Sie sind auf Seite 1von 178

COURSE HANDBOOK

Installation | Commissioning | System Configuration

IP-20G Basic Training Course


Updated for SW Version 7.7

Visit our Customer Training Portal at training.ceragon.com or contact us at training@ceragon.com


Trainee Name:

_________________

Copyright 2012 Ceragon Networks Ltd.

www.ceragon.com

Thispagewasintentionallyleftblank.

FibeAirIP20GCeragonTrainingCourse
TableofContent
IntrotoRadioSystems

005

IntroductiontoEthernet

029

IP20GOverview..

041

InstallationGuide...

053

FirstLogin...

079

ACM&MSE....

085

RadioLinkParameters..

097

AutomaticTransmitPowerControlATPC..

103

ServiceModelinIP20G..

109

Licensing..

133

NativeTDM

143

ConfigurationManagement&SoftwareDownload

151

Troubleshooting..

163

CourseEvaluationForm.

177

CERAGONTRAININGPROGRAMIP20GBasicTrainingCourse

Sw7.7

Thispagewasintentionallyleftblank.

Introduction to Radio Systems

May 2014
Version 1

Agenda
Radio Relay Principles
Parameters affecting propagations:
Dispersion
Humidity/gas absorption
Multipath/ducting
Atmospheric conditions (refraction)
Terrain (flatness, type, Fresnel zone clearance, diffraction)
Climatic conditions (rain zone, temperature)
Rain attenuation

Modulation

Proprietary and Confidential

Page 5

Digital Transmission Systems

Proprietary and Confidential

Radio Relay Principles


f1
RF Signal
f1

Path Terrain

A Radio Link requires two end stations

A line of sight (LOS) or nLOS (near LOS) is required

Microwave Radio Link frequencies occupy 1-80GHz

Proprietary and Confidential

Page 6

High and Low frequency station


Tx(f1)=11500 MHz

Rx(f1)=11500 MHz

Full duplex

Localsite
Highstation

Remotesite
Lowstation

Rx(f1)=11000 MHz

Tx(f1)=11000 MHz

High station means: Tx(f1) >Rx(f1)


Low station means: Tx(f1) < Rx(f1)

Proprietary and Confidential

Standard frequency plan patterns


Only Low stations can interfere High stations

Frequency reuse:
Low 1,3V
1,3H
Tx

High

Low

1,3V

Tx

Tx

1,3H

High
Tx

1,3H

Tx

Reduced risk for overshoot

Frequency shift:
1,3H

Tx

1,3V

Tx

2,4V

Tx

2,4H
Tx

Reduced risk for overshoot

Tx

Tx

1,3H

Tx in upper part of band


Tx in lower part of band

Proprietary and Confidential

Page 7

Tx

Preferred site location structure

Proprietary and Confidential

Radio Principal Block Diagram

Input
signal

Z'
Digital
Line interface

E'
Modulator

A'

B'

Transmitter

RF Tx Filter

Branching
Network(*)

C'

D'

Feeder

TRANSMITTER PATH

Feeder

Branching
Network(*)

RF Rx Filter

E
Receiver

Demodulator

RECEIVER PATH

Proprietary and Confidential

Page 8

Digital
Line interface

Output
signal

RF Principals
RF - System of communication employing electromagnetic waves
(EMW) propagated through space
EMW travel at the speed of light (300,000 km/s)
The wave length is determined by the frequency as follows -

Wave Length

c
f

where c is the propagation velocity of electromagnetic


waves in vacuum (3x108 m/s)

Microwave refers to very short waves (millimeters) and typically


relates to frequencies above 1GHz:
300 MHz ~ 1 meter
10 GHz ~ 3 cm

Proprietary and Confidential

RF Principals
We can see the relationship between colour, wavelength and amplitude
using this animation

10

Proprietary and Confidential

Page 9

Radio Spectrum

11

Proprietary and Confidential

Parameters Affecting Propagation

12

Page 10

Parameters Affecting Propagation


Dispersion
Humidity/gas absorption
Multipath/ducting
Atmospheric conditions (refraction)
Terrain (flatness, type, Fresnel zone clearance, diffraction)
Climatic conditions (rain zone, temperature)
Rain attenuation

13

Proprietary and Confidential

Parameters Affecting Propagation Dispersion


Electromagnetic signal propagating in a physical medium is degraded
because the various wave components (i.e., frequencies, wavelengths)
have different propagation velocities within the physical medium:

Low frequencies have longer wavelength and refract less


High frequencies have shorter wavelength and refract more

14

Proprietary and Confidential

Page 11

Parameters Affecting Propagation


Atmospheric Refraction
Deflection of the beam towards the ground due to different electrical
characteristics of the atmospheres is called Dielectric Constant.
The dielectric constant depends on pressure, temperature &
humidity in the atmosphere, parameters that are normally decrease
with altitude
Since waves travel faster through thinner medium, the upper part of the
wave will travel faster than the lower part, causing the beam to bend
downwards, following the curve of earth

With Atmosphere

No Atmosphere
15

Proprietary and Confidential

Wave in atmosphere

Proprietary and Confidential

16

Page 12

Parameters Affecting Propagation Multipath


Multipath occurs when there is more then one beam reaching the receiver
with different amplitude or phase
Multipath transmission is the main cause of fading in low frequencies

Direct beam

Delayed beam

17

Proprietary and Confidential

Parameters Affecting Propagation Duct

Atmospheric duct refers to a horizontal layer in the lower atmosphere with


vertical refractive index gradients causing radio signals:

Remain within the duct

Follow the curvature of the Earth

Experience less attenuation in the ducts than they would if the ducts were not
present

Duct Layer

Duct Layer
Terrain

18

Proprietary and Confidential

Page 13

Parameters Affecting Propagation - Polarization and


Rain
Raindrops have sizes ranging from 0.1 millimeters to 9 millimeters
mean diameter (above that they tend to break up)

Smaller drops are called cloud droplets, and their shape is spherical.

As a raindrop increases in
size, its shape becomes more
oblate, with its largest
cross-section facing the
oncoming airflow.

Large rain drops become


Increasingly flattened on the
Bottom;
very large ones are shaped
like parachutes

19

Proprietary and Confidential

Parameters Affecting Propagation Rain Fading


Refers to scenarios where signal is absorbed by rain, snow, ice
Absorption becomes significant factor above 11GHz
Signal quality degrades
Represented by dB/km parameter which is related the rain
density which represented mm/hr
Rain drops falls as flattened droplet

V better than H (more immune to rain fading)

20

Proprietary and Confidential

Page 14

Parameters Affecting Propagation Rain Fading

Heavier rain >> Heavier Atten.


Higher FQ >> Higher Attenuation

21

Proprietary and Confidential

Parameters Affecting Propagation Fresnel Zone


3rd
2nd
1st

TX

RX

1. EMW propagate in beams


2. Some beams widen therefore, their path is longer
3. A phase shift is introduced between the direct and indirect
beam
4. Thus, ring zones around the direct line are created

Duct Layer0

Terrain
22

Proprietary and Confidential

Page 15

Parameters Affecting Propagation Fresnel Zone

Obstacles in the first Fresnel zone will create signals that will be 0 to 90 degrees out
of phasein the 2nd zone they will be 90 to 270 degrees out of phasein 3rd zone,
they will be 270 to 450 degrees out of phase and so on
Odd numbered zones are constructive and even numbered zones are destructive.
When building wireless links, we therefore need to be sure that these zones are kept
free of obstructions.
In wireless networking the area containing about 40-60 percent of the first Fresnel
zone should be kept free.

23

Proprietary and Confidential

Example: First condition

Proprietary and Confidential

24

Page 16

RF Link Basic Components Parabolic Reflector Radiation (antenna)

25

Proprietary and Confidential

RSSI Curve for RFU-C

1,9V

1,6V

1,3V

-30dBm

-60dbm

Proprietary and Confidential

26

Page 17

-90dBm

Main Parabolic Antenna Types

Standard performance antennas (SP,LP)


Used for remote access links with low capacity. Re-using frequencies on adjacent links is not
normally possible due to poor front to back ratio.
High performance antennas (HP)
Used for high and low capacity links where only one polarization is used. Re-using
frequencies is possible. Can not be used with co-channel systems.
High performance dual polarized antennas (HPX)
Used for high and low capacity links with the possibility to utilize both polarizations. Re-using
frequencies is possible. Can be used for co-channel systems.
Super high performance dual polarized antennas (HSX)
Normally used on high capacity links with the possibility to utilize both polarizations. Re-using
frequencies is possible with high interference protection. Ideal for co-channel systems.
Ultra high performance dual polarized antennas (UHX)
Normally used on high capacity links with high interference requirements. Re-using
frequencies in many directions is possible. Can be used with co-channel systems.

Proprietary and Confidential

27

Passive Repeaters

Plane
reflector

Back-to-back
antennas

Proprietary and Confidential

28

Page 18

Link Calculation Basic Example (in vacuum)


Lfs
TSL

Lfsl

Ga

Ga

RSL

RSL ReceivedSignalLevel
TSL TransmittedSignalLevel
Lfsl Freespaceloss=92.45+20logx(distanceinkmxfrequencyinGHz)

RSL

Ga Antennagain

RSL=TSL+GaLfsl+Ga

Proprietary and Confidential

29

Atmospheric attenuation
Starts to contribute to the total attenuation above approximately 15GHz

Aa a d

[dB]

Parameters in a:

Frequency
Temperature
Air pressure
Water vapour

Proprietary and Confidential

30

Page 19

Objective examples

Typical objectives used in real systems

99.999%

Month: 25.9 sec


Year: 5 min 12 sec

99.995 %

Month: 2 min 10 sec


Year: 26 min

99.99%

Month: 260 sec


Year: 51 min

Performance requirements generally higher than Availability.


ITU use worst month for Performance Average year for Availability

Proprietary and Confidential

31

Modulation

32

Page 20

Modulation
Modulation

Analog
Modulation

Digital
Modulation

AM - Amplitude modulation
FM - Frequency modulation
PM Phase modulation

ASK Amplitude Shift Keying


FSK Frequency Shift Keying
PSK Phase Shift Keying
QAM Quadrature Amplitude modulation

Proprietary and Confidential

33

Digital modulation
1
1

ASK

Modem

0 1

1
1

modulation changes the amplitude to the analog


signale.1 and 0 have different amplitude.

PSK modulation changes the phase to the transmitted


signal. The simplest method uses 0 and 1800 .

Modem

1800 phase shift


1
1

FSK modulation is a method of represent the two


binary states 1 and 0 with different
spcific frequencies.

Modem
F1

F2

F1

F1 F2

F1

F1

Proprietary and Confidential

34

Page 21

QAM Modulation
Quadrature Amplitude Modulation employs both phase modulation
(PSK) and amplitude modulation (ASK)

The input stream is divided into groups of bits based on the number
of modulation states used.

In 8 QAM, each three bits of input, which provides eight values (0-7)
alters the phase and amplitude of the carrier to derive eight unique
modulation states
In 64 QAM, each six bits generates 64 modulation states; in 128
QAM, each seven bits generate 128 states, and so on
4QAM 2bits/symbol
8QAM 3bits/symbol
16QAM 4bits/symbol
32QAM 5bits/symbol
64QAM 6bits/symbol
128QAM 7bits/symbol

256QAM
512QAM
1024QAM
2048QAM

8bits/symbol
9bits/symbol
10bits/symbol
11bits/symbol

Proprietary and Confidential

35

Why QAM and not ASK or PSK for higher modulation?


This is because QAM achieves a greater distance between adjacent points
in the I-Q plane by distributing the points more evenly

The points on the constellation are more distinct and data errors are
reduced

Higher modulation >> more bits per symbol


Constellation points are closer >>TX is more susceptible to noise

Proprietary and Confidential

36

Page 22

Constellation diagram
In a more abstract sense, it represents the possible symbols that may be
selected by a given modulation scheme as points in the complex plane.
Measured constellation diagrams can be used to recognize the type of
interference and distortion in a signal.

Proprietary and Confidential

37

8 QAM Modulation Example


We have stream: 001-010-100-011-101-000-011-110
DIGITAL QAM (8QAM)
Bitsequence

Amplitude

000

Phase(degrees)
None

001

None

010

pi/2(90)

011

pi/2(90)

100

pi(180)

101

pi(180)

110

3pi/2(270)

111

3pi/2(270)

How does constellation diagram look?

