Motorola Solutions 89FC5808 2.4GHz Fixed Wireless (ISM) User Manual APCMM2ManualIss4Draft

Motorola Solutions, Inc. 2.4GHz Fixed Wireless (ISM) APCMM2ManualIss4Draft

Exhibit D Users Manual per 2 1033 b3

AP_CMM2-UM-enIssue 4 DraftNovember 2003© 2003 Motorola, Inc. All rights reserved. Printed in the U.S.A.Canopy™  Access  PointCluster  and  Gen  II  ClusterManagement  ModuleUSER  MANUAL
AP_CMM2 User Manual   Issue 4 Draft         Page 2 of 48NOTICESImportant Note on ModificationsIntentional or unintentional changes or modifications to the equipment must not be made unless under the express consent of the partyresponsible for compliance.  Any such modifications could void the user’s authority to operate the equipment and will void themanufacturer’s warranty.U.S. Federal Communication Commision (FCC) and Industry Canada (IC) NotificationThis device complies with part 15 of the U. S. FCC Rules and Regulations and with RSS-210 of Industry Canada.  Operation is subjectto the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interferencereceived, including interference that may cause undesired operation. In Canada, users should be cautioned to take note that high powerradars are allocated as primary users (meaning they have priority) of 5250 – 5350 MHz and 5650 – 5850 MHz and these radars couldcause interference and/or damage to license-exempt local area networks (LELAN).This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the U.S. FCCRules and with RSS-210 of Industry Canada.  These limits are designed to provide reasonable protection against harmful interference ina residential installation.  This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used inaccordance with these instructions, may cause harmful interference to radio communications.    If this equipment does cause harmfulinterference to radio or television reception, which can be determined by turning the equipment on and off, the user is encouraged tocorrect the interference by one or more of the following measures: Increase the separation between the affected equipment and the unit; Connect the affected equipment to a power outlet on a different circuit from that which the receiver is connected to; Consult the dealer and/or experienced radio/TV technician for help.FCC IDs and Industry Canada Certification Numbers are listed in the following table:ModuleTypesOperating FrequencyRangeMaximumTransmitterPowerReflector FCC ID Industry CanadaCert NumberSM AP BH ISM 2403-2483 MHz 250mW Allowed on SM and BH ABZ89FC5808 109W-2400SM AP BH U-NII 5250-5350 MHz 200mW Not Allowed ABZ89FC3789 109W-5200SM AP BH U-NII 5725-5825 MHz 200mW Allowed on SM and BH ABZ89FC4816 109W-5700SM AP BH ISM 5725-5850 MHz 200mW Allowed on SM and BH ABZ89FC5804 109W-5700The term “IC:” before the radio certification number only signifies that Industry Canada technical specifications were met.European Community NotificationNotification of Intended Purpose of Product UsesThis product is a two-way radio transceiver suitable for use in Broadband RLAN systems. It uses operating frequencies which are notharmonized through the EC. All licenses must be obtained before using the product in any EC country.Declaration of conformity:Motorola declares the GHz radio types listed below comply with the essential requirements and other relevant provisions ofDirective1999/5/EC.Relevant SpecificationEN 301 893 or similar - radio spectrumEN301489-17 - EMCEN60950 - safetyProduct Details for Products Tested for Compliance with Relevant EC DirectivesModuleTypeBandFrequencyRangeMaximumTransmitterPowerEffective IsotropicRadiated Power(EIRP)Modulation Type Operating Channels Non-overlappingChannelSpacingAccess Point 5.725 to 5.825GHz200mW RMS 1 Watt EIRP High Index 2-levelFSK5745 to 5805 MHz in5 MHz increments20 MHzSubscriberModule5.725 to 5.825GHz200mW RMS 1 Watt EIRP High Index 2-levelFSK5745 to 5805 MHz in5 MHz increments20 MHzSubscriberModule withReflector5.725 to 5.825GHz200mW RMS 63 Watts EIRP High Index 2-levelFSK5745 to 5805 MHz in5 MHz increments20 MHzBackhaul 5.725 to 5.825GHz200mW RMS 1 Watt EIRP High Index 2-levelor 4-level FSK5745 to 5805 MHz in5 MHz increments20 MHz
AP_CMM2 User Manual   Issue 4 Draft         Page 3 of 48Backhaul withReflector5.725 to 5.825GHz200mW RMS 63 Watts EIRP High Index 2-levelor 4-level FSK5745 to 5805 MHz in5 MHz increments20 MHzCanopy can be configured to operate at a range of frequencies, but at this time, only channels from 5745 MHz through 5805 MHz of the5.7 GHz product have been tested for compliance with relevant EC directives. Before configuring equipment to operate outside thisrange, please check with your regulator.Exposure NoteThe Canopy Subscriber Module (SM) must be installed to provide a separation distance of at least 20 cm (7.9 in) from all persons, whenadding the Canopy reflector dish (in the 2.4 or 5.7 GHz band), the reflector dish must be installed to provide a separation distance of atleast 1.5m (59.1 in) from all persons and does not emit a RF field in excess of Health Canada limits for the general population; consultSafety Code 6, obtainable from Health Canada’s website http://www.hc-sc.gc.ca/rpb.In both configurations the maximum RMS power does not exceed 200mW.The applicable power density exposure limit is 10 Watt/m2, according to the FCC OET Bulletin 65, the ICNIRP guidelines, and theHealth Canada Safety Code 6. The corresponding compliance distances referenced above have been determined by assuming worst-casescenarios. The peak power density (S) in the far-field of a radio-frequency source with rms transmit power P and antenna gain G at adistance d is24dGPSπ⋅=In the case of the Canopy SM without reflector, the gain is 8 dBi (a factor of 6.3), so the peak power density equals the exposure limit ata distance of 10 cm. A four-fold additional compliance margin is artificially introduced by doubling the distance to 20 cm.In the case of the Canopy SM with reflector, the gain is 26 dBi (a factor of 400), so the peak power density equals the exposure limit at adistance of about 80 cm. An almost four-fold additional compliance margin is artificially introduced by defining the compliance distanceof 1.5 m. The compliance distance is greatly overestimated in this case because the far-field equation neglects the physical dimension ofthe antenna, which is modeled as a point-source.Software License Terms and ConditionsONLY OPEN THE PACKAGE, OR USE THE SOFTWARE AND RELATED PRODUCT IF YOU ACCEPT THE TERMS OF THISLICENSE. BY BREAKING THE SEAL ON THIS DISK KIT / CDROM, OR IF YOU USE THE SOFTWARE OR RELATEDPRODUCT, YOU ACCEPT THE TERMS OF THIS LICENSE AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS, DONOT USE THE SOFTWARE OR RELATED PRODUCT; INSTEAD, RETURN THE SOFTWARE TO PLACE OF PURCHASE FORA FULL REFUND. THE FOLLOWING AGREEMENT IS A LEGAL AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUALOR ENTITY), AND MOTOROLA, INC. (FOR ITSELF AND ITS LICENSORS).  THE RIGHT TO USE THIS PRODUCT ISLICENSED ONLY ON THE CONDITION THAT YOU AGREE TO THE FOLLOWING TERMS.Now, therefore, in consideration of the promises and mutual obligations contained herein, and for other good and valuable consideration,the receipt and sufficiency of which are hereby mutually acknowledged, you and Motorola agree as follows:Grant of License. Subject to the following terms and conditions, Motorola, Inc., grants to you a personal, revocable, non-assignable,non-transferable, non-exclusive and limited license to use on a single piece of equipment only one copy of the software contained on thisdisk (which may have been pre-loaded on the equipment)(Software). You may make two copies of the Software, but only for backup,archival, or disaster recovery purposes.  On any copy you make of the Software, you must reproduce and include the copyright and otherproprietary rights notice contained on the copy we have furnished you of the Software.Ownership. Motorola (or its supplier) retains all title, ownership and intellectual property rights to the Software and any copies,including translations, compilations, derivative works (including images) partial copies and portions of updated works. The Software isMotorola’s (or its supplier's) confidential proprietary information. This Software License Agreement does not convey to you any interestin or to the Software, but only a limited right of use. You agree not to disclose it or make it available to anyone without Motorola’swritten authorization. You will exercise no less than reasonable care to protect the Software from unauthorized disclosure. You agree notto disassemble, decompile or reverse engineer, or create derivative works of the Software, except and only to the extent that such activityis expressly permitted by applicable law.Termination.  This License is effective until terminated.  This License will terminate immediately without notice from Motorola orjudicial resolution if you fail to comply with any provision of this License.  Upon such termination you must destroy the Software, allaccompanying written materials and all copies thereof, and the sections entitled Limited Warranty, Limitation of Remedies andDamages, and General will survive any termination.Limited Warranty.  Motorola warrants for a period of ninety (90) days from Motorola’s or its customer’s shipment of the Software toyou that (i) the disk(s) on which the Software is recorded will be free from defects in materials and workmanship under normal use and(ii) the Software, under normal use, will perform substantially in accordance with Motorola’s published specifications for that releaselevel of the Software.  The written materials are provided "AS IS" and without warranty of any kind.  Motorola's entire liability and yoursole and exclusive remedy for any breach of the foregoing limited warranty will be, at Motorola's option, replacement of the disk(s),provision of downloadable patch or replacement code, or refund of the unused portion of your bargained for contractual benefit up to theamount paid for this Software License.
