ceragon - ip-10r1 adv - book - v1.3
TRANSCRIPT
-
CERAGON FIBEAIR
COURSE HANDBOOK
Installation, Commissioning
& System Configuration
2010
Visit our Customer Training Portal at Training.Ceragon.Com
or contact us at [email protected]
Trainee Name:
-
Ceragon Training Center
eLearning provides a first
tier of support to users of
new technologies,
resulting in an estimated
30% reduction in support
costs related to
implementation of new
applications & business
processes.eLearning is a great
complementary solution to
your classroom sessions as
some modules are only
available on-line
24/7 access to
constantly increasing
on-line DB of the
latest information!
eLearning
is proven to be less
intimidating than
Instructor led training.
Concerns about making
mistakes in front of peers
and management are
eliminated.
Ceragon Training Center is designed
to help you get a comprehensive
understanding with Ceragon's
technology, products and network
solutions.
While individuals focus on particular
modules, Managers on the other
hand can sign up their staff members
to a Learning Program with
compulsory items such as quizzes &
procedures.
Ceragon eLearning users enjoy
frequent & updated modules as
new features and products are
released without needing to
update users account properties.
Want to find out more? Need an Account Comparison Table?
Need a proposal? Case studies?
Please contact us at
Ceragon eLearning
solutions can shorten the
amount of time it takes to
get learners up to speed on
new products and
processes.
Users who need to "brush
up" on a process can
access a module instantly,
practice, test themselves
and resume their work.
Ceragon Training
Knowledgebase is available to
your employees without
sacrificing additional room
space or time-consuming
lectures.
-
1 Ceragon Training Agenda v2.0
Ceragon Training Agenda
Product: IP-10
Course: IP10AO&M Extended Operation and Maintenance
Duration: 3 days
DAY ONE
Introduction to Radio Microwave:
Parameters affecting propagation (Fresnel Zone, Duct, Multipath) Digital Modulation Basics Radio Link Components MSE
Introduction to 802.1:
The need for smaller broadcast domains Standard Ethernet Frame VLAN Tagging P-Bits & VID Q-in-Q
Introduction to IP-10 IDU
IP-10 Front Panel Description
Introduction to RFU-C / or other ODU type
Installation:
Physical Installation of IDU + ODU IP address using CLI
Commissioning:
System name & Contact Details (Unit Info) Reading Versions External Alarms Setting IP Address and Management (In Band / OOB) Trap Destination Updating the license
Radio Link Commissioning:
Frequencies TSL & RSL & MSE ATPC Management (In band / OOB) Link ID Local & Remote frequency change
Ceragon Training Handbook - Page 1
-
2 Ceragon Training Agenda v2.0
Ceragon Training Agenda
DAY TWO
Adaptive Coding & Modulation (ACM)
Switch Mode Configuration:
Single Pipe Managed Mode Metro Mode
Interface Configuration:
ETH Ports (Trunk VS. Access) E1 Ports
Troubleshooting Tools & Maintenance:
Using the Current Alarms Using the Event Log Using RMON Registers and Statistics Performing Loopbacks Saving Unit Information Files Configuration File Upload / Download Software File Download
DAY THREE
1+1 Protection: Configuration Review
1+1 Protection: Practical Exercise
QoS: Configuration Review
QoS: Practical Exercises
Introduction to CFM (802.1ag)
CFM: Practical Exercises
Q-in-Q: Configuration Review
Q-in-Q: Practical Exercise
Ceragon Training Handbook - Page 2
-
3/8/2010
1
Ceragon in a Nutshell
Products
Proprietary and Confidential
Agenda
2
Think Backhaul Networks
1. 1500R IDU
2. IP-MAX^2 IDU
3. IP-10 IDU
4. IP-10G IDU
5. Nodal Solutions
6. 3200T IDU
7. Outdoor units
8. Outdoor Enclosures
Ceragon Training Handbook - Page 3
-
3/8/2010
2
Proprietary and Confidential
Ceragon FibeAir Family
3
Carrier Ethernet Switch TDM Cross Connect
Native2 Radio
Ethernet + TDM
ACM Ch-STM1/OC3
Terminal
Mux
E1/T1FastEthernet
Gigabit
Ethernet
10-500Mbps, 7-56MHz
OA&M Service Management Security
RFU (6-38GHz)
XPIC
Multi
Radio
SD/FD
Proprietary and Confidential
IDU 1500R Point to Point SDH Radio Link
4
STM RingSTM Ring
Ceragon Training Handbook - Page 4
-
3/8/2010
3
Proprietary and Confidential
IDU 1500R SDH RING
5
XC
PSN
XC
N x STM-1/OC-3
Aggregation Site
ADM/MSPP
Ceragon
FibeAir 1500R
Proprietary and Confidential
IP-MAX^2 IDU: GbE Backhaul
6
IP/ETH
Provider
network
ETH
Ceragon Training Handbook - Page 5
-
3/8/2010
4
Proprietary and Confidential
IP-10 IDU: Enhanced Cellular Backhaul
7
IP/ETH
Provider
network
Cellular
traffic
(TDM)
N x ETH
Proprietary and Confidential
IP-10G IDU: A Nodal Solution
8
STM
Rings
Cellular traffic
(TDM)
Ceragon Training Handbook - Page 6
-
3/8/2010
5
Proprietary and Confidential
3200T All Indoor: High Capacity Trunk
9
SDH
Proprietary and Confidential
3200T Split Mount: High Capacity Trunk
10
SDH
Ceragon Training Handbook - Page 7
-
3/8/2010
6
Proprietary and Confidential
RFUs
FibeAir RFU-HP FibeAir RFU-HS FibeAir RFU-P FibeAir RFU-C
High power(e.g. Smaller antennas reduced cost)
Standard power
Proprietary and Confidential
Outdoor Enclosures Solution Benefits
Full Outdoor solution:
Dust and weather proof
Compact size reduces the cost of leasing or purchasing rack space.
Ideal for Greenfield areas, at solar-powered sites, and at repeater sites adjacent to highways.
One-man installation and shorter cabling reduce installation costs.
Environment-friendly: Greener deployments, saving on power and air-conditioning costs.
Ceragon Training Handbook - Page 8
-
3/8/2010
7
Proprietary and Confidential13
CoreSite
HubSite
Tail site
Native2 - Is a technology for carrying both TDM and Ethernet traffic Natively
over the same microwave links with dynamic bandwidth allocation.
FibeAir
IP-10
BSC/MSC
Native E1/T1
Native Ethernet
Native2 (MW links) IP/MPLS (Hybrid Fiber/MW)
FibeAir
IP-10
NG-SDH
MSPP
E1/T1 over SDH/SONET
n x T1/E1
FE/GE
GE
STM1/
OC3
STM1/
OC3
Hybrid aggregation network for migrationNative2 at the access, IP/MPLS & SDH/SONET at the aggregation
RNC
GE
MPLS
Router
SDH/SONET (Hybrid Fiber/MW)
MPLS
Router
Ethernet over IP/MPLS
NG-SDH
MSPP
Proprietary and Confidential
Aggregating WiMAX / LTE Ready
14
Hub / Aggregation site
WiMAX / 4G / LTE
Cellular site
Business center
WiMAX
Ceragon
2G/3G base station
Wireless Carrier Ethernet
Backhaul Network
Ceragon
Core IP BackboneAccess Metro / Aggregation
WiMAXPoint to Multipoint solution for Ethernet traffic
aggregation and statistical
multiplexing for a mix of Business
and mobile offload Ceragon Point
to Point for TDM aggregation
Ceragons Point to Point backhaul supports Native Ethernet with traffic
QoS awareness
Ethernet traffic is tunneled through
E-LAN/ E-Line EVCs
TDM traffic (E1/T1) are being
aggregated using Ceragon integrated
TDM cross connect
Ethernet (GE) is sent over to an
IP/MPLS Layer
TDM (STM-1/OC-3) is sent over to
an SDH/SONET layer
Ceragon High-capacity "MPLS-
aware" Ethernet microwave radio is
used where fiber connections not
available.
TDM
E1/T1
STM-1 / OC-3
GE
Ceragon Training Handbook - Page 9
-
3/8/2010
8
Proprietary and Confidential
Ceragons Advantages
High Spectral-Efficiency
High System-Gain
Multi-Service Concentration capabilities
High Level of Redundancy
Adaptive Modulation
Pay-as-you-grow concept
15
Proprietary and Confidential
High Spectral-Efficiency(i.e. 256QAM modulation)
Providing more capacity at any given frequency resources e.g. 18xE1 or 50Mbps @ 7MHz channel-bandwidth
Better utilizing valuable frequency resources e.g. using high spectral efficiency we provide 155-200Mbps @ 28MHz, using a Single wireless link!
Average microwave will require Two links causing higher CAPEX and consume additional valuable frequency
Get the same capacity
with ONE link
instead of TWO!
Ceragon Training Handbook - Page 10
-
3/8/2010
9
Proprietary and Confidential
TypicalMicrowave Radio
IP10Microwave Radio
Required Capacity
155-200Mbps
TWO radio links
or
56MHz channel bandwidth
ONE radio link
using
28MHz channel bandwidth
Required Capacity
70-100Mbps
28MHz
Channel Bandwidth
14MHz
Channel Bandwidth
The operator saves CAPEX
and free-up valuable frequency resources
Higher Spectral-EfficiencyWhats in it for The Operator?
Proprietary and Confidential
Higher Spectral-Efficiency is not enough
18
should always be coupled with
Radio Type Ant. Diameter Length Modulation Capacity
Typical System Gain 1.80 m 30 Km 16QAM 32 x E1s
Typical System Gain 1.80 m 21 Km 128QAM STM-1/OC-3
Typical System Gain 3.00 m 30 Km 128QAM STM-1/OC-3
High System Gain 1.80 m 30 km 128QAM STM-1/OC-3High System Gain
Spectral Efficiency
System Gain
Ceragon Training Handbook - Page 11
-
3/8/2010
10
Proprietary and Confidential19
Ceragons Management Overview
IP-10 FibeAir
Proprietary and Confidential
We adjust to customers
requirements
20
Ceragon Training Handbook - Page 12
-
3/8/2010
11
Thank You!
