Professional Documents
Culture Documents
COURSE HANDBOOK
2010
Visit our Customer Training Portal at Training.Ceragon.Com or contact us at training@ceragon.com
Trainee Name:
eLearning is a great complementary solution to your classroom sessions as some modules are only available on-line
eLearning provides a first tier of support to users of new technologies, resulting in an estimated 30% reduction in support costs related to implementation of new applications & business processes.
eLearning is proven to be less intimidating than Instructor led training. Concerns about making mistakes in front of peers and management are eliminated.
Ceragon Training Center is designed to help you get a comprehensive understanding with Ceragon's technology, products and network solutions. While individuals focus on particular modules, Managers on the other hand can sign up their staff members to a Learning Program with compulsory items such as quizzes & procedures.
Ceragon eLearning users enjoy frequent & updated modules as new features and products are released without needing to update users account properties.
Ceragon eLearning solutions can shorten the amount of time it takes to get learners up to speed on new products and processes. Users who need to "brush up" on a process can access a module instantly, practice, test themselves and resume their work.
Ceragon Training Knowledgebase is available to your employees without sacrificing additional room space or time-consuming lectures.
Want to find out more? Need an Account Comparison Table? Need a proposal? Case studies? Please contact us at training@ceragon.com
DAY ONE Greetings and Course Opening Introduction to MW Radio Introduction to 802.1p/q VLAN Tagging Introduction to CFM IP-10 G-Series Nodal Solution Introduction Introduction to ODU Introduction to Adaptive Code Modulation and MRMC scripts Physical Overview
v2.2
DAY TWO
System Architecture & Design: Front Panel Overview Standalone VS. Shelf IP allocation in a shelf Management Modes (In Band, OOB, WSC) Switch Mode (Pipe, Managed, Metro) Protection Mode
Installation (Practical Exercise using the Element Management System): Standalone guidelines Installing IDU in a shelf Protection mode (Main and Extensions) Setting IP address via CLI Setting up a radio link (frequency, Link ID, RSL, TSL, ATPC, MSE, MRMC, ASP) Setting MNG in a standalone IDU Setting MNG in a shelf Setting MNG using Wayside Channel
Troubleshooting Tools & Maintenance: Using the Current Alarms Using the Event Log Using RMON Registers and Statistics Performing Loopbacks Saving Unit Information Files Configuration File Upload / Download Software File Download
v2.2
RSTP RING (Practical Exercise using the EMS): Setting up an RSTP Ring Demonstrating RSTP Protection on Trails Demonstrating RSTP Protection on In Band Management
Simple Star Topology + RSTP (Practical Exercise using the EMS): Shelf Configuration SDH Trail XC Configuration TDM Trail XC Configuration
Star Topology + In Band +Protection (Practical Exercise using the EMS): Enabling Protection Mode SDH Trail XC Configuration TDM Trail XC Configuration
Trail Prioritization (Practical Exercise using the EMS): (We shall use the same setup as in previous exercise) Setting Trail Priority Demonstrating Trail Prioritization with ACM and variable attenuator
v2.2
Quality of Service (Practical Exercise using the EMS): Creating preliminary tables for classifiers & policers Assigning Policers Assigning Classifiers Assigning a Scheduler
Quality of Service (Practical Exercise using the EMS): QoS demonstration using Video Streaming (VLC) QoS demonstration using Traffic Generator/Analyzer (when relevant)
Administration Log Analysis and Filtering System Configuration Dynamic Poling Static Poling Configuration Broadcast Configuration File Download Software Download FTP Mail Server Northbound
v2.2
3/8/2010
Ceragon in a Nutshell
Products
Agenda
1. 2. 3. 4. 5. 6. 7. 8.
1500R IDU IP-MAX^2 IDU IP-10 IDU IP-10G IDU Nodal Solutions 3200T IDU Outdoor units Outdoor Enclosures
3/8/2010
OA&M
Service Management
Security
E1/T1
Ch-STM1/ OC3
Terminal Mux
RFU (6-38GHz)
3
Proprietary and Confidential
STM Ring
STM Ring
3/8/2010
ADM/MSPP
N x STM-1/OC-3
XC XC
Aggregation Site
PSN
ETH
3/8/2010
N x ETH
STM Rings
3/8/2010
SDH
SDH
10
3/8/2010
RFUs
FibeAir RFU-HP
FibeAir RFU-HS
FibeAir RFU-P
FibeAir RFU-C
High power
(e.g. Smaller antennas reduced cost)
Proprietary and Confidential
Standard power
Dust and weather proof Compact size reduces the cost of leasing or purchasing rack space. Ideal for Greenfield areas, at solar-powered sites, and at repeater sites adjacent to highways. One-man installation and shorter cabling reduce installation costs. Environment-friendly: Greener deployments, saving on power and air-conditioning costs.
3/8/2010
STM1/ OC3
BSC/MSC
Core Site
Tail site
FibeAir IP-10
FibeAir IP-10
GE
Hub Site
MPLS Router MPLS Router
GE
RNC
Native2 - Is a technology for carrying both TDM and Ethernet traffic Natively over the same microwave links with dynamic bandwidth allocation.
13
Business center
WiMAX / 4G / LTE Cellular site WiMAX Ceragon TDM E1/T1 2G/3G base station Hub / Aggregation site Ceragon
GE
STM-1 / OC-3
Access
WiMAXPoint to Multipoint
solution for Ethernet traffic aggregation and statistical multiplexing for a mix of Business and mobile offload Ceragon Point to Point for TDM aggregation
Metro / Aggregation
Ceragons Point to Point backhaul
supports Native Ethernet with traffic QoS awareness Ethernet traffic is tunneled through E-LAN/ E-Line EVCs TDM traffic (E1/T1) are being aggregated using Ceragon integrated TDM cross connect
Core IP Backbone
Ethernet (GE) is sent over to an IP/MPLS Layer TDM (STM-1/OC-3) is sent over to an SDH/SONET layer Ceragon High-capacity "MPLSaware" Ethernet microwave radio is used where fiber connections not available.
14
3/8/2010
Ceragons Advantages
High Spectral-Efficiency High System-Gain Multi-Service Concentration capabilities High Level of Redundancy Adaptive Modulation Pay-as-you-grow concept
15
High Spectral-Efficiency
(i.e. 256QAM modulation)
3/8/2010
Higher Spectral-Efficiency
Whats in it for The Operator?
Typical
Microwave Radio
Required Capacity 155-200Mbps Required Capacity 70-100Mbps TWO radio links or 56MHz channel bandwidth 28MHz Channel Bandwidth
IP10
Microwave Radio
ONE radio link using 28MHz channel bandwidth 14MHz Channel Bandwidth
Ant. Diameter
1.80 m 1.80 m 3.00 m 1.80 m
Length
30 Km 21 Km 30 Km 30 km
Modulation
16QAM 128QAM 128QAM 128QAM
Capacity
32 x E1s STM-1/OC-3 STM-1/OC-3 STM-1/OC-3
3/8/2010
IP-10
19
Proprietary and Confidential
FibeAir
20
10
3/8/2010
11
Objectives
Understand the need for smaller broadcast domains Understand what is VLAN Understand the difference between tagged and untagged frame Understand VLAN applications
IEEE 802.3
IEEE 802.3ac : Ethernet (Max. frame size = 1522 bytes) IEEE 802.1 d : MAC Bridge first introduced the concept of Filtering Services in a bridged local network IEEE 802.1 q : VLAN Tagging IEEE 802.1 p : Priority Tagging / Mapping IEEE 802.1ag : OAM (CFM)
Agenda Agenda
What is VLAN? Advantages for using VLAN Regular Ethernet frame Tagged frame structure Types of VLAN Types of connections 802.1P implementations
2 of 19
What is VLAN?
4 of 19
What is VLAN?
Regular ETH networks forward broadcast frames to all endpoints
5 of 19
What is VLAN?
VLAN networks forward broadcast frames only to pre-defined ports (Profile Membership)
VLAN 1
Switch ports
VLAN 547
6 of 19
Advantages of VLAN
Breaking large networks into smaller parts (Formation of virtual workgroups) Simplified Administration (no need for re-cabling when user moves) Improving Broadcast & Multicast traffic utilization Mapping expensive backbones (ATM) to simpler & cheaper ETH backbones Security establishing tunnels / trunks through the network for dedicated
users (traffic between VLANs is restricted).
3 of 19
Before we start explaining bit by bit, what is VLAN and how does it work, let us review first the structure of a regular ETH frame
7 of 19
Preamble + SFD
8 Bytes
DA
6 Bytes
SA
6 Bytes
Length / Type
2 Bytes
DATA + PAD
46 - 1500 Bytes
FCS
4 Bytes (32-bit CRC)
Length / Type < 1500 - Parameter indicates number of Data Bytes Length / Type > 1536 - Parameter indicates Protocol Type (PPPoE, PPPoA, ARP etc.)
10
8 of 19
Preamble + SFD
DA
SA
Length / Type
Length / Type
DATA + PAD
FCS
TPID = 0x8100
16 Bit
TCI
P-TAG
3 Bit 11
CFI
1 Bit
VLAN ID
12 Bit
Proprietary and Confidential
TPID = Tag protocol ID TCI = Tag Control Information CFI = 1 bit canonical Format Indicator
9 19 4 of 42
Tagging a Frame
VLAN ID uses 12 bits, therefore the number of maximum VLANs is 4094: 2^12 = 4096 VID 0 = reserved VID 4096 = reserved (every vendor may use some VIDs for internal purposes such as MNG etc.) VID 1 = default After tagging a frame, FCS is recalculated CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over ETH backbones (some vendors may use CFI for internal purposes)
12
Value
0x8100 0x0806 0x8100 0x88A8 0x9100 0x9200 0x8035 0x0800 0x86DD 0x8863/0x8864 0x8847/0x8848 0x8000 0x8809 0x888E
It is important that you understand the meaning and usage of this parameter
Later when we discuss QoS, we shall demonstrate how & why the system audits this parameter
13
Proprietary and Confidential
VLAN types
Membership by Port
VID1
Port 1 2 3 4
VID 1 1 44 200
VID 44 VID1
VID200
14
10 of 19
VLAN types
Membership by MAC
MAC 00:33:ef:38:01:23 00:01:de:22:42:ae 00:20:8f:40:15:ef 00:20:32:35:ea:11 VID 1 1 44 200
PRO user mobility, no reconfiguration when PC moves CON needs to be assigned initially, not an easy task with thousands of endpoints
15
11 of 19
VLAN types
Membership is based on the Layer 3 header No process of IP address is done Main disadvantage longer overall throughput
16
Proprietary and Confidential
12 of 19
VLAN types
VID 1 44
The VID is derived from the protocol type field found in the Layer 2 header
17
13 of 19
Port Types
Access Port a port which is not aware of VLANs (Cannot tag outgoing frames or un-tag incoming frames)
Switch tags the ingress frames with VID according to specific Tagging mechanism
18
14 of 19
Port Types
Trunk Port a port which is aware of VLANs (Can tag or un-tag incoming frames)
Switch tags the ingress frames with VID according to specific Tagging mechanism Switch un-tags frames with VID received from network and delivers untagged frames to Access ports
19
14 of 19
Port Types
Trunk Port can carry tagged frames with different VIDs. This requires Port Membership configuration.
T A
This port is not a member of the Trunk port membership list, hence, traffic is discarded
20
14 of 19
10
Port Types
Q-in-Q (A.K.A. Double TaggingVLAN Encapsulation)
+
VLAN
CN
aware Switch
PN
Enhanced security not exposing original VID Improved flexibility of VID in the network (Ingress VID was already assigned in the network)
21
15 of 19
22
11
Hub Site
FE/GE GE n x T1/E1
GE
Tail site
IP-10
ATM Router
MPLS Router
Core Site
BSC/MSC
23
Frames/services are mapped to MPLS FECs according to: VLAN ID mapped to MPLS EXP bits VLAN P-Bit mapped to MPLS EXP bits
Hub Site
FE/GE GE n x T1/E1
GE
RNC
STM1/ OC3
Tail site
FibeAir IP-10
IP-10
STM1/ OC3
MPLS Router
MPLS Router
Core Site
BSC/MSC
24
16 of 19
12
P-Bits 4-5
Q4 Q3 Q2
High
P-Bits 0-3
Q1 Low
0 0 0 0 0 0 0 0
1 2 3 4 5 6 7
Egress P-Tag
26
13
Acronyms
ETH Ethernet NIC Network Internet Card VID Vlan ID VLAN Virtual LAN P-TAG Priority Tag, Priority Bits CFI Canonical Format Indicator TPID Tag Protocol Identifier FCS Frame Check Sequence DA Destination Address SA Source Address QoS Quality of Service
27
Thank You !
training@ceragon.com
28
14
3/8/2010
Modulation changes to maintain link when radio signal degrades Mechanism automatically recovers to max. configured modulation when
received signal improves
3/8/2010
Hitless & errorless switchover between modulation schemes Maximize spectrum usage - Increased capacity over given bandwidth Service differentiation with improved SLA Increased capacity and availability
Strong FEC
When we engineer our services, we may assign certain services to highest priority When ACM is enabled and link degrades, highest priority services are maintained
4
Proprietary and Confidential
3/8/2010
Hit-less and Error-less modulation/coding changes based on signal quality E1/T1 traffic has higher priority over Ethernet traffic Each E1/T1 service is assigned a priority - enables differentiated E1/T1 dropping
during severe link degradation
14MHz
Modulation # of E1s 8 12 18 20 24 29 34 37 Ethernet Capacity (Mbps) 20 - 29 29 - 41 42 - 60 49 70 57 82 69 - 98 81 - 115 87 - 125 # of E1s 32 48 64 75 75 75 75 75
QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of E1s 16 22 32 44 54 66 71 75
28MHz
Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM Ethernet Capacity (Mbps) 38 - 54 53 - 76 77 - 110 103 - 148 127 - 182 156 - 223 167 - 239 183 - 262 ACM Point 1 2 3 4 5 6 7 8
40MHz
Modulation # of E1s 23 34 51 65 75 75 75 75
8 Ethernet Capacity (Mbps) 56 - 80 82 - 117 122 - 174 153 - 219 188 - 269 214 - 305 239 - 342 262 - 374
56MHz
Ethernet Capacity (Mbps) 76 - 109 114 - 163 151 - 217 202 - 288 251 - 358 301 - 430 350 - 501 372 - 531
Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM
QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM
3/8/2010
20MHz
Modulation # of T1s 16 22 32 38 52 58 67 73 Ethernet Capacity (Mbps) 28 - 40 39 - 56 57 - 81 67 - 96 93 - 133 102 - 146 118 - 169 129 - 185 # of T1s 37 59 74 84 84 84 84 84
30MHz
Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM Ethernet Capacity (Mbps) 39 - 55 62 - 89 93 - 133 120 - 171 142 - 202 164 - 235 185 - 264 204 - 292 ACM Point 1 2 3 4 5 6 7 8
40MHz
Modulation # of T1s 31 46 69 84 84 84 84 84
8 Ethernet Capacity (Mbps) 56 - 80 82 - 117 122 - 174 153 - 219 188 - 269 214 - 305 239 - 342 262 - 374
50MHz
Ethernet Capacity (Mbps) 65 - 93 105 - 150 131 - 188 167 - 239 221 - 315 264 - 377 313 - 448 337 - 482
Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM
QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM
3/8/2010
32QAM
128QAM
256QAM
All Ethernet 20 E1s + Ethernet 44 E1s + Ethernet 66 E1s + Ethernet 75 E1s + Ethernet
170Mbps
200Mbps
20 E1s + 123Mbps 20 E1s + 154Mbps 44 E1s + 67Mbps 66 E1s + 15Mbps 44 E1s + 98Mbps 66 E1s + 47Mbps 75 E1s + 25Mbps
nXT1/E1
?
99.99 %
Less availability can be accepted for many data services Need for Services Classification : Microwave systems shall treat services in different ways
10
3/8/2010
Fewer Hops
1km
2km
3km
Optional solution for several planning constrains Example - Reducing Hops count until reaching fiber site
11
Proprietary and Confidential
Throughput (Mbps)
400
Availability (%)
99.999
Unavailability of modulation
4min, 28sec
Outage 5 minutes and 15 seconds QPSK 8PSK 16QAM 32QAM 64QAM 128QAM 256QAM (1) 256QAM (2) Assumed rain zone K, 23 [GHz] band
Proprietary and Confidential
5min, 3sec 9min, 3sec 11min, 4sec 16min, 42sec 24min, 35sec 37min, 35sec 55min, 33sec 1hr,18min, 13sec Source: Ceragon Networks
3/8/2010
Upgrade to 4E1 + 40Mbps Ethernet 5 TIMES THE CAPACITY SAME ANTENNAS Same 7MHz channel QPSK 256QAM with ACM 99.999% availability for the E1s Low cost, scalable, pay as you grow
13
14
Agenda
MSE Definition Expected value The Error Histogram Giving bigger differences more weight than smaller differences Calculating MSE MSE in digital modulation Commissioning with MSE MSE and ACM
MSE - Definition
MSE is used to quantify the difference between an estimated (expected) value and the true value of the quantity being estimated MSE measures the average of the squared errors: MSE is a sort of aggregated error by which the expected value differs from the quantity to be estimated. The difference occurs because of randomness or because the receiver does not account for information that could produce a more accurate estimated RSL
To simplify.
Imagine a production line where a machine needs to insert one part into the other Both devices must perfectly match Let us assume the width has to be 10cm wide We took a few of parts and measured them to see how many can fit in.
Expected value
3 3 1 2
width 6cm 7cm 10cm 12cm 16cm
To evaluate how accurate our machine is, we need to know how many parts differ from the expected value 9 parts were perfectly OK
5
Proprietary and Confidential
Error = 0 cm
To evaluate the inaccuracy (how sever the situation is) we measure how much the errors differ from expected value
We convert all errors to absolute values and then we square them The squared values give bigger differences more weight than smaller differences, resulting in a more powerful statistics tool: 16cm parts are 36 units away than 2cm parts which are only 4 units away
7
Proprietary and Confidential
Calculating MSE
Quantity
Error = 0 cm
To evaluate the total errors, we sum all the squared errors and take the average: 16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13
The bigger the errors (differences) >> the bigger MSE becomes
8
Proprietary and Confidential
Calculating MSE
Quantity Error = 0 cm
width 10cm If all parts were perfectly produced than each error would be 0 This would result in MSE = 0
11
10
The graph shows the expected values (constellation) of the received signal (RSL)
10
Q 01 00
11
10
Similarly to the previous example, we can say that the bigger the errors are the harder it becomes for the receiver to detect & recover the transmitted signal
11
Q 01
e2
00
e1
I
e4 e3 When MSE is very small the actual signal is very close to the expected signal
11
10
12
Q 01
e2
00
e1
When MSE is too big, the actual signal (amplitude & phase) is too far from the expected signal
I
e4 e3
11
10
13
When you commission your radio link, make sure your MSE is small (-37dB)
14
16
3/14/2010
RFUC&MediationDevices
Carrier Ethernet
IP-10 IP-MAX2 3200T
Multi-Service
RFU-HP IP-10 IP-MAX2 640P CeraView (EMS) RFU-P, RFU-SP 1500R/1500P
TDM
3200T
2
Proprietary and Confidential
3/14/2010
RFU-C
IP-10
RFU-P, RFU-SP
1500R
RFU-HP
IP-IP-MAX2
RFU-SP 640P
1500P
3
Proprietary and Confidential
IP-10 IP 10
IP-10
1500P
1500R
IP-MAX/IP-MAX2
IP-10
1500P chassis Cannot House 1500R IDC and IDMs 1500R chassis Cannot House 1500P IDC and IDMs Must Match IDU Type Across a Link
4
Proprietary and Confidential
3/14/2010
1+0 direct
5
Proprietary and Confidential
6
Proprietary and Confidential
3/14/2010
1+0 remote
7
Proprietary and Confidential
8
Proprietary and Confidential
3/14/2010
Adaptors for RFU-P direct antenna mount Adaptors for NSN Flexi Hopper direct antenna mount Adaptors for Ericsson R1A 23GHz direct antenna mount Remote adaptors and configurations
9
Proprietary and Confidential
10
Proprietary and Confidential
3/14/2010
(R1A 23GHz)
11
Proprietary and Confidential
Connect the headset to AGC monitor BNC/TNC connector on ODU Connect Digital Volt Meter (DVM) to the AGC BNC connector Align the antenna until voltage reading is achieved (1.2 to 1.7Vdc) Repeat antenna alignment at each end until the minimum dc voltage is achieved
3/14/2010
Compare achieved RX level to calculated RX level Keep aligning until the achieved level is up to 4 dB away from the calculated received signal level If voltage reading is more than 4 dB away or higher than 1.7vdc, re-align antenna to remote site
13
Proprietary and Confidential
14
Proprietary and Confidential
GUI Example)
Lets go over the front panel connections of the IP-10 G-Series We shall explain them one by one, left to right
2
DB9 Craft Line Interface (CLI) Baud: 115200 Data bits: 8 Parity: None Stop bits: 1 Flow Control: None
3
Proprietary and Confidential
Engineering Order Wire To communicate with your colleague on the other side of the radio link, simply connect here your headset
External Alarms
DB9 Dry Contact External Alarms The IP-10 supports 5 input alarms and a single output alarm The input alarms are configurable according to:
1) Intermediate, 2) Critical, 3) Major, 4) Minor and 5) Warning
LED Indications
LINK:
GREEN radio link is operational ORANGE - minor BER alarm on radio RED Loss of signal, major BER alarm on radio
IDU:
GREEN IDU functions ok ORANGE - fan failure RED Alarm on IDU (all severities)
RFU:
GREEN RFU functions ok ORANGE Loss of communication (IDU-RFU) RED ODU Failure
LED Indications
PROT:
Main unit GREEN (when there no alarms) STBY unit: YELLOW (when there no alarms) ORANGE Forced switch, Protection lock RED physical errors (no cable, cable failure) OFF Protection is disabled, or not supported on device
RMT:
GREEN remote unit OK (no alarms) ORANGE minor alarm on remote unit RED major alarm on remote unit
Two software-selectable user channels (RJ-45): A single synchronous channel OR two asynchronous channels Each asynchronous channel will make use of its own RJ-45 external interface The synchronous channel mode will make use of both interfaces (acting as a single interface)
8
Proprietary and Confidential
Modes of operation: V.11 Asynchronous (9600bps) RS-232 Asynchronous (9600bps) V.11 Synchronous Co-Directional (64Kbps) V.11 Synchronous Contra Directional (64Kbps)
9
Proprietary and Confidential
Allowed configurations: Two RS-232 Asynchronous UCs (default) Two V.11 Asynchronous UCs One RS-232 Asynchronous UC, and one V.11 Asynchronous UC One V.11 Synchronous Co-Directional One V.11 Synchronous Contra Directional UC > All settings are copied to Mate when working in Protected mode
10
Proprietary and Confidential
Protection Port
Protection Port (only for standalone units) Protect your Main unit with a STBY unit Protection ports on both units deliver the proprietary protocol to support automatic or manual switchover
The FE protection port is static (only used for protection, not traffic). Its switching is performed electrically. If the unit is a stand-alone, an external connection is made through the front panel. If the unit is connected to a backplane, the connection is through the backplane, while the front panel port is unused.
