Beruflich Dokumente
Kultur Dokumente
COURSE HANDBOOK
Commissioning | Installation | System Configuration
December
www.ceragon.com
2014
Copyright 2012 Ceragon Networks Ltd. cts.ceragon.com
FibeAir IP‐20G Ceragon Training Course
Table of Content
Intro to Radio Systems ………………………………………………………………………………………………………… 005
Introduction to Ethernet ……………………………………………………………………………………………………… 029
IP‐20G Overview………………………………………………………………………………………………………………….. 047
Radio Frequency Units…………………………………………………………………………………………………………. 061
IP‐20G Installation Guide…………………………………………………………………………………………………….. 077
First Login…………………………………………………………………………………………………………………………... 103
Radio Link Parameters…………..…………………………………………………………………………………………… 115
ACM & MSE….…………………………………………………………..…………………………………………………………. 121
Automatic Transmit Power Control – ATPC………………………………………………………………………… 133
IP‐20G Licensing………………………………………………………………………………………………………………… 139
Service Model in IP‐20………………………….……………………………………………………………………………. 149
Quality of Service ‐ QoS …………………………………………………………..………………………………………. 173
XPIC Configuration……………………………….…………………………………………………………………………….. 199
Protection System Configuration……………………………………………………………………………………….. 207
Configuration Management & Software Download…………………………………………………………… 215
Native TDM ………………………………………………………………………………………………………………………… 229
TDM Pseudowire………………………………………………………………………………………………………………… 243
Troubleshooting………………………………………………………………………………………………………………….. 365
MSTP…………………………………………………………………………………………………………………………………. 283
G.8032……………………………………………………………………………………………………………………………….. 305
Synchronous Ethernet ‐ Sync E…………………………………………………………………………………………… 325
Security Features………………………………………………………………………………………………………………… 339
Link Layer discovery Protocol ‐ LLDP …………………………………………………………………………………… 347
Frame Cut‐Through …………………………………………………………………………………………………………….. 351
Cascading Port ……………………………………………………………………………………………………………………. 355
Automatic State Propagation……………………………………………………………………………………………… 361
CERAGON TRAINING PROGRAM – IP‐20G Advanced Training Course Sw 7.9
Page 3
FibeAir IP‐20G Ceragon Training Course
Link Aggregation Group ‐LAG…………………………………………………………………………………………….. 365
Course Evaluation Form………………………………………………………………………………………………………. 373
CERAGON TRAINING PROGRAM – IP‐20G Advanced Training Course Sw 7.9
Page 4
Introduction to Radio Systems
October 2014
Version 3
Agenda
• Radio Relay Principles
• Modulation
Page 5
Digital Transmission Systems
f1
RF Signal
f1’
Path Terrain
Page 6
High and Low frequency station
Frequency shift:
1,3H 1,3V 2,4V 2,4H 1,3H
Tx Tx Tx Tx Tx
Page 7
Preferred site location structure
Input
signal
Z' E' A' B' C' D'
Digital Branching
Modulator Transmitter RF Tx Filter Feeder
Line interface Network(*)
TRANSMITTER PATH
D C B A E Z
Branching RF Rx Filter Demodulator Digital
Feeder Receiver
Network(*) Line interface Output
signal
RECEIVER PATH
Page 8
RF Principals
• RF - System of communication employing electromagnetic waves
(EMW) propagated through space
• EMW travel at the speed of light (300,000 km/s)
• The wave length is determined by the frequency as follows -
RF Principals
• We can see the relationship between colour, wavelength and amplitude
using this animation
Page 9
Radio Spectrum
12
Page 10
Parameters Affecting Propagation
• Dispersion
• Humidity/gas absorption
• Multipath/ducting
• Atmospheric conditions (refraction)
• Terrain (flatness, type, Fresnel zone clearance, diffraction)
• Climatic conditions (rain zone, temperature)
• Rain attenuation
Page 11
Parameters Affecting Propagation
Atmospheric Refraction
With Atmosphere
No Atmosphere
15 Proprietary and Confidential
Wave in atmosphere
Page 12
Parameters Affecting Propagation – Multipath
• Multipath occurs when there is more then one beam reaching the receiver
with different amplitude or phase
• Multipath transmission is the main cause of fading in low frequencies
Direct beam
Delayed beam
Duct Layer
Duct Layer
Terrain
Page 13
Parameters Affecting Propagation - Polarization and
Rain
• Raindrops have sizes ranging from 0.1 millimeters to 9 millimeters
mean diameter (above that they tend to break up)
• Smaller drops are called cloud droplets, and their shape is spherical.
• As a raindrop increases in
• size, its shape becomes more
• oblate, with its largest
cross-section facing the
• oncoming airflow.
Page 14
Parameters Affecting Propagation – Rain Fading
3rd
2nd
1. EMW propagate in beams
1st RX
2. Some beams widen – therefore, their path is longer
TX
3. A phase shift is introduced between the direct and indirect
beam
4. Thus, ring zones around the direct line are created
Duct Layer0
Terrain
Page 15
Parameters Affecting Propagation – Fresnel Zone
• Obstacles in the first Fresnel zone will create signals that will be 0 to 90 degrees out
of phase…in the 2nd zone they will be 90 to 270 degrees out of phase…in 3rd zone,
they will be 270 to 450 degrees out of phase and so on…
• Odd numbered zones are constructive and even numbered zones are destructive.
• When building wireless links, we therefore need to be sure that these zones are kept
free of obstructions.
• In wireless networking the area containing about 40-60 percent of the first Fresnel
zone should be kept free.
Page 16
RF Link Basic Components – Parabolic Reflector Radiation (antenna)
1,9V
1,6V
1,3V
Page 17
Main Parabolic Antenna Types
Passive Repeaters
Back-to-back
antennas
Plane
reflector
Page 18
Link Calculation – Basic Example (in vacuum)
Lfs
TSL Ga Lfsl Ga Lw
RSL ‐ Received Signal Level
Lb
TSL – Transmitted Signal Level
Lfsl ‐ Free‐space loss = 92.45 + 20 log x(distance in km x frequency in GHz)
Lf ‐ Filter loss
Lf
Lb ‐ Branching loss
Lw ‐ Waveguide loss
Ga – Antenna gain RSL
RSL=TSL+Ga‐Lfsl+Ga‐Lw‐Lb‐Lf
Atmospheric attenuation
Starts to contribute to the total attenuation above approximately 15GHz
Aa a d [dB]
Parameters in a:
Frequency
Temperature
Air pressure
Water vapour
Page 19
Objective examples
• Typical objectives used in real systems
• 99.999%
• Month: 25.9 sec
• Year: 5 min 12 sec
• 99.995 %
• Month: 2 min 10 sec
• Year: 26 min
• 99.99%
• Month: 260 sec
• Year: 51 min
Modulation
32
Page 20
Modulation
Modulation
Analog Digital
Modulation Modulation
Digital modulation
1 0 1 1 0 1 1 0
1 0 1 1 0 1 1 0
1 0 1 1 0 1 1 0
PSK modulation changes the phase to the transmitted
Modem
signal. The simplest method uses 0 and 1800 .
1 0 1 1 0 1 1
F1 F2 F1 F1 F2 F1 F1
Page 21
QAM Modulation
• Quadrature Amplitude Modulation employs both phase modulation
(PSK) and amplitude modulation (ASK)
• The input stream is divided into groups of bits based on the number
of modulation states used.
• In 8 QAM, each three bits of input, which provides eight values (0-7)
alters the phase and amplitude of the carrier to derive eight unique
modulation states
• In 64 QAM, each six bits generates 64 modulation states; in 128
QAM, each seven bits generate 128 states, and so on
• The points on the constellation are more distinct and data errors are
reduced
Page 22
Constellation diagram
• In a more abstract sense, it represents the possible symbols that may be
selected by a given modulation scheme as points in the complex plane.
Measured constellation diagrams can be used to recognize the type of
interference and distortion in a signal.
Page 23
4QAM VS. 16QAM
4QAM 16QAM
2048 QAM
Page 24
Bandwidth vs. Modulation
2-PSK
4-PSK
Modulation Bandwidth
Complixity Decreases
Increases 8-PSK
16-QAM
64-QAM
Signal / Noise
• Example: S/N influence at QPSK Demodulator
• Each dot detected in wrong quadrant result in bit errors
Signal
S/N Signal
Power
Power
Power
Power
S/N Signal
S/N S/N
Noise Noise Noise Noise
Page 25
BER Impact on Transmission Quality
10 -3
10 -4
10 -5
BER change ratio vs. Noise is
dependent on Noise Power distribution
and coding
10 -6
10 -7
BER
10 -8
-75 -72 -69 -66
Receiver input level [dBm ]
Fading Margin
Time (s)
Page 26
Thank you
45
Page 27
Page 28
Introduction to Ethernet
November 2014
Version 3
Agenda
• Local Area Network (LAN)
• Network Devices
• OSI Layers
• Ethernet Frame
• VLAN concept
Page 29
The Local Area Network (LAN)
Network Devices
The various devices used to build a data communication network can be classified into type of
equipment depending on how Ethernet packets are forwarded.
ROUTER
BRIDGE / SWITCH
HUB
Page 30
Functions of OSI layers
Network Routes data to different LANs and WANs based on network addresses
Data Link Transmits packets from node to node based on station address
Presentation SSL, SFTP, IMAP, SSH, Jpeg, GIF, TIFF, MPEG, MIDI, mp3
Page 31
Ethernet frame
Page 32
L2
L3
Page 33
L4
UDP Header
TCP Header
Inter-frame gap
Page 34
TCP Protocol
13
Page 35
Transmission Control Protocol
Page 36
TCP- Control field
Passive
Active open
open seq: 8000
UAPRS F
SYN
seq: 15000
Connection ack: 8001
opened nd: 5000
U A P R S F rw
SYN + ACK
seq: 8000
ack: 15001
UAPRS F
rwnd: 10000
ACK
Means “no data” !
seq: 8001 if piggybacking
18 Proprietary and Confidential
Page 37
TCP- Numbering System
• The bytes of data transferred in each connection are numbered.
Numbering starts with an arbitrarily generated number.
seq: 8001
Send
request ack: 15001
UAPRSF
Data Receive
bytes: 8001-9
000
Connection Termination
Page 38
TCP- Connection termination using three-way handshake
1
cwnd
RTT
2
cwnd
RTT
4
cwnd
RTT
8
cwnd
Page 39
TCP- Congestion Control:
Congestion avoidance, additive increase
Page 40
TCP- Calculating maximum throughput of one TCP stream
* Example:
VLAN concept
Page 41
Virtual Local Area Network (VLAN) concept
• Imagine that you have a network and three different customer
• Customer 1
• Customer 2
• Customer 3
NETWORK
VLANs are created to provide the segmentation services traditionally provided by routers
in LAN configurations
The most common protocol used today in configuring virtual LANs is IEEE 802.1Q
Page 42
OSI and TCP/IP model
OSI model OSI model
TCP/IP model
layers layers
Application Protocol
Application Application
Presentation Protocol
Presentation Presentation
Application DATA
Session Protocol
Session Session
Ethernet frame
Page 43
Untagged Ethernet Frame
4 Bytes
8 Bytes 6 Bytes 6 Bytes 2 Bytes 46 - 1500 Bytes (32-bit
CRC)
4 Bytes
TPID = 0x8100 TCI
Page 44
Tagging a Frame
• CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over
ETH backbones (some vendors may use CFI for internal purposes)
ARP 0x0806
It is important that you understand the Q‐in‐Q (CISCO) 0x8100
meaning and usage of this parameter Q‐in‐Q (other vendors) 0x88A8
Q‐in‐Q (other vendors) 0x9100
Q‐in‐Q (other vendors) 0x9200
RARP 0x8035
IP 0x0800
IPv6 0x86DD
PPPoE 0x8863/0x8864
MPLS 0x8847/0x8848
IS‐IS 0x8000
LACP 0x8809
802.1x 0x888E
Page 45
Q-in-Q
4 Bytes 4 Bytes
Thank you
36
Page 46
IP-20G Overview
December 2014
Version 3
Agenda
Page 47
FibeAir IP-20 Product Family
IP-20G
IP-20E IP-20S
IP-20C
IP‐20
Platform
IP-20LH
Compact
All-Outdoor
Terminal / Terminal /
Single-Carrier Single-Carrier
IP-10Q
Aggregation
Nodal Nodal
Page 48
FibeAir IP-X0 Product Line - 2012 (Introducing IP-20G)
Ethernet + Optional TDM Ethernet Only
Compact
All-Outdoor
Terminal / Terminal /
Single-Carrier Single-Carrier
IP-20G IP-10Q
Aggregation
C C
1+1 1+0
C C
IP‐20N
C
C
2+0
1+1
C
IP‐20N
C
C IP‐20N
1+0 C C
C
1+0
2+0
C
2+0 1+0
IP‐10G C C
IP‐20N
IP‐20G
C C
IP‐20G IP‐10G
Page 49
IP-20G Introduction
IP-20G hardware characteristics:
• 6 x 1 GE interfaces total
• 2 x dual mode GE electrical or cascading interfaces (RJ-45)
• 2 x GE electrical interfaces (RJ-45)
• 2x GE optical interfaces (SFP)
• Optional: 16 x E1 interfaces
• Single or dual radio interfaces (TNC)
• Single or dual power-feeds (-48v)
• Sync in/out interface
• Management interfaces
• Terminal – RS232 (RJ-45)
• 2x FE electrical interfaces (RJ-45)
• External alarms interface
• RFU-C, 1500HP / RFU-HP support
• IP-20G maintains high capacity, with up to 1024QAM modulation in its first SW release (T7.7),
and up to 2048QAM in future release
IP-20G Highlights
• Optimized tail/edge solution supporting seamless integration of radio (L1)
and end-to-end Carrier Ethernet transport/services (L2) functionality
• Rich packet processing feature set for support of engineered end-to-end
Carrier Ethernet services with strict SLA
• Integrated support for multi-operator and converged backhaul business
models, such as wholesale services and RAN-sharing
• Highest capacity, scalability and spectral efficiency
• High precision, flexible packet synchronization solution combining SyncE
and 1588v2
• Best-in-class integrated TDM migration solution
• Specifically built to support resilient and adaptive multi-carrier radio links,
scaling to GE capacity
• Future-proof with maximal investment protection
• Supports RFU-Ce for modulations up to 2048QAM.
