You are on page 1of 312

CERAGON FIBEAIR

COURSE HANDBOOK

Installation, Commissioning & System Configuration

2010
Visit our Customer Training Portal at Training.Ceragon.Com or contact us at training@ceragon.com

Trainee Name:

24/7 access to constantly increasing on-line DB of the latest information!

eLearning is a great complementary solution to your classroom sessions as some modules are only available on-line

eLearning provides a first tier of support to users of new technologies, resulting in an estimated 30% reduction in support costs related to implementation of new applications & business processes.

eLearning is proven to be less intimidating than Instructor led training. Concerns about making mistakes in front of peers and management are eliminated.

Ceragon Training Center

Ceragon Training Center is designed to help you get a comprehensive understanding with Ceragon's technology, products and network solutions. While individuals focus on particular modules, Managers on the other hand can sign up their staff members to a Learning Program with compulsory items such as quizzes & procedures.

Ceragon eLearning users enjoy frequent & updated modules as new features and products are released without needing to update users account properties.

Ceragon eLearning solutions can shorten the amount of time it takes to get learners up to speed on new products and processes. Users who need to "brush up" on a process can access a module instantly, practice, test themselves and resume their work.

Ceragon Training Knowledgebase is available to your employees without sacrificing additional room space or time-consuming lectures.

Want to find out more? Need an Account Comparison Table? Need a proposal? Case studies? Please contact us at training@ceragon.com

Ceragon Training Agenda


Product: IP-10 G + NMS Course: Extended Operation and Maintenance Duration: 5 days (Theory + Practice)

DAY ONE Greetings and Course Opening Introduction to MW Radio Introduction to 802.1p/q VLAN Tagging Introduction to CFM IP-10 G-Series Nodal Solution Introduction Introduction to ODU Introduction to Adaptive Code Modulation and MRMC scripts Physical Overview

Ceragon Training Agenda

v2.2

Ceragon - Training - Handbook - Page 1

Ceragon Training Agenda

DAY TWO

System Architecture & Design: Front Panel Overview Standalone VS. Shelf IP allocation in a shelf Management Modes (In Band, OOB, WSC) Switch Mode (Pipe, Managed, Metro) Protection Mode

Installation (Practical Exercise using the Element Management System): Standalone guidelines Installing IDU in a shelf Protection mode (Main and Extensions) Setting IP address via CLI Setting up a radio link (frequency, Link ID, RSL, TSL, ATPC, MSE, MRMC, ASP) Setting MNG in a standalone IDU Setting MNG in a shelf Setting MNG using Wayside Channel

Troubleshooting Tools & Maintenance: Using the Current Alarms Using the Event Log Using RMON Registers and Statistics Performing Loopbacks Saving Unit Information Files Configuration File Upload / Download Software File Download

Licensing (retrieving license and installing license on IDU)

Ceragon Training Agenda

v2.2

Ceragon - Training - Handbook - Page 2

Ceragon Training Agenda


DAY THREE Introduction to RSTP & Ring Topology

RSTP RING (Practical Exercise using the EMS): Setting up an RSTP Ring Demonstrating RSTP Protection on Trails Demonstrating RSTP Protection on In Band Management

Simple Star Topology + RSTP (Practical Exercise using the EMS): Shelf Configuration SDH Trail XC Configuration TDM Trail XC Configuration

Star Topology + In Band +Protection (Practical Exercise using the EMS): Enabling Protection Mode SDH Trail XC Configuration TDM Trail XC Configuration

Trail Prioritization (Practical Exercise using the EMS): (We shall use the same setup as in previous exercise) Setting Trail Priority Demonstrating Trail Prioritization with ACM and variable attenuator

Ceragon Training Agenda

v2.2

Ceragon - Training - Handbook - Page 3

Ceragon Training Agenda


DAY FOUR Introduction to Quality of Service: What is QoS? What is a Scheduler? What is Rate Limiting? What is Queuing? How do we map ATM / MPLS to ETH ?

Quality of Service (Practical Exercise using the EMS): Creating preliminary tables for classifiers & policers Assigning Policers Assigning Classifiers Assigning a Scheduler

Quality of Service (Practical Exercise using the EMS): QoS demonstration using Video Streaming (VLC) QoS demonstration using Traffic Generator/Analyzer (when relevant)

DAY FIVE Topology Configuration: Adding Elements Auto-Discovery Adding Maps

Administration Log Analysis and Filtering System Configuration Dynamic Poling Static Poling Configuration Broadcast Configuration File Download Software Download FTP Mail Server Northbound

End to End Trap Configuration Exam / Course Summary

Ceragon Training Agenda

v2.2

Ceragon - Training - Handbook - Page 4

3/8/2010

Ceragon in a Nutshell
Products

Agenda

Think Backhaul Networks

1. 2. 3. 4. 5. 6. 7. 8.

1500R IDU IP-MAX^2 IDU IP-10 IDU IP-10G IDU Nodal Solutions 3200T IDU Outdoor units Outdoor Enclosures

Proprietary and Confidential

Ceragon - Training - Handbook - Page 5

3/8/2010

Ceragon FibeAir Family

OA&M

Service Management

Security

Carrier Ethernet Switch ACM


Gigabit Ethernet Fast Ethernet

TDM Cross Connect


XPIC Multi Radio SD/FD

Native2 Radio Ethernet + TDM


10-500Mbps, 7-56MHz

E1/T1

Ch-STM1/ OC3
Terminal Mux

RFU (6-38GHz)
3
Proprietary and Confidential

IDU 1500R Point to Point SDH Radio Link

STM Ring

STM Ring

Proprietary and Confidential

Ceragon - Training - Handbook - Page 6

3/8/2010

IDU 1500R SDH RING

ADM/MSPP

N x STM-1/OC-3
XC XC

Ceragon FibeAir 1500R

Aggregation Site

PSN

Proprietary and Confidential

IP-MAX^2 IDU: GbE Backhaul

ETH

IP/ETH Provider network

Proprietary and Confidential

Ceragon - Training - Handbook - Page 7

3/8/2010

IP-10 IDU: Enhanced Cellular Backhaul

Cellular traffic (TDM)

IP/ETH Provider network

N x ETH

Proprietary and Confidential

IP-10G IDU: A Nodal Solution

Cellular traffic (TDM)

STM Rings

Proprietary and Confidential

Ceragon - Training - Handbook - Page 8

3/8/2010

3200T All Indoor: High Capacity Trunk

SDH

Proprietary and Confidential

3200T Split Mount: High Capacity Trunk

SDH

10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 9

3/8/2010

RFUs

FibeAir RFU-HP

FibeAir RFU-HS

FibeAir RFU-P

FibeAir RFU-C

High power
(e.g. Smaller antennas reduced cost)
Proprietary and Confidential

Standard power

Outdoor Enclosures Solution Benefits


Full Outdoor solution:

Dust and weather proof Compact size reduces the cost of leasing or purchasing rack space. Ideal for Greenfield areas, at solar-powered sites, and at repeater sites adjacent to highways. One-man installation and shorter cabling reduce installation costs. Environment-friendly: Greener deployments, saving on power and air-conditioning costs.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 10

3/8/2010

Hybrid aggregation network for migration


Native2 at the access, IP/MPLS & SDH/SONET at the aggregation
Native2 (MW links) IP/MPLS (Hybrid Fiber/MW) SDH/SONET (Hybrid Fiber/MW)
Native Ethernet Ethernet over IP/MPLS Native E1/T1 E1/T1 over SDH/SONET

STM1/ OC3

STM1/ OC3 FE/GE n x T1/E1

NG-SDH MSPP NG-SDH MSPP

BSC/MSC

Core Site

Tail site

FibeAir IP-10

FibeAir IP-10

GE

Hub Site
MPLS Router MPLS Router

GE

RNC

Native2 - Is a technology for carrying both TDM and Ethernet traffic Natively over the same microwave links with dynamic bandwidth allocation.

13

Proprietary and Confidential

Aggregating WiMAX / LTE Ready


Wireless Carrier Ethernet Backhaul Network

Business center

WiMAX / 4G / LTE Cellular site WiMAX Ceragon TDM E1/T1 2G/3G base station Hub / Aggregation site Ceragon

GE

STM-1 / OC-3

Access
WiMAXPoint to Multipoint
solution for Ethernet traffic aggregation and statistical multiplexing for a mix of Business and mobile offload Ceragon Point to Point for TDM aggregation

Metro / Aggregation
Ceragons Point to Point backhaul
supports Native Ethernet with traffic QoS awareness Ethernet traffic is tunneled through E-LAN/ E-Line EVCs TDM traffic (E1/T1) are being aggregated using Ceragon integrated TDM cross connect

Core IP Backbone
Ethernet (GE) is sent over to an IP/MPLS Layer TDM (STM-1/OC-3) is sent over to an SDH/SONET layer Ceragon High-capacity "MPLSaware" Ethernet microwave radio is used where fiber connections not available.

14

Proprietary and Confidential

Ceragon - Training - Handbook - Page 11

3/8/2010

Ceragons Advantages
High Spectral-Efficiency High System-Gain Multi-Service Concentration capabilities High Level of Redundancy Adaptive Modulation Pay-as-you-grow concept

15

Proprietary and Confidential

High Spectral-Efficiency
(i.e. 256QAM modulation)

Providing more capacity at any given frequency resources


e.g. 18xE1 or 50Mbps @ 7MHz channel-bandwidth

Better utilizing valuable frequency resources


e.g. using high spectral efficiency we provide 155-200Mbps @ 28MHz,
using a Single wireless link! Average microwave will require Two links causing higher CAPEX and consume additional valuable frequency

Get the same capacity with ONE link instead of TWO!


Proprietary and Confidential

Ceragon - Training - Handbook - Page 12

3/8/2010

Higher Spectral-Efficiency
Whats in it for The Operator?

Typical
Microwave Radio
Required Capacity 155-200Mbps Required Capacity 70-100Mbps TWO radio links or 56MHz channel bandwidth 28MHz Channel Bandwidth

IP10
Microwave Radio

ONE radio link using 28MHz channel bandwidth 14MHz Channel Bandwidth

The operator saves CAPEX and free-up valuable frequency resources


Proprietary and Confidential

Higher Spectral-Efficiency is not enough


Radio Type
Typical System Gain Typical System Gain Typical System Gain High System Gain High System Gain

Ant. Diameter
1.80 m 1.80 m 3.00 m 1.80 m

Length
30 Km 21 Km 30 Km 30 km

Modulation
16QAM 128QAM 128QAM 128QAM

Capacity
32 x E1s STM-1/OC-3 STM-1/OC-3 STM-1/OC-3

Spectral Efficiency should always be coupled with System Gain


18
Proprietary and Confidential

Ceragon - Training - Handbook - Page 13

3/8/2010

Ceragons Management Overview

IP-10
19
Proprietary and Confidential

FibeAir

We adjust to customers requirements

20

Proprietary and Confidential

Ceragon - Training - Handbook - Page 14

10

3/8/2010

Thank You! training@ceragon.com

Ceragon - Training - Handbook - Page 15

11

Introduction to 802.1 P/Q

Module Version v2.6


Proprietary and Confidential

Objectives

Understand the need for smaller broadcast domains Understand what is VLAN Understand the difference between tagged and untagged frame Understand VLAN applications

Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 16

Associated IEEE Standards

IEEE 802.3

: Ethernet (Max. frame size = 1518 bytes)

IEEE 802.3ac : Ethernet (Max. frame size = 1522 bytes) IEEE 802.1 d : MAC Bridge first introduced the concept of Filtering Services in a bridged local network IEEE 802.1 q : VLAN Tagging IEEE 802.1 p : Priority Tagging / Mapping IEEE 802.1ag : OAM (CFM)

Proprietary and Confidential

Agenda Agenda

What is VLAN? Advantages for using VLAN Regular Ethernet frame Tagged frame structure Types of VLAN Types of connections 802.1P implementations

Proprietary and Confidential

2 of 19

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 17

What is VLAN?

A Layer 2 Protocol which enables enhanced traffic maneuvers :

Prioritization Filtering Provisioning Mapping (e.g. - ATM to/from ETH)

Proprietary and Confidential

4 of 19

What is VLAN?
Regular ETH networks forward broadcast frames to all endpoints

Proprietary and Confidential

5 of 19

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 18

What is VLAN?
VLAN networks forward broadcast frames only to pre-defined ports (Profile Membership)

VLAN 1
Switch ports

VLAN 547

Proprietary and Confidential

6 of 19

Advantages of VLAN

Breaking large networks into smaller parts (Formation of virtual workgroups) Simplified Administration (no need for re-cabling when user moves) Improving Broadcast & Multicast traffic utilization Mapping expensive backbones (ATM) to simpler & cheaper ETH backbones Security establishing tunnels / trunks through the network for dedicated
users (traffic between VLANs is restricted).

Proprietary and Confidential

3 of 19

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 19

Before we start explaining bit by bit, what is VLAN and how does it work, let us review first the structure of a regular ETH frame

Proprietary and Confidential

7 of 19

Untagged Ethernet Frame

FCS is created by the sender and recalculated by the receiver

Preamble + SFD
8 Bytes

DA
6 Bytes

SA
6 Bytes

Length / Type
2 Bytes

DATA + PAD
46 - 1500 Bytes

FCS
4 Bytes (32-bit CRC)

Minimum 64 Bytes < FRAME SIZE < Maximum 1518 Bytes

Length / Type < 1500 - Parameter indicates number of Data Bytes Length / Type > 1536 - Parameter indicates Protocol Type (PPPoE, PPPoA, ARP etc.)

10

Proprietary and Confidential

8 of 19

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 20

Tagged Ethernet Frame

Additional information is inserted Frame size increases to 1522 Bytes


4 Bytes

Preamble + SFD

DA

SA

Length / Type

Length / Type

DATA + PAD

FCS

TPID = 0x8100
16 Bit

TCI

P-TAG
3 Bit 11

CFI
1 Bit

VLAN ID
12 Bit
Proprietary and Confidential

TPID = Tag protocol ID TCI = Tag Control Information CFI = 1 bit canonical Format Indicator

9 19 4 of 42

Tagging a Frame

VLAN ID uses 12 bits, therefore the number of maximum VLANs is 4094: 2^12 = 4096 VID 0 = reserved VID 4096 = reserved (every vendor may use some VIDs for internal purposes such as MNG etc.) VID 1 = default After tagging a frame, FCS is recalculated CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over ETH backbones (some vendors may use CFI for internal purposes)

12

Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 21

TPID / ETHER-Type / Protocol Type


TPID in tagged frames in always set to 0x8100
Protocol type
Tagged Frame ARP Q-in-Q (CISCO) Q-in-Q (other vendors) Q-in-Q (other vendors) Q-in-Q (other vendors) RARP

Value
0x8100 0x0806 0x8100 0x88A8 0x9100 0x9200 0x8035 0x0800 0x86DD 0x8863/0x8864 0x8847/0x8848 0x8000 0x8809 0x888E

It is important that you understand the meaning and usage of this parameter

IP IPv6 PPPoE MPLS

Later when we discuss QoS, we shall demonstrate how & why the system audits this parameter
13
Proprietary and Confidential

IS-IS LACP 802.1x

VLAN types

Membership by Port
VID1

Port 1 2 3 4

VID 1 1 44 200
VID 44 VID1

PRO easy configured CON no user mobility

VID200

14

Proprietary and Confidential

10 of 19

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 22

VLAN types

Membership by MAC
MAC 00:33:ef:38:01:23 00:01:de:22:42:ae 00:20:8f:40:15:ef 00:20:32:35:ea:11 VID 1 1 44 200

PRO user mobility, no reconfiguration when PC moves CON needs to be assigned initially, not an easy task with thousands of endpoints

15

Proprietary and Confidential

11 of 19

VLAN types

Membership by Subnet Address (a.k.a. Layer 3 VLAN)


Subnet Address 10.0.0.0 / 24 20.0.0.0 / 30 11.0.0.0 / 24 192.168.1.0 / 24 VID 1 1 44 200

Membership is based on the Layer 3 header No process of IP address is done Main disadvantage longer overall throughput
16
Proprietary and Confidential

12 of 19

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 23

VLAN types

Membership by Protocol Type

Protocol Type IP IPX

VID 1 44

The VID is derived from the protocol type field found in the Layer 2 header

17

Proprietary and Confidential

13 of 19

Port Types
Access Port a port which is not aware of VLANs (Cannot tag outgoing frames or un-tag incoming frames)

VLAN aware Switch

Device unaware of VLANs transmits untagged (regular) ETH frames

Switch tags the ingress frames with VID according to specific Tagging mechanism

18

Proprietary and Confidential

14 of 19

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 24

Port Types
Trunk Port a port which is aware of VLANs (Can tag or un-tag incoming frames)

VLAN aware Switch

Device unaware of VLANs transmits untagged (regular) ETH frames

Switch tags the ingress frames with VID according to specific Tagging mechanism Switch un-tags frames with VID received from network and delivers untagged frames to Access ports

19

Proprietary and Confidential

14 of 19

Port Types
Trunk Port can carry tagged frames with different VIDs. This requires Port Membership configuration.

VLAN aware Switch

T A
This port is not a member of the Trunk port membership list, hence, traffic is discarded

20

Proprietary and Confidential

14 of 19

10

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 25

Port Types
Q-in-Q (A.K.A. Double TaggingVLAN Encapsulation)

+
VLAN

CN

aware Switch

PN

Enhanced security not exposing original VID Improved flexibility of VID in the network (Ingress VID was already assigned in the network)

21

Proprietary and Confidential

15 of 19

Introduction to QoS / CoS

22

11

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 26

Mapping ATM QoS over ETH CoS (RFC 1483)


We can extend the benefits of ATM QoS into Ethernet LANs to guarantee Ethernet priorities across the ATM backbone. A L2 switch or L3 router reads incoming 802.1p or IP ToS priority bits, and classifies traffic accordingly. To match the priority level with the appropriate ATM service class and other parameters, the switch then consults a mapping table with pre-defined settings.
P-Tag 6 P-Tag 4 P-Tag 0 CBR VBR UBR

Hub Site
FE/GE GE n x T1/E1

GE

RNC FibeAir IP-10


STM1/ OC3

Tail site

IP-10

ATM Router

MPLS Router

Core Site

BSC/MSC

23

Proprietary and Confidential

Mapping ETH to MPLS and vice versa


IP-10s L2 switch can take part in the process of transporting services through MPLS core

Frames/services are mapped to MPLS FECs according to: VLAN ID mapped to MPLS EXP bits VLAN P-Bit mapped to MPLS EXP bits

Hub Site
FE/GE GE n x T1/E1

GE

RNC
STM1/ OC3

Tail site

FibeAir IP-10

IP-10

STM1/ OC3

MPLS Router

MPLS Router

Core Site

BSC/MSC

24

Proprietary and Confidential

16 of 19

12

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 27

VLAN P-Bit Remap (Traffic Classes)


802.1P utilizes Traffic Classes: A switch port allocates ingress frames to queues (buffers) according to their P-Tag value P-Bits 6-7 The more queues the more prioritizing levels (classes) Downside more time, more memory Normally 4 queues (TCs) are sufficient In this example the port groups a few Bits into a single queue 8 priority levels become 3 classes
25
Proprietary and Confidential

P-Bits 4-5

Q4 Q3 Q2

High

P-Bits 0-3
Q1 Low

VLAN P-Bit Remap (Traffic Classes)


IEEE Recommendation The following table shows IEEE definition of traffic classes It shows the ingress options for P-Tag VS. egress P-tag The number of egress priorities (classes) depend on the number of assigned queues
Ingress P-Tags 1
0 (default)

Number of Available Traffic Classes


2 0 0 0 0 1 1 1 1 3 0 0 0 0 1 1 2 2 4 0 0 1 1 2 2 3 3 5 0 0 1 1 2 2 3 4 6 1 0 2 2 3 3 4 5 7 1 0 2 3 4 4 5 6 8 1 0 2 3 4 5 6 7

0 0 0 0 0 0 0 0

1 2 3 4 5 6 7

Egress P-Tag
26

Proprietary and Confidential

13

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 28

Acronyms

ETH Ethernet NIC Network Internet Card VID Vlan ID VLAN Virtual LAN P-TAG Priority Tag, Priority Bits CFI Canonical Format Indicator TPID Tag Protocol Identifier FCS Frame Check Sequence DA Destination Address SA Source Address QoS Quality of Service

