Siemens RUGGEDCOM WIN5123 User manual

RUGGEDCOM WIN
v5.0
User Guide
For WIN5114, WIN5118, WIN5123, WIN5125, WIN5135,
WIN5137, WIN5137-V, WIN5137-V-GPS, WIN5149,
WIN5151, WIN5151-V, WIN5151-V-GPS, WIN5158,
WIN5158-V, WIN5214, WIN5218, WIN5223, WIN5225,
WIN5235, WIN5237, WIN5249, WIN5251, WIN5258
02/2017
RC1308-EN-02
Preface
Introduction 1
Using WIN v5.0 2
Device Management 3
System Administration 4
Setup and Configuration 5

RUGGEDCOM WIN
User Guide
ii
Copyright © 2017 Siemens Canada Ltd
All rights reserved. Dissemination or reproduction of this document, or evaluation and communication of its contents, is not authorized
except where expressly permitted. Violations are liable for damages. All rights reserved, particularly for the purposes of patent application or
trademark registration.
This document contains proprietary information, which is protected by copyright. All rights are reserved. No part of this document may be
photocopied, reproduced or translated to another language without the prior written consent of Siemens Canada Ltd.
Disclaimer Of Liability
Siemens has verified the contents of this document against the hardware and/or software described. However, deviations between the product
and the documentation may exist.
Siemens shall not be liable for any errors or omissions contained herein or for consequential damages in connection with the furnishing,
performance, or use of this material.
The information given in this document is reviewed regularly and any necessary corrections will be included in subsequent editions. We
appreciate any suggested improvements. We reserve the right to make technical improvements without notice.
Registered Trademarks
RUGGEDCOM™ and ROS™ are trademarks of Siemens Canada Ltd.
Other designations in this manual might be trademarks whose use by third parties for their own purposes would infringe the rights of the
owner.
Security Information
Siemens provides products and solutions with industrial security functions that support the secure operation of plants, machines, equipment
and/or networks. They are important components in a holistic industrial security concept. With this in mind, Siemens' products and solutions
undergo continuous development. Siemens recommends strongly that you regularly check for product updates.
For the secure operation of Siemens products and solutions, it is necessary to take suitable preventive action (e.g. cell protection concept) and
integrate each component into a holistic, state-of-the-art industrial security concept. Third-party products that may be in use should also be
considered. For more information about industrial security, visit http://www.siemens.com/industrialsecurity .
To stay informed about product updates as they occur, sign up for a product-specific newsletter. For more information, visit http://
support.automation.siemens.com .
Warranty
Refer to the License Agreement for the applicable warranty terms and conditions, if any.
For warranty details, visit www.siemens.com/ruggedcom or contact a Siemens customer service representative.
Contacting Siemens
Address
Siemens Canada Ltd
Industry Sector
300 Applewood Crescent
Concord, Ontario
Canada, L4K 5C7
Telephone
Toll-free: 1 888 264 0006
Tel: +1 905 856 5288
Fax: +1 905 856 1995
E-mail
Web
www.siemens.com/ruggedcom

RUGGEDCOM WIN
User Guide
Table of Contents
iii
Table of Contents
Preface ............................................................................................................ vii
Alerts ................................................................................................................................................. vii
Related Documents ............................................................................................................................ viii
System Requirements ........................................................................................................................ viii
Training ............................................................................................................................................ viii
Customer Support ............................................................................................................................... ix
Chapter 1
Introduction ..................................................................................................... 1
1.1Security Recommendations ............................................................................................................ 2
1.2Mobile WiMAX Wave 2 MIMO Features .......................................................................................... 3
1.2.1Space-Time Coding ............................................................................................................ 4
1.3Time Division Duplexing (TDD) ...................................................................................................... 5
1.4Coding Rates ................................................................................................................................ 5
1.5Modulation ................................................................................................................................... 5
1.6Convolution Turbo Coding Correction ............................................................................................. 5
1.7Deployment Models ...................................................................................................................... 5
1.7.1PTP Deployment ................................................................................................................. 6
1.7.2PMP Deployment ............................................................................................................... 6
1.7.3Non Line-of-Sight ............................................................................................................... 6
1.7.4Channelization ................................................................................................................... 6
1.8Service Flows ............................................................................................................................... 6
1.8.1Service Flow Classification .................................................................................................. 7
1.8.2Default Service Flows ......................................................................................................... 7
1.8.3Scheduling ........................................................................................................................ 7
Chapter 2
Using WIN v5.0 ................................................................................................ 9
2.1Configuring Network Parameters in Windows ................................................................................. 9
2.2Logging In .................................................................................................................................. 11
2.3Logging Out ............................................................................................................................... 12
2.4Using the Web-based User Interface ............................................................................................. 13
2.5Accessing Developer Mode .......................................................................................................... 14

