ceragon - book - ip10g - adv - v1.5
TRANSCRIPT
CERAGON FIBEAIRCOURSE HANDBOOK
Installation, Commissioning & System Configuration
2010Visit our Customer Training Portal at Training.Ceragon.Com or contact us at [email protected]
Trainee Name:
24/7 access to constantly increasing on-line DB of the latest information!
eLearning is a great complementary solution to your classroom sessions as some modules are only available on-line
eLearning provides a first tier of support to users of new technologies, resulting in an estimated 30% reduction in support costs related to implementation of new applications & business processes.
eLearning is proven to be less intimidating than Instructor led training. Concerns about making mistakes in front of peers and management are eliminated.
Ceragon Training Center
Ceragon Training Center is designed to help you get a comprehensive understanding with Ceragon's technology, products and network solutions. While individuals focus on particular modules, Managers on the other hand can sign up their staff members to a Learning Program with compulsory items such as quizzes & procedures.
Ceragon eLearning users enjoy frequent & updated modules as new features and products are released without needing to update users account properties.
Ceragon eLearning solutions can shorten the amount of time it takes to get learners up to speed on new products and processes. Users who need to "brush up" on a process can access a module instantly, practice, test themselves and resume their work.
Ceragon Training Knowledgebase is available to your employees without sacrificing additional room space or time-consuming lectures.
Want to find out more? Need an Account Comparison Table? Need a proposal? Case studies? Please contact us at [email protected]
Ceragon Training AgendaProduct: IP-10 G + NMS Course: Extended Operation and Maintenance Duration: 5 days (Theory + Practice)
DAY ONE Greetings and Course Opening Introduction to MW Radio Introduction to 802.1p/q VLAN Tagging Introduction to CFM IP-10 G-Series Nodal Solution Introduction Introduction to ODU Introduction to Adaptive Code Modulation and MRMC scripts Physical Overview
1
Ceragon Training Agenda
v2.2
Ceragon - Training - Handbook - Page 1
Ceragon Training Agenda
DAY TWO
System Architecture & Design: Front Panel Overview Standalone VS. Shelf IP allocation in a shelf Management Modes (In Band, OOB, WSC) Switch Mode (Pipe, Managed, Metro) Protection Mode
Installation (Practical Exercise using the Element Management System): Standalone guidelines Installing IDU in a shelf Protection mode (Main and Extensions) Setting IP address via CLI Setting up a radio link (frequency, Link ID, RSL, TSL, ATPC, MSE, MRMC, ASP) Setting MNG in a standalone IDU Setting MNG in a shelf Setting MNG using Wayside Channel
Troubleshooting Tools & Maintenance: Using the Current Alarms Using the Event Log Using RMON Registers and Statistics Performing Loopbacks Saving Unit Information Files Configuration File Upload / Download Software File Download
Licensing (retrieving license and installing license on IDU)
2
Ceragon Training Agenda
v2.2
Ceragon - Training - Handbook - Page 2
Ceragon Training AgendaDAY THREE Introduction to RSTP & Ring Topology
RSTP RING (Practical Exercise using the EMS): Setting up an RSTP Ring Demonstrating RSTP Protection on Trails Demonstrating RSTP Protection on In Band Management
Simple Star Topology + RSTP (Practical Exercise using the EMS): Shelf Configuration SDH Trail XC Configuration TDM Trail XC Configuration
Star Topology + In Band +Protection (Practical Exercise using the EMS): Enabling Protection Mode SDH Trail XC Configuration TDM Trail XC Configuration
Trail Prioritization (Practical Exercise using the EMS): (We shall use the same setup as in previous exercise) Setting Trail Priority Demonstrating Trail Prioritization with ACM and variable attenuator
3
Ceragon Training Agenda
v2.2
Ceragon - Training - Handbook - Page 3
Ceragon Training AgendaDAY FOUR Introduction to Quality of Service: What is QoS? What is a Scheduler? What is Rate Limiting? What is Queuing? How do we map ATM / MPLS to ETH ?
Quality of Service (Practical Exercise using the EMS): Creating preliminary tables for classifiers & policers Assigning Policers Assigning Classifiers Assigning a Scheduler
Quality of Service (Practical Exercise using the EMS): QoS demonstration using Video Streaming (VLC) QoS demonstration using Traffic Generator/Analyzer (when relevant)
DAY FIVE Topology Configuration: Adding Elements Auto-Discovery Adding Maps
Administration Log Analysis and Filtering System Configuration Dynamic Poling Static Poling Configuration Broadcast Configuration File Download Software Download FTP Mail Server Northbound
End to End Trap Configuration Exam / Course Summary
4
Ceragon Training Agenda
v2.2
Ceragon - Training - Handbook - Page 4
3/8/2010
Ceragon in a NutshellProducts
Agenda
Think Backhaul Networks
1. 2. 3. 4. 5. 6. 7. 8.
1500R IDU IP-MAX^2 IDU IP-10 IDU IP-10G IDU Nodal Solutions 3200T IDU Outdoor units Outdoor Enclosures
2
Proprietary and Confidential
Ceragon - Training - Handbook - Page 5
1
3/8/2010
Ceragon FibeAir Family
OA&M
Service Management
Security
Carrier Ethernet Switch ACMGigabit Ethernet Fast Ethernet
TDM Cross ConnectXPIC Multi Radio SD/FD
Native2 Radio Ethernet + TDM10-500Mbps, 7-56MHz
E1/T1
Ch-STM1/ OC3Terminal Mux
RFU (6-38GHz)3Proprietary and Confidential
IDU 1500R Point to Point SDH Radio Link
STM Ring
STM Ring
4
Proprietary and Confidential
Ceragon - Training - Handbook - Page 6
2
3/8/2010
IDU 1500R SDH RING
ADM/MSPP
N x STM-1/OC-3XC XC
Ceragon FibeAir 1500R
Aggregation Site
PSN
5
Proprietary and Confidential
IP-MAX^2 IDU: GbE Backhaul
ETH
IP/ETH Provider network
6
Proprietary and Confidential
Ceragon - Training - Handbook - Page 7
3
3/8/2010
IP-10 IDU: Enhanced Cellular Backhaul
Cellular traffic (TDM)
IP/ETH Provider network
N x ETH
7
Proprietary and Confidential
IP-10G IDU: A Nodal Solution
Cellular traffic (TDM)
STM Rings
8
Proprietary and Confidential
Ceragon - Training - Handbook - Page 8
4
3/8/2010
3200T All Indoor: High Capacity Trunk
SDH
9
Proprietary and Confidential
3200T Split Mount: High Capacity Trunk
SDH
10
Proprietary and Confidential
Ceragon - Training - Handbook - Page 9
5
3/8/2010
RFUs
FibeAir RFU-HP
FibeAir RFU-HS
FibeAir RFU-P
FibeAir RFU-C
High power(e.g. Smaller antennas reduced cost)Proprietary and Confidential
Standard power
Outdoor Enclosures Solution BenefitsFull Outdoor solution:
Dust and weather proof Compact size reduces the cost of leasing or purchasing rack space. Ideal for Greenfield areas, at solar-powered sites, and at repeater sites adjacent to highways. One-man installation and shorter cabling reduce installation costs. Environment-friendly: Greener deployments, saving on power and air-conditioning costs.
Proprietary and Confidential
Ceragon - Training - Handbook - Page 10
6
3/8/2010
Hybrid aggregation network for migrationNative2 at the access, IP/MPLS & SDH/SONET at the aggregationNative2 (MW links) IP/MPLS (Hybrid Fiber/MW) SDH/SONET (Hybrid Fiber/MW)Native Ethernet Ethernet over IP/MPLS Native E1/T1 E1/T1 over SDH/SONET
STM1/ OC3
STM1/ OC3 FE/GE n x T1/E1
NG-SDH MSPP NG-SDH MSPP
BSC/MSC
Core Site
Tail site
FibeAir IP-10
FibeAir IP-10
GE
Hub SiteMPLS Router MPLS Router
GE
RNC
Native2 - Is a technology for carrying both TDM and Ethernet traffic Natively over the same microwave links with dynamic bandwidth allocation.
13
Proprietary and Confidential
Aggregating WiMAX / LTE ReadyWireless Carrier Ethernet Backhaul Network
Business center
WiMAX / 4G / LTE Cellular site WiMAX Ceragon TDM E1/T1 2G/3G base station Hub / Aggregation site Ceragon
GE
STM-1 / OC-3
Access WiMAXPoint to Multipointsolution for Ethernet traffic aggregation and statistical multiplexing for a mix of Business and mobile offload Ceragon Point to Point for TDM aggregation
Metro / Aggregation Ceragons Point to Point backhaulsupports Native Ethernet with traffic QoS awareness Ethernet traffic is tunneled through E-LAN/ E-Line EVCs TDM traffic (E1/T1) are being aggregated using Ceragon integrated TDM cross connect
Core IP Backbone Ethernet (GE) is sent over to an IP/MPLS Layer TDM (STM-1/OC-3) is sent over to an SDH/SONET layer Ceragon High-capacity "MPLSaware" Ethernet microwave radio is used where fiber connections not available.
14
Proprietary and Confidential
Ceragon - Training - Handbook - Page 11
7
3/8/2010
Ceragons AdvantagesHigh Spectral-Efficiency High System-Gain Multi-Service Concentration capabilities High Level of Redundancy Adaptive Modulation Pay-as-you-grow concept
15
Proprietary and Confidential
High Spectral-Efficiency(i.e. 256QAM modulation)
Providing more capacity at any given frequency resources e.g. 18xE1 or 50Mbps @ 7MHz channel-bandwidth
Better utilizing valuable frequency resources e.g. using high spectral efficiency we provide 155-200Mbps @ 28MHz, using a Single wireless link! Average microwave will require Two links causing higher CAPEX and consume additional valuable frequency
Get the same capacity with ONE link instead of TWO!Proprietary and Confidential
Ceragon - Training - Handbook - Page 12
8
3/8/2010
Higher Spectral-EfficiencyWhats in it for The Operator?
