Advanced Features; Security - Des Encryption; Bandwidth Management; High Priority Bandwith - Motorola Canopy User Manual

Cluster and gen ii cluster
Hide thumbs Also See for Canopy:
Table of Contents

Advertisement

ADVANCED FEATURES

These features may be used in the Canopy System but are not required for basic operation.

SECURITY - DES ENCRYPTION

DES (Data Encryption Standard) is a secret key encryption scheme. DES performs a series of bit
permutations, substitutions, and recombination operations on blocks of data using a secret key.
On the base Canopy system, DES encryption of the over the air link is turned on per Access Point
module or Backhaul timing master module. DES encryption does not affect the performance or
throughput of the system. Each Canopy module contains a unique factory programmed secret key
used in DES encryption.
For additional security, Canopy offers the Bandwidth and Authentication Manager (BAM). With the
BAM the user can specify their own DES keys, as well as turn on SM authentication and set per-
SM bandwidth management. The BAM is a Canopy software product running on a networked Linux
PC.

BANDWIDTH MANAGEMENT

Subscriber Module bandwidth management is set per Access Point. All Subscriber Modules which
register to an Access Point module will receive and use the same bandwidth management
information.
The software uses "token buckets" to manage each subscriber's bandwidth. Each subscriber's
bucket (actually two buckets, one for uplink and one for downlink) is constantly being filled with
tokens at the Sustained rate, up to the Burst size (the size of their bucket). When they use the
internet, they have full bandwidth until they "drain" their bucket, then they only have the Sustained
rate, until they quit draining their bucket, and let it refill a bit.
After a burst is fully or partially used, it then "recharges" at the Sustained rate. Short bursts
recharge quickly, often before the next burst. Large bursts take longer to recharge.
The way bandwidth management appears to the subscriber is that as long as they are doing
normal web browsing and e-mail handling, small file transfers, and short streaming video, they will
rarely be speed limited, depending on what the bandwidth management is set to. If they do large
downloads (software upgrades, streaming video, and so on), or a series of medium-size
downloads, they will have high bandwidth until they hit the burst limit, then drop down in speed to
the sustained setting. When they are idle, the burst limit will then "recharge" at the sustained rate.
To manage bandwidth separately for each SM, Canopy offers the Bandwidth and Authentication
Manager (BAM). The BAM supports per-SM setting of Sustained Uplink, Sustained Downlink,
Uplink Burst, and Downlink Burst, as well as SM authentication and user-specification of DES keys.
The BAM is a Canopy software product running on a networked Linux PC.

HIGH PRIORITY BANDWITH

To support traffic with a low latency requirement such as VoIP (voice over IP), the Canopy System
implements a high priority data pipe. This implementation does not affect the inherent latencies in
the Canopy System but allows high priority traffic to be serviced immediately. The high priority pipe
separates low latency trafiic from traffic that is latency tolerant such as standard web surfing and
file downloads. This traffics is separated by the Canopy System via the IPv4 TOS (type of service)
AP_CMM2 User Manual
Page 21 of 49

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents