Ipasolink 200 and 400 Presentation V1
Ipasolink 200 and 400 Presentation V1
NEC Confidential
iPASOLINK is a modular network element that integrates a number of crossconexión
switches, packet switching and microwave and optical functionalities, resulting in
reduced costs and a long life. Losw following teams make up the family iPASOLINK and
cover from the access layer to the backbone.
iPASOLINK 200
2-Way Radio
Redundancy
Compact Design
iPASOLINK 400
4-way Nodal
Redundancy
Pay as grow architecture
iPASOLINK 1000
12-way Nodal
Redundancy
High Speed INTF
SDH and All IP
with CWDM
iPASOLINK Introduction
3 NEC Confidential
Convergent Radio with package management for LTE and next generation backhaul
Designed for:
NEC Confidential
iPASOLINK200
Microwave
Microwave Radio
Radio Equipment
Equipment
1U generation
generation
Versatile
Versatile and
and compact
compact
iPASOLINK400
Aggregation
Aggregation with
with Nodal
Nodal Solution
Solution
1U Features
Features Multi
Multi Service
Service
iPASOLINK1000
Nodal
Nodal Solution
Solution for
for High
High Density
Density
Integration
Integration // Network
Network Convergence
Convergence
3U Optical
Optical and
and Microwave
Microwave Radio
Radio
E1
BTS/Node-B
Packet network
MS5000
: Dual Native
: All IP (Hybrid) : Hybrid Split : Off Load : CWDM
NEC Confidential
Transmission Specifications
Frequency Bands: 6-38 GHz
Radio Broadcast Capacity:
・ QPSK/16/32/64/128/256 QAM
・ Hitless-AMR
・ LDPC FEC
・ MTPC / ATPC
Traffic mix SDH / PDH / LAN:
Interface 10/100/1000 Base-T
1000 Base-SX / LX
16 x E1,
1 STM-1 through or channeled
NEC Confidential
Transmission Specifications
Frequency Bands : 6 a 38 GHz
Radio Broadcast Capacity :
・ QPSK/16/32/64/128/256 QAM
・ Hitless-AMR
・ LDPC FEC
・ MTPC / ATPC
Traffic mix SDH / PDH / LAN:
Interface 10/100/1000 Base-T
1000 Base-SX / LX
16 x E1,
2 STM-1 through o 1 STM-1 channeled
NEC Confidential
NEC Confidential
* E1 to Ethernet transmission :
NEC Confidential
• Redundancy Configurations in IDU
(1+0) No Protection (to 4 with IP400)
(1+1) Hot Standby (to 2 Grupos with IP400)
(1+1) Hot Standby with Space Diversity (1+0)
(1+1) Twin Path (Frequency Diversity, 2 grupos)
• Other configurations in IDU
(1+0) x 2 Repeater (1+0) x 4 Nodal (IP400)
(2+0) x Dual Polarization with XPIC (IP200) (1+1) HS
(1+1) HS / SD
NEC Confidential
Hot Stand By with one antenna
MOD M
ODU-1 ODU-1 MOD
M M M
(TX) F1 F1' (TX)
P P P P
HL HL
HYB HYB
SW SW
ODU-2 ODU-2
DEM M M
(RX) F1'
F1' (RX) M M DEM
F1
P P P P
ODU-2 ODU-2
MOD X X X X MOD
(TX) F1 F1' (TX)
ODU-1 ODU-1
MOD M M
(TX) F1 F1 F1' (TX)
M M MOD
P P P P
HL HL
SW SW
ODU-2 ODU-2
DEM M M M M DEM
(RX) F1' F1 (RX)
P P F1' F1 P P
ODU-2 ODU-2
MOD X X X X MOD
(TX) F1 F1' (TX)
Space Diversity
NEC Confidential
Single Antenna Twin Path System
MOD M
ODU-1 ODU-1 MOD
M M M
(TX) F1 F1' (TX)
P P P P
HL HL
SW
HYB F2 HYB
SW
ODU-2 F2' ODU-2
DEM M M F2 M M DEM
(RX) F2` (RX)
P P P P
ODU-2 ODU-2
MOD X X X X MOD
(TX) F2 F2` (TX)
P P
(TX) F1 F1 F1'
P P
Frequency Diversity
NEC Confidential
*Hot StandBy groups
NEC Confidential
NEC Confidential
NEC Confidential
ODU IHG (iPASOLINK High Gain)
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
No universal slot OPTION CARDS
(All units are to be fixed before Shipment)
16 x E1 INTFC
Ch STM-1 (or STM-1)
ODU Interface LED Indication LCT / NMS AUX HK DI/DO Multi Service Engine PS input
(1+0)/(1+1)/XPIC) (Status/Alarms)
NEC Confidential
Option-2 Option-1 Option-3
Blank Cover
STM1-S
STM-1 SFP
Optical S-1.1
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
SW
SW
NEC Confidential
NEC Confidential
If a fan alarm, should be replaced immediately.