27

Proprietary and Confidential

Thank You !
training@ceragon.com

28

Proprietary and Confidential

14

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 29

3/8/2010

ACM - Adaptive Code Modulation

FibeAir IP-10s Key Feature


IP-10 utilizes a unique Adaptive Coding & Modulation (ACM)
Modulation range: QPSK - 256QAM

Modulation changes to maintain link when radio signal degrades Mechanism automatically recovers to max. configured modulation when
received signal improves

Optimized for mobile backhaul all-IP and TDM-to-IP migration


2
Proprietary and Confidential

Ceragon - Training - Handbook - Page 30

3/8/2010

Adaptive Coding and Modulation


Utilize highest possible modulation considering the changing environmental
conditions

Hitless & errorless switchover between modulation schemes Maximize spectrum usage - Increased capacity over given bandwidth Service differentiation with improved SLA Increased capacity and availability

Proprietary and Confidential

Adaptive Coding and Modulation

Voice & real time services Non-real time services


Weak FEC

Strong FEC

When we engineer our services, we may assign certain services to highest priority When ACM is enabled and link degrades, highest priority services are maintained
4
Proprietary and Confidential

Ceragon - Training - Handbook - Page 31

3/8/2010

IP-10 Enhanced ACM Support


8 modulation/coding working points (~3db system gain for each point
change)

Hit-less and Error-less modulation/coding changes based on signal quality E1/T1 traffic has higher priority over Ethernet traffic Each E1/T1 service is assigned a priority - enables differentiated E1/T1 dropping
during severe link degradation

Integrated QoS with intelligent congestion management - ensures high priority


Ethernet traffic is not affected during link fading

Throughput per radio carrier:


10 to 50 Mbps @ 7MHz Channel 25 to 100 Mbps @ 14MHz Channel 45 to 220 Mbps @ 28 MHz Channel 90 to 500 Mbps @ 56 MHz Channel

MSE is analyzed to trigger ACM modulation changes

Zero downtime - A must for mission-critical services


5
Proprietary and Confidential

IP-10 radio capacity - ETSI


7MHz
ACM Point 1 2 3 4 5 6 7 8 Modulation # of E1s 4 6 8 10 12 13 16 18 Ethernet Capacity (Mbps) 9.5 13.5 14 20 19 28 24 34 28 40 32 46 38 54 42 60 ACM Point 1 2 3 4 5 6 7 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

14MHz
Modulation # of E1s 8 12 18 20 24 29 34 37 Ethernet Capacity (Mbps) 20 - 29 29 - 41 42 - 60 49 70 57 82 69 - 98 81 - 115 87 - 125 # of E1s 32 48 64 75 75 75 75 75

QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of E1s 16 22 32 44 54 66 71 75

28MHz
Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM Ethernet Capacity (Mbps) 38 - 54 53 - 76 77 - 110 103 - 148 127 - 182 156 - 223 167 - 239 183 - 262 ACM Point 1 2 3 4 5 6 7 8

40MHz
Modulation # of E1s 23 34 51 65 75 75 75 75

8 Ethernet Capacity (Mbps) 56 - 80 82 - 117 122 - 174 153 - 219 188 - 269 214 - 305 239 - 342 262 - 374

56MHz
Ethernet Capacity (Mbps) 76 - 109 114 - 163 151 - 217 202 - 288 251 - 358 301 - 430 350 - 501 372 - 531

Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

Ethernet capacity depends on average packet size


Proprietary and Confidential

Ceragon - Training - Handbook - Page 32

3/8/2010

IP-10 radio capacity - FCC


10MHz
Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of T1s 22 35 52 68 80 84 84 84 # of T1s 7 10 16 18 24 28 30 33 Ethernet Capacity (Mbps) 13 18 19 27 28 40 32 46 42 61 50 71 54 78 60 85 ACM Point 1 2 3 4 5 6 7 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

20MHz
Modulation # of T1s 16 22 32 38 52 58 67 73 Ethernet Capacity (Mbps) 28 - 40 39 - 56 57 - 81 67 - 96 93 - 133 102 - 146 118 - 169 129 - 185 # of T1s 37 59 74 84 84 84 84 84

30MHz
Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM Ethernet Capacity (Mbps) 39 - 55 62 - 89 93 - 133 120 - 171 142 - 202 164 - 235 185 - 264 204 - 292 ACM Point 1 2 3 4 5 6 7 8

40MHz
Modulation # of T1s 31 46 69 84 84 84 84 84

8 Ethernet Capacity (Mbps) 56 - 80 82 - 117 122 - 174 153 - 219 188 - 269 214 - 305 239 - 342 262 - 374

50MHz
Ethernet Capacity (Mbps) 65 - 93 105 - 150 131 - 188 167 - 239 221 - 315 264 - 377 313 - 448 337 - 482

Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

Ethernet capacity depends on average packet size


Proprietary and Confidential

IP-10 Enhanced radio capacity for Ethernet traffic


Intelligent Ethernet header compression mechanism (patent pending) Improved effective Ethernet throughput by up to 45% No affect on user traffic

Ethernet packet size (bytes)

Capacity increase by compression

64 96 128 256 512


8

45% 29% 22% 11% 5%


Proprietary and Confidential

Ceragon - Training - Handbook - Page 33

3/8/2010

IP-10 Native2 radio dynamic capacity allocation


Example: 28MHz channel bandwidth
Example Modulation Example traffic mix

32QAM

128QAM

256QAM

All Ethernet 20 E1s + Ethernet 44 E1s + Ethernet 66 E1s + Ethernet 75 E1s + Ethernet

112Mbps 20 E1s + 66Mbps 44 E1s + 10Mbps -

170Mbps

200Mbps

20 E1s + 123Mbps 20 E1s + 154Mbps 44 E1s + 67Mbps 66 E1s + 15Mbps 44 E1s + 98Mbps 66 E1s + 47Mbps 75 E1s + 25Mbps

Proprietary and Confidential

Adaptive Coding & Modulation (ACM)


Its all about handling data...

Current Microwave systems are designed with


Availability Equal for all Services

nXT1/E1

?
99.99 %

Less availability can be accepted for many data services Need for Services Classification : Microwave systems shall treat services in different ways
10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 34

3/8/2010

Fewer Hops

1.28km fix rate 200Mbps at 99.999%

2.5km adaptive rate 200Mbps at 99.99% and 40Mbps at 99.999%

1km

2km

3km

Assuming: 18GHz link, 28MHz channel, 1 ft antenna, Rain zone K (42mm/hr)

Optional solution for several planning constrains Example - Reducing Hops count until reaching fiber site
11
Proprietary and Confidential

Decreased tower loads: Wind, Space, Weight


4.5km/2.8 miles path, 56MHz channel, 400Mbps, 256QAM, 99.999% availability

Without Adaptive Modulation: requires 4 ft antennas


Modulation
256QAM (2)

Throughput (Mbps)
400

Availability (%)
99.999

Unavailability of modulation
4min, 28sec

Outage 5 minutes and 15 seconds

With Adaptive Modulation: requires 1 ft antennas


Modulation Throughput (Mbps) Availability (%) Unavailability of modulation

Outage 5 minutes and 15 seconds QPSK 8PSK 16QAM 32QAM 64QAM 128QAM 256QAM (1) 256QAM (2) Assumed rain zone K, 23 [GHz] band
Proprietary and Confidential

80 120 160 210 260 320 360 400

99.999 99.998 99.997 99.996 99.995 99.992 99.989 99.985

5min, 3sec 9min, 3sec 11min, 4sec 16min, 42sec 24min, 35sec 37min, 35sec 55min, 33sec 1hr,18min, 13sec Source: Ceragon Networks

Ceragon - Training - Handbook - Page 35

3/8/2010

ACM Benefit in TDM to IP migration scenario SMOOTH Migration



Typical 4E1 radio QPSK 7MHz channel 99.999% availability 4xE1 7MHz channel

Upgrade to 4E1 + 40Mbps Ethernet 5 TIMES THE CAPACITY SAME ANTENNAS Same 7MHz channel QPSK 256QAM with ACM 99.999% availability for the E1s Low cost, scalable, pay as you grow
13

4xE1 + 40Mbps Ethernet 7MHz channel

Proprietary and Confidential

Thank You ! training@ceragon.com

14

Ceragon - Training - Handbook - Page 36

Mean Square Error

Agenda

MSE Definition Expected value The Error Histogram Giving bigger differences more weight than smaller differences Calculating MSE MSE in digital modulation Commissioning with MSE MSE and ACM

Proprietary and Confidential

Ceragon - Training - Handbook - Page 37

MSE - Definition

MSE is used to quantify the difference between an estimated (expected) value and the true value of the quantity being estimated MSE measures the average of the squared errors: MSE is a sort of aggregated error by which the expected value differs from the quantity to be estimated. The difference occurs because of randomness or because the receiver does not account for information that could produce a more accurate estimated RSL

Proprietary and Confidential

To simplify.

Imagine a production line where a machine needs to insert one part into the other Both devices must perfectly match Let us assume the width has to be 10cm wide We took a few of parts and measured them to see how many can fit in.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 38

The Errors Histogram (Gaussian probability distribution function)


Quantity

Expected value

3 3 1 2
width 6cm 7cm 10cm 12cm 16cm

To evaluate how accurate our machine is, we need to know how many parts differ from the expected value 9 parts were perfectly OK
5
Proprietary and Confidential

The difference from Expected value


Quantity

Error = 0 cm

Error = + 2 cm Error = - 3 cm Error = - 4 cm Error = + 6 cm

width 6cm 7cm 10cm 12cm 16cm

To evaluate the inaccuracy (how sever the situation is) we measure how much the errors differ from expected value

Proprietary and Confidential

Ceragon - Training - Handbook - Page 39

Giving bigger differences more weight than smaller differences


Quantity Error = 0 cm

+ 2 cm = 4 -3 cm = 9 - 4 cm = 16 + 6 cm = 36 width 6cm 7cm 10cm 12cm 16cm

We convert all errors to absolute values and then we square them The squared values give bigger differences more weight than smaller differences, resulting in a more powerful statistics tool: 16cm parts are 36 units away than 2cm parts which are only 4 units away
7
Proprietary and Confidential

Calculating MSE
Quantity

Error = 0 cm

+ 2 cm = 4 -3 cm = 9 - 4 cm = 16 + 6 cm = 36 width 6cm 7cm 10cm 12cm 16cm

To evaluate the total errors, we sum all the squared errors and take the average: 16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13

The bigger the errors (differences) >> the bigger MSE becomes
8
Proprietary and Confidential

Ceragon - Training - Handbook - Page 40

Calculating MSE
Quantity Error = 0 cm

width 10cm If all parts were perfectly produced than each error would be 0 This would result in MSE = 0

Conclusion: systems perform best when MSE is minimum


9
Proprietary and Confidential

MSE in digital modulation (Radios)


Q 01 00
2 possible states for I signal 2 possible states for Q signal
Let us use QPSK (4QAM) as an example: QPSK = 2 bits per symbol

= 4 possible states for the combined signal

11

10

The graph shows the expected values (constellation) of the received signal (RSL)

10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 41

MSE in digital modulation (Radios)


The black dots represent the expected values (constellation) of the received signal (RSL)

Q 01 00

The blue dots represent the actual RSL

11

10

Similarly to the previous example, we can say that the bigger the errors are the harder it becomes for the receiver to detect & recover the transmitted signal

11

Proprietary and Confidential

MSE in digital modulation (Radios)

Q 01
e2

00
e1

MSE would be the average errors of e1 + e2 + e3 + e4.

I
e4 e3 When MSE is very small the actual signal is very close to the expected signal

11

10

12

Proprietary and Confidential

Ceragon - Training - Handbook - Page 42

MSE in digital modulation (Radios)

Q 01
e2

00
e1

When MSE is too big, the actual signal (amplitude & phase) is too far from the expected signal

I
e4 e3

11

10

13

Proprietary and Confidential

Commissioning with MSE in EMS

When you commission your radio link, make sure your MSE is small (-37dB)

Actual values may be read -34dB to -35dB

Bigger values (-18dB) will result in loss of signal

14

Proprietary and Confidential

Ceragon - Training - Handbook - Page 43

MSE and ACM


When the errors become too big, we need a stronger error correction mechanism (FEC) Therefore, we reduce the number of bits per symbol allocated for data and assign the extra bits for correction instead For example 256QAM has great capacity but poor immune to noise 64QAM has less capacity but much better immune for noise
ACM Adaptive Code Modulation
15
Proprietary and Confidential

Thank You ! training@ceragon.com

16

Ceragon - Training - Handbook - Page 44

3/14/2010

RFUC&MediationDevices

Proprietary and Confidential

The Most Comprehensive Portfolio FibeAir Family


RFUs 6-38 GHz
RFU-C

Carrier Ethernet
IP-10 IP-MAX2 3200T

EMS & NMS


PolyView (NMS)

Multi-Service
RFU-HP IP-10 IP-MAX2 640P CeraView (EMS) RFU-P, RFU-SP 1500R/1500P

TDM
3200T

2
Proprietary and Confidential

Ceragon - Training - Handbook - Page 45

3/14/2010

IDU RFU Compatibility

RFU-C

IP-10

RFU-P, RFU-SP

1500R

RFU-HP

IP-IP-MAX2

RFU-SP 640P

1500P
3
Proprietary and Confidential

IDU IDU Compatibility Across Link


1500R 1500R

IP-10 IP 10

IP-10

1500P

1500R

IP-MAX/IP-MAX2

IP-10

1500P chassis Cannot House 1500R IDC and IDMs 1500R chassis Cannot House 1500P IDC and IDMs Must Match IDU Type Across a Link
4
Proprietary and Confidential

Ceragon - Training - Handbook - Page 46

3/14/2010

RFU-C direct mount configurations

1+0 direct

5
Proprietary and Confidential

RFU-C direct mount configurations


1+1 direct

6
Proprietary and Confidential

Ceragon - Training - Handbook - Page 47

3/14/2010

RFU-C remote mount configurations

1+0 remote

7
Proprietary and Confidential

RFU-C remote mount configurations


1+1 remote

8
Proprietary and Confidential

Ceragon - Training - Handbook - Page 48

3/14/2010

RFU-C antenna adaptors

Adaptors for RFU-P direct antenna mount Adaptors for NSN Flexi Hopper direct antenna mount Adaptors for Ericsson R1A 23GHz direct antenna mount Remote adaptors and configurations

9
Proprietary and Confidential

RFU-C to NSN antenna

10
Proprietary and Confidential

Ceragon - Training - Handbook - Page 49

3/14/2010

RFU-C to Ericsson antenna

(R1A 23GHz)

11
Proprietary and Confidential

Antenna Alignment (1)

Connect the headset to AGC monitor BNC/TNC connector on ODU Connect Digital Volt Meter (DVM) to the AGC BNC connector Align the antenna until voltage reading is achieved (1.2 to 1.7Vdc) Repeat antenna alignment at each end until the minimum dc voltage is achieved

1.30vdc = -30dBm 1.45vdc = -45dBm 1.60vdc = -60dBm etc


12
Proprietary and Confidential

Ceragon - Training - Handbook - Page 50

3/14/2010

Antenna Alignment (2)

Compare achieved RX level to calculated RX level Keep aligning until the achieved level is up to 4 dB away from the calculated received signal level If voltage reading is more than 4 dB away or higher than 1.7vdc, re-align antenna to remote site

13
Proprietary and Confidential

training@ceragon.com g@ g ThankYou! Thank You !

14
Proprietary and Confidential

Ceragon - Training - Handbook - Page 51

FibeAir IP-10 G-Series


Front Panel Description

Proprietary and Confidential

Front Panel Overview

GUI Example)

Lets go over the front panel connections of the IP-10 G-Series We shall explain them one by one, left to right
2

Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 52

CLI Serial Connection

DB9 Craft Line Interface (CLI) Baud: 115200 Data bits: 8 Parity: None Stop bits: 1 Flow Control: None
3
Proprietary and Confidential

EOW Easy Comm. Via Radio

Engineering Order Wire To communicate with your colleague on the other side of the radio link, simply connect here your headset

Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 53

External Alarms

DB9 Dry Contact External Alarms The IP-10 supports 5 input alarms and a single output alarm The input alarms are configurable according to:
1) Intermediate, 2) Critical, 3) Major, 4) Minor and 5) Warning

The output alarm is configured according to predefined categories


5

Proprietary and Confidential

LED Indications

LINK:

GREEN radio link is operational ORANGE - minor BER alarm on radio RED Loss of signal, major BER alarm on radio

IDU:

GREEN IDU functions ok ORANGE - fan failure RED Alarm on IDU (all severities)

RFU:

GREEN RFU functions ok ORANGE Loss of communication (IDU-RFU) RED ODU Failure

Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 54

LED Indications

PROT:

Main unit GREEN (when there no alarms) STBY unit: YELLOW (when there no alarms) ORANGE Forced switch, Protection lock RED physical errors (no cable, cable failure) OFF Protection is disabled, or not supported on device

RMT:

GREEN remote unit OK (no alarms) ORANGE minor alarm on remote unit RED major alarm on remote unit

Proprietary and Confidential

User Channels (1)

Two software-selectable user channels (RJ-45): A single synchronous channel OR two asynchronous channels Each asynchronous channel will make use of its own RJ-45 external interface The synchronous channel mode will make use of both interfaces (acting as a single interface)
8
Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 55

User Channels (2)

Modes of operation: V.11 Asynchronous (9600bps) RS-232 Asynchronous (9600bps) V.11 Synchronous Co-Directional (64Kbps) V.11 Synchronous Contra Directional (64Kbps)
9
Proprietary and Confidential

User Channels (3)

Allowed configurations: Two RS-232 Asynchronous UCs (default) Two V.11 Asynchronous UCs One RS-232 Asynchronous UC, and one V.11 Asynchronous UC One V.11 Synchronous Co-Directional One V.11 Synchronous Contra Directional UC > All settings are copied to Mate when working in Protected mode
10
Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 56

Protection Port

Protection Port (only for standalone units) Protect your Main unit with a STBY unit Protection ports on both units deliver the proprietary protocol to support automatic or manual switchover
The FE protection port is static (only used for protection, not traffic). Its switching is performed electrically. If the unit is a stand-alone, an external connection is made through the front panel. If the unit is connected to a backplane, the connection is through the backplane, while the front panel port is unused.
11
Proprietary and Confidential

T-Cards (Add-on Mezzanines)

Field upgradeable modules (T-Cards):


16 x E1 T-Card (32 total per unit) DS1 T-Card STM1/OC3 MUX T-Card
12
Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 57

T-Cards (Add-on Mezzanines)

An optional STM-1 interface card can be inserted in a dedicated slot in the system; the card can transmit and receive up to 63 E1s in a channelized STM-1 signal. The supported mapping is VC4 only: VC-12->TU-12->TUG-2->TUG-3->VC-4->AU-4->AUG The STM-1 T-card is only supported in unprotected main units or in unprotected stand-alone IDUs
13
Proprietary and Confidential

GbE Ports

Two GbE ports, each port with 2 physical interfaces: Port #1: optical (SFP transceiver) or electrical Port #2: optical (SFP transceiver) or electrical
GbE ports support QoS as in IP-10 (scheduler, policers, shaper, classifiers)

Port #2
14
Proprietary and Confidential

Port #1

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 58

FE Ports

5 FE ports: Port 3: Port 4: Port 5,6 &7: Data Data or WSC (2 Mbps Wayside Channel) Data or local management

All ports support QoS as in IP-10 (scheduler, policers, shaper, classifiers)

15

Proprietary and Confidential

Radio and misc.

The Radio port is the switchs 8th port (same as in IP-10)

In addition Grounding -48vdc Power Connector Fan Drawer

16

Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 59

XC using a Shelf Configuration

XC operation is implemented using two-unit backplanes, which provide the interconnectivity. Up to three backplanes, consisting of six IDUs, can be stacked to provide an expandable system
17
Proprietary and Confidential

XC using a Shelf Configuration


All IDUs that operate within the XC system have identical hardware, and act as stand-alone units.

The 2 lower units can be configured as Main units. The role an IDU plays is determined during installation by its position in the traffic interconnection topology
18
Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 60

Thank You !
training@ceragon.com

Proprietary and Confidential

10

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 61

FibeAirIP10GSeries

Installation

Proprietary and Confidential

General
If installation requires CFG file upload & download and / or SW file upload & down -

1. 2. 3.

