Anda di halaman 1dari 277

Ceragon Course Handbook

COURSE HANDBOOK
Commissioning | Installation | System Configuration

FibeAir IP-20G Training Course


Updated for T8.0

Visit our Customer Training Portal at training.ceragon.com or contact us at training@ceragon.com


Trainee Name:

_________________

www.ceragon.com

Copyright 2012 Ceragon Networks Ltd.

July 2015

cts.ceragon.com

Introduction to Radio Systems

October 2014
Version 3

Agenda
Radio Relay Principles
Parameters affecting propagations:
Dispersion
Humidity/gas absorption
Multipath/ducting
Atmospheric conditions (refraction)
Terrain (flatness, type, Fresnel zone clearance, diffraction)
Climatic conditions (rain zone, temperature)
Rain attenuation

Modulation

Proprietary and Confidential

Page 5

Digital Transmission Systems

Proprietary and Confidential

Radio Relay Principles


f1
RF Signal
f1

Path Terrain

A Radio Link requires two end stations

A line of sight (LOS) or nLOS (near LOS) is required

Microwave Radio Link frequencies occupy 1-80GHz

Proprietary and Confidential

Page 6

High and Low frequency station


Tx(f1)=11500 MHz

Rx(f1)=11500 MHz

Full duplex

Localsite
Highstation

Remotesite
Lowstation

Rx(f1)=11000 MHz

Tx(f1)=11000 MHz

High station means: Tx(f1) >Rx(f1)


Low station means: Tx(f1) < Rx(f1)

Proprietary and Confidential

Standard frequency plan patterns


Only Low stations can interfere High stations

Frequency reuse:
Low 1,3V
1,3H
Tx

High

Low

1,3V

Tx

Tx

1,3H

High
Tx

1,3H

Tx

Reduced risk for overshoot

Frequency shift:
1,3H

Tx

1,3V

Tx

2,4V

Tx

2,4H
Tx

Reduced risk for overshoot

Tx

Tx

1,3H

Tx in upper part of band


Tx in lower part of band

Proprietary and Confidential

Page 7

Tx

Preferred site location structure

Proprietary and Confidential

Radio Principal Block Diagram

Input
signal

Z'
Digital
Line interface

E'
Modulator

A'

B'

Transmitter

RF Tx Filter

Branching
Network(*)

C'

D'

Feeder

TRANSMITTER PATH

Feeder

Branching
Network(*)

RF Rx Filter

E
Receiver

Demodulator

RECEIVER PATH

Proprietary and Confidential

Page 8

Digital
Line interface

Output
signal

RF Principals
RF - System of communication employing electromagnetic waves
(EMW) propagated through space
EMW travel at the speed of light (300,000 km/s)
The wave length is determined by the frequency as follows -

Wave Length

c
f

where c is the propagation velocity of electromagnetic


waves in vacuum (3x108 m/s)

Microwave refers to very short waves (millimeters) and typically


relates to frequencies above 1GHz:
300 MHz ~ 1 meter
10 GHz ~ 3 cm

Proprietary and Confidential

RF Principals
We can see the relationship between colour, wavelength and amplitude
using this animation

10

Proprietary and Confidential

Page 9

Radio Spectrum

11

Proprietary and Confidential

Parameters Affecting Propagation

12

Page 10

Parameters Affecting Propagation


Dispersion
Humidity/gas absorption
Multipath/ducting
Atmospheric conditions (refraction)
Terrain (flatness, type, Fresnel zone clearance, diffraction)
Climatic conditions (rain zone, temperature)
Rain attenuation

13

Proprietary and Confidential

Parameters Affecting Propagation Dispersion


Electromagnetic signal propagating in a physical medium is degraded
because the various wave components (i.e., frequencies, wavelengths)
have different propagation velocities within the physical medium:

Low frequencies have longer wavelength and refract less


High frequencies have shorter wavelength and refract more

14

Proprietary and Confidential

Page 11

Parameters Affecting Propagation


Atmospheric Refraction
Deflection of the beam towards the ground due to different electrical
characteristics of the atmospheres is called Dielectric Constant.
The dielectric constant depends on pressure, temperature &
humidity in the atmosphere, parameters that are normally decrease
with altitude
Since waves travel faster through thinner medium, the upper part of the
wave will travel faster than the lower part, causing the beam to bend
downwards, following the curve of earth

With Atmosphere

No Atmosphere
15

Proprietary and Confidential

Wave in atmosphere

Proprietary and Confidential

16

Page 12

Parameters Affecting Propagation Multipath


Multipath occurs when there is more then one beam reaching the receiver
with different amplitude or phase
Multipath transmission is the main cause of fading in low frequencies

Direct beam

Delayed beam

17

Proprietary and Confidential

Parameters Affecting Propagation Duct

Atmospheric duct refers to a horizontal layer in the lower atmosphere with


vertical refractive index gradients causing radio signals:

Remain within the duct

Follow the curvature of the Earth

Experience less attenuation in the ducts than they would if the ducts were not
present

Duct Layer

Duct Layer
Terrain

18

Proprietary and Confidential

Page 13

Parameters Affecting Propagation - Polarization and


Rain
Raindrops have sizes ranging from 0.1 millimeters to 9 millimeters
mean diameter (above that they tend to break up)

Smaller drops are called cloud droplets, and their shape is spherical.

As a raindrop increases in
size, its shape becomes more
oblate, with its largest
cross-section facing the
oncoming airflow.

Large rain drops become


Increasingly flattened on the
Bottom;
very large ones are shaped
like parachutes

19

Proprietary and Confidential

Parameters Affecting Propagation Rain Fading


Refers to scenarios where signal is absorbed by rain, snow, ice
Absorption becomes significant factor above 11GHz
Signal quality degrades
Represented by dB/km parameter which is related the rain
density which represented mm/hr
Rain drops falls as flattened droplet

V better than H (more immune to rain fading)

20

Proprietary and Confidential

Page 14

Parameters Affecting Propagation Rain Fading

Heavier rain >> Heavier Atten.


Higher FQ >> Higher Attenuation

21

Proprietary and Confidential

Parameters Affecting Propagation Fresnel Zone


3rd
2nd
1st

TX

RX

1. EMW propagate in beams


2. Some beams widen therefore, their path is longer
3. A phase shift is introduced between the direct and indirect
beam
4. Thus, ring zones around the direct line are created

Duct Layer0

Terrain
22

Proprietary and Confidential

Page 15

Parameters Affecting Propagation Fresnel Zone

Obstacles in the first Fresnel zone will create signals that will be 0 to 90 degrees out
of phasein the 2nd zone they will be 90 to 270 degrees out of phasein 3rd zone,
they will be 270 to 450 degrees out of phase and so on
Odd numbered zones are constructive and even numbered zones are destructive.
When building wireless links, we therefore need to be sure that these zones are kept
free of obstructions.
In wireless networking the area containing about 40-60 percent of the first Fresnel
zone should be kept free.

23

Proprietary and Confidential

Example: First condition

Proprietary and Confidential

24

Page 16

RF Link Basic Components Parabolic Reflector Radiation (antenna)

25

Proprietary and Confidential

RSSI Curve for RFU-C

1,9V

1,6V

1,3V

-30dBm

-60dbm

Proprietary and Confidential

26

Page 17

-90dBm

Main Parabolic Antenna Types

Standard performance antennas (SP,LP)


Used for remote access links with low capacity. Re-using frequencies on adjacent links is not
normally possible due to poor front to back ratio.
High performance antennas (HP)
Used for high and low capacity links where only one polarization is used. Re-using
frequencies is possible. Can not be used with co-channel systems.
High performance dual polarized antennas (HPX)
Used for high and low capacity links with the possibility to utilize both polarizations. Re-using
frequencies is possible. Can be used for co-channel systems.
Super high performance dual polarized antennas (HSX)
Normally used on high capacity links with the possibility to utilize both polarizations. Re-using
frequencies is possible with high interference protection. Ideal for co-channel systems.
Ultra high performance dual polarized antennas (UHX)
Normally used on high capacity links with high interference requirements. Re-using
frequencies in many directions is possible. Can be used with co-channel systems.

Proprietary and Confidential

27

Passive Repeaters

Plane
reflector

Back-to-back
antennas

Proprietary and Confidential

28

Page 18

Link Calculation Basic Example (in vacuum)


Lfs
TSL

Lfsl

Ga

Ga

RSL ReceivedSignalLevel

Lw
Lb

TSL Transmitted Signal Level


Lfsl Freespaceloss=92.45+20logx(distanceinkmxfrequencyinGHz)

Lf

Lf Filterloss
Lb Branchingloss
Lw Waveguideloss

RSL

Ga Antennagain

RSL=TSL+GaLfsl+GaLwLbLf

Proprietary and Confidential

29

Atmospheric attenuation
Starts to contribute to the total attenuation above approximately 15GHz

Aa a d

[dB]

Parameters in a:

Frequency
Temperature
Air pressure
Water vapour

Proprietary and Confidential

30

Page 19

Objective examples

Typical objectives used in real systems

99.999%

Month: 25.9 sec


Year: 5 min 12 sec

99.995 %

Month: 2 min 10 sec


Year: 26 min

99.99%

Month: 260 sec


Year: 51 min

Performance requirements generally higher than Availability.


ITU use worst month for Performance Average year for Availability

Proprietary and Confidential

31

Modulation

32

Page 20

Modulation
Modulation

Analog
Modulation

Digital
Modulation

AM - Amplitude modulation
FM - Frequency modulation
PM Phase modulation

ASK Amplitude Shift Keying


FSK Frequency Shift Keying
PSK Phase Shift Keying
QAM Quadrature Amplitude modulation

Proprietary and Confidential

33

Digital modulation
1
1

ASK

Modem

0 1

1
1

modulation changes the amplitude to the analog


signale.1 and 0 have different amplitude.

PSK modulation changes the phase to the transmitted


signal. The simplest method uses 0 and 1800 .

Modem

1800 phase shift


1
1

FSK modulation is a method of represent the two


binary states 1 and 0 with different
spcific frequencies.

Modem
F1

F2

F1

F1 F2

F1

F1

Proprietary and Confidential

34

Page 21

QAM Modulation
Quadrature Amplitude Modulation employs both phase modulation
(PSK) and amplitude modulation (ASK)

The input stream is divided into groups of bits based on the number
of modulation states used.

In 8 QAM, each three bits of input, which provides eight values (0-7)
alters the phase and amplitude of the carrier to derive eight unique
modulation states
In 64 QAM, each six bits generates 64 modulation states; in 128
QAM, each seven bits generate 128 states, and so on
4QAM 2bits/symbol
8QAM 3bits/symbol
16QAM 4bits/symbol
32QAM 5bits/symbol
64QAM 6bits/symbol
128QAM 7bits/symbol

256QAM
512QAM
1024QAM
2048QAM

8bits/symbol
9bits/symbol
10bits/symbol
11bits/symbol

Proprietary and Confidential

35

Why QAM and not ASK or PSK for higher modulation?


This is because QAM achieves a greater distance between adjacent points
in the I-Q plane by distributing the points more evenly

The points on the constellation are more distinct and data errors are
reduced

Higher modulation >> more bits per symbol


Constellation points are closer >>TX is more susceptible to noise

Proprietary and Confidential

36

Page 22

Constellation diagram
In a more abstract sense, it represents the possible symbols that may be
selected by a given modulation scheme as points in the complex plane.
Measured constellation diagrams can be used to recognize the type of
interference and distortion in a signal.

Proprietary and Confidential

37

8 QAM Modulation Example


We have stream: 001-010-100-011-101-000-011-110
DIGITAL QAM (8QAM)
Bitsequence

Amplitude

000

Phase(degrees)
None

001

None

010

pi/2(90)

011

pi/2(90)

100

pi(180)

101

pi(180)

110

3pi/2(270)

111

3pi/2(270)

How does constellation diagram look?

Proprietary and Confidential

38

Page 23

4QAM VS. 16QAM

16QAM

4QAM

Proprietary and Confidential

39

2048 QAM

Proprietary and Confidential

40

Page 24

Bandwidth vs. Modulation

2-PSK

4-PSK
Modulation
Complixity
Increases

Bandwidth
Decreases

8-PSK

16-QAM

64-QAM

Proprietary and Confidential

41

Signal / Noise
Example: S/N influence at QPSK Demodulator
Each dot detected in wrong quadrant result in bit errors

BER<10-13

BER0

BER=10-6

BER=10-3

Signal

Noise

Signal
S/N
Noise

Proprietary and Confidential

42

Page 25

Power

S/N

Power

Power

Noise

Power

Signal
S/N

Signal
S/N
Noise

BER Impact on Transmission Quality


10 -3

10 -4

10 -5

BER change ratio vs. Noise is


dependent on Noise Power distribution
and coding

10 -6

10 -7

BER

10 -8
-75

-72
-69
Receiver inpu t level [dBm ]

-66

Proprietary and Confidential

43

RSL Vs. Threshold


RSL (dBm)

BER>10-6

-20
-30

Nominal Input Level

Fading Margin

-73

Threshold level BER=10-6

BER>10-6

S/N=23dB for 128QAM (37 MHz)


Receiver amplifies thermal noise

-96
-99

Thermal Noise=10*log(k*T*B*1000)

K Boltzmann constant
T Temperature in Kelvin
B Bandwidth

Time (s)
Proprietary and Confidential

44

Page 26

Thank you

45

Page 27

Page 28

Introduction to Ethernet

November 2014
Version 3

Agenda
Local Area Network (LAN)
Network Devices
OSI Layers
Ethernet Frame
VLAN concept

Proprietary and Confidential

Page 29

The Local Area Network (LAN)

Proprietary and Confidential

Network Devices
The various devices used to build a data communication network can be classified into type of
equipment depending on how Ethernet packets are forwarded.

ROUTER

BRIDGE / SWITCH
HUB

Proprietary and Confidential

Page 30

Functions of OSI layers


OSI model layers
Application
Presentation
Session
Transport

Type of communication: e-mail, file transfer, web browsing


Encryption, data conversion: ASCII to EBCDIC, BCD to binary et.

Starts, stops sessions. Maintains order


Ensure delivery of entire file or message

Network

Routes data to different LANs and WANs based on network addresses

Data Link

Transmits packets from node to node based on station address

Physical

Electrical signals and cabling (physical medium)

Proprietary and Confidential

Protocols in OSI layers


OSI model layers
Application
Presentation
Session
Transport

HTTP, FTP, IRC, SSH, DNS, SNMP


SSL, SFTP, IMAP, SSH, Jpeg, GIF, TIFF, MPEG, MIDI, mp3

VARIOUS APIS, SOCKETS


TCP, UDP, ECN, SCTP, DCCP

Network

IP, IP Sec, ICMP, IGMP

Data Link

Ethernet, Token Ring, SLIP, PPP, FDDI

Physical

Coax, Fiber, Wireless

Proprietary and Confidential

Page 31

Ethernet frame

Proprietary and Confidential

OSI and TCP/IP model


TCP/IP model

OSI model
layers

OSI model
layers
Application Protocol

Application
Presentation
Application

Transport

Internet

Network

Layer2,5
Network
Interface

P
SFD
MAC
EL
VLAN
MPLS
IP

Presentation
DATA

Session Protocol

Session
Transport

Application

Presentation Protocol

MPLS

Layer2,5
MAC

DataLink
Physical

SFD

Size in bytes:

Preamble
Start frame Delimiter
= Destination + Source MAC Address
Ether Length/Type
Virtual local area network
Multiprotocol Label Switching
Internet protocol

MAC
12

SVLAN

SVLAN

TCP
UDP
FCS

C-VLAN

C-VLAN

Session
TCP/UDP

DATA

Transport

IPv4/6

TCP/UDP

DATA

Network

IPv4/6

TCP/UDP

DATA

Layer2,5

MPLS

E
L

IPv4/6

TCP/UDP

DATA

FCS

DataLink

MPLS

E
L

IPv4/6

TCP/UDP

DATA

FCS

Physical

20/40

20/8

Transmission control protocol


User datagram protocol
Frame check sequence

Proprietary and Confidential

Page 32

46-1500

L2

Proprietary and Confidential

L3

Proprietary and Confidential

10

Page 33

L4
UDP Header

TCP Header

Proprietary and Confidential

11

Inter-frame gap

Ethernet works in Layer 1, Layer 2 and Layer 2,5

Proprietary and Confidential

12

Page 34

TCP Protocol

13

Transmission Control Protocol

A TCP packet walks into a bar and


says, Id like a beer.
The bartender replies, You want a
beer?
The TCP packet replies, Yes, Id
like a beer.

Proprietary and Confidential

14

Page 35

Transmission Control Protocol

Proprietary and Confidential

15

TCP- Segment format

Proprietary and Confidential

16

Page 36

TCP- Control field

Proprietary and Confidential

17

TCP- Connection establishment using three-way handshake

Active
open

Passive
open

seq: 8000
UAPRS F
SYN

Connection
opened

seq: 15000
ack: 8001
nd: 5000
U A P R S F rw
K
AC
+
SYN

seq: 8000
ack: 15001
UAPRS F
rwnd: 10000
ACK

Means no data !
seq: 8001 if piggybacking
Proprietary and Confidential

18

Page 37

TCP- Numbering System


The bytes of data transferred in each connection are numbered.
Numbering starts with an arbitrarily generated number.

The value in the sequence number field of a segment defines the


number assigned to the first data byte contained in that segment.

The value of the acknowledgment field in a segment defines the


number of the next byte expected to be received.

