Canopy™ System User Guide Sys-UG-en Issue 1 March 2005
Notices See the following information: ◦ important regulatory and legal notices in Section 36 on Page 400. ◦ personal safety guidelines in Section 15 on Page 127. Trademarks, Product Names, and Service Names MOTOROLA, the stylized M Logo and all other trademarks indicated as such herein are trademarks of Motorola, Inc.® Reg. U.S. Pat & Tm. Office. Canopy is a trademark of Motorola, Inc. All other product or service names are the property of their respective owners. © 2005 Motorola, Inc.
TABLE OF CONTENTS GUIDE TO THIS USER GUIDE 1 2 New in This Issue.................................................................................................... 25 1.1 Products Covered by This User Guide........................................................... 25 1.2 Products Not Covered by This User Guide .................................................... 25 1.3 Software Compatibility Described in This User Guide.................................... 25 Using This User Guide .................
5.3 5.4 6 7 Canopy Product Comparisons ....................................................................... 48 5.3.1 Canopy Product Applications ........................................................................ 48 5.3.2 Link Performance and Encryption Comparisons........................................... 49 5.3.3 Cluster Management Product Comparison ................................................... 50 Antennas for Connection to 900-MHz Modules.........................................
8 8.2 10 GPS Synchronization .................................................................................... 68 7.2.2 Passing Sync in a Single Hop ....................................................................... 70 7.2.3 Passing Sync in an Additional Hop ............................................................... 70 Meeting Link Requirements ................................................................................... 73 8.1 9 7.2.1 AP-SM Links ..............................
DESIGNING YOUR CANOPY NETWORK 12 Engineering Your RF Communications ................................................................ 96 12.1 12.2 12.3 12.4 13 Anticipating RF Signal Loss ........................................................................... 96 12.1.1 Understanding Attenuation............................................................................ 96 12.1.2 Calculating Free Space Path Loss ................................................................ 96 12.1.
13.1 Understanding Addresses ............................................................................ 116 13.1.1 13.2 Dynamic or Static Addressing ...................................................................... 116 13.2.1 13.3 13.4 14 IP Address ................................................................................................... 116 When a DHCP Server is Not Found............................................................ 116 Network Address Translation (NAT).............
16.4 16.3.2 Time & Date Page of the AP ....................................................................... 141 16.3.3 Sessions Page of the AP............................................................................. 144 16.3.4 LUID Select Page of the AP ........................................................................ 147 16.3.5 Status Page of the SM ................................................................................ 148 16.3.6 Status Page of the AP .....................
18.4 18.5 18.6 19 Configuring a BH Timing Master for the Destination .................................... 235 18.4.1 Configuration Page of the BHM................................................................... 236 18.4.2 IP Configuration Page of the BHM .............................................................. 244 Configuring a BH Timing Slave for the Destination ...................................... 246 18.5.1 Configuration Page of the BHS .................................................
19.12 Upgrading a BH Link to BH20 ...................................................................... 282 19.13 Verifying a BH Link....................................................................................... 282 20 Verifying System Functionality ........................................................................... 283 MANAGING YOUR CANOPY NETWORK 21 Growing Your Network ......................................................................................... 285 21.1 21.2 21.
24 23.1 Managing Bandwidth without BAM............................................................... 306 23.2 Bandwidth and Authentication Manager (BAM) Services and Features ...... 306 Bandwidth Manager Capability.................................................................... 306 23.2.2 Authentication Manager Capability.............................................................. 307 Managing through a Network Management Station (NMS)............................... 308 24.1 24.2 25 23.2.
26 Interpreting System Logs..................................................................................... 330 26.1 26.2 Interpreting Messages in the Event Log Page ............................................. 330 26.1.1 Time and Date Stamp ................................................................................. 330 26.1.2 Event Log Data Collection........................................................................... 330 26.1.3 Messages that Flag Abnormal Events ................
27.2 History of CMMmicro Software Upgrades .................................................... 355 27.3 Typical Contents of Release Notes .............................................................. 355 27.4 Typical Upgrade Process ............................................................................. 355 27.4.1 28 29 30 31 Downloading Software and Release Notes................................................. 355 Branding Web Pages ......................................................
33 Getting Warranty Assistance............................................................................... 391 CANOPY SYSTEM REFERENCE INFORMATION 34 Administering Modules through telnet Interface ............................................... 393 35 Managing through a BAM Command-Line Interface ......................................... 395 36 35.1 Caveats ........................................................................................................ 395 35.2 SSE Database Commands ...
LIST OF FIGURES Figure 1: Pole-mounted AP cluster ................................................................................... 37 Figure 2: Structure-mounted SM....................................................................................... 38 Figure 3: 900-MHz radio with flat panel antenna .............................................................. 38 Figure 4: Other flat panel antenna ....................................................................................
Figure 31: Additional link to extend network sync, Design 3............................................. 71 Figure 32: Additional link to extend network sync, Design 4............................................. 71 Figure 33: Additional link to extend network sync, Design 5............................................. 72 Figure 34: Typical network layout with no BH ................................................................... 79 Figure 35: Typical network layout with BH ..............................
Figure 66: Status screen, CMMmicro.............................................................................. 174 Figure 67: Configuration screen, CMMmicro .................................................................. 177 Figure 68: GPS Status screen, CMMmicro ..................................................................... 184 Figure 69: Port MIB screen, CMMmicro.......................................................................... 185 Figure 70: Configuration screen (top), AP.............
Figure 100: Detail of pole mounting ................................................................................ 263 Figure 101: Location of 115-/230-volt switch .................................................................. 264 Figure 102: Layout of logical connections in CMM2 ....................................................... 265 Figure 103: Canopy CMM2, front view............................................................................
Figure 135: Protocol analysis at AP or BH not connected to a CMM.............................. 363 Figure 136: Protocol analysis at AP or BH connected to a CMM.................................... 364 Figure 137: IP Configuration screen for SM.................................................................... 365 Figure 138: Local Area Connection menu....................................................................... 366 Figure 139: Local Area Connection Properties window ...............................
LIST OF TABLES Table 1: Canopy User Guide organization scheme .......................................................... 27 Table 2: Examples of where to find information in this user guide.................................... 28 Table 3: Locations of screen captures and associated documentation ............................ 29 Table 4: Font types ........................................................................................................... 31 Table 5: Admonition types............................
Table 33: Exposure separation distances ....................................................................... 127 Table 34: Power Compliance Margins ............................................................................ 128 Table 35: LEDs in AP and BHM...................................................................................... 133 Table 36: LEDs in SM and BHS......................................................................................
LIST OF PROCEDURES Procedure 1: Modifying a fixed license key for a module IP address................................ 86 Procedure 2: Analyzing the spectrum ............................................................................... 98 Procedure 3: Invoking the low power mode .................................................................... 114 Procedure 4: Wrapping the cable....................................................................................
Procedure 33: Verifying system performance ................................................................. 275 Procedure 34: Installing the BHM ................................................................................... 277 Procedure 35: Installing the BHS .................................................................................... 279 Procedure 36: Verifying performance for a BH link.........................................................
March 2005 Through Software Release 6.
Guide To This User Guide 1 March 2005 Through Software Release 6.1 NEW IN THIS ISSUE In Issue 1 of this user guide, this section is a placeholder where changes will be listed in future issues. 1.1 PRODUCTS COVERED BY THIS USER GUIDE Most Canopy products are covered by this user guide: 1.2 ◦ 900-MHz AP and SM ◦ 2.4-GHz modules ◦ 5.2-GHz modules ◦ 5.4-GHz modules ◦ 5.
March 2005 Through Software Release 6.1 2 Guide To This User Guide USING THIS USER GUIDE This document should be used with Canopy features through Software Release 6.1 and CMMmicro Release 2.1.1. The audience for this document includes system operators, network administrators, and equipment installers. 2.1 FINDING THE INFORMATION YOU NEED Previous publications of Canopy user documentation were organized by the type of equipment. Logically then, each was a user manual about a module.
Guide To This User Guide March 2005 Through Software Release 6.1 Quick Reference The Canopy User Guide comprises six sections, as described in Table 1. Table 1: Canopy User Guide organization scheme Section Purpose Guide to This User Guide (this section) Identifies ◦ products covered by this user guide. ◦ products covered by their own separate user guides. ◦ how this user guide is organized. ◦ where to find module web pages and parameter descriptions.
March 2005 Through Software Release 6.1 Guide To This User Guide Examples A list of common tasks and references to information that supports each task is provided in Table 2. Table 2: Examples of where to find information in this user guide If you want to know… what the Spectrum Analyzer in SM and BHS feature does then see… because… Avoiding Self Interference on Page 114 this topic is important to RF planning.
Guide To This User Guide 2.1.2 March 2005 Through Software Release 6.1 Searching This User Guide To search this document and the software release notes of supported releases, look 2.1.3 ◦ in the Table of Contents for the topic. ◦ in the Adobe Reader® search capability for keywords that apply.
March 2005 Through Software Release 6.
Guide To This User Guide March 2005 Through Software Release 6.1 Module Web Page Screen Capture 2.2 Page Time & Date screen, AP 142 Time & Date screen, BHM 157 INTERPRETING TYPEFACE AND OTHER CONVENTIONS This document employs distinctive fonts to indicate the type of information, as described in Table 4. Table 4: Font types Font Type of Information variable width bold Selectable option in a graphical user interface or settable parameter in the web-based interface to a Canopy component.
March 2005 Through Software Release 6.1 Admonition Label Guide To This User Guide General Message RECOMMENDATION: suggestion for an easier, quicker, or safer action or practice. IMPORTANT! informative content that may ◦ identify an indication that you should watch for. ◦ advise that your action can disturb something that you may not want disturbed. ◦ reiterate something that you presumably know but should always remember. CAUTION! a notice that the risk of harm to equipment or service exists.
Understanding Canopy Networks March 2005 Through Software Release 6.
March 2005 Through Software Release 6.1 3 Understanding Canopy Networks ADVANCING FROM RESEARCH TO IMPLEMENTATION Before you begin to research a possible Canopy implementation, you should have both ◦ ◦ Page 34 of 425 basic knowledge of RF theory. See − Understanding RF Fundamentals on Page 88. − Engineering Your RF Communications on Page 96. network experience. See − Canopy Link Characteristics on Page 59. − Understanding IP Fundamentals on Page 88.
Understanding Canopy Networks 4 March 2005 Through Software Release 6.1 REALIZING A WIRELESS BACKHAUL NETWORK To establish and maintain a Canopy wireless backhaul network, you should be familiar with the elements of this user guide that are listed in Table 6. Table 6: Essential user guide elements for new backhaul network implementation Element Title Page Section 5.1.5 Backhaul Module 39 Section 5.1.6 45-Mbps Backhaul Module 39 Section 5.1.8 T1/E1 Multiplexer 41 Section 5.1.
March 2005 Through Software Release 6.1 Understanding Canopy Networks Section 30.2 Analyzing Traffic at an AP or BH with No CMM 363 Section 30.
Understanding Canopy Networks 5 March 2005 Through Software Release 6.1 EXPLORING THE SCOPE OF SOLUTIONS Canopy wireless broadband applications include: 5.
March 2005 Through Software Release 6.1 5.1.3 Understanding Canopy Networks Subscriber Module The Subscriber Module (SM) is a customer premises equipment (CPE) device that extends network or Internet services by communication with an AP. The SM is configurable through a web interface. An SM mounted directly to a structure is pictured in Figure 2. Figure 2: Structure-mounted SM 5.1.4 900-MHz AP and SM Canopy 900 MHz AP and SM modules operate at 3.
Understanding Canopy Networks March 2005 Through Software Release 6.1 For example, 900-MHz APs and SMs are logical choices for extending Canopy 2.4-, 5.2-, and 5.7-GHz radio networks where you wish to ◦ 5.1.5 add subscriber-handling capacity to a tower that is either − fully used in the other frequency band ranges. − not available to any other frequency band range. ◦ reach sparsely populated areas. ◦ penetrate foliage.
March 2005 Through Software Release 6.1 as master or slave but can be reconfigured to the other.) Each end of the link consists of both ◦ an integrated outdoor transceiver (ODU) that contains all the radio and networking electronics. ◦ an indoor passive connection box (PIDU) that contains status indicators and network connection.
Understanding Canopy Networks 5.1.8 March 2005 Through Software Release 6.1 T1/E1 Multiplexer The Canopy T1/E1 Multiplexer converts the data stream from T1/E1 ports into Ethernet packets that are then transported over the Canopy BH link. This enables up to four T1 (or up to three E1) circuits to be extended over Ethernet networks. The T1/E1 Multiplexer is available in two power configurations: ◦ an external 3.
March 2005 Through Software Release 6.1 5.1.9 Understanding Canopy Networks Cluster Management Module 2 (Part 1008CK) The Cluster Management Module 2 (CMM2) provides power, GPS timing, and networking connections for an AP cluster. If the CMM2 is also connected to a BH, then the CMM2 is the central point of connectivity for the entire site. The CMM2 can connect as many as eight collocated modules—APs, BHMs, BHSs—and an Ethernet feed.
Understanding Canopy Networks ◦ March 2005 Through Software Release 6.1 sync to APs and BHMs. The CMMmicro receives 1-pulse per second timing information from Global Positioning System (GPS) satellites through an antenna and passes the timing pulse in 24-V power to the connected modules. GPS status information is available at the CMMmicro, which does not pass this information to connected BHMs or APs, with the following exception: 5.1.
March 2005 Through Software Release 6.1 Understanding Canopy Networks which includes a China adaptor. Passive Reflector Dish Assembly The 27RD Passive Reflector Dish extends the distance range of a module and focuses the beam into a narrower angle. The internal patch antenna of the module illuminates the Canopy Passive Reflector Dish from an offset position. The module support tube provides the proper angle for this offset. A 27RD with a module mounted is pictured in Figure 14.
Understanding Canopy Networks March 2005 Through Software Release 6.1 Cables Canopy modules that are currently or recently sold can auto-sense whether the Ethernet cable is wired as straight-through or crossover. Some modules that were sold earlier cannot. The MAC address, visible on the module, distinguishes whether the module can. See Table 37 on Page 136. All CMMmicros can auto-sense the cable scheme.
March 2005 Through Software Release 6.1 Understanding Canopy Networks Approved Ethernet cables can also be ordered as bulk cable: ◦ CA-0287 ◦ CA-0287S (shielded) Canopy-approved antenna cables can be ordered in lengths up to 100 ft (30.4 m), as listed in Table 9. Table 9: Recommended antenna cables Part # Description BT-0564 N TO N GPS antenna cable for CMM2 BT-0716 BNC TO N GPS antenna cable for CMMmicro Category 5 Cable Tester For purchase within the U.S.A.
Understanding Canopy Networks March 2005 Through Software Release 6.1 Module Housing The HSG-01 Canopy Plastic Housing is available for replacement of a damaged housing on a module that is otherwise functional. The HSG-01 is pictured in Figure 18. The HSG-01 and all module housings of this design provide clearances for cable ties on the Ethernet and sync cables. RECOMMENDATION: Use 0.14” (40-lb tensile strength) cable ties to secure the Ethernet and sync cables to the cable guides on the module housing.
March 2005 Through Software Release 6.1 5.3 5.3.1 Understanding Canopy Networks ◦ The 2.4-GHz frequency band range supports AP/SM links of greater than 2-mile spans (with no reflectors). ◦ The 5.7-GHz frequency band range supports BH links that span as far as 35 miles. CANOPY PRODUCT COMPARISONS Canopy Product Applications The product applications per frequency band range are is summarized in Table 10. Table 10: Product applications per frequency band range Frequency Band Range Product 900 MHz 2.
Understanding Canopy Networks 5.3.2 March 2005 Through Software Release 6.1 Link Performance and Encryption Comparisons The expected maximum range and throughput for Canopy links, with the type(s) of available encryption, is summarized in Table 11 and Table 12. Table 11: Range, throughput, and encryption per frequency band range, PTMP links Frequency Band Range Characteristic 900 MHz 2.4 GHz Range with Reflector 5.2 GHz 5.4 GHz 15 mi (24 km) 5.7 GHz 2 mi (3.
March 2005 Through Software Release 6.1 5.3.3 Understanding Canopy Networks Cluster Management Product Comparison Canopy offers a choice between two products for cluster management: CMM2 and CMMmicro. Your choice should be based on the installation environment and your requirements. The similarities and differences between these two products are summarized in Table 13. Table 13: Cluster management product similarities and differences Characteristic 5.
Understanding Canopy Networks March 2005 Through Software Release 6.1 The 900-MHz AP or SM is available with an integrated antenna or as a connectorized unit with a 16-inch (approximately 40-cm) cable with a male N-type connector for connection to the antenna. 5.4.1 Certified Connectorized Flat Panel Antenna from Motorola Motorola has certified through regulatory agencies four connectorized flat panel antenna options.
March 2005 Through Software Release 6.1 5.5 Understanding Canopy Networks BANDWIDTH AND AUTHENTICATION MANAGER SOFTWARE Canopy Bandwidth and Authentication Manager (BAM) software allows you to use ◦ a primary server to distribute bandwidth resources per subscriber, require SMs to authenticate per AP, and deny service to unauthorized SMs. ◦ a secondary server to redundantly store identical SM bandwidth and authentication data and become governing if the primary server goes out of service.
Understanding Canopy Networks 5.7.2 March 2005 Through Software Release 6.1 Cluster Management Products Table 14: CMM2 specifications and limitations Specification or Limitation Canopy System Range Max length from Cluster Management Module to any radio 328 cable feet (100 meters) Max length from Cluster Management Module to GPS antenna 100 cable feet (30.5 meters) Dimensions 17.00” H x 12.88” W x 6.50” D (43.18 cm H x 32.72 cm W x 16.51 cm D) Weight 25.0 lbs. (11.
March 2005 Through Software Release 6.1 Understanding Canopy Networks Table 15: CMMmicro specifications and limitations Specification or Limitation Canopy System Range Enclosure Size Approximately 12” H x 10” W x 3” D (Approximately 30 cm H x 25 cm W x 7.5 cm D) CMMmicro Weight (without DC power supply) Approximately 8 lb (Approximately 3.
Understanding Canopy Networks 6 March 2005 Through Software Release 6.1 DIFFERENTIATING AMONG COMPONENTS For convenience, each Canopy module is labeled on the lower rear of the module cover, as shown in Figure 19. Figure 19: Part and serial numbers, exterior label The part number and serial number are reiterated above and between the cable jacks inside the module, as shown in Figure 20.