11
Proprietary and Confidential
An optional STM-1 interface card can be inserted in a dedicated slot in the system; the card can transmit and receive up to 63 E1s in a channelized STM-1 signal. The supported mapping is VC4 only: VC-12->TU-12->TUG-2->TUG-3->VC-4->AU-4->AUG The STM-1 T-card is only supported in unprotected main units or in unprotected stand-alone IDUs
13
Proprietary and Confidential
GbE Ports
Two GbE ports, each port with 2 physical interfaces: Port #1: optical (SFP transceiver) or electrical Port #2: optical (SFP transceiver) or electrical
GbE ports support QoS as in IP-10 (scheduler, policers, shaper, classifiers)
Port #2
14
Proprietary and Confidential
Port #1
FE Ports
5 FE ports: Port 3: Port 4: Port 5,6 &7: Data Data or WSC (2 Mbps Wayside Channel) Data or local management
15
16
XC operation is implemented using two-unit backplanes, which provide the interconnectivity. Up to three backplanes, consisting of six IDUs, can be stacked to provide an expandable system
17
Proprietary and Confidential
The 2 lower units can be configured as Main units. The role an IDU plays is determined during installation by its position in the traffic interconnection topology
18
Proprietary and Confidential
Thank You !
training@ceragon.com
10
FibeAirIP10GSeries
Installation
General
If installation requires CFG file upload & download and / or SW file upload & down -
1. 2. 3.
Make sure FTP Server is installed on your PC FTP is configured (RD/WR permissions) Latest SW version is available (FTP root directory)
1
Ceragon - Training - Handbook - Page 62
Agenda
Site Requirements Packing & Transportation Unpacking Required Tools q IDU Dimensions Installing standalone IDU in a 19 Rack Installing Nodal Enclosures in a 19 Rack Preparing the IDU for a Shelf installation Installing the IDU in a Shelf Installing a Blank Panel IDU in a Shelf Installing a T-Card into an IDU Grounding the IDU Lightning Protection Power General Requirements Installing the IDU-ODU IF cable
Site Requirements
IDU must be located indoors The environment temperature must be between -5 C and +45 C. Easily accessible, but only by authorized personnel. Available power source of -48 VDC, and the site must comply with National Electric Code (NEC) standards. Available management connection (Ethernet or dial-up). IDU-ODU connection (IF cable): no more than 300m
2
Ceragon - Training - Handbook - Page 63
Site Requirements
Heat Dissipation:
The IP-10 IDU overall heat dissipation is 25W max (~85 BTU/h). The ODU heat dissipation is 100W max. p
Antenna Location:
As with any type of construction, a local permit may be required before installing an antenna. It is the owners responsibility to obtain any and all permits.
3
Ceragon - Training - Handbook - Page 64
Unpacking
A single FibeAir system (1+0) is shipped in 5 crates.
Upon delivery, make sure that the following items are included: Two indoor units and accessories Two outdoor units For 13-38 GHz systems, verify that there is a high RFU and low RFU. One CD with a management user guide.
Unpack the contents and check for damaged or missing parts. If any part is damaged or missing, contact your local distributor.
Required Tools
The following tools are required to install the IDU:
Philips screwdriver #2 (for mounting the IDU to the rack and grounding screw) Flathead small screwdriver (for PSU connector) Sharp cutting knife (for wire stripping) Crimping tool for ground cable lug crimping (optional: if alternative grounding cable is used)
Setting up Management will require ETH cable (for setting management) Serial Cable (for setting management)
8
Proprietary and Confidential
4
Ceragon - Training - Handbook - Page 65
Specifications
Connector spec, cable spec & interface pin layout can be found in our complete PDF installation guide
IDU Dimensions
42.60mm
10
5
Ceragon - Training - Handbook - Page 66
As shown in the illustration, four screws, supplied with the installation kit, are used to secure the IDU to the rack kit rack.
11
12
6
Ceragon - Training - Handbook - Page 67
Start the installation process from bottom to top, e.g. Main enclosure should be installed first at the bottom of your rack space
13
Proprietary and Confidential
14
7
Ceragon - Training - Handbook - Page 68
15
16
8
Ceragon - Training - Handbook - Page 69
17
18
9
Ceragon - Training - Handbook - Page 70
19
20
10
Ceragon - Training - Handbook - Page 71
21
22
11
Ceragon - Training - Handbook - Page 72
23
24
12
Ceragon - Training - Handbook - Page 73
25
Lightning Protection
For antenna ports, lightning protection is used that does not permit transients of a greater magnitude than the following: Open Circuit: 1.2-50us 600V Short Circuit: 8-20us 300A The ampacity of the conductor connecting the IDU frame to the DC return conductor is equal to or greater than, the ampacity of the associated DC return conductor.
26
13
Ceragon - Training - Handbook - Page 74
27
Power Requirements
When selecting a power source, the following must be considered: DC power can be from -40.5 VDC to -60 VDC. Recommended: Availability of a UPS (Uninterrupted Power Source), battery backup, and emergency power generator. Whether or not the power source provides constant power (i.e., power is secured on weekends or is shut off frequently and consistently). The power supply must have grounding points on the AC and DC sides. Th user power supply GND must be connected to the positive pole i th IDU The l tb t d t th iti l in the power supply. Any other connection may cause damage to the system!
28
14
Ceragon - Training - Handbook - Page 75
Power Requirements
Important Make sure to use a circuit breaker to protect the circuit from damage by short or overload.
29
30
15
Ceragon - Training - Handbook - Page 76
ThankYou!
training@ceragon.com
16
Ceragon - Training - Handbook - Page 77
FibeAirIP10GSeries
Setting Management
Agenda
Getting started General notes General commands Command history y Reading current IP Setting new IP Connecting PC to IDU Troubleshooting Factory Defaults
2
Proprietary and Confidential
Getting started
Verify that physical installation is successfully completed: IDU is properly mounted in a shelf / rack Power + GND IF Cable between IDU and ODU Connect a PC to the Terminal connector and launch a serial application
Baud: 115200 Data bits: 8 Parity: None St bit 1 Stop bits: Flow Control: None
Log on using (admin/admin) for user name and password. Now, you should be able to see the IP-10 CLI Prompt
3
Proprietary and Confidential
IP-10:/>
Most of the CLI commands are based on GET/SET concept Some commands may require a different syntax Ceragon strongly recommends to use CLI only for setting management IP address when current IP is unknown All functions & features can be configured faster and easier using the WEB based EMS
4
Proprietary and Confidential
General Commands
IP-10:/ >? IP-10:/ls IP-10:/lsp IP-10:/ > exit / IP-10:/ > cd IP-10:/ > cd ..
Type ? (question mark) to list helpful commands Type ls to list your current directory Type lsp to available commands of current directory Type exit to terminate the session Type cd to change directory Type cd .. to return to root directory
5
Proprietary and Confidential
Command History
6
Proprietary and Confidential
Reading current IP
To read current IP type the following:
Setting new IP
Now, let us set a new IP for the MNG: We assume the required IP is 192.168.1.144 Type set ip-address 192.168.1.144
IP-10:/ management/networking/ip-address>set ip-address 192.168.1.144
You may lose remote management connection to the unit if this value is changed incorrectly. Are you sure? (yes/no):
Type yes and connect the IDU to your network / PC
8
Proprietary and Confidential
9
Proprietary and Confidential
Management Troubleshooting
In case PC cannot PING IDU 1. Check your ETH cable it might not be inserted properly (broken PIN) 2. Verify the management port is enabled in the EMS General/Management configuration 3. Make sure you connect to a management-enabled port (7, 6 or 5) 4. Verify right LED is ON (see below) 5. Verify your PC is in the same subnet as the IDU 6. In case your IDU is connected to a router: set the IDUs Default GW = Router IP 7. In case your PC is connected to several IDUs (through switch/hub) make sure every IDU has a unique IP When ON (Green) = Port is set to Management When OFF = Port is set to Data
10
Proprietary and Confidential
IP-10:/> cd management/mng-services/cfg-service
IP-10:/management/mng-services/cfg-service>set-to-default
11
Proprietary and Confidential
ThankYou!
training@ceragon.com
3/7/2010
Agenda
EMS General Information Faults: Current Alarms Event Log PM & Counters: Remote Monitoring TDM Trails TDM interfaces Radio (RSL, TSL, MRMC and MSE) Radio TDM Radio ETH
2
Proprietary and Confidential
3/7/2010
EMS - General
Easy, user friendly GUI No need to install an application WEB Based software No need to upgrade your EMS application embedded in the IDU SW No need for strong working station simple PC is sufficient
(For maintenance issues FTP Server is required)
Easy access simply type the IP address of the IDU on your web page Supports all IDU versions and configurations
3/7/2010
3/7/2010
3/7/2010
Faults - CAS
The CAS window shows collapsed list of alarms By expanding a line we can see additional information: Probable cause Corrective Actions
3/7/2010
PM RMON
The system supports Ethernet statistics counters (RMON) display. The counters are designed to support: RFC 2819 RMON MIB.
