Сдам Сам

ПОЛЕЗНОЕ


КАТЕГОРИИ







The department of switching systems





The department of switching systems

A.G.Lojkovsky, V.V.Ganchev, V.Y. Gordienko

 

Part 2. The methodical textbook on production practice

“Management of nodes of DSS SI2000 network with channel switching in the management system Management Node

 

Direction 050903 “Telecommunications”

Specialization “Multiservice means of telecommunications”

 

Odessa 2012
The methodical textbook is made by

A.G.Lojkovsky, V.V.Ganchev, V.Y. Gordienko

 

The methodical textbook has been considered on the department meeting

The Protocol № __ on __ __________ 2012

 

The head of the department ____________ prof. Lojkovsky A.G.

The methodical textbook has been by the methodic senate of the IN faculty

The Protocol № __ on __ __________ 2012

 

The dean of the faculty____________ prof. Strelkovskaya I.V.


CONTENT

INTRODUCTION.. 4

Laboratory work №1. Introduction to the management of DSS SI2000. 5

Laboratory work №2. Acquaintance with the application software of MN.. 9

Laboratory work №3. Description of switching and access nodes

MCA, MLC of DSS SI2000. 13

Laboratory work №4. The first record in the management system.. 16

Laboratory work №5. Configuring of subscriber access. 19

Laboratory work №6. Management of additional types of services. 23

Laboratory work №7. Organization of connection by means of signalling system SS7 29

Laboratory work №8. Routing of outgoing calls. 34

Laboratory work №9. System synchronization. 41

Laboratory work №10. Centrex administration. 43

Laboratory work №11. Groups of serial lines. 49

Laboratory work №12. Organization of calls to special services. 52

Laboratory work №13. Alarm Monitoring system.. 55

Laboratory work №14. Management of MPS power supply system.. 59


INTRODUCTION

Any management system must support implementation of a set of functions defined by the international standards. First of all it is ITU-T Recommendation X.700 and standard ISO 7498-4, which classify tasks of management systems as five groups:

• Management of a system configuration and naming;

• Error processing;

• Analysis of performance and reliability;

• Security management;

• Accounting management.

For management of network nodes with channel switching of DSS SI2000 the management system Management Node is used, which is connected to controllable objects by means of the management network. Controlling information is transmitted by means of upper layers than the transport one (TCP or UDP), based on the communication protocol IP and the client-server model.

The management node SI2000 MN consists of the application and system software as well as hardware tools. Hardware tools are represented as the computer facility. System software consists of the operating system (Windows 2000), the database management system and some other programs. Application software consists of the set of programs having a convenient table-like graphical interface. This textbook is devoted to capabilities of the management node MN in network management.


Laboratory work №1

Introduction to the management of DSS SI2000

 

The purpose of the work

Acquaintance with the management system. The study of permissions and capabilities of the system configuration. Switching on/off and restarting the system, the work with hosts file.

 

Key positions

2.1. General information. For the management of a huge system of nodes, where it’s required the high reliability and readiness, there exists the configuration of a big amount of working places, one of which, depending on the software, is used as the server of Management Node (MN), and others – as clients of MN.

For low capacity systems there is only one working place, where client and server software of MN are installed.

If nodes are not at the same place, the management terminal (MT) is used for emergent maintenance. The terminal has partial software for both the server and the client of MN. The management terminal is used only for emergency work of the management and technical maintenance on site, so it will not be mentioned in this textbook.

For the system management the set of commands “Management Node” is used. They are:

Utilities, for the secure management of additional services of the operating system Windows;

Alarm Monitoring, for the launch of the application Alarm Monitoring;

MN Configuration, for the management node configuration in the window MN Configuration Settings;

MN Login, for providing the access to the initial window of the application Management Login.

For the access to this set of commands the shortcut Start > Programs > Management Node is used.

The group of commands Utilities allows safely managing of additional Services, which are used by the application software of the MN server. The use of commands (excluding the command for displaying of the status of services) is only allowed to system users. The halt instructions (MN Stop) and the run command (MN Start) are used before and after the execution of MN software installation. The access to them is given only to the user mnadmin, who installs any software. For users mnadmin and sysadmin the restart command is intended (MN Restart). But all the users have the access to the command of displaying the current status of services (MN Status).

The application Alarm Monitoring is used for control and view of alarm signals, referred to the controllable objects. The laboratory work №13 is about this program.

The MN configuration is performed at the window MN Configuration Settings, tabs of which allow making:

- MN Server Hostname – the definition of the MN server’s name, where the database server is located and servers of the management applications work as well;

- Managed Objects – the management of controllable objects in the window Alarm Monitoring;

- Alarm Panel – the configuration of the connection of the alarm panel ISA;

- Directory Locations – the choice of the temporary folder location;

- Log File Size Configuration – the set of the working files’ size;

- Documentation Language – the choice of the language of the manual;

- MN Locale – the choice of the management application language;

- Mail Notifications – the management of messages about alarms via e-mail

- Backup – the management of database backups;

- Charge Transfer – the configuration of the transfer of accounts data from the MN to the database of a processing center;

- Time Synchronization – the configuration of the system time synchronization;

- Reboot Time – the set of the time for the automatic restart of the MN server.

For the launch of management applications the main window of Management Login is used.