Ceragon Training Handbook - Page 13
-
Advanced Operation & Maintenance Course1
Proprietary and Confidential
Introduction to 802.1 P/Q
Module Version v2.6
Proprietary and Confidential
Objectives
2
Understand the need for smaller broadcast domains
Understand what is VLAN
Understand the difference between tagged and untagged frame
Understand VLAN applications
Ceragon Training Handbook - Page 14
-
Advanced Operation & Maintenance Course2
Proprietary and Confidential
Associated IEEE Standards
3
IEEE 802.3 : Ethernet (Max. frame size = 1518 bytes)
IEEE 802.3ac : Ethernet (Max. frame size = 1522 bytes)
IEEE 802.1 d : MAC Bridge first introduced the concept of Filtering Services in a bridged local network
IEEE 802.1 q : VLAN Tagging
IEEE 802.1 p : Priority Tagging / Mapping
IEEE 802.1ag : OAM (CFM)
Proprietary and Confidential
What is VLAN?
Advantages for using VLAN
Regular Ethernet frame
Tagged frame structure
Types of VLAN
Types of connections
802.1P implementations
2 of 19
AgendaAgenda
4
Ceragon Training Handbook - Page 15
-
Advanced Operation & Maintenance Course3
Proprietary and Confidential
A Layer 2 Protocol which enables enhanced
traffic maneuvers :
Prioritization Filtering Provisioning Mapping (e.g. - ATM to/from ETH)
4 of 19
What is VLAN?
5
Proprietary and Confidential5 of 19
What is VLAN?
Regular ETH networks forward broadcast frames to all endpoints
6
Ceragon Training Handbook - Page 16
-
Advanced Operation & Maintenance Course4
Proprietary and Confidential6 of 19
VLAN networks forward broadcast frames only to pre-defined ports
(Profile Membership)
VLAN 1
VLAN 547
Switch ports
What is VLAN?
7
Proprietary and Confidential
Breaking large networks into smaller parts (Formation of virtual workgroups)
Simplified Administration (no need for re-cabling when user moves)
Improving Broadcast & Multicast traffic utilization
Mapping expensive backbones (ATM) to simpler & cheaper ETH backbones
Security establishing tunnels / trunks through the network for dedicated users (traffic between VLANs is restricted).
3 of 19
Advantages of VLAN
8
Ceragon Training Handbook - Page 17
-
Advanced Operation & Maintenance Course5
Proprietary and Confidential7 of 19
Before we start explaining bit by bit, what is VLAN
and how does it work, let us review first the
structure of a regular ETH frame
9
Proprietary and Confidential8 of 19
Preamble + SFD DA SA Length / Type DATA + PAD FCS
6 Bytes 6 Bytes8 Bytes 2 Bytes 46 - 1500 Bytes4 Bytes
(32-bit
CRC)
FCS is created by the sender and recalculated by the receiver
Length / Type < 1500 - Parameter indicates number of Data Bytes
Length / Type > 1536 - Parameter indicates Protocol Type (PPPoE, PPPoA, ARP etc.)
Minimum 64 Bytes < FRAME SIZE < Maximum 1518 Bytes
Untagged Ethernet Frame
10
Ceragon Training Handbook - Page 18
-
Advanced Operation & Maintenance Course6
Proprietary and Confidential4 of 429 of 19
Additional information is inserted
Frame size increases to 1522 Bytes
4 Bytes
16 Bit
3 Bit 1 Bit 12 Bit
TPID = 0x8100 TCI
CFIP-TAG VLAN ID
TPID = Tag protocol ID
TCI = Tag Control Information
CFI = 1 bit canonical Format Indicator
Preamble + SFD DA SA Length / Type DATA + PAD FCSLength / Type
Tagged Ethernet Frame
11
Proprietary and Confidential
VLAN ID uses 12 bits, therefore the number of maximum VLANs is
4094:
2^12 = 4096
VID 0 = reserved
VID 4096 = reserved (every vendor may use some VIDs for internal purposes such as MNG etc.)
VID 1 = default
After tagging a frame, FCS is recalculated
CFI is set to 0 for ETH frames, 1 for Token Ring to allow TR frames
over ETH backbones (some vendors may use CFI for internal purposes)
Tagging a Frame
12
Ceragon Training Handbook - Page 19
-
Advanced Operation & Maintenance Course7
Proprietary and Confidential
Protocol type Value
Tagged Frame 0x8100
ARP 0x0806
Q-in-Q (CISCO) 0x8100
Q-in-Q (other vendors) 0x88A8
Q-in-Q (other vendors) 0x9100
Q-in-Q (other vendors) 0x9200
RARP 0x8035
IP 0x0800
IPv6 0x86DD
PPPoE 0x8863/0x8864
MPLS 0x8847/0x8848
IS-IS 0x8000
LACP 0x8809
802.1x 0x888E
TPID in tagged frames in always set to
0x8100
TPID / ETHER-Type / Protocol Type
It is important that you understand
the meaning and usage of this
parameter
Later when we discuss QoS, we
shall demonstrate how & why the
system audits this parameter
13
Proprietary and Confidential10 of 19
Membership by Port
VIDPort
11
12
443
2004
PRO easy configured
CON no user mobility
VID1
VID1
VID 44
VID200
VLAN types
14
Ceragon Training Handbook - Page 20
-
Advanced Operation & Maintenance Course8
Proprietary and Confidential11 of 19
Membership by MAC
VIDMAC
100:33:ef:38:01:23
100:01:de:22:42:ae
4400:20:8f:40:15:ef
20000:20:32:35:ea:11
PRO user mobility, no reconfiguration when PC moves
CON needs to be assigned initially, not an easy task with
thousands of endpoints
VLAN types
15
Proprietary and Confidential12 of 19
Membership by Subnet Address (a.k.a. Layer 3 VLAN)
VIDSubnet Address
110.0.0.0 / 24
120.0.0.0 / 30
4411.0.0.0 / 24
200192.168.1.0 / 24
Membership is based on the Layer 3 header
No process of IP address is done
Main disadvantage longer overall throughput
VLAN types
16
Ceragon Training Handbook - Page 21
-
Advanced Operation & Maintenance Course9
Proprietary and Confidential
Membership by Protocol Type
VIDProtocol Type
1IP
44IPX
The VID is derived from the protocol type field
found in the Layer 2 header
13 of 19
VLAN types
17
Proprietary and Confidential14 of 19
VLAN aware Switch
Device unaware of VLANs
transmits untagged
(regular) ETH frames
Switch tags the ingress
frames with VID according
to specific Tagging
mechanism
Access Port a port which is not aware of VLANs
(Cannot tag outgoing frames or un-tag incoming frames)
A
Port Types
18
Ceragon Training Handbook - Page 22
-
Advanced Operation & Maintenance Course10
Proprietary and Confidential14 of 19
Device unaware of VLANs
transmits untagged
(regular) ETH frames
Switch tags the ingress frames with VID according to
specific Tagging mechanism
Switch un-tags frames with VID received from network
and delivers untagged frames to Access ports
Trunk Port a port which is aware of VLANs
(Can tag or un-tag incoming frames)
VLAN aware Switch
A T
Port Types
19
Proprietary and Confidential
VLAN aware Switch
14 of 1914 of 19
Trunk Port can carry tagged frames with different VIDs.
This requires Port Membership configuration.
AT
A A
This port is not a member of the Trunk
port membership list, hence, traffic is
discarded
Port Types
20
Ceragon Training Handbook - Page 23
-
Advanced Operation & Maintenance Course11
Proprietary and Confidential
VLAN
aware Switch
15 of 19
Q-in-Q (A.K.A. Double TaggingVLAN Encapsulation)
Enhanced security not exposing original VID
Improved flexibility of VID in the network
(Ingress VID was already assigned in the network)
CN PN
+
Port Types
21
Introduction to QoS / CoS
22
Ceragon Training Handbook - Page 24
-
Advanced Operation & Maintenance Course12
Proprietary and Confidential
We can extend the benefits of ATM QoS into Ethernet LANs to guarantee Ethernet priorities
across the ATM backbone. A L2 switch or L3 router reads incoming 802.1p or IP ToS priority
bits, and classifies traffic accordingly.
To match the priority level with the appropriate ATM service class and other parameters, the
switch then consults a mapping table with pre-defined settings.
CBR
VBR
UBR
P-Tag 6
P-Tag 4
P-Tag 0
Mapping ATM QoS over ETH CoS (RFC 1483)
Core
Site
Hub
Site
Tail site
RNC
BSC/MSC
FibeAir
IP-10
n x T1/E1
FE/GE
GE
GE
STM1/
OC3
ATM
Router
MPLS
RouterIP-10
23
Proprietary and Confidential 16 of 19
Mapping ETH to MPLS and vice versa
Core
Site
Hub
Site
Tail site
RNC
BSC/MSC
FibeAir
IP-10
n x T1/E1
FE/GE
GE
GE
STM1/
OC3
STM1/
OC3
MPLS
Router
MPLS
RouterIP-10
IP-10s L2 switch can take part in the process of transporting
services through MPLS core
Frames/services are mapped to MPLS FECs according to:
VLAN ID mapped to MPLS EXP bits
VLAN P-Bit mapped to MPLS EXP bits
24
Ceragon Training Handbook - Page 25
-
Advanced Operation & Maintenance Course13
Proprietary and Confidential
802.1P utilizes Traffic Classes:
A switch port allocates ingress frames to
queues (buffers) according to their P-Tag
value
The more queues the more prioritizing
levels (classes)
Downside more time, more memory
Normally 4 queues (TCs) are sufficient
In this example the port groups a few Bits
into a single queue
8 priority levels become 3 classes
25
VLAN P-Bit Remap (Traffic Classes)
Q4 High
Q3
Q2
Q1 Low
P-Bits 6-7
P-Bits 4-5
P-Bits 0-3
Proprietary and Confidential
Ingress
P-TagsNumber of Available Traffic Classes
1 2 3 4 5 6 7 8
0 (default) 0 0 0 0 0 1 1 1
1 0 0 0 0 0 0 0 0
2 0 0 0 1 1 2 2 2
3 0 0 0 1 1 2 3 3
4 0 1 1 2 2 3 4 4
5 0 1 1 2 2 3 4 5
6 0 1 2 3 3 4 5 6
7 0 1 2 3 4 5 6 7
Egress P-Tag
IEEE Recommendation
The following table shows
IEEE definition of traffic
classes
It shows the ingress options
for P-Tag VS. egress P-tag
The number of egress
priorities (classes) depend
on the number of assigned
queues
26
VLAN P-Bit Remap (Traffic Classes)
Ceragon Training Handbook - Page 26
-
Advanced Operation & Maintenance Course14
Proprietary and Confidential
Acronyms
ETH Ethernet NIC Network Internet Card VID Vlan ID VLAN Virtual LAN P-TAG Priority Tag, Priority Bits CFI Canonical Format Indicator TPID Tag Protocol Identifier FCS Frame Check Sequence DA Destination Address SA Source Address QoS Quality of Service
27
Proprietary and Confidential
Thank You !
