COURSE HANDBOOK
Installation | Commissioning | System Configuration
FibeAir IP-20N Basic Training Course
Updated for SW Version T7.9
Visit our Customer Training Portal at cts.ceragon.com or contact us at [email protected]
Trainee Name:
_________________
Copyright 2014 Ceragon Networks Ltd.
www.ceragon.com & cts.ceragon.com
Thispagewasintentionallyleftblank.
FibeAirIP20NCeragonTrainingCourse
TableofContent
IntrotoRadioSystems
005
IP20NOverview..
029
RadioFrequencyUnitsRFUs.
059
FirstLogin...
077
ShelfManagement
085
ACM&MSE....
089
RadioLinkParameters..
101
AutomaticTransmitPowerControlATPC..
107
IP20NXPICConfiguration..
113
ServiceModelinIP20N..
121
ProtectionSystemConfiguration..
145
MultiCarrierABC
159
Licensing..
177
NativeTDM
187
ConfigurationManagement&SoftwareDownload
205
Troubleshooting..
219
HeaderDeDuplication
237
TCCRedundancy.
247
CascadingPortConfiguration..
257
CourseEvaluationForm.
263
CERAGONTRAININGPROGRAMIP20NBasicTrainingCourse
Sw7.9
Thispagewasintentionallyleftblank.
Introduction to Radio Systems
October 2014
Version 3
Agenda
Radio Relay Principles
Parameters affecting propagations:
Dispersion
Humidity/gas absorption
Multipath/ducting
Atmospheric conditions (refraction)
Terrain (flatness, type, Fresnel zone clearance, diffraction)
Climatic conditions (rain zone, temperature)
Rain attenuation
Modulation
Proprietary and Confidential
Digital Transmission Systems
Proprietary and Confidential
Radio Relay Principles
f1
RF Signal
f1
Path Terrain
A Radio Link requires two end stations
A line of sight (LOS) or nLOS (near LOS) is required
Microwave Radio Link frequencies occupy 1-80GHz
Proprietary and Confidential
High and Low frequency station
Tx(f1)=11500 MHz
Rx(f1)=11500 MHz
Full duplex
Localsite
Highstation
Remotesite
Lowstation
Rx(f1)=11000 MHz
Tx(f1)=11000 MHz
High station means: Tx(f1) >Rx(f1)
Low station means: Tx(f1) < Rx(f1)
Proprietary and Confidential
Standard frequency plan patterns
Only Low stations can interfere High stations
Frequency reuse:
Low 1,3V
1,3H
Tx
High
Low
1,3V
Tx
Tx
1,3H
High
Tx
1,3H
Tx
Reduced risk for overshoot
Frequency shift:
1,3H
Tx
1,3V
Tx
2,4V
Tx
2,4H
Tx
Reduced risk for overshoot
Tx
Tx
1,3H
Tx in upper part of band
Tx in lower part of band
Proprietary and Confidential
Tx
Preferred site location structure
Proprietary and Confidential
Radio Principal Block Diagram
Input
signal
Z'
Digital
Line interface
E'
Modulator
A'
B'
Transmitter
RF Tx Filter
Branching
Network(*)
C'
D'
Feeder
TRANSMITTER PATH
Feeder
Branching
Network(*)
RF Rx Filter
E
Receiver
Demodulator
RECEIVER PATH
Proprietary and Confidential
Digital
Line interface
Output
signal
RF Principals
RF - System of communication employing electromagnetic waves
(EMW) propagated through space
EMW travel at the speed of light (300,000 km/s)
The wave length is determined by the frequency as follows -
Wave Length
c
f
where c is the propagation velocity of electromagnetic
waves in vacuum (3x108 m/s)
Microwave refers to very short waves (millimeters) and typically
relates to frequencies above 1GHz:
300 MHz ~ 1 meter
10 GHz ~ 3 cm
Proprietary and Confidential
RF Principals
We can see the relationship between colour, wavelength and amplitude
using this animation
Proprietary and Confidential
10
Radio Spectrum
Proprietary and Confidential
11
Parameters Affecting Propagation
12
10
Parameters Affecting Propagation
Dispersion
Humidity/gas absorption
Multipath/ducting
Atmospheric conditions (refraction)
Terrain (flatness, type, Fresnel zone clearance, diffraction)
Climatic conditions (rain zone, temperature)
Rain attenuation
Proprietary and Confidential
13
Parameters Affecting Propagation Dispersion
Electromagnetic signal propagating in a physical medium is degraded
because the various wave components (i.e., frequencies, wavelengths)
have different propagation velocities within the physical medium:
Low frequencies have longer wavelength and refract less
High frequencies have shorter wavelength and refract more
Proprietary and Confidential
14
11
Parameters Affecting Propagation
Atmospheric Refraction
Deflection of the beam towards the ground due to different electrical
characteristics of the atmospheres is called Dielectric Constant.
The dielectric constant depends on pressure, temperature &
humidity in the atmosphere, parameters that are normally decrease
with altitude
Since waves travel faster through thinner medium, the upper part of the
wave will travel faster than the lower part, causing the beam to bend
downwards, following the curve of earth
With Atmosphere
No Atmosphere
Proprietary and Confidential
15
Wave in atmosphere
Proprietary and Confidential
16
12
Parameters Affecting Propagation Multipath
Multipath occurs when there is more then one beam reaching the receiver
with different amplitude or phase
Multipath transmission is the main cause of fading in low frequencies
Direct beam
Delayed beam
Proprietary and Confidential
17
Parameters Affecting Propagation Duct
Atmospheric duct refers to a horizontal layer in the lower atmosphere with
vertical refractive index gradients causing radio signals:
Remain within the duct
Follow the curvature of the Earth
Experience less attenuation in the ducts than they would if the ducts were not
present
Duct Layer
Duct Layer
Terrain
Proprietary and Confidential
18
13
Parameters Affecting Propagation - Polarization and
Rain
Raindrops have sizes ranging from 0.1 millimeters to 9 millimeters
mean diameter (above that they tend to break up)
Smaller drops are called cloud droplets, and their shape is spherical.
As a raindrop increases in
size, its shape becomes more
oblate, with its largest
cross-section facing the
oncoming airflow.
Large rain drops become
Increasingly flattened on the
Bottom;
very large ones are shaped
like parachutes
Proprietary and Confidential
19
Parameters Affecting Propagation Rain Fading
Refers to scenarios where signal is absorbed by rain, snow, ice
Absorption becomes significant factor above 11GHz
Signal quality degrades
Represented by dB/km parameter which is related the rain
density which represented mm/hr
Rain drops falls as flattened droplet
V better than H (more immune to rain fading)
Proprietary and Confidential
20
14
Parameters Affecting Propagation Rain Fading
Heavier rain >> Heavier Atten.
Higher FQ >> Higher Attenuation
Proprietary and Confidential
21
Parameters Affecting Propagation Fresnel Zone
3rd
2nd
1st
TX
RX
1. EMW propagate in beams
2. Some beams widen therefore, their path is longer
3. A phase shift is introduced between the direct and indirect
beam
4. Thus, ring zones around the direct line are created
Duct Layer0
Terrain
Proprietary and Confidential
22
15
Parameters Affecting Propagation Fresnel Zone
Obstacles in the first Fresnel zone will create signals that will be 0 to 90 degrees out
of phasein the 2nd zone they will be 90 to 270 degrees out of phasein 3rd zone,
they will be 270 to 450 degrees out of phase and so on
Odd numbered zones are constructive and even numbered zones are destructive.
When building wireless links, we therefore need to be sure that these zones are kept
free of obstructions.
In wireless networking the area containing about 40-60 percent of the first Fresnel
zone should be kept free.
Proprietary and Confidential
23
Example: First condition
Proprietary and Confidential
24
16
RF Link Basic Components Parabolic Reflector Radiation (antenna)
Proprietary and Confidential
25
RSSI Curve for RFU-C
1,9V
1,6V
1,3V
-30dBm
-60dbm
Proprietary and Confidential
26
17
-90dBm
Main Parabolic Antenna Types
Standard performance antennas (SP,LP)
Used for remote access links with low capacity. Re-using frequencies on adjacent links is not
normally possible due to poor front to back ratio.
High performance antennas (HP)
Used for high and low capacity links where only one polarization is used. Re-using
frequencies is possible. Can not be used with co-channel systems.
High performance dual polarized antennas (HPX)
Used for high and low capacity links with the possibility to utilize both polarizations. Re-using
frequencies is possible. Can be used for co-channel systems.
Super high performance dual polarized antennas (HSX)
Normally used on high capacity links with the possibility to utilize both polarizations. Re-using
frequencies is possible with high interference protection. Ideal for co-channel systems.
Ultra high performance dual polarized antennas (UHX)
Normally used on high capacity links with high interference requirements. Re-using
frequencies in many directions is possible. Can be used with co-channel systems.
Proprietary and Confidential
27
Passive Repeaters
Plane
reflector
Back-to-back
antennas
Proprietary and Confidential
28
18
Link Calculation Basic Example (in vacuum)
Lfs
TSL
Ga
Lfsl
Ga
RSL ReceivedSignalLevel
Lw
Lb
TSL TransmittedSignalLevel
Lfsl Freespaceloss=92.45+20logx(distanceinkmxfrequencyinGHz)
Lf
Lf Filterloss
Lb Branchingloss
Lw Waveguideloss
RSL
Ga Antennagain
RSL=TSL+GaLfsl+GaLwLbLf
Proprietary and Confidential
29
Atmospheric attenuation
Starts to contribute to the total attenuation above approximately 15GHz
Aa a d
[dB]
Parameters in a:
Frequency
Temperature
Air pressure
Water vapour
Proprietary and Confidential
30
19
Objective examples
Typical objectives used in real systems
99.999%
Month: 25.9 sec
Year: 5 min 12 sec
99.995 %
Month: 2 min 10 sec
Year: 26 min
99.99%
Month: 260 sec
Year: 51 min
Performance requirements generally higher than Availability.
ITU use worst month for Performance Average year for Availability
Proprietary and Confidential
31
Modulation
32
20
Modulation
Modulation
Analog
Modulation
Digital
Modulation
AM - Amplitude modulation
FM - Frequency modulation
PM Phase modulation
ASK Amplitude Shift Keying
FSK Frequency Shift Keying
PSK Phase Shift Keying
QAM Quadrature Amplitude modulation
Proprietary and Confidential
33
Digital modulation
1
1
ASK
Modem
0 1
1
1
modulation changes the amplitude to the analog
signale.1 and 0 have different amplitude.
PSK modulation changes the phase to the transmitted
signal. The simplest method uses 0 and 1800 .
Modem
1800 phase shift
1
1
FSK modulation is a method of represent the two
binary states 1 and 0 with different
spcific frequencies.
Modem
F1
F2
F1
F1 F2
F1
F1
Proprietary and Confidential
34
21
QAM Modulation
Quadrature Amplitude Modulation employs both phase modulation
(PSK) and amplitude modulation (ASK)
The input stream is divided into groups of bits based on the number
of modulation states used.
In 8 QAM, each three bits of input, which provides eight values (0-7)
alters the phase and amplitude of the carrier to derive eight unique
modulation states
In 64 QAM, each six bits generates 64 modulation states; in 128
QAM, each seven bits generate 128 states, and so on
4QAM 2bits/symbol
8QAM 3bits/symbol
16QAM 4bits/symbol
32QAM 5bits/symbol
64QAM 6bits/symbol
128QAM 7bits/symbol
256QAM
512QAM
1024QAM
2048QAM
8bits/symbol
9bits/symbol
10bits/symbol
11bits/symbol
Proprietary and Confidential
35
Why QAM and not ASK or PSK for higher modulation?
This is because QAM achieves a greater distance between adjacent points
in the I-Q plane by distributing the points more evenly
The points on the constellation are more distinct and data errors are
reduced
Higher modulation >> more bits per symbol
Constellation points are closer >>TX is more susceptible to noise
Proprietary and Confidential
36
22
Constellation diagram
In a more abstract sense, it represents the possible symbols that may be
selected by a given modulation scheme as points in the complex plane.
Measured constellation diagrams can be used to recognize the type of
interference and distortion in a signal.
Proprietary and Confidential
37
8 QAM Modulation Example
We have stream: 001-010-100-011-101-000-011-110
DIGITAL QAM (8QAM)
Bitsequence
Amplitude
000
Phase(degrees)
None
001
None
010
pi/2(90)
011
pi/2(90)
100
pi(180)
101
pi(180)
110
3pi/2(270)
111
3pi/2(270)
How does constellation diagram look?
Proprietary and Confidential
38
23
4QAM VS. 16QAM
16QAM
4QAM
Proprietary and Confidential
39
2048 QAM
Proprietary and Confidential
40
24
Bandwidth vs. Modulation
2-PSK
4-PSK
Modulation
Complixity
Increases
Bandwidth
Decreases
8-PSK
16-QAM
64-QAM
Proprietary and Confidential
41
Signal / Noise
Example: S/N influence at QPSK Demodulator
Each dot detected in wrong quadrant result in bit errors
BER<10-13
BER0
BER=10-6
BER=10-3
Signal
S/N
Noise
Signal
S/N
Noise
Proprietary and Confidential
42
25
Power
Power
Power
Noise
Power
Signal
S/N
Signal
S/N
Noise
BER Impact on Transmission Quality
10 -3
10 -4
10 -5
BER change ratio vs. Noise is
dependent on Noise Power distribution
and coding
10 -6
10 -7
BER
10 -8
-75
-72
-69
Receiver input level [dBm ]
-66
Proprietary and Confidential
43
RSL Vs. Threshold
RSL (dBm)
BER>10-6
-20
-30
Nominal Input Level
Fading Margin
-73
Threshold level BER=10-6
BER>10-6
S/N=23dB for 128QAM (37 MHz)
Receiver amplifies thermal noise
-96
-99
Thermal Noise=10*log(k*T*B*1000)
K Boltzmann constant
T Temperature in Kelvin
B Bandwidth
Time (s)
Proprietary and Confidential
44
26
Thank you
45
27
Thispagewasintentionallyleftblank.
28
IP-20N Overview
November 2014
Version 4
Agenda
IP-20N Product Highlights
Network topology with IP-20N
IP-20N Overview
1U and 2U chassis
TCC Traffic Control Card
RMC Radio Modem Card
ELIC Ethernet Line Interface Card
TDM Line cards
IVM Inventory Module
PDC Power Distribution Card
Fan Module and Air Filter
RFU Radio Frequency Unit
IP-20N Block Diagram
Proprietary and Confidential
29
FibeAir IP-10 Product Line - 2011
Ethernet + Optional TDM
Ethernet Only
IP-10E
IP-10G
IP-10C
Terminal /
Single-Carrier
Terminal /
Single-Carrier
Compact
All-Outdoor
IP-10Q
Aggregation
Nodal
Nodal
Optimized for Full GE
Multi-Carrier pipes
Ultra-high density
Optimized Solution for Any Network
Proprietary and Confidential
FibeAir IP-X0 Product Line - 2012 (Introducing IP-20N)
Ethernet + Optional TDM
Ethernet Only
IP-10E
IP-10G
Terminal /
Single-Carrier
Terminal /
Single-Carrier
IP-20N
IP-10C
Compact
All-Outdoor
IP-10Q
Aggregation
Optimized for Full GE
Multi-Carrier pipes
Ultra-high density
Nodal
Ultra-high density/modularity
Optimized Solution for Any Network
Proprietary and Confidential
30
FibeAir IP-20 Product Family
IP-20G
IP-20N 1RU & 2RU
IP-20E
IP-20S
IP-20C
IP20
Platform
IP-20A= IP20N + RFU-A
Available only for US & NA market
IP-20LH
Proprietary and Confidential
FibeAir IP-20N Product Overview
Purpose built for Nodal deployments
Unified architecture with
common cards
Traffic/Control cards (TCC)
Radio interface cards (RMC)
1RUchassis,Upto5RFUs
o Non-XPIC
o XPIC
o 1024 QAM
Line cards (LIC)
o Eth 4 x 1GE
o TDM 16 x E1/DS1 LIC
1 x STM-1/OC3 LIC
- 1 x ch STM-1
o LIC-X-E4-Elec./Opt
2RUchassis,Upto10RFUs
Fullredundancyoption(NoSPoF)
Ultra-high flexibility/modularity
Optimized foot-print, density, scalability & availability
Proprietary and Confidential
31
FibeAir IP-20N Product Highlights
Optimized nodal solution
Multi-Carrier ABC
1xUpto8+0MCABC(Upto1Gbps)
1+1/2+2MCABC/HSB(Upto1Gbps)
MixedNx1+0/1+1&1xABC(4+0)
Rich packet processing feature-set
High Availability node
Support for multi-operator scenarios
Highest capacity, scalability and spectral efficiency
High precision, flexible packet Synchronization solution
Best-in-class TDM migration solution using PWE3 (Circuit Emulation)
Support Ceragon s current and future RFUs
Purpose built for supporting resilient and adaptive multi-carrier radio links scaling to GE
capacity
Future-proof with maximal investment protection
Proprietary and Confidential
FibeAir IP-20N Carrier Ethernet Transport
Main features
Flexible transport
Flexible service classification
Full E-Line, E-LAN support
Hierarchical QoS
Superb (hardware based) service level OAM and SLA assurance mechanisms
MSTP
Enhanced <50msec network level resiliency (G.8031/2)
Advanced L2-4 security policy (ACL) engine
Enhanced Multicast (IGMP-snooping)
ACM 4PSK 1024 QAM
LIC-T155 (1x ch-STM-1)
LIC-STM1/OC3-RST
Future proof architecture for supporting
backhaul evolution to emerging services
Proprietary and Confidential
32
Network Topology Example (Tree)
Proprietary and Confidential
Network Topology Example (Ring)
Proprietary and Confidential
10
33
Network Topology Example (Tree)
C
C
RFU-C
1+0
1+1
C
C
IP20N C
2+0
1+1
C
IP20N
C
C
1+0
IP20N
C
1+0
2+0
1+0
2+0
IP10G
C
IP20N
IP20G
IP20G
IP10G
Proprietary and Confidential
11
Reference Integrated CET solution
C
E1s
Eth
IP10G
E1s
Eth
1+0
E1s
Eth
1+0
IP20N C
4+0
2+2
IP10G C
C
IP20N
IP20C
IP20G
C
1+1
C IP20G C
1+1
C
C IP20N
C
E1s
Eth
4+0
Microwave
Ring
E1s
Eth
E1s
Eth
4+0
4+0
2+2
E1s
Eth
C IP20N
C
1+0
Eth
E1s
Eth
E1s
Eth
IP20N C
C
4+0
IP20N
C
E1s
Eth
IP20N
4+0
C
IP20N
IP20N
Edge
Router
10GE Fiber
Ring
Edge
Router
Proprietary and Confidential
12
34
IP20N
RFU-C
IP-20N Overview
13
IP-20N 2RU Chassis
Fans tray
2 x Slots for
power distribution
cards (PDC)
Filter tray
(optional)
12
11
7
10
1
2 x Slots for
Main traffic and
control cards (TCC)
2
10 x Universal slots for:
- Radio interface cards (RMC)
- Ethernet line cards (4 x GE)
- TDM line cards
Proprietary and Confidential
14
35
Slots Numbering
3
6
2
51
Slots Numbering starts from bottom left
50
12
11
7
3
8
4
9
5
10
6
2
51
Proprietary and Confidential
15
Card types allowed per slot 1RU
Slot
Allowed Card Type
Number
Slot
Number
1
2
Notes
TCC
RMC
Ethernet LIC-X-E4-Elec (4x GE)
Ethernet LIC-X-E4-Opt (4x GE)
TDM LIC-T16 (16x E1)
TDM LIC-T155 (1x ch-STM-1)
3-6
RMC
TDM LIC-T16 (16x E1)
TDM LIC-T155 (1x ch-STM-1)
TDM LIC-STM1/OC3-RST
Proprietary and Confidential
16
36
Card types per slot 2RU
Slot
Number
Allowed Card Type
1
2,12
3 - 10
Notes
TCC
RMC
Ethernet LIC-X-E4-Elec (4x GE)
Ethernet LIC-X-E4-Opt (4x GE)
TDM LIC-T16 (16x E1)
TDM LIC-T155 (1x ch-STM-1)
RMC
TDM LIC-T16 (16x E1)
TDM LIC-T155 (1x ch-STM-1)
TDM LIC-STM1/OC3-RST
11
TCC
Proprietary and Confidential
17
Recommendations
It is recommended to place the same type of cards in adjacent pairs, as follows:
Slots 3 and 4
Slots 5 and 6
Slots 7 and 8 (2RU only)
Slots 9 and 10 (2RU only)
The reason for this is that for certain features, connectivity is supported in the backplane
between these slot pairs
For example 2+2 HSB SD configuration with XPIC:
1+1 or 2+2 are supported in release 7.9
When combining HSB SD and XPIC, the HSB SD protection group and the
XPIC group cannot be identical. A valid combination would be:
XPIC Group #1: Slot 3 and 4
XPIC Group #2: Slot 5 and 6
Radio Protection Group #1: Slot 3 and 5
Radio Protection Group #2: Slot 4 and 6
Proprietary and Confidential
18
37
Traffic Ethernet Matrix
TCC Slot 11
Slot 12
Slot 7
Slot 8
Slot 9
Slot 10
Slot 3
Slot 4
Slot 5
Slot 6
TCC Slot 1
Slot 2
Proprietary and Confidential
19
Supported Configurations in T7.9
Configuration
1+0
1+0IFCombining
2+0SinglePolarization
Notes
2+0DualPolarization(XPIC)
3+0
RequiresMultiCarrierABC.