Table of Contents
RUGGEDCOM WIN
User Guide
iv
Chapter 3
Device Management ....................................................................................... 17
3.1Configuring Syslog ...................................................................................................................... 17
3.2Viewing Device Hardware Information .......................................................................................... 18
3.3Viewing Statistics ........................................................................................................................ 18
3.3.1Viewing General Statistics ................................................................................................. 19
3.3.2Viewing and Clearing RF Statistics ..................................................................................... 20
3.3.3Viewing and Clearing Network Statistics ............................................................................ 21
3.3.4Viewing and Clearing Service Flow Statistics ...................................................................... 22
3.4Managing Software Versions and Upgrades .................................................................................. 23
3.4.1Upgrading Device Software ............................................................................................... 23
3.4.2Viewing Software Properties ............................................................................................. 24
3.4.3Loading the Primary Software Version ............................................................................... 25
3.4.4Loading the Secondary Software Version ........................................................................... 26
3.4.5Configuring the Primary Software Version .......................................................................... 27
3.4.6Downloading Software from an FTP Server ........................................................................ 28
3.4.7Managing Memory Banks ................................................................................................. 28
3.4.7.1Viewing Memory Bank Files ................................................................................... 29
3.4.7.2Uploading Files to the FTP Server ........................................................................... 30
3.4.7.3Copying Files to the Secondary Bank ...................................................................... 31
3.4.7.4Deleting Memory Bank Files ................................................................................... 32
3.4.8Viewing the Status of an Operation ................................................................................... 32
3.4.9Canceling an Operation .................................................................................................... 33
Chapter 4
System Administration .................................................................................... 35
4.1Configuring the Device Name ...................................................................................................... 35
4.2Managing Links .......................................................................................................................... 36
4.2.1Configuring Link WatchDog .............................................................................................. 36
4.2.2Configuring Link Timeout ................................................................................................. 37
4.3Changing the Administrator Password .......................................................................................... 38
4.4Configuring the Maximum Number of Login Attempts ................................................................... 39
4.5Rebooting the Device .................................................................................................................. 39
4.6Restoring Factory Defaults ........................................................................................................... 40
4.7Managing Users .......................................................................................................................... 41
4.7.1Adding Users ................................................................................................................... 41
4.7.2Deleting Users ................................................................................................................. 42
4.8Enabling/Disabling SSH Shell Access ............................................................................................. 42
4.9Managing Keys and Certificates ................................................................................................... 43
4.9.1Loading HTTPS Certificates and Private Keys ....................................................................... 43

