Documente Academic
Documente Profesional
Documente Cultură
Version 4.2
Trainee Name:
Table of Contents
Theme Page
Introduction
Case Studies 3
Ceragon in a Nutshell 29
Introduction to MW Radio 41
Introduction to Mean Square Error 57
Introduction Adaptive Coding & Modulation 69
Introduction to 802.1p, 802.1q 80
IP-10G Front Panel Description 94
IP-10G Installation 104
Introduction to RFU-C 120
Basic Configuration:
Setting IP to Chassis (CLI) 127
Performance Monitoring 133
General Parameters (In-Band, OOB, License, NTP, Versions & more) 158
L2 Switch Configuration: Single Pipe, Managed Mode, VLANs 181
L2 Switch Configuration: Trunk Port VS. Access Port 190
L2 Switch Configuration: Metro Mode 197
Advanced Features
RING RSTP 205
Introduction to Quality of Service 220
Configuring Quality of Service (Part 1 - Basic) 233
Configuring Quality of Service (Part 2 - Advanced) 247
Interfaces
Commissioning the Radio Link 254
Green Mode 271
Interface Configuration (ETH, TDM, STM, Auxiliary, SyncE, AIS) 276
Cross Connection (XC) Trail Configuration 288
Automatic State Propagation (ASP) 305
Network Resiliency
Introduction to Link Aggregation 315
Configuring Link Aggregation 329
XPIC 337
1+1 HSB Protection 353
Service Operation, Administration & Maintenance (CFM) 370
Maintenance
Loopbacks (IF, Radio, Line) 392
Configuration File Backup 400
Software Upgrade 414
EMS Security 424
Annexes 433
PAGE 2
6/9/2010
June 2010
Ceragon Networks
Incorporation: 1996
Personnel: 500
Revenues in 2009: $184M
NASDAQ: CRNT
PAGE 3 1
6/9/2010
Global Sales
(Reflecting FY2009 results)
EMEA: 38%
NA: 16%
APAC: 37%
CALA: 9%
PAGE 4 2
6/9/2010
Where We Play
Private Networks
Enterprise Networks
Governments: Local and State
Utilities
We Focus on Backhaul
High Capacity LTE/4G-Ready Wireless Backhaul Networks
Any access technology: Wire line or wireless, GSM, CDMA, HSPA, LTE or WiMAX
Access Backhaul / Metro Core
Any service: Voice, data, personal broadband
PAGE 5 3
6/9/2010
OEM 2
OEM 3
Service
Providers
WiMAX Carriers
Private Networks
Over 200 Service Provider and hundreds of Private Networks in more than 130 Countries:*
PAGE 6 4
6/9/2010
Capacity optimisation
Cost Efficiency
FibeAir IP-10 G
FibeAir Family
SplitMount AllIndoor FullOutdoor
RadioUnits:Fromcompacttohighpower
Radio Units: From compact to high power Compactandmodular FulloutdoorNodalsite,
From1+0/1+1toN+1/N+0Trunk solutions Allindoorsolutions N+0toN+N,fullyredundant,
AllRFunitsapplicable
CarrierEthernet/Native2
IP10
3200T
IP10
CarrierEthernet/Native2
PAGE 7 5
6/9/2010
PolyView:
Network Management System for Wireless Backhaul Networks
Plan :
Network design, Service design, Radio
g , Synchronization
Design, y design,
g , Power
Consumption, Rack Layout, Project
deployment plan
Build:
Project Management, Site Survey,
Installation and Commissioning,
Documentation - As Built Site folder
Operate :
Full Training Program, Expert on Site
throughout initial operation, Managed
Services - Take part in Network operation
Maintain:
Remote Technical Support 24/7, S/W Repair,
H/W Repair , Advanced Replacements, Stock
Management, On Site Support, S/W Updates,
Review and Preventive Activities
PAGE 8 6
6/9/2010
Why Ceragon
Company:
Market leadership in migration of radio to packet
Widely deployed with top 3 position in high capacity radios
Global reach and breadth of portfolio
Culture of innovation
Financially sound
Products:
Risk free migration path from TDM to Ethernet
True packet microwave, MEF certified
Integrated networking functions, TDM and Ethernet
Highest possible capacities
Exceptional system gain and spectral efficiency
14
PAGE 9 7
6/9/2010
Tata Indicom:
14K Links serving access and aggregation. All IP ready
Telcel:
2600+ links migration to packet with LTE in mind
Optimize :
Tree to Rings
helpingTelceltooptimizetheradioportionofthenetwork:
Design,install.Maintain.HugeSDHinstallbase
16 Proprietary and Confidential
PAGE 10 8
6/9/2010
Digitel:
1350+ links Delivering high capacity, anywhere.
Rogers :
850 Links long haul Enable 3G in rural
BTS/NB
A
Ethernet
TDM
FibeAir IP-10 A
BSC/RNC
BTS/NB
B
Ceragon
FibeAir IP-10
packet/Hybrid
MW Network set
FibeAir IP-10
in a physical B
BSC/RNC
BTS/NB A
FibeAir IP-10
FibeAir IP-10
FibeAir IP-10
PAGE 11 9
6/9/2010
19
PAGE 12 10
6/9/2010
Challenge: Native
Ethernet
Native
Ethernet
Native
Ethernet
RIPI
High Capacity and flexibility .6
8
km 057 51 41.00 W
34 30 58.00 S
056 49 07.00 W
37
.5
49 5
km
Why Trunk
Highest possible capacities
Risk free migration for both all in
door and split
Advanced Carrier Ethernet
features
Native2 for native legacy and
packet support during the
migration path to all packet
PAGE 13 11
6/9/2010
Challenge:
AGUINALDO
Malacanang Antipolo
CAPINPIN
backbone GUINYANGAN
PASACAO PILI
Connectingg the Philippines
pp islands with manyy 20'
IRIGA
CAMALIG
over the water links with distances of up to
100km 30'
MATNOG
Solutions CEBU
MACTAN
CAMOTES
7 GHz BOHOL
Link
Li k IInterface:
t f STM 1
STM-1 10' CAMIGUIN
CDO
PAGADIAN
High power split configuration 1+1 GANYANGAN
LACAUAN PULACAN
BALABAGAN
30' LINUGWAYAN
Integrated offering through a channel with TAGUITE
PC HILL
AWANG
networking, terminal and support ZAMBOANGA MERCEDES UPI
6 40'
120 50' 40' 30' 20' 10' 125
24
PAGE 14 12
6/9/2010
Case Study
Adam Internet - Australia
Case Study
Adam Internet - Australia Gaw ler
5 .0
7 km
Smithfield (Sa)
79
km
Smithfield
Ceragon? Elizabeth m
6k
Uley Reserv e
4.12 km
6 .3
Burton 6 00
6.
ELIZABETH VALE
48 York Terrace
Parafield Gardens
3.09 k
m
5.2 1 km 9 km
(native Ethernet)
3.06 km
3.1
5 km Greenw ith Vf
OSBOURNEGreenfields Salisbury East 4 .1
Modbury North
7k
Pooraka Vf
km
m
Gepps Cross
5.66 km
4.04
4. 32 km Gilles Plains
km Hope Valley West
km
5 .8 7
(Ring) 5 km
West Lakes 7.49 3.0
4.14
Ottow aykm
GREENACRE
km ATHELSTONE
3.09
Bev erley km .0 6
km
Glynde3
Dudley Park New ton
4
4.2
ST PETERS
4. 72
km
4.
Henley Beach km
Mile End
27
3.23 km
Wattle Park
km
km
m
Unley 4. 32
9k
Adelaide Airport
km
Plympton
3.29 k m
62
3.
capabilities
2. 5
8 km
2 .53 km
km
4.20 Daw Park
Somerton Park Vf
Eden Hills
Marion East 4.14 km
Coromandel Valley Vf
km
3
3.59
Flagstaff
HILL Hill
2
3.3
O'HALLORAN
km
2.6
6.1 8 km
4 km
3.39 km
5 km
SHEIDOW PARK
2.6
3.
Aberfoyle Park Cherry Gardens
67
km
HAPPY VALLEY
6 km
LONSDALE 3.0 3
2.9
km
km
MOANA VF
4
73 km
1 1.1
PAGE 15 13
6/9/2010
Case Study
Allegro: Business services for Queenslands
outer metro areas
Case Study
PtP Ethernet microwave for Backhaul and high
capacity services
Business Access : Backhaul:
Service aware Ethernet microwave IP/MPLS based ring topology service
enhanced with Adaptive Modulation aware Ethernet microwave enhanced
Or PtMP WiMAX with Adaptive Modulation
PtMP -
WiMAX
IP/MPLS
WiMAX router
Base
Station
PAGE 16 14
6/9/2010
Case Study
South East Asia: National broaband based on
WiMAX
WiMAX Fi
Fixed/Mobile
d/M bil applications
li ti
Broadband Access
VoIP Fixed and VoIP handset
IP TV
Value proposition:
Access to a true Broadband service
Coverage and mobility
PAGE 17 15
6/9/2010
Case Study
Aerea/WorldMAX: 1st Mobile WiMAX launch
already live in Amsterdam
Services: 512Kbps-8Mbps
USB WiMAX Dongle
10-40Euro
BS site
Switch
Router Ceragon
FibeAir
Core Site
Low Capacity Link Ethernet Aggregation XC
XC
1+1
Ceragon
FibeAir
BS site
PSN
Ethernet
Switch Ceragon
FibeAir Microwave Link
Router
Aggregation
Site
BS site
PAGE 18 16
6/9/2010
33
PAGE 19 17
6/9/2010
Case Study
Australia: Police, Fire & Emergency Services
Public Safety
Challenge:
Provide reliable digital voice communications and
data traffic
99.997% monthly average availability. (Equipment
reliability and propagation performance) Police
HQ
Low latency (275 m/s)
Small antenna to reduce wind load
Cost effective 1+0 space diversity configuration in
ring topology
Solution
FibeAir 1500R in ring topology
Management and VoIP EOW via 2Mb/s Ethernet
wayside channel
Why Ceragon?
High power split radio with integrated space diversity Local
Performance in ring topologies Police
Station Local Police
Extremely reliable hardware Station
Versatile auxiliary channels fiber
Case Study
Australia: South Australian Forestry
Municipality
Challenge:
Create a robust high capacity video
surveillance network for , bush fire
monitoring
Low visual foot print to reduce
vandalism and impact scenery
enjoyment
Solutions
6 hops 1+0 split (IP-10)
Link Interface: Ethernet
Some of the links are tree mounted
Why Ceragon?
Cost efficient high capacity native
Ethernet in a 1+0 configuration
Adaptive Coding and Modulation (ACM)
Integrated offering through a channel
(MIMP) with networking, services and South Australian Forest
Photo: Forestry SA
support
PAGE 20 18
6/9/2010
Case Study
Australia: Housing Commission, Melbourne
Municipality
Challenge:
Create a high capacity network between 8
campuses in the city
Need to support closed circuit TV and
Telemetry monitoring for public housing
Solutions
8 link 1+0 ring
Link Interface: Ethernet
400Mbps all IP
53 u unlicensed
ce sed spurs
spu s
Why Ceragon?
Cost efficient high capacity native Ethernet in
a 2+0 ready configuration
Upgradeable and modular
Integrated offering through a channel
(Integrators Australia) with networking,
services and support
Case Study
Philippines: An army network backbone
15 0'
AGUINALDO
Defense Malacanang Antipolo
CAPINPIN
10' LUCBAN
TAGAYTAY
GUINYANGAN
Challenge: PASACAO PILI
IRIGA
Build an army military grade long microwave 20'
CAMALIG
backbone
MATNOG
30'
Connecting the Philippines islands with many over CALBAYOG
the water links with distances of up to 100km CATBALOGAN
40'
Cost-effective voice, data, and video conferencing
services to satisfy command and control TACLOBAN
ORMOC
50'
requirements CAMOTES
Solutions
CEBU
MACTAN
10 0'
36 hops 1+1 all indoor BOHOL
PC HILL
networking, terminal and support ZAMBOANGA MERCEDES
AWANG
UPI
6 40'
120 50' 40' 30' 20' 10' 125
PAGE 21 19
6/9/2010
Case Study
Australia: Wireless connectivity to SCADA for
Water Management solutions
Utility
Challenge:
Connect rural fully automated water gates
wirelessly to a SCADA (Supervisory Control
And Data Acquisition)
Provide reliability in extreme weather conations
where systems is required the most to open or
close the water gates
Rural and rough terrain
Solutions
7 hops 1+1
Link Interface: Ethernet
Why Ceragon?
Cost efficient high power radio units
Highly available radio link
SlipGateTM
Case Study
Spain: Water UTelco
Utility
Challenge:
Create a reliable high capacity multi service
network
Provide both internal data requirements such
as intra-communication voice, data, SCADA,
and surveillance systems while serving the
local government telecom needs
Solutions
60 hops 1+0/1+1/2+0 split
Link Interface: Ethernet
Multiple topology schemes
Why Ceragon?
Cost efficient high capacity native Ethernet in a
2+0 configuration
Adaptive Coding and Modulation (ACM)
Integrated offering through a channel with
networking, services and support
PAGE 22 20
6/9/2010
Case Study
Australia: Power utility data protection
Utility
Challenge:
g
Create an completely reliable low capacity
backbone for power surges monitoring and
protection serving rural power substation
Leverage highly available excessive capacity
to up sell telecom services: Voice and Data
Rural and rough terrain
Solutions
16 hops 2+1 all indoor
Link Interface: STM-1
Serves as a Main link
Why Ceragon?
Cost efficient high power all indoor 2+1
configuration (upgradeable to 4+1)
Integrated offering through a channel with
networking, services and support
Case Study
USA: Rural electrical cooperative
Utility
Challenge:
Create a reliable backbone to connect SCIs
20 substations and metering points
Serving SCADA, Land Mobile Radio, Video
Advanced Metering Infrastructure traffic.
Solutions
8 hops all indoor
Link Interface: Ethernet
Serves as a Main link
Ring g topology
opo ogy
Why Ceragon?
Cost efficient, Upgradeable split Native2
solution.
Integrated offering through a channel
Maplenet Wireless with networking, services
and support
South Central Indiana REMC (SCI)
PAGE 23 21
6/9/2010
Case Study
Australia: Alinta Gas pipeline
OPG
Challenge:
A long mission critical communication link
1,300km
for a SCADA system
Rural and rough terrain
Solutions
43 hops 1+1
Link Interface: STM-1
Why Ceragon?
Cost efficient high power radio units
Highly available radio link
Case Study
France: Broadcast TV
Broadcast
Challenge:
Build a robust backup for a fiber
installation for the distribution of high
quality live video content along Nice
coast line
Solutions
All indoor, all packet 1+1
Alternate path for fiber
Why Ceragon? MONTAGEL
PAGE 24 22
6/9/2010
Case Study
Australia: TV network Intra-studio
communication
Broadcast
XC
XC
Challenge: Broadcast
Studio Site B
Create a reliable high capacity contribution site
network Ceragon
Ethernet switch
Leverage highly available excessive capacity to FibeAir
up sell telecom services: Voice and Data
Rural and rough terrain
Solutions
4 hops 1+0 split space diversity
Native Ethernet Fiber as a
Link Interface: Ethernet Microwave as an primary
Alternate path with links up to 70km with alternate path path
Why Ceragon?
XC
Cost efficient high power highly available native XC
Case Study
US: Operation Green Light - Kansas
Municipality
Challenge:
Intelligent Traffic Systems (ITS) where the
stoplights are connected to a wireless network
with IP video cameras and backhauled
wirelessly to their Traffic Management center.
Create a reliable high capacity packet
aggregation network
Low impact and integration with last mile
technologies such as WiMAX
Solutions
2+0
2 0 split
li
Link Interface: Ethernet in rings
Why Ceragon?
The highest possible capacities
Service protection support
Integrated offering through a channel with
networking, services and support
PAGE 25 23
6/9/2010
Case Study
US: Intermountain Health Care - Utah
Health
Challenge:
Develop a high capacity network that fits
into their disaster recovery plan (mainly
earthquakes)
Needed control over network with back
using local Telco leased lines
Solutions
1+0 in Ring topology
Link Interface: Ethernet
Why Ceragon?
Cost efficient high power, high capacity
radio units
Modular and upgradable
Utility
Challenge:
Connecting radar stations and light towers on the shore
Long haul over water
Solutions:
70 packet links
7Ghz high power with Space diversity
Why Ceragon?
High capacity long haul packet radio
Built in Space Diversity
Single turnkey supplier (Telent) for the compete network (offered by two of the bidders)
PAGE 26 24
6/9/2010
Utility
Challenge:
Carrier grade radio backhaul to suit smart grid requirements (IP based) but also supports
traditional TDM based services i.e SCADA
Solutions:
80 links IP-10 1+1 radios over 4 years
Polyview NMS
Native2: Ethernet and E1
Why Ceragon?
Advanced Native Ethernet capabilities for smart grid & Native E1 for SCADA (Native2)
Outdoor cabinet installations with WIMAX requirement
Flexible, future proof solution
Single turnkey supplier (Motorola) for the compete network
Challenge:
Create a high capacity network between 75 campuses in the city
Support closed circuit TV, Voice and Telemetry monitoring for public
housing
Solutions:
8 link 1+0 ring
Link Interface: Ethernet
400Mbps all IP
53 unlicensed spurs
Why Ceragon?
Cost efficient high capacity native Ethernet
Upgradeable and modular, 2+0 ready configuration
Integrated offering through a channel (Integrators Australia)
PAGE 27 25
6/9/2010
Thank You
51
PAGE 28 26
10/5/2010
Ceragon in a Nutshell
RFU (6-38GHz)
PAGE 29 1
10/5/2010
RFUs
FibeAir RFU-HP FibeAir RFU-HS FibeAir RFU-P FibeAir RFU-C FibeAir RFU-D
Where we are
ISPs
Fixed
Networks Cable
TV
CellularBackhaul RuralAccess
PDH
PAGE 30 2
10/5/2010
Main features
5
Proprietary and Confidential
Ethernet Ethernet
Radio Radio
User interface User interface
Interfaces Interface
Carrier Ethernet
Switch
PAGE 31 3
10/5/2010
7
Proprietary and Confidential
N x GE/FE N x GE/FE
Wireless
Carrier Ethernet
Ring
(up to 500Mbps)
Integrated Ethernet
Switching
8
Proprietary and Confidential
N x GE/FE
PAGE 32 4
10/5/2010
Native Ethernet
Ethernet over SDH/SONET
Hub
GE
Site
FE/GE RNC
GE
FibeAir
Tail site IP-10 FibeAir NG-SDH
IP-10 NG-SDH MSPP
MSPP
Core
Site
10
Proprietary and Confidential
PAGE 33 5
10/5/2010
Native Ethernet
Ethernet PWs or IP routing
Hub
GE
Site
FE/GE RNC
GE
FibeAir
Tail site IP-10 FibeAir MPLS
IP-10 MPLS Router
Router
Core
Site
11
Proprietary and Confidential
VLAN ID
Classify
IPv4 DSCP/TOS, IPv6 TC Arrivals W2
Scheduling
departures
Highest priority to BPDUs
Advanced ingress traffic rate-limiting W3
per CoS/priority
Flexible scheduling scheme per port
Strict priority (SP)
W4 lowest priority
Weighted Round Robin (WRR)
Hybrid any combination of SP & WRR
Shaping per port
Support differentiated Ethernet services
with SLA assurance
12
Proprietary and Confidential
PAGE 34 6
10/5/2010
A Nodal Solution
Cellulartraffic
(TDM)
STM
Rings
PAGE 35 7
10/5/2010
A Nodal Solution
500Mbps
Max radio capacity 500Mbps
1Gbps using 2+0/XPIC
5 x FE RJ-45+ 5 x FE RJ-45+
# of Ethernet interfaces
1 x GE RJ-45 + 1 GbE SFP 2 x GE combo (RJ-45/SFP)
Full Carrier Ethernet switching
Yes Yes
feature-set including ring protection
# of E1/T1 integrated IDU interfaces option 16 E1, 16 T1, None 16 E1, 16T1, None
# of E1/T1s per radio carrier 16 84
SyncU NO Yes
PAGE 36 8
10/5/2010
Floating IP NO Yes
PAGE 37 9
10/5/2010
Higher Spectral-Efficiency
Whats in it for The Operator?
