Professional Documents
Culture Documents
com
VST-ENG-RC
Gachanja Njoroge
Index Day 1
www.cbnl.com 2
www.cbnl.com
VST-ENG-RC
Your trainer for the week
Your trainer for this week is
Gachanja Njoroge
Customer Support Engineer
www.cbnl.com 4
Fire procedure
1. Do not assume it is just a drill or alarm system test (you will have been informed in advance if it is a system test)
2. Dont panic
3. Go to the nearest fire exit and leave the building. Do not run. Tell any visitors to follow you
8. Do not open any doors which feel hot to the touch (the fire may be on the other side)
9. Move to and wait at the designated assembly point. For Byron House, this is the car park at the Reception end of
the building. For Sawston, this is the car park to the rear of Unit 9
10. Keep well away from the windows if there is an explosion this may blow broken glass outwards
11. Remain at the assembly point until you are told by a Fire Marshal that you can leave it. Do not leave the assembly
point before this time.
www.cbnl.com 6
VectaStar Training: Housekeeping UK
Facilities
In reception
Smoking area
Outside, at rear of building. Please use ash trays provided
Fire alarm
Exit calmly and safely, via fire exits at each end of the building,
report to assemble point in car park
Timing of sessions
Typically 9.00 17:30, but can adjust to suit your requirements
Tea breaks morning and afternoon
i. Stop me if you want a break
Prayer time Please tell me what arrangements you need
Lunch around 13:00 to fit in with practical work, earlier on Friday
www.cbnl.com 7
VST-ENG- RC : Topics
VST-ENG-RC
Prerequisites
Knowledge of IP, Linux/Unix
Understanding of Telecoms networks
Overview
Provides an overview and introduction to VectaStar ZFH, ZFT and the VNMS. At the end of the course the student will be able to implement
given network designs using VectaStar Gigabit components, locate and resolve common faults and work with the CBNL support team to
identify more complex issues.
Course content
Introduction to CBNL and Customer Support
Basic Linux Concepts
VSG overview
i. Key Features
ii. APs, RTs and Redundancy
iii. Services and QoS overview
iv. RF Planning overview
The upgrade process
Introduction to Radio and VectaStar-specfifc Radio aspects
Installing and configuring the Outdoor Units - AP and RT
Creating Services
i. vbridge services
VectaStar QoS
Introduction toithe VNMS server
Basic fault-finding
i. Reviewing alarms
ii. Generating information for support calls
RMA process
Backup and recovery of configuration information
www.cbnl.com 8
VectaStar Training: agenda VST-ENG-VSG
www.cbnl.com 9
VectaStar Training: Assessment
Assessment is divided into two parts
Continuous Assessment
The 5 day course is continually assessed by your trainer
Ongoing question and answer sessions
Practical and theory examination
Friday Morning,
Practical test of what you will learn during the week
Theory, based on the sessions during the week
www.cbnl.com 10
VectaStar Training: Introduction
That was me
www.cbnl.com 11
www.cbnl.com
Customer Support
VST-ENG-RC
Customer Support
www.cbnl.com 13
Customer Support
Technical Support
Training of Customers in
Cambridge
Johannesburg
Nigeria (mid 2011)
Kenya (early 2012)
www.cbnl.com 14
Customer Support: First point of contact
Assistance to customers from Trial to Deployment and beyond
Help Desk (24/7 for platinum customers)
Email
Onsite
Provide Training
www.cbnl.com 15
Customer Support: First point of contact
www.cbnl.com 16
Training staff
www.cbnl.com 17
Online Customer Support
The Support Website
Software
Library
FAQ
Download area
www.cbnl.com 18
Worldwide Support Contacts:
Global website: http://www.cbnl.com/support
www.cbnl.com 19
Who we support
www.cbnl.com 20
Regional Support
Regional Centres
Lagos (Nigeria)
Centre of Excellence opened mid-2011 to provide a regional centre for West Africa
Kenya
Office opened early-2012 to provide a regional centre for East Africa
Local training facility
www.cbnl.com 22
Training
Standardised Certified Training Programmes started in 2005
People certified not companies (transferable skill)
Train both VARs and Customers
Mostly carried out in UK and SA by Training and Support Staff
Full range of courses
Training Calendars published on Corporate website
Courses
VST-INST-RC at customer premises
VST-INST-APC at customer premises
VST-ENG-RC in all training centres
VST-ENG-APC in all training centres
VST-ENG-ZFS in all training centres
VST-SPEC currently in the UK and SA only
VST-NMS-ADM in all training centres
VST-NMS-OP in all training centres
VST-LIN currently in the UK only
www.cbnl.com 23
VectaStar around the world
www.cbnl.com 24
Mumbai 2005: 900mm of Rain in 24 hours (3ft!)