RequiresMultiCarrierABCorLAG.
4+0SinglePolarization
RequiresMultiCarrierABCorLAG.
4+0DualPolarization(XPIC)
4+0IFCombining
5+0SinglePolarization
RequiresMultiCarrierABC.
RequiresMultiCarrierABCand
1500HP.
RequiresMultiCarrierABCand
1500HP.
RequiresMultiCarrierABCorLAG.
6+0SinglePolarization
RequiresMultiCarrierABCorLAG.
7+0SinglePolarization
RequiresMultiCarrierABCorLAG.
8+0SinglePolarization
RequiresMultiCarrierABCorLAG.
RequiresRMCBand1500HP
RequiresMultiCarrierABCorLAG.
4+0IFCombiningandXPIC
1+1HSBProtection
1+1HSBProtectionwithBBSSpace
Diversity
2+2HSBProtection
2+2HSBProtectionwithBBSSpace
Diversity
2+2HSBProtectionwithXPIC
2+2HSBProtectionwithBBSSpace
DiversityandXPIC
2+2HSBProtectionwithIF
CombiningandXPIC
RequiresMultiCarrierABC
RequiresMultiCarrierABC
RequiresMultiCarrierABC
RequiresMultiCarrierABC
RequiresMultiCarrierABC
RequiresMultiCarrierABCand
1500HP
Proprietary and Confidential
20
38
SGMII to TCC primary
SGMII to TCC backup
TCC Traffic control card
21
11
Traffic Control Card (TCC)
Main functions:
TCC-B doesnt support Multi-Carrier ABC, HSB support
TCC-B-MC required for Multi-Carrier ABC configurations, HSB BBS SD support
1xUpto8+0MCABC(Upto1Gbps)
1+1/2+2MCABC/HSB(Upto1Gbps)
MixedNx1+0/1+1&1xABC(4+0)
Network processor with 16 ports
10 Gbps switching capacity
6,25 Mpps (Mega packet per second) switching capacity
Shelf control and management
Ethernet traffic management and switching
Clock unit
Ceragon SD cards with Cera OS:
Industrial SD card 1GB class 6
Proprietary and Confidential
22
39
12
8
4
7
3
9
5
10
6
2
MNG port 1
CPU
MNG port 2
Radio Card
1Gb SGMII / (2.5Gb)
Ethernet Switch
16 ports 10Gbps
Line Interface 1Gb SGMII / (2.5Gb)
1Gb SGMII / (2.5Gb)
Line Interface 1Gb SGMII / (2.5Gb)
1Gb SGMII / (2.5Gb)
Ethernet Card
1Gb SGMII / (2.5Gb)
1Gb SGMII / (2.5Gb)
Proprietary and Confidential
23
11
TCC Indicators & Connectors
1
1
Activity
LED
SYNC
Port
Handle
External
Alarms
Port
Serial
Port
Gigabit
Electrical Ports
Management
Ports
Gigabit Optical
Ports
Proprietary and Confidential
24
40
Handle
TCC card Interfaces pin out
Proprietary and Confidential
25
RMC Radio Modem Card
26
41
12
Radio Modem Cards (RMC)
8
4
7
3
9
5
10
6
2
RMC-A
Based on Ceragons well known SoC modem
Supports up to 256QAM
FibeAir IP-10 Series support across a link
RMC-B
Based on Ceragons new SoC modem
Supports up to 1024QAM
Supports XPIC and non XPIC (same Hardware)
Supports Header De-Duplication
RMCA
RMCB
XPIC
No
Yes
MultiCarrierABC
No
Yes
Modemtype
PVGmodem
Marsmodem
Modulation
256 QAM+ACM
1024QAMwithPremium
RFU+ACM
FDandSD
Yes
Yes
IP20communicationwith
IP10 acrossalink
Yes
No
Proprietary and Confidential
27
Radio Modem Cards (RMC) and RFUs combinations
2
Combination
Multi Carrier
ABC
XPIC&Header
De Duplication
Maxavailable
Modulation
IP20N
communication
withIP10acrossa
radio link
IP20N
communication
withIP20G
RMCA&RFU
standard
No
No
256QAM
Yes
No
RMCA&RFU
premium
No
No
256QAM
Yes
No
RMCB &RFU
standard
Yes
Yes
256QAM
No
Yes
RMCB &RFU
premium
Yes
Yes
1024QAM
No
Yes
RMC-A
RMC-B
RFU-C/Ce
Proprietary and Confidential
28
42
12
Radio Modem Cards (RMC-E)
8
4
7
3
9
5
10
6
2
RMC-E is used for IP-20LH with Evolution radio.
This card has Radio Interface and STM-1 RST Interface
Proprietary and Confidential
29
RMC Indicators & Connectors
12
8
4
7
3
9
5
10
6
2
IF Connector
Handle
Handle
ACT
LED
LINK
LED
RFU
LED
Color
off
green
yellow
red
ACT
LINK
RFU
Nopower
Nopower
Nopower
OK,activemode
LinkOKnoalarms
RFUisOK
OK,standbymode
Minororwarning
alarm
Minororwarning
alarm
failure
Criticalor major
alarm
Criticalor major
alarm
Proprietary and Confidential
30
43
ELIC Ethernet Line Interface Cards
31
Ethernet Line Interface Card
Electrical LIC-XE4-Elec
12
LIC-XE4-Elec
Supports 4 GBE ports (one combo)
Works only on slots 2 and 12
MDI/MDIX support
Cascading ports (port 3 & 4)
Proprietary and Confidential
32
44
LIC-XE4-Elec
Indicators & Connectors
12
Gigabit Electrical Ports
Handle
Handle
ACT
LED
Color
off
green
red
SFP
LED
SFP
Slot
ACT
LeftLEDforport
RightLEDforport
SFPLED
Nopower
Interfaceisdisabled
Interface isdisabled
ortheinterface
operatesat
100BaseTmode
Cablenotconnected,
linknotok,interface
isdisabled
OK,noalarms
theinterfaceis
enabledandlinkis
OK(Blinking=traffic
activity)
Interface operatesat
1000BaseTmode,
Blinkingmeans
operatesat10BaseT
mode
Interface isenabled
andlinkisOK,
blinkingmeanstraffic
activity
Cardfailureor
hardwarefailure
Proprietary and Confidential
33
Ethernet Line Interface Card
Optical LIC-XE4-Opt
12
LIC-XE4-Opt
Supports 4 GBE ports (firs port is combo)
Total 4x SFP
Works only on slots 2 and 12
Cascading ports (port 3 & 4)
Proprietary and Confidential
34
45
LIC-XE4-Opt
Indicators & Connectors
12
Gigabit Optical Ports
Handle
Handle
ACT
LED
Color
off
green
red
SFP
LED
Gigabit
Electrical port
ACT
LeftLEDforport
RightLEDforport
SFPLED
Nopower
Interfaceisdisabled
Interface isdisabled
ortheinterface
operatesat
100BaseTmode
Cablenotconnected,
linknotok,interface
isdisabled
OK,noalarms
theinterfaceis
enabledandlinkis
OK(Blinking=traffic
activity)
Interface operatesat
1000BaseTmode,
Blinkingmeans
operatesat10BaseT
mode
Interface isenabled
andlinkisOK,
blinkingmeanstraffic
activity
Cardfailureor
hardwarefailure
Proprietary and Confidential
35
TDM Line cards
36
46
LIC-T16 (16xE1/DS1)
Line Interface Card
12
7
3
9
5
8
4
10
6
2
TDM-LIC
16 E1/T1s
1588 client clock and boundary clock as a future option
Proprietary and Confidential
37
12
LIC-T16 (16xE1)- Indicators & Connectors
7
3
9
5
8
4
10
6
2
16 x E1/ DS1 Connector
Handle
Handle
SYNC Connector
Color
off
green
red
ACT
ACT LED
E1/DS1LED
SyncLeftLEDfor
port
SyncRightLEDfor
port
E1/DS1LED
Nopower
Theinterfaceis
disabledornosignalis
beingreceived
Theinterfaceis
disabled
The interfaceis
disabled
OK,noalarms
Indicateswhetheravalid
signalisbeingreceived
whenenabled
Indicateswhetherthe
interfaceisconfiguredto
exportaclock
Noalarms
Cardfailureor
hardwarefailure
Any alarms
Proprietary and Confidential
38
47
LIC-T16 (16xE1)
Connector and Synchronization Interface
12
7
3
8
4
9
5
10
6
2
Proprietary and Confidential
39
TDM LIC-T155 (1x ch-STM-1)
12
7
3
8
4
9
5
10
6
2
TDM-LIC
1 STM-1/OC3
1588 client clock and boundary clock as a future option
The 1 x ch-STM-1 interface uses an optical SFP connector.
Proprietary and Confidential
40
48
TDM LIC-T155 (1x ch-STM-1)
Indicators & Connectors
12
7
3
9
5
8
4
10
6
2
STM-1/OC3 SFP
Handle
Handle
ACT
LED
Color
off
green
red
STM-1/OC3
LED
SYNC
Connector
ACT
SyncLeftLEDfor
port
SyncRightLEDfor
port
STM1/OC3
Nopower
Theinterfaceis
disabledornosignalis
beingreceived
Theinterfaceis
disabled
The interfaceis
disabled
OK,noalarms
Indicateswhetheravalid
signalisbeingreceived
whenenabled
Indicateswhetherthe
interfaceisconfiguredto
exportaclock
Noalarms
Cardfailureor
hardwarefailure
Any alarms
Proprietary and Confidential
41
TDM LIC-STM-1/OC3-RST
12
7
3
8
4
9
5
10
6
2
Proprietary and Confidential
42
49
Inventory Module (IVM)
43
Mandatory Cards - IVM
Single card for 1RU and 2RU chassis.
2 x E2PROM on single board (function as 2 separated cards).
Installed at the back of the chassis
Holds the chassis:
License.
Node MAC address (48 MACs per unit).
Serial number.
Proprietary and Confidential
44
50
IVM Inventory Module
The IVM contains pre-programmed information that defines the chassis and its slots,
including:
Module types that can be inserted into the chassis, per slot
Product and card names
Internal MAC addresses
Serial number
Hardware versions
Licensed features and capacities
The IVM stores information in a 8 KB (64 kb) EEPROM. A 2RU IP-20N IVM contains
two EEPROMs. If a redundant TCC configuration is used, each EEPROM is
dedicated to a specific TCC
IVM
EEPROM
TCC 1
EEPROM
TCC 2
Proprietary and Confidential
45
PDC Power Distribution Card
46
51
Mandatory Cards PDC
Power Distribution Card
Monitors the inputs signal
Drives the -48V signal
Converts the -48V signal to other power levels
Different card for 1RU chassis and 2RU chassis
2U chassis uses two PDC card for redundancy
1U chassis uses dual input for redundancy
Proprietary and Confidential
47
Power Distribution Card
A 2RU IP-20N can use two PDC cards for redundancy. Each PDC provides 48V
power to all modules in the chassis via the backplane, on different lines.
A diode bridge in the modules prevents power spikes and unstable power from the
two power sources.
Voltage range: -40,5 VDC to -60 VDC
The maximum rating of the overcurrent protection shall be 3 Amp per link, while the
maximum current rating is 9A for 1RU and 17Amp for 2RU
The power source must be grounded
If the voltage goes below -38V, the LED displays Red. When the voltage returns to 40V or higher, the Red indication goes off and the Green indication reappears.
Standard PDC Interface
Dual - Input PDC Interfaces
Proprietary and Confidential
48
52
Power consumption specification
Proprietary and Confidential
49
Fans Module & Air Filter
50
53
Mandatory Cards Fans
Four fans inside the fans module
Powered up from -48VDC from the backplane
Different module for 1RU and 2RU chassis
Proprietary and Confidential
51
Filter Tray - optional
IP-20N offers a filter as optional
equipment. If a filter tray is not
ordered, the IP-20N chassis is
delivered with a blank filter slot
cover.
Proprietary and Confidential
52
54
IP-20N Block diagram
IP-20N Block Diagram
53
Proprietary and Confidential
54
55
Traffic Path vs Internal Shelf Management Path
Proprietary and Confidential
55
Traffic Path vs Internal Shelf Management Path
Proprietary and Confidential
56
56
Thank You
57
Thispagewasintentionallyleftblank.
58
Radio Frequency Units
V1
April 2014
Agenda
Radio Frequency units for IP-20N
RFU Selection Guide
RFU-C
1500HP / RFU HP
Split Mount Configuration and Branching
New Outdoor Circulator Block OCB
Split Mount Configurations
Green mode
Proprietary and Confidential
59
Radio Frequency units
Standard Power
FibeAir RFU-C
High Power
FibeAir 1500HP
FibeAir RFU-HP
The following RFUs can be installed in a split-mount configuration:
FibeAir RFU-C (642 GHz)
FibeAir 1500HP RFU-HP (611 GHz)
RFU-HP (68 GHz)
The following RFUs can be installed in an all-indoor configuration:
FibeAir 1500HP/RFU-HP (611 GHz)
The IDU and RFU are connected by a coaxial cable RG-223 (up to 100 m/300 ft),
Belden 9914/RG-8 (up to 300 m/1000 ft) or equivalent, with an N-type connector
(male) on the RFU and a TNC connector on the RMC in the IP-20N chassis.
Proprietary and Confidential
FibeAir Radio Frequency Units
Standard Power (Max 24 dbm)
FibeAir RFU-C
6-38 GHz
3.5-56Mhz Ch. Bandwidth
QPSK-1024QAM
Very Compact
FibeAir RFU-HP -1RX
Ultra High Power (Max 33 dbm)
6-8 GHz
3.5-56Mhz Ch. Bandwidth
Low Loss Chaining
QPSK-1024QAM
Reduced Power Consumption Mode (Green Mode)
FibeAir 1500-HP/SD
High Power (Max 33 dbm)
6-11 GHz
3,5-56Mhz Ch. Bandwidth
QPSK-1024QAM
Low Loss Chaining
Dual RX with IFC (Single Rx available for 11GHz)
Proprietary and Confidential
60
RFU Selection Guide
1500HP/RFUHP
(6 11GHz)
RFUC
(6 42GHz)
RFUCe
(6 42GHz)
SplitMount
AllIndoor
1+0/2+0/1+1/2+2
Character
InstallationType
Configuration
PowerSavingMode
Modulation
N+1
N+0(N>2)
SDsupport
(IFC,BBS)
(BBS)
(BBS)
AdjustablePower
Consumption
QPSKto256QAM
512to1024QAM
RFU-HP does not support 56 MHz channels.
