Professional Documents
Culture Documents
WiMAX Overview
www.huawei.com
Page 2
Page 3
Fixed Phone
3G
IMT-2000
Mobile TV
Mobility
No mobility
Broader
Bandwidth
Page 4
Broadband Wired
Services (Cable/DSL)
Broadband Wireless
Data (WiFi)
Page 5
Mobile
WiMAX(16e)
What is WiMAX?
Worldwide
Interoperability for
Microwave
Access
Page 6
Converged service
BTS
micro-BTS
gateway
IP Core
Mobility
IP based
Smart/MIMO
BTS
Broadband
Security
QoS capability
HUAWEI TECHNOLOGIES CO., LTD.
pico-BTS
Page 7
Mobile
Broadband
Wi-Fi
Consumer
Broadband
Fixed
Nomadic
Portable
Simple Mobility
Full Mobility
Page 8
Portable
Broadband
Release 1.5
Simple mobility
Full mobility
Authentication
Mobile VoIP
Paging support
IMS
fixed VoIP
IPv6
Release 2.0
TBD
Chipset progress
Q1 2007
TBD
Page 9
2.5GHz and 3.5GHz are the most possible frequency which could be used by WiMAX
in the world.
2.3GHz can be taken as the backup frequency for WiMAX
Page 10
Page 11
Standardizatio
n
Realization
IEEE 802.16
Standard
WiMAX Forum
Page 12
Huawei is one of the most active members in NWG, and has most number of
Page 13
DOHSDPA/HSUPA
IEEE 802 group defined WLAN
and WiMAX
IEEE 802.16 is the milestone
Page 14
Page 15
CSN
ASN
Base Station
PSTN
ASN-GW
Network Service
Provider (NSP)
Network Access
Provider (NAP)
Internet
Applications
Service
Provider
Page 16
MultiMedia
Internet
IP
CSN
Voip
IP
IP
IP
AAA
Go
VPN
HA
IP Tunnel
Radius
ASN-GW
ASN
IP Interface
BS
IEEE802.16e
MS
MS
: OPTIONAL
Page 17
R2
R2
Home
NSP
Visit
NSP
NAP1
R1
ASN1
MSS
R4
CSN
CSN
R5
ASN2
R4
NAP2
ASN
ASP or
ASP or
Internet
Internet
Page 18
Description
ASN
CSN
R1
R1 interface between the MS and the ASN as per the air interface
specification for (PHY and MAC)
R2
Page 19
R3 is the interface between the ASN and CSN to support AAA, policy
enforcement and mobility management capabilities. In addition, R3
encompasses the bearer plane methods (e.g., tunneling) to transfer IP data
between the ASN and the CSN.
R4
R5
R7
R6
R8
R8 is a set of control plane message flows and in some causes, bearer plane
data flows between the BS to ensure fast seamless handover.
Page 20
CSN
R3
R6
R1
BS
Internet
ASN-GW
Air
Interface
R4
BS
ASN-GW
HO
DP Fn
Context
PA
RRA
Auth. Relay
Key Receiver
HO
DP Fn
Context
Authenticator
RRC
Key Distribute
PC
BS
AAA Client
DHCP Proxy
PMIP Client
LR
MIP FA
HA
AAA
ASN-GW
Page 21
CSN
R3
R1
BS+ASN-GW
Internet
R4
Air
Interface
BS+ASN-GW
HA
AAA
Combined BS+ASN-GW
HO
DP Fn
Context
PA
RRA+RRC
Key Receiver +
Distribute
HUAWEI TECHNOLOGIES CO., LTD.
AAA Client
DHCP Proxy
PMIP Client
LR
MIP FA
Authenticator
PC
All rights reserved
CSN
R3
R6
R1
BS
Air
Interface
Internet
R4
ASN-GW
BS
HA
ASN-GW
HO
DP Fn
Context
PA
RRA+RRC
Auth. Relay
Key Receiver
BS
HO
DP Fn
Context
Authenticator
LR
Key Distribute
PC
AAA Client
DHCP Proxy
PMIP Client
MIP FA
AAA
ASN-GW
Page 23
ASN Decomposition
ASN
ASN
R6
BS
R1
R1
ASNGW
R8
R1
R3
R6
R8
BS
R1
ASNGW
BS
R3
R4
ASNGW
BS
R6
R4
Page 24
R3
ASN-GW Decomposition
R4
bearer-plane functions.
Page 25
IMS/NGN
iManager
M2000
Internet
Policy Decision
Home Agent
Function
AAA
Flexible accounting
WASN9770
WASN9770
RRU3701C
BTS3706
BBU3703
RRU3701C
BBU3703
BTS3706
BBU3706C
RRU3701C
BTS3706
WASN9770
Fixed Access
PCMCIA
:
:
:
:
Handset
Page 26
PSTN
IMS
iManager
M2000
Policy Decision
DHCP Server
Function Home Agent
Internet
AAA
HLR
WASN9770
PDSN
GGSN
SGSN
RRU3701C
BBU3706C
BSC
WiMAX
BTS3706
Co-site BTS
2G/3G
Fixed Access
PCMCIA
BTS
BTS
BBU3706C
RRU3701C
BTS3706
WASN9770
:
:
:
:
2G/3G Terminal
Page 27
Page 28
Wi-Fi
Mobility: limited mobility
Coverage: 10m-300m
Coverage: 5km
Bandwidth: 1.25MHz-20MHZ
services
services
guarantee
Page 29
Thank You
www.huawei.com
Revision Record
Course Code
Product
OXP100001
WiMAX
All
2.00
Developer/Modifier
Date
Approver
New/Update
Hujian
Hong Xinpei
Update
2010.8.30
Update
Page0
WiMAX Principle
and Key Technology
www.huawei.com
Objectives
Page2
Contents
1. WiMAX Overview
2. OFDM/OFDMA Basic Principle
3. Key Technologies of WiMAX
4. Air Interface
Page3
GSM
PDC
cdmaOne
EGPRS
384kbps
TD-SCDMA
(China)
GPRS
~150kbps
WCDMA
2Mbps
cdma20001x
144bps
HSDPA
14Mbps(2006)
EVDO Rel.0
2.4Mbps
HSUPA
(2008)
LTE
EVDO Rev.A
3.1Mbps(2006)
Mobile WiMAX
802.16-2005
SISO/OFDMA
SIMO/MIMO
Page4
AAS
Vehicle
High Speed
Suburban-incar
Urban-incar
Walk
On foot
Nomadic
Fixed
Urban fixed
Personal
0,01
0,1
10
100
Bandwidth
(Mb/s)
Page5
Home NSP
R2
R2
SS/
MS
R3
R1
ASN
R5
CSN
CSN
ASP Network
or
Internet
ASP Network
or
Internet
R4
Another ASN
Legend of Lines
Bearer plane
control plane
Page6
Contents
1. WiMAX Overview
2. OFDM/OFDMA Basic Principle
3. Key Technologies of WiMAX
4. Air Interface
Page7
Contents
2. OFDM/OFDMA Basic Principle
Page8
frequency
OFDM
Orthogonal Frequency
Division Multiplexing
Page9
Ch.2
Ch.3
Ch.4
Ch.5
Ch.6
Ch.7
Ch.8
Ch.9
Ch.10
frequency
frequency
xn
serial-toparallel
x0,k
x1,k
xN,k
IFFT
s0,k
s1,k
parallelto-serial
sn
sN,k
Base-band
signal
N data symbols:
(in frequencydomain)
(time-domain)
Page11
Time
Frequency
1 Channel (serial)
Frequency
2 Channels
Single Carrier
Frequency
8 Channels
Frequency
Multicarrier
P(f)
Fading
Narrowband
Narrowband
System
System
Transmit Signal
Received Signal
P(f)
P(f)
Fading
Broadband
Broadband
System
System
f
Transmit Signal
Received Signal
Page13
Multi-path Environment
Transmitted
signal
time
Received
signal
time
Page14
Page15
Circular Convolution
Page16
OFDM Characteristics
Advantage:
Disadvantage:
Page17
Page18
Importance of Frequency
Synchronization
Page19
Contents
2. OFDM/OFDMA Basic Principle
Page20
Whats OFDMA?
OFDMA: Orthogonal
OFDMA
Output Power
OFDM
Frequency
Page21
OFDMA Channelization
Contents
1. WiMAX Overview
2. OFDM/OFDMA Basic Principle
3. Key Technologies of WiMAX
4. Air Interface
Page24
Contents
3. Key Technologies in WiMAX system
3.1 Communication Model
3.2 Channel Coding
3.3 AMC
3.4 HARQ
3.5 Multiple Antennas
Page25
Source
Coding
Channel
Coding
bit
Service
Signal
Source
Decoding
Interleaving
symbol
Channel
Decoding
Uninterleaving
Modulation
modulated
signal
Demodulation
Receiver
Page26
Transmission
Radio
Channel
Reception
Contents
3. Key Technologies in WiMAX system
3.3 AMC
3.4 HARQ
Page27
Channel Coding
CC (Convolution Coding):1/2,2/3,3/4,5/6
Bit
Symbol
MUX
00001011
0000110100101011
00100111
Page28
Interleaving
1
1 1 1 0
1 11 0 0 0 1 11 11 1
1
Source
1 0 1 1
11 1 0 10 1 10 11 1
1
101 1
1 1 1 0 1 1 0 0 1 11 1
1
1101
1
0
1
1
1 11 0 0 0 1 11 11 1
111
111
00 0
111
1011 1011 1 011
01
01
1 0
01
1 0 1 1
Page29
Questions
Page30
Contents
3. Key Technologies in WiMAX system
3.3 AMC
3.4 HARQ
Page31
AMC
AMC
Adaptive Modulation
and Coding
Purpose:
Page32
Page33
QPSK16QAM
64QAM
UL
QPSK16QAM
64QAM(optional)
CC (Convolutional
Code)
CTC (Convolutional
Turbo Code)
x2, x4, x6
x2, x4, x6
Repetition
Page34
Questions
Page35
Contents
3. Key Technologies in WiMAX system
3.3 AMC
3.4 HARQ
Page36
FEC transmits some redundant data along with the original data
that can be used to correct error
Go Back-N ARQ
Page37
Page38
Page39
Page40
What is HARQ
BTS
Packet1?
MS
Packet1
Packet1
Pcket2
Packet1
Types of HARQ:
Type I
Type II(IR)
Type III
Page41
HARQ Type I
Page42
Page43
Sender
NAK
ACK
Page44
Characteristics of HARQ
Page45
Contents
3. Key Technologies in WiMAX system
3.3 AMC
3.4 HARQ
Page46
MIMO Technology
Multiple Input,
Multiple Output
Increase coverage
Page48
Improvement to performance
Page49
Contents
1. WiMAX Overview
2. OFDM/OFDMA Basic Principle
3. Key Technologies of WiMAX
4. Air Interface
Page50
Contents
4. Air Interface
4.1 Protocal Stack
4.2 Basic Terms
4.3 Physical Frame
Page51
Protocol Stack
R1
IP
Ethernet
Packet
Classifier
ATM
IP
Header
Suppression
MAC Layer
Net Entry
GRE
802.16
802.16
MAC
MAC
PHY Burst
Scheduling
PDU
Operation
Security/Privacy
Key, AES, EAP
Connection
Management
Bandwidth
Management
Handoff
Power
management
IP
PHY Layer
802.16
802.16
PHY
PHY
MS
OFDMA
2-11GHz
2048FFT
802.16d
BS
OFDM
2-11GHz
256FFT
802.16e
OFDMA 2-11GHz
128, 256, 512,1024, 2048
WiMAX
Page52
Contents
4. Air Interface
Page53
Subcarrier-4
Subcarrier-3
Subcarrier-2
Subcarrier-1
Frequency
OFDM Slot/Frame
IFFT
SN
S1 S2 S3 S4 S5 S6 S7
IFFT
SN+1 SN+2SN+3SN+4
S2N
OFDM Symbol
(FTT duration)
IFFT
Guard Time
Time
Bandwidth
Page54
Ts =102.9 usG=1/8
Page55
DC Subcarrier
Data Subcarrier
Guard Subcarrier
Types of Subcarriers
Primitive parameters
BW The nominal channel bandwidth
Nused Numbers of used subcarriers(include DC
n sampling factor, 28/25 if BW are multiple of any
1.25,1.5,2,2.75 MHz, 8/7 else
DC subcarrier
Guard subcarrier
Derived parameters
NFFT : 1285121024, 2048
Sampling frequency: Fs = floor(n*BW/8000)*8000
Subcarrier spacing: f= Fs/ NFFT
Useful symbol time: Tb=1/ f
Pilot subcarrier
Data subcarrier
Page56
Page57
Slot
Page59
Subchannel Permutation
A subdivision of the set of
available OFDMA sub-channels
Page60
Contents
4. Air Interface
Page61
Preamble
Besides guard subcarriers, all the left carriers will be divided into 3
sets according to the following formula:
n is CarrierSet index 02
Each segment uses one type of preamble out of the three sets in the
following manner:
Segment#0->Carrierset0
Segment#1->Carrierset1
Segment#2->Carrierset2
Page63
DL Physical Frame
FCH
DL data burst
Bear DL data (More than one SSs data can be mapped to one burst)
Page64
UL Physical Frame
Ranging subchannel
All SSs can send their Ranging request and bandwidth allocation
request in this area based on competition
UL data burst
Bear UL data (One burst can only bear one SSs data)
Page65
Summary
Page66
Thank you
www.huawei.com
WiMAX Signaling
Procedure
www.huawei.com
References
Page1
Objectives
Page2
Contents
1. WiMAX Network Overview
2. WiMAX Basic Signaling Procedure
Page3
Network Structure
SS
PSTN
SS
BS
IP Core
ASN GW
AAA Server
Portal
PCMCIA
SS
Page4
Reference Model
R2
R2
Home
NSP
Visit
NSP
NAP1
R1
ASN
1
MSS
R4
CSN
CSN
R5
ASN
2
R4
NAP2
ASN
ASP or
ASP or
Internet
Internet
Page5
Protocol Stack
Page6
SFID&CID
BS
PDU(SFID,CID)
UGS
BE
MS
Classifier
Classifier
PDU(SFID,CID)
Scheduler
FTP Service
VoIP Service
SFIDA 32 bit quantity that uniquely identifies a service flow in a subscriber station
Page7
Contents
1. WiMAX Network Overview
2. WiMAX Basic Signaling Procedure
Page8
Contents
1. WiMAX Basic Signaling Procedure
1.1 Network Entry and Initialization
1.2 Scan and Handover
1.3 Radio Resource Management
Page9
Initial Entry
Definition
Turning on
Getting Services
Aim
Page10
Procedure
Begin
Scan DL channel to synchronize
MS sends initial Ranging code
in initial Ranging opportunity
Obtain transmit
parameters
Initial Ranging
MS sends RNG-REQ in
allocated bandwidth
Obtain SF QoS
Parameters from GW
Establish SF
in air interface
Establish R6 tunnel
between BS and GW
SS basic capability
negotiation
End
Authorization
Register
Page11
Cell Selection
CP SynchronizationSymbol Synchronization
Page12
UL_MAP
Numbers of UL Symbol UCD countUL_MAP IE Extended IE
DCD
DIUC tableBSEIRPTTGRTG etc.
UCD
UIUC tableUL ranging parameter
MOB_NBR_ADV
Adjacent cells informationBWFrame lengthCP valueFFT points
Page13
RNG_RSP
loop
RNG_RSP
Period Ranging Interval
RNG_RSP
Success
Page14
UL_MAP
CDMA_ALLOCATION_IE
RNG_REQ
RNG_RSP
Success Basic CIDPrimary CID
Page15
SBC_RSP
Intersection of PHY basic capabilities of MS and Network
REG_REQ
Page16
DSA_REQ
MSID
DSA_RSP
MSID
DSA_ACK
MSID
MS Information Request
MSID
MS Information Response
MSID
RR Request
MSIDSFIDQoS
RR Response
SFIDResult
Network Exit
DHCP
ASN GW
DHCP Release
DHCP Release
DHCP ACK
DHCP ACK
Switch off
Loop
Polling
No action
RNG RSP
Abort
MS Information Request
Release
MS Information Response
Release
Page18
Contents
1. WiMAX Basic Signaling Procedures
1.1 Network Entry and Initialization
Page19
Scan/Association Introduction
Types
Page20
Scan Procedure
Page21
Association Procedure
Target BS
Serving BS
MOB_SCN_REG
MOB_SCN_RSP
RNG_ REQ
CDMA code
RNG_RSP
MOB_ASC_REPORT
Page22
HO Introduction
Fast HO:
Soft HO:
Page23
HO Procedure
Cell Reselection
Network re-entry
HO Cancellation
Page24
HOExecution
MS
Ser vi ng BS
GW
2) R6: HO Request
3. n) R6: HO Request
3. x) R6: HO Request
5) R6: HO
Response
8) R6: HO Conf i r m
4. n) R6: HO Response
4. x) R6: HO Response
9) HO Conf i r m
10) gener at e ot her AK
cont ext
12) RNG_REQ
HMAC/ CMAC,
RNG_RSP
Page25
HOCancellation
Re-entry
Page26
Contents
1. WiMAX Basic Signaling Procedures
1.1 Network Entry and Initialization
1.2 Scan and Handover
Page27
BS
BS
MS
PMC-REQ
REP-REQ
REP--RSP
PMC-RSP
PMC-RSP
PMC-REQ
Initialed by BS
Initialed by MS
Page28
Thank you
www.huawei.com
DBS3900 WiMAX
Hardware System
www.huawei.com
Objectives
Page2
Contents
1. Components of the DBS3900
2. Introduction to the BBU3900
3. Introduction to the RRU3702 and RRU3703
4. WiMAX Networking and Installation Scenarios
Page3
Contents
1. Components of the DBS3900
2. Introduction to the BBU3900
3. Introduction to the RRU3702 and RRU3703
4. WiMAX Networking and Installation Scenarious
Page4
Page5
Page6
Page7
Capacity Specifications
Number of Subscribers
Page8
Page9
Page10
Page11
Reliability Specifications
Page12
Page13
Page14
Page15
Contents
1. Components of the DBS3900
2. Introduction to the BBU3900
3. Introduction to the RRU3702 and RRU3703
4. WiMAX Networking
Page16
Contents
2. Introduction to the BBU3900
2.1 Structure of the BBU3900
2.2 BBU3900 cables
Page17
Page18
PHY processing module: processing module baseband functions at the 802.16e physical (PHY) layer,
such as signal encoding/decoding and modulation/demodulation over uplink and downlink channels.
