ceragon - book - ip10g - adv - v1.5

312
CERAGON FIBEAIR COURSE HANDBOOK Installation, Commissioning & System Configuration © 2010 Visit our Customer Training Portal at Training.Ceragon.Com or contact us at [email protected] Trainee Name:

Upload: loi-nguyen-tho

Post on 29-Oct-2014

380 views

Category:

Documents


30 download

TRANSCRIPT

CERAGON FIBEAIRCOURSE HANDBOOK

Installation, Commissioning & System Configuration

2010Visit our Customer Training Portal at Training.Ceragon.Com or contact us at [email protected]

Trainee Name:

24/7 access to constantly increasing on-line DB of the latest information!

eLearning is a great complementary solution to your classroom sessions as some modules are only available on-line

eLearning provides a first tier of support to users of new technologies, resulting in an estimated 30% reduction in support costs related to implementation of new applications & business processes.

eLearning is proven to be less intimidating than Instructor led training. Concerns about making mistakes in front of peers and management are eliminated.

Ceragon Training Center

Ceragon Training Center is designed to help you get a comprehensive understanding with Ceragon's technology, products and network solutions. While individuals focus on particular modules, Managers on the other hand can sign up their staff members to a Learning Program with compulsory items such as quizzes & procedures.

Ceragon eLearning users enjoy frequent & updated modules as new features and products are released without needing to update users account properties.

Ceragon eLearning solutions can shorten the amount of time it takes to get learners up to speed on new products and processes. Users who need to "brush up" on a process can access a module instantly, practice, test themselves and resume their work.

Ceragon Training Knowledgebase is available to your employees without sacrificing additional room space or time-consuming lectures.

Want to find out more? Need an Account Comparison Table? Need a proposal? Case studies? Please contact us at [email protected]

Ceragon Training AgendaProduct: IP-10 G + NMS Course: Extended Operation and Maintenance Duration: 5 days (Theory + Practice)

DAY ONE Greetings and Course Opening Introduction to MW Radio Introduction to 802.1p/q VLAN Tagging Introduction to CFM IP-10 G-Series Nodal Solution Introduction Introduction to ODU Introduction to Adaptive Code Modulation and MRMC scripts Physical Overview

1

Ceragon Training Agenda

v2.2

Ceragon - Training - Handbook - Page 1

Ceragon Training Agenda

DAY TWO

System Architecture & Design: Front Panel Overview Standalone VS. Shelf IP allocation in a shelf Management Modes (In Band, OOB, WSC) Switch Mode (Pipe, Managed, Metro) Protection Mode

Installation (Practical Exercise using the Element Management System): Standalone guidelines Installing IDU in a shelf Protection mode (Main and Extensions) Setting IP address via CLI Setting up a radio link (frequency, Link ID, RSL, TSL, ATPC, MSE, MRMC, ASP) Setting MNG in a standalone IDU Setting MNG in a shelf Setting MNG using Wayside Channel

Troubleshooting Tools & Maintenance: Using the Current Alarms Using the Event Log Using RMON Registers and Statistics Performing Loopbacks Saving Unit Information Files Configuration File Upload / Download Software File Download

Licensing (retrieving license and installing license on IDU)

2

Ceragon Training Agenda

v2.2

Ceragon - Training - Handbook - Page 2

Ceragon Training AgendaDAY THREE Introduction to RSTP & Ring Topology

RSTP RING (Practical Exercise using the EMS): Setting up an RSTP Ring Demonstrating RSTP Protection on Trails Demonstrating RSTP Protection on In Band Management

Simple Star Topology + RSTP (Practical Exercise using the EMS): Shelf Configuration SDH Trail XC Configuration TDM Trail XC Configuration

Star Topology + In Band +Protection (Practical Exercise using the EMS): Enabling Protection Mode SDH Trail XC Configuration TDM Trail XC Configuration

Trail Prioritization (Practical Exercise using the EMS): (We shall use the same setup as in previous exercise) Setting Trail Priority Demonstrating Trail Prioritization with ACM and variable attenuator

3

Ceragon Training Agenda

v2.2

Ceragon - Training - Handbook - Page 3

Ceragon Training AgendaDAY FOUR Introduction to Quality of Service: What is QoS? What is a Scheduler? What is Rate Limiting? What is Queuing? How do we map ATM / MPLS to ETH ?

Quality of Service (Practical Exercise using the EMS): Creating preliminary tables for classifiers & policers Assigning Policers Assigning Classifiers Assigning a Scheduler

Quality of Service (Practical Exercise using the EMS): QoS demonstration using Video Streaming (VLC) QoS demonstration using Traffic Generator/Analyzer (when relevant)

DAY FIVE Topology Configuration: Adding Elements Auto-Discovery Adding Maps

Administration Log Analysis and Filtering System Configuration Dynamic Poling Static Poling Configuration Broadcast Configuration File Download Software Download FTP Mail Server Northbound

End to End Trap Configuration Exam / Course Summary

4

Ceragon Training Agenda

v2.2

Ceragon - Training - Handbook - Page 4

3/8/2010

Ceragon in a NutshellProducts

Agenda

Think Backhaul Networks

1. 2. 3. 4. 5. 6. 7. 8.

1500R IDU IP-MAX^2 IDU IP-10 IDU IP-10G IDU Nodal Solutions 3200T IDU Outdoor units Outdoor Enclosures

2

Proprietary and Confidential

Ceragon - Training - Handbook - Page 5

1

3/8/2010

Ceragon FibeAir Family

OA&M

Service Management

Security

Carrier Ethernet Switch ACMGigabit Ethernet Fast Ethernet

TDM Cross ConnectXPIC Multi Radio SD/FD

Native2 Radio Ethernet + TDM10-500Mbps, 7-56MHz

E1/T1

Ch-STM1/ OC3Terminal Mux

RFU (6-38GHz)3Proprietary and Confidential

IDU 1500R Point to Point SDH Radio Link

STM Ring

STM Ring

4

Proprietary and Confidential

Ceragon - Training - Handbook - Page 6

2

3/8/2010

IDU 1500R SDH RING

ADM/MSPP

N x STM-1/OC-3XC XC

Ceragon FibeAir 1500R

Aggregation Site

PSN

5

Proprietary and Confidential

IP-MAX^2 IDU: GbE Backhaul

ETH

IP/ETH Provider network

6

Proprietary and Confidential

Ceragon - Training - Handbook - Page 7

3

3/8/2010

IP-10 IDU: Enhanced Cellular Backhaul

Cellular traffic (TDM)

IP/ETH Provider network

N x ETH

7

Proprietary and Confidential

IP-10G IDU: A Nodal Solution

Cellular traffic (TDM)

STM Rings

8

Proprietary and Confidential

Ceragon - Training - Handbook - Page 8

4

3/8/2010

3200T All Indoor: High Capacity Trunk

SDH

9

Proprietary and Confidential

3200T Split Mount: High Capacity Trunk

SDH

10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 9

5

3/8/2010

RFUs

FibeAir RFU-HP

FibeAir RFU-HS

FibeAir RFU-P

FibeAir RFU-C

High power(e.g. Smaller antennas reduced cost)Proprietary and Confidential

Standard power

Outdoor Enclosures Solution BenefitsFull Outdoor solution:

Dust and weather proof Compact size reduces the cost of leasing or purchasing rack space. Ideal for Greenfield areas, at solar-powered sites, and at repeater sites adjacent to highways. One-man installation and shorter cabling reduce installation costs. Environment-friendly: Greener deployments, saving on power and air-conditioning costs.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 10

6

3/8/2010

Hybrid aggregation network for migrationNative2 at the access, IP/MPLS & SDH/SONET at the aggregationNative2 (MW links) IP/MPLS (Hybrid Fiber/MW) SDH/SONET (Hybrid Fiber/MW)Native Ethernet Ethernet over IP/MPLS Native E1/T1 E1/T1 over SDH/SONET

STM1/ OC3

STM1/ OC3 FE/GE n x T1/E1

NG-SDH MSPP NG-SDH MSPP

BSC/MSC

Core Site

Tail site

FibeAir IP-10

FibeAir IP-10

GE

Hub SiteMPLS Router MPLS Router

GE

RNC

Native2 - Is a technology for carrying both TDM and Ethernet traffic Natively over the same microwave links with dynamic bandwidth allocation.

13

Proprietary and Confidential

Aggregating WiMAX / LTE ReadyWireless Carrier Ethernet Backhaul Network

Business center

WiMAX / 4G / LTE Cellular site WiMAX Ceragon TDM E1/T1 2G/3G base station Hub / Aggregation site Ceragon

GE

STM-1 / OC-3

Access WiMAXPoint to Multipointsolution for Ethernet traffic aggregation and statistical multiplexing for a mix of Business and mobile offload Ceragon Point to Point for TDM aggregation

Metro / Aggregation Ceragons Point to Point backhaulsupports Native Ethernet with traffic QoS awareness Ethernet traffic is tunneled through E-LAN/ E-Line EVCs TDM traffic (E1/T1) are being aggregated using Ceragon integrated TDM cross connect

Core IP Backbone Ethernet (GE) is sent over to an IP/MPLS Layer TDM (STM-1/OC-3) is sent over to an SDH/SONET layer Ceragon High-capacity "MPLSaware" Ethernet microwave radio is used where fiber connections not available.

14

Proprietary and Confidential

Ceragon - Training - Handbook - Page 11

7

3/8/2010

Ceragons AdvantagesHigh Spectral-Efficiency High System-Gain Multi-Service Concentration capabilities High Level of Redundancy Adaptive Modulation Pay-as-you-grow concept

15

Proprietary and Confidential

High Spectral-Efficiency(i.e. 256QAM modulation)

Providing more capacity at any given frequency resources e.g. 18xE1 or 50Mbps @ 7MHz channel-bandwidth

Better utilizing valuable frequency resources e.g. using high spectral efficiency we provide 155-200Mbps @ 28MHz, using a Single wireless link! Average microwave will require Two links causing higher CAPEX and consume additional valuable frequency

Get the same capacity with ONE link instead of TWO!Proprietary and Confidential

Ceragon - Training - Handbook - Page 12

8

3/8/2010

Higher Spectral-EfficiencyWhats in it for The Operator?

