You are on page 1of 1060

Internal

WiMAX Overview

www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Upon completion of this course, you will be


able to:
Know the development of WiMAX
Know the standard and the architecture of
WiMAX system
Know the differences between WiMAX
and other system

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 2

Chapter 1 WiMAX in Progress


Chapter 2 Standardization and Network Architecture
Chapter 3 Comparison between Different Systems

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 3

Development of Mobile Communication


1G/ 2G

Fixed Phone

3G
IMT-2000

Mobile TV
Mobility

No mobility

Broader
Bandwidth

Mobility with Narrow Band

Mobility with Broader Band

Mobility with broader bandwidth!


HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 4

Development of Broadband Access

Broadband Wired
Services (Cable/DSL)

Broadband Wireless
Data (WiFi)

Rich Internet Contents Mobility


Broadband
Terminal ready in advance
QoS & Security
Business Strategy

Broader bandwidth with higher mobility!


HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 5

Mobile
WiMAX(16e)

What is WiMAX?

HUAWEI TECHNOLOGIES CO., LTD.

Worldwide
Interoperability for
Microwave
Access

All rights reserved

Page 6

Demand for Innovation

One terminal, always-on,


everywhere

One bill and flat fee

Diversified services, secure


transaction

Converged service

IP Multi-media Service Support

BTS

Converged core network based on IP

Control & bearer separated

micro-BTS
gateway

Scalable access network

IP Core

Mobility
IP based
Smart/MIMO
BTS

Broadband
Security
QoS capability
HUAWEI TECHNOLOGIES CO., LTD.

pico-BTS

Mobile WiMAX is the answer !


All rights reserved

Page 7

WiMAX Usage Scenarios


There are five usage scenarios for WiMAX technology based on IEEE16e.

Mobile
Broadband

Wi-Fi

Consumer
Broadband

Fixed

Nomadic

HUAWEI TECHNOLOGIES CO., LTD.

Portable

Simple Mobility

All rights reserved

Full Mobility

Page 8

Portable
Broadband

WiMAX Industry Progress


Standardization progress

More than 420 members in WiMAX forum

IEEE 802.16e for air interface was issued in Dec 2005

E2E network architecture was released in Q1 2007


Release 1.0

Release 1.5

Simple mobility

Full mobility

Authentication

Mobile VoIP

Paging support

IMS

fixed VoIP

IPv6

Release 2.0

TBD

Chipset progress

Q1 2007

Start from Q1 2007

TBD

HUAWEI TECHNOLOGIES CO., LTD.

Runcom & Beceem has already released


16e chipset
Intel will release the first version of 16e
compatible chipset in Q2 of 2007
The time-to-market difference between
startup and big silicon manufactures is 612 months

All rights reserved

Page 9

WiMAX Global Spectrum Distribution

Source from RWG of WiMAX Forum

2.5GHz and 3.5GHz are the most possible frequency which could be used by WiMAX

in the world.
2.3GHz can be taken as the backup frequency for WiMAX

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 10

Chapter 1 WiMAX in Progress


Chapter 2 Standardization and Network Architecture
Chapter 3 Comparison Between Different Systems

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 11

What is WiMAX Forum and NWG

The WiMAX Forum is an industry-led, not-for-profit corporation


formed to promote and certify the compatibility and interoperability of
Broadband Wireless Access (BWA) products using the IEEE 802.16.
As a result, service providers worldwide will be able to deliver
economical broadband data, voice and video services to both
residential and business customers.

Standardizatio
n

Realization

IEEE 802.16
Standard

HUAWEI TECHNOLOGIES CO., LTD.

WiMAX Forum

All rights reserved

Page 12

WiMAX Forum Structure

Huawei is one of the most active members in NWG, and has most number of

proposals accepted by NWG

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 13

WiMAX Positioning in IEEE802 Standards


3GPP/ 3GPP2 defined 1xEV-

DOHSDPA/HSUPA
IEEE 802 group defined WLAN

and WiMAX
IEEE 802.16 is the milestone

in mobile broadband area

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 14

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 15

WiMAX 16e Network Structure


Many-to-Many
NAP-NSP
relationship
accommodated

CSN

ASN
Base Station

PSTN

ASN-GW

Network Service
Provider (NSP)

Network Access
Provider (NAP)

Internet

Applications
Service
Provider

Two-Layer architecture, low latency


Flexible network operator relationships

ASN: Access Service Network, including BS and ASN-GW


CSN: Connectivity Service Network, including router, AAA, Interworking Gateway etc.
HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 16

WiMAX Element Location in Network


Service

MultiMedia

Internet

IP

CSN

Voip

IP

PDF

IP

IP

AAA
Go

VPN

HA

IP Tunnel

Radius

ASN-GW

ASN

IP Interface

BS
IEEE802.16e

MS

MS
: OPTIONAL

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 17

WiMAX Network Reference Model


802.16
e air

R2
R2
Home
NSP

Visit
NSP

NAP1

R1

ASN1

MSS

R4

CSN

CSN
R5

ASN2

R4
NAP2

ASN

HUAWEI TECHNOLOGIES CO., LTD.

ASP or

ASP or

Internet

All rights reserved

Internet

Page 18

WiMAX Entity and Interface


RP

Description

ASN

ASN defines a logical boundary and represents a convenient way to


describe aggregation of functional entities and corresponding message
flows associated with the access services.

CSN

CSN is defined as a set of network functions that provide IP connectivity


services to the WiMAX subscriber. A CSN may comprise network elements
such as routers, AAA proxy/servers, user databases and Interworking
gateway devices.

R1

R1 interface between the MS and the ASN as per the air interface
specification for (PHY and MAC)

R2

R2 is the interface between the MS and the CSN associated with


Authentication, Service Authorization, IP Host configuration management,
and mobility management. R2 is a logical interface and does not reflect a
direct protocol interface between the MS and CSN.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 19

WiMAX Entity and Interface


R3

R3 is the interface between the ASN and CSN to support AAA, policy
enforcement and mobility management capabilities. In addition, R3
encompasses the bearer plane methods (e.g., tunneling) to transfer IP data
between the ASN and the CSN.

R4

R4 consists of a set of control and bearer plane protocols originating and


terminating in various entities within the ASN that coordinate MS mobility
between ASNs.

R5

R5 consist of a set of control plane and bearer plane protocols for


interworking between CSNs

R7

R7 is an optional set of control plane protocols for AAA and Policy


coordination in the ASN gateway.

R6

R6 provides the communication between the BS and the ASN GW which


provides a set of control and bearer plane protocols.

R8

R8 is a set of control plane message flows and in some causes, bearer plane
data flows between the BS to ensure fast seamless handover.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 20

WiMAX NWG-ASN Profile A


R2
ASN

CSN
R3

R6
R1
BS

Internet
ASN-GW

Air
Interface

R4
BS

ASN-GW

HO
DP Fn
Context
PA
RRA
Auth. Relay
Key Receiver

HO
DP Fn
Context
Authenticator
RRC
Key Distribute
PC

BS

HUAWEI TECHNOLOGIES CO., LTD.

AAA Client
DHCP Proxy
PMIP Client
LR
MIP FA

HA

AAA

Centralized ASN model


Semi-Flat Architecture
HO and RRC are at GW
Profile A with standard
R1,R2 ,R3,R4

ASN-GW

All rights reserved

Page 21

WiMAX NWG-ASN Profile B


R2
R2
ASN

CSN
R3

R1
BS+ASN-GW

Internet

R4
Air
Interface
BS+ASN-GW

HA

AAA

Combined BS+ASN-GW
HO
DP Fn
Context
PA
RRA+RRC
Key Receiver +
Distribute
HUAWEI TECHNOLOGIES CO., LTD.

AAA Client
DHCP Proxy
PMIP Client
LR
MIP FA
Authenticator
PC
All rights reserved

Distributed ASN solution;


Flat Architecture;
BS and ASN-GW function is
embedded in BS;
Profile B with standard R1, R2,
R3, R4;
Page 22

WiMAX NWG-ASN Profile C


R2
ASN

CSN
R3

R6
R1
BS

Air
Interface

Internet
R4

ASN-GW

BS
HA

ASN-GW

HO
DP Fn
Context
PA
RRA+RRC
Auth. Relay
Key Receiver
BS

HUAWEI TECHNOLOGIES CO., LTD.

HO
DP Fn
Context
Authenticator
LR
Key Distribute
PC

AAA Client
DHCP Proxy
PMIP Client
MIP FA

AAA

Centralized ASN model;


Semi-Flat Architecture;
HO and RRC are at BS;
Profile C with standard
R1,R2 ,R3,R4,R6;

ASN-GW

All rights reserved

Page 23

ASN Decomposition

ASN

ASN
R6

BS

R1

R1
ASNGW

R8

R1

R3

R6

R8

BS
R1

ASNGW

BS

R3
R4

ASNGW

BS
R6

R4

Containing a single ASN-GW

HUAWEI TECHNOLOGIES CO., LTD.

Containing multiple ASN-GW

All rights reserved

Page 24

R3

ASN-GW Decomposition

ASN GW Decision Point


R3
R7

ASN GW Enforcement Point

R4

Consisting two groups of functions, Decision Point (DP) and

Enforcement Point (EP).


EP includes bearer-plane functions and DP includes non-

bearer-plane functions.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 25

HUAWEI WiMAX Standalone Solution


PSTN

IMS/NGN

Seamlessly integrated with


IMS

iManager
M2000

E2E QoS and security


guarantee

Internet
Policy Decision
Home Agent
Function

AAA

Flexible accounting

Advanced all IP base station

platform, series of base


station

WASN9770

WASN9770

Wide range of terminals


support

RRU3701C
BTS3706

BBU3703

RRU3701C
BBU3703

BTS3706

BBU3706C
RRU3701C
BTS3706
WASN9770
Fixed Access

PCMCIA

HUAWEI TECHNOLOGIES CO., LTD.

:
:
:
:

Handset

All rights reserved

Page 26

WiMAX Baseband Unit


WiMAX Remote Radio Unit
WiMAX Macro Base Station
Wireless Access Service Node

WiMAX Integrated into Existing 2G/3G Network Solution

PSTN

IMS
iManager
M2000

2G/3G BTS site resources sharing

Same base station platform for


WiMAX/LTE/AIE

Policy Decision
DHCP Server
Function Home Agent

Internet
AAA

Integrated IP gateway for ASNGW/GGSN/PDSN

HLR

WASN9770

PDSN

GGSN

Unified HUAWEI NMS system

SGSN

Common user experience, based


on unified AAA

RRU3701C
BBU3706C
BSC

WiMAX

BTS3706

Co-site BTS

2G/3G

Fixed Access

PCMCIA

Dual Mode Terminal

HUAWEI TECHNOLOGIES CO., LTD.

BTS
BTS

BBU3706C
RRU3701C
BTS3706
WASN9770

:
:
:
:

2G/3G Terminal

All rights reserved

Page 27

WiMAX Baseband Unit


WiMAX Remote Radio Unit
WiMAX Macro Base Station
Wireless Access Service Node

Comparison Between Different Systems

Section 2 Comparison with Wi-Fi

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 28

Compare Wi-Fi with WiMAX


Mobile WiMAX

Wi-Fi
Mobility: limited mobility

Mobility: fully mobility

Coverage: 10m-300m

Coverage: 5km

Bandwidth: 20MHz, 22MHz

Bandwidth: 1.25MHz-20MHZ

QoS: poor QoS guarantees

QoS: higher QoS guarantees

not support video and voice

supports video and voice

services

services

Security: weak security guarantee

Security: powerful security

guarantee

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 29

Thank You
www.huawei.com

Revision Record
Course Code

Product

OXP100001

WiMAX

Dont Print This Page


Product
Version

Course Version ISSUE

All

2.00

Developer/Modifier

Date

Approver

New/Update

Hujian

Feb. 16, 2009

Hong Xinpei

Update

Alex Lei Keen Lik

2010.8.30

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Update

Page0

WiMAX Principle
and Key Technology

www.huawei.com

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Objectives


Upon completion of this course, you will be able to:




Describe the evolution of the wireless development

Describe the principle of OFDM/OFDMA

Describe the key techniques of WiMAX

State the air interface of WiMAX

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Contents
1. WiMAX Overview
2. OFDM/OFDMA Basic Principle
3. Key Technologies of WiMAX
4. Air Interface

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Comparison Among Different Wireless


Systems
1992-2000
2000-2004
2004-2008
TDMA

GSM

PDC

cdmaOne

EGPRS
384kbps

TD-SCDMA
(China)

GPRS
~150kbps
WCDMA
2Mbps

cdma20001x
144bps

HSDPA
14Mbps(2006)

EVDO Rel.0
2.4Mbps

HSUPA
(2008)

LTE

EVDO Rev.A
3.1Mbps(2006)

Mobile WiMAX will be available before LTE


WiMAX
802.16-2004
OFDM

Mobile WiMAX
802.16-2005
SISO/OFDMA

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

SIMO/MIMO

Page4

AAS

What Can WiMAX Do?


Mobility

Vehicle

High Speed

Cellular Network (GSM, UMTS, HSPDA, )

Suburban-incar

BWA (WiMAX 802.16d, 802.16e, )

Urban-incar

Walk

On foot
Nomadic

Fixed Network (xDSL, )

Fixed

Urban fixed
Personal

0,01

0,1

10

100

Bandwidth
(Mb/s)

Mobile WiMAX can satisfy both Mobility and Broadband Access!


Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page5

WiMAX Network Reference Model


Visited NSP

Home NSP

R2
R2

SS/
MS

R3

R1
ASN

R5

CSN

CSN

ASP Network
or
Internet

ASP Network
or
Internet

R4

Another ASN

Legend of Lines
Bearer plane
control plane

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Contents
1. WiMAX Overview
2. OFDM/OFDMA Basic Principle
3. Key Technologies of WiMAX
4. Air Interface

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page7

Contents
2. OFDM/OFDMA Basic Principle


2.1 OFDM Principle

2.2 OFDMA Principle

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Evolution of FDMA System


Single Carrier

frequency


OFDM
Orthogonal Frequency
Division Multiplexing

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Concept of an OFDM signal


Ch.1

Ch.2

Ch.3

Ch.4

Ch.5

Ch.6

Ch.7

Ch.8

Ch.9

Conventional multicarrier techniques FDMA

Ch.10

frequency

Ch.2 Ch.4 Ch.6


Ch.8 Ch.10
Ch.1 Ch.3 Ch.5
Ch.7 Ch.9
Saving of bandwidth

50% bandwidth saving


Orthogonal multicarrier techniques - OFDM

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

frequency

Generating the OFDM Signal

xn

serial-toparallel

x0,k
x1,k

xN,k

IFFT

s0,k
s1,k

parallelto-serial

sn

sN,k
Base-band
signal

N data symbols:
(in frequencydomain)

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

(time-domain)

Page11

Concept of Parallel Transmission


Channel impulse
response

Time

Frequency

1 Channel (serial)
Frequency

2 Channels

Single Carrier

Frequency

8 Channels
Frequency

Multicarrier

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Overcome Frequency Selective


Fading
P(f)

P(f)
Fading

Narrowband
Narrowband
System
System
Transmit Signal

Received Signal

P(f)

P(f)

Fading

Broadband
Broadband
System
System

f
Transmit Signal

Received Signal

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page13

Multi-path Environment
Transmitted
signal
time

Received
signal
time

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page14

Overcome the Multi-path Interference

Multi-path interference can be resisted through the cyclic prefix.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page15

Circular Convolution

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page16

OFDM Characteristics
Advantage:


High spectral efficiency

Overcome frequency selective fading

Overcome the multi-path interference

Simple channel estimation

Easy to combine with other technologies

Disadvantage:


High requirements of time synchronization

High sensitivity to frequency delay

High PAPR (Peak to Average Power Ratio)

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page17

Importance of Time Synchronization

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Importance of Frequency
Synchronization

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page19

Contents
2. OFDM/OFDMA Basic Principle


2.1 OFDM Principle

2.2 OFDMA Principle

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page20

Whats OFDMA?


OFDMA: Orthogonal

Frequency Division Multiple


Access


OFDMA

Output Power

OFDM

Frequency

All carriers are divided into

several groups (sub-channels)




Coding, modulation and

amplitude are set separately for


each sub-channel based on
channel conditions


Different sub-channels can

be allocated to different users at


a same time
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page21

OFDMA Channelization

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.Page22


Page22

Multiple Permutation Zone Switching


Zone transition is indicated in the DL-Map by the
STC_DL_Zone
The maximum number of downlink zones is 8 in one
downlink subframe

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.Page23


Page23

Contents
1. WiMAX Overview
2. OFDM/OFDMA Basic Principle
3. Key Technologies of WiMAX
4. Air Interface

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page24

Contents
3. Key Technologies in WiMAX system
3.1 Communication Model
3.2 Channel Coding
3.3 AMC
3.4 HARQ
3.5 Multiple Antennas

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page25

Common Communication Model


Transmitter
Service
Signal

Source
Coding

Channel
Coding

bit

Service
Signal

Source
Decoding

Interleaving

symbol

Channel
Decoding

Uninterleaving

Modulation

modulated
signal

Demodulation

Receiver

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Transmission

Radio
Channel

Reception

Contents
3. Key Technologies in WiMAX system


3.1 Communication Model

3.2 Channel Coding / Interleaving

3.3 AMC

3.4 HARQ

3.5 Multiple Antennas

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page27

Channel Coding


Encoding efficiency= (total input bits total output symbols)

Coding Types in 802.16e:




CC (Convolution Coding):1/2,2/3,3/4,5/6

CTC (Convolution Turbo coding):1/2,2/3,3/4,5/6

LDPC (Low-Density Parity Check)


00110001

Bit

Symbol

MUX

00001011

0000110100101011

00100111

Example of convolution encoder


Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page28

Interleaving
1

1 1 1 0

Without channel coding, receiver cant correct any errors

1 11 0 0 0 1 11 11 1
1
Source
1 0 1 1

111 000 111 111

11 1 0 10 1 10 11 1
1

101 1

1 1 1 0 1 1 0 0 1 11 1
1

1101

After convolution, receiver can correct errors.


But recovery capability is restricted by encoding complexity.

1
0
1
1
1 11 0 0 0 1 11 11 1
111
111
00 0
111
1011 1011 1 011

1011 0100 1 011


1
1
0
1

01
01
1 0
01

101 010 101 101

1 0 1 1

Through the interleaving, the consecutive error codes can be corrected


Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page29

Questions


Does the coding mode with higher coding efficiency must be


better than a lower one?

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page30

Contents
3. Key Technologies in WiMAX system


3.1 Communication Model

3.2 Channel Coding

3.3 AMC

3.4 HARQ

3.5 Multiple Antennas

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page31

AMC


AMC


Adaptive Modulation
and Coding

Purpose:


To select the suitable


modulation and coding
modes according to
different channel
qualities

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page32

Modulation Modes in 802.16e




Constellation of QPSK, 16QAM, 64QAM

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page33

Modulation and Coding Mode in WiMAX


Supported Modulations and Codings
DL
Modulation Types

QPSK16QAM
64QAM

UL
QPSK16QAM
64QAM(optional)

CC (Convolutional
Code)

1/2, 2/3, 3/4, 5/6

1/2, 2/3, 3/4,


5/6(optional)

CTC (Convolutional
Turbo Code)

1/2, 2/3, 3/4, 5/6

1/2, 2/3, 3/4,


5/6(optional)

x2, x4, x6

x2, x4, x6

Repetition

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page34

Questions


Please calculate the effective information bits per symbol under


different modulation and coding modes.
For example:
QPSK1/2, the effective information bits per symbol=2*1/2=1bit
How is about the 16QAM3/4 ? 64QAM1/2?

If the AMC decision is wrong, what will happen?

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page35

Contents
3. Key Technologies in WiMAX system


3.1 Communication Model

3.2 Channel Coding

3.3 AMC

3.4 HARQ

3.5 Multiple Antennas

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page36

FEC and ARQ


Forward Error Correction (FEC)


FEC transmits some redundant data along with the original data
that can be used to correct error

Automatic Repeat Request (ARQ)




ARQ detect error at the data link layer and request


retransmission of the erroneous frames
Types of ARQ:


Stop and Wait ARQ

Go Back-N ARQ

Selective Repeat ARQ

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page37

Stop And Wait ARQ Protocol

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page38

Go Back-n ARQ Protocol

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page39

Selective Repeat ARQ Protocol

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page40

What is HARQ


HARQ (Hybrid Automatic Repeat reQuest)




A combination of ARQ and FEC


HARQ Principle

BTS

Packet1?

MS


Packet1

Packet1

Pcket2

Packet1

Types of HARQ:


Type I

Type II(IR)

Type III

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page41

HARQ Type I


Type I: Chase Combining ( CC ) Scheme

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page42

HARQ Type II and III




Type II and Type III: Incremental Redundancy ( IR ) Scheme

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page43

HARQ Type II and III


Receiver

Sender

NAK

ACK

Decoding and error detection


No error

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page44

Characteristics of HARQ


Improve the system transmission reliability and throughout

Reduce the average re-transmission and data transmission delay

Lessen the sensitivity of instantaneous channel quality change

Combination with AMC, decrease the wrong decision which is


made due to the feedback delay or the wrong feedback decoding

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page45

Contents
3. Key Technologies in WiMAX system


3.1 Communication Model

3.2 Channel Coding

3.3 AMC

3.4 HARQ

3.5 Multiple Antennas

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page46

MIMO Technology
Multiple Input,
Multiple Output

Exploit multiple antennas at both transmitter and receiver side to


transmit and receive multiple parallel data streams


Dramatic reduction of fading due to Diversity

Significant increase the system capacity by Spatial Multiplexing

Increase coverage

Improve resistance to interference

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.Page47


Page47

Working Mode of MIMO


STTD: Diversity Mode (Matrix A)

SM :Spatial Multiplexing Mode (Matrix B)

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page48

Improvement to performance


Increase the SNR and the sensitivity of BS

Decrease the error bit

Decrease the system interference

Enhance the coverage by using MIMO system

Improve the spectrum efficiency by adopting the OFDMA technology

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page49

Contents
1. WiMAX Overview
2. OFDM/OFDMA Basic Principle
3. Key Technologies of WiMAX
4. Air Interface

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page50

Contents
4. Air Interface
4.1 Protocal Stack
4.2 Basic Terms
4.3 Physical Frame

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page51

Protocol Stack
R1

Convergence Sub Layer


IP data
/DHCP

IP

Ethernet

Packet
Classifier

ATM

IP

Header
Suppression

MAC Layer
Net Entry
GRE

802.16

802.16

MAC

MAC

PHY Burst
Scheduling

PDU
Operation
Security/Privacy
Key, AES, EAP

Connection
Management

Bandwidth
Management

Handoff

Power
management

IP

PHY Layer
802.16

802.16

PHY

PHY

MS

OFDMA
2-11GHz
2048FFT

802.16d
BS

OFDM
2-11GHz
256FFT

802.16e

OFDMA 2-11GHz
128, 256, 512,1024, 2048

WiMAX

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page52

Contents
4. Air Interface


4.1 Protocal Stack

4.2 Basic Terms

4.3 Physical Frame

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page53

Two Dimensional Signal


Subcarrier-N

Subcarrier-4

Subcarrier-3

Subcarrier-2

Subcarrier-1

Frequency

OFDM Slot/Frame
IFFT

SN

S1 S2 S3 S4 S5 S6 S7
IFFT

SN+1 SN+2SN+3SN+4

S2N

OFDM Symbol
(FTT duration)

IFFT
Guard Time

Time

Bandwidth

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page54

Time Domain Description

Tb: useful symbol time

Tg: CP Cyclic Prefixtime

G = Tg/Tb, this value could


be 1/32, 1/16,1/8, or

Ts =102.9 usG=1/8

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page55

Frequency Domain Description


Pilot Subcarrier

DC Subcarrier

Data Subcarrier
Guard Subcarrier

Types of Subcarriers

Primitive parameters
BW The nominal channel bandwidth
Nused Numbers of used subcarriers(include DC
n sampling factor, 28/25 if BW are multiple of any
1.25,1.5,2,2.75 MHz, 8/7 else


DC subcarrier
Guard subcarrier

Derived parameters
NFFT : 1285121024, 2048
Sampling frequency: Fs = floor(n*BW/8000)*8000
Subcarrier spacing: f= Fs/ NFFT
Useful symbol time: Tb=1/ f


Pilot subcarrier
Data subcarrier

According to different allocation, many sub-carriers can be combined into sub-channel.


Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page56

Parameters and Values

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page57

Basic Terms Definition

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.Page58


Page58

Slot

The minimum possible data allocation unit

Require time and subchannels allocation mode information

Slot=n subchannels m OFDMA symbols

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page59

Subchannel Permutation
A subdivision of the set of
available OFDMA sub-channels


One segment corresponds to one


sector


The diagram giving the example


of PUSC permutation.


Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page60

Contents
4. Air Interface


4.1 Protocal Stack

4.2 Basic Terms

4.3 Physical Frame

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page61

OFDMA Frame Structure (TDD)

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.Page62


Page62

Preamble


Besides guard subcarriers, all the left carriers will be divided into 3
sets according to the following formula:

n is CarrierSet index 02


k is a running index 0...284(FFT-1024)

Each segment uses one type of preamble out of the three sets in the
following manner:

Segment#0->Carrierset0

Segment#1->Carrierset1

Segment#2->Carrierset2

The subcarriers of preamble are modulated using a boosted BPSK


modulation with a specific pseudo-noise (PN) code

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page63

DL Physical Frame


FCH


Occupy the first 4 slots in the DL PUSC segment

Indicate the frame configuration information

DL-MAP and UL MAP




Provide subchannel allocation and control information

Broadcast the resource allocation of DL/UL to all terminals, such as


the locations, size and profiles of bursts

DL data burst


Bear DL data (More than one SSs data can be mapped to one burst)

Occupy a rectangle area of DL frame

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page64

UL Physical Frame


Ranging subchannel


All SSs can send their Ranging request and bandwidth allocation
request in this area based on competition

BS executes detection and decision

UL data burst


Bear UL data (One burst can only bear one SSs data)

Occupy a rectangle area of DL frame

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page65

Summary


Comparison between WiMAX and other wireless systems.

The principle of OFDM.

The difference between the OFDM and OFDMA.

The key technologies of WiMAX system.

The air interface of WiMAX system.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page66

Thank you
www.huawei.com

WiMAX Signaling
Procedure
www.huawei.com

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

References

IEEE P802.16 (Draft Mar2007)

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page1

Objectives

Upon completion of this course, you will be able to:

Describe the network structure of WiMAX

Outline the basic signaling procedure of WiMAX

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Contents
1. WiMAX Network Overview
2. WiMAX Basic Signaling Procedure

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Network Structure

SS
PSTN

SS

BS

IP Core
ASN GW
AAA Server

Portal

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

PCMCIA
SS

Page4

Reference Model
R2
R2
Home
NSP

Visit
NSP

NAP1

R1

ASN
1

MSS

R4

CSN

CSN
R5

ASN
2

R4
NAP2

ASN

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

ASP or

ASP or

Internet

Internet

Page5

Protocol Stack

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page6

SFID&CID
BS

PDU(SFID,CID)
UGS
BE

MS

Classifier

Classifier

PDU(SFID,CID)

Scheduler

MAC Connections with QoS


Parameters

FTP Service
VoIP Service

SF A MAC transport service that provides unidirectional transport of packets ;

It is characterized by a set of QoS parameters such as latency, jitter, and


throughput assurances; one service flow corresponds only to one direction

SFIDA 32 bit quantity that uniquely identifies a service flow in a subscriber station

CIDAssigned by BS, indicates a connection of R1 interface

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page7

Contents
1. WiMAX Network Overview
2. WiMAX Basic Signaling Procedure

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Contents
1. WiMAX Basic Signaling Procedure
1.1 Network Entry and Initialization
1.2 Scan and Handover
1.3 Radio Resource Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Initial Entry

Definition

A procedure which starts from turning on of MS to setting up a normal


connection
Two Phases

Turning on

Getting Services

Aim

Negotiate QoS values between MS and BS

Confirming corresponding information of service flow between MS and BS

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page10

Procedure
Begin
Scan DL channel to synchronize
MS sends initial Ranging code
in initial Ranging opportunity

Obtain transmit
parameters

MS sends periodic Ranging code


in periodic Ranging opportunity

Initial Ranging

MS sends RNG-REQ in
allocated bandwidth

Obtain SF QoS
Parameters from GW
Establish SF
in air interface
Establish R6 tunnel
between BS and GW

SS basic capability
negotiation

End

Authorization
Register

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page11

Cell Selection & Physical Layer


Synchronization

Cell Selection

Choose an appropriate DL frequencyThe monitored power of


carriers could be a reference

Physical Layer Synchronization

CP SynchronizationSymbol Synchronization

Preamble SynchronizationFrame Synchronization

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page12

Broadcast Information Receiving


DL_MAP
Numbers of DL SymbolDCD countBSIDDL_MAP IEExtended IE

UL_MAP
Numbers of UL Symbol UCD countUL_MAP IE Extended IE
DCD
DIUC tableBSEIRPTTGRTG etc.

UCD
UIUC tableUL ranging parameter

MOB_NBR_ADV
Adjacent cells informationBWFrame lengthCP valueFFT points

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page13

Initial RangingRanging Code


Initial Ranging Interval
Initial Ranging CDMA CODE

RNG_RSP
loop

Period Ranging Interval

Period Ranging CDMA CODE

RNG_RSP
Period Ranging Interval

Period Ranging CDMA CODE

RNG_RSP
Success

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page14

Initial RangingRanging Message

UL_MAP
CDMA_ALLOCATION_IE

RNG_REQ

Initial Ranging CID

RNG_RSP
Success Basic CIDPrimary CID

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page15

Basic capabilities Negotiation and Network


Registration
SBC_REQ
PHY basic capabilities supported by MS

SBC_RSP
Intersection of PHY basic capabilities of MS and Network

REG_REQ

Higher layers capabilities supported by MS ,eg. IP version

MS Authorization & Key Exchange


REG_RSP
Intersection of higher layers capabilities of MS and Network ,Secondary CID

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page16

SF & R6 Tunnel Establishment


ASN GW

DSA_REQ
MSID
DSA_RSP
MSID
DSA_ACK
MSID

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

MS Information Request
MSID
MS Information Response
MSID
RR Request
MSIDSFIDQoS
RR Response
SFIDResult

Path Registration Request


MSID SFID
Path Registration Response
MSIDSFID
Path Registration Ack
MSIDSFIDTID
Page17

Network Exit
DHCP

ASN GW

DHCP Release

DHCP Release
DHCP ACK

DHCP ACK

Switch off
Loop
Polling

No action
RNG RSP
Abort

MS Information Request
Release
MS Information Response
Release

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Contents
1. WiMAX Basic Signaling Procedures
1.1 Network Entry and Initialization

1.2 Scan and Handover


1.3 Radio Resource Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page19

Scan/Association Introduction

DefinitionA method which is used by MS to obtain other BSs


information

AimFacilitates MS to choose an ideal cell / Accelerates the


procedure of HO

Types

Association Level 0: Scan / Association without coordination

Association Level 1: Association with coordination

Association Level 2:Network assisted association reporting

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page20

Scan Procedure

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page21

Association Procedure
Target BS

Serving BS

MOB_SCN_REG
MOB_SCN_RSP
RNG_ REQ
CDMA code
RNG_RSP
MOB_ASC_REPORT

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page22

HO Introduction

DefinitionA procedure in which Serving BS changes while the MS


is moving
Aim
Get better QoS while MS is moving
Realize the load sharing between BSs
Types:
Hard HO

Fast HO:

The parameters of BS capabilityservice flow and MAC layers


information may be changed
MS communicates with only one BS of the diversity set, but every BS of
the diversity set allocates connection resources for MS

Soft HO:

MS communicates with one or more BS of the diversity set at one time

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page23

HO Procedure
Cell Reselection

HO Decision and Initiation

Network re-entry

Termination of MS context at the original BS

HO Cancellation

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page24

HOExecution
MS

Ser vi ng BS

GW

( Key Recei ver )

1) R1: MOB_MSHO- REQ

2) R6: HO Request

Tar get BSn

Tar get BSx

( Key Recei ver )

( Key Recei ver )

3. n) R6: HO Request
3. x) R6: HO Request

6) R1: MOB_BSHO- RSP


7) R1: MOB_HO- I ND

5) R6: HO
Response
8) R6: HO Conf i r m

4. n) R6: HO Response
4. x) R6: HO Response

9) HO Conf i r m
10) gener at e ot her AK
cont ext

11) R1: RNG- REQ

12) RNG_REQ
HMAC/ CMAC,
RNG_RSP

13) R1: RNG- RSP


14) MS

15) R6: Pat h Regi st r at i on Request


16) R6: Pat h Regi st r at i on Response
17) R6: Pat h Regi st r at i on Acknowl edge
19) R6: HO Compl et e

18) R6: HO Compl et e

20)R6:MS Information Request


21)R6:MS Information Response

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page25

HOCancellation

Re-entry

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Contents
1. WiMAX Basic Signaling Procedures
1.1 Network Entry and Initialization
1.2 Scan and Handover

1.3 Radio Resource Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page27

Power Control Procedure


MS

BS

BS

MS
PMC-REQ

REP-REQ

REP--RSP
PMC-RSP
PMC-RSP

PMC-REQ

Initialed by BS

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Initialed by MS

Page28

Thank you
www.huawei.com

DBS3900 WiMAX
Hardware System

www.huawei.com

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Objectives

Upon completion of this course, you will be able to:

Describe WiMAX system networking

Outline DBS3900 WiMAX functions

Outline each board function of DBS3900 WiMAX

Complete the inside connection of DBS3900

State the typical networking configuration

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Contents
1. Components of the DBS3900
2. Introduction to the BBU3900
3. Introduction to the RRU3702 and RRU3703
4. WiMAX Networking and Installation Scenarios

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Contents
1. Components of the DBS3900
2. Introduction to the BBU3900
3. Introduction to the RRU3702 and RRU3703
4. WiMAX Networking and Installation Scenarious

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page4

WiMAX Network Architecture

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page5

WiMAX Network Reference Model

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Components of the DBS3900

BBU3900 and RRU3703

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

BBU3900 and RRU3702

Page7

Capacity Specifications

Number of Subscribers

Number of Service Flows

256 active subscribers, 1024 online subscribers

1024 service flows per carrier

Throughput over the Air Interface

Downlink peak throughput: 37M

Uplink peak throughput : 4M

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page8

BBU3900 Engineering Specifications

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page9

BBU3900 Engineering Specifications

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page10

BBU3900 Engineering Specifications

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page11

Reliability Specifications

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page12

Power Consumption for DBS3900


with RRU3702

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page13

Power Consumption for DBS3900


with RRU3702

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page14

Power Consumption for DBS3900


with RRU3703

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page15

Contents
1. Components of the DBS3900
2. Introduction to the BBU3900
3. Introduction to the RRU3702 and RRU3703
4. WiMAX Networking

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Contents
2. Introduction to the BBU3900
2.1 Structure of the BBU3900
2.2 BBU3900 cables

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page17

Appearance of the BBU3900

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page18

BBU3900 Logical Structure

PHY processing module: processing module baseband functions at the 802.16e physical (PHY) layer,
such as signal encoding/decoding and modulation/demodulation over uplink and downlink channels.
MAC processing module: processing module implements lower MAC layer processing, such as QoS
scheduling.
Transmission module: supports R6 tunnel management and provides service channels over Ethernet
links. The system supports two FE/GE electrical Ethernet ports and two 1.25 Gbit/s optical ports.
Control module: performs functions such as radio resource management, and processing of control
signaling messages over the R6 interface.
OM module: realizes the operation and maintenance of the system by providing a Ethernet port.
Clock module: provides GPS clock signals, GLONASS clock signals, and free-run clock signals for the
system.
Fan module: Cooling fans are equipped in the system.
Power module: The power module converts -48 V DC power input into the required power output.
Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 19

Hardware Structure of the BBU3900

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page20

BMPT

Optical ports, which


are used to connect
GW with optical cable

Green (LINK): ON
means the port is
connected and OFF
means the port is not
connected

Used to connect the


transmission
equipment or gateway
equipment with FE
cable

Orange (ACT):ON
means the data is
transmitted or
received and OFF
means no data is
transmitted or
received

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page21

BMPT (Cont)

Reserved port

Clock Test Port

Maintenance port

LED

The Ethernet port and


serial port share the
same physical port,
which supports both
SNMP and CLI
maintenance modes
and the serial port
commissioning

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page22

GPS

BBBI

Connecting the
BBU to the RRU
and transmitting
service data and
clock and
synchronization
information

ON: The link is operational


OFF: The link is faulty

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page23

LED

UPEU
RJ45 Port, Receiving dry
contact signals and
monitoring the external
environment

Power supply switch

RJ45 Port, Receiving


RS485 signals and
monitoring the external
environment

ON: The UPEU


is operational
OFF: The
UPEU is not
operational

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

48 V DC power input

Page24

USCU

Receiving GPS signals

Receiving RGPS signals

Providing the BITS


port that supports
the adaptive input
of 2.048 MHz and
10 MHz clock
reference source

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page25

LED

FAN
One fan unit can be configured at most.
Cooling the boards and modules of BBU3900.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 26

Clock Synchronization Modes


1

The DBS3900
supports the GPS
clock. It can obtain
GPS
synchronization
clock signals
through the built-in
GPS card to
guarantee clock
synchronization in
the entire network.