MAC processing module: processing module implements lower MAC layer processing, such as QoS
scheduling.
Transmission module: supports R6 tunnel management and provides service channels over Ethernet
links. The system supports two FE/GE electrical Ethernet ports and two 1.25 Gbit/s optical ports.
Control module: performs functions such as radio resource management, and processing of control
signaling messages over the R6 interface.
OM module: realizes the operation and maintenance of the system by providing a Ethernet port.
Clock module: provides GPS clock signals, GLONASS clock signals, and free-run clock signals for the
system.
Fan module: Cooling fans are equipped in the system.
Power module: The power module converts -48 V DC power input into the required power output.
Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.
Page 19
Page20
BMPT
Green (LINK): ON
means the port is
connected and OFF
means the port is not
connected
Orange (ACT):ON
means the data is
transmitted or
received and OFF
means no data is
transmitted or
received
Page21
BMPT (Cont)
Reserved port
Maintenance port
LED
Page22
GPS
BBBI
Connecting the
BBU to the RRU
and transmitting
service data and
clock and
synchronization
information
Page23
LED
UPEU
RJ45 Port, Receiving dry
contact signals and
monitoring the external
environment
48 V DC power input
Page24
USCU
Page25
LED
FAN
One fan unit can be configured at most.
Cooling the boards and modules of BBU3900.
Page 26
The DBS3900
supports the GPS
clock. It can obtain
GPS
synchronization
clock signals
through the built-in
GPS card to
guarantee clock
synchronization in
the entire network.
The DBS3900
supports the
GLONASS clock
and can obtain
GLONASS
synchronization
clock signals
through the USCU
to guarantee clock
synchronization in
the entire network.
3
When the GPS
synchronization
signals are lost, the
DBS3900
automatically
switches to the freerun mode. In this
mode, the base
station can properly
work for eight hours.
Page 27
Contents
2. Introduction to the BBU3900
2.1 Structure of the BBU3900
2.2 Cables
Page28
Appearance
Page29
Appearance
Page30
Appearance
Page31
Appearance
Page32
Appearance
Page33
Appearance
Page34
Appearance
Page35
Appearance
Page36
Appearance
Page37
Contents
1. Components of the DBS3900
2. Introduction to the BBU3900
3. Introduction to the RRU3702 and RRU3703
4. WiMAX Networking and Installation Scenarious
Page38
Page 39
158 mm (6 1/4'')
120 mm (4 3/4'')
484 mm
(1'-7 1/16'')
480 mm
(1'-6 7/8'')
Page40
Page41
Interface
Connector
ANTA_TX/RX;
N-type female
ANTB_TX/RX;
connector
Function
RF port.
ANTC_TX/RX;
ANTD_TX/RX;
PGND
JG terminal
RET
DB9
RET port.
Cable
TX RX CPRI0;
LC
Optical port.
Description
TX RX CPRI1
Cavity
ETH
RJ45
RTN0(+);NEG0(-);
OT terminal
RTN1(+);NEG1(-)
Page 42
Color
Green
State
Description
On
Off
Red
Off
On
Page 43
Color
Green
State
Description
On
Off
Blinks once every 2 seconds Software version verification succeeds but the
(ON for 1 second, OFF for 1 transmitting channel is inactive.
second).
VSWR
Red
CPRI0/CPR Green
I1
On
Off
On
Off
Page 44
135 mm (5 5/16'')
163 mm (6 7/16'')
551 mm
(1'-9 11/16'')
550 mm
(1'-9 5/8'')
Page45
RRU3703
Page 46
Page 47
Page 48
Page 49
Contents
1. Components of the DBS3900
2. Introduction to the BBU3900
3. Introduction to the RRU3702 and RRU3703
4. WiMAX Networking and Installation scenarios
Page50
Page51
PUSC (1, 1, 3)
Page52
Page53
FFR (1, 1, 3)
DL_PUSC + PUSC with all SC
Page54
Quantity of the
CPRI Optical Fiber
(Pair)
O(1), 2T2R
O(1), 4T4R
O(2), 2T2R
O(2), 4T4R
S(1/1/1), 2T2R
S(1/1/1), 4T4R
S(2/2/2), 2T2R
S(2/2/2), 4T4R
Page55
S1/1/1 2T2R
RRU
CPRI0
RRU
CPRI1CPRI0
RRU
CPRI1
CPRI0
BBI
RRU
CPRI1 CPRI0
CPRI1
RRU
CPRI0
BBI
FAN
FAN
UPEU
UPEU
MPT
MPT
Page 56
CPRI1
S2/2/2 2T2R
RRU
CPRI0
RRU
CPRI1CPRI0
RRU
CPRI1
CPRI0
RRU
CPRI1 CPRI0
CPRI1
RRU
CPRI0
BBI
BBI
BBI
BBI
FAN
FAN
UPEU
UPEU
MPT
MPT
Each CPRI interface only supports one carrier, CPRI0 and CPRI1 can be used in a
convergence mode, while CPRI1 is unavailable.
Page 57
CPRI1
On the stand.
In the APM.
Page 58
Page 59
CPRI Optical
Cable
BBU3900
Page 60
Questions
Page61
Summary
Page62
Thank you
www.huawei.com
2008-09
DBS3900 WiMAX
Deployment Configuration
and Commissioning
Wireless Case & Training Department
www.huawei.com
Huawei Confidential
Preface
This course mainly introduces the deployment and
commissioning procedure of DBS3900 WiMAX, including
checking the commissioning environment and data
configuration and commissioning.
Huawei Confidential
Page 2
Reference
Huawei Confidential
Page 3
Objectives
After learning this course, you will:
Master the deployment commissioning procedure.
Master how to check the commissioning environment.
Finish data configuration and commissioning for the deployment
project.
Huawei Confidential
Page 4
Huawei Confidential
Page 5
Huawei Confidential
Page 6
Commissioning Method
Local commissioning:
At the near side of BTS, connecting commissioning PC with the ETH port on BMPT
board, and using Web LMT to log into BTS to maintenance BTS with MML commands.
Remote commissioning:
Do the centralized maintenances and commissioning for several BTS with M2000
network management system.
Huawei Confidential
Page 7
Verify Services
End
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential
Page 8
Huawei Confidential
Page 9
Verify Services
End
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Confidential
Page 10
Huawei Confidential
Page 11
Setup OM Links
DHCP configuration:
The DHCP information of NEs needs to be configured by the DHCP configuration tool
so that the DHCP server can deliver the configuration information.
Manual configuration:
If OM links setup fails by DHCP, you can manually configure OM links through the local
maintenance Ethernet port.
Huawei Confidential
Page 12
DHCP Configuration
Huawei Confidential
Page 13
DHCP Configuration
Step 2: Select BWA3.2 in the interface of the DHCP configuration tool, and enter the
associated information. Then click OK to finish adding information.
Step 3: Configure OM links information. For detailed steps, please go to the manual
configuration part.
Huawei Confidential
Page 14
DHCP Configuration
Description
BWA Name
NE name.
BWA ESN
ASN_GW IP
BWA Interface IP
BWA OM IP
BWA OM Nexthop IP
IP address of the next equipment connected to the service port of the NE.
IP address of the OM channel of the NE, used to check connection of the route
from the NE to the M2000.
M2000 IP
M2000 IP mask
Huawei Confidential
Page 15
172.17.11.1
DHCP
IP network
OMI
P
M2000/DHCP SERVER:
192.168.10.105
OMC
Gateway
1.M2000 deployment and commissioning;
Take S3500 as an example:
2. Relay configuration of the layer-3 device which is directly connected to BTS;
3. BTS hardware installation;
4. BTS power on, and on-site engineers report ESN;
interface Vlan-interface11
ip address 172.17.11.1 255.255.255.0
ip relay address 192.168.10.105
dhcp select relay
Huawei Confidential
Page 16
Manual Configuration
Login to the BTS local maintenance Ethernet port through the Web LMT. The default
user name and password for logging in to the BTS for the first time are admin and
admin123 respectively. The default local OM ip is 192.168.0.100
Data preparation.
Parameters
BTS OM IP
192.168.0.1/24
M2000 IP
192.168.3.10/24
BTS Interface IP
192.168.90.1/24
Router 1 Interface IP
192.168.90.2/24
Router 2 Interface IP
192.168.3.150/24
Networking
BTS
Huawei Confidential
Router
M2000
Page 17
Manual Configuration
Step 1: Disable DHCP Function
SET DHCPFUNC:STRFLG=DISABLE;
Huawei Confidential
Page 18
Manual Configuration
Step 3: Configure Interface IP
ADD ITFIP: CN=0, SRN=0, SN=7, SSN=0, PT=ETH, PN=0, IP="192.168.90.1",
MASK="255.255.255.0;
Associated Commands: LST ITFIP;RMV ITFIP;
BTS OM IP: Logical IP for OM links setup and communication with M2000.
Interface IP: Service IP of GE physical port for R6 interface. If there are several physical
ports for R6, there should be several service interface IP.
Currently, 4 interface IP can be configured for one GE port, and these four IP can be
set in one network segment.
Huawei Confidential
Page 19
Manual Configuration
Step 4: Add Route Information
ADD IPRT: CN=0, SRN=0, SN=7, SSN=0, DSTIP="192.168.3.10", MASK="255.255.255.0",
NEXTHOPIP="192.168.90.2, MASK="255.255.255.0;
Associated Commands : LST IPRT;RMV IPRT;
Huawei Confidential
Page 20
Huawei Confidential
Page 21
Huawei Confidential
Page 22
Huawei Confidential
Page 23
BBU
NORMAL
Unlocked
BBU
NORMAL
Unlocked
BBU
16
NORMAL
Unlocked
BBU
19
NORMAL
Unlocked
Huawei Confidential
Page 24
In addition, you can choose Monitor > Current Fault Alarms on the M2000 client to
query active alarms of the BTS.
You also can query the current alarms through the WEBLMT. Choose Alarm to view the
current alarms. Then, double-click an alarm and handle it according to the corrective
suggestions.
Huawei Confidential
Page 25
Huawei Confidential
Page 26
Huawei Confidential
Page 27
Huawei Confidential
Page 28
Before the data configuration, you have to know about the configuration
object..
Including:
Huawei Confidential
Page 29
Huawei Confidential
Page 30
Huawei Confidential
Page 31
End
Huawei Confidential
Page 32
Huawei Confidential
Page 33
Basic information configuration includes device, system time and clock source and site
name.
Start
Device Info Configuration
System Time Configuration
Clock Source Configuration
Site Name Configuration
End
Huawei Confidential
Page 34
An RRU and an RRU board are configured in subrack 5(C01) or subrack 23 (C02).
The FAN is configured in slot 16. The UPEU is configured in slot 18.
S(1)
BBBI
BMPT
UPEU
RRU
UPEU0
F
A
N
Slot3 BBBI
HUAWEI TECHNOLOGIES CO., LTD.
Slot7 BMPT
Huawei Confidential
Page 35
The mapping relations between the RRU subrack NO, RRU ID, and the CPRI interface
on the BBBI (only for C01 version) :
BBI Slot NO.
CPRI NO.
RRU ID
CPRI0
CPRI1
CPRI2
CPRI0
CPRI1
CPRI2
Huawei Confidential
Page 36
Device information configuration includes configuring subracks, boards, fan and power
modules.
Step 1.1: Configure Subracks
ADD SUBRACK: RACKNO=0, SUBRACKPOS=0, SUBRACKNAME=BBU",
IS_REMOTE=NO, TYPE=BBU, SUBRACKNO=0;
ADD SUBRACK: RACKNO=0, SUBRACKPOS=1, SUBRACKNAME=RRU01",
IS_REMOTE=YES, TYPE=RRU, SUBRACKNO=2;
The numbering of RRU subracks is from 2~7 in C01 and from 20~37 in C02.
Huawei Confidential
Page 37
Huawei Confidential
Page 38
In C01, the logical number of RRU is 0~5. And this parameter should be consistent with
RRUID when using commands ADD CARRIERBASICINFO.
Huawei Confidential
Page 39
Huawei Confidential
Page 40
Associated commands:
LST SUBRACK.
RMV SUBRACK.
LST BRD.
RMV BRD.
BLK BRD.
UBL BRD.
RST BRD.
DSP BRDSTATUS.
Huawei Confidential
Page 41
System time configuration including configuring system time source, time zone and
daylight saving time.
Step 2.1:Configure System Time Source
SET TIMESRC:TIMESRC = GPS;
Reference time sources of NEs can be divided into NTP time, GPS time, and manually set time.
Users can set the reference time sources of the DBS3900 according to actual conditions. Generally,
the GPS time is preferred.
When you use the NTP time as the time source, run the LST NTPC command to check whether
the IP address of the NTP server configured on the NE is correct. If the IP address of the server is
incorrect, run the command SET NTPC to change the IP address.
You also can run the command SET TIME to set the time.
Huawei Confidential
Page 42
If DST is entered as a date plus weekday, for example, Monday, 14 July, it means that the DST is 14
July. Otherwise, the DST is the first Monday after 14 July.
When DST is entered as a date plus weekday, the date must be at least six days before the last day
of a month. That is, a specified date must be in the current month. The system counts 28 days for
February.
Huawei Confidential
Page 43
Associated commands:
LST TIMESRC.
LST TZ.
DSP TIME.
Huawei Confidential
Page 44
In C02, the priority of clock source is from 1~4, and 1 is the highest priority.
If you set the working mode of the clock to AUTO, the system first uses the GPS clock source. If
the GPS is unavailable, you need to use the FREE mode.
If you set the working mode of the clock to MANUAL, select the GPS time source.
If you set the working mode of the clock to FREE, the system uses the clock provided by the
crystal oscillator in the BMPT.
In normal cases, you are not allowed to change the reference clock source.
Huawei Confidential
Page 45
Huawei Confidential
Page 46
Huawei Confidential
Page 47
R6 Interface Configuration
Data preparation:
Parameters
BTS Side
GW Side
BTS Interface IP
192.168.90.1/24
192.168.90.1/24
BTS SIG IP
192.168.90.1/24
192.168.90.1/24
GW IP
7.7.7.7/32
7.7.7.7/32
GW ID
0303-0303-0303
0303-0303-0303
Nexthop IP
192.168.90.3/24
192.168.3.150/24
Networking
BTS
Router
Huawei Confidential
GW
Page 48
R6 Interface Configuration
Step 1: Configure ETH port
The BMPT board provides four physical ports (two optical ports and two electrical ports). Only
two of them can be enabled at a time. Electrical ports are enabled by default.
Huawei Confidential
Page 49
R6 Interface Configuration
Step 2:Configure IP Path
ADD LGCPORT: CN=0, SRN=0, SN=7, LPN=0, SSN=0, PT=ETH, PN=0,
TXBW=100000, RXBW=100000, TXCBS=100000, TXEBS=100000;
ADD IPPATH:ID=0, CN=0, SRN=0, SN=7, SSN=0, PT=ETH, PN=0,
LOCALIP="192.168.90.1", PEERIP=7.7.7.7;
In C02, the logical port is used to control the transmission bandwidth, and adding a logical port
before adding an IP channel.
Huawei Confidential
Page 50
R6 Interface Configuration
Step 3:Configure SIGCH
ADD SIGCH:LOCALIP=" 192.168.90.1 ", PEERIP=" 7.7.7.7 ", CN=0, SRN=0, SN=7;
One BTS only has one SIG IP and it is always configured to the same IP with service IP.
Huawei Confidential
Page 51
R6 Interface Configuration
Step 4:Configure Routing Info
Huawei Confidential
Page 52
R6 Interface Configuration
Step 5:Configure GW ID
Huawei Confidential
Page 53
R6 Interface Commissioning
Step 1:Check R6 Link
PING: CN=0,SRN=0,SN=7,SRCIP="192.168.90.1",DSTIP=7.7.7.7";
If no reply, please first run LST IPRT to check the routing configuration.
Huawei Confidential
Page 54
R6 Interface Commissioning
Step 2: Check Port State
DSP ETHPORT: CN=0, SRN=0, SN=7, SSN=0, PT=ETH, PN=0;
Huawei Confidential
Page 55
R6 Interface Commissioning
Step 3: Query Alarms
LST ALMAF:;
If there are alarms as follows, please fisrt deal with these alarms:
Huawei Confidential
Page 56
Huawei Confidential
Page 57
Operator ID
10
SITE ID
Central Frequency
2550000
Sub-frame Ratio
31:15
Bandwidth
10M
Sector ID
Carrier ID
Networking
Huawei Confidential
Page 58
BSID(48bit)=operatorid(24bit)+siteid(16bit)+sectorid(4bit)+carrierid(4bit).
