SlideShare a Scribd company logo
1 of 31
Download to read offline
05 May 2014 
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
FRONT 
Y-PACKET 
SWR 1.3.2 
PRODUCT DESCRIPTION 
S. Tucci
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
2 
YOUNCTA 
2014 
INTRODUCTION [1] 
This document is a technical overview of the high capacity full-outdoor 
packet radio Y-Packet. 
Y-Packet is available in three variants: 
• Y-Packet C (copper), where the ODU is directly connected to a PoE 
injector 
• Y-Packet F (fiber), with external VDC power connector and SFP port in 
addition to electrical PoE port; Y-Packet F can be powered either by VDC 
or PoE 
• Y-Packet [M] (MIRFA), dedicated to military market; can be C or F variant, 
and is developed in the 8 and 15 GHz radio bands, with dedicated Tx/Rx 
spacings as required by MIRFA regulations
The document describes the main features of current SW release, SWR 1.3.2. 
Features are grouped as follows: 
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
3 
YOUNCTA 
2014 
INTRODUCTION [2] 
- System Types 
- Radio Frequency Bands  Capacity 
- Modem 
- Ports 
- Ethernet  QoS 
- Management 
- Security 
- Timing  Synchronization 
- Environment
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
4 
YOUNCTA 
2014 
SYSTEM TYPES – 1+0 UNPROTECTED 
Four system types are available for Y-Packet: 
1+0 à Unprotected, with single ODU on each side of the link. Max capacity is 420 
Mbps L2 @ 56 MHz  1024 QAM 
throughput up to 420 
Mbps L2 @ 56 MHz  
1024 QAM 
Y-Packet C, with PoE 
interface used for both 
power and data traffic 
1+0 link 
configuration 
data traffic
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
5 
YOUNCTA 
2014 
SYSTEM TYPES – 1+1 HOT STAND-BY 
1+1 Hot Stand-By à Protected, two ODUs connected via ODU-to-ODU inter-com cable on each side of the link. The operation of 
Protection Group is coordinated between the ODU Main and Protection via the ODU-to-ODU inter-com cable. With this 
configuration, two Network Interfaces are supported in each terminal for data traffic, but only one is active at a time: the one of 
the Active ODU (can be either Main or Protection), which is enabled to transmit over the Radio interface. 
Protection Mode can be set to Revertive or Not Revertive, and Manual Operator commands (Forced, Lockout, Clear) are available 
for troubleshooting or operation purposes 
in case of failure, the system 
switches on the Protection 
ODU 
data traffic 
data traffic 
in normal conditions, data 
traffic is sent over the Main 
channel 
management traffic 
for Y-Terminal 
only management traffic for Y-Terminal 
can flow over the ODU-to-ODU inter-com 
cable
data traffic is sent over the H 
and V polarizations, doubling 
total capacity (*) 
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
6 
YOUNCTA 
2014 
SYSTEM TYPES – 2+0 XPIC  
2+0 XPIC à Unprotected, two ODUs connected via ODU-to-ODU inter-com cable on each side of the link. 
Two radio channels are used to carry the total traffic: the two radios transmit over the same frequency (CCDP), 
by using the two orthogonal polarization H and V with Cross Polarization Interference Cancellation (XPIC). 
Total link capacity is doubled with respect to 1+0 : max value is 840 Mbps L2 @ 56 MHz  1024 QAM (*) 
X 
(*) 
Layer 
1 
Link 
Aggrega0on 
to 
be 
introduced 
with 
SW 
Release 
1.4.0, 
available 
H2 
2014 
management traffic for Y-Terminal flows 
independently over the two polarizations 
total throughput up to 840 Mbps L2 
@ 56 MHz  1024 QAM (*) 
in case of failure the transmission is 
continued on the other polarization 
with reduced capacity 
data traffic 
data traffic 
management traffic 
for Y-Terminal 
XPIC cancellation data 
flows over the ODU-to- 
ODU inter-com cable
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
7 
YOUNCTA 
2014 
SYSTEM TYPES - REPEATER 
Repeater à Unprotected, with single ODU on each side of the link. Two ODUs are connected via one 
of the available Ethernet ports (SFP in the case below); traffic received over the radio interface of 
ODU-West is forwarded to the radio interface of ODU-East (and viceversa). 
management traffic goes over the fiber 
connection from ODU-West to ODU-East; 
it can be separated from data traffic on a 
different VLAN 
SFP 
VLAN management 
VLANs traffic 
data traffic can be added/ 
dropped on PoE 
data trafficdata traffic 
data traffic 
management traffic
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
8 
YOUNCTA 
2014 
RADIO FREQUENCY BANDS  CAPACITY 
Y-Packet C and F are available in following Frequency Bands: 
Licensed Bands: 
6L (*), 6U, 7, 8, 10.5, 11, 13, 15, 18, 23, 32, 38 (*) GHz 
Unlicensed Bands (Y-Packet Free): 
17, 24 GHz 
and can reach Maximum Radio Capacity of: 
Up to 420 Mbps Layer 2 @ 56 MHz  1024QAM in 1+0 configuration 
Up to 840 Mbps Layer 2 @ 56 MHz  1024QAM in XPIC configuration (with Layer 1 Link Aggregation) 
(*) Available H2 2014
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
9 
YOUNCTA 
2014 
MAX OUTPUT POWER 
Here below a table with Max Output Power and ATPC range values for each bandwidth and 
modulation settings:
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
10 
YOUNCTA 
2014 
ENHANCED TX POWER AND ATPC 
Two more feature provide enhanced management of output power: 
Digital Pre-distorter: 
Digital pre-distortion allows to transmit in the non linear zone of the power amplifier, improving its saturation point at the higher 
modulation. Pre-distortion is implemented in a digital section by means of a non linear filter. By inversely distorting the signal prior 
the power amplifier, the transmitter power can be significantly increased; the combined effect of the pre-distortion and power 
amplifier can be seen as an higher output linear amplification. As a result the transmitter power can be increased up to 4 dBm 
allowing coverage of longer distances. 
ATPC (Automatic Transmit Power Control) : 
ATPC allows to adjust the transmitted power in the local station in order to compensate a received power reduction, in the 
remote side of the link, due to bad propagation conditions. ATPC provides the following advantages: 
• reduces interference towards other radio systems 
• when working with Manual Modulation, it keeps Tx power adjusted to lowest target value, thus reducing power consumption 
• when working with ACM (Adaptive Code Modulation), it assures maximum level of modulation (highest throughput), and the 
lowest Tx power for each modulation level 
• provides effective countermeasure against “upfading” effects
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
11 
YOUNCTA 
2014 
EXAMPLE – ATPC AND ACM 
The diagram on the right 
provides an example of ATPC 
mechanism working with 
ACM, in a case of link 
attenuation (e.g. rain-cell 
transit). 
You can follow how Y-Packet 
“A” starts increasing/ 
decreasing its Tx power based 
on the Rx power level 
feedback provided by 
Y-Packet “B”.
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
12 
YOUNCTA 
2014 
SENSITIVITY – 7 MHZ 
Please find below a table with guaranteed Sensitivity 
values @ 7 MHz:
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
13 
YOUNCTA 
2014 
SENSITIVITY – 14 MHZ 
Please find below a table with guaranteed Sensitivity 
values @ 14 MHz:
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
14 
YOUNCTA 
2014 
SENSITIVITY – 28 MHZ 
Please find below a table with guaranteed Sensitivity 
values @ 28 MHz:
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
15 
YOUNCTA 
2014 
SENSITIVITY – 56 MHZ 
Please find below a table with guaranteed Sensitivity 
values @ 56 MHz:
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
16 
YOUNCTA 
2014 
MODEM 
Y-Packet modem features are here summarized: 
Available Modulations: 
4, 16, 32, 64, 128, 256, 512, 1024 QAM 
Available Bandwidth: 
ETSI 7, 14, 28, 40, 56 MHz 
ANSI 10, 20, 30, 40, 50, 60 MHz 
Channel Encoding: 
Efficient encoding based on two levels of coding: a convolutional code with code rate R=0.8 on the last 2 bits 