Typical IP10
Microwave Radio MicrowaveRadio
TheoperatorsavesCAPEX
andfreeupvaluablefrequencyresources
HighSystemGain
HighSystemGain 1.80m 30km 128QAM STM1/OC3
SpectralEfficiency
shouldalwaysbecoupledwith
SystemGain
20 Proprietary and Confidential
PAGE 38 10
10/5/2010
IP-10 FibeAir
Tree Topology
PAGE 39 11
10/5/2010
Thank You!
training@ceragon.com
PAGE 40 12
IntroductiontoRadio
Agenda
RF Principals
Parameters Affecting Propagation
Atmospheric Refraction
Multipath
Duct
Rain Fading
Fresnel
RF Li kB
Link i C
Basic Components
Link Calculation
Modulation
2
Proprietary and Confidential
Local Remote
3
Proprietary and Confidential
Why Radio?
4
Proprietary and Confidential
5
Proprietary and Confidential
RF Principals
We can see the relationship between colour, wavelength and amplitude using
this animation
6
Proprietary and Confidential
7
Proprietary and Confidential
Dispersion
Humidity/gas
H midit /gas absorption
Multipath/ducting
Atmospheric conditions (refraction)
Terrain (flatness, type, Fresnel zone clearance, diffraction)
Climatic conditions (rain zone, temperature)
Rain attenuation
8
Proprietary and Confidential
9
Proprietary and Confidential
With Atmosphere
No Atmosphere
10
Proprietary and Confidential
Multipath occurs when there is more then one beam reaching the receiver
with
ith different amplit
amplitude
de or phase
Multipath transmission is the main cause of fading in low frequencies
Direct beam
Delayed beam
11
Proprietary and Confidential
Atmospheric duct refers to a horizontal layer in the lower atmosphere with vertical refractive
index gradients causing radio signals:
Remain within the duct
Follow the curvature of the Earth
Experience less attenuation in the ducts than they would if the ducts were not present
D tL
Duct Layer
Duct Layer
Terrain
12
Proprietary and Confidential
Hi h FQ >> Higher
Higher Hi h Attenuation
Att ti
Duct Layer0
Terrain
15
Proprietary and Confidential
Odd numbered zones are constructive and even numbered zones are destructive.
16
Proprietary and Confidential
If this area were blocked by an obstruction, e.g. a tree or a building, the signal
arriving at the far end would be diminished.
When building wireless links, we therefore need to be sure that these zones be
kept free of obstructions.
In wireless networking we should check that that the area containing about 40-60
percent of the first Fresnel zone should be kept free.
3rd
2nd
1st RX
TX
17
Proprietary and Confidential
The radiation pattern contains small minor lobes (weak with little effect on
the main radiation pattern)
A feeder receives the microwaves from the WG and then transmits them
towards a parabolic dish (reflecting surface)
The wave-front reaches the reflecting surface of the antenna, and then it
leaves the antenna in parallel paths
+Gant1 +Gant2
+Lfsf
TX
IDU TX Losses RX Losses IDU RSL
RSL ReceivedSignalLevel
TSL TransmittedSignalLevel
Lfs Freespaceloss=92.45+20logx(distanceinkmxfrequencyinGHz)
RSL=TX TX+Gain
Losses
L+Gain RX
Ant. 1 Ant. 2 Losses
fs
Digital Modulation
Modulation
Because QPSK has 4 possible states, QPSK is able to encode two bits per
symbol
QPSK is more tolerant of link degradation than 8PSK, but does not provide as
much data capacity
45degrees Binary00
135degrees Binary01
225degrees Binary11
315degrees Binary10
QAM Modulation
The input stream is divided into groups of bits based on the number of
modulation states used.
In 8QAM, each three bits of input, which provides eight values (0-7) alters
the phase and amplitude of the carrier to derive eight unique modulation states
The various flavors of QAM offer higher data rates then 8 PSK
ThevariousflavorsofQAMofferhigherdataratesthen8PSK
ThisisbecauseQAMachievesagreaterdistancebetweenadjacentpointsintheIQ
planebydistributingthepointsmoreevenly
Thepointsontheconstellationaremoredistinctanddataerrorsarereduced
Higherorder>>morebitspersymbol
Constellationpointsarecloser>>TXismoresusceptibletonoise
The symbols are determined by modulating The symbols are determined by modulating
the Phase, and Amplitude of the carrier the Phase of the carrier signal.
signal.
8QAM
29
29 Proprietary and Confidential
128QAM Modulation
30
Proprietary and Confidential
31
Proprietary and Confidential
ThankYou!
training@ceragon com
training@ceragon.com
Agenda
Definition
E
Example l
MSE & ACM
MSE values at 56MHz (case study)
MSE values at 28MHz (case study)
Troubleshooting examples
2
Proprietary and Confidential
1 PAGE 57
Introduction
Definition | Example
3
Proprietary and Confidential
MSE - Definition
4
Proprietary and Confidential
2 PAGE 58
To simplify.
We took a few of parts and measured them to see how many can
fit in.
5
Proprietary and Confidential
3
3
2
1
width
6mm 7mm 10mm 12mm 16mm
To evaluate how accurate our machine is, we need to know how many parts differ
from the expected value
3 PAGE 59
The difference from Expected value
Quantity
Error = 0 mm
Error = + 2 mm
Error = - 3 mm
Error = + 6 mm
Error = - 4 mm
width
6mm 7mm 10mm 12mm 16mm
To evaluate the inaccuracy (how sever the situation is) we measure how much the
errors differ from expected value
7
Proprietary and Confidential
+ 2 mm = 4
-3 mm = 9
- 4 mm = 16 + 6 mm = 36
width
6mm 7mm 10mm 12mm 16mm
The squared values give bigger differences more weight than smaller differences,
resulting in a more powerful statistics tool:
16cm parts are 36 units away than 2cm parts which are only 4 units away
8
Proprietary and Confidential
4 PAGE 60
Calculating MSE
Error = 0 mm
Quantity
+ 2 mm = 4
-3 mm = 9
- 4 mm = 16 + 6 mm = 36
width
To evaluate the total errors, we sum all the squared errors and take the average:
The bigger the errors (differences) >> the bigger MSE becomes
9
Proprietary and Confidential
Calculating MSE
Quantity
width
10mm
When MSE is very small the Bell shaped histogram is closer to perfect
condition (straight line): errors = ~ 0
10
Proprietary and Confidential
5 PAGE 61
MSE in digital modulation (Radios)
Let us use QPSK (4QAM) as an
example:
Q
QPSK = 2 bits per symbol
01 00
2 possible states for I signal
2 possible states for Q signal
11
Proprietary and Confidential
I
Similarly to the previous
example we can say that the
example,
bigger the errors are the
harder it becomes for the
11 10 receiver to detect & recover the
transmitted signal
12
Proprietary and Confidential
6 PAGE 62
MSE in digital modulation (Radios)
Q
01 00 MSE would be the average
e1 errors of e1 + e2 + e3 + e4.
e2
I
When MSE is very small the
4
e4 actual signal is very close to
e3
the expected signal
11 10
13
Proprietary and Confidential
Q
01 00 When MSE is too big, the
e1 actual signal (amplitude &
e2 phase) is too far from the
expected signal
I
4
e4
e3
11 10
14
Proprietary and Confidential
7 PAGE 63
Using MSE
Commissioning | Troubleshooting
15
Proprietary and Confidential
16
Proprietary and Confidential
8 PAGE 64
MSE and ACM
For example
h greatt capacity
256QAM has it but
b t
poor immune to noise
18
Proprietary and Confidential
9 PAGE 65
Triggering ACM with MSE
When ACM is enabled, MSE values are analyzed on each side of the link
19
Proprietary and Confidential
5 dB security window
20
Proprietary and Confidential
10 PAGE 66
ACM & MSE: Another approach
In this graph we refer to a 56MHz channel. It is easier to observe the
hysteresis of changing the ACM profile with respect to measured MSE.
ACM
Profile
32.5
30
MSE
3128.526.123.120.816.6 15.510.2
21
Proprietary and Confidential
When RF signal degrades and MSE does not pass the upgrade point (green point) ACM
waits
it till MSE improves
i to
t the
th point
i t off nextt available
il bl upgrade
d point
i t (takes
(t k longer
l time
ti to
t
switch back to the higher profile).
ACM
Profile
32.5 30
3128.526.1 MSE
22
Proprietary and Confidential
11 PAGE 67
Troubleshooting wrong modulation
When different settings of Modulation are set, MSE will be showing -
99.99dB (Modulation Mismatch):
23
Proprietary and Confidential
ThankYou!
t i i @
training@ceragon.com
24
12 PAGE 68
9/13/2010
odu at o range:
Modulation a ge QQPSK
S - 256QAM
56Q
PAGE 69 1
9/13/2010
services
PAGE 70 2
9/13/2010
256QAM
170Mbps
BestEffort
128QAM
112Mbps
Silvver
Premium
32QAM
PAGE 71 3
9/13/2010
64 45%
96 29%
128 22%
256 11%
512 5%
PAGE 72 4
9/13/2010
nXT1/E1
?
99.99 %
Fewer Hops
10
Proprietary and Confidential
PAGE 73 5
9/13/2010
12
Proprietary and Confidential
PAGE 74 6
9/13/2010
Traffic Prioritization
When ACM is enabled and link degrades, highest priority services are
maintained while low services are dropped
13
Proprietary and Confidential
14
Proprietary and Confidential
PAGE 75 7
9/13/2010
Ethernet L2 capacity - Total bit rate of net Ethernet frames running over
the Ethernet user port. Taking into account the Ethernet frame without the
IFG and preamble fields.
Radio throughput
g p - Total bit rate supported
pp by
y the radio link running
g in a
specific channel/modulation including radio frame overhead, etc.
PAGE 76 8
9/13/2010
3.5 MHz
P fil
Profile M d l ti
Modulation Mi i
Minimum M # off Ethernet
Max Eth t capacity
it Eth
Ethernett L2 Frames per
F R di
Radio
required capacity supported (Mbps) capacity (Mbps) seconds Throughput
license E1s (Mbps)
2 16 QAM 10 4 13.60 10.36 20233.77 10.50
4 64 QAM 25 6 20.14 15.35 29974.03 15.00
7 MHz
Profile Modulation Minimum Max # of Ethernet capacity Ethernet L2 Frames per Radio
required capacity supported (Mbps) capacity (Mbps) seconds Throughput
license E1s (Mbps)
0 QPSK 10 4 13 42
13.42 10 23
10.23 19976 45
19976.45 10 38
10.38
1 8 PSK 25 6 20.18 15.38 30034.94 15.03
2 16 QAM 25 8 27.87 21.24 41475.26 20.31
3 32 QAM 25 10 34.48 26.27 51304.87 24.85
4 64 QAM 25 12 40.44 30.81 60175.21 28.95
5 128 QAM 50 13 46.60 35.50 69339.64 33.19
6 256 QAM 50 16 54.53 41.55 81151.77 38.64
7 256 QAM 50 17 57.38 43.72 85389.21 40.60
14 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
required capacity support E1s (Mbps) capacity (Mbps) seconds Throughput
license (Mbps)
0 QPSK 25 8 28.90 22.02 43001.18 21.02
1 8 PSK 25 12 40.90 31.16 60857.98 29.27
2 16 QAM 50 18 60.36 45.99 89823.89 42.65
3 32 QAM 50 20 70.35 53.60 104693.80 49.52
4 64 QAM 50 24 81.78 62.31 121693.09 57.37
5 128 QAM 100 29 98.43 74.99 146471.17 68.82
6 256 QAM 100 34 115.15 87.73 171347.98 80.31
7 256 QAM 100 37 124.52 94.87 185297.74 86.76
28 MHz
Profile Modulation Minimum required Number of Ethernet capacity Ethernet L2 Frames per Radio
capacity
it lilicense supportt E1s
E1 (Mb )
(Mbps) capacity
it (Mb
(Mbps)) seconds
d Throughput
Th h t
(Mbps)
0 QPSK 50 17 57.86 44.08 86099.43 40.93
1 8 PSK 50 23 77.86 59.32 115860.75 54.68
2 16 QAM 100 33 111.32 84.81 165648.63 77.68
3 32 QAM 100 44 150.76 114.87 224346.79 104.80
4 64 QAM 150 55 187.55 142.90 279093.55 130.09
5 128 QAM 150 68 228.81 174.33 340488.46 158.46
6 256 QAM 200 76 254.71 194.07 379034.79 176.27
7 256 QAM 200 80 268.45 204.53 399476.94 185.71
PAGE 77 9
9/13/2010
40 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
required capacity support E1s (Mbps) capacity (Mbps) seconds Throughput
license (Mbps)
0 QPSK 50 23 79 64
79.64 60 68
60.68 118506 13
118506.13 55 90
55.90
1 8 PSK 100 35 119.11 90.75 177239.65 83.04
2 16 QAM 100 51 174.14 132.68 259136.72 120.87
3 32 QAM 150 65 218.49 166.47 325132.27 151.36
4 64 QAM 150 81 273.67 208.51 407254.05 189.30
5 128 QAM 200 84 305.49 232.76 454605.63 211.18
6 256 QAM 200 84 346.84 264.26 516135.41 239.61
7 256 QAM 300 84 369.96 281.87 550529.12 255.50
56 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
i d capacity
required it supportt E1s
E1 (Mb )
(Mbps) it (Mb
capacity (Mbps)) d
seconds Th h t
Throughput
license (Mbps)
0 QPSK 100 32 108.86 82.94 161994.37 75.99
1 8 PSK 100 48 163.37 124.48 243116.10 113.47
2 16 QAM 150 64 216.60 165.03 322318.52 150.06
3 32 QAM 200 84 288.50 219.81 429314.58 199.50
4 64 QAM 300 84 358.49 273.14 533473.73 247.62
5 128 QAM 300 84 430.43 327.95 640527.34 297.08
6 256 QAM 400 84 489.77 373.16 728824.51 337.87
7 256 QAM 400 84 531.82 405.20 791403.86 366.78
19
Proprietary and Confidential
2 8 PSK 10 19 27 2 8 PSK 22 39 - 56
3 16 QAM 16 28 40 3 16 QAM 32 57 - 81
4 32 QAM 18 32 46 4 32 QAM 38 67 - 96
PAGE 78 10
9/13/2010
ThankYou!
training@ceragon.com
training@ceragon com
21
PAGE 79 11
Introductionto802.1P/Q
Prerequisites
Ethernet Topologies
OSI 7 Layers model
PAGE 80
Agenda
Agenda
What is VLAN?
Advantages for using VLAN
Regular Ethernet frame
Tagged frame structure
Types of VLAN
Types of connections
802.1P implementations
What is VLAN?
Prioritization
Filtering
Provisioning
Mapping (e.g. - ATM to/from ETH)
PAGE 81
What is VLAN?
What is VLAN?
VLAN 1
Switch ports
VLAN 547
PAGE 82
Advantages of VLAN
PAGE 83
Untagged Ethernet Frame
4 Bytes
8 Bytes 6 Bytes 6 Bytes 2 Bytes 46 - 1500 Bytes (32-bit
CRC)
4 Bytes
TPID=0x8100 TCI
PAGE 84
Tagging a Frame
CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over
ETH backbones (some vendors may use CFI for internal purposes)
ARP 0x0806
p
It is important that yyou understand the Q i Q (CISCO)
QinQ(CISCO) 0 8100
0x8100
meaning and usage of this parameter
QinQ(othervendors) 0x88A8
QinQ(othervendors) 0x9100
PAGE 85
VLAN Membership: By Port
For example ports 1,2 & # can see each other but cannot PING
other ports (different VLAN membership)
1 2 3 4 5 6 7 8
VLAN 22
VLAN 5
VLAN 9
VLAN 333
VLAN 100
VLAN 1
00:33:ef:38:01:23
00:33:ef:38:01:a0
00:33:ef:38:01:25
VLAN 5
PAGE 86
VLAN Membership: By Subnet (L3 VLAN)
Membership is based on the Layer 3 header
No process of IP address is done
10.10.10.12
10.10.10.122
10.10.10.13
VLAN 44
11.1.1.10.12
11.1.1.10
11.1.1.10.23
VLAN 5
Port Types
VLANawareSwitch
A
PAGE 87
Port Types
VLANawareSwitch
A T
Device unaware of VLANs Switch tags the ingress frames with VID according to
transmits untagged specific Tagging mechanism
(regular) ETH frames
Switch un-tags frames with VID received from network
and delivers untagged frames to Access ports
Port Types
VLANawareSwitch
T
A
A A
ThisportisnotamemberoftheTrunk
portmembershiplist,hence,trafficis
discarded
PAGE 88
Q-in-Q
4 Bytes 4 Bytes
TPID 0 88A8
TPID=0x88A8 TCI TPID 0 8100
TPID=0x8100 TCI
Port Types
Q-in-Q (A.K.A. Double TaggingVLAN Encapsulation)
+
VLAN
awareSwitch
CN PN
E h
Enhanced
d security
it nott exposing
i original
i i l VID
PAGE 89
Introduction to QoS / CoS
21
To match the priority level with the appropriate ATM service class and other parameters, the
switch then consults a mapping table with pre-defined settings.
P-Tag 6 CBR
P-Tag 4 VBR
P-Tag 0 UBR
Hub
GE
Site
FE/GE RNC
GE
STM1/
n x T1/E1
FibeAir OC3
Tail site IP-10 MPLS
IP-10 ATM Router
Router Core
Site BSC/MSC
PAGE 90
Mapping ETH to MPLS and vice versa
IP-10s L2 switch can take part in the process of transporting
services through MPLS core
Hub
GE
Site
FE/GE RNC
GE
STM1/
n x T1/E1
FibeAir OC3
STM1/
Tail site IP-10 OC3
MPLS
IP-10 MPLS Router
Router
Core
Site BSC/MSC
IEEE Recommendation
Ingress NumberofAvailableTrafficClasses
The following
Th f ll i table
t bl shows
h PTags
IEEE definition of traffic 1 2 3 4 5 6 7 8
classes 0(default) 0 0 0 0 0 1 1 1
PAGE 91
VLAN P-Bit Remap (Traffic Classes)
With a single queue, there are no choices. All traffic is Best Effort
Multiple queues are needed to isolate Network Control from the user data traffic
Acronyms
ETH Ethernet
NIC Network Internet Card
VID Vlan
Vl ID
VLAN Virtual LAN
P-TAG Priority Tag, Priority Bits
CFI Canonical Format Indicator
TPID Tag Protocol Identifier
FCS Frame Check Sequence
DA Destination Address
SA Source Address
QoS Quality of Service
PAGE 92
Associated IEEE Standards
IEEE802.3:Ethernet(Max.framesize=1518bytes)
IEEE802.1d:MACBridgefirstintroducedtheconceptofFiltering
Servicesinabridgedlocalnetwork
IEEE802.1q:VLANTagging
IEEE802.1p:PriorityTagging/Mapping
IEEE802.1ag:OAM(CFM)
ThankYou!
training@ceragon.com
PAGE 93
FibeAir IP-10 G-Series
Front Panel Description
GUI Example)
PAGE 94
CLI Serial Connection
Baud: 115200
Data bits: 8
Parity: None
Stop bits: 1
Flow Control: None
PAGE 95
External Alarms
LED Indications
PAGE 96
LED Indications
Each asynchronous channel will make use of its own RJ-45 external
interface
PAGE 97
User Channels (2)
Modes of operation:
Allowed configurations:
> All settings are copied to Mate when working in Protected mode
PAGE 98
Protection Port
The FE protection port is static (only used for protection, not traffic). Its switching is performed
electrically. If the unit is a stand-alone, an external connection is made through the front panel. If the
unit is connected to a backplane, the connection is through the backplane, while the front panel port
is unused.
PAGE 99
T-Cards (Add-on Mezzanines)
GbE Ports
Port #2 Port #1
PAGE 100
FE Ports
5 FE ports:
Port 3: Data
Port 4: Data or WSC (2 Mbps Wayside Channel)
Port 5,6 &7: Data or local management
In addition
Grounding
-48vdc Power Connector
Fan Drawer
PAGE 101
XC using a Shelf Configuration
as stand-alone units.