Make sure FTP Server is installed on your PC FTP is configured (RD/WR permissions) Latest SW version is available (FTP root directory)

FTPinstallationguide isavailableat Training.Ceragon.Com: seeModules/ Installation

Proprietary and Confidential

Advanced Operation & Maintenance Course

1
Ceragon - Training - Handbook - Page 62

Agenda
Site Requirements Packing & Transportation Unpacking Required Tools q IDU Dimensions Installing standalone IDU in a 19 Rack Installing Nodal Enclosures in a 19 Rack Preparing the IDU for a Shelf installation Installing the IDU in a Shelf Installing a Blank Panel IDU in a Shelf Installing a T-Card into an IDU Grounding the IDU Lightning Protection Power General Requirements Installing the IDU-ODU IF cable

Proprietary and Confidential

Site Requirements
IDU must be located indoors The environment temperature must be between -5 C and +45 C. Easily accessible, but only by authorized personnel. Available power source of -48 VDC, and the site must comply with National Electric Code (NEC) standards. Available management connection (Ethernet or dial-up). IDU-ODU connection (IF cable): no more than 300m

Proprietary and Confidential

Advanced Operation & Maintenance Course

2
Ceragon - Training - Handbook - Page 63

Site Requirements
Heat Dissipation:
The IP-10 IDU overall heat dissipation is 25W max (~85 BTU/h). The ODU heat dissipation is 100W max. p

Antenna Location:
As with any type of construction, a local permit may be required before installing an antenna. It is the owners responsibility to obtain any and all permits.

Proprietary and Confidential

Packing & Transportation


The equipment is packed at the factory, and sealed moisture-absorbing bags are inserted. The equipment is prepared for public transportation. The cargo must be kept dry during transportation. Keep items in their original boxes till they reach their final destination. If intermediate storage is required, the packed equipment must be stored in dry and cool conditions and out of direct sunlight When unpacking Wh ki Check the packing lists, and ensure that the correct part numbers and quantities of components arrived.

Proprietary and Confidential

Advanced Operation & Maintenance Course

3
Ceragon - Training - Handbook - Page 64

Unpacking
A single FibeAir system (1+0) is shipped in 5 crates.

Upon delivery, make sure that the following items are included: Two indoor units and accessories Two outdoor units For 13-38 GHz systems, verify that there is a high RFU and low RFU. One CD with a management user guide.

Unpack the contents and check for damaged or missing parts. If any part is damaged or missing, contact your local distributor.

Proprietary and Confidential

Required Tools
The following tools are required to install the IDU:

Philips screwdriver #2 (for mounting the IDU to the rack and grounding screw) Flathead small screwdriver (for PSU connector) Sharp cutting knife (for wire stripping) Crimping tool for ground cable lug crimping (optional: if alternative grounding cable is used)

Setting up Management will require ETH cable (for setting management) Serial Cable (for setting management)
8
Proprietary and Confidential

Advanced Operation & Maintenance Course

4
Ceragon - Training - Handbook - Page 65

Specifications
Connector spec, cable spec & interface pin layout can be found in our complete PDF installation guide

installation guides available at Training.Ceragon.Com: see M d l / Installation Modules I t ll ti

Proprietary and Confidential

IDU Dimensions

42.60mm

10

Proprietary and Confidential

Advanced Operation & Maintenance Course

5
Ceragon - Training - Handbook - Page 66

Installing standalone IDU in a 19 Rack

As shown in the illustration, four screws, supplied with the installation kit, are used to secure the IDU to the rack kit rack.

11

Proprietary and Confidential

Installing Nodal Enclosures in a 19 Rack

12

Proprietary and Confidential

Advanced Operation & Maintenance Course

6
Ceragon - Training - Handbook - Page 67

Installing Nodal Enclosures in a 19 Rack


Before you install the enclosures Plan carefully the required space within the rack ! Should you need to install 3 enclosures prepare at least 10Us (6Us for enclosures + 2Us free Main Enclosure
space for maneuvering above and below shelves)

Start the installation process from bottom to top, e.g. Main enclosure should be installed first at the bottom of your rack space
13
Proprietary and Confidential

Installing Nodal Enclosures in a 19 Rack


Step #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws.

14

Proprietary and Confidential

Advanced Operation & Maintenance Course

7
Ceragon - Training - Handbook - Page 68

Installing Nodal Enclosures in a 19 Rack


Step #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws. Step #2: Slide down the 2nd extension enclosure. Male connector should plug in smoothly into the Main enclosure.

15

Proprietary and Confidential

Installing Nodal Enclosures in a 19 Rack


Step #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws. Step #2: Slide down the 2nd extension enclosure. Male connector should plug in smoothly into the Main enclosure. Step #3: Slide down the 2nd extension enclosure. Male connector should be plugged in smoothly into the Main enclosure.

16

Proprietary and Confidential

Advanced Operation & Maintenance Course

8
Ceragon - Training - Handbook - Page 69

Installing Nodal Enclosures in a 19 Rack


Step #4: Secure the 2nd extension into the Main enclosure. Use the built-in screw. Mount the 2nd extension into the rack using the 4 screws

17

Proprietary and Confidential

Installing Nodal Enclosures in a 19 Rack


Step #4: Secure the 2nd extension into the Main enclosure. Use the built-in screw. Mount the 2nd extension into the rack using the 4 screws Step #5: Add the 3rd extension when needed

18

Proprietary and Confidential

Advanced Operation & Maintenance Course

9
Ceragon - Training - Handbook - Page 70

Preparing the IDU for a Shelf installation


Remove the two 19" brackets mounted on the IP-10 IDU by unscrewing the 3 screws at each side.

19

Proprietary and Confidential

Installing the IDU in a Shelf


Slide the IP-10 IDU into the enclosure and tighten it using 2 screws. Repeat this step in accordance with the configuration.

IDU insertion & extraction should NOT be under power

20

Proprietary and Confidential

Advanced Operation & Maintenance Course

10
Ceragon - Training - Handbook - Page 71

Installing a Blank Panel IDU in a Shelf


Slide the IP-10 blank panel into the enclosure, and tighten it using 2 screws.

21

Proprietary and Confidential

Installing a T-Card into an IDU


Remove the IP-10 T-Card blank panel from the IDU, by releasing the 2 side screws.

22

Proprietary and Confidential

Advanced Operation & Maintenance Course

11
Ceragon - Training - Handbook - Page 72

Installing a T-Card into an IDU


Insert the IP-10 T-Card panel and tighten it using the 2 side screws.

23

Proprietary and Confidential

Grounding the IDU

Single Point Stud Grounding Wire

24

Proprietary and Confidential

Advanced Operation & Maintenance Course

12
Ceragon - Training - Handbook - Page 73

Grounding the IDU


The IDU is suitable for installation in a Common Bonding Network (CBN). Only copper wire should be used. The wire must be at least 14 AWG. Connector and connection surfaces must be plated. Bare conductors must be coated with antioxidant before crimp connections are made to the screws. FibeAir provides a ground for each IDU, via a one-hole mounted lug onto a single-point stud. t be installed i i l d two star t Th stud must b i t ll d using a UL li t d ring t The t d UL-listed i tongue t terminal, and t washers for anti-rotation.

25

Proprietary and Confidential

Lightning Protection
For antenna ports, lightning protection is used that does not permit transients of a greater magnitude than the following: Open Circuit: 1.2-50us 600V Short Circuit: 8-20us 300A The ampacity of the conductor connecting the IDU frame to the DC return conductor is equal to or greater than, the ampacity of the associated DC return conductor.

26

Proprietary and Confidential

Advanced Operation & Maintenance Course

13
Ceragon - Training - Handbook - Page 74

Power General Requirements


1. A readily accessible Listed branch circuit over-current protective device, rated 15 A, must be incorporated in the building wiring. 2. This equipment is designed to permit connection between the earthed conductor of the DC supply circuit and the earthing conductor at the equipment. 3. The equipment shall be connected to a properly grounded supply system 4. The DC supply system is to be local, i.e. within the same premises as the equipment 5. A disconnect device is not allowed in the grounded circuit between the DC supply source and the frame/grounded circuit connection.

27

Proprietary and Confidential

Power Requirements
When selecting a power source, the following must be considered: DC power can be from -40.5 VDC to -60 VDC. Recommended: Availability of a UPS (Uninterrupted Power Source), battery backup, and emergency power generator. Whether or not the power source provides constant power (i.e., power is secured on weekends or is shut off frequently and consistently). The power supply must have grounding points on the AC and DC sides. Th user power supply GND must be connected to the positive pole i th IDU The l tb t d t th iti l in the power supply. Any other connection may cause damage to the system!

28

Proprietary and Confidential

Advanced Operation & Maintenance Course

14
Ceragon - Training - Handbook - Page 75

Power Requirements
Important Make sure to use a circuit breaker to protect the circuit from damage by short or overload.

29

Proprietary and Confidential

Installing the IDU-ODU IF cable


Route the IF Coax Cable from the IDU to the ODU/RFU and terminate it with N-type male connectors. Note: Make sure you fasten the cable along the ladder! Make sure that the inner pin of the connector does not exceed the edge of the connector. The cable should have a maximum attenuation of 30 dB at 350 MHz.

30

Proprietary and Confidential

Advanced Operation & Maintenance Course

15
Ceragon - Training - Handbook - Page 76

ThankYou!
training@ceragon.com

Proprietary and Confidential

Advanced Operation & Maintenance Course

16
Ceragon - Training - Handbook - Page 77

FibeAirIP10GSeries

Setting Management

Proprietary and Confidential

Agenda
Getting started General notes General commands Command history y Reading current IP Setting new IP Connecting PC to IDU Troubleshooting Factory Defaults

2
Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 78

Getting started
Verify that physical installation is successfully completed: IDU is properly mounted in a shelf / rack Power + GND IF Cable between IDU and ODU Connect a PC to the Terminal connector and launch a serial application
Baud: 115200 Data bits: 8 Parity: None St bit 1 Stop bits: Flow Control: None

YoumayuseanySerial ApplicationsuchasHyper Terminal PuTTY TeraTerm Terminal,PuTTY,TeraTerm etc

Log on using (admin/admin) for user name and password. Now, you should be able to see the IP-10 CLI Prompt
3
Proprietary and Confidential

General notes on CLI

IP-10:/>

Note that the

> sign indicates your current directory in the CLI tree

Most of the CLI commands are based on GET/SET concept Some commands may require a different syntax Ceragon strongly recommends to use CLI only for setting management IP address when current IP is unknown All functions & features can be configured faster and easier using the WEB based EMS
4
Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 79

General Commands
IP-10:/ >? IP-10:/ls IP-10:/lsp IP-10:/ > exit / IP-10:/ > cd IP-10:/ > cd ..

Type ? (question mark) to list helpful commands Type ls to list your current directory Type lsp to available commands of current directory Type exit to terminate the session Type cd to change directory Type cd .. to return to root directory
5
Proprietary and Confidential

Command History

Use the arrow keys to navigate through recent commands

Use the TAB key to auto-complete a syntax

6
Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 80

Reading current IP
To read current IP type the following:

IP-10:/>cd management/networking/ip-address/ IP-10:/ management/networking/ip-address>


Note that the prompt has changed. Now, type get ip-address:

IP-10:/ management/networking/ip-address>get ip-address


Upon completion, the current IP will be displayed followed by the new completion displayed, prompt:

IP-10:/ management/networking/ip-address>get ip-address 192.168.1.1 IP-10:/ management/networking/ip-address>


7
Proprietary and Confidential

Setting new IP
Now, let us set a new IP for the MNG: We assume the required IP is 192.168.1.144 Type set ip-address 192.168.1.144
IP-10:/ management/networking/ip-address>set ip-address 192.168.1.144

Upon completion, you will be prompt:

You may lose remote management connection to the unit if this value is changed incorrectly. Are you sure? (yes/no):
Type yes and connect the IDU to your network / PC
8
Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 81

Connecting IDU to EMS


1. Connect your EMS/NMS to the IDU (port 7) with ETH CAT.5 cable 2. Verify that your PCs IP is in the same subnet 3. 3 Make sure Link is up 4. PING the IDU 5. Launch a WEB browser with the URL set as the IDUs IP

9
Proprietary and Confidential

Management Troubleshooting
In case PC cannot PING IDU 1. Check your ETH cable it might not be inserted properly (broken PIN) 2. Verify the management port is enabled in the EMS General/Management configuration 3. Make sure you connect to a management-enabled port (7, 6 or 5) 4. Verify right LED is ON (see below) 5. Verify your PC is in the same subnet as the IDU 6. In case your IDU is connected to a router: set the IDUs Default GW = Router IP 7. In case your PC is connected to several IDUs (through switch/hub) make sure every IDU has a unique IP When ON (Green) = Port is set to Management When OFF = Port is set to Data

10
Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 82

Back to factory defaults


Going back to factory defaults can be done with EMS or CLI In case you need to set factory defaults with CLI type the following -

IP-10:/> cd management/mng-services/cfg-service

In the new directory type the following:

IP-10:/management/mng-services/cfg-service>set-to-default

11
Proprietary and Confidential

ThankYou!
training@ceragon.com

Proprietary and Confidential

Advanced Operation & Maintenance Course


Ceragon - Training - Handbook - Page 83

3/7/2010

FibeAir IP-10 G-Series


EMS Performance Monitoring

Proprietary and Confidential

Agenda
EMS General Information Faults: Current Alarms Event Log PM & Counters: Remote Monitoring TDM Trails TDM interfaces Radio (RSL, TSL, MRMC and MSE) Radio TDM Radio ETH
2
Proprietary and Confidential

Ceragon - Training - Handbook - Page 84

3/7/2010

EMS - General

Easy, user friendly GUI No need to install an application WEB Based software No need to upgrade your EMS application embedded in the IDU SW No need for strong working station simple PC is sufficient
(For maintenance issues FTP Server is required)

Easy access simply type the IP address of the IDU on your web page Supports all IDU versions and configurations

Proprietary and Confidential

EMS Main View


Access application via IP address

User friendly navigation menu

Proprietary and Confidential

Ceragon - Training - Handbook - Page 85

3/7/2010

EMS Main View


Graphical MENU: Click to configure

Proprietary and Confidential

EMS Main View

Protection Status Display & Quick Access Icons

Proprietary and Confidential

Ceragon - Training - Handbook - Page 86

3/7/2010

EMS Main View


In this example slot #1 and slot #2 are configured to support 1+1 Protection Slot #1 is selected and in Active mode.

Black Rectangular to indicate selected slot for configuration

Proprietary and Confidential

EMS Main View


When the user selects Slot 2 the GUI updates automatically

Proprietary and Confidential

Ceragon - Training - Handbook - Page 87

3/7/2010

Faults - CAS
The CAS window shows collapsed list of alarms By expanding a line we can see additional information: Probable cause Corrective Actions

Proprietary and Confidential

Faults Event Log


The Event Log shows max. 200 lines of events When Event #201 occurs, Event #1 is erased and #201 is logged as #200.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 88

3/7/2010

PM Clearing previous data


To erase all IDU PM data, click the CLEAR button -

Proprietary and Confidential

PM RMON
The system supports Ethernet statistics counters (RMON) display. The counters are designed to support: RFC 2819 RMON MIB.
RFC 2665 Ethernet-like MIB. RFC 2233 MIB II. RFC 1493 Bridge MIB.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 89

3/7/2010

PM RMON Special Registers


RMON register / Counter Undersize frames received Oversize frames received Jabber frames received Fragments frames received Rx error frames received FCS frames received In Discard Frames In Filtered Frames Pause frames received Description Frames shorter than 64 bytes Frames longer than 1632 bytes Total frames received with a length of more than 1632 bytes, but with an invalid FCS Total frames received with a length of less than 64 bytes, and an invalid FCS Total frames received with Phy-error Total frames received with CRC error, not countered in "Fragments", "Jabber" or "Rx error" counters Counts good frames that cannot be forwarded due to lack of buffer memory Counts good frames that were filtered due to egress switch VLAN policy rules Number of flow-control pause frames received
Proprietary and Confidential

PM TDM Trails In Detail


Report Interval: The number of trails in the list is derived from radio link capacity (default license = 10Mbps)

Display 15 minutes intervals or single Daily interval (24 hours) Information can be displayed as a graph

Proprietary and Confidential

Ceragon - Training - Handbook - Page 90

3/7/2010

PM TDM Trails In Detail


Errored Second (ES): A one-second period with one or more errored blocks or at least one defect

Proprietary and Confidential

PM TDM Trails In Detail


Severely Errored Second (SES): A one-second period, which contains 30% errored blocks or at least one defect. SES is a subset of ES.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 91

3/7/2010

PM TDM Trails In Detail


A period of unavailable time begins at the onset of 10 consecutive Severely Errored Second (SES) events. These 10 seconds are considered to be part of unavailable time. A new period of available time begins at the onset of 10 consecutive non-SES events. These 10 seconds are considered to be part of available time.

Proprietary and Confidential

PM TDM Trails In Detail


Background Block Error (BBE): An errored block not occurring as part of a SES.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 92

3/7/2010

PM TDM Trails In Detail


Number of Switches (only relevant for Protected SNCP Trails): The number of times the IP-10 switched from Primary Path to Secondary Path and vice versa (per 15min or 24hrs interval)

Proprietary and Confidential

PM TDM Trails In Detail


Active Path Seconds (only relevant for Protected SNCP Trails): The number of times seconds the Active Path was available

Proprietary and Confidential

Ceragon - Training - Handbook - Page 93

10

3/7/2010

PM TDM Trails In Detail


Integrity: Indicates whether information is reliable for analysis (ticked) or not For example if clock was changed or system was restarted during this interval then information is not reliable

Proprietary and Confidential

PM E1 / DS-1 (Radio PM)


This PM data relates to the TDM Line Interfaces.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 94

11

3/7/2010

PM E1 / DS-1 (Radio PM)


Here we can analyze TDM PM through the radio link

Proprietary and Confidential

PM STM-1 Interface
This PM data relates to the STM-1 Line Interface.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 95

12

3/7/2010

PM Radio
Signal Level RSL & TSL analysis Allows setting RSL & TSL thresholds EMS will notify when signal exceeds THSLD >> Easier maintenance

Aggregated radio traffic analysis MRMC PM related to ACM: Scripts Bit rate Radio VCs MSE analysis
Proprietary and Confidential

PM Radio Signal Level - Example

- 40dBm = Nominal RSL for an operational Link Level 1: 25 sec Level 2: 15 sec 900 sec = 15min Interval
Proprietary and Confidential

Ceragon - Training - Handbook - Page 96

13

3/7/2010

PM Radio Signal Level - Example


Using graphical display of the THSLD analysis allows us easier examination of the RSL & TSL state throughout certain period of time

RSL -40

-50

-68

-99 10 5 10

T [sec]

Proprietary and Confidential

PM Radio - Aggregate
Aggregated radio traffic analysis

Proprietary and Confidential

Ceragon - Training - Handbook - Page 97

14

3/7/2010

PM Radio - MRMC
The information displayed in this page is derived from the license and script assigned to the radio. When ACM is enabled and active, as link quality degrades or improves, the information is updated accordingly.

Proprietary and Confidential

PM Radio - MSE
The information displayed in this page is derived from the license and script assigned to the radio. When link quality degrades or improves, the MSE reading is updated accordingly. Differences of 3dB trigger ACM modulation changing. Threshold can be configured as well for easier maintenance.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 98

15

3/7/2010

PM Ethernet
ETH Traffic + Threshold settings: Frame Error Rate Frame error rate (%) measured on radio-Ethernet interface Throughput data bits measured on radioEthernet interface Capacity - overall Ethernet bits rate, data & overhead, measured on radio-Ethernet interface Utilization - (Actual Ethernet throughput, relative to the potential Ethernet throughput of the radio, excluding TDM channels). Utilization (%) is displayed as one of five bins: 0-20%, 20-40%, 40-60%, 60-80%, 80-100%
Proprietary and Confidential

PM Ethernet

Ethernet throughput & Capacity PMs are measured by accumulating the number of Ethernet octets every second, as they are counted by the RMON counters

Proprietary and Confidential

Ceragon - Training - Handbook - Page 99

16

3/7/2010

Thank You ! training@ceragon.com

33

Ceragon - Training - Handbook - Page 100

17

3/7/2010

FibeAir IP-10 G-Series


EMS General Configuration

Agenda

In this module we shall explain the following features as they appear on the EMS navigation Menu

Proprietary and Confidential

Ceragon - Training - Handbook - Page 101

3/7/2010

Unit Parameters Step # 1

Configure specific information that may assist you later Such info will help you locate your site easier and faster

Proprietary and Confidential

Unit Parameters Step # 1

VDC reading

Proprietary and Confidential

Ceragon - Training - Handbook - Page 102

3/7/2010

Unit Parameters Step # 1

Celsius (metric) or Fahrenheit (Imperial)


5
Proprietary and Confidential

Unit Parameters Step # 2

By default the time & date are derived from the operating system clock User may set new values These settings are also used for NTP connection (later explained)

Proprietary and Confidential

Ceragon - Training - Handbook - Page 103

3/7/2010

Unit Parameters Step # 3


IDU Serial number is important when you submit your request for a License upgrade

When you complete configuring all settings, click Apply.