AP_CMM2 User Manual   Issue 4 Draft         Page 4 of 48THIS LIMITED WARRANTY IS THE ONLY WARRANTY PROVIDED BY MOTOROLA, AND MOTOROLA AND ITSLICENSORS EXPRESSLY DISCLAIM ALL OTHER WARRANTIES, EITHER EXPRESS OF IMPLIED, INCLUDING BUT NOTLIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ANDNONINFRINGEMENT.  MOTOROLA DOES NOT WARRANT THAT THE OPERATION OF THE SOFTWARE WILL BEUNINTERRUPTED OR ERROR-FREE, OR THAT DEFECTS IN THE SOFTWARE WILL BE CORRECTED.  NO ORAL ORWRITTEN REPRESENTATIONS MADE BY MOTOROLA OR AN AGENT THEREOF SHALL CREATE A WARRANTY OR INANY WAY INCREASE THE SCOPE OF THIS WARRANTY.  MOTOROLA DOES NOT WARRANT ANY SOFTWARE THATHAS BEEN OPERATED IN EXCESS OF SPECIFICATIONS, DAMAGED, MISUSED, NEGLECTED, OR IMPROPERLYINSTALLED. BECAUSE SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF IMPLIEDWARRANTIES, THE ABOVE LIMITATIONS MAY NOT APPLY TO YOU.Limitation of Remedies and Damages.  Regardless of whether any remedy set forth herein fails of its essential purpose, IN NO EVENTSHALL MOTOROLA OR ANY OF THE LICENSORS, DIRECTORS, OFFICERS, EMPLOYEES OR AFFILIATES OF THEFOREGOING BE LIABLE TO YOU FOR ANY CONSEQUENTIAL, INCIDENTAL, INDIRECT, SPECIAL OR SIMILARDAMAGES WHATSOEVER (including, without limitation, damages for loss of business profits, business interruption, loss of businessinformation and the like), whether foreseeable or unforeseeable, arising out of the use or inability to use the Software or accompanyingwritten materials, regardless of the basis of the claim and even if Motorola or a Motorola representative has been advised of thepossibility of such damage.  Motorola's liability to you for direct damages for any cause whatsoever, regardless of the basis of the formof the action, will be limited to the price paid for the Software that caused the damages.  THIS LIMITATION WILL NOT APPLY INCASE OF PERSONAL INJURY ONLY WHERE AND TO THE EXTENT THAT APPLICABLE LAW REQUIRES SUCHLIABILITY.  BECAUSE SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FORCONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU.Maintenance and Support. Motorola shall not be responsible for maintenance or support of the software.  By accepting the licensegranted under this agreement, you agree that Motorola will be under no obligation to provide any support, maintenance or service inconnection with the Software or any application developed by you.  Any maintenance and support of the Related Product will beprovided under the terms of the agreement for the Related Product.Transfer. In the case of software designed to operate on Motorola equipment, you may not transfer the Software to another party except:(1) if you are an end-user, when you are transferring the Software together with the Motorola equipment on which it operates; or 2) ifyou are a Motorola licensed distributor, when you are transferring the Software either together with such Motorola equipment or aretransferring the Software as a licensed duly paid for upgrade, update, patch, new release, enhancement or replacement of a prior versionof the Software. If you are a Motorola licensed distributor, when you are transferring the Software as permitted herein, you agree totransfer the Software with a license agreement having terms and conditions no less restrictive than those contained herein.  You maytransfer all other Software, not otherwise having an agreed restriction on transfer, to another party.  However, all such transfers ofSoftware are strictly subject to the conditions precedent that the other party agrees to accept the terms and conditions of this License, andyou destroy any copy of the Software you do not transfer to that party.  You may not sublicense or otherwise transfer, rent or lease theSoftware without our written consent. You may not transfer the Software in violation of any laws, regulations, export controls oreconomic sanctions imposed by the U.S. Government.Right to Audit. Motorola shall have the right to audit annually, upon reasonable advance notice and during normal business hours, yourrecords and accounts to determine compliance with the terms of this Agreement.Export Controls.  You specifically acknowledge that the software may be subject to United States and other country export control laws.You shall comply strictly with all requirements of all applicable export control laws and regulations with respect to all such software andmaterials.U.S. Government Users.  If you are a U.S. Government user, then the Software is provided with "RESTRICTED RIGHTS" as set forthin subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights clause at FAR 52 227-19 or subparagraph(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013, as applicable.Disputes. You and Motorola hereby agree that any dispute, controversy or claim, except for any dispute, controversy or claim involvingintellectual property, prior to initiation of any formal legal process, will be submitted for non-binding mediation, prior to initiation ofany formal legal process.  Cost of mediation will be shared equally.  Nothing in this Section will prevent either party from resorting tojudicial proceedings, if (i) good faith efforts to resolve the dispute under these procedures have been unsuccessful, (ii) the dispute, claimor controversy involves intellectual property, or (iii) interim relief from a court is necessary to prevent serious and irreparable injury tothat party or to others.General. Illinois law governs this license.  The terms of this license are supplemental to any written agreement executed by both partiesregarding this subject and the Software Motorola is to license you under it, and supersedes all previous oral or written communicationsbetween us regarding the subject except for such executed agreement. It may not be modified or waived except in writing and signed byan officer or other authorized representative of each party. If any provision is held invalid, all other provisions shall remain valid, unlesssuch invalidity would frustrate the purpose of our agreement. The failure of either party to enforce any rights granted hereunder or totake action against the other party in the event of any breach hereunder shall not be deemed a waiver by that party as to subsequentenforcement of rights or subsequent action in the event of future breaches.Hardware Warranty in U.S.Motorola U.S. offers a warranty covering a period of  days from the date of purchase by the customer.  If a product is found defectiveduring the warranty period, Motorola will repair or replace the product with the same or a similar model, which may be a reconditionedunit, without charge for parts or labor.
AP_CMM2 User Manual   Issue 4 Draft         Page 5 of 48IN NO EVENT SHALL MOTOROLA BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY DIRECT, INDIRECT,GENERAL, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY OR OTHER DAMAGE ARISING OUT OF THE USEOR INABILITY TO USE THE PRODUCT (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESSPROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION OR ANY OTHER PECUNIARY LOSS, OR FROMANY BREACH OF WARRANTY, EVEN IF MOTOROLA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.(Some states do not allow the exclusion or limitation of incidental or consequential damages, so the above exclusion or limitation maynot apply to you.) IN NO CASE SHALL MOTOROLA’S LIABILITY EXCEED THE AMOUNT YOU PAID FOR THE PRODUCT.Trademarks, Product Names, and Service NamesMOTOROLA, the stylized M Logo and all other trademarks indicated as such herein are trademarks of Motorola, Inc. ® Reg. U.S. Pat& Tm. Office.  Canopy is a trademark of Motorola, Inc.  All other product or service names are the property of their respective owners.Motorola, IncBroadband Wireless Technology Center50 East Commerce DriveSchaumburg, IL 60173USAhttp://www.motorola.com/canopy
AP_CMM2 User Manual   Issue 4 Draft         Page 6 of 48TABLE OF CONTENTSGETTING STARTED ............................................................................................. 8Welcome ................................................................................................................................................8Intended Use..........................................................................................................................................8Document Change History ....................................................................................................................8PRODUCT DESCRIPTION .................................................................................... 8Operation ...............................................................................................................................................9Configuration..........................................................................................................................................9BACKGROUND INFORMATION on NETWORKING.......................................... 12SYSTEM OVERVIEW AND SITE PLANNING..................................................... 13Site Selection Criteria......................................................................................................................... 14General Considerations...................................................................................................................... 15Channel Plans..................................................................................................................................... 162.4 GHz Recommended Frequencies............................................................................................ 165.2 GHz Recommended Frequencies............................................................................................ 165.7 GHz Recommended Frequencies............................................................................................ 16Single Access Point Module........................................................................................................... 17Single Access Point Cluster ........................................................................................................... 17Multiple Access Points Clusters ..................................................................................................... 17Networking Information ...................................................................................................................... 19Lightning Protection............................................................................................................................ 19Electrical Requirements ..................................................................................................................... 19ADVANCED FEATURES..................................................................................... 20Security - DES Encryption.................................................................................................................. 20Security - AES Encryption.................................................................................................................. 20Bandwidth Management..................................................................................................................... 21High Priority Bandwith ........................................................................................................................ 21Branding.............................................................................................................................................. 22SNMP .................................................................................................................................................. 23INSTALLATION ................................................................................................... 24Unpack the Canopy Products ............................................................................................................ 24Configuration of the Access Point Modules....................................................................................... 24Configuration of the Cluster Management Module ........................................................................... 25Installation of the Equipment.............................................................................................................. 25Verification .......................................................................................................................................... 28CABLING............................................................................................................. 29THE INTERFACE SCREENS .............................................................................. 31Quick Start .......................................................................................................................................... 31Status Page......................................................................................................................................... 32Configuration....................................................................................................................................... 34Canopy Default Plug........................................................................................................................... 38Event Log ............................................................................................................................................ 39LUID Select......................................................................................................................................... 39Link Test.............................................................................................................................................. 40
AP_CMM2 User Manual   Issue 4 Draft         Page 7 of 48Time & Date ........................................................................................................................................ 40Sessions.............................................................................................................................................. 41GPS Status ......................................................................................................................................... 43Ethernet Stats ..................................................................................................................................... 43Expanded Stats................................................................................................................................... 44ACCESSORIES ................................................................................................... 45APPENDIX........................................................................................................... 46SPECIFICATIONS ............................................................................................... 46Access Point Module.......................................................................................................................... 47Cluster Management Module Gen II.................................................................................................. 47Physical ............................................................................................................................................... 47AC Power ............................................................................................................................................ 48DC Power (24V) Option...................................................................................................................... 48DC Power (12V) Option...................................................................................................................... 48Cable Specifications ........................................................................................................................... 48TABLE OF FIGURESFigure 1: Canopy Access Point Module ...................................................................................................9Figure 2: Front view of Cluster Management Module, Installed........................................................... 10Figure 3: Bottom view of Cluster Management Module, Installed........................................................ 11Figure 4: System Wiring Diagram.......................................................................................................... 14Figure 5: Fresnel Zone........................................................................................................................... 15Figure 6: Laying out multiple Access Point clusters ............................................................................. 18Figure 7: Location of 115/230 V Switch................................................................................................. 25Figure 8: Detail of pole mounting........................................................................................................... 26Figure 9: Detail of GPS antenna mounting ........................................................................................... 27Figure 10: Port indicator LED on Ethernet switch................................................................................. 28Figure 11: Quick Start web page ........................................................................................................... 31Figure 12: Status web page ................................................................................................................... 32Figure 13: Configuration web page ....................................................................................................... 34Figure 14: LUID Select web page.......................................................................................................... 39Figure 15: Link Test web page .............................................................................................................. 40
AP_CMM2 User Manual   Issue 4 Draft         Page 8 of 48GETTING STARTEDWELCOMEThank you for your purchase of a Motorola Canopy Access Point cluster and/or ClusterManagement Module. This new technology is the latest innovation in high speed wirelessnetworking.  Some of the Canopy system features are:• Network speeds of 10/100 BaseT• Small compact design• No special set up on your PC.INTENDED USEThis manual is intended to be used with Canopy software release version 3.x or greater.  Theintended audience for this manual is system operators and equipment installers.DOCUMENT CHANGE HISTORYNew in Issue 4:• Modules operating in the 2.4 GHz ISM band are described• One year warrantyNew in Issue 3:• AES product described, along with DES product• 5.7 GHz ISM supports 6 channels (up from 4 with 5.7 GHz U-NII)• 5.7 GHz ISM frequencies approved for use in Canada, as well as US• Maximum power used by an Access Point module increases to 8.4 watts• Shielded cables strongly recommended for all infrastructure cabling connecting APs,BHs, and CMM• MAC addresses of older non-autosensing modules are listed (non-autosensingmodules require correct choice of straight-thru vs crossover cables)New in Issue 2:• Updated Notices section including European Community Notification, RFExposure Note, and Software License Terms and Conditions.• Measurement units internationalized with metric as well as English units• Updates for new hardware features:- Currently shipping modules now auto-sense the Ethernet termination –either a straight-thru or crossover RJ-45 cable can be used to connect toeither a network interface card or hub, switch, or router.- The currently shipping CMM has additional cable openings to ease the useof shielded cable.• References to the Canopy Bandwidth and Authentication Manager (BAM), and theadditional bandwidth and security features it offers beyond the features providedby an Access Point with no BAM in the network.• Specifications changed to reflect expanded lower temperature limit of -40°F (-40°C) for all equipment.• Specifications clarified and edited for CE Listing for European CommunityPRODUCT DESCRIPTION
AP_CMM2 User Manual   Issue 4 Draft         Page 9 of 48OPERATIONThe Canopy Access Point module’s simple design allows for deployment ease.  The CanopyCluster Management Module provides everything necessary to make a system of single or multipleCanopy Access Point modules operational.  It provides power, GPS synchronization and Ethernetconnectivity.CONFIGURATIONAccess Point ModuleAs shown below, the base cover of the module snaps off to expose the Ethernet and GPS syncconnectors as well as diagnostic LEDs.   The base cover is released by depressing a lever on theback side of the base cover.EthernetCableCanopy APRJ45Connector ConnectionLEDsBase CoverRJ11ConnectorEthernetCableBase CoverReleaseLeverBase CoverFigure 1: Canopy Access Point ModuleThe diagnostic LEDs report information about the current status of the Access Point module.   Thefollowing descriptions explain the function of each LED from left to right.LNK:  The link LED displays the status of the Ethernet link to the Canopy module.  The LED will beconstantly lit if there is an Ethernet link present.  The LED is colored green.ACT/4:  The activity LED displays the status of any data activity on the Ethernet link.  The LED willflash (at no particular speed) when data is being transferred on the Ethernet link.  The LED iscolored orange.GPS/3:  The GPS LED displays the status of the sync pulse and is lit constantly when the pulse isbeing received.  The LED is red.SES/2:  The session LED is not used on the Access Point module.  The LED is green.SYN/1:  The sync LED displays sync status.  In short, this LED will lit all the time on an AccessPoint module.  The LED is orange.PWR:  The power LED displays the status of power to the module.  The LED will be constantly lit ifpower is applied correctly.  The LED is red.
