User's Manual

Table Of Contents
605-0000-701 EasyST Hardware Installation User Guide Rev I
16
Theory of Operation
For basic operation, the EasyST requires no initial configuration--simply plug and play. Configuration
is automatically performed over the air by the BS. The EasyST is preconfigured by the operator at
the BS (using Netspan) with service flow parameters such as the maximum information rate, the
committed information rate, the maximum latency, and maximum jitter. These configuration
parameters are stored in Netspan's database corresponding to the EasyST's MAC address.
Before any communication between EasyST and BS can occur, the EasyST must be positioned in a
location that provides sufficient RF reception.
To join a network, the EasyST needs to perform a few tasks. First, the "Network Entry" process
(defined in IEEE 802.16-2004) begins with the EasyST scanning for a downlink (DL) signal from the
base station, and then synchronizing to the DL channel. Thereafter the EasyST can start the process
of initial ranging, which alerts the BS to the presence of the EasyST and establishment of
management connections to obtain basic, primary and secondary management connection IDs
(CID) from the BS. After the CIDs have been obtained, the EasyST commences authorization and
key exchange. In the final stage, the EasyST registers at the base station and thereafter obtains the
IP address, time of day and the configuration file from the BS.
During Network entry, the EasyST sends the BS its MAC address. The BS via SNMP notifies Netspan
of a new CPE connection and Netspan checks the database to it contains the CPE MAC address. The
BS then accesses Netspan's database (via SNMP) and checks whether the EasyST's MAC address
appears in the database. If it locates the MAC address, the Netspan feeds all the EasyST's
configuration parameters (service flows) from the database and the BS downloads them to the
EasyST device.