Uploaded by ivannps21

AXE Operation And Maint Module 2

advertisement
Competence Development Centre
AXE Operation & Maintenance Platform
Exchange Data
Help
Exit
PREFACE
Target Audience
This book is preliminary intended to be used as a course manual in the
Ericsson Operation and Maintenance training program. The book is a
training document and is not to be considered as a specification of any
Ericsson language or system.
Identification
EN/LZT 101 105/2 R1A
Responsibility
Training Supply
ETX/TK/ZM
 Ericsson Telecom AB 1996, Stockholm, Sweden
All rights reserved. No part of this document may be reproduced in any
form without the written permission of the copyright holder.
Table of Contents
1. Introduction
1.1
1.2
Module Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Device and Route Data
2.1
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.2
2.2.1
2.2.2
2.2.3
2.2.4
2.2.5
2.2.6
2.2.7
2.3
5
Route Concepts and Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Definition of Regional Processors . . . . . . . . . . . . . . . . . . . . . . . . . 5
Definition of Extension Modules . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Definition of Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Connection of Devices to the Route . . . . . . . . . . . . . . . . . . . . . . 14
Printout of Device and Route Data . . . . . . . . . . . . . . . . . . . . . . . 16
Supervision Data for Trunks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
General Principles of Supervision . . . . . . . . . . . . . . . . . . . . . . . . 19
Blocking Supervision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Disturbance Supervision of Devices . . . . . . . . . . . . . . . . . . . . . . 23
Disturbance Supervision of Routes . . . . . . . . . . . . . . . . . . . . . . . 25
Seizure Quality Supervision of Devices. . . . . . . . . . . . . . . . . . . . 26
Groups for Seizure Quality Supervision. . . . . . . . . . . . . . . . . . . . 27
Seizure Supervision of Trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3. Connection to Group Switch
3.1
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.1.7
3.2
3
GSS in General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Basic Functions, Hardware and Software.. . . . . . . . . . . . . . . . . .
Hardware Structure and Switching . . . . . . . . . . . . . . . . . . . . . . .
Control of the Switching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Printouts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Blocking of Units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Connection of SNT and DIP . . . . . . . . . . . . . . . . . . . . . . . . . . . .
31
31
31
36
39
42
43
46
47
48
i
AXE 10, Operation & Maintenance, Platform
3.2.1
3.2.2
3.2.3
3.2.4
3.3
3.3.1
3.3.2
3.4
3.5
3.6
3.6.1
3.6.2
3.6.3
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Devices Connected to the Group Switch . . . . . . . . . . . . . . . . . . .
ETC (Exchange Terminal Circuit) . . . . . . . . . . . . . . . . . . . . . . . .
PCD (Pulse Code Device) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The SNT Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Connection of SNT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Connection of Devices to the SNT. . . . . . . . . . . . . . . . . . . . . . . .
The DIP Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Appendix 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Channel Associated Signalling, CAS. . . . . . . . . . . . . . . . . . . . . .
Common Channel Signalling, CCS . . . . . . . . . . . . . . . . . . . . . . .
Supervision of the PCM Line . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4. Size Alteration
4.1
4.1.1
4.1.2
4.1.3
4.1.4
4.1.5
4.1.6
4.1.7
4.2
Size Alteration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Initial Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Hardware Extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Extension by Using More Software Individuals . . . . . . . . . . . . . .
What is a Data File? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Use of Size Alteration Events . . . . . . . . . . . . . . . . . . . . . . . .
Commands Related to Size Alteration. . . . . . . . . . . . . . . . . . . . .
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5. Analysis
5.1
5.1.1
5.2
5.3
5.3.1
5.3.2
5.4
5.4.1
5.4.2
5.4.3
5.4.4
5.4.5
5.4.6
5.4.7
ii
Analysis in General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Use of Operating and Non-Operating Area . . . . . . . . . . . . .
Branching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Route Analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Sending Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Commands Used to Define Routing Cases . . . . . . . . . . . . .
Charging Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Charging Principle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Charging Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
A Survey of the Charging Analysis . . . . . . . . . . . . . . . . . . . . . . .
Definition of Tariffs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Definition of Tariff Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Definition of Charging Case. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Calendar Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
48
49
49
52
53
53
55
57
62
63
63
64
64
67
67
67
68
70
71
72
73
74
76
77
77
78
80
81
83
85
86
86
88
89
90
92
93
94
5.5
5.5.1
5.5.2
5.5.3
5.5.4
5.5.5
5.5.6
5.6
B-Number Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
An Example of an Analysis Table. . . . . . . . . . . . . . . . . . . . . . . . . 97
A Study (Case) of an Outgoing Call. . . . . . . . . . . . . . . . . . . . . . . 99
A Study Case of an Internal Call . . . . . . . . . . . . . . . . . . . . . . . . 103
Parameters in the Analysis Table. . . . . . . . . . . . . . . . . . . . . . . . 103
Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Pre-Analysis of B-numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
iii
1. Introduction
1.1 Module Objectives
Module Objectives
After completing this module the participant will be able to:
• Define various types of Routes in the exchange with Route Data as
well as connected Devices.
• Load, print and change Supervision Data for Trunks.
• Briefly describe the Group Switch.
• Perform connection of SNT and DIP.
• Perform Size Alteration of data files in the Data Store.
• Understand the main principles of analysis.
• Perform changes in Route Analysis, Charging Analysis and Bnumber Analysis.
Figure 1.1
Module Objectives
1.2 General
This module is named Exchange Data, Basic. The subjects covered in this
module are:
•
•
•
•
•
•
•
•
Route and Device Data
Supervision Data for Trunks
Group Switch Subsystem
SNT and DIP Data
Size Alteration
Route Analysis
Charging Analysis
B-number Analysis.
These subjects are based on AXE Local 12.3 for ordinary telephone calls.
(Not for ISDN calls using ISDN services.)
03802-EN/LZM 112 18 R1
1
Exchange Data Basic
2
03802-EN/LZM 112 18 R1
2. Device and Route Data
Chapter Objectives
After completing this chapter the participant will be able to:
• Define a Regional Processor.
• Define an Extension Module.
• Define a new Route and modify existing Route Data.
• Connect Devices to Routes and generate and interpret printouts of
the specified data.
• Load, print and change Supervision Data for Trunks.
Figure 2.1
Chapter Objectives
2.1 Route Concepts and Definition
2.1.1
General
To be able to set up a call between two exchanges you must have a route.
In this route devices must be connected. All devices in an exchange must
belong to an EM that are controlled by an RP-pair. This is the reason why
we have to start with defining the Regional Processors (RP).
2.1.2
Definition of Regional Processors
If the exchange is extended with new hardware devices, new Regional
Processors may be needed for the control of the new equipment. However,
if some RPs have spare capacity (i.e. all EMs are not used), they can in
some cases be used for the extension. Figure 2.2, on the next page, shows
the parts of the system that are handled in this chapter.
03802-EN/LZM 112 18 R1
3
Exchange Data Basic
Figure 2.2
The control part of the AXE system
First of all, the hardware of the RP pair must be connected and the power
must be connected to the magazine. However, this is not enough as the RP
pair must be defined in data as well. This means that some initial data is
loaded into the system and that the parts that take care of the maintenance
of the RPs are informed of their location. The location of the RP pair is
marked by an address strap on one of the boards in the RP and that address
must always be used when using commands related to the RP. The Operational Instruction “Connection of RP” describes the actions required for
the definition. The first command used for the definition of an RP pair is
the EXRPI command.
EXRPI:RP=rp,RPT=rpt,TYPE=type;
The RP and RPT parameters are used to indicate to the system the
addresses allocated to the RPs with the address strap. The TYPE parameter
is used to indicate the version of the RP as both old and new RPs can be
used in the same exchange. The Command Description of the command
EXRPI contains a list of valid RP types.
When the RP pair has been defined, the next step will be to define which
software units (programs) that should be loaded into the RP pair when
deblocked. The programs loaded into the RP should be some operating
4
03802-EN/LZM 112 18 R1
Device and Route Data
software and the regional software of the blocks connected to the RP (e.g.
the regional software of block BT1 is referred to as BT1R).
The command used to define the RP programs to be loaded is EXRUI.
This command will build up a table inside the APZ related to each RP pair.
The table can be used by the APZ when reloading it, e.g. in connection
with deblocking. Then the software indicated in the table is sent to the Program Store of the RPs in the RP pair. This also means that a copy of all
regional software units must be available in the CP as a backup. When new
equipment is installed in the exchange (e.g. a new type of BT devices), the
new RP program must be loaded into the CP by means of command
LAEUL.
The parameters included in the EXRUI command are RP and SUNAME
or SUID. The RP parameter is used to indicate one of the RPs in the RP
pair (only one has to be specified). The SUNAME and SUID parameters
are used to indicate the name or the identity of the software units that
should be included in the RP pair. Which parameter to use is determined as
follows:
SUNAME
This parameter is used if there is only one version of the
software unit loaded in the CP. An example of a software
unit name is BT1R.
SUID
If there is more than one version of the RP program
loaded into the CP, this parameter must be used to indicate
which version to use. This parameter is used if the version
of a Regional Software unit is changed because of software update or function change. An example of the
parameter is “5/CAA1052105/1R2A02”. The correct
identities can be printed by using command LAEUP.
When the loading table has been defined, perhaps using several EXRUI
commands, the RP pair can be put into service by deblocking it. The
deblocking is done by using command BLRPE which first includes a test
of the RP and then a reload of the software units specified in the table.
Please study figure 2.3, on the next page.
03802-EN/LZM 112 18 R1
5
Exchange Data Basic
Figure 2.3
The new RP programs are loaded into the CP and defined for the RP pair
6
03802-EN/LZM 112 18 R1
Device and Route Data
When the data has been specified, the EXRPP command can be used to
check it. Please study figure 2.4.
Figure 2.4
Answer printout of command EXRPP
All the data related to an RP pair can be removed by the EXRPE command. This command is used if the RP pair is to be removed from the
exchange.
2.1.3
Definition of Extension Modules
When the new RPs have been defined, it is time to define the equipment
they should control. As you probably know, this equipment is located in
Extension Modules using the same type of interface to the RPs. Figure 2.5
shows the principle of connecting two different types of EMs to the EM
bus.
Figure 2.5
Connection of two different types of EMs to the RP pair
03802-EN/LZM 112 18 R1
7
Exchange Data Basic
When the EMs are defined, the data in both the APZ and the blocks that
own the hardware is updated with various types of information. The data
in the block that controls the hardware is updated with information about
the address of the hardware (RP and EM addresses). This information is
required when sending signals to the hardware for initiating functions in
the hardware.
The command used to define the EMs is EXEMI and the following parameters are included for a normal definition:
EXEMI:RP=rp,RPT=rpt,EM=em,EQM=eqm;
RP:
Indicates the RP that controls the EM in normal cases.
RPT:
Indicates the stand-by RP. This RP must be the twin RP in an
RP pair.
EM:
Address of EM (an address strap is used).
EQM:
Used to indicate the equipment type and identity of the devices
in the EM. Example: EQM=BT1-32&&-63.
When the EM has been defined, it can be deblocked by command
BLEME. This means that the EM is put into service from a control point
of view. The devices in the EM are probably still blocked as more data
related to the devices must be specified.
If an EM is to be removed from the exchange, command EXEME is used.
When the data has been specified, the print command EXEMP can be
used. Figure 2.6 shows an example of a printout of command EXEMP.
Figure 2.6
Answer printout of command EXEMP
2.1.4
Definition of Routes
Before we discuss how routes are connected and defined in the software of
AXE, the route concept in AXE should be studied. In AXE, the concept
“route” has been extended slightly if compared with other, analog systems.
8
03802-EN/LZM 112 18 R1
Device and Route Data
There are basically three types of routes in the system:
1.
External routes, e.g. routes to other exchanges
2.
Internal routes, e.g. routes to Code Senders and Announcing
Machines
3.
Software routes, e.g. routes to subscriber services or routes for register individuals.
Figure 2.7 shows the three variants of the routes.
Figure 2.7
The three types of routes used in AXE
03802-EN/LZM 112 18 R1
9
Exchange Data Basic
All the three types of routes require “Route Data” in order to function in a
specified way. Route data is, as the name says, data related to a route in the
exchange. Examples of route data for an external route is the type of signalling system used, the function of the route (incoming or outgoing) and
the number of devices connected to the route. The route data is stored in
the block to which the hardware belongs. The Operational Instruction
“Connection of route for BT” is one of the documents available that
describes the commands that should be used. In this chapter, only the commands and the most common parameters are described. Supervision and
connection of the devices to the Group Switch are handled in other parts of
this Module.
How, then, is the route data defined in the exchange? The answer is the
two commands EXROI and EXRBC. The two commands have the following meaning:
• EXROI
This command is used to initiate the route for the very first time. The
parameters included in the command are (not all shown):
−
R, Route name
This parameter gives the route a name consisting of up to 7
characters. Characters like #, % and + can be used in the route
name to distinguish between incoming and outgoing routes.
−
DETY, Device type
The device type indicates the type of devices used in the block.
The parameter should be the same as the block name of the
block used for the route (e.g. BT1).
−
FNC, Function Code
The function code is used to indicate the function of the route.
The meaning of the parameter must be fetched from the Application Information of the block indicated in DETY. For external routes, the parameter is usually used to indicate the traffic
direction of the route.
• EXRBC
This command is used when more route data is to be assigned to the
route. Also existing routes can be changed by this command. The command has several parameters of which only a few are explained here:
−
10
R1, Register Signalling Route
This parameter is used to indicate if another route must be
used for the register signalling. If MFC (Multi-Frequency
Compelled) signalling is used, the route name of the Code
Sender route is indicated here. Figure 2.8 shows the principle.