of each radio symbol (R=0.67 for 1024 QAM modulation), plus Reed Solomon coding.
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
17 
YOUNCTA 
2014 
PORTS [1] 
Y-Packet available ports are: 
1 PoE GE port (Y-Packet C  F): 
one electrical GE port is available, also used to provide equipment power. This port can be 
configured in terms of: Autonegotiation, SpeedDuplex, Tx and/or Rx Flow Control, 
Administrative Status, Raise Alarm Status. A Policer (Ingress Rate Limiter) can be enabled on 
port, and the max ingress rate fixed (Mbps). 
1 SFP Optical GE port (Y-Packet F only): 
an additional SFP GE port is available at Y-Packet F; it can be configured in terms of Tx and/or 
Rx Flow Control, Administrative Status, Raise Alarm Status. A Policer (Ingress Rate Limiter) can 
be enabled on port, and the max ingress rate fixed (Mbps).
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
18 
YOUNCTA 
2014 
PORTS [2] 
1 RJ45 for XPIC and1+1 HSB (Y-Packet C  F): 
one RJ45 port for ODU-to-ODU inter-com is available on Y-Packet. This port is used for operation on: 
• XPIC configuration – cross-polarization data are exchanged between the two connected ODUs over the ODU-to- 
ODU 
inter-com cable, in order to provide XPIC data signals from one ODU to the other 
• 1+1 HSB - used for 1+1 HSB protection handling: the two mate ODUs exchange information about their status: based 
on these info, the system is able to switch transmission in case the Active ODU is found to be faulty, squelching the 
radio transmitter on the faulty ODU and switching on transmitter on the Stand-By ODU. Also Management traffic is 
carried over the ODU-to-ODU inter-com cable. 
1 RSSI Alignment (Y-Packet C  F): 
used for antenna alignment during installation phase, it detects a voltage value that is proportional to Rx power 
1 External Power Supply (Y-Packet F only): 
used for VDC power supply, as an alternative to PoE
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
19 
YOUNCTA 
2014 
ETHERNET [1] 
In terms of Ethernet protocols and processing , Y-Packet provides following features: 
Support for VLAN IEEE 802.1Q: 
Ethernet ports (PoE and SFP) can be configured as VLAN Trunk, Access, or Transparent Mode. 
• As Access mode, each port will accept untagged frames, and tag these with the configured VLAN ID and Priority. VLAN tagged frames will 
not be forwarded form/to radio interface, as these will be discarded. 
• As Trunk mode, a list of allowed VLAN IDs can be defined by user; tagged frames with a VLAN ID included in the list will be forwarded from/ 
to radio interface, other VLAN IDs will be discarded. A Hybrid mode can be also configured, where also untagged frames are allowed to be 
forwarded on the Trunk ports. 
• As Transparent mode, all frames, tagged and untagged, will be transparently forwarded from/to radio interface. 
data traffic 
data traffic 
data traffic is tagged at Ethernet 
Access interface with VLAN 20 
and sent over the radio 
tagged VLAN 20 
data traffic 
untagged management traffic is 
sent through the Ethernet Trunk 
interface for Y-Terminal to local 
and remote ODU 
management traffic for 
Y-terminal 
tagged VLAN 20 data 
traffic flows through 
switch to core network
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
20 
YOUNCTA 
2014 
ETHERNET [2] 
Policer (Ingress Rate Limiter): 
Policing is a regulation mechanism used to limit the rate of traffic. It propagates bursts, although allowing to keep the maximum rate of traffic 
below a configurable threshold. By means of Web Management Interface, operator can independently configure the maximum ingress rate on 
SFP and/or PoE ports. When the traffic rate exceeds this configured maximum rate, policing drops the excess traffic. 
Configurable buffer for long fiber distances: 
The configurable data radio buffer is meant to cope with long fiber. Using the Ethernet flow control and the appropriate buffer length prevent 
data loss when radio congestion occurs. The buffer provides two different thresholds, proportional to the fiber length. The buffer can 
compensate up to 80 Km. 
Support for Jumbo frames: 
Jumbo frames are Ethernet frames with more than 1500 bytes of payload. Y-packet supports processing of frames up to 9700 bytes. 
Support for Flow Control IEEE 802.3X: 
When the total data rate ingressing the two Ethernet ports is higher than the maximum bandwidth available at the radio port, Flow Control 
mechanism is required to exploit maximum throughput on the radio interface. It is implemented by sending Pause Frames, with a value of 
pause time (quanta). Y-Packet implements two cascading buffers: one in the switch facing the two Ethernet ports, and the other in the FPGA 
where the modem is implemented. Between the two buffers there is a standard IEEE 802.3x Xon/Xoff mechanism.
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
21 
YOUNCTA 
2014 
QUALITY OF SERVICE (QOS) 
For optimal performance, some Quality of 
Service is required to be configured over the 
radio interface, for managing delay, delay 
variation (jitter), bandwidth, and packet loss 
parameters on a network. 
Y-Packet QoS output scheduling operates as a 
Weighted Round Robin (WRR). Each queue has 
an allocated weight, that defines the amount 
of bandwidth allocated to the queue. 
WRR works between four or three queues 
(three in cases where Q1 is configured as strict 
priority). The queues in the WRR are emptied 
in a round-robin fashion: these have fixed 
weights of 8,4,2,1 for respectively Q1, Q2, Q3, 
Q4. 
QoS can be configured to work with two basic 
classifiers: IEEE 802.1p or IPv4 DSCP 
weight=8 
weight=4 
weight=2 
weight=1 
all bandwidth 
required 
weight=4 
weight=2 
weight=1
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
22 
YOUNCTA 
2014 
MANAGEMENT [1] 
Y-Packet provides intuitive Web Management Interface based on AJAX technology. Main features at a glance: 
Double IPv4 stack (Y-packet F only): 
The double IP stack feature consists of two independent IP stacks, S1 and S2, sharing the same MAC address as well as the application layer 
services. S1 and S2 are named Primary and Secondary Management respectively. Stack 2 has been implemented for management purposes: it 
allows operator to perform management from a dedicated port, that is PoE configured as TMN. By means of Web Management Interface, PoE 
port can be configured as TMN, and S2 assigned a dedicated IP address and VLAN ID. No access to S2 is allowed from optical port. 
In case both SFP and PoE are configured as ordinary traffic ports, the S2 is shut down, and only S1 can be reached. 
S2 is shut down 
both Ethernet ports use 
Primary Management for 
Y-Terminal 
S2 is enabled 
SFP uses Primary 
Management for 
Y-Terminal 
PoE as TMN uses 
Secondary Management 
for Y-Terminal
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
23 
YOUNCTA 
2014 
MANAGEMENT [2] 
Management over SNMPv2 protocol: 
Y-Packet can be managed over SNMPv2 protocol. Its MIB structure can be easily integrated into third-parties NMS systems. By means of Web 
Management Interface, SNMP management can be enabled/disabled. For Alarm handling, a list of up to 10 SNMP Trap Receivers can be 
configured: for each of these, the IPv4 address, UDP port and Administrative Status shall be defined. These SNMP Trap Receivers will be sent a 
SNMP Notification, with the description of Alarm, Timestamp, Severity, Status (raised/cleared). 
ACLs (Access Control Lists) have been implemented for SNMP. Up to 6 ACLs con be configured by user. When one or more ACLs are 
configured, the system will perform a check on the IP allowed/not allowed to access equipment for SNMP. 
Logging of any user activity: 
Users activity tracing has been added into Event History logs. Tracing includes events like users attempts to login (successful and unsuccessful), 
configuration changes, as well as general info about system operational status and alarms. For each user, the Event History is reporting: User 
