Professional Documents
Culture Documents
Feature Description: HUAWEI MSOFTX3000 Mobile Softswitch Center V100R005C10
Feature Description: HUAWEI MSOFTX3000 Mobile Softswitch Center V100R005C10
V100R005C10
Feature Description
Issue 02
Date 2007-06-10
Part Number 31400597
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Contents
Index
CW, 5-2
A call forwarding
Alert SC, 2-3 CFB, 3-2
availability CFNRc, 3-3
alarm for malicious short message, 30-3 CFNRy, 3-2
authentication, 10-3 CFU, 3-2
automatic device detection, 37-3 charging and CDR
call barring service, 7-3 call barring service, 7-15
call completion, 5-3 call completion, 5-17
call forwarding, 3-3 call forwarding, 3-21
call simulation, 31-5 call simulation, 31-17
CAMEL4 service, 22-4 CAMEL4 service, 22-18
dialing test on designated TDM circuit, 35-3 dialing test on designated TDM circuit, 35-11
early and late assignment feature, 12-3 ECT, 8-9
ECT, 8-3 enhanced MSRN allocation feature, 11-14
enhanced MSRN allocation feature, 11-4 IN service triggering feature, 13-14
IMSI-based announcement, 23-4 MNP feature, 14-15
IN service performance measurement enhancement, multiparty, 6-12
36-4 O-CSI SMS, 26-18
IN service triggering feature, 13-3 service restriction, 34-24
IP over E1, 24-4 short message service, 2-15
IP QoS flow control, 25-3 speech service, 1-22
load-based handover, 32-3
MNP feature, 14-3 D
multiparty, 6-3
O-CSI SMS, 26-3 data configuration
ODB, 9-4 alarm for malicious short message, 30-7
role-based and domain-based management, 29-7 authentication, 10-7
service restriction, 34-4 automatic device detection, 37-7
short message service, 2-4 call barring service, 7-12
speech service, 1-4 call completion, 5-12
union subscriber trace, 33-4 call forwarding, 3-18
UP header redundancy data service, 27-3 call simulation, 31-10
VDB dynamic data backup, 28-4 CAMEL4 service, 22-13
dialing test on designated TDM circuit, 35-9
early and late assignment feature, 12-17
C ECT, 8-7
call barring service enhanced MSRN allocation feature, 11-9
BAIC, 7-3 IMSI-based announcement, 23-8
BAOC, 7-2 IN service performance measurement enhancement,
BOIC, 7-2 36-13
BOIC-exHC, 7-2 IN service triggering feature, 13-10
call completion IP fax feature, 15-7
CH, 5-2 IP over E1, 24-11
L R
license control items reference
control item, 16-12 authentication, 10-7
resource control item, 16-15 automatic device detection, 37-11
license feature call barring service, 7-21
alarm, 16-19 call completion, 5-19
effects of BAM operation, 16-20 call forwarding, 3-35
invalidation and prevention, 16-17 call simulation, 31-17
license checks, 16-17 CAMEL4 service, 22-6, 22-21
Upgrade, 16-20 charging and CDR, 11-15
line identification dialing test on designated TDM circuit, 35-12
CLIP, 4-3 ECT, 8-13
CLIR, 4-3 IMSI-based announcement, 23-13
COLP, 4-3 IN service performance measurement enhancement,
COLR, 4-3 36-20
Line Identity, 4-2 IN service triggering feature, 13-15
IP over E1, 24-20
M IP QoS flow control, 25-18
license feature, 16-21
MOC, 1-3
line identification, 4-14
MSRN allocation feature
load-based handover, 32-16
based on the LAI number, 11-3
MNP feature, 14-16
based on the MSC number, 11-2
multiparty, 6-14
random allocation, 11-3
O-CSI SMS, 26-18
MTC, 1-3
ODB, 9-8
role-based and domain-based management, 25-18,
O 29-20
ODB service interaction, 12-23
i.
Contents
4.4.2 CLIR..................................................................................................................................................4-7
4.4.3 COLP.................................................................................................................................................4-8
4.4.4 COLR ................................................................................................................................................4-8
4.5 Data Configuration ......................................................................................................................................4-9
4.5.1 Configuring Data at the MSOFTX3000 Side ....................................................................................4-9
4.5.2 Configuring Data at the HLR Side .................................................................................................. 4-11
4.6 Service Management ................................................................................................................................. 4-11
4.6.1 Opreations by Carriers..................................................................................................................... 4-11
4.6.2 Operations by Mobile Subscribers .................................................................................................. 4-11
4.7 Service Interaction.....................................................................................................................................4-12
4.7.1 CLIP ................................................................................................................................................4-12
4.7.2 CLIR................................................................................................................................................4-13
4.7.3 COLP...............................................................................................................................................4-13
4.7.4 COLR ..............................................................................................................................................4-14
4.8 Reference...................................................................................................................................................4-14
4.8.1 Protocols and Specifications ...........................................................................................................4-14
4.8.2 Acronyms and Abbreviations ..........................................................................................................4-15
5.7.1 CW ..................................................................................................................................................5-16
5.7.2 CH ...................................................................................................................................................5-17
5.8 Service Interaction.....................................................................................................................................5-18
5.8.1 CW ..................................................................................................................................................5-18
5.8.2 CH ...................................................................................................................................................5-19
5.9 Reference...................................................................................................................................................5-19
5.9.1 Protocols and Specifications ...........................................................................................................5-19
5.9.2 Acronyms and Abbreviations ..........................................................................................................5-19
10 Authentication Feature..........................................................................................................10-1
10.1 Service Description .................................................................................................................................10-2
10.1.1 Function Code ...............................................................................................................................10-2
10.1.2 Definition ......................................................................................................................................10-2
10.1.3 Benefits .........................................................................................................................................10-2
10.2 Availability ..............................................................................................................................................10-3
10.2.1 Requirements for NEs ...................................................................................................................10-3
10.2.2 Requirements for License..............................................................................................................10-3
10.2.3 Applicable Versions.......................................................................................................................10-3
10.3 Working Principle....................................................................................................................................10-3
10.4 Service Flow............................................................................................................................................10-4
10.4.1 UMTS Authentication ...................................................................................................................10-4
10.4.2 GSM Authentication......................................................................................................................10-5
10.5 Data Configuration ..................................................................................................................................10-7
10.5.1 Data Configuration on MSOFTX3000 ..........................................................................................10-7
10.5.2 Data Configuration on HLR ..........................................................................................................10-7
10.6 Service Management ...............................................................................................................................10-7
10.6.1 Subscription of Authentication ......................................................................................................10-7
10.6.2 Query of Authentication ................................................................................................................10-7
10.7 Reference.................................................................................................................................................10-7
10.7.1 Protocols and Specifications .........................................................................................................10-7
10.7.2 Glossary, Acronyms and Abbreviations.........................................................................................10-8
15 IP Fax Feature..........................................................................................................................15-1
15.1 Service Description .................................................................................................................................15-2
15.2 Working Principle....................................................................................................................................15-2
15.3 Benefits....................................................................................................................................................15-2
15.3.1 To Carriers.....................................................................................................................................15-2
15.3.2 To Mobile Subscribers...................................................................................................................15-2
15.4 Availability ..............................................................................................................................................15-2
15.4.1 Application ....................................................................................................................................15-2
15.4.2 Requirements for Software............................................................................................................15-3
15.4.3 Requirements for Hardware ..........................................................................................................15-3
15.5 Service Flow............................................................................................................................................15-3
15.5.1 Classification of Call Model..........................................................................................................15-3
15.5.2 Processing Flow ............................................................................................................................15-3
15.6 Data Configuration ..................................................................................................................................15-7
15.6.1 Configuring Data at the MSOFTX3000 Side ................................................................................15-7
15.6.2 Data Configuration Example.........................................................................................................15-9
15.7 Service Management .............................................................................................................................15-10
15.8 Charging and CDR ................................................................................................................................15-10
15.9 Service Interaction.................................................................................................................................15-10
23 IMSI-Based Announcement.................................................................................................23-1
23.1 Service Description .................................................................................................................................23-3
23.1.1 Function Code ...............................................................................................................................23-3
23.1.2 Definition ......................................................................................................................................23-3
23.1.3 System Specifications....................................................................................................................23-3
23.1.4 Benefits .........................................................................................................................................23-3
23.1.5 Application Scenario .....................................................................................................................23-4
23.1.6 Application Limitations.................................................................................................................23-4
23.2 Availability ..............................................................................................................................................23-4
23.2.1 Requirements for NEs ...................................................................................................................23-4
23.2.2 Requirements for License..............................................................................................................23-4
23.2.3 Applicable Versions.......................................................................................................................23-4
23.2.4 Others ............................................................................................................................................23-5
23.3 Working Principle....................................................................................................................................23-5
23.3.1 Functions of the NEs .....................................................................................................................23-5
23.3.2 Internal Processing of the System .................................................................................................23-5
24 IP over E1 .................................................................................................................................24-1
24.1 Service Description .................................................................................................................................24-2
24.1.1 Function Code ...............................................................................................................................24-2
24.1.2 Definition ......................................................................................................................................24-2
24.1.3 System Specifications....................................................................................................................24-2
24.1.4 Benefits .........................................................................................................................................24-2
24.1.5 Application Scenario .....................................................................................................................24-3
24.1.6 Application Limitations.................................................................................................................24-3
24.2 Availability ..............................................................................................................................................24-4
24.2.1 Requirements for NEs ...................................................................................................................24-4
24.2.2 Requirements for License..............................................................................................................24-4
24.2.3 Applicable Versions.......................................................................................................................24-4
24.2.4 Others ............................................................................................................................................24-4
24.3 Working Principle....................................................................................................................................24-4
24.3.1 Functions Provided by NEs...........................................................................................................24-4
24.3.2 Internal Processing Flow of the System ........................................................................................24-5
24.3.3 External Interfaces.........................................................................................................................24-7
24.4 Service Flow............................................................................................................................................24-8
24.4.1 Inter-Office Call Flow Based on IP over E1..................................................................................24-8
24.4.2 Cross-MGW Call Flow Based on IP over E1 ..............................................................................24-10
24.5 Data Configuration ................................................................................................................................ 24-11
24.5.1 Overview of Data Configuration ................................................................................................. 24-11
31 Call Simulation.......................................................................................................................31-1
31.1 Service Description .................................................................................................................................31-2
31.1.1 Function Code ...............................................................................................................................31-2
40 BICC and ISUP Route Allowed for the Same Office Direction....................................40-1
40.1 Service Description .................................................................................................................................40-2
40.1.1 Function Code ...............................................................................................................................40-2
40.1.2 Definition ......................................................................................................................................40-2
40.1.3 Standard Compliance ....................................................................................................................40-3
40.1.4 System Specifications....................................................................................................................40-3
40.1.5 Benefits .........................................................................................................................................40-4
40.1.6 Application Scenario .....................................................................................................................40-4
40.1.7 Application Limitations.................................................................................................................40-5
40.2 Availability ..............................................................................................................................................40-6
40.2.1 Requirements for NEs ...................................................................................................................40-6
40.2.2 Requirements for License..............................................................................................................40-6
40.2.3 Supporting Versions ......................................................................................................................40-6
Figures
Figure 1-1 Networking model of the call from a mobile subscriber to a fixed line subscriber.........................1-8
Figure 1-2 Flow of the call from a mobile subscriber to a fixed line subscriber (1).........................................1-9
Figure 1-3 Flow of the call from a mobile subscriber to a fixed line subscriber (2).......................................1-10
Figure 1-4 Flow of the call from a fixed line subscriber to a mobile subscriber ............................................1-13
Figure 1-5 Networking model of a call from a mobile subscriber to another mobile subscriber....................1-15
Figure 1-6 Flow of the call from a mobile subscriber to another mobile subscriber (1).................................1-16
Figure 1-7 Flow of the call from a mobile subscriber to another mobile subscriber (2).................................1-17
Figure 1-8 Flow of the call from a mobile subscriber to another mobile subscriber (3).................................1-18
Figure 1-9 Process of generating CDRs when the mobile caller and callee are under the same VMSC ........1-23
Figure 1-10 Process of generating CDRs when the mobile caller and callee are under different VMSCs .....1-23
Figure 1-11 Process of generating CDRs when a mobile subscriber calls a fixed line subscriber..................1-23
Figure 1-12 Process of generating CDRs when a fixed line subscriber calls a mobile subscriber .................1-24
Figure 1-13 Process of generating CDRs when the mobile caller and callee are in different wireless networks
.........................................................................................................................................................................1-25
Figure 2-1 Location of the SMC in a mobile network......................................................................................2-5
Figure 2-2 MAP_SEND_ROUTING_INFO_FOR_SM flow...........................................................................2-7
Figure 3-4 CFU service flow for a call forwarded to a mobile subscriber........................................................3-8
Figure 3-5 NDUB service flow for a call forwarded to a PSTN subscriber .....................................................3-9
Figure 3-6 UDUB service flow for a call forwarded to a PSTN subscriber ...................................................3-10
Figure 3-7 NDUB service flow for a call forwarded to a mobile subscriber .................................................. 3-11
Figure 3-8 UDUB service flow for a call forwarded to a mobile subscriber ..................................................3-12
Figure 3-9 CFNRy service flow for a call forwarded to a PSTN subscriber ..................................................3-13
Figure 3-10 CFNRy service flow for a call forwarded to a mobile subscriber. ..............................................3-14
Figure 3-11 CFNRc service flow for call forwarded to a PSTN subscriber ...................................................3-16
Figure 3-12 CFNRc service flow for the mobile forwarded-to subscriber .....................................................3-17
Figure 3-13 Charging of the call forwarding services ....................................................................................3-22
Figure 4-1 CLIP service flow ...........................................................................................................................4-6
Figure 4-2 CLIR service flow...........................................................................................................................4-7
Figure 4-3 COLP service flow..........................................................................................................................4-8
Figure 18-2 Processing flow of SMS notification for call failure generated in the VMSC ............................18-6
Figure 18-3 Triggering point of SMS notification for call failure in the GMSC ............................................18-7
Figure 18-4 Triggering point of SMS notification for call failure in the VMSC ............................................18-8
Figure 18-5 Processing flow after SMS notification for call failure is triggered............................................18-9
Figure 19-1 Synchronization relationship between the NTP server, BAM server, and the host.....................19-4
Figure 19-2 Time icon of Windows2000 operating system ............................................................................19-5
Figure 19-3 Adjusting clock for daylight saving changes...............................................................................19-6
Figure 20-1 Patch operation flow ...................................................................................................................20-5
Figure 21-1 Sketch of the active and the standby areas..................................................................................21-4
Figure 21-2 Illustration of state transition during configuration rollback.......................................................21-5
Figure 21-3 State transition of data in the standby area..................................................................................21-7
Figure 22-1 CAP message flow of the CAMEL4 third-party call ..................................................................22-8
Figure 22-2 CAP message flow of the IN RBT ............................................................................................22-10
Figure 22-3 CAP message flow of the simultaneous ringing with C answering the call first....................... 22-11
Figure 22-4 CAP message flow of the simultaneous ringing with B answering the call first.......................22-12
Figure 22-5 NC failure in the CAMEL4.......................................................................................................22-23
Figure 23-1 International roaming subscriber originates a call and the callee is power-off (the GMSC server
and VMSC server are combined) ....................................................................................................................23-6
Figure 23-2 Service flow in the case of an abnormal call...............................................................................23-7
Figure 23-3 Table query flow in the IMSI-based announcement service .....................................................23-12
Figure 26-1 Internal processing of system when the sending of short message is allowed by the SCP .........26-5
Figure 26-2 Internal processing of system when the sending of short message is prohibited by the SCP .....26-6
Figure 26-3 Service flow when the sending of short message is allowed by the SCP....................................26-8
Figure 26-4 Service flow when the sending of short message is prohibited by the SCP..............................26-10
Figure 26-5 Procedure for querying the table to obtain the O-CSI SMS processing information ................26-15
Figure 26-6 Procedure for querying the table to obtain the location number in the INITIAL-DP message .26-16
Figure 27-1 Call flow when a narrowband trunk connects to a BICC trunk ..................................................27-4
Figure 27-2 Call flow when a narrowband trunk connects to a narrowband trunk (crossing multiple IP
gateways).........................................................................................................................................................27-5
Figure 27-3 Call flow when the access side connects to a BICC trunk (TS61) ..............................................27-6
Figure 27-4 Call flow when the access side connects to a narrowband trunk (crossing multiple IP gateways)
.........................................................................................................................................................................27-7
Figure 27-5 Call flow when the access side connects to a BICC trunk (TS62) ..............................................27-8
Figure 27-6 Service flow when a narrowband trunk connects to a BICC trunk (voice service switching to fax
service) ..........................................................................................................................................................27-10
Figure 27-7 Service flow when a narrowband trunk connects to a narrowband trunk (crossing multiple IP
gateways) (TS61) .......................................................................................................................................... 27-11
Figure 27-8 Service flow when the access side connects to a BICC trunk (using IP bearer between offices)
(TS61) ...........................................................................................................................................................27-13
Figure 27-9 Service flow when the access side connects to a BICC trunk (TS62).......................................27-14
Figure 30-1 Processing of the NEs for the alarm for malicious short messages service ................................30-5
Figure 30-2 Process of the alarm for malicious short messages .....................................................................30-6
Figure 31-1 Example of the BAM log ............................................................................................................31-7
Figure 31-2 Detailed query result .................................................................................................................31-12
Figure 31-3 Specifying the querying conditions...........................................................................................31-12
Figure 31-4 Displayed query result ..............................................................................................................31-13
Figure 31-5 Call simulation node .................................................................................................................31-13
Figure 31-6 Specifying call simulation related parameters. .........................................................................31-14
Figure 31-7 Message output format..............................................................................................................31-14
Figure 31-8 Shortcut menu in the output pane..............................................................................................31-16
Figure 32-1 Flow of the intra-MSC handover ................................................................................................32-6
Figure 32-2 Flow of the inter-MSC handover ................................................................................................32-6
Figure 32-3 Intra-MSC load-based handover from 3G to 2G system.............................................................32-7
Figure 35-3 Flow of the dialing test on the designated TDM circuit for the trunk outgoing call from the MS to
the PSTN .........................................................................................................................................................35-6
Figure 35-4 Message flow of the dialing test on the designated TDM circuit for the intra-office call ...........35-8
Figure 36-1 Transiting a call out after caller IN service invoked in the local office.......................................36-6
Figure 36-2 Callee IN service invoked in the local office for a trunk incoming call......................................36-7
Figure 36-3 WIN user calling fixed user ........................................................................................................36-8
Figure 36-4 WIN user calling other MSC user without acquiring roaming number in the local office..........36-9
Figure 36-5 WIN user calling other MSC user with acquiring roaming number in the local office.............36-10
Figure 36-6 Fixed user calling WIN user ..................................................................................................... 36-11
Figure 36-7 Other MSC user calling WIN user ............................................................................................36-12
Figure 36-8 Special flow of the number regulation ......................................................................................36-13
Figure 37-1 Flow of the ADD service ............................................................................................................37-4
Figure 37-2 ADD message flow .....................................................................................................................37-5
Figure 37-3 Table query flow of the ADD service........................................................................................37-10
Figure 38-4 Table query flow of noise suppression service (Support noise removing benefit peer end) ..... 38-11
Figure 39-1 TDM circuit selection based on the service type ........................................................................39-4
Figure 40-1 Current networking of China Mobile..........................................................................................40-3
Tables
Table 1-1 Function names and function codes in the speech service ................................................................1-2
Table 1-2 Definitions of functions in the speech service ..................................................................................1-2
Table 1-3 Benefits for carriers and mobile subscribers.....................................................................................1-4
Table 2-5 Interaction between the SMS and other services ............................................................................2-16
Table 3-1 Function code....................................................................................................................................3-2
Table 3-2 Definitions of the call forwarding services .......................................................................................3-2
Table 4-9 Interactions between the COLP service and other services ............................................................4-13
Table 4-10 Interactions between the COLR service and other services..........................................................4-14
Table 5-1 Name and code of the function .........................................................................................................5-2
Table 7-4 Operation modes of the call barring supplementary services .........................................................7-13
Table 9-1 Name and function code of the ODB services ..................................................................................9-2
Table 9-2 NEs related with the ODB services ..................................................................................................9-4
Table 9-3 Versions that support the ODB services............................................................................................9-5
Table 9-4 Service interaction between ODB and other services .......................................................................9-7
Table 10-1 Function names and functions codes in the authentication and encryption ..................................10-2
Table 10-2 Benefits for carriers and mobile subscribers.................................................................................10-2
Table 10-3 NEs involved in the authentication and encryption ......................................................................10-3
Table 10-4 Versions of the products that support the authentication and encryption......................................10-3
Table 11-1 Name and code of the function ..................................................................................................... 11-2
Table 11-2 Beneficiaries and description of the benefits ................................................................................ 11-4
Table 11-3 NEs required by the enhanced MSRN allocation service ............................................................. 11-4
Table 11-4 Applicable versions of HUAWEI wireless core network products ............................................... 11-5
Table 18-6 Script for adding the content of SMS notification for call failure............................................... 18-11
Table 18-7 Script for configuring the processing for SMS notification for call failure ................................ 18-11
Table 19-1 Name and function code of the summer time feature ...................................................................19-2
Table 19-2 NEs related to the summer time feature of the wireless time zone ...............................................19-3
Table 19-3 Versions that support the summer time feature of the wireless time zone ....................................19-3
Table 20-1 Network elements concerning with version software management features ................................20-3
Table 20-2 Applicable versions for the version software management features .............................................20-3
Table 20-3 MML command table for patch management ...............................................................................20-7
Table 21-1 Feature name and function code ...................................................................................................21-2
Table 21-2 Benefits of the configuration rollback feature ..............................................................................21-3
Table 21-3 Applicable versions that support the configuration rollback feature.............................................21-3
Table 21-4 Tables that support configuration rollback....................................................................................21-9
Table 21-5 List of configuration rollback commands ...................................................................................21-10
Table 21-6 Synchronization and forcible synchronization commands..........................................................21-14
Table 21-7 Activation and forcible activation commands.............................................................................21-17
Table 21-8 Rollback and forcible rollback commands..................................................................................21-19
Table 21-9 Cancellation and confirmation commands..................................................................................21-21
Table 25-2 Earliest version that implements the IP QoS flow control ............................................................25-4
Table 25-3 Software parameter setting for QoS flow control function .........................................................25-12
Table 26-1 Function code................................................................................................................................26-2
Table 26-2 Benefits of the O-CSI SMS service ..............................................................................................26-2
Table 26-3 NEs required to implement the O-CSI SMS .................................................................................26-3
Table 26-4 Versions of Huawei core network products that support the O-CSI SMS ....................................26-3
Table 26-5 Parameters in the Initial-DP message ...........................................................................................26-7
Table 26-6 Logical relationship to determine whether to allow the triggering of the O-CSI..........................26-9
Table 26-7 Parameter description of ADD SMOCSI .................................................................................... 26-11
Table 26-8 Parameter description of ADD LAIGCI (2G).............................................................................26-12
Table 26-9 Parameter description of ADD LAISAI (3G) .............................................................................26-13
Table 26-10 Tables related to the O-CSI SMS ..............................................................................................26-15
Table 26-11 interactions between the O-CSI SMS and other services..........................................................26-18
Table 30-4 Versions of the Huawei CS products that support the alarm for malicious short messages .........30-3
Table 30-5 Commands involved in the alarm for malicious short messages ..................................................30-7
Table 31-1 Definitions of the functions ..........................................................................................................31-2
Table 33-1 Function name and function code in the union subscriber trace ...................................................33-2
Table 33-2 Movements of mobile subscribers ................................................................................................33-2
Table 33-3 Benefits for carriers ......................................................................................................................33-3
Table 33-4 NEs required to implement the union subscriber trace service .....................................................33-4
Table 33-5 Version of the Huawei UMTS products that support the union subscriber trace service ..............33-4
Table 33-6 Related tables of the union subscription trace.............................................................................33-12
Table 34-6 Commands to set cell and location area relationship .................................................................. 34-11
Table 34-7 Commands to add ZC .................................................................................................................34-13
Table 34-8 Commands to edit location group ...............................................................................................34-14
Table 35-4 Versions of the Huawei UMTS products that support the dialing test on the designated TDM circuit
.........................................................................................................................................................................35-4
Table 35-5 Related software parameters .......................................................................................................35-10
Table 36-1 Function name and function code in the IN service performance measurement enhancement.....36-3
Table 36-2 System specifications....................................................................................................................36-3
Table 36-3 Benefits for carriers ......................................................................................................................36-4
Table 36-4 NEs required to implement the IN service performance measurement enhancement...................36-4
Table 36-5 Version of the Huawei UMTS products that support the IN service performance measurement
enhancement....................................................................................................................................................36-5
Table 36-6 Operation modes of the IN performance measurement enhancement ........................................36-18
Table 37-1 Name and code of the function .....................................................................................................37-2
Table 37-2 Beneficiaries and description of the benefits of the ADD service ................................................37-2
Table 37-3 Network elements involved in the ADD service...........................................................................37-3
Table 37-4 Versions supported by the ADD service........................................................................................37-3
Table 37-5 Operations of data configuration at the MSOFTX3000................................................................37-7
Table 37-6 Name and function of tables related to the ADD service..............................................................37-9
Table 37-7 Operation modes of the ADD service ......................................................................................... 37-11
Table 38-1 Function code of the noise suppression feature ............................................................................38-2
Table 39-2 The version of the Huawei UMTS CS product that supports TDM circuit selection based on service
type..................................................................................................................................................................39-4
Table 40-1 Function code of the BICC and ISUP route allowed for the same office direction service ..........40-2
Table 40-2 Key parameter used in this service ...............................................................................................40-3
Table 40-3 Benefits of the BICC and ISUP route allowed for the same office direction service....................40-4
Table 40-4 NE required to implement this service..........................................................................................40-6
Table 40-5 Version of Huawei MSOFTX3000 that supports the service ........................................................40-6
Contents
Purpose
The manual introduces the features of V100R005C10 of HUAWEI MSOFTX3000 Mobile
SoftSwitch Center (hereinafter referred to as MSOFTX3000). This manual describes the
definition, realization principle, service flow, data configuration and service interaction of
each feature.
The manual introduces the features of V100R005C10 of the MSOFTX3000. In this way,
audiences can use the MSOFTX3000 more easily.
Related Versions
The following table lists the product versions related to this document.
MSOFTX3000 V100R005C10
Intended Audience
This document is intended for:
z Market technical personnel
z Telecommunications management personnel
z Mobile network system engineer
Organization
This document consists of thirty seven chapters is organized as follows.
Chapter Content
Chapter Content
Chapter Content
Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
General Conventions
Convention Description
Command Conventions
Convention Description
Convention Description
GUI Conventions
Convention Description
Keyboard Operation
Format Description
Key Press the key. For example, press Enter and press Tab.
Key 1+Key 2 Press the keys concurrently. For example, pressing
Ctrl+Alt+A means the three keys should be pressed
concurrently.
Key 1, Key 2 Press the keys in turn. For example, pressing Alt, A means
the two keys should be pressed in turn.
Mouse Operation
Action Description
Update History
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Contents
Figures
Figure 1-1 Networking model of the call from a mobile subscriber to a fixed line subscriber ..........................1-8
Figure 1-2 Flow of the call from a mobile subscriber to a fixed line subscriber (1) ..........................................1-9
Figure 1-3 Flow of the call from a mobile subscriber to a fixed line subscriber (2) ........................................1-10
Figure 1-4 Flow of the call from a fixed line subscriber to a mobile subscriber ..............................................1-13
Figure 1-5 Networking model of a call from a mobile subscriber to another mobile subscriber .....................1-15
Figure 1-6 Flow of the call from a mobile subscriber to another mobile subscriber (1) ..................................1-16
Figure 1-7 Flow of the call from a mobile subscriber to another mobile subscriber (2) ..................................1-17
Figure 1-8 Flow of the call from a mobile subscriber to another mobile subscriber (3) ..................................1-18
Figure 1-9 Process of generating CDRs when the mobile caller and callee are under the same VMSC ..........1-23
Figure 1-10 Process of generating CDRs when the mobile caller and callee are under different VMSCs.......1-23
Figure 1-11 Process of generating CDRs when a mobile subscriber calls a fixed line subscriber ...................1-23
Figure 1-12 Process of generating CDRs when a fixed line subscriber calls a mobile subscriber ...................1-24
Figure 1-13 Process of generating CDRs when the mobile caller and callee are in different wireless networks
...........................................................................................................................................................................1-25
Tables
Table 1-1 Function names and function codes in the speech service..................................................................1-2
Table 1-2 Definitions of functions in the speech service ....................................................................................1-2
Table 1-3 Benefits for carriers and mobile subscribers.......................................................................................1-4
1 Speech Service
Section Describes
1.1 Service The function code, function definition of this feature, and the benefits
Description that carriers and mobile subscribers can obtain from this feature.
1.2 Availability The network elements (NEs) that are required for the feature, whether
Licenses are required, and the version requirements of the NEs.
1.3 Working The functions of the NEs, and networking requirements.
Principle
1.4 Service Flow The service flow of the network when providing this feature.
1.5 Data The data configurations that are required on the MSOFTX3000 and
Configuration the UMG8900.
1.6 Service The service operations that carriers and mobile subscribers are
Management required to implement when the network provides this feature.
1.7 Charging and The charging and the generation of CDRs when the network provides
CDR this feature.
1.8 Service The relationships and restrictions between this feature and other
Interaction services or features.
1.9 Reference The protocols and specifications that this feature must comply with,
and the acronyms and abbreviations of this chapter.
Table 1-1 Function names and function codes in the speech service
Name Code
Telephony WMFD-010101
Emergency call WMFD-010102
Emergency call for special service WMFD-010103
1.1.2 Definition
The speech service is the elementary feature of a telecom network. The service consists of the
functions such as telephony, emergency call, and emergency call for special service.
Table 1-2 lists the definitions of these functions.
Name Definition
Emergency call for special When a mobile subscriber dials an emergency number for a
service special service, the call is connected to a corresponding
special service center that is nearest to the base station. The
special service center consists of the fire alarm center, bandit
alarm center, first-aid center and traffic center. Such kind of
call can generate alarms. Carriers can decide whether to
charge the subscriber.
NOTE
The difference between the emergency call for special service
function and the emergency call function is that: When a CM service
is required, the emergency call for a special service is considered as
an ordinary call. The MSC processes the number as a special service
number after analyzing the number. While for the emergency call
function, there is a parameter indicating that this is an emergency call.
Note
PSTN = public switched telephone network; ISDN = integrated services digital network;
PLMN = public land mobile network; SIM = subscriber identity module;
USIM = UMTS Subscriber identity module
The call involved in the speech service can be classified into mobile originated call (MOC)
and mobile terminated call (MTC), depending on the role of a mobile subscriber in a call.
MOC
If a mobile subscriber makes a call, this call is an MOC.
In an MOC, the MSC server/visitor location register (VLR) and media gateway (MGW)
perform the following functions:
z Security control
This step is optional. If you do not select it, the MSC server/VLR and MGW directly
perform the following functions:
z Creating a user panel bearer at the caller side
z Checking subscription data
z Pointing to the route of the call to the destination
MTC
If a mobile subscriber receives a call, the call is an MTC.
In the universal mobile telecommunications system (UMTS), all network elements (NEs)
cooperate with each other to route the call to the mobile subscriber.
During the setup of an MTC, the designated MSC server queries the location information of
the callee in the home location register (HLR) to which the callee belongs, because only the
HLR stores such information. If the caller is also a mobile subscriber, the MSC server/VLR to
which the caller belongs initiates the query. If the caller is a fixed line subscriber, the gateway
mobile switching center (GMSC) server initiates the query.
1.1.3 Benefits
Table 1-3 lists the benefits for carriers and mobile subscribers.
1.2 Availability
1.2.1 Requirements for NEs
The speech service requires the cooperation of the user equipment (UE)/mobile station (MS),
NodeB/base transceiver station (BTS), radio network controller (RNC)/base station controller
(BSC), and core network (CN). For details, see Table 1-4.
√ √ √ √ √ √ √ √
Table 1-5 Versions of the products that support the speech service
1.3.1 MOC
The processing of the MSC/VLR to an MOC consists of the following aspects:
z MOC initiation
z MOC completion
MOC Initiation
MOC initiation is triggered by the Service request sent from the MS to the MSC/VLR over a
radio access network (RAN). Based on the Service request, the following services are
processed in MOC initiation:
z Telephone call and data call
z Emergency call
z Input controlled by subscribers
z Short message
The security function is enabled in MOC initiation, based on the Service request. This means
that the MSC server/VLR performs authentication, encryption/decryption, and/or temporary
mobile subscriber identity (TMSI) reassignment. This function, however, can also not be
enabled.
z Authentication
The authentication function defines whether a mobile subscriber is authorized to access
the PLMN. The function prevents invalid subscribers from using the services that the
network provides.
In the GSM and UMTS, the MS/UE, VLR/serving GPRS support node (SGSN) and
HLR/authentication center (AuC) cooperate with each other to implement authentication.
The MS and AuC calculate authentication parameters respectively. Then the VLR/SGSN
compares the two results, to verify the validity of the MS/UE.
In the UMTS, the UE can also verify the validity of the network.
z Encryption/Decryption
In the UMTS, cipher key (CK) guarantees the confidentiality of access data. Secret
signaling information and data information are encrypted. That is, logical channels are
encrypted. Integrity key (IK) guarantees the integrity of signaling data.
CK and IK are stored in the USIM and VLR/SGSN, and sent from the VLR/SGSN to the
RNC with the security mode command. This helps to encrypt channels. The USIM can
also send the CK and IK to the UE based on the requirements of the UE. That is, the UE
stores a copy of the CK and IK. The VLR/SGSN must update the CK and IK at least
once a day.
In the GSM, encryption/decryption guarantees the information exchange through the
wireless interface. Therefore, the MS and base station subsystem (BSS) are loaded with
the same CK.
z TMSI reassignment
The MSC server/VLR assigns a TMSI to a mobile subscriber periodically. This function
is to prevent intruders from monitoring the signaling on wireless channels and
identifying mobile subscribers. To guarantee the confidentiality, TMSI is reassigned at
the right time.
When a subscriber makes an emergency call without a SIM/USIM, international mobile
station equipment Identity (IMEI), instead of TMSI or IMSI, is used to identify the
subscriber. This means that the MSC server/VLR does not perform authentication,
encryption/decryption and TMSI reassignment.
z Call setup between the calling MS/UE and the visited MSC server
After the service acceptance message is received or the encryption is complete, the MS
sends a Setup message to the visited MSC (VMSC) server. Then the VMSC server
returns a Call Proceeding message to the calling MS/UE.
z Setup of a user panel bearer at the caller side
The MSC server sends a Prepare Bearer request to the MGW, which assigns
asynchronous transfer mode (ATM) resources dynamically. The MSC server then sends a
Radio Access Bearer (RAB) Assignment message to the radio network subsystem –
originated (RNS-O). The RNS-O creates the ATM bearer resources at the access side
together with the MGW through bearer establishment.
MOC Completion
The MSC/VLR checks subscription data and service compatibility. If the check is passed, the
Connection request from the mobile subscriber is accepted. Then the originating MSC/VLR
assigns service channels and occupies ground circuits, to continue the call.
1.3.2 MTC
An MTC is generated when a subscriber in the PSTN/ISDN/PLMN dials the MSISDN of a
mobile subscriber. The processing for the MTC consists of the following aspects:
z Route information query
z MTC initiation and completion
1.3.3 MMC
A mobile-to-mobile call (MMC) is between two mobile subscribers. An MMC can be
considered as an MOC plus an MTC. The MOC takes place first, followed by the MTC. The
originating MSC/VLR initiates and completes the MOC. The service MSC/VLR initiates and
completes the MTC. The originating MSC/VLR also queries the route to the MS/UE.
If the two mobile subscribers register with the same MSC/VLR and all service channels are
exchanged in the same MSC/VLR, the service MSC/VLR initiates and completes the MOC
and MTC. The service MSC/VLR queries the information of the callee in the HLR.
Figure 1-1 Networking model of the call from a mobile subscriber to a fixed line subscriber
MSC server/VLR
RNS-O
MGW PSTN
The flow of the call from a mobile subscriber to a fixed line subscriber consists of the
following aspects:
z Authentication for the access of the caller
z Creation of a user panel bearer at the caller side
z Conversation between the MS/UE and a fixed line subscriber
z Call disconnection
Figure 1-2 and Figure 1-3 show the flow of the call from a mobile subscriber to a fixed line
subscriber.
Figure 1-2 Flow of the call from a mobile subscriber to a fixed line subscriber (1)
MAP_SEND_AUTHENTICATION_INFO
MAP_SEND_AUTHENTICATION_
INFO_ACK
COMMON ID
CM_SERVICE_ACCEPT
SETUP
CALL PROCEEDING
PREP BEARER
PREP BEARER
RAB ASSIGNMENT
REQUEST
Creation of a user RADIO BEARER
panel bearer at SETUP
the caller side RADIO BEARER
SETUP COMPLETE
BEARER ESTABLISHMENT
RAB ASSIGNMENT
RESPONSE
RESERVE CIRCUIT
RESERVE CIRCUIT
Figure 1-3 Flow of the call from a mobile subscriber to a fixed line subscriber (2)
IAI
ACM
ALERTING
ANC
CONNECT
CONNECT ACK
Conversation
DISCONNECT
CLF
RELEASE
RELEASE COMPLETE
RLG
IU_RELEASE_COMM
AND
Call
disconnection
BEARER RELEASE
IU_RELEASE_COMPL
ETE
RELEASE_TERM
RELEASE_TERM
RELEASE_TERM
RELEASE_TERM
− MOC creation
− Emergency call creation
− Short message service
− Supplementary service
− Location service
CKSN stands for ciphering key sequence number.
2. The network may initiate authentication and encryption. During the process, the network
may obtain authentication set from the HLR/AuC. The MSC/VLR must send a
Command ID message to the RNS on not identifying the TMSI of the UE, to obtain the
IMSI of the UE.
Step 3 takes place immediately after step 1 if there is no security management, which
consists of authentication, encryption, TMSI reassignment and identity obtaining.
3. After the service acceptance message is received or the encryption is complete, the UE
sends a Setup message to the VMSC server.
4. After receiving the Setup message, the VMSC server returns a Call Proceeding message
to the calling UE.
5. A user panel bearer begins to be created at the caller side.
The VMSC server sends a Prepare Bearer request to the MGW. The MGW assigns ATM
resources dynamically and sends a Prepare Bearer response containing TerminationId
(T1). The MSC server then sends an RAB Assignment message to the RNS-O. The
RNS-O creates the ATM bearer resources at the access side together with the MGW
through bearer establishment.
6. The GMSC server sends an Initial Address Message with Information (IAI) message to
the PSTN.
7. The PSTN returns an Address Complete Message (ACM) message after receiving the
IAI message, and sends the ringback tone for the calling MSC.
8. After the callee hangs up, the called UE sends an ANC message to the network side. The
PSTN stops sending the ringback tone. The caller and callee begin to talk on the phone.
9. If the caller hangs up first, the calling UE sends a Disconnect message to the GMSC
server.
10. The GMSC server sends a Clear Forward Signal (CLF) message to the PSTN and
instructs it to disconnect the connection.
11. The PSTN returns a Release Guard Signal (RLG) message to the GMSC server after
disconnecting the connection.
12. The GMSC server releases transaction resources by sending a Release message to the
calling UE.
13. The calling UE sends a Release Complete response after receiving the Release message.
14. The GMSC server releases resources on the user panel after sending two Release
Termination messages to the MGW.
The two messages are sent through the Iu interface and ISDN User Part (ISUP) trunk
respectively.
Figure 1-4 Flow of the call from a fixed line subscriber to a mobile subscriber
IAI(TUP)
SRI
MAP_PROVIDE_ROAMING_NUMBER
MAP_PROVIDE_ROAMING_NUMBER_ACK
SRI ACK
IAI(TUP)
PAGING
PAGING
PAGE RESPONSE
AUTHENTICATION REQUEST
AUTHENTICATION RESPONSE
COMMON ID
CALL CONFIRMED
PREPARE BEARER
PREPARE BEARER
RAB ASSIGNMENT
RADIO BEARER
REQUEST
SETUP
RADIO BEARER
SETUP COMPLETE
BEAR ESTABLISHMENT
RAB ASSIGNMENT
RESPONSE
ALERTING ACM
SENT TONE
SENT TONE
CONNECT ANC
STOP TONE
STOP TONE
CALL
DISCONNECT
CLF
RELEASE
RLG
RELEASE COMPLETE
IU RELEASE COMMAND
BEARER RELEASE
IU RELEASE COMPLETE
RELEASE_TERM
RELEASE_TERM
RELEASE_TERM
RELEASE_TERM
1. The PSTN subscriber sends an IAI message containing the MSISDN of the callee to the
GMSC server.
2. The GMSC server determines the HLR that the callee belongs to by analyzing the
MSISDN. The GMSC creates a signaling connection to the HLR and sends a request for
routing.
3. After receiving the request, the HLR checks the subscription data of the callee, and finds
the VLR and MSC server to which the callee currently belongs.
4. The HLR creates a signaling connection to the VLR based on the VLR number, and
requests the MSRN of the callee.
5. The VLR sends the MSRN of the callee to the HLR after finding the number.
6. The HLR forwards the MSRN to the GMSC server.
7. The GMSC server sends the IAI message to the VMSC server/VLR based on the MSRN.
8. The VMSC server/VLR initiates paging to locate the callee after identifying the MSRN.
9. After the VMSC server receives the paging response from the called UE, step 10 takes
place immediately after step 8 if there is no requirement for authentication, encryption
and TMSI reassignment.
10. The network initiates authentication, encryption and TMSI reassignment. During the
process, the network may obtain authentication set from the HLR/AuC. The MSC/VLR
must send a Command ID message to the RNS on not identifying the TMSI of the UE, to
obtain the IMSI of the UE.
11. The VMSC server sends a Setup message to the called UE.
12. The VMSC server creates the user panel bearer after receiving the Call Confirmed
message from the called UE.
13. The MSC server sends a Prepare Bearer request to the MGW. The MGW assigns ATM
resources dynamically and sends a Prepare Bearer response containing TerminationId.
The MSC server then sends an RAB Assignment message to the RNS. The RNS creates
the ATM bearer resources at the access side together with the MGW through bearer
establishment.
14. A transmission control panel and user panel must be created during assignment. The
RAN sends the RAB Assignment response only after receiving an acknowledgement
message of the creation of the user panel.
15. The VMSC sever creates a user panel bearer at the caller side at the same time. The
callee picks up the phone.
16. The MSC server sends an ACM message to the calling UE after receiving an Alerting
message, and sends a Send Tone message to the MGW, instructing it to play the
ringback tone.
17. The called UE sends a Connect message to the MSC server after the callee picks up the
phone. The MSC server sends an ANC message to the calling UE after receiving the
Connect message from the called UE. Meanwhile, the MSC server sends a Stop Tone
message to the MGW, instructing it to stop playing the ringback tone.
18. The VMSC server forwards a Connect ACK message to the called UE after receiving the
message from the calling UE. The caller and callee begin to talk on the phone.
19. If the callee hangs up first, the called UE sends a Disconnect message to the VMSC
server. The VMSC server then sends a CLF message to the calling UE.
20. The calling UE sends an RLG message to the VMSC server after the caller hangs up.
The VMSC server releases transaction resources by sending a Release message to the
called UE.
21. The VMSC server sends an IU Release Command message on initiative, and begins to
release the resources on the signaling panel.
22. The VMSC server releases resources on the user panel after sending two Release
Termination messages to the MGW. The two messages are sent through the Iu interface
and ISUP trunk respectively.
1.4.3 MMC
Figure 1-5 shows the networking model of the call from a mobile subscriber to another mobile
subscriber. The two subscribers are both in the local office.
Figure 1-5 Networking model of a call from a mobile subscriber to another mobile subscriber
MSC server/VLR
RNS-O RNS-T
MGW
UE-O UE-T
Figure 1-6, Figure 1-7and Figure 1-8 show the flow of the call from a mobile subscriber to
another mobile subscriber.
Figure 1-6 Flow of the call from a mobile subscriber to another mobile subscriber (1)
MAP_SEND_AUTHENTICATION_INFO
MAP_SEND_AUTHENTICATION_INFO_ACK
COMMON ID
CM_SERVICE_ACCEPT
SETUP
CALL PROCEEDING
PREP BEARER
PREP BEARER
RAB ASSIGNMENT REQUEST
Creation of a user
panel bearer at RADIO BEARER SETUP
the caller side RADIO BEARER SETUP
COMPLETE
BEARER ESTABLISHMENT
Figure 1-7 Flow of the call from a mobile subscriber to another mobile subscriber (2)
MAP_SEND_ROUTING_INFORMATION
Obtaining the
MAP_PROVIDE_ROAMING_NUMBER
roaming number
MAP_PROVIDE_ROAMING_NUMBER_ACK
MAP_SEND_ROUTING_INFORMATION_AC
K PAGING
PAGING
PAGING RESPONSE
AUTHENTICATION REQUEST
Security
AUTHENTICATION RESPONSE
management
(optional)
SECURITY MODE COMMAND
COMMON ID
SETUP
CALL CONFIRMED
PREP BEARER
PREP BEARER
RAB ASSIGNMENT
REQUEST RADIO BEARER
Creation of a SETUP
user panel
RADIO BEARER
bearer at the
SETUP COMPLETE
callee side
BEARER ESTABLISHMENT
Figure 1-8 Flow of the call from a mobile subscriber to another mobile subscriber (3)
ALERTING
SENDTONE
SENDTONE
CONNECT
STOP TONE
STOP TONE
CONNECT
CONNECT ACK
DISCONNECT DISCONNECT
RELEASE
RELEASE COMPLETE
IU_RELEASE_COMMAND
BEARER RELEASE
IU_RELEASE_COMPLETE
RELEASE_TERM
RELEASE_TERM
RELEASE
RELEASE COMPLETE
IU_RELEASE_COMMAND
BEARER RELEASE
IU_RELEASE_COMPLETE
RELEASE_TERM
RELEASE_TERM
The MSC server is combined with the VLR. Therefore the B interface is an internal interface and the
messages through the B interface are internal messages.
Call Disconnection
1. The caller hangs up first. At this moment, the calling UE sends a Disconnect message to
the MSC server/VLR, which then forwards the message to the called UE.
2. The called UE releases transaction resources by sending a Release message to the
VMSC/GMSC, which then forwards the message to the calling UE and releases the
transaction resources.
3. The calling UE sends a Release Complete response after receiving the Release message.
Step Operation
1 Run LST ESRVCAT to list the types and numbers of emergency calls for special
services.
2 Run ADD ESRVCAT to add a type and number of an emergency call for a
special service.
3 Repeat step 2 to add more types and numbers.
The number of emergency call for special service is configured based on the local situation, when the
speech service is opened. If a number has been configured, you do not have to configure it again.
For the details on configuration steps and parameter description, see the manuals relevant to the HLR.
Figure 1-9 Process of generating CDRs when the mobile caller and callee are under the same
VMSC
A VMSC B
MOC MTC
The VMSC generates two CDRs. One is for the MOC and the charged subscriber is A. The
other is for the MTC and the charged subscriber is B.
CDR for the Call Between Two Mobile Subscribers Under Different VMSCs
A and B are mobile subscribers under two VMSCs, both of which belong to the local network.
A is the caller and B is the callee. Figure 1-10 shows the process of generating CDRs under
this condition.
Figure 1-10 Process of generating CDRs when the mobile caller and callee are under different
VMSCs
A VMSCA VMSCB B
MOC MOC
VMSC A generates a CDR for the MOC and the charged subscriber is A. VMSC B generates
a CDR for the MTC and the charged subscriber is B.
CDR for the Call from Mobile Subscriber to Fixed Line Subscriber
A is a mobile subscriber and B is a fixed line subscriber. The call from A to B involves the
GMSC. The process of call connection is as follows:
1. VMSC A routes the call from A to the tandem MSC (TMSC).
2. The TMSC forwards the call to the GMSC.
3. The GMSC forwards the call to a switch in the fixed network.
Figure 1-11 shows the process of generating CDRs under this condition.
Figure 1-11 Process of generating CDRs when a mobile subscriber calls a fixed line subscriber
VMSC A generates a CDR for the MOC and the charged subscriber is A.
The TMSC generates a transit (TRANSIT) record, which is the reference for calculating the
charge of occupied trunks in the local network.
The GMSC generates a gateway outgoing (GWO) record, which is the reference for
calculating the charge of occupied outgoing trunks between the wireless network and the
fixed network.
If the end office directly routes the call to the GMSC (without passing the TMSC), and then to
the PSTN, no TRANSIT record is generated.
The TRANSIT record and GWO record are defined by MOD GBILLCTRL. That is, TRANSIT records
can be generated not only by the TMSC, and GWO records can be generated not only by the GMSC. For
example, in practice, if an end office directly connects to a switch in another network and acts as a
gateway office, the end office can also generate GWO records after relevant data is configured.
CDR for the Call from Fixed Line Subscriber to Mobile Subscriber
A is a fixed line subscriber and B is a mobile subscriber. The call from A to B involves the
GMSC. The process of call connection is as follows:
1. The switch in the fixed network sends an IAI message to the GMSC.
2. The GMSC obtains the MSRN of B.
3. The GMSC routes the call to the TMSC after obtaining the MSRN.
4. The TMSC routes the call to the VMSC.
Figure 1-12 shows the process of generating CDRs under this condition.
Figure 1-12 Process of generating CDRs when a fixed line subscriber calls a mobile subscriber
The GMSC generates a gateway incoming (GWI) record, which is the reference for
calculating the charge of occupied incoming trunks between the fixed network and the
wireless network.
The TMSC generates a TRANSIT record, which is the reference for calculating the charge of
occupied trunks in the local network.
VMSC B generates a CDR for the MTC and the charged subscriber is B.
If the GMSC directly routes the call to the end office (without passing the TMSC), no
TRANSIT record is generated.
The roaming record, TRANSIT record and GWO record are all defined by MOD GBILLCTRL.
CDR for the Call Between Two Mobile Subscribers in Different Wireless
Networks
Subscriber B belongs to the wireless network of carrier W. Subscriber A belongs to the
wireless network of carrier Y. The switch in the network of carrier Y generates CDRs for A.
The switch in the network of carrier W generates CDRs for B. The GMSCs in the two
networks generate CDRs respectively for inter-network calculation.
The call from A to B involves GMSC 1 and GMSC 2. The process of call connection is as
follows:
1. VMSC 1 routes the call to GMSC 1.
2. GMSC 1 routes the call to GMSC 2 that is in the network of carrier W.
3. GMSC 2 routes the call to VMSC 2 after obtaining the MSRN.
Figure 1-13 shows the process of generating CDRs under this condition.
Figure 1-13 Process of generating CDRs when the mobile caller and callee are in different wireless networks
GWI
VMSC 1 generates a CDR for the MOC and the charged subscriber is A.
VMSC 2 generates a CDR for the MTC and the charged subscriber is B.
TMSC 1 generates a TRANSIT record.
GMSC 1 generates a GWO record, which is the reference for calculating the charge of
occupied outgoing trunks between the two wireless networks.
GMSC 2 generates a GWI record, which is the reference for calculating the charge of
occupied incoming trunks between the two wireless networks.
Table 1-8 Interaction between the emergency call function and other services
Services Interaction
Emergency call and CLIR If the caller subscribes to the CLIR service, the calling
number cannot be displayed on the phone of the callee.
Emergency call and ODB The ODB service does not prevent a subscriber from making
an emergency call.
Emergency call and CUG The CUG service conflicts with the emergency call service.
Note:
CLIR = calling line identification restriction; ODB = operator determined barring;
CUG = closed user group
1.9 Reference
1.9.1 Protocols and Specifications
The reference of the speech service is as follows:
3GPP TS 22.101 4.6.0
CK Cipher Key
CLIR Calling Line Identification Restriction
CUG Closed User Group
GMSC Gateway Mobile Switching Center
GSM Global System for Mobile Communications
HLR Home Location Register
IK Integrity Key
IMEI International Mobile Station Equipment Identity
IMSI International Mobile Station Identity
ISDN Integrated Services Digital Network
MOC Mobile Originated Call
Contents
Figures
Tables
Section Describes
2.1 Service Description The function code, function definition of this feature, and the
benefits that carriers and mobile subscribers can obtain from
this feature.
2.2 Availability The network elements (NEs) that are required for the feature,
whether Licenses are required, and the version requirements
of the NEs.
2.3 Working Principle The functions of the NEs, and networking requirements.
2.4 Service Flows The service flow of the network when providing this feature.
2.5 Data Configuration The data configurations that are required on the
MSOFTX3000 and the UMG8900.
2.6 Service Management The service operations that carriers and mobile subscribers
are required to implement when the network provides this
feature.
2.7 Charging and CDR The charging and the generation of CDRs when the network
provides this feature.
2.8 Service Interaction The relationships and restrictions between this feature and
other services or features.
2.9 Reference The protocols and specifications that this feature must comply
with, and the acronyms and abbreviations of this chapter.
2.1.2 Definition
The short message service (SMS) allows subscribers to send or receive information through
the short message center (SMC).The information can be texts, pictures, and voices.
"Short" means that the length of information sent in the SMS is short. A point to point (PTP)
short message (SM) can have up to 140 bytes in size, that is, 160 ASCII characters or 70
Chinese characters. A broadcast SM can have 82 bytes per page, that is, 92 ASCII characters
or 41 Chinese characters. A macro broadcast message can have up to 15 pages that are sent
continuously. The PTP SMS allows subscribers to send or receive SMs at any time. The
broadcast SMS allows subscribers to receive public information periodically and selectively.
The SMSs fall into two categories: PTP SMSs and PTM SMSs. PTM is short for point to
multipoint. The PTM SMSs mainly refers to the cell broadcast SMSs. The PTP SMSs fall into
two categories:
z SM MT service (TS21)
z SM MO service (TS22)
This chapter describes only the PTP SMSs.
Name Definition
SMC MS
report
Name Definition
SMC MS
report
2.1.3 Benefits
Beneficiary Description
Carriers The SMS can help to provide value added services, information
inquiry services, and services such as website SMS and pictures. It
also expands service types and improves the average revenue per
user (ARPU).
Beneficiary Description
Mobile subscribers The SMS can be used to send information. It can also be used to
receive information such as stock prices, weather reports, sports
news, and bank accounts. This eases information query and makes
subscribers feel closer to carriers.
2.2 Availability
2.2.1 Requirements for NEs
The SMS is implemented through the interworking between the MS/UE, the radio access
network (RAN), and the core network (CN). Table 2-1 lists the network elements (NEs) that
are required to realize the SMS.
√ √ √ √ √ √ √ √ √
MS = Mobile Station; UE = User Equipment, BTS = Base Transceiver Station; BSC = Base Station Controller; RNC = Radio
Network Controller; MSC = Mobile Switching Center; MGW = Media Gateway; SGSN = Serving GPRS Support Node; VLR =
Visitor Location Register; HLR = Home Location Register; SMC = Short Message Center
PSTN/ISDN/
PSPDN
RAN HLR
MSC/VLR: Mobile Switching Center/Visited Location Register HLR: Home Location Register
SMC: Short Message Center Infox: Infox Integrated Gateway
RAN: Radio Access Network SGSN: Serving GPRS Support Node
GGSN: Gateway GPRS Support Node PSTN: Public Switched Telephone Network
ISDN: Integrated Services Digital Network PSPDN: Packet Switched Public Data Network
In a CS core network, the NEs related to the SMS system are the MSC, VLR, SGSN, and
HLR. Table 2-3 lists the functions of the NEs in the transmission of SMs.
NE Function
MSC z After an SM is sent from the MS to the MSC through the RAN, the
MSC forwards the SM to the SMC.
z After an SM is sent from the SMC to the MSC, the MSC obtains the
routing and subscriber information from the VLR and forwards the SM
to the MS through the RAN.
NE Function
GMSC HLR
MAP_SEND_ROUTING_INFO_FOR_SM
MAP_SEND_ROUTING_INFO_FOR_SM_ACK
If the GMSC supports the general packet radio service (GPRS), the HLR may return two numbers: an
SGSN number and an MSC number. If the GMSC does not support the GPRS, the HLR returns one
number and whether the number is an SGSN number or an MSC number is determined by MOD
SMDP.
MAP_REPORT_SM_DELIVERY_STATUS
The flow is started by the GMSC to inform the HLR whether the SM sending succeeds or
fails. Figure 2-3 shows the flow.
z If the message sending succeeds, the HLR clears the MNRF and MCEF of the subscriber
and starts the Alert_Service_Centre flow to the SMC specified in the MWD list.
z If the message sending fails, the HLR saves the address of the SMC or the cause of MS
not reachable to the MWD list.
GMSC HLR
MAP_REPORT_SM_DELIVERY_STATUS
MAP_REPORT_SM_DELIVERY_STATUS _ACK
MAP_READY_FOR_SM
The flow is started by the VLR/SGSN to inform the HLR that the MS memory is ready. Upon
receipt of the message, the HLR clears the MCEF and starts the
MAP_ALERT_SERVICE_CENTRE flow to the SMC if the address of the SMC exists in the
MWD list. If the HLR detects that the MCEF and the MNFG/MNRG of the subscriber are not
enabled, which shows that the MAP_REPORT_SM_DELIVERY message is not sent to the
HLR, the HLR sets a timer. After the message is received, the HLR sets the flag bits of the
MCEF and the MNFG/MNRG to 0.
Figure 2-4 shows the flow.
VLR/SGSN HLR
MAP_READY_FOR_SM
MAP_READY_FOR_SM _ACK
MAP_ALERT_SERVICE_CENTRE
When processing the MAP_READY_FOR_SM flow, location update flow, or GPRS location
update flow, the HLR starts the MAP_ALERT_SERVICE_CENTRE flow to the SMC and
informs the SMC to resend the SM to the subscriber if the MNRF/MNRG of the subscriber is
not reachable and the address of the SMC exists in the MWD list.
Figure 2-5 shows the flow.
HLR SMC
MAP_ALERT_SERVICE_CENTRE
MAP_ALERT_SERVICE_CENTRE_ACK
As the SMC provides the functions of an IWMSC, the MAP_Alert_Service_Centre message is sent from
the HLR to the IWMSC logically.
2.4.2 SM MO Flow
In the SM MO flow, a subscriber uses the MS to send an SM to the SMC. Figure 2-6 shows
an SM MO flow.
3.SEND_INFO_FOR_MO_SMS_ACK (*)
7.ShortMessage Error
(RP_ERROR)
4.MO_FORWARD_SHORT_MESSAGE
(RP_DATA)
5.MO_FORWARD_SHORT_MESSAGE_ACK
6.Short Message (RP_ACK)
Acknowledgement(RP_ACK)
The messages with "(*)" are applicable to the MSC only, not the SGSN.
1. The MS sends an SM to the VMSC server or the SGSN through the A/Iu interface.
2. Upon receipt of the SMS request, the VMSC server sends a subscriber data check
request to the VLR based on the MSISDN of the MS.
3. The VLR checks the subscription information and whether the local office supports the
SMS, and sends the result to the VMSC server.
4. The VMSC server analyzes the result. If the local office does not support SM MO, or it
registers the outgoing call barring service, the VMSC server directly sends a reject
message (RP_ERROR) to the MS. Otherwise, the VMSC server obtains the address of
the SMC from the SM MO and transparently transmits the SM MO to the SMC.
5. Upon receipt of the request, the SMC checks whether the data is valid. If yes, the SMC
sends a message to the VMSC server or the SGSN to acknowledge the transparent
transmission of the SM MO.
6. Upon receipt of the message, the VMSC server or the SGSN sends the result of SM MO
sending to the MS.
2.4.3 SM MT Flow
In an SM MT flow, the SMC sends an SM to the MS. Figure 2-7 shows an SM MT flow.
VMSC/
MS
SGSN
VLR HLR SMC
(1) SEND_ROUTING_INFO_FOR_SM
(2) SEND_ROUTING_INFO_FOR_SM_ACK
(3).MT_FORWARD_SHORT_MESSAGE
(RP_DATA)
The messages with "(*)" are applicable to the MSC only, not the SGSN.
1. Upon receipt of the SM MT, the SMC obtains the called number and uses it to request
the routing information from the HLR.
2. Upon receipt of the routing information, the HLR returns a response.
When the priority of the SM MT is high, the HLR returns a normal response to the SMC even if the
MNRF and the MCEF are enabled.
The HLR searches the information of the subscriber in the database and returns a message
with a failure cause to the SMC if one of the following occurs:
z The subscriber does not exist.
z Roaming is not allowed.
z Carrier determined call barring – barring of all incoming calls or SMs MT
z The SM MT service is not supported.
z The MNRF is enabled.
z The MCEF is enabled.
z The subscriber is deleted by the MSC server/VLR to which the subscriber roams.
If none of the preceding events occurs, the HLR sends the MSC number or the SGSN number
to the SMC.
3. By using the MSC number, the SMC sends a transparent transmission request to the
VMSC server.
4. Upon receipt of the request, the VMSC server sends a request for checking SM MT
subscriber data to the VLR.
5. The VLR checks the subscription data and mobility management status:
− If the subscriber cannot be paged because the subscriber does not support SM MT,
the handset is powered off, the MNRF is enabled, or the roaming is not allowed, the
VMSC server sends a failure response to the SMC.
− If the location area of the MS is known, the VMSC server starts paging the MS in the
specific location area.
− If the location area of the MS is unknown, the VMSC server starts paging the entire
area controlled by the MSC server.
6. The VMSC server pages the MS.
7. The MS sends a response to the VMSC server.
8. (8)(9)(10): Upon receipt of the response, the VMSC server starts the subscriber access
process. After the process is complete, the VMSC server sends the SM to the MS
through the Iu interface.
9. (11)(12): After receiving the result from the MS, the VMSC server sends it to the SMC.
10. If there are multiple SMs, that is, the RP-MMS exists in the transparent transmission
request, the connections are maintained and (3), (10), (11), and (12) are repeated.
11. If no additional message is to be sent, all connections are released.
MSC/
MS SGSN VLR HLR SMC
(4) Ready_for_SM_ack
(5) Alert SC
The flow (2) is not applicable to the SGSN. Alert SC: Alert_Service_Centre
1. The MS makes or receives a call or updates the location to re-connect with the network.
2. The MSC server sends an access request to the VLR if the MS makes or receives a call.
Or the MSC server checks the data of the subscriber who updates the location if the MS
updates the location.
3. The VLR checks subscriber data. If the VLR detects that the MNRF of the subscriber is
enabled, the VLR clears the MNRF and informs the HLR that the SM is ready with the
cause as mobile subscriber reachable. The VLR directly sends a location update request
to the HLR in the case of a location update flow.
4. If the HLR receives the SM ready alert, it checks the dynamic data of the subscriber. If
the MNRF is enabled, the HLR clears it, sends an Alert_Service_Centre message to the
SMC, and sends a message to the VLR to acknowledge the sending of the SM ready alert.
If the HLR receives a location update request and the MNRF in the dynamic data of the
subscriber is enabled, the HLR clears the MNRF, sends an Alert_Service_Centre
message to the SMC, and continues the location update flow.
The HLR sends the Alert_Service_Centre message to all SMCs specified in the MWD list.
The HLR sends the Alert_Service_Centre message only when the MCEF of the MS is set to False.
5. Upon receipt of the Alert_Service_Centre message, the SMC returns a response and tries
to send SMs again.
MSC/
MS HLR SMC
SGSN
(2) READY_FOR_SM
(3) READY_FOR_SM_ACK
(5) ALERT_SERVICE_CENTRE
(6) ALERT_SERVICE_CENTRE_ACK
1. The MS sends a memory ready message to the MSC server through the Iu interface.
2. The MSC server sends an SM ready message with the cause as memory of MS ready to
the HLR.
3. Upon receipt of the message, the HLR checks the dynamic data of the subscriber. If the
MCEF of the subscriber is enabled, the HLR clears it, sends an Alert_Service_Centre
message to the MSC server, and sends an SM ready message to the VLR. Upon receipt
of the message, the MSC server returns a response to the MS.
4. Upon receipt of the Alert_Service_Centre message, the SMC returns a response and tries
to resend the SM. The timing of the SM resending upon SMS failure is controlled by the
SMC through the resending interval setting.
(1) REPORT_SM_DELIVERY_STATUS
(Successful Transfer)
(2) REPORT_SM_DELIVERY_
STATUS_ACK
(3) ALERT_SERVICE_CENTRE
(4) ALERT_SERVICE_CENTRE_ACK
For details about the configuration steps and parameter descriptions, refer to the HUAWEI
MSOFTX3000 Mobile SoftSwitch Center Configuration Guide.
For details about the configuration steps and parameter descriptions, refer to related HLR manuals.
The CDR files are saved in the iGWB. Based on FTAM or FTP, the iGWB sends the CDR
files to the billing center through the TCP/IP connection.
2.9 Reference
2.9.1 Protocols and Specifications
z MNRF: Mobile station Not Reachable Flag
z MNRG: Mobile station Not Reachable for GPRS flag GPRS
z MNRR: Mobile station Not Reachable Reason
z MCEF: Memory Capability Exceed Flag
z MWD-List: Message Waiting Data-List
Contents
Figures
Figure 3-4 CFU service flow for a call forwarded to a mobile subscriber .........................................................3-8
Figure 3-5 NDUB service flow for a call forwarded to a PSTN subscriber .......................................................3-9
Figure 3-6 UDUB service flow for a call forwarded to a PSTN subscriber .....................................................3-10
Figure 3-7 NDUB service flow for a call forwarded to a mobile subscriber.................................................... 3-11
Figure 3-8 UDUB service flow for a call forwarded to a mobile subscriber....................................................3-12
Figure 3-9 CFNRy service flow for a call forwarded to a PSTN subscriber ....................................................3-13
Figure 3-10 CFNRy service flow for a call forwarded to a mobile subscriber. ................................................3-14
Figure 3-11 CFNRc service flow for call forwarded to a PSTN subscriber .....................................................3-16
Figure 3-12 CFNRc service flow for the mobile forwarded-to subscriber .......................................................3-17
Tables
Table 3-16 Service interaction between the CFB and other services................................................................3-28
Table 3-17 Interaction between CFNRy and other services..............................................................................3-30
Table 3-18 Interaction between CFNRc and other services..............................................................................3-33
Section Describes
3.1 Service Description The function code, function definition of this feature, and the
benefits that carriers and mobile subscribers can obtain from
this feature.
3.2 Availability The network elements (NEs) that are required for the feature,
whether Licenses are required, and the version requirements
of the NEs.
3.3 Working Principle The functions of the NEs, and networking requirements.
3.4 Service Flow The service flow of the network when providing this feature.
3.5 Data Configuration The data configurations that are required on the
MSOFTX3000 and the UMG8900.
3.6 Service Management The service operations that carriers and mobile subscribers
are required to implement when the network provides this
feature.
3.7 Charging and CDR The charging and the generation of CDRs when the network
provides this feature.
3.8 Service Interaction The relationships and restrictions between this feature and
other services or features.
3.9 References The protocols and specifications that this feature must comply
with, and the acronyms and abbreviations of this chapter.
3.1.2 Definition
Call forwarding service is used to forward the calls to a mobile subscriber to the third party
according to the requirements of the carriers, the network, or the subscriber. Call forwarding
services are divided into CFU, CFB, CFNRy, and CFNRc. Here, the third party can be a
subscriber in the PLMN, PSTN, ISDN networks, or a service platform such as the voice
mailbox.
Table 3-2 lists the definitions of the call forwarding services.
CFU All the calls to a mobile subscriber are forwarded unconditionally to the
third party.
CFB The calls to a mobile subscriber are forwarded to the third party if the
subscriber is busy. The CFB can be further divided into:
z Network determined user busy (NDUB)
z User determined user busy (UDUB)
CFNRy The calls to a mobile subscriber are forwarded to the third party if the no
reply timer expires.
Name Definition
CFNRc If the wireless connection between the network and a called mobile
subscriber fails, the calls to the mobile subscriber are forwarded to the
third party. The triggering conditions of the CFNRc service includes
mainly:
z The mobile subscriber does not respond to the paging.
z The wireless channel allocation fails.
z The mobile station is powered off.
The forwarding may occur in the network where the caller resides or the
network that the callee resides.
3.1.3 Benefits
Table 3-3 lists the benefits of the call forwarding services.
3.2 Availability
3.2.1 Requirements for NEs
The MSC server, the VLR, and the HLR work together to implement the call forwarding
services.
Table 3-4 lists the related NEs.
√ √ √ √ √ - √ √
GMSC-Originated Forwarding
The call forwarding services originated by the GMSC server after it has obtained the
subscriber information from the HLR consists of:
z CFU
z CFNRc (when the called mobile subscriber is roaming in an area forbidding call
forwarding or when the VLR number is unavailable.)
Figure 3-1 shows the GMSC-originated call forwarding service flow.
Caller
Forwarded-to
(6) subscriber
(5) (1)
(2)
(3)
(4) (G)MSC
HLR
Server
Callee
VMSC-Originated Forwarding
The call forwarding services originated by the serving MSC of the callee (subscriber B)
consists of:
z CFB
z CFNRy
(1)
(5)
(2)
(3)
(4) GMSC
HLR
Server
Callee
(5) (9)
(6) (8)
Forwarded-to
VMSC subscriber
VLR
S erver 用户
9. The VMSC server sets up the call to the forwarded-to subscriber based on the FTN.
This chapter describes only the call forwarding which takes place before a MGW is selected. The user
plane bearing is established after the call is forwarding to different target offices.
Figure 3-3 CFU service flow for a call forwarded to a PSTN subscriber
GMSC MSC
MSa/UEa HLRb PSTN
Server Server b
Set-up
Info request
Info ack
OR1:N Set-up
OR1:Y Set-up
Notification
OR2:Y
The CFU service flow for call forwarded to a PSTN subscriber is as follows:
1. The GMSC sends the Info req message to the HLR.
2. The HLR returns the Info ack message to the GMSC.
− On detecting that the callee has subscribed to and activated the CFU, the HLR
includes the FTN in the Info ack message and sends the message to the GMSC server.
The GMSC server forwards the call based on the FTN. If the Info ack message
contains the information element Notification to calling party, the GMSC server
sends the notification to the caller.
− If the subscriber has not registered to the CFU service, the call is routed to MSC
Server B normally.
3. If the call forwarding conditions are met, the GMSC server forwards the call to the
PSTN subscriber based on the FTN directly.
Figure 3-4 CFU service flow for a call forwarded to a mobile subscriber
Set-up
Info request
Info ack (FTN)
OR1:N Set-up
Info request
OR1:Y
Info ack
Set-up
Notification
OR2:Y
The CFU service flow for a call forwarded to a mobile subscriber is as follows:
1. The GMSC sends the Info request message to the HLR.
2. The HLR returns the Info ack message to the GMSC.
3. On detecting that the callee has subscribed to the CFU, the HLR includes the FTN in the
Info ack message and sends the message to the GMSC server. The GMSC server
forwards the call based on the FTN. If the Info ack message contains the information
element Notification to calling party, the GMSC server sends the notification to the
caller.
4. The GMSC server sends the Info request message to HLR C where the forwarded-to
subscriber resides to request the routing information.
5. HLR C sends the Info ack message containing the routing information to the GMSC
server.
6. After receiving the routing information, the GMSC sends the Set-up message to MSC
server C.
7. MSC server C is responsible for paging the target mobile subscriber.
network resource. For the forwarded-to subscriber, the call is not affected if the CFB is
activated.
Figure 3-5 NDUB service flow for a call forwarded to a PSTN subscriber
Set-up
Info req
Info ack
Set-up
Info req
Page MS
Busy Subscriber
Impossible Call
OR1:N Completion
Release
Release
Connect to
following
OR1:Y address
Set-up
Notification
Notification OR2:Y
OR3:Y
The NDUB service flow for a call forwarded to a PSTN subscriber is as follows:
1. MS A sends the Setup message to the GMSC server.
2. The GMSC server sends the Info req message to HLR B.
3. HLR B sends the Info ack message containing the MSRN to the GMSC server.
4. The GMSC server sends the Set-up message to MSC server B.
5. After receiving the Set-up message, MSC server B sends the Info request message to
VLR B to request the information about MS B.
6. VLR B sends the Page MS message containing the FTN to MSC server B.
7. MSC server B sends a response message to VLR B and indicates that the call setup fails
and the failure reason is subscriber busy through the information element user error in
the response message.
8. If the subscriber has not registered to the CFB service, the call fails. If the subscriber has
registered to the CFB service, go to step 9.
9. MSC server B sends the Set-up message to the PSTN subscriber based on the FTN.
Figure 3-6 UDUB service flow for a call forwarded to a PSTN subscriber
Set-up
Info req
Info ack
Set-up
Info req
Page MS
Set-up
UDUB
Busy Subscriber
Impossible Call
OR1:N Completion
Release
Release Connect to
following
OR1:Y address
Set-up
Notification
OR2:Y
The UDUB service flow for a call forwarded to a PSTN subscriber is as follow:
1. MS A sends the Setup message to the GMSC server.
2. The GMSC server sends the Info req message to HLR B. HLR B sends the Info ack
message to the GMSC server.
3. The GMSC server sends the Set-up message to MSC server B based on the routing
information.
4. After receiving the Set-up message, MSC server B sends the Info req message to VLR B
to request the information about MS B.
5. VLR B sends the Page MS message to MSC server B.
6. After MS B responds to the paging, MSC server B sends the Set-up message to MS B.
7. After MS B rings, the UDUB service is triggered if the callee rejects the call.
8. MSC server B sends response message to VLR B and indicates that the call setup fails
and that the failure reason is subscriber busy through the information element user error
in the response message.
9. The Page MS message sent from VLR B to MSC server B contains the information
related to the forwarding, for example, the FTN and whether the caller and the callee is
notified when forwarding occurs.
10. If the callee has not subscribed to and activated the CFB service, the call fails. Otherwise,
go to step 12.
11. MSC server B sends the Set-up message to the PSTN forwarded-to subscriber based on
the FTN.
Figure 3-7 NDUB service flow for a call forwarded to a mobile subscriber
Set-up
Info req
Info ack
Set-up
Info req
Page MS
Busy Subscriber
Impossible Call
Completion
OR1:N
Release
Release
Connect to
OR1:Y following address
Info-req
Info-ack
Set-up
Notificatio
OR2:Y n
Notificatio
n OR3:Y
The NDUB service flow for a call forwarded to a mobile subscriber is similar to the NDUB
service flow for a call forwarded to a PSTN subscriber. The only difference lies in the call
forwarding flow. The NDUB service flow for mobile forwarded-to subscriber is as follows:
After receiving the FTN, MSC server B requests the routing information (through the Info req
message) from HLR C. After HLR C sends the routing information (through the Info ack
message) to MSC server B, MSC server B sends the Set-up message to MSC server C.
Figure 3-8 UDUB service flow for a call forwarded to a mobile subscriber
Set-up
Info req
Info ack
Set-up
Info req
Page MS
Set-up
Busy UDUB
Subscriber
Impossible Call
OR1:N Completion
Release Release
Connect to
OR1:Y following
address Info req
Info ack
Notificatio Set-up
n
OR2:Y
The UDUB service flow for a call forwarded to mobile subscriber is similar to the UDUB
service flow for a call forwarded to a PSTN subscriber. The only difference lies in the
forwarding flow. The UDUB service flow for mobile forwarded-to subscriber is as follows:
After receiving the FTN, MSC server B requests the routing information (through the Info req
message) from HLR C. After HLR C sends the routing information (through Info ack) to
MSC server B, MSC server B sends the Set-up message to MSC server C.
Figure 3-9 CFNRy service flow for a call forwarded to a PSTN subscriber
GMSC MSC
MSa/UEa HLRb VLRb MSb LEc
Server Server b
Set-up
Info req
Info ack
Set-up
Info req
Info ack
Set-up
Call conf
Start timer
Info-req
Time expires
Impossible Call
OR1:N Completion
Release
Release
Connect to
OR1:Y following address
Set-up
Notification
OR2:Y
Notification
OR3:Y
The CFNRy service flow when the call is forwarded to a PSTN subscriber is as follow:
1. MS A sends the Setup message to the GMSC server.
2. The GMSC server sends the Info req message to HLR B.
3. HLR B sends the Info ack message containing the routing information to the GMSC
server.
4. The GMSC server sends the Set-up message to MSC server B based on the routing
information.
5. MSC server B requests the information of MS B from VLR B.
6. VLR B sends the Info ack message to MSC server B.
Figure 3-10 CFNRy service flow for a call forwarded to a mobile subscriber.
Set-up
Info req
Info ack
Set-up
Info req
Info ack
Set-up
Call Conf
Info Req
Impossible Call
Completion
OR1:N
Release
Connect to
Release
following
OR1:Y address
Info req
Info ack
Set-up
Notification
Notificatio OR2:Y
n OR3:Y
The CFNRy service flow for a call forwarded to a mobile subscriber is as follows:
1. The MS A sends the Setup message to the GMSC server.
2. The GMSC server sends the Info req message to HLR B.
In the following examples, the CFNRc service flow is initiated by the VMSC. The GMSC-initiated
CFNRc service flow is similar to the GMSC-initiated CFU service flow. For detailed information, refer
to section 3.4.1 “CFU Service Flow”.
Figure 3-11 CFNRc service flow for call forwarded to a PSTN subscriber
GMSC MSC
MSa/UEa HLRb VLRb MSb LEc
Server Server b
Set-up
Info req Provide
Roaming No
Set-up
Info req
Page MS
Paging
Absent
Subscriber No response
Impossible Call
OR1:N Completion
Release
Release Connect to
following
OR1:Y address
Set-up
Notification
OR2:Y
The CFNRc service flow for a call forwarded to a PSTN subscriber when the callee does not
respond to the call is as follows:
1. MS A or TE A sends the Set-up message to the GMSC server.
2. The GMSC server sends the Info request message to HLR B.
3. HLR B sends the Provide Roaming Information message to VLR B.
4. VLR B provides the roaming number to HLR B.
5. HLR B sends the Info ack message to the GMSC server.
6. The GMSC server sends the Set-up message to MSC server B.
7. MSC server B requests the information of MS B from VLR B. VLR B sends the Page
MS message to MSC server B.
8. MSC server B pages MS B.
9. If MS B does not respond to the paging, MSC server B returns page response to VLR B
indicating the reason for no response is Absent Subscriber.
10. VLR B determines whether to forward the call.
− If the forwarding conditions are not met, the call is released.
− If the forwarding conditions are met, the call is routed based on the CFNRc service
data.
Figure 3-12 CFNRc service flow for the mobile forwarded-to subscriber
GMSC MSC
MSa/UEa HLRb VLRb MSb MSC
Server b HLRc
Server Server c
Set-up
Info req Provide
Roaming No
Roaming No
Info ack
Set-up
Info req
Page MS
Paging
Absent
Subscriber No response
Impossible Call
Completion
OR1:N
Release
Release
Connect to
following
OR1:Y
address Info req
Info ack
Set-up
Notification
OR2:Y
The CFNRc service flow for the mobile forwarded-to subscriber when the callee does not
respond to the paging is as follows:
1. MS A or TE A sends the Set-up message to the GMSC server.
2. The GMSC server sends the Info request message to HLR B.
3. HLR B sends the Provide Roaming Number message to VLR B.
4. The GMSC server sends the Set-up message to MSC server B.
5. MSC server B sends Info req to VLR B. VLR B sends Page MS to MSC server B. MSC
server B pages MS B.
6. If MS B does not respond to the paging, MSC server B returns page response to VLR B
with the reason of the no response as Absent Subscriber.
7. VLR B determines whether to forward the call.
− If the forwarding conditions are not met, the call is released.
− If the forwarding conditions are met, the call is routed based on the CFNRc service
data.
Operation Steps
By dialing the service feature code through the MSs, mobile subscribers can register, activate,
deactivate, or deregister a service.
When registering an international FTN through the MS, you should add a symbol + before the country
code. Otherwise the registration may fail. An example of the correct number format is as follows:
+8613912345678.
Registration (activating the service The subscriber dials **21*FN# through the MS and
automatically) then press the button used to send the information.
Here, FN represents the FTN.
Deactivation: The subscriber dials #21# through the MS and then
press the button used to send the information.
Activation The subscriber dials *21# through the MS and then
press the button used to send the information.
Deregistration: The subscriber dials ##21# through the MS and
then press the button used to send the information.
Operation Procedure
Registration (activating the service The subscriber dials **67*FN# through the MS
automatically) and then press the button used to send the
information. Here, FN represents the FTN.
Deactivation: The subscriber dials #30.39kg through the MS and
then press the button used to send the information.
Activation The subscriber dials *30.39kg through the MS and
then press the button used to send the information.
Deregistration: The subscriber dials ##30.39kg through the MS
and then press the button used to send the
information.
Registration (activating the service The subscriber dials **61*FN# through the MS
automatically) and then press the button used to send the
information. Here, FN represents the FTN.
Deactivation: The subscriber dials #27.67kg through the MS and
then press the button used to send the information.
Activation The subscriber dials *27.67kg through the MS and
then press the button used to send the information.
Deregistration: The subscriber dials ##27.67kg through the MS
and then press the button used to send the
information.
Registration (activating the service The subscriber dials **62*FN# through the MS
automatically) and then press the button used to send the
information. Here, FN represents the FTN.
Deactivation: The subscriber dials #28.12kg through the MS and
then press the button used to send the information.
Activation The subscriber dials *28.12kg through the MS and
then press the button used to send the information.
Operation Procedure
Table 3-11 lists the procedures of operations applied to all the call forwarding services.
Registration (for all the call The subscriber dials **002*DN*T# through the MS and
forwarding services) then press the button used to send the information. Here,
DN represents the FTN. T represents the value of the no
reply timer. It ranges from 5 to 30 seconds.
Deregistration (for all the call The subscriber dials ##002# through the MS and then
forwarding services) press the button used to send the information.
Operation Procedure
Registration (for all the CCF The subscriber dials **004*DN*T# through the MS and
services) then press the button used to send the information. Here,
DN represents the FTN. T represents the value of the no
reply timer. It ranges from 5 to 30 seconds.
Deregistration: The subscriber dials ##004# through the MS and then press
the button used to send the information.
Subscriber Subscriber
A MSC A MSC B
B
Subscriber
GMSC MSC C C
Charging Principle:
Subscriber B, who has initiated the call forwarding, is charged as a caller, not as a callee. A
separate CDR is created for the call forwarding service. In the CDR, B is the caller, C is the
callee, and A is the third party.
The CFNRc service initiated by the GMSC judges an international number in the same way as the CFU
service.
z To create gateway CDRs, you need to set the General Bill Control table as follows:
Execute the MOD GBILLCTRL command and select GWO and GWI in Ticket Control Flag.
z To create ROAM CDRs, you need to set the General Bill Control as follows: Execute the MOD
GBILLCTRL command and select ROAM in Ticket Control Flag.
3.8.1 CFU
Table 3-14 lists the interaction between the CFU and other services.
Service Interaction
CFU and CLIP The number of the caller is presented to the forwarded-to subscriber
if:
z The call is forwarded.
z The forwarded-to subscriber subscribes to the CLIP service.
z The caller does not activate CLIP service.
CFU and CLIR The CFU has no interaction with the CLIR.
That is, if the caller subscribes to and activates CLIR, the
forwarded-to subscriber cannot display the MSISDN of the caller
unless the forwarded-to subscriber has the override capability.
CFU and COLP If the callee forwards a call without notifying the caller, the caller
cannot receive the call forwarding notification. When the call is
answered, the number of the forwarded-to subscriber is not
presented to the caller unless the forwarded-to subscriber has the
override capability.
In other cases, CFU has no interaction with COLP.
CFU and COLR The CFU and the COLR have the following interactions:
z If the forwarded-to subscriber subscribes to the COLR service,
the forwarded-to number will not be sent to the caller in the call
forwarding notification.
z If the caller subscribes to the COLR service and has the override
capability, the forwarded-to number will not be included in the
call forwarding notification. When the call is answered, however,
the override capability can be invoked to display the forwarded-to
number.
Service Interaction
CFU and CFB The CFU has a higher priority over the CFB.
The CFU and the CFB have the following interactions:
z If a subscriber activates the CFU first, the subscriber cannot
activate the CFB at the same time. The system will prompt that
the two services conflict.
z If a subscriber activates the CFB first, the subscriber can also
activate the CFU.
z If a subscriber receives a call, and if the subscriber activates both
the CFB and CFU, the call will be forwarded unconditionally to
the forwarded-to number registered in the CFU instead of the
forwarded-to number registered in CFB.
CFU and CFNRy The CFU has a higher priority over the CFNRy.
The CFU and the CFNRy have the following interactions:
z If a subscriber activates the CFU first, the subscriber cannot
activate the CFNRy at the same time. The system will prompt that
the two services conflict.
z If a subscriber activates the CFNRy first, the subscriber can also
activate the CFU.
z If a subscriber receives a call, and if the subscriber activates both
the CFB and CFNRy, the call will be forwarded unconditionally
to the forwarded-to number registered in the CFU instead of the
forwarded-to number registered in the CFNRy.
CFU and CFNRc The CFU has a higher priority over the CFNRc.
The CFU and the CFNRc have the following interactions:
z If a subscriber activates the CFU first, the subscriber cannot
activate the CFNRc at the same time. The system will prompt that
the two services conflict.
z If the subscriber activates the CFNRc first, the subscriber can also
activate the CFU.
z If the subscriber receives a call, and if the subscriber activates
both the CFB and CFNRc, the call will be forwarded
unconditionally to the forwarded-to number registered in the CFU
instead of the forwarded-to number registered in the CFNRc.
CFU and CW The CFU has a higher priority over the CW.
When the callee is busy, and when both the CW and CFU of the
subscriber are activated, the incoming calls of the subscriber will be
forwarded unconditionally and the state of the call will not be
changed.
Service Interaction
CFU and MPTY The CFU has no interaction with the MPTY.
z For the caller:
If a subscriber intends to set up MPTY with the subscriber that
activates the CFU, the forwarded-to subscriber receives a
notification and joins in the MPTY.
z For the forwarded-to subscriber:
The forwarded-to subscriber can add an existing forwarded call to
the MPTY.
CFU and CUG See Table 3-15 for the interaction between the CFU and the CUG.
CFU and BAOC The callee can not activate the CFU and the at the same time.
z If the callee activates the CFU, the BAOC cannot be activated.
z If the callee activates the BAOC, the CFU cannot be registered
and activated.
CFU and BOIC The CFU and the BOIC have the following interactions:
z If the callee activates the BOIC, registering of the CFU to an
international number is rejected.
z If the callee registers an international number for the CFU, the
callee cannot activate the BOIC.
CFU and The CFUan the BOIN-exHC have the following interactions:
BOIC-exHC z If the callee activates the BOIC-exHC, the callee cannot register
the CFU.
z If the subscriber activates the BOIC-exHC, the subscriber cannot
register and activate the CFU service to the non-HPLMN
numbers.
z If the subscriber activates the CFU forwarded to non-HPLMN
numbers, the subscriber can not activate the BOIC-exHC.
CFU and BAIC The callee cannot activate the CFU and the BAIC at the same time.
z If the callee activates the CFU, the callee cannot activate the
BAIC.
z If the callee activates the BAIC, the callee cannot register and
activate the CFU.
z If the call is forwarded to the subscriber who activates the BAIC,
the call is rejected as any other incoming call.
CFU and For the callee, the CFU has a higher priority over the BIC-ROAM.
BIC-ROAM z If the callee activates the BIC-ROAM, and if the callee registers
or activates the CFU at the same time, the BIC-ROAM cannot be
activated.
z If the callee activates the CFU, the callee cannot activate the
BIC-ROAM at the same time.
For the forwarded-to subscriber:
If the call is forwarded to the subscriber who activates the BAIC,
the call is rejected as any other incoming call.
Inter-Group Yes The The call is The The call is The call is
outgoing call not call rejected. call rejected rejected.
allowed can be can
forwar be
ded. forw
arde
d.
No The call is rejected.
Inter-Group Yes The The call is The The call can The call can
outgoing call call rejected call be forwarded. be forwarded.
allowed can be can
forwar be
ded. forw
arde
d.
No The call is rejected. The call can be
forwarded.
