You are on page 1of 315

IP-10 Basic

Updated for SW Version 6.8

Visit our Customer Training Portal at training.ceragon.com


or contact us at training@ceragon.com

Trainee Name:

_________________

Basic IP-10 G/E Training

TableofContent

1. CeragonNetworkThePremierWirelessBackhaulSpecialist...1
2. IP10G/EIntroduction..7
3. IntroductiontoRadio.19
4. IP10FrontPanelDescription..35
5. Installation.45
6. RFUandAntennasInstallation61
7. GreenMode.79
8. ManagementSettings.......85
9. EMSGeneralConfiguration..91
10. IP10Licensing.111
11. EMSSwitchConfiguration..127
12. CommissioningtheRadioLink.133
13. ConfiguringInterfaces151
14. XC/SNCP/NodalSolution.167
15. MeanSquareError(MSE).183
16. AdaptiveCode&Modulation(ACM)195
17. 1+1HSBProtection..207
18. CrossPolarizationInterferenceCancellation(XPIC).227
19. 2+2HSBProtection..243
20. EMSPerformanceMonitoring.250
21. Loopbacks..276
22. ConfigurationFiles..285
23. SoftwareUpgrade299

Ceragon Training Program

v6.8

Ceragon Networks
The Premier Wireless Backhaul Specialist
Company Presentation
January 2012

Safe Harbor

Statements contained in this presentation that are not historical facts, including statements regarding
the consummation of the transaction, and the timing thereof, the expected benefits of the transaction,
the future market for the companies
companies' products,
products future financial and operating results,
results plans,
plans objectives,
objectives
expectations and intentions, including plans with respect to future products and the continued support
of Nera customers after the closing of the transaction, are forward-looking statements as that term is
defined in the Private Securities Litigation Reform Act of 1995. Forward-looking statements are
inherently subject to risks and uncertainties that could cause actual results to differ materially from
these forward-looking statements. Many of these risks and uncertainties cannot be predicted with
accuracy and some might not even be anticipated. Some of the factors that could significantly impact
the forward-looking statements in this press release include the risk that the businesses will not be
integrated successfully; the risk that any synergies from the transaction may not be fully realized or
may take longer to realize than expected; disruption from the transaction making it more difficult to
maintain relationships with customers, employees or suppliers, the risk that Nera business may not
perform
f
as expected,
t d and
d other
th risks,
i k some off which
hi h are discussed
di
d in
i Ceragons
C
annuall reports
t on
Form 20-F filed with the Securities and Exchange Commission under the caption Risk Factors. Any
forward-looking statement is qualified by reference to these risks factors. These risks and factors are
not exclusive, and Ceragon undertakes no obligation to publicly update or revise any forward-looking
statements to reflect events or circumstances that may arise after the date of this release. Ceragons
public filings are available from the Securities and Exchange Commissions website at www.sec.gov
or may be obtained on Ceragons website at www.ceragon.com

Proprietary and Confidential

Page 1

The #1 Wireless Backhaul Specialist

64 years of radio experience


1,200 employees, 50% engineers
38 Offices globally
100,000+ units shipped in 2010
Largest microwave specialist
(Source: EJL,
EJL May 2011)

Proprietary and Confidential

g and Nera a combination that delivers MORE


Ceragon
Ceragon Networks

Nera Networks

Incorporated: 1996
Revenues 2010: $249 M
NASDAQ: CRNT
Leadership in short-haul
products

Incorporated: 1947
Revenues 2010: $230 M
Wholly owned subsidiary of Eltek
ASA, traded on the Oslo Stock
Exchange under [ELT]
Leadership in long-haul products
Established project management
capabilities
p

Combination creates the Premier Wireless Backhaul Specialist

Proprietary and Confidential

Page 2

#1 Microwave Backhaul Specialist


Providing Exceptional Value
Industry benchmark for performance and cost efficiency
Turn-Key services
Focused on reliability: High MTBF and rapid delivery processes
Corporate culture of innovation
Future Proof mindset, driving the microwave industry forward

Committed to Ensuring Customers Success


#1 Specialist

Generalist

Proprietary and Confidential

MORE Scale
Stronger Presence in Every Region

Proprietary and Confidential

Page 3

Products & Solutions


ShortHaul
Access

LongHaul
Aggregation

Trunk

High Volume
Cost Efficiency & Operational Excellence

Turn-Key, Services
Experience & Project Management Expertise

NetworkManagementSystem
FibeAirIP10Eseries&Gseries

EvolutionIPLongHaul

EthernetorEth+TDM

EthernetorEth+TDM

IP10G/E
IP10Q
IP10G/E

1500R
SDH/SONET

IP10C
AllOutdoor

SplitMount/AllIndoor

Proprietary and Confidential

MORE Innovation
Apply Design-to-Cost Across Entire Portfolio

1998

2005

Proprietary and Confidential

Page 4

2008

Why Ceragon
Complete and innovative product portfolio:
All packet microwave radio
Optional risk-free migration from TDM to Ethernet
Integrated networking functions, TDM and Ethernet
Highest possible capacities
Exceptional system gain and spectral efficiency
Company:
Widely deployed largest microwave specialist
Proven turnkey project expertise
Culture of innovation
A range of channel and solution partnerships
Financially sound and rapidly growing

Proprietary and Confidential

Thank You

Page 5

Thispagewasintentionallyleftblank.

Page 6

IP-10 G / E Introduction

I6.8

FibeAir IP-10
Functional Block Diagram
OA&M
OA&M

Ser ice Mana ement


ServiceManagement

CarrierEthernetSwitch
Gigabit
Ethernet
(Opticalor
Electrical)

Fast
Ethernet

PWE3

Sec rit
Security
TDMCrossConnect

(CESoP/SAToP)

ACM

XPIC

NativePacketRadio
(OptionalNativeTDM)

Multi
Radio

10Mbps1Gbps,3.556MHz

Diversity

E1/
DS1

ChSTM1/
OC3
Terminal
Mux
G-Series only

RFU(642GHz)

Proprietary and Confidential

Page 7

FibeAir RF Units
FibeAir IP-10 can work with any of the following RF units:

RFU-C

RFU-HP

Standard Power 6-42


6 42 GHz

High Power 6-11


6 11 GHz

Proprietary and Confidential

Main features

Unique Adaptive Coding & Modulation (ACM)


Enhanced radio efficiency and capacity for Ethernet traffic
Integrated Carrier Ethernet switching functionality
Enhanced QoS for differentiated services
Supported configurations

RFU-HP / SD

1+0
1+1 HSB Fully-redundant!
Nodal solution with ring
2+2 HSB
XPIC
Multi Radio
Space Diversity

Extensive and secure management solution


4
Proprietary and Confidential

Page 8

Integrated Carrier Ethernet switch


3 modes for Ethernet switching:

Metro Switch Carrier Ethernet switching is enabled


Managed Switch 802.1 L2 switch
Single Pipe Carrier Ethernet switching is disabled
Only a single Ethernet interface is enabled for user traffic
The unit operates as a point-to-point Ethernet MW radio
IP-10

IP-10

Ethernet
User
Interfaces

Ethernet
User
Interface

Radio
interface

Radio
interface

Carrier Ethernet
Switch

Smart pipe mode

Metro/Managed switch mode

Extensive Carrier Ethernet feature-set


eliminates the need for external switches

Proprietary and Confidential

Radio capacity - ETSI


7MHz
ACM
Point

Modulation

14MHz
# of
E1s

Ethernet
Capacity
(Mbps)

ACM
Point

Modulation

# of
E1s

Ethernet
Capacity
(Mbps)
20 - 29

QPSK

9.5 13.5

QPSK

8 PSK

14 20

8 PSK

12

29 41

16 QAM

19 28

16 QAM

18

42 60

32 QAM

10

24 34

32 QAM

20

49 70

64 QAM

12

28 40

64 QAM

24

57 82

128 QAM

13

33 47

128 QAM

29

69 98

256 QAM

16

38 55

256 QAM

34

81 115

256 QAM

17

40 57

256 QAM

37

87 125

28MHz

56MHz

40MHz
Ethernet
Capacity
(Mbps)

ACM
Point

Modulation

# of
E1s

Ethernet
Capacity
(Mbps)

ACM
Point

Modulation

# of
E1s

Ethernet
Capacity
(Mbps)

QPSK

32

76 - 109

8 PSK

48

114 - 163

122 174

16 QAM

64

151 - 217

65

153 - 218

32 QAM

84

202 - 288

81

191 274

64 QAM

84

251 - 358

128 QAM

84

214 305

128 QAM

84

301 - 430

256 QAM

84

243 347

256 QAM

84

343 490

256 QAM

84

259 370

256 QAM

84

372 - 532

ACM
Point

Modulation

# of
E1s

QPSK

17

40 58

QPSK

23

56 - 80

8 PSK

23

54 78

8 PSK

35

83 - 119

16 QAM

33

78 111

16 QAM

51

32 QAM

44

105 151

32 QAM

64 QAM

55

131 188

64 QAM

128 QAM

68

160 229

256 QAM

76

178 255

256 QAM

80

188 268

6
Proprietary and Confidential

Page 9

Wireless Carrier Ethernet Ring


Example configuration (1+0 ring)
N x GE/FE

N x GE/FE

N x GE/FE

Wireless
Carrier Ethernet
Ring

(up to 500Mbps)

Integrated Ethernet
Switching

7
Proprietary and Confidential

N x GE/FE

Native2 Microwave Radio Technology


At the heart of the IP-10 solution is Ceragon's market-leading Native2

microwave technology.
With this technology, the microwave carrier supports native IP/Ethernet
traffic together with optional native PDH
PDH.
Neither traffic type is mapped over the other, while both dynamically share
the same overall bandwidth.
This unique approach allows you to plan and build optimal all-IP or hybrid
TDM-IP backhaul networks which make it ideal for any RAN (Radio Access
Network)

Native
Native

In addition, Native2 ensures:


Very low link latency of <0.15 msecs @ 400 Mbps.
Very low overhead mapping for both ETH & TDM traffic
High precision native TDM synchronization distribution

8
Proprietary and Confidential

Page 10

NG-SDH/SONET complementary solution


Carrier Ethernet at the access, NG-SDH/SONET at the aggregation
Carrier Ethernet (MW links)

SDH/SONET (Hybrid Fiber/MW)

Native Ethernet
Ethernet over SDH/SONET

Hub
Site

GE

FE/GE

RNC
GE

Tail site

FibeAir
IP-10

FibeAir
IP-10

NG-SDH
MSPP

NG-SDH
MSPP

Core
Site

Ethernet services are


transported natively
over Carrier Ethernet
based MW radio links.

NG-SDH/SONET MSPP
node acts as gateway
between the Carrier
Ethernet and NGSDH/SONET based
networks.

Ethernet services
are mapped over
SDH/SONET

SDH/SONET MW
links are used where
fiber connections not
available

9
Proprietary and Confidential

IP/MPLS complementary solution


Carrier Ethernet at the access, IP/MPLS at the aggregation
Carrier Ethernet (MW links)

IP/MPLS (Hybrid Fiber/MW)

Native Ethernet
Ethernet PWs or IP routing

Hub
Site

GE

FE/GE

RNC

GE

Tail site

FibeAir
IP-10

FibeAir
IP-10

MPLS
Router

MPLS
Router

Core
Site

Ethernet services are


transported natively
over Carrier Ethernet
based MW radio links.

IP/MPLS edge router acts


as gateway between the
Carrier Ethernet and
IP/MPLS based networks.

Both Ethernet and


E1/T1 services are
mapped over MPLS
using pseudo-wires
or routed using IP

10
Proprietary and Confidential

Page 11

High-capacity IP/MPLSaware" Ethernet MW


radio is used where fiber
connections not available

integrated QoS support - overview


4 CoS/priority queues per switch port
Advanced CoS/priority classification based
on L2/L3 header fields:

Priority Queues

Source Port
VLAN 802.1p
802 1
VLAN ID
IPv4 DSCP/TOS, IPv6 TC
Highest priority to BPDUs

W1 - Highest
Hi h t priority
i it

Classify
Arrivals

Advanced ingress traffic rate-limiting

W3

per CoS/priority
Flexible scheduling scheme per port

Strict priority (SP)


Weighted Round Robin (WRR)
Hybrid any combination of SP & WRR

Scheduling
departures

W2

W4 lowest priority

Shaping per port


Support differentiated Ethernet services
with SLA assurance
11
Proprietary and Confidential

IP-10 Enhanced QoS


Ultra-low delay variation
Dedicated channel for ultra Low Delay Variation

(<20sec)

Sync over packet optimized transport


IEEE-1588/NTP
control frames

256
256
128
64
32
16
8
4

Latency Optimized
Radio link
QoS
Classifier

More granular service


classification
Multi-Layer MPLS-aware
QoS Classifier

High granularity traffic management


Improved utilization of TCP
flows
Intelligent congestion
management (WRED)

8 Queues
CIR + EIR support
Per queue statistics

Hierarchical scheduling
4 priorities
WFQ within the same priority
Shaping per queue and per port

Enables differentiated services with strict SLA


and maximizing network resources utilization
12
Proprietary and Confidential

Page 12

IEEE 802.1ag CFM (Connectivity Fault Management)

Proprietary and Confidential

A Nodal Solution

Cellulartraffic
(TDM)

STM
Rings

14
Proprietary and Confidential

Page 13

FibeAir IP-10 Integrated Nodal Solution


Same 1RU IP-10 unit can be used for
terminal and nodal solution
The solution is stackable and modular
Forms a single unified nodal device
Common Ethernet Switch
Common E1/DS1s Cross Connect
Single IP address
Single element to manage

15
Proprietary and Confidential

FibeAir IP-10
Whats new in 2011?
2011 (R3)
2008 (R1)
IP-10

2009/10 (R2)

IP-10
GSeries

IP-10
GSeries

ESeries

High cap Carrier Ethernet


wireless solution
7-56MHz
QPSK-256QAM , ACM
1+0, 1+1 HSB
I t
Integrated
t d Carrier
C i Ethernet
Eth
t Switch
S it h

Nodal & Migration focus


Up to 6 carriers
XPIC/MR/SD/FD support
TDM XC with SNCP/ABR
84 E1/DS1 support
Enhanced QoS

Ethernet QoS & OAM


Ethernet rings

packet functionality
capacity
p
Enhanced compression
Full SyncE
Full CIR + EIR
Improved Latency (Frame Cut Through)

16 E1s option (Native2)

FibeAir IP-10 2011 focus More value for all-packet solutions


16
Proprietary and Confidential

Page 14

IP-10G VS. IP-10R1


Feature
Supported radio configurations
XPIC option
Max radio capacity
Multi-radio support
# of Ethernet interfaces
Full Carrier Ethernet switching
feature-set including ring protection

IP-10R1
1+0, 1+1 HSB, 1+1 SD

G-Series
1+0, 1+1 HSB, 1+1 SD, 2+0 with XPIC
2+2 HSB with XPIC

NO

Yes

500Mbps

500Mbps
1Gbps using 2+0/XPIC

NO

Yes

5 x FE RJ-45+
1 x GE RJ-45 + 1 GbE SFP

5 x FE RJ-45+
2 x GE combo (RJ-45/SFP)

Yes

Yes

16 E1, 16 T1, None

16 E1, 16T1, None

# of E1/T1s per radio carrier

16

84

T-Card slot (additional 16 E1/T1 interfaces or


STM1/OC3 Mux)

NO

Yes

Nodal/XC/SNCP support

NO

Yes

SyncU

NO

# of E1/T1 integrated IDU interfaces option

V.11/RS232 User Channel option


Link Aggregation

Single channel
(Asynchronous RS-232 / V.11.)
NO

Yes
2 x Async V.11/RS232 or
1 x Sync V.11
Yes

17
Proprietary and Confidential

IP-10G VS. IP-10R1


IP-10R1

G-Series

RSTP (RING) with QinQ

Feature

NO

Yes

Dual Power Feed

NO

Yes

Floating IP

NO

Yes

MAC Aging Timer

Yes

Yes

ACM Low Latency Scripts

Yes

Yes

3.5 MHZ scripts

Yes

Yes

Radio Disabling

NO

Yes

QoS

Yes

Enhanced

18
Proprietary and Confidential

Page 15

FibeAir IP-10 G/E (R3)


Hardware update for IP-10G
Same interfaces and architecture as the current IP-10G (R2) design
Supports enhanced functionality, most notably:
Full
F ll S
SyncE
E supportt iincluding
l di S
SyncE
E regenerator
t ffor smartt pipe
i
applications

Multi-Layer header compression


Payload compression
QoS and latency enhancements
Full compatibility with IP-10G (R2)
Fully compatible with current IP-10G
IP 10G (R2) install base
R3 and R2 can be used in the same node and in the same link
Same software version and configuration file
R3 is supported in SW version i6.7 and above

19
Proprietary and Confidential

IP-10G/E R2 vs. R3 differences summary


Feature

R2

R3
SyncE input and output

SyncE Support

SyncE output only

SyncE regenerator support for


Smart Pipe mode
MAC header compression

Compression

Traffic rate-limiting
(bandwidth profile)

Latency improvements

MAC header compression

Per port, CoS and traffic type


(Broadcast, Multicast, etc.)
CIR only

* Roadmap
20
Proprietary and Confidential

Page 16

Multi-Layer header compression*


Payload compression*
All features supported in R2, and:
DrTCM (CIR + EIR) per
VLAN/VLAN+CoS*
(MEF-22 compliant)

Frame cut-through mode for


delay-sensitive traffic*

Outdoor Enclosures Solution Benefits


Full Outdoor solution:

Dust and weather proof


Compact size reduces the cost of leasing or
purchasing rack space.
Ideal for Greenfield areas, at solar-powered sites,
and at repeater sites adjacent to highways.
One-man installation and shorter cabling reduce
installation costs.
Environment-friendly: Greener deployments, saving
on power and air-conditioning costs.

21
Proprietary and Confidential

Ceragons Management Overview

IP-10
22
Proprietary and Confidential

Page 17

FibeAir

Tree Topology

23
Proprietary and Confidential

Thank You

Page 18

Introduction to Radio

Agenda

RF Principals
Parameters Affecting Propagation

Atmospheric Refraction
Multipath
Duct
Rain Fading
Fresnel

RF Li
Link
kB
Basic
i Components
C
Link Calculation
Modulation

Proprietary and Confidential

Page 19

RF Principals

A Radio Link requires two end stations


A line of sight (LOS) or nLOS (near LOS) is required
Microwave Radio Link frequencies occupy 1-80GHz

Local
3

Remote
Proprietary and Confidential

Why Radio?

Advantages (compared to alternative cable/fiber infrastructure) :


Easier installation
Faster installation
Cheaper installation
Easier maintenance

Proprietary and Confidential

Page 20

RF Principals

RF - System of communication employing electromagnetic waves (EMW)


propagated through space
EMW travel at the speed of light (300,000 km/s)
The wave length is determined by the frequency as follows c
velocity of electromagnetic
Wave Length where c is the propagation
f waves in vacuum (3x108 m/s)
Microwave refers to very short waves (millimeters) and typically relates to
frequencies above 1GHz:
300 MHz ~ 1 meter
10 GHz ~ 3 cm

Proprietary and Confidential

Polarization and Rain


Raindrops have sizes ranging from 0.1 millimeters to 9 millimeters mean
diameter (above that they tend to break up)
Smaller drops are called cloud droplets
droplets, and their shape is spherical
spherical.
As a raindrop increases in
size, its shape becomes more
oblate, with its largest
cross-section facing the
oncoming airflow.

Large
g rain drops
p become
Increasingly flattened on the
Bottom;
very large ones are shaped
like parachutes

Proprietary and Confidential

Page 21

RF Principals
We can see the relationship between colour, wavelength and amplitude using
this animation

Proprietary and Confidential

Radio spectrum

Proprietary and Confidential

Page 22

Parameters Affecting Propagation

Dispersion
Humidity/gas
H midit /gas absorption
Multipath/ducting
Atmospheric conditions (refraction)
Terrain (flatness, type, Fresnel zone clearance, diffraction)
Climatic conditions (rain zone, temperature)
Rain attenuation

Proprietary and Confidential

Parameters Affecting Propagation


Dispersion
Electromagnetic signal propagating in a physical medium is degraded
because the various wave components (i.e., frequencies, wavelengths) have
different propagation velocities within the physical medium:

Low frequencies have longer wavelength and refract less


High frequencies have shorter wavelength and refract more

10

Proprietary and Confidential

Page 23

Parameters Affecting Propagation


Atmospheric Refraction
Deflection of the beam towards the ground due to different electrical
characteristics of the atmospheres
atmosphere s is called Dielectric Constant.
The dielectric constant depends on pressure, temperature & humidity in the
atmosphere, parameters that are normally decrease with altitude
Since waves travel faster through thinner medium, the upper part of the wave
will travel faster than the lower part, causing the beam to bend downwards,
following the curve of earth

With Atmosphere

No Atmosphere
11
Proprietary and Confidential

Parameters Affecting Propagation


Multipath
Multipath occurs when there is more then one beam reaching the receiver
with
ith different amplit
amplitude
de or phase
Multipath transmission is the main cause of fading in low frequencies

Direct beam

Delayed beam
12
Proprietary and Confidential

Page 24

Parameters Affecting Propagation


Duct
Atmospheric duct refers to a horizontal layer in the lower atmosphere with vertical refractive
index gradients causing radio signals:

Remain within the duct

Follow the curvature of the Earth

Experience less attenuation in the ducts than they would if the ducts were not present

D tL
Duct
Layer

Duct Layer
Terrain
13
Proprietary and Confidential

Parameters Affecting Propagation


Rain Fading
Refers to scenarios where signal is absorbed by rain, snow, ice
Absorption becomes significant factor above 11GHz
Signal quality degrades
Represented by dB/km parameter which is related the rain density
which represented mm/hr
Rain drops falls as flattened droplet
V better than H (more immune to rain fading)

14
Proprietary and Confidential

Page 25

Parameters Affecting Propagation


Rain Fading

Heavier rain >> Heavier Atten.