TypicalMicrowave RadioRequired Capacity 155-200Mbps Required Capacity 70-100Mbps TWO radio links or 56MHz channel bandwidth 28MHz Channel Bandwidth
IP10Microwave Radio
ONE radio link using 28MHz channel bandwidth 14MHz Channel Bandwidth
The operator saves CAPEX and free-up valuable frequency resourcesProprietary and Confidential
Higher Spectral-Efficiency is not enoughRadio TypeTypical System Gain Typical System Gain Typical System Gain High System Gain High System Gain
Ant. Diameter1.80 m 1.80 m 3.00 m 1.80 m
Length30 Km 21 Km 30 Km 30 km
Modulation16QAM 128QAM 128QAM 128QAM
Capacity32 x E1s STM-1/OC-3 STM-1/OC-3 STM-1/OC-3
Spectral Efficiency should always be coupled with System Gain18Proprietary and Confidential
Ceragon - Training - Handbook - Page 13
9
3/8/2010
Ceragons Management Overview
IP-1019Proprietary and Confidential
FibeAir
We adjust to customers requirements
20
Proprietary and Confidential
Ceragon - Training - Handbook - Page 14
10
3/8/2010
Thank You! [email protected]
Ceragon - Training - Handbook - Page 15
11
Introduction to 802.1 P/Q
Module Version v2.6Proprietary and Confidential
Objectives
Understand the need for smaller broadcast domains Understand what is VLAN Understand the difference between tagged and untagged frame Understand VLAN applications
2
Proprietary and Confidential
1
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 16
Associated IEEE Standards
IEEE 802.3
: Ethernet (Max. frame size = 1518 bytes)
IEEE 802.3ac : Ethernet (Max. frame size = 1522 bytes) IEEE 802.1 d : MAC Bridge first introduced the concept of Filtering Services in a bridged local network IEEE 802.1 q : VLAN Tagging IEEE 802.1 p : Priority Tagging / Mapping IEEE 802.1ag : OAM (CFM)
3
Proprietary and Confidential
Agenda Agenda
What is VLAN? Advantages for using VLAN Regular Ethernet frame Tagged frame structure Types of VLAN Types of connections 802.1P implementations
4
Proprietary and Confidential
2 of 19
2
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 17
What is VLAN?
A Layer 2 Protocol which enables enhanced traffic maneuvers :
Prioritization Filtering Provisioning Mapping (e.g. - ATM to/from ETH)
5
Proprietary and Confidential
4 of 19
What is VLAN?Regular ETH networks forward broadcast frames to all endpoints
6
Proprietary and Confidential
5 of 19
3
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 18
What is VLAN?VLAN networks forward broadcast frames only to pre-defined ports (Profile Membership)
VLAN 1Switch ports
VLAN 547
7
Proprietary and Confidential
6 of 19
Advantages of VLAN
Breaking large networks into smaller parts (Formation of virtual workgroups) Simplified Administration (no need for re-cabling when user moves) Improving Broadcast & Multicast traffic utilization Mapping expensive backbones (ATM) to simpler & cheaper ETH backbones Security establishing tunnels / trunks through the network for dedicatedusers (traffic between VLANs is restricted).
8
Proprietary and Confidential
3 of 19
4
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 19
Before we start explaining bit by bit, what is VLAN and how does it work, let us review first the structure of a regular ETH frame
9
Proprietary and Confidential
7 of 19
Untagged Ethernet Frame
FCS is created by the sender and recalculated by the receiver
Preamble + SFD8 Bytes
DA6 Bytes
SA6 Bytes
Length / Type2 Bytes
DATA + PAD46 - 1500 Bytes
FCS4 Bytes (32-bit CRC)
Minimum 64 Bytes < FRAME SIZE < Maximum 1518 Bytes
Length / Type < 1500 - Parameter indicates number of Data Bytes Length / Type > 1536 - Parameter indicates Protocol Type (PPPoE, PPPoA, ARP etc.)
10
Proprietary and Confidential
8 of 19
5
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 20
Tagged Ethernet Frame
Additional information is inserted Frame size increases to 1522 Bytes4 Bytes
Preamble + SFD
DA
SA
Length / Type
Length / Type
DATA + PAD
FCS
TPID = 0x810016 Bit
TCI
P-TAG3 Bit 11
CFI1 Bit
VLAN ID12 BitProprietary and Confidential
TPID = Tag protocol ID TCI = Tag Control Information CFI = 1 bit canonical Format Indicator
9 19 4 of 42
Tagging a Frame
VLAN ID uses 12 bits, therefore the number of maximum VLANs is 4094: 2^12 = 4096 VID 0 = reserved VID 4096 = reserved (every vendor may use some VIDs for internal purposes such as MNG etc.) VID 1 = default After tagging a frame, FCS is recalculated CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over ETH backbones (some vendors may use CFI for internal purposes)
12
Proprietary and Confidential
6
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 21
TPID / ETHER-Type / Protocol TypeTPID in tagged frames in always set to 0x8100Protocol typeTagged Frame ARP Q-in-Q (CISCO) Q-in-Q (other vendors) Q-in-Q (other vendors) Q-in-Q (other vendors) RARP
Value0x8100 0x0806 0x8100 0x88A8 0x9100 0x9200 0x8035 0x0800 0x86DD 0x8863/0x8864 0x8847/0x8848 0x8000 0x8809 0x888E
It is important that you understand the meaning and usage of this parameter
IP IPv6 PPPoE MPLS
Later when we discuss QoS, we shall demonstrate how & why the system audits this parameter13Proprietary and Confidential
IS-IS LACP 802.1x
VLAN types
Membership by PortVID1
Port 1 2 3 4
VID 1 1 44 200VID 44 VID1
PRO easy configured CON no user mobility
VID200
14
Proprietary and Confidential
10 of 19
7
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 22
VLAN types
Membership by MACMAC 00:33:ef:38:01:23 00:01:de:22:42:ae 00:20:8f:40:15:ef 00:20:32:35:ea:11 VID 1 1 44 200
PRO user mobility, no reconfiguration when PC moves CON needs to be assigned initially, not an easy task with thousands of endpoints
15
Proprietary and Confidential
11 of 19
VLAN types
Membership by Subnet Address (a.k.a. Layer 3 VLAN)Subnet Address 10.0.0.0 / 24 20.0.0.0 / 30 11.0.0.0 / 24 192.168.1.0 / 24 VID 1 1 44 200
Membership is based on the Layer 3 header No process of IP address is done Main disadvantage longer overall throughput16Proprietary and Confidential
12 of 19
8
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 23
VLAN types
Membership by Protocol Type
Protocol Type IP IPX
VID 1 44
The VID is derived from the protocol type field found in the Layer 2 header
17
Proprietary and Confidential
13 of 19
Port TypesAccess Port a port which is not aware of VLANs (Cannot tag outgoing frames or un-tag incoming frames)
A
VLAN aware Switch
Device unaware of VLANs transmits untagged (regular) ETH frames
Switch tags the ingress frames with VID according to specific Tagging mechanism
18
Proprietary and Confidential
14 of 19
9
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 24
Port TypesTrunk Port a port which is aware of VLANs (Can tag or un-tag incoming frames)
A
VLAN aware Switch
T
Device unaware of VLANs transmits untagged (regular) ETH frames
Switch tags the ingress frames with VID according to specific Tagging mechanism Switch un-tags frames with VID received from network and delivers untagged frames to Access ports
19
Proprietary and Confidential
14 of 19
Port TypesTrunk Port can carry tagged frames with different VIDs. This requires Port Membership configuration.
