Ceragon - IP-10R1 ADV - Book - V1.3

272
CERAGON FIBEAIR COURSE HANDBOOK Installation, Commissioning & System Configuration © 2010 Visit our Customer Training Portal at Training.Ceragon.Com or contact us at [email protected] Trainee Name:

Transcript of Ceragon - IP-10R1 ADV - Book - V1.3

  • CERAGON FIBEAIR

    COURSE HANDBOOK

    Installation, Commissioning

    & System Configuration

    2010

    Visit our Customer Training Portal at Training.Ceragon.Com

    or contact us at [email protected]

    Trainee Name:

  • Ceragon Training Center

    eLearning provides a first

    tier of support to users of

    new technologies,

    resulting in an estimated

    30% reduction in support

    costs related to

    implementation of new

    applications & business

    processes.eLearning is a great

    complementary solution to

    your classroom sessions as

    some modules are only

    available on-line

    24/7 access to

    constantly increasing

    on-line DB of the

    latest information!

    eLearning

    is proven to be less

    intimidating than

    Instructor led training.

    Concerns about making

    mistakes in front of peers

    and management are

    eliminated.

    Ceragon Training Center is designed

    to help you get a comprehensive

    understanding with Ceragon's

    technology, products and network

    solutions.

    While individuals focus on particular

    modules, Managers on the other

    hand can sign up their staff members

    to a Learning Program with

    compulsory items such as quizzes &

    procedures.

    Ceragon eLearning users enjoy

    frequent & updated modules as

    new features and products are

    released without needing to

    update users account properties.

    Want to find out more? Need an Account Comparison Table?

    Need a proposal? Case studies?

    Please contact us at

    [email protected]

    Ceragon eLearning

    solutions can shorten the

    amount of time it takes to

    get learners up to speed on

    new products and

    processes.

    Users who need to "brush

    up" on a process can

    access a module instantly,

    practice, test themselves

    and resume their work.

    Ceragon Training

    Knowledgebase is available to

    your employees without

    sacrificing additional room

    space or time-consuming

    lectures.

  • 1 Ceragon Training Agenda v2.0

    Ceragon Training Agenda

    Product: IP-10

    Course: IP10AO&M Extended Operation and Maintenance

    Duration: 3 days

    DAY ONE

    Introduction to Radio Microwave:

    Parameters affecting propagation (Fresnel Zone, Duct, Multipath) Digital Modulation Basics Radio Link Components MSE

    Introduction to 802.1:

    The need for smaller broadcast domains Standard Ethernet Frame VLAN Tagging P-Bits & VID Q-in-Q

    Introduction to IP-10 IDU

    IP-10 Front Panel Description

    Introduction to RFU-C / or other ODU type

    Installation:

    Physical Installation of IDU + ODU IP address using CLI

    Commissioning:

    System name & Contact Details (Unit Info) Reading Versions External Alarms Setting IP Address and Management (In Band / OOB) Trap Destination Updating the license

    Radio Link Commissioning:

    Frequencies TSL & RSL & MSE ATPC Management (In band / OOB) Link ID Local & Remote frequency change

    Ceragon Training Handbook - Page 1

  • 2 Ceragon Training Agenda v2.0

    Ceragon Training Agenda

    DAY TWO

    Adaptive Coding & Modulation (ACM)

    Switch Mode Configuration:

    Single Pipe Managed Mode Metro Mode

    Interface Configuration:

    ETH Ports (Trunk VS. Access) E1 Ports

    Troubleshooting Tools & Maintenance:

    Using the Current Alarms Using the Event Log Using RMON Registers and Statistics Performing Loopbacks Saving Unit Information Files Configuration File Upload / Download Software File Download

    DAY THREE

    1+1 Protection: Configuration Review

    1+1 Protection: Practical Exercise

    QoS: Configuration Review

    QoS: Practical Exercises

    Introduction to CFM (802.1ag)

    CFM: Practical Exercises

    Q-in-Q: Configuration Review

    Q-in-Q: Practical Exercise

    Ceragon Training Handbook - Page 2

  • 3/8/2010

    1

    Ceragon in a Nutshell

    Products

    Proprietary and Confidential

    Agenda

    2

    Think Backhaul Networks

    1. 1500R IDU

    2. IP-MAX^2 IDU

    3. IP-10 IDU

    4. IP-10G IDU

    5. Nodal Solutions

    6. 3200T IDU

    7. Outdoor units

    8. Outdoor Enclosures

    Ceragon Training Handbook - Page 3

  • 3/8/2010

    2

    Proprietary and Confidential

    Ceragon FibeAir Family

    3

    Carrier Ethernet Switch TDM Cross Connect

    Native2 Radio

    Ethernet + TDM

    ACM Ch-STM1/OC3

    Terminal

    Mux

    E1/T1FastEthernet

    Gigabit

    Ethernet

    10-500Mbps, 7-56MHz

    OA&M Service Management Security

    RFU (6-38GHz)

    XPIC

    Multi

    Radio

    SD/FD

    Proprietary and Confidential

    IDU 1500R Point to Point SDH Radio Link

    4

    STM RingSTM Ring

    Ceragon Training Handbook - Page 4

  • 3/8/2010

    3

    Proprietary and Confidential

    IDU 1500R SDH RING

    5

    XC

    PSN

    XC

    N x STM-1/OC-3

    Aggregation Site

    ADM/MSPP

    Ceragon

    FibeAir 1500R

    Proprietary and Confidential

    IP-MAX^2 IDU: GbE Backhaul

    6

    IP/ETH

    Provider

    network

    ETH

    Ceragon Training Handbook - Page 5

  • 3/8/2010

    4

    Proprietary and Confidential

    IP-10 IDU: Enhanced Cellular Backhaul

    7

    IP/ETH

    Provider

    network

    Cellular

    traffic

    (TDM)

    N x ETH

    Proprietary and Confidential

    IP-10G IDU: A Nodal Solution

    8

    STM

    Rings

    Cellular traffic

    (TDM)

    Ceragon Training Handbook - Page 6

  • 3/8/2010

    5

    Proprietary and Confidential

    3200T All Indoor: High Capacity Trunk

    9

    SDH

    Proprietary and Confidential

    3200T Split Mount: High Capacity Trunk

    10

    SDH

    Ceragon Training Handbook - Page 7

  • 3/8/2010

    6

    Proprietary and Confidential

    RFUs

    FibeAir RFU-HP FibeAir RFU-HS FibeAir RFU-P FibeAir RFU-C

    High power(e.g. Smaller antennas reduced cost)

    Standard power

    Proprietary and Confidential

    Outdoor Enclosures Solution Benefits

    Full Outdoor solution:

    Dust and weather proof

    Compact size reduces the cost of leasing or purchasing rack space.

    Ideal for Greenfield areas, at solar-powered sites, and at repeater sites adjacent to highways.

    One-man installation and shorter cabling reduce installation costs.

    Environment-friendly: Greener deployments, saving on power and air-conditioning costs.

    Ceragon Training Handbook - Page 8

  • 3/8/2010

    7

    Proprietary and Confidential13

    CoreSite

    HubSite

    Tail site

    Native2 - Is a technology for carrying both TDM and Ethernet traffic Natively

    over the same microwave links with dynamic bandwidth allocation.

    FibeAir

    IP-10

    BSC/MSC

    Native E1/T1

    Native Ethernet

    Native2 (MW links) IP/MPLS (Hybrid Fiber/MW)

    FibeAir

    IP-10

    NG-SDH

    MSPP

    E1/T1 over SDH/SONET

    n x T1/E1

    FE/GE

    GE

    STM1/

    OC3

    STM1/

    OC3

    Hybrid aggregation network for migrationNative2 at the access, IP/MPLS & SDH/SONET at the aggregation

    RNC

    GE

    MPLS

    Router

    SDH/SONET (Hybrid Fiber/MW)

    MPLS

    Router

    Ethernet over IP/MPLS

    NG-SDH

    MSPP

    Proprietary and Confidential

    Aggregating WiMAX / LTE Ready

    14

    Hub / Aggregation site

    WiMAX / 4G / LTE

    Cellular site

    Business center

    WiMAX

    Ceragon

    2G/3G base station

    Wireless Carrier Ethernet

    Backhaul Network

    Ceragon

    Core IP BackboneAccess Metro / Aggregation

    WiMAXPoint to Multipoint solution for Ethernet traffic

    aggregation and statistical

    multiplexing for a mix of Business

    and mobile offload Ceragon Point

    to Point for TDM aggregation

    Ceragons Point to Point backhaul supports Native Ethernet with traffic

    QoS awareness

    Ethernet traffic is tunneled through

    E-LAN/ E-Line EVCs

    TDM traffic (E1/T1) are being

    aggregated using Ceragon integrated

    TDM cross connect

    Ethernet (GE) is sent over to an

    IP/MPLS Layer

    TDM (STM-1/OC-3) is sent over to

    an SDH/SONET layer

    Ceragon High-capacity "MPLS-

    aware" Ethernet microwave radio is

    used where fiber connections not

    available.

    TDM

    E1/T1

    STM-1 / OC-3

    GE

    Ceragon Training Handbook - Page 9

  • 3/8/2010

    8

    Proprietary and Confidential

    Ceragons Advantages

    High Spectral-Efficiency

    High System-Gain

    Multi-Service Concentration capabilities

    High Level of Redundancy

    Adaptive Modulation

    Pay-as-you-grow concept

    15

    Proprietary and Confidential

    High Spectral-Efficiency(i.e. 256QAM modulation)

    Providing more capacity at any given frequency resources e.g. 18xE1 or 50Mbps @ 7MHz channel-bandwidth

    Better utilizing valuable frequency resources e.g. using high spectral efficiency we provide 155-200Mbps @ 28MHz, using a Single wireless link!

    Average microwave will require Two links causing higher CAPEX and consume additional valuable frequency

    Get the same capacity

    with ONE link

    instead of TWO!

    Ceragon Training Handbook - Page 10

  • 3/8/2010

    9

    Proprietary and Confidential

    TypicalMicrowave Radio

    IP10Microwave Radio

    Required Capacity

    155-200Mbps

    TWO radio links

    or

    56MHz channel bandwidth

    ONE radio link

    using

    28MHz channel bandwidth

    Required Capacity

    70-100Mbps

    28MHz

    Channel Bandwidth

    14MHz

    Channel Bandwidth

    The operator saves CAPEX

    and free-up valuable frequency resources

    Higher Spectral-EfficiencyWhats in it for The Operator?

