Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
User Guide
Rev 1.2,
1. Page 1 of 146
NOTICE
It is hoped that this document will be useful in understanding and using the PureWave System. Please
note that the information provided herein is subject to change without notice.
Always refer to the current set of Release Notes for the most up to date information and a description of
the current features as they relate to the PureWave system. These may be different to the information
contained within this User Guide.
Rev 1.2,
1. Page 2 of 146
REGULATORY NOTICE
It is the intention of PureWave Networks to ensure that this equipment is tested to comply with the limits
for a class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful
harmful interference in a residential installation. This equipment generates,
uses and can radiate radio frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications. However, there is
is no guarantee
that interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one or more of the following measures:
Re-orient
Re
orient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which
which the receiver is
connected.
Consult the dealer or an experienced radio/TV technician for help.
Shielded cables and I/O cords must be used for this equipment to comply with the relevant FCC
regulations.
Changes or modifications not expressly approved iin
n writing by PureWave Networks may void the user's
authority to operate this equipment.
Note:
Rev 1.2,
1. Page 3 of 146
PROPRIETARY STATEMEN
STATEMENT
T
PureWave Networks, 2003
2003-200
2009.. All rights reserved. PureWave Networks has prepared this
manual for use by PureWave Networks personnel, licensees, customers and customers of customers.
The information contained herein is the property of PureWave Networks a
and
nd shall neither be reproduced
in whole nor in part without prior written approval from PureWave Networks.
PureWave Networks reserves the right to make changes without notice to the specifications and materials
contained herein, and shall not be responsible
responsible for any damages caused by reliance on the material
presented, including, but not limited to, typographical, arithmetic and listing errors.
Warranty Statement
Hardware
ardware
PureWave Inc (PureWave or the Company) warrants to the end
end-user
user (Customer) that this hardware
product will conform in all material respects to the specifications provided with the hardware and will be
free from defects in workmanship and materials, under normal use and service, for a period of 365 days
from the date of original shipm
shipment
ent by PureWave.
PureWave's sole obligation under this limited warranty shall be, at PureWave's option, to repair the
defective product or part, deliver to Customer an equivalent product or part to replace the defective item,
or if neither of the two for
foregoing
egoing options is reasonably possible, refund to Customer the purchase price
paid for the defective product. All products that are replaced will become the property of PureWave.
Replacement products may be new or reconditioned. PureWave's obligations hereunder
hereunder are conditioned
upon the returned of affected articles in accordance with PureWave's Return Material Authorization
(RMA) procedures.
Subject to the limitations and conditions herein and in the Supply Agreement, after Customer has
completed the steps
steps outlined below in Section 2, PureWave will evaluate each returned Product
roduct and will
use reasonable commercial efforts to either, in its discretion, repair or replace products confirmed by
PureWave as non-conforming
non conforming that are covered under the warranty provided
rovided in the Supply Agreement.
PureWave shall be responsible for shipping the repaired or replaced Product to Customer. PureWave will
use reasonable commercial efforts to ship
sh repaired or rep
replacement
lacement Product within twenty (30) business
days of its receipt,
receipt, however, the allegedly non-conforming
non conforming Product must be received
received by PureWave before
any replacement unit will be shipped.
shipped
The above warranty will also apply to any replaced or repaired product for 90 days from the date of
shipment from PureWave of th
the
e replaced or repaired product, or the remainder of the initial warranty
period, whichever is longer.
Software
PureWave warrants to the Customer that for a period of ninety (90) days from your receipt of the Product
(the Warranty Period) the Software will
will perform substantially in accordance with the Documentation.
If the Software fails to comply with the warranty set forth above, your exclusive remedy will be, at the
option of PureWave (i) a reasonable effort by PureWave to make the Software perform substantially
substantially in
accordance with the Documentation, or (ii) return of the purchase price. This limited warranty applies only
if you return all copies of the Product, together with proof of purchase, to PureWave during the Warranty
Period.
This limited warranty
warranty is VOID if failure of the Software is due to modification of the Software not made by
PureWave, or the abuse or misapplication of the Software. PureWave does not warrant that the Software
is error free, that the Customer will be able to operate the Soft
Software
ware without problems or interruptions or
Rev 1.2,
1. Page 4 of 146
that the Software or any equipment, system or network on which the Software is used will be free of
vulnerability to intrusion or attack.
For further details of the terms and conditions of PureWave's obligations ffrom
rom a software perspective
please refer to PureWave Software Maintenance Program.
Additional Conditions
Notwithstanding anything else herein or otherwise, PureWave reserves the right to establish amendments
to this RMA Policy from time to time. Further,
Furth PureWave Technical Support may prefer to troubleshoot
the wireless link with an onsite Customer technician while the Products are in their original nonnon
conforming state. This process might assist Customer in understanding and troubleshooting the issue.
issue If
PureWave was not afforded the opportunity to troubleshoot an allegedly non-conforming
non conforming Product in
original non-conforming
non conforming state, PureWave may approve or reject the RMA request in its sole discretion,
and such Products are not eligible for advance repl
replacement.
No Fault Found
Notwithstanding Sections 1.1 and 1.2 above, if
i PureWave cannot duplicate any alleged non-conformity
non conformity,
the Product will be returned to the Customer as "No Fault Found." PureWave reserves the right to charge
a testing fee in connect
connection
ion with a returned product that PureWave determines as No Fault Found, and
any such
uch payment
p
must be received by PureWave prior to return shipment of the applicable Product to
Customer.
Warranty Limitations
PureWaves warranties do not apply to any product
product (hardware or software) which has (a) been subjected
to abuse, misuse, neglect, accident, or mishandling, (b) been opened, repaired, modified, or altered by
anyone other than PureWave, (c) been used for or subjected to applications, environments, or physical
physical or
electrical stress or conditions other than as intended and recommended by PureWave, (d) been
improperly stored, transported, installed, or used, or (e) had its serial number or other identification
markings altered or removed.
Warranty Disclaimer
Disclai
PURWAVES SPECIFIC WARRANTIES SUMMARIZED ABOVE ARE THE ONLY WARRANTIES GIVEN
BY PUREWAVE WITH RESPECT TO ITS PRODUCTS (HARDWARE AND SOFTWARE) AND ARE
GIVEN IN LIEU OF ANY AND ALL OTHER WARRANTIES, WHETHER EXPRESS, IMPLIED,
STATUTORY, OR ARISING BY CUSTOM,
CUSTOM, TRADE USAGE, OR COURSE OF DEALING, INCLUDING
WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE, AND PUREWAVE DISCLAIMS ANY AND ALL OTHER WARRANTIES TO
THE MAXIMUM EXTENT PERMITTED BY LAW. Without limiting the generality of the foregoing
sentence, PureWave makes no warranty or representation, either expressed or implied, as to, and
disclaims all liability and responsibility for, (a) the operation, compliance, labeling, or packaging of any of
its products under
under the laws of any jurisdiction outside of the United States of America and (b) the
regulatory compliance of any products in any jurisdiction in which it has not specifically identified
compliance or the use of any product in any jurisdiction in any manne
mannerr other than as contemplated in the
regulatory certifications and approvals for that product in that jurisdiction. To the extent an implied
warranty cannot be excluded, such warranty is limited in duration to the warranty period. The disclaimer
and exclusion
exclusion applies even if the express warranty fails of its essential purpose.
Rev 1.2,
1. Page 5 of 146
RMA Status
Customer may also obtain tthe
he status of their RMA request(s) by sending an e-mail to
support@pwnets.com referencing
ing their assigned
assigned RMA N
Number
umber(s).
Customer Obligations
No product will be accepted for repair or replacement by P
PureWave
ureWave without a RMA number. The product
must be returned to PureWave
PureWave,, properly packaged to prevent damage, shipping and handling charges
prepaid, with the RMA number prominently displayed on the outside of the container. If PureWave
P
determines that a returned product is not defective or is not covered by the terms of the warranty, the
Customer will be charged a service charge and return shipping charges
The following table 1 is a summary of the conditions and charges that PureWave reserves the right to
levy.
RMA Related
Repair and return
Shipment of unit to PureWave
Regular Shipment to Customer
Expedited shipment to Customer
No Fault Found
Warranty for repaired and or replaced
product
Under Warranty
No charge, PureWave pays
Customer pays
No charge,
rge, PureWave pays
Customer pays the additional cost of the
expedited shipping
PureWave reserves the right to levy a charge
Remainder of the orginal warranty or 90 days
Rev 1.2,
1. Page 6 of 146
Advance Replacement
In some unique situations, PureWave may consider
consider, at its sole discretion on a case-by-case
case
case basis, an
advance
dvance replacement request for a non-conforming
non conforming Product that is still covered under its warranty period.
Conditions
The following conditions apply to advance replacements
replacements:
(i)
PureWave has a suitable equivalent replacement unit available.
(ii)
Customers netw
network
ork is experiencing a severe degradation or a complete outage.
outage
(iii)
Customer has complied with the RMA procedures provided herein
(iv)
PureWave reserves the right to levy a charge for the processing and handling of the advance
replacement request. To waive this charge
charge will be the sole discretion of the Senior VP of Sales.
(v)
If expedited shipping is required then Customer pays for all expedited shipping and handling
charges that are in excess of the regular shipment charges. To waive this charge will be the sole
discretion of the Senior VP of Sales.
discretion
(vi)
When an advance replacement is provided and Customer fails to return the original product to
PureWave within fifteen (15) days after shipment of the replacement, PureWave will charge the
Customer for the replacement product,
product at list price.
(vii)
The shipment of advance replacement products is subject to local legal requirements and may
not be available in all locations.
Replacement Timing
PureWave will use reasonable commercial efforts to ship advance replacement Products within five (5)
business days after PureWave
PureWaves
s confirmation that advance replacement is appropriate. PureWave shall
not be responsible for shipping delays if any of conditions herein are not met.
Out of Warranty
For products that are out of warranty, the repair
repair of such products will be subject to a repair fee. In
addition, any request for the Advance Replacement of product that is out of warranty will be subject to not
only the repair fee but additional fees as well. Please contact PureWave for further details.
detai
PureWave does offer extended warranties and enhanced service options for its Customers who desire
those enhanced features. Please contact PureWave for further information about these options
ASSISTANCE
For assistance, contact your nearest PureWave Networks Sales and Service office.
Additional information is available on the PureWave Networks website at http://www.pwnets.com.
http://www.pwnets.com
For Customer Service call: 650
650-528--5200,
5200, or Email: support@pwnets.com.
Rev 1.2,
1. Page 7 of 146
SAFETY PRECAUT
PRECAUTIONS
IONS
When installing this equipment, observe the following precautions to minimize the danger of personnel
injury:
Danger:
NEVER install equipment if there is a chance of lightning or other adverse weather conditions.
NEVER touch uninsulated wires or terminals unless the wire has been disconnected at the
Network interface.
WARNING: Always as
assume
sume that all components and assemblies are static sensitive and always
follow local ESD
ESD-prevention
prevention guidelines to prevent equipment damage.
EXTERNAL POWER SOURCE:
WARNING: For any external power supply that provides the power source for the PureWave
equipment, replace any power supply fuse with the same rating or equivalent, otherwise
equipment,
PureWave Networks will not be responsible for any subsequent damage to its equipment.
Use normal caution when installing or modifying cables. Dangerous voltages may be present.
present. It is
also considered imprudent to install during a lightning storm.
Always disconnect all lines and power connections before servicing or disassembling this
equipment.
For performance and safety reasons, only power supplies listed for use with telephone
telephone equipment
by a Nationally Recognized Testing Laboratory (NRTL) should be used with equipment.
Refer to the installation section of the appropriate instruction manual for the unit you are installing
for:
o Cabling information
o Proper connections
o Grounding information
All wiring external to the product(s) should follow the provisions of the current edition of the
National Electrical Code.
WARNING:
These units contain no user serviceable components. Only authorized Service Personnel should service
or repair these units. "Use only isolated Class 2 Power Source, Rated 48V dc 5.0A Minimum."
Rev 1.2,
1. Page 8 of 146
TABLE OF CONTENTS
Warranty Statement ................................
................................................................
................................................................
....................................... 4
.......................................
Hardware ................................
................................................................
................................
................................................................
................................................................
...................................................4
...................................................
Software................................
................................................................
................................
................................................................
................................................................
.....................................................4
.....................................................
Additional Conditions ................................................................
................................................................................................
................................................................................................