Proprietary and Confidential

Versions

This page shows the complete package of IDU and ODU software components
8
Proprietary and Confidential

Ceragon - Training - Handbook - Page 104

3/7/2010

Versions

Lets explore this example: The IDU running SW is displayed in the aidu line and currently it is 3.0.92 A new SW was downloaded sometime in the past (3.0.97) The IDU was not upgraded yet

Proprietary and Confidential

Versions RFU files

The IDU holds all the SW files for all the components (IDU + ODU) You can see here the different files per ODU type

10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 105

3/7/2010

External Alarms Collapsed Input Alarm Config.

Dry Contact Alarms (DB-9): 5 Inputs 1 Output


11
Proprietary and Confidential

External Alarms Expended Input Alarm Config.

12

Proprietary and Confidential

Ceragon - Training - Handbook - Page 106

3/7/2010

External Alarms Configuring the Output Alarm


Group of alarms will trigger the external alarm Output. Communication Alarms related to traffic: Radio / Ethernet line / TDM line Quality of Service We do not have specific alarms of QoS Processing Alarms related to SW: Configuration / Resets / corrupted files Equipment Alarms related to: HW / FAN / RFU mute / Power Supply / Inventory. Environmental Alarms of extreme temperature. All Groups.

Test mode manual switch.

13

Proprietary and Confidential

Management Network Properties

Here you can set the Network Properties of the IDU

This is the switch MAC address

If your link is up you should be able to see the other ends IP

14

Proprietary and Confidential

Ceragon - Training - Handbook - Page 107

3/7/2010

Management Local Properties (Out of band)

The IDU has 3 ports for local management: Port 7, Port 6 and Port 5. You may enable none or up to 3 ports: Number of ports =3 Number of ports =2 Number of ports =1 Number of ports =0
15

Port 7, Port 6, Port 5 Port 7, Port 6 Port 7 NO LOCAL MANAGEMENT !!!


Proprietary and Confidential

Management In Band Properties

In Band Management requires unique VLAN ID This helps separating MNG traffic from other services In Band MNG packets are transferred via the radio link When the link is down, management is down as well.

16

Proprietary and Confidential

Ceragon - Training - Handbook - Page 108

3/7/2010

Management Port Properties

These parameters allow you setting the management capacity and port properties

17

Proprietary and Confidential

Trap Configuration (OSS / NMS / Northbound)

To manage the IDU with OSS / NMS, you will need to configure the IP address of the OSS Server You may configure up to 4 Servers (Trap Destinations)

18

Proprietary and Confidential

Ceragon - Training - Handbook - Page 109

3/7/2010

Licensing Default License


Demo license can be enabled on-site, it expires after 60 days (operational time) Licenses are generated per IDU S/N upon request (capacity / ACM / switch mode)

License upgrade requires system reset.

19

Proprietary and Confidential

Licensing Demo License Enabled

Demo License allows you full evaluation of the IDU functionality, features and capacities

20

Proprietary and Confidential

Ceragon - Training - Handbook - Page 110

10

3/7/2010

NTP Client Properties


Enable / Disable Type NTP Server IP address Expect IDU to lock on NTP Servers clock Expected Status: 1. If locked, it returns the IP address of the server it is locked on. 2. Local if the NTP client is locked to the local elements real-time clock 3. NA - if not synchronized with any clock (valid only when Admin is set to Disable).
The feature supports Time Offset and Daylight Saving Time. Time Offset and Daylight Saving Time can be configured via WEB (Unit Information page) or via CLI: /management/mng-services/time-service>

21

Proprietary and Confidential

NTP Properties

22

Proprietary and Confidential

Ceragon - Training - Handbook - Page 111

11

3/7/2010

NTP Properties
When using NTP with external protection 1+1, both Active and Standby units should be locked independently on the NTP server, and report independently their Sync status.

Time & Date are not copied from the Active unit to the Standby unit (CQ19584) When using NTP in a shelf configuration, all units in the shelf (including standby main units) are automatically synchronized to the active main units clock.

23

Proprietary and Confidential

IP Table

Here you can manually set your neighbors network properties

24

Proprietary and Confidential

Ceragon - Training - Handbook - Page 112

12

3/7/2010

SNMP
V1 V3

No security Authentication Authentication privacy SHA MD5 No Authentication

25

Proprietary and Confidential

Thank You ! training@ceragon.com

26

Ceragon - Training - Handbook - Page 113

13

3/7/2010

FibeAir IP-10 G-Series


EMS Switch Configuration

Agenda

1. Switch mode review 2. Guidelines 3. Single Pipe Configuration 4. Managed Mode Configuration 5. Managed Mode Common Applications

Proprietary and Confidential

Ceragon - Training - Handbook - Page 114

3/7/2010

Switch Modes
1. Single (Smart) Pipe (default mode, does not require license)
This application allows only single GbE interface as traffic interface (Optical GbE-SFP or Electrical GbE - 10/100/1000). Any traffic coming from any GbE interface will be sent directly to the radio and vice versa. This application allows QoS configuration. Other FE (10/100) interfaces can be configured to be "functional" interfaces (WSC, Protection, Management), otherwise they are shut down. Note: (CQ20473): Single pipe discards PAUSE PDU (01-80-C2-00-00-01) and Slow protocols PDU (01-80-C2-00-00-02).

Proprietary and Confidential

Switch Modes
2. Managed Mode (license depended)
This application is 802.1Q VLAN aware bridge, allowing L2 switching based on VLANs. This application also allows QoS configuration. All Ethernet ports are allowed for traffic. Each traffic port can be configured to be "access" port or "trunk" port:

Type

VLANs Specific VLAN should be assigned to access the port A range of VLANs should be assigned to access the Port

Allowed Ingress Frames Only Untagged frames (or Tagged with VID=0 "Priority Tagged ) Only Tagged frames

Allowed Egress Frames Untagged frames

Access

Trunk

Tagged frames

Proprietary and Confidential

Ceragon - Training - Handbook - Page 115

3/7/2010

Switch Modes
3. Metro Mode (license depended)

This application is 802.1Q VLAN aware bridge, allowing Q-in-Q (A.K.A. VLAN Stacking). This mode allows the configuration of a PE port and CE port.
Allowed Ingress Frames Allowed Egress Frames Untagged or C-tag (ether-type= 0x8100) frames. Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200

Type CustomerNetwork

VLANs

Specific S-VLAN should be Untagged frames, or assigned to "Customerframes with C-tag Network" port (ether-type=0x8100). Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200
Proprietary and Confidential

ProviderNetwork

A range of S-VLANs, or "all" S-VLANs should be assigned to "ProviderNetwork" port

Guidelines

Changing switch modes requires a reset Resets do not change the IP-10G settings (radio, configuration, etc.) VLANs need to be created in the switch DB before assigned to a port

Proprietary and Confidential

Ceragon - Training - Handbook - Page 116

3/7/2010

Single Pipe Configuration


7
Proprietary and Confidential

Single Pipe Configuration

Untagged VID 4 VID 100 45 VID 51

IP-10 Switch

Port 1: GbE (Optical or Electrical) Port 3: FE (RJ45)

Port 8 (Radio)

Proprietary and Confidential

Ceragon - Training - Handbook - Page 117

3/7/2010

Configuration Single Pipe

This is the default setting

Proprietary and Confidential

Configuration Single Pipe

Only one ingress port can be used:

Port 1 (Opt. or Elec.) Port 3 (RJ45)

When one is enabled the other is disabled No need to configure VID membership
10
Proprietary and Confidential

Ceragon - Training - Handbook - Page 118

3/7/2010

Managed Mode Configuration


11
Proprietary and Confidential

Configuration Managed Mode


Lets use this diagram as an example Port #2 as Trunk (VID 200)

IDU-B IDU-A

Port #3 as Trunk (VID 300)

Radios as Trunk by default

Port #2 as Trunk (VID 200, VID 300)

12

Proprietary and Confidential

Ceragon - Training - Handbook - Page 119

3/7/2010

Configuration Managed Mode


Make sure both IDUs are aware of the required VIDs You need to create the VIDs before you assign them to a certain port (Set # & Apply)

13

Proprietary and Confidential

Configuration Managed Mode


Next steps: 1. Go to Interfaces page 2. Enable the required port (Ingress ports) 3. Configure the port type as Trunk or Access 4. Assign allowed VLAN IDs (port membership) 5. Radio port is automatically configured as Trunk, all VLANs are allowed by default

14

Proprietary and Confidential

Ceragon - Training - Handbook - Page 120

3/7/2010

Configuration Managed Mode

2 3

4
15
Proprietary and Confidential

Configuration Managed Mode Common Applications


Tagging / untangling

IP-10
Access Port Radio = Trunk Port Transmits and receives Untagged frames

Transmits and receives Untagged frames

PC
192.168.1.200

PC
192.168.1.100

16

Proprietary and Confidential

Ceragon - Training - Handbook - Page 121

3/7/2010

Configuration Managed Mode Common Applications

Radio = Trunk Port

IP-10
Trunk Port

Multiple L2 streams, each identified with unique VID

Traffic Generator
Trunk Port

17

Proprietary and Confidential

Thank You ! training@ceragon.com

18

Ceragon - Training - Handbook - Page 122

3/7/2010

802.1: Trunk VS. Access

Agenda
1. VLAN TAG Attributes 2. Access Port 3. Trunk Port 4. Extracting frames out of a trunk 5. General Guidelines 6. EMS Trunk Configuration

Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 123

3/7/2010

VLAN TAG Attributes


1. In L2 ETH switching, L2 traffic can be engineered using the VLAN TAG attributes L2 traffic is controlled by defining port membership: Access or Trunk Together, port membership + L2 traffic engineering convert connectionless to connection-oriented network In such networks, services are better deployed and maintained VLAN TAG attributes include: VLAN ID (12 bits) Priority Bits (3 bits) Additional attributes may be used to engineer traffic: MAC DA Port number
Ceragon Networks proprietary and confidential

2. 3.

4. 5. 5.
3

Access Port
Access Port is a port which is aware of a single VLAN only Ingress traffic is expected to be Untagged, e.g. no VLAN information exists within the received Ethernet frame All frames that are received through this port are tagged with default VLAN (VID + P bits) All frames that exit through this port towards customer devices are untagged (VLAN is removed) Users can configure the L2 switch to assign different tagging scenarios to different ports

Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 124

3/7/2010

Access Port
Let us examine the Tagging / Untagging process of a L2 switch

L2 ETH SW

DA

SA

Type

Payload

FCS

Ceragon Networks proprietary and confidential

Access Port Tagging ingress frames


Let us examine the Tagging / Untagging process of Port #1

Tagging

Port #1
DA SA VLAN TAG

Port #8
Type Payload FCS

Tagged frame
DA SA Type Payload FCS

Access Port:Untagged frame


6
Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 125

3/7/2010

Access Port
Utagging frames towards customer interfacing ports
When Tagged frame from Network is forwarded to Access port, the VLAN Tag is removed

Untagging

Port #1
DA SA VLAN TAG

Port #8
Type Payload FCS

Tagged frame
DA SA Type Payload FCS

Access Port: Untagged frame


7
Ceragon Networks proprietary and confidential

Access Port Tagging multiple ports


The switch can individually tag multiple Access ports with same VID or unique VID

Tagging

Port #8 Port #1 Port #2


DA DA SA Type Payload FCS SA Type Payload FCS DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS

DA

Access Ports: Untagged frames


8
Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 126

3/7/2010

Trunk Port multiple VIDs awareness


To be able to transmit & receive multiple VLANs, the common port has to be configured as a Trunk Port

Trunk Port

Port #8 Port #1 Port #2


DA DA SA Type Payload FCS SA Type Payload FCS DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS

DA

Access ports: Untagged frames


9
Ceragon Networks proprietary and confidential

Trunk Port multiple VIDs awareness


Any port can be configured as Trunk In this example, port #2 is facing customer device to forward all the network VLANs (TX&RX)
Trunk Port

Port #8 Port #2
DA DA DA SA VLAN TAG = 10 Type Type Payload Payload FCS FCS SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS

SA VLAN TAG DA Untagged frames = 33


10

Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 127

3/7/2010

Trunk & Access Extracting frames out of a Trunk


A certain VLAN can be extracted out of a Trunk via Access port assigned with specific VLAN membership (Default VID)
Type Payload FCS DA SA VLAN TAG = 33 Type Payload FCS

DA

SA

Port #5: Access

Port #8: Trunk Port #2: Trunk


DA DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS

DA

SA

VLAN TAG = 10

Type Type

Payload Payload

FCS FCS

SA VLAN DA Untagged frames TAG = 33 11

Ceragon Networks proprietary and confidential

General guidelines
Access port can only receive untagged frames from customer device Access port can only transmit untagged frames towards customer device Access port supports single VLAN Access port can be connected to an Access port only Trunk port can only receive / transmit tagged frames Trunk port supports multiple VLANs Trunk port can be connected to a Trunk port only When configuring Access or Trunk port, membership needs to be defined next (which VLANs are supported)

12

Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 128

3/7/2010

EMS Trunk Configuration

2 3

4
13
Ceragon Networks proprietary and confidential

Thank You ! training@ceragon.com

14

Ceragon - Training - Handbook - Page 129

3/7/2010

FibeAir IP-10 G-Series


EMS Metro Switch Configuration

Proprietary and Confidential

Agenda

1. Metro mode review 2. Common Applications: CN PN PN CN 3. Common Applications: CN PN PN PN 4. Switch Mode Configuration 5. CN Port Configuration 6. PN Port Configuration

Proprietary and Confidential

Ceragon - Training - Handbook - Page 130

3/7/2010

Metro Mode (license depended)


This application is 802.1Q VLAN aware bridge, allowing Q-in-Q (A.K.A. VLAN Stacking). This mode allows the configuration of a PE port and CE port.
Type CustomerNetwork VLANs Allowed Ingress Frames Allowed Egress Frames Untagged or C-tag (ether-type= 0x8100) frames. Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200

Specific S-VLAN should be Untagged frames, or assigned to "Customerframes with C-tag Network" port (ether-type=0x8100). Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200

ProviderNetwork

A range of S-VLANs, or "all" S-VLANs should be assigned to "ProviderNetwork" port

Proprietary and Confidential

Common Configurations: CN PN PN CN
Provider-Facing Port (PN) 1st VID is hidden Only S-VLAN is visible

Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite direction

Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite direction
Proprietary and Confidential

Ceragon - Training - Handbook - Page 131

3/7/2010

Common Configurations: CN PN PN PN
Provider-Facing Port (PN) 1st VID is hidden Only S-VLAN is visible

Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite direction Provider-Facing Port (PN) S-VLAN is not removed

Proprietary and Confidential

Switch Mode Configuration

2
1. Set mode to Metro (requires reset) 2. Add the S-VLAN ID (set & apply)

Proprietary and Confidential

Ceragon - Training - Handbook - Page 132

3/7/2010

CN Port Configuration
1. Go to Interfaces / Ethernet Ports page 2. Enable the port 3. Set the type to Customer Network 4. Type the port ID (EVC name, free string) 5. Type the S-VLAN ID 6. Enable Port Learning 7. Apply & Refresh 8. See screen capture next slide
7
Proprietary and Confidential

CN Port Configuration

2 1 4 5 3

6
8
Proprietary and Confidential

Ceragon - Training - Handbook - Page 133

3/7/2010

PN Port Configuration
1. Go to Interfaces / Ethernet Ports page 2. Enable the port 3. Set the type to Provider Network 4. Enable Port Learning 5. Edit (if needed) the allowed S-VLANs 6. Apply & Refresh 7. Set the required S-Tag (Ether-Type) 8. See screen capture next slide
9
Proprietary and Confidential

PN Port Configuration

2 1 1 4 6 5
10
Proprietary and Confidential

Ceragon - Training - Handbook - Page 134

3/7/2010

PN Port Configuration Setting the S-Tag

0x88A8 0x8100 0x9100 0x9200

11

Proprietary and Confidential

Thank You ! training@ceragon.com

12

Ceragon - Training - Handbook - Page 135

3/7/2010

FibeAir IP-10 G-Series


EMS RSTP Configuration

Proprietary and Confidential

Agenda
Student Perquisites General Overview Limitations Site / Node Types Switchover Criteria In Band Management Out of band Management Configuration Example
2
Proprietary and Confidential

Ceragon - Training - Handbook - Page 136

3/7/2010

Student Perquisites
Viewers / end-user are required to have previous experience prior to practicing this module:

1. End users should be familiar with Switch configuration 2. Be End users should be familiar with setting port membership 3. End users should be familiar with management mode configuration 4. End users should be familiar with configuring Automatic State Propagation

Proprietary and Confidential

General Overview
Ceragon Networks ring solution enhances the RSTP algorithm for ring topologies, accelerating the failure propagation relative to the regular RSTP: Relations between Root and Designated bridges when ring is converged in the first time is the same as defined in the standard RSTP. Ring-RSTP itself is different than classic RSTP, as it exploits the topology of the ring, in order to accelerate convergence. Ethernet-Fast-Ring-RSTP will use the standard RSTP BPDUs: 01-80-C2-00-00-00. The ring is revertible. When the ring is set up, it is converged according to RSTP definitions. When a failure appears (e.g. LOF is raised), the ring is converged. When the failure is removed (e.g. LOF is cleared) the ring reverts back to its original state, still maintaining service disruption limitations. RSTP PDUs coming from Edge ports are discarded (and not processed or broadcasted).
4
Proprietary and Confidential

Ceragon - Training - Handbook - Page 137

3/7/2010

Ring RSTP Limitations


1. Ring RSTP is a proprietary implementation of Ceragon Networks, and cannot interwork with other Ring RSTP implementations of other 3rd party vendors. 2. Ring RSTP can be activated only in Managed Switch application, and is not available in any other switch application (Single Pipe or Metro). 3. Ring RSTP should NOT be running with protection 1+1.

Proprietary and Confidential

Site / Node Types


The ring can be constructed by two types of nodes/sites:
1. Node/Site Type A: The site is connected to the ring with one Radio interface (e.g. East) and one Line interface (e.g. West). The site contains only one IP-10 IDU. The Radio interface towards one direction (e.g. East), and one of the Gigabit (Copper or Optical) interfaces, towards the second direction (e.g. West). Other line interfaces are in edge mode, meaning, they are user interfaces, and are not part of the ring itself.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 138

3/7/2010

Site / Node Types


The ring can be constructed by two types of nodes/sites:
2. Node/Site Type B: The site is connected with Radios to both directions of the ring (e.g. East & West). Site contains two IDUs. Each IDU support the Radio in one direction One IDU runs with the Ring RSTP, and the second runs in Single pipe mode. Both IDUs are connected via Gigabit interface (either optical or electrical). Other line interfaces are in edge mode.

Proprietary and Confidential

Switchover / Convergence Criteria


The following failures will initiate convergence:
Radio LOF Link ID mismatch. Radio Excessive BER (optional) ACM profile is below pre-determined threshold (optional). Line LOC Node cold reset (Pipe and/or Switch). Node power down (Pipe and/or Switch) xSTP port disable / enable

Proprietary and Confidential

Ceragon - Training - Handbook - Page 139

3/7/2010

In-Band Management (1)


In this scenario, management is part of the data traffic, thus, management is protected with the traffic when the ring is re-converged as a result of a ring failure. Managed Switch IDUs will be configured to In-Band, while Single Pipe IDUs will be configured to Out-of-Band. Single Pipe nodes will be connected with external Ethernet cable to the Managed Switch for management. The reason for that requirement is the automatic state propagation behavior of the Single Pipe that shuts down its GbE traffic port upon failure, thus, management might be lost to it.