AP_CMM2 User Manual   Issue 4 Draft         Page 10 of 48Cluster Management Module generation IIThere are four major assemblies contained inside the Cluster Management Module.  They are theEthernet switch, the power transformer, the interconnect board and the GPS receiver.GPSsyncEthernetEthernet switchExtra fuseDC power connectors AC power connectorsFigure 2: Front view of Cluster Management Module, Installed
AP_CMM2 User Manual   Issue 4 Draft         Page 11 of 48Earlier units had four openings on the bottom of the Cluster Management Module as shown in thefollowing figure. Currently shipping units have two additional Ethernet cable and GPS sync cableopenings, to allow use of thicker, shielded cables.GPS sync cablesN-connector to GPS antennaNetwork feedPower feedEthernet cablesFigure 3: Bottom view of Cluster Management Module, InstalledMains AC power feed should be either 12 AWG or 14 AWG (4 mm2 or 2.5 mm2) wire, with thethicker gauge recommended for longer power runs.
AP_CMM2 User Manual   Issue 4 Draft         Page 12 of 48BACKGROUND INFORMATION ON NETWORKINGComputers are assigned IP addresses by network operators, which have two methods available,static or dynamic IP addressing.  The user of this document will need to understand how IPaddressing is done at their particular location.All Canopy radio products (Subscriber Modules, Access Point Modules, and Backhaul Modules)have the default IP address of 169.254.1.1.  For a computer to talk to Canopy, as it comes from thefactory, either of the following conditions must be met:• If the computer is not configured for DHCP, then it has to have a static IP address onthe 169.254 network (i.e. 169.254.1.5)• If the computer is configured for DHCP, then it will automatically obtain an IP addresson the 169.254 network after minute or two as long as it is not connected to thenetwork.
AP_CMM2 User Manual   Issue 4 Draft         Page 13 of 48SYSTEM OVERVIEW AND SITE PLANNINGDefinitions:Access Point Module – one (1) module that is used to distribute Internet services in a 60-degreesector of up to 200 subscribers.Access Point Cluster – two (2) to six (6) Access Point modules used to distribute Internet service toa community of up to 1200 subscribers.  Each Access Point module will cover a 60-degree sectorfor a total of up to 360 degrees.Cluster Management Module – a module that contains power, GPS timing, and networking for anAccess Point cluster.  Canopy Backhaul Modules can also be connected to the ClusterManagement Module making it the central connectivity point for an entire site.Overview:In the Canopy System, each subscriber module communicates with an Access Point module in anassign time slot that is controlled by the Access Point.  The Access Point module coordinates thedata needs of the subscriber in both the downlink and the uplink to allow for seamlesscommunication throughout the entire network.Access Point modules use a multipoint protocol to communication with each of the subscribermodules registered in the system.  Access Point modules can be deployed in the 2.4, the 5.2 GHz,or the 5.7 GHz band allowing for a very versatile system architecture to reach out through the last-mile to all potential customers.The maximum connection distances are shown in the following table:Band Passive Reflector on SM? Maximum range2.4 GHz No 5 miles (8 km)2.4 GHz Yes 15 miles (24 km)5.2 GHz Not allowed 2 miles (3.6 km)5.7 GHz No 2 miles (3.6 km)5.7 GHz Yes 10 miles (16 km)Note: Distances will  based on terrain and other line of sight issues.To bring a network feed out to a remotely located Access Point cluster, the Canopy BackhaulModule can be used to create a point-to-point link out to the location.  The Canopy BackhaulModule will interface with the Cluster Management Module to seamlessly integrate the entiresystem.  For more information on the Canopy Backhaul Module see its user manual.The Cluster Management Module is key to the operation of the Canopy System.  At one cluster siteor throughout the system the Cluster Management Module provides a GPS timing pulse to eachmodule so that their transmission cycles are synchronized.  If one Access Point module were to notbe synchronized then it may be transmitting during a receive cycle of the other modules and causethe receiver to be desensitized. This is also true of the Canopy Backhaul timing master Modules.
AP_CMM2 User Manual   Issue 4 Draft         Page 14 of 48System Wiring DiagramAP Installation KitAP unitsGPS sync & Ethernetcables from each unit*GPS antennaGPS antennacable* Cables from only 1 sector are shown in diagram.  There are 2 cables,Ethernet and GPS sync, that would connect each sector unit to the APInstallation kit.AC or DCpower inNetwork Connectioningroundingsystem300SSoptionalbackhaul moduleFigure 4: System Wiring DiagramSITE SELECTION CRITERIAThere are various issues that need to be taken into consideration when choosing a location for thenetwork infrastructure.  The following is a list of those considerations.  There may be others, aseach site is unique.• Height is essential when installing Canopy Access Points.  The Canopy Access Pointmodules must be mounted higher than other objects located immediately around themsuch as trees, buildings, and tower legs, but at least 2 feet (0.6 m) below the highestpoint on the tower or pole for lightning protection.• There should be no obstructions that will interfere with the unit’s internal antenna.  Thearea immediately in front of an Access Point module must be clear of all obstructions.• Will the installation area change in the future?  Will there be structures high enough tointerfere with the signal?  Will trees grow into the line-of-sight path?• When possible, avoid high RF energy sites (i.e. AM/FM stations, high poweredantennas, etc.)  Do not place Canopy equipment in the same plane as other RFequipment.• The means used by the installer to attach the Access Point cluster to the tower,rooftop, or pole should be rigid and should not move or flex due to wind or othervibrations.• Tower availability…will a tower have to be erected?• There must be grounding systems available for protection of the Canopy equipment.ClusterManagementModule
AP_CMM2 User Manual   Issue 4 Draft         Page 15 of 48• Lighting arrestors are required in installation area to transport lightning strikes awayfrom equipment.GENERAL CONSIDERATIONSFresnel Loss - The Fresnel Zone is a theoretical area around the line of sight of an antennatransmission that can affect the signal strength.  Objects that penetrate the Fresnel Zone cancause fading of the transmitted signal.  This fading is caused by the cancellation of the signal dueto out-of-phase reflections and absorption of the signal.  An unobstructed line of sight is important,but it is not the only determination of an adequate placement.  Even though the path has a clearline of sight, if obstructions (such as terrain, vegetation, metal roofs, cars, etc.) penetrate theFresnel zone, there may be signal loss.  The following illustrates a Fresnel zone.Fresnel ZoneTransmitter ReceiverD1 D2Figure 5: Fresnel ZoneFree Space Path Loss – As an RF signal travels through space, it is attenuated by the distancefrom the initial transmission point.  The farther away from the transmission point, the weaker the RFsignal.Foliage Loss – Tree and plant foliage will cause additional signal loss.  Seasonal density, moisturecontent of the foliage, and other factors such as wind may change the amount of loss.  Cautionshould be used when a link may transmit though this type of environment.Carrier to Interference – describes how much signal advantage must be engineered into the radiolink to tolerate an interfering transmission.How many Access Point clusters are being planned for deployment?  Each cluster will need touse a Cluster Management Module for seamless operation within the entire Canopy System.How many Access Point modules are being planned for each site in the deployment?  AccessPoint modules can be distributed; they do not necessarily have to be mounted immediately next toeach other for operation.  For example, if the site is a three-legged tower, two Access Pointmodules can be mounted to each of the tower legs.How will the subscriber modules be deployed relative to planned Access Point clusters?
AP_CMM2 User Manual   Issue 4 Draft         Page 16 of 48CHANNEL PLANSWhether using 2.4, 5.2, or 5.7 GHz modules, frequencies should never be placed closerthan 20 MHz.  5.2 and 5.7 GHz modules allow the operator to chose frequencies every 5MHz. 2.4 GHz modules allow the operator to chose frequencies every 2.5 MHz. This isso that in the event of co-location with other equipment the operator can customize thechannel layout for interoperability.Backhauls and APs operating in the same frequency band (within the 2.4 GHz band, within the 5.2GHz band, or within the 5.7 GHz band) need 100 feet (30 m) of physical separation, as theirdifferent transmit and receive frame structures otherwise would cause interference.2.4 GHz Recommended FrequenciesThe following are the 3 non-overlapping channels that are recommended by the Canopy team foruse with an Access Point cluster:• 2.415 GHz• 2.435 GHz• 2.4575 GHzNote this gives 20 MHz of separation between one pair of channels, and 22.5 MHz of separationbetween the other pair. Depending on the RF environment you are operating in, you may want toput the middle channel at 2.4375 GHz and give additional separation between it and the 2.435 GHzchannel, or move the top channel down to 2.455, or the bottom channel up to 2.4175, as long asyou maintain at least 20 MHz of separation between channels. You can use the Spectrum Analysisfeature in an SM or BHS, or a standalone spectrum analyzer, to help evaluate the RF environmentand guide you in site-specific frequency engineering.5.2 GHz Recommended FrequenciesThe following are the 3 non-overlapping channels that are recommended by the Canopy team foruse with an Access Point cluster:• 5.275 GHz• 5.300 GHz• 5.325 GHz5.7 GHz Recommended FrequenciesThe following are the 6 non-overlapping channels that are recommended for use in an AccessPoint cluster when the ISM frequencies are available. Note: only 3 channels are actually neededfor the fully populated cluster. Any of the six channels can also used for backhaul point-to-pointlinks:• 5.735 GHz• 5.755 GHz• 5.775 GHz• 5.795 GHz• 5.815 GHz• 5.835 GHzCanopy 5.7 GHz modules can operate up to 5.840 GHz. If your frequency engineering plan allows,consider using the additional 5 MHz of separation between your AP frequencies and your backhaulfrequencies.