The DBS3900
supports the
GLONASS clock
and can obtain
GLONASS
synchronization
clock signals
through the USCU
to guarantee clock
synchronization in
the entire network.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

3
When the GPS
synchronization
signals are lost, the
DBS3900
automatically
switches to the freerun mode. In this
mode, the base
station can properly
work for eight hours.

Page 27

Contents
2. Introduction to the BBU3900
2.1 Structure of the BBU3900
2.2 Cables

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page28

PGND Cable of the BBU3900

Appearance

Installation Position: The JG terminal on one end of the


PGND cable of the BBU3900 is connected to the grounding
screw on the hanger at the right side of the BBU3900, and
the OT terminal on the other end is connected to the wiring
terminal on the PGND bar of the site

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page29

Power Cable of the BBU3900

Appearance

Installation Position: The 3V3 connector at one end of the


power cable is connected to the power input port on the
UPEU of the BBU3900. The blue wire and black wire at the
other end are connected to the external power device

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page30

Dry Contact Alarm Cable

Appearance

Installation Position: Install RJ45 connectors on one end of


the dry contact alarm cables of the BBU3900 on site and
connect the RJ45 connectors to ports EXT_ALM0 and
EXT_ALM1 on the UPEU of the BBU3900. Install correct
connectors on the other end and connect the connectors to
the alarm signal ports of the external Boolean alarm devices

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page31

GPS Clock Signal Cable

Appearance

Installation Position: The SMA male connector is connected


to the GPS port on the BMPT of the BBU3900, and the Ntype connector is connected to the GPS surge protector

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page32

RS485 Monitoring Signal Cable

Appearance

PMU Signal Cable

EMUA signal cable

Installation Position: The end labeled "BBU" is connected to


the MON0 or MON1 port on the UPEU of the BBU3900.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page33

CPRI Optical Cable

Appearance

Installation Position: One end of the CPRI optical cable is


connected to the CPRI0, CPRI1, or CPRI2 port on the BBBI
of the BBU3900, and the other end is connected to the
CPRI0 port of the RRU3702/RRU3703

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page34

PGND Cable of the BBU3900

Appearance

Installation Position: Two GE-port optical fibers are used to


connect the BBU3900 to the ASN-GW or the ODF. The LC
connector on one end of the optical fiber is connected to the
SFP0 or SFP1 optical port on the BMPT of the BBU3900

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page35

Power Cable of the RRU

Appearance

Installation Position: One end of the power cable of the RRU


is an OT terminal made on site and is connected to the
power port at the bottom of the RRU.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page36

RF Jumper of the RRU

Appearance

Installation Position: Connect the RRU and the antenna in


different ways according to the distance between the RRU
and the antenna

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page37

Contents
1. Components of the DBS3900
2. Introduction to the BBU3900
3. Introduction to the RRU3702 and RRU3703
4. WiMAX Networking and Installation Scenarious

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page38

RRU Logical Structure


IF module: Over downlink channels, the IF module performs digital
up-conversion and digital-to-analog (D/A) conversion. Over
uplink channels, the IF module performs analog-to-digital (A/D)
conversion, digital down-conversion, and digital I/Q
demodulation.
RF module: Over downlink channels, the RF module mixes analog
IF signals with the required working frequency and sends the
mixed signals to the antenna after power amplification. Over
uplink channels, the RF module performs lower noise
amplification and down-conversion for the signals received by
the antenna and then sends the analog IF signals to the IF
module.
Duplexer module: The duplexer enables received and transmitted
signals to share one antenna channel by multiplexing received
and transmitted signals over the RF channels. The duplexer
module also filters received and transmitted signals.
Power amplification module: The power amplification module
amplifies the RF signals from the RF module.
Fan module: in natural heat dissipation mode, no fan module is
configured; in heat dissipation fan mode, the RRU sub rack is
configured with two fans for heat dissipation.
Power module: The power module converts -48 V DC input into the
required power output.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 39

Appearance of the RRU3702


356 mm (1'-2'')

158 mm (6 1/4'')

374 mm (1'-2 3/4'')

120 mm (4 3/4'')

484 mm
(1'-7 1/16'')

480 mm
(1'-6 7/8'')

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page40

Panels of the RRU3702

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page41

RRU3702 Module- Interface


Item
Bottom Panel

Interface

Connector

ANTA_TX/RX;

N-type female

ANTB_TX/RX;

connector

Function
RF port.

ANTC_TX/RX;
ANTD_TX/RX;
PGND

JG terminal

Protection grounding port.

RET

DB9

RET port.

Cable

TX RX CPRI0;

LC

Optical port.

Description

TX RX CPRI1

Cavity

ETH

RJ45

Local maintenance port.

RTN0(+);NEG0(-);

OT terminal

Power supply port.

RTN1(+);NEG1(-)

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 42

RRU3702 Module- Indicators


Indicator
RUN

Color
Green

State

Description

On

There is power input but the board is faulty.

Off

No power input is available.

Blinks once every 0.25


seconds (ON for 0.125
second, OFF for 0.125
second).

The board is being loaded, is uploading files, or


does not operate.

Blinks once every 2 seconds The board is operating properly.


(ON for 1 second, OFF for 1
second).
ALM

Red

Off

No alarm (except the VSWR alarm).

On

An alarm is generated and the board needs to


be replaced (except the VSWR alarm).

Blinks once every 2 seconds An alarm is generated, which may be caused by


(ON for 1 second, OFF for 1 a fault on the related board or port (except the
second).
VSWR alarm).

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 43

RRU3702 Module- Indicators


Indicator
TX_ACT

Color
Green

State

Description

On

The board functions properly and the


transmitting channel is active.

Off

The software version is being verified, or


software version verification fails.

Blinks once every 2 seconds Software version verification succeeds but the
(ON for 1 second, OFF for 1 transmitting channel is inactive.
second).
VSWR

Red

CPRI0/CPR Green
I1

On

A standing-wave alarm is generated.

Off

No standing-wave alarm is generated.

On

The optical module is in position.

Off

The optical module is not in position.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 44

Appearance of the RRU3703


320 mm (1'-0 5/8'')

135 mm (5 5/16'')

163 mm (6 7/16'')

343 mm (1'-1 1/2'')

551 mm
(1'-9 11/16'')

550 mm
(1'-9 5/8'')

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page45

RRU3703

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 46

Port and indicators - RRU3703

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 47

Port and indicators - RRU3703

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 48

Port and indicators - RRU3703

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 49

Contents
1. Components of the DBS3900
2. Introduction to the BBU3900
3. Introduction to the RRU3702 and RRU3703
4. WiMAX Networking and Installation scenarios

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page50

Cable Connection for the DBS3900

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page51

PUSC (1, 1, 3)

UL-PUSC for Sub-Channel Allocation

DL-PUSC for Sub-Channel Allocation

Logical Sub channel 0-10

Segment 0: sub-channel 0-9

Logical Sub channel 11-22

Segment 1: sub-channel 10-19

Logical Sub channel 23-34

Segment 2: sub-channel 20-29

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page52

PUSC with All SC (1, 3, 3)

UL-PUSC with All SC

DL-PUSC with All SC

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page53

FFR (1, 1, 3)
DL_PUSC + PUSC with all SC

1-Segment 0: sub-channel 0-9


2-Segment 1: sub-channel 10-19
3-Segment 2: sub-channel 20-29
UL_PUSC + PUSC with all SC

1-Logical Sub channel 0-10


2-Logical Sub channel 11-22
3-Logical Sub channel 23-34

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page54

Typical Configuration for RRU3702


and RRU3703
Configuration Type
RRU3702

Quantity of the BBBIb

Quantity of the RRU

Quantity of the
CPRI Optical Fiber
(Pair)

O(1), 2T2R

O(1), 4T4R

O(2), 2T2R

O(2), 4T4R

S(1/1/1), 2T2R

S(1/1/1), 4T4R

S(2/2/2), 2T2R

S(2/2/2), 4T4R

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page55

Typical Configuration- RRU3702


S1/1/1 4T4R

S1/1/1 2T2R

RRU

CPRI0

RRU

CPRI1CPRI0

RRU

CPRI1

CPRI0

BBI

RRU

CPRI1 CPRI0

CPRI1

RRU

CPRI0

BBI

FAN

FAN
UPEU

UPEU
MPT

MPT

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 56

CPRI1

Typical Configuration- RRU3702


S2/2/2 4T4R

S2/2/2 2T2R

RRU

CPRI0

RRU

CPRI1CPRI0

RRU

CPRI1

CPRI0

RRU

CPRI1 CPRI0

CPRI1

RRU

CPRI0

CPRI interface convergence

BBI

BBI

BBI

BBI

FAN

FAN
UPEU

UPEU

MPT

MPT

Each CPRI interface only supports one carrier, CPRI0 and CPRI1 can be used in a
convergence mode, while CPRI1 is unavailable.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 57

CPRI1

BBU3900 Installation Modes

In the indoor cabinet.

On the stand.

In the APM.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 58

Typical Installation Scenarios

1. -48V DC power supply with DC BOX for power


distribution.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 59

Installation of CPRI between BBU


and RRU
RRU3702

CPRI Optical
Cable
BBU3900

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page 60

Questions

Please list all the boards and their functions in DBS3900


WiMAX.

Please state the difference among PUSC,PUSC with all


SC,FFR.

Please list all the port functions in RRU3702.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page61

Summary

The network structure of WiMAX system.

The Specifications of DBS3900 WiMAX.

The module function of BBU3900.

The module function of RRU3702/RRU3703.

The typical networking and configuration.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page62

Thank you
www.huawei.com

Security Level: Internal

2008-09

DBS3900 WiMAX
Deployment Configuration
and Commissioning
Wireless Case & Training Department

www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Preface
This course mainly introduces the deployment and
commissioning procedure of DBS3900 WiMAX, including
checking the commissioning environment and data
configuration and commissioning.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 2

Reference

<DBS3900 WiMAX Commissioning Guide>

<Version Release Document>

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 3

Objectives
After learning this course, you will:
Master the deployment commissioning procedure.
Master how to check the commissioning environment.
Finish data configuration and commissioning for the deployment
project.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 4

Chapter 1 Deployment Configuration Procedure Overview


Chapter 2 Checking the Commissioning Environment
Chapter 3 Data Configuration and Commissioning

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 5

Typical Networking Mode

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 6

Commissioning Method

Local commissioning:

At the near side of BTS, connecting commissioning PC with the ETH port on BMPT
board, and using Web LMT to log into BTS to maintenance BTS with MML commands.

Remote commissioning:

Do the centralized maintenances and commissioning for several BTS with M2000
network management system.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 7

Deployment Configuration & Commissioning Procedure


Start
Setup OM Links
Query Software Version
Check Commissioning
Environment
Data Configuration &
Commissioning

Verify Services

End
HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 8

Chapter 1 Deployment Configuration Procedure Overview


Chapter 2 Checking the Commissioning Environment
Chapter 3 Data Configuration and Commissioning

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 9

Checking Commissioning Environment


Start
Setup OM Links
Query Software Version
Check Commissioning
Environment
Data Configuration &
Commissioning

Verify Services

End
HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 10

Chapter 2 Checking Commissioning Environment


Setup OM Links
Query Software Version
Check Commissioning Environment

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 11

Setup OM Links

During the deployment, BTS needs to establish OM links with M2000.

OM links can be setup by DHCP to obtain remote maintenance IP or by local manual


configuration.

DHCP configuration:

The DHCP information of NEs needs to be configured by the DHCP configuration tool
so that the DHCP server can deliver the configuration information.

Manual configuration:

If OM links setup fails by DHCP, you can manually configure OM links through the local
maintenance Ethernet port.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 12

DHCP Configuration

Step 1:Enter the M2000 installation directory iManagerM2000Client\client\bin and


double-click dhcpConfigTool.bat to start the DHCP client and enter the account
information to input user name, password, and IP address of the server, and click OK.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 13

DHCP Configuration

Step 2: Select BWA3.2 in the interface of the DHCP configuration tool, and enter the
associated information. Then click OK to finish adding information.

Step 3: Configure OM links information. For detailed steps, please go to the manual
configuration part.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 14

DHCP Configuration

DHCP configuration parameters.


Parameters

Description

BWA Name

NE name.

BWA ESN

Used for identifying an NE and attached on the BBU before delivery of


equipment.

ASN_GW IP

ASN-GW IP(ie.SPU IP).

BWA OM Channel VLAN ID

VLAN ID used by the OM channel. The default value is 0

BWA Interface IP

IP address of the NE port, that is, ITFIP.

BWA Interface IP Mask

Mask of the IP address of the NE port.

BWA OM IP

OM IP address for an NE, that is, Local IP in the OMCH

BWA OM Nexthop IP

IP address of the next equipment connected to the service port of the NE.

BWA OM Channel Detection IP

IP address of the OM channel of the NE, used to check connection of the route
from the NE to the M2000.

M2000 IP

IP address of the M2000.

M2000 IP mask

Mask of the IP address of the M2000.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 15

Explanation of BTS Auto Detection


So simple!

172.17.11.1

DHCP

IP network

OMI
P

M2000/DHCP SERVER:

192.168.10.105

OMC

Gateway
1.M2000 deployment and commissioning;
Take S3500 as an example:
2. Relay configuration of the layer-3 device which is directly connected to BTS;
3. BTS hardware installation;
4. BTS power on, and on-site engineers report ESN;

interface Vlan-interface11
ip address 172.17.11.1 255.255.255.0
ip relay address 192.168.10.105
dhcp select relay

5. Bind the ESN and IP on DHCP server;


6. OM link established through DHCP;

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 16

Manual Configuration

Login to the BTS local maintenance Ethernet port through the Web LMT. The default
user name and password for logging in to the BTS for the first time are admin and
admin123 respectively. The default local OM ip is 192.168.0.100

Data preparation.

Parameters
BTS OM IP

192.168.0.1/24

M2000 IP

192.168.3.10/24

BTS Interface IP

192.168.90.1/24

Router 1 Interface IP

192.168.90.2/24

Router 2 Interface IP

192.168.3.150/24

Networking

HUAWEI TECHNOLOGIES CO., LTD.

BTS

Huawei Confidential

Router

M2000

Page 17

Manual Configuration
Step 1: Disable DHCP Function
SET DHCPFUNC:STRFLG=DISABLE;

Step 2: Configure OM Channel


ADD OMCH:FLAG=MASTER, IP="192.168.0.1", MASK="255.255.255.0",
PEERIP="192.168.3.10", PEERMASK="255.255.255.0", CN=0, SRN=0, SN=7, SSN=0, BRT=NO;
Associated Commands: MOD OMCH;LST OMCH;RMV OMCH;DSP OMCH.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 18

Manual Configuration
Step 3: Configure Interface IP
ADD ITFIP: CN=0, SRN=0, SN=7, SSN=0, PT=ETH, PN=0, IP="192.168.90.1",
MASK="255.255.255.0;
Associated Commands: LST ITFIP;RMV ITFIP;

BTS OM IP: Logical IP for OM links setup and communication with M2000.

Interface IP: Service IP of GE physical port for R6 interface. If there are several physical
ports for R6, there should be several service interface IP.

Currently, 4 interface IP can be configured for one GE port, and these four IP can be
set in one network segment.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 19

Manual Configuration
Step 4: Add Route Information
ADD IPRT: CN=0, SRN=0, SN=7, SSN=0, DSTIP="192.168.3.10", MASK="255.255.255.0",
NEXTHOPIP="192.168.90.2, MASK="255.255.255.0;
Associated Commands : LST IPRT;RMV IPRT;

Step 5: Check OM Links


PING: CN=0,SRN=0,SN=6,SRCIP="192.168.0.1",DSTIP="192.168.3.10";

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 20

Chapter 2 Checking Commissioning Environment


Setup OM Links
Query Software Version
Check Commissioning Environment

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 21

Query Software Version


Step 1:Query Software Version
LST SOFTWARE:;

Step 2: Query Broad Version


DSP BRDVER:;
If the actual software version is inconsistent with the required version, you
need to upgrade the software version. For details on the upgrade, see the
upgrade guide.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 22

Chapter 2 Checking Commissioning Environment


Setup OM Links
Query Software Version
Check Commissioning Environment

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 23

Check Commissioning Environment


Step 1: Query Broad Status
DSP BRDSTATUS: SUBRACKTYPE=BBU;
Display board status
-------------------RACKNO SUBRACKTYPE SUBRACKNO BOARDNO AVAILSTATUS ADMINSTATUS
0

BBU

NORMAL

Unlocked

BBU

NORMAL

Unlocked

BBU

16

NORMAL

Unlocked

BBU

19

NORMAL

Unlocked

The normal state of board should be normal.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 24

Check Commissioning Environment


Step 2: Query Alarms
LST ALMAF:;

In addition, you can choose Monitor > Current Fault Alarms on the M2000 client to
query active alarms of the BTS.

You also can query the current alarms through the WEBLMT. Choose Alarm to view the
current alarms. Then, double-click an alarm and handle it according to the corrective
suggestions.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 25

Check Commissioning Environment


Step 3: Query Port State
DSP ETHPORT: CN=0, SRN=0, SN=6, SSN=0, PT=ETH, PN=0;

The normal state of port should be UP.

The Port attribute,MTU,Speed,Duplex,VLAN Tag should be consistent with planned.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 26

Chapter 1 Deployment Configuration Procedure Overview


Chapter 2 Checking the Commissioning Environment
Chapter 3 Data Configuration and Commissioning

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 27

Chapter 3 Data Configuration & Commissioning


Data Configuration Preparation
Data Configuration Overview
Basic Information Configuration & Commissioning
R6 Interface Configuration & Commissioning
Radio Resource Configuration & Commissioning

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 28

Data Configuration Preparation

Before the data configuration, you have to know about the configuration
object..

Including:

BTS basic information: Networking structure, BTS hardware configuration,


transmission networking..

Negotiation data: Network planning and optimizing parameters and GW parameters.

Data planning: IP planning.

Software tools: M2000 client.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 29

Chapter 3 Data Configuration & Commissioning


Data Configuration Preparation
Data Configuration Overview
Basic Information Configuration & Commissioning
R6 Interface Configuration & Commissioning
Radio Resource Configuration & Commissioning

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 30

Data Configuration Overview

Typical configuration scripts:

Configuration methods: Executing MML commands to configure by Web LMT


or MML view in M2000.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 31

Data Configuration Steps


Start
Basic Info Configuration
R6 Interface Configuration
Radio Resource Configuration

End

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 32

Chapter 3 Data Configuration & Commissioning


Data Configuration Preparation
Data Configuration Overview
Basic Information Configuration & Commissioning
R6 Interface Configuration & Commissioning
Radio Resource Configuration & Commissioning

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 33

Basic Information Configuration

Basic information configuration includes device, system time and clock source and site
name.

And the device information comes from BTS hardware configuration.

Configuration steps are as follows:

Start
Device Info Configuration
System Time Configuration
Clock Source Configuration
Site Name Configuration
End

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 34

Device Information Configuration

The default configurations are as follows:

A BBU is configured in subrack 0.

An RRU and an RRU board are configured in subrack 5(C01) or subrack 23 (C02).

The BMPT is configured in slot 7. The BBBIb is configured in slot 3.

The FAN is configured in slot 16. The UPEU is configured in slot 18.

S(1)

BBBI

BMPT

UPEU

RRU

UPEU0

F
A
N
Slot3 BBBI
HUAWEI TECHNOLOGIES CO., LTD.

Slot7 BMPT

Huawei Confidential

Page 35

Device Information Configuration

The mapping relations between the RRU subrack NO, RRU ID, and the CPRI interface
on the BBBI (only for C01 version) :
BBI Slot NO.

CPRI NO.

RRU SUBRACK NO.

RRU ID

CPRI0

CPRI1

CPRI2

CPRI0

CPRI1

CPRI2

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 36

Device Information Configuration

Device information configuration includes configuring subracks, boards, fan and power
modules.
Step 1.1: Configure Subracks
ADD SUBRACK: RACKNO=0, SUBRACKPOS=0, SUBRACKNAME=BBU",
IS_REMOTE=NO, TYPE=BBU, SUBRACKNO=0;
ADD SUBRACK: RACKNO=0, SUBRACKPOS=1, SUBRACKNAME=RRU01",
IS_REMOTE=YES, TYPE=RRU, SUBRACKNO=2;

BBU is configured as non-remote subrack and RRU is remote one.

The numbering of RRU subracks is from 2~7 in C01 and from 20~37 in C02.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 37

Device Information Configuration


Step 1.2: Configure Boards

ADD BRD:RACKNO=0, SUBRACKNO=0, BOARDTYPE=MPT, BOARDNO=6,


LOGICNO=0;
ADD BRD:RACKNO=0, SUBRACKNO=0, BOARDTYPE=BBI, BOARDNO=3,
LOGICNO=0;

There is on LOGICNO parameter in ADD BRD command in C02 version.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 38

Device Information Configuration


Step 1.2: Configure Boards

C01:ADD RRU:RACKNO=0, SUBRACKNO=2, BOARDNO=0, BBI_SUBRACKNO=0,


BBI_BOARDNO=3, BBI_CPRINO=0, LOGICNO=0;
C02:ADD RRU: RACKNO=0, SUBRACKNO=23, BOARDNO=0,
BBI_SUBRACKNO=0,BBI_BOARDNO=3, BBI_CPRINO=0;

In C01, the logical number of RRU is 0~5. And this parameter should be consistent with
RRUID when using commands ADD CARRIERBASICINFO.

In C02, there is on LOGICNO parameter.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 39

Device Information Configuration


Step 1.3:Configure Fan and Power
ADD BRD:RACKNO=0, SUBRACKNO=0, BOARDTYPE=FAN, BOARDNO=16,
LOGICNO=0;
ADD BRD:RACKNO=0, SUBRACKNO=0,BOARDTYPE=PEU, BOARDNO=18,
LOGICNO=0;

The slot number of Fan module is 16.

UPEU0 is slot 19, and UPEU1 is slot18.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 40

Device Information Configuration

Associated commands:
LST SUBRACK.
RMV SUBRACK.
LST BRD.
RMV BRD.
BLK BRD.
UBL BRD.
RST BRD.
DSP BRDSTATUS.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 41

System Time Configuration

System time configuration including configuring system time source, time zone and
daylight saving time.
Step 2.1:Configure System Time Source
SET TIMESRC:TIMESRC = GPS;

Reference time sources of NEs can be divided into NTP time, GPS time, and manually set time.

Users can set the reference time sources of the DBS3900 according to actual conditions. Generally,
the GPS time is preferred.

When you use the NTP time as the time source, run the LST NTPC command to check whether
the IP address of the NTP server configured on the NE is correct. If the IP address of the server is
incorrect, run the command SET NTPC to change the IP address.

You also can run the command SET TIME to set the time.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 42

System Time Configuration


Step 2.2: Configure TZ & DST

SET TZ: ZONET=GMT+0300, DST=1, SM=DATE, SMONTH=JAN, SDAY=31, ST=15&42&06,


EM=DATE, EMONTH=MAY,EDAY=31, ET=15&42&07, TO=30;

Time zone or DST of an NE can be set independently.

If DST is entered as a date plus weekday, for example, Monday, 14 July, it means that the DST is 14
July. Otherwise, the DST is the first Monday after 14 July.

DST cannot be started and ended in the same month.

When DST is entered as a date plus weekday, the date must be at least six days before the last day
of a month. That is, a specified date must be in the current month. The system counts 28 days for
February.

DST offset must be an integer multiple of 15 minutes.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 43

System Time Configuration

Associated commands:
LST TIMESRC.
LST TZ.
DSP TIME.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 44

Clock Source Configuration


Step 3: Configure Clock Source
C01:SET CLKSRC:CLKSRCTYPE=AUTO;
C02:ADD CLKSRC:CLKSRC=GPS, PRI=1;
SET CLKMODE:MODE=AUTO;

In C02, the priority of clock source is from 1~4, and 1 is the highest priority.

If you set the working mode of the clock to AUTO, the system first uses the GPS clock source. If
the GPS is unavailable, you need to use the FREE mode.

If you set the working mode of the clock to MANUAL, select the GPS time source.

If you set the working mode of the clock to FREE, the system uses the clock provided by the
crystal oscillator in the BMPT.

In normal cases, you are not allowed to change the reference clock source.

Associated command: LST CLKSRC, DSP SATCARDSTATE.


HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 45

Site Name Configuration


Step 4: Configure Site Name
SET RBSNAME:RBSNAME="abc";

Associated command: LST RBSNAME.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 46

Chapter 3 Data Configuration & Commissioning


Data Configuration Preparation
Data Configuration Overview
Basic Information Configuration & Commissioning
R6 Interface Configuration & Commissioning
Radio Resource Configuration & Commissioning

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 47

R6 Interface Configuration

R6 interface configuration is used to assure the normal communication between BTS


and GW. It mainly configures IP path, routing, gatewey ip and gateway id.

Data preparation:

Parameters

BTS Side

GW Side

BTS Interface IP

192.168.90.1/24

192.168.90.1/24

BTS SIG IP

192.168.90.1/24

192.168.90.1/24

GW IP

7.7.7.7/32

7.7.7.7/32

GW ID

0303-0303-0303

0303-0303-0303

Nexthop IP

192.168.90.3/24

192.168.3.150/24

Networking
BTS

HUAWEI TECHNOLOGIES CO., LTD.

Router

Huawei Confidential

GW

Page 48

R6 Interface Configuration
Step 1: Configure ETH port

SET ETHPORT:CN=0, SRN=0, SN=7, SSN=0, PT=ETH, PN=0, PA=ELEC,


MTU=1500, SPEED=100M, DUPLEX=FULL, VLANTAG=DISABLE;

The BMPT board provides four physical ports (two optical ports and two electrical ports). Only
two of them can be enabled at a time. Electrical ports are enabled by default.

The recommended configuration is 100MFull.

Associated command: LST ETHPORT.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 49

R6 Interface Configuration
Step 2:Configure IP Path
ADD LGCPORT: CN=0, SRN=0, SN=7, LPN=0, SSN=0, PT=ETH, PN=0,
TXBW=100000, RXBW=100000, TXCBS=100000, TXEBS=100000;
ADD IPPATH:ID=0, CN=0, SRN=0, SN=7, SSN=0, PT=ETH, PN=0,
LOCALIP="192.168.90.1", PEERIP=7.7.7.7;

Local IP is the service IP of BTS, which is configured when establishing OM links.

Peer IP is the GW IP.

In C02, the logical port is used to control the transmission bandwidth, and adding a logical port
before adding an IP channel.

Associated commands: LST IPPATH.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 50

R6 Interface Configuration
Step 3:Configure SIGCH

ADD SIGCH:LOCALIP=" 192.168.90.1 ", PEERIP=" 7.7.7.7 ", CN=0, SRN=0, SN=7;

Local IP is the Signaling IP of BTS.

One BTS only has one SIG IP and it is always configured to the same IP with service IP.

Peer IP is the GW IP.

Associated commands: LST SIGCH.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 51

R6 Interface Configuration
Step 4:Configure Routing Info

ADD IPRT:CN=0, SRN=0, SN=7, SSN=0, DSTIP=7.7.7.7",


MASK="255.255.255.255", NEXTHOPIP="192.168.90.3";

Associated commands: LST IPRT.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 52

R6 Interface Configuration
Step 5:Configure GW ID

MOD MIXCFG: GWIp=7.7.7.7,GWId="0303-0303-0303";

Associated commands: LST MIXCFG.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 53

R6 Interface Commissioning
Step 1:Check R6 Link

PING: CN=0,SRN=0,SN=7,SRCIP="192.168.90.1",DSTIP=7.7.7.7";

If no reply, please first run LST IPRT to check the routing configuration.

If configuration is not correct, please run ADD IPRT to modify it.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 54

R6 Interface Commissioning
Step 2: Check Port State
DSP ETHPORT: CN=0, SRN=0, SN=7, SSN=0, PT=ETH, PN=0;

The normal state of port is UP.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 55

R6 Interface Commissioning
Step 3: Query Alarms
LST ALMAF:;

If there are alarms as follows, please fisrt deal with these alarms:

Alarm ID 25020: ETH link faulty alarm.

Alarm ID 25021:IPPATH faulty alarm.

Alarm ID 25022:OM channel faulty alarm.

Alarm ID 25023: Interface IP confliction alarm.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 56

Chapter 3 Data Configuration & Commissioning


Data Configuration Preparation
Data Configuration Overview
Basic Information Configuration & Commissioning
R6 Interface Configuration & Commissioning
Radio Resource Configuration & Commissioning

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 57

Radio Resource Configuration

Radio resource configuration is to configure R1 interface information according to wireless


networking.
It mainly configures BTS information, carrier and neighbor relations.
Data prepared for wireless networking is from network planning engineer and operator.

Operator ID

10

SITE ID

Central Frequency

2550000

Sub-frame Ratio

31:15

Bandwidth

10M

Sector ID

Carrier ID

Networking

PUSC with all

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 58

Radio Resource Configuration

BS ID, one of the wireless networking parameter, is the parameter negotiated


between BS and GW.

BSID(48bit)=operatorid(24bit)+siteid(16bit)+sectorid(4bit)+carrierid(4bit).

But the format BS ID configured at GW side is 12 digits in HEX.

For example: BSID is 0000-2900-3510 at GW side.

Then operatorid=0x29=41,siteid=0x35=53,sectorid=1,carrierid=0

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 59

Radio Resource Configuration

Bandwidth and sub-frame ratio supported by V3R2:

BW

10MHz

5MHz

7MHz

35:12

31:15

29:18

26:21

21:12

Sub-frame
ration

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 60

Radio Resource Configuration

Bandwidth and zone configuration supported by V3R2:


SECTORID

CARRIERID

CPRIID

Band
width

DLBITMAP

ULBITMAP

DLZONEIND

ULZONEIN
D

Networking

0/1

10M/
7M

00000003

000000000000000FFF

10M/7M
PUSC1/3

0/1

10M/
7M

0000000C

000000000000FFF000

10M/7M
PUSC1/3

0/1

10M/
7M

00000030

0000000007FF000000

10M/7M
PUSC1/3

0/1

10M/
7M

0000003F

0000000007FFFFFFFF

10M/7M
PUSCALL

0/1

10M/
7M

0000003F

0000000007FFFFFFFF

10M/7M
PUSCALL

0/1

10M/
7M

0000003F

0000000007FFFFFFFF

10M/7M
PUSCALL

0/1

5M

00000015

00000000000001FFFF

5M PUSCALL

0/1

5M

00000015

00000000000001FFFF

5M PUSCALL

0/1

5M

00000015

00000000000001FFFF

5M PUSCALL

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 61

Radio Resource Configuration


Step 1: Configure BTS Info

ADD BTSINFO: OPERATORID=10, SITEID=0;

OPERATORID is given by operator.

SITEID is from network planning engineers.

Associated commands: MOD BTSINFO,RMV BTSINFO.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 62

Radio Resource Configuration


Step 2: Configure Sector

ADD SECTOR: SECTORID=0, PREAMBLEINDEX=0;

When PreambleIndex = [0,95],the PreambleIndex for three sectors should be:

PreambleIndex for Sector 0:[0,31];

PreambleIndex for Sector 1:[32,63];

PreambleIndex for Sector 2:[64,95].

The difference between different sectors should be 32. For example, the PreambleIndex is 0 for
sector 0, and then the PreambleIndex of sector 1 and sector 2 will be 33, 65 respectively.

Sector information should be configured before carrier configuration.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 63

Radio Resource Configuration


Step 3: Configure Carrier Info

ADD CARRIERBASICINFO: SECTORID=0, CARRIERID=0, BBIID=3, CPRIID=0,


RRUID=0, CENTRALFREQUENCY=2550000, BANDWIDTH=10M,
DLBITMAP="0000003F", ULBITMAP="0000000007FFFFFFFF",
SUBFRAMERATIO=31_15, DLSEGMENTNO=0, CDMAGROUPSTART=0;

The sector corresponding to the carrier should exist.