................................ 5
.................................
No Fault Found ................................................................
................................................................................................
................................................................
..........................................................................
..........5
Warranty Limitations ................................................................
................................................................................................
................................................................................................
................................ 5
..................................
Warranty Disclaimer ................................................................
................................................................................................
................................................................................................
................................ 5
..................................
Overview ................................................................
................................................................................................
................................................................
......................................................................
......11
System Components ................................
................................................................
................................................................
...................................................12
...................................................
Scope................................................................
................................................................................................
................................................................
...........................................................................
...........13
2. Base Station
Stat
................................................................................................
................................................................
...........................................................................
........................................... 14
2.1
Overview ................................................................
................................................................................................
................................................................
......................................................................
......14
2.2
MAC Software Architecture ................................
................................................................
................................................................
.........................................................................
.........14
2.3
Enclosure ................................................................
................................................................................................
................................................................
.....................................................................
.....15
2.4
External Connections ................................
................................................................
................................................................
..................................................17
..................................................
2.5
Power................................................................
................................................................................................
................................................................
...........................................................................
...........20
2.6
GPS ................................
................................................................
................................
................................................................
................................................................
.............................................................................
.............26
2.7
Antenna ................................................................
................................................................................................
................................................................
.......................................................................
.......28
2.7.1 Antenna Mounting Kit ................................
................................................................
................................................................
..............................................30
..............................................
2.8
Ethernet ................................................................
................................................................................................
................................................................
.......................................................................
.......32
2.8.1 Weather Protection of the Ethernet Connector ................................................................
.......................................................................
.......33
Lightning
ning Protection Installation Components ................................................................
.............................................................................
.............37
Lightning Rod ................................................................
................................................................................................
..............................................................................................
..............................38
Down Conductor ................................................................
................................................................................................
..........................................................................................
..........................39
Co-axial
axial and/or Cat 5 Cable Shield Grounding ................................................................
...........................................................................
...........39
Grounding and Bonding................................
................................................................
................................................................
...............................................39
...............................................
Recommended Connection of a Bonded G
Ground ................................................................
.......................................................................
.......39
Single Point Grounding Concept ................................
................................................................
................................................................
................................ 40
.................................
Lightning and Surge Protection ................................
................................................................
................................................................
...................................................................
................................ 41
5. Base Station Operations and Management ............... Error! Bookmark not defined.
5.1
Overview ................................................................
.......................................................................................
....................... Error! Bookmark not defined.
Rev 1.2,
1. Page 9 of 146
5.2
Connect to the Base Station ................................
.........................................................
......................... Error! Bookmark
Bookmark not defined.
5.3
Base Station Configuration ................................
...........................................................
........................... Error! Bookmark not defined.
5.4
Base Station Software Upgrade ................................
................................................... Error! Bookmark not defined.
5.4.1 Overview ................................................................
...................................................................................
................................
Error! Bookmark not defined.
5.4.2 SoC Software Upgrade................................
.............................................................
............................. Error! Bookmark not defined.
5.4.3 Linux Software Upgrade ................................
...........................................................
........................... Error! Bookmark not defined.
5.5
Base Station General Operating Status .......................................
................................
Error! Bookmark not defined.
5.6
Subscriber CPEs Operational Status ................................
........................................... Error! Bookmark not defined.
5.7
Base Station Statistics ................................
................................................................
.................................. Error! Bookmark not defined.
Rev 1.2,
1. Page 10 of 146
1.
Introduction
1.1
Overview
Complexit reducing algorithms that allow more than 2 antennas per sector,
Complexity-reducing
Processing algorithms that virtually eliminate interference instead of beam steering algorithms
that provide limited benefits and do not scale to multi
multi-cell
cell deployments, and
Flexibility to grow
grow coverage by adding sectors in a compact and modular fashion.
A Quantum 1000 Base Station provides 8 times the spectral efficiency and significant link gain relative to
standard WiMax
WiM Wave--2 solutions.
The benefits are:
Rev 1.2,
1. Page 11 of 146
1.2
System Components
The PureWave System is composed of a Base Station (which is itself connected to an antenna or
antenna array) and subscriber stations (also known as customer premises equipment (CPE)), which
connect to each other through an air interface (airlink) and to their respective networks (figure 2). Base
Station connect to their customer or provider networks, also known as backhaul networks, via a provider
interface, whereas CPE connect to their subscriber or user networks through a subscriber interface.
ha hardware, software, and mechanic
mechanical
al characteristics that support their functional and
A Base Station has
performance requirements. Base Station and CPEs interconnect with each other and their respective
networks via sets of network, MAC, and PHY protocols.
Rev 1.2,
1. Page 12 of 146
Provider
(aka
aka Customer
Customer)
Provider Interface
(Backhaul
Backhaul)
Subscriber Station
(CPE)
Base Station
Subscriber
(aka User)
CPE
Subscriber Interface
HW
Layers
Layers/
Protocols
Air Interface
(Airlink))
SW
Mechanical
Network
MAC
PHY
1.3
Scope
Rev 1.2,
1. Page 13 of 146
2.
Base Station
2.1
Overview
The Quantum 1000 employs an extremely flexible and versatile hardware architecture. The heart of the
base station is a sophisticated and highly integrated ASIC that combines multiple DSP and general
purpose processor cores along with specialized DSP hardware. A Linux-based
Linux based subsystem supports
applications,
ns, SNMP and other management functions. The radio heart of the Quantum 1000 includes 2
RF transmitters and ass
associated
ociated PAs, and 4 RF receivers
receivers.
Important characteristics of the Quantum 1000 Base Station Sector are:
PureWave has implemented a scalable architecture that lets service providers upgrade their Base
Stations by:
2.2
he PureWave Quantum
Quantum is a
an
n 802.16e WiMAX base station. It contains two major silicon devices, one
The
comprising the Network and Management processor (referred to as the Linux), and the other comprising
the baseband PHY and MAC processors. The Network Processor is the system Manager and the
baseband SoC (sometimes called the Modem) is essentially a high
high-powere
powered
d signal processor. See
Figure 3.
The Network Processor contains a standard PowerPC core plus a Quic
Quick engine for packet processing.
The PowerPC runs Linux and hosts many highly complex applications including an SNMP device
management agent, multiple databases, web server, CLI, logging and other system services. The other
SoC is a WiMAX baseband processor. Together these perform network processing, MAC and PHY tasks.
The Network Processor connects to the external backhaul through a pair of gigabit Ethernet ports and to
the Modem through two 100
100/1000MB
MB Gigabit Ethernet ports. These ports carry a mix of traffic and
management/control messages. Various protocols carried over the two Ethernets link the applications,
including TCP/IP, UDP and custom Ethernet frames.
Rev 1.2,
1. Page 14 of 146
2.3
Enclosure
weather-resistant
resistant cabinet with the overall
The Quantum 1000 Base Station is made up of a single, weather
dimensions of: 24
2 W x 17 H x 5 D (figures 3 and 4).
). The unit has 4 mounting ears, each one located
near a corner of the rear of the enclosure. Each ear will accommodate a M10 bolt. The mounting holes
are spaced 37cm apart (center
(center-to-center),
center), horizontally, and 44.3cm apart, vertically (figures
(figure 5 and 6).
).
Rev 1.2,
1. Page 15 of 146
37cm
44.3cm
Fig
Figure 6 Quantum 1000 Base Station Mounting Hole Pattern
Patt
The Base Station unit can be installed either as an entire outdoor unit (ODU) or as an entire indoor unit
(IDU). The antenna must always be installed outdoors.
Note: It is recommended that the Base Station Enclosure is mounted upright such that the
antenna N-type
N type connectors face down towards the ground. Please ensure that there is adequate
air flow around the Base Station heatsinks (refer to figure 5).
Rev 1.2,
1. Page 16 of 146
B
Station:
Table 2 lists the mechanical, electrical and environmental properties of Quantum 1000 Base
Specifications
Dimensions
Weight
23 pounds
Power
-48V
48V DC, 65 Watts
Temperature
Humidity
5 to 95% non-condensing
non
Surge Protection
UL497B
Lightning Protection
Weatherproofing
IP67
2.4
External Connections
There are basically 4 types of connections that need to be made to the Base Station unit (see figures 7
and 8).
POWER
ANT 2
ANT 1
ANT 4
232
RS232
E-NET 1 E--NET 2
ANT 3
GND
GPS ANT
Antenna Section
Figure 7 - Base Station External Connections (Bottom View)
Rev 1.2,
1. Page 17 of 146
Once the Base Station enclosure has been mounted, the following connections must be made.
POWER
OWER:: Provides th
the
e DC power source for the Base Station unit.
GND: This provides a ground connection point for the Base Station. It is important to ensure that
the Base Station is professionally grounded and complies with all local relevant grounding
electrical codes.
GPS ANT:: This port provides the connection between the GPS antenna (external) and the GPS
G
receiver module (internal). GPS is used by the Base Station Sector to synchronize its TDD gate
to those of Base Stations in neighboring cells.
ANT
NT 1 ANT 4: This is where the Base Station is physically connected to an antenna. The 4
antenna ports are described as:
o
o
o
o
RS232: This is the serial interface to the Base Station. This interface will be primarily used for
out of the box configuration and debug purposes when directed by PureWave Technical
Support Engineers.
E--NET 1: This Gigabit Ethernet port provides the data traffic backhaul interface that should be
connected to the Service Providers network equipment. This port allows in-band
in band management of
the Base Station.
Rev 1.2,
1. Page 18 of 146
E--NET
NET 2: This Gigabit Ethernet port provides an out
out-of
of-band
band management interface. In addition,
this port can be used for daisy
aisy chaining to another base station or to connect to an external
device such as a web Camera.
Camera The
he traffic coming from the daisy chain connector shall be
aggregated and passed through the backhauling connector
connector.
NOTE:
DO NOT POWER ON THE BASE STATION OR REMO
REMOVE
VE THE BASE STATION POWER UNLESS THE
TWO TRANSMITTING ANT
ANTENNA
ENNA PORTS (ANT 1 AN
AND
D ANT 2) ARE EITHER TERMINATED BY A
SUITABLE RF LOAD OR AN ANTENNA. A FAILUR
FAILURE
E TO ENSURE THIS, AT ALL TIMES, COULD
RESULT IN INTERNAL D
DAMAGE
AMAGE TO THE BASE ST
STATION
ATION (FIGURE 9).
Connect the two transmitting ports (ANT 1 and ANT 2) to the two outer most elements of the actual
antenna thus ensuring that the transmission paths are as far apart as possible on the 4 available antenna
ports,, refer to figure 10
10.
Rev 1.2,
1. Page 19 of 146
2.5
Power
The Base Station DC power requirements is such that the external DC source needs to be capable of
delivering up to 4 Amps of current at -48 VDC. The Base Station nominally runs at approx 2 Amps at 48VDC (range -40VDC
40VDC to -57VDC, -38VDC
-38VDC min).
The power connector that is used on the Base Station will accommodate 14 to 18 gauge wire. Remember
ember
to take account of the voltage drop when running long power cable runs. For example, for 18 AWG, for a
cable length of 100
00 feet, a nominal 48VDC supply delivering into a 2A
A load will lead to a voltage drop of
2.7 volts. This power connector (Tyco P/N 796094
796094-2)
2) is provided as part of the Installation kit (figure 13).
Please ensure that the DC power source is powered off and solder the -48
48 VDC wires to connector pins 1
and 2.. Solder the 48 VDC Return wires to pins 3 and 4 (figures 1 to 14).
1
Rev 1.2,
1. Page 20 of 146
Signal
-48V DC
-48V DC
48v DC Return
48v DC Return
Rev 1.2,
1. Page 21 of 146
Figure 15 is an expanded view of the connector onto which is attached the actual cable of wires.
Figure 15 - Base
e Station Power Input Cable Connector Expanded View
Wire strippers
Needlenose pliers
Phillips Screwdrivers
Crimping tool
Step 1
Use your wire strippers to remove about 1/4 inch
in h of insulation from each wire and approximately 1 of
outer cable insulation.
insulation It is important to have each wire the same length and to have the same
amount of expose bare wire. Refer to figure 17..
Rev 1.2,
1. Page 22 of 146
Step 2
First Crimp
Location for
Wire
Insulation
Second
Location for
bare wire
crimp
Figure 1818 Connector Housing assembly
Step 3
Now using the crimping tool in crimp head location B, squeeze very carefully making sure that
th
the first crimp location is forming properly. G
Give
ive it a slight tug to ensure that it is secure and that
the wire is tightly crimped into place. Refer to figures 20 and 21.