AP_CMM2 User Manual   Issue 4 Draft         Page 17 of 48Single Access Point ModuleA single Access Point module can use any of the frequency channels that are available.Single Access Point ClusterUse the following table as a recommendation to assign frequency channels and sector IDs (seesection on Configuration interface screen for information on sector IDs).  Each frequency is reusedon the sector that is at a 180-degree offset.  Symbol refers to the layout in the diagram below(Figure 6).2.4 GHz PlanDirection of Access PointsectorFrequency Sector ID SymbolNorth – (0°) 2.415 GHz 0 ANortheast – (60°) 2.435 GHz 1 BSoutheast – (120°) 2.4575 GHz 2 CSouth – (180°) 2.415 GHz 3 ASouthwest – (240°) 2.435 GHz 4 BNorthwest – (300°) 2.4575 GHz 5 C5.2 GHz PlanDirection of Access Point sector Frequency Sector ID SymbolNorth – (0°) 5.275 GHz 0 ANortheast – (60°) 5.300 GHz 1 BSoutheast – (120°) 5.325 GHz 2 CSouth – (180°) 5.275 GHz 3 ASouthwest – (240°) 5.300 GHz 4 BNorthwest – (300°) 5.325 GHz 5 C5.7 GHz PlanDirection of Access Point sector Frequency Sector ID SymbolNorth – (0°) 5.735 GHz 0 ANortheast – (60°) 5.755 GHz 1 BSoutheast – (120°) 5.775 GHz 2 CSouth – (180°) 5.735 GHz 3 ASouthwest – (240°) 5.755 GHz 4 BNorthwest – (300°) 5.775 GHz 5 CMultiple Access Points ClustersWhen deploying multiple Access Point cluster in a given area it is recommended that the clustersbe aligned in the following manner.
AP_CMM2 User Manual   Issue 4 Draft         Page 18 of 48ABCABCABCABCABCABCABCABCABCABCABCABCABCABCFigure 6: Laying out multiple Access Point clusters
AP_CMM2 User Manual   Issue 4 Draft         Page 19 of 48NETWORKING INFORMATIONThe Canopy Access Point module will each use an IP address on the operator’s network.  It isrecommended that the Access Point modules never be placed directly onto the Internet.  IPaddresses may be assigned sequentially clockwise around an Access Point cluster for easiermanageability.  The operator will also need to identify the appropriate subnet mask and networkgateway each of the modules.From the factory, each Access Point module is assigned a unique MAC address and the followingdefault networking information:• IP address of 169.254.1.1• Subnet mask of 255.255.0.0• Network gateway of 169.254.0.0LIGHTNING PROTECTION• The Canopy Access Point module, Cluster Management Module, and GPS antenna mustbe mounted at least 2 feet below the highest point at the site for lightning strike mitigation.It is highly recommended that the site have a lightning protection system installed.• Ensure the location is properly grounded for lightning protection according to all applicablenational and local codes.• To protect operator equipment from surges on the Ethernet cable that is connected to theCanopy System, the Canopy surge suppressor must be used.ELECTRICAL REQUIREMENTS• Specifications for the voltages and distance can be found in the Specification section ofthis manual.• There is a fuse in the CMM for short-circuit protection. In addition, good electrical practicerequires a circuit breaker in the electrical circuit supplying the CMM, or other means toprovide a disconnect device and back-up short-circuit protection.• Make certain the installation conforms to applicable country and local codes, such as the .National Electrical Code (NEC) in the US. If uncertain of code requirements, obtain theservices of a licensed electrician.
AP_CMM2 User Manual   Issue 4 Draft         Page 20 of 48ADVANCED FEATURESThese features may be used in the Canopy System but are not required for basic operation.SECURITY - DES ENCRYPTIONStandard Canopy modules provide Data Encryption Standard (DES) encryption. DES is a secretkey encryption scheme using a 56 bit key. The basics of DES are that it performs a series of bitpermutations, substitutions, and recombination operations on blocks of data using a secret key.On the Canopy system, encryption of the over the air link is enabled or disabled per Access Pointmodule or per Backhaul timing master module. The Canopy modules contain unique factoryprogrammed secret keys to establish the encrypted link. If an authentication key (must be the samekey on each end of the backhaul link) has been entered using the Backhaul Configuration page,then that key is also used to establish the DES encryption key. Encryption does not affect theperformance or throughput of the system.SECURITY - AES ENCRYPTIONMotorola also offers Canopy products that provide Advanced Encryption Standard (AES)encryption. Like DES, AES is a secret key encryption scheme, but AES uses the Rijndael algorithmand 128 bit keys to establish a higher level of security than DES.Due to the level of security provided by AES, the US government has established export controlson communications products that use AES. These export controls may mean that outside of the USAES products are only available in certain regions – check with your Canopy distributor or resellerfor availability in your area.Canopy AES products run the same software as DES products, so the features available areexactly the same and work the same with the only exception being that the AES products provideAES instead of DES encryption when enabled for encryption on the Configuration screen. All theinterface screens, Status pages, Configuration pages, etc. are identical. As new software featuresbecome available on DES products, the same software and the same features will be available forAES products.DES backhauls are available in both 10 Mbps and 20 Mbps signaling rates. AES backhauls areonly available with a 10 Mbps signaling rate.Canopy DES products are not upgradeable to AES. To have the option of AES encryption, youmust purchase AES products.Canopy AES products use a different FPGA load than DES products. However, the FPGA will beupgraded as needed to provide new features or services similar to the DES products.The same as with DES, encryption of the over the air link is enabled or disabled per Access Pointmodule or per Backhaul timing master module. The Canopy modules contain unique factoryprogrammed secret keys to establish the encrypted link. If an authentication key (must be the samekey on each end of the backhaul link) has been entered using the Backhaul Configuration page,then that key is also used to establish the AES encryption key.Canopy AES products and DES products do not interoperate when enabled for encryption, as DESand AES are different encryption schemes. An AES AP with encryption enabled can onlycommunicate with AES SMs, and similarly an AES Backhaul timing master module with encryptionenabled can only communicate with an AES Backhaul timing slave module. However, if encryptionis disabled, AES modules can communicate with DES modules.
AP_CMM2 User Manual   Issue 4 Draft         Page 21 of 48BANDWIDTH MANAGEMENTSubscriber Module bandwidth management is set per Access Point.  All Subscriber Modules whichregister to an Access Point module will receive and use the same bandwidth managementinformation.The software uses  “token buckets” to manage each subscriber’s bandwidth.  Each subscriber’sbucket (actually two buckets, one for uplink and one for downlink) is constantly being filled withtokens at the Sustained rate, up to the Burst size (the size of their bucket). When they use theinternet, they have full bandwidth until they “drain” their bucket, then they only have the Sustainedrate, until they quit draining their bucket, and let it refill a bit.After a burst is fully or partially used, it then “recharges” at the Sustained rate. Short burstsrecharge quickly, often before the next burst. Large bursts take longer to recharge.The way bandwidth management appears to the subscriber is that as long as they are doingnormal web browsing and e-mail handling, small file transfers, and short streaming video, they willrarely be speed limited, depending on what the bandwidth management is set to. If they do largedownloads (software upgrades, streaming video, and so on), or a series of medium-sizedownloads, they will have high bandwidth until they hit the burst limit, then drop down in speed tothe sustained setting. When they are idle, the burst limit will then “recharge” at the sustained rate.To manage bandwidth separately for each SM, Canopy offers the Bandwidth and AuthenticationManager (BAM). The BAM supports per-SM setting of Sustained Uplink, Sustained Downlink,Uplink Burst, and Downlink Burst, as well as SM authentication and user-specification of DES keys.The BAM is a Canopy software product running on a networked Linux PC.HIGH PRIORITY BANDWITHTo support traffic with a low latency requirement such as VoIP (voice over IP), the Canopy Systemimplements a high priority data pipe.  This implementation does not affect the inherent latencies inthe Canopy System but allows high priority traffic to be serviced immediately.  The high priority pipeseparates low latency trafiic from traffic that is latency tolerant such as standard web surfing andfile downloads.  This traffics is separated by the Canopy System via the IPv4 TOS (type of service)Low Latency bit.  If this bit is set, the packet will be sent on the high priority pipe.  This pipe isserviced before any normal priority traffic.The high priority system is enabled via four fields found in the Configuration web page.  The fieldsare:• High Priority Uplink Percentage• Uacks Reserved High• Dacks Reserved High• NumCtrlSlots Reserved HighThe High Priority Uplink Percentage parameter describes the percentage of the uplink bandwidththat will be dedicated to low latency traffic.  When set, this percentage of RF link bandwidth will bepermanently allocated to low latency traffic regardless of the amount of this kind of traffic present.There is no corresponding downlink parameter as this bandwidth is allocated on as-needed basisby the scheduling algorithms.The UAcks (Uplink ACK) Reserved High parameter describes the number of slots used toacknowledge high priority data that is received by a subscriber module.  The Canopy teamrecommends that this parameter be set to 3 and then the TotalNumUAcksSlots parameter shouldbe set to 6.