03802-EN/LZM 112 18 R1
Device and Route Data
Figure 2.8
Register signalling route
−
RG, Route Group
The Route Group parameter is used to prevent the traffic from
one exchange to be returned to the same exchange (also
referred to as “return blocking”). By giving all routes to and
from the same exchange the same RG value, the system will
not route the traffic back to the same destination.
Please study figure 2.9.
Figure 2.9
Return blocking principle
03802-EN/LZM 112 18 R1
11
Exchange Data Basic
−
RO, Origin for route analysis
For incoming routes, this parameter can be used if the Route
Analysis should be made differently for this route compared
with others. More about this in the Unit describing Route
Analysis.
−
PRI, Priority
Some incoming routes can be given priority. This parameter
can be used in various analyses in the exchange.
−
MB, Modification of B-number
This parameter can be used to add or delete digits from the Bnumber.
As already mentioned, there are several other parameters included in the
EXRBC command. For more details please study the Command Description and the Application Information for the blocks concerned.
When all the route data has been specified for the route, and if the route
should be put into service, it should be deblocked by using the BLORE
command. Note that only outgoing routes can be blocked/deblocked. The
command BLORP can be used to check if any outgoing route is blocked in
the exchange.
2.1.5
Connection of Devices to the Route
When all the route data has been specified, it is time to connect devices to
the route. However, before this is done, the devices should be connected to
the Group Switch. How that is done is described in Unit 3 of this Module.
Before this step is started, the route has been properly defined by means of
EXROI and EXRBC. However, no devices are connected to the route. The
EXDRI command is used to make a connection in data between the
devices and the route:
EXDRI:DEV=dev,R=r;
In case of ISDN services special devices are required, but this is not the
case for ordinary telephone calls.
Figure 2.10 shows what the command does in the data of the block.
12
03802-EN/LZM 112 18 R1
Device and Route Data
Figure 2.10
The effect of command EXDRI in the data of a block
When all the devices have been connected to the route, they should be
taken into service by using the command EXDAI. This command will
change the state of the devices from “Pre-post service” to “service”.
Finally, the devices can be deblocked by using command BLODE. That
will enable the system to use the devices in traffic handling.
In most cases, the supervisory functions should be connected to the route
in order to activate functions like “Blocking supervision”. In case of an
extension of an existing route, the data related to the supervisory functions
should be changed (the number of devices included in the route has
changed).
03802-EN/LZM 112 18 R1
13
Exchange Data Basic
2.1.6
Printout of Device and Route Data
When the data has been defined, and also during the definition, the data
loaded can be printed by using print commands. Some of the most useful
commands are shown below.
EXDEP, please study figure 2.11.
Figure 2.11
Printout of device data
EXDRP, please study figure 2.12.
Figure 2.12
Printout of the RP and EM that the device belongs to
14
03802-EN/LZM 112 18 R1
Device and Route Data
STRSP, please study figure 2.13.
Figure 2.13
Printout of device state survey
STRDP, please study figure 2.14.
Figure 2.14
Printout of device state survey and details
03802-EN/LZM 112 18 R1
15
Exchange Data Basic
EXROP, please study figure 2.15.
Figure 2.15
Printout of route data
16
03802-EN/LZM 112 18 R1
Device and Route Data
2.2 Supervision Data for Trunks
2.2.1
General Principles of Supervision
Telephony devices interwork with their environment, such as subscribers,
other exchanges and transmission equipment. A single disturbance in one
device does not mean that the device is faulty. The disturbance might come
from the environment. For that reason, the supervision of telephony
devices is rather a slow process. Several calls causing disturbances will in
many cases have to be registered before any actions are taken by the system. In some cases, the supervisory period will cover several days.
The actual supervision of the devices is performed by the blocks that own
the hardware. As an example, disturbances in devices belonging to block
BT1 are also registered in that block. Disturbances are registered by means
of counters in the software. In some cases, the counters are common to one
route and in others, there is one disturbance counter per device.
The errors that are to step the disturbance counter are to a great extent
determined by the protocol of the signalling system. Any abnormal event
such as time out, signalling errors and state error, are registered in the disturbance counter.
When should an alarm be initiated and what alarm class should be used? Is
the supervision activated or not? These types of questions are usually handled by blocks specially dedicated to the administration of the supervisory
functions. These blocks are located in the OMS, Operation and Maintenance Subsystem, and they handle functions such as:
•
•
•
•
changing of alarm levels
changing of alarm classes
activation and deactivation of the supervision
handling of commands and printouts.
When the supervision is activated, the block in OMS that administers the
function, reads the disturbance counters at regular intervals. The time
between the readings is usually between 10 seconds and 1 minute. If the
readings are too frequent, they will load the processor unnecessarily. The
read disturbance counters will then be compared with the stated alarm levels which are stored inside the block. For some types of functions, the
block that own the disturbed device will report each disturbance to the
block that handles the administration related to the function. Figure 2.16,
on next the page, shows an example of how the supervision can be made.
03802-EN/LZM 112 18 R1
17
Exchange Data Basic
Figure 2.16
General principle of supervision of telephony devices
2.2.2
Blocking Supervision
This function, handled by block BLOS, checks that the number of blocked
devices in a route does not exceed a preset value. The function counts the
number of manually, automatically and control blocked devices. If
required, the function can use several alarm limits tied to different alarm
classes. Figure 2.17 shows the principle.
18
03802-EN/LZM 112 18 R1
Device and Route Data
Figure 2.17
Alarm limits in the blocking supervision, example
The Blocking Supervision is always initiated per route and all commands
and printouts are related to a given route in the exchange. The function can
be used to supervise routes belonging to blocks of type BT, AS, CR, CS
and KR.
If no data has been specified for a route, e.g. the route has just been initiated, new supervision data will have to be loaded by means of the BLURC
command. The parameters in the command are:
R=r,LVB=lvb1[&lvb2][&lvb3],ACL=acl;
The “R” parameter indicates the name of the route (the same as in
EXROI). The “LVB” parameter, Limit Value for Blocking, is used to indicate the maximum number of blocked devices in the route. If several values are to be used (as in figure 2.17) the values are listed and separated by
“&”. The last parameter is “ACL”, Alarm Class, which is used to indicate
the alarm class the alarm should have if the limits are exceeded. If several
limits have been specified, this parameter indicates the alarm class tied to
the first limit value. An example is:
03802-EN/LZM 112 18 R1
19
Exchange Data Basic
BLURC:R=ALPHA,LVB=10&20&30,ACL=A3;
If this command is used, the system will initiate the following alarms:
A3 alarm:
if the number of blocked devices is between 10 and 20.
A2 alarm:
if the number of blocked devices is between 20 and 30.
A1 alarm:
if the number of blocked devices exceeds 30.
The blocking supervision of a route can be temporarily disconnected during maintenance activities or other changes related to the route. It is also
possible to disconnect the blocking supervision permanently. The commands used to disconnect and reconnect the blocking supervision are:
BLURE:R=r[,PERM];
BLURI:R=r;
The BLURE command is used to disconnect the supervision. If the
“PERM” parameter is used, the supervision is permanently disconnected.
This means that the supervision data is erased. When the supervision is to
be connected again, the BLURI command is to be used.
The supervision data can be printed by using command BLURP. An
example of the printout generated can be seen in figure 2.18.
Figure 2.18
An example of a printout of the blocking supervision data
20
03802-EN/LZM 112 18 R1
Device and Route Data
2.2.3
Disturbance Supervision of Devices
This function supervises that the proportion of the number of disturbances
to the number of selections will not exceed a preset value. The supervision
is used to supervise individual devices of type CS, CR and some variants
of BT (not all types of BT can have this type of disturbance supervision).
In case of analogue CS and CR devices, they are blocked if a number of
consecutive disturbances are detected.
Disturbances are defined as disconnections not caused by the subscriber or
not allowed traffic cases. Examples are time out, not valid signals and
abnormal states in the signalling.
When a new route is defined which should have this type of supervision,
the data must be loaded by means of command DUIAC. The parameters
included in the command are:
DUIAC:R=r,ADL=adl,ACL=acl;
Parameter “R” indicates the name of the route concerned. Parameter
“ADL”, Allowed Disturbance Level, indicates the level in percent. If this
level is reached, an alarm with the alarm class according to parameter
“ACL” will be generated. The possible values in ADL are 1, 2, 4, 5, 10,
20, 25, 33 and 50%.
How, then, is the supervision made in block DISSD which handles the
function? The answer is a disturbance counter used to record both the seizures and the disturbances. Figure 2.19, on the next page, shows the principle.
03802-EN/LZM 112 18 R1
21
Exchange Data Basic
Figure 2.19
The use of a disturbance counter
For each seizure of the device, the counter is decremented by one. In case
of a disturbance, the counter is incremented by a value dependent on the
parameter ADL, Allowed Disturbance Level.
The loaded data can be printed by using the print command DUISP. Figure
2.20 shows an example of such a printout.
22
03802-EN/LZM 112 18 R1
Device and Route Data
Figure 2.20
The printout of the Disturbance Supervision of Individual Devices, example
2.2.4
Disturbance Supervision of Routes
This function is very similar to the one described in the previous chapter.
The only major difference is that this function supervises the disturbance
level of each route, not individual devices. The function is implemented in
block DISSR and the routes that can be supervised are the ones of type BT.
The function uses a disturbance counter like the one described in figure
2.19, with the only difference that there is one counter per route.
When a new route has been introduced in the exchange, or if some existing
data should be changed, command DUDAC shall be used. The parameters
included in the command are:
DUDAC:R=r,ADL=adl,ACL=acl;
Parameter “R” is used to indicate the route. Parameter “ADL”, Allowed
Disturbance Level, specifies the maximum disturbance level allowed in
the route (in percent). If this value is exceeded, an alarm with the alarm
class according to parameter “ACL” will be generated. The possible disturbance levels in parameter ADL are 1, 2, 4, 5, 10, 20, 25, 33 and 50%.
03802-EN/LZM 112 18 R1
23
Exchange Data Basic
When the data has been loaded, it can be printed by using the print command DUDAP. Figure 2.21 shows an example of such a printout.
Figure 2.21
Printout using command DUDAP
2.2.5
Seizure Quality Supervision of Devices
This function is used to supervise the ratio (quotient) of the number of seizures to the number of normal calls. What, then, is meant by “normal
call”? This is nothing but a time (usually set to 60 seconds) specified by
command which is used to indicate a minimum duration of a normal call.
This function utilizes the fact that subscribers connected to bad lines,
replace earlier than if they were connected to normal lines.
The average quotient is also calculated for the devices in the same route,
and each device in the route is compared with this value. If any of the
devices deviates more than a command specified value, an alarm will be
initiated. Two limits are used by the function:
• one limit which indicates that the device is suspected of being faulty
• one level which indicates that the device should be blocked.
When the function is started the very first time, i.e. when the exchange is
installed, the time for a “normal call” is loaded. This is done by using the
command SEQAC. This command can also be used when time is changed
if other conversation times are used in the exchange (can be detected by
means of Traffic Recording). An example of how the time is changed is:
SEQAC:CTIME=55;
The normal conversation time is, in this case, set to 55 seconds. The time
can vary between 10 and 255 seconds.
24
03802-EN/LZM 112 18 R1
Device and Route Data
If the supervision is to be initiated for a new defined route in the exchange,
the same command is also used to load the supervision data related to the
function. An example of the command is:
SEQAC:R=BTOWN+,ACL=A3,QUOS=30,QUOB=60;
If this command is used, the supervision will be initiated for the route
“BTOWN+”. If any abnormal devices are detected, an A3 alarm will be
generated. If a device deviates by more than 30% from the average quotient, the device is suspected of being faulty. In that case, the device is still
in traffic (only fault marked). If a device deviates by more than 60% from
the average quotient, it will be blocked.
The data specified for a route can be printed by using command SEQAP.
Figure 2.22 shows an example of a printout generated by command
SEQAP.
Figure 2.22
Example of printout related to Seizure Quality Supervision
2.2.6
Groups for Seizure Quality Supervision
The Seizure Quality Supervision function uses the routes as groups if
nothing is indicated to the system. If there are requirements that new
groups should be defined, command SEQGI can be used to group routes
together. This means that the average quotient (Q) will be calculated for
the whole group. Different types of routes with different characteristics
can be grouped together with this function. Command SEQGI has only
one parameter:
SEQGI:R=r....;
Several routes can be specified in one command and the number of routes
included in one group is unlimited. When the groups have been specified,
command SEQGP can be used to print the routes included in each group.
Please study figure 2.23.
03802-EN/LZM 112 18 R1
25
Exchange Data Basic
Figure 2.23
A printout of route groups
If changes should be made in any route group, the command SEQGC will
be used. The command can either remove one or several routes from a
route group, or it can be used to split a route group. The parameters
included in the command are:
SEQGC:R=r...[,ALL];
If only the “R” parameter is used, the specified route(s) will be removed
from the route group. If the “ALL” parameter is included as well, the
whole route group will be split up.
2.2.7
Seizure Supervision of Trunks
Most of the supervisory functions studied so far, uses live traffic for their
supervision. In order to detect errors for lines not having any traffic at all,
or for lines which are continuously busy, the Seizure Supervision function
is used (implemented in block SETS).
The principle of the function is to check that all lines in a route have been
selected at least once during a specified period. A seizure is registered
when a B-answer is received. If no seizures are registered during the
period, an alarm will be generated.