This unit must be replaced with the power on.
NEC Confidential
NEC Confidential
NEC Confidential
The initial menu screen
displays LCT current
machine status.
NEC Confidential
Cerrar sesión con este botón antes
de desconectar el cable LAN.
NEC Confidential
Username Alarm indicators Remote End Mantenance Logout
Indicates the user which is Indicate LSI ODU alarm exists, IDU, AUX I / O, For remote site maintenance on or off Close Session
connected TCN, and if the team is in maintenance. connection link.
Block diagram
NEC Confidential
Version F/W IP adress and Name Remote Site
Indicates the current ndicates the name assigned to the computer To connect to the
firmware version and your IP address remote radio
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
Click the « + » to expand
each main menu folder
and see the sub-menu
items
NEC Confidential
NEC Confidential
NEC Confidential
Click the Equipment Setup menu
and select Equipment
Configuration. Equipment
configuration screen is displayed
with the current equipment
configuration settings.
Click the Setup icon to open the
Setup wizard to select the
Equipment configuration or
modify the Equipment
configuration. Click Next on each
configuration window
NEC Confidential
1- Click the Equipment Setup menu 2- Click the Setup icon to open (1)
and select Radio Configuration to Detailed MODEM Seting of
open the Equipment Setup – Radio SW/XPIC GRP or slot unit window
Configuration screen.
NEC Confidential
3- Enter the radio parameters
Specification and
information of the ODU
connected to the selected
Green border on the Set Modem
Position section modem
configuration show the
selected modem Select the channel
spacing of the radio
signal
Select the
Modulation of the
Current setup of the radio signal
selected modem’s radio
configuration
Enter TX frequency
NEC Confidential
Confirmation screen shows the changes in blue
background. Confirm the setting and click OK
NEC Confidential
Set the AMR Modulation for Modem Slot
indicated by the green border. Click Next
to set the AMR priority trafic for Modem 1
& click Next to set the next Modem
NEC Confidential
NEC Confidential
Click General Setting from the Network Management
Configuration menu. NE primary IP si dispalyed
NEC Confidential
Select General Setting (Detail)
from the Network Management
Configuration Menu. General
Setting Detail screen opens
showing the network parameter
setting
NEC Confidential
To change Network
parameters, Click the Setup
icon, General Setting (Detail)
window opens
NEC Confidential
NEC Confidential
NEC Confidential
Select Modem Function Setting
on the provisionning menu and
click on the Modem Port
setting.
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
CH USAGE : Select E1 channels to be used by selecting the USED
radio button. NOT USED radio button inhibit alarms from the
selected channel.
SERVICE NAME : Enter the service name for each E1 channel (Max
32 characters)
NEC Confidential
NEC Confidential
NEC Confidential
SELECT EQUIPMENT CLOCK FROM THE
PROVISIONNING EQUIPMENT CLOCK /
SYNCHRONIZATION SETTING MENU
NEC Confidential
SELECT EQUIPMENT CLOCK FROM THE
PROVISIONNING EQUIPMENT CLOCK /
SYNCHRONIZATION SETTING MENU
NEC Confidential
SELECT EQUIPMENT CLOCK FROM THE
PROVISIONNING EQUIPMENT CLOCK /
SYNCHRONIZATION SETTING MENU
NEC Confidential
NEC Confidential
EQUIPMENT CLOCK MODE : SELECT THE CLOCK MODE
TO BE USED IN THE IDU.
NEC Confidential
NEC Confidential
NEC Confidential
* IF Loop
* E1remote Loop
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
IPASOLINK 200 - 400
NEC Confidential
NEC Confidential
NEC Confidential
The link layer is the same for 10
BASE-X, 100 BASE-X, 1000
BASE-X (GE) or 10G BASE-X
(10GE). This layer corresponds to
the media access control. This
layer builds the basic format of
Ethernet data.