Before the first start it is necessary to perform the configuration of MN in the window MN Configuration Settings.

2.2. Switching on/off and restarting of MN. The procedures depend on the installed software. If there is only MN client software installed on a computer, the built-in Windows commands are used. And we need to pay attention if there is the server software installed on the computer. It is strongly recommended to use the commands of the secure management of additional MN services (Utilities).

If for switching off and restarting the computer, where the MN server software is installed, the built-in Windows commands are used, there is a possibility to lose some data.

The switching on the MN server is performed by the pressing the Power button with installed software. After the boot of the operating system the logon window appears. Depending on the following actions supposed to be done there exist 2 operation modes of the user:

mnadmin (User Name: mnadmin, Password: mnadmin) – used for the MN management;

sysadmin (User Name: sysadmin, Password: sysadmin) - used for the management of the network nodes with use of MN software.

Besides the auto-restart of the computer, where the MN server is installed, there is also an emergent restart. To do this it is necessary to login as mnadmin or sysadmin and run the command Start > Programs > Management Node > Utilities > MN Restart. If the utility SI2000 System Server is not active or if the data backup is being processed at the same time the computer restart will not happen. In other cases the notifying window about the start of restart will appear. Additional server services will stop MN and the restart of Windows operating system will be executed.

Some commands, available from the management program’s menu, the set of tabs and data in windows depend on the type of the computer. In the reference book all of them are described, but in the program window they can be missing.

The procedure of the switching off the computer depends on the installed software there. If there is only the MN client software, then after closing all windows of all management applications the normal halt is performed. If there is also the installed MN server software (used for the continuous work), besides that it is necessary to login the system as mnadmin and check the status of all connections of MN clients, installed on other computers. It is required to provide the closing of all application windows on active clients and to shut down sessions in such a way.

2.3. Hosts file. For obtaining the correspondence of symbol names of nodes with IP addresses of their network interfaces the hosts file is used in the MN management system. This file does not have an extension. To view and to edit it the application notepad is used.

The file path is: C:\WINNT\system32\drivers\etc\hosts

In this file in the line with an IP address the node name is written. Here is an example of the hosts file:

# Copyright (c) 1993-1999 Microsoft Corp.

# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.

# This file contains the mappings of IP addresses to host names. Each

# entry should be kept on an individual line. The IP address should

# be placed in the first column followed by the corresponding host name.

# The IP address and the host name should be separated by at least one

# space.

# Additionally, comments (such as these) may be inserted on individual

# lines or following the machine name denoted by a '#' symbol.

192.168.1.196 centrala452

192.168.1.221 onas_320

The symbol # is used to mark comments.

 

Key questions

3.1. What is the software Management Node intended for?

3.2. What utilities are included in the set of commands of Management Node?

3.3. What usernames are used to login the system? Describe main differences.

3.4. What is the hosts file used for? What information does it contain?

 

Hometask

4.1. Give answers to the key questions in the written form.

4.2. Get familiar with the basic capabilities of the MN system management.

 

Laboratory task

5.1. Turn the computer with Management Node software on.

5.2. Get familiar with capabilities of the set of utilities of MN.

5.3. Examine the parameters available for changing in every tab of MN Configuration Settings.

5.4. Perform the MN server restart.

5.5. Login the system as sysadmin and mnadmin, make conclusions about distinctions.

5.6. Open the hosts file. Examine existing records.

5.7. Make a new record for a node (it will be used later, in lab work №4).

The content of the protocol

6.1. The answers to key questions 3.1-3.4.

6.2. The description of results of settings changing in MN Configuration Settings.

6.3. The designation of types of access, login/password for logon.

6.4. The basic information about the content of the hosts file. The results of changing of the hosts file.

6.5. Conclusions.


Laboratory work №2

The purpose of the work

To get familiar with the application software of MN. To consider the structure of every application, management principles, types of access, possibilities of seizure and leaving the nodes for administration. To study basic commands used for management in MN.

 

Key positions

2.1. General information. By means of the shortcut “ MN Login ” it is provided the access to the initial window of the management application “ Management Login ”, which will be used for the system management. In the main window of the program the list of all nodes created in the system is listed as well as corresponding buttons for running other utilities of the application software. The application software of MN provides performing functions of management and maintenance. It consists of the following applications:

CMG (Configuration Management) allows performing administration of hardware and global data, administration of access, administration of subscribers’ data and additional services, administration of calls routing and administration of signaling.

FMG (Fault Management) allows performing administration of current trials and trials on demand.

AMG (Accounting Management) allows administration of billing, sending and processing Call Detailed Records (CDR) and tariff meters, archiving CDR on data storage devices, sending data to the computing center and providing its security.

PMG (Performance Management) allows administration of measurements and collection of statistical data, showing results, obtained after measurements on customer units, Centrex groups, business groups and other groups, trunks.

SMG (Security Management) is intended for providing and cancellation of permissions to work with applications CMG, FMG, AMG, PMG, SYS and SMG on different nodes.

SYS (System Management) allows administration of the basic data of nodes, administration of the management network DCN, installing node software, backing databases and network configuration data up, administration of the real-time clock on the node, restoring data backups, executing procedures of database matching, preparing a numeration play, changing the numeration and managing of the call tracking program.

Applications for management and maintenance, which provide input, changing and deleting data, are located on the MN client side and are connected by corresponding software on the MN server side.