    Proprietary and Confidential

    Higher Spectral-Efficiency is not enough

    18

    should always be coupled with

    Radio Type Ant. Diameter Length Modulation Capacity

    Typical System Gain 1.80 m 30 Km 16QAM 32 x E1s

    Typical System Gain 1.80 m 21 Km 128QAM STM-1/OC-3

    Typical System Gain 3.00 m 30 Km 128QAM STM-1/OC-3

    High System Gain 1.80 m 30 km 128QAM STM-1/OC-3High System Gain

    Spectral Efficiency

    System Gain

    Ceragon Training Handbook - Page 11

  • 3/8/2010

    10

    Proprietary and Confidential19

    Ceragons Management Overview

    IP-10 FibeAir

    Proprietary and Confidential

    We adjust to customers

    requirements

    20

    Ceragon Training Handbook - Page 12

  • 3/8/2010

    11

    Thank You!

    [email protected]

    Ceragon Training Handbook - Page 13

  • Advanced Operation & Maintenance Course1

    Proprietary and Confidential

    Introduction to 802.1 P/Q

    Module Version v2.6

    Proprietary and Confidential

    Objectives

    2

    Understand the need for smaller broadcast domains

    Understand what is VLAN

    Understand the difference between tagged and untagged frame

    Understand VLAN applications

    Ceragon Training Handbook - Page 14

  • Advanced Operation & Maintenance Course2

    Proprietary and Confidential

    Associated IEEE Standards

    3

    IEEE 802.3 : Ethernet (Max. frame size = 1518 bytes)

    IEEE 802.3ac : Ethernet (Max. frame size = 1522 bytes)

    IEEE 802.1 d : MAC Bridge first introduced the concept of Filtering Services in a bridged local network

    IEEE 802.1 q : VLAN Tagging

    IEEE 802.1 p : Priority Tagging / Mapping

    IEEE 802.1ag : OAM (CFM)

    Proprietary and Confidential

    What is VLAN?

    Advantages for using VLAN

    Regular Ethernet frame

    Tagged frame structure

    Types of VLAN

    Types of connections

    802.1P implementations

    2 of 19

    AgendaAgenda

    4

    Ceragon Training Handbook - Page 15

  • Advanced Operation & Maintenance Course3

    Proprietary and Confidential

    A Layer 2 Protocol which enables enhanced

    traffic maneuvers :

    Prioritization Filtering Provisioning Mapping (e.g. - ATM to/from ETH)

    4 of 19

    What is VLAN?

    5

    Proprietary and Confidential5 of 19

    What is VLAN?

    Regular ETH networks forward broadcast frames to all endpoints

    6

    Ceragon Training Handbook - Page 16

  • Advanced Operation & Maintenance Course4

    Proprietary and Confidential6 of 19

    VLAN networks forward broadcast frames only to pre-defined ports

    (Profile Membership)

    VLAN 1

    VLAN 547

    Switch ports

    What is VLAN?

    7

    Proprietary and Confidential

    Breaking large networks into smaller parts (Formation of virtual workgroups)

    Simplified Administration (no need for re-cabling when user moves)

    Improving Broadcast & Multicast traffic utilization

    Mapping expensive backbones (ATM) to simpler & cheaper ETH backbones

    Security establishing tunnels / trunks through the network for dedicated users (traffic between VLANs is restricted).

    3 of 19

    Advantages of VLAN

    8

    Ceragon Training Handbook - Page 17

  • Advanced Operation & Maintenance Course5

    Proprietary and Confidential7 of 19

    Before we start explaining bit by bit, what is VLAN

    and how does it work, let us review first the

    structure of a regular ETH frame

    9

    Proprietary and Confidential8 of 19

    Preamble + SFD DA SA Length / Type DATA + PAD FCS

    6 Bytes 6 Bytes8 Bytes 2 Bytes 46 - 1500 Bytes4 Bytes

    (32-bit

    CRC)

    FCS is created by the sender and recalculated by the receiver

    Length / Type < 1500 - Parameter indicates number of Data Bytes

    Length / Type > 1536 - Parameter indicates Protocol Type (PPPoE, PPPoA, ARP etc.)

    Minimum 64 Bytes < FRAME SIZE < Maximum 1518 Bytes

    Untagged Ethernet Frame

    10

    Ceragon Training Handbook - Page 18

  • Advanced Operation & Maintenance Course6

    Proprietary and Confidential4 of 429 of 19

    Additional information is inserted

    Frame size increases to 1522 Bytes

    4 Bytes

    16 Bit

    3 Bit 1 Bit 12 Bit

    TPID = 0x8100 TCI

    CFIP-TAG VLAN ID

    TPID = Tag protocol ID

    TCI = Tag Control Information

    CFI = 1 bit canonical Format Indicator

    Preamble + SFD DA SA Length / Type DATA + PAD FCSLength / Type

    Tagged Ethernet Frame

    11

    Proprietary and Confidential

    VLAN ID uses 12 bits, therefore the number of maximum VLANs is

    4094:

    2^12 = 4096

    VID 0 = reserved

    VID 4096 = reserved (every vendor may use some VIDs for internal purposes such as MNG etc.)

    VID 1 = default

    After tagging a frame, FCS is recalculated

    CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames

    over ETH backbones (some vendors may use CFI for internal purposes)

    Tagging a Frame

    12

    Ceragon Training Handbook - Page 19

  • Advanced Operation & Maintenance Course7

    Proprietary and Confidential

    Protocol type Value

    Tagged Frame 0x8100

    ARP 0x0806

    Q-in-Q (CISCO) 0x8100

    Q-in-Q (other vendors) 0x88A8

    Q-in-Q (other vendors) 0x9100

    Q-in-Q (other vendors) 0x9200

    RARP 0x8035

    IP 0x0800

    IPv6 0x86DD

    PPPoE 0x8863/0x8864

    MPLS 0x8847/0x8848

    IS-IS 0x8000

    LACP 0x8809

    802.1x 0x888E

    TPID in tagged frames in always set to

    0x8100

    TPID / ETHER-Type / Protocol Type

    It is important that you understand

    the meaning and usage of this

    parameter

    Later when we discuss QoS, we

    shall demonstrate how & why the

    system audits this parameter

    13

    Proprietary and Confidential10 of 19

    Membership by Port

    VIDPort

    11

    12

    443

    2004

    PRO easy configured

    CON no user mobility

    VID1

    VID1

    VID 44

    VID200

    VLAN types

    14

    Ceragon Training Handbook - Page 20

  • Advanced Operation & Maintenance Course8

    Proprietary and Confidential11 of 19

    Membership by MAC

    VIDMAC

    100:33:ef:38:01:23

    100:01:de:22:42:ae

    4400:20:8f:40:15:ef

    20000:20:32:35:ea:11

    PRO user mobility, no reconfiguration when PC moves

    CON needs to be assigned initially, not an easy task with

    thousands of endpoints

    VLAN types

    15

    Proprietary and Confidential12 of 19

    Membership by Subnet Address (a.k.a. Layer 3 VLAN)

    VIDSubnet Address

    110.0.0.0 / 24

    120.0.0.0 / 30

    4411.0.0.0 / 24

    200192.168.1.0 / 24

    Membership is based on the Layer 3 header

    No process of IP address is done

    Main disadvantage longer overall throughput

    VLAN types

    16

    Ceragon Training Handbook - Page 21

  • Advanced Operation & Maintenance Course9

    Proprietary and Confidential

    Membership by Protocol Type

    VIDProtocol Type

    1IP

    44IPX

    The VID is derived from the protocol type field

    found in the Layer 2 header

    13 of 19

    VLAN types

    17

    Proprietary and Confidential14 of 19

    VLAN aware Switch

    Device unaware of VLANs

    transmits untagged

    (regular) ETH frames

    Switch tags the ingress

    frames with VID according

    to specific Tagging

    mechanism

    Access Port a port which is not aware of VLANs

    (Cannot tag outgoing frames or un-tag incoming frames)

    A

    Port Types

    18

    Ceragon Training Handbook - Page 22

  • Advanced Operation & Maintenance Course10

    Proprietary and Confidential14 of 19

    Device unaware of VLANs

    transmits untagged

    (regular) ETH frames

    Switch tags the ingress frames with VID according to

    specific Tagging mechanism

    Switch un-tags frames with VID received from network

    and delivers untagged frames to Access ports

    Trunk Port a port which is aware of VLANs

    (Can tag or un-tag incoming frames)

    VLAN aware Switch

    A T

    Port Types

    19

    Proprietary and Confidential

    VLAN aware Switch

    14 of 1914 of 19

    Trunk Port can carry tagged frames with different VIDs.

    This requires Port Membership configuration.

    AT

    A A

    This port is not a member of the Trunk

    port membership list, hence, traffic is

    discarded

    Port Types

    20

    Ceragon Training Handbook - Page 23

  • Advanced Operation & Maintenance Course11

    Proprietary and Confidential

    VLAN

    aware Switch

    15 of 19

    Q-in-Q (A.K.A. Double TaggingVLAN Encapsulation)

    Enhanced security not exposing original VID

    Improved flexibility of VID in the network

    (Ingress VID was already assigned in the network)

    CN PN

    +

    Port Types

    21

    Introduction to QoS / CoS

    22

    Ceragon Training Handbook - Page 24

  • Advanced Operation & Maintenance Course12

    Proprietary and Confidential

    We can extend the benefits of ATM QoS into Ethernet LANs to guarantee Ethernet priorities

    across the ATM backbone. A L2 switch or L3 router reads incoming 802.1p or IP ToS priority

    bits, and classifies traffic accordingly.

    To match the priority level with the appropriate ATM service class and other parameters, the

    switch then consults a mapping table with pre-defined settings.

    CBR

    VBR

    UBR

    P-Tag 6

    P-Tag 4

    P-Tag 0

    Mapping ATM QoS over ETH CoS (RFC 1483)

    Core

    Site

    Hub

    Site

    Tail site

    RNC

    BSC/MSC

    FibeAir

    IP-10

    n x T1/E1

    FE/GE

    GE

    GE

    STM1/

    OC3

    ATM

    Router

    MPLS

    RouterIP-10

    23

    Proprietary and Confidential 16 of 19

    Mapping ETH to MPLS and vice versa

    Core

    Site

    Hub

    Site

    Tail site

    RNC

    BSC/MSC

    FibeAir

    IP-10

    n x T1/E1

    FE/GE

    GE

    GE

    STM1/

    OC3

    STM1/

    OC3

    MPLS

    Router

    MPLS

    RouterIP-10

    IP-10s L2 switch can take part in the process of transporting

    services through MPLS core

    Frames/services are mapped to MPLS FECs according to:

    VLAN ID mapped to MPLS EXP bits

    VLAN P-Bit mapped to MPLS EXP bits

    24

    Ceragon Training Handbook - Page 25

  • Advanced Operation & Maintenance Course13

    Proprietary and Confidential

    802.1P utilizes Traffic Classes:

    A switch port allocates ingress frames to

    queues (buffers) according to their P-Tag

    value

    The more queues the more prioritizing

    levels (classes)

    Downside more time, more memory

    Normally 4 queues (TCs) are sufficient

    In this example the port groups a few Bits

    into a single queue

    8 priority levels become 3 classes

    25

    VLAN P-Bit Remap (Traffic Classes)

    Q4 High

    Q3

    Q2

    Q1 Low

    P-Bits 6-7

    P-Bits 4-5

    P-Bits 0-3

    Proprietary and Confidential

    Ingress

    P-TagsNumber of Available Traffic Classes

    1 2 3 4 5 6 7 8

    0 (default) 0 0 0 0 0 1 1 1

    1 0 0 0 0 0 0 0 0

    2 0 0 0 1 1 2 2 2

    3 0 0 0 1 1 2 3 3

    4 0 1 1 2 2 3 4 4

    5 0 1 1 2 2 3 4 5

    6 0 1 2 3 3 4 5 6

    7 0 1 2 3 4 5 6 7

    Egress P-Tag

    IEEE Recommendation

    The following table shows

    IEEE definition of traffic

    classes

    It shows the ingress options

    for P-Tag VS. egress P-tag

    The number of egress

    priorities (classes) depend

    on the number of assigned

    queues

    26

    VLAN P-Bit Remap (Traffic Classes)

    Ceragon Training Handbook - Page 26

  • Advanced Operation & Maintenance Course14

    Proprietary and Confidential

    Acronyms

    ETH Ethernet NIC Network Internet Card VID Vlan ID VLAN Virtual LAN P-TAG Priority Tag, Priority Bits CFI Canonical Format Indicator TPID Tag Protocol Identifier FCS Frame Check Sequence DA Destination Address SA Source Address QoS Quality of Service

    27

    Proprietary and Confidential

    Thank You !