NEC Confidential
NEC Confidential
The IEEE 802.3u 100Mb introduced what were previously only
10Mb Ethernet / s. By the time the PCs had the option to choose
how fast they wanted to communicate, it was necessary to
introduce a procedure to handle this decision.
NEC Confidential
Auto-negotiation is an extremely important parameter in the
wired Ethernet networks today. For a link to work properly,
the devices at both ends of the cable must be configured in
the same way, either both must be configured to use auto-
negotiation or both must be permanently set the same
parameters of speed and duplex.
NEC Confidential
In an environment in which a device is configured to auto-
negotiate and the other device is configured to use a fixed
speed and duplex, auto-negotiation algorithm can detect
the speed and fix it correctly, but the duplex setting of the
remote device can be determined by the device performing
the auto-negotiation. And following the IEEE, the device
configured to auto-negotiate will switch to half-duplex.
NEC Confidential
Finally, it should be remembered that, according to the
IEEE, the use of Gigabit Ethernet requires the use of auto-
negotiation, so 1000Mb / s is not a valid fixed
configuration on a network device that faithfully follow
IEEE.
NEC Confidential
With the introduction of the standard IEEE 802.3u Fast
Ethernet became possible simultaneous bidirectional
communication. If we do not have physical wiring problems
or hardware failure, incorrect allocation of the duplex is the
most common cause of problems on a network link.
NEC Confidential
The introduction of twisted pair cabling also opened the
possibility of connecting the cable in multiple ways.
LADO A LADO B CABLE
MDI MDIX Cable directo
MDI MDI Cable cruzado
MDIX MDIX Cable cruzado
MDIX MDI Cable directo
NEC Confidential
A link will be saturated when the connection between two
devices have more data to transmit to the bandwidth to
transmit data.
NEC Confidential
Utilization: This term is determined Throughput: This concept is a
by comparing the rate of packets similar measure to use.
against total bandwidth passing However, the throughput
through an Ethernet link. For example, measures the number of
a link to 100Mega bits (100 BASE-X) packets sent to the number of
has an available bandwidth of packets received. Is a measure
100Mbps. If the packet rate is of the quality of service. If 100
40Mbps, the use of channels is 40%. packets are sent and 90 of them
The use may vary according to the go to the other extreme, the
operation of the network and the data system throughput is 90%.
that are going through it, depending on
the activity of the user traffic in a given
time, the use can range from 0% to
100% and vice versa in a short time.
NEC Confidential
Round Trip Delay / Latency : Counting Frames: This term
These are measures of time to an indicates how many frames have
ethernet network. The first time passed through an Ethernet
you spend erl indicates a packet interface. Each packet that is
to get from one point in the received is counted. Also be
network and return to it. Latency is labeled as a good package n (good
the time spent by the packet to get FCS) or bad package (FCS error).
from one point to another. Latency Occasionally, packets are counted
can be measured in a single by their size.
element (router) or a full road
network.
NEC Confidential
Payload : the payload of a
packet is seen from the upper
layers, as is the frame portion There is confusion between these two
which carries the information, ie, terms. MTU (Maximum transmission unit)
removing the header and other is configured on the network equipment
control information as the maximum size that can pass
through an interface and the generation
of frames. As we saw, Frame Size, is the
Frame Size : Is measured from full size of the plot.
the beginning of an Ethernet
packet to the end. The range of There are the jumbo frames, which come
Ethernet frame size is from 64 with frame size up to 9600 bytes.
bytes to 1518 bytes in a
standard frame. If you add
VLAN information is up 4 bytes
in size.
NEC Confidential
A VLAN is a virtual local area network,
which comprises two sections, a value
tag (0 to 4095) and a VLAN priority (0 to
7). A VLAN is a way to separate traffic
from a LAN in different subgroups. Each
VLAN traffic handled differently and
behaves like a LAN. There are two
reasons why you create VLANs on a
network: routing of traffic and traffic
prioritization.
NEC Confidential
Traffic Routing: The VLAN tags Traffic prioritization: if a
allow faster routing in high speed network contains voice
networks. When the VLAN tag option information and data at a time,
is enabled, it means that you can voice traffic should unaz trpafico
work with VLANs, in this case, the higher priority than data. Many
element that performs routing need networks use VLANs to
not review the information layer 3 to differentiate these types of traffic
find the target computer, saving and and assign a different priority. If
reduced processing time routing of the network is congested,
each packet. The traffic that is routed routers discard equipment with
VLAN tag where appropriate. lower priority traffic (data) and
the voice will.