RFC 2665 Ethernet-like MIB. RFC 2233 MIB II. RFC 1493 Bridge MIB.
3/7/2010
Display 15 minutes intervals or single Daily interval (24 hours) Information can be displayed as a graph
3/7/2010
3/7/2010
3/7/2010
10
3/7/2010
11
3/7/2010
PM STM-1 Interface
This PM data relates to the STM-1 Line Interface.
12
3/7/2010
PM Radio
Signal Level RSL & TSL analysis Allows setting RSL & TSL thresholds EMS will notify when signal exceeds THSLD >> Easier maintenance
Aggregated radio traffic analysis MRMC PM related to ACM: Scripts Bit rate Radio VCs MSE analysis
Proprietary and Confidential
- 40dBm = Nominal RSL for an operational Link Level 1: 25 sec Level 2: 15 sec 900 sec = 15min Interval
Proprietary and Confidential
13
3/7/2010
RSL -40
-50
-68
-99 10 5 10
T [sec]
PM Radio - Aggregate
Aggregated radio traffic analysis
14
3/7/2010
PM Radio - MRMC
The information displayed in this page is derived from the license and script assigned to the radio. When ACM is enabled and active, as link quality degrades or improves, the information is updated accordingly.
PM Radio - MSE
The information displayed in this page is derived from the license and script assigned to the radio. When link quality degrades or improves, the MSE reading is updated accordingly. Differences of 3dB trigger ACM modulation changing. Threshold can be configured as well for easier maintenance.
15
3/7/2010
PM Ethernet
ETH Traffic + Threshold settings: Frame Error Rate Frame error rate (%) measured on radio-Ethernet interface Throughput data bits measured on radioEthernet interface Capacity - overall Ethernet bits rate, data & overhead, measured on radio-Ethernet interface Utilization - (Actual Ethernet throughput, relative to the potential Ethernet throughput of the radio, excluding TDM channels). Utilization (%) is displayed as one of five bins: 0-20%, 20-40%, 40-60%, 60-80%, 80-100%
Proprietary and Confidential
PM Ethernet
Ethernet throughput & Capacity PMs are measured by accumulating the number of Ethernet octets every second, as they are counted by the RMON counters
16
3/7/2010
33
17
3/7/2010
Agenda
In this module we shall explain the following features as they appear on the EMS navigation Menu
3/7/2010
Configure specific information that may assist you later Such info will help you locate your site easier and faster
VDC reading
3/7/2010
By default the time & date are derived from the operating system clock User may set new values These settings are also used for NTP connection (later explained)
3/7/2010
Versions
This page shows the complete package of IDU and ODU software components
8
Proprietary and Confidential
3/7/2010
Versions
Lets explore this example: The IDU running SW is displayed in the aidu line and currently it is 3.0.92 A new SW was downloaded sometime in the past (3.0.97) The IDU was not upgraded yet
The IDU holds all the SW files for all the components (IDU + ODU) You can see here the different files per ODU type
10
3/7/2010
12
3/7/2010
13
14
3/7/2010
The IDU has 3 ports for local management: Port 7, Port 6 and Port 5. You may enable none or up to 3 ports: Number of ports =3 Number of ports =2 Number of ports =1 Number of ports =0
15
In Band Management requires unique VLAN ID This helps separating MNG traffic from other services In Band MNG packets are transferred via the radio link When the link is down, management is down as well.
16
3/7/2010
These parameters allow you setting the management capacity and port properties
17
To manage the IDU with OSS / NMS, you will need to configure the IP address of the OSS Server You may configure up to 4 Servers (Trap Destinations)
18
3/7/2010
19
Demo License allows you full evaluation of the IDU functionality, features and capacities
20
10
3/7/2010
21
NTP Properties
22
11
3/7/2010
NTP Properties
When using NTP with external protection 1+1, both Active and Standby units should be locked independently on the NTP server, and report independently their Sync status.
Time & Date are not copied from the Active unit to the Standby unit (CQ19584) When using NTP in a shelf configuration, all units in the shelf (including standby main units) are automatically synchronized to the active main units clock.
23
IP Table
24
12
3/7/2010
SNMP
V1 V3
25
26
13
3/7/2010
Agenda
1. Switch mode review 2. Guidelines 3. Single Pipe Configuration 4. Managed Mode Configuration 5. Managed Mode Common Applications
3/7/2010
Switch Modes
1. Single (Smart) Pipe (default mode, does not require license)
This application allows only single GbE interface as traffic interface (Optical GbE-SFP or Electrical GbE - 10/100/1000). Any traffic coming from any GbE interface will be sent directly to the radio and vice versa. This application allows QoS configuration. Other FE (10/100) interfaces can be configured to be "functional" interfaces (WSC, Protection, Management), otherwise they are shut down. Note: (CQ20473): Single pipe discards PAUSE PDU (01-80-C2-00-00-01) and Slow protocols PDU (01-80-C2-00-00-02).
Switch Modes
2. Managed Mode (license depended)
This application is 802.1Q VLAN aware bridge, allowing L2 switching based on VLANs. This application also allows QoS configuration. All Ethernet ports are allowed for traffic. Each traffic port can be configured to be "access" port or "trunk" port:
Type
VLANs Specific VLAN should be assigned to access the port A range of VLANs should be assigned to access the Port
Allowed Ingress Frames Only Untagged frames (or Tagged with VID=0 "Priority Tagged ) Only Tagged frames
Access
Trunk
Tagged frames
3/7/2010
Switch Modes
3. Metro Mode (license depended)
This application is 802.1Q VLAN aware bridge, allowing Q-in-Q (A.K.A. VLAN Stacking). This mode allows the configuration of a PE port and CE port.
Allowed Ingress Frames Allowed Egress Frames Untagged or C-tag (ether-type= 0x8100) frames. Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200
Type CustomerNetwork
VLANs
Specific S-VLAN should be Untagged frames, or assigned to "Customerframes with C-tag Network" port (ether-type=0x8100). Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200
Proprietary and Confidential
ProviderNetwork
Guidelines
Changing switch modes requires a reset Resets do not change the IP-10G settings (radio, configuration, etc.) VLANs need to be created in the switch DB before assigned to a port
3/7/2010
IP-10 Switch
Port 8 (Radio)
3/7/2010
When one is enabled the other is disabled No need to configure VID membership
10
Proprietary and Confidential
3/7/2010
IDU-B IDU-A
12
3/7/2010
13
14
3/7/2010
2 3
4
15
Proprietary and Confidential
IP-10
Access Port Radio = Trunk Port Transmits and receives Untagged frames
PC
192.168.1.200
PC
192.168.1.100
16
3/7/2010
IP-10
Trunk Port
Traffic Generator
Trunk Port
17
18
3/7/2010
Agenda
1. VLAN TAG Attributes 2. Access Port 3. Trunk Port 4. Extracting frames out of a trunk 5. General Guidelines 6. EMS Trunk Configuration
3/7/2010
2. 3.
4. 5. 5.
3
Access Port
Access Port is a port which is aware of a single VLAN only Ingress traffic is expected to be Untagged, e.g. no VLAN information exists within the received Ethernet frame All frames that are received through this port are tagged with default VLAN (VID + P bits) All frames that exit through this port towards customer devices are untagged (VLAN is removed) Users can configure the L2 switch to assign different tagging scenarios to different ports
3/7/2010
Access Port
Let us examine the Tagging / Untagging process of a L2 switch
L2 ETH SW
DA
SA
Type
Payload
FCS
Tagging
Port #1
DA SA VLAN TAG
Port #8
Type Payload FCS
Tagged frame
DA SA Type Payload FCS
3/7/2010
Access Port
Utagging frames towards customer interfacing ports
When Tagged frame from Network is forwarded to Access port, the VLAN Tag is removed
Untagging
Port #1
DA SA VLAN TAG
Port #8
Type Payload FCS
Tagged frame
DA SA Type Payload FCS
Tagging
DA
3/7/2010
Trunk Port
DA
Port #8 Port #2
DA DA DA SA VLAN TAG = 10 Type Type Payload Payload FCS FCS SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS
3/7/2010
DA
SA
DA
SA
VLAN TAG = 10
Type Type
Payload Payload
FCS FCS
General guidelines
Access port can only receive untagged frames from customer device Access port can only transmit untagged frames towards customer device Access port supports single VLAN Access port can be connected to an Access port only Trunk port can only receive / transmit tagged frames Trunk port supports multiple VLANs Trunk port can be connected to a Trunk port only When configuring Access or Trunk port, membership needs to be defined next (which VLANs are supported)
12
3/7/2010
2 3
4
13
Ceragon Networks proprietary and confidential
14
3/7/2010
Agenda
1. Metro mode review 2. Common Applications: CN PN PN CN 3. Common Applications: CN PN PN PN 4. Switch Mode Configuration 5. CN Port Configuration 6. PN Port Configuration
3/7/2010
Specific S-VLAN should be Untagged frames, or assigned to "Customerframes with C-tag Network" port (ether-type=0x8100). Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200
ProviderNetwork
Common Configurations: CN PN PN CN
Provider-Facing Port (PN) 1st VID is hidden Only S-VLAN is visible
Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite direction
Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite direction
Proprietary and Confidential
3/7/2010
Common Configurations: CN PN PN PN
Provider-Facing Port (PN) 1st VID is hidden Only S-VLAN is visible
Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite direction Provider-Facing Port (PN) S-VLAN is not removed
2
1. Set mode to Metro (requires reset) 2. Add the S-VLAN ID (set & apply)
3/7/2010
CN Port Configuration
1. Go to Interfaces / Ethernet Ports page 2. Enable the port 3. Set the type to Customer Network 4. Type the port ID (EVC name, free string) 5. Type the S-VLAN ID 6. Enable Port Learning 7. Apply & Refresh 8. See screen capture next slide
7
Proprietary and Confidential
CN Port Configuration
2 1 4 5 3
6
8
Proprietary and Confidential
3/7/2010
PN Port Configuration
1. Go to Interfaces / Ethernet Ports page 2. Enable the port 3. Set the type to Provider Network 4. Enable Port Learning 5. Edit (if needed) the allowed S-VLANs 6. Apply & Refresh 7. Set the required S-Tag (Ether-Type) 8. See screen capture next slide
9
Proprietary and Confidential
PN Port Configuration
2 1 1 4 6 5
10
Proprietary and Confidential
3/7/2010
11
12
3/7/2010
Agenda
Student Perquisites General Overview Limitations Site / Node Types Switchover Criteria In Band Management Out of band Management Configuration Example
2
Proprietary and Confidential
3/7/2010
Student Perquisites
Viewers / end-user are required to have previous experience prior to practicing this module:
1. End users should be familiar with Switch configuration 2. Be End users should be familiar with setting port membership 3. End users should be familiar with management mode configuration 4. End users should be familiar with configuring Automatic State Propagation
General Overview
Ceragon Networks ring solution enhances the RSTP algorithm for ring topologies, accelerating the failure propagation relative to the regular RSTP: Relations between Root and Designated bridges when ring is converged in the first time is the same as defined in the standard RSTP. Ring-RSTP itself is different than classic RSTP, as it exploits the topology of the ring, in order to accelerate convergence. Ethernet-Fast-Ring-RSTP will use the standard RSTP BPDUs: 01-80-C2-00-00-00. The ring is revertible. When the ring is set up, it is converged according to RSTP definitions. When a failure appears (e.g. LOF is raised), the ring is converged. When the failure is removed (e.g. LOF is cleared) the ring reverts back to its original state, still maintaining service disruption limitations. RSTP PDUs coming from Edge ports are discarded (and not processed or broadcasted).