TypicalMicrowave RadioRequired Capacity 155-200Mbps Required Capacity 70-100Mbps TWO radio links or 56MHz channel bandwidth 28MHz Channel Bandwidth

IP10Microwave Radio

ONE radio link using 28MHz channel bandwidth 14MHz Channel Bandwidth

The operator saves CAPEX and free-up valuable frequency resourcesProprietary and Confidential

Higher Spectral-Efficiency is not enoughRadio TypeTypical System Gain Typical System Gain Typical System Gain High System Gain High System Gain

Ant. Diameter1.80 m 1.80 m 3.00 m 1.80 m

Length30 Km 21 Km 30 Km 30 km

Modulation16QAM 128QAM 128QAM 128QAM

Capacity32 x E1s STM-1/OC-3 STM-1/OC-3 STM-1/OC-3

Spectral Efficiency should always be coupled with System Gain18Proprietary and Confidential

Ceragon - Training - Handbook - Page 13

9

3/8/2010

Ceragons Management Overview

IP-1019Proprietary and Confidential

FibeAir

We adjust to customers requirements

20

Proprietary and Confidential

Ceragon - Training - Handbook - Page 14

10

3/8/2010

Thank You! [email protected]

Ceragon - Training - Handbook - Page 15

11

Introduction to 802.1 P/Q

Module Version v2.6Proprietary and Confidential

Objectives

Understand the need for smaller broadcast domains Understand what is VLAN Understand the difference between tagged and untagged frame Understand VLAN applications

2

Proprietary and Confidential

1

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 16

Associated IEEE Standards

IEEE 802.3

: Ethernet (Max. frame size = 1518 bytes)

IEEE 802.3ac : Ethernet (Max. frame size = 1522 bytes) IEEE 802.1 d : MAC Bridge first introduced the concept of Filtering Services in a bridged local network IEEE 802.1 q : VLAN Tagging IEEE 802.1 p : Priority Tagging / Mapping IEEE 802.1ag : OAM (CFM)

3

Proprietary and Confidential

Agenda Agenda

What is VLAN? Advantages for using VLAN Regular Ethernet frame Tagged frame structure Types of VLAN Types of connections 802.1P implementations

4

Proprietary and Confidential

2 of 19

2

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 17

What is VLAN?

A Layer 2 Protocol which enables enhanced traffic maneuvers :

Prioritization Filtering Provisioning Mapping (e.g. - ATM to/from ETH)

5

Proprietary and Confidential

4 of 19

What is VLAN?Regular ETH networks forward broadcast frames to all endpoints

6

Proprietary and Confidential

5 of 19

3

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 18

What is VLAN?VLAN networks forward broadcast frames only to pre-defined ports (Profile Membership)

VLAN 1Switch ports

VLAN 547

7

Proprietary and Confidential

6 of 19

Advantages of VLAN

Breaking large networks into smaller parts (Formation of virtual workgroups) Simplified Administration (no need for re-cabling when user moves) Improving Broadcast & Multicast traffic utilization Mapping expensive backbones (ATM) to simpler & cheaper ETH backbones Security establishing tunnels / trunks through the network for dedicatedusers (traffic between VLANs is restricted).

8

Proprietary and Confidential

3 of 19

4

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 19

Before we start explaining bit by bit, what is VLAN and how does it work, let us review first the structure of a regular ETH frame

9

Proprietary and Confidential

7 of 19

Untagged Ethernet Frame

FCS is created by the sender and recalculated by the receiver

Preamble + SFD8 Bytes

DA6 Bytes

SA6 Bytes

Length / Type2 Bytes

DATA + PAD46 - 1500 Bytes

FCS4 Bytes (32-bit CRC)

Minimum 64 Bytes < FRAME SIZE < Maximum 1518 Bytes

Length / Type < 1500 - Parameter indicates number of Data Bytes Length / Type > 1536 - Parameter indicates Protocol Type (PPPoE, PPPoA, ARP etc.)

10

Proprietary and Confidential

8 of 19

5

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 20

Tagged Ethernet Frame

Additional information is inserted Frame size increases to 1522 Bytes4 Bytes

Preamble + SFD

DA

SA

Length / Type

Length / Type

DATA + PAD

FCS

TPID = 0x810016 Bit

TCI

P-TAG3 Bit 11

CFI1 Bit

VLAN ID12 BitProprietary and Confidential

TPID = Tag protocol ID TCI = Tag Control Information CFI = 1 bit canonical Format Indicator

9 19 4 of 42

Tagging a Frame

VLAN ID uses 12 bits, therefore the number of maximum VLANs is 4094: 2^12 = 4096 VID 0 = reserved VID 4096 = reserved (every vendor may use some VIDs for internal purposes such as MNG etc.) VID 1 = default After tagging a frame, FCS is recalculated CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames over ETH backbones (some vendors may use CFI for internal purposes)

12

Proprietary and Confidential

6

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 21

TPID / ETHER-Type / Protocol TypeTPID in tagged frames in always set to 0x8100Protocol typeTagged Frame ARP Q-in-Q (CISCO) Q-in-Q (other vendors) Q-in-Q (other vendors) Q-in-Q (other vendors) RARP

Value0x8100 0x0806 0x8100 0x88A8 0x9100 0x9200 0x8035 0x0800 0x86DD 0x8863/0x8864 0x8847/0x8848 0x8000 0x8809 0x888E

It is important that you understand the meaning and usage of this parameter

IP IPv6 PPPoE MPLS

Later when we discuss QoS, we shall demonstrate how & why the system audits this parameter13Proprietary and Confidential

IS-IS LACP 802.1x

VLAN types

Membership by PortVID1

Port 1 2 3 4

VID 1 1 44 200VID 44 VID1

PRO easy configured CON no user mobility

VID200

14

Proprietary and Confidential

10 of 19

7

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 22

VLAN types

Membership by MACMAC 00:33:ef:38:01:23 00:01:de:22:42:ae 00:20:8f:40:15:ef 00:20:32:35:ea:11 VID 1 1 44 200

PRO user mobility, no reconfiguration when PC moves CON needs to be assigned initially, not an easy task with thousands of endpoints

15

Proprietary and Confidential

11 of 19

VLAN types

Membership by Subnet Address (a.k.a. Layer 3 VLAN)Subnet Address 10.0.0.0 / 24 20.0.0.0 / 30 11.0.0.0 / 24 192.168.1.0 / 24 VID 1 1 44 200

Membership is based on the Layer 3 header No process of IP address is done Main disadvantage longer overall throughput16Proprietary and Confidential

12 of 19

8

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 23

VLAN types

Membership by Protocol Type

Protocol Type IP IPX

VID 1 44

The VID is derived from the protocol type field found in the Layer 2 header

17

Proprietary and Confidential

13 of 19

Port TypesAccess Port a port which is not aware of VLANs (Cannot tag outgoing frames or un-tag incoming frames)

A

VLAN aware Switch

Device unaware of VLANs transmits untagged (regular) ETH frames

Switch tags the ingress frames with VID according to specific Tagging mechanism

18

Proprietary and Confidential

14 of 19

9

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 24

Port TypesTrunk Port a port which is aware of VLANs (Can tag or un-tag incoming frames)

A

VLAN aware Switch

T

Device unaware of VLANs transmits untagged (regular) ETH frames

Switch tags the ingress frames with VID according to specific Tagging mechanism Switch un-tags frames with VID received from network and delivers untagged frames to Access ports

19

Proprietary and Confidential

14 of 19

Port TypesTrunk Port can carry tagged frames with different VIDs. This requires Port Membership configuration.

A

VLAN aware Switch

T AThis port is not a member of the Trunk port membership list, hence, traffic is discarded

A

20

Proprietary and Confidential

14 of 19

10

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 25

Port TypesQ-in-Q (A.K.A. Double TaggingVLAN Encapsulation)

+VLAN

CN

aware Switch

PN

Enhanced security not exposing original VID Improved flexibility of VID in the network (Ingress VID was already assigned in the network)

21

Proprietary and Confidential

15 of 19

Introduction to QoS / CoS

22

11

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 26

Mapping ATM QoS over ETH CoS (RFC 1483)We can extend the benefits of ATM QoS into Ethernet LANs to guarantee Ethernet priorities across the ATM backbone. A L2 switch or L3 router reads incoming 802.1p or IP ToS priority bits, and classifies traffic accordingly. To match the priority level with the appropriate ATM service class and other parameters, the switch then consults a mapping table with pre-defined settings.P-Tag 6 P-Tag 4 P-Tag 0 CBR VBR UBR

Hub SiteFE/GE GE n x T1/E1

GE

RNC FibeAir IP-10STM1/ OC3

Tail site

IP-10

ATM Router

MPLS Router

Core Site

BSC/MSC

23

Proprietary and Confidential

Mapping ETH to MPLS and vice versaIP-10s L2 switch can take part in the process of transporting services through MPLS core

Frames/services are mapped to MPLS FECs according to: VLAN ID mapped to MPLS EXP bits VLAN P-Bit mapped to MPLS EXP bits

Hub SiteFE/GE GE n x T1/E1

GE

RNCSTM1/ OC3

Tail site

FibeAir IP-10

IP-10

STM1/ OC3

MPLS Router

MPLS Router

Core Site

BSC/MSC

24

Proprietary and Confidential

16 of 19

12

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 27

VLAN P-Bit Remap (Traffic Classes)802.1P utilizes Traffic Classes: A switch port allocates ingress frames to queues (buffers) according to their P-Tag value P-Bits 6-7 The more queues the more prioritizing levels (classes) Downside more time, more memory Normally 4 queues (TCs) are sufficient In this example the port groups a few Bits into a single queue 8 priority levels become 3 classes25Proprietary and Confidential

P-Bits 4-5

Q4 Q3 Q2

High

P-Bits 0-3Q1 Low

VLAN P-Bit Remap (Traffic Classes)IEEE Recommendation The following table shows IEEE definition of traffic classes It shows the ingress options for P-Tag VS. egress P-tag The number of egress priorities (classes) depend on the number of assigned queuesIngress P-Tags 10 (default)