Normal call – The call is rejected. The call can be The call can
forwarded. be forwarded.
3.8.2 CFB
Table 3-16 describes the service interaction between the CFB and other services.
Table 3-16 Service interaction between the CFB and other services
Service Interaction
CFB and CLIP The number of the caller is presented to the forwarded-to
subscriber if:
z The call is forwarded.
z The caller does not activate the CLIR service.
z The forwarded-to subscriber subscribes to the CLIP service.
CFB and CLIR The CFB has no interaction with the CLIR.
That is, if the caller subscribes to and activates the CLIR, the
number of the caller is presented to the forwarded-to subscriber
unless the forwarded-to subscriber has the override capability.
CFB and COLP If the callee forwards the call without notifying the caller, the
caller cannot receive the call forwarding notification. When the
call is answered, the number of the forwarded-to party is not
presented to the caller unless the forwarded-to subscriber has the
override capability.
In other cases, the two services have no interaction.
CFB and COLR The CFB and the COLR have the following interactions:
z If the forwarded-to subscriber subscribes to the COLR service,
the forwarded-to number will not be sent to the caller in the call
forwarding notification.
z If the caller subscribes to the COLR service and has the override
capability, the forwarded-to number will not be included in the
call forwarding notification. When the call is answered,
however, the override capability can be invoked to display the
forwarded-to number.
CFB and CFU The CFU has a higher priority over the CFB.
z If a subscriber activates the CFU first, the subscriber cannot
activate the CFB at the same time. The system will prompt that
the two services conflict.
z If a subscriber activates the CFB first, the subscriber can also
activate the CFU.
z If a subscriber receives a call, and if the both the CFB and CFU
are activated , the call will be forwarded unconditionally to the
forwarded-to number registered in the CFU instead of the
forwarded-to number registered in the CFB.
CFB and CW The CW has no interaction with the CFB.
z If the callee is busy owning to the network, the call will be
processed as the CFB without notifying the callee.
z If the callee is busy, which is not caused by the network, the call
will be connected to the callee. The callee decides whether to
forward the call.
Service Interaction
CFB and MPTY The CFU has no interaction with the MPTY.
z For the caller:
If the callee intends to set up MPTY with the subscriber that
activates the CFB, the forwarded-to subscriber receives a
notification and joins in the MPTY.
z For the forwarded-to subscriber:
The forwarded-to subscriber can use the forwarded call to set up
the MPTY.
CFB and CUG See Table 3-12 for the interaction between the CFB and the CUG.
CFB and AOC The CFB has no interaction with the AOC.
CFB and BAOC The callee cannot activate the CFB and the BAOC at the same
time.
z If the callee activates the CFB, the BAOC cannot be activated in
the same BSG.
z If the callee activates the BAOC, the CFB cannot be registered
and activated in the same BSG.
CFB and BOIC The CFB and the BOIC have the following interactions:
z If the callee activates BOIC, registering of the CFU and
forwarded-to international number are rejected in the same BSG.
z If the callee activates the CFB forwarded to an international
number (in the local PLMN), the callee cannot activates the
BOIC in the same BSG.
z If the CFB is forwarded to a national number, and if the CFB
and BOIC are activated at the same time, the CFB cannot be
activated if the subscriber roams to other countries. If the
subscriber roams back, the CFB can be activated.
CFB and The CFB and the BOIC-exHC have the following interactions:
BOIC-exHC z In the same BSG, if the callee activates the BOIC-exHC, the
CFB to a non-HPLMN international number cannot be
registered or activated.
z In the same BSG, if the callee activates the CFB forwarded to a
non-HPLMN international number, the BOIC-exHC cannot be
activated.
z In the same BSG, if the callee activates the CFB forwarded to a
national number or HPLMN number, the CFB and the
BOIC-exHC can be activated in the same BSG.
z If the subscriber roams to other PLMN countries, the CFB
cannot be activated. The CFB can be activated if the subscriber
returns to HPLMN or the BOIC-exHC is deactivated.
Service Interaction
CFB and BAIC The callee cannot activate the CFB and the BAIC at the same time.
z In the same BSG, if the subscriber activates the CFB, the BAIC
cannot be activated.
z In the same BSG, if the subscriber activates the BAIC, the CFB
cannot be registered and activated.
CFB and BIC-ROAM For the callee:
z In the same BSG, if the callee activates BIC-ROAM, and if the
BIC-ROAM is operational, CFB cannot be registered and
activated. In the same BSG, if the callee activates BAIC, CFB
cannot be registered and activated.
z In the same BSG, if the subscriber activates BIC-ROAM, but the
BIC-ROAM is in the activation barring state, the subscriber can
register and activate CFB. If the BIC-ROAM changes to
operational, the CFB cannot be activated.
z In the same BSG, if the subscriber roams outside the HPLMN,
and if the subscriber registers and activates the CFB and the
CFB is operational, the subscriber cannot activate the
BIC-ROAM.
z In the same BSG, if the subscriber registers and activates the
CFB and the CFB is in the activation barring state, and if the
subscriber roams in the HPLMN, the subscriber can activate the
BIC-ROAM.
For the forwarded-to subscriber:
The call that is forwarded to the subscriber that activates the
operational BIC-ROAM is rejected as any other incoming call.
3.8.3 CFNRy
Table 3-17 lists interaction between the CFNRy and other services.
CFNRy and CLIP If a call is forwarded, the calling number is presented to the
forwarded-to subscriber who has registered the CLIP, if the CLIP
of the caller is not activated.
CFNRy and CLIR If a call is forwarded, the calling number is not presented to the
forwarded-to subscriber unless the forwarded-to subscriber has the
override capability, if the caller has subscribed to and activated the
CLIR.
CFNRy and COLP If the callee forwards a call without notifying the caller, the calling
number is not presented to the forwarded-to subscriber unless the
caller has the override capability.
Service Interaction
CFNRy and COLR z If the forwarded-to subscriber has subscribed to the COLP, the
forwarded-to number is not sent to the caller along with the
forwarding notification.
z If the caller has subscribed to the COLP and has the override
capability, the forwarded-to number is not contained in the
forwarding notification received. The forwarded-to number,
however, is presented to the caller through the override
capability when the call is answered.
CFNRy and CFU The CFU has higher priority over the CFNRy.
z If the CFU is activated, activating the CFNRy fails, prompting
that a conflict occurs.
z If the CFNRy is activated, activating the CFU succeeds.
When a call is made to a subscriber whose CFNRy and CFU are
activated, the call is forwarded based on the CFU instead of the
CFNRy.
CFNRy and CW When a call is made to a subscriber whose CFNRy and CW are
activated, the subscriber receives the CW prompt, and forwards
the call if the call is not answered within a specific period of time.
CFNRy and MPTY The CFNRy and MPTY do not affect each other.
z Assume that the caller wants to set up a MPTY call with the
callee. If the CFNRy of the callee is activated, the forwarded-to
subscriber receives a prompt and connects to the conference, if
the call is not answered.
z The forwarded-to subscriber can add an existing forwarded call
to a MPTY call.
CFNRy and CUG Table 3-15 lists interaction between the CFNRy and CUG.
CFNRy and BAOC The CFNRy and BAOC cannot coexist.
For the callee:
z In the same BSG, if the CFNRy is activated, the BAOC cannot
be activated.
z In the same BSG, if the BAOC is activated, the CFNRy cannot
be registered or activated.
CFNRy and BOIC For the callee:
z In the same BSG, if the BOIC is activated, the CFNRy to an
international number cannot be registered or activated.
z In the same BSG, if the CFNRy to an international number
(from a HPLMN network) is activated, the BOIC cannot be
activated.
z In the same BSG, if the CFNRy to a national number is
activated, the BOIC can be activated; if the CFNRy to an
international number is activated, the CFNRy cannot be
activated. If the BOIC is then deregistered or activated to a
national number, the CFNRy can be activated.
Service Interaction
3.8.4 CFNRc
Table 3-18 lists interaction between CFNRy and other services.
Service Interaction
CFNRc and CLIP If a call is forwarded, the calling number is presented to the
forwarded-to subscriber who has registered the CLIP, if the
CLIP of the caller is not activated.
CFNRc and CLIR If a call is forwarded, the calling number is not presented to the
forwarded-to subscriber unless the forwarded-to subscriber has
the override capability, if the caller has subscribed to and
activated the CLIR.
CFNRc and COLP If the callee forwards a call without notifying the caller, the
calling number is not presented to the forwarded-to subscriber
unless the caller has the override capability.
CFNRc and COLR z If the forwarded-to subscriber has subscribed to the COLP,
the forwarded-to number is not sent to the caller along with
the forwarding notification.
z If the caller has subscribed to the COLP and has the override
capability, the forwarded-to number is not contained in the
forwarding notification received. The forwarded-to number is
presented to the caller through the override capability when
the call is answered.
CFNRc and CFU The CFU has higher priority over the CFNRc.
z If the CFU service is activated, activating the CFNRc fails,
prompting that a conflict occurs.
z If the CFNRc is activated, activating the CFU succeeds.
When a call is made to a subscriber whose CFNRc and CFU are
activated, the call is forwarded based on the CFU instead of the
CFNRc.
CFNRc and MPTY The CFNRc and MPTY do not affect each other.
z Assumes that the caller wants to set up a MPTY call with the
callee. If the CFNRc of the callee is activated, the
forwarded-to subscriber receives a prompt, and connects to
the conference if the callee is not reachable.
z The forwarded-to subscriber can add an existing forward call
to a MPTY call.
CFNRc and CUG Table 3-15 lists interaction between the CFNRc and CUG.
CFNRc and AOC There is no interaction between CFNRc and AOC
CFNRc and BAOC For the callee:
In the BSG, the CFNRc and BAOC cannot coexist.
z In the same BSG, if the CFNRc is activated, the BAOC
cannot be activated.
z In the same BSG, if the BAOC is activated, the CFNRc
cannot be registered or activated.
Service Interaction
Service Interaction
3.9 References
3.9.1 Protocols and Specifications
z 3GPP TS 22.082 V4.2.0 (2002-03)
z 3GPP TS 23.082 V4.3.0 (2002-06)
Contents
Figures
Tables
Table 4-4 Applicable versions of Huawei wireless core network products ........................................................4-5
Table 4-5 Operation modes of the line identification services.......................................................................... 4-11
Table 4-6 CLIR service operation performed by mobile subscribers ...............................................................4-12
Table 4-7 Interactions between the CLIP service and other services................................................................4-12
Table 4-8 Interactions between the CLIR service and other services ...............................................................4-13
Table 4-9 Interactions between the COLP service and other services ..............................................................4-13
Table 4-10 Interactions between the COLR service and other services............................................................4-14
Section Describes
4.1 Service Description The function code, function definition of this feature, and the
benefits that carriers and mobile subscribers can obtain from
this feature.
4.2 Availability The network elements (NEs) that are required for the feature,
whether Licenses are required, and the version requirements
of the NEs.
4.3 Working Principle The functions of the NEs, and networking requirements.
4.4 Service Flow The service flow of the network when providing this feature.
4.5 Data Configuration The data configurations that are required on the
MSOFTX3000 and the UMG8900.
4.6 Service Management The service operations that carriers and mobile subscribers
are required to implement when the network provides this
feature.
4.7 Service Interaction The relationships and restrictions between this feature and
other services or features.
4.8 Reference The protocols and specifications that this feature must comply
with, and the acronyms and abbreviations of this chapter.
CLIP WMFD-020301
CLIR WMFD-020302
COLP WMFD-020303
COLR WMFD-020304
Note:
CLIP = Calling Line Identification Presentation; CLIR = Calling Line Identification Restriction; COLP
= Connected Line Identification Presentation; COLR = Connected Line Identification Restriction
4.1.2 Definition
Line identification services are classified into two types: One is supplementary services that
provide and restrict connected line identification for callers; the other is services that provide
and restrict calling line identification for callees.
Line Identity (LI) consists of the following information:
z ISDN/MSISDN number of subscriber
z Subaddress information (optional). The Public Land Mobile Network (PLMN) is not
responsible for the content of subaddress.
Calling Line Identity (CLI) identifies callers and Connected Line Identity (COL)
identifies connected parties that refer to callees communicating with callers lastly. For
common calls, connected parties indicate callees. For forwarding calls, forwarding target
parties indicates callees.
In some special applications, callers/callees are provided with additional CLI (aCLI) and
additional COL (aCOL).
When sending LI or additional Line Identity (aLI), the network additionally sends
Presentation Indicator (PI) and Screening Indicator (SI):
z PI
− Presentation allowed
− Presentation restricted
− Number not available due to interworking
z SI
− User provided, verified and passed
− User provided, not screened
− Network provided
4.1.3 Types
Line identification services are classified into CLIP, CLIR, COLP and COLR.
Name Definition
CLIP CLIP is a supplementary service provided for callees. The service provides
calling line identification for callees.
CLIP and CLIR are mutually exclusive. That is, when a callee activates the
CLIP and the caller activates the CLIR, service conflict occurs. In general, the
CLIR enjoys higher priority than the CLIP. Therefore, when service conflict
occurs, the system processes according to the CLIR service. But if Override
Category of the CLIP is Enable, the system processes according to the CLIP
when service conflict occurs.
CLIR CLIR is a supplementary service provided for callers. The service restricts
that calling line identification is provided for callees.
Carriers can provide the CLIR service for subscribers in permanent,
temporary allowed and temporary restricted modes.
z Permanent mode: The CLIR service is invoked for every call.
z Temporary allowed mode: In default status, the CLIR service is not
invoked. Subscribers can invoke the CLIR service temporarily through the
menus of some mobile phones.
z Temporary restricted mode: In default status, the CLIR service is invoked.
Subscribers can suppress the CLIR service temporarily through the menus
of some mobile phones.
COLP COLP is a supplementary service provided for callers. The service provides
connected line identification for callers.
COLP and COLR are mutually exclusive. That is, when a caller activates the
COLP and the callee activates the COLR, service conflict occurs. In general,
the COLR enjoys higher priority than the COLP. Therefore, when service
conflict occurs, the system processes according to the COLR service. But if
Override Category of the COLP is Enable, the system processes according to
the COLP when service conflict occurs.
COLR COLR is a supplementary service provided for callers. If a subscriber is a
callee, the service restricts that connected line identification is provided for
callers.
4.1.4 Benefits
Table 4-2 lists the beneficiaries and description of the benefits.
4.2 Availability
4.2.1 Requirements for NEs
Table 4-3 lists the network elements (NEs) required by the line identification services.
√ √ √ √ - - √ √
Note:
UE = user equipment; MS = mobile station; BTS = base transceiver station; RNC = radio network
controller; BSC = base station controller; MSC = mobile switching center; MGW = media gateway;
SGSN = serving GPRS support node; VLR = visitor location register; HLR = home location register
The symbol √ indicates that the corresponding NE is required. The hyphen - indicates that the
corresponding NE is not required.
4.3.2 CLIP
The following section describes the working principle of the CLIP service:
z The Gateway MSC (GMSC) obtains CLI, PI, SI and possible aCLI, aPI and aSI from the
VLR or incoming signaling, configures them in outgoing signaling and then sends them
to the MSC of callee.
z Based on the earlier mentioned information and callee CLIP subscription information
stored in the VLR, the MSC of callee determines whether to send CLI information to the
callee.
4.3.3 CLIR
The following section describes the working principle of the CLIR service:
z A subscriber initiates a call. (For subscribers that subscribe CLIR temporary mode, the
parameter whether to invoke the CLIR may be sent at that time.)
z The MSC of caller determines CLI, PI and SI in outgoing signaling based on CLIR
subscription information stored in the VLR and CLI, PI and SI in A interface signaling.
z The MSC of caller sends corresponding CLI information in the outgoing signaling.
4.3.4 COLP
The following section describes the working principle of the COLP service:
z When a callee answers the phone, the answer message sent by the MSC of callee to the
MSC of caller carries COL, PI, SI and possible aCOL, aPI and aSI information.
z Based on COL, PI, SI and possible aCOL, aPI and aSI in incoming signaling, and caller
COLP subscription information stored in the VLR, the MSC of caller sets the COL
information to be sent to the caller.
z The MSC of caller sends answer message with COL information to the caller.
4.3.5 COLR
The following section describes the working principle of the COLR service:
z A callee answers the phone. The message sent to the MSC of callee carries COL, PI and
SI.
z The MSC of callee sets COI, PI and SI to be sent to the MSC of caller based on callee
COLR subscription information stored in the VLR and COL, PI and SI in A interface
signaling.
z The MSC of callee sends answer message with COL, PI and SI to the MSC of caller.
(G)MSC
MS/PSTN HLRb MSC server b MS
server
SETUP(CLIPBN) or
IAM(CLIPN,GN) SRI
PRN
PRN ack
SRI ack
IAM(CLIPN,GN,CoNC)
SETUP(CLIPBN,CoNC)
1. If a caller is the MS, the MS sends the SETUP message to the MSC server. The
parameter Calling Party BCD Number in the message contains CLI, PI and SI. If the
caller is a fixed network subscriber, the Public Switched Telephone Network (PSTN)
sends originated call message (such as the IAM message) to the GMSC server through
trunk signaling. The parameter Calling Party Number in the originated call message
contains CLI, PI and SI. In addition, the originated call message may contain parameters
Generic number and Cause of NO CLI. The Generic number contains aCLI, aPI and
aSI.
2. The (G)MSC server initiates the SRI operation to the HLRb.
3. The HLRb initiates the PRN operation to the MSC server b (VLR).
4. After obtaining the roaming number, the (G)MSC server transfers the originated call
message to the MSC server b. The message contains the Calling Party Number and
possible Generic number and Cause of NO CLI.
5. The MSC server b sets Calling Party BCD Number and possible Cause of NO CLI in
the SETUP message based on received CLI, PI and SI in the Calling Party Number,
aCLI, aPI and aSI in the Generic number, Cause of NO CLI and CLIP subscription
information.
6. The MSC server b sends the SETUP message to the callee.
4.4.2 CLIR
Figure 4-2 shows the CLIR service flow.
SETUP(CLIPBN,CLIR suppression or
CLIR invocation) IAM(CLIPN,CoNC)
1. The MS sends the SETUP message to the GMSC server. The parameter Calling Party
BCD Number in the message contains CLI, PI and SI. If CLIR service s in temporary
allowed mode, when a subscriber invokes the CLIR service through the menu of mobile
phone, the SETUP message contains the parameter CLIR invocation. If the CLIR
service is in temporary restricted mode, when a subscriber shields the CLIR service
through the menu of mobile phone, the SETUP message contains the parameter CLIR
suppression.
2. The MSC server sets Calling Party Number and possible Cause of NO CLI in
originated call message (such as the IAM message) based on CLI, CLIR invocation,
CLIR suppression and CLIR subscription information. The Calling Party Number
contains CLI information.
3. The MSC server sends the originated call message to called office.
z If the SETUP message contains the parameter CLIR invocation and the subscriber does not
subscribe the CLIR service, the MSC server directly end the call.
z If the call triggers some special application in the MSC server, the originated call message may
contain the Generic number.
4.4.3 COLP
Figure 4-3 shows the COLP service flow.
CONNECT or
ANM(CON number,GN) ANM(CON number,GN)
CONNECT(CON number)
1. If a callee is the MS, when the MS answers, it sends the CONNECT message to the
MSC server. Based on the callee COLR subscription information, the MSC server sets
the value of Connected number in the answer message (such as the ANM message) sent
to the MSC server of caller. The value of Connected number contains COL, PI and SI.
If the call triggers some special application in the MSC server, the answer message may
contain Generic number that contains aCOL, aPI and aSI information. If the callee is a
fixed network subscriber, the GMSC server transparently transmits the received answer
message (such as the ANM message). The answer message contains Connected number
and possible Generic number.
2. The (G)MSC server sends the answer message to the MSC server of caller.
3. The MSC server sets the parameter Connected number in the CONNECT message
based on received COL, PI, SI, possible aCOL, aPI and aSI, and COLP subscription
information. The Connected number contains COL, PI and SI.
4. The MSC server of caller sends the CONNECT message to the caller.
4.4.4 COLR
Figure 4-4 shows the COLR service flow.
CONNECT
ANM(CON number)
1. When the MS answers, it sends the Connect message to the MSC server.
2. The MSC server sets the value of Connected number in the answer message (such as
the ANM message) to be sent to calling office. The value of Connected number
contains COL, PI and SI.
3. The MSC server sends the answer message to the calling office.
Description For a caller number with call source name A and started with 60139, delete
the prefix 60 when the caller number is presented.
Script ADD DNC: DCN="DEL60", DCT=TYPE6, DCL=2;
ADD CLIPRO: CSN="A", CLIPFX=K'60139, CLIMAXLEN=13,
CLDCORNAME="DEL60";
----End
Description For a connected number with call source name A and started with 755, add
prefix 0 in front of it.
Script ADD DNC: DCN="ADD0", DCT=TYPE1, ND=K'0;
ADD AIDNUMPRO: CSCNAME="A", NUMTY=TY0, PFX=K'755,
CDN="ADD0";
For supplementary line identification services, the services are activated when they are provided, and the
services are deactivated when they are withdrawn.
Operations
On the MS, mobile subscribers can perform the operations listed in Table 4-6.
In temporary On the MS, dial "#31#DN", and then press the Send key. Of it, DN
allowed mode, refers to a called number.
invoke the CLIR
service.
In temporary On the MS, dial "*31#DN", and then press the Send key. Of it, DN
restricted mode, refers to a called number.
suppress the CLIR
service.
Subscribers can also perform the operations through the menus of some mobile phones. For details, see
the user manuals of the mobile phones.
Table 4-7 Interactions between the CLIP service and other services
Service Interaction
CLIP and CLIR In general, the CLIR service enjoys higher priority than the CLIP
service.
When a callee activates the CLIP service and the caller activates the
CLIR service, the system processes according to the CLIR service.
But if the CLIP property of the callee is OVERRIDE, the system
processes according to the CLIP service.
CLIP and CFU, If the system provides the CLIP to a callee and the caller does not
CFB, CFNRy and activate the CLIR service, when forwarding occurs, the caller number
CFNRc is presented to the callee according to the CLIP service.
For example, subscriber A calls subscriber B. The call is forwarded
to subscriber C. If C activates the CLIP service and A does not
activate the CLIR service, the MS of C can present the number of A.
CLIP and CW The CLIP and CW services are compatible.
If a subscriber activates CLIP and CW service, calls are processed
according to the CW service. In addition, the MS of the subscriber
can present caller numbers.
4.7.2 CLIR
Table 4-8 lists the interactions between the CLIR service and other services.
Table 4-8 Interactions between the CLIR service and other services
Service Interaction
CLIR and CLIP In general, the CLIR service enjoys higher priority than the CLIP
service.
When a callee activates the CLIP service and the caller activates the
CLIR service, the system processes according to the CLIR service.
But if the CLIP property of the callee is OVERRIDE, the system
processes according to the CLIP service.
CLIR and CFU, The CLIR and forwarding services are compatible.
CFB, CFNRy and If a caller activates the CLIR service, the MS of forwarding target
CFNRc subscriber cannot present the caller number unless forwarded target
subscriber activates the CLIP service and the property of CLIP is
OVERRIDE.
For example, subscriber A activates the CLIR service. A calls B. The
call is forwarded to subscriber C. The MS of C cannot present the
number of A.
4.7.3 COLP
Table 4-9 lists the interactions between the CLIP service and other services.
Table 4-9 Interactions between the COLP service and other services
Service Interaction
COLP and COLR In general, the COLR service enjoys higher priority than the COLP
service.
When a caller activates the COLP service and the callee activates
the COLR service, the system processes according to the COLR
service. But if the COLP property of caller is OVERRIDE, the
system processes according to the COLP service.
COLP and MPTY If a subscriber activates both COLP and MPTY service.
When the subscriber is a main controller, the COLP and MPTY
services are compatible.
When the subscriber is remote (participant of the MPTY service)
the subscriber cannot receive COLP supplementary service
information of other meeting participants.
Service Interaction
COLP and CFU, The COLP and forwarding services are compatible.
CFB, CFNRy and If a caller activates the COLP service and the forwarded subscriber
CFNRc does not activate the COLR service, when the callee is forwarded,
the callee notifies the caller. The MS of caller presents callee
numbers.
If the callee activates the forwarding service and selects not to
notify the caller when forwarding occurs, the MS of caller cannot
present the callee number unless the property of caller is
OVERRIDE.
4.7.4 COLR
Table 4-10 lists the interactions between the COLR service and other services.
Table 4-10 Interactions between the COLR service and other services
Service Interaction
COLR and COLP In general, the COLR service enjoys higher priority than the COLP
service.
When a caller activates the COLP service and the callee activates
the COLR service, the system processes according to the COLR
service. But if the COLP property of caller is OVERRIDE, the
system processes according to the COLP service.
COLR and CFU, If a forwarded subscriber activates the COLR service, the
CFB, CFNRy and forwarding notification does not provide the number of forwarded
CFNRc subscriber.
If a caller activates the COLP service and the property of caller is
OVERRIDE, the forwarding notification does not provide the
number of forwarded subscriber, but the COLP service can be
invoked to present callee numbers.
4.8 Reference
4.8.1 Protocols and Specifications
This following specifications and manuals are referred to:
z 3GPP TS 22.081 V4.1.0
z 3GPP TS 23.081 V4.1.0
z 3GPP TS 24.081 V4.1.0
z 3GPP TS 24.008 V4.15.0
z 3GPP TS 29.002 V4.15.0
Contents
Figures
Figure 5-1 Service flow when a subscriber accepts a waiting call .....................................................................5-7
Figure 5-2 Service flow when a subscriber rejects a waiting call.......................................................................5-9
Figure 5-3 Service flow for holding and retrieving a call.................................................................................5-10
Figure 5-4 Service flow for alternating from the A-B call to the A-C call ....................................................... 5-11
Tables
Table 5-4 NEs required by the call completion supplementary services ............................................................5-3
Table 5-5 Applicable versions of Huawei wireless core network products ........................................................5-4
Table 5-6 Related software parameters.............................................................................................................5-13
Section Describes
5.1 Service Description The function code, function definition of this feature, and the
benefits that carriers and mobile subscribers can obtain from
this feature.
5.2 Availability The network elements (NEs) that are required for the feature,
whether Licenses are required, and the version requirements
of the NEs.
5.3 Working Principle The functions of the NEs, and networking requirements.
5.4 Service Flow The service flow of the network when providing this feature.
5.5 Data Configuration The data configurations that are required on the
MSOFTX3000 and the UMG8900.
5.6 Service Management The service operations that carriers and mobile subscribers
are required to implement when the network provides this
feature.
5.7 Charging and CDR The charging and the generation of CDRs when the network
provides this feature.
5.8 Service Interaction The relationships and restrictions between this feature and
other services or features.
5.9 Reference The protocols and specifications that this feature must comply
with, and the acronyms and abbreviations of this chapter.
5.1.2 Definition
The call completion supplementary services provide two services: call waiting (CW) and call
hold (CH). Subscribers can choose either one to process two calls at the same time.
Table 5-2 lists the name and definition of the CW and CH services.
5.1.3 Benefits
Table 5-3 lists the beneficiaries and description of the benefits.
Carriers The call completion supplementary services add values of services, and
improve the call completion rate.
Mobile Subscribers can activate and deactivate the CW service freely. This
subscribers indicates that subscribers can control the CW service flexibly. After the
CW service is activated, a subscriber can answer another call in
conversation. Therefore, the subscriber can select the one that is more
important.
When the CH service is activated, a subscriber can hold the current call,
and answer another call. This minimizes the possibility of missing calls,
and improves the call completion rate.
5.2 Availability
5.2.1 Requirements for NEs
Table 5-4 lists the network elements (NEs) required by the call completion supplementary
services.
√ √ √ √ √ - √ √
Note:
UE = user equipment; MS = mobile station; BTS = base transceiver station; RNC = radio network
controller; BSC = base station controller; MSC = mobile switching center; MGW = media gateway;
SGSN = serving GPRS support node; VLR = visitor location register; HLR = home location register
The symbol √ indicates that the corresponding NE is required. The hyphen - indicates that the
corresponding NE is not required.
z Upon receiving the ALERTING message, the MSC starts the CW timer T2 and the
no-reply timer T3. The MSC then waits for the answer of B. At the same time, the MSC
sends an ALERTING or ACM message to C, carrying the CW indication. Before B
answers or disconnects the call, the MSC of B plays an announcement to C, instructing C
to wait for the call.
z If B answers before T2 and T3 time out, the MS sends a CONNECT message to the
MSC for connecting the C-B call.
z The MSC sends a response to the MS, and sends an acknowledge to C, indicating that
the C-B call is set up.
z If B rejects the call before T2 and T3 time out, the MSC follows the normal flow to
disconnect the waiting call.
z If T2 or T3 times out, the MSC sends a DISCONNECT message to B and C respectively,
instructing them to release the C-B call.
Holding a Call
The following section describes the working principle for holding a call.
1. A holds the call when A is in conversation with B.
2. MS A sends a HOLD request to the MSC.
3. The MSC queries the subscription information of A. If the CH service is activated for A,
the MSC processes the CH service.
4. The MSC determines whether to accept the request for the CH service based on the CH
activation indication and other factors, for example, whether there is a held call. If the
MSC rejects the request, it returns a HOLD REJECT message to MS A. The
conversation between A and B continues.
5. If the MSC accepts the request, it returns a HOLD ACKNOWLEDGE message to MS A,
reserves the channel allocated for the current call, and sends a message to B or the MSC
of B at the same time to notify B.
Retrieving a Call
The following section describes the working principle for retrieve a call.
1. A retrieves the A-B call.
2. MS A sends a RETRIEVE request to the MSC.
3. If the MSC rejects the request, it returns a RETRIEVE REJECT to MS A. The
conversation between A and B continues.
4. If the MSC accepts the requests, it returns a RETRIEVE ACKNOWLEDGE message to
MS A, retrieves the connection of the original channel, and sends a message to B or the
MSC of B at the same time to notify B.
MSC server
PSTN C GMSC server HLR B MS B
B
IAM
SRI
PRN
PRN ack
SRI ack
IAM
SETUP
Call CONFIRMED
ALERTING
ACM
ACM
B wants to connect
the waiting call.
CONNECT
CONNECT ack
ANM
ANM
7. MSC server B sends an ACM message to the GMSC server, carrying a CW indication.
MSC server B then follows the indication to play an announcement to C, instructing C to
wait for the call.
8. If B answers, MS B sends a CONNECT message to MSC server B.
9. MSC server B returns a CONNECT ack message to MS B.
10. MSC server B sends an ANM message to the GMSC server, instructing C to answer.
11. The B-C call is set up.
The transaction identifier of the signaling messages for the B-C call is different from that for the A-B
call. Thus MS B and MSC server B can identify the signaling messages.
MSC server
PSTN C GMSC server HLR B MS B
B
IAM
SRI
PRN
PRN ack
SRI ack
IAM
SETUP
CALL CONFIRMED
ALERTING
ACM
ACM B rejects the call
from C.
DISCONNECT
RELEASE
REL
RELEASE
REL COMPLETE
RLC
RLC
The transaction identifier of the signaling messages for the B-C call is different from that for the A-B
call. Thus MS B and MSC server B can identify the signaling messages.
A wants to retrieve
the A-B call.
RETRIEVE
RETRIEVE ack
CPG
FACILITY
CALL A-B ACTIVE
Figure 5-4 Service flow for alternating from the A-B call to the A-C call
A wants to alternate
from the A-B call to the
A-C call.
HOLD
RETRIEVE
HOLD ack
CPG
RETRIEVE ack FACILITY
CPG
FACILITY
Call A-B on hold, call A-C active
The service flow for alternating from the A-B call to the A-C call is as follows:
1. When A wants to alternate from the A-B call to the A-C call, MS A sends a HOLD
request to MSC server A for holding the A-B call, and a RETRIEVE request for
retrieving the A-C call.
2. MSC server A accepts the request, and returns a HOLD ack message to MS A.
3. MSC server A sends a CPG message to MSC server B, carrying a notification for remote
hold.
4. MSC server B sends a FACILITY message to MS B. In the message, the invoke
component is NotifySS, in which CallOnHold-indicator is callOnHold. The message is
used to inform MS B that the call is on hold.
5. MSC server A accepts the request, and returns a RETRIEVE ack message to MS A.
6. MSC server A sends a CPG message to MSC server C, carrying a notification for remote
retrieve.
7. MSC server C sends a FACILITY message to MS C. In the message, the invoke
component is NotifySS, in which CallOnHold-indicator is callRetrieved. The message is
used to inform MS B that the call is retrieved.
The transaction identifier of the signaling messages for the A-C call is different from that for the A-B
call. Thus MS A and MSC server A can identify the signaling messages.
Generating CDRs
The command MOD GBILLCTRL is used to generate the call detail records (CDRs) of the
CW and CH services.
For the CH service, the service is activated when it is provided, and the service is deactivated when it is
withdrawn.
Operations
On the MS, mobile subscribers can perform the operations listed in Table 5-8.
CW Activate the CW On the MS, dial "43#", and then press the Send key.
service.
CW Deactivate the On the MS, dial "#43#", and then press the Send
CW service. key.
CW Release and On the MS, dial "0", and then press the Send key.
reject a waiting
call.
CW Release an active On the MS, dial "1", and then press the Send key.
call, and answer a
waiting call.
CW Hold an active On the MS, dial "2", and then press the Send key.
call, and accept a
waiting call.
CH Set up a call, and On the MS, dial the called number of the new call,
hold the original and then press the Send key.
active call.
CH Alternate from an On the MS, dial "2", and then press the Send key.
active call to a
held call.
CH Retrieve a held On the MS, dial "1", and then press the Send key.
call, and release
an active call.
CH Release a held On the MS, dial "0", and then press the Send key.
call.
CH Release both the On the MS, press the Release key.
active call and the
held call.
Subscribers can also perform the operations through the menus of some mobile phones. For details, see
the user manuals of the mobile phones.
The integrated Gateway Bill (iGWB) integrates the event CDR into the supplementary service
domain of the original mobile originated call (MOC) or mobile terminated call (MTC) CDR
to generate the final MOC or MTC CDR.
Segment charging means that the MSOFTX3000 generates an intermediate MOC or MTC
CDR at the time when a CW notification is generated. The billing center combines the group
of CDRs, and processes other charging. The CW indicator and time stamp are in the last CDR.
The MSOFTX3000 controls the mode for generating CDRs and the frequency for generating
event or intermediate CDRs through the integrated CDR control tables of CHG Parameter 1
Bit 7.
Usually, independent charging is adopted. The following gives an example of independent
charging for the CW service.
The scenario is as follows:
z A in the local office calls B in another office.
z C in another office calls A when A is in conversation with B.
The supplementary service domain in the MOC CDR generated by the local office for the A-B
call records the supplementary service operation. The supplementary service indicator is CW,
and the time stamp is the time when a SETUP message is sent to A.
5.7.2 CH
The MSOFTX3000 provides two ways to generate CDRs for the CW service:
z Independent charging
z Segment charging
Independent charging means that the MSOFTX3000 generates the following CDRs:
z The event CDR containing the CH indicator and time stamp based on the hold and
retrieve operations
z The original MOC or MTC CDR for the whole call
The iGWB integrates the event CDR into the supplementary service domain of the original
MOC or MTC CDR to generate the final MOC or MTC CDR.
Segment charging means that the MSOFTX3000 generates an intermediate MOC or MTC
CDR at the time of the hold and retrieve operations. The billing center combines the group of
CDRs and processes other charging. The CH indicator and time stamp are in the last CDR.
The MSOFTX3000 controls the mode for generating CDRs, and the frequency for generating
event or intermediate CDRs through the integrated CDR control tables of CHG Parameter 1
Bit 7.
Usually, independent charging is adopted. The following gives an example of independent
charging for the CH service.
The scenario is as follows:
z A in the local office calls B in another office.
z A holds the call when A is in conversation with B.
The supplementary service domain in the MOC CDR generated by the local office for the A-B
call records the supplementary service operation. The supplementary service indicator is CH,
and the time stamp is the time when A sends a HOLD message.
CW and CFU The CFU service takes precedence over the CW service.
When a callee who has both the CW and CFU services activated is called,
the incoming call is forwarded unconditionally based on the CFU service,
instead of being processed based on the CW service.
CW and CFB The CW and CFB services are compatible.
If the callee is NDUB, the system directly processes the incoming call
based on the CFB service, without notifying the subscriber.
If the callee is UDUB, the system notifies the subscriber, and the
subscriber determines how to process the incoming call (process it based
on the CFB or CW service).
CW and If both CFNRy and CW services are activated, a subscriber can receive the
CFNRy CW indication when serving as the callee. If the subscriber does not send
any response before the expiry of the No Reply Condition timer, the call is
processed based on the CFNRy service.
CW and CH If both CW and CH services are activated, a subscriber can use the CH
service to answer a waiting call.
If the subscriber is in conversation, and has a call on hold, the subscriber
can still receive a CW indication, but cannot answer the call.
If the subscriber is not in conversation, but has a call on hold, the
subscriber can receive a CW indication.
CW and The CLIP and CW services are compatible.
CLIP If both CLIP and CW services are activated, the incoming call is processed
based on the CW service, and the MS of the subscriber displays the
number of the caller.
CW and The CW and MPTY services are compatible.
MPTY If a subscriber has an active MPTY call, the subscriber can receive a CW
indication when being called.
When holding the MPTY call, the subscriber can answer the waiting call.
CW and The BAIC service takes precedence over the CW service.
BAIC When the BAIC service is activated, the CW service cannot be activated.
The activation of the BAIC service does not affect any waiting call.
CW and The BIC-ROAM service takes precedence over the CW service.
BIC-ROAM When roaming out of the HPLMN, a subscriber cannot activate the CW
service if the BIC-ROAM service is activated. The activation of the
BIC-ROAM service does not affect any waiting call.
Service Interaction
Note:
CFU = call forwarding unconditional; NDUB= network determined user busy; UDUB = user
determined user busy; CFNRy = call forwarding no reply; CLIP = calling line identification
presentation; MPTY = multiparty service; BAIC = barring of all incoming calls; BIC-ROAM = barring
of incoming calls when roaming outside home PLMN country
5.8.2 CH
Table 5-10 lists the interactions between the CH service and other services.
CH and CW If both CW and CH services are activated, a subscriber can use the CH
service to answer a waiting call.
If the subscriber is in conversation, and has a call on hold, the subscriber
can still receive a CW indication, but cannot answer the call.
If the subscriber is not in conversation, but has a call on hold, the
subscriber can receive a CW indication.
CH and The CH and MPTY services are compatible.
MPTY If both CH and MPTY services are activated, a subscriber can hold an
active MPTY call, set up another call, and retrieve the MPTY call after the
new call is complete.
5.9 Reference
5.9.1 Protocols and Specifications
This following specifications and manuals are referred to:
z 3GPP TS 22.083 V4.1.0
z 3GPP TS 23.083 V4.3.0
z 3GPP TS 23.083 V4.0.1
z 3GPP TS 24.008 V4.15.0
z HUAWEI MSOFTX3000 Mobile SoftSwitch Center Configuration Guide
z HUAWEI HLR9820 Home Location Register Subscriber Management
CW Call Waiting
CH Call Hold
Contents
Figures
Tables
Table 6-4 MPTY service operation (For mobile subscriber) ............................................................................ 6-11
Table 6-5 Interactions between the MPTY and the other services....................................................................6-13
6 Multiparty Service
Section Describes
6.1 Service Description The function code, function definition of this feature, and the
benefits that carriers and mobile subscribers can obtain from
this feature.
6.2 Availability The network elements (NEs) that are required for the feature,
whether Licenses are required, and the version requirements
of the NEs.
6.3 Working Principle The functions of the NEs, and networking requirements.
6.4 Service Flow The service flow of the network when providing this feature.
6.5 Data Configuration The data configurations that are required on the
MSOFTX3000 and the UMG8900.
6.6 Service Management The service operations that carriers and mobile subscribers
are required to implement when the network provides this
feature.
6.7 Charging and CDR The charging and the generation of CDRs when the network
provides this feature.
6.8 Service Interaction The relationships and restrictions between this feature and
other services or features.
6.9 Reference The protocols and specifications that this feature must comply
with, and the acronyms and abbreviations of this chapter.
6.1.2 Definition
The served mobile subscriber is the mobile subscriber who can invoke the MPTY. The served mobile
subscriber, namely, the main controller, controls the MPTY when the MPTY is active. The remote party
is the party except the served mobile subscriber in the MPTY calls.
The MPTY provides multiple call connections for one subscriber. That is to say, three or more
than three subscribers can take part in a session at the same time. The maximum number of
subscribers that the MSOFTX3000 can support through the MPTY is six.
When a served mobile subscriber has an active call and an on-hold call, and when both calls
are answered, the served mobile subscriber can invoke the MPTY to combine the two calls to
an MPTY call. In this case, the served mobile subscriber can communicate with the remote
subscriber.
As for the MPTY calls, the served mobile subscriber can realize the following functions:
z Hold the MPTY call and resume the call in subsequent sessions.
z Initiate a new call and hold the MPTY call.
z When there is an MPTY call and a single call, alternate the two types of calls or add the
single call to the MPTY call.
z Set up personal communications with the remote subscribers, namely, session separation.
z Disconnect a remote subscriber.
z Release an MPTY call.
6.1.3 Benefits
Beneficiary Description
6.2 Availability
6.2.1 Requirements for NEs
The MPTY features are realized by co-operations of the UE/MS, MS C Server, MGW, VLR
and HLR, as listed in Table 6-1.
√ - - √ √ - √ √
4. The MS C sends messages to subscriber B and C, to instruct them that the call is
resumed and they can take part in the MPTY service.
5. The MS C sends a message to D, instructing D to take part in the MPTY service.
If the single call (A-D) is an active call, the MPTY call (A-B-C) is an on hold call, then the MS C sends
message to B and C to indicate the call is resumed and instruct B and C to join the MPTY service, and
then sends message to D to instruct D to join the MPTY service.
MS A MS C Server MS B MS C
A wants to build a
mutiparty call
FACILITY
FACILITY
FACILITY
FACILITY
FACILITY
MS A MS C Server MS B MS C
1. If A wants to set up a new call, the MS A sends a FACILITY message containing the
SplitMPTY invoke component to the MS C server.
2. The MS C server sends the FACILITY message to the MS A, indicating that the request
of SplitMPTY is accepted.
3. The MS C server activates the A-B call.
4. The MS C server sends the FACILITY message containing the NotifySS invoke
component to the MS C and MS B. The CallOnHold-indicator in the invoke component
is callOnHold, informing the MS C that the call is on hold.
MS A MS C Server MS B( or C ) MS D
MS A MS C Server A PSTN D
DISCONNECT
REL
RELEASE
RLC
RELEASE COMPLETE
1. When subscriber A wants to disconnect the A-D call, the MS A sends a DISCONNECT
message to the MS C server. The Transaction identifier in the message is instructed to
remove the A-D call.
2. The MS C server A sends a RELEASE message to the MS A to disconnect the A-D call
at the wireless side.
3. The MS C server A sends a REL message to the PSTN C to disconnect the A-D call
between the PSTN C and the PSTN D.
MS A MS C Server A PSTN D
RELEASE
RELEASE COMPLETE
MPTY CALL A-B-C ACTIVE
1. If subscriber D wants to disconnect the call, the PSTN D sends the REL message to the
MS C server A, to instruct it to disconnect the A-D call.
2. The MS C server A sends a RLC message to the PSTN D to disconnect the A-D call
between the MS C server A and the PSTN D.
3. The MS C server A sends a DISCONNECT message to the MS A. The Transaction
identifier in the message instructs to remove the A-D call.
4. The MS A sends the RELEASE message to the MS C server A.
5. The MS C server A sends a RELEASE COMPLETE message to the MS A to disconnect
the A-D call at the wireless side.
Enabling Service
The service availability does not require special configuration data.
Carrier operation HLR Client Provide and cancel the MPTY service.
Mobile subscriber MS Release o- hold calls, release active calls and
operation resume on-hold calls, release remote subscriber,
set up personal communications with remote
subscribers, alternate calls, invoke the MPTY
and add remote subscriber, initiate a new call
and hold the MPTY call, and release all calls.
As for the MPTY service, the service is provided when being activated; and the service is cancelled
when being deactivated.