4
Proprietary and Confidential
3/7/2010
3/7/2010
3/7/2010
10
3/7/2010
External xSTP switch should be used in order to gain resilient management, and resolve the management loops.
11
12
3/7/2010
Configuration Example
13
Proprietary and Confidential
Site #2
3 4 5 6 7
Site #3
3 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 4 5 6 7
Establish the physical connections according to the setup scheme. Leave one link disconnected to avoid loops (for example: site #3 to site #2) Configure In-Band MNG using VLAN #200 (or other) on all main IDUs
14
Proprietary and Confidential
3/7/2010
Site #2
3 4 5 6 7
Site #3
3 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 4 5 6 7
Connect extension IDUs (port #3) to Main IDUs (port #3 & port #4, members of VID #200). Use ETH cross-cables. Configure Port 3 (& port 4 of site #2) of Main units as trunks members of VID 200 to transport the management packets
15
Proprietary and Confidential
Site #2
3 4 5 6 7
Site #3
3 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 4 5 6 7
Disconnect IDUs from Switch (except for GW IDU) Enable RSTP on all Managed Switches (Main) PING EMS to all Sites Connect the broken radio link (site #1 to Site #3)
16
Proprietary and Confidential
3/7/2010
Use the EMS to learn which switch is the Root Bridge and which ports are the Root Ports. Verify that the ring is set up properly (one Root)
17
Proprietary and Confidential
Identify the Edge Ports and Non-Edge ports in your scheme and make sure they are configured the same in your setup
18
3/7/2010
Identify the Edge Ports and Non-Edge ports in your scheme and make sure they are configured the same in your setup
19
Proprietary and Confidential
20
10
3/7/2010
21
22
11
3/8/2010
Agenda
Introduction Why do we need QoS? Not all Traffic are the same Traffic Engineering as a solution QoS in IP-10
3/8/2010
Introduction (1)
IP-10 is more than a Radio:
ADM
L2 ETH SW
L2 ETH Switch:
802.1p/q P-Bit remap Policers Shaping Scheduler IPv4 / IPv6 Classification
MW Radio
Proprietary and Confidential
Introduction (2)
In this presentation we shall focus on the QoS implemented with the integrated L2 ETH switch
But first, let us understand what does Quality Of Service stands for
ADM MW Radio
L2 ETH SW
3/8/2010
Understanding QoS
3/8/2010
Business center
WiMAX / 4G / LTE Cellular site WiMAX Ceragon TDM E1/T1 2G/3G base station Hub / Aggregation site Ceragon
GE
STM-1 / OC-3
Fundamental Fact
Dynamic WWW Static WWW
Multimedia
emails FTP
Skype
Whos first?
8
Proprietary and Confidential
3/8/2010
emails
What is the delay sensitivity of each service?
Delayed Voice is inacceptable FTP can tolerate delays
FTP Skype
QoS in IP-10
3/8/2010
Port #1 GbE (Opt. / Elec.) Port #2 GbE (Opt. / Elec.) Port #3 to port #7 FE Port #8 (Radio port)
11
QoS Process
Q4
25 10 50
Q4 Q3 Q2
Q1
Rate Limit
Queuing
Scheduling
Shaping
Ingress Port
12
3/8/2010
FE Max. Rate
100Mbps
25 10 50
Discard Pass
Using Queues
Every port of the L2 switch examines the ingress traffic and then it sorts it in a buffer according to classification criteria This process is called Queuing Users can configure up to 4 queues for max. resolution of priorities
Q4 Q3 Q2 Q1
14
Proprietary and Confidential
High
Low
3/8/2010
Custom Queuing
Scheduling
Egress Queuing
15
Scheduling (1)
Once the queues are filled with information, we need to empty them Which queue should we empty first? Round-Robin: Emptying cycle is fixed all queues are treated equally
Q4 Q3 Q2 Q1
16
High
Q4 Q1
Low
Q3
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
Q2
Pro: no queue starvation Con: no prioritization
3/8/2010
Scheduling (2)
Weighted Round-Robin: Emptying cycle is configurable every queue can be given specific weight
Q4 Q3
High
Q4 Q1
Q2 Q1
17
Q4 Q3 Q2
Pro: no queue starvation
Q3 Q4 Q4 Q1 Q2 Q3 Q4 Q4
Low
Proprietary and Confidential
Scheduling (3)
4th Strict Priority: The switch will empty Q4 as long as it has something Once empty switch will perform RR on lower queues If Q4 receives a frame during the Lower-Queues-RR, it will go back to focus on Q4
Q4 Q3 Q2 Q1
18
High
Q1 Q2
Low
Q3
Q3 Q4 Q4 Q1 Q2 Q3 Q4 Q4
3/8/2010
Scheduling (4)
All Strict Priority: The switch will empty a queue as long as the higher queue is empty
Q4 Q3
High
Q3
Q4
Q4
Q1
Q2
Q3
Q4
Q4
Low
Proprietary and Confidential
Shaping
Bursts beyond a EIR (Excessive Information Rate) can be buffered and retransmitted when capacity frees up, and only when shaping buffers are full will packets be dropped.
20
10
3/8/2010
21
11
3/7/2010
Perquisites
End-users must be familiar with the following items prior to taking this module:
Introduction to Ethernet 802.1p/q QoS (Concept) IP-10 Switch Configuration Trunk VS. Access
2
Proprietary and Confidential
3/7/2010
Agenda
Introduction IP-10 L2 Switch ports Step #1: Configure the switch Step #2: Configure the switch ports Step #3: Configure QoS per port Process Review Basic Configurations
Introduction (2)
In this presentation we shall focus on the L2 ETH switch:
Four priority (CoS) queues Advanced CoS classifier: VLAN Pbits / VLAN ID (RFC 802.1p,q) IPv4 (RFC 791) / IPv6 (RFC 2460, RFC 2474) MAC DA Advanced ingress traffic policing / rate-limiting per port/CoS Flexible scheduling: Strict Priority, WRR or HRR Traffic shaping 802.3x flow control (for loss-less) operation
ADM MW Radio
Proprietary and Confidential
L2 ETH SW
3/7/2010
Port #1 GbE (Opt. / Elec.) Port #2 GbE (Opt. / Elec.) Port #3 to port #7 FE Port #8 (Radio port)
3/7/2010
3/7/2010
Process Review
25 10 50
Rate Limit
10
Proprietary and Confidential
3/7/2010
Queuing
11
Q4 Q1 Q2
Q4 Q3
Scheduling
12
3/7/2010
Shaping
13
Basic Configurations
3/7/2010
Lets say we want to limit Video streams from customer interface towards the network Video streams are characterized with a UDP protocol & multicast address Therefore we shall define a Policer to limit these parameters
15
16
3/7/2010
17
Using this table we can map 8 priority levels to 4 queues or lower number of classes This table is global and can be used for other tasks as well
18
3/7/2010
19
In this example, we prioritize 3 frames according to their MAC DA. The ingress frames are put in a queue according to the Priority settings and VLAN P-Bits to Queue table. Ingress frames with MAC DA that are not listed in this table will be handled by the next classifiers .
20
10
3/7/2010
Frames with MAC that do not comply to the table will be classified by the 2nd & 3rd classifiers
21
Proprietary and Confidential
Click on the IP Pbits to Queue Link to configure ToS /DSCP for IPv4 or IPv6
22
11
3/7/2010
23
24
12
3/7/2010
25
Frames with VID that do not comply to the table will be classified by the 3rd classifier
26
Proprietary and Confidential
13
3/7/2010
7. Egress Shaper
Reducing the egress rate to a value between 64kbps and 1Mbps requires
setting it in steps of 64kbps
Reducing the egress rate to a value between 1Mbps and 100Mbps requires
setting it in steps of 1Mbps
Reducing the egress rate to a value between 100Mbps and 1Gbps requires
setting it in steps of 10Mbps
27
Proprietary and Confidential
28
14
3/7/2010
Agenda
VLAN P-Bit Re-Map Why? Configuring the Re-Map Table Queuing without Re-Map Queuing with next classifier + Re-Map Queuing + Re-Map IP ToS over VLAN P-Bits VLAN P-Bits over IP ToS Using more than a single Classifier
2
Proprietary and Confidential
3/7/2010
Customer network
L2 Switch (IP-10)
Proprietary and Confidential
Provider network
3/7/2010
Egress Scheduler
Egress Shaper
VID
P-bit
Egress Scheduler
Egress Shaper
VID
P-bit*
3/7/2010
Egress Scheduler
Egress Shaper
VID
P-bit*
Conditional Classification
3/7/2010
L2 Tagged ETH
L3 IP Header
L2 Tagged ETH
L3 IP Header
10
3/7/2010
11
otherwise -
2nd criteria: VLAN ID 100 100 100 100 200 Highest Highest Highest Highest Lowest
VID = ?