Proprietary and Confidential

38

Page 23

4QAM VS. 16QAM

16QAM

4QAM

Proprietary and Confidential

39

2048 QAM

Proprietary and Confidential

40

Page 24

Bandwidth vs. Modulation

2-PSK

4-PSK
Modulation
Complixity
Increases

Bandwidth
Decreases

8-PSK

16-QAM

64-QAM

Proprietary and Confidential

41

Signal / Noise
Example: S/N influence at QPSK Demodulator
Each dot detected in wrong quadrant result in bit errors

BER<10-13

BER0

BER=10-6

BER=10-3

Signal

Noise

Signal
S/N
Noise

Proprietary and Confidential

42

Page 25

Power

S/N

Power

Power

Noise

Power

Signal
S/N

Signal
S/N
Noise

BER Impact on Transmission Quality


10 -3

10 -4

10 -5

BER change ratio vs. Noise is


dependent on Noise Power distribution
and coding

10 -6

10 -7

BER

10 -8
-75

-72
-69
Receiver inpu t level [dBm ]

-66

Proprietary and Confidential

43

RSL Vs. Threshold


RSL (dBm)

BER>10-6

-20
-30

Nominal Input Level

Fading Margin

-73

Threshold level BER=10-6

BER>10-6

S/N=23dB for 128QAM (37 MHz)


Receiver amplifies thermal noise

-96
-99

Thermal Noise=10*log(k*T*B*1000)

K Boltzmann constant
T Temperature in Kelvin
B Bandwidth

Time (s)
Proprietary and Confidential

44

Page 26

Thank you

45

Page 27

Page 28

Introduction to Ethernet

November 2013
Version 1

Agenda
Local Area Network (LAN)
Network Devices
OSI Layers
Ethernet Frame
VLAN concept

Proprietary and Confidential

Page 29

The Local Area Network (LAN)

Proprietary and Confidential

Network Devices
The various devices used to build a data communication network can be classified into type of
equipment depending on how Ethernet packets are forwarded.

ROUTER

BRIDGE / SWITCH
HUB

Proprietary and Confidential

Page 30

Functions of OSI layers


OSI model layers
Application
Presentation
Session
Transport

Type of communication: e-mail, file transfer, web browsing


Encryption, data conversion: ASCII to EBCDIC, BCD to binary et.

Starts, stops sessions. Maintains order


Ensure delivery of entire file or message

Network

Routes data to different LANs and WANs based on network addresses

Data Link

Transmits packets from node to node based on station address

Physical

Electrical signals and cabling (physical medium)

Proprietary and Confidential

Protocols in OSI layers


OSI model layers
Application
Presentation
Session
Transport

HTTP, FTP, IRC, SSH, DNS, SNMP


SSL, SFTP, IMAP, SSH, Jpeg, GIF, TIFF, MPEG, MIDI, mp3

VARIOUS APIS, SOCKETS


TCP, UDP, ECN, SCTP, DCCP

Network

IP, IP Sec, ICMP, IGMP

Data Link

Ethernet, Token Ring, SLIP, PPP, FDDI

Physical

Coax, Fiber, Wireless

Proprietary and Confidential

Page 31

Ethernet frame

Proprietary and Confidential

OSI and TCP/IP model


TCP/IP model

OSI model
layers

OSI model
layers
Application Protocol

Application
Presentation
Application

Internet
Layer2,5
Network
Interface

P
SFD
MAC
EL
VLAN
MPLS
IP

Presentation
DATA

Session Protocol

Session
Transport

Application

Presentation Protocol

Session
TCP/UDP

DATA

Transport

IPv4/6

TCP/UDP

DATA

Network

IPv4/6

TCP/UDP

DATA

Layer2,5

E
L

IPv4/6

TCP/UDP

DATA

FCS

DataLink

E
L

IPv4/6

TCP/UDP

DATA

FCS

Physical

20/40

20/8

Transport
Network
MPLS

Layer2,5
DataLink

MAC

SVLAN

C-VLAN

MPLS

SVLAN

C-VLAN

MPLS

Physical

SFD

MAC

Size in bytes:

12

Preamble
Start frame Delimiter
= Destination + Source MAC Address
Ether Length/Type
Virtual local area network
Multiprotocol Label Switching
Internet protocol

TCP
UDP
FCS

Transmission control protocol


User datagram protocol
Frame check sequence

Proprietary and Confidential

Page 32

46-1500

L2

Proprietary and Confidential

L3

Proprietary and Confidential

10

Page 33

L4
UDP Header

TCP Header

Proprietary and Confidential

11

Inter-frame gap

Ethernet works in Layer 1, Layer 2 and Layer 2,5

Proprietary and Confidential

12

Page 34

VLAN concept

Virtual Local Area Network (VLAN) concept

Imagine that you have a network and three different customer


Customer 1
Customer 2
Customer 3

NETWORK

Proprietary and Confidential

14

Page 35

Virtual Local Area Network (VLAN) concept

VLANs are created to provide the segmentation services traditionally provided by routers
in LAN configurations
The most common protocol used today in configuring virtual LANs is IEEE 802.1Q

Proprietary and Confidential

15

OSI and TCP/IP model


TCP/IP model

OSI model
layers

OSI model
layers
Application Protocol

Application
Presentation
Application

Internet
Layer2,5
Network
Interface

P
SFD
MAC
EL
VLAN
MPLS
IP

Presentation
DATA

Session Protocol

Session
Transport

Application

Presentation Protocol

Session
TCP/UDP

DATA

Transport

IPv4/6

TCP/UDP

DATA

Network

IPv4/6

TCP/UDP

DATA

Layer2,5

IPv4/6

TCP/UDP

DATA

FCS

DataLink

IPv4/6

TCP/UDP

DATA

FCS

Physical

20/40

20/8

Transport
Network
MPLS

Layer2,5
DataLink

MAC

SVLAN

C-VLAN

MPLS

E
L

C-VLAN

MPLS

E
L

Physical

SFD

MAC

SVLAN

Size in bytes:

12

Preamble
Start frame Delimiter
= Destination + Source MAC Address
Ether Length/Type
Virtual local area network
Multiprotocol Label Switching
Internet protocol

TCP
UDP
FCS

Transmission control protocol


User datagram protocol
Frame check sequence

Proprietary and Confidential

16

Page 36

46-1500

Ethernet frame

Proprietary and Confidential

17

Untagged Ethernet Frame

FCS is created by the sender and recalculated by the receiver

Preamble+SFD
8 Bytes

DA
6 Bytes

SA

Length/Type

6 Bytes

2 Bytes

DATA+PAD

FCS

46 - 1500 Bytes

4 Bytes
(32-bit
CRC)

Minimum 64 Bytes < FRAME SIZE < Maximum 1518 Bytes

Length / Type < 1500 - Parameter indicates number of Data Bytes


Length / Type > 1536 - Parameter indicates Protocol Type (PPPoE, PPPoA, ARP etc.)

Proprietary and Confidential

18

Page 37

Tagged Ethernet Frame


Additional information is inserted
Frame size increases to 1522 Bytes

4 Bytes

Preamble+SFD

DA

SA

VLANTAG

TPID=0x8100

Length/Type

FCS

TCI

PTAG
TPID = Tag protocol ID
TCI = Tag Control Information
CFI = 1 bit canonical Format Indicator

DATA+PAD

3 Bit

CFI
1 Bit

VLANID
12 Bit

Proprietary and Confidential

19

Tagging a Frame

VLAN ID uses 12 bits, therefore the number of maximum VLANs is 4096:


212 = 4096
VID 0 = reserved
VID 4090-4096 = reserved (dedicated for IP-10s internal purposes such as MNG etc.)
VID 1 = default

After tagging a frame, FCS is recalculated


CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over
ETH backbones (some vendors may use CFI for internal purposes)

Proprietary and Confidential

20

Page 38

TPID / ETHER-Type / Protocol Type


TPID in tagged frames in always set to
0x8100
It is important that you understand the
meaning and usage of this parameter

Protocoltype

Value

TaggedFrame

0x8100

ARP

0x0806

QinQ(CISCO)

0x8100

QinQ(othervendors)

0x88A8

QinQ(othervendors)

0x9100

QinQ(othervendors)

0x9200

RARP

0x8035

IP

0x0800

IPv6

0x86DD

PPPoE

0x8863/0x8864

MPLS

0x8847/0x8848

ISIS

0x8000

LACP

0x8809

802.1x

0x888E

Proprietary and Confidential

21

Q-in-Q
Additional VLAN (S-VLAN) is inserted
Frame size increases to 1526 Bytes

Preamble+SFD

DA

TPID=0x88A8

PTAG
3 Bit

SA

4 Bytes

4 Bytes

S VLAN

C VLAN

TCI

TPID=0x8100

CFI VLANID
1 Bit

Length/Type

DATA+PAD

TCI

PTAG

CFI

VLANID

3 Bit

1 Bit

12 Bit

12 Bit
Proprietary and Confidential

22

Page 39

FCS

Thank you

23

Page 40

IP-20G Overview

July 2014
Version 2

Agenda
FibeAir IP-20 Product Family
Network topology with IP-20G
IP-20G Introduction and Highlights
IP-20G Front Panel Description
IP-20G Block Diagram

Proprietary and Confidential

Page 41

FibeAir IP-20 Product Family


IP-20G

IP-20N 1RU & 2RU

IP-20S
IP-20C

IP20
Platform
IP-20A= IP20N + RFU-A
IP-20LH
Proprietary and Confidential

FibeAir IP-10 Product Line - 2011


Ethernet + Optional TDM

Ethernet Only

IP-10E

IP-10G

Terminal /
Single-Carrier

Terminal /
Single-Carrier

IP-10C
Compact
All-Outdoor

IP-10Q
Nodal

Nodal

Aggregation

Optimized for Full GE


Multi-Carrier pipes
Ultra-high density

Optimized Solution for Any Network


Proprietary and Confidential

Page 42

FibeAir IP-X0 Product Line - 2012 (Introducing IP-20G)


Ethernet + Optional TDM

Ethernet Only

IP-10E

IP-10G

Terminal /
Single-Carrier

IP-10C
Compact
All-Outdoor

Terminal /
Single-Carrier

IP-20G

IP-10Q
Aggregation

Optimized for Full GE


Multi-Carrier pipes
Ultra-high density

Optimized Solution for Any Network


Proprietary and Confidential

Network Topology Example (Tree)

1+0

1+1

C
C
2+0

IP20N

C
1+1

IP20N

C
C

1+0

IP20N

C
1+0

2+0

IP10G

1+0

2+0

C
IP20N

IP20G

IP10G

Proprietary and Confidential

Page 43

IP20G

IP-20G Introduction
IP-20G hardware characteristics:

6 x 1 GE interfaces total
2 x dual mode GE electrical or cascading interfaces (RJ-45)
2 x GE electrical interfaces (RJ-45)
2x GE optical interfaces (SFP)
Optional: 16 x E1 interfaces
Single or dual radio interfaces (TNC)
Single or dual power-feeds (-48v)
Sync in/out interface
Management interfaces
Terminal RS232 (RJ-45)
2x FE electrical interfaces (RJ-45)
External alarms interface
RFU-C support
IP-20G maintains high capacity, with up to 1024QAM modulation in its first SW release (T7.7),
and up to 2048QAM in future release

Proprietary and Confidential

IP-20G Highlights
Optimized tail/edge solution supporting seamless integration of radio (L1)
and end-to-end Carrier Ethernet transport/services (L2) functionality

Rich packet processing feature set for support of engineered end-to-end


Carrier Ethernet services with strict SLA

Integrated support for multi-operator and converged backhaul business


models, such as wholesale services and RAN-sharing

Highest capacity, scalability and spectral efficiency


High precision, flexible packet synchronization solution combining SyncE
and 1588v2

Best-in-class integrated TDM migration solution


Specifically built to support resilient and adaptive multi-carrier radio links,
scaling to GE capacity

Future-proof with maximal investment protection


Supports RFU-Ce for modulations up to 1024QAM.
Proprietary and Confidential

Page 44

IP-20G Front Panel Description

FibeAir IP-20G Front panel description


Passive cooling
(Fan-less design)

1RU

16 x E1/DS1s
(optional)
MDR69 connector

External
Alarms
(DB9)
Sync in/out
(RJ45)

2 x FE
Management
(RJ45)

2 x Dual-Mode:

GE Electrical or
Cascading
(RJ45)
Terminal
(RJ45)

2 x GE
Optical
(SFP)

1 or 2 RFU
interfaces
(TNC)

Power
-48V DC
(Single-feed &
Dual-feed options)

2 x GE
Electrical
(RJ45)

Purpose-built for tail/edge nodal sites


Same features/capabilities as IP-20A Aggregation Nodes
Proprietary and Confidential

10

Page 45

SM- Card
The SM-Card holds the configuration and software for the IDU. The SMCard is embedded in the SM-Card Cover, so re-using the existing SM-Card
Cover is necessary to ensure that the units software and configuration is
maintained.