Proprietary and Confidential

19

TCP- Data Transfer

Send
request

seq: 8001
ack: 15001
UAPRSF
Data
bytes: 8001-9

Send
request

Receive
000

seq: 9001
ack: 15001
UAPRS F

Receive

Data
bytes: 9001-1
0000
seq: 15001
ack: 10001

Send
request

UAPRS F
Data
17000
bytes: 15001-

seq: 10000
ack: 17001
UAPRS F
rwnd:10000

Connection Termination

Proprietary and Confidential

20

Page 38

TCP- Connection termination using three-way handshake

Proprietary and Confidential

21

TCP- Congestion Control:


Slow start, exponential increase

1
cwnd
RTT
2
cwnd

RTT
4
cwnd

RTT
8
cwnd

Proprietary and Confidential

22

Page 39

TCP- Congestion Control:


Congestion avoidance, additive increase

Proprietary and Confidential

23

TCP- Congestion example

Proprietary and Confidential

24

Page 40

TCP- Calculating maximum throughput of one TCP stream

TCP window size [Bytes] = Bandwidth [bps] * RTD [Sec] /8

* Example:

TCP ideal window size = 1*109*30*10-3/8 = 3.75MBytes

Proprietary and Confidential

25

VLAN concept

Page 41

Virtual Local Area Network (VLAN) concept

Imagine that you have a network and three different customer


Customer 1
Customer 2
Customer 3

NETWORK

Proprietary and Confidential

27

Virtual Local Area Network (VLAN) concept

VLANs are created to provide the segmentation services traditionally provided by routers
in LAN configurations
The most common protocol used today in configuring virtual LANs is IEEE 802.1Q

Proprietary and Confidential

28

Page 42

OSI and TCP/IP model


TCP/IP model

OSI model
layers

OSI model
layers
Application Protocol

Application
Presentation
Application

Internet
Layer2,5
Network
Interface

P
SFD
MAC
EL
VLAN
MPLS
IP

Presentation
DATA

Session Protocol

Session
Transport

Application

Presentation Protocol

Session
TCP/UDP

DATA

Transport

IPv4/6

TCP/UDP

DATA

Network

IPv4/6

TCP/UDP

DATA

Transport
Network
MPLS

Layer2,5
DataLink

SVLAN

C-VLAN

MPLS

E
L

IPv4/6

TCP/UDP

DATA

FCS

DataLink

C-VLAN

MPLS

E
L

IPv4/6

TCP/UDP

DATA

FCS

Physical

20/40

20/8

Physical

SFD

MAC

SVLAN

Size in bytes:

12

Preamble
Start frame Delimiter
= Destination + Source MAC Address
Ether Length/Type
Virtual local area network
Multiprotocol Label Switching
Internet protocol

Layer2,5

MAC

TCP
UDP
FCS

Transmission control protocol


User datagram protocol
Frame check sequence

Proprietary and Confidential

29

Ethernet frame

Proprietary and Confidential

30

Page 43

46-1500

Untagged Ethernet Frame

FCS is created by the sender and recalculated by the receiver

Preamble+SFD

DA

8 Bytes

SA

6 Bytes

Length/Type

6 Bytes

2 Bytes

DATA+PAD

FCS

46 - 1500 Bytes

4 Bytes
(32-bit
CRC)

Minimum 64 Bytes < FRAME SIZE < Maximum 1518 Bytes

Length / Type < 1500 - Parameter indicates number of Data Bytes


Length / Type > 1536 - Parameter indicates Protocol Type (PPPoE, PPPoA, ARP etc.)

Proprietary and Confidential

31

Tagged Ethernet Frame


Additional information is inserted
Frame size increases to 1522 Bytes

4 Bytes

Preamble+SFD

DA

SA

VLANTAG

TPID=0x8100

Length/Type

TCI

PTAG
TPID = Tag protocol ID
TCI = Tag Control Information
CFI = 1 bit canonical Format Indicator

DATA+PAD

3 Bit

CFI
1 Bit

Proprietary and Confidential

32

Page 44

VLANID
12 Bit

FCS

Tagging a Frame

VLAN ID uses 12 bits, therefore the number of maximum VLANs is 4096:


212 = 4096
VID 0 = reserved
VID 4090-4096 = reserved
VID 1 = default

(dedicated for IP-10s internal purposes such as MNG etc.)

After tagging a frame, FCS is recalculated


CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over
ETH backbones (some vendors may use CFI for internal purposes)

Proprietary and Confidential

33

TPID / ETHER-Type / Protocol Type


TPID in tagged frames in always set to
0x8100
It is important that you understand the
meaning and usage of this parameter

Protocoltype

Value

TaggedFrame

0x8100

ARP

0x0806

QinQ(CISCO)

0x8100

QinQ(othervendors)

0x88A8

QinQ(othervendors)

0x9100

QinQ(othervendors)

0x9200

RARP

0x8035

IP

0x0800

IPv6

0x86DD

PPPoE

0x8863/0x8864

MPLS

0x8847/0x8848

ISIS

0x8000

LACP

0x8809

802.1x

0x888E

Proprietary and Confidential

34

Page 45

Q-in-Q
Additional VLAN (S-VLAN) is inserted
Frame size increases to 1526 Bytes

Preamble+SFD

DA

TPID=0x88A8

PTAG
3 Bit

SA

4 Bytes

4 Bytes

S VLAN

C VLAN

TCI

Length/Type

TPID=0x8100

CFI VLANID
1 Bit

DATA+PAD

TCI

PTAG

CFI

VLANID

3 Bit

1 Bit

12 Bit

12 Bit
Proprietary and Confidential

35

Thank you

36

Page 46

FCS

IP-20G Overview

July 2015
Version 4

Agenda
FibeAir IP-20 Product Family
Network topology with IP-20G
IP-20G Introduction and Highlights
IP-20G Front Panel Description
IP-20G Block Diagram

Proprietary and Confidential

Page 47

FibeAir IP-20 Product Family


IP-20G

IP-20N 1RU & 2RU


IP-20E
IP-20S
IP-20GX

IP-20C

IP-20
Platform

IP-20A= IP20N + RFU-A


Available only for US & NA market

IP-20LH
Proprietary and Confidential

FibeAir IP-10 Product Line - 2011


Ethernet + Optional TDM

Ethernet Only

IP-10E

IP-10G

Terminal /
Single-Carrier

Terminal /
Single-Carrier

IP-10C
Compact
All-Outdoor

IP-10Q
Nodal

Nodal

Aggregation

Optimized for Full GE


Multi-Carrier pipes
Ultra-high density

Optimized Solution for Any Network


Proprietary and Confidential

Page 48

FibeAir IP-X0 Product Line - 2012 (Introducing IP-20G)


Ethernet + Optional TDM

Ethernet Only

IP-10E

IP-10G

Terminal /
Single-Carrier

IP-10C
Compact
All-Outdoor

Terminal /
Single-Carrier

IP-20G

IP-10Q
Aggregation

Optimized for Full GE


Multi-Carrier pipes
Ultra-high density

Optimized Solution for Any Network


Proprietary and Confidential

Network Topology Example (Tree)

1+0

1+1

C
C
2+0

IP20N

C
1+1

IP20N

C
C

1+0

IP20N

C
1+0

2+0

IP10G

1+0

2+0

C
IP20N

IP20G

IP10G

Proprietary and Confidential

Page 49

IP20G

IP-20G Introduction
IP-20G hardware characteristics:

6 x 1 GE interfaces total
2 x dual mode GE electrical or cascading interfaces (RJ-45)
2 x GE electrical interfaces (RJ-45)
2x GE optical interfaces (SFP)
Optional: 16 x E1 interfaces
Single or dual radio interfaces (TNC)
Single or dual power-feeds (-48v)
Sync in/out interface
Management interfaces
Terminal RS232 (RJ-45)
2x FE electrical interfaces (RJ-45)
External alarms interface
RFU-C/Ce, RFU-HP (1Rx or 2Rx), RFU-Ae/Aep support
IEEE-1588 TC
IP-20G maintains high capacity, with up to 1024QAM modulation in its first SW release (T7.7),
and up to 2048QAM from SW release T8.0

Proprietary and Confidential

IP-20G Highlights
Optimized tail/edge solution supporting seamless integration of radio (L1)
and end-to-end Carrier Ethernet transport/services (L2) functionality

Rich packet processing feature set for support of engineered end-to-end


Carrier Ethernet services with strict SLA

Integrated support for multi-operator and converged backhaul business


models, such as wholesale services and RAN-sharing

Highest capacity, scalability and spectral efficiency


High precision, flexible packet synchronization solution combining SyncE
and 1588v2

Best-in-class integrated TDM migration solution


Specifically built to support resilient and adaptive multi-carrier radio links,
scaling to GE capacity

Future-proof with maximal investment protection


Supports RFU-Ce for modulations up to 2048QAM.
Proprietary and Confidential

Page 50

Reference Configurations

IP-20G Dual Modem Activation

A single-carrier IP-20G unit with dual-modem hardware can be converted via


software upgrade to a dual-modem unit

Proprietary and Confidential

10

Page 51

IP-20G IDU Cascading with Dual Modems

A dual-modem IP-20G in an East-West configuration, with a cascading link to a pair


of IP-20G units
A cascading connection between these two units enables hybrid Ethernet/TDM traffic
to pass among all three units

Proprietary and Confidential

11

IP-20G Chained Network

Proprietary and Confidential

12

Page 52

IP-20G Ring with Spur

A ring consisting of three IP-20G nodes connected via 1+0 radio links, with a spur to
a fourth IP-20G node
All of the IP-20G units in the ring utilize dual-modem configurations, except for the
node at the bottom in the figure

Proprietary and Confidential

13

IP-20G Aggregation/POP Site

Proprietary and Confidential

14

Page 53

IP-20G Front Panel Description

15

FibeAir IP-20G Front panel description


Passive cooling
(Fan-less design)

1RU

16 x E1/DS1s
(optional)
MDR69 connector

External
Alarms
(DB9)

2 x FE
Management via
splitter cable
2 x Dual-Mode:
(RJ45)
GE Electrical or
Sync in/out
Cascading
(RJ45)
(RJ45)
Terminal
(RJ45)

2 x GE
Optical
(SFP)

1 or 2 RFU
interfaces
(TNC)

Power
-48V DC
(Single-feed &
Dual-feed options)

2 x GE
Electrical
(RJ45)

Purpose-built for tail/edge nodal sites


Same features/capabilities as IP-20N/A Aggregation Nodes
Proprietary and Confidential

16

Page 54

SM- Card
The SM-Card holds the configuration and software for the IDU. The SM-

Card is embedded in the SM-Card Cover, so re-using the existing SM-Card


Cover is necessary to ensure that the units software and configuration is
maintained.
Contains only software with configuration

Proprietary and Confidential

17

Ethernet Management Interface IP-20G

FibeAir IP-20G contains two FE management interfaces, which connect to a single RJ-45 physical
connector on the front panel (MGMT).

If the user only needs to use a single management interface, a standard Cat5 RJ-45 cable (straight or
cross) can be connected to the MGMT interface.
To access both management interfaces, a special 2 x FE splitter cable can be ordered from Ceragon.

Port Status LED The LED for management interface 1 is located on the upper left of the MGMT
interface. The LED for management interface 2 is located on the upper right of the MGMT interface.

Proprietary and Confidential

18

Page 55

E1/DS1 - Interface

Optionally, FibeAir IP-20G can be ordered with an MDR69 connector in which 16


E1/DS1 interfaces are available (ports 1 through 16).
In SW 7.7. is E1 option only available
In SW 7.9. also DS1 option available
The E1/DS1 interface has the following LEDs
ACT LED Indicates whether the TDM card is working properly (Green) or if there is
an error or a problem with the cards functionality (Red).
E1/DS1 LED Indicates whether the interfaces are enabled with no alarms (Green),
with alarms (Red), or no interfaces enabled (Off).

Proprietary and Confidential

19

Radio Interfaces

In 7.7 is supported only single radio carrier.


In 7.7.5 is supported 2x 1+0 East / West Terminal
In 7.9 is supported 2+0 XPIC
In 7.7 is supported only RFU-C (up to 256QAM) and RFU-Ce (up to 1024
QAM)
In 7.9 RFU-HP, 1500HP, RFU-A supported
In 8.0 release is supported 2+0 ABC
The IDU and RFU are connected by a coaxial cable RG-223 (100 m/300 ft),
Belden 9914/RG-8 (300 m/1000 ft) or equivalent, with an N-type connector
(male) on the RFU and a TNC connector on the IDU.

RFU-C / RFU-Ce

RFU-HP / 1500HP

RFU-A
Proprietary and Confidential

20

Page 56

Radio Interfaces - LEDs


ACT Indicates whether the interface is working properly (Green) or if there is

an error or a problem with the interfaces functionality (Red), as follows:


Off The radio is disabled.
Green The radio is active and operating normally.
Blinking Green The radio is operating normally and is in standby mode.
Red There is a hardware failure.
Blinking Red Troubleshooting mode.
LINK Indicates the status of the radio link, as follows:
Green The radio link is operational.
Red There is an LOF or Excessive BER alarm on the radio.
Blinking Green An IF loopback is activated, and the result is OK.
Blinking Red An IF loopback is activated, and the result is Failed.
RFU Indicates the status of the RFU, as follows:
Green The RFU is functioning normally.
Yellow A minor RFU alarm or a warning is present, or the RFU is in TX
mute mode, or, in a protected configuration, the RFU is in standby mode.
Red A cable is disconnected, or a major or critical RFU alarm is present.
Blinking Green An RF loopback has been activated, and the result is OK.
Blinking Red An RF loopback has been activated, and the result is
Failed.
Proprietary and Confidential

21

Power Interfaces

FibeAir IP-20G receives an external supply of -48V current via one or two power
interfaces (the second power interface is optional for power redundancy).

The IP-20G monitors the power supply for under-voltage and includes reverse
polarity protection, so that if the positive (+) and negative (-) inputs are mixed up, the
system remains shut down.

The allowed power input range for the IP-20G is -40V to -60V. An under voltage
alarm is triggered if the power goes below the allowed range, and an over voltage
alarm is triggered if the power goes above the allowed range.

There is an ACT LED for each power interface.


The LED is Green when the voltage being fed to the power interface is within range,
and Red if the voltage is not within range or if a power cable is not connected.

Proprietary and Confidential

22

Page 57

Synchronization Interface

FibeAir IP-20G includes an RJ-45 synchronization interface for T3 clock input and T4 clock output.
The interface is labeled SYNC.

The synchronization interface contains two LEDs, one on the upper left of the interface and one
on the upper right of the interface, as follows:

T3 Status LED Located on the upper left of the interface. Indicates the status of T3 input clock,
as follows:
Off There is no T3 input clock, or the input is illegal.
Green There is legal T3 input clock.

T4 Status LED Located on the upper right of the interface. Indicates the status of T4 output
clock, as follows:
Off T4 output clock is not available.
Green T4 output clock is available.
Blinking Green The clock unit is in a holdover state.

Proprietary and Confidential

23

External Alarms

IP-20G includes a DB9 dry contact external alarms interface. The external alarms
interface supports five input alarms and a single output alarm.

The input alarms are configurable according to:


1 Intermediate
2 Critical
3 Major
4 Minor
5 Warning

The output alarm is configured according to predefined categories.

Proprietary and Confidential

24

Page 58

Terminal Interface
FibeAir IP-20G includes an RJ-45 terminal interface (RS-232). A local craft
terminal can be connected to the terminal interface for local CLI
management of the unit.

Bits per Second 115,200


Data Bits 8
Parity None
Stop Bits 1
Flow Control - None

Proprietary and Confidential

25

IP-20G Block Diagram

Proprietary and Confidential

26

Page 59

Unique Feature Set


ACM42048QAM
ExtendedModulationsRange
(11 ACMpoints)
Frequencybands

642GHz
10,20,30,40,50,60MHz(FCC)

Widerangeofchannels
7, 14,28,40,56MHz(ETSI)
1+0
2x1+0EW
System Configurations

1+1HSB
2+0XPIC
2+0ABC
TrafficAwareSmartPipe

TrafficManager
Multi Service,CarrierEthernet2.0Switch
RadioConnection

RFUC, RFUCe,1500HP,RFUHP,RFUA

Proprietary and Confidential

27

Thank You

28

Page 60

Radio Frequency Units


IP-20G

V1
December 2014

Agenda
Radio Frequency units for IP20
RFU Selection Guide
RFU-C
1500HP / RFU HP
Split Mount Configuration and Branching
New Outdoor Circulator Block OCB
Split Mount Configurations

Proprietary and Confidential

Page 61

Radio Frequency units


Standard Power
FibeAir RFU-C

High Power
FibeAir 1500HP SD
FibeAir RFU-HP

The following RFUs can be installed in a split-mount configuration:


FibeAir RFU-C (642 GHz)
FibeAir 1500HP (611 GHz)
RFU-HP (68 GHz)

The following RFUs can be installed in an all-indoor configuration:


FibeAir 1500HP/RFU-HP (611 GHz)

The IDU and RFU are connected by a coaxial cable RG-223 (up to 100 m/300 ft),
Belden 9914/RG-8 (up to 300 m/1000 ft) or equivalent, with an N-type connector
(male) on the RFU and a TNC connector on the RMC in the IP-20N chassis.

Proprietary and Confidential

FibeAir Radio Frequency Units


Standard Power (Max 24 dbm)
6-42 GHz

FibeAir RFU-C

7-56Mhz Ch. Bandwidth


QPSK-2048QAM
Very Compact
Ultra High Power (Max 33 dbm)
6-8 GHz

FibeAir RFU-HP - 1RX

FibeAir 1500-HP/SD

7-56Mhz Ch. Bandwidth


Low Loss Chaining
QPSK-2048QAM

High Power (Max 33 dbm)


6-11 GHz
10-40Mhz Ch. Bandwidth
QPSK-2048QAM
Low Loss Chaining
Dual RX with IFC (Single Rx available for 11GHz)

Proprietary and Confidential

Page 62

RFU Selection Guide

RFUHP

1500HP
(6 11GHz)

(68GHz)

RFUC
(6 42GHz)

RFUCe
(6 42GHz)

SplitMount

AllIndoor

1+0/2+0/1+1/2+2

Character
InstallationType

Configuration

PowerSavingMode

Modulation

N+0(N>2)

SDsupport

(IFC,BBS)

BBS

(BBS)

(BBS)

AdjustablePower
Consumption

QPSKto256QAM

512 to2048QAM

1500HP 1RX for 11GHz supports channel bandwidth 10-30 MHz


RFU-HP does not support 56 MHz channels at 11 GHz
IFC at 40MHz is supported only for the 11GHz frequency band

Proprietary and Confidential

RFU C

Page 63

RFU C

6-42GHz

Standard RFU C
Support up to 256 QAM modulation
Premium RFU-Ce
Support up to 1024 QAM modulation
RMC-B is required for radio link with IP-20N
Main Features of RFU-C:
Frequency range Operates in the frequency range 6 42 GHz
More power in a smaller package - Up to 26 dBm for extended distance, enhanced
availability, use of smaller antennas
Configurable Modulation QPSK 1024 QAM
Configurable Channel Bandwidth 7 MHz 56MHz
Compact, lightweight form factor - Reduces installation and warehousing costs
Supported configurations:

1+0 directandremotemount
1+1 directandremotemount
2+0 directandremotemount
2+2 remotemount
4+0 remotemount

Efficient and easy


Proprietary and Confidential

Example of RFU-C direct 1+1 mount configurations


1+1 direct

Proprietary and Confidential

Page 64

Orthogonal Mode Transducer (OMT) Installation for 2+0 Configuration

Switch to the circular adaptor


(removing the
existing rectangular transition,
swapping the O-ring, and
replacing on the circular
transition).