RUGGEDCOM WIN
User Guide
Table of Contents
v
4.9.2Generating SSH Keys ........................................................................................................ 44
4.10Managing Alarms ...................................................................................................................... 45
4.10.1Viewing Alarms .............................................................................................................. 45
4.10.2Clearing Alarms .............................................................................................................. 46
4.11Configuring the NTP Server ....................................................................................................... 46
4.12Locking the Device .................................................................................................................... 47
4.13Configuring RADIUS User Authentication .................................................................................... 48
Chapter 5
Setup and Configuration ................................................................................. 51
5.1Quick Configuration .................................................................................................................... 51
5.2Managing Connectivity with Base Stations .................................................................................... 52
5.2.1Configuring the Scanner ................................................................................................... 52
5.2.2Deleting Scanner Configurations ....................................................................................... 54
5.2.3Connecting to the Base Station ......................................................................................... 55
5.2.4Disconnecting from the Base Station ................................................................................. 56
5.2.5Viewing Base Station Information ...................................................................................... 57
5.3Managing Connections to Specific Base Stations ........................................................................... 58
5.3.1Enabling/Disabling Allowed Base Stations ........................................................................... 58
5.3.2Adding Base Station Identifiers .......................................................................................... 59
5.3.3Deleting Base Station Identifiers ........................................................................................ 60
5.3.4Connecting to Specific Base Stations ................................................................................. 61
5.3.5Disconnecting from Specific Base Stations .......................................................................... 62
5.3.6Connecting to Allowed Operator ID ................................................................................... 63
5.4Enabling/Disabling the GPS .......................................................................................................... 64
5.5Configuring Neighbor Scanning ................................................................................................... 65
5.6Enabling/Disabling Fast Network Entry .......................................................................................... 66
5.7Configuring Scan Duration ........................................................................................................... 67
5.8Configuring Failover BS Support ................................................................................................... 67
5.9Configuring the LAN Gateway ...................................................................................................... 68
5.10Configuring the Network Interface Protocol (NIP) ........................................................................ 69
5.11Configuring a Backhaul Subscriber Station .................................................................................. 70
5.12Managing SNMP ....................................................................................................................... 71
5.12.1Enabling/Disabling SNMP ................................................................................................ 71
5.12.2Managing SNMP Traps .................................................................................................... 72
5.12.2.1Adding SNMP Traps ............................................................................................. 72
5.12.2.2Deleting SNMP Traps ........................................................................................... 73
5.12.2.3Viewing a List of Traps ........................................................................................ 74
5.12.2.4Configuring Traps ................................................................................................ 75
5.12.2.5Sending Traps ..................................................................................................... 76
5.12.3Configuring SNMPv2 ...................................................................................................... 77

Table of Contents
RUGGEDCOM WIN
User Guide
vi
5.12.4Managing SNMPv3 ......................................................................................................... 78
5.12.4.1Adding SNMPv3 Users ......................................................................................... 78
5.12.4.2Deleting SNMPv3 Users ........................................................................................ 79
5.12.4.3Viewing SNMPv3 Access Groups ........................................................................... 80
5.12.5Configuring the MIB2 System Identification Information .................................................... 81
5.13Configuring DSCP Marking ......................................................................................................... 82
5.14Configuring Network IP Addresses .............................................................................................. 82
5.15Configuring the Management VLAN ........................................................................................... 83
5.16Configuring VLAN Tagging ......................................................................................................... 84
5.17Managing MAC Addresses ......................................................................................................... 85
5.17.1Viewing the MAC Address Table ...................................................................................... 85
5.17.2Configuring the MAC Address Table ................................................................................. 86
5.17.3Clearing the MAC Address Table ...................................................................................... 87
5.17.4Enabling/Disabling Mini-Jumbo Frames ............................................................................ 88
5.17.5Configuring the Access List ............................................................................................. 88
5.17.6Adding Entries to the Access List ..................................................................................... 90
5.17.7Deleting Entries from the Access List ............................................................................... 90
5.18Configuring the WiMAX Radio .................................................................................................... 91
5.19Managing WiMAX Authentication ............................................................................................... 93
5.19.1Viewing the Device Authentication Setting ....................................................................... 93
5.19.2Configuring EAP-TLS Authentication ................................................................................ 94
5.19.3Configuring EAP-TTLS Authentication ............................................................................... 94
5.19.4Configuring Null Authentication ...................................................................................... 95
5.19.5Loading Authentication Certificates ................................................................................. 96
5.19.6Changing the Client Certificate Private Password .............................................................. 96