Number of Available Traffic Classes2 0 0 0 0 1 1 1 1 3 0 0 0 0 1 1 2 2 4 0 0 1 1 2 2 3 3 5 0 0 1 1 2 2 3 4 6 1 0 2 2 3 3 4 5 7 1 0 2 3 4 4 5 6 8 1 0 2 3 4 5 6 7

0 0 0 0 0 0 0 0

1 2 3 4 5 6 7

Egress P-Tag26

Proprietary and Confidential

13

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 28

Acronyms ETH Ethernet NIC Network Internet Card VID Vlan ID VLAN Virtual LAN P-TAG Priority Tag, Priority Bits CFI Canonical Format Indicator TPID Tag Protocol Identifier FCS Frame Check Sequence DA Destination Address SA Source Address QoS Quality of Service

27

Proprietary and Confidential

Thank You [email protected]

28

Proprietary and Confidential

14

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 29

3/8/2010

ACM - Adaptive Code Modulation

FibeAir IP-10s Key Feature IP-10 utilizes a unique Adaptive Coding & Modulation (ACM) Modulation range: QPSK - 256QAM

Modulation changes to maintain link when radio signal degrades Mechanism automatically recovers to max. configured modulation whenreceived signal improves

Optimized for mobile backhaul all-IP and TDM-to-IP migration2Proprietary and Confidential

Ceragon - Training - Handbook - Page 30

1

3/8/2010

Adaptive Coding and Modulation Utilize highest possible modulation considering the changing environmentalconditions

Hitless & errorless switchover between modulation schemes Maximize spectrum usage - Increased capacity over given bandwidth Service differentiation with improved SLA Increased capacity and availability

3

Proprietary and Confidential

Adaptive Coding and Modulation

Voice & real time services Non-real time servicesWeak FEC

Strong FEC

When we engineer our services, we may assign certain services to highest priority When ACM is enabled and link degrades, highest priority services are maintained4Proprietary and Confidential

Ceragon - Training - Handbook - Page 31

2

3/8/2010

IP-10 Enhanced ACM Support 8 modulation/coding working points (~3db system gain for each pointchange)

Hit-less and Error-less modulation/coding changes based on signal quality E1/T1 traffic has higher priority over Ethernet traffic Each E1/T1 service is assigned a priority - enables differentiated E1/T1 droppingduring severe link degradation

Integrated QoS with intelligent congestion management - ensures high priorityEthernet traffic is not affected during link fading

Throughput per radio carrier:10 to 50 Mbps @ 7MHz Channel 25 to 100 Mbps @ 14MHz Channel 45 to 220 Mbps @ 28 MHz Channel 90 to 500 Mbps @ 56 MHz Channel

MSE is analyzed to trigger ACM modulation changes

Zero downtime - A must for mission-critical services5Proprietary and Confidential

IP-10 radio capacity - ETSI7MHzACM Point 1 2 3 4 5 6 7 8 Modulation # of E1s 4 6 8 10 12 13 16 18 Ethernet Capacity (Mbps) 9.5 13.5 14 20 19 28 24 34 28 40 32 46 38 54 42 60 ACM Point 1 2 3 4 5 6 7 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

14MHzModulation # of E1s 8 12 18 20 24 29 34 37 Ethernet Capacity (Mbps) 20 - 29 29 - 41 42 - 60 49 70 57 82 69 - 98 81 - 115 87 - 125 # of E1s 32 48 64 75 75 75 75 75

QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of E1s 16 22 32 44 54 66 71 75

28MHzModulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM Ethernet Capacity (Mbps) 38 - 54 53 - 76 77 - 110 103 - 148 127 - 182 156 - 223 167 - 239 183 - 262 ACM Point 1 2 3 4 5 6 7 8

40MHzModulation # of E1s 23 34 51 65 75 75 75 75

8 Ethernet Capacity (Mbps) 56 - 80 82 - 117 122 - 174 153 - 219 188 - 269 214 - 305 239 - 342 262 - 374

56MHzEthernet Capacity (Mbps) 76 - 109 114 - 163 151 - 217 202 - 288 251 - 358 301 - 430 350 - 501 372 - 531

Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

6

Ethernet capacity depends on average packet sizeProprietary and Confidential

Ceragon - Training - Handbook - Page 32

3

3/8/2010

IP-10 radio capacity - FCC10MHzModulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM # of T1s 22 35 52 68 80 84 84 84 # of T1s 7 10 16 18 24 28 30 33 Ethernet Capacity (Mbps) 13 18 19 27 28 40 32 46 42 61 50 71 54 78 60 85 ACM Point 1 2 3 4 5 6 7 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

20MHzModulation # of T1s 16 22 32 38 52 58 67 73 Ethernet Capacity (Mbps) 28 - 40 39 - 56 57 - 81 67 - 96 93 - 133 102 - 146 118 - 169 129 - 185 # of T1s 37 59 74 84 84 84 84 84

30MHzModulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM Ethernet Capacity (Mbps) 39 - 55 62 - 89 93 - 133 120 - 171 142 - 202 164 - 235 185 - 264 204 - 292 ACM Point 1 2 3 4 5 6 7 8

40MHzModulation # of T1s 31 46 69 84 84 84 84 84

8 Ethernet Capacity (Mbps) 56 - 80 82 - 117 122 - 174 153 - 219 188 - 269 214 - 305 239 - 342 262 - 374

50MHzEthernet Capacity (Mbps) 65 - 93 105 - 150 131 - 188 167 - 239 221 - 315 264 - 377 313 - 448 337 - 482

Modulation ACM Point 1 2 3 4 5 6 7 8 QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

QPSK 8 PSK 16 QAM 32 QAM 64 QAM 128 QAM 256 QAM 256 QAM

7

Ethernet capacity depends on average packet sizeProprietary and Confidential

IP-10 Enhanced radio capacity for Ethernet trafficIntelligent Ethernet header compression mechanism (patent pending) Improved effective Ethernet throughput by up to 45% No affect on user traffic

Ethernet packet size (bytes)

Capacity increase by compression

64 96 128 256 5128

45% 29% 22% 11% 5%Proprietary and Confidential

Ceragon - Training - Handbook - Page 33

4

3/8/2010

IP-10 Native2 radio dynamic capacity allocationExample: 28MHz channel bandwidthExample Modulation Example traffic mix

32QAM

128QAM

256QAM

All Ethernet 20 E1s + Ethernet 44 E1s + Ethernet 66 E1s + Ethernet 75 E1s + Ethernet

112Mbps 20 E1s + 66Mbps 44 E1s + 10Mbps -

170Mbps

200Mbps

20 E1s + 123Mbps 20 E1s + 154Mbps 44 E1s + 67Mbps 66 E1s + 15Mbps 44 E1s + 98Mbps 66 E1s + 47Mbps 75 E1s + 25Mbps

9

Proprietary and Confidential

Adaptive Coding & Modulation (ACM)Its all about handling data...

Current Microwave systems are designed withAvailability Equal for all Services

nXT1/E1

?99.99 %

Less availability can be accepted for many data services Need for Services Classification : Microwave systems shall treat services in different ways10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 34

5

3/8/2010

Fewer Hops

1.28km fix rate 200Mbps at 99.999%

2.5km adaptive rate 200Mbps at 99.99% and 40Mbps at 99.999%

0

1km

2km

3km

Assuming: 18GHz link, 28MHz channel, 1 ft antenna, Rain zone K (42mm/hr)

Optional solution for several planning constrains Example - Reducing Hops count until reaching fiber site11Proprietary and Confidential

Decreased tower loads: Wind, Space, Weight4.5km/2.8 miles path, 56MHz channel, 400Mbps, 256QAM, 99.999% availability

Without Adaptive Modulation: requires 4 ft antennasModulation256QAM (2)

Throughput (Mbps)400

Availability (%)99.999

Unavailability of modulation4min, 28sec

Outage 5 minutes and 15 seconds

With Adaptive Modulation: requires 1 ft antennasModulation Throughput (Mbps) Availability (%) Unavailability of modulation

Outage 5 minutes and 15 seconds QPSK 8PSK 16QAM 32QAM 64QAM 128QAM 256QAM (1) 256QAM (2) Assumed rain zone K, 23 [GHz] bandProprietary and Confidential

80 120 160 210 260 320 360 400

99.999 99.998 99.997 99.996 99.995 99.992 99.989 99.985

5min, 3sec 9min, 3sec 11min, 4sec 16min, 42sec 24min, 35sec 37min, 35sec 55min, 33sec 1hr,18min, 13sec Source: Ceragon Networks

Ceragon - Training - Handbook - Page 35

6

3/8/2010

ACM Benefit in TDM to IP migration scenario SMOOTH Migration Typical 4E1 radio QPSK 7MHz channel 99.999% availability 4xE1 7MHz channel

Upgrade to 4E1 + 40Mbps Ethernet 5 TIMES THE CAPACITY SAME ANTENNAS Same 7MHz channel QPSK 256QAM with ACM 99.999% availability for the E1s Low cost, scalable, pay as you grow13

4xE1 + 40Mbps Ethernet 7MHz channel

Proprietary and Confidential

Thank You ! [email protected]

14

Ceragon - Training - Handbook - Page 36

7

Mean Square Error

Agenda

MSE Definition Expected value The Error Histogram Giving bigger differences more weight than smaller differences Calculating MSE MSE in digital modulation Commissioning with MSE MSE and ACM

2

Proprietary and Confidential

1

Ceragon - Training - Handbook - Page 37

MSE - Definition

MSE is used to quantify the difference between an estimated (expected) value and the true value of the quantity being estimated MSE measures the average of the squared errors: MSE is a sort of aggregated error by which the expected value differs from the quantity to be estimated. The difference occurs because of randomness or because the receiver does not account for information that could produce a more accurate estimated RSL

3

Proprietary and Confidential

To simplify.

Imagine a production line where a machine needs to insert one part into the other Both devices must perfectly match Let us assume the width has to be 10cm wide We took a few of parts and measured them to see how many can fit in.