2.2. Seizure of the node. To prevent simultaneous changing of data of the node by several users, who use the same group of commands of the application, functions of seizure and releasing of the node.

Node occupation from the application software for changing data is performed in the window Set Mode & Select Node of the section Mode & Seizure. This menu is present in all applications CMG, FMG, AMG, PMG, SYS and SMG. To obtain permissions for changing data of the node it is necessary to select the mode Read/Write, then the node you want to seize (column Status -> Selected); by default the access to the node is in the mode Read Only.

The action of node seizure is necessary to be done every time during the work with applications and the necessity of applying changes in databases. The releasing of the node is performed automatically by the closing of the application window.

2.3. Possibilities during the work with the application software. During the work in all windows of the program the following commands can be executed:

Insert – a new window opens, by means of which information about a new object can be added;

Update – is intended for changing the record with information about the object;

Delete – is used for deleting the information about the object;

Apply – semipermanent data is recorded to the database;

Close – is used for closing the active window;

Query and Retrieve – is the combination used for search of necessary information, when the required data is not shown by itself.

Let’s consider more carefully the menu, included in the application software (e.g. CMG). For this purpose we select the necessary node for the configuration (for all examples in these methodical instructions it is necessary to use Node 6000, Node name: ics).

The main window of the application SI2000 – Configuration Management is opened by the command CMG in the window Management Login.

On the menu bar there are 2 main menus (File and Record), which appear in the most part of windows of different command, and menus, serving for:

• Administration of global data of the node (Global);

• Administration of access (Access);

• Administration of the data about subscribers and additional services (Subscriber);

• Administration of the call routing (Routing);

• Administration of the signalling (Signalling);

• Administration of subscribers of pre-paid services and accounts (Additional Features);

• Seizure and releasing of the nodes (Mode & Seizure).

In the window data of nodes, for which administration is enabled, is listed. For every separate node the following data is shown:

Node;

Node name

DB Synchronisation – is the indicator of matching of databases;

Area Code.

The data in this window can’t be modified because they are administrated in the application SYS.

Each of these applications will be considered more carefully during the study of main examples of nodes administration in the network.

 

Key questions

3.1. What application software is used in MN?

3.2. What modes of work can be used? What is this separation intended for?

3.3. What are the main commands used during the work with the application software of MN?

 

Hometask

4.1. Give answers to the key questions in the written form.

4.2. Study the designation and basic possibilities of the application software of MN.

 

Laboratory task

5.1. Turn the computer with software of MN.

5.2. Run MN Login. Sequentially run every program for the node ics (6000). Study all available menus for administration.

5.3. Open the application CMG. Change the access mode on the Read/Write, compare with the previous mode and mark what functions have become available.

5.4. Study the possibilities of creation of new objects (Insert), modifying (Update), deleting (Delete) and applying (Apply) changes. For acquaintance use the table CMG -> Subscriber -> Subscriber.

5.5. Consider the possibilities of search of the required information with the help of the combination Query and Retrieve. To perform the search the set search parameters must fully correspond to the data in the table. For example, for the search of all subscribers with Feature Set: Analog Public, it is necessary after the query to input in the column Featured Set the full record of required parameter: Analog Public, but not the part of it (no results will be shown if we set this parameter like: Analog)

5.6. Get familiar with the content of the tables of the CMG application more detailed.

 

The content of the protocol

6.1. The answers to the key questions 3.1-3.4.

6.2. The description of the appearance of MN applications.

6.3. The differences in possibilities of administration for different modes of access to the nodes.

6.4. The possibilities of the basic administration commands.

6.5. The content of the tables of CMG application.

6.6. Conclusions.


Laboratory work №3

MCA, MLC of DSS SI2000

 

The purpose of the work

Acquaintance with architecture of switching and access nodes. To learn principles of designation of parameters of nodes. To consider the rules of labeling of removable blocks of modules MLC, MCA.

 

Key positions

2.1 Architecture of nodes. The switching node MCA consists of the central and peripheral parts.

The central part has backup and it contains such cards:

· CCA – control device of the central node;

· IVA – hard drive adapter;

· CVC – central processor;

· IHA –extended interface of a high speed serial trunk;

· DVA – battery static memory device (SRAM).

The peripheral part:

· TPC – primary access interface;

· CDA – communication controller;

· RPA – the card for primary access protection;

· RPC – the card for primary access measurements.

The access node MLC consists of the central and peripheral parts as well.

The central part:

· CLC – control device of digital access node;

· CDG – communication controller and processor;

· QMB – flash drive or IDE hard drive;

· TPE – interface for E1 trunks, 4*2 Mbps;

· DDD – DSP processor;

· PLC - power supply and generator of ringing current;

· KLB – testing block of subscriber lines.

The peripheral part:

· SAC – the card supporting 32 analog subscriber lines with interface Z;

· SBx – the card supporting 16 digital subscriber lines with interface S or U;

· TAx – the card supporting physical subscriber lines along the direction of analog exchanges of the network.