Page 50
Reference Configurations
Page 51
IP-20G IDU Cascading with Dual Modems
• A dual-modem IP-20G in an East-West configuration, with a cascading link to a pair
of IP-20G units
• A cascading connection between these two units enables hybrid Ethernet/TDM traffic
to pass among all three units
Page 52
IP-20G Ring with Spur
• A ring consisting of three IP-20G nodes connected via 1+0 radio links, with a spur to
a fourth IP-20G node
• All of the IP-20G units in the ring utilize dual-modem configurations, except for the
node at the bottom in the figure
Page 53
IP-20G Front Panel Description
15
Passive cooling
(Fan-less design)
1RU
Power
16 x E1/DS1s External
1 or 2 RFU -48V DC
(optional) Alarms 2 x FE
2 x GE interfaces (Single-feed &
MDR69 connector (DB9) Management via
Optical (TNC) Dual-feed options)
splitter cable 2 x Dual-Mode: (SFP)
(RJ45) GE Electrical or
Sync in/out
‘Cascading’
(RJ45)
Terminal (RJ45) 2 x GE
(RJ45) Electrical
(RJ45)
Page 54
SM- Card
• The SM-Card holds the configuration and software for the IDU. The SM-
Card is embedded in the SM-Card Cover, so re-using the existing SM-Card
Cover is necessary to ensure that the unit’s software and configuration is
maintained.
• Contains only software with configuration
• If the user only needs to use a single management interface, a standard Cat5 RJ-45 cable (straight or
cross) can be connected to the MGMT interface.
• To access both management interfaces, a special 2 x FE splitter cable can be ordered from Ceragon.
• Port Status LED – The LED for management interface 1 is located on the upper left of the MGMT
interface. The LED for management interface 2 is located on the upper right of the MGMT interface.
Page 55
E1/DS1 - Interface
• Optionally, FibeAir IP-20G can be ordered with an MDR69 connector in which 16
E1/DS1 interfaces are available (ports 1 through 16).
• In SW 7.7. is E1 option only available
• In SW 7.9. also DS1 option available
• The E1/DS1 interface has the following LEDs
• ACT LED – Indicates whether the TDM card is working properly (Green) or if there is
an error or a problem with the card’s functionality (Red).
• E1/DS1 LED – Indicates whether the interfaces are enabled with no alarms (Green),
with alarms (Red), or no interfaces enabled (Off).
Radio Interfaces
• In 7.7 is supported only single radio carrier.
• In 7.7.5 is supported 2x 1+0 East / West Terminal
• In 7.9 is supported 2+0 XPIC
• In future software release will be available 2+0 ABC
• In 7.7 is supported only RFU-C (up to 256QAM) and RFU-Ce (up to 1024
QAM)
• In 7.9 RFU-HP, 1500HP, RFU-A supported
• The IDU and RFU are connected by a coaxial cable RG-223 (100 m/300 ft),
Belden 9914/RG-8 (300 m/1000 ft) or equivalent, with an N-type connector
(male) on the RFU and a TNC connector on the IDU.
Page 56
Radio Interfaces - LEDs
Power Interfaces
• FibeAir IP-20G receives an external supply of -48V current via one or two power
interfaces (the second power interface is optional for power redundancy).
• The IP-20G monitors the power supply for under-voltage and includes reverse
polarity protection, so that if the positive (+) and negative (-) inputs are mixed up, the
system remains shut down.
• The allowed power input range for the IP-20G is -40V to -60V. An under voltage
alarm is triggered if the power goes below the allowed range, and an over voltage
alarm is triggered if the power goes above the allowed range.
Page 57
Synchronization Interface
• FibeAir IP-20G includes an RJ-45 synchronization interface for T3 clock input and T4 clock output.
The interface is labeled SYNC.
• The synchronization interface contains two LEDs, one on the upper left of the interface and one
on the upper right of the interface, as follows:
• T3 Status LED – Located on the upper left of the interface. Indicates the status of T3 input clock,
as follows:
• Off – There is no T3 input clock, or the input is illegal.
• Green – There is legal T3 input clock.
• T4 Status LED – Located on the upper right of the interface. Indicates the status of T4 output
clock, as follows:
• Off – T4 output clock is not available.
• Green – T4 output clock is available.
• Blinking Green – The clock unit is in a holdover state.
External Alarms
• IP-20G includes a DB9 dry contact external alarms interface. The external alarms
interface supports five input alarms and a single output alarm.
Page 58
Terminal Interface
• FibeAir IP-20G includes an RJ-45 terminal interface (RS-232). A local craft
terminal can be connected to the terminal interface for local CLI
management of the unit.
Page 59
Unique Feature Set
ACM 4‐2048QAM
Extended Modulations Range
(11 ACM points)
Frequency bands 6‐42GHz
30, 40, 50MHz (FCC)
Wide range of channels
7, 14, 28, 40, 56MHz (ETSI)
1+0
2x 1+0 EW
System Configurations
1+1 HSB
2+0 XPIC
Traffic Aware “Smart Pipe”
Traffic Manager
Multi Service, Carrier Ethernet 2.0 Switch
Thank You
28
Page 60
Radio Frequency Units
IP-20G
V1
1
December 2014
Agenda
• Radio Frequency units for IP20
• RFU Selection Guide
• RFU-C
• 1500HP / RFU – HP
• Split Mount Configuration and Branching
• New Outdoor Circulator Block OCB
• Split Mount Configurations
Page 61
Radio Frequency units
• Standard Power
• FibeAir RFU-C
• High Power
• FibeAir 1500HP SD
• FibeAir RFU-HP
• The IDU and RFU are connected by a coaxial cable RG-223 (up to 100 m/300 ft),
Belden 9914/RG-8 (up to 300 m/1000 ft) or equivalent, with an N-type connector
(male) on the RFU and a TNC connector on the RMC in the IP-20N chassis.
Page 62
RFU Selection Guide
Split Mount √ √ √ √
Installation Type
All‐Indoor √ √
1+0/2+0/1+1/2+2 √ √ √ √
Configuration N+0 ( N>2) √ √
Adjustable Power
Power Saving Mode √ √
Consumption
QPSK to 256 QAM √ √ √ √
Modulation
512 to 2048 QAM √ √ √
RFU – C
Page 63
RFU – C 6-42GHz
• Standard RFU – C
• Support up to 256 QAM modulation
•
• Premium RFU-Ce
• Support up to 1024 QAM modulation
• RMC-B is required for radio link with IP-20N
1+1 direct
Page 64
Orthogonal Mode Transducer (OMT) Installation for 2+0 Configuration
Page 65
1500HP / RFU–HP
11
Page 66
1500 HP 2RX in 1+0 SD Configuration
Page 67
RFU-HP 1RX in 1+0 SD Configuration
HP Comparison Table
Feature 1500HP 2RX 1500HP 1RX RFU‐HP Notes
Frequency Bands Support 6L,6H,7,8,11GHz 6L,6H,7,8,11GHz 6L,6H,7,8GHz
Up to 30 MHz
Channel Spacing Support Up to 30 MHz 11 GHz version for Up to 56 MHz
40 MHz
All are compatible with OCBs
Split‐Mount √ √ √
from both generations
All‐Indoor √ √ √ All are compatible with ICBs
IFC ‐ IF Combining
Space Diversity BBS and IFC BBS BBS
BBS ‐ Base Band Switching
Frequency Diversity √ √ √
1+0/2+0/1+1/2+2 √ √ √
N+1 √ √ √
N+0 ( N>2) √ √ √
High Power √ √ √
Remote Mount Antenna √ √ √
Power consumption changes
Power Saving Mode ‐‐ ‐‐ √
with TX power
1500 HP (11 GHz ) 40 MHz bandwidth does not support IF Combining. For this frequency, space diversity is only available via BBS.
Page 68
Split Mount Configuration and Branching
Page 69
Split Mount Configuration and Branching Network
All- Indoor Vertical Branching Split-Mount Branching and All Indoor Compact
New OCB
20
Page 70
New OCB – Outdoor Circulator Block
• DCB - Diversity Circulator Block An external block which is added in Space Diversity configurations. DCB is
connected to the diversity port and chains two OCBs.
• Coupler Kit is used for 1+1 Hot Standby configurations. (loss 1.6 /6dB)
• Symmetrical Coupler Kit is used for: (loss of 3/3 dB) • When chaining adjacent channels (only 28/30 MHz) • 1+1
Hot Standby configurations with a symmetrical loss of 3dB in each direction Note: CPLRs loss tolerance is ±0.7
dB
• U Bend The U Bend connects the chained DCB (Diversity Circulator Block) in N+1/N+0 configurations.
• S Bend The S Bend connects the chained OCB (Outdoor Circulator Block) in N+1/N+0 configurations.
• Pole Mount Kit The Pole Mount Kit is used to fasten up to five OCBs and the RFUs to the pole. The kit enables
fast and easy installation.
Page 71
1+1 and 2+2 HSB Configuration
N+0/N+1 Configuration
Page 72
2+0 XPIC
Page 73
Split mount applications 4+0
S-Bend
DCB DCB
S-Bend
Page 74
Thank You
Page 75
Page 76
IP-20G Installation Guide
May 2014
Version 1
Agenda
• Electromagnetic Fields, ESD and Laser Protection
• General Requirements for Packing and Transportation and
Environment
• IP-20G Rack Installation
• Rack Installation
• Grounding the IP-20G
• Replacing SM-Card
• Power Cable
• Mechanical Specifications
• Earth Bonding of Equipment
• IP-20G to RFU-C connection
• Antenna Installation
• RFU-C Installation
Page 77
High Frequency Electromagnetic Fields!
• Exposure to strong high frequency electromagnetic fields may cause
thermal damage to personnel. The eye (cornea and lens) is easily exposed.
• Any unnecessary exposure is undesirable and should be avoided.
• In radio-relay communication installations, ordinary setup for normal
operation, the general RF radiation level will be well below the safety limit.
• In the antennas and directly in front of them the RF intensity normally will
exceed the danger level, within limited portions of space.
• Dangerous radiation may be found in the neighborhood of open waveguide
flanges or horns where the power is radiated into space.
• To avoid dangerous radiation the following precautions must be taken:
• During work within and close to the front of the antenna; make sure that
transmitters will remain turned off.
• Before opening coaxial - or waveguide connectors carrying RF power,
turn off transmitters.
• Consider any incidentally open RF connector as carrying power, until
otherwise proved. Do not look into coaxial connectors at closer than
reading distance (1 foot). Do not look into an open waveguide unless
you are absolutely sure that the power is turned off.
Page 78
General Requirements
Page 79
Packing & Transportation
The equipment is prepared for public transportation. The cargo must be kept dry
during transportation.
Keep items in their original boxes till they reach their final destination.
When unpacking –
Check the packing lists, and ensure that the
correct part numbers and quantities of
components arrived.
General Requirements
1. Environmental specification for IDU: -5C (23F) to +55C (131F)
2. Environmental specification for RFU: -33C (-27F) to +55C (131F) high reliability
3. -45C (-49F) to +60C (140F) with limited margins
10. The DC supply system is to be local, i.e. within the same premises as the equipment
11. A disconnect device is not allowed in the grounded circuit between the DC supply
source and the frame/grounded circuit connection.
Page 80
IP-20G Rack Installation
• IP-20G chassis 1x
• 19” rack/ sub rack 1x
• SM-Card Cover 1x
Tools:
Philips screwdriver
Flat screwdriver
Page 81
Rack Installation
• Insert and hold the IP-20G IDU in the rack, as shown in the following
figures. Use four screws (not supplied with the installation kit) to fasten the
IDU to the rack.
Page 82
Replacing an IP-20G IDU or SM-Card
• If you should need to replace the IP-20G IDU, you must first remove the SM-Card Cover so that
you can insert it into the new IDU.
• The SM-Card holds the configuration and software for the IDU. The SM-Card is embedded in the
SM-Card Cover, so re-using the existing SM-Card Cover is necessary to ensure that the unit’s
software and configuration is maintained.
• In some cases, you may need to replace the SM-Card itself in order to upgrade the unit’s
configuration.
To remove the SM-Card Cover:
1. Loosen the screws of the SM-Card Cover and remove it from the IDU.
3. Gently place the SM-Card Cover in its place and tighten the screws, using a Phillips screwdriver.
Page 83
Power Requirements
When selecting a power source, the following must be considered:
• Local Supply System: The DC supply system is to be local, i.e. within the same
premises as the equipment.
Power Interface
• FibeAir IP-20G receives an external supply of -48V current via one or two power interfaces (the
second power interface is optional for power redundancy). The IP-20G monitors the power supply for
under-voltage and includes reverse polarity protection, so that if the positive (+) and negative (-)
inputs are mixed up, the system remains shutdown.