Proprietary and Confidential

11

Ethernet Management Interface IP-20G

FibeAir IP-20G contains two FE management interfaces, which connect to a single RJ-45 physical
connector on the front panel (MGMT).

If the user only needs to use a single management interface, a standard Cat5 RJ-45 cable (straight or
cross) can be connected to the MGMT interface.
To access both management interfaces, a special 2 x FE splitter cable can be ordered from Ceragon.

Port Status LED The LED for management interface 1 is located on the upper left of the MGMT
interface. The LED for management interface 2 is located on the upper right of the MGMT interface.
Proprietary and Confidential

12

Page 46

DS1 - Interface

Optionally, FibeAir IP-20G can be ordered with an MDR69 connector in which 16


DS1 interfaces are available (ports 1 through 16).
In SW 7.7. is E1 option only available
The DS1 interface has the following LEDs
ACT LED Indicates whether the TDM card is working properly (Green) or if there is
an error or a problem with the cards functionality (Red).
E1/DS1 LED Indicates whether the interfaces are enabled with no alarms (Green),
with alarms (Red), or no interfaces enabled (Off).

Proprietary and Confidential

13

Radio Interfaces

In 7.7 is supported only single radio carrier.


In 7.7.5 will be supported 2x 1+0 East / West Terminal
In future software release will be available 2+0 ABC
In 7.7 is supported only RFU-C (up to 256QAM) and RFU-Ce (up to 1024
QAM)
RFU-HP, 1500HP, RFU-A support is planned for future software releases
The IDU and RFU are connected by a coaxial cable RG-223 (100 m/300 ft),
Belden 9914/RG-8 (300 m/1000 ft) or equivalent, with an N-type connector
(male) on the RFU and a TNC connector on the IDU.

RFU-C / RFU-Ce

1500HP

RFU-A
Proprietary and Confidential

14

Page 47

Radio Interfaces - LEDs

ACT Indicates whether the interface is working properly (Green) or if there is an error or
a problem with the interfaces functionality (Red), as follows:
Off The radio is disabled.
Green The radio is active and operating normally.
Blinking Green The radio is operating normally and is in standby mode.
Red There is a hardware failure.
Blinking Red Troubleshooting mode.
LINK Indicates the status of the radio link, as follows:
Green The radio link is operational.
Red There is an LOF or Excessive BER alarm on the radio.
Blinking Green An IF loopback is activated, and the result is OK.
Blinking Red An IF loopback is activated, and the result is Failed.
RFU Indicates the status of the RFU, as follows:
Green The RFU is functioning normally.
Yellow A minor RFU alarm or a warning is present, or the RFU is in TX mute mode,
or, in a protected configuration, the RFU is in standby mode.
Red A cable is disconnected, or a major or critical RFU alarm is present.
Blinking Green An RF loopback has been activated, and the result is OK.
Blinking Red An RF loopback has been activated, and the result is Failed.

Proprietary and Confidential

15

Power Interfaces

FibeAir IP-20G receives an external supply of -48V current via one or two power
interfaces (the second power interface is optional for power redundancy).

The IP-20G monitors the power supply for under-voltage and includes reverse
polarity protection, so that if the positive (+) and negative (-) inputs are mixed up, the
system remains shut down.

The allowed power input range for the IP-20G is -40V to -60V. An under voltage
alarm is triggered if the power goes below the allowed range, and an over voltage
alarm is triggered if the power goes above the allowed range.

There is an ACT LED for each power interface.


The LED is Green when the voltage being fed to the power interface is within range,
and Red if the voltage is not within range or if a power cable is not connected.

Proprietary and Confidential

16

Page 48

Synchronization Interface

FibeAir IP-20G includes an RJ-45 synchronization interface for T3 clock input and T4 clock output.
The interface is labeled SYNC.

The synchronization interface contains two LEDs, one on the upper left of the interface and one
on the upper right of the interface, as follows:

T3 Status LED Located on the upper left of the interface. Indicates the status of T3 input clock,
as follows:
Off There is no T3 input clock, or the input is illegal.
Green There is legal T3 input clock.

T4 Status LED Located on the upper right of the interface. Indicates the status of T4 output
clock, as follows:
Off T4 output clock is not available.
Green T4 output clock is available.
Blinking Green The clock unit is in a holdover state.

Proprietary and Confidential

17

External Alarms

IP-20G includes a DB9 dry contact external alarms interface. The external alarms
interface supports five input alarms and a single output alarm.

The input alarms are configurable according to:


1 Intermediate
2 Critical
3 Major
4 Minor
5 Warning

The output alarm is configured according to predefined categories.

Proprietary and Confidential

18

Page 49

Terminal Interface
FibeAir IP-20G includes an RJ-45 terminal interface (RS-232). A local craft
terminal can be connected to the terminal interface for local CLI
management of the unit.

Bits per Second 115,200


Data Bits 8
Parity None
Stop Bits 1
Flow Control - None

Proprietary and Confidential

19

IP-20G Block Diagram

Proprietary and Confidential

20

Page 50

Thank You

21

Page 51

Page 52

IP-20G Installation Guide

May 2014
Version 1

Agenda
Electromagnetic Fields, ESD and Laser Protection
General Requirements for Packing and Transportation and
Environment

IP-20G Rack Installation

Rack Installation
Grounding the IP-20G
Replacing SM-Card
Power Cable
Mechanical Specifications
Earth Bonding of Equipment
IP-20G to RFU-C connection
Antenna Installation
RFU-C Installation

Proprietary and Confidential

Page 53

High Frequency Electromagnetic Fields!


Exposure to strong high frequency electromagnetic fields may cause

thermal damage to personnel. The eye (cornea and lens) is easily exposed.

Any unnecessary exposure is undesirable and should be avoided.


In radio-relay communication installations, ordinary setup for normal

operation, the general RF radiation level will be well below the safety limit.

In the antennas and directly in front of them the RF intensity normally will
exceed the danger level, within limited portions of space.

Dangerous radiation may be found in the neighborhood of open waveguide


flanges or horns where the power is radiated into space.

To avoid dangerous radiation the following precautions must be taken:


During work within and close to the front of the antenna; make sure that
transmitters will remain turned off.
Before opening coaxial - or waveguide connectors carrying RF power,
turn off transmitters.
Consider any incidentally open RF connector as carrying power, until
otherwise proved. Do not look into coaxial connectors at closer than
reading distance (1 foot). Do not look into an open waveguide unless
you are absolutely sure that the power is turned off.

Proprietary and Confidential

ESD & LASER


ESD
This equipment contains components which are sensitive to "ESD" (Electro

Static Discharge). Therefore, ESD protection measures must be observed


when touching the IDU.
Anyone responsible for the installation or maintenance of the FibeAir IDU
must use an ESD Wrist Strap.
Additional precautions include personnel grounding, grounding of work
bench, grounding of tools and instruments as well as transport and storage
in special antistatic bags and boxes.
LASER
Use of controls or adjustments or performance of procedures other than
those specified herein may result in hazardous radiation exposure.
The optical interface must only be serviced by qualified personnel, who are
aware of the hazards involved to repair laser products.

Proprietary and Confidential

Page 54

General Requirements

Transportation & Inspection

The equipment cases are prepared for


shipment by air, truck, railway and sea,
suitable for handling by forklift trucks and
slings. The cargo must be kept dry during
transport and storage.

It is recommended that the equipment be


transported to the installation site in its
original packing case.

If intermediate storage is required, the


packed equipment must be stored in a dry
and cool environment, and out of direct
sunlight, in accordance with ETS 300 0191-1, Class 1.2.

Check the packing lists and verify that the


correct equipment part numbers and
quantities are in the delivered packages.

Proprietary and Confidential

Page 55

Packing & Transportation


The equipment is packed at the factory, and sealed moisture-absorbing bags
are inserted.
The equipment is prepared for public transportation. The cargo must be kept dry
during transportation.
Keep items in their original boxes till they reach their final destination.
If intermediate storage is required, the packed equipment must be stored in dry
and cool conditions and out of direct sunlight
When unpacking
Check the packing lists, and ensure that the
correct part numbers and quantities of
components arrived.

Proprietary and Confidential

General Requirements
1. Environmental specification for IDU: -5C (23F) to +55C (131F)
2. Environmental specification for RFU: -33C (-27F) to +55C (131F) high reliability
3. -45C (-49F) to +60C (140F) with limited margins
4. Cold startup requires at least -5C (23F)
5. Humidity: 5%RH to 95%RH for IP-20G
6. Humidity: 5%RH to 100%RH for RFU-C
7. IDU standard Input is -48VDC (-40 to -60VDC)
8. This equipment is designed to permit connection between the earthed conductor of
the DC supply circuit and the Earthing conductor at the equipment.
9. The equipment shall be connected to a properly grounded supply system
10. The DC supply system is to be local, i.e. within the same premises as the equipment
11. A disconnect device is not allowed in the grounded circuit between the DC supply
source and the frame/grounded circuit connection.
8

Proprietary and Confidential

Page 56

IP-20G Rack Installation

Installing the IP-20G IDU

Kits required to perform the installation:


IP-20G chassis
19 rack/ sub rack
SM-Card Cover

1x
1x
1x

Tools:
Philips screwdriver
Flat screwdriver
Proprietary and Confidential

10

Page 57

Rack Installation
Insert and hold the IP-20G IDU in the rack, as shown in the following
figures. Use four screws (not supplied with the installation kit) to fasten the
IDU to the rack.

Proprietary and Confidential

11

Grounding the IP-20G


Connect a grounding wire first to the single-point stud shown in the figure
below, and then to the rack, using a single screw and two washers.

The grounding wire must be 16 AWG or thicker

Proprietary and Confidential

12

Page 58

Replacing an IP-20G IDU or SM-Card

If you should need to replace the IP-20G IDU, you must first remove the SM-Card Cover so that
you can insert it into the new IDU.
The SM-Card holds the configuration and software for the IDU. The SM-Card is embedded in the
SM-Card Cover, so re-using the existing SM-Card Cover is necessary to ensure that the units
software and configuration is maintained.
In some cases, you may need to replace the SM-Card itself in order to upgrade the units
configuration.
To remove the SM-Card Cover:
1. Loosen the screws of the SM-Card Cover and remove it from the IDU.

Proprietary and Confidential

13

Replacing an IP-20G IDU or SM-Card


2. In the new IDU or, if you are upgrading the SM-Card, the old IDU, make sure that there is no
foreign matter blocking the sockets in the opening where the SM-Card is installed.

3. Gently place the SM-Card Cover in its place and tighten the screws, using a Phillips screwdriver.

Proprietary and Confidential

14

Page 59

Power Requirements
When selecting a power source, the following must be considered:

15

DC power can be from -40 VDC to -60 VDC.

Installation Codes: The equipment must be installed according to country national


electrical codes. For North America, equipment must be installed in accordance to the
US National Electrical Code, Articles 110-16, 110-17 and 110-18, and the Canadian
Electrical Code, Section 12.

Overcurrent Protection: A readily accessible listed branch circuit overcurrent


protective device, rated 15 A, must be incorporated in the building wiring.

Grounded Supply System: The equipment shall be connected to a properly grounded


supply system. All equipment in the immediate vicinity shall be grounded the same
way, and shall not be grounded elsewhere.

Local Supply System: The DC supply system is to be local, i.e. within the same
premises as the equipment.