AP_CMM2 User Manual   Issue 4 Draft         Page 22 of 48The DAcks (Downlink ACK) Reserved High parameter describes the number of slots used toacknowledge high priority data that is received by an Access Point module.  The Canopy teamrecommends that this parameter be set to 3 and NumDAckSlots parameter should be set to 6.The NumCtrlSlots Reserved High parameter describes the number of slots used to send controlmessages to an Access Point module.  The Canopy team recommends that this parameter be setto 3 and the NumCtlSlots parameter should be set to 6.When all these parameters are configured, all high priority traffic in the uplink direction will beserviced via this pipe at the percentage configured.  This is true even if the high priority trafficvolume exceeds the configured capacity and there is no non-high priority traffic.BRANDINGOn each Canopy module, the web-based interface screens have a Canopy logo that can bereplaced with an operator’s company logo.  The Canopy logo file is called canopy.jpg and thereplacement file must also be called canopy.jpg.  The new file is transferred via FTP to the moduleand then added to a special filesystem through a telnet session.  The following command can beused during a telnet session:• addwebfile – add a custom logo file to the filesystem• clearwebfile – clear the customer logo file from the filesystem• lsweb – list the custom logo file and display the storage space available on the filesystemThe following is a sample FTP session:> ftp 169.254.1.1Connected to 169.254.1.1220 FTP server readyName (169.254.1.1:none): root331 Guest login okPassword: <password-if-configured>230 Guest login ok, access restrictions apply.ftp> binary200 Type set to Iftp> put canopy.jpgftp> quit221 GoodbyeThe following is a sample telnet session:/---------\C A N O P YMotorola Broadband Wireless Technology Center(Copyright 2001, 2002 Motorola Inc.)Login: rootPassword: <password-if-configured>Telnet+> lswebFlash Web filesfree directory entries: 32free file space     64336 bytesTelnet+> addwebfile canopy.jpgTelnet +> lswebFlash Web files/canopy.jpg     7867free directory entries: 31free file space: 56468
AP_CMM2 User Manual   Issue 4 Draft         Page 23 of 48Telnet +> clearwebfileTelnet+> lswebFlash Web filesfree directory entries: 32free file space     64336 bytesSNMPSimple Network Management Protocol (SNMP) can be used to monitor the Canopy modules.  Thestandard MIB-II (systems and interfaces) objects are programmed into the modules.  For specificinformation on this MIB see RFC 1213 for details.With Canopy Release 3.2, the Canopy Enterprise MIB is available for additional informationreporting and control. Consult the Release 3.2 Software Release Notes for additional information.
AP_CMM2 User Manual   Issue 4 Draft         Page 24 of 48INSTALLATIONThe following steps are required to install the Canopy Access Point module(s), the ClusterManagement Module, and the GPS antenna:• Unpack the Canopy products• Configuration of the Access Point modules• Configuration of the Cluster Management Module• Installation of the Access Point modules, Cluster Management Module, and GPS antenna• VerificationUNPACK THE CANOPY PRODUCTSUpon receipt, carefully inspect all shipping boxes for signs of damage.  If there is damage,immediately notify the transporatation company.Unpack equipment, making sure that all ordered components have arrived.  It is recommended thatyou save all the packing materials.  They can be used for transportation of the equipment to andfrom installation sites.CONFIGURATION OF THE ACCESS POINT MODULESIn all cases, for configuration changes to take effect, the operator must1. Make the configuration change or changes on a module’s web page.2. Save the configuration change or changes, using the Save button.a. Make and Save additional configuration changes if desired.3. Reboot the module, using the Reboot button.The configuration changes don’t take effect until the module is rebooted.The are two methods that can be used to configure each of the Access Point modules.  The firstmethod is to use the Quick Start feature of the product.  For more information on Quick Start seeThe Interface Screens.  The second is to manually set each of the parameters.The Access Point module, from the factory, is configured to not transmit on any frequency.  This isdone so that an operator does not accidentally turn on an unsynchronized Access Point module.An operator will need to verify the following information:• Will the Access Point module need to generate its own sync pulse or will it receive itfrom the Cluster Management Module?• The operator will assign a RF frequency for the module to transmit.• The operator may assign value for uplink and downlink bandwidth capping.  If theAccess Point module is in a cluster with other modules then this parameters on allunits must be set exactly the same.• The operator will assign an IP address to the module for the network it will be installedon and assign an appropriate subnet mask and network gateway.• The operator must configure the appropriate color code on the Access Point module sothat subscriber modules can register with it.  The color codes must match forregistration.• The operator must configure the maximum range that the Access Point module willregister a subscriber module.  If the Access Point module is in a cluster with othermodules then this parameter on all units must be set exactly the same.• The operator can prevent unauthorized users from connectig to the Access Pointmodule’s web based interface by assigning a password.  There is no default passwordand password protection is turn off is turn off from the factory.
AP_CMM2 User Manual   Issue 4 Draft         Page 25 of 48- Passwords can be from 1 to 16 characters.  Any combination of charactersis allowed, except for these special characters: “ , . ‘ { } / \ ; : [ ] ( ) ` ~- NOTE:  If the operator forgets either the password or the IP address forthe module, a Canopy default plug can be used to regain access.  Fordetails, see the section on the default plug under Interface Screens.- There are two types of passwords that can be configured: display-only orfull-access.  The display-only password allows the operator to view themodule’s current status.  The full-access password allows the operator toview the module’s current status and change its configuration.  By viewingthe red lettering to the right of the entry fields, the operator can tell that apassword is set, but can’t see the password.• The operator can enter information about the Site Name, Location, and Contact.  Thisis optional.CONFIGURATION OF THE CLUSTER MANAGEMENT MODULEThe operator will need to verify the following when configuring a Cluster Management Module:• What type of power will the module use, AC or DC?• If using AC power, there is a switch to choose 115V or 230V on thepower transformer. This switch must be set correctly before power isapplied, or the unit may be damaged. See the schematic inside theCluster Management Module for further information.115/230 V switchAC powerconnectorsFuse receptacleFigure 7: Location of 115/230 V Switch• The AC power connectors are labeled- N for Neutral- L for Line- PE for Protective Earth (PE)   (ground)•  The maximum thickness wire to be used is 12 AWG (4 mm2).INSTALLATION OF THE EQUIPMENTThe following tools may be needed during installation:• 3/8” nut driver
AP_CMM2 User Manual   Issue 4 Draft         Page 26 of 48• 12” adjustable wrench• 7/16” wrench for installation of GPS mounting bracket• 14mm wrench for installation of Cluster Management Module pole-mounting brackets• Needle-nose pliersWhen power is applied to a Canopy module or the unit reset via the web-based interface, themodule will take approximately 25 seconds to boot up.  During this boot up time, power on self-tests and other diagnostics are being performed.The following steps are needed to install the Canopy equipment:• Remove the base cover from all Canopy Access Point modules to be installed.• Remove the GPS sync cable knockout from the base cover with needle-nose pliers.• Mount the Access Point modules:- The modules can  be mounted in a variety of locations, choose the best locationfor your particular application.  Modules do not have to mounted directly next toeach other, they can be distributed throughout a given site.  Mounting can be doneby using stainless steel hose clamps or another equivalent fastener.• Mount the Cluster Management Module- Mount the module in a location that will allow access for service if necessary.- The farthest that the Access Point modules can be from theCluster Management Module is 328 feet (100 meters).- The module should not be mounted closer than 10 feet (3 meters) to the AccessPoint modules or Backhaul Modules- The module box has flanges for ease of installation. Hardware is included tosupport different mounting options:- Directly to a wall (screws or bolts not included)- Around irregular shaped objects (via adjustable stainless steel bands,included)- To a pole with an outside diameter of 1.25 to 3.00 inches(approximately 3 to 8 cm). (toothed V brackets, included).                              Figure 8: Detail of pole mounting• Mount the GPS antenna- The GPS antenna must be located so that it has an unobstructed view of the sky (20-degrees off the horizon) and is not the highest item at the installation site (forlightning).- The GPS antenna mount is provided with U-bolts for pole sizes of 1.25 to 1.50 inches(approximately 3 to 4 cm).
AP_CMM2 User Manual   Issue 4 Draft         Page 27 of 48                          Figure 9: Detail of GPS antenna mounting• Route the Ethernet cables from the Access Point modules to the Cluster Management Module.The strain relief plugs on the CMM already have precut holes.  Each hole of the strain relief isdesigned to hold two CAT 5 UTP cables, or one if it is shielded cable.- The Ethernet cables use RJ-45 connectors (standard Ethernet) that connect tomatching ports within the Cluster Management Module.  The ports are labeled with a“J3”.  Always connect modules starting at port 1.  This port is the master port forthe CMM.- A total of 8 ports are available on the Cluster Management Module to accommodateany combination of Access Point modules and Backhaul Modules.- Connect the remaining Ethernet cables in the same manner.• Route the GPS sync (serial) cables from the Access Point modules to the Cluster ManagementModule.- The GPS sync cables use 6 conductor RJ-11 connectors that connect to matchingports within the Cluster Management Module.   The ports are labeled with a “J1”.Always connect modules starting with port 1.  This port is the master port for theCMM.- Connect the remaining GPS sync cables in the same manner.• If necessary, route a network cable into the Cluster Management Module and connect to theuplink port on the switch.  As with any such installed devices, proper grounding of the Ethernetcable is necessary.  The Canopy Surge Suppressor is such a device for this situation.• Connect GPS coax cable to N-connector on the outside of the Cluster Management Module.• Connect AC or DC power to the Cluster Management Module.• When power is applied the “power” LED on the Ethernet switch should come on as well agreen LED on the circuit board as show in the following figure.
AP_CMM2 User Manual   Issue 4 Draft         Page 28 of 48                                    Figure 10: Port indicator LED on Ethernet switch• Verify that all of the Access Point modules are reliably connected to the Ethernet switch byobserving that each port indicator LED on the Ethernet switch is lit.• Replace the base cover on all of the Access Point modules.• Close and lock the Cluster Management Module.All Canopy modules connected to the Cluster Management Module must be configured to“Sync to Received Signal”.  Otherwise GPS timing pulse will not be transmitted to themodules.VERIFICATION• Access the web based interface for each Access Point module by opening up http://<ip-address> where the <ip-address> is the address of the individual module.• Click on “GPS Status” from the menu located on the left hand side of the web page.• Verify that the Access Point module is seeing and tracking satellites.  The module must betracking at least 4 satellites for the timing pulse to be generated.• Take a subscriber module into the area surrounding the newly installed Access Point clusterand verify that the subscriber module registers to each of the installed Access Point modules.The subscriber must have the same color code as the Access Point for successful registration(assuming that there is also a clear line-of-sight).• When the subscriber module is registered, verify the following:- Frequency of the Access Point module registered to- Sector ID of the Access Point module registered to- Physical position of the Access Point Module registered toIf the information that is reported back does not conform to your initial deployment plan, reconfigurethe Access Point cluster to bring it into compliance.
AP_CMM2 User Manual   Issue 4 Draft         Page 29 of 48CABLINGIt is strongly recommended to use shielded cable for all Canopy infrastructure cabling associatedwith Backhauls, Access Points, and Cluster Management Modules. The environment thesemodules operate in often has significant or unknown or varying RF energy, and experience hasbeen that the additional cost of shielded cabling is more than compensated by predictableoperation and reduced debugging and support costs.The following information describes the wiring standards for installing a Canopy system.  Alldiagrams use the EIA/TIA 568B color standard.Currently shipping modules auto-sense the Ethernet cable type – either RJ-45 straight-thru cable orRJ-45 crossover cable can be used to connect a network interface card (NIC), hub, router, orswitch to a module.The following table shows MAC Addresses of Auto-sensing modules:MAC Address (ESN) Non-auto-sensing Auto-sensing2.4 Modules All5.2 Modules ≤ 0a003e0021c8 ≥ 0a003e0021c95.7 Modules ≤ 0a003ef00f79 ≥ 0a003ef00f7aVery early modules did not auto-sense. In cases where older modules are used:• When connecting a Canopy device directly to a network interface card (NIC)use a RJ-45 straight-thru cable.• When connecting a Canopy device directly to a hub, switch, or router use a RJ-45crossover cable.When using the Canopy AC wall adapter the +V is +11.5VDC to +30VDC with a nominal value of+24 VDC, and the maximum Ethernet cable run with the AC wall adapter is 328 feet (100 meters).RJ-45 Straight-Thru: pin 1 →    white / orange    ← pin 1 pin 2 →    orange      ← pin 2 pin 3 →    white / green  ← pin 3 pin 4 →    blue ← pin 4 pin 5 →    white / blue ← pin 5 pin 6 →    green      ← pin 6 pin 7 →    white / brown ← pin 7 pin 8 →    brown      ← pin 81234567812345678TX+TX-RX+RX-TX+TX-RX+RX-+V+VreturnPin PinRJ-45 Straight-Thru+V+VreturnPins 4, 5, 7, and 8 are used to carry power to the Canopy modules.
AP_CMM2 User Manual   Issue 4 Draft         Page 30 of 48RJ-45 Crossover: pin 1 →    white / orange    ← pin 3 pin 2 →    orange      ← pin 6 pin 3 →    white / green  ← pin 1 pin 4 →    blue ← pin 4 pin 5 →    white / blue ← pin 5 pin 6 →    green      ← pin 2 pin 7 →    white / brown ← pin 7 pin 8 →    brown      ← pin 878TX+TX-RX+RX-36145278RX+RX-TX+TX-123456+Vreturn+V +V+VreturnPin PinRJ-45 CrossoverPins 4, 5, 7, and 8 are used to carry power to the Canopy modules.RJ-11 Straight-Thru (for GPS sync cable)Using CAT 5 cable and 6-pin RJ-11 connectors, the following diagram shows the wiring of thecable for GPS sync. pin 1 → white / orange    ← pin 1 pin 2 → white / green  ← pin 2 pin 3 → white / blue  ← pin 3 pin 4 → green  ← pin 4 pin 5 → blue  ← pin 5 pin 6 → orange    ← pin 6 the 4th pair is not used1234561234561-ppsTX+RX+gnd1-ppsRX+TX+gndnotusednotusednotusednotusedPin PinRJ-11 Straight-Thru
AP_CMM2 User Manual   Issue 4 Draft         Page 31 of 48THE INTERFACE SCREENSThe Canopy Access Point module contains a series of web pages that are used to interface to theunit.  The following is a quick reference to interface screens.  Note:  These screens are subject tochange by subsequent software versions.  To access the web based interface you first must be ona computer that is in some way connected to the Access Point module.  This can be done eitherdirectly or through a network.  Enter the IP address of the Access Point module (default is169.254.1.1) into the address bar of your browser and hit enter on your keyboard.  The followingweb based interface pages are accessible:• Quick Start• Status• Configuration• Event Log• LUID Select• Link Test• Time & Date• Sessions• GPS Status• Ethernet Stats• ExtendedStatsQUICK STARTFigure 11: Quick Start web pageThe Canopy System consists of a family of highly flexible, fixed wireless access devices that canbe put into service quickly and with a minimal configuration. The Quick Start is a wizard that walksthe operator through that configuration. To place an Access Point module into operation, only threeparameters need to be configured:• RF Carrier Frequency• Synchronization• Network IP Address
AP_CMM2 User Manual   Issue 4 Draft         Page 32 of 48Each of the pages in the Quick Start will explain a little about Canopy and ask the operator for achoice that best addresses the network requirements. At the end, the operator will be given theopportunity to review the configuration selected and save it to non-volatile memory. None of thechanges made prior to saving the configuration will affect the system so experimentation with theinterface is encouraged.STATUS PAGEFigure 12: Status web pageThe Status page contains information on the operation of the product.  It is the default web page.The following parameters are displayed:Device Type:  displays the type of Canopy module that is currently being viewed.  This field will letthe operator know the frequency band of the module, the protocol that it is utilizing, and the MACaddress of the module.  The frequency band can either be in the 5.2 GHz or 5.7 GHz band.Software Version:  displays the version of the software that is currently loaded into the module.Please make note of this information when obtaining technical support.FPGA Version:  displays the version of the FPGA (field programmable gate array) that is currentlyloaded into the module.  Please make not of this information when obtaining technical support.Uptime:  displays the length of time the module has been operating since power was applied.System Time:  displays the current time.  If the Access Point module is connected to a ClusterManagement Module (CMM) then the time will be Greenwich Mean Time (GMT).  Any subscribermodule that registers to the Access Point module will inherit the system time.Ethernet Interface:  displays the configuration of the Ethernet interface on the module.Registered SM Count: displays the number of subscriber modules currently registered to theAccess Point module.
AP_CMM2 User Manual   Issue 4 Draft         Page 33 of 48GPS Sync Pulse Status:  displays the current status of the type of synchronization the AccessPoint module is receiving.  There are 3 values that could be displayed:• Generating sync:  If the module is set to generate its own sync pulse then this message willbe displayed.• Receiving Sync:  If the module is set to receive a sync pulse from an outside source (notitself) and is actually receiving the pulse then this message will be displayed.• ERROR: No Sync Pulse:  If the module is set to receive a sync pulse from an outsidesource (not itself) and it is currently not receiving the pulse this message will be displayed.When this message is displayed the Access Point module will turn its transmitter off so asto not create any self-interference within the Canopy System.Radio Slicing Value:  displays information to be used be Canopy technical support.Radio Transmit Gain Setting:  displays information to be used by Canopy technical support.Site Name:  displays information relating to the name of the physical module.  This parameter canbe set by the operator on the Configuration web page. This information is set into the sysNameSNMP MIB-II object and can be polled via a SNMP management server.Site Contact:  displays contact information for the physical module.  This parameter can be set bythe operator on the Configuration web page. This information is set into the sysContact SNMP MIB-II object and can be polled via a SNMP management server.
AP_CMM2 User Manual   Issue 4 Draft         Page 34 of 48CONFIGURATIONFigure 13: Configuration web pageThe Configuration web page contains information and configurable parameters pertaining to theoperation of the product.  The first line of information on the Configuration screen is a repeat of theDevice Type from the Status web page.  The following are the parameters and their descriptions.Sync Input:  choose the type of synchronization that this Access Point module will use.If “Sync to Received Signal” is chosen, then it is assumed that:• this Access Point module it connected to a Cluster Management Module and will bereceiving a sync pulse via GPS• this Access Point module is connected to another Access Point module that is generatingits own sync pulse. If “Generate Sync Signal” is chosen then it is assumed that:• this Access Point module is a stand-alone module with no other Access Point moduleswithin a 5 mile radius.• this Access Point module is generating the sync pulse for a cluster of Access Pointmodules and there are no other Access Point modules within a 5-mile radius.Link Negotiation Speeds:  choose the type of link speed desired for the Ethernet connection.  Thedefault for this parameter is for all the choices to be checked.RF Frequency Carrier:  choose the frequency that the module will transmit on.  The default fromthe factory is to have this parameter set to none.Downlink Data:  choose the percentage of the aggregate throughput that is needed for thedownlink (i.e going from the Access Point module to the subscriber).  For example, if the aggregatethroughput on the Access Point module is 6 Mbits, then configuring this parameter for 75% willallocate 4.5 Mbits for the downlink and 1.5 Mbits for the uplink.  If the Access Point module is in a
AP_CMM2 User Manual   Issue 4 Draft         Page 35 of 48cluster with other modules then this parameter on all units must be set exactly the same.  Thedefault for this parameter is 75%.High Priority Uplink Percentage:  describes the percentage of the uplink bandwidth that will bededicated to low latency traffic.  When set, this percentage of RF link bandwidth will bepermanently allocated to low latency traffic regardless of the amount of this kind of traffic present.There is no corresponding downlink parameter as this bandwidth is allocated on as-needed basisby the scheduling algorithms.Total NumUAckSlots:  describes the total number of slots used to acknowledge data that isreceived by a subscriber module.  If the Access Point module is in a cluster with other modulesthen this parameter on all units must be set exactly the same.  The default should be set to 3.Uacks Reserved High:  describes the number of slots used to acknowledge high priority data thatis received by a subscriber module.  The Canopy team recommends that this parameter be set to 3and then the Total NumUAcksSlots parameter should be set to 6.NumDAckSlots:  describes the total number of slots used to acknowledge data that is received byan Access Point module.  If the Access Point module is in a cluster with other modules then thisparameter on all units must be set exactly the same.  The default should be set to 3.Dacks Reserved High:  describes the number of slots used to acknowledge high priority data thatis received by an Access Point module.  The Canopy team recommends that this parameter be setto 3 and NumDAckSlots parameter should be set to 6.NumCtlSlots:  describes the total number of slots used to send control messages to an AccessPoint module.  If the Access Point module is in a cluster with other modules then this parameter onall units must be set exactly the same.  The default should be set to 3.NumCtlSlots Reserved High:  describes the number of slots used to send control messages to anAccess Point module.  The Canopy team recommends that this parameter be set to 3 and theNumCtlSlots parameter should be set to 6.Sustained Uplink Data Rate:  choose the rate at which each Subscriber Module registered to thisAP will be capped in the uplink direction.  The default is 10,000 kbps, which means that there is norestriction on the uplink.Uplink Burst Allocation:  choose the maximum value that each individual subscriber module willhave for burst traffic in the uplink direction.  The default is 10,000 kb.Sustained Downlink Data Rates:  choose the rate at which each Subscriber Module registered tothis AP will be capped in the downlink direction.  The default is 10,000 kbps, which means thatthere is no restriction on the downlink.Downlink Burst Allocation:  choose the maximum value that each individual subscriber modulewill have for burst traffic in the downlink direction.  The default is 10,000 kb.LAN IP:  enter in the IP address that will be associated with the Ethernet connection on thismodule.  The default address is 169.254.1.1. If the IP address is forgotten, the operator will needphysical access to the module and will need to create a Canopy “default plug”.  See steps at theend of this section for use of a default plug.