Carrier basic information mainly includes bandwidth, central frequency, sub-frame ratio, sector id
and carrier id..

DLBITMAP and ULBITMAP should be based on the wireless networking.

SEGMENT number should be the same with the CPRI number.

Associated commands: MOD CARRIERBASICINFO,RMV CARRIERBASICINFO.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 64

Radio Resource Configuration

CDMAGROUPSTART configuration rule supported by V3R2:

SECTORID

CARRIERID

CDMAGROUPSTART

16

32

48

64

80

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 65

Radio Resource Configuration


Step 4: Modify Carrier Zone Info
MOD CARRIERZONEINFO: SECTORID=0, CARRIERID=0, DLZONEIND=8,
ULZONEIND=4;

DLZONEIND and ULZONEIND are decided by wireless networking mode.

The carrier status should be inactive when modifying zone information.

Associated commands: LST CARRIERZONEINFO.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 66

Radio Resource Configuration


Step 5: Configure Neighbor
Relation (Optional)
ADD NBR: CBSID="0000-0A00-0000", NBRBSID="0000-0A00-0010";

Neighbor relation is designed by network planning engineers.

A single carrier can be configured with a maximum of 30 neighboring cells.

Associated command: RMV NBR.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 67

Radio Resource Configuration


Step 6: Active Carrier
MOD CARRIERBLOCKFLAG: SECTORID=0, CARRIERID=0,
BLOCKFLAG=Unblocked;

If carrier is in active, it can not be active again.

Before active carrier, please first query the carrier status: DSP CARRIERSTATUS. Only if the
resource state is available, the carrier can be active.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 68

Radio Resource Configuration Check

After configuring BTS radio resource, please query information as follows:.

Query BTS information: LST BTSINFO.

Query carrier basic information: LST CARRIERBASICINFO.

Query carrier zone information: LST CARRIERZONEINFO.

Query neighbor relation: LST NBR.

Query carrier status: DSP CARRIERSTATUS.

Please pay attestation to check central frequency, bandwidth, sub-frame ratio,


zone information and whether the carrier resource is available or not.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 69

Thank You
www.huawei.com

DBS3900 WiMAX
Commissioning
www.huawei.com

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Objectives

Upon completion of this course, you will be able to:

Describe the two types of commissioning

Perform local commissioning

Perform remote commissioning

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Contents
1. Overview
2. Process of DBS3900 Commissioning

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Typical Commissioning Network

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page4

Commissioning Methods
Local Commissioning

Default OM IP
address is
192.168.0.100

Remote Commissioning

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page5

IP addresses of BTS
IP Address Type

Command for Querying

Command for Adding the

the IP Address

IP Address

LST ITFIP

ADD ITFIP

Signaling IP address

LST SIGCH

ADD SIGCH

IP path

LST IPPATH

ADD IPPATH

Traffic IP address
(ITFIP)

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Contents
1. Overview
2. Process of DBS3900 Commissioning

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page7

Process of Commissioning

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Querying Software Environment


Querying the Software Version
1. Run the LST SOFTWARE command to query the software version.
%%LST SOFTWARE:;
%% RETCODE = 0 Operation succeeded
Result of software query -----------------------Storage Area Software Version
Main Area

V300R002C01B020

Software Status
Available

Standby Area V300R002C01B020 Available


(Number of results = 2)

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Querying Software Environment (Cont.)


Querying the Software Version
2. Run the DSP BRDVER command to query the versions of all boards.

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page10

Querying Software Environment (Cont.)


Data Configuration
1. Configuring BTS Basic Information

Configure the site name

SET RBSNAME

Configure the site ID

ADD BTSINFO

Configure sectors

Configure center frequency

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

ADD CARRIERBASICINFO
MOD CARRIERBASICINFO

Page11

Querying Software Environment (Cont.)


Data Configuration
2. Configuring the BTS Clock
Configure clock source

SET CLKSRC

Configure the time source

SET TIMESRC

Set the time threshold

Set the system time

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

SET TIMETHRD

SET TZ ; SET TIME

Page12

Querying Software Environment (Cont.)


Data Configuration
3. Configuring the Transmission Link

Set GW-ID

Configure IP routes

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

MOD MIXCFG
ADD IPRT

Page13

Querying Software Environment (Cont.)


Data Configuration
4. Configuring the Networking Mode

Configure the basic


information of carriers

MOD CARRIERBASICINFO
Configure the zone
information

Configure neighboring
cells

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

ADD NBR

Page14

Testing BTS Transmission


Testing the R6 Interface

Check the port alarm

Query the status of the FE/GE port

Check the IP address of the peer port

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

LST ALMAF

DSP ETHPORT

Ping the ASN-GW

Page15

Checking the Operation Status of BTS


Checking the Status of Boards: DSP BRDSTATUS

The query result indicates that the status of the BMPT is Online
(the BMPT is functioning properly).

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Checking the Operation Status of BTS


Checking the Status of Ethernet Ports: DSP ETHPORT

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page17

Checking the Operation Status of BTS


Query all active alarms: LST ALMAF

The query result shows that two active alarms are generated, indicating that
the board in slot 1 is not in position and the Ethernet link is faulty.

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Setting Environment Monitor


Setting DIP Switches of the Environment Monitoring Equipment

Set the DIP switch of the PMU.


1. Set bits 4, 3, 2, and 1 of the DIP switch of the PMU to 0, 0, 1, and 1 respectively.
2. For details about how to set other bits of the DIP switch, see the manuals delivered
with the APM.

Set the DIP switch of the EMU.


1. Set bits 4, 3, 2, and 1 of the SW_ADDR switch of the EMU or the EMUA to 1, 0, 1,
and 1 respectively.
2. For details about how to set other bits of the SW_ADDR switch, see the manuals
delivered with the EMU or the EMUA.

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page19

Setting Environment Monitor


Adding the Environment Monitoring Equipment

Add an EMU or EMUA .


1. Run the ADD EMU command to add an EMU or EMUA.
2. Run the LST EMU command to check whether the configuration is
successful.

Add the PMU.


1. Run the ADD APM command to add a PMU
2. Run the LST APM command to check whether the configuration is
successful.

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page20

Setting Environment Monitor


Setting Alarm Parameters
Setting alarm parameters of the EMU or the EMUA
Task Number
1

Operation

Query Command

Run the SET EMUANLG command to set parameters for the

LST EMUANLG

standby analog sensor of the EMU or EMUA.


2

Run the SET EMUTHTHD command to set the temperature and

LST EMUTHTHD

humidity alarm thresholds of the EMU or EMUA.


3

Run the SET EMUINVTHD command to set the input voltage alarm

LST EMUINVTHD

threshold of the EMU.


4

Run the SET EMUPORT command to set customized alarms of the

LST EMUPORT

EMU.
5

If a smog or door status alarm is generated, run the CLR EMUALM


command to clear it.

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page21

None.

Setting Environment Monitor


Setting Alarm Parameters
Setting alarm parameters of the PMU
Task

Operation

Query Command

Number
1

Run the SET ACDCVTHD command to set the AC/DC voltage alarm

LST ACDCVTHD

threshold of the PMU.


2

Run the SET PMULDTTHD command to set the load temperature alarm

LST PMULDTTHD

threshold of the PMU.


3

Run the SET CLDPRT command to set the information about load

LST CLDPRT

undervoltage protection of the PMU.


4

Run the SET HTPRT command to set the information about load

LST HTPRT

overvoltage protection of the PMU.


5

Run the SET LVPRT command to set power-off parameters of the PMU.

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page22

LST LVPRT

Testing the RF Tx/Rx Performance


Testing the Transmitting Performance

Check RRU transmit power.


1.Click the Maintenance tab, choose Service > Realtime Specific Monitoring, and
double-click Carrier Frequency Monitoring. The Carrier Frequency Monitoring
dialog box is displayed. Enter the BS ID and monitoring period.
2.Click OK. The monitoring results are displayed in lists or graphics.

Check carrier resources


1.Run the DSP CARRIERSTATUS command to query the status of carriers.

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page23

Testing the RF Tx/Rx Performance


Testing the Transmitting Performance

Check the RSSI/CINR of the MS.


1. Click the Maintenance tab, choose Service > Realtime Specific
Monitoring, and double-click User Information Monitoring. The User
Information Monitoring dialog box is displayed. Enter the MAC
address and query period of the MS.
2. Click OK. The monitoring results are displayed in lists or graphics.

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page24

Testing the RF Tx/Rx Performance


Testing the Receiving Performance

Run the LST RRU command to query the subrack ID of the RRU.

Run the GET RRURTWP command to query RTWP of the RRU.

The value of RTWP ranges -400 (0.1 dB) to -1050 (0.1 dB).
Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page25

Testing the BTS Services and Functions


Testing the MS Access Performance

Connect the CPE and the commissioning PC through an Ethernet cable.

Set the DL/UL modulation mode of the CPE to QPSK1/2 CTC and have the CPE
make 20 attempts of accessing the WiMAX system in the static state.

Measure the number (M) of attempts of the CPE accessing the system and the
number (N) of successful attempts of the CPE accessing the system.

Access success rate of the CPE in the static state = N/M x 100%

Keep the CPE moving at a speed of 60 km/h and have the CPE make 20 attempts of
accessing the WiMAX system.

Measure the number (M1) of attempts of the CPE accessing the system and the
number (N1) of successful attempts of the CPE accessing the system.

Successful access rate of the CPE in the moving state = N1/M1 x 100%

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Testing the BTS Services and Functions


Testing the Webpage Browsing Function

On the commissioning PC, open the browser to visit some Internet


addresses, such as www.google.com.

Check whether web pages can be displayed normally.

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page27

Testing the BTS Services and Functions


Testing the FTP Service

Connect the CPE and the commissioning PC through an Ethernet


cable.

Set the DL/UL modulation mode of the CPE to QPSK1/2 CTC.

Connect the CPE to the FTP server and start the uploading and
downloading services.

Keep the uploading and downloading services for at least 30


minutes and observe whether the FTP service is normal and whether
the transmission is smooth. Record the number of disruptions during
the uploading and downloading services.

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page28

Questions

What is the difference between the local commissioning and


the remote commissioning?

Please state the process of the commissioning.

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page29

Summary

Two commissioning methods

The process of the commissioning

Copyright 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page30

Thank you
www.huawei.com

WiMAX ASN-GW
Overview
www.huawei.com

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

References

WiMAX End-to-End Network Systems Architecture Stage 2-3


Release 1.1.0

HUAWEI WASN9770 Packet Service Gateway V200R002C02


Feature Description

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page1

Objectives

Upon completion of this course, you will be able to:

Know the architecture of ASN

List the functions of ASN-GW

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Contents
1. Access Service Network
2. Function Design of ASN-GW
3. Usage Scenario

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Contents
1. Access Service Network
2. Function Design of ASN-GW
3. Usage Scenario

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page4

WiMAX Network Reference Model


Visited NSP

Home NSP

R2
R2

SS/
MS

R3

R1
ASN

R5

CSN

CSN

ASP Network
or
Internet

ASP Network
or
Internet

R4

Another ASN

Legend of Lines
Bearer plane
control plane

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page5

ASN Definition

The ASN can access to multiple connectivity service networks


(CSNs) and provide radio access service to the CSN of different
network service providers (NSPs). The ASN manages the air
interface of IEEE 802.16 and provides radio access to the WiMAX
subscribers.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Profile

A profile maps ASN functions into BS and ASN-GW so that


protocols and messages over the exposed reference point are
identified.

WiMAX NWG defines three types of profile. They are profile A, B


and C.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page7

Profile A, B and C
R3

R3

ASN-GW

R4

ASN-GW

R4

R6
BS

BS

ASN Profile B

ASN Profile A and C

Profile C: BS controls RRM and HO

Profile B: Combination of BS and ASN-GW

Profile A: ASN-GW controls RRM and HO

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Reference Point

A reference point (RP) is a conceptual link that connects two


groups of functions that reside in different functional entities of
an ASN, CSN, or MS.

ASN provides reference point R3, R4, R5 and R6.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Questions

Whats the difference between profile A, B and C?

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page10

Contents
1. Access Service Network
2. Function Design of ASN-GW
3. Usage Scenario

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page11

Contents
2. Function Design of ASN-GW
2.1 Security
2.2 Accounting
2.3 QoS
2.4 Mobility Management
2.5 Radio Resource Management
2.6 Paging and Location Management
2.7 IP Addressing

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page12

User Authentication Protocol


Supplicant

Authentication
Server

Authentication Authenticator
Relay
BS

MS

ASN-GW

AAA Proxy

AAA Server

EAP method (EAP-TTLS/EAP-TLS/EAP-SIM/EAP-AKA)


EAP
PKMv2

Auth. Relay
Protocol

RADIUS

802.16e

Auth. Relay

UDP/IP

Encap. Protocol

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page13

EAP Methods

EAP-TTLS: Extensible Authentication Protocol Tunneled Transport


Layer Security

EAP-TLS: Extensible Authentication Protocol Transport Layer


Security

EAP-SIM: Extensible Authentication Protocol Subscriber Identify


Module

EAP-AKA: Extensible Authentication Protocol Authentication and


Key Agreement

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page14

Postpaid and Prepaid Accounting

SCP

AAA
(PPS)

QoS-Based

MS

Accounting
BS

ASN-GW
(PPC)

SS

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page15

Hot-lining

The Hot-lining feature provides a WiMAX operator with the


capability to efficiently address issues with users that would
otherwise be unauthorized to access packet data services.
AAA-Hot-Line
signalling
RADIUS

HAAA

RADIUS

ASN Hotline
Device

MS

Packet
data

CSN Hotline
Device
Packet
data

Hot-lining
Application
Packet
data

Mobile-Hot-lining Application:eg.,Web

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Service Flow Management

A service flow is a unidirectional flow of packets that is provided a


particular QoS.

NWG 1.1.0 defines following service flows:

Pre-provisioned service flow creation, modification and deletion

Initial Service Flow creation and deletion

Service Flow management to support MS mobility

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page17

Handover

WiMAX ASN supports the following handover modes:

R6 Handover

R4 Handover

R3 Handover

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page18

R6 Handoff
ASN
MS

R1

BS 1

R6
CSN
ASN-GW
(WASN9770)

MS

R1

BS 2

R3

R6

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page19

AAA
Server

R4 Handoff
ASN
BS 1

R6

CSN
Anchor
ASN-GW

R4

MS

R1

MS

R1

BS 2

BS 3

R6

R6

R3
AAA
Server

R4

Serving
ASN-GW

Target
ASN-GW

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page20

R3 Handoff
ASN1
BS 1

R6

Serving FA/PMIP
Client/Serving
ASN-GW

CSN
R3

AAA
Server

R4
ASN 2
CSN
MS

R1

BS 2

R6

Target FA/
Target ASN-GW

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

R3

Page21

AAA
Server

Radio Resource Management

RRM in ASN Profile A

RRM in ASN Profile C


Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page22

Paging Network Reference Model

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page23

Idle Mode and Location Update

Idle Mode is intended as a mechanism to allow the MS to


become periodically available for DL broadcast traffic messaging
without registration at a specific BS.

MS performs Location Update procedure when it meets the


location update conditions as specified in IEEE 802.16e
specification. The MS shall use one of two processes for Location
Update: Secure Location Update or Unsecured Location Update.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page24

IP Addressing (IPv4)
ASN-GW/
DHCP Server

BS

MS

Mode 1: Local IP Address Pool Assignment


AAA Server

MS

ASN-GW/
DHCP Proxy

BS

Mode 2: AAA Server Static Assignment


DHCP Server

MS

BS

ASN-GW/
DHCP Relay

Mode 3: DHCP Server Dynamic Assignment


Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page25

Questions

Whats service flow?

How many types of IP address allocation?

Please list the network elements of prepaid accounting and


explain their functions.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Contents
1. Access Service Network
2. Function Design of ASN-GW
3. Usage Scenario

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page27

Usage Scenario

As the core network element of the WiMAX, the ASN-GW is


applied in the WiMAX network. The ASN-GW supports four usage
scenarios defined in the WiMAX system, including: Fixed Access
Scenario, Nomadic Access Scenario, Portable Access Scenario and
Simple Mobile Access Scenario.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page28

Fixed

BS
Enterprise

Bank

School

The stationary access service is the most basic service mode of


the WiMAX.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page29

Nomadic

BS
TV Rebroadcast

Wireless Camera

The nomadic access is the step beyond the stationary access. The
MS can access to the WiMAX network at different access
locations.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page30

Portable

BS
Laptop
PDA

UMPC

The portable access is the step beyond the nomadic access. The
mobility and handover of terminals can be realized in this
scenario.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page31

Simple Mobile

BS

MS

Smart Phone
Dual Mode MS

The simple mobile access scenario is the step beyond the


portable access. The reliable handover between BSs is available.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page32

Questions

How many usage scenarios in WiMAX network?

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page33

Summary

ASN means access service network. It access to multiple


connectivity service networks (CSNs) and provide radio access to
subscribers. Profile A, B and C define different ASN architecture.

ASN-GW is the key element of WiMAX ASN. Its performs


function and resource management.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page34

Thank you
www.huawei.com

WASN9770 Hardware
System
www.huawei.com

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

References

WASN9770V3R3 Manual

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Objectives

Upon completion of this course, you will be able to:

Describe WASN9770 structure

Describe WASN9770 board function

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Contents
1. WASN9770 structure
2. WASN9770 board function

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page4

Hardware Logic Structure


Monitor Bus

SRU Board

FAN
(Redundancy)

FAN
(Redundancy)

SPU

LPU

Control Bus

(Redundancy)

SFU
SFU

SPU

Switching
Fabric

LPU

(3+1)
3+1
redundant

160Gbps switching capacity per SFU; 640 Gbps per WASN

User-plane
(Ethernet)

Management-plane

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Monitoring-plane
Page5

Contents
1. WASN9770 structure
2. WASN9770 board function

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page6

WASN9770 Cabinet
1. Power Distribution Box
2. 1 U filler panel
3. 2 U filler panel
4. Cabling frame of the LAN Switch
5. 1 U fiber supports of large capacity
6. Subrack of the WASN9770

1. Plastic panel of the fan Module


2. Fan module
3. Board cage
4. Air intake frame
5. Plastic panel of the power supply
module
6. Power supply module
7. Handle
8. Angle
9. Cabling trough

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page7

WASN9770 Board Configuration


1

8
SFU

S
F
U
L

LPU

WASN

WASN

WASN

SPU

SPU

SPU

WASN

WASN

WASN

S
F
U

1 2 3 4

10 5 6 7 8

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Board
Name

Full Spelling

SRU

Switching Route Unit

SPU

Service Processing Unit

LPU

Line Processing Unit

SFU

Switching Fabric Unit

Page8

Physical Interface

All physical interface are provided by LPU board

Type
10/100M auto-sensing
Ethernet electrical
interfaces

1000M Ethernet GBIC


optical interfaces
(1000BASE-GBIC)

Quantity
(Maximum)

Function

24

Physical interfaces to an external


network or devices in the
external network, such as the BS,
PDN, AAA server, and DHCP
Server

24

Physical interfaces to an external


network or devices in the
external network, such as the BS,
PDN, AAA server, and DHCP
Server

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Physical Interface

All physical interface are provided by LPU board

Type
1000M Ethernet GBIC
electrical interfaces
(1000BASE-GBIC)

ATM optical interfaces

Quantity
(Maximum)

Function

24

Physical interfaces to an external


network or devices in the
external network, such as the BS,
PDN, AAA server, and DHCP
Server

Physical interfaces to an external


network or devices in the
external network, such as the BS
and PDN

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page10

SRU-Function

Function:

Route management

Data configuration

Device management and maintenance

Inter-board outband communication channel

System clock

Storage function

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page11

SRU-Interface

To M2000

Console
PDB

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page12

SFU

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page13

SPU

NWG Signal processing

Strong Routing Functions

Dual-CPU Availability

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page14

LPU

LPU: Line interface Processing Unit

LPU provides physical interfaces to the


external network (BS, PDN, RADIUS),
including FE, GE, POS, ATM etc.

LPU only response transmitting packet


between PDN and NWG network.

LPU receive the route table from SRU.

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page15

Logical Interface Overview


SRU

LPU
Gom
Phy
If 1

AAA
SPU 1

R3

R6

SPU n

R6/R4

R6/R4

R3

R3

Phy
If 2

... ...

BS
WASN
WASN 1/1

Domain1
Gom

Domain2

WASN n/1
......

Corporate 1
Corporate 1

WASN n/2

WASN 1/2
Corporate 1

R6/R4

M2000

Phy
If m

... ...

Domain3

R6/R4

R3

R3

Logic Interface (Distributed)


Phy
If m
Logic Interface (Centralized)

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Physical Interface

WASN Main Processing Procedure


Route
distribute

SRU

Route
distribute

Buffer UDR
Create user
connection

NWG Message

NWG Message

R6 uplink PDU

Generate original
UDR

SPU

LPU

LPU
R3 uplink PDU

R6 downlinkPDU

R3 downlink PDU

Forward

Uplink GRE tunnel


decapsulation
Downlink GRE tunnel
encapsulation

User
authentication

Radius
Server

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Address allocation

Radius/
DHCP/SPU

Page17

Flow Looking on Boards


Uplink Data flow

SPU

LPU

GRE tunnel

LPU

Downlink Data flow:

LPU

SPU

LPU

GRE tunnel

Uplink Data flow with R3 IPSec/GRE tunnel:

LPU

GRE tunnel

SPU

LPU

IPSec/GRE tunnel

Downlink Data flow with R3 IPSec/GRE tunnel:


IPSec/GRE tunnel

LPU

SPU

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

LPU

Page18

GRE tunnel

Redundancy

Hardware

SFU 3+1 redundancy

SPU 1+1 redundancy

Copyright 2009 Huawei Technologies Co., Ltd. All rights reserved.

Page19

Thank you
www.huawei.com

WASN9770 Data
Configuration
Basic
www.huawei.com

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Contents
1. CLI Views
2. System Time Management
3. Interface Configuration
4. BS Data Configuration
5. Domain
6. Address Pool
7. AAA Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Overview of CLI Views (1)

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Overview of CLI Views (2)

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page4

Overview of CLI Views (3)

Charging view: The information about charging is configured in this view.

Domain view: The information about domains is configured in this view.

MIP view: The information about mobile IP (MIP) is configured in this view.

Interface view: The information about interfaces such as physical interfaces,


logical interfaces, and sub-interfaces is configured in this view.

Access view: Access resources, including the Remote Authentication Dial In


User Service (RADIUS) information, address pool, quality of service (QoS), and
Layer 2 Tunneling Protocol (L2TP) group, are configured in this view.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page5

Overview of CLI Views (4)

Security view: The information about the IP Security (IPSec) protocol and the
Internet Key Exchange (IKE) protocol is configured in this view. Security views
consist of the IPSec view, IPSec policy view, IKE peer view, and IKE proposal
view.

Routing view: The routing information is configured in this view.

Operation and maintenance view: The information about alarms, performance


measurement, and software management is configured in this view.

Service view: The information about service control is configured in this view

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Contents
System Time Management

System time and time zone

NTP

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page7

Set System Time and Time Zone

< WASN9770> clock datetime 0:0:0 2009/09/01

< WASN9770> clock timezone z5 add 05:00:00

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Set the Daylight Saving Time

<WASN9770> clock daylight-saving-time tmo repeating


8.33333333333333E-02 2008 March last Sunday 8.33333333333333E02 2008 October last Sunday 1:00:00

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page9

NTP

WASN9770

NTP Server
/ M2000

GE 1/0/0
10.0.0.10/24

10.0.0.1/24

WASN9770

GE 1/0/0
10.0.0.20/24

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page10

NTP Configuration

ntp-service unicast-server ip-address [ version number |


authentication-keyid key-id | source-interface interface-type interfacenumber | vpn-instance vpn-instance-name | preference ] *

[WASN9770] ntp-service unicast-server 10.0.0.1 version 3

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page11

NTP Related Maintenance Command

display ntp-service sessions

display ntp-service status

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page12

Contents
Interface Configuration

Physical Interface

R6 Interface

R3 Interface

R Interface

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page13

Logical and Physical Interface

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page14

Physical interface

configuration for Ethernet 1/0/0


<WASN> system-view

[WASN] interface GigabitEthernet 1/0/0

[WASN-Ethernet1/0/0] ip address 10.220.154.1 255.255.255.0

[WASN-Ethernet1/0/0] undo shutdown

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page15

R6if

Basic concept
Data
R6 if interface

LPU SPU
R6if interface is used in NWG protocol stack, BS should know
this IP address.
The data package receives from BS will conduct GRE
encapsulation in this interface.
Physical interface

The data package sends to BS will conduct GRE decapsulation


in this interface

R6 interface

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page16

R6if User Plane Networking


Des
Des

Mask

Mask

Nhop

x.x.x.x

BS IP
R6if IP

x.x.x.x

Nhop
BTS IP

LPU1 IP
0.0.0.0

0.0.0.0

Route

WASN9770

R6if

MS

Yahoo

BS

ROUTER
LPU1

encapsulation
data MS IP Yahoo IP GRE head

BS IP

R6if IP

uplink

GRE data

SPU LPU2

decapsulation
data MS IP

Yahoo IP

GRE data

downlink
MS IP Yahoo IP

data

BS IP

decapsulation
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

R6if IP GRE head MS IP Yahoo IP

encapsulation
Page17

data

R6if Control Plane Networking


Des

Mask

Nhop

R6if IP

x.x.x.x

LPU1 IP

Des

Mask

Nhop

BS IP

x.x.x.x

BTS IP

WASN9770

MS

R6if

BS
LPU

encapsulation

decapsulation

uplink
Signal

BS IP

SPU

R6if IP

Signal

downlink
Signal

decapsulation
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

BS IP

R6if IP

Signal

encapsulation
Page18

Example of Networking

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page19

R6if Data Configuration

R6if is used to identify the R6 logical interface and configured on SPU board, it
does not occupy the physical port. It is the source IP or destination IP of the GRE
package

Configuration

[WASN] interface r6if3/0/0

[WASN-r6if3/0/0] ip address 10.3.25.1 255.255.255.255

# logical interface should be configured with a mask of 32 bits

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page20

R3if

Basic concept
Data
R3if interface

Radius

LPU SPU

R3if interface is used in Radius protocol stack


If the domain service requires authenticationaccountingauthorization,
Physical interface

WASN will send message to Radius after it receives access request


from MS. In this message, the IP address is R3if IP.

R3 interface

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page21

Example of Networking

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page22

R3if Data Configuration

R3if is used to identify the R3 logical interface and configured on SPU


board, it does not occupy the physical port. It is just configured when
you have the AAA server

Configuration

[WASN] interface R3if3/0/0

[WASN-Giif3/0/0] ip address 10.8.50.1 255.255.255.255

# logical interface should be configured with a mask of 32 bits

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page23

Rif
BS
R6if interface
Other router
Rif interface

Data
LPU SPU

WASN is a router with NWG functionso there are two kinds of data to
come in WASN: the IP package (black line) which sends to MS and ordinary

Physical interface

data package (red line). None but the MS IP package needs to be transfer to
R6if interface to conduct GRE encapsulation, ordinary data package neednt

R interface

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page24

Rif Interface Configuration

The R interface is generated automatically when the SPU is inserted and


no configuration is required.

Each CPU will generate one interface.

Rif3/0/0 and

Rif3/1/0.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page25

Contents
BS Data Configuration

Basic Concept

GWID and GWIP Data Configuration

BS Data Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Basic Concept (1)

slot-id: specifies the SPU number. It is an integer ranging from 1 to 8. If the


SPUs work in 1+1 backup mode, the SPU number must be the odd slot number.
If the SPUs work in load-sharing mode, the SPU number is the number of the
slot where the SPU resides.

cpu-id: specifies the CPU ID of the SPU. It can be set to 0 or 1. Generally, each
SPU is configured with two CPUs, and each CPU can perform the functions of
the ASN-GW independently.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page27

Basic Concept (2)

gwid: specifies the gateway ID. It is of the numeric type and in the hexadecimal
format of H1H2H3H4-H5H6H7H8-H9H10H11H12.

gwip: specifies the gateway IP address. It is in dotted decimal notation. The


default value is unavailable.

bsid: specifies the ID of the BS that is directly connected to the WASN9770. It is


of the numeric type and in the hexadecimal format of H1H2H3H4-H5H6H7H8H9H10H11H12. The default value is unavailable.

bts-ip: specifies the IP address of the local BTS to be added in dotted decimal
notation..

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page28

Example of Networking

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page29

GWID and GWIP

local-gwid slot slot-id cpu-id cpu-id gwid gwid

gwip gwid gwid gwip gwip

<WASN9770>system-view

[WASN9770]access-view

[WASN9770-access] local-gwid slot 3 cpu-id 0 gwid 1111-1111-1111

[WASN9770-access] gwip gwid 1111-1111-1111 gwip 1.1.1.1

Configuration Check

display local-gwid

display gwip

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page30

BS Data Configuration

bts bts-ip bts-ip bts-info bts-info [ control-flag { enable | disable } | user-flag { enable |
disable } | wholesale-flag { enable | disable } | band-width band-width-value ] *

local-bs bsid bsid bts-ip bts-ip gwid gwid [ portal { enable | disable } ]

<WASN9770> system-view

[WASN9770] access-view

[WASN9770-access] bts bts-ip 10.10.10.1 bts-info abc control-flag enable user-flag


disable wholesale-flag enable

[WASN9770-access] local-bs bsid 1111-1111-1111 bts-ip 1.1.1.1 gwid 1111-2222-3333


portal enable

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page31

BS Data Configuration

Configuration Check

display bts

display local-bs

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page32

Domain
Domain Introduction

This describes how to configure domain data. A domain is a collection of users with the
same attributes. For example, the users of a domain access the same packet data
network (PDN), use the same authentication mode, adopt the same IP address
assignment mode, and are bound to the same virtual private network (VPN) instance.
Centralized management of users can be realized by configuring multiple domains on the
WASN9770. Domain data is an important configuration of the WASN9770. When a user
initiates data services, domain information is carried. Based on this information, the
WASN9770 determines which application service provider (ASP) network the user
accesses and the access mode of the user.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page33

Example of Networking

Host1
MS1

WASN9770/LAC

Host2
BS
LNS
Host3
MS2
Host4

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page34

VPN

Example of Configuration

domain domain-instance

Procedure :

[<WASN>system-view

[WASN]domain enterprise.com

[WASN-domain-enterprise.com]ms-view

[WASN-domain-enterprise.com-ms]max-users-number 100

[WASN-domain-enterprise.com-ms]max-bandwidth 30

Configuration Check :

display domain-configuration

<WASN>display domain-configuration enterprise.com


Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page35

Contents
Address Pool Configuration

Introduction

Local Address Pool

DHCP Relay

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page36

Address Pool
Address Pool Introduction
The WASN9770 can function as the Dynamic Host Configuration Protocol
(DHCP) server, DHCP relay, or DHCP proxy to help users obtain IP addresses
during network entry.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page37

Configuration of the local address pool

Domain

Section 1

IP address
(<=32768)

IP Pool N
(N<=16)

IP Pool 1

Section N
(N<=16)

Section 1

IP address
(<=32768)

IP address
(<=32768)

Section N
(N<=16)

IP address
(<=32768)

A local address pool is responsible for locally assigning IP addresses. The local address pool needs to be
configured with address segments for assigning IP addresses to users..

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page38

Configuration of the local address pool

ip pool pool-number start-address [ end-address ]

address-pool pool-name

Procedure :

[WASN9770-access]ip pool test local


[WASN9770-access-ip-pool-test]section 0 20.0.0.1 20.0.0.255
[WASN9770-access]dhcp-expiration hour 72 minute 0
[WASN9770-access]quit
[WASN9770]domain test
[WASN9770-domain-test]ms-view
[WASN9770-domain-test-ms]address-pool test
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page39

Configuration of the local address pool


Configuration Check :
display address-pool [ pool-name ]
display ip pool [ pool-name [ [ section-num [ [ start-ip-address end-ip-address ] | conflict |
section-used ] | pool-used ] ] | [ local | remote ] [ vpn-instance vpn-instance-name ] ]

<WASN9770>display ip pool
<WASN9770>system-view
[WASN9770] domain isp.com
[WASN9770-domain-isp.com] ms-view
[WASN9770-domain-isp.com-ms]display address-pool

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page40

Configuring the DHCP Server to Assign IP Addresses


Domain

IP Pool 1

DHCP
Server Group

DHCP
Server 1

Agent IP 1

DHCP
Server 2

IP Pool N
(N<=16)

Agent IP N
(N<=16)

DHCP
Server Group

DHCP
Server 1

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Agent IP 1

DHCP
Server 2

Page41

Agent IP N
(N<=16)

Example of Configuring (1)

Procedure :

<WASN9770>system-view
[WASN9770]access-view
[WASN9770-access]ip pool test2 remote
[WASN9770-access-ip-pool-test2]section 0 20.0.0.1 20.0.0.255
[WASN9770-access-ip-pool-test2]agent-ip 0 192.168.0.1 24
[WASN9770-access] dhcp-server group
[WASN9770-access-dhcp-server-group-test]dhcp-server 10.1.1.1
[WASN9770-access]quit
[WASN9770-access]ip pool test2
[WASN9770-access-ip-pool-test2]dhcp-server group test
[WASN9770-domain-test]ms-view
[WASN9770-domain-test-ms]address-pool test2

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page42

Example of Configuring (2)


Configuration Check
<WASN>display ip pool

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page43

Contents
Network Entry Template Configuration

Classifer

QoS Template

Service Flow Template

User Template

Authentication Template

Mobile Template

User Attribution

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page44

Network Entry Templates


Network Entry Templates Introduction

This describes how to configure the network entry templates. With this
configuration, the WASN9770 can provide access to the worldwide
interoperability for microwave access (WiMAX) network for mobile stations
(MSs). The network entry templates include the classifier template, service
flow template, and user attribute templates.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page45

Example of Configuring (1)


Configure a Layer 3 classifier.
<WASN>system-view

[WASN]access-view

[WASN-access]l3-classfier 1

[WASN-access-l3-1]protocol-type udp

[WASN-access-l3-1]paging enable

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page46

Example of Configuring (2)


Configure QoS templates.