ID, date and time of activity, IPv4, IPv6 if any, description of each event, type of event recorded (Config, Info, Alarm). 
Support for IPv6: 
Y-Packet can be managed over IPv6 protocol. The IPv6 128-bit address can be either assigned manually or as stateless auto-configuration 
(SLAAC). The SLAAC mode shall support two options: 
• Link-local only: the Management interface shall self assign an IPv6 address according to the RFC 4291: this means that any router 
advertisement shall be ignored. 
• Automatic: the interface shall set the IPv6 local link address and listen to possible router advertisements. The default gateway shall be 
automatically acquired by means of router advertisements from a local solicitating router.
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
24 
YOUNCTA 
2014 
SECURITY [1] 
In terms of security, Y-Packet provides following features: 
RADIUS user Authentication  Authorization: 
Y-Packet users can be optionally authenticated and authorized by means of a RADIUS server. The equipment performs the following: 
• Authentication: means users shall be granted access to Y-Packet because they match in the RADIUS server user's DBA 
• Authorization: means that each user shall be authorized as either Admin or Monitor 
Each time that user tries connection to Web Management Interface, his credentials will be sent over the HTTP protocol. User and password (password is 
encrypted) are encapsulated as Attribute Value Pair (AVP) in the message Access-Request, and sent to the RADIUS server. The RADIUS server replies with the 
massage Access-Accept: subsequently, Y-Packet grants access to the user by logging he in. 
In case a Access-Reject message is received, because credentials did not match in any database, the user will not be granted the access. 
Up to three RADIUS servers can be independently configured for access. 
1 - User 
opens 
browser 
and 
connects 
to 
Y-­‐Terminal 
(hKp://Y-­‐Packet_IP_Address), 
then 
inserts 
username 
and 
password 
2 - Y-­‐Packet 
encapsulates 
creden0als 
(password 
is 
encrypted) 
as 
AKribute 
Value 
Pair 
(AVP) 
and 
sends 
a 
Access-­‐Request 
message 
to 
RADIUS 
server(s). 
3 - In 
case 
a 
match 
is 
found 
for 
user 
creden0als, 
the 
RADIUS 
server 
replies 
with 
the 
message 
Access-­‐Accept 
to 
Y-­‐Packet. 
4 –Y-­‐Packet 
grants 
access 
to 
the 
user 
by 
logging 
he 
in.
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
25 
YOUNCTA 
2014 
SECURITY [2] 
Secure Management Access (HTTPS): 
Secure Management Access feature allows user to connect to Web Management Interface using HTTPS protocol. Configuration of allowed/ 
denied protocols (both HTTP and HTTPS, one or none of the two) can be done via web. Also Backup Configuration function can be performed 
over HTTPS. 
ACLs (Access Control Lists) have been implemented for Web (HTTP and HTTPS). Up to 6 ACLs can be configured by user. When one or more 
ACLs are configured, the system will perform a check on the IP allowed/not allowed to access equipment for HTTP and/or HTTPS. Each of the 
6 ACLs can be independently enabled/disabled. 
Configurable Firewall: 
Both Primary and Secondary Management Interfaces can be configured in terms of access permitted/denied for some protocols. SSH is 
normally enabled on both Interfaces, but it can be denied for security purposes. Also ICMP Reply can be firewalled. 
Three User Privileges: 
Three user privileges are available at Y-Packet: 
• “Admin”, having full administrator rights on equipment configuration and definition of new users 
• “Technician”, who is granted the same rights of “Admin” except add/modify/delete new users. It can change only her/his own password. 
• “Monitor”, having no rights to change equipment configuration. It is allowed to perform only some manual operation for troubleshooting 
and operation purposes
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
26 
YOUNCTA 
2014 
TIMING AND SYNCHRONIZATION [1] 
Up to Five Configurable NTP Servers 
For timing purposes, up to 5 NTP Servers can be configured on Y-Terminal to use NTP as synchronization source. Once that the NTP process 
has been enabled, each of the configured and enabled NTP Servers will be polled by system. One of the NTP servers (NTP Server 1), is marked 
as “preferred”: this means that, although synchronized with any of the remaining 4 servers, the system will check availability of preferred NTP 
Server 1 and synch to it where service available. Each of the 5 NTP Servers can be independently enabled/disabled. 
NTP Server 1 
Preferred 
1 
NTP 2 to 5 
Servers 
2 
3 
1 – Y-­‐Packet 
sends 
a 
NTP 
synchroniza0on 
request 
to 
NTP 
Server 
1 
“Preferred”. 
If 
not 
available, 
then 
2 
2 – Y-­‐Packet 
sends 
a 
NTP 
synchroniza0on 
request 
to 
NTP 
Servers 
from 
2 
to 
5, 
synchronizing 
to 
the 
first 
available 
one. 
Although 
synchronized 
to 
NTP 
server 
2...5, 
a[er 
some 
0me 
is 
behaves 
as 
3 
3 – Although 
synchronized, 
Y-­‐Packet 
sends 
again 
a 
NTP 
synchroniza0on 
request 
to 
NTP 
Server 
1 
“Preferred”, 
trying 
to 
synchronize 
to 
it.
Clock-In terminal 
recovers the clock from 
the Ethernet interface 
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
27 
YOUNCTA 
2014 
TIMING AND SYNCHRONIZATION [2] 
Transparent Synchronous Ethernet: 
Y-Packet can support operation within a Synchronous Ethernet network, by allowing the clock propagation from one terminal of the link to the 
other (Clock Transparency). 
Synchronous Ethernet can be configured by Y-Terminal as Ethernet-to-Radio (from PoE or SFP interfaces) or Radio-to-Ethernet. 
The symbol rate of the RF carrier is locked to the in-GE clock in both Master and Slave sides, while the clock recovered from the symbol rate of 
the received RF signal drives the out-GE clock on the Master side in normal operating conditions. 
• Slave. Equipment recovers the clock from the incoming Ethernet physical signal and uses that clock both to 
clock the outgoing Ethernet signal and the transmitted radio bit stream. 
• Master. Equipment recovers the clock from the incoming radio bit stream and uses that clock for the 
outgoing Ethernet. 
Synchronization 
from Network 
clock propagation direction 
Clock-Out terminal recovers 
the clock from the incoming 
radio interface and uses the 
clock for the outgoing 
Ethernet interface
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
28 
YOUNCTA 
2014 
ENVIRONMENT 
Y-Packet can operate in a temperature range from -33 °C to +50 °C. 
A new version of Y-Packet C  F, named Y-Packet CI  FI (I stands for 
“Ice”), is under development, in order to extend the operating 
temperature range to -50 °C/+50 °C.
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
29 
YOUNCTA 
2014 
Y-PACKET NETWORK DEPLOYMENT EXAMPLE 
At following slide, you can find a network layout of an existing project deployed by a customer 
located in New Zealand. 
Five logical ERPS rings (blue) can be observed in the network, with main segments of the rings 
realized with Y-Packet radio links. 
The Y-Packet links interconnect several Indoor equipment running ERPS protocol (i.e. Cisco 
ASR900 series equipment). Each IDU participates in more than one logical ERPS ring instance. 
Different services are implemented throughout the network (Rail, Water, IT services), and single 
and total capacities required over each radio link are marked with different colours. 
One of the main segments of one ring, moving towards the core network (Masterton DC– 
Climie) has been deployed as XPIC configuration, to achieve maximum radio bandwidth.
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
30 
YOUNCTA 
2014 
GWRC PROJECT 
Y-Packet 
radio link 
Y-Packet 
radio links 
Y-Packet 
radio links 
Y-Packet 
radio links 
Y-Packet 
XPIC link 
Y-Packet 
radio links
© YOUNCTA - Confidential This document is for internal use only and may not be 
distributed to any third party without authorization. 
BACK 
Thank You J 
W W W . Y O U N C T A . C O M