Then operatorid=0x29=41,siteid=0x35=53,sectorid=1,carrierid=0
Huawei Confidential
Page 59
BW
10MHz
5MHz
7MHz
35:12
31:15
29:18
26:21
21:12
Sub-frame
ration
Huawei Confidential
Page 60
CARRIERID
CPRIID
Band
width
DLBITMAP
ULBITMAP
DLZONEIND
ULZONEIN
D
Networking
0/1
10M/
7M
00000003
000000000000000FFF
10M/7M
PUSC1/3
0/1
10M/
7M
0000000C
000000000000FFF000
10M/7M
PUSC1/3
0/1
10M/
7M
00000030
0000000007FF000000
10M/7M
PUSC1/3
0/1
10M/
7M
0000003F
0000000007FFFFFFFF
10M/7M
PUSCALL
0/1
10M/
7M
0000003F
0000000007FFFFFFFF
10M/7M
PUSCALL
0/1
10M/
7M
0000003F
0000000007FFFFFFFF
10M/7M
PUSCALL
0/1
5M
00000015
00000000000001FFFF
5M PUSCALL
0/1
5M
00000015
00000000000001FFFF
5M PUSCALL
0/1
5M
00000015
00000000000001FFFF
5M PUSCALL
Huawei Confidential
Page 61
Huawei Confidential
Page 62
The difference between different sectors should be 32. For example, the PreambleIndex is 0 for
sector 0, and then the PreambleIndex of sector 1 and sector 2 will be 33, 65 respectively.
Huawei Confidential
Page 63
Carrier basic information mainly includes bandwidth, central frequency, sub-frame ratio, sector id
and carrier id..
Huawei Confidential
Page 64
SECTORID
CARRIERID
CDMAGROUPSTART
16
32
48
64
80
Huawei Confidential
Page 65
Huawei Confidential
Page 66
Huawei Confidential
Page 67
Before active carrier, please first query the carrier status: DSP CARRIERSTATUS. Only if the
resource state is available, the carrier can be active.
Huawei Confidential
Page 68
Huawei Confidential
Page 69
Thank You
www.huawei.com
DBS3900 WiMAX
Commissioning
www.huawei.com
Objectives
Page2
Contents
1. Overview
2. Process of DBS3900 Commissioning
Page3
Page4
Commissioning Methods
Local Commissioning
Default OM IP
address is
192.168.0.100
Remote Commissioning
Page5
IP addresses of BTS
IP Address Type
the IP Address
IP Address
LST ITFIP
ADD ITFIP
Signaling IP address
LST SIGCH
ADD SIGCH
IP path
LST IPPATH
ADD IPPATH
Traffic IP address
(ITFIP)
Page6
Contents
1. Overview
2. Process of DBS3900 Commissioning
Page7
Process of Commissioning
Page8
V300R002C01B020
Software Status
Available
Page9
Page10
SET RBSNAME
ADD BTSINFO
Configure sectors
ADD CARRIERBASICINFO
MOD CARRIERBASICINFO
Page11
SET CLKSRC
SET TIMESRC
SET TIMETHRD
Page12
Set GW-ID
Configure IP routes
MOD MIXCFG
ADD IPRT
Page13
MOD CARRIERBASICINFO
Configure the zone
information
Configure neighboring
cells
ADD NBR
Page14
LST ALMAF
DSP ETHPORT
Page15
The query result indicates that the status of the BMPT is Online
(the BMPT is functioning properly).
Page16
Page17
The query result shows that two active alarms are generated, indicating that
the board in slot 1 is not in position and the Ethernet link is faulty.
Page18
Page19
Page20
Operation
Query Command
LST EMUANLG
LST EMUTHTHD
Run the SET EMUINVTHD command to set the input voltage alarm
LST EMUINVTHD
LST EMUPORT
EMU.
5
Page21
None.
Operation
Query Command
Number
1
Run the SET ACDCVTHD command to set the AC/DC voltage alarm
LST ACDCVTHD
Run the SET PMULDTTHD command to set the load temperature alarm
LST PMULDTTHD
Run the SET CLDPRT command to set the information about load
LST CLDPRT
Run the SET HTPRT command to set the information about load
LST HTPRT
Run the SET LVPRT command to set power-off parameters of the PMU.
Page22
LST LVPRT
Page23
Page24
Run the LST RRU command to query the subrack ID of the RRU.
The value of RTWP ranges -400 (0.1 dB) to -1050 (0.1 dB).
Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.
Page25
Set the DL/UL modulation mode of the CPE to QPSK1/2 CTC and have the CPE
make 20 attempts of accessing the WiMAX system in the static state.
Measure the number (M) of attempts of the CPE accessing the system and the
number (N) of successful attempts of the CPE accessing the system.
Access success rate of the CPE in the static state = N/M x 100%
Keep the CPE moving at a speed of 60 km/h and have the CPE make 20 attempts of
accessing the WiMAX system.
Measure the number (M1) of attempts of the CPE accessing the system and the
number (N1) of successful attempts of the CPE accessing the system.
Successful access rate of the CPE in the moving state = N1/M1 x 100%
Page26
Page27
Connect the CPE to the FTP server and start the uploading and
downloading services.
Page28
Questions
Page29
Summary
Page30
Thank you
www.huawei.com
WiMAX ASN-GW
Overview
www.huawei.com
References
Page1
Objectives
Page2
Contents
1. Access Service Network
2. Function Design of ASN-GW
3. Usage Scenario
Page3
Contents
1. Access Service Network
2. Function Design of ASN-GW
3. Usage Scenario
Page4
Home NSP
R2
R2
SS/
MS
R3
R1
ASN
R5
CSN
CSN
ASP Network
or
Internet
ASP Network
or
Internet
R4
Another ASN
Legend of Lines
Bearer plane
control plane
Page5
ASN Definition
Page6
Profile
Page7
Profile A, B and C
R3
R3
ASN-GW
R4
ASN-GW
R4
R6
BS
BS
ASN Profile B
Page8
Reference Point
Page9
Questions
Page10
Contents
1. Access Service Network
2. Function Design of ASN-GW
3. Usage Scenario
Page11
Contents
2. Function Design of ASN-GW
2.1 Security
2.2 Accounting
2.3 QoS
2.4 Mobility Management
2.5 Radio Resource Management
2.6 Paging and Location Management
2.7 IP Addressing
Page12
Authentication
Server
Authentication Authenticator
Relay
BS
MS
ASN-GW
AAA Proxy
AAA Server
Auth. Relay
Protocol
RADIUS
802.16e
Auth. Relay
UDP/IP
Encap. Protocol
Page13
EAP Methods
Page14
SCP
AAA
(PPS)
QoS-Based
MS
Accounting
BS
ASN-GW
(PPC)
SS
Page15
Hot-lining
HAAA
RADIUS
ASN Hotline
Device
MS
Packet
data
CSN Hotline
Device
Packet
data
Hot-lining
Application
Packet
data
Mobile-Hot-lining Application:eg.,Web
Page16
Page17
Handover
R6 Handover
R4 Handover
R3 Handover
Page18
R6 Handoff
ASN
MS
R1
BS 1
R6
CSN
ASN-GW
(WASN9770)
MS
R1
BS 2
R3
R6
Page19
AAA
Server
R4 Handoff
ASN
BS 1
R6
CSN
Anchor
ASN-GW
R4
MS
R1
MS
R1
BS 2
BS 3
R6
R6
R3
AAA
Server
R4
Serving
ASN-GW
Target
ASN-GW
Page20
R3 Handoff
ASN1
BS 1
R6
Serving FA/PMIP
Client/Serving
ASN-GW
CSN
R3
AAA
Server
R4
ASN 2
CSN
MS
R1
BS 2
R6
Target FA/
Target ASN-GW
R3
Page21
AAA
Server
Page22
Page23
Page24
IP Addressing (IPv4)
ASN-GW/
DHCP Server
BS
MS
MS
ASN-GW/
DHCP Proxy
BS
MS
BS
ASN-GW/
DHCP Relay
Page25
Questions
Page26
Contents
1. Access Service Network
2. Function Design of ASN-GW
3. Usage Scenario
Page27
Usage Scenario
Page28
Fixed
BS
Enterprise
Bank
School
Page29
Nomadic
BS
TV Rebroadcast
Wireless Camera
The nomadic access is the step beyond the stationary access. The
MS can access to the WiMAX network at different access
locations.
Page30
Portable
BS
Laptop
PDA
UMPC
The portable access is the step beyond the nomadic access. The
mobility and handover of terminals can be realized in this
scenario.
Page31
Simple Mobile
BS
MS
Smart Phone
Dual Mode MS
Page32
Questions
Page33
Summary
Page34
Thank you
www.huawei.com
WASN9770 Hardware
System
www.huawei.com
References
WASN9770V3R3 Manual
Page2
Objectives
Page3
Contents
1. WASN9770 structure
2. WASN9770 board function
Page4
SRU Board
FAN
(Redundancy)
FAN
(Redundancy)
SPU
LPU
Control Bus
(Redundancy)
SFU
SFU
SPU
Switching
Fabric
LPU
(3+1)
3+1
redundant
User-plane
(Ethernet)
Management-plane
Monitoring-plane
Page5
Contents
1. WASN9770 structure
2. WASN9770 board function
Page6
WASN9770 Cabinet
1. Power Distribution Box
2. 1 U filler panel
3. 2 U filler panel
4. Cabling frame of the LAN Switch
5. 1 U fiber supports of large capacity
6. Subrack of the WASN9770
Page7
8
SFU
S
F
U
L
LPU
WASN
WASN
WASN
SPU
SPU
SPU
WASN
WASN
WASN
S
F
U
1 2 3 4
10 5 6 7 8
Board
Name
Full Spelling
SRU
SPU
LPU
SFU
Page8
Physical Interface
Type
10/100M auto-sensing
Ethernet electrical
interfaces
Quantity
(Maximum)
Function
24
24
Page9
Physical Interface
Type
1000M Ethernet GBIC
electrical interfaces
(1000BASE-GBIC)
Quantity
(Maximum)
Function
24
Page10
SRU-Function
Function:
Route management
Data configuration
System clock
Storage function
Page11
SRU-Interface
To M2000
Console
PDB
Page12
SFU
Page13
SPU
Dual-CPU Availability
Page14
LPU
Page15
LPU
Gom
Phy
If 1
AAA
SPU 1
R3
R6
SPU n
R6/R4
R6/R4
R3
R3
Phy
If 2
... ...
BS
WASN
WASN 1/1
Domain1
Gom
Domain2
WASN n/1
......
Corporate 1
Corporate 1
WASN n/2
WASN 1/2
Corporate 1
R6/R4
M2000
Phy
If m
... ...
Domain3
R6/R4
R3
R3
Page16
Physical Interface
SRU
Route
distribute
Buffer UDR
Create user
connection
NWG Message
NWG Message
R6 uplink PDU
Generate original
UDR
SPU
LPU
LPU
R3 uplink PDU
R6 downlinkPDU
R3 downlink PDU
Forward
User
authentication
Radius
Server
Address allocation
Radius/
DHCP/SPU
Page17
SPU
LPU
GRE tunnel
LPU
LPU
SPU
LPU
GRE tunnel
LPU
GRE tunnel
SPU
LPU
IPSec/GRE tunnel
LPU
SPU
LPU
Page18
GRE tunnel
Redundancy
Hardware
Page19
Thank you
www.huawei.com
WASN9770 Data
Configuration
Basic
www.huawei.com
Contents
1. CLI Views
2. System Time Management
3. Interface Configuration
4. BS Data Configuration
5. Domain
6. Address Pool
7. AAA Configuration
Page2
Page3
Page4
MIP view: The information about mobile IP (MIP) is configured in this view.
Page5
Security view: The information about the IP Security (IPSec) protocol and the
Internet Key Exchange (IKE) protocol is configured in this view. Security views
consist of the IPSec view, IPSec policy view, IKE peer view, and IKE proposal
view.
Service view: The information about service control is configured in this view
Page6
Contents
System Time Management
NTP
Page7
Page8
Page9
NTP
WASN9770
NTP Server
/ M2000
GE 1/0/0
10.0.0.10/24
10.0.0.1/24
WASN9770
GE 1/0/0
10.0.0.20/24
Page10
NTP Configuration
Page11
Page12
Contents
Interface Configuration
Physical Interface
R6 Interface
R3 Interface
R Interface
Page13
Page14
Physical interface
Page15
R6if
Basic concept
Data
R6 if interface
LPU SPU
R6if interface is used in NWG protocol stack, BS should know
this IP address.
The data package receives from BS will conduct GRE
encapsulation in this interface.
Physical interface
R6 interface
Page16
Mask
Mask
Nhop
x.x.x.x
BS IP
R6if IP
x.x.x.x
Nhop
BTS IP
LPU1 IP
0.0.0.0
0.0.0.0
Route
WASN9770
R6if
MS
Yahoo
BS
ROUTER
LPU1
encapsulation
data MS IP Yahoo IP GRE head
BS IP
R6if IP
uplink
GRE data
SPU LPU2
decapsulation
data MS IP
Yahoo IP
GRE data
downlink
MS IP Yahoo IP
data
BS IP
decapsulation
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.
encapsulation
Page17
data
Mask
Nhop
R6if IP
x.x.x.x
LPU1 IP
Des
Mask
Nhop
BS IP
x.x.x.x
BTS IP
WASN9770
MS
R6if
BS
LPU
encapsulation
decapsulation
uplink
Signal
BS IP
SPU
R6if IP
Signal
downlink
Signal
decapsulation
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.
BS IP
R6if IP
Signal
encapsulation
Page18
Example of Networking
Page19
R6if is used to identify the R6 logical interface and configured on SPU board, it
does not occupy the physical port. It is the source IP or destination IP of the GRE
package
Configuration
Page20
R3if
Basic concept
Data
R3if interface
Radius
LPU SPU
R3 interface
Page21
Example of Networking
Page22
Configuration
Page23
Rif
BS
R6if interface
Other router
Rif interface
Data
LPU SPU
WASN is a router with NWG functionso there are two kinds of data to
come in WASN: the IP package (black line) which sends to MS and ordinary
Physical interface
data package (red line). None but the MS IP package needs to be transfer to
R6if interface to conduct GRE encapsulation, ordinary data package neednt
R interface
Page24
Rif3/0/0 and
Rif3/1/0.
Page25
Contents
BS Data Configuration
Basic Concept
BS Data Configuration
Page26
cpu-id: specifies the CPU ID of the SPU. It can be set to 0 or 1. Generally, each
SPU is configured with two CPUs, and each CPU can perform the functions of
the ASN-GW independently.
Page27
gwid: specifies the gateway ID. It is of the numeric type and in the hexadecimal
format of H1H2H3H4-H5H6H7H8-H9H10H11H12.
bts-ip: specifies the IP address of the local BTS to be added in dotted decimal
notation..
Page28
Example of Networking
Page29
<WASN9770>system-view
[WASN9770]access-view
Configuration Check
display local-gwid
display gwip
Page30
BS Data Configuration
bts bts-ip bts-ip bts-info bts-info [ control-flag { enable | disable } | user-flag { enable |
disable } | wholesale-flag { enable | disable } | band-width band-width-value ] *
local-bs bsid bsid bts-ip bts-ip gwid gwid [ portal { enable | disable } ]
<WASN9770> system-view
[WASN9770] access-view
Page31
BS Data Configuration
Configuration Check
display bts
display local-bs
Page32
Domain
Domain Introduction
This describes how to configure domain data. A domain is a collection of users with the
same attributes. For example, the users of a domain access the same packet data
network (PDN), use the same authentication mode, adopt the same IP address
assignment mode, and are bound to the same virtual private network (VPN) instance.
Centralized management of users can be realized by configuring multiple domains on the
WASN9770. Domain data is an important configuration of the WASN9770. When a user
initiates data services, domain information is carried. Based on this information, the
WASN9770 determines which application service provider (ASP) network the user
accesses and the access mode of the user.
Page33
Example of Networking
Host1
MS1
WASN9770/LAC
Host2
BS
LNS
Host3
MS2
Host4
Page34
VPN
Example of Configuration
domain domain-instance
Procedure :
[<WASN>system-view
[WASN]domain enterprise.com
[WASN-domain-enterprise.com]ms-view
[WASN-domain-enterprise.com-ms]max-users-number 100
[WASN-domain-enterprise.com-ms]max-bandwidth 30
Configuration Check :
display domain-configuration
Page35
Contents
Address Pool Configuration
Introduction
DHCP Relay
Page36
Address Pool
Address Pool Introduction
The WASN9770 can function as the Dynamic Host Configuration Protocol
(DHCP) server, DHCP relay, or DHCP proxy to help users obtain IP addresses
during network entry.
Page37
Domain
Section 1
IP address
(<=32768)
IP Pool N
(N<=16)
IP Pool 1
Section N
(N<=16)
Section 1
IP address
(<=32768)
IP address
(<=32768)
Section N
(N<=16)
IP address
(<=32768)
A local address pool is responsible for locally assigning IP addresses. The local address pool needs to be
configured with address segments for assigning IP addresses to users..
Page38
address-pool pool-name
Procedure :
Page39
<WASN9770>display ip pool
<WASN9770>system-view
[WASN9770] domain isp.com
[WASN9770-domain-isp.com] ms-view
[WASN9770-domain-isp.com-ms]display address-pool
Page40
IP Pool 1
DHCP
Server Group
DHCP
Server 1
Agent IP 1
DHCP
Server 2
IP Pool N
(N<=16)
Agent IP N
(N<=16)
DHCP
Server Group
DHCP
Server 1
Agent IP 1
DHCP
Server 2
Page41
Agent IP N
(N<=16)
Procedure :
<WASN9770>system-view
[WASN9770]access-view
[WASN9770-access]ip pool test2 remote
[WASN9770-access-ip-pool-test2]section 0 20.0.0.1 20.0.0.255
[WASN9770-access-ip-pool-test2]agent-ip 0 192.168.0.1 24
[WASN9770-access] dhcp-server group
[WASN9770-access-dhcp-server-group-test]dhcp-server 10.1.1.1
[WASN9770-access]quit
[WASN9770-access]ip pool test2
[WASN9770-access-ip-pool-test2]dhcp-server group test
[WASN9770-domain-test]ms-view
[WASN9770-domain-test-ms]address-pool test2
Page42
Page43
Contents
Network Entry Template Configuration
Classifer
QoS Template
User Template
Authentication Template
Mobile Template
User Attribution
Page44
This describes how to configure the network entry templates. With this
configuration, the WASN9770 can provide access to the worldwide
interoperability for microwave access (WiMAX) network for mobile stations
(MSs). The network entry templates include the classifier template, service
flow template, and user attribute templates.
