
4. Traffic is down
Your comments
Page624
Page 5
Exercise #4: Automatic State Propagation | Single Pipe | RJ45
In this exercise we simulate local LOC propagation from Radio to RJ45
Expected Results
1. Both SFPs on both IDUs are shut down (link down)
2. Traffic is down
3. Radio link is down
Your comments
Page625
Page 6
Exercise #5: Automatic State Propagation | Managed | SFP
In this exercise we simulate local LOC propagation from Radio to SFP triggered
by ACM Threshold profile
Expected Results
1. Radio ports are logically closed
2. Traffic is down
3. Remote Management is down
Your comments
Page626
Page 7