The role an IDU plays is determined during installation by its position in the
traffic interconnection topology
PAGE 102
Thank You !
training@ceragon.com
PAGE 103
FibeAirIP10GSeries
Installation
General
FTPinstallationguide
isavailableat
Training.Ceragon.Com:
seeModules/
Installation
PAGE 104
Agenda
Site Requirements
Packing & Transportation
Unpacking
Required
q Tools
IDU Dimensions
Installing standalone IDU in a 19 Rack
Installing Nodal Enclosures in a 19 Rack
Preparing the IDU for a Shelf installation
Installing the IDU in a Shelf
Installing a Blank Panel IDU in a Shelf
Installing a T-Card into an IDU
Grounding the IDU
Lightning Protection
Power General Requirements
Installing the IDU-ODU IF cable
Site Requirements
IDU must be located indoors
Available power source of -48 VDC, and the site must comply with
National Electric Code (NEC) standards.
PAGE 105
Site Requirements
Heat Dissipation:
The IP-10 IDU overall heat dissipation is 25W max (~85 BTU/h).
The ODU heat dissipation
p is 100W max.
Antenna Location:
As with any type of construction, a local permit may be required before installing
an antenna. It is the owners responsibility to obtain any and all permits.
The equipment is prepared for public transportation. The cargo must be kept dry
during transportation.
Keep items in their original boxes till they reach their final destination.
When unpacking
Wh ki
Check the packing lists, and ensure that the
correct part numbers and quantities of
components arrived.
PAGE 106
Unpacking
Upon delivery, make sure that the following items are included:
Required Tools
Philips screwdriver #2 (for mounting the IDU to the rack and grounding screw)
PAGE 107
Specifications
Connector spec, cable spec & interface pin layout can be found in our complete
PDF installation guide
IDU Dimensions
42.60mm
PAGE 108
Installing standalone IDU in a 19 Rack
PAGE 109
Installing Nodal Enclosures in a 19 Rack
Step #1:
Install the IP-10 Main enclosure
in the 19 inch rack using 4
screws.
PAGE 110
Installing Nodal Enclosures in a 19 Rack
Step #1:
Install the IP-10 Main enclosure
in the 19 inch rack using 4
screws.
Step #2:
Slide down the 2nd extension
enclosure. Male connector
should plug in smoothly into the
Main enclosure.
Step #1:
Install the IP-10 Main enclosure
in the 19 inch rack using 4
screws.
Step #2:
Slide down the 2nd extension
enclosure. Male connector
should plug in smoothly into the
Main enclosure.
Step #3:
Slide down the 2nd extension
enclosure. Male connector
should be plugged in smoothly
into the Main enclosure.
PAGE 111
Installing Nodal Enclosures in a 19 Rack
Step #4:
Secure the 2nd extension into
the Main enclosure. Use the
built-in screw.
Step #4:
Secure the 2nd extension
into the Main enclosure.
Use the built-in screw.
Step #5:
Add the 3rd extension
when needed
PAGE 112
Preparing the IDU for a Shelf installation
Remove the two 19" brackets mounted on the IP-10 IDU by unscrewing the 3
screws at each side.
PAGE 113
Installing a Blank Panel IDU in a Shelf
Slide the IP-10 blank panel into the enclosure, and tighten it using 2 screws.
PAGE 114
Installing a T-Card into an IDU
Insert the IP-10 T-Card panel and tighten it using the 2 side screws.
Grounding Wire
PAGE 115
Grounding the IDU
The IDU is suitable for installation in a Common Bonding Network (CBN).
FibeAir provides a ground for each IDU, via a one-hole mounted lug onto a
single-point stud.
Th stud
The t d mustt b
be iinstalled
t ll d using
i a UL li t d ring
UL-listed i ttongue tterminal,
i l and
d ttwo star
t
washers for anti-rotation.
Lightning Protection
PAGE 116
Power General Requirements
4. The DC supply system is to be local, i.e. within the same premises as the
equipment
Power Requirements
When selecting a power source, the following must be considered:
Whether or not the power source provides constant power (i.e., power is
secured on weekends or is shut off frequently and consistently).
The power supply must have grounding points on the AC and DC sides.
The
Th user power supply
l GND mustt be
b connected
t d to
t the
th positive
iti pole
l iin th
the IDU
power supply.
PAGE 117
Power Requirements
Important
Make sure to use a circuit breaker to protect the circuit from damage by
short or overload.
Dual DC Feed
In boards with dual DC feed hardware, the system will indicate whether received
voltage in each connector is above or below the threshold power (40.5v
approximately).
This will
Thi ill b
be shown
h iin ttwo ways:
1. The LED (and its WEB representation) will only be ON if the voltage is above
the threshold
2. If voltage is below the threshold an alarm will be raised
User may configure the system not to raise an alarm in case of under-voltage
for any of the supplies.
This is used for cases where the dual feed hardware is used
used, but in the
installation only one of them is actually connected, so that no alarm is
permanently raised.
PAGE 118
Installing the IDU-ODU IF cable
Route the IF Coax Cable from the IDU to the ODU/RFU and terminate it
with N-type male connectors.
Note: Make sure you fasten the cable along the ladder!
Make sure that the inner pin of the connector does not exceed the
edge of the connector.
ThankYou!
training@ceragon.com
PAGE 119
6/16/2010
RFUC&MediationDevices
FibeAir Family
RFUs Carrier Ethernet EMS & NMS
6-38 GHz IP-10 IP-MAX2 3200T PolyView (NMS)
RFU-C
Multi-Service
RFU-HP IP-10 IP-MAX2 640P
CeraView (EMS)
2
Proprietary and Confidential
PAGE 120 1
6/16/2010
RFU-C IP-10
1500R
RFU-P, RFU-SP
RFU-HP
IP-IP-MAX2
RFU-SP
640P
1500P
3
Proprietary and Confidential
1500R 1500R
IP-10
IP 10 IP-10
1500P 1500R
IP-MAX/IP-MAX2 IP-10
PAGE 121 2
6/16/2010
1+0 direct
5
Proprietary and Confidential
1+1 direct
6
Proprietary and Confidential
PAGE 122 3
6/16/2010
1+0 remote
7
Proprietary and Confidential
1+1 remote
8
Proprietary and Confidential
PAGE 123 4
6/16/2010
9
Proprietary and Confidential
10
Proprietary and Confidential
PAGE 124 5
6/16/2010
11
Proprietary and Confidential
1.30vdc = -30dBm
1.45vdc = -45dBm
1.60vdc = -60dBm
etc
12
Proprietary and Confidential
PAGE 125 6
6/16/2010
13
Proprietary and Confidential
training@ceragon.com
g@ You
Thank g !
ThankYou!
14
Proprietary and Confidential
PAGE 126 7
FibeAirIP10GSeries
Setting Management
Agenda
Getting started
General notes
General commands
Command historyy
Reading current IP
Setting new IP
Connecting PC to IDU
Troubleshooting
Factory Defaults
2
Proprietary and Confidential
PAGE 127
Getting started
Baud: 115200
Data bits: 8 YoumayuseanySerial
Parity: None ApplicationsuchasHyper
Stop
St bits:
bit 1 Terminal PuTTY TeraTerm
Terminal,PuTTY,TeraTerm
etc
Flow Control: None
3
Proprietary and Confidential
IP-10:/>
Note that the > sign indicates your current directory in the CLI tree
All functions & features can be configured faster and easier using the WEB
based EMS
4
Proprietary and Confidential
PAGE 128
General Commands
IP-10:/ >?
IP-10:/ls
IP-10:/lsp
IP-10:// > exit
IP-10:/ > cd
IP-10:/ > cd ..
5
Proprietary and Confidential
Command History
6
Proprietary and Confidential
PAGE 129
Reading current IP
To read current IP type the following:
IP-10:/>cd management/networking/ip-address/
IP-10:/ management/networking/ip-address>
Note that the prompt has changed. Now, type get ip-address:
7
Proprietary and Confidential
Setting new IP
Now, let us set a new IP for the MNG:
You may lose remote management connection to the unit if this value
is changed incorrectly.
Are you sure? (yes/no):
8
Proprietary and Confidential
PAGE 130
Connecting IDU to EMS
1. Connect your EMS/NMS to the IDU (port 7) with ETH CAT.5 cable
9
Proprietary and Confidential
Management Troubleshooting
In case PC cannot PING IDU
1. Check your ETH cable it might not be inserted properly (broken PIN)
2. Verify the management port is enabled in the EMS General/Management
configuration
3. Make sure you connect to a management-enabled port (7, 6 or 5)
4. Verify right LED is ON (see below)
5. Verify your PC is in the same subnet as the IDU
6. In case your IDU is connected to a router: set the IDUs Default GW = Router IP
7. In case your PC is connected to several IDUs (through switch/hub) make sure
every IDU has a unique IP
When ON (Green) = Port is set to Management
When OFF = Port is set to Data
10
Proprietary and Confidential
PAGE 131
Back to factory defaults
IP-10:/> cd management/mng-services/cfg-service
IP-10:/management/mng-services/cfg-service>set-to-default
11
Proprietary and Confidential
ThankYou!
training@ceragon.com
PAGE 132
10/5/2010
Agenda
Faults:
Current Alarms
Event Log
PM & Counters:
Remote Monitoring
TDM Trails
TDM interfaces
Radio (RSL, TSL, MRMC and MSE)
Radio TDM
Radio ETH
XPI
PAGE 133 1
10/5/2010
EMS - General
Easy access simply type the IP address of the IDU on your web page
PAGE 134 2
10/5/2010
PAGE 135 3
10/5/2010
8
Proprietary and Confidential
PAGE 136 4
10/5/2010
Faults - CAS
Probable cause
Corrective Actions
9
Proprietary and Confidential
PAGE 137 5
10/5/2010
TDM PM
(allocated E1/T1 VCs)
TDM
(E1/T1)
11
Proprietary and Confidential
12
Proprietary and Confidential
PAGE 138 6
10/5/2010
13
Proprietary and Confidential
ETH PM RMON
The system supports Ethernet statistics counters (RMON) display (depends on
port availability). The counters are designed to support:
14
Proprietary and Confidential
PAGE 139 7
10/5/2010
ETH PM RMON
15
Proprietary and Confidential
Undersizeframesreceived Framesshorterthan64bytes
Pauseframesreceived Numberofflowcontrolpauseframesreceived
16
Proprietary and Confidential
PAGE 140 8
10/5/2010
A Tagging T No membership
T A
Site B Ingress port (Radio) receives the frame and checks the Egress port VID
membership
Egress port default VID is 300, therefore frame is filtered by the remote Radio port
17
Proprietary and Confidential
Site A Site B
T T T A
When ingress frames exceed the maximum frame size, RMON counter Oversized frames
received is updated accordingly
18
Proprietary and Confidential
PAGE 141 9
10/5/2010
Site A Site B
T T T A
Discarding Examples:
19
Proprietary and Confidential
Monitor
20
Proprietary and Confidential
PAGE 142 10
10/5/2010
PM TDM Trails
21
Proprietary and Confidential
PM TDM Trails
22
Proprietary and Confidential
PAGE 143 11
10/5/2010
A one-second period with one or more errored blocks or at least one defect
23
Proprietary and Confidential
24
Proprietary and Confidential
PAGE 144 12
10/5/2010
25
Proprietary and Confidential
26
Proprietary and Confidential
PAGE 145 13
10/5/2010
The number of times the IP-10 switched from Primary Path to Secondary Path
and vice versa (per 15min or 24hrs interval)
PAGE 146 14
10/5/2010
Integrity:
For example if clock was changed or system was restarted during this interval
then information is not reliable
29
Proprietary and Confidential
30
Proprietary and Confidential
PAGE 147 15
10/5/2010
This PM data
relates to the
TDM Line
Interfaces.
Interfaces
31
Proprietary and Confidential
32
Proprietary and Confidential
PAGE 148 16
10/5/2010
PM Radio - RF
Signal Level RSL & TSL analysis
Associated Script
Available Bit rate
Available Radio VCs
33
Proprietary and Confidential
PAGE 149 17
10/5/2010
RSL
-40
-50
-68
-99 T [sec]
10 5 10
35
Proprietary and Confidential
PM Radio - Aggregate
Aggregated radio
traffic analysis
36
Proprietary and Confidential
PAGE 150 18
10/5/2010
PM Radio - MRMC
The information displayed in this page is derived from the license and script
assigned to the radio.
37
Proprietary and Confidential
PM Radio - MRMC
38
Proprietary and Confidential
PAGE 151 19
10/5/2010
PM Radio - MSE
The information
displayed in this page
is derived from the
license and script
assigned to the radio.
When link quality
degrades or
improves, the MSE
reading is updated
accordingly.
Differences of 3dB
trigger
gg ACM
modulation changing.
Threshold can be
configured as well for
easier maintenance.
39
Proprietary and Confidential
PM Radio - XPI
PAGE 152 20
10/5/2010
PM Radio - Ethernet
Frame Error Rate (%) measured on radio-Ethernet
interface (port 8)
42
Proprietary and Confidential
PAGE 153 21
10/5/2010
PM Ethernet Throughput
43
Proprietary and Confidential
PM Ethernet Capacity
44
Proprietary and Confidential
PAGE 154 22
10/5/2010
PM Ethernet Utilization
45
Proprietary and Confidential
A frame viewed on the actual physical wire would show Preamble and Start Frame
Delimiter,, in addition to the other data (required
( q by
y the p
physical
y hardware).
)
However, these bits are stripped away at OSI Layer 1 by the Ethernet adapter before
being passed on to the OSI Layer 2 which is where data is detected.
46
Proprietary and Confidential
PAGE 155 23
10/5/2010
Throughput = 77 Mbps
Radio Capacity =
(license) = 400Mbps
Utilization = Throughput = 77 = 20 %
Radio Capacity 400
48
Proprietary and Confidential
PAGE 156 24
10/5/2010
ThankYou!
training@ceragon.com
training@ceragon com
PAGE 157 25
10/5/2010
Agenda
PAGE 158 1
10/5/2010
Menus
Menu of an Extension
Configure specific
information that may
assist you later
PAGE 159 2
10/5/2010
VDC reading
Celsius (metric) or
Fahrenheit (Imperial)
PAGE 160 3
10/5/2010
PAGE 161 4
10/5/2010
5 Inputs
1 Output
9 Proprietary and Confidential
PAGE 162 5
10/5/2010
Equipment Alarms related to: HW / FAN / RFU mute / Power Supply / Inventory.
All Groups.
PAGE 163 6
10/5/2010
IP: 192.168.1.10
SM: 255.255.255.0 ETH Cross Cable IP: 192.168.1.100
D.GW: 0.0.0.0 SM: 255.255.255.0
PAGE 164 7
10/5/2010
10.10.2.10
DCN
IP: 192.168.1.10
SM: 255.255.255.0
255 255 255 0
D.GW: 192.168.1.12
192.168.1.12
IP: 10.10.2.100
SM: 255.255.255.0
15 Proprietary and Confidential
The floating
g IP address pprovides a
single IP address that will always give
direct access to the current active
main unit.
PAGE 165 8
10/5/2010
192.168.1.100
PAGE 166 9
10/5/2010
In Band Management
g
requires unique VLAN ID
This helps separating
MNG traffic from other
services
In Band MNG packets are
transferred via the radio
link
When the link is down,
management is down as
well.
PAGE 167 10
10/5/2010
To manage the IDU with OSS / NMS, you will need to configure the IP address
of the OSS Server
PAGE 168 11
10/5/2010
Licenses are generated per IDU S/N (capacity / ACM / switch mode)
PAGE 169 12
10/5/2010
Capacity license:
Limits the total amount of radio
capacity available:
PAGE 170 13
10/5/2010
TDM-only license:
PAGE 171 14
10/5/2010
Per-usage license:
PAGE 172 15
10/5/2010
"Default"
"Normal"
PAGE 173 16
10/5/2010
"Demo"
Licensing: General
When system is up, its license key is checked, allowing access to new
capacities and/or features
If license key itself is not legal (typing mistake, illegal S/N) specific alarm will
be raised
To clear the violation alarm, user must configure the system to comply with the
loaded license, and then, issue cold-reset (radio resumes full operational status
if the violation is no longer relevant)
PAGE 174 17
10/5/2010
Demo license is allowed for 60 days per IDU, expanding the time is not feasible
The function can be enabled and disabled from the license menu
When the function is disabled or when the 60 days are up, the system shall
perform a reset and automatically change the radio-script to the last radio-script
that was used before the demo license was enabled
An alarm is raised and a timer of the remained hours is shown on the license
menu while demo is enabled
When demo is enabled, all the radio scripts are available and the user can
choose any wanted script
35 Proprietary and Confidential
Expected Status:
2. Local if the NTP client is locked to the local elements real-time clock
3. NA - if not synchronized with any clock (valid only when Admin is set to
Disable).
PAGE 175 18
10/5/2010
NTP Properties
NTP Properties
When using NTP with external protection 1+1, both Active and Standby
units
nits sho
should
ld be locked independentl
independently on the NTP ser
server,
er and report
Time & Date are not copied from the Active unit to the Standby unit
standby main units) are automatically synchronized to the active main units
clock.
PAGE 176 19
10/5/2010
IP Table
SNMP
V1
V2c
V3
No security
Authentication
Authentication privacy
SHA
MD5
No Authentication
PAGE 177 20
10/5/2010
All ODU
This feature is used to feed the integrated fans of the All Outdoor Enclosure
(standalone outdoor rack)
When Enabled, the All ODU enclosure interface is activated, and the enclosure
controller can then be powered to monitor fan failure alarms.
The External Alarm Input #1 becomes an output, which together with 3.3V is
used to drive the enclosures electronic board.
External Alarm Input #2 is set with a specific text & severity, and is used to
monitor any enclosure fan failure, and to raise an alarm for it (polarity change
was required to adapt it to the enclosure behavior).
PAGE 178 21
10/5/2010
Versions - IDU
Versions - ODU
PAGE 179 22
10/5/2010
The IDU running SW is displayed in the aidu line and currently it is 3.0.92
3 0 92
ThankYou!
training@ceragon.com
46
PAGE 180 23
3/7/2010
Agenda
2. Guidelines
PAGE 181 1
3/7/2010
Switch Modes
This application allows only single GbE interface as traffic interface (Optical
GbE-SFP or Electrical GbE - 10/100/1000).
Any traffic coming from any GbE interface will be sent directly to the radio and
vice versa.