Proprietary and Confidential

OMT Installation Example

Note: RFUs are at sub 11GHz band


Proprietary and Confidential

10

Page 65

1500HP / RFUHP

11

Main Features of 1500HP/RFU-HP

Frequency range:

1500HP 2RX: 6-11GHz

1500HP 1RX: 11GHz

RFU-HP 1RX: 6-8GHz


Frequency source Synthesizer
Installation type Split mount remote mount, all indoor (No direct mount)
Diversity Optional innovative IF Combining Space Diversity for improved system gain (for 1500HP), as
well as BBS Space Diversity (all models)
High transmit power Up to 33dBm in all indoor and split mount installations
Configurable Modulation QPSK 1024 QAM
Configurable Channel Bandwidth

1500HP 2RX (6-11 GHz): 10-30 MHz

1500HP 1RX (11 GHz): 10-30 MHz

1500HP 1RX (11 GHz wide): 24-40 MHz

RFU-HP 1RX (6-8GHz): 7-56 MHz


System Configurations Non-Protected (1+0), Protected (1+1), Space Diversity, 2+0/2+2 XPIC, N+0, N+1
XPIC and CCDP Built-in XPIC (Cross Polarization Interference Canceller) and Co-Channel Dual Polarization
(CCDP) feature for double transmission capacity, and more bandwidth efficiency
Power Saving Mode option - Enables the microwave system to automatically detect when link conditions allow it
to use less power (for RFU-HP)
Tx Range (Manual/ATPC) Up to 20 dB dynamic range
ATPC (Automatic Tx Power Control)
RF Channel Selection Via EMS/NMS
NEBS Level 3 NEBS compliance

Proprietary and Confidential

12

Page 66

1500 HP 2RX in 1+0 SD Configuration

Proprietary and Confidential

13

1500 HP 1RX in 1+0 SD Configuration

Proprietary and Confidential

14

Page 67

RFU-HP 1RX in 1+0 SD Configuration

Proprietary and Confidential

15

HP Comparison Table
Feature

1500HP2RX

1500HP1RX

RFUHP

FrequencyBandsSupport

6L,6H,7,8,11GHz

6L,6H,7,8,11GHz

6L,6H,7,8GHz

Notes

ChannelSpacingSupport

Upto30MHz

Upto30MHz
11GHzversionfor
40MHz

Upto56MHz

SplitMount

AllarecompatiblewithOCBs
frombothgenerations

AllIndoor

AllarecompatiblewithICBs

SpaceDiversity

BBSandIFC

BBS

BBS

IFC IFCombining
BBS BaseBandSwitching

FrequencyDiversity

1+0/2+0/1+1/2+2

N+1

N+0(N>2)

HighPower

RemoteMountAntenna

PowerSavingMode

Powerconsumptionchanges
withTXpower

1500 HP (11 GHz ) 40 MHz bandwidth does not support IF Combining. For this frequency, space diversity is only available via BBS.

Proprietary and Confidential

16

Page 68

Split Mount Configuration and Branching

Split Mount Configuration and Branching Network

Outdoor Circulator Block OCB The Tx and the Rx path


circulate together to the main OCB port. When chaining
multiple OCBs, each Tx signal is chained to the OCB Rx
signal and so on (uses S-bend section). For more details,
refer to 1500HP/RFU-HP OCBs

Indoor Circulator Block ICB All the Tx signals are


chained together to one Tx port (at the ICC) and all the Rx
signals are chained together to one Rx port (at the ICC). The
ICC circulates all the Tx and the Rx signals to one antenna
port.

Proprietary and Confidential

18

Page 69

Split Mount Configuration and Branching Network


All- Indoor Vertical Branching

Split-Mount Branching and All Indoor Compact

Proprietary and Confidential

19

New OCB

20

Page 70

New OCB Outdoor Circulator Block


The OCB has the following main purposes:
1. Hosts the circulators and the attached filters.
2. Chain and accumulate radio signal ( multiple carriers )
3. Routes the RF through the filters and circulators.
4. Allows RFU connection to the Main and Diversity antennas.

Proprietary and Confidential

21

New OCB Components

RF Filters - are used for specific frequency channels and Tx/Rx separation. The filters are attached to the OCB,
and each RFU contains one Rx and one Tx filter. In a Space Diversity using IF combining configuration, each RFU
contains two Rx filters (which combine the IF signals) and one Tx filter. The filters can be replaced without
removing the OCB. The RF filter is installed with every configuration.

DCB - Diversity Circulator Block An external block which is added in Space Diversity configurations. DCB is
connected to the diversity port and chains two OCBs.

Coupler Kit is used for 1+1 Hot Standby configurations. (loss 1.6 /6dB)

Symmetrical Coupler Kit is used for: (loss of 3/3 dB) When chaining adjacent channels (only 28/30 MHz) 1+1
Hot Standby configurations with a symmetrical loss of 3dB in each direction Note: CPLRs loss tolerance is 0.7
dB

U Bend The U Bend connects the chained DCB (Diversity Circulator Block) in N+1/N+0 configurations.

S Bend The S Bend connects the chained OCB (Outdoor Circulator Block) in N+1/N+0 configurations.

Pole Mount Kit The Pole Mount Kit is used to fasten up to five OCBs and the RFUs to the pole. The kit enables
fast and easy installation.

Proprietary and Confidential

22

Page 71

1+1 and 2+2 HSB Configuration

Proprietary and Confidential

23

N+0/N+1 Configuration

Proprietary and Confidential

24

Page 72

2+0 XPIC

Proprietary and Confidential

25

Split mount applications

Proprietary and Confidential

26

Page 73

Split mount applications 4+0

S-Bend

Proprietary and Confidential

27

Split mount applications 4+0 SD

DCB

Proprietary and Confidential

28

Page 74

DCB

S-Bend

U-Bend

Thank You

Page 75

IP-20G Installation Guide

July 2015
Version 2

Agenda
Electromagnetic Fields, ESD and Laser Protection
General Requirements for Packing and Transportation and
Environment

IP-20G Rack Installation

Rack Installation
Grounding the IP-20G
Replacing SM-Card
Power Cable
Mechanical Specifications
Earth Bonding of Equipment
IP-20G to RFU-C connection
Antenna Installation
RFU-C Installation

Proprietary and Confidential

Page 77

High Frequency Electromagnetic Fields!


Exposure to strong high frequency electromagnetic fields may cause

thermal damage to personnel. The eye (cornea and lens) is easily exposed.

Any unnecessary exposure is undesirable and should be avoided.


In radio-relay communication installations, ordinary setup for normal

operation, the general RF radiation level will be well below the safety limit.

In the antennas and directly in front of them the RF intensity normally will
exceed the danger level, within limited portions of space.

Dangerous radiation may be found in the neighborhood of open waveguide


flanges or horns where the power is radiated into space.

To avoid dangerous radiation the following precautions must be taken:


During work within and close to the front of the antenna; make sure that
transmitters will remain turned off.
Before opening coaxial - or waveguide connectors carrying RF power,
turn off transmitters.
Consider any incidentally open RF connector as carrying power, until
otherwise proved. Do not look into coaxial connectors at closer than
reading distance (1 foot). Do not look into an open waveguide unless
you are absolutely sure that the power is turned off.

Proprietary and Confidential

ESD & LASER


ESD
This equipment contains components which are sensitive to "ESD" (Electro

Static Discharge). Therefore, ESD protection measures must be observed


when touching the IDU.
Anyone responsible for the installation or maintenance of the FibeAir IDU
must use an ESD Wrist Strap.
Additional precautions include personnel grounding, grounding of work
bench, grounding of tools and instruments as well as transport and storage
in special antistatic bags and boxes.
LASER
Use of controls or adjustments or performance of procedures other than
those specified herein may result in hazardous radiation exposure.
The optical interface must only be serviced by qualified personnel, who are
aware of the hazards involved to repair laser products.

Proprietary and Confidential

Page 78

General Requirements

Transportation & Inspection

The equipment cases are prepared for


shipment by air, truck, railway and sea,
suitable for handling by forklift trucks and
slings. The cargo must be kept dry during
transport and storage.

It is recommended that the equipment be


transported to the installation site in its
original packing case.

If intermediate storage is required, the


packed equipment must be stored in a dry
and cool environment, and out of direct
sunlight, in accordance with ETS 300 0191-1, Class 1.2.

Check the packing lists and verify that the


correct equipment part numbers and
quantities are in the delivered packages.

Proprietary and Confidential

Page 79

Packing & Transportation


The equipment is packed at the factory, and sealed moisture-absorbing bags
are inserted.
The equipment is prepared for public transportation. The cargo must be kept dry
during transportation.
Keep items in their original boxes till they reach their final destination.
If intermediate storage is required, the packed equipment must be stored in dry
and cool conditions and out of direct sunlight
When unpacking
Check the packing lists, and ensure that the
correct part numbers and quantities of
components arrived.

Proprietary and Confidential

General Requirements
1. Environmental specification for IDU: -5C (23F) to +55C (131F)
2. Environmental specification for RFU: -33C (-27F) to +55C (131F) high reliability
3. -45C (-49F) to +60C (140F) with limited margins
4. Cold startup requires at least -5C (23F)
5. Humidity: 5%RH to 95%RH for IP-20G
6. Humidity: 5%RH to 100%RH for RFU-C
7. IDU standard Input is -48VDC (-40 to -60VDC)
8. This equipment is designed to permit connection between the earthed conductor of
the DC supply circuit and the Earthing conductor at the equipment.
9. The equipment shall be connected to a properly grounded supply system
10. The DC supply system is to be local, i.e. within the same premises as the equipment
11. A disconnect device is not allowed in the grounded circuit between the DC supply
source and the frame/grounded circuit connection.
88

Proprietary and Confidential

Page 80

IP-20G Rack Installation

Installing the IP-20G IDU

Kits required to perform the installation:


IP-20G chassis
19 rack/ sub rack
SM-Card Cover

1x
1x
1x

Tools:
Philips screwdriver
Flat screwdriver
Proprietary and Confidential

10

Page 81

Rack Installation
Insert and hold the IP-20G IDU in the rack, as shown in the following
figures. Use four screws (not supplied with the installation kit) to fasten the
IDU to the rack.

Proprietary and Confidential

11

Grounding the IP-20G


Connect a grounding wire first to the single-point stud shown in the figure
below, and then to the rack, using a single screw and two washers.

The grounding wire must be 16 AWG or thicker

Proprietary and Confidential

12

Page 82

Replacing an IP-20G IDU or SM-Card

If you should need to replace the IP-20G IDU, you must first remove the SM-Card Cover so that
you can insert it into the new IDU.
The SM-Card holds the configuration and software for the IDU. The SM-Card is embedded in the
SM-Card Cover, so re-using the existing SM-Card Cover is necessary to ensure that the units
software and configuration is maintained.
In some cases, you may need to replace the SM-Card itself in order to upgrade the units
configuration.
To remove the SM-Card Cover:
1. Loosen the screws of the SM-Card Cover and remove it from the IDU.

Proprietary and Confidential

13

Replacing an IP-20G IDU or SM-Card


2. In the new IDU or, if you are upgrading the SM-Card, the old IDU, make sure that there is no
foreign matter blocking the sockets in the opening where the SM-Card is installed.

3. Gently place the SM-Card Cover in its place and tighten the screws, using a Phillips screwdriver.

Proprietary and Confidential

14

Page 83

Power Requirements
When selecting a power source, the following must be considered:

DC power can be from -40 VDC to -60 VDC.

Installation Codes: The equipment must be installed according to country national


electrical codes. For North America, equipment must be installed in accordance to the
US National Electrical Code, Articles 110-16, 110-17 and 110-18, and the Canadian
Electrical Code, Section 12.

Overcurrent Protection: A readily accessible listed branch circuit overcurrent


protective device, rated 15 A, must be incorporated in the building wiring.

Grounded Supply System: The equipment shall be connected to a properly grounded


supply system. All equipment in the immediate vicinity shall be grounded the same
way, and shall not be grounded elsewhere.

Local Supply System: The DC supply system is to be local, i.e. within the same
premises as the equipment.

Disconnect Device: A disconnect device is not allowed in the grounded circuit


between the DC supply source and the frame/grounded circuit connection.
Proprietary and Confidential

15
15

Power Interface
FibeAir IP-20G receives an external supply of -48V current via one or

two power interfaces (the second power interface is optional for power
redundancy). The IP-20G monitors the power supply for under-voltage
and includes reverse polarity protection, so that if the positive (+) and
negative (-) inputs are mixed up, the system remains shutdown.
The allowed power input range for the IP-20G is -40V to -60V. An under
voltage alarm is triggered if the power goes below the allowed range,
and an over voltage alarm is triggered if the power goes above the
allowed range.
Make sure to use a circuit breaker to protect the circuit from damage
by short or overload. In a building installation, the circuit breaker shall
be readily accessible and incorporated external to the equipment. The
maximum rating of the overcurrent protection shall be 10 Amp, while
the maximum current rating is 5 Amp.

Proprietary and Confidential

16

Page 84

Power Cable

Proprietary and Confidential

17

Power cables

Proprietary and Confidential

18

Page 85

Mechanical Specifications

Proprietary and Confidential

19

Earth Bonding of Equipment

Copyright 2009 2013 Nera Networks AS All rights reserved.

I-79113-EN rev. A

Page 86

Typical Earthing Network


Note 1: Structure or cable riser directly connected to Station
Earth Network.
Note 2: Main Earth Bar in equipment room, connected to
Station Earth Network.
Note 3: Earth Bus Bar/Cable connected to main earth bar.
Note 4: Coax Signal Cable.
Note 5: Over voltage protection integrated in units.

Note 1

Proprietary and Confidential

21

Feeder - Earthing Kit (pos.1)


Ceragon Networks provides one
Earthing kit per feeder as standard
Earthing Kit staggered to ensure smooth,
uniform jumper transition to point of bonding.

There are three logical positions where


a Waveguide/Feeder Earthing Kit should be installed:
1.

Highest priority is at the bottom of the vertical


feeder run, on the straight section just above the
bend where it transitions from vertical to
horizontal.

Custom Earthing Kit supplied from the


Feeder Manufacturer use only kit that are
compatible.

2.

Jumper Leads from the kit should be bonded to


the Tower Structure:
- directly (bolted connection)
- via a earth termination plate (if provided)
- stainless steel angle adaptor (ANDREW)
Earth Kit on the feeder should be positioned
so that each jumper lead has a uniform smooth
transition down to the point of bonding this may
mean staggering their position as shown here.

Never intermix components from different


Manufacturers.

3.

4.

It is preferred that each jumper is bonded


separately.

Jumper lead between Earthing Kit


and buried earth radial bonded to base
of the Tower Leg.
Recommended 70mm PVC Coated Conductor

SEE NEXT TWO SLIDES

Proprietary and Confidential

22

Page 87

Feeder - Earthing Kit (pos.2)


Second line of defence
The second position in order of priority is just before the
waveguide/feeder enters the shelter through the wall plate.
1.

Earth Termination Plate

Again it is important that the jumper lead forms a smooth


transition downwards to earth. In this case the bonding
point is on the earth termination plate mounted below the
cable bridge.

2.

It is preferred that each jumper is bonded separately. Earth


Termination Plate usually have multiple bonding holes predrilled.

3.

To shape each conductor correctly begin at the earth


termination plate and form the cable to the best transition
back to the feeder. From there you will establish the
location to fit the earth kit. Treat each earthing kit
separately.

Common Errors
Fitting or, finding the Earth Termination Plate too high on the
shelter wall often prevent achieving the required earth
jumper transition.

Earth Kit

Jumper lead between Earthing Kit


and Earth Termination Plate outside
shelter.
Recommended 70mm PVC Coated
Conductor or 3mm x 25mm Copper
Tape.
Conductor / Tape should be run out
to the
Buried earth loop at a depth of
600mm.

Proprietary and Confidential

23

Feeder - Earthing Kit (pos.3)


The third position in order of priority is at the antenna position.
Here, the Earthing Kit is fitted on the vertical straight
section of feeder just after the transition from horizontal to
vertical.
1.

Once again it is important that the jumper lead forms a


smooth transition downwards to earth. It is usual to use the
tower structure itself as the main down conductor.

2.

To shape each conductor correctly begin at the bonding


point and form the cable to the best transition back to the
feeder. From there you will establish the best position to fit
the earth kit to the feeder. Treat each earthing kit
separately.

3.

If using a Stainless Steel Angle Adaptor this will provide


flexibility to establishing a bonding point on the tower the
Angle Adaptor does not require you to find or drill a hole in
any structural members.

The tower structure or


climbing ladder are
both commonly used
for bonding the earth
jumper.
Angle Adaptors are the
most convenient
bonding method as this
avoids finding or
drilling holes at height
in the tower.

Additional Earthing Kit:


If a customer specifies additional earthing kit to be fitted, these
would normally be positioned between the two kit installed at the
top and bottom of the feeder.

Proprietary and Confidential

24

Page 88

ODU Earthing
EACH ODU IS SEPARATELY
EARTHED DO NOT JUMPER
BETWEEN ODU

1. SMOOTH JUMPER TRANSITION


2. SHORTEN THE JUMPER IF TOO LONG
3. SUPPORT EARTH JUMPER
WHERE NEEDED

4. BOND TO TOWER STRUCTURE.


CLAMP TYPE DEPENDENT ON
TOWER MEMBER PROFILE

RSSI

N-Type to IDU connection

EARTH TERMINAL

Proprietary and Confidential

25

Applying the same principles to all cables

With All Cable Installations


Avoid leaving coils along
feeder cables
Avoid kinking the cable
Avoid cable loopbacks

Proprietary and Confidential

26

Page 89

Weatherproofing
Each Earthing Kit should be protected with a waterproof weather seal
If the weather seals are not provided as part of the main Earthing Kit, they must be
ordered

Each kit is provided with an installation instruction (or, Bulletin)


Always follow the advice given in the instruction to achieve the best possible
installation

Proprietary and Confidential

27

ODU to IDU connection

Page 90

IP-20G to RFU-C connection


The cable should have a maximum attenuation of 30 dB at 350 MHz.
TNC
N-type female

N-type male

TNC male

TNC females
Proprietary and Confidential

29

N-type connector installation


http://www.youtube.com/watch
?v=cAV_xhP3FNA

http://www.youtube.com/watch
?v=Mo9LwdHe39M

Proprietary and Confidential

30

Page 91

TNC connector
installation
instructions
http://www.youtube.co
m/watch?v=XfA0JVR
JSxU

Proprietary and Confidential

31

Protecting the IF Connector for Split Mount


Make sure the vulcanized tape and PVC tape
overwrap extends right up to the ODU casing
and is hand moulded around the connector to
form a water tight joint

Fit a small cable tie at the top and


bottom of the weather kit to
prevent the PVC tape over wrap
from loosening

Also is possible to use cold


shrink medium instead of
tapes

Self sealing vulcanized tape


weather kit should be
applied to the connector at
the ODU to make it fully
water tight.

The vulcanized tape must


be overwrapped with PVC
tape tied off at the top and
bottom with cable ties.

Failure to follow every detail of


the installation instructions will
result with water damage to the
connector and cable

Proprietary and Confidential

32

Page 92

Cable Clamping
IF Cable

Tower Cross Member

Avoid this method which is


less secure and will cause
unsightly bending of the
cable

When securing cables with cable


ties the method shown here can
normally be achieved using a single
tie.
This method will keep the cable
straight and provide the best
support

Proprietary and Confidential

33

Cable Installation and Grounding


For optical cables no grounding is required
For Ethernet cables, the cable should be grounded to the antenna tower
every 50m using the kit CAT5E_gnd_kit.