    [email protected]

    28

    Ceragon Training Handbook - Page 27

  • 1Mean Square Error

    Proprietary and Confidential

    Agenda

    MSE Definition

    Expected value

    The Error Histogram

    Giving bigger differences more weight than smaller differences

    Calculating MSE

    MSE in digital modulation

    Commissioning with MSE

    MSE and ACM

    2

    Ceragon Training Handbook - Page 28

  • 2Proprietary and Confidential

    MSE - Definition

    MSE is used to quantify the difference between an estimated (expected)

    value and the true value of the quantity being estimated

    MSE measures the average of the squared errors:

    MSE is a sort of aggregated error by which the expected value differs

    from the quantity to be estimated.

    The difference occurs because of randomness or because the receiver

    does not account for information that could produce a more accurate

    estimated RSL

    3

    Proprietary and Confidential

    To simplify.

    Imagine a production line where a machine needs to insert one part

    into the other

    Both devices must perfectly match

    Let us assume the width has to be 10cm wide

    We took a few of parts and measured them to see how many can

    fit in.

    4

    Ceragon Training Handbook - Page 29

  • 3Proprietary and Confidential

    The Errors Histogram

    (Gaussian probability distribution function)

    To evaluate how accurate our machine is, we need to know how many parts

    differ from the expected value

    9 parts were perfectly OK

    10cm 12cm 16cm6cm 7cm

    width

    Quantity

    3

    23

    1

    9 Expected value

    5

    Proprietary and Confidential

    The difference from Expected value

    To evaluate the inaccuracy (how sever the situation is) we measure how

    much the errors differ from expected value

    10cm 12cm 16cm6cm 7cm

    width

    Quantity

    Error = + 6 cm

    Error = - 3 cm

    Error = + 2 cm

    Error = 0 cm

    Error = - 4 cm

    6

    Ceragon Training Handbook - Page 30

  • 4Proprietary and Confidential

    Giving bigger differences more weight than

    smaller differences

    We convert all errors to absolute values and then we square them

    The squared values give bigger differences more weight than smaller

    differences, resulting in a more powerful statistics tool:

    16cm parts are 36 units away than 2cm parts which are only 4 units away

    10cm 12cm 16cm6cm 7cm

    width

    Quantity

    + 6 cm = 36

    -3 cm = 9

    + 2 cm = 4

    Error = 0 cm

    - 4 cm = 16

    7

    Proprietary and Confidential

    Calculating MSE

    To evaluate the total errors, we sum all the squared errors and take the

    average:

    16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13

    The bigger the errors (differences) >> the bigger MSE becomes

    10cm 12cm 16cm6cm 7cm

    width

    Quantity

    + 6 cm = 36

    -3 cm = 9

    + 2 cm = 4

    Error = 0 cm

    - 4 cm = 16

    8

    Ceragon Training Handbook - Page 31

  • 5Proprietary and Confidential

    Calculating MSE

    If all parts were perfectly produced than each error would be 0

    This would result in MSE = 0

    Conclusion: systems perform best when MSE is minimum

    10cm

    width

    Quantity Error = 0 cm

    9

    Proprietary and Confidential

    MSE in digital modulation (Radios)

    Let us use QPSK (4QAM) as an

    example:

    QPSK = 2 bits per symbol

    2 possible states for I signal

    2 possible states for Q signal

    = 4 possible states for the

    combined signal

    The graph shows the expected

    values (constellation) of the

    received signal (RSL)

    0001

    1011

    I

    Q

    10

    Ceragon Training Handbook - Page 32

  • 6Proprietary and Confidential

    MSE in digital modulation (Radios)

    The black dots represent the

    expected values (constellation)

    of the received signal (RSL)

    The blue dots represent the

    actual RSL

    Similarly to the previous

    example, we can say that the

    bigger the errors are the

    harder it becomes for the

    receiver to detect & recover the

    transmitted signal

    0001

    1011

    I

    Q

    11

    Proprietary and Confidential

    MSE in digital modulation (Radios)

    MSE would be the average

    errors of e1 + e2 + e3 + e4.

    When MSE is very small the

    actual signal is very close to

    the expected signal

    0001

    1011

    I

    Q

    e1

    e2

    e3e4

    12

    Ceragon Training Handbook - Page 33

  • 7Proprietary and Confidential

    MSE in digital modulation (Radios)

    When MSE is too big, the

    actual signal (amplitude &

    phase) is too far from the

    expected signal

    0001

    1011

    I

    Q

    e1

    e2

    e3e4

    13

    Proprietary and Confidential

    Commissioning with MSE in EMS

    When you commission your

    radio link, make sure your MSE

    is small (-37dB)

    Actual values may be read

    -34dB to -35dB

    Bigger values (-18dB) will

    result in loss of signal

    14

    Ceragon Training Handbook - Page 34

  • 8Proprietary and Confidential

    MSE and ACM

    When the errors become too big,

    we need a stronger error correction

    mechanism (FEC)

    Therefore, we reduce the number

    of bits per symbol allocated for data

    and assign the extra bits for

    correction instead

    For example

    256QAM has great capacity but

    poor immune to noise

    64QAM has less capacity but much

    better immune for noise

    ACM Adaptive Code Modulation

    15

    16

    Thank You !

    [email protected]

    Ceragon Training Handbook - Page 35

  • 3/8/2010

    1

    ACM - Adaptive Code Modulation

    Proprietary and Confidential

    FibeAir IP-10s Key Feature

    IP-10 utilizes a unique Adaptive Coding & Modulation (ACM)

    Modulation range: QPSK - 256QAM

    Modulation changes to maintain link when radio signal degrades

    Mechanism automatically recovers to max. configured modulation when received signal improves

    Optimized for mobile backhaul all-IP and TDM-to-IP migration

    2

    Ceragon Training Handbook - Page 36

  • 3/8/2010

    2

    Proprietary and Confidential

    Adaptive Coding and Modulation

    Utilize highest possible modulation considering the changing environmental

    conditions

    Hitless & errorless switchover between modulation schemes

    Maximize spectrum usage - Increased capacity over given bandwidth

    Service differentiation with improved SLA

    Increased capacity and availability

    3

    Proprietary and Confidential4

    Adaptive Coding and Modulation

    Non-real time

    services

    Voice & real time

    servicesWeak

    FEC

    Strong

    FEC

    When we engineer our services, we may assign certain services to highest

    priority

    When ACM is enabled and link degrades, highest priority services are

    maintained

    Ceragon Training Handbook - Page 37

  • 3/8/2010

    3

    Proprietary and Confidential

    IP-10 Enhanced ACM Support

    8 modulation/coding working points (~3db system gain for each point change)

    Hit-less and Error-less modulation/coding changes based on signal quality

    E1/T1 traffic has higher priority over Ethernet traffic

    Each E1/T1 service is assigned a priority - enables differentiated E1/T1 dropping during severe link degradation

    Integrated QoS with intelligent congestion management - ensures high priority Ethernet traffic is not affected during link fading

    Zero downtime - A must for mission-critical services

    Throughput per radio carrier:

    10 to 50 Mbps @ 7MHz Channel

    25 to 100 Mbps @ 14MHz Channel

    45 to 220 Mbps @ 28 MHz Channel

    90 to 500 Mbps @ 56 MHz Channel

    5

    MSE is analyzed to trigger

    ACM modulation changes

    Proprietary and Confidential

    IP-10 radio capacity - ETSI

    Ethernet capacity depends on average packet size

    ACM

    Point

    Modulation # of

    E1s

    Ethernet

    Capacity

    (Mbps)

    1 QPSK 16 38 - 54

    2 8 PSK 22 53 - 76

    3 16 QAM 32 77 - 110

    4 32 QAM 44 103 - 148

    5 64 QAM 54 127 - 182

    6 128 QAM 66 156 - 223

    7 256 QAM 71 167 - 239

    8 256 QAM 75 183 - 262

    ACM

    Point

    Modulation # of

    E1s

    Ethernet

    Capacity

    (Mbps)

    1 QPSK 32 76 - 109

    2 8 PSK 48 114 - 163

    3 16 QAM 64 151 - 217

    4 32 QAM 75 202 - 288

    5 64 QAM 75 251 - 358

    6 128 QAM 75 301 - 430

    7 256 QAM 75 350 - 501

    8 256 QAM 75 372 - 531

    7MHz

    ACM

    Point

    Modulation # of

    E1s

    Ethernet

    Capacity

    (Mbps)

    1 QPSK 23 56 - 80

    2 8 PSK 34 82 - 117

    3 16 QAM 51 122 - 174

    4 32 QAM 65 153 - 219

    5 64 QAM 75 188 - 269

    6 128 QAM 75 214 - 305

    7 256 QAM 75 239 - 342

    8 256 QAM 75 262 - 374

    ACM

    Point

    Modulation # of

    E1s

    Ethernet

    Capacity

    (Mbps)

    1 QPSK 4 9.5 13.5

    2 8 PSK 6 14 20

    3 16 QAM 8 19 28

    4 32 QAM 10 24 34

    5 64 QAM 12 28 40

    6 128 QAM 13 32 46

    7 256 QAM 16 38 54

    8 256 QAM 18 42 60

    ACM

    Point

    Modulation # of

    E1s

    Ethernet

    Capacity

    (Mbps)