March 2005 Through Software Release 6.1 6.1 Understanding Canopy Networks INTERPRETING PART NUMBER The part number of a module sequentially indicates ◦ the model number, which indicates the − radio frequency band range. − link distance range. − the factory-set encryption standard. ◦ the module type. ◦ whether the reflector dish is included. ◦ the modulation capability. Radio Frequency Band Range The leading digits indicate the frequency band range in which the module can operate.
Understanding Canopy Networks March 2005 Through Software Release 6.1 You cannot change the encryption basis (from DES to AES, for example), but you can enable or disable the encryption. Module Type The next two alpha characters indicate the module type. For example, CK indicates that the module is a Cluster Management Module. ↓ 1 0 0 8 C K The module type cannot be changed.
March 2005 Through Software Release 6.1 Understanding Canopy Networks Figure 21: ESN and model numbers, other interior label As shown in Figure 21, an S/N is also rendered on the interior label that identifies the status LED indicators. However, this is not the same S/N as above. This S/N is the electronic serial number (ESN), also know as the Media Access Control (MAC) address, of the module. This hexadecimal number identifies the module in ◦ communications between modules.
Understanding Canopy Networks 7 7.1 7.1.1 March 2005 Through Software Release 6.1 CANOPY LINK CHARACTERISTICS UNDERSTANDING BANDWIDTH MANAGEMENT Downlink Frame Contents The AP broadcasts downlink frames that contain control information, allocating slots in succeeding or future uplink frames to SMs that have requested service. The downlink frame also contains a beacon frame, control information, and data that specific SMs have requested. Each SM 7.1.
March 2005 Through Software Release 6.1 ◦ Understanding Canopy Networks 1 beacon slot, which identifies the − timing and distribution for the SMs − ratio of uplink to downlink allocation − ESN of the AP − color code − protocol (point-to-point or point-to-multipoint) − number of registered SMs − frame number − control slot information When an SM boots, the following sequence occurs: 1. The SM finds this beacon slot from an AP. 2. The SM synchronizes with the AP. 3.
Understanding Canopy Networks 7.1.5 March 2005 Through Software Release 6.1 Canopy Slot Usage The frame illustrated in Figure 22 shows both packet fragments (yellow) and unused slot space (red) typical of uplink traffic. Packet sizes smaller than 64 bytes cause unused slot spaces. Figure 22: Uplink data slot usage The following statistics apply to Canopy frame slot usage: 7.1.6 ◦ Slot capacity is 64 bytes. ◦ The optimum Ethernet packet size is 1518 bytes.
March 2005 Through Software Release 6.1 Understanding Canopy Networks Token Bucket Concept The Canopy software uses a theoretical token bucket that ◦ stores credits (tokens) for the SM to spend on bandwidth for reception or transmission. ◦ drains tokens during reception or transmission. ◦ refills with tokens at the sustained rate set by the network operator. For each token, the SM can send toward the network (or receive from the network) an equivalent number of kilobits.
Understanding Canopy Networks March 2005 Through Software Release 6.1 For example, in the Canopy SM, if you set the Sustained Uplink Data Rate parameter to 2,000 kbps and the Sustained Downlink Data Rate parameter to 10,000 kbps, then the uplink and downlink caps that will be enforced for the SM can be calculated as shown in Figure 25.
March 2005 Through Software Release 6.1 7.1.11 Understanding Canopy Networks Interaction of Burst Allocation and Sustained Data Rate Settings If the Burst Allocation is set to 1200 kb and the Sustained Data Rate is set to 128 kbps, a data burst of 1000 kb is transmitted at full speed because the Burst Allocation is set high enough. After the burst, the bucket experiences a significant refill at the Sustained Data Rate. This configuration uses the advantage of the settable Burst Allocation.
Understanding Canopy Networks March 2005 Through Software Release 6.1 IMPORTANT! See High Priority Uplink Percentage and Slot Specifications on Page 191. 7.1.13 Allocations to Downlink and Uplink The standard and high-priority channels in Canopy PTMP communications are contrasted in Figure 26 and Figure 27.
March 2005 Through Software Release 6.1 Understanding Canopy Networks Hardware scheduling always sends high-priority traffic first, even to the exclusion of other traffic. UL 0–9 BeaconWith hardware scheduling……….. Data Sched Ack 0–9 Ack Data − AP Transmit (Downlink) 0 – 10 Cont.
Understanding Canopy Networks March 2005 Through Software Release 6.1 Table 16: Differences between software and hardware scheduling Difference Category Throughput Latency Factor Hardware Scheduling Aggregate throughput, less additional overhead 6.
March 2005 Through Software Release 6.1 7.2 Understanding Canopy Networks UNDERSTANDING SYNCHRONIZATION Although Canopy modules are band selective, they are not channel selective. For this reason, the receiver of a module can receive too much signal from unsynchronized modules that are operating in the same spectrum (frequency band range, such as 5.2 GHz). This would overload the front end of the receiver, which would cancel the carrier-to-interference (C/I) ratio advantage of Canopy modules.
Understanding Canopy Networks March 2005 Through Software Release 6.1 Figure 29: One unsynchronized AP in cluster The result is self-interference. In this scenario, the self-interference can be avoided only by synchronizing the TDD transmit cycles of all APs that operate in the same frequency band.
March 2005 Through Software Release 6.1 Understanding Canopy Networks Figure 30: GPS timing throughout the Canopy network 7.2.2 Passing Sync in a Single Hop In releases earlier than Release 4.0, network sync can be delivered in only one over the air link in any of the following network designs: ◦ Design 1 1. A CMM provides sync to a collocated AP. 2. This AP sends the sync over the air to SMs. ◦ Design 2 1. A CMM provides sync to a collocated BH timing master. 2.
Understanding Canopy Networks March 2005 Through Software Release 6.1 This design is illustrated in Figure 31. 2 AP SM AP 4 4 3 1 SM SM CMM Figure 31: Additional link to extend network sync, Design 3 ◦ Design 4 1. A CMM provides sync to a collocated AP. 2. This AP sends the sync over the air to an SM. 3. This SM delivers the sync to a collocated BHM. 4. This BHM passes the sync in the additional link over the air to a BHS. This design is illustrated in Figure 32.
March 2005 Through Software Release 6.1 BH -M- 1 2 Understanding Canopy Networks BH -S- AP 3 4 SM 4 SM CMM Figure 33: Additional link to extend network sync, Design 5 Wiring and configuration information for this sync extension is described under Wiring to Extend Network Sync on Page 294.
Understanding Canopy Networks 8 8.1 8.1.1 March 2005 Through Software Release 6.1 MEETING LINK REQUIREMENTS AP-SM LINKS AP-SM Link Distances APs and Subscriber Modules are available in 900-MHz, 2.4-GHz, 5.2-GHz, 5.4-GHz, and 5.7-GHz frequency bands. Due to regulatory agency restrictions, a 5.2-GHz SM cannot be used with a reflector in the U.S.A. or Canada. A 2.4-GHz or 5.7-GHz SM can be used with a Canopy Passive Reflector dish. This reflector extends the maximum span of a link.
March 2005 Through Software Release 6.1 Understanding Canopy Networks In all other Canopy frequency band ranges, round-trip latency is typically ◦ 20 msec with software scheduling. ◦ 6 msec with hardware scheduling. At range settings of greater than 40 miles (64 km) in the 900-MHz AP, more time elapses between transmit and receive cycles to compensate for greater air delay. In each frame, this reduces the number of data slots, which slightly reduces the aggregate throughput of the link.
Understanding Canopy Networks March 2005 Through Software Release 6.1 Downlink Throughput (MHz) Uplink Throughput (MHz) Downlink Percent Data Slots Down Data Slots Up 40 13 19 2.6 2.1 35 11 21 2.2 2.3 30 10 22 2.0 2.2 25 8 23 1.6 2.4 20 6 25 1.2 2.4 15 5 26 1.0 2.6 10 3 28 0.6 2.5 5 2 29 0.4 2.7 0 1 29 0.4 2.
March 2005 Through Software Release 6.1 Understanding Canopy Networks Downlink Percent Data Slots Down Data Slots Up 5 2 27 0 2 27 Changing Network Conditions The effects of changing network conditions on PTMP throughput are indicated in Table 19.
Understanding Canopy Networks March 2005 Through Software Release 6.1 Select BHs based on desired data handling capability, desired link range, and whether the BHs will either operate in a network environment or be collocated with an AP or AP cluster. 2.4-, 5.4-, and 5.7-GHz BHs can be used with a reflector on either or both ends. In the U.S.A. and Canada, regular 5.2-GHz backhauls cannot be used with a reflector, due to regulatory agency restrictions. However, Extended Range (ER) 5.
March 2005 Through Software Release 6.1 Understanding Canopy Networks For 10-Mbps BHs, the aggregate throughput on the channel is 7 Mbps. For 20-Mbps BHs, the aggregate throughput on the channel is 14 Mbps. If a BH is set to a downlink ratio of 50%, then the bandwidth in each direction is half of the total BH link bandwidth.
Understanding Canopy Networks 9 March 2005 Through Software Release 6.1 PREVIEWING NETWORK CONFIGURATIONS The following are examples of network layouts. Customer experience case studies are also available. 9.
March 2005 Through Software Release 6.
Understanding Canopy Networks 9.2 March 2005 Through Software Release 6.1 VIEWING CASE STUDIES Case studies of Canopy implementations are available as “Feature Articles” for download from http://www.connectwithcanopy.com/index.cfm?canopy=menu.case.
March 2005 Through Software Release 6.1 Understanding Canopy Networks 10 ACCESSING FEATURES In successive software releases, Canopy includes new features that improve aspects such as cost, efficiency, flexibility, installation, interference avoidance, security, throughput, and troubleshooting. Improvements that Canopy features offer are indicated in Table 20. Table 20: Canopy features and their benefits 4.2.7 ● 5.4-GHz Module P9 Support 4.2.7 ● 5.7-GHz Module Support 3.1.5 ● 5.
Understanding Canopy Networks March 2005 Through Software Release 6.1 Batch Auto Updates CNUT 1.0 ● Bus Bandwidth Limitation Causing 20-Mbps BH Errors Fix 4.0.1 ● CANOPYBOOT Version 3.0 Fix (Replaces Version 2.5) 4.2.3 ● BHM Bridge Changes 3.1.5 Bridge Table from 256 to 4096 Entries 3.1.5 ● Configurable Bridge Table Timeout 3.1.5 ● Settable AP Broadcast Repeat Count 4.2.1 Committed Information Rate (CIR) with Hardware Scheduler 6.
March 2005 Through Software Release 6.1 Understanding Canopy Networks Troubleshooting Category of Improvement Frame Calculator for Tuning Mixed Clusters 6.1 ● Transmit Frame Spreading 4.0 ● All Frames Adjusted for Cross-release Communications 6.1 GPS Antenna Connection Status 4.0 Telnet Corrupting GPS Information Fix 4.0.4 ● BH Hash Table Fix 3.2 ● 900-MHz Module Dynamic per-SM High-priority Channel with Hardware Scheduler 6.
Understanding Canopy Networks March 2005 Through Software Release 6.1 MySQL Database Support BAM 1.0 ● Network Address Translation (NAT) in SM 4.1 ● NAT Support for VPNs—L2TP Over IPSec 4.2.1 ● Passwords on FTP and Telnet Sessions 3.1.5 ● PostgreSQL Database Support BAM 2.0 Low Power Mode (18-dB Reduction) 4.1 ● ● 5.4-GHz Module Adjustable Power 4.2.7 ● ● 2.4-GHz Module Adjustable Power 4.2.7 ● ● 5.7-GHz Module Adjustable Power with Connectorized Antenna 6.
March 2005 Through Software Release 6.1 Understanding Canopy Networks 6.1 ● ● Suspend or reinstate SM through the BAM GUI BAM 2.0 GPS Sync Protection 3.1.5 Extended Network with Sync 4.0 Telnet Commands Defined 4.2.1 900-MHz Module Hardware Scheduler Increased Throughput 6.0 ● Increased Throughput with Hardware Scheduler 6.1 ● Time & Date for APs or BHMs Connected to CMMmicro 4.2.1 and CMMmicro 2.1 VLAN (802.1Q) 6.1 Web Pages Remain Scrolled 4.2.1 ● ● ● ● ● ● ● ● ● ● ● 10.
Understanding Canopy Networks March 2005 Through Software Release 6.1 6. Double-click on the license key filename. RESULT: The key loads into the module. 7. Open the Configuration web page of the module. 8. Review parameter settings and enable the feature if you wish to do so at this time (see next section). end of procedure 10.2 ENABLING FEATURES A Canopy feature is enabled (functioning) if the feature is both active and enabled.
March 2005 Through Software Release 6.1 Understanding Canopy Networks 11 ACQUIRING PROFICIENCIES Designing and operating a Canopy network requires fundamental knowledge of radio frequency transmission and reception, Internet Protocol addressing schemes, experimentation with Canopy equipment, and for most operators participation in some forms of Canopy training. 11.1 UNDERSTANDING RF FUNDAMENTALS Canopy training and user interfaces presume an understanding of RF fundamentals.
Understanding Canopy Networks March 2005 Through Software Release 6.1 ◦ 1 CPT002-CD02EN Technical Overview on CD ◦ 1 CPT003-CD03EN Canopy System User Guide on CD Part numbers for Demonstration Kits are provided in Table 21. 11.3.2 2.4-GHz Demonstration Kit Each 2.
March 2005 Through Software Release 6.1 ◦ Understanding Canopy Networks 1 CPT003-CD03EN Canopy System User Guide on CD Part numbers for Demonstration Kits are provided in Table 21. 11.3.4 5.4-GHz Demonstration Kit Each 5.4-GHz Demonstration Kit contains: 11.3.
Understanding Canopy Networks March 2005 Through Software Release 6.1 Table 21: Demonstration Kit part numbers Frequency Band Range Power Supply Input (Volts AC) Part Number 900 MHz 110 TK10010 110 TK10007 230 TK10008 110 TK10003 230 TK10005 230 TK10013 110 TK10004 230 TK10006 2.4 GHz 5.2 GHz 5.4 GHz 5.7 GHz 11.4 ACQUIRING A CANOPY STARTER KIT Canopy Starter Kits are also available through your Canopy representative. 11.4.
March 2005 Through Software Release 6.1 Understanding Canopy Networks ◦ 30 ACPS110-03 110-V AC Power Supplies8 ◦ 30 ACPSSW-02 90- to 230-V AC Power Supplies9 ◦ 1 CTCAT5-01 Category 5 Cable Tester10 ◦ 1 UGTK-0002 Quick Start Guide ◦ 1 CPT003-CD02EN Canopy System User Guide on CD Part numbers for Starter Kits are provided in Table 22 11.4.3 5.2-GHz Starter Kit Each 5.
Understanding Canopy Networks March 2005 Through Software Release 6.1 Part numbers for Starter Kits are provided in Table 22. 11.4.5 5.7-GHz Starter Kit Each 5.
March 2005 Through Software Release 6.1 Understanding Canopy Networks 11.6 ATTENDING ON-LINE KNOWLEDGE SESSIONS Irregularly but often, Canopy presents a knowledge session over the Internet about a new product offering. Some of these knowledge sessions provide the opportunity for participants to interact in real time with the leader of the session. The knowledge session ◦ provides a high-level understanding of the technology that the new product introduces. ◦ announces any subtleties and caveats.
Designing Your Canopy Network March 2005 Through Software Release 6.
March 2005 Through Software Release 6.1 Designing Your Canopy Network 12 ENGINEERING YOUR RF COMMUNICATIONS Before diagramming network layouts, the wise course is to ◦ anticipate the correct amount of signal loss for your fade margin calculation. ◦ recognize all significant RF conditions. ◦ evaluate potential sites by their fitness to address fade margin and ambient RF conditions. 12.
Designing Your Canopy Network March 2005 Through Software Release 6.
March 2005 Through Software Release 6.1 Designing Your Canopy Network 12.2 ANALYZING THE RF ENVIRONMENT An essential element in RF network planning is the analysis of spectrum usage and the strength of the signals that occupy the spectrum you are planning to use. Regardless of how you measure and log or chart the results you find (through the Spectrum Analyzer in SM and BHS feature or by using a spectrum analyzer), you should do so ◦ at various times of day. ◦ on various days of the week.
Designing Your Canopy Network March 2005 Through Software Release 6.1 6. Click Enable again. RESULT: The system measures RSSI and dBm for each frequency in the spectrum. 7. Travel to another location in the area. 8. Click Enable again. RESULT: The system provides a new measurement of RSSI and dBm for each frequency in the spectrum. NOTE: Spectrum analysis mode times out 15 minutes after the mode was invoked in Step 5. 9. Repeat Steps 7 and 8 until the area has been adequately scanned and logged.
March 2005 Through Software Release 6.1 12.2.4 Designing Your Canopy Network Radar Signature Detection and Shutdown In Release 4.2.3 and later releases, the Dynamic Frequency Selection (DFS) for United Kingdom feature in the 5.7-GHz AP and BHM senses military radar and shuts down the radio. The 5.4-GHz AP and BHM likewise sense military radar and shut down. The shutdown of an AP/BHM effectively shuts down the SMs/BHS, which transmit only while receiving the beacon of the AP/BHM.
Designing Your Canopy Network March 2005 Through Software Release 6.1 Channel selections for the AP in the 2.4-GHz band depend on whether the AP is deployed in cluster. 12.3.1 900-MHz Channels 12.3.
March 2005 Through Software Release 6.1 Designing Your Canopy Network This recommendation allows 20 MHz of separation between one pair of channels and 22.5 MHz between the other pair. You can use the Spectrum Analysis feature in an SM or BHS, or use a standalone spectrum analyzer, to evaluate the RF environment. Where spectrum analysis identifies risk of interference for any of these channels, you can compromise this recommendation as follows: ◦ Select 2.4375 GHz for the middle channel ◦ Select 2.
Designing Your Canopy Network March 2005 Through Software Release 6.1 5.4-GHz AP Cluster Recommended Channels The fully populated cluster requires only three channels, each reused by the module that is mounted 180° opposed. In this frequency band range, the possible sets of three nonoverlapping channels are numerous.
March 2005 Through Software Release 6.1 12.3.7 Designing Your Canopy Network 5.8-GHz Channels Available for 45-Mbps Backhaul Module Channel selections for the 45-Mbps BH are as follows: (All Frequencies in GHz) 5.734 5.764 5.794 5.824 5.740 5.770 5.800 5.830 5.746 5.776 5.806 5.836 5.752 5.782 5.812 5.842 5.758 5.788 5.818 12.3.8 Example Channel Plans for AP Clusters Examples for assignment of frequency channels and sector IDs are provided in the following tables.