The command used to load and change the data related to the function is:
SETAC:PL=pl,ACL=acl;
Parameter “PL”, Period Length” is used to specify a period stated in days.
If a route with unused lines is detected at the end of the period, an alarm
with the alarm class as specified in parameter “ACL” will be generated.
The period length can vary between 1 and 3 days.
26
03802-EN/LZM 112 18 R1
Device and Route Data
When the data has been specified, it can be printed by means of command
SETAP. Please study figure 2.24.
Figure 2.24
An example of data generated by command SETAP
03802-EN/LZM 112 18 R1
27
Exchange Data Basic
2.3 Chapter Summary
• Regional Processors (RPs) always work in a pair.
• An RP pair can maximum control 16 Extension Modules (EMs).
• An EM is a magazine which contains a number of devices of the same
type.
• A route is a group of devices having the same characteristics.
• A route can be going between exchanges or internal or be a software
route.
• An AXE 10 exchange has built in supervision.
• Blocking Supervision monitors the number of blocked devices on a
route.
• Disturbance Supervision monitors line and register signalling quality
on routes.
• Seizure Supervision monitors routes to detect devices which are either
never seized or permanently seized in a preset supervision period.
• Seizure Quality Supervision monitors the number of calls of short duration.
28
03802-EN/LZM 112 18 R1
3. Connection to Group Switch
Chapter Objectives
After completing this chapter the participant will be able to:
• Understand the main principles of the Group Switch.
• Describe the basic blocks in subsystem GSS.
• Describe the basic hardware of the Group Switch.
• Perform connection of SNT and devices to the GSS.
• Perform connection of DIP.
Figure 3.1
Chapter Objectives
3.1 GSS in General
The Group Switching Subsystem, GSS, belongs to the APT and contains
both hardware and software. As its main task GSS connects an incoming
channel to an outgoing channel.
As GSS is designed to work with different transmission media and systems, it is possible to have PCM links as well as analog links. This enables
GSS to connect digital lines from Remote Subscriber Stages, RSS, or other
switches. This is done via an ETC (Exchange Terminal Circuit) for digital
links, or via PCD (Pulse Code Device) for analog links. More about ETC
and PCD later on in this chapter.
Generally speaking, we can say that GSS connects one inlet in the Group
Switch to one outlet, since all telephony devices connected to an AXE 10
exchange need to be through connected via GSS. The Group Switch has
one inlet and one outlet per device/channel. This makes it possible to have
a bothway connection.
3.1.1
Basic Functions, Hardware and Software.
The Group Switching Subsystem has the following functions:
03802-EN/LZM 112 18 R1
a)
Selection, connection and disconnection of speech or signal
paths through the Group Switch.
b)
Supervision of hardware in the subsystem by continuous parity checks.
c)
Supervision of digital links connected to the switch.
29
Exchange Data Basic
d)
Maintaining a stable clock frequency or synchronization of the
clock frequency of the network.
To make these functions possible in GSS, lots of functions have been
implemented in different function blocks. Some of these which are related
to traffic handling are described in this chapter. Figure 3.2 shows the most
important blocks.
Figure 3.2
The basic blocks in GSS related to traffic handling and synchronization
30
03802-EN/LZM 112 18 R1
Connection to Group Switch
A brief description of the different blocks follows below:
1.
GS, Group Switch
It is implemented in central software only and it is responsible for
storing connection information and also interfaces towards some
other subsystems.
Also, it should be mentioned that the former version of the GS function block contained hardware and some other functions that now are
implemented in other function blocks. Note that this earlier version
is still available in some application systems.
2.
GSM1/GSM2, Group Switch Maintenance
These two blocks assist block TSM with maintenance functions
regarding TSMs and SPMs. They contain administration functions
for all SNTs (Switching Network Terminals) connected to the
switch.
3.
TSM, Time Switch Module
This block consists of hardware, central and regional software. Its
hardware is the TSMs and SPMs. It handles the normal switching
functions such as connection and release of speech paths, administration of TSMs and SPMs as well as counters for statistics and traffic measurements. This function block did not exist in the former
version of the GSS.
4.
GSBOARD, Group Switch Board Names
This block is fully realized in central software and some of its main
functions are translation of fault cases into suspected printed boards
for printing when fault diagnostic functions are performed. This
block did not exist either in the previous version of the GSS.
5.
CLT, Clock Pulse Generation and Timing
The hardware of this block is the three Clock Modules which supply
the TSMs and the SPMs with clock pulses. It also handles maintenance functions as well as counters for statistics and traffic measurements. Due to the introduction of new clock modules the CLT
function block has been revised.
6.
NS, Network Synchronization
The digital exchanges must be synchronized with each other. Block
NS contains functions, implemented in both hardware and software,
for synchronization of the network.
7.
Blocks for Operation and Maintenance
There are several blocks related to the O&M of the GSS. These
blocks supervise the hardware, handle commands, alarms, handle
temporary errors in the hardware and perform routine tests of the
hardware.
Subsystem GSS is a central part of the system as almost all calls and signalling systems use the switch to connect hardware to various channels.
03802-EN/LZM 112 18 R1
31
Exchange Data Basic
Examples of other subsystems that interwork with GSS are:
For traffic handling:
TCS
for connection of A and B-subscribers
TSS
for connection of Code Senders / Code Receivers and trunk
lines
SSS
for call release and connection of subscribers and PABX,
(Private Automatic Branch Exchange)
BGS
for call set-up within the Business Group
ESS
for operator calls, monitoring and subscriber services. Function
blocks CCD (Call Conference Device) and MJD (Multi Junctor
Digital) belonged to the GSS earlier but have been incorporated
in ESS.
For Operation and Maintenance:
OMS
handling of test calls (call set-up and release).
Statistics:
STS
Statistics & Traffic Measurement Subsystem.
Others:
32
OPS
for trunk offering and operator-assisted calls
SUS
subscriber services requiring three-party conference calls and
other services requiring conference calls (Call Waiting)
MTS
for connection of Code Senders and other equipment included
in subsystem MTS.
03802-EN/LZM 112 18 R1
Connection to Group Switch
Figure 3.3 gives some examples of subsystems interworking with GSS.
Figure 3.3
Other subsystems that interwork with GSS, example
03802-EN/LZM 112 18 R1
33
Exchange Data Basic
3.1.2
Hardware Structure and Switching
In order to ensure adequate flexibility, the Group Switch has been
designed and structured into modules referred to as Time Switch Modules
(TSM) and Space Modules (SPM). The number of TSMs and SPMs
required in an exchange depends on the number of trunk and subscriber
lines.
To each Time Switch Module, up to 16 PCM systems can be connected.
This means that each TSM has 16x32=512 inlets, or Multiple Positions.
Each 32-channel PCM system is connected to the TSM in a so called
Switching Network Terminal Point, SNTP. See figure 3.4. The “Switching
Network Terminal, SNT” is a common term for all type of equipment that
can be connected to the Group Switch. SNT is, however, a software concept and represents the software connection of the physical hardware to
the Group Switch.
Examples of equipment that can be connected to the GS are:
• Exchange Terminal Circuits, ETC
• Conference Call Devices, CCD
• Pulse Code Devices, PCD.
The PCD is used if analog devices should be connected to the GS. The
PCD is nothing but an analog-digital converter. Figure 3.4 shows the principle.
Figure 3.4
Connection of devices to the Time Switch Module
34
03802-EN/LZM 112 18 R1
Connection to Group Switch
1.
The speech samples originating from the subscribers (or the signals
from signalling devices such as Code Senders) are stored in a speech
store referred to as Speech Store A, SSA. Each channel in the PCM
systems connected to the TSM has its own storage position in SSA.
This means that the SSA has 512 store positions, one for each channel (16x32).
2.
We can now introduce the concept of multiple position (MUP)
which is the common term used when talking about either channels
or storage positions within a TSM.
3.
To make it possible to switch between TSMs, the Space Module
(SPM) is used. The SPM is also used for speech samples that are to
be sent back to the same TSM in the case when the A-party and Bparty are connected to the same TSM. More about the SPM later on.
4.
When the SPM has switched the speech sample and sent it to the
correct TSM, the sample is stored in another store. This store is
referred to as Speech Store B, SSB. As with SSA, each channel in
the connected PCM systems has its own store position. This means
that the relationship between channel and store position is fixed in
both SSA and SSB. Figure 3.5 shows the general principle.
Figure 3.5
The connection of the channel used by the A-subscriber
Within a Time Switch Module, no connection is provided between the
incoming and the outgoing channels (SSA and SSB). An incoming speech
sample is always sent via the Space Module before it is stored in SSB. In
03802-EN/LZM 112 18 R1
35
Exchange Data Basic
the GS, there is full availability. This means that any position connected to
the GS can be connected to any other position via an SPM (from one TSM
to another or within the same TSM). To make it possible to have a Group
Switch with a size varying from some thousand multiple positions to 65
thousand, 64K, the number of SPMs used in the switch can vary. Figure
3.6 shows the extension steps of the Space Modules.
Figure 3.6
The connection and extension steps of the Space Module
Up to 32 Time Switch Modules can be connected to one SPM. This means
that one SPM is enough for Group Switches up to the size of 16384 multiple positions (32x32x16). This is called 16K GS. In case of more TSMs,
there must be a matrix of SPMs built up. The reason for having this matrix
is that only one SPM can be used for the switching (Time-Space-Time
principle). If more SPMs were involved in the switching, time delays
would be a great problem.
The maximum size of the Group Switch is reached when 128 TSMs are
connected to the matrix with 4x4 SPMs, see figure above. This will make
36
03802-EN/LZM 112 18 R1
Connection to Group Switch
up a Group Switch with 65536 multiple positions (2048 PCM systems
with 32 channels each). This is called 64K GS.
A PCM line is a time-division multiplexed connection used by a number
of channels in both directions. The number of channels per PCM system is
24 or 32. The 24-channel system is used in the US and some other countries. If compared with an analog transmission system, the PCM line can
be compared with a four-wire system, two wires in each direction.
3.1.3
Control of the Switching
When are the speech samples sent over from SSA to SSB and how is the
SPM going to know to which TSM it should send the information? All
these things are controlled inside the Group Switch by means of “Control
Stores”. The control stores are hardware registers that control both the
SSA/SSB and the Space Module. When a path is to be established in the
switch, the software of block GS in the CP will select a path and then write
the proper information in the control stores. The actual writing is carried
out by the Regional Processors (regional software of block GS).
The first part studied is the control of the Space Module. In order to make
it easier to understand the SPM, it can be illustrated by drawing a matrix
composed of horizontal and vertical lines. Speech Store A of all TSMs are
connected to the horizontal lines and Speech Store B to the vertical lines.
The lines are in fact time multiplexed buses containing 10 bits in parallel.
There are 8 bits for the speech sample, one bit for parity and one bit for the
plane select function (more about that later on). Figure 3.7 shows this simplified Space Module and Speech Stores A and B in the TSMs.
Figure 3.7
The Space Module, SPM
03802-EN/LZM 112 18 R1
37
Exchange Data Basic
When a cross point is operated, the 10 bits are connected in parallel from a
horizontal line to a vertical line. This means that the speech samples are
sent over from SSA to SSB.
All cross points along a vertical line are controlled by a control store
referred to as Control Store C, or just CSC. There is one CSC per TSM in
the switch and the store has 512 positions. Figure 3.8 shows the principle.
Figure 3.8
The cross points in the SPM are controlled by Control Store C, CSC
Each address inside the CSCs contains the number of the cross point to be
operated at each moment. This means that the information written in the
CSCs is the number of the sending TSM.
The storage position in SSA to be sent to the SPM in the internal time slot
must be indicated. The internal time slot is nothing but a time when the
information is to be transferred from SSA to SSB. Also the reading into
the SSB must be controlled in some way.
38
03802-EN/LZM 112 18 R1
Connection to Group Switch
This is done by a control store referred to as “Control Store AB” or just
CSAB. The name indicates that the store is used to control reading and
writing from and to Speech Stores A and B respectively. To see how the
CSAB is used, the example in figure 3.9 is studied.
Figure 3.9
A complete path in the Group Switch
The example described here shows how the hardware of the Group Switch
is used to set up a two-way connection between two points. This simplified
description shows the general principles of how the control stores are used
to control the switching.
CSAB as it's mentioned above in one of its storage positions stores the correspondent SSA address from where the incoming information is to read
out (MUP 12).
The speech sample will be switched to the receiving TSM which in our
example is TSM-1.
03802-EN/LZM 112 18 R1
39
Exchange Data Basic
In order to transfer the incoming speech from the SSA to the SSB, a cross
point is operated and this is done via the SPM (Space Module). How is this
switching achieved?
The CSC located in the receiving TSM (TSM-1 in this example) will be
used for this purpose. The information written in one of the CSCs storage
positions is the number of the sending TSM, TSM-0 in our example.
Note that the selected storage position in CSAB (TSM-1) and CSC (TSM1) is the same (address number 279), though the address number in CSAB
(TSM-0) is 23, this means that the so called “Anti-phase method” is used
when selecting the storage position from where the outgoing speech sample will be written.
3.1.4
Security
The Group Switch consists of two identical, parallel working planes, they
are referred as the “A-plane” and “B-plane”. This avoids up to 500 calls
from being interrupted or disturbed when a TSM becomes blocked. The
two planes are totally independent of each other and all units that are connected to the GS are connected to both planes. The speech samples are
always sent to both planes but the data is only fetched from one of the
planes, usually the A-plane.
In order to tell the connected units from which plane they should fetch the
information, a so called “Plane Select Bit” is used. This bit tells the connected units if they should read from plane A or B. Figure 3.10 shows the
general principle.