Proprietary and Confidential

In-Band Management (2)

10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 140

3/7/2010

Out of band Management (1)


In this scenario, all elements (Single pipe and Managed Switch IDUs) should be configured to Out-of-band, with WSC enabled. Management will be delivered over WSC.

External xSTP switch should be used in order to gain resilient management, and resolve the management loops.

The following picture demonstrates 4 sites ring, with out-of-band management:

11

Proprietary and Confidential

Out of band Management (2)

12

Proprietary and Confidential

Ceragon - Training - Handbook - Page 141

3/7/2010

Configuration Example
13
Proprietary and Confidential

RSTP Example (1)


Site #1
3 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 4 5 6 7 Pipe (slot #3) 3 4 5 6 7

Site #2
3 4 5 6 7

Site #3
3 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 4 5 6 7

Establish the physical connections according to the setup scheme. Leave one link disconnected to avoid loops (for example: site #3 to site #2) Configure In-Band MNG using VLAN #200 (or other) on all main IDUs
14
Proprietary and Confidential

Ceragon - Training - Handbook - Page 142

3/7/2010

RSTP Example (2)


Site #1
3 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 4 5 6 7 Pipe (slot #3) 3 4 5 6 7

Site #2
3 4 5 6 7

Site #3
3 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 4 5 6 7

Connect extension IDUs (port #3) to Main IDUs (port #3 & port #4, members of VID #200). Use ETH cross-cables. Configure Port 3 (& port 4 of site #2) of Main units as trunks members of VID 200 to transport the management packets
15
Proprietary and Confidential

RSTP Example (3)


Site #1
3 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 4 5 6 7 Pipe (slot #3) 3 4 5 6 7

Site #2
3 4 5 6 7

Site #3
3 Pipe (slot #2) 3 MNG (slot #1) 4 5 6 7 4 5 6 7

Disconnect IDUs from Switch (except for GW IDU) Enable RSTP on all Managed Switches (Main) PING EMS to all Sites Connect the broken radio link (site #1 to Site #3)
16
Proprietary and Confidential

Ceragon - Training - Handbook - Page 143

3/7/2010

RSTP Example (4)

Use the EMS to learn which switch is the Root Bridge and which ports are the Root Ports. Verify that the ring is set up properly (one Root)
17
Proprietary and Confidential

RSTP Example (5)

Identify the Edge Ports and Non-Edge ports in your scheme and make sure they are configured the same in your setup
18

Proprietary and Confidential

Ceragon - Training - Handbook - Page 144

3/7/2010

RSTP Example (6)

Identify the Edge Ports and Non-Edge ports in your scheme and make sure they are configured the same in your setup
19
Proprietary and Confidential

RSTP Example (7)


Make sure that all RING IDUs (Pipe & Managed) are support Automatic State Propagation (enabled). Enabling ASP allows RSTP Ring to converge faster by propagating radio alarms into the Line and thus, accelerating port state changes.

20

Proprietary and Confidential

Ceragon - Training - Handbook - Page 145

10

3/7/2010

RSTP Example (8)


Disconnect a radio link and make sure PING to all Main units is maintained Restore connectivity. Disconnect a different radio link and make sure PING to all Main units is maintained

Repeat the same tests with traffic and trails (SNCP).

21

Proprietary and Confidential

Thank You ! training@ceragon.com

22

Ceragon - Training - Handbook - Page 146

11

3/8/2010

FibeAir IP-10 G-Series


QoS Concept & Implementation

Proprietary and Confidential

Agenda
Introduction Why do we need QoS? Not all Traffic are the same Traffic Engineering as a solution QoS in IP-10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 147

3/8/2010

Introduction (1)
IP-10 is more than a Radio:

High capacity MW Radio


Up to 500Mbps @ 56MHz

ADM Add & Drop Multiplexer:


It enables a matrix of cross-connections between TDM E1/T1,SDH VCs and Radio channels

ADM

L2 ETH SW

L2 ETH Switch:
802.1p/q P-Bit remap Policers Shaping Scheduler IPv4 / IPv6 Classification

MW Radio
Proprietary and Confidential

Introduction (2)
In this presentation we shall focus on the QoS implemented with the integrated L2 ETH switch

But first, let us understand what does Quality Of Service stands for

ADM MW Radio

L2 ETH SW

Proprietary and Confidential

Ceragon - Training - Handbook - Page 148

3/8/2010

Understanding QoS

Why do we need QoS? (1)


Without controlling our Backbone /Core infrastructure High cost of non-responsiveness: devices are deployed but not properly allocated to transport customer traffic On the other hand bad resource design results in congestion which will lead to network downtime costs due to degradation of performance QoS (e.g. - Traffic Engineering) optimizes network resources

Proprietary and Confidential

Ceragon - Training - Handbook - Page 149

3/8/2010

Why do we need QoS? (2)


Mobile operators focus on reducing costs:
Mobile Broadband growth requires Backhaul expansions, hence: Operators are stretching their cost-saving initiatives Operators will look for new ways to drive further Backhaul savings Operators must reduce their cost per Mbit QoS (e.g. - Traffic Engineering) optimizes network resources

Business center

Wireless Carrier Ethernet Backhaul Network

WiMAX / 4G / LTE Cellular site WiMAX Ceragon TDM E1/T1 2G/3G base station Hub / Aggregation site Ceragon

GE

STM-1 / OC-3

Proprietary and Confidential

Fundamental Fact
Dynamic WWW Static WWW

Multimedia

emails FTP

Not all traffic is the same! So why treated equally?...

Skype

Whos first?
8
Proprietary and Confidential

Ceragon - Training - Handbook - Page 150

3/8/2010

Traffic Engineering as a Solution


Your 1st assignment is identifying needs & solutions: What is the BW requirement per service ?
Video requires more than voice Data requires less than video FTP requires more than emails
Multimedia Dynamic WWW Static WWW

emails
What is the delay sensitivity of each service?
Delayed Voice is inacceptable FTP can tolerate delays

FTP Skype

Your 2nd assignment is grouping services into SLAs:


Video & Multimedia Low Services (Best Effort) FTP Moderate Service Skype Highest Service

Your 3rd assignment is configuring QoS in your network


9
Proprietary and Confidential

QoS in IP-10

Ceragon - Training - Handbook - Page 151

3/8/2010

IP-10G L2 ETH Switch Ports

The IP-10Gs L2 Switch has 8 ports:

Port #1 GbE (Opt. / Elec.) Port #2 GbE (Opt. / Elec.) Port #3 to port #7 FE Port #8 (Radio port)

11

Proprietary and Confidential

QoS Process
Q4
25 10 50

Q4 Q3 Q2

Q1

Rate Limit

Queuing

Scheduling

Shaping

Ingress Port

Egress Port (s)

12

Proprietary and Confidential

Ceragon - Training - Handbook - Page 152

3/8/2010

Ingress Rate Limiting


Users can configure maximum ingress rate per port Exceeding traffic will be discarded Rate limitation can be configured per type of traffic (Policers)

FE Max. Rate

100Mbps

25 10 50

Max. Allowed Rate

Discard Pass

Actual Customer Traffic

Time Example: Policer assigned to FE interface


13
Proprietary and Confidential

Using Queues
Every port of the L2 switch examines the ingress traffic and then it sorts it in a buffer according to classification criteria This process is called Queuing Users can configure up to 4 queues for max. resolution of priorities

Q4 Q3 Q2 Q1
14
Proprietary and Confidential

High

Low

Ceragon - Training - Handbook - Page 153

3/8/2010

Custom Queuing

Packets sent through interface Sent packets Interface

Scheduling

Egress Queuing

15

Proprietary and Confidential

Scheduling (1)
Once the queues are filled with information, we need to empty them Which queue should we empty first? Round-Robin: Emptying cycle is fixed all queues are treated equally

Q4 Q3 Q2 Q1
16

High

Q4 Q1
Low

Q3
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4

Q2
Pro: no queue starvation Con: no prioritization

Proprietary and Confidential

Ceragon - Training - Handbook - Page 154

3/8/2010

Scheduling (2)
Weighted Round-Robin: Emptying cycle is configurable every queue can be given specific weight

Q4 Q3

High

Q4 Q1
Q2 Q1
17

Q4 Q3 Q2
Pro: no queue starvation
Q3 Q4 Q4 Q1 Q2 Q3 Q4 Q4

Low
Proprietary and Confidential

Scheduling (3)
4th Strict Priority: The switch will empty Q4 as long as it has something Once empty switch will perform RR on lower queues If Q4 receives a frame during the Lower-Queues-RR, it will go back to focus on Q4

Q4 Q3 Q2 Q1
18

High

Q1 Q2
Low

Q3
Q3 Q4 Q4 Q1 Q2 Q3 Q4 Q4

Pro: Optimized Prioritization Con: Queue starvation


Proprietary and Confidential

Ceragon - Training - Handbook - Page 155

3/8/2010

Scheduling (4)
All Strict Priority: The switch will empty a queue as long as the higher queue is empty

Q4 Q3

High

Q3

Q4

Q4

Q1

Q2

Q3

Q4

Q4

Q2 Pro: no queue starvation Q1


19

Low
Proprietary and Confidential

Shaping
Bursts beyond a EIR (Excessive Information Rate) can be buffered and retransmitted when capacity frees up, and only when shaping buffers are full will packets be dropped.

20

Proprietary and Confidential

Ceragon - Training - Handbook - Page 156

10

3/8/2010

Thank You ! training@ceragon.com

21

Ceragon - Training - Handbook - Page 157

11

3/7/2010

FibeAir IP-10 G-Series


EMS Basic QoS Configuration

Proprietary and Confidential

Perquisites
End-users must be familiar with the following items prior to taking this module:

Introduction to Ethernet 802.1p/q QoS (Concept) IP-10 Switch Configuration Trunk VS. Access
2
Proprietary and Confidential

Ceragon - Training - Handbook - Page 158

3/7/2010

Agenda
Introduction IP-10 L2 Switch ports Step #1: Configure the switch Step #2: Configure the switch ports Step #3: Configure QoS per port Process Review Basic Configurations

Proprietary and Confidential

Introduction (2)
In this presentation we shall focus on the L2 ETH switch:
Four priority (CoS) queues Advanced CoS classifier: VLAN Pbits / VLAN ID (RFC 802.1p,q) IPv4 (RFC 791) / IPv6 (RFC 2460, RFC 2474) MAC DA Advanced ingress traffic policing / rate-limiting per port/CoS Flexible scheduling: Strict Priority, WRR or HRR Traffic shaping 802.3x flow control (for loss-less) operation

ADM MW Radio
Proprietary and Confidential

L2 ETH SW

Ceragon - Training - Handbook - Page 159

3/7/2010

IP-10G L2 ETH Switch Ports

The IP-10Gs L2 Switch has 8 ports:

Port #1 GbE (Opt. / Elec.) Port #2 GbE (Opt. / Elec.) Port #3 to port #7 FE Port #8 (Radio port)

Proprietary and Confidential

Step #1: Set your Switch


Configure the switch mode: Pipe / Managed / Metro Configure VLAN IDs

Proprietary and Confidential

Ceragon - Training - Handbook - Page 160

3/7/2010

Step #2: Configure Switch Ports


Configure Port Type: Access / Trunk Configure Port Membership

Proprietary and Confidential

Step #3: Configure QoS per Port

Proprietary and Confidential

Ceragon - Training - Handbook - Page 161

3/7/2010

Process Review

Policer per port

25 10 50

Rate Limit
10
Proprietary and Confidential

Ceragon - Training - Handbook - Page 162

3/7/2010

3 classifiers to audit & queue Ingress Traffic

Queuing

11

Proprietary and Confidential

Egress port Scheduler

Q4 Q1 Q2

Q4 Q3

Scheduling

12

Proprietary and Confidential

Ceragon - Training - Handbook - Page 163

3/7/2010

Egress Port Shaper

Shaping

13

Proprietary and Confidential

Basic Configurations

Ceragon - Training - Handbook - Page 164

3/7/2010

1. Ingress Rate Limiting

Lets say we want to limit Video streams from customer interface towards the network Video streams are characterized with a UDP protocol & multicast address Therefore we shall define a Policer to limit these parameters

15

Proprietary and Confidential

1. Ingress Rate Limiting Setting a Policer


There are 15 different traffic types that we can use Each Policer can have up to 5 conditions

16

Proprietary and Confidential

Ceragon - Training - Handbook - Page 165

3/7/2010

1. Attaching a Policer to a port


To attach a Policer to a port simply type the Policer name

17

Proprietary and Confidential

2. Queuing according to Ingress P-Bits


Click on the VLAN Pbits to Queue link to open the configuration table

Using this table we can map 8 priority levels to 4 queues or lower number of classes This table is global and can be used for other tasks as well

18

Proprietary and Confidential

Ceragon - Training - Handbook - Page 166

3/7/2010

2. Queuing according to Ingress P-Bits


Select VLAN Pbits as the 3rd classifier as shown below:

Set the Egress Scheduler as required -

19

Proprietary and Confidential

3. Queuing Ingress Frames according to MAC


Click on the Static MAC link to open the configuration table

In this example, we prioritize 3 frames according to their MAC DA. The ingress frames are put in a queue according to the Priority settings and VLAN P-Bits to Queue table. Ingress frames with MAC DA that are not listed in this table will be handled by the next classifiers .

20

Proprietary and Confidential

Ceragon - Training - Handbook - Page 167

10

3/7/2010

3. Queuing Ingress Frames according to MAC


Next, select Queue Decision as the 1st criteria

Set the Egress Scheduler as required -

Frames with MAC that do not comply to the table will be classified by the 2nd & 3rd classifiers
21
Proprietary and Confidential

4. Queuing Ingress Packets according ToS / DSCP

Click on the IP Pbits to Queue Link to configure ToS /DSCP for IPv4 or IPv6

22

Proprietary and Confidential

Ceragon - Training - Handbook - Page 168

11

3/7/2010

4. Queuing Ingress Packets according ToS / DSCP


Next, select IP-TOS as the 3rd criteria

Set the Egress Scheduler as required -

23

Proprietary and Confidential

5. Assigning Port traffic to a specific Queue


Select Port as the 3rd criteria Select to which queue the port should assign the ingress frames

Set the Egress Scheduler as required -

24

Proprietary and Confidential

Ceragon - Training - Handbook - Page 169

12

3/7/2010

6. Queuing Ingress frames according to VLAN ID


Click on the VLAN ID to Queue Link to configure the table

25

Proprietary and Confidential

6. Queuing Ingress frames according to VLAN ID


Select Queue Decision as the 2nd criteria

Set the Egress Scheduler as required -

Frames with VID that do not comply to the table will be classified by the 3rd classifier
26
Proprietary and Confidential

Ceragon - Training - Handbook - Page 170

13

3/7/2010

7. Egress Shaper

Reducing the egress rate to a value between 64kbps and 1Mbps requires
setting it in steps of 64kbps

Reducing the egress rate to a value between 1Mbps and 100Mbps requires
setting it in steps of 1Mbps

Reducing the egress rate to a value between 100Mbps and 1Gbps requires
setting it in steps of 10Mbps
27
Proprietary and Confidential

Thank You ! training@ceragon.com

28

Ceragon - Training - Handbook - Page 171

14

3/7/2010

FibeAir IP-10 G-Series


Advanced QoS Configuration

Proprietary and Confidential

Agenda
VLAN P-Bit Re-Map Why? Configuring the Re-Map Table Queuing without Re-Map Queuing with next classifier + Re-Map Queuing + Re-Map IP ToS over VLAN P-Bits VLAN P-Bits over IP ToS Using more than a single Classifier
2
Proprietary and Confidential

Ceragon - Training - Handbook - Page 172

3/7/2010

P-Bit Re-Map: Why?


Re-Map table is per port (e.g. every port can apply a different map) Can be used to re-scale Customer CoS Can be used to guaranty certain Customer priorities are reserved for specific purposes
P-Bit 0-2 34 56 7 Service Video Data MNG Voice 6 7 P-Bit* 0-5 Service Best Effort MNG Voice

Customer network

L2 Switch (IP-10)
Proprietary and Confidential

Provider network

Configuring the Mapping Table


Click on the VLAN Pbits Remap Table link to configure relevant settings

Proprietary and Confidential

Ceragon - Training - Handbook - Page 173

3/7/2010

Queuing without Re-Mapping


Ingress Tagged frame VID P-bit Ingress Rate Limit

Queuing according to classifier

Egress Scheduler

Egress Shaper

VID

P-bit

Proprietary and Confidential

Skipping to next classifier with Re-Map


Ingress Tagged frame VID P-bit Ingress Rate Limit Re-Map Table

Queuing according to next classifier

Egress Scheduler

Egress Shaper

VID

P-bit*

Proprietary and Confidential

Ceragon - Training - Handbook - Page 174

3/7/2010

Queuing and Re-Mapping


Ingress Tagged frame VID P-bit Ingress Rate Limit Re-Map Table

Queuing according to classifier

Egress Scheduler

Egress Shaper

VID

P-bit*

Proprietary and Confidential

Conditional Classification

Ceragon - Training - Handbook - Page 175

3/7/2010

IP ToS over VLAN P-Bits


In case the ingress frame carries a VLAN and has an IP header Classification is according to IP TOS Otherwise the switch will apply the Default Configuration (Queue number).

L2 Tagged ETH

L3 IP Header

Proprietary and Confidential

VLAN P-Bits over IP ToS


In case the ingress frame carries a VLAN and has an IP header Classification is according to VLAN P-Bits Otherwise the switch will apply the Default Configuration (Queue number).

L2 Tagged ETH

L3 IP Header

10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 176

3/7/2010

Using more than a single Classifier


As long as the ingress frames comply to the higher conditions, the system will not check lower conditions (Classifiers) If higher condition is not matched, the system will proceed to the lower condition and so on

11

Proprietary and Confidential

Using more than a single Classifier


Audit VID : if VID = 100 than apply High Service if VID = 200 than apply Low Service Otherwise If ingress VID does not qualify (100 or 200) then skip to Ingress frames 100 or 200

otherwise -

2nd criteria: VLAN ID 100 100 100 100 200 Highest Highest Highest Highest Lowest

Audit VLAN P-bits

VID = ?

3rd criteria: P-Tag 7 6 3 Highest

Different than 100 or 200


12

2 0 Lowest

Proprietary and Confidential

Ceragon - Training - Handbook - Page 177

3/7/2010

Thank You ! training@ceragon.com

13

Ceragon - Training - Handbook - Page 178

3/7/2010

FibeAir IP-10 G-Series


Commissioning the Radio Link

Proprietary and Confidential

Radio Link Common Attributes

IP-10

IP-10

RSL MSE

Received Signal [dBm] Mean Square Error [dB]: Modulation status


Signal to Noise Ratio (SNR)

Max. TSL Max. allowed Transmission Signal [dBm] Monitored TSL Actual Transmission level [dBm]

Proprietary and Confidential

Ceragon - Training - Handbook - Page 179

3/7/2010

ATPC

ATPC Adaptive Transmission Power Control


The quality of radio communication between low Power devices varies significantly with time and environment. This phenomenon indicates that static transmission power, transmission range, and link quality, might not be effective in the physical world.

Static transmission set to max. may reduce lifetime of Transmitter Side-lobes may affect nearby Receivers (image) Main Lobe Side Lobe

Proprietary and Confidential

Ceragon - Training - Handbook - Page 180

3/7/2010

ATPC Adaptive Transmission Power Control


To address this issue, online transmission power control that adapts to external changes is necessary. In ATPC, each node builds a model for each of its neighbors, describing the correlation between transmission power and link quality. With this model, we employ a feedback-based transmission power control algorithm to dynamically maintain individual link quality over time.