    1 QPSK 8 20 - 29

    2 8 PSK 12 29 - 41

    3 16 QAM 18 42 - 60

    4 32 QAM 20 49 70

    5 64 QAM 24 57 82

    6 128 QAM 29 69 - 98

    7 256 QAM 34 81 - 115

    8 256 QAM 37 87 - 125

    14MHz

    28MHz 40MHz 56MHz

    6

    Ceragon Training Handbook - Page 38

  • 3/8/2010

    4

    Proprietary and Confidential

    IP-10 radio capacity - FCC

    Ethernet capacity depends on average packet size

    ACM

    Point

    Modulation # of

    T1s

    Ethernet

    Capacity

    (Mbps)

    1 QPSK 22 39 - 55

    2 8 PSK 35 62 - 89

    3 16 QAM 52 93 - 133

    4 32 QAM 68 120 - 171

    5 64 QAM 80 142 - 202

    6 128 QAM 84 164 - 235

    7 256 QAM 84 185 - 264

    8 256 QAM 84 204 - 292

    ACM

    Point

    Modulation # of

    T1s

    Ethernet

    Capacity

    (Mbps)

    1 QPSK 37 65 - 93

    2 8 PSK 59 105 - 150

    3 16 QAM 74 131 - 188

    4 32 QAM 84 167 - 239

    5 64 QAM 84 221 - 315

    6 128 QAM 84 264 - 377

    7 256 QAM 84 313 - 448

    8 256 QAM 84 337 - 482

    10MHz

    ACM

    Point

    Modulation # of

    T1s

    Ethernet

    Capacity

    (Mbps)

    1 QPSK 31 56 - 80

    2 8 PSK 46 82 - 117

    3 16 QAM 69 122 - 174

    4 32 QAM 84 153 - 219

    5 64 QAM 84 188 - 269

    6 128 QAM 84 214 - 305

    7 256 QAM 84 239 - 342

    8 256 QAM 84 262 - 374

    ACM

    Point

    Modulation # of

    T1s

    Ethernet

    Capacity

    (Mbps)

    1 QPSK 7 13 18

    2 8 PSK 10 19 27

    3 16 QAM 16 28 40

    4 32 QAM 18 32 46

    5 64 QAM 24 42 61

    6 128 QAM 28 50 71

    7 256 QAM 30 54 78

    8 256 QAM 33 60 85

    ACM

    Point

    Modulation # of

    T1s

    Ethernet

    Capacity

    (Mbps)

    1 QPSK 16 28 - 40

    2 8 PSK 22 39 - 56

    3 16 QAM 32 57 - 81

    4 32 QAM 38 67 - 96

    5 64 QAM 52 93 - 133

    6 128 QAM 58 102 - 146

    7 256 QAM 67 118 - 169

    8 256 QAM 73 129 - 185

    20MHz

    30MHz 40MHz 50MHz

    7

    Proprietary and Confidential

    IP-10 Enhanced radio capacity for Ethernet traffic

    Intelligent Ethernet header compression mechanism

    (patent pending)

    Improved effective Ethernet throughput by up to 45%

    No affect on user traffic

    Ethernet

    packet size (bytes)

    Capacity increase by

    compression

    64 45%

    96 29%

    128 22%

    256 11%

    512 5%

    8

    Ceragon Training Handbook - Page 39

  • 3/8/2010

    5

    Proprietary and Confidential

    IP-10 Native2 radio dynamic capacity allocation Example: 28MHz channel bandwidth

    Example

    Modulation

    Example

    traffic mix

    32QAM 128QAM 256QAM

    All Ethernet 112Mbps 170Mbps 200Mbps

    20 E1s + Ethernet 20 E1s + 66Mbps 20 E1s + 123Mbps 20 E1s + 154Mbps

    44 E1s + Ethernet 44 E1s + 10Mbps 44 E1s + 67Mbps 44 E1s + 98Mbps

    66 E1s + Ethernet - 66 E1s + 15Mbps 66 E1s + 47Mbps

    75 E1s + Ethernet - - 75 E1s + 25Mbps

    9

    Proprietary and Confidential

    Adaptive Coding & Modulation (ACM)Its all about handling data...

    Current Microwave systems are designed with Availability Equal for all Services

    99.99 %

    ?

    nXT1/E1

    Less availability can be accepted for many data services

    Need for Services Classification :

    Microwave systems shall treat services in different ways

    10

    Ceragon Training Handbook - Page 40

  • 3/8/2010

    6

    Proprietary and Confidential

    Fewer Hops

    0 1km 2km 3km

    1.28km fix rate

    200Mbps at 99.999%

    2.5km adaptive rate

    200Mbps at 99.99% and 40Mbps at 99.999%

    Assuming: 18GHz link, 28MHz channel, 1 ft antenna, Rain zone K (42mm/hr)

    0 1km 2km 3km0 1km 2km 3km

    1.28km fix rate

    200Mbps at 99.999%

    2.5km adaptive rate

    200Mbps at 99.99% and 40Mbps at 99.999%

    Assuming: 18GHz link, 28MHz channel, 1 ft antenna, Rain zone K (42mm/hr)

    Optional solution for several planning constrains

    Example - Reducing Hops count until reaching fiber site

    11

    Proprietary and Confidential

    Decreased tower loads: Wind, Space, Weight

    Without Adaptive Modulation: requires 4 ft antennas

    Modulation Throughput (Mbps) Availability (%)

    Unavailability of

    modulation

    Outage 5 minutes and 15 seconds

    256QAM (2) 400 99.999 4min, 28sec

    Modulation Throughput (Mbps) Availability (%)

    Unavailability of

    modulation

    Outage 5 minutes and 15 seconds

    QPSK 80 99.999 5min, 3sec

    8PSK 120 99.998 9min, 3sec

    16QAM 160 99.997 11min, 4sec

    32QAM 210 99.996 16min, 42sec

    64QAM 260 99.995 24min, 35sec

    128QAM 320 99.992 37min, 35sec

    256QAM (1) 360 99.989 55min, 33sec

    256QAM (2) 400 99.985 1hr,18min, 13sec

    Assumed rain zone K, 23 [GHz] band

    4.5km/2.8 miles path, 56MHz channel, 400Mbps, 256QAM, 99.999% availability

    With Adaptive Modulation: requires 1 ft antennas

    Source: Ceragon Networks

    Ceragon Training Handbook - Page 41

  • 3/8/2010

    7

    Proprietary and Confidential

    Typical 4E1 radio

    QPSK

    7MHz channel

    99.999% availability

    4xE1

    7MHz channel

    Upgrade to 4E1 + 40Mbps Ethernet

    5 TIMES THE CAPACITY

    SAME ANTENNAS

    Same 7MHz channel

    QPSK 256QAM with ACM

    99.999% availability for the E1s

    Low cost, scalable, pay as you grow

    4xE1 + 40Mbps

    Ethernet

    7MHz channel

    ACM Benefit in TDM to IP migration scenario

    SMOOTH Migration

    13

    14

    Thank You !

    [email protected]

    Ceragon Training Handbook - Page 42

  • 3/9/2010

    1

    Introduction to IP-10

    Proprietary and Confidential

    Agenda

    IP-10 Carrier Ethernet features overview

    IP-10 integrated QoS support overview

    IP-10 based Wireless Carrier Ethernet rings

    Ethernet Service OAM (802.1ag)

    IP-10 management support overview

    Ceragon Training Handbook - Page 43

  • 3/9/2010

    2

    IP-10 Integrated Carrier Ethernet switch

    2 main modes for Ethernet switching:

    Metro switch Carrier Ethernet switching is enabled

    Smart pipe Carrier Ethernet switching is disabled

    Only a single Ethernet interface is enabled for user traffic

    The unit operates as a point-to-point Ethernet MW radio

    IP-10

    Radio

    interface

    IP-10

    Radio

    interface

    Smart pipe modeMetro switch mode

    Ethernet

    User

    Interfaces

    Ethernet

    User

    Interface

    Carrier Ethernet

    Switch

    Extensive Carrier Ethernet feature-set

    eliminates the need for external switches

    Proprietary and Confidential

    What is Carrier Ethernet?

    The MEF has defined Carrier Ethernet as:

    A ubiquitous, standardized, carrier-class

    Service and Network defined by five

    attributes that distinguish it from familiar

    LAN based Ethernet

    Ceragon Training Handbook - Page 44

  • 3/9/2010

    3

    Proprietary and Confidential

    Carrier Ethernet Standard service types

    E-Line service used to create:

    Ethernet Private Lines

    Virtual Private Lines

    Ethernet Internet Access

    E-LAN service used to create:

    Multipoint L2 VPNs

    Transparent LAN Service

    Foundation for IPTV and Multicast networks etc.

    E-Line Service type

    E-LAN Service type

    Point-to-Point EVC

    Carrier Ethernet Network

    UNI: User Network Interface, CE: Customer Equipment

    CE

    UNI UNI

    CE

    Multipoint-to-Multipoint EVC

    Carrier Ethernet Network

    CE

    UNI

    MEF certified Carrier Ethernet products

    CE

    UNI

    Proprietary and Confidential

    IP-10 Carrier Ethernet platform (MEF Certified)

    IP-10 is fully MEF-9 & MEF-14 certified

    for all Carrier Ethernet service types

    (E-Line and E-LAN)

    The MEF Certification Program

    An important part of the MEFs mission to accelerate the deployment of

    Carrier Ethernet in the Access, MAN & WAN

    Certification for Carrier Ethernet equipment supplied to service providers

    Current certification program comprises

    MEF-9 - Service certification

    MEF-14 - Traffic management and service performance

    Approved Certification Lab - Approved independent lab: Iometrix Inc.