4

Proprietary and Confidential

2

Ceragon - Training - Handbook - Page 38

The Errors Histogram (Gaussian probability distribution function)Quantity

9

Expected value

3 3 1 2width 6cm 7cm 10cm 12cm 16cm

To evaluate how accurate our machine is, we need to know how many parts differ from the expected value 9 parts were perfectly OK5Proprietary and Confidential

The difference from Expected valueQuantity

Error = 0 cm

Error = + 2 cm Error = - 3 cm Error = - 4 cm Error = + 6 cm

width 6cm 7cm 10cm 12cm 16cm

To evaluate the inaccuracy (how sever the situation is) we measure how much the errors differ from expected value

6

Proprietary and Confidential

3

Ceragon - Training - Handbook - Page 39

Giving bigger differences more weight than smaller differencesQuantity Error = 0 cm

+ 2 cm = 4 -3 cm = 9 - 4 cm = 16 + 6 cm = 36 width 6cm 7cm 10cm 12cm 16cm

We convert all errors to absolute values and then we square them The squared values give bigger differences more weight than smaller differences, resulting in a more powerful statistics tool: 16cm parts are 36 units away than 2cm parts which are only 4 units away7Proprietary and Confidential

Calculating MSEQuantity

Error = 0 cm

+ 2 cm = 4 -3 cm = 9 - 4 cm = 16 + 6 cm = 36 width 6cm 7cm 10cm 12cm 16cm

To evaluate the total errors, we sum all the squared errors and take the average: 16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13

The bigger the errors (differences) >> the bigger MSE becomes8Proprietary and Confidential

4

Ceragon - Training - Handbook - Page 40

Calculating MSEQuantity Error = 0 cm

width 10cm If all parts were perfectly produced than each error would be 0 This would result in MSE = 0

Conclusion: systems perform best when MSE is minimum9Proprietary and Confidential

MSE in digital modulation (Radios)Q 01 002 possible states for I signal 2 possible states for Q signalLet us use QPSK (4QAM) as an example: QPSK = 2 bits per symbol

I

= 4 possible states for the combined signal

11

10

The graph shows the expected values (constellation) of the received signal (RSL)

10

Proprietary and Confidential

5

Ceragon - Training - Handbook - Page 41

MSE in digital modulation (Radios)The black dots represent the expected values (constellation) of the received signal (RSL)

Q 01 00

The blue dots represent the actual RSL

I

11

10

Similarly to the previous example, we can say that the bigger the errors are the harder it becomes for the receiver to detect & recover the transmitted signal

11

Proprietary and Confidential

MSE in digital modulation (Radios)

Q 01e2

00e1

MSE would be the average errors of e1 + e2 + e3 + e4.

Ie4 e3 When MSE is very small the actual signal is very close to the expected signal

11

10

12

Proprietary and Confidential

6

Ceragon - Training - Handbook - Page 42

MSE in digital modulation (Radios)

Q 01e2

00e1

When MSE is too big, the actual signal (amplitude & phase) is too far from the expected signal

Ie4 e3

11

10

13

Proprietary and Confidential

Commissioning with MSE in EMS

When you commission your radio link, make sure your MSE is small (-37dB)

Actual values may be read -34dB to -35dB

Bigger values (-18dB) will result in loss of signal

14

Proprietary and Confidential

7

Ceragon - Training - Handbook - Page 43

MSE and ACMWhen the errors become too big, we need a stronger error correction mechanism (FEC) Therefore, we reduce the number of bits per symbol allocated for data and assign the extra bits for correction instead For example 256QAM has great capacity but poor immune to noise 64QAM has less capacity but much better immune for noiseACM Adaptive Code Modulation15Proprietary and Confidential

Thank You ! [email protected]

16

8

Ceragon - Training - Handbook - Page 44

3/14/2010

RFUC&MediationDevices

Proprietary and Confidential

The Most Comprehensive Portfolio FibeAir FamilyRFUs 6-38 GHzRFU-C

Carrier EthernetIP-10 IP-MAX2 3200T

EMS & NMSPolyView (NMS)

Multi-ServiceRFU-HP IP-10 IP-MAX2 640P CeraView (EMS) RFU-P, RFU-SP 1500R/1500P

TDM3200T

2Proprietary and Confidential

Ceragon - Training - Handbook - Page 45

1

3/14/2010

IDU RFU Compatibility

RFU-C

IP-10

RFU-P, RFU-SP

1500R

RFU-HP

IP-IP-MAX2

RFU-SP 640P

1500P3Proprietary and Confidential

IDU IDU Compatibility Across Link1500R 1500R

IP-10 IP 10

IP-10

1500P

1500R

IP-MAX/IP-MAX2

IP-10

1500P chassis Cannot House 1500R IDC and IDMs 1500R chassis Cannot House 1500P IDC and IDMs Must Match IDU Type Across a Link4Proprietary and Confidential

Ceragon - Training - Handbook - Page 46

2

3/14/2010

RFU-C direct mount configurations

1+0 direct

5Proprietary and Confidential

RFU-C direct mount configurations1+1 direct

6Proprietary and Confidential

Ceragon - Training - Handbook - Page 47

3

3/14/2010

RFU-C remote mount configurations

1+0 remote

7Proprietary and Confidential

RFU-C remote mount configurations1+1 remote

8Proprietary and Confidential

Ceragon - Training - Handbook - Page 48

4

3/14/2010

RFU-C antenna adaptors

Adaptors for RFU-P direct antenna mount Adaptors for NSN Flexi Hopper direct antenna mount Adaptors for Ericsson R1A 23GHz direct antenna mount Remote adaptors and configurations

9Proprietary and Confidential

RFU-C to NSN antenna

10Proprietary and Confidential

Ceragon - Training - Handbook - Page 49

5

3/14/2010

RFU-C to Ericsson antenna

(R1A 23GHz)

11Proprietary and Confidential

Antenna Alignment (1)

Connect the headset to AGC monitor BNC/TNC connector on ODU Connect Digital Volt Meter (DVM) to the AGC BNC connector Align the antenna until voltage reading is achieved (1.2 to 1.7Vdc) Repeat antenna alignment at each end until the minimum dc voltage is achieved

1.30vdc = -30dBm 1.45vdc = -45dBm 1.60vdc = -60dBm etc12Proprietary and Confidential

Ceragon - Training - Handbook - Page 50

6

3/14/2010

Antenna Alignment (2)

Compare achieved RX level to calculated RX level Keep aligning until the achieved level is up to 4 dB away from the calculated received signal level If voltage reading is more than 4 dB away or higher than 1.7vdc, re-align antenna to remote site

13Proprietary and Confidential

[email protected] g@ g ThankYou! Thank You !

14Proprietary and Confidential

Ceragon - Training - Handbook - Page 51

7

FibeAir IP-10 G-SeriesFront Panel Description

Proprietary and Confidential

Front Panel Overview

GUI Example)

Lets go over the front panel connections of the IP-10 G-Series We shall explain them one by one, left to right2

Proprietary and Confidential

1

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 52

CLI Serial Connection

DB9 Craft Line Interface (CLI) Baud: 115200 Data bits: 8 Parity: None Stop bits: 1 Flow Control: None3Proprietary and Confidential

EOW Easy Comm. Via Radio

Engineering Order Wire To communicate with your colleague on the other side of the radio link, simply connect here your headset

4

Proprietary and Confidential

2

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 53

External Alarms

DB9 Dry Contact External Alarms The IP-10 supports 5 input alarms and a single output alarm The input alarms are configurable according to:1) Intermediate, 2) Critical, 3) Major, 4) Minor and 5) Warning

The output alarm is configured according to predefined categories5

Proprietary and Confidential

LED Indications

LINK:

GREEN radio link is operational ORANGE - minor BER alarm on radio RED Loss of signal, major BER alarm on radio

IDU:

GREEN IDU functions ok ORANGE - fan failure RED Alarm on IDU (all severities)

RFU:

GREEN RFU functions ok ORANGE Loss of communication (IDU-RFU) RED ODU Failure

6

Proprietary and Confidential

3

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 54

LED Indications

PROT:

Main unit GREEN (when there no alarms) STBY unit: YELLOW (when there no alarms) ORANGE Forced switch, Protection lock RED physical errors (no cable, cable failure) OFF Protection is disabled, or not supported on device

RMT:

GREEN remote unit OK (no alarms) ORANGE minor alarm on remote unit RED major alarm on remote unit

7

Proprietary and Confidential

User Channels (1)

Two software-selectable user channels (RJ-45): A single synchronous channel OR two asynchronous channels Each asynchronous channel will make use of its own RJ-45 external interface The synchronous channel mode will make use of both interfaces (acting as a single interface)8Proprietary and Confidential

4

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 55

User Channels (2)

Modes of operation: V.11 Asynchronous (9600bps) RS-232 Asynchronous (9600bps) V.11 Synchronous Co-Directional (64Kbps) V.11 Synchronous Contra Directional (64Kbps)9Proprietary and Confidential

User Channels (3)

Allowed configurations: Two RS-232 Asynchronous UCs (default) Two V.11 Asynchronous UCs One RS-232 Asynchronous UC, and one V.11 Asynchronous UC One V.11 Synchronous Co-Directional One V.11 Synchronous Contra Directional UC > All settings are copied to Mate when working in Protected mode10Proprietary and Confidential

5

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 56

Protection Port

Protection Port (only for standalone units) Protect your Main unit with a STBY unit Protection ports on both units deliver the proprietary protocol to support automatic or manual switchoverThe FE protection port is static (only used for protection, not traffic). Its switching is performed electrically. If the unit is a stand-alone, an external connection is made through the front panel. If the unit is connected to a backplane, the connection is through the backplane, while the front panel port is unused.11Proprietary and Confidential

T-Cards (Add-on Mezzanines)

Field upgradeable modules (T-Cards): 16 x E1 T-Card (32 total per unit) DS1 T-Card STM1/OC3 MUX T-Card12Proprietary and Confidential

6

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 57

T-Cards (Add-on Mezzanines)

An optional STM-1 interface card can be inserted in a dedicated slot in the system; the card can transmit and receive up to 63 E1s in a channelized STM-1 signal. The supported mapping is VC4 only: VC-12->TU-12->TUG-2->TUG-3->VC-4->AU-4->AUG The STM-1 T-card is only supported in unprotected main units or in unprotected stand-alone IDUs13Proprietary and Confidential

GbE Ports

Two GbE ports, each port with 2 physical interfaces: Port #1: optical (SFP transceiver) or electrical Port #2: optical (SFP transceiver) or electricalGbE ports support QoS as in IP-10 (scheduler, policers, shaper, classifiers)

Port #214Proprietary and Confidential

Port #1

7

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 58

FE Ports

5 FE ports: Port 3: Port 4: Port 5,6 &7: Data Data or WSC (2 Mbps Wayside Channel) Data or local management

All ports support QoS as in IP-10 (scheduler, policers, shaper, classifiers)

15

Proprietary and Confidential

Radio and misc.