Proprietary and Confidential

ATPC Adaptive Transmission Power Control


1. Enable ATPC on both sites 2. Set reference RSL (min. possible RSL to maintain the radio link) 3. ATPC on both ends establish a Feedback Channel through the radio link (1byte) 4. Transmitters will reduce power to the min. possible level 5. Power reduction stops when RSL in remote receiver reaches Ref. level

TSL Adjustments

Monitored RSL Radio

ATPC module

Radio Transceiver Radio Receiver

Radio Receiver Signal Quality Check

Ref. RSL

Feedback

Site A

RSL required change Site B

Proprietary and Confidential

Ceragon - Training - Handbook - Page 181

3/7/2010

ATPC OFF = High Power Transmission

ATPC: Max. TSL: Monitored TSL: Monitored RSL:

Disabled 10 dBm 10 dBm -53 dBm

ATPC: Max. TSL: Monitored TSL: Monitored RSL:

Disabled 10 dBm 8 dBm -56 dBm

ATPC module

Radio Transceiver Radio Receiver

Radio

Radio Receiver Signal Quality Check

Ref. RSL

Feedback

Site A

RSL required change Site B

Proprietary and Confidential

ATPC ON = Reduced Power, cost & long-term maintenance


ATPC: Ref. RSL: Max. TSL: Monitored TSL: Monitored RSL: Enabled -65 dBm 10 dBm 2 dBm (before 10) -60 dBm (before 53) ATPC: Ref. RSL: Max. TSL: Monitored TSL: Monitored RSL: Enabled - 65 dBm 10 dBm 2 dBm (before 8) -63 dBm (before 56)

ATPC module

Radio Transceiver Radio Receiver

Radio

Radio Receiver Signal Quality Check

Ref. RSL

Feedback

Site A

RSL required change Site B

Proprietary and Confidential

Ceragon - Training - Handbook - Page 182

3/7/2010

MRMC Adaptive TX Power

MRMC Adaptive TX Power


Designed to work with ACM in certain scenarios to allow higher Tx power available at lower order modulation schemes for a given modulation scheme.

When Adaptive TX is disabled: Maximum TX power is limited by the highest modulation configured in the MRMC ACM script. In other words, when link suffers signal degradation, modulation may change from 256QAM to QPSK. However, Max. power will be limited to the value corresponding as Max. TX in 256QAM.

When Adaptive TX is Enable: When link suffers signal degradation, modulation may change from 256QAM to QPSK. However, Max. power will increase to compensate for the signal degradation.

10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 183

3/7/2010

MRMC Adaptive Power = OFF

256QAM @ Monitored TSL = 18 dBm (Max.)


Signal Degradation = Lower bit/symbol

16QAM @ MAX. TSL = 18 dBm

11

Proprietary and Confidential

MRMC Adaptive Power = ON

256QAM @ Monitored TSL = 18 dBm(Max.)


Signal Degradation = Lower bit/symbol

16QAM @ Monitored TSL = 24 dBm

12

Proprietary and Confidential

Ceragon - Training - Handbook - Page 184

3/7/2010

MRMC Adaptive Power


It is essential that Operators ensure they do not breach any regulator-imposed EIRP limitations by enabling Adaptive TX. To better control the EIRP, users can select the required class (Power VS. Spectrum): Class 2 Class 4 Class 5B Class 6A FCC RFU-C should have version 2.01 (or higher) for proper functionality of Adaptive TX Power feature.

The Effective Isotropic Radiated Power (EIRP) is the apparent power transmitted towards the receiver assuming that the signal power is radiated equally in all directions 13
Proprietary and Confidential

Configuration

Ceragon - Training - Handbook - Page 185

3/7/2010

Radio Settings Local Radio


Spectrum Mask FQ spacing (gap) between channels Monitored transmission power Monitored received signal Monitored Mean Square Error Required value = zero

Radio frequencies can be set locally or on remote unit as well (assuming links is up)

Enable / Disable Min. target RSL (local) Enable = no transmission Value depends on MRMC settings Encryption: must be identical on both IDUs

15

Proprietary and Confidential

Radio Settings Local Radio

Enable on both IDUs to get maximum throughput (500Mbps @ 56MHz)

16

Proprietary and Confidential

Ceragon - Training - Handbook - Page 186

3/7/2010

Radio Settings Remote Radio

When the radio link is up, you can configure certain parameters on the remote unit: Make sure Remote IP is available Remote RSL can be read Remote TSL can be set (depends on remote MRMC script) Remote TX MUTE can be disabled (see next slide) Remote target RSL for ATPC can be set

17

Proprietary and Confidential

Remote Un-Mute
Simplified scheme

Site B is NOT transmitting but receiver is still ON

Site A is transmitting
Site B

Site A
18
Proprietary and Confidential

Ceragon - Training - Handbook - Page 187

3/7/2010

Radio Thresholds

These settings determine the sensitivity / tolerance for triggering: 1+1 HSB switchover Ethernet Shutdown PM generated alarms

19

Proprietary and Confidential

MRMC Multi Rate Multi Coding


Users may set the radio to a fixed capacity or automatic adaptive capacity using ACM. ACM radio script is constructed of a set of profiles. Each profile is defined by modulation order (QAM) and coding rate, while these parameters dictate profiles capacity (bps). When ACM script is activated, system chooses automatically which profile to use according to the channel fading conditions. ACM TX profile can be different than ACM RX profile. ACM TX profile is determined by remote RX MSE performance. RX end is the one that initiates ACM profile upgrade or downgrade. When MSE is improved above predefined threshold, RX generates a request to the remote TX to upgrade its profile. If MSE degrades below a predefined threshold, RX generates a request to the remote TX to downgrade its profile.
20
Proprietary and Confidential

Ceragon - Training - Handbook - Page 188

10

3/7/2010

MRMC Homepage

We shall review this page using the following slides:


21
Proprietary and Confidential

MRMC reading current script


MAX. Capacity (w/out compression) ACM Script CH. BW Modulation Spectrum Mask ACM is on

Spectrum Class Type

22

Proprietary and Confidential

Ceragon - Training - Handbook - Page 189

11

3/7/2010

MRMC Reading current capacity

23

Proprietary and Confidential

Thank You ! training@ceragon.com

24

Ceragon - Training - Handbook - Page 190

12

3/7/2010

FibeAir IP-10 G-Series


Configuring Interfaces

Proprietary and Confidential

Agenda
Ethernet Interfaces TDM Interfaces AIS Detection AIS Signaling (STM-1) STM-1 Interface Auxiliary Channels Wayside Channel (Various Configurations)

Proprietary and Confidential

Ceragon - Training - Handbook - Page 191

3/7/2010

Ethernet Ports Configuration


Configuring ETH ports is discussed in previous modules:
Switch Configuration Trunk VS. Access Metro Switch Configuration QoS Configuration Interface Rate
Single Pipe
ETH 1 (SFP) ETH 2 (RJ 45) ETH 3 (RJ 45) ETH 4 (RJ 45) ETH 5 (RJ 45) ETH 6 (RJ 45) ETH 7 (RJ 45) ETH 8 Radio (N Type) GbE GbE FE 10 / 100 FE 10 / 100 FE 10 / 100 FE 10 / 100 FE 10 / 100 According to Licensed fq. Disabled / Traffic Disabled / Traffic Disabled / Protection Disabled / Wayside Disabled / MNG Disabled / MNG Disabled / MNG Disabled / Traffic

Functionality
Managed SW / Metro
Disabled / Traffic Disabled / Traffic Disabled / Traffic / Protection Disabled / Traffic / Wayside Disabled / Traffic / MNG Disabled / Traffic / MNG Disabled / Traffic / MNG Disabled / Traffic

Proprietary and Confidential

Ethernet Ports Configuration

Proprietary and Confidential

Ceragon - Training - Handbook - Page 192

3/7/2010

TDM Ports Configuration


IP-10G has 16 TDM ports + 16 additional ports when a 2nd T-Card is installed. Supported PHYs: E1 DS1
Dynamic allocation: Radio bandwidth (which may vary in ACM) is automatically allocated in the following order: 1. High-priority TDM trails 2. Low-priority TDM trails 3. Ethernet traffic (Data + Management, QoS should be considered) TDM trails in both sides of a link should have identical priorities.

Proprietary and Confidential

TDM Ports Configuration Standalone IDU

E1/DS1 port #n will be mapped to radio VC#n (n=1-16). When Trails are configured, default mapping (above) is overwritten by Trail Mapping. However, if no trails are configured (all are deleted) system will revert to the default setting. When Trail is configured and set to Operational - TDM port is activated. When Trail is configured but set to Reserved - TDM port is disabled.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 193

3/7/2010

TDM Ports Configuration Node Site

Up to 180 trails can be configured in a Shelf / node The number of Trails mapped to a radio depends on radio capacity (MRMC). The maximum number of radio Trails is 75 (E1) or 84 (DS1).

Proprietary and Confidential

AIS Line Detection


This feature allows detection of AIS signals in TDM traffic incoming from line interfaces (E1/DS1, STM-1):

In case of detection, the following takes place: Signal failure is generated at the corresponding trail this will cause the far end not to receive a signal (including trail ID indications) and the trail status to show signal failure and trail ID mismatch. An indication is given to user at the proper interface. Notice that this is not a system alarm, since the problem originates elsewhere in the Network

Proprietary and Confidential

Ceragon - Training - Handbook - Page 194

3/7/2010

AIS Signaling in STM interface (VC 12)


In case of signal failure at the trail outgoing from the STM-1 interface, AIS will be transmitted at the payload of the VC-12.

Proprietary and Confidential

STM interface Configuration


The following configurations are available:
Admin: Enable / Disable When interface is disabled: There is no signal transmission Received signal is ignored Trails previously configured to STM-1 interface will get Signal Failure No alarms will be shown Clock source: Internal Clock / Loop / TDM Trail Mute TX: mutes the outgoing STM-1 signal, but received signal will be used for traffic Excessive BER threshold: specific for STM-1 interface Signal degrade threshold: specific for STM-1 interface

10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 195

3/7/2010

AIS Signaling in STM interface (V5)


The system can be configured to signal AIS at the VC level (AIS-V) in the V5 byte of the overhead. This is meant to provide indications to SDH multiplexing equipment which may not have the ability to detect AIS at the payload level. For example: signaling in outgoing V5 byte upon AIS detection at payload-level (E1)

111111111

111111111

AIS @ E1 TS
11
Proprietary and Confidential

AIS @ STM V5

STM interface Configuration


J0 trace identifier is fully supported in both 15-byte and 1-byte modes:
An alarm will be raised when the expected string differs from the received string (but traffic will not be affected). Transmit, Expected and Received strings are provided. If a string is defined and user changes the length from 15 bytes to 1 byte, the first byte will be analyzed and other bytes ignored. The string transmitted as J2 trace identifier is the Trail ID defined for the TDM trail mapped to the corresponding VC-12 interface.

12

Proprietary and Confidential

Ceragon - Training - Handbook - Page 196

3/7/2010

Auxiliary Interfaces

Up to 19200 baud, Asynchronous RS-232. Up to 19200 baud, Asynchronous V.11.

EOW may be used as a simple solution for on-site communication between two technicians / installers / etc.

13

Proprietary and Confidential

WSC Interface
WSC interface is limited to 1628 bytes. 2.048Mbps (Wide) or 64Kbps (Narrow) Consumes BW from the total link BW

Out of band Management using WSC: In this case, remote system is managed using Wayside channel. On both local & remote units, Wayside channel will be connected to management port (using cross Ethernet cable). WSC can be configured to "narrow capacity (~64kbps) or "wide" capacity (~2Mbps). It is recommended to use wide WSC in order to get better management performance, since narrow WSC might be too slow.
14
Proprietary and Confidential

Ceragon - Training - Handbook - Page 197

3/7/2010

OOB MNG in a 1+0 standalone link

At least 2 management ports are needed in a local unit: One port for local management, and 2nd port that will be connected to Wayside port. On remote unit, Wayside port will be connected to management port.
15
Proprietary and Confidential

OOB MNG in a 1+1 standalone IDUs (Y-Splitter)

WSC port will be connected in each unit to other available management port. In remote site, each unit's Wayside port should be connected to management port.
16
Proprietary and Confidential

Active & Standby MNG ports have 2 options to be connected to the Host: Using Ethernet splitter cable connected to external switch. Using Protection "Patch Panel".

Ceragon - Training - Handbook - Page 198

3/7/2010

OOB MNG in a 1+1 standalone IDUs (P. Panel)

17

Proprietary and Confidential

Thank You ! training@ceragon.com

18

Ceragon - Training - Handbook - Page 199

3/7/2010

FibeAir IP-10 G-Series


Automatic State Propagation

Proprietary and Confidential

Agenda
Introduction Interfacing IP-10 with external devices Configuration VS. Functionality Dead Lock Example ASP in Managed / Metro Mode

Proprietary and Confidential

Ceragon - Training - Handbook - Page 200

3/7/2010

Introduction
Automatic State Propagation ("GigE Tx mute override") enables propagation of radio failures back to the line, to improve the recovery performance of resiliency protocols (such as xSTP). The feature allows the user to configure which criteria will force GbE port (or ports in case of remote fault) to be muted / shut down, in order to allow the network find alternative paths. The feature is not operational in "External Protection".

Proprietary and Confidential

Interfacing IP-10 with external devices


When external devices do not support Fault Propagation Configure the following:
1. Enable Local LOC - to mute local GbE when LOC is raised 2. Enable Remote Fault to mute local transmitter in case of remote LOF / Link ID mismatch & LOC 3. Enable Local Excessive BER recommended but not necessary

Proprietary and Confidential

Ceragon - Training - Handbook - Page 201

3/7/2010

Interfacing IP-10 with external devices


When external devices support Fault Propagation (another IP-10) Configure the following:
1. Disable Local LOC 2. Enable Remote Fault to mute local transmitter in case of remote LOF / Link ID mismatch & LOC 3. Disable Local Excessive BER - to avoid a dead lock scenario

Proprietary and Confidential

Configuration VS. Functionality

Proprietary and Confidential

3/7/2010

Configuration VS. Functionality

Proprietary and Confidential

Configuration VS. Functionality

Proprietary and Confidential

3/7/2010

Example: Avoiding Dead Lock in Single Pipe


Site B Site A

TX

RX

RX

TX

1. GbE FO breaks down or disconnects at the ingress port of Site A

Proprietary and Confidential

Example: Avoiding Dead Lock in Single Pipe


Site B Site A

TX

RX

LOC

RX

TX

1. GbE FO breaks down or disconnects at the ingress port of Site A 2. LOC alarm is raised

10

Proprietary and Confidential

3/7/2010

Example: Avoiding Dead Lock in Single Pipe


Site B Site A

TX

RX

LOC

RX

TX

1. GbE FO breaks down or disconnects at the ingress port of Site A 2. LOC alarm is raised 3. LOC alarm triggers Site A to shut down its transmitter (TX Mute)

11

Proprietary and Confidential

Example: Avoiding Dead Lock in Single Pipe


Site B Site A

TX

RX

LOC

LOC

RX

TX

1. GbE FO breaks down or disconnects at the ingress port of Site A 2. LOC alarm is raised 3. LOC alarm triggers Site A to shut down its transmitter (TX Mute) 4. Site B detects silence on ingress port and declares LOC

12

Proprietary and Confidential

3/7/2010

Example: Avoiding Dead Lock in Single Pipe


Site B Site A

TX

X X

RX

LOC

LOC

RX

TX

1. GbE FO breaks down or disconnects at the ingress port of Site A 2. LOC alarm is raised 3. LOC alarm triggers Site A to shut down its transmitter (TX Mute) 4. Site B detects silence on ingress port and declares LOC 5. Site B shuts down its transmitter both sites are in a state of a dead lock
13
Proprietary and Confidential

ASP in Managed Mode


Alarms are never propagated to a GbE port GbE will never shut down Alarms will be propagated to the Radio port In 1+1 external protection, ASP is disabled.

14

Proprietary and Confidential

3/7/2010

Thank You ! training@ceragon.com

15

3/10/2010

FibeAir IP-10 G-Series


1+1 External Protection

Proprietary and Confidential

Introduction (1)
Equipment protection is possible in two configurations:

"External Protection: Achieved by using two separate boxes in standalone configuration. In this case, the IDUs must be connected by a dedicated Ethernet protection cable. Each box has its unique IP address.

1+1 protection in a shelf: In this case, main units are connected by the backplane, and there is no need for extra cable. Protection for extension units is not supported. There is one IP address for each of the main units. Except for this difference, the protection feature is identical in both cases.

Proprietary and Confidential

3/10/2010

Introduction (2)
When a switchover occurs, and previous "Active" becomes "Standby", accessing the new "Active" will be done using its IP address A "Protection Panel" or protection split cable is designed to implement E1/DS1 splitters. Y-Split cables must be used for Ethernet signals.

Proprietary and Confidential

Setup Example (Standalone IDUs)

Proprietary and Confidential

3/10/2010

Installing 1+1 in standalone IDUs

Configuration Steps (1)


Item Step Description 1 2 3 4 5 6 7 8 Set both IDUs to factory default Active (1st IDU) + Standby (2nd IDU) should have identical HW (same P/NsT-CardsAuxiliary interfaces etc.) Active (1st IDU) + Standby (2nd IDU) should have identical SW version Active (1st IDU) + Standby (2nd IDU) should have identical License Configure Active + Standby IDUs to have identical Switch Mode (PipeManagedMetro) Active (1st IDU) + Standby (2nd IDU) should have unique IP address per chassis Active (1st IDU) + Standby (2nd IDU) should have the same Management settings (Out of band / In-Band & VID) Install 1st IDU Check

Proprietary and Confidential

3/10/2010

Configuration Steps (2)


Item Step Description 9 10 11 12 13 14 15 16 17 1st IDU: Enable Protection (MNG will be lost for 60 sec.) Check

1st IDU: Lock Protection Install 2nd IDU 2nd IDU: Enable Protection Connect ETH cross-cable between the protection ports of the two IDUs (when units are not in a shelf) Disconnect the MNG cables from both IDUs Connect ETH Y-splitter to both IDUs (to the MNG ports) Connect your MNG cable to the Y-Splitter cable and verify both IDUs can be managed Verify Active IDU shows Mate IP address

Proprietary and Confidential

Configuration Steps (2)


Item Step Description 18 19 20 21 22 23 24 Click Open Mate and log in to the mate IDU Verify there are no Configuration Mismatch alarms Verify there are no Mate Communication failures Complete system setup (cabling & configuration) In Active IDU click Copy to Mate (STBY IDU will restart) Active IDU: Unlock protection Initiate Manual Switchover and Forced Switchover: verify traffic is OK. Check

Note: The IDU, which is connected to the ODU fed by the lower attenuation channel of the RF coupler, is the IDU that should be selected as "Active". Note: The same procedure should be issued in the remote end, while installing the radio.
8
Proprietary and Confidential

3/10/2010

Installing 1+1 in a shelf

Configuration Steps (1)


Item Step Description 1 2 3 4 5 6 7 8 9 Before installing IDUs in the enclosure, verify: Both IDUs should have same HW part numbers Both IDUs should have same SW version Both IDUs should have same License Both IDUs should use the same switch mode Both IDUs should be managed the same (OOB / In-Band + VLAN) Each IDU should have unique IP address Install 1st IDU as the Main IDU (Slot #1) Configure preliminary settings (Radio, ports etc.) Check

10

Proprietary and Confidential

3/10/2010

Configuration Steps (2)


Item Step Description 10 11 12 13 14 15 16 17 18 19
11

Check

Main IDU: Enable Protection (MNG will be lost for 60 sec.) Main IDU: Lock Protection Power down 2nd IDU before installing it in the enclosure Install 2nd IDU Power up 2nd IDU 2nd IDU: Enable Protection Disconnect the MNG cables from both IDUs Connect ETH Y-splitter to both IDUs (to the MNG ports) Connect your MNG cable to the Y-Splitter cable and verify both IDUs can be managed Verify Active IDU shows Mate IP address
Proprietary and Confidential

Configuration Steps (2)


Item Step Description 20 21 22 23 24 25 26 Click Open Mate and log in to the mate IDU Verify there are no Configuration Mismatch alarms Verify there are no Mate Communication failures Complete system setup (cabling & configuration) In Active IDU click Copy to Mate (STBY IDU will restart) Active IDU: Unlock Protection Initiate Manual Switchover and Forced Switchover: verify traffic is OK. Check

Note: The IDU, which is connected to the ODU fed by the lower attenuation channel of the RF coupler, is the IDU that should be selected as "Active". Note: The same procedure should be issued in the remote end, while installing the radio.
12
Proprietary and Confidential

3/10/2010

Thank You ! training@ceragon.com

13

3/7/2010

FibeAir IP-10 G-Series


XC / SNCP / Nodal Solution

Proprietary and Confidential

Introduction

3/7/2010

SNCP (ITU- G.805)



Ring topologies provide path protection for Ethernet or TDM signals In some scenarios additional protection is required The IP-10G Path-Protection is based on SNCP (Sub-network Connection Protection) Individual E1/T1 trails will be protected by defining two separate trails, with the same end-points, which are routed through two different paths in the network The end-points may be line interfaces or radio VCs, so partial path protection can be provided for a trail in a network where full path redundancy topology is not available The end-points are also referred to as branching-points

Proprietary and Confidential

SNCP (ITU- G.805)

With Wireless SNCP, a backup VC trail can be optionally defined for each individual VC trail

Main Path

Protective Path

Proprietary and Confidential

3/7/2010

FibeAir IP-10 Integrated Nodal Solution


IP-10 IDU can be used as a Standalone unit (1U) or in as a Nodal Solution

Connecting 2 IDUs requires a nodal enclosure: Best economical future upgrade Best flexibility for network designer Easier to Install / Maintain / expand

The solution is modular and forms a single unified nodal device: Common Ethernet Switch Common E1s Cross Connect Single IP address Single element to manage

Proprietary and Confidential

FibeAir IP-10 Integrated Nodal Solution


Up to 6 units can be stacked to form single nodal device

Additional units can be added in the field as required Multiple nodes can be cascades to support large aggregation sites Stacking is done using 2RU Nodal enclosures

Each enclosure has 2 slots for hot-swappable 1RU units


Additional Nodal enclosures and units can be added in the field as required without affecting traffic

Front

Nodal enclosure Rear

Proprietary and Confidential

3/7/2010

FibeAir IP-10 Nodal Enclosures


Extension nodal enclosure

Main nodal enclosure

Proprietary and Confidential

FibeAir IP-10 Scalable Nodal Enclosures


Pay as you grow !