AP_CMM2 User Manual   Issue 4 Draft         Page 36 of 48LAN Subnet Mask:  enter in an appropriate subnet mask for the module to “talk” on the network.The default value for this parameter is 255.255.255.0.Default Gateway:  enter in the appropriate gateway for the module to “talk” on the network.  Thedefault for this parameter is 169.254.0.0.Private IP:  the default for this parameter is 192.168.101.1.  It is recommended that the operatornot change this parameter. A flat, class C subnet is used to communicate with each of thesubscriber modules that have registered.  The Access Point uses a combination of the private IPand the logical unit ID (LUID) of the subscriber module.For example, if there are two subscriber modules (LUID 2 and LUID 3) registered to an AccessPoint module, then the Access Point uses the following to communicate to each:Unit LUID Private IPAccess Point module 1 192.168.101.1subscriber module 1 2 192.168.101.2subscriber module 2 3 192.168.101.3If the private IP address is changed then it must designate a Class C subnet that is not used foranything else and the address must be in the form of xxx.xxx.xxx.1, where 1 is the last octet of theaddress.Color Code:  enter in a value (0-254).  The color code on the subscriber module and the AccessPoint module must match in order for registration to occur.  Color code is not a security feature.  Itis a means for the Canopy System operator to segregate an individual network or neighbor Canopynetworks.  Also, color code can be used to force a subscriber module to only register to a specificAccess Point module even though the subscriber module may be able to see multiple Access Pointmodules.  The default value for this parameter is 0 on all Canopy modules.Sector ID:  choose an ID number to give to this Access Point module.  This parameter does notaffect the operation of the module in any way.  Its purpose is just another means to identify theAccess Point module.  When observing a subscriber module’s AP Eval Data web page, the sectorID is one of the distinguishing fields present to help the operator understand what Access Pointmodule is seen.  It is recommended that when constructing an Access Point cluster (2-6 modules)that each sector be given a different ID and that the pattern be repeated throughout the entireCanopy System for manageability.Max Range:  enter in a distance (in miles).  This parameter controls the maximum distance that asubscriber module will be allowed to register.  The subscriber module must still meet minimumrequirements for an acceptable link in order to register.  If the Access Point module is in a clusterwith other modules then this parameter on all units must be set exactly the same.  The default forthis parameter is 2 miles.Display-Only Access:  enter the same password in both fields for verification.  The display-onlypassword, when used, will allow only view activities to the module.  When the display-onlypassword is set and not the full-access password, the display-only password will be tied to telnetand FTP sessions to the module.  If the full-access password is also set then it has precedence onthe telnet and FTP sessions.  If the password is forgotten, the operator will need physical access tothe module and will need to create a Canopy “default plug” to override the unit.  See steps at end ofsection for use and creation of a default plug.
AP_CMM2 User Manual   Issue 4 Draft         Page 37 of 48Full Access:  enter the same password in both fields for verification.  The full-access password,when used, will allow view and change activities to the module.  When the full-access password isset, the password will also be tied to telnet and FTP sessions to the module.  When prompted forthe password via the web-based interface, there is no username required; however when promptedfor the password via a telnet or FTP session, the user that MUST be used is “root”.  If the passwordis forgotten, the operator will need physical access to the module and will need to create a Canopy“default plug” to override the unit.  See steps at end of this section for use of a default plug.Webpage Auto Update:  enter time period (in seconds) desired to have the web browser refreshthe web-based interface.  The default setting is 0, which will cause the web-based interface tonever refresh.Airlink Security:  choose the type of air link security that is to be used on this Access Pointmodule.  There are two choices:• Normal:  With this mode there is no encryption on the air link.  This is the default operation.• DES:  With this mode the air link is encrypted using single DES, using a factoryprogrammed secret key that is unique for each module.Bridge Entry Timeout:  choose the appropriate bridge timeout for correct network operation withexisting network infrastructure.  It is important that this parameter be set for a longer time periodthan the ARP (address resolution protocol) cache timeout of the router being used to feed thenetwork.  Note: Failure to properly configure this may lead to temporary loss ofcommunication to specific end users.AP Background BER Mode:  choose to have this feature turned on or off.  Bit Error Rate (BER)mode will allow an operator another means to verify the functionality of a link.  When BER mode isturn on a bit error rate can be read on the subscriber side to determine the quality of a registeredlink.   If the Access Point module is in a cluster with other modules then this parameter on all unitsmust be set exactly the same.  Continually, when this feature is on the aggregate availablebandwidth will decrease by ~200 Kbps.Community String:  enter a string that will allow a SNMP management server accessibility to theSNMP information.  There must not be any spaces in the community string.  The default for thisparameter is “Canopy”.Accessing Subnet:  enter the network that will be allowed to access SNMP information from thecanopy module.  There are two pieces of information needed:• The network in the form of xxx.xxx.xxx.xxx• The CIDR (Classless Interdomain Routing) prefix length in the form of /xxAn example would be 198.32.0.0/16 where /16 is a subnet mask of 255.255.0.0.  An Internetsearch on Classless Interdomain Routing will provide greater detail on this subject for theinexperienced network operator.  The default is to allow all networks access.Trap Address:  enter in an IP address (xxx.xxx.xxx.xxx) of an SNMP management server wheretrap information can be sent.  A trap is a way for the module to tell the monitoring system thatsomething has happened.  The following are scenarios where traps would be sent:• after a reboot of the module• if a SNMP management server tried to access agent information and supplied the wrongcommunity string, wrong SNMP version number, or came from the wrong accessingsubnet.
AP_CMM2 User Manual   Issue 4 Draft         Page 38 of 48Site Name:  enter information relating to a name given to the physical module.  This parameter willset the supplied information into the sysName SNMP MIB-II object and can be polled by a SNMPmanagement server.  The buffer size for this field is 128 characters.Site Contact:  enter contact information relating to the module.  This parameter will set thesupplied information into the sysContact SNMP MIB-II object and can be polled by a SNMPmanagement server.  The buffer size for this field is 128 characters.Site Location:  enter information relating to the physical location of the module.  This parameterwill set the supplied information into the sysLocation SNMP MIB-II object and can be polled by aSNMP management server.  The buffer size for this field is 128 characters.Save Changes:  by clicking on this button, any changes that have been made on the Configurationpage will be committed to flash memory and will take effect after the next module reboot.Undo Save Changes:  by clicking on this button, any changes that have been made and notcommitted through a reboot of the module will be undone.Set to Factory Defaults:  depressing this button will change all of the configurable parameters (allof which are contained on the Configuration page) back to their factory settings.Reboot:  depressing this button will reboot the module.CANOPY DEFAULT PLUGWhen inserted, the default plug brings the module up with a default configuration. This allows theoperator to regain control of a module, which may be using an IP address and/or password thathas been forgotten. The default plug will also override the passwords for access and changecontrol and set the LAN1 IP address back to 169.254.1.1. This does not, by itself, change anyconfiguration, rather, it allows the operator to attach to the module using the default configurationso that they can read the actual non-default values and set them accordingly.The following steps outline the creation of a default plug (this plug can also be purchase for anominal fee at http://www.best-tronics.com/motorola):•  Obtain a RJ-11, 6-pin connector and a small length of CAT 5 cable.•  Pin-out all 6-pins and then short (i.e. solder) together pins 4 and 6 on the other end.Remaining wires should not be connected to anything.- pin 1 → white / orange- pin 2 → white / green- pin 3 → white / blue- pin 4 → green solder to orange- pin 5 → blue- pin 6 → orange  solder to green• Insert “default plug” in the GPS sync port of the module and apply power to the module viaits Ethernet cable.When the module is booted up (power applied) it will be in default mode where the IP address willbe 169.254.1.1 and the passwords will be blank.  All other configurations will have been preserved.
AP_CMM2 User Manual   Issue 4 Draft         Page 39 of 48EVENT LOGThis page contains information that is recorded from the subscriber module for troubleshootingpurposes.  Please make note of the information that is gathered here when calling for technicalsupport.Clear Event Log:  this button will clear the event log.LUID SELECTFigure 14: LUID Select web pageThis web page makes is possible for the operator to view the web pages of registered subscribermodules over the RF link.  The operator should view the Sessions web page to determine what thelogical unit ID (LUID) is for the subscriber module in question.  Enter the LUID into the suppliedfield and click the “Change LUID” button to set the parameter.  Click “View Current SubscriberModem” to then access the subscriber module.
AP_CMM2 User Manual   Issue 4 Draft         Page 40 of 48LINK TESTFigure 15: Link Test web pageThe Link Test is a test for measuring the throughput and efficiency of the RF link between twoCanopy modules.To perform a link test enter a number into the field labeled “Duration”.  The duration is the numberof seconds the RF link will be tested.  Start the link test by clicking the “Start Test” button.  The testwill now run for the set duration.  If the web page is not set to automatically refresh, click the“Refresh Display” button to see the results.  For a Canopy System link to be considered acceptableit is necessary for the efficiencies of the link test to be greater than 90% in both the uplink anddownlink direction.  It is recommended that when a new link is installed that a link test be executedto ensure that the efficiencies are within recommended guidelines.The key fields are:• Downlink RATE, bits per second• Uplink RATE, bits per second• Downlink Efficiency, percent• Uplink Efficiency, percentTIME & DATEThis web page is used to set the time and date of the Access Point module when it is notconnected to a Cluster Management Module (CMM).  The time and date would need to be setevery time there is a power cycle.  The format for the entry is:Time: hh:mm:ss  Date: mm/dd/yyyy• hh:  two digit hour in military time• mm:  two digit minute• ss:  two digit second• mm:  two digit month• dd:  two digit day
AP_CMM2 User Manual   Issue 4 Draft         Page 41 of 48• yyyy:  four digit yearEnter in the appropriate information and click the Set Time and Date button.SESSIONSThe Session web page contains information on each of the subscriber modules that has registeredto the Access Point module.  For each of the subscriber modules certain bits of information areshown on this web page.   An example of such information is:LUID: 002 : MAC: 0a-00-3e-00-02-2f State: IN SESSIONSoftware Version : CANOPY 3.1 Aug 21 2002 13:52:12FPGA Version : 08200207Session Timeout: 7, AirDelay 5Session Count: 2, Reg Count 2, Re-Reg Count 2Average RSSI: 1842, Last RSSI: 1873Average Jitter: 6, Last Jitter: 5Descriptions of the parameters that are useful for managing and troubleshooting a Canopy Systemare:LUID:  displays the logical unit ID of the subscriber module.  As each subscriber module registersto the Access Point module it is assigned a LUID.  The LUID range starts at 2.  If a subscribermodule were to lose its registration with the Access Point and then regain the registration it willretain the same LUID, as long power has not cycled on the Access Point module.MAC:  displays the MAC address (or electronic serial number) of the subscriber module.State:  displays the current status of the subscriber module.  There are two states:• IN SESSION: the subscriber module is currently registered to the Access Point module.• IDLE: the subscriber module was registered to the Access Point module at one time, but isnot currently.Software Version:  displays the version of software that is running on the subscriber module.  Ifthis parameter is not present, then a software version prior to release version 3.1 is on that module.FPGA Version:  displays the version of FPGA that is running on the subscriber module.  If thisparameter is not present, then a FPGA version prior to release version 082002 is on the module.AirDelay:  displays the distance of the subscriber module from the Access Point module.  Thenumber presented needs to be multiplied by 49 to convert the number to feet.Session Count:  displays the number of sessions that this subscriber module has had with theAccess Point module.  If this value is excessive large compared to other subscriber modulesregistered with this Access Point, there may be an issue with the installation of the subscriber.Reg Count:  displays the number of registration request messages the Access Point module hasseen from the subscriber module.  If this value is excessive large compared to other subscribermodules registered with this Access Point, there may be an issue with the installation of thesubscriber.Re-Reg Count:  displays the number of registration request messages the Access Point modulehas seen from the subscriber module that is already in session.  If this value is excessive largecompared to other subscriber modules registered with this Access Point, there may be an issuewith the installation of the subscriber.
