0% found this document useful (0 votes)
114 views36 pages

Description Destinations Features

The information in this document is subject to change without notice. No part of it may be used, reproduced, modified or transmitted without the prior written permission of Nokia Siemens Networks. The information and statements given in this documentation are given "as is"

Uploaded by

Pham Anh Dung
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views36 pages

Description Destinations Features

The information in this document is subject to change without notice. No part of it may be used, reproduced, modified or transmitted without the prior written permission of Nokia Siemens Networks. The information and statements given in this documentation are given "as is"

Uploaded by

Pham Anh Dung
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

SURPASS hiE 9200 V4.

3, operating documentation, issue 5

Destination Features

Approval Date 2009-06-04

Destination Features

The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation. This documentation is intended for the use of Nokia Siemens Networks customers only for the purposes of the agreement under which the document is submitted, and no part of it may be used, reproduced, modified or transmitted in any form or means without the prior written permission of Nokia Siemens Networks. The documentation has been prepared to be used by professional and properly trained personnel, and the customer assumes full responsibility when using it. Nokia Siemens Networks welcomes customer comments as part of the process of continuous development and improvement of the documentation. The information or statements given in this documentation concerning the suitability, capacity, or performance of the mentioned hardware or software products are given "as is" and all liability arising in connection with such hardware or software products shall be defined conclusively and finally in a separate agreement between Nokia Siemens Networks and the customer. However, Nokia Siemens Networks has made all reasonable efforts to ensure that the instructions contained in the document are adequate and free of material errors and omissions. Nokia Siemens Networks will, if deemed necessary by Nokia Siemens Networks, explain issues which may not be covered by the document. Nokia Siemens Networks will correct errors in this documentation as soon as possible. IN NO EVENT WILL Nokia Siemens Networks BE LIABLE FOR ERRORS IN THIS DOCUMENTATION OR FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, DIRECT, INDIRECT, INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT NOT LIMITED TO LOSS OF PROFIT, REVENUE, BUSINESS INTERRUPTION, BUSINESS OPPORTUNITY OR DATA,THAT MAY ARISE FROM THE USE OF THIS DOCUMENT OR THE INFORMATION IN IT. This documentation and the product it describes are considered protected by copyrights and other intellectual property rights according to the applicable laws. The wave logo is a trademark of Nokia Siemens Networks Oy. Nokia is a registered trademark of Nokia Corporation. Siemens is a registered trademark of Siemens AG. Other product names mentioned in this document may be trademarks of their respective owners, and they are mentioned for identification purposes only. Copyright Nokia Siemens Networks 2007. All rights reserved

Important Notice on Product Safety


Elevated voltages are inevitably present at specific points in this electrical equipment. Some of the parts may also have elevated operating temperatures. Non-observance of these conditions and the safety instructions can result in personal injury or in property damage. Therefore, only trained and qualified personnel may install and maintain the system. The system complies with the standard EN 60950 / IEC 60950. All equipment connected has to comply with the applicable safety standards.

The same text in German: Wichtiger Hinweis zur Produktsicherheit In elektrischen Anlagen stehen zwangslufig bestimmte Teile der Gerte unter Spannung. Einige Teile knnen auch eine hohe Betriebstemperatur aufweisen. Eine Nichtbeachtung dieser Situation und der Warnungshinweise kann zu Krperverletzungen und Sachschden fhren. Deshalb wird vorausgesetzt, dass nur geschultes und qualifiziertes Personal die Anlagen installiert und wartet. Das System entspricht den Anforderungen der EN 60950 / IEC 60950. Angeschlossene Gerte mssen die zutreffenden Sicherheitsbestimmungen erfllen.

Id:0900d8058001c384

Destination Features

Table of Contents
This document has 36 pages. 1 2 2.1 2.1.1 2.1.2 2.1.3 2.1.4 2.1.5 2.1.6 2.2 3 3.1 3.1.1 3.2 4 4.1 4.2 4.3 4.4 5 5.1 5.2 5.3 6 6.1 6.2 6.3 7 7.1 7.2 7.3 Destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Feature: A-Number-Dependent Traffic Routing . . . . . . . . . . . . . . . . . . . . . . 8 Mode of operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 A-number screening for subscriber identification . . . . . . . . . . . . . . . . . . . . . 9 A-number screening for special traffic routing . . . . . . . . . . . . . . . . . . . . . . 10 A-number screening for special zoning. . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Black/White List Screening due to signalled CAC . . . . . . . . . . . . . . . . . . . 11 Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Feature: Traffic Distribution among several Carriers (Carrier Quota) . . . . . 13 Mode of operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Example of a call setup using the feature Carrier Selection via Quota Groups 15 Adminstration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Feature: Call Divergence Destination (CDD) . . . . . . . . . . . . . . . . . . . . . . . Mode of operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Call charge registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 18 18 18 19

Feature: Destination Areas with Transmission-Optimized Routing (TMR/IPI) 20 Mode of operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Feature: Hard to Reach Control (HTRC) . . . . . Mode of operation . . . . . . . . . . . . . . . . . . . . . . . Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . Administration Hints and Examples . . . . . . . . . ....... ....... ....... ....... ...... ...... ...... ...... ....... ....... ....... ....... . . . . 26 27 30 30 31 32 35 36

Feature: Mass Call Control (MCC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mode of operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Id:0900d8058001c384