• The allowed power input range for the IP-20G is -40V to -60V. An under voltage alarm is triggered if
the power goes below the allowed range, and an over voltage alarm is triggered if the power goes
above the allowed range.
• Make sure to use a circuit breaker to protect the circuit from damage by short or overload. In a
building installation, the circuit breaker shall be readily accessible and incorporated external to the
equipment. The maximum rating of the overcurrent protection shall be 10 Amp, while the
maximum current rating is 5 Amp.
Page 84
Power Cable
Power cables
Page 85
Mechanical Specifications
Copyright © 2009 – 2013 Nera Networks AS All rights reserved. I-79113-EN rev. A
Page 86
Typical Earthing Network
Note 1
2. Jumper Leads from the kit should be bonded to Never intermix components from different
the Tower Structure: Manufacturers.
- directly (bolted connection)
- via a earth termination plate (if provided)
- stainless steel angle adaptor (ANDREW)
3. Earth Kit on the feeder should be positioned
so that each jumper lead has a uniform smooth
transition down to the point of bonding – this may
mean staggering their position as shown here.
Page 87
Feeder - Earthing Kit (pos.2)
Second line of defence
Page 88
ODU Earthing
RSSI
EARTH TERMINAL
Page 89
Weatherproofing
• Each Earthing Kit should be protected with a waterproof weather seal
• If the weather seals are not provided as part of the main Earthing Kit, they must be
ordered
• Always follow the advice given in the instruction to achieve the best possible
installation
Page 90
IP-20G to RFU-C connection
The cable should have a maximum attenuation of 30 dB at 350 MHz.
TNC
N-type female
N-type male
TNC male
TNC females
29 Proprietary and Confidential
http://www.youtube.com/watch
?v=Mo9LwdHe39M
Page 91
TNC connector
installation
instructions
http://www.youtube.co
m/watch?v=XfA0JVR
JSxU
Self sealing vulcanized tape The vulcanized tape must Failure to follow every detail of
weather kit should be be overwrapped with PVC the installation instructions will
applied to the connector at tape tied off at the top and result with water damage to the
the ODU to make it fully bottom with cable ties. connector and cable
water tight.
Page 92
Cable Clamping
IF Cable
• For Ethernet cables, the cable should be grounded to the antenna tower
every 50m using the kit CAT5E_gnd_kit.
Page 93
Antenna Installation
RSSI Curve
1,9V
1,6V
1,3V
Page 94
Antenna Panning - Azimuth
Important to establish which are the side lobes
and what is the main beam
AZIMUTH
MAIN BEAM
SIDE LOBE
SIDE LOBE
ELEVATION
HORIZONTAL
MAIN BEAM
Note:
SIDE LOBE
It should not always be expected to establish the strongest receive signal at
first attempt to align an antenna
Antenna may need to be panned several times before the optimum signal
strength is established
Page 95
Dual Polarized Antenna connection
To fit the Duel Polarized Waveguide
Interface
Page 96
RFU-C Installation
Page 97
RFU-C direct mount configurations
1+0 direct
Page 98
RFU-C remote mount configurations
1+0 remote
1+1 direct
Page 99
RFU-C 1+1 Coupler Direct Mount Polarization
1+1 remote
Page 100
Orthogonal Mode Transducer (OMT) Installation
Page 101
RFU-C Mediation devices losses
Thank you
52
Page 102
First login
Agenda
Page 103
Connecting to the Unit
CLI
Web/Telnet
Baud rate =
115200
Bits per Second – 115,200
Data Bits – 8
Parity – None
Stop Bits – 1
Flow Control - None
IP address = 192.168.1.1
Default Username/password is admin/admin
3 Proprietary and Confidential
General commands
Press twice the TAB key for optional commands in actual directory
Use the TAB key to auto-complete a syntax
Page 104
Get IP address
CLI Command:
• Example
• Web
expand Platform branch, then Management branch and click on IP, set
accordingly and click Apply button
Page 105
Set to default
• CLI Command:
Please note that IP address after Set to Factory Default will be not changed!!!
Page 106
Web Management
Default Username/password is admin/admin
Page 107
Main View
Finding topic
Menu
Picture of
managed
element
Page 108
Platform / Management / NTP Configuration
Page 109
Platform / Management / Interface Manager
Default status is
! DOWN ! Managing of all ports
Serial Number
important for
activation key
generating
Page 110
Platform / Management / Unit Info
Page 111
Platform / Management / Set to Factory Default
IP address settings
Page 112
SNMP Parameters
Trap Managers
Up to 4 Trap Managers
Page 113
V3 User
Thank You
Page 114
Radio Link Parameters
Agenda
• MRMC
• TX & RX Frequencies
• Link ID
• RSL
• MSE
• Current ACM Profile
Page 115
High and Low frequency station
Page 116
MRMC – Multi Rate Multi Coding Profiles
Changing script automatically resets modem inside IP‐20G
6 Proprietary and Confidential
Page 117
Radio Parameters settings
2nd step
4th step
5th step
3th step
# 101
# 101
# 102
“Link ID
Mismatch”
# 101
“Link ID Mismatch”
Page 118
LINK ID – Antenna Alignment Process
Both IDUs of the same link must use the same Link ID
Otherwise, “Link ID Mismatch” alarm will appear in Current Alarms Window
# 101
# 101
# 102
“Link ID
Mismatch”
# 101
“Link ID Mismatch”
Questions?
Page 119
Radio Link Setup Exercise
Thank You
Page 120
ACM – Adaptive Coding and Modulation
MSE – Mean Square Error
Agenda
Page 121
Adaptive Coding and Modulation (ACM)
• In ACM mode, the radio will select the highest possible link capacity based on received signal quality.
• When the signal quality is degraded due to link fading or interference, the radio will change to a more robust
modulation and link capacity is consequently reduced.
• When signal quality improves, the modulation is automatically increased and link capacity is restored to the original
setting. The capacity changes are hitless (no bit errors introduced).
• During the period of reduced capacity, the traffic is prioritized based on Ethernet QoS - and TDM priority - settings.
• In case of congestion the Ethernet or TDM traffic with lowest priority is dropped. TDM capacity per modulation
state is configurable as part of the TDM priority setting.
High Priority
Traffic
8QAM
4QAM
1024QAM
1024QAM
2048QACM
512QAM
256QAM
128QAM
32QAM
LFEC
SFEC
64QAM
16QAM
Low Priority
Traffic
Page 122
Using MSE with ACM
MSE - Definition
Page 123
To simplify….
3
3
2
1
width
6mm 7mm 10mm 12mm 16mm
To evaluate how accurate our machine is, we need to know how many
parts differ from the expected value
Page 124
The difference from Expected value…
Quantity
Error = 0 mm
Error = + 2 mm
Error = - 3 mm
Error = + 6 mm
Error = - 4 mm
width
6mm 7mm 10mm 12mm 16mm
Quantity
Error = 0 mm
+ 2 mm = 4
-3 mm = 9
- 4 mm = 16 + 6 mm = 36
width
6mm 7mm 10mm 12mm 16mm
The squared values give bigger differences more weight than smaller differences,
resulting in a more powerful statistics tool:
16cm parts are 36 ”units” away than 2cm parts which are only 4 units away
Page 125
Calculating MSE
Error = 0 mm
Quantity
+ 2 mm = 4
-3 mm = 9
- 4 mm = 16 + 6 mm = 36
width
To evaluate the total errors, we sum all the squared errors and take the average:
The bigger the errors (differences) >> the bigger MSE becomes
Calculating MSE
Quantity
width
10mm
When MSE is very small – the “Bell” shaped histogram is closer to perfect
condition (straight line): errors = ~ 0
Page 126
MSE in digital modulation (Radios)
I
As indicated in the previous
example, we can say that the
bigger the errors are – the
harder it becomes for the
11 10 receiver to detect & recover the
transmitted signal
Page 127
MSE in digital modulation (Radios)
Q
01 00 MSE would be the average
e1 errors of e1 + e2 + e3 + e4….
e2
I
When MSE is very small the
e4 actual signal is very close to
e3
the expected signal
11 10
Q
01 00 When MSE is too big, the
e1 actual signal (amplitude &
e2 phase) is too far from the
expected signal
I
e4
e3
11 10
Page 128
Commissioning with MSE in EMS
For example –
256QAM has great capacity but
poor immune to noise
Page 129
Triggering ACM with MSE
When ACM is enabled, MSE values are analyzed on each side of the link
The values are typical and subject to change in relation to the frequency and RFU
type. For more details please contact your Ceragon representative
As you can see, the radio remains @ profile 8 till MSE improves to -38dB:
ACM
Profile
Downgrade
-41 Downgrade
-38
-37
-34
MSE
-39 -36 -35 -32 -30 -27 -24 -21
Page 130
ACM & MSE: An Example
When RF signal degrades and MSE passes the upgrade point (MSE @ red point), ACM will
switch back FASTER to a higher profile (closer to an upgrade point) when MSE improves.
When RF signal degrades and MSE does not pass the upgrade point (green point) – ACM
waits till MSE improves to the point of next available upgrade point (takes longer time to
switch back to the higher profile).
ACM
Profile
‐41 ‐38
‐39 ‐36 ‐35 MSE
Thank You
Page 131
Page 132
Automatic Transmit Power Control - ATPC
Agenda
• Why ATPC?
• How does ATPC works?
• ATPC Vs. MTPC
• ATPC Configuration
Page 133
ATPC – Automatic Transmit Power Control
Main Lobe
Side Lobe
2. Set Input reference level (min. possible RSL to maintain the radio link)
3. ATPC on both ends establish a Feedback Channel through the radio link (1byte)
5. Power reduction stops when RSL in remote receiver reaches Ref. input level
Page 134
ATPC – Example when ATPC is OFF
FSL= -60 dB
Site A Site B
MTPC MTPC
ATPC – Example when ATPC is ON (One site ATPC, second site MTPC)
FSL= -60 dB
Site A Site B
ATPC MTPC
IRLB (Input Ref. level on Site B) = -50dBm
Page 135
ATPC – Example when ATPC is ON (ATPC on both sites)
FSL= -60 dB
Site A Site B
ATPC ATPC
IRLB (Input Ref. level on Site B) = -50dBm IRLA (Input Ref. level on Site A) = -50dBm
TSL A = ? TSL B = ?
RSL A = ? RSL B = ?
FSL= -60 dB
Site A Site B
ATPC ATPC
IRLB (Input Ref. level on Site B) = -60dBm IRLA (Input Ref. level on Site A) = -50dBm
TSL A = ? TSL B = ?
RSL A = ? RSL B = ?
Page 136
ATPC Configuration
Thank You
10
Page 137
Page 138
IP-20G Licensing
October 2014
Version 4
Agenda
• Licensing in General
• Demo License
• CeraOS License concept
• IP-20 Licensing Scheme
• Licensed Features
Page 139
Licensing
• IP-20N offers a pay as-you-grow licensing concept in which
future capacity growth and additional functionality can be
enabled with Activation key.
• For purposes of licensing, each IP-20N chassis is considered
a distinct device, regardless of which cards are included in the
chassis. Each device contains a single Activation key.
• Licenses are divided into two categories:
• Per Carrier – The license is per carrier
• Per Device – The license is per device, regardless of the
number of carriers supported by the device.
Page 140
License generating
Page 141
DEMO License
• A demo license is available that enables all features for 60 days.
• The demo license expires 60 days from the time it was activated,
and the most recent valid license goes into effect.
• The 60-day period is only counted when the system is powered up.
10 days before the demo license expires, an alarm is raised
indicating to the user that the demo license is about to expire.
License violation
License violation yellow color screen has been implemented from sw. T7.9
Page 142
IP-20 Pricing Concept (Value Structure)
Hardware, Software & Licensed Features
CeraOS (Software)
Licensed Scalability Licensed Premium Functionality
• Radio capacity • Advanced radio configurations
• 2nd modem/core • Advanced QoS
activation (IP‐20G/C) • Ethernet OAM
• Additional GE user • TDM PW services
interfaces • Synchronization
• Additional CET‐Node • Network Resiliency
services/EVCs (L2) • Advanced Security
Licensed Mode ‐ CET‐Node
• CET services/EVCs (L2)
• 2x GE user interfaces
• Smart‐Pipe services (L1)
• 10M radio capacity Base‐line
• 1x GE user interface functionality
• Native TDM services
Hardware
• Product Models (e.g. IP‐20N, IP‐20G, IP‐20C, IP‐20LH)
• Assembly options (e.g. single/dual modem in IP‐20G)
• Add‐on modules (e.g. RMC in IP‐20N)
Page 143
Licensed Features
License Name Description
Enables you to increase your system’s radio capacity in
gradual steps by upgrading your capacity license.
Without a capacity license, each carrier has a capacity
Radio Capacity License
of 10 Mbps. Licensed capacity is available from 50
Mbps to 500 Mbps. Each RMC card can be licensed for
a different capacity.
Enables the use of Adaptive Coding and Modulation
(ACM) scripts. A separate license is required per core.
IP‐20‐SL‐ACM
Enables Multi‐Carrier ABC.
IP‐20‐SL‐MC‐ABC
Enables the use of Header De‐Duplication, which can
IP‐20‐SL‐Header‐DeDuplication be configured to operate at L2 through L4.
Enables the use of Cross Polarization Interface
IP‐20‐SL‐XPIC Canceller (XPIC). A separate license is required for each
core in the XPIC pair.