Disconnect Device: A disconnect device is not allowed in the grounded circuit


between the DC supply source and the frame/grounded circuit connection.
Proprietary and Confidential

15

Power Interface

FibeAir IP-20G receives an external supply of -48V current via one or two power interfaces (the
second power interface is optional for power redundancy). The IP-20G monitors the power supply for
under-voltage and includes reverse polarity protection, so that if the positive (+) and negative (-)
inputs are mixed up, the system remains shutdown.
The allowed power input range for the IP-20G is -40V to -60V. An under voltage alarm is triggered if
the power goes below the allowed range, and an over voltage alarm is triggered if the power goes
above the allowed range.
Make sure to use a circuit breaker to protect the circuit from damage by short or overload. In a
building installation, the circuit breaker shall be readily accessible and incorporated external to the
equipment. The maximum rating of the overcurrent protection shall be 10 Amp, while the
maximum current rating is 5 Amp.

Proprietary and Confidential

16

Page 60

Power Cable

17

Proprietary and Confidential

Power cables

Proprietary and Confidential

18

Page 61

Mechanical Specifications

Proprietary and Confidential

19

Earth Bonding of Equipment

Copyright 2009 2013 Nera Networks AS All rights reserved.

I-79113-EN rev. A

Page 62

Typical Earthing Network


Note 1: Structure or cable riser directly connected to Station
Earth Network.
Note 2: Main Earth Bar in equipment room, connected to
Station Earth Network.
Note 3: Earth Bus Bar/Cable connected to main earth bar.
Note 4: Coax Signal Cable.
Note 5: Over voltage protection integrated in units.

Note 1

Proprietary and Confidential

21

Feeder - Earthing Kit (pos.1)


Ceragon Networks provides one
Earthing kit per feeder as standard
Earthing Kit staggered to ensure smooth,
uniform jumper transition to point of bonding.

There are three logical positions where


a Waveguide/Feeder Earthing Kit should be installed:
1.

Highest priority is at the bottom of the vertical


feeder run, on the straight section just above the
bend where it transitions from vertical to
horizontal.

Custom Earthing Kit supplied from the


Feeder Manufacturer use only kit that are
compatible.

2.

Jumper Leads from the kit should be bonded to


the Tower Structure:
- directly (bolted connection)
- via a earth termination plate (if provided)
- stainless steel angle adaptor (ANDREW)
Earth Kit on the feeder should be positioned
so that each jumper lead has a uniform smooth
transition down to the point of bonding this may
mean staggering their position as shown here.

Never intermix components from different


Manufacturers.

3.

4.

It is preferred that each jumper is bonded


separately.

Jumper lead between Earthing Kit


and buried earth radial bonded to base
of the Tower Leg.
Recommended 70mm PVC Coated Conductor

SEE NEXT TWO SLIDES

Proprietary and Confidential

22

Page 63

Feeder - Earthing Kit (pos.2)


Second line of defence
The second position in order of priority is just before the
waveguide/feeder enters the shelter through the wall plate.
1.

Earth Termination Plate

Again it is important that the jumper lead forms a smooth


transition downwards to earth. In this case the bonding
point is on the earth termination plate mounted below the
cable bridge.

2.

It is preferred that each jumper is bonded separately. Earth


Termination Plate usually have multiple bonding holes predrilled.

3.

To shape each conductor correctly begin at the earth


termination plate and form the cable to the best transition
back to the feeder. From there you will establish the
location to fit the earth kit. Treat each earthing kit
separately.

Common Errors
Fitting or, finding the Earth Termination Plate too high on the
shelter wall often prevent achieving the required earth
jumper transition.

Earth Kit

Jumper lead between Earthing Kit


and Earth Termination Plate outside
shelter.
Recommended 70mm PVC Coated
Conductor or 3mm x 25mm Copper
Tape.
Conductor / Tape should be run out
to the
Buried earth loop at a depth of
600mm.

Proprietary and Confidential

23

Feeder - Earthing Kit (pos.3)


The third position in order of priority is at the antenna position.
Here, the Earthing Kit is fitted on the vertical straight
section of feeder just after the transition from horizontal to
vertical.
1.

Once again it is important that the jumper lead forms a


smooth transition downwards to earth. It is usual to use the
tower structure itself as the main down conductor.

2.

To shape each conductor correctly begin at the bonding


point and form the cable to the best transition back to the
feeder. From there you will establish the best position to fit
the earth kit to the feeder. Treat each earthing kit
separately.

3.

If using a Stainless Steel Angle Adaptor this will provide


flexibility to establishing a bonding point on the tower the
Angle Adaptor does not require you to find or drill a hole in
any structural members.

The tower structure or


climbing ladder are
both commonly used
for bonding the earth
jumper.
Angle Adaptors are the
most convenient
bonding method as this
avoids finding or
drilling holes at height
in the tower.

Additional Earthing Kit:


If a customer specifies additional earthing kit to be fitted, these
would normally be positioned between the two kit installed at the
top and bottom of the feeder.

Proprietary and Confidential

24

Page 64

ODU Earthing
EACH ODU IS SEPARATELY
EARTHED DO NOT JUMPER
BETWEEN ODU

1. SMOOTH JUMPER TRANSITION


2. SHORTEN THE JUMPER IF TOO LONG
3. SUPPORT EARTH JUMPER
WHERE NEEDED

4. BOND TO TOWER STRUCTURE.


CLAMP TYPE DEPENDENT ON
TOWER MEMBER PROFILE

RSSI

N-Type to IDU connection

EARTH TERMINAL

Proprietary and Confidential

25

Applying the same principles to all cables

With All Cable Installations


Avoid leaving coils along
feeder cables
Avoid kinking the cable
Avoid cable loopbacks

Proprietary and Confidential

26

Page 65

Weatherproofing
Each Earthing Kit should be protected with a waterproof weather seal
If the weather seals are not provided as part of the main Earthing Kit, they must be
ordered

Each kit is provided with an installation instruction (or, Bulletin)


Always follow the advice given in the instruction to achieve the best possible
installation

Proprietary and Confidential

27

ODU to IDU connection

Page 66

IP-20G to RFU-C connection


The cable should have a maximum attenuation of 30 dB at 350 MHz.
TNC
N-type female

N-type male

TNC male

TNC females
Proprietary and Confidential

29

N-type connector installation


http://www.youtube.com/watch
?v=cAV_xhP3FNA

http://www.youtube.com/watch
?v=Mo9LwdHe39M

Proprietary and Confidential

30

Page 67

TNC connector
installation
instructions
http://www.youtube.co
m/watch?v=XfA0JVR
JSxU

Proprietary and Confidential

31

Protecting the IF Connector for Split Mount


Make sure the vulcanized tape and PVC tape
overwrap extends right up to the ODU casing
and is hand moulded around the connector to
form a water tight joint

Fit a small cable tie at the top and


bottom of the weather kit to
prevent the PVC tape over wrap
from loosening

Also is possible to use cold


shrink medium instead of
tapes

Self sealing vulcanized tape


weather kit should be
applied to the connector at
the ODU to make it fully
water tight.

The vulcanized tape must


be overwrapped with PVC
tape tied off at the top and
bottom with cable ties.

Failure to follow every detail of


the installation instructions will
result with water damage to the
connector and cable

Proprietary and Confidential

32

Page 68

Cable Clamping
IF Cable

Tower Cross Member

Avoid this method which is


less secure and will cause
unsightly bending of the
cable

When securing cables with cable


ties the method shown here can
normally be achieved using a single
tie.
This method will keep the cable
straight and provide the best
support

Proprietary and Confidential

33

Cable Installation and Grounding


For optical cables no grounding is required
For Ethernet cables, the cable should be grounded to the antenna tower
every 50m using the kit CAT5E_gnd_kit.

Procedure see installation Guide

Proprietary and Confidential

34

Page 69

Antenna Installation

RSSI Curve

1,9V

1,6V

1,3V

-30dBm
36

Proprietary and Confidential

Page 70

-60dbm

-90dBm

Antenna Panning - Azimuth


Important to establish which are the side lobes
and what is the main beam
Position can be marked onto the column or
interface using a felt tipped pen

ReceivingAntenna

SIDE LOBE

AZIMUTH

Always Pan antenna


beyond each side lobe
MAIN BEAM

SIDE LOBE

For Azimuth panning it is important to establish the


strongest possible signal but remember, further improvement
should be expected once elevation adjustment is carried out

37

Proprietary and Confidential

Antenna Panning - Elevation


Determine from available data if the antenna direction
of shoot is above or below horizontal to ensure the
elevation is adjusted in the correct direction
With the main beam having already been established
it is not necessary to find the side lobes again

ReceivingAntenna

Once the best signal strength has been found using


elevation minor azimuth panning can often
improve the signal strength further

SIDE LOBE

ELEVATION

HORIZONTAL

MAIN BEAM

Note:

SIDE LOBE

It should not always be expected to establish the strongest receive signal at


first attempt to align an antenna
Antenna may need to be panned several times before the optimum signal
strength is established
38

Proprietary and Confidential

Page 71

Dual Polarized Antenna connection


To fit the Duel Polarized Waveguide
Interface
Note: There may be some variation in of the
Duel Polarized Waveguide Interface always refer to the installation Bulletin before
attempting to install this unit

Remove the two Waveguide Interface


securing screws.
Replace the Waveguide Interface with the
Dual Polarized Waveguide Interface.
Secure the Dual Polarized Waveguide
Interface to the antenna by means of two
screws M8.
Remount the two Waveguide Interface
securing screws.
39

Proprietary and Confidential

Dual Polarized Antenna connection


DUEL POLARIZED FEEDHORN

WAVEGUIDE

Waveguide ports on feedhorn


clearly marked to show polarization

40

Proprietary and Confidential

Page 72

RFU-C Installation

RFU-C waveguide flanges

Proprietary and Confidential

42

Page 73

RFU-C direct mount configurations

1+0 direct

Proprietary and Confidential

43

RFU-C and Antenna Interface Direct Mount Polarization

Proprietary and Confidential

44

Page 74

RFU-C remote mount configurations

1+0 remote

Proprietary and Confidential

45

RFU-C direct 1+1 mount configurations


1+1 direct

Proprietary and Confidential

46

Page 75

RFU-C 1+1 Coupler Direct Mount Polarization


Vertical Polarization

Horizontal Polarization

Proprietary and Confidential

47

RFU-C remote mount configurations


1+1 remote

Proprietary and Confidential

48

Page 76

Orthogonal Mode Transducer (OMT) Installation

Switch to the circular adaptor


(removing the
existing rectangular transition,
swapping the O-ring, and
replacing on the circular
transition).

Proprietary and Confidential

49

OMT Installation Example

Proprietary and Confidential

50

Page 77

RFU-C Mediation devices losses

Proprietary and Confidential

51

Thank you

52

Page 78

First login

Ceragon Training Services


July, 2014 v2

Agenda

CLI and Web login


General commands
Get IP address
Set IP address
Set to default

Proprietary and Confidential

Page 79

Connecting to the Unit


CLI

Web/Telnet

Baudrate=
115200
Bits per Second 115,200
Data Bits 8
Parity None
Stop Bits 1
Flow Control - None

IPaddress=192.168.1.1

DefaultUsername/passwordisadmin/admin
Proprietary and Confidential

General commands

Press twice the TAB key for optional commands in actual directory
Use the TAB key to auto-complete a syntax

Use the arrow keys to navigate through recent commands

Question mark to list helpful commands

Proprietary and Confidential

Page 80

Get IP address
CLI Command:
platform management ip show ip-address

Proprietary and Confidential

Changing Management IP Address


CLI Command:
platform management ip set ipv4-address <IP Address> subnet <Mask>
gateway <default gateway>

Example
Web
expand Platform branch, then Management branch and click on IP, set
accordingly and click Apply button

Proprietary and Confidential

Page 81

Set to default
CLI Command:
platform management set-to-default

Please note that IP address after Set to Factory Default will be not changed!!!

Proprietary and Confidential

Other CLI commands


For any CLI commands please follow our Web Manual
Open Index html file
Find out in Topics submenu required configuration

Proprietary and Confidential

Page 82

Web Management

First Web login


Default IP address is 192.168.1.1 /24

DefaultUsername/passwordisadmin/admin
Proprietary and Confidential

10

Page 83

IP address settings

Proprietary and Confidential

11

Thank You

Page 84

ACM Adaptive Coding and Modulation


MSE Mean Square Error

Ceragon Training Services


May 2014 version 1

Agenda

Adaptive Coding and Modulation


Using MSE with ACM
What is MSE?
Link Commissioning with MSE
Triggering ACM with MSE

Proprietary and Confidential

Page 85

Adaptive Coding and Modulation (ACM)

In ACM mode, the radio will select the highest possible link capacity based on received signal quality.

