User's Manual
Table Of Contents
- Introduction
- Installation and Initialization
- Hardware Description
- System Requirements
- Product Package
- Hardware Installation
- Step 1: Choose a Location
- Step 2: Unpack Shipping Box
- Step 3: Assemble the Cable
- Step 4: Determine Proper Mounting Orientation
- Step 5: Assemble Mounting Hardware
- Step 6: Mount the Unit
- Step 7: Plug in the Cables
- Step 8: Power on the Unit
- Step 9: View LEDs
- Step 10: Align the Antenna
- Step 11: Tighten the Cables
- Step 12: Weatherproof the Connectors
- Step 13: Install Documentation and Software
- Using the Web Interface
- Installing Latest Software
- First Configuration
- Base Station Configuration
- Introduction
- System Configuration
- MAC Configuration
- Radio Configuration
- Radio Downlink Burst Profile Configuration
- Radio Uplink Burst Profile Configuration
- Networking Configuration
- Global Positioning System (GPS)
- Subscriber Station Authentication
- Subscriber Station List
- Service Class Creation
- Logging Configuration
- Management Interface Configuration
- Subscriber Station Configuration
- Commands on BS/SS
- Log Messages on the BS/SS
- Monitoring the BS and SS
- Technical Specifications
- Command Line Interface
- CLI Overview
- Configuration from the Base Station
- Configuration from the Subscriber Station
- Monitoring the BS and SS
- Technical Services and Support
- Statement of Warranty
Introduction Tsunami MP.16 3650 System User Guide
MP.16 System Overview
13
MP.16 System Overview
In the MP.16 system, a Base Station (BS) communicates and exchanges traffic with one or more Subscriber Stations
(SS). System implementation is streamlined, requiring initial setup on the Base Station of Base-Station-specific,
system-wide, and select Subscriber Station parameters, but requiring only minimal configuration on individual Subscriber
Stations themselves. This centralized configuration procedure allows for more efficient deployment of MP.16 systems.
The processes involved in the MP.16 system setup and functionality are described in the following sections:
• System Setup
• Subscriber Station Initialization, Authentication, and Registration
• Wireless Communication and Service Classes
• System Monitoring
System Setup
The administrator configures local BS and system-level options by using one of the BS’s management interfaces (HTTP,
CLI, or SNMP). Configuration from the BS includes the following:
• System: Configure local BS information, such as the system name, location, up time, and the contact person’s email
and phone number.
• MAC: Configure basic and advanced MAC parameters, including frame duration; downlink percentage; frame
synchronization mode; DCD, UCD, and initial ranging intervals; and TEK lifetime.
• Radio: Select the BS’s operating channel and configure downlink/uplink burst profiles.
• Networking: Configure the BS’s Ethernet address/mask, transmission speed, static routes, and VLANs, and external
(RADIUS) servers.
• Subscriber Station Authentication: Set the Net Entry mode (authorization level for SSs entering the network), and
choose a default Subscriber Station Class that will be assigned to all SSs entering the network without a pre-assigned
class.
• Subscriber Station List: Add Subscriber Stations to the Base Station’s list of registered SSs, or view the list of
registered SSs. Assign SS Classes to individual Subscriber Stations; override SS Class parameters on a per-SS
basis.
• Service Class Creation: Create new Packet Identification Rules (PIRs), Service Flows (SFs), and Subscriber Station
Classes (SS Classes), or view and modify existing PIRs, SFs, and SS classes.
• Log: Set the parameters for the logging functions of the BS.
BS configuration parameters are discussed in their entirety in Base Station Configuration.
Subscriber Station Initialization, Authentication, and Registration
When a Subscriber Station is initialized, it uses the configured frequency channels to search for a Base Station. If it finds
one, it synchronizes with the BS to determine initial timing, frequency, and power settings.
Once these settings are established, the SS attempts to register with the network. To do so, the SS sends the BS an
Authentication Information message followed by an Authentication Request message. The BS verifies that the SS is
authorized to join the network and sends an authorization response containing an Authorization Key (AK) encrypted with
the SS’s public key. This AK is used to secure the transmission of traffic encryption keys (TEKs), which secure further
transmissions between the SS and BS. Periodically, the SS is required to reauthenticate and refresh its key information.
The SS then sends the BS information about the SS’s capabilities and operational parameters. The BS begins initiating
Service Flows (see Wireless Communication and Service Classes). Once a Service Flow is active, a connection is
established. The BS sets up uplink and downlink connections to carry traffic between the SS and BS.
Much of the SS’s configuration is set by the BS; that is, the administrator configures SS parameters on the BS, and the
BS provisions this configuration information to the SS when it registers with the BS. However, an administrator can