Licensed Features
License Name Description
Enables the use of a TCC/LIC Ethernet traffic port in GE
mode (10/100/1000baseT or 1000baseX). An activation
key is required for each Ethernet traffic port that is used
on the device. An activation key can be installed
multiple times with dynamic allocation inside the unit
IP‐20‐SL‐GE‐Port to enable multiple GE ports.
Note: All Ethernet traffic ports are enabled in FE mode
(10/100baseT) by default without requiring any
activation key.
Enables the use of a second TCC in a 2RU chassis for
IP‐20‐SL‐Main‐Card‐Redundancy High Availability.
Page 144
Licensed Features
License Name Description
Enables Carrier Ethernet Transport (CET) and a number
of Ethernet services (EVCs), depending on the type of
CET Node license:
• Edge CET Node – Up to 8 EVCs.
• Aggregation Level 1 CET Node – Up to 64 EVCs.
• Aggregation Level 2 CET Node – Up to 1024 EVCs.
Edge CET Node
A CET Node license also enables the following:
• Network resiliency (MSTP/RSTP) for all services.
• Full QoS for all services including basic queue buffer
management (fixed queues buffer size limit, tail‐
drop only) and eight queues per port, no H‐QoS.
• LAG Support
•
Enables the following protocols for improving network
resiliency:
P‐20‐SL‐Network‐Resiliency
• G.8032
• TDM (PW) services 1:1/1+1 path protection
Licensed Features
License Name Description
Enables H‐QoS. This license is required to add service‐
IP‐20‐SL‐H‐QoSH‐QoS bundles with dedicated queues to interfaces. Without
this license, only the default eight queues per port are
supported. (Planned for future release)
Enables configurable (non‐default) queue buffer size
limit for Green and Yellow frames. Also enables WRED.
IP‐20‐SL‐Enh‐Packet‐Buffer
The default queue buffer size limit is 1Mbits for Green
frames and 0.5 Mbits for Yellow frames.
Enables the G.8262 synchronization unit. This license is
required in order to provide end‐to‐end synchronization
IP‐20‐SL‐Sync‐Unit
distribution on the physical layer. This license is also
required to use Synchronous Ethernet (SyncE).
Enables Frame Cut‐Through.
P‐20‐SL‐Frame‐Cut‐Through
Enables TDM pseudowire services on units with TDM
IP‐20‐SL‐TDM‐PW interfaces. Without this activation key, only native TDM
services are supported.
Page 145
Licensed Features
License Name Description
Enables secure management protocols (SSH, HTTPS,
P‐20‐SL‐Secure‐Management
SFTP, SNMPv3, and RADIUS).
Enables Connectivity Fault Management (FM) per
IP‐20‐SL‐Eth‐OAM‐FM
Y.1731/ 802.1ag and 802.3ah (CET mode only).
Enables performance monitoring pursuant to Y.1731
IP‐20‐SL‐Eth‐OAM‐PM
(CET mode only).
License
Page 146
License features available
Thank You
Page 147
Page 148
Service Model in IP-20
November 2014
Version 5
Agenda
• IP-20 Ethernet Capabilities
• Service Model in General
• What is a Service ?
• What is a Service point?
• Services in IP-20 Family & Services attributes
1. Point to Point Service
2. Multipoint Service
3. Management Service
• Service Point in IP-20 Family
1. Pipe Service Point
2. Service Access Point (SAP)
3. Service Network Point (SNP)
4. Management Service Point (MNG)
• Service Points classification and attributes
• Examples for Services and Service points
• Logical VS. Physical Port
Page 149
IP-20’s Ethernet Capabilities
• Up to 1024 services (1025 reserved for Management)
• Up to 32 service points per service (30 SPs for MNG service)
• All service types:
• Multipoint (E-LAN)
• Point-to-Point (E-Line)
• Point-to-Multipoint (E-Tree)
• Smart Pipe
• Management
• 128K MAC learning table per service - ability to limit MAC learning per
service
• Split horizon between service points
• Flexible transport and encapsulation via 802.1q, 802.1ad (Q-in-Q), and
MPLS-TP, with tag manipulation possible at egress
• High precision, flexible frame synchronization solution combining SyncE
and 1588v2
• Hierarchical QoS with 8K service level queues, deep buffering, hierarchical
scheduling via WFQ and Strict priority, and shaping at each level
Page 150
Service model in General
What is a Service?
• A virtual bridge, connecting two or more interfaces
Page 151
Service Model
2
Service #1
4 Service #2
Service points
Service points are logical entities attached to the interfaces that make up the
service. Service points define the movement of frames through the service.
Without service points, a service is simply a virtual bridge with no ingress or
egress interfaces.
Page 152
What is a service point?
SP Service #1 SP
2
SP SP
4 Service #2
SP SP
10
Page 153
IP-20 Services
1 4
PIPE PIPE
SAP SAP
2
Page 154
Multipoint Service (MP)
• Multipoint services are used to provide connectivity between two or more service points.
• When traffic ingresses via one service point, it is directed to one of the service points in the
service, other than the ingress service point, according to ingress and egress tunneling rules, and
based on the learning and forwarding mechanism.
• If the destination MAC address is not known by the learning and forwarding mechanism, the
arriving frame is flooded to all the other service points in the service except the ingress service
point.
1 4
SAP SNP
SAP SNP
CPU
1
4
2 SAP SNP
1
Traffic ports
Service ID 1025
2
Page 155
Service Attributes
• Service ID - 1 - 1024
• EVC Description
16
Page 156
Service points
• SAP
• SNP
• Pipe Service Point
• Management Service Point
Page 157
Service Access Port SAP & Service Network Point SNP
Page 158
Pipe Service Points
22
Page 159
Service Point – Interface Types
Service
Service Points
Page 160
Service
Page 161
Service Point Types that can Co-Exist on the Same Interface
ptp 1
C‐Vlan SAP1
10 SAP 1 C‐Vlan
20 SAP 2 120 SAP 4
SAP4
SAP2
ptp 2
Transport Vlan EVC
100 ptp1
SAP
200 ptp2 SNP
Page 162
Example of bundle services
• The classification to PtP1 and PtP2 is based
on several c‐vlan’s.
• PtP1 and PtP2 uses the transport vlan
inside the network. The original c‐vlan is
preserved and sent inside the network.
C‐Vlan
SAP3
10,11 SAP 3
ptp 1
C‐Vlan SAP1
Transport Vlan EVC
100 ptp1
SAP
200 ptp2 SNP
S‐Vlan C‐Vlan
SAP3
230 10 SAP 3
ptp 1
SAP1
S‐Vlan C‐Vlan
230 10 SAP 1
240 20 SAP 2
Transport Vlan EVC
100 ptp1
SAP
200 ptp2 SNP
Page 163
Service points Attributes
31
Page 164
Service Point Attributes
Page 165
Service Point – Ingress Attribute
• Learning Admin - Indicates whether MAC
address learning is enabled or disabled
Ingress
• Allow Flooding - Indicates whether incoming
frames with unknown MAC addresses are
forwarded to other service points via flooding
Learning Admin • Allow Broadcast - Indicates whether frames with
a broadcast destination MAC address are allowed
Allow Flooding to ingress the service via this service point
Allow Broadcast • CoS Mode - Indicates how the service point
CoS Mode handles the CoS of frames that pass through the
service point.
Default CoS
• Default CoS – The service point CoS. If the CoS
Mode is set to overwrite the CoS decision made at
the interface level, this is the CoS value assigned
to frames that ingress the service point.
Page 166
Ethernet Service Points – GUI
General
Service Point ID
Service Point Name
Service Point Type
Interface
Interface Type
C‐VLAN Encapsulation
S‐VLAN Encapsulation
Ingress
Learning Admin
Allow Flooding
Allow Broadcast
CoS Mode
Default CoS
Egress
C‐VLAN CoS Preservation
C‐VLAN Preservation
S‐VLAN CoS Preservation
Marking Admin
Service Bundle ID
38
Page 167
Logical and physical interface
Service Demo
40
Page 168
The Setup
• IP-20N
IP-20G
• IP-20C/S/E
Page 169
Attaching Service Points
Page 170
Attaching Service Points
Questions?
Page 171
Thank You
Page 172
Quality of Service
December 2014
Version 6
Agenda
• Standard QoS VS. H-QoS
• QoS in General
• QoS in IP-20
• Classification
• Marker
• Bandwidth Profile
• Policing
• Queues Manager
• WRED
• Scheduler
• Shaper
Page 173
Hierarchical QoS (H-QoS) vs. Standard QoS
Standard QoS
• Differentiation between V
different traffic classes (CoS) Service 1
S
Voice
and control
H-QoS
• Each service gets its own V
Service 1 S Service 1
personalized treatment D
• TDM-grade performance V
S
Ethernet
Service 2 Service 2
providing per-service full D
Radio
Service 3 S Service 3
D
Operator 1
Operator 2
Shared Backhaul
Shared Site
Shared Site
Operator 1 MSC/RNC/S-GW
Shared Site Operator 2
Operator 2
N >> 8
Operator 1
Standard
QoS
Operator 2 Same CoS
Operator 1
Same CoS HQoS
Operator 2
Page 174
Backhaul Sharing - Fairness & Bursts Isolation
MSC/RNC/S-GW
Operator 1
Operator 1
Operator 2
Shared Backhaul
Shared Site
Shared Site
Operator 1 MSC/RNC/S-GW
Shared Site Operator 2
Operator 2
Operator 1
7 6 5 4 3 2 1
Standard
Q1 3 2 1 7 6 5 4 3 2 1 3 2 1 7 6 5 4 3 2 1
3 2 1 QoS
Operator 2
Operator 1
7 6 5 4 3 2 1 Q1 7 6 5 4 3 2 1
7 6 5 4 3 3 2 2 1 1
HQoS
3 2 1
Q2 3 2 1
Operator 2
QoS in IP-20
Page 175
How it Works?
Ingress Port
Egress Port
Ethernet frame
V.ID = 100
P-Bit = 5
IP Packet
DSCP = 0
General Overview
Ingress Port
Egress Port
Marker Scheduler
Priority WFQ
Policers Queues
Shapers
WRED
Service
Ingress Egress
Page 176
Classification
Classification
• 3 Hierarchies
• Port (aka 1H)
• VLAN (aka 1.5H)
• Service Point (aka 2H)
• Service (aka 3H)
Port
Page 177
Classification Hierarchies
Service #1
Port H1 SP H2
VLAN H1,5
Port VLAN SAP SNP
SAP SAP
CoS Classification
SAP
Service H3 SNP
SP2 H2
Port2 H1 VLAN H1,5
SAP SNP
Port 2 VLAN
Page 178
Classification example
Customer 1
Customer 2
4
Customer 3
Customer 3
Classification – 1H
Page 179
Classification – 1.5H
• VLAN CoS Override
Classification – 1.5H
• VLAN CoS Override for Bundle SPs
Page 180
Classification – 2H
• Service Point CoS Mode
Classification – 3H
• Service CoS Mode
Page 181
Policing
19
Ingress Policing
Frame Type
Ethertype
CoS 2
CoS 3
Page 182
Meaning of Colors
Dropped
Non Guaranteed
Guaranteed
Page 183
Bandwidth Profile (BWP)
Two Rate Three Color Marking Policer – Modes Of Operation
128000 bps
Page 184
Assign a Policer to a Port
Assign a Policer to an SP
Page 185
Queues Manager & WRED & Marker
27
Queues Manager
Service #1 Queue 0
CoS 0 SS
Queue 1
SS
CoS 2
Queue 3
CoS 3 Queue 4
SS
SAP SNP
SAP SAP SS
CoS 4
Queue 5
SS
CoS 5
Queue 6
SS
CoS 6
Queue 7
CoS 7 SS
SS – Single Shaper
Page 186
WRED
• Weighted Random Early Detect
Maximum physical BW of the line
WRED
• IP-20 can hold 32 WRED profiles.
Page 187
Creating WRED Profile
Service #1 Queue 0
CoS 0 WRED SS
Queue 1
WRED SS
CoS 2
Queue 3
SAP
SAP
SNP
SAP CoS 3 WRED SS
Queue 4
WRED SS
CoS 4
Queue 5
WRED SS
CoS 5
Queue 6
WRED SS
CoS 6
Queue 7
CoS 7 WRED SS
SS – Single Shaper
Page 188
Creating WRED Profile
Marking
34
Page 189
“Painting” a Frame
CFI = 0, it is an Ethernet Frame, it means green color
CFI = 1, it is an Canonical format, it means yellow color
Marker
IP‐20
Calculated
Enable Don’t Care 5 5
Cos = 3/G
IP‐20
Calculated
Disable Enable 5 3
Cos = 3/Y
IP‐20
Calculated
Disable Disable 5 3
Cos = 3/Y
Page 190
MARKER
Service #1 Queue 0
Service SS
CoS 1 WRED MARKING
Queue 2
WRED MARKING
CoS 2 Queue 3
SS
SS
SAP
SAP
SNP
SAP CoS 3 WRED MARKING
Queue 4
Queue 5
Queue 6
Queue 7
SS – Single Shaper
38
Page 191
Traffic Manager Example
1 8
2 9
1 3
3 10
Service #1
4 2 4 11
5 12
6 1 13
Service #2 3
7 2 14
Hierarchical QoS
SS – Single Shaper
MARKING
CoS 0 WRED SS
CoS 1 WRED SS
WFQ
CoS 2 WRED SS
Dual Shaper
CoS 6 WRED SS
WFQ
Single Shaper
CoS 7 WRED SS
SP
CoS 0 WRED SS
WFQ
CoS 1 WRED SS
CoS 2 WRED SS
Dual Shaper
CoS 5 WRED SS
3rd priority
CoS 6 WRED SS 4th priority
CoS 7 WRED SS
Page 192
Hierarchical QoS now in T7.9
SS – Single Shaper
MARKING
SP – Strict Priority Service Level Port Level
WFQ – Weighted Fair Queuing
CoS 0 WRED SS
CoS 1 WRED SS
WFQ
CoS 2 WRED SS
Dual Shaper
Service #1 CoS 3 WRED SS
CoS 4 WRED SS
CoS 5 WRED SS
CoS 6 WRED SS
WFQ
Single Shaper
CoS 7 WRED SS
SP
CoS 0 WRED SS
WFQ
CoS 1 WRED SS
CoS 2 WRED SS
Dual Shaper
CoS 3 WRED SS
Service #n
CoS 4 WRED SS
1st priority
2nd priority
WFQ
CoS 5 WRED SS
3rd priority
CoS 6 WRED SS 4th priority
CoS 7 WRED SS
1st priority
Queue 1 2nd priority
CoS 1 WRED 3rd priority
4th priority
Queue 2 SP + WFQ
CoS 2 WRED
WFQ
Single Shaper
Queue 3
CoS 3 WRED
SP
Queue 4
WFQ
CoS 4 WRED
Queue 5
CoS 5 WRED
WFQ
Queue 6
CoS 6 WRED
Page 193
Scheduler – Priority and WFQ
• User shall can create up to 8 profiles of
priority/weight.