2 0 Lowest
3/7/2010
13
3/7/2010
IP-10
IP-10
RSL MSE
Max. TSL Max. allowed Transmission Signal [dBm] Monitored TSL Actual Transmission level [dBm]
3/7/2010
ATPC
Static transmission set to max. may reduce lifetime of Transmitter Side-lobes may affect nearby Receivers (image) Main Lobe Side Lobe
3/7/2010
TSL Adjustments
ATPC module
Ref. RSL
Feedback
Site A
3/7/2010
ATPC module
Radio
Ref. RSL
Feedback
Site A
ATPC module
Radio
Ref. RSL
Feedback
Site A
3/7/2010
When Adaptive TX is disabled: Maximum TX power is limited by the highest modulation configured in the MRMC ACM script. In other words, when link suffers signal degradation, modulation may change from 256QAM to QPSK. However, Max. power will be limited to the value corresponding as Max. TX in 256QAM.
When Adaptive TX is Enable: When link suffers signal degradation, modulation may change from 256QAM to QPSK. However, Max. power will increase to compensate for the signal degradation.
10
3/7/2010
11
12
3/7/2010
The Effective Isotropic Radiated Power (EIRP) is the apparent power transmitted towards the receiver assuming that the signal power is radiated equally in all directions 13
Proprietary and Confidential
Configuration
3/7/2010
Radio frequencies can be set locally or on remote unit as well (assuming links is up)
Enable / Disable Min. target RSL (local) Enable = no transmission Value depends on MRMC settings Encryption: must be identical on both IDUs
15
16
3/7/2010
When the radio link is up, you can configure certain parameters on the remote unit: Make sure Remote IP is available Remote RSL can be read Remote TSL can be set (depends on remote MRMC script) Remote TX MUTE can be disabled (see next slide) Remote target RSL for ATPC can be set
17
Remote Un-Mute
Simplified scheme
Site A is transmitting
Site B
Site A
18
Proprietary and Confidential
3/7/2010
Radio Thresholds
These settings determine the sensitivity / tolerance for triggering: 1+1 HSB switchover Ethernet Shutdown PM generated alarms
19
10
3/7/2010
MRMC Homepage
22
11
3/7/2010
23
24
12
3/7/2010
Agenda
Ethernet Interfaces TDM Interfaces AIS Detection AIS Signaling (STM-1) STM-1 Interface Auxiliary Channels Wayside Channel (Various Configurations)
3/7/2010
Functionality
Managed SW / Metro
Disabled / Traffic Disabled / Traffic Disabled / Traffic / Protection Disabled / Traffic / Wayside Disabled / Traffic / MNG Disabled / Traffic / MNG Disabled / Traffic / MNG Disabled / Traffic
3/7/2010
E1/DS1 port #n will be mapped to radio VC#n (n=1-16). When Trails are configured, default mapping (above) is overwritten by Trail Mapping. However, if no trails are configured (all are deleted) system will revert to the default setting. When Trail is configured and set to Operational - TDM port is activated. When Trail is configured but set to Reserved - TDM port is disabled.
3/7/2010
Up to 180 trails can be configured in a Shelf / node The number of Trails mapped to a radio depends on radio capacity (MRMC). The maximum number of radio Trails is 75 (E1) or 84 (DS1).
In case of detection, the following takes place: Signal failure is generated at the corresponding trail this will cause the far end not to receive a signal (including trail ID indications) and the trail status to show signal failure and trail ID mismatch. An indication is given to user at the proper interface. Notice that this is not a system alarm, since the problem originates elsewhere in the Network
3/7/2010
10
3/7/2010
111111111
111111111
AIS @ E1 TS
11
Proprietary and Confidential
AIS @ STM V5
12
3/7/2010
Auxiliary Interfaces
EOW may be used as a simple solution for on-site communication between two technicians / installers / etc.
13
WSC Interface
WSC interface is limited to 1628 bytes. 2.048Mbps (Wide) or 64Kbps (Narrow) Consumes BW from the total link BW
Out of band Management using WSC: In this case, remote system is managed using Wayside channel. On both local & remote units, Wayside channel will be connected to management port (using cross Ethernet cable). WSC can be configured to "narrow capacity (~64kbps) or "wide" capacity (~2Mbps). It is recommended to use wide WSC in order to get better management performance, since narrow WSC might be too slow.
14
Proprietary and Confidential
3/7/2010
At least 2 management ports are needed in a local unit: One port for local management, and 2nd port that will be connected to Wayside port. On remote unit, Wayside port will be connected to management port.
15
Proprietary and Confidential
WSC port will be connected in each unit to other available management port. In remote site, each unit's Wayside port should be connected to management port.
16
Proprietary and Confidential
Active & Standby MNG ports have 2 options to be connected to the Host: Using Ethernet splitter cable connected to external switch. Using Protection "Patch Panel".
3/7/2010
17
18
3/7/2010
Agenda
Introduction Interfacing IP-10 with external devices Configuration VS. Functionality Dead Lock Example ASP in Managed / Metro Mode
3/7/2010
Introduction
Automatic State Propagation ("GigE Tx mute override") enables propagation of radio failures back to the line, to improve the recovery performance of resiliency protocols (such as xSTP). The feature allows the user to configure which criteria will force GbE port (or ports in case of remote fault) to be muted / shut down, in order to allow the network find alternative paths. The feature is not operational in "External Protection".
3/7/2010
3/7/2010
3/7/2010
TX
RX
RX
TX
TX
RX
LOC
RX
TX
1. GbE FO breaks down or disconnects at the ingress port of Site A 2. LOC alarm is raised
10
3/7/2010
TX
RX
LOC
RX
TX
1. GbE FO breaks down or disconnects at the ingress port of Site A 2. LOC alarm is raised 3. LOC alarm triggers Site A to shut down its transmitter (TX Mute)
11
TX
RX
LOC
LOC
RX
TX
1. GbE FO breaks down or disconnects at the ingress port of Site A 2. LOC alarm is raised 3. LOC alarm triggers Site A to shut down its transmitter (TX Mute) 4. Site B detects silence on ingress port and declares LOC
12
3/7/2010
TX
X X
RX
LOC
LOC
RX
TX
1. GbE FO breaks down or disconnects at the ingress port of Site A 2. LOC alarm is raised 3. LOC alarm triggers Site A to shut down its transmitter (TX Mute) 4. Site B detects silence on ingress port and declares LOC 5. Site B shuts down its transmitter both sites are in a state of a dead lock
13
Proprietary and Confidential
14
3/7/2010
15
3/10/2010
Introduction (1)
Equipment protection is possible in two configurations:
"External Protection: Achieved by using two separate boxes in standalone configuration. In this case, the IDUs must be connected by a dedicated Ethernet protection cable. Each box has its unique IP address.
1+1 protection in a shelf: In this case, main units are connected by the backplane, and there is no need for extra cable. Protection for extension units is not supported. There is one IP address for each of the main units. Except for this difference, the protection feature is identical in both cases.
3/10/2010
Introduction (2)
When a switchover occurs, and previous "Active" becomes "Standby", accessing the new "Active" will be done using its IP address A "Protection Panel" or protection split cable is designed to implement E1/DS1 splitters. Y-Split cables must be used for Ethernet signals.
3/10/2010
3/10/2010
1st IDU: Lock Protection Install 2nd IDU 2nd IDU: Enable Protection Connect ETH cross-cable between the protection ports of the two IDUs (when units are not in a shelf) Disconnect the MNG cables from both IDUs Connect ETH Y-splitter to both IDUs (to the MNG ports) Connect your MNG cable to the Y-Splitter cable and verify both IDUs can be managed Verify Active IDU shows Mate IP address
Note: The IDU, which is connected to the ODU fed by the lower attenuation channel of the RF coupler, is the IDU that should be selected as "Active". Note: The same procedure should be issued in the remote end, while installing the radio.
8
Proprietary and Confidential
3/10/2010
10
3/10/2010
Check
Main IDU: Enable Protection (MNG will be lost for 60 sec.) Main IDU: Lock Protection Power down 2nd IDU before installing it in the enclosure Install 2nd IDU Power up 2nd IDU 2nd IDU: Enable Protection Disconnect the MNG cables from both IDUs Connect ETH Y-splitter to both IDUs (to the MNG ports) Connect your MNG cable to the Y-Splitter cable and verify both IDUs can be managed Verify Active IDU shows Mate IP address
Proprietary and Confidential
Note: The IDU, which is connected to the ODU fed by the lower attenuation channel of the RF coupler, is the IDU that should be selected as "Active". Note: The same procedure should be issued in the remote end, while installing the radio.
12
Proprietary and Confidential
3/10/2010
13
3/7/2010
Introduction
3/7/2010
With Wireless SNCP, a backup VC trail can be optionally defined for each individual VC trail
Main Path
Protective Path
3/7/2010
Connecting 2 IDUs requires a nodal enclosure: Best economical future upgrade Best flexibility for network designer Easier to Install / Maintain / expand
The solution is modular and forms a single unified nodal device: Common Ethernet Switch Common E1s Cross Connect Single IP address Single element to manage
Front
3/7/2010
3/7/2010
The main unit performs the cross-connect, switching and management functions for
all the units in the node
Mandatory active main unit can be located in any of the 2 slots Optional standby main unit can be installed in other slot Switchover time <50msecs for all traffic affecting functions
M M
E E E E
Native2 2+0/XPIC
M M
3/7/2010
12
3/7/2010
8. Maximum number of Trails per Node = 180 9. Maximum number of Trails per Radio = 75 (E1) or 84 (T1) or 168 (SNCP)
13
IP-10
IP-10
Bypass site
Protected Trail
(Automatic)
IP-10
Radio Link
14
Proprietary and Confidential
3/7/2010
1 IP-10 3
Bypass site
IP-10
Interfaces #2 and #3 can be configured in a random order
2 IP-10 1
15
3/7/2010
17
In this example we selected the SDH connector. Your next step would be selecting the VC number.
18
3/7/2010
Alternatively you could choose other combinations as well: PDH to PDH PDH to Radio (above) PDH to SDH SDH to Radio SDH to Radio Radio to SDH Radio to PDH
19
Proprietary and Confidential
20
10
3/7/2010
21
11
3/7/2010
23
Bypass Node
IP-10 IP-10
IP-10
SDH interface
24
Proprietary and Confidential
12
3/7/2010
1st Node
PDH interface IP-10 IP-10 Bypass site Radio CH #1 Radio CH #26 IP-10
SDH interface #1
25
Bypass Node
Radio CH #48
Radio CH #1
IP-10
SDH interface
26
13
3/7/2010
3rd Node
Radio CH #48
Bypass site
IP-10
Radio CH #26
IP-10
SDH interface
27
Proprietary and Confidential
28
14
Perquisites
Prior to this configuration, end-user need to be familiar with the following modules:
Ethernet Frame Structure 802.1p/q CFM Theory Switch Configuration Interfaces Configuration
Agenda
CFM: Why?