RUGGEDCOM WIN
User Guide
Preface
Alerts vii
Preface
This guide describes v5.0 of the RUGGEDCOM WIN Web-based user interface and software application running
on RUGGEDCOM Subscriber Station (SS), or Customer Premises Equipment (CPE), devices . The WIN5100 and
WIN5200 are members of the RUGGEDCOM family of mobile WiMAX broadband wireless access systems based
on the 802.16e mobile WiMAX standard. This guide contains instructions and guidelines on how to use the base
station software, as well as some general theory.
It is intended for use by network operators who are familiar with the operation of networks.
NOTE
Illustrations of the management interface screens are presented for illustrative purposes and may
appear with minor differences in a working system.
CONTENTS
•“ Alerts ”
•“Related Documents”
•“System Requirements”
•“Training”
•“Customer Support”
Alerts
The following types of alerts are used when necessary to highlight important information.
DANGER!
DANGER alerts describe imminently hazardous situations that, if not avoided, will result in death or
serious injury.
WARNING!
WARNING alerts describe hazardous situations that, if not avoided, may result in serious injury and/or
equipment damage.
CAUTION!
CAUTION alerts describe hazardous situations that, if not avoided, may result in equipment damage.
IMPORTANT!
IMPORTANT alerts provide important information that should be known before performing a procedure
or step, or using a feature.

Preface
RUGGEDCOM WIN
User Guide
viii Related Documents
NOTE
NOTE alerts provide additional information, such as facts, tips and details.
Related Documents
Other documents that may be of interest include:
•RUGGEDCOM WIN5100 Series Installation Guides
•RUGGEDCOM WIN5200 Series Installation Guides
•RUGGEDCOM WIN v5.0 BST User Guide
System Requirements
Each workstation used to connect to the RUGGEDCOM WIN user interface must meet the following system
requirements:
• Must have Windows XP, Windows 7 or Windows 8 installed.
• Must have the ability to configure an IP address and netmask on the computer’s Ethernet interface.
• Must have a Web browser installed. Although other versions of these Web browsers may work, the following
Web browsers have been tested at the time of release and verified as being compatible:
▫ Microsoft Internet Explorer 11
▫ Google Chrome 31 or 32
▫ Mozilla Firefox 25 or 26
▫ Apple Safari 5.1
▫ Opera 18
Training
Siemens offers a wide range of educational services ranging from in-house training of standard courses on
networking, Ethernet switches and routers, to on-site customized courses tailored to the customer's needs,
experience and application.
Siemens' Educational Services team thrives on providing our customers with the essential practical skills to make
sure users have the right knowledge and expertise to understand the various technologies associated with critical
communications network infrastructure technologies.
Siemens' unique mix of IT/Telecommunications expertise combined with domain knowledge in the utility,
transportation and industrial markets, allows Siemens to provide training specific to the customer's application.
For more information about training services and course availability, visit www.siemens.com/ruggedcom or
contact a Siemens Sales representative.

RUGGEDCOM WIN
User Guide
Preface
Customer Support ix
Customer Support
Customer support is available 24 hours, 7 days a week for all Siemens customers. For technical support or general
information, contact Siemens Customer Support through any of the following methods:
Online
Visit http://www.siemens.com/automation/support-request to submit a Support Request (SR) or check on the status of an
existing SR.
Telephone
Call a local hotline center to submit a Support Request (SR). To locate a local hotline center, visit http://
www.automation.siemens.com/mcms/aspa-db/en/automation-technology/Pages/default.aspx .
Mobile App
Install the Industry Online Support app by Siemens AG on any Android, Apple iOS or Windows mobile device and be able to:
• Access Siemens' extensive library of support documentation, including FAQs and manuals
• Submit SRs or check on the status of an existing SR
• Contact a local Siemens representative from Sales, Technical Support, Training, etc.
• Ask questions or share knowledge with fellow Siemens customers and the support community