Procedure see installation Guide

Proprietary and Confidential

34

Page 93

Antenna Installation

RSSI Curve

1,9V

1,6V

1,3V

-30dBm
Proprietary and Confidential

36

Page 94

-60dbm

-90dBm

Antenna Panning - Azimuth


Important to establish which are the side lobes
and what is the main beam
Position can be marked onto the column or
interface using a felt tipped pen

ReceivingAntenna

SIDE LOBE

AZIMUTH

Always Pan antenna


beyond each side lobe
MAIN BEAM

SIDE LOBE

For Azimuth panning it is important to establish the


strongest possible signal but remember, further improvement
should be expected once elevation adjustment is carried out

37

Proprietary and Confidential

Antenna Panning - Elevation


Determine from available data if the antenna direction
of shoot is above or below horizontal to ensure the
elevation is adjusted in the correct direction
With the main beam having already been established
it is not necessary to find the side lobes again

ReceivingAntenna

Once the best signal strength has been found using


elevation minor azimuth panning can often
improve the signal strength further

SIDE LOBE

ELEVATION

HORIZONTAL

MAIN BEAM

Note:

SIDE LOBE

It should not always be expected to establish the strongest receive signal at


first attempt to align an antenna
Antenna may need to be panned several times before the optimum signal
strength is established
38

Proprietary and Confidential

Page 95

Dual Polarized Antenna connection


To fit the Duel Polarized Waveguide
Interface
Note: There may be some variation in of the
Duel Polarized Waveguide Interface always refer to the installation Bulletin before
attempting to install this unit

Remove the two Waveguide Interface


securing screws.
Replace the Waveguide Interface with the
Dual Polarized Waveguide Interface.
Secure the Dual Polarized Waveguide
Interface to the antenna by means of two
screws M8.
Remount the two Waveguide Interface
securing screws.
39

Proprietary and Confidential

Dual Polarized Antenna connection


DUEL POLARIZED FEEDHORN

WAVEGUIDE

Waveguide ports on feedhorn


clearly marked to show polarization

40

Proprietary and Confidential

Page 96

RFU-C Installation

RFU-C waveguide flanges

Proprietary and Confidential

42

Page 97

RFU-C direct mount configurations

1+0 direct

Proprietary and Confidential

43

RFU-C and Antenna Interface Direct Mount Polarization

Proprietary and Confidential

44

Page 98

RFU-C remote mount configurations

1+0 remote

Proprietary and Confidential

45

RFU-C direct 1+1 mount configurations


1+1 direct

Proprietary and Confidential

46

Page 99

RFU-C 1+1 Coupler Direct Mount Polarization


Vertical Polarization

Horizontal Polarization

Proprietary and Confidential

47

RFU-C remote mount configurations


1+1 remote

Proprietary and Confidential

48

Page 100

Orthogonal Mode Transducer (OMT) Installation

Switch to the circular adaptor


(removing the
existing rectangular transition,
swapping the O-ring, and
replacing on the circular
transition).

Proprietary and Confidential

49

OMT Installation Example

Proprietary and Confidential

50

Page 101

RFU-C Mediation devices losses

Proprietary and Confidential

51

Thank you

52

Page 102

First login

Ceragon Training Services


July 2015, v4

Agenda

CLI and Web login


General commands
Get IP address
Set IP address
Set to default
Web Management

Proprietary and Confidential

Page 103

Connecting to the Unit


CLIviaSerial

Web/Telnet

Baudrate=
115200
Bits per Second 115,200
Data Bits 8
Parity None
Stop Bits 1
Flow Control - None

IPaddress=192.168.1.1

DefaultUsername/passwordisadmin/admin
Proprietary and Confidential

General commands

Press twice the TAB key for optional commands in actual directory
Use the TAB key to auto-complete a syntax

Use the arrow keys to navigate through recent commands

Question mark to list helpful commands

Proprietary and Confidential

Page 104

Get IP address
CLI Command:
platform management ip show ip-address

Proprietary and Confidential

Changing Management IP Address


CLI Command:
platform management ip set ipv4-address <IP Address> subnet <Mask>
gateway <default gateway>

Example
Web
expand Platform branch, then Management branch and click on IP, set
accordingly and click Apply button

Proprietary and Confidential

Page 105

Set to default
CLI Command:
platform management set-to-default

Please note that IP address after Set to Factory Default will be not changed!!!

Proprietary and Confidential

Other CLI commands


For any CLI commands please follow our Web Manual
Open Index html file
Find out in Topics submenu required configuration

Proprietary and Confidential

Page 106

Ethernet Management Interface IP-20G

FibeAir IP-20G contains two FE management interfaces, which connect to a single RJ-45 physical
connector on the front panel (MGMT).

If the user only needs to use a single management interface, a standard Cat5 RJ-45 cable (straight or
cross) can be connected to the MGMT interface.
To access both management interfaces, a special 2 x FE splitter cable can be ordered from Ceragon.

Port Status LED The LED for management interface 1 is located on the upper left of the MGMT
interface. The LED for management interface 2 is located on the upper right of the MGMT interface.

Proprietary and Confidential

Enable Second MNG port via Splitter

CH1
CH2

CH2 used for the same MNG IP address


Proprietary and Confidential

10

Page 107

Enable Second MNG port via Splitter

Proprietary and Confidential

11

Web Management

12

Page 108

First Web login


Default IP address is 192.168.1.1 /24

DefaultUsername/passwordisadmin/admin
Proprietary and Confidential

13

Main View
Finding topic

Picture of
managed
element

Menu

Proprietary and Confidential

14

Page 109

Platform / Management / Unit Parameters

Proprietary and Confidential

15

Platform / Management / NTP Configuration

Proprietary and Confidential

16

Page 110

Platform / Management / Time Services

Proprietary and Confidential

17

Platform / Management / Interface Manager

Default status is

Managing of all ports

! DOWN !

Proprietary and Confidential

18

Page 111

Platform / Management / Inventory

Serial Number
important for
activation key
generating

Proprietary and Confidential

19

Platform / Management / Unit Info

Create Unit Information file, see


configuration in Backup chapter
Proprietary and Confidential

20

Page 112

Platform / Management / Reset

Provide software reboot


Proprietary and Confidential

21

Platform / Management / Set to Factory Default

Clear configuration database


Proprietary and Confidential

22

Page 113

IP address settings

Proprietary and Confidential

23

SNMP Parameters

Setting for NMS system

Proprietary and Confidential

24

Page 114

Trap Managers

Up to 4 Trap Managers

Proprietary and Confidential

25

V3 User

Setting for SNMP v3

Proprietary and Confidential

26

Page 115

Thank You

Page 116

Radio Link Parameters

Ceragon Training Services


July 2015, version 4

Agenda
MRMC
TX & RX Frequencies
Link ID
RSL
MSE
Current ACM Profile

Proprietary and Confidential

Page 117

High and Low frequency station


Tx(f1)=11500 MHz

Rx(f1)=11500 MHz

Full duplex

Local site
High station

Remote site
Low station
Tx(f1)=11000 MHz

Rx(f1)=11000 MHz

High station means: Tx(f1) >Rx(f1)


Low station means: Tx(f1) < Rx(f1)

Proprietary and Confidential

Radio Link Parameters


TSL

IDU

ODU

))

RSL

ODU

IDU

To Establish a radio link, we need configure following parameters:


1. MRMC Modem scripts (ACM or fixed capacity, channel & modulation)
2. TX / RX frequencies set on every radio
3. Link ID must be the same on both ends
4. Max. TSL Max. allowed Transmission Signal [dBm]
5. Unmute Transceiver Transceiver is by default muted (is not transmitting)
------------------------------------------------------------------------------------------------------To verify a radio link, we need control following parameters:
1. RSL Received Signal Level [dBm] nominal input level is required
2. MSE- Mean Square Error [dB]
3. Current ACM profile

Proprietary and Confidential

Page 118

MRMC Multi Rate Multi Coding Profiles


RFUC

RFUCPremium

QPSK

Modulation

Profile 0

Profile 0

8QAM

Profile 1

Profile 1

16QAM

Profile 2

Profile 2

32QAM

Profile 3

Profile 3

64QAM

Profile 4

Profile 4

128QAM

Profile 5

Profile 5

256QAM(strongFEC)

Profile 6

N/A

256QAM(weakFEC)

Profile 7

Profile 6

512QAM

N/A

Profile 7

1024QAM (StrongFEC)

N/A

Profile 8

1024QAM (LightFEC)

N/A

Profile9

Proprietary and Confidential

MRMC Scripts 1st steep

ChangingscriptautomaticallyresetsmodeminsideIP20G
Proprietary and Confidential

Page 119

Radio Parameters settings

2nd step

4th step
5th step
3th step
Proprietary and Confidential

LINK ID Antenna Alignment Process


To avoid pointing the antenna to a wrong direction (when both links share the same
frequency), LINK ID can be used to alert when such action is take.
# 101
# 101

# 102
# 101
Link ID Mismatch

Proprietary and Confidential

Page 120

Link ID
Mismatch

LINK ID Antenna Alignment Process


Both IDUs of the same link must use the same Link ID
Otherwise, Link ID Mismatch alarm will appear in Current Alarms Window
# 101
# 101

# 102
# 101
Link ID Mismatch

Proprietary and Confidential

Questions?

Proprietary and Confidential

10

Page 121

Link ID
Mismatch

Radio Link Setup Exercise

Proprietary and Confidential

11

Thank You

Page 122

ACM Adaptive Coding and Modulation


MSE Mean Square Error

Ceragon Training Services


July 2015, version 4

Agenda

Adaptive Coding and Modulation


Using MSE with ACM
What is MSE?
Link Commissioning with MSE
Triggering ACM with MSE

Proprietary and Confidential

Page 123

Adaptive Coding and Modulation (ACM)

In ACM mode, the radio will select the highest possible link capacity based on received signal quality.

When the signal quality is degraded due to link fading or interference, the radio will change to a more robust
modulation and link capacity is consequently reduced.

When signal quality improves, the modulation is automatically increased and link capacity is restored to the original
setting. The capacity changes are hitless (no bit errors introduced).

During the period of reduced capacity, the traffic is prioritized based on Ethernet QoS - and TDM priority - settings.

In case of congestion the Ethernet or TDM traffic with lowest priority is dropped. TDM capacity per modulation

4QAM

8QAM
16QAM

32QAM

64QAM

128QAM

256QAM

512QAM

1024QAM
SFEC

1024QAM
LFEC

2048QACM

Low Priority
Traffic

High Priority
Traffic

state is configurable as part of the TDM priority setting.

Proprietary and Confidential

Hitless and Errorless switching

Proprietary and Confidential

Page 124

Using MSE with ACM

MSE - Definition
MSE is used to quantify the difference between an estimated
(expected) value and the true value of the quantity being
estimated
MSE measures the average of the squared errors:
MSE is an aggregated error by which the expected value differs
from the quantity to be estimated.
The difference occurs because of randomness or because the
receiver does not account for information that could produce a
more accurate estimated RSL

Proprietary and Confidential

Page 125

To simplify.

Imagine a production line where a machine needs to insert


one part into the other
Both devices must perfectly match
Let us assume the width has to be 10mm wide
We took a few of parts and measured them to see how
many can fit in.

Proprietary and Confidential

The Errors Histogram


(Gaussian probability distribution function)

Quantity

Expected value

width
6mm

7mm

10mm

12mm

16mm

To evaluate how accurate our machine is, we need to know how many
parts differ from the expected value
9 parts were perfectly OK
Proprietary and Confidential

Page 126

The difference from Expected value


Quantity

Error = 0 mm

Error = + 2 mm
Error = - 3 mm
Error = + 6 mm

Error = - 4 mm

width
6mm

7mm

10mm 12mm

16mm

To evaluate the inaccuracy (how sever the situation is) we


measure how much the errors differ from expected value
Proprietary and Confidential

Giving bigger differences more weight than smaller


differences
Quantity

Error = 0 mm

+ 2 mm = 4
-3 mm = 9
+ 6 mm = 36

- 4 mm = 16

width
6mm 7mm 10mm 12mm

16mm

We convert all errors to absolute values and then we square them


The squared values give bigger differences more weight than smaller differences,
resulting in a more powerful statistics tool:
16cm parts are 36 units away than 2cm parts which are only 4 units away
Proprietary and Confidential

10

Page 127

Calculating MSE
Error = 0 mm

Quantity

+ 2 mm = 4
-3 mm = 9
- 4 mm = 16

+ 6 mm = 36
width

To evaluate the total errors, we sum all the squared errors and take the average:
16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13
The bigger the errors (differences) >> the bigger MSE becomes

Proprietary and Confidential

11

Calculating MSE
MSE determines how narrow / wide the Bell is
Quantity

width
10mm
When MSE is very small the Bell shaped histogram is closer to perfect
condition (straight line): errors = ~ 0
Proprietary and Confidential

12

Page 128

MSE in digital modulation (Radios)


Let us use QPSK (4QAM)
as an example:

Q
01

00

QPSK = 2 bits per symbol


2 possible states for I signal
2 possible states for Q signal

11

= 4 possible states for the


combined signal
The graph shows the expected
values (constellation) of the
received signal (RSL)

10

Proprietary and Confidential

13

MSE in digital modulation (Radios)


The black dots represent the
expected values (constellation)
of the received signal (RSL)

Q
01

00
The blue dots represent the
actual RSL

11

10

As indicated in the previous


example, we can say that the
bigger the errors are the
harder it becomes for the
receiver to detect & recover the
transmitted signal

Proprietary and Confidential

14

Page 129

MSE in digital modulation (Radios)

Q
01

00

MSE would be the average


errors of e1 + e2 + e3 + e4.

e1

e2

I
e4

When MSE is very small the


actual signal is very close to
the expected signal

e3

11

10

Proprietary and Confidential

15

MSE in digital modulation (Radios)

Q
01

00

When MSE is too big, the


actual signal (amplitude &
phase) is too far from the
expected signal

e1

e2

I
e4

11

e3

10

Proprietary and Confidential

16

Page 130

Commissioning with MSE in EMS

When you commission your


radio link, make sure your MSE
is small
Actual values may be read
-39dB to -41dB
Bigger values will result in loss
of signal

Proprietary and Confidential

17

MSE and ACM


When the errors is too big, we need
a stronger error correction
mechanism (FEC)
Therefore, we reduce the number
of bits per symbol allocated for data
and re-assign the extra bits for
correction instead
For example
256QAM has great capacity but
poor immune to noise
64QAM has less capacity but much
better immune for noise
ACM Adaptive Code Modulation
Proprietary and Confidential

18

Page 131

Triggering ACM with MSE


When ACM is enabled, MSE values are analyzed on each side of the link
When MSE degrades or improves, the system applies the required
modulation per radio to maintain service
MSE Down-Threshold

MSE Up-Threshold

8PSK

-16

-19

16QAM

-17

-23

32QAM

-21

-26

64QAM

-24

-29

128QAM

-27

-32

256QAM

-30

-34

512QAM

-32

-37

1024 QAM SFEC

-35

-38

1024 QAM WFEC

-36

-41

10

2048QAM

-39

Profile

Mod

QPSK

-18

Applicable for both 28/56MHz

The values are typical and subject to change in relation to the frequency and RFU
type. For more details please contact your Ceragon representative
Proprietary and Confidential

19

ACM & MSE: An example


It is easier to observe the hysteresis of changing the ACM profile with
respect to measured MSE.
As you can see, the radio remains @ profile 8 till MSE improves to -38dB:

ACM
Profile

Downgrade
Downgrade

-41
-38
-37
-34

Profile 10

Profile 9

2048 QAM

-39

1024 QAM

Profile 8
1024 QAM

-36

Profile 7
512 QAM

-35

Profile 6
256 QAM

-32

Profile 5
128 QAM

-30

Profile 4
64 QAM

-27

Proprietary and Confidential

20

Page 132

-24

Profile 3
32 QAM

MSE

-21

ACM & MSE: An Example


When RF signal degrades and MSE passes the upgrade point (MSE @ red point), ACM will
switch back FASTER to a higher profile (closer to an upgrade point) when MSE improves.
When RF signal degrades and MSE does not pass the upgrade point (green point) ACM
waits till MSE improves to the point of next available upgrade point (takes longer time to
switch back to the higher profile).

ACM
Profile

41

Profile10

38

Profile9

Profile8

393635
Proprietary and Confidential

21

Thank You

Page 133

MSE

Page 134

Automatic Transmit Power Control - ATPC

November 2014, ver 3

Agenda
Why ATPC?
How does ATPC works?
ATPC Vs. MTPC
ATPC Configuration

Proprietary and Confidential

Page 135

ATPC Automatic Transmit Power Control


The quality of radio communication between low Power devices varies
significantly with time and environment.
This phenomenon indicates that static transmission power, transmission range,
and link quality, might not be effective in the physical world.
Static transmission set to max. may reduce lifetime of Transmitter
Side-lobes may affect nearby Receivers (image)
Main Lobe
Side Lobe

Proprietary and Confidential

ATPC Automatic Transmit Power Control


1. Enable ATPC on both sites
2. Set Input reference level (min. possible RSL to maintain the radio link)
3. ATPC on both ends establish a Feedback Channel through the radio link (1byte)
4. Transmitters will reduce Output power to the min. possible level
5. Power reduction stops when RSL in remote receiver reaches Ref. input level
6. ATPC is strongly recommended with XPIC configuration

TSL Adjustments

ATPC
module

Monitored RSL

Radio
Transceiver

Radio

Radio
Receiver

Radio
Receiver

Feedback

Signal
Quality
Check

Site A

Proprietary and Confidential

Page 136

Ref. RSL

RSL
required
change

Site B

ATPC Example when ATPC is OFF

Site A

FSL= -60 dB

Site B

MTPC

MTPC

TSL A = 30dBm
RSL A = ?

TSL B = 30dBm
RSL B = ?

RSL A = -30dBm (TSL B + FSL)

RSL B = -30dBm (TSL A + FSL)

Proprietary and Confidential

ATPC Example when ATPC is ON (One site ATPC, second site MTPC)

Site A

FSL= -60 dB

Site B

ATPC
IRLB (Input Ref. level on Site B) = -50dBm

MTPC

TSL A = ?
RSL A = ?

TSL B = 30dBm
RSL B =?

TSL A = 10dBm (IRLB-FSL)

RSL B = -50dBm (TSL A + FSL)

RSL A = -30dBm (TSL B + FSL)


You want -50dBm on Site B, so what is TXA in Site A?
Proprietary and Confidential

Page 137

ATPC Example when ATPC is ON (ATPC on both sites)

Site A

FSL= -60 dB

Site B

ATPC
IRLB (Input Ref. level on Site B) = -50dBm

ATPC
IRLA (Input Ref. level on Site A) = -50dBm

TSL A = ?
RSL A = ?

TSL B = ?
RSL B = ?

TSL A = 10dBm (IRLB - FSL)

TSL B = 10dBm (IRLA-FSL)

RSL A = -50dBm (TSLB + FSL)

RSL B = -50dBm (TSL A + FSL)

Proprietary and Confidential

ATPC Example when ATPC is ON (ATPC on both sites), ATPC range


Max TSL is 30dBm
ATPC range is 20dB

Site A

Max TSL is 30dBm


ATPC range is 20dB
FSL= -60 dB

Site B

ATPC
IRLB (Input Ref. level on Site B) = -60dBm

ATPC
IRLA (Input Ref. level on Site A) = -50dBm

TSL A = ?
RSL A = ?