28
Ceragon Training Handbook - Page 27
-
1Mean Square Error
Proprietary and Confidential
Agenda
MSE Definition
Expected value
The Error Histogram
Giving bigger differences more weight than smaller differences
Calculating MSE
MSE in digital modulation
Commissioning with MSE
MSE and ACM
2
Ceragon Training Handbook - Page 28
-
2Proprietary and Confidential
MSE - Definition
MSE is used to quantify the difference between an estimated (expected)
value and the true value of the quantity being estimated
MSE measures the average of the squared errors:
MSE is a sort of aggregated error by which the expected value differs
from the quantity to be estimated.
The difference occurs because of randomness or because the receiver
does not account for information that could produce a more accurate
estimated RSL
3
Proprietary and Confidential
To simplify.
Imagine a production line where a machine needs to insert one part
into the other
Both devices must perfectly match
Let us assume the width has to be 10cm wide
We took a few of parts and measured them to see how many can
fit in.
4
Ceragon Training Handbook - Page 29
-
3Proprietary and Confidential
The Errors Histogram
(Gaussian probability distribution function)
To evaluate how accurate our machine is, we need to know how many parts
differ from the expected value
9 parts were perfectly OK
10cm 12cm 16cm6cm 7cm
width
Quantity
3
23
1
9 Expected value
5
Proprietary and Confidential
The difference from Expected value
To evaluate the inaccuracy (how sever the situation is) we measure how
much the errors differ from expected value
10cm 12cm 16cm6cm 7cm
width
Quantity
Error = + 6 cm
Error = - 3 cm
Error = + 2 cm
Error = 0 cm
Error = - 4 cm
6
Ceragon Training Handbook - Page 30
-
4Proprietary and Confidential
Giving bigger differences more weight than
smaller differences
We convert all errors to absolute values and then we square them
The squared values give bigger differences more weight than smaller
differences, resulting in a more powerful statistics tool:
16cm parts are 36 units away than 2cm parts which are only 4 units away
10cm 12cm 16cm6cm 7cm
width
Quantity
+ 6 cm = 36
-3 cm = 9
+ 2 cm = 4
Error = 0 cm
- 4 cm = 16
7
Proprietary and Confidential
Calculating MSE
To evaluate the total errors, we sum all the squared errors and take the
average:
16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13
The bigger the errors (differences) >> the bigger MSE becomes
10cm 12cm 16cm6cm 7cm
width
Quantity
+ 6 cm = 36
-3 cm = 9
+ 2 cm = 4
Error = 0 cm
- 4 cm = 16
8
Ceragon Training Handbook - Page 31
-
5Proprietary and Confidential
Calculating MSE
If all parts were perfectly produced than each error would be 0
This would result in MSE = 0
Conclusion: systems perform best when MSE is minimum
10cm
width
Quantity Error = 0 cm
9
Proprietary and Confidential
MSE in digital modulation (Radios)
Let us use QPSK (4QAM) as an
example:
QPSK = 2 bits per symbol
2 possible states for I signal
2 possible states for Q signal
= 4 possible states for the
combined signal
The graph shows the expected
values (constellation) of the
received signal (RSL)
0001
1011
I
Q
10
Ceragon Training Handbook - Page 32
-
6Proprietary and Confidential
MSE in digital modulation (Radios)
The black dots represent the
expected values (constellation)
of the received signal (RSL)
The blue dots represent the
actual RSL
Similarly to the previous
example, we can say that the
bigger the errors are the
harder it becomes for the
receiver to detect & recover the
transmitted signal
0001
1011
I
Q
11
Proprietary and Confidential
MSE in digital modulation (Radios)
MSE would be the average
errors of e1 + e2 + e3 + e4.
When MSE is very small the
actual signal is very close to
the expected signal
0001
1011
I
Q
e1
e2
e3e4
12
Ceragon Training Handbook - Page 33
-
7Proprietary and Confidential
MSE in digital modulation (Radios)
When MSE is too big, the
actual signal (amplitude &
phase) is too far from the
expected signal
0001
1011
I
Q
e1
e2
e3e4
13
Proprietary and Confidential
Commissioning with MSE in EMS
When you commission your
radio link, make sure your MSE
is small (-37dB)
Actual values may be read
-34dB to -35dB
Bigger values (-18dB) will
result in loss of signal
14
Ceragon Training Handbook - Page 34
-
8Proprietary and Confidential
MSE and ACM
When the errors become too big,
we need a stronger error correction
mechanism (FEC)
Therefore, we reduce the number
of bits per symbol allocated for data
and assign the extra bits for
correction instead
For example
256QAM has great capacity but
poor immune to noise
64QAM has less capacity but much
better immune for noise
ACM Adaptive Code Modulation
15
16
Thank You !
Ceragon Training Handbook - Page 35
-
3/8/2010
1
ACM - Adaptive Code Modulation
Proprietary and Confidential
FibeAir IP-10s Key Feature
IP-10 utilizes a unique Adaptive Coding & Modulation (ACM)
Modulation range: QPSK - 256QAM
Modulation changes to maintain link when radio signal degrades
Mechanism automatically recovers to max. configured modulation when received signal improves
Optimized for mobile backhaul all-IP and TDM-to-IP migration
2
Ceragon Training Handbook - Page 36
-
3/8/2010
2
Proprietary and Confidential
Adaptive Coding and Modulation
Utilize highest possible modulation considering the changing environmental
conditions
Hitless & errorless switchover between modulation schemes
Maximize spectrum usage - Increased capacity over given bandwidth
Service differentiation with improved SLA
Increased capacity and availability
3
Proprietary and Confidential4
Adaptive Coding and Modulation
Non-real time
services
Voice & real time
servicesWeak
FEC
Strong
FEC
When we engineer our services, we may assign certain services to highest
priority
When ACM is enabled and link degrades, highest priority services are
maintained
Ceragon Training Handbook - Page 37
-
3/8/2010
3
Proprietary and Confidential
IP-10 Enhanced ACM Support
8 modulation/coding working points (~3db system gain for each point change)
Hit-less and Error-less modulation/coding changes based on signal quality
E1/T1 traffic has higher priority over Ethernet traffic
Each E1/T1 service is assigned a priority - enables differentiated E1/T1 dropping during severe link degradation
Integrated QoS with intelligent congestion management - ensures high priority Ethernet traffic is not affected during link fading
Zero downtime - A must for mission-critical services
Throughput per radio carrier:
10 to 50 Mbps @ 7MHz Channel
25 to 100 Mbps @ 14MHz Channel
45 to 220 Mbps @ 28 MHz Channel
90 to 500 Mbps @ 56 MHz Channel
5
MSE is analyzed to trigger
ACM modulation changes
Proprietary and Confidential
IP-10 radio capacity - ETSI
Ethernet capacity depends on average packet size
ACM
Point
Modulation # of
E1s
Ethernet
Capacity
(Mbps)
1 QPSK 16 38 - 54
2 8 PSK 22 53 - 76
3 16 QAM 32 77 - 110
4 32 QAM 44 103 - 148
5 64 QAM 54 127 - 182
6 128 QAM 66 156 - 223
7 256 QAM 71 167 - 239
8 256 QAM 75 183 - 262
ACM
Point
Modulation # of
E1s
Ethernet
Capacity
(Mbps)
1 QPSK 32 76 - 109
2 8 PSK 48 114 - 163
3 16 QAM 64 151 - 217
4 32 QAM 75 202 - 288
5 64 QAM 75 251 - 358
6 128 QAM 75 301 - 430
7 256 QAM 75 350 - 501
8 256 QAM 75 372 - 531
7MHz
ACM
Point