IFC at 40MHz is supported only for the 11GHz frequency band.
Proprietary and Confidential
RFU C
61
RFU C
6-42GHz
Standard RFU C
Support up to 256 QAM modulation
RMC-A or RMC-B
Premium RFU-Ce
Support up to 1024 QAM modulation
RMC-B is required
Main Features of RFU-C:
Frequency range Operates in the frequency range 6 42 GHz
More power in a smaller package - Up to 26 dBm for extended distance, enhanced
availability, use of smaller antennas
Configurable Modulation QPSK 1024 QAM
Configurable Channel Bandwidth 3.5 MHz 56MHz
Compact, lightweight form factor - Reduces installation and warehousing costs
Supported configurations:
1+0 directandremotemount
1+1 directandremotemount
2+0 directandremotemount
2+2 remote mount
4+0 remote mount
Efficient and easy
Proprietary and Confidential
Example of RFU-C direct 1+1 mount configurations
1+1 direct
Proprietary and Confidential
62
Orthogonal Mode Transducer (OMT) Installation for 2+0
Configuration
Switch to the circular adaptor
(removing the
existing rectangular transition,
swapping the O-ring, and
replacing on the circular
transition).
Proprietary and Confidential
OMT Installation Example
Note: RFUs are at sub 11GHz band
Proprietary and Confidential
10
63
1500HP / RFUHP
11
Main Features of 1500HP/RFU-HP
Frequency range:
1500HP 2RX: 6-11GHz
1500HP 1RX: 11GHz
RFU-HP: 6-8GHz
Frequency source Synthesizer
Installation type Split mount remote mount, all indoor (No direct mount)
Diversity Optional innovative IF Combining Space Diversity for improved system gain (for 1500HP), as
well as BBS Space Diversity (all models)
High transmit power Up to 33dBm in all indoor and split mount installations
Configurable Modulation QPSK 1024 QAM
Configurable Channel Bandwidth
1500HP 2RX (6-11 GHz): 10-30 MHz
1500HP 1RX (11 GHz): 10-30 MHz
1500HP 1RX (11 GHz wide): 24-40 MHz
RFU-HP 1RX (6-8GHz): 3.5-56 MHz
System Configurations Non-Protected (1+0), Protected (1+1), Space Diversity, 2+0/2+2 XPIC, N+0, N+1
XPIC and CCDP Built-in XPIC (Cross Polarization Interference Canceller) and Co-Channel Dual Polarization
(CCDP) feature for double transmission capacity, and more bandwidth efficiency
Power Saving Mode option - Enables the microwave system to automatically detect when link conditions allow it
to use less power (for RFU-HP)
Tx Range (Manual/ATPC) Up to 20 dB dynamic range
ATPC (Automatic Tx Power Control)
RF Channel Selection Via EMS/NMS
NEBS Level 3 NEBS compliance
Proprietary and Confidential
12
64
1500 HP 2RX in 1+0 SD Configuration
Proprietary and Confidential
13
1500 HP 1RX in 1+0 SD Configuration
Proprietary and Confidential
14
65
RFU-HP 1RX in 1+0 SD Configuration
Proprietary and Confidential
15
HP Comparison Table
Feature
1500HP2RX
1500HP1RX
RFUHP
FrequencyBandsSupport
6L,6H,7,8,11GHz
6L,6H,7,8,11GHz
6L,6H,7,8GHz
Notes
ChannelSpacingSupport
Upto30MHz
Upto30MHz
11GHzversionfor
40MHz
Upto60MHz
SplitMount
AllarecompatiblewithOCBs
frombothgenerations
AllIndoor
AllarecompatiblewithICBs
SpaceDiversity
BBSandIFC
BBS
BBS
IFC IFCombining
BBS BaseBandSwitching
FrequencyDiversity
1+0/2+0/1+1/2+2
N+1
N+0(N>2)
HighPower
RemoteMountAntenna
PowerSavingMode
Powerconsumptionchanges
withTXpower
1500 HP (11 GHz ) 40 MHz bandwidth does not support IF Combining. For this frequency, space diversity is only available via BBS.
Proprietary and Confidential
16
66
Split Mount Configuration and Branching
Split Mount Configuration and Branching Network
Outdoor Circulator Block OCB The Tx and the Rx path
circulate together to the main OCB port. When chaining
multiple OCBs, each Tx signal is chained to the OCB Rx
signal and so on (uses S-bend section). For more details,
refer to 1500HP/RFU-HP OCBs
Indoor Circulator Block ICB All the Tx signals are
chained together to one Tx port (at the ICC) and all the Rx
signals are chained together to one Rx port (at the ICC). The
ICC circulates all the Tx and the Rx signals to one antenna
port.
Proprietary and Confidential
18
67
Split Mount Configuration and Branching Network
All- Indoor Vertical Branching
Split-Mount Branching and All Indoor Compact
Proprietary and Confidential
19
New OCB
20
68
New OCB Outdoor Circulator Block
The OCB has the following main purposes:
1. Hosts the circulators and the attached filters.
2. Chain and accumulate radio signal ( multiple carriers )
3. Routes the RF through the filters and circulators.
4. Allows RFU connection to the Main and Diversity antennas.
Proprietary and Confidential
21
New OCB Components
RF Filters - are used for specific frequency channels and Tx/Rx separation. The filters are attached to the OCB,
and each RFU contains one Rx and one Tx filter. In a Space Diversity using IF combining configuration, each RFU
contains two Rx filters (which combine the IF signals) and one Tx filter. The filters can be replaced without
removing the OCB. The RF filter is installed with every configuration.
DCB - Diversity Circulator Block An external block which is added in Space Diversity configurations. DCB is
connected to the diversity port and chains two OCBs.
Coupler Kit is used for 1+1 Hot Standby configurations. (loss 1.6 /6dB)
Symmetrical Coupler Kit is used for: (loss of 3/3 dB) When chaining adjacent channels (only 28/30 MHz) 1+1
Hot Standby configurations with a symmetrical loss of 3dB in each direction Note: CPLRs loss tolerance is 0.7
dB
U Bend The U Bend connects the chained DCB (Diversity Circulator Block) in N+1/N+0 configurations.
S Bend The S Bend connects the chained OCB (Outdoor Circulator Block) in N+1/N+0 configurations.
Pole Mount Kit The Pole Mount Kit is used to fasten up to five OCBs and the RFUs to the pole. The kit enables
fast and easy installation.
Proprietary and Confidential
22
69
1+1 and 2+2 HSB Configuration
Proprietary and Confidential
23
N+0/N+1 Configuration
Proprietary and Confidential
24
70
2+0 XPIC
Proprietary and Confidential
25
Split mount applications
Proprietary and Confidential
26
71
Split mount applications 4+0
S-Bend
Proprietary and Confidential
27
Split mount applications 4+0 SD
DCB
DCB
S-Bend
Proprietary and Confidential
28
72
U-Bend
Green Mode
Significant Power Consumption Reduction
Minimal power consumption required in 99.9% of the time
Green Mode enables:
Reduction of consumed power by automatically reducing Tx power
Quick increase in Tx Power in case of fading.
No traffic impact
PowerConsumption
Level
Max.Tx Power
(@128QAM)
Power Consumption
High
31dBm
80W
Mid
27dBm
56W
Low
21dBm
41W
AutomaticTXPowercontrolforoptimalpower
consumption
Proprietary and Confidential
29
Green Mode (RFU-HP)
Significant Power Consumption Reduction
31dBm
80W
27dBm
56W
21dBm
41W
Proprietary and Confidential
30
73
Power Consumption VS. Monitored TSL
The radio operates in fixed and pre-defined
power-consumption states:
PowerState
MonitoredTX
Power
Consumed
power[W]
HIGH
31dBm
80Watt
MEDIUM
27dBm
56 Watt
LOW
21dBm
41 Watt
Transition between power states is hitless and
errorless !
*X<Y<Z
Proprietary and Confidential
31
Normal ATPC
Set reference level Remote TX changes accordingly
5 dB
dB
10
150
RX:41dBm
Referencelevel:40dBm
When fading occurs, both transmitters try to
compensate for the losses by increasing
transmission power while maintaining RSL as
close as possible to the Ref. level
Proprietary and Confidential
32
74
GREEN MODE
Set
Set
GreenMode
GreenRSL
enable
limit [dBm]
setting the Green RSL to
-50dBm doesnt degrade fade
margin, as the mechanism will
increase TX power if
necessary.
10
155
0 dB
dB
RX:52dBm
RX:37dBm
RX:42dBm
RX:47dBm
Greenlevel:50dBm
When fading occurs, both transmitters
compare the monitored RSL with the Green
Level (Ref.). As long as RSL> Ref. there is no
need to increase the TSL.
Proprietary and Confidential
33
GREEN MODE
Set
Set
GreenMode
GreenRSL
enable
limit [dBm]
setting the Green RSL to
-50dBm doesnt degrade fade
margin, as the mechanism will
increase TX power if
necessary.
15 dB
RX:50dBm
RX:52dBm
Green level: -50dBm
When RSL drops below the Green Ref. level,
we must increase the TSL to maintain the
fade margin and avoid low sensitivity
Proprietary and Confidential
34
75
Thank You
76
First login
Ceragon Training Services
October, 2014 v2
Agenda
CLI and Web login
General commands
Get IP address
Set IP address
Set to default
Proprietary and Confidential
77
Connecting to the Unit
CLI
Web/Telnet
Baudrate=115200
Databits:8
Parity:None
Stopbits:1
FlowControl:None
IPaddress=192.168.1.1
DefaultUsername/passwordisadmin/admin
Proprietary and Confidential
General commands
Press twice the TAB key for optional commands in actual directory
Use the TAB key to auto-complete a syntax
Use the arrow keys to navigate through recent commands
Question mark to list helpful commands
Proprietary and Confidential
78
Get IP address
CLI Command:
platform management ip show ip-address
Proprietary and Confidential
Changing Management IP Address
CLI Command:
platform management ip set ipv4-address <IP Address> subnet <Mask>
gateway <default gateway>
Example
Web
expand Platform branch, then Management branch and click on IP, set
accordingly and click Apply button
Proprietary and Confidential
79
Set to default
CLI Command:
platform management set-to-default
Please note that IP address after Set to Factory Default will be not changed!!!
Proprietary and Confidential
Other CLI commands
For any CLI commands please follow our Web Manual
Open Index html file
Find out in Topics submenu required configuration
Proprietary and Confidential
80
Web Management
First Web login
Default IP address is 192.168.1.1 /24
DefaultUsername/passwordisadmin/admin
Proprietary and Confidential
10
81
Set to factory default
Please note that IP address after Set to Factory Default will be not changed!!!
Proprietary and Confidential
11
IP address settings
2 select IPv4 or IPv6
Proprietary and Confidential
12
82
Web configuration manual
For any CLI commands please follow our Web Manual
Open Index html file
Find out in Topics submenu required configuration
Proprietary and Confidential
13
Thank You
83
Thispagewasintentionallyleftblank.
84
Shelf Management
October 2014
Version 2
Connecting to the Unit
CLI
Web
Baudrate=115200
Databits:8
Parity:None
Stopbits:1
FlowControl:None
IPaddress=192.168.1.1
DefaultUsername/passwordisadmin/admin
Proprietary and Confidential
85
Chassis Configuration Window
NavigationTree
ConfigurationArea
SelectionArea
Proprietary and Confidential
Configuring the Chassis (1/2)
Proprietary and Confidential
86
Configuring the Chassis (2/2)
Proprietary and Confidential
Questions?
Proprietary and Confidential
87
Thank You
88
ACM Adaptive Coding and Modulation
MSE Mean Square Error
November 2014
Version 3
Agenda
Adaptive Coding and Modulation
Using MSE with ACM
What is MSE?
Link Commissioning with MSE
Triggering ACM with MSE
ACM Benefits
ACM and 1+1 HSB
Proprietary and Confidential
89
Adaptive Coding and Modulation (ACM)
In ACM mode, the radio will select the highest possible link capacity based on received signal quality.
When the signal quality is degraded due to link fading or interference, the radio will change to a more robust
modulation and link capacity is consequently reduced.
When signal quality improves, the modulation is automatically increased and link capacity is restored to the original
setting. The capacity changes are hitless (no bit errors introduced).
During the period of reduced capacity, the traffic is prioritized based on Ethernet QoS - and TDM priority - settings.
In case of congestion the Ethernet or TDM traffic with lowest priority is dropped. TDM capacity per modulation
state is configurable as part of the TDM priority setting.
Proprietary and Confidential
Hitless and Errorless switching
Proprietary and Confidential
90
Using MSE with ACM
MSE - Definition
MSE is used to quantify the difference between an estimated
(expected) value and the true value of the quantity being
estimated
MSE measures the average of the squared errors:
MSE is an aggregated error by which the expected value differs
from the quantity to be estimated.
The difference occurs because of randomness or because the
receiver does not account for information that could produce a
more accurate estimated RSL
Proprietary and Confidential
91
To simplify.
Imagine a production line where a machine needs to insert
one part into the other
Both devices must perfectly match
Let us assume the width has to be 10mm wide
We took a few of parts and measured them to see how
many can fit in.
Proprietary and Confidential
The Errors Histogram
(Gaussian probability distribution function)
Quantity
Expected value
3
3
width
6mm
7mm
10mm
12mm
16mm
To evaluate how accurate our machine is, we need to know how many
parts differ from the expected value
9 parts were perfectly OK
Proprietary and Confidential
92
The difference from Expected value
Quantity
Error = 0 mm
Error = + 2 mm
Error = - 3 mm
Error = + 6 mm
Error = - 4 mm
width
6mm
7mm
10mm 12mm
16mm
To evaluate the inaccuracy (how sever the situation is) we
measure how much the errors differ from expected value
Proprietary and Confidential
Giving bigger differences more weight than smaller
differences
Quantity
Error = 0 mm
+ 2 mm = 4
-3 mm = 9
+ 6 mm = 36
- 4 mm = 16
width
6mm 7mm 10mm 12mm
16mm
We convert all errors to absolute values and then we square them
The squared values give bigger differences more weight than smaller differences,
resulting in a more powerful statistics tool:
16cm parts are 36 units away than 2cm parts which are only 4 units away
Proprietary and Confidential
10
93
Calculating MSE
Error = 0 mm
Quantity
+ 2 mm = 4
-3 mm = 9
- 4 mm = 16
+ 6 mm = 36
width
To evaluate the total errors, we sum all the squared errors and take the average:
16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13
The bigger the errors (differences) >> the bigger MSE becomes
Proprietary and Confidential
11
Calculating MSE
MSE determines how narrow / wide the Bell is
Quantity
width
10mm
When MSE is very small the Bell shaped histogram is closer to perfect
condition (straight line): errors = ~ 0
Proprietary and Confidential
12
94
MSE in digital modulation (Radios)
Let us use QPSK (4QAM)
as an example:
Q
01
00
QPSK = 2 bits per symbol
2 possible states for I signal
2 possible states for Q signal
11
= 4 possible states for the
combined signal
The graph shows the expected
values (constellation) of the
received signal (RSL)
10
Proprietary and Confidential
13
MSE in digital modulation (Radios)
The black dots represent the
expected values (constellation)
of the received signal (RSL)
Q
01
00
The blue dots represent the
actual RSL
11
10
As indicated in the previous
example, we can say that the
bigger the errors are the
harder it becomes for the
receiver to detect & recover the
transmitted signal
Proprietary and Confidential
14
95
MSE in digital modulation (Radios)
Q
01
00
MSE would be the average
errors of e1 + e2 + e3 + e4.
e1
e2
I
e4
When MSE is very small the
actual signal is very close to
the expected signal
e3
11
10
Proprietary and Confidential
15
MSE in digital modulation (Radios)
Q
01
00
When MSE is too big, the
actual signal (amplitude &
phase) is too far from the
expected signal
e1
e2
I
e4
11
e3
10
Proprietary and Confidential
16
96
Commissioning with MSE in EMS
When you commission your
radio link, make sure your MSE
is small
Actual values may be read
-34dB to -35dB
Bigger values will result in loss
of signal
Proprietary and Confidential
17
MSE and ACM
When the errors is too big, we need
a stronger error correction
mechanism (FEC)
Therefore, we reduce the number
of bits per symbol allocated for data
and re-assign the extra bits for
correction instead
For example
256QAM has great capacity but
poor immune to noise
64QAM has less capacity but much
better immune for noise
ACM Adaptive Code Modulation
Proprietary and Confidential
18
97
Triggering ACM with MSE
When ACM is enabled, MSE values are analyzed on each side of the link
When MSE degrades or improves, the system applies the required
modulation per radio to maintain service
MSE Down-Threshold
MSE Up-Threshold
8PSK
-16
-19
16QAM
-17
-23
32QAM
-21
-26
64QAM
-24
-29
128QAM
-27
-32
256QAM
-30
-34
512QAM
-32
-37
1024 QAM SFEC
-35
-38
1024 QAM WFEC
-36
-41
10
2048QAM
-39
Profile
Mod
QPSK
-18
Applicable for both 28/56MHz , 2048 QAM will be supported in 7.9
The values are typical and subject to change in relation to the frequency and RFU
type. For more details please contact your Ceragon representative
Proprietary and Confidential
19
ACM & MSE: An example
It is easier to observe the hysteresis of changing the ACM profile with
respect to measured MSE.
As you can see, the radio remains @ profile 8 till MSE improves to -38dB:
ACM
Profile
Downgrade
Downgrade
-41
-38
-37
-34
Profile 10
Profile 9
2048 QAM
-39
1024 QAM
Profile 8
1024 QAM
-36
Profile 7
512 QAM
-35
Profile 6
256 QAM
-32
Profile 5
128 QAM
-30
Profile 4
64 QAM
-27
Proprietary and Confidential
20
98
-24
Profile 3
32 QAM
MSE
-21
ACM & MSE: An Example
When RF signal degrades and MSE passes the upgrade point (MSE @ red point), ACM will
switch back FASTER to a higher profile (closer to an upgrade point) when MSE improves.