Destination Features

List of Figures
Figure 1 Figure 2 Figure 3 Figure 4 Figure 5 Figure 6 Figure 7 Figure 8 Figure 9 Figure 10 Figure 11 Figure 12 Line types for screening (calling party number check) . . . . . . . . . . . . . . . 9 A-number screening for subscriber identification . . . . . . . . . . . . . . . . . . 10 A-number screening for special traffic routing . . . . . . . . . . . . . . . . . . . . 10 A-number screening for special zoning. . . . . . . . . . . . . . . . . . . . . . . . . . 11 Black/white list screening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Traffic routing with load sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Carrier Quota load sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Traffic routing via a TMR/IPI selection destination . . . . . . . . . . . . . . . . . 23 TMR / IPI selection destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Example of HTRC operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Operating principle of mass call control . . . . . . . . . . . . . . . . . . . . . . . . . 33 Example of detection of the directory number of a mass call destination 34

Id:0900d8058001c384

Destination Features

List of Tables
Table 1 Table 2 TMR/IPI matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Examples of MCC monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Id:0900d8058001c384

Destination Features

Id:0900d8058001c384

Destination Features

Destinations

1 Destinations
Destinations represent the logical link between digit translation and accessing a physical path (trunk group) leading out of the network node. Their main function is in overflow control for the routes. A logical destination area is accessed by analyzing the dialing information via one or more code points. Generally two kinds of Destinations may be differentiated: Destinations with Digit Retranslation Destinations with digit retranslation have no routes associated with them. They exist for the sole purpose of transforming the incoming code. For more details ref. to OMN:EXCH-RO/NT. Destinations with Standard Routing Basically this type of destination is used to select a route with idle trunks to the desired destination (ref. to OMN:EXCH-RO/NT). The EWSD offers a variety of destination features to detect the proper trunks and to set up the connection: A-Number-Dependent Traffic Routing A-number screening for subscriber identification A-number screening for special traffic routing Fraud Prevention (command path: BLSTWLST) , depicted in OMN:EXCH-RO/NT) Traffic distribution among several carriers (Carrier Quota) Call Divergence Destination (CDD) Destination Areas with Transmission-Optimized Routing (TMR/IPI) In high load phases or unforeseen events such as adverse weather conditions, earthquakes, etc. special Traffic Control Destinations are offered to make the most of such extreme network conditions: Hard to Reach Control (HTRC) Mass Call Control (MCC)

Id:0900d80580017c48

Feature: A-Number-Dependent Traffic Routing

Destination Features

2 Feature: A-Number-Dependent Traffic Routing


The feature A-Number-Dependent Traffic Routing permits the identification of authorized and unauthorized subscribers during connection setup. The subscribers directory number and, where applicable, the carrier access code are used as identification criteria. The feature also covers an A-number-dependent routing and zoning and allows Fraud Prevention.

hiE9200 A-number evaluation Network node calling subscriber Network node calling subscriber Operator benefits identification of subscribers as contract partners A-number-dependent traffic routing (e.g. via routes with a particularly high transmission quality) A-number-dependent zoning unauthorized traffic STOP authorized traffic Network node called subscriber

2.1

Mode of operation
The feature A-Number-Dependent Traffic Routing can be used in EWSD transit exchanges. It offers the following possibilities: A-number screening for subscriber identification A-number screening for special traffic routing A-number screening for special zoning Fraud Prevention

An evaluation is also made on the basis of: A-number range origin identifier

Id:0900d80580017dde

Destination Features

Feature: A-Number-Dependent Traffic Routing

Evaluation of the A-number or of the carrier access code is triggered by a flag (WHITELST or BLACKLST) in the trunk group or PBX data. If the BLACKLST flag is set and the result of the evaluation is Black List, the call is rejected. A call is also rejected if the WHITELST flag is set and the evaluation result is not White List. If the WHITELST flag is set and the evaluation result is White List, the call is switched through. The trunk group or PBX data specify whether Black List screening, White List screening, or no screening is to be performed. Trunk group 2 (e.g. carrier B)

hiE9200

Trunk group 1 (e.g. carrier A) Primary rate access (PA) (e.g. corporate network)

Figure 1

Line types for screening (calling party number check)

It is possible for a Black List and a White List to be created at the same time. For example, calls via trunk group 1 (carrier A) can undergo white-list screening while calls via trunk group 2 (carrier B) undergo black-list screening (see figure Line types for screening (calling party number check)). In this case, however, the trunk groups have to be separate. A calling subscriber who is blocked as a result of black-/white-list screening is still given access to certain services, such as Internet access, but this does not enable him or her to set up any other connections (ref. section: Overriding blacklist/whitelist in the operating manual OMN:EXCH-RO/NT).

2.1.1

A-number screening for subscriber identification


EWSD offers two options (see figure A-number screening for subscriber identification): A-number screening by means of a White List - this identifies accepted callers A-number screening by means of a Black List - this identifies barred callers The acceptance (White List) and the barring (Black List) of the A-number can also be made dependent on the origin code and therefore, implicitly, on the carrier access code (ref. to the feature Traffic Control with the Carrier Access Code in section Traffic Control with the Carrier Access Code). An administration example is given in section Blacklist/Whitelist Administration of the operating manual OMN:EXCH-RO/NT).