TSL B = ?
RSL B = ?

TSL A = 10dBm (IRLB-FSL)

TSL B = 10dBm (IRLA - FSL)

RSL A = -50dBm (TSL B + FSL)

RSL B = -50dBm (TSL A + FSL)

RSL B is -50dBm because typical ATPC range for TX level is 20dB (depend on RFU type)!!!
It means that TSL A cant be 0dBm because possible min is 10dBm (Max is 30dBm)
Proprietary and Confidential

Page 138

ATPC Configuration

Proprietary and Confidential

Thank You

10

Page 139

Page 140

IP-20G Activation Key

July 2015
Version 5

Agenda
Activation Key in General
Demo License
CeraOS License concept
IP-20 Activation Key Scheme
Licensed Features

Proprietary and Confidential

Page 141

Activation Key

IP-20N offers a pay as-you-grow licensing concept in which


future capacity growth and additional functionality can be
enabled with Activation key.
For purposes of Activation Key, each IP-20N chassis is
considered a distinct device, regardless of which cards are
included in the chassis. Each device contains a single
Activation key.
Licenses are divided into two categories:
Per Carrier The license is per carrier
Per Device The license is per device, regardless of the
number of carriers supported by the device.

Ceragon provides a web-based License Management


System (LMS). The LMS enables authorized users to
generate Activation keys, which are generated per IDU serial
number.

A 1+1 HSB configuration requires the same set of licenses for


both the active and the protected interfaces.

Proprietary and Confidential

License Management System

Proprietary and Confidential

Page 142

Activation key generating

Serial Number
important for
activation key
generating

Proprietary and Confidential

DEMO License
A demo license is available that enables all features for 60 days.
The demo license expires 60 days from the time it was activated,
and the most recent valid license goes into effect.

The 60-day period is only counted when the system is powered up.
10 days before the demo license expires, an alarm is raised
indicating to the user that the demo license is about to expire.

Proprietary and Confidential

Page 143

License violation
License violation yellow color screen has been implemented from sw. T7.9

Proprietary and Confidential

IP-20 Pricing Concept (Value Structure)


Hardware, Software & Licensed Features

CeraOS (Software)
LicensedPremiumFunctionality

LicensedScalability

Radiocapacity
2nd modem/core
activation(IP20G/C)
AdditionalGEuser
interfaces
AdditionalCETNode
services/EVCs(L2)

Advancedradioconfigurations
AdvancedQoS
EthernetOAM
TDMPWservices
Synchronization
NetworkResiliency
AdvancedSecurity

LicensedMode CETNode

SmartPipeservices(L1)
10Mradiocapacity
1xGEuserinterface
NativeTDMservices

CETservices/EVCs(L2)
2xGEuserinterfaces

Baseline
functionality

Hardware

ProductModels (e.g.IP20N,IP20G,IP20C,IP20LH)
Assemblyoptions (e.g.single/dualmodeminIP20G)
Addonmodules (e.g.RMCinIP20N)
Proprietary and Confidential

Page 144

IP-20 Activation Key Scheme


Per Carrier

Per Node Premium Functionality

Scalability

Radio capacity

Enhanced Packet Buffer


Frame Cut Through
H-QoS

Advanced radio configurations

ACM
XPIC
Multi-Carrier ABC
MIMO
Header De-duplication

Sync-Unit
IEEE-1588 TC
IEEE-1588 OC
IEEE-1588 BC

Redundancy/Resiliency group
Network Resiliency
Main Card Redundancy - HA

CET-Node mode/scalability

Edge (8 services/EVCs)
Agg-Lvl-1 (64 services/EVCs)
Agg-Lvl-2 (1024 services/EVCs)

Sync group

Per Node scalability

QoS group

Ethernet OAM group


Eth-OAM FM
ETH-OAM PM

General node scalability


2nd modem activation (IP-20G only)
2nd core activation (IP-20C only)
GE user interfaces

TDM group

Security

TDM PW
Secure management

Proprietary and Confidential

Licensed Features
LicenseName

RadioCapacityLicense

IP20SLACM

IP20SLMCABC

IP20SLHeaderDeDuplication

IP20SLXPIC

Description
Enablesyoutoincreaseyoursystemsradiocapacityin
gradualstepsbyupgradingyourcapacitylicense.
Withoutacapacitylicense,eachcarrierhasacapacity
of10Mbps.Licensedcapacityisavailablefrom50
Mbpsto500Mbps.EachRMCcardcanbelicensedfor
adifferentcapacity.
EnablestheuseofAdaptiveCodingandModulation
(ACM)scripts.Aseparatelicenseisrequiredpercore.

EnablesMultiCarrier ABC.

EnablestheuseofHeaderDeDuplication,whichcan
beconfiguredtooperateatL2throughL4.

EnablestheuseofCrossPolarizationInterface
Canceller(XPIC).Aseparatelicenseisrequiredforeach
coreintheXPICpair.

Proprietary and Confidential

10

Page 145

Licensed Features
LicenseName

IP20SLGEPort

IP20SLMainCardRedundancy

Description
Enablesthe useofaTCC/LICEthernettrafficportinGE
mode(10/100/1000baseTor1000baseX).Anactivation
keyisrequiredforeachEthernettrafficportthatisused
onthedevice.Anactivationkeycanbeinstalled
multipletimeswithdynamicallocationinsidetheunit
toenablemultipleGEports.
Note:AllEthernettrafficportsareenabledinFEmode
(10/100baseT)bydefaultwithoutrequiringany
activationkey.

EnablestheuseofasecondTCCina2RUchassisfor
HighAvailability.

Proprietary and Confidential

11

Licensed Features
LicenseName

EdgeCETNode

Description
EnablesCarrierEthernet Transport(CET)andanumber
ofEthernetservices(EVCs),dependingonthetypeof
CETNodelicense:
EdgeCETNode Upto8EVCs.
AggregationLevel1CET Node Upto64EVCs.
AggregationLevel2CETNode Upto1024EVCs.
ACETNodelicensealsoenablesthefollowing:
Networkresiliency(MSTP/RSTP)forallservices.
Full QoSfor all services including basic queue buffer
management (fixed queues buffer size limit,tail
drop only)andeight queues perport,noHQoS.
LAGSupport

P20SLNetworkResiliency

Enablesthe followingprotocolsforimprovingnetwork
resiliency:
G.8032
TDM(PW)services1:1/1+1pathprotection
Proprietary and Confidential

12

Page 146

Licensed Features
LicenseName
IP20SLHQoSHQoS

IP20SLEnhPacketBuffer

IP20SLSyncUnit

P20SLFrameCutThrough

IP20SLTDMPW

Description
EnablesHQoS.Thislicenseisrequiredtoaddservice
bundleswithdedicatedqueuestointerfaces.Without
thislicense,onlythedefaulteightqueuesperportare
supported.(Planned forfuturerelease)
Enables configurable (nondefault)queue buffer size
limitfor Green andYellow frames.Also enables WRED.
The defaultqueue buffer size limitis 1Mbitsfor Green
frames and0.5Mbits for Yellow frames.
EnablestheG.8262synchronizationunit.Thislicenseis
requiredinordertoprovideendtoendsynchronization
distributiononthephysicallayer.Thislicenseisalso
requiredtouseSynchronousEthernet(SyncE).
Enables Frame CutThrough.
EnablesTDMpseudowire servicesonunitswithTDM
interfaces.Withoutthisactivationkey,onlynativeTDM
servicesaresupported.

Proprietary and Confidential

13

Licensed Features
LicenseName
P20SLSecureManagement
IP20SLEthOAMFM

IP20SLEthOAMPM

Description
Enablessecuremanagementprotocols(SSH,HTTPS,
SFTP,SNMPv3,andRADIUS).
EnablesConnectivityFaultManagement(FM)per
Y.1731/802.1agand802.3ah(CETmodeonly).
EnablesperformancemonitoringpursuanttoY.1731
(CETmodeonly).

Proprietary and Confidential

14

Page 147

Activation Key Configuration

Sanction state
If an Activation Key Violation alarm has occurred, and the 48-hour activation key violation grace period
has expired without the system having been brought into conformance with the activation-key-enabled
capacity and feature set, Yes appears in this field to indicate that the system is in an Activation Key
Violation sanction state.
All other alarms are hidden until the capacity and features in use are brought within the activation-keyenabled capacity and feature set
Proprietary and Confidential

15

Activation Key Overview

Proprietary and Confidential

16

Page 148

Thank You

Page 149

Service Model in IP-20

November 2014
Version 5

Agenda
IP-20 Ethernet Capabilities
Service Model in General

What is a Service ?
What is a Service point?

Services in IP-20 Family & Services attributes


1.
2.
3.

Point to Point Service


Multipoint Service
Management Service

Service Point in IP-20 Family


1.
2.
3.
4.

Pipe Service Point


Service Access Point (SAP)
Service Network Point (SNP)
Management Service Point (MNG)

Service Points classification and attributes


Examples for Services and Service points
Logical VS. Physical Port
Proprietary and Confidential

Page 151

IP-20s Ethernet Capabilities


Up to 1024 services (1025 reserved for Management)
Up to 32 service points per service (30 SPs for MNG service)
All service types:

Multipoint (E-LAN)
Point-to-Point (E-Line)
Point-to-Multipoint (E-Tree)
Smart Pipe
Management
128K MAC learning table per service - ability to limit MAC learning per
service
Split horizon between service points
Flexible transport and encapsulation via 802.1q, 802.1ad (Q-in-Q), and
MPLS-TP, with tag manipulation possible at egress
High precision, flexible frame synchronization solution combining SyncE
and 1588v2
Hierarchical QoS with 8K service level queues, deep buffering, hierarchical
scheduling via WFQ and Strict priority, and shaping at each level

Proprietary and Confidential

IP-20s Ethernet Capabilities


Hierarchical two-rate three-Color policers

Port based Unicast, Multicast, Broadcast, Ethertype


Service-based
CoS-based
Up to four link aggregation groups (LAG)
Hashing based on L2, L3, MPLS, and L4
Enhanced <50msec network level resiliency (G.8032) for ring/mesh support
IP-20 is fully MEF-9 and MEF-14 certified for all Carrier Ethernet services.

Proprietary and Confidential

Page 152

Service model in General

What is a Service?
A virtual bridge, connecting two or more interfaces
Bridge is a device that separates two or more network segments
within one logical network

Interfaces are usually referred to physical ports but can also be logical
ports

Proprietary and Confidential

Page 153

Service Model

Service#1

Service#2

Proprietary and Confidential

Service points
Service points are logical entities attached to the interfaces that make up the
service. Service points define the movement of frames through the service.
Without service points, a service is simply a virtual bridge with no ingress or
egress interfaces.

Rails are second service point


towards the bridge

The Route is your first service point


towards the bridge

Proprietary and Confidential

Page 154

What is a service point?

SP

Service#1

SP

3
SP

SP

4
SP

Service#2

SP

Proprietary and Confidential

Services in IP-20 Family

10

Page 155

IP-20 Services
IP20 supports the following services types:
1. Point-to-Point Service (P2P)
2. Multipoint Service (MP)
3. Management Service (MNG)
4. Point-to-Multipoint Service (E-Tree)

E-Tree services are planned for future release.

Proprietary and Confidential

11

Point to Point Service (P2P)


Point-to-point services are used to provide connectivity between two
interfaces of the network element.
When traffic ingresses via one side of the service, it is immediately directed
to the other side according to ingress and egress tunneling rules.
This type of service contains exactly two service points and does not require
MAC address-based learning or forwarding

PIPE

PIPE
SAP

SAP

Proprietary and Confidential

12

Page 156

Multipoint Service (MP)

Multipoint services are used to provide connectivity between two or more service points.
When traffic ingresses via one service point, it is directed to one of the service points in the
service, other than the ingress service point, according to ingress and egress tunneling rules, and
based on the learning and forwarding mechanism.
If the destination MAC address is not known by the learning and forwarding mechanism, the
arriving frame is flooded to all the other service points in the service except the ingress service
point.

1
SAP

SNP

SAP

SNP

Proprietary and Confidential

13

Management Service (MNG)

Management port

The management service is a multipoint service that connects the two local
management ports, the network element host CPU, and the traffic ports into a single
service. The service behavior is same as the Multipoint service behavior.
The management service is pre-defined with Service ID 1025.

CPU
1
4

Traffic ports

SAP

SNP

Service ID 1025
2

Proprietary and Confidential

14

Page 157

Service Attributes

Service ID - 1 - 1024

Service Type P2P, MP, MNG

Service Admin Mode Operational, Reserved

EVC-ID - Ethernet Virtual Connection ID (End-to-end).

EVC Description

Maximum Dynamic MAC Address Learning per Service

Static MAC Address Configuration

CoS Mode & Default CoS

xSTP Instance The spanning tree instance ID (1-63)

Split Horizon Group - (Enable/Disable)

Proprietary and Confidential

15

IP-20 Service Points

16

Page 158

Service points

SAP
SNP
Pipe Service Point
Management Service Point

Proprietary and Confidential

Service Access Port SAP & Service Network Point SNP

Proprietary and Confidential

18

Page 159

Service Access Port SAP & Service Network Point SNP

Proprietary and Confidential

19

Management (MNG) Service Point


Only used for management services

Proprietary and Confidential

20

Page 160

Pipe Service Points


Pipe Service Point Used to create traffic connectivity between two
points in a port-based manner (Smart Pipe). In other words, all the
traffic from one port passes to the other port. Pipe service points are
used in Point-to-Point services

PIPE
SAP

PIPE
SAP

PIPE
SAP

Proprietary and Confidential

21

Service points classification

22

Page 161

PIPE
SAP

Service Point Interface Types


InterfaceType

Typesof Frames

AppliestoSPType

Dot1q

AsingleCVLANisclassifiedintotheservice
point

All

Stag

AsingleSVLANisclassifiedintotheservice
point

SNPandMNG

BundleC

A set of CVLANs is classified into the service


point

SAP

BundleS

AsingleSVLANandaset ofCVLANare
classifiedintotheservicepoint

SAP

AlltoOne

AllCVLANs,SVLANswithTPIDdiffthanthe
systemone anduntaggedframesthatenter
theinterface areclassifiedintotheservice
point

SAP

QinQ

AsingleSVLANandCVLANcombinationis
classifiedintotheservicepoint

SAPandMNG

Proprietary and Confidential

23

Service Points

Service

Proprietary and Confidential

24

Page 162

Service

Proprietary and Confidential

25

Service Point Types that can Co-Exist on the Same Interface


Service point Types per Service Type
Service point type

Service Type

MNG

SAP

SNP

Pipe

Management

Yes

No

No

No

Point-to-Point

No

Yes

Yes

Yes

Multipoint

No

Yes

Yes

No

Service Point Types that can Co-Exist on the Same Interface


MNG SP

SAP SP

SNP SP

Pipe SP

MNG SP

Only one MNG SP is


allowed per interface.

Yes

Yes

Yes

SAP SP

Yes

Yes

No

No

SNP SP

Yes

No

Yes

No

PIPE SP

Yes

No

No

Only one Pipe SP is


allowed per interface.

Proprietary and Confidential

26

Page 163

Service Point Types that can Co-Exist on the Same Interface

Proprietary and Confidential

27

Example of dot1q services

TheclassificationtoPtP1andPtP2isbased
ononecvlan.
PtP 1usessamecvlan astheclassification
atbothends
PtP 2usesdifferentcvlan asthe
classificationatbothends.
PtP1 andPtP2usesthetransportvlan
insidethenetwork.Theoriginal cvlan is
notsentinsidethenetwork.
CVlan
SAP3

10

SAP3

ptp 1
SAP1

CVlan
10

SAP1

20

SAP2

CVlan
SAP4

SAP2

120

ptp 2

TransportVlan

EVC

100

ptp1

200

ptp2

Proprietary and Confidential

28

Page 164

SAP
SNP

SAP4

Example of bundle services

TheclassificationtoPtP1andPtP2isbased
onseveralcvlans.
PtP1 andPtP2usesthetransportvlan
insidethenetwork.Theoriginalcvlan is
preservedandsentinsidethenetwork.

CVlan
SAP3

10,11

SAP3

ptp 1
SAP1

CVlan
10,11

SAP1

20,21

SAP2

CVlan
SAP4

SAP2

20,21

SAP4

ptp 2

TransportVlan

EVC

100

ptp1

200

ptp2

29

SAP
SNP

Proprietary and Confidential

Example of Q-in-Q services

TheclassificationtoPtP1andPtP2isbased
onapairofcvlan andsvlan.
PtP1 andPtP2usesthetransportvlan
insidethenetwork.Theoriginalcvlan and
svlan isnotsentinsidethenetwork.

SAP3

SVlan

CVlan

230

10

SAP3

ptp 1
SAP1

SAP4

SAP2

SVlan

CVlan

340

320

ptp 2

SVlan

CVlan

230

10

SAP1

240

20

SAP2

TransportVlan

EVC

100

ptp1

200

ptp2

SAP
SNP
Proprietary and Confidential

30

Page 165

SAP4

Service points Attributes

31

Service Point Attributes


As described above, traffic ingresses and egresses the service via service
points. The service point attributes are divided into two types:
Ingress Attributes Define how frames are handled upon ingress, e.g.,
policing and MAC address learning.
Egress Attributes Define how frames are handled upon egress, e.g.,
preservation of the ingress CoS value upon egress, VLAN swapping.

Proprietary and Confidential

Page 166

Service Point Attributes


General

Ingress

Egress

CVLANCoS Preservation

ServicePointID

LearningAdmin

Service PointName

AllowFlooding

CVLAN Preservation

ServicePointType

AllowBroadcast

SVLANCoS Preservation

Interface

CoS Mode

MarkingAdmin

InterfaceType

DefaultCoS

ServiceBundle ID

CVLANEncapsulation
SVLANEncapsulation

Proprietary and Confidential

33

Service Point General Attributes


General

Service Point ID number for service point inside


the same service

Service Point Name The Name for service point


if is needed
ServicePointID
Service PointName
ServicePointType
Interface
InterfaceType
CVLANEncapsulation
SVLANEncapsulation

Service Point Type- SAP, SNP, MNG, PIPE


Interface - The logical interface on which the
service point is located

Interface Type Dot1q, S-Tag, Bundle-C, BundleS, All-to-One, Q-in-Q

C-Vlan Encapsulation - The C-VLAN classified

into the service point


S-Vlan Encapsulation - The S-VLAN classified
into the service point

Proprietary and Confidential

34

Page 167

Service Point Ingress Attribute


Learning Admin - Indicates whether MAC
Ingress

LearningAdmin

address learning is enabled or disabled

Allow Flooding - Indicates whether incoming

AllowFlooding
AllowBroadcast

CoS Mode
DefaultCoS

frames with unknown MAC addresses are


forwarded to other service points via flooding
Allow Broadcast - Indicates whether frames with
a broadcast destination MAC address are allowed
to ingress the service via this service point
CoS Mode - Indicates how the service point
handles the CoS of frames that pass through the
service point.
Default CoS The service point CoS. If the CoS
Mode is set to overwrite the CoS decision made at
the interface level, this is the CoS value assigned
to frames that ingress the service point.