When RF signal degrades and MSE does not pass the upgrade point (green point) ACM
waits till MSE improves to the point of next available upgrade point (takes longer time to
switch back to the higher profile).
ACM
Profile
41
Profile10
38
Profile9
Profile8
393635
MSE
Proprietary and Confidential
21
ACM Benefits
The advantages of IP-20Ns dynamic ACM include:
Maximized spectrum usage
Increased capacity over a given bandwidth
8 to 10 modulation/coding work points (~3 db system gain for each
point change)
Hitless and errorless modulation/coding changes, based on signal
quality
Adaptive Radio Tx Power per modulation for maximal system gain per
working point
An integrated QoS mechanism that enables intelligent congestion
management to ensure that high priority traffic is not affected during
link fading
Proprietary and Confidential
22
99
ACM and 1+1HSB
When ACM is activated together with 1+1 HSB protection, it is
essential to feed the active RFU via the main channel of the coupler
(lossless channel), and to feed the standby RFU via the secondary
channel of the coupler (-6db attenuated channel). This maximizes
system gain and optimizes ACM behavior for the following reasons:
In the TX direction, the power will experience minimal attenuation.
In the RX direction, the received signal will be minimally attenuated.
Thus, the receiver will be able to lock on a higher ACM profile
(according to what is dictated by the RF channel conditions).
The following ACM behavior should be expected in a 1+1 or 2+2
configuration:
In the TX direction, the Active TX will follow the remote Active RX ACM
requests (according to the remote Active Rx MSE performance).
The Standby TX might have the same profile as the Active TX, or might
stay at the lowest profile (profile-0). That depends on whether the
Standby TX was able to follow the remote RX Active units ACM
requests (only the active remote RX sends ACM request messages).
In the RX direction, both the active and the standby carriers follow the
remote Active TX profile (which is the only active transmitter).
Proprietary and Confidential
23
Thank You
100
Radio Link Parameters
October 2014
Version 3
Agenda
MRMC
TX & RX Frequencies
Link ID
RSL
MSE
Current ACM Profile
Proprietary and Confidential
101
High and Low frequency station
Tx(f1)=11500 MHz
Rx(f1)=11500 MHz
Full duplex
Local site
High station
Remote site
Low station
Tx(f1)=11000 MHz
Rx(f1)=11000 MHz
High station means: Tx(f1) >Rx(f1)
Low station means: Tx(f1) < Rx(f1)
Proprietary and Confidential
Radio Link Parameters
TSL
IDU
ODU
))
RSL
ODU
IDU
To Establish a radio link, we need configure following parameters:
1. MRMC Modem scripts (ACM or fixed capacity, channel & modulation)
2. TX / RX frequencies set on every radio
3. Link ID must be the same on both ends
4. Max. TSL Max. allowed Transmission Signal [dBm]
5. Unmute Transceiver Transceiver is by default muted (is not transmitting)
------------------------------------------------------------------------------------------------------To verify a radio link, we need control following parameters:
1. RSL Received Signal Level [dBm] nominal input level is required
2. MSE- Mean Square Error [dB]
3. Current ACM profile
Proprietary and Confidential
102
MRMC Multi Rate Multi Coding Profiles
Modulation
RFUCwithRMCA
RFUCPremiumwith
RMCB
QPSK
Profile 0
Profile 0
8QAM
Profile 1
Profile 1
16QAM
Profile 2
Profile 2
32QAM
Profile 3
Profile 3
64QAM
Profile 4
Profile 4
128QAM
Profile 5
Profile 5
256QAM(strongFEC)
Profile 6
N/A
256QAM(weakFEC)
Profile 7
Profile 6
512QAM
N/A
Profile 7
1024QAM (StrongFEC)
N/A
Profile 8
1024QAM (LightFEC)
N/A
Profile9
Proprietary and Confidential
MRMC Scripts 1st step
1
N normal script
X XPIC script
ChangingscriptautomaticallyresetsdedicatedRMCcard
Proprietary and Confidential
103
Radio Parameters settings
2nd step
4th step
5th step
3th step
Proprietary and Confidential
LINK ID Antenna Alignment Process
To avoid pointing the antenna to a wrong direction (when both links share the same
frequency), LINK ID can be used to alert when such action is take.
# 101
# 101
# 102
# 101
Link ID Mismatch
Proprietary and Confidential
104
Link ID
Mismatch
LINK ID Antenna Alignment Process
Both IDUs of the same link must use the same Link ID
Otherwise, Link ID Mismatch alarm will appear in Current Alarms Window
# 101
# 101
# 102
# 101
Link ID Mismatch
Proprietary and Confidential
Questions?
Proprietary and Confidential
10
105
Link ID
Mismatch
Radio Link Setup Exercise
Proprietary and Confidential
11
Thank You
106
Automatic Transmit Power Control - ATPC
October 2014
Version 1
Agenda
Why ATPC?
How does ATPC works?
ATPC Vs. MTPC
ATPC Configuration
Proprietary and Confidential
107
ATPC Automatic Transmit Power Control
The quality of radio communication between low Power devices varies
significantly with time and environment.
This phenomenon indicates that static transmission power, transmission range,
and link quality, might not be effective in the physical world.
Static transmission set to max. may reduce lifetime of Transmitter
Side-lobes may affect nearby Receivers (image)
Main Lobe
Side Lobe
Proprietary and Confidential
ATPC Automatic Transmit Power Control
1. Enable ATPC on both sites
2. Set Input reference level (min. possible RSL to maintain the radio link)
3. ATPC on both ends establish a Feedback Channel through the radio link (1byte)
4. Transmitters will reduce Output power to the min. possible level
5. Power reduction stops when RSL in remote receiver reaches Ref. input level
6. ATPC is strongly recommended with XPIC configuration
TSL Adjustments
ATPC
module
Monitored RSL
Radio
Transceiver
Radio
Radio
Receiver
Feedback
Site A
Radio
Receiver
Signal
Quality
Check
Proprietary and Confidential
108
Ref. RSL
RSL
required
change
Site B
ATPC Example when ATPC is OFF
Site A
FSL= -60 dB
Site B
MTPC
MTPC
TSL A = 30dBm
RSL A = ?
TSL B = 30dBm
RSL B = ?
RSL A = -30dBm (TSL B + FSL)
RSL B = -30dBm (TSL A + FSL)
Proprietary and Confidential
ATPC Example when ATPC is ON (One site ATPC, second site MTPC)
Site A
FSL= -60 dB
Site B
ATPC
IRLB (Input Ref. level on Site B) = -50dBm
MTPC
TSL A = ?
RSL A = ?
TSL B = 30dBm
RSL B =?
TSL A = 10dBm (IRLB-FSL)
RSL B = -50dBm (TSL A + FSL)
RSL A = -30dBm (TSL B + FSL)
You want -50dBm on Site B, so what is TXA in Site A?
Proprietary and Confidential
109
ATPC Example when ATPC is ON (ATPC on both sites)
Site A
FSL= -60 dB
Site B
ATPC
IRLB (Input Ref. level on Site B) = -50dBm
ATPC
IRLA (Input Ref. level on Site A) = -50dBm
TSL A = ?
RSL A = ?
TSL B = ?
RSL B = ?
TSL A = 10dBm (IRLB - FSL)
TSL B = 10dBm (IRLA-FSL)
RSL A = -50dBm (TSLB + FSL)
RSL B = -50dBm (TSL A + FSL)
Proprietary and Confidential
ATPC Example when ATPC is ON (ATPC on both sites), ATPC range
Max TSL is 30dBm
ATPC range is 20dB
Site A
Max TSL is 30dBm
ATPC range is 20dB
FSL= -60 dB
Site B
ATPC
IRLB (Input Ref. level on Site B) = -60dBm
ATPC
IRLA (Input Ref. level on Site A) = -50dBm
TSL A = ?
RSL A = ?
TSL B = ?
RSL B = ?
TSL A = 10dBm (IRLB-FSL)
TSL B = 10dBm (IRLA - FSL)
RSL A = -50dBm (TSL B + FSL)
RSL B = -50dBm (TSL A + FSL)
RSL B is -50dBm because typical ATPC range for TX level is 20dB (depend on RFU type)!!!
It means that TSL A cant be 0dBm because possible min is 10dBm (Max is 30dBm)
Proprietary and Confidential
110
ATPC Configuration
Proprietary and Confidential
Thank You
10
111
Thispagewasintentionallyleftblank.
112
IP- 20N XPIC Configuration
November 2014
Version 3
Agenda
System Spectrum Utilization
ACAP
ACCP
CCDP
Co-channel System
IP-20N & XPIC
XPIC Recovery mechanism
XPIC Settings
Proprietary and Confidential
113
System Spectrum Utilization
BW
5
4
7
6
9
8
ACAP (Adjacent Channel Alternating Pol.)
10
BW
10
ACCP (Adjacent Channel Common Pol.)
BW
V
H
10
CCDP (Co-Channel Dual Polarisation)
Proprietary and Confidential
CCDP frequency plan
V
H
Vertical and Horizontal Polarization are using the same frequency
Proprietary and Confidential
114
1
2
Co-channel Systems
The XPIC improvement factor is typically 26 dB.
Two channels are using the same frequency but different polarization
RMC-B and XPIC script is required
The XPIC mechanism utilizes the received signals from the V and H modems to extract the V and H signals
and cancel the cross polarization interference due to physical signal leakage between V and H polarizations.
The H+v signal is the combination of the desired signal H (horizontal) and the interfering signal V (in lower
case, to denote that it is the interfering signal). The same happens with the vertical (V) signal reception=
V+h. The XPIC mechanism uses the received signals from both feeds and, manipulates them to produce the
desired data
IP-20Ns XPIC reaches a BER of 10e-6 at a co-channel sensitivity of 5 dB. The improvement factor in an
XPIC system is defined as the SNR@threshold of 10e-6, with or without the XPIC mechanism.
Proprietary and Confidential
Conditions for XPIC
XPIC is enabled by selecting an XPIC script for each carrier.
In order for XPIC to be operational, all the following conditions must be met:
The RMCs must be RMC-B
Communications with the RFU are established in both RMCs.
RFU type must be the same for both carriers.
The frequency of both radios should be equal.
The same script must be loaded in both RMCs.
The script must support XPIC
If any of these conditions is not met, an alarm will alert the user. In
addition, events will inform the user which conditions are not met.
Proprietary and Confidential
115
RSL Vs. Threshold for system without CCDP
RSL (dBm)
BER>10-6
-20
-30
Nominal Input Level
Fading Margin = 43dB
-73
Threshold level BER=10-6
BER>10-6
S/N=23dB for 128QAM (37 MHz)
Receiver amplifies thermal noise
-96
K Boltzmann constant
T Temperature in Kelvin
B Bandwidth
-99
Thermal Noise=10*log(k*T*B*1000)
Time (s)
Proprietary and Confidential
RSL Vs. Threshold for CCDP system without XPIC
RSL (dBm)
BER>10-6
-20
-30
Nominal Input Level H
Fading Margin = 17dB
Threshold level because of interference without XPIC
BER=10-6
-47
BER>10-6
S/N=23dB for 128QAM (37 MHz)
Interference level in H (interference from V,
separation between H & V with very good antenna is
35dB)
-65
-73
Interference
Threshold level without interference BER=10-6
-96
-99
Time (s)
Proprietary and Confidential
116
RSL Vs. Threshold for CCDP system with XPIC
RSL (dBm)
BER>10-6
-20
-30
Nominal Input Level H
Fading Margin = 38 dB
BER>10-6
Interference level in H (interference from V, when
XPIC is not enabled
XPIC will
improve
interference
for extra
26dB
-65
-68
-73
Threshold level when XPIC is ON
Original Threshold level without CCDP and XPIC
S/N=23dB for 128QAM (37 MHz) configuration
Interference level in H (interference from V, when
XPIC is enabled
-91
Interference level
Time (s)
Proprietary and Confidential
Conditions for XPIC
XPIC
XPIC
XPIC
XPIC
XPIC is enabled by loading an XPIC
script to the radio in the IDU.
In order for XPIC to be operational,
all the following conditions must be
met:
Communications with the RFU are
established in both RMCs:
An RFU must be connected to each
RMC
The frequency of both radios should
be equal.
The same script must be loaded in
both RMCs.
If any of these conditions is not met,
an alarm will alert the user. In
addition, events will inform the user
which conditions are not met.
Proprietary and Confidential
10
117
XPIC Recovery Mechanism
The purpose of the XPIC recovery mechanism is to save the working link while
attempting to recover the faulty polarization.
The mechanism works as follows:
The indication that the recovery mechanism has been activated is a loss of
modem preamble lock, which takes place at SNR~10dB.
The first action taken by the recovery mechanism is to cause the remote
transmitter of the faulty carrier to mute, thus eliminating the disturbing signal and
saving the working link.
Following this, the mechanism attempts at intervals to recover the failed link. In
order to do so, it takes the following actions:
The remote transmitter is un-muted for a brief period.
The recovery mechanism probes the link to find out if it has recovered. If not,
it again mutes the remote transmitter.
This action is repeated in exponentially larger intervals. This is meant to
quickly bring up both channels in case of a brief channel fade, without
seriously affecting the working link if the problem has been caused by a
hardware failure.
The number of recovery attempts is user-configurable
Every such recovery attempt will cause a brief traffic hit in the working
link.
Proprietary and Confidential
11
Recommendations
It is recommended to place the same type of cards in adjacent pairs, as follows:
Slots 3 and 4
Slots 5 and 6
Slots 7 and 8 (2RU only)
Slots 9 and 10 (2RU only)
The reason for this is that for certain features, connectivity is supported in the backplane
between these slot pairs
For example 2+2 HSB SD configuration with XPIC:
1+1 or 2+2 are supported in release 7.9
When combining HSB SD and XPIC, the HSB SD protection group and the
XPIC group cannot be identical. A valid combination would be:
XPIC Group #1: Slot 3 and 4
XPIC Group #2: Slot 5 and 6
Radio Protection Group #1: Slot 3 and 5
Radio Protection Group #2: Slot 4 and 6
Proprietary and Confidential
12
118
MRMC selection
X means XPIC script
N Normal script
Proprietary and Confidential
13
XPIC settings
Proprietary and Confidential
14
119
Thank you
15
120
Service Model in IP-20
November 2014
Version 5
Agenda
IP-20 Ethernet Capabilities
Service Model in General
What is a Service ?
What is a Service point?
Services in IP-20 Family & Services attributes
1.
2.
3.
Point to Point Service
Multipoint Service
Management Service
Service Point in IP-20 Family
1.
2.
3.
4.
Pipe Service Point
Service Access Point (SAP)
Service Network Point (SNP)
Management Service Point (MNG)
Service Points classification and attributes
Examples for Services and Service points
Logical VS. Physical Port
Proprietary and Confidential
121
IP-20s Ethernet Capabilities
Up to 1024 services (1025 reserved for Management)
Up to 32 service points per service (30 SPs for MNG service)
All service types:
Multipoint (E-LAN)
Point-to-Point (E-Line)
Point-to-Multipoint (E-Tree)
Smart Pipe
Management
128K MAC learning table per service - ability to limit MAC learning per
service
Split horizon between service points
Flexible transport and encapsulation via 802.1q, 802.1ad (Q-in-Q), and
MPLS-TP, with tag manipulation possible at egress
High precision, flexible frame synchronization solution combining SyncE
and 1588v2
Hierarchical QoS with 8K service level queues, deep buffering, hierarchical
scheduling via WFQ and Strict priority, and shaping at each level
Proprietary and Confidential
IP-20s Ethernet Capabilities
Hierarchical two-rate three-Color policers
Port based Unicast, Multicast, Broadcast, Ethertype
Service-based
CoS-based
Up to four link aggregation groups (LAG)
Hashing based on L2, L3, MPLS, and L4
Enhanced <50msec network level resiliency (G.8032) for ring/mesh support
IP-20 is fully MEF-9 and MEF-14 certified for all Carrier Ethernet services.
Proprietary and Confidential
122
Service model in General
What is a Service?
A virtual bridge, connecting two or more interfaces
Bridge is a device that separates two or more network segments
within one logical network
Interfaces are usually referred to physical ports but can also be logical
ports
Proprietary and Confidential
123
Service Model
Service#1
Service#2
Proprietary and Confidential
Service points
Service points are logical entities attached to the interfaces that make up the
service. Service points define the movement of frames through the service.
Without service points, a service is simply a virtual bridge with no ingress or
egress interfaces.
Rails are second service point
towards the bridge
The Route is your first service point
towards the bridge
Proprietary and Confidential
124
What is a service point?
SP
Service#1
SP
SP
SP
Service#2
4
SP
SP
Proprietary and Confidential
Services in IP-20 Family
10
125
IP-20 Services
IP20N supports the following services types:
1. Point-to-Point Service (P2P)
2. Multipoint Service (MP)
3. Management Service (MNG)
4. Point-to-Multipoint Service (E-Tree)
E-Tree services are planned for future release.
Proprietary and Confidential
11
Point to Point Service (P2P)
Point-to-point services are used to provide connectivity between two
interfaces of the network element.
When traffic ingresses via one side of the service, it is immediately directed
to the other side according to ingress and egress tunneling rules.
This type of service contains exactly two service points and does not require
MAC address-based learning or forwarding
PIPE
PIPE
SAP
SAP
Proprietary and Confidential
12
126
Multipoint Service (MP)
Multipoint services are used to provide connectivity between two or more service points.
When traffic ingresses via one service point, it is directed to one of the service points in the
service, other than the ingress service point, according to ingress and egress tunneling rules, and
based on the learning and forwarding mechanism.
If the destination MAC address is not known by the learning and forwarding mechanism, the
arriving frame is flooded to all the other service points in the service except the ingress service
point.
1
SAP
SNP
2
SAP
SNP
Proprietary and Confidential
13
Management Service (MNG)
Traffic ports TCC
Management ports TCC
The management service is a multipoint service that connects the two local
management ports, the network element host CPU, and the traffic ports into a single
service. The service behavior is same as the Multipoint service behavior.
The management service is pre-defined with Service ID 1025.