Designing Your Canopy Network March 2005 Through Software Release 6.1 Table 24: Example 2.4-GHz channel assignment by sector Direction of Access Point Sector Frequency Sector ID Symbol North (0°) 2.4150 GHz 0 A Northeast (60°) 2.4350 GHz 1 B Southeast (120°) 2.4575 GHz 2 C South (180°) 2.4150 GHz 3 A Southwest (240°) 2.4350 GHz 4 B Northwest (300°) 2.4575 GHz 5 C Table 25: Example 5.
March 2005 Through Software Release 6.1 Designing Your Canopy Network Table 27: Example 5.7-GHz channel assignment by sector 12.3.9 Direction of Access Point Sector Frequency North (0°) Sector ID Symbol 5.735 GHz 0 A Northeast (60°) 5.755 GHz 1 B Southeast (120°) 5.775 GHz 2 C South (180°) 5.735 GHz 3 A Southwest (240°) 5.755 GHz 4 B Northwest (300°) 5.
Designing Your Canopy Network March 2005 Through Software Release 6.1 12.4 SELECTING SITES FOR NETWORK ELEMENTS The Canopy APs must be positioned ◦ with hardware that the wind and ambient vibrations cannot flex or move. ◦ where a tower or rooftop is available or can be erected. ◦ where a grounding system is available. ◦ with lightning arrestors to transport lightning strikes away from equipment.
March 2005 Through Software Release 6.1 Designing Your Canopy Network Topographic maps with waypoints are available from sources such as the following: ◦ http://www.topografix.com − TopoGrafix EasyGPS − TopoGrafix Panterra − TopoGrafix ExpertGPS Topographic images are available from sources such as the following: ◦ http://www.keyhole.com/body.php?h=products&t=keyholePro − ◦ http://www.digitalglobe.com − 12.4.
Designing Your Canopy Network March 2005 Through Software Release 6.1 Fresnel zone receiver transmitter Transmitter or Amplifier Figure 39: Fresnel zone FresnelZoneCalcPage.xls calculates the Fresnel zone clearance that is required between the visual line of sight and the top of an obstruction that would protrude into the link path.
March 2005 Through Software Release 6.1 Designing Your Canopy Network LEGEND b Angle of elevation. B Vertical difference in elevation. A Horizontal distance between modules. Figure 40: Variables for calculating angle of elevation (and depression) Calculating the Angle of Elevation To use metric units to find the angle of elevation, use the following formula: tan b = B 1000A where B is expressed in meters A is expressed in kilometers.
Designing Your Canopy Network March 2005 Through Software Release 6.1 Canopy APs and a BHS can be collocated at the same site only if they operate in different frequency band ranges. 12.6 DIAGRAMMING NETWORK LAYOUTS 12.6.1 Accounting for Link Ranges and Service Coverage A 2.4-, 5,4-, or 5.7-GHz SM can be used with a Canopy Passive Reflector dish. This reflector extends the maximum span of a link as indicated in Table 28.
March 2005 Through Software Release 6.1 Designing Your Canopy Network On either or both ends of a BH link as well, a Canopy Passive Reflector dish extends the transmission and reception range as indicated in the following tables. Table 29: Range of 2.
Designing Your Canopy Network March 2005 Through Software Release 6.1 Table 31: Range of 5.4-GHz BH with and without Passive Reflector Modules in Link BH BH Data Rate Reflectors Typical Range 5400BH (DES) 5400BH (DES) 10 Mbps none 2 miles (3.2 km) 5400BHRF (DES) 5400BH (DES) 10 Mbps one end 10 miles (16 km) 5400BHRF (DES) 5400BHRF (DES) 10 Mbps both ends 35 miles (56 km) 5400BH20 (DES) 5400BH20 (DES) 20 Mbps none 1 mile (1.
March 2005 Through Software Release 6.1 12.6.3 Designing Your Canopy Network Avoiding Self Interference For 5.2-, 5.4-, and 5.7-GHz modules, 20-MHz wide channels are centered every 5 MHz. For 2.4-GHz modules, 20-MHz wide channels are centered every 2.5 MHz. This allows you to customize the channel layout for interoperability where other Canopy equipment is collocated. CAUTION! Regardless of whether 2.4-, 5.2-, 5.4-, or 5.
Designing Your Canopy Network March 2005 Through Software Release 6.1 6. Assess whether the desired links for this module achieve ◦ RSSI greater than 700. ◦ jitter value between 0 and 4 in Release 4.0 and later releases or between 5 and 9 in any earlier release. 7. Access the Link Test page of the module. 8. Assess whether the desired links for this module achieve ◦ uplink efficiency greater than 90%. ◦ downlink efficiency greater than 90%. 9.
March 2005 Through Software Release 6.1 Designing Your Canopy Network 13 ENGINEERING YOUR IP COMMUNICATIONS 13.1 UNDERSTANDING ADDRESSES A basic understanding of Internet Protocol (IP) address and subnet mask concepts is required for engineering your IP networking. 13.1.1 IP Address The IP address is a 32-bit binary number that has four parts (octets). This set of four octets has two segments, depending on the class of IP address. The first segment identifies the network.
Designing Your Canopy Network 13.3 13.3.1 March 2005 Through Software Release 6.1 NETWORK ADDRESS TRANSLATION (NAT) NAT, DHCP Server, DHCP Client, and DMZ in SM In Release 4.
March 2005 Through Software Release 6.1 Designing Your Canopy Network NAT Disabled The NAT Disabled implementation is illustrated in Figure 41. Figure 41: NAT Disabled implementation This implementation is provisioned as displayed in ◦ Figure 77 on Page 215 and Figure 78 on Page 216. ◦ Figure 83 on Page 223.
Designing Your Canopy Network March 2005 Through Software Release 6.1 NAT with DHCP Client and DHCP Server The NAT with DHCP Client and DHCP Server implementation is illustrated in Figure 42. Figure 42: NAT with DHCP Client and DHCP Server implementation This implementation is provisioned as displayed in Figure 79 on Page 218 and Figure 85 on Page 227.
March 2005 Through Software Release 6.1 Designing Your Canopy Network NAT with DHCP Client The NAT with DHCP Client implementation is illustrated in Figure 43. Figure 43: NAT with DHCP Client implementation This implementation is provisioned as displayed in Figure 80 on Page 219 and Figure 86 on Page 228.
Designing Your Canopy Network March 2005 Through Software Release 6.1 NAT with DHCP Server The NAT with DHCP Server implementation is illustrated in Figure 44. Figure 44: NAT with DHCP Server implementation This implementation is provisioned as displayed in Figure 81: IP Configuration screen, NAT with DHCP server on Page 220 and Figure 87: NAT Configuration screen, NAT with DHCP server on Page 229.
March 2005 Through Software Release 6.1 Designing Your Canopy Network NAT without DHCP The NAT without DHCP implementation is illustrated in Figure 45. Figure 45: NAT without DHCP implementation This implementation is provisioned as displayed in Figure 82: IP Configuration screen, NAT without DHCP on Page 221 and Figure 88: NAT Configuration screen, NAT without DHCP on Page 230. 13.3.2 NAT Pass-through of VPN as L2TP over IPSec Release 4.
Designing Your Canopy Network March 2005 Through Software Release 6.1 VPN. Release 4.2 and later releases support NAT passing L2TP over IPSec but do not support NAT passing PPTP. When one of these later releases is installed in the SM, NAT Pass-through of VPN as L2TP over IPSec is enabled with no required further provisioning. 13.4 DEVELOPING AN IP ADDRESSING SCHEME Canopy network elements are accessed through IP Version 4 (IPv4) addressing.
March 2005 Through Software Release 6.1 Designing Your Canopy Network In this example, the network address is 169.254, and 216 (65,536) hosts are addressable. 13.4.3 Selecting Non-routable IP Addresses The factory default assignments for Canopy network elements are ◦ unique MAC address ◦ IP address of 169.254.1.1 ◦ subnet mask of 255.255.0.0 ◦ network gateway address of 169.254.0.
Designing Your Canopy Network March 2005 Through Software Release 6.1 14 ENGINEERING VLANS In Canopy System Release 6.0 and later releases, Canopy radios support VLAN functionality as defined in the 802.1Q specification, except for the following aspects of that specification: ◦ ◦ the following protocols: − GARP GARV − STP − MSTP − GARP GMRP priority encoding (802.1P) ◦ embedded source routing (ERIF) in the 802.
March 2005 Through Software Release 6.
Building Your Canopy Network March 2005 Through Software Release 6.1 15 AVOIDING HAZARDS Use simple precautions to protect staff and equipment. Hazards include exposure to RF waves, lightning strikes, and power surges. This section specifically recommends actions to abate these hazards. 15.1 PREVENTING OVEREXPOSURE TO RF ENERGY To protect from overexposure to RF energy, install Canopy radios so as to provide and maintain the minimum separation distances from all persons shown in Table 33.
March 2005 Through Software Release 6.1 Building Your Canopy Network The applicable power density exposure limits from the documents referenced above are ◦ 6 W/m2 for RF energy in the 900-MHz frequency band in the US and Canada. ◦ 10 W/m2 for RF energy in the 2.4-, 5.2-, 5.4-, and 5.7-GHz frequency bands.
Building Your Canopy Network Frequency Band 5.4 GHz 5.7 GHz March 2005 Through Software Release 6.1 Variable Antenna d 1 Recommended Distance Power Compliance Margin P G S internal 0.2 W (23 dBm) 5.0 (7 dB) 10 W/ m2 0.09 m 20 cm (8 in) 5 internal + reflector 0.0032 W (5 dBm) 316 (25 dB) 10 W/ 2 m 0.09 m 1.5 m (5 ft) 280 internal 0.2 W (23 dBm) 5.0 (7 dB) 10 W/ m2 0.09 m 20 cm (8 in) 5 internal + reflector 0.2 W (23 dBm) 316 (25 dB) 10 W/ 2 m 0.71 m 1.5 m (5 ft) 4.
March 2005 Through Software Release 6.1 Building Your Canopy Network Moisture Over time, moisture can cause a cable connector to fail. You can prevent this problem by ◦ using cables that are filled with a dielectric gel or grease. ◦ including a drip loop where the cable approach to the module (typically a CMM2 or CMMmicro) is from above. ◦ wrapping the cable with weather-resistant tape.
Building Your Canopy Network March 2005 Through Software Release 6.1 16 TESTING THE COMPONENTS Before you install any component into your Canopy network, allow yourself the opportunity to discover that the component is defective. If you always follow the preliminary steps in this section, you will save ◦ installation and removal costs for a component that will not function. ◦ time in the process of replacing the defective component.
March 2005 Through Software Release 6.1 16.2.2 Building Your Canopy Network Default Module Configuration From the factory, the Canopy AP, SM, and BH are all configured to not transmit on any frequency. This configuration ensures that you do not accidentally turn on an unsynchronized module. Site synchronization of modules is required because ◦ ◦ 16.2.3 Canopy modules − cannot transmit and receive signals at the same time.
Building Your Canopy Network 16.2.4 March 2005 Through Software Release 6.1 Diagnostic LEDs The diagnostic LEDs report the following information about the status of the module. Table 35 and Table 36 identify the LEDs in order of their left-to-right position as the cable connections face downward. NOTE: The LED color helps you distinguish position of the LED. The LED color does not indicate any status.
March 2005 Through Software Release 6.1 16.2.5 Building Your Canopy Network CMM2 Component Layout As shown in Figure 103 on Page 266, the CMM2 comprises four assemblies: ◦ Ethernet switch ◦ Power transformer ◦ Interconnect board ◦ GPS receiver. Some CMM2s that were sold earlier had four openings in the bottom plate, as shown in Figure 48. Currently available CMM2s have two additional Ethernet cable and GPS sync cable openings to allow use of thicker, shielded cables.
Building Your Canopy Network March 2005 Through Software Release 6.1 LEGEND 1. 2. 3. 4. 5. 6. 7. Weatherized enclosure Thumb-screw/slot-screwdriver door fasteners Punch-out for padlock Ethernet switch and power module Female BNC connector Water-tight bulkhead connectors Flange for attachment (stainless steel for grounding to tower or building) using U bolts (provided) or other hardware such as screws, lag bolts, or attachment straps (not provided) 8. Ground strap (for grounding door to enclosure) 9.
March 2005 Through Software Release 6.1 16.2.7 Building Your Canopy Network Standards for Wiring Canopy modules that are currently available automatically sense whether the Ethernet cable in a connection is wired as straight-through or crossover. You may use either straight-through or crossover cable to connect a network interface card (NIC), hub, router, or switch to these modules. For a straight-through cable, use the EIA/TIA-568B wire color-code standard on both ends.
Building Your Canopy Network 16.2.9 March 2005 Through Software Release 6.1 ◦ Use dielectric grease on all connectors to resist corrosion. ◦ Use only shielded connectors to resist interference and corrosion. Recommended Tools for Wiring Connectors The following tools may be needed for cabling the AP: ◦ RJ-11 crimping tool ◦ RJ-45 crimping tool ◦ electrician scissors ◦ wire cutters ◦ cable testing device. 16.2.
March 2005 Through Software Release 6.1 Building Your Canopy Network RJ-45 Pinout for Crossover Ethernet Cable Pin Pin 1 → white / orange ← Pin 3 Pin 2 → orange ← Pin 6 Pin 3 → white / green ← Pin 1 Pin 4 → blue ← Pin 4 Pin 5 → white / blue ← Pin 5 Pin 6 → green ← Pin 2 Pin 7 → white / brown ← Pin 7 Pin 8 → brown ← Pin 8 Pins 7 and 8 carry power to the modules.
Building Your Canopy Network March 2005 Through Software Release 6.1 WARNING! From this point until you remove power from the AP, stay at least as far from the AP as the minimum separation distance specified under Preventing Overexposure to RF on Page 127. 4. Plug the other connector of the pig tail into the Ethernet jack of the computing device. 5. Plug the power supply into an electrical outlet. 6. Power up the computing device. 7. Start the browser in the computing device.
March 2005 Through Software Release 6.1 Building Your Canopy Network Figure 50: Quick Start screen, AP Quick Start is a wizard that helps you to perform a basic configuration that places an AP into service. Only the following parameters must be configured: ◦ RF Carrier Frequency ◦ Synchronization ◦ Network IP Address In each page under Quick Start, you can ◦ specify the settings to satisfy the requirements of the network. ◦ review the configuration selected.
Building Your Canopy Network March 2005 Through Software Release 6.1 Procedure 7: Using Quick Start to configure the AP for test 1. At the bottom of the Quick Start page, click the Let’s Get Started! button. RESULT: The AP responds by opening the RF Carrier Frequency page. 2. From the pull-down menu in the lower left corner of this page, select a frequency for the test. 3. Click the Go To Next Page => button. RESULT: The AP responds by opening the Synchronization page. 4.
March 2005 Through Software Release 6.1 Building Your Canopy Network Figure 51: Time & Date screen, AP To have each log in the AP correlated to a meaningful time and date, either a reliable network element must pass time and date to the AP or you must set the time and date whenever a power cycle of the AP has occurred. A network element passes time and date in any of the following scenarios: ◦ A connected CMM2 passes time and date (GPS time and date, if received).
Building Your Canopy Network March 2005 Through Software Release 6.1 The format for entry is Time hh:mm:ss Date mm/dd/yyyy where hh represents the two-digit hour in the range 00 to 24 mm represents the two-digit minute ss represents the two-digit second mm represents the two-digit month dd represents the two-digit day yyyy represents the four-digit year Proceed with the test setup as follows. Procedure 8: Setting up the SM for test 1. Enter the appropriate information in the format shown above.
March 2005 Through Software Release 6.1 16.3.3 Building Your Canopy Network Sessions Page of the AP An example of the AP Sessions page is displayed in Figure 52. Figure 52: Example Sessions page data, AP If no SMs are registered to this AP, then the Sessions page displays the simple message No sessions. In this case, try the following steps. Procedure 9: Retrying to establish a point-to-multipoint link 1. More finely aim the SM or SMs toward the AP. 2.
Building Your Canopy Network March 2005 Through Software Release 6.1 6. On the left side of the SM Status page, click the Configuration button. The Configuration page of the SM opens. 7. If the transmit frequency of the AP is not selected in the Custom RF Frequency Scan Selection List parameter, select the frequency that matches. 8. If the Color Code parameter on this page is not identical to the Color Code parameter you noted from the AP, change one of them so that they match. 9.
March 2005 Through Software Release 6.1 Building Your Canopy Network Software Boot Version This field indicates the CANOPYBOOT version number. FPGA Version This field displays the version of FPGA that runs on the SM. An unpopulated FPGA Version parameter indicates that a version earlier than Version 082002 runs on the SM. Session Timeout This field indicates the maximum interval in hours that the SM may sustain a single session with this AP. AirDelay This field displays the distance of the SM from the AP.
Building Your Canopy Network 16.3.4 March 2005 Through Software Release 6.1 LUID Select Page of the AP An example of an AP LUID Select screen is displayed in Figure 53. Figure 53: LUID Select screen, AP This web page allows you to view the web pages of registered SMs over the RF link. To view the pages for a selected SM, perform the following steps. Procedure 10: Viewing SM pages through the AP 1.
March 2005 Through Software Release 6.1 16.3.5 Building Your Canopy Network Status Page of the SM Examples of SM Status screens are displayed in Figure 54. Figure 54: Status screen, SM The Status page provides information on the operation of this SM. This is the default web page for the SM. The Status page provides the following fields. Device Type This field indicates the type of the Canopy module.
Building Your Canopy Network March 2005 Through Software Release 6.1 FPGA Version This field indicates the version of the field-programmable gate array (FPGA) on the module. When you request technical support, provide the information from this field. Uptime This field indicates how long the module has operated since power was applied. System Time This field provides the current time. Any SM that registers to an AP inherits the system time, which is displayed in this field as GMT (Greenwich Mean Time).
March 2005 Through Software Release 6.1 Building Your Canopy Network Jitter This field displays the current quality of reception ◦ for the signal from the AP to which the SM is registered if the SM is registered. ◦ from any beacon if the SM is scanning. An acceptable link has a jitter value between 0 and 4 in Release 4.0 and later releases or between 5 and 9 in any earlier release.
Building Your Canopy Network March 2005 Through Software Release 6.1 6. Return your browser to the LUID Select page of the SM. 7. Repeat the test procedure from that point. When you have tested all of the SMs that you intend to test, return your browser to the Status page of the AP. end of procedure 16.3.6 Status Page of the AP An example of an AP Status screen is displayed in Figure 55. Figure 55: Status screen, AP The Status page provides information on the operation of the module.