When the signal quality is degraded due to link fading or interference, the radio will change to a more robust

When signal quality improves, the modulation is automatically increased and link capacity is restored to the original

modulation and link capacity is consequently reduced.

setting. The capacity changes are hitless (no bit errors introduced).

During the period of reduced capacity, the traffic is prioritized based on Ethernet QoS - and TDM priority - settings.

In case of congestion the Ethernet or TDM traffic with lowest priority is dropped. TDM capacity per modulation

4QAM

8QAM
16QAM

32QAM

64QAM

128QAM

256QAM

512QAM

1024QAM
SFEC

1024QAM
LFEC

Low Priority
Traffic

2048QACM

High Priority
Traffic

state is configurable as part of the TDM priority setting.

Proprietary and Confidential

Hitless and Errorless switching

Proprietary and Confidential

Page 86

Using MSE with ACM

MSE - Definition
MSE is used to quantify the difference between an estimated
(expected) value and the true value of the quantity being
estimated
MSE measures the average of the squared errors:
MSE is an aggregated error by which the expected value differs
from the quantity to be estimated.
The difference occurs because of randomness or because the
receiver does not account for information that could produce a
more accurate estimated RSL

Proprietary and Confidential

Page 87

To simplify.

Imagine a production line where a machine needs to insert


one part into the other
Both devices must perfectly match
Let us assume the width has to be 10mm wide
We took a few of parts and measured them to see how
many can fit in.

Proprietary and Confidential

The Errors Histogram


(Gaussian probability distribution function)

Quantity

Expected value

width
6mm

7mm

10mm

12mm

16mm

To evaluate how accurate our machine is, we need to know how many
parts differ from the expected value
9 parts were perfectly OK
Proprietary and Confidential

Page 88

The difference from Expected value


Quantity

Error = 0 mm

Error = + 2 mm
Error = - 3 mm
Error = + 6 mm

Error = - 4 mm

width
6mm

7mm

10mm 12mm

16mm

To evaluate the inaccuracy (how sever the situation is) we


measure how much the errors differ from expected value
Proprietary and Confidential

Giving bigger differences more weight than smaller


differences
Quantity

Error = 0 mm

+ 2 mm = 4
-3 mm = 9
+ 6 mm = 36

- 4 mm = 16

width
6mm 7mm 10mm 12mm

16mm

We convert all errors to absolute values and then we square them


The squared values give bigger differences more weight than smaller differences,
resulting in a more powerful statistics tool:
16cm parts are 36 units away than 2cm parts which are only 4 units away
Proprietary and Confidential

10

Page 89

Calculating MSE
Error = 0 mm

Quantity

+ 2 mm = 4
-3 mm = 9
- 4 mm = 16

+ 6 mm = 36
width

To evaluate the total errors, we sum all the squared errors and take the average:
16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13
The bigger the errors (differences) >> the bigger MSE becomes

Proprietary and Confidential

11

Calculating MSE
MSE determines how narrow / wide the Bell is
Quantity

width
10mm
When MSE is very small the Bell shaped histogram is closer to perfect
condition (straight line): errors = ~ 0
Proprietary and Confidential

12

Page 90

MSE in digital modulation (Radios)


Let us use QPSK (4QAM)
as an example:

Q
01

00

QPSK = 2 bits per symbol


2 possible states for I signal
2 possible states for Q signal

11

= 4 possible states for the


combined signal
The graph shows the expected
values (constellation) of the
received signal (RSL)

10

Proprietary and Confidential

13

MSE in digital modulation (Radios)


The black dots represent the
expected values (constellation)
of the received signal (RSL)

Q
01

00
The blue dots represent the
actual RSL

11

10

As indicated in the previous


example, we can say that the
bigger the errors are the
harder it becomes for the
receiver to detect & recover the
transmitted signal

Proprietary and Confidential

14

Page 91

MSE in digital modulation (Radios)

Q
01

00

MSE would be the average


errors of e1 + e2 + e3 + e4.

e1

e2

I
e4

When MSE is very small the


actual signal is very close to
the expected signal

e3

11

10

Proprietary and Confidential

15

MSE in digital modulation (Radios)

Q
01

00

When MSE is too big, the


actual signal (amplitude &
phase) is too far from the
expected signal

e1

e2

I
e4

11

e3

10

Proprietary and Confidential

16

Page 92

Commissioning with MSE in EMS

When you commission your


radio link, make sure your MSE
is small
Actual values may be read
-34dB to -35dB
Bigger values will result in loss
of signal

Proprietary and Confidential

17

MSE and ACM


When the errors is too big, we need
a stronger error correction
mechanism (FEC)
Therefore, we reduce the number
of bits per symbol allocated for data
and re-assign the extra bits for
correction instead
For example
256QAM has great capacity but
poor immune to noise
64QAM has less capacity but much
better immune for noise
ACM Adaptive Code Modulation
Proprietary and Confidential

18

Page 93

Triggering ACM with MSE


When ACM is enabled, MSE values are analyzed on each side of the link
When MSE degrades or improves, the system applies the required
modulation per radio to maintain service
MSE Down-Threshold

MSE Up-Threshold

8PSK

-16

-19

16QAM

-17

-23

32QAM

-21

-26

64QAM

-24

-29

128QAM

-27

-32

256QAM

-30

-34

512QAM

-32

-37

1024 QAM SFEC

-35

-38

1024 QAM WFEC

-36

-41

10

2048QAM

-39

Profile

Mod

QPSK

-18

Applicable for both 28/56MHz , 2048 QAM will be supported in 7.9

The values are typical and subject to change in relation to the frequency and RFU
type. For more details please contact your Ceragon representative
Proprietary and Confidential

19

ACM & MSE: An example


It is easier to observe the hysteresis of changing the ACM profile with
respect to measured MSE.
As you can see, the radio remains @ profile 8 till MSE improves to -38dB:

ACM
Profile

Downgrade
Downgrade

-41
-38
-37
-34

Profile 10

Profile 9

2048 QAM

-39

1024 QAM

Profile 8
1024 QAM

-36

Profile 7
512 QAM

-35

Profile 6
256 QAM

-32

Profile 5
128 QAM

-30

Profile 4
64 QAM

-27

Proprietary and Confidential

20

Page 94

-24

Profile 3
32 QAM

MSE

-21

ACM & MSE: An Example


When RF signal degrades and MSE passes the upgrade point (MSE @ red point), ACM will
switch back FASTER to a higher profile (closer to an upgrade point) when MSE improves.
When RF signal degrades and MSE does not pass the upgrade point (green point) ACM
waits till MSE improves to the point of next available upgrade point (takes longer time to
switch back to the higher profile).

ACM
Profile

41

Profile10

38

Profile9

Profile8

393635
Proprietary and Confidential

21

Thank You

Page 95

MSE

Page 96

Radio Link Parameters

Ceragon Training Services


July 2014 version 2

Agenda
MRMC
TX & RX Frequencies
Link ID
RSL
MSE
Current ACM Profile

Proprietary and Confidential

Page 97

High and Low frequency station


Tx(f1)=11500 MHz

Rx(f1)=11500 MHz

Full duplex

Local site
High station

Remote site
Low station
Tx(f1)=11000 MHz

Rx(f1)=11000 MHz

High station means: Tx(f1) >Rx(f1)


Low station means: Tx(f1) < Rx(f1)

Proprietary and Confidential

Radio Link Parameters


TSL

IDU

ODU

))

RSL

ODU

IDU

To Establish a radio link, we need configure following parameters:


1. MRMC Modem scripts (ACM or fixed capacity, channel & modulation)
2. TX / RX frequencies set on every radio
3. Link ID must be the same on both ends
4. Max. TSL Max. allowed Transmission Signal [dBm]
5. Unmute Transceiver Transceiver is by default muted (is not transmitting)
------------------------------------------------------------------------------------------------------To verify a radio link, we need control following parameters:
1. RSL Received Signal Level [dBm] nominal input level is required
2. MSE- Mean Square Error [dB]
3. Current ACM profile

Proprietary and Confidential

Page 98

MRMC Multi Rate Multi Coding Profiles


Modulation

RFUCwithRMCA

RFUCPremiumwith
RMCB

QPSK

Profile 0

Profile 0

8QAM

Profile 1

Profile 1

16QAM

Profile 2

Profile 2

32QAM

Profile 3

Profile 3

64QAM

Profile 4

Profile 4

128QAM

Profile 5

Profile 5

256QAM(strongFEC)

Profile 6

N/A

256QAM(weakFEC)

Profile 7

Profile 6

512QAM

N/A

Profile 7

1024QAM (StrongFEC)

N/A

Profile 8

1024QAM (LightFEC)

N/A

Profile9

Proprietary and Confidential

MRMC Scripts 1st steep

ChangingscriptautomaticallyresetsmodeminsideIP20G
Proprietary and Confidential

Page 99

Radio Parameters settings

2nd step

4th step
5th step
3th step
Proprietary and Confidential

LINK ID Antenna Alignment Process


To avoid pointing the antenna to a wrong direction (when both links share the same
frequency), LINK ID can be used to alert when such action is take.
# 101
# 101

# 102
# 101
Link ID Mismatch

Proprietary and Confidential

Page 100

Link ID
Mismatch

LINK ID Antenna Alignment Process


Both IDUs of the same link must use the same Link ID
Otherwise, Link ID Mismatch alarm will appear in Current Alarms Window
# 101
# 101

# 102
# 101
Link ID Mismatch

Proprietary and Confidential

Questions?

Proprietary and Confidential

10

Page 101

Link ID
Mismatch

Radio Link Setup Exercise

Proprietary and Confidential

11

Thank You

Page 102

Automatic Transmit Power Control - ATPC

July 2014, ver 2

Agenda
Why ATPC?
How does ATPC works?
ATPC Vs. MTPC
ATPC Configuration

Proprietary and Confidential

Page 103

ATPC Automatic Transmit Power Control


The quality of radio communication between low Power devices varies
significantly with time and environment.
This phenomenon indicates that static transmission power, transmission range,
and link quality, might not be effective in the physical world.
Static transmission set to max. may reduce lifetime of Transmitter
Side-lobes may affect nearby Receivers (image)
Main Lobe
Side Lobe

Proprietary and Confidential

ATPC Automatic Transmit Power Control


1. Enable ATPC on both sites
2. Set Input reference level (min. possible RSL to maintain the radio link)
3. ATPC on both ends establish a Feedback Channel through the radio link (1byte)
4. Transmitters will reduce Output power to the min. possible level
5. Power reduction stops when RSL in remote receiver reaches Ref. input level
6. ATPC is strongly recommended with XPIC configuration

TSL Adjustments

ATPC
module

Monitored RSL

Radio
Transceiver

Radio

Radio
Receiver

Radio
Receiver

Feedback

Signal
Quality
Check

Site A

Proprietary and Confidential

Page 104

Ref. RSL

RSL
required
change

Site B

ATPC Example when ATPC is OFF

Site A

FSL= -60 dB

Site B

MTPC

MTPC

TSL A = 30dBm
RSL A = ?

TSL B = 30dBm
RSL B = ?

RSL A = -30dBm (TSL B + FSL)

RSL B = -30dBm (TSL A + FSL)

Proprietary and Confidential

ATPC Example when ATPC is ON (One site ATPC, second site MTPC)

Site A

FSL= -60 dB

Site B

ATPC
IRLB (Input Ref. level on Site B) = -50dBm

MTPC

TSL A = ?
RSL A = ?

TSL B = 30dBm
RSL B =?

TSL A = 10dBm (IRLB-FSL)

RSL B = -50dBm (TSL A + FSL)

RSL A = -30dBm (TSL B + FSL)


You want -50dBm on Site B, so what is TXA in Site A?
Proprietary and Confidential

Page 105

ATPC Example when ATPC is ON (ATPC on both sites)

Site A

FSL= -60 dB

Site B

ATPC
IRLB (Input Ref. level on Site B) = -50dBm

ATPC
IRLA (Input Ref. level on Site A) = -50dBm

TSL A = ?
RSL A = ?

TSL B = ?
RSL B = ?

