User manual
SM User Manual January 2004
Software Release 4.1
TABLE OF CONTENTS
1
WELCOME ................................................................................................................................12
1.1 Feedback.........................................................................................................................12
1.2 Technical Support ...........................................................................................................12
2 ABOUT THIS DOCUMENT.......................................................................................................13
2.1 Intended Use...................................................................................................................13
2.2 New in This Issue............................................................................................................13
2.3 Additional Feature Information........................................................................................15
3 SYSTEM OVERVIEW ...............................................................................................................16
3.1 Module-to-Module Communications ...............................................................................16
3.2 Types of SM Applications................................................................................................16
3.3 Synchronization...............................................................................................................18
3.3.1 Unsynchronized Modules ..................................................................................18
3.3.2 Passing Sync .....................................................................................................18
3.4 Wiring ..............................................................................................................................20
4 ADVANCED FEATURES..........................................................................................................21
4.1 Security Features ............................................................................................................21
4.1.1 BRAID................................................................................................................21
4.1.2 DES Encryption .................................................................................................21
4.1.3 AES Encryption..................................................................................................21
4.1.4 AES-DES Operability Comparisons ..................................................................21
4.2 Bandwidth Management .................................................................................................22
4.2.1 Bandwidth and Authentication Manager (BAM) ................................................22
4.2.2 Recharging Buckets ..........................................................................................23
4.2.3 Subscriber Module Perspective.........................................................................23
4.2.4 Interaction of Burst Data and Sustained Data Settings.....................................23
4.3 High-Priority Bandwidth...................................................................................................24
4.3.1 High Priority Uplink Percentage.........................................................................25
4.3.2 UAcks Reserved High .......................................................................................25
4.3.3 DAcks Reserved High .......................................................................................25
4.3.4 NumCtrlSlots Reserved High.............................................................................25
4.3.5 Allocations to Downlink and Uplink....................................................................25
4.3.6 Transmit Frame Spreading................................................................................26
4.4 Branding ..........................................................................................................................26
4.5 Denying All Remote Access............................................................................................28
4.6 Reinstating Remote Access Capability ...........................................................................29
4.7 SNMP..............................................................................................................................29
4.7.1 Agent .................................................................................................................29
4.7.2 Managed Device................................................................................................29
4.7.3 NMS...................................................................................................................29
4.7.4 Dual Roles .........................................................................................................29
4.7.5 SNMP Commands .............................................................................................30
4.7.6 Traps..................................................................................................................30
4.7.7 MIBS ..................................................................................................................30
4.7.8 MIB-II .................................................................................................................32
Issue 5 Page 6 of 119