2.2 The description of nodes, labelling of cards. During the work with MN nodes will be described with using of the special format (Example is shown in the table 3.1

Table 3.1 – The labelling of switching and access nodes in MN

Name of the product Release
MN Release Node Release DB Release Data Release
MCA (SN) CS5083AU 380 PANM0A20 MVVG0A24 PBFB0A10 PBFA0A17
MLC (SAN) LS5083 AU140 PAGY0A22 MVVC0A41 PBHB0A10 PHNA0A17
MLC (ANC)LA5053AX100 PHPC0A09 MVYM0A20 PJMB0A07 MVYN0A12

Where:

MCA (SN) CS5083AU380 – the general node designation;

SN (switching node) – the designation of belonging of the node to the type “Switching Node” (such variants are also possible: SAN (switch and access node) used as RSwM and AN (access node) used as local or remote SM);

CS (central switch) – the designation of the node location in the network, the central node (such variants are also possible: LS (Line switch) and LA (line access);

5 – Hardware version. Almost all Iskratel equipment with channel switching has the version 5. The nodes with the packet switching have the version 6.

83 – Software version. On the same hardware different software version can be installed;

AU – the index, meaning that the node has specification for operation in Ukrainian networks;

380 – the number of the packet of software.

The designation of cards in modules has the following view:

UTA XXXX YY XXX – the removable block;

ETN XXXX YY XXX – additional card

The first 3 letters are the code of the card;

XXXX – the variant of the card;

YY – production condition (state).

Here is the example:

UTA 5008 BD 011 CCA

The codes of all cards of nodes MLC, MCA are shown in the table 3.2.

 

Table 3.2 – Designation of cards of switching and access nodes in MN

Node Card Code of the card Node Card The code
MCA CCA UTA 5008BD MLC CLC UTA 5032
IHA ETN 5027AB CDB ETN 5019
IVA UTA 5026 BC TPE ETN 5027
CVC UTA 5031ВВ PLC UTA 5039
DVA ETN 5029AA KLB ETN 5016
TPC UTA 5013AF SAC UTA 5011
СDA ETN 5005AA SBA UTA 5003
RPA UTA 5023AA SBC UTA 5028
RPC UTA 5025AB TAB UTA 5014
TPI ETN 5050AA DDA ETN 5002
    CDG ETN 5046

Control questions

3.1 What parts are included in nodes MLC, MCA?

3.2 What is backup of the central access node MCA intended for?

3.3 What are different versions Release of nodes used for?

3.4 What is the difference between a removable block and additional card?

 

Hometask

4.1 Give answers to the key questions in the written form.

4.2 Learn the architecture of switching and access nodes.

 

Laboratory task

5.1 To turn on the computer with MN.

5.2 Consider in the main windows of MN Login the parameters of versions MN Release, Node Release, DB release, Data release for nodes, created in the management system.

5.3 Consider the structure of the equipment in the lab, define the types of cards used in the system and decrypt their labels.

5.4 Find the correspondence of cards that u saw and in MN.

 

The content of the protocol

6.1 The answers to the key questions 3.1-3.4.

6.2 The list of equipment in the lab, to which MN has access.

6.3 The list of removable blocks of equipment.

6.4 The meaning of the card labeling.

6.5 Conclusions.


Laboratory work №4

The purpose of the work

To prepare semi-permanent data for creation of the first record of the switching node MCA in MN

 

Key positions

2.1 The preparation of the node databases. Let’s describe in details the sequence of operations performed during the creation of switching or access nodes. For this it is necessary to log in the system MN as sysadmin user. In the database MN it’s necessary to prepare a new node. In the window Management Login, by means of the option New it is necessary to choose MN version (MN Release), software version (SN Release), database version (DB Release), data version (Data Release) and manual version (Document Release) [note that the certain values of database parameters depend on the installed equipment and are specified by the teacher during performing of the laboratory work). By means of the button Accept confirm chosen versions. The window System Management is opened automatically. Such parameters can be chosen:

· Node (4-digit node number) – a number by the project which will represent the node code.

· Node Name – additional description of a node (comment).

· Hostname – a parameter which is converted to the IP-address of the node. It should be the same as the parameter in the hosts file.

· Duplicated – a parameter which shows that the node has backup (used for nodes MCA).

· Area Code – denotes the code of the telephone area of the node.

· Type – parameter Public should be chosen.

· Hardware Type – the type of the node physical architecture (FULL, 10U, 1U).

· A Side Hostname & B Side Hostname – these parameters define the IP-addresses of left and right sides of SN. They should be the same as parameters in hosts file.

At the bottom it is necessary to check the option Default Data to create a node with parameters by default.

The input of parameters is confirmed by the button Accept in this window and by the button Apply in the window System Management. The procedure of putting the new node into operation of the database begins. In the window System Management the new record will appear.

During writing SNMP manager is started again and after successful launch the dialog window appears, which is confirmed by the button OK.

2.2 The creation of the numbering plan. During the first installation of the node SN in the window System Management it is necessary to choose the option Administration – Numbering Plan. In the appeared window by the command Insert it is necessary to enter the range of subscribers’ numbering, which will be used on the new node (parameters From DN – To DN).

After this it is necessary to change the state of the node to In Use * (menu SYS – Administration – Node Data Status).

*during the creation of the node the subscriber 2038 is created automatically, he should be deleted. For this choose: [node] – CMG – Mode read/write – subscriber – subscriber – query – retrieve – [choose the subscriber] – delete.