A
VLAN aware Switch
T AThis port is not a member of the Trunk port membership list, hence, traffic is discarded
A
20
Proprietary and Confidential
14 of 19
10
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 25
Port TypesQ-in-Q (A.K.A. Double TaggingVLAN Encapsulation)
+VLAN
CN
aware Switch
PN
Enhanced security not exposing original VID Improved flexibility of VID in the network (Ingress VID was already assigned in the network)
21
Proprietary and Confidential
15 of 19
Introduction to QoS / CoS
22
11
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 26
Mapping ATM QoS over ETH CoS (RFC 1483)We can extend the benefits of ATM QoS into Ethernet LANs to guarantee Ethernet priorities across the ATM backbone. A L2 switch or L3 router reads incoming 802.1p or IP ToS priority bits, and classifies traffic accordingly. To match the priority level with the appropriate ATM service class and other parameters, the switch then consults a mapping table with pre-defined settings.P-Tag 6 P-Tag 4 P-Tag 0 CBR VBR UBR
Hub SiteFE/GE GE n x T1/E1
GE
RNC FibeAir IP-10STM1/ OC3
Tail site
IP-10
ATM Router
MPLS Router
Core Site
BSC/MSC
23
Proprietary and Confidential
Mapping ETH to MPLS and vice versaIP-10s L2 switch can take part in the process of transporting services through MPLS core
Frames/services are mapped to MPLS FECs according to: VLAN ID mapped to MPLS EXP bits VLAN P-Bit mapped to MPLS EXP bits
Hub SiteFE/GE GE n x T1/E1
GE
RNCSTM1/ OC3
Tail site
FibeAir IP-10
IP-10
STM1/ OC3
MPLS Router
MPLS Router
Core Site
BSC/MSC
24
Proprietary and Confidential
16 of 19
12
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 27
VLAN P-Bit Remap (Traffic Classes)802.1P utilizes Traffic Classes: A switch port allocates ingress frames to queues (buffers) according to their P-Tag value P-Bits 6-7 The more queues the more prioritizing levels (classes) Downside more time, more memory Normally 4 queues (TCs) are sufficient In this example the port groups a few Bits into a single queue 8 priority levels become 3 classes25Proprietary and Confidential
P-Bits 4-5
Q4 Q3 Q2
High
P-Bits 0-3Q1 Low
VLAN P-Bit Remap (Traffic Classes)IEEE Recommendation The following table shows IEEE definition of traffic classes It shows the ingress options for P-Tag VS. egress P-tag The number of egress priorities (classes) depend on the number of assigned queuesIngress P-Tags 10 (default)
Number of Available Traffic Classes2 0 0 0 0 1 1 1 1 3 0 0 0 0 1 1 2 2 4 0 0 1 1 2 2 3 3 5 0 0 1 1 2 2 3 4 6 1 0 2 2 3 3 4 5 7 1 0 2 3 4 4 5 6 8 1 0 2 3 4 5 6 7
0 0 0 0 0 0 0 0
1 2 3 4 5 6 7
Egress P-Tag26
Proprietary and Confidential
13
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 28
Acronyms ETH Ethernet NIC Network Internet Card VID Vlan ID VLAN Virtual LAN P-TAG Priority Tag, Priority Bits CFI Canonical Format Indicator TPID Tag Protocol Identifier FCS Frame Check Sequence DA Destination Address SA Source Address QoS Quality of Service
27
Proprietary and Confidential
Thank You [email protected]
28
Proprietary and Confidential
14
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 29
3/8/2010
ACM - Adaptive Code Modulation
FibeAir IP-10s Key Feature IP-10 utilizes a unique Adaptive Coding & Modulation (ACM) Modulation range: QPSK - 256QAM
Modulation changes to maintain link when radio signal degrades Mechanism automatically recovers to max. configured modulation whenreceived signal improves
Optimized for mobile backhaul all-IP and TDM-to-IP migration2Proprietary and Confidential
Ceragon - Training - Handbook - Page 30
1
3/8/2010
Adaptive Coding and Modulation Utilize highest possible modulation considering the changing environmentalconditions
Hitless & errorless switchover between modulation schemes Maximize spectrum usage - Increased capacity over given bandwidth Service differentiation with improved SLA Increased capacity and availability
3
Proprietary and Confidential
Adaptive Coding and Modulation
Voice & real time services Non-real time servicesWeak FEC
Strong FEC
When we engineer our services, we may assign certain services to highest priority When ACM is enabled and link degrades, highest priority services are maintained4Proprietary and Confidential
Ceragon - Training - Handbook - Page 31
2
3/8/2010
IP-10 Enhanced ACM Support 8 modulation/coding working points (~3db system gain for each pointchange)
Hit-less and Error-less modulation/coding changes based on signal quality E1/T1 traffic has higher priority over Ethernet traffic Each E1/T1 service is assigned a priority - enables differentiated E1/T1 droppingduring severe link degradation
Integrated QoS with intelligent congestion management - ensures high priorityEthernet traffic is not affected during link fading
Throughput per radio carrier:10 to 50 Mbps @ 7MHz Channel 25 to 100 Mbps @ 14MHz Channel 45 to 220 Mbps @ 28 MHz Channel 90 to 500 Mbps @ 56 MHz Channel
MSE is analyzed to trigger ACM modulation changes
Zero downtime - A must for mission-critical services5Proprietary and Confidential
IP-10 radio capacity - ETSI7MHzACM Point 1 2 3 4 5 6 7 8 Modulation # of E1s 4 6 8 10 12 13 16 18 Ethernet Capacity (Mbps) 9.5 13.5 14 20 19 28 24 34 28 40 32 46 38 54 42 60 ACM Point 1 2 3 4 5 6 7 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM
14MHzModulation # of E1s 8 12 18 20 24 29 34 37 Ethernet Capacity (Mbps) 20 - 29 29 - 41 42 - 60 49 70 57 82 69 - 98 81 - 115 87 - 125 # of E1s 32 48 64 75 75 75 75 75
QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of E1s 16 22 32 44 54 66 71 75
28MHzModulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM Ethernet Capacity (Mbps) 38 - 54 53 - 76 77 - 110 103 - 148 127 - 182 156 - 223 167 - 239 183 - 262 ACM Point 1 2 3 4 5 6 7 8
40MHzModulation # of E1s 23 34 51 65 75 75 75 75
8 Ethernet Capacity (Mbps) 56 - 80 82 - 117 122 - 174 153 - 219 188 - 269 214 - 305 239 - 342 262 - 374
56MHzEthernet Capacity (Mbps) 76 - 109 114 - 163 151 - 217 202 - 288 251 - 358 301 - 430 350 - 501 372 - 531
Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM
QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM
6
Ethernet capacity depends on average packet sizeProprietary and Confidential
Ceragon - Training - Handbook - Page 32
3
3/8/2010
IP-10 radio capacity - FCC10MHzModulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of T1s 22 35 52 68 80 84 84 84 # of T1s 7 10 16 18 24 28 30 33 Ethernet Capacity (Mbps) 13 18 19 27 28 40 32 46 42 61 50 71 54 78 60 85 ACM Point 1 2 3 4 5 6 7 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM
20MHzModulation # of T1s 16 22 32 38 52 58 67 73 Ethernet Capacity (Mbps) 28 - 40 39 - 56 57 - 81 67 - 96 93 - 133 102 - 146 118 - 169 129 - 185 # of T1s 37 59 74 84 84 84 84 84
30MHzModulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM Ethernet Capacity (Mbps) 39 - 55 62 - 89 93 - 133 120 - 171 142 - 202 164 - 235 185 - 264 204 - 292 ACM Point 1 2 3 4 5 6 7 8
40MHzModulation # of T1s 31 46 69 84 84 84 84 84
8 Ethernet Capacity (Mbps) 56 - 80 82 - 117 122 - 174 153 - 219 188 - 269 214 - 305 239 - 342 262 - 374
50MHzEthernet Capacity (Mbps) 65 - 93 105 - 150 131 - 188 167 - 239 221 - 315 264 - 377 313 - 448 337 - 482
Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM
QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM
7
Ethernet capacity depends on average packet sizeProprietary and Confidential
IP-10 Enhanced radio capacity for Ethernet trafficIntelligent Ethernet header compression mechanism (patent pending) Improved effective Ethernet throughput by up to 45% No affect on user traffic
Ethernet packet size (bytes)
Capacity increase by compression
64 96 128 256 5128
45% 29% 22% 11% 5%Proprietary and Confidential
Ceragon - Training - Handbook - Page 33
4
3/8/2010
IP-10 Native2 radio dynamic capacity allocationExample: 28MHz channel bandwidthExample Modulation Example traffic mix
32QAM
128QAM
256QAM
All Ethernet 20 E1s + Ethernet 44 E1s + Ethernet 66 E1s + Ethernet 75 E1s + Ethernet
112Mbps 20 E1s + 66Mbps 44 E1s + 10Mbps -
170Mbps
200Mbps
20 E1s + 123Mbps 20 E1s + 154Mbps 44 E1s + 67Mbps 66 E1s + 15Mbps 44 E1s + 98Mbps 66 E1s + 47Mbps 75 E1s + 25Mbps
9
Proprietary and Confidential
Adaptive Coding & Modulation (ACM)Its all about handling data...
Current Microwave systems are designed withAvailability Equal for all Services
nXT1/E1
?99.99 %
Less availability can be accepted for many data services Need for Services Classification : Microwave systems shall treat services in different ways10
Proprietary and Confidential
Ceragon - Training - Handbook - Page 34
5
3/8/2010
Fewer Hops
1.28km fix rate 200Mbps at 99.999%
2.5km adaptive rate 200Mbps at 99.99% and 40Mbps at 99.999%
0
1km
2km
3km
Assuming: 18GHz link, 28MHz channel, 1 ft antenna, Rain zone K (42mm/hr)
Optional solution for several planning constrains Example - Reducing Hops count until reaching fiber site11Proprietary and Confidential
Decreased tower loads: Wind, Space, Weight4.5km/2.8 miles path, 56MHz channel, 400Mbps, 256QAM, 99.999% availability
Without Adaptive Modulation: requires 4 ft antennasModulation256QAM (2)
Throughput (Mbps)400
Availability (%)99.999
Unavailability of modulation4min, 28sec
Outage 5 minutes and 15 seconds
With Adaptive Modulation: requires 1 ft antennasModulation Throughput (Mbps) Availability (%) Unavailability of modulation
Outage 5 minutes and 15 seconds QPSK 8PSK 16QAM 32QAM 64QAM 128QAM 256QAM (1) 256QAM (2) Assumed rain zone K, 23 [GHz] bandProprietary and Confidential
80 120 160 210 260 320 360 400
99.999 99.998 99.997 99.996 99.995 99.992 99.989 99.985
5min, 3sec 9min, 3sec 11min, 4sec 16min, 42sec 24min, 35sec 37min, 35sec 55min, 33sec 1hr,18min, 13sec Source: Ceragon Networks
Ceragon - Training - Handbook - Page 35
6
3/8/2010
ACM Benefit in TDM to IP migration scenario SMOOTH Migration Typical 4E1 radio QPSK 7MHz channel 99.999% availability 4xE1 7MHz channel
Upgrade to 4E1 + 40Mbps Ethernet 5 TIMES THE CAPACITY SAME ANTENNAS Same 7MHz channel QPSK 256QAM with ACM 99.999% availability for the E1s Low cost, scalable, pay as you grow13
4xE1 + 40Mbps Ethernet 7MHz channel
Proprietary and Confidential
Thank You ! [email protected]
14
Ceragon - Training - Handbook - Page 36
7
Mean Square Error
Agenda
MSE Definition Expected value The Error Histogram Giving bigger differences more weight than smaller differences Calculating MSE MSE in digital modulation Commissioning with MSE MSE and ACM
2
Proprietary and Confidential
1
Ceragon - Training - Handbook - Page 37
MSE - Definition
MSE is used to quantify the difference between an estimated (expected) value and the true value of the quantity being estimated MSE measures the average of the squared errors: MSE is a sort of aggregated error by which the expected value differs from the quantity to be estimated. The difference occurs because of randomness or because the receiver does not account for information that could produce a more accurate estimated RSL
3
Proprietary and Confidential
To simplify.
Imagine a production line where a machine needs to insert one part into the other Both devices must perfectly match Let us assume the width has to be 10cm wide We took a few of parts and measured them to see how many can fit in.