CPU
1
4
2
SAP
SNP
Service ID 1025
2
Proprietary and Confidential
14
127
Service Attributes
Service ID - 1 - 1024
Service Type P2P, MP, MNG
Service Admin Mode Operational, Reserved
EVC-ID - Ethernet Virtual Connection ID (End-to-end).
EVC Description
Maximum Dynamic MAC Address Learning per Service
Static MAC Address Configuration
CoS Mode & Default CoS
xSTP Instance The spanning tree instance ID (1-63)
Split Horizon Group - (Enable/Disable)
Proprietary and Confidential
15
IP-20 Service Points
16
128
Service points
SAP
SNP
Pipe Service Point
Management Service Point
Proprietary and Confidential
Service Access Port SAP & Service Network Point SNP
Proprietary and Confidential
18
129
Service Access Port SAP & Service Network Point SNP
Proprietary and Confidential
19
Management (MNG) Service Point
Only used for management services
Proprietary and Confidential
20
130
Pipe Service Points
Pipe Service Point Used to create traffic connectivity between two
points in a port-based manner (Smart Pipe). In other words, all the
traffic from one port passes to the other port. Pipe service points are
used in Point-to-Point services
PIPE
SAP
PIPE
SAP
PIPE
SAP
Proprietary and Confidential
21
Service points classification
22
131
PIPE
SAP
Service Point Interface Types
InterfaceType
Typesof Frames
AppliestoSPType
Dot1q
AsingleCVLANisclassifiedintotheservice
point
All
Stag
AsingleSVLANisclassifiedintotheservice
point
SNPandMNG
BundleC
AsetofCVLANsisclassifiedintotheservice
point
SAP
BundleS
AsingleSVLANandaset ofCVLANare
classifiedintotheservicepoint
SAP
AlltoOne
AllCVLANs,SVLANswithTPIDdiffthanthe
systemone anduntaggedframesthatenter
theinterfaceareclassifiedintotheservice
point
SAP
QinQ
AsingleSVLANandCVLANcombinationis
classifiedintotheservicepoint
SAPandMNG
Proprietary and Confidential
23
Service Points
Service
Proprietary and Confidential
24
132
Service
Proprietary and Confidential
25
Service Point Types that can Co-Exist on the Same Interface
Service point Types per Service Type
Service point type
Service Type
Management
MNG
SAP
SNP
Pipe
Yes
No
No
No
Point-to-Point
No
Yes
Yes
Yes
Multipoint
No
Yes
Yes
No
Service Point Types that can Co-Exist on the Same Interface
MNG SP
SAP SP
SNP SP
Pipe SP
MNG SP
Only one MNG SP is
allowed per interface.
Yes
Yes
Yes
SAP SP
Yes
Yes
No
No
SNP SP
Yes
No
Yes
No
PIPE SP
Yes
No
No
Only one Pipe SP is
allowed per interface.
Proprietary and Confidential
26
133
Service Point Types that can Co-Exist on the Same Interface
Proprietary and Confidential
27
Example of dot1q services
TheclassificationtoPtP1andPtP2isbased
ononecvlan.
PtP 1usessamecvlan astheclassification
atbothends
PtP 2usesdifferentcvlan asthe
classificationatbothends.
PtP1 andPtP2usesthetransportvlan
insidethenetwork.Theoriginalcvlan is
notsentinsidethenetwork.
CVlan
SAP3
10
SAP3
ptp 1
SAP1
CVlan
10
SAP1
20
SAP2
CVlan
SAP4
SAP2
120
ptp 2
TransportVlan
EVC
100
ptp1
200
ptp2
Proprietary and Confidential
28
134
SAP
SNP
SAP4
Example of bundle services
TheclassificationtoPtP1andPtP2isbased
onseveralcvlans.
PtP1 andPtP2usesthetransportvlan
insidethenetwork.Theoriginalcvlan is
preservedandsentinsidethenetwork.
CVlan
SAP3
10,11
SAP3
ptp 1
CVlan
SAP1
10,11
SAP1
20,21
SAP2
CVlan
SAP4
SAP2
20,21
SAP4
ptp 2
TransportVlan
EVC
100
ptp1
200
ptp2
29
SAP
SNP
Proprietary and Confidential
Example of Q-in-Q services
TheclassificationtoPtP1andPtP2isbased
onapairofcvlan andsvlan.
PtP1 andPtP2usesthetransportvlan
insidethenetwork.Theoriginalcvlan and
svlan isnotsentinsidethenetwork.
SAP3
SVlan
CVlan
230
10
SAP3
ptp 1
SAP1
SAP4
SAP2
SVlan
CVlan
340
320
ptp 2
SVlan
CVlan
230
10
SAP1
240
20
SAP2
TransportVlan
EVC
100
ptp1
200
ptp2
SAP
SNP
Proprietary and Confidential
30
135
SAP4
Service points Attributes
31
Service Point Attributes
As described above, traffic ingresses and egresses the service via service
points. The service point attributes are divided into two types:
Ingress Attributes Define how frames are handled upon ingress, e.g.,
policing and MAC address learning.
Egress Attributes Define how frames are handled upon egress, e.g.,
preservation of the ingress CoS value upon egress, VLAN swapping.
Proprietary and Confidential
136
Service Point Attributes
General
Ingress
Egress
ServicePointID
LearningAdmin
CVLANCoS Preservation
Service PointName
AllowFlooding
CVLAN Preservation
ServicePointType
AllowBroadcast
SVLANCoS Preservation
Interface
CoS Mode
MarkingAdmin
InterfaceType
DefaultCoS
ServiceBundle ID
CVLANEncapsulation
SVLANEncapsulation
Proprietary and Confidential
33
Service Point General Attributes
General
Service Point ID number for service point inside
the same service
Service Point Name The Name for service point
if is needed
ServicePointID
Service PointName
ServicePointType
Interface
InterfaceType
Service Point Type- SAP, SNP, MNG, PIPE
Interface - The logical interface on which the
service point is located
Interface Type Dot1q, S-Tag, Bundle-C, BundleS, All-to-One, Q-in-Q
C-Vlan Encapsulation - The C-VLAN classified
CVLANEncapsulation
SVLANEncapsulation
into the service point
S-Vlan Encapsulation - The S-VLAN classified
into the service point
Proprietary and Confidential
34
137
Service Point Ingress Attribute
Learning Admin - Indicates whether MAC
Ingress
LearningAdmin
address learning is enabled or disabled
Allow Flooding - Indicates whether incoming
AllowFlooding
AllowBroadcast
CoS Mode
DefaultCoS
frames with unknown MAC addresses are
forwarded to other service points via flooding
Allow Broadcast - Indicates whether frames with
a broadcast destination MAC address are allowed
to ingress the service via this service point
CoS Mode - Indicates how the service point
handles the CoS of frames that pass through the
service point.
Default CoS The service point CoS. If the CoS
Mode is set to overwrite the CoS decision made at
the interface level, this is the CoS value assigned
to frames that ingress the service point.
Proprietary and Confidential
35
Service Point Egress Attribute
C-Vlan CoS Preservation - Indicates whether the
Egress
CVLANCoS Preservation
CVLAN Preservation
SVLANCoS Preservation
MarkingAdmin
ServiceBundle ID
original C-VLAN CoS value is preserved or
restored for frames egressing from the service
point
C-Vlan Preservation - Indicates whether the
original C-VLAN ID is preserved or restored for
frames egressing from the service point
S-Vlan CoS Preservation - Indicates whether the
original S-VLAN CoS value is preserved or
restored for frames egressing from the service
point
Marking Admin - Indicates whether re-marking of
the outer VLAN (C-VLAN or S-VLAN) of tagged
frames that pass through the service point is
enabled
Service Bundle ID - This can be used to assign
one of the available service bundles from the HQoS hierarchy queues to the service point
Proprietary and Confidential
36
138
Ethernet Service Points GUI
General
ServicePointID
Service PointName
ServicePointType
Interface
InterfaceType
CVLANEncapsulation
SVLANEncapsulation
Ingress
LearningAdmin
AllowFlooding
AllowBroadcast
CoS Mode
DefaultCoS
Egress
CVLANCoS Preservation
CVLAN Preservation
SVLANCoS Preservation
MarkingAdmin
ServiceBundle ID
Proprietary and Confidential
37
Logical Vs. Physical Interface
38
139
Logical and physical interface
Proprietary and Confidential
39
Service Demo
40
140
The Setup
IP-20
IP-20C
Proprietary and Confidential
41
Creating the Service
Proprietary and Confidential
42
141
Attaching Service Points
Proprietary and Confidential
43
Attaching Service Points
Proprietary and Confidential
44
142
Attaching Service Points
Proprietary and Confidential
45
Questions?
Proprietary and Confidential
46
143
Thank You
144
Protection System Configuration
November 2014
Version 4
Agenda
What is Protection?
General Guidelines
HSB Configuration in general principals
BBS Space Diversity
1+1 HSB Configuration
2+2 HSB ABC Configuration
2+2 HSB XPIC Configuration
Proprietary and Confidential
145
Different types of protections systems
Proprietary and Confidential
What is Protection?
A method of using one or more devices in a standby mode in order to
have a secondary link up when failure occurred to the active link
In order to achieve a full protected link each and every device should
be protected
The number of multiplied devices depends on the link importance
The process of keeping (something or someone) safe
Wikipedia.com
Everybody needs Protection
Proprietary and Confidential
146
Hot standby in general
1
Ch1
Main
Ch1
Main
In case of ch1 failure, will be traffic
switched to Protection channel
1
1
Protection
Protection
1
HSB system is using same frequency for Main and Standby channel (f1 & f1)
HSB system is typically 1+1
Protection channel is internally muted. Just in case Main channel failure will be Protection channel Unmuted.
Space diversity with baseband switching is based on HSB system (selection of better input level)
In Hot Standby mode only one transmitter is active, the other transmitter is standby. Both receivers are active
and hitless switching is performed. The TX- and RX- switching at a terminal normally operates independently,
but they may be configured to operate together.
Proprietary and Confidential
HSB Protection
IP-20N offers radio redundancy via the RMCs, which can be configured in 1+1 Hot
Standby (HSB) pairs.
1+1 HSB protection provides full protection in the event of RMC or RFU failure.
Each RMC in a protected pair reports its status to the TCC. The TCC is responsible
for determining when a switchover takes place.
In a 1+1 HSB configuration:
The RMCs must have the same configuration.
The RFUs must be the same type and must have the same configuration.
Proprietary and Confidential
147
HSB Protection Revertive mode
In an HSB protection scheme, the active and standby radios are usually
connected to the antenna with a coupler.
This causes a -6dB loss on the secondary path on each side of the link,
resulting in a 12dB increase in the total path loss for the link.
This additional path loss will either reduce the links fade margin or increase
the power consumption of the Power Amplifier (PA) in order to compensate
for the additional path loss.
The system monitors the availability of the primary path at all times.
Whenever the primary path is operational and available, without any alarms,
but the secondary path is active, the system initiates a revertive protection
switch. Every revertive protection switch is recorded as an event in the
event log.
EACH PROTECTION SWITCH CAUSES TRAFFIC DISRUPTION!!!
Proprietary and Confidential
Switchover Triggers
The following events trigger switchover for 1+1 HSB protection according to
their priority, with the highest priority triggers listed first.
1.
2.
3.
4.
5.
Card missing
Lockout
Force switch
Traffic failures
Manual switch
Proprietary and Confidential
148
ACM and 1+1HSB
When ACM is activated together with 1+1 HSB protection, it is
essential to feed the active RFU via the main channel of the coupler
(lossless channel), and to feed the standby RFU via the secondary
channel of the coupler (-6db attenuated channel). This maximizes
system gain and optimizes ACM behavior for the following reasons:
In the TX direction, the power will experience minimal attenuation.
In the RX direction, the received signal will be minimally attenuated.
Thus, the receiver will be able to lock on a higher ACM profile
(according to what is dictated by the RF channel conditions).
The following ACM behavior should be expected in a 1+1 or 2+2
configuration:
In the TX direction, the Active TX will follow the remote Active RX ACM
requests (according to the remote Active Rx MSE performance).
The Standby TX might have the same profile as the Active TX, or might
stay at the lowest profile (profile-0). That depends on whether the
Standby TX was able to follow the remote RX Active units ACM
requests (only the active remote RX sends ACM request messages).
In the RX direction, both the active and the standby carriers follow the
remote Active TX profile (which is the only active transmitter).
Proprietary and Confidential
General Guidelines
A Standby RMC is referred to as the Mate RMC
When a switchover occurs, the Active RMC becomes Standby and
the Standby RMC becomes Active
It is possible for maintenance reason to lock current status
Proprietary and Confidential
10
149
1+1HSB Configuration
11
1+1 HSB Configuration
1+1 HSB supported only by TCC-B
1+1 HSB SD supported only by TCC-B-MC
Select Member 2
Select Member 1
We support up to 4 Protection Groups
Summary
Submit
Proprietary and Confidential
12
150
Copy to Mate
1. Configure first (Main) radio link (MRMC, Freq., Link ID)
2. Select Copy to mate source radio location (In this case 1st link)
Proprietary and Confidential
13
HSB Exercise
Create 1+1 HSB link
Disconnect one of the RFUs, make sure the link switched
Reconnect the RFU
Set manual switching
Proprietary and Confidential
14
151
Multi-Carrier ABC 2+2 HSB Configuration
15
Multi Carrier ABC 2+2 HSB
1- Cards configuration
TCC-B-MC and RMC-B is required check Platform/Management/Inventory
Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them
HSB 1
HSB 2
P1
P2
16
Proprietary and Confidential
152
Multi Carrier ABC 2+2 HSB
2 - MC-ABC pre-configuration
1. Enable CMR via CLI per each slot belongs to ABC group (slot 3,4,7,8)
root> platform shelf-manager abc mode admin set slot 3 state enable
2. Configure Multi Carrier ABC group. Create Group 1, use any name (2+2 HSB), press
Finish Submit (not next)
3. Edit created group and Enable protection
4. You are not able to add any members because they havent been created yet.
3
2
!!!
17
Proprietary and Confidential
Multi Carrier ABC 2+2 HSB
3 - Protection Groups
Create Protection Group #1 (slot 3 &7) and Protection Group #2 (slot 4 & 8)
1+1 HSB is used only for TCC-B
1+1 HSB SD is used only for TCC-B-MC
Slot 7
Slot 8
Slot 3
Slot 4
Note: If configuration will failed, please enable CMR for each radio slot in CLI:
root>platform shelf-manager abc mode admin set slot 3 state enable
18
Proprietary and Confidential
153
Multi Carrier ABC 2+2 HSB
4 - Protection Groups
Configure 1st link slot 3 (MRMC, freq., Link ID)
Copy to mate slot 3 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 7.
Configure 2nd link slot 4 (MRMC, freq., Link ID)
Copy to mate slot 4 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 8.
2+2 HSB is now ready!!! (but we need add members for ABC)
Slot 7
Slot 8
Slot 3
Slot 4
19
Proprietary and Confidential
Multi Carrier ABC 2+2 HSB
5- MC ABC Configuration Adding members
1.
2.
3.
4.
Add Protection Group #1 & Protection Group #2 into ABC
Check if Members PG1 & PG2 are enabled
Check if in MUX Configuration is Enabled ABC MUX Number 1
Check Interface Manager if Multi Carrier ABC Group #1 is UP
5. Chassis Configuration Change operation status per each ABC slot to Enable
20
Proprietary and Confidential
154
Multi-Carrier ABC 2+2 HSB XPIC
Configuration
Video link: https://app.box.com/s/r60ek2xse43o94phhgt6
21
Multi Carrier ABC 2+2 HSB XPIC
1- Cards configuration
TCC-B-MC and RMC-B is required check Platform/Management/Inventory
Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them
HSB 1 XPIC 2 HSB 2
P2
P1
XPIC 1
V
H
22
Proprietary and Confidential
155
P1
P2
Multi Carrier ABC 2+2 HSB XPIC
2 - MC-ABC pre-configuration
1. Enable CMR via CLI per each slot belongs to ABC group (slot 3,4,7,8)
root> platform shelf-manager abc mode admin set slot 3 state enable
2. Configure Multi Carrier ABC group. Create Group 1, use any name (2+2 HSB), press
Finish Submit (not next)
3. Edit created group and Enable protection
4. You are not able to add any members because they havent been created yet.
3
2
!!!
23
Proprietary and Confidential
Multi Carrier ABC 2+2 HSB XPIC
3 - Protection Groups
Create Protection Group #1 (slot 3 &7) and Protection Group #2 (slot 4 & 8)
1+1 HSB is used only for TCC-B
1+1 HSB SD is used only for TCC-B-MC
Slot 7
Slot 8
Slot 3
Slot 4
Note: If configuration will failed, please enable CMR for each radio slot in CLI:
root>platform shelf-manager abc mode admin set slot 3 state enable
24
Proprietary and Confidential
156
Multi Carrier ABC 2+2 HSB XPIC
4 - Protection Groups
Configure 1st link slot 3 (MRMC, freq., Link ID)
Copy to mate slot 3 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 7.
Configure 2nd link slot 4 (MRMC, freq., Link ID)
Copy to mate slot 4 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 8.
2+2 HSB is now ready!!! (but we need add members for ABC)
Slot 7
Slot 8
Slot 3
Slot 4
25
Proprietary and Confidential
Multi Carrier ABC 2+2 HSB XPIC
5- XPIC Groups configuration
Create XPIC Group # 1 (slot 3 + slot 4)
Create XPIC Group # 2 (slot 7 + slot 8)
Enable XPIC Group #1 & # 2
Slot 7
Slot 8
Slot 3
Slot 4
26
Proprietary and Confidential
157
Multi Carrier ABC 2+2 HSB XPIC
6 MC ABC Group Configuration Adding members
1.
2.
3.
4.