Hi h FQ >> Higher
Higher
Hi h Attenuation
Att
ti

15
Proprietary and Confidential

Parameters Affecting Propagation


Fresnel Zone
3rd
2nd
TX

1st

RX

1. EMW propagate in beams


2. Some beams widen therefore, their path is longer
phase shift is introduced between the direct and indirect
3. A p
beam
4. Thus, ring zones around the direct line are created

Duct Layer0

Terrain
16

Proprietary and Confidential

Page 26

Parameters Affecting Propagation


Fresnel Zone
Note that there are many possible Fresnel zones, but we are chiefly concerned
with zone 1.
If this area were blocked by an obstruction, e.g. a tree or a building, the signal
arriving at the far end would be diminished.
When building wireless links, we therefore need to be sure that these zones are
kept free of obstructions.
In wireless networking the area containing about 40-60 percent of the first Fresnel
zone should be kept free.
3rd
2nd
1st

TX

RX

18
Proprietary and Confidential

RF Link Basic Components


Antennas
Antennas are devices used to radiate electromagnetic energy into space.
OMNI-DIRECTIONAL antennas radiate & receive energy from all directions
at once (seldom used)
DIRECTIONAL antennas radiate energy in LOBES (or BEAMS) that extend
outward from the antenna.
The radiation pattern contains small minor lobes (weak with little effect on
the main radiation pattern)

19
Proprietary and Confidential

Page 27

RF Link Basic Components


Parabolic Reflector Radiation (antenna)
Microwaves travel in straight lines - it can be focused and reflected just as
light rays.
rays
A feeder receives the microwaves from the WG and then transmits them
towards a parabolic dish (reflecting surface)
The wave-front reaches the reflecting surface of the antenna, and then it
leaves the antenna in parallel paths
Because of the special
p
shape
p of a parabolic
p
surface, all paths from source to the reflector and
back to end user are the same length

20
Proprietary and Confidential

Link Calculation Basic Example


Link Calculation
+Gant1

+Gant2
+Lfsf

TX
IDU

TX Losses

RX Losses

IDU

RSL ReceivedSignalLevel
TSL TransmittedSignalLevel
Lfs Freespaceloss=92.45+20logx(distanceinkmxfrequencyinGHz)

RSL=TX TXLoss +GainAnt1 LFree Space +GainAnt2 RXLoss


21
Proprietary and Confidential

Page 28

RSL

Digital Modulation
Modulation
Modulation is used to transfer a message (voice, image, data, etc.) on to a
carrier wave for transmission
transmission.
A low frequency that comprises the message (baseband) is translated to a
higher range of frequencies
Modulation allows higher data rate transmissions
The process of modulation is reversible.
A device that performs modulation is known as a modulator and a device that
performs the inverse operation of modulation is known as a demodulator

22
Proprietary and Confidential

Digital Modulation
Modulation

Low fq. Signal (up) +


high fq. Carrier (down)

23
Proprietary and Confidential

Page 29

QPSK Modulation

Quadrature Phase Shift Keying is a phase modulation algorithm


The phase of the carrier wave is modulated to encode bits of digital
information in each phase change
Because QPSK has 4 possible states, QPSK is able to encode two bits per
symbol
QPSK is more tolerant of link degradation than 8PSK, but does not provide as
much data capacity
45degrees

Binary00

135degrees

Binary01

225degrees

Binary11

315degrees

Binary10

24
Proprietary and Confidential

QAM Modulation

Quadrature Amplitude Modulation employs both phase modulation (PM) and


p
modulation ((AM))
amplitude
The input stream is divided into groups of bits based on the number of
modulation states used.
In 8QAM, each three bits of input, which provides eight values (0-7) alters
the phase and amplitude of the carrier to derive eight unique modulation states
In 64QAM, each six bits generates 64 modulation states; in 128QAM, each
seven bits
bi generate 128 states, and
d so on

25
Proprietary and Confidential

Page 30

QPSK VS. QAM Modulation

The various flavors of QAM offer higher data rates then 8 PSK
ThevariousflavorsofQAMofferhigherdataratesthen8PSK
ThisisbecauseQAMachievesagreaterdistancebetweenadjacentpointsintheIQ
planebydistributingthepointsmoreevenly
Thepointsontheconstellationaremoredistinctanddataerrorsarereduced
Higherorder>>morebitspersymbol
Constellationpointsarecloser>>TXismoresusceptibletonoise

26
Proprietary and Confidential

SNR and RSL Constellation


The higher the SNR, the better the received signal !

27
Proprietary and Confidential

Page 31

8QAM
Diagram for 8QAM: 3bit represent 8 different states

Bitsequence

Amplitude

000

1/2

Phase(degrees)
0(0 )

000

0(0 )

010

1/2

pi/2(90 )

011

pi/2(90 )

100

1/2

pi(180 )

101

pi(180 )

110

1/2

3pi/2(270 )

111

3pi/2(270 )

28
Proprietary and Confidential

16QAM
Constellation diagram for 16QAM:
4bit represent 16 different states

29
Proprietary and Confidential

Page 32

128QAM Modulation

Constellation diagram for 128QAM:


7bit represent
p
128 different states
Higher QAM order results in a higher
data rate
This is why we modulate

30
Proprietary and Confidential

256QAM Modulation

Constellation of 256QAM with noise added

Constellation of 256QAM

31
Proprietary and Confidential

Page 33

Thank You

Page 34

IP-10 Front Panel Description

Front Panel Overview

(GUI Example)

Lets go over the front panel connections of the IP-10 G-Series


We shall explain them one by one, left to right
2

Proprietary and Confidential

Page 35

CLI Serial Connection

DB9 Craft Line Interface (CLI)


Baud: 115200
D
Data
bi
bits: 8
Parity: None
Stop bits: 1
Flow Control: None
3

Proprietary and Confidential

EOW Easy Comm. Via Radio

Engineering Order Wire


To communicate with your colleague on the
other
h side
id off the
h radio
di lilink,
k simply
i l connect
here your headset

Proprietary and Confidential

Page 36

External Alarms

DB9 Dry Contact External Alarms


The IP-10 supports 5 input alarms and a single output alarm
Th iinput alarms
The
l
are configurable
fi
bl according
di to:
1) Intermediate, 2) Critical, 3) Major, 4) Minor and 5) Warning

The output alarm is configured according to predefined categories


5

Proprietary and Confidential

LED Indications

LINK:

GREEN radio link is operational


ORANGE minor BER alarm on radio
RED Loss of signal, major BER alarm on radio

IDU:

GREEN IDU functions ok


ORANGE fan failure
RED Alarm on IDU (all severities)

RFU:

GREEN RFU functions ok


ORANGE Loss of communication (IDU-RFU)
RED ODU Failure

Proprietary and Confidential

Page 37

LED Indications

PROT:

Main unit GREEN (when there no alarms)


STBY unit: YELLOW (when there no alarms)
ORANGE Forced switch, Protection lock
RED physical errors (no cable, cable failure)
OFF Protection is disabled, or not supported on
device

RMT:

GREEN remote unit OK (no alarms)


ORANGE minor alarm on remote unit
RED major alarm on remote unit

Proprietary and Confidential

User Channels (1)

Two software-selectable user channels (RJ-45):


A single synchronous channel OR two asynchronous channels
E h asynchronous
Each
h
channel
h
l will
ill make
k use off its
it own RJ-45
RJ 45 external
t
l
interface
The synchronous channel mode will make use of both interfaces
(acting as a single interface)
8

Proprietary and Confidential

Page 38

User Channels (2)

Modes of operation:
V.11 Asynchronous (9600bps)
RS-232
RS 232 Asynchronous
A
h
(9600b
(9600bps))
V.11 Synchronous Co-Directional (64Kbps)
V.11 Synchronous Contra Directional (64Kbps)
9

Proprietary and Confidential

User Channels (3)

Allowed configurations:
Two RS-232 Asynchronous UCs (default)
Two V.11 Asynchronous UCs
One
O RS-232
RS 232 Asynchronous
A
h
UC
UC, and
d one V
V.11
11 Asynchronous
A
h
UC
One V.11 Synchronous Co-Directional
One V.11 Synchronous Contra Directional UC
> All settings are copied to Mate when working in Protected mode
10

Proprietary and Confidential

Page 39

Protection Port

Protection Port (only for standalone units)


Protect your Main unit with a STBY unit
Protection ports on both units deliver the proprietary protocol to
support automatic or manual switchover
The FE protection port is static (only used for protection, not traffic). Its switching is performed
electrically. If the unit is a stand-alone, an external connection is made through the front panel. If the
unit is connected to a backplane, the connection is through the backplane, while the front panel port
is unused.
11

Proprietary and Confidential

T-Cards (Add-on Mezzanines)

Field upgradeable modules (T-Cards):


16 x E1 T-Card (32 total per unit)
DS1 T-Card
STM1/OC3 MUX T-Card
12

Proprietary and Confidential

Page 40

T-Cards (Add-on Mezzanines)

An optional STM-1 interface card can be inserted in a dedicated slot in the


y
p to 63 E1s in a channelized
the card can transmit and receive up
system;
STM-1 signal.
The supported mapping is VC4 only:
VC-12->TU-12->TUG-2->TUG-3->VC-4->AU-4->AUG
The STM-1 T-card is only supported in unprotected main units or in
unprotected stand-alone IDUs
13

Proprietary and Confidential

GbE Ports

Two GbE ports, each port with 2 physical interfaces:


Port #1: optical (SFP transceiver) or electrical
Port #2: optical (SFP transceiver) or electrical
GbE ports support QoS as in IP-10
IP 10 (scheduler,
(scheduler policers,
policers shaper,
shaper classifiers)

Port #1
14

Port #2
Proprietary and Confidential

Page 41

FE Ports

5 FE ports:
Port 3:
Port 4:
Port 5,6 &7:

Data
p Wayside
y
Channel))
Data or WSC ((2 Mbps
Data or local management

All ports support QoS as in IP-10 (scheduler, policers, shaper, classifiers)

15

Proprietary and Confidential

Radio and misc.

The Radio port is the switchs 8th port (same as in IP-10)

In addition
Grounding
-48vdc Power Connector
Fan Drawer

16

Proprietary and Confidential

Page 42

XC using a Shelf Configuration

XC operation is implemented using two-unit backplanes, which


provide the interconnectivity.
Up to three backplanes, consisting of six IDUs, can be stacked to
provide an expandable system
17

Proprietary and Confidential

XC using a Shelf Configuration


AllIDUsthatoperatewithin
theXCsystemhave
identicalhardware,andact
asstandaloneunits.

The2lowerunitscanbeconfiguredasMainunits.
TheroleanIDUplaysisdeterminedduringinstallationbyitspositioninthe
trafficinterconnectiontopology
18

Proprietary and Confidential

Page 43

IP-10R1 Vs G-Series Vs E-Series


IP10R1

GSeries

ESeries

19

Proprietary and Confidential

Thank You

Page 44

Installation

General
If installation requires CFG file upload & download and / or SW file
upload & down -

1.
2.
3.

Make sure FTP Server is installed on your PC


FTP is configured (RD/WR permissions)
Latest SW version is available (FTP root directory)

FTPinstallationguide
isavailableat
Training.Ceragon.Com:
seeModules/
Installation

Proprietary and Confidential

Page 45

Agenda
Site Requirements
Packing & Transportation
Unpacking
Required
q
Tools
IDU Dimensions
Installing standalone IDU in a 19 Rack
Installing Nodal Enclosures in a 19 Rack
Preparing the IDU for a Shelf installation
Installing the IDU in a Shelf
Installing a Blank Panel IDU in a Shelf
Installing a T-Card into an IDU
Grounding the IDU
Lightning Protection
Power General Requirements
Installing the IDU-ODU IF cable

Proprietary and Confidential

Site Requirements
IDU must be located indoors
The environment temperature must be between -5 C and +45 C.
Easily accessible, but only by authorized personnel.
Available power source of -48 VDC, and the site must comply with
National Electric Code (NEC) standards.
Available management connection (Ethernet or dial-up).
IDU-ODU connection (IF cable): no more than 300m

Proprietary and Confidential

Page 46

Site Requirements
Heat Dissipation:
The IP-10 IDU overall heat dissipation is 25W max (~85 BTU/h).
The ODU heat dissipation
p
is 100W max.

Antenna Location:
As with any type of construction, a local permit may be required before installing
an antenna. It is the owners responsibility to obtain any and all permits.

Proprietary and Confidential

Packing & Transportation


The equipment is packed at the factory, and sealed moisture-absorbing bags
are inserted.
The equipment is prepared for public transportation. The cargo must be kept dry
during transportation.
Keep items in their original boxes till they reach their final destination.
If intermediate storage is required, the packed equipment must be stored in dry
and cool conditions and out of direct sunlight
When unpacking
Wh
ki
Check the packing lists, and ensure that the
correct part numbers and quantities of
components arrived.

Proprietary and Confidential

Page 47

Unpacking
A single FibeAir system (1+0) is shipped in 4 crates.

Upon delivery, make sure that the following items are included:
Two indoor units and accessories (if ordered)
Two outdoor units
For 13-38 GHz systems, verify that there is a high RFU and low RFU.

Unpack the contents and check for damaged or missing parts.


If any partt iis d
damaged
d or missing,
i i
contact
t t your llocall di
distributor.
t ib t

Proprietary and Confidential

Required Tools and Materials


The following tools are required to install the IDU:
Crimping
p g tool for IF cable
Crimping tool for ground cable lug crimping
(optional: if alternative grounding cable is used)
Philips screwdriver #2 (for mounting the IDU to the rack and grounding screw)
Flathead small screwdriver (for PSU connector)
Sharp cutting knife (for wire stripping)
Sealing Materials

Setting up Management will require ETH cable (for setting management)


Serial Cable (for setting management)

Proprietary and Confidential

Page 48

IDU Dimensions

42.60mm

Proprietary and Confidential

Installing standalone IDU in a 19 Rack

As shown in the illustration, four screws are used to secure


the IDU to the rack
rack.

10

Proprietary and Confidential

Page 49

Installing Nodal Enclosures in a 19 Rack

11

Proprietary and Confidential

Installing Nodal Enclosures in a 19 Rack


Before you install the
enclosures
Plan carefully the required
space within the rack !
Should you need to install 3
enclosures prepare at least
10Us (6Us for enclosures + 2Us free
space for maneuvering above and below
shelves)

Main Enclosure

Start the installation process


from bottom to top, e.g. Main
enclosure should be installed
first at the bottom of your rack
space
12

Proprietary and Confidential

Page 50

Installing Nodal Enclosures in a 19 Rack


Step #1:
Install the IP-10 Main enclosure
in the 19 inch rack using 4
screws.

13

Proprietary and Confidential

Installing Nodal Enclosures in a 19 Rack


Step #1:
Install the IP-10 Main enclosure
in the 19 inch rack using 4
screws.
Step #2:
Slide down the 2nd extension
enclosure. Male connector
should plug in smoothly into the
Main enclosure.

14

Proprietary and Confidential

Page 51

Installing Nodal Enclosures in a 19 Rack


Step #1:
Install the IP-10 Main enclosure
in the 19 inch rack using 4
screws.
Step #2:
Slide down the 2nd extension
enclosure. Male connector
should plug in smoothly into the
Main enclosure.
Step #3:
Slide down the 2nd extension
enclosure. Male connector
should be plugged in smoothly
into the Main enclosure.

15

Proprietary and Confidential

Installing Nodal Enclosures in a 19 Rack


Step #4:
Secure the 2nd extension into
the Main enclosure. Use the
built-in screw.
Mount the 2nd extension into the
rack using the 4 screws

16

Proprietary and Confidential

Page 52

Installing Nodal Enclosures in a 19 Rack


Step #4:
Secure the 2nd extension
into the Main enclosure.
Use the built-in screw.
Mount the 2nd extension
into the rack using the 4
screws
Step #5:
Add the 3rd extension
when needed

17

Proprietary and Confidential

Preparing the IDU for a Shelf installation


Remove the two 19" brackets mounted on the IP-10 IDU by unscrewing the 3
screws at each side and replace with brackets supplied with enclosure.

18

Proprietary and Confidential

Page 53

Installing the IDU in a Shelf


Slide the IP-10 IDU into the enclosure and tighten it using 2 screws. Repeat
this step in accordance with the configuration.

IDU insertion & extraction


should NOT be under power

19

Proprietary and Confidential

Installing a Blank Panel IDU in a Shelf


Slide the IP-10 blank panel into the enclosure, and tighten it using 2 screws.

20

Proprietary and Confidential

Page 54

Installing a T-Card into an IDU


Remove the IP-10 T-Card blank panel from the IDU, by releasing the 2 side
screws.

21

Proprietary and Confidential

Installing a T-Card into an IDU


Insert the IP-10 T-Card panel and tighten it using the 2 side screws.

22

Proprietary and Confidential

Page 55

Grounding the IDU

Single Point Stud


Grounding Wire

23

Proprietary and Confidential

Grounding the IDU


The IDU is suitable for installation in a Common Bonding Network (CBN).
Only copper wire should be used.
The wire must be at least 14 AWG.
Connector and connection surfaces must be plated. Bare conductors must be
coated with antioxidant before crimp connections are made to the screws.
FibeAir provides a ground for each IDU, via a one-hole mounted lug onto a
single-point stud.
The
Th stud
t d mustt b
be iinstalled
t ll d using
i a UL
UL-listed
li t d ring
i ttongue tterminal,
i l and
d ttwo star
t
washers for anti-rotation.

24

Proprietary and Confidential

Page 56

Lightning Protection
For antenna ports, lightning protection is used
that does not permit transients of a greater
magnitude than the following:
Open Circuit: 1.2-50us 600V
Short Circuit: 8-20us 300A
The ampacity of the conductor connecting the
IDU frame to the DC return conductor is equal to
or greater than, the ampacity of the associated DC return conductor.

25

Proprietary and Confidential

Power General Requirements


1. A readily accessible Listed branch circuit over-current protective device,
rated 15 A, must be incorporated in the building wiring.
2. This equipment is designed to permit connection between the earthed
conductor of the DC supply circuit and the earthing conductor at the
equipment.
3. The equipment shall be connected to a properly grounded supply system
4. The DC supply system is to be local, i.e. within the same premises as the
equipment
5. A disconnect device is not allowed in the grounded circuit between the DC
supply source and the frame/grounded circuit connection.

26

Proprietary and Confidential

Page 57

Power Requirements
When selecting a power source, the following must be considered:
DC power can be from -40.5 VDC to -57.5 VDC.
Recommended: Availability of a UPS (Uninterrupted Power Source),
battery backup, and emergency power generator.
Whether or not the power source provides constant power (i.e., power is
secured on weekends or is shut off frequently and consistently).
The power supply must have grounding points on the AC and DC sides.
The
Th user power supply
l GND mustt be
b connected
t d to
t the
th positive
iti pole
l iin th
the IDU
power supply.
Any other connection may cause damage to the system!

27

Proprietary and Confidential

Power Requirements
Important
Make sure to use a circuit breaker to protect the circuit from damage by
short or overload.

28

Proprietary and Confidential

Page 58

Dual DC Feed
In boards with dual DC feed hardware, the system will indicate whether received
voltage in each connector is above or below the threshold power (40.5v
approximately).
This will
Thi
ill b
be shown
h
iin ttwo ways:
1. The LED (and its WEB representation) will only be ON if the voltage is above
the threshold
2. If voltage is below the threshold an alarm will be raised
User may configure the system not to raise an alarm in case of under-voltage
for any of the supplies.
This is used for cases where the dual feed hardware is used
used, but in the
installation only one of them is actually connected, so that no alarm is
permanently raised.

29

Proprietary and Confidential

Installing the IDU-ODU IF cable


Route the IF Coax Cable from the IDU to the ODU/RFU and terminate it
with N-type male connectors.
Note: Make sure you fasten the cable along the ladder!
Make sure that the inner pin of the connector does not exceed the
edge of the connector.
The cable should have a maximum attenuation of 30 dB at 350 MHz.

30

Proprietary and Confidential

Page 59

Thank You

Page 60

RFU and Antennas Installation

The Most Comprehensive Portfolio


FibeAir Family
RFUs
6-38 GHz

Carrier Ethernet
IP-MAX2

IP-10

3200T

EMS & NMS


PolyView (NMS)

RFU-C

Multi-Service
RFU-HP

IP-10

IP-MAX2

640P
CeraView (EMS)

TDM

RFU-P, RFU-SP
1500R/1500P

3200T

2
Proprietary and Confidential

Page 61

IDU RFU Compatibility

IP-10 / IP10G

RFU-C

1500R

RFU-P, RFU-SP

RFU-HP

IP-MAX2

RFU-SP / HS
640P

1500P
3
Proprietary and Confidential

IDU IDU Compatibility Across Link


1500R

1500R

IP 10 (R2)
IP-10

IP 10 (R3)
IP-10

IP-10 (R2/3)

IP-10 (R1)

1500P

1500R

IP-MAX/IP-MAX2

IP-10

1500P chassis Cannot House 1500R IDC and IDMs


1500R chassis Cannot House 1500P IDC and IDMs
4
Proprietary and Confidential

Page 62

RFU-C Power Consumption


RFUBand
6 26GHz
6
26 GHz
28 38GHz

1+0Configuration
22 W
22W
26W

5
Proprietary and Confidential

RFU-C direct mount configurations

1+0 direct

6
Proprietary and Confidential

Page 63

1+1Configuration
39 W
43W

RFU-C and Antenna Interface Direct Mount


Polarization

Proprietary and Confidential

RFU-C remote mount configurations

1+0 remote

8
Proprietary and Confidential

Page 64

RFU-C direct 1+1 mount configurations


1+1 direct

9
Proprietary and Confidential

RFU-C 1+1 Coupler Direct Mount Polarization


Vertical Polarization

10

Horizontal Polarization

Proprietary and Confidential

Page 65

RFU-C remote mount configurations


1+1 remote

11
Proprietary and Confidential

Orthogonal Mode Transducer (OMT) Installation

Switch to the circular adaptor


(removing the
existing rectangular transition,
swapping the O-ring, and
replacing on the circular
transition).

12

Proprietary and Confidential

Page 66

OMT Installation Example

Proprietary and Confidential

13

20 dB Attenuator (for RFU-C in 38GHz)


In case 20 dB attenuator is required, for 38 GHz band, the installation
as illustrated:

14
Proprietary and Confidential

Page 67

Adaptors for RFU-P Direct Antenna Mount

RFU-P Ant with


adaptor for RFU-C

15
Proprietary and Confidential

RFU-HS Direct Mount Installation

16

Proprietary and Confidential

Page 68

Twist Adapter For Direct Mount Polarization

17

Proprietary and Confidential

RFU-HS Direct Mount Adapter Wall

18

Proprietary and Confidential

Page 69

RFU-HS Direct Mount RFU-HS onto Antenna

19

Proprietary and Confidential

RFU-HS 1+1 Direct Mount

Horizontal Polarization Vertical Polarization

20

Proprietary and Confidential

Page 70

RFU-HS 1+1 Direct Mount - Coupler Mounting

21

Proprietary and Confidential

RFU-HS Remote Mount 1+0 - Components

22

Proprietary and Confidential

Page 71

RFU-HS Complete 1+0 Remote Mount

23

Proprietary and Confidential

RFU-HS Remote Mount 1+1 Components

24

Proprietary and Confidential

Page 72

RFU-HS 1+1 Remote Mount Coupler


Installation

25

Proprietary and Confidential

RFU-HS 1+1 Remote Mount - Complete

26

Proprietary and Confidential

Page 73

HP-RFU Preliminary Assembly

27

Proprietary and Confidential

RFU-HP RFU Installation

28

Proprietary and Confidential

Page 74

RFU-HP Configurations 1+1

29

Proprietary and Confidential

RFU-HP N+0 / N+1 Single Pole SD


Configurations

30

Proprietary and Confidential

Page 75

Antenna Alignment (1)

Connect Digital Volt Meter (DVM) to the AGC BNC connector


Align the antenna until
ntil voltage
oltage reading is achie
achieved
ed (1
(1.2
2 to 1.7Vdc)
1 7Vdc)
Repeat antenna alignment at each end until the minimum dc voltage is
achieved

1.30vdc = -30dBm
1.45vdc = -45dBm
1.60vdc = -60dBm
etc

31
Proprietary and Confidential

Antenna Alignment (2)

Compare achieved RX level to


calculated RX level
Keep aligning until the achieved
level is up to 4 dB away from the
calculated received signal level
If voltage reading is more than 4
dB away or higher than 1.7vdc,
re-align antenna to remote site

32
Proprietary and Confidential

Page 76

Thank You

Page 77

Thispagewasintentionallyleftblank.