    Ceragon Training Handbook - Page 45

  • 3/9/2010

    4

    IP-10 - Carrier Ethernet functionality

    Standardized Services

    ScalabilityQuality of Service

    ReliabilityService

    Management

    MEF-9 & MEF-14

    certified for all

    service types (EPL,

    EVPL and E-LAN)

    Up to 500Mbps per

    radio carrier

    Integrated

    non-blocking switch

    with 4K VLANs

    802.1ad provider

    bridges (QinQ)

    Scalable nodal

    solution

    Scalable networks

    (1000s of NEs)

    Advanced CoS

    classification

    Advanced traffic

    policing/rate-limiting

    CoS based packet

    queuing/buffering

    Flexible scheduling

    schemes

    Traffic shaping

    Highly reliable &

    integrated design

    Fully redundant 1+1

    HSB & nodal

    configurations

    Hitless ACM

    (QPSK 256QAM)

    for enhanced radio

    link availability

    Wireless Ethernet

    Ring (RSTP based)

    802.3ad link

    aggregation

    Fast link state

    propagation

  • 3/9/2010

    5

    Wireless Ethernet OA&M (Operational Administration & Maintenance) Interoperability

    ACM (Adaptive coding & modulation) in a wireless Ethernet radio link

    Provision EVCs (Ethernet Virtual Circuit) and several types of Ethernet service while providing UNI (User Network Interface)

    Pseudo-wire service and clock recovery

    Nodal solution for aggregating and statistical multiplexing at hub/Aggregation site

    Embedded switching capabilities whicheliminate the need for an external switch

    At this event Ceragon

    particularly focused on the

    following Interoperability

    tests:

    Ceragon Training Handbook - Page 47

  • 3/9/2010

    6

    Proprietary and Confidential

    IP-10 integrated QoS support - overview

    4 CoS/priority queues per switch port

    Advanced CoS/priority classification basedon L2/L3 header fields:

    Source Port

    VLAN 802.1p

    VLAN ID

    IPv4 DSCP/TOS, IPv6 TC

    Highest priority to BPDUs

    Advanced ingress traffic rate-limitingper CoS/priority

    Flexible scheduling scheme per port Strict priority (SP)

    Weighted Round Robin (WRR)

    Hybrid any combination of SP & WRR

    Shaping per port

    W1 - Highest priority

    W2

    W3

    W4 lowest priority

    Scheduling

    departures

    Classify

    Arrivals

    Priority Queues

    Support differentiated Ethernet services

    with SLA assurance

    IP-10 based Wireless Carrier Ethernet rings

    Ring site

    #3

    Fiber site

    RNC

    FibeAir

    IP-10

    FibeAir

    IP-10

    FibeAir

    IP-10

    Ring site

    #2

    FibeAir

    IP-10

    Tail site #1

    FibeAir IP-10

    Tail site #2

    FibeAir IP-10

    Tail site #3

    FibeAir IP-10

    Ring site

    #1

    Packet or TDM

    based fiber

    aggregation

    network

    or leased lines

    Wireless

    Carrier Ethernet

    Ring

    Ceragon Training Handbook - Page 48

  • 3/9/2010

    7

    IP-10 based Wireless Carrier Ethernet ringWith redundant site connection to fiber aggregation network (dual-homing)

    Ring site

    #3

    Fiber site #2

    RNC

    FibeAir

    IP-10

    FibeAir

    IP-10

    Ring site

    #2

    FibeAir

    IP-10

    Tail site #1

    FibeAir IP-10

    Tail site #2

    FibeAir IP-10

    Tail site #3

    FibeAir IP-10

    Ring site

    #1

    Fiber site

    FibeAir

    IP-10

    Fiber site #1

    FibeAir

    IP-10

    Packet or TDM

    based fiber

    aggregation

    network

    or leased lines

    Wireless

    Carrier Ethernet

    Ring

    Proprietary and Confidential

    Wireless Carrier Ethernet Ring Example configuration (1+0 ring)

    (up to 500Mbps)

    N x GE/FE

    Integrated Ethernet

    Switching

    N x GE/FE

    N x GE/FE

    N x GE/FE

    Wireless

    Carrier Ethernet

    Ring

    Ceragon Training Handbook - Page 49

  • 3/9/2010

    8

    Proprietary and Confidential

    Wireless Carrier Ethernet Ring Example aggregation site

    Integrated Ethernet

    Switching

    Ring site

    FibeAir

    IP-10

    N x GE/FE

    Wireless

    Carrier Ethernet

    Ring

    Wireless

    Carrier Ethernet

    Ring

    Ethernet services End-to-end multi-layer OA&M

    Support service provisioning, OA&M and SLA assurance

    Tail site Agg. site

    Carrier Ethernet service

    Fiber site

    Packet or TDM

    based fiber

    aggregation

    network

    or leased linesFibeAir IP-10

    1+0

    FibeAir IP-10FibeAir IP-10

    1+1

    Radio link Radio linkGE/FEInterface

    GE/FE

    Interface

    Native EVC (802.1ag CFM)

    Full set of OA&M functionality is provided at multiple layers:

    Alarms and events

    Maintenance signals (LOS, AIS, RDI, etc.)

    Performance monitoring

    Maintenance commands (Loop-backs, APS commands, etc.)

    Ceragon Training Handbook - Page 50

  • 3/9/2010

    9

    Proprietary and Confidential

    IEEE 802.1ag CFM (Connectivity Fault Management)

    18

    IP-10 Management Overview

    CeraMap

    NorthboundNMS

    NMS Platform

    PolyView

    CeraMap

    IP-10 WebEMS

    IP-10 WebEMS

    HTTPHTTP

    SNMP

    CLI

    Integrated web based element manager

    HTTP based

    Full set of EMS functionality - configuration,

    performance monitoring, remote diagnostics,

    alarm reports, etc.

    SNMP interface to Ceragons PolyView NMS

    Extensive CLI interface via local terminal or Telnet

    HTTPCraft

    Ceragon Training Handbook - Page 51

  • 3/9/2010

    10

    Extensive radio capacity/utilization statistics

    Statistics are collected for 15-minutes, and 24-hours intervals

    Statistics history is maintained

    Capacity/ACM statistics

    Maximum modulation in interval

    Minimum modulation in interval

    # of seconds in interval in which active modulation was below a user-configured threshold

    Utilization statistics

    Maximal radio link utilization in interval

    Average radio link utilization in interval

    # of seconds in interval in which radio link utilization was above a user-configured threshold

    Proprietary and Confidential

    Ethernet in-band management

    IP-10 can optionally be managed through the traffic carrying radio and Ethernet interfaces

    The in-band management support is based on a dedicated management VLAN

    The management VLAN ID is user configurable

    Eliminates the need for dedicated management interfaces and network

    Ceragon Training Handbook - Page 52

  • 3/9/2010

    11

    Thank You !

    [email protected]

    Ceragon Training Handbook - Page 53

  • 3/9/2010

    1

    Proprietary and Confidential

    RFU-C & Mediation Devices

    The Most Comprehensive Portfolio

    2

    Multi-Service

    Carrier Ethernet

    FibeAir Family

    TDM

    RFUs6-38 GHz

    EMS & NMS

    3200T

    IP-10 640P

    1500R/1500P 3200T

    RFU-C

    RFU-HP

    RFU-P, RFU-SP

    PolyView (NMS)

    CeraView (EMS)

    IP-MAX2

    IP-10 IP-MAX2

    Ceragon Training Handbook - Page 54

  • 3/9/2010

    2

    Proprietary and Confidential

    IDU RFU Compatibility

    RFU-C

    RFU-SP

    IP-10

    IP-MAX/IP-MAX2

    RFU-HP

    640P

    1500R

    1500P

    RFU-P, RFU-SP

    3

    Proprietary and Confidential

    IDU IDU Compatibility Across Link

    IP-10

    1500R1500R

    IP-10

    1500R

    IP-10IP-MAX/IP-MAX2

    1500P

    Must Match IDU Type Across a Link

    1500R chassis Cannot House 1500P IDC and IDMs

    1500P chassis Cannot House 1500R IDC and IDMs

    4

    Ceragon Training Handbook - Page 55

  • 3/9/2010

    3

    Proprietary and Confidential

    RFU-C direct mount configurations

    1+0 direct

    5

    Proprietary and Confidential

    RFU-C direct mount configurations

    1+1 direct

    6

    Ceragon Training Handbook - Page 56

  • 3/9/2010

    4

    Proprietary and Confidential

    RFU-C remote mount configurations

    1+0 remote

    7

    Proprietary and Confidential

    RFU-C remote mount configurations

    1+1 remote

    8

    Ceragon Training Handbook - Page 57

  • 3/9/2010

    5

    Proprietary and Confidential

    RFU-C antenna adaptors

    Adaptors for RFU-P direct antenna mount

    Adaptors for NSN Flexi Hopper direct antenna mount

    Adaptors for Ericsson R1A 23GHz direct antenna mount

    Remote adaptors and configurations

    9

    Proprietary and Confidential

    RFU-C to NSN antenna

    10

    Ceragon Training Handbook - Page 58

  • 3/9/2010

    6

    Proprietary and Confidential

    RFU-C to Ericsson antenna (R1A 23GHz)

    11

    Proprietary and Confidential

    Thank You [email protected]

    12

    Ceragon Training Handbook - Page 59

  • Advanced Operation & Maintenance Course1

    Proprietary and Confidential

    FibeAir IP-10

    Installation

    Proprietary and Confidential

    Agenda

    Unpacking

    Required Tools

    Installing the IDU in a rack

    Grounding

    Lightning Protection

    Connecting to a Power Supply

    IDU Front Panel

    Connecting RFU coax cable

    Interface Specification

    Protection Patch Panel

    Logging in, assigning IP address

    Ceragon Training Handbook - Page 60

  • Advanced Operation & Maintenance Course2

    Proprietary and Confidential

    Unpacking

    A single FibeAir system (1+0) is shipped in 5 crates

    Upon delivery, make sure that the following items are

    included:

    Two indoor units and accessories

    Two outdoor units

    One CD with a management user guide

    Unpack the contents and check for damaged or missing parts.

    If any part is damaged or missing, contact your local

    distributor.

    Proprietary and Confidential

    Required Tools

    The following tools are required to install the IDU:

    Philips screwdriver (for mounting the IDU to the rack and grounding screw)

    Flathead small screwdriver (for PSU connector and to unlock the IDC/IDMs from the chassis)

    Sharp cutting knife (for wire stripping)

    Crimping tool for ground cable lug crimping (optional: if alternative grounding cable is used)

    Ceragon Training Handbook - Page 61

  • Advanced Operation & Maintenance Course3

    Proprietary and Confidential

    Installing the IDU in a rack

    The FibeAir IP-10 IDU is installed

    in a standard ETSI 19" rack:

    secure the IDU with four screws

    (supplied)

    IDU dimensions:

    D: 187.80 mm

    W: 435 mm

    H: 42.60 mm

    Proprietary and Confidential

    Grounding

    Connect the grounding

    cable between the IDU and

    the rack using a single

    screw with two washers

    Only copper wire should be

    used (at least 6 AWG).

    FibeAir provides a ground

    for each IDU, via a one-hole

    mounted lug onto a single-

    point stud (installed using a UL-

    listed ring tongue terminal, and

    two star washers for anti-

    Rotation).

    Ceragon Training Handbook - Page 62

  • Advanced Operation & Maintenance Course4

    Proprietary and Confidential

    Lightning Protection

    Lightning protection kit is installed upon request between IDU and ODU

    It prevents transients of a greater magnitude than the following:

    Open Circuit: 1.2-50us 600V

    Short Circuit: 8-20us 300A

    Proprietary and Confidential

    Connecting to a Power Supply

    When selecting a power source, the following must be considered:

    DC power can be from -40.5 VDC to -72 VDC.

    Recommended: Availability of a UPS and power generator

    The power supply must have grounding points on the AC and DC sides

    The user power supply GND must be connected to the positive pole in the

    IDU power supply.