The Radio port is the switchs 8th port (same as in IP-10)

In addition Grounding -48vdc Power Connector Fan Drawer

16

Proprietary and Confidential

8

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 59

XC using a Shelf Configuration

XC operation is implemented using two-unit backplanes, which provide the interconnectivity. Up to three backplanes, consisting of six IDUs, can be stacked to provide an expandable system17Proprietary and Confidential

XC using a Shelf ConfigurationAll IDUs that operate within the XC system have identical hardware, and act as stand-alone units.

The 2 lower units can be configured as Main units. The role an IDU plays is determined during installation by its position in the traffic interconnection topology18Proprietary and Confidential

9

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 60

Thank You [email protected]

Proprietary and Confidential

10

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 61

FibeAirIP10GSeries

Installation

Proprietary and Confidential

GeneralIf installation requires CFG file upload & download and / or SW file upload & down -

1. 2. 3.

Make sure FTP Server is installed on your PC FTP is configured (RD/WR permissions) Latest SW version is available (FTP root directory)

FTPinstallationguide isavailableat Training.Ceragon.Com: seeModules/ Installation

2

Proprietary and Confidential

Advanced Operation & Maintenance Course

1Ceragon - Training - Handbook - Page 62

Agenda Site Requirements Packing & Transportation Unpacking Required Tools q IDU Dimensions Installing standalone IDU in a 19 Rack Installing Nodal Enclosures in a 19 Rack Preparing the IDU for a Shelf installation Installing the IDU in a Shelf Installing a Blank Panel IDU in a Shelf Installing a T-Card into an IDU Grounding the IDU Lightning Protection Power General Requirements Installing the IDU-ODU IF cable

3

Proprietary and Confidential

Site Requirements IDU must be located indoors The environment temperature must be between -5 C and +45 C. Easily accessible, but only by authorized personnel. Available power source of -48 VDC, and the site must comply with National Electric Code (NEC) standards. Available management connection (Ethernet or dial-up). IDU-ODU connection (IF cable): no more than 300m

4

Proprietary and Confidential

Advanced Operation & Maintenance Course

2Ceragon - Training - Handbook - Page 63

Site RequirementsHeat Dissipation:The IP-10 IDU overall heat dissipation is 25W max (~85 BTU/h). The ODU heat dissipation is 100W max. p

Antenna Location:As with any type of construction, a local permit may be required before installing an antenna. It is the owners responsibility to obtain any and all permits.

5

Proprietary and Confidential

Packing & TransportationThe equipment is packed at the factory, and sealed moisture-absorbing bags are inserted. The equipment is prepared for public transportation. The cargo must be kept dry during transportation. Keep items in their original boxes till they reach their final destination. If intermediate storage is required, the packed equipment must be stored in dry and cool conditions and out of direct sunlight When unpacking Wh ki Check the packing lists, and ensure that the correct part numbers and quantities of components arrived.

6

Proprietary and Confidential

Advanced Operation & Maintenance Course

3Ceragon - Training - Handbook - Page 64

UnpackingA single FibeAir system (1+0) is shipped in 5 crates.

Upon delivery, make sure that the following items are included: Two indoor units and accessories Two outdoor units For 13-38 GHz systems, verify that there is a high RFU and low RFU. One CD with a management user guide.

Unpack the contents and check for damaged or missing parts. If any part is damaged or missing, contact your local distributor.

7

Proprietary and Confidential

Required ToolsThe following tools are required to install the IDU:

Philips screwdriver #2 (for mounting the IDU to the rack and grounding screw) Flathead small screwdriver (for PSU connector) Sharp cutting knife (for wire stripping) Crimping tool for ground cable lug crimping (optional: if alternative grounding cable is used)

Setting up Management will require ETH cable (for setting management) Serial Cable (for setting management)8Proprietary and Confidential

Advanced Operation & Maintenance Course

4Ceragon - Training - Handbook - Page 65

SpecificationsConnector spec, cable spec & interface pin layout can be found in our complete PDF installation guide

installation guides available at Training.Ceragon.Com: see M d l / Installation Modules I t ll ti

9

Proprietary and Confidential

IDU Dimensions

42.60mm

10

Proprietary and Confidential

Advanced Operation & Maintenance Course

5Ceragon - Training - Handbook - Page 66

Installing standalone IDU in a 19 Rack

As shown in the illustration, four screws, supplied with the installation kit, are used to secure the IDU to the rack kit rack.

11

Proprietary and Confidential

Installing Nodal Enclosures in a 19 Rack

12

Proprietary and Confidential

Advanced Operation & Maintenance Course

6Ceragon - Training - Handbook - Page 67

Installing Nodal Enclosures in a 19 RackBefore you install the enclosures Plan carefully the required space within the rack ! Should you need to install 3 enclosures prepare at least 10Us (6Us for enclosures + 2Us free Main Enclosurespace for maneuvering above and below shelves)

Start the installation process from bottom to top, e.g. Main enclosure should be installed first at the bottom of your rack space13Proprietary and Confidential

Installing Nodal Enclosures in a 19 RackStep #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws.

14

Proprietary and Confidential

Advanced Operation & Maintenance Course

7Ceragon - Training - Handbook - Page 68

Installing Nodal Enclosures in a 19 RackStep #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws. Step #2: Slide down the 2nd extension enclosure. Male connector should plug in smoothly into the Main enclosure.

15

Proprietary and Confidential

Installing Nodal Enclosures in a 19 RackStep #1: Install the IP-10 Main enclosure in the 19 inch rack using 4 screws. Step #2: Slide down the 2nd extension enclosure. Male connector should plug in smoothly into the Main enclosure. Step #3: Slide down the 2nd extension enclosure. Male connector should be plugged in smoothly into the Main enclosure.

16

Proprietary and Confidential

Advanced Operation & Maintenance Course

8Ceragon - Training - Handbook - Page 69

Installing Nodal Enclosures in a 19 RackStep #4: Secure the 2nd extension into the Main enclosure. Use the built-in screw. Mount the 2nd extension into the rack using the 4 screws

17

Proprietary and Confidential

Installing Nodal Enclosures in a 19 RackStep #4: Secure the 2nd extension into the Main enclosure. Use the built-in screw. Mount the 2nd extension into the rack using the 4 screws Step #5: Add the 3rd extension when needed

18

Proprietary and Confidential

Advanced Operation & Maintenance Course

9Ceragon - Training - Handbook - Page 70

Preparing the IDU for a Shelf installationRemove the two 19" brackets mounted on the IP-10 IDU by unscrewing the 3 screws at each side.

19

Proprietary and Confidential

Installing the IDU in a ShelfSlide the IP-10 IDU into the enclosure and tighten it using 2 screws. Repeat this step in accordance with the configuration.

IDU insertion & extraction should NOT be under power

20

Proprietary and Confidential

Advanced Operation & Maintenance Course

10Ceragon - Training - Handbook - Page 71

Installing a Blank Panel IDU in a ShelfSlide the IP-10 blank panel into the enclosure, and tighten it using 2 screws.

21

Proprietary and Confidential

Installing a T-Card into an IDURemove the IP-10 T-Card blank panel from the IDU, by releasing the 2 side screws.

22

Proprietary and Confidential

Advanced Operation & Maintenance Course

11Ceragon - Training - Handbook - Page 72

Installing a T-Card into an IDUInsert the IP-10 T-Card panel and tighten it using the 2 side screws.

23

Proprietary and Confidential

Grounding the IDU

Single Point Stud Grounding Wire

24

Proprietary and Confidential

Advanced Operation & Maintenance Course

12Ceragon - Training - Handbook - Page 73

Grounding the IDU The IDU is suitable for installation in a Common Bonding Network (CBN). Only copper wire should be used. The wire must be at least 14 AWG. Connector and connection surfaces must be plated. Bare conductors must be coated with antioxidant before crimp connections are made to the screws. FibeAir provides a ground for each IDU, via a one-hole mounted lug onto a single-point stud. t be installed i i l d two star t Th stud must b i t ll d using a UL li t d ring t The t d UL-listed i tongue t terminal, and t washers for anti-rotation.

25

Proprietary and Confidential

Lightning ProtectionFor antenna ports, lightning protection is used that does not permit transients of a greater magnitude than the following: Open Circuit: 1.2-50us 600V Short Circuit: 8-20us 300A The ampacity of the conductor connecting the IDU frame to the DC return conductor is equal to or greater than, the ampacity of the associated DC return conductor.

26

Proprietary and Confidential

Advanced Operation & Maintenance Course

13Ceragon - Training - Handbook - Page 74

Power General Requirements1. A readily accessible Listed branch circuit over-current protective device, rated 15 A, must be incorporated in the building wiring. 2. This equipment is designed to permit connection between the earthed conductor of the DC supply circuit and the earthing conductor at the equipment. 3. The equipment shall be connected to a properly grounded supply system 4. The DC supply system is to be local, i.e. within the same premises as the equipment 5. A disconnect device is not allowed in the grounded circuit between the DC supply source and the frame/grounded circuit connection.