[WASN-access]qos-template 1

[WASN-access-qos-1]direction uplink

[WASN-access-qos-1]media-flow-type voip

[WASN-access-qos-1]scheduling-type rtps mini-rate 10000 max-delay-time


30 max-rate 8000000 burst-length 4096

[WASN-access-qos-1]transmission-policy no-defrag disable no-pack disable


no-crc disable

[WASN-access-qos-1]sdu variable

[WASN-access-qos-1]quit

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page47

Example of Configuring (3)

[WASN-access]qos-template 2

[WASN-access-qos-2]direction downlink

[WASN-access-qos-2]media-flow-type robust-browse

[WASN-access-qos-2]scheduling-type ugs max-rate 8000000 max-delay-time


40 max-jitter-time 40

[WASN-access-qos-2]transmission-policy no-defrag disable no-pack disable nocrc disable

[WASN-access-qos-2]sdu variable

[WASN-access-qos-2]quit

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page48

Example of Configuring (4)


Configure service flow templates.

flow flow-id

classifier-binding classifier-id precedence precedence &<1-8>

qos-binding qos-template-id

[WASN-access]flow 1

[WASN-access-flow-1]classfier-binding 1 precedence 2

[WASN-access-flow-1]flow direction uplink priority 3

[WASN-access-flow-1]qos-binding 1

[WASN-access-flow-1]quit

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page49

Example of Configuring (5)


Configure a user template.

[WASN-access]ms-template 1

[WASN-access-ms-1]scenario-type ip-cs

[WASN-access-ms-1]isf up-flow 1 down-flow 2

[WASN-access-ms-1]quit

Configure an authentication policy template.

[WASN-access]auth-template 2 policy remote re-authentication enable msklifetime 2880

Configure a mobility attribute template.

[WASN-access]mobile-template 1 idle enable handover disable

[WASN-access]quit
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page50

Example of Configuring (6)


Bind the user attribute templates to the domain.

ms-template-binding template-id

auth-template-binding template-id

mobile-template-binding template-id

[WASN]domain auth.com

[WASN-domain-auth.com]ms-view

[WASN-domain-auth.com-ms]ms-template-binding 1

[WASN-domain-auth.com-ms]auth-template-binding 1

[WASN-domain-auth.com-ms]mobile-template-binding 1
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page51

Contents

AAA Configuration

AAA Overview

AAA Authentication Configuration

AAA Accounting Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page52

AAA Overview

RADIUS Server : Remote Authentication Dial-In User Service

AAA : Authentication Authorization and Accounting

In the WiMAX network, the AAA implements the authentication, authorization,


accounting, and proxy functions for the WiMAX users. It supports the prepaid
and postpaid services. For the postpaid users, the AAA generates CDRs and
provides them to the OSS for rating. It also provides the prepaid functions to
complete the prepaid flow. The AAA supports the local prepaid service (that is,
the account is stored in the database of the AAA), recharge function, and
transforming the amount into the quota.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page53

Position of AAA in WiMAX Network

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page54

Contents

AAA Configuration

AAA Overview

AAA Authentication Configuration

AAA Accounting Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page55

Authentication Overview

AAA Server

Signaling
channel

WASN9770

MS

Process

BS

EAP-TTLS
EAP
PKMv2

Auth Relay Protocol

Radius

802.16

IP/UDP

IP/UDP

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page56

AAA Authentication Configuration


radius-server group group-name
[WASN-access]radius-server group isprg
radius-server authentication ip ip-address [ vpn-instance vpninstance ] [ port port ] key key-string[ secondary ]
Configure AAA server

[WASN-access-radius-isprg]radius-server authentication ip

authentication

192.168.110.1 port 1812 key ispchina


[WASN] domain test

Bind RADIUS server group to

[WASN-domain-test] ms-view

Domain instance

[WASN-domain-test-ms] radius-server group isprg

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page57

Configuration Check

display radius-server authentication

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page58

Contents

AAA Configuration

AAA Overview

AAA Authentication Configuration

AAA Accounting Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page59

WiMAX Charging Structure

Internet

IP
FTP

GRE

Radius

MS

BS

WASN9770

BC

AAA

PPS

SCP

Signaling channel
Data path

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page60

Charging: Postpaid

(1)Network entry
of postpaid user (3) Report CDR

MS

BS

(4)Report
response
WASN9770

ASN

(5) Download
CDR
BC

AAA

Internet

CSN

Process
Service
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page61

Charging: Prepaid

(2) Change into quota


and distribute it

(1)Network entry of
prepaid user

MS

BS

(4)If quota cannot be obtained,


After the user use up the
original quota then he is forced
to exit the network

AAA

SCP

PPS

(3) Apply for the quota


again
Data path
Signaling channel
Process

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page62

AAA Accounting Configuration


radius-server group group-name
[WASN-access] radius-server group rad1

radius-server accounting ip ip-address [ vpn-instance


vpn-instance ] [ port port-number] key key-string
[secondary ]
Configure active AAA

[WASN-access-radius- rad1] radius-server accounting ip

accounting server

10.0.0.10 key wasn1


[WASN] domain huawei.com

Bind RADIUS server group to

[WASN-domain-huawei.com]ms-view

Domain instance

[WASN-domain-huawei.com-ms] radius-server group rad1

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page63

AAA Accounting Configuration


threshold { time-threshold INTEGER <15-1440>| volumethreshold INTEGER<800-65535> }*
[WASN-domain-huawei.com-ms] threshold time-threshold 30
Configure charge threshold

volume-threshold 100
charge-general-property time-threshold-switch { off | on timethreshold INTEGER<15-1440> } volume-threshold-switch { off |
on volume-threshold INTEGER<800-65535> }
[WASN9770] charge-view
[WASN9770-charge] charge-general-property time-threshold-

Configure charge general

switch on time-threshold 100 volume-threshold-switch on

property

volume-threshold 100

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page64

Configuration Check

display radius-server accounting

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page65

Thank you
www.huawei.com

WASN9770 Data
Configuration - Route
www.huawei.com

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Contents
1. WASN Route Configuration Overview
2. Static Routes Configuration
3. Dynamic Routes Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page2

WASN9770 Routing Feature

The routing feature of the WASN enables the following:

Serving as the interface for the external PDN:

Data receiving and routing:

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page3

WASN9770 Routing Feature

WASN could support static routes and dynamic route protocol:

Static routes

Dynamic routing protocol

RIP

OSPF

IS-IS

BGP

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page4

WASN9770 Route Plan


Router C

AAA

(5)
Router

(1)

(3)
Router E

BS

(2)

WASN

Internet
GRE tunnel

Router A

(public IP)

(4)
DHCP

Router B

Router D

No.

Destination IP

Next hop

Routing protocol (up to the real


network design)

BS

Router E

dynamic

Default routing (uplink)

Router A

static

MS IP (downlink)

WASN R interface

static

DHCP

Router D

static

AAA server

Router C

Dynamic\static

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page5

WAP
gateway

Contents
1. WASN Route Configuration Overview
2. Static Routes Configuration
3. Dynamic Routes Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Global Static Route Commands

Add a static route


[WASN] ip route-static ip-address { mask | mask-length } { gatewayaddress | interface-type interface-number [ gateway-address ] }
[ preference preference ]

Remove a static route


[WASN] undo ip route-static ip-address { mask | mask-length }
{ gateway-address | interface-type interface-number [ gatewayaddress ] } [ preference preference ]

Query the route table information


[WASN] display ip routing-table

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page7

VPN Static Route Commands

Add a static route


ip route-static vpn-instance vpn-source-name destination-address { mask |
mask-length } interface-type interface-number [ nexthop-address ]
[ preference preference ] [ description text ]

Remove a static route


undo ip route-static vpn-instance vpn-source-name

Query the route table information


dis ip routing-table vpn-instance

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Static Route Application in WASN9770

Mass Market

Business Customer

GRE R3 VPN
WASN

GRE R6 VPN
BS

GRE VPN
Common AAA

Verify the Static Routes Configuration

Check the static routes configuration


Action

Command

Check the brief information of


the IPv4 routing table.

display ip routing-table

Check the details of the IPv4


routing table.

display ip routing-table
verbose

Verify the static routes configuration

Ping the destination

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page10

Contents
1. WASN Route Configuration Overview
2. Static Routes Configuration
3. Dynamic Routes Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page11

OSPF Brief

OSPF : Open Shortest Path First

Based on link status calculation

Belongs to IGP
(internal gateway protocol)

RT
3

Area 2

Routing informations are


exchanged between neighbors
and different areas

The boundaries between


different areas are the routers

40.1.1.0/
24

RT
4

50.1.1.0/
Area 3
24

Area 0
30.1.1.0/
24

20.1.1.0/
RT24

2
60.1.1.0/
Area 4
24
NSSA

RT
5
OSPF

AS100

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

ASB
R

Page12

RT
6

OSPF Application in WASN


OSPF application on Gn side

Multiple OSPF instance, require to bind with VPN instance

Gnif IP in SPU need to be publicized through the physical interface by OSPF

OSPF application on Gi side

Multiple OSPF instance, require to bind with VPN instance

Giif IP in SPU need to be publicized through the physical interface by OSPF

Need to import the route information of the other type of the route protocol into the
OSPF processe.g. Downlink traffic to MS

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page13

R6 Network OSPF

Router A

Router B

E-trunk0

E-trunk1

10.64.69.10

10.64.69.14

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

R6if3/0/0
149.254.5.57
R6if3/1/0
149.254.5.58

Page14

VPN
instance:
ch_gn

Create R6 VPN-instance

[WASN9770]ip vpn-instance ch-r6

[WASN9770-vpn-instance-ch-r6]route-distinguisher 200:1

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page15

Create E-trunk0

[WASN9770]interface Eth-Trunk 0

[WASN9770-Eth-Trunk0]mtu 1560

[WASN9770-Eth-Trunk0]workmode loadbalance

[WASN9770-Eth-Trunk0]least active-linknumber 3

[WASN9770-Eth-Trunk0]ospf dr-priority 0

[WASN9770-Eth-Trunk0]ip binding vpn-instance ch-gn

[WASN9770-Eth-Trunk0]ip address 10.64.69.10 255.255.255.252

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Create E-trunk1

[WASN9770]interface Eth-Trunk 1

[WASN9770-Eth-Trunk0]mtu 1560

[WASN9770-Eth-Trunk0]workmode loadbalance

[WASN9770-Eth-Trunk0]least active-linknumber 3

[WASN9770-Eth-Trunk0]ospf dr-priority 0

[WASN9770-Eth-Trunk0]ip binding vpn-instance ch-gn

[WASN9770-Eth-Trunk0]ip address 10.64.69.14 255.255.255.252

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page17

Bind Ethernet Port to E-trunk 0

[WASN9770]interface GigabitEthernet1/0/0

[WASN9770-GigabitEthernet1/0/0]eth-trunk 0

[WASN9770]interface GigabitEthernet1/0/1

[WASN9770-GigabitEthernet1/0/1]eth-trunk 0

[WASN9770]interface GigabitEthernet1/0/2

[WASN9770-GigabitEthernet1/0/2]eth-trunk 0

[WASN9770]interface GigabitEthernet1/0/3

[WASN9770-GigabitEthernet1/0/3]eth-trunk 0

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Bind Ethernet Port to E-trunk 0

[WASN9770]interface GigabitEthernet2/0/0

[WASN9770-GigabitEthernet2/0/0]eth-trunk 1

[WASN9770]interface GigabitEthernet2/0/1

[WASN9770-GigabitEthernet2/0/1]eth-trunk 1

[WASN9770]interface GigabitEthernet2/0/2

[WASN9770-GigabitEthernet2/0/2]eth-trunk 1

[WASN9770]interface GigabitEthernet2/0/3

[WASN9770-GigabitEthernet2/0/3]eth-trunk 1

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page19

Configure R6if Interface

[WASN9770]interface r6if3/0/0

[WASN9770-r6if3/0/0] ip binding vpn-instance ch-r6

[WASN9770-r6if3/0/0] ip address 149.254.5.57 255.255.255.255

[WASN9770]interface r6if3/1/0

[WASN9770-r6if3/0/0] ip binding vpn-instance ch-r6

[WASN9770-r6if3/0/0] ip address 149.254.5.58 255.255.255.255

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page20

OSPF Configuration

[WASN9770]ospf 1 vpn-instance ch-r6

[WASN9770-ospf-1] vpn-instance-capability simple

[WASN9770-ospf-1] area 0.0.0.0

[WASN9770-ospf-1-area-0.0.0.0] network 10.64.69.10 0.0.0.3

[WASN9770-ospf-1-area-0.0.0.0] network 10.64.69.14 0.0.0.3

[WASN9770-ospf-1-area-0.0.0.0] network 149.254.5.57 0.0.0.7

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page21

R3 Network OSPF
Radius:
10.212.0.1~ 10.212.255.254
10.213.0.1~ 10.213.255.254
Router A

Router B

E-trunk2

E-trunk3

10.126.243.2

10.126.243.6

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

VPN
instance:
ch_r3

Page22

Create R3 VPN-instance

[WASN9770]ip vpn-instance ch-r3

[WASN9770-vpn-instance-ch-r3]route-distinguisher 100:1

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page23

Create E-trunk2

[WASN9770]interface Eth-Trunk 2

[WASN9770-Eth-Trunk0]mtu 1560

[WASN9770-Eth-Trunk0]workmode loadbalance

[WASN9770-Eth-Trunk0]least active-linknumber 3

[WASN9770-Eth-Trunk0]ospf dr-priority 0

[WASN9770-Eth-Trunk0]ip binding vpn-instance ch-gi

[WASN9770-Eth-Trunk0]ip address 10.126.243.2 255.255.255.252

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page24

Create E-trunk1

[WASN9770]interface Eth-Trunk 3

[WASN9770-Eth-Trunk0]mtu 1560

[WASN9770-Eth-Trunk0]workmode loadbalance

[WASN9770-Eth-Trunk0]least active-linknumber 3

[WASN9770-Eth-Trunk0]ospf dr-priority 0

[WASN9770-Eth-Trunk0]ip binding vpn-instance ch-r3

[WASN9770-Eth-Trunk0]ip address 10.64.69.6 255.255.255.252

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page25

Bind Ethernet Port to E-trunk 2

[WASN9770]interface GigabitEthernet1/0/6

[WASN9770-GigabitEthernet1/0/6]eth-trunk 2

[WASN9770]interface GigabitEthernet1/0/7

[WASN9770-GigabitEthernet1/0/7]eth-trunk 2

[WASN9770]interface GigabitEthernet1/0/8

[WASN9770-GigabitEthernet1/0/8]eth-trunk 2

[WASN9770]interface GigabitEthernet1/0/9

[WASN9770-GigabitEthernet1/0/9]eth-trunk 2

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Bind Ethernet Port to E-trunk 3

[WASN9770]interface GigabitEthernet2/0/6

[WASN9770-GigabitEthernet2/0/6]eth-trunk 3

[WASN9770]interface GigabitEthernet2/0/7

[WASN9770-GigabitEthernet2/0/7]eth-trunk 3

[WASN9770]interface GigabitEthernet2/0/8

[WASN9770-GigabitEthernet2/0/8]eth-trunk 3

[WASN9770]interface GigabitEthernet2/0/9

[WASN9770-GigabitEthernet2/0/9]eth-trunk 3

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page27

Create Static Route for MS

ip route-static vpn-instance ch-r3 10.212.0.1 255.255.0.0 Rif3/0/0

ip route-static vpn-instance ch-r3 10.213.0.1 255.255.0.0 Rif3/1/0

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page28

OSPF Configuration

ospf 2 vpn-instance ch-r3


import-route static

vpn-instance-capability simple

area 0.0.0.0

network 10.126.243.1 0.0.0.3


network 10.126.243.5 0.0.0.3

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page29

Verify the OSPF configuration

Check the OSPF configuration


Action

Command

Check the OSPF statistics.

display ospf [ process-id ] cumulative

Check LSDB information of OSPF.

display ospf [ process-id ] lsdb [ brief ]


display ospf [ process-id ] lsdb [ router |
network | summary | asbr | ase | nssa |
opaque-link | opaque-area | opaque-as
] [ link-state-id ] [ originate-router [
advertising-router-id ] | self-originate ]

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page30

Verify the OSPF configuration

Check the OSPF configuration

Action

Command

Check information about OSPF


neighboring routers.

display ospf [ process-id ] peer [ [


interface-type interface-number ]
neighbor-id | brief | last-nbr-down
]

Check information about the OSPF


routing table.

display ospf [ process-id ] routing


[ [ ip-address [ mask | masklength ] | interface interface-type
interface-number | nexthop
nexthop-address ] | router-id [
router-id ] ]

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page31

Maintenance

debugging ospf event

debugging ospf packet

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page32

Thank you
www.huawei.com

WASN9770 Data
Configuration - VPN
www.huawei.com

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Contents
1. VPN Concept
2. GRE VPN Configuration
3. L2TP VPN Configuration
4. IPsec Tunnel Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page2

VPN Concept

Virtual Private Network

VPN is a virtual private communication network built over public


networks with the cooperation of Internet Service Provider (ISP) and
Network Service Provider (NSP).

Features of VPN

Private: VPNs keep resources independent from the bearer network. The
resources of a VPN cannot be used by other VPNs in the bearer network
or by network users outside this VPN. VPNs offer sufficient security,
ensuring that the internal information is out of external invasion.
Virtual: VPNs are virtual networks built by using public networks. VPN
users communicate with each other through public networks.
Meanwhile, public networks are used by other non-VPN users.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page3

VPN Classification
Virtual Private Network

Overlay VPN

L2 VPN

FR

Peer-to-Peer VPN

L3 VPN

ATM

GRE

IPSec

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

MPLS VPN

Page4

Primary Technologies: Tunnel

VPN use the tunneling technology to encapsulate the VPN packet in the tunnel
and transmit the VPN packet by data transmission path which is set up over the
VPN backbone network.

source

encapsulator

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

decapsulator

Page5

destination

Primary Technologies: Tunnel

The tunnel is realized through tunneling protocols. Based on the realization


hierarchy of the tunnel, the tunneling protocols is categorized into the following
types:

Tunneling protocols at Layer 2: Ends at user side equipment, low


transmission efficiency, high system load

PPTP

L2F

L2TP

Tunneling protocols at Layer 3: Ends at ISP gateway, no need to maintain


PPP status, low system load.

GRE

IPSec

MPLS LSP tunneling protocol

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page6

WASN VPN Solution


AAA

Portal Server

GRE/L2TP/IPSec
IP

AAA

IP over GRE
Backbone
BS

WASN
Private network

VPN capability
GRE

DHCP Server

L2TP
IPSec

AAA
Private network
SSM

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page7

SSM

WASN VPN Location Domain Bind VPN

Domain1
192.168.0.1

BS

192.168.0.0

VPN1
Bear network
WASN

Enterprise1.com

VPN2

192.168.0.0
BS

Enterprise2.com

Domain2
192.168.0.1

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page8

WASN VPN Location R6 Interface Bind


VPN
BS-1

Router1
MS
BS-2

WASN9770
PDN

OSPF

Access Network

Router2
MS

BS-n
MS

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Contents
1. VPN Concept
2. GRE VPN Configuration
3. L2TP VPN Configuration
4. IPsec Tunnel Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page10

GRE VPN Introduction


Networking
IP
Term2

Novell IPX
Group1

Internet
IP
Term1

Novell IPX
Group2

Function

Encapsulation
IP/IPX

Passenger Protocol

GRE

Encapsulation Protocol

IP

Bear Protocol

Single network protocol of backbone is used to


carry multiple network protocols of local network
in transmission.
Enlarge the range of hop limited protocol, IPX for
example.
Joint some subnets which are not connected, used
to build VPN.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page11

GRE Application

10.10.10.10 = (211.136.19.176, port)

NO GRE
Active
Active response
IP=10.10.10.10
data

data

Internet
(Public IP address)

WASN

10.10.10.10

www.yahoo.com

10.10.10.10

Wap gateway

Yahoo
Fire (NAT)
data

data 10.10.10.10

GRE

(Private IP)

Wap gateway

www.yahoo.com

ROUTER1

ROUTER2

Internet

Active

Active respond

211.136.19.176(port)

GRE Tunnel
WASN

Router2

Router1

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page12

WAP GW

GRE VPN On WASN9770

Domain1

BS

Internet
Access Network

Enterprise1.com

WASN

BS

AAA server

Domain2

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page13

GRE VPN Configuration


There are three key definitions in the GRE VPN:
Each VPN instance corresponding to a virtual
router, the router is separated from the global
routing table of the WASN9770 and the routing
tables of other VPN instances
No data can be transferred between the VPN
instances and security is well assured

VPN instance

Domain binding with VPN instance


Rif binding with VPN instance
R3if bind with VPN instance
GRE tunnel binding with VPN instance
AAA server binding with VPN instance

Binding

VPN instance routing

packets of different types can be determined


to go through the corresponding GRE tunnels
by different VPN instance routing table

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page14

GRE VPN Configuration: Binding


Global
Routing Table

Rif0

Enterprise
Domain1

VPNI 1
Routing Table

Rif1

Enterprise
Domain2

VPNI 2
Routing Table

Rif2

Public Domain

R3if3/0/0

tunnel1

R3if3/0/1

tunnel2

R3if3/0/2

WASN9770

Relationship between the different parameters binding


Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page15

GRE VPN Configuration: Binding


Uplink flow
Downlink flow

BS
R6if3/0/0
R6

VPN Instance 1(tunnel1)


Rif3/0/0

R3if3/0/0

R3 1

R3 2

ROUTE1

VPN Instance 2(tunnel2)

ROUTE2
SPU

PDN

LPU

Note: No need to bind R6 logical interface in the VPN_instance


Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page16

AAA

GRE VPN Configuration: Binding


Uplink flow
Downlink flow

BS

R6if3/0/0
R6

VPN Instance 1(tunnel1)


Rif3/0/0

R3if3/0/0

SPU

R3 1

ROUTE1

PDN

ROUTE2

AAA

R3 2

LPU

Note: one R3 physical interface can be used to establish several tunnels


Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page17

GRE VPN Configuration Step

WASN9770 GRE VPN Configuration Commands list: Create the GRE tunnel
Command

Function

View

interface interface-type interfacenumber

create a loopback interface

System view

ip address ip-address { mask | masklength } [ sub ]

set the IP address of the loopback


interface

Interface view

target-board { spu slot-id cpu-id | tsu


slot-id }

set the mapping between the loopback


interface and the SPU

Interface view

binding tunnel gre

bind the loopback interface with GRE

Interface view

interface tunnel interface-number

create a virtual tunnel interface

System view

tunnel-protocol { gre | mpls te }

set the packet encapsulation mode of the


tunnel interface

Interface view

source loopback interface-number

set the source IP address of the tunnel


interface

Interface view

destination [ vpn-instance vpninstance-name ] dest-ip-address

set the destination IP address of the


tunnel interface

Interface view

GRE VPN Configuration Step

WASN9770 GRE VPN Configuration Commands list:

Create the VPN instance


Command

Function

View

ip vpn-instance vpn-instance-name

create a VPNI

System view

route-distinguisher routedistinguisher

specify the RD of a VPNI

VPN instance
view

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page19

GRE VPN Configuration Step

WASN9770 GRE VPN Configuration Commands list:

Configure the binding relations


Command

Function

View

access an intranet through a GRE VPN


vpn vpn-instance-name

bind the Domain instance to a VPNI.

Domain view

ip binding vpn-instance vpn-instancename

bind the tunnel interface to a VPNI

Tunnel
Interface view

ip address ip-address { mask | masklength } [ sub ]

set the IP address of the tunnel interface

Tunnel
Interface view

Tips: After a VPNI is created, you must:


Bind the Domain to the VPNI.
Bind the GRE tunnel between the WASN9770 and the intranet to the VPNI.
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page20

GRE VPN Configuration Step

WASN9770 GRE VPN Configuration Commands list:

Configure the binding relations


Command

Function

View

Create a GRE tunnel between WASN and AAA server


radius-server group group-name

display the Remote Authentication Dial In User


Service (RADIUS) view

Access view

radius-server authentication ip-address


[vpn-instance vpn-instance] [port port]
key key-string

set the IP address and the key of the RADIUS


authentication server and bind the RADIUS
authentication server to a VPNI.

radius-server
instance view

radius-server accounting ip-address


[ port port-numbe ] [ vpn-instance vpninstance ] key key-string

set the IP address and the key of the RADIUS


accounting server and bind the RADIUS
accounting server to a VPNI

radius-server
instance view

ip binding vpn-instance vpn-instancename

bind the Gi interface to a VPNI.


IP address to the Gi interface

R3 Interface
view

ip address ip-address { mask | masklength } [ sub ]

bind the tunnel interface to a VPNI.


IP address to tunnel interface

Set the

Set the Tunnel Interface


view

GRE VPN Configuration Step

WASN9770 GRE VPN Configuration Commands list:

Configure the route for VPN instance


Command

Function

configure the static routes for a


ip route-static vpn-instance vpninstance-name dest-ip-address { mask VPNI
| mask-length } { interface-type
interface-number [ nexthop-address ]
[ preference value ] [ description text ]

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page22

View
System view

Example
192.168.10.1
domain: enterprise.com
GRE

AAA
Backbone

192.168.10.0/24

BS

WASN

202.1.1.1/24

192.168.1.10/24

10.110.100.1

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page23

Service Server

GRE VPN ---- Configuration


binding Configuration:
#
interface GigabitEthernet2/0/0 /* physical interface, bear domain enterprise.com /* enterprise.com bind ispvpn vrf */
ms-view
the GRE traffic*/
vpn ispvpn
ip binding vpn-instance ispvpn
radius-server group group1
ip address 10.1.1.2 255.255.255.0
#
#
interface r3if3/0/0 /* used to connected to AAA server*/
interface LoopBack1 /* tunnel source*/
ip binding vpn-instance ispvpn /* giif bind ispvpn vrf */
ip address 192.168.1.10 24 255.255.255.0
ip address 192.168.3.1 32
target-board spu 3 0
#
binding tunnel gre
radius-server group group1
#
radius-server authentication 192.168.10.1 vpn-instance ispvpn
interface Tunnel3/0/1 /*GRE tunnel interface*/
key ispchina
ip binding vpn-instance ispvpn
#
ip address 192.168.2.1 24
Route configuration
tunnel protocol gre
#
source LoopBack1
ip route-static vpn-instance ispvpn 10.110.0.0 16 tunnel3/0/0
destination 202.1.1.1
/* configure default route, taffic of Enterprise.com to
gre checksum
tunnel3/0/1, */
gre key 123456
#
VRF Configuration:
#
ip vpn-instance ispvpn
route-distinguisher 100:1
#
Create tunnel:

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page24

GRE VPN Configuration Verification

The commands for verification:


[WASN] ping a source-ip destination-ip
[WASN] display current-configuration
[WASN] display domain
[WASN] display ip routing-table

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page25

Contents
1. VPN Concept
2. GRE VPN Configuration
3. L2TP VPN Configuration
4. IPsec Tunnel Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page26

L2TP VPN Introduction


Public Part

ISP Part

Enterprise Part

LAC
VPN User

LNS
INTERNET

PTSN/ISDN

Enterprise
Network

VPN User
Radius Server

Radius Server

L2TP Tunnel
L2TP Session

LAC: L2TP Access Concentrator


LNS: L2TP Network Server
LAC/LNS Radius : LAC/LNS Remote Access Dial In User System

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page27

L2TP VPN Introduction

L2TP PDU

Private IP

Private IP

PPP

PPP

L2TP

L2TP

UDP

UDP

Public IP

Public IP

Private IP

PPP

DL

DL

DL

Phy

phy

phy

Private IP

Client

phy

DL

phy
LNS

LAC

Phy
Server

L2TP protocol stack


LAC encapsulating
IP header (private IP) PPP

L2TP

UDP IP header (public IP)

LNS decapsulating
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page28

L2TP VPN Application in WASN9770


Scenario 1 User Type = ETH-CS

PC1

PPPoE
over
GRE

PPPoE
SGSN

L2TP
AAA
Internet

WASN/LAC

LNS

Private network

PC2

Scenario 2 User Type = IP-CS


WASN regenerate PPP
session

L2TP

AAA

IP over GRE

IP
SGSN

WASN/LAC

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Internet
LNS

Page29

Private network

L2TP VPN Configuration Step

WASN9770 L2TP VPN Configuration Commands list:


Command

Function

View

L2TP group configuration


l2tp group group-number

set the L2TP group. The L2TP group


specifies the information such as the IP
address of the LNS and the attributes of
the L2TP tunnel

Accesss view

common [ authentication { enable |


disable } | domain domain-name |
local local-name | avp-hidden { enable
| disable } | hello-interval { hellointerval | none } | retry-times { retrytimes } | vpn-instance { vpn-instancename | none } ]

set the common information about the


L2TP group

l2tp group
view

lns ip ip-address priority weight


[ password password ]

set the LNS information. The LNS with high l2tp group
priority serves as the active LNS while that view
with low priority serves as the standby
LNS

undo lns ip ip-address

L2TP VPN Configuration Step

WASN9770 L2TP VPN Configuration Commands list:


Command

Function

View

L2TP default configuration


l2tp default local local-name hellointerval { hello-interval | none } retrytimes { retry-times }

set the default L2TP parameters,


including the default name of the local
L2TP access concentrator (LAC) and the
default interval for sending Hello
packets

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page31

access view

L2TP VPN Configuration Step

WASN9770 L2TP VPN Configuration Commands list:


Command

Function

View

Enable L2TP in Domain configuration


l2tp group group-number

specify the L2TP group to be used by


the users of the domain

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page32

domain view

Example

Domain VPN
Binding with
L2TP group

LNS master
202.168.1.2
L2TP Group1

R3if3/0/1
212.69.242.132

LNS slave
202.168.1.5

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page33

L2TP VPN Configuration (on WASN)


VPN configuration
ip vpn-instance enterprise.com
ip vpn-instance L2TP_VPN
#
L2TP group Configuration:
l2tp group 1
common vpn-instance L2TP_VPN
lns ip 202.168.1.2 priority 10 password 0123456
lns ip 202.168.1.5 priority 20 password 0123456
#
Domain Configuration:
domain enterprise.com
vpn enterprise.com
l2tp group 1
#

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page34

L2TP VPN Configuration (on WASN)


Interface Configuration:
Interface giif3/0/1 /* Configured for l2tp tunnel source */
ip binding vpn-instance L2TP_VPN
ip address 212.69.242.132 255.255.255.255
interface GigabitEthernet1/0/0
ip binding vpn-instance L2TP_VPN
ip address 10.110.1.3 255.255.255.240
#
interface GigabitEthernet2/0/0
ip binding vpn-instance L2TP_VPN
ip address 10.110.2.3 255.255.255.240
#

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page35

L2TP VPN Configuration (on WASN)

Route Configuration:
#
ospf 1 vpn-instance L2TP_VPN
area 0.0.0.0
network 10.110.1.0 0.0.0.16
network 10.110.2.0 0.0.0.16
network 212.69.242.132 0.0.0.0

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page36

L2TP Maintenance

display l2tp tunnel slot slot-id cpu cpu-id [ tunnel-id ]

<WASN9770> system-view

[WASN9770] access-view

[WASN9770-access] display l2tp-tunnel slot 1 cpu 1

Slot 1 L2TP tunnel info

------------------------

Group Number

= 1

Local Tunnel ID

= 1

Remote Tunnel ID

= 1

Remote Name

= ISPlns

Remote IP

= 2.2.2.2

Remote Port

= 1701

Sessions

=1

(Number of Results = 1)

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page37

Contents
1. VPN Concept
2. GRE VPN Configuration
3. L2TP VPN Configuration
4. IPsec Tunnel Configuration

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page38

IPSec VPN
Networking
Internet

WASN

Functions
IP headerpacket content

Algorithms
AuthenticationMD5SHA-1

authentication
Packet content encryption

Needed by AH and ESP


EncryptionDES3DESAES

AHESP can be used

Only needed by ESP

separately or together.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page39

IPSec Technique
Internet

WASN

new IP
header

AH

ESP

raw IP

TCP

header

header

data

ESP

ESP

tail

auth

SA
SA

SPI

direction

out

protocol

Esp +AH

Auth

MD5

Encryption

3DES

SPI

direction

in

protocol

Esp +AH

Auth

MD5

Encryption

3DES

SA: Security association is the basis of IPSec. which is a pact set up through negotiation
between two communication entities. This pact regulates the IPSec protocol, coding mode,
key, and valid period of the key.

SPI (security parameter index ) is used to identify a SA from SADB

SA Could be create by Manual or Automatic

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page40

IPSec VPN on WASN9770

domain1

BS

Internet

Access Network

Enterprise1.com

WASN

BS

Enterprise2.com

domain2

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page41

IPSec VPN Tunnel Redundancy


Enterprise1.com

BS
Access Network

Internet
WASN

User

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page42

IPSec Tunnel Configuration


There are four steps in the configuration IPSec Tunnel:

Define
protected data flows

Define
security proposal

Configure
security policy

apply
security policy

Define the data flows that want to be protected by


IPSec . The data flows are distinguished through
the access control lists(ACLs).
A security proposal defines the security protocol,
authentication algorithm, encryption algorithm,
and encapsulation mode to be employed.
the security policy or security policy group defines
the association between data flows and security
proposal (the security measures for a specified
type of data flows), negotiation mode for the
security association (SA), peer IP address (the
start or end point of the protected path), key, and
SA lifetime
Apply the security policy to an interface.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page43

IPSec Tunnel Configuration Step

IPsec Tunnel Configuration Commands list:

Configure the protected data flows


Command

Function

View

acl acl-name match-order { auto |


config }

create an ACL

System view

rule [ rule-id ] { deny | permit }


[ fragment-typefragment-type-name |
source { source-ip-address soucerwildcard | any } | time-rangetimename ]*

set the access control rule for the data


flows

ACL view

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page44

IPSec Tunnel Configuration Step

IPsec Tunnel Configuration Commands list:

Configure the IPSec Security Proposal


Command

Function

View

ipsec proposal proposal-name

create a security proposal and display the


view

System view

transform { ah | esp | ah-esp }

set the security proposal

IPSec proposal
view

ah authentication-algorithm { md5 |
sha1 }

set the authentication algorithm to be


employed by the AH protocol

IPSec proposal
view

esp authentication-algorithm { md5 |


sha1 | null }

set the authentication algorithm to be


employed by the ESP protocol.

IPSec proposal
view

esp encryption-algorithm { 3des | des


| aes128 | aes192 | aes256 | null }

set the encryption algorithm to be


employed by the ESP protocol

IPSec proposal
view

encapsulation-mode { transport |
tunnel }

set the encapsulation mode

IPSec proposal
view

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page45

IPSec Tunnel Configuration Step

IPsec Tunnel Configuration Commands list:

Configuring the Security Policy


Command

Function

View

ipsec policy policy-name seq-number


[ manual | isakmp [ template
template-name ] ]

create a security proposal and


display the view

System view

security acl acl-number

set the security proposal

IPSec policy view and


IPSec policy template
view

proposal proposal-name1 [ proposalname2 ] &<1-6>

set the authentication algorithm to


be employed by the AH protocol

IPSec policy view and


IPSec policy template
view

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page46

IPSec Tunnel Configuration Step

IPsec Tunnel Configuration Commands list:

Configuring the Security Policy : Manual mode for SA creation


Command

Function

View

sa string-key { inbound | outbound }


{ ah | esp } string-key

set the key of the SA, that is, type a


character string as the key.