Switch Modes
All Ethernet ports are allowed for traffic. Each traffic port can be configured to
be "access" port or "trunk" port:
Allowed Egress
Type VLANs Allowed Ingress Frames
Frames
PAGE 182 2
3/7/2010
Switch Modes
Guidelines
PAGE 183 3
3/7/2010
Single Pipe
Configuration
Untagged
VID 4 45
VID 51 IP-10 Switch
VID 100
PAGE 184 4
3/7/2010
Port 3 (RJ45)
No need to configure
VID membership
10 Proprietary and Confidential
PAGE 185 5
3/7/2010
Managed Mode
Configuration
IDU-B
IDU-A
Radios as Trunk by
default Port #2 as Trunk
Port #3 as Trunk
(VID 200, VID 300)
(VID 300)
PAGE 186 6
3/7/2010
Next steps:
1. Go to Interfaces page
PAGE 187 7
3/7/2010
2
1
4
15 Proprietary and Confidential
IP-10
Transmits and
receives
Transmits and Untagged PC
receives frames
Untagged PC
frames 192.168.1.200
192.168.1.100
PAGE 188 8
3/7/2010
IP-10
Trunk Port
Multiple L2
streams, each Traffic
identified with
unique VID Generator
Trunk Port
Thank You !
training@ceragon.com
18
PAGE 189 9
4/17/2010
FibeAir IP-10
Trunk VS. Access
Agenda
2. Access Port
3. Trunk Port
5. General Guidelines
PAGE 190 1
4/17/2010
Access Port
Ingress
g traffic is expected to be Untagged,
gg e.g.
g no VLAN
information exists within the received Ethernet frame
All frames that are received through this port are tagged with
default VLAN (VID + P bits)
All frames that exit through this port towards customer devices are
untagged (VLAN is removed)
PAGE 191 2
4/17/2010
Access Port
L2 ETH SW
Tagging
Port #8
Port #1
Tagged frame
DA SA Type Payload FCS
PAGE 192 3
4/17/2010
Access Port
Utagging frames towards customer interfacing ports
Untagging
Port #8
Port #1
Tagged frame
DA SA Type Payload FCS
The switch can individually tag multiple Access ports with same VID or
unique VID
Tagging
Port #8
Port #1 Port #2
DA SA VLAN TAG = 10 Type Payload FCS
PAGE 193 4
4/17/2010
To be able to transmit & receive multiple VLANs, the common port has to
be configured as a Trunk Port
Trunk Port
Port #8
Port #1 Port #2
DA SA VLAN TAG = 10 Type Payload FCS
Trunk Port
Port #8
Port #2
DA SA VLAN TAG = 10 Type Payload FCS
SA VLAN
DA Untagged TAG = 33
frames Type Payload FCS
10 Proprietary and Confidential
PAGE 194 5
4/17/2010
A certain VLAN can be extracted out of a Trunk via Access port assigned
with specific VLAN membership (Default VID)
SA
DA Untagged VLAN TAG = 33
frames Type Payload FCS
General guidelines
Access port can only receive untagged frames from customer device
Access port can only transmit untagged frames towards customer device
PAGE 195 6
4/17/2010
2
1
3
ThankYou!
training@ceragon.com
training@ceragon com
14
PAGE 196 7
10/5/2010
Agenda
Metromodereview
Configuration Guidelines
ConfigurationGuidelines
SimplifiedFlow
CommonApplications:CN PN PN CN
CommonApplications:CN PN PN PN
SwitchModeConfiguration
CNPortConfiguration
PNPortConfiguration
2
Proprietary and Confidential
PAGE 197 1
10/5/2010
3
Proprietary and Confidential
Configuration guidelines
Network #1
CVLAN100
S-VLAN 9 CVLAN101
Radio
R di Network 1 CVLAN102
CVLAN103
Ports CVLAN100
(PN) S-VLAN 8
Network 2
CVLAN101
CVLAN102
CVLAN103
Network #2
4
Proprietary and Confidential
PAGE 198 2
10/5/2010
Simplified Flow
IP-10
S-VLAN 1000
S-VLAN 222
S-VLAN 1000
S-VLAN 222
PN CN CN
Radio Port
CN-PN-PN-CN
CVLAN100
S-VLAN 9 CVLAN101
Radio BTS 2 CVLAN102
CVLAN103
BTS#2:
CVLAN100
Ports CVLAN100
CVLAN101 (PN) S-VLAN 8
BTS 1
CVLAN101
CVLAN102
CVLAN102 CVLAN103
CVLAN103
CN
CN
CN
BTS#1:
CVLAN100 CN
CVLAN101
CVLAN102
CVLAN103
6
Proprietary and Confidential
PAGE 199 3
10/5/2010
CN-PN-PN-PN
CVLAN100
S-VLAN 9 CVLAN101
Radio BTS 2 CVLAN102
CVLAN103
BTS#2:
CVLAN100
Ports CVLAN100
CVLAN101 (PN) S-VLAN 8
BTS 1
CVLAN101
CVLAN102
CVLAN102 CVLAN103
CVLAN103
CN
CN
PN
BTS#1:
CVLAN100
CVLAN101
CustomerNetwork ProviderNetwork
CVLAN102
CVLAN103
7
Proprietary and Confidential
8
Proprietary and Confidential
PAGE 200 4
10/5/2010
CN Port Configuration
6 Enable
6. E bl PPortt L i
Learning
9
Proprietary and Confidential
CN Port Configuration
3
4
10
Proprietary and Confidential
PAGE 201 5
10/5/2010
PN Port Configuration
6 Apply
6. A l &R f h
Refresh
11
Proprietary and Confidential
PN Port Configuration
12
Proprietary and Confidential
PAGE 202 6
10/5/2010
0x88A8
0x8100
0 8100
0x9100
7 0x9200
13
Proprietary and Confidential
Additional Information
Link Configuration:
Metro switch can work with a remote Metro switch or remote Single Pipe switch
Metro switch cannot work with a remote Managed switch
14
Proprietary and Confidential
PAGE 203 7
10/5/2010
ThankYou!
training@ceragon.com
training@ceragon com
15
PAGE 204 8
10/17/2010
Agenda
Student Perquisites
General Overview
Limitations
Switchover Criteria
In Band Management
Configuration Example
PAGE 205
1
10/17/2010
Student Perquisites
General Overview
Ceragon Networks ring solution enhances the RSTP algorithm for ring
topologies, accelerating the failure propagation relative to the regular
RSTP:
Relations between Root and Designated bridges when ring is converged in the
first time is the same as defined in the standard RSTP. Ring-RSTP itself is
different than classic RSTP, as it exploits the topology of the ring, in order to
accelerate convergence.
RSTP PDUs coming from Edge ports are discarded (and not processed or
broadcasted).
4 Proprietary and Confidential
PAGE 206
2
10/17/2010
2. Ring RSTP
S can be activated only in Managed
Switch
S application, and is not
available in any other switch application (Single Pipe or Metro).
1. Node/Site Type A:
The site is connected to the ring with one Radio interface (e.g. East) and one
Line interface (e.g. West).
The site contains only one IP-10 IDU. The Radio interface towards one
direction (e.g. East), and one of the Gigabit (Copper or Optical) interfaces,
towards the second direction (e.g. West).
Other line interfaces are in edge mode, meaning, they are user interfaces,
and are not part of the ring itself
itself.
PAGE 207
3
10/17/2010
2. Node/Site Type B:
The site is connected with Radios to both directions of the ring (e.g. East &
West).
Site contains two IDUs. Each IDU support the Radio in one direction
One IDU runs with the Ring RSTP, and the second
runs in Single pipe mode.
Radio LOF
Link ID mismatch.
Line LOC
Node
N d cold
ld resett (Pi
(Pipe and/or
d/ SSwitch).
it h)
PAGE 208
4
10/17/2010
Managed
S
Switch IDUs will be configured
f to In-Band, while Single
S Pipe
IDUs will be configured to Out-of-Band.
Single Pipe nodes will be connected with external Ethernet cable to the
Managed Switch for management.
PAGE 209
5
10/17/2010
PAGE 210
6
10/17/2010
EMS
Configuration
13 Proprietary and Confidential
Setup Configuration
Site#1 Site#2
1 6 7
1 6 7
Pipe(slot#2)
Pipe(slot#2)
1 1 3 4 5 6 7
1 1 3 4 5 6 7
MNG(slot#1)
MNG (slot #1)
MNG(slot#1)
Site#3
1 6 7
Pipe(slot#2)
1 1 3 4 5 6 7
MNG(slot#1)
EMS
1. You may start with out of band configuration to avoid physical loops
2. Establish the Radio links according to the setup scheme
PAGE 211
7
10/17/2010
Setup Configuration
Site#1 Site#2
1 6 7
1 6 7
Pipe(slot#2)
Pipe(slot#2)
1 1 3 4 5 6 7
1 1 3 4 5 6 7
MNG(slot#1)
MNG ( l t #1)
MNG(slot#1)
Site#3
1 6 7
Pipe(slot#2)
1 1 3 4 5 6 7
MNG(slot#1)
EMS
3. Connect between slot 2 and slot 1 using ports number 1 and fibers
4. Enable RSTP in all Managed Switch IDUs (see next slide)
PAGE 212
8
10/17/2010
1 6 7
1 6 7
Pipe(slot#2)
Pipe(slot#2)
1 1 3 4 5 6 7
1 1 3 4 5 6 7
MNG(slot#1)
MNG ( l t #1)
MNG(slot#1)
Site#3
1 6 7
Pipe(slot#2)
1 1 3 4 5 6 7
MNG(slot#1)
PAGE 213
9
10/17/2010
RSTP Verification
Site#1 Site#2
1 6 7
1 6 7
Pipe(slot#2)
Pipe(slot#2)
1 1 3 4 5 6 7
1 1 3 4 5 6 7
MNG(slot#1)
MNG ( l t #1)
MNG(slot#1)
Site#3
1 6 7
Pipe(slot#2)
1 1 3 4 5 6 7
MNG(slot#1)
8. PING EMS to all Sites at the same time (multiple PING sessions)
RSTP Verification
9. Examine which switch is the Root Bridge and which ports are the Root Ports
10. Verify that the ring is set up properly (one Root)
PAGE 214
10
10/17/2010
RSTP Verification
11.Identify the Edge Ports and Non-Edge ports in your setup and make sure
they are configured correctly
Enabling ASP
Make sure that all RING IDUs (Pipe & Managed) support Automatic State
Propagation (enabled).
Enabling
g ASP allows RSTP Ring g to converge
g faster by yppropagating
p g g radio
alarms into the Line and thus, accelerating port state changes.
PAGE 215
11
10/17/2010
Triggering a Switchover
Disconnect a radio link and make sure PING to all Main units is maintained
Restore connectivity.
Disconnect a different radio link and make sure PING to all Main units is
maintained
PAGE 216
12
10/17/2010
Prioritization Criteria
4 Path
4. P th C
Costt (User
(U configurable)
fi bl )
PAGE 217
13
10/17/2010
PAGE 218
14
10/17/2010
For example:
1GbE is given lower path cost than
FE port
ThankYou!
training@ceragon.com
training@ceragon com
30
PAGE 219
15
10/17/2010
Agenda
Introduction
QoS in IP-10
PAGE 220
1
10/17/2010
Introduction (1)
IP-10 is more than a Radio:
Introduction (2)
MW
Radio
PAGE 221
2
10/17/2010
Understanding QoS
PAGE 222
3
10/17/2010
GE
WiMAX / 4G / LTE
Cellular site
WiMAX
STM-1 / OC-3
Ceragon Ceragon
Hub / Aggregation site
TDM
E1/T1
Fundamental Fact
Static
Dynamic WWW
WWW
Multimedia
emails
FTP
Whosfirst?
8 Proprietary and Confidential
PAGE 223
4
10/17/2010
Static
Dynamic WWW
What is the BW requirement per service ? WWW
Data
D t requires
i lless th
than video
id
FTP requires more than emails
emails
What is the delay sensitivity of each service? FTP
Delayed Voice is inacceptable
FTP can tolerate delays
Skype
Your 2nd assignment is grouping services into SLAs:
Video & Multimedia Low Services (Best Effort)
FTP Moderate Service
Skype Highest Service
QoS in IP-10
PAGE 224
5
10/17/2010
QoS Process
Q4 Q4
25
10 50
Q1 Q3
Q2
PAGE 225
6
10/17/2010
Ingress Egress
port port
Customer Provider
Network Network
Egress Ingress
port port
Customer Provider
Network Network
Ingress
Egress
Radio Radio
Egress
Ingress
PAGE 226
7
10/17/2010
FE Max. 100Mbps
Rate
25 Discard
Max. Allowed
10 50 R
Rate
t
Pass
Actual
Customer
Traffic
Time
Using Queues
Every port of the L2 switch examines the ingress traffic and then it sorts it in a
buffer according to classification criteria
Users can configure up to 4 queues where Q4 has the max. priority and Q1
has the lowest priority
Q4 High
Q3
Q2
Q1 Low
PAGE 227
8
10/17/2010
Using Queuing
Q1 Low
Q1
Q2 Q2
Q3 Q3
Q4
Q4 High
time
t1 t2 t3 t4
18 Proprietary and Confidential
PAGE 228
9
10/17/2010
Q1 Low
Q1
Q2 Q2
Q3 Q3
Q4
Q4 High time
t1 t2 t3 t4 t5
PAGE 229
10
10/17/2010
The switch will empty a queue as long as the higher queue is empty
Shaping
Bursts beyond a EIR (Excessive Information Rate) can be buffered and
retransmitted when capacity frees up, and only when shaping buffers are full
will packets be dropped.
PAGE 230
11
10/17/2010
Possible Scenarios
No need for
f
Ingress Queuing
Radio Radio
Possible Scenarios
Ingress Queuing is
required in port 8
Radio Radio
PAGE 231
12
10/17/2010
ThankYou!
training@ceragon.com
training@ceragon com
25
PAGE 232
13
3/7/2010
Perquisites
Introduction to Ethernet
802.1p/q
QoS (Concept)
PAGE 233 1
3/7/2010
Agenda
Introduction
Process Review
Basic Configurations
Introduction (2)
In this presentation we shall focus on the L2 ETH switch:
Traffic shaping
PAGE 234 2
3/7/2010
PAGE 235 3
3/7/2010
PAGE 236 4
3/7/2010
Process Review
25
10 50
Rate Limit
PAGE 237 5
3/7/2010
Queuing
Q4 Q4
Q1 Q3
Q2
Scheduling
PAGE 238 6
3/7/2010
Shaping
Basic Configurations
PAGE 239 7
3/7/2010
PAGE 240 8
3/7/2010
PAGE 241 9
3/7/2010
PAGE 242 10
3/7/2010
Frames with MAC that do not comply to the table will be classified by the 2nd &
3rd classifiers
21 Proprietary and Confidential
PAGE 243 11
3/7/2010
PAGE 244 12
3/7/2010
Frames with VID that do not comply to the table will be classified by the 3rd
classifier
26 Proprietary and Confidential
PAGE 245 13
3/7/2010
7. Egress Shaper
Reducing the egress rate to a value between 64kbps and 1Mbps requires
setting it in steps of 64kbps
Reducing the egress rate to a value between 1Mbps and 100Mbps requires
setting it in steps of 1Mbps
Reducing the egress rate to a value between 100Mbps and 1Gbps requires
setting it in steps of 10Mbps
Thank You !
training@ceragon.com
28
PAGE 246 14
3/7/2010
Agenda
Queuing + Re-Map
PAGE 247 1
3/7/2010
Can be used to guaranty certain Customer priorities are reserved for specific
purposes
P-Bit Service P-Bit* Service
0-2 Video 0-5 Best
34 Data Effort
56 MNG 6 MNG
7 Voice 7 Voice
L2 Switch
Customer (IP-10) Provider
network network
PAGE 248 2
3/7/2010
Ingress
Tagged
frame Queuing
Ingress Egress Egress
VID P-bit according VID P-bit
Rate Limit Scheduler Shaper
to classifier
PAGE 249 3
3/7/2010
Conditional Classification
PAGE 250 4
3/7/2010
Otherwise the switch will apply the Default Configuration (Queue number).
Otherwise the switch will apply the Default Configuration (Queue number).
PAGE 251 5
3/7/2010
As long as the ingress frames comply to the higher conditions, the system will
not check lower conditions (Classifiers)
If higher condition is not matched, the system will proceed to the lower
condition and so on
Otherwise
2nd criteria: VLAN ID
100 Highest
If ingress VID does not qualify (100 or 200)
100 or 200 100 Highest
then skip to - 100 Highest
100 Highest
200 Lowest
Audit VLAN P-bits Ingress
VID = ?
frames 3rd criteria: P-Tag
7 Highest
6
3
Different than 2
100 or 200
0 Lowest
PAGE 252 6
3/7/2010
Thank You !
training@ceragon.com
13
PAGE 253 7
10/5/2010
FibeAir IP10
Commissioning the Radio Link
PAGE 254 1
10/5/2010
Feature Description
(followed later with EMS Configuration Steps)
# 101
# 101
# 102
Link ID
Mismatch
# 101
Link ID Mismatch
4
Proprietary and Confidential
PAGE 255 2
10/5/2010
# 101
# 101
# 102
Link ID
Mismatch
# 101
Link ID Mismatch
5
Proprietary and Confidential
Main Lobe
Side Lobe
6
Proprietary and Confidential
PAGE 256 3
10/5/2010
In ATPC, each node builds a model for each of its neighbors, describing the
correlation between transmission power and link quality.
7
Proprietary and Confidential
2. Set reference RSL (min. possible RSL to maintain the radio link)
3. ATPC on both ends establish a Feedback Channel through the radio link (1byte)
5. Power reduction stops when RSL in remote receiver reaches Ref. level
8
Proprietary and Confidential
PAGE 257 4
10/5/2010
9
Proprietary and Confidential
ATPC ON =
Reduced Power, cost & long-term maintenance
Monitored RSL: -60 dBm (before 53) Monitored RSL: -63 dBm (before 56)
10
Proprietary and Confidential
PAGE 258 5
10/5/2010
2 Non
2. N ACM scripts
i t ((old)
ld) are still
till available
il bl tto supportt N
Non-ACM
ACM radios
di
11
Proprietary and Confidential
12
Proprietary and Confidential
PAGE 259 6
10/5/2010
In other words, when link suffers signal degradation, modulation may change from
256QAM to QPSK. However, Max. power will be limited to the value corresponding as
Max. TX in 256QAM.
13
Proprietary and Confidential
Signal Degradation
= Lower bit/symbol
14
Proprietary and Confidential
PAGE 260 7
10/5/2010
Signal Degradation
= Lower bit/symbol
15
Proprietary and Confidential
Class 2
Class 4
Class 5B
Class 6A
FCC
RFU C should
RFU-C h ld h i 2.01
have version 2 01 (or
( hi h ) ffor proper ffunctionality
higher) ti lit off
Adaptive TX Power feature.
The Effective Isotropic Radiated Power (EIRP) is the apparent power transmitted towards the receiver assuming that the
signal power is radiated equally in all directions
16
Proprietary and Confidential
PAGE 261 8
10/5/2010
The Effective Isotropic Radiated Power (EIRP) is the apparent power transmitted towards the receiver assuming that the
signal power is radiated equally in all directions
17
Proprietary and Confidential
In addition:
Frequently repeating SA & DA are learned
Learned DA & SA are not transmitted
A short pointer is used instead of the original 12 bytes
18
Proprietary and Confidential
PAGE 262 9
10/5/2010
19
Proprietary and Confidential
EMS Configuration
PAGE 263 10
10/5/2010
Spectrum Mask
21
Proprietary and Confidential
Enable / Disable
Enable = no transmission
22
Proprietary and Confidential
PAGE 264 11
10/5/2010
23
Proprietary and Confidential
RSL
S Display Selector
S
To calibrate the distance between both antennas, type the distance in nano0seconds
and click Apply
24
Proprietary and Confidential
PAGE 265 12
10/5/2010
When the radio link is up, you can configure the remote radio via the radio frames:
25
Proprietary and Confidential
Simplified scheme
Sit B is
Site i NOT transmitting
t itti
Site A is
transmitting
Site B
Site A
26
Proprietary and Confidential
PAGE 266 13
10/5/2010
27
Proprietary and Confidential
28
Proprietary and Confidential
PAGE 267 14
10/5/2010
29
Proprietary and Confidential
MAX. Capacity
(w/out compression)
Spectrum
Mask
ACM is on
Spectrum
Class Type
30
Proprietary and Confidential
PAGE 268 15
10/5/2010
31
Proprietary and Confidential
Configure here:
Adaptive
p Power: Enabled / Disabled
Reference Class
32
Proprietary and Confidential
PAGE 269 16
10/5/2010
ThankYou!
training@ceragon.com
training@ceragon com
PAGE 270 17
9/19/2010
FibeAir RFU-HP
Green Mode
PAGE 271 1
9/19/2010
The HP Radios
Single RX/
1500HP
DualRX X
RFUHP SingleRX
Single RX/
RFUA
DualRX
Please note
ATPCVS.GREENMODE
ATPC:
UsedtoreduceinterferencetootherradiosinadenseMW
Used to reduce interference to other radios in a dense MW
environment
GreenMode:
GreenModeisenvironmentallyfriendly
SavesOPEXandCAPEXthroughlowerpowerconsumption
Oncefadingbecomessevere,actslikeATPC
PAGE 272 2
9/19/2010
MonitoredTX Consumed
PowerState
Power power[W]
Normal ATPC
5 dB
15
10
0
RX:41dBm
Referencelevel:40dBm
PAGE 273 3
9/19/2010
15
10
5
0 dB
RX:52dBm
RX:37dBm
RX:42dBm
RX:47dBm
Green level: 50dBm
Greenlevel:
Greenlevel: 50dBm
15 dB
RX:50dBm
RX:52dBm
Green level: -50dBm
50dBm
PAGE 274 4
9/19/2010
Thank You!
training@ceragon.com
PAGE 275 5
10/5/2010
FibeAirIP10GSeries
Configuring Interfaces
Agenda
PAGE 276 1
10/5/2010
Switch Configuration
Trunk VS. Access
Metro
M t S Switch
it h C
Configuration
fi ti
QoS Configuration
PAGE 277 2
10/5/2010
Supported PHYs:
E1
DS1
Dynamic allocation:
Radio bandwidth (which may vary in ACM) is automatically allocated in the
following order:
Standalone IDU
PAGE 278 3
10/5/2010
Node Site
Up to 180 trails can be configured in a
Shelf / node
M
Mute
t TX
TX:
Mutes the outgoing STM-1 signal, but
received signal will be used for traffic
PAGE 279 4
10/5/2010
Clock source:
This is a reference for the outgoing
STM-1 signal:
Internal Clock
Loop
STM VC
Synch VC
Thi
This iis th
the VC Ch
Channell which
hi h will
ill b
be
used to sync the STM-1 interface
AIS Signaling in STM interface (V5) The system can be configured to signal
AIS at the VC level (AIS-V) in the V5
byte of the overhead.