March 2005 Through Software Release 6.1 Building Your Canopy Network Software Version This field indicates the software release that is operated on the module, the release date of the software, the time, and whether the module is secured by DES or AES encryption (see Encrypting Canopy Radio Transmissions on Page 296). When you request technical support, provide the information from this field. Software Boot Version This field indicates the CANOPYBOOT version number.
Building Your Canopy Network March 2005 Through Software Release 6.1 Site Contact This field indicates contact information for the physical module. You can provide or change this information on the Configuration web page. This information is also set into the sysName SNMP MIB-II object and can be polled by an SNMP management server. To conclude the test, perform the following steps. Procedure 12: Verifying and recording information from the AP 1.
March 2005 Through Software Release 6.1 Building Your Canopy Network 7. Start the browser in the computing device. 8. Access the Configuration page of the BH. 9. In the Timing Mode parameter, select Timing Master. 10. Click Save Changes. 11. Click Reboot. end of procedure The Canopy BH interface provides a series of web pages to configure and monitor the unit. These screens are subject to change by subsequent software releases.
Building Your Canopy Network March 2005 Through Software Release 6.1 Figure 56: Quick Start screen, BHM Quick Start is a wizard that helps you to perform a basic configuration that places a BHM into service. Only the following parameters must be configured: ◦ RF Carrier Frequency ◦ Synchronization ◦ Network IP Address In each page under Quick Start, you can ◦ specify the settings to satisfy the requirements of the network. ◦ review the configuration selected.
March 2005 Through Software Release 6.1 Building Your Canopy Network 4. At the bottom of this page, select Generate Sync Signal. 5. Click the Go To Next Page => button. RESULT: The BHM responds by opening the Lan IP Address page. 6. At the bottom of this page, specify a. a Lan IP Address. b. a Lan Subnet Mask. c. a Default Gateway. 7. Click the Go To Next Page => button. RESULT: The BHM responds by opening the Review and Save Configuration page. 8.
Building Your Canopy Network March 2005 Through Software Release 6.1 Figure 57: Time & Date screen, BHM To have each log in the BHM correlated to a meaningful time and date, either a reliable network element must pass time and date to the BHM or you must set the time and date whenever a power cycle of the BHM has occurred. A network element passes time and date in any of the following scenarios: ◦ A connected CMM2 passes time and date (GPS time and date, if received).
March 2005 Through Software Release 6.1 Building Your Canopy Network If you must set the time and date, use the following format for entry: Time hh:mm:ss Date mm/dd/yyyy where hh represents the two-digit hour in the range 00 to 24 mm represents the two-digit minute ss represents the two-digit second mm represents the two-digit month dd represents the two-digit day yyyy represents the four-digit year Proceed with the test setup as follows. Procedure 15: Setting up the BHS for test 1.
Building Your Canopy Network 16.4.3 March 2005 Through Software Release 6.1 Sessions Page of the BHM An example of the BHM Sessions page is displayed in Figure 58. Figure 58: Example Sessions page data, BHM If the BHS is not registered to this BHM, then the Sessions page displays the simple message No sessions. In this case, try the following steps. Procedure 16: Retrying to establish a point-to-point link 1. More finely aim the BHS toward the BHM. 2.
March 2005 Through Software Release 6.1 Building Your Canopy Network 8. Click the Save Changes button. 9. Click the Reboot button. RESULT: The BHS responds with the message Reboot Has Been Initiated… 10. Trigger your browser to refresh the page until the BHS redisplays the Status page. 11. If the transmit frequency of the BHM is not selected in the Custom RF Frequency Scan Selection List parameter, select the frequency that matches. 12.
Building Your Canopy Network March 2005 Through Software Release 6.1 Software Version This field displays the software release that operates on the BHS, the release date of the software, the time, and whether the module is secured by DES or AES encryption (see Encrypting Canopy Radio Transmissions on Page 296). When you request technical support, provide the information from this field. An unpopulated Software Version parameter indicates a version earlier than Version 3.1.
March 2005 Through Software Release 6.1 Building Your Canopy Network To begin the test, perform the following steps. Procedure 17: Viewing BHS pages through the BHM 1. Note the LUID associated with the MAC address of the BHS. 2. On the left side of the Sessions page, click the LUID Select button. RESULT: The BHM responds by opening the LUID Select page. end of procedure 16.4.4 LUID Select Page of the BHM An example of a BHM LUID Select screen is displayed in Figure 59.
Building Your Canopy Network March 2005 Through Software Release 6.1 Procedure 18: Viewing BHS pages through the BHM 1. Verify that the LUID matches the LUID shown on the Current LUID line. 2. Click View Current Subscriber Modem. RESULT: The Status page of the BHS is displayed. end of procedure 16.4.5 Status Page of the BHS An example of the BHS Status screen is displayed in Figure 60. Figure 60: Status screen, 5.2-GHz BHS The Status page provides information on the operation of this BHS.
March 2005 Through Software Release 6.1 Building Your Canopy Network Canopy Boot Version This field indicates the version of the software that is operated on the module, the date and time of boot, and whether the module is secured by DES or AES encryption (see Encrypting Canopy Radio Transmissions on Page 296). When you request technical support, provide the information from this field. FPGA Version This field indicates the version of the field-programmable gate array (FPGA) on the module.
Building Your Canopy Network March 2005 Through Software Release 6.1 NOTE: Unless the page is set to auto-refresh, the value displayed is the RSSI value at the instant the Status page was called. To keep a current view of the RSSI, refresh the browser screen or set to auto-refresh. Jitter This field displays the current quality of reception ◦ for the signal from the BHM if the BHS is registered. ◦ from any beacon if the BHS is scanning.
March 2005 Through Software Release 6.1 Building Your Canopy Network To resume the test, perform the following steps. Procedure 19: Verifying and recording information from the BHS 1. Verify that the Session Status field of the BHS Status page indicates REGISTERED. NOTE: This indication confirms that the BHS is properly functional. 2.
Building Your Canopy Network March 2005 Through Software Release 6.1 The Status page provides information on the operation of the module. This is the default web page for the module. The Status page provides the following fields. Device Type This field indicates the type of the Canopy module. Values include the frequency band of the module, the protocol that is used, and the MAC address of the module.
March 2005 Through Software Release 6.1 Building Your Canopy Network Site Name This field indicates the name of the physical module. You can assign or change this name on the Configuration web page. This information is also set into the sysName SNMP MIB-II object and can be polled by an SNMP management server. Site Contact This field indicates contact information for the physical module. You can provide or change this information on the Configuration web page.
Building Your Canopy Network 1 2 3 4 5 6 7 8 March 2005 Through Software Release 6.1 Weatherized enclosure Thumb-screw/slot-screwdriver door fasteners Punch-out for padlock Ethernet switch and power module Female BNC connector Water-tight bulkhead connectors Flange for attachment (stainless steel so it grounds to tower or building) using U bolts (provided) or other hardware such as screws or lag bolts or attachment straps (not provided).
March 2005 Through Software Release 6.1 Building Your Canopy Network Perform the following procedure to configure the CMMmicro for testing. IMPORTANT! Start with the 24-V DC power converter unconnected to AC. Procedure 21: Configuring a CMMmicro 1. Connect the converter lead whose insulation has a white stripe to +V on the CMMmicro terminal block. 2. Connect the converter lead whose insulation is solid black to -V on the CMMmicro terminal block. 3.
Building Your Canopy Network March 2005 Through Software Release 6.
March 2005 Through Software Release 6.1 1 2 3 4 5 6 7 8 9 Building Your Canopy Network 24 V DC power connection on terminal block (+V). 24 V DC ground connection on terminal block (-V). Ground bonding point for CMMmicro. Ground connection on terminal block, for grounding to Protective Earth (PE) . Female BNC connector for connecting to coax cable from GPS antenna. Status display of eight green LEDs.
Building Your Canopy Network March 2005 Through Software Release 6.
March 2005 Through Software Release 6.1 16.4.8 Building Your Canopy Network Status Page of the CMMmicro An example of a CMMmicro Status page is displayed in Figure 66. Figure 66: Status screen, CMMmicro The Status page provides information on the operation of this CMMmicro. This is the default web page for the CMMmicro. The Status page provides the following fields. Link A red dot indicates that the port is active and detects Ethernet traffic.
Building Your Canopy Network March 2005 Through Software Release 6.1 Powered A red dot indicates that the port is powered with 24 V DC to provide power to an AP or BH. A grey dot indicates that the port is not powered. Port power is turned on and off in the Port Power Control parameter of the Configuration page. A CMMmicro comes from the factory with no Ethernet ports powered. CAUTION! Never connect any devices other than Canopy APs and BHs to a powered port.
March 2005 Through Software Release 6.1 Building Your Canopy Network Height If the CMMmicro receives the signal from a GPS antenna, then this field displays the elevation (above sea level) of the GPS antenna. Uptime This field displays how much time has elapsed since the last boot of the CMMmicro. Satellites Tracked This field displays how many satellites the CMMmicro is tracking. Longitude If the CMMmicro receives the signal from a GPS antenna, then this field displays the longitude of the site.
Building Your Canopy Network 16.4.9 March 2005 Through Software Release 6.1 Configuration Page of the CMMmicro An example of the CMMmicro Configuration page is displayed in Figure 67. Figure 67: Configuration screen, CMMmicro The Configuration web page contains all of the configurable parameters that define how the CMMmicro operates. The first line of information on the Configuration screen echoes the Device Type from the Status web page.
March 2005 Through Software Release 6.1 Building Your Canopy Network IMPORTANT! Changes that are made to the following parameters become effective when you click the Save Changes button: ◦ Port Configuration ◦ Description ◦ Power Port Control ◦ Webpage Auto Update When these parameters listed above have become effective, if you click the Undo Saved Changes button, the previous values are not restored.
Building Your Canopy Network March 2005 Through Software Release 6.1 Lan1 IP Enter the IP address to be associated with the Ethernet connection on this CMMmicro. The default address is 169.254.1.1. If you set and then forget this parameter, then you must both 1. physically access the module. 2. use the CMMmicro override toggle switch to electronically access the module configuration parameters at 169.254.1.1. See Overriding Forgotten IP Addresses or Passwords on CMMmicro on Page 302.
March 2005 Through Software Release 6.1 Building Your Canopy Network Save Changes, then the change becomes effective immediately and the previous value is lost. Power Port Control Ensure that power is off for every port that connects to a router, computer, or other network equipment. Turn on 24-V DC power for ports that connect to Canopy APs or BHs. CAUTION! Never connect any devices other than Canopy APs and BHs to a powered port. Powered ports are indicated by a red LED to the right of the port.
Building Your Canopy Network March 2005 Through Software Release 6.1 If you set and then forget the Display-Only Access password, then you must both physically access the module. 1. use the CMMmicro override toggle switch to electronically access the module configuration parameters at 169.254.1.1. See Overriding Forgotten IP Addresses or Passwords on CMMmicro on Page 302. Full Access If you set the Full Access password, this password will allow ◦ telnet and FTP access to the module.
March 2005 Through Software Release 6.1 Building Your Canopy Network SNMP Community String Specify a control string that allows an Network Management Station (NMS) to access SNMP information. No spaces are allowed in this string. The default string is Canopy. The SNMP Community String value is clear text and is readable by a packet monitor. Additional security derives from the configuration of the SNMP Accessing Subnet, Trap Address, and Permission parameters.
Building Your Canopy Network March 2005 Through Software Release 6.1 Site Contact Enter contact information for the module administrator. This parameter is written into the sysContact SNMP MIB-II object and can be polled by an NMS. The buffer size for this field is 128 characters. Site Location Enter information about the physical location of the module. This parameter is written into the sysLocation SNMP MIB-II object and can be polled by an NMS. The buffer size for this field is 128 characters.
March 2005 Through Software Release 6.1 Building Your Canopy Network 16.4.10 Configuring Modules for Connection to CMMmicro After configuring the CMMmicro, configure the APs and BHs as follows. In each AP or BH that connects to a CMMmicro, you must set the Sync Input parameter of the Configuration page of that module to Sync to Received Signal (Power Port). See ◦ Sync Input on Page 190. ◦ Sync Input on Page 237. 16.4.
Building Your Canopy Network March 2005 Through Software Release 6.1 Antenna Connection This field displays the status of the signal from the antenna as follows: ◦ OK indicates that the GPS interface board is detecting an incoming signal on the coaxial cable from the GPS antenna. ◦ No Antenna indicates the GPS interface board is not detecting any incoming signal. The other GPS Status fields are described under Satellites Visible on Page 175.
March 2005 Through Software Release 6.1 Building Your Canopy Network These Ethernet statistics can also be retrieved from the CMMmicro by a Network Management Station using SNMP. During advanced troubleshooting, this information can be useful as you see the activity on a single port or as you compare activity between ports of the CMMmicro.
Building Your Canopy Network March 2005 Through Software Release 6.1 17 PREPARING COMPONENTS FOR DEPLOYMENT Your test of the modules not only verified that they are functional, but also yielded data that you have stored about them. Most efficiently preparing modules for deployment involves ◦ retrieving that data. ◦ systematically collecting the data into a single repository, while keeping a strong (quick) association between the data and the module.
March 2005 Through Software Release 6.1 Building Your Canopy Network When you have the color code, passwords, and IP addressing readily available in the future, you will be able to access the module pages without physically accessing the module.
Building Your Canopy Network March 2005 Through Software Release 6.1 18 CONFIGURING FOR THE DESTINATION 18.1 CONFIGURING AN AP FOR THE DESTINATION 18.1.1 Configuration Page of the AP An example of an AP Configuration screen is displayed in Figure 70.
March 2005 Through Software Release 6.1 Building Your Canopy Network The Configuration web page contains all of the configurable parameters that define how the module operates. The first line of information on the Configuration screen echoes the Device Type from the Status web page. You may set the Configuration page parameters as follows.
Building Your Canopy Network March 2005 Through Software Release 6.1 Broadcast Repeat Count In Release 4.2 and later releases, this parameter controls how many times, in addition to the original broadcast, the AP repeats each broadcast. Examples of conditions where each setting can be best are provided in the following table. Value (retries) 01 Condition 1 Where packet throughput is more important than reliability (such as in downstreaming video.
March 2005 Through Software Release 6.1 Building Your Canopy Network Wherever you wish to implement the high-priority channel, you must set all high-priority parameters. If all are not set, then the high-priority channel is not active. Slot Specifications The recommended settings for slot specification parameters are provided in Table 40.
Building Your Canopy Network March 2005 Through Software Release 6.1 Uacks Reserved High Specify how many slots to use to acknowledge high-priority data that an SM receives. The default value of this parameter is 0. See Slot Specifications above. NumDAckSlots Specify how many slots are used to acknowledge data that the AP receives. The default value of this parameter is 3. See Slot Specifications above.
March 2005 Through Software Release 6.1 Building Your Canopy Network Color Code Specify a value from 0 to 254. For registration to occur, the color code of the SM and the AP must match. Color code is not a security feature. Instead, color code allows you to segregate an individual network or neighboring Canopy networks. Color code also allows you to force an SM to register to only a specific AP, even where the SM can reach multiple APs.
Building Your Canopy Network March 2005 Through Software Release 6.1 Figure 72: Configuration screen (middle), AP As shown in Figure 72, the Configuration page continues. Max Range Enter a number of miles (or kilometers divided by 1.61, then rounded to an integer) for the furthest distance from which an SM is allowed to register to this AP. Do not set the distance to any greater number of miles. A greater distance ◦ does not increase the power of transmission from the AP.
March 2005 Through Software Release 6.1 Building Your Canopy Network NOTE: A value of 15 for this parameter decreases the number of available data slots by 1. External Filters Delay Leave the value of this parameter set to 0, regardless of whether optional filters are installed. Transmitter Output Power Nations and regions may regulate transmitter output power. For example ◦ Both 900 MHz and 5.
Building Your Canopy Network March 2005 Through Software Release 6.1 ◦ If the Full Access password is also set, then the Full Access password allows telnet and FTP access to the module, and the Display-Only Access password does not. ◦ If the Display-Only Access password is not set and the Full Access password is, then no password is required to view the parameters of the module. ◦ If neither password is set, then anyone can view or change the parameters of the module.
March 2005 Through Software Release 6.1 Building Your Canopy Network Webpage Auto Update Enter the frequency (in seconds) for the web browser to automatically refresh the webbased interface. The default setting is 0. The 0 setting causes the web-based interface to never be automatically refreshed. Airlink Security Specify the type of air link security to apply to this AP: ◦ Encryption Disabled provides no encryption on the air link. This is the default mode.
Building Your Canopy Network March 2005 Through Software Release 6.1 If the AP does not have authentication capability, then this parameter displays Authentication Not Available. Authentication Server IPs If the optional BAM server is implemented and the AP has authentication capability, enter the IP address of one or more BAM servers that perform authentication for SMs registered to this AP. Enter these in order of primary, secondary, then tertiary.
March 2005 Through Software Release 6.1 Building Your Canopy Network Community String Specify a control string that allows an Network Management Station (NMS) to access SNMP information. No spaces are allowed in this string. The default string is Canopy. The Community String value is clear text and is readable by a packet monitor. Additional security derives from the configuration of the Accessing Subnet, Trap Address, and Permission parameters.
Building Your Canopy Network March 2005 Through Software Release 6.1 Figure 73: Configuration screen (bottom), AP As shown in Figure 73, the AP Configuration page continues. VLAN Specify whether VLAN functionality for the AP and all linked SMs should (Enable) or should not (Disable) be allowed. The default value is Disable. Dynamic Learning Specify whether the AP should (Enable) or should not (Disable) add the VIDs of upstream frames to the VID table.
March 2005 Through Software Release 6.1 Building Your Canopy Network NOTE: VIDs that you enter for the Management VID and VLAN Membership parameters do not time out. Management VID Enter the VID that the operator wishes to use to communicate with the module manager. The range of values is 1 to 4095. The default value is 1. VLAN Membership Enter the set of allowed VIDs for the AP. The range of values is 1 to 4095. The default value is 1.
Building Your Canopy Network March 2005 Through Software Release 6.1 Site Contact Enter contact information for the module administrator. This parameter is written into the sysContact SNMP MIB-II object and can be polled by an NMS. The buffer size for this field is 128 characters. Site Location Enter information about the physical location of the module. This parameter is written into the sysLocation SNMP MIB-II object and can be polled by an NMS. The buffer size for this field is 128 characters.