Page45
[WASN]access-view
[WASN-access]l3-classfier 1
[WASN-access-l3-1]protocol-type udp
[WASN-access-l3-1]paging enable
Page46
[WASN-access]qos-template 1
[WASN-access-qos-1]direction uplink
[WASN-access-qos-1]media-flow-type voip
[WASN-access-qos-1]sdu variable
[WASN-access-qos-1]quit
Page47
[WASN-access]qos-template 2
[WASN-access-qos-2]direction downlink
[WASN-access-qos-2]media-flow-type robust-browse
[WASN-access-qos-2]sdu variable
[WASN-access-qos-2]quit
Page48
flow flow-id
qos-binding qos-template-id
[WASN-access]flow 1
[WASN-access-flow-1]classfier-binding 1 precedence 2
[WASN-access-flow-1]qos-binding 1
[WASN-access-flow-1]quit
Page49
[WASN-access]ms-template 1
[WASN-access-ms-1]scenario-type ip-cs
[WASN-access-ms-1]quit
[WASN-access]quit
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.
Page50
ms-template-binding template-id
auth-template-binding template-id
mobile-template-binding template-id
[WASN]domain auth.com
[WASN-domain-auth.com]ms-view
[WASN-domain-auth.com-ms]ms-template-binding 1
[WASN-domain-auth.com-ms]auth-template-binding 1
[WASN-domain-auth.com-ms]mobile-template-binding 1
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.
Page51
Contents
AAA Configuration
AAA Overview
Page52
AAA Overview
Page53
Page54
Contents
AAA Configuration
AAA Overview
Page55
Authentication Overview
AAA Server
Signaling
channel
WASN9770
MS
Process
BS
EAP-TTLS
EAP
PKMv2
Radius
802.16
IP/UDP
IP/UDP
Page56
[WASN-access-radius-isprg]radius-server authentication ip
authentication
[WASN-domain-test] ms-view
Domain instance
Page57
Configuration Check
Page58
Contents
AAA Configuration
AAA Overview
Page59
Internet
IP
FTP
GRE
Radius
MS
BS
WASN9770
BC
AAA
PPS
SCP
Signaling channel
Data path
Page60
Charging: Postpaid
(1)Network entry
of postpaid user (3) Report CDR
MS
BS
(4)Report
response
WASN9770
ASN
(5) Download
CDR
BC
AAA
Internet
CSN
Process
Service
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.
Page61
Charging: Prepaid
(1)Network entry of
prepaid user
MS
BS
AAA
SCP
PPS
Page62
accounting server
[WASN-domain-huawei.com]ms-view
Domain instance
Page63
volume-threshold 100
charge-general-property time-threshold-switch { off | on timethreshold INTEGER<15-1440> } volume-threshold-switch { off |
on volume-threshold INTEGER<800-65535> }
[WASN9770] charge-view
[WASN9770-charge] charge-general-property time-threshold-
property
volume-threshold 100
Page64
Configuration Check
Page65
Thank you
www.huawei.com
WASN9770 Data
Configuration - Route
www.huawei.com
Contents
1. WASN Route Configuration Overview
2. Static Routes Configuration
3. Dynamic Routes Configuration
Page2
Page3
Static routes
RIP
OSPF
IS-IS
BGP
Page4
AAA
(5)
Router
(1)
(3)
Router E
BS
(2)
WASN
Internet
GRE tunnel
Router A
(public IP)
(4)
DHCP
Router B
Router D
No.
Destination IP
Next hop
BS
Router E
dynamic
Router A
static
MS IP (downlink)
WASN R interface
static
DHCP
Router D
static
AAA server
Router C
Dynamic\static
Page5
WAP
gateway
Contents
1. WASN Route Configuration Overview
2. Static Routes Configuration
3. Dynamic Routes Configuration
Page6
Page7
Page8
Mass Market
Business Customer
GRE R3 VPN
WASN
GRE R6 VPN
BS
GRE VPN
Common AAA
Command
display ip routing-table
display ip routing-table
verbose
Page10
Contents
1. WASN Route Configuration Overview
2. Static Routes Configuration
3. Dynamic Routes Configuration
Page11
OSPF Brief
Belongs to IGP
(internal gateway protocol)
RT
3
Area 2
40.1.1.0/
24
RT
4
50.1.1.0/
Area 3
24
Area 0
30.1.1.0/
24
20.1.1.0/
RT24
2
60.1.1.0/
Area 4
24
NSSA
RT
5
OSPF
AS100
ASB
R
Page12
RT
6
Need to import the route information of the other type of the route protocol into the
OSPF processe.g. Downlink traffic to MS
Page13
R6 Network OSPF
Router A
Router B
E-trunk0
E-trunk1
10.64.69.10
10.64.69.14
R6if3/0/0
149.254.5.57
R6if3/1/0
149.254.5.58
Page14
VPN
instance:
ch_gn
Create R6 VPN-instance
[WASN9770-vpn-instance-ch-r6]route-distinguisher 200:1
Page15
Create E-trunk0
[WASN9770]interface Eth-Trunk 0
[WASN9770-Eth-Trunk0]mtu 1560
[WASN9770-Eth-Trunk0]workmode loadbalance
[WASN9770-Eth-Trunk0]least active-linknumber 3
[WASN9770-Eth-Trunk0]ospf dr-priority 0
Page16
Create E-trunk1
[WASN9770]interface Eth-Trunk 1
[WASN9770-Eth-Trunk0]mtu 1560
[WASN9770-Eth-Trunk0]workmode loadbalance
[WASN9770-Eth-Trunk0]least active-linknumber 3
[WASN9770-Eth-Trunk0]ospf dr-priority 0
Page17
[WASN9770]interface GigabitEthernet1/0/0
[WASN9770-GigabitEthernet1/0/0]eth-trunk 0
[WASN9770]interface GigabitEthernet1/0/1
[WASN9770-GigabitEthernet1/0/1]eth-trunk 0
[WASN9770]interface GigabitEthernet1/0/2
[WASN9770-GigabitEthernet1/0/2]eth-trunk 0
[WASN9770]interface GigabitEthernet1/0/3
[WASN9770-GigabitEthernet1/0/3]eth-trunk 0
Page18
[WASN9770]interface GigabitEthernet2/0/0
[WASN9770-GigabitEthernet2/0/0]eth-trunk 1
[WASN9770]interface GigabitEthernet2/0/1
[WASN9770-GigabitEthernet2/0/1]eth-trunk 1
[WASN9770]interface GigabitEthernet2/0/2
[WASN9770-GigabitEthernet2/0/2]eth-trunk 1
[WASN9770]interface GigabitEthernet2/0/3
[WASN9770-GigabitEthernet2/0/3]eth-trunk 1
Page19
[WASN9770]interface r6if3/0/0
[WASN9770]interface r6if3/1/0
Page20
OSPF Configuration
Page21
R3 Network OSPF
Radius:
10.212.0.1~ 10.212.255.254
10.213.0.1~ 10.213.255.254
Router A
Router B
E-trunk2
E-trunk3
10.126.243.2
10.126.243.6
VPN
instance:
ch_r3
Page22
Create R3 VPN-instance
[WASN9770-vpn-instance-ch-r3]route-distinguisher 100:1
Page23
Create E-trunk2
[WASN9770]interface Eth-Trunk 2
[WASN9770-Eth-Trunk0]mtu 1560
[WASN9770-Eth-Trunk0]workmode loadbalance
[WASN9770-Eth-Trunk0]least active-linknumber 3
[WASN9770-Eth-Trunk0]ospf dr-priority 0
Page24
Create E-trunk1
[WASN9770]interface Eth-Trunk 3
[WASN9770-Eth-Trunk0]mtu 1560
[WASN9770-Eth-Trunk0]workmode loadbalance
[WASN9770-Eth-Trunk0]least active-linknumber 3
[WASN9770-Eth-Trunk0]ospf dr-priority 0
Page25
[WASN9770]interface GigabitEthernet1/0/6
[WASN9770-GigabitEthernet1/0/6]eth-trunk 2
[WASN9770]interface GigabitEthernet1/0/7
[WASN9770-GigabitEthernet1/0/7]eth-trunk 2
[WASN9770]interface GigabitEthernet1/0/8
[WASN9770-GigabitEthernet1/0/8]eth-trunk 2
[WASN9770]interface GigabitEthernet1/0/9
[WASN9770-GigabitEthernet1/0/9]eth-trunk 2
Page26
[WASN9770]interface GigabitEthernet2/0/6
[WASN9770-GigabitEthernet2/0/6]eth-trunk 3
[WASN9770]interface GigabitEthernet2/0/7
[WASN9770-GigabitEthernet2/0/7]eth-trunk 3
[WASN9770]interface GigabitEthernet2/0/8
[WASN9770-GigabitEthernet2/0/8]eth-trunk 3
[WASN9770]interface GigabitEthernet2/0/9
[WASN9770-GigabitEthernet2/0/9]eth-trunk 3
Page27
Page28
OSPF Configuration
vpn-instance-capability simple
area 0.0.0.0
Page29
Command
Page30
Action
Command
Page31
Maintenance
Page32
Thank you
www.huawei.com
WASN9770 Data
Configuration - VPN
www.huawei.com
Contents
1. VPN Concept
2. GRE VPN Configuration
3. L2TP VPN Configuration
4. IPsec Tunnel Configuration
Page2
VPN Concept
Features of VPN
Private: VPNs keep resources independent from the bearer network. The
resources of a VPN cannot be used by other VPNs in the bearer network
or by network users outside this VPN. VPNs offer sufficient security,
ensuring that the internal information is out of external invasion.
Virtual: VPNs are virtual networks built by using public networks. VPN
users communicate with each other through public networks.
Meanwhile, public networks are used by other non-VPN users.
Page3
VPN Classification
Virtual Private Network
Overlay VPN
L2 VPN
FR
Peer-to-Peer VPN
L3 VPN
ATM
GRE
IPSec
MPLS VPN
Page4
VPN use the tunneling technology to encapsulate the VPN packet in the tunnel
and transmit the VPN packet by data transmission path which is set up over the
VPN backbone network.
source
encapsulator
decapsulator
Page5
destination
PPTP
L2F
L2TP
GRE
IPSec
Page6
Portal Server
GRE/L2TP/IPSec
IP
AAA
IP over GRE
Backbone
BS
WASN
Private network
VPN capability
GRE
DHCP Server
L2TP
IPSec
AAA
Private network
SSM
Page7
SSM
Domain1
192.168.0.1
BS
192.168.0.0
VPN1
Bear network
WASN
Enterprise1.com
VPN2
192.168.0.0
BS
Enterprise2.com
Domain2
192.168.0.1
Page8
Router1
MS
BS-2
WASN9770
PDN
OSPF
Access Network
Router2
MS
BS-n
MS
Page9
Contents
1. VPN Concept
2. GRE VPN Configuration
3. L2TP VPN Configuration
4. IPsec Tunnel Configuration
Page10
Novell IPX
Group1
Internet
IP
Term1
Novell IPX
Group2
Function
Encapsulation
IP/IPX
Passenger Protocol
GRE
Encapsulation Protocol
IP
Bear Protocol
Page11
GRE Application
NO GRE
Active
Active response
IP=10.10.10.10
data
data
Internet
(Public IP address)
WASN
10.10.10.10
www.yahoo.com
10.10.10.10
Wap gateway
Yahoo
Fire (NAT)
data
data 10.10.10.10
GRE
(Private IP)
Wap gateway
www.yahoo.com
ROUTER1
ROUTER2
Internet
Active
Active respond
211.136.19.176(port)
GRE Tunnel
WASN
Router2
Router1
Page12
WAP GW
Domain1
BS
Internet
Access Network
Enterprise1.com
WASN
BS
AAA server
Domain2
Page13
VPN instance
Binding
Page14
Rif0
Enterprise
Domain1
VPNI 1
Routing Table
Rif1
Enterprise
Domain2
VPNI 2
Routing Table
Rif2
Public Domain
R3if3/0/0
tunnel1
R3if3/0/1
tunnel2
R3if3/0/2
WASN9770
Page15
BS
R6if3/0/0
R6
R3if3/0/0
R3 1
R3 2
ROUTE1
ROUTE2
SPU
PDN
LPU
Page16
AAA
BS
R6if3/0/0
R6
R3if3/0/0
SPU
R3 1
ROUTE1
PDN
ROUTE2
AAA
R3 2
LPU
Page17
WASN9770 GRE VPN Configuration Commands list: Create the GRE tunnel
Command
Function
View
System view
Interface view
Interface view
Interface view
System view
Interface view
Interface view
Interface view
Function
View
ip vpn-instance vpn-instance-name
create a VPNI
System view
route-distinguisher routedistinguisher
VPN instance
view
Page19
Function
View
Domain view
Tunnel
Interface view
Tunnel
Interface view
Page20
Function
View
Access view
radius-server
instance view
radius-server
instance view
R3 Interface
view
Set the
Function
Page22
View
System view
Example
192.168.10.1
domain: enterprise.com
GRE
AAA
Backbone
192.168.10.0/24
BS
WASN
202.1.1.1/24
192.168.1.10/24
10.110.100.1
Page23
Service Server
Page24
Page25
Contents
1. VPN Concept
2. GRE VPN Configuration
3. L2TP VPN Configuration
4. IPsec Tunnel Configuration
Page26
ISP Part
Enterprise Part
LAC
VPN User
LNS
INTERNET
PTSN/ISDN
Enterprise
Network
VPN User
Radius Server
Radius Server
L2TP Tunnel
L2TP Session
Page27
L2TP PDU
Private IP
Private IP
PPP
PPP
L2TP
L2TP
UDP
UDP
Public IP
Public IP
Private IP
PPP
DL
DL
DL
Phy
phy
phy
Private IP
Client
phy
DL
phy
LNS
LAC
Phy
Server
L2TP
LNS decapsulating
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.
Page28
PC1
PPPoE
over
GRE
PPPoE
SGSN
L2TP
AAA
Internet
WASN/LAC
LNS
Private network
PC2
L2TP
AAA
IP over GRE
IP
SGSN
WASN/LAC
Internet
LNS
Page29
Private network
Function
View
Accesss view
l2tp group
view
set the LNS information. The LNS with high l2tp group
priority serves as the active LNS while that view
with low priority serves as the standby
LNS
Function
View
Page31
access view
Function
View
Page32
domain view
Example
Domain VPN
Binding with
L2TP group
LNS master
202.168.1.2
L2TP Group1
R3if3/0/1
212.69.242.132
LNS slave
202.168.1.5
Page33
Page34
Page35
Route Configuration:
#
ospf 1 vpn-instance L2TP_VPN
area 0.0.0.0
network 10.110.1.0 0.0.0.16
network 10.110.2.0 0.0.0.16
network 212.69.242.132 0.0.0.0
Page36
L2TP Maintenance
<WASN9770> system-view
[WASN9770] access-view
------------------------
Group Number
= 1
Local Tunnel ID
= 1
Remote Tunnel ID
= 1
Remote Name
= ISPlns
Remote IP
= 2.2.2.2
Remote Port
= 1701
Sessions
=1
(Number of Results = 1)
Page37
Contents
1. VPN Concept
2. GRE VPN Configuration
3. L2TP VPN Configuration
4. IPsec Tunnel Configuration
Page38
IPSec VPN
Networking
Internet
WASN
Functions
IP headerpacket content
Algorithms
AuthenticationMD5SHA-1
authentication
Packet content encryption
separately or together.
Page39
IPSec Technique
Internet
WASN
new IP
header
AH
ESP
raw IP
TCP
header
header
data
ESP
ESP
tail
auth
SA
SA
SPI
direction
out
protocol
Esp +AH
Auth
MD5
Encryption
3DES
SPI
direction
in
protocol
Esp +AH
Auth
MD5
Encryption
3DES
SA: Security association is the basis of IPSec. which is a pact set up through negotiation
between two communication entities. This pact regulates the IPSec protocol, coding mode,
key, and valid period of the key.
Page40
domain1
BS
Internet
Access Network
Enterprise1.com
WASN
BS
Enterprise2.com
domain2
Page41
BS
Access Network
Internet
WASN
User
Page42
Define
protected data flows
Define
security proposal
Configure
security policy
apply
security policy
Page43
Function
View
create an ACL
System view
ACL view
Page44
Function
View
System view
IPSec proposal
view
ah authentication-algorithm { md5 |
sha1 }
IPSec proposal
view
IPSec proposal
view
IPSec proposal
view
encapsulation-mode { transport |
tunnel }
IPSec proposal
view
Page45
Function
View
System view
Page46
Function
View
sa authentication-hex { inbound |
outbound } { ah | esp } hex-key
sa encryption-hex { inbound |
outbound } esp hex-key
Page47
Function
View
System view
interface view
interface view
Page48
IPSec Case
Enterprise1.com
ike peer 1
212.113.159.13
Tunnel3/0/1
(source: loopback)
Enterprise1.com VPN
IPSec VPN
Enterprise2.com VPN
Tunnel3/0/2
Loopback
212.69.242.133
(source: loopback)
ike peer 2
88.156.19.136
Enterprise2.com
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.