4
Proprietary and Confidential
2
Ceragon - Training - Handbook - Page 38
The Errors Histogram (Gaussian probability distribution function)Quantity
9
Expected value
3 3 1 2width 6cm 7cm 10cm 12cm 16cm
To evaluate how accurate our machine is, we need to know how many parts differ from the expected value 9 parts were perfectly OK5Proprietary and Confidential
The difference from Expected valueQuantity
Error = 0 cm
Error = + 2 cm Error = - 3 cm Error = - 4 cm Error = + 6 cm
width 6cm 7cm 10cm 12cm 16cm
To evaluate the inaccuracy (how sever the situation is) we measure how much the errors differ from expected value
6
Proprietary and Confidential
3
Ceragon - Training - Handbook - Page 39
Giving bigger differences more weight than smaller differencesQuantity Error = 0 cm
+ 2 cm = 4 -3 cm = 9 - 4 cm = 16 + 6 cm = 36 width 6cm 7cm 10cm 12cm 16cm
We convert all errors to absolute values and then we square them The squared values give bigger differences more weight than smaller differences, resulting in a more powerful statistics tool: 16cm parts are 36 units away than 2cm parts which are only 4 units away7Proprietary and Confidential
Calculating MSEQuantity
Error = 0 cm
+ 2 cm = 4 -3 cm = 9 - 4 cm = 16 + 6 cm = 36 width 6cm 7cm 10cm 12cm 16cm
To evaluate the total errors, we sum all the squared errors and take the average: 16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13
The bigger the errors (differences) >> the bigger MSE becomes8Proprietary and Confidential
4
Ceragon - Training - Handbook - Page 40
Calculating MSEQuantity Error = 0 cm
width 10cm If all parts were perfectly produced than each error would be 0 This would result in MSE = 0
Conclusion: systems perform best when MSE is minimum9Proprietary and Confidential
MSE in digital modulation (Radios)Q 01 002 possible states for I signal 2 possible states for Q signalLet us use QPSK (4QAM) as an example: QPSK = 2 bits per symbol
I
= 4 possible states for the combined signal
11
10
The graph shows the expected values (constellation) of the received signal (RSL)
10
Proprietary and Confidential
5
Ceragon - Training - Handbook - Page 41
MSE in digital modulation (Radios)The black dots represent the expected values (constellation) of the received signal (RSL)
Q 01 00
The blue dots represent the actual RSL
I
11
10
Similarly to the previous example, we can say that the bigger the errors are the harder it becomes for the receiver to detect & recover the transmitted signal
11
Proprietary and Confidential
MSE in digital modulation (Radios)
Q 01e2
00e1
MSE would be the average errors of e1 + e2 + e3 + e4.
Ie4 e3 When MSE is very small the actual signal is very close to the expected signal
11
10
12
Proprietary and Confidential
6
Ceragon - Training - Handbook - Page 42
MSE in digital modulation (Radios)
Q 01e2
00e1
When MSE is too big, the actual signal (amplitude & phase) is too far from the expected signal
Ie4 e3
11
10
13
Proprietary and Confidential
Commissioning with MSE in EMS
When you commission your radio link, make sure your MSE is small (-37dB)
Actual values may be read -34dB to -35dB
Bigger values (-18dB) will result in loss of signal
14
Proprietary and Confidential
7
Ceragon - Training - Handbook - Page 43
MSE and ACMWhen the errors become too big, we need a stronger error correction mechanism (FEC) Therefore, we reduce the number of bits per symbol allocated for data and assign the extra bits for correction instead For example 256QAM has great capacity but poor immune to noise 64QAM has less capacity but much better immune for noiseACM Adaptive Code Modulation15Proprietary and Confidential
Thank You ! [email protected]
16
8
Ceragon - Training - Handbook - Page 44
3/14/2010
RFUC&MediationDevices
Proprietary and Confidential
The Most Comprehensive Portfolio FibeAir FamilyRFUs 6-38 GHzRFU-C
Carrier EthernetIP-10 IP-MAX2 3200T
EMS & NMSPolyView (NMS)
Multi-ServiceRFU-HP IP-10 IP-MAX2 640P CeraView (EMS) RFU-P, RFU-SP 1500R/1500P
TDM3200T
2Proprietary and Confidential
Ceragon - Training - Handbook - Page 45
1
3/14/2010
IDU RFU Compatibility
RFU-C
IP-10
RFU-P, RFU-SP
1500R
RFU-HP
IP-IP-MAX2
RFU-SP 640P
1500P3Proprietary and Confidential
IDU IDU Compatibility Across Link1500R 1500R
IP-10 IP 10
IP-10
1500P
1500R
IP-MAX/IP-MAX2
IP-10
1500P chassis Cannot House 1500R IDC and IDMs 1500R chassis Cannot House 1500P IDC and IDMs Must Match IDU Type Across a Link4Proprietary and Confidential
Ceragon - Training - Handbook - Page 46
2
3/14/2010
RFU-C direct mount configurations
1+0 direct
5Proprietary and Confidential
RFU-C direct mount configurations1+1 direct
6Proprietary and Confidential
Ceragon - Training - Handbook - Page 47
3
3/14/2010
RFU-C remote mount configurations
1+0 remote
7Proprietary and Confidential
RFU-C remote mount configurations1+1 remote
8Proprietary and Confidential
Ceragon - Training - Handbook - Page 48
4
3/14/2010
RFU-C antenna adaptors
Adaptors for RFU-P direct antenna mount Adaptors for NSN Flexi Hopper direct antenna mount Adaptors for Ericsson R1A 23GHz direct antenna mount Remote adaptors and configurations
9Proprietary and Confidential
RFU-C to NSN antenna
10Proprietary and Confidential
Ceragon - Training - Handbook - Page 49
5
3/14/2010
RFU-C to Ericsson antenna
(R1A 23GHz)
11Proprietary and Confidential
Antenna Alignment (1)
Connect the headset to AGC monitor BNC/TNC connector on ODU Connect Digital Volt Meter (DVM) to the AGC BNC connector Align the antenna until voltage reading is achieved (1.2 to 1.7Vdc) Repeat antenna alignment at each end until the minimum dc voltage is achieved
1.30vdc = -30dBm 1.45vdc = -45dBm 1.60vdc = -60dBm etc12Proprietary and Confidential
Ceragon - Training - Handbook - Page 50
6
3/14/2010
Antenna Alignment (2)
Compare achieved RX level to calculated RX level Keep aligning until the achieved level is up to 4 dB away from the calculated received signal level If voltage reading is more than 4 dB away or higher than 1.7vdc, re-align antenna to remote site
13Proprietary and Confidential
[email protected] g@ g ThankYou! Thank You !
14Proprietary and Confidential
Ceragon - Training - Handbook - Page 51
7
FibeAir IP-10 G-SeriesFront Panel Description
Proprietary and Confidential
Front Panel Overview
GUI Example)
Lets go over the front panel connections of the IP-10 G-Series We shall explain them one by one, left to right2
Proprietary and Confidential
1
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 52
CLI Serial Connection
DB9 Craft Line Interface (CLI) Baud: 115200 Data bits: 8 Parity: None Stop bits: 1 Flow Control: None3Proprietary and Confidential
EOW Easy Comm. Via Radio
Engineering Order Wire To communicate with your colleague on the other side of the radio link, simply connect here your headset
4
Proprietary and Confidential
2
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 53
External Alarms
DB9 Dry Contact External Alarms The IP-10 supports 5 input alarms and a single output alarm The input alarms are configurable according to:1) Intermediate, 2) Critical, 3) Major, 4) Minor and 5) Warning
The output alarm is configured according to predefined categories5
Proprietary and Confidential
LED Indications
LINK:
GREEN radio link is operational ORANGE - minor BER alarm on radio RED Loss of signal, major BER alarm on radio
IDU:
GREEN IDU functions ok ORANGE - fan failure RED Alarm on IDU (all severities)
RFU:
GREEN RFU functions ok ORANGE Loss of communication (IDU-RFU) RED ODU Failure
6
Proprietary and Confidential
3
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 54
LED Indications
PROT:
Main unit GREEN (when there no alarms) STBY unit: YELLOW (when there no alarms) ORANGE Forced switch, Protection lock RED physical errors (no cable, cable failure) OFF Protection is disabled, or not supported on device
RMT:
GREEN remote unit OK (no alarms) ORANGE minor alarm on remote unit RED major alarm on remote unit
7
Proprietary and Confidential
User Channels (1)
Two software-selectable user channels (RJ-45): A single synchronous channel OR two asynchronous channels Each asynchronous channel will make use of its own RJ-45 external interface The synchronous channel mode will make use of both interfaces (acting as a single interface)8Proprietary and Confidential
4
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 55
User Channels (2)
Modes of operation: V.11 Asynchronous (9600bps) RS-232 Asynchronous (9600bps) V.11 Synchronous Co-Directional (64Kbps) V.11 Synchronous Contra Directional (64Kbps)9Proprietary and Confidential
User Channels (3)
Allowed configurations: Two RS-232 Asynchronous UCs (default) Two V.11 Asynchronous UCs One RS-232 Asynchronous UC, and one V.11 Asynchronous UC One V.11 Synchronous Co-Directional One V.11 Synchronous Contra Directional UC > All settings are copied to Mate when working in Protected mode10Proprietary and Confidential
5
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 56
Protection Port
Protection Port (only for standalone units) Protect your Main unit with a STBY unit Protection ports on both units deliver the proprietary protocol to support automatic or manual switchoverThe FE protection port is static (only used for protection, not traffic). Its switching is performed electrically. If the unit is a stand-alone, an external connection is made through the front panel. If the unit is connected to a backplane, the connection is through the backplane, while the front panel port is unused.11Proprietary and Confidential
T-Cards (Add-on Mezzanines)
Field upgradeable modules (T-Cards): 16 x E1 T-Card (32 total per unit) DS1 T-Card STM1/OC3 MUX T-Card12Proprietary and Confidential
6
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 57
T-Cards (Add-on Mezzanines)
An optional STM-1 interface card can be inserted in a dedicated slot in the system; the card can transmit and receive up to 63 E1s in a channelized STM-1 signal. The supported mapping is VC4 only: VC-12->TU-12->TUG-2->TUG-3->VC-4->AU-4->AUG The STM-1 T-card is only supported in unprotected main units or in unprotected stand-alone IDUs13Proprietary and Confidential
GbE Ports
Two GbE ports, each port with 2 physical interfaces: Port #1: optical (SFP transceiver) or electrical Port #2: optical (SFP transceiver) or electricalGbE ports support QoS as in IP-10 (scheduler, policers, shaper, classifiers)
Port #214Proprietary and Confidential
Port #1
7
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 58
FE Ports
5 FE ports: Port 3: Port 4: Port 5,6 &7: Data Data or WSC (2 Mbps Wayside Channel) Data or local management
All ports support QoS as in IP-10 (scheduler, policers, shaper, classifiers)
15
Proprietary and Confidential
Radio and misc.