During the work with nodes the following states are possible:

· In Use;

· In Preparation;

· Out of use;

For deleting the node, it should be disabled at first (Out of Use state).

2.3 Export of semi-permanent data. During the first creation of the node in MN the application System Management (SYS) is used. In the window SYS choose Administration – Database – Node Data – Export.

In the field Directory the directory name, to which the data export will be performed, is specified. The export begins by choosing Run and then Yes. To the directory c:/SI2000/database/"DB Release"/"Data Release"/target /Sn <node number> /<directory name>/ the backup of the node database is written.

After the installation of data to the node the further configuration of node parameters will be done. It will be considered on the next laboratory works.

 

Key questions

3.1 What user is used for the creation of the node MCA?

3.2 In what case parameters A Side Hostname & B Side Hostname should be specified?

3.3 What is numbering plan?

3.4 What does the procedure of the export of semi-permanent data consist in?

 

 

Hometask

4.1 Give answers to the key questions in the written form.

4.2 Study the architecture of switching and access nodes.

 

Laboratory task

5.1 Turn on the computer with MN.

5.2 Start the procedure of the node creation. The parameter MN Release specify as PAGY0A21, other parameters will be chosen automatically.

5.3 In the opened window SYS enter parameters which are necessary for the node creation. The parameter Hostname should coincide with the record in the hosts file.

5.4 Delete the subscriber 2038.

5.5 Create the numbering plan.

5.6 Change the state of the node to In Use.

5.7 Prepare the export of semi-permanent data.

 

The content of the protocol

6.1 The answers to the key questions 3.1-3.4.

6.2 Parameters Release during the node creation.

6.3 Parameters during the node creation in SYS.

6.4 The created numbering plan

6.5 Conclusions.


Laboratory work №5

The purpose of the work

Learning of capabilities of subscribers’ interfaces management. Creation of user accounts, linking them to the physical access, testing of created connections.

 

Key positions

2.1 The management of user accounts. All the data about subscriber numbers can be written, changed and deleted in the window Subscriber. Administration of subscriber data is performed by the menu CMG – Subscriber – Subscriber. Every subscriber record has following data:

· Node;

· Directory No. (subscriber number);

· Basic Service (subscriber category);

· Module, in which it’s located access, connected to the Directory No. (if the number is free, the number of the module will be 0);

· Port, to access of which Directory No. is connected;

· Feature Set – the set of additional services;

· Centrex-group, in which the subscriber is included;

· Traffic Meas. Group, in which the subscriber is included (this data is used in the application PMG).

· Redundant Access (backup connection).

During the creation of new subscriber numbers this data can be written for one or several subscribers simultaneously, what is defined by the values of parameters Start Directory Number and End Directory Number, notably:

· If data is entered for one subscriber, the values of both parameters are the same;

· If data is entered for several subscribers simultaneously, the range of subscriber numbers is specified by values of these two parameters.

The parameter by Mode defines increment when the data is entered for several subscribers simultaneously. If the step is 1, all the numbers in the range will be entered. If the step is 10, only every 10th number from the specified range will be entered. During the creation of a new subscriber number it should be obligatory included in the range of numbers, described in the numbering plan.

Also for the new subscriber such parameters as Basic Service and Feature Set should be specified.

The sets of additional services are formed in the window Feature Set, which is opened by the command Subscriber – Feature Set. Every set of services can be changed later according to real needs. It can be performed in the window Subscriber by the command Update.

In addition by the checking the checkbox (View report) the report about new entered data after completing the procedure can be shown. The output of the report is shown in the application Notepad.

New subscribers are written directly to the database and for their search in the table an operator uses command Query and Retrieve.

By means of the command Update such things can be done:

· To change the set of additional services for every subscriber – Feature Set;

· To grant and cancel the right of using of additional services (the right is granted by the checkbox in the column Authorization);

· To activate and deactivate granted additional services (the service is activated by the checkbox in the column Activity);

2.2 Binding subscriber number – port. The subscriber access defines the characteristics of the physical subscriber port. The set of subscriber accesses depend on hardware and is defined during the administration of subscriber cards.

The window Analog Access is opened by the command Access – Analog – Global. There you can change characteristics of every single access and add the data of new analog accesses.

About separate accesses such data is shown:

· Node;

· Module, where the port is located;

· Port – the physical port for which we specify characteristics;

· Default DN – the subscriber number, connected to this access (this parameter has the value -1, if no number is connected to this access);

· DTMF Auth. – the way of dialing;

· Variant – the variant of data about the access.

Data can be added for one access or for several ones simultaneously, what is defined by the values of parameters Start Port and End Port (the way of input is the same as Insert – Subscriber).

By means of this command the window Analog Access – Update is opened, where you can change the type of dialing (DTMF Authorization) and the variant of data (Variant).

The window Numbering is opened by the command Access – Numbering, Simultaneously near the name of the window the number and the type of the node are also shown. This window is intended for the administration of the numbering of accesses. The administration of the numbering of accesses means the connection of subscriber numbers to the ports and disconnection. For every digital and analog access several subscriber numbers can be assigned.

The window Numbering consists of 3 fields:

· Access, which is used for view and output of data about accesses, for granting rights to the service MSN and for the creation and deleting the connection of the certain access with the subscriber number or several numbers;

· Subscriber, which is used for view and output of data about subscriber numbers and for creation and deleting connections with chosen accesses;

· Common field intended for the connection of accesses with subscriber numbers.

