User Manual

EasyST Hardware Installation User Guide
Page 20 Commercial in Confidence UWB-D00128 Rev K
Figure4‐EasySTprotocolstack
2.7 Theory of Operation
For basic operation, the EasyST requires no initial configuration--simply plug and play.
Configuration is automatically performed over the air by the BS. The EasyST is preconfigured by
the operator at the BS (using Netspan) with service flow parameters such as the maximum
information rate, the committed information rate, the maximum latency, and maximum jitter.
These configuration parameters are stored in Netspan's database corresponding to the EasyST's
MAC address.
Before any communication between EasyST and BS can occur, the EasyST must be positioned in
a location that provides sufficient RF reception.
To join a network, the EasyST needs to perform a few tasks. First, the "Network Entry" process
(defined in IEEE 802.16-2004) begins with the EasyST scanning for a downlink (DL) signal from
the base station, and then synchronizing to the DL channel. Thereafter the EasyST can start the
process of initial ranging, which alerts the BS to the presence of the EasyST and establishment of
management connections to obtain basic, primary and secondary management connection IDs
(CID) from the BS. After the CIDs have been obtained, the EasyST commences authorization and
key exchange. In the final stage, the EasyST registers at the base station and thereafter obtains
the IP address, time of day and the configuration file from the BS.
During Network entry, the EasyST sends the BS its MAC address. The BS via SNMP notifies
Netspan of a new CPE connection and Netspan checks the database to it contains the CPE MAC
address. The BS then accesses Netspan's database (via SNMP) and checks whether the
EasyST's MAC address appears in the database. If it locates the MAC address, the Netspan
feeds all the EasyST's configuration parameters (service flows) from the database and the BS
downloads them to the EasyST device.