Rev 1.2,
1. Page 23 of 146
Step 4
Crimp the cable again for the second crimp location by starting with the A side of the crimping tool to
form the crimp, once the second crimp location begins to curl stop crimping. Next place the second crimp
crimp
location in section B of the same crimping tool and make sure the pin is securely crimped.
crimped Refer to
figures 23,
23 27 and 25.
At this point be sure that the crimped pin looks similar to the one in figure 25.
Rev 1.2,
1. Page 24 of 146
Step 5
Now using the Circular Connector plug, push the 4 crimped pins into each hole (Be sure that the pin out
ou
and color code match the polarity required be the base station, figure 14)
14). Use needle nose pliers to insert
all four pins securely by grabbing the first crimp location and pushing
push
all the way into the connector body.
It helps if you place the connector face down on a table to provide extra leverage, figure 28.
Rev 1.2,
1. Page 25 of 146
It is critical that the pins get pushed as far into the connector body as possible. After using the needle
nose pliers to insert the pins, it will be necessary to continue inserting the pins into the body with your
hand. By pushing and gentl
gently
y twisting the cable to get all four pins completely inserted. You must be able
to see the pins from the front of the connector body as in Figure 31.
Step 6
Secure the DC plug by using the cable camp and tighten the two screws.
2.6
GPS
This port provides the connection between the GPS antenna (external) and the GPS receiver module
module
(internal). GPS is used by the Base Station to synchronize its TDD gate to those of Base Stations in
neighboring cells. Connect the coaxial cable from the external GPS antenna to the SMA-type
SMA type female
connector marked GPS on the bottom right corner o
off the Base Station unit (refer to figure 33).
). Typical
GPS antennas are shown in figure 34.
34
Rev 1.2,
1. Page 26 of 146
Rev 1.2,
1. Page 27 of 146
1)
An external GPS must be connected to the Base Station when the GPS Synchronization is
enabled. If no external GPS is connected then the Base Station transmission will be disabled.
enabled.
2)
If an external GPS is connected and the GPS Synchronization is disabled then the Base Station
may reboot.
Please refer to section 5.3 for details on how to configure GPS Synchronization.
2.7
Antenna
A low-loss,
loss, coaxial
coaxial cable has to be connected to each of the N
N-type
type female connectors located on the
back of the antenna panel and the respective antenna port on the base of the Base Station Sector. The
co-axial
axial cable must be capable of propagating the relevant RF frequ
frequency
ency and therefore it is
recommended to use any high
high-performance,
performance, lowlow-loss
loss coaxial cable (i.e. Hyperlink Technologies P/N
CA3N100 or Times Microwave LMR 400).The order of antenna connections is unimportant.
The important consideration is the length of the
the co
co-axial
axial cable as this will affect the amount of signal loss
and thus effective range of the system. In the case that the Base Station unit is installed outdoors and
close to the antenna, then the co
co-axial
axial cable runs can be kept short and thus loss is minimized.
minimized. If the
Base Station unit is installed indoors with long cable runs up the tower to the antennas then the amount of
signal loss will need to be calculated to ensure that adequate range will still be achieved. As an example,
a Times Microwave LMR400 cable has an attenuation loss of 6.8dB per 100 feet at a frequency of
2.5GHz.
For your information, the procedure to install co-axial
co axial connectors is provided in Appendix A.
devi
are
Note: It is strongly recommended that appropriate lightning surge protection devices
installed (refer to section 3). Please ensure that appropriate weather protection is applied to all
outdoor N-type
N type coaxial connections.
One antenna panel is used for each Base Station. The antenna panel is populated with a number of
directional patch-element
pa
element strips. All elements are enclosed within a single radome and common, rear
mounting plate. Access to each element (antenna) is provided by a dedicated N-type
N type female coaxial RF
connector. Thus, for a 4
4-element
element antenna panel configuration there ar
are
e a total of 4 exposed RF
connectors protruding from the rear mounting plate (refer to figures 35 and 36).
Note: Connect the two transmitting ports (ANT 1 and ANT 2) to the two outer most elements of
the actual antenna thus ensuring that the transmissio
transmission
n paths are as far apart as possible on the 4
available antenna ports.
The specifications for the 2.5GHz and the 3.65GHz antennas are detailed in Appendix A.
Rev 1.2,
1. Page 28 of 146
Rev 1.2,
1. Page 29 of 146
Specifications
Material
Steel
Weight
4 pounds
Load
510 N
Pole Diameter
1 to 4 inches
+/- 15 degrees
Vibration
IEC 60721-3-4
60721
Flammability
UL94
Wind Load
210 km/h
Humidity
Service L
Life
>10 Years
Rev 1.2,
1. Page 30 of 146
1)
2)
Connect items No. 3 to the antenna with spring washers (9), plain washers (10) and nuts (8).(2 x
2 places).
places)
3)
4)
Connect item No. 6 to item No. 3 in the upper side of the antenna as illustrated, with items 7,
8,9,10. Leave screws slightly loose.
5)
6)
Connect item No. 3 to item No. 4 in the lower side of the antenna as illustrated, with items 7,
8,9,10. Leave screws slightly loose.
7)
Connect item No. 4 to item No. 5 with items 11,12,13,14, at its low back and high back
ba (two
places) sides of the Antenna as illustrated.
8)
Adjust the desired azimuth angle and tighten to the pole with a torque of 30 In*Lbs
9)
Adjust the desired elevation tilt to the angle marked, and fully tighten the loose screws.
Rev 1.2,
1. Page 31 of 146
2.8
Ethernet
In the case that the Base Station is mounted outdoors care it is important to ensure that the following
points are followed.
1)
2)
3)
4)
5)
Rev 1.2,
1. Page 32 of 146
Note: Please remember to install all the pieces of the connector onto the cable
cable before the RJ45
connector is crimped.
The procedure to install the connector is given below. The instructions are provided assuming that either
one of the ends of the cable is exposed with no connector crimped or that all components have been
threaded
d onto the cable prior to assembling the connector.
Take the plastic RJ45 holder and ensure that the rubber gasket cut out is attached to the
the RJ45
holder (figure 2
24);; by peeling off the paper lining and fitting the adhesive side to the connector
housing shown
shown below.
Rev 1.2,
1. Page 33 of 146
Slide all components onto the cable, in the displayed order, prior to crimping the Cat-5
Cat 5 cable.
Figure 42 External RJ
RJ-45
45 Weatherproof housing components
Crimp the RJ45 connector (figure 43) onto the cable using standard cable manufacturer
supported crimper and procedure seen in Appendix C.
Rev 1.2,
1. Page 34 of 146
Ensure
nsure that the RJ45 connector is pulled tight into the holder. Ensure that the connector flap is
locked in place
place (figure 44).
Tighten the end cable locks and the assembly is complete (figure 46).
46
Rev 1.2,
1. Page 35 of 146
The assembly can now be attached to the Base Station Sector thus creating a weather protected
connection (figure 47). Be sure to insert the connector into
to the base station before tightening the
cable strain relie
relief gasket.
Rev 1.2,
1. Page 36 of 146
3.
Proper lightning protection requires the use of external primary protectors to complement the secondary
protection built into the PureWave equipment.
equipment. The primary protectors offer the surge currents a direct
path to earth ground versus the undesirable sneak paths it may find through the equipment.
Properly installed and grounded primary protectors will dramatically increase the surge withstanding
capabilities of the PureWave equipment. Surges that exceed the maximum ratings of the primary
protector devices will eventually cause them to fail, however these devices are generally designed to fail
short or open, as the application warrants, such that further surges will not damage the end equipment.
While a failed primary protector still results in a service outage, it does prevent further damage to the
more expensive end equipment.
A Base Station that is installed outdoor on the tower or mast (ODU) is especially vulnerable to lightning
surges. Good surge mitigation practice starts with the lightning rod and its connection to a proper sized
down conductor.
The ground down conductor should be as straight as possible and avoid incidental contact with other
other
conductors such that it represents the path of least resistance to earth ground from the lightning rod. The
tower/mast is also earth grounded to keep its conductive elements at earth potential (0V) for personnel
safety, and generally presents a less desirable
desirable path to ground to surge currents. ODU equipment and
external primary protection devices are mounted to the tower/mast and should be bonded to earth ground
at the same point on the down conductor. This practice is intended to avoid ground loop currents
currents that may
flow from differences in potential between the tower/mast structure and down conductor while large surge
currents are flowing in them respectively. Good surge mitigation practice also makes use of shielded
cables with peripheral shield grounding
grounding to minimize potentials induced on circuit conductors.
These cables should also be secured to the tower/mast at regular intervals to create physical separation
from conductors which are carrying surge currents. This practice avoids incidental contact or
or possible
insulation breakdown from high surge potentials.
A Base Station that is installed indoor units (IDU) requires similar protection as the outdoor installation
(ODU). Primary protection devices are installed on all cables just prior to entry of the
the facility and bonded
to an earth ground stake. Likewise, the cable shields are grounded at the entry panel which should be
bonded to the same earth ground stake.
IDU equipment may also be vulnerable to surges entering via the AC power connection and steps
steps should
be taken to install a proper AC Surge Suppressor device to complete a well protected installation.
3.1
The following are considered to be the main elements that constitute the components of a lightning
protection
otection scheme.
Lightning Rod
Down Conductor
Rev 1.2,
1. Page 37 of 146
Figure 30,, demonstrates graphically how these elements are applied to an overall lightning design.
Please note that this is ssimply
imply a generic diagram and that each individual installation may have its own
specific requirements which may differ from the diagram. The key point to note is the overall concept.
The main items will be outlined in more detail in the following sections.
Figure 48 - A Typical
ypical Lightning Protection Design
3.2
Lightning Rod
The Lightning Rod must be welded to the mast structure and to a down conductor. This should be
constructed of a steel pointed tip and is in general installed at the highest point of the tower. It operates to
intercept the downward moving lightning strike by launching an upward going attachment spark. Once the
attachment is achieved, the bulk of the lightning current follows the ionized path. In this way, the lightning
lightning
rod diverts the lightning away from equipment on the tower.
If the lightning rod is not installed at the highest point on the tower, the equipment that is connected to the
highest point (usually a radio) is the most likely attachment point.
A Class
lass I lightning rod (air terminal) is 3/8-inch
3/8 inch copper or 1/2
1/2-inch
inch aluminum, while Class II calls for 1/21/2
inch copper or 5/8-inch
5/8 inch aluminum. Conductor sizes vary accordingly, also depending on their composition
(stranded or strips) and materials (aluminum o
orr copper). Since most soils contain acid or alkaloid
compounds that react with aluminum, any aluminum used must not come in contact with the soil.
Lightning rods (air terminals) 24 inches or higher should be used.
Rev 1.2,
1. Page 38 of 146
Referring to figure 30 above, the Height Above Antenna above the highest item of equipment (generally
the antenna) must be at least twice the distance (2 x d) between the outer surface of the item and the
tower. This will ensure a protection cone of 60 degrees around the tower (30 degrees each
each side from
the lightning rod). In areas of high lightning activity, the Height Above Antenna should be increased to
up 5 times the distance.
3.3
Down Conductor
The purpose of the Down conductor is to provide the shortest and most direct path to the earth. The
grounding of the down conductor to earth must be of ground resistance no more than 1 ohm.
3.4
The purpose of the Shield grounding is to minimize the potentials induced on circuit conductors plus keep
the cable
e shields at earth potential (0V) for personnel safety.
All ground lugs must be properly bonded to the grounding system of the protected components along with
all Antenna cables. Prior to entry into any facility, the cables must be properly grounded to the
the building
primary ground system at the building entrance panel.
In case of an indoor installed Base Station then this will apply to the co
co-axial
axial cables that connect the Base
Station to the Antenna. This is because these coco-axial
axial cables provide the only inter-connection
connection between
the indoor and the outdoor.
In the case of an outdoor installed Base Station, then this will apply to the Cat 5 cable and power
connection to the Base Station. In the case of an installation of the Base Station, it is the Cat 5 cable
cable and
the power that provide the inter
inter-connections
connections between the indoor and the outdoor.