Preface
RUGGEDCOM WIN
User Guide
x Customer Support

RUGGEDCOM WIN
User Guide
Chapter 1
Introduction
1
Introduction
Welcome to the RUGGEDCOM WIN v5.0 User Guide for RUGGEDCOM WIN5100 and WIN5200 series Out Door
Unit (ODU) Subscriber Stations (SS) . This guide describes the wide array of features made available by the
RUGGEDCOM WIN software. These features include:
• Software Features
▫ Intuitive user interface and parameter groupings
▫ Advanced communication monitoring and troubleshooting tools
▫ HTTPS
▫ SNMPv2 and SNMPv3
▫ Management VLAN
▫ Remote software upgrades via SFTP
▫ Antenna alignment with LEDs
▫ Network Interface Protocol
▫ QoS according to IEEE 802.16e-2009
▫ SSHv2
▫ Password Management - local and RADIUS
▫ Device Authentication via PKMv2 (EAP-TLS/TTLS)
▫ X.509 certificates
▫ NTP server
▫ Ethernet Lock feature
▫ MAC address list
• Device Features
▫ Mobile WiMAX Wave 2 MIMO Features
▫ Time Division Duplexing (TDD)
▫ Coding Rates
▫ Modulation
▫ Convolution Turbo Coding Correction
▫ Deployment Models
▫ Service Flows
CONTENTS
•Section1.1, “Security Recommendations”
•Section1.2, “Mobile WiMAX Wave 2 MIMO Features”

Chapter 1
Introduction
RUGGEDCOM WIN
User Guide
2 Security Recommendations
•Section1.3, “Time Division Duplexing (TDD)”
•Section1.4, “Coding Rates”
•Section1.5, “Modulation”
•Section1.6, “Convolution Turbo Coding Correction”
•Section1.7, “Deployment Models”
•Section1.8, “Service Flows”
Section1.1
Security Recommendations
To prevent unauthorized access to the device, note the following security recommendations:
Authentication
• Replace the default passwords for all user accounts and processes (where applicable) before the device is
deployed.
• Use strong passwords. Avoid weak passwords such as password1, 123456789, abcdefgh, etc. An example of a
strong password would be a password that contains at least eight characters, including a lowercase letter, an
uppercase letter, a numeric character and a special character.
• Make sure passwords are protected and not shared with unauthorized personnel.
• Do not re-use passwords across different user names and systems, or after they expire.
• When RADIUS authentication is done remotely, make sure all communications are within the security perimeter
or on a secure channel.
Physical/Remote Access
• SSL and SSH keys are accessible to users who connect to the device via the serial console. Make sure to take
appropriate precautions when shipping the device beyond the boundaries of the trusted environment:
▫ Replace the SSH and SSL keys with throwaway keys prior to shipping.
▫ Take the existing SSH and SSL keys out of service. When the device returns, create and program new keys for
the device.
• Use a AAA server whenever possible.
• When using SNMP (Simple Network Management Protocol):
▫ Limit the number of IP addresses that can connect to the device and change the community names.
▫ Make sure the default community strings are changed to unique values.
• Limit the number of simultaneous Web Server and SSH sessions allowed.
• Configure remote system logging to forward all logs to a central location.
• Management of the configuration file, certificates and keys is the responsibility of the device owner. Before
returning the device to Siemens for repair, make sure encryption is disabled (to create a cleartext version of the
configuration file) and replace the current certificates and keys with temporary throwaway certificates and keys
that can be destroyed upon the device's return.
Hardware/Software
• Make sure the latest firmware version is installed, including all security-related patches. For the latest
information on security patches for Siemens products, visit the Industrial Security website [http://
www.industry.siemens.com/topics/global/en/industrial-security/news-alerts/Pages/alerts.aspx] or the