Id:0900d80580017dde

Feature: A-Number-Dependent Traffic Routing

Destination Features

hiE9200 Network node calling subscriber A-number evaluation Network node called subscriber Announcement

Figure 2

A-number screening for subscriber identification

2.1.2

A-number screening for special traffic routing


In transit exchanges it is also possible to introduce special traffic routing dependent on the A-number (see figure A-number screening for special traffic routing). For example, subscribers in Munich with a specific A-number range can be assigned a particularly low-noise line in Frankfurt (see section A-Number-Dependent Traffic Routing of the operating manual OMN:EXCH-RO/NT). hiE9200 A-number evaluation

Network node calling subscriber

Special link (low-noise line)

Figure 3

A-number screening for special traffic routing

2.1.3

A-number screening for special zoning


Subscribers with a particular A-number can be subjected to special zoning (see figure A-number screening for special zoning and the example in section A-Number-Dependent Traffic Routing of the operating manual OMN:EXCH-RO/NT).

10

Id:0900d80580017dde

Destination Features

Feature: A-Number-Dependent Traffic Routing

hiE9200 Network node calling subscriber A-number evaluation special zoning

Figure 4

A-number screening for special zoning

2.1.4

Black/White List Screening due to signalled CAC


Analysis of the CAC also indicates whether black/white list screening is to be performed in a carriers network. Black/white list screening is performed in the following cases: if the CAC received matches the carriers own CAC if black/white list screening is activated in the network node

Carrier 1 Network node 1 calling party

Carrier 2 Network node 2 CACSCR CAC = Carrier 2

Carrier 3 Network node 3 called party

Figure 5

Black/white list screening

The GCOS-parameter value for carrier access code screening (CR TGRP: ...,GCOS = CACSCR) is set in the network node of carrier 2. (see figure Black/white list screening). The call to be set recognizes from the CONZON parameter that no zoning has yet occurred (CONZON parameter with Zoning Indicator = FALSE). The gateway node therefore performs black/white list screening. The CONZON parameter is used to inform the subsequent network nodes that black/white list screening has been carried out.

2.1.5

Compatibility
Because of the memory space required, this feature cannot be active at the same time as the Number Portability feature, see section Local Number Portability (LNP, IN method). The feature Non-blockable directory number has priority over the cancellation of blocking due to black-/white-list screening.

Id:0900d80580017dde

11

Feature: A-Number-Dependent Traffic Routing

Destination Features

2.1.6

Requirements
No additional hardware is needed.

2.2

Administration
The operator can perform all administration functions on the NetManager by means of user-friendly applications or MML commands. For information on the administration of A-Number-Dependent Traffic Routing (command path ORIGROZO) please refer to OMN:EXCH-RO/NT.

12

Id:0900d80580017dde

Destination Features

Feature: Traffic Distribution among several Carriers (Carrier Quota)

3 Feature: Traffic Distribution among several Carriers (Carrier Quota)


The feature Carrier Quota allows traffic to be shared among different carriers according to a fixed or dynamic distribution key. The distribution key can be either the trunk group size of the carrier in question, a predefined percentage quota, or the incoming traffic volume measured for the carrier. The administration can handle up to 20 carriers per destination. Carrier Quotas are also used to realize the feature Call Divergence Destination (CDD) (golden number) (ref. section Call Divergence Destination (CDD)).

Carrier 1 hiE9200

Destination x

Destination x Traffic distribution Destination x Carrier 2 Destination x

Carrier 20

Destination x

Operator benefits Controlled distribution of traffic among different carriers, using the quota method.

3.1

Mode of operation
With the Carrier Quota feature, the proportion of traffic can be defined for different carriers in relation to the overall number of offered calls. This traffic routing with load sharing is performed via a carrier selection destination that contains quota groups. Carrier selection destination Within a carrier selection destination the carriers to one specific destination are grouped together. The procedure for distributing the traffic volume (quota method) is defined by the relevant carrier quota group. There must be a carrier destination for each (active) carrier in the quota group. From one carrier destination each quota group can access up to 16 routes (see figure Traffic routing with load sharing below). The procedure for hunting routes in the carrier destination is the same as that used for a standard destination.

Id:0900d80580017c53

13

Feature: Traffic Distribution among several Carriers (Carrier Quota)

Destination Features

It is also possible to expand an existing standard destination to form a carrier destination. This also applies if traffic is already being processed via the standard destination in question. The digit translator accesses a carrier selection destination. The associated carrier quota group is selected via this carrier selection destination. Once the carrier to which the call is to be assigned has been determined, reassignment to the relevant carrier destination takes place and its routes are used for the call attempt. In this way, different routes can be accessed for each call attempt, so that the traffic and the call charges can be shared among different network operators.

Digit translation

Carrier selection destination Carrier quota group 10% 50% 40%

Carrier destination 1

Carrier destination 20

Routes (1 to 16)

Routes (1 to 16)

Figure 6

Traffic routing with load sharing

One carrier quota group can cover up to 20 carriers. Each carrier may appear only once in a carrier quota group. Carrier quota groups are described by the following data: name of the carrier quota group quota method details of the carriers involved (name and trunk group size/initial quota) details of the carrier trunk groups to be measured when the distribution key is updated on the basis of the total measured incoming holding time (traffic quantity). A maximum of 48 trunk groups can be measured per carrier. The following quota methods can be used for distributing the call processing load among the carriers in a quota group:

14

Id:0900d80580017c53

Destination Features

Feature: Traffic Distribution among several Carriers (Carrier Quota)