Figure 3.10
The use of the Plane Select Bit
40
03802-EN/LZM 112 18 R1
Connection to Group Switch
If only one TSM is blocked in one of the planes, all connections to that
TSM will use the other plane. However, if two different TSMs are blocked
in different planes, it is not possible to set up calls between these TSMs. In
that case, the software of GSS will generate a special alarm indicating that
there are traffic restrictions in the Group Switch.
3.1.5
Synchronization
The main purpose of synchronizing a network is to minimize the slip rate
between the exchanges. The whole network must keep almost the same
clocking speed for their Group Switches. In the case of AXE 10, the Group
Switch controls the clocking of the transmitted data on the outgoing PCM
links. Also the reading of speech samples is controlled by the clock in the
GS.
In order to supply the Group Switch with reliable clock information, three
so called Clock Modules (CLM) are used. These three clocks are all operating and one of them is master. This means that the other two CLMs try to
synchronize themselves to this clock.
Inside each CLM, there is a VCXO, Voltage Controlled crystal Oscillator,
and a Device Processor (microprocessor) which contains software for
adjustment of the VCXO. Depending on the phase measuring results from
the other CLMs, the Device Processor adjusts the VCXO in one direction
or the other. Via driver circuits, the TSMs and SPMs are supplied with
clocking information from all three CLMs. Inside the TSM/SPMs, there is
a clock selection circuit that performs a majority choice of the incoming
clock signals.
The clock rates that are required in the TSMs are 4.096 MHz and 8 kHz.
The 4.096 MHz is the internal speed of the switch and it is used when
reading and writing speech samples from/to SSA and SSB respectively, on
the other hand the 8 kHz frequency is required for synchronization of the
03802-EN/LZM 112 18 R1
41
Exchange Data Basic
switch. Please study figure 3.11.
2x4 ,096M Hz and 8 kHz
G ro up Sw itc h (o ne plane)
V CX O
V CX O
TS M
SP M
C loc k
select
C loc k
s elect
V CX O
C L M-2
A/ D conv
Phase
difference
meas urement
C L M-1
DP
C L M -0
O rder from
softw are in C P
Figure 3.11
The hardware of the Clock Modules
If the exchange is connected with other digital exchanges, the network
must be synchronized in some way. If that is the case, block NS, Network
Synchronization, is required in the exchange. This block will supply the
CLMs with a reference clock that the CLMs have to follow.
Several methods exist for the synchronization of the exchanges in a digital
network. One of the methods is the so called “Master-Slave” method. For
security reasons, there is usually a secondary master in the network. This
means that the incoming PCM lines are used as reference when synchronizing the Group Switch (channel 0). Figure 3.12 gives an example of how
the Master exchange can synchronize the Slaves and also the hardware
required in a Slave exchange.
42
03802-EN/LZM 112 18 R1
Connection to Group Switch
Figure 3.12
Hardware required in a Slave exchange
If the exchange is operating as a Master exchange, the reference in the
exchange is usually a so called RCM, Reference Clock Module or a CCM,
Cesium Clock Module. The CCM is more accurate but also much more
expensive than the RCM. It is also possible to have a combination of RCM
and CCM in an exchange. Usually, there are three RCM/CCM as the
majority principle is used to check if one clock is starting to deviate from
the other clocks.
03802-EN/LZM 112 18 R1
43
Exchange Data Basic
3.1.6
Printouts
In order to check the state of the Group Switch and the Clock Modules,
some print commands are available. The first command studied, GSSTP, is
the print command to print the state of the different parts of the Group
Switch. The command prints the states of the TSMs, SPMs and CLMs. If
no parameters are given in the command, all the units in the switch will be
printed. If a parameter is used, (TSM, SPM or CLM) only that type of
equipment will be shown. Figure 3.13 shows an example of the printout
received when using command GSSTP.
Figure 3.13
Printout of the state of the Group Switch
When the Clock Modules were described, it was mentioned that the
Device Processor controls the VCXO and that one of the CLMs acts as a
Master. This can be seen by using the print command GSCVP. Figure 3.14
shows an example of such a printout.
Figure 3.14
Printout of Clock Module control value
44
03802-EN/LZM 112 18 R1
Connection to Group Switch
The CLM with the value of 2048 is the one that is Master related to the
other two. The Device Processor can, via an A/D-converter, control the
VCXO with a value between 0 and 4095. If the value is reaching the limits, i.e. close to 0 or 4095, an alarm will be initiated telling the staff that the
CLM must be adjusted manually or changed.
3.1.7
Blocking of Units
When blocking the units belonging to the GS (TSM, SPM or CLM) the
command GSBLI is entered.
In the case of CLMs, the system does not allow the operators to manually
block all the clocks. However, when more than one clock is to be blocked,
before confirming this blocking, the system issues a warning telling the
operators that it is on their own responsibility to proceed with this task. If
two of the clocks are already blocked and if, by chance, the command is
confirmed the blocking is never carried out due to security reasons.
03802-EN/LZM 112 18 R1
45
Exchange Data Basic
3.2 Connection of SNT and DIP
3.2.1
General
As the Group Switch, GS, is a central part of the exchange, almost all
telephony devices are connected to it. The only exceptions are the devices
connected to the Subscriber Switch, e.g. LIC and KRC. As several types of
devices are connected, a standard hardware interface is required. The
standard interface is implemented in a circuit called GSNIC, Group
Switching Network Interface Circuit. The GSNIC is a custom circuit that
handles functions such as plane selection, link supervision and test routines and is included on the ETC board. For some older types of equipment
connected to the GS, this function is implemented in a PCB referred to as
TPLU, Time and Plane selection Unit. In that case the GSNIC is mounted
on the TPLU board. Figure 3.15 shows the principle.
Figure 3.15
The hardware interface towards the Group Switch
46
03802-EN/LZM 112 18 R1
Connection to Group Switch
3.2.2
Devices Connected to the Group Switch
Which devices then, can be connected to the GS? Figure 3.16 shows the
most common devices that can be connected to the Group Switch.
Figure 3.16
Devices connected to the Group Switch
3.2.3
ETC (Exchange Terminal Circuit)
The hardware unit ETC, Exchange Terminal Circuit, is the interface
towards the connected external PCM lines as well as connected Remote
Subscriber Switches. This unit together with some other blocks is responsible for the supervision of the PCM lines. These blocks, and the functions
included in them, are described later on in this Unit.
The ETC belongs to a block called ET, Exchange Terminal. This block has
a close cooperation with block BT which contains the telephony functions.
One can say that block ET handles the supervision and block BT the traffic
handling. Figure 3.17, on the next page, shows the structure.
03802-EN/LZM 112 18 R1
47
Exchange Data Basic
Figure 3.17
The structure of block ET
In the hardware of the ETC, supervisory circuits read the alarm words
transferred in channels 0 and 16 (if CAS is used). When something abnormal is detected, e.g. an alarm is sent out or a slip is generated, the information is sent to ETR, the regional software of block ET. The information is
then sent further on to ETU the central software of block ET. In the other
direction, the central software of block ET can send alarm information to
the other end by ordering the regional software to write in some registers
in the ETC.
For functions related to traffic handling, block BT will be responsible. If a
line signal is to be sent in channel 16, block BT will send signals to block
48
03802-EN/LZM 112 18 R1
Connection to Group Switch
ET which will forward the signal to the hardware. In this case, block ET
does not process the signal in any sense, it just forwards the information to
the hardware, ETC.
The ETC contains functions for error detection, such as slip, alarm words
in channel 0 and loss of frame synchronization words. The TPLU function
is the interface towards the Group Switch described earlier. Figure 3.18
shows the main functions in the ETC.
Figure 3.18
The main functions in the ETC
If the ETC is used to connect Remote Subscriber Switches to the Group
Switch, block ET is the owner of the ETC. In the other end of the digital
line, the ETB, Exchange Terminal Board, is used to connect the Remote
Subscriber Stage to the PCM line. This means that blocks ET and RT are
both handling the same PCM line. The supervision of the PCM line is in
this case handled by both blocks. Figure 3.19, on the next page, shows the
principle.
Block RT administers traffic handling functions on the PCM line.
03802-EN/LZM 112 18 R1
49
Exchange Data Basic
Figure 3.19
The blocks handling the PCM line to an RSS
Some device types which use the ETC as interface are digital bothway
trunks (i.e. BT2, BT4,...etc. including also C7 trunks) and Remote Terminal devices (i.e. RT1, RT2,...etc.)
3.2.4
PCD (Pulse Code Device)
As shown in figure 3.15, PCD is the hardware unit used as an interface to
connect analogue and some other devices to the Group Switch. The function blocks which handle those device types are not the owners of their
own hardware, as the ETC is.
There are two PCD types, the normal PCD and the PCDD which is digital.
PCD is used by analogue devices. PCDD is the PCD variant intended for
Signalling Terminals used by the CCITT 7 signalling system mainly.
The rest of the interfaces used to connect devices to the Group Switch are
among others CSR and DAM which are used by Code Sender-Code
Receiver devices (CSR) and Digital Announcement Machine devices
(DAM) respectively. Both device types are digital.
50
03802-EN/LZM 112 18 R1
Connection to Group Switch
3.3 The SNT Concept
The SNT concept, Switching Network Terminal, has been introduced in
the AXE system for several reasons:
1.
Hardware Interface
As several different types of hardware units can be connected to the
Group Switch, there is a need for a standard. All units designed must
follow this standard.
2.
Software Interface Regarding Supervision
The digital lines between the Group Switch and the connected
devices must be supervised. The Group Switch software can order
the connected units to perform tests. All units designed must be able
to handle the supervision in a similar way.
3.
Operation and Maintenance
To make it easier for the O&M staff to handle the different units connected to the Group Switch, the SNT concept includes a standard
interface (commands and printouts) towards the operators. All units
connected to the Group Switch are handled in the same way.
In hardware, the ETCs and PCDs are connected to the LMU boards in the
Time Switch Modules. This is done with a cable from the ETC/PCD (see
figure 3.20). Because of timing of the digital pulses, the length of the cable
is limited to 40 meters.
In software, one block must be pointed out to be responsible for the supervision of the digital link between the device and the Group Switch. For
blocks which are designed to cooperate with the 64k Group Switch, the
blocks that “own” the hardware can handle that supervision. If this is possible, the Application Information of the block indicates it by including
some parameters related to SNT.
For blocks designed to cooperate with some other Group Switch versions
(an older variant), an adaptation block has to be responsible for the supervision. In that case, one of the following blocks should be used:
3.3.1
For units of type ET:
SNTET and SNTETM
For units of type PCD:
SNTPCD and SNTPCDM
Connection of SNT
When defining the SNT (i.e. the ETC is connected to the Group Switch in
software), the command includes a parameter indicating the variant of the
SNT. This means that the operator indicates which type of magazine is
used. This information is required when errors in the hardware are
detected. As the variant of the magazine is indicated, the SNT function can
generate a list of boards suspected of being faulty. The document Application Information of the SNT block (e.g. SNTET) contains a list of the variants and the numbers they correspond to.
03802-EN/LZM 112 18 R1
51
Exchange Data Basic
When defining the SNT, there are Operational Instructions that must be
followed. The OPI is called “Connection of Switching Network Terminal”. The initiating command is NTCOI. See figure 3.20.
Figure 3.20
Connection of SNT
The command has the following parameters:
NTCOI:SNTP=sntp,SNT=snt,SNTV=sntv;
The parameters have the following meanings:
• SNTP, SNT Point
This parameter indicates the hardware position of the connection in the
Group Switch. If the second inlet in TSM-2 is used, the parameter
should be SNTP=TSM-2-1.
• SNT, Switching Network Terminal
This is the name of the SNT. The name must follow a special syntax as
the name of the SNT block must be the first part of the name followed
by a number. The name and the number must be separated by a dash
“-”. If the first SNT is defined using ETC devices, the name is ET6-0 (if
block ET6 has SNT functions).
• SNTV, SNT Variant
This information indicates the magazine type used or, in some cases,
the board type (for single-board ETC). The parameter value is found in
the block that handles the SNT (e.g. SNTET).
52
03802-EN/LZM 112 18 R1
Connection to Group Switch
When the SNT has been defined, the SNT is tested by using the command
NTTEI. The test checks the connected hardware by using a special test
program. The test checks the hardware of the ETC and also the interface
between the ETC and the Group Switch. Finally, the SNT is deblocked by
using the command NTBLE.
3.3.2
Connection of Devices to the SNT
When the SNT has been installed and tested, the devices can be connected
to the SNT. That is done by using the command EXDUI. See figure 3.20.
The command has only one parameter:
EXDUI:DEV=dev;
How, then, will the system know which SNT to use? The answer is that
there is a fixed relationship between the SNT number and the device
number:
Device number
SNT number
0-31
0
32-63
1
64-95
2
...
320-351
10
...
and so on..
There are several possibilities of printing the state of the SNTs and also of
checking to which SNT a device belongs. In the following figures 3.21 and
3.22, the SNT is printed in two ways.
Figure 3.21
EXDEP is used to check to which SNT the device belongs
03802-EN/LZM 112 18 R1
53
Exchange Data Basic
Figure 3.22
NTSTP is used to print the state of the SNTs
54
03802-EN/LZM 112 18 R1
Connection to Group Switch
3.4 The DIP Concept
DIP stands for Digital Path and is the name of the function used for supervision of the connected PCM lines. CCITT has issued recommendations
which state how the PCM systems should be supervised. All these recommendations are implemented in the DIP function which belongs to subsystem TSS, Trunk and Signalling Subsystem. A number of blocks starting
with the letters DIP contain the functions described here. In this chapter,
only the connection of the function is described. Modules in the maintenance part of this course describe how the actual supervision and alarms
are handled.