Proprietary and Confidential

35

Service Point Egress Attribute


C-Vlan CoS Preservation - Indicates whether the
Egress

CVLANCoS Preservation
CVLAN Preservation

SVLANCoS Preservation
MarkingAdmin
ServiceBundle ID

original C-VLAN CoS value is preserved or


restored for frames egressing from the service
point
C-Vlan Preservation - Indicates whether the
original C-VLAN ID is preserved or restored for
frames egressing from the service point
S-Vlan CoS Preservation - Indicates whether the
original S-VLAN CoS value is preserved or
restored for frames egressing from the service
point
Marking Admin - Indicates whether re-marking of
the outer VLAN (C-VLAN or S-VLAN) of tagged
frames that pass through the service point is
enabled
Service Bundle ID - This can be used to assign
one of the available service bundles from the HQoS hierarchy queues to the service point
Proprietary and Confidential

36

Page 168

Ethernet Service Points GUI


General

ServicePointID
Service PointName
ServicePointType
Interface
InterfaceType
CVLANEncapsulation
SVLANEncapsulation
Ingress

LearningAdmin
AllowFlooding
AllowBroadcast
CoS Mode
DefaultCoS
Egress

CVLANCoS Preservation
CVLAN Preservation
SVLANCoS Preservation
MarkingAdmin
ServiceBundle ID
Proprietary and Confidential

37

Logical Vs. Physical Interface

38

Page 169

Logical and physical interface

Proprietary and Confidential

39

Service Demo

40

Page 170

The Setup
IP-20N

IP-20G

IP-20C/S/E

Proprietary and Confidential

41

Creating the Service

Proprietary and Confidential

42

Page 171

Attaching Service Points

Proprietary and Confidential

43

Attaching Service Points

Proprietary and Confidential

44

Page 172

Attaching Service Points

Proprietary and Confidential

45

Questions?

Proprietary and Confidential

46

Page 173

Thank You

Page 174

Quality of Service
IP-20G

May 2015, ver5

Agenda

Standard QoS VS. H-QoS


QoS in General
QoS in IP-20C
Classification
Marker
Bandwidth Profile
Policing
Queues Manager
WRED
Scheduler
Shaper

Proprietary and Confidential

Page 175

Hierarchical QoS (H-QoS) vs. Standard QoS


Standard QoS

Differentiation between
different traffic classes (CoS)

Services within the same traffic


class are treated as a single
aggregate with no isolation

Service 1

Voice

S
V

Service 2

Streaming

S
V

Eth.
traffic

Ethernet
Radio

Data

Service 3

Limited per-service visibility


and control
H-QoS

Each service gets its own


personalized treatment

Service 1

Service 1
D

TDM-grade performance
providing per-service full
visibility and control

Service 2

Ethernet
Radio

Service 2

V
S

Service 3

Service 3
D

Proprietary and Confidential

Backhaul Sharing Fairness & Bursts Isolation


MSC/RNC/S-GW
Operator 1
Operator 1
Operator 2

Shared Backhaul

Shared Site
Shared Site

Shared Site

MSC/RNC/S-GW
Operator 2

Operator 1
Operator 2

N >> 8

Operator 1

Standard
QoS
Operator 2

SameCoS

Operator 1

HQoS

SameCoS
Operator 2

Proprietary and Confidential

Page 176

Backhaul Sharing - Fairness & Bursts Isolation


MSC/RNC/S-GW
Operator 1
Operator 1
Operator 2

Shared Backhaul

Shared Site
Shared Site

Shared Site

MSC/RNC/S-GW
Operator 2

Operator 1
Operator 2

Operator 1
7 6 5 4 3 2 1

Q1

3 2 1 7 6 5 4 3 2 1

7 6 5 4 3 2 1

Q1

7 6 5 4 3 2 1

3 2 1

Q2

3 2 1

3 2 1 7 6 5 4 3 2 1

3 2 1

Standard
QoS

Operator 2

Operator 1

7 6 5 4 3 3 2 2 1 1

Operator 2

Proprietary and Confidential

QoS in IP-20

Page 177

HQoS

How does it Work?

V.ID = 100
P-Bit = 5
IP Packet
DSCP = 0

Egress Port

Ingress Port

Ethernet frame

Proprietary and Confidential

General Overview

Scheduler
Priority

Policers

WFQ

Queues

WRED

Shapers

Service
Ingress

Egress
Proprietary and Confidential

Page 178

Egress Port

Ingress Port

Marker

Classification

Classification
3 Hierarchies

Port (aka 1H)


VLAN (aka 1.5H)
Service Point (aka 2H)
Service (aka 3H)

Port level classification

Service

VLAN P-bits
DSCP
MPLS EXP bits
Default classification

SP
VLAN
Port

Proprietary and Confidential

10

Page 179

Classification Hierarchies

Service #1

Calculated CoS =H3>H2>H1


Service H3
Port H1

SP H2

VLAN H1,5

Port

SAP
SAP

VLAN

SNP
SAP

Port level classification

Service Points classification

1.
2.
3.
4.

1. Preserve previous decision


2. Default CoS

VLAN P-bits
DSCP
MPLS EXP bits
Default classification

Service classification
1. Preserve previous decision
2. Default CoS

Proprietary and Confidential

11

CoS Classification
Calculated CoS =H3>H2>H1
Port1 H1 VLAN H1,5
Port 1

SP1 H2

VLAN

SAP

Service H3

SNP

Port level classification


1.
2.
3.
4.

VLAN P-bits
DSCP
MPLS EXP bits
Default classification

Port2 H1

1. Preserve previous decision


2. Default CoS

Service classification
1. Preserve previous decision
2. Default CoS

SP2 H2
VLAN H1,5

Port 2

Port level classification


1.
2.
3.
4.

Service Points classification

VLAN P-bits
DSCP
MPLS EXP bits
Default classification

SAP

SNP

VLAN

Service Points classification


1. Preserve previous decision
2. Default CoS

Proprietary and Confidential

12

Page 180

Classification example
Customer1

Customer2

Customer3

Customer3

Proprietary and Confidential

13

Classification 1H

1st Priority

2nd Priority

3th Priority

4th Priority

Proprietary and Confidential

14

Page 181

Classification 1.5H via CLI


VLAN CoS Override
For SP type Dot1q, QinQ, Bundle C, Bundle S

Proprietary and Confidential

15

Classification 1.5H via GUI


VLAN CoS Override for Bundle C/S SPs

Proprietary and Confidential

16

Page 182

Classification 2H
Service Point CoS Mode

Proprietary and Confidential

17

Classification 3H
Service CoS Mode

Proprietary and Confidential

18

Page 183

Policing

19

Ingress Policing
We can configure ingress policing based on
two rates three colors token bucket (MEF 10.2 TrTCM).

The token buckets order shall be as follow:

CoS 3

Proprietary and Confidential

20

Page 184

Frame Type

CoS 2

Ethertype

CoS 1

Service-Point

Service-Point+CoS - service policing


Service-Point - service policing
Ethertype - port policing
Frame type (unicast, multicast, broadcast) port policing.
There are 256 profiles
There are 1024 policers.

Meaning of Colors

Dropped
NonGuaranteed
Guaranteed

Proprietary and Confidential

21

Bandwidth Profile (BWP)


Two Rate Three Color Marking Policer Rates & Bursts

Committed Information Rate

Excess Information Rate

The rate at which tokens fill the 1st bucket

The rate at which tokens fill the 2nd bucket

Committed Burst Size

Excess Burst Size

The size of the 1st bucket

The size of the 2nd bucket

CIR & CBS defines the assured bandwidth and burst


EIR & EBS improves the networks Goodput (best effort)
Proprietary and Confidential

22

Page 185

Bandwidth Profile (BWP)


Two Rate Three Color Marking Policer Modes Of Operation

Color Modes (CM)


Color Blind Frames are uncolored and are
marked following policer operation
Color Aware Frames were marked before.
Yellow frames jump to 2nd bucket

Coupling Flag (CF)


CF = 0 the 2nd bucket is filled based on
EIR value only
CF = 1 2nd bucket is filled based on EIR
and excess tokens not used in 1st bucket

Most Operators use CM & CF default values (CM = blind, CF = 0)


Proprietary and Confidential

23

Defining Policer Profile

128000bps

Proprietary and Confidential

24

Page 186

Assign a Policer to a Port

Proprietary and Confidential

25

Assign a Policer to an SP

Proprietary and Confidential

26

Page 187

Queues Manager & WRED & Marker

27

Queues Manager

Service #1
CoS0

Queue 0

SS
Queue 1

CoS1
CoS2

Service

SS
Queue 2

SS
Queue 3

SAP
SAP

SNP
SAP

CoS3

SS
Queue 4

SS

CoS4
Queue 5

SS

CoS5
Queue 6

SS

CoS6
CoS7

Queue 7

SS

SS Single Shaper
Proprietary and Confidential

28

Page 188

WRED
Weighted Random Early Detect
Sliding window example

MaximumphysicalBWoftheline

Proprietary and Confidential

29

WRED
IP-20 can hold 32 WRED profiles.
For each queue (in L4)
we can attach one of the WRED profiles.

Proprietary and Confidential

30

Page 189

Creating WRED Profile

Proprietary and Confidential

31

Queues Manager with WRED

Service #1
CoS0

Queue 0

WRED

SS
Queue 1

CoS1
CoS2

Service

SS

WRED
Queue 2

WRED

SS
Queue 3

SAP
SAP

SNP
SAP

CoS3

WRED

CoS4

WRED

CoS5

WRED

CoS6

WRED

SS
Queue 4

SS
Queue 5

SS
Queue 6

CoS7

SS

Queue 7

WRED

SS

SS Single Shaper
Proprietary and Confidential

32

Page 190

Creating WRED Profile

Proprietary and Confidential

33

Marking

34

Page 191

Painting a Frame

CFI=0,itisanEthernetFrame,itmeansgreencolor
CFI=1,itisanCanonicalformat,itmeansyellowcolor
Proprietary and Confidential

35

Marker

CoS Preservation

Marking

Result
IP20

Enable

DontCare

Calculated
Cos=3/G

IP20
Disable

Enable

Calculated
Cos=3/Y

Proprietary and Confidential

36

Page 192

MARKER

Service #1
CoS0
Service

SAP
SAP

SNP
SAP

Queue 0

WRED

MARKING

SS
Queue 1

CoS1
CoS2

WRED

CoS3

WRED

SS

MARKING
Queue 2

WRED

MARKING

SS
Queue 3

SS

MARKING
Queue 4

CoS4

WRED

MARKING

SS
Queue 5

CoS5

WRED

MARKING

SS
Queue 6

CoS6

WRED

MARKING

SS
Queue 7

CoS7

WRED

MARKING

SS

SS Single Shaper
Proprietary and Confidential

38

Scheduling and Shaping

39

Page 193

Traffic Manager Example

10

Service#1
2

11

12

Service#2

13

14
Proprietary and Confidential

40

PortLevel

CoS3 WRED

SS

CoS4 WRED

SS
SS

CoS6 WRED

SS

CoS7 WRED

SS

SP+
WFQ

SS

CoS1 WRED

SS

CoS2 WRED

SS

CoS3 WRED

SS

CoS4 WRED

SS

CoS5 WRED

SS

CoS6 WRED

SS

CoS7 WRED

SS

CoS QueueLevel(Withinaservice)

WFQ

Service#n

CoS0 WRED

WFQ

SP

CoS5 WRED

SP+
WFQ

ServiceBundleLevel
Proprietary and Confidential

41

Page 194

SingleShaper

SS

WFQ

SS

CoS2 WRED

WFQ

SS

CoS1 WRED

DualShaper

Service#1

ServiceLevel

DualShaper

CoS0 WRED

MARKING

Hierarchical QoS
SS Single Shaper
SP Strict Priority
WFQ Weighted Fair Queuing

1st priority
2nd priority
3rd priority
4th priority

PortLevel

MARKING

Hierarchical QoS now


SS Single Shaper
SP Strict Priority
WFQ Weighted Fair Queuing
CoS0 WRED

PortLevel

SS

CoS3 WRED

SS

CoS4 WRED

SS
SS

CoS6 WRED

SS

CoS7 WRED

SS

SS

CoS2 WRED

SS

CoS3 WRED

SS

CoS4 WRED

SS

CoS5 WRED

SS

CoS6 WRED

SS

CoS7 WRED

SS

CoS QueueLevel(Withinaservice)

1st priority
2nd priority
3rd priority
4th priority

WFQ

SS

CoS1 WRED

DualShaper

Service#n

CoS0 WRED

WFQ

SP

CoS5 WRED

WFQ

SS

CoS2 WRED

WFQ

SS

CoS1 WRED

DualShaper

Service#1

ServiceLevel

PortLevel

ServiceBundleLevel
Proprietary and Confidential

42

SP+WFQ Scheduling Example for one Service Bundle


ServiceLevelPortLevel

CoSLevel
Queue 0

CoS0

WRED

1st priority
2nd priority
3rd priority
4th priority

Queue 1

CoS1 WRED

SP+WFQ

Queue 2

CoS2 WRED

SP
Queue 4

CoS4 WRED

WFQ
Queue 5

CoS5 WRED
Queue 6

CoS6

WRED

Mixed scheduling

Queue 7

4 strict priorities
WFQ within same priority
Shaping per port/queue

CoS7 WRED

8 Queues

Proprietary and Confidential

43

Page 195

SingleShaper

WFQ
Queue 3

CoS3 WRED

Scheduler Priority and WFQ


User shall can create up to 8 profiles of
priority/weight.
ClassOf
Service

Priority
when
green

Priority
when
yellow

Weight
when
green

Weight
when
yellow

ServiceName

CoS 7

20

20

Management(synch,PDUetc...)

CoS 6

20

20

RealTime1(Voicesmallbuffer)

CoS 5

20

20

RealTime2(Videolargebuffer)

CoS 4

20

20

Data Service1

CoS 3

20

20

DataService2

CoS 2

20

20

DataService3

CoS 1

20

20

DataService4

CoS 0

20

20

BestEffort

The profile is attached on logical port. All the service bundle inherit
this configuration.

Proprietary and Confidential

44

Creating a Shaper

PIR=CIR+EIR
Proprietary and Confidential

45

Page 196

Assign a Shaper

Proprietary and Confidential

46

Creating Scheduler Priority Profile

Proprietary and Confidential

47

Page 197

Creating WFQ Profile

Proprietary and Confidential

48

Assign a Scheduler

Proprietary and Confidential

49

Page 198

H-QoS Summary

MARKING

ServiceBundle#1

ServiceBundle#32

Policerlevel1

Policerlevel3

Policerlevel2

Proprietary and Confidential

50

Standard QoS vs H-QoS - Summary


Standard QoS

Hierarchical QoS

Number of transmission
queues per port

Capability

256

Number of service bundles

1 (always service bundle id equal 1)

32

WRED

Per queue (two curves for green traffic and


for yellow traffic via the queue)

Per queue (two curves for green traffic and


for yellow traffic via the queue)

Shaping at queue level

Single leaky bucket

Single leaky bucket

Shaping at service bundle


level

Dual leaky bucket

Dual leaky bucket

Shaping at port level

Single leaky bucket (this level is not relevant


since it is recommended to use service bundle
level with dual leaky bucket)

Single leaky bucket

Transmission queues priority

Per queue priority (4 priorities).

Per queue priority (4 priorities). All service


bundles for a specific port inherit the 8queues priority settings.

Weighted fair Queue (WFQ)

Queue level (between queues)

Queue level (between queues)


Service Bundle level (between service
bundles)

Marker

Supported

Supported

Statistics

Queue level (8 queues)


Service bundle level (1 service bundle)
Port level

Queue level (256 queues)


Service bundle level (32 service bundles)
Port level

WFQ inside service bundle level is planned for future release.

Proprietary and Confidential

51

Page 199

Thank You

Page 200

IP- 20G XPIC Configuration

July 2015
Version 2

Agenda

System Spectrum Utilization


ACAP
ACCP
CCDP

Co-channel System
IP-20G & XPIC
XPIC Recovery mechanism
XPIC Settings

Proprietary and Confidential

Page 201

System Spectrum Utilization


BW

5
4

7
6

9
8

ACAP (Adjacent Channel Alternating Pol.)


10

BW

10

ACCP (Adjacent Channel Common Pol.)

BW

V
H

10

CCDP (Co-Channel Dual Polarisation)

Proprietary and Confidential

CCDP frequency plan

V
H

Vertical and Horizontal Polarization are using the same frequency

Proprietary and Confidential

Page 202

1
2

Co-channel Systems

The XPIC improvement factor is typically 26 dB.

Two channels are using the same frequency but different polarization

RMC-B and XPIC script is required

The XPIC mechanism utilizes the received signals from the V and H modems to extract the V and H signals
and cancel the cross polarization interference due to physical signal leakage between V and H polarizations.

The H+v signal is the combination of the desired signal H (horizontal) and the interfering signal V (in lower
case, to denote that it is the interfering signal). The same happens with the vertical (V) signal reception=
V+h. The XPIC mechanism uses the received signals from both feeds and, manipulates them to produce the
desired data

IP-20Gs XPIC reaches a BER of 10e-6 at a co-channel sensitivity of 5 dB. The improvement factor in an
XPIC system is defined as the SNR@threshold of 10e-6, with or without the XPIC mechanism.
Proprietary and Confidential

Conditions for XPIC


XPIC is enabled by selecting an XPIC script for each carrier.
In order for XPIC to be operational, all the following conditions must be met:
Communications with the RFU must be established by both radio
interfaces.
RFU type must be the same for both carriers.
The frequency of both radios must be equal.
1+1 HSB protection must not be enabled.
The same script must be loaded for both carriers.
The script must support XPIC

Proprietary and Confidential

Page 203

RSL Vs. Threshold for system without CCDP


RSL (dBm)

BER>10-6

-20
-30

Nominal Input Level

Fading Margin = 43dB

-73

Threshold level BER=10-6

BER>10-6

S/N=23dB for 128QAM (37 MHz)


Receiver amplifies thermal noise

-96

K Boltzmann constant
T Temperature in Kelvin
B Bandwidth

-99

Thermal Noise=10*log(k*T*B*1000)

Time (s)
Proprietary and Confidential

RSL Vs. Threshold for CCDP system without XPIC


RSL (dBm)

BER>10-6

-20
-30

Nominal Input Level H

Fading Margin = 12dB


Threshold level because of interference without XPIC
BER=10-6

-42
BER>10-6

S/N=23dB for 128QAM (37 MHz)

-65
-73

Interference

Interference level in H (interference from V,


separation between H & V with very good antenna is
35dB)

Threshold level without interference BER=10-6

-96
-99

Time (s)
Proprietary and Confidential

Page 204

RSL Vs. Threshold for CCDP system with XPIC


RSL (dBm)

BER>10-6

-20
-30

Nominal Input Level H

Fading Margin = 38 dB

BER>10-6
Interference level in H (interference from V, when
XPIC is not enabled

-65
XPIC will
improve
interference
for extra
26dB

Threshold level when XPIC is ON

-68
-73

Original Threshold level without CCDP and XPIC

S/N=23dB for 128QAM (37 MHz) configuration


Interference level in H (interference from V, when
XPIC is enabled

-91

Interference level

Time (s)
Proprietary and Confidential

XPIC Recovery Mechanism


The purpose of the XPIC recovery mechanism is to save the working link while
attempting to recover the faulty polarization.