IPSec policy view

sa authentication-hex { inbound |
outbound } { ah | esp } hex-key

set the key of the authentication


protocol, that is, type a hexadecimal
string as the key.

IPSec policy view

sa encryption-hex { inbound |
outbound } esp hex-key

set the encryption key of the


Encapsulating Security Payload (ESP)
protocol, that is, type a hexadecimal
string as the key.

IPSec policy view

sa spi { inbound | outbound } { ah |


esp } spi-number

set the SPI of the SA.

IPSec policy view

tunnel remote ip-address

set the remote IP address of the


tunnel.

IPSec policy view

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page47

IPSec Tunnel Configuration Step

IPsec Tunnel Configuration Commands list:

Applying a Security Policy to an Interface


Command

Function

View

interface interface-type interfacenumber

display the interface view

System view

ip address ip-address { mask | masklength } [ sub ]

set the IP address of the interface

interface view

ipsec policy policy-name

apply the security policy or security


policy group to the interface

interface view

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page48

IPSec Case
Enterprise1.com
ike peer 1
212.113.159.13

Tunnel3/0/1
(source: loopback)

Enterprise1.com VPN
IPSec VPN

Enterprise2.com VPN
Tunnel3/0/2

Loopback
212.69.242.133

(source: loopback)
ike peer 2
88.156.19.136

Enterprise2.com
Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page49

IPSec VPN Configuration


IKE Proposal:
#
ike proposal 1
encryption-algorithm 3des
authentication-method pre-share
authentication-algorithm md5
dh group1
sa duration 900
#

IKE Peer:
#
ike peer peer-1
exchange-mode main
ike-proposal 1
pre-shared-key abcdef
remote-address 212.113.159.13
ike dpd timer-interval 20 attempt-times 2
#
ike peer peer-2
exchange-mode main
ike-proposal 1
pre-shared-key 123456
remote-address 88.156.19.136
ike dpd timer-interval 20 attempt-times 3

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page50

IPSec VPN Configuration

IPSec proposal:
#
ipsec proposal propo1
transform esp
esp authentication-algorithm
sha1 authenticationalgorithm md5
esp encryption-algorithm des
encapsulation-mode tunnel

IPSec Policy:
#
ipsec policy map1 10 isakmp
security acl 3101
proposal propo1
ike-peer peer-1
pfs dh-group2
sa duration traffic-based 300
#
ipsec policy map2 10 isakmp
security acl 3102
proposal propo1
ike-peer peer-2
pfs dh-group2
sa duration traffic-based 300
#

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page51

IPSec VPN Configuration

VPN Configuration:
#
ip vpn-instance Enterprise1.com
#
ip vpn-instance Enterprise2.com
#
ip vpn-instance IPSec_vpn
#

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page52

IPSec VPN Configuration


Interface Configuration:
Interface Configuration:
interface GigabitEthernet1/0/0
ip binding vpn-instance IPSec_vpn
ip address 10.110.1.3 255.255.255.240
#
interface GigabitEthernet2/0/0
ip binding vpn-instance IPSec_vpn
ip address 10.110.2.3 255.255.255.240

interface LoopBack1
ip binding vpn-instance IPSec_vpn
ip address 212.69.242.133 255.255.255.255
binding tunnel ipsec
#
interface Tunnel3/0/1
ip binding vpn-instance Enterprise1.com
tunnel protocol ipsec
source LoopBack1
ipsec policy map1
#
#
interface Tunnel3/0/2
ip binding vpn-instance Enterprise2.com
tunnel protocol ipsec
source LoopBack1
ipsec policy map2

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page53

IPSec VPN Configuration


Route Configuration:
#
domain domain1
vpn-instance Enterprise1.com
#
domain domain2
vpn-instance Enterprise2.com
#
ip route-static vpn-instance Enterprise1.com 0.0.0.0 0.0.0.0 tunnel3/0/1
ip route-static vpn-instance Enterprise2.com 0.0.0.0 0.0.0.0 tunnel3/0/2
#
ospf 1 vpn-instance IPSec_vpn
area 0.0.0.0
network 10.110.1.0 0.0.0.16
network 10.110.2.0 0.0.0.16
network 212.69.242.133 0.0.0.0

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page54

IPSec Maintenance

display ipsec statistics

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page55

IPSec Maintenance

display ike sa

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page56

Thank you
www.huawei.com

WASN9770
Hardware O&M
www.huawei.com

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

References

Maintenance Manual - Routine Maintenance

WASN9770 documentation (CD-ROM)

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Objectives

Upon completion of this course, you will be able to:

Describe the O&M definition

Describe the content of hardware O&M

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Contents
1. Overview

2. Hardware O&M of WASN9770

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page4

Definition of Routine O&M

Routine maintenance is a type of preventive maintenance.


It is a routine check and maintenance of a device to locate
and clear faults in time when the device is operational.
This ensures the reliable, secure, and stable running of the
device.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page5

Tasks of O&M

The O&M of the WASN9770 mainly includes:

Hardware O&M of WASN9770

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Contents
1. Overview

2. Hardware O&M of WASN9770

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page7

Contents
1. Hardware O&M of WASN9770
1. Hardware Environment Management

2. Board Status Query

3. Alarm Box Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Checking the Power Supply

The Power-on /Power-off sequence must be strictly as below:


power on the cabinet

power off the boards

power on the subrack

power off the subrack

power on the boards

power off the cabinet

The commands for the board Power-on:


Run power on slot to power on the specified board.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Checking the Power Supply

The commands for the board Power-off:


Run power off slot to power off the specified board.

Process of the Power-on check as below:


Check the power supply of the cabinet

Check the power supply of the subrack

Check the power supply of the boards


Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page10

Temperature Query
Run display temperature slot on the local maintenance terminal (LMT)
to query the temperature of the board

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page11

Voltage Status Query


Run display voltage to display the status of the voltage sensor of the
specific slot.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page12

Power Status Query


Run display power to check the status of the power.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page13

CPU usage Query


Run display cpu-usage to display the CPU utilization of a board. .

Notes: By default, the CPU utilization of the master main control


board (SRU) are displayed.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page14

Fan Management

Run fan speed to set the fan working on full speed

or auto mode.

Run display fan to view the status of FAN.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page15

Contents
1. Hardware O&M of WASN9770
1. Hardware Environment Management

2. Board Management

3. Alarm Box Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Board Status Query

Check the board status

For the LMT, go to Device Panel to check whether all boards are
running normally

For CLI, use the display device command

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page17

Interface Status Query

Check the interface status

Use the display ip interface command


interface

Ethernet0/0/0

current state

UP

Line protocol current state

UP

Internet Address

10.77.198.72

Mask

255.255.255.0

Broadcast address

10.77.198.255

The Maximum Transmit Unit

1500 bytes

input packets

228833

input bytes

36489855

input multicasts

output packets

717043

output bytes

113106426

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Board CPU Usage Query

Run display cpu-usage query the CPU usage of all in-position LPUs,
SRUs, and SPUs in the subrack.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page19

Reset boards

Run reset slot to restart the device in the specified slot.

Notes: To upgrade the board software or when some faults occur


to the board, you can reset the board.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page20

Contents
1. Hardware O&M of WASN9770
1. Hardware Environment Management

2. Board Management

3. Alarm Box Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page21

Alarm Box Management

Alarm box

Check the connectivity between the alarm box and emergency


workstation

Check the indicators and alarm buzzer on the alarm box, make sure
no alarm generated for the system

Alarm console

Four levels of alarm: Critical, Major, Minor and Warning

Make sure no different level alarms such as board fault, board reset
and so on

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page22

Alarm Box Management

Run display alarm-box active to display the active alarms of the


alarm box .

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page23

Notes

Reboot Command:

Generally, you are not recommended to use this command, because this command leads
to the short-time breakdown of the network. In addition, when you restart the router,
ensure that all configuration files of the are saved.

Reset slot command:

Before reset the SRU, save the configuration to avoid lose the configuration information.

When you reset the SPU or SRU, if the board is normal, switch the active/standby board,
the user will not be offline. If the standby board is not in the slot, all the user on the active
SPU will be offline after switch active and standby board.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page24

Summary

You can acknowledge the O&M definition of WASN9770

You can use command or GUI to realize the hardware O&M


of WASN9770

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page25

Thank you
www.huawei.com

WASN9770
Software O&M
www.huawei.com

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

References

Maintenance Manual - Routine Maintenance

WASN9770 documentation (CD-ROM)

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Objectives

Upon completion of this course, you will be able to:

Describe the O&M definition

Describe the content of software O&M

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Contents
1. Overview

2. Software O&M of WASN9770

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page4

Definition of Routine O&M

Routine maintenance is a type of preventive maintenance.


It is a routine check and maintenance of a device to locate
and clear faults in time when the device is operational.
This ensures the reliable, secure, and stable running of the
device.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page5

Tasks of O&M

The O&M of the WASN9770 mainly includes:

Software O&M of WASN9770

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Contents
1. Overview

2. Software O&M of WASN9770

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page7

Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Version Management

Run display version to display the version information of the system

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Version Management

Using the check version command, you can check the version of all
the current registered boards.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page10

Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page11

License Management

The license file can dynamically control the availability of certain


features as well as the maximum available resources.
The commands of license operation:
1. Run license download to download the license file from the File
Transfer Protocol (FTP) server to the hard disk of the Switching Route Unit
(SRU)

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page12

License Management
2. Run license upload to upload the license file from the hard disk of
the SRU to the FTP server.

3.Run license active to activate the license file downloaded to the


hard disk

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page13

License Management
4. Run display license file to list the information about the license file.
The information includes the name and validity of the current license file.

5. Run display lincense esn to query the equipment


serial number (ESN).

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page14

License Management

Run display license config to query the license configuration data


that is actually used

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page15

Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Patch Management

The patch operation step:


Step 1: Run patch load to download patch software to the memory
of a board

Step 2: Run patch active to activate the patch software.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page17

Patch Management

The patch operation step:

Step 3: Run patch run to confirm the patch software. Thus, the
patch is valid even if the board is reset and restarted.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Patch Management

The patch operation step:

Step 4: Run display patch to query the license configuration data that
is actually used

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page19

Patch Management

The patch operation step:

If you want to delete a patch, you need to operate as the following


step:
Run patch delete to restore the system to the state before patch
software runs

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page20

Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page21

Log Management

The log management refers to managing the operation logs,


security logs, and alarm logs.
1. Run display operlog to query the operation logs

Note: The operation log file is generated every day and stored to
hd1:/soft/data/olg on the Switching Route Unit (SRU) hard disk.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page22

Log Management
2. Run display seclog to query the security logs

Note: The security logs are stored in hd1:/soft/data/seclg.


One security log file is generated every day.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page23

Log Management
3. Run display alarm log to query the alarm logs

Note: The alarm logs are stored in hd1:/soft/data/alm

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page24

Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page25

Telnet Management

Using the telnet command, you can log in to another router from the
current router through Telnet.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Telnet Management

Using the debugging telnet command, you can enable the Telnet
connection debugging.

Using the undo debugging telnet command, you can disable the
Telnet connection debugging.
<Quidway> undo debugging telnet

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page27

FTP Management

Using the ftp server enable command, you can enable the FTP
server and allow the login of FTP users.
<Quidway> system-view
[Quidway] ftp server enable

Using the undo ftp server command, you can disable the FTP server
and deny the login of FTP users.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page28

FTP Management
PC

WASN
FTP server

FTP client

Using the display ftp-server command, you can display the


parameters of the current FTP server.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page29

FTP Management

Using the display ftp-users command, you can display the


parameters of the current FTP user.

Using the display local-user command, you can view the


attributes of local users.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page30

FTP Management

WASN

PC

FTP client

FTP server

Using the ftp command, you can set up a control connection with
the remote FTP server and enter the FTP client view

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page31

FTP Management

Using the ascii command, you can set the transmission data type to
ASCII.

Using the binary command, you can set file transmission type to
binary.

Using the cd command, you can change the operating directory on the
remote FTP server.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page32

FTP Management

Using the cdup command, you can change the operating directory to
the upper-level directory.

Using the debugging / undo debugging commands, you can


enable / disable the FTP client debugging.

Using the bye command, you can disconnect with the remote FTP
server and return to the user view

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page33

Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page34

File Management --- System Backup

Information about backup

Files Needing Backup

The WASN9770 data stored on the hard disk of SRU board. You need to
back up the data of the active SRU board

The data to be backed up are as follows:


configuration files:

hd1:/vrpcfg.cfg

Alarm data file:

hd1:/bam/data/alm/*.alm

Performance data file:

hd1:/bam/data/prf/*.mrf.bz2

Operation log file:

hd1:/bam/data/olg/*.olg

User information:

hd1:/bam/data/sec/user.ini

Security log:

hd1:/bam/data/seclog/*.seclg

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page35

File Management --- System Backup

Information backup

Before performing system backup, an FTP server is needed

Make sure the WASN can access the FTP server


Use ping command to verify

Make sure on the FTP server, the user that perform the backup has right
to create folders and files
Use ftp command to verify

Make sure on the FTP server, there is enough space for holding the files
Use df command on FTP server to verify (for UNIX/Linux servers)

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page36

File Management --- System Backup

Automatic Backup

Using the dump-ftp ftp-server command, you can dump the files
to be backed up from the main area on the master SRU to the File
Transfer Protocol (FTP) server.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page37

File Management --- System Backup

Manual Backup

Use configfile backup to manual backup configuration files.

After this command, WASN will make a backup of configuration


files on the standby area of SRU hard disk (hd1:/soft/backup)

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page38

File Management --- System Backup

Manual Backup

Use upload configfile to upload the files to an FTP server

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page39

File Management --- Data Restoration

Step 1: Use configfile download to download the configuration files to


standby area of active SRU board (hd1:/soft/backup):

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page40

File Management --- Data Restoration

Step 2: Restore the files to active SRU board

Step 3: Reset the whole system

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page41

Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page42

Information Collection

Function of the information collection:


The information about the running of the WASN9770 must be collected
periodically. The unified information collection tool, which facilitates
information collection and improves maintenance efficiency, is available
on the local maintenance terminal

The information collected by using the information collection tool


includes the following :

Files on the hard disk of the SRU.

Information that can be obtained by using the CLI command.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page43

Information Collection

Operation procedure of Information Collection:


Step 1: Click the Maintenance tab in the navigation tree pane of the
LMT. Double-click Information Collection in Service. The
Information Collection window is displayed:

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page44

Information Collection

Operation procedure of Information Collection:


Step 2: Enter the IP address, user name, and password in the
Login area.
Step 3: Click Save... in the Save Path area to select a path where the
collection result is saved.
Step 4: Select necessary options in the Files and Information areas.
Step 5: Click Execute to collect the information. All the information is
collected, Information collection succeeds.
Step 6: Click Exit. Then, the window is dismissed

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page45

Contents
1. Software O&M of WASN9770
1. Version Management
2. License Management
3. Patch Management
4. Log Management
5. Telnet/FTP Management
6. File Management (System backup and Restoration)
7. Information Collection
8. Context Management

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page46

Context Management (1)

Using the display user-number command, you can view the


number of users of the WASN.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page47

Context Management (2)

Using the display ms-info command, you can view the information
of the specified MS context.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page48

Context Management (3)

Using the deactive user command, you can deactivate the MS based on
the Domain, MSID, BSID, or board.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page49

Notes

Deactive user command:

This command must be used with caution because running this command forces the
specified users out of services.
Undo ip binding vpn-instance command:

Associating an interface with a VPN instance or delete the existing association results in
the deletion of the IP address of the interface and Layer 3 features such as routing
protocols. These features must be re-configured if required.
R3 Interface Configuration

In the scenario where authentication users access the network, two R3 interfaces with
different central processing unit (CPU) numbers must be created if two R6 interfaces with
different CPU numbers are created. For example, if r6if3/0/0 and r6if3/1/0 are created,
you must create r3if3/0/0 and r3if3/1/0.

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page50

Summary

You can acknowledge the O&M definition of WASN9770

You can use command or GUI to realize the hardware O&M


of WASN9770

You can use command or GUI to realize the software O&M of


WASN9770

Copyright 2006 Huawei Technologies Co., Ltd. All rights reserved.

Page51

Thank you
www.huawei.com

Internal

OWL000100 iManager
M2000 V2
System Overview
ISSUE 2.1

HUAWEI TECHNOLOGIES CO., LTD.

www.huawei.com

All rights reserved

The iManager M2000 Mobile Element


Management System is a centralized
mobile network management platform of
Huawei. Using this platform, you can
manage the UMTS/GSM/CDMA/IP
network elements (NEs), manufactured
by Huawei. This presentation covers the
iManager M2000V2 architecture, design
ideas, functions and reliability.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 2

Chapter 1 Product Introduction


Chapter 2 M2000 Architecture
Chapter 3 Function Introduction
Chapter 4 Configuration List

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 3

Network Position of iManager M2000

Network
Management
Layer

NMS
In Telecommunication

Management Network
Element
Management
Layer

(TMN), the M2000 is


Other EMS

Other EMS

M2000

located in the
Element
Management-layer

NE
NE

HUAWEI TECHNOLOGIES CO., LTD.

(EM-layer).

NE
NE

All rights reserved

Page 4

Network Deployment
Alarm box
OMC Client
M2000 Server

OMC Client
(Administrator)

NMS

Area 1
OMC Client2
Alarm box

OMC Client1

OMC Center

Area 2

Firewall
LMT

E1/ATM/IP
Backbone

Firewall

Alarm box

NE1

SQL
Ftp
ASCII Stream

Alarm box LMT

NE2

NE3

NE1

Area 1

HUAWEI TECHNOLOGIES CO., LTD.

NE2

Area 2

All rights reserved

Page 5

CN Standard Network Deployment


24-hour Alarm Monitoring Room
Alarmbox
PS OMC Client
M2000 Server

OMC Client
(Administrator)

Area 1
CS OMC Client2
CS OMC Client1

OMC Center

Alarmbox

Area 2

Firewall

Firewall

Alarmbox

Alarmbox LMT

LMT

SGSN

E1/ATM/IP
Backbone

GGSN

CG

MGW

PS Equipment Room

HUAWEI TECHNOLOGIES CO., LTD.

MSC Server
CS Equipment Room

All rights reserved

Page 6

iManager M2000V2 Ability


M2000V2 managed NEs can be UMTS/GSM/CDMA equipments

and IP devices. The M2000 cannot manage the CDMA NE with the
UMTS or GSM NE at the same time.
UMTS

GSM

CDMA

NodeB

MSC

MSC

RNC

BSC

MSC Server

SGSN

BTS

MGW

GGSN

PCU

PDSN

MSC Server

HLR

BSC

MGW
HLR
CG
SIWF

IP

BTS

Router

RAC

Switch

RAU

Firewall

HUAWEI TECHNOLOGIES CO., LTD.

HLR

All rights reserved

TSC

Page 7

Chapter 1 Product Introduction


Chapter 2 M2000 Architecture
Chapter 3 Function Introduction
Chapter 4 Configuration List

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 8

Brief Introduction of System Architecture

The M2000 system works in client/server mode.


The M2000 software consists of the client software, server

software, and NE mediation software, which is mutually


independent. The client software runs on the client, and the
server software and mediation software run on the server.
The hardware of an M2000 client refers to a PC. An M2000

system can have multiple clients, and can have either one
server or two servers. The two servers constitute a High
Availability (HA) system.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 9

M2000 Physical Structure Overview


A typical M2000 system consists of:

Servers
Clients
Alarm box
Other networking devices
Using a dial-up server, you can operate and maintain

the M2000 system through the Public Switched


Telephone Network (PSTN).

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 10

M2000 Physical Structure of Single Server System

PSTN
Alarm box

Dial-up server

Client 1

Client 2

Server

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 11

M2000 Physical Structure of HA System

Client 1

Active server

Alarm box

Client 2
Cluster console
Disk
array
PSTN
Dial-up server

Standby server

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 12

M2000 Software Architecture Overview


The M2000 software consists of the following sub-systems:

Server Software
Client Software
NE mediation software
Using a dial-up server, you can operate and maintain the

M2000 system through the Public Switched Telephone


Network (PSTN).
Each NE version corresponds to an NE mediation software.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 13

M2000 Software Architecture

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 14

M2000 Server Software Architecture

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 15

M2000 Client Software

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 16

M2000 NE Mediation Software

The M2000 mediation module software consists of a series

of mediation software. Each piece of mediation software


corresponds to one or more NE versions.
The mediation software provides the interface files and

mediation files that the NE needs to access the M2000


system.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 17

Questions
In one network, there are two CSOFTX3000, two UMG8900 and

one HLR9820 need to be connected to the M2000V2 server,


equipments versions are: CSOFTX3000 V100R001,
CSOFTX3000 V100R002, UMG8900 V100R002, UMG8900
V100R002, HLR9820 V100R002.
How many NE mediation software we need to install in M2000V2

server?

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 18

Interfaces (I)
External Interfaces

NMS

The M2000 provides interfaces for the NMS

and the managed NEs, Itf-N interfaces for


various NMS systems and Human Machine
Language (MML) interfaces or binary

FILE

SNMP

CORBA

ASCII
Stream

interfaces for NEs, and manages the IP


devices through the Simple Network

iManager M2000

Management Protocol (SNMP).


Inner
interface

In addition, the files such as NE log files and


performance result files are transported
through the FTP protocol between the M2000

NE

and managed NEs.


HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 19

NE

NE

Interfaces (II)
Internal Interfaces

iManager M2000

The server software, client

software and mediation


software in the M2000 system
communicate with each other
through the CORBA interface.
When the report tool is installed,

the report tool client and the

MML

FILE

SNMP Other

M2000 server communicate in


the WEB mode.

HUAWEI TECHNOLOGIES CO., LTD.

NE

All rights reserved

Page 20

Chapter 1 Product Introduction


Chapter 2 M2000 Architecture
Chapter 3 Function Introduction
Chapter 4 Configuration List

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 21

M2000 Functions List


Centralized Topology Management
Centralized Configuration Management
Centralized Fault Management
Centralized Performance Management
Centralized Software Management
Centralized Security Management
Signaling Tracing
Equipment Panel
System Management
Itf-N Network Management Interface
Entire Network Time Management
Customizable Report
HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 22

Basic Features

Topology Management

Fault Management Configuration Management


access
control
insulate

encrypt
firewall

protect
Security
strategy detect
respond

authentication

Strategy
change

Alarm

Performance Management

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Black list

DOS

Log

Security Management

Page 23

Centralized Topology Management


Topology Object

Management
Topology Navigation

Tree Management
Topology Map

Management
Management by

District

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 24

Centralized Configuration Management


NE Configuration
NE Configuration Query
Soft Switch Resource

Management
Resource Status Query

and Monitoring
NE and Link Report
NE Configuration

Export
NE Configuration

Synchronization

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 25

Centralized Fault Management


Real-Time Alarm Browse
Alarm Statistic and Query
Alarm Correlation Analysis
Alarm Acknowledgement
Alarm Database Displacement
Redefinition of Alarm Severity
Alarm Knowledge Base

Management
Alarm Synchronization
Alarm Shielding
Alarm Customization
Remote Alarm Notification
HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 26

Centralized Performance Management

Performance Counter and

Performance Object
Management
Real-Time Measurement
Real-Time Monitoring
Performance Data

Management
Performance Alarm
Customized Counters

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 27

Centralized Software Management

NE Software Version

Management
NE License Management
NE Data Backup

The software management applies only to the UMTS NEs.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 28

Centralized Software Management


OM Software Upgrade:

Automatic upgrading Clients


from server

Step1: Upgrade Server

NE Software Deployment / Upgrade:

Remote upgrading procedures


Multiple NE software upgrading
simultaneously in two steps
Minimum impact on live services

iManager
M2000 Server
M2000 Client

Step2: Clients in different areas will be


upgraded automatically

iManager
M2000
Server

Step1: Bulk Download


Step2: Bulk Activate
Area1

Area2

HUAWEI TECHNOLOGIES CO., LTD.

Area3

All rights reserved

Page 29

Centralized Security Management


M2000 security management provides:
User Account and Group Management
User Privilege Management
User Monitor
Terminal Management
Log Management

User

System

Network

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 30

Centralized Security Management


Authentication & Authorization
Why can not be operated

Before Login

Login Authorization
IP address
Password
Valid User account
Date & time

Not in
correct time

Joe

NEs

Mike

Group 1

Configuration
Rights Management
Group 2
Maintenance
User group can combine with operation right on demand
Read
Ann

After Login

Harry

System screen unauthorized command, and user can


only find authorized NEs in GUI

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 31

Signaling Tracing
The signaling tracing is a key method used for locating the

faults. The M2000 system traces user signaling messages


of the NEs.
You can create message tracing tasks on the M2000 client,

and specify an NE user to trace its signaling messages in


real time. In addition, you can save these signaling
messages into files for later query.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 32

Equipment Panel
Using the GUI on the M2000 client, you can carry out the
following operations:
View the hardware configuration of the NE devices, such as

the rack, frames, board and port.


View alarms occurring to the hardware of the NE devices.
Carry out device maintenance operations such as resetting

the boards.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 33

System Management
The M2000 system management provides the following functions:
License Management
Remote Maintenance
Citrix Based Client Integration
Online Help
System Status Monitoring
System Data Backup and Restoration
System Uninstall

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 34

Entire Network Time Management


Time Zone Management

The M2000 system can manage the processes and faults


occurring within itself and NEs located in different time zones. It
automatically processes the time change because of different
time zones.
DST

The M2000 system supports the DST system and automatically


processes the time change.
Time Synchronization

The M2000 system provides NTP services to synchronize the


NEs with the M2000 system. With this function, you can ensure
the consistency between network management data, thereby
improving the network status analysis.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 35

Customizable Report

The M2000 system


supports customizable
reports. You can
specify the format and
Template design

Performance

content of a report.
Design template freely

Alarm

Configuration

Choose data freely

Get what you want

Statistic periodically

Basic data

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 36

Chapter 1 Product Introduction


Chapter 2 M2000 Architecture
Chapter 3 Function Introduction
Chapter 4 Configuration List

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 37

Typical Single-Server Configuration for M2000 Server


Sun Netra 240

Sun Fire V890

Sun Fire E4900

Number of
CPUs

Main Frequency
of the CPU
(GHz)

1.5

1.35

1.35

1.35

1.5

1.5

Memory (GB)

16

32

16

32

Hard disk (GB)

2 x 146

4 x 146

2 x 73

Disk array (GB)

None

1 x 3320
(A 3320 disk array consists of
eight 73 GB hard disks.)

1 x 6140
(A 6140 disk array consists of
fourteen 73 GB hard disks)

Accessories

DVD/Ethernet
adapter/DATA72 tape
drive/English
documentation

DVD/Ethernet
adapter/DATA72 tape
drive/English documentation

DVD/Ethernet adapter/DATA72
tape drive/English
documentation

Operating
system

Solaris 10/English
documentation

Solaris 10/English
documentation

Solaris 10/English
documentation

Database

Sybase 15.0/English
documentation

Sybase 15.0/English
documentation

Sybase 15.0/English
documentation

Application
software

M2000 server
application software

M2000 server application


software

M2000 server application


software

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 38

Typical HA Configuration for M2000 Server


Sun Netra 240

Sun Fire V890

Number of CPUs

Main Frequency of
the CPU (GHz)

1.5

Memory (GB)

Hard disk (GB)

2 x 146

4 x 146

2 x 73

Disk array (GB)

2 x 3320
(A 3320 disk array
consists of five 73 GB
hard disks.)

2 x 3320
(A 3320 disk array
consists of eight 73GB
hard disks.)

1 x 6140
(A 6140 disk array
consists of fourteen
73GB hard disks.)

Accessories

DVD/Ethernet
adapter/DATA72 tape
drive/User manual

DVD/Ethernet
adapter/DATA72 tape
drive/User manual

DVD/Ethernet
adapter/DATA72 tape
drive/User manual

Operating system

Solaris 10/English
documentation

Solaris 10/English
documentation

Solaris 10/English
documentation

Database

Sybase 15.0/English
documentation

Sybase 15.0/English
documentation

Sybase 15.0/English
documentation

Application

M2000 server
application software

M2000 server application


software

M2000 server
application software

HUAWEI TECHNOLOGIES CO., LTD.

Sun Fire E4900

1.35
8

16

All rights reserved

8
1.5

32

16

Page 39

32

Typical Configuration for the Cluster Console


(Sun Netra 240)
Item

Configuration

CPU (GHz)

1.5

Memory (GB)

Hard disk (GB)

2 x 146

Accessories

DVD/Display card/Ethernet adapter/KVM/User


manual

Operating system

Solaris 10

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 40

Common Networking Equipment

Item

Configuration

Router

M2000 side: Quidway AR46-20


NE side: Quidway AR28-13 and Quidway AR28-10

Switch and Hub

Quidway S2016HI, Quidway S3928EI and 16-port Hub

Timeslot cross
multiplexer

Mecury3600

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 41

Typical M2000 Client Configuration

Item

Configuration

CPU

P4/2.8 GHz

Memory

512 MB

Hard disk

80 GB

Accessories

CDROM/Floppy Drive/Ethernet Adapter/Sound Card/17


LCD Display

Operating system

Windows 2000 professional SP2 (or a later version)

Application software

M2000 client application software

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 42

System Capacity

Configuration

Management capacity

Server hardware

15 equivalent NEs

Sun Netra 240 (2 CPUs)

25 equivalent NEs

Sun Fire V890 (2 CPUs)

50 equivalent NEs

Sun Fire V890 (4 CPUs)

55 equivalent NEs

Sun Fire E4900 (4 CPUs)

90 equivalent NEs

Sun Fire V890 (8 CPUs)

120 equivalent NEs

Sun Fire E4900 (8 CPUs)

According to the complexity of NEs:


For RAN, every 50 cells = 1 equivalent NE
For MSC Server, each MSC Server = 4 equivalent NE

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 43

Performance Data Processing Capacity

Server model

Performance data processing (message/hour)

Sun Netra 240 (2 CPUs)

1.2 million

Sun Fire V890 (2 CPUs)

1.8 million

Sun Fire V890 (4 CPUs)

3.6 million

Sun Fire E4900 (4 CPUs)

4.5 million

Sun Fire V890 (8 CPUs)

7.2 million

Sun Fire E4900 (8 CPUs)

9 million

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 44

Alarm Data Storage Capacity

Server
hardware

Event
alarm

History
fault alarm

Current
fault alarm

Shielded
alarm

Sun Netra240

800 000

800 000

100 000

100 000

Sun Fire V890

5 000 000

5 000 000

600 000

600 000

Sun Fire E4900

7 000 000

7 000 000

800 000

800 000

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 45

Alarm Processing Capacity

Server

Peak alarm processing capacity (record/second)

Sun Netra 240 (2 CPUs)

20

Sun Fire V890 (2 CPUs)

30

Sun Fire V890 (4 CPUs)

50

Sun Fire E4900 (4 CPUs)

55

Sun Fire V890 (8 CPUs)

90

Sun Fire E4900 (8 CPUs)

100

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 46

Thank You
www.huawei.com

Internal

OWL000100 iManager
M2000 V2
Operation Guide (1)
www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Foreword

iManager M2000 System is HUAWEI centralized O&M Center


which could access HUAWEI 3G WCDMA serials products.
As an important part of WCDMA serials, M2000 mainly
provides 3G devices operation and maintenance functions.

The Slide mainly covers iManager M2000 operations,


include login to the system, setting the system, using
topology management and operating NEs.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 2

Content
Content
System Management
Topology Management
Fault Management

www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 3

System Management
System Management include:
System Login
System Setting
System Monitor
Region Setting
Toolbars customize
Broadcast Message
Security Setting
Change Password
Maintenance Client Setting
LMT Prompt Setting

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 4

System Login

includes:

HUAWEI TECHNOLOGIES CO., LTD.

How to login M2000 Client system

All rights reserved

Page 5

How to Login the system


Starting GUI and input User name and password
Admin is the system administrator and the
initial user of system;

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 6

How to Login the system


Loading

prompt will be
showing

After loading data, network


topology will be shown.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 7

System Settings

Includes:

HUAWEI TECHNOLOGIES CO., LTD.

Output Setting

Terminal Setting

System Login Mode

Time Mode

All rights reserved

Page 8

System Settings

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 9

Output Settings

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Auto scroll to the latest info while new


messages comes.

The maximum lines showing in the


output dialog can also be set.

Page 10

Locking Interval

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Operator can set the terminal lock which


could prevent illegal usage.

Terminal will be locked automatically


after predefined time interval.

Terminal lock can also be activated or


disabled as well.

Page 11

System Login Mode

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 12

Time Mode

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 13

System Monitor

Includes:

HUAWEI TECHNOLOGIES CO., LTD.

Performance Monitor

Hard-disk Monitor

Database Monitor

Service Monitor

Process Monitor

NE Monitor

System Monitor Configuration

All rights reserved

Page 14

Monitor Browser

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 15

Performance Monitor

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 16

Harddisk Monitor

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 17

Database Monitor

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 18

Service Monitor

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 19

Process Monitor

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 20

NE Monitor

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 21

Save the Information into various format files

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 22

System Monitor Configuration

You can set the


thresholds for the
specified system
monitoring items. When
the value of an item
reaches the threshold,
the related icon in the
System Monitor
Browser dialog box is
displayed in red.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 23

Configuration for Performance Monitor


Threshold can
be changed
here

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 24

Configuration for Harddisk Monitor

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 25

Configuration for Database Monitor

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 26

Configuration for Service Monitor

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 27

Toolbars Customize

Includes:

HUAWEI TECHNOLOGIES CO., LTD.

Toolbars Customize

All rights reserved

Page 28

Toolbars Customize

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 29

Toolbars Customize
Default
Setting

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 30

Broadcast Message

Includes:

HUAWEI TECHNOLOGIES CO., LTD.

Broadcast Message

All rights reserved

Page 31

Broadcast Message

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 32

Security Settings

Includes:

HUAWEI TECHNOLOGIES CO., LTD.