The SNT supervision supervises the hardware of the connected units, e.g.
the ETC, while the DIP function supervises the PCM line. Please study
figure 3.23.
Figure 3.23
Digital Path supervision
When connecting the Digital Path supervision, the Operational Instruction
called “Connection of DIP” must be used. The first command in the OPI is
DTDII which connects the SNT, that must be defined in the system to a
03802-EN/LZM 112 18 R1
55
Exchange Data Basic
Digital Path. The Digital Path, called DIP hereafter, is given a name of a
maximum of 7 characters. The name is used just as a route name: it should
be given a name that reflects where the traffic on those lines goes to and
come from as the DIP name is included in alarms related to the DIP. An
example of the command is:
DTDII:DIP=0BT6,SNT=ET6-0;
When the DIP has been defined, some initial data is set by using the command DTIDC, see B11 Command description. This command defines
functions like:
•
•
•
•
attenuation of high-level signals (used with echo canceller)
line code (only used for 24-channel ETC)
frame structure (only used for 24-channel ETC)
handling of channel 16 in case of Common Channel Signalling between
the parent exchange and RSS
• supervisory parameters.
Some of the parameters in the command are only used if the DIP is a 24channel ETC (e.g. US market). Please study the command description for
the DTIDC command.
The next action is to load the fault supervision data for the DIP. The data is
loaded with command DTFSC and printed with DTFSP. Command
DTFSC connects different types of fault cases to the DIP and associates an
alarm class with each fault case. The principle is easiest explained by first
looking at a printout of the fault supervision data. Please study figure 3.24.
Figure 3.24
Printout of DIP Fault Supervision Parameters
The eight fault cases are listed and the other columns indicate if each fault
case is supervised (ACT) and the alarm class associated with it. The fault
56
03802-EN/LZM 112 18 R1
Connection to Group Switch
cases are listed in the command description of command DTFSC and also
the possibility of combinations for different types of PCM systems (not all
fault cases can be supervised by all PCM systems, e.g. 24-channel systems
and CCS). However, the fault cases in the command are:
Fault case
Meaning
1
Alarm Indication Signal, AIS.
2
Loss of Frame Alignment.
3
Excessive error rate.
4
Alarm indication from remote end.
5
Alarm indication in ch. 16 (only CAS).
6
Loss of Multi Frame Alignment (only CAS).
7
Alarm indication from remote end signalling equipment.
8
Alarm Indication signal, ALL1.
9
Loss of CRC multiframe alignment.
For further information regarding DIP fault supervision please consult the
Appendix 1 at the end of this chapter.
When the fault supervision data has been loaded for the DIP, the next step
is to load the quality supervision parameters. The quality supervision is
used to monitor the quality of the PCM line and if the quality on the line is
below defined values, alarms will be generated. The quality supervision is
divided into three main parts:
1.
Bit Fault Frequency supervision
2.
Slip Frequency supervision
3.
Disturbance Frequency supervision.
All the parameters related to these functions are loaded by command
DTQSC. The parameters can also be printed by means of command
DTQSP. Figure 3.25, on the next page, shows the printout generated.
03802-EN/LZM 112 18 R1
57
Exchange Data Basic
Figure 3.25
Printout of DIP quality supervision parameters
As can be seen in the printout, there are three groups of parameters related
to the three types of supervision mentioned above.
58
03802-EN/LZM 112 18 R1
Connection to Group Switch
Figure 3.26 shows how the printout should be interpreted.
Figure 3.26
Interpretation of DIP quality supervision parameters, example
03802-EN/LZM 112 18 R1
59
Exchange Data Basic
3.5 Chapter Summary
Connection to Group Switch is realized based upon as follows:
• Basic functions implemented in hardware and software.
A set of function blocks, some of them comprising both hardware and
software and some only software.
• Hardware structure and switching.
Well structured hardware to provide switching based upon Time-Space
-Time principle.
• Security
Hardware reliability is provided by two identical, parallel working
planes that are referred as “A-plane” and “B-plane”.
• Synchronization
Internal synchronization is provided by 3 Clock Modules (CLM) while
external synchronization comes from either a Reference Clock Module
(RCM), Cesium Clock Module (CCM) or any other 8KHz source.
• Connection of Switching Network Terminals (SNT) and devices to the
GSS is executed according to the existing hardware interfaces such as
Exchange Terminal Circuits (ETC (digital)) and Pulse Code Devices
(PCD (analogue)) among others and a command sequence to follow in
the correspondent OPI.
• PCM line supervision and the Digital Path (DIP) concept.
Supervision of the connected PCM lines to the Group Switch is performed by the so called DIP that actually is the PCM line name. Fault
and quality supervisions are handled by the DIP, the parameters to
supervise and their values are entered by command.
60
03802-EN/LZM 112 18 R1
Connection to Group Switch
3.6 Appendix 1
3.6.1
Channel Associated Signalling, CAS
When using this method for the signalling, the line signals are transmitted
in channel 16 of the 32 channels (other principles for 24-channel systems).
In order to know to which channel the signalling is related, a multi frame
structure has to be defined. Please study figure 3.27.
Figure 3.27
Frame and Multiframe structure of 32-channel PCM when using Channel Associated Signalling
Channel 0 is always used for Frame synchronization and alarm information to the remote end. In channel 16 of each frame, line signals are transmitted. In the first frame of the Multiframe, a so called Multiframe
synchronization word is inserted. This makes it possible for the receiver to
synchronize to the multiframe. In frames 1 to 15, the actual signalling is
sent with 4 bits for each channel (30 channels as 0 and 16 are used for
other purposes than speech).
03802-EN/LZM 112 18 R1
61
Exchange Data Basic
3.6.2
Common Channel Signalling, CCS
If signalling system CCITT No 7 is used, the frame structure differs
slightly compared with CAS. As all signals are sent by the Signalling Terminal, there is no need to have a multi frame structure on the PCM line. In
that case, only channel 0 is used for the transmission of alarm and Frame
synchronization words. This fact will also reflect the supervision of the
PCM line as described later in this Appendix1.
3.6.3
Supervision of the PCM Line
Functions inside the AXE system are used for supervision of the connected PCM lines, i.e. the DIPs. The supervision is performed by the ETC
and some software functions for processing of error information. Whereas
the ETC hardware is supervised by the SNT, the ETC (plus some DIP
supervision blocks) supervises the DIP.
The main principle when supervising a PCM system is that the receiving
end checks the information in channels 0 and 16 (only in channel 0 if CCS
is used). In channel 0, the alarm word is read and in channel 16, there is
alarm information related to the multiframes. If the receiver of a PCM signal detects any errors (e.g. no Frame Synchronization word found), it will
indicate that to the other end by inserting the alarm information in channel
0. Please study figure 3.28.
Figure 3.28
The remote end sends an alarm in channel 0
What types of errors are supervised in the PCM system? Some of the most
important functions supervised in the PCM line are:
1.
62
Alarm Indication Signal, AIS
If the connection between the ETC and the Group Switch is inter03802-EN/LZM 112 18 R1
Connection to Group Switch
rupted, the ETC will not be able to generate any clocking and no
speech can be transmitted to the other end. In that case, the ETC will
start to transmit only “1” in all channels. The sending of only ones
will be interpreted as an AIS by the receiving end.
03802-EN/LZM 112 18 R1
2.
Loss of Frame Alignment
If an ETC is unable to find the Frame Synchronization word in channel 0, it will indicate that to the other end by generating an alarm in
channel 0 in the other direction.
3.
Excessive Error Rate
If the frequency of lost frames, multiframes, AIS and AIS from the
remote end exceeds a preset value, it is referred to as “Excessive
error rate”.
4.
Alarm Indication from Remote End
This is the same event as number 1 (AIS) but when the other end
indicates the alarm in channel 0.
5.
Alarm Indication Signal in Channel 16
If the remote end does not find the multiframe synchronization word
in channel 16, this alarm is issued to the other end.
6.
Loss of Multiframe Alignment
The home exchange does not find the multiframe alignment word.
7.
Slip Rate
Slip occurs if the sending and the receiving ends of the PCM line
have different clocking speeds. If that is the case, one complete
frame is lost or read twice in the ETC. If too many slips are counted
during a period, the system should generate an alarm as the quality
of the connection is too bad. The slip rate is more critical for data
transmission than for speech. How many slips per time unit is
acceptable? A standard value is 5 slips in 24 hours. If more slips are
counted, an alarm should be generated.
8.
Bit Faults
If the PCM link generates too many bit faults, the data transmission
on the link is disturbed (e.g. digital telefax or CCITT no 7 signalling). CCITT states, that if more than 1000 bits are faulty out of 1
million (1000 ppm), the line should be blocked. How, then, will the
system know if a bit has changed? It is not possible to read the
speech samples as their contents are unknown. Instead, the Frame
Synchronization and, if used, the Multi Frame Synchronization
words can be used as there contents are known.
9.
Disturbance Frequency
If the number of disturbances, i.e. temporary errors, is too large during a specified time, the quality of the line is poor. The function
“Disturbance Frequency Supervision” checks that the number of disturbances in a specified time does not exceed a preset value.
63
Exchange Data Basic
64
03802-EN/LZM 112 18 R1
4. Size Alteration
Chapter Objectives
After completing this chapter the participant will be able to:
• Describe the main principles of Size Alterations.
• Perform Size Alteration.
• Generate and interpret printouts related to Size Alteration.
• Explain the use of Size Alteration Events.
• Find the correct Size Alteration Events in the B-module.
Figure 4.1
Chapter Objectives
4.1 Size Alteration
4.1.1
Introduction
Size Alteration is the name of the function used to change the file sizes in
the Data Store of the Central Processor. The changes are normally initiated
by a change in the size of the exchange or in the traffic intensity of the
exchange. Examples of changes in the size of the exchange are addition of
more subscribers or more trunk lines added. If the traffic intensity is
increasing, the number of register individuals must be increased.
The affected part of the AXE system is the Data Store in the CP. In this
store, the data related to all the blocks are stored. The size of the data, i.e.
the number of data individuals, is changed by the function Size Alteration.
The Program Store is not affected by this function as there is no change of
the function of the system. If new or modified functions are loaded into the
exchange, the process referred to as Function Change is used.
03802-EN/LZM 112 18 R1
65
Exchange Data Basic
Figure 4.2 shows the difference between these two methods.
Figure 4.2
The parts in the exchange affected by Size Alteration and Function Change
4.1.2
Initial Setting
The initial size of the data records in the Data Store is set when the
exchange is installed. The information about the sizes to set originates
from the customer in the form of filled in data forms or similar information. This information is referred to as Exchange Requirement. The document Exchange Requirement is the input for the department inside
Ericsson that produces the initial data. The process is referred to as Data
Transcript. One of the activities included in the Data Transcript, is the setting of the file sizes in the software of the exchange. The output from the
Data Transcript is a command file with commands related to Size Alteration and also other functions described later on in this Module. The size
alteration commands are loaded as one of the first files when loading the
exchange data. This has to be done because no other data can be loaded
before the file sizes in data have enough space for storage of the data. Figure 4.3 shows the principle.
66
03802-EN/LZM 112 18 R1
Size Alteration
Figure 4.3
Initial Setting
03802-EN/LZM 112 18 R1
67
Exchange Data Basic
4.1.3
Hardware Extension
If e.g. the number of trunk lines in an exchange is extended, there is usually a requirement for more hardware to be installed as well. This means
that more ETC boards (or magazines for older types of ETCs) have to be
installed in the exchange. For each channel in the PCM system (24 or 32
channels per ETC), there is some data in the Data Store that defines e.g.
the state of the device and to which route it belongs. As there is data
related to each hardware unit, the file sizes in the Data Store must be
changed by means of a Size Alteration. Please study figure 4.4.
Figure 4.4
Extension of hardware requires change of file sizes in the Data Store
When the hardware is installed in the exchange, various Operational
Instructions have to be used depending on the hardware type (the names of
the instructions are “Connection of...”. These Operational Instructions
describe the commands and actions required to “connect” the new hardware with software).
68
03802-EN/LZM 112 18 R1
Size Alteration
4.1.4
Extension by Using More Software Individuals
In many cases of Size Alteration, only software is affected. Some examples of changes that only affect software are given below:
1.
If the traffic intensity (Erlang) is increasing in the exchange, more
Register individuals are required to handle more simultaneous call
set-ups. In this case, no additional hardware is required as the RE
block is implemented in software only.
2.
If more subscribers would like to have a certain subscriber service
(e.g. Call Transfer), more data individuals are required in order to
handle more call transfers at the same time. Also the storage capacity of the service will probably have to be increased (e.g. the Cnumber in the case of Call Transfer). Also in this case, only software
is affected as all subscriber services are implemented in software
only.
Analysis tables have space for a limited number of analysis cases.
The size of each analysis table is set by means of a Size Alteration.
Examples of such tables are the analysis table for the B-number
analysis and the Charging analysis table. If more analysis cases are
to be introduced (e.g. more Charging Cases or new subscriber
number series), a Size Alteration is used to create more space in the
table.
3.
Figure 4.5 gives an example of a change when only software is affected.
Figure 4.5
New register individuals are defined by means of a Size Alteration
If only a Size Alteration in software is to be made in the exchange, the
Operational Instruction “Size Alteration of Data Records” has to be followed. Note that this instruction will also be used for reduction of data
files.