27

Proprietary and Confidential

Power RequirementsWhen selecting a power source, the following must be considered: DC power can be from -40.5 VDC to -60 VDC. Recommended: Availability of a UPS (Uninterrupted Power Source), battery backup, and emergency power generator. Whether or not the power source provides constant power (i.e., power is secured on weekends or is shut off frequently and consistently). The power supply must have grounding points on the AC and DC sides. Th user power supply GND must be connected to the positive pole i th IDU The l tb t d t th iti l in the power supply. Any other connection may cause damage to the system!

28

Proprietary and Confidential

Advanced Operation & Maintenance Course

14Ceragon - Training - Handbook - Page 75

Power RequirementsImportant Make sure to use a circuit breaker to protect the circuit from damage by short or overload.

29

Proprietary and Confidential

Installing the IDU-ODU IF cableRoute the IF Coax Cable from the IDU to the ODU/RFU and terminate it with N-type male connectors. Note: Make sure you fasten the cable along the ladder! Make sure that the inner pin of the connector does not exceed the edge of the connector. The cable should have a maximum attenuation of 30 dB at 350 MHz.

30

Proprietary and Confidential

Advanced Operation & Maintenance Course

15Ceragon - Training - Handbook - Page 76

[email protected]

Proprietary and Confidential

Advanced Operation & Maintenance Course

16Ceragon - Training - Handbook - Page 77

FibeAirIP10GSeries

Setting Management

Proprietary and Confidential

Agenda Getting started General notes General commands Command history y Reading current IP Setting new IP Connecting PC to IDU Troubleshooting Factory Defaults

2Proprietary and Confidential

1

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 78

Getting startedVerify that physical installation is successfully completed: IDU is properly mounted in a shelf / rack Power + GND IF Cable between IDU and ODU Connect a PC to the Terminal connector and launch a serial application Baud: 115200 Data bits: 8 Parity: None St bit 1 Stop bits: Flow Control: None

YoumayuseanySerial ApplicationsuchasHyper Terminal PuTTY TeraTerm Terminal,PuTTY,TeraTerm etc

Log on using (admin/admin) for user name and password. Now, you should be able to see the IP-10 CLI Prompt3Proprietary and Confidential

General notes on CLI

IP-10:/>

Note that the

> sign indicates your current directory in the CLI tree

Most of the CLI commands are based on GET/SET concept Some commands may require a different syntax Ceragon strongly recommends to use CLI only for setting management IP address when current IP is unknown All functions & features can be configured faster and easier using the WEB based EMS4Proprietary and Confidential

2

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 79

General CommandsIP-10:/ >? IP-10:/ls IP-10:/lsp IP-10:/ > exit / IP-10:/ > cd IP-10:/ > cd ..

Type ? (question mark) to list helpful commands Type ls to list your current directory Type lsp to available commands of current directory Type exit to terminate the session Type cd to change directory Type cd .. to return to root directory5Proprietary and Confidential

Command History

Use the arrow keys to navigate through recent commands

Use the TAB key to auto-complete a syntax

6Proprietary and Confidential

3

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 80

Reading current IPTo read current IP type the following:

IP-10:/>cd management/networking/ip-address/ IP-10:/ management/networking/ip-address>Note that the prompt has changed. Now, type get ip-address:

IP-10:/ management/networking/ip-address>get ip-addressUpon completion, the current IP will be displayed followed by the new completion displayed, prompt:

IP-10:/ management/networking/ip-address>get ip-address 192.168.1.1 IP-10:/ management/networking/ip-address>7Proprietary and Confidential

Setting new IPNow, let us set a new IP for the MNG: We assume the required IP is 192.168.1.144 Type set ip-address 192.168.1.144IP-10:/ management/networking/ip-address>set ip-address 192.168.1.144

Upon completion, you will be prompt:

You may lose remote management connection to the unit if this value is changed incorrectly. Are you sure? (yes/no):Type yes and connect the IDU to your network / PC8Proprietary and Confidential

4

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 81

Connecting IDU to EMS1. Connect your EMS/NMS to the IDU (port 7) with ETH CAT.5 cable 2. Verify that your PCs IP is in the same subnet 3. 3 Make sure Link is up 4. PING the IDU 5. Launch a WEB browser with the URL set as the IDUs IP

9Proprietary and Confidential

Management TroubleshootingIn case PC cannot PING IDU 1. Check your ETH cable it might not be inserted properly (broken PIN) 2. Verify the management port is enabled in the EMS General/Management configuration 3. Make sure you connect to a management-enabled port (7, 6 or 5) 4. Verify right LED is ON (see below) 5. Verify your PC is in the same subnet as the IDU 6. In case your IDU is connected to a router: set the IDUs Default GW = Router IP 7. In case your PC is connected to several IDUs (through switch/hub) make sure every IDU has a unique IP When ON (Green) = Port is set to Management When OFF = Port is set to Data

10Proprietary and Confidential

5

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 82

Back to factory defaultsGoing back to factory defaults can be done with EMS or CLI In case you need to set factory defaults with CLI type the following -

IP-10:/> cd management/mng-services/cfg-service

In the new directory type the following:

IP-10:/management/mng-services/cfg-service>set-to-default

11Proprietary and Confidential

[email protected]

Proprietary and Confidential

6

Advanced Operation & Maintenance CourseCeragon - Training - Handbook - Page 83

3/7/2010

FibeAir IP-10 G-SeriesEMS Performance Monitoring

Proprietary and Confidential

AgendaEMS General Information Faults: Current Alarms Event Log PM & Counters: Remote Monitoring TDM Trails TDM interfaces Radio (RSL, TSL, MRMC and MSE) Radio TDM Radio ETH2Proprietary and Confidential

Ceragon - Training - Handbook - Page 84

1

3/7/2010

EMS - General

Easy, user friendly GUI No need to install an application WEB Based software No need to upgrade your EMS application embedded in the IDU SW No need for strong working station simple PC is sufficient(For maintenance issues FTP Server is required)

Easy access simply type the IP address of the IDU on your web page Supports all IDU versions and configurations

3

Proprietary and Confidential

EMS Main ViewAccess application via IP address

User friendly navigation menu

Proprietary and Confidential

Ceragon - Training - Handbook - Page 85

2

3/7/2010

EMS Main ViewGraphical MENU: Click to configure

Proprietary and Confidential

EMS Main View

Protection Status Display & Quick Access Icons

Proprietary and Confidential

Ceragon - Training - Handbook - Page 86

3

3/7/2010

EMS Main ViewIn this example slot #1 and slot #2 are configured to support 1+1 Protection Slot #1 is selected and in Active mode.

Black Rectangular to indicate selected slot for configuration

Proprietary and Confidential

EMS Main ViewWhen the user selects Slot 2 the GUI updates automatically

Proprietary and Confidential

Ceragon - Training - Handbook - Page 87

4

3/7/2010

Faults - CASThe CAS window shows collapsed list of alarms By expanding a line we can see additional information: Probable cause Corrective Actions

Proprietary and Confidential

Faults Event LogThe Event Log shows max. 200 lines of events When Event #201 occurs, Event #1 is erased and #201 is logged as #200.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 88

5

3/7/2010

PM Clearing previous dataTo erase all IDU PM data, click the CLEAR button -

Proprietary and Confidential

PM RMONThe system supports Ethernet statistics counters (RMON) display. The counters are designed to support: RFC 2819 RMON MIB. RFC 2665 Ethernet-like MIB. RFC 2233 MIB II. RFC 1493 Bridge MIB.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 89

6

3/7/2010

PM RMON Special RegistersRMON register / Counter Undersize frames received Oversize frames received Jabber frames received Fragments frames received Rx error frames received FCS frames received In Discard Frames In Filtered Frames Pause frames received Description Frames shorter than 64 bytes Frames longer than 1632 bytes Total frames received with a length of more than 1632 bytes, but with an invalid FCS Total frames received with a length of less than 64 bytes, and an invalid FCS Total frames received with Phy-error Total frames received with CRC error, not countered in "Fragments", "Jabber" or "Rx error" counters Counts good frames that cannot be forwarded due to lack of buffer memory Counts good frames that were filtered due to egress switch VLAN policy rules Number of flow-control pause frames receivedProprietary and Confidential

PM TDM Trails In DetailReport Interval: The number of trails in the list is derived from radio link capacity (default license = 10Mbps)

Display 15 minutes intervals or single Daily interval (24 hours) Information can be displayed as a graph

Proprietary and Confidential

Ceragon - Training - Handbook - Page 90

7

3/7/2010

PM TDM Trails In DetailErrored Second (ES): A one-second period with one or more errored blocks or at least one defect

Proprietary and Confidential

PM TDM Trails In DetailSeverely Errored Second (SES): A one-second period, which contains 30% errored blocks or at least one defect. SES is a subset of ES.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 91

8

3/7/2010

PM TDM Trails In DetailA period of unavailable time begins at the onset of 10 consecutive Severely Errored Second (SES) events. These 10 seconds are considered to be part of unavailable time. A new period of available time begins at the onset of 10 consecutive non-SES events. These 10 seconds are considered to be part of available time.