RUGGEDCOM WIN
User Guide
Chapter 1
Introduction
Mobile WiMAX Wave 2 MIMO Features 3
ProductCERT Security Advisories website [http://www.siemens.com/innovation/en/technology-focus/
siemens-cert/cert-security-advisories.htm] . Updates to Siemens Product Security Advisories can be obtained
by subscribing to the RSS feed on the Siemens ProductCERT Security Advisories website, or by following
@ProductCert on Twitter.
• Use the latest Web browser version compatible with RUGGEDCOM WIN to make sure the most secure Transport
Layer Security (TLS) versions and ciphers available are employed. Additionally, 1/n-1 record splitting is
enabled in the latest web browser versions of Mozilla Firefox, Google Chrome and Internet Explorer, and
mitigates against attacks such as SSL/TLS Protocol Initialization Vector Implementation Information Disclosure
Vulnerability (e.g. BEAST).
Policy
• Periodically audit the device to make sure it complies with these recommendations and/or any internal security
policies.
• Review the user documentation for other Siemens products used in coordination with the device for further
security recommendations.
Section1.2
Mobile WiMAX Wave 2 MIMO Features
Multiple-Input, Multiple-Output (MIMO) describes systems that use more than one radio and antenna system
at each end of the wireless link. In the past it was too costly to incorporate multiple antennas and radios in a
subscriber terminal. Recent advances in radio miniaturization and integration technology now make it feasible and
cost effective. Combining two or more received signals has the immediate benefit of improving received signal
strength, but MIMO also enables transmission of parallel data streams for greater throughput. For example, in a 2
× 2 MIMO (two transmit and two receive elements), dual polarization point-to-point system, the carrier’s allocated
frequency can be used twice, effectively doubling the throughput data rate.
In point-to-multipoint systems employing MIMO, each base station antenna transmits a different data stream
and each subscriber terminal receives various components of the transmitted signals with each of its subscriber
antennas. The subscriber terminal is able to algorithmically separate and decode the parallel simultaneously
received data streams.

Chapter 1
Introduction
RUGGEDCOM WIN
User Guide
4 Space-Time Coding
2
2
1
1
1
Figure1:MIMO Antenna System
1.MIMO Transmitter with Antenna 2.MIMO Receiver with Antenna
CONTENTS
•Section1.2.1, “Space-Time Coding”
Section1.2.1
Space-Time Coding
Space-Time Coding (STC) is a technique for implementing transmission diversity. Mobile WiMAX uses transmit
diversity in the downlink direction to provide spatial diversity to enhance the signal quality to a specific subscriber
located anywhere within the range of the antenna beam. Although providing less signal gain than beam-forming,
transmit diversity is more robust for mobile users as it does not require prior knowledge of the path characteristics
of a subscriber’s particular frequency channel. One such STC technique, known as the Alamouti Code, was
published in 1998[4] is incorporated in the WiMAX 16e standard.

RUGGEDCOM WIN
User Guide
Chapter 1
Introduction
Time Division Duplexing (TDD) 5
Section1.3
Time Division Duplexing (TDD)
The SS uses time division duplexing (TDD) to transmit and receive on the same RF channel. This is a non-
contention based method for providing an efficient and predictable two-way PTP or PMP cell deployment. All
uplink and downlink transmission scheduling is managed by the base station. The base station sends data traffic
to subscribers, polls for grant requests, and sends grant acknowledgements based on the total of all traffic to all
subscribers.
Section1.4
Coding Rates
Each burst of data transmitted over the wireless interface is padded with redundant information, making it more
resistant to potential over-the-air errors. The coding rate is the ratio of user data to the total data transmitted
including the redundant error correction data. The base station supports coding rates of 1/2, 2/3, and 3/4.
Section1.5
Modulation
The modulation technique specifies how the data is coded within the OFDMA carriers. The base station supports
QPSK, 16 Quadarature Amplitude Modulation (QAM), and 64 QAM modulations.
Section1.6
Convolution Turbo Coding Correction
Convolution Coding (CC) error correction is enabled for all traffic rates. This low-level process can correct bursts of
errors in received messages and reduce the number of retransmissions.
Section1.7
Deployment Models
The SS supports point to point (PTP) and point to multipoint (PMP) deployment scenarios.
CONTENTS
•Section1.7.1, “PTP Deployment”
•Section1.7.2, “PMP Deployment”
•Section1.7.3, “Non Line-of-Sight”