NEC Confidential
VLAN VLAN10 VLAN20
Broadcast is broadcast
Broadcast is transmitted
on all ports except the only between the
one who sent him. members of the VLAN.
NEC Confidential
One of the most commonly used to test Ethernet links RFC2544 test.
This is a test set formed as a specification that was developed to describe and
define an Ethernet switch capabilities. This test has been adopted to characterize
and test all Ethernet links.
-Throughput
- Latency
- Loss of frame
- Frames back-to-back
NEC Confidential
*Throughput: This test identifies *Latency: This test consists of
the maximum bandwidth that can measuring the round trip delay
operate an Ethernet link. This of Ethernet frame. This value is
value must be the same or commonly given in
slightly greater than the speed milliseconds.
set on the port.
NEC Confidential
*Loss of Frames: This test runs an *Frames Back-to-back: This test
analysis of frame loss at the rate is used in the time of manufacture
specified by the throughput test. The of the equipment to determine the
expected result is zero lost frames buffering capacity of an element.
at the set speed. For a bond as such, this test is not
required and can be omitted.,
Since it does not provide useful
information.
NEC Confidential
The frame transmission in Ethernet Switch iPASOLINK is by MAC address learning.
1 2 3 4
MAC A
MAC B MAC C MAC D 00-00-00-00-00-04
00-00-00-00-00-01
NEC Confidential
Port Based VLAN
1 2 3 4 5 6 7 8 9 10 11 12
VLAN
Switch
(VLAN ID 10)
Tag Based VLAN
VLAN VLAN
SW 1 SW 1 (VLAN ID 10)
2 2
3 3
(VLAN ID 20) 4 4
5 5
6 6 (VLAN ID 20)
Tag 10
Tag 20
NEC Confidential
Extended VLAN (Q in Q)
This type of port, VLAN extended, is under the standard IEEE802.1ad where
add 2 additional bytes to include additional VLAN information.
Company A Company B
VLAN100 VLAN100
Data 100 Data 100
Company A Company B
NEC Confidential
FE1/GbE
Modem1
FE3/GbE
2.Trunk L2 SW
VLAN
FE4/GbE
3.Tunnel
Trunk
VLAN
GbE5 VLAN
Modem 2
GbE6
NEC Confidential
When applications require large plot sizes, the team must support the call Jumbo
Frame. For example when using VLAN tag, extended VLAN or MPLS label.
IPASOLINK supports Jumbo Frame 1996 bytes in Fast Ethernet and Giga
Ethernet 9596 bytes.
NEC Confidential
In this menu you can configure the basic settings iPASOLINK Layer 2 switch
NEC Confidential
At this point is configured for each port parameters such as speed, duplex, MDI,
flow control, among others.
NEC Confidential
Setup Menu VLANS on different ports ETH
NEC Confidential
Other configurations of Ethernet Ports
NEC Confidential
1) IP Packet
8bits
2Bytes
CFI: Canonical Format Indicator
FCS: Frame Check Sequence
VLAN Tag Priority CFI VLAN
bit ID TCI: Tag Control Information
TOS: Type Of Service
3bits COS: Class Of Service
(802.1q CoS)
NEC Confidential
The traffic prioritization is reviewed with the value set in the User Priority field given by the
Standard IEEE 802.1p (CoS: Class of Service).
CoS value can be assigned in a range from 0 to 7 (8 kinds) in the VLAN tag field.
5 Video
0 Best effort
2 Reserved
1 (low) Background
NEC Confidential
CIR (Committed Information Rate) -
Guaranteed minimum bandwidth for an Ethernet service.
Policing is the application of CIR CIR OK
CIR of zero means the best (No guaranteed bandwidth) Traffic ≤ CIR
The traffic that is above the CIR is marked.
NEC Confidential
Discard Markdown
Violating Frames
[Amount of Traffic]
Complying Frames
[Time]
NEC Confidential
Configuration parameters for Policyng:
CIR: 0 a 1000000 kbps
EIR: 0 a 1000000 kbps
EBS: 0 a 128kbyte
CBS: 1 a 64 kbyte
•EBS and CBS parameters are measured in bytes and must be configured with a value
greater than zero.
•EBS is the maximum number of bytes that are allowed for packets income above the
EIR and remain marked as yellow.
•CBS is the maximum number of bytes that are allowed for packets above the CIR
income and remain marked green.
Note: Color Blind and Color Aware Rate Metering ( iPASO200 is color blind system)
NEC Confidential