Add Protection Group #1 & Protection Group #2 into ABC
Check if Members PG1 & PG2 are enabled
Check if in MUX Configuration is Enabled ABC MUX Number 1
Check Interface Manager if Multi Carrier ABC Group #1 is UP
5. Chassis Configuration Change operation status per each ABC slot to Enable
27
Proprietary and Confidential
Thank You
158
Multi Carrier Adaptive Bandwidth Control
MC-ABC
November 2014
Version 4
Agenda
Multi-channel ABC in general
Multi Carrier ABC engine
Multi Carrier ABC & ACM
Hybrid Multi-Carrier ABC Concept
Multi-Carrier ABC 2+0 Configuration
Multi-Carrier ABC 8+0 Configuration
2+0 MC-ABC Configuration with STM-1 Clear channel
Multi-Carrier ABC 2+2 HSB Configuration
Multi-Carrier ABC 2+2 HSB XPIC Configuration
Proprietary and Confidential
159
Multi-carrier Adaptive Bandwidth Control (ABC)
Multi-channel Adaptive Bandwidth Control-ABC is the unique technology for traffic distribution over several
The Multi-channel ABC dynamically adjusts the total link capacity depending on the number of channels and
The traffic from the Ethernet WAN port is distributed to all available RF channels in a round robin fashion,
RF carriers.
their available capacities to provide the highest throughput at any time.
independent of packet sizes and flows. This results in a single high-capacity Ethernet link, with a high level of
resilience and efficiency.
If an RF-channel fails, the overall throughput will drop, but the remaining capacity will be fully utilized. The
QoS scheduler ensures that high priority traffic is transmitted unaffected, while low priority traffic may be
dropped if the link becomes congested.
http://www.youtube.com/watch?v=zBVL1Ac9xJU
Proprietary and Confidential
Multi Carrier ABC
Multi Carrier ABC and BBS with SD require RMC-B and TCC-B-MC.
Multi-Carrier Adaptive Bandwidth Control (ABC) is an innovative technology that
creates logical bundles of multiple radio links and optimizes them for wireless
backhaul applications.
Multi-Carrier ABC enables separate radio carriers to be shared by a single Ethernet
port.
This provides an Ethernet link over the radio with multiple capacities, while still
behaving as a single Ethernet interface.
In Multi-Carrier ABC mode, traffic is divided among the carriers optimally at the radio
frame level without requiring Ethernet link aggregation (LAG).
Load balancing is performed without regard to the number of MAC addresses or the
number of traffic flows.
During fading events which cause ACM modulation changes, each carrier fluctuates
independently with hitless switchovers between modulations, increasing capacity
over a given bandwidth and maximizing spectrum utilization.
The result is 100% utilization of radio resources in which traffic load is balanced
based on instantaneous radio capacity per carrier.
http://www.youtube.com/watch?v=zBVL1Ac9xJU
Proprietary and Confidential
160
Multi-Carrier ABC Traffic Flow
TCC
Service Engine
Ethernet Interface
IF
Eth LIC
RMC-B
Ethernet Interface
Ethernet Interface
Network Processor
IF
Ethernet Interface
Ethernet Interface
RMC-B
Hybrid
Multicarrier ABC
Engine
PW
E1
Srv
TDM
LIC
TDM Crossconnect
E1 Services
PW
E1
Srv
IF
RMC-B
TDM
LIC
E1/CH-STM-1
STM-1/
RST LIC
STM-1RST
STM-1/
RST LIC
STM-1RST
STM-1/
RST LIC
STM-1RST
Proprietary and Confidential
Multi- Carrier ABC Operation
The MC-ABC engine divides the data flows into blocks of data. Each
radio carrier is assigned blocks at a rate which is based on the ACM
profile of the carrier. Once the ACM profile of a carrier changes, the
rate at which the data blocks are delivered to this carrier changes. The
higher the ACM profile of a certain carrier, the higher the block rate
assigned to this carrier.
On the receiving side of the link, all blocks are synchronized, meaning
that blocks are delayed based on the last arriving block. The latency of
the aggregated data flow is determined by the slowest arriving block.
A low ACM profile means more latency compared to a higher ACM
profile. When all channels run the same radio script, the latency
variation for the aggregated data stream is determined by the latency
variation of one radio channel. This latency variation is slightly more
complicated to predict when the radio carriers runs at different radio
scripts, since each radio script has a unique delay distribution. MultiCarrier ABC can tolerate a large delay variance between the slowest
and the fastest arriving blocks.
Proprietary and Confidential
161
MC-ABC & ACM
Multi-Carrier ABC automatically adapts to capacity changes that result
from changes in the current ACM profile.
When an ACM profile change takes place on a specific carrier, MCABC responds by changing the block size of that channel.
The process of changing the block size is performed dynamically and
is hitless.
Since the ACM profile changes are also hitless, the overall MultiCarrier ABC traffic is hitless.
Proprietary and Confidential
Multi-Carrier ABC engine
ABC Engine
1Gbps connection for
Ethernet and TDM
Clear STM-1 channels
Network
Processor
1xUpto8+0MCABC(Upto1Gbps)
1+1/2+2MCABC/HSB(Upto1Gbps)
MixedNx1+0/1+1&1xABC(4+0)
Ethernet ports
Channelized STM-1 or E1/DS1
Proprietary and Confidential
162
Multi-carrier ABC
2. Unusedprotectionchannelfor
asinglecarrierfailure
Radio
STM1#N
Ethernet
Traffic
ABC engine
STM1
#2
4. MulticarrierABCworkssolely
onEthernetcarriers
Unused
channel
STM1
#1
3. ExcessEthernettrafficmaybe
addedtoSDHcarriers
(providedthereisexcess
bandwidth)
Radio
Radio
Radio
Radio
1. Dedicatedcarrierforeach
STM1
Protection
Radio
In the past: N+1 protection
L2 switch
SimpleandPowerfulTrafficAllocation TDM&Ethernet
Proprietary and Confidential
Hybrid Multi-Carrier ABC Concept
Creating Logical Groups
3. Nochannelisleftunused full
utilizationofavailable
bandwidth
1 2
1 2
6. Flexiblechoiceofmodulation
(lowermodulation higher
sys.gain)
Ethernet
Traffic
5. Protectsagainstmultiple
carrierfailures
STM1#N
STM1
#2
ABC Engine
STM1
#1
4. Incaseofchannelfailureor
degradation,SDHtrafficis
alwaysprioritizedover
Ethernettraffic.
1 2
Radio
Radio
1 2
Radio
2. SDHtrafficissplit(byteby
byte)betweencarriers,
combinedwithpackettraffic
Radio
1. Allradiocarriersserveasa
singlelogicalpipe
Network
Processor
SimpleandPowerfulTrafficAllocation TDM&Ethernet
Proprietary and Confidential
10
163
Hybrid Multi-Carrier ABC
Channel failure/degradation
1 2
Radio
Radio
1 2
155
STM1
#2
155
STM1
#1
Ethernet
Traffic
ABC Engine
3. Totalavailablecapacityfor
Ethernettraffic:
1 2
STM1#N
Radio
2. AllSDHtrafficremainsintact
aslongas:
Radio
1. Systemishighlyresilientto
carrierfailure/degradation
Network
Processor
SimpleandPowerfulTrafficAllocation TDM&Ethernet
Proprietary and Confidential
11
2+0 MC-ABC Configuration
Video Link: https://app.box.com/s/d8gg7npc30cv9mrd57kd
12
164
Multi Carrier ABC 2+0
1- Cards configuration
TCC-B-MC and RMC-B are required check Platform/Management/Inventory
Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them
13
Proprietary and Confidential
Multi Carrier ABC 2+0
2 MC ABC Configuration
1.
2.
3.
4.
5.
6.
Create ABC Group 1 consists of slot 3 (channel 1) and slot 4 (channel 2)
Check if ABC group has Admin status Enable
Setup MRMC, Freq., Link ID per each radio link
Check if ABC MUX Number 1 is enabled
Check IF Manager MC ABC Grop1 is enabled
Enable all radio slots in Chassis Configuration
14
Proprietary and Confidential
165
8+0 MC-ABC Configuration
Video Link: https://app.box.com/s/qiakfcnv9va8bjbrh2xn
15
Multi Carrier ABC 8+0
1- Cards configuration
TCC-B-MC and RMC-B are required check Platform/Management/Inventory
Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them
16
Proprietary and Confidential
166
Multi Carrier ABC 8+0
2 MC ABC Configuration
1.
2.
3.
4.
5.
6.
Create ABC Group 1 consists of slot 3-10
Check if ABC group has Admin status Enable
Setup MRMC, Freq., Link ID per each radio link
Check if ABC MUX Number 1 is enabled
Check IF Manager MC ABC Grop1 is enabled
Enable all radio slots in Chassis Configuration
17
Proprietary and Confidential
2+0 MC-ABC Configuration with STM-1 Clear channel
18
167
STM-1 only card integration with ABC
ABC group should allow the following combination of types of cards
1. RMC-E/STM-1 and RMC-E
2. RMC-E/STM-1 and RMC-B
3. RMC-E and STM-1
4. RMC-B and STM-1
5. RMC-B only
6. RMC-E only
Attaching to a group
Can this be done dynamically (adding STM-1 card to an existing
group)
Group admin shall not be dependent on STM-1 admin
STM-1 may be disabled but the group enabled
Group size
Up to four STM-1 channels shall be supported per group
This is unrelated to the number of cards (no validation)
Interface number is priority as well
Group max size shall be 4 radios + 4 STM-1 cards (8 members)
Proprietary and Confidential
Multi Carrier ABC 2+0
1- Cards configuration
TCC-B-MC,RMC-B and STM-1/OC3 Interface (RMC-E should be used as STM1/OC3 interface as well) are required check Platform/Management/Inventory
Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them
20
Proprietary and Confidential
168
Multi Carrier ABC 2+0
2 MC ABC Configuration
1. Create ABC Group 1 consists of radio slots and STM-1 slots
2. Check if ABC group has Admin status Enable
3. Setup MRMC, Freq., Link ID per each radio link
4. Check if ABC MUX Number 1 is enabled
5. Check IF Manager MC ABC Grop1 is enabled
6. Enable STM-1 interfaces
7. Enable all radio slots in Chassis Configuration and
STM-1 cards as well
21
Proprietary and Confidential
Multi-Carrier ABC 2+2 HSB Configuration
22
169
Multi Carrier ABC 2+2 HSB
1- Cards configuration
TCC-B-MC and RMC-B are required check Platform/Management/Inventory
Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them
HSB 1
HSB 2
P1
P2
23
Proprietary and Confidential
Multi Carrier ABC 2+2 HSB
2 - MC-ABC pre-configuration
1. Enable CMR via CLI per each slot belongs to ABC group (slot 3,4,7,8)
root> platform shelf-manager abc mode admin set slot 3 state enable
2. Configure Multi Carrier ABC group. Create Group 1, use any name (2+2 HSB), press
Finish Submit (not next)
3. Edit created group and Enable protection
4. You are not able to add any members because they havent been created yet.
3
2
!!!
24
Proprietary and Confidential
170
Multi Carrier ABC 2+2 HSB
3 - Protection Groups
Create Protection Group #1 (slot 3 &7) and Protection Group #2 (slot 4 & 8)
1+1 HSB is used only for TCC-B
1+1 HSB SD is used only for TCC-B-MC
Slot 7
Slot 8
Slot 3
Slot 4
Note: If configuration will failed, please enable CMR for each radio slot in CLI:
root>platform shelf-manager abc mode admin set slot 3 state enable
25
Proprietary and Confidential
Multi Carrier ABC 2+2 HSB
4 - Protection Groups
Configure 1st link slot 3 (MRMC, freq., Link ID)
Copy to mate slot 3 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 7.
Configure 2nd link slot 4 (MRMC, freq., Link ID)
Copy to mate slot 4 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 8.
2+2 HSB is now ready!!! (but we need add members for ABC)
Slot 7
Slot 8
Slot 3
Slot 4
26
Proprietary and Confidential
171
Multi Carrier ABC 2+2 HSB
5- MC ABC Configuration Adding members
1.
2.
3.
4.
Add Protection Group #1 & Protection Group #2 into ABC
Check if Members PG1 & PG2 are enabled
Check if in MUX Configuration is Enabled ABC MUX Number 1
Check Interface Manager if Multi Carrier ABC Group #1 is UP
5. Chassis Configuration Change operation status per each ABC slot to Enable
27
Proprietary and Confidential
Multi-Carrier ABC 2+2 HSB XPIC
Configuration
Video link: https://app.box.com/s/r60ek2xse43o94phhgt6
28
172
Multi Carrier ABC 2+2 HSB XPIC
1- Cards configuration
TCC-B-MC and RMC-B are required check Platform/Management/Inventory
Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them
HSB 1 XPIC 2 HSB 2
P2
P1
XPIC 1
V
H
29
P1
P2
Proprietary and Confidential
Multi Carrier ABC 2+2 HSB XPIC
2 - MC-ABC pre-configuration
1. Enable CMR via CLI per each slot belongs to ABC group (slot 3,4,7,8)
root> platform shelf-manager abc mode admin set slot 3 state enable
2. Configure Multi Carrier ABC group. Create Group 1, use any name (2+2 HSB), press
Finish Submit (not next)
3. Edit created group and Enable protection
4. You are not able to add any members because they havent been created yet.
3
2
!!!
30
Proprietary and Confidential
173
Multi Carrier ABC 2+2 HSB XPIC
3 - Protection Groups
Create Protection Group #1 (slot 3 &7) and Protection Group #2 (slot 4 & 8)
1+1 HSB is used only for TCC-B
1+1 HSB SD is used only for TCC-B-MC
Slot 7
Slot 8
Slot 3
Slot 4
Note: If configuration will failed, please enable CMR for each radio slot in CLI:
root>platform shelf-manager abc mode admin set slot 3 state enable
31
Proprietary and Confidential
Multi Carrier ABC 2+2 HSB XPIC
4 - Protection Groups
Configure 1st link slot 3 (MRMC, freq., Link ID)
Copy to mate slot 3 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 7.
Configure 2nd link slot 4 (MRMC, freq., Link ID)
Copy to mate slot 4 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 8.
2+2 HSB is now ready!!! (but we need add members for ABC)
Slot 7
Slot 8
Slot 3
Slot 4
32
Proprietary and Confidential
174
Multi Carrier ABC 2+2 HSB XPIC
5- XPIC Groups configuration
Create XPIC Group # 1 (slot 3 + slot 4)
Create XPIC Group # 2 (slot 7 + slot 8)
Enable XPIC Group #1 & # 2
Slot 7
Slot 8
Slot 3
Slot 4
33
Proprietary and Confidential
Multi Carrier ABC 2+2 HSB XPIC
6 MC ABC Group Configuration Adding members
1.
2.
3.
4.
Add Protection Group #1 & Protection Group #2 into ABC
Check if Members PG1 & PG2 are enabled
Check if in MUX Configuration is Enabled ABC MUX Number 1
Check Interface Manager if Multi Carrier ABC Group #1 is UP
5. Chassis Configuration Change operation status per each ABC slot to Enable
34
Proprietary and Confidential
175
Thank You
176
IP-20N Licensing
October 2014
Version 4
Agenda
Licensing in General
Demo License
CeraOS License concept
IP-20 Licensing Scheme
Licensed Features
Proprietary and Confidential
177
Licensing
IP-20N offers a pay as-you-grow licensing concept in which
future capacity growth and additional functionality can be
enabled with Activation key.
For purposes of licensing, each IP-20N chassis is considered
a distinct device, regardless of which cards are included in the
chassis. Each device contains a single Activation key.
Licenses are divided into two categories:
Per Carrier The license is per carrier
Per Device The license is per device, regardless of the
number of carriers supported by the device.
Ceragon provides a web-based License Management
System (LMS). The LMS enables authorized users to
generate Activation keys, which are generated per IDU serial
number.
A 1+1 HSB configuration requires the same set of licenses for
both the active and the protected interfaces.
Proprietary and Confidential
License Management System
Proprietary and Confidential
178
License generating
License is generated according to chassis SN
Proprietary and Confidential
Mandatory Cards - IVM
Single card for 1RU and 2RU chassis.
2 x E2PROM on single board (function as 2 separated cards).
Installed at the back of the chassis
Holds the chassis:
License.
Node MAC address (48 MACs per unit).
Serial number for chassis
Proprietary and Confidential
179
DEMO License
A demo license is available that enables all features for 60 days.
The demo license expires 60 days from the time it was activated,
and the most recent valid license goes into effect.
The 60-day period is only counted when the system is powered up.
10 days before the demo license expires, an alarm is raised
indicating to the user that the demo license is about to expire.
Proprietary and Confidential
License violation
License violation yellow color screen has been implemented from sw. T7.9
Proprietary and Confidential
180
IP-20 Pricing Concept (Value Structure)
Hardware, Software & Licensed Features
CeraOS (Software)
LicensedScalability
Radiocapacity
2nd modem/core
activation(IP20G/C)
AdditionalGEuser
interfaces
AdditionalCETNode
services/EVCs(L2)
LicensedPremiumFunctionality
Advancedradioconfigurations
AdvancedQoS
EthernetOAM
TDMPWservices
Synchronization
NetworkResiliency
AdvancedSecurity
LicensedMode CETNode
CETservices/EVCs(L2)
2xGEuserinterfaces
SmartPipeservices(L1)
10Mradiocapacity
1xGEuserinterface
NativeTDMservices
Baseline
functionality
Hardware
ProductModels (e.g.IP20N,IP20G,IP20C,IP20LH)
Assemblyoptions (e.g.single/dualmodeminIP20G)
Addonmodules (e.g.RMCinIP20N)
Proprietary and Confidential
IP-20 Licensing Scheme
Per Carrier
Per Node Premium Functionality
Scalability
Radio capacity
Enhanced Packet Buffer
Frame Cut Through
H-QoS
Advanced radio configurations
ACM
XPIC
Multi-Carrier ABC
MIMO
Header De-duplication
Sync-Unit
IEEE-1588 TC
IEEE-1588 OC
IEEE-1588 BC
Redundancy/Resiliency group
Network Resiliency
Main Card Redundancy - HA
CET-Node mode/scalability
Edge (8 services/EVCs)
Agg-Lvl-1 (64 services/EVCs)
Agg-Lvl-2 (1024 services/EVCs)
Sync group
Per Node scalability
QoS group
Ethernet OAM group
Eth-OAM FM
ETH-OAM PM
General node scalability
TDM group
Security
TDM PW
2nd
modem activation (IP-20G only)
2nd core activation (IP-20C only)
GE user interfaces
Secure management
Proprietary and Confidential
10
181
Licensed Features
LicenseName
RadioCapacityLicense
IP20SLACM
IP20SLMCABC
IP20SLHeaderDeDuplication
IP20SLXPIC
Description
Enablesyoutoincreaseyoursystemsradiocapacityin
gradualstepsbyupgradingyourcapacitylicense.