111111111 111111111
PAGE 280 5
10/5/2010
PAGE 281 6
10/5/2010
PAGE 282 7
10/5/2010
WSC Interface
WSC interface is limited to 1628 bytes.
2.048Mbps (Wide) or 64Kbps (Narrow)
Consumes BW from the total link BW
On both local & remote units, Wayside channel will be connected to management port
(using cross Ethernet cable).
PAGE 283 8
10/5/2010
PAGE 284 9
10/5/2010
Signal failure is generated at the corresponding trail this will cause the far end not to
receive a signal (including trail ID indications) and the trail status to show signal failure
and trail ID mismatch.
An indication is given to user at the proper interface. Notice that this is not a system
alarm, since the problem originates elsewhere in the Network
PAGE 285 10
10/5/2010
Select Sync on slots you wish to sync the ETH ports to external source
PAGE 286 11
10/5/2010
Please note
1. Y
1 You cannott sync ETH ports
t with
ith TDM ports
t off the
th same slot
l t
2. You can sync ETH ports with Radio Channels of any slot
ThankYou!
training@ceragon.com
training@ceragon com
24
PAGE 287 12
9/13/2010
FibeAirIP10GSeries
XC / SNCP / Nodal Solution
Introduction
PAGE 288 1
9/13/2010
Individual E1/T1 trails will be protected by defining two separate trails, with the same
end-points, which are routed through two different paths in the network
The end-points may be line interfaces or radio VCs, so partial path protection can
be p
provided for a trail in a network where full p
path redundancy
y topology
p gy is not
available
Main Path
Protective Path
PAGE 289 2
9/13/2010
Rear
PAGE 290 3
9/13/2010
PAGE 291 4
9/13/2010
The main unit performs the cross-connect, switching and management functions for
all the units in the node
Mandatory active main unit can be located in any of the 2 slots
Optional standby main unit can be installed in other slot
Switchover time <50msecs for all traffic affecting functions
Integrated
g Ethernet Switching
g
Native2
1+0
Integrated
g Ethernet Switching
g E
E
Integrated TDM cross-connect E Native2
E 2+0/XPIC
M Main unit
M
E
Expansion unit M Native2
1+1 HSB
PAGE 292 5
9/13/2010
2 All Trails
2. T il are transported
t t d through
th h main
i unit(s)
it( )
4. T-Cards (TDM / SDH) are not hot-swappable, do not extract / insert card
when IDU is powered up
PAGE 293 6
9/13/2010
Radio to Line
Line to Radio
Radio to Radio
9 Maximum
9. M i b off T
number il per R
Trails di = 84
Radio
IP10 Bypass
site Protected Trail
(Automatic)
IP10
Trail starts here:
For SNCP we shall
need to define 3
Radio Link interfaces
PAGE 294 7
9/13/2010
2 IP10
The Trail Start/End points should
be configured first (interface #1) 3
IP10 Bypass
site
Interfaces #2 and #3 can be
configured in a random order
Protected Trail
(Automatic)
2 3
IP10
PAGE 295 8
9/13/2010
PAGE 296 9
9/13/2010
PDH to PDH
PDH to Radio (above)
PDH to SDH
SDH to Radio
SDH to Radio
Radio to SDH
Radio to PDH
PAGE 297 10
9/13/2010
PAGE 298 11
9/13/2010
Enable Protection when you configure the Trails (excluding Bypass Nodes)
PDH interface
IP10
Bypass
Node IP10
IP10
SDH interface
PAGE 299 12
9/13/2010
1st Node
PDH interface
IP10
IP10
Bypass
site
SDH iinterface
t f #1
Bypass Node
PDH interface
Radio CH #48
IP10
Bypass IP10
Node
Radio CH #1
IP10
SDH iinterface
t f
PAGE 300 13
9/13/2010
3rd Node
PDH interface
Radio CH #48
IP10
Bypass IP10
site Radio CH #26
IP10
SDH interface
PAGE 301 14
9/13/2010
Ethernet L2 capacity - Total bit rate of net Ethernet frames running over
the Ethernet user port. Taking into account the Ethernet frame without the
IFG and preamble fields.
Radio throughput
g p - Total bit rate supported
pp by
y the radio link running
g in a
specific channel/modulation including radio frame overhead, etc.
3.5 MHz
P fil
Profile M d l ti
Modulation Mi i
Minimum M # off Ethernet
Max Eth t capacity
it Eth
Ethernett L2 Frames per
F R di
Radio
required capacity supported (Mbps) capacity (Mbps) seconds Throughput
license E1s (Mbps)
2 16 QAM 10 4 13.60 10.36 20233.77 10.50
4 64 QAM 25 6 20.14 15.35 29974.03 15.00
7 MHz
Profile Modulation Minimum Max # of Ethernet capacity Ethernet L2 Frames per Radio
required capacity supported (Mbps) capacity (Mbps) seconds Throughput
license E1s (Mbps)
0 QPSK 10 4 13 42
13.42 10 23
10.23 19976 45
19976.45 10 38
10.38
1 8 PSK 25 6 20.18 15.38 30034.94 15.03
2 16 QAM 25 8 27.87 21.24 41475.26 20.31
3 32 QAM 25 10 34.48 26.27 51304.87 24.85
4 64 QAM 25 12 40.44 30.81 60175.21 28.95
5 128 QAM 50 13 46.60 35.50 69339.64 33.19
6 256 QAM 50 16 54.53 41.55 81151.77 38.64
7 256 QAM 50 17 57.38 43.72 85389.21 40.60
PAGE 302 15
9/13/2010
14 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
required capacity support E1s (Mbps) capacity (Mbps) seconds Throughput
license (Mbps)
0 QPSK 25 8 28.90 22.02 43001.18 21.02
1 8 PSK 25 12 40.90 31.16 60857.98 29.27
2 16 QAM 50 18 60.36 45.99 89823.89 42.65
3 32 QAM 50 20 70.35 53.60 104693.80 49.52
4 64 QAM 50 24 81.78 62.31 121693.09 57.37
5 128 QAM 100 29 98.43 74.99 146471.17 68.82
6 256 QAM 100 34 115.15 87.73 171347.98 80.31
7 256 QAM 100 37 124.52 94.87 185297.74 86.76
28 MHz
Profile Modulation Minimum required Number of Ethernet capacity Ethernet L2 Frames per Radio
capacity
it lilicense supportt E1s
E1 (Mb )
(Mbps) capacity
it (Mb
(Mbps)) seconds
d Throughput
Th h t
(Mbps)
0 QPSK 50 17 57.86 44.08 86099.43 40.93
1 8 PSK 50 23 77.86 59.32 115860.75 54.68
2 16 QAM 100 33 111.32 84.81 165648.63 77.68
3 32 QAM 100 44 150.76 114.87 224346.79 104.80
4 64 QAM 150 55 187.55 142.90 279093.55 130.09
5 128 QAM 150 68 228.81 174.33 340488.46 158.46
6 256 QAM 200 76 254.71 194.07 379034.79 176.27
7 256 QAM 200 80 268.45 204.53 399476.94 185.71
40 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
required capacity support E1s (Mbps) capacity (Mbps) seconds Throughput
license (Mbps)
0 QPSK 50 23 79 64
79.64 60 68
60.68 118506 13
118506.13 55 90
55.90
1 8 PSK 100 35 119.11 90.75 177239.65 83.04
2 16 QAM 100 51 174.14 132.68 259136.72 120.87
3 32 QAM 150 65 218.49 166.47 325132.27 151.36
4 64 QAM 150 81 273.67 208.51 407254.05 189.30
5 128 QAM 200 84 305.49 232.76 454605.63 211.18
6 256 QAM 200 84 346.84 264.26 516135.41 239.61
7 256 QAM 300 84 369.96 281.87 550529.12 255.50
56 MHz
Profile Modulation Minimum Number of Ethernet capacity Ethernet L2 Frames per Radio
i d capacity
required it supportt E1s
E1 (Mb )
(Mbps) it (Mb
capacity (Mbps)) d
seconds Th h t
Throughput
license (Mbps)
0 QPSK 100 32 108.86 82.94 161994.37 75.99
1 8 PSK 100 48 163.37 124.48 243116.10 113.47
2 16 QAM 150 64 216.60 165.03 322318.52 150.06
3 32 QAM 200 84 288.50 219.81 429314.58 199.50
4 64 QAM 300 84 358.49 273.14 533473.73 247.62
5 128 QAM 300 84 430.43 327.95 640527.34 297.08
6 256 QAM 400 84 489.77 373.16 728824.51 337.87
7 256 QAM 400 84 531.82 405.20 791403.86 366.78
32
Proprietary and Confidential
PAGE 303 16
9/13/2010
2 8 PSK 10 19 27 2 8 PSK 22 39 - 56
3 16 QAM 16 28 40 3 16 QAM 32 57 - 81
4 32 QAM 18 32 46 4 32 QAM 38 67 - 96
ThankYou!
training@ceragon.com
training@ceragon com
34
PAGE 304 17
4/30/2010
Agenda
Introduction
Interfacing IP-10 with external devices
Configuration VS
VS. Functionality
Dead Lock Example
ASP in Managed / Metro Mode
PAGE 305 1
4/30/2010
Introduction
Automatic State Propagation ("GigE Tx mute override") enables propagation of radio
failures back to the line, to improve the recovery performance of resiliency protocols
(such as xSTP).
The feature allows the user to configure which criteria will force GbE port (or ports in case
of remote fault) to be muted / shut down, in order to allow the network find alternative
paths.
Radio LOF
Needtofind
alternativepath
PAGE 306 2
4/30/2010
TX RX
RX TX
PAGE 307 3
4/30/2010
TX RX LOC
RX TX
TX RX LOC
RX X TX
PAGE 308 4
4/30/2010
TX RX LOC
LOC
RX X TX
TX LOC
X RX
LOC
RX X TX
PAGE 309 5
4/30/2010
11
1 8 8 1
Actions: Actions:
Muteport1(GbESFP) Muteport1(GbESFP)
PAGE 310 6
4/30/2010
8 8
Actions: Actions:
ShutdownElec. ShutdownElec.
port port
1. ASP Enabled
2. ACM profile threshold
3. Excessive BER enabled
LocalGbE Criteria: 8 8
LOC
Portt is
P i logically
l i ll closed
l dbbutt nott
shut down
LOC will not trigger port shut Remote LOC will not trigger
down (it will not be possible to port shut down (it will not be
enable the port when LOC is possible to enable the port
cleared) when LOC is cleared)
PAGE 311 7
4/30/2010
15
PAGE 312 8
4/30/2010
1. ASP Enabled
2. ACM profile threshold
3. Excessive BER enabled
LocalCriteria:
RadioLOF
LINKIDMismatch
ExcessiveBER
ACMprofileisbelowthreshold
8 8
Actions:
ShutdownRadio
1. ASP Enabled
2. ACM profile threshold
3. Excessive BER enabled
Localcriteria: 8 8
GbE LOC Actions:
Noactiontaken
ShutdownRadio
PAGE 313 9
4/30/2010
ThankYou!
training@ceragon.com
training@ceragon com
19
PAGE 314 10
LinkAggregation
(IEEE802.3ad)
Agenda
Agenda
Definition
Advantages
Feature Review
Applications
PAGE 315
Introduction to Link Aggregation
IEEE Definition:
Traffic
T ffi sentt tto th
the ports
t iin such
h a group iis di
distributed
t ib t d th
through
h
a load balancing function
Advantages
g
PAGE 316
Benefits of using Link Aggregation
The capacity of the multiple links is combined into one logical link.
100 Mbps
2. Improved Resiliency
In case of a failed link, remaining links take over utilization of new available BW
PAGE 317
Benefits of using Link Aggregation
When multiple ports are allocated between two ETH switches, broadcast storms are
created due to p
physical
y loops.
p STP is required
q to eliminate loops
p by
y blocking
g the redundant
port.
When multiple ports are allocated between 2 Routers, Routing Protocols are required to
control traffic paths.
With LA STP or routing protocols are not needed, therefore, less processing is involved.
4. Reduced Cost
PAGE 318
Benefits of using Link Aggregation
For sites with limited IP address space that nevertheless require large amounts of
bandwidth, you need only one IP address for a large aggregation of interfaces.
For sites that need to hide the existence of internal interfaces, the IP address of
the aggregation hides its interfaces from external applications.
Multiple
Interfaces
Single
Interface
Customer Public
Network Network
9 Proprietary and Confidential
FeatureReview
PAGE 319
LAG Distribution Policy
Traffic sent to ports in a group is distributed through a load balancing function.
Two methods are available for Link Aggregation Group traffic distribution:
1. Simple XOR:
In this method the 3 LSBs of DA and SA are XORed and the result is used to select
one of the ports in the group.
2. Hash (default):
In this method the hash function (used by the traffic switch for address table lookups)
is used to select one of the ports in the group.
PAGE 320
Static LAG guidelines
8. LAGs are virtual ports that do not permanently exist in the system
10. The LAG will initially receive default values for these parameters
PAGE 321
Grouping ports in LAG
Ports 1-2 (GBE ports) and ports 3-7 (FE only ports) cannot be in the same LAG
group even if the GBE ports are configured as 100Mbps.
GbE FE GbE FE
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
GbE FE GbE FE
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
PAGE 322
Applications
pp
1 2 3 4 5 6 7 8
Single Pipe
1 2 3 4 5 6 7 8
GbE
1 2 3 4 5 6 7 8 PHY
Multiple FE
ports as a LAG
GbE
PHY Port #2 and Radio
form a LAG
PAGE 323
1+0 LAG
1 2 3 4 5 6 7 8
Static LAG
3rd party
Switch or Router
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
3rd party
No need for LAG
Switch or Router
PAGE 324
1+1 HSB With LAG
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
Static LAG 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
3rd party
Switch or Router Static LAG
PAGE 325
1+1 HSB With dual GbE + LAG (cont.)
1+1 HSB or
2+0 Multi-Radio
Static LAG
Static LAG 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
3rd party
Switch or Router Static LAG
Any failure in the local GbE interfaces will be handled by the link aggregation
mechanism without triggering switch-over to the back-up IP-10 unit!
LoadBalanceExample
p
PAGE 326
Load balance example
1 2 3 4 5 6 7 8 50%
P
1 2 3 4 5 6 7 8
S
GbE 50%
PHY
Port #2 and Radio
form a LAG
Traffic injected via GbE port #1 is distributed evenly between Port #2 & Port #8
Port #2 is linked to a Pipe IDU, hence, a Multi-Radio system is achieved:
GbE port #1 = (50% via Radio #1) + (50% via Radio #2)
1 2 3 4 5 6 7 8
S
PAGE 327
Load balance example
Shut down
64QAM 256QAM
1 2 3 4 5 6 7 8
P
1 2 3 4 5 6 7 8
S
GbE X
50% 100%
PHY
100%
To improve system resiliency, Automatic State Propagation can shut down the
LAG interface when ACM degrades below a pre-determined profile.
ThankYou!
training@ceragon.com
PAGE 328
LinkAggregationGroupConfiguration
(IEEE802.3ad)
Agenda
Agenda
Guidelines Review
EMS Configuration
Using PM (RMON)
PAGE 329
Static LAG guidelines
8. LAGs are virtual ports that do not permanently exist in the system
10. The LAG will initially receive default values for these parameters
PAGE 330
Grouping ports in LAG
Ports 1-2 (GBE ports) and ports 3-7 (FE only ports) cannot be in the same LAG
group even if the GBE ports are configured as 100Mbps.
GbE FE GbE FE
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
GbE FE GbE FE
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
PAGE 331
Configuring LAG
The following settings must be identical on all LAG ports
(Port(s) with different settings will not be added to the LAG)
Please note - ports with CFM MEP/MIPs will not be added to a LAG (which may
have its own MEP/MIPs).
Admin status
Flow control
Ingress rate limiting Policer name
Shaper (egress rate limiting)
Peer port parameters
MAC address
IP address
Slot ID
Port number
Description
:
PAGE 332
Removing a Port from LAG
Ports removed from a LAG will keep the existing port parameters, but will
be initially disabled in order to prevent loops.
In addition, when the last port is removed from a LAG, the LAG will be
deleted.
EMSConfiguration
g
PAGE 333
Setting Load Balance Policy
Open page:
Configuration
g / Ethernet Switch
Creating LAG
1. Go to Configuration / Interfaces / Ethernet Ports
2. Click on Create LAG
PAGE 334
Selecting ports to LAG
Select the LAG ports and group ID
2 Click
2. Cli k on thi
this link
li k to
t modify
dif the
th LAG ((add/remove)
dd/ )
PAGE 335
Troubleshooting
1. When adding ports to LAG fails, the reasons might be:
2. QoS mismatch
3. VLAN membership mismatch
4. Physical properties mismatch (auto-neg, speed, flow control etc.)
5. Service OAM mismatch
Check the Ethernet Ports, QoS & Service OAM pages and compare these
parameters if problem continues
Example
1. We generate a data stream through GbE SFP port 1 of both lower IDUs
2. Port 2 & 8 form a LAG on both sites
3. Upper IDUs are set as Pipe
4
4. Traffic will be evenly distributed among the radio ports
5. Assign Radio license > Line rate
6. Clear all PM data
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Data stream
Data stream
Proprietary and Confidential
PAGE 336
Using RMON (PM) to analyze LAG
Make note of received &
transmitted traffic through port 1
Please note:
Slight differences may appear
since EMS is a web based
application and data is
accumulating
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
Data stream
Proprietary and Confidential
+
=
PAGE 337
Using RMON (PM) to analyze LAG
Disconnect the ETH cable
connecting lower IDU to
upper IDU (port 2)
ThankYou!
training@ceragon.com
PAGE 338
10/5/2010
IP-10G
XPIC: Introduction & Configuration
Avner Baruch
Guidelines
XPIC Script
Frequencies
SW version (IDU, ODU) If any of these conditions is not met, an
HW version (IDU, ODU) alarm will alert user. In addition, events will
Protection is disabled inform user of which conditions are not met.
PAGE 339 1
10/5/2010
Introduction
Introduction
Two data channels are transmitted & received over the same frequency on dual
polarization (H & V)
C
Crosstalk
t lk between
b t the
th polarizations
l i ti d
due tto iimperfect
f t antenna
t iisolation
l ti and
d
channel degradation can be effectively cancelled at the receiver using -
PAGE 340 2
10/5/2010
H
S M M S
S M V M S
Transmitter Receiver
Mate IDU v
Slave Slave
Slave Slave
backplane
Main IDU
PAGE 341 3
10/5/2010
Transmitter Receiver
backplane
Mate IDU v
Slave Slave
Slave Slave
backplane
Main IDU
At the end of the process, if the problem still exists, the problematic link will
be permanently muted unless the user manually un-mutes it
PAGE 342 4
10/5/2010
Please Note:
Every recovery attempt will cause a brief traffic hit in the working link
2+0 2U Setup
2 IDUs are installed in each node using an enclosure shelf
We assume slot 1 is using Vertical polarization and slot 2 Horizontal polarization
V+h
Each node includes
2 x RFU-C h/v
Coupler
Dual pole antenna
H+v
H H
v v
PAGE 343 5
10/5/2010
6+0 2U Setup
6 IDUs are installed in each node using enclosure shelves
Possible configurations:
Sl
Slott 1 + slot
l t2
slot 3 + slot 4
slot 5 + slot 6
EMS Configuration
PAGE 344 6
10/5/2010
Logging in
Extension
Main
Versions
Check that your IDUs and ODUs are installed with the required version
(6.6.1 or higher)
PAGE 345 7
10/5/2010
XPIC Script
Apply the required script to both IDUs (Main & Ext.) on both ends:
XPIC Script - 2
When IDUs complete the reset process, verify XPIC script is successfully
assigned.
PAGE 346 8
10/5/2010
XPIC Configured
Radio Parameters
1. Verify that no alarms exist in the system.
2. Clear the defected blocks counter and verify that there are no errors in the
system.
3. Read the MSE and XPI and verifyy that theyy fit the link design
g ((if no values
are defined, verify that they are below -34dB and above 25dB, respectively).