Page 78

Green Mode

Green Mode

Adjusting the power consumption is an errorless


process and designed to optimize power
consumption in normal fading environment
which is the case most of the time.

Proprietary and Confidential

Page 79

The HP Radios
1500HP / RFU-HP / RFU-A:
Radio

No.ofReceivers

ATPC

GreenMode

1500HP

Single RX/
DualRX

RFUHP

SingleRX

RFUA

Single RX/
DualRX

Please note
1. Green Mode is supported with IP-10 IDUs only
2. When ATPC is enabled, Green Mode cannot be enabled
3. When connected to 1500R or any other IDU and operated in lower TX power, there is
considerable reduction in power consumption according to the green scale (see
later~33Watt)
3

Proprietary and Confidential

ATPCVS.GREENMODE
ATPC:

UsedtoreduceinterferencetootherradiosinadenseMW
environment

GreenMode:
GreenModeisenvironmentallyfriendly
SavesOPEXandCAPEXthroughlowerpowerconsumption
Oncefadingbecomessevere,actslikeATPC
Once fading becomes severe acts like ATPC

Proprietary and Confidential

Page 80

Power Consumption VS. Monitored TSL


The radio operates in fixed and pre-defined
power-consumption states:

PowerState

MonitoredTX
Power

Consumed
power[W]

HIGH

32dBm

72Watt

MEDIUM

28dBm

45 Watt

LOW

22dBm

33 Watt

Transition between power states is hitless and


errorless !
*X<Y<Z
5

Proprietary and Confidential

Normal ATPC
Set reference level Remote TX changes accordingly

5 dB
dB
15
100

RX:41dBm
Referencelevel: 40dBm

When fading occurs, both transmitters try to


compensate for the losses by increasing
transmission power while maintaining RSL as
close as possible to the Ref. level
Proprietary and Confidential

Page 81

GREEN MODE
Set
Set

GreenMode
GreenRSL

enable
limit [dBm]

setting the Green RSL to


-50dBm doesnt degrade fade
margin, as the mechanism will
increase TX power if
necessary.

15
100
5 dB
dB

RX:52dBm
RX:37dBm
RX:42dBm
RX:47dBm
Green level: 50dBm
Greenlevel:
50dBm
When fading occurs, both transmitters
compare the monitored RSL with the Green
Level (Ref.). As long as RSL> Ref. there is no
need to increase the TSL.
7

Proprietary and Confidential

GREEN MODE
Set
Set

GreenMode
GreenRSL

enable
limit [dBm]

setting the Green RSL to


-50dBm doesnt degrade fade
margin, as the mechanism will
increase TX power if
necessary.

15 dB

RX:50dBm
RX:52dBm
Green level: -50dBm
50dBm
When RSL drops below the Green Ref. level,
we must increase the TSL to maintain the
fade margin and avoid low sensitivity
8

Proprietary and Confidential

Page 82

Thank You

Page 83

Thispagewasintentionallyleftblank.

Page 84

Management Settings

Agenda
Getting started
General notes
General commands
Command historyy
Reading current IP
Setting new IP
Connecting PC to IDU
Troubleshooting
Factory Defaults

2
Proprietary and Confidential

Page 85

Getting Started
Verify that physical installation is successfully completed:
IDU is properly mounted in a shelf / rack
Power + GND
IF Cable between IDU and ODU
Connect a PC to the Terminal connector and launch a serial application
Baud rate: 115200

YoumayuseanySerial
ApplicationsuchasHyper
Terminal PuTTY TeraTerm
Terminal,PuTTY,TeraTerm
etc

Data bits: 8
Parity: None
Stop
St bits:
bit 1
Flow Control: None

Log on using (admin/admin) for user name and password.


Now, you should be able to see the IP-10 CLI Prompt
3
Proprietary and Confidential

General Notes on CLI

IP-10:/>

Note that the chevron

> sign indicates your current directory in the CLI tree

Most of the CLI commands are based on GET/SET concept


Some commands may require a different syntax
Ceragon strongly recommends to use CLI only for setting management IP
address when current IP is unknown
All functions & features can be configured faster and easier using the WEB
based EMS
4
Proprietary and Confidential

Page 86

General Commands
IP-10:/
IP-10:/
IP-10:/
IP-10://

>
>
>
>

?
ls
lsp
exit

IP-10:/ > cd
IP-10:/ > cd ..

Type ? (question mark) to list helpful commands


Type ls to list your current directory
Type lsp to list available commands of current directory
Type exit to terminate the session
Type cd to change directory
Type cd .. to return to previous directory
5
Proprietary and Confidential

Command History

Use the arrow keys to navigate through recent


commands

Use the TAB key to auto-complete a syntax

6
Proprietary and Confidential

Page 87

Reading Current IP
To read current IP type the following:
IP-10:/>cd management/networking/ip-address/
IP-10:/management/networking/ip-address>
Note that the prompt has changed. Now, type get ip-address:
IP-10:/management/networking/ip-address>get ip-address
completion the current IP will be displayed
Upon completion,
displayed, followed by the new
prompt:
IP-10:/management/networking/ip-address>get ip-address
192.168.1.1
IP-10:/management/networking/ip-address>
7
Proprietary and Confidential

Setting New IP
Now, let us set a new IP for the MNG:
We assume the required IP is 192.168.1.144
Type set ip-address 192.168.1.144
IP-10:/management/networking/ip-address>set ip-address 192.168.1.144

Upon completion, you will be prompt:


You may
y lose remote management
g
connection to the unit if this value is
changed incorrectly.
Are you sure? (yes/no):

Type yes and connect the IDU to your network / PC


8
Proprietary and Confidential

Page 88

Connecting IDU to EMS


1. Connect your EMS/NMS to the IDU (port 7) with ETH CAT5 cable
2. Verify that your PCs IP is in the same subnet
3 Make sure Link is up
3.
4. PING the IDU
5. Launch a WEB browser with the URL set as the IDUs IP

9
Proprietary and Confidential

Management Troubleshooting
In case PC cannot PING IDU
1. Check your ETH cable it might not be inserted properly (broken PIN)
2. Verify the management port is enabled in the EMS General/Management
configuration
3. Make sure you connect to a management-enabled port (7, 6 or 5)
4. Verify right LED is ON (see below)
5. Verify your PC is in the same subnet as the IDU
6. In case your IDU is connected to a router: set the IDUs Default GW = Router IP
7. In case your PC is connected to several IDUs (through switch/hub) make sure
every IDU has a unique IP
When ON (Green) = Port is set to Management
When OFF = Port is set to Data

10
Proprietary and Confidential

Page 89

Back to Factory Defaults


Going back to factory defaults can be done with EMS or CLI
In case you need to set factory defaults with CLI type the following -

IP-10:/> cd management/mng-services/cfg-service

In the new directory type the following:

IP-10:/management/mng-services/cfg-service>set-to-default

11
Proprietary and Confidential

Thank You

Page 90

EMS General Configuration

I6.8

Agenda

In this module we shall explain the following


features as they appear on the EMS
navigation Menu

Proprietary and Confidential

Page 91

Menus
Menu of a Main unit

Menu of an Extension

Proprietary and Confidential

Unit Parameters Step # 1

Configure specific
information that may
assist you later
Such info will help you
locate your site easier
and faster
4

Proprietary and Confidential

Page 92

Unit Parameters Step # 1

VDC reading

Proprietary and Confidential

Unit Parameters Step # 1

Celsius (metric) or
Fahrenheit (Imperial)
6

Proprietary and Confidential

Page 93

Unit Parameters Step # 2

By default the time &


date are derived from
the operating system
clock
User may set new
values
These settings are also
used for NTP
connection (later
explained)

Proprietary and Confidential

Unit Parameters Step # 3


IDU Serial number is
important when you
submit your request
for a License upgrade
When you complete
configuring all
settings, click Apply.

Proprietary and Confidential

Page 94

External Alarms Collapsed Input Alarm Config.

Dry Contact Alarms (DB-9):


5 Inputs
1 Output
9

Proprietary and Confidential

External Alarms Expended Input Alarm Config.

10

Proprietary and Confidential

Page 95

External Alarms Configuring the Output Alarm


Group of alarms will trigger the external alarm Output.
Communication Alarms related to traffic: Radio / Ethernet line / TDM line
Q lit off Service
Quality
S i We
W do
d nott h
have specific
ifi alarms
l
off QoS
Q S
Processing Alarms related to SW: Configuration / Resets / corrupted files
Equipment Alarms related to: HW / FAN / RFU mute / Power Supply / Inventory.
Environmental Alarms of extreme temperature.
All Groups.

Test mode manual switch.

11

Proprietary and Confidential

Management Menu of Extension Slots

This is the switch MAC address

Here you can set/review the IP


address of the remote site
You can also access the EMS of the
remote site (assuming both IDUs are
configured identically in terms of
MNG)
12

Proprietary and Confidential

Page 96

Management Main IDU: Setting IP Address


Here you can set the IP address of
the IDU
Let us examine the following
examples to understand how and
when we use each one of these
parameters

13

Proprietary and Confidential

Management Main IDU: Setting IP Address


Node / standalone, no protection:
Connect your PC to any one of the MNG ports (7,6,5)

IP: 192.168.1.10
SM: 255.255.255.0
D.GW: 0.0.0.0

14

ETH Cross Cable

Proprietary and Confidential

Page 97

IP: 192.168.1.100
SM: 255.255.255.0

Management Main IDU: Setting IP Address


Node, Standalone, no protection, going through a Router:
Set the Default GW address

10.10.2.10

DCN
IP: 192.168.1.10
SM: 255.255.255.0
255 255 255 0
D.GW: 192.168.1.12
192.168.1.12

IP: 10.10.2.100
SM: 255.255.255.0
15

Proprietary and Confidential

Management Main IDU: Setting IP Address


Node/Standalone, 1+1 Protection:
Set a Floating IP

The floating
g IP address p
provides a
single IP address that will always give
direct access to the current active
main unit.

IP Slot #1: 192.168.1.10


IP Slot #2: 192.168.1.11
SM: 255.255.255.0
D.GW: 0.0.0.0
Floating IP: 192.168.1.22

ETH Y-Cable

IP: 192.168.1.100
SM: 255.255.255.0

See 1+1 Protection PPS for further info

16

Proprietary and Confidential

Page 98

Management Main IDU: Setting IP Address


Node/Standalone, 1+1 Protection, going through a Router:
Set a Floating IP + D. GW

192.168.1.100

IP Slot #1: 192.168.1.10


IP Slot #2: 192.168.1.11
SM: 255.255.255.0
D.GW: 192.168.1.100
Floating IP: 192.168.1.22

ETH Y-Cable

IP: 10.10.2.100
SM: 255.255.255.0
See 1+1 Protection PPS for further info

17

Proprietary and Confidential

Management Main IDU: Setting No. of MNG Ports

This is the switch MAC address


If your link is up you should be
able to see the other ends IP

The IDU has 3 ports for local management:


Port 7, Port 6 and Port 5.
You may enable none or up to 3 ports:
Number of ports =3
Number of ports =2
Number of ports =1
Number of ports =0
18

Proprietary and Confidential

Page 99

Port 7, Port 6, Port 5


Port 7, Port 6
Port 7
NO LOCAL MANAGEMENT !!!

In-Band Vs. Out of Band

Out of Band Management


MNG workstation is connected directly & locally via ETH cable to IP-10
Management data does not consume Radio Data BW (not part of the radio link)
Every Link (two ends) is associated with unique Link ID
Management BW can be set to:
64Kbps to 2048Kbps (recommended)

20

Proprietary and Confidential

Page 100

In-Band Management
All units must be members of the same subnet / LAN unless Router is used
MNG data consumes BW of the total Radio link
Every Link (two ends) is associated with unique Link ID an VLAN ID
MNG BW can be configured via GUI: 64Kbps to 2048Kbps (recommended)
Remote units are managed via Radio Link

21

Proprietary and Confidential

Management Main IDU: Port Properties

In Band Management
requires unique VLAN ID
This helps separating
MNG traffic from other
services
In Band MNG packets are
transferred via the radio
link
When the link is down,
management
g
is down as
well.

22

Proprietary and Confidential

Page 101

Wayside Channel (WSC) Management


All units must be members of the same subnet / LAN unless Router is used
MNG data consumes BW of the total Radio link
Every Link (two ends) is associated with unique Link ID
MNG BW can be configured via GUI:
Wide (2048Kbps recommended) or Narrow (64Kbps)
Remote units are managed via Radio Link

WSC MGT

WSC

MGT

WSC port should be connected to MGT port via crossed ETH cable, on both ends
23

Proprietary and Confidential

Management Main IDU: Port Properties

These parameters allow


you setting the
management capacity and
ports physical properties

24

Proprietary and Confidential

Page 102

Trap Configuration (OSS / NMS / Northbound)

To manage the IDU with OSS / NMS, you will need to configure the IP address
of the OSS Server
You may configure up to 4 Servers (Trap Destinations)
See next slide for more info.

25

Proprietary and Confidential

Trap Configuration T. Destination Configuration

26

Proprietary and Confidential

Page 103

Licensing Copy, Paste, Ready to start


Licenses are generated per IDU S/N (capacity / ACM / switch mode)
License upgrade requires system reset.

27

Proprietary and Confidential

NTP Client Properties


Enable / Disable
Type NTP Server IP address
Expect IDU to lock on NTP Servers clock
Expected Status:
1. If locked, it returns the IP address of the server it is locked on.
2. Local if the NTP client is locked to the local elements real-time clock
3. NA - if not synchronized with any clock (valid only when Admin is set to
Disable).

The feature supports Time Offset and Daylight Saving Time.


Time Offset and Daylight Saving Time can be configured via WEB (Unit Information
page) or via CLI: /management/mng-services/time-service>
28

Proprietary and Confidential

Page 104

NTP Properties

29

Proprietary and Confidential

NTP Properties
When using NTP with external protection 1+1, both Active and Standby
units
nits sho
should
ld be locked independentl
independently on the NTP ser
server,
er and report
independently their Sync status.

Time & Date are not copied from the Active unit to the Standby unit
When using NTP in a shelf configuration,
configuration all units in the shelf (including
standby main units) are automatically synchronized to the active main units
clock.

30

Proprietary and Confidential

Page 105

IP Table

Here you can manually set your neighbors network properties

31

Proprietary and Confidential

SNMP
V1
V2c
V3

No security
Authentication
Authentication privacy
SHA
MD5
No Authentication

32

Proprietary and Confidential

Page 106

All ODU
This feature is used to feed the integrated fans of the All Outdoor Enclosure
(standalone outdoor rack)
When Enabled, the All ODU enclosure interface is activated, and the enclosure
controller can then be powered to monitor fan failure alarms.
The External Alarm Input #1 becomes an output, which together with 3.3V is
used to drive the enclosures electronic board.
External Alarm Input #2 is set with a specific text & severity, and is used to
monitor any enclosure fan failure, and to raise an alarm for it (polarity change
was required to adapt it to the enclosure behavior).

All ODU Disabled


33

All ODU Enabled

Proprietary and Confidential

All ODU - External Alarms Status


All ODU = Disabled

All ODU = Enabled

34

Proprietary and Confidential

Page 107

Versions - IDU

35

Proprietary and Confidential

Versions - ODU

36

Proprietary and Confidential

Page 108

Versions Running / Installed / Upgrade / Downgrade

Lets explore this example:


The IDU running SW is displayed in the aidu line and currently it is 3.0.92
3 0 92
A new SW was downloaded sometime in the past (3.0.97)
The IDU was not upgraded yet

37

Proprietary and Confidential

Thank You

Page 109

Thispagewasintentionallyleftblank.

Page 110

IP-10 Licensing

Licensing Copy, Paste, Ready to start


The License key is generated per IDU serial number (S/N):

Proprietary and Confidential

Page 111

Licensing: General
In order to upgrade license, license-key must be entered to the system
(requires cold-reset)
When system is up
up, its license key is checked
checked, allowing access to new
capacities and/or features
If license key is illegal (syntax errorillegal S/N) specific alarm will be raised
When "License Violation" alarm is raised, Radio port capacity is automatically
limited to ~3Mbps, allowing only management channels to remote end
To clear the violation alarm,, user must configure
g
the system
y
to comply
p y with the
loaded license, and then, issue cold-reset (radio resumes full operational status
if the violation is no longer relevant)

Proprietary and Confidential

Model

Page 112

Licensing: Factory Defaults

ACM

L2 SWITCH

Asymmetric

CAPACITY
Q8

RESILIENCY

Q6

Q1

Q7
Q5

SyncU

Per-Usage

TDM

En. QoS

DEMO

When no license has been purchased or loaded, all IDUs support the following:
10Mbps radio traffic (ETH + TDM)
No ACM
No switch capabilities (single pipe only)
No RSTP
SNCP trails are allowed
Synch. sources for Sync ETH are blocked
5

Proprietary and Confidential

Licensing: Automatic Coding & Modulation

ACM

L2 SWITCH

Asymmetric

CAPACITY
Q8

RESILIENCY

Q6

Q1

Q7
Q5

SyncU

Per-Usage

TDM

En. QoS

DEMO

ACM enables automatic & dynamic radio scripts. New scripts are available
(R l
(Release
I6
I6.6.2):
6 2)

ACM-56MHz, QPSK 256QAM


ACM-50MHz, QPSK 256QAM
ACM-28MHz, QPSK 256QAM
ACM-14MHz, QPSK 256QAM
ACM-10MHz, QPSK 256QAM
ACM-7MHz, QPSK 256QAM
Proprietary and Confidential

Page 113

Licensing: L2 Switch

ACM

L2 SWITCH

Asymmetric

CAPACITY
Q8

RESILIENCY

Q6

Q1

Q7
Q5

SyncU

Per-Usage

TDM

En. QoS

DEMO

CAPACITY

RESILIENCY

This license enables 2 L2 switching modes:


1.
1
2.

Metro
M
t S
Switch
it h (Q
(QnQ,
Q A
A.K.A
K A VLAN Stacking)
St ki )
Managed Switch

The following features are supported as well LAG


Automatic State Propagation
QoS (Enhanced QoS requires additional license)
Ring RSTP (requires additional license)
7

Proprietary and Confidential

Licensing: Asymmetrical Links

ACM

L2 SWITCH

Asymmetric

Q8

Q6

Q1

Q7
Q5

SyncU

Per-Usage

TDM

En. QoS

DEMO

This license enables to use the asymmetrical MRMC scripts


Supported either in 28MHz or 56MHz
Allowing having 50% more traffic on the downlink on the expanse of the uplink.

Proprietary and Confidential

Page 114

Licensing: Radio Capacity

ACM

L2 SWITCH

Asymmetric

CAPACITY
Q8

RESILIENCY

Q6

Q1

Q7
Q5

SyncU

Per-Usage

TDM

En. QoS

DEMO

Limits the total amount of radio capacity available:


This is the sum of ETH + TDM bandwidth
The available radio scripts (MRMC) are automatically derived from the applied
license
This license applies only if the TDM-only license is disabled
9

Proprietary and Confidential

Licensing: Network Resiliency

ACM

L2 SWITCH

Asymmetric

CAPACITY
Q8

RESILIENCY

Q6

Q1

Q7
Q5

SyncU

Per-Usage

TDM

En. QoS

DEMO

Allows configuration of features that make use of loop network topologies:


Ring RSTP
TDM trails protection (SNCP)
Note that for systems in which these features were enabled in previous versions, the
features will be allowed even if no resiliency license is purchased.
10

Proprietary and Confidential

Page 115

Licensing: Synchronization Unit

ACM

L2 SWITCH

Asymmetric

CAPACITY
Q8

RESILIENCY

Q6

Q1

Q7
Q5

SyncU

Per-Usage

TDM

En. QoS

DEMO

Allows configuration of external source as a clock source for synchronous


Ethernet output (assuming the IDUs hardware supports synchronization).
If this license is not installed, Ethernet clock source can only be a local (internal) clock.
With SyncU BTS are accurately synchronized across the entire topology over Ethernet
11

Proprietary and Confidential

Licensing: Per-Usage

ACM

L2 SWITCH

Asymmetric

CAPACITY
Q8

RESILIENCY

Q6

Q1

Q7
Q5

SyncU

Per-Usage

TDM

En. QoS

DEMO

Allows unlimited usage of all features in the system, and generates reports of current
usage, used for usage-based billing.
In addition, system will warn user when a chargeable feature is enabled.

12

Proprietary and Confidential

Page 116

Licensing: TDM Only

ACM

L2 SWITCH

Asymmetric

CAPACITY
Q8

RESILIENCY

Q6

Q1

Q7
Q5

SyncU

Per-Usage

TDM

En. QoS

DEMO

Limits the amount of TDM trails that can be mapped to a radio.


Allows minimal ETH traffic for network management only.
If this license is allowed, any radio script can be loaded, but the number of trails is
limited.
13

Proprietary and Confidential

Licensing: Enhanced Quality of Service

ACM

L2 SWITCH

Asymmetric

CAPACITY
Q8

RESILIENCY

Q6

Q1

Q7
Q5

SyncU

Per-Usage

TDM

En. QoS

DEMO

In addition to standard QoS features (no license required)


required), the following
features are added:
WRED
Eight Queues
Shaping per queues
14

Proprietary and Confidential

Page 117

Licensing: Demo

ACM

L2 SWITCH

Asymmetric

CAPACITY
Q8

RESILIENCY

Q6

Q1

Q7
Q5

SyncU

Per-Usage

TDM

En. QoS

DEMO

Allowed for 60 days, auto reset is applied when expired (radio restores previously
assigned script)
When Demo license is enabled:
1. An alarm & timer are displayed in GUI (Timer is off when IDU is off)
2. All radio scripts and features are configurable
15

Proprietary and Confidential

Order Examples

License

Ceragon PN

Marketing Model

Description

ACM

SL-0181-0

IP10 SLACM

IP-10 IDU ACM Enabled

Capacity

SL-0183-0

IP10-SL-CAP-025

IP-10 IDU Capacity 25Mbps

Capacity

SL-0189-0

IP10-SL-CAP-ALL

IP-10 IDU Capacity All

Enhanced QoS

SL-0224-0

IP10-SL-Enhanced-QoS

IP-10 IDU Enhanced QoS Enabled

L2 Switch /
Metro Switch

SL-0128-0

IP10-SL-Metro

IP-10 IDU Metro Switch Enabled

SyncU

SL-0223-0

IP10-SL-Sync-Unit

IP-10 IDU Sync. Unit Enabled

Resiliency

SL-0222-0

IP10 SL N t
IP10-SL-Networkk
Resiliency

IP 10 IDU Network
IP-10
N t
kR
Resiliency
ili
Enabled

Asymmetrical
Links

SL-0260-0

IP10-SL-Asymmetricallinks

IP-10 IDU Asymmetrical Links


Enabled

16

Proprietary and Confidential

Page 118

Applications

1+1 HSB
No special license is required for 1+1 behavior
Install 2 ACM licenses per link (no HSB)
Install 4 ACM licenses per HSB link

A
A

18

Proprietary and Confidential

Page 119

Metro Switch
When Aggregation is required
When more than 1 ETH port is needed
IDUs of both ends of a link should be installed with the same configuration:
Metro VS. Metro
Pipe VS. Pipe
Metro VS. Pipe is not supported
BTS
10

M
M
BTS1
BTS
11

BTS2
BTS3
19

Proprietary and Confidential

Metro Switch
Metro switch license may be applied in first and last IDUs to allow
Secure tunneling of Customer Services (QnQ)
Easier IDU configuration: no need to pre-configure C-VLANs
Reduced costs due to fewer licenses in the topology
CVLANs
leavehere

BTS

CVLANs
enterhere
20

Pipe Mode does not require a license

Proprietary and Confidential

Page 120

SNCP & In-Band in RSTP Ring


When In-Band Management is required in a ring
Install Metro license in Main IDUS
Install Network Resiliency in Main IDUs
Enable RSTP or Ring RSTP in Main IDUs
In this example, SNCP is supported as well

M
M

R
R

21

Proprietary and Confidential

SNCP without In-Band in RSTP Ring


When SNCP is required without In-Band Management
Install Network Resiliency license in Main IDUs

R
R

R
R

R
22

Proprietary and Confidential

Page 121

SyncU (current release)


The receiving IDU is fed with a time reference clock (TDM port)
The clock is transported over ETH frame
The clock is distributed in the topology using TDM XC Trail management
The terminating IDU drops the clock
Only 2 SyncU licenses are required

S
TDM XC Trail Management

Clock

23

Proprietary and Confidential

SyncU (next release)


User can choose to configure Trails to distribute the clock or let the system
detect and distribute it automatically (more licenses are required)

S
TDM XC Trail Management

Clock

Automatic Detection & Distribution

Clock
24

Proprietary and Confidential

Page 122

Exercise:
Tree, Aggregation, Enhanced QoS

Design your license requirements according to the following scheme

1.
2.
1.
2.
3.