Load sharing based on trunk group size The trunk group size is the sum of all trunks in all the carrier's outgoing trunk groups from the home network node. The EWSD software converts trunk group sizes internally into fixed quotas. Outgoing call attempts are distributed among the individual carriers in proportion to the trunk group sizes entered for them. Load sharing based on fixed quotas Outgoing call attempts are distributed among the individual carriers in proportion to the quota amounts entered for them. The sum of the quotas of all carriers in the carrier quota group must be 100%. Any carrier with a quota of 0% is deactivated. Load sharing with automatic adjustment to the carrier's incoming traffic The outgoing call attempts are initially distributed among the individual carriers in proportion to the quotas entered for them. These remain valid until the first adjustment takes place following measurement of the total incoming call duration times for each carrier. The trunk groups to be measured are incoming or bothway and are not entered in any other list of trunk groups to be measured. The incoming call duration times, added together on a trunk group-related basis, are analyzed every 15 minutes. This analysis forms the basis for updating the distribution key of the associated carrier quota group. A prerequisite is that on the quarter-hour at least 9000 seconds of incoming call time have accumulated for the entire carrier quota group since the previous update. Furthermore, only national calls are taken into consideration. International transit traffic is not measured. In addition, the method may only be used on one side of the connection, otherwise a stable quota distribution is established in which a single carrier is assigned 100% of the load. A carrier with an initial quota of 0%, or a dynamically determined quota of 0%, is deactivated. However, these carriers are always taken into account in the measurement. If appropriate measurement data relating to these carriers is received, they are reactivated at the time of updating.

3.1.1

Example of a call setup using the feature Carrier Selection via Quota Groups
For example, let us say that there are three long-distance carriers (MCI, TELE and AT&T) to route calls from Europe to the US and vice-versa. In the figure Carrier Quota load sharing below, a code point 001408 leads to the Destination CQDestCalifornia. The destination CQDestCalifornia is part of the Carrier Quota Group USA. For it is part of a Carrier Quota group is denoted as a Carrier Quota destination.

Id:0900d80580017c53

15

Feature: Traffic Distribution among several Carriers (Carrier Quota)

Destination Features

Code point table dialled number 001408 ... Code 001408 559

Carrier Quota Group: USA


Quota procedure: - TGSIZE - MEASIC - STAQUO Trunk Groups CQDest Utah CQDest California CQDest Texas

TELE 40%
TGRP1 StDDest TELE to Utha StDDest TELE to Califor. StDDest TELE to Texas

MCI 50%
TGRP1 StDDest MCI to Utha StDDest MCI to Califor. StDDest MCI to Texas

AT&T 10%
TGRP1 StDDest AT&T to Utha StDDest AT&T to Califor. StDDest AT&T to Texas

max. 20 Carrier

max. 20 Carr QuotaDest

Figure 7

Carrier Quota load sharing

In the shown example the quota for carrier 1 (TELE) is 40%, the quota for carrier 2 (MCI) is 50% and carrier 3 (AT&T) gets only 10% of the traffic from/ to USA. A carrier quota group can have one of the following three methods of distribution, called Quota Procedure: Load sharing with automatic adjustment to the carrier's incoming traffic, Load sharing based on fixed quotas and Load sharing based on trunk group size Let us say, due to the quota of 50% and the quota procedure MEASIC, carrier 2 (MCI) gets the next call setup. For this call the code point leading to carrier quota destination QCDest California is diverted to MCIs assigned standard destination StDDestTELE to Califor.. The sequence from now on is the same as for standard destinations: a route is selected and ultimately leads to a trunk.

3.2

Adminstration
The operator can perform all administration functions on the NetManager by means of user-friendly applications or MML commands. For information on the administration please refer to OMN:EXCH-RO/NT.

16

Id:0900d80580017c53

Destination Features

Feature: Call Divergence Destination (CDD)

4 Feature: Call Divergence Destination (CDD)


The feature Call Divergence Destination (CDD) allows traffic that is addressed to one directory number (Golden Number) to be distributed to a certain number of directory numbers according to a cyclic distribution algorithm. The distribution of calls to, for example, various information or service departments of a company helps to avoid overloading and excessive queuing for the directory number of the headquarters. The feature is assigned to the originating or transit network node. It is valid for analog subscribers and for ISDN subscribers.

Golden number A1 Directory number 4711 Directory number Network 4711 Directory number 4711

Network node (Local or transit) A1 A2 A3 Network

B1 1234

B2 2234

A2

B3

A3

A64 Directory number 4711

B20 9876

Interactions For interaction with other features see: Analog Feature Interaction Matrix ISDN Feature Interaction Matrix Operator benefits higher call completion rate improved service Subscriber benefits greater availability shorter waiting time Market opportunities business customers residential customers

Id:0900d80580017c62

17

Feature: Call Divergence Destination (CDD)

Destination Features

4.1

Mode of operation
This feature is a further variant of Carrier Selection via Quota Groups ref.section Traffic distribution among several carriers (Carrier Quota)). Calls to a particular directory number (Golden Number) are distributed uniformly and cyclically to up to 20 directory numbers. The converted number is then displayed to the calling subscriber as the connected line, instead of the Golden Number. It is also possible for calls to one Golden Number to be distributed to further Golden Numbers which in turn initiate CDD. Terminating traffic cannot be distributed, unless distribution is initiated from an originating network node. The same percentage of calls is used for distribution to all the different directory numbers. This percentage is rounded off to whole numbers (e.g. 6 directory numbers result in a distribution of 4 times 17 % and 2 times 16 %). Capacity This feature is designed for up to 64 entry numbers per network node. For distribution to other Golden Numbers a greater total number of directory numbers is available. Thus a three-stage cascade using all 64 possible Golden Numbers results in a distribution from one original Golden Number to up to 1200 directory numbers. To maintain the equality of the distribution, each Golden Number of one step of this cascade should be distributed to approximately the same number of directory numbers (i.e. the cascade tree must be balanced). On the other hand, an unbalanced tree could be used to achieve an unequal distribution.