The Radio port is the switchs 8th port (same as in IP-10)
In addition Grounding -48vdc Power Connector Fan Drawer
16
Proprietary and Confidential
8
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 59
XC using a Shelf Configuration
XC operation is implemented using two-unit backplanes, which provide the interconnectivity. Up to three backplanes, consisting of six IDUs, can be stacked to provide an expandable system17Proprietary and Confidential
XC using a Shelf ConfigurationAll IDUs that operate within the XC system have identical hardware, and act as stand-alone units.
The 2 lower units can be configured as Main units. The role an IDU plays is determined during installation by its position in the traffic interconnection topology18Proprietary and Confidential
9
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 60
Thank You [email protected]
Proprietary and Confidential
10
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 61
FibeAirIP10GSeries
Installation
Proprietary and Confidential
GeneralIf installation requires CFG file upload & download and / or SW file upload & down -
1. 2. 3.
Make sure FTP Server is installed on your PC FTP is configured (RD/WR permissions) Latest SW version is available (FTP root directory)
FTPinstallationguide isavailableat Training.Ceragon.Com: seeModules/ Installation
2
Proprietary and Confidential
Advanced Operation & Maintenance Course
1Ceragon - Training - Handbook - Page 62
Agenda Site Requirements Packing & Transportation Unpacking Required Tools q IDU Dimensions Installing standalone IDU in a 19 Rack Installing Nodal Enclosures in a 19 Rack Preparing the IDU for a Shelf installation Installing the IDU in a Shelf Installing a Blank Panel IDU in a Shelf Installing a T-Card into an IDU Grounding the IDU Lightning Protection Power General Requirements Installing the IDU-ODU IF cable
3
Proprietary and Confidential
Site Requirements IDU must be located indoors The environment temperature must be between -5 C and +45 C. Easily accessible, but only by authorized personnel. Available power source of -48 VDC, and the site must comply with National Electric Code (NEC) standards. Available management connection (Ethernet or dial-up). IDU-ODU connection (IF cable): no more than 300m
4
Proprietary and Confidential
Advanced Operation & Maintenance Course
2Ceragon - Training - Handbook - Page 63
Site RequirementsHeat Dissipation:The IP-10 IDU overall heat dissipation is 25W max (~85 BTU/h). The ODU heat dissipation is 100W max. p
Antenna Location:As with any type of construction, a local permit may be required before installing an antenna. It is the owners responsibility to obtain any and all permits.
5
Proprietary and Confidential
Packing & TransportationThe equipment is packed at the factory, and sealed moisture-absorbing bags are inserted. The equipment is prepared for public transportation. The cargo must be kept dry during transportation. Keep items in their original boxes till they reach their final destination. If intermediate storage is required, the packed equipment must be stored in dry and cool conditions and out of direct sunlight When unpacking Wh ki Check the packing lists, and ensure that the correct part numbers and quantities of components arrived.
6
Proprietary and Confidential
Advanced Operation & Maintenance Course
3Ceragon - Training - Handbook - Page 64
UnpackingA single FibeAir system (1+0) is shipped in 5 crates.
Upon delivery, make sure that the following items are included: Two indoor units and accessories Two outdoor units For 13-38 GHz systems, verify that there is a high RFU and low RFU. One CD with a management user guide.
Unpack the contents and check for damaged or missing parts. If any part is damaged or missing, contact your local distributor.
7
Proprietary and Confidential
Required ToolsThe following tools are required to install the IDU:
Philips screwdriver #2 (for mounting the IDU to the rack and grounding screw) Flathead small screwdriver (for PSU connector) Sharp cutting knife (for wire stripping) Crimping tool for ground cable lug crimping (optional: if alternative grounding cable is used)
Setting up Management will require ETH cable (for setting management) Serial Cable (for setting management)8Proprietary and Confidential
Advanced Operation & Maintenance Course
4Ceragon - Training - Handbook - Page 65
SpecificationsConnector spec, cable spec & interface pin layout can be found in our complete PDF installation guide
installation guides available at Training.Ceragon.Com: see M d l / Installation Modules I t ll ti
9
Proprietary and Confidential
IDU Dimensions
42.60mm
10
Proprietary and Confidential
Advanced Operation & Maintenance Course
5Ceragon - Training - Handbook - Page 66
Installing standalone IDU in a 19 Rack
As shown in the illustration, four screws, supplied with the installation kit, are used to secure the IDU to the rack kit rack.
11
Proprietary and Confidential
Installing Nodal Enclosures in a 19 Rack
12
Proprietary and Confidential
Advanced Operation & Maintenance Course
6Ceragon - Training - Handbook - Page 67
Installing Nodal Enclosures in a 19 RackBefore you install the enclosures Plan carefully the required space within the rack ! Should you need to install 3 enclosures prepare at least 10Us (6Us for enclosures + 2Us free Main Enclosurespace for maneuvering above and below shelves)
Start the installation process from bottom to top, e.g. Main enclosure should be installed first at the bottom of your rack space13Proprietary and Confidential
Installing Nodal Enclosures in a 19 RackStep #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws.
14
Proprietary and Confidential
Advanced Operation & Maintenance Course
7Ceragon - Training - Handbook - Page 68
Installing Nodal Enclosures in a 19 RackStep #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws. Step #2: Slide down the 2nd extension enclosure. Male connector should plug in smoothly into the Main enclosure.
15
Proprietary and Confidential
Installing Nodal Enclosures in a 19 RackStep #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws. Step #2: Slide down the 2nd extension enclosure. Male connector should plug in smoothly into the Main enclosure. Step #3: Slide down the 2nd extension enclosure. Male connector should be plugged in smoothly into the Main enclosure.
16
Proprietary and Confidential
Advanced Operation & Maintenance Course
8Ceragon - Training - Handbook - Page 69
Installing Nodal Enclosures in a 19 RackStep #4: Secure the 2nd extension into the Main enclosure. Use the built-in screw. Mount the 2nd extension into the rack using the 4 screws
17
Proprietary and Confidential
Installing Nodal Enclosures in a 19 RackStep #4: Secure the 2nd extension into the Main enclosure. Use the built-in screw. Mount the 2nd extension into the rack using the 4 screws Step #5: Add the 3rd extension when needed
18
Proprietary and Confidential
Advanced Operation & Maintenance Course
9Ceragon - Training - Handbook - Page 70
Preparing the IDU for a Shelf installationRemove the two 19" brackets mounted on the IP-10 IDU by unscrewing the 3 screws at each side.
19
Proprietary and Confidential
Installing the IDU in a ShelfSlide the IP-10 IDU into the enclosure and tighten it using 2 screws. Repeat this step in accordance with the configuration.
IDU insertion & extraction should NOT be under power
20
Proprietary and Confidential
Advanced Operation & Maintenance Course
10Ceragon - Training - Handbook - Page 71
Installing a Blank Panel IDU in a ShelfSlide the IP-10 blank panel into the enclosure, and tighten it using 2 screws.
21
Proprietary and Confidential
Installing a T-Card into an IDURemove the IP-10 T-Card blank panel from the IDU, by releasing the 2 side screws.
22
Proprietary and Confidential
Advanced Operation & Maintenance Course
11Ceragon - Training - Handbook - Page 72
Installing a T-Card into an IDUInsert the IP-10 T-Card panel and tighten it using the 2 side screws.
23
Proprietary and Confidential
Grounding the IDU
Single Point Stud Grounding Wire
24
Proprietary and Confidential
Advanced Operation & Maintenance Course
12Ceragon - Training - Handbook - Page 73
Grounding the IDU The IDU is suitable for installation in a Common Bonding Network (CBN). Only copper wire should be used. The wire must be at least 14 AWG. Connector and connection surfaces must be plated. Bare conductors must be coated with antioxidant before crimp connections are made to the screws. FibeAir provides a ground for each IDU, via a one-hole mounted lug onto a single-point stud. t be installed i i l d two star t Th stud must b i t ll d using a UL li t d ring t The t d UL-listed i tongue t terminal, and t washers for anti-rotation.
25
Proprietary and Confidential
Lightning ProtectionFor antenna ports, lightning protection is used that does not permit transients of a greater magnitude than the following: Open Circuit: 1.2-50us 600V Short Circuit: 8-20us 300A The ampacity of the conductor connecting the IDU frame to the DC return conductor is equal to or greater than, the ampacity of the associated DC return conductor.
26
Proprietary and Confidential
Advanced Operation & Maintenance Course
13Ceragon - Training - Handbook - Page 74
Power General Requirements1. A readily accessible Listed branch circuit over-current protective device, rated 15 A, must be incorporated in the building wiring. 2. This equipment is designed to permit connection between the earthed conductor of the DC supply circuit and the earthing conductor at the equipment. 3. The equipment shall be connected to a properly grounded supply system 4. The DC supply system is to be local, i.e. within the same premises as the equipment 5. A disconnect device is not allowed in the grounded circuit between the DC supply source and the frame/grounded circuit connection.
27
Proprietary and Confidential
Power RequirementsWhen selecting a power source, the following must be considered: DC power can be from -40.5 VDC to -60 VDC. Recommended: Availability of a UPS (Uninterrupted Power Source), battery backup, and emergency power generator. Whether or not the power source provides constant power (i.e., power is secured on weekends or is shut off frequently and consistently). The power supply must have grounding points on the AC and DC sides. Th user power supply GND must be connected to the positive pole i th IDU The l tb t d t th iti l in the power supply. Any other connection may cause damage to the system!