Steps
For detailed operation steps, see Table 6-4.
Release on-hold calls The subscriber dials 0 on the MS and press the "Send"
button.
Release active calls and The subscriber dials 1 on the MS and press the "Send"
resume on hold calls button.
Release the remote The subscriber dials 1X on the MS and press the "Send"
subscribers resources button. X is the sequence number of remote subscriber. It
starts from 1 and increases based on the sequence of
setting up or answering the calls for the served mobile
subscriber.
Type Step
Set up personal The subscriber dials 2X on the MS and press the "Send"
communications with remote button. X is the sequence number of remote subscriber. It
subscriber starts from 1 and increases based on the sequence of
setting up or answering the calls for the served mobile
subscriber.
Alternate calls The subscriber dials 2 on the MS and press the "Send"
button.
Invoke the MPTY and add the The subscriber dials 3 on the MS and press the "Send"
remote subscriber button.
Initiate a new call and keep The subscriber dials the number of new subscriber on the
the MPTY call MS and press "Send" button.
Release all calls Press "Release" button on the MS.
Some mobile phone can realize the operations list above. For detailed operations, see the mobile phone
instructions.
Table 6-5 Interactions between the MPTY and the other services
Service Interaction
Service Interaction
MPTY and BI If the BI service is activated after invoking the MPTY call, the
incoming call of the MPTY is not affected by the BI service.
However, the incoming call made after activation of BI service is
to be barred if the call meets the barring requirements.
6.9 Reference
6.9.1 Protocols and Specifications
The references of the feature are list as follows:
z 3GPP TS 22.084 V4.1.0
z 3GPP TS 23.084 V4.1.0
z 3GPP TS 24.084 V4..0.0
z HUAWEI MSOFTX3000 Mobile SoftSwitch Center Configuration Guide
Contents
Figures
Figure 7-1 Check flow of the VLR for the BAOC service .................................................................................7-5
Figure 7-2 Check flow of the VLR for the BOIC service...................................................................................7-6
Figure 7-3 Check flow of the VLR for the BOIC-exHC service ........................................................................7-7
Figure 7-4 Check flow of the HLR for the BAIC service ..................................................................................7-8
Figure 7-5 Check flow of the HLR for the BIC-ROAM service ........................................................................7-9
Figure 7-6 BO service flow ..............................................................................................................................7-10
Tables
Table 7-4 Operation modes of the call barring supplementary services ...........................................................7-13
Table 7-5 Operations performed by mobile subscribers ...................................................................................7-13
Table 7-6 Interactions between the BAOC service and other services .............................................................7-15
Table 7-7 Interactions between the BOIC service and other services...............................................................7-16
Table 7-8 Interactions between the BOIC-exHC service and other services ....................................................7-17
Table 7-9 Interactions between the BAIC service and other services...............................................................7-18
Table 7-10 Interactions between the BIC-ROAM service and other services ..................................................7-19
Section Describes
7.1 Service The function code, function definition of this feature, and the benefits
Description that carriers and mobile subscribers can obtain from this feature.
7.2 Availability The network elements (NEs) that are required for the feature, whether
Licenses are required, and the version requirements of the NEs.
7.3 Working The functions of the NEs, and networking requirements.
Principle
7.4 Service Flow The service flow of the network when providing this feature.
7.5 Data The data configurations that are required on the MSOFTX3000 and
Configuration the UMG8900.
7.6 Service The service operations that carriers and mobile subscribers are
Management required to implement when the network provides this feature.
7.7 Charging and The charging and the generation of CDRs when the network provides
CDR this feature.
7.8 Service The relationships and restrictions between this feature and other
Interaction services or features.
7.9 Reference The protocols and specifications that this feature must comply with,
and the acronyms and abbreviations of this chapter.
7.1.2 Definition
Call barring supplementary services allow mobile subscribers to perform barring for incoming
or outgoing calls with special properties.
7.1.3 Types
Call barring services are classified into two types: barring of outgoing calls (BO) and barring
of incoming calls (BI).
The BO service includes:
z Barring of All Outgoing Calls (BAOC is for short.)
z Barring of All Outgoing International Calls (BOIC is for short.)
z Barring of Outgoing International Calls except those directed to the Home PLMN
Country (BOIC-exHC is for short.)
The BI service includes:
z Barring of All Incoming Calls (BAIC is for short.)
z Barring of Incoming Calls When Roaming Outside Home PLMN Country (BIC-ROAM
is for short.)
BAOC
After the service is activated, a mobile subscriber cannot initiate calls.
BOIC
After the service is activated, a mobile subscriber cannot call any subscriber (including
mobile subscriber or fixed network subscriber) outside the country where the caller is.
BOIC-exHC
After the service is activated, a mobile subscriber cannot call any subscribers outside the
country (homing to the PLMN) where the caller roaming. After the subscriber is roaming
outside the country homing to the PLMN, the subscriber can call only subscribers (mobile
subscribers or fixed network subscribers) in homing countries.
BAIC
After the service is activated, a mobile subscriber cannot receive calls.
BIC-ROAM
After the service is activated, a mobile subscriber cannot receive calls when the subscriber is
roaming outside the country homing to the PLMN.
Subscribers can select one or several types of call barring service.
If the service controller is set to subscribers, subscribers can activate or deactivate call barring
services through their handsets. In advance, password must be provided.
7.1.4 Benefits
Beneficiary Description
7.2 Availability
7.2.1 Requirements for NEs
Table 7-2 lists the network elements (NEs) required by the call barring services.
√ √ √ √ √ - √ √
Note:
UE = user equipment; MS = mobile station; BTS = base transceiver station; RNC = radio network
controller; BSC = base station controller; MSC = mobile switching center; MGW = media gateway;
SGSN = serving GPRS support node; VLR = visitor location register; HLR = home location register
The symbol √ indicates that the corresponding NE is required. The hyphen - indicates that the
corresponding NE is not required.
Registration
If the service controller of the call barring services is subscribers, subscribers can modify the
password used for service control through registration. The MSC transparently sends the
registration operation message to the HLR, and then updates the subscription information in
the VLR by inserting subscriber data.
If the activated call barring service conflicts with other activated services, the activation may fail. For
details, see section 7.8 "Service Interaction."
7.3.2 BO
The following section describes the working principle of the BO service.
z A subscriber initiates a call.
z The MSC initiates the operation of fetching subscriber information for outgoing call to
the VLR.
z The VLR checks the service based on BO information of the subscriber and call property
of the outgoing call. Then the VLR sets the call barring indication based on the check
result and sends the indication to the MSC. For service check procedures by the VLR for
BAOC, BOIC and BOIC-exHC services, see Figure 7-1, Figure 7-2 and Figure 7-3.
z The MSC determines whether to perform call barring based on the call barring indication.
If the call barring indication is Yes, the MSC releases the call; if the call barring
indication is No, the MSC processes the call according to normal flow.
Figure 7-1 Check flow of the VLR for the BAOC service
idle
initiate handling of
BAOC
Yes
emergency call
activated for No
basic service
continue call
handling
idle
Figure 7-2 Check flow of the VLR for the BOIC service
idle
Yes
emergency call
No
international call
activated for No
basic service
idle
Figure 7-3 Check flow of the VLR for the BOIC-exHC service
idle
Yes
emergency call
No
international call
destination in Yes
HPLMN country
activated for No
basic service
idle
7.3.3 BI
The following section describes the working principle of the BI service.
z A subscriber initiates a call.
z The (G)MSC initiates the operation of fetching route information to the HLR.
z The HLR checks the service based on BI information of callee and call property of the
incoming call. Then the HLR sets the call barring indication based on the check result.
For service check procedures by the HLR for BAIC and BIC-ROAM services, see Figure
7-4 and Figure 7-5.
z The HLR determines whether to perform call barring based on the call barring indication.
If the call barring indication is Yes, the HLR indicates to reject the call in the response to
the operation of fetching route information; if the call barring indication is No, the HLR
processes the call according to normal flow.
Figure 7-4 Check flow of the HLR for the BAIC service
idle
activated for No
basic service
Yes
idle
Figure 7-5 Check flow of the HLR for the BIC-ROAM service
idle
initiate handling of
BIC-ROAM
Yes
emergency call
international No
call
activated for No
basic service
continue call
handling
idle
MSC server/
MS MSC server
PSTN
SETUP
7.4.2 BI
Figure 7-7 shows the voice BI service flow.
SETUP or
IAM SRI
OR1: Yes
SRI ack(user error=CallBarred)
1. If a caller is an MS, the MS sends the SETUP message to the MSC server. If the caller is
a fixed network subscriber, the PSTN office sends originated call message (such as the
IAM message) to the GMSC server through trunk signaling.
2. The (G)MSC server initiates the SRI operation to the HLR b that callee homes.
3. The HLR b checks the service based on BI service information and call property. Then
the HLR b sets call barring indication based on the check result. For service check
procedure, see Figure 7-4 and Figure 7-5.
4. If the call barring indication is Yes, the HLR b sends the SRI ack message to the
(G)MSC server. The parameter User error in the message is Callbarred.
5. If the caller is an MS, after receiving the SRI ack message, the MSC server b sends the
RELEASE COMPLETE or other release message to the MS. Then the MSC server b
releases the call according to normal flow that is omitted in the figure.
6. If the caller is a fixed network subscriber, the GMSC server sends release message (such
as the REL message) to caller office and releases the call according to normal flow that
is omitted in the figure.
7. If the call barring indication is No, the HLR processes the call according to normal flow.
Operations
On the MS, mobile subscribers can perform the operations listed in Table 7-5.
Operation Step
Type
Operation Step
Type
Activate the On the MS, dial "*33*PW#", and then press the Send key. Of it, PW
BAOC service. refers to call barring service password.
Deactivate the On the MS, dial "#33*PW#", and then press the Send key. Of it, PW
BAOC service. refers to call barring service password.
Activate the On the MS, dial "*331*PW#", and then press the Send key. Of it, PW
BOIC service. refers to call barring service password.
Deactivate the On the MS, dial "#331*PW#", and then press the Send key. Of it, PW
BOIC service. refers to call barring service password.
Activate the On the MS, dial "*332*PW#", and then press the Send key. Of it, PW
BOIC-ExHC refers to call barring service password.
service.
Deactivate the On the MS, dial "#332*PW#", and then press the Send key. Of it, PW
BOIC-ExHC refers to call barring service password.
service.
Activate the On the MS, dial "*35*PW#", and then press the Send key. Of it, PW
BAIC service. refers to call barring service password.
Deactivate the On the MS, dial "#35*PW#", and then press the Send key. Of it, PW
BAIC service. refers to call barring service password.
Activate the On the MS, dial "*351*PW#", and then press the Send key. Of it, PW
BIC-Roam refers to call barring service password.
service.
Deactivate the On the MS, dial "#351*PW#", and then press the Send key. Of it, PW
BIC-Roam refers to call barring service password.
service.
Deactivate all On the MS, dial "#330*PW#", and then press the Send key. Of it, PW
call barring refers to call barring service password.
services.
Deactivate all On the MS, dial "#333*PW#", and then press the Send key. Of it, PW
BO services. refers to call barring service password.
Deactivate all BI On the MS, dial "#353*PW#", and then press the Send key. Of it, PW
services. refers to call barring service password.
z Subscribers can also perform the operations through the menus of some mobile phones. For details,
see the user manuals of the mobile phones.
z The call barring service password is 0000 by default.
Table 7-6 Interactions between the BAOC service and other services
Service Interaction
BAOC and CFU, The forwarding and BAOC services are incompatible.
CFB, CFNRy and If a subscriber activates the forwarding service, it is prohibited to
CFNRc activate the BAOC service.
If a subscriber activates the BAOC service, it is prohibited to
register or activate the forwarding service.
BAOC and CW The BAOC and CW services are compatible.
When a caller activates the BAOC service, no waiting call that has
been initiated is affected.
BAOC and CH The BAOC and CH services are compatible.
After initiating a call that is in call hold status, a caller activates the
BAOC service. The held call still can be invoked. But all new
outgoing calls are inhibited.
BAOC and MPTY After invoking an MPTY call, a subscriber activates the BAOC
service. All outgoing calls in the MPYT call are not affected. All
new outgoing calls are inhibited.
BAOC and CUG The BAOC service enjoys higher priority than the CUG service.
During an outgoing call, a caller activates the BAOC service
without affecting any CUG calls.
7.8.2 BOIC
Table 7-7 lists the interactions between the BOIC service and other services.
Table 7-7 Interactions between the BOIC service and other services
Service Interaction
BOIC and If a subscriber activates the BOIC service, the CFU service registered and
CFU activated to an international number is rejected.
If a subscriber activates the CFU service to an international number, the BOIC
service cannot be activated.
BOIC and If a subscriber activates the BOIC service, the CFB service registered and
CFB activated to an international number is rejected.
If a subscriber activates the CFB service to an international number, the BOIC
service cannot be activated.
If the CFB service is registered to a home country number and both CFB and
BOIC services are activated, when a subscriber is roaming to another country,
the CFB service is unavailable. If the BOIC service is deactivated later, or the
subscriber comes back to the home country, the CFB service auto changes to
available.
BOIC and If a subscriber activates the BOIC service, the CFNRy service registered and
CFNRy activated to an international number is rejected.
If a subscriber activates the CFNRy service to an international number, the
BOIC service cannot be activated.
If the CFNRy service is registered to a home country number and both
CFNRy and BOIC services are activated, when a subscriber is roaming to
another country, the CFNRy service is unavailable. If the BOIC service is
deactivated later, or the subscriber comes back to the home country, the
CFNRy service auto changes to available.
BOIC and If a subscriber activates the BOIC service, the CFNRc service registered and
CFNRc activated to an international number is rejected.
If a subscriber activates the CFNRc service to an international number, the
BOIC service cannot be activated.
If the CFNRc service is registered to a home country number and both CFNRc
and BOIC services are activated, when a subscriber is roaming to another
country, the CFNRc service is unavailable. If the BOIC service is deactivated
later, or the subscriber comes back to the home country, the CFNRc service
auto changes to available.
BOIC and The BOIC and CW services are compatible.
CW When a caller activates the BOIC service, any waiting international call that
has been initiated is affected.
BOIC and After invoking an MPTY call, a subscriber activates the BOIC service. All
MPTY outgoing calls in the MPYT call are not affected. All new outgoing
international calls are inhibited.
BOIC and The BOIC and CH services are compatible.
CH After initiating an international call that is in call hold status, a caller activates
the BOIC service. The held call still can be invoked. But all new outgoing
international calls are inhibited.
Service Interaction
BOIC and The BOIC service enjoys higher priority than the CUG service.
CUG During an outgoing international call, a caller activates the BOIC service
without affecting any CUG calls.
7.8.3 BOIC-exHC
Table 7-8 lists the interactions between the BOIC-exHC service and other services.
Table 7-8 Interactions between the BOIC-exHC service and other services
Service Interaction
Service Interaction
7.8.4 BAIC
Table 7-9 lists the interactions between the BAIC service and other services.
Table 7-9 Interactions between the BAIC service and other services
Service Interaction
BAIC and CFU, The forwarding and BAIC services are incompatible.
CFB, CFNRy and If a subscriber activates the forwarding service, it is prohibited to
CFNRc activate the BAIC service.
If a subscriber activates the BAIC service, it is prohibited to
activate the forwarding service.
BAIC and CW The BAIC service enjoys higher priority than the CW.
When the BAIC service is activated, the CW service cannot be
activated. The activation of the BAIC service does not affect any
waiting call.
Service Interaction
BAIC and MPTY After invoking an MPTY call, a subscriber activates the BAIC
service. All incoming calls in the MPYT call are not affected. All
new incoming calls are inhibited.
BAIC and CH The BAIC and CH services are compatible.
If an incoming call has been in call hold status, a callee activates
the BAIC service. The held call still can be invoked. But all new
incoming calls are inhibited.
BAIC and CUG The BAIC service enjoys higher priority than the CUG service.
During receiving incoming call, a callee activates the BAIC service
without affecting any CUG calls.
7.8.5 BIC-ROAM
Table 7-10 lists the interactions between the BIC-ROAM service and other services.
Table 7-10 Interactions between the BIC-ROAM service and other services
Service Interaction
BIC-ROAM The CFU service enjoys higher priority than the BIC-ROAM service.
and CFU If a subscriber has activated the BIC-ROAM service, when the subscriber
activates the CFU service, the activation can be successful. But the
BIC-ROAM service changes to static status.
If a subscriber has activated the CFU service, when the subscriber
registers the BIC-ROAM service, the activation is unsuccessful.
BIC-ROAM If a subscriber has activated the BIC-ROAM service and the BIC-ROAM
and CFB service is in operational status, when the subscriber activates the CFB
service, the activation is rejected.
If a subscriber has activated the BIC-ROAM service but the BIC-ROAM
service is in static status, the CFB service can be activated after
registration. If the BIC-ROAM service changes to operational status
later, the CFB auto changes to static status.
If a subscriber is roaming outside HPLMN and the subscriber activates
the CFB service that is in operational status, it is prohibited to activate
the BIC-ROAM service.
If a subscriber is roaming outside HPLMN and the subscriber activates
the CFB service that is in static status, the BIC-ROAM can be activated.
Service Interaction
BIC-ROAM If a subscriber has activated the BIC-ROAM service and the BIC-ROAM
and CFNRy service is in operational status, when the subscriber activates the CFNRy
service, the activation is rejected.
If a subscriber has activated the BIC-ROAM service but the BIC-ROAM
service is in static status, the CFNRy service can be activated after
registration. If the BIC-ROAM service changes to operational status
later, the CFNRy auto changes to static status.
If a subscriber is roaming outside HPLMN and the subscriber activates
the CFNRy service that is in operational status, it is prohibited to activate
the BIC-ROAM service.
If a subscriber is roaming outside HPLMN and the subscriber activates
the CFNRy service that is in static status, the BIC-ROAM can be
activated.
BIC-ROAM If a subscriber has activated the BIC-ROAM service and the BIC-ROAM
and CFNRc service is in operational status, when the subscriber activates the CFNRc
service, the activation is rejected.
If a subscriber has activated the BIC-ROAM service but the BIC-ROAM
service is in static status, the CFNRc service can be activated after
registration. If the BIC-ROAM service changes to operational status
later, the CFNRc auto changes to static status.
If a subscriber is roaming outside HPLMN and the subscriber activates
the CFNRc service that is in operational status, it is prohibited to activate
the BIC-ROAM service.
If a subscriber is roaming outside HPLMN and the subscriber activates
the CFNRc service that is in static status, the BIC-ROAM can be
activated.
BIC-ROAM The BIC-ROAM and CH services are compatible.
and CH When a callee is roaming outside an HPLMN and the callee activates the
BIC-ROAM service, if an incoming call has been in call hold status, the
held call still can be invoked. But all new incoming calls are inhibited.
BIC-ROAM When a subscriber is roaming outside an HPLMN, if the subscriber
and MPTY activates the BIC-ROAM service after invoking an MPTY call, all
incoming calls in the MPYT call are not affected. All new incoming calls
are inhibited.
BIC-ROAM The BIC-ROAM service enjoys higher priority than the CUG service.
and CUG If a callee is roaming outside an HPLMN, during receiving incoming
call, the callee activates the BIC-ROAM service without affecting any
CUG calls.
7.9 Reference
7.9.1 Protocols and Specifications
This following specifications and manuals are referred to:
z 3GPP TS 22.088 V4.1.0
z 3GPP TS 23.088 V4.1.0
z 3GPP TS 24.088 V4.0.2
z 3GPP TS 24.008 V4.15.0
z 3GPP TS 29.002 V4.15.0
z HUAWEI MSOFTX3000 Mobile SoftSwitch Center Configuration Guide
z HUAWEI HLR9820 Home Location Register Operation Manual – Subscriber
Management
Contents
Figures
Figure 8-1 Invoking the ECT when A-B call is on hold and A-C call is in the active state................................8-5
Figure 8-2 Invoking the ECT when C is in the alerting state .............................................................................8-6
Tables
Section Describes
8.1 Service The function code, function definition of this feature, and the benefits
Description that carriers and mobile subscribers can obtain from this feature.
8.2 Availability The network elements (NEs) that are required for the feature, whether
Licenses are required, and the version requirements of the NEs.
8.3 Working The functions of the NEs, and networking requirements.
Principle
8.4 Service Flow The service flow of the network when providing this feature.
8.5 Data The data configurations that are required on the MSOFTX3000 and
Configuration the UMG8900.
8.6 Service The service operations that carriers and mobile subscribers are
Management required to implement when the network provides this feature.
8.7 Charging and The charging and the generation of CDRs when the network provides
CDR this feature.
8.8 Service The relationships and restrictions between this feature and other
Interaction services or features.
8.9 Reference The protocols and specifications that this feature must comply with,
and the acronyms and abbreviations of this chapter.
8.1.2 Definition
When the served mobile subscriber A has two on-going calls respectively with subscribers B
and C, subscriber A can use the ECT function to connect B and C, and then A exits the call.
The call between A and B (A-B call) or the call between A and C (A-C call) can be an
incoming call or an outgoing call. Before the ECT is triggered, the A-B call and A-C call can
be in the active state at the same time, or one of them is in the active state and the other is in
the alerting state.
8.1.3 Benefits
Table 8-2 gives the benefits of the ECT.
Carrier Value added services are provided and call connection rate is increased.
Mobile After the ECT function is provided, subscriber A can transfer a call to
subscriber another subscriber during the conversation. In this case, subscriber A can
flexibly determine the callee and the location of the callee.
8.2 Availability
8.2.1 Requirements for NEs
Table 8-3 gives the required Network Elements (NEs) for the ECT.
√ - - √ - - - √
The A-B Call Is in the Active State and the A-C Call Is in the Alerting State
The A-B call is in the active state. A holds the call with B and calls C. C is in the alerting state.
The working principle is as follows:
1. The MS A sends the FACILITY message to the MSC to prompt subscriber A to invoke
the ECT.
2. The MSC receives the FACILITY message and queries the subscription information of
subscriber A. If the ECT is to be provided, the MSC then handles the ECT service.
3. The MSC sets up the B-C call.
4. The MSC sends a notification to subscriber B to inform B of call recovery and call
transfer. (The B-C call is in the alerting state.)
5. The MSC sends a notification to subscriber C to inform C of call transfer. (The B-C call
is in the alerting state.)
6. The MSC returns the response message and disconnection request to subscriber A. Then
subscriber A exits the call.
7. After subscriber C answers the call, the MSC sends a notification to subscriber B to
inform B that the call is in the active state.
If the mobile phone does not support the ECT service, invoke it through the unstructured supplementary
service data (USSD).
Figure 8-1 Invoking the ECT when A-B call is on hold and A-C call is in the active state
MS A MSC server MS B MS C
FACILITY
FACILITY
FACILITY
FACILITY
FACILITY
DISCONNECT
DISCONNECT
B-C CALL ACTIVE
8.4.2 A-B Call Is in the Active State and A-C Call Is in the Alerting
State
The carrier provides the ECT service for subscriber A. A holds the call with B and calls C. C
is in the alerting state. Subscribers A, B and C belong to the same MSC server. Figure 8-2
shows the ECT service flow.
FACILITY
FACILITY
FACILITY
FACILITY
FACILITY
DISCONNECT
DISCONNECT
C waits to answer
CONNECT
FACILITY
CALL B-C ACTIVE
Suggested change: For the ECT service, the service is provided when it is activated; and the service is
cancelled when it is deactivated.
Operation Steps
To invoke the ECT, perform the following steps:
Step 1 Dial 4 on the MS.
Step 2 Press the send button.
----End
z For certain MS, the ECT can be invoked through the menu. Refer to the instruction of the mobile
phone for detailed operations.
z If the MS does not support this mode, invoke the ECT through the USSD.
z To set the CHG parameter Bit 5 (P134), refer to the software parameter table.
z To set the CDR control table, refer to the corresponding online help.
During the A-B The Call Hold There is no The ECT There is no
call, A holds (CH) and ECT record in the operation is record in the
the call with B operations are supplementary recorded in the supplementary
and calls C. recorded in the service field. supplementary service field.
After C supplementary Start time: B service field. Start time: C
answers the service field. answers the Start time: C answers the
call, A invokes Start time: B call. answers the call.
the ECT. answers the call. End time: The call. End time: The
The B-C call is End time: The B-C call is End time: The B-C call is
disestablished. B-C call is disconnected. B-C call is disconnected.
disconnected. disconnected.
During the The first CDR: There is no The first CDR: There is no
A-B call, A The CH record in the There is no record in the
holds the call operation is supplementary record in the supplementary
with B and recorded in the service field. supplementary service field.
calls C. supplementary Start time: B service field. Start time: C
After C service field. answers the Start time: C answers the
answers the Start time: B call. answers the call. call.
call, A invokes answers the call. End time: The End time: The
the ECT. End time: The
End time: A B-C call is B-C call is B-C call is
The B-C call is invokes the disconnected. disconnected. disconnected.
disconnected. ECT.
Interval CDR: Interval CDR:
The ECT The ECT
operation is operation is
recorded in the recorded in the
supplementary supplementary
service field. service field.
Start time: A Start time: A
invokes the invokes the
ECT. ECT.
End time: The End time: The
B-C call is B-C call is
disconnected. disconnected.
During the The first CDR: There is no The first CDR: There is no
A-B call, A The CH record in the There is no record in the
holds the call operation is supplementary record in the supplementary
with B and recorded in the service field. supplementary service field.
calls C. supplementary Start time: B service field. Start time: C
After C is in service field. answers the Start time: C answers the
the alerting Start time: B call. answers the call. call.
state, A answers the call. End time: The End time: The
invokes the End time: The
End time: A B-C call is B-C call is B-C call is
ECT. disconnected. disconnected.
invokes the disconnected.
The B-C call is ECT.
Service Interaction
ECT and CLIP If A is the caller in the A-B call and B (or C) registers with the CLIP, the
number of C (or B) must be sent to B (or C). But if C (or B) also
registers with the CLIP, the number need not be sent to B (or C).
If the A-C call is established before the ECT, the number of C must be
sent to B after A invokes the ECT. If the A-C call is established after the
ECT, the number of C must be displayed during the connection.
If B (or C) is the callee and (or C) registers with the CLIP (OVERRIDE
CATEGORY CLIP) service, the number of the peer end is displayed
after the ECT is invoked.
Service Interaction
ECT and CLIR If B is the caller in the A-B call and registers with the CLIR. The
number of B must not be sent to C.
ECT and COLP If B is the caller in the A-B call and B (or C) registers with the COLP,
the number of C (or B) must be sent to B (or C). But if C (or B) also
registers with the COLP, the number is not required to be sent to B (or
C).
If the A-C call is established before the ECT, the number of C must be
sent to B after A invokes the ECT. If the A-C call is established after the
ECT, the number of C must be displayed during the connection.
If B (or C) is the caller and B (or C) registers with the COLP
(OVERRIDE CATEGORY COLP) service, the number of the peer end
is displayed after the ECT is invoked.
ECT and COLR If A is the caller in the A-B call and B registers with the COLR service,
the number of B must be hidden to C. If A is the caller in the A-C call
and C registers with the COLR, the number of C must be hidden to B.
ECT and CFB If C registers with the CFB, the call is forwarded to D on C busy.
ECT and If C registers with the CFNRy, the call is forwarded to D when C does
CFNRy not answer the call. The CFNRy timer is not restarted during the call
forwarding.
ECT and The ECT and CFNRc services do not affect each other.
CFNRc
ECT and CW If A is in idle state after invoking the ECT, there will be no CW
indication.
If A has a CW before the ECT, process it as an ordinary terminated call.
If C registers with the CW and the A-C call is in the waiting state, B will
receive the CW indication after the ECT.
ECT and Both the MPTY originating party and remote party cannot invoke the
MPTY ECT.
ECT and AoC The ECT and AoC services conflict with each other.
ECT and The cheating prevention feature prevents the subscribers from owing fee
cheating by continuously invoking the ECT.
prevention
8.9 Reference
8.9.1 Protocols and Specifications
Refer to the following references:
z 3GPP TS 22.091 V4.0.0
z 3GPP TS 23.091 V4.0.0
Contents
Tables
9 ODB Service
Section Describes
9.1 Service The function code, function definition of this feature, and the benefits
Description that carriers and mobile subscribers can obtain from this feature.
9.2 Availability The network elements (NEs) that are required for the feature, whether
Licenses are required, and the version requirements of the NEs.
9.3 Working The functions of the NEs, and networking requirements.
Principle
9.4 Service Flow The service flow of the network when providing this feature.
9.5 Data The data configurations that are required on the MSOFTX3000 and
Configuration the UMG8900.
9.6 Service The service operations that carriers and mobile subscribers are
Management required to implement when the network provides this feature.
9.7 Charging and The charging and the generation of CDRs when the network provides
CDR this feature.
9.8 Service The relationships and restrictions between this feature and other
Interaction services or features.
9.9 Reference The protocols and specifications that this feature must comply with,
and the acronyms and abbreviations of this chapter.
9.1.2 Definition
The Operator Determined Barring (ODB) is kind of service through which the PLMN
operator determines the access capability of the users to the UMTS or GSM network.
The ODB is similar to the call restriction supplementary service. The differences between these two
services are as follows:
z The service state of the user subscribing to ODB is determined by the operator, and that of the latter
type can be determined by both the operator and the user.
z The ODB service is activated once it is provided to the user, and the latter type must be activated by
the user.
− Deregistration
− Activation
− Deactivation
− Querying
− Invocation
z Barring of user registration of call forwarding services
z Barring of call transfer service
9.1.4 Benefits
Beneficiary Description
Carrier The ODB service helps the operator manage the users regarding all
kinds of services based on actual situation.
Mobile None.
subscriber
9.2 Availability
9.2.1 Requirement for NEs
The ODB requires the corporation of the MSC server, VLR, HLR, SGSN, and GGSN.
Table 9-2 lists the NEs related with the ODB services.
– – – √ – √ √ √ √
Procedure of Barring of SM MT
The HLR checks whether the user subscribes to the ODB barring of SM MT after receiving a
routing request from an MS. If the user subscribes to this service, the HLR sends a refusing
message that contains error message to the MSC (or GMSC). The MSC (or GMSC) then
sends the error message to the related short message center.
activated, the MSC refuses the call request of the user and returns a refusing message which
contains the cause value.
The MSC needs to analyze the number of the called party to determine whether the following
types of calls are barred:
z International calls
z Outgoing international calls except the home PLMN country
z Premium rate calls
If a user subscribes to BOC-ROAM and roams to non-HPLMN countries, the MSC/HLR bars
all the calls originated by this user and returns a refusing message which contains the cause
value.
z You can add service check by using the command ADD SRVCHK. You can perform
service check through certain call prefix and determines whether to connect the call
based on the check result.
Terminal service and ODB can be applied to all terminal services and bearer services
bearer service except emergency call.
Supplementary ODB has higher priority over supplementary services. If the ODB
services conflicts with supplementary services, the supplementary services
will be barred.
ODB and call If the ODB barring of call forwarding is activated, the user is not
forwarding allowed to register call forwarding services.
ODB and CUG The HLR (incoming calls) or the VLR (outgoing calls) checks the
ODB service state and then the CUG service state when it
receives a call request.
ODB and call barring The HLR (incoming calls) or the VLR (outgoing calls) checks the
ODB service state and then the call barring service state when it
receives a call request.
9.9 Reference
9.9.1 Protocols and Specifications
This document takes the following protocols and manual as references:
z 3GPP TS 22.091 V4.0.0
z 3GPP TS 23.091 V4.0.0
z 3GPP TS 24.091 V4.0.1
z HUAWEI MSOFTX3000 Mobile Softswitch Center Configuration Guide
Contents
10 Authentication Feature..........................................................................................................10-1
10.1 Service Description ...................................................................................................................................10-2
10.1.1 Function Code..................................................................................................................................10-2
10.1.2 Definition .........................................................................................................................................10-2
10.1.3 Benefits ............................................................................................................................................10-2
10.2 Availability ................................................................................................................................................10-3
10.2.1 Requirements for NEs......................................................................................................................10-3
10.2.2 Requirements for License ................................................................................................................10-3
10.2.3 Applicable Versions..........................................................................................................................10-3
10.3 Working Principle......................................................................................................................................10-3
10.4 Service Flow..............................................................................................................................................10-4
10.4.1 UMTS Authentication ......................................................................................................................10-4
10.4.2 GSM Authentication ........................................................................................................................10-5
10.5 Data Configuration....................................................................................................................................10-7
10.5.1 Data Configuration on MSOFTX3000.............................................................................................10-7
10.5.2 Data Configuration on HLR.............................................................................................................10-7
10.6 Service Management .................................................................................................................................10-7
10.6.1 Subscription of Authentication.........................................................................................................10-7
10.6.2 Query of Authentication...................................................................................................................10-7
10.7 Reference ..................................................................................................................................................10-7
10.7.1 Protocols and Specifications ............................................................................................................10-7
10.7.2 Glossary, Acronyms and Abbreviations ...........................................................................................10-8
Figures
Tables
Table 10-1 Function names and functions codes in the authentication and encryption ....................................10-2
Table 10-2 Benefits for carriers and mobile subscribers...................................................................................10-2
Table 10-3 NEs involved in the authentication and encryption ........................................................................10-3
Table 10-4 Versions of the products that support the authentication and encryption........................................10-3
10 Authentication Feature
Section Describes
10.1 Service The function code, function definition of this feature, and the benefits
Description that carriers and mobile subscribers can obtain from this feature.
10.2 Availability The network elements (NEs) that are required for the feature,
whether Licenses are required, and the version requirements of the
NEs.
10.3 Working The functions of the NEs, and networking requirements.
Principle
10.4 Service Flow The service flow of the network when providing this feature.
10.5 Data The data configurations that are required on the MSOFTX3000 and
Configuration the UMG8900.
10.6 Service The service operations that carriers and mobile subscribers are
Management required to implement when the network provides this feature.
10.7 Reference The protocols and specifications that this feature must comply with,
and the acronyms and abbreviations of this chapter.
Table 10-1 Function names and functions codes in the authentication and encryption
Name Code
Note:
GSM = Global System for Mobile communications;
UMTS = Universal Mobile Telecommunications System
10.1.2 Definition
Authentication is a process used for a network to verify the validity of an UE. In the UMTS,
an UE can also verify the validity of a network. Authentication, as part of the security
management of a wireless network, guarantees the confidentiality and integrity of the wireless
network, so that illegal subscribers cannot use the services that the network provides.
10.1.3 Benefits
Table 10-2 lists the benefits for carriers and mobile subscribers.
Note:
MS = mobile station; UE = user equipment
10.2 Availability
10.2.1 Requirements for NEs
The authentication and encryption requires the cooperation of the UE/MS, base station
subsystem (BSS) , radio access network (RAN) and core network (CN). For details, see Table
10-3.
√ √ √ √ √ √ - √ √
Table 10-4 Versions of the products that support the authentication and encryption
Product Applicable version
6. The UE calculates the authentication parameters XMAC and SQNMS at the UE side,
based on the RAND and AUTN returned by the VLR. The UE then compares the XMAC
and SQNMS with the MAC and SQNHE in AUTN.
− If MAC is not equal to XMAC, the authentication of the UE to the network fails. In
this case, the VLR reports the authentication failure message to the AuC.
− If the difference between SQNMS and SQNHE is not within the specific range, it
means the authentication of the UE to the network fails. In this case, the VLR sends a
re-synchronization message to the AuC. The re-synchronization flow is similar to the
flow of obtaining authentication set from the AuC. The difference is that the
MAP_SEND_AUTHENTICATION_INFO message carries the re-synchronization
information containing AUTS and RAND. After receiving the re-synchronization
message, the AuC calculates MAC based on the RAND in the message, and compares
the MAC with the MAC-S in AUTS, to judge whether the re-synchronization is valid.
The AuC adjusts its own SQNHE based on the SQNMS in AUTS, and calculates a
new group of authentication values for the VLR. The VLR starts authentication again
with the new group of authentication values, and returns AUTN and RAND to the UE.
After that, steps 3 and 4 are repeated.
− If the validity verification succeeds, then the authentication succeeds.
7. The UE calculates XRES based on the AUTN and RAND returned from the VLR, and
sends an authentication response carrying XRES to the VLR.
8. The VLR compares the XRES returned by the UE with the XRES calculated by the AuC.
− If the two values are different, the VLR sends an authentication rejection response to
the UE. The UE receives the response. This means the UE is invalid and the
authentication fails.
− If the two values are the same, the authentication of the network to the UE succeeds.
In this case, the network sends a response to the UE, indicating that the service or
location update is accepted.
When a UMTS subscriber roams in the GSM, the AuC may return a quintuple to the VLR. In this case,
the VLR must transform the quintuple to a triplet. After that, the VLR returns the ciphering key
sequence number (CKSN) together with the RAND in the triple to the MS.
10.7 Reference
10.7.1 Protocols and Specifications
z 3GPP TS 33.102: <3rd Generation Partnership Project; Technical Specification Group
Services and System Aspects;3G Security; Security Architecture>
z 3GPP TS 29.002: <3rd Generation Partnership Project; Technical Specification Group
Core Network; Mobile Application Part (MAP) specification;>
Contents
Figures
Figure 11-4 Mapping between the MSRN or HON allocation tables............................................................... 11-9
Tables
Table 11-4 Applicable versions of HUAWEI wireless core network products ................................................. 11-5
Section Describes
11.1 Service The function code, function definition of this feature, and the benefits
Description that carriers and mobile subscribers can obtain from this feature.
11.2 Availability The network elements (NEs) that are required for the feature, whether
Licenses are required, and the version requirements of the NEs.
11.3 Working The functions of the NEs, and networking requirements.
Principle
11.4 Service Flow The service flow of the network when providing this feature.
11.5 Data The data configurations that are required on the MSOFTX3000 and
Configuration the UMG8900.
11.6 Service The service operations that carriers and mobile subscribers are
Management required to implement when the network provides this feature.
11.7 Charging and The charging and the generation of CDRs when the network provides
CDR this feature.
11.8 Service The relationships and restrictions between this feature and other
Interaction services or features.
11.9 Reference The acronyms and abbreviations in this chapter.
11.1.2 Definition
Overview
The mobile station roaming number (MSRN) is used by the mobile switching center (MSC) to
address callees.
When the mobile station (MS) receives a call, the system instructs the visitor location register
(VLR) to allocate a temporary MSRN to the MS based on the request of the home location
register (HLR). An MSRN has a validity period, and the default value is 90 seconds. You can
set the validity period in the VLR configuration table.
There are several modes for allocating MSRNs. The parameter MSRN allocation mode
specifies the mode adopted by the VLR to allocate roaming numbers for the mobile
subscribers roaming to the local office. The default value is Allocate randomly. There are
three MSRN allocation modes:
z Allocation based on the MSC number
z Allocation based on the LAI number
z Random allocation
The mode of random allocation enables you to allocate roaming numbers based on the
attribute of the call or the callee.
The VLR can allocate specific roaming number resources through different allocation modes
to meet various requirements.
Generally, the mode of random allocation can meet the requirements of networking except for certain
special cases:
z In the multi-area network, you are recommended to set MSRN allocation mode to Allocate
according to MSC number.
z When the location area identification (LAI) number is used for charging, you are recommended to
set MSRN allocation mode to Allocate according to LAI number.
When the home HLR of a mobile subscriber requests the local MSC or VLR to allocate an
MSRN for the mobile subscriber, the local MSC or VLR allocates an idle MSRN randomly
from the MSRN pool to which the MSC number of the callee corresponds.
The mapping between the MSRN and the MSC number is configured by using the command ADD
MHMSCCFG.
The mapping between the MSRN and the LAI number is configured by using the command ADD
MHLAICFG.
Random Allocation
The VLR does not range the MSRN resources that the local VLR can use in advance. When
the home HLR of a mobile subscriber requests the local MSC or VLR to allocate an MSRN
for the mobile subscriber, the local MSC or VLR allocates an idle MSRN randomly from all
the MSRN pools that the local MSC or VLR can use.
For the mode of random allocation, the VLR adds an extended function to the enhanced
MSRN allocation service. The VLR divides roaming numbers into two types based on the
attributes of the numbers:
z Intra-province roaming number
The numbers of which MSRN/HON number type is set to MSRN and HON or MSRN
are intra-province roaming numbers.
z Inter-province roaming numbers
Inter-province roaming numbers are configured by using the command ADD
IMHSUFFIX.
Inter-province roaming numbers are classified into four types based on the attribute of
the callee. The numbers of which MSRN/HON number type is set to any of the
following values are inter-province roaming numbers:
− MSRN outer province Is_O_CSI roaming type
− MSRN outer province No_O_CSI roaming type
− MSRN outer province Is_O_CSI local type
− MSRN outer province No O_CSI local type
When a roaming number is requested for an inter-province incoming call, the VLR
allocates a roaming number from the corresponding roaming number resource pool
based on the attribute of the callee.
If the related inter-province roaming numbers are used up, the VLR allocates an
intra-province roaming number so that the incoming call can be connected to the office.
11.1.3 Benefits
Table 11-2 lists the beneficiaries and description of the benefits.
Carriers Carriers can choose the allocation mode based on their requirements. In
this way, the subscriber types are analyzed more effectively, and the
customer satisfaction rate is improved.
Mobile None.
subscribers
11.2 Availability
11.2.1 Requirements for NEs
Table 11-3 lists the network elements (NEs) required by the enhanced MSRN allocation
service.
- - - √ - - √ √
Note:
UE = user equipment; MS = mobile station; BTS = base transceiver station; RNC = radio network
controller; BSC = base station controller; MGW = media gateway; SGSN = serving GPRS support node
The symbol √ indicates that the corresponding NE is required. The hyphen - indicates that the
corresponding NE is not required.
Messages are exchanged between the MSC server, VLR, and HLR through the Mobile Application Part
(MAP) protocol.
The VLR and HLR exchange and transfer the requests for MSRN allocation.
The MSC server performs the following functions:
z Exchanges information with the VLR and HLR through the C/D interface
z Checks the status of subscribers
z Conveys flag bits to the VLR
The VLR allocates an MSRN based on the configuration in the MSC server, and records the
information required after the call is connected.
Figure 11-1 shows the simple MSRN allocation procedure.
Caller
(1)
(2)
(G)MSC server
(5)
HLR
(4)
(10) (6)
(3) (9)
(7)
(8)
VLR VMSC server Callee
6. The (G)MSC server sends a request for setting up the call to the VMSC server of the
callee based on the MSRN.
7. The VMSC sever queries the VLR for the subscription information of the callee.
8. After receiving the subscription information of the callee, the VMSC server checks the
information, and sends a paging request to the callee.
9. The callee sends a response to the MSC of the callee.
10. The MSC of the callee analyzes access data, and sets up the call with the caller side. The
UE of the callee rings.
MSRN allocation is processed at the callee side in the module. This section does not give details.
MAP_PROVIDE_ROAMING_NUMBER_IND
[GMSC NO]
VP_VDB_GetCBData_PRN_VLR_Req
MAP_VLR_GetCBData_PRN_RSP
[CB_STATUS_PRN]
Request MSRN after subscriber status check
VP_VDB_MSRNAllocate_Req
MAP_VLR_MSRNAllocate_RSP
MAP_PROVIDE_ROAMING_NUMBER_RSP
[msrn]
[msrn]
The VLR and HLR exchange and transfer the requests for MSRN allocation.
z The MSC server completes the interaction between the C/D interfaces of the VLR and
the HLR, checks subscriber status, and conveys flag bits to the VLR.
z The VLR allocates an MSRN based on the configuration in the MSC server, and records
the information required after the call is connected.
VP_VDB_GetCBData_PRN_VLR_Req
[Province Flag]
MAP_VLR_GetCBData_PRN_RSP
[CB_STATUS_PRN]
Transfer the flag to the VLR after subscriber
status check
VP_VDB_MSRNAllocate_Req
[Province] Flag
MAP_VLR_MSRNAllocate_RSP
MAP_PROVIDE_ROAMING_NUMBER_RSP
[msrn] [msrn]
The MSC server works with the HLR and VLR to realize the enhanced MSRN allocation
function through the C/D interfaces.
z The MSC server analyzes the attribute of an incoming call. When receiving a request for
allocating a roaming number from the HLR, the MSC server judges whether the
incoming call is an inter-province call based on the gateway MSC (GMSC) number in
the request. The MSC server then stores the Province Flag in the MAP table so as to
transfer the flag to the VLR when allocating a roaming number.
z The VLR judges whether to use the inter-province roaming number resources based on
the Province Flag in the request for allocating a roaming number, and then allocates a
roaming number based on the attribute of the callee. If the inter-province roaming
number resources of the callee are used up, the VLR allocates an intra-province roaming
number so that the incoming call can be configured with a roaming number.
z The HLR must carry the GMSC number of the callee; otherwise, the MSC server cannot
judge whether the incoming call is an inter-province call. In this case, the MSC server
regards the incoming call as an inter-province call by default.