Withoutacapacitylicense,eachcarrierhasacapacity
of10Mbps.Licensedcapacityisavailablefrom50
Mbpsto500Mbps.EachRMCcardcanbelicensedfor
adifferentcapacity.
EnablestheuseofAdaptiveCodingandModulation
(ACM)scripts.Aseparatelicenseisrequiredpercore.
EnablesMultiCarrierABC.
EnablestheuseofHeaderDeDuplication,whichcan
beconfiguredtooperateatL2throughL4.
EnablestheuseofCrossPolarizationInterface
Canceller(XPIC).Aseparatelicenseisrequiredforeach
coreintheXPICpair.
Proprietary and Confidential
11
Licensed Features
LicenseName
IP20SLGEPort
IP20SLMainCardRedundancy
Description
EnablestheuseofaTCC/LICEthernettrafficportinGE
mode(10/100/1000baseTor1000baseX).Anactivation
keyisrequiredforeachEthernettrafficportthatisused
onthedevice.Anactivationkeycanbeinstalled
multipletimeswithdynamicallocationinsidetheunit
toenablemultipleGEports.
Note:AllEthernettrafficportsareenabledinFEmode
(10/100baseT)bydefaultwithoutrequiringany
activationkey.
EnablestheuseofasecondTCCina2RUchassisfor
HighAvailability.
Proprietary and Confidential
12
182
Licensed Features
LicenseName
EdgeCETNode
Description
EnablesCarrierEthernetTransport(CET)andanumber
ofEthernetservices(EVCs),dependingonthetypeof
CETNodelicense:
EdgeCETNode Upto8EVCs.
AggregationLevel1CETNode Upto64EVCs.
AggregationLevel2CETNode Upto1024EVCs.
ACETNodelicensealsoenablesthefollowing:
Networkresiliency(MSTP/RSTP)forallservices.
Full QoSfor all services including basic queue buffer
management (fixed queues buffer size limit,tail
drop only)andeight queues perport,noHQoS.
LAGSupport
P20SLNetworkResiliency
Enablesthefollowingprotocolsforimprovingnetwork
resiliency:
G.8032
TDM(PW)services1:1/1+1pathprotection
Proprietary and Confidential
13
Licensed Features
LicenseName
IP20SLHQoSHQoS
IP20SLEnhPacketBuffer
IP20SLSyncUnit
P20SLFrameCutThrough
IP20SLTDMPW
Description
EnablesHQoS.Thislicenseisrequiredtoaddservice
bundleswithdedicatedqueuestointerfaces.Without
thislicense,onlythedefaulteightqueuesperportare
supported.(Plannedforfuturerelease)
Enables configurable (nondefault)queue buffer size
limitfor Green andYellow frames.Also enables WRED.
The defaultqueue buffer size limitis 1Mbitsfor Green
frames and0.5Mbits for Yellow frames.
EnablestheG.8262synchronizationunit.Thislicenseis
requiredinordertoprovideendtoendsynchronization
distributiononthephysicallayer.Thislicenseisalso
requiredtouseSynchronousEthernet(SyncE).
Enables Frame CutThrough.
EnablesTDMpseudowire servicesonunitswithTDM
interfaces.Withoutthisactivationkey,onlynativeTDM
servicesaresupported.
Proprietary and Confidential
14
183
Licensed Features
LicenseName
P20SLSecureManagement
IP20SLEthOAMFM
IP20SLEthOAMPM
Description
Enablessecuremanagementprotocols(SSH,HTTPS,
SFTP,SNMPv3,andRADIUS).
EnablesConnectivityFaultManagement(FM)per
Y.1731/802.1agand802.3ah(CETmodeonly).
EnablesperformancemonitoringpursuanttoY.1731
(CETmodeonly).
Proprietary and Confidential
15
License
Proprietary and Confidential
16
184
License features available
Proprietary and Confidential
17
Thank You
185
Thispagewasintentionallyleftblank.
186
Native TDM
November 2014
Version 6
Agenda
Native TDM Services
Hybrid Service Engine TDM + Ethernet
All-packet services example: Ethernet EVCs + TDM Pseudowire
How to Setup Native TDM
TDM Path Protection
1:1 TDM Path Protection
1+1 TDM Protection
1+1 Dual Homing TDM Path Protection
Configuration of Path Protection
2+0 MC-ABC Configuration with STM-1 Clear channel
TDM Card and Interface Protection (only for chSTM-1)
Proprietary and Confidential
187
Native TDM Services
IP-20N provides integrated support for transportation of TDM (E1) services
with integrated E1 and ch-STM-1 interfaces.
Two types of TDM services are supported using the same hardware:
Native TDM trails
TDM Pseudowire services (enabling interoperability with third party
packet/PW equipment)
IP-20N provides native TDM support, utilizing a cross-connect module to
support up to 512 TDM trails.
The IP-20N Web EMS provides a simple and easy-to-use GUI that enables
users to provision end-to-end TDM trails. The Services Provisioning GUI
includes the following trail-creation end points:
TDM interface
Radio interface
Proprietary and Confidential
Hybrid Services Engine Ethernet + TDM
Services engine
TDM cross-connect (VCs)
E1
Ch-STM1
TDM
traffic
TDM
PW
Hybrid
Radio
Network processor (EVCs)
Packet
traffic
GE/FE
Native TDM Services (VCs)
Ethernet Services (EVCs)
Ethernet switched (L2) services E-Line (PtP), E-LAN (MPtMP)
Ethernet port based (L1) services (smart pipe)
TDM Pseudowire services Unstructured (SAToP), Structured (CESoP)
Proprietary and Confidential
188
Hybrid services example: Ethernet EVCs + Native TDM
TDM cross-connect (VCs)
E1/
ch-STM1
Port
SAP
Ethernet Services (EVCs)
PtP Service
User Port
(UNI)
GE/FE
TDM
traffic
Port
SAP
SAP
SNP
SAP
Packet
traffic
Hybrid
Radio
MPtMP Service
SAP
User Port
(UNI)
GE/FE
SNP
Network
Port
Port
Port
SAP
GE/FE
SNP
Proprietary and Confidential
All-packet services example: Ethernet EVCs + TDM Pseudowire
Ethernet Services (EVCs)
TDM
PW
E1/DS1/
ch-STM1/
OC3
Port
PtP Service
SAP
SAP
SNP
SAP
PtP Service
User Port
(UNI)
GE/FE
Port
S-VLAN =
200
SAP
SAP
SNP
SAP
Packet
traffic
Packet
Radio
MPtMP Service
User Port
(UNI)
GE/FE
SAP
SNP
Network
Port
Port
Port
SAP
SNP
Proprietary and Confidential
189
GE/FE
How to Setup Native TDM
ETSI and ANSI
For IP-20N default standard is ETSI
To change the TDM interfaces to operate according to the ANSI (FCC) standard
(DS1 and OC-3), results in system reset and restores the default configuration.
Proprietary and Confidential
190
Native TDM Configuration
VC1
VC2
VC3
VC4
VC5
VC6
VC7
VC8
VC9
VC10 VC11 VC12
VC13 VC14 VC15 VCn
E1#1-16 (or STM-1 VC)
Loop Timing
TDM
Network
9
Proprietary and Confidential
TDM Service Configuration 1
As first we have to create any Eth. service for Radio port, because
we need specify which type of traffic will be carry by Radio.
Create any service point which is connected to the radio port in
Ethernet/Services
Proprietary and Confidential
10
191
TDM Service Configuration 2
LIC-T155 ACR card
16E1/DS1 card
1
2
3
OR
1 Select required TDM card
2 Select required E1or VC
3 Select Timing
Loop Timing Timing is taken from incoming traffic.
Recovered Clock Clock information is recovered on the egress path. Extra information may be located
in an RTP header that can be used to correct frequency offsets. Recovered Clock can provide very
accurate synchronization, but requires low PDV (Packer Delay Variation).
System Reference Clock Trails are synchronized to the system reference clock.
Front Panel Trails are synchronized from Front Panel synch. port.
Proprietary and Confidential
11
TDM Service Configuration - 3
TCC-B-MC with ABC
TCC-B
OR
Select VC for radio slot or
Multi Carrier ABC Group
VC1
VC2
VC3
VC4
VC5
VC6
VC7
VC8
VC9
VC10 VC11 VC12
VC13 VC14 VC15 VCn
E1#1-1
Proprietary and Confidential
12
192
TDM Service Configuration - 4
Proprietary and Confidential
13
TDM Service Configuration
Selection Summary
Proprietary and Confidential
14
193
TDM Path Protection
15
TDM Path Protection
TDM path protection enables the operator to define two separate network
paths for a single TDM service.
Two different kinds of path protection are available, each suitable for a
different network topology:
1:1 and 1+1 TDM path protection is suitable for ring networks that consist
entirely of IP-20N and/or IP-20G elements with two end-point interfaces for
the TDM trail.
1+1 Dual Homing TDM path protection is suitable for networks in which the
IP-20N and/or IP-20G elements are set up as a chain connected to the third
party networks at two different sites.
The ring is closed on one side by the IP-20N and/or IP-20G elements,
and on the other by third party equipment supporting standard SNCP.
In this case, there are three end-point interfaces in the IP-20N and/or
IP-20G section of the network.
Proprietary and Confidential
16
194
1:1 TDM Path Protection
Backup
Path
Active
Path
1:1 TDM path protection enables the operator to define two separate network paths for a single
TDM trail.
Each trail has the same TDM interface end points, but traffic flows to the destination via different
paths.
Bandwidth is utilized only on the active path, freeing up resources on the standby path.
For native TDM services TDM path protection is done by means of configuring active and backup
path at the TDM service end-points.
Proprietary and Confidential
17
1+1 TDM Path Protection
Backup
Path
Active
Path
1:1 TDM path protection enables the operator to define two separate network paths for a single
TDM trail.
Each trail has the same TDM interface end points, but traffic flows to the destination via different
paths.
Bandwidth is utilized for both paths parallel.
For native TDM services TDM path protection is done by means of configuring active and backup
path at the TDM service end-points.
Proprietary and Confidential
18
195
1+1 Dual Homing TDM Path Protection
1+1 TDM dual homing path protection is used for networks in which the IP-20 network elements are
set up as a chain connected to third party networks at two different sites, where one end-point is
located on an IP-20 unit and the other end-point is located on third-party equipment supporting
standard SNCP.
As with 1:1 TDM path protection, the operator defines two separate network paths for a single TDM
trail. However, unlike path protection, traffic flows through both paths simultaneously, thereby
supporting standard SNCP in the third party equipment.
Proprietary and Confidential
19
Configuration of Path Protection
20
196
Configuration for 1:1 and 1+1 TDM Path Protection
1:1 or 1+1 TDM Protection
Bypass
configuration
Bypass
configuration
Trail ID 1
Radio Slot 4
VC-1
E1#1
Slot 3
Trail ID 2
Radio Slot 5
VC-1
1:1 or 1+1 TDM Protection
Proprietary and Confidential
Configuration 1:1 or 1+1 TDM Path Protection
1
or
Proprietary and Confidential
22
197
TDM Service
Interface #1
Interface #2
Protection Interface
Proprietary and Confidential
23
Configuration for 1+1 Dual homing Edge
1+1 Dual homing
network edge
1+1 Dual homing
network edge
Trail ID 2
Trail ID 1
1+1 TDM Protection
Proprietary and Confidential
24
198
2+0 MC-ABC Configuration with STM-1 Clear channel
25
Multi-Carrier ABC Traffic Flow
TCC
Service Engine
Ethernet Interface
IF
Eth LIC
RMC-B
Ethernet Interface
Ethernet Interface
Network Processor
IF
Ethernet Interface
Ethernet Interface
RMC-B
Hybrid
Multicarrier ABC
Engine
PW
E1
Srv
TDM
LIC
TDM Crossconnect
E1 Services
PW
E1
Srv
IF
RMC-B
TDM
LIC
STM-1/
RST LIC
STM-1RST
STM-1/
RST LIC
STM-1RST
STM-1/
RST LIC
STM-1RST
Proprietary and Confidential
26
199
E1/CH-STM-1
STM-1 only card integration with ABC
ABC group should allow the following combination of types of cards
1. RMC-E/STM-1 and RMC-E
2. RMC-E/STM-1 and RMC-B
3. RMC-E and STM-1
4. RMC-B and STM-1
5. RMC-B only
6. RMC-E only
Attaching to a group
Can this be done dynamically (adding STM-1 card to an existing
group)
Group admin shall not be dependent on STM-1 admin
STM-1 may be disabled but the group enabled
Group size
Up to four STM-1 channels shall be supported per group
This is unrelated to the number of cards (no validation)
Interface number is priority as well
Group max size shall be 4 radios + 4 STM-1 cards (8 members)
Proprietary and Confidential
Multi Carrier ABC 2+0
1- Cards configuration
TCC-B-MC,RMC-B and STM-1/OC3 Interface (RMC-E should be used as STM1/OC3 interface as well) are required check Platform/Management/Inventory
Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them
28
Proprietary and Confidential
200
Multi Carrier ABC 2+0
2 MC ABC Configuration
1. Create ABC Group 1 consists of radio slots and STM-1 slots
2. Check if ABC group has Admin status Enable
3. Setup MRMC, Freq., Link ID per each radio link
4. Check if ABC MUX Number 1 is enabled
5. Check IF Manager MC ABC Grop1 is enabled
6. Enable STM-1 interfaces
7. Enable all radio slots in Chassis Configuration and
STM-1 cards as well
29
Proprietary and Confidential
TDM Card and Interface Protection
TDM card and interface protection is only applicable for LIC-T155 (1x ch-STM-1) cards.
30
201
TDM Card and Interface Protection
Two different schemes are available for card and interface protection:
1+1 HSB
Uni-Directional MSP
Both schemes provide full protection against hardware failure.
Both Schemes are available only for LIC-T155 card.
Uni-Directional MSP also provides full protection against interface failure due
to cable disconnection or failure of the far-end equipment, while 1+1 HSB
provides protection against interface failure due to cable disconnection at the
IP-20N side of the link.
In both schemes, configuration of the active card is automatically copied to the
standby card. The entire configuration can also be copied and stored for
maintenance purposes
Proprietary and Confidential
31
1+1 HSB Protection
1+1 HSB protection offers full redundancy for LIC-T155 cards. This form of
redundancy is appropriate for connections with third party equipment at which a
single STM-1 interface is available.
In a 1+1 HSB configuration, the single port on the third party equipment is connected
to two STM-1 interfaces on the IP-20N through an optical splitter cable. This ensures
that an identical signal is received by each STM-1 interface on the IP-20N. The IP20N determines which interface is active, based on traffic loss indications such as
LOS, LOF, or other errors.
While both interfaces on the IP-20N receive traffic, only the active interface transmits.
The standby interface is automatically muted.
Proprietary and Confidential
32
202
Uni-Direction MSP
In Uni-directional Multiplex Section Protection (MSP), the element at each end of the
STM-1 link transmits traffic through both connections.
On the receiving side, each IP-20N element unilaterally decides, based on traffic loss
indications such as LOS, LOF, or other errors, from which interface to receive the
traffic, and declares that interface the active interface.
There is no need for a protocol between the two connected elements.
Each LIC-T155 is connected directly to separate ports in the third party network
element.
There is no need for a splitter or Y-cable.
This ensures protection to the optical ports in the third party equipment and to the
optical fiber cable, as well as to the LIC-T155 in the IP-20N.
Proprietary and Confidential
33
Configuration 1st create group
Up to 4 Groups for STM-1 Cards are available
Proprietary and Confidential
34
203
Configuration 2nd select type of protection
For this configuration change need to be disabled:
1. Trail admin status = Down
2. STM-1 Interfaces Admin Status in Interface Manager = Down
Proprietary and Confidential
35
Thank You
204
Configuration Management &
Software Download
October 2014
Version 3
Agenda
Backup and Restore
Software Download
Unit Info file
Proprietary and Confidential
205
Backup & Restore
Backup and Restore
Backup and restore can be used for
Restoring configuration upon unit replacement
Duplicating configuration
Three restore points
Restore point are manually created
Backup file is generated from a restore pointed
Once a backup file is imported to a unit it can be restored
Proprietary and Confidential
206
Backup Process
Backup Configuration File Idea
1.
2.
3.
4.
5.
Install FTP server We recommend to use FileZilla Server (not Client)
Setup FileZilla Server parameters (Users, Shared Folders)
Setup communication parameters for IP20 unit with FTP Server
Create Configuration Backup inside IP20 unit
Export Configuration Backup to FTP server
Export
File
FTP IP address
Proprietary and Confidential
207
2. FTP Setup FileZilla Settings
1. Install FileZilla Server and Run it
2. Create User in FileZilla Server
Proprietary and Confidential
2. FTP Setup FileZilla Settings
3. Create shared folder in FTP Server PC (C:\ Backups)
4. Setup all permissions for this folder in FTP Server
FTP SERVER PC
FileZilla settings in FTP SERVER PC
5. Check Firewall settings in FTP Server PC and if port 21 is used only with
FileZilla
Proprietary and Confidential
208
3. IP20 Configuration Management Settings
Setup Parameters for FTP Server Connection
Status for File transfer
Status for for Backup creation
User name and password
must be same as in FileZilla
Server
!!!