During the output of data on demand of the user (commands Query and Retrieve) such options can also be chosen:

· All, when the output of data about all ports and subscriber numbers is requested.

· Linked, for the output of connected ports or subscriber numbers;

· Unlinked, for output of available free ports and subscriber numbers.

To define the correspondence of an user account to an available port it is necessary to perform sampling with parameter Unlinked in the window CMG – Access – Numbering for tables Access and Subscriber, choose the necessary number and port and link them by means of the button Link MASN.

 

Key questions

3.1 How can administration of subscribers’ records be performed?

3.2 What is Feature Set?

3.3 What is parameter by mode used during the creation of subscriber numbers intended for?

3.4 What is the menu Access intended for?

3.5 How can linking number-port be performed?

 

Hometask

4.1 Give answers to the key questions in the written form.

4.2 Study the principles of subscriber accesses administration.

 

Laboratory task

5.1 Turn on the computer with MN.

5.2 Look through the list of subscribers created in the node. Define the created numbering plan.

5.3 Check the presence of user accounts unlinked to ports.

5.4 Create a user account (without linking), included in the numbering plan.

5.5 Create several user accounts, using the parameter by mode.

5.6 Open the list of accesses (ports), check the presence of available free ports.

5.7 Delete and then create again one of accesses, consider configuring parameters.

5.8 Perform the linking of one created account to the available port.

5.9 Connect the testing telephone to the corresponding port on the cross, perform the testing call.

 

The content of the protocol

6.1 The answers to the key questions 3.1-3.5.

6.2 Numbers of accounts created at stages 5.4-5.5, values of chosen parameters.

6.3 Numbers of available ports, results of execution of the stage 5.7.

6.4 The sequence of procedures for testing of obtained results.

6.5 Conclusions.


Laboratory work №6

The purpose of the work

To get familiar with additional types of services used in digital switching systems, realization principles and providing to subscribers. To test the work of examined services.

 

Key positions

2.1 General information. For all subscribers of DSS there exists a possibility to use a telephone not only like a communication tool, but like an additional assistant in business and private life as well. Additional services of digital exchanges (ATS), granted to a subscriber, can remind about a forthcoming meeting, give a possibility to hold conversation with several subscribers simultaneously, protect a telephone from unauthorized access to the urban, toll and international networks and so on.

ATS in MN are configured in the window Subscriber – Update and are divided into the following categories:

1. Forwarding (1) and Forwarding (2);

2. Identification:

3. Waiting;

4. Barring;

5. Abbreviation;

6. Group;

7. Multiparty;

8. Alarm & Notification;

9. Tariff;

System

Other.

It is important that for providing a service to a subscriber, in his set of additional services (Feature Set), all these services should be authorized (Authorization). Until that, while a considering service is not authorized in Feature Set, its activation (Activity) for the certain subscriber is impossible. During the authorization of a service for the set ATS, such a service can be activated for any subscriber with such Feature Set.

All services, managed in MN, are denoted by upper-case Latin letters like an abbreviation (e.g. CW – Call Waiting).

Let’s consider in details the most popular services used by subscribers.

Forwarding.

· Call Forwarding Unconditional (CFU). Incoming calls are immediately forwarded to the number, mentioned at activation of the service. During the activation of the service (checkbox Activity) in the field Destination DN it is necessary to provide a subscriber number, to which all calls will be forwarded. If necessary it is possible to setup Call Forwarding Unconditional, Time Dependent (CFUT), which is located on the tab Forwarding (2).

· Call Forwarding Busy (CFB). This service is executed when a terminal of the destination subscriber with activated service CFB can’t accept a new call and responds with busy tone. The call will be forwarded to the number of a terminal, mentioned during the activation of the service.

· Call Forwarding No Reply (CFNR). If the subscriber with this activated service will get a call, the timer is started. If the subscriber until expiration time does not respond, it will be forwarded to the specified number, chosen during the activation. For this service additionally the time interval, after which the call is forwarded, can be specified (Not Respond Timer).

Any of these services can be changed to the selective service, for this (e.g. for the service CFU) there exists the parameter Selective CFU (the same for CFB and CFNR) for which the options Authorization and Activity should be chosen. The button More opens the window for management of sampling of lists. Both white and black lists can be created for forwarding. Call from numbers in whitelist will be forwarded, others – not.

For all services of forwarding such parameters are specified:

· Destination DN Subaddress;

· Call to Forward (set up for Feature Set);

· Call Transfer (CT) It allows transferring the active connection to another subscriber. For this it is necessary to hold the current call, dial the number of the subscriber to which you want to transfer the call and after his response to put down the handset (e.g.: during the conversation of subscribers A and B, the subscriber A holds the call, dials the number of the subscriber C and after reply of the subscriber C, the subscriber A puts down the handset, the call is continued between subscribers B and C).

2.3 Identification services:

· Calling Line Identification Presentation (CLIP). It is used if the correspondent possibility exists in the terminal of the destination subscriber fot identifying and displaying the number of the call subscriber’s number.