www.cbnl.com 25
Outdoor Cabinet in The Caribbean
www.cbnl.com 26
February in the Arctic Circle!
www.cbnl.com 27
Site in Latvia
www.cbnl.com 28
Site in Poland
More complicated !!!!
www.cbnl.com 29
India: Mumbai Roof top
www.cbnl.com 30
Access in China
www.cbnl.com 31
Late Nights in Malaysia
Even Engineering cant keep up !
www.cbnl.com 32
Its not all bad.....................
www.cbnl.com 33
Linux Conventions
APs and RTs running embedded Linux -require basic understanding
Symbol Meaning
. The literal translation of this is here. It is the current working directory.
Standard Output This is the output device the command you have run will normally output to. Typically
stdout this is the screen or shell window
You use this to redirect the output of the command to, typically, a file. This redirect will replace an
> existing file. An example (which uses the grep command to find a pattern of characters) would be;
grep pattern file > newfile.txt
You use this to redirect the output of the command to, typically, a file. This redirect will append text to
>> an existing file (rather than replacing the file). An example would be;
grep pattern file >> oldfile.txt
This allows you to pipe the stdout of a command and use it as the input to another command. An
| example would be
grep pattern file | grep pattern2
www.cbnl.com 34
Linux Theory and some basic commands
Familiarity with some Linux commands and theory will make VectaStar easier to
understand
Standard commands like, ls, pwd, cp, scp, ssh etc are used
Standard concepts like the file system, file processing and theories are used
Your handout book contains more commands and concepts, the important commands
are shown in next slide
www.cbnl.com 35
Linux Theory and some basic commands
cp <path1/file1> <path2/file2> copies a file to a different directory path (and optionally gives it a new name).
mv <path1/file1> <path2/file2> moves a file to a different directory path (and optionally gives it a new name).
www.cbnl.com 36
Linux Theory and some basic commands
scp <user@machine:/path/file1>
secure copy allows you to copy files between machines.
<user@machine:/path/file2>
tar tape archive utility; try man tar on your VNMS for more details
www.cbnl.com 37
Users and permission levels
Read VS
Set Users Change O S Set VS Parameters;
Parameters;
parameters;
VectaStar creating / deleting
view alarms,
Permissions IP addresses etc. services
vsstatus etc.
root
Operator (CBNL)
Monitor (Software)
www.cbnl.com 38
Accessing Linux from Windows poor method
In this simple network, the telnet protocol may be used. This is an insecure protocol,
which is open to hacking and abuse
The main reason for this lack of security is telnet is not encrypted, passes server, log in
and password details in clear text which would allow anyone monitoring the network
to see the username and password
www.cbnl.com 39
Accessing Linux from Windows a better way
A better method is to use the ssh protocol, which enhances security by building an
encrypted tunnel between the two machines
This allows the usernames and passwords to be passed without using clear text. The
encryption used varies, but is typically 128 bit strong, which requires in the order of
10,000 machine hours to break
www.cbnl.com 40
PuTTY - Introduction
In order to communicate between Windows and Linux machines it is
necessary to use PuTTY, an X server and WINSCP
This input allows you to configure the
username and host ID
www.cbnl.com 41
PuTTY - Introduction
As you use PuTTY more, youll find there are more options, including the Default Settings
The main areas you will probably find useful are -
Ensure you use a sensible entry in the Connection / Data menu under Auto-login
username.