03802-EN/LZM 112 18 R1
69
Exchange Data Basic
4.1.5
What is a Data File?
A size alteration affects a data file consisting of data records (referred to as
an individual in some cases). What, then, is a data record? Please study
figure 4.6.
Figure 4.6
Definition of data file and data record
The hardware located in the EMs must have some data related to it in the
Data Store. For the same type of hardware in one block, the same type of
data can be used. The designer of the Function Block describes one record
only. The “record” is the data required for one device. If the block contains
16 devices for one exchange, the number of records must also be 16. These
16 records make up one “data file” and the size of that file is in this example 16. If more hardware devices are to be added to the block, a corresponding change of the number of records in the data file is required. The
change of the number of records is made by using commands belonging to
the function Size Alteration. As already mentioned, most of the Size Alteration cases involve no hardware. Only the file size in the Data Store will
have to be affected in order to increase the number of devices.
70
03802-EN/LZM 112 18 R1
Size Alteration
It should also be noted that one Function Block usually contains more than
one file. As an example, one type of record is used to store data related to
the devices inside the block and one type of record is used to store the data
related to the routes defined in the block. This means that the block has
two different files in the Data Store that can be changed independently of
each other.
4.1.6
The Use of Size Alteration Events
In order to find the blocks that are affected by a Size Alteration, the AXE
system numbers the Size Alteration cases. Each number is referred to as
“Size Alteration Event” or just SAE. The SAE is used as a parameter in all
the commands related to the size alteration function. Also the documentation of the B-module uses the SAE number in various documents and lists.
There are two different types of size alterations in the AXE:
• Local Size Alteration Events
These events will only affect one block in the exchange. An example of
such an event is the number of devices inside one block.
• Global Size Alteration Events
These events will affect files in more than one block. An example is the
number of routes in the exchange. Several blocks in the system store
information about each route and all these blocks require the same file
size (e.g. blocks for statistics and supervision).
The Size Alteration Events (the numbers) are allocated in a special way so
that AXE will know which system (APT or APZ) and which type of event
it is (Local or Global). The following numbering has been used inside the
system:
• Global Events:
− APT: 000-299
− APZ: 300-499
• Local Events:
−
−
APT: 500-799
APZ: 800-999
This means that all SAEs higher than No. 499 are Local events. This is
important to know as the parameters included in the commands related to
the function are affected.
03802-EN/LZM 112 18 R1
71
Exchange Data Basic
4.1.7
Commands Related to Size Alteration
There are only three commands related to the function for Size Alteration
function. The three commands are:
SAAII
The command is used to Increase the file sizes in a Size Alteration Event.
SAADI
Used when Decreasing the file sizes in one SAE.
SAAEP
Used when Printing the number of individuals currently defined for the
SAE.
The two commands for changing the file size (SAAII and SAADI) have
an optional parameter, “BLOCK=block”. This parameter must be used if
the SAE is a local event. The reason for having this parameter is that the
Local SAEs (e.g. SAE=500) use the same SAE number for several blocks.
As an example, all the blocks that have telephony devices use SAE=500
for changing the number of devices in the block. If the operator wishes to
change the number of BT1-devices, the format of the command is:
SAAII:SAE=500,BLOCK=BT1,NI=XX;
The parameter “NI=XX” in the command is the parameter indicating the
total number of records after the change. Note that the total number is
stated, not the number of records added.
When the change has been ordered by the operator, the system will reallocate the Data Store in order to create more space for the variables included
in the records. This reallocation will take some time to perform as much of
the data must be moved in the store. This work has to be given low priority
in the system as traffic is handled at the same time. It usually takes 5 to 10
seconds but may take several minutes for a Global Event affecting several
blocks. The result of the Size Alteration is sent to the operator in the result
printout called Data File Information. Figure 4.7 shows the format of the
printout.
Figure 4.7
The result printout of the Size Alteration
72
03802-EN/LZM 112 18 R1
Size Alteration
Which SAE number is related to which block? The SAE number is
required in all the commands for the Size Alteration function and must be
found before the work can start. There are two ways to find this relation:
1.
2.
In the Application Information of the block affected.
We use this method if we know the block and want to know the SAE
number. In the Application Information, we can find all the SAEnumbers related to the block.
In the Parameter List in the last part of B14.
This list is sorted in numerical order starting with SAE=0. The list
contains information about the block/blocks affected by the event as
well as information about how to calculate the number of individuals. This method is to be used when we know the SAE number and
would like to know the block or read some information about the
event.
Figure 4.8 shows the principle.
Figure 4.8
The two ways to find the relation between the SAE numbers and the blocks in the exchange library
03802-EN/LZM 112 18 R1
73
Exchange Data Basic
4.2 Chapter Summary
• When you change the file size in Data Store it is called Size Alteration.
• When you add more hardware to the exchange this is called Extension
of Exchange.
• A Data Record contains data specific to one individual, e.g. a data
record can contain information about a specific subscriber number.
• A Data File consists of a number of Data Records. These Data Records
are of the same type, e.g. ten data records with information about ten
Regional Processors.
• There are one thousand Size Alteration Events (SAE) and they are numbered from 0 to 999.
• The first five hundred are called Global events. They change the data
file size for more than one function block.
• SAE numbered from 500 and higher are called Local events. They
change the data file size for only one function block.
74
03802-EN/LZM 112 18 R1
5. Analysis
Chapter Objectives
After completing this chapter the participant will be able to:
• Describe the general principles of analysis in AXE.
• Describe the use of Operating and Non-Operating Areas.
• Briefly describe the parameter Branching.
• Print and interpret basic information in the Route Analysis table.
• Describe and use the commands related to Route Analysis.
• Describe the main methods for Charging.
• Define the different parts of the Charging Analysis.
• Describe the calendar function.
• Define the B-number Analysis table.
Figure 5.1
Chapter Objectives
5.1 Analysis in General
Analyses inside the AXE system are nothing but looking up data in tables.
The word “analysis” will perhaps remind the reader of some advanced and
difficult mathematical calculation. Once again, this is not the case when
talking about analyses inside the software of the AXE system. Examples
of analyses are “Route Analysis”, “Charging Analysis” and “B-number
Analysis”.
The input to the analysis tables is mainly of three types:
03802-EN/LZM 112 18 R1
1.
External data, such as B-number digits and A-number digits.
2.
3.
Internal data, such as subscriber categories and route data.
Results from other analysis tables, e.g. Routing Cases.
75
Exchange Data Basic
Figure 5.2 shows the general principles of the analyses inside the AXE
system.
.
Figure 5.2
The general principle of traffic analyses in the AXE software
5.1.1
The Use of Operating and Non-Operating Area
For most analysis functions inside the traffic handling part of the AXE
system, there are two tables used for each analysis table. One of the tables
is used for the actual analysis and the other is used when performing
changes. The two tables are referred to as “Operating Area” and “NonOperating Area”, abbreviated OP and NOP respectively. This principle has
several advantages compared with just having one set of tables:
1.
Major changes or extensions require several commands. All the
commands must in most cases be specified before the analysis is
made properly.
2.
The new data, loaded into the NOP area, can be tested, printed and
changed before it is put into traffic.
When existing analysis data is changed, the old data is kept in a
write-protected state for 24 hours. It is possible to revert to the old
data if the new data is faulty in some way, by just using one command.
3.
4.
Changes in the NOP areas can be made during traffic handling. Also
major changes can be made without disturbing the traffic.
In case of Route Analysis, the commands used to handle the analysis
tables start with the letters ANRxx. Figure 5.3 shows how an existing
Routing Case is changed by specifying data in the NOP area, where upon
the data is activated.
76
03802-EN/LZM 112 18 R1
Analysis
Figure 5.3
An example of how the OP and NOP areas are handled for a Routing Case
03802-EN/LZM 112 18 R1
77
Exchange Data Basic
5.2 Branching
Branching can be used for two main reasons.
One reason is when branching is used for treating some subscribers differently than the others. That is, when one or more of the subscribers connected in our exchange are to be treated differently than the other
subscribers in our exchange. Another case is when subscribers connected
in other exchanges, using our exchange as a transit exchange (i.e. an
incoming route), are to be treated differently than our own normal subscribers.
Branching can also be used when the analysis result from the table should
be affected by some other parameter.
When we want to treat one incoming route differently from the other
routes, we have to make a change in the route data, for that incoming
route, by using command EXRBC.
For a subscriber we have to perform a change in that subscribers data with
the command SUSCC and the parameter SCL.
78
03802-EN/LZM 112 18 R1
Analysis
5.3 Route Analysis
In this module, we have already described how new devices and new
routes were defined in the system. The next action, if a new route is to be
defined in the exchange, is to define the Route Analysis for the new route.
Existing data in the Route Analysis can also be modified by using the
commands described in this chapter.
The Route Analysis in the AXE system is implemented in central software
in a Function Block called RA, Route Analysis. Block RE, Register, interworks with block RA as described in figure 5.4.
Figure 5.4
The interwork between the blocks RE and RA
A brief explanation of the different steps shown in the figure (numbers
referring to the numbers in the figure) is given below:
1.
The B-number is sent to the Register from another block in the system. The digits are stored in the register for future use.
2.
The digits are sent for analysis in block DA, Digit Analysis, which
contains the B-number analysis table.
The result from the B-number analysis table is among other things a
3.
03802-EN/LZM 112 18 R1
79
Exchange Data Basic
4.
5.
Routing Case, RC. The Routing Cases are numbered, e.g. RC-40.
The RC number is sent back to the register which stores the information in the register record reserved for the call.
The Routing Case is sent to block RA together with some more
information, such as subscriber categories or route data (depending
on the origin of the call). In RA, the Route Analysis table indicates
which route to use for the call.
The identity of the route indicated in the analysis is sent back to the
register.
The route analysis in the RA is in the form of a table that can be printed by
means of the ANRSP command. Figure 5.5 shows an example of a printout of a small part of the Route Analysis table.
Figure 5.5
An example of a printout of the Route Analysis table
A brief explanation of some of the most important columns in the printout
is given below. For a detailed description, please study the Printout
Description of the “Routing Case Data” printout.
80
RC
Routing Case
This column is used to indicate the number of the Routing
Cases. The RC number will be the input position to the
table.
BR
Branching
The Routing Cases can give different results depending
on different input parameters (e.g. subscriber class).
ROUTING
Under this heading, the different routing alternatives are
listed. If several “lines” exist for one RC, that means that
03802-EN/LZM 112 18 R1
Analysis
there is more than one alternative for that Routing Case.
Each RC can have up to 25 “routing programs” denoted
P01, P02, P03 up to P25. Within each routing program, up
to 8 alternatives can be specified. The alternatives are
indicated by 1 to 8 (P01=1, P01=2 .... P01=8). The
parameter “R=...” indicates the route name of the alternative. The same route names as specified for command
EXROI should be used.
SP
Sending Program
This information is used to indicate when an outgoing
device is to be seized.
The other columns are used for special cases and for international
exchanges (e.g. handling of echo suppressors).
5.3.1
The Sending Program
The column marked “SP” in the printout depicted in figure 5.5 indicates
when different actions should be taken regarding the seizure of outgoing
device and digit transmission. The sending program consists of three parts
and their meaning is explained in figure 5.6.
Figure 5.6
The meaning of the three digits in the sending program
As can be seen in the Sending Program, the events initiated in the outgoing
side are determined by the incoming digits. As the register controls the call
set-up, the events depend on when the digits are received by the register. If
the sending program in figure 5.6 is used (SP=553), it means that seizure
of the outgoing device is initiated when the register has received the 5:th
digit of the B-number. The seizure signal to the other exchange is also sent
after the 5:th digit and the first digit transmitted is the 3:rd.
03802-EN/LZM 112 18 R1
81
Exchange Data Basic
Figure 5.7 shows an example of how the sending program is used by the
outgoing exchange in a call between two exchanges.
Figure 5.7
An example of how the sending program is used
The information in the sending program is determined by the administration (Traffic Engineering Department) and the values written in the sending program depend on several factors:
1.
Signalling system
If an old, and usually slow, signalling system is used in the route, the start
position of the seizure should be early in order to have time to transmit the
digits. If, on the other hand, a fast signalling system is used, e.g. CCITT
No 7, the seizure position is in most cases on the very last digit.
2.
Distance
For international calls, the outgoing exchange does not know the signalling system used in the other country. For that reason, the start position is
usually as early as possible.
3.
Numbering Plan
The value written in the last digit of the sending program (i.e. the first digit
to be sent) is determined by the numbering plan of the network.
82
03802-EN/LZM 112 18 R1
Analysis
4.
Post Dialling Delay
The time between the dialling of the last digit until ring control tone is
heard by the calling subscriber is referred to as Post Dialling Delay. The
administrations and CCITT set up maximum values for this parameter and
it might affect the sending program.
In some cases, no digits should be transmitted to the outgoing route.
Examples are routes towards subscriber services and announcing
machines. In that case, the sending program is specified in a special way.
Some examples of how the sending program can be specified for some
special cases are given below:
1.
SP=330
If the last digit in the sending program is set to zero, no digits at all
will be transmitted to the route. If all digits are to be transmitted, a
“1” should be specified.
2.
SP=300
If also the middle digit in the sending program is set to zero, no seizure signal will be sent on the route.
SP=MM5
If the number length is unknown, and if seizure should be made on
the last digit, the letter “M” is used to indicate “maximum”.
3.
5.3.2
The Commands Used to Define Routing Cases
We have already studied some of the commands used to specify routing
cases. This chapter describes the commands related to this function and
indicates what the commands perform. For detailed information about
parameters and correct syntax, please study the Command Description in
the exchange library.