Modulation # of
E1s
Ethernet
Capacity
(Mbps)
1 QPSK 23 56 - 80
2 8 PSK 34 82 - 117
3 16 QAM 51 122 - 174
4 32 QAM 65 153 - 219
5 64 QAM 75 188 - 269
6 128 QAM 75 214 - 305
7 256 QAM 75 239 - 342
8 256 QAM 75 262 - 374
ACM
Point
Modulation # of
E1s
Ethernet
Capacity
(Mbps)
1 QPSK 4 9.5 13.5
2 8 PSK 6 14 20
3 16 QAM 8 19 28
4 32 QAM 10 24 34
5 64 QAM 12 28 40
6 128 QAM 13 32 46
7 256 QAM 16 38 54
8 256 QAM 18 42 60
ACM
Point
Modulation # of
E1s
Ethernet
Capacity
(Mbps)
1 QPSK 8 20 - 29
2 8 PSK 12 29 - 41
3 16 QAM 18 42 - 60
4 32 QAM 20 49 70
5 64 QAM 24 57 82
6 128 QAM 29 69 - 98
7 256 QAM 34 81 - 115
8 256 QAM 37 87 - 125
14MHz
28MHz 40MHz 56MHz
6
Ceragon Training Handbook - Page 38
-
3/8/2010
4
Proprietary and Confidential
IP-10 radio capacity - FCC
Ethernet capacity depends on average packet size
ACM
Point
Modulation # of
T1s
Ethernet
Capacity
(Mbps)
1 QPSK 22 39 - 55
2 8 PSK 35 62 - 89
3 16 QAM 52 93 - 133
4 32 QAM 68 120 - 171
5 64 QAM 80 142 - 202
6 128 QAM 84 164 - 235
7 256 QAM 84 185 - 264
8 256 QAM 84 204 - 292
ACM
Point
Modulation # of
T1s
Ethernet
Capacity
(Mbps)
1 QPSK 37 65 - 93
2 8 PSK 59 105 - 150
3 16 QAM 74 131 - 188
4 32 QAM 84 167 - 239
5 64 QAM 84 221 - 315
6 128 QAM 84 264 - 377
7 256 QAM 84 313 - 448
8 256 QAM 84 337 - 482
10MHz
ACM
Point
Modulation # of
T1s
Ethernet
Capacity
(Mbps)
1 QPSK 31 56 - 80
2 8 PSK 46 82 - 117
3 16 QAM 69 122 - 174
4 32 QAM 84 153 - 219
5 64 QAM 84 188 - 269
6 128 QAM 84 214 - 305
7 256 QAM 84 239 - 342
8 256 QAM 84 262 - 374
ACM
Point
Modulation # of
T1s
Ethernet
Capacity
(Mbps)
1 QPSK 7 13 18
2 8 PSK 10 19 27
3 16 QAM 16 28 40
4 32 QAM 18 32 46
5 64 QAM 24 42 61
6 128 QAM 28 50 71
7 256 QAM 30 54 78
8 256 QAM 33 60 85
ACM
Point
Modulation # of
T1s
Ethernet
Capacity
(Mbps)
1 QPSK 16 28 - 40
2 8 PSK 22 39 - 56
3 16 QAM 32 57 - 81
4 32 QAM 38 67 - 96
5 64 QAM 52 93 - 133
6 128 QAM 58 102 - 146
7 256 QAM 67 118 - 169
8 256 QAM 73 129 - 185
20MHz
30MHz 40MHz 50MHz
7
Proprietary and Confidential
IP-10 Enhanced radio capacity for Ethernet traffic
Intelligent Ethernet header compression mechanism
(patent pending)
Improved effective Ethernet throughput by up to 45%
No affect on user traffic
Ethernet
packet size (bytes)
Capacity increase by
compression
64 45%
96 29%
128 22%
256 11%
512 5%
8
Ceragon Training Handbook - Page 39
-
3/8/2010
5
Proprietary and Confidential
IP-10 Native2 radio dynamic capacity allocation Example: 28MHz channel bandwidth
Example
Modulation
Example
traffic mix
32QAM 128QAM 256QAM
All Ethernet 112Mbps 170Mbps 200Mbps
20 E1s + Ethernet 20 E1s + 66Mbps 20 E1s + 123Mbps 20 E1s + 154Mbps
44 E1s + Ethernet 44 E1s + 10Mbps 44 E1s + 67Mbps 44 E1s + 98Mbps
66 E1s + Ethernet - 66 E1s + 15Mbps 66 E1s + 47Mbps
75 E1s + Ethernet - - 75 E1s + 25Mbps
9
Proprietary and Confidential
Adaptive Coding & Modulation (ACM)Its all about handling data...
Current Microwave systems are designed with Availability Equal for all Services
99.99 %
?
nXT1/E1
Less availability can be accepted for many data services
Need for Services Classification :
Microwave systems shall treat services in different ways
10
Ceragon Training Handbook - Page 40
-
3/8/2010
6
Proprietary and Confidential
Fewer Hops
0 1km 2km 3km
1.28km fix rate
200Mbps at 99.999%
2.5km adaptive rate
200Mbps at 99.99% and 40Mbps at 99.999%
Assuming: 18GHz link, 28MHz channel, 1 ft antenna, Rain zone K (42mm/hr)
0 1km 2km 3km0 1km 2km 3km
1.28km fix rate
200Mbps at 99.999%
2.5km adaptive rate
200Mbps at 99.99% and 40Mbps at 99.999%
Assuming: 18GHz link, 28MHz channel, 1 ft antenna, Rain zone K (42mm/hr)
Optional solution for several planning constrains
Example - Reducing Hops count until reaching fiber site
11
Proprietary and Confidential
Decreased tower loads: Wind, Space, Weight
Without Adaptive Modulation: requires 4 ft antennas
Modulation Throughput (Mbps) Availability (%)
Unavailability of
modulation
Outage 5 minutes and 15 seconds
256QAM (2) 400 99.999 4min, 28sec
Modulation Throughput (Mbps) Availability (%)
Unavailability of
modulation
Outage 5 minutes and 15 seconds
QPSK 80 99.999 5min, 3sec
8PSK 120 99.998 9min, 3sec
16QAM 160 99.997 11min, 4sec
32QAM 210 99.996 16min, 42sec
64QAM 260 99.995 24min, 35sec
128QAM 320 99.992 37min, 35sec
256QAM (1) 360 99.989 55min, 33sec
256QAM (2) 400 99.985 1hr,18min, 13sec
Assumed rain zone K, 23 [GHz] band
4.5km/2.8 miles path, 56MHz channel, 400Mbps, 256QAM, 99.999% availability
With Adaptive Modulation: requires 1 ft antennas
Source: Ceragon Networks
Ceragon Training Handbook - Page 41
-
3/8/2010
7
Proprietary and Confidential
Typical 4E1 radio
QPSK
7MHz channel
99.999% availability
4xE1
7MHz channel
Upgrade to 4E1 + 40Mbps Ethernet
5 TIMES THE CAPACITY
SAME ANTENNAS
Same 7MHz channel
QPSK 256QAM with ACM
99.999% availability for the E1s
Low cost, scalable, pay as you grow
4xE1 + 40Mbps
Ethernet
7MHz channel
ACM Benefit in TDM to IP migration scenario
SMOOTH Migration
13
14
Thank You !
Ceragon Training Handbook - Page 42
-
3/9/2010
1
Introduction to IP-10
Proprietary and Confidential
Agenda
IP-10 Carrier Ethernet features overview
IP-10 integrated QoS support overview
IP-10 based Wireless Carrier Ethernet rings
Ethernet Service OAM (802.1ag)
IP-10 management support overview
Ceragon Training Handbook - Page 43
-
3/9/2010
2
IP-10 Integrated Carrier Ethernet switch
2 main modes for Ethernet switching:
Metro switch Carrier Ethernet switching is enabled
Smart pipe Carrier Ethernet switching is disabled
Only a single Ethernet interface is enabled for user traffic
The unit operates as a point-to-point Ethernet MW radio
IP-10
Radio
interface
IP-10
Radio
interface
Smart pipe modeMetro switch mode
Ethernet
User
Interfaces
Ethernet
User
Interface
Carrier Ethernet
Switch
Extensive Carrier Ethernet feature-set
eliminates the need for external switches
Proprietary and Confidential
What is Carrier Ethernet?
The MEF has defined Carrier Ethernet as:
A ubiquitous, standardized, carrier-class
Service and Network defined by five
attributes that distinguish it from familiar
LAN based Ethernet
Ceragon Training Handbook - Page 44
-
3/9/2010
3
Proprietary and Confidential
Carrier Ethernet Standard service types
E-Line service used to create:
Ethernet Private Lines
Virtual Private Lines
Ethernet Internet Access
E-LAN service used to create:
Multipoint L2 VPNs
Transparent LAN Service
Foundation for IPTV and Multicast networks etc.
E-Line Service type
E-LAN Service type
Point-to-Point EVC
Carrier Ethernet Network
UNI: User Network Interface, CE: Customer Equipment
CE
UNI UNI
CE
Multipoint-to-Multipoint EVC
Carrier Ethernet Network
CE
UNI
MEF certified Carrier Ethernet products
CE
UNI
Proprietary and Confidential
IP-10 Carrier Ethernet platform (MEF Certified)
IP-10 is fully MEF-9 & MEF-14 certified
for all Carrier Ethernet service types
(E-Line and E-LAN)
The MEF Certification Program
An important part of the MEFs mission to accelerate the deployment of
Carrier Ethernet in the Access, MAN & WAN
Certification for Carrier Ethernet equipment supplied to service providers
Current certification program comprises
MEF-9 - Service certification
MEF-14 - Traffic management and service performance
Approved Certification Lab - Approved independent lab: Iometrix Inc.