More Related Content

What's hot

Wi max rru3702 troubleshooting guide v1.0-20100609-a
Wi max rru3702 troubleshooting guide v1.0-20100609-aWi max rru3702 troubleshooting guide v1.0-20100609-a
Wi max rru3702 troubleshooting guide v1.0-20100609-aAmjad Jamil
 
Huaweiumtsnodebconfigurationprinciple 161222082051
Huaweiumtsnodebconfigurationprinciple 161222082051Huaweiumtsnodebconfigurationprinciple 161222082051
Huaweiumtsnodebconfigurationprinciple 161222082051moussaCoulibaly22
 
Ericsson Mini-link 6600 Nodes
Ericsson Mini-link 6600 NodesEricsson Mini-link 6600 Nodes
Ericsson Mini-link 6600 Nodesibrahimnabil17
 
Huawei DBS 3900 Hardware Structure
Huawei DBS 3900 Hardware StructureHuawei DBS 3900 Hardware Structure
Huawei DBS 3900 Hardware Structureibrahimnabil17
 
Bts3900 vii upgrade cell pp medical
Bts3900 vii upgrade cell pp medicalBts3900 vii upgrade cell pp medical
Bts3900 vii upgrade cell pp medicalsopheak086
 
Tunnel Radio Communications and Tracking
Tunnel Radio Communications and TrackingTunnel Radio Communications and Tracking
Tunnel Radio Communications and TrackingTunnel Radio of America
 
Ultrasite technical for 4op
Ultrasite technical for 4opUltrasite technical for 4op
Ultrasite technical for 4opTempus Telcosys
 
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassisLE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassisRonald Bartels
 
Handling Common Faults and Alarms for Huawei RTN Microwaves
Handling Common Faults and Alarms for Huawei RTN MicrowavesHandling Common Faults and Alarms for Huawei RTN Microwaves
Handling Common Faults and Alarms for Huawei RTN Microwavesibrahimnabil17
 
Ericsson TN Cards in Details
Ericsson TN Cards in DetailsEricsson TN Cards in Details
Ericsson TN Cards in Detailsibrahimnabil17
 
Nokia engineer basic_training_session_v1
Nokia engineer basic_training_session_v1Nokia engineer basic_training_session_v1
Nokia engineer basic_training_session_v1mohameddawood35
 
Nexaira Nexconnect Router User Guide (quantum-wireless.com)
Nexaira Nexconnect Router User Guide (quantum-wireless.com)Nexaira Nexconnect Router User Guide (quantum-wireless.com)
Nexaira Nexconnect Router User Guide (quantum-wireless.com)Ari Zoldan
 
Telesemana the role of e band and v-band backhaul technologies in het nets 20...
Telesemana the role of e band and v-band backhaul technologies in het nets 20...Telesemana the role of e band and v-band backhaul technologies in het nets 20...
Telesemana the role of e band and v-band backhaul technologies in het nets 20...Rafael Junquera
 
240243228 huawei-bts-3900-training
240243228 huawei-bts-3900-training240243228 huawei-bts-3900-training
240243228 huawei-bts-3900-trainingShelton Siziba
 
Drt scanner 4301 wcdma
Drt scanner   4301 wcdmaDrt scanner   4301 wcdma
Drt scanner 4301 wcdmamarcosaoc
 

What's hot (17)

Tunnel Radio Railroad Solutions
Tunnel Radio Railroad SolutionsTunnel Radio Railroad Solutions
Tunnel Radio Railroad Solutions
 
Wi max rru3702 troubleshooting guide v1.0-20100609-a
Wi max rru3702 troubleshooting guide v1.0-20100609-aWi max rru3702 troubleshooting guide v1.0-20100609-a
Wi max rru3702 troubleshooting guide v1.0-20100609-a
 
Huaweiumtsnodebconfigurationprinciple 161222082051
Huaweiumtsnodebconfigurationprinciple 161222082051Huaweiumtsnodebconfigurationprinciple 161222082051
Huaweiumtsnodebconfigurationprinciple 161222082051
 
Ericsson Mini-link 6600 Nodes
Ericsson Mini-link 6600 NodesEricsson Mini-link 6600 Nodes
Ericsson Mini-link 6600 Nodes
 
Huawei DBS 3900 Hardware Structure
Huawei DBS 3900 Hardware StructureHuawei DBS 3900 Hardware Structure
Huawei DBS 3900 Hardware Structure
 
Bts3900 vii upgrade cell pp medical
Bts3900 vii upgrade cell pp medicalBts3900 vii upgrade cell pp medical
Bts3900 vii upgrade cell pp medical
 
Tunnel Radio Communications and Tracking
Tunnel Radio Communications and TrackingTunnel Radio Communications and Tracking
Tunnel Radio Communications and Tracking
 
Ultrasite technical for 4op
Ultrasite technical for 4opUltrasite technical for 4op
Ultrasite technical for 4op
 
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassisLE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
LE-240XTCS LE-280XTS - Ethernet module for the LET-36 chassis
 
Handling Common Faults and Alarms for Huawei RTN Microwaves
Handling Common Faults and Alarms for Huawei RTN MicrowavesHandling Common Faults and Alarms for Huawei RTN Microwaves
Handling Common Faults and Alarms for Huawei RTN Microwaves
 
Ericsson TN Cards in Details
Ericsson TN Cards in DetailsEricsson TN Cards in Details
Ericsson TN Cards in Details
 
Nokia engineer basic_training_session_v1
Nokia engineer basic_training_session_v1Nokia engineer basic_training_session_v1
Nokia engineer basic_training_session_v1
 
Nexaira Nexconnect Router User Guide (quantum-wireless.com)
Nexaira Nexconnect Router User Guide (quantum-wireless.com)Nexaira Nexconnect Router User Guide (quantum-wireless.com)
Nexaira Nexconnect Router User Guide (quantum-wireless.com)
 
Telesemana the role of e band and v-band backhaul technologies in het nets 20...
Telesemana the role of e band and v-band backhaul technologies in het nets 20...Telesemana the role of e band and v-band backhaul technologies in het nets 20...
Telesemana the role of e band and v-band backhaul technologies in het nets 20...
 
240243228 huawei-bts-3900-training
240243228 huawei-bts-3900-training240243228 huawei-bts-3900-training
240243228 huawei-bts-3900-training
 
Datenblatt neo
Datenblatt neoDatenblatt neo
Datenblatt neo
 
Drt scanner 4301 wcdma
Drt scanner   4301 wcdmaDrt scanner   4301 wcdma
Drt scanner 4301 wcdma
 

Viewers also liked

Y packet Microwave point to point
Y packet Microwave point to pointY packet Microwave point to point
Y packet Microwave point to pointYouncta Italia
 
Struktur kerajaan persekutuan
Struktur kerajaan persekutuanStruktur kerajaan persekutuan
Struktur kerajaan persekutuanTieqa Ramli
 
Il turismo-organizzato-incoming
Il turismo-organizzato-incomingIl turismo-organizzato-incoming
Il turismo-organizzato-incomingAndrea Frellicca
 
konferensi asia afrika
konferensi asia afrikakonferensi asia afrika
konferensi asia afrikasandy riefki
 
Product description of net numen _m3_(cdma_omc)
Product description of net numen _m3_(cdma_omc)Product description of net numen _m3_(cdma_omc)
Product description of net numen _m3_(cdma_omc)Adeep Asaad
 
11 technical descriptions
11 technical descriptions11 technical descriptions
11 technical descriptionsNikhil Joshi
 
Zxc10 bscb product description
Zxc10 bscb product descriptionZxc10 bscb product description
Zxc10 bscb product descriptionAdeep Asaad
 
Launch of a washing machine PR
Launch of a washing machine PRLaunch of a washing machine PR
Launch of a washing machine PRRudranil Sengupta
 
Zxsdr bs8900 a product description 20101026
Zxsdr bs8900 a product description 20101026Zxsdr bs8900 a product description 20101026
Zxsdr bs8900 a product description 20101026Adeep Asaad
 
WATERLESS WASHING MACHINE
WATERLESS WASHING MACHINEWATERLESS WASHING MACHINE
WATERLESS WASHING MACHINEmillgaydil
 
Washing machine
Washing machineWashing machine
Washing machinevamshi369
 

Viewers also liked (13)

Y packet Microwave point to point
Y packet Microwave point to pointY packet Microwave point to point
Y packet Microwave point to point
 
Struktur kerajaan persekutuan
Struktur kerajaan persekutuanStruktur kerajaan persekutuan
Struktur kerajaan persekutuan
 
Il turismo-organizzato-incoming
Il turismo-organizzato-incomingIl turismo-organizzato-incoming
Il turismo-organizzato-incoming
 
konferensi asia afrika
konferensi asia afrikakonferensi asia afrika
konferensi asia afrika
 
Product description of net numen _m3_(cdma_omc)
Product description of net numen _m3_(cdma_omc)Product description of net numen _m3_(cdma_omc)
Product description of net numen _m3_(cdma_omc)
 
11 technical descriptions
11 technical descriptions11 technical descriptions
11 technical descriptions
 
Zxc10 bscb product description
Zxc10 bscb product descriptionZxc10 bscb product description
Zxc10 bscb product description
 
Launch of a washing machine PR
Launch of a washing machine PRLaunch of a washing machine PR
Launch of a washing machine PR
 
Zxsdr bs8900 a product description 20101026
Zxsdr bs8900 a product description 20101026Zxsdr bs8900 a product description 20101026
Zxsdr bs8900 a product description 20101026
 
DESCRIBING OBJECTS
DESCRIBING OBJECTSDESCRIBING OBJECTS
DESCRIBING OBJECTS
 
WATERLESS WASHING MACHINE
WATERLESS WASHING MACHINEWATERLESS WASHING MACHINE
WATERLESS WASHING MACHINE
 
Washing machine
Washing machineWashing machine
Washing machine
 
Washing Machine
Washing MachineWashing Machine
Washing Machine
 

Similar to Product technical description_y-packet_1.3.2_13_may2014

Improvement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsImprovement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsIjrdt Journal
 
American Fibertek MTX-91685C-SL User Manual
American Fibertek MTX-91685C-SL User ManualAmerican Fibertek MTX-91685C-SL User Manual
American Fibertek MTX-91685C-SL User ManualJMAC Supply
 
Advanced Network Solutions for Electric Power Application
Advanced Network Solutions for Electric Power ApplicationAdvanced Network Solutions for Electric Power Application
Advanced Network Solutions for Electric Power Applicationchowfei
 
LE-180XT LE-280XT LE 240XTX - Ethernet module for the LET-36 chassis
LE-180XT LE-280XT LE 240XTX - Ethernet module for the LET-36 chassisLE-180XT LE-280XT LE 240XTX - Ethernet module for the LET-36 chassis
LE-180XT LE-280XT LE 240XTX - Ethernet module for the LET-36 chassisRonald Bartels
 
MA5800 FTTx System Overview huawei gpon.
MA5800 FTTx System Overview huawei gpon.MA5800 FTTx System Overview huawei gpon.
MA5800 FTTx System Overview huawei gpon.fauzihidayat28
 
KYL 300H wireless module user manual
KYL 300H wireless module user manualKYL 300H wireless module user manual
KYL 300H wireless module user manualSunny Zhou
 
TAINET ENTU 763GO SFP to SFP Media Converter
TAINET ENTU 763GO SFP to SFP Media ConverterTAINET ENTU 763GO SFP to SFP Media Converter
TAINET ENTU 763GO SFP to SFP Media ConverterTAINET
 
Powerline Communcation For Home Automation
Powerline Communcation For Home AutomationPowerline Communcation For Home Automation
Powerline Communcation For Home AutomationGaurav Everyones
 
Combined Mobile Radio spec
Combined  Mobile Radio specCombined  Mobile Radio spec
Combined Mobile Radio specirene steenhagen
 
IRJET- Performance Comparison Analysis between Multi-FFT OFDM for Power Line ...
IRJET- Performance Comparison Analysis between Multi-FFT OFDM for Power Line ...IRJET- Performance Comparison Analysis between Multi-FFT OFDM for Power Line ...
IRJET- Performance Comparison Analysis between Multi-FFT OFDM for Power Line ...IRJET Journal
 
ComNet FVT812M1 Data Sheet
ComNet FVT812M1 Data SheetComNet FVT812M1 Data Sheet
ComNet FVT812M1 Data SheetJMAC Supply
 
ComNet FVT160D8S1 Data Sheet
ComNet FVT160D8S1 Data SheetComNet FVT160D8S1 Data Sheet
ComNet FVT160D8S1 Data SheetJMAC Supply
 
KYL 300I Ruser manual
KYL 300I Ruser manualKYL 300I Ruser manual
KYL 300I Ruser manualSunny Zhou
 
Kyl 300 h user manual
Kyl 300 h user manualKyl 300 h user manual
Kyl 300 h user manualkyl03losia
 
Siklu overbuild technical note 05
Siklu overbuild technical note 05Siklu overbuild technical note 05
Siklu overbuild technical note 05Danny BenSimhon
 
Siklu overbuild technical note 05
Siklu overbuild technical note 05Siklu overbuild technical note 05
Siklu overbuild technical note 05Danny BenSimhon
 
ZTE_NR8000_Overview.pdf
ZTE_NR8000_Overview.pdfZTE_NR8000_Overview.pdf
ZTE_NR8000_Overview.pdfssuser3769e8
 

Similar to Product technical description_y-packet_1.3.2_13_may2014 (20)

Presentation1
Presentation1Presentation1
Presentation1
 
Improvement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systemsImprovement of signal coverage using wcdma signal repeater for 3 g systems
Improvement of signal coverage using wcdma signal repeater for 3 g systems
 
American Fibertek MTX-91685C-SL User Manual
American Fibertek MTX-91685C-SL User ManualAmerican Fibertek MTX-91685C-SL User Manual
American Fibertek MTX-91685C-SL User Manual
 
Advanced Network Solutions for Electric Power Application
Advanced Network Solutions for Electric Power ApplicationAdvanced Network Solutions for Electric Power Application
Advanced Network Solutions for Electric Power Application
 
LE-180XT LE-280XT LE 240XTX - Ethernet module for the LET-36 chassis
LE-180XT LE-280XT LE 240XTX - Ethernet module for the LET-36 chassisLE-180XT LE-280XT LE 240XTX - Ethernet module for the LET-36 chassis
LE-180XT LE-280XT LE 240XTX - Ethernet module for the LET-36 chassis
 
MA5800 FTTx System Overview huawei gpon.
MA5800 FTTx System Overview huawei gpon.MA5800 FTTx System Overview huawei gpon.
MA5800 FTTx System Overview huawei gpon.
 