28
Proprietary and Confidential
Advanced Operation & Maintenance Course
14Ceragon - Training - Handbook - Page 75
Power RequirementsImportant Make sure to use a circuit breaker to protect the circuit from damage by short or overload.
29
Proprietary and Confidential
Installing the IDU-ODU IF cableRoute the IF Coax Cable from the IDU to the ODU/RFU and terminate it with N-type male connectors. Note: Make sure you fasten the cable along the ladder! Make sure that the inner pin of the connector does not exceed the edge of the connector. The cable should have a maximum attenuation of 30 dB at 350 MHz.
30
Proprietary and Confidential
Advanced Operation & Maintenance Course
15Ceragon - Training - Handbook - Page 76
Proprietary and Confidential
Advanced Operation & Maintenance Course
16Ceragon - Training - Handbook - Page 77
FibeAirIP10GSeries
Setting Management
Proprietary and Confidential
Agenda Getting started General notes General commands Command history y Reading current IP Setting new IP Connecting PC to IDU Troubleshooting Factory Defaults
2Proprietary and Confidential
1
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 78
Getting startedVerify that physical installation is successfully completed: IDU is properly mounted in a shelf / rack Power + GND IF Cable between IDU and ODU Connect a PC to the Terminal connector and launch a serial application Baud: 115200 Data bits: 8 Parity: None St bit 1 Stop bits: Flow Control: None
YoumayuseanySerial ApplicationsuchasHyper Terminal PuTTY TeraTerm Terminal,PuTTY,TeraTerm etc
Log on using (admin/admin) for user name and password. Now, you should be able to see the IP-10 CLI Prompt3Proprietary and Confidential
General notes on CLI
IP-10:/>
Note that the
> sign indicates your current directory in the CLI tree
Most of the CLI commands are based on GET/SET concept Some commands may require a different syntax Ceragon strongly recommends to use CLI only for setting management IP address when current IP is unknown All functions & features can be configured faster and easier using the WEB based EMS4Proprietary and Confidential
2
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 79
General CommandsIP-10:/ >? IP-10:/ls IP-10:/lsp IP-10:/ > exit / IP-10:/ > cd IP-10:/ > cd ..
Type ? (question mark) to list helpful commands Type ls to list your current directory Type lsp to available commands of current directory Type exit to terminate the session Type cd to change directory Type cd .. to return to root directory5Proprietary and Confidential
Command History
Use the arrow keys to navigate through recent commands
Use the TAB key to auto-complete a syntax
6Proprietary and Confidential
3
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 80
Reading current IPTo read current IP type the following:
IP-10:/>cd management/networking/ip-address/ IP-10:/ management/networking/ip-address>Note that the prompt has changed. Now, type get ip-address:
IP-10:/ management/networking/ip-address>get ip-addressUpon completion, the current IP will be displayed followed by the new completion displayed, prompt:
IP-10:/ management/networking/ip-address>get ip-address 192.168.1.1 IP-10:/ management/networking/ip-address>7Proprietary and Confidential
Setting new IPNow, let us set a new IP for the MNG: We assume the required IP is 192.168.1.144 Type set ip-address 192.168.1.144IP-10:/ management/networking/ip-address>set ip-address 192.168.1.144
Upon completion, you will be prompt:
You may lose remote management connection to the unit if this value is changed incorrectly. Are you sure? (yes/no):Type yes and connect the IDU to your network / PC8Proprietary and Confidential
4
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 81
Connecting IDU to EMS1. Connect your EMS/NMS to the IDU (port 7) with ETH CAT.5 cable 2. Verify that your PCs IP is in the same subnet 3. 3 Make sure Link is up 4. PING the IDU 5. Launch a WEB browser with the URL set as the IDUs IP
9Proprietary and Confidential
Management TroubleshootingIn case PC cannot PING IDU 1. Check your ETH cable it might not be inserted properly (broken PIN) 2. Verify the management port is enabled in the EMS General/Management configuration 3. Make sure you connect to a management-enabled port (7, 6 or 5) 4. Verify right LED is ON (see below) 5. Verify your PC is in the same subnet as the IDU 6. In case your IDU is connected to a router: set the IDUs Default GW = Router IP 7. In case your PC is connected to several IDUs (through switch/hub) make sure every IDU has a unique IP When ON (Green) = Port is set to Management When OFF = Port is set to Data
10Proprietary and Confidential
5
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 82
Back to factory defaultsGoing back to factory defaults can be done with EMS or CLI In case you need to set factory defaults with CLI type the following -
IP-10:/> cd management/mng-services/cfg-service
In the new directory type the following:
IP-10:/management/mng-services/cfg-service>set-to-default
11Proprietary and Confidential
Proprietary and Confidential
6
Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 83
3/7/2010
FibeAir IP-10 G-SeriesEMS Performance Monitoring
Proprietary and Confidential
AgendaEMS General Information Faults: Current Alarms Event Log PM & Counters: Remote Monitoring TDM Trails TDM interfaces Radio (RSL, TSL, MRMC and MSE) Radio TDM Radio ETH2Proprietary and Confidential
Ceragon - Training - Handbook - Page 84
1
3/7/2010
EMS - General
Easy, user friendly GUI No need to install an application WEB Based software No need to upgrade your EMS application embedded in the IDU SW No need for strong working station simple PC is sufficient(For maintenance issues FTP Server is required)
Easy access simply type the IP address of the IDU on your web page Supports all IDU versions and configurations
3
Proprietary and Confidential
EMS Main ViewAccess application via IP address
User friendly navigation menu
Proprietary and Confidential
Ceragon - Training - Handbook - Page 85
2
3/7/2010
EMS Main ViewGraphical MENU: Click to configure
Proprietary and Confidential
EMS Main View
Protection Status Display & Quick Access Icons
Proprietary and Confidential
Ceragon - Training - Handbook - Page 86
3
3/7/2010
EMS Main ViewIn this example slot #1 and slot #2 are configured to support 1+1 Protection Slot #1 is selected and in Active mode.
Black Rectangular to indicate selected slot for configuration
Proprietary and Confidential
EMS Main ViewWhen the user selects Slot 2 the GUI updates automatically
Proprietary and Confidential
Ceragon - Training - Handbook - Page 87
4
3/7/2010
Faults - CASThe CAS window shows collapsed list of alarms By expanding a line we can see additional information: Probable cause Corrective Actions
Proprietary and Confidential
Faults Event LogThe Event Log shows max. 200 lines of events When Event #201 occurs, Event #1 is erased and #201 is logged as #200.
Proprietary and Confidential
Ceragon - Training - Handbook - Page 88
5
3/7/2010
PM Clearing previous dataTo erase all IDU PM data, click the CLEAR button -
Proprietary and Confidential
PM RMONThe system supports Ethernet statistics counters (RMON) display. The counters are designed to support: RFC 2819 RMON MIB. RFC 2665 Ethernet-like MIB. RFC 2233 MIB II. RFC 1493 Bridge MIB.
Proprietary and Confidential
Ceragon - Training - Handbook - Page 89
6
3/7/2010
PM RMON Special RegistersRMON register / Counter Undersize frames received Oversize frames received Jabber frames received Fragments frames received Rx error frames received FCS frames received In Discard Frames In Filtered Frames Pause frames received Description Frames shorter than 64 bytes Frames longer than 1632 bytes Total frames received with a length of more than 1632 bytes, but with an invalid FCS Total frames received with a length of less than 64 bytes, and an invalid FCS Total frames received with Phy-error Total frames received with CRC error, not countered in "Fragments", "Jabber" or "Rx error" counters Counts good frames that cannot be forwarded due to lack of buffer memory Counts good frames that were filtered due to egress switch VLAN policy rules Number of flow-control pause frames receivedProprietary and Confidential
PM TDM Trails In DetailReport Interval: The number of trails in the list is derived from radio link capacity (default license = 10Mbps)
Display 15 minutes intervals or single Daily interval (24 hours) Information can be displayed as a graph
Proprietary and Confidential
Ceragon - Training - Handbook - Page 90
7
3/7/2010
PM TDM Trails In DetailErrored Second (ES): A one-second period with one or more errored blocks or at least one defect
Proprietary and Confidential
PM TDM Trails In DetailSeverely Errored Second (SES): A one-second period, which contains 30% errored blocks or at least one defect. SES is a subset of ES.
Proprietary and Confidential
Ceragon - Training - Handbook - Page 91
8
3/7/2010
PM TDM Trails In DetailA period of unavailable time begins at the onset of 10 consecutive Severely Errored Second (SES) events. These 10 seconds are considered to be part of unavailable time. A new period of available time begins at the onset of 10 consecutive non-SES events. These 10 seconds are considered to be part of available time.
Proprietary and Confidential
PM TDM Trails In DetailBackground Block Error (BBE): An errored block not occurring as part of a SES.
Proprietary and Confidential
Ceragon - Training - Handbook - Page 92
9
3/7/2010
PM TDM Trails In DetailNumber of Switches (only relevant for Protected SNCP Trails): The number of times the IP-10 switched from Primary Path to Secondary Path and vice versa (per 15min or 24hrs interval)
Proprietary and Confidential
PM TDM Trails In DetailActive Path Seconds (only relevant for Protected SNCP Trails): The number of times seconds the Active Path was available
Proprietary and Confidential
Ceragon - Training - Handbook - Page 93
10
3/7/2010
PM TDM Trails In DetailIntegrity: Indicates whether information is reliable for analysis (ticked) or not For example if clock was changed or system was restarted during this interval then information is not reliable
Proprietary and Confidential
PM E1 / DS-1 (Radio PM)This PM data relates to the TDM Line Interfaces.
Proprietary and Confidential
Ceragon - Training - Handbook - Page 94
11
3/7/2010
PM E1 / DS-1 (Radio PM)Here we can analyze TDM PM through the radio link
Proprietary and Confidential
PM STM-1 InterfaceThis PM data relates to the STM-1 Line Interface.