3.5
The National Electric Code requires that any accessible metallic surface of electronic equipment be
connected to earth ground for personnel safety.
safety. Earth ground connections are achieved by direct
connections to the AC power ground at the IDU and by a grounding lug on the ODU. A Craftsperson must
attach a proper size wire to the ODU ground lug during installation or else the ODU chassis will float
float at
whatever potential appears at the shield connection of the coax.
3.6
We will now examine the concept of a bonded ground. Bonded connections for reliable, gas tight joints
between conductors require removal of all
all paint from both contact surfaces and holding them together
under high pressure such as with a bolt or screw. The use of toothed washers is also recommended to
cause the conductive surfaces to bite into each other for improved connectivity and eliminate movement
of the conductors due to vibration.
Rev 1.2,
1. Page 39 of 146
3.7
Extensive analysis and investigation of installations has led to the belief that the root cause at the heart of
the majority of the failures is likely to be the presence of mult
multi--point
point grounding of equipment on the towers
and in the huts. Single point grounding these elements will eliminate ground voltage differentials and this
will dramatically increase the equipment survivability during surges.
Single point grounding requires that the grounding leads from the antenna, Base Station and Surge
Protection devices for a particular sector, are bonded together at the same point on the tower down
conductor. It is not necessary to bond all the sectors together but to ensure the components
componen of any
individual sector have the same ground point on the tower.
In the equipment hut, in the event of an indoor installation of the Base Station then the chassis ground of
the Base Station and all the Surge Protection Devices grounds must be grounded
grounded at the same point (see
figure 31).
).
Rev 1.2,
1. Page 40 of 146
3.8
Such a device will provide protection to the Base Station in the event of a surge event entering the Base
Station through the RF port.
Two recommended devices are:
PolyPhaser Model AL
AL-LSXM
M-ME
ME (see figure 51).
). This is a 2GHz to 6GHz in-line
in line surge filter with a
DC block. This is a uni
uni-directional
directional device.
Altelicon Model AL
AL-NMNFB--9
9 (see figure 52) This is a DC to 6GHz in-line
in line surge filter. This is a bibi
directional device.
Rev 1.2,
1. Page 41 of 146
Figure 51 - PolyPhaser
yPhaser Model AL-LSXM
AL LSXM-ME Surge Protector (with ground lug)
Care must be undertaken when installing the surge protectors. If the device is bi-directional
bi directional then it is
irrelevant as to the direction of installation. If the device is uni
uni--directional
directional therefore it must be installed to
ensure that the protected side of the surge protector is connected to the Base Station. In the case of the
Polyphasor the N-type
N type male connection is connected
connected directly to the Base Station output and the N-type
N type
female connection is connected to the Base Station to Antenna cable. The male to female design of the
surge protector means that it is very difficult to incorrectly connect. In addition it is recommended
recommended that a
ground wire is connected to the ground lug that is provided with the surge unit (see figure 53).
Rev 1.2,
1. Page 42 of 146
Figure 53 - PolyPhaser Surge Protector Connected to Cable with Ground Cable Attached
Actual installation will depend upon the tower specifics. General tower installation practices would have a
large ground bar or plate just at the cable entrance to the building and the Surge Protectors would be
either attached directly or via the ground wire to this plate/bar. Alternatively the Surge Protectors can be
directly attached to the Base Station and then appropriate ground connections can be made.
In the event that the Base Station Radio is installed outside then it is recommended to install the surge
protection unit(s) between the Base Station and the Antenna.
Rev 1.2,
1. Page 43 of 146
These RF surge protection devices will provide the Customer with two advantages (see figure 54).
1)
2)
In the case of an outdoor installation, it is recommended that suitable building entry surge protection is
considered and the equipment installer may want to consider based upon individual installation
requirements.
Note: Please ensure that appropriate weather protection is applied to all outdoor Surge
Protection devices.
devices
Surge protection
protection devices for both the Cat 5 and the power connections to the Base Station are already
built into the unit. No further devices are required to protect the unit. In addition, for an appropriate fee,
PureWave provides a RF lightning surge protection kit. Thi
This
s includes the RF surge protection devices and
a ground bar which acts as a means to ground all the devices. Please refer to figure 55 for an example
of this kit when installed.
Rev 1.2,
1. Page 44 of 146
4.
Weather Protection
PureWave recommends that appropriate weather protection sealing and the application of an anti-seize
anti seize
material is applied to all outdoor installed elements of the system. Weatherproofing tape kits flawlessly
seals the junction between
between two connectors. It not only protects the connection from water damage, it also
prevents vibrations from loosening the interface.
4.1
Weather Sealing
There are a range of commercially available weather protection kits that provide all the necessary
necessar
components in addition to full instructions on how to weather protect. A generic weather sealing concept
will be adopted rather than a specific one.
The following universal weatherproofing kit was used:
Name:
Part #:
Descripton:
Manufacturer:
Distributor:
Completely wrap the connection with the smaller 3/4inch smaller electrical (plastic) tape. Ensure
Ensur
that the tape extends back up the cable to cover the entire connector and that the tape overlays
itself by approximately half a width (figures 57 and 58).
).
Rev 1.2,
1. Page 45 of 146
2)
Cut a length of the butyl such that it will completely cover the connection. Wrap the tape around
the connector and press into place. Ensure that there are no gaps (figures 59 and 60).
Rev 1.2,
1. Page 46 of 146
3)
Completely wrap the wrapped assembly with the larger 2 inch electrical (plastic) tape. Ensure
that the tape extends back up the cable to cover the entire butyl tape and that the tape overlays
itself by approximately half a width (figure 61).
Rev 1.2,
1. Page 47 of 146
Figure
Figu 61 - Second Plastic Tape Applied
4.2
Anti
Anti-Seize
Distributor:
NEVER-SEEZ
SEEZ Regular Grade Lubricant 1OZ (figure 62)
V057940-8A
8A
NEVER-SEEZ
SEEZ regular grade lubricant is an anti
anti-seize
seize compound and extreme
pressure lubricant in a 1 ounce tube.. Protect metal parts against rust, corrosion
and seizure up to 1800F.
Ellsworth Adhesives (http:
(http://www.ellsworth.com)
//www.ellsworth.com)
Figure 62 - Anti
Anti-Seize
Seize Lubricant
Rev 1.2,
1. Page 48 of 146
To apply the material then the exposed metal surface is simply painted with the lubricant such that all
exposed metal surfaces are completely covered (see figure 63).
63
lubricants
cants tend to be messy and sticky to apply due to the
the nature of
Note: These types of lubri
their intended application. Always read the labels or instructions provided and take necessary
pre-cautions
cautions during application
application.
Figure 63 - Anti-Seize
Seize Applied
Rev 1.2,
1. Page 49 of 146
5. BASIC CONFIGURATION
This
is section describes the process of configuring the minimum required number of parameters for
basic operation of the Base Station. The PureWave Quantum family of WiMAX base stations is
accessible for configuration via two separate methods, a CLI and a Web Interface. Each interface
has the capability of configuring all parameters available in the base station.
5.1
Rev 1.2,
1. Page 50 of 146
E-NET
NET 2: This Gigabit Ethernet port provides an out-of-band
band management interface. In addition,
this port can be used for daisy chaining to another base station or to connect to an external device
such as a web Camera.
The Base Station can be managed via its RS232 Serial port or its E
E-NET
NET 1 Ethernet
Etherne port. To
access the CLI the connection can be made via:
Telnet using Hyperterminal or Tera Term
Serial communications protocol, such as Hyper Terminal or Tera Term.
The procedure to connect to the Base Station is:
ports ANT 1 and ANT 2 are terminated.
Ensure the Base Station antenna ports
Connect and Power on the Base Station.
Connect a straight Cat 5 Ethernet cable directly between the E
E-NET
NET 1 port on the Base Station
and the Customer network or PC.
To connect to the Base Station RS232 port, the User will need the following hardware that is
provided with the install kit. These are as follows:
RJ45 cable.
DB9 male connector (Network Adapter).
DB9 female to DB9 female adapter.
Optional: Serial to USB connector. Most laptop nowadays comes with USB connection
connection instead of
serial connection. If your PC/laptop has serial connection then you wont need this adapter. If not,
then you will need to get serial to USB adapter to access the BS CLI (figure 65).
Rev 1.2,
1. Page 51 of 146
Figure
66 Base Station Serial Connection
Rev 1.2,
1. Page 52 of 146
5.1.1 CLI
The PureWave Command Line Interface (CLI) provided has an IOS look and feel to
to its operation.
It is accessible via a serial console connection, telnet or ssh. All parameters available in the web
interface are also available in the CLI.
1.) Open a terminal emulation program: PuTTy, HyperTerminal, SecureCRT,
TeraTerm
2.) Create a new connection
connection with the following serial port settings
Port Settings
Baud
Data bits
Stop Bits
Parity
Flow Control
3.) Connect to serial port
38400
8
1
None
Xon/Xoff
SSH
1.) Open a SSH client program : PuTTy, SecureCRT, Tunnelier, etc
2.) Create a new profile using the management IP
a. Default IP : 192.168.1.10
b. Port : 22
3.) A login prompt will then be displayed
a. Default login: admin
b. Default password: admin123
admin123
Telnet
1.) Open a Telnet client program : PuTTy, SecureCRT, etc
2.) Create a new profile using the management IP
a. Default IP : 192.168.1.10
b. Port : 23
3.) A login prompt will then be displayed
a. Default login: admin
b. Default password: admin123
Rev 1.2,
1. Page 53 of 146
Selection is Greyed
out not allowing
configuration changes
Rev 1.2,
1. Page 54 of 146
Exit Transaction
returns to view mode
Commit
Applies
configuration
changes
Drop-down
Drop
down box
allows for
configuration
changes
Rev 1.2,
1. Page 55 of 146
5.2
5.3
BASIC CONFIGURATION
W
WebGUI
This section will detail the configuration parameters necessary for basic operation via the web
interface. Most parameters set by default do not require reconfiguration unless the user has
specific deployment or application requirement
requirement.. Only a handful
handful of parameters are required to
personalize the base station to any individual setup. These parameters include but are not limited
to:
Basic Parameters Quick Start
Data IP
Channel Bandwidth
Frequency
Power Output
Rev 1.2,
1. Page 56 of 146
Address::
Netmask:
etmask:
Gateway:
Rev 1.2,
1. Page 57 of 146
Figure 73 Radio P
Parameters
arameters Configuration
Antenna Gain: Gain in dB of the connected antenna
Cable Loss: Loss in dB of the RF cable running between the antenna and base station
Center Frequency: Radio center frequency in kHz
Power Output: Power in dBm as seen at the antenna connectors
Rev 1.2,
1. Page 58 of 146
Rev 1.2,
1. Page 59 of 146
5.3.4 GPS
GPS configuration generically pertains to enabling or disabling the use of GPS by the system for
air frame synchronization. In addition to enabling GPS, there is a feature called the Synch
Recovery Timeout Interval, which issues a reset of the base station when GPS synch is lost for
more than the timeout interval. This interval
interval is user configurable, however it is recommended to
leave the value set to the default five minute interval. The GPS menu is accessible from the main
title page under GPS.
Note: Be sure the GPS antenna is connected to the base station before enabling
enabling this feature
Rev 1.2,
1. Page 60 of 146
5.3.5 Time/NTP
This section allows the user to configure the time and NTP servers used by the system.
Configuring the time will ali
align
gn the system logs to the current time, making it easier to interpret
them during troubleshooting.
Current System Time
Rev 1.2,
1. Page 61 of 146
System time can be set manually or set to use a NTP server to keep the system time in synch.
Due to the implementation of NTP, the system time must be set within 15 minutes of the actual
time for NTP to properly update.
Rev 1.2,
1. Page 62 of 146
NTPDate
NTPDate queries the time via a configurable NTP server aand
nd sets this time value as the
current time.
Rev 1.2,
1. Page 63 of 146
NTP Servers
NTP
NTP servers used to synchronize the system time can be added here. Servers can be specified
by hostname or IP address each having a specific version of three or four.
Rev 1.2,
1. Page 64 of 146
6. Advanced Configuration
Client Profiles
Client profile configuration is a complicated yet extremely flexible system that creates over-the
over the-air
enforcement of specific applications.
applications. As it can be seen in the diagram below, the structure of a
Client Profile is based on a building block approach. The bottom level of the structure is formed
from: packet flow direction, QoS, ARQ/HARQ, and classifier profiles. One building block up from
the bottom is service flows that each contains the set of profiles from the level below.
Client Profile
1-8
Service Flow
2
Service Flow
1
.....