Under SSH / X11 you can ensure the X11 forwarding is enabled
Under SSH / Auth you can configure sensible policies on the use of public and private
key pairs
If you find the current default colours are difficult to use, you can modify them under
Window / Colours
www.cbnl.com 42
X servers and WINSCP - An introduction
X server, is the name of the process we run on windows machine in order to display
the GUI from remote utilities such as the VectaStar EMS Tools
Usually displays small icon in the Task Bar or System Tray
WINSCP is used to copy files from a windows machine to a Linux machine.
It has an interface much like windows explorer and is a drag and drop GUI
Local Linux
system system
www.cbnl.com 43
www.cbnl.com
VST-ENG-RC
Training Room networks
VSG Remote Terminals VSG Access Points
.192
3Com switch
Test laptop Test laptop VNMS Server
Management
.160
Cisco switch
Test Server
.168
Internet
www.cbnl.com 45
Indoor equipment rack, in detail
www.cbnl.com 46
Outdoor equipment rack, in detail
VSG Access Points
2:1 RF Combiner
4:1 RF Combiner
VSG RTs
GPIs
www.cbnl.com 47
Configtool, more information
Configtool is a VectaStar specific utility used to configure some initial low level
parameters
The aspects of configtool, which you will be working on this week are highlighted
below
www.cbnl.com 48
Configtool, more information
Configtool is a VectaStar specific utility used to configure some initial low level
parameters
The aspects of configtool, which you will be working on this week are highlighted
below
www.cbnl.com 49
configtool commands
Command Action
showall When run within a sub-menu, it shows the value of the configurable variables
Combined with the name of a variable, allows you to change the value of a variable
set
For example ipaddress set 192.168.0.64
Combined with the name of a variable, allows you to add another value to the variable.
add
For example, host add 192.168.192.34
Combined with the name of a variable, allows you to remove a value from a variable
del
For example, host del 192.168.192.34
Writes your changes to disk (compact flash) and enables the changes
write
Making changes in configtool, then writing them, can cause service outages
Quit Exits configtool; it will prompt you if you have un-written changes
www.cbnl.com 50
www.cbnl.com
VST-ENG-RC
VectaStar Gigabit Overview
Highly flexible carrier-class Point-to-Multipoint transmission platform
Competitive solution for high capacity business access and backhaul
Operating in 10.5 GHz, 26 GHz, 28GHz bands with a throughput > 150 Mb/s
Key features -
Over 150Mb/s Ethernet throughput (300 Mb/s full duplex) per sector in a 28MHz
channel
Class-leading spectral efficiency of 6.2bits/second/Hz (Gross)
7-state Hitless Adaptive Modulation (ACM) from QPSK up to 256QAM with Trellis Code
Modulation (TCM)
Full Quality of Service (QoS) support
Sub-millisecond latency for delay-sensitive applications
Built-in Statistical Multiplexing and Traffic Aggregation
Flexible synchronisation schemes
Fully redundant Hub (1+1 and 2+0 )
Fully symmetric radio links (power, modulation & bandwidth)
www.cbnl.com 52
System Overview
Specifically designed for backhaul of high capacity services
www.cbnl.com 53
VSG Terminology
Zero Footprint Sector (ZFS) -VSG AP installed standalone
Supports up to 8 Remote Terminals
www.cbnl.com 54
Zero footprint sector
Primary component of VSG hub is the sector radio outdoor unit Access Point
Single externally mounted sector antenna
Combined all-outdoor radio, modem and network interface unit
Outdoor Unit (ODU) mates directly with antenna using a slip-fit waveguide
www.cbnl.com 55
Fully scalable hub
Larger networks (multiple sectors/more RTs per sector) require Radio Controller
RC enables -
More RTs per sector
Traffic aggregation
Services terminated on a single interface to customer Core Network
www.cbnl.com 56
VSG Access Points
Standalone sector radio comprising -
Antenna, radio, modem, MAC, baseband board, interfaces for power and data
www.cbnl.com 57
VSG Access Points
Slip-fit coupler allows use with vertically- or horizontally-polarised antenna
Different coupler available for parabolic antennas
Cat-5E installations use a Power Injector (e.g. GPI) to couple power and data
www.cbnl.com 58
VSG Radio Terminals
VSG RT comprises -
Outdoor Unit (ODU) -radio, modem, MAC Baseband board, interfaces for data and
power
Associated indoor equipment
High gain radio link to AP at the hub
Available capacities -
10.5 GHz up to 75 Mb/s for any packet size
26 /28 GHz up to150 Mb/s for any packet size
www.cbnl.com 59
VSG Radio Terminals
Antennae are linearly polarised
Cat-5E installations use a Power Injector (e.g. GPI) to couple power and data
www.cbnl.com 60
Power Injectors
All VSG RTs installed with single cable providing power and data
VSG APs also support power and data over a single cable
www.cbnl.com 61
Gigabit Power Injector
Small form factor unit designed to use in standard 19-inch rack
Cable should be Foil Twisted Pair (FTP) CAT-5E with 24 SWG solid copper core
www.cbnl.com 62
IDU-PI-60W POE adapter
Allows up to 80m cable to 3rd party equipment
Cable should be Foil Twisted Pair (FTP) CAT-5E with 24 SWG solid copper core
www.cbnl.com 63
Lightning Surge Protection
ODUs mounted as high as possible on mast/building and are susceptible to
lightning strikes
www.cbnl.com 64
Lightning Surge Protection
www.cbnl.com 65
Lightning Surge Protection for 2-core Power (e.g. AP)
For a VSG hub AP using 2-core power and fibre, only 2-core power cable
requires surge protection
Fibre does not conduct lightning and does not require any protection
www.cbnl.com 66
Lightning Surge Protection for CAT-5 RT
For all RTs and for APs installed using twisted pair cable, surge protection is
implemented using the LP-GE module
The LP-CPE unit used for VectaStar2 CPEs is NOT compatible with VSG ODUs
www.cbnl.com 67
Radio Controller
The Radio Controller (RC) is a 19-inch rack-mounted 1U indoor unit
Serves as a flexible hub for multiple VSG Access Points (VSG APs)
Traffic from RTs in multiple sectors is aggregated in the RC onto GbE or 10 GbE
interfaces
www.cbnl.com 68
Radio Controller
RC is easily managed by means of -
two RJ45 10/100Base-T ports
A DB9 serial port
a USB port
www.cbnl.com 69
Radio Controller
For networks requiring highest availability, number of protection features exist -
1:1 port redundancy with ports optionally spread across a pair of RC devices
Redundant RCs to provide resiliency at the hub with up to 8 VSG AP sectors supported
per RC
www.cbnl.com 70
Radio Controller
www.cbnl.com 71
Redundancy
Number of Redundancy options
www.cbnl.com 72
Full Hub Redundancy
Two hubs are installed with all hardware paired
A pair of Radio Controllers connected together using either GbE or 10 GbE interfaces
Redundancy mechanism uses two nodes (separate, physical RCs with their associated
APs) in a cluster
Cluster has a single IP address aliased to the node currently running the VectaStar
resource
www.cbnl.com 73
Full Hub Redundancy
If Primary RC fails, entire hub fails over to Secondary hub
www.cbnl.com 74
Outdoor Redundancy
Uses AP pairs connected to a single set of indoor equipment
www.cbnl.com 75
GbE Port Redundancy
Uses a proprietary link-down protection
www.cbnl.com 76
Management Traffic
In-Band Management
www.cbnl.com 77
Management Traffic
Out-Band Management
www.cbnl.com 78
Management Traffic
AP Management
With no RC, APs are typically managed individually using In-Band management
www.cbnl.com 79
Services
At the VSG AP, each service may be terminated -
Directly on the AP GbE interface
On the Radio Controller (in the case of a hub)
On another RT registered with the same sector
On another RT registered in a different sector (in an RC-based hub)
www.cbnl.com 80
Modulation per Service
Modulation is per service, independently set on the Downlink and Uplink
vbridge service
Ethernet service carrying frames from an AP/Radio Controller to the RTs GbE
interface supporting the following options -
IEEE 802.1D (MAC switching)
IEEE 802.1Q (VLAN Tagging)
IEEE 802.1p (Class of Service)
IEEE 802.1ad (QinQ)
www.cbnl.com 81
vbridge service
At the RT behaves like an Ethernet hub rather than a bridge
Copies Ethernet frames, with the matching VLAN tag (or no VLAN tag), between
the Ethernet interface and the air interface
www.cbnl.com 82
VLAN Trunking using the vbridge service (QinQ)
An untagged vbridge service forwards all frames received on the specified RT
port, except the following -
Unique traffic streams within the radio network that egress the same port at the
AP/RC must be separated by adding an outer VLAN tag (QinQ)
www.cbnl.com 83
Quality of Service (QoS)
QoS defined on a per-service basis and can be applied at
the transport layer (over the air)
at either end (e.g. with layer 2 / layer 3 filtering available for IP/Ethernet services)
Each service is queued independently and limited at input by Peak Information Rate (PIR)
If no Committed Information Rate (CIR) defined, round robin scheduler used in each priority class
If CIR values defined, round robin scheduler is weighted and services sending data below their CIR
setting are scheduled before services which have sent data above their CIR (on average)
Services above their CIR are allocated additional throughput based on their CIR
www.cbnl.com 84
QoS
QoS Scheduling in MAC uses formula -
www.cbnl.com 85
Security
Number of security features available to prevent an RT registering on a sector where it is
not permitted e.g. two operators using VectaStar in one town
Useful to know that both systems can see each other and to be aware of any attempted
cross-registrations -
frequency planning
configuration management
RT detects from which network data is received by reading the broadcast operator
descriptor field sent to it by an AP
www.cbnl.com 86
Encrypted Management
VectaStar uses SNMP for management and supports
SNMPv3 entity asking for the information is authenticated by the SNMPv3 entity
providing the information
When the SNMPv3 entity receives the information, it authenticates the provider
of the information
www.cbnl.com 87
End to End Encryption
All security conscious operators should use end-to-end data encryption across
their entire transport network - ONLY secure model for encryption
www.cbnl.com 88
Security against Misconfiguration and Hacking
All VectaStar RTs and hubs are managed by IP connections
SSH access combined with layer 3 firewalls (iptables and TCP wrappers under
Linux) ensures that strict access control can be enforced across the network
Combined with good network design greatly reduces the possibility of hacking
www.cbnl.com 89
Radio Frequency Planning
Every radio link should be planned to ensure the desired availability is achieved
Ensures that network achieves the desired availability for any given LOS path
www.cbnl.com 90
Radio Frequency Planning
There are two aspects to link planning
www.cbnl.com 91
Radio Frequency Planning
Link ranges determined on -
99.995% reliability
1E-9 BER
Vertical polarised 60cm RT antennas
14 MHz channel
AP at 100m asl
RT at 20m asl
www.cbnl.com 92
Frequency Division Duplex (FDD)
VS is an FDD system - separate U/S and D/S radio channels used simultaneously
Broadcast contains information that all RTs are expected to use e.g. -
Operation and Maintenance information
Synchronisation information
Downlink and uplink frame description
Each D/S frame may contain data using any modulation BUT not all RTs will be able to
demodulate this data. e.g.