Commands for specification and deletion of RC:
ANRSI
Specifies new RCs in the NOP area.
ANRSE
Deletes RCs from the OP area. This is only possible if
there is no reference to the RC from the B-number analysis table.
Commands for initiating and terminating procedures:
ANRPI
Initiates a procedure
ANRPE
Ends an initiated procedure
Commands for the handling of OP and NOP areas:
03802-EN/LZM 112 18 R1
ANRZI
Clears the NOP area of all or specified RCs
ANRAI
Activates the specified RCs
ANRAR
Deactivates specified RCs and reverts to the old data if it
is available (change of existing RC).
83
Exchange Data Basic
5.4 Charging Analysis
5.4.1
Charging Principle
Basically there are two different variants of how calls are charged by the
administration, namely:
1.
Pulse Metering, PM
If Pulse Metering is used in the exchange, each subscriber has a call
meter that is stepped according to the pulses generated by the tariff.
When Pulse Metering is used, the block CHSUB, Changeable Subscriber Data Handling, in the Charging Subsystem stores the values of
the subscribers call meters in the exchange. The counters are stepped
by order of block MP, Meter Pulse, which contains information about
the tariffs in the exchange. At regular intervals, the call meters are
copied to a tape or sent via a data link to an external computer for
generation of bills.
2.
Toll Ticketing, TT
When this method is used, the Charging Subsystem will assemble
information about each call such as the A- and B-numbers, start and
stop time of the call and the destination of the call. This information
will at the end of the call be copied to a tape or sent via a data link to
an external computer that can generate a detailed bill from this information. Please study figure 5.8 .
84
03802-EN/LZM 112 18 R1
Analysis
Figure 5.8
The principles of Pulse Metering and Toll Ticketing
03802-EN/LZM 112 18 R1
85
Exchange Data Basic
When Toll Ticketing is used, the block CHMON (Charging Monitoring)
together with some other blocks, records all the information required.
When the call is terminated, the information is sent to block CHOD/CHOF
which performs the formatting of the data according to the requirements of
the administration. This information is then sent to the IOG and stored as a
record in a dedicated charging file called TTFILExx where xx indicates
the file identity. At regular intervals, the files are sent to the administration
for post-processing and generation of bills.
5.4.2
Charging Method
Different administrations use different methods when charging the subscribers by means of Pulse Metering. The two most common methods are
referred to as “The Karlsson principle” and “Modified Karlsson principle”,
named after the inventor, a Finn.
Which method to use in an exchange is determined by the administration
when the Application System is assembled. The method used is determined by setting some parameters in the program of one of the blocks in
the Charging Subsystem. This also means that it is not possible to change
the charging method used by means of a command. The basic principles of
the two variants of Pulse Metering can be seen in figure 5.9.
Figure 5.9
The charging principles of Pulse Metering
86
03802-EN/LZM 112 18 R1
Analysis
5.4.3
A Survey of the Charging Analysis
The charging analysis in AXE is made by means of several tables that
deliver different analysis results. The general principle of the tables, and
also their way of interworking, is described in this chapter. However, a
detailed description of most of the tables and the parameters included is
given in separate chapters following this. Figure 5.10 shows the general
principles of the charging analysis in the Charging Subsystem.
Figure 5.10
The Charging Analysis, a survey
The input to the charging analysis is the so called “Charging Case” which
is one of the results from the B-number analysis table. The Charging Case
gives the input to the first analysis table in the Charging Subsystem. From
the Traffic Activity Analysis we will either get a “New CC” (NCC) or just
have a through connection as the result. Then we will go to the Charging
Case Branching. The result from here will be a “Charging Program”
(CHP). The CHP will lead us to the Charging Program table and the result
from here will be the “Tariff Class”. The Tariff Class is further analysed in
the next table. The Tariff Class may be affected by a so called “Switching
Class” which is used if time differentiated charging is used. The Switching
Class is nothing but a timetable for the tariff switching. This means that
the tariffs, which are indicated in the Tariff Class, are dependent on the
time of the day. The Tariffs included in the Tariff Class are listed in the
table for the Tariff Class.
The last table, the Tariff Data, contains information about each tariff specified in the exchange. One of the parameters in the Tariff Data is the TDS,
Time Duration in Seconds. This parameter specifies the time in seconds
between the charging pulses.
03802-EN/LZM 112 18 R1
87
Exchange Data Basic
One very important thing to know about the charging analysis is that the
analysis order is as already described. However, the order of specification
must be made “backwards”, starting with Tariffs. The reason for this is that
the system checks that something referred to exists before the command
can be accepted (Fault Code in the command indicating reference to non
existent data).
We will now look at the most important steps in specifying a simple CC.
5.4.4
Definition of Tariffs
Tariffs are defined by the command CHTSI, and the required parameters
in the command are:
• T, Tariff number
The tariffs are numbered in order to make it possible to refer to them
from the Tariff Class.
• TDS, Time Duration in Seconds
This parameter indicates the time in seconds, or parts of a second,
between the pulses. The tariffs can be specified in the range of 0.01 to
3276 seconds. The Application Information of block MP gives more
information.
• NSP, Number of Start Pulses
Indicates the number of start pulses when the charging is initiated, e.g.
on the receipt of a B-answer.
An example of a tariff specification is:
CHTSI:T=3,NSP=1,TDS=60;
The command defines the tariff number 3, with 1 start pulse on B-answer
and 60 seconds between the pulses. A printout of the Tariff Data, which is
the name of the table, can be seen in figure 5.11, on the next page.
88
03802-EN/LZM 112 18 R1
Analysis
Figure 5.11
An example of a printout of tariffs
Tariffs no longer used can be removed by means of command CHTSE.
However, if a reference is given to the tariff from any Tariff Class, the
deletion will fail.
As can be seen from the printout of the tariffs, some tariffs have start
pulses defined only as (NSP). This type of tariff is used when charging
subscriber services (e.g. activation of a service).
03802-EN/LZM 112 18 R1
89
Exchange Data Basic
5.4.5
Definition of Tariff Class
In the Tariff Class, the tariffs used during the day are specified. This can be
seen in the printout of the Tariff Class Data. Please study figure 5.12.
Figure 5.12
Printout of Tariff Class Data, example
The different columns in the printout have the following meanings:
• TC, Tariff Class
This is the identity of the Tariff Class. The number is used when referring to the Tariff Class from the Charging Case. There can be up to 511
Tariff Classes in the exchange. However, the maximum number available in the exchange is set by a Size Alteration.
• SWC, Switching Class
If time-differentiated charging is used, there is a reference to an SWC
used for the tariff switching. If nothing is indicated in this column, there
is only one tariff used for the Tariff Class.
• DCAT, Day Category
Same meaning as in the Switching Class.
• T, Tariff
If only one tariff is indicated under this column, only one tariff is used
and there is no tariff switching for that Tariff Class or for that Day Category. If several tariffs are indicated under this column, the tariff written to the left is the first tariff used that day.
When specifying a Tariff Class without any time-differentiated charging, it
will not be necessary to use any procedure as one command is enough.
However, if a Switching Class is used in the Tariff Class, a procedure will
have to be used.
90
03802-EN/LZM 112 18 R1
Analysis
All the commands for the handling of Tariff Classes are listed below:
Handling of OP and NOP areas:
CHCZI
Resets data in the NOP area.
CHCAI
Activates data specified in the NOP area.
CHCAR
Reverts to the old data valid after the activation.
Handling of procedures:
CHCPI
Initiates a procedure (required if SWC is used).
CHCPE
Ends a procedure.
Initiate and delete Tariff Classes:
CHCSI
Initiates data in the NOP area for a new or modified TC.
CHCSE
Removes a not used TC from the OP area. Not possible if
the TC is referenced from any Charging Case.
Printout of data:
CHCSP
5.4.6
Prints “Tariff Class Data”.
Definition of Charging Case
The last part of the definition of charging data is the definition of a Charging Case. This is done in three main steps:
1.
2.
Charging Program
Charging Case Branching
3.
Traffic Activity Analysis
Charging Case analysis is also implemented by means of tables that can
easily be printed.
In the Charging Program table we define which TC to be used, who is
going to be charged and where, in which exchange, the charging is to take
place. Some of the commands to use are:
Initiate and delete Charging Programs:
CIPSI
Initiates data in the NOP area for a new or modified CHP.
CIPSE
Removes a not used CHP from the OP area.
Printout of data:
CIPSP
03802-EN/LZM 112 18 R1
Prints “Charging Program Data”.
91
Exchange Data Basic
In the Charging Case Branching we specify which CHP to be used and
also if we want to have branching. Some of the commands to be used are:
Initiate and delete Charging Case:
CIBSI
Initiates data in the NOP area for a new or modified CC.
CIBSE
Removes a not used CC from the OP area.
Printout of data:
CIBSP
Prints “Charging Case Data”.
And at last we specify the Traffic Activity. Also we can specify the
branching parameter in this table. This is used when we want to have special ISDN services. The result from this table can either be a new charging
case NCC or just a through connection, if we don’t need to branch. One of
the commands is:
Printout of data:
CHISP
5.4.7
Prints “Traffic Activity Dependent Charging Case Data”.
The Calendar Function
The calendar function in AXE is controlled by a clock that is handled by
the operating system of the APZ. The clock is used by several functions in
the system which require a real time clock. Examples of such functions are
charging, routine tests and traffic recording functions. The clock indication
can be printed at any time by using the CACLP command. Figure 5.13, on
the next page, shows the printout received.
Figure 5.13
Printout of Clock Data
The clock is controlled by the operating system of the APZ that increments
the clock. Over a longer period of time, the clock can start losing or gaining. This fact makes it necessary to check and in some cases adjust the
92
03802-EN/LZM 112 18 R1
Analysis
clock at regular intervals. However, the adjustments should not be more
than a few seconds over a period of several months. If the clock is to be
adjusted, the CACLC command can be used. An example of the command
is:
CACLC:TDSF=5;
The command orders the clock to be adjusted forwards 5 seconds. The
time it takes before the clock has been adjusted is twice the adjusted time.
In some countries, summer and winter time is used. This means that also
the clock of AXE must be adjusted. The adjustment is one hour in either
direction. The change of the clock is made by using the CACLC command
in the following way:
CACLC:DATE=960331,TIME=0200,TDSF=3600;
This command will forward the clock by one hour at 0200 hours March
31, 1996. The use of the parameters DATE and TIME makes it possible to
order the adjustment in advance.
The day categories used in the Switching Class are set by command. When
the exchange is installed, the day categories are set according to the
requirements of the administration. This information can be printed by
using command CACAP. Figure 5.14 shows an example of the printout
received.
03802-EN/LZM 112 18 R1
93
Exchange Data Basic
Figure 5.14
Printout of day categories, example
Days that deviate from the standard day categories, e.g. Christmas and
other public holidays in the middle of the week, must be specified manually by the operator. If Christmas is in the middle of the week one year, the
days with day category DCAT-1 and DCAT-2 must be defined to the system by using command CACAS. An example of the command is:
CACAS:DATE=961225,DCAT=2;
If day categories are to be removed from the list, the command CACAR
will have to be used.
94
03802-EN/LZM 112 18 R1
Analysis
5.5 B-Number Analysis
5.5.1
An Example of an Analysis Table
We are now, finally, going to look at the analysis table that has supplied all
the information to the other analysis tables. From the B-number analysis
table, we have received the Routing Case and the Charging Case. To illustrate the principle of B-number analysis, we will use a simple network
with a few exchanges. The B-number analysis table that we are going to
study is located in exchange A. Please study the simple network in figure
5.15.
Figure 5.15
An example of a simple network
03802-EN/LZM 112 18 R1
95
Exchange Data Basic
As can be seen, our exchange (A) has 100 subscriber lines connected to it.
The number series starts with 12000 and ends with 12099. Internal calls
are charged according to CC=4. The other exchanges, B, C, D and E form
the local network. RC=11 applies to calls to exchange B which has a
number series starting with 31xxxx. RC=13 applies to calls to exchange C
with a number series starting with 32xxxx. RC=10 applies to exchanges D
and E with number series starting with 65xxxx and 67xxxx respectively.
All calls to the local network are charged according to CC=3. Long-distance calls with area codes “01” and “02” are charged according to CC=1
and CC=2 respectively. RC=10 also applies to long-distance calls.
What, then, does the B-number analysis table look like in the A exchange?
The answer can be seen in figure 5.16.
Figure 5.16
The B-number analysis table in exchange A
Note that this is the minimum amount of data (contents) for handling the
traffic described earlier. As will be described later, subscriber services etc
require more data than this.
96
03802-EN/LZM 112 18 R1
Analysis
Each column in figure 5.16 is further described below:
5.5.2
B-NUMBER
This column contains two things: the origin and the Bnumber. Origin, which is the digit to the left, is used to
divide the whole B-number analysis into different parts
(different branches in the tree). Usually, the B-number
analysis starts in origin 0 (0-xx). If another origin is
required, the subscriber category “OBA” will have to be
changed using command SUSCC. For incoming routes,
the command EXRBC:R=...., BO=xx; can be used. The
B-numbers are then listed in numerical order. The number
of digits included for each group of numbers depends on
how many digits the administration wants to analyse.
MISCELL
This column contains various types of parameters, such as
Destination Codes, number modifications and Traffic
Destination Codes. By means of various parameters, the
table can order the register to request information from
the incoming side of the call. Examples are the A-subscriber class, the A-number and satellite information.
F/N
This column is used to make jumps in the analysis table.