Proprietary and Confidential
Ceragon - Training - Handbook - Page 95
12
3/7/2010
PM RadioSignal Level RSL & TSL analysis Allows setting RSL & TSL thresholds EMS will notify when signal exceeds THSLD >> Easier maintenance
Aggregated radio traffic analysis MRMC PM related to ACM: Scripts Bit rate Radio VCs MSE analysisProprietary and Confidential
PM Radio Signal Level - Example
- 40dBm = Nominal RSL for an operational Link Level 1: 25 sec Level 2: 15 sec 900 sec = 15min IntervalProprietary and Confidential
Ceragon - Training - Handbook - Page 96
13
3/7/2010
PM Radio Signal Level - ExampleUsing graphical display of the THSLD analysis allows us easier examination of the RSL & TSL state throughout certain period of time
RSL -40
-50
-68
-99 10 5 10
T [sec]
Proprietary and Confidential
PM Radio - AggregateAggregated radio traffic analysis
Proprietary and Confidential
Ceragon - Training - Handbook - Page 97
14
3/7/2010
PM Radio - MRMCThe information displayed in this page is derived from the license and script assigned to the radio. When ACM is enabled and active, as link quality degrades or improves, the information is updated accordingly.
Proprietary and Confidential
PM Radio - MSEThe information displayed in this page is derived from the license and script assigned to the radio. When link quality degrades or improves, the MSE reading is updated accordingly. Differences of 3dB trigger ACM modulation changing. Threshold can be configured as well for easier maintenance.
Proprietary and Confidential
Ceragon - Training - Handbook - Page 98
15
3/7/2010
PM EthernetETH Traffic + Threshold settings: Frame Error Rate Frame error rate (%) measured on radio-Ethernet interface Throughput data bits measured on radioEthernet interface Capacity - overall Ethernet bits rate, data & overhead, measured on radio-Ethernet interface Utilization - (Actual Ethernet throughput, relative to the potential Ethernet throughput of the radio, excluding TDM channels). Utilization (%) is displayed as one of five bins: 0-20%, 20-40%, 40-60%, 60-80%, 80-100%Proprietary and Confidential
PM Ethernet
Ethernet throughput & Capacity PMs are measured by accumulating the number of Ethernet octets every second, as they are counted by the RMON counters
Proprietary and Confidential
Ceragon - Training - Handbook - Page 99
16
3/7/2010
Thank You ! [email protected]
33
Ceragon - Training - Handbook - Page 100
17
3/7/2010
FibeAir IP-10 G-SeriesEMS General Configuration
Agenda
In this module we shall explain the following features as they appear on the EMS navigation Menu
2
Proprietary and Confidential
Ceragon - Training - Handbook - Page 101
1
3/7/2010
Unit Parameters Step # 1
Configure specific information that may assist you later Such info will help you locate your site easier and faster
3
Proprietary and Confidential
Unit Parameters Step # 1
VDC reading
4
Proprietary and Confidential
Ceragon - Training - Handbook - Page 102
2
3/7/2010
Unit Parameters Step # 1
Celsius (metric) or Fahrenheit (Imperial)5Proprietary and Confidential
Unit Parameters Step # 2
By default the time & date are derived from the operating system clock User may set new values These settings are also used for NTP connection (later explained)
6
Proprietary and Confidential
Ceragon - Training - Handbook - Page 103
3
3/7/2010
Unit Parameters Step # 3IDU Serial number is important when you submit your request for a License upgrade
When you complete configuring all settings, click Apply.
7
Proprietary and Confidential
Versions
This page shows the complete package of IDU and ODU software components8Proprietary and Confidential
Ceragon - Training - Handbook - Page 104
4
3/7/2010
Versions
Lets explore this example: The IDU running SW is displayed in the aidu line and currently it is 3.0.92 A new SW was downloaded sometime in the past (3.0.97) The IDU was not upgraded yet
9
Proprietary and Confidential
Versions RFU files
The IDU holds all the SW files for all the components (IDU + ODU) You can see here the different files per ODU type
10
Proprietary and Confidential
Ceragon - Training - Handbook - Page 105
5
3/7/2010
External Alarms Collapsed Input Alarm Config.
Dry Contact Alarms (DB-9): 5 Inputs 1 Output11Proprietary and Confidential
External Alarms Expended Input Alarm Config.
12
Proprietary and Confidential
Ceragon - Training - Handbook - Page 106
6
3/7/2010
External Alarms Configuring the Output AlarmGroup of alarms will trigger the external alarm Output. Communication Alarms related to traffic: Radio / Ethernet line / TDM line Quality of Service We do not have specific alarms of QoS Processing Alarms related to SW: Configuration / Resets / corrupted files Equipment Alarms related to: HW / FAN / RFU mute / Power Supply / Inventory. Environmental Alarms of extreme temperature. All Groups.
Test mode manual switch.
13
Proprietary and Confidential
Management Network Properties
Here you can set the Network Properties of the IDU
This is the switch MAC address
If your link is up you should be able to see the other ends IP
14
Proprietary and Confidential
Ceragon - Training - Handbook - Page 107
7
3/7/2010
Management Local Properties (Out of band)
The IDU has 3 ports for local management: Port 7, Port 6 and Port 5. You may enable none or up to 3 ports: Number of ports =3 Number of ports =2 Number of ports =1 Number of ports =015
Port 7, Port 6, Port 5 Port 7, Port 6 Port 7 NO LOCAL MANAGEMENT !!!Proprietary and Confidential
Management In Band Properties
In Band Management requires unique VLAN ID This helps separating MNG traffic from other services In Band MNG packets are transferred via the radio link When the link is down, management is down as well.
16
Proprietary and Confidential
Ceragon - Training - Handbook - Page 108
8
3/7/2010
Management Port Properties
These parameters allow you setting the management capacity and port properties
17
Proprietary and Confidential
Trap Configuration (OSS / NMS / Northbound)
To manage the IDU with OSS / NMS, you will need to configure the IP address of the OSS Server You may configure up to 4 Servers (Trap Destinations)
18
Proprietary and Confidential
Ceragon - Training - Handbook - Page 109
9
3/7/2010
Licensing Default LicenseDemo license can be enabled on-site, it expires after 60 days (operational time) Licenses are generated per IDU S/N upon request (capacity / ACM / switch mode)
License upgrade requires system reset.
19
Proprietary and Confidential
Licensing Demo License Enabled
Demo License allows you full evaluation of the IDU functionality, features and capacities
20
Proprietary and Confidential
Ceragon - Training - Handbook - Page 110
10
3/7/2010
NTP Client Properties Enable / Disable Type NTP Server IP address Expect IDU to lock on NTP Servers clock Expected Status: 1. If locked, it returns the IP address of the server it is locked on. 2. Local if the NTP client is locked to the local elements real-time clock 3. NA - if not synchronized with any clock (valid only when Admin is set to Disable).The feature supports Time Offset and Daylight Saving Time. Time Offset and Daylight Saving Time can be configured via WEB (Unit Information page) or via CLI: /management/mng-services/time-service>
21
Proprietary and Confidential
NTP Properties
22
Proprietary and Confidential
Ceragon - Training - Handbook - Page 111
11
3/7/2010
NTP PropertiesWhen using NTP with external protection 1+1, both Active and Standby units should be locked independently on the NTP server, and report independently their Sync status.
Time & Date are not copied from the Active unit to the Standby unit (CQ19584) When using NTP in a shelf configuration, all units in the shelf (including standby main units) are automatically synchronized to the active main units clock.
23
Proprietary and Confidential
IP Table
Here you can manually set your neighbors network properties
24
Proprietary and Confidential
Ceragon - Training - Handbook - Page 112
12
3/7/2010
SNMP V1 V3
No security Authentication Authentication privacy SHA MD5 No Authentication
25
Proprietary and Confidential
Thank You ! [email protected]
26
Ceragon - Training - Handbook - Page 113
13
3/7/2010
FibeAir IP-10 G-SeriesEMS Switch Configuration
Agenda
1. Switch mode review 2. Guidelines 3. Single Pipe Configuration 4. Managed Mode Configuration 5. Managed Mode Common Applications
2
Proprietary and Confidential
Ceragon - Training - Handbook - Page 114
1
3/7/2010
Switch Modes1. Single (Smart) Pipe (default mode, does not require license) This application allows only single GbE interface as traffic interface (Optical GbE-SFP or Electrical GbE - 10/100/1000). Any traffic coming from any GbE interface will be sent directly to the radio and vice versa. This application allows QoS configuration. Other FE (10/100) interfaces can be configured to be "functional" interfaces (WSC, Protection, Management), otherwise they are shut down. Note: (CQ20473): Single pipe discards PAUSE PDU (01-80-C2-00-00-01) and Slow protocols PDU (01-80-C2-00-00-02).