RT at long range using QPSK may not have CNR to demodulate 64 QAM cells
Each RT uses downlink frame descriptor to identify its data in the downstream and also
determine when it is scheduled to transmit upstream
Frame description is always sent at QPSK - all RTs MUST be able to demodulate
www.cbnl.com 93
Modulation Schemes
VectaStar supports two methods of defining the modulation -
Static
Hitless Adaptive Modulation
Both schemes are able to use any/all of the supported modulations states
Modulation is per service - each RT can simultaneously support services on any
available modulation
www.cbnl.com 94
Choosing a Modulation Scheme
Default modulation is QPSK
www.cbnl.com 95
Choosing a Modulation Scheme
Ethernet Efficiency per channel size (Mb/s)
256QAM+T 35 75 150
128QAM+T 33 65 135
64QAM 30 60 120
64QAM+T 25 50 100
16QAM 20 40 80
16QAM+T 15 30 70
QPSK 10 20 40
www.cbnl.com 96
Choosing a Modulation Scheme
Ideally, all services would use highest modulation available -
most spectrally efficient
Link budgets of higher modulations are always lower than those at lower ones
For a given SLA reliability, higher modulations have a shorter range than lower
modulations
In most deployments there are RTs where range does not permit the use of
highest modulation scheme and a lower modulation is used instead
www.cbnl.com 97
Adaptive Modulation
With a service configured to adaptive modulation, VectaStar will start the service at the
highest modulation supported and, if necessary, reduce the modulation until a stable
service can be established
The RT transmit power is fixed to that which is required for the highest modulation
scheme, regardless of the actual modulation in use
May be defined as -
no overbooking
limit a sector overbooking by a desired factor.
www.cbnl.com 98
Adaptive Modulation and Fading
All radio links will suffer from fading - the longer the link and the higher the frequency, the
more severe and frequent, fading will be
Radio links are planned to take account of fading to ensure reliable operation
Allows for a Fade Margin in the link budget i.e. spare power is kept in reserve until
needed to maintain the link in a severe fade
When link is not fading, link appears to run conservatively and may be able to use a
higher modulation
Link could operate at a higher modulation, but only during the fade-free period
www.cbnl.com 99
Adaptive Modulation and Fading
Likely cause of fading at higher frequencies is rain - probably affect several links in sector
at same time
Fading will not be uncorrelated and many links may simultaneously drop down to a lower
modulation
Plan capacity to take account of modulation recommended by the link planning
process not best case modulation
Severe overbooking caused by fading can be avoided
Even with good planning if severe fading occurs, Adaptive modulation may preserve
service although capacity may be reduced
If fade is so severe that QPSK links cannot be sustained, service will be lost with both
modulation types
www.cbnl.com 100
Planning a Link in advance
Many factors can affect the link budget and therefore the available modulation
Care should be taken to maximise spectral efficiency i.e. ensure as many RTs
as possible use a high order modulation
CBNL has an Excel link planner tool, which can be used to plan each link to
ensure that the required modulation and link-reliability can be achieved
www.cbnl.com 101
Selecting the best modulation for a deployed RT
Once RT is deployed, the CNR should be checked to ensure that it can operate
correctly at the desired modulation
Be aware, that the CNR may change over time due to the following causes
An obstruction e.g. foliage growth or new buildings
Atmospheric fading/multi-path which affects propagation when it is not raining
Rain fade (noticeable at 10.5GHz and particularly prevalent at 26 and 28 GHz)
Interference (either from another VectaStar radio using the same frequency within
range or another radio system).
www.cbnl.com 102
Rain fades, atmospheric fades and availability
Typically operator will have target link reliability, often in range 99.9% to
99.999%
RTs use automatic gain control (AGC) to adjust receiver gain to compensate for pathloss
RTs will automatically adjust receiver gain to compensate for any power variations
AP runs without AGC (since upstream frame contains transmissions from a number of RTs and AP
cannot predict which RT is in which contention slot
Upstream AGC is RT adjusting its power and AP providing feedback
Each modulation has a set point at the AP for Rx power from RTs
Upstream Closed Loop power control cannot react instantly, so there is a nominal 5dB built-in fade
margin (configurable per sector)
RT can increase transmit power before data is lost.