The mechanism works as follows:

The indication that the recovery mechanism has been activated is a loss of
modem preamble lock, which takes place at SNR~10dB.
The first action taken by the recovery mechanism is to cause the remote
transmitter of the faulty carrier to mute, thus eliminating the disturbing signal and
saving the working link.
Following this, the mechanism attempts at intervals to recover the failed link. In
order to do so, it takes the following actions:
The remote transmitter is un-muted for a brief period.
The recovery mechanism probes the link to find out if it has recovered. If not,
it again mutes the remote transmitter.
This action is repeated in exponentially larger intervals. This is meant to
quickly bring up both channels in case of a brief channel fade, without
seriously affecting the working link if the problem has been caused by a
hardware failure.
The number of recovery attempts is user-configurable

Every such recovery attempt will cause a brief traffic hit in the working
link.
Proprietary and Confidential

10

Page 205

MRMC selection

X means XPIC script


N Normal script

Proprietary and Confidential

11

XPIC settings

Proprietary and Confidential

12

Page 206

Thank you

13

Page 207

Protection System Configuration

July 2015
Version 2

Agenda

What is Protection?
General Guidelines
HSB Configuration in general principals
1+1 HSB Configuration
1+1 HSB SD Configuration

Proprietary and Confidential

Page 209

Different types of protections systems

Proprietary and Confidential

What is Protection?
A method of using one or more devices in a standby mode in order to
have a secondary link up when failure occurred to the active link

In order to achieve a full protected link each and every device should
be protected

The number of multiplied devices depends on the link importance

The process of keeping (something or someone) safe


Wikipedia.com

Everybody needs Protection


Proprietary and Confidential

Page 210

Hot standby in general


1
Ch1
Main
1

Ch1
Main

In case of ch1 failure, will be traffic


switched to Protection channel

1
Protection

Protection

1
HSB system is using same frequency for Main and Standby channel (f1 & f1)
HSB system is typically 1+1
Protection channel is internally muted. Just in case Main channel failure will be Protection channel Unmuted.
Space diversity with baseband switching is based on HSB system (selection of better input level)

In Hot Standby mode only one transmitter is active, the other transmitter is standby. Both receivers are active
and hitless switching is performed if Space diversity was configured. The TX- and RX- switching at a terminal
normally operates independently, but they may be configured to operate together.
Proprietary and Confidential

HSB Protection

IP-20G offers radio redundancy via 1+1 HSB protection. 1+1 HSB protection provides
full protection in the event of interface, signal, or RFU failure
The interfaces in a protected pair operate in active and standby mode. If there is a
failure in the active radio interface or RFU, the standby interface and RFU pair
switches to active mode
Each carrier in a protected pair reports its status to the CPU. The CPU is responsible
for determining when a switchover takes place.
In a 1+1 HSB configuration, the RFUs must be the same type and must have the
same configuration

Proprietary and Confidential

Page 211

HSB Protection Revertive mode


In an HSB protection scheme, the active and standby radios are usually
connected to the antenna with a coupler.

This causes a -6dB loss on the secondary path on each side of the link,
resulting in a 12dB increase in the total path loss for the link.

This additional path loss will either reduce the links fade margin or increase the
power consumption of the Power Amplifier (PA) in order to compensate for the
additional path loss.

The system monitors the availability of the primary path at all times. Whenever
the primary path is operational and available, without any alarms, but the
secondary path is active, the system initiates a revertive protection switch.
Every revertive protection switch is recorded as an event in the event log.

Revertive time from Secondary radio back to Primary radio is 10 min


EACH PROTECTION SWITCH CAUSES TRAFFIC DISRUPTION!!!

Proprietary and Confidential

Switchover Triggers
The following events trigger switchover for 1+1 HSB protection according to
their priority, with the highest priority triggers listed first.

1.
2.
3.
4.
5.

Hardware module missing


Lockout
Force switch
Traffic failures
Manual switch

Proprietary and Confidential

Page 212

ACM and 1+1HSB


When ACM is activated together with 1+1 HSB protection, it is

essential to feed the active RFU via the main channel of the coupler
(lossless channel), and to feed the standby RFU via the secondary
channel of the coupler (-6db attenuated channel). This maximizes
system gain and optimizes ACM behavior for the following reasons:
In the TX direction, the power will experience minimal attenuation.
In the RX direction, the received signal will be minimally attenuated.
Thus, the receiver will be able to lock on a higher ACM profile
(according to what is dictated by the RF channel conditions).
The following ACM behavior should be expected in a 1+1
configuration:
In the TX direction, the Active TX will follow the remote Active RX ACM
requests (according to the remote Active Rx MSE performance).
The Standby TX might have the same profile as the Active TX, or might
stay at the lowest profile (profile-0). That depends on whether the
Standby TX was able to follow the remote RX Active units ACM
requests (only the active remote RX sends ACM request messages).
In the RX direction, both the active and the standby carriers follow the
remote Active TX profile (which is the only active transmitter).
Proprietary and Confidential

1+1 HSB Configuration

10

Page 213

1+1 HSB Configuration

Select Member 1

1+1 HSB only for non ABC radio configuration


1+1 HSB SD only for ABC radio configuration

Select Member 2

Summary
Submit

Proprietary and Confidential

11

Copy to Mate

Configure first (Main) radio link (MRMC, Freq., Link ID)


1. Select first radio link for Primary radio location
2. Select Copy to mate source radio location (In this case 1st link)
3. Apply new setting
4. Click on the Copy to Mate button
Proprietary and Confidential

12

Page 214

Multi-Carrier ABC 1+1 HSB SD Configuration

13

Multi Carrier ABC 1+1 HSB SD


1 Enable CMR mode via CLI

There must be enable CMR mode for both radios to be able create 1+1
HSB SD configuration

Proprietary and Confidential

14

Page 215

Multi Carrier ABC 1+1 HSB SD


2 - Protection Groups

Select Member 1

1+1 HSB only for non ABC radio configuration


1+1 HSB SD only for ABC radio configuration

Summary
Submit

Select Member 2

Proprietary and Confidential

15

Multi Carrier ABC 1+1 HSB SD


3 - MC-ABC pre-configuration
1. Configure Multi Carrier ABC group. Create Group 1, use any name (1+1 HSB SD),
press Finish Submit (not next)
2. Edit created group and Enable protection
3. In next step add to this group Protection Group #1

1
2

Proprietary and Confidential

16

Page 216

Multi Carrier ABC 1+1 HSB SD


4 - MC ABC Configuration Adding member
1. Add Protection Group #1 into ABC

Proprietary and Confidential

17

Copy to Mate

Configure first (Main) radio link (MRMC, Freq., Link ID)


1. Select first radio link for Primary radio location
2. Select Copy to mate source radio location (In this case 1st link)
3. Apply new setting
4. Click on the Copy to Mate button
Proprietary and Confidential

18

Page 217

Thank You

Page 218

Multi Carrier Adaptive Bandwidth Control


MC-ABC

July 2015
Version 1

Agenda
Multi-channel ABC in general
Multi Carrier ABC engine
Multi Carrier ABC & ACM
Multi-Carrier ABC 2+0 Configuration
Multi-Carrier ABC 1+1 HSB SD Configuration

Proprietary and Confidential

Page 219

Multi-carrier Adaptive Bandwidth Control (ABC)

Multi-channel Adaptive Bandwidth Control-ABC is the unique technology for traffic distribution over several
RF carriers.

The Multi-channel ABC dynamically adjusts the total link capacity depending on the number of channels and
their available capacities to provide the highest throughput at any time.

The traffic from the Ethernet WAN port is distributed to all available RF channels in a round robin fashion,
independent of packet sizes and flows. This results in a single high-capacity Ethernet link, with a high level of
resilience and efficiency.

If an RF-channel fails, the overall throughput will drop, but the remaining capacity will be fully utilized. The
QoS scheduler ensures that high priority traffic is transmitted unaffected, while low priority traffic may be
dropped if the link becomes congested.

http://www.youtube.com/watch?v=zBVL1Ac9xJU
Proprietary and Confidential

Multi Carrier ABC

Multi-Carrier Adaptive Bandwidth Control (ABC) is an innovative technology that


creates logical bundles of multiple radio links and optimizes them for wireless
backhaul applications.
Multi-Carrier ABC enables separate radio carriers to be shared by a single Ethernet
port.
This provides an Ethernet link over the radio with multiple capacities, while still
behaving as a single Ethernet interface.
In Multi-Carrier ABC mode, traffic is divided among the carriers optimally at the radio
frame level without requiring Ethernet link aggregation (LAG).
Load balancing is performed without regard to the number of MAC addresses or the
number of traffic flows.
During fading events which cause ACM modulation changes, each carrier fluctuates
independently with hitless switchovers between modulations, increasing capacity
over a given bandwidth and maximizing spectrum utilization.
The result is 100% utilization of radio resources in which traffic load is balanced
based on instantaneous radio capacity per carrier.

http://www.youtube.com/watch?v=zBVL1Ac9xJU
Proprietary and Confidential

Page 220

Multi- Carrier ABC Operation


The MC-ABC engine divides the data flows into blocks of data. Each

radio carrier is assigned blocks at a rate which is based on the ACM


profile of the carrier. Once the ACM profile of a carrier changes, the
rate at which the data blocks are delivered to this carrier changes. The
higher the ACM profile of a certain carrier, the higher the block rate
assigned to this carrier.
On the receiving side of the link, all blocks are synchronized, meaning
that blocks are delayed based on the last arriving block. The latency of
the aggregated data flow is determined by the slowest arriving block.
A low ACM profile means more latency compared to a higher ACM
profile. When all channels run the same radio script, the latency
variation for the aggregated data stream is determined by the latency
variation of one radio channel. This latency variation is slightly more
complicated to predict when the radio carriers runs at different radio
scripts, since each radio script has a unique delay distribution. MultiCarrier ABC can tolerate a large delay variance between the slowest
and the fastest arriving blocks.

Proprietary and Confidential

MC-ABC & ACM


Multi-Carrier ABC automatically adapts to capacity changes that result
from changes in the current ACM profile.

When an ACM profile change takes place on a specific carrier, MCABC responds by changing the block size of that channel.

The process of changing the block size is performed dynamically and


is hitless.

Since the ACM profile changes are also hitless, the overall Multi-

4QAM

8QAM
16QAM

32QAM

64QAM

128QAM

256QAM

512QAM

1024QAM
SFEC

1024QAM
LFEC

2048QACM

High Priority
Traffic

Carrier ABC traffic is hitless.

Proprietary and Confidential

Page 221

Multi-Carrier ABC engine

ABC Engine
1Gbps connection for
Ethernet and TDM

Network
Processor
1x Up to 2+0 MC-ABC (Up to 1Gbps)
1+1 HSB BBS MC-ABC/HSB (Up to 1Gbps)
Ethernet ports

Channelized STM-1 or E1/DS1

Proprietary and Confidential

Multi-Carrier ABC
Channel failure/degradation

Radio

Radio

1. Systemishighlyresilientto
carrier failure/degradation

1 2

Ethernet
Traffic

ABC Engine

Network
Processor

SimpleandPowerfulTrafficAllocation TDM&Ethernet
Proprietary and Confidential

Page 222

2+0 MC-ABC Configuration

Multi Carrier ABC 2+0


2 MC ABC Configuration
1.
2.
3.
4.

Create ABC Group 1 consists of slot 1 (channel 1) and slot 2 (channel 2)


Check if ABC group has Admin status Enable
Setup MRMC, Freq., Link ID per each radio link
Check IF Manager MC ABC Grop1 is enabled

Proprietary and Confidential

10

Page 223

Multi-Carrier ABC 1+1 HSB SD Configuration

11

Multi Carrier ABC 1+1 HSB SD


1 Enable CMR mode via CLI

There must be enable CMR mode for both radios to be able create 1+1
HSB SD configuration

Proprietary and Confidential

12

Page 224

Multi Carrier ABC 1+1 HSB SD


2 - Protection Groups

Select Member 1

1+1 HSB only for non ABC radio configuration


1+1 HSB SD only for ABC radio configuration

Summary
Submit

Select Member 2

Proprietary and Confidential

13

Multi Carrier ABC 1+1 HSB SD


3 - MC-ABC pre-configuration
1. Configure Multi Carrier ABC group. Create Group 1, use any name (1+1 HSB SD),
press Finish Submit
2. Edit created group and Enable protection
3. In next step add to this group Protection Group #1

1
2

Proprietary and Confidential

14

Page 225

Multi Carrier ABC 1+1 HSB SD


4 - MC ABC Configuration Adding member
1. Add Protection Group #1 into ABC

Proprietary and Confidential

15

Copy to Mate

Configure first (Main) radio link (MRMC, Freq., Link ID)


1. Select first radio link for Primary radio location
2. Select Copy to mate source radio location (In this case 1st link)
3. Apply new setting
4. Click on the Copy to Mate button
Proprietary and Confidential

16

Page 226

Thank You

Page 227

Configuration Management &


Software Download

Ceragon Training Services


July 2015, ver5

Agenda

Backup and Restore


Software Download
RFU Software Installation
Unit Info

Proprietary and Confidential

Page 229

Backup & Restore

Backup and Restore


Backup and restore can be used for

Restoring configuration upon unit replacement


Duplicating configuration
Three restore points
Restore point are manually created
Backup file is generated from a restore pointed
Once a backup file is imported to a unit it can be restored

Proprietary and Confidential

Page 230

Backup Process

Backup Configuration File Idea


1.
2.
3.
4.
5.
6.

Install FTP server We recommend to use FileZilla Server (not Client)


Setup FileZilla Server parameters (Users, Shared Folders)
Synchronize Time via CLI
platform management time-services utc set date-and-time 30-01-2014,15:07:58
Setup communication parameters for IP20 unit with FTP Server
Create Configuration Backup inside IP20 unit
Export Configuration Backup to FTP server

Export
File

FTP IP address

Proprietary and Confidential

Page 231

2. FTP Setup FileZilla Settings


1. Install FileZilla Server and Run it
2. Create User in FileZilla Server

Proprietary and Confidential

2. FTP Setup FileZilla Settings


3. Create shared folder in FTP Server PC (C:\ Backups)
4. Setup all permissions for this folder in FTP Server

FTP SERVER PC

FileZilla settings in FTP SERVER PC

5. Check Firewall settings in FTP Server PC and if port 21 is used only with
FileZilla
Proprietary and Confidential

Page 232

3. IP20G Configuration Management Settings


Setup Parameters for FTP Server Connection
Status for File transfer

Status for Backup creation

User name and password


must be same as in FileZilla
Server
FTP Server IP address

!!!

Path in Server (This setup means that


file will be uploaded in C:\Backups)
Name.zip (.zip is MANDATORY)
Restore point selection
Time installation for future releases

Proprietary and Confidential

4. Backup process
6. Check Export status

4. Check Status

1. Setup Configuration parameters


included Restore Point which will be
used for Configuration Backup inside
the system

2. Apply

5. Export

3. Backup

Proprietary and Confidential

10

Page 233

Restore Process

Restore Configuration File Idea


1. Install FTP server (when is not already installed) we recommend to use FileZilla
Server (Not Client)
2. Setup FileZilla Server parameters (Users, Shared Folders)
3. Setup communication parameters for IP20 unit with FTP Server
4. Synchronize Time via CLI
platform management time-services utc set date-and-time 30-01-2014,15:07:58

5. Import Configuration Backup from FTP Server


6. Restore Configuration Backup

Import File

FTP IP address

Proprietary and Confidential

12

Page 234

3. IP20 Configuration Management Settings


Setup Parameters for FTP Server Connection
Status for File transfer

Status for Backup creation

User name and password


must be same as in FileZilla
Server
FTP Server IP address
Path in Server (Means that file will be downloaded
from Home FileZilla directory in our case
C:\Backups)

Name.zip (.zip is MANDATORY)


Restore point selection

!!!

Time installation for future releases

Proprietary and Confidential

13

Restore process
4. Check Import status

6. Check Restore status

1. Setup Configurations parameters


included Restore point 1-3

2.Apply

5 Restore

3.Import

RESTORE CONFIGURATION WILL NOT CHANGE CURRENT IP ADDRESS !!!


Proprietary and Confidential

14

Page 235

Config_Dump File

Proprietary and Confidential

15

Software Download for IDU

16

Page 236

Software Download Idea for IDU


1. Before performing a software upgrade, it is important to verify that the system date
and time are correct.
2. Install FTP server (when is not already installed) we recommend to use FileZilla
Server (Not Client)
3. Setup FileZilla Server parameters (Users, Shared Folders)
4. Setup communication parameters for IP20 unit with FTP Server
5. Synchronize Time via CLI
platform management time-services utc set date-and-time 30-01-2014,15:07:58

6. UnZip software package for IP-20 to FTP Server shared folder


7. Download software from FTP Server
8. Install downloaded software
Software

Download

Although RFU software is included in the standard installation bundle, the current
software version is not automatically updated in the RFU when an installation is
performed.
To upgrade the software in an RFU, you must perform the upgrade manually, per slot
Proprietary and Confidential

17

IP-20 Software Download Settings

User name and password


must be same as in FileZilla
Server
FTP Server IP address
Path in FTP Server (This setup means
that configuration files will be
downloaded from Home FileZilla
directory)

Proprietary and Confidential

18

Page 237

Software process download


4. Check Download Status
6. Check Installation Status

1. Setup Parameters

2. Apply

5. Install Downloaded Software


3. Download Software Files from FTP Server

Proprietary and Confidential

19

RFU Software Installation

20

Page 238

RFU Software Installation


Although RFU software is included in the standard installation bundle, the
current software version is not automatically updated in the RFU when an
installation is performed.
To upgrade the software in an RFU, you must perform the upgrade manually, per
slot.
This enables you to manage IDU and RFU software versions separately.
In this version, you must use the Command Line Interface (CLI) to
upgrade RFU software.