ADD/MOD VLRCFG
ADD MHLAICFG
[LAI Number]
ADD MHSUFFIX/IMHSUFFIX [Preferable Suffix Index]
ADD MHPREFIX
[MSRN Suffix Index]
[MSRN Prefix Index] [MSRN Prefix Index]
[MSRN Prefix] [MSRN Suffix Start] ADD MHMSCCFG
[MSRN Suffix Length] [MSRN Suffix End]
[MSRN Number Type] [MSC Number]
[Preferable Suffix Index]
As shown in Figure 11-4, the MSRN or HON Prefix table, the MSRN or HON Suffix table,
and the Inner MSRN or HON Suffix table are mandatory. The Mapping Between LAI and
MSRN or HON table and the Mapping Between MSC and MSRN or HON table are
applicable to different allocation modes. The mapping between the tables connected by the
broken line is as follows:
z The MSRN or HON allocation mode is determined based on the parameter MSRN
allocation mode or HON allocation mode in the VLR Configuration table.
z The command ADD MHLAICFG or ADD MHMSCCFG is selected to configure the
data.
Both the MHSUFFIX commands and the IMHSUFFIX commands are used to configure the MSRN or
HON Suffix table, but they configure different types of roaming numbers. The differences are as
follows:
z The IMHSUFFIX commands can configure inter-province roaming numbers.
z The MHSUFFIX commands cannot configure the inter-province roaming numbers.
Configuration Steps
To configure an MSRN or HON, perform the following steps:
Step 1 Run ADD VLRCFG to configure the basic functions of the VLR. The default allocation
mode is Allocate randomly.
Step 2 Run ADD MHPREFIX to configure the prefix of the MSRN.
Step 3 Run ADD MHSUFFIX to configure the suffix of the MSRN.
Step 4 To allocate an MSRN or HON based on the LAI number or the MSC number, modify the
allocation mode by running MOD VLRCFG.
Step 5 To enable the extended MSRN allocation function for the mode of random allocation, run
MOD MSFP to change the value of BIT of VLR software parameter 1 to 1 from 11. Thus
the roaming number resources are re-allocated, and the function of allocation based on the
attributes of the call and the callee is enabled.
Step 6 Run ADD IMHSUFFIX to add, or MOD IMHSUFFIX to modify the intra- and
inter-province roaming numbers.
This step is applicable only when the extended MSRN allocation function for the mode of random
allocation is enabled.
Step 7 Run ADD MSRNCTR to configure the GMSC connected to the local office in the case of an
intra-province incoming call. This step is optional.
This step is applicable only when the MSRN allocation control function is enabled.
Step 8 For the mode of allocation based on the MSC number, run ADD MHMSCCFG to add the
mapping between the MSC number and the MSRN or HON.
Step 9 For the mode of allocation based on the LAI number, run ADD MHLAICFG to add the
mapping between the LAI number and the MSRN or HON.
----End
z Inner MSRN/HON suffix ID is set to 3, Start MSRN/HON suffix to 600, and End
MSRN/HON suffix to 699.
z Inner MSRN/HON suffix ID is set to 4, Start MSRN/HON suffix to 700, and End
MSRN/HON suffix to 799.
z Inner MSRN/HON suffix ID is set to 5, Start MSRN/HON suffix to 800, and End
MSRN/HON suffix to 899.
z The number of the GMSC connected to the MSOFTX3000 is 8613901105.
Scripts
The scripts are as follows:
Step 1 Modify VLR configuration.
Step 9 Enable the extended MSRN allocation function of the VLR for the mode of random
allocation.
Description Enable the extended MSRN allocation function of the VLR for the mode of
random allocation.
Script MOD MSFP: ID=P200, MODTYPE=P1, BIT=11, BITVAL=1;
----End
Scenario 2
The local MSOFTX3000 serves as the MSC server of the peer office. MSRN allocation
mode is set to Allocate according to LAI number. There are two number ranges:
z The MSRN or HON of the cell in the 2G network ranges from 86136000040001 to
86136000040999. MSRN/HON prefix ID is set to 0, MSRN/HON suffix ID to 0, and
LAI number to 460000001.
z The MSRN or HON of the cell in the 3G network ranges from 86136000041000 to
86136000041999. MSRN/HON prefix ID is set to 0, MSRN/HON suffix ID to 1, and
LAI number to 460000003.
Scripts
The scripts are as follows:
Step 1 Modify VLR configuration.
Step 7 Add mapping between the LAI number and the MSRN or HON.
Description You must add a cell first. The MSRN or HON of the cell in the 2G network
ranges from 86136000040001 to 86136000040999. To add mapping
between the LAI number and the MSRN or HON, set LAI number to
460000001, and MSRN/HON suffix ID to 0.
Script ADD MHLAICFG: LAINUM="460000001", PRESUFFINDEX=0;
Step 8 Add mapping between the LAI and the MSRN or HON.
Description You must add a cell first. The MSRN or HON of the cell in the 3G network
ranges from 86136000041000 to 861360000419999. To add mapping
between the LAI number and the MSRN or HON, set LAI number to
460000003, and MSRN/HON suffix ID to 1.
Script ADD MHLAICFG: LAINUM="460000003", PRESUFFINDEX=1;
----End
11.9 Reference
11.9.1 Protocols and Specifications
None.
Contents
Figures
Tables
Section Describes
12.1 Service The function code, function definition of this feature, and the benefits
Description that carriers and mobile subscribers can obtain from this feature.
12.2 Availability The network elements (NEs) that are required for the feature,
whether Licenses are required, and the version requirements of the
NEs.
12.3 Working The functions of the NEs, and networking requirements.
Principle
12.4 Service Flow The service flow of the network when providing this feature.
12.5 Data The data configurations that are required on the MSOFTX3000 and
Configuration the UMG8900.
12.6 Service The service operations that carriers and mobile subscribers are
Management required to implement when the network provides this feature.
12.7 Charging and The charging and the generation of CDRs when the network provides
CDR this feature.
12.8 Service The relationships and restrictions between this feature and other
Interaction services or features.
12.9 Reference The protocols and specifications that this feature must comply with,
and the acronyms and abbreviations of this chapter.
12.1.2 Definition
Resource assignment refers to the process of wireless resource allocation in call establishment.
There are two modes of assignments in call establishment, that is, early assignment and late
assignment.
The definitions of the two modes of assignments at the caller side are as follows:
Name Definition
Early In the call establishment, after sending the Call Proceeding message to
assignment the caller, the MSC server allocates traffic channels for the caller before
routing the call to the network where the callee resides.
Late In the call establishment, after sending the Call Proceeding message to
assignment the caller, the MSC server allocates traffic channels for the caller after
routing the call to the network where the callee resides. Usually, the
network resources are allocated after the MS of the callee rings.
The definitions of the two modes of assignments at the callee side are as follows:
Name Definition
Early The MSC server allocates the traffic channels for the subscriber after
assignment receiving the Call Confirmed message.
Late Through the Setup message, the MSC server notifies the callee that the
assignment traffic channels are allocated in Late assignment mode. Then the callee
sends the Call Confirmed message and then immediately the Alerting
message to the MSC server. The MSC server determines when to
allocate the traffic channels. Usually, the traffic channels are allocated
after the callee sends the Connect message.
12.1.3 Benefits
Beneficiary Description
Operator Late assignment can help to save the air interface resources. For
example, if a subscriber dials the wrong number and immediately
terminates the call, the MSC server needs not to allocate air interface
resources for the subscriber. The operator can utilize well the air
interface resources based on the actual assignment modes of each
location area or service area.
Subscriber Early assignment can help to reduce the wait time of the subscribers and
improve the call completion rate.
12.2 Availability
12.2.1 Requirements for NEs
The function is implemented through the cooperation of NodeB, RNC, and CN, as shown in
Table 12-1.
√ √ √ √ √ √ - √ √
MS/UE Network
Channel Request
Immediate Assignment
CM Service Request
Authentication Request
Authentication Response
Setup
Call Proceeding
Assignment Command
Assignment Complete
Alerting
Connect
Connect Acknowledge
5. The MSC server starts the encryption flow when the MM channel is being established.
(optional)
6. After the MM channel is allocated, the MS sends the Setup message to the MSC server
to request the call to be established.
7. The MSC server determines that the assignment mode is early assignment by querying
the information table of the location area and then returns the Call Proceeding message
to the MS.
8. The MSC server sends the assignment request and begins the traffic channel allocation.
9. After the MS of the callee rings, the MSC server sends the Alerting message together
with the progress indicator cell to the MS of the caller to indicate the MS to tune to the
allocated channel.
10. The ring back tone is provided by the MSC server.
11. After the callee answers the call, the conversation between the two parties begins and the
MS-originated call is established successfully.
MS/UE Network
Channel Request
Immediate Assignment
CM Service Request
Authentication Request
Authentication Response
Setup
Call Proceeding
Alerting
Assignment Command
Assignment Complete
Connect
Connect Acknowledge
MS/UE Network
Paging
Channel Request
Immediate Assignment
Paging Response
Authentication Request
Authentication Response
Setup
Call Confirmed
Assignment Command
Assignment Complete
Alerting
Connect
Connect Acknowledge
MS/UE Network
Paging
Channel Request
Immediate Assignment
Paging Response
Authentication Request
Authentication Response
Setup
Call Confirmed
Alerting
Connect
Assignment Command
Assignment Complete
Connect Acknowledge
10. The callee sends immediately the Alerting message to the MSC server.
11. The callee sends the Connect message to the MSC server.
12. The MSC server delivers the assignment request after receiving the Connect message.
13. After the network resources are allocated for the callee, the MSC server sends the
Connect Acknowledge message to the callee and the call is established successfully.
CM Service Request
CM Service Request
CM Service Accept
CM Service Accept
Setup
Call Proceeding
Send Routing
Information Provide Roaming
Number
Provide Roaming
Send Routing Info Number Acknowledge
Acknowledge
Alllocate Channel
Assignment Command
Assignment Complete
Allocate Complete
Alerting
Connect
Connect Acknowledge
9. The MSC-O requests the BSS to allocate the channel and the BSS sends the assignment
request to the MS.
10. After the channel is allocated, the MS sends the Assignment Complete message to the
BSS and the BSS sends the Allocation Complete message to the MSC-O to indicate that
the assignment is complete.
11. The MSC-O sends the Alerting message to the MS to indicate that the MS of the callee is
ringing.
12. The MSC-O sends the Connect message to the MS to indicate that the callee has
answered the call.
13. The MS sends the Connect Acknowledge message to the MSC-O and the call is
established.
CM Service Request
CM Service Request
CM Service Accept
CM Service Accept
Setup
Call Proceeding
Send Routing
Information Provide Roaming
Number
Provide Roaming
Send Routing Info Number Acknowledge
Acknowledge
Alerting
Alllocate Channel
Assignment Command
Assignment Complete
Allocate Complete
Progress
Connect
Connect Acknowledge
9. The MSC-O sends the Alerting message to the MS to indicate that the MS of the callee is
ringing.
10. The MSC-O requests the BSS to allocate the channel and the BSS sends the assignment
request to the MS.
11. After the channel is allocated, the MS sends the Assignment Complete message to the
BSS and the BSS sends the Allocation Complete message to the MSC-O to indicate that
the assignment is complete.
12. The MSC-O sends the Progress message to the MS to indicate that the assignment is
complete.
13. The MSC-O sends the Connect message to the MS to indicate that the callee has
answered the call.
14. The MS sends the Connect Acknowledge message to the MSC-O and the call is
established.
MSC/VLR BSS MS
Paging
Paging
Channel Request
Immediate Assignment
Paging Response
Paging Response
Setup
Call Confirmed
Allocate Channel
Assignment Command
Assignment
Complete
Allocate Complete
Alerting
Connect
Connect Acknowledge
5. The MS returns the Call Confirmed message to the MSC after receiving the Setup
message.
6. The MSC requests the BSS to allocate the channel after receiving the Call Confirmed
message and the BSS sends the assignment request to the MS.
7. After the assignment is complete, the MS sends the Assignment Complete message to
the BSS and the BSS sends the Allocation Complete message to the MSC to indicate that
the assignment is complete.
8. The MS sends the Alerting message to the MSC to indicate that the MS of the callee is
ringing.
9. After the callee has answered the call, the MS sends the Connect message to the MSC.
10. The MSC sends the Connect Acknowledge message to the MS and the call is
established.
MSC/VLR BSS MS
Paging
Paging
Channel Request
Immediate Assignment
Paging Response
Paging Response
Setup
Call Confirmed
Alerting
Connect
Allocate Channel
Assignment Command
Assignment
Complete
Allocate Complete
Connect Acknowledge
5. The MS returns the Call Confirmed message to the MSC after receiving the Setup
message.
6. The MS sends the Alerting message to the MSC to indicate that the MS of the callee is
ringing.
7. After the callee has answered the call, the MS sends the Connect message to the MSC.
8. The MSC requests the BSS to allocate the channel and the BSS sends the Assignment
request to the MS.
9. After the assignment is complete, the MS sends the Assignment Complete message to
the BSS and the BSS sends the Allocation Complete message to the MSC to indicate that
the assignment is complete.
10. The MSC sends the Connect Acknowledge message to the MS and the call is
established.
For 3G network, the assignment mode is configured when the SAI is being added. The steps
are as follows:
Step 1 Use the LST INOFFMSC command to check if the MSC and the VLR numbers of the local
office are configured.
If they are not configured, use the SET INOFFMSC command to configure them.
Step 2 Use the LST RNC command to check if the RNC that the cell belongs to is configured.
If it is not configured, use the ADD RNC command to add the RNC and its destination
signaling point code.
Step 3 Use the LST CALLSRC command to check if the call source code of the cell is configured.
If it is not configured, use the ADD CALLSRC command to add the call source code
corresponding with the cell.
Step 4 Use the LST OFC command to check if the office direction number of the RNC that the cell
belongs to is configured.
If it is not configured, use the ADD OFC command to add the office direction number of the
RNC that the cell belongs to.
Step 5 Use the LST LAISAI command to check if the LAI that the cell belongs to is configured.
If it is not configured, use the ADD LAISAI command to add the LAI that the cell belongs to.
(Configure the parameters based on the information obtained in the preceding query and set
the location area type as LAI.)
Step 6 Use the ADD LAISAI command to add a cell and set the assignment type of the cell.
(Configure the parameters based on the information obtained in the preceding query and set
the location area type as SAI.)
----End
12.5.4 Examples
Case 1
In the following environment:
z Network: 2G
z Local MSC number: 8613600004
z VLR number: 8613600004
z Call source name: CS-1
Script
The step to add the 2G cell is as follows:
Step 1 Add a 2G location area.
----End
Case 2
In the following environment:
z Network: 3G
z Local MSC ID: 8613600004
z VLR number: 8613600004
z Call source name: CS-1
Add a 3G service area with the following attributes:
z Assignment mode: early assignment
z RNCID: 1
z Other parameters: default values
Script
The step to add the 3G cell is as follows:
Step 1 Add the information of the 3G location area.
----End
If you want to query the assignment modes of all the cells, skip step 2.
3G Network
To query the resource assignment mode of a specified service area, perform the following
steps:
Step 1 Enter the LST LAISAI command in the command line window of the LMT.
Step 2 Enter the number of the service area to be queried in the SAI field.
If you want to query the assignment modes of all the service areas, skip step 2.
3G Network
To change the resource assignment mode of a specified service area, perform the following
steps:
Step 1 Enter the MOD LAISAI command in the command line window of the LMT.
Step 2 Enter the number of the service area to be modified in the 3G service area number field.
Step 3 Enter the MSC number of the 3G service area to be modified in the MSC number of 3G
service area field.
Step 4 Set the 3G service area type to Local VLR.
Step 5 Set the Early assignment flag to the required mode.
12.9 Reference
12.9.1 Protocols and Specifications
None.
Abbreviations
Abbreviation Full Name
Contents
Figures
Tables
Section Describes
13.1 Service The function code, function definition of this feature, and the benefits
Description that carriers and mobile subscribers can obtain from this feature.
13.2 Availability The network elements (NEs) that are required for the feature,
whether Licenses are required, and the version requirements of the
NEs.
13.3 Working The functions of the NEs, and networking requirements.
Principle
13.4 Service Flow The service flow of the network when providing this feature.
13.5 Data The data configurations that are required on the MSOFTX3000 and
Configuration the UMG8900.
13.6 Service The service operations that carriers and mobile subscribers are
Management required to implement when the network provides this feature.
13.7 Charging and The charging and the generation of CDRs when the network provides
CDR this feature.
13.8 Service The relationships and restrictions between this feature and other
Interaction services or features.
13.9 References The protocols and specifications that this feature must comply with,
and the acronyms and abbreviations of this chapter.
13.1.2 Definition
If MSOFTX3000 is adopted in the GMSC/SSP networking, and if the SCP interconnected
with the MSOFTX3000 uses private INAP protocol, the MSOFTX3000 fails to trigger the
intelligent service (IN service ) when processing IN calls of the IN service subscribers (the
subscribers who subscribe to the IN service s in the HLR). To solve this problem, the
MSOFTX3000 uses three modes to process the IN service s, as shown in Table 13-2.
Triggering IN service The MSOFTX3000 triggers the IN service in the O-CSI or T-CSI
mode.
Routing out the call The MSOFTX3000 does not trigger IN service and connects the
directly to another call to the MSC/SSP that can trigger the IN service normally. The
office connected to MSC/SSP triggers the IN service.
Ignoring IN service The MSOFTX3000 does not trigger IN service and connects the
call as an ordinary call.
The carrier can determine the processing mode based on the actual situation.
The IN service triggering feature is supported only by the GMSC and TMSC.
13.1.3 Benefits
Beneficiary Description
Carrier The carrier can control the IN service s more flexibly, thus the
competitiveness of the carriers is highly enhanced.
Mobile The subscribers can enjoy the IN services.
subscriber
13.2 Availability
13.2.1 Requirement for NEs
The IN service triggering feature requires the corporation of the SCP and CN.
Table 13-3 lists the NEs related with the IN service triggering.
– – – √ √ – √ √ √
GMSC
VMSCa HLR SCP VMSCb
(MSOFTX3000)
1.IAM
2.SRI
3.SRI_ACK(TCSI)
Query IN
4. service control 5.IDP(DP12)
data table
7.SRI
8.SRI_ACK(MSRN)
9.IAM
10.ACM
11.ACM
Figure 13-2 Routing out the call directly to another office (T -CSI)
1.IAM
2.SRI
3.SRI_ACK(TCSI)
4. Query the IN
service control 5IAM
data table
6.ACM
7.ACM
8. Call process
1.IAM
2.SRI
3.SRI_ACK(TCSI)
4. Query the IN
service control 5.SRI
data table
6.SRI_ACK(MSRN)
7.IAM
8.ACM
9.ACM
1. The GMSC receives the IAM message from the VMSC of the calling party.
2. The GMSC sends the SRI message to the HLR of the called party.
3. The HLR responses the SRI_ACK message to the GMSC.
The SRI_ACK contains the T-CSI subscription information of the called party.
4. The GMSC queries the IN service control data table.
The query result is "Ignoring IN service ".
5. The GMSC sends for the second time the SRI message to the HLR of the called party.
The SRI message contains the suppression T-CSI cell.
6. The HLR responses the SRI_ACK to the GMSC.
The SRI_ACK contains the MSRN number of the called party.
7. The GMSC sends the IAM message to the VMSC of the called party according to the
MSRN number of the called party.
8. The VMSC of the called party responses an ACM message to the GMSC.
9. The GMSC responses the ACM message to the VMSC of the calling party.
10. The call is established.
1.IAM
2.SRI
8.SRI
9.SRI_ACK(MSRN)
10.IAM
11.ACM
12.ACM
7. The SCP triggers the IN service after receiving the IDP message.
The IN service triggering process completes.
8. The GMSC sends an SRI message to the HLR of the forwarded-to party.
9. The HLR of the forwarded-to party responses an SRI_ACK to the GMSC.
The SRI_ACK contains the MSRN number of the forwarded-to party.
10. The GMSC sends an IAM message to the VMSC of the forwarded-to party according to
the MSRN number of the forwarded-to party.
11. The VMSC of the forwarded-to party responses the ACM message to the GMSC.
12. The GMSC responses the ACM message to the VMSC of the calling party.
13. The call is established.
Routing Out the Call Directly to Another Office (Early Forwarding with O-CSI)
If the call is an IN call of the MF type, and if the called party subscribes to the call forwarding
service and the O-CSI service, the MSOFTX3000 does not trigger the IN service and connects
the call to the MSC/SSP which can trigger the IN service normally. The call procedure is as
shown in Figure 13-5.
Figure 13-5 Routing out the call directly to another office (early forwarding with O-CSI)
1.IAM
2.SRI
3.SRI_ACK
Query the IN (early forwarding
4. service control with O-CSI)
data table 5.IAM
6.ACM
7.ACM
8. Call process
1. The GMSC receives the IAM message from the VMSC of the calling party.
2. The GMSC sends the SRI message to the HLR of the called party.
3. The HLR responses the SRI_ACK message to the GMSC.
The SRI_ACK contains the call forwarding subscription information and the O-CSI
subscription information of the called party.
4. The GMSC queries the IN service control data table.
The query result is "Routing out the call directly to another office".
5. The GMSC sends an IAM message to the MSC/SSP according to the MSC/SSP routing
information in the IN service control data table.
6. The MSC/SSP responses the ACM message to the GMSC.
7. The GMSC responses the ACM to the VMSC of the calling party.
8. The call is established.
1.IAM
2.SRI
7.SRI_ACK(MSRN)
8.IAM
9.ACM
10.ACM
11.Call process
6. The GMSC sends an SRI message to the HLR of the forwarded-to party.
7. The HLR of the forwarded-to party responses an SRI_ACK to the GMSC.
The SRI_ACK contains the MSRN number of the forwarded-to party.
8. The GMSC sends an IAM message to the VMSC of the forwarded-to party according to
the MSRN number of the forwarded-to party.
9. The VMSC of the forwarded-to party responses the ACM message to the GMSC.
10. The GMSC responses the ACM message to the VMSC of the calling party.
11. The call is established.
See online help for the descriptions of the parameters of related commands.
13.5.4 Example
Scenario 1
In an IN call, assume that:
z The subscriber data of the called party contains the T-CSI subscription information.
z The IN service key is 1.
z The SCP address is 8613977888 and the SCP uses the INAP private protocol.
The MSOFTX3000 can not trigger the IN service when processing this call.
In this case, the carrier changes the number of the called party and the call is directly transited
to another MSC/SSP which triggers the IN service. No CDR is generated for the IN call of the
called party.
Assume that:
z The number of the called party is added with a prefix 123.
z The routing selection name of Routing out the call directly to another office is 10.
z The routing selection source name 0 has been defined in the call source table.
z Routing name 0 already exists.
Note If you execute this command, the MSOFTX3000 does not generate a CDR
for the IN call of the called party.
----End
Scenario 2
In an IN call, assume that:
z The subscriber data contains the call forwarding unconditional (CFU) and O-CSI
subscription information.
z The IN service key is 2.
z The SCP address is 8613977888 and the SCP uses the INAP private protocol.
The MSOFTX3000 can not trigger the IN service when processing this call.
In this case, the carrier ignores the IN attributes of the call and connects the call as an ordinary
call. No CDR is generated for the IN call of CFU.
Note If you execute this command, the MSOFTX3000 does not generate a CDR
for IN call of CFU.
----End
Scenario 3
In an IN call, assume that:
z The subscriber data contains the CFU and O-CSI subscription information.
z The IN service key is 3.
z The SCP address is 8613977888.
The MSOFTX3000 can trigger the IN service normally in the SCP. The carrier triggers the IN
service and generates a CDR for the IN call of CFU.
----End
13.9 References
13.9.1 Specifications
None.
Contents
Figures
Tables
14 MNP Feature
Section Describes
14.1 Feature Description The function code, function definition of this feature, and the
benefits that carriers and mobile subscribers can obtain from
this feature.
14.2 Availability The network elements (NEs) that are required for the feature,
whether Licenses are required, and the version requirements
of the NEs.
14.3 Principle Description The functions of the NEs, and networking requirements.
14.4 Service Flows The service flow of the network when providing this feature.
14.5 Data Configuration The data configurations that are required on the
MSOFTX3000 and the IMG8900.
14.6 Service Management The service operations that carriers and mobile subscribers
are required to implement when the network provides this
feature.
14.7 Charging and The charging and the generation of CDRs when the network
provides this feature.
14.8 Service Interaction The relationships and restrictions between this feature and
other services or features.
14.9 Reference The protocols and specifications that this feature must
comply with, and the acronyms and abbreviations of this
chapter.
Carriers z For new carriers, the MNP feature attracts new subscribers and
enhances competition capability.
z For mature carriers, the MNP service brings additional management
charges and increases operation revenue.
Mobile z Based on the changes of locations, subscribers can choose different
subscribers networks or more suitable carriers without changing their numbers.
z Subscribers can subscribe networks of one carrier in different areas
and remain the original number. For example, a subscriber registers a
number in area A. This number belongs to the number segment of area
A. After moving to place B, the subscriber can register the same
number in area B.
14.2 Availability
14.2.1 Related Network Elements
The realization of the MNP feature requires the cooperation of the network elements (NEs)
listed in Table 14-1.
√ - - √ - √ √ √ √
Product Version
HLR SMSC
Foreign NPDB
SPS SPS
VMSC GMSC
Foreign NPDB: NP database of external network SPS: Signaling Service Processing System
PLMN: Public Land Mobile Network HLR: Home Location Register
GMSC: Gateway Mobile Switch Center SMSC: Short Message Service Center
VMSC: Visited Mobile Switch Center
In the networking, the SPS serves as the MNP-Signaling Relay Function (SRF) and Number
Portability Database (NPDB). It is before the HLR in service flows and often configured in
pairs.
The MNP feature requires that the network addresses in the "Route on GT" mode, and use the
SPS as the translation point. The 3G TS 23.066 defines two modes to realize the MNP. One is
based on the IN, while the other is based on signaling relay.
The MSC queries the MNP Service Processing Table to determine the subsequent processing
type: IN based original call query, Release, or No processing. The IN based original call
query mode is not usually used. It is used for certain special requirements only.
The MSOFTX3000 supports the following MNP modes:
z Query on Release (QoR) mode
z Onward Routing (OR) mode
z All Call Query (AcQ) mode
RN is the route number. Every carrier is assigned with one RN, such as C0101, and C0102. If there is no
special note in this article, RNP4 refers to the RN of P4, RNx refers to RN of external network, and
NonNP means that no number is ported.
The MNP service in the QoR mode is used when the GMSC calls the following numbers:
z Numbers ported from local network to external network
z Numbers ported from external network to local network
The GMSC delivers the SRI to the NPDB. Based on the result of querying related table, the
NPDB determines whether to deliver the SRI to the HLR or return an SRlack message to the
GMSC. When receiving the SRIack, the GMSC queries the MNP Service Processing Table.
Based on the result, the GMSC processes as follows:
z If the returned MSRN is "Foreign RNx + MSISDN" or "NonNP + MSISDN", the GMSC
disconnects the call. (If the prefix is RN, the REL message carries a disconnect cause
value of 14. If the prefix is NonNP, the REL message carries a disconnect cause value of
1. In the latter case, the system generates an alarm.)
z Otherwise, the GMSC normally connects the call.
The VMSC does failure processing to the REL message returned by the GMSC. If the cause
value is 14, the VMSC re-routes the call to the NPDB to obtain the RNx.
Figure 14-2 External network subscriber calls a ported out local network subscriber
IAM (MSISDN)
SRI (MSISDN)
SRIack (RNx+MSISDN)
1. The GMSC receives an IAM message sent by the VMSC. The message carries a called
number with the number segment of the local network. The called number does not carry
an RN prefix.
In the trial bill, the called number is the MSISDN. The call termination cause value is 14, indicating that
the called number is ported out.
Figure 14-3 External network subscriber calls a subscriber ported in the Local Network but does
not exist in the local network
IAM (RNP4+MSISDN)
SRI (MSISDN)
SRIack
1. The VMSC sends an IAM message to the GMSC. The called number carries the RN
prefix of the local network, that is, RNP4.
2. The GMSC sends an SRI to the NPDB.
3. After querying table, the NPDB returns an SRIack (NonNP + MSISDN or RNx +
MSISDN) to the GMSC.
4. The GMSC sends an REL message to the VMSC. The VMSC disconnects the call. The
call termination cause value of 1, indicating that the called number is not allocated.
z In the trial bill, the called number is RNP4 + MSISDN. The call termination cause value is 1,
indicating that the called number is not allocated.
z NonNP + MSISDN returned by the STP means that this MSISDN is a non-NP subscriber.
14.4.2 OR Mode
The MNP service in the OR mode is used when the GMSC calls the number segment that may
port from local network to external network. If a called number ports to external network, the
NPDB returns an SRlack (RN + MSISDN). When receiving the SRlack, the GSMC queries
the MNP Service Processing Table and selects a processing type.
Figure 14-4 shows the MNP service flow in the OR mode.
IAM (MSISDN)
SRI (MSISDN)
SRIack (RNx+MSISDN)
IAM (RNx+MSISDN)
1. The PSTN sends an IAM message to the GMSCa. The IAM message carries the
information of the called number that belongs to the local network number segment.
2. The GMSCa sends an SRI to the NPDB.
3. After querying table, the NPDB returns an SRIack (RNx + MSISDN) to the GMSCa.
4. The GMSCa routes the call to the correct network, such as the GMSCb.
Local Network Subscriber Calls a Ported Out Local Network Subscriber Based
on IN
Figure 14-5 shows the flow of a local network subscriber calls a ported out local network
subscriber based on the IN.
Figure 14-5 Local network subscriber calls a ported out local network subscriber based on the IN
IDP (DP2,Cdpa=MSISDN)
IDP (DP2,Cdpa=MSISDN)
Connect (Cdpa=RNx+MSISDN)
IAM (RNx+MSISDN)
1. The local network subscriber initiates a call, triggers the IN, and reports an IDP message
to the NPDB.
2. The NPDB transparently transfers the IDP message to the SCP.
3. The SCP returns the CONNECT (RNx + MSISDN) message to the VMSC.
4. The VMSC routes the call to the correct network.
Local Network Subscriber Calls a Ported Out Local Network Subscriber Based
on Signaling
Figure 14-6 shows the flow of a local network subscriber calls a ported out local network
subscriber based on signaling.
Figure 14-6 Local network subscriber calls a ported out local network subscriber based on
signaling
SRI (MSISDN)
SRIack (RNx+MSISDN)
IAM (RNx+MSISDN)
1. The subscriber initiates a call. The VMSC sends an SRI to the NPDB.
2. After querying table, the NPDB returns an SRIack (RNx + MSISDN) to the VMSC.
3. The VMSC routes the call to the correct network.
In the MOC, the called number is the MSISDN. The translatedNumber is RNx + MSISDN.
Configuration Scripts
The data configuration of the local office is as follows:
Step 1 Add the GT translation to the NPDB.
Description Configure the Called Number Pre-analysis Table. Set Processing type to
No processing to prevent adding "00" when adjusting the called number.
Script ADD CLDPREANA: CSCNAME=65534, CS=ALL, PFX=K'C0101,
MINCLDLEN=6, CDADDR=ALL, CRP=ALL, PT=DONTPROC;
Description Configure the MNP Service Table. Set Call source to 0, Call originator
to MAP non-forwarding, Called prefix to C0101, Minimum number
length to 5, Maximum number length to 20, MNP processing type to
External network NP prefix, MNP processing type to Disconnect,
Disconnect cause code to 142, and Alarm flag to No.
Script ADD INMNP: CLDPFX=K'C0101, MINDNLEN=5, MAXDNLEN=20,
MNPPFT=OTHER, MNPPRT=REL, FCC=CV142, ALMF=NO;
----End
Description Configure the Number Change Table. Set the Number Change Table to
add prefix to the called number.
Script ADD DNC: DCN="1", DCT=TYPE1, ND=K'123;
Description Configure the Call Failure Processing Table. Set Failure cause code to
142 for failure processing.
Script ADD CFPRO: FCC=CV142, FSC=0, RUT=CAT10, PT=CPA, DCN="1";
----End
Case 2
QoR mode: An external network subscriber calls a local network subscriber. The caller thinks
that the callee ported in the local network, but the callee does not exist in the local network.
z The GMSC queries the NPDB. The NPDB returns an SRlack with the NonNP prefix and
the MSISDN.
z The GMSC sends a disconnecting message to the originating office.
Configuration Scripts
Step 1 Add the GT translation to the NPDB.
Description Configure the Called Number Pre-analysis Table. Set Processing type to
No processing to prevent adding "00" when adjusting the called number.
Script ADD CLDPREANA: CSCNAME="65534", CS=ALL, PFX=K'C0101,
MINCLDLEN=6, CDADDR=ALL, CRP=ALL, PT=DONTPROC;
Description Configure the MNP Service Table. Set Call source to 0, Call originator
to Wildcard, Called prefix to C0101, Minimum number length to 5,
Maximum number length to 20, MNP processing type to Local
network NP prefix, MNP processing type to Disconnect, Disconnect
cause code to 142, and Alarm flag to No.
Script ADD INMNP: CLDPFX=K'C0101, MINDNLEN=5, MAXDNLEN=20,
MNPPFT=LOC, MNPPRT=REL, FCC=CV142, ALMF=YES;
----End
Case 3
OR mode:
z For calls that the callee is a local subscriber and may port to a number segment of
external network, the GMSC sends an SRI to the NPDB. If the called number ports out
of the local network, the NPDB returns an SRlack (RNx + MSISDN).
z When receiving the SRlack, the GMSC queries the MNP Service Processing Table to
select a processing type.
Configuration Scripts
Step 1 Add the GT translation to the NPDB.
Description Configure the Called Number Pre-analysis Table. Set Processing type to
No processing to prevent adding "00" when adjusting the called number.
Script ADD CLDPREANA: CSCNAME="65534", CS=ALL, PFX=K'C0101,
MINCLDLEN=6, CDADDR=ALL, CRP=ALL, PT=DONTPROC;
Description Configure the MNP Service Table. Set Call source to 0, Call originator
to Wildcard, Called prefix to C0101, Minimum number length to 5,
Maximum number length to 20, MNP processing type to Local
network NP prefix, and MNP processing type to No processing.
Script ADD INMNP: CLDPFX=K'C0101, MINDNLEN=5, MAXDNLEN=20,
MNPPFT=LOC, MNPPRT=DONTPROC;
----End
Case 4
AcQ mode: A local network subscriber calls a ported out local network subscriber based on
signaling.
z The originating office queries the NPDB. The NPDB returns an SRlack with the RNx
and the MSISDN.
z The originating office routes to a third-party network based on the RNx.
Configuration Scripts
Step 1 Add the GT translation to the NPDB.
Description Configure the Called Number Pre-analysis Table. Set Processing type to
No processing to prevent adding "00" when adjusting the called number.
Script ADD CLDPREANA: CSCNAME="65534", CS=ALL, PFX=K'C0101,
MINCLDLEN=6, CDADDR=ALL, CRP=ALL, PT=DONTPROC;
Description Configure the MNP Service Table. Set Call source to 0, Call originator
to Wildcard, Called prefix to C0101, Minimum number length to 5,
Maximum number length to 20, MNP processing type to Local
network NP prefix, and MNP processing type to No processing.
Script ADD INMNP: CLDPFX=K'C0101, MINDNLEN=5, MAXDNLEN=20,
MNPPFT=LOC, MNPPRT=DONTPROC;
----End
Bit 1 is valid only when bit 4 is set to 0. When bit 4 is set to 1, bit 1 is invalid.
It can also be controlled by bit 2 of the software parameter P1300:
Bit 2: Defines the filling principles of the called numbers in the GWO bill. The GWO
bill is generated when subscriber A dials subscriber B and triggers the IN flow
CONNECT to subscriber C (in other office):
= 0: Fill the number of subscriber C.
= 1: Fill the number of subscriber B.
Default value: 1
z You should configure a piece of data in the Home PLMN Roaming Prefix Table to
limit the generation of roaming bills. The MSRN prefix is the RN number.
14.9 Reference
14.9.1 Protocols and Specifications
The references of the MNP feature are as follows:
z 3GPP TS 23.066
z Design specifications of the ETSI interception
Contents
15 IP Fax Feature..........................................................................................................................15-1
15.1 Service Description ...................................................................................................................................15-2
15.2 Working Principle......................................................................................................................................15-2
15.3 Benefits .....................................................................................................................................................15-2
15.3.1 To Carriers........................................................................................................................................15-2
15.3.2 To Mobile Subscribers .....................................................................................................................15-2
15.4 Availability ................................................................................................................................................15-2
15.4.1 Application.......................................................................................................................................15-2
15.4.2 Requirements for Software ..............................................................................................................15-3
15.4.3 Requirements for Hardware .............................................................................................................15-3
15.5 Service Flow..............................................................................................................................................15-3
15.5.1 Classification of Call Model ............................................................................................................15-3
15.5.2 Processing Flow ...............................................................................................................................15-3
15.6 Data Configuration....................................................................................................................................15-7
15.6.1 Configuring Data at the MSOFTX3000 Side...................................................................................15-7
15.6.2 Data Configuration Example............................................................................................................15-9
15.7 Service Management ...............................................................................................................................15-10
15.8 Charging and CDR ..................................................................................................................................15-10
15.9 Service Interaction ..................................................................................................................................15-10
Tables
15 IP Fax Feature
Section Describes
15.3 Benefits
15.3.1 To Carriers
The IP fax feature increases the quality of the fax data transmission and enhances the
competitive edge of carriers.
15.4 Availability
15.4.1 Application
The MSOFTX3000 V100R005 provides the IP fax service. The TS62 service is applicable to
visited MSC (VMSC), gateway MSC (GMSC), and tandem MSC (TMSC). The TS61 service
is applicable to TMSC only.
The limitations of the IP fax service is as follows:
z The VMSC cannot trigger the TS61 service that contains 2198 redundancy data.
z The VMSC does not support fax detection.
z To implement 2198 redundancy transmission for inter-office BICC fax, the TrFO
function must be enabled.
z The modification of 2198 redundancy configuration is not allowed during data service
calls.
z All the gateways connected with an MSC must support or not support 2198 redundancy
at the same time.
z The distributed interworking function (IWF) is not supported.
MSOFTX3000
IP
Incoming side Outgoing side
ISUP/TUP–BICC
When a call is initiated, the TDM point sends the fax detection event to the gateway and
meanwhile sends the 2198 data service redundancy modification request.
When a fax call is initiated, the gateway reports the fax event, sends the CODEC modification
request to the local-end gateway to modify the terminal point, and meanwhile sends the
modification request to the peer end.
The BICC uses the CODEC re-negotiation flow to modify the IP point.
After the fax ends, the gateway reports the fax complete event and the local end sends the
open EC operation request to the gateway.
MSOFTX3000
IP
Incoming side Outgoing side
BICC–ISUP/TUP
When a call is initiated, the TDM point sends the fax detection event to the gateway and
meanwhile sends the 2198 data service redundancy modification request.
When a fax call is initiated, the gateway reports the fax event, sends the CODEC modification
request to the local-end gateway to modify the terminal point, and meanwhile sends the
modification request to the peer end.
The BICC uses the CODEC re-negotiation flow to modify the IP point.
After the fax ends, the gateway reports the fax complete event and the local end sends the
open EC operation request to the gateway.
MSOFTX3000
IP
Incoming side Outgoing side
"Send the 1T modification request" refers to the local-end terminal point modification request. "Send the
2T modification request" refers to the intermediate bearer modification request.
For the case of switching the fax to the voice call, observe the original processing flow. This feature does
not involve the processing of this part.
BICC–BICC
The MSOFTX3000 receives the CODEC modification request from another MSC (calling
party/called party).
The MSOFTX3000 sends the CODEC modification request to the gateway and meanwhile
notifies the peer end to send the CODEC modification request.
After the successful modification, the peer end sends the CODEC modification request to the
other office.
(1) (6)
MSOFTX3000
IP
Incoming side Outgoing side
1. Modification request sent by other office 2. Send the CODED modification request
3. Return successful modification response. 4. Send the CODED modification request.
5. Return successful modification response. 6. Modification request sent by other office
Intra-TMSC Cross-Gateway (Over IP) TS61 and TS62 Call Processing Flow
The TMSC determines that the current service is a data service.
The TMSC sends the PREPARE BEARER REQ, which carries the redundancy parameter.
MSOFTX3000
IP
Incoming side Outgoing side
Inter-Office BICC (Over IP) TS61 and TS62 Call Processing Flow
If the local office supports the 2198 redundancy in an outgoing BICC call, the local office
negotiates with the peer office.
If the message carrying the 2198 redundancy CODEC is received in an incoming BICC call,
the local office judges whether it supports the 2198 redundancy capability and records the
result.
After the negotiation is completed, the MSOFTX3000 sends the CODEC modification request
to the gateway.
BICC
MSOFTX3000 MSOFTX3000
MGW MGW
MSOFTX3000
IP
Incoming side Outgoing side
Value Meaning
Yes The local office supports the fax detection. (default value)
No The local office does not support the fax detection.
Use the parameter Support 2198 redundancy in the Local Office Information table to control
whether the local office supports 2198 data redundancy. Table 15-2 lists the value options of
this parameter.
Use the parameter 2198 UP Mode in the Local Office Information table to configure 2198
data redundancy. Table 15-3 lists the value options of this parameter.
Transparent The transparent mode is adopted for the 2198 UP mode of the local
Mode office. (default value)
Support Mode The support mode is adopted for the 2198 UP mode of the local office.
Use the parameter 2198 redundancy level in the Local Office Information table to configure
2198 data redundancy. Table 15-4 lists the value options of this parameter.
The 2198 redundancy level of data service is uniformly defined in the whole office.
Use the parameter 2198 redundancy CODEC type in the Local Office Information table to
configure 2198 data service redundancy. Table 15-5 lists the value options of this parameter.
Value Meaning
G.711u The codec used for 2198 redundancy of data services is G.711u.
G.711a The codec used for 2198 redundancy of data services is G.711u. (default value)
Use the parameter 2198 redundancy payload type value in the Local Office Information
table to configure 2198 data redundancy. The value range of this parameter is 96–127. The
default value is 97.
Use the parameter BICC support red in the Office Direction table to configure whether to
the office direction supports the redundancy parameters. Table 15-6 lists the value options of
this parameter.
Parameters 2198 UP Mode, 2198 redundancy level, 2198 redundancy CODEC type, and 2198
redundancy payload type value are attributes of 2198 redundancy. Thus, when Support 2198
redundancy is set to No, these parameters are not displayed in the parameter list.
Configuration Script
SET OFI: OFN="VMSC", LOT=LOCMSC, IN=NO, IN2=NO, NN=YES, NN2=YES, SN1=NAT, SN2=NATB,
SN3=NAT, SN4=NATB, NPC="2A1101", INS=SP14, IN2S=SP24, NNS=SP24, NN2S=SP14, SPF=YES,
SPFAXDT=YES, SPRED=YES, REDLEVEL=L1, REDPT=97, REDCODEC=G711a, UPMODE=TRANS;
ADD OFC: ON="VMSC", OOFFICT=NATT, DOL=SAME, SIG=SCTP, IFSUPPORTRED=YES;
MOD MSFP: ID=P233, MODTYPE=P1, BIT=14, BITVAL=1;
Contents
Tables
16 License Feature
Section Describes
16.1 Service Description The function code and application scope of the License
feature.
16.2 Working Principle The working principles, running status, invalidation
definition and alarm mechanism of the License feature.
16.3 Operation and The O&M commands and cautions of the License feature.
Maintenance of License
16.4 License Control Items The control items and resource control items of the License
feature.
16.5 Other Precautions Other cautions in using the License feature.
16.6 Reference The acronyms in this chapter.
z Invalidating: If the License files loaded into the system is expired, or no valid License
file is loaded into the system, the system triggers a 60-day invalidation alerting period. In
this case, each control item of the License files can still be used for 60 days without any
service restriction, but alarms indicating that the License is expired are sent every day.
After the 60 days, the system enables the default minimum value.
z Default: After License files are expired for 60 days or the default minimum values are
used for 60 days, the system runs under default License and provides only the default
permitted License functions.
z After the 60-day invalidation alerting period, the system enables the minimum default
value of the License item.
After the whole License is expired, alarms indicating that the License items are expired are
not sent, because the License items are expired if the whole License file is expired.
There are 10 alarm cause values for the event alarm "invalid license", but they are not displayed. When
such event alarms occur, check the following:
z Whether the loaded License is normal. If not, you must load valid License files again.
z Whether the License of the host and the License of the BAM are consistent. If not, you must load
valid License files again.
z After getting License files, you must back up them to avoid unexpected incidents. License
files are digitally subscribed; therefore, do not edit them. Or, the License becomes invalid.
z After the loading, run DSP LICENSE and TR LICCRC immediately to check whether
the Licenses of the host and the BAM are consistent. If not, contact Huawei technical staff
for consultation.
Parameter Description
Table 16-1 shows the parameters of the command LOD LICENSE.
Notes
Pay attention to the following when using this command.
z If the specified License does not exist, the License is verified to be incorrect, License
decryption fails, or the License is expired, a message indicating failure in running the
command is returned, together with related prompts. This does not affect the License in
use.
z If the new License has fewer functions or a lower capacity than the original one, the
command can be executed successfully, and each module uses the new License data. But
an alarm indicating that the new License has less functions or lower capacity is
generated.
z If the ESN of the specified License is inconsistent with that of the equipment, a prompt
for successful loading is prompted, but an alarm indicating inconsistent ESNs is
generated. In this case, the system is in trial running (the trial period is specified when
applying License files). During this period, the functions of the License can be normally
used. After the trail period, the system prompts that the trial period is expired, and the
running mode turns to be Invalidating. The configuration values of the License remain,
and subscribers are allowed to use the License for 60 days. After the 60 days, the running
mode turns to be Default. The products run under the default License and provide only
the default permitted License functions.
z If the system has ever loaded a License with an inconsistent ESN (that is, the system has
trialed the License), any License with an inconsistent ESN cannot be loaded again.
Therefore, when you find the License is in Trial status, you must apply for a formal
License immediately. Or, the License only provides default functions when the
Invalidating period is over.
easily between the last two License files, and then the system obtains the rights to change
different functions and customer capacities.
Parameter Description
The command ROL LICENSE has no parameter.
Notes
When the system performs the rollback operation, it rolls back to the last normal License
configuration. Normal configuration here means the License files that have been successfully
loaded in the system. This command is in fact to take the name of the License that has been
successfully loaded last time, and then auto run LOD LICENSE to load the License. In
general, you are recommended to run LOD LICENSE directly to reload the License.
Parameter Description
Table 16-2 shows the parameters of the command LST LICENSE.
Notes
Pay attention to the following when using this command:
z When File name is null, the License files of which the names initiate with the characters
"LIC" in the License subdirectory under the installation directory are displayed. Usually
the License files from the License center of Huawei are initiated with "OR" or other
letters. So, you are recommended to change the License name to "LICENSESerialNo"
field content before loading the License.
z Only a complete file name with extension name can be typed in File name.
z License files must be located in the License subdirectory under the installation directory,
without the directory name. These rules are also applicable to other License operation
commands.
Parameter Description
Table 16-3 shows the parameters of the command DSP ESN.
Notes
ESN means entity serial number. It is:
z The only identifier of a set of equipment
z The key guarantee of authorizing a License to a specific set of equipment
z The most important information of License files
You, therefore, must ensure the correctness of the ESN.
The serial number of the equipment to be authorized is contained in License file. After the
License is loaded to the equipment, the system compares the ESN in the License file with that
of the equipment. The system authorizes corresponding services to the equipment only when
the two ESNs are consistent.
The following are the steps to obtain the ESN:
Step 1 Install the BAM.
Step 2 Configure the MSC number and the DPC number offline. The MSC and DPC number must be
identical with the actual data of the current network; otherwise, errors occur in obtaining the
ESN.
Step 3 Run DSP ESN to obtain the ESN. Set Display type to Current config in BAM.
----End
z When there are multiple signaling points, the ESN is irrelevant to the sequence of the signaling
points. You can change the sequence of the configuration, but any other change leads to different
ESNs. You cannot add or delete signaling points.
z When the system is running, you cannot modify the MSC number or signaling point number,
otherwise the License may become invalid. If you do have to modify them, you must obtain a new
ESN number based on the data after the modification, and then apply a new License.
Parameter Description
The command STR LICCRC has no parameter.
Notes
Pay attention to the following when using this command:
z When the BAM originates STR LICCRC, the system checks whether the loaded
Licenses of the BAM and the foreground host are consistent. The system compares the
file names and CRC values only.
z The foreground host originates an automatic check every two hours. The BAM sends the
information of the License loaded in the BAM to the host, irrespective of the check
results. In this case, the host performs the following:
− Check whether the information of the licenses loaded in the host and in the BAM are
consistent. If the sizes and names of the licenses are identical, the licenses are
considered consistent.
− If yes, the host enables the 2-hour basis check timer.
− If not, the host keeps the license of itself, enables the 10-minute basis check timer,
and sends an event alarm indicating that both the licenses of the BAM and the host
are valid but inconsistent.
Parameter Description
Table 16-4 shows the parameters of the command DSP LICENSE.
Notes
DSP LICENSE is different from the command LST LICENSE. LST LICENSE is used to
display the static License information while DSP LICENSE is to display the licenses that is
loaded to the system and is in use at present.
Parameter Description
Table 16-5 shows the parameters of the command DMP LICENSE.
Notes
Pay attention to the following when using this command:
z When you export the contents of the License files being used on the host to a file, the file
must be named "LICENSEYYYYMMDDHHMMSS.txt" in which the letters in upper
case in the latter part indicate the year, month, date, hour, minute and second of the
current system time. This file is stored in the License subdirectory under the BAM
installation directory. You are recommended to save the license manually instead of
using the DMP method.
z When exporting the "Current license files" or "History license files" from the database to
a file, you can name the file freely.
Notes
This command uploads License file, obtains License files from the system and store them to a
specified FTP server (similar to the command DLD LICENSE, network elements (NEs) also
act as the FTP CLIENT).This command has a reverse function comparing to the command
DLD LICENSE.
Parameter Description
For more details of the parameters of the command DLD LICENSE, refer to 16.3.8 "ULD
LICENSE (Uploading License File to FTP Server).
Notes
DLD LICENSE only downloads License files to NEs. The NEs still use the original License
configuration data, even if the system is restarted. The new License is not effective, and no
decryption and ESN comparison are conducted (These operations are performed while
running the command LOD LICENSE).If the ESNs of the NEs are changed, the License files
must be updated at the same time.
ISUP LOOP Decide whether to enable the ISUP LOOP Disabled VMSC
BAC BACK function based on the judgment of the
License.
SOR Decide whether to enable the SOR function Disabled VMSC
based on the judgment of the License.
Flexible control Decide whether to enable the flexible control Disabled VMSC
of AC version of AC version function based on the
judgment of the License.
ussd Decide whether to enable the ussd function Disabled VMSC
based on the judgment of the License.
NTP Decide whether to enable the NTP function Disabled VMSC,
based on the judgment of the License. GMSC,
TMSC
Subscriber Decide whether to enable subscriber tracing Disabled VMSC,
protocol tracing and signaling tracing functions based on the GMSC,
judgment of the License. TMSC
Centralized Decide whether to enable the centralized Disabled VMSC,
signaling signaling monitoring function based on the GMSC
monitoring judgment of the License.
Total number of Controlled in the DB. The number of the 4000 VMSC
subscribers attached subscribers is limited in the
VDB to be less than total number of
subscribers.
Total number of The number of intelligent connections 100 VMSC,
IN calls realized by the IN (total IN subscriber GMSC
number x ERL each IN subscriber). It
controls the processing capability.
Number of calls The number of connected 2G subscriber 100 VMSC
originated by 2G calls (total number of 2G end office
end office subscribers x ERL each subscriber). It
controls the processing capability.
Number of calls The number of connected 3G subscriber 100 VMSC
originated by 3G calls (total number of 3G end office
end office subscribers x ERL each subscriber). It
controls the processing capabilities.
Number of trunk The CCB controls the number of various 100 GMSC,
calls types of trunks (total channel number x 2 TMSC
or Total E1 number x 31), including the
ISUP trunk number and BICC trunk
number.
Supported The number of the subscribers on call 100 VMSC
number of held hold (total number of subscribers on call
calls hold x ERL each subscriber).
Supported The number of the subscribers on call 100 VMSC
number of waiting (total number of subscribers on
waiting calls call waiting x ERL each subscriber).
Number of The number of the subscribers in a 10 VMSC
subscribers in a multiparty call (total number of
multiparty call subscribers in a multiparty call x ERL
each subscriber).
Number of data The number of data service subscribers 10 VMSC
service (total number of data service subscribers
subscribers x ERL each subscriber).
Number of The number of monitored subscribers that 10 VMSC,
monitored can be configured (VMSC: total system GMSC
subscribers subscriber number x percentage of
monitored subscribers)
Number of It controls the number of the valid 1 VMSC,
monitored monitoring centers that can be connected GMSC
centers with the MSC.
Number of 2M It limits the number of the 2M signaling 1 VMSC,
signaling links links can be configured. GMSC,
TMSC
Number of It limits the number of multiple signaling 1 VMSC,
multiple points that can be configured. GMSC,
signaling points TMSC
Number of It limits the number of the group calls 0 Cluster service
group calls that can be originated simultaneously is ready for
(VGCS calls) the VMSC.
Number of It limits the number of the broadcast calls 0 Cluster service
broadcast calls that can be originated simultaneously is ready for
(VBS calls) the VMSC.
z Abnormal invalidation: The License files are loaded normally in the system, but the
License becomes invalid because of certain maloperations or specific conditions.
Once the License becomes invalid, if you have legal License files, you can run LOD
LICENSE to reload the License files.
The following are certain symptoms of abnormal invalidation, and the methods to prevent
them and solve them.
License Files Are not Reloaded in Emergency Workstation After the Switchover
from BAM to Emergency Workstation
The prevention method of this case: Load the License on the emergency workstation offline
after the database is recovered and before the emergency workstation is connected to the host.
When loading the License offline, you must set the parameter Position to BAM. At this time,
the Licenses of the BAM and the host may be inconsistent. To ensure that the License files on
the BAM are normal, after the emergency workstation and the host are connected, run LOD
LICENSE immediately to load the License to the host online. In this case, you cannot choose
the parameter Position.
During maintenance, you should especially pay attention to the alarms 2181, 2183, 2187, 2189, and
2246.
Version Upgrading
If there are special requirements upon version upgrading, the details are given in the upgrade
guide released with the version.
16.6 Reference
16.6.1 Protocols and Specifications
None.
AC Application Context
ARD Access Restriction Data
BAM Back Administration Module
BICC Bearer Independent Call Control Protocol
CAMEL Customized Applications for Mobile network Enhanced Logic
CCB Call Control Block
CRC Cyclic Redundancy Check
ECT Explicit Call Transfer
EIR Equipment Identity Register
eMLPP enhanced Multi Level Precedence and Preemption
ESN Electronic Serial Number
FTP File Transfer Protocol
GMSC Gateway Mobile Switching Center
GSM Global System for Mobile communications
IN Intelligent Network
LCS Location Service
MGCF Media Gateway Control Function
MGW Media Gateway
MNP Support of Mobile Number Portability
MO Mobile Originated
MSC Mobile Switching Center
MT Mobile Terminated
NTP Network Time Protocol
PRA Primary Rate Adaptation
RNC Radio Network Controller
Contents
Figures
Tables
Section Describes
17.1 Function Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
17.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
17.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
17.4 Service Flow The flow of the service.
17.5 Function Maintenance The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of function maintenance.
17.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
17.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
17.8 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
17.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
17.10 References The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
17.11 FAQ The frequently asked questions related to the service and
the solutions.
17.1.2 Definition
Through the network element (NE) user dynamic monitoring function, the network
management system (NMS) monitors the operation information and status of online NE users
in real time. The monitoring information is displayed on the Local Maintenance Monitor
tabbed page on the M2000 client.
Figure 17-1 shows the Local Maintenance Monitor tabbed page. For the explanations of the
Local Maintenance Monitor tabbed page, see Table 17-2.
Item Definition
NE Name Specifies the name of the login NE. By default, all names of
the NEs that log in to the M2000 are specified.
User Name Specifies the name of the login user. By default, all names of
the NEs that log in to the M2000 are specified.
User Type Specifies whether the user is a local user (LOCAL) or an
NMS user (EMS).
Login IP Specifies the IP address of the client that is connected to the
NE.
Login Time Specifies the login time of an NE user.
Service Specifies the type of the service console through which the
NE user logs in to the M2000, including O&M system and
performance maintenance system.
By proxy Specifies the login mode of an NE user, including by proxy
(Yes) and not by proxy (No).
Status Specifies the current status of an NE user, including online
and unknown.
Filter A function button, used to display information in this page by
selection.
Refresh A function button, used to obtain the latest information.
Save A function button, used to save all information displayed in
the page.
Subscribe… A function button, used to choose the operation results
reported by the NE user.
Force User to Exit A function button, used to force a user to exit.
Item Specification
17.1.5 Benefits
Table 17-4 describes the benefits for the beneficiary.
Carrier The NMS can obtain the login information and manages NEs through
monitoring the status of online users of all NEs.
The NMS can monitor the operation of the users of all NEs in real
time, and obtain data configuration updates.
The network can implement the centralized management of NE users.
By clicking Force User to Exit to disconnect a user from an NE, the
NMS can prevent the user from performing subsequent operations.
Mobile subscriber -
17.2 Availability
17.2.1 Requirements for NEs
To implement this function, the M2000 must work with the MSC server. See Table 17-5.
- - - √ - - - √
17.2.4 Others
None.
LMT that the user belongs to, through the operation and maintenance port. At this time, a
message is displayed on the LMT, indicating that the user is forcedly disconnected from the
NMS.
Step 2 Click the Local Maintenance Monitor tab and click Subscribe in the Local Maintenance
Monitor tabbed page.
The Subscribed NE List interface is displayed, as shown in Figure 17-3.
Canceling Subscription
The procedure for canceling the subscription is as follows:
Step 1 Choose System > User Monitor on the M20000 client. The User Monitor interface is
displayed, as shown in Figure 17-2.
Step 2 Click the Local Maintenance Monitor tab and click Subscribe in the Local Maintenance
Monitor tabbed page. The Subscribed NE List interface is displayed, as shown in Figure
17-3.
Step 3 Deselect the NE to be un-subscribed.
Step 4 Click OK. The canceling subscription operation is completed.
----End
Step 2 Click the Local Maintenance Monitor tab and select the NE to be disconnected forcedly in
the User Session interface, as shown in Figure 17-5.
Step 3 Click Force User to Exit, as shown in Figure 17-6. The forcing user to exit operation is
completed.
----End
Filtering
The procedure for filtering is as follows:
Step 1 Click Filter in the Local Maintenance Monitor interface to enter the filtering interface, as
shown in Figure 17-7.
Step 2 Set conditions of the NE user to be filtered in the NE, User, Login IP, and Service panes.
Step 3 Click OK. The system displays the information that meets the conditions to the Local
Maintenance Monitor interface.
----End
17.10 References
17.10.1 Standards and Specifications
None.
17.11 FAQ
None.
Contents
Figures
Figure 18-1 Processing flow of SMS notification for call failure triggered in the GMSC...............................18-5
Figure 18-2 Processing flow of SMS notification for call failure generated in the VMSC..............................18-6
Figure 18-3 Triggering point of SMS notification for call failure in the GMSC..............................................18-7
Figure 18-4 Triggering point of SMS notification for call failure in the VMSC..............................................18-8
Figure 18-5 Processing flow after SMS notification for call failure is triggered..............................................18-9
Tables
Table 18-7 Script for configuring the processing for SMS notification for call failure .................................. 18-11
Section Describes
18.1 Service Description The function code, function definition of this feature, and the
benefits that carriers and mobile subscribers can obtain from
this feature.
18.2 Availability The network elements (NEs) that are required for the feature,
whether Licenses are required, and the version requirements
of the NEs.
18.3 Working Principle The functions of the NEs, and networking requirements.
18.4 Service Flow The service flow of the network when providing this feature.
18.5 Data Configuration The data configurations that are required on the
MSOFTX3000 and the UMG8900.
18.6 Service Management The service operations that carriers and mobile subscribers
are required to implement when the network provides this
feature.
18.7 Charging and The charging and the generation of CDRs when the network
Charging Data Record provides this feature.
(CDR)
18.8 Service Interaction The relationships and restrictions between this feature and
other services or features.
18.9 Reference The protocols and specifications that this feature must
comply with, and the acronyms and abbreviations of this
chapter.
18.1.2 Definition
SMS notification for call failure informs the callee of missed calls by sending the Short
Message (SM). When there is a missed call, the network sends an SM to inform the callee of
the date, time and calling number of the missed call.
SMS notification for call failure is a network level service. There is no limit on the number of
subscribers.
If the following exception occurs, the network triggers the service:
z The callee switches off.
z The callee is unreachable.
z The callee is busy.
z The callee does not answer the call.
18.1.3 Benefits
Table 18-1 lists the benefits of SMS notification for call failure.
Beneficiary Description
Carrier SMS notification for call failure is a kind of compensation service that
provides more compensation measures for subscribers when they cannot
answer the call.
Notification messages are edited according to the type of call failure.
Subscribers can clearly learn the specific causes of missed calls.
The service can be provided in two modes:
z The subscribers do not need to subscribe to the service in the HLR. The
service is free of charge, which improves the customer satisfaction.
z The subscribers subscribe to the HLR. The carriers charge the
subscribers with certain amount of fees, which increases the service
profit.
At present, the former mode is adopted.
Mobile SMS notification for call failure provides one more choice of
Subscriber compensation service for subscribers. It can reduce the loss resulted from
missed calls.
Subscribers can clearly learn the specific causes of the missed call,
calling number, date and time of the call.
18.2 Availability
18.2.1 Requirements for NEs
Table 18-2 gives the required network elements (NEs) for SMS notification for call failure
service.
√ √ √ √ - √ √ √
If the callee is absent in the call (turnoff, roaming not allowed, deleted in the VMSC or
unreachable), the HLR sends the information that the subscriber is absent in the SRI ACK
message to the GMSC, to complete preparation for triggering the service.
The Short Message Service Center (SMSC) receives and sends the call failure SM.
Figure 18-1 Processing flow of SMS notification for call failure triggered in the GMSC
SETUP
IAM MAP_SEND_ROUTING_INF
O_REQ
MAP_SEND_ROUTING_INF
O_CNF
MO_FORWARD_SM_ARG
MO_FORWARD_SM_RES
Figure 18-2 Processing flow of SMS notification for call failure generated in the VMSC
IAM
PAGING
PAGING
SETUP
SETUP
In most cases, SMS notification for call failure is triggered in the VMSC. The subsequent flow after
triggering is almost the same. For more information, see Figure 19-5.
z The GMSC and VMSC apply for the License of SMS notification for call failure.
z The GMSC and VMSC activate the SMS notification for call failure service.
z The CPU is not overloaded.
Figure 18-3 Triggering point of SMS notification for call failure in the GMSC
(G)MSC HLR
MAP_SEND_ROUTING_INFO_REQ
MAP_SEND_ROUTING_INFO_CNF
Figure 18-4 Triggering point of SMS notification for call failure in the VMSC
IAM
PAGING
There is no response to the
PAGING message.
SETUP
Wireless channel is
congested.
Figure 18-5 Processing flow after SMS notification for call failure is triggered
MO_FORWARD_SM
Trigger SMS
notification for MO_FORWARD_SM
call failure. ACK
SEND_ROUTING_INFO_F
OR_SM
SEND_ROUTING_INFO_F
OR_SM ACK
MT_FORWARD_SM
PAGING
PAGING
PAGING ACK
PAGING ACK
CP_DATA
CP_DATA
CP_DATA
ACK
CP_DATA ACK
MT_FORWARD_SM ACK
Configuration Script
The steps for configuring data in the GMSC of subscriber A are as follows:
Step 1 Query the License.
Description Query the License to check whether it supports the SMS notification for
call failure service.
Script DSP LICENSE:;
Note If the loaded License does not support the SMS notification for call failure
service, load the License that supports this function.
Table 18-6 Script for adding the content of SMS notification for call failure
Description Add the content of SMS notification for call failure.
Step 4 Configure the processing for SMS notification for call failure.
Table 18-7 Script for configuring the processing for SMS notification for call failure
Description Configure the processing for SMS notification for call failure.
----End
Providing
Step 1 Run DSP LICENSE to query whether the License supports the SMS notification for call
failure service. If it does, skip to Step 3.
Step 2 If the License does not support the service, run LOD LICENSE to load the License of SMS
notification for call failure.
Step 3 Run LST MAPPARA to query whether the GMSC or VMSC supports the SMS notification
for call failure service.
Step 4 Run SET MAPPARA to provide the SMS notification for call failure service, that is, set the
parameter Support call failed SM indication to TRUE.
----End
Withdrawing
Step 1 Run LST MAPPARA to query whether the GMSC or VMSC supports the SMS notification
for call failure service.
Step 2 Run SET MAPPARA to withdraw the SMS notification for call failure service, that is, to set
the parameter Support call failed SM indication to FALSE.
----End
Registering
Step 1 Run LST SMCONT to query the setting of SM content for call failure.
Step 2 Run ADD SMCONT to add the content of SM for call failure, that is, send specific content to
the callee when the call fails.
Step 3 Run LST CFSMSPRO to query the configuration of SMS notification for call failure.
Step 4 Run ADD CFSMSPRO to add related data of the designated subscriber to complete the
registration with the service for the subscriber.
----End
Deregistering
Step 1 Run LST CFSMSPRO to query the configuration of SMS notification for call failure.
Step 2 Run RMV CFSMSPRO to delete related data of the designated subscriber to cancel the
registration with the service for this subscriber.
----End
18.7.3 Charging
The carriers decide whether to charge for SMS notification for call failure. At present, they do
not charge for the service.
18.8.2 SM Service
SMS notification for call failure is realized in the form of SMS. It differs from common SMS
in that: common SMS is originated by the MS while the SMS notification for call failure is
originated by the network. The SMMT flows are the same.
18.9 Reference
18.9.1 Protocols and Specifications
None.
Contents
Figures
Figure 19-1 Synchronization relationship between the NTP server, BAM server, and the host.......................19-4
Figure 19-2 Time icon of Windows2000 operating system..............................................................................19-5
Figure 19-3 Adjusting clock for daylight saving changes ................................................................................19-6
Tables
Table 19-1 Name and function code of the summer time feature .....................................................................19-2
Table 19-2 NEs related to the summer time feature of the wireless time zone.................................................19-3
Table 19-3 Versions that support the summer time feature of the wireless time zone ......................................19-3
Section Describes
19.1 Feature The function code, function definition of this feature, and the benefits
Description that carriers and mobile subscribers can obtain from this feature.
19.2 Availability The network elements (NEs) that are required for the feature, whether
Licenses are required, and the version requirements of the NEs.
19.3 Working The functions of the NEs, and networking requirements.
Principle
19.4 Data The data configurations that are required on the MSOFTX3000 and
Configuration the IMG8900.
19.5 Charging and The charging and the generation of CDRs when the network provides
CDR this feature.
19.6 Service The relationships and restrictions between this feature and other
Interaction services or features.
19.7 Reference The protocols and specifications that this feature must comply with,
and the acronyms and abbreviations of this chapter.
Table 19-1 Name and function code of the summer time feature
Name Code
19.1.2 Definition
Concept of Time Zone
The world time zones are divided based on the prime meridian. The initial time zone covers
the west 7.5 to east 7.5 (with a width of 15). From the initial zone eastward and westward, the
surface of the earth is divided into 14 and 12 time zones respectively. The GMT+14 time zone
overlaps with the GMT-12 time zone. In this way, the surface of the earth is longitudinally
divided into 26 time zones, and every neighboring two time zones observe a clock time one
hour offset (some neighboring time zone offsets are 30 minutes or 15 minutes). In the same
time zone, you can observe sunrise from the east part and the west part respectively within
one hour.
The time zone boundaries are geographic longitudes in principle. In actual practice, however,
they are substituted by the regional boundaries or natural boundaries for easy application. At
present, most of the countries use the standard time with the unit zone time. The standard time
has hour(s) offset from the GMT. Some countries, however, still use the local time of the
capital or some important commercial ports as the standard time. Thus, the offset between the
standard time of these countries and that of the GMT is in precision of minute.
19.1.3 Benefits
Beneficiary Description
Carrier In those regions that use the summer time, the carriers can configure the
system time of the MSOFTX3000 to accommodate all the services to the
summer time.
Mobile The services provided by the carrier comply with the time habit of the
subscriber subscribers, thus the subscribers can enjoy the services more
conveniently.
19.2 Availability
19.2.1 Requirement for NEs
The summer time feature of the wireless time zone requires the corporation of the MSC server
and the HLR.
Table 19-2 lists the NEs related to the summer time feature of the wireless time zone.
Table 19-2 NEs related to the summer time feature of the wireless time zone
UE/MS NodeB/ RNC/BSC MSC MGW SGSN VLR HLR
BTS Server
√ √ √ √ – – √ √
Table 19-3 Versions that support the summer time feature of the wireless time zone
Product Applicable Versions
Figure 19-1 Synchronization relationship between the NTP server, BAM server, and the host
ne
zo
e er
tim m
s t um
ho d s ift
e n
th a s h fy
cti t
t ify nge ime re hos
No cha t lly e
GM d ica of th
NTP server 1 rio e Host
T Pe tim
e
2 th
Time informaton:
(BAM Loacal time + time zone+ summer
time offset)
BAM
When modifying the time zone configuration of the BAM server, the local time of the system
in which the BAM resides changes accordingly.
In the following example, if:
z GMT is 00:00:00
z Time zone of the BAM is GMT+7
z Local time of the BAM is 07:00:00
If you set the time zone of the BAM to GMT+8 by using the command SET TZ, the local
time of the BAM changes to 08:00:00 immediately. Then the BAM server sends the modified
time zone and local time to the host at once.
When it reaches the summer time shift point (the beginning time point or the end time point of
the summer time), the local time of the BAM server is set according to the synchronization
mode between the BAM server and NTP server:
z If the BAM is configured with an effective NTP server, the BAM performs automatically
time synchronization with the NTP server if it is in normal communication with the NTP
server. Then the BAM server adjusts the local time according to the configuration of the
summer time.
z If the BAM is not configured with an effective NTP server, or the BAM is disconnected
with all the NTP servers, the BAM does not perform time synchronization with the NTP
server. The BAM server adjusts the local time directly according to the configuration of
the summer time.
Once the local time is adjusted, the BAM server synchronizes immediately the local time,
time zone, and the summer time with the host. The BAM server also notifies the service
processes the summer time. In addition, when it reaches the summer time shift point, the
BAM server raises the "Enter daylight saving time" or "Leave daylight saving time" alarm.
Table 19-4 lists the detailed alarm information.
836 Event Enter daylight saving time The BAM enters the summer time.
837 Event Leave daylight saving time The BAM leaves the summer time.
If it is in the summer time, the MML message head contains the summer time information.
When in summer time, a DST is suffixed to indicate the summer time, for example,
2006-03-21 15:25:58 DST.
Step 2 In the Time Zone tab, unselect Automatically adjust clock for daylight saving changes if is
selected, and then select the correct time zone from the drop-down list. Click Apply and then
OK, as shown in Figure 19-3.
----End
Procedure
To perform data configuration, do as follows:
Step 1 Check the configuration information of the BAM time zone and summer time by using the
command LST TZ.
Step 2 Configure the time zone and summer time of the BAM server by using the command SET
TZ.
----End
19.4.2 Example
Scenario
The BAM server is in GMT-6, and the country in which the BAM server resides uses the
summer time. The rule for implementing the summer time is as follows:
z In the wee hours of the last Sunday of every March, set the clock one hour forward when
it shifts from the non-summer time to summer time.
z In the wee hours of the last Sunday of every October, set the clock one hour backward
when it shifts from the summer time to non-summer time.
----End
system that uses the local time. Take the traffic statistics for example, when there is an
overlapped area in the local time, the traffic of the overlapped time area will be accumulated.
In this way, the traffic statistics of the overlapped area is counted.
For the traffic statistics and charging of different time zones, if the local time is involved, you
need to convert the time of different time zones according to the local time and the summer
time.
19.7 Reference
19.7.1 Protocols and Specifications
None.
Contents
Figures
Tables
Table 20-1 Network elements concerning with version software management features ..................................20-3
Table 20-2 Applicable versions for the version software management features ...............................................20-3
Table 20-3 MML command table for patch management.................................................................................20-7
Section Describes
20.1 Service Description The function code, function definition of this feature, and
the benefits that carriers and mobile subscribers can
obtain from this feature.
20.2 Availability The network elements (NEs) that are required for the
feature, whether Licenses are required, and the version
requirements of the NEs.
20.3 Working Principle The functions of the NEs, and networking requirements.
20.4 Patch Operation Flow The service flow of the network when providing this
feature.
20.5 Data Configuration The data configurations that are required on the
MSOFTX3000 and the IMG8900.
20.6 Service Management The service operations that carriers and mobile
subscribers are required to implement when the network
provides this feature.
20.7 Charging and CDR The charging and the generation of CDRs when the
network provides this feature.
20.8 Service Interaction The relationships and restrictions between this feature and
other services or features.
20.9 Reference The protocols and specifications that this feature must
comply with, and the acronyms and abbreviations of this
chapter.
20.1.2 Definition
The software management is a feature in the operation and maintenance field. That is, through
the operation and maintenance center or the network management, the following functions
can be realized:
z Manage the version software and data configuration of network elements within the
dominated field
z Realize the lot-size transmission, loading and activation of program and data
configuration
Therefore, the efficiency and quality of the system maintenance and network element
management can be greatly improved.
The version adaptation for software management must be considered. The feature introduces how to
load hot patch for the system when the MSOFTX3000 is managed by the M2000 uniformly.
20.1.3 Benefits
Beneficiary Description
20.2 Availability
20.2.1 Requirements for NEs
The MSC server and the M2000 are required to complete the version software management
features, as listed in Table 20-1.
Table 20-1 Network elements concerning with version software management features
- - - √ - √ - - -
Table 20-2 Applicable versions for the version software management features
The text does not cover the upgrading process of cold patch. Therefore, if there are no special
descriptions, the patch is a hot patch.
z Hot Patch : Hot patch, a software program entity, adopting software tailor and
programming technology, can load and unload files independently on the base of original
version by the independent background or independent install files or file copy. The
patch is composed of one or more changes. The original program may be affected after
patch loading.
The hot patch is realized by on-line effective technology. The tool for making patch creates
patch files based on the target files complied by the source code. The patch management
modules then operate on the patch files to realize the patch management.
z Cold Patch : Hot patch can not modify some problems; hence, the board software is
required to be reloaded. On this occasion, you can use cold patch to repair the system.
z Board Locating Parameter : In the commands introduced in the text, patch type, module
number or active/standby module information are the parameters for locating board.
LOD PATCH
Load the patch to specified board
MSOFTX3000 reports sucess or
failure to the M2000
CON PATCH
Confirm the patch of specifie
MSOFTX3000 reports sucess or board
failure to the M2000
DEA PATCH
Deactivate the patch of specified
MSOFTX3000 reports sucess or failure board
to the M2000
Patch version upgrade does not cause out of service and has a minor impact on the system;
therefore, it is an important method of upgrading version during equipment maintenance. The
key problem of patch upgrading is the convenient operation for maintenance staffs during
upgrading process. You can complete the upgrading after ensuring the correctness of patch
version and you also can roll back when finding abnormal conditions. To upgrade patch,
perform the following steps:
Step 1 Observe the patch status.
As the equipment is used in the network for a long time, the status of current patch loaded
may be not archived, or the archived information is not correct. Whether the patch version for
upgrading can be loaded is closely related to the current patch status; therefore, it is essential
to observe the current patch status of system.
You can observe the current patch status by using the commands based on the system, subrack,
board type and board. You can observe the patch status when patches are in the state of
loading, activation and default.
Step 2 Load a patch.
Patch loading indicates that after the M2000 deliverers the patch loading commands. The
MSOFTX3000 loads the patch files downloaded to the BAM system to the boards. After
loading, the status of the new patch can be checked by using commands.
The system loads the corresponding patches for the boards based on the patch types.
Patch files must match each version. Each type of board can only have one patch file while
one patch file can contain many patch units.
Step 3 Validate a patch.
To validate the patch is to activate the patch.
The patches are managed by the same patch management modules; hence, the patches on the
same board can be validated at the same time but the patches on different boards can not.
Therefore, the patches on different boards are validated in a certain sequence. The system
observes the validated patch on a certain type of board for a period of time. If the running
status meets the requirements of system, the patches of other boards are loaded. Therefore, the
function validating patches based on the board type is required.
Step 4 Cancel a patch.
z When you cancel patches, the patches loaded are not validated due to board switchover
and reset.
z Patch cancellation does not differentiate the active/standby boards.
Patch cancellation can also be called patch deactivation and patch removal.
The patch cancellation is required when the system is abnormal after the patch upgrading is
completed. The methods of canceling the patch are listed as follows:
z Cancellation based on board
z Cancellation based on board type
Step 5 Confirm a patch.
Patch confirmation is to set the effective patch to the default patch.
After the patch is effective for a period of time, if the system is running normally, update the
patch and make the patch loaded to the current default patch.
----End
1 DLD To download the patch from the file server to the NEs.
PATCH
2 ULD To upload the patch from the network elements to the file
PATCH server.
3 LOD To download the patch from the main control board to the
PATCH board loading patch.
4 ACT To active the patch and ensure that the patch is in active state.
PATCH The active patch can be run but is still in the trial status. After
the patch is on trial for a period of time, if it runs normally
after confirmation, confirm the patch to switch to the stable
running status from the trial running status. If the patch does
not run normally, deactivate the patch to stop trial running.
5 DEA To deactivate the patch and ensure that the patch is in
PATCH deactivated state
You can deactivate the patch only at trial status.
6 CON To confirm patch.
PATCH The patch switches to the running status from the active state.
Ensure that the patch is effective after restarting.
7 RMV To remove patch.
PATCH After the patch is removed, if the patch is required to be run
again, reload the patch. You can remove the patch at any
status.
8 LST PATCH To list the version and status information of each type of patch
for network elements.
9 DSP PATCH To display the patch status information of each board for
network elements.
For the usage of MML commands and the description of parameters, see MML online help of the LMT.
Input
If the patch files are to be loaded,
z The M2000 delivers DLD PATCH to the MSOFTX3000.
z The M2000 delivers LOD PATCH to the MSOFTX3000.
z The M2000 delivers ACT PATCH to the MSOFTX3000.
z The M2000 delivers CON PATCH to the MSOFTX3000.
Output
After the M2000 delivers DLD PATCH to the MSOFTX3000,
z The MSOFTX3000 downloads the patch files from the file server;
z The MSOFTX3000 reports the download progress (containing the start packet and end
packet) to the M2000.
If the download is incorrect, the MSOFTX3000 is required to report the failure mistakes
and causes to the M2000.
If the downloading is successful, the MSOFTX3000 is required to report the packets
indicating the successful downloading to the M2000.
After the M2000 delivers LOD PATCH to the MSOFTX3000,
z The MSOFTX3000 must load the patch to the corresponding boards.
z The MSOFTX3000 reports the success or failure packets to the M2000.
After the M2000 delivers ACT PATCH to the MSOFTX3000,
z The MSOFTX3000 activates the patch of corresponding board.
z The MSOFTX3000 reports the success or failure packets to the M2000.
After the M2000 delivers CON PATCH to the MSOFTX3000,
z The MSOFTX3000 confirms the patch of corresponding boards.
z The MSOFTX3000 reports the success or failure packets to the M2000.
After the M2000 delivers DEA PATCH to the MSOFTX3000,
z The MSOFTX3000 is required to deactivate the patch of boards.
z The MSOFTX3000 reports the success or failure packets to the M2000.
After the M2000 delivers RMV PATCH to the MSOFTX3000,
z The MSOFTX3000 must remove the board patch.
z The MSOFTX3000 reports the success or failure packets to the M2000.
The M2000 software management only supports the remote operations for MSOFTX3000 patches.
Patch Files
The patch file folder contains the patch files provided by the network element, such as
patch.wcu and patch description configuration files, such as patchcfg.xml. The patchcfg.xml
file describes the related information, such as version number, patch version number, file
name, file size and file path of version files uploaded currently.
The Version is the specific version uploaded and the Patch is the specific patch uploaded.
Step 3 Choose the patch to be downloaded to the network element. Right-click Download To NE
and the NE Selection dialog box is displayed.
Step 4 Choose the network element and click OK. The system auto downloads the files. A new task
is added to the task progress table on the lower part of the main software management
interface to display the downloading progress and status information.
----End
Loading Patch
To load a patch, perform the following steps:
Step 1 Choose the NE page on the main software management interface.
Step 2 Choose the nodes MSC Server > NE > Software> Version > Patch. The patch file lists are
auto displayed on the right table.
The NE is the specific NE name, Version is the specific version of NE and Patch is the specific patch
of NE.
Step 3 Choose the patch. Right-click Load and the Load Patch Parameters Selection dialog box
are displayed.
Step 4 Enter the corresponding parameter value and click OK. A new task is added to the task
progress table on the lower part of the main software management interface to display the
loading operation progress and status information.
----End
Activating Patch
To activate a patch, perform the following steps:
Step 1 Choose the NE page on the main software management interface.
Step 2 Choose the nodes MSC Server > NE > Software > Version > Patch. The patch file lists are
auto displayed on the right table.
The NE is the specific network element name, Version is the specific version of NE and Patch is the
specific patch of network element.
Step 3 Choose the patch. Right-click Activate and the Activate Patch Parameters Selection dialog
box is displayed.
Step 4 Enter the corresponding parameter value and click OK. A new task is added to the task
progress table on the lower part of the main software management interface to display the
activating operation progress and status information.
----End
Confirming Patch
To confirm a patch, perform the following steps:
Step 1 Choose the NE page on the main software management interface.
Step 2 Choose the nodes MSC Server > NE > Software > Version > Patch. The patch file lists are
auto displayed on the right table.
The NE is the specific network element name, Version is the specific version of NE and Patch is the
specific patch of network element.
Step 3 Choose the patch. Right-click Confirm and the Confirm Patch Parameters Selection dialog
box is displayed.
Step 4 Enter the corresponding parameter value and click OK. A new task is added to the task
progress table on the lower part of the main software management interface to display the
progress and status information of confirming operations.
----End
Deactivating Patch
To deactivate a patch, perform the following steps:
Step 1 Choose the NE page on the main software management interface.
Step 2 Choose the nodes MSC Server > NE > Software > Version > Patch. The patch file lists are
auto displayed on the right table.
The NE is the specific network element name, Version is the specific version of NE and Patch is the
specific patch of network element.
Step 3 Choose the patch. Right-click Deactivate and the Deactivate Patch Parameters Selection
dialog box is displayed.
Step 4 Enter the corresponding parameter value and click OK. A new task is added to the task
progress table on the lower part of the main software management interface to display the
progress and status information of the deactivating operation.
----End
Removing patch
To remove a patch, perform the following steps:
Step 1 Choose the NE page on the main software management interface.
Step 2 Choose the nodes MSC Server > NE > Software > Version > Patch. The patch file lists are
auto displayed on the right table.
The NE is the specific network element name, Version is the specific version of NE and Patch is the
patch of specific network element.
Step 3 Choose the patch. Right-click Unload and the Unload Patch Parameters Selection dialog
box is displayed.
Step 4 Enter the corresponding parameter value and click OK. A new task is added to the task
progress table on the lower part of the main software management interface to display the
progress and status information of the unloading operation.
----End
20.9 Reference
Acronym/Abbreviation Full Name
Contents
Figures
Tables
Section Describes
21.1 Service Description The function code, function definition of this feature, and
the benefits that carriers and mobile subscribers can
obtain from this feature.
21.2 Availability The network elements (NEs) that are required for the
feature, whether Licenses are required, and the version
requirements of the NEs.
21.3 Working Principle The functions of the NEs, and networking requirements.
21.4 Service Flow The service flow of the network when providing this
feature.
21.5 Data Configuration The data configurations that are required on the
MSOFTX3000 and the IMG8900.
21.6 Service Management The service operations that carriers and mobile
subscribers are required to implement when the network
provides this feature.
21.7 Charging and CDR The charging and the generation of CDRs when the
network provides this feature.
21.8 Service Interaction The relationships and restrictions between this feature and
other services or features.
21.9 Reference The protocols and specifications that this feature must
comply with, and the acronyms and abbreviations of this
chapter.
21.1.2 Definition
To ensure network security, the system is equipped with the timely rollback function that can
prevent traffic loss caused by incorrect operations. This is a basic requirement of telecom
products.
Consider that the configuration rollback feature is not enabled. During data configuration,
after you successfully add, delete or modify certain data, the modified data is stored in the
database temporarily. The data is then sent to the host and takes effect immediately after the
formatting and online setting functions are enabled.
If the data is wrongly configured, you have to restore the previous configuration. It wastes
time to restore the database backup or run the commands one by one to get back to the
previous state. In addition, if you choose to restore the database, you have to set the data table
in batch or reset the host, which may interrupt the services and in turn affect the stable
operation.
To solve these problems, the configuration rollback function is presented. It sets up a standby
area for each table that supports configuration rollback. You can first configure data in the
standby area. This does not affect the data in the active area or services of the host. After the
configuration is complete, you hand over the data in the standby area to the active area to
validate the configuration. After a period of trial operation, if the data is found to be incorrect,
you hand over the active/standby data to roll back to the previous state. If the data is proved
correct, you enable the configuration permanently and end the task.
z "Enable" in non-rollback state: The host runs the newly configured data and cannot roll back to the
previous configuration.
z "Enable" in rollback state: The host runs the newly configured data and can roll back to the previous
configuration.
z "Enable permanently" in rollback state: It means the same as "Enable" in non-rollback state.
z The configuration rollback mechanism is built on the principle that the operator who locks the table
is authorized to perform the related operations. As a special internal account is used to log on to the
BAM from the M2000 and this account is not related to M2000 users, operations of multiple users
on the M2000 cannot be distinguished at the BAM side and thus the BAM cannot obtain specific
user information. Therefore, only the local users of the NE can use the configuration rollback
feature.
21.1.3 Benefits
Table 21-2 lists the benefits of the configuration rollback feature.
21.2 Availability
21.2.1 Requirements for NEs
The configuration rollback feature is performed without collaborating with peripheral NEs.
Table 21-3 Applicable versions that support the configuration rollback feature
Product Applicable Version
Active
area
Data
BAM tbl_XXXXX
Files of standby tables
tbl_XXXXX_Backup
Data_Backup
Standby
area
Active: V0 Active: V1
Standby: V? Normal operation Normal operation Standby: V?
(original Safe configuration (Modified
configuration) configuration)
Synchronize Confirm/
Cancel timeout
Active: V0 Active: V1
Activate/ Active: V1
Standby: V0 Standby: V1
Activate Standby: V0
forcibly Synchronize
forcibly
Modify Trial Modify
Active: V0 Rollback/
Standby: V1 Rollback
forcibly
Compare data
before and after
modification
To facilitate the description of state transition, three table states are defined:
z Normal
In "Normal" state, you cannot perform any configuration operation.
z Modify
During configuration rollback, you can run commands to configure data in "Modify"
state and only in this state. If a table in "Modify" state is not processed within a period,
its state remains unchanged.
z Trial
In "Trial" state, the newly configured data takes effect in the host. If any problem is
found in this state, the system rolls back to the "Modify" state to correct the
configuration.
z The table states are used when the configuration rollback function is enabled. If it is disabled, the
configuration flow is as normal, that is, the previous three states do not exist.
z The restart of the BAM does not affect the table state, original data and backup files of a table in
"Modify" or "Trial" state.