TSL A = 10dBm (IRLB - FSL)

TSL B = 10dBm (IRLA-FSL)

RSL A = -50dBm (TSLB + FSL)

RSL B = -50dBm (TSL A + FSL)

Proprietary and Confidential

ATPC Example when ATPC is ON (ATPC on both sites), ATPC range


Max TSL is 30dBm
ATPC range is 20dB

Site A

Max TSL is 30dBm


ATPC range is 20dB
FSL= -60 dB

Site B

ATPC
IRLB (Input Ref. level on Site B) = -60dBm

ATPC
IRLA (Input Ref. level on Site A) = -50dBm

TSL A = ?
RSL A = ?

TSL B = ?
RSL B = ?

TSL A = 10dBm (IRLB-FSL)

TSL B = 10dBm (IRLA - FSL)

RSL A = -50dBm (TSL B + FSL)

RSL B = -50dBm (TSL A + FSL)

RSL B is -50dBm because typical ATPC range for TX level is 20dB (depend on RFU type)!!!
It means that TSL A cant be 0dBm because possible min is 10dBm (Max is 30dBm)
Proprietary and Confidential

Page 106

ATPC Configuration

Proprietary and Confidential

Thank You

10

Page 107

Page 108

Service Model in IP-20

Ceragon Training Services


July 2014 version 2

Agenda
IP-20 Ethernet Capabilities
Service Model in General

What is a Service ?
What is a Service point?

Services in IP-20 Family & Services attributes


1.
2.
3.

Point to Point Service


Multipoint Service
Management Service

Service Point in IP-20 Family


1.
2.
3.
4.

Pipe Service Point


Service Access Point (SAP)
Service Network Point (SNP)
Management Service Point (MNG)

Service Points classification and attributes


Examples for Services and Service points
Logical VS. Physical Port
Proprietary and Confidential

Page 109

IP-20s Ethernet Capabilities


Up to 1025 services (1025 reserved for Management)
Up to 32 service points per service (30 SPs for MNG service)
All service types:

Multipoint (E-LAN)
Point-to-Point (E-Line)
Point-to-Multipoint (E-Tree)
Smart Pipe
Management
128K MAC learning table per service - ability to limit MAC learning per
service
Split horizon between service points
Flexible transport and encapsulation via 802.1q, 802.1ad (Q-in-Q), and
MPLS-TP, with tag manipulation possible at egress
High precision, flexible frame synchronization solution combining SyncE
and 1588v2
Hierarchical QoS with 8K service level queues, deep buffering, hierarchical
scheduling via WFQ and Strict priority, and shaping at each level

Proprietary and Confidential

IP-20s Ethernet Capabilities


Hierarchical two-rate three-Color policers

Port based Unicast, Multicast, Broadcast, Ethertype


Service-based
CoS-based
Up to four link aggregation groups (LAG)
Hashing based on L2, L3, MPLS, and L4
Enhanced <50msec network level resiliency (G.8032) for ring/mesh support
IP-20 is fully MEF-9 and MEF-14 certified for all Carrier Ethernet services.

Proprietary and Confidential

Page 110

Service model in General

What is a Service?
A virtual bridge, connecting two or more interfaces
Bridge is a device that separates two or more network segments
within one logical network

Interfaces are usually referred to physical ports but can also be logical
ports

Proprietary and Confidential

Page 111

Service Model

Service#1

Service#2

Proprietary and Confidential

Service points
Service points are logical entities attached to the interfaces that make up the
service. Service points define the movement of frames through the service.
Without service points, a service is simply a virtual bridge with no ingress or
egress interfaces.

Rails are second service point


towards the bridge

The Route is your first service point


towards the bridge

Proprietary and Confidential

Page 112

What is a service point?

SP

Service#1

SP

3
SP

SP

4
SP

Service#2

SP

Proprietary and Confidential

Services in IP-20 Family

10

Page 113

IP-20 Services
IP20N supports the following services types:
1. Point-to-Point Service (P2P)
2. Multipoint Service (MP)
3. Management Service (MNG)
4. Point-to-Multipoint Service (E-Tree)

E-Tree services are planned for future release.

Proprietary and Confidential

11

Point to Point Service (P2P)


Point-to-point services are used to provide connectivity between two
interfaces of the network element.
When traffic ingresses via one side of the service, it is immediately directed
to the other side according to ingress and egress tunneling rules.
This type of service contains exactly two service points and does not require
MAC address-based learning or forwarding

PIPE

PIPE
SAP

SAP

Proprietary and Confidential

12

Page 114

Multipoint Service (MP)

Multipoint services are used to provide connectivity between two or more service points.
When traffic ingresses via one service point, it is directed to one of the service points in the
service, other than the ingress service point, according to ingress and egress tunneling rules, and
based on the learning and forwarding mechanism.
If the destination MAC address is not known by the learning and forwarding mechanism, the
arriving frame is flooded to all the other service points in the service except the ingress service
point.

1
SAP

SNP

2
SAP

SNP

Proprietary and Confidential

13

Management Service (MNG)

Traffic ports TCC

Management ports TCC

The management service is a multipoint service that connects the two local
management ports, the network element host CPU, and the traffic ports into a single
service. The service behavior is same as the Multipoint service behavior.
The management service is pre-defined with Service ID 1025.

CPU
1
4
2

SAP

SNP

Service ID 1025
2

Proprietary and Confidential

14

Page 115

Service Attributes

Service ID - 1 - 1024

Service Type P2P, MP, MNG

Service Admin Mode Operational, Reserved

EVC-ID - Ethernet Virtual Connection ID (End-to-end).

EVC Description

Maximum Dynamic MAC Address Learning per Service

Static MAC Address Configuration

CoS Mode & Default CoS

xSTP Instance The spanning tree instance ID (1-63)

Split Horizon Group - (Enable/Disable)

Proprietary and Confidential

15

IP-20 Service Points

16

Page 116

Service points

SAP
SNP
Pipe Service Point
Management Service Point

Proprietary and Confidential

Service Access Port SAP & Service Network Point SNP

Proprietary and Confidential

18

Page 117

Service Access Port SAP & Service Network Point SNP

Proprietary and Confidential

19

Management (MNG) Service Point


Only used for management services

Proprietary and Confidential

20

Page 118

Pipe Service Points


Pipe Service Point Used to create traffic connectivity between two
points in a port-based manner (Smart Pipe). In other words, all the
traffic from one port passes to the other port. Pipe service points are
used in Point-to-Point services

PIPE
SAP

PIPE
SAP

PIPE
SAP

Proprietary and Confidential

21

Service points classification

22

Page 119

PIPE
SAP

Service Point Interface Types


InterfaceType

Typesof Frames

AppliestoSPType

Dot1q

AsingleCVLANisclassifiedintotheservice
point

All

Stag

AsingleSVLANisclassifiedintotheservice
point

SNMPandMNG

BundleC

AsetofCVLANsisclassifiedintotheservice
point

SAP

BundleS

AsingleSVLANandaset ofCVLANare
classifiedintotheservicepoint

SAP

AlltoOne

AllCVLANs,SVLANswithTPIDdiffthanthe
systemone anduntaggedframesthatenter
theinterfaceareclassifiedintotheservice
point

SAP

QinQ

AsingleSVLANandCVLANcombinationis
classifiedintotheservicepoint

SAPandMNG

Proprietary and Confidential

23

Service Points

Service

Proprietary and Confidential

24

Page 120

Service

Proprietary and Confidential

25

Service Point Types that can Co-Exist on the Same Interface

Proprietary and Confidential

26

Page 121

Service Point Types that can Co-Exist on the Same Interface

Proprietary and Confidential

27

Example of dot1q services

TheclassificationtoPtP1andPtP2isbased
ononecvlan.
PtP 1usessamecvlan astheclassification
atbothends
PtP 2usesdifferentcvlan asthe
classificationatbothends.
PtP1 andPtP2usesthetransportvlan
insidethenetwork.Theoriginalcvlan is
notsentinsidethenetwork.
CVlan
SAP3

10

SAP3

ptp 1
SAP1

CVlan
10

SAP1

20

SAP2

CVlan
SAP4

SAP2

120

ptp 2

TransportVlan

EVC

100

ptp1

200

ptp2

Proprietary and Confidential

28

Page 122

SAP
SNP

SAP4

Example of bundle services

TheclassificationtoPtP1andPtP2isbased
onseveralcvlans.
PtP1 andPtP2usesthetransportvlan
insidethenetwork.Theoriginalcvlan is
preservedandsentinsidethenetwork.

CVlan
SAP3

10,11

SAP3

ptp 1
SAP1

CVlan
10,11

SAP1

20,21

SAP2

CVlan
SAP4

SAP2

20,21

SAP4

ptp 2

TransportVlan

EVC

100

ptp1

200

ptp2

29

SAP
SNP

Proprietary and Confidential

Example of Q-in-Q services

TheclassificationtoPtP1andPtP2isbased
onapairofcvlan andsvlan.
PtP1 andPtP2usesthetransportvlan
insidethenetwork.Theoriginalcvlan and
svlan isnotsentinsidethenetwork.

SAP3

SVlan

CVlan

230

10

SAP3

ptp 1
SAP1

SAP4

SAP2

SVlan

CVlan

340

320

ptp 2

SVlan

CVlan

230

10

SAP1

240

20

SAP2

TransportVlan

EVC

100

ptp1

200

ptp2

SAP
SNP
Proprietary and Confidential

30

Page 123

SAP4

Service points Attributes

31

Service Point Attributes


As described above, traffic ingresses and egresses the service via service
points. The service point attributes are divided into two types:
Ingress Attributes Define how frames are handled upon ingress, e.g.,
policing and MAC address learning.
Egress Attributes Define how frames are handled upon egress, e.g.,
preservation of the ingress CoS value upon egress, VLAN swapping.

Proprietary and Confidential

Page 124

Service Point Attributes


General

Ingress

Egress

ServicePointID

LearningAdmin

CVLANCoS Preservation

Service PointName

AllowFlooding

CVLAN Preservation

ServicePointType

AllowBroadcast

SVLANCoS Preservation

Interface

CoS Mode

MarkingAdmin

InterfaceType

DefaultCoS

ServiceBundle ID

CVLANEncapsulation
SVLANEncapsulation

Proprietary and Confidential

33

Service Point General Attributes


General

Service Point ID number for service point inside


the same service

Service Point Name The Name for service point


if is needed
ServicePointID
Service PointName
ServicePointType
Interface
InterfaceType
CVLANEncapsulation
SVLANEncapsulation

Service Point Type- SAP, SNP, MNG, PIPE


Interface - The logical interface on which the
service point is located

Interface Type Dot1q, S-Tag, Bundle-C, BundleS, All-to-One, Q-in-Q

C-Vlan Encapsulation - The C-VLAN classified

into the service point


S-Vlan Encapsulation - The S-VLAN classified
into the service point

Proprietary and Confidential

34

Page 125

Service Point Interface Types


InterfaceType

Typesof Frames

AppliestoSPType

Dot1q

AsingleCVLANisclassifiedintotheservice
point

All

Stag

AsingleSVLANisclassifiedintotheservice
point

SNMPandMNG

BundleC

AsetofCVLANsisclassifiedintotheservice
point

SAP

BundleS

AsingleSVLANandaset ofCVLANare
classifiedintotheservicepoint

SAP

AlltoOne

AllCVLANs,SVLANswithTPIDdiffthanthe
systemone anduntaggedframesthatenter
theinterfaceareclassifiedintotheservice
point

SAP

QinQ

AsingleSVLANandCVLANcombinationis
classifiedintotheservicepoint

SAPandMNG

Proprietary and Confidential

35

Service Point Ingress Attribute


Learning Admin - Indicates whether MAC
Ingress

LearningAdmin

AllowFlooding
AllowBroadcast

CoS Mode
DefaultCoS

address learning is enabled or disabled


Allow Flooding - Indicates whether incoming
frames with unknown MAC addresses are
forwarded to other service points via flooding
Allow Broadcast - Indicates whether frames with
a broadcast destination MAC address are allowed
to ingress the service via this service point
CoS Mode - Indicates how the service point
handles the CoS of frames that pass through the
service point.
Default CoS The service point CoS. If the CoS
Mode is set to overwrite the CoS decision made at
the interface level, this is the CoS value assigned
to frames that ingress the service point.