Proprietary and Confidential

3/7/2010

Integrated nodal solution Main units


Units located in the bottom Nodal enclosure are acting as the main units

The main unit performs the cross-connect, switching and management functions for
all the units in the node

Mandatory active main unit can be located in any of the 2 slots Optional standby main unit can be installed in other slot Switchover time <50msecs for all traffic affecting functions

Integrated Ethernet Switching Integrated TDM cross-connect


M E

Main unit Expansion unit

M M

Native2 1+1 HSB

Proprietary and Confidential

Integrated nodal solution Expansion units


Units located in non-bottom Nodal enclosures are acting as expansion units
All interfaces of the expansion units (radio, TDM and Ethernet) are connected to the
main units

Expansion unit is fully managed through the main units

Radios in each pair of main/expansion units can be configured as either:



Dual independent 1+0 links Single 1+1 HSB link Single 2+0/XPIC link
Native2 1+0 Native2 1+0

Integrated Ethernet Switching Integrated TDM cross-connect


M E

E E E E

Native2 2+0/XPIC

Main unit Expansion unit

M M

Native2 1+1 HSB

Proprietary and Confidential

3/7/2010

Trail Configuration Guidelines

XC Trails Guidelines (1)


1. XC Trails can be configured only via Main unit 2. All Trails are transported through main unit(s) 3. When Protection is enabled, configure trails to go via the Active unit (XC Trails are automatically created on the STBY unit) 4. T-Cards (TDM / SDH) are not hot-swappable, do not extract / insert card when IDU is powered up 5. Radio VCs must be identical on both sides of the radio link

12

Proprietary and Confidential

3/7/2010

XC Trails Guidelines (2)


5. Creating a TDM trail automatically activates the corresponding TDM port, therefore an alarm will display next to the relevant T-Card accommodating the activated port(s) 7. XC Trails can be configured between: Radio to Line Line to Radio Radio to Radio

8. Maximum number of Trails per Node = 180 9. Maximum number of Trails per Radio = 75 (E1) or 84 (T1) or 168 (SNCP)

13

Proprietary and Confidential

XC Trails Guidelines (3)


Identify Trail interfaces prior to configuration Note that Trail configuration is Bi-Directional !
Trail starts here: For SNCP we shall need to define 3 interfaces

Trail traverses through here: We shall need to define 2 interfaces

IP-10

IP-10

Bypass site

Protected Trail
(Automatic)

IP-10

Radio Link
14
Proprietary and Confidential

Trail starts here: For SNCP we shall need to define 3 interfaces

3/7/2010

XC Trails Guidelines (4)


Pay attention to the order of configuration:
2
The Trail Start/End points should be configured first (interface #1)

1 IP-10 3
Bypass site

IP-10
Interfaces #2 and #3 can be configured in a random order

Protected Trail (Automatic)

2 IP-10 1

15

Proprietary and Confidential

Standalone non-protected Trail Configuration

3/7/2010

Step #1: Access Trail Page

Click on the Add button

17

Proprietary and Confidential

Step #2: Configure 1st Interface


Click on the 1st interface connector
In this example we selected the PDH connector. Your next step is selecting the PDH port number.

In this example we selected the SDH connector. Your next step would be selecting the VC number.

18

Proprietary and Confidential

3/7/2010

Step #3: Configure 2nd Interface


Click on the 2nd interface connector
In this example we selected the Radio as the next interface connector. Your next step would be selecting the radio channel number.

Alternatively you could choose other combinations as well: PDH to PDH PDH to Radio (above) PDH to SDH SDH to Radio SDH to Radio Radio to SDH Radio to PDH
19
Proprietary and Confidential

Step #4: Configure Trail Attributes


Make sure Trail ID is unique and identical on all sites/trails

20

Proprietary and Confidential

10

3/7/2010

Step #5: Trail Verification


If your settings are correct, trail alarms should disappear, trail path is ready to be tested

21

Proprietary and Confidential

SNCP Trail Configuration in a Node

11

3/7/2010

Selecting Main IDU for Trail Configuration


In the following example we assume every node has 2 IDUs installed in a Main Enclosure Make sure your Main unit is selected on every Node-EMS Enable Protection when you configure the Trails (excluding Bypass Nodes) Trail ID should unique and identical on all nodes

23

Proprietary and Confidential

SNCP Trail in Nodal Architecture


PDH interface

Bypass Node

IP-10 IP-10

IP-10

SDH interface
24
Proprietary and Confidential

12

3/7/2010

1st Node

PDH interface IP-10 IP-10 Bypass site Radio CH #1 Radio CH #26 IP-10

SDH interface #1

25

Proprietary and Confidential

Bypass Node
Radio CH #48

PDH interface IP-10 Bypass Node IP-10

Radio CH #1

IP-10

SDH interface

26

Proprietary and Confidential

13

3/7/2010

3rd Node

Radio CH #48

PDH interface IP-10

Bypass site

IP-10
Radio CH #26

IP-10

SDH interface
27
Proprietary and Confidential

Thank You ! training@ceragon.com

28

14

CFM (OAM IEEE 802.1ag)


Connectivity Fault Management

Module Version V2.0

Perquisites

Prior to this configuration, end-user need to be familiar with the following modules:

Ethernet Frame Structure 802.1p/q CFM Theory Switch Configuration Interfaces Configuration

Proprietary and Confidential

Advanced Operation & Maintenance Course

Agenda
CFM: Why?

Preliminary configuration Setup Review Configuration Flow Configuration Review Manual PING Manual Linktrace Automatic Linktrace

Proprietary and Confidential

CFM: WHY ?

By definition, L3 IP or L2 ETH are Connection-less networks In connection-less networks we are blind unable to determine packet path or latency This makes troubleshooting and maintenance a harder task Solution: we need to convert our Connection-less network into a Connection-Oriented network

IN

?
Connection-Less

IN

Connection-Oriented
Proprietary and Confidential

Advanced Operation & Maintenance Course

CFM: WHY ?

Connection-Oriented networks (ATM, IP/MPLS) enable administrators setting a pre-defined packet path, reserving BW per service, faster event detection and thus effective troubleshooting & maintenance Such technologies are too expensive and sometimes not feasible for Mobile Operators / Mobile Backhaul solutions Solution: use a cheaper technology with enhanced features:

Ethernet Core + Operations, Administration & Maintenance support (CFM)

CFM enables L3 operations such as Traceroute and PING with a simpler ETH infrastructure Connection-Oriented
5
Proprietary and Confidential

Preliminary Configuration

1. Make sure you define the required VLAN IDs in the Switch DB prior to OAM configuration 2. Prepare a Network Design Map with required configuration (MIP / MEP / IDs / MAC per device.) 4. Make sure IP-10 Interfaces are configured according to your Network Criteria (Trunk / Port VID Membership ). 5. Every CFM interface (including Radio) must be aware of the required VIDs (Port membership)

6. CFM requires physical connection, therefore make sure your interfaces are enabled on both sides (DCE and DTE)

Proprietary and Confidential

Advanced Operation & Maintenance Course

Setup Review (MAIDs):

Domain 1 Services: D1S1: MEP 1 to MEP 2, Level 3, VLAN 1000

1
D1S2: MEP 3 to MEP 4, Level 3, VLAN 2000

4 2
Domain 2 Services: D2S2: MEP 5 to MEP 6, Level 2, VLAN 1000 MEP MIP
7
Proprietary and Confidential

5 6

CFM Configuration Flow:


1 2 3 4
Create VLANs in Switch DB Assign VID membership per port

Create Domains and Services Assign MIPs

You may use Advanced features to troubleshoot a L2 problem

All Steps must be configured on both IP-10s Make sure you follow the same syntax

Proprietary and Confidential

Advanced Operation & Maintenance Course

Configuration

Switch Configuration Mode and VIDs

10

Proprietary and Confidential

Advanced Operation & Maintenance Course

Switch Configuration Port Configuration

11

Proprietary and Confidential

Creating MAIDs
Click on the Add button to add domains (use the setup diagram as a reference) You will need to specify: 1. 2. 3. 4. Domain Name Level (1 to 7) Association Name VLAN ID

12

Proprietary and Confidential

Advanced Operation & Maintenance Course

Creating MAIDs
Create the domains as depicted in the setup diagram on both IDUs Settings must be unique and identical

13

Proprietary and Confidential

Domains defined
You should see the following status on your MAID list page (on both IDUs): If you point your cursor to the No MEPs indication LED, you will be notified that MEPs need to created as well

14

Proprietary and Confidential

Advanced Operation & Maintenance Course

Defining MEPs
Click on the ADD button to add a local MEP on both IDUs Continue to next slide to observe how

15

Proprietary and Confidential

Defining MEPs
Port #3 MEP ID: 1

Port #3 MEP ID: 2

16

Proprietary and Confidential

Advanced Operation & Maintenance Course

Remote MEPs not defined yet

RIGHT IP-10
17

Proprietary and Confidential

Enable CCM on both IDUs

RIGHT IP-10
18

LEFT IP-10

Proprietary and Confidential

Advanced Operation & Maintenance Course

CCM enabled > Remote MEP is detected

As you can see, CCM enables auto-learning, hence both MEPs discover each other (MAC and remote MEP ID are now known) New alarms indicate that process of creating the remote MEP is not fully complete
19
Proprietary and Confidential

Creating Remote MEPs

Click on the Add button to add a remote MEP on every IDU

20

Proprietary and Confidential

Advanced Operation & Maintenance Course

10

Creating Remote MEPs


Port #3 Local MEP ID: 1 Remote MEP: 2

Port #3 Local MEP ID: 2 Remote MEP: 1

21

Proprietary and Confidential

Service #1 (D1S1) is ready for monitoring!

Click on the PING button to check connectivity to Remote interface (results on next slide)
22

Proprietary and Confidential

Advanced Operation & Maintenance Course

11

PING results (MEP1 to MEP2)

23

Proprietary and Confidential

D1S2 Creating another service


We shall create a new service (S2) using the same Domain (D1) (hence- same level) To separate the 2 services, we shall assign a new VLAN

MEP1 MEP 3 MEP 4 MEP 2

New Domain: D1S2 MEP 3 to MEP 4 Level 3 VLAN 2000

The new service D1S2 will monitor the Radio ports


24
Proprietary and Confidential

Advanced Operation & Maintenance Course

12

D1S2 Creating another service


Using the MAID list, add the new service on both IDUs:

MEP 3 MEP 4

25

Proprietary and Confidential

D1S2 Creating Local MEPs


Please note - Radio port MEP should be defined as a Downstream MEP

MEP 3 MEP 4

26

Proprietary and Confidential

Advanced Operation & Maintenance Course

13

D1S2 Enable CCM on both IDUs

MEP 3 MEP 4

27

Proprietary and Confidential

D1S2 Add Remote MEPs on both IDUs

MEP 3 MEP 4

28

Proprietary and Confidential

Advanced Operation & Maintenance Course

14

D1S2 Service is now ready for monitoring

29

Proprietary and Confidential

D2S2 another service on another Domain

D2S2 5
6

30

Proprietary and Confidential

Advanced Operation & Maintenance Course

15

D2S2 another service on another Domain

31

Proprietary and Confidential

Adding Local MEPs

Local MEP 5 Remote MEP 6 Local MEP 6 Remote MEP 5

32

Proprietary and Confidential

Advanced Operation & Maintenance Course

16

Enabling CCMsAdding Remote MEPs


Once you complete these tasks, your 3rd service is ready for monitoring

33

Proprietary and Confidential

Adding MIPs to enhance Monitoring


The MIPs can be regarded as Service-free test-points MIPs provide more segments regardless of VLANs and Services More test-point More L2 capabilities!

We shall add a MIP point on every Radio interface

Make sure you set the MIP level according to the level of the Parent domain
34
Proprietary and Confidential

Advanced Operation & Maintenance Course

17

Adding MIPs to enhance Monitoring


In the MEP & MIP list, we can see the switch ports and there MACs: In our example, we need to add a MIP on the Radio port Therefore, we shall expand the Radio port to configure the MIP Add MIPs on both radio ports (both IDUs)

35

Proprietary and Confidential

Adding MIPs to enhance Monitoring

Please make a note of the Radio MAC address of each IDU we shall need it later
36
Proprietary and Confidential

Advanced Operation & Maintenance Course

18

MAC addresses of participating interfaces


00:0A:25:01:8F:AD
00:0A:25:56:27:AC

00:0A:25:56:27:C6

00:0A:25:56:27:C2

Please note the above MACs are an example of given setup


37
Proprietary and Confidential

Manual PING | Manual Link Trace | Automatic Link Trace

Advanced Operation & Maintenance Course

19

Manual PING
To PING from MEP 1 to MEP 2, you will need to set the following parameters: Remote interface MAC Level VLAN Successful PING requires setting the correct path

39

Proprietary and Confidential

Manual Linktrace
To trace an interface , you will need to set the following parameters: Remote interface MAC Level VLAN Successful Trace requires setting the correct path

Results on next slide

40

Proprietary and Confidential

Advanced Operation & Maintenance Course

20

Manual Linktrace Results


FDB MIP informing us that it received the LTM (link race message), it is not who we are looking for but it knows how to reach the target interface

We have traced 2 MIPs (on every Radio port)

Eventually we traced MEP 1 (HIT)

41

Proprietary and Confidential

Automatic Linktrace
To enable Auto Linktrace select the checkbox next to the target Remote MEP and then click ADD SELECTED

42

Proprietary and Confidential

Advanced Operation & Maintenance Course

21

Automatic Linktrace
Click Linktrace SELECTED

43

Proprietary and Confidential

Thank You !
training.ceragon.com

44

Advanced Operation & Maintenance Course

22

3/7/2010

FibeAir IP-10 G-Series


Loopback Maintenance

Proprietary and Confidential

Agenda

In this module we shall describe the various actions we can perform to properly maintain and troubleshoot the IP-10G system

Proprietary and Confidential

3/7/2010

RFU RF Loopback

RFU RF LB

Proprietary and Confidential

RFU RF Loopback
Use it to verify communication from Line to ODU is OK (including ODU) Traffic affecting TX is stopped Configurable Timer to automatically restore traffic ( 0 = no time limits) RFU LED is RED when Loopback is ON LINK LED is GREEN when Loopback is ON Alarm is displayed in Current Alarms:

and Event log:

Proprietary and Confidential

3/7/2010

IF Loopback

IDU IF LB

Proprietary and Confidential

IF Loopback
Use it to verify communication from Line to IF cable is OK Traffic affecting TX is stopped Configurable Timer to automatically restore traffic (0 = no time limits) LINK LED is GREEN when Loopback is ON Alarm is displayed in Current Alarms:

and Event log (next slide):

Proprietary and Confidential

3/7/2010

IF Loopback Analysis using Event Log


Lets assume radio link is down LINK LED is RED 16:29:01 16:29:05 16:30:01 16:30:05 We enable IF LB, therefore Link alarms clear Loopback replaces remote unit therefore alarm disappears Loopback automatically stops, link recovers to original state Radio link is down (original state)

Proprietary and Confidential

PDH Line LB towards Line (NE)

LB towards the line

Proprietary and Confidential

3/7/2010

PDH Line LB towards Line (Near End)


Use this feature to evaluate connection to customers patch-panel Alarm is displayed in CAS:

and in Event Log:

Proprietary and Confidential

PDH Line LB towards Radio (FE)

LB towards the radio

Tester
10
Proprietary and Confidential

3/7/2010

PDH Line LB towards Radio Event Log Analysis


Lets assume PDH port #1 is enable but not connected Therefore, Major alarm is on (RED)

16:59:44 16:59:46 17:06:37 17:06:38

We enable Line LB towards the radio Loopback replaces end-device therefore alarm disappears Loopback is OFF PDH port alarm is ON again..

11

Proprietary and Confidential

SDH Line LB towards System


Towards System signal (trail) is looped back to IP-10

12

Proprietary and Confidential

3/7/2010

SDH Line LB towards Line


Towards Line signal (trail) is looped back to customer interface

13

Proprietary and Confidential

IDU-RFU Interface Monitoring

Before you leave the site, make sure that these registers are elapsed (zero)\ When one of these registers is different than 0 you need to report to your support representative In such case, perform the Loopbacks we have just covered to narrow down the probable causes for the errors

14

Proprietary and Confidential

3/7/2010

Thank You ! training@ceragon.com

15

3/7/2010

FibeAir IP-10 G-Series


EMS Backup Maintenance

Agenda

In this module we shall describe the various actions we can perform to properly maintain and troubleshoot the IP-10G system using: 1. 2. 3.
2

Configuration File Unit Information File FTP Server


Proprietary and Confidential

3/7/2010

Configuration File
The Configuration file stores the following parameters:

License External Alarms SNMP Trap Destination NTP Server Properties Radio properties: Frequency, RSL, TSL, ATPC, etc. Switch Mode and database: Port types, VLAN membership, etc. Interface Configuration: PDH, TDM, Ethernet Switch Trail Configurations Service OAM Security: user accounts, login properties, etc.

Proprietary and Confidential

Unit Information File


The Unit Information file stores the following parameters:

Date & Time Daylight Saving Time properties System name and other ID parameters Measuring properties (voltage, temperature) Accumulated Performance Monitoring logs Serial numbers

Proprietary and Confidential

3/7/2010

Local FTP Server


Uploading or Downloading the CFG & Unit files requires an FTP Server As long as your IP-10G communicates with the server, its location is irrelevant

EMS PC with local FTP Server installed

Proprietary and Confidential

Remote FTP Server


You may assign a remote server to host the configuration and unit files

EMS PC

Remote FTP Server

Proprietary and Confidential

3/7/2010

FTP Root Directory


Every Server has its own properties. Make sure you are familiar with your FTP Root Directory: this is where the files are stored (software versions, CFG & Unit).

Examples for SW packages

Examples for CFG & Unit Files


7
Proprietary and Confidential

Configure your FTP Server Properties

2
8
Proprietary and Confidential

3/7/2010

Upload / Download using standalone IP-10G


9
Proprietary and Confidential

Uploading the CFG File (IP-10G to Server)


Click Create Archive to allow the IP-10G zipping all parameters into one file

10

Proprietary and Confidential

3/7/2010

Uploading the CFG File (IP-10G to Server)

Wait till task is successfully completed

11

Proprietary and Confidential

Uploading the CFG File (IP-10G to Server)


Next step: Click Upload Archive to allow the IP-10G transferring the zipped file to your server

12

Proprietary and Confidential

3/7/2010

Uploading the CFG File (IP-10G to Server)


Wait till task is successfully completed

13

Proprietary and Confidential

Check your FTP Root Directory

This is your copy of the configuration file You may place it now in the dedicated folder (Configuration Files)

14

Proprietary and Confidential

3/7/2010

Uploading the CFG File (IP-10G to Server)


Follow the same steps to upload the Unit Information file:

1
15

2
Proprietary and Confidential

Check your FTP Root Directory

This is a copy of your Unit Information file

16

Proprietary and Confidential

3/7/2010

Downloading the CFG File (Server IP-10G)


Follow the same steps to download the CFG file When download completes successfully, you will need to restart the system for changes to take place Please note if the file does not exist in the root directory action will fail !