Ceragon Training Handbook - Page 45
-
3/9/2010
4
IP-10 - Carrier Ethernet functionality
Standardized Services
ScalabilityQuality of Service
ReliabilityService
Management
MEF-9 & MEF-14
certified for all
service types (EPL,
EVPL and E-LAN)
Up to 500Mbps per
radio carrier
Integrated
non-blocking switch
with 4K VLANs
802.1ad provider
bridges (QinQ)
Scalable nodal
solution
Scalable networks
(1000s of NEs)
Advanced CoS
classification
Advanced traffic
policing/rate-limiting
CoS based packet
queuing/buffering
Flexible scheduling
schemes
Traffic shaping
Highly reliable &
integrated design
Fully redundant 1+1
HSB & nodal
configurations
Hitless ACM
(QPSK 256QAM)
for enhanced radio
link availability
Wireless Ethernet
Ring (RSTP based)
802.3ad link
aggregation
Fast link state
propagation
-
3/9/2010
5
Wireless Ethernet OA&M (Operational Administration & Maintenance) Interoperability
ACM (Adaptive coding & modulation) in a wireless Ethernet radio link
Provision EVCs (Ethernet Virtual Circuit) and several types of Ethernet service while providing UNI (User Network Interface)
Pseudo-wire service and clock recovery
Nodal solution for aggregating and statistical multiplexing at hub/Aggregation site
Embedded switching capabilities whicheliminate the need for an external switch
At this event Ceragon
particularly focused on the
following Interoperability
tests:
Ceragon Training Handbook - Page 47
-
3/9/2010
6
Proprietary and Confidential
IP-10 integrated QoS support - overview
4 CoS/priority queues per switch port
Advanced CoS/priority classification basedon L2/L3 header fields:
Source Port
VLAN 802.1p
VLAN ID
IPv4 DSCP/TOS, IPv6 TC
Highest priority to BPDUs
Advanced ingress traffic rate-limitingper CoS/priority
Flexible scheduling scheme per port Strict priority (SP)
Weighted Round Robin (WRR)
Hybrid any combination of SP & WRR
Shaping per port
W1 - Highest priority
W2
W3
W4 lowest priority
Scheduling
departures
Classify
Arrivals
Priority Queues
Support differentiated Ethernet services
with SLA assurance
IP-10 based Wireless Carrier Ethernet rings
Ring site
#3
Fiber site
RNC
FibeAir
IP-10
FibeAir
IP-10
FibeAir
IP-10
Ring site
#2
FibeAir
IP-10
Tail site #1
FibeAir IP-10
Tail site #2
FibeAir IP-10
Tail site #3
FibeAir IP-10
Ring site
#1
Packet or TDM
based fiber
aggregation
network
or leased lines
Wireless
Carrier Ethernet
Ring
Ceragon Training Handbook - Page 48
-
3/9/2010
7
IP-10 based Wireless Carrier Ethernet ringWith redundant site connection to fiber aggregation network (dual-homing)
Ring site
#3
Fiber site #2
RNC
FibeAir
IP-10
FibeAir
IP-10
Ring site
#2
FibeAir
IP-10
Tail site #1
FibeAir IP-10
Tail site #2
FibeAir IP-10
Tail site #3
FibeAir IP-10
Ring site
#1
Fiber site
FibeAir
IP-10
Fiber site #1
FibeAir
IP-10
Packet or TDM
based fiber
aggregation
network
or leased lines
Wireless
Carrier Ethernet
Ring
Proprietary and Confidential
Wireless Carrier Ethernet Ring Example configuration (1+0 ring)
(up to 500Mbps)
N x GE/FE
Integrated Ethernet
Switching
N x GE/FE
N x GE/FE
N x GE/FE
Wireless
Carrier Ethernet
Ring
Ceragon Training Handbook - Page 49
-
3/9/2010
8
Proprietary and Confidential
Wireless Carrier Ethernet Ring Example aggregation site
Integrated Ethernet
Switching
Ring site
FibeAir
IP-10
N x GE/FE
Wireless
Carrier Ethernet
Ring
Wireless
Carrier Ethernet
Ring
Ethernet services End-to-end multi-layer OA&M
Support service provisioning, OA&M and SLA assurance
Tail site Agg. site
Carrier Ethernet service
Fiber site
Packet or TDM
based fiber
aggregation
network
or leased linesFibeAir IP-10
1+0
FibeAir IP-10FibeAir IP-10
1+1
Radio link Radio linkGE/FEInterface
GE/FE
Interface
Native EVC (802.1ag CFM)
Full set of OA&M functionality is provided at multiple layers:
Alarms and events
Maintenance signals (LOS, AIS, RDI, etc.)
Performance monitoring
Maintenance commands (Loop-backs, APS commands, etc.)
Ceragon Training Handbook - Page 50
-
3/9/2010
9
Proprietary and Confidential
IEEE 802.1ag CFM (Connectivity Fault Management)
18
IP-10 Management Overview
CeraMap
NorthboundNMS
NMS Platform
PolyView
CeraMap
IP-10 WebEMS
IP-10 WebEMS
HTTPHTTP
SNMP
CLI
Integrated web based element manager
HTTP based
Full set of EMS functionality - configuration,
performance monitoring, remote diagnostics,
alarm reports, etc.
SNMP interface to Ceragons PolyView NMS
Extensive CLI interface via local terminal or Telnet
HTTPCraft
Ceragon Training Handbook - Page 51
-
3/9/2010
10
Extensive radio capacity/utilization statistics
Statistics are collected for 15-minutes, and 24-hours intervals
Statistics history is maintained
Capacity/ACM statistics
Maximum modulation in interval
Minimum modulation in interval
# of seconds in interval in which active modulation was below a user-configured threshold
Utilization statistics
Maximal radio link utilization in interval
Average radio link utilization in interval
# of seconds in interval in which radio link utilization was above a user-configured threshold
Proprietary and Confidential
Ethernet in-band management
IP-10 can optionally be managed through the traffic carrying radio and Ethernet interfaces
The in-band management support is based on a dedicated management VLAN
The management VLAN ID is user configurable
Eliminates the need for dedicated management interfaces and network
Ceragon Training Handbook - Page 52
-
3/9/2010
11
Thank You !
Ceragon Training Handbook - Page 53
-
3/9/2010
1
Proprietary and Confidential
RFU-C & Mediation Devices
The Most Comprehensive Portfolio
2
Multi-Service
Carrier Ethernet
FibeAir Family
TDM
RFUs6-38 GHz
EMS & NMS
3200T
IP-10 640P
1500R/1500P 3200T
RFU-C
RFU-HP
RFU-P, RFU-SP
PolyView (NMS)
CeraView (EMS)
IP-MAX2
IP-10 IP-MAX2
Ceragon Training Handbook - Page 54
-
3/9/2010
2
Proprietary and Confidential
IDU RFU Compatibility
RFU-C
RFU-SP
IP-10
IP-MAX/IP-MAX2
RFU-HP
640P
1500R
1500P
RFU-P, RFU-SP
3
Proprietary and Confidential
IDU IDU Compatibility Across Link
IP-10
1500R1500R
IP-10
1500R
IP-10IP-MAX/IP-MAX2
1500P
Must Match IDU Type Across a Link
1500R chassis Cannot House 1500P IDC and IDMs
1500P chassis Cannot House 1500R IDC and IDMs
4
Ceragon Training Handbook - Page 55
-
3/9/2010
3
Proprietary and Confidential
RFU-C direct mount configurations
1+0 direct
5
Proprietary and Confidential
RFU-C direct mount configurations
1+1 direct
6
Ceragon Training Handbook - Page 56
-
3/9/2010
4
Proprietary and Confidential
RFU-C remote mount configurations
1+0 remote
7
Proprietary and Confidential
RFU-C remote mount configurations
1+1 remote
8
Ceragon Training Handbook - Page 57
-
3/9/2010
5
Proprietary and Confidential
RFU-C antenna adaptors
Adaptors for RFU-P direct antenna mount
Adaptors for NSN Flexi Hopper direct antenna mount
Adaptors for Ericsson R1A 23GHz direct antenna mount
Remote adaptors and configurations
9
Proprietary and Confidential
RFU-C to NSN antenna
10
Ceragon Training Handbook - Page 58
-
3/9/2010
6
Proprietary and Confidential
RFU-C to Ericsson antenna (R1A 23GHz)
11
Proprietary and Confidential
Thank You [email protected]
12
Ceragon Training Handbook - Page 59
-
Advanced Operation & Maintenance Course1
Proprietary and Confidential
FibeAir IP-10
Installation
Proprietary and Confidential
Agenda
Unpacking
Required Tools
Installing the IDU in a rack
Grounding
Lightning Protection
Connecting to a Power Supply
IDU Front Panel
Connecting RFU coax cable
Interface Specification
Protection Patch Panel
Logging in, assigning IP address
Ceragon Training Handbook - Page 60
-
Advanced Operation & Maintenance Course2
Proprietary and Confidential
Unpacking
A single FibeAir system (1+0) is shipped in 5 crates
Upon delivery, make sure that the following items are
included:
Two indoor units and accessories
Two outdoor units
One CD with a management user guide
Unpack the contents and check for damaged or missing parts.
If any part is damaged or missing, contact your local
distributor.
Proprietary and Confidential
Required Tools
The following tools are required to install the IDU:
Philips screwdriver (for mounting the IDU to the rack and grounding screw)
Flathead small screwdriver (for PSU connector and to unlock the IDC/IDMs from the chassis)
Sharp cutting knife (for wire stripping)
Crimping tool for ground cable lug crimping (optional: if alternative grounding cable is used)
Ceragon Training Handbook - Page 61
-
Advanced Operation & Maintenance Course3
Proprietary and Confidential
Installing the IDU in a rack
The FibeAir IP-10 IDU is installed
in a standard ETSI 19" rack:
secure the IDU with four screws
(supplied)
IDU dimensions:
D: 187.80 mm
W: 435 mm
H: 42.60 mm
Proprietary and Confidential
Grounding
Connect the grounding
cable between the IDU and
the rack using a single
screw with two washers
Only copper wire should be
used (at least 6 AWG).
FibeAir provides a ground
for each IDU, via a one-hole
mounted lug onto a single-
point stud (installed using a UL-
listed ring tongue terminal, and
two star washers for anti-
Rotation).
Ceragon Training Handbook - Page 62
-
Advanced Operation & Maintenance Course4
Proprietary and Confidential
Lightning Protection
Lightning protection kit is installed upon request between IDU and ODU
It prevents transients of a greater magnitude than the following:
Open Circuit: 1.2-50us 600V
Short Circuit: 8-20us 300A
Proprietary and Confidential
Connecting to a Power Supply
When selecting a power source, the following must be considered:
DC power can be from -40.5 VDC to -72 VDC.
Recommended: Availability of a UPS and power generator
The power supply must have grounding points on the AC and DC sides
The user power supply GND must be connected to the positive pole in the
IDU power supply.