AP_CMM2 User Manual   Issue 4 Draft         Page 42 of 48Average RSSI:  displays the average RSSI value for the subscriber module.Last RSSI:  displays the last RSSI value for the subscriber module.Average Jitter:  displays the average Jitter value for the subscriber module.Last Jitter:  displays the last Jitter value for the subscriber module.
AP_CMM2 User Manual   Issue 4 Draft         Page 43 of 48GPS STATUSThe GPS Status web page displays information about satellites seen and tracked when the AccessPoint module is configured to “sync to the received signal” and is connected to a ClusterManagement Module.ETHERNET STATSThe Packet Stats web page reports TCP throughput and error information for the Ethernetconnection of the subscriber module.  The following definitions are available:inoctets count:  displays the total number of octets received on the interface, including framingcharacters.inucastpkts count:  displays the total number of subnetwork-unicast packets delivered to a higherlayer protocolinnucastpkts count: displays the total number of non-unicast (i.e. subnetwork-broadcast orsubnetwork-multicast) packets delivered to a higher layer protocol.indiscards count:  displays the total number of inbound packets which were chosen to bediscarded even though no errors had been detected to prevent their be deliverable to higher layerprotocol.  One possible reason to discard could be to free up buffer space.inerrors count:  displays the total number of inbound packets that contained errors preventingthem from being delivered to a higher layer protocol.inunknownprotos count:  displays the total number of packets received via the interface whichwere discards because of an unknown or unsupported protocol.outoctets count:  displays the total number of octets transmitted out of the interface, includingframing characters.outucastpkts count:  displays the total number of packets that higher-level protocols requested betransmitted to a subnetwork-unicast address, including those that were discarded or not sent.outnucastpkts count:  displays the total number of packets that higher-level protocols requestedbe transmitted to a non-unicast (i.e. subnetwork-broadcast or subnetwork-multicast) address,including those that were discarded or not sent.outdiscards count:  displays the total number of outbound packets which were chosen to bediscarded even though no errors had been detected to prevent their being transmitted.  Onepossible reason for discarding such a packet could be to free up buffer space.outerrrors count:  displays the total number of outbound packets that could not be transmittedbecause of errors.RxBabErr:  displays the total number of receiver babble errors.EthBusErr:  displays the total number of Ethernet bus errors on the Ethernet controller.CRCError:  displays the total number of CRC errors on the Ethernet controller.RxOverrun:  displays the total number of receiver-overrun errors on the Ethernet controller.
AP_CMM2 User Manual   Issue 4 Draft         Page 44 of 48Late Collision:  displays the total number of late collisions on the Ethernet controller.  A normalcollision occurs during the first 512 bits of the frame transmission.  If a collision occurs after the 512bit times, then it is considered a late collision.  A late collision should be taken as a serious networkproblem, since it causes the frame being transmitted to be discarded.  The most common cause oflate collisions is a mismatch between duplex configurations at each end of a link segment.RetransLimitExp:  displays the total number of retransmit limit expirations.TxUnderrun:  displays the total number of transmission-underrun errors on the Ethernet controller.CarSenseLost:  displays the total number of carrier sense lost errors occurred on the Ethernetcontroller.EXPANDED STATSClicking on the Expanded Stats link will display a number of pages of statistics that are maintainedby the Canopy module.  Canopy Technical Support may ask the operator for specific information inthis section when troubleshooting an issue.
AP_CMM2 User Manual   Issue 4 Draft         Page 45 of 48ACCESSORIESThe following accessories are available for use with the Canopy System.  To purchaseaccessories, please contact an authorized Canopy dealer, unless otherwise noted.• Universal mounting bracket• Passive reflector dishes for use with 2.4 and 5.7 GHz subscriber modules• 102-132 V AC power supply with North American plug, part number ACPS110• 100-240 V AC power supply with North American, UK, and Euro plugs, part numberACPSSW-02• Cable assemblies for the Canopy System can be ordered from Best-Tronics ManufacturingInc. by going to their website at http://www.best-tronics.com/motorola. Due to the RFenvironment Canopy Backhauls, Access Points, and Cluster Management Modules oftenoperate in, it is strongly recommended to use shielded cable for infrastructure cablingconnecting these modules.
AP_CMM2 User Manual   Issue 4 Draft         Page 46 of 48APPENDIXThere are two basic concepts that are needed for a basic understanding of networking, IPaddresses and subnet masks.  IP addresses are 32-bit binary numbers that have twocorresponding parts or sub-addresses, the first part identifying the network and the second partidentifying the hosts on the network.  An imaginary boundary separates the first part from thesecond.  This imaginary boundary is marked by way of the subnet mask.  The subnet mask isanother 32-bit binary number the acts like a filter on the IP address.  When a subnet mask has a bitset to 1, the corresponding bit in the IP address is part of the network address.  A subnet isclassified as either a class A, class B, or class C network.  The following table shows the commonsubnet mask classes:Class Network Portion Host PortionA 11111111 00000000 00000000 00000000B 11111111 11111111 00000000 00000000C 11111111 11111111 11111111 00000000For example, if you have an IP address of 169.254.1.1 and a subnet mask of 255.255.0.0, then thefirst 16-bits of the 32-bit IP address identify the network.10101001 11111110 00000001 00000001IP address11111111 11111111 00000000 00000000Subnet MaskThere are 216 (65,536) addressable hosts in this example and 169.254 is the network.  There is onelast piece of information that is needed here.  Subnet masks are not shipped around in the IPpacket, the packet only contains the 32-bit IP address of the destination.  So without this valuablepiece of information devices have no idea what portion of the IP address is part of the network andwhich is part of the host address.  How does data know where it is supposed to go?  IP systemsdeveloped a unique form of logic to make this determination.  Class A network addresses alwayshave the first bit of their IP address set to 0.  Class B network addresses always have their first bitset to 1 and their second bit set to 0.  Class C network addresses always have their first two bitsset to 1 and the third bit set to 0.  By examining these first bits of the IP address a device candetermine what subnet mask should be applied to the IP address and determine where to route thedata.The following is a synopsis of an Internet Draft (http://www.ietf.org/internet-drafts/draft-ietf-zeroconf-ipv4-linklocal-05.txt) that describes how Microsoft and Apple operating systems reactwhen a DHCP server is not found on the network.  In general, a computer needs certainconfiguration information to operate on a network.  Those configurations are an IP address, asubnet mask, and possibly a gateway address.  A DHCP server will automatically assign thisconfiguration information to a computer on a network or an operator is required to manually inputthese configurable items.  When a computer is brought online and a DHCP server is not accessible(i.e. server is down or the computer is not plugged into the network) Microsoft and Apple operatingsystems will default to an IP address and subnet mask of 169.254.x.x and 255.255.0.0(169.254/16).SPECIFICATIONS
AP_CMM2 User Manual   Issue 4 Draft         Page 47 of 48ACCESS POINT MODULEOperating Frequency Ranges 2.4 Modules: ISM 2.4 to 2.4835 GHz5.2 Modules: U-NII: 5.25 to 5.35 GHz5.7 Modules: ISM: 5.725 to 5.850 GHzAccess Method TDD/TDMASignaling Rate 10 MbpsModulation Type High Index 2-level Frequency Shift Keying (FSK)(Optimized for interference rejection)Carrier to Interference (C/I) 3dB nominalReceiver Sensitivity -83dBm 10-4 BEROperating Range Up to 15 miles (24 km) with passive reflector in the 2.4GHz band. Up to 2 miles (3.6 km) with integratedantenna in the 5.2 GHz band.  Up to 10 miles (16 km)with passive reflector in the 5.7 GHz band.Transmitter Power Meets FCC U-NII/ISM and IC LELAN ERP LimitDC Power measured at DC converter 0.3A @ 24 VDC (7.2 watts) typical0.35 A @ 24 VDC (8.4 watts) max (long cable runs, highambient temperature, high transmit ratio (set bydownlink percentage))Interface 10/100 BaseT, half/full duplexRate auto negotiated (802.3 compliant)Protocols Used by CANOPY IPV4, UDP, TCP, ICMP, Telnet,HTTP, FTP, SNMP, DESProtocols Supported by Canopy Switched Layer 2 Transport with support for all commonEthernet protocols including IPV6, NetBIOS, DHCP,IPX, etc.Software Upgrade Path Remotely downloaded into flash memoryNetwork Management HTTP, TELNET, FTP, SNMPOperation Temperature -40°F to +131ºF (-40°C to +55°C)Weight 1 lb. (.45kg)Dimensions 11.75” H x 3.4” W x 3.4” D  (29.9 cm H x 8.6 cm W x 8.6cm D)CLUSTER MANAGEMENT MODULE GEN IIPHYSICALMax length from Cluster Management Moduleto any radio 328 cable feet (100 meters)Max length from Cluster Management Moduleto GPS antenna 100 cable feet (30.5 meters)Dimensions 17.00” H x 12.88” W x 6.50” D(43.18 cm H x 32.72 cm W x 16.51 cm D)Weight 25.0 lbs. (11.3 kg)Operation Temperature -40°F to +131°F  (-40°C to +55°C)Overall Meets CE IP44 according to EN60529:2000
AP_CMM2 User Manual   Issue 4 Draft         Page 48 of 48AC POWERInput Voltageand Frequency100 V – 240 V~, 0.7 A – 0.35 A, settable to either 230 V or 115 V nominal input.50 Hz – 60 HzNote: Applying 230 V to a unit which is set to 115 V may damage the unit.Input power Nominal 66 watts, max 92 watts with 8 modules connected to the CMM at maxcable length.DC POWER (24V) OPTIONInput voltage 18 to 32 VDC, measured at CMMInput power Nominal 60 watts. Maximum 84 watts with 8 modules connected to the CMM atmaximum cable length. 9A inrush upon start-up.Use note If using a typical “24V +/-5%” power supply, ensure that CMM is within 400 cablefeet (120 m) of the power supply. Use minimum 12 AWG (4 mm2) copper wire.DC POWER (12V) OPTIONInput voltage 11.5 to 32 VDC, measured at CMMUse noteIf using a 12V power source (typically an automobile battery in a test oremergency situation), use 12 AWG (4 mm2) wire between the power supply andthe CMM, ensure that the CMM is within 10 cable feet (3 m) of the powersupply, and ensure the modules are within 20 cable feet (6 m) of the CMM.CABLE SPECIFICATIONSEthernet, GPSsync, and GPScoax cablesThe use of cables that conform to the operational temperature of the product aswell as being UV light protected is mandatory.  See Accessories for retailer ofcables.

Navigation menu