4.2

Call charge registration


No charges are made for connection setup to the Golden Number. Charges are only recorded for the connection between the calling subscriber and the selected directory number of the called subscriber. Since the converted directory number can be any national or international directory number, the actual call charge rate for the calling subscriber may turn out to be different from the rate that was assumed when the original Golden Number was dialed.

4.3

Requirements
Hardware No special hardware is needed. Signaling Signaling between the EWSD network nodes Signaling system no. 7 (SS7) ISDN user part (ISUP) telephony user part (TUP) Subscriber signaling Analog

18

Id:0900d80580017c62

Destination Features

Feature: Call Divergence Destination (CDD)

dual-tone multi-frequency (DTMF) pulse dialing ISDN digital subscriber signaling system no.1 (DSS1) Subscriber interfaces The following interfaces for subscriber access are required: DLU LTG V5.1 interface V5.2 interface

4.4

Administration
The operator can perform all administration functions on the NetManager by means of user-friendly applications or MML commands. For information on the administration please refer to section Call Divergence Destination (CDD) of the OMN:EXCH-RO/NT.

Id:0900d80580017c62

19

Feature: Destination Areas with Transmission-Optimized Routing (TMR/IPI)

Destination Features

5 Feature: Destination Areas with Transmission-Optimized Routing (TMR/IPI)


The feature ISDN Traffic Routing Based on Transmission Quality allows ISDN traffic to be routed to its destination only on transmission paths that meet certain quality criteria. This ensures that the transmission paths selected for call setup permit optimum use of the ISDN transmission services. The decisive factors in the selection of a transmission path are the transmission medium requirement (TMR) and the ISUP preference indicator (IPI), as well as - in some cases - the call history data.

hiE9200 code point table

TMR/IPI destination table ISDN

64 kbit/s unrestricted

speech

3.1 kHz audio 64 kbit/s unrestricted, fallback

Operator benefits special service for subscribers who require a certain transmission quality for their connections additional revenue from this service Subscriber benefits highly reliable data transmission

5.1

Mode of operation
ISDN transmission services can specify that the transmission medium must fulfil certain quality requirements. These requirements are transmitted to the EWSD network node through the terminal on the calling side.

20

Id:0900d80580017ce5

Destination Features

Feature: Destination Areas with Transmission-Optimized Routing (TMR/IPI)

The requirements consist of: the transmission medium requirement (TMR) the ISUP preference indicator (IPI) The TMR value indicates the required quality of the transmission link. The IPI value states whether or not the connection is to be routed in the ISDN network over the entire distance. The call history values are only used if the calling side has specified routing requirements that deviate from a pure TMR/IPI combination without call history reference. The traffic route is selected in the EWSD network node via special TMR/IPI selection destinations. Each TMR/IPI selection destination contains a table consisting of the TMR and IPI values. 12 combinations are defined. In each field there is a reference either to another destination or to an intercept code. The destinations specified in the TMR/IPI tables can also be destinations with carrierdependent routing or destinations with digit retranslation (see figure TMR / IPI selection destinations). TMR = IPI = REQ PREF NOTREQ Table 1 TMR/IPI matrix KBIT64 SPEECH A3KHZ1 KBIT64FB

TMR / IPI values The TMR (Transmission Medium Requirement) can have the following values: KBIT64 (line-switched service, 64 kbit/s): This value defines a transmission quality that is intended for unrestricted data transmission (without bit modification). This service is used, among other things, for data transmission between computers, direct access to public packet data networks, and for speech or modem data transmission in the audio voice band. If this transmission quality is not available, the connection is ended. SPEECH (line-switched service, speech): This value defines a transmission quality that is only intended for transmission of digitized speech information. A3KHZ1 (line-switched service, 3.1 kHz audio): This value is valid for all applications where information is transmitted in the audio voice band (frequencies from 300 to 3100 Hz). This includes all connections in the analog network (speech transmission and data transmission by modem and telefax group 3). In the case of ISDN connections this value offers a transmission quality that is intended for transmission of digital audio information, i.e. all transmission that are allowed in the analog network are possible (e.g. data transmission by modem or telefax group 3). Transmission of digitized speech information (without bit integrity) is permitted. KBIT64FB (line-switched service, 64 kbit/s unrestricted with fallback possibility): This value indicates that the calling side would prefer to set up a connection with the transmission quality 64 kbit/s unrestricted. If this transmission quality is not available, fallback to a second, lower transmission quality (SPEECH or A3KHZ1) takes place. With this alternative TMR value (official name: TMR prime) a new attempt is made to set up a connection within the EWSD network node.

Id:0900d80580017ce5

21

Feature: Destination Areas with Transmission-Optimized Routing (TMR/IPI)

Destination Features

The IPI (ISDN User Part Preference Indicator) can have the following values: REQ (required): This value states that the entire connection between calling subscriber and called subscriber must be routed in the ISDN network, so as to guarantee the necessary transmission and signaling qualities. PREF (preferred): This value states that the entire connection between calling subscriber and called subscriber should preferably be routed in the ISDN network, so as to guarantee the best possible transmission and signaling qualities. NOTREQ (not required): This value states that it is not necessary for the connection to be routed in the ISDN network because the analog network also guarantees an adequate transmission and signaling quality. Selection of a TMR / IPI selection destination TMR/IPI selection destinations are accessed via one or more code points. Each selection destination refers to subsequent destinations via which routing arrives at the relevant outgoing trunk group (see figure Traffic routing via a TMR/IPI selection destination). Up to 16 routes can be accessed via a TMR/IPI destination. A TMR/IPI selection destination consists of an address component and a data component. Address component: TMR/IPI selection destination TMR/IPI combination (optionally with call history data) Data component: TMR/IPI destination 1 ... n

22

Id:0900d80580017ce5

Destination Features

Feature: Destination Areas with Transmission-Optimized Routing (TMR/IPI)

Digit translation

TMR/IPI selection destination

The traffic is distributed to various destinations in accordance with the TMR/IPI data. A tone or announcement is applied for TMR/IP data without a valid destination.