PAGE 347 9
10/5/2010
Configure Radio Parameters and verify both links (H+V) are operational
Troubleshooting
PAGE 348 10
10/5/2010
Link Commissioning
In the following steps, we shall measure the antenna XPD to determine the
XPD of each antenna
1. Mute H transmitters on both ends: H link is irrelevant now
2. Measure RSL on H receivers: we measure the v interference now
3. Measure RSL on V receivers calculate the difference between V and H
TX = OFF TX = OFF
RSL = -70dBm
70dBm
In this example, the XPD is
not good enough:
The difference is only 20dB
PAGE 349 11
10/5/2010
TX = OFF TX = OFF
78dBm
RSL = -78dBm
In this example, the XPD is
much better:
During the XPIC mechanism, events are displayed in the EMS Event log to
allow detailed description and effective troubleshooting
Bitmask Codes -
PAGE 350 12
10/5/2010
PAGE 351 13
10/5/2010
Thank You!
Should you require further information, please contact us at
training@ceragon.com
PAGE 352 14
8/12/2010
FibeAir IP10G
HSB / 1+1 Protection
Agenda
GeneralGuidelines
Protection Panel
ProtectionPanel
IntroductiontoExternalProtection
IntroductiontoShelfProtection
FloatingIP
EMSGUIConfiguration
ExternalProtectionProcess:1+1fromscratch
ExternalProtectionProcess:Upgrading1+0to1+1
Troubleshooting
PAGE 353 1
8/12/2010
General Guidelines
2. When a switchover occurs, the Active IDU becomes Standby and the
Standby
Standby IDU becomes Active
Active
3. Accessing a Mate IDU can only be done via the Active IDU
6. ETH Cross Cable (Protection Cable) is used to connect the protection ports
of both IDUs:
Protection Panel
high low
Active Active
Coupler Coupler
Mate Mate
high low
PAGE 354 2
8/12/2010
External Protection
high low
Coupler Coupler
high low
Shelf Protection
When enabling a Shelf Protection, the following rules should be applied:
6 Mate
5 Active Standalone
4 Mate
4Mate
Example:
Standalone
3 Active
2Mate
Standalone
1Active
PAGE 355 3
8/12/2010
Floating IP
The Floating IP address feature is meant to provide a single IP address that will
always give direct access to the current active main unit.
1. The Floating IP and Unique IDU IPs must be in the same subnet
2
2. The Floating IP and Unique IDU IPs are user
user-configurable
configurable
3. The Floating IP is copied from Active to Mate (following Copy to Mate command)
4. When Protection is applied, the Floating IP is assigned to the STBY IDU which
becomes the Active
5. The extension IPs are irrelevant (unseen by network)
6. OSS & NMS can access all IDUs (Main and Extension) via SNMP
7. Alternatively, users may access any of the units using their local IP addresses
IDU
IDU
192.168.1.75
192.168.1.72
IDU
192.168.1.71
192.168.1.100
PAGE 356 4
8/12/2010
EMS GUI
EMS GUI
1. Configure unique IPs to slot 1 and slot 2 (when not in installed in shelf)
2. You may use a floating IP
3. Make sure all IPs are in the same subnet
PAGE 357 5
8/12/2010
EMS GUI
EMS GUI
Protection
modestatus
When2nd IDUis
properly
configuredand
connected,IP
andMACare
displayedhere
PAGE 358 6
8/12/2010
EMS GUI
Clickheretocheck
communication
withSTBYunit
EMS GUI
Toforceaswitchover
regardlessto2nd IDU AdminStateLock
qualifyingstatus
changetoONandclick
Apply
PAGE 359 7
8/12/2010
EMS GUI
Torequestaswitchover
clickhere.
If2nd IDU(Mate)does
notqualifytoActive
state,requestisignored.
EMS GUI
Clickheretocopytheconfigurationfrom
ActivetoMate
Pleasenote
Thefollowingparametersarenot copied:
MNGmode(InBand/OOB)
InBandVLAN
Switchmode
license
PAGE 360 8
8/12/2010
2 When
2. Wh IDU
IDUs complete
l t th
the b
booting
ti sequence, verify:
if
Note:
The IDU, which is connected to the ODU fed by the
lower attenuation channel of the RF coupler, is the
IDU that should be selected as "Active.
18 Proprietary and Confidential
PAGE 361 9
8/12/2010
ODU ODU
5. Lock Protection on both IDUs (to avoid unnecessary switchover when 2nd IDU
is enabled)
ODU ODU
ODU ODU
ODU ODU
ODU ODU
ODU ODU
PC
ODU ODU
PAGE 362 10
8/12/2010
15. In Active IDU: click Copy to Mate and verify Mate is restarting
PAGE 363 11
8/12/2010
1. Assuming 1st link operates well, configure the 2nd IDUs to match
Active IDUs:
Active Link:
ODU ODU
3 Lock
3. L kPProtection
t ti on b
both
th A
Active
ti IDU
IDUs (to avoid unnecessary switchover
when 2nd IDU is enabled)
4. Install 2nd IDU in each site (verify TX is muted before physical installation)
ODU ODU
ODU ODU
PAGE 364 12
8/12/2010
ODU ODU
ODU ODU
13. In Active IDU: click Copy to Mate and verify Mate is restarting
PAGE 365 13
8/12/2010
Troubleshooting Protection
Common issues followed by CLI commands
Troubleshooting
Alarm / Error Probable Cause / Workaround
C commands to verify
Use CLI f this IDU is in S
STBY mode, iff
Main IDU does not respond to PING
so, use CLI to recover IDU
PAGE 366 14
8/12/2010
General commands:
IP-10:/> cd platform/mate-idu
PAGE 367 15
8/12/2010
IP-10:/platform/mate-idu> manual-switch-cmd
IP-10:/platform/mate-idu> copy-to-mate-cmd
Post-Configuration Changes
PAGE 368 16
8/12/2010
ThankYou!
training@ceragon.com
training@ceragon com
33
PAGE 369 17
CFM (OAM IEEE 802.1ag)
Connectivity Fault Management
Perquisites
CFM: Why?
Preliminary configuration
Setup Review
Configuration Flow
Configuration Review
Manual PING
Manual Linktrace
Automatic Linktrace
CFM: WHY ?
By definition, L3 IP or L2 ETH are Connection-less networks
IN ? IN
Connection-Less Connection-Oriented
4 Proprietary and Confidential
Such technologies are too expensive and sometimes not feasible for Mobile
Operators / Mobile Backhaul solutions
Connection-Oriented
5 Proprietary and Confidential
Preliminary Configuration
1. Make sure you define the required VLAN IDs in the Switch DB prior to OAM
configuration
4. Make sure IP-10 Interfaces are configured according to your Network Criteria
(Trunk / Port VID Membership ).
5. Every CFM interface (including Radio) must be aware of the required VIDs
(Port membership)
6. CFM requires physical connection, therefore make sure your interfaces are
enabled on both sides (DCE and DTE)
Domain 1 Services:
D1S1:
MEP 1 to MEP 2, Level 3, VLAN 1000
1
D1S2:
MEP 3 to MEP 4, Level 3, VLAN 2000
3
4
Domain 2 Services:
D2S2: 5
MEP 5 to MEP 6, Level 2, VLAN 1000 6
MEP
MIP
7 Proprietary and Confidential
3 Assign MIPs
Creating MAIDs
Click on the Add button to add domains
(use the setup diagram as a reference)
1. Domain Name
2. Level (1 to 7)
3. Association Name
4. VLAN ID
Domains defined
You should see the following status on your MAID list page (on both IDUs):
If you point your cursor to the No MEPs indication LED, you will be notified that MEPs
need to created as well
Defining MEPs
Port #3
MEP ID: 1
Port #3
MEP ID: 2
As you can see, CCM enables auto-learning, hence both MEPs discover each other
(MAC and remote MEP ID are now known)
New alarms indicate that process of creating the remote MEP is not fully complete
Port #3
Local MEP ID: 1
Remote MEP: 2
Port #3
Local MEP ID: 2
Remote MEP: 1
MEP1
MEP 3
MEP 4
MEP 2
MEP 3 to MEP 4
Level 3
VLAN 2000
MEP 3
MEP 4
MEP 3
MEP 4
MEP 3
MEP 4
MEP 3
MEP 4
D2S2
5
6
Local MEP 5
Remote MEP 6
Local MEP 6
Remote MEP 5
Please make a note of the Radio MAC address of each IDU we shall need it later
00:0A:25:56:27:AC 00:0A:25:56:27:C6
00:0A:25:56:27:C2
Manual Linktrace
To trace an interface , you will need to set the following parameters:
Automatic Linktrace
To enable Auto Linktrace select the checkbox next to the target Remote MEP
and then click ADD SELECTED
Thank You !
training.ceragon.com
44
Agenda
PAGE 392 1
3/7/2010
RFU RF Loopback
RFU RF LB
RFU RF Loopback
Use it to verify communication from Line to ODU is OK (including ODU)
PAGE 393 2
3/7/2010
IF Loopback
IDU IF LB
IF Loopback
Use it to verify communication from Line to IF cable is OK
PAGE 394 3
3/7/2010
PAGE 395 4
3/7/2010
Tester
PAGE 396 5
3/7/2010
PAGE 397 6
3/7/2010
Before you leave the site, make sure that these registers are elapsed (zero)\
In such case, perform the Loopbacks we have just covered to narrow down the
probable causes for the errors
PAGE 398 7
3/7/2010
Thank You !
training@ceragon.com
15
PAGE 399 8
3/7/2010
Agenda
1. Configuration File
2. Unit Information File
3. FTP Server
PAGE 400 1
3/7/2010
Configuration File
The Configuration file stores the following parameters:
License
External Alarms
SNMP Trap Destination
NTP Server Properties
Radio properties: Frequency, RSL, TSL, ATPC, etc.
Switch Mode and database: Port types, VLAN membership, etc.
Interface Configuration: PDH, TDM, Ethernet Switch
Trail Configurations
Service OAM
Security: user accounts, login properties, etc.
PAGE 401 2
3/7/2010
Uploading or Downloading the CFG & Unit files requires an FTP Server
You may assign a remote server to host the configuration and unit files
PAGE 402 3
3/7/2010
Examples for
SW packages
Examples for
CFG & Unit
Files
2
8 Proprietary and Confidential
PAGE 403 4
3/7/2010
Upload /
Download using
standalone IP-10G
9 Proprietary and Confidential
PAGE 404 5
3/7/2010
Next step:
Click Upload Archive to allow
the IP-10G transferring the
zipped file to your server
PAGE 405 6
3/7/2010
(Configuration Files)
PAGE 406 7
3/7/2010
1 2
PAGE 407 8
3/7/2010
Please note if the file does not exist in the root directory action will fail !
1 2
17 Proprietary and Confidential
Upload /
Download in
a shelf
18 Proprietary and Confidential
PAGE 408 9
3/7/2010
2. After creating the CFG files, you need to upload them to your
FTP directory
PAGE 409 10
3/7/2010
To download a file to a
certain slot, select the
unit number and click
this button
PAGE 410 11
3/7/2010
PAGE 411 12
3/7/2010
PAGE 412 13
3/7/2010
Thank You !
training@ceragon.com
27
PAGE 413 14
4/21/2010
Agenda
FTP Properties
Standalone SW Download
Standalone SW Upgrade
PAGE 414 1
4/21/2010
Configure the FTP properties to point to your local server root directory
If you do not have an FTP Server installed locally on your PC, you may
configure an IP address of a remote server.
PAGE 415 2
4/21/2010
Examples for
SW packages
PAGE 416 3
4/21/2010
SW Upgrade on a
standalone IP-10G
PAGE 417 4
4/21/2010
Standalone SW Download
Click on the Download button and wait till Succeeded message is
displayed (next slide)
Standalone SW Download
Download was successfully completed, you may proceed to upgrade
the IDU
PAGE 418 5
4/21/2010
Standalone Upgrade
Click on the Upgrade button. When upgrades completes successfully,
the IDU will restart automatically.
PAGE 419 6
4/21/2010
SW Upgrade in a
shelf (Node)
Shelf Configuration
1. Make sure your main unit (Slot 1) is upgraded with the latest version
2. If not, it is recommended to upgrade the main unit as a standalone IDU
3. Verify you are familiar with the slot number(s)
Slot 6
Slot 5
Slot 4
Slot 3
Slot 2
Slot 1
PAGE 420 7
4/21/2010
Shelf SW Download
Shelf SW Upgrade
Select the target slot and then click the
Upgrade button
Please note
PAGE 421 8
4/21/2010
Shelf SW Upgrade
Select the target slot and then click the
Upgrade button
Please note
Rollback
VS. Downgrade
PAGE 422 9
4/21/2010
Rollback
1 2
Upgrade #1 Upgrade #2
Rollback 4 3
Downgrade
Thank You !
training@ceragon.com
20
PAGE 423 10
3/7/2010
Agenda
SSH
HTTPS
SFTP
Password
PAGE 424 1
3/7/2010
Security Configuration
Update first FTP connection
PAGE 425 2
3/7/2010
HTTPS
In order to manage the system using HTTPS protocol, user should
follow the following steps:
PAGE 426 3
3/7/2010
The status of the download operation can be monitored. The returned status
values are: ready, in-progress, success, failed.
To apply the new certificate, the WEB server should be restarted (Admin
privilege). WEB server will be automatically restarted when it is configured to
HTTPS.
PAGE 427 4
3/7/2010
HTTPS - Activation
Note:
This parameter is NOT copied when copy to mate operation is initiated,
for security reasons (unsecured unit should not be able to override security
parameters of secured unit).
Configuration upload/download,
Upload the unit info.
Upload public key.
Download certificate files.
SW download
PAGE 428 5
3/7/2010
USERS,
GROUPS
&
PASSWORD
Proprietary and Confidential
Adding Users
PAGE 429 6
3/7/2010
Adding Users
Adding Users
PAGE 430 7
3/7/2010
Changing Password
A valid password should be a mix of upper and lower case letters, digits, and other
characters.
You can use an 8 character long password with characters from at least 3 of these 4
classes. An upper case letter that begins the password and a digit that ends it do not
count towards the number of character classes used.
Changing Password
Good example:
L00pBack using capital letters, small letters and digits (zeros instead of O)
Bad example:
Loopback missing digits or other characters
PAGE 431 8
3/7/2010
Thank You !
training@ceragon.com
17
PAGE 432 9
Annexes
PAGE 433
FibeAir IP-10
License
Management
Guide
PAGE 434
Notice
This document contains information that is proprietary to Ceragon Networks Ltd.
No part of this publication may be reproduced, modified, or distributed without prior written
authorization of Ceragon Networks Ltd.
This document is provided as is, without warranty of any kind.
Registered TradeMarks
Ceragon Networks is a registered trademark of Ceragon Networks Ltd.
FibeAir is a registered trademark of Ceragon Networks Ltd.
CeraView is a registered trademark of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
TradeMarks
CeraMapTM, PolyViewTM, EncryptAirTM, ConfigAirTM, CeraMonTM, EtherAirTM, and MicroWave
FiberTM, are trademarks of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
Statement of Conditions
The information contained in this document is subject to change without notice.
Ceragon Networks Ltd. shall not be liable for errors contained herein or for incidental or
consequential damage in connection with the furnishing, performance, or use of this
document or equipment supplied with it.
Information to User
Any changes or modifications of equipment not expressly approved by the manufacturer
could void the users authority to operate the equipment and the warranty for such equipment.
Copyright 2008 by Ceragon Networks Ltd. All rights reserved.
PAGE 435
Contents
General .......................................................................................................... 1
Settings ............................................................................................................... 23
PAGE 436
General
This guide explains how to work with the FibeAir IP-10 web based License Management System.
The system enables authorised users to obtain license-related information and perform license-related
operations.
Getting Started
To start the management application:
2. To log in to the system, enter your user name and password, and then click Login.
Note the following user name rules:
3a. If you enter as an OEM user, the following web page appears:
3b. If you enter as a non-OEM user the following web page appears:
Note that a channel or OEM user can also enter as one of their customers. In this case, the system
identifies the user as a channel/OEM user and will display a drop-down list to enable entry under the
user's name. This will be done to allow operations for devices that the user sent to his/her customers.
When you select an item within a group, the relevant web page will open with the details concerning that
item.
At the top of the web page for the item, a line appears with buttons that you can click to perform a particular
operation.
From within an item web page, you do not have to return to the main web page. Instead, use the tabs at the
top (Devices, Licenses, etc.) to obtain a list of items for the particluar group.
Note that in any web page, you can click Print to send the contents of the page to the printer.
Device List
The list includes all the devices you purchased from Ceragon.
In this page, you can assign the current ID to an end user, using the drop-down list in the Assign to
Customer field.
In the main device list web page, you can click Search to locate a particular device that is
registered in the system.
Select the criteria (filters) you want for the search, and then click Search.
To clear the criteria you selected, click Clear.
In the toolbar, click Import to import a list of devices from an external source.
You will be prompted to locate the file with the device list. Once you locate and select the file, click Import.
The device list file must be a text file with the following columns:
Region /
Device ID Customer Country Link Side
Network
To delete a device, select the device in the list, and click Delete .
The list will be saved in an Excel file with the extension csv (Comma Separated Values).
Generating Keys
To generate license keys for one or more devices, select the devices in the main list by marking the
checkboxes beside them, and click Generate Keys .
In this web page, only the devices you selected will appear.
Capacity Upgrade
License Name in License
Value Description
Type Management Site
3 0 IP10-CAP-010 Feature disabled
3 1 IP10-CAP-025 Radio Cap. Upgrade 10->25 Mbps
3 2 IP10-CAP-050 Radio Cap. Upgrade 10->50 Mbps
3 3 IP10-CAP-100 Radio Cap. Upgrade 10->100 Mbps
3 4 IP10-CAP-150 Radio Cap. Upgrade 10->150 Mbps
3 5 IP10-CAP-200 Radio Cap Upgrade 10->200 Mbps
3 6 IP10-CAP-300 Radio Cap Upgrade 10->300 Mbps
3 7 IP10-CAP-400 Radio Cap Upgrade 10->400 Mbps
3 8 IP10-UPG-025-050 Radio Cap. Upgrade 25->50 Mbps
3 9 IP10-UPG-025-100 Radio Cap. Upgrade 25->100 Mbps
3 10 IP10-UPG-025-150 Radio Cap. Upgrade 25->150 Mbps
3 11 IP10-UPG-025-200 Radio Cap. Upgrade 25->200 Mbps
3 12 IP10-UPG-025-300 Radio Cap Upgrade 25->300 Mbps
3 13 IP10-UPG-025-400 Radio Cap Upgrade 25->400 Mbps
3 14 IP10-UPG-050-100 Radio Cap. Upgrade 50->100 Mbps
3 15 IP10-UPG-050-150 Radio Cap. Upgrade 50->150 Mbps
3 16 IP10-UPG-050-200 Radio Cap. Upgrade 50->200 Mbps
3 17 IP10-UPG-050-300 Radio Cap Upgrade 50->300 Mbps
3 18 IP10-UPG-050-400 Radio Cap Upgrade 50->400 Mbps
3 19 IP10-UPG-100-150 Radio Cap. Upgrade 100->150 Mbps
3 20 IP10-UPG-100-200 Radio Cap. Upgrade 100->200 Mbps
3 21 IP10-UPG-100-300 Radio Cap Upgrade 100->300 Mbps
3 22 IP10-UPG-100-400 Radio Cap Upgrade 100->400 Mbps
3 23 IP10-UPG-150-200 Radio Cap. Upgrade 150->200 Mbps
3 24 IP10-UPG-150-300 Radio Cap Upgrade 150->300 Mbps
3 25 IP10-UPG-150-400 Radio Cap Upgrade 150->400 Mbps
3 26 IP10-UPG-200-300 Radio Cap Upgrade 200->300 Mbps
3 27 IP10-UPG-200-400 Radio Cap Upgrade 200->400 Mbps
3 28 IP10-UPG-300-400 Radio Cap Upgrade 300->400 Mbps
To add a license for which you want to generate a key, select the license in the All Relevant Licenses area
and click Add to add it to the Selected Licenses area.
Important! You can only select one license from each category (ACM, Networking, Capacity Upgrade). If
you select a capacity upgrade license and want to add a different capacity upgrade license, you must first
remove the first capacity upgrade license and then add the other one.
Once you select the licenses you want, click Generate Keys.