Normal State
When the configuration rollback function is enabled, before you run the synchronization
command, the tables that support configuration rollback are in "Normal" state. The data in the
active area is the original data, represented by V0. The standby area has no data, represented
by V?.
Consider the Called Number Analysis Table as an example. Suppose there is a record Call
prefix = 135 in the active area, then the same record exists in the host and no data exists in the
standby area.
Modify State
Synchronization means to synchronize the data in the standby area with that in the active area.
After synchronization, the data in the two areas is the same. The table changes to be in
"Modify" state. The record Call prefix = 135 exists in the standby area.
z You can run commands to configure data in the tables that support configuration rollback
feature only in "Modify" state. The commands take effect only in the standby area. The
data in the active area does not change and the host is not affected. If you add a record
Call prefix = 136 to the table, then there are two records of call prefix in the standby
area. The data in the standby area is now represented by V1.There is only one record in
the active area and the host, that is, Call prefix = 135.
z If you cancel the operation in "Modify" state, the data V1 in the standby area is deleted.
The data in the active area and the host remains unchanged.
Trial State
After activation or forcible activation, the table changes to be in "Trial" state. The data in the
standby area is handed over to the active area and then set to the host immediately. In case of
later rollback, the system also hands over the data in the active area to the standby area. Now
the data in the active area is V1. Two records (Call prefix = 135 and Call prefix = 136) exist
in the active area. The data of the host is the same as that in the active area. The data in the
standby area is V0. Only one record (Call prefix = 135) exists in the standby area.
z In "Trial" state, the data is being tested. You are not allowed to perform any operation. If
you find that the configured data has errors, defects or problems that cannot be located,
you can roll back the configuration to the original state. After rollback, the data in the
active and the standby area exchanges again. The data in the active area is V0. Only the
record (Call prefix = 135) exists in the active area and the host. The data in the standby
area is V1. Two records (Call prefix = 135 and Call prefix = 136) exist in the standby
area.
z In "Trial" state, if the data in the host is correct, run the confirmation command and
enable the configuration in the active area and the host permanently. The table changes to
be in "Normal" state. Now the data in the active area is V1. At the same time, the data in
the standby area is deleted.
z In "Trial" state, the host is running as usual. If you want to re-configure the data, you can
run the command FSYN XXX to forcibly synchronize the data in the standby area with
the data in the active area. Thus, the former data in the standby area is lost completely.
The table turns to be in "Modify" state. You can proceed with the configuration and then
activate, roll back or confirm the configuration.
z Unknown
The tables rely on each other during data configuration. Therefore, the data in the table is
updated to be "Unknown" after rollback. The unknown data is the data that has not been
verified.
z Checked
The data in "Checked" state means that the data is being checked.
z Invalid
During validity check, if the data fails to meet the check rules, it is set to be "Invalid".
Figure 21-3 shows the state transition of the data in the standby area.
Modify
Valid Unknown
Check
Check storage
Modify
succeeded procedure
Invalid Checked
Check failed
Before enabling the configuration rollback function, you must enable the formatting function first. The
latter cannot be disabled when the former is enabled.
Step 3 Consider that you must modify a table that supports configuration rollback. First, run the
command SYN XXX to synchronize the data in the standby area with that in the active area.
XXX refers to the object to which the command is executed.
1. Synchronize the data in the standby area with that in the active area. This is a basis for
later modification.
2. Lock the table. It serves two purposes:
− The data of the locked table in the active area cannot be modified.
− It prevents other operators from modifying the data of the locked table in the standby
area at the same time.
You modify data in the standby area and the modification is not set to the host. If another
operator wants to modify the table at the same time, he/she must obtain the control right by
running the command FSYN XXX. Note that the data modified by you may be lost then.
If you want to run the forcible synchronization command, it is recommended to query the table state to
check whether the table is locked by any other operator. If the table has been locked by an operator, you
must obtain agreement of that operator first and keep cautious in operation.
Step 4 During data configuration, if you want to cancel the modification, run the command CNL
XXX to delete all the modified data in the standby area while the data in the active area
remains unchanged.
Step 5 After configuration, run the command ACT XXX to validate the modified data and start the
trial operation. At present, the data in both the active and the standby areas cannot be
modified.
The data in the standby area must be checked for validity before activation. If the check fails
because the dependent tables affect each other, run the forcible command FACT XXX to omit
the validity check on certain tables. Before activation or rollback, the data must be proved
valid. The validity check can be performed in either of the following ways:
z The BAM auto checks the data of the tables that support configuration rollback every
five seconds.
z You can run the command CHK XXX to check the data of a specific table.
Step 6 Within 24 hours after activation, if you find errors in the configured data, run the command
RLB XXX to hand over the active/standby data again. After handover, modify the incorrect
data and then re-activate it. The data in the standby area must be checked for validity before
rollback. You can run the forcible command FRLB XXX to avoid the validity check if
necessary.
Within 24 hours after activation, if you want to re-configure the data, use either of the
following methods:
z Roll back the configuration. Modify the data and then activate it again.
The configuration must be rolled back to the original state by using this method. This may interrupt the
services set up by the newly configured data. The data in the standby area, however, resumes the
previous configuration after rollback. The operator can modify the data based on the previous
configuration.
z Run the forcible synchronization command to overwrite the standby area with the data of
the active area, that is, use the modified data to overwrite the original data. Then, you
can modify the data based on the previous modification and re-activate it.
The configuration can never be rolled back to the original state by using this method.
Only the users at the Operator level or higher levels are authorized to perform the
configuration rollback operations. A user name often corresponds to a user ID (used inside the
BAM). When a user name is deleted and then added again, the user ID of this user changes.
The configuration rollback feature only identifies the user ID. Therefore, user names can be
used to identify the operators. The same operator can log in to different terminals to perform
configuration rollback operations at the same time.
During configuration rollback, a set of commands are provided for operators to query the
current state, standby table data, differences between the active and the standby tables. These
commands are described in the following sections.
Commands
Table 21-5 lists the MSOFTX3000 commands used for configuration rollback.
RLB XXX Change Back XXX To roll back the activated table
FRLB XXX Forcibly Change Back To forcibly roll back the activated table
XXX when the data in the table is invalid
LST XXXBKP List Backup XXX To list the data in the standby table
CMP XXX Compare XXX in To compare the differences between the
Active/Standby Way active and the standby areas, such as records
existing only in the active area, records
existing only in the standby area and records
that are different in the active and the
standby areas
CHK XXX Check XXX Table To check the validity of the data in the
standby area
LST TBLSTA List the Status of To list the information of tables that support
Configuration Rollback configuration rollback, including table state,
Table data credibility, operator locking the table,
state transition time, table ID and table name
LST List Dataman Status To list the configuration rollback status
DATAMAN
LST CMTTM List Auto Confirm To list the duration after which the system
Time performs automatic confirmation
MOD CMTTM Modify Auto Confirm To modify the duration after which the
Time system performs automatic confirmation
z In "Modify" or "Trial" state, you can run the command CMP XXX to compare the data between the
active and the standby areas.
z In "Modify" state, the BAM auto checks the validity of the data in the tables that support
configuration rollback every five seconds.
z The auto confirmation duration is 24 hours by default. Therefore, in "Trial" state, the system auto
confirms the modification after 24 hours. You can run the command MOD CMTTM to modify the
auto confirmation duration.
Consider the Called Number Analysis Table as an example to describe the configuration steps.
Step 1 Run the command SET CFGRLB to enable the configuration rollback feature.
SET CFGRLB: STS=ON;
Step 2 Run the command SYN CNACLD to synchronize the call prefix of the active and the standby
areas.
SYN CNACLD:;
Step 3 Run the command ADD/MOD/RMV CNACLD to modify the call prefix in the standby area.
ADD CNACLD: P=0, PFX=K'111, MINL=1, MAXL=2;
Step 4 Run the command CHK CNACLD to check the validity of the modified data.
CHK CNACLD:;
Step 5 Run the command ACT CNACLD to activate the modified data in the standby area. The
Called Number Analysis Table changes to be in "Trial" state.
ACT CNACLD:;
Step 6 Run the command CMT CNACLD to confirm the modification in "Trial" state. The newly
configured data take effect.
CMT CNACLD:;
Step 7 Run the command SET CFGRLB to disable the configuration rollback feature.
SET CFGRLB: STS=OFF;
Step 8 After Step 5, you can run the command RLB CNACLD to roll back the configuration. The
Called Number Analysis Table changes back to be in "Modify" state.
RLB CNACLD:;
Step 9 After Step 2 and Step 8, you can run the command FSYN CNACLD to forcibly synchronize
the data of the active and the standby areas.
FSYN CNACLD:;
Step 10 Run the command FACT CNACLD to forcibly activate the modified data in the standby
area.
FACT CNACLD:;
Step 11 Run the command FRLB CNACLD to roll back the configuration forcibly.
FRLB CNACLD:;
Step 12 Run the command CNL CNACLD to cancel the modification in "Modify" state.
CNL CNACLD:;
Step 13 Run the command SET CFGRLB to disable the configuration rollback feature.
SET CFGRLB: STS=OFF;
Step 14 Run the command LST TBLSTA to list the status of tables that support configuration
rollback.
LST TBLSTA: ;
Step 15 Run the command LST CNACLDBKP to list the data in the standby area.
LST CNACLDBKP: ;
Step 16 Run the command LST DATAMAN to list the status of the configuration rollback feature.
LST DATAMAN: ;
----End
SET CFGRLB
This command is used to enable or disable the configuration rollback function. You can
perform the configuration rollback operations only when the command sets it to ON. When
the BAM finds after start that the configuration rollback is enabled while the formatting is not,
it enables the formatting function forcibly. You can perform the configuration rollback
operations only when the two functions are both enabled.
Therefore, you must first run the command SET FMT to enable the formatting function, and
then run the command SET CFGRLB to enable the configuration rollback function.
LST DATAMAN
This command is used to list the status of the configuration rollback, formatting and online
setting functions.
LST TBLSTA
This command is used to list the table information, such as table state, data credibility,
operator locking the table and state switch time.
You can list the information of a certain table or all tables. The operator who is authorized to
run this command can list the information of the tables locked by another operator.
LST CMTTM
This command is used to list the auto confirmation duration for configuration rollback.
MOD CMTTM
This command is used to modify the auto confirmation duration for configuration rollback.
Command Name
Command Name
SYN XXX
Before modifying a table that supports configuration rollback, you must synchronize the data
of the active and the standby areas. The synchronization can be performed in "Normal" or
"Modify" state. Note that the data modified after the first synchronization is lost if you
synchronize the data in "Modify" state.
After the first synchronization, the table changes to be in "Modify" state. It is locked by the
operator who performs the synchronization. Other operators are not allowed to modify the
table or perform the configuration rollback operations on the table unless they forcibly
synchronize the table to obtain the control right.
The data requires to be synchronized includes the formatting data and the tables in the
database.
z Synchronization of formatting data: The formatting files for the standby area are
generated and organized on the basis of table. After synchronization, the formatting files
Table Name_Backup0.dat and Table Name_Backup1.dat for the standby area are
generated in the BAM installation directory \ConfigRollBack\Data_Backup. The initial
data of these two files comes from the db_?.dat files of the modules of the table. Table
Name_Backup0.dat is the backup file for the active area. It always keeps consistent
with the data in the active area. Table Name_Backup1.dat is the formatting file for the
standby area. The data in the standby area is formatted to this file in configuration
rollback state.
z Synchronization of database tables: Each table that supports configuration rollback has a
standby table named Table Name_Backup1. The data in the active table is exported to
the standby table in synchronization. In "Modify" state, the data in the standby table is
modified.
You cannot modify the data in the active table in "Modify" state. All the configuration
commands are executed on the standby table. At the same time, the BAM formats the data in
the standby table to the formatting file Table Name_Backup1.dat. The online setting is not
enabled now.
To improve the configuration efficiency, the storage procedure does not check the consistency
of service data in "Modify" state. The state of the data in the standby table is updated from
"Valid" to "Unknown". Let the system auto check or run the command CHK XXX to check
the data credibility. Activate the data only when it is valid.
FSYN XXX
The forcible synchronization works almost the same as synchronization. The table changes to
be in "Modify" state after being forcibly synchronized.
It however, can be performed in any state, which is different from synchronization. An
operator can obtain the control right of a table by this operation.
Command Description
ACT XXX
This command is used to activate the modified data in the standby area. You can perform it
only in "Modify" state. After activation, the table changes to be in "Trial" state.
Only the operator who locks the table can activate it and the data in the table must be "Valid".
If the data is "Unknown", run the command CHK XXX to check it or let the system auto
check it. If the data is still "Invalid" after check, you can run the command FACT XXX to
activate it forcibly. If there are two tables relying on each other in "Modify" state, the two
tables may be both invalid.
The key operations for activation are active/standby data handover and data setting. The data
handover contains the following:
z Handover of formatting data: Update the data in Table Name_Backup1.dat to the
formatting file, db_?.dat in the active area. Hand over the two files Table
Name_Backup0.dat and Table Name_Backup1.dat to ensure that the data in Table
Name_Backup0.dat is consistent with the data in the active table.
z Handover of tables in the database, that is, data in the standby table Table
Name_Backup1 and that in the active table: After successfully handing over the
formatting files and database tables, set the modification to the host to make the host’s
data consistent with that of the BAM.
FACT XXX
The forcible activation works almost the same as activation. The table changes to be in "Trial"
state after being forcibly activated. The data however, is not checked for validity before
forcible activation. Besides, the tables locked by an operator can be activated forcibly by
another operator.
Command Name
RLB XXX
This command is used to roll back the configuration, and replace the data in the active area
with the data in the standby area and validate it. It can be performed only in "Trial" state.
After rollback, the table changes back to be in "Modify" state.
Only the operator who locks the table can roll it back and the data in the standby table must be
"Valid". If the data is "Unknown", you can run the command CHK XXX or let the system
auto check it. (The default check period is five seconds.)If the data in the standby area is still
"Invalid" after check and you are sure to roll it back, run the command FRLB XXX to roll it
back forcibly. If there are two tables relying on each other in "Modify" state, the two tables
may both be invalid.
Rollback is a converse operation of activation. The key operations of rollback are the same as
those of activation, that is, active/standby data handover and data setting. The data handover
contains the following:
z Handover of formatting data: Update the data in Table Name_Backup1.dat to the
formatting file, db_?.dat in the active area. Hand over the two files Table
Name_Backup0.dat and Table Name_Backup1.dat to make sure that the data in Table
Name_Backup0.dat is consistent with the data in the active area.
z Handover of database tables: Handover the data in the standby table Table
Name_Backup1 and that in the active table.
FRLB XXX
The forcible rollback works almost the same as rollback. The table changes to be in "Modify"
state after being forcibly rolled back. The data however, is not checked for validity before
forcible rollback. Besides, the tables locked by an operator can be rolled back forcibly by
another operator.
Command Name
Command Name
CNL XXX
This command is used to delete all the modification in the standby area. The table changes
back to be in "Normal" state.
Only the operator who locks the table can cancel the modification. After cancellation, all the
data (including the formatting files and standby table data) in the standby area is deleted. All
the data modified in "Modify" state is lost. In "Modify" state, when you want to stop and
cancel the data modification, run this command to get back normal running.
The command does not affect the data in the active area.
CMT XXX
This command is used to confirm the modification and validate it in the active area
permanently. It can be performed only in "Trial" state. After confirmation, the table changes to
be in "Normal" state.
The execution flow of confirmation is similar to that of cancellation. Only the operator who
locks the table can perform it. After confirmation, all the data in the standby area is cleared.
The two commands however, function differently. The former validates the modified data
while the latter invalidates the data.
The BAM provides a 24-hour auto confirmation mechanism. If you do not confirm the
configuration within 24 hours in "Trial" state, the system auto confirms it and the table then
changes to be in "Normal" state. The only difference between auto confirmation and CMT
XXX is that the system does not report the MML status for the former.
Command Name
Command Name
Command Name
LST XXXBKP
This command is used to list the standby table data. Only the tables in "Modify" or "Trial"
state can be queried. The attributes in the query result are almost the same as those of the
active table.
The operator who is authorized to run the configuration rollback commands can query the
standby tables locked by another operator.
CMP XXX
This command is used to compare the data of the active and the standby areas when the table
is in "Modify" or "Trial" state. Three kinds of result can be returned:
z Records existing only in the active area
z Records existing only in the standby area
z Records that are inconsistent in the active and the standby areas
The records are checked based on the service index field. If the index of a record exists only
in the active table, then the system assumes that the record exists only in the active area. This
rule also applies to the data in the standby area. If a record exists in both the active and the
standby areas, but certain fields are inconsistent between the two areas, then the system
assumes that the record is an inconsistent one. Only the fields related to services in a record
are checked for inconsistency. In the result, the service index fields of the inconsistent records
are displayed. For detailed record information, you must run the command LST XXX to
query the active and the standby tables.
The operator who is authorized to run this command can query the standby tables locked by
another operator.
CHK XXX
This command is used to check the validity of the data in the standby area. The data can be
checked only when the table is in "Modify" or "Trial" state.
To improve work efficiency, the configuration commands do not check the relationship
between data tables in "Modify" state. The data in the standby area, however, must be valid
before activation. Therefore, you must run this command to check the data validity. At the
same time, the BAM auto checks the tables with "Unknown" data every five seconds.
The purpose of this command is to ensure the correctness of service data after the data is
handed over to the active area. Therefore, the validity check is performed between the target
standby table and other active tables. When several tables in "Modify" state rely on each other,
all of them may fail to pass the check. If you confirm that the data is correct, you can run the
command FACT XXX/FRLB XXX to hand over the data forcibly.
The operator who is authorized to run this command can check the validity of data in the
standby tables locked by another operator. The BAM auto checks the data state of the tables
that is not "Valid". If the data is proved "Valid", you need not run the command CHK XXX to
check the data before activation.
21.9 Reference
Acronym/Abbreviation Full Name
Contents
Figures
Figure 22-1 CAP message flow of the CAMEL4 third-party call ....................................................................22-8
Figure 22-2 CAP message flow of the IN RBT..............................................................................................22-10
Figure 22-3 CAP message flow of the simultaneous ringing with C answering the call first ........................ 22-11
Figure 22-4 CAP message flow of the simultaneous ringing with B answering the call first ........................22-12
Figure 22-5 NC failure in the CAMEL4 ........................................................................................................22-23
Tables
Table 22-1 Function name and function code in the CAMEL4 service............................................................22-2
Table 22-2 Added call functions in the CAMEL4 service ................................................................................22-2
Table 22-3 Benefits for carriers and mobile subscribers...................................................................................22-4
22 CAMEL4 Service
Section Describes
22.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
22.2 Availability The NEs required to implement the service, requirements for
the license, and versions of the products applicable to the
service.
22.3 Working Principle The functions of the NEs used to implement the service and
the requirements on the networking.
22.4 Service Flow The flow of the service.
22.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
22.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
22.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
22.8 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
22.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
22.10 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms used
in this chapter.
22.11 FAQ The frequently asked questions related to the service and the
solutions.
Table 22-1 Function name and function code in the CAMEL4 service
Name Code
22.1.2 Definition
The CAMEL function is a network feature instead of a supplementary service. As a capability
of the network, the CAMEL helps carriers supply the customized enhancement services. With
the CAMEL supported in the roaming network, the enhancement services are available even
when the user roams out of the HPLMN network. The main functions of the CAMEL are as
follows:
z Implementing the added call functions according to the 3GPP specification
The CAMEL function is divided into multiple phases. This guide describes the Phase4 of the
CAMEL function, that is, CAMEL4.The CAMEL4 can provide 19 added call functions based
on the CAMEL3.
Table 22-2 lists added call functions in the CAMEL4 service.
Name Definition
Initiate Call Attempt (ICA) The call attempt is initiated at the SCP side. The function is
to set up a new call (NC) or a call party (NP) in a call
connection.
Split Leg (SL) The function is to move a call party from the CS1 to a
designated CS, or move a call party to a newly created CS1
when the CS1 does not exist.
Move Leg (ML) The CAP operation is used to move a subscriber from a CS
to the main scenario CS1.
Disconnect Leg (DL) The CAP operation is used to disconnect the designated call
party in the current call connection without affecting other
call parties.
Name Definition
Entity Released The CSA notifies the SCF to release the logical entity (CS
or BCSC) through the CAP operation due to the call
abnormality. The other logical entities, however, are not
released and thus the SCF cannot end the TC dialog.
DFC With Argument The CAP operation is used to disconnect the SRF
connection established through the CTR or EFT operation
(The SCP notifies the MSC Server to perform the
disconnection operation). The CallSegmentID parameter is
added based on the DFC basis and it is used for the situation
with multiple call segments.
Play Tone The MSC server controls the MGW to play tone to a party in
the call or a call segment. The flexible Bursts mode can be
adopted in the service.
DTMF Mid Call For an MO/VT call, the DTMF MidCall can report the
keypad value of the MO/VT user to the SCP during the call
connection.
Charging Indicator The charging indicator can be reported to indicate whether
the charging is generated in the O-Answer/T-Answer DP
event. The parameter is the same as Charge Indicator in
the ITU-T Q.763.
Alerting DP It can expand the BCSM call module and report the
O_Term_Seized/T_Call_Accepted DP event when the called
user is rang in the O-BCSM/T-BCSM.
Location At Alerting The O_Term_Seized and T_Call_Accepted events contain
the location information of the users (calling party and
called party).
Change Of Position DP The MO call supports DP O_Change_Of_Position and VT
call supports DP T_Change_Of_Position. The MSOFX3000
reports the position change information of the calling party
and the called party during calling
Criteria for Change Of The SSP supports that the criteria matching parameter for
Position DP Change Of Position DP is distributed.
OR Interactions The SCP controls the SSP to determine whether the BOR is
available to the call.
Warning Tone It indicates whether the warning tone in the BurstList format
Enhancements can be contained in the Apply Charging in the SCP.
CF Enhancements It is used to notify the SCP that the FTN can be contained
when the ERB reports the T_Busy or T_No_Answer DP.
Subscribed Enhanced It indicates whether the SSP supports the subscribed EDS
Dialed Services function.
Serving Network Enhanced It indicates whether the SSP supports the serving network
Dialed Services EDS function.
Name Definition
Service Change DP It indicates whether the SSP supports that the SCP
distributes the O_Service_Change and T_Service_Change
DPs configured by RRBE.
22.1.4 Benefits
Table 22-3 lists benefits for carriers and mobile subscribers.
22.2 Availability
22.2.1 Requirements for NEs
The VLR/MSC must interwork with the HLR, SCP to implement the CAMEL4 protocol-
based services. Table 22-4 lists the NEs required to implement the CAMEL4 feature.
- - - √ √ √ √ √
Table 22-5 Versions of the Huawei UMTS products that support the CAMEL4 feature
Product Applicable Versions
22.2.4 Others
None.
z Conference call
z CAMEL4 IN color ring
z Simultaneous ringing
MSC/SSP SCP
Initial DP
Apply Charging
Continue
…
Event Report BCSM(oAnswer)
Continue
Initiate Call Attempt(leg3)
Move Leg(leg3)
The CAP message flow of the CAMEL4 third-party is divided into the following parts:
z A calling B: The process is the same as that of the CAMEL2/3 PPS service.
z NP calling leg3: See the flow highlighted in blue in Figure 22-1.
− The SCP creates the third party in the call through the Initiate Call Attempt (leg3)
message. The MSC server returns the Initiate Call Attempt Ack message.
− The SCP sends the Request Report BCSM Event (leg3) and Apply Charging (For
leg3) messages to require the MSC server to report basic call status model even and
ask for charging. The MSC server returns the Event Report BCSM (oAnswer/leg3)
message and reports the response of the third party (leg3).
z Porting leg3 to the conversion between A and B through the ML operation: It involves in
a serial of complex processes, such as conference establishment inside and bearer
refreshment.
The two colors are used in the preceding flow only to ease the description. The entire CAP message flow,
however, is implemented in the same Transaction Capabilities Application Part (TCAP) dialog.
For CAMEL4 IN RBT function, the SCP determines the route to the RBT center and the SSP (MSC
server) processes only the call connection. You need not configure the RBT control table.
SSP SCP
Initial DP
DisconnectLeg(leg2)
Disconnect LegAck
InitiateCallAttempt(Number=B,leg3)
ContinueWithArgument(leg3)
EventReportBCSM(leg3,O_Answer)
DisconnectForwardConnectWith
Argument(CS1)
MoveLeg(leg3)
Move Leg Ack
ContinueWithArgument(CS1)
ContinueWithArgument(leg3)
The CAP message flow of the CAMEL4 IN RBT is divided in to the following parts:
z The IDP invokes the call and disconnects the leg2 first.
z The called party (leg3) is connected in the NP call mode. When the Event Report BCSM
(O_Term_Seized) is reported to the SCP, the SCP indicates the SSP to play RBT. In the
flow, the RBT function is available in the local office by default. If the RBT is not in the
local office, the RBT played must be implemented through the AIP or auxiliary SSP in
other offices in ETC mode.
z The called party (leg3) responds the report of the Answer event. The SCP sends the
Disconnect Forward Connect With Argument (CS1) message to stop the RBT. At the
same time, it sends the Move Leg message to set up the call connection between calling
party and called party (leg3).
the call is the actual called party. The following takes two subscribers who are simultaneously
ringing for example. Figure 22-3 shows the message flow.
Subscriber B has subscribed the simultaneous ringing service with subscriber C and thus
subscriber B is correlated with subscriber C. When subscriber A calls B to invoke the IN
service, B and C are ringing simultaneously after the SCP starts the simultaneous ringing
service. If C answers the call first, the call connection between A and C is established and B is
disconnected. If B answers the call first, the call connection between A and B is established
and C is disconnected
Figure 22-3 CAP message flow of the simultaneous ringing with C answering the call first
SSP SCP
Initial DP
RequestReportBCSM
Event(leg2,O_Term_Seized/O_Answer)
InitiateCallAttempt(Number=C,leg3)
InitiateCallAttemptResult
RequestReportBCSM
Event(leg3,O_Term_Seized/O_Answer)
ContinueWithArgument(leg3)
ContinueWithArgument(leg2)
EventRepotBSCM(leg2,O_Term_Seized)
EventRepotBSCM(leg3,O_Term_Seized)
ContinueWithArgument(leg3)
ContinueWithArgument(leg2)
EventRepotBSCM(leg3,O_Answer)
Disconnectleg(leg2)
Disconnect leg ACK
MoveLeg(leg3)
Move Leg Ack
ContinueWithArgument(CS1)
ContinueWithArgument(leg3)
Figure 22-4 CAP message flow of the simultaneous ringing with B answering the call first
SSP SCP
Initial DP
InitiateCallAttempt(Number=C,leg3)
InitiateCallAttemptResult
RequestReportBCSM
Event(leg3,O_Term_Seized/O_Answer)
ContinueWithArgument(leg3)
ContinueWithArgument(leg2)
Disconnect leg (leg3) message to release B (leg2).The call connection between A and B
is established.
1 Run DSP LICENSE to check whether the two license files are available for
the CAMEL4 feature, including concurrent number of total ICA calls and
CAMEL4 enhancement capability. If not, apply for the licenses and run LOD
LICENSE to load the licenses file supporting the CAMEL4 service.
2 Run LST MAPACCFG to check whether the CAMEL version is set to
CAMEL_PHASE4. If not, run SET MAPACCFG to set CAMEL version to
CAMEL_PHASE4.
3 Run ADD SSPCAPA to set the 19 CAMEL4 capabilities of the IN service
invoked by the SSP/MSC. The 19 functions require the license.
4 Run MOD MGW and SET CODECCAP to configure the resource capacity
of the MGW multi-way conference call in the MSOTFX3000 and the MGW.
5 Run MOD MSFP to set Service key for the NC call.
6 Run MOD MSFP to configure the relation between the CAMEL4 CPH
function and the supplementary service.
7 Run MOD MSFP to configure the relation between the different CPH
scenarios for the CAMEL4.
8 Run MOD MSFP to configure whether the explicit conference establishment is
used when the tone is played to both parties in the CAMEL4 service.
Scenario Description 1
The service key of the OCSI subscribed in the CAMEL4 is 1. The service must support all the
newly added functions of the CAMEL4. The SCP in the peer office determines whether
IP/SSP capability needs to be reported in the IDP.
Configuration Script
The procedure for configuring the MSOFTX3000 is as follows:
Step 1 Modify the MAP configuration table and set CAMEL version to CAMEL phase4.
Remark The number of conference call resources configured in the MGW must be
consistent with that in the MSOFTX3000.
Step 4 Configure the relation between the supplementary service and the CAMEL4 CPH operation.
----End
Scenario Description 2
The MSC server supports the NC call initiated by the SCP. The network call uses service key
100 and IP/SSP capability is not required to be reported to the SCP.
The service key of the NC is not specified in the specifications. The service key 100 is defined by
Huawei to query the CAMEL capability.
Configuration Script
The procedure for configuring the MSOFTX3000 is as follows:
Step 1 Modify the MAP configuration table and set CAMEL version to CAMEL phase4.
Remark For CAMEL4 capability, if the MSC server need not support all functions,
you can configure some functions of the CAMEL4 capability.
Remark P1201 BIT0-7 indicates the service keys used for the NC call. The service
key 100 is 0x64 in hexadecimal; thus, the value of the parameter is 64.
----End
Scenario Description 3
Configure the relation between the supplementary service and the CAMEL4 CPH operation.
Configuration Script
Description Modify Call internal parameter 31 to 0.
Remark Bit5 of P900 controls the relation between the CPH operation and the
supplementary service.
1: It indicates that the CPH operation is not contradictory with
supplementary services. It is the default value.
0: It indicates that the CPH operation is contradictory with supplementary
services. For details, refer to mode B in section 22.9.1 "Restriction
Between the Supplementary Services."
Scenario Description 4
Configure the restriction between two CPH operations when MO and MT CAMEL4 are
invoked by a call.
Configuration Script
Description Modify P1201 of WIN to mode 2 of the restriction between multiples CPH
operations.
Remark The P1202 Bit10-11 of WIN controls the restriction between multiple CPH
operations:
00: Mode 1 indicates that the CPH operations do not contradictory with
each other. It is set to 00 by default.
01: It indicates that mode 2 is used.
10: It indicates that mode 3 is used.
11: It is reserved.
Note: For details, refer to 22.9.2 "Restriction Between Multiple CPH
Operations in the CAMEL4 Service."
HLR
The CAMEL4 services are centralized in the maintenance of the subscription data. At
present, Huawei does not release the HLR version for the CAMEL4 feature. In future, the
applicable version of the HLR can be provided based on the related data maintenance guide of
the HLR version.
Operations by Carriers
To conduct the CAMEL4 service, carriers can upgrade the entire network to provide all the
CAMEL4 service functions, or provide some of the functions.
The CAMEL4 is not widely used in the current network and the service application is not mature. In this
case, the service is not provided presently.
Operations by Subscribers
The CAMEL4 service is operated by network and requires no mobile user's operation.
Table 22-7 lists the added custom entities for the modified WIN event measurement.
MO ServiceChange
MT SserviceChange
MO MidCall
MT MidCall
Call hold Supported After a subscriber holds a call, but before retrieves
the call, the SCP moves the subscriber leg to the
CS1 through the CPH operation. The subscriber
then restores to the original situation through the
RETRIEVE operation. In this case, the result of the
RETRIEVE operation may be not consistent with
the expectation of the subscriber.
Call waiting Supported It is the same as Call hold.
ECT Supported As in the CAMEL2/3, the IN subscriber who
initiates the call does not support the ECT service.
The subscriber in the conference also cannot initiate
the ECT call. (The ECT is enabled only when the
number of leg is less than two in the CS1.)
Conference call Not supported The CPH operation and the conference call cannot
be supported simultaneously.
Forwarded call Supported None.
services
z Mode B
The CPH operation is contradictory with supplementary services and the detailed
principles are as follows:
− During call connection, if the SCP performs the CPH operation first, the
supplementary services will be prohibited temporarily in the subsequent process.
− If supplementary services are performed first, the CPH operation is prohibited when
supplementary services do not retrieve the original call scenario completely. After
supplementary services are completed, the SCP can continue to perform the CPH
operation.
22.10 Reference
22.10.1 Specifications
The reference lists of the feature are as follows:
z 3GPP TS 23.078 V6.3.0 (2004-09)
z 3GPP TS 29.078 6.3.0 (2004-09)
z 3GPP TS 29.002 V6.7.0 (2004-09)
Glossary Definition
ML Move Leg
DL Disconnect Leg
22.11 FAQ
NC failure
Symptom
The SCP initiates an NC, and the SSP uses the service key 100. The message, however, is
refused when it reaches the CAP interface. Thus, the NC fails. The message is traced through
the TCAP, as shown in Figure 22-5.
SSP SCP
TC_BEGIN_IND
TC_INVOKE_IND(InitiateCallAttempt)
TC_U_ABORT_REQ
Analysis
The NC failure may be caused when Service key is not configured in the MSC server. The
CAMEL4 requires you to configure the service key for the NC correctly. The correct
configuration enables the MSC server to obtain the CAMEL4 capability through querying the
table.
Solution
When Service key of the lower 8 bits of P1201 is modified to 100, the failure is removed.
MOD MSFP: ID=P1201, MODTYPE=P0, VALUE="FF64";
Contents
23 IMSI-Based Announcement.................................................................................................23-1
23.1 Service Description ...................................................................................................................................23-3
23.1.1 Function Code..................................................................................................................................23-3
23.1.2 Definition .........................................................................................................................................23-3
23.1.3 System Specifications ......................................................................................................................23-3
23.1.4 Benefits ............................................................................................................................................23-3
23.1.5 Application Scenario ........................................................................................................................23-4
23.1.6 Application Limitations....................................................................................................................23-4
23.2 Availability ................................................................................................................................................23-4
23.2.1 Requirements for NEs......................................................................................................................23-4
23.2.2 Requirements for License ................................................................................................................23-4
23.2.3 Applicable Versions..........................................................................................................................23-4
23.2.4 Others...............................................................................................................................................23-5
23.3 Working Principle......................................................................................................................................23-5
23.3.1 Functions of the NEs........................................................................................................................23-5
23.3.2 Internal Processing of the System ....................................................................................................23-5
23.3.3 External Interfaces ...........................................................................................................................23-7
23.4 Service Flow..............................................................................................................................................23-7
23.5 Data Configuration....................................................................................................................................23-8
23.5.1 Overview..........................................................................................................................................23-8
23.5.2 Data Configuration at the MSOFTX3000 Side................................................................................23-8
23.5.3 Data Configuration at the UMG8900 Side.......................................................................................23-9
23.5.4 Data Configuration Examples ..........................................................................................................23-9
23.5.5 Querying Tables of the IMSI-Based Announcement Service.........................................................23-10
23.6 Service Management ...............................................................................................................................23-13
23.7 Charging and CDR ..................................................................................................................................23-13
23.8 Performance Measurement......................................................................................................................23-13
23.9 Interactions with Other Services .............................................................................................................23-13
23.10 Reference...............................................................................................................................................23-13
23.10.1 Specifications...............................................................................................................................23-13
23.10.2 Acronyms and Abbreviations .......................................................................................................23-13
23.11 FAQ .......................................................................................................................................................23-13
Figures
Figure 23-1 International roaming subscriber originates a call and the callee is power-off (the GMSC server and
VMSC server are combined).............................................................................................................................23-6
Figure 23-2 Service flow in the case of an abnormal call ................................................................................23-7
Figure 23-3 Table query flow in the IMSI-based announcement service .......................................................23-12
Tables
Table 23-4 Version of Huawei UMTS MSOFTX3000 that supports the IMSI-based announcement service..23-5
Table 23-5 Steps of data configuration on the MSOFTX3000 .........................................................................23-8
Table 23-6 Related tables in the IMSI-based announcement service..............................................................23-10
23 IMSI-Based Announcement
Section Describes
23.1 Service Description The function code, function definition of this feature,
and the benefits that carriers and mobile subscribers can
obtain from this feature.
23.2 Availability The network elements (NEs) that are required for the
feature, whether Licenses are required, and the version
requirements of the NEs.
23.3 Working Principle The functions of the NEs, and networking requirements.
23.4 Service Flow The service flow of the network when providing this
feature.
23.5 Data Configuration The data configurations that are required on the
MSOFTX3000 and the UMG8900.
23.6 Service Management The service operations that carriers and mobile
subscribers are required to implement when the network
provides this feature.
23.7 Charging and CDR The charging and the generation of CDRs when the
network provides this feature.
23.8 Performance Measurement The influence of the service on performance
measurement and the implementation of performance
measurement.
23.9 Interactions with Other The association between the service and other services
Services as well as the restrictions on each other.
23.10 Reference The protocols and specifications that this feature must
comply with, and the acronyms and abbreviations of this
chapter.
Section Describes
23.11 FAQ The frequently asked questions related to the service and
the solutions.
23.1.2 Definition
IMSI-based announcement enables the carrier to set the language type for announcement
based on subscriber IMSI. This service realizes announcement based on IMSI number
segments of mobile originating subscribers.
Item Specification
Setting Add the mapping between IMSI and language type. When a mobile
announcement subscriber originates a call, the system queries the database based on
language type the subscriber IMSI to obtain the corresponding language type and
based on IMSI sets the language type as the preferred for announcement. You can set
number segments up to five language types through IMSI mapping.
of mobile
originating
subscribers
23.1.4 Benefits
Beneficiary Description
23.2 Availability
23.2.1 Requirements for NEs
Table 23-3 lists the network elements (NEs) required to implement the IMSI-based
announcement service.
- - - √ √ - - -
Table 23-4 Version of Huawei UMTS MSOFTX3000 that supports the IMSI-based
announcement service
23.2.4 Others
None.
4. The MSC server replaces the value of Specific language kind with the bits that specify
the language category index, and obtains a new EID such as 0xF0020214.
EID is one of the parameters that the MSOFTX3000 uses to interwork with the MGW. It specifies the
code of the signal tone or announcement at the MGW side. An EID is an 8-bit hexadecimal numeral.
When it is used to specify signal tones, its bit structure is as follows (from high bit to low bit): service
key (2 bits), language index (2 bits), voice code (4 bits). These bits work together to instruct the MGW
to correctly handle the voice resources on its MTCU board. For instance, if EID "F0010135" is used to
specify the call waiting tone, "F0" is the service key, which represents basic service tone or
supplementary service tone. "01" is the language index which means the language is English. "0135" is
the voice code, indicating that the tone is a call waiting tone.
5. Based on the service key and tone bit of the new EID, the MSC server queries the
Language Category table (configured through ADD LANKIND), and obtains a language
category list (shortened as "list 2" hereafter) such as Chinese.
6. Based on Reserve old language indication in the IMSI Language Configuration table
and the information in list 1 and list 2, the MSC server obtains the announcement
language list for the MGW. For details, see 23.11 "FAQ."
7. The MSC server queries the Language Kind Change table (configured through ADD
LKINDCHG) to obtain the language kind index corresponding to the announcement
language list. The MSC server then obtains a tone ID that is sent to the MGW.
8. The MSC server sends the tone ID to the MGW and instructs the MGW to play
announcement.
Figure 23-1 shows the flow of the IMSI-based announcement service when an international
roaming subscriber originates a call and the callee is in the power-off state.
Figure 23-1 International roaming subscriber originates a call and the callee is power-off (the
GMSC server and VMSC server are combined)
Caller
(9) (1)
(7)
(2)
(5)
2. The (G/V)MSC server requests the routing information from the HLR in which the
callee is located.
3. After identifying that the callee is switched off, the HLR returns a corresponding
message.
4. The (G/V)MSC server sends a termination establishment request to the MGW.
5. The MGW returns a response message.
6. The (G/V)MSC server plays failure announcement in the corresponding language based
on the IMSI Language table.
7. The (G/V)MSC server sends an announcement request to the MGW to instruct the MGW
to play announcement in the language derived from the caller IMSI.
8. The MGW responds to the request and plays the announcement.
9. After the announcement is complete, the (G/V)MSC server sends a disconnection
message to the caller.
Set-up
Info request
Add_req(c$,T1)
Add_reply(C,T1)
Assignment-Request
Assignment-
Repsponse
Add_req(C,DummyT)
Add_reply
Mod_req(C,T1,language)
Mod_reply
disconnect
1. MS A initiates a call by sending a Set-up message to the (G/V)MSC server. Based on the
caller IMSI, the (G/V)MSC server queries the database and obtains the language type
that matches the IMSI.
2. The (G/V)MSC server sends a routing information request to the HLR.
3. The HLR sends an information acknowledgement message, which indicates that the
callee is power-off, to the (G/V)MSC server.
4. The (G/V)MSC server sends an Add_req message to the MGW, asking for establishing a
calling termination.
5. The MGW responds to the (G/V)MSC server with an Add_reply message.
6. The (G/V)MSC server initiates an Assignment request.
7. The access side responds with an Assignment Complete message.
8. The (G/V)MSC server sends the MGW an Add_req message, asking for establishing a
Dummy termination.
9. The MGW responds to the (G/V)MSC server with an Add_reply message.
10. The (G/V)MSC server sends the MGW a play announcement request Mod_req,
instructing the MGW to use the language derived from the IMSI of caller.
11. The MGW returns a Mod_reply message to the (G/V)MSC server.
12. The (G/V)MSC server sends a call disconnect message, with the Progress indicator
indicating
IN_BAND_INFO_OR_APPROPRIATE_PATTERN_IS_NOW_AVAILABLE, to MS
A.
Step Action
4 Run ADD TONECFG to configure the tone ID of the MGW and such parameters
as the cycle times, announcement duration, and default language.
5 Run ADD IMSILANG to configure the mapping between IMSI number segments
and language types.
Configuration Script
The configuration steps on the MSOFTX3000 are as follows:
Step 1 Configure the Language Kind Change table.
Remark Before executing the script, run LST LKINDCHG to query whether the
required language is configured. If so, you do not need to configure the
language.
Description Set Service key to 240 and use default values for other parameters.
Remark Before executing the script, run LST LKINDPOS to query whether the
required data is configured. If yes, the data need not be added.
Remark None.
Description Set IMSI prefix to 4600 and the Specific language kind to 2 and keep the
original language.
Script ADD IMSILANG: IMSI=K'4600, RSVLANG=YES, LANGKIND=2;
Remark Before using Specific language kind in the command, set it in the
Language Category table.
----End
Language Kind It contains multiple records, which specify from ADD LKINDPOS
Index Position which bit and how many bits in the
Table MSOFTX3000 EID are considered as the
language type index.
Language Kind It contains the mappings between the internal ADD LKINDCHG
Change Table languages of the MSOFTX3000 and the values of
Language type change of the internal tone IDs.
Start
IMSI The MSC server checks whehter Specific language kind No The MGW plays
in the MSI Language Configuration table is configured to be announcement in the
corresponding to the IMSI prefix. default language.
Yes
Default tone ID The MSC server checks whether Service key and Language No
category start bit in the Language Category Index Position table
are configured to be corresponding to the default tone ID.
Yes
The MSC server queries the Tone ID Configuration table
based on the default tone ID to obtain language kind list 1.
The MSC server checks whether Service key and Language kind index are
configured in the Language Category table. If Reserve old language indication in No
the IMSI Language Configuration table is set to Yes, the MSC server queries the
Tone ID Configuration table. For details, see FAQ.
Yes
The MSC server queries the Language Category table based
on the service key and tone bit of the new EID, and obtains
language kind list 2.
The MSC server queries the Language Kind Change table to check No
whether the language in the Language Category table is converted into the
language that the MGW can recognize.
Yes
The MGW plays announcement in the language
configured in the IMSI Language table. The MGW does not
play announcement.
23.10 Reference
23.10.1 Specifications
None.
23.11 FAQ
23.11.1 Question 1
Description
The IMSI Language Configuration table is successfully configured, but the system does not
play announcement as configured.
Answer
A: After you configure the mapping between IMSI prefix and Specific language kind
through ADD IMSILANG, you still need to run ADD LANKIND to configure the
corresponding language name.
23.11.2 Question 2
Description
The Language Kind table is configured with eight languages, but the number of actual
announcement languages is less than eight.