Security setting parameters

Change password

All rights reserved

Page 33

Security Policy

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 34

Security Settings

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 35

Tips!
Because only one user is allowed to login and establish sessions in the

single user mode, all other online clients will be forced out after the mode
is switched. Be sure to set the switching delay time according to actual
conditions, so that other clients can perform related operations before exit.
When you log in to M2000 as the current user (including the admin and

common users), if the successive password input errors exceed the value
in Max login attempts, this account will be locked, so as to prevent the
system from being attacked by illegal users. In this case, you cannot login
the system again with this account unless it is unlocked by the system.
Therefore, the user to log in to the system should remember the password
to avoid the account being locked due to error inputs.
The locked user can log in to the system some minutes later (the value in

Auto unlock) with the correct password.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 36

Tips!
All the users having the security management unlock permission can

unlock common users who are locked. The procedures are as follows.
Log in to the system as the admin user and select Security > Security
Management. Click User in the Security Management dialog box. Then
right-click a locked user and select Unlock User from the popup menu.
The super user admin" can Unlock User.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 37

Unlock User

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 38

Change Password

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 39

Change Password

The password of admin cannot be less than 8


characters.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 40

Maintenance Client Settings

Includes:

HUAWEI TECHNOLOGIES CO., LTD.

Login NE Via M2000 Proxy

LMT Prompt Setting

View NM License Info

All rights reserved

Page 41

Login NE via proxy server of M2000

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 42

Login NE via proxy server of M2000

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 43

LMT Prompt Setting

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 44

View NM License Info


Help > About > License Information

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 45

Content
Content
System Management
Topology Management
Fault Management

www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 46

Topology Management

Includes
Introduction to Physical Topology
NE Management
Link Management
Subnet Management
Topology View Management

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 47

Object of Topology Management


Object of topology Management
Provides the overview of the whole network;
Provides the states or status of NEs\links\subnets for user;
Provides the function to operate or manage these NEs\Links\Subnets;
Topology Management include:

NEs Management
Link Management
Subnet Management
View Management

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 48

Physical Topology
Topology views consist of physical topology view and machine

topology view. The operations in the two views are similar,


facilitating device management from different accesses.
Physical Topology Interface
Topology Toolbar and Shortcut Menu
Shortcut Menu of NE
Shortcut Menu of Subnet
Shortcut Menu of Link
NE State
Modify Attributes or Background of the Physical Topology
Navigation Tree

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 49

Physical topology Interface

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 50

Shortcut Menu of NE

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 51

Shortcut Menu of NE (2)

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 52

Shortcut Menu of Subnet

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 53

NE States

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 54

NE Alarm States

On the physical topology, the connection states of the NEs are indicated by the
NE icon and the state icon. The state icon is to the upper left of the NE icon.
Multiple state icons can be combined to indicate that the NE is in multiple states
at the same time. The default state icon are listed in the table.
In the physical topology view, the alarm states of the NEs are indicated by the
different color NE icons. Only when there is a fault alarm on a physical NE, the
NE icon changes to indicate the alarm. If there are several fault alarms occurring
on an NE at the same time, the NE icon indicates the most serious alarm level.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 55

Topology Toolbar

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 56

Topology Toolbar (2)

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 57

Set Topology Background

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 58

NE Management
Through the topology view, you can create physical NEs and

set up communications between the NEs and the M2000, so


that the M2000 manages and maintains all the NEs. A group
object NE can work as both an NE and a subnet.
Physical NE Management
Virtual NE Management

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 59

Create NE
Choose Topology > Main Topology. The Main Topology window is

displayed.
In the physical topology navigation tre or on the physical view, right-

click the subnet of the NE to be created and choose New > Create
Topo Object on the shortcut menu.
From the navigation tree in the Create topo objects dialog box,

select a specific NE node mapping the NE node under Single Create.


In the right part of the window, configure NE-related information.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 60

Create NE

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 61

Automatically Searching for NodeBs


Choose Topology > Main Topology.
From the topology navigation tree or the topology view, right-click an

RNC and choose Search NodeB on the shortcut menu.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 62

Create NE in Bulk (.csv or .ini format)

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 63

Delete NE

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 64

Link Management
Link management includes the management on both physical and virtual

links.
The physical links refer to the connection between two physical NEs. The

physical links can be set up automatically.


The virtual links refers to the logical communication between two NEs.

The virtual links can only be set up manually.


After a link is set up successfully between two NEs, a link is displayed

between these two NEs in the physical topology.


A link set is set up when more than one link exists between two NEs.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 65

Create Physical Link

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 66

Create Virtual Link

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 67

Subnet Management
Definition Of Subnet

That is, the NEs in the entire network are divided into different subnets by
such rules as region or management area. A subnet can be nested in
another one.
The purport of Subnet Management

A major feature in the network management of iManager M2000 is


hierarchical management.
Subnet Management Include

How to Create/Modify/delete a Subnet

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 68

How to Create a Subnet


Select the path in the Physical

Topo Navigation, right click,


select [New] > [Create Physical
Subnet], and enter the [Create
Physical Subnet] dialog box.
Select the [Basic attribute] tab,

and input the basic attributes of


the subnet .
select the [Objects selection] tab.

You can move the objects into


destinction Subnet. Click <OK>

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 69

Topology View Management


Print and Preview Topology
Display Overview Map
Filter Topology Display
Search Object
Refresh Topology
Save Positions
Set Background
Alarm Showing Configuration
Setting Topology Tips

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 70

Print and Preview Topology

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 71

Display Overview Map

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 72

Search Object
Using this function, you can find and locate the specified NE, link, link set and

subnet.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 73

Alarm Display on Topology View

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 74

Filter and Legend

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 75

Filter and Legend

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 76

Refresh Topology
Using this function, you can refresh the physical topology.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 77

Save Position
Using this function, you can save the changed icon positions

on the topology view.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 78

Content
Content
System Management
Topology Management
Fault Management

www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 79

Alarm Management

The centralized fault management system of


iManager

M2000

operations:

provides

Client

the

following

Configuration,

Alarm

Setting, Alarm Query and Alarm Statistics.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 80

Alarm Categories
Alarms can be categorized based on two principles:

By alarm content: event alarms and fault alarms


By alarm handling and clearance: history fault alarms and
shielded alarms

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 81

Four Categories of Alarms


These four categories of alarms are described as follows:
Fault alarms, such as a board fault alarm, are generated when faults

occur to devices or exceptions occur to key functions. Fault alarms are


more severe than event alarms. Fault alarms can be cleared.
Event alarms, such as a congestion alarm, are occasionally generated

during the equipment operation. The event alarms indicate only the
equipment status at a certain point of time. The system generates event
alarms periodically to indicate the changing equipment status. Event
alarms do not need manual handling.
History fault alarms refer to the cleared and acknowledged fault alarms.
Shielded alarms are generated during a short period of time. The alarms

matching the correlation rules set on the M2000 client are shielded alarms,
and they are stored in the M2000 shielding base. Shielded alarms can
only be fault or event alarms.
HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 82

Alarm Levels
Alarm severity indicates how severe a generated alarm is. Sorted in the descending
order, alarms have four levels of severity: critical, major, minor, and warning alarms.
Critical alarms, such as the power circuit fault alarm and the output clock fault

alarm, affect the whole system operation. Critical alarms require immediate handling.
Major alarms, such as alarms about disconnected fibers or physical line faults,

occur only to boards or lines. If not handled timely, these alarms may affect
subscriber services.
Minor alarms, such as the alarm for bit errors in some physical lines, refer to

common status alarms that indicate the working status of boards or lines.
Warning alarms indicate status changes or events which do not affect the system

performance or subscriber services, but which may interest the operator may have
interest. Some warning alarms prompt when the equipment returns to normality.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 83

Alarm Types
Power alarms: related to the power supply system
Environment alarms: related to the equipment environment, such as the

temperature, humidity, and connection control


Signaling alarms: related to communication signaling
Trunk alarms: related to trunk circuits
Hardware alarms: related to boards such as the clock and CPU
Software alarms: related to the software
Running alarms: related to and generated during the system operation
Communication alarms: related to the communication system
QoS alarms: related to the service quality
Processing error alarms: related to exceptions
OMC alarms: related to the M2000 system

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 84

Relationship Between Alarm Categories and


Alarm Statuses

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 85

Alarm Processing procedures

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 86

Storing Alarm

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 87

Querying and Browsing Alarms


Query the fault alarms stored in the M2000 alarm database.

Procedure
To query current fault alarms, perform the following steps:
1) Select Monitor > Current Fault Alarms.
2) In the Filter dialog box, set the alarm query conditions.
3) Click OK. The query result is displayed in the browse window.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 88

Current Fault Alarms Query Condition

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 89

Current Fault Alarms Result

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 90

Current Fault Alarms Detailed Information

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 91

Save Current Fault Alarms

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 92

Query Event Alarm


Procedure

To query event alarms, perform the following steps:


1) Select Monitor > Event Alarms
2) In the Filter dialog box, set the alarm query conditions.
3) Click OK. The query result is displayed in the browse window.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 93

Event Alarm - Result

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 94

Query History Alarm


Procedure
To query history fault alarms, perform the following steps:
1) Select Monitor > History Fault Alarms.
2) In the Filter dialog box, set the alarm query conditions.
3) Click OK. The query result is displayed in the browse window.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 95

Query Masked Fault Alarms


Procedure
To query history fault alarms, perform the following steps:
1) Select Monitor > Masked Fault Alarms.
2) In the Filter dialog box, set the alarm query conditions.
3) Click OK. The query result is displayed in the browse window.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 96

Query Masked Event Alarms


Procedure
To query history fault alarms, perform the following steps:
1) Select Monitor > Masked Event Alarms.
2) In the Filter dialog box, set the alarm query conditions.
3) Click OK. The query result is displayed in the browse window.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 97

Displaying Fault Alarms by Status


Procedure
To query history fault alarms, perform the following steps:
1) Select Monitor > Browse Current Fault Alarms By Status.
2) In the Filter dialog box, set the parameters for the fault alarm display. Click OK.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 98

Displaying Event Alarms by Status


Procedure
To query history fault alarms, perform the following steps:
1) Select Monitor > Browse Event Alarms By Status.
2) In the Filter dialog box, set the parameters for the fault alarm display. Click OK.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 99

Set Alarm Query Template (1)

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 100

Set Alarm Query Template (2)

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 101

Collecting Statistics on Fault Alarms


Procedure
1) Select Monitor > Fault Alarm Statistics.
2) In the Statistic Filter dialog box, set the fault alarm statistical conditions, and then click OK.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 102

Collecting Statistics on Fault Alarms


Procedure
1) Select Monitor > Fault Alarm Statistics.
2) In the Statistic Filter dialog box, set the fault alarm statistical conditions, and then click OK.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 103

Statistic Table

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 104

Statistic Pie (1)

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 105

Statistic Pie (2)

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 106

Acknowledging Alarms Manually


Manually acknowledge the alarms displayed in the alarm list.

Procedures:
1) In the window for browsing the alarm query result, select an unacknowledged
alarm.
2) Right-click the alarm and select Acknowledge.
If the alarm you click is acknowledged, Acknowledge in the shortcut menu is
disabled, and Unacknowledge is enabled
3) In the Confirmation dialog box, click Yes.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 107

Acknowledging Alarms Automatically


Set conditions for the system to acknowledge alarms automatically.

Procedures:
1) Select Monitor > Settings > Auto Acknowledge Rule.
2) In the Auto Acknowledge Rule dialog box, set the parameters of auto
acknowledgement. Click OK.

After auto acknowledgement is enabled, the M2000 acknowledges the fault

alarms and event alarms that match the preset conditions.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 108

Creating User Defined Alarms


Define a new alarm.
The M2000 system generates alarms when faults occur to a cabinet,

Subrack, slot, or port of an NE. These alarms show what part of the
equipment requires maintenance and what faults require handling.
Procedures:
To create a user defined alarm, perform the following steps:
1) Select Monitor > Settings > NE Alarm Settings. The NE Alarm Settings dialog box is
displayed.
2) Click the User Defined Alarm tab and then the Alarm Definition tab. Click Add.
The Add User Defined Alarm dialog box is displayed.
3) Set the parameters for the user-defined alarm.
4) In Alarm Definition, click Apply.
5) Click the Alarm Binding tab, and click Add. The Add Alarm Binding dialog box is displayed.
6) Select an NE from the Select NE tree.
7) Select an alarm from the Select Alarm tree.
8) Set parameters. Click OK.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 109

Redefining the Alarm Severity

Redefine the severities of the fault or event alarms of an NE or the M2000.

Procedures:
1) Select Monitor > Settings > Level Redefine.
2) Click Add. In the Add level Redefine Setting dialog box, set the parameters for the alarm
level redefinition.

Click
next to Alarm Name. In the Select Alarm Name dialog box, select the alarm
whose level you want to redefine. Click OK.

In the Redefine Level drop-down list, select the level for the alarm after redefinition.

In the Memo text box, set the remarks as required.

Select or clear the Enable check box as required.

In the Alarm Source tab, click Select. In the Select object window , select the objects that
raise alarms. By default, all the objects are selected

3) When the objects in Alarm Source report the alarms that are set in Alarm Name, the alarm
level is redefined.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 110

Managing the Alarm Knowledge Base


The M2000 provides the alarm knowledge base to record and

share experiences for handling alarms. You can record your


alarm handling experiences in the knowledge base, or know
about others' experiences from the knowledge base.
The M2000 supports viewing, modifying, importing, and

exporting the alarm knowledge base.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 111

Recording Alarm Handling Experience


Operation:
1) Select Monitor > Settings > Explain and Experience.
2) In the Search by name text box, enter the key word of an alarm name. In
the Alarm names navigation tree, alarm names with the key word are
listed.
3) In the Alarm names navigation tree, choose an alarm name, Click Modify.
4) In the Modify Experience group box, enter the alarm handling experience.
5) Click OK.

The knowledge on this alarm is modified.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 112

Thank you
www.huawei.com

Internal

OWL000100 iManager
M2000 V2
Operation Guide (2)
www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Foreword

iManager M2000 System is HUAWEI centralized O&M Center


which could access HUAWEI 3G WCDMA serials products.
As an important part of WCDMA serials, M2000 mainly
provides 3G devices operation and maintenance functions.

The Slide mainly covers iManager M2000 operations,


include Fault ManagementConfiguration Management
Performance Management and Security Management.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 2

Contents
Contents
Configuration Management
Performance Management
Security Management

www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 3

Configuration Management

Configuration Management system performs the

organization and management on the equipment resource of


the whole 3G network;
The configuration management system provides friendly

interfaces for users to configure signaling links and circuits


between NEs in the WCDMA system, including signaling
configuration and circuit configuration related with AAL2,
IMA, IPOA, MTP3, MTP3B and SAAL.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 4

Configuration Management - Features


The M2000 provides an integrated management on

the NE configuration.
You can configure an NE by executing MML

commands or starting NE LMTs on the M2000 client.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 5

Configuration Management

Includes
Querying NE Configuration
Displaying the Basic NE Configuration
Saving the Basic NE Configuration
Synchronizing the NE Configuration
Managing NE User Account
Follow-Up Report Browser
Task Management
Executing NE MML Commands

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 6

Querying NE Configuration
When you add a physical NE to the topology, the M2000 system gets the

configuration of this NE through auto-synchronization, and saves the NE


configuration to the M2000 server. The NE informs the M2000 of any
configuration changes to update the NE configuration on the server.
Two types of configuration data are involved:

Physical data: such as the data related to cabinets, subracks, boards,


and other physical devices configured for an NE
Logical data: data not directly related to the physical structure of the
NE. Such data includes IP address, cell number , route number.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 7

Working Theory of Configuration System


NE Management

Functionality
Management
(Logical)

Equipment
Management
(Physical)

AAL2

Frame

IMA

Board

IPOA
MTP3 (SS7 Link)
MTP3B
SAAL
SS7Circuit
HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 8

Working Theory of Configuration System


Physical
Equipment
Frame
Object

Frame

Board
Board

Logical
Function
Destination Signaling Point
IntraOfficeSigPoint
Signaling Link Set
Object
Signaling Link

SigLinkSet

Signaling Route
SigLink

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 9

SigRoute

Using MIT Browser

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 10

Procedure using MIT Browser

To use the MIT browser, perform the following steps:


1) Select Configuration > MIT Browser.
The MIT Bowser dialog box is displayed, as shown in previous slide.
2) Select an NE from the navigation tree on the left.
The right pane displays the properties of the NE. The NE on the navigation tree is
expandable.
3) Click + on the left of the NE node.
The configuration types of the NE are displayed in the tree.
4) Click one type.
The data of this type is shown in the pane on the right. The type is expandable.
5) Repeat step 3 and 4 to view other configuration data.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 11

Displaying the Basic NE Configuration


Procedure
To display the basic NE configuration, perform the following steps:
1) Select Report > NE Report.
The NE Selection dialog box is displayed.
2) Select the NEs and then click OK.
The NE Report dialog box is displayed, as shown next slide.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 12

NE Report
Display the basic NE configuration, such as the NE name, type,

and version, in a table.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 13

Saving the Basic NE Configuration

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 14

Synchronizing the NE Configuration


Procedure
To synchronize the NE configuration manually, perform the

following steps:
1) Select an NE from the Topology map.
2) Right-click the NE and select Synchronize NE, as shown next
slide

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 15

Synchronizing the NE Configuration

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 16

Synchronize the NE Configuration Automatically.

Synchronize the NE configuration automatically.


The M2000 synchronizes the NE configuration with the NE in the

following cases:
An NE is added to the topology and connected to the M2000.
The NE configuration is changed through the M2000 or LMT.

Note: The M2000 system performs the synchronization automatically. No


manual operation is necessary.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 17

Executing NE MML Command


MML commands are used to operate and maintain NEs, such

as configuring NEs and querying NE settings.


Procedure
To display the MML command window, perform the following steps:
1) Select Configuration > MML Command.
The MML Command window is displayed.
2) Select an NE and the version of this NE from the left navigation tree.
The GUI displays the MML Command tree and the Command Input field.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 18

MML Command Input

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 19

Tips

You can apply one command to several NEs at the same time as follows:

Select multiple NEs of the same type, and then select the command.
These NEs, however, must be of the same type.
If more than one report is returned for the command, only the first one is

displayed in Common Maintenance. Select Configuration > Follow-up


Reports Browser to view the other reports.
The parameters in red are mandatory. The other parameters are optional.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 20

MML Command Script


Set the script mode and save the

MML commands to the script. You


can execute multiple MML
commands by executing the script.
Procedure
To execute multiple MML commands through a
script, perform the following steps:
1) Select Configuration > Script Command.
The Script Command dialog box is displayed.
2) Click Create at the bottom left corner of the
window.
The Create Task dialog box is displayed.
3) Enter the task name, select a script, and select
Immediate Task. Click OK.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 21

Contents
Contents
Configuration Management
Performance Management
Security Management

www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 22

Introduction of Performance Management

Through the performance measurement, you can measure and


observe the equipment security and running status, the
signaling connection status, and the utilization of the user and
system resources. This function provides reliable data support
for the measurement, designing and operation management of
the communication network.

M2000 provides two ways of performance measurement: the


periodic measurement and the real-time measurement.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 23

Performance Management
Includes:
Introduction of Performance Management
Querying Performance Results
Saving Performance Results into a File
Synchronizing Performance Data
Managing Performance Measurement
Setting Extended Performance Counters
Setting Measurement Objects
Managing User Defined Counters
Managing Performance Monitoring

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 24

Periodic Measurement Counters (30mins)


Periodic Measurement Counters define what to measure. Based on the

source, measurement counters fall into the following two categories:


NE counters defined for an NE. The NE periodically reports the
measurement results of all the default performance counters to the
M2000. The NE performance counters consist of Key Performance
Indexes (KPIs) / Default Counter and Extended Counters.
Counters defined on the M2000 client, that is, user defined counters.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 25

Periodic KPIs / Default Counter


Periodic measurement for KPIs/default counter is automatic activated

in M2000 to collect every NEs measurement result once they are


connected.
KPIs refer to the key default counters defined for an NE. The NE

periodically reports the measurement results of all these counters to the


M2000 except Extended Counter, and the M2000 saves the results to
the performance database for future queries.
These counters cannot perform add, modify, or delete.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 26

Periodic Extended Counters


Extended counters are also default counters defined for an NE. The NE

also reports results of all these counters to the M2000. You can, however,
set on the M2000 client whether to save the results to the performance
database.
You can select or clear the extended counters during the M2000

operation.
When you select an extended counter, the measurement results of the
extended counter are saved to the M2000 performance database for
future queries.
When you clear an extended counter, the M2000 does not save the
measurement results of the extended counter to the performance
database. Accordingly, this counter cannot be queried in the database
later.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 27

User Defined Counters


User defined counters refer to those that are defined on the M2000 client.
Define the user defined counters by adding, subtracting, multiplying, and

dividing the system default counters (both KPIs and extended counters).
You can add, modify, or delete the user defined counter during the
M2000 operation

Note: The real-time measurement does not support the user defined
performance measurement counter.
HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 28

Periodic Default Counter Vs Extended Counter

M2000s user
manually
activate the
counters to be
save in M2000
system

NEs Counters
Save Automatic
activated once the
NE connected to
M2000 system

Measurement
period is 30mins

Default Counters

Extended Counters
PM
database

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 29

Measurement Objects
The measurement object defines what to measure. The measurement

object can be physical concepts (such as a board or subrack), or logical


concepts (suck as a cell).
Different measurement counters are designed based on the measurement

object.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 30

Measurement Periods
A measurement period refers to the interval for the NE to report

measurement results. The NE reports the measurement results to the


M2000 periodically. The M2000 analyzes the results and then saves the
results to the database for future queries.
The following measurement periods are available:5 minutes, 15 minutes,

30 minutes, 60 minutes, or 1440 minutes (1440 minutes equal to 24


hours).
Measurements with the period as 5 minutes or 15 minutes are called

real-time measurements or short period measurements. Only some NEs


support short period measurements.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 31

Performance Measurement Procedure

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 32

Performance Measurement Procedure


When a measurement period ends, the NE measures the counters,

including the KPIs and specified extended counters. The NE collects


the measurement results, that is, the performance data, and reports
them to the M2000.The mediation layer in the M2000 server analyzes
the received data. The performance server saves the required
performance data to the database. Meanwhile, the M2000 server
calculates user defined counters based on the received data or
performance database.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 33

Saving Performance Data


After receiving performance data from an NE, the M2000 analyzes

the performance data and then saves the data to the database. The
M2000 does not save the results collected for the user defined
counters to the performance database. When these results are
queried, the M2000 calculates the results through a set formula and
displays them through the client.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 34

Displaying Performance Data


The M2000 client displays all the data stored in the M2000 performance

database. This simplifies data query. You can save the data to files.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 35

Querying the Data for Performance Measurements


with periodic period

Query the results of the performance measurements with long periods, such as
30 minutes, 60 minutes, or 24 hours

Procedures:
1) Select Performance > Query Result.
The Query Result dialog box is displayed. Query the results in two ways: setting
new query conditions or using conditions set in the template.

To set new conditions, see step 2 in this section.

To use the conditions set in the template, see step 4 in this section.

2) In Query Result, click New Query.


The Query dialog box is displayed.
3) In the left navigation tree, select the NE, measurement set, and measurement unit.
The right part of the dialog box contains three tabs. Select objects in the Object
Selection tab and counters in the Counter Selection tab, and set Time and
Query Period in the Other Setting tab. Click Query. The queried performance
data is displayed.
4) Select the template from the left navigation tree and right-click. Select New Query
and select the time. The system displays the results. The task is complete.
HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 36

Example
For example, to set query conditions to measure the CPU usage of the NE

RNC403, perform the following steps:


Procedures:
1) Select Performance > Query Result.
The Query Result dialog box is displayed.
2) Click New Query.
The Query Dialog box is displayed.
3) Select the NE RNC from the left navigation tree, the measurement set
Measurement related to IMS, and the measurement unit Measurement related
to IMS.
4) Select all the objects of RNC403, as shown in next slide.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 37

Select Query Result with New Query

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 38

Step 5 - Object Selection

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 39

Step 6 - Set Counter Selection


Select the measurement counters in the Counter Selection tab,

Measuring
Counter

Unmeasured
Counter

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 40

Step 7 - Set Parameters of Other Setting

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 41

Set Parameters of Other Setting

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 42

Range Vs Section setting

Set the start


time and stop
time

Only valid
during the
peak hour!

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 43

Query Period and Sort function

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 44

Step 8 Click Query

No output!

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 45

Tips
In step 8, if the system prompts All Counter to query are Unavailable

Now, infer that these counters are extended counters. You must select the
counters manually, as follows: Select Counter Setting in the system
prompt window or select Performance > Counter Setting, select the
extended counters, and then click Apply (See Next Slide). In Query
Result, repeat steps 2 and 3.
Wait for the next 30mins periodic measurement cycle (e.g 12:00, 12:30,

13:00, 13:30) then output of this counter will be available if these


EXTENDED COUNTER has never activated before, it means no record in
the M2000 database yet.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 46

Activate the Extended Counter

These measurement
counters are extended
counters. They are
selected manually.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 47

Ready for Query


Extended
Counter
activated.

Click on Query
to get the
outputs

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 48

Periodic Performance Outputs Table format

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 49

Periodic Performance Outputs Line Chart format

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 50

Periodic Performance Outputs Bar Chart format

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 51

Applying a Template
Procedures:

1) Select Performance > Query Result.


The Query Result dialog box is displayed.
2) Click New Query.
The Query dialog box is displayed.
3) In the left navigation tree, select the NE, measurement set, and measurement unit.
The right part of the dialog box contains three tabs. Select objects in the Object
Selection tab and counters in the Counter Selection tab, and set Time and
Query Period in the Other Setting tab. Click Save Template. The system
displays Save as.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 52

Save Template For Next Query

Follow your
Login User
account

Name for the


template

Click Here

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 53

Query Result using Template


4) Enter a name for the template, and click OK to save it.
To use the template to query measurement results, right-click a template from the
left navigation tree in Query Result.
5) Select New Query and the time, as shown below.
The queried results are displayed.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 54

Benefit using Template for query

Short-Cut to
set the
Condition for
Query

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 55

Saving the Performance Data to a File


Save the queried results of the performance measurement to a

TXT, HTML, CSV, or XLS file.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 56

Synchronizing the Performance Data Manually


During the M2000 running, measurement results may be missing due to

many reasons, such as the disconnection of NEs from the M2000 within
a period of time.
When periodic measurement results are missing, you can recollect

them from the NE by synchronizing periodic measurement results.


Obtain performance measurement results manually from the NE, so

that the performance data stored in the M2000 performance database is


synchronized.
This task applies to both real-time measurements and non-real-time

measurements.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 57

Procedure for Manual Synchronizing


Procedures:
1) Select Performance > Measure Management.
2) Right click the left navigation tree. Click Synchronize result.
The Synchronize result dialog box is displayed.
3) Select the NE type, enter the time segment of the data to be synchronized and click OK.
The system prompts Succeed in delivering the synchronization command.
4) Click OK.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 58

Procedure for Manual Synchronizing

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 59

Synchronizing Performance Data Automatically

The system automatically checks the consistency of measurement

counters, objects, and measurement results between the NE and the


M2000. No manual settings or operations are necessary.
If the M2000 detects that the objects and counters on the NE are
different, it delivers a command that requires the NE to modify the
measurement data.
If the M2000 detects that the measurement results on the NE are
different, it delivers a command that requires the NE to report the
measurement results.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 60

Subscribing to Performance Data


View the performance data collected from the subscribed time.
To query easily results of periodic or Real-time measurements, you can

subscribe the results by objects and counters. After the subscription,


the reported performance measurement results are displayed
automatically in the Subscribe Result window.
Operations (example for Periodic Measurement)

Select the menu items Performance > Measure Management > measurement Status

On the navigation tree, right-click a node and choose Subscribe Result from the shortcut
menu. Set the parameters.

You can set the performance measurement results of multiple NEs, multiple periods, and
one function subset of the same NE type at a time.

After that, each measurement period is displayed in one window and each function subset is
displayed in one tab.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 61

Subscribing measurement results

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 62

Collecting the Missing Data


Check if there are missing measurement results. If so, collect them back

through synchronization.
The word "missing" indicates that the measurement results for some

expected time segment is missing from the M2000 performance


database. The M2000 checks the missing data automatically. When
detecting missing data, the M2000 initiates automatic synchronization
with the NE to obtain the data. The missing data can also be obtained
through manual synchronization.
The data for the specified time segment, however, must exist on the NE.

If the measured object is faulty during this time segment, the NE cannot
collect the performance data. In this case, the measurement results are
lost.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 63

Procedure for checking Missing Data


1) Select Performance > Measure Management > measurement Status
2) Right-click a node on the navigation tree and choose Query Missing Result on
the shortcut menu.
3) Set the parameters.
The default end time is the current time. The default start time is the result of
subtracting the missing result time range in the preference setting from the
current time.
4) Click OK.
If missing measurement result exists in the time segment, the missing results are
listed in the displayed dialog box. The first column displays the object information,
and the second displays the time segment.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 64

Checking Missing Data select time segment

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 65

Adding Measurement Objects

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 66

Creating User Defined Counters


Calculate the required measurement counters based on the existing

counters through the arithmetic operation.


After an NE reports measurement results, the M2000 calculates user

defined counters based on the defined conditions through the arithmetic


operation, and saves the user defined counters into the database for
future queries.
The counters used for calculating the user defined counter must belong

to the same measurement set.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 67

Procedures for Creating User Defined Counters


1) Select Performance > User-defined Counter Management.
view the User-defined Counter Management window.
2) Expand the navigation tree. Select a node.
Click Add. The Add User Defined Counter dialog box is displayed
3) Enter the name of user-defined counter in Counter Name.
Select the function set and function subset of the user-defined counter in Function
Set and Function Subset.
4) Edit the calculation formula in Formula Information.
-

The specific operations are as follows: Double-click a counter in Available Counter


List. You can add the counter to Formula Information. Click an operation symbol
in the right part of the table. You can also add the operation symbol to Formula
Information. To compile a calculation formula, combine the counter with the
operation symbol by using an operation rule.

Select the unit for the user-defined counter in the Unit drop-down box.

Click OK or Apply.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 68

Add User Defined Counter

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 69

Create User Defined Counter

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 70

Output of User Defined Counter

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 71

Contents
Contents
Configuration Management
Performance Management
Security Management

www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 72

Introduction of Security Management

The M2000 security management refers to the management on


the users and user privileges. It is an important function of the
M2000.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 73

Security Management
Includes:
Introduction of Security Management
Create User
Create User Group
Grant Right to User Group
Grant New Device Right to User Group
Bind User to User Group
Bind User to NE User
Online User Monitoring
Backup Management

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 74

Managing NE User Account


The M2000 manages two classes of user accounts:
M2000 user account: The operator must have an M2000 user account to log

in to the system. A user account has a user name and password. A user is
authorized with certain operation privileges such as security management,
alarm management, and performance management. The M2000 administrator
assigns the privileges to each user account. For details, see iManager M2000
Mobile Element Management System - Administrator Guide.
NE user account: An NE user account is a special M2000 user account.

When bound to an NE and assigned with certain privileges, an M2000 user


account becomes one of the user account of that NE. The account details are
sent to the NE. An NE user can execute NE MML commands on the M2000
and LMT. An NE user can also start the LMT from the M2000. Different NE
user accounts are authorized to execute different commands.
NE user accounts are authorized to execute different MML commands.
HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 75

Create an NE Account

Bind an M2000 user account to an NE as an NE


user account, and authorize this NE user account.

Procedure
To create an NE user account, perform the following steps:
1)

Select Security > Security Management.


The Security Management dialog box is displayed.

2) Select an M2000 user account from the navigation tree


on the left.
3) Right-click the User and select Add. The Add User
dialog box is displayed, as shown in next slide.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 76

Bind Command Group

HUAWEI TECHNOLOGIES CO., LTD.

Select the command groups assigned to this


user, and then click OK.

All rights reserved

Page 77

Manage User, User Group and NE User


The user management is the key part of the security management. It

manages the users, user groups, and NE users.


Both the users and user groups are the M2000 system users. A user
group is a group of the M2000 users. A user can belong to one or more
user groups.
Only NE users can log in to the corresponding NEs to perform
operation and management. For the M2000, the NE users refer to the
M2000 users authorized with the NE operation privileges. If classified
by NE type, there are class A, class B, and class C NE users. The user
Admin has the operation privileges on all the NEs by default.
The management strategies for the class A NE users are different from
those for the class B and class C NE users.
The privileges of the class A NE users are managed by the M2000. An
M2000 user can be bound to command groups to become an NE user.
The privileges of the class B and class C NE users are managed by the
NEs. An M2000 user can be bound to an existing NE user to become
an NE user.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 78

Create User Example


To create a user in the M2000, you may take the following

procedures.
Operations
Create User
Create User Group
Grant Access to User Group
Grant New Device Access to User Group
Bind User to User Group
Bind User to NE User

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 79

Create User

The first step to create a user in M2000 is to add the user and set his basic
information as follows.

Operations
1.

Click System > Security Management to enter the Security Management window.

2.

You can create a user in three ways:


Right-click the User node on the security navigation tree, and select Add from the
shortcut menu.
Select the User node on the security navigation tree, and click Add in the right
window.
Select the User node on the security navigation tree, select any user from the right
window and right-click. From the shortcut menu, select Add.

3.

In the Create new user dialog box, input the correct parameters.
Click the General Info tab, and input the correct parameters. For details, see
Descriptions of User Parameters next slide.
Click the User Groups tab, and select the user group to be bound.
Click the NE Users tab, and select the NE user to be bound.

4.

Click Apply or OK to add the user.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 80

Add User Method 1

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 81

Add User Method 2 & 3

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 82

General Information

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 83

User Group

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 84

NE Users

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 85

Right

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 86

NE

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 87

Rules

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 88

Create User Group


You can create a user group in the M2000 system and add users

requiring the same authorities into a user group.


Operations
1. Click System > Security Management to enter the Security

Management window.
2. You can create a user group in three ways:

Click the User Group node on the security navigation tree, and
select Add from the shortcut menu.
Select the User Group node on the security navigation tree, and
click Add in the right window.
Select the User Group node on the security navigation tree,
select any one user group from the right window and right-click.
From the shortcut menu, select Add.
HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 89

Add User Group

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 90

General Information

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 91

Right

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 92

New Devices Rights

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 93

NE Command Groups

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 94

Rules

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 95

Grant Right to User Group


The device access and application access can be granted to the user group.

Operations
1. Click Security > Security Management to enter the Security Management

window.
2. You can enter the Bind User Group to Right dialog box in four ways:

Unfold the User Group node on the security navigation tree, right-click
the user group to be bound, and select Bind Right from the shortcut
menu.
Unfold the User Group node on the security navigation tree, select the
user group to be bound, and click Bind Right in the Right tab
Select the User Group node on the security navigation tree, select the
user group to be bound in the right window, and click Bind Right.
Select the User Group node on the security navigation tree, right-click
the user group to be bound in the right window and select Bind Right.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 96

Grant Right to User Group


3. In the Bind User Group to Right dialog box, all the devices

are displayed in the left navigation tree. Select a device, and


all the accesses will be displayed on the tree in the middle.
4. Check/Uncheck the access to select/deselect the access in

the tree.
5. Select another device, and repeat step 3 and 4.
6. Click Apply or OK after finishing all settings.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 97

Bind Right

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 98

Grant Right to User Group

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 99

Tips
At system startup, three default user groups exist (operators, guests and

Administrators). Administrators have the highest access, which cannot be


changed or copied.
A group can inherit the access of all the user groups through Copy/Paste Access.