CoS 7 4 4 20 20 Management (synch, PDU etc ...)
CoS 6 3 1 20 20 Real Time 1 (Voice small buffer)
CoS 5 3 1 20 20 Real Time 2 (Video large buffer)
CoS 4 2 1 20 20 Data Service 1
CoS 3 2 1 20 20 Data Service 2
CoS 2 2 1 20 20 Data Service 3
CoS 1 2 1 20 20 Data Service 4
CoS 0 1 1 20 20 Best Effort
• The profile is attached on logical port. All the service bundle inherit
this configuration.
Creating a Shaper
PIR = CIR + EIR
Page 194
Assign a Shaper
Page 195
Creating Priority Profile
H-QoS Summary
MARKING
Service Bundle #1
Service Bundle #64
Policer level 1
Policer level 3 Policer level 2
Page 196
Standard QoS vs H-QoS - Summary
Capability Standard QoS Hierarchical QoS
Number of transmission
8 512
queues per port
Per queue (two curves – for green traffic and Per queue (two curves – for green traffic and
WRED
for yellow traffic via the queue) for yellow traffic via the queue)
Thank You
Page 197
Page 198
IP- 20G XPIC Configuration
December 2014
Version 1
Agenda
• ACCP
• CCDP
• Co-channel System
• IP-20G & XPIC
• XPIC Recovery mechanism
• XPIC Settings
Page 199
System Spectrum Utilization
BW
V 1 3 5 7 9
ACAP (Adjacent Channel Alternating Pol.)
H
2 4 6 8 10
BW
BW
V 1 2 3 4 5
CCDP (Co-Channel Dual Polarisation)
H
6 7 8 9 10
V 1 V 1
H H
2 2
Page 200
Co-channel Systems
• The XPIC mechanism utilizes the received signals from the V and H modems to extract the V and H signals
and cancel the cross polarization interference due to physical signal leakage between V and H polarizations.
• The H+v signal is the combination of the desired signal H (horizontal) and the interfering signal V (in lower
case, to denote that it is the interfering signal). The same happens with the vertical (V) signal reception=
V+h. The XPIC mechanism uses the received signals from both feeds and, manipulates them to produce the
desired data
• IP-20G’s XPIC reaches a BER of 10e-6 at a co-channel sensitivity of 5 dB. The improvement factor in an
XPIC system is defined as the SNR@threshold of 10e-6, with or without the XPIC mechanism.
• In order for XPIC to be operational, all the following conditions must be met:
• Communications with the RFU must be established by both radio
interfaces.
• RFU type must be the same for both carriers.
• The frequency of both radios must be equal.
• 1+1 HSB protection must not be enabled.
• The same script must be loaded for both carriers.
• The script must support XPIC
Page 201
RSL Vs. Threshold for system without CCDP
RSL (dBm) BER>10-6
-20
-30 Nominal Input Level
Time (s)
RSL (dBm)
BER>10-6
-20
-30 Nominal Input Level H
-96
-99
Time (s)
Page 202
RSL Vs. Threshold for CCDP system with XPIC
RSL (dBm)
BER>10-6
-20
-30 Nominal Input Level H
Fading Margin = 38 dB
BER>10-6
Interference level in H (interference from V, when
-65 XPIC is not enabled
Time (s)
• The purpose of the XPIC recovery mechanism is to save the working link while
attempting to recover the faulty polarization.
Every such recovery attempt will cause a brief traffic hit in the working
link.
Page 203
MRMC selection
XPIC settings
Page 204
Thank you
13
Page 205
Page 206
Protection System Configuration
December 2014
Version 1
Agenda
• What is Protection?
• General Guidelines
• HSB Configuration in general – principals
• 1+1 HSB Configuration
Page 207
Different types of protections systems
What is Protection?
• A method of using one or more devices in a standby mode in order to
have a secondary link up when failure occurred to the active link
• In order to achieve a full protected link each and every device should
be protected
Page 208
Hot standby in general
1
In case of ch1 failure, will be traffic
Ch1
Main Ch1
Main switched to Protection channel
1′
1
Protection Protection
1’
• HSB system is using same frequency for Main and Standby channel (f1 & f1’)
• HSB system is typically 1+1
• Protection channel is internally muted. Just in case Main channel failure will be Protection channel Unmuted.
• Space diversity with baseband switching is based on HSB system (selection of better input level)
• In Hot Standby mode only one transmitter is active, the other transmitter is standby. Both receivers are active
and hitless switching is performed if Space diversity was configured. The TX- and RX- switching at a terminal
normally operates independently, but they may be configured to operate together.
HSB Protection
• IP-20G offers radio redundancy via 1+1 HSB protection. 1+1 HSB protection provides
full protection in the event of interface, signal, or RFU failure
• The interfaces in a protected pair operate in active and standby mode. If there is a
failure in the active radio interface or RFU, the standby interface and RFU pair
switches to active mode
• Each carrier in a protected pair reports its status to the CPU. The CPU is responsible
for determining when a switchover takes place.
• In a 1+1 HSB configuration, the RFUs must be the same type and must have the
same configuration
Page 209
HSB Protection – Revertive mode
• In an HSB protection scheme, the active and standby radios are usually
connected to the antenna with a coupler.
• This causes a -6dB loss on the secondary path on each side of the link,
resulting in a 12dB increase in the total path loss for the link.
• This additional path loss will either reduce the link’s fade margin or increase the
power consumption of the Power Amplifier (PA) in order to compensate for the
additional path loss.
• The system monitors the availability of the primary path at all times. Whenever
the primary path is operational and available, without any alarms, but the
secondary path is active, the system initiates a revertive protection switch.
Every revertive protection switch is recorded as an event in the event log.
• Revertive time from Secondary radio back to Primary radio is 10 min
Switchover Triggers
The following events trigger switchover for 1+1 HSB protection according to
their priority, with the highest priority triggers listed first.
Page 210
ACM and 1+1HSB
• When ACM is activated together with 1+1 HSB protection, it is
essential to feed the active RFU via the main channel of the coupler
(lossless channel), and to feed the standby RFU via the secondary
channel of the coupler (-6db attenuated channel). This maximizes
system gain and optimizes ACM behavior for the following reasons:
• In the TX direction, the power will experience minimal attenuation.
• In the RX direction, the received signal will be minimally attenuated.
Thus, the receiver will be able to lock on a higher ACM profile
(according to what is dictated by the RF channel conditions).
• The following ACM behavior should be expected in a 1+1
configuration:
• In the TX direction, the Active TX will follow the remote Active RX ACM
requests (according to the remote Active Rx MSE performance).
• The Standby TX might have the same profile as the Active TX, or might
stay at the lowest profile (profile-0). That depends on whether the
Standby TX was able to follow the remote RX Active unit’s ACM
requests (only the active remote RX sends ACM request messages).
• In the RX direction, both the active and the standby carriers follow the
remote Active TX profile (which is the only active transmitter).
10
Page 211
1+1 HSB Configuration
• Select Member 1
• We support up to 4 Protection Groups
• Summary
• Select Member 2 • Submit
Copy to Mate
Page 212
Thank You
Page 213
Page 214
Configuration Management &
Software Download
Agenda
• Backup and Restore
• Software Download
• RFU Software Installation
• Unit Info
Page 215
Backup & Restore
Page 216
Backup Process
Export
File
FTP IP address
Page 217
2. FTP Setup – FileZilla Settings
1. Install FileZilla Server and Run it
2. Create User in FileZilla Server
FTP SERVER PC
5. Check Firewall settings in FTP Server PC and if port 21 is used only with
FileZilla
8 Proprietary and Confidential
Page 218
3. IP20G Configuration Management Settings
Setup Parameters for FTP Server Connection
4. Backup process
4. Check Status
Page 219
Restore Process
Import File
FTP IP address
Page 220
3. IP20 Configuration Management Settings
Setup Parameters for FTP Server Connection
Restore process
Page 221
Config_Dump File
16
Page 222
Software Download Idea for IDU
1. Before performing a software upgrade, it is important to verify that the system date
and time are correct.
2. Install FTP server (when is not already installed) – we recommend to use FileZilla
Server (Not Client)
3. Setup FileZilla Server parameters (Users, Shared Folders)
4. Setup communication parameters for IP20 unit with FTP Server
5. Synchronize Time via CLI
“platform management time-services utc set date-and-time 30-01-2014,15:07:58”
6. UnZip software package for IP-20 to FTP Server shared folder
7. Download software from FTP Server
8. Install downloaded software Software
Download
• Although RFU software is included in the standard installation bundle, the current
software version is not automatically updated in the RFU when an installation is
performed.
• To upgrade the software in an RFU, you must perform the upgrade manually, per slot
Page 223
Software process download
1. Setup
Parameters
20
Page 224
RFU Software Installation
• Although RFU software is included in the standard installation bundle, the
current software version is not automatically updated in the RFU when an
installation is performed.
• To upgrade the software in an RFU, you must perform the upgrade manually, per
slot.
• This enables you to manage IDU and RFU software versions separately.
• In this version, you must use the Command Line Interface (CLI) to
upgrade RFU software.
3. To check the status of an update or install operation, enter the following command:
root> platform software show rfu status
4. Once the installation is complete, the Install Status column should indicate installation
success and the In Progress column should indicate 100 (100%).
5.When the installation is complete, enter the show rfu versions command again to verify
that the new version has been properly installed in both the TCC and the RFU:
root> platform software show rfu versions
Page 225
Unit Information file
23
Unit Info
• Includes technical data about the unit and also backup files placed in restore points
• This file can be forwarded to customer support, at their request, to help in analyzing issues
that may occur
Page 226
Create and Transfer process
4. Check Status
1. Setup Configuration
parameters included Restore
Point which will be used for
Configuration Backup inside the
system
Thank You
Page 227
Page 228
Native TDM
Agenda
• Native TDM Services
• Hybrid Service Engine – TDM + Ethernet
• All-packet services example: Ethernet EVCs + TDM Pseudowire
• How to Setup Native TDM
• TDM Path Protection
Page 229
Native TDM Services
• IP-20G provides integrated support for transportation of TDM (E1) services
with integrated E1 and ch-STM-1 interfaces.
• Two types of TDM services are supported using the same hardware:
• Native TDM trails
• TDM Pseudowire services (enabling interoperability with third party
packet/PW equipment)
Page 230
Hybrid services example: Ethernet EVCs + Native TDM
TDM cross-connect (VCs)
E1/
Port SAP
ch-STM1
MPtMP Service
SAP SNP
E1/DS1/
Port SAP
SAP SNP
SAP
ch-STM1/
OC3
MPtMP Service
SAP SNP
Page 231
How to Setup Native TDM
TDM
Network
8
Page 232
TDM Service Configuration 1
As first we have to create any Eth. service for Radio port, because we need specify
which type of traffic will be carry by Radio.
Create any service point which is connected to the radio port in Ethernet/Services …
1
2
3
Page 233
Native TDM Configuration
E1#1-1
E1#1-1
Page 234
TDM Service Configuration
1 2
Selection Summary
14 Proprietary and Confidential
Page 235
TDM Path Protection
15
• Two different kinds of path protection are available, each suitable for a
different network topology:
• 1:1 and 1+1 TDM path protection is suitable for ring networks that consist
entirely of IP-20N and/or IP-20G elements with two end-point interfaces for
the TDM trail.
• 1+1 Dual Homing TDM path protection is suitable for networks in which the
IP-20N and/or IP-20G elements are set up as a chain connected to the third
party networks at two different sites.
• The ring is closed on one side by the IP-20N and/or IP-20G elements,
and on the other by third party equipment supporting standard SNCP.
• In this case, there are three end-point interfaces in the IP-20N and/or
IP-20G section of the network.
Page 236
1:1 TDM Path Protection
Active Backup
Path Path
• 1:1 TDM path protection enables the operator to define two separate network paths for a single
TDM trail.
• Each trail has the same TDM interface end points, but traffic flows to the destination via different
paths.
• Bandwidth is utilized only on the active path, freeing up resources on the standby path.
• For native TDM services TDM path protection is done by means of configuring active and backup
path at the TDM service end-points.