200 Mbps
ACM

400 Mbps
ACM
Enhanced QoS

25

Proprietary and Confidential

Solution
Q

Enhanced QoS license

ACM license

Metro/Managed license

400

Capacity

100

A
Q

200

400

100

26

Proprietary and Confidential

Page 123

Solution 2: HSB

100

A
Q

400

400

200

100

HSB
100

27

Proprietary and Confidential

Solution 3: HSB + LAG

Dual GE interfaces connect to the Switch/Router


Static LAG is configured on the Switch/Router interfaces connected to the IP-10s
Static LAG is configured on the IP-10
2 optical splitter/combiners are used to connect each of the 2 interfaces on the
10s
Switch/Router to each of the corresponding interfaces on the IP
IP-10s

100

A
Q

400

400

200

LAG
LAG

100

100

See next slide


28

Proprietary and Confidential

Page 124

Solution 3: HSB + LAG


1+1 HSB

Static LAG
Static LAG

3rd party
Switch or Router

Static LAG

STBY IP-10 disables its Ethernet interface towards the Switch/Router


Any failure detected in radio link or equipment will trigger switch-over to the back-up
IP- 10 unit with <50msecs traffic interruption on the radio link
Any failure in the local GbE interfaces will be handled by the link aggregation
mechanism without triggering switch-over to the back-up IP-10 unit!
29

Proprietary and Confidential

Thank You

Page 125

Thispagewasintentionallyleftblank.

Page 126

EMS Switch Configuration

Agenda

1. Switch mode review


2. Guidelines
3. Single Pipe Configuration

Proprietary and Confidential

Page 127

Switch Modes
1. Single (Smart) Pipe (default mode, does not require license)
Only single GbE interface is supported (Optical GbE-SFP or Electrical GbE 10/100/1000).
Any traffic coming from any GbE interface will be sent directly to the radio and
vice versa.
This application allows QoS configuration.
Other FE (10/100) interfaces can be configured to be "functional" interfaces
(WSC Protection
(WSC,
Protection, Management)
Management), otherwise they are shut down
down.
Single pipe does not forward PAUSE PDU (01-80-C2-00-00-01) and Slow
protocols PDU (01-80-C2-00-00-02).

Proprietary and Confidential

Switch Modes
2. Managed Switch (license depended)
This application is 802.1Q VLAN aware bridge, allowing L2 switching based
on VLANs.
All Ethernet ports are allowed for traffic. Each traffic port can be configured to
be "access" port, "trunk" port or hybrid:
Type

VLANs

AllowedIngressFrames

AllowedEgress
Frames

Access

SpecificVLANshouldbe
assigned to access the port
assignedtoaccesstheport

OnlyUntaggedframes
(orTaggedwithVID=0
"PriorityTagged)

Untaggedframes

Trunk

ArangeofVLANsshouldbe
assignedtoaccessthePort

OnlyTaggedframes

Taggedframes

Hybrid

SpecificVLANand arangeof
VLANsshouldbeassignedto
accesstheport

Onlytaggedframeaslisted
ontheportanduntagged
frames

Taggedand
Untaggedframes

Proprietary and Confidential

Page 128

Switch Modes
3.

Metro Switch (license depended)

This application is 802.1Q VLAN aware bridge, allowing Q-in-Q


(A.K.A. VLAN Stacking).
This mode allows the configuration of a PE port and CE port.
Allowed Ingress
Frames

Type

VLANs

CustomerNetwork

Specific S-VLAN should be Untagged frames, or


assigned to "Customerframes with C-tag
Network" port
(ether-type=0x8100).

ProviderNetwork

A range of S-VLANs, or
"all" S-VLANs should be
assigned to "ProviderNetwork" port

Configurable S-tag.
(ether-type)
0x88a8
0x8100
0x9100
0x9200

Allowed Egress
Frames
Untagged or C-tag
(ether-type= 0x8100)
frames.
Configurable S-tag.
(ether-type)
0x88a8
0x8100
0x9100
0x9200

Proprietary and Confidential

Guidelines

Changing switch modes requires a reset


Resets do not change the IP-10G settings (radio,
configuration, etc.) but affects traffic
VLANs need to be created in the switch DB before assigned
to a port

Proprietary and Confidential

Page 129

Single Pipe Configuration

Single Pipe Configuration

Untagged
VID 4

45
VID 51

IP-10 Switch

VID 100

Port 1: GbE (Optical or Electrical)


Port 3: FE (RJ45)

Proprietary and Confidential

Page 130

Port 8 (Radio)

Configuration Single Pipe

This is the default setting

Proprietary and Confidential

Configuration Single Pipe

Only one ingress port


can be used:

Port 1 (Opt. or Elec.)


Port 3 (RJ45)

When one is enabled


the other is disabled
No need to configure
VID membership
10

Proprietary and Confidential

Page 131

Thank You

Page 132

Commissioning the Radio Link


Version I6.8

Radio Link Parameters


TSL

IDU

ODU

RSL

))

ODU

IDU

To establish a radio link, we need to configure / monitor the following:


1. TX / RX frequencies set on every radio
2. RSL Received Signal [dBm]
3. MSE Mean Square Error [dB] (see MSE PPS)
4. Max. TSL Max. allowed Transmission Signal [dBm]
5. Monitored TSL Actual Transmission level [dBm]
6. IF Interface Enable / Disable
7. Link ID must be the same on both ends
8. ATPC ON / OFF avoiding co-interferences caused by nearby antennas
9. MRMC Modem scripts (ACM or fixed capacity, channel & modulation)
10. Adaptive Power ON / OFF To allow max. transmission signal when ACM is ON
11. Green Mode (RFU-HP) please refer to Green Mode PPS
12. IFC in case of using Dual Receiver Radios
13. MAC Header Compression 45% higher throughput (Ceragon Proprietary)
2

Proprietary and Confidential

Page 133

Feature Description
(followed later with EMS Configuration Steps)

LINK ID Antenna Alignment Process


To avoid pointing the antenna to a wrong direction (when both links share the
same frequency), LINK ID can be used to alert when such action is take.

# 101
# 101

# 102
# 101
Link ID Mismatch

Proprietary and Confidential

Page 134

Link ID
Mismatch

LINK ID Antenna Alignment Process


Both IDUs of the same link must use the same Link ID
Otherwise, Link ID Mismatch alarm will appear in Current Alarms Window

# 101
# 101

# 102

Link ID
Mismatch

# 101
Link ID Mismatch

Proprietary and Confidential

ATPC Automatic Transmit Power Control


The quality of radio communication between low Power devices varies
significantly with time and environment.
This phenomenon indicates that static transmission power
power, transmission range
range,
and link quality, might not be effective in the physical world.

Static transmission set to max. may reduce lifetime of Transmitter


Side-lobes may affect nearby Receivers (image)

Main Lobe

Side Lobe

Proprietary and Confidential

Page 135

ATPC Automatic Transmit Power Control


To address this issue, online transmission power control that adapts to
external changes is necessary.
In ATPC, each node builds a model for each of its neighbors, describing the
correlation between transmission power and link quality.
With this model, we employ a feedback-based transmission power control
algorithm to dynamically maintain individual link quality over time.

Proprietary and Confidential

ATPC Automatic Transmit Power Control


1. Enable ATPC on both sites
2. Set reference RSL (min. possible RSL to maintain the radio link)
3. ATPC on both ends establish a Feedback Channel through the radio link (1byte)
4. Transmitters will reduce power to the min. possible level
5. Power reduction stops when RSL in remote receiver reaches Ref. level

TSL Adjustments

ATPC
module

Monitored RSL

Radio
Transceiver

Radio

Radio
Receiver

Feedback

Site A

Radio
Receiver
Signal
Quality
Check

Proprietary and Confidential

Page 136

Ref. RSL

RSL
required
change
Site B

ATPC OFF = High Power Transmission

ATPC:

Disabled

ATPC:

Disabled

Max. TSL:

10 dBm

Max. TSL:

10 dBm

Monitored TSL:
Monitored RSL:

10 dBm
-53 dBm

Monitored TSL:
Monitored RSL:

8 dBm
-56 dBm

ATPC
module

Radio
Transceiver

Radio

Radio
Receiver

Feedback

Radio
Receiver
Signal
Quality
Check

Site A

Ref. RSL

RSL
required
change
Site B

Proprietary and Confidential

ATPC ON =
Reduced Power, cost & long-term maintenance
ATPC:
Ref. RSL:

Enabled
-65 dBm

ATPC:
Ref. RSL:

Enabled
- 65 dBm

Max. TSL:

10 dBm

Max. TSL:

10 dBm

Monitored TSL:

2 dBm (before 10)

Monitored TSL:

2 dBm (before 8)

Monitored RSL:

-60 dBm (before 53)

Monitored RSL:

-63 dBm (before 56)

Note: in case of Radio LOF the power is increased up to configured maximum


power level

ATPC
module

Radio
Transceiver

Radio

Radio
Receiver

Feedback

Site A

10

Radio
Receiver
Signal
Quality
Check

Proprietary and Confidential

Page 137

Ref. RSL

RSL
required
change
Site B

ATPC Override Timer


Note: in case of Radio LOF the power is increased up to configured maximum
power level

As a result the transmitter may cause interferences


The ATPC Override Timer enables limit this interference
The timer counts seconds passed since maximum power reached
Once the timer expires the transmission level is as defined by ATPC
override Tx level

Note: in case of Radio LOF the power is increased up to configured maximum


power level

ATPC
module

Radio
Transceiver

Radio

Radio
Receiver

Feedback

Site A

11

Radio
Receiver
Signal
Quality
Check

Ref. RSL

RSL
required
change
Site B

Proprietary and Confidential

MRMC Multi Rate Multi Coding


1. Radio capacity is determined by Channel BW, Modulation and ACM (fixed
or adaptive)
2 Non
2.
N ACM scripts
i t ((old)
ld) are still
till available
il bl tto supportt N
Non-ACM
ACM radios
di
3. ACM TX profile can be different than ACM RX profile.
4. ACM TX profile is determined by remote RX MSE performance.
5. Remote Receiver (RX) initiates ACM profile upgrade or downgrade
6 When MSE is improved above predefined threshold
6.
threshold, RX generates a
request to the remote TX to upgrade its profile.
7. If MSE degrades below a predefined threshold, RX generates a request to
the remote TX to downgrade its profile.

12

Proprietary and Confidential

Page 138

MRMC Multi Rate Multi Coding


Each ACM script has 8 profiles.

Profile Modulation

The radio capacity will be dictated by the


channel BW ((see next slide))
The lower the modulation the less sensitive
the receiver is:

QPSK

8QAM

16QAM

32QAM

64QAM

More system gain


Bigger fade margin

128QAM

256QAM(highFEC)

At lower modulation orders the radio link will


tolerate lower RSL
S levels. For example:

256QAM(lowFEC)

With 16QAM the radio will drop at (-78dBm)


whereas with 8QAM the radio will drop at
(-82dBm)

13

Proprietary and Confidential

MRMC Adaptive TX Power


Designed to work with ACM in certain scenarios to allow higher Tx power
available at lower order modulation schemes for a given modulation scheme.

When Adaptive TX is disabled:


Maximum TX power is limited by the highest modulation configured in the MRMC ACM
script.
In other words, when link suffers signal degradation, modulation may change from
256QAM to QPSK. However, Max. power will be limited to the value corresponding as
Max. TX in 256QAM.

When Adaptive TX is Enable:


When link suffers signal degradation, modulation may change from 256QAM to QPSK.
However, Max. power will increase to compensate for the signal degradation.

14

Proprietary and Confidential

Page 139

MRMC Adaptive Power = OFF

256QAM @ Monitored TSL = 18 dBm (Max.)


Signal Degradation
= Lower bit/symbol

16QAM @ MAX. TSL = 18 dBm

15

Proprietary and Confidential

MRMC Adaptive Power = ON

256QAM @ Monitored TSL = 18 dBm(Max.)


Signal Degradation
= Lower bit/symbol

16QAM @ Monitored TSL = 24 dBm

16

Proprietary and Confidential

Page 140

MRMC Adaptive Power


It is essential that Operators ensure they do not breach any regulator-imposed
EIRP limitations by enabling Adaptive TX.
To better control the EIRP, users can select the required
q
class ((Power VS.
Spectrum):
Class 2
Class 4
Class 5B
Class 6A
FCC
RFU C should
RFU-C
h ld h
have version
i 2.01
2 01 (or
( hi
higher)
h ) ffor proper ffunctionality
ti
lit off
Adaptive TX Power feature.

The Effective Isotropic Radiated Power (EIRP) is the apparent power transmitted towards the receiver assuming that the
signal power is radiated equally in all directions

17

Proprietary and Confidential

MRMC Adaptive Power


If enabled, the maximum tx power in lower constellations is limited by the
reference class configured, as listed in the following table.

18

Reference Class

Reference Modulation

Class 2

Class 4

16

Class 5B

64

Class 6A

256

FCC

Proprietary and Confidential

Page 141

MAC Header Compression


1.
2.
3.
4
4.

No impact on User Traffic


Ceragon proprietary Mechanism
Improves the effective throughput by up to 45%
Effectiveness is reduced as the number of L2 streams is increased

MAC header compression is based on the following:


Dropping the Preamble + SFD + IFG saves 20 bytes
Dropping the Ethernet type saves 2 bytes
Adding a GFP header adds 4 bytes
In addition:
Frequently repeating SA & DA are learned
Learned DA & SA are not transmitted
A short pointer is used instead of the original 12 bytes

19

Proprietary and Confidential

MAC Header Compression

20

L2ETHFrameSize[bytes]

Improved Capacity

64

45%

96

29%

128

22%

256

11%

512

5%

Proprietary and Confidential

Page 142

EMS Configuration

Radio Settings Local Radio - 1


Radio type (displayed when comm. is OK)
Spectrum Mask
FQ spacing (gap) between channels
Monitored transmission power
Monitored received signal
Monitored MSE. Required lower than (-35dB)
The larger the amount, the poorer the radio link
quality. Required value = zero

Radio frequencies can be set


locally or both RFUs (box
checked) when links is up

22

Proprietary and Confidential

Page 143

Radio Settings Local Radio - 2

Enable / Disable : Requires system reset

Enable = no transmission

Must be identical on both IDUs


Enable on both IDUs to get maximum
throughput (500Mbps @ 56MHz)

23

Proprietary and Confidential

ATPC Local Radio - 3

Enable / Disable
Min. target RSL (local)

24

Proprietary and Confidential

Page 144

Radio Settings Local Radio 4 Disabling IF

As explained in previous slide, enabling or disabling the IF interface


requires a reset

25

Proprietary and Confidential

Radio Settings 4: IFC


(Dual Receiver Radios for Space Diversity)
Shows current connector
RSL
S Display Selector
S
RSL current monitored level
RSL current monitored level (combined)

You can measure the RSL of:


Main Antenna
Diversity Antenna
Combined signal
To calibrate the distance between both antennas, type the distance in nano0seconds
and click Apply
26

Proprietary and Confidential

Page 145

Radio Settings 5: Remote Radio

When the radio link is up, you can configure the remote radio via the radio frames:
Make sure Remote IP is available (configurable)
Remote RSL can be read
Remote TSL can be set (values depend on MRMC script)
Remote ATPC REF level
Remote Floating IP
Remote TX MUTE can be disabled (see next slide)
27

Proprietary and Confidential

Radio Settings 5: Un-muting Remote Radio


Simplified scheme

Sit B is
Site
i NOT transmitting
t
itti
but receiver is still ON
Site A is transmitting

Site B

Site A
28

Proprietary and Confidential

Page 146

Radio Settings 6: Radio Thresholds

These settings determine the sensitivity / tolerance for triggering:


1+1 HSB switchover
Ethernet Shutdown
PM generated alarms
29

Proprietary and Confidential

Radio Settings 7: MRMC Configuration

30

Proprietary and Confidential

Page 147

Radio Settings 7: MRMC Configuration

31

Proprietary and Confidential

Radio Settings 7: MRMC Configuration


MAX. Capacity
(w/out compression)
ACM Script

CH. BW

Modulation
Spectrum
Mask

ACM is on

Spectrum
Class Type

32

Proprietary and Confidential

Page 148

Radio Settings 7: MRMC Configuration

33

Proprietary and Confidential

Radio Settings 7: MRMC Configuration


Configure here:
Adaptive
p
Power: Enabled / Disabled
Reference Class

34

Proprietary and Confidential

Page 149

Thank You

Page 150

Configuring Interfaces
Version I6.8

Agenda

In this presentation we shall


explain the required steps to
configure these interfaces

Proprietary and Confidential

Page 151

ETH

TDM

STM1

AUX

AIS

Sync

Configuring ETH ports is discussed in previous modules:


Switch Configuration
Trunk VS. Access
Metro
M t S
Switch
it h C
Configuration
fi
ti
QoS Configuration
Interface

Rate

Functionality
Single Pipe

Managed SW / Metro

ETH 1 (SFP)

GbE

Disabled / Traffic

Disabled / Traffic

ETH 2 (RJ 45)

GbE

Disabled

Disabled / Traffic

ETH 3 (RJ 45)

FE 10 / 100

Disabled / Traffic

Disabled / Traffic

ETH 4 (RJ 45)

FE 10 / 100

Disabled / Wayside

Disabled / Traffic / Wayside

ETH 5 (RJ 45)

FE 10 / 100

Disabled / MNG

Disabled / Traffic / MNG

ETH 6 (RJ 45)

FE 10 / 100

Disabled / MNG

Disabled / Traffic / MNG

ETH 7 (RJ 45)

FE 10 / 100

Disabled / MNG

Disabled / Traffic / MNG

ETH 8 Radio
(N Type)

According to
Licensed fq.

Disabled / Traffic

Disabled / Traffic

Proprietary and Confidential

ETH

TDM

STM1

AUX

Proprietary and Confidential

Page 152

AIS

Sync

ETH

TDM

STM1

AUX

AIS

Sync

IP-10G has 16 TDM ports + 16 additional ports when a 2nd T-Card


is installed.
Supported PHYs:
E1
DS1
Dynamic allocation:
Radio bandwidth (which may vary in ACM) is automatically allocated in the
following order:
1. High-priority TDM trails
2. Low-priority TDM trails
3. Ethernet traffic (Data + Management, QoS should be considered)
TDM trails in both sides of a link should have identical priorities.

Proprietary and Confidential

ETH

TDM

STM1

AUX

AIS

Sync

Standalone IDU
E1/DS1 port #n will be mapped to
radio VC#n (n=1-16).
When Trails are configured, default
mapping (above) is overwritten by Trail
Mapping.
However, if no trails are configured (all
are deleted) system will revert to the
default setting.
g
When Trail is configured and set to
Operational - TDM port is activated.
When Trail is configured but set to
Reserved - TDM port is disabled.

Proprietary and Confidential

Page 153

ETH

TDM

STM1

AUX

AIS

Sync

Node Site
Up to 180 trails can be configured in a
Shelf / node
The number of Trails mapped to a
radio depends on radio capacity
(MRMC).
The maximum number of radio Trails
is 84

Proprietary and Confidential

ETH

TDM

STM1

AUX

AIS

Sync

The following configurations are


available:
Admin: Enable / Disable
When interface is disabled:
There is no signal transmission
Received signal is ignored
Trails previously configured to STM-1
interface will get Signal Failure
No alarms will be shown
M t TX:
Mute
TX
Mutes the outgoing STM-1 signal, but
received signal will be used for traffic

Proprietary and Confidential

Page 154

ETH

TDM

STM1

AUX

AIS

Sync

The following configurations


are available:
Clock source:
This is a reference for the outgoing
STM-1 signal:
Internal Clock
Loop
STM VC
Synch VC
Thi iis th
This
the VC Ch
Channell which
hi h will
ill b
be
used to sync the STM-1 interface

Proprietary and Confidential

ETH

TDM

STM1

AUX

AIS Signaling in STM interface (V5)

AIS

Sync

The system can be configured to signal


AIS at the VC level (AIS-V) in the V5
byte of the overhead.
This is meant to pro
provide
ide indications to
SDH
multiplexing equipment which may not
have the ability to detect AIS at the
payload level.
For example: signaling in outgoing V5
byte upon AIS detection at payload-level
(E1)

111111111

111111111

AIS @ E1 TS
10

AIS @ STM V5
Proprietary and Confidential

Page 155

ETH

TDM

STM1

AUX

AIS

Sync

Line TX Protection Mode

STM-1/OC-3 interface transmission


behavior when in protection mode

11

Proprietary and Confidential

ETH

TDM

STM1

AUX

AIS

Sync

J0 trace identifier is fully supported in


both 15-byte and 1-byte modes:
An alarm will be raised when the expected
string differs from the received string (but
traffic will not be affected).
Transmit, Expected and Received strings are
provided.
If a string is defined and user changes the
length from 15 bytes to 1 byte, the first byte
will be analyzed and other bytes ignored.
The string transmitted as J2 trace identifier is
the Trail ID defined for the TDM trail mapped
to the corresponding VC-12 interface.

12

Proprietary and Confidential

Page 156

ETH

TDM

STM1

AUX

AIS

Sync

Excessive BER threshold:


Specific for STM-1 interface
Signal degrade threshold:
Specific for STM-1 interface

13

Proprietary and Confidential

ETH

TDM

STM1

AUX

AIS

Sync

EOW may be used as a simple solution for on-site


communication between two technicians / installers / etc.