March 2005 Through Software Release 6.1 18.1.2 Building Your Canopy Network IP Configuration Page of the AP An example of the AP IP Configuration screen is displayed in Figure 74. Figure 74: IP Configuration screen, AP You may set the IP Configuration page parameters as follows. LAN1 Network Interface Configuration, IP Address Enter the non-routable IP address to associate with the Ethernet connection on this AP. (The default IP address from the factory is 169.254.1.1.
Building Your Canopy Network March 2005 Through Software Release 6.1 RECOMMENDATION: Note or print the IP settings from this page. Ensure that you can readily associate these IP settings both with the module and with the other data that you store about the module. LAN1 Network Interface Configuration, Subnet Mask Enter an appropriate subnet mask for the AP to communicate on the network. The default subnet mask is 255.255.255.0. See Allocating Subnets on Page 123.
March 2005 Through Software Release 6.1 Building Your Canopy Network Save Changes When you click this button, any changes that you made on the IP Configuration page are recorded in flash memory. However, these changes do not apply until the next reboot of the module. Undo Saved Changes When you click this button, any changes that you made but were not committed by a reboot of the module are undone.
Building Your Canopy Network March 2005 Through Software Release 6.1 Figure 75: Configuration screen, SM The Configuration web page contains all of the configurable parameters that define how the SM operates. The first line of information on the Configuration screen echoes the Device Type from the Status web page. As shown in Figure 75, you may set the Configuration page parameters as follows. 802.
March 2005 Through Software Release 6.1 Building Your Canopy Network When you select Enable, this feature ◦ disallows the SM user to access the link, as in the case where the user account is delinquent. ◦ allows the operator to partition the network for troubleshooting or another analytical or operational function. When you select Disable, this feature is deactivated. Link Negotiation Speeds Specify the type of link speed for the Ethernet connection.
Building Your Canopy Network March 2005 Through Software Release 6.1 RECOMMENDATION: Note the color code that you enter. Ensure that you can readily associate this color code both with the module and with the other data that you store about the module. Display-Only Access If you set (populate) the Display-Only Access password, this password will allow only viewing activities on the module.
March 2005 Through Software Release 6.1 Building Your Canopy Network If you set and then forget the Full Access password, then you must both 1. physically access the module. 2. use an override plug to electronically access the module configuration parameters at 169.254.1.1. See Overriding Forgotten IP Addresses or Passwords on AP, SM, or BH on Page 302. NOTE: You can unset either password (revert the access to no password required). To do so, type a space into the field and reboot the module.
Building Your Canopy Network March 2005 Through Software Release 6.1 Figure 76: Configuration screen, SM (continued) As shown in Figure 76, the Configuration page continues. SM Power Up Mode With No 802.3 Link Specify the default mode in which this SM will power up when the SM senses no Ethernet link. Select either ◦ Power Up in Aim Mode—the SM boots in an aiming mode. When the SM senses an Ethernet link, this parameter is automatically reset to Power Up in Operational Mode.
March 2005 Through Software Release 6.1 Building Your Canopy Network (whose MAC address is the bridge entry) within the interval that this parameter specifies. The Bridge Entry Timeout should be a longer period than the ARP (Address Resolution Protocol) cache timeout of the router that feeds the network. This parameter governs the timeout interval, even if a router in the system has a longer timeout interval. The default value of this field is 25 minutes.
Building Your Canopy Network March 2005 Through Software Release 6.1 Power Control In Release 4.1 and later releases, select either ◦ Low to set the SM to operate at 18 dB less than full power to reduce the possibility of self-interference with a nearby module. ◦ Normal to allow the SM to operate at full power. CAUTION! Selection of Low can cause the SM to drop an active RF link to an AP that is relatively far from the low-power SM.
March 2005 Through Software Release 6.1 Building Your Canopy Network RECOMMENDATION: The subscriber can access the SM by changing the subscriber device to the accessing subnet. This hazard exists because the Community String and Accessing Subnet are both visible parameters. To avoid this hazard in Release 4.2 or a later release, configure the SM to filter (block) SNMP requests. See Filtering Protocols and Ports on Page 303. Trap Address Specify the IP address (xxx.xxx.xxx.
Building Your Canopy Network March 2005 Through Software Release 6.1 Set to Factory Defaults When you click this button, all configurable parameters on all configurable pages are reset to the factory settings. Reboot When you click this button 1. the module reboots. 2. any changes that you saved by a click of the Save Changes button are implemented.
March 2005 Through Software Release 6.1 Building Your Canopy Network Figure 78: IP Configuration screen, NAT disabled, local accessibility When NAT (network address translation) is disabled on the NAT Configuration page as shown in Figure 83 on Page 223, the you may set the following IP Configuration page parameters. LAN1 Network Interface Configuration, IP Address Enter the non-routable IP address to associate with the Ethernet connection on this SM. (The default IP address from the factory is 169.254.
Building Your Canopy Network March 2005 Through Software Release 6.1 LAN1 Network Interface Configuration, Gateway IP Address Enter the appropriate gateway for the SM to communicate with the network. The default gateway is 169.254.0.0. Regardless of whether NAT is enabled, the IP Configuration page also provides the following buttons. Save Changes When you click this button, any changes that you made on the IP Configuration page are recorded in flash memory.
March 2005 Through Software Release 6.
Building Your Canopy Network March 2005 Through Software Release 6.
March 2005 Through Software Release 6.
Building Your Canopy Network March 2005 Through Software Release 6.1 Figure 82: IP Configuration screen, NAT without DHCP When NAT (network address translation) is enabled, you may set the following IP Configuration page parameters. NAT Private Network Interface Configuration, IP Address Assign an IP address for SM management. This address is available from only Ethernet access to the SM. The last characters of this address must be .1.
March 2005 Through Software Release 6.1 Building Your Canopy Network address assigned in the NAT Private Network Interface Configuration, IP Address field above. Only one such address is allowed. Behind this SM, the device that should receive network traffic must be assigned this address. The system provides a warning if you enter an address within the range that DHCP can assign. NAT Public Network Interface Configuration, IP Address This field displays the IP address of the SM.
Building Your Canopy Network March 2005 Through Software Release 6.1 Set to Factory Defaults When you click this button, all configurable parameters on all configurable pages are reset to the factory settings. Reboot When you click this button 1. the module reboots. 2. any changes that you saved by a click of the Save Changes button are implemented.
March 2005 Through Software Release 6.1 Building Your Canopy Network NAT Enable/Disable Either disable NAT, or enable NAT to view additional options. TCP Session Garbage Timeout Where a large network exists behind the SM, you can set this parameter to lower than the default value of 1440 minutes (24 hours). This action makes additional resources available for greater traffic than the default value accommodates.
Building Your Canopy Network March 2005 Through Software Release 6.1 Figure 84: Advanced Network Configuration screen of SM with NAT disabled When NAT (network address translation) is disabled, you may set the following Advanced Network Configuration page parameters. NAT Enable/Disable Either disable NAT, or enable NAT to view additional options. Packet Filter Configuration In Release 4.
March 2005 Through Software Release 6.1 Building Your Canopy Network Save Changes When you click this button, any changes that you made on the NAT Configuration page are recorded in flash memory. However, these changes do not apply until the next reboot of the module. Undo Saved Changes When you click this button, any changes that you made but were not committed by a reboot of the module are undone.
Building Your Canopy Network March 2005 Through Software Release 6.
March 2005 Through Software Release 6.
Building Your Canopy Network March 2005 Through Software Release 6.
March 2005 Through Software Release 6.1 Building Your Canopy Network Figure 88: NAT Configuration screen, NAT without DHCP When NAT (network address translation) is enabled, you may set the following NAT Configuration page parameters. ARP Cache Timeout If a router upstream has an ARP cache of longer duration (as some use 30 minutes), enter a value of longer duration than the router ARP cache. The default value of this field is 20 seconds.
Building Your Canopy Network March 2005 Through Software Release 6.1 UDP Session Garbage Timeout You may adjust this value in the range of 1 to 1440 minutes, based on network performance. The default value of this parameter is 4 minutes. DHCP Client Enable/Disable Select either ◦ Enable to allow the network DHCP server to assign the NAT Public Network Interface Configuration IP address, subnet mask, and gateway IP address for this SM. ◦ Disable to − disable DHCP server assignment of this address.
March 2005 Through Software Release 6.1 18.2.7 Building Your Canopy Network NAT Configuration Buttons with NAT Enabled Regardless of whether NAT is enabled, the NAT Configuration page also provides the following buttons. Save Changes When you click this button, any changes that you made on the NAT Configuration page are recorded in flash memory. However, these changes do not apply until the next reboot of the module.
Building Your Canopy Network March 2005 Through Software Release 6.1 Figure 89: VLAN Configuration screen, SM You may set the VLAN Configuration page parameters as follows. Dynamic Learning Specify whether the SM should (Enable) or should not (Disable) add the VIDs of upstream frames (that enter the SM through the wired Ethernet interface) to the VID table. The default value is Enable.
March 2005 Through Software Release 6.1 Building Your Canopy Network Management VID Enter the VID that the SM should share with the AP. The range of values is 1 to 4095. The default value is 1. 18.3 SETTING THE CONFIGURATION SOURCE In Canopy System Release 6.1 and later releases, the AP includes a Configuration Source parameter, which sets where SMs that register to the AP are controlled for MIR, VLAN, the high-priority channel, and CIR as follows.
Building Your Canopy Network March 2005 Through Software Release 6.1 − Hi Priority Uplink CIR − Hi Priority Downlink CIR For any SM whose Authentication Mode parameter is set to Authentication Required, the above settings are derived as shown in Table 42.
March 2005 Through Software Release 6.1 18.4.1 Building Your Canopy Network Configuration Page of the BHM An example of a BHM Configuration screen is displayed in Figure 90. Figure 90: Configuration screen, BHM The Configuration web page contains all of the configurable parameters that define how the module operates. The first line of information on the Configuration screen echoes the Device Type from the Status web page. You may set the Configuration page parameters as follows.
Building Your Canopy Network March 2005 Through Software Release 6.1 Timing Mode Select Timing Master. This BH will provide sync for the link. Whenever you toggle this parameter to Timing Master from Timing Slave, you should also do the following: 1. Make no other changes in this or any other interface page. 2. Save this change of timing mode. 3. Reboot the BH. RESULT: The set of interface web pages that is unique to a BHM is made available.
March 2005 Through Software Release 6.1 Building Your Canopy Network RECOMMENDATION: Note the color code that you enter. Ensure that you can readily associate this color code both with the module and with the other data that you store about the module. Sector ID Specify a number to associate with this BHM. The Sector ID does not affect the operation of the BHM. On the AP Eval Data web page of the BHS, the Sector ID field identifies the BHM that the BHS sees.
Building Your Canopy Network March 2005 Through Software Release 6.1 Full Access If you set the Full Access password, this password will allow ◦ telnet and FTP access to the module. ◦ viewing or changing the parameters of the module. To set this password, enter the same expression in both Full Access fields for verification. When the web-based interface prompts for this password, no user name is required.
March 2005 Through Software Release 6.1 Building Your Canopy Network NOTE: In any BH link where encryption is enabled, the BHS briefly drops registration and re-registers in the BHM every 24 hours to change the encryption key. Authentication Mode This parameter has no effect in the BHM. No BHS is ever required to authenticate in the BHM.
Building Your Canopy Network March 2005 Through Software Release 6.1 As shown in Figure 91, the Configuration page continues with the following parameters. SM Scan Privacy When the SM Scan Privacy feature is enabled, you can use this field to suppress the display of data about this BHM on the AP Eval Data page of the registered BHS. Bridge Entry Timeout Specify the appropriate bridge timeout for correct network operation with the existing network infrastructure.
March 2005 Through Software Release 6.1 Building Your Canopy Network The Community String value is clear text and is readable by a packet monitor. Additional security derives from the configuration of the Accessing Subnet, Trap Address, and Permission parameters. Accessing Subnet Specify the addresses that are allowed to send SNMP requests to this BHM. The NMS has an address that is among these addresses (this subnet). You must enter both ◦ The network IP address in the form xxx.xxx.xxx.
Building Your Canopy Network March 2005 Through Software Release 6.1 Transmit Frame Spreading If you select Enable, then a BHS between two BHMs can register in the assigned BHM (not the other BHM). Where the BHS operates on Release 4.0 or later, we strongly recommend that you select this option. With this selection, the BHM does not transmit a beacon in each frame, but rather transmits a beacon in only pseudo-random frames in which the BHS expects the beacon.
March 2005 Through Software Release 6.1 18.4.2 Building Your Canopy Network IP Configuration Page of the BHM An example of a BHM IP Configuration screen is displayed in Figure 92. Figure 92: IP Configuration screen, BHM You may set the following IP Configuration page parameters. LAN1 Network Interface Configuration, IP Address Enter the non-routable IP address to be associated with the Ethernet connection on this module. (The default IP address from the factory is 169.254.1.1.
Building Your Canopy Network March 2005 Through Software Release 6.1 LAN1 Network Interface Configuration, Gateway IP Address Enter the appropriate gateway for the BHM to communicate with the network. The default gateway is 169.254.0.0. LAN2 Network Interface Configuration (RF Private Interface), IP Address Enter the IP address to be associated with this BHM for over-the-air access. The IP Configuration page also provides the following buttons.
March 2005 Through Software Release 6.1 Building Your Canopy Network 18.5 CONFIGURING A BH TIMING SLAVE FOR THE DESTINATION 18.5.1 Configuration Page of the BHS An example of a BHS Configuration screen is displayed in Figure 93. Figure 93: Configuration screen, BHS The Configuration web page contains all of the configurable parameters that define how the module operates. The first line of information on the Configuration screen echoes the Device Type from the Status web page.
Building Your Canopy Network March 2005 Through Software Release 6.1 You may set the following Configuration page parameters. Timing Mode Select Timing Slave. This BH will receive sync from another source. Whenever you toggle this parameter to Timing Slave from Timing Master, you should also do the following: 1. Make no other changes in this or any other interface page. 2. Save this change of timing mode. 3. Reboot the BH. RESULT: The set of interface web pages that is unique to a BHS is made available.
March 2005 Through Software Release 6.1 Building Your Canopy Network A list of channels in the band is provided in Considering Frequency Band Alternatives on Page 100. (The selection labeled Factory requires a special software key file for implementation.) Color Code The operator specifies a value from 0 to 254. For registration to occur, the color codes of the BHS and of the BHM must match. Color code is not a security feature.
Building Your Canopy Network March 2005 Through Software Release 6.1 If you set and then forget the Display-Only Access password, then you must both 1. physically access the module. 2. use an override plug to electronically access the module configuration parameters at 169.254.1.1. See Overriding Forgotten IP Addresses or Passwords on AP, SM, or BH on Page 302. Full Access If you set the Full Access password, this password will allow ◦ telnet and FTP access to the module.
March 2005 Through Software Release 6.1 Building Your Canopy Network Webpage Auto Update Enter the frequency (in seconds) for the web browser to automatically refresh the webbased interface. The default setting is 0. The 0 setting causes the web-based interface to never be automatically refreshed. Figure 94: Configuration screen, BHS (continued) As shown in Figure 94, the Configuration page continues with the following parameters. SM Power Up Mode With No 802.
Building Your Canopy Network March 2005 Through Software Release 6.1 Bridge Entry Timeout Specify the appropriate bridge timeout for correct network operation with the existing network infrastructure. Timeout occurs when the BHM encounters no activity with the BHS (whose MAC address is the bridge entry) within the interval that this parameter specifies. The Bridge Entry Timeout should be a longer period than the ARP (Address Resolution Protocol) cache timeout of the router that feeds the network.
March 2005 Through Software Release 6.1 Building Your Canopy Network The Community String value is clear text and is readable by a packet monitor. Additional security derives from the configuration of the Accessing Subnet, Trap Address, and Permission parameters. Accessing Subnet Specify the addresses that are allowed to send SNMP requests to this BHS. The NMS has an address that is among these addresses (this subnet). You must enter both ◦ The network IP address in the form xxx.xxx.xxx.
Building Your Canopy Network March 2005 Through Software Release 6.1 Site Location Enter information about the physical location of the module. This parameter is written into the sysLocation SNMP MIB-II object and can be polled by an NMS. The buffer size for this field is 128 characters. The Configuration page also provides the following buttons. Save Changes When you click this button, any changes that you made on the Configuration page are recorded in flash memory.
March 2005 Through Software Release 6.1 18.5.2 Building Your Canopy Network IP Configuration Page of the BHS An example of the BHS IP Configuration page is displayed in Figure 95. Figure 95: IP Configuration screen, BHS You may set the following IP Configuration page parameters. LAN1 Network Interface Configuration, IP Address Enter the non-routable IP address to associate with the Ethernet connection on this BHS. (The default IP address from the factory is 169.254.1.1.
Building Your Canopy Network March 2005 Through Software Release 6.1 LAN1 Network Interface Configuration, Gateway IP Address Enter the appropriate gateway for the BHS to communicate with the network. The default gateway is 169.254.0.0. The IP Configuration page also provides the following buttons. Save Changes When you click this button, any changes that you made on the IP Configuration page are recorded in flash memory. However, these changes do not apply until the next reboot of the module.
March 2005 Through Software Release 6.1 Building Your Canopy Network The calculation of transmitter output power is as follows: from applicable regulations Transmitter = Output Power EIRP from the following table Patch Antenna Gain − − Reflector Gain from the following table solve, then set in parameter Table 44: Patch antenna and reflector gain Gain Frequency Band Range Page 256 of 425 Patch Antenna Reflector 2.4 GHz 8 dBi 11dBi 5.2, 5.4, or 5.
Building Your Canopy Network March 2005 Through Software Release 6.1 19 INSTALLING COMPONENTS RECOMMENDATION: Use shielded cable for all Canopy infrastructure connections associated with BHs, APs, and CMMs. The environment that these modules operate in often has significant unknown or varying RF energy. Operator experience consistently indicates that the additional cost of shielded cables is more than compensated by predictable operation and reduced costs for troubleshooting and support. 19.
March 2005 Through Software Release 6.1 Building Your Canopy Network Figure 96: Signal information screen for PDA access, Release 4.2 Figure 97: AP Evaluation screen for PDA access, Release 4.
Building Your Canopy Network March 2005 Through Software Release 6.1 Figure 98: Module information screen for PDA access, Release 4.2 19.2 INSTALLING AN AP To install the Canopy AP, perform the following steps. Procedure 23: Installing the AP 1. Begin with the AP in the powered-down state. 2. Choose the best mounting location for your particular application. Modules need not be mounted next to each other. They can be distributed throughout a given site.