Active Backup
Path Path
• 1:1 TDM path protection enables the operator to define two separate network paths for a single
TDM trail.
• Each trail has the same TDM interface end points, but traffic flows to the destination via different
paths.
• Bandwidth is utilized for both paths parallel.
• For native TDM services TDM path protection is done by means of configuring active and backup
path at the TDM service end-points.
Page 237
1+1 Dual Homing TDM Path Protection
• 1+1 TDM dual homing path protection is used for networks in which the IP-20 network elements are
set up as a chain connected to third party networks at two different sites, where one end-point is
located on an IP-20 unit and the other end-point is located on third-party equipment supporting
standard SNCP.
• As with 1:1 TDM path protection, the operator defines two separate network paths for a single TDM
trail. However, unlike path protection, traffic flows through both paths simultaneously, thereby
supporting standard SNCP in the third party equipment.
20
Page 238
Configuration for 1:1 and 1+1 TDM Path Protection
Active Backup
Path Bypass Bypass Path
configuration configuration
Trail ID 1 Trail ID 2
Radio Slot 1 E1#1 Radio Slot 2
VC-1 Slot 1 VC-1
1 2 3
or
4 5
1:1 or 1+1 TDM Protection
Active Backup
Path Bypass configuration
Bypass configuration Path
Trail ID 1 Trail ID 2
Radio Slot 1 Radio Slot 2
E1#1
VC-1 VC-1
Slot 1
Page 239
TDM Service
Trail ID 1 Trail ID 2
Page 240
Thank You
Page 241
Page 242
TDM Pseudowire
Agenda
• TDM over PSN
• TDM Pseudowire supported Standards
• General protocol
• TDM Structure and Transport Mode
• How to Configure Pseudowire Service without OAM
• How to Configure Pseudowire Service with OAM
• Synchronization
• Absolute mode
• Differential mode
• Adaptive mode
• Loop mode
Page 243
TDM over Packet Switch Network
TDM TDM
Pseudowire PSN Pseudowire
Page 244
General Protocol Stack Reference Model
Layers Layers
PSN
Page 245
All-packet services example: Ethernet EVCs + TDM Pseudowire
E1/DS1/
Port SAP
SAP SNP
SAP
ch-STM1/
OC3
MPtMP Service
SAP SNP
Page 246
TDM Pseudowire configuration
TDM TDM
PSN
port port
PSN PSN PW
PW
Eth. Service PSN PW
Tunnel Tunnel
Tunnel
10
Page 247
IP-20 Pseudowire Configuration
TDM PW Configuration Eth Service
PSN Tunnel VLAN 10/Pbit7 with Destination Mac:xx:02 Configuration
VLAN10 PtP Service
VLAN10 VLAN10
PW Service ID1
E1/DS1/ Source Tunnel Identifier 1
Port /Destination Tunnel Identifier 2 SAP SNP
ch-STM1/ SAP SAP
OC3 PW Profile 1
MAC xx:01
MAC xx:02
1. Check PW license
Page 248
E1/DS1/
Port
1. Enable port
2. Select Timing – synchronization will be explained later
3. TDM Parameters
PW Profile 1
3. PW Profile
• This profile is possible to change when we operate with 3rd party equipment
• Payload Size - Displays the number of times E1 is sampled for each Ethernet packet.
• Jitter Buffer Depth - Displays the desired jitter buffer depth (from 1 to 32, in milliseconds). This is used to enable the
network to accommodate PSN-specific packet delay variation. The jitter buffer can be increased if the network
experiences a higher-than-normal level of jitter.
Page 249
4. PSN Tunnel
PSN Tunnel VLAN 10/Pbit7 with Destination Mac:xx:02
PW Service
Source Tunnel Identifier 1
1. Service ID – e.g. 1
2. Admin State – Disable (You need create PW service itself, just after that you will be able to enable it)
3. Service Type – SAToP - we support SAToP in this software version only
4. Tunnel Type – Eth
5. TDM Interface – Select used TDM card – e.g. TDM slo3 port1 (port1 = E1#1)
6. PW Profile – we have to use same ID as in steep 3 - PW Profile (our case 1)
7. Tunnel ID – we have to use same ID as in steep 4 - PSN Tunnel (our case 1)
8. Clock Recovery – no - Indicates whether the service is used as a reference for clock recovery.
9. Source Tunnel Identifier – 1 on remote site configuration it will be 2
10. Destination Tunnel Identifier – 2 on remote site configuration it will be 1
11. Path Protection – no if path protection is not used
12. Apply
13. Edit created PW Service ID 1 and change admin status - Enable
Page 250
Where are we with actual configuration?
TDM PW Configuration Eth Service
PSN Tunnel VLAN 10/Pbit7 with Destination Mac:xx:02 Configuration
VLAN 10 PtP Service
VLAN10 VLAN10
PW Service ID1
E1/DS1/ Source Tunnel Identifier 1
Port /Destination Tunnel Identifier 2 SAP SNP
ch-STM1/ SAP SAP
OC3 PW Profile 1
MAC xx:01
MAC xx:02
6. Ethernet Service
1. Create P2P service with two SPs (MP service will be affected by MSTP)
2. In our case we would like to transport TDM via C-VLAN ID 10
Page 251
Where are we with actual configuration?
TDM PW Configuration Eth Service
PSN Tunnel VLAN 10/Pbit7 with Destination Mac:xx:02 Configuration
VLAN 10 PtP Service
VLAN10 VLAN10
PW Service ID1
E1/DS1/ Source Tunnel Identifier 1
Port /Destination Tunnel Identifier 2 SAP SNP
ch-STM1/ SAP SAP
OC3 PW Profile 1
MAC xx:01
MAC xx:02
Performance Monitoring
Page 252
Line Alarms
It means that 1024 is Transceiver Loss of Multi-frame and 16 is Transceiver AIS alarm
22
Page 253
OAM Maintenance Domain
• A unique maintenance level from 0 to 7 is assigned to each domain. The larger the domain, the higher the
value. For instance, the customer domain in figure 1 would be assigned the highest value, 7, while the
operator domain would be assigned the lowest value, 0. The MDs are defined to have hierarchical
relationships with other domains. Domains cannot intersect, however, they can be touching &/or nested.
• Ethernet CFM exchanges messages and performs operations on a per-domain basis. For instance, in
figure, CFM running at Operator 1 level does not allow discovery of the network by Provider or Customer
level.
• A Maintenance Point is a demarcation point for the CFM frames. It is an interface (physical port or
logical interface) that participates in an MD. A maintenance point filters the CFM frames by dropping
frames that do not belong in the correct MD. The maintenance points must be configured manually.
There are two types of maintenance points-
1. Maintenance Endpoint (MEP): MEPs initiate and terminate CFM messages. MEPs define the
boundary of an MD.
2. Maintenance Intermediate Point (MIP): MIPs receive CFM messages and respond to originating
MEPs. A MIP never initiates messages and does not expect any CFM messages.
Page 254
Maintenance Association (MA)
• If the MD level of the CFM message is higher than the MD level of the MEP/MIP, the MEP/MIP transparently passes the CFM
message.
• If the MD level of the CFM message is lower than the MD level of the MEP/MIP, the MEP/MIP discards the CFM message.
• If the MD level of the CFM message is equal to the MD level of the MEP/MIP, the MEP/MIP processes the CFM message.
Depending on the type of CFM message, the MEP/MIP responds to, transports to or accepts the message.
Page 255
1. Check PW license
2. Maintenance Domain
1. Maintenance ID 1
2. Domain Name
3. Level – recommend to use 7
Page 256
3. Maintenance Association
1. Maintenance association ID 1
2. Maintenance domain ID must be identical with step 2 =1
3. Local MEP ID =1 Remote MEP ID 2 (MAC addresses for TDM cards will be not needed. OAM will find
out correct MAC addresses
4. VLAN type – in our case C-VLAN 10
5. CCM Admin – Enable – when it will be disabled CFM will not find out remote MEP (remote MAC
address of TDM card)
29 Proprietary and Confidential
4. Ethernet Service
1. Create P2P service with two SPs (MP service will be affected by MSTP)
2. In our case we would like to transport TDM via C-VLAN ID 10
Page 257
5. Check Maintenance Association
When OAM is not running or Ethernet service is not created on both ends,
system cannot identify remote MAC
E1/DS1/
Port
1. Enable port
2. Select Timing – synchronization will be explained later
3. TDM Parameters
Page 258
PW Profile 1
7. PW Profile
• Payload Size - Displays the number of times E1 is sampled for each Ethernet packet.
• Jitter Buffer Depth - Displays the desired jitter buffer depth (from 1 to 32, in milliseconds). This is used to enable the
network to accommodate PSN-specific packet delay variation. The jitter buffer can be increased if the network
experiences a higher-than-normal level of jitter.
8. PSN Tunnel
PSN Tunnel VLAN 10/Pbit7
Page 259
PW Service
Source Tunnel Identifier 1
1. Service ID – e.g. 1
2. Admin State – Disable (You need create PW service itself, just after that you will be able to enable it)
3. Service Type – SAToP - we support SAToP in this software version only
4. Tunnel Type – Eth
5. TDM Interface – Select used TDM card – e.g. TDM slo3 port1 (port1 = E1#1)
6. PW Profile – we have to use same ID as in steep 7- PW Profile (our case 1)
7. Tunnel ID – we have to use same ID as in steep 8- PSN Tunnel (our case 1)
8. Clock Recovery – no - Indicates whether the service is used as a reference for clock recovery.
9. Source Tunnel Identifier – 1 on remote site configuration it will be 2
10. Destination Tunnel Identifier – 2 on remote site configuration it will be 1
11. Path Protection – no if path protection is not used
12. Apply
13. Edit created PW Service ID 1 and change admin status - Enable
Synchronization
Page 260
It is matter of synchronization
• When we talk about synchronization we always mean in the outgoing TDM
direction. The modes determine how the outgoing TDM signal’s clock is
generated
• 4 Clock modes
• Absolute – PW service takes the clock signal from any reference (using the
front panel) as GPS, 1588 etc.
• Adaptive - PW TDM port recovers the clock from the incoming PW packets
(supported T7.2)
Absolute clock
GPS for example - Clock coming from the front panel or from the
NativeSync mechanism
Sync
TDM
MUX
TDM
Pros:
• Accurate
• Doesn’t require any bandwidth MUX
Cons:
• You can say that GPS (or any other external clock) requires extra infrastructure.
•The entire network from end to end must support sync distribution
Page 261
Differential clock
TGPS TGPS
ᵟdelta
What is delta
between E1
and GPS ?
E1=TGPS േᵟdelta
E1
Pros:
• Accurate
• Differential clock allows transporting of E1s with different clocks (absolute does not)
Cons:
• Require GPS on each site and configure each of them
39 Proprietary and Confidential
Local Remote
E1 E1
Pros:
• Does not require any addition clock (GPS, NativeSync BW)
• Can be used over non-Ceragon networks
Cons:
• Does not recover so fast as in case of RSTP re-convergence / Protection switches
• Lower performance than absolute clock
Page 262
Loop type
LOOP TYPE in General
Loop
E1
3th 3th
party Network
party
Generating clock Receiving clock
Loop mode is based on the assumption that the signal coming back should have the same clock as the
signal being injected into the network.
IP-20 IP-20
3th E1 Network Any mode
party
Loop mode
The point in loop is to shorten as much as possible the path the originating clock goes through before it
is sent back.
Thank You
Page 263
Page 264
Troubleshooting
Agenda
• Performance monitoring
• RMON statistic
• Loopback
Page 265
Faults and Alarms
Faults
Current Alarms
Event Log
Page 266
Alarm Configuration
Page 267
Radio Parameters
The values are typical and subject to change in relation to the frequency and RFU
type. For more details please contact your Ceragon representative
Page 268
MRMC actual status
Signal Level
Page 269
MSE – Mean Square Error
MRMC
Page 270
Radio Thresholds
• The Capacity PM Table page displays Radio Ethernet Capacity in Mbps for either radio for 15 minutes or 24 hours intervals
Page 271
Radio Traffic - Throughput
• The Throughput PM Table page displays Radio Ethernet Throughput in Mbps for either radio for 15 minutes or 24 hours intervals
• The Utilization PM Table page displays Radio Ethernet Utilization for either radio for 15 minutes or 24 hours intervals
Page 272
Radio Traffic - Frame error rate
• The Frame error rate PM Table page displays Radio Frame error rate for either radio for 15 minutes or 24 hours intervals
Page 273
Performance Monitoring – Ethernet Services
ETH PM – RMON
Page 274
PM – RMON – Special Registers
Undersize frames received Frames shorter than 64 bytes
Oversize frames received Frames longer than 2000 bytes
Total frames received with a length of more than 2000 bytes,
Jabber frames received
but with an invalid FCS
Total frames received with a length of less than 64
Fragments frames received
bytes, and an invalid FCS
Rx error frames received Total frames received with Phy‐error
Total frames received with CRC error, not countered in
FCS frames received
"Fragments", "Jabber" or "Rx error" counters
Pause frames received Number of flow‐control pause frames received
Site A Site B
T T T A
When ingress frames exceed the maximum frame size, RMON counter “Oversized frames received”
is updated accordingly
Page 275
Troubleshooting with RMON: Discarding Example
Site A Site B
T T T A
Discarding Examples:
Ingress rate > Rate Limiter
Ingress frames do not qualify to Policer rules
Site A Site B
Rate Limiter
T T
Monitor
Video streams are generally transmitted over UDP
with multicast addresses
To monitor traffic, check out the Multicast Frames
Received register
To limit MC traffic, assign a Policer with a MC CIR
rules
Page 276
Ethernet TX / RX PM - Enabling
Ethernet TX / RX PM
Page 277
Ethernet TX / RX PM – View / Threshold window
Page 278
TDM – Line Alarms
It means that 1024 is Transceiver Loss of Multi-frame and 16 is Transceiver AIS alarm
Page 279
Loopbacks
RFU RF Loopback
IF LB
RFU RF LB
Page 280
TDM Loopback
Ethernet Loopback
Page 281
Ethernet Loopback Setting
Thank You
Page 282
Multiple Spanning Tree Protocol (MSTP)
November 2013
Version 2
Agenda
• STP – Spanning Tree Protocol
• How does STP work?