Proprietary and Confidential

36

Page 126

Service Point Egress Attribute


C-Vlan CoS Preservation - Indicates whether the
Egress

CVLANCoS Preservation
CVLAN Preservation

SVLANCoS Preservation
MarkingAdmin
ServiceBundle ID

original C-VLAN CoS value is preserved or


restored for frames egressing from the service
point
C-Vlan Preservation - Indicates whether the
original C-VLAN ID is preserved or restored for
frames egressing from the service point
S-Vlan CoS Preservation - Indicates whether the
original S-VLAN CoS value is preserved or
restored for frames egressing from the service
point
Marking Admin - Indicates whether re-marking of
the outer VLAN (C-VLAN or S-VLAN) of tagged
frames that pass through the service point is
enabled
Service Bundle ID - This can be used to assign
one of the available service bundles from the HQoS hierarchy queues to the service point
Proprietary and Confidential

37

Ethernet Service Points GUI


General

ServicePointID
Service PointName
ServicePointType
Interface
InterfaceType
CVLANEncapsulation
SVLANEncapsulation
Ingress

LearningAdmin
AllowFlooding
AllowBroadcast
CoS Mode
DefaultCoS
Egress

CVLANCoS Preservation
CVLAN Preservation
SVLANCoS Preservation
MarkingAdmin
ServiceBundle ID
Proprietary and Confidential

38

Page 127

Logical Vs. Physical Interface

39

Logical and physical interface

Proprietary and Confidential

40

Page 128

Service Demo

41

Creating the Service

Proprietary and Confidential

42

Page 129

Attaching Service Points

Proprietary and Confidential

43

Attaching Service Points

Proprietary and Confidential

44

Page 130

Attaching Service Points

Proprietary and Confidential

45

Questions?

Proprietary and Confidential

46

Page 131

Thank You

Page 132

IP-20G Licensing

July 2014
Version 2

Agenda
Licensing in General
Demo License
CeraOS License concept
IP-20 Licensing Scheme
Licensed Features

Proprietary and Confidential

Page 133

Licensing

IP-20G offers a pay as-you-grow licensing concept in which


future capacity growth and additional functionality can be
enabled with license keys.
For purposes of licensing, each IP-20G chassis is considered
a distinct device, regardless of which cards are included in the
chassis. Each device contains a single license key.
Licenses are divided into two categories:
Per Carrier The license is per carrier
Per Device The license is per device, regardless of the
number of carriers supported by the device.

Ceragon provides a web-based License Management


System (LMS). The LMS enables authorized users to
generate license keys, which are generated per IDU serial
number.

A 1+1 HSB configuration requires the same set of licenses for


both the active and the protected interfaces.

Proprietary and Confidential

License Management System

Proprietary and Confidential

Page 134

License generating

License is generated according to chassis SN


Proprietary and Confidential

DEMO License
A demo license is available that enables all features for 60 days.
The demo license expires 60 days from the time it was activated,
and the most recent valid license goes into effect.

The 60-day period is only counted when the system is powered up.
10 days before the demo license expires, an alarm is raised
indicating to the user that the demo license is about to expire.

Proprietary and Confidential

Page 135

IP-20 Pricing Concept (Value Structure)


Hardware, Software & Licensed Features

CeraOS (Software)
LicensedPremiumFunctionality

LicensedScalability

Radiocapacity
2nd modem/core
activation(IP20G/C)
AdditionalGEuser
interfaces
AdditionalCETNode
services/EVCs(L2)

Advancedradioconfigurations
AdvancedQoS
EthernetOAM
TDMPWservices
Synchronization
NetworkResiliency
AdvancedSecurity

LicensedMode CETNode

CETservices/EVCs(L2)
2xGEuserinterfaces

SmartPipeservices(L1)
10Mradiocapacity
1xGEuserinterface
NativeTDMservices

Baseline
functionality

Hardware

ProductModels (e.g.IP20G,IP20G,IP20C,IP20LH)
Assemblyoptions (e.g.single/dualmodeminIP20G)
Addonmodules (e.g.RMCinIP20G)
Proprietary and Confidential

IP-20 Licensing Scheme


Per Carrier

Per Node Premium Functionality

Scalability

Radio capacity

Enhanced Packet Buffer


Frame Cut Through
H-QoS

Advanced radio configurations

ACM
XPIC
Multi-Carrier ABC
MIMO
Header De-duplication

Sync-Unit
IEEE-1588 TC
IEEE-1588 OC
IEEE-1588 BC

Redundancy/Resiliency group
Network Resiliency
Main Card Redundancy

CET-Node mode/scalability

Edge (8 services/EVCs)
Agg-Lvl-1 (64 services/EVCs)
Agg-Lvl-2 (1024 services/EVCs)

Sync group

Per Node scalability

QoS group

Ethernet OAM group


Eth-OAM FM
ETH-OAM PM

General node scalability


2nd

modem activation (IP-20G only)


2nd core activation (IP-20C only)
GE user interfaces

TDM group

Security

TDM PW
Secure management

Proprietary and Confidential

Page 136

Licensed Features
LicenseName

RadioCapacity

Adaptive CodingModulation
ACM

HeaderDeDuplication

Description
Enablesyoutoincreaseyoursystemsradiocapacityin
gradualstepsbyupgradingyourcapacitylicense.
Withoutacapacitylicense,eachcarrierhasacapacity
of10Mbps.Licensedcapacityisavailablefrom25Mbps
to500Mbps.EachRMCcardcanbelicensedfora
differentcapacity.
EnablestheuseofAdaptiveCodingandModulation
(ACM)scripts.Aseparatelicenseisrequiredpercore.

EnablestheuseofHeaderDeDuplication,whichcanbe
configuredtooperateatL2throughL4.

EnablestheuseofCrossPolarizationInterfaceCanceller
CrossPolarizationInterfaceCanceller
(XPIC).Aseparatelicenseisrequiredforeachcorein
(XPIC)
theXPICpair.

Proprietary and Confidential

Licensed Features
LicenseName

FE/GEPortEnabling

SmartPipemode

Description
EnablestheuseofaTCCEthernetportfortraffic.A
licenseisrequiredforeachTCCtrafficportthatisused
onthedevice,asfollows.Anyoftheselicensescanbe
installedmultipletimeswithdynamicallocationinside
theunit.
FEPortEnabled EnablesanEthernetportonthe
TCCoronanEthernetLICinFEmode(10/100baseT
only).
GEPortEnabled EnablesanEthernetportonthe
TCCoronanEthernetLICinFEorGEmode
(10/100/1000baseTor1000baseX).
FEtoGE PortUpgrade Converts an FEportlicense
toaGEportlicense.
EnablesSmartPipemode.WhenSmartPipemodeis
enabled,1xGEinterfaceisenabledbydefault.

Proprietary and Confidential

10

Page 137

Licensed Features
LicenseName

EdgeCETNode

Description
EnablesCarrierEthernetTransport(CET)andanumber
ofEthernetservices(EVCs),dependingonthetypeof
CETNodelicense:
EdgeCETNode Upto8EVCs.
AggregationLevel1CETNode Upto64EVCs.
AggregationLevel2CETNode Upto1024EVCs.
ACETNodelicensealsoenablesthefollowing:
Networkresiliency(MSTP/RSTP)forallservices.
Full QoSfor all services including basic queue buffer
management (fixed queues buffer size limit,tail
drop only)andeight queues perport,noHQoS.
LAGSupport

NetworkResiliency

Enablesthefollowingprotocolsforimprovingnetwork
resiliency:
G.8032
TDM(PW)services1:1pathprotection
Proprietary and Confidential

11

Licensed Features
LicenseName
HQoS

EnhancedPacketBuffer
Management(QoS)

SyncUnit
SyncOverPacketOptimized
Transport
TDMTimeSlot Suppression

Description
EnablesHQoS.Thislicenseisrequiredtoaddservice
bundleswithdedicatedqueuestointerfaces.Without
thislicense,onlythedefaulteightqueuesperportare
supported.
Enables configurable (nondefault)queue buffer size
limitfor Green andYellow frames.Also enables WRED.
The defaultqueue buffer size limitis 0.5Mbits for
Green frames and0.25Mbits for Yellow frames.
EnablestheG.8262synchronizationunit.Thislicenseis
requiredinordertoprovideendtoendsynchronization
distributiononthephysicallayer.Thislicenseisalso
requiredtouseSynchronousEthernet(SyncE).
Enables Syncoverframe optimized transport.
EnablesCESoP PWmodeonallinstalledSmartTDM
cards.Withoutthislicense,onlySAToP PWmodeis
supported.
Proprietary and Confidential

12

Page 138

Licensed Features
LicenseName

Description

FrameCutThrough

EnablesFrameCutThrough.
EnablestheuseofasecondTCCina2RUchassisfor
TCCredundancy.

MainCard Redundancy

Ethernet OAM Fault Management

EnablesConnectivityFaultManagement(CFM)per
802.1agand802.3ah.
Enablessecuremanagementprotocols(SSH,HTTPS,
SFTP,SNMPv3,andRADIUS)

SecureManagement

Proprietary and Confidential

13

IP-20 licensing scheme CET-Node Mode


# of bundled
GE ports
for user traffic

Management
Service

Native TDM
services

"Pipe" (L1)
Eth services

# of CET (L2)
Eth services
( PtP / MPtMP /
TDM PW* )

Base (no license)

Yes

Unlimited

Unlimited

Edge-CET-Node

Yes

Unlimited

Unlimited

Agg-Lvl-1-CET-Node

Yes

Unlimited

Unlimited

64

Agg-Lvl-2-CET-Node

Yes

Unlimited

Unlimited

1024

License

* TDM-PW license key is required to enable TDM PW services.

Proprietary and Confidential

14

Page 139

License

Proprietary and Confidential

15

License features available

Proprietary and Confidential

16

Page 140

Thank You

Page 141

Page 142

Native TDM

Ceragon Training Services


July 2014 Version 2

Agenda
Native TDM Services
Hybrid Service Engine TDM + Ethernet
All-packet services example: Ethernet EVCs + TDM Pseudowire
How to Setup Native TDM

Proprietary and Confidential

Page 143

Native TDM Services


IP-20G provides integrated support for transportation of TDM (E1) services
with integrated E1 and ch-STM-1 interfaces.

Two types of TDM services are supported using the same hardware:
Native TDM trails
TDM Pseudowire services (enabling interoperability with third party
packet/PW equipment)

IP-20G provides native TDM support, utilizing a cross-connect module to


support up to 512 TDM trails.

The IP-20G Web EMS provides a simple and easy-to-use GUI that enables
users to provision end-to-end TDM trails. The Services Provisioning GUI
includes the following trail-creation end points:
TDM interface
Radio interface
Proprietary and Confidential

Hybrid Services Engine Ethernet + TDM


Services engine
TDM cross-connect (VCs)

TDM
traffic

E1
Ch-STM1

TDM
PW

Network processor (EVCs)

Hybrid
Radio
Packet
traffic

GE/FE

Native TDM Services (VCs)


Ethernet Services (EVCs)
Ethernet switched (L2) services E-Line (PtP), E-LAN (MPtMP)

Ethernet port based (L1) services (smart pipe)


TDM Pseudowire services Unstructured (SAToP), Structured (CESoP)

Proprietary and Confidential

Page 144

Hybrid services example: Ethernet EVCs + Native TDM


TDM cross-connect (VCs)

E1/
ch-STM1

Port

SAP

Ethernet Services (EVCs)


PtP Service

User Port
(UNI)
GE/FE

TDM
traffic

Port

SAP
SAP

SNP
SAP

Packet
traffic

Hybrid
Radio

MPtMP Service
User Port
(UNI)
GE/FE

SAP

Network
Port

SNP

Port

Port

SAP

GE/FE

SNP

Proprietary and Confidential

All-packet services example: Ethernet EVCs + TDM Pseudowire


Ethernet Services (EVCs)
TDM
PW
E1/DS1/
ch-STM1/
OC3

Port

PtP Service

SAP
SAP

SNP
SAP

PtP Service

User Port
(UNI)
GE/FE

Port

S-VLAN =
200
SAP
SAP

SNP
SAP

Packet
traffic

Packet
Radio

MPtMP Service
User Port
(UNI)
GE/FE

SAP

Network
Port

SNP

Port

Port

SAP

SNP

Proprietary and Confidential

Page 145

GE/FE

How to Setup Native TDM

Native TDM Configuration


VC1

VC2

VC3

VC4

VC5

VC6

VC7

VC8

VC9

VC10 VC11 VC12

VC13 VC14 VC15 VCn

E1#1-16 (or STM-1 VC)