Preliminary configuration Setup Review Configuration Flow Configuration Review Manual PING Manual Linktrace Automatic Linktrace
CFM: WHY ?
By definition, L3 IP or L2 ETH are Connection-less networks In connection-less networks we are blind unable to determine packet path or latency This makes troubleshooting and maintenance a harder task Solution: we need to convert our Connection-less network into a Connection-Oriented network
IN
?
Connection-Less
IN
Connection-Oriented
Proprietary and Confidential
CFM: WHY ?
Connection-Oriented networks (ATM, IP/MPLS) enable administrators setting a pre-defined packet path, reserving BW per service, faster event detection and thus effective troubleshooting & maintenance Such technologies are too expensive and sometimes not feasible for Mobile Operators / Mobile Backhaul solutions Solution: use a cheaper technology with enhanced features:
CFM enables L3 operations such as Traceroute and PING with a simpler ETH infrastructure Connection-Oriented
5
Proprietary and Confidential
Preliminary Configuration
1. Make sure you define the required VLAN IDs in the Switch DB prior to OAM configuration 2. Prepare a Network Design Map with required configuration (MIP / MEP / IDs / MAC per device.) 4. Make sure IP-10 Interfaces are configured according to your Network Criteria (Trunk / Port VID Membership ). 5. Every CFM interface (including Radio) must be aware of the required VIDs (Port membership)
6. CFM requires physical connection, therefore make sure your interfaces are enabled on both sides (DCE and DTE)
1
D1S2: MEP 3 to MEP 4, Level 3, VLAN 2000
4 2
Domain 2 Services: D2S2: MEP 5 to MEP 6, Level 2, VLAN 1000 MEP MIP
7
Proprietary and Confidential
5 6
All Steps must be configured on both IP-10s Make sure you follow the same syntax
Configuration
10
11
Creating MAIDs
Click on the Add button to add domains (use the setup diagram as a reference) You will need to specify: 1. 2. 3. 4. Domain Name Level (1 to 7) Association Name VLAN ID
12
Creating MAIDs
Create the domains as depicted in the setup diagram on both IDUs Settings must be unique and identical
13
Domains defined
You should see the following status on your MAID list page (on both IDUs): If you point your cursor to the No MEPs indication LED, you will be notified that MEPs need to created as well
14
Defining MEPs
Click on the ADD button to add a local MEP on both IDUs Continue to next slide to observe how
15
Defining MEPs
Port #3 MEP ID: 1
16
RIGHT IP-10
17
RIGHT IP-10
18
LEFT IP-10
As you can see, CCM enables auto-learning, hence both MEPs discover each other (MAC and remote MEP ID are now known) New alarms indicate that process of creating the remote MEP is not fully complete
19
Proprietary and Confidential
20
10
21
Click on the PING button to check connectivity to Remote interface (results on next slide)
22
11
23
12
MEP 3 MEP 4
25
MEP 3 MEP 4
26
13
MEP 3 MEP 4
27
MEP 3 MEP 4
28
14
29
D2S2 5
6
30
15
31
32
16
33
Make sure you set the MIP level according to the level of the Parent domain
34
Proprietary and Confidential
17
35
Please make a note of the Radio MAC address of each IDU we shall need it later
36
Proprietary and Confidential
18
00:0A:25:56:27:C6
00:0A:25:56:27:C2
19
Manual PING
To PING from MEP 1 to MEP 2, you will need to set the following parameters: Remote interface MAC Level VLAN Successful PING requires setting the correct path
39
Manual Linktrace
To trace an interface , you will need to set the following parameters: Remote interface MAC Level VLAN Successful Trace requires setting the correct path
40
20
41
Automatic Linktrace
To enable Auto Linktrace select the checkbox next to the target Remote MEP and then click ADD SELECTED
42
21
Automatic Linktrace
Click Linktrace SELECTED
43
Thank You !
training.ceragon.com
44
22
3/7/2010
Agenda
In this module we shall describe the various actions we can perform to properly maintain and troubleshoot the IP-10G system
3/7/2010
RFU RF Loopback
RFU RF LB
RFU RF Loopback
Use it to verify communication from Line to ODU is OK (including ODU) Traffic affecting TX is stopped Configurable Timer to automatically restore traffic ( 0 = no time limits) RFU LED is RED when Loopback is ON LINK LED is GREEN when Loopback is ON Alarm is displayed in Current Alarms:
3/7/2010
IF Loopback
IDU IF LB
IF Loopback
Use it to verify communication from Line to IF cable is OK Traffic affecting TX is stopped Configurable Timer to automatically restore traffic (0 = no time limits) LINK LED is GREEN when Loopback is ON Alarm is displayed in Current Alarms:
3/7/2010
3/7/2010
Tester
10
Proprietary and Confidential
3/7/2010
We enable Line LB towards the radio Loopback replaces end-device therefore alarm disappears Loopback is OFF PDH port alarm is ON again..
11
12
3/7/2010
13
Before you leave the site, make sure that these registers are elapsed (zero)\ When one of these registers is different than 0 you need to report to your support representative In such case, perform the Loopbacks we have just covered to narrow down the probable causes for the errors
14
3/7/2010
15
3/7/2010
Agenda
In this module we shall describe the various actions we can perform to properly maintain and troubleshoot the IP-10G system using: 1. 2. 3.
2
3/7/2010
Configuration File
The Configuration file stores the following parameters:
License External Alarms SNMP Trap Destination NTP Server Properties Radio properties: Frequency, RSL, TSL, ATPC, etc. Switch Mode and database: Port types, VLAN membership, etc. Interface Configuration: PDH, TDM, Ethernet Switch Trail Configurations Service OAM Security: user accounts, login properties, etc.
Date & Time Daylight Saving Time properties System name and other ID parameters Measuring properties (voltage, temperature) Accumulated Performance Monitoring logs Serial numbers
3/7/2010
EMS PC
3/7/2010
2
8
Proprietary and Confidential
3/7/2010
10
3/7/2010
11
12
3/7/2010
13
This is your copy of the configuration file You may place it now in the dedicated folder (Configuration Files)
14
3/7/2010
1
15
2
Proprietary and Confidential
16
3/7/2010
1
17
2
Proprietary and Confidential
3/7/2010
19
First you need to create the CFG files. To do so, select the unit(s) and click the relevant Backup button
20
10
3/7/2010
21
To download a file to a certain slot, select the unit number and click this button
22
11
3/7/2010
A unified file is created for all stacked units Upload & Download action are identical to a standalone unit
23
Proprietary and Confidential
12
3/7/2010
25
You can restore your system to factory defaults You may also set the IP address to factory default address (192.168.1.1)
26
Proprietary and Confidential
13
3/7/2010
27
14
3/7/2010
Agenda
SSH HTTPS SFTP Users & Groups Password
3/7/2010
Security Configuration
Update first FTP connection
Key exchange algorithm is RSA. Supported Encryptions: aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc,
arcfour128, arcfour256, arcfour, aes192-cbc, aes256-cbc, aes128-ctr, aes192-ctr, aes256-ctr. MAC (Message Authentication Code): SHA-1-96 (MAC length = 96 bits, key length = 160 bit). Supported MAC: hmac-md5, hmac-sha1, hmacripemd160, hmac-sha1-96, hmacmd5-96' The server will authenticate the user based on user name and password. Number of failed authentication attempts is not limited. Server timeout for authentication: 10 min. This value cannot be configured.
3/7/2010
HTTPS
In order to manage the system using HTTPS protocol, user should follow the following steps:
1. Create the IDU certificate based on IDU's public key. 2. Download the IDU certificate. 3. Using CA certificate (Optional steps)
i. Download the IDU CA's certificate. ii. Enable WEB CA certificate.
The upload will be done by using FTP/SFTP (s The public key file will be in PEM format. Click Upload Public Key The status of the upload operation can be monitored. The returned status values are: ready (default), in-progress, success, failed. In any case of failure, an appropriate error message will appear.
3/7/2010
3/7/2010
HTTPS - Activation
WEB interface protocol can be configured to be HTTP (default) or HTTPS (cannot be both at the same time). While switching to HTTPS mode, the following must be fulfilled: WEB server certificate file exist. Certificate public key is compatible to IDUs private key. If one of the above tests fails, the operation will return an appropriate error indication. Open WEB Browser and type the URL https:\\<IP of target IDU>. Note: This parameter is NOT copied when copy to mate operation is initiated, for security reasons (unsecured unit should not be able to override security parameters of secured unit).
Configuration upload/download, Upload the unit info. Upload public key. Download certificate files. SW download
3/7/2010
Adding Users
To add / edit users & groups click on the item as shown in the captured imaged (left)
3/7/2010
Adding Users
Adding Users
New users will be required to change their password when they log in for the first time
3/7/2010
Changing Password
A valid password should be a mix of upper and lower case letters, digits, and other characters. You can use an 8 character long password with characters from at least 3 of these 4 classes. An upper case letter that begins the password and a digit that ends it do not count towards the number of character classes used.
Changing Password
Good example:
L00pBack using capital letters, small letters and digits (zeros instead of O)
Bad example:
Loopback missing digits or other characters Loopbacks using more than 8 characters
3/7/2010
17
FibeAir IP-10
Part ID: BM-0139-0 Doc ID: DOC-00019183 Rev a.00 November 2008
Notice
This document contains information that is proprietary to Ceragon Networks Ltd. No part of this publication may be reproduced, modified, or distributed without prior written authorization of Ceragon Networks Ltd. This document is provided as is, without warranty of any kind.
Registered TradeMarks
Ceragon Networks is a registered trademark of Ceragon Networks Ltd. FibeAir is a registered trademark of Ceragon Networks Ltd. CeraView is a registered trademark of Ceragon Networks Ltd. Other names mentioned in this publication are owned by their respective holders.
TradeMarks
CeraMapTM, PolyViewTM, EncryptAirTM, ConfigAirTM, CeraMonTM, EtherAirTM, and MicroWave FiberTM, are trademarks of Ceragon Networks Ltd. Other names mentioned in this publication are owned by their respective holders.
Statement of Conditions
The information contained in this document is subject to change without notice. Ceragon Networks Ltd. shall not be liable for errors contained herein or for incidental or consequential damage in connection with the furnishing, performance, or use of this document or equipment supplied with it.
Information to User
Any changes or modifications of equipment not expressly approved by the manufacturer could void the users authority to operate the equipment and the warranty for such equipment. Copyright 2008 by Ceragon Networks Ltd. All rights reserved.