March 2005 Through Software Release 6.1 Building Your Canopy Network 5. Remove the base cover of the AP. (See Figure 47 on Page 132.) 6. Attach the cables to the AP. (See Procedure 5 on Page 138.) NOTE: When power is applied to a Canopy module or the unit is reset on the web-based interface, the module requires approximately 25 seconds to boot. During this interval, self-tests and other diagnostics are being performed. See Table 35 on Page 133. end of procedure 19.
Building Your Canopy Network March 2005 Through Software Release 6.1 ◦ 12” adjustable wrench ◦ 7/16” wrench ◦ Needle-nose pliers Mounting a GPS Antenna Perform the following procedure to mount a GPS antenna. Procedure 24: Mounting the GPS antenna 1. Ensure that the mounting position ◦ has an unobstructed view of the sky to 20º above the horizon. ◦ is not the highest object at the site. (This is important for lightning protection.) ◦ is not further than 100 feet (30.
March 2005 Through Software Release 6.1 ◦ 19.4.2 Building Your Canopy Network 2 Times Microwave N-male connectors (Times Microwave P/N TC-200-NM) or equivalent connectors. Cabling the GPS Antenna Connect the GPS coax cable to the female N-connector on the GPS antenna. 19.5 INSTALLING A CMM2 Ensure that you comply with standard local or national electrical and climbing procedures when you install the CMM2. 19.5.
Building Your Canopy Network March 2005 Through Software Release 6.1 5. If the support structure is a pole that has an outside diameter of 3 to 8 cm, or 1.25 to 3 inches, use a toothed V-bracket (provided) to a. attach the V-bracket to the pole as shown in Figure 100. b. attach the CMM2 flanges to the V-bracket. Figure 100: Detail of pole mounting end of procedure 19.5.
March 2005 Through Software Release 6.1 Building Your Canopy Network CAUTION! Failure to perform the following step can result in damage to equipment. 5. Set the 115-/230-volt power switch in the CMM2 consistent with the power source. See Figure 101. Fuse receptacle AC power connectors 115/230 V switch Figure 101: Location of 115-/230-volt switch IMPORTANT! The AC power connectors are labeled N for Neutral, L for Line, and PE for Protective Earth (PE) or ground.
Building Your Canopy Network March 2005 Through Software Release 6.1 The logical connections in the CMM2 are displayed in Figure 102.
March 2005 Through Software Release 6.1 Building Your Canopy Network Ethernet switch Extra fuse GPS sync Ethernet DC power connectors AC power connectors Figure 103: Canopy CMM2, front view 8. Connect the remaining Ethernet cables to the remaining J3 ports. 9. Route the GPS sync (serial) cables from the APs to the CMM2. The GPS sync cables have 6-conductor RJ-11 connectors that mate to corresponding ports inside the CMM2. These ports are labeled J1.
Building Your Canopy Network March 2005 Through Software Release 6.1 NOTE: Instructions for installing a Canopy Surge Suppressor are provided in Procedure 32 on Page 271. 13. Connect GPS coaxial cable to the N-connector on the outside of the CMM2. See Figure 48 on Page 134. 14. Connect AC or DC power to the CMM2, consistent with Figure 102 on Page 265.
March 2005 Through Software Release 6.1 Building Your Canopy Network 4. Verify that the AP or BH is seeing and tracking satellites. (To generate the timing pulse, the module must track at least 4 satellites.) end of procedure 19.6 INSTALLING A CMMmicro Ensure that you comply with standard local or national electrical and climbing procedures when you install the CMMmicro. 19.6.1 CMMmicro Installation Temperature Range Install the CMMmicro outside only when temperatures are above –4° F (–20° C).
Building Your Canopy Network March 2005 Through Software Release 6.1 4. If the support structure is a pole that has an outside diameter of 1.25 to 3 inches (3 to 8 cm), use a toothed V-bracket (provided) to a. attach the V-bracket to the pole as shown in Figure 100 on Page 263. b. attach the CMMmicro flanges to the V-bracket. end of procedure 19.6.4 Installing the Power Supply for the CMMmicro Install the CMMmicro power converter in only a hut, wiring closet, or weatherized enclosure.
March 2005 Through Software Release 6.1 Building Your Canopy Network 3. Feed the power cord through the bulkhead connector of the CMMmicro. 4. Connect the converter lead whose insulation has a white stripe to +V on the CMMmicro terminal block. 5. Connect the converter lead whose insulation is solid black to -V on the CMMmicro terminal block. end of procedure 19.6.5 Cabling a CMMmicro Perform the following procedure to attach the CMMmicro cables on both ends: Procedure 30: Cabling the CMMmicro 1.
Building Your Canopy Network 19.6.6 March 2005 Through Software Release 6.1 Verifying CMMmicro Connections To verify the CMMmicro connections after the APs and or BHs have been installed, perform the following steps. Procedure 31: Verifying CMMmicro Connections 1. Access the web-based interface for each AP or BH by opening http://, where the is the address of the individual module. 2. In the Status page, verify that the time is expressed in GMT. 3.
March 2005 Through Software Release 6.1 Building Your Canopy Network Stainless steel hose clamps Reflector dish arm Figure 105: SM attachment to reflector arm 6. Use stainless steel hose clamps or equivalent fasteners to lock the SM into position. outside wall Ethernet cable Ethernet cable SM Computer 24 VDC to to NIC Canopy 300SS wall adapter 10 AWG CU wire ground system Figure 106: SM and computer wiring 7. Remove the cover of the 300SS Surge Suppressor. 8.
Building Your Canopy Network March 2005 Through Software Release 6.1 14. Securely connect the copper wire to the grounding system (Protective Earth) according to applicable regulations. 15. Connect a ground wire to the 300SS. 16. Replace the cover of the 300SS surge suppressor. 17. Connect the pig tail to the Ethernet/Power port on the computer. NOTE: When power is applied to a Canopy module or the unit is reset on the web-based interface, the module requires approximately 25 seconds to boot.
March 2005 Through Software Release 6.1 Building Your Canopy Network Figure 107: Audible Alignment Tone kit and example tone Move the module slightly until you hear the highest pitch and highest volume. Continue to move the module slightly until you hear the tone interruptions, if possible. 24. On the computer, in the RSSI Only Mode field, click Enabled. 25. Click Enable Aiming Mode. 26. Simultaneously, begin to ◦ move the module slightly in the vertical plane.
Building Your Canopy Network March 2005 Through Software Release 6.1 19.8 VERIFYING AN AP-SM LINK To verify the AP-SM link after the SM has been installed, perform the following steps. Procedure 33: Verifying system performance 1. Access the web-based interface for the AP (by opening http://, where is the address of the individual module). 2. In the menu on the left-hand side of the web page, click on GPS Status. 3.
March 2005 Through Software Release 6.1 Building Your Canopy Network --------------------------------------------EARTH-------------------------------------------Figure 108: Correct mount, with module support arm plumb behind reflector dish Improper dish, tube, and module positions for this case are illustrated in Figure 109. --------------------------------------------EARTH-------------------------------------------Figure 109: Incorrect mount, with module plumb in front of reflector dish 19.9.
Building Your Canopy Network March 2005 Through Software Release 6.1 Figure 110: Mounting assembly, exploded view 19.10 INSTALLING A BH TIMING MASTER To install the Canopy BHM, perform the following steps: Procedure 34: Installing the BHM 1. If this is a 20-Mbps BH, set the Modulation Scheme parameter in the Configuration web page of the BHM to 10 Mbps (for easier course aiming). 2. Remove power from the BHM. 3. Choose the best mounting location for your particular application. 4.
March 2005 Through Software Release 6.1 Building Your Canopy Network Stainless steel hose clamps Reflector dish arm Figure 111: BH attachment to reflector arm 5. Align the BHM as follows: a. Move the module to where the link will be unobstructed by the radio horizon and no objects penetrate the Fresnel zone. (The Canopy System Calculator page AntennaElevationCalcPage.xls automatically calculates the minimum antenna elevation that is required to extend the radio horizon to the other end of the link.
Building Your Canopy Network March 2005 Through Software Release 6.1 11. Set the Sync Input parameter to the Sync to Received Signal (Power Port) selection. end of procedure 19.11 INSTALLING A BH TIMING SLAVE To install the Canopy BHS, perform the following steps: Procedure 35: Installing the BHS 1. If this is a 20-Mbps BH, set the Modulation Scheme parameter in the Configuration web page of the BHM to 10 Mbps (for easier course aiming). 2. Remove power from the BHS. 3.
March 2005 Through Software Release 6.1 Building Your Canopy Network 10. On the computing device, access the Alignment page of this module. An example of the Alignment screen is displayed in Figure 112. Figure 112: Alignment screen 11. In the RF Carrier Frequency field, select the frequency that the BHM transmits. 12. In the RSSI Only Mode field, ensure that the Disabled button is selected. 13.
Building Your Canopy Network c. March 2005 Through Software Release 6.1 Connect the Alignment Tool Headset, an earpiece, or a small batterypowered speaker to this cable. d. Listen to the alignment tone for ◦ pitch, which indicates greater RSSI by higher pitch. ◦ volume, which indicates less jitter by higher volume. In Adobe Reader® 6.0 or later release, to hear an example of the alignment tone as the SM aligns and registers, click on the picture in Figure 113.
March 2005 Through Software Release 6.1 Building Your Canopy Network NOTE: If the BH timing slave does not register with the BH timing master, ensure that both modules are configured to the same color code in the Configuration page of each. 22. Resume slight movements of the module 23. When the best achievable values are simultaneously displayed on the Status page, lock the module into position.
Building Your Canopy Network March 2005 Through Software Release 6.1 20 VERIFYING SYSTEM FUNCTIONALITY To verify system functionality after the APs and or BHs have been installed, perform the following steps. Procedure 37: Verifying System Functionality 1. For each installed AP, use a computer connected to an SM set to a compatible configuration (frequency and color code, for example) and verify link functionality. 2.
March 2005 Through Software Release 6.
Managing Your Canopy Network March 2005 Through Software Release 6.1 21 GROWING YOUR NETWORK Keys to successfully growing your network include ◦ monitoring the RF environment. ◦ considering software release compatibility. ◦ redeploying modules appropriately and quickly. 21.1 MONITORING THE RF ENVIRONMENT Regardless of whether you are maintaining or growing your network, you may encounter new RF traffic that can interfere with your current or planned equipment.
March 2005 Through Software Release 6.1 Managing Your Canopy Network Table 45: Differences between graphical and tabular Spectrum Analyzer page Graphical Spectrum Analyzer Page 21.1.2 Tabular Spectrum Analyzer Page Green bars display the latest readings. Table data provide the latest readings. A yellow tick indicates the highest reading since the SM entered the scan mode. Only readings from the latest page refresh are provided. A red tick indicates any −4 dBm reading.
Managing Your Canopy Network March 2005 Through Software Release 6.1 Colors in the display have the following meanings: 21.1.3 ◦ Green bars show the most recent measurements. ◦ Yellow ticks show the maximum measurements from the current spectrum analysis session. ◦ Red ticks show measurements of −40 dBm or stronger. Tabular Spectrum Analyzer Display An SM/BHS displays the tabular spectrum analyzer if either ◦ the module operates on a Canopy system release that is earlier than Release 4.2.
March 2005 Through Software Release 6.1 Managing Your Canopy Network Figure 115: Spectrum Analyzer screen, 2.4-GHz SM 21.1.4 Updating the Spectrum Analyzer Page Readings To keep the displayed data current, either set this page to automatically refresh or repeatedly click the Enable button. When you are finished analyzing the spectrum, click the Disable button to return the module to normal operation. 21.1.5 Using the AP as a Spectrum Analyzer In Canopy System Release 6.
Managing Your Canopy Network March 2005 Through Software Release 6.1 Procedure 38: Using the Spectrum Analyzer in AP feature 1. Connect to the wired Ethernet interface of the AP. 2. Access the Configuration page of the AP. 3. Set the Device Type parameter to SM. 4. Click Save Changes. 5. Click Reboot. 6. When the module has rebooted as an SM, click the Expanded Stats navigation link. 7. Click the Spectrum Analyzer navigation link. 8.
March 2005 Through Software Release 6.1 Managing Your Canopy Network The correlation between FPGA dates and CANOPYBOOT versions is provided in Table 47. Table 47: FPGA and CANOPYBOOT versions Hardware Series P7 or P8 Rel SW Scheduler DES AES Hardware Series P9 HW Scheduler DES AES SW Scheduler DES AES HW Scheduler DES AES Boot Version (block.bin) 3.1.5 091102 1.0 4.0 042903 041403 1.1 4.0.1 042903 041403 1.1 4.0.2 062403 041403 1.1 4.0.4 062403 041403 1.1 4.
Managing Your Canopy Network March 2005 Through Software Release 6.1 Table 48: Upgradability from previous software releases A module can be directly upgraded1 from… System Release with FPGA Version Nahum (SP3) and Boot Version 121401a7 3 1.0 091102xx 1.0 121401a7 1.0 091102xx 1.0 4.0.n4 062403xx 1.1 4.1.n 062403xx 1.1 4.2.3 062403xx (DES) 041403xx (AES) 2.7 4.2.7 051104xx 3.0 4.2.7 082504xx 3.0 092904xx 3.0 3.n.n 5 6.
March 2005 Through Software Release 6.1 ◦ ◦ Managing Your Canopy Network To implement both VLAN and per-SM MIR, you can − select the SM as the source for MIR/CIR/VLAN settings and set the MIR in each SM (BAM Release 2.0 cannot do this). − select the AP as the source for MIR/CIR/VLAN settings and set the MIR in the AP (for all SMs in the sector, except those in which MIR has been set). If you modify any range, downlink percentage, or slot parameter in an AP (or BHM) that operates on Release 6.
Managing Your Canopy Network 21.2.5 March 2005 Through Software Release 6.1 CMMmicro Software and Hardware Compatibility The CMMmicro contains both a programmable logic device (PLD) and software. These must be compatible. The PLD that is compatible with CMMmicro Release 2.0.8 is PLD 5. Further, the CMMmicro must be compatible with both the application software release and the hardware of attached APs and BHs. These attached modules must ◦ be operating on Release 4.0 or a later release.
March 2005 Through Software Release 6.1 ◦ 21.3.1 Managing Your Canopy Network − hardware compatibility. For example, where a CMMmicro is deployed. − the value of each configurable parameter. Whether all are compatible in the new destination. remembering to add the redeployed SM to the ESN data table in the BAM server(s). Wiring to Extend Network Sync The following procedure can be used to extend network sync by one additional hop, as described under Passing Sync in an Additional Hop on Page 70.
Managing Your Canopy Network March 2005 Through Software Release 6.1 22 SECURING YOUR NETWORK 22.1 ISOLATING APS FROM THE INTERNET Ensure that the IP addresses of the APs in your network ◦ are not routable over the Internet. ◦ do not share the subnet of the IP address of your user. RFC 1597, Address Allocation for Private Subnets, reserves for private IP networks three blocks of IP addresses that are not routable over the Internet: ◦ Class A has one reserved network, 10.0.0.0 to 10.255.255.255.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 22.2 ENCRYPTING CANOPY RADIO TRANSMISSIONS Canopy systems employ the following forms of encryption for security of the wireless link: ◦ BRAID–a security scheme that the cellular industry uses to authenticate wireless devices. ◦ DES–Data Encryption Standard, an over-the-air link option that uses secret 56bit keys and 8 parity bits.
Managing Your Canopy Network March 2005 Through Software Release 6.1 In either case, the authentication key entered in the Configuration page establishes the encryption key. For this reason, the authentication key must be the same on each end of the link. See Authentication Key on Page 212. Feature Availability Canopy AES products run the same software as DES products. Thus feature availability and functionality are and will continue to be the same, regardless of whether AES encryption is enabled.
March 2005 Through Software Release 6.
Managing Your Canopy Network March 2005 Through Software Release 6.1 RECOMMENDATION: Note the passwords that you enter. Ensure that you can readily associate these passwords both with the module and with the other data that you store about the module. Good business practice is to maintain organized records for all IP addresses and passwords. Overriding these in a tower-mounted module requires both a tower climb and downtime for a portion of your network.
March 2005 Through Software Release 6.1 Managing Your Canopy Network By default, a new user is given both read and write access. To restrict access to readonly, enter the following telnet command: config modify level user 1 To change the password for the specified user in the telnet user list, enter the following telnet command: config change pass user password password The first instance of password is the new password. The second instance of password is a required confirmation of the new password. 22.
Managing Your Canopy Network March 2005 Through Software Release 6.1 3. Short (solder together) Pins 4 and 6 on the other end. Do not connect any other wires to anything.
March 2005 Through Software Release 6.1 22.3.4 Managing Your Canopy Network Overriding Forgotten IP Addresses or Passwords on CMMmicro By using an override toggle switch on the CMMmicro circuit board, you can temporarily override a lost or unknown IP address or password as follows: ◦ Up is the override position in which a power cycle causes the CMMmicro to boot with the default IP address (169.254.1.1) and no password required.
Managing Your Canopy Network March 2005 Through Software Release 6.1 database. In the Authentication Key parameter of the SM Configuration web page, password access to the page governs whether the network operator or the subscriber can view and set this key. ◦ random number, generated by BAM and used in each attempt by an SM to register and authenticate. Neither the subscriber nor the network operator can view this number.
March 2005 Through Software Release 6.
Managing Your Canopy Network March 2005 Through Software Release 6.1 The ports that are filtered as a result of protocol selections in the Packet Filter Configuration block of the Advanced Network Configuration page in the SM are listed in Table 52.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 23 MANAGING BANDWIDTH AND AUTHENTICATION This section provides a high-level description of BAM in a Canopy network. For more specific information, see Canopy Bandwidth and Authentication Manager (BAM) User Guide. 23.
Managing Your Canopy Network March 2005 Through Software Release 6.1 When BAM is enabled in the AP Configuration page, bandwidth management is expanded to apply uniquely specified sustained data rate and burst allocation values to each registered SM. Thus, you can define differently priced tiers of subscriber service. Designing Tiered Subscriber Service Levels Examples of levels of service that vary by bandwidth capability are provided in Table 53.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 24 MANAGING THROUGH A NETWORK MANAGEMENT STATION (NMS) SNMPv2 (Simple Network Management Protocol Version 2) can be used to manage and monitor the Canopy modules under SMI (Structure of Management Information) specifications. SMI specifies management information definitions in ASN.1 (Abstract Syntax Notation One) language. SNMPv2 supports both 32-bit and 64-bit counters. The SMI for SNMPv2 is defined in RFC 1902 at http://www.faqs.
Managing Your Canopy Network March 2005 Through Software Release 6.1 To monitor a network element (Canopy module), SNMPv2 supports ◦ the get command, which instructs the agent to send information about the module to the manager in the NMS. ◦ traversal operations, which the manager uses to identify supported objects and to format information about those objects into relational tables.