FTP Server IP address
Path in Server (This setup means that
file will be uploaded in C:\Backups)
Name.zip (.zip is MANDATORY)
Restore point selection
Time installation for future releases
Proprietary and Confidential
4. Backup process
6. Check Export status
4. Check Status
1. Setup Configuration parameters
included Restore Point which will be
used for Configuration Backup inside
the system
2. Apply
5. Export
3. Backup
Proprietary and Confidential
10
209
5. Backup Files
Here are stored
backup files per each
restore point
Proprietary and Confidential
11
Restore Process
210
Restore Configuration File Idea
1. Install FTP server (when is not already installed) we recommend to use
FileZilla Server (Not Client)
2. Setup FileZilla Server parameters (Users, Shared Folders)
3. Setup communication parameters for IP20 unit with FTP Server
4. Import Configuration Backup from FTP Server
5. Restore Configuration Backup
Import File
FTP IP address
Proprietary and Confidential
13
3. IP20 Configuration Management Settings
Setup Parameters for FTP Server Connection
Status for File transfer
Status for Backup creation
User name and password
must be same as in FileZilla
Server
FTP Server IP address
!!!
Path in Server (Means that file will be downloaded
from Home FileZilla directory in our case
C:\Backups)
Name.zip (.zip is MANDATORY)
Restore point selection
Time installation for future releases
Proprietary and Confidential
14
211
Restore process
4. Check Import status
6. Check Restore status
1. Setup Configurations parameters
included Restore point 1-3
5 Restore
2.Apply 3.Import
RESTORE CONFIGURATION WILL NOT CHANGE CURRENT IP ADDRESS !!!
Proprietary and Confidential
15
Config_Dump File
Proprietary and Confidential
16
212
Software Download for IDU
17
Software Download Idea for IDU
1. Before performing a software upgrade, it is important to verify that the system date
and time are correct.
2. Install FTP server (when is not already installed) we recommend to use FileZilla
Server (Not Client)
3. Setup FileZilla Server parameters (Users, Shared Folders)
4. Setup communication parameters for IP20 unit with FTP Server
5. UnZip software package for IP-20 to FTP Server shared folder
6. Download software from FTP Server
7. Install downloaded software
Software
Download
Although RFU software is included in the standard installation bundle, the current
software version is not automatically updated in the RFU when an installation is
performed.
To upgrade the software in an RFU, you must perform the upgrade manually, per slot
Proprietary and Confidential
18
213
IP-20 Software Download Settings
User name and password
must be same as in FileZilla
Server
FTP Server IP address
Path in FTP Server (This setup
means that configuration files will
be downloaded from Home
FileZilla directory)
Proprietary and Confidential
19
Software process download
4. Check Download Status
6. Check Installation Status
1. Setup
Parameters
2. Apply
3. Download
Software Files
from FTP Server
5. Install Downloaded Software
Proprietary and Confidential
20
214
Running Software version
Proprietary and Confidential
21
Unit Information file
22
215
Unit Info
Status for Unit info creation
Status for File transfer
User name and password
must be same as in FileZilla
Server
FTP Server IP address
!!!
Path in Server (This setup means that
file will be uploaded in C:\Backups)
Name.zip (.zip is MANDATORY)
Includes technical data about the unit and also backup files placed in restore points
This file can be forwarded to customer support, at their request, to help in analyzing issues
that may occur
Proprietary and Confidential
23
Create and Transfer process
4. Check Status
6. Check Export status
1. Setup Configuration
parameters included Restore
Point which will be used for
Configuration Backup inside the
system
2. Apply 3. Create
5. Export
Proprietary and Confidential
24
216
RFU Software Installation
25
RFU Software Installation
Although RFU software is included in the standard installation bundle, the
current software version is not automatically updated in the RFU when an
installation is performed.
To upgrade the software in an RFU, you must perform the upgrade manually, per
slot.
This enables you to manage IDU and RFU software versions separately.
In this version, you must use the Command Line Interface (CLI) to
upgrade RFU software.
Proprietary and Confidential
26
217
RFU Software Installation Procedure
1. The following sequence of commands installs RFU-C software version 2.13 in the
RFU connected to slot 3.
root> platform software show rfu versions
2. The next step is to perform the update and install commands:
root> platform software update rfu version slot 3 radio-port 1
root> platform software install rfu version slot 3 radio-port 1
3. To check the status of an update or install operation, enter the following command:
root> platform software show rfu status
4. Once the installation is complete, the Install Status column should indicate installation
success and the In Progress column should indicate 100 (100%).
5.When the installation is complete, enter the show rfu versions command again to verify
that the new version has been properly installed in both the TCC and the RFU:
root> platform software show rfu versions
Proprietary and Confidential
27
Thank You
218
Troubleshooting
November 2014
Version 4
Agenda
Faults and Alarms
Performance monitoring
RMON statistic
Loopback
Proprietary and Confidential
219
Faults and Alarms
Faults
Current Alarms
Event Log
Proprietary and Confidential
220
Alarm Configuration
Proprietary and Confidential
Performance Monitoring - Radio
221
Radio Parameters
Profile
0
1
2
3
4
5
6
7
8
9
10
Mod
QPSK
8PSK
16QAM
32QAM
64QAM
128QAM
256QAM
512QAM
1024 QAM SFEC
1024 QAM WFEC
2048QAM
MSE Down-Threshold
-16
-17
-21
-24
-27
-30
-32
-35
-36
-39
MSE Up-Threshold
-18
-19
-23
-26
-29
-32
-34
-37
-38
-41
Applicable for both 28/56MHz , 2048 is planned for future releases
The values are typical and subject to change in relation to the frequency and RFU
type. For more details please contact your Ceragon representative
Proprietary and Confidential
Radio Parameters Defected Blocks
Proprietary and Confidential
222
MRMC actual status
Proprietary and Confidential
Signal Level
Proprietary and Confidential
10
223
MSE Mean Square Error
Proprietary and Confidential
11
XPI Level for XPIC
Proprietary and Confidential
12
224
MRMC
Proprietary and Confidential
13
Capacity, Throughput, Utilization, Frame Error State
Proprietary and Confidential
14
225
Performance Monitoring Ethernet Services
ETH PM RMON
Proprietary and Confidential
16
226
Ethernet Port Tx and RX PM Report
Proprietary and Confidential
17
PM RMON Special Registers
RMONregister /Counter
Description
Undersizeframesreceived
Framesshorterthan64bytes
Oversizeframesreceived
Frameslongerthan2000bytes
Jabberframesreceived
Totalframesreceivedwithalengthofmorethan2000bytes,
butwithaninvalidFCS
Fragmentsframesreceived
Totalframesreceivedwithalengthoflessthan64
bytes,andaninvalidFCS
Rxerrorframesreceived
TotalframesreceivedwithPhyerror
FCSframesreceived
TotalframesreceivedwithCRCerror,notcounteredin
"Fragments","Jabber"or"Rxerror"counters
Pauseframesreceived
Numberofflowcontrolpauseframesreceived
Proprietary and Confidential
18
227
Troubleshooting with RMON: Oversized frames
Site A
T
Site B
T
Tagged Frames with frame
size > 2000 bytes
Wheningressframesexceedthemaximumframesize,RMONcounterOversizedframesreceived
isupdatedaccordingly
Proprietary and Confidential
19
Troubleshooting with RMON: Discarding Example
Site A
T
Site B
T
Ingress traffic does not
comply to Policer rules
DiscardingExamples:
Ingressrate>RateLimiter
IngressframesdonotqualifytoPolicer rules
Proprietary and Confidential
20
228
Troubleshooting with RMON: Monitoring specific traffic types
Site A
Site B
Rate Limiter
Monitor
VideostreamsaregenerallytransmittedoverUDP
withmulticastaddresses
Tomonitortraffic,checkouttheMulticastFrames
Receivedregister
TolimitMCtraffic,assignaPolicer withaMCCIR
rules
Proprietary and Confidential
21
Performance Monitoring TDM Services
229
TDM Line Alarms
Proprietary and Confidential
23
TDM port PMs Table
Proprietary and Confidential
24
230
Loopbacks
RFU RF Loopback
231
RFU RF Loopback
RFU RF LB
IF LB
Proprietary and Confidential
27
RFU RF Loopback
Use it to verify communication from Line to ODU is OK (including ODU)
Traffic affecting RX is stopped
Configurable Timer to automatically restore traffic ( 0 = no time limits)
RFU LED is RED when Loopback is ON
LINK LED is GREEN when Loopback is ON
Alarm is displayed in Current Alarms:
Proprietary and Confidential
28
232
TDM Loopback
29
TDM Loopback
Proprietary and Confidential
30
233
Ethernet Loopback available from T7.9
31
Ethernet port loopback
Ethernet loopback level is available for T7.9!!!
Proprietary and Confidential
32
234
Ethernet Loopback
Radio port loopback
is far end loopback
type
Ethernet port
loopback is near end
loopback type
Select port and click to Loopback button
Proprietary and Confidential
33
Ethernet Loopback Setting
Enable Swapping MAC addresses
Enable admin status
Proprietary and Confidential
34
235
Thank You
236
Header De-Duplication
November 2014
Version 3
Agenda
Ethernet frame L1 and L2 Headers
L3 Headers
L4 Headers
Header De-Duplication
Exercise
Proprietary and Confidential
237
Ethernet frame L1 and L2 Headers
Proprietary and Confidential
L3 Headers
Three types of header fields
Constant
Not Constant
Calculated
Constant
Not Constant
Calculated
Proprietary and Confidential
238
L4 Headers
UDP Header
TCP Header
Proprietary and Confidential
Header De-Duplication
Legacy (Layer 2)Header De- Duplication
Enhanced (Layer 2-4) Header De- Duplication
http://www.youtube.com/watch?v=Z8dU0J9zDtg
Proprietary and Confidential
239
Header De-Duplication
Without Multi-Layer Header Compression, IP-20N still removes the IFG and
Preamble fields. This mechanism operates automatically even header
compression is not selected by the user.
Proprietary and Confidential
Layer 1 Header Suppression
Proprietary and Confidential
240
Legacy Header De-Duplication
Proprietary and Confidential
Enhanced Header De-Duplication
Proprietary and Confidential
10
241
Supported Headers
Layer 2
Ethernet
Ethernet + VLAN
Ethernet + Q-in-Q
MPLS
PBB-TE
Layer 3
IPv4
IPv6
Layer 4
TCP
UDP
Latency:
IP-20N provides best-in-class latency (RFC-2544) for all
channels, making it LTE (Long-Term Evolution) ready:
<0.21ms for 28/56MHz channels (1518 byte frames)
<0.4 ms for 14MHz channels (1518 byte frames)
<0.9 ms for 7MHz channels (1518 byte frames)
Proprietary and Confidential
11
Multi Level Header De-duplications Counters
In order to help operators optimize Multi-Layer (Enhanced) header
compression, IP-20N provides counters when Enhanced Compression is
enabled. These counters include real-time information, such as the number of
currently active flows and the number of flows by specific flow type. This
information can be used by operators to monitor network usage and capacity,
and optimize the Multi-Layer compression settings. By monitoring the
effectiveness of the compression settings, the operator can adjust these
settings to ensure that the network achieves the highest possible effective
throughput.
Proprietary and Confidential
12
242
Capacity-Boosting Techniques
Payload De-Duplication
+40%
Payload
De-Duplication
Header
De-Duplication
40%
Traffic Optimizer
10%
LTE/HSPA Optimized Header
Compression
20%
Multi-Layer (L2-4)
Compression
1Gbps
(2048 QAM)
XPIC
Radio
Capacity
without any
optimization
520Mbps
Innovative Bit Stream Indexing technology
Additive to other traffic acceleration
techniques offered by Ceragon
Exploits repetitive bit patterns in traffic
Content, application & protocol agnostic
Does not affect network functionality
Optimized for aggregation microwave
backhaul where most repetitions occur
(2048 QAM)
480Mbps
Repetitivebitlevelpatterns
identified&compacted
(1024QAM)
390Mbps
(256 QAM)
56 MHz
Decompressor
Compressor
Proprietary and Confidential
13
Working in a Live Network
Trafficoptimizerperformanceinalivenetwork
Proprietary and Confidential
14
243
Header De-Duplication Settings
Proprietary and Confidential
15
Summary
Up to 148 B per frame can
be saved
Header De-Duplication can
increase capacity by up to:
50% (256 byte packets)
25% (512 byte packets)
8% (1518 byte packets)
Proprietary and Confidential
16
244
De-Duplication Exercise
Proprietary and Confidential
17
Thank You
245
Thispagewasintentionallyleftblank.
246
TCC Redundancy
November 2014
Version 2
Agenda
TCC Redundancy diagram
TCC Redundancy in General
TCC Redundancy Configuration
Proprietary and Confidential
247
TCC Redundancy
IF cable
IF cable
Traffic
Traffic
Management
Management
Proprietary and Confidential
TCC Redundancy
In a High Availability node, the 2RU IP-20N contains two TCCs for TCC
redundancy.
TCC protection must be enabled in order for TCC redundancy to operate.
In a High Availability node, the TCCs share chassis configuration and status
information via the chassis internal management channels.
Activation key information, MAC addresses, and serial numbers, are stored
in the Inventory Module (IVM). In a High Availability node, both TCC cards
can access the IVM.
TCC switchover takes place automatically upon failure of the active TCC.
TCC switchover can also be performed manually by the user.
In a High Availability node, the GbE traffic interfaces on the TCC are
disabled.
RMC-A and STM-1/OC-3 RST configurations are not copied from the active
to the standby TCC automatically by the Copy-to-Mate command and
should be aligned manually. Support for those cards is planned for a future
release.
Proprietary and Confidential
248
TCC redundancy procedure in general
1. Check software version running in main TCC.
2. Upgrade software chassis to software version T7.9 and higher
(software below T7.7 version is not recommended for direct upgrade to T7.9)
3. Enable Main card Redundancy
4. Install software for Mate TCC (T7.9 and higher)
5. Check slot 1 and 11 for TDM standard (ETSI /ANSI)
root>platform management show tdm-interfaces-standard
6. Check if both TCCs have identical license features
7. Copy configuration from Main to Mate TCC.
8. Connect Y cable for management
Remember that traffic ports on TCC is not recommended to use when TCC Redundancy is used!!!
Recommendation is to use E-LIC card for Ethernet traffic.
Proprietary and Confidential
1. Check software version running in chassis and Main TCC
For TCC Redundancy function is required software version T7.9 and higher
Upgrade to T7.9 is recommended from T7.7 or T7.7.5 (one version below)
Proprietary and Confidential
249
2. Upgrade Main TCC to sw. T7.9 and higher
This operation requires chassis cold reset which affects traffic
Proprietary and Confidential
3. Configure correct TDM standard when is needed - CLI
For IP-20N default standard is ETSI
To change the TDM interfaces to operate according to the ANSI (FCC) standard
(DS1 and OC-3), results in system reset and restores the default configuration.
Proprietary and Confidential
250
4. Enable Main Card Redundancy
Proprietary and Confidential
5. Check software version running in both TCCs
Mate TCC is not able to see
because Main Card
Redundancy is not enabled
Proprietary and Confidential
10
251
6. Install software T7.9 and higher to mate TCC
This operation will not affect traffic, only may cause management los for short time period
Proprietary and Confidential
11
7. Check if software was installed correctly
Identical sw. is required
Proprietary and Confidential
12
252
8. License installation
Activation key and license features have to be same on both TCCs
Activation key is the same one for both TCCs (Main and Standby TCC)
Proprietary and Confidential
13
9. Copy to mate
Proprietary and Confidential
14
253
10. Connect Y- cable for management
IF cable
IF cable
Traffic
Traffic
Management
Management
Proprietary and Confidential
15
11. Check alarms
Correct configuration should be without Protection configuration mismatch alarm!!!
Proprietary and Confidential
16
254
12. Active & Standby TCC Redundancy status
Proprietary and Confidential
17
Thank you
18
255
Thispagewasintentionallyleftblank.
256
Cascading port
November 2014
Version 1
Agenda
Hybrid TDM + Eth Concept
Configuration of Cascading port
Proprietary and Confidential
257
Hybrid (TDM + Eth) services over IP-20N cascading port
Cascading interfaces can be configured on ports 3 and 4 of an Ethernet LIC.
When operating in cascading mode, these interfaces can handle hybrid
Ethernet and Native TDM traffic, enabling operators to create links among
multiple IP-20 units in a node for multi-directional applications based on hybrid
Ethernet and Native or Pseudowire TDM services
Proprietary and Confidential
Configuration 1st Auto negotiation - OFF
Cascading
ports
Proprietary and Confidential
258
Configuration 2nd Cascading Port Configuration
Cascading ports
Proprietary and Confidential
Configuration 3rd Configure service
Create service point for Cascading Interface
Management or Pipe service point
Proprietary and Confidential
259
Configuration 4th Configure TDM Trail
Configure required TDM Trail by using cascading port
Proprietary and Confidential
Configuration 5th Configure Ethernet Service
Configure Ethernet Service where Cascading port will be one Service point with
specific Interface type and C & S-VLAN encapsulation
Proprietary and Confidential
260
Thank You
261
Thispagewasintentionallyleftblank.
262
Course Evaluation Form
Dear Customer!
Thank you for taking the time to complete the following course evaluation form. Your
commentary and feedbacks are of great importance to us as we analysis and investigate each
course and report. The information you provide will be used to help us improve the content of
the course and monitor the quality of our training program.
Thank You,
Oren Gerstner,
Training Director
Course details
Location
Course Name / ID
Start Date (d/m/year)
End Date (d/m/year)
Instructor Name
Company / Customer
Please rate your satisfaction with the course from 1 to 5 (1 = poor and 5 = excellent):
Did the course meet your expectations?
Was the course well organized?
Training facility & Environment
Was the difficulty of the course in line
with your expectations?
The instructor was well prepared
Instructors level of knowledge
Instructors presentation skills
Instructors willingness to help
Audience was treated respectfully
Language was clear and understood
Course book
Level of practical exercises (when relevant)
Setup and lab functionality (when relevant)
Usefulness Level of practical exercises (when relevant)
Overall satisfaction from the training session
Your comments:
Course Evaluation Form
263
Page 1 of 1
Thispagewasintentionallyleftblank.
264