Corporate Headquarters: Ceragon Networks Ltd. 24 Raoul Wallenberg St. Tel Aviv 69719, Israel Tel: 972-3-645-5733 Fax: 972-3-645-5499 Email: info@ceragon.com North American Headquarters: Ceragon Networks Inc. 10 Forest Avenue, Paramus, NJ 07652, USA Tel: 1-201-845-6955 Toll Free: 1-877-FIBEAIR Fax: 1-201-845-5665 Email: infous@ceragon.com
www.ceragon.com
European Headquarters: Ceragon Networks (UK) Ltd. 4 Oak Tree Park, Burnt Meadow Road North Moons Moat, Redditch, Worcestershire B98 9NZ, UK Tel: 44-(0)-1527-591900 Fax: 44-(0)-1527-591903 Email: infoeuro@ceragon.com APAC Headquarters Ceragon Networks (HK) Ltd. Singapore RO Level 34 Centennial Tower 3 Temasek Avenue Singapore 039190 Tel - + 65 6549 7886 Fax: +65 6549 7011
Contents
General .......................................................................................................... 1
Settings ............................................................................................................... 23
General
This guide explains how to work with the FibeAir IP-10 web based License Management System. The system enables authorised users to obtain license-related information and perform license-related operations.
Getting Started
To start the management application: 1. In your web browser, go to the address http://80.74.99.83/LMManage/login.aspx
2.
To log in to the system, enter your user name and password, and then click Login. Note the following user name rules:
For Demo OEM, the first five digits must be 00001. The next four digits after the first five should be numbered starting with 0001 for end users. For example, the number 000010001 would mean that Demo OEM end user 0001 is entering the system. For users other than Demo OEM, the user name must start with 00000. For example, the number 000000001 would mean that non-Demo OEM user 0001 is entering the system. For OEM Users 3a. If you enter as an OEM user, the following web page appears:
One of two modes can be selected: Administrator (Demo OEM option) - The administrator can assign licenses and devices to customers, who can be either another OEM customer or Demo OEM. In this mode of operation, the OEM admin can assign licenses/devices to end users (including themself) and can generate license keys for the devices. End User (Customer option) - The OEM end user, or the OEM itself can generate keys for self use. In this mode, the user can only generate licenses based on the available device database. The user can only view his/her own devices (that were assigned to that user) and licenses.
End users that belong to that channel cannot see devices or licenses that belong to the OEM or other customers. After you select the operating mode, the following web page appears:
For Non-OEM Users 3b. If you enter as a non-OEM user the following web page appears: Note that a channel or OEM user can also enter as one of their customers. In this case, the system identifies the user as a channel/OEM user and will display a drop-down list to enable entry under the user's name. This will be done to allow operations for devices that the user sent to his/her customers.
From within an item web page, you do not have to return to the main web page. Instead, use the tabs at the top (Devices, Licenses, etc.) to obtain a list of items for the particluar group. Note that in any web page, you can click Print to send the contents of the page to the printer.
Note that for OEM users, the Generate Keys button is replaced with Assign to Customer . The list includes all the devices you purchased from Ceragon. Click Device ID for a more deatiled description of the device.
In this page, you can assign the current ID to an end user, using the drop-down list in the Assign to Customer field.
Search for Devices In the main device list web page, you can click Search registered in the system. to locate a particular device that is
Select the criteria (filters) you want for the search, and then click Search. To clear the criteria you selected, click Clear.
Import Devices In the toolbar, click Import to import a list of devices from an external source.
You will be prompted to locate the file with the device list. Once you locate and select the file, click Import. The device list file must be a text file with the following columns:
Device ID Customer Country Region / Network Link Side
Adding and Deleting Devices To add a new device, in the toolbar, click New .
Enter a valid device ID in the field and click Save. The device will be added to your device list. To delete a device, select the device in the list, and click Delete Exporting a Device List To export a device list to a file, click Export . .
The list will be saved in an Excel file with the extension csv (Comma Separated Values). Generating Keys To generate license keys for one or more devices, select the devices in the main list by marking the checkboxes beside them, and click Generate Keys The following web page appears: .
In this web page, only the devices you selected will appear.
10
The All Relevant Licenses area shows only the licenses that are common to all devices you selected (meaning their lowest common denominator). The current license types include the following: 1 = ACM 2 = Networking 3 = Capacity Upgrade The following tables list the current license possibilities: Capacity Upgrade
License Type 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 Value 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Description IP10-CAP-010 IP10-CAP-025 IP10-CAP-050 IP10-CAP-100 IP10-CAP-150 IP10-CAP-200 IP10-CAP-300 IP10-CAP-400 IP10-UPG-025-050 IP10-UPG-025-100 IP10-UPG-025-150 IP10-UPG-025-200 IP10-UPG-025-300 IP10-UPG-025-400 IP10-UPG-050-100 IP10-UPG-050-150 IP10-UPG-050-200 IP10-UPG-050-300 IP10-UPG-050-400 IP10-UPG-100-150 IP10-UPG-100-200 IP10-UPG-100-300 IP10-UPG-100-400 IP10-UPG-150-200 IP10-UPG-150-300 IP10-UPG-150-400 IP10-UPG-200-300 IP10-UPG-200-400 IP10-UPG-300-400 Name in License Management Site Feature disabled Radio Cap. Upgrade 10->25 Mbps Radio Cap. Upgrade 10->50 Mbps Radio Cap. Upgrade 10->100 Mbps Radio Cap. Upgrade 10->150 Mbps Radio Cap Upgrade 10->200 Mbps Radio Cap Upgrade 10->300 Mbps Radio Cap Upgrade 10->400 Mbps Radio Cap. Upgrade 25->50 Mbps Radio Cap. Upgrade 25->100 Mbps Radio Cap. Upgrade 25->150 Mbps Radio Cap. Upgrade 25->200 Mbps Radio Cap Upgrade 25->300 Mbps Radio Cap Upgrade 25->400 Mbps Radio Cap. Upgrade 50->100 Mbps Radio Cap. Upgrade 50->150 Mbps Radio Cap. Upgrade 50->200 Mbps Radio Cap Upgrade 50->300 Mbps Radio Cap Upgrade 50->400 Mbps Radio Cap. Upgrade 100->150 Mbps Radio Cap. Upgrade 100->200 Mbps Radio Cap Upgrade 100->300 Mbps Radio Cap Upgrade 100->400 Mbps Radio Cap. Upgrade 150->200 Mbps Radio Cap Upgrade 150->300 Mbps Radio Cap Upgrade 150->400 Mbps Radio Cap Upgrade 200->300 Mbps Radio Cap Upgrade 200->400 Mbps Radio Cap Upgrade 300->400 Mbps
11
ACM
License Type 1 1 Value 0 1 IP10-ACM Description Name in License Managament Site Feature disabled ACM
To add a license for which you want to generate a key, select the license in the All Relevant Licenses area and click Add to add it to the Selected Licenses area. Important! You can only select one license from each category (ACM, Networking, Capacity Upgrade). If you select a capacity upgrade license and want to add a different capacity upgrade license, you must first remove the first capacity upgrade license and then add the other one. Once you select the licenses you want, click Generate Keys. After you confirm your selection, the following example web page appears.
12
Assigning Devices to a Customer For OEM users, you can assign devices to other users by selecting Assign Devices to a Customer in the main web page Devices group. Or, you can click Assign to Customer at the top of the page.
In the Select Customer field, use the drop-down list to choose the customer you want to assign the devices to. Click Show Available Devices for a list of devices you can choose from. In the available list of devices, click Filter & Sort to customize the device list, as shown in the following example page.
13
You can specify the ID of the device you want to include in the list, and select the list sort order (ascending or descending). After you click Go to generate the list, in the Available Devices list, select the devices you want to assign to the user, and click Add to add them to the Assigned Devices list. When you complete the operation, click Save. In the confirmation page, click Confirm. The following example page appears:
14
Click Continue to go back to the device list page. The device list page will appear with the updated information.
15
The web page displays all the licenses you currently own. To search for a particular license, click Search, specify the criteria you want, and click Search again. Click the number in the Qty Assigned column for a list of licenses assigned to customers.
16
Click the number in the Qty Generated column for a list of licenses used to generate keys.
17
To generate license keys, select Generate Keys in the Licenses group in the main web page, or click Generate Keys in the web page that appears when you click the Licenses tab.
To add a license for which you want to generate a key, select the license in the All Available Licenses area and click Add to add it to the Selected Licenses area. Click Show Relevant Devices for a list of devices associated with the licenses you chose.
18
To add a device for which you want to generate a key, select the device in the All Available Devices area and click Add to add it to the Selected Devices area. Once you select the devices you want, click Generate Keys. The keys will be generated, as shown in the following example page, and the database will be updated.
19
20
In the Select Customer field, use the drop-down list to choose the customer you want to assign the licenses to. Click Show Available Licenses for a list of licenses you can choose from.
21
In the Filter by Type field, click the drop-down list and choose the license type (Capacity, ACM, Networking). For License Code, click the drop-down list and choose the license specifications. For Quantity to Assign, enter the amount of licenses you want to assign to that customer. The maximum quantity is limited to the available quantity for the license you choose. After you complete the filter options, click Add to add the licenses to the Assigned Licenses list. You can repeat this procedure more than once to add other license types. For Quantity to Return, enter the amount of unused licenses you would like to return (if relevant). Click Save to save the license assigment information in the database. In the page that appears, click Confirm to confirm the assignment. A page will appear informing you that the operation was successful, and the main license list will be updated with the information.
22
Settings
In the main web page, the Settings group includes items you can select for system information and configuration.
Managing Users
Select the Manage Users item to define users and modify their properties. You can also access this item by clicking the Settings tab at the top of the page (if it appears).
Use the Search button at the top To define a new user, click New
.
23
In this page, enter the information in the fields, and then click Save. To delete one or more users, in the user list, mark the checkboxes beside the users you want to delete, and click Delete . Confirm your choice(s) in the page that appears and the users will be deleted.
24
Generating Reports
In the main web page, you can select a report to generate: an Orders report, or a Devices and Activations report. To generate a report, select Orders Report or Devices & Activations Report in the main web page, or click the Reports tab at the top of the page (if it appears).
For an Orders Report: For Order No., you can select All or Between. If you select Between, specify the range of order numbers you want to include in the report. For Order Date, you can select All or Between. If you select Between, you will need to specify the range of dates you want to include in the report. In the Include field, you can select All for all types of orders, Closed orders only, or Open orders only. When you are done selecting the report criteria, click Create Report.
25
For a Devices & Activations Report: For Devices, you can select All or Between. If you select Between, specify the range of device IDs you want to include in the report. For Activation Date, you can select All or Between. If you select Between, specify the range of activation dates you want to include in the report. When you are done selecting the report criteria, click Create Report.
26