14

Proprietary and Confidential

Page 157

ETH

TDM

STM1

AUX

AIS

Sync

WSC Interface
WSC interface is limited to 1628 bytes.
2.048Mbps (Wide) or 64Kbps (Narrow)
Consumes BW from the total link BW

Out of band Management using WSC:


In this case, remote system is managed using Wayside channel.
On both local & remote units, Wayside channel will be connected to management port
(using cross Ethernet cable).
WSC can be configured to "narrow capacity (~64kbps) or "wide" capacity (~2Mbps).
It is recommended to use wide WSC in order to get better management performance,
since narrow WSC might be too slow.
15

Proprietary and Confidential

ETH

TDM

STM1

AUX

AIS

Sync

WSC: OOB MNG in a 1+0 standalone link

At least 2 management ports are needed in a local unit:


One port for local management, and 2nd port that will be connected to Wayside port.
On remote unit, Wayside port will be connected to management port.
16

Proprietary and Confidential

Page 158

ETH

TDM

STM1

AUX

AIS

Sync

WSC: OOB MNG in a 1+1 standalone IDUs

WSC port will be connected in each unit to other


available management port.
In remote site, each unit's Wayside port should be
connected to management port.
17

Active & Standby MNG


ports have 2 options to be
connected to the Host:
Using Ethernet splitter
cable connected to external
switch.
Using Protection "Patch
Panel".

Proprietary and Confidential

ETH

TDM

STM1

AUX

AIS

Sync

OOB MNG in a 1+1 standalone IDUs (P. Panel)

18

Proprietary and Confidential

Page 159

ETH

TDM

STM1

AUX

AIS

Sync

This feature allows detection of AIS


signals in TDM traffic arriving from line
interfaces (E1/DS1, STM-1):

In case of detection, the following takes place:


Signal failure is generated at the corresponding trail this will cause the far end not to
receive a signal (including trail ID indications) and the trail status to show signal failure
and trail ID mismatch.
An indication is given to user at the proper interface. Notice that this is not a system
alarm, since the problem originates elsewhere in the Network

19

Proprietary and Confidential

ETH

TDM

STM1

AUX

AIS

Sync

AIS Signaling in STM interface (VC 12)


In case of signal failure at the trail outgoing from the STM-1
STM 1 interface,
interface AIS
will be transmitted at the payload of the VC-12.

This table is added automatically to


the STM
STM-1
1 page when AIS is
enabled

20

Proprietary and Confidential

Page 160

ETH

TDM

STM1

AUX

AIS

Sync

The synchronization is used to sync the BTS or other equipment and


not Ceragons equipment

The clock frequency is E1/T1 based*


Up to four clock sources can be defined in a chassis or a node
At any given unit only one interface can be used as synchronization
destination

* There is also an option of 25MHz clock, explained afterwards


Proprietary and Confidential

21

ETH

TDM

STM1

AUX

S
Sync
S
Source

AIS

Sync

Cl k S
Clock
Source
(Sync Destination)

Clock Distribution
Direction

22

Proprietary and Confidential

Page 161

ETH

TDM

STM1

AUX

AIS

Sync

Sync Source
Clock Source
(Sync Destination)
Sync Source

Clock Source
(Sync Destination)

Clock Distribution
Direction

Proprietary and Confidential

23

ETH

TDM

STM1

AUX

AIS

Sync

Here the Sync Source is the E1 #1, this E1 cant be used for traffic

Possible Sync Sources:


TDM Trails
E1/T1 Interfaces
STM-1/OC-3 Interfaces
STM-1/OC-3 VC-11/12s
Radio Channels
Gigabit Ethernet Interfaces*
24

* Supported by specific HW revision

Proprietary and Confidential

Page 162

ETH

TDM

STM1

AUX

AIS

Sync

Using Synchronization Status Messages (SSM)

In SSM each sync source has quality and priority.


When an IDU require to determine which sync source
to use the decision is based on:
1. Clock Quality
2. Sync Source (Priority) used in identical quality
case

25

Proprietary and Confidential

ETH

TDM

STM1

AUX

AIS

Sync

Using Synchronization Status Messages (SSM)

The clock quality options are:


Automatic determines the clock quality automatically*
G.811 PRC quality clock (Highest quality)
SSU A G.812 Type I or IV clock
SSU B G.812 Type VI clock
G.813/8262 default clock level (Lowest quality)
DO NOT USE

* Supported by interfaces were SSM is implemented (Radio Port)


26

Proprietary and Confidential

Page 163

ETH

TDM

STM1

AUX

AIS

Sync

Using Synchronization Status Messages (SSM)

Synchronization mode can be either automatically or


to be forced for a specific interface

In case of a failure in the current sync source


The next sync source is used
In case the failed clock is good again the unit
can revert to it after a certain time period (Sync
source revertive timer

* Supported by interfaces were SSM is implemented (Radio Port)


27

Proprietary and Confidential

ETH

TDM

STM1

AUX

AIS

Sync

Here the Radio channel is a clock source to the sync

Possible Clock Sources:


E1/T1 Interfaces
STM-1/OC-3 VC-11/12s
Radio Channels
Gigabit Ethernet Interfaces
28

Proprietary and Confidential

Page 164

ETH

TDM

STM1

AUX

AIS

Sync

PRC Regenerator Mode

Frequency of 25MHz clock is applicable in the following conditions


Hardware revision R3
Single
g Pipe
p operation
p
Ethertnet #1 (GBE) must be enabled
The Ethernet interface is not used as a synchronization source
PRC Regenerator Mode is set to enabled

Single Pipe

29

Proprietary and Confidential

Thank You

Page 165

Thispagewasintentionallyleftblank.

Page 166

XC / SNCP / Nodal Solution

Introduction

Page 167

SNCP (ITU- G.805)

Ring topologies provide path protection for Ethernet or TDM signals

In some scenarios additional protection is required

The IP-10G Path-Protection is based on SNCP


(Sub-network Connection Protection)

Individual E1/T1 trails will be protected by defining two separate trails, with the same
end-points, which are routed through two different paths in the network

The end-points may be line interfaces or radio VCs, so partial path protection can
provided for a trail in a network where full p
path redundancy
y topology
p gy is not
be p
available

The end-points are also referred to as branching-points

Proprietary and Confidential

SNCP (ITU- G.805)

With Wireless SNCP, a backup VC trail


can be optionally defined for each
individual VC trail

Main Path

Protective Path

Proprietary and Confidential

Page 168

FibeAir IP-10 Integrated Nodal Solution


IP-10 IDU can be used as a Standalone unit (1U)
or in as a Nodal Solution

Connecting 2 IDUs requires a nodal enclosure:


Best economical future upgrade
Best flexibility for network designer
Easier to Install / Maintain / expand

The solution is modular and forms a single


unified nodal device:
Common Ethernet Switch
Common E1s Cross Connect
Single IP address
Single element to manage

Proprietary and Confidential

FibeAir IP-10 Integrated Nodal Solution


Up to 6 units can be stacked to form single nodal device

Additional units can be added in the field as required

Additional Nodal enclosures and units can be added in the field as required without
affecting traffic

Multiple
sites
p nodes can be cascades to support
pp large
g aggregation
gg g
Stacking is done using 2RU Nodal enclosures

Each enclosure has 2 slots for hot-swappable 1RU units

Front

Nodal enclosure
Rear

Proprietary and Confidential

Page 169

Integrated nodal solution Main units


Units located in the bottom Nodal enclosure are acting as the main units

The main unit performs the cross-connect, switching and management functions for
all the units in the node

Mandatory active main unit can be located in any of the 2 slots


Optional standby main unit can be installed in other slot
Switchover time <50msecs for all traffic affecting functions

Integrated
g
Ethernet Switching
g
Integrated TDM cross-connect
Main unit

M
E

Native2
1+1 HSB

Expansion unit

Proprietary and Confidential

Integrated nodal solution Expansion units


Units located in non-bottom Nodal enclosures are acting as expansion units
All interfaces of the expansion units (radio, TDM and Ethernet) are connected to the
main units

Expansion unit is fully managed through the main units

Radios in each pair of main/expansion units can be configured as either:

Dual independent 1+0 links


Single 1+1 HSB link
Single 2+0/XPIC link

Native2
1+0

Integrated
g
Ethernet Switching
g

Integrated TDM cross-connect

Native2
1+0

E
M

Main unit

Expansion unit

Native2
2+0/XPIC

M
M

Proprietary and Confidential

Page 170

Native2
1+1 HSB

Trail Configuration Guidelines

XC Trails Guidelines (1)


1. XC Trails can be configured only via Main unit
2 All Trails
2.
T il are transported
t
t d through
th
h main
i unit(s)
it( )
3. When Protection is enabled, configure trails to go via the Active unit
(XC Trails are automatically created on the STBY unit)
4. T-Cards (TDM / SDH) are not hot-swappable, do not extract / insert card
when IDU is powered up
5 Radio VCs must be identical on both sides of the radio link
5.

10

Proprietary and Confidential

Page 171

XC Trails Guidelines (2)


5. Creating a TDM trail automatically activates the corresponding TDM port,
therefore an alarm will display next to the relevant T-Card accommodating
the activated port(s)
7. XC Trails can be configured between:

Radio to Line
Line to Radio
Radio to Radio

8. Maximum number of Trails (SNCP Protected Ring) = 180 (per Shelf)


9 Maximum
9.
M i
number
b off T
Trails
il per R
Radio
di = 84

11

Proprietary and Confidential

XC Trails Guidelines (3)


Identify Trail interfaces prior to configuration
Note that Trail configuration is Bi-Directional !

IP10

Trail traverses through here:


We shall need to define 2
interfaces

IP10

Bypass
site

Protected Trail
(Automatic)

IP10

Radio Link
12

Proprietary and Confidential

Page 172

Trail starts here:


For SNCP we shall
need to define 3
interfaces

Trail starts here:


For SNCP we shall
need to define 3
interfaces

XC Trails Guidelines (4)


Pay attention to the order of configuration:

1
2

The Trail Start/End points should


be configured first (interface #1)

IP10

IP10
3

Bypass
site

Interfaces #2 and #3 can be


configured in a random order

Protected Trail
(Automatic)

2
IP10
1

13

Proprietary and Confidential

Standalone non-protected Trail Configuration

Page 173

Step #1: Access Trail Page

Click on the Add button

15

Proprietary and Confidential

Step #2: Configure 1st Interface


Click on the 1st interface connector

In this example we selected the


PDH connector.
Your next step is selecting the PDH
port number.

In this example we selected the


SDH connector
connector.
Your next step would be selecting
the VC number.

16

Proprietary and Confidential

Page 174

Step #3: Configure 2nd Interface


Click on the 2nd interface connector

In this example we selected the


Radio as the next interface
connector.
Your next step would be selecting
the radio channel number.

Alternatively you could choose other combinations as well:


PDH to PDH
PDH to Radio (above)
PDH to SDH
SDH to Radio
SDH to Radio
Radio to SDH
Radio to PDH
17

Proprietary and Confidential

Step #4: Configure Trail Attributes


Make sure Trail ID is unique and identical on all sites/trails

18

Proprietary and Confidential

Page 175

Step #5: Trail Verification


If your settings are correct, trail alarms should disappear, trail path is ready to be tested

19

Proprietary and Confidential

SNCP Trail Configuration in a Node

Page 176

Selecting Main IDU for Trail Configuration


In the following example we assume every node has 2 IDUs installed in a
Main Enclosure
Make sure your Main unit is selected on every Node-EMS
Enable Protection when you configure the Trails (excluding Bypass Nodes)
Trail ID should unique and identical on all nodes

21

Proprietary and Confidential

SNCP Trail in Nodal Architecture


PDH interface

Bypass
Node

IP10
IP10

IP10

SDH interface
22

Proprietary and Confidential

Page 177

1st Node
PDH interface
IP10
IP10
Bypass
site
Radio CH #1

Radio CH #26
IP10

SDH iinterface
t f
#1

23

Proprietary and Confidential

Bypass Node
PDH interface
Radio CH #48

IP10
Bypass
Node

IP10

Radio CH #1

IP10

SDH iinterface
t f

24

Proprietary and Confidential

Page 178

3rd Node

Radio CH #48

PDH interface
IP10

Bypass
site

IP10

Radio CH #26

IP10

SDH interface
25

Proprietary and Confidential

Radio Capacity Calculation

Page 179

Radio & PDH Capacity VS. Channel


Ethernet capacity (a.k.a. Ethernet L1 capacity) - Total bit rate from an
Ethernet user port. Taking into account the full Ethernet frame including the
IFG and
d preamble
bl fifields.
ld Eth
Ethernett capacity
it iis sometimes
ti
referred
f
d tto as ""portt
utilization rate".

Ethernet L2 capacity - Total bit rate of net Ethernet frames running over
the Ethernet user port. Taking into account the Ethernet frame without the
IFG and preamble fields.

Radio throughput
g p - Total bit rate supported
pp
by
y the radio link running
g in a
specific channel/modulation including radio frame overhead, etc.

Proprietary and Confidential

27

Radio & PDH Capacity VS. Channel


(figures refer to ETSI + MAC Header Compression Enabled)

3.5 MHz
P fil
Profile

M d l ti
Modulation

Mi i
Minimum
M # off Ethernet
Max
Eth
t capacity
it
Eth
Ethernet
t L2
required capacity supported
(Mbps)
capacity (Mbps)
license
E1s
10
4
13.60
10.36
25
6
20.14
15.35

Frames per
F
seconds

2
4

16 QAM
64 QAM

Minimum
Max # of Ethernet capacity
Ethernet L2
required capacity supported
(Mbps)
capacity (Mbps)
license
E1s
QPSK
10
4
13 42
13.42
10 23
10.23
8 PSK
25
6
20.18
15.38
16 QAM
25
8
27.87
21.24
32 QAM
25
10
34.48
26.27
64 QAM
25
12
40.44
30.81
128 QAM
50
13
46.60
35.50
256 QAM
50
16
54.53
41.55
256 QAM
50
17
57.38
43.72

Frames per
seconds

20233.77
29974.03

R di
Radio
Throughput
(Mbps)
10.50
15.00

7 MHz
Profile

0
1
2
3
4
5
6
7

28

Modulation

Proprietary and Confidential

Page 180

19976 45
19976.45
30034.94
41475.26
51304.87
60175.21
69339.64
81151.77
85389.21

Radio
Throughput
(Mbps)
10 38
10.38
15.03
20.31
24.85
28.95
33.19
38.64
40.60

Radio & PDH Capacity VS. Channel


(figures refer to ETSI + MAC Header Compression Enabled)

14 MHz
Profile

0
1
2
3
4
5
6
7

Modulation

Minimum
Number of Ethernet capacity
Ethernet L2
required capacity support E1s
(Mbps)
capacity (Mbps)
license
QPSK
25
8
28.90
22.02
8 PSK
25
12
40.90
31.16
16 QAM
50
18
60.36
45.99
32 QAM
50
20
70.35
53.60
64 QAM
50
24
81.78
62.31
128 QAM
100
29
98.43
74.99
256 QAM
100
34
115.15
87.73
256 QAM
100
37
124.52
94.87

Frames per
seconds
43001.18
60857.98
89823.89
104693.80
121693.09
146471.17
171347.98
185297.74

Radio
Throughput
(Mbps)
21.02
29.27
42.65
49.52
57.37
68.82
80.31
86.76

28 MHz
Profile

Modulation Minimum required Number of Ethernet capacity


Ethernet L2
capacity
it lilicense supportt E1s
E1
(Mb )
(Mbps)
capacity
it (Mb
(Mbps))

0
1
2
3
4
5
6
7

QPSK
8 PSK
16 QAM
32 QAM
64 QAM
128 QAM
256 QAM
256 QAM

50
50
100
100
150
150
200
200

17
23
33
44
55
68
76
80

57.86
77.86
111.32
150.76
187.55
228.81
254.71
268.45

44.08
59.32
84.81
114.87
142.90
174.33
194.07
204.53

Frames per
seconds
d
86099.43
115860.75
165648.63
224346.79
279093.55
340488.46
379034.79
399476.94

Radio
Throughput
Th
h t
(Mbps)
40.93
54.68
77.68
104.80
130.09
158.46
176.27
185.71

Proprietary and Confidential

29

Radio & PDH Capacity VS. Channel


(figures refer to ETSI + MAC Header Compression Enabled)

40 MHz
Profile

0
1
2
3
4
5
6
7

Modulation

Minimum
Number of Ethernet capacity
Ethernet L2
required capacity support E1s
(Mbps)
capacity (Mbps)
license
QPSK
50
23
79 64
79.64
60 68
60.68
8 PSK
100
35
119.11
90.75
16 QAM
100
51
174.14
132.68
32 QAM
150
65
218.49
166.47
64 QAM
150
81
273.67
208.51
128 QAM
200
84
305.49
232.76
256 QAM
200
84
346.84
264.26
256 QAM
300
84
369.96
281.87

Frames per
seconds
118506 13
118506.13
177239.65
259136.72
325132.27
407254.05
454605.63
516135.41
550529.12

Radio
Throughput
(Mbps)
55 90
55.90
83.04
120.87
151.36
189.30
211.18
239.61
255.50

56 MHz
Profile

0
1
2
3
4
5
6
7
30

Modulation

Minimum
Number of Ethernet capacity
Ethernet L2
required
i d capacity
it supportt E1s
E1
(Mb )
(Mbps)
capacity
it (Mb
(Mbps))
license
QPSK
100
32
108.86
82.94
8 PSK
100
48
163.37
124.48
16 QAM
150
64
216.60
165.03
32 QAM
200
84
288.50
219.81
64 QAM
300
84
358.49
273.14
128 QAM
300
84
430.43
327.95
256 QAM
400
84
489.77
373.16
256 QAM
400
84
531.82
405.20
Proprietary and Confidential

Page 181

Frames per
seconds
d
161994.37
243116.10
322318.52
429314.58
533473.73
640527.34
728824.51
791403.86

Radio
Throughput
Th
h t
(Mbps)
75.99
113.47
150.06
199.50
247.62
297.08
337.87
366.78

Radio & PDH Capacity VS. Channel - FCC


10MHz
ACM
Point

Modulation

# of
E1s

Ethernet
Capacity
(Mbps)

ACM
Point

Modulation

# of
E1s

Ethernet
Capacity
(Mbps)

QPSK

13 18

QPSK

16

28 - 40

8 PSK

10

19 27

8 PSK

22

39 - 56
57 - 81

16 QAM

16

28 40

16 QAM

32

32 QAM

18

32 46

32 QAM

38

67 - 96

64 QAM

24

42 61

64 QAM

52

93 - 133

128 QAM

28

50 71

128 QAM

58

102 - 146

256 QAM

30

54 78

256 QAM

67

118 - 169

256 QAM

33

60 85

256 QAM

73

129 - 185

30MHz
ACM
Point

20MHz

40MHz
Modulation

# of
E1s

Ethernet
Capacity
(Mbps)

ACM
Point

50MHz
Modulation

# of
E1s

Ethernet
Capacity
(Mbps)

ACM
Point

Modulation

# of
E1s

Ethernet
Capacity
(Mbps)

QPSK
Q

22

39 - 55

QPSK

31

56 - 80

QPSK

37
3

65 - 93

8 PSK

35

62 - 89

8 PSK

46

82 - 117

8 PSK

59

105 - 150

16 QAM

52

93 - 133

16 QAM

69

122 - 174

16 QAM

74

131 - 188

32 QAM

68

120 - 171

32 QAM

84

153 - 219

32 QAM

84

167 - 239

64 QAM

80

142 - 202

64 QAM

84

188 - 269

64 QAM

84

221 - 315

128 QAM

84

164 - 235

128 QAM

84

214 - 305

128 QAM

84

264 - 377

256 QAM

84

185 - 264

256 QAM

84

239 - 342

256 QAM

84

313 - 448

256 QAM

84

204 - 292

256 QAM

84

262 - 374

256 QAM

84

337 - 482

Ethernet capacity depends on average packet size


31

Proprietary and Confidential

Thank You

Page 182

Mean Square Error (MSE)

Agenda

Definition
E
Example
l
MSE & ACM
MSE values at 56MHz (case study)
MSE values at 28MHz (case study)
Troubleshooting examples

2
Proprietary and Confidential

Page 183

Introduction

MSE - Definition

MSE is used to quantify the difference between an estimated (expected)


value and the true value of the quantity being estimated
MSE measures the average of the squared errors:
MSE is an aggregated error by which the expected value differs from the
quantity to be estimated.
The difference occurs because of randomness or because the receiver
does not account for information that could produce a more accurate
estimated RSL

4
Proprietary and Confidential

Page 184

To simplify.

Imagine a production line where a machine needs to insert one part


into the other
Both devices must perfectly match
Let us assume the width has to be 10mm wide
We took a few of parts and measured them to see how many can
fit in.

5
Proprietary and Confidential

The Errors Histogram


(Gaussian probability distribution function)
9

Quantity

Expected value

3
3

width
6mm 7mm 10mm 12mm

16mm

To evaluate how accurate our machine is, we need to know how many parts differ
from the expected value
9 parts were perfectly OK
6
Proprietary and Confidential

Page 185

The difference from Expected value


Quantity

Error = 0 mm

Error = + 2 mm
Error = - 3 mm
Error = + 6 mm

Error = - 4 mm

width
6mm 7mm

10mm 12mm

16mm

To evaluate the inaccuracy (how sever the situation is) we measure how much the
errors differ from expected value

7
Proprietary and Confidential

Giving bigger differences more weight than


smaller differences
Quantity

Error = 0 mm

+ 2 mm = 4
-3 mm = 9
- 4 mm = 16

+ 6 mm = 36
width
6mm 7mm 10mm 12mm

16mm

We convert all errors to absolute values and then we square them


The squared values give bigger differences more weight than smaller differences,
resulting in a more powerful statistics tool:
16cm parts are 36 units away than 2cm parts which are only 4 units away
8
Proprietary and Confidential

Page 186

Calculating MSE
Error = 0 mm

Quantity

+ 2 mm = 4
-3 mm = 9
- 4 mm = 16

+ 6 mm = 36
width

To evaluate the total errors, we sum all the squared errors and take the average:
16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13

The bigger the errors (differences) >> the bigger MSE becomes
9
Proprietary and Confidential

Calculating MSE
MSE determines how narrow / wide the Bell is
Quantity

width
10mm
When MSE is very small the Bell shaped histogram is closer to perfect
condition (straight line): errors = ~ 0
10
Proprietary and Confidential

Page 187

MSE in digital modulation (Radios)


Let us use QPSK (4QAM) as an
example:

QPSK = 2 bits per symbol

01

00
2 possible states for I signal
2 possible states for Q signal

11

= 4 possible states for the


combined signal

The graph shows the expected


values (constellation) of the
received signal (RSL)

10

11
Proprietary and Confidential

MSE in digital modulation (Radios)


The black dots represent the
expected values (constellation)
of the received signal (RSL)

Q
01

00
The blue dots represent the
actual RSL

11

10

As indicated in the previous


example we can say that the
example,
bigger the errors are the
harder it becomes for the
receiver to detect & recover the
transmitted signal

12
Proprietary and Confidential

Page 188

MSE in digital modulation (Radios)

Q
01

00

MSE would be the average


errors of e1 + e2 + e3 + e4.

e1
e2

I
4
e4

When MSE is very small the


actual signal is very close to
the expected signal

e3

11

10

13
Proprietary and Confidential

MSE in digital modulation (Radios)

Q
01

00

When MSE is too big, the


actual signal (amplitude &
phase) is too far from the
expected signal

e1
e2

I
4
e4

11

e3

10

14
Proprietary and Confidential

Page 189

Using MSE

Commissioning with MSE in EMS

When you commission your


radio link
link, make sure your MSE
is small (-37dB)

Actual values may be read


-34dB to -35dB

Bigger values (-18dB) will


result in loss of signal

16
Proprietary and Confidential

Page 190

MSE and ACM


When the errors is too big, we need
a stronger error correction
(
)
mechanism (FEC)
Therefore, we reduce the number
of bits per symbol allocated for data
and re-assign the extra bits for
correction instead
For example
256QAM has
h greatt capacity
it but
b t
poor immune to noise
64QAM has less capacity but much
better immune for noise
ACM Adaptive Code Modulation
17
Proprietary and Confidential

Triggering ACM with MSE


When ACM is enabled, MSE values are analyzed on each side of the link
When MSE degrades or improves, the system applies the required
modulation per radio to maintain service
ACM 28MHz, MSE [-dB]:
Profile

Mod

QPSK

8PSK

16QAM

32QAM

64QAM

128QAM

256QAM

256QAM

Downgrade ACM Profile


10-6 Threshold when MSE reaches

6.9
11
13.3
18
20
24.4
25
28

10.4
14.5
16.8
21.5
23.5
27.9
28.5
31.5

18
Proprietary and Confidential

Page 191

Upgrade ACM Profile


when MSE reaches

11.9
16
18.3
23
25
29.4
30
33

Optimal
>30
>30
>30
>30
>30
>33
>35
>35

Triggering ACM with MSE


When ACM is enabled, MSE values are analyzed on each side of the link
When MSE degrades or improves, the system applies the required
modulation per radio to maintain service
ACM 56MHz, MSE [-dB]:
Profile

Mod

QPSK

8PSK

16QAM

32QAM

64QAM

128QAM

256QAM

256QAM

Downgrade ACM Profile


10-6 Threshold when MSE reaches

6.7
12
13.1
17 3
17.3
19.6
22.6
25
27.5

Upgrade ACM Profile


when MSE reaches

10.2
15.5
16.6
20 8
20.8
23.1
26.1
28.5
31

11.7
17
18.1
22 3
22.3
24.6
27.6
30
32.5

Optimal
>30
>30
>30
>30
>30
>33
>35
>35

19
Proprietary and Confidential

Triggering ACM with MSE


Lets analyze the figures in the table below (we shall focus on the last line):
1.
2.
3
3.
4.