After you confirm your selection, the following example web page appears.
For OEM users, you can assign devices to other users by selecting Assign Devices to a Customer in the
main web page Devices group. Or, you can click Assign to Customer at the top of the
page.
In the Select Customer field, use the drop-down list to choose the customer you want to assign the devices
to.
Click Show Available Devices for a list of devices you can choose from.
In the available list of devices, click Filter & Sort to customize the device list, as shown in the following
example page.
After you click Go to generate the list, in the Available Devices list, select the devices you want to assign to
the user, and click Add to add them to the Assigned Devices list.
The device list page will appear with the updated information.
The web page displays all the licenses you currently own.
To search for a particular license, click Search, specify the criteria you want, and click Search again.
Click the number in the Qty Assigned column for a list of licenses assigned to customers.
To add a license for which you want to generate a key, select the license in the All Available Licenses area
and click Add to add it to the Selected Licenses area.
Click Show Relevant Devices for a list of devices associated with the licenses you chose.
Once you select the devices you want, click Generate Keys.
The keys will be generated, as shown in the following example page, and the database will be updated.
For OEM users, you can assign licences to other users by selecting Assign Licenses to a Customer. Or, you
can click the Assign to Customer button at the top of the page.
In the Select Customer field, use the drop-down list to choose the customer you want to assign the licenses
to.
Click Show Available Licenses for a list of licenses you can choose from.
For License Code, click the drop-down list and choose the license specifications.
For Quantity to Assign, enter the amount of licenses you want to assign to that customer. The maximum
quantity is limited to the available quantity for the license you choose.
After you complete the filter options, click Add to add the licenses to the Assigned Licenses list. You can
repeat this procedure more than once to add other license types.
For Quantity to Return, enter the amount of unused licenses you would like to return (if relevant).
A page will appear informing you that the operation was successful, and the main license list will be updated
with the information.
Managing Users
Select the Manage Users item to define users and modify their properties. You can also access this item by
clicking the Settings tab at the top of the page (if it appears).
To delete one or more users, in the user list, mark the checkboxes beside the users you want to delete, and
click Delete . Confirm your choice(s) in the page that appears and the users will be deleted.
In the main Settings page, select the My Profile item to modify your personal information.
The same page appears as that for a new user. Modify the information as desired and click Save.
To generate a report, select Orders Report or Devices & Activations Report in the main web page, or click
the Reports tab at the top of the page (if it appears).
For Order No., you can select All or Between. If you select Between, specify the range of order numbers
you want to include in the report.
For Order Date, you can select All or Between. If you select Between, you will need to specify the range of
dates you want to include in the report.
In the Include field, you can select All for all types of orders, Closed orders only, or Open orders only.
When you are done selecting the report criteria, click Create Report.
For Devices, you can select All or Between. If you select Between, specify the range of device IDs you want
to include in the report.
For Activation Date, you can select All or Between. If you select Between, specify the range of activation
dates you want to include in the report.
When you are done selecting the report criteria, click Create Report.
User Guide
August 2010
PAGE 463
Notice
This document contains information that is proprietary to Ceragon Networks Ltd.
No part of this publication may be reproduced, modified, or distributed without prior written authorization of
Ceragon Networks Ltd.
Registered TradeMarks
Ceragon Networks is a registered trademark of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
TradeMarks
CeraMapTM, PolyViewTM, EncryptAirTM, ConfigAirTM, CeraMonTM, EtherAirTM, and MicroWave FiberTM, are
trademarks of Ceragon Networks Ltd.
Other names mentioned in this publication are owned by their respective holders.
Statement of Conditions
The information contained in this document is subject to change without notice.
Ceragon Networks Ltd. shall not be liable for errors contained herein or for incidental or consequential
damage in connection with the furnishing, performance, or use of this document or equipment supplied
with it.
Information to User
Any changes or modifications of equipment not expressly approved by the manufacturer could void the
users authority to operate the equipment and the warranty for such equipment.
General ............................................................................................................................................. 5
The CLI is used to perform IP-10 configuration and obtain system statistical and performance information.
Using the CLI, you can perform configuration operations for single IP-10 units, as well as configure several
IP-10 units in a single batch command.
Access Rights
IP-10 CLI access is granted for the following user groups:
Viewer This user only has read-only access. The user can only view parameters and their values, not
modify them.
Operator This user has read-write access. The user can read parameters and their values, and modify
them. However, this user cannot add or remove other users.
Admin This user has read-write access. The user can read parameters and their values, modify them,
and add/remove other users.
Technician This user has read-write access to the OS CLI.
User access is controlled by the system Administrator and configured via the Management command group
(shown in the Command Groups section).
Getting Help
Once you are logged in, you can go to a main command group and its sub groups, type the command you
want, and press Tab twice for a list of possible parameter values.
In addition, you can type a command and then type a question mark (?) for location-specific information for
the command. For example, for the set command, typing set ? and pressing Enter will display a list of
optional parameters and a help line.
Wherever you are in the command tree, you can obtain a list of available commands by typing Help or ?.
The commands that are available are different for each location in the CLI tree and the type of user.
ls list entities
get get parameter
set set parameter
help help
cd change directory
exit exit CLI
logout logout from CLI
cli-ver cli version
cls clear screen
write write the current switch configuration to the configuration file
show-tree show entity tree
find search for a string in the parameter name and information fields
lsp list entity parameters and commands
In addition, you can use the up/down arrow keys, or the q key, when the word END appears at the end of
the screen.
Setting IP Addresses
To define a new IP address, do the following:
1. Log in as follows:
User: Admin or Operator
Password: Admin
Command Example
The following example shows how you can find a command within a sub-group, and then execute the
command. The example starts with the lsp (list parameters) command, and ends with the activation of an
interface loopback test.
-----------------------------------------------
IP-10:/> cd diagnostics/loopback/radio-loopback/
IP-10:/diagnostics/loopback/radio-loopback> lsp
*********** configuration ********
timeout rw Loopback timeout in minutes
*********** statuses *************
counter ro Loopback time left
if-loopback rw IF loopback activation
rfu-rf-loopback rw RFU RF Loopback Enable Command
-----------------------------------------------
Important!
Note that bridge related commands need to be followed by a write command to be saved.
Otherwise, the commands will not be saved following a reset in the system.
Management
Platform
Radio
Interfaces
Diagnostics
Some groups include sub groups that enable setup operations relevant to that category.
Management
Management
Radio
Diagnostics
Note that when you enter a group or sub group, you can type a command and then press the Tab key twice
(or type a question mark) for a list of values relevant to that command.
account
users show-users Show information about admin
exist users account
users change-password Change user's password. rw
syntax:
change-password
(without parameters)
floating-ip-address set-fip-lock-timer Set Floating IP lock timer operator
mng-protocols status-show Show Management operator
Protocols status
mng-protocols web-restart restart the web server admin
Snmp status-show Show SNMP status operator
snmp change-user-settings Change the settings of the admin
SNMPv3 user (security
level / username /
password)
idc-board reset-idc-hw Reset the IDC - cold operator
(HW) reset
idc-board create-archive Create archive file on operator
target
idc-board install-archive Install the requested admin
archive file on target
idc-board upload-archive Upload the archive file to operator
the PC
(host). Before activating
this command, make sure
to set host-ip, host-path,
user-name and user-
password
idc-board download-archive Get the archive file from operator
the PC (host) onto the
target. Before activating
this command, make sure
to set host-ip, host-path,
user-name and user-
password
eth-port Throughput rw
throughput-threshold Operator
threshold [Mbps]
eth-port type Port's type Operator rw
eth-port Utilization threshold rw
utilization-threshold Operator
[%]
eth-port vlan Default VLAN ID Operator rw
eth-port designated-path-cost Designated path cost VIEWER RO
eth-port The number of VIEWER
frames dropped in
the transmit MAC
because the frame
excess-collision-drop experienced 16 RO
consecutive
collisions. This
counter is applicable
in half-duplex only.
eth-port Management port VIEWER
management-auto-negotiation RO
auto negotiation
eth-port Management port VIEWER
management-capacity RO
capacity
eth-port Management port VIEWER
management-duplex RO
duplex
eth-port Management port VIEWER
management-ethernet-rate RO
Ethernet rate (Mbps)
eth-port management-only Management only VIEWER RO
eth-port management-port-admin Port's admin VIEWER RO
eth-port Management VLAN VIEWER
management-vlan RO
id
eth-port 15 Minute PM VIEWER
pm-15 RO
minutes monitoring
eth-port 24 Hour PM hours VIEWER
pm-24 RO
monitoring
configuration
stm1 signal-degrade-threshold STM-1 signal OPERATOR rw
degrade threshold
configuration
stm1 loopback-timeout Loopback timeout in OPERATOR rw
minutes (0 for
unlimited)
stm1 node-to-node-connection The indication OPERATOR rw
whether the STM-1
interface connects
IP-10 nodes in a
network
stm1 peer-ip-address IP address of the OPERATOR rw
remote STM1
element
stm1 peer-port-number Remote STM-1 port OPERATOR rw
number
stm1 peer-slot-id Slot ID of the remote OPERATOR rw
STM1 port
stm1 ais-vc-signaling-admin Enabling or disabling OPERATOR rw
the signaling of AIS
upon receiving such
from
stm1 line-loopback Type of loopback in OPERATOR rw
the STM-1 interface
CLI (Command Line Interface) is used to perform IP-10 configuration and obtain system statistical and
performance information.
Using the CLI, you can perform configuration operations for stand-alone IP-10 units or units connected in a
stacked configuration, as well as configure several IP-10 units in a single batch command.
In a stacked configuration, all commands are available both in the main and extension units unless otherwise
stated.
Basic Commands
The following basic commands are available when you first log in, if you belong to the Operator
user group:
ls List entities
get Get parameter
set Set parameter
help Help
cd Change directory
exit Exit CLI
logout Logout from CLI
cli-ver CLI version
cls Clear screen
shell Enter secondary shell
write Write the current switch configuration to the configuration file
show-tree Show entity tree
find Search for a string in the parameter's entity name and information fields
lsp List entity parameters and commands
echo echoing free text to the console
In order to get help on a specific command, add a question mark or the parameter --help after
the command.
In addition, you can use the up and down arrow keys, or the q key, when the word END
appears at the end of the screen.
Setting IP Addresses
To define a new IP address, do the following at the main unit:
1. Log in as follows:
3. Type: get ip-address, and press Enter. This will give you the current IP address.
4. Type: set ip-address <ip> (the new IP address), and press Enter.
Adding Users
To define a new user, do the following:
1. Log in.
3. Type: add-user <name> <group> <password aging days> <expiration date>, and press
Enter.
1. Log in.
The prompt will change according to the relevant slot ID. For example, the prompt for a unit
located in slot 3 will show:
IP-10-SLOT-3:/>
1. Log in.
Adding Users
To define a new user, do the following:
1. Log in.
Performing Resets
In Stacked Configuration
In order to reset a specific unit in the shelf, do the following at the main unit:
1. Log in.
Arguments description:
In order to reset all extension units (but not the main unit), do the following at the main unit:
1. Log in.
In order to reset all units (including the main unit), do the following at the main unit:
1. Log in.
1. Log in.
1. Log in.
Arguments description:
Operational/reserved: reserved trails are introduced in the database and the bandwidth
wont be used for TDM traffic (it may be used for ethernet traffic) but traffic does not flow.
For operational trails bandwidth is fully allocated and traffic flows
Interface slot: slot number of the IDU containing the interface (from 1 to 6)
o For radio, the maximum number depends on the radio script being used
1. Log in.
4. To show a specific trail by its ID type: show-trail-by-id <trail ID>, and press Enter.
5. To show a specific trail by its source interface type: show-trail-by-src <interface 1 slot #>
<interface 1 type> <interface 1 number>, and press Enter.
The trails will be shown in a table as follows (this is an example of a trail from E1#1 in slot 2 to
radio VC#1 in slot 3:
================================================================
================================================================
Source Dest1 Dest2 Dest3 Dest4 Dest5 Dest6 Dest7 Dest8 Dest9
------------------------------------------------------------------------------
------------------------------------------------------------------------------
Deleting Trails
There are several ways to delete trails:
1. Log in.
4. To delete a specific trail by its ID type: del-trail-by-id <trail ID>, and press Enter.
4. To delete a specific trail by its source interface type: del-trail-by-src <interface 1 slot #>
<interface 1 type> <interface 1 number>, and press Enter.
Activating/Deactivating Trails
Trails mode can be toggled between active and reserved, as follows:
1. Log in.
4. To activate/reserve a specific trail by its ID type: act-trail-by-id <trail ID>, and press Enter.
1. Log in.
Arguments description:
Operational/reserved: reserved trails are introduced in the database and the bandwidth
wont be used for TDM traffic (it may be used for ethernet traffic) but traffic does not flow.
For operational trails bandwidth is fully allocated and traffic flows
Interface slot: slot number of the IDU containing the interface (from 1 to 6)
o For radio, the maximum number depends on the radio script being used
1. Log in.
3. To force all trails to one of their paths type: protected-trail-force-active <Id> <path>, and
press Enter.
4. To force a specific trail by its ID type to one of its paths type: protected-trail-force-active-by-
id <Id> <path>, and press Enter.
<Id> - trail ID
1. Log in.
4. To show a specific trails PMs by its ID type: show-trail-pms-by-id <trail ID> <15 min
interval> <24h interval>, and press Enter.
<15min/24h interval> is the interval number to be shown, where 0 is the current interval, 1 is
the previous one and so on. If no interval is selected, the current one will be shown.
1. Log in.
Single Pipe - Ethernet switching is disabled, whereby only a single Ethernet interface is used for
traffic and the unit operates as a point-to-point microwave Ethernet radio.
1. Log in.
3. Type: set ethernet-application <Ethernet application type> (Single pipe, Managed switch,
or Metro switch), and press Enter.
Management Ports
2. Type set type < in-band or out-of-band >, and press Enter.
Port Configuration
2. Type set ethernet-rate <Rate> (10, 100 or 1000 Mbps), and press Enter.
2. Type set duplex < full-duplex / half-duplex > ,and press Enter.
3. Type set-allowed-vlans <add, except, remove> <VLAN no.>, and press Enter.
2. Type vlan <VLAN no.> <add, remove, enable, disable>, and press Enter.
2. Type vlan <VLAN no.> name <VLAN name>, and press Enter.
QoS Configuration
Ingress Classifier
Egress Scheduler
Egress Shaper
Policer
2. Type: qos-policer-class <add, remove> <policer class name> <policer name> <matching
type: all, arp, first-queue, second-queue, third-queue, fourth-queue, broadcast,
multicast, non-tcp-udp, tcp-control, tcp-data, udp, unicast, unknown-unicast, unknown-
multicast> <rate> <CBS> <exceed action: drop>, and press Enter.
QoS Tables
Wayside Channel
User Channel
To set Automatic state Propagation (also called GBE-mute-override) in Single Pipe application:
1. Type: set eth-shutdown-threshold-profile < profile-0 to profile-7 >, and press Enter.
2. At the new prompt, type set ethernet-application metro-switch, and press Enter.
2. At the new prompt, type set type customer-network (or provider-network), and press Enter.
2. At the new prompt, type set vlan <VLAN ID>, and press Enter.
2. At the new prompt, type set provider-port-ethertype <0x88a8, 0x8100, 0x9100, 0x9200>,
and press Enter.
2. At the new prompt, type change-script-cmd < Script's name> < Operational mode>
<Maximum profile> disable-adaptive-power, then press Enter.
Script Name
10Mbps-6.5MHz-4QAM-Grade-1
155Mbps-26MHz-128QAM-Grade-1
181Mbps-26MHz-256QAM-Grade-1
20Mbps-6.5MHz-16QAM-Grade-1
39Mbps-26MHz-4QAM-Grade-1
39Mbps-6.5MHz-256QAM-Grade-1
47Mbps-9MHz-64QAM-Grade-1
ACM_181Mbps-26MHz-256QAM-Grade-1
ACM_367Mbps-52MHz-256QAM-Grade-1
ACM_42Mbps-6.5MHz-256QAM-Grade-1
ACM_87Mbps-12.5MHz-256QAM-Grade-1
Operational Mode
acm-adaptive-mode
acm-fixed-mode
regular-mode (for non ACM scripts)
Maximum Profile
Note: For ,choose a specific profile for ACM fixed mode . In regular mode only profile-0 is
available.
profile-0
profile-1
profile-2
profile-3
profile-4
profile-5
profile-6
profile-7
2. Type: set set host-ip <ip> (the clients IP address), and press Enter.
3. Type: set host-path <path> (the site to the desired file location at the client), and press Enter.
4. Type: set set user-name <user-name> (the user name expected from client), and press
Enter.
5. Type: change-user-password and press Enter; upon prompt write the password expected
from client, and press Enter.
2. In order to create the backup file for a certain slot, type: config-backup --unit <slot number>,
and press Enter.
2. In order to create the backup file for a all the slots in the shelf, type: config-backup --all, and
press Enter.
2. In order to upload the file to the FTP client, type: upload-archive configuration, and press
Enter.
3. In order to see the upload status, type: get config-upload-status, and press Enter.
2. In order to download the file from the FTP client, type: download-archive configuration, and
press Enter.
For a certain slot, type: config-restore --unit <slot number>, and press Enter.
For all the slots in the shelf, type: config-restore --all, and press Enter.
For a certain slot, type: reset-unit <slot number>, and press Enter.
For all the slots in the shelf, type: reset-shelf, and press Enter.
For all the extension slots in the shelf, type: reset-extensions, and press Enter.
2. Type: set server-url <ip/path> (the clients IP address and files path), and press Enter.
3. Type: set server-login <user-name> (the user name expected from client), and press Enter.
5. Type: change-server-password and press Enter; upon prompt write the password expected
from client, and press Enter.
For all the slots in the shelf, type: upgrade --all, and press Enter.
For a certain slot, type: downgrade --unit <slot number>, and press Enter.
For all the slots in the shelf, type: downgrade --all, and press Enter.
Rollback Procedure
In order to rollback to the previously installed version:
For a certain slot, type: rollback --unit <slot number>, and press Enter.
For all the slots in the shelf, type: rollback --all, and press Enter.
2. Type: set set host-ip <ip> (the clients IP address), and press Enter.
3. Type: set host-path <path> (the site to the desired file location at the client), and press Enter.
4. Type: set set user-name <user-name> (the user name expected from client), and press
Enter.
5. Type: change-user-password and press Enter; upon prompt write the password expected
from client, and press Enter.
2. Type: set cli-script-file-name<file name> (the scripts file name), and press Enter.
3. In order to download the file from the FTP client, type: download-archive cli-script, and press
Enter.
4. In order to see the upload status, type: get download-cli-script-status, and press Enter.
2. In order to execute the currently loaded script, type: cli-script execute, and press Enter.
3. In order to delete the currently loaded script, type: cli-script delete, and press Enter.
To set RX frequency:
1. Type cd /radio/rfu/ set atpc-ref-rx-level <reference level in dBm>, then press Enter.
To enable ATPC:
To set Link-ID:
NTP
To set NTP service enable/disable:
To set Date and Time, whereby the time and date format are day-month-year,hours:mins:secs:
SNMP
To set SNMP enable/disable:
2. Type set version v3 (or v1 for SNMP version 1), and press Enter.
To set the security mode to authentication, and the authentication algorithm to sha:
To set the security mode to authentication-privacy, and the Authentication algorithm to md5:
To set the security mode to no-security, and the authentication algorithm to no authentication:
The following steps are used to define the web protocol that will work with HTTPS
Step 1: Create the NE certificate based on the NE's public key. The public key receives the public
key file through upload.
You can find your public_key file (such as 192.168.1.18_pub_key) in your host path directory.
Note: Before you download the certificate, copy your NE certificate to your ftp host path directory.
4. Type set security-file-name <MYCERT.crt> (your certificate file name), and press Enter.
Note: Enter the URL in the WEB GUI, such as https://192.168.1.1 to use the https protocol.
Domain
Under service-oam level
Creation:
IP-10:/interfaces/ethernet/bridge/service-oam> domain add <Domain name> <Domain level [1-7]>
, and press Enter.
Deletion:
IP-10:/interfaces/ethernet/bridge/service-oam> domain remove <Domain name> <Domain level
[1-7]> , and press Enter.
Creation:
IP-10:/interfaces/ethernet/bridge/service-oam> domain add <Domain name> <Domain level [1-7]>
<Association name> <VLAN ID [1-4090]> , and press Enter.