www.cbnl.com 104
Power Control
5dB default fade margin means standard Upstream CNR targets, at the AP, are -
128QAM+T 28.5 dB
64QAM 26 dB
64QAM+T 22 dB
16QAM 18.3 dB
16QAM+T 15 dB
QPSK 14 dB
www.cbnl.com 105
Downstream fading
RT can accurately measure the downstream path loss by comparing the
received downstream power with the APs Tx power
AP transmits at constant power and the RTs use AGC to adjust for their pathloss
Implicit fade margin which is the delta between the minimum required signal
power for the modulation in use and the actual received power from the AP
6dB of instantaneous headroom
5dB of margin (default)
Outside range, AGC is required and RT can independently adjust its AGC at
approximately 6Hz
www.cbnl.com 106
Upstream fading
For small fades, the digital demodulator in AP can cope without requiring RT to adjust Tx power
3dB to 15dB (3dB for 64QAM, 9dB for 16 QAM, 15dB for QPSK) of instantaneous headroom
Difficult to accurately predict U/S pathloss over time with Dynamic channels
May be periods when the RT does not know about changes in the upstream path loss
www.cbnl.com 107
Upstream fading
To get around this, the RT has two power control modes
Correlation mode
The RT constantly correlates upstream and downstream path losses
If the correlation is high, RT will use the downstream path loss to predict the upstream
path loss in between polls from the RT
Allows upstream power control algorithm to track large changes in the order of
20dB/sec in correlated channels with negligible performance penalty
Back-off mode -
If upstream and downstream path losses are poorly correlated, the RT uses a safe
mode where the Tx power is backed off to ensure that the AP Rx power does not
exceed the target power
www.cbnl.com 108
Asymmetric CNR
An RT quite close to the AP, running a QPSK service would show
a high downstream CNR, e.g. 30dB +
but only 18dB CNR on the upstream
For example, the following screen capture from vsstatus shows RT Damian with
30.6dB CNR downstream and18.7dB CNR upstream.
www.cbnl.com 109
Asymmetric CNR
This is because the RT has set its transmit power such that it meets the QPSK upstream
target power at the AP (i.e. 18dB CNR). Right-clicking on the RT name shows the Tx
power 16.6dBm, significantly below the maximum possible for this RT (which is 34dBm)
If the RT is reconfigured for a 64 QAM service, the upstream Rx power and CNR will
increase accordingly as the RT increases its transmit power to meet the 64 QAM CNR
target. In this case, the RT can increase its Tx power by up to 17.4dB, which should
increase the US CNR from 18.7dB to in excess of 30dB (i.e. good enough for 64 QAM
operation)
.
Note: If an RT is configured to use a high order modulation, then it will adjust its Tx power
accordingly. However, the RT only finds out which modulation to use once it has
downloaded its service configurations from the APC, which takes place after registration.
So a step change may be seen in the uplink Rx power and CNR shortly after registration
In the event that the US and DS path losses differ by more than 8dB (which is unusual
and indicative of poor deployment or damaged radio or antenna) then an SNMP
trap/alarm is generated automatically to alert the user to the potential problem
www.cbnl.com 110
Interpreting Power and CNR figures
The different modulation schemes have different PA linearity requirements and
cannot all be transmitted at the same power level through the PAs. Therefore an
RT or AP receiving for example QPSK, 16 QAM and 64 QAM data will see three
distinct receive power levels with relative levels of 0dB, -2.5dB and -4.5dB for
QPSK, 16 QAM and 64 QAM respectively
To simplify the diagnostics and monitoring all power and CNR figures displayed
by VectaStar are referenced to QPSK regardless of the modulations in use.
Therefore a CNR figure of 30dB is only 30dB for QPSK which is equivalent to
27.5dB for 16 QAM and 25.5dB for 64 QAM
www.cbnl.com 111
Running out of Power
If an RT is transmitting at maximum power an SNMP trap/alarm is generated to inform the
operator that the RT is potentially power limited. AN RT will transmit at maximum power if
the uplink power control mechanism determines that a transmit power at or above its
maximum power is required to meet the target upstream power at the AP
In the case where the path loss is very gradually increasing between the RT and the AP
(e.g. due to foliage growth), then at the point where the RT first reaches maximum
transmit power there is still a 5dB fade margin available the service has not been
compromised
However, as the path loss increases further, the ability of the RT to cope with fading will
be diminished and, after a 5dB extra path loss, the link may become unreliable
www.cbnl.com 112
Error Correction
VectaStar uses Automatic Repeat ReQuest (ARQ) for on-air error correction rather than Forward Error
Correction (FEC)
ARQ has several major advantages over FEC for Point to Multi Point (PMP) radio systems
ARQ can achieve a higher code rate than FEC
ARQ can operate much closer to sensitivity than FEC
ARQ dynamically changes the code rate to match the channel error rate
ARQ achieves an individual code rate for each radio link
ARQ operates by sending un-coded data in packets over the air, with each packet containing a CRC. If
the packet is received in error, (as determined by the CRC), then the packet is either Negatively
Acknowledged (NACK) or simply not acknowledged at all (if it is so corrupted as to be unrecognisable)
In either event, the sender will re-transmit that packet until it is positively Acknowledged (ACK) or the
packet lifetime has expired (e.g. if an RT suddenly turns off then there is no point in endlessly sending
the same packet hoping for an ACK)
VectaStars ARQ implementation been designed to achieve Quasi-error free end-to-end BER (< 10-9)
with an on-air BER of 10-4. If the on-air BER is greater than 10-4 then the system may not be able to
provide error free transmission.