• MSTP
• Physical and Logical Topology
• MST Instance
• MST Region
• Region Boundary
• CST – Common Spanning Tree
• BPDU
• MSTP DEMO
• MSTI root
• Ports Role
• Ports Definition
• CIST
• Interoperation between two Regions
• How to configure MSTP
Page 283
STP – Spanning Tree Protocol
SW3
SW1
SW2
When we will connect all switches together, we will create an Ethernet loop
Page 284
Ports in STP protocol
root
SW - Root Bridge is switch with the lowest Bridge ID
SW3
root
Bridge ID: x00-01 SW1
SW2 Bridge ID: x00-02
root
Bridge ID: x00-03 SW1 SW5
SW5
Bridge ID: x00-01
1.Who is the Root Bridge?
2.Determine Root ports
3.Pair Root ports with Designated ports
4.Determine Designated Ports & Blocked Ports http://www.youtube.com/watch?v=iB7BxtZVy3c
Page 285
Where is the problem with STP?
SW3
SW2 SW4
1Gbps
1Gbps
Total 2Gbps
1Gbps root
SW1 SW5
SW5
Problem is a load balancing in your network (“capacity balance”). Why do not have doubled
capacity with usage different services?
This is the reason for using MSTP or G.8032 protocols as will be described in next slides
MSTP
Page 286
Physical and Logical Topology
SW3 SW3
= +
1Gbps 500Mbps
SW1 SW2 SW1 SW2
Physical Topology Logical Topology 1
+ SW3
+ SW3
500Mbps
SW1 SW2 SW1 SW2
The Instance represents each logical topology. In our case we have two
Logical Topologies, it means two Instances
Page 287
MSTI – MST Instance
SW5
SW1
SW3
SW4
SW4
Physical
Logical SW2
REGION 2
topology
Topology
SW1 SW2
REGION 1 SW3
Instance 0 (IST – MSTI0) – is internal instance, designated to carry all STP-related information.
Instance 1 (MSTI1)(e.g. VLANs: 10, 20, 30)
Instance 2 (MSTI2)(e.g. VLANs: 40, 50)
Instance 3 (MSTI3)(e.g. VLANs: 60, 70, 80, 90)
MSTI - One of a number of Spanning Trees calculated by MSTP within an MST Region,
to provide a simply and fully connected active topology for frames classified as belonging
to a VLAN that is mapped to the MSTI by the MST Configuration Table used by the MST
Bridges of that MST Region.
MST Region
SW5
SW3 SW1
SW4
SW4
SW2
REGION 2
SW1 SW2
SW3
REGION 1
Each switch running MST in the network has a single MST configuration that consists of these three
attributes:
1. Configuration ID
2. An alphanumeric configuration name (32 bytes)
3. A configuration revision number (two bytes)
4. A 4096-element table that associates each of the potential 4096 VLANs supported on the chassis to a
given instance
In order to be part of a common MST region, a group of switches must share the same configuration attributes.
It is up to the network administrator to properly propagate the configuration throughout the region.
12 Proprietary and Confidential
Page 288
MST Region Configuration Identifier
A parameter used to determine if a set of Bridges belongs to a single
region. Consists of several values:
• Configuration ID Format Selector – value of “0” indicates use of following
fields as defined in IEEE 802.1Q™-2003.
• Configuration Name – “A variable length test string encoded within a fixed
field of 32 octets”1, used to identify a MST region with a human readable
name.
• Revision Level – unsigned number in 2 octet field
• Configuration Digest – 16 field resulting from HMAC-MD5 encoding of the
MSTI column of a MSTI to VID table. “the MST Configuration Table is
considered to contain 4096 consecutive two octet elements, where each
element of the table (with the exception of the first and last) contains an
MSTID value encoded as a binary number, with the first octet being most
significant.”2
Region Boundary
SW5
SW3 SW1
SW4
SW4
SW2
REGION 2
SW1 SW2
SW3
REGION 1
Boundary Ports
• Boundary ports – are ports at the boundary of a region if the designated bridge on
its segment is in a different region.
Page 289
Common Spanning Tree - CST
SW5
SW3 SW1
SW4
SW4
SW2
SW1 SW2
MST REGION 1 SW3
Page 290
MSTP BPDU
SW3
Each switch only sends one BPDU, but each includes one MRecord per
MSTI present on the ports.
PI Protocol Information for the IST
Page 291
CIST Root Bridges Election Process
10
S3‐3 S3‐2
P50 P1
Region 3
10 10
S3‐1
CIST Regional
Root for P15
Region3
10 10
CIST Root and 10
CIST Regional 10
Root for
Region1
Region 1
10 10
S1‐1 S1‐3 S2‐1 S2‐3
P0 P200 CIST P20 P5
Regional Region 2
Root for
Region2
S1‐2 S2‐2
P100 P10
20
Region 3
Virtual Bridge S3‐1
Priority=15
MASTER Ports
Region 1
Virtual Bridge
Priority=0
Region 2
S1‐1 S2‐1 Virtual Bridge
Priority =20
Page 292
What is necessary to understand
21
Page 293
What is necessary to understand
• Topology changes in MSTP are treated the same way as in RSTP. That is,
only non-edge links going to forwarding state will cause a topology change
and the switch detecting the change will flood this information through the
domain. However, single physical link may be forwarding for one MSTI and
blocking for another. Thus, a single physical change may have different
effect on MSTIs and the CIST. Topology changes in MSTIs are bounded to
a single region, while topology changes to the CIST propagate through all
regions. Every region treats the TC notification from another region as
“external” and applies them to CIST-associated ports only.
• A topology change to CST (the tree connecting the virtual bridges) will
affect all MSTIs in all regions and the CIST. This is due to the fact that new
link becoming forwarding between the virtual bridges may change all paths
in the topology and thus require massive MAC address re-learning. Thus,
from the standpoint of topology change, something happening to the CST
will have most massive impact of flooding in the set of interconnected
MSTP regions.
MSTP Demo
24
Page 294
Configuration MSTP regions
R1 1/1
SW2 1. Configuration Name
2. Revision Level
3. Service to Instance mapping
1/2
R2 1/1
R3
1/1
Config name: R1
1/2 Rev level:65535
SW3
MSTI Root
Pri: SW1
32768
1/1
Page 295
Port Role
SW1 SW2
DP
Port Role
SW1 SW2
AP DP
root
SW 4. Backup Port - Receive BPUDs, not forward BPDUs
DP DP
• Provide connectivity if other Bridges, Bridge Ports, or LANs
fail or are removed.
RP RP
• Is a specific case of alternate port, when port is from the
same NE or LAN
SW1 SW2
AP DP BP
Page 296
Ports in Region
10 Gbit/s 2 2,000
CIST Configuration
R2
CIST Pri:8192
MSTIPri:32768 Cost 20 000 Cost 20 000
CIST Pri:8192
MSTIPri:57344
Who has the lowest CIST Bridge ID from all regions is a
CIST Root Bridge
Page 297
Interoperation between R1 and R2 with instance 1
Legend:
Instance 1,
Different routes for different services Instance 2
CIST
Page 298
Demo topology with 3th party equipment which doesn’t support MSTP,
only RSTP
Legend:
* ‐changed
state
Instance 2,
Instance 3
CIST
Pri:
1/2 Pri 128
R2
32768/
MSTI
Root28672 RP/DP ALT
1/1 Pri 128 1/4
DP/DP DP
1/1 Pri 128 ALT/ALT RP/ALT RP
2/1 Pri 128 1/2 Pri 128 1/2 Pri 128
1/3 CIST Pri:32768
Pri:57344/
ALT/RP MSTI Root:24576
1/1 Pri 128
Pri:57344/ 57344
TESTER
34
Page 299
Enabling and Disabling MSTP
• MSTP is enabled by default
Available commands
Disable MSTP
Enable MSTP
Number of Instances
• IP-20 can support from 1 to 16 MSTI on single unit. This does not include the CIST.
Page 300
Region Definition
For MSTP Regions is necessary setup:
1. Configuration Name
2. Revision Level
3. Service to Instance mapping (available via CLI)
Service ID
37 Proprietary and Confidential
Page 301
MSTI Port - Cost & Priority Setting
Page 302
Thank You
Page 303
Page 304
G.8032 – Ethernet Ring Protection Switching
ERPS
November 2014
Version 3
Agenda
• STP – Spanning Tree Protocol
• G.8032 in General
• G.8032 Principle
• Configuration of G.8032
• CLI Commands
Page 305
STP – Spanning Tree Protocol
SW3
SW1
SW2
When we will connect all switches together, we will create an Ethernet loop
Page 306
Ports in STP protocol
root
SW - Root Bridge is switch with the lowest Bridge ID
SW3
root
Bridge ID: x00-01 SW1
SW2 Bridge ID: x00-02
root
Bridge ID: x00-03 SW1 SW5
SW5
Bridge ID: x00-01
1.Who is the Root Bridge?
2.Determine Root ports
3.Pair Root ports with Designated ports
4.Determine Designated Ports & Blocked Ports http://www.youtube.com/watch?v=iB7BxtZVy3c
Page 307
Where is the problem with STP?
SW3
SW2 SW4
1Gbps
1Gbps
Total 2Gbps
1Gbps root
SW1 SW5
SW5
Problem is a load balancing in your network (“capacity balance”). Why do not have doubled
capacity with usage different services?
This is the reason for using MSTP or G.8032 protocols as will be described in next slides
G.8032
Page 308
G.8032, General
• G.8032 is an ITU standard for Ethernet Ring Protection – ERP
• G.8032 Goals:
• Loop avoidance in every topology
• Topology is constructed out of rings with sub-rings
• Highly reliable and stable protection
• Provide protection switch time in less than 50ms for 16 nodes.
• Load Balancing
• In each instance, RPL may be different
• Sub Ring support (from T7.9)
• http://www.itu.int/rec/T-REC-G.8032-201003-S/en
G.8032, General
• ERPS, as defined in the G.8032 ITU standard, is currently the most
advanced ring protection protocol, providing convergence times of sub-
50ms.
• ERPS prevents loops in an Ethernet ring by guaranteeing that at any time,
traffic can flow on all except one link in the ring. This link is called the
Ring Protection Link (RPL).
• Under normal conditions, the RPL is blocked, i.e., not used for traffic. One
designated Ethernet Ring Node, the RPL Owner Node, is responsible for
blocking traffic at one end of the RPL.
• When an Ethernet ring failure occurs, the RPL Owner unblocks its end of
the RPL, allowing the RPL to be used for traffic.
• The other Ethernet Ring Node adjacent to the RPL, the RPL Neighbor
Node, may also participate in blocking or unblocking its end of the RPL. A
number of ERP instances (ERPIs) can be created on the same ring.
Page 309
G.8032 Principle
S1
S2 S3
SW
SW
S2 S3
SW
SW
Page 310
How can we load balance a network?
13
SW3 SW3
= +
1Gbps 500Mbps
SW1 SW2 SW1 SW2
Physical Topology Logical Topology 1
+ SW3
+ SW3
500Mbps
SW1 SW2 SW1 SW2
Page 311
Physical and Logical Topology
VLANs 10, 20, 30 are VLANs 40, 50, 60 are
mapped to Instance mapped to Instance
SW3 1. Link between 1. Link between
SW3 SW1 & SW3 is
SW1 & SW3 is
blocked blocked
The Instance represents each logical topology. In our case we have two
Logical Topologies, it means two Instances
Instance
SW3
SW4
Physical
Logical
topology
Topology
SW1 SW2
Instance 0 (IST – is default Instance, usually used for management, is not recommended to use it
for VLANs mapping)
Instance 1 (e.g. VLANs: 10, 20, 30)
Instance 2 (e.g. VLANs: 40, 50)
Instance 3 (e.g. VLANs: 60, 70, 80, 90)
Page 312
Ring Protection Links
17
S2 S3
SW
SW
Page 313
What will happen when failure disappear?
19
S2 S3
SW
SW
WTR
Page 314
Ring Protection, R-APS Transmission
• A new R-APS message should be transmitted immediately when required
as an output action of ERPI state machine.
• If the R-APS information to be transmitted has been changed, a burst of
three R-APS messages shall be sent as quickly as possible. The interval
between them shall not be more than 3.3ms.
• R-APS messages other than the "event" message, continue to be
transmitted, after the first 3 messages, every five seconds.
• All R-APS messages should be transmitted on both ring ports
• R-APS channel Blocking
• traffic channel blocking R-APS channel is blocking (except on sub-
rings without an R-APS virtual channel)
• When R-APS is blocked:
• R-APS messages received are not forwarded to the other port
• R-APS messages, locally generated should be transmitted over both ring
port
• R-APS messages received at each port are delivered to the ERP control
• R-APS – Ring – Automatic Protection Switching
Page 315
Ring Protection, Link Failure
Page 316
Ring Protection, Priority Logic
Page 317
Configuration of G.8032
27
W
E
W E
W E
W
E
RPL Port
E –East
W-West
Page 318
CLI Configuration for G.8032
29
Useful Commands 1
Available commands
For Example we would like to create Instance 1 were inside the instance 1 will be service with ID 1 (Service must be already created)
We have to defined also east and west service points inside a service
Service ID 1
W E
E SP SP
1 2
VLAN 10
W
Page 319
Useful Commands 2
How to check Instance to Service mapping?