Page49
IKE Peer:
#
ike peer peer-1
exchange-mode main
ike-proposal 1
pre-shared-key abcdef
remote-address 212.113.159.13
ike dpd timer-interval 20 attempt-times 2
#
ike peer peer-2
exchange-mode main
ike-proposal 1
pre-shared-key 123456
remote-address 88.156.19.136
ike dpd timer-interval 20 attempt-times 3
Page50
IPSec proposal:
#
ipsec proposal propo1
transform esp
esp authentication-algorithm
sha1 authenticationalgorithm md5
esp encryption-algorithm des
encapsulation-mode tunnel
IPSec Policy:
#
ipsec policy map1 10 isakmp
security acl 3101
proposal propo1
ike-peer peer-1
pfs dh-group2
sa duration traffic-based 300
#
ipsec policy map2 10 isakmp
security acl 3102
proposal propo1
ike-peer peer-2
pfs dh-group2
sa duration traffic-based 300
#
Page51
VPN Configuration:
#
ip vpn-instance Enterprise1.com
#
ip vpn-instance Enterprise2.com
#
ip vpn-instance IPSec_vpn
#
Page52
interface LoopBack1
ip binding vpn-instance IPSec_vpn
ip address 212.69.242.133 255.255.255.255
binding tunnel ipsec
#
interface Tunnel3/0/1
ip binding vpn-instance Enterprise1.com
tunnel protocol ipsec
source LoopBack1
ipsec policy map1
#
#
interface Tunnel3/0/2
ip binding vpn-instance Enterprise2.com
tunnel protocol ipsec
source LoopBack1
ipsec policy map2
Page53
Page54
IPSec Maintenance
Page55
IPSec Maintenance
display ike sa
Page56
Thank you
www.huawei.com
WASN9770
Hardware O&M
www.huawei.com
References
Page2
Objectives
Page3
Contents
1. Overview
Page4
Page5
Tasks of O&M
Page6
Contents
1. Overview
Page7
Contents
1. Hardware O&M of WASN9770
1. Hardware Environment Management
Page8
Page9
Page10
Temperature Query
Run display temperature slot on the local maintenance terminal (LMT)
to query the temperature of the board
Page11
Page12
Page13
Page14
Fan Management
or auto mode.
Page15
Contents
1. Hardware O&M of WASN9770
1. Hardware Environment Management
2. Board Management
Page16
For the LMT, go to Device Panel to check whether all boards are
running normally
Page17
Ethernet0/0/0
current state
UP
UP
Internet Address
10.77.198.72
Mask
255.255.255.0
Broadcast address
10.77.198.255
1500 bytes
input packets
228833
input bytes
36489855
input multicasts
output packets
717043
output bytes
113106426
Page18
Run display cpu-usage query the CPU usage of all in-position LPUs,
SRUs, and SPUs in the subrack.
Page19
Reset boards
Page20
Contents
1. Hardware O&M of WASN9770
1. Hardware Environment Management
2. Board Management
Page21
Alarm box
Check the indicators and alarm buzzer on the alarm box, make sure
no alarm generated for the system
Alarm console
Make sure no different level alarms such as board fault, board reset
and so on
Page22
Page23
Notes
Reboot Command:
Generally, you are not recommended to use this command, because this command leads
to the short-time breakdown of the network. In addition, when you restart the router,
ensure that all configuration files of the are saved.
Before reset the SRU, save the configuration to avoid lose the configuration information.
When you reset the SPU or SRU, if the board is normal, switch the active/standby board,
the user will not be offline. If the standby board is not in the slot, all the user on the active
SPU will be offline after switch active and standby board.
Page24
Summary
Page25
Thank you
www.huawei.com
WASN9770
Software O&M
www.huawei.com
References
Page2
Objectives
Page3
Contents
1. Overview
Page4
Page5
Tasks of O&M
Page6
Contents
1. Overview
Page7
Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management
Page8
Version Management
Page9
Version Management
Using the check version command, you can check the version of all
the current registered boards.
Page10
Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management
Page11
License Management
Page12
License Management
2. Run license upload to upload the license file from the hard disk of
the SRU to the FTP server.
Page13
License Management
4. Run display license file to list the information about the license file.
The information includes the name and validity of the current license file.
Page14
License Management
Page15
Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management
Page16
Patch Management
Page17
Patch Management
Step 3: Run patch run to confirm the patch software. Thus, the
patch is valid even if the board is reset and restarted.
Page18
Patch Management
Step 4: Run display patch to query the license configuration data that
is actually used
Page19
Patch Management
Page20
Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management
Page21
Log Management
Note: The operation log file is generated every day and stored to
hd1:/soft/data/olg on the Switching Route Unit (SRU) hard disk.
Page22
Log Management
2. Run display seclog to query the security logs
Page23
Log Management
3. Run display alarm log to query the alarm logs
Page24
Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management
Page25
Telnet Management
Using the telnet command, you can log in to another router from the
current router through Telnet.
Page26
Telnet Management
Using the debugging telnet command, you can enable the Telnet
connection debugging.
Using the undo debugging telnet command, you can disable the
Telnet connection debugging.
<Quidway> undo debugging telnet
Page27
FTP Management
Using the ftp server enable command, you can enable the FTP
server and allow the login of FTP users.
<Quidway> system-view
[Quidway] ftp server enable
Using the undo ftp server command, you can disable the FTP server
and deny the login of FTP users.
Page28
FTP Management
PC
WASN
FTP server
FTP client
Page29
FTP Management
Page30
FTP Management
WASN
PC
FTP client
FTP server
Using the ftp command, you can set up a control connection with
the remote FTP server and enter the FTP client view
Page31
FTP Management
Using the ascii command, you can set the transmission data type to
ASCII.
Using the binary command, you can set file transmission type to
binary.
Using the cd command, you can change the operating directory on the
remote FTP server.
Page32
FTP Management
Using the cdup command, you can change the operating directory to
the upper-level directory.
Using the bye command, you can disconnect with the remote FTP
server and return to the user view
Page33
Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management
Page34
The WASN9770 data stored on the hard disk of SRU board. You need to
back up the data of the active SRU board
hd1:/vrpcfg.cfg
hd1:/bam/data/alm/*.alm
hd1:/bam/data/prf/*.mrf.bz2
hd1:/bam/data/olg/*.olg
User information:
hd1:/bam/data/sec/user.ini
Security log:
hd1:/bam/data/seclog/*.seclg
Page35
Information backup
Make sure on the FTP server, the user that perform the backup has right
to create folders and files
Use ftp command to verify
Make sure on the FTP server, there is enough space for holding the files
Use df command on FTP server to verify (for UNIX/Linux servers)
Page36
Automatic Backup
Using the dump-ftp ftp-server command, you can dump the files
to be backed up from the main area on the master SRU to the File
Transfer Protocol (FTP) server.
Page37
Manual Backup
Page38
Manual Backup
Page39
Page40
Page41
Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management
Page42
Information Collection
Page43
Information Collection
Page44
Information Collection
Page45
Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management
Page46
Page47
Using the display ms-info command, you can view the information
of the specified MS context.
Page48
Using the deactive user command, you can deactivate the MS based on
the Domain, MSID, BSID, or board.
Page49
Notes
This command must be used with caution because running this command forces the
specified users out of services.
Undo ip binding vpn-instance command:
Associating an interface with a VPN instance or delete the existing association results in
the deletion of the IP address of the interface and Layer 3 features such as routing
protocols. These features must be re-configured if required.
R3 Interface Configuration
In the scenario where authentication users access the network, two R3 interfaces with
different central processing unit (CPU) numbers must be created if two R6 interfaces with
different CPU numbers are created. For example, if r6if3/0/0 and r6if3/1/0 are created,
you must create r3if3/0/0 and r3if3/1/0.
Page50
Summary
Page51
Thank you
www.huawei.com
Internal
OWL000100 iManager
M2000 V2
System Overview
ISSUE 2.1
www.huawei.com
Page 2
Page 3
Network
Management
Layer
NMS
In Telecommunication
Management Network
Element
Management
Layer
Other EMS
M2000
located in the
Element
Management-layer
NE
NE
(EM-layer).
NE
NE
Page 4
Network Deployment
Alarm box
OMC Client
M2000 Server
OMC Client
(Administrator)
NMS
Area 1
OMC Client2
Alarm box
OMC Client1
OMC Center
Area 2
Firewall
LMT
E1/ATM/IP
Backbone
Firewall
Alarm box
NE1
SQL
Ftp
ASCII Stream
NE2
NE3
NE1
Area 1
NE2
Area 2
Page 5
OMC Client
(Administrator)
Area 1
CS OMC Client2
CS OMC Client1
OMC Center
Alarmbox
Area 2
Firewall
Firewall
Alarmbox
Alarmbox LMT
LMT
SGSN
E1/ATM/IP
Backbone
GGSN
CG
MGW
PS Equipment Room
MSC Server
CS Equipment Room
Page 6
and IP devices. The M2000 cannot manage the CDMA NE with the
UMTS or GSM NE at the same time.
UMTS
GSM
CDMA
NodeB
MSC
MSC
RNC
BSC
MSC Server
SGSN
BTS
MGW
GGSN
PCU
PDSN
MSC Server
HLR
BSC
MGW
HLR
CG
SIWF
IP
BTS
Router
RAC
Switch
RAU
Firewall
HLR
TSC
Page 7
Page 8
system can have multiple clients, and can have either one
server or two servers. The two servers constitute a High
Availability (HA) system.
Page 9
Servers
Clients
Alarm box
Other networking devices
Using a dial-up server, you can operate and maintain
Page 10
PSTN
Alarm box
Dial-up server
Client 1
Client 2
Server
Page 11
Client 1
Active server
Alarm box
Client 2
Cluster console
Disk
array
PSTN
Dial-up server
Standby server
Page 12
Server Software
Client Software
NE mediation software
Using a dial-up server, you can operate and maintain the
Page 13
Page 14
Page 15
Page 16
Page 17
Questions
In one network, there are two CSOFTX3000, two UMG8900 and
server?
Page 18
Interfaces (I)
External Interfaces
NMS
FILE
SNMP
CORBA
ASCII
Stream
iManager M2000
NE
Page 19
NE
NE
Interfaces (II)
Internal Interfaces
iManager M2000
MML
FILE
SNMP Other
NE
Page 20
Page 21
Page 22
Basic Features
Topology Management
encrypt
firewall
protect
Security
strategy detect
respond
authentication
Strategy
change
Alarm
Performance Management
Black list
DOS
Log
Security Management
Page 23
Management
Topology Navigation
Tree Management
Topology Map
Management
Management by
District
Page 24
Management
Resource Status Query
and Monitoring
NE and Link Report
NE Configuration
Export
NE Configuration
Synchronization
Page 25
Management
Alarm Synchronization
Alarm Shielding
Alarm Customization
Remote Alarm Notification
HUAWEI TECHNOLOGIES CO., LTD.
Page 26
Performance Object
Management
Real-Time Measurement
Real-Time Monitoring
Performance Data
Management
Performance Alarm
Customized Counters
Page 27
NE Software Version
Management
NE License Management
NE Data Backup
Page 28
iManager
M2000 Server
M2000 Client
iManager
M2000
Server
Area2
Area3
Page 29
User
System
Network
Page 30
Before Login
Login Authorization
IP address
Password
Valid User account
Date & time
Not in
correct time
Joe
NEs
Mike
Group 1
Configuration
Rights Management
Group 2
Maintenance
User group can combine with operation right on demand
Read
Ann
After Login
Harry
Page 31
Signaling Tracing
The signaling tracing is a key method used for locating the
Page 32
Equipment Panel
Using the GUI on the M2000 client, you can carry out the
following operations:
View the hardware configuration of the NE devices, such as
the boards.
Page 33
System Management
The M2000 system management provides the following functions:
License Management
Remote Maintenance
Citrix Based Client Integration
Online Help
System Status Monitoring
System Data Backup and Restoration
System Uninstall
Page 34
Page 35
Customizable Report
Performance
content of a report.
Design template freely
Alarm
Configuration
Statistic periodically
Basic data
Page 36
Page 37
Number of
CPUs
Main Frequency
of the CPU
(GHz)
1.5
1.35
1.35
1.35
1.5
1.5
Memory (GB)
16
32
16
32
2 x 146
4 x 146
2 x 73
None
1 x 3320
(A 3320 disk array consists of
eight 73 GB hard disks.)
1 x 6140
(A 6140 disk array consists of
fourteen 73 GB hard disks)
Accessories
DVD/Ethernet
adapter/DATA72 tape
drive/English
documentation
DVD/Ethernet
adapter/DATA72 tape
drive/English documentation
DVD/Ethernet adapter/DATA72
tape drive/English
documentation
Operating
system
Solaris 10/English
documentation
Solaris 10/English
documentation
Solaris 10/English
documentation
Database
Sybase 15.0/English
documentation
Sybase 15.0/English
documentation
Sybase 15.0/English
documentation
Application
software
M2000 server
application software
Page 38
Number of CPUs
Main Frequency of
the CPU (GHz)
1.5
Memory (GB)
2 x 146
4 x 146
2 x 73
2 x 3320
(A 3320 disk array
consists of five 73 GB
hard disks.)
2 x 3320
(A 3320 disk array
consists of eight 73GB
hard disks.)
1 x 6140
(A 6140 disk array
consists of fourteen
73GB hard disks.)
Accessories
DVD/Ethernet
adapter/DATA72 tape
drive/User manual
DVD/Ethernet
adapter/DATA72 tape
drive/User manual
DVD/Ethernet
adapter/DATA72 tape
drive/User manual
Operating system
Solaris 10/English
documentation
Solaris 10/English
documentation
Solaris 10/English
documentation
Database
Sybase 15.0/English
documentation
Sybase 15.0/English
documentation
Sybase 15.0/English
documentation
Application
M2000 server
application software
M2000 server
application software
1.35
8
16
8
1.5
32
16
Page 39
32
Configuration
CPU (GHz)
1.5
Memory (GB)
2 x 146
Accessories
Operating system
Solaris 10
Page 40
Item
Configuration
Router
Timeslot cross
multiplexer
Mecury3600
Page 41
Item
Configuration
CPU
P4/2.8 GHz
Memory
512 MB
Hard disk
80 GB
Accessories
Operating system
Application software
Page 42
System Capacity
Configuration
Management capacity
Server hardware
15 equivalent NEs
25 equivalent NEs
50 equivalent NEs
55 equivalent NEs
90 equivalent NEs
Page 43
Server model
1.2 million
1.8 million
3.6 million
4.5 million
7.2 million
9 million
Page 44
Server
hardware
Event
alarm
History
fault alarm
Current
fault alarm
Shielded
alarm
Sun Netra240
800 000
800 000
100 000
100 000
5 000 000
5 000 000
600 000
600 000
7 000 000
7 000 000
800 000
800 000
Page 45
Server
20
30
50
55
90
100
Page 46
Thank You
www.huawei.com
Internal
OWL000100 iManager
M2000 V2
Operation Guide (1)
www.huawei.com
Foreword
Page 2
Content
Content
System Management
Topology Management
Fault Management
www.huawei.com
Page 3
System Management
System Management include:
System Login
System Setting
System Monitor
Region Setting
Toolbars customize
Broadcast Message
Security Setting
Change Password
Maintenance Client Setting
LMT Prompt Setting
Page 4
System Login
includes:
Page 5
Page 6
prompt will be
showing
Page 7
System Settings
Includes:
Output Setting
Terminal Setting
Time Mode
Page 8
System Settings
Page 9
Output Settings
Page 10
Locking Interval
Page 11
Page 12
Time Mode
Page 13
System Monitor
Includes:
Performance Monitor
Hard-disk Monitor
Database Monitor
Service Monitor
Process Monitor
NE Monitor
Page 14
Monitor Browser
Page 15
Performance Monitor
Page 16
Harddisk Monitor
Page 17
Database Monitor
Page 18
Service Monitor
Page 19
Process Monitor
Page 20
NE Monitor
Page 21
Page 22
Page 23
Page 24
Page 25
Page 26
Page 27
Toolbars Customize
Includes:
Toolbars Customize
Page 28
Toolbars Customize
Page 29
Toolbars Customize
Default
Setting
Page 30
Broadcast Message
Includes:
Broadcast Message
Page 31
Broadcast Message
Page 32
Security Settings
Includes:
Change password
Page 33
Security Policy
Page 34
Security Settings
Page 35
Tips!
Because only one user is allowed to login and establish sessions in the
single user mode, all other online clients will be forced out after the mode
is switched. Be sure to set the switching delay time according to actual
conditions, so that other clients can perform related operations before exit.
When you log in to M2000 as the current user (including the admin and
common users), if the successive password input errors exceed the value
in Max login attempts, this account will be locked, so as to prevent the
system from being attacked by illegal users. In this case, you cannot login
the system again with this account unless it is unlocked by the system.
Therefore, the user to log in to the system should remember the password
to avoid the account being locked due to error inputs.
The locked user can log in to the system some minutes later (the value in
Page 36
Tips!
All the users having the security management unlock permission can
unlock common users who are locked. The procedures are as follows.
Log in to the system as the admin user and select Security > Security
Management. Click User in the Security Management dialog box. Then
right-click a locked user and select Unlock User from the popup menu.
The super user admin" can Unlock User.
Page 37
Unlock User
Page 38
Change Password
Page 39
Change Password
Page 40
Includes:
Page 41
Page 42
Page 43
Page 44
Page 45
Content
Content
System Management
Topology Management
Fault Management
www.huawei.com
Page 46
Topology Management
Includes
Introduction to Physical Topology
NE Management
Link Management
Subnet Management
Topology View Management
Page 47
NEs Management
Link Management
Subnet Management
View Management
Page 48
Physical Topology
Topology views consist of physical topology view and machine
Page 49
Page 50
Shortcut Menu of NE
Page 51
Page 52
Page 53
NE States
Page 54
NE Alarm States
On the physical topology, the connection states of the NEs are indicated by the
NE icon and the state icon. The state icon is to the upper left of the NE icon.