Proprietary and Confidential

PM TDM Trails In DetailBackground Block Error (BBE): An errored block not occurring as part of a SES.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 92

9

3/7/2010

PM TDM Trails In DetailNumber of Switches (only relevant for Protected SNCP Trails): The number of times the IP-10 switched from Primary Path to Secondary Path and vice versa (per 15min or 24hrs interval)

Proprietary and Confidential

PM TDM Trails In DetailActive Path Seconds (only relevant for Protected SNCP Trails): The number of times seconds the Active Path was available

Proprietary and Confidential

Ceragon - Training - Handbook - Page 93

10

3/7/2010

PM TDM Trails In DetailIntegrity: Indicates whether information is reliable for analysis (ticked) or not For example if clock was changed or system was restarted during this interval then information is not reliable

Proprietary and Confidential

PM E1 / DS-1 (Radio PM)This PM data relates to the TDM Line Interfaces.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 94

11

3/7/2010

PM E1 / DS-1 (Radio PM)Here we can analyze TDM PM through the radio link

Proprietary and Confidential

PM STM-1 InterfaceThis PM data relates to the STM-1 Line Interface.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 95

12

3/7/2010

PM RadioSignal Level RSL & TSL analysis Allows setting RSL & TSL thresholds EMS will notify when signal exceeds THSLD >> Easier maintenance

Aggregated radio traffic analysis MRMC PM related to ACM: Scripts Bit rate Radio VCs MSE analysisProprietary and Confidential

PM Radio Signal Level - Example

- 40dBm = Nominal RSL for an operational Link Level 1: 25 sec Level 2: 15 sec 900 sec = 15min IntervalProprietary and Confidential

Ceragon - Training - Handbook - Page 96

13

3/7/2010

PM Radio Signal Level - ExampleUsing graphical display of the THSLD analysis allows us easier examination of the RSL & TSL state throughout certain period of time

RSL -40

-50

-68

-99 10 5 10

T [sec]

Proprietary and Confidential

PM Radio - AggregateAggregated radio traffic analysis

Proprietary and Confidential

Ceragon - Training - Handbook - Page 97

14

3/7/2010

PM Radio - MRMCThe information displayed in this page is derived from the license and script assigned to the radio. When ACM is enabled and active, as link quality degrades or improves, the information is updated accordingly.

Proprietary and Confidential

PM Radio - MSEThe information displayed in this page is derived from the license and script assigned to the radio. When link quality degrades or improves, the MSE reading is updated accordingly. Differences of 3dB trigger ACM modulation changing. Threshold can be configured as well for easier maintenance.

Proprietary and Confidential

Ceragon - Training - Handbook - Page 98

15

3/7/2010

PM EthernetETH Traffic + Threshold settings: Frame Error Rate Frame error rate (%) measured on radio-Ethernet interface Throughput data bits measured on radioEthernet interface Capacity - overall Ethernet bits rate, data & overhead, measured on radio-Ethernet interface Utilization - (Actual Ethernet throughput, relative to the potential Ethernet throughput of the radio, excluding TDM channels). Utilization (%) is displayed as one of five bins: 0-20%, 20-40%, 40-60%, 60-80%, 80-100%Proprietary and Confidential

PM Ethernet

Ethernet throughput & Capacity PMs are measured by accumulating the number of Ethernet octets every second, as they are counted by the RMON counters

Proprietary and Confidential

Ceragon - Training - Handbook - Page 99

16

3/7/2010

Thank You ! [email protected]

33

Ceragon - Training - Handbook - Page 100

17

3/7/2010

FibeAir IP-10 G-SeriesEMS General Configuration

Agenda

In this module we shall explain the following features as they appear on the EMS navigation Menu

2

Proprietary and Confidential

Ceragon - Training - Handbook - Page 101

1

3/7/2010

Unit Parameters Step # 1

Configure specific information that may assist you later Such info will help you locate your site easier and faster

3

Proprietary and Confidential

Unit Parameters Step # 1

VDC reading

4

Proprietary and Confidential

Ceragon - Training - Handbook - Page 102

2

3/7/2010

Unit Parameters Step # 1

Celsius (metric) or Fahrenheit (Imperial)5Proprietary and Confidential

Unit Parameters Step # 2

By default the time & date are derived from the operating system clock User may set new values These settings are also used for NTP connection (later explained)

6

Proprietary and Confidential

Ceragon - Training - Handbook - Page 103

3

3/7/2010

Unit Parameters Step # 3IDU Serial number is important when you submit your request for a License upgrade

When you complete configuring all settings, click Apply.

7

Proprietary and Confidential

Versions

This page shows the complete package of IDU and ODU software components8Proprietary and Confidential

Ceragon - Training - Handbook - Page 104

4

3/7/2010

Versions

Lets explore this example: The IDU running SW is displayed in the aidu line and currently it is 3.0.92 A new SW was downloaded sometime in the past (3.0.97) The IDU was not upgraded yet

9

Proprietary and Confidential

Versions RFU files

The IDU holds all the SW files for all the components (IDU + ODU) You can see here the different files per ODU type

10

Proprietary and Confidential

Ceragon - Training - Handbook - Page 105

5

3/7/2010

External Alarms Collapsed Input Alarm Config.

Dry Contact Alarms (DB-9): 5 Inputs 1 Output11Proprietary and Confidential

External Alarms Expended Input Alarm Config.

12

Proprietary and Confidential

Ceragon - Training - Handbook - Page 106

6

3/7/2010

External Alarms Configuring the Output AlarmGroup of alarms will trigger the external alarm Output. Communication Alarms related to traffic: Radio / Ethernet line / TDM line Quality of Service We do not have specific alarms of QoS Processing Alarms related to SW: Configuration / Resets / corrupted files Equipment Alarms related to: HW / FAN / RFU mute / Power Supply / Inventory. Environmental Alarms of extreme temperature. All Groups.

Test mode manual switch.

13

Proprietary and Confidential

Management Network Properties

Here you can set the Network Properties of the IDU

This is the switch MAC address

If your link is up you should be able to see the other ends IP

14

Proprietary and Confidential

Ceragon - Training - Handbook - Page 107

7

3/7/2010

Management Local Properties (Out of band)

The IDU has 3 ports for local management: Port 7, Port 6 and Port 5. You may enable none or up to 3 ports: Number of ports =3 Number of ports =2 Number of ports =1 Number of ports =015

Port 7, Port 6, Port 5 Port 7, Port 6 Port 7 NO LOCAL MANAGEMENT !!!Proprietary and Confidential

Management In Band Properties

In Band Management requires unique VLAN ID This helps separating MNG traffic from other services In Band MNG packets are transferred via the radio link When the link is down, management is down as well.

16

Proprietary and Confidential

Ceragon - Training - Handbook - Page 108

8

3/7/2010

Management Port Properties

These parameters allow you setting the management capacity and port properties

17

Proprietary and Confidential

Trap Configuration (OSS / NMS / Northbound)

To manage the IDU with OSS / NMS, you will need to configure the IP address of the OSS Server You may configure up to 4 Servers (Trap Destinations)

18

Proprietary and Confidential

Ceragon - Training - Handbook - Page 109

9

3/7/2010

Licensing Default LicenseDemo license can be enabled on-site, it expires after 60 days (operational time) Licenses are generated per IDU S/N upon request (capacity / ACM / switch mode)

License upgrade requires system reset.

19

Proprietary and Confidential

Licensing Demo License Enabled

Demo License allows you full evaluation of the IDU functionality, features and capacities

20

Proprietary and Confidential

Ceragon - Training - Handbook - Page 110

10

3/7/2010

NTP Client Properties Enable / Disable Type NTP Server IP address Expect IDU to lock on NTP Servers clock Expected Status: 1. If locked, it returns the IP address of the server it is locked on. 2. Local if the NTP client is locked to the local elements real-time clock 3. NA - if not synchronized with any clock (valid only when Admin is set to Disable).The feature supports Time Offset and Daylight Saving Time. Time Offset and Daylight Saving Time can be configured via WEB (Unit Information page) or via CLI: /management/mng-services/time-service>

21

Proprietary and Confidential

NTP Properties

22

Proprietary and Confidential

Ceragon - Training - Handbook - Page 111

11

3/7/2010

NTP PropertiesWhen using NTP with external protection 1+1, both Active and Standby units should be locked independently on the NTP server, and report independently their Sync status.

Time & Date are not copied from the Active unit to the Standby unit (CQ19584) When using NTP in a shelf configuration, all units in the shelf (including standby main units) are automatically synchronized to the active main units clock.

23

Proprietary and Confidential

IP Table

Here you can manually set your neighbors network properties

24

Proprietary and Confidential

Ceragon - Training - Handbook - Page 112

12

3/7/2010

SNMP V1 V3

No security Authentication Authentication privacy SHA MD5 No Authentication

25

Proprietary and Confidential

Thank You ! [email protected]

26

Ceragon - Training - Handbook - Page 113

13

3/7/2010

FibeAir IP-10 G-SeriesEMS Switch Configuration

Agenda

1. Switch mode review 2. Guidelines 3. Single Pipe Configuration 4. Managed Mode Configuration 5. Managed Mode Common Applications

2

Proprietary and Confidential

Ceragon - Training - Handbook - Page 114

1

3/7/2010

Switch Modes1. Single (Smart) Pipe (default mode, does not require license) This application allows only single GbE interface as traffic interface (Optical GbE-SFP or Electrical GbE - 10/100/1000). Any traffic coming from any GbE interface will be sent directly to the radio and vice versa. This application allows QoS configuration. Other FE (10/100) interfaces can be configured to be "functional" interfaces (WSC, Protection, Management), otherwise they are shut down. Note: (CQ20473): Single pipe discards PAUSE PDU (01-80-C2-00-00-01) and Slow protocols PDU (01-80-C2-00-00-02).