www.cbnl.com 113
ARQ vs FEC
With Forward Error Correction the code rate is fixed and the Rx signal level can be
adjusted to affect CNR and for each CNR level there will be a corresponding post FEC
BER
ARQ offers a better solution as the code rate is dynamically adjusted on the fly to each RT
to achieve a target post ARQ BER which is defined for all links. ARQ operates by sending
each packet across the air interface with a small CRC. The RT uses the CRC to
determine if the packet was received with errors or not. If the packet is received error free
it is acknowledged and no more data is sent regarding that packet. If it was received in
error (or not at all), a Negative Acknowledgement is sent and the packet resent until it is
received error free or times out. This method always achieves the optimum code rate for
each link at any moment in time.
www.cbnl.com 114
ARQ vs FEC
VectaStar also uses ARQ over FEC due to its superior security advantages.
ARQ is fundamentally much harder to passively eavesdrop compared with FEC
as with FEC all the error correction information is sent with the data, so the end
unit can independently reconstruct the original data sequence.
With ARQ, the on-air error correction relies on the unique interaction between
the RT and AP for the appropriate data to be resent on demand
www.cbnl.com 115
ARQ vs FEC
In addition to traditional error detection and correction techniques, VectaStar
also has additional error detection and correction by using Trellis encoding.
Trellis coding uses defined encoding data paths in order to allow error detection
and correction without re-transmission
www.cbnl.com 116
Duplexer Spacing
VectaStar is a FDD PMP system and uses separate frequency domains to transmit and
receive radio signals in full duplex
ODUs have RF duplexer to isolate transmitter and receiver with common antenna
With two duplexers, pass bands of high band and low band duplexers overlap
Check frequency allocations to select the correct VectaStar equipment for use !!
www.cbnl.com 117
Duplexer Spacing
Duplexer order codes aim to simplify the ordering process such that the same
duplexer code is used for AP and RT as shown below
10.5 GHz
DH Downlink High
DL Downlink Low
26 / 28 GHz
LBDH Lowband Downlink High
LBDL Lowband Downlink Low
HBDH Highband Downlink High
HBDL Highband Downlink Low
www.cbnl.com 118
Duplexer Spacing - 10.5 GHz
www.cbnl.com 119
Duplexer Spacing - 26 GHz
www.cbnl.com 120
Duplexer Spacing - 28 GHz
www.cbnl.com 121
Your turn!
Set up the VNMS server
Check that alarms are working and being received by the VNMS server
www.cbnl.com 122
Copyright and Contact Details
All figures, data and specifications contained in this document are Cambridge Broadband Networks Ltd.
typical and must be specifically confirmed in writing by Cambridge Selwyn House
Broadband Networks Limited before they apply to any tender, order or Cowley Road
contract. Cambridge Broadband Networks takes every precaution to Cambridge CB4 0WZ
ensure that all information contained in this publication is factually England
correct tel: +44 (0)1223 703000
fax: +44 (0)1223 703001
but accepts no liability for any error or omission. No freedom to use email: info@cbnl.com
patents or other property rights is implied by this document. web: www.cbnl.com
Support contacts
tel: +44 (0)1223 703030
fax: +44 (0)1223 703050
email: support@cbnl.com
web: www.cnbl.com/support
123