Ceragon Training Handbook - Page 63
-
Advanced Operation & Maintenance Course5
Proprietary and Confidential
Connecting to a Power Supply
-48 vdc 0
(-) (+)
PSU
(GND)
Proprietary and Confidential
IP-10 Front Panel
CLI (DB9)
Baud: 115200
Data bits: 8
Parity: None
Stop bits: 1
Flow Control: None
16 x E1 / T1
(Optional)
RFU N-Type
Interface
1 GbE
SFP
Ceragon Training Handbook - Page 64
-
Advanced Operation & Maintenance Course6
Proprietary and Confidential
IP-10 Front Panel
EOW
(Engineering
Order Wire)
External
Alarms
(DB9)
User Channel
V11,RS232
(RJ45)
Up to 19.2Kbps
1 GbE Copper
10/100/1000
RJ45
FE Copper
10/100 RJ45
Or
Protection
Channel
FE Copper
10/100 RJ45
Or
Wayside
Channel
FE Copper
10/100 RJ45
Or
Out-Of-Band
MNG
Fans
The FE interfaces can be configured as either FE, protection, wayside, or MNG
Proprietary and Confidential
Connecting RFU coax cable
The Coax Cable that connects between the IDU and the RFU should
be terminated with N-type male connectors
Important! Make sure that the inner pin of the connector does not
exceed the edge of the connector.
The cable should have a maximum attenuation of 30 dB at 350 MHz.
Ceragon Training Handbook - Page 65
-
Advanced Operation & Maintenance Course7
Proprietary and Confidential
Interface Specification
Gigabit Ethernet (Optical)
1000Base-SX (Multi Mode)
Wavelength: 850 nm
Receptacle: MSA compliant SFP
Connector: LC
Max Segment Length: 220 m (1351 ft), 500 m (1650 ft)
Cable Type: For Max. Segment = 220 m: 62.5 m MMF
For Max. Segment = 500 m: 50 m MMF
Proprietary and Confidential
Interface Specification
Gigabit Ethernet (Optical)
1000Base-LX (Single Mode)
Wavelength: 1350 nm
Receptacle: MSA compliant SFP
Connector: LC
Max Segment Length: 550 m (1805 ft), 5000 m (16404 ft)
Cable Type: For Max. Segment = 550 m: 62.5 m MMF
For Max. Segment = 5000 m: 10 m SMF
Ceragon Training Handbook - Page 66
-
Advanced Operation & Maintenance Course8
Proprietary and Confidential
Interface Specification
Gigabit Ethernet / Fast Ethernet (Electrical)
1000BaseT (Twisted Pair Cable)
Receptacle: MSA compliant SFP
Connector: RJ-45
Max Segment Length: Up to 100 m (328 ft) per IEEE802.3
Cable Type: Compatible with shielded and unshielded twisted
pair category 5 cables
Proprietary and Confidential
Interface Specification
Optional 16xE1/T1
Connector: MDR 69 pin, twisted pair
Interface Type: E1/T1
Number of ports: 16 per unit (optional)
Timing mode: Retimed
Framing: Unframed (full transparency)
Coding E1: HDB3
Coding T1: AMI/B8ZS
Range: 5 m
Line Impedance: 120 /100 balanced,75 unbalanced (OPT)
Compatible Standards: ITU-T G.703, G.736, G.775, G.823, G.824,
G.828, ITU-T I.432, ETSI ETS 300 147, ETS
300 417, ANSI T1.105, T1.102-1993, T1.231,
Bellcore GR-253-core, TR-NWT-000499
Ceragon Training Handbook - Page 67
-
Advanced Operation & Maintenance Course9
Proprietary and Confidential
Interface Specification
ETH Interfaces (Wayside, MNG, Protection)
Connector: Shielded RJ-45
Used with: UTP Cat 5
Protocols supported: Ethernet (10/100BaseT), half or full duplex
Timing mode: Retimed
Range: 100 m
Impedance: 100
Proprietary and Confidential
Interface Specification
Order Wire Channel Interface
Termination Type: Headset stereo plug, 2.5 mm
Frequency band (KHz): 0.3-3.4
Input impedance (ohms): ~2000
Output impedance (ohms): 32
(64Kbps)
Ceragon Training Handbook - Page 68
-
Advanced Operation & Maintenance Course10
Proprietary and Confidential
Interface Specification
CVSD - Continuously variable slope delta modulation
User Channel Interface
The interface can be used for one of the following:
Asynchronous RS-232
Asynchronous V-11
Up to 9.6 Kbps
Proprietary and Confidential
Connect the headset to AGC monitor BNC/TNC connector on ODU
Connect Digital Volt Meter (DVM) to the AGC BNC connector
Align the antenna until voltage reading is achieved (1.2 to 1.7Vdc)
Repeat antenna alignment at each end until the minimum dc voltage is achieved
1.30vdc = -30dBm
1.45vdc = -45dBm
1.60vdc = -60dBm
etc
Antenna Alignment (1)
Ceragon Training Handbook - Page 69
-
Advanced Operation & Maintenance Course11
Proprietary and Confidential
Compare achieved RX level to
calculated RX level
Keep aligning until the achieved
level is up to 4 dB away from the
calculated received signal level
If voltage reading is more than 4
dB away or higher than 1.7vdc,
re-align antenna to remote site
Antenna Alignment (2)
Proprietary and Confidential
Please refer to the FibeAir Commissioning and Acceptance Procedure document
for detailed information
Link is up (LED is green)
All LEDs are green (unless there is no input signal on the Line)
RSL is up to +/- 4dB from un-faded (calculated) RSL at both ends of the
link
Radio BER 10E-11 or better
No Errors on BER test of line STM1 interfaces
Proper function of management software
Commissioning and Acceptance
Ceragon Training Handbook - Page 70
-
Advanced Operation & Maintenance Course12
Proprietary and Confidential
LEDS
23
LINK: GREEN radio link is operational
ORANGE - minor BER alarm on radio
RED Loss of signal, major BER alarm on radio
IDU: GREEN IDU functions ok
ORANGE - fan failure
RED Alarm on IDU (all severities)
RFU: GREEN RFU functions ok
ORANGE Loss of communication (IDU-RFU)
RED ODU Failure
Proprietary and Confidential
LEDS
24
PROT: GREEN protection is configured and connected
ORANGE Forced switch, Protection lock
RED physical errors (no cable, cable failure)
OFF Protection is disabled, or not supported on device
RMT: GREEN remote unit OK (no alarms)
ORANGE minor alarm on remote unit
RED major alarm on remote unit
Ceragon Training Handbook - Page 71
-
Advanced Operation & Maintenance Course13
Proprietary and Confidential
Logging in, assigning IP address
Verify that physical installation is successfully completed:
IDU mounting in rack
Power + GND
IF Cable between IDU and ODU
Connect a PC to the Terminal connector and launch a serial application
(Hyper Terminal, PuTTY, TeraTerm etc)
Log on using (admin/admin) for user name and password.
Now, you should be able to see the IP-10 CLI Prompt:
IP-10:/>>>>Note that the > sign
indicates your
location in the CLI
tree
Proprietary and Confidential
Logging in, assigning IP address
CLI basic commands:
IP-10:/ >?
IP-10:/ > exit
IP-10:/ > cdIP-10:/ > cd ..
Type ? (question mark) to list helpful commands
Type exit to terminate the session
Type cd to navigate in the entity tree
Type cd .. to return to root of entity tree
Use the arrow keys to navigate through recent
commands
Use the TAB key to auto-complete a syntax
Ceragon Training Handbook - Page 72
-
Advanced Operation & Maintenance Course14
Proprietary and Confidential
Logging in, assigning IP address
To read current MNG IP, type the following:
IP-10:/>>>>cd management/networking/ip-address/
IP-10:/ management/networking/ip-address>>>>
IP-10:/ management/networking/ip-address>get ip-addressNote that the prompt has changed. Now, type get ip-address:
IP-10:/ management/networking/ip-address>get ip-address192.168.1.1IP-10:/ management/networking/ip-address>
Upon completion, the current IP will be displayed, followed by the new
prompt:
Proprietary and Confidential
Logging in, assigning IP address
Now, let us set a new IP for the MNG (we assume your new IP is
192.168.1.144).
Type set ip-address 192.168.1.144
IP-10:/ management/networking/ip-address>set ip-address 192.168.1.144
You may lose remote management connection to the unit if this value is changed incorrectly.Are you sure? (yes/no):
Upon completion, you will be prompt:
Type yes and continue to next step:
Ceragon Training Handbook - Page 73
-
Advanced Operation & Maintenance Course15
Proprietary and Confidential
More CLI commands
Editing Users -
IP-10:/> cd management/mng-services/users
IP-10:/management/mng-services/users>
Adding JOHN as a user:
IP-10:/management/mng-services/users> add-user JOHN
Proprietary and Confidential
More CLI commands
Adding JOHN as ADMIN user:
Deleting JOHN (or other user)
IP-10:/management/mng-services/users> add-user JOHN admin
IP-10:/management/mng-services/users> delete-user JOHN
Ceragon Training Handbook - Page 74
-
Advanced Operation & Maintenance Course16
Proprietary and Confidential
User groups
CLI access groups:
Viewer read-only access
Operator read-write access but cannot add/remove other users
Admin read-write access including add/remove other users
Tech (highest) read-write access including add/remove other users as
well as access to a bridge-specific CLI shell
Proprietary and Confidential
More CLI commands
To go back to factory defaults -
IP-10:/> cd management/mng-services/cfg-service
IP-10:/management/mng-services/cfg-service>set-to-default
In the new directory type the following:
Ceragon Training Handbook - Page 75
-
Advanced Operation & Maintenance Course17
Proprietary and Confidential
Logging in to the EMS
Connect your working
station to the IDU with
ETH CAT.5 cable:
Verify that your WS IP
is in the same subnet
Make sure Link is up
PING the IDU
Launch a WEB
browser with a URL set
as the IDUs IP
User name: admin
Password: admin
Proprietary and Confidential
Logging in to the EMS
The homepage of the web-browser EMS should display the
main view of the IP-10:
Now, we are ready to start configuring the system
Ceragon Training Handbook - Page 76
-
Advanced Operation & Maintenance Course18
35
Thank You !