Proprietary and Confidential

21

RFU Software Installation Procedure


1. The following sequence of commands installs RFU-C software version 2.13 in the
RFU connected to slot 3.
root> platform software show rfu versions

2. The next step is to perform the update and install commands:


root> platform software update rfu version slot 3 radio-port 1
root> platform software install rfu version slot 3 radio-port 1

3. To check the status of an update or install operation, enter the following command:
root> platform software show rfu status

4. Once the installation is complete, the Install Status column should indicate installation
success and the In Progress column should indicate 100 (100%).
5.When the installation is complete, enter the show rfu versions command again to verify
that the new version has been properly installed in both the TCC and the RFU:
root> platform software show rfu versions

Proprietary and Confidential

22

Page 239

Unit Information file

23

Unit Info
Status for Unit info creation
Status for File transfer

User name and password


must be same as in FileZilla
Server
FTP Server IP address

!!!

Path in Server (This setup means that


file will be uploaded in C:\Backups)
Name.zip (.zip is MANDATORY)

Includes technical data about the unit and also backup files placed in restore points
This file can be forwarded to customer support, at their request, to help in analyzing issues
that may occur
Proprietary and Confidential

24

Page 240

Create and Transfer process


4. Check Status
6. Check Export status

1. Setup Configuration
parameters included Restore
Point which will be used for
Configuration Backup inside the
system

2. Apply 3. Create

5. Export

Proprietary and Confidential

25

Thank You

Page 241

Native TDM

Ceragon Training Services


July 2015 Version 4

Agenda
Native TDM Services
Hybrid Service Engine TDM + Ethernet
All-packet services example: Ethernet EVCs + TDM Pseudowire
How to Setup Native TDM
TDM Path Protection

Proprietary and Confidential

2
2

Page 243

Native TDM Services


IP-20G provides integrated support for transportation of TDM (E1) services
with integrated E1 interfaces.

Two types of TDM services are supported using the same hardware:
Native TDM trails
TDM Pseudowire services (enabling interoperability with third party
packet/PW equipment)

IP-20G provides native TDM support, utilizing a cross-connect module to


support up to 512 TDM trails.

The IP-20G Web EMS provides a simple and easy-to-use GUI that enables
users to provision end-to-end TDM trails. The Services Provisioning GUI
includes the following trail-creation end points:
TDM interface
Radio interface
Proprietary and Confidential

3
3

Hybrid Services Engine Ethernet + TDM


Services engine
TDM cross-connect (VCs)

TDM
traffic

E1
Ch-STM1

TDM
PW

Network processor (EVCs)

Hybrid
Radio
Packet
traffic

GE/FE

Native TDM Services (VCs)


Ethernet Services (EVCs)
Ethernet switched (L2) services E-Line (PtP), E-LAN (MPtMP)

Ethernet port based (L1) services (smart pipe)


TDM Pseudowire services Unstructured (SAToP), Structured (CESoP)

Proprietary and Confidential

4
4

Page 244

Hybrid services example: Ethernet EVCs + Native TDM


TDM cross-connect (VCs)

E1/ DS1

Port

SAP

Ethernet Services (EVCs)


PtP Service

User Port
(UNI)
GE/FE

TDM
traffic

Port

SAP
SAP

SNP
SAP

Packet
traffic

Hybrid
Radio

MPtMP Service
User Port
(UNI)
GE/FE

SAP

Network
Port

SNP

Port

Port

SAP

GE/FE

SNP

Proprietary and Confidential

All-packet services example: Ethernet EVCs + TDM Pseudowire


Ethernet Services (EVCs)
TDM
PW
E1/DS1

Port

PtP Service

SAP
SAP

SNP
SAP

PtP Service

User Port
(UNI)
GE/FE

Port

S-VLAN =
200
SAP
SAP

SNP
SAP

Packet
traffic

Packet
Radio

MPtMP Service
User Port
(UNI)
GE/FE

SAP

Network
Port

SNP

Port

Port

SAP

SNP

Proprietary and Confidential

Page 245

GE/FE

How to Setup Native TDM

ETSI and ANSI

For IP-20G default standard is ETSI


To change the TDM interfaces to operate according to the ANSI (FCC) standard
(DS1), results in system reset and restores the default configuration.

Proprietary and Confidential

Page 246

Native TDM Configuration


VC1

VC2

VC3

VC4

VC5

VC6

VC7

VC8

VC9

VC10 VC11 VC12

VC13 VC14 VC15 VCn

E1#1-16
Loop Timing

TDM
Network
9

Proprietary and Confidential

TDM Service Configuration 1

As first we have to create any Eth. service for Radio port, because we need specify
which type of traffic will be carry by Radio.
Create any service point which is connected to the radio port in Ethernet/Services
Proprietary and Confidential

10
10

Page 247

TDM Service Configuration 2


1
2

1 Select required TDM card


2 Select required E1or VC
3 Select Timing
Loop Timing Timing is taken from incoming traffic.
Recovered Clock Clock information is recovered on the egress path. Extra information may be located
in an RTP header that can be used to correct frequency offsets. Recovered Clock can provide very
accurate synchronization, but requires low PDV (Packer Delay Variation).
System Reference Clock Trails are synchronized to the system reference clock.
Front Panel Trails are synchronized from Front Panel synch. port.
Proprietary and Confidential

11

Native TDM Configuration

Select Required TDM Card and Timing

E1#1-1
Proprietary and Confidential

12
12

Page 248

TDM Service Configuration

Select VC for radio slot

VC1

VC2

VC3

VC4

VC5

VC6

VC7

VC8

VC9

VC10 VC11 VC12

VC13 VC14 VC15 VCn


E1#1-1

Proprietary and Confidential

13

TDM Service Configuration

2
In remote end it needs to be set vice
versa according to drawing below
Proprietary and Confidential

14

Page 249

TDM Service Configuration

Selection Summary
Proprietary and Confidential

15

TDM Path Protection

16

Page 250

TDM Path Protection


TDM path protection enables the operator to define two separate network
paths for a single TDM service.
Two different kinds of path protection are available, each suitable for a
different network topology:
1:1 and 1+1 TDM path protection is suitable for ring networks that consist
entirely of IP-20N and/or IP-20G elements with two end-point interfaces for
the TDM trail.
1+1 Dual Homing TDM path protection is suitable for networks in which the
IP-20N and/or IP-20G elements are set up as a chain connected to the third
party networks at two different sites.
The ring is closed on one side by the IP-20N and/or IP-20G elements,
and on the other by third party equipment supporting standard SNCP.
In this case, there are three end-point interfaces in the IP-20N and/or
IP-20G section of the network.

Proprietary and Confidential

17

1:1 TDM Path Protection

Backup
Path

Active
Path

1:1 TDM path protection enables the operator to define two separate network paths for a single
TDM trail.
Each trail has the same TDM interface end points, but traffic flows to the destination via different
paths.
Bandwidth is utilized only on the active path, freeing up resources on the standby path.
For native TDM services TDM path protection is done by means of configuring active and backup
path at the TDM service end-points.
Proprietary and Confidential

18

Page 251

1+1 TDM Path Protection

Backup
Path

Active
Path

1:1 TDM path protection enables the operator to define two separate network paths for a single
TDM trail.
Each trail has the same TDM interface end points, but traffic flows to the destination via different
paths.
Bandwidth is utilized for both paths parallel.
For native TDM services TDM path protection is done by means of configuring active and backup
path at the TDM service end-points.
Proprietary and Confidential

19

1+1 Dual Homing TDM Path Protection

1+1 Dual Homing

1+1 Dual Homing

1+1

1+1 TDM dual homing path protection is used for networks in which the IP-20 network elements are
set up as a chain connected to third party networks at two different sites, where one end-point is
located on an IP-20 unit and the other end-point is located on third-party equipment supporting
standard SNCP.
As with 1:1 TDM path protection, the operator defines two separate network paths for a single TDM
trail. However, unlike path protection, traffic flows through both paths simultaneously, thereby
supporting standard SNCP in the third party equipment.

Proprietary and Confidential

20

Page 252

Configuration of Path Protection

21

Configuration for 1:1 and 1+1 TDM Path Protection

1:1 or 1+1 TDM Protection

Active
Path

Bypass
configuration

Trail ID 1
Radio Slot 1
VC-1

Bypass
configuration

E1#1
Slot 1
1:1 or 1+1 TDM Protection
Proprietary and Confidential

22

Page 253

Backup
Path

Trail ID 2
Radio Slot 2
VC-1

Configuration 1:1 or 1+1 TDM Path Protection


1

2
5

or

1:1 or 1+1 TDM Protection

Active
Path

Bypass configuration

Bypass configuration

Trail ID 1
Radio Slot 1
VC-1

E1#1
Slot 1
1:1 or 1+1 TDM Protection

Proprietary and Confidential

23

TDM Service

Interface #1

Interface #2

Protection Interface

Proprietary and Confidential

24

Page 254

Backup
Path

Trail ID 2
Radio Slot 2
VC-1

Configuration for 1+1 Dual homing Edge

1+1 Dual homing


network edge

1+1 Dual homing


network edge

Trail ID 2

Trail ID 1

1+1 TDM Protection

Proprietary and Confidential

25

Thank You

Page 255

Troubleshooting

Ceragon Training Services


July 2015, ver 4

Agenda

Faults and Alarms


Performance monitoring
RMON statistic
Loopback

Proprietary and Confidential

Page 273

Faults and Alarms

Faults
Current Alarms

Event Log

Proprietary and Confidential

Page 274

Alarm Configuration

Proprietary and Confidential

Performance Monitoring - Radio

Page 275

Radio Parameters

Profile
0
1
2
3
4
5
6
7
8
9
10

Mod
QPSK
8PSK
16QAM
32QAM
64QAM
128QAM
256QAM
512QAM
1024 QAM SFEC
1024 QAM WFEC
2048QAM

MSE Down-Threshold
-16
-17
-21
-24
-27
-30
-32
-35
-36
-39

MSE Up-Threshold
-18
-19
-23
-26
-29
-32
-34
-37
-38
-41

Applicable for both 28/56MHz , 2048 QAM supported from T8.0

The values are typical and subject to change in relation to the frequency and RFU
type. For more details please contact your Ceragon representative
Proprietary and Confidential

Radio Parameters Defected Blocks

Proprietary and Confidential

Page 276

MRMC actual status

Proprietary and Confidential

Signal Level

Proprietary and Confidential

10

Page 277

MSE Mean Square Error

Proprietary and Confidential

11

MRMC

Proprietary and Confidential

12

Page 278

Radio Thresholds

Displays a table of every radio threshold settings

Proprietary and Confidential

13

Radio Traffic Capacity/Throughput

The Capacity PM Table page displays Radio Ethernet Capacity in Mbps for either radio for 15 minutes or 24 hours intervals
Proprietary and Confidential

14

Page 279

Radio Traffic - Utilization

The Throughput PM Table page displays Radio Ethernet Throughput in Mbps for either radio for 15 minutes or 24 hours intervals

Proprietary and Confidential

15

Radio Traffic - Frame error rate

The Frame error rate PM Table page displays Radio Frame error rate for either radio for 15 minutes or 24 hours intervals

Proprietary and Confidential

16

Page 280

Header Compression counters

Proprietary and Confidential

17

Performance Monitoring Ethernet Services

Page 281

ETH PM RMON

Proprietary and Confidential

19

PM RMON Special Registers


RMONregister /Counter

Description

Undersizeframesreceived

Framesshorterthan64bytes

Oversizeframesreceived

Frameslongerthan2000bytes

Jabberframesreceived

Totalframesreceivedwithalengthofmorethan2000bytes,
butwithaninvalidFCS

Fragmentsframesreceived

Totalframesreceivedwitha lengthoflessthan64
bytes,andaninvalidFCS

Rxerrorframesreceived

TotalframesreceivedwithPhyerror

FCSframesreceived

TotalframesreceivedwithCRCerror,notcounteredin
"Fragments","Jabber"or"Rxerror"counters

Pauseframesreceived

Numberofflowcontrolpauseframesreceived

Proprietary and Confidential

20

Page 282

Troubleshooting with RMON: Oversized frames


Site A
T

Site B
T

Tagged Frames with frame


size > 2000 bytes

Wheningressframesexceedthe maximumframesize,RMONcounterOversizedframesreceived
isupdatedaccordingly

Proprietary and Confidential

21

Troubleshooting with RMON: Discarding Example


Site A
T

Site B
T

Ingress traffic does not


comply to Policer rules

DiscardingExamples:
Ingressrate>RateLimiter
IngressframesdonotqualifytoPolicer rules

Proprietary and Confidential

22

Page 283

Troubleshooting with RMON: Monitoring specific


traffic types

Site A

Site B
Rate Limiter

Monitor

VideostreamsaregenerallytransmittedoverUDP
withmulticastaddresses
Tomonitortraffic,checkouttheMulticastFrames
Receivedregister
TolimitMCtraffic,assignaPolicer withaMCCIR
rules
Proprietary and Confidential

23

Ethernet TX / RX PM - Enabling

Enable Tx / RX Performance collection for specific Ethernet / Radio Port


It will enable TX and RX Performance collection
Proprietary and Confidential

24

Page 284

Ethernet TX / RX PM

Performance based on 15 min and 24 hours


Proprietary and Confidential

25

Ethernet TX / RX PM View / Threshold window

Proprietary and Confidential

26

Page 285

Performance Monitoring TDM Services

TDM Line Alarms

An example: Line alarms number 1040 = ( 10000010000 ) = 1024 + 16


It means that 1024 is Transceiver Loss of Multi-frame and 16 is Transceiver AIS alarm

Proprietary and Confidential

28

Page 286

TDM port PMs Table

Proprietary and Confidential

29

Loopbacks

Page 287

RFU RF Loopback

IF LB
RFU RF LB

Proprietary and Confidential

31

TDM Loopback

Proprietary and Confidential

32

Page 288

Ethernet Loopback

Select port and click to Loopback button


Proprietary and Confidential

33

Ethernet Loopback Setting

Enable Swapping MAC addresses


Enable admin status
Proprietary and Confidential

34

Page 289

Thank You

Page 290

Synchronous Ethernet

December 2014
Version 1

Agenda
Synchronization in General
Jitter
Synchronization Effect
Concept of Synchronization in IP-20
Implementation
T3 Input & T4 output
SSM and ESMC
Sync E Clocks types
Synchronization modes of operation
Synchronization example
IP-20G Synchronization Settings
Proprietary and Confidential

Page 333

Cascading port

December 2014
Version 1

Agenda
Hybrid TDM + Eth Concept
Configuration of Cascading port

Proprietary and Confidential

Page 363

Hybrid (TDM + Eth) services over IP-20N cascading port

Cascading interfaces can be configured on ports 3 and 4 of an Ethernet LIC.


When operating in cascading mode, these interfaces can handle hybrid
Ethernet and Native TDM traffic, enabling operators to create links among
multiple IP-20 units in a node for multi-directional applications based on hybrid
Ethernet and Native or Pseudowire TDM services
Proprietary and Confidential

Configuration 1st Auto negotiation - OFF

Cascading ports

Proprietary and Confidential

Page 364

Configuration 2nd Cascading Port Configuration

Cascading ports

Proprietary and Confidential

Configuration 3rd Configure service

Create service point for Cascading Interface


Management or Pipe service point
Proprietary and Confidential

Page 365

Configuration 4th Configure TDM Trail

Configure required TDM Trail by using cascading port

Proprietary and Confidential

Configuration 5th Configure Ethernet Service

Configure Ethernet Service where Cascading port will be one Service point with
specific Interface type and C & S-VLAN encapsulation

Proprietary and Confidential

Page 366

Thank You

Page 367

Link Aggregation (IEEE 802.3ad)

December 2014
Version 3

Agenda

Link Aggregation Introduction


LAG Advantages
LAG mechanism

Proprietary and Confidential

Page 373

Introduction to Link Aggregation


IEEE Definition:

Link Aggregation allows one or more links to be aggregated


together to form a Link Aggregation Group, such that a MAC
Client can treat the Link Aggregation Group as if it were a
single link

The Link Aggregation Group is consisting of N parallel


instances of full duplex point-to-point links operating at the
same data rate

Traffic sent to the ports in such a group is distributed through a


load balancing function

Proprietary and Confidential

Link Aggregation Groups (LAG)


Link aggregation (LAG) enables users to group several physical interfaces into
a single logical interface bound to a single MAC address. This logical interface
is known as a LAG group. Traffic sent to the interfaces in a LAG group is
distributed by means of a load balancing function. IP-20N uses a distribution
function of up to Layer 4 in order to generate the most efficient distribution
among the LAG physical ports, taking into account:

MAC DA and MAC SA


IP DA and IP SA
C-VLAN
S-VLAN
Layer 3 Protocol Field
UDP/TCP Source Port and Destination Port
MPLS Label

Proprietary and Confidential

Page 374

LAG
LAG can be used to provide redundancy for Ethernet interfaces, both on the

same card (line protection) and on separate cards (line protection and
equipment protection). LAGs can also be used to provide redundancy for radio
links.
LAG can also be used to aggregate several interfaces in order to create a wider
(aggregate) Ethernet link. For example, LAG can be used to create a 4 Gbps
channel.
Up to four LAG groups can be created.
LAG groups can include interfaces with the following constraints:
Only physical interfaces (including radio interfaces), not logical interfaces,
can belong to a LAG group.
Interfaces can only be added to the LAG group if no services or service
points are attached to the interface.
Any classification rules defined for the interface are overridden by the
classification rules defined for the LAG group.
When removing an interface from a LAG group, the removed interface is
assigned the default interface values.

IP-20N enables users to select the LAG members without limitations, such as

interface speed and interface type. Proper configuration of a LAG group is the
responsibility of the user.

Proprietary and Confidential

Advantages

Page 375

Benefits of using Link Aggregation


1. Increased aggregate bandwidth
Link Aggregation allows the establishment of full duplex point-to-point links
that have a higher aggregate bandwidth than the individual links that form the
aggregation.
The capacity of the multiple links is combined into one logical link.

100 Mbps

Proprietary and Confidential

Benefits of using Link Aggregation


2. Improved Resiliency
In case of a failed link, remaining links take over utilization of new available BW
Traffic via LAG is distributed according to users policy improved reliability

Proprietary and Confidential

Page 376

Benefits of using Link Aggregation


3. Reduced Complexity & Administration
When multiple ports are allocated between two ETH switches, broadcast storms are
created due to physical loops. STP is required to eliminate loops by blocking the redundant
port.
When multiple ports are allocated between 2 Routers, Routing Protocols are required to
control traffic paths.
With LA STP or routing protocols are not needed, therefore, less processing is involved.

STP requires blocking and


path cost calculations

Proprietary and Confidential

Benefits of using Link Aggregation


4. Reduced Cost
Instead of utilizing an expensive GbE port(s) to transport 200Mbps
>> we trunk N x FE ports

Proprietary and Confidential

10

Page 377

Benefits of using Link Aggregation


5. Improved Network Efficiency / Security
For sites with limited IP address space that nevertheless require large amounts of
bandwidth, you need only one IP address for a large aggregation of interfaces.
For sites that need to hide the existence of internal interfaces, the IP address of
the aggregation hides its interfaces from external applications.
(These examples refer to using L2 topologies as well)
Multiple
Interfaces
Single
Interface

Customer
Network

Public
Network
Proprietary and Confidential

11

LAG

Proprietary and Confidential

12

Page 378

Anda mungkin juga menyukai