· Calling Line Identification Restriction (CLIR). It cancels the possibilities of using of the service CLIP, Override, the activity of the service is specified by the option Activity. Also it’s possible to choose variants of prohibition rights, Authorization:

- The absence of the right to use the service, Not Authorized;

- The permanent right to use the service, Permanent;

- The temporary right to use the service with the default parameter On Demand Allowed;

- The temporary right to use the service with the default parameter On Demand Restricted.

Other services of the tab Identification are used less frequently for providing by service providers and will not be considered in this textbook.

2.4 Waiting:

- Call Waiting (CW). If the subscriber, who has this service registered, receives the call from the third party, the subscriber will hear the corresponding tone signal, which informs about the receiving a new call. During this the call subscriber C hears Ring back tone and waits for the answer of the subscriber A. It is setup for Feature Set.

- Call Intrusion (CINT). It allows the subscriber C using the service to interfere in the active conversation of subscribers A and B. Such variants are possible:

- The connection to the busy subscriber is Not Allowed;

- The connection to the busy subscriber With Tone Indication;

- The connection to the busy subscriber Without Tone Indication;

- The connection of a Dispatcher to the busy subscriber.

The modes of the service execution, Invocation Mode:

- The service is Not Active;

- The connection to the busy subscriber on demand, Consultation;

- The automatic connection to the busy subscriber, Network;

· Call Intrusion Protection (CINTP). It blocks all possibilities of the function CINT.

2.5 Barring of the calls:

· Do Not Disturb (DND). The subscriber who doesn’t want to be disturbed by means of the special procedure can activate the service. The service does not forbid outgoing calls of the subscriber who uses it. The call subscriber with the activated service does not receive indication, informing about receiving a call. The call subscriber, who dials the number of the subscriber with this service, receives the indication of the permanent ban on incoming communication. For its execution only activation is required.

If the subscriber A uses the service of DND cancellation (DNDO), the terminal of the subscriber B will receive the incoming call.

· Selective Call Acceptance/Selective Call Rejection (SCA/SCR). These services allow a subscriber to accept/reject only those calls, the subscriber numbers of which are included in his white/black list, the type of the list is defined by the parameter List Mode, its length – List Size. For administration of services SCA/SCR it is used the window, opened by the button More on the tab Barring. There such rights are managed: right for CgPN (checking of the call number), for RgPN (checking of the last forwarded number) lists for service execution.

For administration of a number list for acceptance/rejection the window Selective Call Acceptance/Rejection is used. In it such parameters are specified: the type of the service (Feature), the prefix of the calling number CgPN (CgPN Prefix), the destination number (Destination DN).

· Selective Call Originating (SCO). This service allows a subscriber to limit outgoing calls. The limitation is executed by the way of comparing dialed numbers with numbers or their prefixes included in the black or white lists. Managing is the same as it it for the service SCA/SCR.

2.6 Abbreviation:

· Fixed Destination Call Immediate (HOTI). When the subscriber with this service picks up the handset, without Dial Tone, the dialing of preset number happens. Calling subscriber number, Destination DN is specified in the corresponding field. The provided connection is executed identically as the subscriber would do it manually.

· Fixed Destination Call with Time-out (HOTD). When the subscriber picks up the handset, the timer is started. The subscriber receives acoustic indication of the start of execution of the service HOTD. If the subscriber dials digits until expiration time, the execution of the service will stopped and the subscriber continues to setup connection in the normal mode. If the subscriber dials nothing until expiration time, the system will automatically set up the connection with preset number. The subscriber receives the indication of dialing a number HOTD.

In details the possibilities of work with abbreviation will be considered in next segments.

Group.

In details this tab will be considered on the laboratory work №11ю

2.8 Multiparty:

· Three-Party Service (3PTY). The subscriber, who wants this service must have the active connection and one connection on hold. The initiator of the conference can be either call or called subscriber. The execution of the service is started by the control procedure. After setup the conference all three participants receive indication about three-Party.

· Conference Call, Add-on (CONF). The subscriber-initiator of the conference has the possibility to activate this service by means of the controlling procedure on the stage of dialing, when he does not have any on hold connections as well as on the stage of conversation.

2.9 Alarm and Notification:

· Alarm Call Service (ACS). Automatic alarm is executed at exact time on forthcoming days or daily at the same time or on chosen days. When current time coincides with specified, the subscriber with this service receives the call on demand.

2.10 Tariff. Such services are managed here:

· Tariff Origin Code;

· Class of Charging Service (the right of the subscriber to use services with the range of tariffing and registration;

· Charge Site;

· Advice of Charge.

The left tabs System and Other are used for managing of services, referred to the node and some common data of subscriber and the services, not included in one of the above.

 

Key questions

3.1 What are set of additional services Feature Set intended for?

3.2 What are additional types of services intended for?

3.3 Briefly describe the designation of groups ATS from stages 2.2-2.10?

 

Hometask

4.1 Give answers to the key questions in the written form.

4.2 Study the designation of considered ATS.

 

Laboratory task

5.1 Turn on the computer with MN.

5.2 Open the list of created sets of additional services.

5.3 Create a new Feature Set, which will be used for testing of services.

5.4 Define 3 telephone numbers, on ports of which the terminals for testing will be connected.

5.5 Change Feature Set for chosen numbers, to the test one, created on the stage 5.3.

5.6 Using instructions to the services, sequentially check the possibility of providing services, considered on stages 2.2-2.10, administrating of which is performed from the workplace.