Ceragon Training Handbook - Page 77
-
3/8/2010
1
Proprietary and Confidential
FibeAir IP-10
EMS Performance Monitoring
Proprietary and Confidential
Agenda
2
EMS General Information
Faults:
Current Alarms
Event Log
PM & Counters:
Remote Monitoring
TDM Trails
TDM interfaces
Radio (RSL, TSL, MRMC and MSE)
Radio TDM
Radio ETH
Ceragon Training Handbook - Page 78
-
3/8/2010
2
Proprietary and Confidential
EMS - General
3
Easy, user friendly GUI
No need to install an application WEB Based software
No need to upgrade your EMS application embedded in the IDU SW
No need for strong working station simple PC is sufficient
(For maintenance issues FTP Server is required)
Easy access simply type the IP address of the IDU on your web page
Supports all IDU versions and configurations
Proprietary and Confidential
Faults - CAS
The CAS window shows collapsed list of alarms
By expanding a line we can see additional information:
Probable cause
Corrective Actions
Ceragon Training Handbook - Page 79
-
3/8/2010
3
Proprietary and Confidential
Faults Event Log
The Event Log shows max. 200 lines of events
When Event #201 occurs, Event #1 is erased and #201 is logged as #200.
Proprietary and Confidential
PM Clearing previous data
To erase all IDU PM data, click the CLEAR button -
Ceragon Training Handbook - Page 80
-
3/8/2010
4
Proprietary and Confidential
PM RMON
The system supports Ethernet statistics counters (RMON) display. The counters
are designed to support:
RFC 2819 RMON MIB. RFC 2665 Ethernet-like MIB.
RFC 2233 MIB II.
RFC 1493 Bridge MIB.
Proprietary and Confidential
PM RMON Special Registers
RMON register / Counter Description
Undersize frames received Frames shorter than 64 bytes
Oversize frames received Frames longer than 1632 bytes
Jabber frames receivedTotal frames received with a length of more than 1632 bytes,
but with an invalid FCS
Fragments frames receivedTotal frames received with a length of less than 64
bytes, and an invalid FCS
Rx error frames received Total frames received with Phy-error
FCS frames receivedTotal frames received with CRC error, not countered in
"Fragments", "Jabber" or "Rx error" counters
In Discard FramesCounts good frames that cannot be forwarded due to
lack of buffer memory
In Filtered FramesCounts good frames that were filtered due to egress
switch VLAN policy rules
Pause frames received Number of flow-control pause frames received
Ceragon Training Handbook - Page 81
-
3/8/2010
5
Proprietary and Confidential
PM E1 / DS-1 (Radio PM)
This PM data relates to the TDM Line Interfaces.
Proprietary and Confidential
PM E1 / DS-1 (Radio PM)
Here we can analyze TDM PM through the radio link
Ceragon Training Handbook - Page 82
-
3/8/2010
6
Proprietary and Confidential
PM Radio
Signal Level RSL & TSL analysis
Allows setting RSL & TSL thresholds
EMS will notify when signal exceeds THSLD
>> Easier maintenance
Aggregated radio traffic analysis
MRMC PM related to ACM:
Scripts
Bit rate
Radio VCs
MSE analysis
Proprietary and Confidential
PM Radio Signal Level - Example
- 40dBm = Nominal RSL for an operational Link
Level 1: 25 sec
Level 2: 15 sec
900 sec = 15min Interval
Ceragon Training Handbook - Page 83
-
3/8/2010
7
Proprietary and Confidential
PM Radio Signal Level - Example
-40
-50
-68
-99 T [sec]
RSL
10 5 10
Using graphical display of the THSLD analysis allows us easier
examination of the RSL & TSL state throughout certain period of time
Proprietary and Confidential
PM Radio - Aggregate
Aggregated radio traffic analysis
Ceragon Training Handbook - Page 84
-
3/8/2010
8
Proprietary and Confidential
PM Radio - MRMC
The information displayed in this page is derived from the license and script
assigned to the radio.
When ACM is enabled and active, as link quality degrades or improves, the
information is updated accordingly.
Proprietary and Confidential
PM Radio - MSE
The information displayed in this page is derived from the license and script
assigned to the radio. When link quality degrades or improves, the MSE reading
is updated accordingly. Differences of 3dB trigger ACM modulation changing.
Threshold can be configured as well for easier maintenance.
Ceragon Training Handbook - Page 85
-
3/8/2010
9
Proprietary and Confidential
PM Ethernet
ETH Traffic + Threshold settings:
Frame Error Rate
Frame error rate (%) measured on radio-Ethernet
interface
Throughput data bits measured on radio-
Ethernet interface
Capacity - overall Ethernet bits rate, data &
overhead, measured on radio-Ethernet interface
Utilization - (Actual Ethernet throughput, relative
to the potential Ethernet throughput of the radio,
excluding TDM channels).
Utilization (%) is displayed as one of five bins:
0-20%, 20-40%, 40-60%, 60-80%, 80-100%
Proprietary and Confidential
PM Ethernet
Ethernet throughput & Capacity PMs are measured by accumulating
the number of Ethernet octets every second, as they are counted by the
RMON counters
Ceragon Training Handbook - Page 86
-
3/8/2010
10
19
Thank You !
Ceragon Training Handbook - Page 87
-
3/8/2010
1
FibeAir IP-10
EMS General Configuration
Proprietary and Confidential
Agenda
2
In this module we shall explain
the following features as they
appear on the EMS navigation
Menu
Ceragon Training Handbook - Page 88
-
3/8/2010
2
Proprietary and Confidential
Unit Parameters Step # 1
3
Configure specific
information that may
assist you later
Such info will help you
locate your site easier
and faster
Proprietary and Confidential
Unit Parameters Step # 1
4
VDC reading
Ceragon Training Handbook - Page 89
-
3/8/2010
3
Proprietary and Confidential
Unit Parameters Step # 1
5
Celsius (metric) or
Fahrenheit (Imperial)
Proprietary and Confidential
Unit Parameters Step # 2
6
By default the time &
date are derived from
the operating system
clock
User may set new
values
These settings are also
used for NTP
connection (later
explained)
Ceragon Training Handbook - Page 90
-
3/8/2010
4
Proprietary and Confidential
Unit Parameters Step # 3
7
IDU Serial number is
important when you
submit your request
for a License upgrade
When you complete
configuring all
settings, click Apply.
Proprietary and Confidential
Versions
8
This page shows the complete
package of IDU and ODU software
components
Ceragon Training Handbook - Page 91
-
3/8/2010
5
Proprietary and Confidential
Versions
9
Lets explore this example:
The IDU running SW is displayed in the aidu line and currently it is 3.0.92
A new SW was downloaded sometime in the past (3.0.97)
The IDU was not upgraded yet
Proprietary and Confidential
Versions RFU files
The IDU holds all the SW files for all the
components (IDU + ODU)
You can see here the different files per
ODU type
10
Ceragon Training Handbook - Page 92
-
3/8/2010
6
Proprietary and Confidential
External Alarms Collapsed Input Alarm Config.
11
Dry Contact Alarms (DB-9):
5 Inputs
1 Output
Proprietary and Confidential
External Alarms Expended Input Alarm Config.
12
Ceragon Training Handbook - Page 93
-
3/8/2010
7
Proprietary and Confidential
External Alarms Configuring the Output Alarm
13
Group of alarms will trigger the external alarm Output.
Communication Alarms related to traffic: Radio / Ethernet line / TDM line
Quality of Service We do not have specific alarms of QoS
Processing Alarms related to SW: Configuration / Resets / corrupted files
Equipment Alarms related to: HW / FAN / RFU mute / Power Supply / Inventory.
Environmental Alarms of extreme temperature.
All Groups.
Test mode manual switch.
Proprietary and Confidential
Management Network Properties
14
Here you can set the
Network Properties of
the IDU
This is the switch MAC address
If your link is up you
should be able to see
the other ends IP
Ceragon Training Handbook - Page 94
-
3/8/2010
8
Proprietary and Confidential
Management Local Properties (Out of band)
15
The IDU has 3 ports for local management: Port 7, Port 6 and Port 5.
You may enable none or up to 3 ports:
Number of ports =3 Port 7, Port 6, Port 5
Number of ports =2 Port 7, Port 6
Number of ports =1 Port 7
Number of ports =0 NO LOCAL MANAGEMENT !!!
Proprietary and Confidential
Management In Band Properties
16
In Band Management requires unique VLAN ID
This helps separating MNG traffic from other services
In Band MNG packets are transferred via the radio link
When the link is down, management is down as well.
Ceragon Training Handbook - Page 95
-
3/8/2010
9
Proprietary and Confidential
Management Port Properties
17
These parameters
allow you setting the
management capacity
and port properties
Proprietary and Confidential
Trap Configuration (OSS / NMS / Northbound)
18
To manage the IDU with OSS /
NMS, you will need to configure
the IP address of the OSS Server
You may configure up to 4 Servers
(Trap Destinations)
Ceragon Training Handbook - Page 96
-
3/8/2010
10
Proprietary and Confidential
Licensing Default License
19
Demo license can be
enabled on-site, it expires
after 60 days
(operational time)
Licenses are generated per
IDU S/N upon request
(capacity / ACM / switch
mode)
License upgrade requires
system reset.
Proprietary and Confidential
Licensing Demo License Enabled
20
Demo License allows you full
evaluation of the IDU
functionality, features and
capacities
Ceragon Training Handbook - Page 97
-
3/8/2010
11
Proprietary and Confidential
NTP Client Properties
21
Enable / Disable
Type NTP Server IP address
Expect IDU to lock on NTP Servers clock
Expected Status:
1. If locked, it returns the IP address of the server it is locked on.
2. Local if the NTP client is locked to the local elements real-time clock
3. NA - if not synchronized with any clock (valid only when Admin is set to
Disable).
The feature supports Time Offset and Daylight Saving Time.