March 2005 Through Software Release 6.1 ◦ ◦ Managing Your Canopy Network under internet (1) above: − mgmt (2) − private (4) − other branches under mgmt (2) above: mib-2 (1) and other branches. (See MIB-II below.) under private (4) above: enterprise (1) and other branches. (See Canopy Enterprise MIB below.) Beneath this level are non-standard branches that the enterprise may define. Thus, the path to an object that is managed under MIB-II begins with the decimal string 1.3.6.1.2.
Managing Your Canopy Network 24.2.4 March 2005 Through Software Release 6.1 Canopy Enterprise MIB For additional reporting and control, the Canopy Releases 3.2.5 and later provide the Canopy Enterprise MIB, which extends the objects for any NMS that uses SNMP interaction. This MIB comprises five text files that are formatted in standard ASN.1 (Abstract Syntax Notation One) language. To use this MIB, perform the following steps. Procedure 43: Installing the Canopy Enterprise MIB files 1.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 5. Download a selected MIB viewer into directory mibviewer. 6. As instructed by the user documentation that supports your NMS, import the eight MIB files that are listed above. 24.3 CONFIGURING MODULES FOR SNMP ACCESS Canopy modules provide the following Configuration web page parameters that govern SNMP access from the manager to the agent: ◦ Display-Only Access, which specifies the password that allows only viewing.
Managing Your Canopy Network March 2005 Through Software Release 6.
March 2005 Through Software Release 6.1 AP, SM, BH Object Name 24.4.
Managing Your Canopy Network AP, BHM Object Name March 2005 Through Software Release 6.
March 2005 Through Software Release 6.
Managing Your Canopy Network AP, BHM Object Name March 2005 Through Software Release 6.
March 2005 Through Software Release 6.1 AP, BHM Object Name 24.4.3 Managing Your Canopy Network Value Syntax Operation Allowed upLnkAckSlotHi Integer monitor whispGPSStats Integer monitor SM and BH Timing Slave Objects The objects that the Canopy Enterprise MIB defines for each SM and BH Timing Slave are listed in Table 57. The highlighted objects are commonly monitored by the manager.
Managing Your Canopy Network SM, BHS Object Name March 2005 Through Software Release 6.
March 2005 Through Software Release 6.
Managing Your Canopy Network 24.4.4 March 2005 Through Software Release 6.1 CMMmicro Objects The objects that the Canopy Enterprise MIB defines for each CMMmicro are listed in Table 58.
March 2005 Through Software Release 6.
Managing Your Canopy Network CMMmicro Object Name March 2005 Through Software Release 6.
March 2005 Through Software Release 6.1 Managing Your Canopy Network CMMmicro Object Name Value Syntax Operation Allowed txMulticastPkts Counter32 monitor txMultipleCollision Counter32 monitor txOctets Counter64 monitor txPausePkts Counter32 monitor txSingleCollision Counter32 monitor txUnicastPkts Counter32 monitor upTime DisplayString monitor 24.5 OBJECTS DEFINED IN THE CANOPY 45-Mbps BH MODULE MIB The objects that the Canopy 45-Mbps BH module MIB defines are listed in Table 60.
Managing Your Canopy Network AP, SM, BH Object Name March 2005 Through Software Release 6.1 Value Syntax Operation Allowed softwareVersion DisplayString monitor hardwareVersion DisplayString monitor NOTES: 1. 2. Of the other BH in the link. max, mean, min, last during the past hour. 24.6 INTERFACE DESIGNATIONS IN SNMP SNMP identifies the ports of the module as follows: ◦ Interface 1 represents the RF interface of the module.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 24.8 TRAPS PROVIDED IN THE CANOPY 45-Mbps BH MODULE MIB Canopy 45-Mbps BH modules provide the following SNMP traps for automatic notifications to the NMS: ◦ dfsChannelChangeTrap, which signals that the channel has changed. ◦ dfsImpulsiveInterferenceDetectedTrap, which signals that impulsive interference has been detected. 24.
Managing Your Canopy Network March 2005 Through Software Release 6.1 25 MANAGING THROUGH THE CANOPY NETWORK UPDATER TOOL (CNUT) The Canopy Network Updater Tool manages and automates the software and firmware upgrade process for Canopy radio and CMMmicro modules across the network. This eliminates the need for an administrator to visit each radio in the network (or each AP while using the Autoupdate feature) to upgrade the modules. 25.
March 2005 Through Software Release 6.1 Managing Your Canopy Network IMPORTANT! Correct layer information ensures that Network Updater does not command an AP that is behind another AP/SM pair (such as in a remote AP installation) to perform an upgrade at the same time as the SM that is feeding the AP. If this occurs, then the remote AP loses network connection during the upgrade (when the SM in front of the AP completes its upgrade and reboots). 25.
Managing Your Canopy Network March 2005 Through Software Release 6.1 25.6 CNUT DOWNLOAD CNUT can be downloaded together with each Canopy system release that supports CNUT. Software for these Canopy system releases is packaged on the Canopy Support web page as either ◦ a .zip file for use without the CNUT application. ◦ a .pkg file (for example, CANOPY4.2_P1.9_DES.pkg) that the CNUT application can open.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 26 INTERPRETING SYSTEM LOGS 26.1 INTERPRETING MESSAGES IN THE EVENT LOG PAGE Each line of the Event Log web page begins with a time and date stamp. However, some of these lines wrap as a combined result of window width, browser preferences, and line length. 26.1.1 Time and Date Stamp The time and date stamp reflect either ◦ GPS time and date directly or indirectly received from the CMM.
Managing Your Canopy Network March 2005 Through Software Release 6.1 System Event Log 01:25:32 UT : 12/23/03 : File httptask.c : Line 616 Reboot from Webpage. 01:25:14 UT : 12/23/03 : File C:/ISIPPC/pssppc.250/bsps/devices/whisp/syslog.
March 2005 Through Software Release 6.1 26.1.3 Managing Your Canopy Network Messages that Flag Abnormal Events The messages listed in Table 60 flag abnormal events and, case by case, may signal the need for corrective action or technical support. See Troubleshooting on Page 376. Table 60: Event Log messages for abnormal events Event Message Expected LUID = 6 LUID = 7 Meaning Actual Something is interfering with the control messaging of the module.
Managing Your Canopy Network Event Message March 2005 Through Software Release 6.1 Meaning Reboot from Webpage Module was rebooted from management interface. Software Boot Version Boot version in the module. Software Version Canopy release version and authentication method for the unit. System Log Cleared Event log was manually cleared. 26.
March 2005 Through Software Release 6.1 26.2.1 Managing Your Canopy Network AP Eval Data Parameters The AP Eval Data page provides the following parameters that can be useful to manage and troubleshoot a Canopy system: Index This field displays the index value that the Canopy system assigns (for only this page) to the AP where this SM is registered (or to the BHM to which this BHS is registered). Frequency This field displays the frequency that the AP or BHM transmits.
Managing Your Canopy Network March 2005 Through Software Release 6.1 26.3 INTERPRETING DATA IN THE SESSIONS PAGE (AP, BHM) An example of the Sessions page is displayed in Figure 120. Figure 120: Example Sessions page data The Session web page provides information about each SM that has registered to the AP (or about the BHS that has registered to the BHM). This information is useful for managing and troubleshooting a Canopy system. 26.3.
March 2005 Through Software Release 6.1 Managing Your Canopy Network State This field displays the current status of the SM or BHS as either ◦ IN SESSION to indicate that the SM or BHS is currently registered. ◦ IDLE to indicate that the SM or BHS was registered, but now is not.
Managing Your Canopy Network March 2005 Through Software Release 6.1 Jitter (Avg/Last) This field displays the average and the latest jitter value for the SM or BHS. Power Level (Avg/Last) This field displays the average and the latest power level set for the SM or BHS. 26.4 INTERPRETING DATA IN THE GPS STATUS PAGE (AP, BHM) An example of the GPS Status screen is displayed in Figure 121.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 26.5 INTERPRETING DATA IN THE ETHERNET STATS PAGE (ALL) The Ethernet Stats web page reports TCP throughput and error information for the Ethernet connection of the module. 26.5.1 Ethernet Stats Parameters The Ethernet Stats page provides the following parameters. inoctets count This field displays how many octets were received on the interface, including those that deliver framing information.
Managing Your Canopy Network March 2005 Through Software Release 6.1 outerrrors count This field displays how many outbound packets contained errors that prevented their transmission. RxBabErr This field displays how many receiver babble errors occurred. EthBusErr This field displays how many Ethernet bus errors occurred on the Ethernet controller. CRCError This field displays how many CRC errors occurred on the Ethernet controller.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 26.
Managing Your Canopy Network March 2005 Through Software Release 6.
March 2005 Through Software Release 6.
Managing Your Canopy Network March 2005 Through Software Release 6.1 When you have clicked the Expanded Stats button, you cannot toggle the interface back (to hide these additional web pages and Status data) by clicking the button again. You can click only the Back button of your browser to do so. 26.6.1 Alignment Page (SM, BHS) An example of the Alignment screen is displayed in Figure 112 on Page 280.
March 2005 Through Software Release 6.1 Managing Your Canopy Network RSSI Only Aiming Mode In the RSSI Only Aiming Mode, the screen displays the signal strength based on the amount of energy in the selected frequency, regardless of whether the module has registered. This mode simplifies the aiming process for long links, such as where the module is mounted to a Canopy Passive Reflector. To invoke the RSSI Only Aiming Mode 1. select the frequency of the AP in the Configuration Page of the SM.
Managing Your Canopy Network 26.6.3 March 2005 Through Software Release 6.1 Bridge Table Page (All) An example of the Bridge Table screen is displayed in Figure 125. Figure 125: Bridge Table screen If NAT (network address translation) is not active on the SM, then the Bridge Table web page provides the MAC address of all devices that are attached to registered SMs (identified by LUIDs). The bridging table allows the AP to send data to the correct SM. 26.6.
March 2005 Through Software Release 6.1 Managing Your Canopy Network later by clicking on Expanded Stats in the navigation column, then clicking on Frame Calculator (at the bottom of the expanded navigation column). The calculator does not use data on the module or populate new data. It is merely a convenience application running on the module. For this reason, you can use any module running Release 6.1 or later to do the calculations for any AP.
Managing Your Canopy Network March 2005 Through Software Release 6.
March 2005 Through Software Release 6.
Managing Your Canopy Network 26.6.5 March 2005 Through Software Release 6.1 Link Test Page (All) An example of the Link Capacity Test screen is displayed in Figure 128. Figure 128: Link Test screen The Link Capacity Test page allows you to measure the throughput and efficiency of the RF link between two Canopy modules. To test a link using this page, perform the following steps: 1. Enter into the Duration field how long (in seconds) the RF link should be tested. 2. Click the Start Test button. 3.
March 2005 Through Software Release 6.1 Managing Your Canopy Network Capacity Criteria for the Link A Canopy system link is acceptable only if the efficiencies of the link test are greater than 90% in both the uplink and downlink direction. Whenever you install a new link, execute a link test to ensure that the efficiencies are within recommended guidelines. 26.6.6 Reg Failed SMs Page (AP, BHM) An example of the Reg Failed SMs screen is displayed in Figure 129.
Managing Your Canopy Network March 2005 Through Software Release 6.1 27 MAINTAINING YOUR CANOPY SOFTWARE Canopy provides release compatibility information and caveats about each release. 27.1 HISTORY OF SYSTEM SOFTWARE UPGRADES Canopy currently supports System Releases 3.2, 4.0, 4.1, and 4.2. 27.1.1 System Release 3.1.5 Features Canopy System Release 3.1.5 introduced the following features: 27.1.2 ◦ 5.
March 2005 Through Software Release 6.1 27.1.4 ◦ Transmit Frame Spreading ◦ GPS Antenna Connection Status ◦ Improved Jitter Control ◦ Updated Canopy Enterprise MIB ◦ 20-Mbps BH to 10-Mbps BH Modulation ◦ Power Level Measurement Managing Your Canopy Network ◦ Display Registered AP ◦ Registration Failed SM List ◦ No Remote Access ◦ Improved Received Signal Strength Indicator (RSSI) ◦ SM Scan Privacy ◦ Extended Network with Sync System Release 4.0.1 Fixes Canopy System Release 4.0.
Managing Your Canopy Network 27.1.8 March 2005 Through Software Release 6.1 System Release 4.2.1 Features Canopy System Release 4.2.1 introduced the following features: ◦ Software Limit Increase on 2.
March 2005 Through Software Release 6.1 Managing Your Canopy Network Canopy System Release 4.2.3 also introduced the following fixes: ◦ DHCP Client Sends Lease Renewals as Unicast Fix ◦ DMZ Host as FTP Client Fix 27.1.11 System Release 4.2.7 Features and Fix Canopy System Release 4.2.7 introduced the following features: ◦ 2.4-GHz Module P9 Support ◦ 5.2-GHz Module P9 Support ◦ 5.4-GHz Module P9 Support ◦ 5.4-GHz Module Dynamic Frequency Selection (DFS) for Radar ◦ 5.
Managing Your Canopy Network March 2005 Through Software Release 6.1 Canopy System Release 6.1 also introduced the following fix: ◦ Alignment Tone Fix 27.2 HISTORY OF CMMmicro SOFTWARE UPGRADES Canopy currently supports CMMmicro Releases 1.0, 2.1, and 2.1.1. Release 2.1 introduced the NTP Server in CMMmicro feature. Release 2.1.1 introduced the following features: ◦ Telnet Support in CMMmicro for All Clients ◦ Telnet through Radio to CMMmicro 27.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 28 BRANDING WEB PAGES Distinctive fonts indicate literal user input. variable user input. literal system responses. variable system responses. 28.1 REBRANDING WEB PAGES TO YOUR BRAND The web-based interface screens on each Canopy module contain the Canopy logo. A file named canopy.jpg generates the Canopy logo. You can replace the Canopy logo with your company logo as follows. Procedure 44: Replacing the Canopy logo 1.
Managing Your Canopy Network March 2005 Through Software Release 6.1 NOTE: Supported telnet commands execute the following results: ◦ addwebfile adds a custom logo file to the file system. ◦ clearwebfile clears the customer logo file from the file system. ◦ lsweb lists the custom logo file and display the storage space available on the file system. >telnet ModuleIPAddress /---------\ C A N O P Y Motorola Broadband Wireless Technology Center (Copyright 2001, 2002 Motorola Inc.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 28.2 CONFIGURING A HYPERLINKED LOGO In Canopy System Release 4.2 and later releases, you can import a logo into the top of any Canopy interface web page from any URL by establishing a hyperlink. This requires simple html page editing and saving the resulting page into the module as follows. Procedure 45: Changing the hyperlinked URL for the top of Canopy web pages 1. Browse to http://ModuleIPAddress/top.html. 2.
Managing Your Canopy Network March 2005 Through Software Release 6.1 >telnet ModuleIPAddress /---------\ C A N O P Y Motorola Broadband Wireless Technology Center (Copyright 2001, 2002 Motorola Inc.) Login: root Password: Telnet+> clearwebfile Telnet+> addwebfile yourlogo.jpg Telnet+> addwebfile top.html Telnet+> lsweb Flash Web files /yourlogo.jpg 7867 /top.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 29 TOGGLING REMOTE ACCESS CAPABILITY In Release 4.0 and later releases, based on your priorities for additional security and ease of network administration, you can deny or permit remote access individually to any AP, SM, or BH. 29.1 DENYING ALL REMOTE ACCESS Wherever the No Remote Access feature is enabled (by the following procedure), physical access to the module is required for ◦ any change in the configuration of the module.
Managing Your Canopy Network March 2005 Through Software Release 6.1 7. Remove the override plug. RESULT: Access to this module is possible through HTTP, SNMP, FTP, telnet, or over an RF link.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 30 SETTING UP A PROTOCOL ANALYZER ON YOUR CANOPY NETWORK Selection of protocol analyzer software and location for a protocol analyzer depend on both the network topology and the type of traffic to capture. However, the examples in this section are based on free-of-charge Ethereal software, which is available at http://ethereal.
Managing Your Canopy Network March 2005 Through Software Release 6.1 30.2 ANALYZING TRAFFIC AT AN AP OR BH WITH NO CMM The IP address of the protocol analyzer laptop computer must match the IP addressing scheme of the AP/BH. If the router is configured to be a DHCP server, then configure the laptop computer to automatically obtain an address. If DHCP is not enabled, then ensure that the laptop computer is configured with a static IP address in the same subnet as the AP/BH.
March 2005 Through Software Release 6.1 Managing Your Canopy Network CMM 8 7 6 5 4 3 2 1 AP/BH 111 J1 to Radio J2 Ethernet to Switch Sniffer Laptop 8 7 6 5 4 3 2 1 Ethernet Switch HUB Router Figure 136: Protocol analysis at AP or BH connected to a CMM 30.4 EXAMPLE OF A PROTOCOL ANALYZER SETUP FOR AN SM The following is an example of a protocol analyzer setup using Ethereal software to capture traffic at the SM level.
Managing Your Canopy Network March 2005 Through Software Release 6.1 Figure 137: IP Configuration screen for SM Verify that the current method of IP addressing is configured on the protocol analyzer laptop computer (network card). First, note the IP Configuration of the SM.
March 2005 Through Software Release 6.1 Managing Your Canopy Network Then browse to StartÆMy Network PlacesÆNetwork and Dialup Connections. For Local Area Connection, select Properties, as shown in Figure 138.
Managing Your Canopy Network March 2005 Through Software Release 6.1 Select Internet Protocol (TCP/IP) as shown in Figure 139. Then click Properties.
March 2005 Through Software Release 6.1 Managing Your Canopy Network Unless you have a static IP address configured on the SM, select Obtain an IP address automatically for the protocol analyzer laptop computer, as shown in Figure 140. If you have configured a static IP address on the SM, select Use the following IP address and enter an IP address that is in the same subnet as the SM. Click OK.
Managing Your Canopy Network March 2005 Through Software Release 6.1 The Status page of the SM opens, as shown in Figure 141. If this page does not open, reconfigure how the laptop computer obtains an IP address. Figure 141: Status screen for SM After you have successfully verified that you have connectivity from the laptop computer to the SM with the hub inserted, launch the protocol analyzer software on the laptop computer.
March 2005 Through Software Release 6.1 Managing Your Canopy Network Ethereal software opens as shown in Figure 142.
Managing Your Canopy Network March 2005 Through Software Release 6.1 In the Capture menu (shown in Figure 143), select Start.