TMR/IPI destination 1

TMR/IPI destination n

Routes (1 to 16)

Routes (1 to 16)

Figure 8

Traffic routing via a TMR/IPI selection destination

Each TMR/IPI combination is assigned precisely one TMR/IPI destination. Destinations can be accessed via different TMR/IPI combinations. The calling end normally requests one TMR/IPI combination. If it is not possible to access a destination that corresponds to the TMR/IPI data, a backward signal informs the calling side whether a destination is available for the required ISDN preference indicator (IPI) for at least one other TMR value (see figure TMR / IPI selection destinations).

Id:0900d80580017ce5

23

Feature: Destination Areas with Transmission-Optimized Routing (TMR/IPI)

Destination Features

Dialed number 1234567 Code point table Code 1234 Dest TMR1

Destination: TMR1 Required Preferred Not Required T13 T23

Destination: T13 Route no. 1 2 3 TGRP tgrp1 tgrp2 tgrp3

KB 64 Speech

T11 T21

T12 T22

Standard destinations TMR/IPI destinations Destination: T23 Carrier quota group: group 1 Carrier 1 2 3 Dest 1 2 3

Destinations with carrier selection Destination: Txx Destination with retranslation Back to digit analysis Figure 9 TMR / IPI selection destinations

If an appropriate destination is available, the backward signal contains the information that switchover to a different transmission medium can be successful for the same IPI. In all other cases the backward signal informs the calling side that a connection with the required ISDN preference indicator is not possible in the selected direction. Only digital terminal equipment can evaluate the backward signal; for this reason, the connection is simultaneously diverted to an intercept code that provides services and analog terminal equipment with an announcement or special information tone. This means, for example, that ISDN telephones receive two parallel responses for services such as Telephony and 7 kHz telephony, namely backward signal and intercept code.

24

Id:0900d80580017ce5

Destination Features

Feature: Destination Areas with Transmission-Optimized Routing (TMR/IPI)

Provided it has suitable terminal equipment, the calling end can also request a double combination (TMR + TMR prime)/IPI. The first TMR value represents the preferred transmission medium; the second value (TMR prime) represents a lower-quality transmission medium which is acceptable as a fallback alternative (e.g. TMR = 7 kHz telephony, TMR prime = 3.1 kHz audio, IPI = ISDN required). If a destination corresponding to the preferred TMR/IPI data cannot be accessed for the connection, the EWSD network node attempts to use the alternative transmission medium. If this second destination search is successful, a backward signal is sent to inform the calling end that the fallback is taking place. The calling side is therefore always aware of the transmission medium that is being used for through-connection. If the second destination search is unsuccessful, the same procedure as for unsuccessful request of a single TMR/IPI combination is used: a backward signal is sent and, at the same time, the connection is diverted to an intercept code.

5.2

Requirements
No additional hardware is needed.

5.3

Administration
The operator can perform all administration functions on the NetManager by means of user-friendly applications or MML commands. For information on the administration please refer to OMN:EXCH-RO/NT.

Id:0900d80580017ce5

25

Feature: Hard to Reach Control (HTRC)

Destination Features

6 Feature: Hard to Reach Control (HTRC)


The feature Hard to Reach Control (HTRC) detects a drastic increase in the number of call attempts within a region. The reasons behind such situations may be unforeseen events such as adverse weather conditions and earthquakes, etc. In such cases, traffic to the affected region increases greatly. A high number of call attempts fail because the network is interrupted or regionally overloaded. To protect the network from unsuccessful traffic, HTRC reduces this traffic as close as possible to the origin, thereby granting priority to the successful traffic to other destinations. 025xxxx 025xxxx 025xxxx

hiE9200 network node

025xxxx 025xxxx 025xxxx

hiE9200 network node

hiE9200

Leaky Bucket

HTR region 025

025xxxx 025xxxx 025xxxx

hiE9200 network node Recorded announcement/ all trunks busy tone

025xxxx 025xxxx 025xxxx Operator benefits

hiE9200 network node

may be used in networks with different providers utilization independent of the network structure

26

Id:0900d80580017dbf

Destination Features

Feature: Hard to Reach Control (HTRC)

monitoring of traffic to pre-defined destinations reduction in traffic to hard to reach destinations, thereby granting priority to the revenue-generating traffic not affected by the HTR situation EWSD-external network nodes are also supported by this feature