Chapter 1
Introduction
RUGGEDCOM WIN
User Guide
6 PTP Deployment
•Section1.7.4, “Channelization”
Section1.7.1
PTP Deployment
When deployed in a PTP configuration, the base station establishes a dedicated bidirectional link to a single
subscriber. PTP deployments typically use a directional narrow beam antenna for both ends of the link.
Section1.7.2
PMP Deployment
When deployed in a PMP configuration, the base station establishes bi-directional links to more than one
subscriber. PMP deployments typically use a wide beam (sector) antenna at the base station and a narrow beam
antenna at the subscriber. Service flows are used to police service level agreements for each subscriber.
Section1.7.3
Non Line-of-Sight
The WIN RUGGEDCOM WIN product family supports line-of-sight (LOS) and non line-of-sight (NLOS) operation. A
clear LOS link has no obstacles within 60% of the first Fresnel zone of the direct path.
A wireless link is considered non-LOS if natural or man-made structures block the visible path between the
base station and the subscriber. In this case, a wireless link can be established only if a reflective path can be
established between the base station and subscriber.
Section1.7.4
Channelization
The SS is a frequency-specific system, with the frequency band defined by the PHY unit. The use of the operating
band must be in accordance with local regulation requirements.
The SS divides the available frequency band into channels. Allocation of channels during deployment is dependent
on spectrum availability in the licensed band and local licensing requirements and conditions. Channel selection
allows planners to obtain the maximum geographic coverage, while avoiding frequency contention in adjacent
sectors.
Section1.8
Service Flows
Service flows are a key feature of the IEEE 802.16e standard. A service flow represents a unidirectional data flow
having separate Quality of Service (QoS) settings for uplink and downlink. Service flows provide the ability to set
up multiple connections to each subscriber in a sector.

RUGGEDCOM WIN
User Guide
Chapter 1
Introduction
Service Flow Classification 7
Separate service flows can be established for uplink and downlink traffic, where each service flow is assigned
a unique service level category and separate QoS settings. This feature allows segregation of high-speed/high-
priority traffic from less time-critical flows.
CONTENTS
•Section1.8.1, “Service Flow Classification”
•Section1.8.2, “Default Service Flows”
•Section1.8.3, “Scheduling”
Section1.8.1
Service Flow Classification
Data packets are forwarded based on classification rules. Classification rules examine each packet for pattern
matches such as destination address, source address, IP TOS, or VLAN tag. All classification is defined at the base
station and the classification parameters are downloaded to the subscriber.
Section1.8.2
Default Service Flows
Default uplink and downlink service flows are created automatically for each registered subscriber. These service
flows are used to pass all traffic not matching any user-defined service flow (such as broadcast ARP) between the
base station and subscribers. The default service flow capacity is limited for each subscriber.
Section1.8.3
Scheduling
The base station enforces QoS settings for each service flow by controlling all uplink and downlink traffic
scheduling. This provides a non-contention based traffic model with predictable transmission characteristics. By
analyzing the total of all requests from all subscribers, the base station ensures that uplink and downlink traffic
conforms to the current service level agreements (SLAs). Centralized scheduling increases predictability of traffic,
eliminates contention, and provides the maximum opportunity for reducing overhead.
A regular period is scheduled for subscribers to register with the base station. These subscribers may be newly
commissioned or have been deregistered due to service outage or interference on the wireless interface. This is
the only opportunity for multiple subscribers to transmit simultaneously.
•Real-Time Polling Service (rt-PS)
The base station schedules a continuous regular series of transmit opportunities for the subscriber to send
variable size data packets. The grant size is based on the current data transfer requirement. Typical applications
include streaming MPEG video or VOIP with silence suppression. This is efficient for applications that have a
real-time component and continuously changing bandwidth requirements.
•Extended Real-Time Polling Service (ert-PS)
The base station schedules a continuous series of transmit opportunities for the subscriber to send variable
size data packets. This schedule supports real-time applications including VoIP with silence suppression. The
dynamically scheduled grants guarantee reserved bandwidth and reduce latency introduced by repetitive grant
requests. The service flow will not transmit packets larger than the nominal grant interval.