5.7 Using instructions to the services, sequentially check the possibility of providing services, considered on stages 2.2-2.10, administrating of which is performed by the testing terminals. The code of commands for service activation should be obtained by yourself, using analysis of the prefix table.

 

Laboratory work №7

The purpose of the work

To learn the principle of organization and administration of signalling system SS7 at the switching node. To consider procedures of administration and inclusion of a new signalling link.

 

Key positions

2.1 General information. ITU-T defined signalling system SS7 as the standard for providing operation of telephone exchanges of different manufacturers. SS7 is used by the majority of switching systems with software management all over the world.

Every signalling point (a node of the network) has its own point code (Signalling Point Code – SPC), which uniquely defines this SP inside the SS7 network. The length of SPC is 14 bits, it means that in one network up to 16384 different SPC can exist.

Signalling messages between exchanges A and B are transmitter by Signalling Link. The number of links can vary from one to several. All signalling links between two exchanges are united in Link Set,

The mode of operation, during which a route of voice and signalling channels coincides, is called Associated operation mode.

Assume that we have three exchanges, connected as “any with any”. In this case there are voice and signalling channels between any two exchanges. Voice and signalling networks are independent on each other and signalling messages between exchanges A and B can be transmitted through the exchange C. This operation mode is called qvasi-associated operation mode, and the exchange C – Signalling Transfer Point (STP). This method is used when there are only few voice channels between exchanges A and B and using of a separate signalling channel is not effective. One signalling channel can serve for several destination points.

The signalling network SS7 is divided into the four independent levels:

· International 0;

· International 1;

· National 0;

· National 1.

By means of International 0 and International 1 national networks of the level National 1 are united in the international network SS7.

Inside the local network service providers work on the level National 0 and every exchange inside this network has its unique SPC. Local networks are connected together by means of the signalling network of the level National 1.

2.2 Forming of the database of semi-permanent data. For formation of the database of semi-permanent data at connection organization, served by the signalling system SS7, it is necessary to perform next actions:

2. To describe using ports for communication organization (with E1 trunks). Configuration of ports, channels, and groups of channels is considered in the section about call routing.

3. To enter common data for SS7 operation. For this we use CMG – Signalling – SSN7 – Common Data. This data should be described only once, when SS7 is used for the first time. Parameters:

· Network Indicator defines the level of the SS7 network, on which the exchange works. If it works on the level of a local network the parameter Network Indicator should be equal to 3 (the level National 0). All possible values of this parameters are shown in the table 7.1.

Table 7.1 – Values of the parameter Network Indicator

Network Indicator The level of the network
  International 1
  International 0
  National 1
  National 0

· Congestion Accept, Congestion Discard, Congestion Onset, Congestion Abatement are used for management of overloads in the subsystem of message transfer (2-3 layers according to OSI).

· SSN7 Realization defines the variant of realization of the signalling system SS7. The value of this parameter Russian Realization corresponds to Russian specifications of the signalling system (they are similar to specifications of Ukrainian networks).

3. It is necessary to enter data for signalling points of SS7. Use the menu CMG – Signalling – SS7 – Signalling Point. Parameters:

· SSN7 Signalling Point defines the number of the signalling point. It is inner parameter of the exchange and takes values from 0 to 127. It is important that Signalling Point with the number 0 corresponds to the managed exchange. It means that describing the signalling point 0, we enter data about our own exchange. Signalling points with other numbers correspond to other exchanges of the network, with which signalling links will be described. All exchanges should be described, which we have direct connections by voice or signalling channels to.

· Point Code defined the code of the described signalling point. The point codes for the whole network are defined by the corresponding project organizations. At indication of the point code it is necessary to convert 14-bit code to the decimal form. For example: the code of the exchange is 20-11-3, in binary form 010100-001011-11 should be converted to the decimal form, so we get 5167.

· Point Type defines the type of the signalling point. STP – Signalling Transfer Point, ISUP – ISDN User part; STR and ISUP – combined transfer-end signalling point.

· Link Set 1 and Link set 2 define numbers of link sets of signalling channels, which are necessary to user for transmitting messages to the described signalling point. If for transmitting of signalling messages to the described signalling point only 1 link set is used, then the value of Link Set 2 should equal 0.

· Link Set Alt defines the number of an alternative list set, which can be used for transmitting of signalling messaged to the described signalling point in a case of rejection or overload of







ЧТО ПРОИСХОДИТ, КОГДА МЫ ССОРИМСЯ Не понимая различий, существующих между мужчинами и женщинами, очень легко довести дело до ссоры...

ЧТО И КАК ПИСАЛИ О МОДЕ В ЖУРНАЛАХ НАЧАЛА XX ВЕКА Первый номер журнала «Аполлон» за 1909 г. начинался, по сути, с программного заявления редакции журнала...

Что будет с Землей, если ось ее сместится на 6666 км? Что будет с Землей? - задался я вопросом...

ЧТО ПРОИСХОДИТ ВО ВЗРОСЛОЙ ЖИЗНИ? Если вы все еще «неправильно» связаны с матерью, вы избегаете отделения и независимого взрослого существования...





Не нашли то, что искали? Воспользуйтесь поиском гугл на сайте:


©2015- 2024 zdamsam.ru Размещенные материалы защищены законодательством РФ.