6.1
Service Flow
15
Direction - Downlink
Direction - Uplink
ARQ Profile 1 - 3
HARQ Profile 1 - 6
ARQ Profile 1 - 3
HARQ Profile 1 - 6
Classifier Profile 1 - 64
Classifier Profile 1 - 64
Service Flow
16
Direction
QoS
hARQ/ARQ
Classification
Downlink
Uplink
Best Effort
Best Effort
None
None
None
None
Direction
QoS
Downlink
Uplink
Downlink
Best Effort
Best Effort
eRTPS
HARQ
ARQ
/ARQ
None
None
None
Service Flow 4
Uplink
eRTPS
None
Classification
None
None
IP Protocol = 17
Destintation
tion Port =
11000 - 20000
IP Protocol = 17
Destintation Port =
11000 - 20000
Rev 1.2,
1. Page 65 of 146
Providing restricted data rates is an important aspect of the QoS functions in an application. At
the base level the QoS profile sets the maxim
maximum
um or minimum sustained or reserved rate
respectively. The best effort QoS type provides an up
up-to
to or MIR (Maximum Information Rate);
while UGS or eRTPS provides a CIR (Committed Information Rate). This is not the only method
of rate limiting available in a client profile. A user has the ability to set a MIR and CIR in the client
profile configuration separately from the QoS profile. This function has been provided in order for
a network operator to specify several different service flows with varying QoS levels while
maintaining a per client profile minimum or maximum. It must be noted that between the QoS
and client profile rate limiting, the lower of the two rates will be enforced by the system.
Prioritizing data traffic is another key element in mainta
maintaining
ining reliable data rates to critical
applications. Throughout the client profile building block structure are various levels of
prioritization. The user has the ability set priorities at the QoS, classifier and client profile levels.
Classifier priorities provide the ability to prioritize traffic within the client profile of a single CPE
and between its service flows. At the client profile level the user can prioritize service levels or
groups of CPE.
Rev 1.2,
1. Page 66 of 146
Rev 1.2,
1. Page 67 of 146
Rev 1.2,
1. Page 68 of 146
Direction
Direction specifies whether the flow of packets is traveling from the BS to MS (downlink) or from MS to BS
(uplink).
QoS_Profiles
A QoS profile enforces an over-the-air
over
air service type that provides rate limiting and link
prioritization that can enhance the performance of specific applications. VoIP, for example,
requires a small de
dedicated
dicated amount of traffic with low latency to provide a good user experience. A
properly configured QoS profile will provide the required level of service for any application. One
QoS profile is assigned to each service flow that is used by the subscriber station.
Rev 1.2,
1. Page 69 of 146
HARQ
Hybrid ARQ is an optimized version of ARQ that provides link layer retransmission for error
correction. Using H
HARQ
ARQ has benefits in increasing overall sector range at the cell edge by
providing data redundancy. The number of retries determines the level of improvement and
redundancy but at the cost of throughput. There are six different profiles that have been prepre
configured
onfigured by default.
Enable Select to enable, deselect to disable
profile
Channel Mapping Number of HARQ channels
Channel-Mapping
to use per Subscriber Station
Num--retries Number of times the system will
re-transmit
transmit a burst until it is discarded. More
retries results
results in higher availability but reduces
available throughput
ARQ
ARQ is very similar to HARQ but does not scale very well in large deployments. It is supported by
the base station but is not recommended
recommended for use as HARQ is a more efficient algorithm.
Rev 1.2,
1. Page 70 of 146
Classifier Profile
This profile refers to a packet level classification system that provides the ability to allow or deny
packets conforming to the configured profile. Vl
Vlan
an ID, DSCP value, source/destination port are
just a few examples of what the classifier can provide. Using classifiers can further increase the
performance of specific applications when coupled with the right QoS profile. In order to enabled
the appropriate
appropriate classifier rule, the box labeled Classifer_rule
Classifer_rule-used
used must be checked for the
system to enforce the rule.
Description Profile Description, up to 31
chars, optional
dest
dest-port-high
high Classifier Destination Port
High Limit, 0 - 65535
dest
dest-port-low
Classifier
ssifier Destination Port
Low Limit, 0 - 65535
dest
dest-ip-addr-prfx
prfx Classifier IP Destination
Address and Prefix (mask length); examples:
192.0.0.0/2, 192.168.0.0/13,
192.168.254.0/23, 192.168.1.1/32
dest
dest-ip-addr-used
used Classifier IP Destination
Address Rule is used, true/false
dest
dest-ip-port-used
used Classifier Destination port
Rule is used, true/false
eth
eth-type
Classifier Ethernet Type, 1501 65535
eth
eth-type-used
Classifier EtherType Rule is
used, true/false
ip
ip-protocol
Classifier IP Protocol Type, 0 255
ip-protoc
protocol-used
used Classifier IP Protocol Rule is
used, true/false
ip-tos
tos-high Classifier IP TOS High Limit, 0 - 7
ip-tos
tos-low Classifier IP TOS low limit, 0 - 7
ip-tos
tos-used Classifier IP TOS Rule is used,
true/false
name Profile Name, up to 15 chars, optional
priorit Classifier Priority, 0 - 255
priority
priority
priority-used
Classifier Priority Rule is used,
true/false
src
src-ip-addr-prfx
prfxClassifier
Classifier IP Source Address
and Prefix (mask length); examples:
192.0.0.0/2, 192.168.0.0/13,
192.168.254.0/23, 192.168.1.1/32
src
src-ip-addr-used
used
Classifier IP Source
Classifier
Address Rule is used, true/false
Figure 86 Classifier Profile Configuration
src-ip-port-used
src
used
Rule is used, true/false
src
src-port-high
src
src-port-low
type
vlan
vlan-id
vlan
vlan-id-used
Rev 1.2,
1. Page 71 of 146
SNMP
The SNMP server configuration settings allow the user to d
define
efine what versions of SNMP are
used. Many parameters and performance metrics can be queried via SNMP. The PureWave
PureView EMS system utilizes SNMP to configure and
Rev 1.2,
1. Page 72 of 146
6.2
SERVICE ACTIONS
Start Radio
Radio transmission
Performing this action will start the radio transmission of the system if it is not automatically set.
Rev 1.2,
1. Page 73 of 146
Rev 1.2,
1. Page 74 of 146
Rev 1.2,
1. Page 75 of 146
7. Monitoring
onitoring
7.1
7.1.1
Rev 1.2,
1. Page 76 of 146
DSA-REQ
DSA
REQ Count:
DSA REQ Success
DSA-REQ
DSC REQ Count
DSC-REQ
DSC REQ Success
DSC-REQ
DSD REQ Count
DSD-REQ
DSD REQ Success
DSD-REQ
Max Active Service Flow
Max DL Service Flow
Max UL Service Flow
Rev 1.2,
1. Page 77 of 146
DL Packet Sent:
DL Packet Error:
DL Packet Error Rate:
UL Packet Received:
UL Packet Error:
UL Packet Error Rate:
Startup Counters
Startup counters pertain to CPEs attempting to perform network entry into the base station. This
is important in that the user can see if CPEs a
are
re successful in performing the initial ranging
during network entry and if they have been authenticated into the system. If the number of
attempts far out weights the number of success then it can be deduced that CPEs are having
trouble associating to th
the
e base station.
Figure 96 BS Start-up
Start up Counters Page
Rev 1.2,
1. Page 78 of 146
Throughput Counters
Theses metrics provide information pertaining to throughput through the air
air interface measured in
megabits per second. Downlink and uplink peak and average throughput counters are available.
Rev 1.2,
1. Page 79 of 146
Rev 1.2,
1. Page 80 of 146
RSSI
RSSI-CNR
Metrics
etrics
This set of metrics displays the RF stats of each CPE. RSSI and CINR statistics are available.
Rev 1.2,
1. Page 81 of 146
Rev 1.2,
1. Page 82 of 146
Rev 1.2,
1. Page 83 of 146
Rev 1.2,
1. Page 84 of 146
Remote
This selection allows users to configure setting for a remote syslog
This
log server. Utilizing this feature
will forward all related syslog traffic on the base station to the external syslog server configured.
Rev 1.2,
1. Page 85 of 146
Rev 1.2,
1. Page 86 of 146
8.1.3 Configuration
Configuration pertains to the management of the Base Stations configuration database. The
base station configuration database is stored internally in a running configuration and a start-up
start
configuration. A running configuration is the currently active configuration for the base station as
opposed to the start
start-up
up configuration which only pertains to the configuration of the base station
when it initially boots up. Any changes made to the running config will not be persistent across a
system reboot unless the running config is copied over to tthe
he start-up
start up config. These system
level configuration databases are internal to the base station and cannot be deleted or moved,
however, the user can export portions or the entire configuration into external files that can be
transferred to a PC for backup
backup or editing purposes. This section will detail all the operations the
user has to manipulate the configuration database.
At the top level of the Configuration menu is a status page that displays the current operational
state of the configuration. The operational
operational state pertains to whether the configuration is
performing one of many different tasks, such as exporting, downloading, uploading or backing up
to name a few. Download and Upload Progress display the percentage of the file transferred to
the system.
syste Configuration Files lists the created configuration files that are currently available
along with their file size and the last date modified.
Rev 1.2,
1. Page 87 of 146
Copy
Copying an existing configuration file is po
possible
ssible in this section. The copy is performed by
selecting the existing file and specifying a new copied filename. Enabling the Force option will
overwrite the file to be created if one exists with the same name.
Rev 1.2,
1. Page 88 of 146
Delete
Deleting a configuration file is permitted only on files that are created by the user. This is
performed by selecting the desired
desired file to be deleted and then selecting the Perform button.
Export
Exporting creates an external copy of the configuration database in one of three
different forms. This copy is stored locally on the base station
station and is available for
upload or importing. Exporting creates an ASCII file that allows the user to
manually edit the file. These files follow an IOS
IOS-like
like format. To export the file,
select the type of exported configuration file and enter a name for the file and
then press Perform
Perform.
1. All - Export the entire
configuration database
2. CPE - Export the CPE
provisioning database only
3. Service Profile - Export the
Service Profile database only
Rev 1.2,
1. Page 89 of 146
Import
Importing a configuration file into the base station configures the base station will the parameters
specified in the file. Configuration files from other base station sharing the same software version
can be imported to ease in configuring complex settings.
Rev 1.2,
1. Page 90 of 146
Backup
Backup creates a binary copy of the database in its entirety. The user can not edit a backup file.
Rev 1.2,
1. Page 91 of 146
Download
This allows to user to download BS and CPE provision database configuration file from a remote
server or PC to the base station.
ftp://username:password@<ip_of_ftp_server>/dir/filename
ftp://username:password@<ip_of_ftp_server>/dir/
ftp://test:test123@192.168.1.5/
ftp://test:test123@192.168.1.5/BS_Backup.cnf
BS_Backup.cnf
Rev 1.2,
1. Page 92 of 146
Upload
This allows user to upload BS and CPE provision database configuration file to a remote server
or PC.
ftp://username:password@<ip_of_ftp_server>/dir/
ftp://username:password@<ip_of_ftp_server>/dir/filename
ftp://test:test123@192.168.1.5/
ftp://test:test123@192.168.1.5/BS_Backup.cnf
BS_Backup.cnf
Rev 1.2,
1. Page 93 of 146
8.1.4 Administration
Reboot
Re
This allows user to cold boot the entire BS. A full base station reset takes approximately 5
minutes to boot.
Reboot Sectors
Reboot-Sectors
Reboot-Sectors
Reboot
Sectors comma
command
nd will issue a reboot to the radio module of the base station. This is not a
full base station reboot but only a reboot of the radio module
Rev 1.2,
1. Page 94 of 146
9. Software Upgrade
9.1
Rev 1.2,
1. Page 95 of 146
Rev 1.2,
1. Page 96 of 146
Rev 1.2,
1. Page 97 of 146
Rev 1.2,
1. Page 98 of 146
Appendix A
CLI Overview
The Fiji Base station provides a Cisco like CLI that can be accessed via the serial console connection or a user
initiated Secure-Socket-Shell
Secure
Shell (SSH) session.
When you log in to the CLI, you are in user EXEC mode. User EX
EXEC
EC mode contains only a limited subset of
commands. To have access to all commands, you must enter privileged EXEC mode, normally by using a password.