Deletion:
IP-10:/interfaces/ethernet/bridge/service-oam> domain remove <Domain name> <Domain level
[1-7]> <Association name> <VLAN ID [1-4090]> , and press Enter.
Association
Under service-oam level:
Creation
IP-10:/interfaces/ethernet/bridge/service-oam> association add <Association name> <Domain
name> <VLAN ID [1-4090]> , and press Enter.
Deletion
IP-10:/interfaces/ethernet/bridge/service-oam> association remove <Association name>
<Domain name> <VLAN ID [1-4090]> , and press Enter.
CCM
Under service-oam level
On
IP-10:/interfaces/ethernet/bridge/service-oam> ccm-admin enable <Domain level [1-7]> <VLAN
ID [1-4090]> , and press Enter.
Off
IP-10:/interfaces/ethernet/bridge/service-oam> ccm-admin disable <Domain level [1-7]> <VLAN
ID [1-4090]> , and press Enter.
Creation
1. IP-10:/interfaces/ethernet/bridge/eth-port [x]> mep set < MEP ID [1-8191]> < Domain level [1-
7]> <VLAN ID [1-4090]> < Direction [up/down]> <CCM VLAN Pbit priority [0-7]> , and press
Enter.
2. IP-10:/interfaces/ethernet/bridge/eth-port [x]> mep set < MEP ID [1-8191]> < Domain level [1-
7]> <VLAN ID [1-4090]> < Direction [up/down]> , and press Enter.
Deletion
IP-10:/interfaces/ethernet/bridge/eth-port [x]> mep remove < MEP ID [1-8191]> < Domain level [1-
7]> <VLAN ID [1-4090]> < Direction [up/down]> , and press Enter.
Remote MEP
Under service-oam level
Creation
1. IP-10:/interfaces/ethernet/bridge/service-oam> remote-mep set <Remote MEP ID [1-8191]>
<Domain name> <VLAN ID [1-4090]> <MAC address [xx:xx:xx:xx:xx:xx]> , and press Enter.
2. IP-10:/interfaces/ethernet/bridge/service-oam> remote-mep set <Remote MEP ID [1-8191]>
<Domain name> <VLAN ID [1-4090]> , and press Enter.
Deletion
MIP
Under interfaces level
Creation
IP-10:/interfaces/ethernet/bridge/eth-port[x]> mip add <Domain level [1-7]> , and press Enter.
Deletion
IP-10:/interfaces/ethernet/bridge/eth-port[x]> mip remove <Domain level [1-7]> , and press Enter.
Loopback (Ping)
Under service-oam level
1. IP-10:/interfaces/ethernet/bridge/service-oam> ping mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-name <Domain name> <VLAN ID[1-4090]> <VLAN Pbit priority[0-7]> ,
and press Enter.
2. IP-10:/interfaces/ethernet/bridge/service-oam> ping mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-name <Domain name> <VLAN ID[1-4090]> , and press Enter.
Link Trace
Under service-oam level
1. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-name <Domain name> <VLAN ID[1-4090]> <VLAN Pbit priority[0-7]> ,
and press Enter.
2. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-name <Domain name> <VLAN ID[1-4090]> , and press Enter.
3. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-level <Domain level[1-7]> <VLAN ID[1-4090]> <VLAN Pbit priority[0-
7]> , and press Enter.
4. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mac-address <MAC address
[xx:xx:xx:xx:xx:xx]> md-level <Domain level[1-7]> <VLAN ID[1-4090]> , and press Enter.
5. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mep-id <Remote MEP ID[1-8191]>
md-name <Domain name> <VLAN ID[1-4090]> <VLAN Pbit priority[0-7]> , and press Enter.
6. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mep-id <Remote MEP ID[1-8191]>
md-name <Domain name> <VLAN ID[1-4090]> , and press Enter.
7. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mep-id <Remote MEP ID[1-8191]>
md-level <Domain level[1-7]> <VLAN ID[1-4090]> <VLAN Pbit priority[0-7]> , and press Enter.
8. IP-10:/interfaces/ethernet/bridge/service-oam> linktrace mep-id <Remote MEP ID[1-8191]>
md-level <Domain level[1-7]> <VLAN ID[1-4090]> , and press Enter.
Creation
1. IP-10:/interfaces/ethernet/bridge/service-oam> auto-linktrace add <Remote MEP ID [1-8191]>
md-name <Domain name> <VLAN ID[1-4090]> <VLAN Pbit priority[0-7]> , and press Enter.
2. IP-10:/interfaces/ethernet/bridge/service-oam> auto-linktrace add <Remote MEP ID [1-8191]>
md-name <Domain name> <VLAN ID[1-4090]> , and press Enter.
Deletion
1. IP-10:/interfaces/ethernet/bridge/service-oam> auto-linktrace remove <Remote MEP ID [1-
8191]> md-name <Domain name> <VLAN ID[1-4090]> , and press Enter.
2. IP-10:/interfaces/ethernet/bridge/service-oam> auto-linktrace remove <Remote MEP ID [1-
8191]> md-level <Domain level[1-7]> <VLAN ID[1-4090]> , and press Enter.
CCM Interval
Under service-oam level
Modification
IP-10:/interfaces/ethernet/bridge/service-oam> ccm-interval <interval time: 1-sec, 10-sec, 1-min,
10-min> <Domain level [1-7]> <VLAN ID [1-4090]> , and press Enter.
Modification
IP-10:/interfaces/ethernet/bridge/service-oam> set auto-linktrace-interval [seconds: range 60-
3600] , and press Enter.
Modification
IP-10:/interfaces/ethernet/bridge/service-oam> set remote-meps-learning-time [seconds: range
60-3600] , and press Enter.
Ring RSTP
Type cd /interfaces/ethernet/bridge/ set priority <priority no: range 0-61440, steps of 4096>,
and press Enter.
Preliminary Questions
Whatistherequiredlength? ________[m/ft]
Terminationtype Openend/RJ45Male/RJ45Female/75Ohm/BNC
IDUConnector Rightangled/Leftangled?
PDH(E1/DS1)
NumberofE1ports 4/8/16
ProtectionPanelrequired? YES/NO
Adaptersrequired? YES/NO
Whatistherequiredlength? ________[m/ft]
ETHERNET
Pinlayout Crosscable/Straightcable
Wh t i th i dl th?
Whatistherequiredlength? [ /ft]
________[m/ft]
LongReach? YES/NO
PAGE 561 1
9/26/2010
ETHERNET CABLES
Protection Cable
X-WSC-E1 WA-0242-0
X-WSC-T1 WA-0242-0
PAGE 562 2
9/26/2010
Connection Cables
X-2FE-CON WA-0235-0
ETH Y-Cables
15P-PROT-CBL WA-0244-0
15PPROTCBL
X2FECON
PAGE 563 3
9/26/2010
PDH CABLES
E1 Extension Cable
IP10-CBL-16E1-OE-3M WA-0400-0
In use to connect to the IP-10 16E1 connector on one end and have open
ends for the 16E1 on the other side ((on 120 ohm))
A male SCSI68 Left angle120 OHM cable
When conversion to 75 ohm is required a special adaptation panel is
needed
Length 3M
PAGE 564 4
9/26/2010
T1 Extension Cable
IP10-CBL-16T1-OE-3M WA-0413-0
In use to connect to the IP-10 16E1 connector on one end and have open
ends for the 16T1 on the other side ((on 100 ohm))
A male SCSI68 Left angle100 OHM cable
Length 3M
Additional Optional length (5, 10, 15 meter):
IP10-CBL-16T1-10M
IP10-CBL-16T1-25M
IP10-CBL-16T1-5M
E1 Y-Cable
IP10-CBL-16E1-PROT-Y WA-0391-0
IP10CBL16E1OE3M
PAGE 565 5
9/26/2010
T1 Y-Cable
IP10-CBL-16T1-PROT-Y WA-0398-0
IP10CBL16T1OE3M
PAGE 566 6
9/26/2010
A male SCSI68 Left angled 120 OHM cable with
RJ 45 Adaptors
2 kits of 8 female-female adaptors should be
ordered for 16T1 (optional)
Length 1.5M
Optional length
IP10-CBL-16T1-MDRLA-RJ45-XD1.5m
IP10-CBL-16T1-MDRLA-RJ45-XD3m
A male SCSI68 Left angled100 OHM cable with
RJ 45 Adaptors
2 kits of 8 female-female adaptors should be
ordered for 16T1 (optional)
Length 1.5M
Optional length
IP10-CBL-16T1-MDRLA-RJ45-XD1.5m
IP10-CBL-16T1-MDRLA-RJ45-XD3m
PAGE 567 7
9/26/2010
1 IP10CBL16E1MDRMDR0.6m/1.5m/5m IP1016E1portscablestraight0.6/1.5m/5m
2 IP10PANEL16E1ADAP75ohmBNC IP1016E1panelw/75ohmadapter,BNC
PAGE 568 8
9/26/2010
PAGE 569 9
9/26/2010
OPTICAL CABLES
20
PAGE 570 10
9/26/2010
PAGE 571 11
9/26/2010
PAGE 572 12
9/26/2010
H Optical cable
Used to interconnect between two protected terminals (logically equivalent to two
Y splitters connected to each other via their common port)
2 cables should be ordered
TX of 1 device should be connected to RX of the other
PAGE 573 13
9/26/2010
ALARMS CABLES
27
PAGE 574 14
9/26/2010
30
PAGE 575 15
9/26/2010
15R-USER-CHAN-ASYNC-CBL-2.5M
15P-PROT-CB
PAGE 576 16
9/26/2010
SYNC Cable
Used when working on 1+0 user channel connection
Length 2.5 M
SYNC Cable
Used when working on 1+1 or 2+2 for the user channel connection
Length 2.5 M
Uses the Y cable 15P-PROT-CBL
Two Y cables should be ordered to support protection mode
PAGE 577 17
9/26/2010
IF CABLES
35
IDU-ODU IF CABLE
IDU_ODU_CBL WA-0098-0
N_TYPE WA-0037-0
BNC Connector
N
N-Type
Type
Needs two per cable
PAGE 578 18
9/26/2010
PART NUMBERS
37
E1
E1 Open End Termination Cables
Ceragon PN Marketing Model Marketing Description Item Description
E1RJ45female(socket)terminationcables
Ceragon P/N Marketing Model Marketing Description
38
Proprietary and Confidential
PAGE 579 19
9/26/2010
E1
E1RJ45maleterminationcables/panels
CeragonP/N MarketingModel MarketingDescription Itemdescription
CABLE,SCSI68MaleTO4xRJ45Male
WA03960 IP10CBL4E1MDRRJ45XED0.3m IP104E1cableMDR68RJ450.3M,cross
CROSS,0.3M,120OHM
CABLE,SCSI68MaleTO8xRJ45Male
,S S 68 a e O 8 5 ae
WA 0395 0
WA03950 IP10 CBL 8E1 MDR RJ45 XED 0 3
IP10CBL8E1MDRRJ45XED0.3m IP 10 8E1 bl MDR68 RJ45 0 3M
IP108E1cableMDR68RJ450.3M,cross
CROSS,0.3M,120OHM
CABLE,SCSI68MaleTO8xRJ45Male
WA03921 IP10CBL8E1MDRRJ45XED1.5m IP108E1cableMDR68RJ451.5M,cross
CROSS,1.5M,120OHM
CABLE,SCSI68MaleTO8xRJ45Male
WA03941 IP10CBL8E1MDRRJ45XED3m IP108E1cableMDR68RJ453M,cross
CROSS,3M,120OHM
WA04091 IP10CBL16E1MDRLARJ45XD3m IP1016E1cableMDR68RJ453M,LA,cross
CABLE,SCSI68PINTO16*RJ45,1.5M,120
WA04071 IP10CBL16E1MDRLARJ45XD1.5m IP1016E1cableMDR68RJ451.5M,LA,crs
Ohm,LEFT ANGLE,CROSS
39
Proprietary and Confidential
E1
E1 RJ45 couplers/panels
Status Ceragon P/N Marketing Model Marketing Description
NPI EN-0268-0 IP10-PANEL-32E1/T1-RJ45 IP-10 32E1/T1 panel, for RJ45F adapters
Released NM-0153-0 IP10-ADAP-RJ45F-E1/T1-XED x8 IP-10 RJ45F/RJ45F adapter,E1/T1,cross x8
Released NM-0154-0 IP10-ADAP-RJ45F-RJ45F x8 IP-10 RJ45F/RJ45F adapter, straight x8
40
Proprietary and Confidential
PAGE 580 20
9/26/2010
E1
E1Protectionpanels/cables
CeragonP/N MarketingModel MarketingDescription
WA03910 IP10CBL16E1PROTY IP1016E1protectionYcable,MDR68
E1MDR69 MDR69crosscables(forchainingapplications)
CeragonP/N MarketingModel MarketingDescription
WA03820 IP10CBL16E1MDRMDRXED2m IP1016E1portscrossedcable2m
E1specialcables/panels(notforpricelist)
CeragonP/N MarketingModel MarketingDescription
WA03750 IP10CBL16E1MDR2xDTYPE1.5m /
IP1016E1cableMDR68/2xDB371.5m
WA04081 IP10CBL16E1MDRRARJ45XD1.5m IP1016E1cableMDR68RJ451.5M,RA,crs
WA03700 IP10CBL16E1MDRRJ45XED1.5m IP1016E1cableMDR68RJ451.5M,cross
WA03770 IP10CBL16E1MDRRJ451.5m IP1016E1cableMDR68RJ451.5M
WA03930 IP10CBL16E1MDRRJ45XED3m IP1016E1cableMDR68RJ453M,cross
WA04030 IP10CBLE1RJ45RJ45FXED0.3m IP10E1RJ45toRJ45Fcable0.3m,cross
WA04340 IP10CBL16E1MDRMDREXT0.6m IP1016E1Extensioncable 0.6m, MDR68
WA03870 IP10CBL16E1OEPROT5M IP1016E1scableopenend,5Mw/prot.
41
Proprietary and Confidential
T1
T1"openend"terminationcables
CeragonP/N MarketingModel MarketingDescription Itemdescription
IP1016T1cableopenend,
p ,
WA 0413 0
WA04130 IP10 CBL 16T1 OE 3M
IP10CBL16T1OE3M CABLE SCSI68 LEFT ANGLE TO OE 3M 100 OHM
CABLE,SCSI68LEFTANGLETOOE,3M,100OHM
3M
42
Proprietary and Confidential
PAGE 581 21
9/26/2010
T1
T1RJ45maletermination cables/panels
CeragonP/N MarketingModel MarketingDescription
WA04121 IP10CBL16T1MDRLARJ45XD3m IP1016T1cable MDR68RJ453M,LA,cross
WA04101 IP10CBL16T1MDRLARJ451.5m IP1016T1cable MDR68RJ451.5M,L.Ang.
WA04111 IP10CBL16T1MDRLARJ45XD1.5m IP1016T1cable MDR68RJ451.5M,LA,crs
T1Protectionpanels/cables
CeragonP/N MarketingModel MarketingDescription
43
Proprietary and Confidential
T1
T1MDR69 MDR69crosscables(forchainingapplications)
CeragonP/N MarketingModel MarketingDescription Itemdescription
CABLE,SCSI68TOSCSI68CROSS,2M,100
WA04280 IP10CBL16T1MDRMDRXED2m IP1016T1portscrossedcable2m
OHM,30AWG
T1specialcables/panels(notforpricelist)
CeragonP/N MarketingModel MarketingDescription Itemdescription
IP10CBL16T1MDRRJ45XED3m IP1016T1cable MDR68RJ453M,cross
IP1016T1CROSSCABLEMDR68RJ45
WA03730 IP10CBL16T1MDRRJ45XED1.5m IP1016T1cableMDR68RJ451.5M,cross
1.5M
IP1016T1CABLE,MDR68Pinto
WA03370 IP10CBL16T1MDRRJ451.5m IP1016T1cableMDR68RJ451.5M
RJ45,1.5M
44
Proprietary and Confidential
PAGE 582 22
9/26/2010
OPTICAL
STM1SFPs/patches/splitters multimode(optical)
CeragonP/N MarketingModel MarketingDescription Itemdescription
SFPMultimode850nm1.0625Gbit/sFibreChannel
ER 8000 0
ER80000 SFP GE SX*RoHS
SFPGESX*RoHS SFP optical interface 1000Base SX
SFPopticalinterface1000BaseSX 1.25GigabitEthernetTransceiver,withpackingRoHS
1 25 Gigabit Ethernet Transcei er ith packing RoHS
compliance
SFP1000BASET1.25GBdSmallFormPluggableLow
ER80030 SFPGEELC SFPelectricalinterface1000BaseT Voltage(3.3V)ElectricalTransceiveroverCategory5
Cablewithpackage
AO00580 SFPGEZX SFPopticalinterface1000BaseZX
AO00480 OPMMCBLLCLCDPLX0.5M DuplexOpticalCableLCLCMM0.5M CABLE,FO,DUALLCTOLC,0.5M,MM,D=2MM
AO00660 OPMMCBLLCLCDPLX3M DuplexOpticalCableLCLCMM3M CABLE,FO,DUALLCTOLC,3M,MM,D=2MM
AO00670 OPMMCBLLCLCDPLX6M DuplexOpticalCableLCLCMM6M CABLE,FO,DUALLCTOLC,6M,MM,D=2MM
CABLE,FO,1X2SPLITTERLCTO
AO00390 GBESPLMM2M MM/LCOpticalsplitter62.5/1252M
LC,1M,MM,W.COUPLER50/50850NM,D=2MM
CABLE,FO,1X2SPLITTERLCTO
AO00590 GBESPLMM1M MM/LCOpticalsplitter62.5/1251M
LC,0.5M,MM,W.COUPLER50/50850NM,D=2MM
CABLE,FO,1X2SPLITTERLCTO
AO00600 GBESPLMM0.6M MM/LCOpticalsplitter62.5/1250.6M
LC,0.3M,MM,W.COUPLER50/50850NM,D=2MM
COUPLER,2X2,850NM,lCTO
AO00890 OPMMHSPLLCLC0.5M/0.5M Opt.HspltMM850nm,LC/LC,0.5M/0.5M
lC,1M,MM,50/50,D=2MM
COUPLER,2X2,850NM,lCTO
AO00900 OPMMHSPLLCLC1M/1M Opt.HspltMM850nm,LC/LC,1M/1M
lC,2M,MM,50/50,D=2MM
45
Proprietary and Confidential
ETHERNET
Ethernetcables/splitters(copper)
CeragonP/N MarketingModel MarketingDescription Itemdescription
CABLE,RJ45TORJ45DUALCROSS,2M,CAT
WA02350 X2FECON DualchannelEthernetxedcable
5E,100OHM
46
Proprietary and Confidential
PAGE 583 23
9/26/2010
ETHERNET
EthernetRJ45 RJ45cables
CeragonP/N MarketingModel MarketingDescription
WA04170 IP10CBLETHRJ450.6m IP10ETHRJ45cable0.6m,str.
WA04180 IP10CBLETHRJ451m IP10ETHRJ45cable1m,str.
WA04190 IP10CBLETHRJ452m IP10ETHRJ45cable2m,str.
WA04140 IP10CBLETHRJ45XED0.6m IP10ETHRJ45cable0.6m,cross
WA04150 IP10CBLETHRJ45XED1m IP10ETHRJ45cable1m,cross
WA04160 IP10CBLETHRJ45XED2m IP10ETHRJ45cable2m,cross
47
Proprietary and Confidential
ExternalAlarms
CeragonP/N MarketingModel MarketingDescription Itemdescription
CABLE,D9FTOOE,2.5M,EXT
WA03740 IP10EXTALARMSCBL2.5m IP10Ext.Alarmsopencable2.5m
ALARMS
CABLE,D9Fx2TO
WA03690 IP10EXTALARMSCBL2.5mPROT Ext.Alarmscable2.5m withprotection
OE,2.5M,EXTALARMS
Userchannelandothers
CeragonP/N MarketingModel MarketingDescription Itemdescription
IP10IDU19INCHDEEP
MB09650 IDUMountears1RUW19inD50mm IDUmount.ears,1RU,W:19in,D:50mm
MOUNTEDEAR
48
Proprietary and Confidential
PAGE 584 24
9/26/2010
Thank You
Should you require further information, please contact us at
training@ceragon.com
PAGE 585 25