Therefore, it is recommended that a group other than the Administrators group not
be allocated the Grant user group right .
The device tree is categorized by NE type. When you select/unselect the NE node

of one type, all the accesses of all NEs of this type are selected/deselected. When
you select/unselect the top node of the device tree, all the accesses of all NEs are
selected/deselected.
The M2000 device is a virtual device, which integrates all application accesses.
Certain access setting only takes effect after you log in to the client again.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 100

Grant New Device Right to User Group


After creating a new device, user group can be conveniently granted the

new device access through this function.


Operations
1.

Click System > Security Management to enter the Security Management window.

2.

You can enter the Bind User Group to New Device dialog box in four ways:
Unfold the User Group node on the security navigation tree, right-click the user group to
be bound, and select Bind New Device Right from the shortcut menu.
Unfold the User Group node on the security navigation tree, select the user group to be
bound, and click Bind New Device Right in the New Device Right tab.
Select the User Group node on the security navigation tree, select the user group to be
bound in the right window, and click Bind New Device Right.
Select the User Group node on the security navigation tree, right-click the user group to be
bound in the right window, and select Bind New Device Right.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 101

Grant New Device Right to User Group


3.

In the Bind User Group to New Device dialog box, all new devices are
displayed in the left tree. Select a new device from the New Device tree, and all
its accesses will be displayed on the right tree.

4.

Check/Uncheck the access to select/deselect the access in the tree.

5.

Select another device, and repeat step 3 and 4.

6.

Click Apply or OK after finishing all settings.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 102

Bind New Device Rights

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 103

Bind New Device Right

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 104

Bind User Group to New Device

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 105

Bind User to User Group

For adding a user to the user group, Bind User to User Group and Bind
User Group to User have the same functions. You can select either one.

Operations
1.

Click Security > Security Management to enter the Security Management window.

2.

You can enter the Bind User to User Group dialog box in two ways:
Unfold the User node in the security navigation tree, right-click the user to be added to the
user group, and select Bind User Group from the shortcut menu.
Unfold the User node in the security navigation tree, and select the user to be added to the
user group. Select the User Group tab in the right window, and click Bind User Group.

3.

In the Bind User to User Group dialog box, add the corresponding user to the user group.

4.

Click Apply or OK.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 106

Tips
Note
In the Bind User to User Group dialog box, all the users to be added to

the user group are displayed on the right. If you mark before the parent
node, all its subnodes will be selected.
If the user already logs in, the user must re-log in to validate the operation.

Otherwise, exceptions may occur.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 107

Bind User to NE User

Bound to the NE user, the NMS user can log in to the related NE as the
NE user and perform maintenance tasks on the NE.

Operations
1.

Click Security > Security Management to enter the Security Management window.

2.

You can bind a user to an NE user in three ways:


Select the User node in the security navigation tree, right-click the user to be bound to
the NE user, and select Bind NE User from the shortcut menu.
Unfold the User node in the security navigation tree, select the user to be bound to the
NE user. Click the NE Users tab, and click Bind NE User.

3.

In the Bind User to NE User dialog box, bind the user to the corresponding NE user.

4.

Click Apply or OK.

Note

In the Bind User to NE User dialog box, all the users are displayed on the left, and all the
NE users on the right.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 108

Online User Monitor


For system security, iManager M2000 provides the user monitor

functions to protect the system from being attacked by illegal users and
monitor online user operations.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 109

User Monitor

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 110

Filter by User Name

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 111

Filter by Terminal IP

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 112

Force User to Exit

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 113

Monitor NE Local Maintenance


The M2000 monitors the local maintenance of the NE user. Through this

operation, you can view the information about the LMT user and also
monitors its operation.
Note
This operation is applicable only to class A NEs, but not to class B or C NEs.
The M2000 monitors only the users logging in through the LMT, including the

M2000 and the separate LMT. The M2000 does not maintain or monitor virtual
NEs.
The M2000 displays up to 2000 real-time NE monitoring records. When more

records are generated, the M2000 overwrites the earliest records with the latest
records.

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 114

Monitor NE Local Maintenance

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 115

Backup Management
The M2000 supports can save the server data and the NE data as

backup files in the specified directory on the server.


The backup management covers the following:
Backup Management Interface
Backing Up the Server Data
Backing Up the NE Data

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 116

Backup Management

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 117

Server Backup List

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 118

NE Backup List

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 119

Detail Message of NE Backup

HUAWEI TECHNOLOGIES CO., LTD.

All rights reserved

Page 120

Thank You
www.huawei.com

Revision Record

Dont Print This Page


Product

Course Code

Product

OXP300001

WiMAX

All

1.00

Developer/Modifier

Date

Approver

New/Update

Hujian

Feb. 16, 2009

Hong Xinpei

New

Alex Lei Keen Lik

2010.8.30

Version

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Course Version ISSUE

Update

Page0

WiMAX 16e
Frequency Planning
www.huawei.com

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Objectives


Upon completion of this course, you will be able to:




Describe WiMAX frequency planning

Describe WiMAX frequency reuse mode

State how to expand WiMAX network

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Contents
1. WiMAX Introduction
2. WiMAX Sub-Carrier Assignment Mode
3. WiMAX Typical Networking Mode
4. WiMAX Network Expansion Solution

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Contents
1. WiMAX Introduction
2. WiMAX Sub-Carrier Assignment Mode
3. WiMAX Typical Networking Mode
4. WiMAX Network Expansion Solution

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page4

What is OFDMA?
sub-carrier-N

sub-carrier-4

sub-carrier-3

sub-carrier-2

sub-carrier-1

Frequency
OFDM Slot/Frame

IFFT

SN

S1 S2 S3 S4 S5 S6 S7
IFFT

SN+1SN+ SN+ SN+4


IFFT

Time

OFDM Symbol
(FTT duration)

S2N
Guard Time

Bandwidth

1. OFDM is a multi-carrier system


2. Available bandwidth is divided into many narrow bands.
3. Data is transmitted in parallel on these bands.
OFDMA: Orthogonal Frequency Division Multiplex Access

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page5

OFDMA Frame Structure

Power

DL Sub-frame

Last Frame

TTG

UL Sub-frame

RTG

Next Frame

FCH UL

Burst#1

DL Burst#2

MAP

Burst#2
S

Preamble

Sub-channel Logical Number

Time

DL DL Burst#1
MAP

DL Burst#4
Burst#3

DL
Burst#5

DL Burst#6
UL
MAP

ACK

DL Burst#3

Burst#4
Ran
ging

DL Burst#7

Burst#5
Fast Feedback
(CQICH)

N
0

1 2 3

4 5

1 2

M
Symbol

Guard

OFDMA frame is a two-dimensional (time-frequency) structure. The y axis is the


sub-channel and the x axis unit is symbol.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Contents
1. Review of OFDMA frame structure
2. WiMAX Sub-Carrier Assignment Mode
3. WiMAX Typical Networking Mode
4. WiMAX Network Expansion Solution

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page7

Contents
2. WiMAX Sub-Carrier Assignment Mode


2.1 Down link sub-carrier allocation

2.2 Up link sub-carrier allocation

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Allocation of Sub-carrier
Pilot sub-carrier

DC sub-carrier

Data sub-carrier
Guard sub-carrier

10MHz*(28/25)=10.94KHz*1024

PUSC: Partial used sub-carrier


FUSC: Full used sub-carrier

Sub-channel

Band AMC: Adaptive modulation and coding

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Subcarrier Allocation


Two main types of subcarrier allocation




Distributed Subcarrier Allocation (DSCA)




In a distributed subcarrier allocation (DSCA), multiple data


subcarriers are grouped into a subchannel.

Adjacent Subcarrier Allocation (ASCA)




In the adjacent subcarrier permutation, subcarriers within a


subchannel is assigned to adjacent subcarriers, and the pilot and
data subcarriers are assigned fixed positions

For WiMAX system, we can support three type of subcarrier


allocation method such as FUSC, PUSC and Band AMC.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page10

DL-FUSC
Data Sub-carrier

DC Sub-carrier
Guard Sub-carrier

Pilot Sub-carrier

86 Sub-carriers

12

36

39

848

840

87 Sub-carriers

16 sub-carriers

48 group

Only Downlink

16 sub-channels

Disadvantages: Large interference at the edge of the cell


Advantages: High spectrum efficiency
Subchannel:48 sub-carriers
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page11

DL-FUSC

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page12

DL-FUSC


Example :-

10MHz 1024FFT

Total used subcarrier 1024-1(DC)-82(pilot)-173(guard) = 768subcarrier

From total 768 subcarriers, we divide into 48 group of subcarriers, each


group contain of 16 subcarriers

From each 48 group of subcarriers, we select one subcarriers to form a


subchannel.

Finally, we got 1 subchannel = 48 subcarriers over 1 symbol

Total 16 subchannel can be support by the DL-FUSC.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page13

DL-FUSC

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page14

DL-PUSC

60 clusters
0

59

14 sub-carriers * 2 symbols

Group 0: 0~11

Group 1: 12~19

840 sub-carriers

Group 2: 20~31

Group 3: 32~39

Group 4: 40~51

Group 5: 52~59

DL-PUSC
Parameters
System Bandwidth(MHz)

1.25

2.5

10

20

128

N/A

512

1024

2048

43

N/A

91

183

367

6/3

N/A

30/15

30

120/6
0

Number of Used
Subcarriers

85

N/A

421

841

1681

Number of Data
Subcarriers

72

N/A

360

720

1440

Number of Pilot
Subcarriers

12

N/A

60

120

240

FFT Size(Nfft)

Sub-channel

Even Symbol

Odd Symbol

Even Symbol

Odd Symbol

Values

Number of Guard
Subcarriers
Number of
Cluster/Subchannels

Disadvantage: Low spectrum efficiency


Advantage: High SINR at the edge of the cell

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page15

DL-PUSC

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page16

DL-PUSC
PUSC DL Cluster Structure
12 data sub-carriers + 2 pilots
odd Symbols
even Symbols
odd Symbols
even Symbols

One cluster

OFDM Symbols

One cluster , consists of


even and odd symbols
each contains 12 data
sub-carriers and 2 pilots1
One sub-channel consists of
2 clusters (48 data subcarriers and 8 pilots)
Pilot
Data

Sub-carriers

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page17

DL-PUSC


Example:

10MHz , 1024FFT

Total used subcarrier = 1024- 1(DC)-183(guard)


= 840 = 720(Data) + 120(Pilot)

From 840 subcarriers, we divide into 60 clusters (Physical-Logical)

1cluster - 12 data subcarriers, 2 pilot subcarriers (Frequency domain)

From 60 clusters, we divide into 6 groups of clusters

Each groups of cluster have 10 clusters

Select 2 clusters from a group to form one sub channel

1 subchannel(2 clusters) includes 24 data subcarriers, 4 pilot subcarriers

Total subchannel = 60 total clusters / 2clusters per subchannel


= 30 subchannel

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Contents
2. WiMAX Sub-Carrier Assignment Mode


2.1 Down link sub-carrier allocation

2.2 Up link sub-carrier allocation

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page19

UL-PUSC
UL-PUSC
Parameters

Values

System bandwidth (mhz)

1.25

2.5

10

20

FFT size (Nfft)

128

N/A

512

1024

2048

Number of guard sub-carriers

31

N/A

103

183

367

Number of tiles

24

N/A

102

210

552

Number of sub-channels

N/A

17

35

92

Number of sub-carriers per tile

N/A

Number of used sub-carriers

97

N/A

409

841

1681

Symbol 0
Symbol 1

Tile

Symbol 2
Data carrier

Pilot carrier

Feature: Tile is the minimum unit in the sub-channel assignment.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page20

UL-PUSC

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page21

UL- PUSC
OFDM Symbols 2

OFDM Symbols 1

OFDM Symbols 0

OFDM Symbols 2

OFDM Symbols 1

OFDM Symbols 0

OFDM Symbols 2

OFDM Symbols 1

OFDM Symbols 0

T ile 1

Sub-carriers

T ile 2

O F D M S y m b o ls
T ile 3

P ilo t
T ile 4

D a ta
T ile 5

6 tile s p e r S u b - C h a n n e l
( 4 8 d a ta S u b - c a r r ie r s )

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page22

UL-PUSC


Example:

10MHz, 1024 FFT

Total number of used subcarriers = 1024- 1(DC)-183(guard) = 840


= 720 data + 120 pilot

1 tile = 4 subcarriers over 3 symbols

From 840 subcarrier, we can divide into 210 tiles

Divide the 210 tiles into 6 groups

Each groups of tiles have 35 tiles

Select 1 tile from each group to form a subchannel

1 subchannel includes 24 subcarries, 18data subcarries , 6pilot


subcarriers

210 subchannel/6 = 35 subchannel for UL-PUSC

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page23

Adjacent Subcarrier Allocation




ASCAs can gain multiuser diversity in frequency non-selective fading


channels

Subcarriers within a subchannel is assigned to adjacent subcarriers, and


the pilot and data subcarriers are assigned fixed positions

Band AMC can be defined as ASCAs techniques.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page24

Band AMC
Band-AMC
Parameters

Values

System Bandwidth (MHz)

1.25

2.5

10

20

FFT Size (Nfft)

128

N/A

512

1024

2048

Number of guard sub-carriers

19

N/A

79

159

319

Number of used sub-carriers (Nused)

109

N/A

433

865

1729

Number of pilots (Npilots)

12

N/A

48

96

192

Number of data sub-carriers

96

N/A

384

768

1536

Number of bands

N/A

12

24

48

Number of bins per band

N/A

N/A

Number of sub-carriers per bin


(8data+1pilot)
Number of sub-channels

8 data
tones
1 pilot
tone

BAND AMC BIN structure


2

N/A

16

32

Sub-channels of band AMC are


consecutive.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page25

Different Between PUSC, FUSC and


AMC
Benefits

Contiguous Permutation (Band

Diversity Subcarrier Permutation

AMC)

(PUSC,FUSC)

Sub-channelization gain,

Sub-channelization gain,

frequency selective loading gain

frequency diversity, inter-cell


interference average

Advanced frequency scheduler

Simple scheduler, rely on

to explore frequency selective

frequency diversity to achieve

gain

robust transmission

Channel condition

Stationary channel

Fast-changing channel

Favorable smart antenna tech.

MIMO/AAS

MIMO

Scheduling

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Contents
1. Review of OFDMA frame structure
2. WiMAX Sub-Carrier Assignment Mode
3. WiMAX Typical Networking Mode
4. WiMAX Network Expansion Solution

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page27

Frequency Reuse Mode

NSK
Red lines in the figure indicates the
interference of a same direction and
frequency.

N: cells, S : sectors per cell, K: different frequencies.

When selecting the frequency reuse mode, consider comprehensively


the influence of frequency resources and interference.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page28

PUSC 1x3x1
All BTS use one frequency point. Three sectors of a BTS is a reuse cluster. The three sectors use
respectively 1/3 sub-channel in a frequency point. The same directional sectors of different BTSs
use the same sub-channel.

1
2

2
3

F1
1

1
2

F1
1
1

3
Uplink

1: logical sub-channel 1-11;


2: logical sub-channel 12-23;
3: logical sub-channel 24-35

Downlink

1: Segment 0: 0-9
2: Segment 1: 10-19
3: Segment 2: 20-29

Both uplink and downlink use


PUSC replacement.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page29

PUSC with all SC 1x3x3


There are three frequency points. Three sectors in a BTS is a reuse cluster. The
three sectors in one BTS use respectively a frequency point.

F1
F2

F1

F1
F2

F2
F3

F3

F1
F2

F3

F3
F1

F1
F2

F2
F3

F3

The downlink adopts the FUSC or PUSC with all SC replacement, and the uplink adopts
the PUSC with all SC replacement.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page30

FFR 1x3x1
All BTSs use one frequency point, which, on one hand, ensures the coverage and use
partial sub-carriers on the cell edge; on the other hand, increases the spectrum usage
and use all sub-carriers near the BTS.

2 1
3
PUSC with all SC
PUSC
The UL and DL scheduling assignments are implemented through the
measurement and judgment of users on self C/I and RSSI.
The system frequency reuse is close to 1.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page31

FFR 1x3x1
Advantages:
The spectrum efficiency is high, and the sector capacity is large.
 Sub-channel scheduling is flexible. Use excellent sub-channel scheduling
mechanism to use frequency resources to the maximum extent.


Disadvantages:
The complex sub-carrier replacement mode and sub-channel scheduling algorithm are hard to
be implemented.
 The system interference level is related to the quality of sub-channel scheduling mechanism.
Co-channel interference exist on adjacent sectors in a BTS. The load is in positive correlation with
the channel conflict probability and the co-channel interference.


1.1.IfIfthe
theproduct
producthas
hasexcellent
excellentsub-carrier
sub-carrierreplacement
replacementmode
modeand
andsub-channel
sub-channelscheduling
scheduling
mechanism,
the
networking
solution
is
one
of
the
preferred
networking
modes
of
mechanism, the networking solution is one of the preferred networking modes ofWiMAX
WiMAX16e.
16e.
2.2.The
typical
application
can
be
used
for
initial
network
construction
of
dense
urban
areas
The typical application can be used for initial network construction of dense urban areasand
and
areas
of
middle
or
high
traffic.
areas of middle or high traffic.
3.3.The
Thenetworking
networkingmode
modecan
canbe
beused
usedas
asthe
theexpansion
expansionsolution
solutionofofsingle
singlefrequency
frequencypoint
point1x3
1x3
reuse
mode.
reuse mode.

Applicable scope

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page32

Comparison between
PUSC1/3,PUSC with All and FFR
C over age: PU S C All vs F F R vs PU S C 1/ 3
10000
9000
8000

Throughput(kbps)

7000
6000
5000
4000
3000
2000
1000
0
600

700

800

900

1000

1100

1200
1300
1400
1500
Distance to Site(m)

PUSC All Coverage

1600

1700

FFR Coverage

PUSC 1/3 Coverage

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page33

1800

1900

2000

2100

Example 1
Assume the customer has two 10M frequency resources, as follows:

10MHz

10MHz

2500

2510

2580

2590

According to the product performance, you can consider the following frequency
planning solutions:
1. PUSC 1*3*1 5MHz, can be expanded to S444 theoretically, total = 20MHz.
2. PUSC 1*3*1 10MHz, can be expanded to S222, total = 20MHz
3. PUSC with All 1*3*3 5MHz, can be expanded to S111,total 15MHz and reserve
5MHz frequency resources.
The frequency planning solution is so flexible that the operator can select the
solution based on network development and maximum frequency efficiency.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page34

Example 2
Assume the customer has independent 10M and 5M frequency
resources, as follows:
5MHz

10MHz

2500

2510

2580

2585

Based on the product performance, the following frequency planning


solutions can be considered:
1. Adopt FFR 1*3*1 10MHz for the initial networking S1/1/1.
2. If the capacity increases later, adopt FFR 1*3*1 5MHz S1/1/1 for
expansion.
In the WiMAX network planning, mixed networking of multiple
channel bandwidths can be used for frequency resources.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page35

Summary
1.

PUSC 1*3*1, applied to initial network construction, can be expanded to FFR 1*3*1.

2.

FUSC 1*3*3(PUSC with All), applied to large-capacity network construction, with enough
frequency resources.

3.

FFR 1*3*1, the system frequency reuse is close to 1, is the preferred networking mode in
later network construction.

Network planning is more


flexible!

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page36

Contents
1. Review of OFDMA frame structure
2. WiMAX Sub-Carrier Assignment Mode
3. WiMAX Typical Networking Mode
4. WiMAX Network Expansion Solution

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page37

Increasing Channel Bandwidth


Huawei system can support 5M/10MHz channel bandwidth. In the follow-up procedure, other values
specified in protocols, such as 3.5MHz can also be supported. When there are available consecutive
frequency bands, you can directly expand the system channel bandwidth from 5MHz to 10MHz to
double the system capacity.

Advantages:



Have no impact on original network and network re-planning is not required.


The capacity is increased with the channel bandwidth.

Disadvantages





Additional spectrum resources are required, and the spectrum resources of new channel
bandwidth must be consecutive.
Relevant channel bandwidth must be supported by products.
The solution only fits for entire network expansion.

5MHz

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

10MHz

Page38

Adding Carrier
When there are additional spectrum resources, adopt the multi-carrier configuration mode to
increase the system capacity. Multi-carrier configuration refers to that configure multiple
different carriers in the sectors of a BTS.

Advantages:





Only require adding devices, which has little impact on the original network. Network replanning is not required.
The system capacity is increased with the carrier number. The expansion effect is obvious.
One sector supports the multi-carrier networking of different bandwidths.

Disadvantages:




Operators need remaining spectrum resources.


To keep original coverage, adding carriers require additional power.
The same sector can support adjacent carrier configuration. If there is condition, do not
use adjacent carriers to reduce interference.
The expansion is related to the original frequency reuse mode.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page39

Adopting MIMO Technology


Advantages:
Do not need additional carrier resources.
Have little impact on original network. Network re-planning
is not required.
Expansion effect is obvious.




Limitations:



The product needs to support the MIMO function.


Partial devices need be replaced (such as band board
and RF equipment). The cost is high.
The solution only fits for the condition that original
existing network device does not support MIMO.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page40

Adding Site -- Cell Splitting

Advantages:




Do not affect original networking mode. Only need to add sites


The expansion is easy. Do not need support of enhanced technology.
Expansion does not affect the entire network.

Disadvantages:



This expansion mode gets capacity by adding sites. The expansion cost is high.
If the sites are densely distributed, the interference cannot be controlled, which
brings difficulties to network optimization.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page41

Adding Sites -- Micro-Cell


Advantages:


Do not affect original networking mode. Adding sites


in high-traffic area is used to attract most traffics.
The original macro-cell ensures the consecutive
coverage.
The expansion implementation is easy. Do not need
the support of enhanced technology.

Macro-cell consecutive coverage

Disadvantages:



Need to add sites. The expansion cost is high.


Require the seamless handover between hot-spot
area and macro-cell.

Macro-cell consecutive coverage

Micro-cell/in-door coverage

This
Thisexpansion
expansionmode
modefits
fitsfor
forvarious
variousnetworking
networkingmodes.
modes.ItItreduces
reducesthe
theoriginal
originalnetwork
network
load
by
adding
indoor
coverage
in
hot-spot
or
buildings
with
high-traffic,
such
as
load by adding indoor coverage in hot-spot or buildings with high-traffic, such asbusiness
business
building,
hotels
and
gymnasiums
with
large
users.
building, hotels and gymnasiums with large users.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page42

Summary


The difference frequency allocations between the down link


and up link.

The frequency reuse modes.

The system expansion solution.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page43

Thank you
www.huawei.com

WiMAX Capacity
Planning
www.huawei.com

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Objectives

Upon completion of this course, you will be able to:

State the factor of capacity planning

State the service model in WiMAX system

Describe the capacity planning procedure

Perform the capacity planning of multi-service

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Contents
1. Capacity Analysis
2. Service Model
3. Capacity Planning

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Contents
1. Capacity Analysis
2. Service Model
3. Capacity Planning

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page4

Overview

Purpose Balance among the coverage, capacity, quality and cost,


on the condition that meet the requirement of network
construction.

Characteristic

WiMAX system is a IP-based network

Throughput on downlink and uplink are different

System capacity is subjected to some factors

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page5

Capacity Analysis Principles


Traffic model
analysis/Requirement
analysis

Total Throughput = Number of


Online Subscribers x
throughput of a Subscriber
Number of Sites = Total
Throughput / Throughput of
Single Site

Single subscriber
throughput

Total throughput

Customer resources
Networking mode analysis

Capacity of
single site

Number of sites

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Capacity Analysis

The system capacity on uplink or downlink can be analyzed by


following formula:
Throughput on physical layer = Nsub-channel Ndata sub-carrierScoding and
Modulation NsymbolDeach frame

Nsub-channel: Number of sub-channel

Ndata sub-carrier: Number of data sub-carrier in a sub-channel

Nsymbol: Number of Symbol

Scoding and Modulation: Coding and modulation scheme

Deach frame: Duration of a frame

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page7

Calculation Example
Question:
Mandatory parameters:
DL-FUSC: Number of subchannels is 16. 1 Slot = 1
Subchannel x 1 Symbol
DL-PUSC: Number of subchannels is 30. 1 Slot = 1
Subchannel x 2 Symbols
UL-PUSC: Number of subchannels is 35. 1 Slot = 1
Subchannel x 3 Symbols

Assumptions:

The downlink is allocated with 31 symbols. The uplink is allocated


with 15 symbols. TDD Scale Time: DL:UL = 32:15
In the downlink: modulation mode is 64QAM, and coding mode is 5/6;
In the uplink: modulation mode is 16QAM, and coding mode is 3/4.
Channel bandwidth: 10 MHz

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Main Factor

The relation among the BW /NFFT, data sub-carrier and sub-channel

BW /NFFT

1.25M /128

5M /512

10M /1024

20M /2048

Sub-

Ndc

Nsc

Ndc

Nsc

Ndc

Nsc

Ndc

Nsc

DL-FUSC

96

384

768

16

1536

32

DL-PUSC

72

360

15

720

30

1440

60

UL-PUSC

64

272

17

560

35

1120

70

carrier
Allocation

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Main Factor
Power

DL Sub-frame

FCH UL

Preamble

FCH

MAP

RTG

Next Frame
Time

FCH

DL burst #4

DL burst #3

FCH

DL burst #3
DL burst #2

DL
MAP

DL burst #1

DL burst #4

DL
MAP

ACK

DL burst #2

DL burst #5

DL
MAP

DL burst #1
Ran
Feedback
(CQICH)
ging FastFast
Feedback
(CQICH)

DL burst #6

UL Sub-frame

DL
MAP

DL
UL
MAP
MAP

TT
G

Preamble

Sub-channel Logical Number

Last Frame

K
Symbol

Sub-frame ratio
Uplink and downlink adopt different sub-frame, it directly effect on
throughput of single-site.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page10

Frame Length and Symbol Duration


Frame length (ms)

2, 2.5, 4, 5, 8, 10, 12.5

Symbol duration (Ts) = Symbol Length (Tb) + CP Length (Tg)


CP length (Tg) = GTb
G

1/4 , 1/8 , 1/16, 1/32

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page11

Main Factor

Demodulation threshold (CINR)

Cell Radius

Different modulation and coding


schemes require different
demodulation threshold

Simulation

It various with other factors


N

CellAvgThroughput = Pi Throughputi
i =1

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

CINR
Distribution

Cell Average
Throughput

Page12

Main Factor

The relation between CINR and Scoding and modulation on uplink

weak
QPSK 1/2
QPSK 3/4
CINR
16QAM 1/2
16QAM 3/4
Strong

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page13

Main Factor

The relation between coding mode and modulation scheme on


Uplink
Coding

Modulation

Scoding and modulation

1/2

QPSK

1/22=1

3/4

QPSK

3/42=1.5

1/2

16QAM

1/24=2

3/4

16QAM

3/44=3

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page14

Main Factor

The relation between CINR and Scoding and modulation on downlink


QPSK 1/2

Weak

QPSK 3/4
16QAM 1/2
16QAM 1/2

CINR

64QAM 1/2
64QAM 2/3
64QAM 3/4
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page15

Strong

Main Factor

The relation between coding mode and modulation scheme on Downlink

Coding

Modulation

Scoding and modulation

1/2

QPSK

1/22=1

3/4

QPSK

3/42=1.5

1/2

16QAM

1/24=2

3/4

16QAM

3/44=3

1/2

64QAM

1/26=3

2/3

64QAM

2/36=4

3/4

64QAM

3/46=4.5

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Main Factor

Spatial Multiplexing mode (Matrix B)

Transmit different data with different antennas

Enhance the capacity directly

The number of receiving antennas can not be less than the


number of transmitting antennas

Encoder

Modulation
STC

Encoder

Modulation

Encoder

Sub-carrier
mapping

Filter

DAC

RF

Sub-carrier
mapping

Filter

DAC

RF

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page17

Indirect Factor

Channel model
The channel model is selected according to the propagation
environment and the moving speed of terminal. Different channel
model make difference on CINR, it will effect on system capacity
Channel model
Static

Applicable Terminal User


Fixed terminal user or static user

PB3

Pedestrian user

TU3

In the urban, the moving speed is 3km/hour.

TU30

In the urban, the moving speed is 30km/hour.

VA60

In the suburban, the moving speed is 60km/hour.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Indirect Factor

User behavior and service type


In different application scenarios, users have different habits. It
can indirectly effect on system capacity :
User Type
Resident User
SOHO User
Enterprise User
Mobile User

Service Type
interactive network game, streaming media
VoIP, video meeting, file transmission
instant message, video meeting, file transmission
service with low throughput

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page19

Indirect Factor

User distribution

QPSK 1/2

QPSK 3/4

QAM16 1/2

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

QAM16 3/4
Page20

Indirect Factor

Co-channel interference

Co-channel interference is caused by networking

Different networking make different interference

It influences on CINR distribution,

It indirectly effect on system capacity


F1

F1
F1

F1
F1

F1

F1

F2
F1

F2
F1

F1
F1

F3

F3
F2

F1
131
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

F3
133
Page21

Indirect Factor

Diversity modeMatrix A

Transmit the same data with different antennas

Enhance the capacity indirectly

The number of receiving antennas can be less than the


number of transmitting antennas

STC
Encoder

Sub-carrier
mapping

Filter

DAC

RF

Sub-carrier
mapping

Filter

DAC

RF

Modulation
Encoder

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page22

Indirect Factor
Coverage Radius (Km)

Average Throughput (Mbps)

UL

DL

UL

DL

PUSC 131

0.515

0.904

2.801

13.168

FFR 131

0.515

0.791

3.764

17.696

FUSC 131

0.515

0.660

8.354

37.898

MIMO Matrix A

PUSC 131

1.0000

1.657

3.629

13.854

(UL:1T2R

FFR 131

1.0000

1.450

5.612

18.584

FUSC 131

1.0000

1.209

9.664

38.539

MIMO Matrix A

PUSC 131

1.0000

1.952

3.629

17.482

(UL:1T2R

FFR 131

1.0000

1.708

5.612

27.932

FUSC 131

1.0000

1.424

9.664

49.487

SISO

DL:2T1R)

DL:2T2R)

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page23

Summary

The factor influence on system capacity

System bandwidth planning

Sub-carrier allocation planning

Sub-frame Ratio planning

Frame length and symbol lengthplanning

Coding and modulation scheme (planning)

CINR Distribution (Simulation)

User behavior and Service type Statistic

Channel model Statistic

User distribution Statistic

Co-channel Interference (simulation)

MIMO Matrix A /B (planning)

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page24

Contents
1. Capacity Analysis
2. Service Model
3. Capacity Planning

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page25

Contents
2. Service Model
2.1 Introduction
2.2 Principle
2.3 Service and traffic model parameters

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Service Model
Type

Service Model

Interactive game

VoIP (Voice over IP) and video conference

Streaming media

IM and Web browsing (basic Internet application)

File transmission and media download

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page27

Contents
2. Service Model
2.1 Introduction
2.2 Principle
2.3 Service and traffic model parameters

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page28

Interactive Game

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page29

VoIP & Video Conference


ON: user sends
information with
fixed rate
OFF: user will not
send any data

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page30

Streaming Media

Each frame of the video data arrives at the destination in specified time
interval (T). Each frame is divided into packet data with fixed amount.

T = data frame per second.

Dc = time delay between two packet in a frame.

TB = buffering window to ensure the consecutive video stream.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page31

IM & Web Browsing


A session is just like
browsing a web site. A
packet call is like browsing
a web page in the website.

Instant message can


be classified into
message or instant
multi-media message.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page32

File Transmission & Media


Download

FTP: Time interval between file transmission is the reading time.

E-Mail: Maximum e-mail attachment < = certain limit, such as 20M


bytes.
Most email servers limit the email size, including the attachment size.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page33

Contents
2. Service Model
2.1 Introduction
2.2 Principle
2.3 Service and traffic model parameters

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page34

Traffic Model Parameters

The following parameters are traffic model parameters, the


setting value varies with the marketing and service deployment
strategies, and it is determined by the operator.

Penetration rate: Proportion of service type

BHSA: busy hour session attempts for single user

Busy Hour throughput /user: BHSA X Throughput /Session (kbit)

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page35

Traffic Model
UL Based on the Data Rate Traffic Model
Mean bit rate

Dense Urban

Urban

Sub-urban

Rural area

64 Kbps

45%

45%

50%

55%

128 Kbps

30%

35%

40%

40%

256 Kbps

20%

15%

10%

5%

512 Kbps

5%

5%

0%

0%

1024 Kbps

0%

0%

0%

0%

2048 Kbps

0%

0%

0%

0%

Average Rate

144

137.6

108.8

99.2

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page36

Traffic Model
DL Based on the Data Rate Traffic Model
Mean bit rate

Dense Urban

Urban

Sub-urban

Rural area

64 Kbps

5%

10%

25%

30%

128 Kbps

15%

25%

25%

30%

256 Kbps

25%

25%

20%

25%

512 Kbps

30%

25%

20%

10%

1024 Kbps

20%

15%

10%

5%

2048 Kbps

5%

0%

0%

0%

Average Rate

547.2

444.6

336

224

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page37

Traffic Model

Session Time: On line duration

Active duty ratio =actual data transmission time /On line duration

Traffic Parameters
Session Time (s)

500

Active Duty Ratio

30%

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page38

Service Model Parameters

The following parameters are service model parameters, they are


related to the characteristic of service:

Reading time (s): the time between two neighbor packet call

Packet number: the number of packet in a packet call

Bearing rate (kbps): rate to carry the service

BLER: block error rate

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page39

Service Model Parameters

The following parameters can be determined based on the


previous parameters:

Session throughput (kbit) = Session time (s) X Active duty ratio X


Bearing rate (kbps) X [1/(1BLER)]

Busy hour throughput /user (kbit) = BHSA X Throughput/Session


(kbit)

Busy hour throughput of a service = BHSA X Throughput/Session


(kbit) X penetration rate

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page40

Calculation Example

Interim output results

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Single Subscriber Throughput in


Busy Hour = PPP Session Time (s) x
PPP Session Duty Ratio x Bearer
Rate (kbit/s) x [1/(1 - BLER)] x BHSA
x Penetration Rate
Average UL Throughput of Single
Subscriber in Busy Hour =
61947.307/3600 = 17.208 kbit/s
Average DL Throughput of Single
Subscriber in Busy Hour =
141274.580/3600=39.243 kbit/s
Page41

Contents
1. Capacity Analysis
2. Service Model
3. Capacity Planning

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page42

Basic Ideas on Capacity Planning

Divide target areas into dense urban area, urban


area, suburban area, and rural area

Analyze traffic model for target areas.