    Ceragon Training Handbook - Page 63

  • Advanced Operation & Maintenance Course5

    Proprietary and Confidential

    Connecting to a Power Supply

    -48 vdc 0

    (-) (+)

    PSU

    (GND)

    Proprietary and Confidential

    IP-10 Front Panel

    CLI (DB9)

    Baud: 115200

    Data bits: 8

    Parity: None

    Stop bits: 1

    Flow Control: None

    16 x E1 / T1

    (Optional)

    RFU N-Type

    Interface

    1 GbE

    SFP

    Ceragon Training Handbook - Page 64

  • Advanced Operation & Maintenance Course6

    Proprietary and Confidential

    IP-10 Front Panel

    EOW

    (Engineering

    Order Wire)

    External

    Alarms

    (DB9)

    User Channel

    V11,RS232

    (RJ45)

    Up to 19.2Kbps

    1 GbE Copper

    10/100/1000

    RJ45

    FE Copper

    10/100 RJ45

    Or

    Protection

    Channel

    FE Copper

    10/100 RJ45

    Or

    Wayside

    Channel

    FE Copper

    10/100 RJ45

    Or

    Out-Of-Band

    MNG

    Fans

    The FE interfaces can be configured as either FE, protection, wayside, or MNG

    Proprietary and Confidential

    Connecting RFU coax cable

    The Coax Cable that connects between the IDU and the RFU should

    be terminated with N-type male connectors

    Important! Make sure that the inner pin of the connector does not

    exceed the edge of the connector.

    The cable should have a maximum attenuation of 30 dB at 350 MHz.

    Ceragon Training Handbook - Page 65

  • Advanced Operation & Maintenance Course7

    Proprietary and Confidential

    Interface Specification

    Gigabit Ethernet (Optical)

    1000Base-SX (Multi Mode)

    Wavelength: 850 nm

    Receptacle: MSA compliant SFP

    Connector: LC

    Max Segment Length: 220 m (1351 ft), 500 m (1650 ft)

    Cable Type: For Max. Segment = 220 m: 62.5 m MMF

    For Max. Segment = 500 m: 50 m MMF

    Proprietary and Confidential

    Interface Specification

    Gigabit Ethernet (Optical)

    1000Base-LX (Single Mode)

    Wavelength: 1350 nm

    Receptacle: MSA compliant SFP

    Connector: LC

    Max Segment Length: 550 m (1805 ft), 5000 m (16404 ft)

    Cable Type: For Max. Segment = 550 m: 62.5 m MMF

    For Max. Segment = 5000 m: 10 m SMF

    Ceragon Training Handbook - Page 66

  • Advanced Operation & Maintenance Course8

    Proprietary and Confidential

    Interface Specification

    Gigabit Ethernet / Fast Ethernet (Electrical)

    1000BaseT (Twisted Pair Cable)

    Receptacle: MSA compliant SFP

    Connector: RJ-45

    Max Segment Length: Up to 100 m (328 ft) per IEEE802.3

    Cable Type: Compatible with shielded and unshielded twisted

    pair category 5 cables

    Proprietary and Confidential

    Interface Specification

    Optional 16xE1/T1

    Connector: MDR 69 pin, twisted pair

    Interface Type: E1/T1

    Number of ports: 16 per unit (optional)

    Timing mode: Retimed

    Framing: Unframed (full transparency)

    Coding E1: HDB3

    Coding T1: AMI/B8ZS

    Range: 5 m

    Line Impedance: 120 /100 balanced,75 unbalanced (OPT)

    Compatible Standards: ITU-T G.703, G.736, G.775, G.823, G.824,

    G.828, ITU-T I.432, ETSI ETS 300 147, ETS

    300 417, ANSI T1.105, T1.102-1993, T1.231,

    Bellcore GR-253-core, TR-NWT-000499

    Ceragon Training Handbook - Page 67

  • Advanced Operation & Maintenance Course9

    Proprietary and Confidential

    Interface Specification

    ETH Interfaces (Wayside, MNG, Protection)

    Connector: Shielded RJ-45

    Used with: UTP Cat 5

    Protocols supported: Ethernet (10/100BaseT), half or full duplex

    Timing mode: Retimed

    Range: 100 m

    Impedance: 100

    Proprietary and Confidential

    Interface Specification

    Order Wire Channel Interface

    Termination Type: Headset stereo plug, 2.5 mm

    Frequency band (KHz): 0.3-3.4

    Input impedance (ohms): ~2000

    Output impedance (ohms): 32

    (64Kbps)

    Ceragon Training Handbook - Page 68

  • Advanced Operation & Maintenance Course10

    Proprietary and Confidential

    Interface Specification

    CVSD - Continuously variable slope delta modulation

    User Channel Interface

    The interface can be used for one of the following:

    Asynchronous RS-232

    Asynchronous V-11

    Up to 9.6 Kbps

    Proprietary and Confidential

    Connect the headset to AGC monitor BNC/TNC connector on ODU

    Connect Digital Volt Meter (DVM) to the AGC BNC connector

    Align the antenna until voltage reading is achieved (1.2 to 1.7Vdc)

    Repeat antenna alignment at each end until the minimum dc voltage is achieved

    1.30vdc = -30dBm

    1.45vdc = -45dBm

    1.60vdc = -60dBm

    etc

    Antenna Alignment (1)

    Ceragon Training Handbook - Page 69

  • Advanced Operation & Maintenance Course11

    Proprietary and Confidential

    Compare achieved RX level to

    calculated RX level

    Keep aligning until the achieved

    level is up to 4 dB away from the

    calculated received signal level

    If voltage reading is more than 4

    dB away or higher than 1.7vdc,

    re-align antenna to remote site

    Antenna Alignment (2)

    Proprietary and Confidential

    Please refer to the FibeAir Commissioning and Acceptance Procedure document

    for detailed information

    Link is up (LED is green)

    All LEDs are green (unless there is no input signal on the Line)

    RSL is up to +/- 4dB from un-faded (calculated) RSL at both ends of the

    link

    Radio BER 10E-11 or better

    No Errors on BER test of line STM1 interfaces

    Proper function of management software

    Commissioning and Acceptance

    Ceragon Training Handbook - Page 70

  • Advanced Operation & Maintenance Course12

    Proprietary and Confidential

    LEDS

    23

    LINK: GREEN radio link is operational

    ORANGE - minor BER alarm on radio

    RED Loss of signal, major BER alarm on radio

    IDU: GREEN IDU functions ok

    ORANGE - fan failure

    RED Alarm on IDU (all severities)

    RFU: GREEN RFU functions ok

    ORANGE Loss of communication (IDU-RFU)

    RED ODU Failure

    Proprietary and Confidential

    LEDS

    24

    PROT: GREEN protection is configured and connected

    ORANGE Forced switch, Protection lock

    RED physical errors (no cable, cable failure)

    OFF Protection is disabled, or not supported on device

    RMT: GREEN remote unit OK (no alarms)

    ORANGE minor alarm on remote unit

    RED major alarm on remote unit

    Ceragon Training Handbook - Page 71

  • Advanced Operation & Maintenance Course13

    Proprietary and Confidential

    Logging in, assigning IP address

    Verify that physical installation is successfully completed:

    IDU mounting in rack

    Power + GND

    IF Cable between IDU and ODU

    Connect a PC to the Terminal connector and launch a serial application

    (Hyper Terminal, PuTTY, TeraTerm etc)

    Log on using (admin/admin) for user name and password.

    Now, you should be able to see the IP-10 CLI Prompt:

    IP-10:/>>>>Note that the > sign

    indicates your

    location in the CLI

    tree

    Proprietary and Confidential

    Logging in, assigning IP address

    CLI basic commands:

    IP-10:/ >?

    IP-10:/ > exit

    IP-10:/ > cdIP-10:/ > cd ..

    Type ? (question mark) to list helpful commands

    Type exit to terminate the session

    Type cd to navigate in the entity tree

    Type cd .. to return to root of entity tree

    Use the arrow keys to navigate through recent

    commands

    Use the TAB key to auto-complete a syntax

    Ceragon Training Handbook - Page 72

  • Advanced Operation & Maintenance Course14

    Proprietary and Confidential

    Logging in, assigning IP address

    To read current MNG IP, type the following:

    IP-10:/>>>>cd management/networking/ip-address/

    IP-10:/ management/networking/ip-address>>>>

    IP-10:/ management/networking/ip-address>get ip-addressNote that the prompt has changed. Now, type get ip-address:

    IP-10:/ management/networking/ip-address>get ip-address192.168.1.1IP-10:/ management/networking/ip-address>

    Upon completion, the current IP will be displayed, followed by the new

    prompt:

    Proprietary and Confidential

    Logging in, assigning IP address

    Now, let us set a new IP for the MNG (we assume your new IP is

    192.168.1.144).

    Type set ip-address 192.168.1.144

    IP-10:/ management/networking/ip-address>set ip-address 192.168.1.144

    You may lose remote management connection to the unit if this value is changed incorrectly.Are you sure? (yes/no):

    Upon completion, you will be prompt:

    Type yes and continue to next step:

    Ceragon Training Handbook - Page 73

  • Advanced Operation & Maintenance Course15

    Proprietary and Confidential

    More CLI commands

    Editing Users -

    IP-10:/> cd management/mng-services/users

    IP-10:/management/mng-services/users>

    Adding JOHN as a user:

    IP-10:/management/mng-services/users> add-user JOHN

    Proprietary and Confidential

    More CLI commands

    Adding JOHN as ADMIN user:

    Deleting JOHN (or other user)

    IP-10:/management/mng-services/users> add-user JOHN admin

    IP-10:/management/mng-services/users> delete-user JOHN

    Ceragon Training Handbook - Page 74

  • Advanced Operation & Maintenance Course16

    Proprietary and Confidential

    User groups

    CLI access groups:

    Viewer read-only access

    Operator read-write access but cannot add/remove other users

    Admin read-write access including add/remove other users

    Tech (highest) read-write access including add/remove other users as

    well as access to a bridge-specific CLI shell

    Proprietary and Confidential

    More CLI commands

    To go back to factory defaults -

    IP-10:/> cd management/mng-services/cfg-service

    IP-10:/management/mng-services/cfg-service>set-to-default

    In the new directory type the following:

    Ceragon Training Handbook - Page 75

  • Advanced Operation & Maintenance Course17

    Proprietary and Confidential

    Logging in to the EMS

    Connect your working

    station to the IDU with

    ETH CAT.5 cable:

    Verify that your WS IP

    is in the same subnet

    Make sure Link is up

    PING the IDU

    Launch a WEB

    browser with a URL set

    as the IDUs IP

    User name: admin

    Password: admin

    Proprietary and Confidential

    Logging in to the EMS

    The homepage of the web-browser EMS should display the

    main view of the IP-10:

    Now, we are ready to start configuring the system

    Ceragon Training Handbook - Page 76

  • Advanced Operation & Maintenance Course18

    35

    Thank You !