When the radio is in optimal conditions, MSE is near -35dB


When MSE drops below -27.5dB, we will experience high BER
To avoid High BER we change the profile when MSE reaches -31dB
Now that the radio is @ profile 6, the MSE must improve to -32.5 to recover
high capacity (profile 7)

Profile

Downgrade ACM Profile


Modulation 10-6 Threshold when MSE reaches

QPSK

8PSK

16QAM

32QAM

64QAM

128QAM

256QAM

256QAM

6.7
12
13.1
17.3
19.6
22.6
25
27.5

Upgrade ACM Profile


when MSE reaches

10.2
15.5
16.6
20.8
23.1
26.1
28.5
31

5 dB security window
20
Proprietary and Confidential

Page 192

11.7
17
18.1
22.3
24.6
27.6
30
32.5

Optimal
>30
>30
>30
>30
>30
>33
>35

>35

ACM & MSE: Another approach


In this graph we refer to a 56MHz channel. It is easier to observe the
hysteresis of changing the ACM profile with respect to measured MSE.
As you can see,
see the radio remains @ profile 6 till MSE improves to -32.5dB:
32 5dB:
ACM
Profile
32.5
30

Profile7

Profile6

Profile5

Profile4Profile3Profile2Profile1Profile0

MSE

3128.526.123.120.816.6 15.510.2

21
Proprietary and Confidential

ACM & MSE: Another approach


When RF signal degrades and MSE passes the upgrade point (MSE @ red point), ACM will
switch back FASTER to a higher profile (closer to an upgrade point) when MSE improves.
When RF signal degrades and MSE does not pass the upgrade point (green point) ACM
waits
it till MSE improves
i
to
t the
th point
i t off nextt available
il bl upgrade
d point
i t (takes
(t k longer
l
time
ti
to
t
switch back to the higher profile).
ACM
Profile

32.5

Profile7

30

Profile6

Profile5

3128.526.1
22
Proprietary and Confidential

Page 193

MSE

Troubleshooting wrong modulation


When different settings of Modulation are set, MSE will be showing 99.99dB (Modulation Mismatch):

RSL = ~ (-45) dBm


MSE = -99.99 dB

RSL = ~ (-45) dBm


MSE = -99.99 dB

23
Proprietary and Confidential

Thank You

Page 194

Adaptive Code & Modulation (ACM)

FibeAir IP-10s Key Feature


IP-10 utilizes a unique Adaptive Coding & Modulation (ACM)
odu at o range:
a ge Q
QPSK
S - 256QAM
56Q
Modulation

Modulation changes to maintain link when radio signal degrades


Mechanism automatically recovers to max. configured modulation when
received signal improves

Optimized for mobile backhaul all-IP and TDM-to-IP migration


2

Proprietary and Confidential

Page 195

Adaptive Coding and Modulation


Utilize highest possible modulation considering the changing environmental
conditions

Hitless & errorless switchover between modulation schemes


Maximize spectrum usage - Increased capacity over given bandwidth
Service differentiation with improved SLA
Increased capacity and availability

Proprietary and Confidential

Adaptive Coding and Modulation

Voice & real time


services
Non-real time
services

Weak
FEC

Strong
FEC

When we engineer our services, we may assign certain services to


highest priority

Proprietary and Confidential

Page 196

ACM & SLA


When ACM is enabled and link degrades, highest priority services are
maintained
200Mbps
256QAM

Premium

112Mbps

32QAM

Silvver

128QAM

BestEffort

170Mbps

The above diagram shows an example when 28MHz is used


5

Proprietary and Confidential

IP-10 Enhanced ACM Support


8 modulation/coding working points (~3dB system gain for each point
change)

Hit-less and Error-less modulation/coding changes based on signal


quality
li

Throughput per radio carrier:


10 to 50 Mbps @ 7MHz Channel
25 to 100 Mbps @ 14MHz Channel
45 to 220 Mbps @ 28 MHz Channel
p @ 56 MHz Channel
90 to 500 Mbps

MSE is analyzed to trigger ACM


modulation changes
Zero downtime - A must for mission-critical services
6

Proprietary and Confidential

Page 197

IP-10 Enhanced radio capacity for Ethernet traffic


Intelligent Ethernet header compression mechanism (patent pending)
Improved effective Ethernet throughput by up to 45%
No affect on user traffic

Ethernet
packet size (bytes)

Capacity increase by
compression

64

45%

96

29%

128

22%

256

11%

512

5%

Proprietary and Confidential

IP-10 Native2 radio dynamic capacity allocation


Example: 28MHz channel bandwidth
Example
Modulation

32QAM

128QAM

256QAM

All Ethernet

112Mbps

170Mbps

200Mbps

20 E1s + Ethernet

20 E1s + 66Mbps

20 E1s + 123Mbps 20 E1s + 154Mbps

44 E1s + Ethernet

44 E1s + 10Mbps

44 E1s + 67Mbps

44 E1s + 98Mbps

66 E1s + Ethernet

66 E1s + 15Mbps

66 E1s + 47Mbps

75 E1s + Ethernet

Example
traffic mix

Proprietary and Confidential

Page 198

75 E1s + 25Mbps

Traffic Prioritization
When ACM is enabled and link degrades, there are 3 scenarios that might
apply based on the configuration
ScenarioI

ScenarioII

ScenarioIII
(Default)

1st Priority

TDMHighPriority

EthernetHighPriority

TDMHighPriority

2nd Priority

HighTDMover
EthernetHighPriority

HighEthernet
TDMHighPriority

TDM
TDMLowPriority

3rd Priority
P i it

TDM L P i it
TDMLowPriority

TDMLowPriority
TDM
L P i it
TDM

4th Priority

EthernetLowPriority

EthernetLowPriority

HighEthernet

over

over
Ethernett
Eth
Ethernet

Proprietary and Confidential

High TDM over High Ethernet Scenario I


In this scenario the QoS drops the traffic as
follows:
1. Ethernet traffic with low priority discarded first
ScenarioI
1st Priority

TDMHighPriority

2nd Priority

EthernetHighPriority

3rd Priority
P i it

TDM L P i it
TDMLowPriority

4th Priority

EthernetLowPriority

10

2. TDM trails with low priority discarded second


3. Ethernet traffic with high priority discarded
third
4. TDM High priority traffic is dropped according
to order of configuration

Proprietary and Confidential

Page 199

High Ethernet over TDM Scenario II


In this scenario the QoS drops the traffic as follows:
1. Ethernet traffic with low priority discarded first
2. TDM trails with low priority discarded second
3 TDM trails with high priority
3.
discarded third
4. Ethernet traffic
with high
priority
discarded last

ScenarioII

1st Priority

EthernetHighPriority

2nd Priority

TDMHighPriority

3rd Priority
P i it

TDM L P i it
TDMLowPriority

4th Priority

EthernetLowPriority

11

Proprietary and Confidential

Traffic Prioritization
In this scenario the QoS drops the traffic as
follows:
1
1. Ethernet traffic discarded first

ScenarioIII

2. TDM trails with low priority discarded second


3. TDM High priority traffic is dropped
according to order of configuration

12

1st Priority

TDMHighPriority

2nd Priority

TDMLowPriority

3rd Priority
P i it

Eth
Ethernet
t

Proprietary and Confidential

Page 200

(Default)

Traffic Prioritization - Configuration


Two parmeters required to be configured
1. The traffic priority scheme, as described earlier
2. High priority Ethernet BW amount, defines the portion of the High priority
Ethernet traffic (equivalent to CIR)

13

Proprietary and Confidential

ACM Working Boundaries


Link capacity is determined according to License and applied script
ACM Script consists of Channel BW, max. Capacity and Modulation
Highest modem script is applied using MRMC configuration window
When Automatic State Propagation is enabled, GbE (SFP) port can be
configured to shutdown when ACM is below a pre-defined script

14

Proprietary and Confidential

Page 201

Radio Capacity Calculation

Radio & PDH Capacity VS. Channel


Ethernet capacity (a.k.a. Ethernet L1 capacity) - Total bit rate from an
Ethernet user port. Taking into account the full Ethernet frame including the
IFG and
d preamble
bl fifields.
ld Eth
Ethernett capacity
it iis sometimes
ti
referred
f
d tto as ""portt
utilization rate".

Ethernet L2 capacity - Total bit rate of net Ethernet frames running over
the Ethernet user port. Taking into account the Ethernet frame without the
IFG and preamble fields.

Radio throughput
g p - Total bit rate supported
pp
by
y the radio link running
g in a
specific channel/modulation including radio frame overhead, etc.

16

Proprietary and Confidential

Page 202

Radio & PDH Capacity VS. Channel


(figures refer to ETSI + MAC Header Compression Enabled)

3.5 MHz
P fil
Profile

M d l ti
Modulation

Mi i
Minimum
M # off Ethernet
Max
Eth
t capacity
it
Eth
Ethernet
t L2
required capacity supported
(Mbps)
capacity (Mbps)
license
E1s
10
4
13.60
10.36
25
6
20.14
15.35

Frames per
F
seconds

2
4

16 QAM
64 QAM

Minimum
Max # of Ethernet capacity
Ethernet L2
required capacity supported
(Mbps)
capacity (Mbps)
license
E1s
QPSK
10
4
13 42
13.42
10 23
10.23
8 PSK
25
6
20.18
15.38
16 QAM
25
8
27.87
21.24
32 QAM
25
10
34.48
26.27
64 QAM
25
12
40.44
30.81
128 QAM
50
13
46.60
35.50
256 QAM
50
16
54.53
41.55
256 QAM
50
17
57.38
43.72

Frames per
seconds

20233.77
29974.03

R di
Radio
Throughput
(Mbps)
10.50
15.00

7 MHz
Profile

Modulation

0
1
2
3
4
5
6
7

17

19976 45
19976.45
30034.94
41475.26
51304.87
60175.21
69339.64
81151.77
85389.21

Radio
Throughput
(Mbps)
10 38
10.38
15.03
20.31
24.85
28.95
33.19
38.64
40.60

Proprietary and Confidential

Radio & PDH Capacity VS. Channel


(figures refer to ETSI + MAC Header Compression Enabled)

14 MHz
Profile

0
1
2
3
4
5
6
7

Modulation

Minimum
Number of Ethernet capacity
Ethernet L2
required capacity support E1s
(Mbps)
capacity (Mbps)
license
QPSK
25
8
28.90
22.02
8 PSK
25
12
40.90
31.16
16 QAM
50
18
60.36
45.99
32 QAM
50
20
70.35
53.60
64 QAM
50
24
81.78
62.31
128 QAM
100
29
98.43
74.99
256 QAM
100
34
115.15
87.73
256 QAM
100
37
124.52
94.87

Frames per
seconds
43001.18
60857.98
89823.89
104693.80
121693.09
146471.17
171347.98
185297.74

Radio
Throughput
(Mbps)
21.02
29.27
42.65
49.52
57.37
68.82
80.31
86.76

28 MHz
Profile

0
1
2
3
4
5
6
7
18

Modulation Minimum required Number of Ethernet capacity


Ethernet L2
capacity
it lilicense supportt E1s
E1
(Mb )
(Mbps)
capacity
it (Mb
(Mbps))
QPSK
8 PSK
16 QAM
32 QAM
64 QAM
128 QAM
256 QAM
256 QAM

50
50
100
100
150
150
200
200

17
23
33
44
55
68
76
80

57.86
77.86
111.32
150.76
187.55
228.81
254.71
268.45
Proprietary and Confidential

Page 203

44.08
59.32
84.81
114.87
142.90
174.33
194.07
204.53

Frames per
seconds
d
86099.43
115860.75
165648.63
224346.79
279093.55
340488.46
379034.79
399476.94

Radio
Throughput
Th
h t
(Mbps)
40.93
54.68
77.68
104.80
130.09
158.46
176.27
185.71

Radio & PDH Capacity VS. Channel


(figures refer to ETSI + MAC Header Compression Enabled)

40 MHz
Profile

Modulation

Minimum
Number of Ethernet capacity
Ethernet L2
required capacity support E1s
(Mbps)
capacity (Mbps)
license
QPSK
50
23
79 64
79.64
60 68
60.68
8 PSK
100
35
119.11
90.75
16 QAM
100
51
174.14
132.68
32 QAM
150
65
218.49
166.47
64 QAM
150
81
273.67
208.51
128 QAM
200
84
305.49
232.76
256 QAM
200
84
346.84
264.26
256 QAM
300
84
369.96
281.87

0
1
2
3
4
5
6
7

Frames per
seconds
118506 13
118506.13
177239.65
259136.72
325132.27
407254.05
454605.63
516135.41
550529.12

Radio
Throughput
(Mbps)
55 90
55.90
83.04
120.87
151.36
189.30
211.18
239.61
255.50

56 MHz
Profile

Modulation

Minimum
Number of Ethernet capacity
Ethernet L2
required
i d capacity
it supportt E1s
E1
(Mb )
(Mbps)
capacity
it (Mb
(Mbps))
license
QPSK
100
32
108.86
82.94
8 PSK
100
48
163.37
124.48
16 QAM
150
64
216.60
165.03
32 QAM
200
84
288.50
219.81
64 QAM
300
84
358.49
273.14
128 QAM
300
84
430.43
327.95
256 QAM
400
84
489.77
373.16
256 QAM
400
84
531.82
405.20

0
1
2
3
4
5
6
7
19

Frames per
seconds
d
161994.37
243116.10
322318.52
429314.58
533473.73
640527.34
728824.51
791403.86

Radio
Throughput
Th
h t
(Mbps)
75.99
113.47
150.06
199.50
247.62
297.08
337.87
366.78

Proprietary and Confidential

Radio & PDH Capacity VS. Channel - FCC


10MHz
ACM
Point

Modulation

# of
E1s

Ethernet
Capacity
(Mbps)

Modulation

# of
E1s

Ethernet
Capacity
(Mbps)

QPSK

13 18

QPSK

16

28 - 40

8 PSK

10

19 27

8 PSK

22

39 - 56
57 - 81

16 QAM

16

28 40

16 QAM

32

32 QAM

18

32 46

32 QAM

38

67 - 96

64 QAM

24

42 61

64 QAM

52

93 - 133

128 QAM

28

50 71

128 QAM

58

102 - 146

256 QAM

30

54 78

256 QAM

67

118 - 169

256 QAM

33

60 85

256 QAM

73

129 - 185

40MHz
Modulation

# of
E1s

Ethernet
Capacity
(Mbps)

ACM
Point

50MHz
Modulatio
n

# of
E1s

Ethernet
Capacity
(Mbps)

ACM
Point

Modulation

# of
E1s

Ethernet
Capacity
(Mbps)

QPSK
Q

22

39 - 55

QPSK

31

56 - 80

QPSK

37
3

65 - 93

8 PSK

35

62 - 89

8 PSK

46

82 - 117

8 PSK

59

105 - 150

16 QAM

52

93 - 133

16 QAM

69

122 - 174

16 QAM

74

131 - 188

32 QAM

68

120 - 171

32 QAM

84

153 - 219

32 QAM

84

167 - 239

64 QAM

80

142 - 202

64 QAM

84

188 - 269

64 QAM

84

221 - 315

128 QAM

84

164 - 235

128 QAM

84

214 - 305

128 QAM

84

264 - 377

256 QAM

84

185 - 264

256 QAM

84

239 - 342

256 QAM

84

313 - 448

256 QAM

84

204 - 292

256 QAM

84

262 - 374

256 QAM

84

337 - 482

Ethernet capacity depends on average packet size


20

ACM
Point

30MHz
ACM
Point

20MHz

Proprietary and Confidential

Page 204

Thank You

Page 205

Thispagewasintentionallyleftblank.

Page 206

1+1 HSB Protection

Agenda

WhatisProtection?
General Guidelines
GeneralGuidelines
ProtectionPanel
IntroductiontoExternalProtection
IntroductiontoShelfProtection
FloatingIP
EMSGUIConfiguration
External Protection Process: 1+1 from scratch
ExternalProtectionProcess:1+1fromscratch
ExternalProtectionProcess:Upgrading1+0to1+1
Troubleshooting

Proprietary and Confidential

Page 207

What is Protection?

A method of using one or more devices in a


standby mode in order to have a secondary
li k up when
link
h ffailure
il
occurred
d tto th
the active
ti lilink
k

In order to achieve a full protected link each


and every device should be protected

The number of multiplied devices depends on


the link importance

The process of keeping (something or someone) safe


Wikipedia.com

Everybody needs Protection

Proprietary and Confidential

General Guidelines
1. A Standby IDU is referred to as the Mate
2. When a switchover occurs, the Active IDU becomes Standby and the
Standby
Standby IDU becomes Active
Active
3. Accessing a Mate IDU can only be done via the Active IDU
4. Accessing the "Active" IDUs is achieved via unique IP addresses or via
Floating IP (supported only with IP-10G)
5. Y-Split cables must be used for Ethernet signals
6. ETH Cross Cable* (Protection Cable) is used to connect the protection ports
of both IDUs:
With IP-10 - use ports number 4
With IP-10G in a standalone mode use the dedicated PROT port
* Unless units are in chassis
4

Proprietary and Confidential

Page 208

External Protection
Achieved by using two standalone IDUs
The IDUs must be connected by an Ethernet Cross cable (dedicated protection ports)
Each
E h IDU mustt h
have a unique
i
IP address
dd
Protection for interfaces is done by:
E1 Y-Cable
GbE Optical Y-Cable
FE Y-Calbe

high

low

Coupler

Coupler

high

low

Proprietary and Confidential

Shelf Protection
When enabling a Shelf Protection, the following rules should be applied:
Shelf backplane replaces the external Protection Cable
Never insert or extract an IDU while powered up
Always secure IDUs to shelf enclosure with provided screws
Protection can be enabled in each pair (1+2, 3+4, 5+6)
IDU in slot 1 & 2 must have a unique IP address

6 Mate
Standalone

5 Active
Example:

4 Mate
4
Mate
Standalone

3 Active
2Mate

Standalone

1Active

Protected node
6

Unprotected site
Proprietary and Confidential

Page 209

Floating IP
The Floating IP address feature is meant to provide a single IP address that will
always give direct access to the current active main unit.
1.
2
2.
3.
4.

The Floating IP and Unique IDU IPs must be in the same subnet
The Floating IP and Unique IDU IPs are user
user-configurable
configurable
The Floating IP is copied from Active to Mate (following Copy to Mate command)
When Protection is applied, the Floating IP is assigned to the STBY IDU which
becomes the Active
5. The extension IPs are irrelevant (unseen by network)
6. OSS & NMS can access all IDUs (Main and Extension) via SNMP
7. Alternatively, users may access any of the units using their local IP addresses

IDU
192.168.1.100
IDU
192.168.1.75

192.168.1.72
192.168.1.71

IDU

Proprietary and Confidential

Configuring external 1+1 from scratch

Page 210

Configuring external 1+1 from scratch (1)


1. Set all IDUs to factory defaults
2. When IDUs complete
p
the booting
g sequence,
q
, verify:
y

All IDUs have the same HW version (same P/N)


All IDUs have the same SW version
All IDUs have the same license
Every IDU has unique IP address (within the same subnet)
Active and STBY have the same SW mode (Pipe / Managed / Metro)
All IDUs have the same Management mode (In band or OOB)
In case of In-Band, all IDUs have the same In-Band VID

Note:
The IDU, which is connected to the ODU fed by the lower
attenuation channel of the RF coupler, is the IDU that should be
selected as "Active.
9

Proprietary and Confidential

Configuring external 1+1 from scratch (1)


3. Install the first link (make sure radio is up)

ODU

ODU

4. Enable Protection on both IDUs (management will be lost for 60 sec)


5. Lock Protection on both IDUs (to avoid unnecessary switchover when second IDU is
enabled)
6. Install second IDU in each site (no need to configure it)

10

ODU

ODU

ODU

ODU
Proprietary and Confidential

Page 211

Configuring external 1+1 from scratch (1)


7. Enable protection in second IDU in each site
8. Connect ETH Cross Cable between both protection ports

ODU

ODU

ODU

ODU

9. Disconnect the MNG cables


10. Connect the PC to IDUs via ETH Y-Cable:
ODU

ODU

ODU

ODU

11

Proprietary and Confidential

Configuring external 1+1 from scratch (1)


11. Verify Active IDU shows Mates IP address
12. Verify there are no Mate Communication failures
13. Complete system setup by configuring Active IDU
14. In Active IDU: click Copy to Mate and verify Mate is restarting
15. Verify there are no Configuration Mismatch alarms
16. Unlock protection on Active IDUs
17. Initiate Manual Switchover / Forced Switchover: verify traffic is OK.

12

Proprietary and Confidential

Page 212

EMS GUI

EMS GUI
1. Configure unique IPs to slot 1 and slot 2 (when not in installed in shelf)
2. You may use a floating IP
3. Make sure all IPs are in the same subnet

14

Proprietary and Confidential

Page 213

EMS GUI

Select 1+1 HSB and then click Apply


The IDU will block management for 60 seconds to allow
setting up the correct mode (Active or STBY)
This action is not traffic effective
effective.