6.1

Mode of operation
The feature Hard to Reach Control (HTRC) grants priority to successful traffic to other destinations before the traffic to hard to reach destinations, which only has a small chance of being switched through. HTRC reduces the unsuccessful traffic as close as possible to the origin, thereby preventing regional congestion within the network. HTRC is characterized by the following functions (see also figure Example of HTRC operation below): automatic determination of the HTR status of pre-defined destinations in outgoing traffic automatic restriction of the traffic to hard to reach destinations through pre-defined network management measures, e.g. line reservation Determination of hard to reach destinations The destinations to be observed by HTRC are placed on a monitoring list. The number of seizures and the answer/seizure rate are evaluated every 5 minutes for the destinations on the monitoring list to be observed. In every 5-minute interval, the values ascertained are compared with their thresholds for the minimum number of call attempts per time unit and the answer/seizure rate. (Every destination has its own thresholds.) A destination is regarded as hard to reach if the number of seizures per 5-minute interval corresponds at least to the threshold value for minimum number of call attempts per time unit and the corresponding answer/seizure rate is less than or equal to the threshold for the answer/seizure rate. Once a hard to reach destination is detected, it is placed on the control list. If a call request is made to a destination which is on the control list, a pre-determined network management measure (e.g. line reservation, CANCEL TO, CANCEL FROM or SKIP) is activated to reduce the traffic to this destination. Call requests rejected by means of network management measures are rerouted to a recorded announcement or receive the all trunks busy tone. Destinations on the control list are monitored every 5 minutes. A destination is removed from the control list when its answer/seizure rate exceeds a certain threshold within 5 minutes. This does not apply to those destinations which have been placed on the control list manually. These are subject to neither monitoring nor determination of the HTR status. A hysteresis factor prevents a destination from being removed from the control list too soon.

Id:0900d80580017dbf

27

Feature: Hard to Reach Control (HTRC)

Destination Features

Determination of hard to reach destinations

Destination 0533 Destination 0512 hiE9200 network node

hiE9200 network nodes

Destination 0599 Destination 030

Traffic to destinations 025 and 0533 Traffic to destination 030 Traffic to destination 0599 Reduction of traffic to a hard to reach destination

Destination 025

Destination 0533 Destination 0512 hiE9200 network node

hiE9200 network nodes

Destination 0599 Destination 030 Destination 025

Traffic to hard to reach destinations Traffic to other destinations Figure 10 Example of HTRC operation

28

Id:0900d80580017dbf

Destination Features

Feature: Hard to Reach Control (HTRC)

Criteria for determination of hard to reach destinations HTRC enables the following functions: Monitoring of defined destinations Monitoring and reduction of the traffic to defined destinations Reduction of the traffic to manually pre-defined destinations The following values can be defined for determination of hard to reach destinations: Destinations to be monitored Minimum number of call attempts per 5-minute interval Minimum answer/seizure rate (ASR) HTRC function Monitoring list Number of destinations to be monitored: 10 000 with 6 digits per destination Number of destinations to be monitored in detail: 500 with 15 digits per destination Answer/seizure rate: 1 to 99% Number of call attempts: 1 to 65 535 Control list Number of destinations to be monitored: 10 000 with monitoring every 5 minutes or with manual input by operator without checking Network management measures Line reservation CANCEL TO CANCEL FROM SKIP Destinations Destination areas with up to 6 digits (e.g. 0-9, 010-019, 0200-0210, 03409-03441, etc.) can be entered by the operator, whereby each area has its own threshold for the answer/seizure rate and for the minimum number of call attempts. In order to observe the destination in more detail, the operator can enter specific digit combinations with up to 15 digits. Monitoring of destination without control This makes it possible to monitor destinations without their being controlled (i.e. placed on the control list) as soon as they attain the hard to reach status. Monitoring of destination with control This makes it possible for destinations to be monitored and also controlled (i.e. automatically placed on the control list) as soon as they attain the hard to reach status. Control of destinations without monitoring Destinations can be explicitly placed on the control list and thereby subjected to the pre-defined network management measures.

Id:0900d80580017dbf

29

Feature: Hard to Reach Control (HTRC)

Destination Features

6.2

Requirements
No additional hardware is needed.

6.3

Administration Hints and Examples


The operator can perform all administration functions on the NetManager by means of user-friendly applications or MML commands. For information on the administration please refer to OMN:EXCH-RO/NT.

30

Id:0900d80580017dbf

Destination Features

Feature: Mass Call Control (MCC)

7 Feature: Mass Call Control (MCC)


The feature Mass Call Control (MCC) detects a drastic drop in the answer/seizure rate (ASR) to a destination. Such a fall in the answer/seizure rate to a particular destination is an indication of a mass call. Mass calls to certain destinations can result, for instance, from radio or TV quiz shows. Since calls to mass call destinations have only a small chance of being switched through, MCC reduces the traffic to a mass call destination as close as possible to the origin, thereby granting priority to successful traffic to other destinations. 0481 0481 0481

hiE9200 network node

0481 0481 0481

hiE9200 network node

hiE9200

0481 0481 0481

hiE9200 network node Recorded announcement/ all trunks busy tone

0481 0481 0481 Operator benefits

hiE9200 network node

may be used in networks with different providers utilization independent of the network structure

Id:0900d80580017ca2

Leaky Bucket

hiE9200 network node

0481 Mass call destination

31

Feature: Mass Call Control (MCC)

Destination Features

monitoring of the entire directory number volume of the EWSD network node reduction in the traffic to directory numbers of mass call destinations, thereby granting priority to the revenue-generating traffic not affected by the MCC situation EWSD-external network nodes are also supported by this feature

7.1

Mode of operation
The Mass Call Control (MCC) feature grants priority to successful traffic before the traffic to mass call destinations, which has only a small chance of being switched through. MCC reduces the unsuccessful traffic as close as possible to the origin, thereby preventing regional congestion in the network. MCC is characterized by the following functions (see figure Operating principle of mass call control below): permanent monitoring of the answer/seizure rate for all calls in the network node automatic detection of a drastic drop in the answer/seizure rate as an indication of a mass call situation automatic identification of the directory number responsible for the mass calls reduction in the unsuccessful traffic to this directory number

The network management mechanism known as the Leaky Bucket principle is used for automatic reduction of the unsuccessful traffic.