    [email protected]

    Ceragon Training Handbook - Page 77

  • 3/8/2010

    1

    Proprietary and Confidential

    FibeAir IP-10

    EMS Performance Monitoring

    Proprietary and Confidential

    Agenda

    2

    EMS General Information

    Faults:

    Current Alarms

    Event Log

    PM & Counters:

    Remote Monitoring

    TDM Trails

    TDM interfaces

    Radio (RSL, TSL, MRMC and MSE)

    Radio TDM

    Radio ETH

    Ceragon Training Handbook - Page 78

  • 3/8/2010

    2

    Proprietary and Confidential

    EMS - General

    3

    Easy, user friendly GUI

    No need to install an application WEB Based software

    No need to upgrade your EMS application embedded in the IDU SW

    No need for strong working station simple PC is sufficient

    (For maintenance issues FTP Server is required)

    Easy access simply type the IP address of the IDU on your web page

    Supports all IDU versions and configurations

    Proprietary and Confidential

    Faults - CAS

    The CAS window shows collapsed list of alarms

    By expanding a line we can see additional information:

    Probable cause

    Corrective Actions

    Ceragon Training Handbook - Page 79

  • 3/8/2010

    3

    Proprietary and Confidential

    Faults Event Log

    The Event Log shows max. 200 lines of events

    When Event #201 occurs, Event #1 is erased and #201 is logged as #200.

    Proprietary and Confidential

    PM Clearing previous data

    To erase all IDU PM data, click the CLEAR button -

    Ceragon Training Handbook - Page 80

  • 3/8/2010

    4

    Proprietary and Confidential

    PM RMON

    The system supports Ethernet statistics counters (RMON) display. The counters

    are designed to support:

    RFC 2819 RMON MIB. RFC 2665 Ethernet-like MIB.

    RFC 2233 MIB II.

    RFC 1493 Bridge MIB.

    Proprietary and Confidential

    PM RMON Special Registers

    RMON register / Counter Description

    Undersize frames received Frames shorter than 64 bytes

    Oversize frames received Frames longer than 1632 bytes

    Jabber frames receivedTotal frames received with a length of more than 1632 bytes,

    but with an invalid FCS

    Fragments frames receivedTotal frames received with a length of less than 64

    bytes, and an invalid FCS

    Rx error frames received Total frames received with Phy-error

    FCS frames receivedTotal frames received with CRC error, not countered in

    "Fragments", "Jabber" or "Rx error" counters

    In Discard FramesCounts good frames that cannot be forwarded due to

    lack of buffer memory

    In Filtered FramesCounts good frames that were filtered due to egress

    switch VLAN policy rules

    Pause frames received Number of flow-control pause frames received

    Ceragon Training Handbook - Page 81

  • 3/8/2010

    5

    Proprietary and Confidential

    PM E1 / DS-1 (Radio PM)

    This PM data relates to the TDM Line Interfaces.

    Proprietary and Confidential

    PM E1 / DS-1 (Radio PM)

    Here we can analyze TDM PM through the radio link

    Ceragon Training Handbook - Page 82

  • 3/8/2010

    6

    Proprietary and Confidential

    PM Radio

    Signal Level RSL & TSL analysis

    Allows setting RSL & TSL thresholds

    EMS will notify when signal exceeds THSLD

    >> Easier maintenance

    Aggregated radio traffic analysis

    MRMC PM related to ACM:

    Scripts

    Bit rate

    Radio VCs

    MSE analysis

    Proprietary and Confidential

    PM Radio Signal Level - Example

    - 40dBm = Nominal RSL for an operational Link

    Level 1: 25 sec

    Level 2: 15 sec

    900 sec = 15min Interval

    Ceragon Training Handbook - Page 83

  • 3/8/2010

    7

    Proprietary and Confidential

    PM Radio Signal Level - Example

    -40

    -50

    -68

    -99 T [sec]

    RSL

    10 5 10

    Using graphical display of the THSLD analysis allows us easier

    examination of the RSL & TSL state throughout certain period of time

    Proprietary and Confidential

    PM Radio - Aggregate

    Aggregated radio traffic analysis

    Ceragon Training Handbook - Page 84

  • 3/8/2010

    8

    Proprietary and Confidential

    PM Radio - MRMC

    The information displayed in this page is derived from the license and script

    assigned to the radio.

    When ACM is enabled and active, as link quality degrades or improves, the

    information is updated accordingly.

    Proprietary and Confidential

    PM Radio - MSE

    The information displayed in this page is derived from the license and script

    assigned to the radio. When link quality degrades or improves, the MSE reading

    is updated accordingly. Differences of 3dB trigger ACM modulation changing.

    Threshold can be configured as well for easier maintenance.

    Ceragon Training Handbook - Page 85

  • 3/8/2010

    9

    Proprietary and Confidential

    PM Ethernet

    ETH Traffic + Threshold settings:

    Frame Error Rate

    Frame error rate (%) measured on radio-Ethernet

    interface

    Throughput data bits measured on radio-

    Ethernet interface

    Capacity - overall Ethernet bits rate, data &

    overhead, measured on radio-Ethernet interface

    Utilization - (Actual Ethernet throughput, relative

    to the potential Ethernet throughput of the radio,

    excluding TDM channels).

    Utilization (%) is displayed as one of five bins:

    0-20%, 20-40%, 40-60%, 60-80%, 80-100%

    Proprietary and Confidential

    PM Ethernet

    Ethernet throughput & Capacity PMs are measured by accumulating

    the number of Ethernet octets every second, as they are counted by the

    RMON counters

    Ceragon Training Handbook - Page 86

  • 3/8/2010

    10

    19

    Thank You !

    [email protected]

    Ceragon Training Handbook - Page 87

  • 3/8/2010

    1

    FibeAir IP-10

    EMS General Configuration

    Proprietary and Confidential

    Agenda

    2

    In this module we shall explain

    the following features as they

    appear on the EMS navigation

    Menu

    Ceragon Training Handbook - Page 88

  • 3/8/2010

    2

    Proprietary and Confidential

    Unit Parameters Step # 1

    3

    Configure specific

    information that may

    assist you later

    Such info will help you

    locate your site easier

    and faster

    Proprietary and Confidential

    Unit Parameters Step # 1

    4

    VDC reading

    Ceragon Training Handbook - Page 89

  • 3/8/2010

    3

    Proprietary and Confidential

    Unit Parameters Step # 1

    5

    Celsius (metric) or

    Fahrenheit (Imperial)

    Proprietary and Confidential

    Unit Parameters Step # 2

    6

    By default the time &

    date are derived from

    the operating system

    clock

    User may set new

    values

    These settings are also

    used for NTP

    connection (later

    explained)

    Ceragon Training Handbook - Page 90

  • 3/8/2010

    4

    Proprietary and Confidential

    Unit Parameters Step # 3

    7

    IDU Serial number is

    important when you

    submit your request

    for a License upgrade

    When you complete

    configuring all

    settings, click Apply.

    Proprietary and Confidential

    Versions

    8

    This page shows the complete

    package of IDU and ODU software

    components

    Ceragon Training Handbook - Page 91

  • 3/8/2010

    5

    Proprietary and Confidential

    Versions

    9

    Lets explore this example:

    The IDU running SW is displayed in the aidu line and currently it is 3.0.92

    A new SW was downloaded sometime in the past (3.0.97)

    The IDU was not upgraded yet

    Proprietary and Confidential

    Versions RFU files

    The IDU holds all the SW files for all the

    components (IDU + ODU)

    You can see here the different files per

    ODU type

    10

    Ceragon Training Handbook - Page 92

  • 3/8/2010

    6

    Proprietary and Confidential

    External Alarms Collapsed Input Alarm Config.

    11

    Dry Contact Alarms (DB-9):

    5 Inputs

    1 Output

    Proprietary and Confidential

    External Alarms Expended Input Alarm Config.

    12

    Ceragon Training Handbook - Page 93

  • 3/8/2010

    7

    Proprietary and Confidential

    External Alarms Configuring the Output Alarm

    13

    Group of alarms will trigger the external alarm Output.

    Communication Alarms related to traffic: Radio / Ethernet line / TDM line

    Quality of Service We do not have specific alarms of QoS

    Processing Alarms related to SW: Configuration / Resets / corrupted files

    Equipment Alarms related to: HW / FAN / RFU mute / Power Supply / Inventory.

    Environmental Alarms of extreme temperature.

    All Groups.

    Test mode manual switch.

    Proprietary and Confidential

    Management Network Properties

    14

    Here you can set the

    Network Properties of

    the IDU

    This is the switch MAC address

    If your link is up you

    should be able to see

    the other ends IP

    Ceragon Training Handbook - Page 94

  • 3/8/2010

    8

    Proprietary and Confidential

    Management Local Properties (Out of band)

    15

    The IDU has 3 ports for local management: Port 7, Port 6 and Port 5.

    You may enable none or up to 3 ports:

    Number of ports =3 Port 7, Port 6, Port 5

    Number of ports =2 Port 7, Port 6

    Number of ports =1 Port 7

    Number of ports =0 NO LOCAL MANAGEMENT !!!

    Proprietary and Confidential

    Management In Band Properties

    16

    In Band Management requires unique VLAN ID

    This helps separating MNG traffic from other services

    In Band MNG packets are transferred via the radio link

    When the link is down, management is down as well.

    Ceragon Training Handbook - Page 95

  • 3/8/2010

    9

    Proprietary and Confidential

    Management Port Properties

    17

    These parameters

    allow you setting the

    management capacity

    and port properties

    Proprietary and Confidential

    Trap Configuration (OSS / NMS / Northbound)

    18

    To manage the IDU with OSS /

    NMS, you will need to configure

    the IP address of the OSS Server

    You may configure up to 4 Servers

    (Trap Destinations)

    Ceragon Training Handbook - Page 96

  • 3/8/2010

    10

    Proprietary and Confidential

    Licensing Default License

    19

    Demo license can be

    enabled on-site, it expires

    after 60 days

    (operational time)

    Licenses are generated per

    IDU S/N upon request

    (capacity / ACM / switch

    mode)

    License upgrade requires

    system reset.

    Proprietary and Confidential

    Licensing Demo License Enabled

    20

    Demo License allows you full

    evaluation of the IDU

    functionality, features and

    capacities

    Ceragon Training Handbook - Page 97

  • 3/8/2010

    11

    Proprietary and Confidential

    NTP Client Properties

    21

    Enable / Disable

    Type NTP Server IP address

    Expect IDU to lock on NTP Servers clock

    Expected Status:

    1. If locked, it returns the IP address of the server it is locked on.

    2. Local if the NTP client is locked to the local elements real-time clock

    3. NA - if not synchronized with any clock (valid only when Admin is set to

    Disable).

    The feature supports Time Offset and Daylight Saving Time.