15

Proprietary and Confidential

EMS GUI

Protection
mode
status

When2nd IDUis
properly
configuredand
connected,IP
andMACare
displayedhere

16

Proprietary and Confidential

Page 214

EMS GUI

Clickheretocheck
communication
withSTBYunit

17

Proprietary and Confidential

EMS GUI

AdminStateLock

Toforceaswitchover
regardlessto2nd IDU
qualifyingstatus
changetoONandclick
Apply

18

Proprietary and Confidential

Page 215

EMS GUI

Torequestaswitchover
clickhere.
If2nd IDU(Mate)doesnotqualifytoActivestate,
requestisignored.

19

Proprietary and Confidential

EMS GUI

Clickheretocopytheconfigurationfrom
ActivetoMate
Pleasenote
Thefollowingparametersarenot copied:
MNGmode(InBand/OOB)
InBandVLAN
In Band VLAN
Switchmode
license

20

Proprietary and Confidential

Page 216

Upgrading (1+0) to (1+1)

Upgrading (1+0) to (1+1)


1. Assuming 1st link operates well, configure the 2nd IDUs to match Active IDUs:

2nd IDUs has the same HW version as Active IDU


2nd IDU has the same SW version as Active IDU
2nd IDU has the same license as Active IDU
2nd IDU has unique IP address (different than Actives IP)
2nd IDU has the same switch mode as Active IDU
2nd IDU has the same Management mode (In band or OOB)
In case of In-Band, 2nd IDU has the same In-Band VID as Active IDU
2nd IDU is configured with the same radio parameters as Active IDU
Mute transmission on 2nd IDUs

Active Link:
ODU

ODU

ODU

ODU

Standby Link (not connected)

22

Proprietary and Confidential

Page 217

Upgrading (1+0) to (1+1)


2. Enable Protection on Active IDUs (management will be lost for 60 sec)
3. Lock Protection on both Active IDUs ((to avoid unnecessaryy switchover when 2nd IDU is
enabled)
4. Install 2nd IDU in each site (verify TX is muted before physical installation)

ODU

ODU

ODU

ODU

23

Proprietary and Confidential

Upgrading (1+0) to (1+1)


5. Enable protection in 2nd IDU in each site
6. Connect ETH Cross Cable between both protection ports

ODU

ODU

ODU

ODU

7. Disconnect the MNG cables.


8. Connect the PC to IDUs via ETH Y-Cable

24

Proprietary and Confidential

Page 218

Configuring external 1+1 from scratch (1)


9. Verify Active IDU shows Mates IP address
10. Verify there are no Mate Communication failures
11. Complete system setup by configuring Active IDU
12. In Active IDU: click Copy to Mate and verify Mate is restarting
13. Verify there are no Configuration Mismatch alarms
14. Unlock protection on Active IDUs
15. Initiate Manual Switchover / Forced Switchover: verify traffic is OK.

25

Proprietary and Confidential

1+1 With Diversity

Page 219

Using Space Diversity


Two are better than One

As the equipment is doubled, we can use


the standby unit to receive the signal as
wellll

The baseband signal, after demodulation,


is transferred to the active IDU

The active IDU decides whether to use is


own signal or the signal received by the
standby unit

Valid only in a shelf installation

27

Proprietary and Confidential

Space Diversity
IDU 1 is active and IDU 2 is standby
IDU A is active and IDU B is standby
Both
B th IDU A and
d IDU B receives
i
th
the signal
i
l off IDU 1
IDU B demodulates the signal and transfer the bits to IDU A
IDU A decides whether to use the bits arrived from IDU B or is own received
demodulated bits

IDU 1

IDU A
ODU

ODU

ODU

ODU

IDU 2

28

IDU B

Proprietary and Confidential

Page 220

Frequency Diversity
IDU 1 is active and IDU 2 is standby
Both IDU transmit on, each one on different frequency
IDU A receives
i
signal
i
l off IDU 1 and
d IDU B receives
i
signal
i
l off IDU 2
IDU B demodulates the signal and transfer the bits to IDU A
IDU A decides whether to use the bits arrived from IDU B or is own received
demodulated bits

IDU 1

IDU A
ODU

ODU

ODU

ODU

IDU 2

29

IDU B

Proprietary and Confidential

Line Protection

Page 221

Line Protection
Enables protection on the line interfaces (both Ethernet and Trails)
Protects both Electrical and Optical Ethernet interfaces
Line protection is Suitable for Multi-Radio (2+0) links
When using electrical GbE Multi Unit LAG should be used
For Ethernet traffic the link is 2+0
For TDM traffic the link is 1+1

31

Proprietary and Confidential

FibeAir IP-10G/E
Highly flexible redundancy options
Full protection
using splitter +LAG
(For switch mode)

HW protection with Single interface


using optical splitter

2+0/1+1

2+0/1+1

2+0/1+1

GE

GE
Optical
splitter

Full protection
using Multi-Unit LAG
(For Smart-pipe mode)

GE

GE

GE

GE

Optical
splitters
Static
LAG

Static
LAG

Switch/Router

Switch/Router

Switch/Router

Flexible Line protection, completely independent from Radio


configuration
32

Proprietary and Confidential

Page 222

IP-10G/E Multi-Unit LAG


IDU/Radio protection with dual (redundant) GE interface
2+0/1+1

Dual (redundant) GE/FE (Optical or Electrical) interfaces


to the Switch/Router

One GE/FE interface is connected to each of the IP-10G/E units


Both interfaces are active/enabled
GE
GE
Static Link Aggregation Group (or equivalent) needs to be
configured on the Switch/Router interfaces connected to
Static
LAG
the IP-10G/E units
GE/FE Interfaces towards the Switch/Router on both
active and backup IP-10Q units are active
Switch/Router
In 2+0MR any failure detected in radio link (RFU or remote side)
will trigger graceful degradation and will be transparent
to the Switch/Router
Only in case of IP-10G/E unit failure (active or standby) the connected GE/FE interface
will be disabled.

For Smart-pipe mode only


Proprietary and Confidential

Troubleshooting Protection
Common issues followed by CLI commands

Page 223

Troubleshooting
Alarm / Error

Protection LED is on (RED)

Probable Cause / Workaround


1.
2.
3.

Protection cable is not connected


ETH straight cable is connected instead of crosscable
One of the 2 IDUs is not configured in Protection

Current Alarms show Configuration


Mismatch alarm

Check CFG of both IDUs: HW, SW, switch mode,


management mode, In Band VID
Initiate Copy to Mate in Active IDUs

I cannot PING the STBY unit.

This is normal behavior, Mate cannot be accessed


directly, only via Active IDU

Main IDU does not respond to PING

C commands to verify
f this IDU is in S
STBY mode, iff
Use CLI
so, use CLI to recover IDU

Current Alarms shows Mate Comm.


Failure alarm

Check the current alarms of STBY IDU


Report back to Ceragon Support
Replace STBY unit
Replace Active unit

35

Proprietary and Confidential

Troubleshooting Useful CLI Commands


General commands:
lsp
ls
cls

prints executable commands in current directory


prints available child
child-directories
directories
clears screen

To execute Protection commands, you will need to change directory:


IP-10:/> cd platform/mate-idu
Then to read current status of IDU
Then,
IDU, type the following (in blue):
IP-10:/platform/mate-idu> get protection-mode
The system return these values:
1. Active
2. Standby
36

Proprietary and Confidential

Page 224

Troubleshooting Useful CLI Commands


To change Protection Admin mode, type the following:
IP-10:/platform/mate-idu> set protection-admin

<enable/disable>

To lock the current protection mode, type the following:


IP-10:/platform/mate-idu> set protection-lockout

<on/off>

To change Space Diversity mode


mode, type the following:
IP-10:/platform/radio-diversity> set radio-diversity-mode <none/space-diversity>

37

Proprietary and Confidential

Troubleshooting Useful CLI Commands


To force a switchover, type the following:
IP-10:/platform/mate-idu> set protection-force-switch <on/off>

To request a manual switchover, type the following:


IP-10:/platform/mate-idu> manual-switch-cmd

To initiate a Copy-to-Mate process, type the following:


IP-10:/platform/mate-idu> copy-to-mate-cmd

38

Proprietary and Confidential

Page 225

Thank You

Page 226

Cross Polarization Interference Cancellation (XPIC)

Introduction

Page 227

Introduction
Two data channels are transmitted & received over the same frequency on dual
polarization (H & V)
C
Crosstalk
t lk between
b t
the
th polarizations
l i ti
d
due tto iimperfect
f t antenna
t
iisolation
l ti and
d
channel degradation can be effectively cancelled at the receiver using XPIC Cross Polarization Interference Cancellation/Canceller
A

Ideal solution for frequency- crowded areas


Using one frequency for two carriers
V
H
3

Proprietary and Confidential

Decoding the received signal


Both IDUs on each site communicate through the Backplane of the Nodal
Enclosure

Nodal Enclosure

Nodal Enclosure

Proprietary and Confidential

Page 228

fx

Decoding the H signal


Each IDU accommodates 2 modems (Master and Slave)
In each site, the Main IDU communicates with the Mate IDU via the backplane
The Master modem (V) sends its signal (V) to the Mate Slave
The Mate Slave pproduces the interference signal
g
((v)) and sends it to its H-Master

Transmitter

H+v HMaster

Mate IDU

backplane

HMaster

Receiver

Slave

Slave

Slave

Slave

Main IDU

VMaster

V+h VMaster

backplane

Proprietary and Confidential

Decoding the H signal - continued


By knowing the interference level (v), the Master Modem (H) can demodulate the
received horizontal signal (H)

The vertical channel is decoded similarly

Transmitter

H+v HMaster

Mate IDU

Slave

Slave

Slave

Slave

VMaster

V+h VMaster
Proprietary and Confidential

Page 229

backplane

Main IDU

backplane

HMaster

Receiver
H

Guidelines
1. XPIC is supported with IP-10G IDUs in version 6.6.1 and higher
2. XPIC can only be configured in a node:
slots 1+2 and/or slots 3+4 and/or slots 5+6
3. IDU license determines the allowed script and link capacity
4. Identical configuration should be used in all IDUs participating in a link:

XPIC Script
Frequencies
SW version (IDU, ODU)
HW version (IDU, ODU)
Protection is disabled

If any of these conditions is not met, an


alarm will alert user. In addition, events will
inform user of which conditions are not met.

Proprietary and Confidential

XPIC Recovery Mechanism


The main purpose of the Recovery Mechanism is to recover link availability
due to hardware problem rather than fading issues

The recovery mechanism maintains a working link while attempting to recover


the faulty polarization

The mechanism applies periodic attempts to mute the problematic remote


transmitter

The time between one attempt and another is exponentially increased to


avoid unnecessary TX Mute when interference is temporary (allowing
sufficient to recover)

At the end of the process, if the problem still exists, the problematic link will
be permanently muted unless the user manually un-mutes it

Proprietary and Confidential

Page 230

XPIC Recovery Mechanism


The indication to entry the recovery mechanism is a loss of modem
preamble lock, which takes place at SNR~10dB

The number of Mute/Un-mute attempts is user-configurable:


1.Recovery attempt time
2.Initial time between attempts
3.Multiplication factor for attempt time
4.Number of retries
5.Enable / Disable
Users are advised to maintain Factory Defaults

Please Note:
Every recovery attempt will cause a brief traffic hit in the working link
9

Proprietary and Confidential

2+0 2U Setup
2 IDUs are installed in each node using an enclosure shelf
We assume slot 1 is using Vertical polarization and slot 2 Horizontal polarization

V+h
Each node includes
h/v

2 x RFU-C
Coupler
Dual pole antenna

H+v

10

v
Proprietary and Confidential

Page 231

6+0 6U Setup
6 IDUs are installed in each node using enclosure shelves
Possible configurations:
Sl
Slott 1 + slot
l t2
Slot 3 + slot 4
Slot 5 + slot 6

11

Proprietary and Confidential

Multi-Radio Configuration

Page 232

What is Multi-Radio?
Allows splitting traffic from one Ethernet port
into two links in a 2+0 configuration

Multi-Radio saves the need to have an


external device to combine traffic from two
Ethernet ports in order to reach beyond
567Mb
The 2+0 configuration can be either XPIC or
different frequencies

13

Proprietary and Confidential

How Does it Work?


Every byte is transmitted either over the master or the slave
The distribution is proportional to the available bandwidth in every link
If both links have the same capacity, half the data is sent through each

link
If the links use different modulations, data is distributed proportionally in
order to maximize the available bandwidth
If the links have different capacity, data is distributed proportionally in
order to maximize the available bandwidth

Slave

Slave

Master

Master

14

Proprietary and Confidential

Page 233

EMS Configuration

Logging in

Extension
Main

1. Log in to the EMS


2. Execute the following steps to Main IDU and
E t
Extension
i IDU on b
both
th ends
d off th
the lilink
k

3. When configuring an IDU, make sure the relevant


unit is selected (a black line will highlight selected IDU)

16

Proprietary and Confidential

Page 234

Versions
Check that your IDUs and ODUs are installed with the required version
(6.6.1 or higher)

17

Proprietary and Confidential

XPIC Script
Apply the required script to both IDUs (Main & Ext.) on both ends:
1. Expand the + icon next to the script in the MRMC Table
2 Click the Apply
2.
Apply button
3. IDU will automatically restart to apply the new script

18

Proprietary and Confidential

Page 235

XPIC Script - 2
When IDUs complete the reset process, verify XPIC script is successfully
assigned.

19

Proprietary and Confidential

XPIC Configured
Verify Main View in GUI shows

20

icon next to IDUs

Proprietary and Confidential

Page 236

Radio Parameters
1. Verify that no alarms exist in the system.
2. Clear the defected blocks counter and verify that there are no errors in the
system.

3. Read the MSE and XPI and verifyy that theyy fit the link design
g ((if no values
are defined, verify that they are below -34dB and above 25dB, respectively).

21

Proprietary and Confidential

Radio Parameters scroll down to bottom of page


Configure Radio Parameters and verify both links (H+V) are operational

22

Proprietary and Confidential

Page 237

Troubleshooting

Link Commissioning
1. Make sure IF Cables are identical in length (H and V)
2. Commission the H link as a single link system with V channel muted,
verify RSL and MSE are as expected

3. Commission the V link as a single link system with H channel muted,


verify RSL and MSE are as expected

4. Check stability of RSL readings


5. Upon confirming the above steps, proceed to configure XPIC as explained
in previous slides

24

Proprietary and Confidential

Page 238

Improving XPI Levels


When XPI levels < 25, antenna feeders need to be re-aligned.
One of the parameters that impacts the XPI is the antenna XPD
(Cross Polarization Discrimination)

In the following steps, we shall measure the antenna XPD to determine the
XPD of each antenna
1.
2.
3.

Mute H transmitters on both ends: H link is irrelevant now


Measure RSL on H receivers: we measure the v interference now
Measure RSL on V receivers calculate the difference between V and H

TX = OFF
In this example, the XPD is
not good enough:
The difference is only 20dB
We need to aim for a bigger
difference (better XPI)

TX = OFF

RSL = -70dBm
70dBm

RSL = -50dBm
H
v

25

H
v

Proprietary and Confidential

Improving XPI Levels


4. Re-align the antenna feeders to read a bigger difference:

RSLH RSLV > 25dB


5. Un-mute the H transmitters
6. Repeat steps 1-4 for the V link
TX = OFF
In this example, the XPD is
much better:
The difference 28dB
That means, XPI = 28dB
26

TX = OFF

RSL = -78dBm
78dBm

RSL = -50dBm
H
v
Proprietary and Confidential

Page 239

H
v

XPIC Events (EMS Event Log)


During the XPIC mechanism, events are displayed in the EMS Event log to
allow detailed description and effective troubleshooting

Various cases are encoded as a single event with a bitmask code


Event title = Insufficient conditions for XPIC
Bitmask Codes -

27

Proprietary and Confidential

XPIC Events (EMS Event Log)


The following events indicate changes in the XPIC state:

28

Remote TX Mute (try # n) was Set by XPIC Recovery on Slot # n


Remote TX Un-mute (try # n ) was Set by XPIC Recovery on Slot # n
XPIC Recovery Started on Slot # n
XPIC Recovery Finished Successfully on Slot # n
XPIC Recovery Finished Unsuccessfully on Slot # n. Remote Mute was Set
XPIC Recovery on Slot # n Stopped Due to an External Event
XPIC Recovery (XRSM) was disabled
XPIC Recoveryy (XRSM)
(
) was enabled

Proprietary and Confidential

Page 240

XPIC Events (EMS Event Log) - Example

29

Proprietary and Confidential

XPIC Performance Monitoring

30

Proprietary and Confidential

Page 241

Thank You

Page 242

2+2 HSB Protection

2+2 Protection Agenda


1.
2.
3
3.
4.
5.
6.

Topology scheme
Setup scheme
Configuration
Operation
Maintenance
XPIC & 2+2

Proprietary and Confidential

Page 243

2+2 HSB XPIC - Topology Scheme

STBY

STBY

Active Pair

Active Pair

Proprietary and Confidential

2+2 HSB XPIC - Setup Scheme

STBY

STBY

fL

fH

fL

fH

H
V

fL
H
V

H
V
Active Pair

Active Pair

fH
fH

fL

Proprietary and Confidential

Page 244

2+2 Configuration
The 2+2 configuration consists of two pairs of IDUs, Each pair is an 2+0 link
(can be in XPIC configuration or in different frequencies).
The two pairs are inserted into separate chassis and are connected by a
protection cable between the main IDUs in slot #1 only.
Protection is performed between the pairs - at any given time one pair is
active and the other is stand-by.

STBY

Active

Proprietary and Confidential

2+2 Configuration
For this configuration we define the following terminology:
1. Master unit ((lower IDU in each pair):
p ) in a pair
p belonging
g g to a 2+2 configuration,
g
a unit
which is responsible for the following:
Sending/receiving traffic from/to user through line interfaces
Receiving protection information from mate (slave)
Sending/receiving protection information to second master at any one time
one master is decision and the other is report.
2. Slave unit (upper IDU in each pair):
Sending/receiving traffic from/to user through line interfaces
Sending protection information to mate in shelf (master)
Slave
Sl
units
it always
l
b
behave
h
as report
t (are
(
ttold
ld b
by master
t whether
h th tto b
be active
ti
or stand-by)

Proprietary and Confidential

Page 245

2+2 Configuration
The 2+2 configuration is possible
only between the units in the
main backplane in each shelf
(slots 1-2).
1-2)
Using the other IDUs in the
shelves (slots 3-6) is not
supported.

Proprietary and Confidential

2+2 Configuration
When a new 2+2 protection mode is defined
A system may either be in 1+1, 2+2 or protection disabled. The configuration
is separate in each of the four units
units, and user should configure all four units to
2+2.
In order to switch from 1+1 to 2+2 the system must go through protection
disabled. The following table summarizes the possible changes between the
configurations:
Origin

ProtectionDisabled

1+1HSB

2+2HSB

Disabled

NoResetis required

Slot#1 NoResetis required


Slot#2 Resetisrequired

NoResetis required

1+1HSB

Slot#1 NoResetis required


Slot#2 Resetisrequired

NoResetis required

Blocked

2+2HSB

NoResetis required

Blocked

NoResetis required

Proprietary and Confidential

Page 246

2+2 Configuration
All the conditions for 1+1 HSB protection apply for 2+2 as well (between
master units)
While in 2+2 mode,
mode all commands and configurations available for 1+1
protection are available as follows:
o Locking, forcing protection is done from master units only
o Copy to mate operation is available separately in master units and slave units

Proprietary and Confidential

2+2 Operation
The principles of 2+2 operation are an extension of 1+1 protection:
The same criteria (interfaces LOS, LOC, LOF) are monitored and compared
between active and stand-by units (Comparing is carried out by master units)

All enabled interfaces of all four IDUs are monitored


A missing slave unit is interpreted as LOS in its interfaces. A missing master
is a no mate condition During 2+2 operation

10

Proprietary and Confidential

Page 247

2+2 Maintenance
The following procedures are relevant when changing units in a 2+2 node:

Replacing slave units (extensions)

1. Protection lockout to the Master-active.


2. Insert new unit.
3. Power it up.
4. Enable protection 2+2 HSB.
5. Copy to Mate
6. Connect the ODU to relevant Eth, PDH/SDH Y-cables/fibers.

11

Proprietary and Confidential

2+2 Maintenance
The following procedures are relevant when changing units in a 2+2 node:

Replacing a STBY Master unit

1. Protection lockout to the Master-active.


2. Set to default the new card in SA mode.
3. Reset.
4. Configure same management type (in/out of band), management VLAN and Ethernet
application.
5. Insert the unit.
6. Power
6
o e itt up
up.
7. Connect the protection cable.
8. Enable protection 2+2 HSB.
9. Copy2mate.
10. Connect the ODU to relevant Eth, PDH/SDH Y-cables/fibers.

12

Proprietary and Confidential

Page 248

XPIC & 2+2 Protection


2+2 XPIC is a common application.
Since these two are unrelated mechanisms, a number of safeguards have
been put in place to assure their proper operation in tandem
tandem.
When configured as 2+2, the XPIC recovery mechanism is disabled.
The reason for this is that in case of a failure in a link, the system will switch to
the stand-by pair instead of attempting to recover the link, as done in 2+0
XPIC.
Additionally,
y in order to assure that the conditions for XPIC exist (in
( p
particular
having the same radio script and frequencies), the following mechanisms are
active in a 2+2 configuration:

13

Proprietary and Confidential

XPIC & 2+2 Protection


The following parameters can be changed only at the master unit; they will be
automatically changed at the slave unit accordingly:
Radio script
Radio TX frequency
Radio RX frequency

Should the change at the slave unit fail for any reason, the change at the
master will be rolled back and user will be given an error message.

14

Proprietary and Confidential

Page 249

Thank You

Page 250

EMS Performance Monitoring

Agenda
General Information
Faults:
Current Alarms
Alarm Editing
Event Log

PM & Counters:
Remote Monitoring
TDM Trails
TDM interfaces
Radio
R di (RSL
(RSL, TSL
TSL, MRMC and
d MSE)
Radio TDM
Radio ETH
XPI

Proprietary and Confidential

Page 251

General Information
Maximum frame length:
1632 bytes for all Ethernet traffic interfaces
WSC interface is limited to 1628 bytes

Dynamic allocation:
Radio bandwidth (which may vary in ACM) is automatically allocated in the following
order:
1.High-priority TDM trails
2.Low-priority TDM trails
3.Ethernet traffic

For this mechanism to work properly, each TDM trail in both sides of a link
should be associated with the same p
priority.
y
Overhead bytes:
Proprietary frame is constructed to transport the ETH and TDM (E1/DS1) traffic.
Frame size depends on the system type (capacity).
The frame consists 18 bytes for overhead, and bytes for Ethernet and E1/DS1s
payload.
3

Proprietary and Confidential

EMS Main View


Access application via IP address

User friendly navigation menu

Proprietary and Confidential

Page 252

EMS Main View


Graphical MENU: Click to configure

Proprietary and Confidential

EMS Main View

Protection Status Display & Quick Access


Icons

Proprietary and Confidential

Page 253

EMS Main View


In this example slot #1 and slot #2 are configured to support 1+1 Protection
Slot #1 is selected and in Active mode.