Obtain the capacity of a single site and the single


subscriber throughput.

Specify the number of sites

Obtain the number of sites that can meet the


requirements for both capacity and coverage.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page43

WiMAX Capacity Estimation


Process
Obtain the cell radius in different scenarios through

Cell radius

link budget.

Query the emulation data sheet according to the cell


radius for the CINR distributing ratio. The CINR

Emulation result

distributing ratio is currently obtained from the


Matlab program provided by RTT link emulation.

C/I probability
distribution

To calculate the average throughput of a cell:

Throughput stands for the throughput calculated


based on the CINR. Different CINRs correspond to

Cell average
throughput

different modulation modes which are related to


different Throughputs.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page44

Capacity Planning Process


Traffic Model
Analysis

Single User
Throughput

Total User in a
Cell

Expected Cell
Throughput

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page45

Leverage Calculation Procedure

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page46

Summary

The Capacity Analysis Principle

The Calculation of the Physical Layer Throughput

Traffic and service module

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page47

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page48

WiMAX Coverage
Planning
www.huawei.com

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Objectives

Upon completion of this course, you will be able to:

Master the basic knowledge of electromagnetic wave (EW)


Propagation

State the of WiMAX coverage planning process

Comprehend the key factors and calculation methods of Link Budget

Know about the basic principle of Site, Antenna & Feeder Selection

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Coverage Planning Process


1

Determine the system parameter

Link Budget and link balance

Calculate the cell radius

Calculate the site area

Determine site quantity

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Module
4. Other Principle
5. Site, Antenna and Feeder Selection

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page4

Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Module
4. Other Principle
5. Site, Antenna and Feeder Selection

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page5

Frequency Spectrum Distribution


Canada
2.3/2.5GHz
3.5/5GHz

Russia
Europe
3.5GHz
5GHz

USA

2.3/2.5/3.5GHz
5GHz

1.5/2.3GHz
2.5/5GHz

Asia Pacific
2.3/3.3/3.5GHz
5GHz

ME & A
C & SA

3.5GHz
5GHz

2.5/3.5GHz
5GHz

The 211 GHz band is considered for the WiMAX. And the main spectrum
in WiMAX is centralized in 2.5GHz, 3.5GHz, and 5.8GHz frequency band.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Multipath Propagation

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page7

Analysis of Slow Fading

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Analysis of Fast Fading

Fast Fading occurs when signals


received from many paths drift into
and out of phase

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Module
4. Other Principle
5. Site, Antenna and Feeder Selection

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page10

Link Budget
Link budget : Estimate the maximum path loss of cells
: Estimate the cell radius.

Elements of link budget

Engineering parameters
Receiver sensibility
RF parameters
Noise figure
Fading margin
Propagation model
Subcarrier permutation mode
MIMO enhancement technology

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page11

Link Budget in Uplink


Antenna gain

Interference
margin

MIMO gain

Path loss

Antenna gain

Cable loss

Tx power

Fast fading
margin

Shadow fading
margin

Gain

Clutter loss

Margin

Body loss

Loss

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page12

Link Budget in Downlink


Gain
Tx power

Antenna gain

Margin
Cable loss

Path loss

Loss
Clutter loss

MIMO gain

Body loss

Interference
margin

Fast fading
margin

Shadow fading
margin

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page13

Antenna gain

Classification of Parameter

Equipment related parameter

System parameter

frequency, duplex mode, bandwidth, modulation, coding scheme


and sub-carrier Allocation

Environmental parameter

Tx power, receiver sensitivity, noise figure, demodulation threshold,


antenna gain and cable loss

Shadow fading margin, clutter loss, body loss

WiMAX specific parameter

MIMO gain, interference margin and fast fading margin

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page14

Equipment Related Parameter

Maximum transmitting power

The protocol does not define the maximum transmit power.

Different manufacturers specify different maximum transmit power.

Equipment
DBS3900 WiMAX

Max TX Power per Antenna


40dBm @ 2.3 and 2.5GHz
38.5dBm @ 3.5GHz

PCMCIA/USB Dongle

23dBm

CPE

27dBm Indoor/ 26dBm Outdoor

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page15

Equipment Related Parameter

Cable loss

The feeder loss is relative to the frequency and length

The connector loss is approximately 0.2dB


Frequency
450MHz 800MHz 1800MHz 2500MHz 3500MHz

Type
5/4 inches
7/8 inches
1/2 inches

1.871

2.564

4.228

5.129

6.105

dB/100m

dB/100m

dB/100m

dB/100m

dB/100m

2.644

3.594

5.693

6.906

8.169

dB/100m

dB/100m

db/100m

dB/100m

dB/100m

4.683

6.396

10.099

12.035

14.348

dB/100m

dB/100m

db/100m

dB/100m

dB/100m

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Equipment Related Parameter

Antenna Gain (Typical)


BTS Antenna
Scenario

Dense Urban/ Urban

Suburban

Rural or Island

Antenna type

Directional antenna

Directional antenna

Omni antenna

65

65 or 90

360

18

18

11

Outdoor CPE

Half power angle


(degree)
Typical Gain (dBi)

Terminal Antenna
Scenario

PCMCIA

Indoor CPE

Antenna type

Omni built-in antenna

Omni antenna

Typical Gain (dBi)

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Directional outdoor plate


antenna
15

Page17

Equipment Related Parameter

Receiver sensitivity

BW 103 f S

TotalSC
103
NUSED
Rss = CINR + NF 10 lg R + BackgroundNoise + 10 lg
N FFT
N TOTAL

NF: Noise Figure

R: Repeat Times

BW: Bandwidth

fs: Sampling Factor

TotalSC: Total sub-carrier

Nused: Used Sub-Channel Number

Ntotal: Total Sub-Channel Number

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Equipment Related Parameter

Noise figure

It is an indicator of evaluating the noise performance of amplifier,


represented by NF.

Ratio of input signal-to-noise ratio to the output signal-to-noise


ratio (CINR).

Currently, for the NF of Huawei products:

BTS NF is 4dB @ 2.5GHz / 5dB @3.5GHz

Terminal NF is 6.5dB.

Demodulation threshold (CINR)

The minimum power value (dB) to demodulate the signal


successfully

It will be changed various with the system parameter setting.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page19

System Parameter
System parameter

Remarks

Frequency

Option: 2.5G/ 3.5G

Duplex Mode
Channel Bandwidth
Subcarrier
Allocation
Modulation
Coding Scheme

Option: FDD/ TDD


Huawei supports TDD mode.
Option: 1.25MHz, 5MHz, 10MHz, 20MHz
Huawei supports two types of bandwidth.
PUSC nsk

PUSC with all nsk

FUSC nsk

FFR nsk

Band AMC nsk


Downlink: QPSK,16QAM and 64QAM.
Uplink: QPSK and 16QAM.
Option: 1/2, 2/3, 3/4 and 5/6.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page20

System Parameter
Channel bandwidth

Scalable Channel bandwidth 1.25 MHz to 20 MHz


Huawei Product support : 5 MHz and 10 MHz( 2.3GHz &
2.5GHz), 7 MHz (3.5 GHz)

Subcarrier configuration

Process of mapping subcarriers to subchannels.


Include PUSC, PUSC with all SC, FUSC, and band AMC.
Huawei WiMAX 16e system supports PUSC (with all SC) and
FFR (PUSC + PUSC with all SC).

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page21

System Parameter

Channel bandwidth and sub-carrier allocation


DL PUSC

DL FUSC

Channel bandwidth (MHz)

1.25

10

20

1.25

10

20

FFT size (NFFT)

128

512

1024

2048

128

512

1024

2048

carriers

43

91

183

367

22

86

173

345

Number of sub-channels

15

30

60

16

32

Number of data sub-carriers

72

360

720

1440

96

384

768

1536

Number of pilot sub-carriers

12

60

120

240

10

42

82

166

Number of protection sub-

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page22

System Parameter

Modulation and coding scheme

Different modulation and coding schemes require different


demodulation threshold
Modulation and rate

CINR required (dB)


Modulation and rate

CINR required (dB)

QPSK

QPSK

QAM16

QAM16

1/2

3/4

1/2

3/4

2.90

6.30

8.60

12.70

QAM64

QAM64

QAM64

QAM64

1/2

2/3

3/4

5/6

13.80

16.90

18.00

19.90

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page23

System Parameter

The system parameters affect the demodulation thresholds in different


modulation and coding modes.

PUSC/

Antenna

Coding

BS Ant

SS
Ant

FUSC

Configuration

Type

Num

Num

Modulation

PB3

VA30

VA60

PUSC

Diversity

CTC

QPSK 1/2

3.7

3.9

PUSC

Diversity

CTC

QPSK 3/4

7.1

7.4

PUSC

Diversity

CTC

QAM16 1/2

8.6

8.8

8.9

PUSC

Diversity

CTC

QAM16 3/4

12.8

13.3

13.1

PUSC

Diversity

CTC

QAM64 1/2

11.8

11.85

11.3

PUSC

Diversity

CTC

QAM64 2/3

16.5

18.5

16

PUSC

Diversity

CTC

QAM64 3/4

17.5

20

17

PUSC

Diversity

CTC

QAM64 5/6

20.5

21.5

20

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page24

System Parameter
Repeated coding

process of coding the same information twice, reduce the coding rate.
helps reduce the BER, obtain the repeated coding gain, and lower the
demodulation threshold.
network coverage can be increased.

Repeated coding times (CCH)

Repeated coding times (TCH)

Repeated coding gain (dB)

3.01

6.02

7.78

It is recommended that the repeated coding times be configured to 0 in the


downlink and configured to 2 in the uplink when the edge rate is low.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page25

System Parameter
Downlink CCH

Includes frame control header (FCH), DLMAP, and ULMAP.

Specified in protocols, must be configured with PUSC mode.

The downlink CCH supports at most four times of repeated coding.

Uplink CCH

Ranging sub channels

Ranging code is a pseudo-random sequence.

Configured with the BPSK modulation mode.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Environmental Parameter

Body loss
WiMAX protocol supports the fixed terminal and mobile terminal.

CPE: the body loss is 0dB

Handhold equipment: the body loss is 3dB

Cluster loss
Land objects have a great influence on signal transmission.

penetration loss

Dense urban

Urban

Suburban

Rural

20 dB

15 dB

10 dB

8 dB

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page27

Environmental Parameter

Shadow fading margin

According to the standard deviation of the shadow fading and the


requirements for the border coverage probability (determined by
the operator), we can calculate the shadow fading margin by
Mf (dB)= NORMSINV (Border coverage probability) x r

NORMSINV () is the inverse function of the standard normal distribution


accumulation function.

r is the standard deviation of shadow distribution.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page28

WiMAX Specific Parameter

Interference margin

The degraded system receive performance caused by internal


interference in the system due to cellular networking.

Interference Margin (dB)


DL

UL

PUSC 1*3*1

PUSC 1*3*3

FFR 1*3*1

3.5

3.5

PUSC 1*3*1

PUSC 1*3*3

FFR 1*3*1

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page29

WiMAX Specific Parameter

Fast fading margin


If the movement speed of terminal is going faster, as we know the fast
fading is more evident base on the characteristic of EW propagation. So
it is used to compensate the influence caused by fast fading on the
system.
Currently, we get the typical value depending on the system simulation
that fast fading margin on both link are recommended to 2 dB.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page30

Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Model
4. Other Principle
5. SiteAntenna and Feeder Selection

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page31

Scene Class

Terrain Scene Class - Important factor

Terrain type Influence on propagation loss

Based on WiMAX forums, the propagation scene is divided:

Dense urban area

Urban area

Suburban area

Rural area

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page32

Dense Urban Area

Dense urban area:


The height of building: the average height of building is in 2530 meter
and contain some of high buildings above than 20 layers.
Density of building: it is relatively flat, and the space among the building
is small and anomaly, most streets are narrow.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page33

Urban Area

Urban area:
The height of building: the average height of building is in 2025 meters,
most of building are about 710 layer, contain few high building above
than 20 layers.
Density of building: The building is not concentrated, the average space
between the building is well situated, and contain some park or greenbelt
etc.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page34

Suburban Area

Suburban area:
The height of building: the average height of building is in 1020 meters.
Density of building: it is relatively sparse compare with above case, and it
has wide street, a large greenbelt or enough space.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page35

Rural Area

Rural area:
The height of building: the average height of building is in 310 meters.
Density of building: The building distributes randomly and very sparse, exist
the big farmland or road.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page36

Propagation Model

Propagation model - important factor

Estimate the path loss (in km) during EM propagation caused by


the terrain and artificial environment.

Propagation model - created base on the proper traditional model


correction.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page37

Cost231_Hata Model (2.3GHz &


2.5GHz)

The European Cooperative for Scientific and Technical (COST) research extended the Hata
model as follows:

L p = 46.3 + 33.9 lg f 13.82 lg hb ahm + (44.9 6.55 lg hb ) lg d + cm


Lp: Path loss
f: Carrier frequency (MHz)
hb: The height of BTS antenna
hm: The height of terminal antenna
a(hm): Dense Urban: a(hm) = 3.2log2(11.75hm)4.97
Urban: a(hm) = (1.1logf0.7)hm1.56logf0.8
Cm: Correction factor

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page38

Cost231_Hata Model

In the suburban, Cost231_Hata model is corrected to be:

L ps = L p 2[lg( f / 28)]2 5.4

In the rural, Cost231_Hata model is corrected to be:

L pr = L p 4.78(lg f ) 2 + 18.33 lg f 40.94

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page39

Stanford Model A/B/C (3.5GHz)

Stanford model define three types of terrain:

Terrain Type Ait is used for sloping fields with many mountains,
plant distribute densely, and the path loss is the largest

Terrain Type BIt is used for the terrain between A and Cthe
path loss is placed in the middle

Terrain Type CIt is used for flat fields, plant distribute sparsely,
and the path loss is the lowest

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page40

Stanford Model A/B/C (3.5GHz)

The path loss in different terrain is represented as follows:

PL = A + 10 log 10( d / d 0 ) + X f + X h + s

d: distance between BTS transmitting antenna and MS antenna


d :0 reference distance, default value is 100m

s(dB): Shadow fading margin

A = 20 log 10(4 * d 0 / )

A (dB):

: path loss factor, default value is in 2~5,

hb: the height of BTS antenna

= ( a bhb + c / hb )

hcheight of terminal antenna


: the

X (dB):
f
correction factor of frequency

X f = 6 log 10( f / 2000)

X h(dB): correction factor of height of terminal


10.8 log 10(hc / 2)
Xh =
20.0 log 10(hc / 2)

for Terrain Type A and Terrain Type B


for Terrain Type C

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page41

Link Budget Example

Scenario setting:

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page42

Link Budget Example

Settings of BS and terminal

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page43

Link Budget Example

Cell coverage setting

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page44

Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Module
4. Other Principle
5. Site, Antenna and Feeder Selection

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page45

Calculation of Coverage Area


3 Sectors site
R

BTS1
R

D
BTS1

Omni site

BTS2

D
BTS3

R
BTS2

Site Coverage Radius: R


Site distance: D=1.5R
Coverage Area=1.949R2

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Site Coverage Radius: R


Site distance: D=1.732R
Coverage Area=2.598R2
Page46

Link Balance

Effective coverage (UL and DL together)

Link balance between Downlink and Uplink.

Both DL and UL allowed same transmission path loss

Sensitivity of BTS > sensitivity of terminal, so the path loss difference is


controlled in 1-2 dB, it would be balance on both link.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page47

Link Balance

Situation without tower amplifier


1.

Base on the link budget in downlink, we get:

2.

Base on the link budget in uplink, we get:

3.

Make the link balance:

4.

Finally we get:

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page48

Balance Setting Procedure


Link budget

Yes

No

RFL > RRL

Increase downlink service


rate at the border of cell

Decrease transmitting
power of terminal

Downlink Coverage radius


prediction

Uplink Coverage radius


prediction

RFL = RRL

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

No

Page49

Case Study- Parameter Collection


Scene Class

All

Scenario

DL

UL

Carrier Frequency

2.5 GHz

Sub-Carrier Allocation

PUSC with all

PUSC with all

Propagation Model

Cost231_Hata ( Huawei )

Modulation at the border

QPSK 1/2

QPSK 1/2

Channel Model

PB3

BS Antenna Configuration

MIMO Matrix A

MIMO Matrix A

Sector

3 sector

Number of BS Antenna

Channel Bandwidth

10 MHz

Number of SS Antenna

Nfft

1024

Tx

DL

UL

Sub-Carrier Spacing (kHz)

10.94

Maximum Tx Power

40 dBm

23 dBm

Background Noise Level

-174 dBm/ Hz

Cable Loss (dB)

0.9

CINR required (dB)

HUAWEI simulation

Antenna Gain (dBi)

17

SS type

PCMCIA

EIRP (dBm)

55.64

26

Area Coverage Probability

95%

Rx

DL

DL

Std. Dev. Of Slow Fading(dB)

Antenna Gain(dBi)

17

Slow Fading Margin (dB)

7.25

Noise Figure (dB)

6.5

5.6

Penetrate Loss (dB)

15

Code Repetition Times

Cable Loss (dB)

0.9

Repeated Code Gain

SS Antenna Height (m)

1.5

Interference Margin (dB)

BS Antenna Height (m)

30

Fast Fading Margin (dB)

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page50

Case Study- Link Budget Result


Scene Class

Dense Urban

Urban

Suburban

Rural

BS antenna height (m)

25

30

35

45

SS antenna height (m)

1.5

1.5

1.5

1.5

Coverage probability (%)

95

95

95

90

Indoor penetration loss (dB)

18

15

12

Standard deviation of slow


fading (dB)
Morphology

Dense Urban

Urban

Suburban

Rural

Cell radius (km)

0.37

0.63

1.25

5.17

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page51

Questions

Could you list the factor to influence on coverage ?

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page52

Contents
1. EM Wave Propagation
2. Link Budget
3. Propagation Module
4. Other Principle
5. Site, Antenna and Feeder Selection

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page53

Site Selection

The importance of site selection (>80%) ;

The site selection - terrain, user distribution and transportation


circumstance of whole

The site can not be far from ideal site longer than 1/4 radius

The requirement of site selection has a bigger difference with


different scene.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page54

Site Selection

Dense urban area and urban area

The site should be located in the densely population region.

The site guarantee the key area having a well communication, such as
airport, railway station, government office, hotel shopping centre etc.

3 sector BTS is recommended, and the height of site is better in 25~30


meters around.

The down tilt 1~5is recommended.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page55

Site Selection

Suburban area

3 sector BTS is recommended, and the height of site is better in 25~30


meters around

The down tilt can be set according to the actual case. If the site is not
very high, the down tilt can be 0

Rural area

According to the different terrain and user distribution, the omni BTS
or 3 sector BTS can be selected flexibly

The height of site is in 30~35 meters around

Generally the down tilt is 0, if the site is higher, the down tilt is
recommended

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page56

Antenna Selection

Urban area

Generally the directional antenna with 60~65 horizontal half-power


angle are selected

Generally 18dBi medium gain antenna is selected

Dual polarization antennas are recommended

Suburban area

The directional antenna with a 65 or 90 horizontal half-power


angle can be selected
Generally 18dBi medium and high gain antenna should be selected
Both dual polarization antennas and vertical polarization antennas
can be selected

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page57

Antenna Selection

Rural area

90 or Omni directional antenna or omni antenna can be selected


according to the specific situation/requirements.

Generally the high gain antenna selected is recommended.

For the high-altitude site, the zero filler antenna is preferred.

The vertical polarization antenna is suggested.

Selection of BS antenna on a road

for railway and highway coverage, narrow beam wide directional


antenna is recommended; for the coverage of villages beside the
highway, 210~220 Deformed Omni antenna is recommended
high gain antenna is recommended

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page58

Antenna Height

The height of antenna between adjacent sector should be the


same as much as possible

The height of antenna in suburban area should be higher than the


height of antenna in urban area.

What happen if the antenna is too high?

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page59

Down Tilt Design

The azimuth of three sectors in the urban should keep consistent as


much as possible

Main beam of antenna should be directed to the area having high traffic
density,

Increase the signal power and improve the quality of service.

Cross-coverage depth between adjacent sectors should not exceed 10%.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page60

Down Tilt Design

Mechanism

Electron
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page61

Feeder Selection
Frequency Band

2.5 GHz

3.5 GHz

Length Between RRU


and Antenna

Recommended

20m

1/2"

45m

7/8"

> 45m

5/4"

20m

1/2"

35 m

7/8"

> 35 m

5/4"

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page62

Summary

The Coverage Planning Process

Link Budget

Propagation Model

Site, Antenna and Feeder selection

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page63

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page64

WiMAX RF Optimization

www.huawei.com

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Objectives

Upon completion of this course, you will be able to:

Describe the position of RF optimization in the entire optimization


procedure.

Describe RF optimization procedure

Describe the common methods of RF optimization

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page3

Contents
1. WiMAX RNO Procedure
2. WiMAX RF Optimization Procedure
3. WiMAX Common RF Problem Solution

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page4

Contents
1. WiMAX RNO Procedure
2. WiMAX RF Optimization Procedure
3. WiMAX Common RF Problem Solution

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page5

RNO Procedure
New Site on Air

RF Optimization

Service Test
Parameter Optimization

Single Site Verification

DT
Traffic Statistic

Cluster Ready

Y
N

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Get the Target

Page6

RNO Procedure (Cont.)

Single site verification

The single site verification is the first step of the optimization, involving the verification
of functions of each new site. The purpose is to ensure that the site installation and
parameter configuration are proper.

RF optimization

The RF (or cluster) optimization starts after the site installation and verification are
completed in the planned area. As one of the major optimization step, the RF
optimization aims at optimizing the coverage and controlling the same-frequency
interference. The specific work involves the optimization and adjustment of the
antenna and the list of NBSs. Before RF optimization, search all cells within the area to
exclude hardware faults.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page7

RNO Procedure (Cont.)

Service test and parameter optimization

Drive test must be performed to evaluate the network performance and to further
determine whether to carry out the parameter optimization. Perform the drive test in
the area with good RF coverage performance to eliminate the signal coverage effect.
The test area may not cover all cells, but the test route should involve all terrains and
geographical conditions within the area.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page8

RNO Procedure (Cont.)

Routine drive test and traffic statistics analysis

To identify possible problems in time, such as changes in the network performance


arising from the traffic increase and environment changes, daily monitoring and
evaluation of the network are necessary. The monitoring is performed on the basis of
the drive test and traffic statistics analysis. The traffic statistical data can also be used
to determine whether the network should upgrade or the capacity of the network
should expand. The analysis result of the traffic statistics determines whether to
perform the RF optimization and parameter adjustment.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page9

Contents
1. WiMAX RNO Procedure
2. WiMAX RF Optimization Procedure
3. WiMAX Common RF Problem Solution

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page10

RF Optimization Work Flow

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page11

RF Optimization Objectives
Acceptance Contents

Number of Frequencies

Reference Value

Remarks

Urban area 65%

During the drive test, the network should be

Three frequencies
Suburban area 70%
CINR 10 dB

Urban area 75%

free of loads. The test route is in the mesh


shape to search all cells within the planning
coverage area.

Five frequencies
Suburban area 80%

Acceptance Contents

Distance Between Sites

Reference Value

Remarks

Urban area (700 m to 900 m)

80%

During the drive test, the network should be


free of loads. The test should traverse all
cells in the planning area. The test route is in

RSSI -80 dBm

the shape of a mesh. (If the penetration loss


Suburban area (900 m to
1200 m)

70%

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

is required, add the penetration loss value on


the coverage level.)

Page12

Divide Clusters

A cluster of BTSs should consist of 15 to 25 BTSs

The same cluster cant cross areas with different services ;

Consider the Impact of terrain factors (different topology)

Cellular clusters are more common than rod-like clusters.

Clusters divided by administrative regions:

Impact of the work load of the drive test: When dividing clusters, consider that the drive
test in each cluster is complete in one day with about four hours for each drive test.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page13

One Typical Cluster Division

JB03 and JB04 are dense urban areas;

JB01 is an expressway area;

JB02, JB05, JB06, and JB07 are common urban areas;

JB08 is a suburban area.


Each cluster contains about 1822 sites.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page14

Determining the Test Route

Before the drive test, determine the drive test route. If there is specified route, the drive
test route must include the specified route.
The drive test route should cover main streets, important places, and VIP area.
The test route should cover all cells, involve at least two tests (preliminary test and final
test). Perform tests for all streets in RF planned area if we have time.

To observe the performance change, each drive test should follow the same route

Consider one-way street, traffic light restriction, and turning restriction.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page15

DT Route Example

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Preparing Tools and Documents

Preparing Software

Preparing Hardware

Preparing Documents

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page17

Recommended Software for RF Optimization


SN

Software

Description

Remarks

Genex Probe

Conduct drive tests

Mandatory

XCAL-X

Conduct drive tests

Optional

Genex Assistant

XCAP-X

Analyze DT data

Optional

M2000

Analyze performance

Mandatory

MapInfo/Google Earth

Analyze DT data and check

Mandatory

neighboring cells

Display the map and select

Mandatory

the route

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Recommended Hardware for RF Optimization


SN

Device

Description

Remarks

Scanner

MSs and data lines

GCT and CPE

Mandatory

Laptop

PM1.7G/1G/20G/USB/COM/PRN

Mandatory

GPS

GPS

Mandatory

Inverter

DC to AC, higher than 300 W

Mandatory

Software license

Licenses of the Probe and Assistant

Mandatory

Dongle

Dongles of the XCAP-X and XCAL-X

Optional

Spectrum analyzer

Compass and gradiometer

Used to adjust the antenna

Mandatory

10

Camera

Take photos

Mandatory

Scan frequencies and analyze

Optional

interference

Find the interference when the external


interference exists

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page19

Optional

Recommended Documents for RF Optimization


SN

Required Materials

Description

Remarks

Engineering parameter table

Map

MapInfo or paper map

Mandatory

KPI requirements

RF optimization target

Mandatory

Network configuration parameters

Site survey report

Every site

Mandatory

Single-site verification checklist

Every site

Mandatory

Floor plan of the floor to be tested

For indoor test

Mandatory

Store the engineering


parameter

Wireless and device


configuration

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page20

Mandatory

Mandatory

Data Collection DT Test

The DT test can use one of the following modes:

Test for network access status through MSs without loading. This test focuses
on the network access successful rate and the coverage area.
Test FTP download or upload by MSs: This test focuses on the access success
rate, and the average download and upload rate of the FTP server.
Test http webpage open during network access by MSs: This test focuses on
the setup successful rate and the setup delay of the http protocol.
Test ping operation during network access through MSs: This test focuses on
the delay and packet loss rate of the ping operation.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page21

Data Collection CQT and Indoor Test

The CQT test can use one of the following modes:

Test for network access through MS: Perform 100 access tests ;

Test for FTP upload and download through MS: Perform 10 tests ;

Test for http webpage open through MS: Perform 20 tests;

Test for ping operation through MS: Perform 20 times ;

When performing an indoor test, add test points manually mark on the map to
display the moving route because GPS signals cannot be use during the indoor test.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page22

Data Collection Configuration Data

Handover related data

Power setting related data

Cell configuration data

Check the alarm information

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page23

Adjustment Measures for RF Optimization

The adjustment in the RF optimization mainly involves the adjustment of NBS list and
engineering parameters. Most coverage and interference problems can be solved through
the adjustment of the following engineering parameters (ranked in descending order by
priority):

Antenna tilt

Antenna height

Antenna type

Changing the site type (such as the Pico site supporting small power amplifier
changing into the site supporting large power amplifier)

Site location

Adding sites/ RRUs

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page24

Contents
1. WiMAX RNO Procedure
2. WiMAX RF Optimization Procedure
3. WiMAX Common RF Problem Solution

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page25

Category of Common RF Problems

Weak coverage analysis

Co-channel interference caused by cross coverage

Analysis of coverage balance between uplink and downlink

Analysis of handover problems

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Analysis of Weak Coverage

Weak coverage: In the coverage area, the RSSI of signals is < -85 dBm and the CINR is < 10
dB.

After determining the weak coverage area, carry out the further analysis:

Check whether the handover of terminals is normal and whether cell coverage signal is
normal.

Check whether the settings of the cell configuration parameters of the area is correct
and also whether the hardware transmitting power is normal.

Check whether an alarm is generated and whether hardware is faulty in the cell.

The common scenarios of weak coverage include concave, hillside, elevator shaft,
tunnel, underground garage or basement, and internal area of a high building.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page27

Optimizing Weak Coverage

Optimize the coverage by increasing the transmit power, adjusting antenna azimuth,
down tilt , or height, or using the antenna with a higher gain.
Adjust the antenna at terminal side, move the terminal closer to the window, or use the
terminal with directional and high gain antenna.
Replace the indoor type terminal with the outdoor type one, and adjust the antenna to
ensure the quality of received signals.

Install the RRU on the tower so that the loss generated by feeders is less.

Adjust the times of repeated coding.

Build new base stations in the case the poor coverage is caused by discontinuous
coverage. (optional)
Build new base stations in the areas the poor coverage is caused by the valley and
mountains. (optional)

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page28

Coverage Analysis
Weak
coverage
area

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page29

Co-channel Interference due to Cross Coverage

In the optimal status, signals of each cell are strictly controlled in the designed range.
However, it is difficult to control signals due to the complicated radio environment and
the optimal status cannot be reached. Hence, the cross coverage occurs. According to the
features of the WiMAX, the frequency resources are limited, with high spectrum
multiplexing. The Co-channel interference occurs.

The causes are as follows:

Base stations are in dense urban environments and the terrain and landform of the site
area is complicated.

The site of the base station or the height of an antenna is too high.

The setting of the antenna down tilt is improper.

The performance of the antenna

The antenna azimuths are irregular (signal coverage, traffic distribution, restriction on
installation locations which is out of control)

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page30

Impact Analysis of Inter-BS Co-channel


Interference

CINR deterioration (no signal coverage)


The CINR decreases greatly due to the Co-channel interference.

Difficulty of network access


When the interference is strong, terminals in the serving main sector can not access the
network, or is automatically switched to other sectors to access the network, or the
network access fails.

Decrease of the capacity


The interference causes the decrease of the CINR. As a result, the encoding mode is
affected. The capacity decreases. The sector average throughput decreases. As a result,
the user experience is affected directly.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page31

Method of Determining the Inter-BS Co-channel


Interference

If the RSSI is in the normal range and the CINR is relatively low, it indicates that the
inter-BS Co-channel interference may occur.

The Scanner can scan the downlink signals of more than 10 Co-channel sectors and save
relevant data for analysis.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page32

Method of Optimizing the Inter-BS Co-channel


Interference

Adjust antenna
Adjust the antenna azimuth and downtilt to change the sector signal strength in the inter-BS Cochannel interference area , to adjust the distribution of sector signals in the area. Adjustment
principle: enhance the main coverage signals and reduce the Co-channel sector signals of other BSs
so that the RSSI of Co-channel sectors in the area is smaller.

Adjust the transmit power


Reduce the transmit power of the sector to decrease the coverage of the interference sectors. In
the RF optimization, the adjustment of transmit power is not recommended. The transmit power is
adjusted when the antenna cant be adjusted.

Adjust the networking mode


The current networking modes of the WiMAX16e include PUSC 1/3, PUSC with all SC 1X3X3, and FFR.
The interference is serious because of less frequency and small multiplexing. If the inter-BS Cochannel interference can not be solved, you can change the networking mode.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page33

Unbalance between Uplink and Downlink

Definition:
The downlink coverage is excellent and the uplink coverage is limited, or the uplink
coverage is excellent and the downlink coverage is limited in the target coverage area with
the consideration of the equipment capability difference between devices (for example,
power and demodulation sensitivity). WiMAX is the uplink limited system.
Impact:

Terminals can receive signals but the fails to access to services.

The signals of BSs can be demodulated but the fails to access to network.

The network access failure rate increase.

The packet error rate increases and services are jittered frequently.

The traffic statistic counters are affected and the user experiences decrease.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page34

Reason of Unbalance between


Uplink and Downlink

Different maximum transmit power for the site and the terminal

Different sensitivities for the site and the terminal

Improper configuration of the power control parameter.

Interference: the interference causes the unbalance between uplink and downlink.

Hardware fault: hardware faults of equipment and the improper installation of antenna
feeder cause the unbalance between uplink and downlink.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page35

Solution of Unbalance between


Uplink and Downlink

Use terminals with high power (CPE).

Increase the transmit power of terminals.

Replace Omni-directional antenna with directional high gain antenna.

Enable the power control, and set the parameters properly.

Improve the receiver sensitivity of the terminals.

Check and analysis the network whether interference exists.

Check whether the working status of the equipment is normal.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page36

Handover Problems

Handover failure: Huawei current products support only the hard handover. Handover
includes two steps: disconnection of the serving BS and access to the target BS. The failure
usually occurs in the step of accessing to the target BS.

Handover delay: The handover does not occur in a long period when a mobile phone
should handed over. In this period, we can observe that the receive level of the serving
cell is consecutively low, or the receive quality is consecutively poor.

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page37

Handling of Handover Problem

Handover failure events are analyzed with the combination to traffic statistic, call logs, and
drive test data:
1.

Reasonableness of handover: Check whether the settings of neighbor cells are reasonable.
Check whether the proper neighbor cell relation is configured.

2. Check whether the handover threshold is normal. When the CINR is smaller than the
scanned threshold, terminals start to originate the scan. When the CINR reaches the
handover threshold, the terminal originates the handover.
3. Network coverage performance: Check whether the cross-cell interference exists through
the RSSI and CINR in the serving cell and target cell in the case of the handover
occurrence.
If the scanning threshold is too low, terminals fail to connect to the networks.
If the scanning threshold is too high, terminals scan signals frequently and air interface
resources are waste.
If the handover threshold is too high, the handover seldom occurs.
If the handover threshold is too low, the ping-pang handover may occur.
Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page38

Questions

Could you list the common methods that are used to


adjust the engineering parameters ?

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page39

Summary

RNO Optimization Procedure

RF Optimization Analyses

RF Optimization Solution

Copyright 2010 Huawei Technologies Co., Ltd. All rights reserved.

Page40

Thank you
www.huawei.com

You might also like