    Time Offset and Daylight Saving Time can be configured via WEB (Unit

    Information page) or via CLI: /management/mng-services/time-service>

    Proprietary and Confidential

    NTP Properties

    22

    Ceragon Training Handbook - Page 98

  • 3/8/2010

    12

    Proprietary and Confidential

    NTP Properties

    23

    When using NTP with external protection 1+1, both Active and Standby

    units should be locked independently on the NTP server, and report

    independently their Sync status.

    Time & Date are not copied from the Active unit to the Standby unit

    (CQ19584)

    When using NTP in a shelf configuration, all units in the shelf (including

    standby main units) are automatically synchronized to the active main units

    clock.

    Proprietary and Confidential

    IP Table

    24

    Here you can manually set your neighbors network properties

    Ceragon Training Handbook - Page 99

  • 3/8/2010

    13

    Proprietary and Confidential

    SNMP

    25

    V1

    V3

    No security

    Authentication

    Authentication privacy

    SHA

    MD5

    No Authentication

    26

    Thank You !

    [email protected]

    Ceragon Training Handbook - Page 100

  • 3/8/2010

    1

    FibeAir IP-10

    EMS Switch Configuration

    Proprietary and Confidential

    Agenda

    2

    1. Switch mode review

    2. Guidelines

    3. Single Pipe Configuration

    4. Managed Mode Configuration

    5. Managed Mode Common Applications

    Ceragon Training Handbook - Page 101

  • 3/8/2010

    2

    Proprietary and Confidential

    Switch Modes

    3

    1. Single (Smart) Pipe (default mode, does not require license)

    This application allows only single GbE interface as traffic interface (Optical

    GbE-SFP or Electrical GbE - 10/100/1000).

    Any traffic coming from any GbE interface will be sent directly to the radio and

    vice versa.

    This application allows QoS configuration.

    Other FE (10/100) interfaces can be configured to be "functional" interfaces

    (WSC, Protection, Management), otherwise they are shut down.

    Proprietary and Confidential

    Switch Modes

    4

    2. Managed Mode (license depended)

    This application is 802.1Q VLAN aware bridge, allowing L2 switching based

    on VLANs. This application also allows QoS configuration.

    All Ethernet ports are allowed for traffic. Each traffic port can be configured to

    be "access" port or "trunk" port:

    Type VLANs Allowed Ingress FramesAllowed Egress

    Frames

    AccessSpecific VLAN should be

    assigned to access the port

    Only Untagged frames

    (or Tagged with VID=0

    "Priority Tagged )

    Untagged frames

    TrunkA range of VLANs should be

    assigned to access the PortOnly Tagged frames

    Tagged frames

    Ceragon Training Handbook - Page 102

  • 3/8/2010

    3

    Proprietary and Confidential

    Switch Modes

    5

    3. Metro Mode (license depended)

    This application is 802.1Q VLAN aware bridge, allowing Q-in-Q (A.K.A.

    VLAN Stacking). This mode allows the configuration of a PE port and CE port.

    Type VLANsAllowed Ingress

    Frames

    Allowed Egress

    Frames

    Customer-

    Network

    Specific S-VLAN should be

    assigned to "Customer-

    Network" port

    Untagged frames, or

    frames with C-tag

    (ether-type=0x8100).

    Untagged or C-tag

    (ether-type= 0x8100)

    frames.

    Provider-

    Network

    A range of S-VLANs, or

    "all" S-VLANs should be

    assigned to "Provider-

    Network" port

    Configurable S-tag.

    (ether-type)

    0x88a8

    0x8100

    0x9100

    0x9200

    Configurable S-tag.

    (ether-type)

    0x88a8

    0x8100

    0x9100

    0x9200

    Proprietary and Confidential

    Guidelines

    6

    Changing switch modes requires a reset

    Resets do not change the IP-10 settings (radio, configuration, etc.)

    VLANs need to be created in the switch DB before assigned

    to a port

    Ceragon Training Handbook - Page 103

  • 3/8/2010

    4

    Proprietary and Confidential

    Single Pipe

    Configuration

    7

    Proprietary and Confidential

    Single Pipe Configuration

    8

    IP-10 Switch

    Port 1: GbE (Optical or Electrical)

    Port 2: FE (RJ45)Port 8 (Radio)

    VID 51

    Untagged

    VID 4 VID 45

    VID 100

    Ceragon Training Handbook - Page 104

  • 3/8/2010

    5

    Proprietary and Confidential

    Configuration Single Pipe

    9

    This is the default setting

    Proprietary and Confidential

    Configuration Single Pipe

    10

    Only one ingress port

    can be used:

    Port 1 (Opt. or Elec.)

    Port 2 (RJ45)

    When one is enabled

    the other is disabled

    No need to configure

    VID membership

    Ceragon Training Handbook - Page 105

  • 3/8/2010

    6

    Proprietary and Confidential

    Managed Mode

    Configuration

    11

    Proprietary and Confidential

    Configuration Managed Mode

    12

    Port #2 as Trunk (VID 200)

    Radios as Trunk by

    default Port #2 as Trunk

    (VID 200, VID 300)Port #3 as Trunk

    (VID 300)

    IDU-B

    IDU-A

    Lets use this diagram as an example -

    Ceragon Training Handbook - Page 106

  • 3/8/2010

    7

    Proprietary and Confidential

    Configuration Managed Mode

    13

    Make sure both IDUs are aware of

    the required VIDs

    You need to create the VIDs before

    you assign them to a certain port

    (Set # & Apply)

    Proprietary and Confidential

    Configuration Managed Mode

    14

    Next steps:

    1. Go to Interfaces page

    2. Enable the required port (Ingress ports)

    3. Configure the port type as Trunk or Access

    4. Assign allowed VLAN IDs (port membership)

    5. Radio port is automatically configured as Trunk, all VLANs are

    allowed by default

    Ceragon Training Handbook - Page 107

  • 3/8/2010

    8

    Proprietary and Confidential

    Configuration Managed Mode

    15

    12

    3

    4

    Proprietary and Confidential

    Configuration Managed Mode

    Common Applications

    16

    PC

    IP-10

    Access Port Radio = Trunk Port

    PC

    192.168.1.100

    192.168.1.200

    Transmits and

    receives

    Untagged

    frames

    Transmits and

    receives

    Untagged

    frames

    Tagging / untangling

    Ceragon Training Handbook - Page 108

  • 3/8/2010

    9

    Proprietary and Confidential

    Configuration Managed Mode

    Common Applications

    17

    IP-10

    Trunk Port

    Radio = Trunk Port

    Traffic

    Generator

    Trunk Port

    Multiple L2

    streams, each

    identified with

    unique VID

    18

    Thank You !

    [email protected]

    Ceragon Training Handbook - Page 109

  • 3/9/2010

    1

    Proprietary and Confidential

    FibeAir IP-10

    Trunk VS. Access

    Proprietary and Confidential

    Agenda

    2

    1. VLAN TAG Attributes

    2. Access Port

    3. Trunk Port

    4. Extracting frames out of a trunk

    5. General Guidelines

    6. EMS Trunk Configuration

    Ceragon Training Handbook - Page 110

  • 3/9/2010

    2

    Proprietary and Confidential

    VLAN TAG Attributes

    3

    1. In L2 ETH switching, L2 traffic can be engineered using the VLAN TAG

    attributes

    2. L2 traffic is controlled by defining port membership: Access or Trunk

    3. Together, port membership + L2 traffic engineering convert

    connectionless to connection-oriented network

    4. In such networks, services are better deployed and maintained

    5. VLAN TAG attributes include:

    VLAN ID (12 bits)

    Priority Bits (3 bits)

    5. Additional attributes may be used to engineer traffic:

    MAC DA

    Port number

    Proprietary and Confidential

    Access Port

    4

    Access Port is a port which is aware of a single VLAN only

    Ingress traffic is expected to be Untagged, e.g. no VLAN

    information exists within the received Ethernet frame

    All frames that are received through this port are tagged with

    default VLAN (VID + P bits)

    All frames that exit through this port towards customer devices are

    untagged (VLAN is removed)

    Users can configure the L2 switch to assign different tagging

    scenarios to different ports

    Ceragon Training Handbook - Page 111

  • 3/9/2010

    3

    Proprietary and Confidential

    Access Port

    5

    Let us examine the Tagging / Untagging process of a L2 switch

    DA SA Type Payload FCS

    L2 ETH SW

    Proprietary and Confidential

    Access Port Tagging ingress frames

    6

    Let us examine the Tagging / Untagging process of Port #1

    DA SA Type Payload FCS

    DA SA Type Payload FCS

    VLAN TAG

    Tagging

    Port #1Port #8

    Access Port:Untagged frame

    Tagged frame

    Ceragon Training Handbook - Page 112

  • 3/9/2010

    4

    Proprietary and Confidential

    Access Port Utagging frames towards customer interfacing ports

    7

    When Tagged frame from Network is forwarded to Access port, the

    VLAN Tag is removed

    DA SA Type Payload FCS

    DA SA Type Payload FCS

    VLAN TAG

    Untagging

    Port #1Port #8

    Access Port: Untagged frame

    Tagged frame

    Proprietary and Confidential

    Access Port Tagging multiple ports

    8

    The switch can individually tag multiple Access ports with same VID or

    unique VID

    DA SA Type Payload FCS

    DA SA Type Payload FCS

    DA SA Type Payload FCS

    VLAN TAG = 10

    Tagging

    Port #1Port #8

    Port #2

    Access Ports: Untagged frames

    DA SA Type Payload FCSVLAN TAG = 33

    Ceragon Training Handbook - Page 113

  • 3/9/2010

    5

    Proprietary and Confidential

    Trunk Port multiple VIDs awareness

    9

    To be able to transmit & receive multiple VLANs, the common port has to

    be configured as a Trunk Port

    DA SA Type Payload FCS

    DA SA Type Payload FCS

    DA SA Type Payload FCS

    VLAN TAG = 10

    Trunk Port

    Port #1Port #8

    Port #2

    Access ports: Untagged frames

    DA SA Type Payload FCSVLAN TAG = 33

    Proprietary and Confidential

    Trunk Port multiple VIDs awareness

    10

    Any port can be configured as Trunk

    In this example, port #2 is facing customer device to forward all the

    network VLANs (TX&RX)

    DA SA Type Payload FCSVLAN TAG = 10

    Port #8

    Port #2

    Untagged frames

    DA SA Type Payload FCSVLAN TAG = 33

    DA SA Type Payload FCSVLAN TAG = 10

    DA SA Type Payload FCSVLAN TAG = 33

    Trunk Port

    Ceragon Training Handbook - Page 114

  • 3/9/2010

    6

    Proprietary and Confidential

    Trunk & Access Extracting frames out of a Trunk

    11

    A certain VLAN can be extracted out of a Trunk via Access port assigned

    with specific VLAN membership (Default VID)

    DA SA Type Payload FCSVLAN TAG = 10

    Port #8: Trunk

    Port #2:

    Trunk

    Untagged