Multiple state icons can be combined to indicate that the NE is in multiple states
at the same time. The default state icon are listed in the table.
In the physical topology view, the alarm states of the NEs are indicated by the
different color NE icons. Only when there is a fault alarm on a physical NE, the
NE icon changes to indicate the alarm. If there are several fault alarms occurring
on an NE at the same time, the NE icon indicates the most serious alarm level.
Page 55
Topology Toolbar
Page 56
Page 57
Page 58
NE Management
Through the topology view, you can create physical NEs and
Page 59
Create NE
Choose Topology > Main Topology. The Main Topology window is
displayed.
In the physical topology navigation tre or on the physical view, right-
click the subnet of the NE to be created and choose New > Create
Topo Object on the shortcut menu.
From the navigation tree in the Create topo objects dialog box,
Page 60
Create NE
Page 61
Page 62
Page 63
Delete NE
Page 64
Link Management
Link management includes the management on both physical and virtual
links.
The physical links refer to the connection between two physical NEs. The
Page 65
Page 66
Page 67
Subnet Management
Definition Of Subnet
That is, the NEs in the entire network are divided into different subnets by
such rules as region or management area. A subnet can be nested in
another one.
The purport of Subnet Management
Page 68
Page 69
Page 70
Page 71
Page 72
Search Object
Using this function, you can find and locate the specified NE, link, link set and
subnet.
Page 73
Page 74
Page 75
Page 76
Refresh Topology
Using this function, you can refresh the physical topology.
Page 77
Save Position
Using this function, you can save the changed icon positions
Page 78
Content
Content
System Management
Topology Management
Fault Management
www.huawei.com
Page 79
Alarm Management
M2000
operations:
provides
Client
the
following
Configuration,
Alarm
Page 80
Alarm Categories
Alarms can be categorized based on two principles:
Page 81
during the equipment operation. The event alarms indicate only the
equipment status at a certain point of time. The system generates event
alarms periodically to indicate the changing equipment status. Event
alarms do not need manual handling.
History fault alarms refer to the cleared and acknowledged fault alarms.
Shielded alarms are generated during a short period of time. The alarms
matching the correlation rules set on the M2000 client are shielded alarms,
and they are stored in the M2000 shielding base. Shielded alarms can
only be fault or event alarms.
HUAWEI TECHNOLOGIES CO., LTD.
Page 82
Alarm Levels
Alarm severity indicates how severe a generated alarm is. Sorted in the descending
order, alarms have four levels of severity: critical, major, minor, and warning alarms.
Critical alarms, such as the power circuit fault alarm and the output clock fault
alarm, affect the whole system operation. Critical alarms require immediate handling.
Major alarms, such as alarms about disconnected fibers or physical line faults,
occur only to boards or lines. If not handled timely, these alarms may affect
subscriber services.
Minor alarms, such as the alarm for bit errors in some physical lines, refer to
common status alarms that indicate the working status of boards or lines.
Warning alarms indicate status changes or events which do not affect the system
performance or subscriber services, but which may interest the operator may have
interest. Some warning alarms prompt when the equipment returns to normality.
Page 83
Alarm Types
Power alarms: related to the power supply system
Environment alarms: related to the equipment environment, such as the
Page 84
Page 85
Page 86
Storing Alarm
Page 87
Procedure
To query current fault alarms, perform the following steps:
1) Select Monitor > Current Fault Alarms.
2) In the Filter dialog box, set the alarm query conditions.
3) Click OK. The query result is displayed in the browse window.
Page 88
Page 89
Page 90
Page 91
Page 92
Page 93
Page 94
Page 95
Page 96
Page 97
Page 98
Page 99
Page 100
Page 101
Page 102
Page 103
Statistic Table
Page 104
Page 105
Page 106
Procedures:
1) In the window for browsing the alarm query result, select an unacknowledged
alarm.
2) Right-click the alarm and select Acknowledge.
If the alarm you click is acknowledged, Acknowledge in the shortcut menu is
disabled, and Unacknowledge is enabled
3) In the Confirmation dialog box, click Yes.
Page 107
Procedures:
1) Select Monitor > Settings > Auto Acknowledge Rule.
2) In the Auto Acknowledge Rule dialog box, set the parameters of auto
acknowledgement. Click OK.
Page 108
Subrack, slot, or port of an NE. These alarms show what part of the
equipment requires maintenance and what faults require handling.
Procedures:
To create a user defined alarm, perform the following steps:
1) Select Monitor > Settings > NE Alarm Settings. The NE Alarm Settings dialog box is
displayed.
2) Click the User Defined Alarm tab and then the Alarm Definition tab. Click Add.
The Add User Defined Alarm dialog box is displayed.
3) Set the parameters for the user-defined alarm.
4) In Alarm Definition, click Apply.
5) Click the Alarm Binding tab, and click Add. The Add Alarm Binding dialog box is displayed.
6) Select an NE from the Select NE tree.
7) Select an alarm from the Select Alarm tree.
8) Set parameters. Click OK.
Page 109
Procedures:
1) Select Monitor > Settings > Level Redefine.
2) Click Add. In the Add level Redefine Setting dialog box, set the parameters for the alarm
level redefinition.
Click
next to Alarm Name. In the Select Alarm Name dialog box, select the alarm
whose level you want to redefine. Click OK.
In the Redefine Level drop-down list, select the level for the alarm after redefinition.
In the Alarm Source tab, click Select. In the Select object window , select the objects that
raise alarms. By default, all the objects are selected
3) When the objects in Alarm Source report the alarms that are set in Alarm Name, the alarm
level is redefined.
Page 110
Page 111
Page 112
Thank you
www.huawei.com
Internal
OWL000100 iManager
M2000 V2
Operation Guide (2)
www.huawei.com
Foreword
Page 2
Contents
Contents
Configuration Management
Performance Management
Security Management
www.huawei.com
Page 3
Configuration Management
Page 4
the NE configuration.
You can configure an NE by executing MML
Page 5
Configuration Management
Includes
Querying NE Configuration
Displaying the Basic NE Configuration
Saving the Basic NE Configuration
Synchronizing the NE Configuration
Managing NE User Account
Follow-Up Report Browser
Task Management
Executing NE MML Commands
Page 6
Querying NE Configuration
When you add a physical NE to the topology, the M2000 system gets the
Page 7
Functionality
Management
(Logical)
Equipment
Management
(Physical)
AAL2
Frame
IMA
Board
IPOA
MTP3 (SS7 Link)
MTP3B
SAAL
SS7Circuit
HUAWEI TECHNOLOGIES CO., LTD.
Page 8
Frame
Board
Board
Logical
Function
Destination Signaling Point
IntraOfficeSigPoint
Signaling Link Set
Object
Signaling Link
SigLinkSet
Signaling Route
SigLink
Page 9
SigRoute
Page 10
Page 11
Page 12
NE Report
Display the basic NE configuration, such as the NE name, type,
Page 13
Page 14
following steps:
1) Select an NE from the Topology map.
2) Right-click the NE and select Synchronize NE, as shown next
slide
Page 15
Page 16
following cases:
An NE is added to the topology and connected to the M2000.
The NE configuration is changed through the M2000 or LMT.
Page 17
Page 18
Page 19
Tips
You can apply one command to several NEs at the same time as follows:
Select multiple NEs of the same type, and then select the command.
These NEs, however, must be of the same type.
If more than one report is returned for the command, only the first one is
Page 20
Page 21
Contents
Contents
Configuration Management
Performance Management
Security Management
www.huawei.com
Page 22
Page 23
Performance Management
Includes:
Introduction of Performance Management
Querying Performance Results
Saving Performance Results into a File
Synchronizing Performance Data
Managing Performance Measurement
Setting Extended Performance Counters
Setting Measurement Objects
Managing User Defined Counters
Managing Performance Monitoring
Page 24
Page 25
Page 26
also reports results of all these counters to the M2000. You can, however,
set on the M2000 client whether to save the results to the performance
database.
You can select or clear the extended counters during the M2000
operation.
When you select an extended counter, the measurement results of the
extended counter are saved to the M2000 performance database for
future queries.
When you clear an extended counter, the M2000 does not save the
measurement results of the extended counter to the performance
database. Accordingly, this counter cannot be queried in the database
later.
Page 27
dividing the system default counters (both KPIs and extended counters).
You can add, modify, or delete the user defined counter during the
M2000 operation
Note: The real-time measurement does not support the user defined
performance measurement counter.
HUAWEI TECHNOLOGIES CO., LTD.
Page 28
M2000s user
manually
activate the
counters to be
save in M2000
system
NEs Counters
Save Automatic
activated once the
NE connected to
M2000 system
Measurement
period is 30mins
Default Counters
Extended Counters
PM
database
Page 29
Measurement Objects
The measurement object defines what to measure. The measurement
object.
Page 30
Measurement Periods
A measurement period refers to the interval for the NE to report
Page 31
Page 32
Page 33
the performance data and then saves the data to the database. The
M2000 does not save the results collected for the user defined
counters to the performance database. When these results are
queried, the M2000 calculates the results through a set formula and
displays them through the client.
Page 34
database. This simplifies data query. You can save the data to files.
Page 35
Query the results of the performance measurements with long periods, such as
30 minutes, 60 minutes, or 24 hours
Procedures:
1) Select Performance > Query Result.
The Query Result dialog box is displayed. Query the results in two ways: setting
new query conditions or using conditions set in the template.
To use the conditions set in the template, see step 4 in this section.
Page 36
Example
For example, to set query conditions to measure the CPU usage of the NE
Page 37
Page 38
Page 39
Measuring
Counter
Unmeasured
Counter
Page 40
Page 41
Page 42
Only valid
during the
peak hour!
Page 43
Page 44
No output!
Page 45
Tips
In step 8, if the system prompts All Counter to query are Unavailable
Now, infer that these counters are extended counters. You must select the
counters manually, as follows: Select Counter Setting in the system
prompt window or select Performance > Counter Setting, select the
extended counters, and then click Apply (See Next Slide). In Query
Result, repeat steps 2 and 3.
Wait for the next 30mins periodic measurement cycle (e.g 12:00, 12:30,
Page 46
These measurement
counters are extended
counters. They are
selected manually.
Page 47
Click on Query
to get the
outputs
Page 48
Page 49
Page 50
Page 51
Applying a Template
Procedures:
Page 52
Follow your
Login User
account
Click Here
Page 53
Page 54
Short-Cut to
set the
Condition for
Query
Page 55
Page 56
many reasons, such as the disconnection of NEs from the M2000 within
a period of time.
When periodic measurement results are missing, you can recollect
measurements.
Page 57
Page 58
Page 59
Page 60
Select the menu items Performance > Measure Management > measurement Status
On the navigation tree, right-click a node and choose Subscribe Result from the shortcut
menu. Set the parameters.
You can set the performance measurement results of multiple NEs, multiple periods, and
one function subset of the same NE type at a time.
After that, each measurement period is displayed in one window and each function subset is
displayed in one tab.
Page 61
Page 62
through synchronization.
The word "missing" indicates that the measurement results for some
If the measured object is faulty during this time segment, the NE cannot
collect the performance data. In this case, the measurement results are
lost.
Page 63
Page 64
Page 65
Page 66
Page 67
Select the unit for the user-defined counter in the Unit drop-down box.
Click OK or Apply.
Page 68
Page 69
Page 70
Page 71
Contents
Contents
Configuration Management
Performance Management
Security Management
www.huawei.com
Page 72
Page 73
Security Management
Includes:
Introduction of Security Management
Create User
Create User Group
Grant Right to User Group
Grant New Device Right to User Group
Bind User to User Group
Bind User to NE User
Online User Monitoring
Backup Management
Page 74
in to the system. A user account has a user name and password. A user is
authorized with certain operation privileges such as security management,
alarm management, and performance management. The M2000 administrator
assigns the privileges to each user account. For details, see iManager M2000
Mobile Element Management System - Administrator Guide.
NE user account: An NE user account is a special M2000 user account.
Page 75
Create an NE Account
Procedure
To create an NE user account, perform the following steps:
1)
Page 76
Page 77
Page 78
procedures.
Operations
Create User
Create User Group
Grant Access to User Group
Grant New Device Access to User Group
Bind User to User Group
Bind User to NE User
Page 79
Create User
The first step to create a user in M2000 is to add the user and set his basic
information as follows.
Operations
1.
Click System > Security Management to enter the Security Management window.
2.
3.
In the Create new user dialog box, input the correct parameters.
Click the General Info tab, and input the correct parameters. For details, see
Descriptions of User Parameters next slide.
Click the User Groups tab, and select the user group to be bound.
Click the NE Users tab, and select the NE user to be bound.
4.
Page 80
Page 81
Page 82
General Information
Page 83
User Group
Page 84
NE Users
Page 85
Right
Page 86
NE
Page 87
Rules
Page 88
Management window.
2. You can create a user group in three ways:
Click the User Group node on the security navigation tree, and
select Add from the shortcut menu.
Select the User Group node on the security navigation tree, and
click Add in the right window.
Select the User Group node on the security navigation tree,
select any one user group from the right window and right-click.
From the shortcut menu, select Add.
HUAWEI TECHNOLOGIES CO., LTD.
Page 89
Page 90
General Information
Page 91
Right
Page 92
Page 93
NE Command Groups
Page 94
Rules
Page 95
Operations
1. Click Security > Security Management to enter the Security Management
window.
2. You can enter the Bind User Group to Right dialog box in four ways:
Unfold the User Group node on the security navigation tree, right-click
the user group to be bound, and select Bind Right from the shortcut
menu.
Unfold the User Group node on the security navigation tree, select the
user group to be bound, and click Bind Right in the Right tab
Select the User Group node on the security navigation tree, select the
user group to be bound in the right window, and click Bind Right.
Select the User Group node on the security navigation tree, right-click
the user group to be bound in the right window and select Bind Right.
Page 96
the tree.
5. Select another device, and repeat step 3 and 4.
6. Click Apply or OK after finishing all settings.
Page 97
Bind Right
Page 98
Page 99
Tips
At system startup, three default user groups exist (operators, guests and
Therefore, it is recommended that a group other than the Administrators group not
be allocated the Grant user group right .
The device tree is categorized by NE type. When you select/unselect the NE node
of one type, all the accesses of all NEs of this type are selected/deselected. When
you select/unselect the top node of the device tree, all the accesses of all NEs are
selected/deselected.
The M2000 device is a virtual device, which integrates all application accesses.
Certain access setting only takes effect after you log in to the client again.
Page 100
Click System > Security Management to enter the Security Management window.
2.
You can enter the Bind User Group to New Device dialog box in four ways:
Unfold the User Group node on the security navigation tree, right-click the user group to
be bound, and select Bind New Device Right from the shortcut menu.
Unfold the User Group node on the security navigation tree, select the user group to be
bound, and click Bind New Device Right in the New Device Right tab.
Select the User Group node on the security navigation tree, select the user group to be
bound in the right window, and click Bind New Device Right.
Select the User Group node on the security navigation tree, right-click the user group to be
bound in the right window, and select Bind New Device Right.
Page 101
In the Bind User Group to New Device dialog box, all new devices are
displayed in the left tree. Select a new device from the New Device tree, and all
its accesses will be displayed on the right tree.
4.
5.
6.
Page 102
Page 103
Page 104
Page 105
For adding a user to the user group, Bind User to User Group and Bind
User Group to User have the same functions. You can select either one.
Operations
1.
Click Security > Security Management to enter the Security Management window.
2.
You can enter the Bind User to User Group dialog box in two ways:
Unfold the User node in the security navigation tree, right-click the user to be added to the
user group, and select Bind User Group from the shortcut menu.
Unfold the User node in the security navigation tree, and select the user to be added to the
user group. Select the User Group tab in the right window, and click Bind User Group.
3.
In the Bind User to User Group dialog box, add the corresponding user to the user group.
4.
Page 106
Tips
Note
In the Bind User to User Group dialog box, all the users to be added to
the user group are displayed on the right. If you mark before the parent
node, all its subnodes will be selected.
If the user already logs in, the user must re-log in to validate the operation.
Page 107
Bound to the NE user, the NMS user can log in to the related NE as the
NE user and perform maintenance tasks on the NE.
Operations
1.
Click Security > Security Management to enter the Security Management window.
2.
3.
In the Bind User to NE User dialog box, bind the user to the corresponding NE user.
4.
Note
In the Bind User to NE User dialog box, all the users are displayed on the left, and all the
NE users on the right.
Page 108
functions to protect the system from being attacked by illegal users and
monitor online user operations.
Page 109
User Monitor
Page 110
Page 111
Filter by Terminal IP
Page 112
Page 113
operation, you can view the information about the LMT user and also
monitors its operation.
Note
This operation is applicable only to class A NEs, but not to class B or C NEs.
The M2000 monitors only the users logging in through the LMT, including the
M2000 and the separate LMT. The M2000 does not maintain or monitor virtual
NEs.
The M2000 displays up to 2000 real-time NE monitoring records. When more
records are generated, the M2000 overwrites the earliest records with the latest
records.