Chapter 1
Introduction
RUGGEDCOM WIN
User Guide
8 Scheduling
•Non-Real-Time Polling Service (nrt-PS)
The base station schedules regular transmit opportunities for the subscriber to send variable size data packets.
Typical applications include high bandwidth FTP. The polling period is typically be one second or less, even
during periods of network congestion.
•Best Effort (BE)
The base station schedules transmit opportunities for the subscriber to send traffic based on unused bandwidth
after all higher level traffic scheduling requirements are serviced. Typical applications include Internet access
and email. Best effort service flows can be assigned a priority of 0 to 7.
•Unsolicited Grant Service (UGS)
The base station schedules a continuous series of transmit opportunities for the subscriber to send fixed size
data packets. This schedule supports real-time applications, including VoIP or TDM transport. The UGS pre-
scheduled grants guarantee reserved bandwidth and reduce latency introduced by repetitive grant requests.
The service flow will not transmit packets larger than the nominal grant interval.

RUGGEDCOM WIN
User Guide
Chapter 2
Using WIN v5.0
Configuring Network Parameters in Windows 9
Using WIN v5.0
This chapter describes how to use the RUGGEDCOM WIN interface.
CONTENTS
•Section2.1, “Configuring Network Parameters in Windows”
•Section2.2, “Logging In”
•Section2.3, “Logging Out”
•Section2.4, “Using the Web-based User Interface”
•Section2.5, “Accessing Developer Mode”
Section2.1
Configuring Network Parameters in Windows
Network parameters in Microsoft Windows must be setup to allow a computer to connect to the RUGGEDCOM
WIN. For instructions on how to configure the network parameters for other operating systems, refer to the user
documentation for that operating system.
The device can be pre-configured in the lab, eliminating the need for configuration in the field. After installing a
pre-configured device, configure additional parameters remotely through the wireless link.
NOTE
The following procedure describes how to configure the parameters using Microsoft Windows 7.
To configure the network parameters in Windows, do the following:
1. Make sure the PoE adapter is connected to the device.
2. Connect the computer’s Ethernet port to the PoE adapter's Ethernet port.
3. On the computer, click Start and select Control Panel.
4. In the Control Panel, select Network and Sharing Center.
5. Select Local Area Connection. The Local Area Connections Status dialog box appears.

Chapter 2
Using WIN v5.0
RUGGEDCOM WIN
User Guide
10 Configuring Network Parameters in Windows
Figure2:Microsoft Windows Local Area Connection Status Dialog Box
6. Click Local Area Connection. The Local Area Connections Properties dialog box appears with the General
tab selected.
Figure3:Windows Local Area Connection Properties Dialog Box
7. In the Items list, select Internet Protocol (TCP/IP) and then click Properties. The Internet Protocol (TCP/IP)
Properties dialog box appears.
Other manuals for RUGGEDCOM WIN5123
1
This manual suits for next models
22
Table of contents
Other Siemens Wireless Router manuals

Siemens
Siemens SpeedStream SS2524 User manual

Siemens
Siemens MC35T Maintenance and service guide

Siemens
Siemens Gigaset SE361 WLAN User manual

Siemens
Siemens OZS164 SERIES WEB SERVER Training manual

Siemens
Siemens SCALANCE XM-400 User manual

Siemens
Siemens GIGASET SE681 WIMAX User manual

Siemens
Siemens SpeedStream 2624 User manual

Siemens
Siemens SCALANCE W778-1 User manual

Siemens
Siemens SCALANCE W700 User manual

Siemens
Siemens RUGGEDCOM RS969 User manual