32

Id:0900d80580017ca2

Destination Features

Feature: Mass Call Control (MCC)

Normal load situation hiE9200 network nodes Destination

Mass call situation

hiE9200 network nodes Destination

Monitoring of mass calls

hiE9200 network nodes Destination

Calls to other destinations Figure 11

Calls to the mass call destination

Operating principle of mass call control

Determination of the mass call destination A mass call destination is determined in a procedure comprising the following stages (see figure Example of detection of the directory number of a mass call destination below): 1st stage: Monitoring A directory number is classified as a mass call number when the number of call attempts directed to it per time unit (10 seconds) is equal to or greater than the predefined threshold for minimum number of call attempts and when its answer/seizure rate is equal to or less than the pre-defined threshold for answer/seizure rate. MCC monitors the call attempts and the resulting successful outgoing calls set up for a pre-defined number of digits. The number of call attempts per time unit (10 seconds) and the number of successful calls are collected; the answer/seizure rate is then calculated

Id:0900d80580017ca2

33

Feature: Mass Call Control (MCC)

Destination Features

and compared with the pre-defined thresholds for minimum number of call attempts and answer/seizure rate. 2nd stage: Detailed monitoring If the analysis of the pre-defined number of digits results in the probability of a mass call event, the monitoring is extended to include more digits. For this additional number of digits, the number of call attempts per time unit (10 seconds) and the number of successful calls are collected. The answer/seizure rate is then calculated and compared with the corresponding thresholds for minimum number of call attempts and the answer/seizure rate. 3rd stage: Identification of the mass call number If there is still the probability of a mass call event for this additional number of digits after detailed monitoring, more digits are included in the monitoring, up to the maximum number of digits, until the mass call number has been determined. 4th stage: Reduction in the traffic to the mass call number identified The traffic to the mass call number is automatically reduced with the leaky bucket limiting mechanism. If this automatic limiting mechanism has not been activated, the mass call number is displayed and the leaky bucket principle can be activated manually. Area from the first 4 digits Depth of evaluation of numbers
0000......................... 0001......................... 0002......................... ................................. .................................

Area from the 5th to the 6th digit


0481 00.................... 0481 01.................... ................................. .................................

0481.........................

Area from the 6th Area from the 10th to the 10th digit to the 14th digit
048156..................... 048156 10................ ................................. 048156 7932............ 0481567932............. 0481567932 10........ 0481567932 8583.... ................................. ....0481567932 9999

0481 56.................... ................................. ................................. ................................. ................................. .........................9999

................................. ................................. ....................0481 99

................................. ........... 048156 9999

Stage 1 0 Figure 12 1 2 3 4

Stage 2 5 6 7 8

Stage 3a 9 10 11 12

Stage 3b 13 14

Example of detection of the directory number of a mass call destination

Criteria for the determination of mass call destinations The following values must be defined in order to determine mass call destinations: Number of digits to be monitored Evaluation period (in seconds) Answer/seizure rate (ASR)

34

Id:0900d80580017ca2

Destination Features

Feature: Mass Call Control (MCC)

Minimum number of call attempts in the evaluation period The values can be defined within the following limits: Answer/seizure rate: 0 to 99% Minimum number of call attempts per 10 seconds: 30 to 1000 Call reduction time: 2 to 10 minutes, in increments of 2 minutes Time for determining the mass call destination: 60 seconds Number of digits to be monitored (including the national dialing prefix): 6 to 14 Start of call reduction: not before the mass call destination has been determined File: sequential, daily file At least 2000 mass call events can be stored. Example of MCC monitoring Table 2.1 shows some possible inputs and the monitoring results. ASR Numbe r of call attemp ts 0 0 0 0 0 0 4 4 0 0 8 8 0 1 0 1 5% 5% 5% 5% 30 30 30 30 Monitor yes/no ASR Seizures Mass calls

no no yes yes

0 0

no no no yes Suspected mass call destination

40% 1

50 100

0 9 9

4 9 9

8 9 9

2 8 9

1% 5% 5%

80 30 30

yes yes yes

5% 100% 0

50 1 0 no no Result

Number of digits to be monitored Table 2

Administrable parameters

Calculated values

Examples of MCC monitoring

A threshold of 5% for the answer/seizure rate and a minimum number of call attempts of 30 seizures per 10 seconds are entered. The digit combinations 0000 and 0001 are excluded. The digit combination 0482 produced an ASR of 1%. Call attempts for the digit combinations 0480, 0481, 0482 and 9998 were counted for a period of 10 seconds. The digit combination 0481 is suspected as a directory number for mass calls. If the digits are found for this directory number, the traffic to this directory number is reduced by means of the leaky bucket mechanism. The call reduction time can be specified in advance (2, 4, 6, 8 or 10 minutes).

7.2

Requirements
No special hardware is needed.

Id:0900d80580017ca2

35

Feature: Mass Call Control (MCC)

Destination Features

7.3

Administration
The operator can perform all administration functions on the NetManager by means of user-friendly applications or MML commands. For information on the administration please refer to OMN:EXCH-RO/NT.

36

Id:0900d80580017ca2

You might also like