Page 114
Page 115
Backup Management
The M2000 supports can save the server data and the NE data as
Page 116
Backup Management
Page 117
Page 118
NE Backup List
Page 119
Page 120
Thank You
www.huawei.com
Revision Record
Course Code
Product
OXP300001
WiMAX
All
1.00
Developer/Modifier
Date
Approver
New/Update
Hujian
Hong Xinpei
New
2010.8.30
Version
Update
Page0
WiMAX 16e
Frequency Planning
www.huawei.com
Objectives
Page2
Contents
1. WiMAX Introduction
2. WiMAX Sub-Carrier Assignment Mode
3. WiMAX Typical Networking Mode
4. WiMAX Network Expansion Solution
Page3
Contents
1. WiMAX Introduction
2. WiMAX Sub-Carrier Assignment Mode
3. WiMAX Typical Networking Mode
4. WiMAX Network Expansion Solution
Page4
What is OFDMA?
sub-carrier-N
sub-carrier-4
sub-carrier-3
sub-carrier-2
sub-carrier-1
Frequency
OFDM Slot/Frame
IFFT
SN
S1 S2 S3 S4 S5 S6 S7
IFFT
Time
OFDM Symbol
(FTT duration)
S2N
Guard Time
Bandwidth
Page5
Power
DL Sub-frame
Last Frame
TTG
UL Sub-frame
RTG
Next Frame
FCH UL
Burst#1
DL Burst#2
MAP
Burst#2
S
Preamble
Time
DL DL Burst#1
MAP
DL Burst#4
Burst#3
DL
Burst#5
DL Burst#6
UL
MAP
ACK
DL Burst#3
Burst#4
Ran
ging
DL Burst#7
Burst#5
Fast Feedback
(CQICH)
N
0
1 2 3
4 5
1 2
M
Symbol
Guard
Page6
Contents
1. Review of OFDMA frame structure
2. WiMAX Sub-Carrier Assignment Mode
3. WiMAX Typical Networking Mode
4. WiMAX Network Expansion Solution
Page7
Contents
2. WiMAX Sub-Carrier Assignment Mode
Page8
Allocation of Sub-carrier
Pilot sub-carrier
DC sub-carrier
Data sub-carrier
Guard sub-carrier
10MHz*(28/25)=10.94KHz*1024
Sub-channel
Page9
Subcarrier Allocation
Page10
DL-FUSC
Data Sub-carrier
DC Sub-carrier
Guard Sub-carrier
Pilot Sub-carrier
86 Sub-carriers
12
36
39
848
840
87 Sub-carriers
16 sub-carriers
48 group
Only Downlink
16 sub-channels
Page11
DL-FUSC
Page12
DL-FUSC
Example :-
10MHz 1024FFT
Page13
DL-FUSC
Page14
DL-PUSC
60 clusters
0
59
14 sub-carriers * 2 symbols
Group 0: 0~11
Group 1: 12~19
840 sub-carriers
Group 2: 20~31
Group 3: 32~39
Group 4: 40~51
Group 5: 52~59
DL-PUSC
Parameters
System Bandwidth(MHz)
1.25
2.5
10
20
128
N/A
512
1024
2048
43
N/A
91
183
367
6/3
N/A
30/15
30
120/6
0
Number of Used
Subcarriers
85
N/A
421
841
1681
Number of Data
Subcarriers
72
N/A
360
720
1440
Number of Pilot
Subcarriers
12
N/A
60
120
240
FFT Size(Nfft)
Sub-channel
Even Symbol
Odd Symbol
Even Symbol
Odd Symbol
Values
Number of Guard
Subcarriers
Number of
Cluster/Subchannels
Page15
DL-PUSC
Page16
DL-PUSC
PUSC DL Cluster Structure
12 data sub-carriers + 2 pilots
odd Symbols
even Symbols
odd Symbols
even Symbols
One cluster
OFDM Symbols
Sub-carriers
Page17
DL-PUSC
Example:
10MHz , 1024FFT
Page18
Contents
2. WiMAX Sub-Carrier Assignment Mode
Page19
UL-PUSC
UL-PUSC
Parameters
Values
1.25
2.5
10
20
128
N/A
512
1024
2048
31
N/A
103
183
367
Number of tiles
24
N/A
102
210
552
Number of sub-channels
N/A
17
35
92
N/A
97
N/A
409
841
1681
Symbol 0
Symbol 1
Tile
Symbol 2
Data carrier
Pilot carrier
Page20
UL-PUSC
Page21
UL- PUSC
OFDM Symbols 2
OFDM Symbols 1
OFDM Symbols 0
OFDM Symbols 2
OFDM Symbols 1
OFDM Symbols 0
OFDM Symbols 2
OFDM Symbols 1
OFDM Symbols 0
T ile 1
Sub-carriers
T ile 2
O F D M S y m b o ls
T ile 3
P ilo t
T ile 4
D a ta
T ile 5
6 tile s p e r S u b - C h a n n e l
( 4 8 d a ta S u b - c a r r ie r s )
Page22
UL-PUSC
Example:
Page23
Page24
Band AMC
Band-AMC
Parameters
Values
1.25
2.5
10
20
128
N/A
512
1024
2048
19
N/A
79
159
319
109
N/A
433
865
1729
12
N/A
48
96
192
96
N/A
384
768
1536
Number of bands
N/A
12
24
48
N/A
N/A
8 data
tones
1 pilot
tone
N/A
16
32
Page25
AMC)
(PUSC,FUSC)
Sub-channelization gain,
Sub-channelization gain,
gain
robust transmission
Channel condition
Stationary channel
Fast-changing channel
MIMO/AAS
MIMO
Scheduling
Page26
Contents
1. Review of OFDMA frame structure
2. WiMAX Sub-Carrier Assignment Mode
3. WiMAX Typical Networking Mode
4. WiMAX Network Expansion Solution
Page27
NSK
Red lines in the figure indicates the
interference of a same direction and
frequency.
Page28
PUSC 1x3x1
All BTS use one frequency point. Three sectors of a BTS is a reuse cluster. The three sectors use
respectively 1/3 sub-channel in a frequency point. The same directional sectors of different BTSs
use the same sub-channel.
1
2
2
3
F1
1
1
2
F1
1
1
3
Uplink
Downlink
1: Segment 0: 0-9
2: Segment 1: 10-19
3: Segment 2: 20-29
Page29
F1
F2
F1
F1
F2
F2
F3
F3
F1
F2
F3
F3
F1
F1
F2
F2
F3
F3
The downlink adopts the FUSC or PUSC with all SC replacement, and the uplink adopts
the PUSC with all SC replacement.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.
Page30
FFR 1x3x1
All BTSs use one frequency point, which, on one hand, ensures the coverage and use
partial sub-carriers on the cell edge; on the other hand, increases the spectrum usage
and use all sub-carriers near the BTS.
2 1
3
PUSC with all SC
PUSC
The UL and DL scheduling assignments are implemented through the
measurement and judgment of users on self C/I and RSSI.
The system frequency reuse is close to 1.
Page31
FFR 1x3x1
Advantages:
The spectrum efficiency is high, and the sector capacity is large.
Sub-channel scheduling is flexible. Use excellent sub-channel scheduling
mechanism to use frequency resources to the maximum extent.
Disadvantages:
The complex sub-carrier replacement mode and sub-channel scheduling algorithm are hard to
be implemented.
The system interference level is related to the quality of sub-channel scheduling mechanism.
Co-channel interference exist on adjacent sectors in a BTS. The load is in positive correlation with
the channel conflict probability and the co-channel interference.
1.1.IfIfthe
theproduct
producthas
hasexcellent
excellentsub-carrier
sub-carrierreplacement
replacementmode
modeand
andsub-channel
sub-channelscheduling
scheduling
mechanism,
the
networking
solution
is
one
of
the
preferred
networking
modes
of
mechanism, the networking solution is one of the preferred networking modes ofWiMAX
WiMAX16e.
16e.
2.2.The
typical
application
can
be
used
for
initial
network
construction
of
dense
urban
areas
The typical application can be used for initial network construction of dense urban areasand
and
areas
of
middle
or
high
traffic.
areas of middle or high traffic.
3.3.The
Thenetworking
networkingmode
modecan
canbe
beused
usedas
asthe
theexpansion
expansionsolution
solutionofofsingle
singlefrequency
frequencypoint
point1x3
1x3
reuse
mode.
reuse mode.
Applicable scope
Page32
Comparison between
PUSC1/3,PUSC with All and FFR
C over age: PU S C All vs F F R vs PU S C 1/ 3
10000
9000
8000
Throughput(kbps)
7000
6000
5000
4000
3000
2000
1000
0
600
700
800
900
1000
1100
1200
1300
1400
1500
Distance to Site(m)
1600
1700
FFR Coverage
Page33
1800
1900
2000
2100
Example 1
Assume the customer has two 10M frequency resources, as follows:
10MHz
10MHz
2500
2510
2580
2590
According to the product performance, you can consider the following frequency
planning solutions:
1. PUSC 1*3*1 5MHz, can be expanded to S444 theoretically, total = 20MHz.
2. PUSC 1*3*1 10MHz, can be expanded to S222, total = 20MHz
3. PUSC with All 1*3*3 5MHz, can be expanded to S111,total 15MHz and reserve
5MHz frequency resources.
The frequency planning solution is so flexible that the operator can select the
solution based on network development and maximum frequency efficiency.
Page34
Example 2
Assume the customer has independent 10M and 5M frequency
resources, as follows:
5MHz
10MHz
2500
2510
2580
2585
Page35
Summary
1.
PUSC 1*3*1, applied to initial network construction, can be expanded to FFR 1*3*1.
2.
FUSC 1*3*3(PUSC with All), applied to large-capacity network construction, with enough
frequency resources.
3.
FFR 1*3*1, the system frequency reuse is close to 1, is the preferred networking mode in
later network construction.
Page36
Contents
1. Review of OFDMA frame structure
2. WiMAX Sub-Carrier Assignment Mode
3. WiMAX Typical Networking Mode
4. WiMAX Network Expansion Solution
Page37
Advantages:
Disadvantages
Additional spectrum resources are required, and the spectrum resources of new channel
bandwidth must be consecutive.
Relevant channel bandwidth must be supported by products.
The solution only fits for entire network expansion.
5MHz
10MHz
Page38
Adding Carrier
When there are additional spectrum resources, adopt the multi-carrier configuration mode to
increase the system capacity. Multi-carrier configuration refers to that configure multiple
different carriers in the sectors of a BTS.
Advantages:
Only require adding devices, which has little impact on the original network. Network replanning is not required.
The system capacity is increased with the carrier number. The expansion effect is obvious.
One sector supports the multi-carrier networking of different bandwidths.
Disadvantages:
Page39
Limitations:
Page40
Advantages:
Disadvantages:
This expansion mode gets capacity by adding sites. The expansion cost is high.
If the sites are densely distributed, the interference cannot be controlled, which
brings difficulties to network optimization.
Page41
Disadvantages:
Micro-cell/in-door coverage
This
Thisexpansion
expansionmode
modefits
fitsfor
forvarious
variousnetworking
networkingmodes.
modes.ItItreduces
reducesthe
theoriginal
originalnetwork
network
load
by
adding
indoor
coverage
in
hot-spot
or
buildings
with
high-traffic,
such
as
load by adding indoor coverage in hot-spot or buildings with high-traffic, such asbusiness
business
building,
hotels
and
gymnasiums
with
large
users.
building, hotels and gymnasiums with large users.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.
Page42
Summary
Page43
Thank you
www.huawei.com
WiMAX Capacity
Planning
www.huawei.com
Objectives
Page2
Contents
1. Capacity Analysis
2. Service Model
3. Capacity Planning
Page3
Contents
1. Capacity Analysis
2. Service Model
3. Capacity Planning
Page4
Overview
Characteristic
Page5
Single subscriber
throughput
Total throughput
Customer resources
Networking mode analysis
Capacity of
single site
Number of sites
Page6
Capacity Analysis
Page7
Calculation Example
Question:
Mandatory parameters:
DL-FUSC: Number of subchannels is 16. 1 Slot = 1
Subchannel x 1 Symbol
DL-PUSC: Number of subchannels is 30. 1 Slot = 1
Subchannel x 2 Symbols
UL-PUSC: Number of subchannels is 35. 1 Slot = 1
Subchannel x 3 Symbols
Assumptions:
Page8
Main Factor
BW /NFFT
1.25M /128
5M /512
10M /1024
20M /2048
Sub-
Ndc
Nsc
Ndc
Nsc
Ndc
Nsc
Ndc
Nsc
DL-FUSC
96
384
768
16
1536
32
DL-PUSC
72
360
15
720
30
1440
60
UL-PUSC
64
272
17
560
35
1120
70
carrier
Allocation
Page9
Main Factor
Power
DL Sub-frame
FCH UL
Preamble
FCH
MAP
RTG
Next Frame
Time
FCH
DL burst #4
DL burst #3
FCH
DL burst #3
DL burst #2
DL
MAP
DL burst #1
DL burst #4
DL
MAP
ACK
DL burst #2
DL burst #5
DL
MAP
DL burst #1
Ran
Feedback
(CQICH)
ging FastFast
Feedback
(CQICH)
DL burst #6
UL Sub-frame
DL
MAP
DL
UL
MAP
MAP
TT
G
Preamble
Last Frame
K
Symbol
Sub-frame ratio
Uplink and downlink adopt different sub-frame, it directly effect on
throughput of single-site.
Page10
Page11
Main Factor
Cell Radius
Simulation
CellAvgThroughput = Pi Throughputi
i =1
CINR
Distribution
Cell Average
Throughput
Page12
Main Factor
weak
QPSK 1/2
QPSK 3/4
CINR
16QAM 1/2
16QAM 3/4
Strong
Page13
Main Factor
Modulation
1/2
QPSK
1/22=1
3/4
QPSK
3/42=1.5
1/2
16QAM
1/24=2
3/4
16QAM
3/44=3
Page14
Main Factor
Weak
QPSK 3/4
16QAM 1/2
16QAM 1/2
CINR
64QAM 1/2
64QAM 2/3
64QAM 3/4
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.
Page15
Strong
Main Factor
Coding
Modulation
1/2
QPSK
1/22=1
3/4
QPSK
3/42=1.5
1/2
16QAM
1/24=2
3/4
16QAM
3/44=3
1/2
64QAM
1/26=3
2/3
64QAM
2/36=4
3/4
64QAM
3/46=4.5
Page16
Main Factor
Encoder
Modulation
STC
Encoder
Modulation
Encoder
Sub-carrier
mapping
Filter
DAC
RF
Sub-carrier
mapping
Filter
DAC
RF
Page17
Indirect Factor
Channel model
The channel model is selected according to the propagation
environment and the moving speed of terminal. Different channel
model make difference on CINR, it will effect on system capacity
Channel model
Static
PB3
Pedestrian user
TU3
TU30
VA60
Page18
Indirect Factor
Service Type
interactive network game, streaming media
VoIP, video meeting, file transmission
instant message, video meeting, file transmission
service with low throughput
Page19
Indirect Factor
User distribution
QPSK 1/2
QPSK 3/4
QAM16 1/2
QAM16 3/4
Page20
Indirect Factor
Co-channel interference
F1
F1
F1
F1
F1
F1
F2
F1
F2
F1
F1
F1
F3
F3
F2
F1
131
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.
F3
133
Page21
Indirect Factor
Diversity modeMatrix A
STC
Encoder
Sub-carrier
mapping
Filter
DAC
RF
Sub-carrier
mapping
Filter
DAC
RF
Modulation
Encoder
Page22
Indirect Factor
Coverage Radius (Km)
UL
DL
UL
DL
PUSC 131
0.515
0.904
2.801
13.168
FFR 131
0.515
0.791
3.764
17.696
FUSC 131
0.515
0.660
8.354
37.898
MIMO Matrix A
PUSC 131
1.0000
1.657
3.629
13.854
(UL:1T2R
FFR 131
1.0000
1.450
5.612
18.584
FUSC 131
1.0000
1.209
9.664
38.539
MIMO Matrix A
PUSC 131
1.0000
1.952
3.629
17.482
(UL:1T2R
FFR 131
1.0000
1.708
5.612
27.932
FUSC 131
1.0000
1.424
9.664
49.487
SISO
DL:2T1R)
DL:2T2R)
Page23
Summary
Page24
Contents
1. Capacity Analysis
2. Service Model
3. Capacity Planning
Page25
Contents
2. Service Model
2.1 Introduction
2.2 Principle
2.3 Service and traffic model parameters
Page26
Service Model
Type
Service Model
Interactive game
Streaming media
Page27
Contents
2. Service Model
2.1 Introduction
2.2 Principle
2.3 Service and traffic model parameters
Page28
Interactive Game
Page29
Page30
Streaming Media
Each frame of the video data arrives at the destination in specified time
interval (T). Each frame is divided into packet data with fixed amount.
Page31
Page32
Page33
Contents
2. Service Model
2.1 Introduction
2.2 Principle
2.3 Service and traffic model parameters
Page34
Page35
Traffic Model
UL Based on the Data Rate Traffic Model
Mean bit rate
Dense Urban
Urban
Sub-urban
Rural area
64 Kbps
45%
45%
50%
55%
128 Kbps
30%
35%
40%
40%
256 Kbps
20%
15%
10%
5%
512 Kbps
5%
5%
0%
0%
1024 Kbps
0%
0%
0%
0%
2048 Kbps
0%
0%
0%
0%
Average Rate
144
137.6
108.8
99.2
Page36
Traffic Model
DL Based on the Data Rate Traffic Model
Mean bit rate
Dense Urban
Urban
Sub-urban
Rural area
64 Kbps
5%
10%
25%
30%
128 Kbps
15%
25%
25%
30%
256 Kbps
25%
25%
20%
25%
512 Kbps
30%
25%
20%
10%
1024 Kbps
20%
15%
10%
5%
2048 Kbps
5%
0%
0%
0%
Average Rate
547.2
444.6
336
224
Page37
Traffic Model
Active duty ratio =actual data transmission time /On line duration
Traffic Parameters
Session Time (s)
500
30%
Page38
Reading time (s): the time between two neighbor packet call
Page39
Page40
Calculation Example
Contents
1. Capacity Analysis
2. Service Model
3. Capacity Planning
Page42
Page43
Cell radius
link budget.