KYL 300H wireless module user manual
KYL 300H wireless module user manualKYL 300H wireless module user manual
KYL 300H wireless module user manual
 
TAINET ENTU 763GO SFP to SFP Media Converter
TAINET ENTU 763GO SFP to SFP Media ConverterTAINET ENTU 763GO SFP to SFP Media Converter
TAINET ENTU 763GO SFP to SFP Media Converter
 
Powerline Communcation For Home Automation
Powerline Communcation For Home AutomationPowerline Communcation For Home Automation
Powerline Communcation For Home Automation
 
Combined Mobile Radio spec
Combined  Mobile Radio specCombined  Mobile Radio spec
Combined Mobile Radio spec
 
Wireless Meter Bus
Wireless Meter BusWireless Meter Bus
Wireless Meter Bus
 
IRJET- Performance Comparison Analysis between Multi-FFT OFDM for Power Line ...
IRJET- Performance Comparison Analysis between Multi-FFT OFDM for Power Line ...IRJET- Performance Comparison Analysis between Multi-FFT OFDM for Power Line ...
IRJET- Performance Comparison Analysis between Multi-FFT OFDM for Power Line ...
 
ComNet FVT812M1 Data Sheet
ComNet FVT812M1 Data SheetComNet FVT812M1 Data Sheet
ComNet FVT812M1 Data Sheet
 
ComNet FVT160D8S1 Data Sheet
ComNet FVT160D8S1 Data SheetComNet FVT160D8S1 Data Sheet
ComNet FVT160D8S1 Data Sheet
 
KYL 300I Ruser manual
KYL 300I Ruser manualKYL 300I Ruser manual
KYL 300I Ruser manual
 
Kyl 300 h user manual
Kyl 300 h user manualKyl 300 h user manual
Kyl 300 h user manual
 
Ex rc1 spec-en_1215
Ex rc1 spec-en_1215Ex rc1 spec-en_1215
Ex rc1 spec-en_1215
 
Siklu overbuild technical note 05
Siklu overbuild technical note 05Siklu overbuild technical note 05
Siklu overbuild technical note 05
 
Siklu overbuild technical note 05
Siklu overbuild technical note 05Siklu overbuild technical note 05
Siklu overbuild technical note 05
 
ZTE_NR8000_Overview.pdf
ZTE_NR8000_Overview.pdfZTE_NR8000_Overview.pdf
ZTE_NR8000_Overview.pdf
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