1
17

2
Proprietary and Confidential

Upload / Download in a shelf


18
Proprietary and Confidential

3/7/2010

Shelf Backup: Creating the Nodal Shelf Backup


Uploading CFG files from a shelf is similar to a standalone process 1. First you need to create the CFG files of all slots 2. After creating the CFG files, you need to upload them to your FTP directory

19

Proprietary and Confidential

Shelf Backup: Creating the Nodal Shelf Backup

First you need to create the CFG files. To do so, select the unit(s) and click the relevant Backup button

20

Proprietary and Confidential

10

3/7/2010

Shelf Backup: Upload from IP-10G to Server


Next, click Upload Archive(s) and the file(s) will be uploaded to your FTP root directory

21

Proprietary and Confidential

Shelf Backup: Download from Server to IP-10G

To download a file to a certain slot, select the unit number and click this button

22

Proprietary and Confidential

11

3/7/2010

Unified Unit Information File

A unified file is created for all stacked units Upload & Download action are identical to a standalone unit
23
Proprietary and Confidential

Checking Backup History & Status

Click here to see the backup history


24
Proprietary and Confidential

12

3/7/2010

Checking Backup History & Status

25

Proprietary and Confidential

Setting the unit back to Factory Defaults

You can restore your system to factory defaults You may also set the IP address to factory default address (192.168.1.1)
26
Proprietary and Confidential

13

3/7/2010

Thank You ! training@ceragon.com

27

14

3/7/2010

FibeAir IP-10 G-Series


EMS Security Configuration

Proprietary and Confidential

Agenda
SSH HTTPS SFTP Users & Groups Password

Proprietary and Confidential

3/7/2010

Security Configuration
Update first FTP connection

Proprietary and Confidential

SSH Secured Shell


SHHv1 and SSHv2 are supported. SSH protocol can be used as a secured alternative to "Telnet". SSH protocol is always be operational. Admin user can choose whether to
disable

"Telnet" protocol, which will be "enabled" by default. Server authentication


will be based on IP-10s "public key".

Key exchange algorithm is RSA. Supported Encryptions: aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc,
arcfour128, arcfour256, arcfour, aes192-cbc, aes256-cbc, aes128-ctr, aes192-ctr, aes256-ctr. MAC (Message Authentication Code): SHA-1-96 (MAC length = 96 bits, key length = 160 bit). Supported MAC: hmac-md5, hmac-sha1, hmacripemd160, hmac-sha1-96, hmacmd5-96' The server will authenticate the user based on user name and password. Number of failed authentication attempts is not limited. Server timeout for authentication: 10 min. This value cannot be configured.

Proprietary and Confidential

3/7/2010

HTTPS
In order to manage the system using HTTPS protocol, user should follow the following steps:

1. Create the IDU certificate based on IDU's public key. 2. Download the IDU certificate. 3. Using CA certificate (Optional steps)
i. Download the IDU CA's certificate. ii. Enable WEB CA certificate.

4. Set WEB Protocol parameter to HTTPS

Proprietary and Confidential

HTTPS Public Key Upload


The public key should be uploaded by the user for generating the IDUs digital certificate:

The upload will be done by using FTP/SFTP (s The public key file will be in PEM format. Click Upload Public Key The status of the upload operation can be monitored. The returned status values are: ready (default), in-progress, success, failed. In any case of failure, an appropriate error message will appear.

Proprietary and Confidential

3/7/2010

HTTPS Certificate Download (1)


Download IDU server certificate and/or IDU CA certificate (optional) :

Download is done by using FTP/SFTP. PEM and DER certificate formats are supported. For downloading the IDU server certificate and/or IDU's CA certificate to the system, the following steps must be fulfilled for each file type: Determine certificate file name (Admin privilege). Determine the certificate file type (Admin privilege): Target Certificate (for WEB server digital certificate) or Target CA certificate (for WEB CA digital certificate). Determine certificate file format (Admin privilege): Format could be PEM (for PEM formatted file), or DER (for DER formatted file). Determine whether to include the CA certificate into the WEB configuration definitions. This is an optional configuration and is recommended for adapting the WEB interface to all the WEB browsers applications (Admin privilege).
Proprietary and Confidential

HTTPS Certificate Download (2)


After setting the above configurations, a Download Certificate command should be issued. The status of the download operation can be monitored. The returned status values are: ready, in-progress, success, failed. It is recommended to refresh the WEB page when certificate download operation is terminated. To apply the new certificate, the WEB server should be restarted (Admin privilege). WEB server will be automatically restarted when it is configured to HTTPS.

Proprietary and Confidential

3/7/2010

HTTPS - Activation
WEB interface protocol can be configured to be HTTP (default) or HTTPS (cannot be both at the same time). While switching to HTTPS mode, the following must be fulfilled: WEB server certificate file exist. Certificate public key is compatible to IDUs private key. If one of the above tests fails, the operation will return an appropriate error indication. Open WEB Browser and type the URL https:\\<IP of target IDU>. Note: This parameter is NOT copied when copy to mate operation is initiated, for security reasons (unsecured unit should not be able to override security parameters of secured unit).

Proprietary and Confidential

SFTP (Secure FTP)

SFTP can be used for the following operations:

Configuration upload/download, Upload the unit info. Upload public key. Download certificate files. SW download

Proprietary and Confidential

3/7/2010

USERS, GROUPS & PASSWORD


Proprietary and Confidential

Adding Users

To add / edit users & groups click on the item as shown in the captured imaged (left)

Click Add User to add new users

Proprietary and Confidential

3/7/2010

Adding Users

Proprietary and Confidential

Adding Users

New users will be required to change their password when they log in for the first time

Proprietary and Confidential

3/7/2010

Changing Password
A valid password should be a mix of upper and lower case letters, digits, and other characters. You can use an 8 character long password with characters from at least 3 of these 4 classes. An upper case letter that begins the password and a digit that ends it do not count towards the number of character classes used.

Proprietary and Confidential

Changing Password
Good example:
L00pBack using capital letters, small letters and digits (zeros instead of O)

Bad example:
Loopback missing digits or other characters Loopbacks using more than 8 characters

Proprietary and Confidential

3/7/2010

Thank You ! training@ceragon.com

17

FibeAir IP-10

License Management Guide

Part ID: BM-0139-0 Doc ID: DOC-00019183 Rev a.00 November 2008

Notice
This document contains information that is proprietary to Ceragon Networks Ltd. No part of this publication may be reproduced, modified, or distributed without prior written authorization of Ceragon Networks Ltd. This document is provided as is, without warranty of any kind.

Registered TradeMarks
Ceragon Networks is a registered trademark of Ceragon Networks Ltd. FibeAir is a registered trademark of Ceragon Networks Ltd. CeraView is a registered trademark of Ceragon Networks Ltd. Other names mentioned in this publication are owned by their respective holders.

TradeMarks
CeraMapTM, PolyViewTM, EncryptAirTM, ConfigAirTM, CeraMonTM, EtherAirTM, and MicroWave FiberTM, are trademarks of Ceragon Networks Ltd. Other names mentioned in this publication are owned by their respective holders.

Statement of Conditions
The information contained in this document is subject to change without notice. Ceragon Networks Ltd. shall not be liable for errors contained herein or for incidental or consequential damage in connection with the furnishing, performance, or use of this document or equipment supplied with it.

Information to User
Any changes or modifications of equipment not expressly approved by the manufacturer could void the users authority to operate the equipment and the warranty for such equipment. Copyright 2008 by Ceragon Networks Ltd. All rights reserved.

Corporate Headquarters: Ceragon Networks Ltd. 24 Raoul Wallenberg St. Tel Aviv 69719, Israel Tel: 972-3-645-5733 Fax: 972-3-645-5499 Email: info@ceragon.com North American Headquarters: Ceragon Networks Inc. 10 Forest Avenue, Paramus, NJ 07652, USA Tel: 1-201-845-6955 Toll Free: 1-877-FIBEAIR Fax: 1-201-845-5665 Email: infous@ceragon.com

www.ceragon.com

European Headquarters: Ceragon Networks (UK) Ltd. 4 Oak Tree Park, Burnt Meadow Road North Moons Moat, Redditch, Worcestershire B98 9NZ, UK Tel: 44-(0)-1527-591900 Fax: 44-(0)-1527-591903 Email: infoeuro@ceragon.com APAC Headquarters Ceragon Networks (HK) Ltd. Singapore RO Level 34 Centennial Tower 3 Temasek Avenue Singapore 039190 Tel - + 65 6549 7886 Fax: +65 6549 7011

Contents
General .......................................................................................................... 1

Getting Started .............................................................................................. 1

How to use the System................................................................................. 5

Managing the License .................................................................................. 6

Working with Devices .......................................................................................... 6

Working with Licenses....................................................................................... 16

Settings ............................................................................................................... 23

Generating Reports ............................................................................................ 25

General
This guide explains how to work with the FibeAir IP-10 web based License Management System. The system enables authorised users to obtain license-related information and perform license-related operations.

Getting Started
To start the management application: 1. In your web browser, go to the address http://80.74.99.83/LMManage/login.aspx

2.

To log in to the system, enter your user name and password, and then click Login. Note the following user name rules:

FibeAir IP-10 License Management System

For Demo OEM, the first five digits must be 00001. The next four digits after the first five should be numbered starting with 0001 for end users. For example, the number 000010001 would mean that Demo OEM end user 0001 is entering the system. For users other than Demo OEM, the user name must start with 00000. For example, the number 000000001 would mean that non-Demo OEM user 0001 is entering the system. For OEM Users 3a. If you enter as an OEM user, the following web page appears:

One of two modes can be selected: Administrator (Demo OEM option) - The administrator can assign licenses and devices to customers, who can be either another OEM customer or Demo OEM. In this mode of operation, the OEM admin can assign licenses/devices to end users (including themself) and can generate license keys for the devices. End User (Customer option) - The OEM end user, or the OEM itself can generate keys for self use. In this mode, the user can only generate licenses based on the available device database. The user can only view his/her own devices (that were assigned to that user) and licenses.

FibeAir IP-10 License Management System

End users that belong to that channel cannot see devices or licenses that belong to the OEM or other customers. After you select the operating mode, the following web page appears:

CeraView User Guide

For Non-OEM Users 3b. If you enter as a non-OEM user the following web page appears: Note that a channel or OEM user can also enter as one of their customers. In this case, the system identifies the user as a channel/OEM user and will display a drop-down list to enable entry under the user's name. This will be done to allow operations for devices that the user sent to his/her customers.

FibeAir IP-10 License Management System

How to Use the System


The menus that you can select from are grouped according to their functions. Simply click the item you want within a menu group (such as the Devices or Settings group). When you select an item within a group, the relevant web page will open with the details concerning that item. At the top of the web page for the item, a line appears with buttons that you can click to perform a particular operation.

From within an item web page, you do not have to return to the main web page. Instead, use the tabs at the top (Devices, Licenses, etc.) to obtain a list of items for the particluar group. Note that in any web page, you can click Print to send the contents of the page to the printer.

CeraView User Guide

Managing the License


The following sections describe the system menus and options that you can select to obtain information concerning your licenses and to perform license-related operations.

Working with Devices


The Devices group includes items that can be selected to perform device-related operations, such as to obtain information about the devices included in your license, or import a device list from another source. Device List To obtain a list of devices: In the Devices group, select All Devices, or click the Devices tab at the top of the web page (if it appears). The following web page appears:

FibeAir IP-10 License Management System

Note that for OEM users, the Generate Keys button is replaced with Assign to Customer . The list includes all the devices you purchased from Ceragon. Click Device ID for a more deatiled description of the device.

In this page, you can assign the current ID to an end user, using the drop-down list in the Assign to Customer field.

CeraView User Guide

Search for Devices In the main device list web page, you can click Search registered in the system. to locate a particular device that is

Select the criteria (filters) you want for the search, and then click Search. To clear the criteria you selected, click Clear.

FibeAir IP-10 License Management System

Import Devices In the toolbar, click Import to import a list of devices from an external source.

You will be prompted to locate the file with the device list. Once you locate and select the file, click Import. The device list file must be a text file with the following columns:
Device ID Customer Country Region / Network Link Side

In the Device ID column, use only upper case letters.

Adding and Deleting Devices To add a new device, in the toolbar, click New .

CeraView User Guide

Enter a valid device ID in the field and click Save. The device will be added to your device list. To delete a device, select the device in the list, and click Delete Exporting a Device List To export a device list to a file, click Export . .

The list will be saved in an Excel file with the extension csv (Comma Separated Values). Generating Keys To generate license keys for one or more devices, select the devices in the main list by marking the checkboxes beside them, and click Generate Keys The following web page appears: .

In this web page, only the devices you selected will appear.

FibeAir IP-10 License Management System

10

The All Relevant Licenses area shows only the licenses that are common to all devices you selected (meaning their lowest common denominator). The current license types include the following: 1 = ACM 2 = Networking 3 = Capacity Upgrade The following tables list the current license possibilities: Capacity Upgrade
License Type 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 Value 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Description IP10-CAP-010 IP10-CAP-025 IP10-CAP-050 IP10-CAP-100 IP10-CAP-150 IP10-CAP-200 IP10-CAP-300 IP10-CAP-400 IP10-UPG-025-050 IP10-UPG-025-100 IP10-UPG-025-150 IP10-UPG-025-200 IP10-UPG-025-300 IP10-UPG-025-400 IP10-UPG-050-100 IP10-UPG-050-150 IP10-UPG-050-200 IP10-UPG-050-300 IP10-UPG-050-400 IP10-UPG-100-150 IP10-UPG-100-200 IP10-UPG-100-300 IP10-UPG-100-400 IP10-UPG-150-200 IP10-UPG-150-300 IP10-UPG-150-400 IP10-UPG-200-300 IP10-UPG-200-400 IP10-UPG-300-400 Name in License Management Site Feature disabled Radio Cap. Upgrade 10->25 Mbps Radio Cap. Upgrade 10->50 Mbps Radio Cap. Upgrade 10->100 Mbps Radio Cap. Upgrade 10->150 Mbps Radio Cap Upgrade 10->200 Mbps Radio Cap Upgrade 10->300 Mbps Radio Cap Upgrade 10->400 Mbps Radio Cap. Upgrade 25->50 Mbps Radio Cap. Upgrade 25->100 Mbps Radio Cap. Upgrade 25->150 Mbps Radio Cap. Upgrade 25->200 Mbps Radio Cap Upgrade 25->300 Mbps Radio Cap Upgrade 25->400 Mbps Radio Cap. Upgrade 50->100 Mbps Radio Cap. Upgrade 50->150 Mbps Radio Cap. Upgrade 50->200 Mbps Radio Cap Upgrade 50->300 Mbps Radio Cap Upgrade 50->400 Mbps Radio Cap. Upgrade 100->150 Mbps Radio Cap. Upgrade 100->200 Mbps Radio Cap Upgrade 100->300 Mbps Radio Cap Upgrade 100->400 Mbps Radio Cap. Upgrade 150->200 Mbps Radio Cap Upgrade 150->300 Mbps Radio Cap Upgrade 150->400 Mbps Radio Cap Upgrade 200->300 Mbps Radio Cap Upgrade 200->400 Mbps Radio Cap Upgrade 300->400 Mbps

CeraView User Guide

11

ACM
License Type 1 1 Value 0 1 IP10-ACM Description Name in License Managament Site Feature disabled ACM

Networking (Metro Switch Enabled)


License Type 2 2 Value 0 1 IP10-Metro Description Name in License Management Site Feature disabled Metro Switch

To add a license for which you want to generate a key, select the license in the All Relevant Licenses area and click Add to add it to the Selected Licenses area. Important! You can only select one license from each category (ACM, Networking, Capacity Upgrade). If you select a capacity upgrade license and want to add a different capacity upgrade license, you must first remove the first capacity upgrade license and then add the other one. Once you select the licenses you want, click Generate Keys. After you confirm your selection, the following example web page appears.

FibeAir IP-10 License Management System

12

Assigning Devices to a Customer For OEM users, you can assign devices to other users by selecting Assign Devices to a Customer in the main web page Devices group. Or, you can click Assign to Customer at the top of the page.

In the Select Customer field, use the drop-down list to choose the customer you want to assign the devices to. Click Show Available Devices for a list of devices you can choose from. In the available list of devices, click Filter & Sort to customize the device list, as shown in the following example page.

CeraView User Guide

13

You can specify the ID of the device you want to include in the list, and select the list sort order (ascending or descending). After you click Go to generate the list, in the Available Devices list, select the devices you want to assign to the user, and click Add to add them to the Assigned Devices list. When you complete the operation, click Save. In the confirmation page, click Confirm. The following example page appears:

FibeAir IP-10 License Management System

14

Click Continue to go back to the device list page. The device list page will appear with the updated information.

CeraView User Guide

15

Working with Licenses


In the Licenses group, select All Licenses, or click the Licenses tab at the top of the web page (if it appears). The following web page appears:

The web page displays all the licenses you currently own. To search for a particular license, click Search, specify the criteria you want, and click Search again. Click the number in the Qty Assigned column for a list of licenses assigned to customers.

FibeAir IP-10 License Management System

16

Click the number in the Qty Generated column for a list of licenses used to generate keys.

CeraView User Guide

17

To generate license keys, select Generate Keys in the Licenses group in the main web page, or click Generate Keys in the web page that appears when you click the Licenses tab.

To add a license for which you want to generate a key, select the license in the All Available Licenses area and click Add to add it to the Selected Licenses area. Click Show Relevant Devices for a list of devices associated with the licenses you chose.

FibeAir IP-10 License Management System

18

To add a device for which you want to generate a key, select the device in the All Available Devices area and click Add to add it to the Selected Devices area. Once you select the devices you want, click Generate Keys. The keys will be generated, as shown in the following example page, and the database will be updated.

CeraView User Guide

19

FibeAir IP-10 License Management System

20

Assigning Licenses to a Customer


For OEM users, you can assign licences to other users by selecting Assign Licenses to a Customer. Or, you can click the Assign to Customer button at the top of the page.

In the Select Customer field, use the drop-down list to choose the customer you want to assign the licenses to. Click Show Available Licenses for a list of licenses you can choose from.

CeraView User Guide

21

In the Filter by Type field, click the drop-down list and choose the license type (Capacity, ACM, Networking). For License Code, click the drop-down list and choose the license specifications. For Quantity to Assign, enter the amount of licenses you want to assign to that customer. The maximum quantity is limited to the available quantity for the license you choose. After you complete the filter options, click Add to add the licenses to the Assigned Licenses list. You can repeat this procedure more than once to add other license types. For Quantity to Return, enter the amount of unused licenses you would like to return (if relevant). Click Save to save the license assigment information in the database. In the page that appears, click Confirm to confirm the assignment. A page will appear informing you that the operation was successful, and the main license list will be updated with the information.

FibeAir IP-10 License Management System

22

Settings
In the main web page, the Settings group includes items you can select for system information and configuration.

Managing Users
Select the Manage Users item to define users and modify their properties. You can also access this item by clicking the Settings tab at the top of the page (if it appears).

Use the Search button at the top To define a new user, click New
.

to locate a particular user. The following page appears:

CeraView User Guide

23

In this page, enter the information in the fields, and then click Save. To delete one or more users, in the user list, mark the checkboxes beside the users you want to delete, and click Delete . Confirm your choice(s) in the page that appears and the users will be deleted.

Modifying your Profile


In the main Settings page, select the My Profile item to modify your personal information. The same page appears as that for a new user. Modify the information as desired and click Save.

FibeAir IP-10 License Management System

24

Generating Reports
In the main web page, you can select a report to generate: an Orders report, or a Devices and Activations report. To generate a report, select Orders Report or Devices & Activations Report in the main web page, or click the Reports tab at the top of the page (if it appears).

For an Orders Report: For Order No., you can select All or Between. If you select Between, specify the range of order numbers you want to include in the report. For Order Date, you can select All or Between. If you select Between, you will need to specify the range of dates you want to include in the report. In the Include field, you can select All for all types of orders, Closed orders only, or Open orders only. When you are done selecting the report criteria, click Create Report.

CeraView User Guide

25

For a Devices & Activations Report: For Devices, you can select All or Between. If you select Between, specify the range of device IDs you want to include in the report. For Activation Date, you can select All or Between. If you select Between, specify the range of activation dates you want to include in the report. When you are done selecting the report criteria, click Create Report.

FibeAir IP-10 License Management System

26

You might also like