From privileged EXEC mode you can issue any EXEC command
commanduser
user or privileged modeor
mode or you can enter global
configuration mode. Most EXEC commands are one-time
one time commands. For example, show commands show
important status information, and clear commands clear counters or interfaces. The EXEC commands are not
saved when the software reboots.
Configuration modes allo
allow
w you to make changes to the running configuration. If you later save the running
configuration to the startup configuration, these changed commands are stored when the software is rebooted. To
enter specific configuration modes, you must start at global cconfiguration
onfiguration mode. From global configuration mode,
you can enter interface configuration mode and a variety of other modes, such as protocol-specific
protocol specific modes.
For simplicity and readability, the following sections will list Operational CLI commands (User/Privileged
(User/Privileged EXEC
mode commands) and Configuration CLI commands (Configuration mode commands). The prompt device-name#
device name#
indicates CLI is in operational mode. When moving from operational mode to configuration mode, command
config
config terminal
terminal is used and the prompt
mpt is changed from device
device-name
name# to device-name(config)#
device
(config)#.
Command
Help
abbreviated command-entry?
abbreviated-command
abbreviated-command
abbreviated
command-entry<Tab
Tab>
?
command ?
Purpose
Provides a brief description of the help system in any command
mode.
Provides a list of commands that begin
begin with a particular character
string. (No space between command and question mark.)
Completes a partial command name.
Lists all commands available for a particular command mode.
Lists the keywords or arguments that you must enter next on the
command line. (Space between command and question mark.)
Rev 1.2,
1. Page 99 of 146
Ctrl-y
9.1.7.5 Capitalization
Capitalize the word at the cursor, i.e. make tthe
he first character
uppercase and the rest of the word lowercase.
Esc-c
Change the word at the cursor to lowercase.
Esc-l
Change the word at the cursor to uppercase.
Esc-u
9.1.7.6 Special
Abort a command/Clear line
Ctrl-c
Ctrl
Quote insert character, ie do not treat the next keystroke as an edit command.
Ctrl-v/ESC-q
Ctrl
Redraw the screen
Ctrl-l
Ctrl
Transpose characters
Ctrl-t
Ctrl
Enter multi-line
multi line mode. This lets you enter multi
multi-line
line values when prompted for a value in the CLI. It is not
available when editing a CLI command. ESC
ESC-m
Exit configuration mode. Only in CC and I-style.
style.
Ctrl-z
Rev 1.2
2, Page 100 of 146
9.1.8.2 terminal
9.1.8.7 logout
9.1.8.8 logout session <session-id>
<session
9.1.8.9 logout user <user
<user-id>
Terminate the current session, a session identified by a particul
particular
ar session ID or all session
associated with a user ID.
9.1.8.10
9.1.8.11
9.1.8.12
screen
screen-length
length <num-rows>
<num
Configure the CLI session screen length value for the number of rows displayed for each screen
page.
9.1.8.13
screen
screen-width
width <num-columns>
<num columns>
Configure the CLI session screen width value for the number of columns displayed for each
screen page.
9.1.8.14
9.1.8.15
traceroute <hostname>
Perform a diagnostics traceroute command for a particular hostname or IP address.
9.1.8.16
who
Display currently logged on users. The current session, i.e. the session running the show status
command, is marked with an asterisk.
Example:
Rev 1.2
2, Page 101 of 146
io# who
Session User
*7
joe
io#
9.1.8.17
Context From
cli
Proto
127.0.0.1
Date
console 13:19:05
show cli
Display CLI session configuration settings.
9.1.8.18
show running
running-config
config [details | all]
Display current running configuration. By default the whole configuration is displayed. Per
default only elements that have been explicitly set to a value are shown.
shown. This makes it easier to
handle large configurations. However, it is possible to force the show command to display all
elements. This is done using the 'details' or 'all' options.
9.1.8.19
show startup
startup-config
config [details | all]
Display the startup configuration that was last saved and loaded at system startup. Per default
only elements that have been explicitly set to a value are shown. This makes it easier to handle
large configurations. However, it is possible to force the show command to display all elements.
This is done using the 'details' or 'all' options.
9.1.9.2 clear
Remove all configuration changes.
Rev 1.2
2, Page 102 of 146
9.1.9.10
configuration
figuration upload source-filename
source filename <filename> dest-url
dest url <URL>
ACTION: This command will upload the selected file to the specified destination URL.
9.1.9.11
configuration write
Save the current running configuration to the startup configuration file (same as write memory
memory
command).
9.1.9.12
do <command>
Run command in operational mode.
9.1.9.13
9.1.9.14
9.1.9.15
help <command>
Shows help text for command.
9.1.9.16
Rev 1.2
2, Page 103 of 146
<mode>
In which mode is the command.
<level>
In which privilege level should the command be available (1(1-15)
<command>
Command string.
Example:
io(config)# privilege exec level 4 show
io(config)#
9.1.9.17
pwd
Display current submode path.
9.1.9.18
rollback con
configuration
figuration [<number>
[<number>]
Return the configuration to a previously committed configuration. The system stores a
limited number of old configurations. The number of old configurations to store is
configured in the confd.conf file. If more than the configured number
number of configurations are
stored, then the oldest configuration is removed before creating a new one.
The most recently committed configuration (the running configuration) is number 0, the
next most recent 1, etc.
The files are called rollback0 - rollback
rollbackX,
X, where X is the maximum number of saved
committed configurations.
Example:
io(config)# rollback configuration 1
io#
9.1.9.19
9.1.9.20
show full
full-configuration
configuration [details] [[<pathfilter
<pathfilter> ]
Show current configuration. The show command can be limited to a part of the
configuration by providing a <pathfilter>.
9.1.9.21
write memory
Save the current running configuration to the startup configuration file.
9.1.9.22
Rev 1.2
2, Page 104 of 146
9.2
9.2.1.8 tech-support
tech support generate-system-debug
generate
debug-log
Generate technical support information that contains detailed BS system information and
saved to a log file that can be uploaded for PureWave Technical support team to review.
Rev 1.2
2, Page 105 of 146
9.2.2.10
9.2.2.11
9.2.2.12
system base
base-station
station groupgroup-id
id <string (0-64)>
(0
Set the system group ID (string
(stri 64 chars max) which is use by the EMS to identify the
group the base station belongs to.
9.2.2.13
system base
base-station
station groupgroup-descr
descr <string>
Set the system group description for the group ID that is configured.
9.2.2.14
system base
base-station
station asn-gateway
asn gateway ip
ip-address
address <IP address>
addr
Set the system Base station ASN gateway IP address, which is only applicable if the
mode selected is asn-gateway.
asn gateway. This information is global and will be propagated to all
Sectors for configuration and usage.
Rev 1.2
2, Page 106 of 146
9.2.2.15
system base
base-station
station mode <standalone
<standalone-locall | standalone-remote
standalone remote | asnasngateway >
Set the system Base station operational mode to standalone local provisioning,
standalone remote provisioning database (remote provisioning requires a AAA Radius
server configuration see command system base
base-station
station radius ip address <IP
address>), or ASN gateway which requires the setting of the ASN gateway IP address.
This configuration will be needed by each sector so that they can figure where to forward
all CPE lookup requests (TLV-based
(TLV based message request sent to WMD Manager, external
AAA/Radius server or ASN gateway).
9.2.2.16
system base
base-station
station radius ip
ip-address
address <IP address>
Set the system Base station Radius/AAA server IP address to be used by all Sectors for
configuration and usage.
9.2.2.17
system base
base-station
station radius port
port-number
er <port>
Set the system Base station Radius/AAA server IP port number to be used by all Sectors
for configuration and usage.
9.2.2.18
system base
base-station
station radius secret <key
<key-string>
Set the system Base station Radius/AAA server secret to be used by all Sectors for
configuration and usage.
9.2.2.19
9.2.2.20
9.2.2.21
9.2.2.22
9.2.2.23
no system hostname
Set the system hostname to the specified string name. The no option is used to reset
the system hostname to default.
9.2.2.24
9.2.2.25
9.2.2.26
Rev 1.2
2, Page 107 of 146
9.2.2.27
system interfa
interface
ce ip default-gateway
default gateway <IP address>
9.2.2.28
9.2.2.29
9.2.2.30
9.2.2.31
Rev 1.2
2, Page 108 of 146
9.3
This section provides a brief overview of our system logging infrastructure and its configuration
capabilities that will provide very useful system debugging capabilities. The following diagrams
diagrams provide a
visual display of this logging functionality.
Rev 1.2
2, Page 109 of 146
Rev 1.2
2, Page 110 of 146
9.3.2.9 no logging
logging local override
Disables the logging overrides for all applications (including level and trace).
9.3.2.10
9.3.2.11
9.3.2.12
9.3.2.13
9.3.2.14
Rev 1.2
2, Page 111 of 146
9.3.2.15
9.3.2.16
9.4
Rev 1.2
2, Page 112 of 146
9.4.2.11
9.4.2.12
9.4.2.13
9.5
Rev 1.2
2, Page 113 of 146
9.6
Rev 1.2
2, Page 114 of 146
3. local
local-only:
only: All remote users will be mapped to the user specified by the 'aaa
authorization map default-user
default user <user name>' command. Any vendor attributes received
by an authentication server are ignored.
9.7
9.7.2.3 radius-server
radius server retransmit <retries>
9.7.2.4 no radius-server
radius server retransmit
Sets (or resets to 0) a global
global communication value for all RADIUS servers. Can be
overridden in a 'radius-server
'radius server host' command. Defaults to 1. Sets the number of times the
client will attempt to authenticate with any RADIUS server. To disable retransmissions set
it to zero. Range is 0-5.
9.7.2.5 radius-server
radius server key [<string>]
9.7.2.6 no radius-server
radius server key
Sets (or clears) a global communication value for all RADIUS servers. Can be
overridden in a 'radius-server
'radius server host' command. Sets the shared secret text string used to
communicate with any RADIUS serve
server.
If the positive form of the command is used with no key, the user will be prompted for the
key. Any entries made at this prompt will only echo with the '*' character, and the user
will have to enter the same string twice for confirmation.
9.7.2.7 radius-server
radius server login-lat
lat-group
group <string>
9.7.2.8 no radius-server
radius server login-lat-group
login
Sets (or clears) the string to send as the LOGIN_LAT_GROUP attribute in all RADIUS
requests (authentication_request, accounting_request, and password_request). If the
string is cleared (or set to the empty string), the attribute will not be sent. Note that this
can be overridden on a per-host
per host basis using commands documented below.
Rev 1.2
2, Page 115 of 146
9.7.2.9 radius-server
radius server host <ip-address>
<ip address> [auth
[auth-port
port <port-number>]
<port number>] [timeout <seconds>]
[retransmit <retries>] [key <string>| pr
prompt--key] [login--lat-group
group <string>]
9.7.2.10
no radius
radius-server
server host <IP address> [auth
[auth-port
port <port-number>]
<port number>]
Add a RADIUS server to the set of servers used for authentication. Some of the
parameters given may override the configured global defaults for all RADIUS servers.
servers.
The 'auth
'auth-port'
port' defaults to 1812 and is used for authentication requests.
The same IP address can be used in more than one 'radius-server
'radius server host' command as
long as the 'auth
'auth-port'
port' is different for each. 'auth
'auth-port'
port' is a UDP port number. 'auth-port'
'auth port'
must
st be specified immediately after the host option (if present).
The "prompt
"prompt-key"
key" parameter is mutually exclusive with "key <string>". It requests to be
prompted for the key, with the entry echoed as '*' characters, for greater security.
If 'no radius
radius-server
rver host <ip-address>'
<ip address>' is specified, all radius specific configuration for this
host is deleted. 'no radius-server
radius server host <IP address> auth
auth-port
port <port>' may be specified to
refine which host is deleted, as the previous command will delete all RADIUS servers
with the specified IP address.
The login
login-lat-group
group parameter overrides the global setting if it is not the empty string.
Specifying the empty string here means to use the global setting for this host.
RADIUS servers are tried in the order they are config
configured.
9.8
Rev 1.2
2, Page 116 of 146
9.9
Rev 1.2
2, Page 117 of 146
show ssh se
server
rver
Display the SSH server configuration settings.
9.10.1.2
9.10.1.3
show telnet
Display the Telnet server configuration settings.
9.10.1.4
show web
Display the Web UI server configuration settings.