Product technical description_y-packet_1.3.2_13_may2014

  • 1. 05 May 2014 © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. FRONT Y-PACKET SWR 1.3.2 PRODUCT DESCRIPTION S. Tucci
  • 2. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 2 YOUNCTA 2014 INTRODUCTION [1] This document is a technical overview of the high capacity full-outdoor packet radio Y-Packet. Y-Packet is available in three variants: • Y-Packet C (copper), where the ODU is directly connected to a PoE injector • Y-Packet F (fiber), with external VDC power connector and SFP port in addition to electrical PoE port; Y-Packet F can be powered either by VDC or PoE • Y-Packet [M] (MIRFA), dedicated to military market; can be C or F variant, and is developed in the 8 and 15 GHz radio bands, with dedicated Tx/Rx spacings as required by MIRFA regulations
  • 3. The document describes the main features of current SW release, SWR 1.3.2. Features are grouped as follows: © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 3 YOUNCTA 2014 INTRODUCTION [2] - System Types - Radio Frequency Bands Capacity - Modem - Ports - Ethernet QoS - Management - Security - Timing Synchronization - Environment
  • 4. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 4 YOUNCTA 2014 SYSTEM TYPES – 1+0 UNPROTECTED Four system types are available for Y-Packet: 1+0 à Unprotected, with single ODU on each side of the link. Max capacity is 420 Mbps L2 @ 56 MHz 1024 QAM throughput up to 420 Mbps L2 @ 56 MHz 1024 QAM Y-Packet C, with PoE interface used for both power and data traffic 1+0 link configuration data traffic
  • 5. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 5 YOUNCTA 2014 SYSTEM TYPES – 1+1 HOT STAND-BY 1+1 Hot Stand-By à Protected, two ODUs connected via ODU-to-ODU inter-com cable on each side of the link. The operation of Protection Group is coordinated between the ODU Main and Protection via the ODU-to-ODU inter-com cable. With this configuration, two Network Interfaces are supported in each terminal for data traffic, but only one is active at a time: the one of the Active ODU (can be either Main or Protection), which is enabled to transmit over the Radio interface. Protection Mode can be set to Revertive or Not Revertive, and Manual Operator commands (Forced, Lockout, Clear) are available for troubleshooting or operation purposes in case of failure, the system switches on the Protection ODU data traffic data traffic in normal conditions, data traffic is sent over the Main channel management traffic for Y-Terminal only management traffic for Y-Terminal can flow over the ODU-to-ODU inter-com cable
  • 6. data traffic is sent over the H and V polarizations, doubling total capacity (*) © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 6 YOUNCTA 2014 SYSTEM TYPES – 2+0 XPIC 2+0 XPIC à Unprotected, two ODUs connected via ODU-to-ODU inter-com cable on each side of the link. Two radio channels are used to carry the total traffic: the two radios transmit over the same frequency (CCDP), by using the two orthogonal polarization H and V with Cross Polarization Interference Cancellation (XPIC). Total link capacity is doubled with respect to 1+0 : max value is 840 Mbps L2 @ 56 MHz 1024 QAM (*) X (*) Layer 1 Link Aggrega0on to be introduced with SW Release 1.4.0, available H2 2014 management traffic for Y-Terminal flows independently over the two polarizations total throughput up to 840 Mbps L2 @ 56 MHz 1024 QAM (*) in case of failure the transmission is continued on the other polarization with reduced capacity data traffic data traffic management traffic for Y-Terminal XPIC cancellation data flows over the ODU-to- ODU inter-com cable
  • 7. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 7 YOUNCTA 2014 SYSTEM TYPES - REPEATER Repeater à Unprotected, with single ODU on each side of the link. Two ODUs are connected via one of the available Ethernet ports (SFP in the case below); traffic received over the radio interface of ODU-West is forwarded to the radio interface of ODU-East (and viceversa). management traffic goes over the fiber connection from ODU-West to ODU-East; it can be separated from data traffic on a different VLAN SFP VLAN management VLANs traffic data traffic can be added/ dropped on PoE data trafficdata traffic data traffic management traffic
  • 8. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 8 YOUNCTA 2014 RADIO FREQUENCY BANDS CAPACITY Y-Packet C and F are available in following Frequency Bands: Licensed Bands: 6L (*), 6U, 7, 8, 10.5, 11, 13, 15, 18, 23, 32, 38 (*) GHz Unlicensed Bands (Y-Packet Free): 17, 24 GHz and can reach Maximum Radio Capacity of: Up to 420 Mbps Layer 2 @ 56 MHz 1024QAM in 1+0 configuration Up to 840 Mbps Layer 2 @ 56 MHz 1024QAM in XPIC configuration (with Layer 1 Link Aggregation) (*) Available H2 2014
  • 9. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 9 YOUNCTA 2014 MAX OUTPUT POWER Here below a table with Max Output Power and ATPC range values for each bandwidth and modulation settings:
  • 10. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 10 YOUNCTA 2014 ENHANCED TX POWER AND ATPC Two more feature provide enhanced management of output power: Digital Pre-distorter: Digital pre-distortion allows to transmit in the non linear zone of the power amplifier, improving its saturation point at the higher modulation. Pre-distortion is implemented in a digital section by means of a non linear filter. By inversely distorting the signal prior the power amplifier, the transmitter power can be significantly increased; the combined effect of the pre-distortion and power amplifier can be seen as an higher output linear amplification. As a result the transmitter power can be increased up to 4 dBm allowing coverage of longer distances. ATPC (Automatic Transmit Power Control) : ATPC allows to adjust the transmitted power in the local station in order to compensate a received power reduction, in the remote side of the link, due to bad propagation conditions. ATPC provides the following advantages: • reduces interference towards other radio systems • when working with Manual Modulation, it keeps Tx power adjusted to lowest target value, thus reducing power consumption • when working with ACM (Adaptive Code Modulation), it assures maximum level of modulation (highest throughput), and the lowest Tx power for each modulation level • provides effective countermeasure against “upfading” effects
  • 11. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 11 YOUNCTA 2014 EXAMPLE – ATPC AND ACM The diagram on the right provides an example of ATPC mechanism working with ACM, in a case of link attenuation (e.g. rain-cell transit). You can follow how Y-Packet “A” starts increasing/ decreasing its Tx power based on the Rx power level feedback provided by Y-Packet “B”.
  • 12. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 12 YOUNCTA 2014 SENSITIVITY – 7 MHZ Please find below a table with guaranteed Sensitivity values @ 7 MHz:
  • 13. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 13 YOUNCTA 2014 SENSITIVITY – 14 MHZ Please find below a table with guaranteed Sensitivity values @ 14 MHz:
  • 14. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 14 YOUNCTA 2014 SENSITIVITY – 28 MHZ Please find below a table with guaranteed Sensitivity values @ 28 MHz:
  • 15. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 15 YOUNCTA 2014 SENSITIVITY – 56 MHZ Please find below a table with guaranteed Sensitivity values @ 56 MHz:
  • 16. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 16 YOUNCTA 2014 MODEM Y-Packet modem features are here summarized: Available Modulations: 4, 16, 32, 64, 128, 256, 512, 1024 QAM Available Bandwidth: ETSI 7, 14, 28, 40, 56 MHz ANSI 10, 20, 30, 40, 50, 60 MHz Channel Encoding: Efficient encoding based on two levels of coding: a convolutional code with code rate R=0.8 on the last 2 bits of each radio symbol (R=0.67 for 1024 QAM modulation), plus Reed Solomon coding.
  • 17. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 17 YOUNCTA 2014 PORTS [1] Y-Packet available ports are: 1 PoE GE port (Y-Packet C F): one electrical GE port is available, also used to provide equipment power. This port can be configured in terms of: Autonegotiation, SpeedDuplex, Tx and/or Rx Flow Control, Administrative Status, Raise Alarm Status. A Policer (Ingress Rate Limiter) can be enabled on port, and the max ingress rate fixed (Mbps). 1 SFP Optical GE port (Y-Packet F only): an additional SFP GE port is available at Y-Packet F; it can be configured in terms of Tx and/or Rx Flow Control, Administrative Status, Raise Alarm Status. A Policer (Ingress Rate Limiter) can be enabled on port, and the max ingress rate fixed (Mbps).
  • 18. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 18 YOUNCTA 2014 PORTS [2] 1 RJ45 for XPIC and1+1 HSB (Y-Packet C F): one RJ45 port for ODU-to-ODU inter-com is available on Y-Packet. This port is used for operation on: • XPIC configuration – cross-polarization data are exchanged between the two connected ODUs over the ODU-to- ODU inter-com cable, in order to provide XPIC data signals from one ODU to the other • 1+1 HSB - used for 1+1 HSB protection handling: the two mate ODUs exchange information about their status: based on these info, the system is able to switch transmission in case the Active ODU is found to be faulty, squelching the radio transmitter on the faulty ODU and switching on transmitter on the Stand-By ODU. Also Management traffic is carried over the ODU-to-ODU inter-com cable. 1 RSSI Alignment (Y-Packet C F): used for antenna alignment during installation phase, it detects a voltage value that is proportional to Rx power 1 External Power Supply (Y-Packet F only): used for VDC power supply, as an alternative to PoE
  • 19. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 19 YOUNCTA 2014 ETHERNET [1] In terms of Ethernet protocols and processing , Y-Packet provides following features: Support for VLAN IEEE 802.1Q: Ethernet ports (PoE and SFP) can be configured as VLAN Trunk, Access, or Transparent Mode. • As Access mode, each port will accept untagged frames, and tag these with the configured VLAN ID and Priority. VLAN tagged frames will not be forwarded form/to radio interface, as these will be discarded. • As Trunk mode, a list of allowed VLAN IDs can be defined by user; tagged frames with a VLAN ID included in the list will be forwarded from/ to radio interface, other VLAN IDs will be discarded. A Hybrid mode can be also configured, where also untagged frames are allowed to be forwarded on the Trunk ports. • As Transparent mode, all frames, tagged and untagged, will be transparently forwarded from/to radio interface. data traffic data traffic data traffic is tagged at Ethernet Access interface with VLAN 20 and sent over the radio tagged VLAN 20 data traffic untagged management traffic is sent through the Ethernet Trunk interface for Y-Terminal to local and remote ODU management traffic for Y-terminal tagged VLAN 20 data traffic flows through switch to core network