Loop Timing

TDM
Network
8

Proprietary and Confidential

Page 146

TDM Service Configuration 1

As first we have to create any Eth. service for Radio port, because
we need specify which type of traffic will be carry by Radio.
Create any service point which is connected to the radio port in
Ethernet/Services
Proprietary and Confidential

TDM Service Configuration 2

1
2
3

1 Select required TDM card


2 Select required E1or VC
3 Select Timing
Loop Timing Timing is taken from incoming traffic.
Recovered Clock Clock information is recovered on the egress path. Extra information may be located
in an RTP header that can be used to correct frequency offsets. Recovered Clock can provide very
accurate synchronization, but requires low PDV (Packer Delay Variation).
System Reference Clock Trails are synchronized to the system reference clock.
Front Panel Trails are synchronized from Front Panel synch. port.
Proprietary and Confidential

10

Page 147

Native TDM Configuration

Select Required TDM Card and Timing

E1#1-1
Proprietary and Confidential

11

TDM Service Configuration

Select VC for radio slot

VC1

VC2

VC3

VC4

VC5

VC6

VC7

VC8

VC9

VC10 VC11 VC12

VC13 VC14 VC15 VCn


E1#1-1

Proprietary and Confidential

12

Page 148

TDM Service Configuration

In remote end it needs to be set vice


versa according to drawing below

Proprietary and Confidential

13

TDM Service Configuration

Selection Summary
Proprietary and Confidential

14

Page 149

Thank You

Page 150

Configuration Management &


Software Download

Ceragon Training Services


July 2014, ver 3

Agenda

Backup and Restore


Software Download

Proprietary and Confidential

Page 151

Backup & Restore

Backup and Restore


Backup and restore can be used for

Restoring configuration upon unit replacement


Duplicating configuration
Three restore points
Restore point are manually created
Backup file is generated from a restore pointed
Once a backup file is imported to a unit it can be restored

Proprietary and Confidential

Page 152

Backup Process

Backup Configuration File Idea


1.
2.
3.
4.
5.
6.

Install FTP server We recommend to use FileZilla Server (not Client)


Setup FileZilla Server parameters (Users, Shared Folders)
Synchronize Time via CLI
platform management time-services utc set date-and-time 30-01-2014,15:07:58
Setup communication parameters for IP20 unit with FTP Server
Create Configuration Backup inside IP20 unit
Export Configuration Backup to FTP server

Export
File

FTP IP address

Proprietary and Confidential

Page 153

2. FTP Setup FileZilla Settings


1. Install FileZilla Server and Run it
2. Create User in FileZilla Server

Proprietary and Confidential

2. FTP Setup FileZilla Settings


3. Create shared folder in FTP Server PC (C:\ Backups)
4. Setup all permissions for this folder in FTP Server

FTP SERVER PC

FileZilla settings in FTP SERVER PC

5. Check Firewall settings in FTP Server PC and if port 21 is used only with
FileZilla
Proprietary and Confidential

Page 154

3. IP20G Configuration Management Settings


Setup Parameters for FTP Server Connection
Status for File transfer

Status for for Backup creation

User name and password


must be same as in FileZilla
Server
FTP Server IP address
Path in Server (This setup means that
file will be uploaded in C:\Backups)
Name.zip (.zip is MANDATORY)

!!!

Restore point selection


Time installation for future releases

Proprietary and Confidential

4. Backup process
6. Check Export status

4. Check Status

1. Setup Configuration parameters


included Restore Point which will be
used for Configuration Backup inside
the system

2. Apply 5. Export

3. Backup

Proprietary and Confidential

10

Page 155

Restore Process

Restore Configuration File Idea


1. Install FTP server (when is not already installed) we recommend to use FileZilla
Server (Not Client)
2. Setup FileZilla Server parameters (Users, Shared Folders)
3. Setup communication parameters for IP20 unit with FTP Server
4. Synchronize Time via CLI
platform management time-services utc set date-and-time 30-01-2014,15:07:58

5. Import Configuration Backup from FTP Server


6. Restore Configuration Backup

Import File

FTP IP address

Proprietary and Confidential

12

Page 156

3. IP20 Configuration Management Settings


Setup Parameters for FTP Server Connection
Status for File transfer

Status for Backup creation

User name and password


must be same as in FileZilla
Server
FTP Server IP address
Path in Server (Means that file will be downloaded
from Home FileZilla directory in our case
C:\Backups)

Name.zip (.zip is MANDATORY)

!!!

Restore point selection


Time installation for future releases

Proprietary and Confidential

13

Restore process
4. Check Import status

6. Check Restore status

1. Setup Configurations parameters


included Restore point 1-3

2.Apply

3.Import

5 Restore

RESTORE CONFIGURATION WILL NOT CHANGE CURRENT IP ADDRESS !!!


Proprietary and Confidential

14

Page 157

Config_Dump File

Proprietary and Confidential

15

Software Download for IDU

16

Page 158

Software Download Idea for IDU


1. Before performing a software upgrade, it is important to verify that the system date
and time are correct.
2. Install FTP server (when is not already installed) we recommend to use FileZilla
Server (Not Client)
3. Setup FileZilla Server parameters (Users, Shared Folders)
4. Setup communication parameters for IP20 unit with FTP Server
5. Synchronize Time via CLI
platform management time-services utc set date-and-time 30-01-2014,15:07:58

6. UnZip software package for IP-20 to FTP Server shared folder


7. Download software from FTP Server
8. Install downloaded software
Software

Download

Although RFU software is included in the standard installation bundle, the current
software version is not automatically updated in the RFU when an installation is
performed.
To upgrade the software in an RFU, you must perform the upgrade manually, per slot
Proprietary and Confidential

17

IP-20 Software Download Settings

User name and password


must be same as in FileZilla
Server
FTP Server IP address

Path in FTP Server (This setup means


that configuration files will be
downloaded from Home FileZilla
directory)

Proprietary and Confidential

18

Page 159

Software process download


4. Check Download Status
6. Check Installation Status

1. Setup
Parameters

2. Apply

5. Install Downloaded Software


3. Download
Software Files
from FTP Server
Proprietary and Confidential

19

RFU Software Installation

20

Page 160

RFU Software Installation


Although RFU software is included in the standard installation bundle, the
current software version is not automatically updated in the RFU when an
installation is performed.
To upgrade the software in an RFU, you must perform the upgrade manually, per
slot.
This enables you to manage IDU and RFU software versions separately.
In this version, you must use the Command Line Interface (CLI) to
upgrade RFU software.

Proprietary and Confidential

21

RFU Software Installation Procedure


1. The following sequence of commands installs RFU-C software version 2.13 in the
RFU connected to slot 3.
root> platform software show rfu versions

2. The next step is to perform the update and install commands:


root> platform software update rfu version slot 3 radio-port 1
root> platform software install rfu version slot 3 radio-port 1

3. To check the status of an update or install operation, enter the following command:
root> platform software show rfu status

4. Once the installation is complete, the Install Status column should indicate installation
success and the In Progress column should indicate 100 (100%).
5.When the installation is complete, enter the show rfu versions command again to verify
that the new version has been properly installed in both the TCC and the RFU:
root> platform software show rfu versions

Proprietary and Confidential

22

Page 161

Thank You

Page 162

Troubleshooting

Ceragon Training Services


July 2014, ver 2

Agenda

Faults and Alarms


Performance monitoring
RMON statistic
Loopback

Proprietary and Confidential

Page 163

Faults and Alarms

Faults
Current Alarms

Event Log

Proprietary and Confidential

Page 164

Alarm Configuration

Proprietary and Confidential

Performance Monitoring - Radio

Page 165

Radio Parameters

Profile
0
1
2
3
4
5
6
7
8
9
10

Mod
QPSK
8PSK
16QAM
32QAM
64QAM
128QAM
256QAM
512QAM
1024 QAM SFEC
1024 QAM WFEC
2048QAM

MSE Down-Threshold
-16
-17
-21
-24
-27
-30
-32
-35
-36
-39

MSE Up-Threshold
-18
-19
-23
-26
-29
-32
-34
-37
-38
-41

Applicable for both 28/56MHz , 2048 QAM will be supported in 7.9

The values are typical and subject to change in relation to the frequency and RFU
type. For more details please contact your Ceragon representative
Proprietary and Confidential

Radio Parameters Defected Blocks

Proprietary and Confidential

Page 166

MRMC actual status

Proprietary and Confidential

Signal Level

Proprietary and Confidential

10

Page 167

MSE Mean Square Error

Proprietary and Confidential

11

MRMC

Proprietary and Confidential

12

Page 168

Capacity, Throughput, Utilization, Frame Error State

Proprietary and Confidential

13

Performance Monitoring Ethernet Services

Page 169

ETH PM RMON

Proprietary and Confidential

15

PM RMON Special Registers


RMONregister /Counter

Description

Undersizeframesreceived

Framesshorterthan64bytes

Oversizeframesreceived

Frameslongerthan2000bytes

Jabberframesreceived

Totalframesreceivedwithalengthofmorethan2000bytes,
butwithaninvalidFCS

Fragmentsframesreceived

Totalframesreceivedwithalengthoflessthan64
bytes,andaninvalidFCS

Rxerrorframesreceived

TotalframesreceivedwithPhyerror

FCSframesreceived

TotalframesreceivedwithCRCerror,notcounteredin
"Fragments","Jabber"or"Rxerror"counters

Pauseframesreceived

Numberofflowcontrolpauseframesreceived

Proprietary and Confidential

16

Page 170

Troubleshooting with RMON: Oversized frames


Site A
T

Site B
T

Tagged Frames with frame


size > 2000 bytes

Wheningressframesexceedthemaximumframesize,RMONcounterOversizedframesreceived
isupdatedaccordingly

Proprietary and Confidential

17

Troubleshooting with RMON: Discarding Example


Site A
T

Site B
T

Ingress traffic does not


comply to Policer rules

DiscardingExamples:
Ingressrate>RateLimiter
IngressframesdonotqualifytoPolicer rules

Proprietary and Confidential

18

Page 171

Troubleshooting with RMON: Monitoring specific traffic types

Site A

Site B
Rate Limiter

Monitor

VideostreamsaregenerallytransmittedoverUDP
withmulticastaddresses
Tomonitortraffic,checkouttheMulticastFrames
Receivedregister
TolimitMCtraffic,assignaPolicer withaMCCIR
rules
Proprietary and Confidential

19

Performance Monitoring TDM Services

Page 172

TDM Line Alarms

An example: Line alarms number 1040 = ( 10000010000 ) = 1024 + 16


It means that 1024 is Transceiver Loss of Multi-frame and 16 is Transceiver AIS alarm

Proprietary and Confidential

21

TDM port PMs Table

Proprietary and Confidential

22

Page 173

Loopbacks

RFU RF Loopback

IF LB
RFU RF LB

Proprietary and Confidential

24

Page 174

TDM Loopback

Proprietary and Confidential

25

Thank You

Page 175

Page 176

Course Evaluation Form


Dear Customer!
Thank you for taking the time to complete the following course evaluation form. Your
commentary and feedbacks are of great importance to us as we analysis and investigate each
course and report. The information you provide will be used to help us improve the content of
the course and monitor the quality of our training program.
Thank You,
Oren Gerstner,
Training Director

Course details
Location
Course Name / ID
Start Date (d/m/year)

End Date (d/m/year)

Instructor Name
Company / Customer
Please rate your satisfaction with the course from 1 to 5 (1 = poor and 5 = excellent):
Did the course meet your expectations?

Was the course well organized?

Training facility & Environment

Was the difficulty of the course in line


with your expectations?

The instructor was well prepared

Instructors level of knowledge

Instructors presentation skills

Instructors willingness to help

Audience was treated respectfully

Language was clear and understood

Course book

Level of practical exercises (when relevant)

Setup and lab functionality (when relevant)

Usefulness Level of practical exercises (when relevant)

Overall satisfaction from the training session

Your comments:

Course Evaluation Form

Page 177

Page 1 of 1

Thispagewasintentionallyleftblank.

Das könnte Ihnen auch gefallen