9.10.2.2
9.10.2.3
9.10.2.4
9.10.2.5
9.10.2.6
9.10.2.7
9.10.2.8
Rev 1.2
2, Page 118 of 146
9.10.2.9
9.10.2.10
9.10.2.11
9.10.2.12
9.10.2.13
web idle
idle-timeout
timeout <length in minutes>
Configure the length of user inactivity required before the Web UI automatically logs out a
user.
SNMPv3
Message integrity
integrityEnsures
Ensures that a packet has not been tampered with in-transit.
in
Authentication
AuthenticationDetermines
Determines the message is from a valid source.
Encryption
EncryptionScrambles
Scrambles the packet contents to prevent it from being seen by
unauthorized sources.
SNMPv3 provides for both security models and security levels. A security model is an
authentication strategy that is set up for a user and the role in which the user resides. A
authentication
security level is the permitted level of security within a security model. A combination of
a security model and a security level determines which security mechanism is employed
when handling an SNMP packet.
9.11.1.2
The security level determines if an SNMP message needs to be protected from disclosure
and if the message needs to be authenticated. The various security levels that exist within
a security model are as follows:
Rev 1.2
2, Page 119 of 146
noAuthNoPriv
noAuthNoPrivSecurity
Security level that does not provide authentication or encryption.
authNoPriv
authNoPrivSecurity
Security level that provides authentication but does not provide
encryption.
authPriv
Security
Security level that prov
provides
ides both authentication and encryption.
Three security models are available: SNMPv1, SNMPv2c, and SNMPv3. The security
model combined with the security level determine the security mechanism applied when
the SNMP message is processed.
9.11.1.3
User-Based
Based Security
Security Model
The following table identifies what the combinations of security models and levels mean.
Model
Level
Authentication
Encryption
What Happens
v1
No
v2c
noAuthNoPriv
uthNoPriv Community string
No
v3
noAuthNoPriv Username
No
v3
authNoPriv
HMAC-MD5
HMAC MD5 or
HMAC-SHA
HMAC SHA
No
v3
authPriv
HMAC-MD5
HMAC MD5 or
HMAC-SHA
HMAC SHA
DES
SNMPv3 User
User-Based
Based Security Model (USM) refers to SNMP message-level
message level security and
offers the following services:
Rev 1.2
2, Page 120 of 146
Message integrity
integrityEnsures
Ensures that messages have not been altered or destroyed in an
unauthorized manner and that data sequences have not been altered to an extent greater
than can occur non
non-maliciously.
maliciously.
Message origin authenticationEnsures
authentication Ensures that the claimed identity of the user on
whose behalf received data was originated is confirmed.
Message confidentialityEnsures
confidentiality Ensures that information is not made available or disclosed
to unauthorized individuals, entities, or proces
processes.
ses.
SNMPv3 authorizes management operations only by configured users and encrypts
SNMP messages.
Fiji uses two authentication protocols for SNMPv3:
HMAC-MD5
MD5-96
96 authentication protocol
HMAC-SHA
SHA-96
96 authentication protocol
show snmp
Display all SNMP configuration options, except for what is displayed by the other "show
snmp ..." commands described below.
9.11.2.2
9.11.2.3
9.11.2.4
Rev 1.2
2, Page 121 of 146
snmp
snmp-server
server enabled | disabled
Enable or disable the SNMP server. Note that this not only stops serving of SNMP
variables, but also the sending of SNMP traps.
9.11.3.2
[no] snmp
snmp-server
server disable traps
Enable or disable sending of SNMP traps from this system. Traps may only be enabled if
the SNMP server overall is enabled.
Note that tra
traps
ps are only sent if there are trap sinks configured with the "snmp-server
"snmp server host
..." command, and if these trap sinks are themselves enabled.
9.11.3.3
snmp
snmp-server
server v1 enabled | disabled
Enable or disable SNMP v1 authentication on this system. If disabled, the community
community
configured will be ignored. Note that this has the same effect as removing the community
entirely.
9.11.3.4
snmp
snmp-server
server v2c enabled | disabled
Enable or disable SNMP v2c authentication on this system. If disabled, the community
configured will be ignored. Note that this has the same effect as removing the community
entirely.
9.11.3.5
snmp
snmp-server
server v3 enabled | disabled
Enable or disable SNMP v3 authentication on this system. If disabled, the users
configured will be ignored. Note that this has the same effect as removing
removing the users
entirely.
9.11.3.6
snmp
snmp-server
server port <TCP port>
9.11.3.7
no snmp
snmp-server
server port
This command will configure UDP port number for SNMP server. The default is port 161
which is set when the no option is selected.
9.11.3.8
snmp
snmp-server
server community <community name> security-name
security ame [read-only
[read only |
read-write]
read
9.11.3.9
no snmp
snmp-server
server community
Set a community name for either read
read-only
only or read/write SNMP requests. If neither "ro"
or "rw" is specified, the read-only
read only community is set (the same as if "ro" had been
specified). There are two community
community strings that can be set: if the readread-only
only community
is specified, only queries can be performed; if the read/write community is specified, both
queries and sets can be performed.
The "no ..." command resets the ro community to its default name public
publi and rw
community to the default name private.
9.11.3.10
snmp
snmp-server
server host <IP address> traps version 1 <community string> [udp[udp
port <number>]
Configures a host receiver for SNMPv1 traps. The community can be any alphanumeric
string up to 255 characters. The UDP port number range is from 0 to 65535.
Rev 1.2
2, Page 122 of 146
9.11.3.11
snmp
snmp-server
server host <IP address> {traps | informs} version 2c <community
string> [udp
[udp-port
port <number>]
Configures a host receiver for SNMPv2c traps or informs. The community can be any
alphanumeric string up to 255 characte
characters.
rs. The UDP port number range is from 0 to
65535.
9.11.3.12
snmp
snmp-server
server host <IP address> {traps | informs} version 3 {auth | noauth |
priv} <username> [udp-port
[udp port <number>]
9.11.3.13
no snmp
snmp-server
server host <IP address>
Configures a host receiver for SNMPv2c traps or informs. The username can be any
alphanumeric string up to 255 characters. The UDP port number range is from 0 to
65535.
9.11.3.14
[no] snmp
snmp-server
server host <IP address> enable
Disable a trap sink without actually removing it altogether from the configuration. All trap
sinks are cr
created
eated enabled.
9.11.3.15
snmp
snmp-server
server user <username> v3 auth {md5 | sha} <plaintext auth
password> [priv {des | aes-128}
aes 128} [<plaintext privacy password>]]
9.11.3.16
snmp
snmp-server
server user <username> v3 encrypted auth {md5 | sha} <hashed auth
password> [priv {des | aes-128}
aes 128} [<hashed p
privacy
rivacy password>]]
9.11.3.17
snmp
snmp-server
server user <username> v3 prompt auth {md5 | sha} [priv {des | aesaes
128}]
Set security parameters on a per
per-user
user basis for SNMP v3 access. Currently the only user
permitted here is "admin". The hash algorithm specified is used both to
to create digests of
the authentication and privacy passwords for storage in configuration, and also in HMAC
form for the authentication protocol itself.
If the command ends after the auth password, the privacy algorithm is set to its default,
which is AES
AES-128,
128, and the privacy password is set to the same as whatever was
specified for the authentication password. You may also specify the privacy algorithm
while still not specifying a separate password.
There are three variants of the command, which branch out
out after the "v3" keyword. If
"auth" is the next word, the passwords are specified in plaintext on the command line. If
"encrypted" is the next word, the passwords are specified encrypted (hashed) on the
command line. If "prompt-pass"
"prompt pass" is the next word, tthe
he passwords are not specified on the
command line: the user is prompted for them while the command is executing. If "priv" is
not specified, only the auth password is prompted for. If "priv" is specified, the privacy
password is prompted for; entering a
an
n empty string for this prompt will result in using the
same password as specified for authentication.
9.11.3.18
[no] snmp
snmp-server
server user <username> v3 enable
Enable or disable access via SNMP v3 for the specified user. As above, only the "admin"
account can be used here
here at the present time.
Rev 1.2
2, Page 123 of 146
9.12.1.1
9.12.1.2
9.12.1.3
Rev 1.2
2, Page 124 of 146
Status:
Restart count:
Current Frame Number:
Number of MSS:
Number of Service Flow:
Software Version:
Up
1
55
17
45
1.0.10.3145
9.12.1.4
9.12.1.5
9.12.1.6
0
2330
5
3
10
8
9.12.1.7
9.12.1.8
Rev 1.2
2, Page 125 of 146
9.12.1.9
9.12.1.10
9.12.1.11
9.12.1.12
9.12.2.1
9.12.2.2
9.12.2.3
9.12.2.4
9.12.2.5
Rev 1.2
2, Page 126 of 146
9.12.2.6
9.12.2.7
9.12.2.8
9.12.2.9
9.12.2.10
9.12.2.11
9.12.2.12
9.12.2.13
9.12.2.14
9.12.2.15
9.12.2.16
9.12.2.17
9.12.2.18
9.12.2.19
Rev 1.2
2, Page 127 of 146
9.12.2.20
9.12.2.21
9.12.2.22
9.12.2.23
9.12.2.24
9.12.2.25
9.12.2.26
9.12.2.27
sector
ector action <1
<1--65535>
65535> subscriber
subscriber-station
station <MAC address> reset
ACTION: This command is used to reset the subscriber station identified by its MAC
address.
show running
running-config
config cpe [<MAC address>]
Display CPE provision table entries.
Rev 1.2
2, Page 128 of 146
9.13.1.2
show service
service-profile
profile [ arq-profile
arq profile | client
client-profile
profile | cls-profile
cls profile | harq-profile
harq profile |
mcast-profile
mcast
profile | qos
qos-profile
profile ] [<index>]
Display all provisioning profiles: ARQ, Classifier, Client, HARQ, Client, Multicast
Multicast and
QoS. This will retrieve all the service
service-profile
profile profiles configuration values on the WMD
board.
9.13.2.2
9.13.2.3
Client
Client Multicast Profile 1
1-50
50 (selects existing Mcast profile)
Client Profile 1-8
1 8 (selects existing Client profile)
Convergence Sublayer Type, one of {ETHERNET_CS, IPv4_CS}
Customer Reference ID, any string up to 31 chars
CPE IP Address (only valid for csType=IPV4_CS)
service
service-profile
profile arq-profile
arq profile <index> <ARGS >
This command is used to configure ARQ profiles. The following are the set of parameters
used for the profile configurations.
ack-processing
processing-time
time ARQ Acknow
Acknowledge
ledge Processing Time in msec, 0-255
0
block--lifetime
ARQ Block Lifetime Timeout, units of 5msec, 0 - 1310
block--size
ARQ Block Size, one of {16, 32, 64, 128, 256, 512 or 1024}
deliver
deliver-in-order
ARQ Deliver in Order, true/false
description
Profile Descript
Description,
ion, up to 31 chars, optional
enabled
ARQ Enabled, true/false
name
Profile Name, up to 15 chars, optional
purge--timeout
ARQ Purge Timeout, units of 5msec, 0 - 1310
sync-loss
loss
ARQ Sync Loss Timeout, units of 5msec, 0 - 1310
timeout
timeout-rx-delay
ARQ Receiv
Receive
e Retry Timeout Delay, units of 5msec, 0 - 1310
timeout
timeout-tx-delay
ARQ Transmit Retry Timeout Delay, units of 5msec, 0 - 1310
window
window-size
ARQ Window Size, 0 - 1024
9.13.2.4
service
service-profile
profile client-profile
client profile <index> <ARGS >
This command is used to configure Client prof
profiles.
iles. The following are the set of
parameters used for the profile configurations.
description
Profile Description, up to 31 chars, optional
max-dl
dl-rate
Maximum downlink rate reserved for this client (bits per sec), 0 4294967295
max-pps
pps
Maximum Packets per sec, 1 - 65535
max-traffic
traffic-burst
Maximum Client Traffic Burst, 0 - 4294967295
max-ul
ul-rate
Maximum uplink rate for this client (bits per sec), 0 - 4294967295
mcast
mcast-profile-num
num
Mcast Profile Number used by this Client profile, 1-50
1
min-dl
dl-reserved-rate
rate Minimum downlink rate reserved for this client (bits per sec), 0 4294967295
min-ul
ul-reserved-rate
rate Minimum uplink rate reserved for this client (bits per sec), 0 4294967295
name
Profile Name, up to 15 chars, optional
Rev 1.2
2, Page 129 of 146
num-sflow
sflow
Number of Service Flows For this Client Profile, 1 - 16
priority
Traffic Priority for this client, 1 - 8
sflow--profile
profile <index> Configure a client Service Flow Profile
name
Name, up to 31 chars, optional
description
Description, up to 31 chars, optional
direction
Direction opti
option:
on: downlink or uplink
arq-profile--num
ARQ profile reference index number
cls-profile--num
ARQ profile reference index number
harq-profile
profile-num
ARQ profile reference index number
qos-profile
profile-num
ARQ profile reference index number
9.13.2.5
service
service-profile
profile cls-profile
cls
<index> <ARGS >
This command is used to configure Classifier profiles. The following are the set of
parameters used for the profile configurations.
description
Profile Description, up to 31 chars, optional
dest-port
port-high
Classifier Destination Port High Limit, 0 - 65535
dest-port
port-low
Classifier Destination Port Low Limit, 0 - 65535
dest-ip
ip-addr-prfx
Classifier IP Destination Address and Prefix (mask length);
examples: 192.0.0.0/2, 192.168.0.0/13, 192.168.254.0/23, 192.168.1.1/32
dest-ip
ip-addr-used
Classifier
ifier IP Destination Address Rule is used, true/false
dest-ip
ip-port-used
Classifier Destination port Rule is used, true/false
eth-type
type
Classifier Ethernet Type, 1501 - 65535
eth-type
type-used Classifier EtherType Rule is used, true/false
ip-protocol
protocol
Classifier
fier IP Protocol Type, 0 - 255
ip-protocol
protocol-used
Classifier IP Protocol Rule is used, true/false
ip-tos--high
Classifier IP TOS High Limit, 0 - 7
ip-tos--low
Classifier IP TOS low limit, 0 - 7
ip-tos--used
Classifier IP TOS Rule is used, true/false
name
Profile
rofile Name, up to 15 chars, optional
priority
Classifier Priority, 0 - 255
priority
priority-used
Classifier Priority Rule is used, true/false
src-ip--addr-prfx
Classifier IP Source Address and Prefix (mask length);
examples: 192.0.0.0/2, 192.168.0.0/13, 192.168
192.168.254.0/23,
.254.0/23, 192.168.1.1/32
src-ip--addr-used
Classifier IP Source Address Rule is used, true/false
src-ip--port-used
Classifier Source port Rule is used, true/false
src-port
port-high
Classifier Source Port High Limit, 0 - 65535
src-port
port-low
Classifier Source Po
Port
rt Low Limit, 0 - 65535
type
Classifier Type, one of {none, ipDest, tos, vlan, macDest}
vlan-id
id
Classifier VLAN ID Tag, 0 - 4095
vlan-id
id-used
Classifier VLAN ID Rule is used, true/false
9.13.2.6
service
service-profile
profile harq-profile
harq profile <index> <ARGS >
This command is u
used
sed to configure HARQ profiles. The following are the set of
parameters used for the profile configurations.
channel
channel-mapping
HARQ Map Length, 0 - 16
description
Profile Description, up to 31 chars, optional
enable
HARQ Enable, true/false
name
Profile Name, up to 15 chars, optional
num-retries
retries
HARQ Number of Retries, 0 - 16
pdu-sn
sn-support
HARQ PDU SN Support, one of {none, short, long}
Rev 1.2
2, Page 130 of 146
9.13.2.7
service
service-profile
profile mcast-profile
mcast profile <index> <ARGS >
This command is used to configure Multicast profiles. The following are the set of
parameters used for the profile configurations.
description
Profile Description, up to 31 chars, optional
ethernet
ethernet-addr
Multicast MAC Address, only valid if multicast type is
Ethernet Multicast; example: 11:22:33:44:55:66
11:22:33:44:55:6
ip-address
address
Multicast IP Address, only valid if multicast type is IP
Multicast; example: 192.168.1.1
name
Profile Name, up to 15 chars, optional
type
Multicast type, one of {IP_MULTICAST,
ETHERNET_MULTICAST}
9.13.2.8
service
service-profile
profile qos-profile
qo profile <index> <ARGS >
This command is used to configure QoS profiles. The following are the set of parameters
used for the profile configurations.
data-delivery
delivery-service
service Data Delivery Service Type, one of {UGS_Service,
RTP_Service,
nRTP_Service, BE_Service, eRTP_Service}
description
Profile Description, up to 31 chars, optional
max-latency
latency
Maximum Latency (milliseconds), 0 - 65535
max-sustained
sustained-traffic
traffic-rate
Maximum Sustained Traffic Rate (bits per second), 0 42949672
4294967295
max-traffic
traffic-burst
Maximum Traffic Burst Size, 0 - 4294967295
min-reserved
reserved-traffic
traffic-rate
Minimum Reserved Traffic Rate (bits per sec), 0 4294967295
name
Profile Name, up to 15 chars, optional
request
request-transmission
transmission-policy Request Transmission Policy, 0-7F
0 7F hexadecimal
comprised of following bit masks:
1 - SF Shall not use Broadcast BW Request Opportunities (UL only)
2 - SF Shall not use Multicast BW Request Opportunities (UL only)
4 - SF Shall not Piggyback Requests with Data (UL only)
8 - SF Shall not Fragment Data
0x10 - SF Shall not Supress Payload headers (CS Parameter)
0x20 - SF Shall not Pack Data; 0x40 - SF Shall not include CRC
sdu-inter
inter-arrival-interval
interval
SDU Inter-Arrival
Arrival Interval, 0 - 65535
sdu-size
size
Service Data Unit Size (bytes), 0 - 255
tolerated
erated-jitter
Tolerated Jitter (milliseconds), 0 - 65535
traffic--priority
Traffic Priority Level, 1 - 8
ul-grant
grant-schedule--typeUplink Grant Schedule Type, one of {BS_Defined_UL_Sched,
BE_UL_Sched, nRTP_UL_Sched, RTP_UL_Sched,
RTP_UL_Sched,
eRTP_UL_Sched,
UGS_UL_Sched}
unsolicited
unsolicited-grant-interval
interval
Unsolicted Grant Interval, 0 - 65535
unsolicited
unsolicited-poll-interval
interval
Unsolicted Poll Interval, 0 - 65535
Rev 1.2
2, Page 131 of 146
9.14.1.2
stats clear
clear-all
This command will clear all historical statistics that have been collected up to this time.
9.14.2.2
Rev 1.2
2, Page 132 of 146
Appendix A
Quantum 1000
10
Base Station
Data Sheet
Rev 1.2
2, Page 133 of 146
Rev 1.2
2, Page 134 of 146
Appendix B
4 (Quad) Antenna Panel
Data Sheet
Rev 1.2
2, Page 135 of 146
Rev 1.2
2, Page 136 of 146
Rev 1.2
2, Page 137 of 146
Appendix C
Cable Terminations
Rev 1.2
2, Page 138 of 146
EZ
EZ-400-NMH
NMH Connector Installation Procedure on
Times Microwave Cable LMR
LMR-400
This installation procedu
procedure
re has been re-produced
re produced in its entirety from the Times Microwave website.
1.
2.
Slide the heat shrink boot and crimp ring onto the cable. Strip the cable end using the ST-400
ST 400-EZ
prep/strip tool by inserting the cable into
into End 1 and rotating the tool. Remove any residual plastic
from the center conductor.
3.
Rev 1.2
2, Page 139 of 146
4.
5.
Flare the braid slightly and push the connector body onto the cable until the connector snaps into
place, then slide the crimp ring forward creasing the braid.
6.
Temporarily slide the crimp ring back, and remove the con
connector
nector body from the cable to trim the
excess braid at the crease line, then remount the connector and slide the crimp ring forward until
it butts up against the connector body
Rev 1.2
2, Page 140 of 146
7.
8.
Rev 1.2
2, Page 141 of 146
Rev 1.2
2, Page 142 of 146
lease Note: It is recommended to use shielded Cat 5e cables and make certain that the drain wire
Please
hass a good contact with the metal RJ-45
RJ 45 connector.
Rev 1.2
2, Page 143 of 146
APPENDIX D
CAPACITY TABLES
Rev 1.2
2, Page 144 of 146
Per Sector Throughput Tables by Channel Size and DL/UL Frame Ratio
We present here a set of tables specifying the raw (MAC
(MAC-layer)
layer) throughput of a PureWave Quantum
Family base station for 5 and 10MHz, under ideal conditions, corresponding to the maximum achievable
performance that can be achieved using IEEE 802.16e per channel bandwidth and TDD configuration
ratio.
All results assume PUSC, a MAP size of 4 symbols, and 1 pr
preamble
eamble symbol. The numbers represent the
maximum MAC layer performance using all sub-channels
sub channels and exclude Ethernet Layer 2 or higher layer
overheads.
Note that these results are specific to the stated configuration under ideal conditions and should be
considered
nsidered indicative of expected results. Actual results will vary depending upon the actual
configuration, error rate, environment, and numerous other factors.
MCS Rate
64QAM-5/6
5/6
64QAM-3/4
3/4
64QAM-2/3
2/3
64QAM-1/2
1/2
16QAM-3/4
3/4
16QAM-1/2
1/2
QPSK-3/4
3/4
QPSK-1/2
1/2
Downlink
21.60
19.44
17.28
12.96
12.96
8.64
6.48
4.32
10 MHz
Uplink
5.04
4.54
4.03
3.02
3.02
2.02
1.51
1.01
Bi-Di
25.44
22.90
20.35
15.26
15.26
10.18
7.63
5.09
Downlink
10.80
9.72
8.64
6.48
6.48
4.32
3.24
2.16
5 MHz
Uplink
2.45
2.20
1.96
1.47
1.47
0.98
0.73
0.49
Bi-Di
12.72
11.45
10.18
7.63
7.63
5.09
3.82
2.54
MCS Rate
64QAM-5/6
5/6
64QAM-3/4
3/4
64QAM-2/3
2/3
64QAM-1/2
1/2
16QAM-3/4
3/4
16QAM-1/2
1/2
QPSK-3/4
3/4
QPSK-1/2
1/2
Downlink
18.72
16.85
85
14.98
11.23
11.23
7.49
5.62
3.74
10 MHz
Uplink
6.72
6.05
5.38
4.03
4.03
2.69
2.02
1.34
Bi-Di
25.44
22.90
20.35
15.26
15.26
10.18
7.63
5.09
Downlink
9.36
8.42
7.49
5.62
5.62
3.74
2.81
1.87
5 MHz
Uplink
3.26
2.94
2.61
1.96
1.96
1.31
0.98
0.65
Bi-Di
12.62
11.36
10.10
7.57
7.57
5.05
3.79
2.52
MCS Rate
64QAM-5/6
5/6
64QAM-3/4
3/4
64QAM-2/3
2/3
64QAM-1/2
1/2
Downlink
17.28
15.55
13.82
10.37
10 MHz
Uplink
8.40
7.56
6.72
5.04
Bi-Di
25.68
23.11
20.54
15.41
Downlink
8.64
7.78
6.91
5.18
5 MHz
Uplink
4.08
3.67
3.26
2.45
Bi-Di
12.72
11.45
10.18
7.63
Rev 1.2
2, Page 145 of 146
16QAM-3/4
3/4
16QAM-1/2
1/2
QPSK-3/4
3/4
QPSK-1/2
1/2
10.37
6.91
5.18
3.46
5.04
3.36
2.52
1.68
15.41
10.27
7.70
5.14
2.45
1.63
1.22
0.82
7.63
5.09
3.82
2.54
5 MHz
Uplink
4.90
4.41
3.92
2.94
2.94
1.96
1.47
0.98
Bi-Di
12.10
10.89
9.68
7.26
7.26
4.84
3.63
2.42
5.18
3.46
2.59
1.73
MCS Rate
64QAM-5/6
5/6
64QAM-3/4
3/4
64QAM-2/3
2/3
64QAM-1/2
1/2
16QAM-3/4
3/4
16QAM-1/2
1/2
QPSK-3/4
3/4
QPSK-1/2
1/2
Downlink
14.40
12.96
11.52
8.64
8.64
5.76
4.32
2.88
10 MHz
Uplink
10.08
9.07
8.06
6.05
6.05
4.03
3.02
2.02
Bi-Di
24.48
22.03
19.58
14.69
14.69
9.79
7.34
4.90
Downlink
7.20
6.48
5.76
4.32
4.32
2.88
2.16
1.44
Rev 1.2
2, Page 146 of 146