  • 20. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 20 YOUNCTA 2014 ETHERNET [2] Policer (Ingress Rate Limiter): Policing is a regulation mechanism used to limit the rate of traffic. It propagates bursts, although allowing to keep the maximum rate of traffic below a configurable threshold. By means of Web Management Interface, operator can independently configure the maximum ingress rate on SFP and/or PoE ports. When the traffic rate exceeds this configured maximum rate, policing drops the excess traffic. Configurable buffer for long fiber distances: The configurable data radio buffer is meant to cope with long fiber. Using the Ethernet flow control and the appropriate buffer length prevent data loss when radio congestion occurs. The buffer provides two different thresholds, proportional to the fiber length. The buffer can compensate up to 80 Km. Support for Jumbo frames: Jumbo frames are Ethernet frames with more than 1500 bytes of payload. Y-packet supports processing of frames up to 9700 bytes. Support for Flow Control IEEE 802.3X: When the total data rate ingressing the two Ethernet ports is higher than the maximum bandwidth available at the radio port, Flow Control mechanism is required to exploit maximum throughput on the radio interface. It is implemented by sending Pause Frames, with a value of pause time (quanta). Y-Packet implements two cascading buffers: one in the switch facing the two Ethernet ports, and the other in the FPGA where the modem is implemented. Between the two buffers there is a standard IEEE 802.3x Xon/Xoff mechanism.
  • 21. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 21 YOUNCTA 2014 QUALITY OF SERVICE (QOS) For optimal performance, some Quality of Service is required to be configured over the radio interface, for managing delay, delay variation (jitter), bandwidth, and packet loss parameters on a network. Y-Packet QoS output scheduling operates as a Weighted Round Robin (WRR). Each queue has an allocated weight, that defines the amount of bandwidth allocated to the queue. WRR works between four or three queues (three in cases where Q1 is configured as strict priority). The queues in the WRR are emptied in a round-robin fashion: these have fixed weights of 8,4,2,1 for respectively Q1, Q2, Q3, Q4. QoS can be configured to work with two basic classifiers: IEEE 802.1p or IPv4 DSCP weight=8 weight=4 weight=2 weight=1 all bandwidth required weight=4 weight=2 weight=1
  • 22. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 22 YOUNCTA 2014 MANAGEMENT [1] Y-Packet provides intuitive Web Management Interface based on AJAX technology. Main features at a glance: Double IPv4 stack (Y-packet F only): The double IP stack feature consists of two independent IP stacks, S1 and S2, sharing the same MAC address as well as the application layer services. S1 and S2 are named Primary and Secondary Management respectively. Stack 2 has been implemented for management purposes: it allows operator to perform management from a dedicated port, that is PoE configured as TMN. By means of Web Management Interface, PoE port can be configured as TMN, and S2 assigned a dedicated IP address and VLAN ID. No access to S2 is allowed from optical port. In case both SFP and PoE are configured as ordinary traffic ports, the S2 is shut down, and only S1 can be reached. S2 is shut down both Ethernet ports use Primary Management for Y-Terminal S2 is enabled SFP uses Primary Management for Y-Terminal PoE as TMN uses Secondary Management for Y-Terminal
  • 23. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 23 YOUNCTA 2014 MANAGEMENT [2] Management over SNMPv2 protocol: Y-Packet can be managed over SNMPv2 protocol. Its MIB structure can be easily integrated into third-parties NMS systems. By means of Web Management Interface, SNMP management can be enabled/disabled. For Alarm handling, a list of up to 10 SNMP Trap Receivers can be configured: for each of these, the IPv4 address, UDP port and Administrative Status shall be defined. These SNMP Trap Receivers will be sent a SNMP Notification, with the description of Alarm, Timestamp, Severity, Status (raised/cleared). ACLs (Access Control Lists) have been implemented for SNMP. Up to 6 ACLs con be configured by user. When one or more ACLs are configured, the system will perform a check on the IP allowed/not allowed to access equipment for SNMP. Logging of any user activity: Users activity tracing has been added into Event History logs. Tracing includes events like users attempts to login (successful and unsuccessful), configuration changes, as well as general info about system operational status and alarms. For each user, the Event History is reporting: User ID, date and time of activity, IPv4, IPv6 if any, description of each event, type of event recorded (Config, Info, Alarm). Support for IPv6: Y-Packet can be managed over IPv6 protocol. The IPv6 128-bit address can be either assigned manually or as stateless auto-configuration (SLAAC). The SLAAC mode shall support two options: • Link-local only: the Management interface shall self assign an IPv6 address according to the RFC 4291: this means that any router advertisement shall be ignored. • Automatic: the interface shall set the IPv6 local link address and listen to possible router advertisements. The default gateway shall be automatically acquired by means of router advertisements from a local solicitating router.
  • 24. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 24 YOUNCTA 2014 SECURITY [1] In terms of security, Y-Packet provides following features: RADIUS user Authentication Authorization: Y-Packet users can be optionally authenticated and authorized by means of a RADIUS server. The equipment performs the following: • Authentication: means users shall be granted access to Y-Packet because they match in the RADIUS server user's DBA • Authorization: means that each user shall be authorized as either Admin or Monitor Each time that user tries connection to Web Management Interface, his credentials will be sent over the HTTP protocol. User and password (password is encrypted) are encapsulated as Attribute Value Pair (AVP) in the message Access-Request, and sent to the RADIUS server. The RADIUS server replies with the massage Access-Accept: subsequently, Y-Packet grants access to the user by logging he in. In case a Access-Reject message is received, because credentials did not match in any database, the user will not be granted the access. Up to three RADIUS servers can be independently configured for access. 1 - User opens browser and connects to Y-­‐Terminal (hKp://Y-­‐Packet_IP_Address), then inserts username and password 2 - Y-­‐Packet encapsulates creden0als (password is encrypted) as AKribute Value Pair (AVP) and sends a Access-­‐Request message to RADIUS server(s). 3 - In case a match is found for user creden0als, the RADIUS server replies with the message Access-­‐Accept to Y-­‐Packet. 4 –Y-­‐Packet grants access to the user by logging he in.
  • 25. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 25 YOUNCTA 2014 SECURITY [2] Secure Management Access (HTTPS): Secure Management Access feature allows user to connect to Web Management Interface using HTTPS protocol. Configuration of allowed/ denied protocols (both HTTP and HTTPS, one or none of the two) can be done via web. Also Backup Configuration function can be performed over HTTPS. ACLs (Access Control Lists) have been implemented for Web (HTTP and HTTPS). Up to 6 ACLs can be configured by user. When one or more ACLs are configured, the system will perform a check on the IP allowed/not allowed to access equipment for HTTP and/or HTTPS. Each of the 6 ACLs can be independently enabled/disabled. Configurable Firewall: Both Primary and Secondary Management Interfaces can be configured in terms of access permitted/denied for some protocols. SSH is normally enabled on both Interfaces, but it can be denied for security purposes. Also ICMP Reply can be firewalled. Three User Privileges: Three user privileges are available at Y-Packet: • “Admin”, having full administrator rights on equipment configuration and definition of new users • “Technician”, who is granted the same rights of “Admin” except add/modify/delete new users. It can change only her/his own password. • “Monitor”, having no rights to change equipment configuration. It is allowed to perform only some manual operation for troubleshooting and operation purposes
  • 26. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 26 YOUNCTA 2014 TIMING AND SYNCHRONIZATION [1] Up to Five Configurable NTP Servers For timing purposes, up to 5 NTP Servers can be configured on Y-Terminal to use NTP as synchronization source. Once that the NTP process has been enabled, each of the configured and enabled NTP Servers will be polled by system. One of the NTP servers (NTP Server 1), is marked as “preferred”: this means that, although synchronized with any of the remaining 4 servers, the system will check availability of preferred NTP Server 1 and synch to it where service available. Each of the 5 NTP Servers can be independently enabled/disabled. NTP Server 1 Preferred 1 NTP 2 to 5 Servers 2 3 1 – Y-­‐Packet sends a NTP synchroniza0on request to NTP Server 1 “Preferred”. If not available, then 2 2 – Y-­‐Packet sends a NTP synchroniza0on request to NTP Servers from 2 to 5, synchronizing to the first available one. Although synchronized to NTP server 2...5, a[er some 0me is behaves as 3 3 – Although synchronized, Y-­‐Packet sends again a NTP synchroniza0on request to NTP Server 1 “Preferred”, trying to synchronize to it.
  • 27. Clock-In terminal recovers the clock from the Ethernet interface © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 27 YOUNCTA 2014 TIMING AND SYNCHRONIZATION [2] Transparent Synchronous Ethernet: Y-Packet can support operation within a Synchronous Ethernet network, by allowing the clock propagation from one terminal of the link to the other (Clock Transparency). Synchronous Ethernet can be configured by Y-Terminal as Ethernet-to-Radio (from PoE or SFP interfaces) or Radio-to-Ethernet. The symbol rate of the RF carrier is locked to the in-GE clock in both Master and Slave sides, while the clock recovered from the symbol rate of the received RF signal drives the out-GE clock on the Master side in normal operating conditions. • Slave. Equipment recovers the clock from the incoming Ethernet physical signal and uses that clock both to clock the outgoing Ethernet signal and the transmitted radio bit stream. • Master. Equipment recovers the clock from the incoming radio bit stream and uses that clock for the outgoing Ethernet. Synchronization from Network clock propagation direction Clock-Out terminal recovers the clock from the incoming radio interface and uses the clock for the outgoing Ethernet interface
  • 28. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 28 YOUNCTA 2014 ENVIRONMENT Y-Packet can operate in a temperature range from -33 °C to +50 °C. A new version of Y-Packet C F, named Y-Packet CI FI (I stands for “Ice”), is under development, in order to extend the operating temperature range to -50 °C/+50 °C.
  • 29. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 29 YOUNCTA 2014 Y-PACKET NETWORK DEPLOYMENT EXAMPLE At following slide, you can find a network layout of an existing project deployed by a customer located in New Zealand. Five logical ERPS rings (blue) can be observed in the network, with main segments of the rings realized with Y-Packet radio links. The Y-Packet links interconnect several Indoor equipment running ERPS protocol (i.e. Cisco ASR900 series equipment). Each IDU participates in more than one logical ERPS ring instance. Different services are implemented throughout the network (Rail, Water, IT services), and single and total capacities required over each radio link are marked with different colours. One of the main segments of one ring, moving towards the core network (Masterton DC– Climie) has been deployed as XPIC configuration, to achieve maximum radio bandwidth.
  • 30. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. 30 YOUNCTA 2014 GWRC PROJECT Y-Packet radio link Y-Packet radio links Y-Packet radio links Y-Packet radio links Y-Packet XPIC link Y-Packet radio links
  • 31. © YOUNCTA - Confidential This document is for internal use only and may not be distributed to any third party without authorization. BACK Thank You J W W W . Y O U N C T A . C O M