Emulation result
C/I probability
distribution
Cell average
throughput
Page44
Single User
Throughput
Total User in a
Cell
Expected Cell
Throughput
Page45
Page46
Summary
Page47
Page48
WiMAX Coverage
Planning
www.huawei.com
Objectives
Know about the basic principle of Site, Antenna & Feeder Selection
Page2
Page3
Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Module
4. Other Principle
5. Site, Antenna and Feeder Selection
Page4
Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Module
4. Other Principle
5. Site, Antenna and Feeder Selection
Page5
Russia
Europe
3.5GHz
5GHz
USA
2.3/2.5/3.5GHz
5GHz
1.5/2.3GHz
2.5/5GHz
Asia Pacific
2.3/3.3/3.5GHz
5GHz
ME & A
C & SA
3.5GHz
5GHz
2.5/3.5GHz
5GHz
The 211 GHz band is considered for the WiMAX. And the main spectrum
in WiMAX is centralized in 2.5GHz, 3.5GHz, and 5.8GHz frequency band.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.
Page6
Multipath Propagation
Page7
Page8
Page9
Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Module
4. Other Principle
5. Site, Antenna and Feeder Selection
Page10
Link Budget
Link budget : Estimate the maximum path loss of cells
: Estimate the cell radius.
Engineering parameters
Receiver sensibility
RF parameters
Noise figure
Fading margin
Propagation model
Subcarrier permutation mode
MIMO enhancement technology
Page11
Interference
margin
MIMO gain
Path loss
Antenna gain
Cable loss
Tx power
Fast fading
margin
Shadow fading
margin
Gain
Clutter loss
Margin
Body loss
Loss
Page12
Antenna gain
Margin
Cable loss
Path loss
Loss
Clutter loss
MIMO gain
Body loss
Interference
margin
Fast fading
margin
Shadow fading
margin
Page13
Antenna gain
Classification of Parameter
System parameter
Environmental parameter
Page14
Equipment
DBS3900 WiMAX
PCMCIA/USB Dongle
23dBm
CPE
Page15
Cable loss
Type
5/4 inches
7/8 inches
1/2 inches
1.871
2.564
4.228
5.129
6.105
dB/100m
dB/100m
dB/100m
dB/100m
dB/100m
2.644
3.594
5.693
6.906
8.169
dB/100m
dB/100m
db/100m
dB/100m
dB/100m
4.683
6.396
10.099
12.035
14.348
dB/100m
dB/100m
db/100m
dB/100m
dB/100m
Page16
Suburban
Rural or Island
Antenna type
Directional antenna
Directional antenna
Omni antenna
65
65 or 90
360
18
18
11
Outdoor CPE
Terminal Antenna
Scenario
PCMCIA
Indoor CPE
Antenna type
Omni antenna
Page17
Receiver sensitivity
BW 103 f S
TotalSC
103
NUSED
Rss = CINR + NF 10 lg R + BackgroundNoise + 10 lg
N FFT
N TOTAL
R: Repeat Times
BW: Bandwidth
Page18
Noise figure
Terminal NF is 6.5dB.
Page19
System Parameter
System parameter
Remarks
Frequency
Duplex Mode
Channel Bandwidth
Subcarrier
Allocation
Modulation
Coding Scheme
FUSC nsk
FFR nsk
Page20
System Parameter
Channel bandwidth
Subcarrier configuration
Page21
System Parameter
DL FUSC
1.25
10
20
1.25
10
20
128
512
1024
2048
128
512
1024
2048
carriers
43
91
183
367
22
86
173
345
Number of sub-channels
15
30
60
16
32
72
360
720
1440
96
384
768
1536
12
60
120
240
10
42
82
166
Page22
System Parameter
QPSK
QPSK
QAM16
QAM16
1/2
3/4
1/2
3/4
2.90
6.30
8.60
12.70
QAM64
QAM64
QAM64
QAM64
1/2
2/3
3/4
5/6
13.80
16.90
18.00
19.90
Page23
System Parameter
PUSC/
Antenna
Coding
BS Ant
SS
Ant
FUSC
Configuration
Type
Num
Num
Modulation
PB3
VA30
VA60
PUSC
Diversity
CTC
QPSK 1/2
3.7
3.9
PUSC
Diversity
CTC
QPSK 3/4
7.1
7.4
PUSC
Diversity
CTC
QAM16 1/2
8.6
8.8
8.9
PUSC
Diversity
CTC
QAM16 3/4
12.8
13.3
13.1
PUSC
Diversity
CTC
QAM64 1/2
11.8
11.85
11.3
PUSC
Diversity
CTC
QAM64 2/3
16.5
18.5
16
PUSC
Diversity
CTC
QAM64 3/4
17.5
20
17
PUSC
Diversity
CTC
QAM64 5/6
20.5
21.5
20
Page24
System Parameter
Repeated coding
process of coding the same information twice, reduce the coding rate.
helps reduce the BER, obtain the repeated coding gain, and lower the
demodulation threshold.
network coverage can be increased.
3.01
6.02
7.78
Page25
System Parameter
Downlink CCH
Uplink CCH
Page26
Environmental Parameter
Body loss
WiMAX protocol supports the fixed terminal and mobile terminal.
Cluster loss
Land objects have a great influence on signal transmission.
penetration loss
Dense urban
Urban
Suburban
Rural
20 dB
15 dB
10 dB
8 dB
Page27
Environmental Parameter
Page28
Interference margin
UL
PUSC 1*3*1
PUSC 1*3*3
FFR 1*3*1
3.5
3.5
PUSC 1*3*1
PUSC 1*3*3
FFR 1*3*1
Page29
Page30
Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Model
4. Other Principle
5. SiteAntenna and Feeder Selection
Page31
Scene Class
Urban area
Suburban area
Rural area
Page32
Page33
Urban Area
Urban area:
The height of building: the average height of building is in 2025 meters,
most of building are about 710 layer, contain few high building above
than 20 layers.
Density of building: The building is not concentrated, the average space
between the building is well situated, and contain some park or greenbelt
etc.
Page34
Suburban Area
Suburban area:
The height of building: the average height of building is in 1020 meters.
Density of building: it is relatively sparse compare with above case, and it
has wide street, a large greenbelt or enough space.
Page35
Rural Area
Rural area:
The height of building: the average height of building is in 310 meters.
Density of building: The building distributes randomly and very sparse, exist
the big farmland or road.
Page36
Propagation Model
Page37
The European Cooperative for Scientific and Technical (COST) research extended the Hata
model as follows:
Page38
Cost231_Hata Model
Page39
Terrain Type Ait is used for sloping fields with many mountains,
plant distribute densely, and the path loss is the largest
Terrain Type BIt is used for the terrain between A and Cthe
path loss is placed in the middle
Terrain Type CIt is used for flat fields, plant distribute sparsely,
and the path loss is the lowest
Page40
PL = A + 10 log 10( d / d 0 ) + X f + X h + s
A = 20 log 10(4 * d 0 / )
A (dB):
= ( a bhb + c / hb )
X (dB):
f
correction factor of frequency
Page41
Scenario setting:
Page42
Page43
Page44
Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Module
4. Other Principle
5. Site, Antenna and Feeder Selection
Page45
BTS1
R
D
BTS1
Omni site
BTS2
D
BTS3
R
BTS2
Link Balance
Page47
Link Balance
2.
3.
4.
Finally we get:
Page48
Yes
No
Decrease transmitting
power of terminal
RFL = RRL
No
Page49
All
Scenario
DL
UL
Carrier Frequency
2.5 GHz
Sub-Carrier Allocation
Propagation Model
Cost231_Hata ( Huawei )
QPSK 1/2
QPSK 1/2
Channel Model
PB3
BS Antenna Configuration
MIMO Matrix A
MIMO Matrix A
Sector
3 sector
Number of BS Antenna
Channel Bandwidth
10 MHz
Number of SS Antenna
Nfft
1024
Tx
DL
UL
10.94
Maximum Tx Power
40 dBm
23 dBm
-174 dBm/ Hz
0.9
HUAWEI simulation
17
SS type
PCMCIA
EIRP (dBm)
55.64
26
95%
Rx
DL
DL
Antenna Gain(dBi)
17
7.25
6.5
5.6
15
0.9
1.5
30
Page50
Dense Urban
Urban
Suburban
Rural
25
30
35
45
1.5
1.5
1.5
1.5
95
95
95
90
18
15
12
Dense Urban
Urban
Suburban
Rural
0.37
0.63
1.25
5.17
Page51
Questions
Page52
Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Module
4. Other Principle
5. Site, Antenna and Feeder Selection
Page53
Site Selection
The site can not be far from ideal site longer than 1/4 radius
Page54
Site Selection
The site guarantee the key area having a well communication, such as
airport, railway station, government office, hotel shopping centre etc.
Page55
Site Selection
Suburban area
The down tilt can be set according to the actual case. If the site is not
very high, the down tilt can be 0
Rural area
According to the different terrain and user distribution, the omni BTS
or 3 sector BTS can be selected flexibly
Generally the down tilt is 0, if the site is higher, the down tilt is
recommended
Page56
Antenna Selection
Urban area
Suburban area
Page57
Antenna Selection
Rural area
Page58
Antenna Height
Page59
Main beam of antenna should be directed to the area having high traffic
density,
Page60
Mechanism
Electron
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.
Page61
Feeder Selection
Frequency Band
2.5 GHz
3.5 GHz
Recommended
20m
1/2"
45m
7/8"
> 45m
5/4"
20m
1/2"
35 m
7/8"
> 35 m
5/4"
Page62
Summary
Link Budget
Propagation Model
Page63
Page64
WiMAX RF Optimization
www.huawei.com
Objectives
Page3
Contents
1. WiMAX RNO Procedure
2. WiMAX RF Optimization Procedure
3. WiMAX Common RF Problem Solution
Page4
Contents
1. WiMAX RNO Procedure
2. WiMAX RF Optimization Procedure
3. WiMAX Common RF Problem Solution
Page5
RNO Procedure
New Site on Air
RF Optimization
Service Test
Parameter Optimization
DT
Traffic Statistic
Cluster Ready
Y
N
Page6
The single site verification is the first step of the optimization, involving the verification
of functions of each new site. The purpose is to ensure that the site installation and
parameter configuration are proper.
RF optimization
The RF (or cluster) optimization starts after the site installation and verification are
completed in the planned area. As one of the major optimization step, the RF
optimization aims at optimizing the coverage and controlling the same-frequency
interference. The specific work involves the optimization and adjustment of the
antenna and the list of NBSs. Before RF optimization, search all cells within the area to
exclude hardware faults.
Page7
Drive test must be performed to evaluate the network performance and to further
determine whether to carry out the parameter optimization. Perform the drive test in
the area with good RF coverage performance to eliminate the signal coverage effect.
The test area may not cover all cells, but the test route should involve all terrains and
geographical conditions within the area.
Page8
Page9
Contents
1. WiMAX RNO Procedure
2. WiMAX RF Optimization Procedure
3. WiMAX Common RF Problem Solution
Page10
Page11
RF Optimization Objectives
Acceptance Contents
Number of Frequencies
Reference Value
Remarks
Three frequencies
Suburban area 70%
CINR 10 dB
Five frequencies
Suburban area 80%
Acceptance Contents
Reference Value
Remarks
80%
70%
Page12
Divide Clusters
Impact of the work load of the drive test: When dividing clusters, consider that the drive
test in each cluster is complete in one day with about four hours for each drive test.
Page13
Page14
Before the drive test, determine the drive test route. If there is specified route, the drive
test route must include the specified route.
The drive test route should cover main streets, important places, and VIP area.
The test route should cover all cells, involve at least two tests (preliminary test and final
test). Perform tests for all streets in RF planned area if we have time.
To observe the performance change, each drive test should follow the same route
Page15
DT Route Example
Page16
Preparing Software
Preparing Hardware
Preparing Documents
Page17
Software
Description
Remarks
Genex Probe
Mandatory
XCAL-X
Optional
Genex Assistant
XCAP-X
Analyze DT data
Optional
M2000
Analyze performance
Mandatory
MapInfo/Google Earth
Mandatory
neighboring cells
Mandatory
the route
Page18
Device
Description
Remarks
Scanner
Mandatory
Laptop
PM1.7G/1G/20G/USB/COM/PRN
Mandatory
GPS
GPS
Mandatory
Inverter
Mandatory
Software license
Mandatory
Dongle
Optional
Spectrum analyzer
Mandatory
10
Camera
Take photos
Mandatory
Optional
interference
Page19
Optional
Required Materials
Description
Remarks
Map
Mandatory
KPI requirements
RF optimization target
Mandatory
Every site
Mandatory
Every site
Mandatory
Mandatory
Page20
Mandatory
Mandatory
Test for network access status through MSs without loading. This test focuses
on the network access successful rate and the coverage area.
Test FTP download or upload by MSs: This test focuses on the access success
rate, and the average download and upload rate of the FTP server.
Test http webpage open during network access by MSs: This test focuses on
the setup successful rate and the setup delay of the http protocol.
Test ping operation during network access through MSs: This test focuses on
the delay and packet loss rate of the ping operation.
Page21
Test for network access through MS: Perform 100 access tests ;
Test for FTP upload and download through MS: Perform 10 tests ;
When performing an indoor test, add test points manually mark on the map to
display the moving route because GPS signals cannot be use during the indoor test.
Page22
Page23
The adjustment in the RF optimization mainly involves the adjustment of NBS list and
engineering parameters. Most coverage and interference problems can be solved through
the adjustment of the following engineering parameters (ranked in descending order by
priority):
Antenna tilt
Antenna height
Antenna type
Changing the site type (such as the Pico site supporting small power amplifier
changing into the site supporting large power amplifier)
Site location
Page24
Contents
1. WiMAX RNO Procedure
2. WiMAX RF Optimization Procedure
3. WiMAX Common RF Problem Solution
Page25
Page26
Weak coverage: In the coverage area, the RSSI of signals is < -85 dBm and the CINR is < 10
dB.
After determining the weak coverage area, carry out the further analysis:
Check whether the handover of terminals is normal and whether cell coverage signal is
normal.
Check whether the settings of the cell configuration parameters of the area is correct
and also whether the hardware transmitting power is normal.
Check whether an alarm is generated and whether hardware is faulty in the cell.
The common scenarios of weak coverage include concave, hillside, elevator shaft,
tunnel, underground garage or basement, and internal area of a high building.
Page27
Optimize the coverage by increasing the transmit power, adjusting antenna azimuth,
down tilt , or height, or using the antenna with a higher gain.
Adjust the antenna at terminal side, move the terminal closer to the window, or use the
terminal with directional and high gain antenna.
Replace the indoor type terminal with the outdoor type one, and adjust the antenna to
ensure the quality of received signals.
Install the RRU on the tower so that the loss generated by feeders is less.
Build new base stations in the case the poor coverage is caused by discontinuous
coverage. (optional)
Build new base stations in the areas the poor coverage is caused by the valley and
mountains. (optional)
Page28
Coverage Analysis
Weak
coverage
area
Page29
In the optimal status, signals of each cell are strictly controlled in the designed range.
However, it is difficult to control signals due to the complicated radio environment and
the optimal status cannot be reached. Hence, the cross coverage occurs. According to the
features of the WiMAX, the frequency resources are limited, with high spectrum
multiplexing. The Co-channel interference occurs.
Base stations are in dense urban environments and the terrain and landform of the site
area is complicated.
The site of the base station or the height of an antenna is too high.
The antenna azimuths are irregular (signal coverage, traffic distribution, restriction on
installation locations which is out of control)
Page30
Page31
If the RSSI is in the normal range and the CINR is relatively low, it indicates that the
inter-BS Co-channel interference may occur.
The Scanner can scan the downlink signals of more than 10 Co-channel sectors and save
relevant data for analysis.
Page32
Adjust antenna
Adjust the antenna azimuth and downtilt to change the sector signal strength in the inter-BS Cochannel interference area , to adjust the distribution of sector signals in the area. Adjustment
principle: enhance the main coverage signals and reduce the Co-channel sector signals of other BSs
so that the RSSI of Co-channel sectors in the area is smaller.
Page33
Definition:
The downlink coverage is excellent and the uplink coverage is limited, or the uplink
coverage is excellent and the downlink coverage is limited in the target coverage area with
the consideration of the equipment capability difference between devices (for example,
power and demodulation sensitivity). WiMAX is the uplink limited system.
Impact:
The signals of BSs can be demodulated but the fails to access to network.
The packet error rate increases and services are jittered frequently.
The traffic statistic counters are affected and the user experiences decrease.
Page34
Different maximum transmit power for the site and the terminal
Interference: the interference causes the unbalance between uplink and downlink.
Hardware fault: hardware faults of equipment and the improper installation of antenna
feeder cause the unbalance between uplink and downlink.
Page35
Page36
Handover Problems
Handover failure: Huawei current products support only the hard handover. Handover
includes two steps: disconnection of the serving BS and access to the target BS. The failure
usually occurs in the step of accessing to the target BS.
Handover delay: The handover does not occur in a long period when a mobile phone
should handed over. In this period, we can observe that the receive level of the serving
cell is consecutively low, or the receive quality is consecutively poor.
Page37
Handover failure events are analyzed with the combination to traffic statistic, call logs, and
drive test data:
1.
Reasonableness of handover: Check whether the settings of neighbor cells are reasonable.
Check whether the proper neighbor cell relation is configured.
2. Check whether the handover threshold is normal. When the CINR is smaller than the
scanned threshold, terminals start to originate the scan. When the CINR reaches the
handover threshold, the terminal originates the handover.
3. Network coverage performance: Check whether the cross-cell interference exists through
the RSSI and CINR in the serving cell and target cell in the case of the handover
occurrence.
If the scanning threshold is too low, terminals fail to connect to the networks.
If the scanning threshold is too high, terminals scan signals frequently and air interface
resources are waste.
If the handover threshold is too high, the handover seldom occurs.
If the handover threshold is too low, the ping-pang handover may occur.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.
Page38
Questions
Page39
Summary
RF Optimization Analyses
RF Optimization Solution
Page40
Thank you
www.huawei.com