3
Proprietary and Confidential
Switch Modes2. Managed Mode (license depended) This application is 802.1Q VLAN aware bridge, allowing L2 switching based on VLANs. This application also allows QoS configuration. All Ethernet ports are allowed for traffic. Each traffic port can be configured to be "access" port or "trunk" port:
Type
VLANs Specific VLAN should be assigned to access the port A range of VLANs should be assigned to access the Port
Allowed Ingress Frames Only Untagged frames (or Tagged with VID=0 "Priority Tagged ) Only Tagged frames
Allowed Egress Frames Untagged frames
Access
Trunk
Tagged frames
4
Proprietary and Confidential
Ceragon - Training - Handbook - Page 115
2
3/7/2010
Switch Modes3. Metro Mode (license depended)
This application is 802.1Q VLAN aware bridge, allowing Q-in-Q (A.K.A. VLAN Stacking). This mode allows the configuration of a PE port and CE port.Allowed Ingress Frames Allowed Egress Frames Untagged or C-tag (ether-type= 0x8100) frames. Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200
Type CustomerNetwork
VLANs
Specific S-VLAN should be Untagged frames, or assigned to "Customerframes with C-tag Network" port (ether-type=0x8100). Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200Proprietary and Confidential
ProviderNetwork
A range of S-VLANs, or "all" S-VLANs should be assigned to "ProviderNetwork" port
5
Guidelines
Changing switch modes requires a reset Resets do not change the IP-10G settings (radio, configuration, etc.) VLANs need to be created in the switch DB before assigned to a port
6
Proprietary and Confidential
Ceragon - Training - Handbook - Page 116
3
3/7/2010
Single Pipe Configuration7Proprietary and Confidential
Single Pipe Configuration
Untagged VID 4 VID 100 45 VID 51
IP-10 Switch
Port 1: GbE (Optical or Electrical) Port 3: FE (RJ45)
Port 8 (Radio)
8
Proprietary and Confidential
Ceragon - Training - Handbook - Page 117
4
3/7/2010
Configuration Single Pipe
This is the default setting
9
Proprietary and Confidential
Configuration Single Pipe
Only one ingress port can be used:
Port 1 (Opt. or Elec.) Port 3 (RJ45)
When one is enabled the other is disabled No need to configure VID membership10Proprietary and Confidential
Ceragon - Training - Handbook - Page 118
5
3/7/2010
Managed Mode Configuration11Proprietary and Confidential
Configuration Managed ModeLets use this diagram as an example Port #2 as Trunk (VID 200)
IDU-B IDU-A
Port #3 as Trunk (VID 300)
Radios as Trunk by default
Port #2 as Trunk (VID 200, VID 300)
12
Proprietary and Confidential
Ceragon - Training - Handbook - Page 119
6
3/7/2010
Configuration Managed ModeMake sure both IDUs are aware of the required VIDs You need to create the VIDs before you assign them to a certain port (Set # & Apply)
13
Proprietary and Confidential
Configuration Managed ModeNext steps: 1. Go to Interfaces page 2. Enable the required port (Ingress ports) 3. Configure the port type as Trunk or Access 4. Assign allowed VLAN IDs (port membership) 5. Radio port is automatically configured as Trunk, all VLANs are allowed by default
14
Proprietary and Confidential
Ceragon - Training - Handbook - Page 120
7
3/7/2010
Configuration Managed Mode
1
2 3
415Proprietary and Confidential
Configuration Managed Mode Common ApplicationsTagging / untangling
IP-10Access Port Radio = Trunk Port Transmits and receives Untagged frames
Transmits and receives Untagged frames
PC192.168.1.200
PC192.168.1.100
16
Proprietary and Confidential
Ceragon - Training - Handbook - Page 121
8
3/7/2010
Configuration Managed Mode Common Applications
Radio = Trunk Port
IP-10Trunk Port
Multiple L2 streams, each identified with unique VID
Traffic GeneratorTrunk Port
17
Proprietary and Confidential
Thank You ! [email protected]
18
Ceragon - Training - Handbook - Page 122
9
3/7/2010
802.1: Trunk VS. Access
Agenda1. VLAN TAG Attributes 2. Access Port 3. Trunk Port 4. Extracting frames out of a trunk 5. General Guidelines 6. EMS Trunk Configuration
2
Ceragon Networks proprietary and confidential
Ceragon - Training - Handbook - Page 123
1
3/7/2010
VLAN TAG Attributes1. In L2 ETH switching, L2 traffic can be engineered using the VLAN TAG attributes L2 traffic is controlled by defining port membership: Access or Trunk Together, port membership + L2 traffic engineering convert connectionless to connection-oriented network In such networks, services are better deployed and maintained VLAN TAG attributes include: VLAN ID (12 bits) Priority Bits (3 bits) Additional attributes may be used to engineer traffic: MAC DA Port numberCeragon Networks proprietary and confidential
2. 3.
4. 5. 5. 3
Access Port Access Port is a port which is aware of a single VLAN only Ingress traffic is expected to be Untagged, e.g. no VLAN information exists within the received Ethernet frame All frames that are received through this port are tagged with default VLAN (VID + P bits) All frames that exit through this port towards customer devices are untagged (VLAN is removed) Users can configure the L2 switch to assign different tagging scenarios to different ports
4
Ceragon Networks proprietary and confidential
Ceragon - Training - Handbook - Page 124
2
3/7/2010
Access Port Let us examine the Tagging / Untagging process of a L2 switch
L2 ETH SW
DA
SA
Type
Payload
FCS
5
Ceragon Networks proprietary and confidential
Access Port Tagging ingress frames Let us examine the Tagging / Untagging process of Port #1
Tagging
Port #1DA SA VLAN TAG
Port #8Type Payload FCS
Tagged frameDA SA Type Payload FCS
Access Port:Untagged frame6Ceragon Networks proprietary and confidential
Ceragon - Training - Handbook - Page 125
3
3/7/2010
Access Port Utagging frames towards customer interfacing ports When Tagged frame from Network is forwarded to Access port, the VLAN Tag is removed
Untagging
Port #1DA SA VLAN TAG
Port #8Type Payload FCS
Tagged frameDA SA Type Payload FCS
Access Port: Untagged frame7Ceragon Networks proprietary and confidential
Access Port Tagging multiple ports The switch can individually tag multiple Access ports with same VID or unique VID
Tagging
Port #8 Port #1 Port #2DA DA SA Type Payload FCS SA Type Payload FCS DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS
DA
Access Ports: Untagged frames8Ceragon Networks proprietary and confidential
Ceragon - Training - Handbook - Page 126
4
3/7/2010
Trunk Port multiple VIDs awareness To be able to transmit & receive multiple VLANs, the common port has to be configured as a Trunk Port
Trunk Port
Port #8 Port #1 Port #2DA DA SA Type Payload FCS SA Type Payload FCS DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS
DA
Access ports: Untagged frames9Ceragon Networks proprietary and confidential
Trunk Port multiple VIDs awareness Any port can be configured as Trunk In this example, port #2 is facing customer device to forward all the network VLANs (TX&RX)Trunk Port
Port #8 Port #2DA DA DA SA VLAN TAG = 10 Type Type Payload Payload FCS FCS SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS
SA VLAN TAG DA Untagged frames = 3310
Ceragon Networks proprietary and confidential
Ceragon - Training - Handbook - Page 127
5
3/7/2010
Trunk & Access Extracting frames out of a Trunk A certain VLAN can be extracted out of a Trunk via Access port assigned with specific VLAN membership (Default VID)Type Payload FCS DA SA VLAN TAG = 33 Type Payload FCS
DA
SA
Port #5: Access
Port #8: Trunk Port #2: TrunkDA DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS
DA
SA
VLAN TAG = 10
Type Type
Payload Payload
FCS FCS
SA VLAN DA Untagged frames TAG = 33 11
Ceragon Networks proprietary and confidential
General guidelines Access port can only receive untagged frames from customer device Access port can only transmit untagged frames towards customer device Access port supports single VLAN Access port can be connected to an Access port only Trunk port can only receive / transmit tagged frames Trunk port supports multiple VLANs Trunk port can be connected to a Trunk port only When configuring Access or Trunk port, membership needs to be defined next (which VLANs are supported)
12
Ceragon Networks proprietary and confidential
Ceragon - Training - Handbook - Page 128
6
3/7/2010
EMS Trunk Configuration
1
2 3
413Ceragon Networks proprietary and confidential
Thank You ! [email protected]
14
Ceragon - Training - Handbook - Page 129
7
3/7/2010
FibeAir IP-10 G-SeriesEMS Metro Switch Configuration
Proprietary and Confidential
Agenda
1. Metro mode review 2. Common Applications: CN PN PN CN 3. Common Applications: CN PN PN PN 4. Switch Mode Configuration 5. CN Port Configuration 6. PN Port Configuration
2
Proprietary and Confidential
Ceragon - Training - Handbook - Page 130
1
3/7/2010
Metro Mode (license depended)This application is 802.1Q VLAN aware bridge, allowing Q-in-Q (A.K.A. VLAN Stacking). This mode allows the configuration of a PE port and CE port.Type CustomerNetwork VLANs Allowed Ingress Frames Allowed Egress Frames Untagged or C-tag (ether-type= 0x8100) frames. Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200
Specific S-VLAN should be Untagged frames, or assigned to "Customerframes with C-tag Network" port (ether-type=0x8100). Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200
ProviderNetwork
A range of S-VLANs, or "all" S-VLANs should be assigned to "ProviderNetwork" port
3
Proprietary and Confidential
Common Configurations: CN PN PN CNProvider-Facing Port (PN) 1st VID is hidden Only S-VLAN is visible
Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite direction
Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite directionProprietary and Confidential
4
Ceragon - Training - Handbook - Page 131
2
3/7/2010
Common Configurations: CN PN PN PNProvider-Facing Port (PN) 1st VID is hidden Only S-VLAN is visible
Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite direction Provider-Facing Port (PN) S-VLAN is not removed
5
Proprietary and Confidential
Switch Mode Configuration
1
21. Set mode to Metro (requires reset) 2. Add the S-VLAN ID (set & apply)
6
Proprietary and Confidential
Ceragon - Training - Handbook - Page 132
3
3/7/2010
CN Port Configuration1. Go to Interfaces / Ethernet Ports page 2. Enable the port 3. Set the type to Customer Network 4. Type the port ID (EVC name, free string) 5. Type the S-VLAN ID 6. Enable Port Learning 7. Apply & Refresh 8. See screen capture next slide7Proprietary and Confidential
CN Port Configuration
2 1 4 5 3
68Proprietary and Confidential
Ceragon - Training - Handbook - Page 133
4
3/7/2010
PN Port Configuration1. Go to Interfaces / Ethernet Ports page 2. Enable the port 3. Set the type to Provider Network 4. Enable Port Learning 5. Edit (if needed) the allowed S-VLANs 6. Apply & Refresh 7. Set the required S-Tag (Ether-Type) 8. See screen capture next slide9Proprietary and Confidential
PN Port Configuration
2 1 1 4 6 510Proprietary and Confidential
3
Ceragon - Training - Handbook - Page 134
5
3/7/2010
PN Port Configuration Setting the S-Tag
7
0x88A8 0x8100 0x9100 0x9200
11
Proprietary and Confidential
Thank You ! [email protected]
12
Ceragon - Training - Handbook - Page 135
6
3/7/2010
FibeAir IP-10 G-SeriesEMS RSTP Configurat