Time Offset and Daylight Saving Time can be configured via WEB (Unit
Information page) or via CLI: /management/mng-services/time-service>
Proprietary and Confidential
NTP Properties
22
Ceragon Training Handbook - Page 98
-
3/8/2010
12
Proprietary and Confidential
NTP Properties
23
When using NTP with external protection 1+1, both Active and Standby
units should be locked independently on the NTP server, and report
independently their Sync status.
Time & Date are not copied from the Active unit to the Standby unit
(CQ19584)
When using NTP in a shelf configuration, all units in the shelf (including
standby main units) are automatically synchronized to the active main units
clock.
Proprietary and Confidential
IP Table
24
Here you can manually set your neighbors network properties
Ceragon Training Handbook - Page 99
-
3/8/2010
13
Proprietary and Confidential
SNMP
25
V1
V3
No security
Authentication
Authentication privacy
SHA
MD5
No Authentication
26
Thank You !
Ceragon Training Handbook - Page 100
-
3/8/2010
1
FibeAir IP-10
EMS Switch Configuration
Proprietary and Confidential
Agenda
2
1. Switch mode review
2. Guidelines
3. Single Pipe Configuration
4. Managed Mode Configuration
5. Managed Mode Common Applications
Ceragon Training Handbook - Page 101
-
3/8/2010
2
Proprietary and Confidential
Switch Modes
3
1. Single (Smart) Pipe (default mode, does not require license)
This application allows only single GbE interface as traffic interface (Optical
GbE-SFP or Electrical GbE - 10/100/1000).
Any traffic coming from any GbE interface will be sent directly to the radio and
vice versa.
This application allows QoS configuration.
Other FE (10/100) interfaces can be configured to be "functional" interfaces
(WSC, Protection, Management), otherwise they are shut down.
Proprietary and Confidential
Switch Modes
4
2. Managed Mode (license depended)
This application is 802.1Q VLAN aware bridge, allowing L2 switching based
on VLANs. This application also allows QoS configuration.
All Ethernet ports are allowed for traffic. Each traffic port can be configured to
be "access" port or "trunk" port:
Type VLANs Allowed Ingress FramesAllowed Egress
Frames
AccessSpecific VLAN should be
assigned to access the port
Only Untagged frames
(or Tagged with VID=0
"Priority Tagged )
Untagged frames
TrunkA range of VLANs should be
assigned to access the PortOnly Tagged frames
Tagged frames
Ceragon Training Handbook - Page 102
-
3/8/2010
3
Proprietary and Confidential
Switch Modes
5
3. Metro Mode (license depended)
This application is 802.1Q VLAN aware bridge, allowing Q-in-Q (A.K.A.
VLAN Stacking). This mode allows the configuration of a PE port and CE port.
Type VLANsAllowed Ingress
Frames
Allowed Egress
Frames
Customer-
Network
Specific S-VLAN should be
assigned to "Customer-
Network" port
Untagged frames, or
frames with C-tag
(ether-type=0x8100).
Untagged or C-tag
(ether-type= 0x8100)
frames.
Provider-
Network
A range of S-VLANs, or
"all" S-VLANs should be
assigned to "Provider-
Network" port
Configurable S-tag.
(ether-type)
0x88a8
0x8100
0x9100
0x9200
Configurable S-tag.
(ether-type)
0x88a8
0x8100
0x9100
0x9200
Proprietary and Confidential
Guidelines
6
Changing switch modes requires a reset
Resets do not change the IP-10 settings (radio, configuration, etc.)
VLANs need to be created in the switch DB before assigned
to a port
Ceragon Training Handbook - Page 103
-
3/8/2010
4
Proprietary and Confidential
Single Pipe
Configuration
7
Proprietary and Confidential
Single Pipe Configuration
8
IP-10 Switch
Port 1: GbE (Optical or Electrical)
Port 2: FE (RJ45)Port 8 (Radio)
VID 51
Untagged
VID 4 VID 45
VID 100
Ceragon Training Handbook - Page 104
-
3/8/2010
5
Proprietary and Confidential
Configuration Single Pipe
9
This is the default setting
Proprietary and Confidential
Configuration Single Pipe
10
Only one ingress port
can be used:
Port 1 (Opt. or Elec.)
Port 2 (RJ45)
When one is enabled
the other is disabled
No need to configure
VID membership
Ceragon Training Handbook - Page 105
-
3/8/2010
6
Proprietary and Confidential
Managed Mode
Configuration
11
Proprietary and Confidential
Configuration Managed Mode
12
Port #2 as Trunk (VID 200)
Radios as Trunk by
default Port #2 as Trunk
(VID 200, VID 300)Port #3 as Trunk
(VID 300)
IDU-B
IDU-A
Lets use this diagram as an example -
Ceragon Training Handbook - Page 106
-
3/8/2010
7
Proprietary and Confidential
Configuration Managed Mode
13
Make sure both IDUs are aware of
the required VIDs
You need to create the VIDs before
you assign them to a certain port
(Set # & Apply)
Proprietary and Confidential
Configuration Managed Mode
14
Next steps:
1. Go to Interfaces page
2. Enable the required port (Ingress ports)
3. Configure the port type as Trunk or Access
4. Assign allowed VLAN IDs (port membership)
5. Radio port is automatically configured as Trunk, all VLANs are
allowed by default
Ceragon Training Handbook - Page 107
-
3/8/2010
8
Proprietary and Confidential
Configuration Managed Mode
15
12
3
4
Proprietary and Confidential
Configuration Managed Mode
Common Applications
16
PC
IP-10
Access Port Radio = Trunk Port
PC
192.168.1.100
192.168.1.200
Transmits and
receives
Untagged
frames
Transmits and
receives
Untagged
frames
Tagging / untangling
Ceragon Training Handbook - Page 108
-
3/8/2010
9
Proprietary and Confidential
Configuration Managed Mode
Common Applications
17
IP-10
Trunk Port
Radio = Trunk Port
Traffic
Generator
Trunk Port
Multiple L2
streams, each
identified with
unique VID
18
Thank You !
Ceragon Training Handbook - Page 109
-
3/9/2010
1
Proprietary and Confidential
FibeAir IP-10
Trunk VS. Access
Proprietary and Confidential
Agenda
2
1. VLAN TAG Attributes
2. Access Port
3. Trunk Port
4. Extracting frames out of a trunk
5. General Guidelines
6. EMS Trunk Configuration
Ceragon Training Handbook - Page 110
-
3/9/2010
2
Proprietary and Confidential
VLAN TAG Attributes
3
1. In L2 ETH switching, L2 traffic can be engineered using the VLAN TAG
attributes
2. L2 traffic is controlled by defining port membership: Access or Trunk
3. Together, port membership + L2 traffic engineering convert
connectionless to connection-oriented network
4. In such networks, services are better deployed and maintained
5. VLAN TAG attributes include:
VLAN ID (12 bits)
Priority Bits (3 bits)
5. Additional attributes may be used to engineer traffic:
MAC DA
Port number
Proprietary and Confidential
Access Port
4
Access Port is a port which is aware of a single VLAN only
Ingress traffic is expected to be Untagged, e.g. no VLAN
information exists within the received Ethernet frame
All frames that are received through this port are tagged with
default VLAN (VID + P bits)
All frames that exit through this port towards customer devices are
untagged (VLAN is removed)
Users can configure the L2 switch to assign different tagging
scenarios to different ports
Ceragon Training Handbook - Page 111
-
3/9/2010
3
Proprietary and Confidential
Access Port
5
Let us examine the Tagging / Untagging process of a L2 switch
DA SA Type Payload FCS
L2 ETH SW
Proprietary and Confidential
Access Port Tagging ingress frames
6
Let us examine the Tagging / Untagging process of Port #1
DA SA Type Payload FCS
DA SA Type Payload FCS
VLAN TAG
Tagging
Port #1Port #8
Access Port:Untagged frame
Tagged frame
Ceragon Training Handbook - Page 112
-
3/9/2010
4
Proprietary and Confidential
Access Port Utagging frames towards customer interfacing ports
7
When Tagged frame from Network is forwarded to Access port, the
VLAN Tag is removed
DA SA Type Payload FCS
DA SA Type Payload FCS
VLAN TAG
Untagging
Port #1Port #8
Access Port: Untagged frame
Tagged frame
Proprietary and Confidential
Access Port Tagging multiple ports
8
The switch can individually tag multiple Access ports with same VID or
unique VID
DA SA Type Payload FCS
DA SA Type Payload FCS
DA SA Type Payload FCS
VLAN TAG = 10
Tagging
Port #1Port #8
Port #2
Access Ports: Untagged frames
DA SA Type Payload FCSVLAN TAG = 33
Ceragon Training Handbook - Page 113
-
3/9/2010
5
Proprietary and Confidential
Trunk Port multiple VIDs awareness
9
To be able to transmit & receive multiple VLANs, the common port has to
be configured as a Trunk Port
DA SA Type Payload FCS
DA SA Type Payload FCS
DA SA Type Payload FCS
VLAN TAG = 10
Trunk Port
Port #1Port #8
Port #2
Access ports: Untagged frames
DA SA Type Payload FCSVLAN TAG = 33
Proprietary and Confidential
Trunk Port multiple VIDs awareness
10
Any port can be configured as Trunk
In this example, port #2 is facing customer device to forward all the
network VLANs (TX&RX)
DA SA Type Payload FCSVLAN TAG = 10
Port #8
Port #2
Untagged frames
DA SA Type Payload FCSVLAN TAG = 33
DA SA Type Payload FCSVLAN TAG = 10
DA SA Type Payload FCSVLAN TAG = 33
Trunk Port
Ceragon Training Handbook - Page 114
-
3/9/2010
6
Proprietary and Confidential
Trunk & Access Extracting frames out of a Trunk
11
A certain VLAN can be extracted out of a Trunk via Access port assigned
with specific VLAN membership (Default VID)
DA SA Type Payload FCSVLAN TAG = 10
Port #8: Trunk
Port #2:
Trunk
Untagged