EIRP Status - (doesn’t matter where, in which node you will check it, because status is the
same in whole ring)
Useful Commands 3
Definition of RPL Owner
Page 320
WEB Interface for G.8032
33
• When service is created and you are not able to create ERPI use CLI for Service
to Instance Mapping or WEB GUI
root> ethernet generalcfg instance-to-service-mapping set service sid 1 instance-id 1
root> ethernet generalcfg instance-to-service-mapping show service sid 1 to 10
34 Proprietary and Confidential
Page 321
Service to Instance Mapping via web GUI
Web Interface
Page 322
Thank you
Page 323
Page 324
Synchronous Ethernet
December 2014
Version 1
Agenda
• Synchronization in General
• Jitter
• Synchronization Effect
• Concept of Synchronization in IP-20
• Implementation
• T3 Input & T4 output
• SSM and ESMC
• Sync E Clocks types
• Synchronization modes of operation
• Synchronization example
• IP-20G Synchronization Settings
2 Proprietary and Confidential
Page 325
Synchronization
• Synchronization can be used to synchronize network elements by
feeding one node with a reference clock, and having other nodes
derive their clocks from that source
Jitter
• One of the tasks of clock units CLU in TCC is to reduce jitter.
• Jitter period is the interval between two times of maximum effect (or minimum
effect) of a signal characteristic that varies regularly with time.
• Jitter frequency, the more commonly quoted figure, is its inverse.
• ITU-T G.810 classifies jitter frequencies below 10 Hz as wander and frequencies at
or above 10 Hz as jitter.
Page 326
Synchronization effects
• All problems in digital networks, including poor synchronization, are
manifested as errors.
Page 327
Synchronization in IP-20G
• Genesis sync mechanism based on CLU (Clock Unit)
• Each interface has it’ s own clock recovery mechanism
• The output clock selected based on quality and priority
• All slots sending clock to CLU
• We are able to select highest priority and
Select one for synch source
Implementation
Page 328
Sync in IP-20G – Implementation
• The clock input selection made by FPGA
• Clock output distributed to all interfaces in the system
• Each interface has option to switch from system clock to local oscillator.
T3/T4
Page 329
T3/T4 in TCC or LIC
• T3 input and T4 output are sharing the same physical connector
T3_IN_N 1
T3 (IN)
PPS – pulse per second T3_IN_P 2
1PPS_P 3
1PPS_N 6
PPS_IN_T3_ToD_P 7
1PPS (In) or ToD (Out)
PPS_IN_T3_ToD_N 8
T3 (IN) 2
T3 (In)
LIU T4 (Out) 2
T4 (Out)
Control
TCC
FPGA
1PPS_P
1PPS (out) RS-485
1PPS_N
ToD_1PPS_P
ToD (out) or 1PPS (in) RS-485
ToD_1PPS_N
Page 330
SSM and ESMC
13
• Synchronization Status Messages (SSMs) are standard messages sent periodically
by each interface in order to inform of the quality of its outgoing signal
frequency across the link
Sync feature :
• The processing of received SSMs in order to determine the interface status
• Determining the information to be sent in each interface’s SSMs
• The format of the messages for each interface type
Page 331
SSM timing
Genesis supports also timing SSM requirements :
• Switching quality from PRC to SSU in the same interface requires 200ms for SSM change
• In case of new SSM switchover it can take from 180ms up to 500ms (180+320ms)
E1 Systems T1 Systems
Quality Value Quality Value
G.811* 0010 PRS * 0001
SSU‐A* 0100 Stratum 2 * 0111
SSU‐B* 1000 Transit Node * 0100
G.813/8262 1011 Stratum 3E * 1101
DO NOT USE 1111 Stratum 3 * 1010
SMC 1100
Unknown 0000
DO NOT USE 1111
Page 332
Sync E Clocks types
Page 333
Timing equipment
• Primary Reference Clocks (PRC)
The primary reference clock may be of two different types. The first uses a Caesium oscillator and the
second a Rubidium oscillator disciplined by timing from GPS receivers. The use of GPS as timing is
becoming more and more common. Although this leaves the control over the PRC to the United States
Department of Defence, is has become so widespread in use that the advantages (low cost) is more
important than this factor. Due to the lower cost of the PRC today, it is also common to implement
several PRCs in the network. This improves the timing source redundancy and improves timing quality.
Page 334
Synchronization modes of operation
• Free running mode:
An operating condition of a clock, the output signal of which is strongly influenced by the oscillating
element and not controlled by servo phase-locking techniques. In this mode the clock has never had a
network reference input, or the clock has lost external reference and has no access to stored data,
that could be acquired from a previously connected external reference. Free-run begins when the
clock output no longer reflects the influence of a connected external reference, or transition from it.
Free-run terminates when the clock output has achieved lock to an external reference.
• Holdover mode:
An operating condition of a clock which has lost its controlling reference input and is using stored data,
acquired while in locked operation, to control its output. The stored data are used to control phase and
frequency variations, allowing the locked condition to be reproduced within specifications. Holdover
begins when the clock output no longer reflects the influence of a connected external reference, or
transition from it. Holdover terminates when the output of the clock reverts to locked mode condition.
• Ideal operation:
This category of operation reflects the performance of a clock under conditions in which there are no
impairments on the input reference timing signal.
• Locked mode:
An operating condition of a slave clock in which the output signal is controlled by an external input
reference such that the clock's output signal has the same long-term average frequency as the input
reference, and the time error function between output and input is bounded. Locked mode is the
expected mode of operation of a slave clock.
• Stressed operation:
This category of operation reflects the actual performance of a clock considering the impact of real
operating (stressed) conditions. Stressed conditions include the effects of jitter, protection switching
activity and the loss of the input reference timing signal.
PRC
SSU
G.811
G.812
PRC
SSU
G.811
G.812
Page 335
IP-20G Synchronization Settings
Radio link
Traffic Traffic
Page 336
Sync Source Configuration
1. Edit Interface
2. Select outgoing clock source:
1. Local Clock - The interface uses its internal clock as its synchronization source.
2. System Clock - Default value. The interface uses the system clock as its synchronization source.
3. Source Interface - Reserved for future use.
4. Time Loop - Reserved for future use.
3. Select Radio channel 0-84 – is used only for interoperability with IP10. IP10 needs E1 inside radio
frame for synchronization with IP20N. IP20G use radio frame itself for synchronization and doesn’t
need any E1 inside radio frame. It means that between two IP20G units it needs to be set this
parameter = 0.
4. SSM messages – enable / disable
Page 337
Thank you
27
Page 338
Security Features
December 2014
Version 1
Agenda
• Security Purpose
• Ceragon’ s security Architecture
• Defense in Management Communication Channels
• User Management
• User Profiles
• User Parameters
• Security Log
Page 339
Security Purpose
• Maintain system availability and performance
• Preventing attacks
• Security Log
Page 340
Defenses in Management Communication Channels
• Attack types addressed
• Tempering with management flows
• Management traffic analysis
• Unauthorized software installation
• Attacks on protocols (by providing secrecy and integrity to messages)
• Traffic interfaces eavesdropping (by making it harder to change
configuration)
• DoS through flooding
Page 341
Users Management
Users Profiles
• Up to 50 profiles can be created
• User’s profile defines the permitted actions a user can perform
• Actions are separated to groups as follows:
• Security
• Management
• Radio
• TDM
• Ethernet
• Synchronization
Page 342
Users Profiles – Web GUI
Page 343
User’s Management Parameters
• General Parameters
• Number of failed logins to block user (3)
• Blocking time period (5)
• Unused account period blocking (None)
• Session timeout (10)
Security Log
Page 344
Security Log
• File stores any parameters changes which are part of security group
and time changes
Thank You
Page 345
Page 346
Link Layer Discovery Protocol LLDP
December 2014
Version 1
Agenda
• Generally about LLDP
• Using LLDP in IP-20
• LLDP configuration in IP-20
Page 347
Generally about LLDP
• LLDP is a vendor-neutral layer 2 protocol that can be used by a station attached to a
specific LAN segment to advertise its identity and capabilities and to receive identity
• The port exchanges information with its peer and advertises this information to the
• Automatically detect the IP-20 unit neighboring the managed IP-20 unit, and
determine the connectivity state between the two units
Page 348
LLDP configuration in IP-20
• It will enable Transmitting and Receiving LLDP Notifications via selected Ethernet port
• The same configuration has to be done on the peer port
Thank You
Page 349
Page 350
IP-20G Frame Cut-Through
December 2014
Version 1
Agenda
• Configuration
Page 351
Frame Cut-Through - Basic Operation
• Frame Cut-Through is a unique and innovative feature that ensures low latency for
delay-sensitive services, such as CES, VoIP, and control protocols
• With Frame Cut-Through, high-priority frames are pushed ahead of lower priority
frames, even if transmission of the lower priority frames has already begun
Frame Cut-Through
• Once the high priority frame has been transmitted, transmission of the lower priority
frame is resumed with no capacity loss and no re-transmission required
• This feature provides services that are sensitive to delay and delay variation, such as
VoIP, with true transparency to lower priority services, by enabling the transmission of
a high priority, low-delay traffic stream
With Frame Cut‐Through
Without Frame Cut‐ Through
Propagation Delay
Page 352
Frame Cut-Through - Basic Operation
• When enabled, Frame Cut-Through applies to all high priority frames, i.e.,
all frames that are classified to a CoS queue with 4th (highest) priority
Page 353
Thank You
Page 354
Cascading port
December 2014
Version 1
Agenda
Page 355
Hybrid (TDM + Eth) services over IP-20N ‘cascading port’
Cascading ports
Page 356
Configuration – 2nd Cascading Port Configuration
Cascading ports
Page 357
Configuration – 4th Configure TDM Trail
Configure Ethernet Service where Cascading port will be one Service point with
specific Interface type and C & S-VLAN encapsulation
Page 358
Thank You
Page 359
Page 360
Automatic State Propagation
IP-20G
December 2014
Version 1
Agenda
• Automatic State Propagation in General
• Configuration
• Exercise
Page 361
Automatic State Propagation in General
• Automatic State Propagation (ASP) enables propagation of radio failures back to the Ethernet
port
• You can also configure ASP to close the Ethernet port based on a radio failure at the remote
carrier
Radio LOF
Eth Port
Disabled
Need to find
alternative path
Configuration
Page 362
Exercise Site A Site B
Exercise
Site B
Site A
Site A
Page 363
Thank You
Page 364
Link Aggregation (IEEE 802.3ad)
December 2014
Version 3
Agenda
• Link Aggregation Introduction
• LAG Advantages
• LAG mechanism
Page 365
Introduction to Link Aggregation
IEEE Definition:
Page 366
LAG
• LAG can be used to provide redundancy for Ethernet interfaces, both on the
same card (line protection) and on separate cards (line protection and
equipment protection). LAGs can also be used to provide redundancy for radio
links.
• LAG can also be used to aggregate several interfaces in order to create a wider
(aggregate) Ethernet link. For example, LAG can be used to create a 4 Gbps
channel.
• Up to four LAG groups can be created.
• LAG groups can include interfaces with the following constraints:
• Only physical interfaces (including radio interfaces), not logical interfaces,
can belong to a LAG group.
• Interfaces can only be added to the LAG group if no services or service
points are attached to the interface.
• Any classification rules defined for the interface are overridden by the
classification rules defined for the LAG group.
• When removing an interface from a LAG group, the removed interface is
assigned the default interface values.
• IP-20N enables users to select the LAG members without limitations, such as
interface speed and interface type. Proper configuration of a LAG group is the
responsibility of the user.
Advantages
Page 367
Benefits of using Link Aggregation
The capacity of the multiple links is combined into one logical link.
100 Mbps
2. Improved Resiliency
In case of a failed link, remaining links take over utilization of new available BW
Page 368
Benefits of using Link Aggregation
When multiple ports are allocated between two ETH switches, broadcast storms are
created due to physical loops. STP is required to eliminate loops by blocking the redundant
port.
When multiple ports are allocated between 2 Routers, Routing Protocols are required to
control traffic paths.
With LA – STP or routing protocols are not needed, therefore, less processing is involved.
4. Reduced Cost
Page 369
Benefits of using Link Aggregation
For sites with limited IP address space that nevertheless require large amounts of
bandwidth, you need only one IP address for a large aggregation of interfaces.
For sites that need to hide the existence of internal interfaces, the IP address of
the aggregation hides its interfaces from external applications.
Multiple
Interfaces
Single
Interface
Customer Public
Network Network
11 Proprietary and Confidential
LAG
Page 370
Thank You
Page 371
Page 372
Course Evaluation Form
Dear Customer!
Thank you for taking the time to complete the following course evaluation form. Your
commentary and feedbacks are of great importance to us as we analysis and investigate each
course and report. The information you provide will be used to help us improve the content of
the course and monitor the quality of our training program.
Thank You,
Oren Gerstner,
Training Director
Course details
Location
Course Name / ID
Start Date (d/m/year) End Date (d/m/year)
Instructor Name
Company / Customer
Please rate your satisfaction with the course from 1 to 5 (1 = poor and 5 = excellent):
Course book 1 2 3 4 5
Your comments: