COURSE HANDBOOK Installation | Commissioning | System Configuration
IP-20G Basic Training Course Updated for SW Version 7.7
Visit our Customer Training Portal at training.ceragon.com or contact us at
[email protected] Trainee Name:
_________________
Copyright 2012 Ceragon Networks Ltd.
www.ceragon.com
This page was intentionally left blank.
FibeAir IP‐20G Ceragon Training Course Table of Content Intro to Radio Systems …………………………………………………………………………………………………………
005
Introduction to Ethernet ………………………………………………………………………………………………………
029
IP‐20G Overview…………………………………………………………………………………………………………………..
041
Installation Guide……………….. …………………………………………………………………………………………….
053
First Login…………………………………………………………………………………………………………………………...
079
ACM & MSE….…………………………………………………………..………………………………………………………….
085
Radio Link Parameters…………..……………………………………………………………………………………………
097
Automatic Transmit Power Control ATPC……………………………………….…………………………………….
103
Service Model in IP‐20G………………………….………………………………………………………………………….
109
Licensing……………………………………………………………………………………………………………………………..
133
Native TDM …………………………………………………………………………………………………………………………
143
Configuration Management & Software Download……………………………………………………………
151
Troubleshooting…………………………………………………………………………………………………………………..
163
Course Evaluation Form……………………………………………………………………………………………………….
177
CERAGON TRAINING PROGRAM – IP‐20G Basic Training Course
Sw 7.7
This page was intentionally left blank.
Introduction to Radio Systems
May 2014 Version 1
Agenda • Radio Relay Principles • Parameters affecting propagations: • Dispersion • Humidity/gas absorption • Multipath/ducting • Atmospheric conditions (refraction) • Terrain (flatness, type, Fresnel zone clearance, diffraction) • Climatic conditions (rain zone, temperature) • Rain attenuation
• Modulation
Proprietary and Confidential
2
Page 5
Digital Transmission Systems
Proprietary and Confidential
3
Radio Relay Principles f1 RF Signal f1’
Path Terrain
•
A Radio Link requires two end stations
•
A line of sight (LOS) or nLOS (near LOS) is required
•
Microwave Radio Link frequencies occupy 1-80GHz
Proprietary and Confidential
4
Page 6
High and Low frequency station Tx(f1)=11500 MHz
Rx(f1)=11500 MHz
Full duplex
Local site High station
Remote site Low station
Rx(f1’)=11000 MHz
Tx(f1’)=11000 MHz
High station means: Tx(f1) >Rx(f1’) Low station means: Tx(f1’) < Rx(f1)
Proprietary and Confidential
5
Standard frequency plan patterns Only Low stations can interfere High stations
Frequency reuse: Low 1,3V 1,3H Tx
High
Low
1,3V
Tx
Tx
1,3H
High Tx
1,3H
Tx
Reduced risk for overshoot
Frequency shift: 1,3H
Tx
1,3V
Tx
2,4V
Tx
2,4H Tx
Reduced risk for overshoot
Tx
Tx
1,3H
Tx in upper part of band Tx in lower part of band
Proprietary and Confidential
6
Page 7
Tx
Preferred site location structure
Proprietary and Confidential
7
Radio Principal Block Diagram
Input signal
Z' Digital Line interface
E' Modulator
A'
B'
Transmitter
RF Tx Filter
Branching Network(*)
C'
D'
Feeder
TRANSMITTER PATH
D
C
Feeder
Branching Network(*)
B
RF Rx Filter
A
Z
E Receiver
Demodulator
RECEIVER PATH
8
Proprietary and Confidential
Page 8
Digital Line interface
Output signal
RF Principals • RF - System of communication employing electromagnetic waves (EMW) propagated through space • EMW travel at the speed of light (300,000 km/s) • The wave length is determined by the frequency as follows -
Wave Length
c f
where c is the propagation velocity of electromagnetic waves in vacuum (3x108 m/s)
• Microwave – refers to very short waves (millimeters) and typically relates to frequencies above 1GHz: 300 MHz ~ 1 meter 10 GHz ~ 3 cm
9
Proprietary and Confidential
RF Principals • We can see the relationship between colour, wavelength and amplitude using this animation
10
Proprietary and Confidential
Page 9
Radio Spectrum
11
Proprietary and Confidential
Parameters Affecting Propagation
12
Page 10
Parameters Affecting Propagation • Dispersion • Humidity/gas absorption • Multipath/ducting • Atmospheric conditions (refraction) • Terrain (flatness, type, Fresnel zone clearance, diffraction) • Climatic conditions (rain zone, temperature) • Rain attenuation
13
Proprietary and Confidential
Parameters Affecting Propagation – Dispersion • Electromagnetic signal propagating in a physical medium is degraded because the various wave components (i.e., frequencies, wavelengths) have different propagation velocities within the physical medium:
• Low frequencies have longer wavelength and refract less • High frequencies have shorter wavelength and refract more
14
Proprietary and Confidential
Page 11
Parameters Affecting Propagation Atmospheric Refraction • Deflection of the beam towards the ground due to different electrical characteristics of the atmosphere’s is called Dielectric Constant. • The dielectric constant depends on pressure, temperature & humidity in the atmosphere, parameters that are normally decrease with altitude • Since waves travel faster through thinner medium, the upper part of the wave will travel faster than the lower part, causing the beam to bend downwards, following the curve of earth
With Atmosphere
No Atmosphere 15
Proprietary and Confidential
Wave in atmosphere
Proprietary and Confidential
16
Page 12
Parameters Affecting Propagation – Multipath • Multipath occurs when there is more then one beam reaching the receiver with different amplitude or phase • Multipath transmission is the main cause of fading in low frequencies
Direct beam
Delayed beam
17
Proprietary and Confidential
Parameters Affecting Propagation – Duct •
Atmospheric duct refers to a horizontal layer in the lower atmosphere with vertical refractive index gradients causing radio signals:
•
Remain within the duct
•
Follow the curvature of the Earth
•
Experience less attenuation in the ducts than they would if the ducts were not present
Duct Layer
Duct Layer Terrain
18
Proprietary and Confidential
Page 13
Parameters Affecting Propagation - Polarization and Rain • Raindrops have sizes ranging from 0.1 millimeters to 9 millimeters mean diameter (above that they tend to break up)
• Smaller drops are called cloud droplets, and their shape is spherical. • • • •
As a raindrop increases in size, its shape becomes more oblate, with its largest cross-section facing the oncoming airflow.
Large rain drops become Increasingly flattened on the Bottom; very large ones are shaped like parachutes
19
Proprietary and Confidential
Parameters Affecting Propagation – Rain Fading • Refers to scenarios where signal is absorbed by rain, snow, ice • Absorption becomes significant factor above 11GHz • Signal quality degrades • Represented by “dB/km” parameter which is related the rain density which represented “mm/hr” • Rain drops falls as flattened droplet
V better than H (more immune to rain fading)
20
Proprietary and Confidential
Page 14
Parameters Affecting Propagation – Rain Fading
Heavier rain >> Heavier Atten. Higher FQ >> Higher Attenuation
21
Proprietary and Confidential
Parameters Affecting Propagation – Fresnel Zone 3rd 2nd 1st
TX
RX
1. EMW propagate in beams 2. Some beams widen – therefore, their path is longer 3. A phase shift is introduced between the direct and indirect beam 4. Thus, ring zones around the direct line are created
Duct Layer0
Terrain 22
Proprietary and Confidential
Page 15
Parameters Affecting Propagation – Fresnel Zone • • • •
Obstacles in the first Fresnel zone will create signals that will be 0 to 90 degrees out of phase…in the 2nd zone they will be 90 to 270 degrees out of phase…in 3rd zone, they will be 270 to 450 degrees out of phase and so on… Odd numbered zones are constructive and even numbered zones are destructive. When building wireless links, we therefore need to be sure that these zones are kept free of obstructions. In wireless networking the area containing about 40-60 percent of the first Fresnel zone should be kept free.
23
Proprietary and Confidential
Example: First condition
Proprietary and Confidential
24
Page 16
RF Link Basic Components – Parabolic Reflector Radiation (antenna)
25
Proprietary and Confidential
RSSI Curve for RFU-C
1,9V
1,6V
1,3V
-30dBm
-60dbm
Proprietary and Confidential
26
Page 17
-90dBm
Main Parabolic Antenna Types • • • • • • • • • •
Standard performance antennas (SP,LP) Used for remote access links with low capacity. Re-using frequencies on adjacent links is not normally possible due to poor front to back ratio. High performance antennas (HP) Used for high and low capacity links where only one polarization is used. Re-using frequencies is possible. Can not be used with co-channel systems. High performance dual polarized antennas (HPX) Used for high and low capacity links with the possibility to utilize both polarizations. Re-using frequencies is possible. Can be used for co-channel systems. Super high performance dual polarized antennas (HSX) Normally used on high capacity links with the possibility to utilize both polarizations. Re-using frequencies is possible with high interference protection. Ideal for co-channel systems. Ultra high performance dual polarized antennas (UHX) Normally used on high capacity links with high interference requirements. Re-using frequencies in many directions is possible. Can be used with co-channel systems.
Proprietary and Confidential
27
Passive Repeaters
Plane reflector
Back-to-back antennas
Proprietary and Confidential
28
Page 18
Link Calculation – Basic Example (in vacuum) Lfs TSL
Lfsl
Ga
Ga
RSL
RSL ‐ Received Signal Level TSL – Transmitted Signal Level Lfsl ‐ Free‐space loss = 92.45 + 20 log x(distance in km x frequency in GHz)
RSL
Ga – Antenna gain
RSL=TSL+Ga‐Lfsl+Ga
Proprietary and Confidential
29
Atmospheric attenuation Starts to contribute to the total attenuation above approximately 15GHz
Aa a d
[dB]
Parameters in a:
Frequency Temperature Air pressure Water vapour
Proprietary and Confidential
30
Page 19
Objective examples •
Typical objectives used in real systems
• 99.999% • •
Month: 25.9 sec Year: 5 min 12 sec
• 99.995 % • •
Month: 2 min 10 sec Year: 26 min
• 99.99% • •
Month: 260 sec Year: 51 min
• •
Performance requirements generally higher than Availability. ITU use worst month for Performance Average year for Availability
Proprietary and Confidential
31
Modulation
32
Page 20
Modulation Modulation
Analog Modulation
Digital Modulation
AM - Amplitude modulation FM - Frequency modulation PM – Phase modulation
ASK – Amplitude Shift Keying FSK – Frequency Shift Keying PSK – Phase Shift Keying QAM – Quadrature Amplitude modulation
Proprietary and Confidential
33
Digital modulation 1 1
0
1
1
0
1
1
0
1
1
0
1
0
1
0
ASK
Modem
0 1
1 1
0
1
1
0
1
1
1
0
1
1
modulation changes the amplitude to the analog signale.”1” and “ 0” have different amplitude.
0
0
PSK modulation changes the phase to the transmitted signal. The simplest method uses 0 and 1800 .
Modem
1800 phase shift 1 1
0
1
1
0
1
1
0
1
1
0
1
1
0
FSK modulation is a method of represent the two binary states ”1” and ”0” with different spcific frequencies.
Modem F1
F2
F1
F1 F2
F1
F1
Proprietary and Confidential
34
Page 21
QAM Modulation • Quadrature Amplitude Modulation employs both phase modulation (PSK) and amplitude modulation (ASK)
• The input stream is divided into groups of bits based on the number of modulation states used.
• In 8 QAM, each three bits of input, which provides eight values (0-7) alters the phase and amplitude of the carrier to derive eight unique modulation states • In 64 QAM, each six bits generates 64 modulation states; in 128 QAM, each seven bits generate 128 states, and so on 4QAM 2bits/symbol 8QAM 3bits/symbol 16QAM 4bits/symbol 32QAM 5bits/symbol 64QAM 6bits/symbol 128QAM 7bits/symbol
256QAM 512QAM 1024QAM 2048QAM
8bits/symbol 9bits/symbol 10bits/symbol 11bits/symbol
Proprietary and Confidential
35
Why QAM and not ASK or PSK for higher modulation? • This is because QAM achieves a greater distance between adjacent points in the I-Q plane by distributing the points more evenly
• The points on the constellation are more distinct and data errors are reduced
• Higher modulation >> more bits per symbol • Constellation points are closer >>TX is more susceptible to noise
Proprietary and Confidential
36
Page 22
Constellation diagram • In a more abstract sense, it represents the possible symbols that may be selected by a given modulation scheme as points in the complex plane. Measured constellation diagrams can be used to recognize the type of interference and distortion in a signal.
Proprietary and Confidential
37
8 QAM Modulation Example We have stream: 001-010-100-011-101-000-011-110 DIGITAL QAM (8QAM) Bit sequence
Amplitude
000
1
Phase (degrees) None
001
2
None
010
1
pi/2 (90°)
011
2
pi/2 (90°)
100
1
pi (180°)
101
2
pi (180°)
110
1
3pi/2 (270°)
111
2
3pi/2 (270°)
How does constellation diagram look?
Proprietary and Confidential
38
Page 23
4QAM VS. 16QAM
16QAM
4QAM
Proprietary and Confidential
39
2048 QAM
Proprietary and Confidential
40
Page 24
Bandwidth vs. Modulation
2-PSK
4-PSK Modulation Complixity Increases
Bandwidth Decreases
8-PSK
16-QAM
64-QAM
Proprietary and Confidential
41
Signal / Noise • Example: S/N influence at QPSK Demodulator • Each dot detected in wrong quadrant result in bit errors
BER<10-13
BER≈0
BER=10-6
BER=10-3
Signal
Noise
Signal S/N Noise
Proprietary and Confidential
42
Page 25
Power
S/N
Power
Power
Noise
Power
Signal S/N
Signal S/N Noise
BER Impact on Transmission Quality 10 -3
10 -4
10 -5
BER change ratio vs. Noise is dependent on Noise Power distribution and coding
10 -6
10 -7
BER
10 -8 -75
-72 -69 Receiver inpu t level [dBm ]
-66
Proprietary and Confidential
43
RSL Vs. Threshold RSL (dBm)
BER>10-6
-20 -30
Nominal Input Level
Fading Margin
-73
Threshold level BER=10-6
BER>10-6
S/N=23dB for 128QAM (37 MHz) Receiver amplifies thermal noise
-96 -99
Thermal Noise=10*log(k*T*B*1000)
K – Boltzmann constant T – Temperature in Kelvin B – Bandwidth
Time (s) Proprietary and Confidential
44
Page 26
Thank you
45
Page 27
Page 28
Introduction to Ethernet
November 2013 Version 1
Agenda • Local Area Network (LAN) • Network Devices • OSI Layers • Ethernet Frame • VLAN concept
Proprietary and Confidential
2
Page 29
The Local Area Network (LAN)
Proprietary and Confidential
3
Network Devices The various devices used to build a data communication network can be classified into type of equipment depending on how Ethernet packets are forwarded.
ROUTER
BRIDGE / SWITCH HUB
Proprietary and Confidential
4
Page 30
Functions of OSI layers OSI model layers Application Presentation Session Transport
Type of communication: e-mail, file transfer, web browsing Encryption, data conversion: ASCII to EBCDIC, BCD to binary et.
Starts, stops sessions. Maintains order Ensure delivery of entire file or message
Network
Routes data to different LANs and WANs based on network addresses
Data Link
Transmits packets from node to node based on station address
Physical
Electrical signals and cabling (physical medium)
Proprietary and Confidential
5
Protocols in OSI layers OSI model layers Application Presentation Session Transport
HTTP, FTP, IRC, SSH, DNS, SNMP SSL, SFTP, IMAP, SSH, Jpeg, GIF, TIFF, MPEG, MIDI, mp3
VARIOUS API’S, SOCKETS TCP, UDP, ECN, SCTP, DCCP
Network
IP, IP Sec, ICMP, IGMP
Data Link
Ethernet, Token Ring, SLIP, PPP, FDDI
Physical
Coax, Fiber, Wireless
Proprietary and Confidential
6
Page 31
Ethernet frame
Proprietary and Confidential
7
OSI and TCP/IP model TCP/IP model
OSI model layers
OSI model layers Application Protocol
Application Presentation Application
Internet Layer 2,5 Network Interface
P SFD MAC EL VLAN MPLS IP
Presentation DATA
Session Protocol
Session Transport
Application
Presentation Protocol
Session TCP/UDP
DATA
Transport
IPv4/6
TCP/UDP
DATA
Network
IPv4/6
TCP/UDP
DATA
Layer 2,5
E L
IPv4/6
TCP/UDP
DATA
FCS
Data Link
E L
IPv4/6
TCP/UDP
DATA
FCS
Physical
20/40
20/8
Transport Network MPLS
Layer 2,5 Data Link
MAC
S‐VLAN
C-VLAN
MPLS
S‐VLAN
C-VLAN
MPLS
Physical
P
SFD
MAC
Size in bytes:
7
1
12
Preamble Start frame Delimiter = Destination + Source MAC Address Ether Length/Type Virtual local area network Multiprotocol Label Switching Internet protocol
4
TCP UDP FCS
4
4
2
Transmission control protocol User datagram protocol Frame check sequence
Proprietary and Confidential
8
Page 32
4
46-1500
L2
Proprietary and Confidential
9
L3
Proprietary and Confidential
10
Page 33
L4 UDP Header
TCP Header
Proprietary and Confidential
11
Inter-frame gap
Ethernet works in Layer 1, Layer 2 and “Layer 2,5”
Proprietary and Confidential
12
Page 34
VLAN concept
Virtual Local Area Network (VLAN) concept • • • •
Imagine that you have a network and three different customer Customer 1 Customer 2 Customer 3
NETWORK
Proprietary and Confidential
14
Page 35
Virtual Local Area Network (VLAN) concept
VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations The most common protocol used today in configuring virtual LANs is IEEE 802.1Q
Proprietary and Confidential
15
OSI and TCP/IP model TCP/IP model
OSI model layers
OSI model layers Application Protocol
Application Presentation Application
Internet Layer 2,5 Network Interface
P SFD MAC EL VLAN MPLS IP
Presentation DATA
Session Protocol
Session Transport
Application
Presentation Protocol
Session TCP/UDP
DATA
Transport
IPv4/6
TCP/UDP
DATA
Network
IPv4/6
TCP/UDP
DATA
Layer 2,5
IPv4/6
TCP/UDP
DATA
FCS
Data Link
IPv4/6
TCP/UDP
DATA
FCS
Physical
20/40
20/8
Transport Network MPLS
Layer 2,5 Data Link
MAC
S‐VLAN
C-VLAN
MPLS
E L
C-VLAN
MPLS
E L
Physical
P
SFD
MAC
S‐VLAN
Size in bytes:
7
1
12
4
Preamble Start frame Delimiter = Destination + Source MAC Address Ether Length/Type Virtual local area network Multiprotocol Label Switching Internet protocol
TCP UDP FCS
4
4
2
Transmission control protocol User datagram protocol Frame check sequence
Proprietary and Confidential
16
Page 36
4
46-1500
Ethernet frame
Proprietary and Confidential
17
Untagged Ethernet Frame
FCS is created by the sender and recalculated by the receiver
Preamble + SFD 8 Bytes
DA 6 Bytes
SA
Length / Type
6 Bytes
2 Bytes
DATA + PAD
FCS
46 - 1500 Bytes
4 Bytes (32-bit CRC)
Minimum 64 Bytes < FRAME SIZE < Maximum 1518 Bytes
Length / Type < 1500 - Parameter indicates number of Data Bytes Length / Type > 1536 - Parameter indicates Protocol Type (PPPoE, PPPoA, ARP etc.)
Proprietary and Confidential
18
Page 37
Tagged Ethernet Frame • Additional information is inserted • Frame size increases to 1522 Bytes
4 Bytes
Preamble + SFD
DA
SA
VLAN TAG
TPID = 0x8100
Length / Type
FCS
TCI
P‐TAG TPID = Tag protocol ID TCI = Tag Control Information CFI = 1 bit canonical Format Indicator
DATA + PAD
3 Bit
CFI 1 Bit
VLAN ID 12 Bit
Proprietary and Confidential
19
Tagging a Frame
VLAN ID uses 12 bits, therefore the number of maximum VLANs is 4096: • 212 = 4096 • VID 0 = reserved • VID 4090-4096 = reserved (dedicated for IP-10’s internal purposes such as MNG etc.) • VID 1 = default
• After tagging a frame, FCS is recalculated • CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over ETH backbones (some vendors may use CFI for internal purposes)
Proprietary and Confidential
20
Page 38
TPID / ETHER-Type / Protocol Type… TPID in tagged frames in always set to 0x8100 It is important that you understand the meaning and usage of this parameter
Protocol type
Value
Tagged Frame
0x8100
ARP
0x0806
Q‐in‐Q (CISCO)
0x8100
Q‐in‐Q (other vendors)
0x88A8
Q‐in‐Q (other vendors)
0x9100
Q‐in‐Q (other vendors)
0x9200
RARP
0x8035
IP
0x0800
IPv6
0x86DD
PPPoE
0x8863/0x8864
MPLS
0x8847/0x8848
IS‐IS
0x8000
LACP
0x8809
802.1x
0x888E
Proprietary and Confidential
21
Q-in-Q • Additional VLAN (S-VLAN) is inserted • Frame size increases to 1526 Bytes
Preamble + SFD
DA
TPID = 0x88A8
P‐TAG 3 Bit
SA
4 Bytes
4 Bytes
S ‐ VLAN
C ‐ VLAN
TCI
TPID = 0x8100
CFI VLAN ID 1 Bit
Length / Type
DATA + PAD
TCI
P‐TAG
CFI
VLAN ID
3 Bit
1 Bit
12 Bit
12 Bit Proprietary and Confidential
22
Page 39
FCS
Thank you
23
Page 40
IP-20G Overview
July 2014 Version 2
Agenda • FibeAir IP-20 Product Family • Network topology with IP-20G • IP-20G Introduction and Highlights • IP-20G Front Panel Description • IP-20G Block Diagram
Proprietary and Confidential
2
Page 41
FibeAir IP-20 Product Family IP-20G
IP-20N 1RU & 2RU
IP-20S IP-20C
IP‐20 Platform IP-20A= IP20N + RFU-A IP-20LH Proprietary and Confidential
3
FibeAir IP-10 Product Line - 2011 Ethernet + Optional TDM
Ethernet Only
IP-10E
IP-10G
Terminal / Single-Carrier
Terminal / Single-Carrier
IP-10C Compact All-Outdoor
IP-10Q Nodal
Nodal
Aggregation
Optimized for “Full GE” Multi-Carrier pipes Ultra-high density
Optimized Solution for Any Network Proprietary and Confidential
4
Page 42
FibeAir IP-X0 Product Line - 2012 (Introducing IP-20G) Ethernet + Optional TDM
Ethernet Only
IP-10E
IP-10G
Terminal / Single-Carrier
IP-10C Compact All-Outdoor
Terminal / Single-Carrier
IP-20G
IP-10Q Aggregation
Optimized for “Full GE” Multi-Carrier pipes Ultra-high density
Optimized Solution for Any Network Proprietary and Confidential
5
Network Topology Example (Tree)
C
C
1+0
1+1
C C 2+0
C
IP‐20N
C 1+1
C
C
IP‐20N
C C
1+0
IP‐20N
C
C 1+0
2+0
C
IP‐10G
1+0
2+0
C IP‐20N
C
IP‐20G
C
IP‐10G
Proprietary and Confidential
6
Page 43
C
IP‐20G
IP-20G Introduction IP-20G hardware characteristics:
•
• • • • • • • •
6 x 1 GE interfaces total • 2 x dual mode GE electrical or cascading interfaces (RJ-45) • 2 x GE electrical interfaces (RJ-45) • 2x GE optical interfaces (SFP) Optional: 16 x E1 interfaces Single or dual radio interfaces (TNC) Single or dual power-feeds (-48v) Sync in/out interface Management interfaces • Terminal – RS232 (RJ-45) • 2x FE electrical interfaces (RJ-45) External alarms interface RFU-C support IP-20G maintains high capacity, with up to 1024QAM modulation in its first SW release (T7.7), and up to 2048QAM in future release
Proprietary and Confidential
7
IP-20G Highlights • Optimized tail/edge solution supporting seamless integration of radio (L1) and end-to-end Carrier Ethernet transport/services (L2) functionality
• Rich packet processing feature set for support of engineered end-to-end Carrier Ethernet services with strict SLA
• Integrated support for multi-operator and converged backhaul business models, such as wholesale services and RAN-sharing
• Highest capacity, scalability and spectral efficiency • High precision, flexible packet synchronization solution combining SyncE and 1588v2
• Best-in-class integrated TDM migration solution • Specifically built to support resilient and adaptive multi-carrier radio links, scaling to GE capacity
• Future-proof with maximal investment protection • Supports RFU-Ce for modulations up to 1024QAM. Proprietary and Confidential
8
Page 44
IP-20G Front Panel Description
9
FibeAir IP-20G – Front panel description Passive cooling (Fan-less design)
1RU
16 x E1/DS1s (optional) MDR69 connector
External Alarms (DB9) Sync in/out (RJ45)
2 x FE Management (RJ45)
2 x Dual-Mode:
GE Electrical or ‘Cascading’ (RJ45) Terminal (RJ45)
2 x GE Optical (SFP)
1 or 2 RFU interfaces (TNC)
Power -48V DC (Single-feed & Dual-feed options)
2 x GE Electrical (RJ45)
Purpose-built for tail/edge nodal sites Same features/capabilities as IP-20A Aggregation Nodes Proprietary and Confidential
10
Page 45
SM- Card • The SM-Card holds the configuration and software for the IDU. The SMCard is embedded in the SM-Card Cover, so re-using the existing SM-Card Cover is necessary to ensure that the unit’s software and configuration is maintained.
Proprietary and Confidential
11
Ethernet Management Interface IP-20G •
FibeAir IP-20G contains two FE management interfaces, which connect to a single RJ-45 physical connector on the front panel (MGMT).
•
If the user only needs to use a single management interface, a standard Cat5 RJ-45 cable (straight or cross) can be connected to the MGMT interface. To access both management interfaces, a special 2 x FE splitter cable can be ordered from Ceragon.
•
•
Port Status LED – The LED for management interface 1 is located on the upper left of the MGMT interface. The LED for management interface 2 is located on the upper right of the MGMT interface. Proprietary and Confidential
12
Page 46
DS1 - Interface • • • • •
Optionally, FibeAir IP-20G can be ordered with an MDR69 connector in which 16 DS1 interfaces are available (ports 1 through 16). In SW 7.7. is E1 option only available The DS1 interface has the following LEDs ACT LED – Indicates whether the TDM card is working properly (Green) or if there is an error or a problem with the card’s functionality (Red). E1/DS1 LED – Indicates whether the interfaces are enabled with no alarms (Green), with alarms (Red), or no interfaces enabled (Off).
Proprietary and Confidential
13
Radio Interfaces • • • • • •
In 7.7 is supported only single radio carrier. In 7.7.5 will be supported 2x 1+0 East / West Terminal In future software release will be available 2+0 ABC In 7.7 is supported only RFU-C (up to 256QAM) and RFU-Ce (up to 1024 QAM) RFU-HP, 1500HP, RFU-A support is planned for future software releases The IDU and RFU are connected by a coaxial cable RG-223 (100 m/300 ft), Belden 9914/RG-8 (300 m/1000 ft) or equivalent, with an N-type connector (male) on the RFU and a TNC connector on the IDU.
RFU-C / RFU-Ce
1500HP
RFU-A Proprietary and Confidential
14
Page 47
Radio Interfaces - LEDs •
•
•
ACT – Indicates whether the interface is working properly (Green) or if there is an error or a problem with the interface’s functionality (Red), as follows: • Off – The radio is disabled. • Green – The radio is active and operating normally. • Blinking Green – The radio is operating normally and is in standby mode. • Red – There is a hardware failure. • Blinking Red – Troubleshooting mode. LINK – Indicates the status of the radio link, as follows: • Green – The radio link is operational. • Red – There is an LOF or Excessive BER alarm on the radio. • Blinking Green – An IF loopback is activated, and the result is OK. • Blinking Red – An IF loopback is activated, and the result is Failed. RFU – Indicates the status of the RFU, as follows: • Green – The RFU is functioning normally. • Yellow – A minor RFU alarm or a warning is present, or the RFU is in TX mute mode, or, in a protected configuration, the RFU is in standby mode. • Red – A cable is disconnected, or a major or critical RFU alarm is present. • Blinking Green – An RF loopback has been activated, and the result is OK. • Blinking Red – An RF loopback has been activated, and the result is Failed.
Proprietary and Confidential
15
Power Interfaces
•
FibeAir IP-20G receives an external supply of -48V current via one or two power interfaces (the second power interface is optional for power redundancy).
•
The IP-20G monitors the power supply for under-voltage and includes reverse polarity protection, so that if the positive (+) and negative (-) inputs are mixed up, the system remains shut down.
•
The allowed power input range for the IP-20G is -40V to -60V. An under voltage alarm is triggered if the power goes below the allowed range, and an over voltage alarm is triggered if the power goes above the allowed range.
• •
There is an ACT LED for each power interface. The LED is Green when the voltage being fed to the power interface is within range, and Red if the voltage is not within range or if a power cable is not connected.
Proprietary and Confidential
16
Page 48
Synchronization Interface •
FibeAir IP-20G includes an RJ-45 synchronization interface for T3 clock input and T4 clock output. The interface is labeled SYNC.
•
The synchronization interface contains two LEDs, one on the upper left of the interface and one on the upper right of the interface, as follows:
•
T3 Status LED – Located on the upper left of the interface. Indicates the status of T3 input clock, as follows: Off – There is no T3 input clock, or the input is illegal. Green – There is legal T3 input clock.
• • • • • •
T4 Status LED – Located on the upper right of the interface. Indicates the status of T4 output clock, as follows: Off – T4 output clock is not available. Green – T4 output clock is available. Blinking Green – The clock unit is in a holdover state.
Proprietary and Confidential
17
External Alarms •
IP-20G includes a DB9 dry contact external alarms interface. The external alarms interface supports five input alarms and a single output alarm.
•
The input alarms are configurable according to: • 1 Intermediate • 2 Critical • 3 Major • 4 Minor • 5 Warning
•
The output alarm is configured according to predefined categories.
Proprietary and Confidential
18
Page 49
Terminal Interface • FibeAir IP-20G includes an RJ-45 terminal interface (RS-232). A local craft terminal can be connected to the terminal interface for local CLI management of the unit.
• • • • •
Bits per Second – 115,200 Data Bits – 8 Parity – None Stop Bits – 1 Flow Control - None
Proprietary and Confidential
19
IP-20G Block Diagram
Proprietary and Confidential
20
Page 50
Thank You
21
Page 51
Page 52
IP-20G Installation Guide
May 2014 Version 1
Agenda • Electromagnetic Fields, ESD and Laser Protection • General Requirements for Packing and Transportation and Environment
• IP-20G Rack Installation
• • • •
• Rack Installation • Grounding the IP-20G • Replacing SM-Card • Power Cable • Mechanical Specifications Earth Bonding of Equipment IP-20G to RFU-C connection Antenna Installation RFU-C Installation
Proprietary and Confidential
2
Page 53
High Frequency Electromagnetic Fields! • Exposure to strong high frequency electromagnetic fields may cause
thermal damage to personnel. The eye (cornea and lens) is easily exposed.
• Any unnecessary exposure is undesirable and should be avoided. • In radio-relay communication installations, ordinary setup for normal
operation, the general RF radiation level will be well below the safety limit.
• In the antennas and directly in front of them the RF intensity normally will exceed the danger level, within limited portions of space.
• Dangerous radiation may be found in the neighborhood of open waveguide flanges or horns where the power is radiated into space.
• To avoid dangerous radiation the following precautions must be taken: • During work within and close to the front of the antenna; make sure that transmitters will remain turned off. • Before opening coaxial - or waveguide connectors carrying RF power, turn off transmitters. • Consider any incidentally open RF connector as carrying power, until otherwise proved. Do not look into coaxial connectors at closer than reading distance (1 foot). Do not look into an open waveguide unless you are absolutely sure that the power is turned off.
Proprietary and Confidential
3
ESD & LASER • ESD • This equipment contains components which are sensitive to "ESD" (Electro • • • • •
Static Discharge). Therefore, ESD protection measures must be observed when touching the IDU. Anyone responsible for the installation or maintenance of the FibeAir IDU must use an ESD Wrist Strap. Additional precautions include personnel grounding, grounding of work bench, grounding of tools and instruments as well as transport and storage in special antistatic bags and boxes. LASER Use of controls or adjustments or performance of procedures other than those specified herein may result in hazardous radiation exposure. The optical interface must only be serviced by qualified personnel, who are aware of the hazards involved to repair laser products.
Proprietary and Confidential
4
Page 54
General Requirements
Transportation & Inspection •
The equipment cases are prepared for shipment by air, truck, railway and sea, suitable for handling by forklift trucks and slings. The cargo must be kept dry during transport and storage.
•
It is recommended that the equipment be transported to the installation site in its original packing case.
•
If intermediate storage is required, the packed equipment must be stored in a dry and cool environment, and out of direct sunlight, in accordance with ETS 300 0191-1, Class 1.2.
•
Check the packing lists and verify that the correct equipment part numbers and quantities are in the delivered packages.
Proprietary and Confidential
6
Page 55
Packing & Transportation The equipment is packed at the factory, and sealed moisture-absorbing bags are inserted. The equipment is prepared for public transportation. The cargo must be kept dry during transportation. Keep items in their original boxes till they reach their final destination. If intermediate storage is required, the packed equipment must be stored in dry and cool conditions and out of direct sunlight When unpacking – Check the packing lists, and ensure that the correct part numbers and quantities of components arrived.
Proprietary and Confidential
7
General Requirements 1. Environmental specification for IDU: -5C (23F) to +55C (131F) 2. Environmental specification for RFU: -33C (-27F) to +55C (131F) high reliability 3. -45C (-49F) to +60C (140F) with limited margins 4. Cold startup requires at least -5C (23F) 5. Humidity: 5%RH to 95%RH for IP-20G 6. Humidity: 5%RH to 100%RH for RFU-C 7. IDU standard Input is -48VDC (-40 to -60VDC) 8. This equipment is designed to permit connection between the earthed conductor of the DC supply circuit and the Earthing conductor at the equipment. 9. The equipment shall be connected to a properly grounded supply system 10. The DC supply system is to be local, i.e. within the same premises as the equipment 11. A disconnect device is not allowed in the grounded circuit between the DC supply source and the frame/grounded circuit connection. 8
8
Proprietary and Confidential
Page 56
IP-20G Rack Installation
Installing the IP-20G IDU
Kits required to perform the installation: • IP-20G chassis • 19” rack/ sub rack • SM-Card Cover
1x 1x 1x
Tools: Philips screwdriver Flat screwdriver Proprietary and Confidential
10
Page 57
Rack Installation • Insert and hold the IP-20G IDU in the rack, as shown in the following figures. Use four screws (not supplied with the installation kit) to fasten the IDU to the rack.
Proprietary and Confidential
11
Grounding the IP-20G • Connect a grounding wire first to the single-point stud shown in the figure below, and then to the rack, using a single screw and two washers.
• The grounding wire must be 16 AWG or thicker
Proprietary and Confidential
12
Page 58
Replacing an IP-20G IDU or SM-Card •
If you should need to replace the IP-20G IDU, you must first remove the SM-Card Cover so that you can insert it into the new IDU. • The SM-Card holds the configuration and software for the IDU. The SM-Card is embedded in the SM-Card Cover, so re-using the existing SM-Card Cover is necessary to ensure that the unit’s software and configuration is maintained. • In some cases, you may need to replace the SM-Card itself in order to upgrade the unit’s configuration. To remove the SM-Card Cover: 1. Loosen the screws of the SM-Card Cover and remove it from the IDU.
Proprietary and Confidential
13
Replacing an IP-20G IDU or SM-Card 2. In the new IDU or, if you are upgrading the SM-Card, the old IDU, make sure that there is no foreign matter blocking the sockets in the opening where the SM-Card is installed.
3. Gently place the SM-Card Cover in its place and tighten the screws, using a Phillips screwdriver.
Proprietary and Confidential
14
Page 59
Power Requirements When selecting a power source, the following must be considered:
15
•
DC power can be from -40 VDC to -60 VDC.
•
Installation Codes: The equipment must be installed according to country national electrical codes. For North America, equipment must be installed in accordance to the US National Electrical Code, Articles 110-16, 110-17 and 110-18, and the Canadian Electrical Code, Section 12.
•
Overcurrent Protection: A readily accessible listed branch circuit overcurrent protective device, rated 15 A, must be incorporated in the building wiring.
•
Grounded Supply System: The equipment shall be connected to a properly grounded supply system. All equipment in the immediate vicinity shall be grounded the same way, and shall not be grounded elsewhere.
•
Local Supply System: The DC supply system is to be local, i.e. within the same premises as the equipment.
•
Disconnect Device: A disconnect device is not allowed in the grounded circuit between the DC supply source and the frame/grounded circuit connection. Proprietary and Confidential
15
Power Interface •
FibeAir IP-20G receives an external supply of -48V current via one or two power interfaces (the second power interface is optional for power redundancy). The IP-20G monitors the power supply for under-voltage and includes reverse polarity protection, so that if the positive (+) and negative (-) inputs are mixed up, the system remains shutdown. The allowed power input range for the IP-20G is -40V to -60V. An under voltage alarm is triggered if the power goes below the allowed range, and an over voltage alarm is triggered if the power goes above the allowed range. Make sure to use a circuit breaker to protect the circuit from damage by short or overload. In a building installation, the circuit breaker shall be readily accessible and incorporated external to the equipment. The maximum rating of the overcurrent protection shall be 10 Amp, while the maximum current rating is 5 Amp.
• •
Proprietary and Confidential
16
Page 60
Power Cable
17
Proprietary and Confidential
Power cables
Proprietary and Confidential
18
Page 61
Mechanical Specifications
Proprietary and Confidential
19
Earth Bonding of Equipment
Copyright © 2009 – 2013 Nera Networks AS All rights reserved.
I-79113-EN rev. A
Page 62
Typical Earthing Network Note 1: Structure or cable riser directly connected to Station Earth Network. Note 2: Main Earth Bar in equipment room, connected to Station Earth Network. Note 3: Earth Bus Bar/Cable connected to main earth bar. Note 4: Coax Signal Cable. Note 5: Over voltage protection integrated in units.
Note 1
Proprietary and Confidential
21
Feeder - Earthing Kit (pos.1) Ceragon Networks provides one Earthing kit per feeder as standard Earthing Kit staggered to ensure smooth, uniform jumper transition to point of bonding.
There are three logical positions where a Waveguide/Feeder Earthing Kit should be installed: 1.
Highest priority is at the bottom of the vertical feeder run, on the straight section just above the bend where it transitions from vertical to horizontal.
Custom Earthing Kit supplied from the Feeder Manufacturer – use only kit that are compatible.
2.
Jumper Leads from the kit should be bonded to the Tower Structure: - directly (bolted connection) - via a earth termination plate (if provided) - stainless steel angle adaptor (ANDREW) Earth Kit on the feeder should be positioned so that each jumper lead has a uniform smooth transition down to the point of bonding – this may mean staggering their position as shown here.
Never intermix components from different Manufacturers.
3.
4.
It is preferred that each jumper is bonded separately.
Jumper lead between Earthing Kit and buried earth radial bonded to base of the Tower Leg. Recommended 70mm² PVC Coated Conductor
SEE NEXT TWO SLIDES
Proprietary and Confidential
22
Page 63
Feeder - Earthing Kit (pos.2) Second line of defence The second position in order of priority is just before the waveguide/feeder enters the shelter through the wall plate. 1.
Earth Termination Plate
Again it is important that the jumper lead forms a smooth transition downwards to earth. In this case the bonding point is on the earth termination plate mounted below the cable bridge.
2.
It is preferred that each jumper is bonded separately. Earth Termination Plate usually have multiple bonding holes predrilled.
3.
To shape each conductor correctly begin at the earth termination plate and form the cable to the best transition back to the feeder. From there you will establish the location to fit the earth kit. Treat each earthing kit separately.
Common Errors Fitting or, finding the Earth Termination Plate too high on the shelter wall often prevent achieving the required earth jumper transition.
Earth Kit
Jumper lead between Earthing Kit and Earth Termination Plate outside shelter. Recommended 70mm² PVC Coated Conductor or 3mm x 25mm Copper Tape. Conductor / Tape should be run out to the Buried earth loop at a depth of 600mm.
Proprietary and Confidential
23
Feeder - Earthing Kit (pos.3) The third position in order of priority is at the antenna position. Here, the Earthing Kit is fitted on the vertical straight section of feeder just after the transition from horizontal to vertical. 1.
Once again it is important that the jumper lead forms a smooth transition downwards to earth. It is usual to use the tower structure itself as the main down conductor.
2.
To shape each conductor correctly begin at the bonding point and form the cable to the best transition back to the feeder. From there you will establish the best position to fit the earth kit to the feeder. Treat each earthing kit separately.
3.
If using a Stainless Steel Angle Adaptor – this will provide flexibility to establishing a bonding point on the tower – the Angle Adaptor does not require you to find or drill a hole in any structural members.
The tower structure or climbing ladder are both commonly used for bonding the earth jumper. Angle Adaptors are the most convenient bonding method as this avoids finding or drilling holes at height in the tower.
Additional Earthing Kit: If a customer specifies additional earthing kit to be fitted, these would normally be positioned between the two kit installed at the top and bottom of the feeder.
Proprietary and Confidential
24
Page 64
ODU Earthing EACH ODU IS SEPARATELY EARTHED – DO NOT JUMPER BETWEEN ODU
1. SMOOTH JUMPER TRANSITION 2. SHORTEN THE JUMPER IF TOO LONG 3. SUPPORT EARTH JUMPER WHERE NEEDED
4. BOND TO TOWER STRUCTURE. CLAMP TYPE DEPENDENT ON TOWER MEMBER PROFILE
RSSI
N-Type to IDU connection
EARTH TERMINAL
Proprietary and Confidential
25
Applying the same principles to all cables
With All Cable Installations Avoid leaving coils along feeder cables Avoid – kinking the cable Avoid – cable loopbacks
Proprietary and Confidential
26
Page 65
Weatherproofing • Each Earthing Kit should be protected with a waterproof weather seal • If the weather seals are not provided as part of the main Earthing Kit, they must be ordered
• Each kit is provided with an installation instruction (or, Bulletin) • Always follow the advice given in the instruction to achieve the best possible installation
Proprietary and Confidential
27
ODU to IDU connection
Page 66
IP-20G to RFU-C connection The cable should have a maximum attenuation of 30 dB at 350 MHz. TNC N-type female
N-type male
TNC male
TNC females Proprietary and Confidential
29
N-type connector installation http://www.youtube.com/watch ?v=cAV_xhP3FNA
http://www.youtube.com/watch ?v=Mo9LwdHe39M
Proprietary and Confidential
30
Page 67
TNC connector installation instructions http://www.youtube.co m/watch?v=XfA0JVR JSxU
Proprietary and Confidential
31
Protecting the IF Connector for Split Mount Make sure the vulcanized tape and PVC tape overwrap extends right up to the ODU casing and is hand moulded around the connector to form a water tight joint
Fit a small cable tie at the top and bottom of the weather kit to prevent the PVC tape over wrap from loosening
Also is possible to use cold shrink medium instead of tapes
Self sealing vulcanized tape weather kit should be applied to the connector at the ODU to make it fully water tight.
The vulcanized tape must be overwrapped with PVC tape tied off at the top and bottom with cable ties.
Failure to follow every detail of the installation instructions will result with water damage to the connector and cable
Proprietary and Confidential
32
Page 68
Cable Clamping IF Cable
Tower Cross Member
Avoid this method which is less secure and will cause unsightly bending of the cable
When securing cables with cable ties the method shown here can normally be achieved using a single tie. This method will keep the cable straight and provide the best support
Proprietary and Confidential
33
Cable Installation and Grounding • For optical cables no grounding is required • For Ethernet cables, the cable should be grounded to the antenna tower every 50m using the kit CAT5E_gnd_kit.
• Procedure – see installation Guide
Proprietary and Confidential
34
Page 69
Antenna Installation
RSSI Curve
1,9V
1,6V
1,3V
-30dBm 36
Proprietary and Confidential
Page 70
-60dbm
-90dBm
Antenna Panning - Azimuth Important to establish which are the side lobes and what is the main beam Position can be marked onto the column or interface using a felt tipped pen
Receiving Antenna
SIDE LOBE
AZIMUTH
Always Pan antenna beyond each side lobe MAIN BEAM
SIDE LOBE
For Azimuth panning it is important to establish the strongest possible signal – but remember, further improvement should be expected once elevation adjustment is carried out
37
Proprietary and Confidential
Antenna Panning - Elevation Determine from available data if the antenna direction of shoot is above or below horizontal to ensure the elevation is adjusted in the correct direction With the main beam having already been established it is not necessary to find the side lobes again
Receiving Antenna
Once the best signal strength has been found using elevation – minor azimuth panning can often improve the signal strength further
SIDE LOBE
ELEVATION
HORIZONTAL
MAIN BEAM
Note:
SIDE LOBE
It should not always be expected to establish the strongest receive signal at first attempt to align an antenna Antenna may need to be panned several times before the optimum signal strength is established 38
Proprietary and Confidential
Page 71
Dual Polarized Antenna connection To fit the Duel Polarized Waveguide Interface Note: There may be some variation in of the Duel Polarized Waveguide Interface always refer to the installation Bulletin before attempting to install this unit
Remove the two Waveguide Interface securing screws. Replace the Waveguide Interface with the Dual Polarized Waveguide Interface. Secure the Dual Polarized Waveguide Interface to the antenna by means of two screws M8. Remount the two Waveguide Interface securing screws. 39
Proprietary and Confidential
Dual Polarized Antenna connection DUEL POLARIZED FEEDHORN
WAVEGUIDE
V
H
Waveguide ports on feedhorn clearly marked to show polarization
40
Proprietary and Confidential
Page 72
RFU-C Installation
RFU-C waveguide flanges
Proprietary and Confidential
42
Page 73
RFU-C direct mount configurations
1+0 direct
Proprietary and Confidential
43
RFU-C and Antenna Interface Direct Mount Polarization
Proprietary and Confidential
44
Page 74
RFU-C remote mount configurations
1+0 remote
Proprietary and Confidential
45
RFU-C direct 1+1 mount configurations 1+1 direct
Proprietary and Confidential
46
Page 75
RFU-C 1+1 Coupler Direct Mount Polarization Vertical Polarization
Horizontal Polarization
Proprietary and Confidential
47
RFU-C remote mount configurations 1+1 remote
Proprietary and Confidential
48
Page 76
Orthogonal Mode Transducer (OMT) Installation
Switch to the circular adaptor (removing the existing rectangular transition, swapping the O-ring, and replacing on the circular transition).
Proprietary and Confidential
49
OMT Installation Example
Proprietary and Confidential
50
Page 77
RFU-C Mediation devices losses
Proprietary and Confidential
51
Thank you
52
Page 78
First login
Ceragon Training Services July, 2014 v2
Agenda
• CLI and Web login • General commands • Get IP address • Set IP address • Set to default
Proprietary and Confidential
2
Page 79
Connecting to the Unit CLI
Web/Telnet
Baud rate = 115200 Bits per Second – 115,200 Data Bits – 8 Parity – None Stop Bits – 1 Flow Control - None
IP address = 192.168.1.1
Default Username/password is admin/admin Proprietary and Confidential
3
General commands
Press twice the TAB key for optional commands in actual directory Use the TAB key to auto-complete a syntax
Use the arrow keys to navigate through recent commands
Question mark to list helpful commands
Proprietary and Confidential
4
Page 80
Get IP address CLI Command: “platform management ip show ip-address”
Proprietary and Confidential
5
Changing Management IP Address • CLI Command: “platform management ip set ipv4-address
subnet gateway ”
• Example • Web expand Platform branch, then Management branch and click on IP, set accordingly and click Apply button
Proprietary and Confidential
6
Page 81
Set to default • CLI Command: “platform management set-to-default”
Please note that IP address after Set to Factory Default will be not changed!!!
Proprietary and Confidential
7
Other CLI commands • For any CLI commands please follow our Web Manual • Open Index html file • Find out in Topics submenu required configuration
Proprietary and Confidential
8
Page 82
Web Management
9
First Web login Default IP address is 192.168.1.1 /24
Default Username/password is admin/admin Proprietary and Confidential
10
Page 83
IP address settings
2
1
Proprietary and Confidential
11
Thank You
Page 84
ACM – Adaptive Coding and Modulation MSE – Mean Square Error
Ceragon Training Services May 2014 version 1
Agenda
• Adaptive Coding and Modulation • Using MSE with ACM • What is MSE? • Link Commissioning with MSE • Triggering ACM with MSE
Proprietary and Confidential
2
Page 85
Adaptive Coding and Modulation (ACM) •
In ACM mode, the radio will select the highest possible link capacity based on received signal quality.
•
When the signal quality is degraded due to link fading or interference, the radio will change to a more robust
•
When signal quality improves, the modulation is automatically increased and link capacity is restored to the original
modulation and link capacity is consequently reduced.
setting. The capacity changes are hitless (no bit errors introduced).
•
During the period of reduced capacity, the traffic is prioritized based on Ethernet QoS - and TDM priority - settings.
•
In case of congestion the Ethernet or TDM traffic with lowest priority is dropped. TDM capacity per modulation
4QAM
8QAM 16QAM
32QAM
64QAM
128QAM
256QAM
512QAM
1024QAM SFEC
1024QAM LFEC
Low Priority Traffic
2048QACM
High Priority Traffic
state is configurable as part of the TDM priority setting.
Proprietary and Confidential
3
Hitless and Errorless switching
Proprietary and Confidential
4
Page 86
Using MSE with ACM
MSE - Definition MSE is used to quantify the difference between an estimated (expected) value and the true value of the quantity being estimated MSE measures the average of the squared errors: MSE is an aggregated error by which the expected value differs from the quantity to be estimated. The difference occurs because of randomness or because the receiver does not account for information that could produce a more accurate estimated RSL
Proprietary and Confidential
6
Page 87
To simplify….
Imagine a production line where a machine needs to insert one part into the other Both devices must perfectly match Let us assume the width has to be 10mm wide We took a few of parts and measured them to see how many can fit in….
Proprietary and Confidential
7
The Errors Histogram (Gaussian probability distribution function)
9
Quantity
Expected value
3
3
2
1
width 6mm
7mm
10mm
12mm
16mm
To evaluate how accurate our machine is, we need to know how many parts differ from the expected value 9 parts were perfectly OK Proprietary and Confidential
8
Page 88
The difference from Expected value… Quantity
Error = 0 mm
Error = + 2 mm Error = - 3 mm Error = + 6 mm
Error = - 4 mm
width 6mm
7mm
10mm 12mm
16mm
To evaluate the inaccuracy (how sever the situation is) we measure how much the errors differ from expected value Proprietary and Confidential
9
Giving bigger differences more weight than smaller differences Quantity
Error = 0 mm
+ 2 mm = 4 -3 mm = 9 + 6 mm = 36
- 4 mm = 16
width 6mm 7mm 10mm 12mm
16mm
We convert all errors to absolute values and then we square them The squared values give bigger differences more weight than smaller differences, resulting in a more powerful statistics tool: 16cm parts are 36 ”units” away than 2cm parts which are only 4 units away Proprietary and Confidential
10
Page 89
Calculating MSE Error = 0 mm
Quantity
+ 2 mm = 4 -3 mm = 9 - 4 mm = 16
+ 6 mm = 36 width
To evaluate the total errors, we sum all the squared errors and take the average: 16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13 The bigger the errors (differences) >> the bigger MSE becomes
Proprietary and Confidential
11
Calculating MSE MSE determines how narrow / wide the “Bell” is Quantity
width 10mm When MSE is very small – the “Bell” shaped histogram is closer to perfect condition (straight line): errors = ~ 0 Proprietary and Confidential
12
Page 90
MSE in digital modulation (Radios) Let us use QPSK (4QAM) as an example:
Q 01
00
QPSK = 2 bits per symbol 2 possible states for I signal 2 possible states for Q signal
I
11
= 4 possible states for the combined signal The graph shows the expected values (constellation) of the received signal (RSL)
10
Proprietary and Confidential
13
MSE in digital modulation (Radios) The black dots represent the expected values (constellation) of the received signal (RSL)
Q 01
00 The blue dots represent the actual RSL
I
11
10
As indicated in the previous example, we can say that the bigger the errors are – the harder it becomes for the receiver to detect & recover the transmitted signal
Proprietary and Confidential
14
Page 91
MSE in digital modulation (Radios)
Q 01
00
MSE would be the average errors of e1 + e2 + e3 + e4….
e1
e2
I e4
When MSE is very small the actual signal is very close to the expected signal
e3
11
10
Proprietary and Confidential
15
MSE in digital modulation (Radios)
Q 01
00
When MSE is too big, the actual signal (amplitude & phase) is too far from the expected signal
e1
e2
I e4
11
e3
10
Proprietary and Confidential
16
Page 92
Commissioning with MSE in EMS
When you commission your radio link, make sure your MSE is small Actual values may be read -34dB to -35dB Bigger values will result in loss of signal
Proprietary and Confidential
17
MSE and ACM When the errors is too big, we need a stronger error correction mechanism (FEC) Therefore, we reduce the number of bits per symbol allocated for data and re-assign the extra bits for correction instead For example – 256QAM has great capacity but poor immune to noise 64QAM has less capacity but much better immune for noise ACM – Adaptive Code Modulation Proprietary and Confidential
18
Page 93
Triggering ACM with MSE When ACM is enabled, MSE values are analyzed on each side of the link When MSE degrades or improves, the system applies the required modulation per radio to maintain service MSE Down-Threshold
MSE Up-Threshold
8PSK
-16
-19
2
16QAM
-17
-23
3
32QAM
-21
-26
4
64QAM
-24
-29
5
128QAM
-27
-32
6
256QAM
-30
-34
7
512QAM
-32
-37
8
1024 QAM SFEC
-35
-38
9
1024 QAM WFEC
-36
-41
10
2048QAM
-39
Profile
Mod
0
QPSK
1
-18
Applicable for both 28/56MHz , 2048 QAM will be supported in 7.9
The values are typical and subject to change in relation to the frequency and RFU type. For more details please contact your Ceragon representative Proprietary and Confidential
19
ACM & MSE: An example… It is easier to observe the hysteresis of changing the ACM profile with respect to measured MSE. As you can see, the radio remains @ profile 8 till MSE improves to -38dB:
ACM Profile
Downgrade Downgrade
-41 -38 -37 -34
Profile 10
Profile 9
2048 QAM
-39
1024 QAM
Profile 8 1024 QAM
-36
Profile 7 512 QAM
-35
Profile 6 256 QAM
-32
Profile 5 128 QAM
-30
Profile 4 64 QAM
-27
Proprietary and Confidential
20
Page 94
-24
Profile 3 32 QAM
MSE
-21
ACM & MSE: An Example When RF signal degrades and MSE passes the upgrade point (MSE @ red point), ACM will switch back FASTER to a higher profile (closer to an upgrade point) when MSE improves. When RF signal degrades and MSE does not pass the upgrade point (green point) – ACM waits till MSE improves to the point of next available upgrade point (takes longer time to switch back to the higher profile).
ACM Profile
‐41
Profile 10
‐38
Profile 9
Profile 8
‐39 ‐36 ‐35 Proprietary and Confidential
21
Thank You
Page 95
MSE
Page 96
Radio Link Parameters
Ceragon Training Services July 2014 version 2
Agenda • MRMC • TX & RX Frequencies • Link ID • RSL • MSE • Current ACM Profile
Proprietary and Confidential
2
Page 97
High and Low frequency station Tx(f1)=11500 MHz
Rx(f1)=11500 MHz
Full duplex
Local site High station
Remote site Low station Tx(f1’)=11000 MHz
Rx(f1’)=11000 MHz
High station means: Tx(f1) >Rx(f1’) Low station means: Tx(f1’) < Rx(f1)
Proprietary and Confidential
3
Radio Link Parameters TSL
IDU
ODU
))
RSL
)
ODU
IDU
To Establish a radio link, we need configure following parameters: 1. MRMC – Modem scripts (ACM or fixed capacity, channel & modulation) 2. TX / RX frequencies – set on every radio 3. Link ID – must be the same on both ends 4. Max. TSL – Max. allowed Transmission Signal [dBm] 5. Unmute Transceiver – Transceiver is by default muted (is not transmitting) ------------------------------------------------------------------------------------------------------To verify a radio link, we need control following parameters: 1. RSL – Received Signal Level [dBm] – nominal input level is required 2. MSE- Mean Square Error [dB] 3. Current ACM profile
Proprietary and Confidential
4
Page 98
MRMC – Multi Rate Multi Coding Profiles Modulation
RFU‐C with RMC‐A
RFU‐C Premium with RMC‐B
QPSK
Profile 0
Profile 0
8QAM
Profile 1
Profile 1
16QAM
Profile 2
Profile 2
32QAM
Profile 3
Profile 3
64QAM
Profile 4
Profile 4
128QAM
Profile 5
Profile 5
256QAM (strong FEC)
Profile 6
N/A
256QAM (weak FEC)
Profile 7
Profile 6
512QAM
N/A
Profile 7
1024QAM (Strong FEC)
N/A
Profile 8
1024QAM (Light FEC)
N/A
Profile9
Proprietary and Confidential
5
MRMC Scripts – 1st steep
Changing script automatically resets modem inside IP‐20G Proprietary and Confidential
6
Page 99
Radio Parameters settings
2nd step
4th step 5th step 3th step Proprietary and Confidential
7
LINK ID – Antenna Alignment Process To avoid pointing the antenna to a wrong direction (when both links share the same frequency), LINK ID can be used to alert when such action is take. # 101 # 101
# 102 # 101 “Link ID Mismatch”
Proprietary and Confidential
8
Page 100
“Link ID Mismatch”
LINK ID – Antenna Alignment Process Both IDUs of the same link must use the same Link ID Otherwise, “Link ID Mismatch” alarm will appear in Current Alarms Window # 101 # 101
# 102 # 101 “Link ID Mismatch”
Proprietary and Confidential
9
Questions?
Proprietary and Confidential
10
Page 101
“Link ID Mismatch”
Radio Link Setup Exercise
Proprietary and Confidential
11
Thank You
Page 102
Automatic Transmit Power Control - ATPC
July 2014, ver 2
Agenda • Why ATPC? • How does ATPC works? • ATPC Vs. MTPC • ATPC Configuration
Proprietary and Confidential
2
Page 103
ATPC – Automatic Transmit Power Control The quality of radio communication between low Power devices varies significantly with time and environment. This phenomenon indicates that static transmission power, transmission range, and link quality, might not be effective in the physical world. • Static transmission set to max. may reduce lifetime of Transmitter • Side-lobes may affect nearby Receivers (image) Main Lobe Side Lobe
Proprietary and Confidential
3
ATPC – Automatic Transmit Power Control 1. Enable ATPC on both sites 2. Set Input reference level (min. possible RSL to maintain the radio link) 3. ATPC on both ends establish a Feedback Channel through the radio link (1byte) 4. Transmitters will reduce Output power to the min. possible level 5. Power reduction stops when RSL in remote receiver reaches Ref. input level 6. ATPC is strongly recommended with XPIC configuration
TSL Adjustments
ATPC module
Monitored RSL
Radio Transceiver
Radio
Radio Receiver
Radio Receiver
Feedback
Signal Quality Check
Site A
Proprietary and Confidential
4
Page 104
‐
Ref. RSL
RSL required change
Site B
ATPC – Example when ATPC is OFF
Site A
FSL= -60 dB
Site B
MTPC
MTPC
TSL A = 30dBm RSL A = ?
TSL B = 30dBm RSL B = ?
RSL A = -30dBm (TSL B + FSL)
RSL B = -30dBm (TSL A + FSL)
Proprietary and Confidential
5
ATPC – Example when ATPC is ON (One site ATPC, second site MTPC)
Site A
FSL= -60 dB
Site B
ATPC IRLB (Input Ref. level on Site B) = -50dBm
MTPC
TSL A = ? RSL A = ?
TSL B = 30dBm RSL B =?
TSL A = 10dBm (IRLB-FSL)
RSL B = -50dBm (TSL A + FSL)
RSL A = -30dBm (TSL B + FSL) You want -50dBm on Site B, so what is TXA in Site A? Proprietary and Confidential
6
Page 105
ATPC – Example when ATPC is ON (ATPC on both sites)
Site A
FSL= -60 dB
Site B
ATPC IRLB (Input Ref. level on Site B) = -50dBm
ATPC IRLA (Input Ref. level on Site A) = -50dBm
TSL A = ? RSL A = ?
TSL B = ? RSL B = ?
TSL A = 10dBm (IRLB - FSL)
TSL B = 10dBm (IRLA-FSL)
RSL A = -50dBm (TSLB + FSL)
RSL B = -50dBm (TSL A + FSL)
Proprietary and Confidential
7
ATPC – Example when ATPC is ON (ATPC on both sites), ATPC range Max TSL is 30dBm ATPC range is 20dB
Site A
Max TSL is 30dBm ATPC range is 20dB FSL= -60 dB
Site B
ATPC IRLB (Input Ref. level on Site B) = -60dBm
ATPC IRLA (Input Ref. level on Site A) = -50dBm
TSL A = ? RSL A = ?
TSL B = ? RSL B = ?
TSL A = 10dBm (IRLB-FSL)
TSL B = 10dBm (IRLA - FSL)
RSL A = -50dBm (TSL B + FSL)
RSL B = -50dBm (TSL A + FSL)
RSL B is -50dBm because typical ATPC range for TX level is 20dB (depend on RFU type)!!! It means that TSL A can’t be 0dBm because possible min is 10dBm (Max is 30dBm) Proprietary and Confidential
8
Page 106
ATPC Configuration
Proprietary and Confidential
9
Thank You
10
Page 107
Page 108
Service Model in IP-20
Ceragon Training Services July 2014 version 2
Agenda • IP-20 Ethernet Capabilities • Service Model in General • •
What is a Service ? What is a Service point?
• Services in IP-20 Family & Services attributes 1. 2. 3.
Point to Point Service Multipoint Service Management Service
• Service Point in IP-20 Family 1. 2. 3. 4.
Pipe Service Point Service Access Point (SAP) Service Network Point (SNP) Management Service Point (MNG)
• Service Points classification and attributes • Examples for Services and Service points • Logical VS. Physical Port Proprietary and Confidential
2
Page 109
IP-20’s Ethernet Capabilities • Up to 1025 services (1025 reserved for Management) • Up to 32 service points per service (30 SPs for MNG service) • All service types:
• • • • •
• Multipoint (E-LAN) • Point-to-Point (E-Line) • Point-to-Multipoint (E-Tree) • Smart Pipe • Management 128K MAC learning table per service - ability to limit MAC learning per service Split horizon between service points Flexible transport and encapsulation via 802.1q, 802.1ad (Q-in-Q), and MPLS-TP, with tag manipulation possible at egress High precision, flexible frame synchronization solution combining SyncE and 1588v2 Hierarchical QoS with 8K service level queues, deep buffering, hierarchical scheduling via WFQ and Strict priority, and shaping at each level
Proprietary and Confidential
3
IP-20’s Ethernet Capabilities • Hierarchical two-rate three-Color policers
• • •
• Port based – Unicast, Multicast, Broadcast, Ethertype • Service-based • CoS-based Up to four link aggregation groups (LAG) • Hashing based on L2, L3, MPLS, and L4 Enhanced <50msec network level resiliency (G.8032) for ring/mesh support IP-20 is fully MEF-9 and MEF-14 certified for all Carrier Ethernet services.
Proprietary and Confidential
4
Page 110
Service model in General
5
What is a Service? • A virtual bridge, connecting two or more interfaces • Bridge is a device that separates two or more network segments within one logical network
• Interfaces are usually referred to physical ports but can also be logical ports
Proprietary and Confidential
6
Page 111
Service Model
1
2
Service #1
3
4
Service #2
Proprietary and Confidential
7
Service points Service points are logical entities attached to the interfaces that make up the service. Service points define the movement of frames through the service. Without service points, a service is simply a virtual bridge with no ingress or egress interfaces.
Rails are second service point towards the bridge
The Route is your first service point towards the bridge
Proprietary and Confidential
8
Page 112
What is a service point?
1
2
SP
Service #1
SP
3 SP
SP
4 SP
Service #2
SP
Proprietary and Confidential
9
Services in IP-20 Family
10
Page 113
IP-20 Services IP20N supports the following services types: 1. Point-to-Point Service (P2P) 2. Multipoint Service (MP) 3. Management Service (MNG) 4. Point-to-Multipoint Service (E-Tree)
E-Tree services are planned for future release.
Proprietary and Confidential
11
Point to Point Service (P2P) • Point-to-point services are used to provide connectivity between two interfaces of the network element. • When traffic ingresses via one side of the service, it is immediately directed to the other side according to ingress and egress tunneling rules. • This type of service contains exactly two service points and does not require MAC address-based learning or forwarding
4
1
PIPE
PIPE SAP
SAP
2
3
Proprietary and Confidential
12
Page 114
Multipoint Service (MP) • • •
Multipoint services are used to provide connectivity between two or more service points. When traffic ingresses via one service point, it is directed to one of the service points in the service, other than the ingress service point, according to ingress and egress tunneling rules, and based on the learning and forwarding mechanism. If the destination MAC address is not known by the learning and forwarding mechanism, the arriving frame is flooded to all the other service points in the service except the ingress service point.
4
1 SAP
SNP
2 SAP
SNP
3
Proprietary and Confidential
13
Management Service (MNG) •
Traffic ports TCC
Management ports TCC
•
The management service is a multipoint service that connects the two local management ports, the network element host CPU, and the traffic ports into a single service. The service behavior is same as the Multipoint service behavior. The management service is pre-defined with Service ID 1025.
CPU 1 4 2
SAP
SNP
1
Service ID 1025 2
Proprietary and Confidential
14
Page 115
Service Attributes
•
Service ID - 1 - 1024
•
Service Type – P2P, MP, MNG
•
Service Admin Mode – Operational, Reserved
•
EVC-ID - Ethernet Virtual Connection ID (End-to-end).
•
EVC Description
•
Maximum Dynamic MAC Address Learning per Service
•
Static MAC Address Configuration
•
CoS Mode & Default CoS
•
xSTP Instance – The spanning tree instance ID (1-63)
•
Split Horizon Group - (Enable/Disable)
Proprietary and Confidential
15
IP-20 Service Points
16
Page 116
Service points • • • •
SAP SNP Pipe Service Point Management Service Point
Proprietary and Confidential
Service Access Port SAP & Service Network Point SNP
Proprietary and Confidential
18
Page 117
Service Access Port SAP & Service Network Point SNP
Proprietary and Confidential
19
Management (MNG) Service Point Only used for management services
Proprietary and Confidential
20
Page 118
Pipe Service Points Pipe Service Point – Used to create traffic connectivity between two points in a port-based manner (Smart Pipe). In other words, all the traffic from one port passes to the other port. Pipe service points are used in Point-to-Point services
PIPE SAP
PIPE SAP
PIPE SAP
Proprietary and Confidential
21
Service points classification
22
Page 119
PIPE SAP
Service Point – Interface Types Interface Type
Types of Frames
Applies to SP Type
Dot1q
A single C‐VLAN is classified into the service point
All
S‐tag
A single S‐VLAN is classified into the service point
SNMP and MNG
Bundle‐C
A set of C‐VLANs is classified into the service point
SAP
Bundle‐S
A single S‐VLAN and a set of C‐VLAN are classified into the service point
SAP
All‐to‐One
All C‐VLANs, S‐VLANs with TPID diff than the system one and untagged frames that enter the interface are classified into the service point
SAP
Q‐in‐Q
A single S‐VLAN and C‐VLAN combination is classified into the service point
SAP and MNG
Proprietary and Confidential
23
Service Points
Service
Proprietary and Confidential
24
Page 120
Service
Proprietary and Confidential
25
Service Point Types that can Co-Exist on the Same Interface
Proprietary and Confidential
26
Page 121
Service Point Types that can Co-Exist on the Same Interface
Proprietary and Confidential
27
Example of dot1q services • • • •
The classification to PtP1 and PtP2 is based on one c‐vlan. PtP 1 uses same c‐vlan as the classification at both ends PtP 2 uses different c‐vlan as the classification at both ends. PtP1 and PtP2 uses the transport vlan inside the network. The original c‐vlan is not sent inside the network. C‐Vlan SAP3
10
SAP 3
ptp 1 SAP1
C‐Vlan 10
SAP 1
20
SAP 2
C‐Vlan SAP4
SAP2
120
ptp 2
Transport Vlan
EVC
100
ptp1
200
ptp2
Proprietary and Confidential
28
Page 122
SAP SNP
SAP 4
Example of bundle services • •
The classification to PtP1 and PtP2 is based on several c‐vlan’s. PtP1 and PtP2 uses the transport vlan inside the network. The original c‐vlan is preserved and sent inside the network.
C‐Vlan SAP3
10,11
SAP 3
ptp 1 SAP1
C‐Vlan 10,11
SAP 1
20,21
SAP 2
C‐Vlan SAP4
SAP2
20,21
SAP 4
ptp 2
Transport Vlan
EVC
100
ptp1
200
ptp2
29
SAP SNP
Proprietary and Confidential
Example of Q-in-Q services • •
The classification to PtP1 and PtP2 is based on a pair of c‐vlan and s‐vlan. PtP1 and PtP2 uses the transport vlan inside the network. The original c‐vlan and s‐vlan is not sent inside the network.
SAP3
S‐Vlan
C‐Vlan
230
10
SAP 3
ptp 1 SAP1
SAP4
SAP2
S‐Vlan
C‐Vlan
340
320
ptp 2
S‐Vlan
C‐Vlan
230
10
SAP 1
240
20
SAP 2
Transport Vlan
EVC
100
ptp1
200
ptp2
SAP SNP Proprietary and Confidential
30
Page 123
SAP 4
Service points Attributes
31
Service Point Attributes As described above, traffic ingresses and egresses the service via service points. The service point attributes are divided into two types: • Ingress Attributes – Define how frames are handled upon ingress, e.g., policing and MAC address learning. • Egress Attributes – Define how frames are handled upon egress, e.g., preservation of the ingress CoS value upon egress, VLAN swapping.
Proprietary and Confidential
Page 124
Service Point Attributes General
Ingress
Egress
Service Point ID
Learning Admin
C‐VLAN CoS Preservation
Service Point Name
Allow Flooding
C‐VLAN Preservation
Service Point Type
Allow Broadcast
S‐VLAN CoS Preservation
Interface
CoS Mode
Marking Admin
Interface Type
Default CoS
Service Bundle ID
C‐VLAN Encapsulation S‐VLAN Encapsulation
Proprietary and Confidential
33
Service Point – General Attributes General
• Service Point ID – number for service point inside the same service
• Service Point Name – The Name for service point if is needed Service Point ID Service Point Name Service Point Type Interface Interface Type C‐VLAN Encapsulation S‐VLAN Encapsulation
• Service Point Type- SAP, SNP, MNG, PIPE • Interface - The logical interface on which the service point is located
• Interface Type – Dot1q, S-Tag, Bundle-C, BundleS, All-to-One, Q-in-Q
• C-Vlan Encapsulation - The C-VLAN classified •
into the service point S-Vlan Encapsulation - The S-VLAN classified into the service point
Proprietary and Confidential
34
Page 125
Service Point – Interface Types Interface Type
Types of Frames
Applies to SP Type
Dot1q
A single C‐VLAN is classified into the service point
All
S‐tag
A single S‐VLAN is classified into the service point
SNMP and MNG
Bundle‐C
A set of C‐VLANs is classified into the service point
SAP
Bundle‐S
A single S‐VLAN and a set of C‐VLAN are classified into the service point
SAP
All‐to‐One
All C‐VLANs, S‐VLANs with TPID diff than the system one and untagged frames that enter the interface are classified into the service point
SAP
Q‐in‐Q
A single S‐VLAN and C‐VLAN combination is classified into the service point
SAP and MNG
Proprietary and Confidential
35
Service Point – Ingress Attribute • Learning Admin - Indicates whether MAC Ingress
Learning Admin
• •
Allow Flooding Allow Broadcast
•
CoS Mode Default CoS
•
address learning is enabled or disabled Allow Flooding - Indicates whether incoming frames with unknown MAC addresses are forwarded to other service points via flooding Allow Broadcast - Indicates whether frames with a broadcast destination MAC address are allowed to ingress the service via this service point CoS Mode - Indicates how the service point handles the CoS of frames that pass through the service point. Default CoS – The service point CoS. If the CoS Mode is set to overwrite the CoS decision made at the interface level, this is the CoS value assigned to frames that ingress the service point.
Proprietary and Confidential
36
Page 126
Service Point – Egress Attribute • C-Vlan CoS Preservation - Indicates whether the Egress
• C‐VLAN CoS Preservation C‐VLAN Preservation
•
S‐VLAN CoS Preservation Marking Admin Service Bundle ID
•
•
original C-VLAN CoS value is preserved or restored for frames egressing from the service point C-Vlan Preservation - Indicates whether the original C-VLAN ID is preserved or restored for frames egressing from the service point S-Vlan CoS Preservation - Indicates whether the original S-VLAN CoS value is preserved or restored for frames egressing from the service point Marking Admin - Indicates whether re-marking of the outer VLAN (C-VLAN or S-VLAN) of tagged frames that pass through the service point is enabled Service Bundle ID - This can be used to assign one of the available service bundles from the HQoS hierarchy queues to the service point Proprietary and Confidential
37
Ethernet Service Points – GUI General
Service Point ID Service Point Name Service Point Type Interface Interface Type C‐VLAN Encapsulation S‐VLAN Encapsulation Ingress
Learning Admin Allow Flooding Allow Broadcast CoS Mode Default CoS Egress
C‐VLAN CoS Preservation C‐VLAN Preservation S‐VLAN CoS Preservation Marking Admin Service Bundle ID Proprietary and Confidential
38
Page 127
Logical Vs. Physical Interface
39
Logical and physical interface
Proprietary and Confidential
40
Page 128
Service Demo
41
Creating the Service
Proprietary and Confidential
42
Page 129
Attaching Service Points
Proprietary and Confidential
43
Attaching Service Points
Proprietary and Confidential
44
Page 130
Attaching Service Points
Proprietary and Confidential
45
Questions?
Proprietary and Confidential
46
Page 131
Thank You
Page 132
IP-20G Licensing
July 2014 Version 2
Agenda • Licensing in General • Demo License • CeraOS License concept • IP-20 Licensing Scheme • Licensed Features
Proprietary and Confidential
2
Page 133
Licensing •
IP-20G offers a pay as-you-grow licensing concept in which future capacity growth and additional functionality can be enabled with license keys. For purposes of licensing, each IP-20G chassis is considered a distinct device, regardless of which cards are included in the chassis. Each device contains a single license key. Licenses are divided into two categories: • Per Carrier – The license is per carrier • Per Device – The license is per device, regardless of the number of carriers supported by the device.
• •
•
Ceragon provides a web-based License Management System (LMS). The LMS enables authorized users to generate license keys, which are generated per IDU serial number.
•
A 1+1 HSB configuration requires the same set of licenses for both the active and the protected interfaces.
Proprietary and Confidential
3
License Management System
Proprietary and Confidential
4
Page 134
License generating
License is generated according to chassis SN Proprietary and Confidential
5
DEMO License • A demo license is available that enables all features for 60 days. • The demo license expires 60 days from the time it was activated, and the most recent valid license goes into effect.
• The 60-day period is only counted when the system is powered up. 10 days before the demo license expires, an alarm is raised indicating to the user that the demo license is about to expire.
Proprietary and Confidential
6
Page 135
IP-20 Pricing Concept (Value Structure) Hardware, Software & Licensed Features
CeraOS (Software) Licensed Premium Functionality
Licensed Scalability • • • •
• • • • • • •
Radio capacity 2nd modem/core activation (IP‐20G/C) Additional GE user interfaces Additional CET‐Node services/EVCs (L2)
Advanced radio configurations Advanced QoS Ethernet OAM TDM PW services Synchronization Network Resiliency Advanced Security
Licensed Mode ‐ CET‐Node • • • • • •
CET services/EVCs (L2) 2x GE user interfaces
Smart‐Pipe services (L1) 10M radio capacity 1x GE user interface Native TDM services
Base‐line functionality
Hardware • • •
Product Models (e.g. IP‐20G, IP‐20G, IP‐20C, IP‐20LH) Assembly options (e.g. single/dual modem in IP‐20G) Add‐on modules (e.g. RMC in IP‐20G) Proprietary and Confidential
7
IP-20 Licensing Scheme • Per Carrier •
• Per Node – Premium Functionality
Scalability
•
• Radio capacity
•
• Enhanced Packet Buffer • Frame Cut Through • H-QoS
Advanced radio configurations • • • • •
ACM XPIC Multi-Carrier ABC MIMO Header De-duplication
•
•
Sync-Unit IEEE-1588 TC IEEE-1588 OC IEEE-1588 BC
Redundancy/Resiliency group • Network Resiliency • Main Card Redundancy
CET-Node mode/scalability
•
• Edge (8 services/EVCs) • Agg-Lvl-1 (64 services/EVCs) • Agg-Lvl-2 (1024 services/EVCs)
•
Sync group • • • •
• Per Node – scalability •
QoS group
Ethernet OAM group • Eth-OAM FM • ETH-OAM PM
General node scalability 2nd
• modem activation (IP-20G only) • 2nd core activation (IP-20C only) • GE user interfaces
•
TDM group
•
Security
• TDM PW • Secure management
Proprietary and Confidential
8
Page 136
Licensed Features License Name
Radio Capacity
Adaptive Coding Modulation ACM
Header De‐Duplication
Description Enables you to increase your system’s radio capacity in gradual steps by upgrading your capacity license. Without a capacity license, each carrier has a capacity of 10 Mbps. Licensed capacity is available from 25 Mbps to 500 Mbps. Each RMC card can be licensed for a different capacity. Enables the use of Adaptive Coding and Modulation (ACM) scripts. A separate license is required per core.
Enables the use of Header De‐Duplication, which can be configured to operate at L2 through L4.
Enables the use of Cross Polarization Interface Canceller Cross Polarization Interface Canceller (XPIC). A separate license is required for each core in (XPIC) the XPIC pair.
Proprietary and Confidential
9
Licensed Features License Name
FE/GE Port Enabling
Smart Pipe mode
Description Enables the use of a TCC Ethernet port for traffic. A license is required for each TCC traffic port that is used on the device, as follows. Any of these licenses can be installed multiple times with dynamic allocation inside the unit. • FE Port Enabled – Enables an Ethernet port on the TCC or on an Ethernet LIC in FE mode (10/100baseT only). • GE Port Enabled – Enables an Ethernet port on the TCC or on an Ethernet LIC in FE or GE mode (10/100/1000baseT or 1000baseX). • FE‐to‐GE Port Upgrade – Converts an FE port license to a GE port license. Enables Smart Pipe mode. When Smart Pipe mode is enabled, 1 x GE interface is enabled by default.
Proprietary and Confidential
10
Page 137
Licensed Features License Name
Edge CET Node
Description Enables Carrier Ethernet Transport (CET) and a number of Ethernet services (EVCs), depending on the type of CET Node license: • Edge CET Node – Up to 8 EVCs. • Aggregation Level 1 CET Node – Up to 64 EVCs. • Aggregation Level 2 CET Node – Up to 1024 EVCs. A CET Node license also enables the following: • Network resiliency (MSTP/RSTP) for all services. • Full QoS for all services including basic queue buffer management (fixed queues buffer size limit, tail‐ drop only) and eight queues per port, no H‐QoS. • LAG Support •
Network Resiliency
Enables the following protocols for improving network resiliency: • G.8032 • TDM (PW) services 1:1 path protection Proprietary and Confidential
11
Licensed Features License Name H‐QoS
Enhanced Packet Buffer Management (QoS)
Sync Unit Sync‐Over‐Packet Optimized Transport TDM Time‐Slot Suppression
Description Enables H‐QoS. This license is required to add service‐ bundles with dedicated queues to interfaces. Without this license, only the default eight queues per port are supported. Enables configurable (non‐default) queue buffer size limit for Green and Yellow frames. Also enables WRED. The default queue buffer size limit is 0.5 Mbits for Green frames and 0.25 Mbits for Yellow frames. Enables the G.8262 synchronization unit. This license is required in order to provide end‐to‐end synchronization distribution on the physical layer. This license is also required to use Synchronous Ethernet (SyncE). Enables Sync‐over‐frame optimized transport. Enables CESoP PW mode on all installed Smart TDM cards. Without this license, only SAToP PW mode is supported. Proprietary and Confidential
12
Page 138
Licensed Features License Name
Description
Frame Cut‐Through
Enables Frame Cut‐Through. Enables the use of a second TCC in a 2RU chassis for TCC redundancy.
Main Card Redundancy
Ethernet OAM – Fault Management
Enables Connectivity Fault Management (CFM) per 802.1ag and 802.3ah. Enables secure management protocols (SSH, HTTPS, SFTP, SNMPv3, and RADIUS)
Secure Management
Proprietary and Confidential
13
IP-20 licensing scheme – CET-Node Mode # of bundled GE ports for user traffic
Management Service
Native TDM services
"Pipe" (L1) Eth services
# of CET (L2) Eth services ( PtP / MPtMP / TDM PW* )
Base (no license)
1
Yes
Unlimited
Unlimited
-
Edge-CET-Node
2
Yes
Unlimited
Unlimited
8
Agg-Lvl-1-CET-Node
2
Yes
Unlimited
Unlimited
64
Agg-Lvl-2-CET-Node
2
Yes
Unlimited
Unlimited
1024
License
* TDM-PW license key is required to enable TDM PW services.
Proprietary and Confidential
14
Page 139
License
Proprietary and Confidential
15
License features available
Proprietary and Confidential
16
Page 140
Thank You
Page 141
Page 142
Native TDM
Ceragon Training Services July 2014 Version 2
Agenda • Native TDM Services • Hybrid Service Engine – TDM + Ethernet • All-packet services example: Ethernet EVCs + TDM Pseudowire • How to Setup Native TDM
Proprietary and Confidential
2
Page 143
Native TDM Services • IP-20G provides integrated support for transportation of TDM (E1) services with integrated E1 and ch-STM-1 interfaces.
• Two types of TDM services are supported using the same hardware: • Native TDM trails • TDM Pseudowire services (enabling interoperability with third party packet/PW equipment)
• IP-20G provides native TDM support, utilizing a cross-connect module to support up to 512 TDM trails.
• The IP-20G Web EMS provides a simple and easy-to-use GUI that enables users to provision end-to-end TDM trails. The Services Provisioning GUI includes the following trail-creation end points: • TDM interface • Radio interface Proprietary and Confidential
3
Hybrid Services Engine – Ethernet + TDM Services engine TDM cross-connect (VCs)
TDM traffic
E1 Ch-STM1
TDM PW
Network processor (EVCs)
Hybrid Radio Packet traffic
GE/FE
• Native TDM Services (VCs) • Ethernet Services (EVCs) • Ethernet switched (L2) services – E-Line (PtP), E-LAN (MPtMP)
• Ethernet port based (L1) services (“smart pipe”) • TDM Pseudowire services – Unstructured (SAToP), Structured (CESoP)
Proprietary and Confidential
4
Page 144
Hybrid services example: Ethernet EVCs + Native TDM TDM cross-connect (VCs)
E1/ ch-STM1
Port
SAP
Ethernet Services (EVCs) PtP Service
User Port (UNI) GE/FE
TDM traffic
Port
SAP SAP
SNP SAP
Packet traffic
Hybrid Radio
MPtMP Service User Port (UNI) GE/FE
SAP
Network Port
SNP
Port
Port
SAP
GE/FE
SNP
Proprietary and Confidential
5
All-packet services example: Ethernet EVCs + TDM Pseudowire Ethernet Services (EVCs) TDM PW E1/DS1/ ch-STM1/ OC3
Port
PtP Service
SAP SAP
SNP SAP
PtP Service
User Port (UNI) GE/FE
Port
S-VLAN = 200 SAP SAP
SNP SAP
Packet traffic
Packet Radio
MPtMP Service User Port (UNI) GE/FE
SAP
Network Port
SNP
Port
Port
SAP
SNP
Proprietary and Confidential
6
Page 145
GE/FE
How to Setup Native TDM
7
Native TDM Configuration VC‐1
VC‐2
VC‐3
VC‐4
VC‐5
VC‐6
VC‐7
VC‐8
VC‐9
VC‐10 VC‐11 VC‐12
VC‐13 VC‐14 VC‐15 VC‐n
E1#1-16 (or STM-1 VC) Loop Timing
TDM Network 8
Proprietary and Confidential
8
Page 146
TDM Service Configuration 1
As first we have to create any Eth. service for Radio port, because we need specify which type of traffic will be carry by Radio. Create any service point which is connected to the radio port in Ethernet/Services … Proprietary and Confidential
9
TDM Service Configuration 2
1 2 3
1 – Select required TDM card 2 – Select required E1or VC 3 – Select Timing Loop Timing – Timing is taken from incoming traffic. Recovered Clock – Clock information is recovered on the egress path. Extra information may be located in an RTP header that can be used to correct frequency offsets. Recovered Clock can provide very accurate synchronization, but requires low PDV (Packer Delay Variation). System Reference Clock – Trails are synchronized to the system reference clock. Front Panel – Trails are synchronized from Front Panel synch. port. Proprietary and Confidential
10
Page 147
Native TDM Configuration
Select Required TDM Card and Timing
E1#1-1 Proprietary and Confidential
11
TDM Service Configuration
Select VC for radio slot
VC‐1
VC‐2
VC‐3
VC‐4
VC‐5
VC‐6
VC‐7
VC‐8
VC‐9
VC‐10 VC‐11 VC‐12
VC‐13 VC‐14 VC‐15 VC‐n E1#1-1
Proprietary and Confidential
12
Page 148
TDM Service Configuration
In remote end it needs to be set vice versa according to drawing below
1
2
Proprietary and Confidential
13
TDM Service Configuration
Selection Summary Proprietary and Confidential
14
Page 149
Thank You
Page 150
Configuration Management & Software Download
Ceragon Training Services July 2014, ver 3
Agenda
• Backup and Restore • Software Download
Proprietary and Confidential
2
Page 151
Backup & Restore
3
Backup and Restore • Backup and restore can be used for • • • •
• Restoring configuration upon unit replacement • Duplicating configuration Three restore points Restore point are manually created Backup file is generated from a restore pointed Once a backup file is imported to a unit it can be restored
Proprietary and Confidential
4
Page 152
Backup Process
Backup Configuration File Idea 1. 2. 3. 4. 5. 6.
Install FTP server – We recommend to use FileZilla Server (not Client) Setup FileZilla Server parameters (Users, Shared Folders) Synchronize Time via CLI “platform management time-services utc set date-and-time 30-01-2014,15:07:58” Setup communication parameters for IP20 unit with FTP Server Create Configuration Backup inside IP20 unit Export Configuration Backup to FTP server
Export File
FTP IP address
Proprietary and Confidential
6
Page 153
2. FTP Setup – FileZilla Settings 1. Install FileZilla Server and Run it 2. Create User in FileZilla Server
Proprietary and Confidential
7
2. FTP Setup – FileZilla Settings 3. Create shared folder in FTP Server PC (C:\ Backups) 4. Setup all permissions for this folder in FTP Server
FTP SERVER PC
FileZilla settings in FTP SERVER PC
5. Check Firewall settings in FTP Server PC and if port 21 is used only with FileZilla Proprietary and Confidential
8
Page 154
3. IP20G Configuration Management Settings Setup Parameters for FTP Server Connection Status for File transfer
Status for for Backup creation
User name and password must be same as in FileZilla Server FTP Server IP address Path in Server (This setup means that file will be uploaded in C:\Backups) Name.zip (.zip is MANDATORY)
!!!
Restore point selection Time installation for future releases
Proprietary and Confidential
9
4. Backup process 6. Check Export status
4. Check Status
1. Setup Configuration parameters included Restore Point which will be used for Configuration Backup inside the system
2. Apply 5. Export
3. Backup
Proprietary and Confidential
10
Page 155
Restore Process
Restore Configuration File Idea 1. Install FTP server (when is not already installed) – we recommend to use FileZilla Server (Not Client) 2. Setup FileZilla Server parameters (Users, Shared Folders) 3. Setup communication parameters for IP20 unit with FTP Server 4. Synchronize Time via CLI “platform management time-services utc set date-and-time 30-01-2014,15:07:58”
5. Import Configuration Backup from FTP Server 6. Restore Configuration Backup
Import File
FTP IP address
Proprietary and Confidential
12
Page 156
3. IP20 Configuration Management Settings Setup Parameters for FTP Server Connection Status for File transfer
Status for Backup creation
User name and password must be same as in FileZilla Server FTP Server IP address Path in Server (Means that file will be downloaded from Home FileZilla directory – in our case C:\Backups)
Name.zip (.zip is MANDATORY)
!!!
Restore point selection Time installation for future releases
Proprietary and Confidential
13
Restore process 4. Check Import status
6. Check Restore status
1. Setup Configurations parameters included Restore point 1-3
2.Apply
3.Import
5 Restore
RESTORE CONFIGURATION WILL NOT CHANGE CURRENT IP ADDRESS !!! Proprietary and Confidential
14
Page 157
Config_Dump File
Proprietary and Confidential
15
Software Download for IDU
16
Page 158
Software Download Idea for IDU 1. Before performing a software upgrade, it is important to verify that the system date and time are correct. 2. Install FTP server (when is not already installed) – we recommend to use FileZilla Server (Not Client) 3. Setup FileZilla Server parameters (Users, Shared Folders) 4. Setup communication parameters for IP20 unit with FTP Server 5. Synchronize Time via CLI “platform management time-services utc set date-and-time 30-01-2014,15:07:58”
6. UnZip software package for IP-20 to FTP Server shared folder 7. Download software from FTP Server 8. Install downloaded software Software
Download
• •
Although RFU software is included in the standard installation bundle, the current software version is not automatically updated in the RFU when an installation is performed. To upgrade the software in an RFU, you must perform the upgrade manually, per slot Proprietary and Confidential
17
IP-20 Software Download Settings
User name and password must be same as in FileZilla Server FTP Server IP address
Path in FTP Server (This setup means that configuration files will be downloaded from Home FileZilla directory)
Proprietary and Confidential
18
Page 159
Software process download 4. Check Download Status 6. Check Installation Status
1. Setup Parameters
2. Apply
5. Install Downloaded Software 3. Download Software Files from FTP Server Proprietary and Confidential
19
RFU Software Installation
20
Page 160
RFU Software Installation • Although RFU software is included in the standard installation bundle, the current software version is not automatically updated in the RFU when an installation is performed. • To upgrade the software in an RFU, you must perform the upgrade manually, per slot. • This enables you to manage IDU and RFU software versions separately. • In this version, you must use the Command Line Interface (CLI) to upgrade RFU software.
Proprietary and Confidential
21
RFU Software Installation Procedure 1. The following sequence of commands installs RFU-C software version 2.13 in the RFU connected to slot 3. root> platform software show rfu versions
2. The next step is to perform the update and install commands: root> platform software update rfu version slot 3 radio-port 1 root> platform software install rfu version slot 3 radio-port 1
3. To check the status of an update or install operation, enter the following command: root> platform software show rfu status
4. Once the installation is complete, the Install Status column should indicate installation success and the In Progress column should indicate 100 (100%). 5.When the installation is complete, enter the show rfu versions command again to verify that the new version has been properly installed in both the TCC and the RFU: root> platform software show rfu versions
Proprietary and Confidential
22
Page 161
Thank You
Page 162
Troubleshooting
Ceragon Training Services July 2014, ver 2
Agenda
• Faults and Alarms • Performance monitoring • RMON statistic • Loopback
Proprietary and Confidential
2
Page 163
Faults and Alarms
Faults Current Alarms
Event Log
Proprietary and Confidential
4
Page 164
Alarm Configuration
Proprietary and Confidential
5
Performance Monitoring - Radio
Page 165
Radio Parameters
Profile 0 1 2 3 4 5 6 7 8 9 10
Mod QPSK 8PSK 16QAM 32QAM 64QAM 128QAM 256QAM 512QAM 1024 QAM SFEC 1024 QAM WFEC 2048QAM
MSE Down-Threshold -16 -17 -21 -24 -27 -30 -32 -35 -36 -39
MSE Up-Threshold -18 -19 -23 -26 -29 -32 -34 -37 -38 -41
Applicable for both 28/56MHz , 2048 QAM will be supported in 7.9
The values are typical and subject to change in relation to the frequency and RFU type. For more details please contact your Ceragon representative Proprietary and Confidential
7
Radio Parameters – Defected Blocks
Proprietary and Confidential
8
Page 166
MRMC actual status
Proprietary and Confidential
9
Signal Level
Proprietary and Confidential
10
Page 167
MSE – Mean Square Error
Proprietary and Confidential
11
MRMC
Proprietary and Confidential
12
Page 168
Capacity, Throughput, Utilization, Frame Error State
Proprietary and Confidential
13
Performance Monitoring – Ethernet Services
Page 169
ETH PM – RMON
Proprietary and Confidential
15
PM – RMON – Special Registers RMON register / Counter
Description
Undersize frames received
Frames shorter than 64 bytes
Oversize frames received
Frames longer than 2000 bytes
Jabber frames received
Total frames received with a length of more than 2000 bytes, but with an invalid FCS
Fragments frames received
Total frames received with a length of less than 64 bytes, and an invalid FCS
Rx error frames received
Total frames received with Phy‐error
FCS frames received
Total frames received with CRC error, not countered in "Fragments", "Jabber" or "Rx error" counters
Pause frames received
Number of flow‐control pause frames received
Proprietary and Confidential
16
Page 170
Troubleshooting with RMON: Oversized frames Site A T
Site B T
T
A
Tagged Frames with frame size > 2000 bytes
When ingress frames exceed the maximum frame size, RMON counter “Oversized frames received” is updated accordingly
Proprietary and Confidential
17
Troubleshooting with RMON: Discarding Example Site A T
Site B T
T
Ingress traffic does not comply to Policer rules
Discarding Examples: Ingress rate > Rate Limiter Ingress frames do not qualify to Policer rules
Proprietary and Confidential
18
Page 171
A
Troubleshooting with RMON: Monitoring specific traffic types
Site A
Site B Rate Limiter
T
T
Monitor
Video streams are generally transmitted over UDP with multicast addresses To monitor traffic, check out the Multicast Frames Received register To limit MC traffic, assign a Policer with a MC CIR rules Proprietary and Confidential
19
Performance Monitoring – TDM Services
Page 172
TDM – Line Alarms
An example: Line alarms number 1040 = ( 10000010000 ) = 1024 + 16 It means that 1024 is Transceiver Loss of Multi-frame and 16 is Transceiver AIS alarm
Proprietary and Confidential
21
TDM port PMs Table
Proprietary and Confidential
22
Page 173
Loopbacks
RFU RF Loopback
IF LB RFU RF LB
Proprietary and Confidential
24
Page 174
TDM Loopback
Proprietary and Confidential
25
Thank You
Page 175
Page 176
Course Evaluation Form Dear Customer! Thank you for taking the time to complete the following course evaluation form. Your commentary and feedbacks are of great importance to us as we analysis and investigate each course and report. The information you provide will be used to help us improve the content of the course and monitor the quality of our training program. Thank You, Oren Gerstner, Training Director
Course details Location Course Name / ID Start Date (d/m/year)
End Date (d/m/year)
Instructor Name Company / Customer Please rate your satisfaction with the course from 1 to 5 (1 = poor and 5 = excellent): Did the course meet your expectations?
1
2
3
4
5
Was the course well organized?
1
2
3
4
5
Training facility & Environment
1
2
3
4
5
Was the difficulty of the course in line with your expectations?
1
2
3
4
5
The instructor was well prepared
1
2
3
4
5
Instructor’s level of knowledge
1
2
3
4
5
Instructor’s presentation skills
1
2
3
4
5
Instructor’s willingness to help
1
2
3
4
5
Audience was treated respectfully
1
2
3
4
5
Language was clear and understood
1
2
3
4
5
Course book
1
2
3
4
5
Level of practical exercises (when relevant)
1
2
3
4
5
Setup and lab functionality (when relevant)
1
2
3
4
5
Usefulness Level of practical exercises (when relevant)
1
2
3
4
5
Overall satisfaction from the training session
1
2
3
4
5
Your comments:
Course Evaluation Form
Page 177
Page 1 of 1
This page was intentionally left blank.