3

Proprietary and Confidential

Switch Modes2. Managed Mode (license depended) This application is 802.1Q VLAN aware bridge, allowing L2 switching based on VLANs. This application also allows QoS configuration. All Ethernet ports are allowed for traffic. Each traffic port can be configured to be "access" port or "trunk" port:

Type

VLANs Specific VLAN should be assigned to access the port A range of VLANs should be assigned to access the Port

Allowed Ingress Frames Only Untagged frames (or Tagged with VID=0 "Priority Tagged ) Only Tagged frames

Allowed Egress Frames Untagged frames

Access

Trunk

Tagged frames

4

Proprietary and Confidential

Ceragon - Training - Handbook - Page 115

2

3/7/2010

Switch Modes3. Metro Mode (license depended)

This application is 802.1Q VLAN aware bridge, allowing Q-in-Q (A.K.A. VLAN Stacking). This mode allows the configuration of a PE port and CE port.Allowed Ingress Frames Allowed Egress Frames Untagged or C-tag (ether-type= 0x8100) frames. Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200

Type CustomerNetwork

VLANs

Specific S-VLAN should be Untagged frames, or assigned to "Customerframes with C-tag Network" port (ether-type=0x8100). Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200Proprietary and Confidential

ProviderNetwork

A range of S-VLANs, or "all" S-VLANs should be assigned to "ProviderNetwork" port

5

Guidelines

Changing switch modes requires a reset Resets do not change the IP-10G settings (radio, configuration, etc.) VLANs need to be created in the switch DB before assigned to a port

6

Proprietary and Confidential

Ceragon - Training - Handbook - Page 116

3

3/7/2010

Single Pipe Configuration7Proprietary and Confidential

Single Pipe Configuration

Untagged VID 4 VID 100 45 VID 51

IP-10 Switch

Port 1: GbE (Optical or Electrical) Port 3: FE (RJ45)

Port 8 (Radio)

8

Proprietary and Confidential

Ceragon - Training - Handbook - Page 117

4

3/7/2010

Configuration Single Pipe

This is the default setting

9

Proprietary and Confidential

Configuration Single Pipe

Only one ingress port can be used:

Port 1 (Opt. or Elec.) Port 3 (RJ45)

When one is enabled the other is disabled No need to configure VID membership10Proprietary and Confidential

Ceragon - Training - Handbook - Page 118

5

3/7/2010

Managed Mode Configuration11Proprietary and Confidential

Configuration Managed ModeLets use this diagram as an example Port #2 as Trunk (VID 200)

IDU-B IDU-A

Port #3 as Trunk (VID 300)

Radios as Trunk by default

Port #2 as Trunk (VID 200, VID 300)

12

Proprietary and Confidential

Ceragon - Training - Handbook - Page 119

6

3/7/2010

Configuration Managed ModeMake sure both IDUs are aware of the required VIDs You need to create the VIDs before you assign them to a certain port (Set # & Apply)

13

Proprietary and Confidential

Configuration Managed ModeNext steps: 1. Go to Interfaces page 2. Enable the required port (Ingress ports) 3. Configure the port type as Trunk or Access 4. Assign allowed VLAN IDs (port membership) 5. Radio port is automatically configured as Trunk, all VLANs are allowed by default

14

Proprietary and Confidential

Ceragon - Training - Handbook - Page 120

7

3/7/2010

Configuration Managed Mode

1

2 3

415Proprietary and Confidential

Configuration Managed Mode Common ApplicationsTagging / untangling

IP-10Access Port Radio = Trunk Port Transmits and receives Untagged frames

Transmits and receives Untagged frames

PC192.168.1.200

PC192.168.1.100

16

Proprietary and Confidential

Ceragon - Training - Handbook - Page 121

8

3/7/2010

Configuration Managed Mode Common Applications

Radio = Trunk Port

IP-10Trunk Port

Multiple L2 streams, each identified with unique VID

Traffic GeneratorTrunk Port

17

Proprietary and Confidential

Thank You ! [email protected]

18

Ceragon - Training - Handbook - Page 122

9

3/7/2010

802.1: Trunk VS. Access

Agenda1. VLAN TAG Attributes 2. Access Port 3. Trunk Port 4. Extracting frames out of a trunk 5. General Guidelines 6. EMS Trunk Configuration

2

Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 123

1

3/7/2010

VLAN TAG Attributes1. In L2 ETH switching, L2 traffic can be engineered using the VLAN TAG attributes L2 traffic is controlled by defining port membership: Access or Trunk Together, port membership + L2 traffic engineering convert connectionless to connection-oriented network In such networks, services are better deployed and maintained VLAN TAG attributes include: VLAN ID (12 bits) Priority Bits (3 bits) Additional attributes may be used to engineer traffic: MAC DA Port numberCeragon Networks proprietary and confidential

2. 3.

4. 5. 5. 3

Access Port Access Port is a port which is aware of a single VLAN only Ingress traffic is expected to be Untagged, e.g. no VLAN information exists within the received Ethernet frame All frames that are received through this port are tagged with default VLAN (VID + P bits) All frames that exit through this port towards customer devices are untagged (VLAN is removed) Users can configure the L2 switch to assign different tagging scenarios to different ports

4

Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 124

2

3/7/2010

Access Port Let us examine the Tagging / Untagging process of a L2 switch

L2 ETH SW

DA

SA

Type

Payload

FCS

5

Ceragon Networks proprietary and confidential

Access Port Tagging ingress frames Let us examine the Tagging / Untagging process of Port #1

Tagging

Port #1DA SA VLAN TAG

Port #8Type Payload FCS

Tagged frameDA SA Type Payload FCS

Access Port:Untagged frame6Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 125

3

3/7/2010

Access Port Utagging frames towards customer interfacing ports When Tagged frame from Network is forwarded to Access port, the VLAN Tag is removed

Untagging

Port #1DA SA VLAN TAG

Port #8Type Payload FCS

Tagged frameDA SA Type Payload FCS

Access Port: Untagged frame7Ceragon Networks proprietary and confidential

Access Port Tagging multiple ports The switch can individually tag multiple Access ports with same VID or unique VID

Tagging

Port #8 Port #1 Port #2DA DA SA Type Payload FCS SA Type Payload FCS DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS

DA

Access Ports: Untagged frames8Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 126

4

3/7/2010

Trunk Port multiple VIDs awareness To be able to transmit & receive multiple VLANs, the common port has to be configured as a Trunk Port

Trunk Port

Port #8 Port #1 Port #2DA DA SA Type Payload FCS SA Type Payload FCS DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS

DA

Access ports: Untagged frames9Ceragon Networks proprietary and confidential

Trunk Port multiple VIDs awareness Any port can be configured as Trunk In this example, port #2 is facing customer device to forward all the network VLANs (TX&RX)Trunk Port

Port #8 Port #2DA DA DA SA VLAN TAG = 10 Type Type Payload Payload FCS FCS SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS

SA VLAN TAG DA Untagged frames = 3310

Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 127

5

3/7/2010

Trunk & Access Extracting frames out of a Trunk A certain VLAN can be extracted out of a Trunk via Access port assigned with specific VLAN membership (Default VID)Type Payload FCS DA SA VLAN TAG = 33 Type Payload FCS

DA

SA

Port #5: Access

Port #8: Trunk Port #2: TrunkDA DA SA SA VLAN TAG = 10 VLAN TAG = 33 Type Type Payload Payload FCS FCS

DA

SA

VLAN TAG = 10

Type Type

Payload Payload

FCS FCS

SA VLAN DA Untagged frames TAG = 33 11

Ceragon Networks proprietary and confidential

General guidelines Access port can only receive untagged frames from customer device Access port can only transmit untagged frames towards customer device Access port supports single VLAN Access port can be connected to an Access port only Trunk port can only receive / transmit tagged frames Trunk port supports multiple VLANs Trunk port can be connected to a Trunk port only When configuring Access or Trunk port, membership needs to be defined next (which VLANs are supported)

12

Ceragon Networks proprietary and confidential

Ceragon - Training - Handbook - Page 128

6

3/7/2010

EMS Trunk Configuration

1

2 3

413Ceragon Networks proprietary and confidential

Thank You ! [email protected]

14

Ceragon - Training - Handbook - Page 129

7

3/7/2010

FibeAir IP-10 G-SeriesEMS Metro Switch Configuration

Proprietary and Confidential

Agenda

1. Metro mode review 2. Common Applications: CN PN PN CN 3. Common Applications: CN PN PN PN 4. Switch Mode Configuration 5. CN Port Configuration 6. PN Port Configuration

2

Proprietary and Confidential

Ceragon - Training - Handbook - Page 130

1

3/7/2010

Metro Mode (license depended)This application is 802.1Q VLAN aware bridge, allowing Q-in-Q (A.K.A. VLAN Stacking). This mode allows the configuration of a PE port and CE port.Type CustomerNetwork VLANs Allowed Ingress Frames Allowed Egress Frames Untagged or C-tag (ether-type= 0x8100) frames. Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200

Specific S-VLAN should be Untagged frames, or assigned to "Customerframes with C-tag Network" port (ether-type=0x8100). Configurable S-tag. (ether-type) 0x88a8 0x8100 0x9100 0x9200

ProviderNetwork

A range of S-VLANs, or "all" S-VLANs should be assigned to "ProviderNetwork" port

3

Proprietary and Confidential

Common Configurations: CN PN PN CNProvider-Facing Port (PN) 1st VID is hidden Only S-VLAN is visible

Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite direction

Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite directionProprietary and Confidential

4

Ceragon - Training - Handbook - Page 131

2

3/7/2010

Common Configurations: CN PN PN PNProvider-Facing Port (PN) 1st VID is hidden Only S-VLAN is visible

Customer-Facing Port (CN) Ingress frame (C-VLAN) is encapsulated with 2nd VID (S-VLAN) CN port removes S-VLAN on opposite direction Provider-Facing Port (PN) S-VLAN is not removed

5

Proprietary and Confidential

Switch Mode Configuration

1

21. Set mode to Metro (requires reset) 2. Add the S-VLAN ID (set & apply)

6

Proprietary and Confidential

Ceragon - Training - Handbook - Page 132

3

3/7/2010

CN Port Configuration1. Go to Interfaces / Ethernet Ports page 2. Enable the port 3. Set the type to Customer Network 4. Type the port ID (EVC name, free string) 5. Type the S-VLAN ID 6. Enable Port Learning 7. Apply & Refresh 8. See screen capture next slide7Proprietary and Confidential

CN Port Configuration

2 1 4 5 3

68Proprietary and Confidential

Ceragon - Training - Handbook - Page 133

4

3/7/2010

PN Port Configuration1. Go to Interfaces / Ethernet Ports page 2. Enable the port 3. Set the type to Provider Network 4. Enable Port Learning 5. Edit (if needed) the allowed S-VLANs 6. Apply & Refresh 7. Set the required S-Tag (Ether-Type) 8. See screen capture next slide9Proprietary and Confidential

PN Port Configuration

2 1 1 4 6 510Proprietary and Confidential

3

Ceragon - Training - Handbook - Page 134

5

3/7/2010

PN Port Configuration Setting the S-Tag

7

0x88A8 0x8100 0x9100 0x9200

11

Proprietary and Confidential

Thank You ! [email protected]

12

Ceragon - Training - Handbook - Page 135

6

3/7/2010

FibeAir IP-10 G-SeriesEMS RSTP Configurat