Black Rectangular to indicate selected slot


for configuration

Proprietary and Confidential

EMS Main View


When the user selects Slot 2 the GUI updates automatically

Proprietary and Confidential

Page 254

Faults Current Alarms


The Current Alarms window shows collapsed list of alarms
By expanding a line we can see additional information:
Probable cause
Corrective Actions

Proprietary and Confidential

Editing Alarms
For Any Alarm in the system it possible to change
Description
Severity
In order to do so
Go to /management/mng-services/alarm-service
Type edit-alarm <Alarm Identifier> <description | Severity> <New Value>

10

Proprietary and Confidential

Page 255

Faults Event Log


The Event Log shows max. 200 lines of events
When Event #201 occurs, Event #1 is erased and #201
is logged as #200.

Proprietary and Confidential

Available PM Statistics - Radio


TDM PM
(allocated E1/T1 VCs)
TDM
(E1/T1)

ETH PM (Data + In-Band):


1. Aggregated Errors
2. Throughput
3. Capacity
4. Radio Link Utilization
5. RMON standard is
implemented
p
as well to
provide detailed data
ETH BW is a function of
available radio capacity as TDM
and STM-1 have higher priority

12

STM1

STM-1 PM
When STM-1 T-Card
is inserted in front
panel))
p

Radio Signal PM:


1. RSL
2. MSE
3. MRMC (ACM)
4. Aggregate
Proprietary and Confidential

Page 256

Available PM Statistics Line Interfaces

STM-1 interface facing customer equipment


TDM interfaces facing
g customer equipment
q p
End-to-End Trails

13

Proprietary and Confidential

Clearing previous data


To erase all IDU PM data, click the CLEAR button -

14

Proprietary and Confidential

Page 257

ETH PM RMON
The system supports Ethernet statistics counters (RMON) display (depends on
port availability). The counters are designed to support:
RFC 2819 RMON MIB.
RFC 2665 Ethernet-like MIB.
RFC 2233 MIB II.
RFC 1493 Bridge MIB.

15

Proprietary and Confidential

ETH PM RMON

16

Proprietary and Confidential

Page 258

PM RMON Special Registers


RMONregister /Counter

Description

Undersizeframesreceived

Framesshorterthan64bytes

Oversize frames received


Oversizeframesreceived

Frames longer than 1632 bytes


Frameslongerthan1632bytes

Jabberframesreceived

Totalframesreceivedwithalengthofmorethan1632bytes,
butwithaninvalidFCS

Fragmentsframesreceived

Totalframesreceivedwithalengthoflessthan64
bytes,andaninvalidFCS

Rxerrorframesreceived

TotalframesreceivedwithPhyerror

FCSframesreceived

TotalframesreceivedwithCRCerror,notcounteredin
"Fragments",
Fragments ,"Jabber"
Jabber or
or "Rx
Rxerror
error"counters
counters

InDiscardFrames

Countsgoodframesthatcannotbeforwardeddueto
lackofbuffermemory

InFilteredFrames

Countsgoodframesthatwerefilteredduetoegress
switchVLANpolicyrules

Pauseframesreceived

Numberofflowcontrolpauseframesreceived

17

Proprietary and Confidential

Troubleshooting with RMON: Filtering Example

Radio port is a
member of VID 100

Radio port is a
member of VID 100

Site A
Tagging

Untagged Frames
Tagged with default
VID 100

Site B

No membership

Access port with


default VID = 300

Site B Ingress port (Radio) receives the frame and checks the Egress port VID
membership
Egress port default VID is 300, therefore frame is filtered by the remote Radio port
18

Proprietary and Confidential

Page 259

Troubleshooting with RMON: Oversized frames


Site A
T

Site B
T

Tagged Frames with


frame size > 1632 bytes

When ingress frames exceed the maximum frame size, RMON counter Oversized frames
received is updated accordingly

19

Proprietary and Confidential

Troubleshooting with RMON: Discarding Example


Site A
T

Site B
T

Ingress traffic does not


comply to Policer rules

Discarding Examples:
Ingress rate > Rate Limiter
Ingress frames do not qualify to Policer rules
20

Proprietary and Confidential

Page 260

Troubleshooting with RMON: Monitoring specific


traffic types
Site A

Site B
Rate Limiter

Monitor

Video streams are generally transmitted over UDP


with multicast addresses
To monitor traffic, check out the Multicast Frames
Received register
To limit MC traffic, assign a Policer with a UDP & MC
CIR rules

21

Proprietary and Confidential

PM TDM Trails

Trails can only be configured in the Main


IDU/Slot #1
Extension Trails (trails via extension IDU)
are also configured in the Main IDU
TDM Trail PM can only be viewed in the
Main IDU menu
The number of trails that can be
configured is a function of available radio
BW (license + script)

22

Proprietary and Confidential

Page 261

PM TDM Trails

23

Proprietary and Confidential

PM TDM Trails In Detail


Errored Second (ES):
A one-second period with one or more errored blocks or at least one defect

24

Proprietary and Confidential

Page 262

PM TDM Trails In Detail


Severely Errored Second (SES):
A one-second period, which contains 30% errored blocks or at least one
defect.
defect
SES is a subset of ES.

25

Proprietary and Confidential

PM TDM Trails In Detail


A period of unavailable time begins at the onset of 10 consecutive Severely
Errored Second (SES) events. These 10 seconds are considered to be part of
unavailable time.
A new period of available time begins at the onset of 10 consecutive non-SES
events. These 10 seconds are considered to be part of available time.

26

Proprietary and Confidential

Page 263

PM TDM Trails In Detail


Background Block Error (BBE):
An errored block not occurring as part of a SES.

27

Proprietary and Confidential

PM TDM Trails In Detail


Number of Switches (only relevant for Protected SNCP Trails):
The number of times the IP-10 switched from Primary Path to Secondary Path
and vice versa (per 15min or 24hrs interval)

Proprietary and Confidential

Page 264

PM TDM Trails In Detail


Active Path Seconds (only relevant for Protected SNCP Trails):
The number of times seconds the Active Path was available

Proprietary and Confidential

PM TDM Trails In Detail


Integrity:
Indicates whether information is reliable for analysis (ticked) or not
For example if clock was changed or system was restarted during this interval
then information is not reliable

30

Proprietary and Confidential

Page 265

PM TDM Trails through Radio

31

Proprietary and Confidential

PM E1 / DS-1 (PM received from customer)


This PM data
relates to the
TDM Line
Interfaces.
Interfaces

32

Proprietary and Confidential

Page 266

PM STM-1 (Slot #2)

33

Proprietary and Confidential

PM Radio - RF
Signal Level RSL & TSL analysis
Allows setting RSL & TSL thresholds
EMS will notify when signal exceeds THSLD
>> Easier maintenance

Aggregated radio traffic analysis


MRMC PM related to ACM:
Associated Script
Available Bit rate
Available Radio VCs
MSE analysis (quality of received signal)
XPI analysis (when XPIC enabled)
34

Proprietary and Confidential

Page 267

PM Radio Signal Level Using Threshold

- 40dBm = Nominal RSL for an operational Link


Level 1: 25 sec
Level 2: 15 sec
900 sec = 15min Interval
35

Proprietary and Confidential

PM Radio Signal Level - Using Threshold


Using graphical display of the THSLD analysis allows us easier
examination of the RSL & TSL state throughout certain period of time

RSL
-40

-50
-68
T [sec]

-99
10

36

Proprietary and Confidential

Page 268

10

PM Radio - Aggregate
Aggregated radio
traffic analysis

37

Proprietary and Confidential

PM Radio - MRMC
The information displayed in this page is derived from the license and script
assigned to the radio.
When ACM is enabled and active,
active as link quality degrades or improves
improves, the
information is updated accordingly.

38

Proprietary and Confidential

Page 269

PM Radio - MRMC

39

Proprietary and Confidential

PM Radio - MSE
The information
displayed in this page
is derived from the
license and script
assigned to the radio.
When link quality
degrades or
improves, the MSE
reading is updated
accordingly.
Differences of 3dB
gg ACM
trigger
modulation changing.
Threshold can be
configured as well for
easier maintenance.
40

Proprietary and Confidential

Page 270

PM Radio - XPI

Use this report to evaluate the cross-polarization


interference
Apply a threshold to establish a better notification
41

Proprietary and Confidential

PM Radio - Ethernet
Frame Error Rate (%) measured on radio-Ethernet
interface (port 8)
Ethernet Capacity (a.k.a. Ethernet L1 capacity) - Total
bit rate from an Ethernet user port. Taking into account
the full Ethernet frame including the IFG and preamble
fields. Ethernet capacity is sometimes referred to as
"port utilization rate".
Radio Throughput - Total bit rate supported by the
radio link running in a specific channel/modulation
including radio frame overhead, etc.
Utilization (%) is displayed as one of five bins:
0 20% 20-40%,
0-20%,
20 40% 40-60%,
40 60% 60-80%,
60 80% 80-100%
80 100%
Ethernet throughput & Capacity PMs are measured by
accumulating the number of Ethernet octets every
second
Accurate analysis requires accumulating a full interval
(15min/24hrs)
42

Proprietary and Confidential

Page 271

PM Ethernet Frame Error Rate

43

Proprietary and Confidential

PM Ethernet Throughput

44

Proprietary and Confidential

Page 272

PM Ethernet Capacity

45

Proprietary and Confidential

PM Ethernet Utilization

46

Proprietary and Confidential

Page 273

Throughput / Capacity / Utilization


To better understand these terms, we shall examine the Ethernet tagged frame full
structure:
A frame viewed on the actual physical wire would show Preamble and Start Frame
Delimiter,, in addition to the other data (required
( q
by
y the p
physical
y
hardware).
)
However, these bits are stripped away at OSI Layer 1 by the Ethernet adapter before
being passed on to the OSI Layer 2 which is where data is detected.

Pre.

7octets

SFD

1octet

DA

SA

6octets 6octets

VLAN

4octets

ETH Type
/Length

2octets

Payload+
Padding

CRC

461500 4octets
octets

Interframe
Gap

12octets

DataRate:min.64 octets max.1522octets


Physicalwirerate:min.84octets max.1542octets
47

Proprietary and Confidential

Throughput / Capacity / Utilization


Pre.

7octets

SFD

1octet

DA

SA

6octets 6octets

VLAN

4octets

ETH Type
/Length

2octets

Payload+
Padding

CRC

461500 4octets
octets

Interframe
Gap

12octets

DataRate:min.64 octets max.1522octets


Physicalwirerate:min.84octets max.1542octets

In case we use a 64 bytes frame:


Throughput (Data rate) = ~ 77% of physical transmitted rate
Stripped bits = ~ 23% of physical transmitted rate

(64/84=0.77)
(20/84=0.23)

Hence, when we transmit 100Mbps, the actual throughput would be 77 Mbps


48

Proprietary and Confidential

Page 274

Throughput / Capacity / Utilization


Throughput = 77 Mbps

Radio Capacity =
(license) = 400Mbps

Transmitted rate =
100 Mbps

Utilization
49

Capacity = Received frame rate


= 100 Mbps

Throughput 77 Mbps

19.25% ~ 20%
Capacity
400 Mbps
Proprietary and Confidential

Thank You

Page 275

Thispagewasintentionallyleftblank.

Page 276

Loopbacks

Agenda

In this module we shall describe


the various actions we can
perform to properly maintain and
troubleshoot the IP-10G system

Proprietary and Confidential

Page 277

RFU RF Loopback

RFU RF LB

Proprietary and Confidential

RFU RF Loopback
Use it to verify communication from Line to ODU is OK (including ODU)
Traffic affecting TX is stopped
Configurable Timer to automatically restore traffic ( 0 = no time limits)
RFU LED is RED when Loopback is ON
LINK LED is GREEN when Loopback is ON
Alarm is displayed in Current Alarms:

and Event log:

Proprietary and Confidential

Page 278

IF Loopback

IDU IF LB

Proprietary and Confidential

IF Loopback
Use it to verify communication from Line to IF cable is OK
Traffic affecting TX is stopped
Configurable Timer to automatically restore traffic (0 = no time limits)
LINK LED is GREEN when Loopback is ON
Alarm is displayed in Current Alarms:

and Event log (next slide):

Proprietary and Confidential

Page 279

IF Loopback Analysis using Event Log


Lets assume radio link is down LINK LED is RED
16:29:01

We enable IF LB, therefore Link alarms clear

16:29:05

Loopback replaces remote unit therefore alarm disappears

16:30:01

Loopback automatically stops, link recovers to original state

16:30:05

Radio link is down (original state)

Proprietary and Confidential

PDH Line LB towards Line (NE)

LB towards the line

Proprietary and Confidential

Page 280

PDH Line LB towards Line (Near End)


Use this feature to evaluate connection to customers patch-panel
Alarm is displayed in CAS:

and in Event Log:

Proprietary and Confidential

PDH Line LB towards Radio (FE)

LB towards the radio

Tester
10

Proprietary and Confidential

Page 281

PDH Line LB towards Radio Event Log Analysis


Lets assume PDH port #1 is enable but not connected
Therefore, Major alarm is on (RED)

16:59:44

We enable Line LB towards the radio

16:59:46

Loopback replaces end-device therefore alarm disappears

17:06:37

Loopback is OFF

17:06:38

PDH port alarm is ON again..

11

Proprietary and Confidential

SDH Line LB towards System


Towards System signal (trail) is looped back to
IP-10

12

Proprietary and Confidential

Page 282

SDH Line LB towards Line


Towards Line signal (trail) is looped back to
customer interface

13

Proprietary and Confidential

IDU-RFU Interface Monitoring

Before you leave the site, make sure that these registers are elapsed (zero)\
When one of these registers is different than 0 you need to report to
your support representative
In such case, perform the Loopbacks we have just covered to narrow down the
probable causes for the errors

14

Proprietary and Confidential

Page 283

Thank You

Page 284

Configuration Files

Agenda
In this module we shall describe the various actions we can perform to
properly maintain and troubleshoot the IP-10G system:
1.
1
2.
3.
4.
5.

Config ration File


Configuration
Unit Information File
Setting FTP Properties
Upload/Download in a Standalone IDU
Upload/Download in a Node

Proprietary and Confidential

Page 285

Configuration File
The Configuration file stores the following parameters:

License
External Alarms
SNMP Trap Destination
NTP Server Properties
Radio properties: Frequency, RSL, TSL, ATPC, etc.
Switch Mode and database: Port types, VLAN membership, etc.
Interface Configuration: PDH, TDM, Ethernet Switch
Trail Configurations
Service OAM
Security: user accounts, login properties, etc.

Proprietary and Confidential

Unit Information File


The Unit Information file stores the following parameters:

Date & Time


Daylight Saving Time properties
System name and other ID parameters
Measuring properties (voltage, temperature)
Accumulated Performance Monitoring logs
Serial numbers

Proprietary and Confidential

Page 286

FTP Properties

Local FTP Server


You may install FTP Server on your PC and connect locally to the IDU

EMS PC with local FTP Server installed

Proprietary and Confidential

Page 287

Remote FTP Server


You may configure the IDU to communicate with a remote PC where
FTP server is installed

Remote FTP Server

EMS PC
7

Proprietary and Confidential

FTP Root Directory


Every Server has its own properties. Make sure you are familiar with
your FTP Root Directory: this is where the files are stored (software
versions, CFG & Unit).

Examples for
SW packages

Examples for
CFG & Unit
Files
8

Proprietary and Confidential

Page 288

Configure your FTP Server Properties

2
9

Proprietary and Confidential

Upload/Download Using Stand Alone IP-10

10

Page 289

Uploading the CFG File (IP-10G to Server)


Click Create Archive to
allow the IP-10G zipping
all parameters into one file

11

Proprietary and Confidential

Uploading the CFG File (IP-10G to Server)

Wait till task is


successfully completed

12

Proprietary and Confidential

Page 290

Uploading the CFG File (IP-10G to Server)


Next step:
Click Upload Archive to allow
the IP-10G transferring the
zipped file to your server

13

Proprietary and Confidential

Uploading the CFG File (IP-10G to Server)


Wait till task is successfully
completed

14

Proprietary and Confidential

Page 291

Check your FTP Root Directory

This is your copy of


g
file
the configuration
You may place it now
in the dedicated folder
(Configuration Files)

15

Proprietary and Confidential

Uploading the CFG File (IP-10G to Server)


Follow the same steps to upload the Unit Information file:

1
16

2
Proprietary and Confidential

Page 292

Check your FTP Root Directory

This is a copy of your Unit Information file

17

Proprietary and Confidential

Downloading the CFG File (Server IP-10G)


Follow the same steps to download the CFG file
When download completes successfully, you will need to restart the
system
t
for
f changes
h
tto take
t k place
l
Please note if the file does not exist in the root directory action will fail !

1
18

2
Proprietary and Confidential

Page 293

Upload/Download in a Node

Step #1: Creating CFG files


The Main unit can store the
CFG files of each slot
Select the IDU(s) and click
Backup
Slot 4
Slot 3
Slot 2
Slot 1

20

Proprietary and Confidential

Page 294

Step #2: Upload CFG files


Next, click Upload
Archive(s) and the
file(s) will be uploaded
to your FTP root
directory

21

Proprietary and Confidential

Step #3: Downloading files to slot(s)


Click Download to send the
CFG files from your FTP root
directory onto each IDU

Slot 4

Slot 2
Slot 1

22

Proprietary and Confidential

Page 295

CFG file

Slot 3

Step #4: Restoring IDU(s)


Assuming Main IDU stores the
most updated CFG files, when
clicking Restore, the Main
IDU will download the files to
relevant IDUs
Slot 4

Slot 2

CFG file

Slot 3

Slot 1

23

Proprietary and Confidential

Unified Unit Information File

A unified file is created for


all stacked units
Upload & Download
action are identical to a
standalone unit
24

Proprietary and Confidential

Page 296

Checking Backup History & Status

Click here to see the


backup history
25

Proprietary and Confidential

Checking Backup History & Status

26

Proprietary and Confidential

Page 297

Setting the unit back to Factory Defaults

You can restore your system to


factory defaults
You may also set the IP address to
factory default address (192.168.1.1)
27

Proprietary and Confidential

Thank You

Page 298

Software Upgrade

Agenda
FTPProperties
Standalone SW Download
StandaloneSWDownload
StandaloneSWUpgrade
NodalIDUSWDownload
NodalIDUSWUpgrade
Rollback VS Downgrade
RollbackVS.Downgrade

Proprietary and Confidential

Page 299

Local FTP Server


SW files are located on an FTP Server (local or remote)
Configure the FTP properties to point to your local server root directory
(Make sure RD/WR permissions are enabled)

EMS PC with local FTP Server installed

Proprietary and Confidential

Remote FTP Server


If you do not have an FTP Server installed locally on your PC, you may
configure an IP address of a remote server.

EMS PC

Remote FTP Server


Proprietary and Confidential

Page 300

FTP Root Directory


Make sure you are familiar with your FTP Root Directory: this is where
the files are stored (software versions, CFG & Unit).

Examplesfor
SWpackages

Proprietary and Confidential

Configuring FTP Server Properties

2
6

Proprietary and Confidential

Page 301

Configuring FTP Server Properties

Type the location of the software package:


FTP IP address
SW folder (when relevant, in this example 66253)
Type the username & Password
(You may log in using CMD window to verify settings are correct)

Proprietary and Confidential

Software Upgrade Standalone IP-10

Page 302

Standalone SW Download
Click on the Download button and wait till Succeeded message is
displayed (next slide)

Youmayviewatanytimethedownload
y
y
processbyclickingontheLogIcon

Proprietary and Confidential

Standalone SW Download
Download was successfully completed, you may proceed to upgrade
the IDU

10

Proprietary and Confidential

Page 303

Download completed Upgrade delayed


In case Upgrade is scheduled for later moments, the Version table will
display the following status:

11

Proprietary and Confidential

Standalone Upgrade Regular


Click on the Upgrade button. When upgrades completes successfully,
the IDU will restart automatically.

Youmayviewatanytimetheupgrade
processbyclickingontheLogIcon

12

Proprietary and Confidential

Page 304

Standalone Upgrade - Timed


Choose in Installation Type Timed option, after that you can set time
for later scheduled upgrade

Youcansetscheduletimefrom1minup
to1440min(24hour)andclicktoApply

13

Proprietary and Confidential

Standalone Upgrade Regular vs. Timed


Click on Upgrade to start schedule timer, you can see Timer Status,
anytime you can abort scheduled installation

14

Proprietary and Confidential

Page 305

Software Upgrade Nodal IP-10

Nodal SW Download

Important note !
IP-10G systems with software version 3.0.34 must be upgraded to an
officially released version while in stand-alone mode (not in shelf
configuration) prior to a Shelf (Nodal) SW download

16

Proprietary and Confidential

Page 306

Shelf Configuration
1. Make sure your main unit (Slot 1) is upgraded with the latest version
2. If not, it is recommended to upgrade the main unit as a standalone IDU
3. Verify you are familiar with the slot number(s)

Slot 6
Slot 5

Slot 4
Sl t 3
Slot
Slot 2
Slot 1

17

Proprietary and Confidential

Shelf SW Download

Configure the FTP properties if needed


Click on the Download button and
wait till Succeeded message is
displayed
You may view at any time the download
process by clicking on the Log Icon

18

Proprietary and Confidential

Page 307

Shelf SW Upgrade
Select the target slot and then click the
Upgrade button
Or click Upgrade All
Please note
1. The number of slots depend on
actual configuration
2. The slot numbers are not according
to physical allocation in the shelf
3. Failures may occur due to wrong
FTP configurations, unstable
network connection or missing files
4. IDU(s) will reset automatically upon
successful upgrade
19

Proprietary and Confidential

Rollback vs. Downgrade

Page 308

Rollback VS. Downgrade

2.8.25

Upgrade #1

Upgrade #2
2.8.31

2.8.35
2.8.32

Rollback

3
Downgrade
g

Rollback does not revert previous Downgrade operation !


It rolls back IDU version 1 step back (prior to last Upgrade)

21

Proprietary and Confidential

Thank You

Page 309

Thispagewasintentionallyleftblank.

Page 310

Course Evaluation Form


Dear Customer!
Thank you for taking the time to complete the following course evaluation form. Your
commentary and feedbacks are of great importance to us as we analysis and investigate each
course and report. The information you provide will be used to help us improve the content of
the course and monitor the quality of our training program.
Thank You,
Oren Gerstner,
Training Director

Course details
Location
Course Name / ID
Start Date (d/m/year)

End Date (d/m/year)

Instructor Name
Company / Customer
Please rate your satisfaction with the course from 1 to 5 (1 = poor and 5 = excellent):
Did the course meet your expectations?

Was the course well organized?

Training facility & Environment

Was the difficulty of the course in line


with your expectations?

The instructor was well prepared

Instructors level of knowledge

Instructors presentation skills

Instructors willingness to help

Audience was treated respectfully

Language was clear and understood

Course book

Level of practical exercises (when relevant)

Setup and lab functionality (when relevant)

Usefulness Level of practical exercises (when relevant)

Overall satisfaction from the training session

Your comments:

Course Evaluation Form

Page 1 of 1

You might also like