Two parameters can be used here: “F” for First and “N”
for Next. First means that the analysis is started from the
first digit in the origin stated after the parameter. Next
means that the analysis is continued with the next digit in
the stated origin.
ROUTE
This column contains references to Routing Cases, RC,
and Terminating Traffic, TE.
CHARGE
The column gives references to Charging Cases.
L
This column indicates the number length of the
B-number. If the length is unknown, the minimum and the
maximum number lengths are specified
(min-max, e.g. 9-15).
A
Under this column, references are made to Accounting
Cases.
A Study (Case) of an Outgoing Call
We are in this chapter going to study an example of how the analysis table
depicted in figure 5.16 is used and how the register controls the analysis of
the digits.
A subscriber in exchange A wants to call a subscriber in exchange C with
number 321069 (refer to the network diagram in figure 5.15). The subscriber lifts the handset and dials the digit “3”. The digit is received in the
Subscriber Switch (by LIC or KRC) and the digit is forwarded in the software to the Register in subsystem TCS, Traffic Control Subsystem. The
digit “3” is stored in the Register and is then sent to function block DA
03802-EN/LZM 112 18 R1
97
Exchange Data Basic
where the B-number analysis table is situated. Figure 5.17 shows the principle.
Figure 5.17
Analysis of the first digit dialled by the subscriber
What results could be expected? If you study the network that is depicted
in figure 5.15, you can see that it is a call to exchange B or C. Both
exchanges have two things in common:
1.
2.
the same Charging Case (CC=3)
the same number length (6 digits).
This means that some data is available after the first digit. This information can also be obtained from the B-number analysis table in figure 5.16
if you look at the line “0-3”(origin 0 and digit 3). Under the CHARGE
heading, you will find CC=3 and under the L heading, you can find the
number length L=6.
What, then, happens with the analysis result? The information about the
number length is stored in the register to indicate the expected number of
digits. The information indicating the Charging Case is sent on immediately to block CA for the Charging Analysis. The result of the Charging
Analysis consists of data about how the call is to be charged, among other
98
03802-EN/LZM 112 18 R1
Analysis
things the Tariff Class (TC). Figure 5.18 shows how the digit “3” is analysed in the system.
Figure 5.18
Analysis of the first digit and the Charging Case
After a short while, the subscriber dials the second digit, “2”. The digit is
sent, as usual, to the register for storage and is then sent to block DA for Bnumber analysis. In this case, the digit “2” indicates to which exchange the
call is directed. By looking at line 0-32 in the B-number analysis table
(figure 5.16), you will find RC=13 under the ROUTE heading. The analysis result sent back to the register is a Routing Case. The register will
immediately send the Routing Case to block RA for Route Analysis. The
result of the Route Analysis is, among other things, the identity of the outgoing route and the Sending Program.
03802-EN/LZM 112 18 R1
99
Exchange Data Basic
Figure 5.19 shows the signalling in the system.
Figure 5.19
Analysis of the second digit and the Routing Case
In the B-number analysis table, you can see that no more analysis results
can be obtained (no more digits in this part of the analysis as 0-32 are followed by 0-6 in the table). Block DA will indicate that to the register by
giving “end of analysis” as the last analysis result. This implies that the
remaining four digits dialled by the subscriber will not be analysed. They
will, however, be stored in the register. The next action taken by the register is determined by the data in the Sending Program.
At this point in the call, the following information is stored in the register:
•
•
•
•
•
100
Number length: 6 digits
Tariff Class
Identity of outgoing route
Sending Program
Digits in B-number: 3 and 2.
03802-EN/LZM 112 18 R1
Analysis
5.5.3
A Study Case of an Internal Call
This study case will describe an internal call inside the A exchange. As can
be seen in figure 5.15, only one “hundred group” is specified in the
exchange. The numbers are defined in the exchange and the connection
between the subscriber number and the Line Interface Circuit is made by
command.
A subscriber lifts the receiver and dials digit “1”. If you study the network,
you can see that this must be an internal call (12000-12099 defined as
internal numbers). If you study the B-number analysis table, you can see
that the number length 5 can be found under the heading “L” in the table
(look at line 0-1). Also Charging Case 4 is indicated under the heading
“CHARGE” as all internal calls are charged through this Charging Case.
The subscriber then dials digit “2”. The B-number analysis table is in this
case not delivering any result at all as nothing is indicated on line 0-12 in
the table.
The third digit dialled by the subscriber is digit “0”. In this case, the
parameter “TE” is indicated under the heading ROUTE. That parameter is
used to indicate a terminating call. But why is TE not indicated when the
first digit is analysed? The answer can be found in the internal structure of
the system. It is not possible to indicate TE until the analysis has reached
the “thousand” or “hundred” group level. The reason for this is that the
Register can add the last part of the B-number and then translate the Bnumber into an internal type of numbering, referred to as the SC-pointer.
5.5.4
Parameters in the Analysis Table
Subscriber Services are in many cases using procedures that the subscribers will have to dial in order to activate, deactivate and use the service.
Examples of subscriber procedures are activation of Call Transfer (*21* bno #) and deactivation of Don’t Disturb (#26#).
These digits and codes (* and #) are dialled by the subscriber and analysed
as ordinary digits. The two codes * and # are represented in the analysis
table as follows:
*
#11
#
#12
This means that the digits *51# will be written in the analysis table as
#1151#12.
Another parameter which is rather common is parameter “M” which can
be found under the MISCELL column. Parameter M is used for modifications of the B-number and can consist of one or two sub-parameters. Here
are two examples that illustrate the use of the parameter:
M3
03802-EN/LZM 112 18 R1
Three digits are deleted from the B-number. Can be used to
delete the trunk prefix as the deletion is made from the first
digit dialled by the subscriber.
101
Exchange Data Basic
M3-045
5.5.5
Three digits are deleted from the B-number and the digits “045”
are added in front of the number instead. If M0-045 is used
instead, no deletion is made.
Commands
When introducing changes into the B-number analysis table, an Operating
and a Non-operating area must be used. The principle is similar to that of
the OP and NOP areas used for Routing Cases and for Charging Cases.
However, there are some differences when handling the OP and NOP areas
which are described here.
When a Routing Case was specified in the NOP area, it was handled as
one unit in the commands. One RC could be cleared in the NOP area, one
RC could be activated at a time and one RC could be deactivated. The
same thing applied to Charging Cases and Tariff Classes. When working
with the B-number analysis table, the whole table will have to be seen as
one unit. This means that the whole table will be activated and deactivated.
Figure 5.20 shows the principle.
102
03802-EN/LZM 112 18 R1
Analysis
Figure 5.20
The commands for handling the B-number analysis table
03802-EN/LZM 112 18 R1
103
Exchange Data Basic
A brief description of each command and what it affects follows below:
ANBZI
The command is used to clear the NOP area. Note that the
whole area is cleared.
ANBCI
The command copies the entire B-number analysis table
from the OP area into the NOP area. This means that the
operator can “edit” the existing table in the NOP area by
means of commands.
ANBSI
This command is used to introduce new data into the
table. The ANBSE command can be used if data is to be
deleted.
ANBAI
The command activates the whole NOP area and makes it
Operating. The old data, previously in the OP area, is now
in the NOP area and it is write-protected for 24 hours.
ANBAR
If the data is faulty in any sense, the reversion to the old
analysis table is made by one single command. After
change with ANBSI and/or ANBSE, the table can be activated again with ANBAI.
Note that the B-number analysis table in the NOP area can be tested before
it is activated. Please study the B-module for further details (Operational
Instructions “Change in B-number analysis”).
5.5.6
Pre-Analysis of B-numbers
By means of the pre-analysis function, it is possible to reduce the size and
the complexity of the normal B-number analysis. B-number information,
such as BNT, NAPI and origin for B-number (BO) are used as input. The
output of this analysis is a modified Origin for B-number Analysis (OBA),
which is used as input to the B-number analysis table.
The print command for Pre-analysis is:
PNBSP:BO=ALL;
104
03802-EN/LZM 112 18 R1
Analysis
5.6 Chapter Summary
• The analyses in the AXE 10 system is about finding data in different
tables. There are several analyses, for example Route Analysis, Charging Analysis and B-number Analysis.
• For each type of analysis there are two tables:
− Operating Area (OP)
− Non-Operating Area (NOP)
• In the Operating Area the actual analysis is performed.
• In the Non-Operating Area new data is entered or old data is changed.
After new data has been changed old data is stored and protected in this
area for 24 hours.
• Branching is used when single subscribers and/or a whole incoming
route is to be treated different than normal subscribers, i.e. they will
have less alternative ways through our exchange or to be charged more
than normal subscribers.
• Route Analysis is used for selecting a route to be used in a call set up.
• A Routing Case is a list of all possible routes to a specific destination,
e.g. exchange or internal devices such as Register (RE).
• To be able to charge a subscriber we use Charging Analysis.
• There are two Charging Methods (CM):
− Pulse Metering (PM)
Subscriber meters that are stepped with pulses.
−
Toll Ticketing (TT)
Information about each call is collected. This information will
later be used for detailed bills to the subscribers
• The final result of the Charging Analyses is to get a Tariff.
The Tariff tells us how many start pulses and how often the pulses will
be generated.
• B-Number Analysis is the almost the first analysis to be carried out in a
call setup.
• The results of B-number Analysis will give the input data to the other
analysis tables, for example, routing and charging analysis.
• The first analysis to be done is the Pre-Analysis of B-numbers.
This is used to reduce the size and complexity of the B-number table.
03802-EN/LZM 112 18 R1
105
Exchange Data Basic
106
03802-EN/LZM 112 18 R1
Using the Acrobat Reader
This electronic (on-line) document is stored in Adobe Acrobat format.
To view the document you use the Acrobat Reader 3.0 program (the
one you are using right now) together with the Acrobat Search Plug-in.
The following pages briefly describe the
Acrobat Reader functions used in this
application. Click the next page button at
the top of the page to continue.
More detailed information to help you use
the Acrobat Reader program is found in the
Acrobat Reader Online Guide. Select
Help from the menu bar at the top of the
Acrobat Reader window. Then click on
Reader Online Guide.
Exiting the Acrobat Reader
Select Exit from the File Menu
(or press Alt+F4) to exit the
Acrobat Reader.
You can also click Exit on the
first page of this document to exit
the Acrobat Reader.
Page navigation
The page navigation buttons on the toolbar are
used to move between pages within the document.
The Previous Page and Next Page buttons are used to move
within the document backward or forward, one page at a time.
Use the First Page or Last Page button to move to the first or
last page.
Use the Go Back and Go Forward buttons to retrace your steps
in a document, moving to each view in the order visited.
Document overview
On the left-hand side of the Acrobat
window you find the document
overview area. In this application the
area contains the table of contents or
page thumbnails (miniatures) for all
pages in the document. In Acrobat
terminology the items in the content
list are called bookmarks. Click a
paragraph title to go to the
corresponding paragraph. Clicking
one of the small triangles in the list
will show or hide subordinate
headings (bookmarks).
Document overview (cont.)
You can click and drag (see the cursor in
the figure) the border between the
overview area and the page area to
change the area proportions (size relation
between areas).
Click the Thumbnails and Page button to display the
thumbnails.
Click the Page Only button to close the overview area of the
window.
Click the Bookmarks and Page button to open the overview area
and show the table of contents (display bookmarks).
Page magnification
The magnification box at the bottom of the
screen displays the current page magnification
and lets you select various magnifications.
Fit Visible is the default magnification for
this electronic document application.
You can also use the Actual Size, Fit Page, and Fit Width
toolbar buttons to change the screen magnification.
Find
There are two functions to locate a word or a phrase when using the
Acrobat Reader. One function is called Find and the other is called
Search. Find is the slowest and processes the text in a sequential way.
Search is much quicker and is the recommended method. See next page
for details.
(Step-by Step instructions for the Find function)
1. Click the Find button and enter keyword(s).
2. If necessary, press F3 to find next occurrence.
Search
It is recommended that
Acrobat Reader 3.0 with the
Search Plug-In is used to
view this electronic
document. The plug-in
enables the Acrobat Reader
to use the Search function to
very quickly find the
information you are looking
for.
Select Plug-In Help from the Help Menu and then click on Using
Acrobat Search to read about advanced uses of the Search function.
There is also a Find function (see previous page) but Search is the
recommended method as it is much quicker than Find and it also
includes more advanced search functions.
Search (cont.)
(Step-by Step instructions for the Search function)
1. Click the Search button and enter keyword(s).
2. If necessary, click the Search Next and
Search Previous buttons to find other
occurrences in the text.
Print
(Step-by Step instructions)
1. Select Print from the File Menu.
2. Select print range (what pages to
print) and set options.
Select Shrink to Fit if your paper
is smaller than A4-size
(e.g. letter size paper).
3. Click the OK button
Cutting and pasting text
(Step-by Step instructions)
1. Click the Select Text button and select the text you want to
copy into another Windows application.
2. Select Copy from the Edit Menu to copy the text to the
Windows clipboard.
3. Go to the target Windows application (e.g. Windows Write
or WordPad).
4. Paste the text into your target application.
Important: This function may only be used to create notes or summaries
for personal use. Beware of copyright rules.
Cutting and pasting graphics
(Step-by Step instructions)
1. Choose Select Graphics from the
Tools Menu to select the graphics
item you want to copy into another
Windows application.
2. Select Copy from the Edit Menu to
copy the graphics to the clipboard.
3. Go to the target Windows
application (e.g. Windows Write or
WordPad).
4. Paste the graphics into your target application.
Important: This function may only be used to create notes or summaries
for personal use. Beware of copyright rules.
Download