March 2005 Through Software Release 6.1 Managing Your Canopy Network The Ethereal Capture Options window opens, as shown in Figure 144. Ensure that the interface reflects the network interface card (NIC) that is used on the protocol analyzer laptop computer. Although you can select filters based on specific types of traffic, all values are defaults in this example. Select filters if desired, then click OK.
Managing Your Canopy Network March 2005 Through Software Release 6.1 The Ethereal Capture window opens, as shown in Figure 145. This window graphically displays the types of packets (by percentage) that are being captured. If all packet types are displayed with 0%, either ◦ launch your Web browser on the subscriber PC for the IP address of the SM ◦ ping the SM from the home PC.
March 2005 Through Software Release 6.1 Managing Your Canopy Network When you stop the packet capture, the - Ethereal window opens, as shown in Figure 146. This window has three panes: ◦ The top pane provides a sequenced summary of the packets captured and includes SRC/DEST address and type of protocol. What you select in this pane determines the additional information that is displayed in the lower two panes.
Managing Your Canopy Network March 2005 Through Software Release 6.1 In the next example, Packet 14 (protocol type HTTP) is selected in the top pane, as shown in Figure 147. The two lower panes provide further details about Packet 14.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 31 TROUBLESHOOTING 31.1 GENERAL PLANNING FOR TROUBLESHOOTING Effective troubleshooting depends in part on measures that you take before you experience trouble in your network. Canopy recommends the following measures for each site: 1. Identify troubleshooting tools that are available at your site (such as a protocol analyzer). 2. Identify commands and other sources that can capture baseline data for the site.
Managing Your Canopy Network − BHM to CMM − power March 2005 Through Software Release 6.1 ◦ researching Event Logs of the involved equipment. (See Interpreting Messages in the Event Log Page on Page 330.) ◦ answering the questions listed in the following section. ◦ reversing the last previous corrective attempt before proceeding to the next. ◦ performing only one corrective attempt at a time. 31.
March 2005 Through Software Release 6.1 Managing Your Canopy Network ◦ Module Has Lost or Does Not Gain Sync on Page 381 ◦ Module Does Not Establish Ethernet Connectivity on Page 382 ◦ Module Does Not Power Up on Page 382 ◦ Power Supply Does Not Produce Power on Page 383 ◦ CMM2 Does Not Power Up on Page 384 ◦ CMM2 Does Not Pass Proper GPS Sync to Connected Modules on Page 384 31.5 PROCEDURES FOR TROUBLESHOOTING 31.5.
Managing Your Canopy Network March 2005 Through Software Release 6.1 g. verify that the link test results show efficiency greater than 90% in both the uplink and downlink. h. execute ping. i. verify that no packet loss was experienced. j. verify that response times are not significantly greater than k. ◦ 2.5 ms from BH to BH ◦ 4 ms from AP to SM ◦ 15 ms from SM to AP replace any cables that you suspect may be causing the problem. 6.
March 2005 Through Software Release 6.1 c. Managing Your Canopy Network if the PC does not have an assigned IP address, then ◦ enter ipconfig /release “Adapter Name”. ◦ enter ipconfig /renew “Adapter Name”. ◦ reboot the PC. ◦ retreat to Step 5a. d. if the PC has an assigned IP address, then ◦ access the DHCP pages of the SM. ◦ verify that DHCP is operating as configured. 6. After connectivity has been re-established, reinstall network elements and variables that you removed in Step 1.
Managing Your Canopy Network 31.5.4 March 2005 Through Software Release 6.1 BHS Does Not Register to a BHM To troubleshoot an BHS failing to register to a BHM, perform the following steps. Procedure 51: Troubleshooting BHS failing to register to a BHM 1. Access the Configuration page of the BHS. 2. Note the Color Code of the BHS. 3. Access the Configuration page of the BHM. 4. Verify that the Color Code of the BHM matches that of the BHS. 5. Note the RF Frequency Carrier of the BHM. 6.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 7. If these indicators are present in the second AP a. verify that the GPS antenna still has an unobstructed view of the entire horizon. b. visually inspect the cable and connections between the GPS antenna and the CMM. c. if this cable is not shielded, replace the cable with shielded cable. 8. If these indicators are not present in the second AP a. visually inspect the cable and connections between the CMM and the AP antenna. b.
Managing Your Canopy Network March 2005 Through Software Release 6.1 4. Remove the cover of the module to expose the components on the printed wiring board. 5. Find the Ethernet transformer, which is labeled with either the name Halo or the name Pulse. 6. Verify that the Ethernet transformer does not show damage that would have been caused by improper cabling. (You can recognize damage as the top of the transformer being no longer smooth.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 5. Attempt to power up the known good module. 6. If the known good module fails to power up, request an RMA for the power supply. end of procedure 31.5.9 CMM2 Does Not Power Up To troubleshoot a malfunctioning CMM2, perform the following steps. Procedure 56: Troubleshooting CMM2 that malfunctions 1. Verify that the 115-/230-V switch (in the lower right-hand corner of the CMM2) is in the correct position for the power source.
Managing Your Canopy Network March 2005 Through Software Release 6.1 5. If these efforts fail to resolve the problem, then request an RMA for the CMM2. end of procedure 31.5.11 Module Software Cannot be Upgraded If your attempt to upgrade the software of a module fails, perform the following steps. Procedure 58: Troubleshooting an unsuccessful software upgrade 1. Download the latest issue of the target release and the associated release notes. 2.
March 2005 Through Software Release 6.1 Managing Your Canopy Network 32 OBTAINING TECHNICAL SUPPORT NOTE: The contact information for Canopy Technical Support staff is included at the end of this section (on Page 390). However, in most cases, you should follow the procedure of this section before you contact them. To get information or assistance as soon as possible for problems that you encounter, use the following sequence of actions: 1.
Managing Your Canopy Network March 2005 Through Software Release 6.
March 2005 Through Software Release 6.
Managing Your Canopy Network ◦ Frequency: ◦ Color code: ◦ IP address: ◦ Downlink/uplink ratio: ◦ Max range: ◦ Bridge entry timeout: ◦ Number of subscribers: ◦ Method of synchronization: March 2005 Through Software Release 6.1 14. If you selected Figure 35 a. Indicate how many APs are in each cluster. b. Indicate how many AP clusters are deployed (and what types). c. Indicate how many BH links are configured. d. Include the IP addresses. e. Indicate the frequency for each sector. f.
March 2005 Through Software Release 6.1 ◦ Managing Your Canopy Network Method of synchronization: 16. Add any details that are not present in the generic diagram that you selected. 17. Save your diagram as file Net_Diagram. 18. Capture screens from the following web pages of affected modules: ◦ Status as file SM/AP/BHM/BHS_Status.gif ◦ Configuration as file SM/AP/BHM/BHS_Config.gif ◦ IP Configuration as file SM/AP/BHM/BHS_IPconfig.gif ◦ Sessions as file SM/AP/BHM/BHS_Sessions.
Managing Your Canopy Network March 2005 Through Software Release 6.1 33 GETTING WARRANTY ASSISTANCE For warranty assistance, contact your reseller or distributor for the process.
March 2005 Through Software Release 6.
Canopy System Reference Information March 2005 Through Software Release 6.1 34 ADMINISTERING MODULES THROUGH TELNET INTERFACE In the telnet administrative interface to a module that operates on Canopy System Release 4.2 or later release, the Canopy platform supports the commands defined in Table 63. Many of these are not needed with CNUT. Table 63: Supported telnet commands for module administration Command System help Definition Notes addwebfile Add a custom web file Syntax: addwebfile filename.
March 2005 Through Software Release 6.1 Command System help Definition Canopy System Reference Information Notes ls List the contents of a directory Syntax: ls. Lists the file names of all files in the directory. Syntax: ls –l. Displays additional information, such as the sizes and dates of the files. lsweb List Flash Web files Syntax: lsweb. Lists the file names of the saved custom web files. ping Send ICMP ECHO_REQUEST packets to network hosts Syntax: ping IPaddress.
Canopy System Reference Information March 2005 Through Software Release 6.1 35 MANAGING THROUGH A BAM COMMAND-LINE INTERFACE The following sections list and describe SSE commands to interface with the MySQL or PostgreSQL database. For further information about ◦ BAM, see Canopy Bandwidth and Authentication Manager (BAM) User Guide at http://www.motorola.com/canopy. ◦ PostgreSQL databases, see the index of PostgreSQL documentation at http://www.postgresql.org/docs.
March 2005 Through Software Release 6.1 Canopy System Reference Information cmd show vlanmembers vlanid vlanid List all of the ESNs that are associated with vlanid. RULES: vlanid VLAN ID in the range 1 to 4095 cmd show config Display all configuration values that the database uses. This command calls the show variables SQL command. NOTE: This command is deprecated in BAM Release 2.0 and later releases. cmd show all Display all configuration values and statistics that are in the database.
Canopy System Reference Information March 2005 Through Software Release 6.1 config modify esn esn [skey|suldr|sdldr|ulba|dlba][allowhg] value Reset the specified ESN to the specified data rate or burst allocation. NOTE: This command is for execution in only Releases 2.0 and later. Rules are as defined above.
March 2005 Through Software Release 6.1 Canopy System Reference Information config modify esn esn cir [lpruldr|lprdldr|hpruldr|hprdldr|enablehpr] value Set or reset the specified CIR parameter for the ESN to the specified value. RULES: lpruldr Low Priority Uplink CIR in the range 0 to 20000 kbps. lprdldr Low Priority Downlink CIR in the range 0 to 20000 kbps. hpruldr High Priority Uplink CIR in the range 0 to 20000 kbps. hprdldr High Priority Downlink CIR in the range 0 to 20000 kbps.
Canopy System Reference Information March 2005 Through Software Release 6.1 35.3 SSE TELNET COMMANDS This section provides the telnet commands for use with the SSE interface, and defines the allowed usage for each command. At any time, the operator can enter help at the sse prompt to view these lists. Distinctive fonts indicate literal user input. variable user input. telnet localhost sse Initiate a telnet session in the SSE interface. The default user name is root. The default password is root.
March 2005 Through Software Release 6.1 Canopy System Reference Information 36 LEGAL AND REGULATORY NOTICES 36.1 IMPORTANT NOTE ON MODIFICATIONS Intentional or unintentional changes or modifications to the equipment must not be made unless under the express consent of the party responsible for compliance. Any such modifications could void the user’s authority to operate the equipment and will void the manufacturer’s warranty. 36.2 NATIONAL AND REGIONAL REGULATORY NOTICES 36.2.1 U.S.
Canopy System Reference Information March 2005 Through Software Release 6.
March 2005 Through Software Release 6.1 − ◦ Canopy System Reference Information Indoor operation at 100mW (20dBm) is permitted across the band 2400 to 2483.
Canopy System Reference Information 36.2.5 March 2005 Through Software Release 6.1 Belgium Notification Belgium national restrictions in the 2.4 GHz band include 36.2.6 ◦ EIRP must be lower then 100 mW ◦ For crossing the public domain over a distance >300m the user must have the authorization of the BIPT. ◦ No duplex working Luxembourg Notification For the 2.4 GHz band, point-to-point or point-to-multipoint operation is only allowed on campus areas. 5.
March 2005 Through Software Release 6.1 Canopy System Reference Information Now, therefore, in consideration of the promises and mutual obligations contained herein, and for other good and valuable consideration, the receipt and sufficiency of which are hereby mutually acknowledged, you and Motorola agree as follows: Grant of License. Subject to the following terms and conditions, Motorola, Inc.
Canopy System Reference Information March 2005 Through Software Release 6.1 of the basis of the claim and even if Motorola or a Motorola representative has been advised of the possibility of such damage. Motorola's liability to you for direct damages for any cause whatsoever, regardless of the basis of the form of the action, will be limited to the price paid for the Software that caused the damages.
March 2005 Through Software Release 6.1 Canopy System Reference Information against the other party in the event of any breach hereunder shall not be deemed a waiver by that party as to subsequent enforcement of rights or subsequent action in the event of future breaches. 36.4.2 Hardware Warranty in U.S. Motorola U.S. offers a warranty covering a period of one year from the date of purchase by the customer.
Canopy System Reference Information March 2005 Through Software Release 6.1 37 ADDITIONAL RESOURCES Canopy provides two additional resources where you can raise questions and find answers: ◦ Canopy User Community at http://www.canopywireless.com/community. This resource facilitates communication with other users and with authorized Canopy experts. Available forums include General Discussion, Network Monitoring Tools, and Suggestions. ◦ Canopy Knowledge Base at http://www.canopywireless.com/kbase.
March 2005 Through Software Release 6.
Glossary March 2005 Through Software Release 6.
March 2005 Through Software Release 6.1 Glossary ~. The command that terminates an SSH Secure Shell session to another server. Used on the Bandwidth and Authentication Manager (BAM) master server in the database replication setup. 10 BaseT Technology in Ethernet communications that can deliver 10 Mb of data across 328 feet (100 meters) of CAT5 cable. 100 BaseT Technology in Ethernet communications that can deliver 100 Mb of data across 328 feet (100 meters) of CAT5 cable. 169.254.0.
Glossary March 2005 Through Software Release 6.1 AES Advanced Encryption Standard. An over-the-air link option that provides extremely secure wireless connections. AES uses 128-bit secret keys as directed by the government of the U.S.A. AES is not exportable and requires a special AP to process the large keys. AP Access Point Module. One module that distributes network or Internet services in a 60° sector to 200 subscribers or fewer. APA Access Point module address.
March 2005 Through Software Release 6.1 Glossary Backhaul Timing Slave Backhaul Module that receives network timing (synchronization) from another Backhaul Module, which serves as the Backhaul timing master. BAM Bandwidth and Authentication Manager. Software that operates on a Linux server to manage data rate and burst data capabilities individually for each registered Subscriber Module. This software also provides secure Subscriber Module authentication and user-specified encryption keys.
Glossary March 2005 Through Software Release 6.1 Canopy A trademark of Motorola, Inc. canopy.xml File that stores specifications for the Bandwidth and Authentication Manager (BAM) GUI. Carrier-to-interference Ratio Ratio of intended reception to unintended reception. CarSenseLost Field This field displays how many carrier sense lost errors occurred on the Ethernet controller. CAT5 Cable Cable that delivers Ethernet communications from module to module.
March 2005 Through Software Release 6.1 Glossary Date of Last Transaction A field in the data that the cmd show esn command generates from data in the SQL database in the Bandwidth and Authentication Manager (BAM) server. This field identifies the date of the most recent authentication attempt by the SM. Expressed in the database output as DLT. Dell A trademark of Dell, Inc. Demilitarized Zone Internet Protocol area outside of a firewall. Defined in RFC 2647. See http://www.faqs.org/rfcs/rfc2647.
Glossary March 2005 Through Software Release 6.1 Electronic Serial Number Hardware address that the factory assigns to the module for identification in the Data Link layer interface of the Open Systems Interconnection system. This address serves as an electronic serial number. Same as MAC Address. Enable To turn on a feature in the module after the feature activation file has activated the module to use the feature. See also Activate.
March 2005 Through Software Release 6.1 Glossary Frame Spreading Transmission of a beacon in only frames where the receiver expects a beacon (rather than in every frame). This avoids interference from transmissions that are not intended for the receiver. Frame Timing Pulse Gated Field Toggle parameter that prevents or allows the module to continue to propagate GPS sync timing when the module no longer receives the timing.
Glossary March 2005 Through Software Release 6.1 HTTP Hypertext Transfer Protocol, used to make the Internet resources available on the World Wide Web. Defined in RFC 2068. See http://www.faqs.org/rfcs/rfc2068.html. ICMP Internet Control Message Protocols defined in RFC 792, used to identify Internet Protocol (IP)-level problems and to allow IP links to be tested. See http://www.faqs.org/rfcs/rfc792.html.
March 2005 Through Software Release 6.1 Glossary Late Collision Field This field displays how many late collisions occurred on the Ethernet controller. A normal collision occurs during the first 512 bits of the frame transmission. A collision that occurs after the first 512 bits is considered a late collision. A late collision is a serious network problem because the frame being transmitted is discarded.
Glossary March 2005 Through Software Release 6.1 MIB Management Information Base. Space that allows a program (agent) in the network to relay information to a network monitor about the status of defined variables (objects). MySQL A registered trademark of MySQL AB Company in the United States, the European Union, and other countries. mysqladmin A command to set the administrator and associated password on the Bandwidth and Authentication Manager (BAM) server.
March 2005 Through Software Release 6.1 Glossary outnucastpkts count Field How many packets for which the higher-level protocols requested transmission to a non-unicast (subnetwork-broadcast or subnetworkmulticast) address. The number includes those that were discarded or not sent. outoctets count Field How many octets were transmitted out of the interface, including those that deliver framing information.
Glossary March 2005 Through Software Release 6.1 QoS Quality of Service. A frame field that Bandwidth and Authentication Manager (BAM) provides to the AP and SM the sustained data rates and burst data limits of the SM. The format of this field is 64 hexadecimal characters of 0 to 9 and a to f. The BAM SQL database expresses this field as five contiguous subfields.
March 2005 Through Software Release 6.1 Glossary RES Result. A field in the data that the cmd show esn command generates from the SQL database in the Bandwidth and Authentication Manager (BAM) server. RetransLimitExp Field This field displays how many times the retransmit limit has expired. RF Radio frequency. How many times each second a cycle in the antenna occurs, from positive to negative and back to positive amplitude.
Glossary March 2005 Through Software Release 6.1 SFTP Secure File Transfer Protocol. Simple Network Management Protocol Standard that is used for communications between a program (agent) in the network and a network management station (monitor). Defined in RFC 1157. See http://www.faqs.org/rfcs/rfc1157.html. skey Software key that correlates to the random number that the Bandwidth and Authentication Manager (BAM) server generates and sends in a challenge through the AP to the SM.
March 2005 Through Software Release 6.1 Glossary su - A command that opens a Linux® operating system session for the user root. Subnet Mask 32-bit binary number that filters an IP address to reveal what part identifies the network and what part identifies the host. The number of subnet mask bits that are set to 1 indicates how many leading bits of the IP address identify the network. The number of subnet mask bits that are set 0 indicate how many trailing bits of the IP address identify the host.
Glossary March 2005 Through Software Release 6.1 telnet Utility that allows a client computer to update a server. A firewall can prevent the use of the telnet utility to breach the security of the server. See http://www.faqs.org/rfcs/rfc818.html, http://www.faqs.org/rfcs/rfc854.html and http://www.faqs.org/rfcs/rfc855.html. Textual Conventions MIB Management Information Base file that defines Canopy systemspecific textual conventions. See also Management Information Base.