Answer
A: The final number of announcement language types is determined by the language types
configured in the language ID configuration table, which supports up to five announcement
languages.
23.11.3 Question 3
Description
What the use of the Reserve old language indication indicator (in the IMSI Language
Configuration table) in the IMSI-based announcement service is.
Answer
A: The multi-language table can be configured with eight languages, while the Tone ID
configuration table supports up to five language types. When controlling the announcement
on MGW, the MSC server reacts according to the setting of the Reserve old language
indication indicator.
z Reserve old language indication is set to Yes
− If the multi-language table is configured with five or more language types, the first
five languages will be assigned to the MGW.
− If the multi-language table is configured with less than five language types (for
example languages A, B and C), the language types configured in the Tone ID
configuration table (for example, languages C, D, E, F, and G) will be added to the
former, and then the first five language types (A, B, C, D and E) will be assigned to
the MGW. If the number of language types is still less than five, the MSC server
directly assigns these available language types to the MGW.
z Reserve old language indication is set to No
− If the multi-language table is configured with five or more language types, the first
five language types are assigned to the MGW.
− If the multi-language table is configured with less than five language types (for
example languages A, B and C), the MSC server directly assigns these language types
(three in this example) to the MGW.
Contents
24 IP over E1 .................................................................................................................................24-1
24.1 Service Description ...................................................................................................................................24-2
24.1.1 Function Code..................................................................................................................................24-2
24.1.2 Definition .........................................................................................................................................24-2
24.1.3 System Specifications ......................................................................................................................24-2
24.1.4 Benefits ............................................................................................................................................24-2
24.1.5 Application Scenario ........................................................................................................................24-3
24.1.6 Application Limitations....................................................................................................................24-3
24.2 Availability ................................................................................................................................................24-4
24.2.1 Requirements for NEs......................................................................................................................24-4
24.2.2 Requirements for License ................................................................................................................24-4
24.2.3 Applicable Versions..........................................................................................................................24-4
24.2.4 Others...............................................................................................................................................24-4
24.3 Working Principle......................................................................................................................................24-4
24.3.1 Functions Provided by NEs..............................................................................................................24-4
24.3.2 Internal Processing Flow of the System...........................................................................................24-5
24.3.3 External Interfaces ...........................................................................................................................24-7
24.4 Service Flow..............................................................................................................................................24-8
24.4.1 Inter-Office Call Flow Based on IP over E1 ....................................................................................24-8
24.4.2 Cross-MGW Call Flow Based on IP over E1.................................................................................24-10
24.5 Data Configuration.................................................................................................................................. 24-11
24.5.1 Overview of Data Configuration.................................................................................................... 24-11
24.5.2 Data Configuration at the MSOFTX3000 Side.............................................................................. 24-11
24.5.3 Data Configuration at the UMG8900 Side.....................................................................................24-13
24.5.4 Data Configuration Example..........................................................................................................24-17
24.6 Service Management ...............................................................................................................................24-19
24.7 Charging and CDR ..................................................................................................................................24-19
24.8 Performance Measurement......................................................................................................................24-20
24.9 Service Interaction ..................................................................................................................................24-20
24.10 Reference...............................................................................................................................................24-20
24.10.1 Specifications...............................................................................................................................24-20
24.10.2 Glossary, Acronyms, and Abbreviations ......................................................................................24-20
Figures
Tables
24 IP over E1
Section Describes
24.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
24.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
24.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
24.4 Service Flow The flow of the service.
24.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as
the examples of data configuration.
24.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
24.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
24.8 Performance The influence of the service on performance
Measurement measurement and the implementation of performance
measurement.
24.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
24.10 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
IP over E1 WMFD-141800
24.1.2 Definition
Some carriers cannot set up and maintain large IP bearer networks. They require using the
original Time Division Multiplex (TDM) network after adopting the softswitch. Thus, the IP
over E1 plan is designed to meet the requirement of the carriers.
IP over E1 is a technology that the user plane bears IP packet data through E1 cables on the
existing TDM network. At the same time, the Compressed Real-Time Protocol (CRTP) is used
to improve the utilization of voice bandwidth.
IP over E1 can save operation cost. The existing TDM network can provide the voice over IP
(VOIP) service. In this case, IP over E1 can ensure the high reliability of the TDM network.
24.1.4 Benefits
Table 24-2 lists the benefits of this service to carriers and mobile subscribers.
Beneficiary Description
Carriers Carriers can save operation cost. The existing TDM network can
provide the voice over IP (VOIP) service. In this case, IP over E1 can
ensure the high reliability of the TDM network.
The CRTP is used to improve the utilization of voice bandwidth.
Mobile None.
subscribers
The number of BICC CIC and VTID is obtained through the bandwidth of common voice coding (such
as AMR and G.729) and the total bandwidth borne between MGWs.
AMR is short for Adaptive MultiRate.
24.2 Availability
24.2.1 Requirements for NEs
IP over E1 can be provided under the joint work of MSC server and MGW as listed in Table
24-3.
- - - √ √ - - -
24.2.4 Others
IP over E1 requires the IP over E1 interface board (MIOE and MTNB) provided by MGWs.
corresponding to the BICC office direction. Also, the direction connection relationship
between MGWs is configured, indicating that the bearer connection between MGWs is IP
over E1 in the office direction. For calls cross MGWs, the MSC server realizes the
configuration of direct connection relationship between intra-office MGWs and flow control
of bearer between MGWs.
The MGW determines that the user plane bearer of a certain call is IP over E1 based on the
instruction of the MSC server. The MGW supports IP over E1 to adapt the IP data packet to
the TDM. Then the IP data packet is transferred through the MIOE (TDM interface board).
(3)
MGW 1 MGW 2
IP Over E1
Run ADD OFC on the MSOFTX3000 to set the domain where an office direction is. MGWs configure
IP over E1 bearer resources in the corresponding domains.
Define local IP domain parameters based on the BICC office direction on the MSC server, as
shown in Figure 24-2. Define a BICC office direction for each connection between local
MGW and peer MGW. One BICC office corresponds to one IP domain. Configure IP bearer
type on the BICC office direction to instruct whether the direct connection is borne between
the local office and peer office.
Each inter-office MGW corresponds to a BICC office direction. Thus, the routing policy is
that the BICC office direction and subroute are in one to one relationship. All subroutes of the
same physical office direction belong to a route. The subroute selection mode of the route is
Random or Percent based on actual condition. Through such routing policy, the number of
inter-office MGW connections is 12, which depends on the maximum number of subroutes.
The number is sufficient for small or medium carriers.
Use the call initiated from MSC server 1 to MSC server 2 as an example to explain how the
MSC server sets up inter-office bearer:
z Assume that MSC server 1 selects MGW 1 and office direction. Then MSC server 1
routes calls to MSC server 2. Based on office direction 2, local IP domain (domain 2)
and IP bearer type (direct bearer) can be obtained. The two parameters are sent to MGW
1 to set up outgoing bearer.
z For incoming calls, MSC server 2 obtains MGW 4 in direct connection mode for
incoming bearer setup, corresponding IP domain (domain 3) and IP bearer type (direction
bearer) based on the incoming office direction (office direction 3). The two parameters
are sent to MGW 4 to set up outgoing bearer. When setting up incoming bearer, MSC
server 2 must provide the bearer plane address of MGW 1 to MGW 4. (The bearer plane
address includes the IP address and port number that are sent by MSC server 1 to MSC
server 2 through the IAM message.) IAM is short for initial address message.
Multiple BICC office directions are defined between MSC servers. Currently, the
multi-signaling plan is not used. Thus, the BICC signaling is borne over the SCTP link only.
MSC server
Domain 1 Domain 1
MGW 1 MGW 3
IP Over E1
Domain 2 Domain 3
Domain 3 Domain 2
IP Over E1
MGW 2 MGW 4
Domain 4 Domain 4
When configuring the direct connection between intra-office MGWs, configure IP domains
corresponding to the direction connection relationship at the same time. As shown in Figure
24-3, the connection relationship between MGW 1 and MGW 3 is domain 1; the connection
relationship between MGW 1 and MGW 4 is domain 2; the connection relationship between
MGW 2 and MGW 3 is domain 3; the connection relationship between MGW 2 and MGW 4
is domain 4.
When the MSC server sets up the bearer between intra-office MGWs (medium bearer), if the
IP domain parameter corresponding to a certain segment of medium bearer is not 0, the MSC
server instructs IP domain to the related MGW.
Forward Fast
Figure 24-4 shows the inter-office call flow of forward fast.
Add.Req/Rsp
(IPD,IPBT=1)
Notify.Ind/Ack
(IPBCP.Req)
IAM
(IPBCP.Req)
Add.Req/Rsp
(IPD,IPBT=1,IPBCP.req)
Notify.Ind/Ack
APM (IPBCP.Acc)
Mod.Req/Rsp (IPBCP.Acc)
(IPBCP.Acc)
1. MSC server 1 determines that the bear type between outgoing BICC office direction and
peer office is direct connection at outgoing office side. MSC server 1 instructs that
IPBT=1 when it prepares bearer. In addition, MSC server 1 sends the IPD (IP domain
parameter) configured based on office direction number. Considering the repeat uses of
forward delay and backward delay mentioned in the following section, the number of
interfaces between MSC server 1 and MGW 1 must be increased. MGW 1 returns the
SDP information corresponding to the IPBCP in the Add.Rsp during the forward fast
flow.
2. MSC server 1 sends the outgoing IAM message, carrying the private codec
corresponding to the SDP information. The codec identifies that the call is an IP over E1
call.
3. MSC server 2 determines that the bear type between incoming BICC office direction and
peer office is direct connection at incoming office side. MSC server 2 selects the local
MGW directly connected to the peer office based on the incoming office direction
number. MSC server 2 instructs that IPBT=1 when it prepares bearer. In addition, MSC
server 2 sends the IPD configured based on office direction number, IPBCP Req carrying
the peer office bearer information, and SDP information. MGW 2 resolves the IPBCP
Req and SDP, and distributes corresponding bearer plane resources.
Forward Delay
Figure 24-5 shows the inter-office call flow of forward delay.
Add.Req
(IPD,IPBT=1)
Add.Rsp
(LocalSDP) IAM
(SuppCodeclist)
Add.Req
(IPD,IPBT=1,RemoteSDP)
Add.Rsp
APM (LocalSDP)
Mod.Req/Rsp (SelCodec,AvaCodeclist)
Notify.Ind/Ack
(IPBCP.Req) APM
(IPBCP.Req) Mod.Req/Rsp
(IPBCP.Req)
Notify.Ind/Ack
APM (IPBCP.Acc)
(IPBCP.Acc)
1. When MSC server 1 sends the Add.Req message, MGW 1 distributes the bearer plane
resource (IP address and port number). Thus, MSC server 1 must send the local bearer
information carried in the IAM message to the backward office. MGW 1 requires to
return the SDP information (distributed IP address and port number) in the Add.Rsp.
MSC server 1 sends the SDP information to the peer office in private codec mode.
2. MSC server 2 determines that the private codec exists in the codec resolution table at the
incoming side. MSC server 2 resolves the SDP information and instructs it in the
Add.Req to MGW 2. MGW 2 distributes the bearer plane resource based on the SDP
information.
3. MSC server 2 does not carry the private codec in the available codec list of the backward
APM message.
Backward Delay
Figure 24-6 shows the inter-office call flow of backward delay.
Add.Req
(IPD,IPBT=1)
Add.Rsp
(LocalSDP)
IAM
(BCUID=MGW1,SuppCodeclist)
Add.Req
(IPD,IPBT=1,RemoteSDP)
Add.Rsp
Notify.Ind/Ack
APM (IPBCP.Req)
(SelCodec,AvaCodeclist,IPBCP.Req)
Mod.Req/Rsp
(IPBCP.Req)
Notify.Ind/Ack
(IPBCP.Acc)
APM
(IPBCP.Acc)
Mod.Req/Rsp
(IPBCP.Acc)
1. When MSC server 1 sends the Add.Req, MGW 1 distributes the bearer plane resource
(IP address and port number). Thus, MSC server 1 must send the local bearer
information carried in the IAM message to the backward office. MGW 1 requires to
return the SDP information (distributed IP address and port number) in the Add.Rsp.
MSC server 1 sends the SDP information to the peer office in private codec mode.
2. MSC server 2 determines that the private codec exists in the codec resolution table at the
incoming side. MSC server 2 resolves the SDP information and instructs it in the
Add.Req to MGW 2. MGW 2 distributes the bearer plane resource based on the SDP
information.
3. MSC server 2 does not carry the private codec in the available codec list of the backward
APM message.
IP over E1
T1 T2 T3 T4
MGW1 MGW2
When MSC server 1 sets up a medium cluster, if the bearer type of the medium cluster is IP
over E1, MSC server 1 must instruct the SDP information of T3 end point when setting up T2
end point, as shown in Figure 24-7.
IPD IP domain This parameter is valid if only Signaling type is not set
to Non-BICC.
It determines the IP domain corresponding to the
connection between inter-office MGWs.
Value range: 0–999
Default value: 0
The IP bearer type parameter is valid only when IP
domain is not set to 0.
IPBT IP bearer type This parameter is valid if only Signaling type is not set
to Non-BICC.
It specifies the type of IP bearer.
Value range: Direct bearer and Indirect bearer
Default value: Direct bearer
Note:
Indirect bearer indicates that the bearer type is not related to
physical link.
z Example:
To configure the BICC_SCTP to IP over E1 office direction, set IP domain to 10 and IP
bearer type to Direct bearer:
ADD OFC: ON="BICC_SCTP", OOFFICT=MSC, DOL=SAME, SIG=SCTP,CSCNAME="LOCAL_0", IPD=10,
IPBT=DIRECT, AN="0", CONFIRM=Y;
When IP domain is set to 0, it indicates all interconnection by using router. Other values specify
concrete IP domains. For MGWs, when IP domain is set to 0, it indicates that all router networking and
bearer can be set up on any port. When MGWs do not use all router interconnection (including E1 all
interconnection and non interconnection), IP domain must be set to values except 0 to set up bearer on
the port corresponding to the MGW specified by IP domain. Thus, for the IP over E1 bearer mode, set
Internal MGW connection type to Not all MGW connection and Internal MGW media type to IP
by using ADD SRVNODE.
Step 2 Set Internal MGW connection type to Not all MGW connection.
z Command:
MOD SRVNODE
z Function:
It is used to add a dual-homing server node.
z Parameter description:
It already existed. No new parameter description is required.
z Example:
To set Internal MGW connection type to Not all MGW connection, run the following
command:
MOD SRVNODE: SN="LOCAL", IMMT=IP, IMCT=NOT-ALLMGW;
z Command:
ADD MGWCONN
z Function:
It is used to add the connection between MGWs.
z Parameter description:
It already exists. No new parameter description is required.
z Example:
To configure intra-office MGW connection, set IP domain:
ADD MGWCONN: MGWNM1="MGW0", MGWNM2="MGW1", DN="IP OVER E1", IPDM=10;
Set IP domain when configuring intra-office MGW connection. The value range of IP domain is from 0
to 999. The default value is 0, indicating that all interconnection by using router. Other values specify
concrete IP domains. The VTID must be configured for the flow control of medium bearer based on IP
over E1.
----End
Step 2 Bind the internal TDM port of the MIOE with the physical TDM port.
z Command:
ADD BIND
z Function:
It is used to bind the internal E1 port of the MIOE with the physical E1 port.
z Parameter description:
TDMBT TDM board It is the type of board to which the physical TDM port
type belongs. Currently, only E1 port is supported.
It is enumeration type. Currently, only E32 is supported.
TDMBN TDM board It is the board No. where the physical TDM port is. It is
No. numeric type.
Value range: 0–223
TDMPORT TDM port No. It is the physical TDM port number on a specified
interface board. It is numeric type.
Value range: 0–31
IOEBN IOE board No. After the command is run, the one to one relationship
between a certain internal TDM port of the MIOE and a
certain physical TDM port of the TDM interface board is
set up. It specifies the board No. where the internal TDM
port is. It is numeric type.
Value range: 0–13
IOEPORT IOE internal It is a mandatory sub-parameter. If TDM board type is
TDM port No. set to E32, T32, S1L, S2L or PIE, the parameter is
displayed.
It is enumeration type and its value range is from 0 to 63.
It is the port number of the internal TDM in the binding
relation.
DESP Port It is an optional sub-parameter. If TDM board type is set
description to E32, T32, S1L, S2L or PIE, the parameter is
displayed.
It is character string type. Up to 31 characters can be
entered. It describes a pair of TDM ports that have been
bound.
z Example:
To bind the E1 port (physical TDM port) numbered 6 of the E32 numbered 0 with the
internal TDM port numbered 0 of the MIOE numbered 2:
ADD BIND: TDMBT=E32, TDMBN=0, TDMPORT=6, IOEBN=2, IOEPORT=0, DESP="Binding TDM Port";
z This command is run for the HRB only of which the physical board type is MIOE.
z The MIOE and bound TDM interface boards must be in the same frame.
z Each internal TDM port of the MIOE must be bound with one physical TDM port.
z The timeslot of the specified physical TDM port must be internal timeslot and unused.
z After the one to one binding relationship is set up by this command, the corresponding physical
TDM port cannot be used for other functions. In addition, the physical TDM port cannot be bound
with other internal TDM ports of the MIOE.
Step 3 Group the timeslots of internal TDM port of the MIOE configured with binding relationship.
z Command:
ADD CHANNEL
z Function:
It is used to group the timeslots of internal TDM port of the MIOE to set up an interface
supporting IP over E1. The interface type is Serial that can be configured with an IP
address.
z Parameter description:
BN IOE board No. This command is used to group the timeslots of internal
TDM port to set up a Serial interface. The parameter
specifies the board No. where the internal TDM port is. It
is numeric type.
Value range: 0–13
PORT IOE internal It is the internal TDM port No. on a specified MIOE. It is
TDM port No. numeric type.
Value range: 0–63
STARTTS Start timeslot The timeslots of the Serial interface set up through the
command must be sequent. This parameter specifies the
start timeslot. It is numeric type.
Value range: 1–31
ENDTS End timeslot This parameter specifies the end timeslot. It is numeric
type.
Value range: 1–31
IFN Interface No. After the command is run, the front four specified
timeslots set up a Serial interface. This parameter is the
interface No. distributed to the Serial interface. The No. of
Serial interfaces on the same MIOE is unique. It is
numeric type.
Value range: 0–255
z Example:
To group the timeslots numbered 1–31 of the internal TDM port numbered 0 of the
MIOE numbered 2, and set up the Serial interface numbered 0:
ADD CHANNEL: BN=2, PORT=0, STARTTS=1, ENDTS=31, IFN=0;
z This command is run for the HRB only, of which the physical board type is MIOE.
z The specified internal TDM port must be bound with a certain physical TDM port of the TDM
interface board by the command ADD BIND.
z The grouped timeslots must be sequent and belong to the same TDM port.
z The timeslot 0 of the E1 port is used to transmit synchronization information. Thus, it cannot be
added to the Serial interface.
z When multiple timeslot groups are set up on the same TDM port, the timeslots contained in each
group cannot be overlap. That is, the same timeslot cannot belong to multiple Serial interfaces.
z Function:
It is used to configure the IP address of a specified interface of a specified board. This
command supports two new interface types: Serial and VT.
z Parameter description:
IFT Interface Two new interface types are added: Serial and VT.
type
IFN Interface It is numeric type. Each MIOE can support up to 256 Serial
No. interfaces. Thus, the value range expands from 0–15 to
0–255.
z Example:
On the Serial interface numbered 0 of the MIOE numbered 2, set IP address to
18.10.0.25 and Subnet mask to 255.255.0.0:
ADD IPADDR: BT=HRB, BN=0, IFT=SRL, IFN=0, IPADDR="192.168.0.1",
MASK="255.255.255.0", IFMPLS=NO;
IFT Interface type Two new interface types are added: Serial and VT.
IFN Interface No. It is numeric type. Each MIOE can support up to 256
Serial interfaces. Thus, the value range expands from
0–15 to 0–255.
IFMP MP enable It is an optional sub-parameter only when Interface type
is set to Serial. It is used to configure whether the
corresponding Serial interface can support MP. If yes, the
VT interface to which the Serial interface belongs must be
specified through VT Interface No..
It is numeric type. The values are Yes and No.
VT VT Interface It is a mandatory sub-parameter when Interface type is
No. set to Serial and MP enable is set to Yes. It specifies the
VT interface to which the Serial interface belongs. It is
numeric type.
Value range: 0–127
z Example:
To classify the Serial interface numbered 0 of the MIOE numbered 2 to domain 10:
MOD IPIF: IFT=SRL, BT=HRB, BN=2, IFN=0, MTU=1500, ENABLE=YES, DESP="Serial
Interface", AUTH=NONE, TIMEOUT=3, KEEPALIVE=10, DOMAIN=10, BEARBW=1024, IFMP=NO,
VT=0, IFCRTP=NO, RPTROUTE=NO, CRCENB=YES, CRCLENGTH=CRC16, SCRAMENB=NO,
TIMEFILL=Ox7E, SPACEREG=0, CRCCHKENB=YES, CRCCHKLEN=CRC16, UNSCRAMENB=NO;
----End
MGW 1 MGW 2
IP Over E1
The BICC office direction is configured from MSC server 1 to peer MSC server 2. The
interface to peer MGW 2 is the Serial interface with 31 timeslots. The local IP address is
18.10.0.25.
MGW 1 is configured with an MIOE with the board No. 2 and an E32 with the board No. 0.
The number of the E1 interface is 6, connecting to MGW 2.
Description Add an office direction: Set the office direction from MSC server 1 to peer
MSC server 2 to BICC, Office direction name to BICC_SCTP, Signaling
type to BICC over SCTP, IP domain to 10 and IP bearer type to Direct
bearer.
Script ADD OFC: ON="BICC_SCTP", OOFFICT=MSC, DOL=SAME,
SIG=SCTP, CSCNAME="LOCAL_0", IPD=10, IPBT=DIRECT, AN="0",
CONFIRM=Y;
Remark For the configurations of TG and BICC CIC, refer to the configuration of
common BICC office direction.
Step 2 Set Internal MGW connection type to Not all MGW connection.
Description Set Internal MGW connection type to Not all MGW connection.
----End
Step 2 Bind the internal TDM port of the MIOE with the physical TDM port.
Description Bind the internal E1 port of the MIOE with the physical E1 port.
Step 3 Divide the timeslots of the IOE internal TDM ports that is configured with binding relation
into groups.
Description Bind timeslots 1 to 31 with IP interface 5 of the IOE with board No. 2,
internal port number 2 and interface type serial.
Script ADD CHANNEL: BN=2, PORT=0, STARTTS=1, ENDTS=31, IFN=5;
Description Set the property of IP interface: Set Interface type to Serial Interface and
IP domain to 10.
Script MOD IPIF: IFT=SRL, BT=HRB, BN=2, IFN=0, MTU=1500,
ENABLE=YES, DESP="Serial Interface", AUTH=NONE, TIMEOUT=3,
KEEPALIVE=10, DOMAIN=10, BEARBW=1024, IFMP=NO, VT=0,
IFCRTP=NO, RPTROUTE=NO, CRCENB=YES, CRCLENGTH=CRC16,
SCRAMENB=NO, TIMEFILL=Ox7E, SPACEREG=0,
CRCCHKENB=YES, CRCCHKLEN=CRC16, UNSCRAMENB=NO;
----End
24.10 Reference
24.10.1 Specifications
None.
Contents
Figures
Figure 25-4 IP QoS processing flow in gateway pair mode for intra-office calls........................................... 25-11
Tables
Table 25-1 NEs that are involved in this IP QoS flow control..........................................................................25-3
Table 25-2 Earliest version that implements the IP QoS flow control..............................................................25-4
Table 25-3 Software parameter setting for QoS flow control function...........................................................25-12
Section Describes
25.1 Feature Description The function code and definition of the service and the
benefits of the service to carriers and mobile
subscribers.
25.2 Availability The NEs required to implement the service,
requirements for the license, and versions of the
products applicable to the service.
25.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
25.4 Service Flow The flow of the service.
25.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as
the examples of data configuration.
25.6 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
25.7 Performance Measurement The influence of the service on performance
measurement and the implementation of performance
measurement.
25.8 Service Interaction The association between the service and other services
as well as the restrictions on each other.
25.9 References The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
25.10 FAQ The frequently asked questions related to the service and
the solutions.
25.1.2 Definition
Logically, the MSOFTX3000 is classified into two network entities: mobile softswitch center
(MSC) server and media gateway (MGW) . One MSC server controls one or more MGWs
through H.248 or Media Gateway Control Protocol (MGCP). The functions of the network
entities are as follows:
z MSC server: It is responsible for control functions in the circuit-switched (CS) domain,
such as mobility management, security management, handoff processing, signaling
processing, and subscriber service data management (VLR function).
z MGW: It bears the circuits in the CS network and media streams in the IP network, and
is responsible for voice, data and video connection between the CS network and IP
network, or in the same network.
When the MSOFTX3000 interworks with another MSC server through the Bearer
Independent Call Control (BICC) protocol, the MSOFTX3000 supports the IP QoS flow
control if the MSOFTX3000 and MSC server bear media streams in IP mode. This ensures
that the voice quality of an established call borne by the IP is not affected by the quality
degradation of the IP bearer network.
The IP QoS flow control can be used when the MSOFTX3000 works as end office, gateway
office or tandem office. For an established call between two MGWs (intra-office or
inter-office call), the IP QoS detection is implemented on the endpoints of the call. If an alarm
is generated with the IP QoS damage, the MSOFTX3000 restricts subsequent calls through
the flow control mechanism such as quality degradation or call restriction, so that the voice
quality of the established call is not affected.
IP QoS and The IP QoS flow control is implemented on a WCDB. Through this
distributed trunk distributed trunk selection function, the number of WCDBs that
selection function perform the trunk selection function increases. When the traffic is
normal, the trunk selection function is implemented in load-sharing
mode and thus each WCDB can independently perform the trunk
selection. In this case, the IP QoS flow control is implemented only on
one WCDB for one call.
Item Specification
IP QoS flow The case that BCUID is not contained in the signaling between
control in network elements (NEs) is not considered. If BCUID is not contained
inter-office in the signaling, the MSC server cannot obtain gateway pair
gateway pair information or call route information. Thus, the MSC server cannot
mode send the detection event and cannot implement the IP QoS flow
control.
Others When the quality of the bearer network becomes poorer, subsequent
calls are restricted, but established calls are not released.
25.1.4 Benefits
Beneficiary Description
Carrier In a mobile network, the IP QoS flow control ensures the quality of
the IP bearer network. In case of heavy traffic, the traffic can be
efficiently distributed or subsequent calls are restricted so that the
quality of established calls is maintained.
Mobile subscriber The IP QoS flow control improves the quality of established calls.
25.2 Availability
25.2.1 Requirements for NEs
To implement the IP QoS flow control, the MSOFTX3000 must work with the MGW. Table
25-1 lists the NEs that are involved in this IP QoS flow control.
Table 25-1 NEs that are involved in this IP QoS flow control
UE NodeB RNC MSC Server MGW SGSN GGSN HLR
- - - √ √ - - -
Table 25-2 Earliest version that implements the IP QoS flow control
Product Applicable Version
25.2.4 Others
None.
call restriction alarm between inter-office office direction gateways, the alarm ID is 1887;
for the call restriction alarm between intra-office gateways, the alarm ID is 1890.
4. When the voice quality of the calls of a certain direction becomes good, a recovery
period is enabled to avoid the call traffic jitter during the recovery and a recovery alarm
is generated. For a recovery alarm between inter-office office direction gateways, the
alarm ID is 1888; for a recovery alarm between intra-office gateways, the alarm ID is
1891. Within the recovery period, if the voice quality becomes better, the number of
calls allowed per minute increases by geometric progression or arithmetical progression
(set in SET QOSPARA), but the flow control is not released until the maximum
threshold value (set in SET QOSPARA) is reached after the recovery period.
Currently, the policies of the IP QoS flow control are as follows:
z The IP QoS flow control is disabled.
z Only sampling function of the IP QoS flow control is enabled to detect the quality of the
bearer network.
z The sampling function of the IP QoS flow control, and the IP QoS flow control are
enabled. If it is found that the quality of the bearer network becomes poor through call
sampling, the number of calls is restricted. This restriction is not cancelled until the
quality of the bearer network is restored.
MSOFTX3000-4
MSOFTX3000-1 MSOFTX3000-2 MSOFTX3000-3
Signaling
Bearer
When the MSC server detects that the voice quality of calls of a certain direction on the MGW becomes
poor, subsequent calls are restricted. In different flow control modes, the processing of subsequent alls is
different.
z In inter-office office direction mode, subsequent calls are diverted to other MGWs with good bearer
quality. If there are no other MGWs with good bearer quality, outgoing selection and subsequent
calls fail.
z In inter-office gateway pair mode, subsequent calls are released.
These two inter-office modes are exclusive of each other. P353 software parameter is used to
control which mode is used. For details, see the Software Parameter Description.
Intra-office IP QoS flow control is independent of inter-office IP QoS flow control.
gateway bearer quality is bad. If the QoS value reported by an MGW is less than the
value, it is considered that the gateway bearer quality is normal.
2. If the bearer quality of a gateway changes from good to bad, the WCDB board restricts
the number of calls that pass this gateway in the next minute based on the number of
calls in the previous minute or the average number of calls per minute from 4:00 a.m. till
now. (Set the two options through the software parameter P354 QoS Control Parameter.
For detailed description, refer to the Software Parameter Description. The default
configuration, that is, the number of calls in the previous minute, is used as an example
in this section.) The number of calls that pass the gateway in the next minute cannot
exceed the number of calls in the previous minute. At this time, the number of calls in
the previous minute obtained is defined as the number of calls per minute. If the gateway
continues to report QoS values that are equal to or larger than the value configured on
the MSC, the number of calls that pass the gateway is reduced based on the configured
percentage and the number of calls per minute. If the QoS value reported is equal to the
value configured on the MSC, the number of calls is reduced based on First descend
percentage. If the QoS value reported is larger than the value configured on the MSC,
the number of calls is reduced based on Second descend percentage. The two
parameters can be configured through SET QOSPARA. If the gateway continues to
report QoS values equal to or larger than the value configured on the MSC, the number
of calls allowed to pass the gateway is reduced until it reaches the minimum number of
calls allowed. Configure the minimum number of calls through SET QOSPARA.
3. When the bearer quality of the gateway keeps worsening, the number of calls per minute
is reduced based on the configured percentage. The number of calls in the next minute
cannot exceed the number of calls being reduced. The established calls, however, are not
disconnected forcedly.
4. If the bearer quality of a gateway changes from bad to good (the MSC server does not
consider that the bearer quality becomes good. The MSC server only starts a recovery
process, during which the flow control is still enabled. After complete recovery, the
MSC server considers that the bearer quality becomes good and disables flow control),
the MSC server enables Resume long timer T1 (configured through SET QOSPARA).
If a serious alarm (the QoS value reported to the MSC server ≥ the QoS value configured
on the MSC server) occurs before T1 times out, the system enters the call restriction state
again, and the call-restriction-threshold-increment Delta1 is set to 0; if T1 times out, set
the times of continuous ascending call restriction threshold to N through SET
QOSPARA, and start Resume short timer T2 (configured through SET QOSPARA)
for N times. If a serious alarm occurs before T2 times out, the system enters the call
restriction state again and Delta1 is set to 0; if T2 times out, set the initial value of Delta1
based on Resume delta type (When Resume delta type is set to Geometric
Progression, the initial value of Delta1 is 1; when Resume delta type is set to
Arithmetical Progression, the initial value of Delta1 is set to 0), then add Delta1 based
on Resume delta type (By default, Geometric Progression is adopted, and Resume
value is set to 2 through SET QOSPARA. You can also adopt Arithmetical
Progression, and set Resume value to 1, 2 or other values), reduce N, and if N is not
reduced to 0, T2 is restarted, the gateway keeps being recovered. If N is 0, add Delta1 to
the number of calls per minute. If the number of calls per minute at present is larger than
Maximal threshold (configured through SET QOSPARA), it indicates that the number
of calls reaches the maximum value, and it is considered that the gateway is completely
recovered and flow control is stopped. Otherwise, restart T1 to repeat the previous
process to recover the gateway.
5. If no sample is reported within a certain period (configured through SET QOSPARA), it
is considered that the MGW loses information of the quality sampling call. The
MSOFTX3000 issues a new sampling instruction.
If an intra-office call crosses two gateways, IP QoS sampling and flow control are performed
between the two gateways. The detailed process is the same as previous description.
Signaling
Bearer
MSX1 MSX2
For outgoing calls, the processing flow for IP QoS flow control in inter-office office direction
mode is as follows:
1. An outgoing route is selected for a call on MSX1. MGW2 is selected as the outgoing
gateway. The office direction is MSX2. If a route is selected successfully, MSX1
samples calls from MGW2 to MSX2. MSX1 issues a sampling instruction to MGW2.
2. After receiving the sampling instruction, MGW2 reports the bearer quality of the call to
MSX1 periodically in the form of QoS alarm value until the call is completed. The worse
the bearer quality is, the larger the QoS alarm value is.
3. MSX1 receives the QoS alarm value from MGW2 periodically. MSX1 analyzes the
value to determine whether to perform flow control to future calls from MGW2 to MSX2.
For the analysis principles, see 25.3.2 "Internal Processing of the System."
4. If MSX1 determines to perform flow control to calls from MGW2 to MSX2, MSX1
restricts the number of calls per minute so that the calls do not exceed the number of
calls in the previous minute. If subsequent calls from MGW2 to MSX2 meet the flow
control requirements, these calls cannot be transmitted from MGW2. The system
chooses another MGW for call connection. If there are no available MGWs, the calls are
disconnected.
Figure 25-3 IP QoS processing flow in inter-office gateway pair mode for inter-office calls
MGW2 MGW3
IP Network
MGW1 MGW4
The IP QoS flow control in inter-office gateway pair mode for an outgoing call is described as
follows:
1. MSX1 routes a call to MSX2 through MGW2, which functions as an outgoing gateway.
MSX2 returns an APM, which contains the BCUID of the peer MGW. Suppose the
BCUID of MGW3 is returned.
2. MSX1, based on the BCUID of MGW3, determines whether the path from MGW2 to
MGW3 meets the flow control conditions.
− If the path meets the conditions, the call is disconnected.
− If the path does not meet the conditions, MSX1 checks whether the number of
sampling objects of the current path reaches three. If not, MSX1 instructs MGW2 for
sampling.
3. MGW2 periodically reports the bearer quality, which is expressed in QoS alarm value, to
MSX1, before the call ends. The poorer the bearer quality, the larger the QoS alarm
value is.
4. MSX1 analyzes the alarm value and determines whether to carry out flow control for
future calls from MGW2 to MGW3. For the analysis principles, see 25.3.2 "Internal
Processing of the System."
5. In gateway pair mode, the call from the MGW to the peer MGW is released directly.
MSX1 does not select other MGWs to connect the call. This is because the
MSOFTX3000 determines whether to carry out the flow control after the BCUID of
MGW3 is obtained.
Figure 25-4 IP QoS processing flow in gateway pair mode for intra-office calls
MGW2
Signaling
Beaer
MSX
MGW1 MGW3
The IP QoS flow control in gateway pair mode for inter-office calls is described as follows:
1. For a call from MGW1 to MGW3, the MSX selects the path from MGW1 to MGW3
first. The MSX instructs MGW1 for sampling. (In intra-office gateway pair, the
MSOFTX3000 only need to instruct one MGW for sampling to obtain the QoS alarm
value.)
2. MGW1 periodically reports the bearer quality, which is expressed in QoS alarm value, to
the MSX, before the call ends. The poorer the bearer quality, the larger the QoS alarm
value is.
3. The MSX analyzes the alarm value and determines whether to carry out flow control for
future calls from MGW1 to MGW3. For the analysis principles, see 25.3.2 "Internal
Processing of the System."
4. If the bearer quality of the path from MGW1 to MGW3 gets poorer, the MSX enables
the flow control to limit the number of calls per minute through this path. Thus, the
number of calls does not exceed that of the last minute. The calls that exceeds the
number, are routed through another path, such as MGW1–>MGW2–>MGW3. If the path
from MGW1 to MGW2 or the path from MGW2 to MGW3 meets the flow control
conditions, calls cannot be put through, either.
− = 1: Yes.
Bit 2 has higher priority than bit 1, that is, if the flow control function is enabled, the sampling
function is enabled irrespective of the value of bit 1. By default, the value of P353 is 0,
indicating that the IP QoS flow control function is disabled.
Table 25-3 lists the setting of software parameter P353.
Table 25-3 Software parameter setting for QoS flow control function
Bit 2 Bit 1 Meaning
0 0 QoS is disabled.
0 1 QoS is enabled. The sampling function is enabled. The MSOFTX3000
does not carry out the flow control when the quality of the bearer
network gets poorer.
1 * QoS is enabled. The sampling function is enabled. The MSOFTX3000
carries out the flow control when the quality of the bearer network gets
poorer.
Command Function
It specifies the threshold for call barring in the current call barring mode. In the current call
barring mode, if the IP bearer quality alarm, that is, the QoS alarm value reported by the
UMG8900, reaches the value of Call barring alarm level configured, the MSOFTX3000
carries out the call barring. Otherwise, the MSOFTX3000 does not carry out the call barring.
First descend percentage
It specifies the first descend percentage in the current call barring mode. When the QoS alarm
value reported by the MGW reaches the value of Call barring alarm level, the MSC server
bars calls according to the value of First descend percentage.
Note that the value of First descend percentage must be larger than that of Second descend
percentage.
Second descend percentage
It specifies the second descend percentage in the current call barring mode. When the QoS
alarm value reported by the MGW is greater than the value of Call barring alarm level, the
MSC server bars calls according to the value of Second descend percentage.
Minimal threshold
It specifies the minimum threshold value in the current call barring mode, that is, the
minimum number of calls that can be connected every minute in the path in which the flow
control is carried out.
Resume long timer
It specifies the duration of the resume long timer in the current call barring mode, in unit of
second.
Note that the value of Resume long timer must be equal to or greater than the value of
resume short timer.
Resume short timer
It specifies the duration of the resume short timer in the current call barring mode, in unit of
second.
Resume hold times
It specifies the resume hold times in the current call barring, that is, it specifies the number of
times for the MSOFTX3000 to enable the short timer during the resuming.
Resume delta type
It specifies the resume delta type in the current call barring mode. The options are described
as follows:
z Geometric progression: The MSOFTX3000 resumes calls according to the geometric
proportion principle.
z Arithmetical progression: The MSOFTX3000 resumes calls according to the arithmetical
progression principle.
Resume value
It specifies the resume delta value in the current call barring mode. This parameter is the radix
for call barring resume. This parameter with Resume hold times determines the number of
calls that can be resumed. The calculation relationship is as follows:
z When Resume delta type is set to Geometric progression, the number of calls that can
be resumed is the nth power of Resume value, where n is the value of Resume hold
times. For example, if Resume value is set to 2 and Resume hold times is set to 3, the
number of calls that can be resumed is 8.
z When Resume delta type is set to Arithmetical progression, the number of calls that
can be resumed is Resume value multiplied by n, where n is the value of Resume hold
times. For example, if Resume value is set to 2 and Resume hold times is set to 3, the
number of calls that can be resumed is 6.
Maximal threshold
It specifies the maximum threshold value in the call barring mode. During the call resume, if
the number of calls per minute reaches or exceeds the value of Maximal threshold, the
MSOFTX3000 stops the call barring in this path.
Note that the value of Maximal threshold must be equal to or greater than that of Minimal
threshold.
Step 3 Configure the parameters for virtual office direction.
When the QoS flow control office direction mode is set to inter-office mode, you must set the
virtual office direction parameters through the following commands.
Command Function
The following parameters are described by considering the command ADD BCUIDOFC for
example.
BCUID
It specifies the ID of a bearer control unit. When the MSOFTX3000 is interconnected with the
MSC server through the BICC protocol, the BCUID is used to uniquely identify an MGW in
the BICC protocol message. The BCUID cannot be set freely. It is allocated by the network
operator in the entire network. That is to say, each MGW has its unique BCUID in a network.
Peer MGW description
It specifies an MGW for identification. Its value is the character string with the value range of
32 characters. It is null by default.
Virtual office direction name
It specifies a virtual office direction for identification. It maps the virtual office direction
name one to one. Its value is the character string with the value range of 32 characters. It is set
to DFTVON by default.
Note the following when configuring the virtual office direction through ADD/MOD
BCUIDOFC:
z If only one virtual office direction mapping the MGW is configured, ensure that the
VON is different from that mapping another MGW.
z If one virtual office direction mapping multiple MGWs is configured, separately set the
VONs mapping the MGWs to the same value through ADD/MOD BCUIDOFC.
For data configuration of the auxiliary functions, see related descriptions of P354 and P355 in
the software parameter description document.
----End
Level 0 0%
Level 1 0%–3% (> 0% and < 3%)
Level 2 3%–8% (≥ 3% and < 8%)
Level 3 8%–15% (≥ 8% and < 15%)
Level 4 15%–30% (≥ 15% and < 30%)
Level 5 ≥ 30%
The package discarding rate of each level is adjustable. For example, the package discarding
rate of level 2 can be set to 5%–10%. The level can be calculated according to the quality of
the bearer network. The package discarding rate, delay, and jitter are the factors that reflect
the QoS level.
z If packages are discarded, the QoS level is calculated based on the package discarding
rate. For example, if the current package discarding rate is 3%, the corresponding QoS
level is 1; if the rate is 10%, the QoS level is 3.
z If the package is not discarded, the loop delay and jitter are the factors that reflect the
QoS level. If one of them exceeds the threshold (the value preset on the MGW), the QoS
level can be considered as 1.
z For other situations, the QoS level can be considered as 0.
Configuration Script
Step 1 Set QoS function switch.
Description Modify the software parameter P353 to 4, that is, set BIT0 to 0, BIT1 to 0,
and BIT2 to 1.
Script MOD MSFP: ID=P353, MODTYPE=P0, VALUE="4";
Description Set Call barring type to Inter MSC, Sample object count to 3, Sample
protect time to 5, Call barring alarm level to 2, First descend
percentage to 95%, Second descend percentage to 90%, Minimal
threshold to 2, Resume long timer to 150, Resume short timer to 75,
Resume hold times to 2, Resume delta type to Geometric Progression,
Resume value to 2, and Maximal threshold to 200.
Script SET QOSPARA: CBT=INTMSC, SOC=3, SPT=5, CBAL=2, FDP=95,
SDP=90, MNT=2, RLT=150, RST=75, RHT=2, RDT=GP, RV=2,
MXT=200;
Remarks z If the data in this step is not configured, the system adopts the default
data.
z Both the inter- and intra-office QoS parameters are configured through
this command.
----End
Scenario Description 2
When the sampling function is enabled but the flow control function is disabled, the
inter-office flow control mode must be "Inter-office gateway pair mode".
Configuration Script
Step 1 Set QoS function switch.
Description Modify the software parameter P353 to 3, that is, set BIT0 to 1, BIT1 to 1,
and BIT2 to 0.
Description Set Call barring type to Intra MSC, Sample object count to 3, Sample
protect time to 5, Call barring alarm level to 2, First descend
percentage to 95%, Second descend percentage to 90%, Minimal
threshold to 2, Resume long timer to 150, Resume short timer to 75,
Resume hold times to 2, Resume delta type to Geometric Progression,
Resume value to 2, and Maximal threshold to 200.
Script SET QOSPARA: CBT=INTMSC, SOC=3, SPT=5, CBAL=2, FDP=95,
SDP=90, MNT=2, RLT=150, RST=75, RHT=2, RDT=GP, RV=2,
MXT=200;
Remarks z If the data in this step is not configured, the system adopts the default
data.
z Both the inter- and intra-office QoS parameters are configured through
this command.
Description Set the two MGWs with the BCUID of 0 and 1 to be in the same virtual
office direction, and set the office name to Virtual_Office.
Script ADD BCUIDOFC: BCUID=0, MGWDESCRN="Mgw1 of ShenZhen",
VON="Virtual_Office";
ADD BCUIDOFC: BCUID=1, MGWDESCRN="Mgw2 of ShenZhen",
VON="Virtual_Office";
----End
25.9 References
25.9.1 Standards and Specifications
None.
NA NA
Abbreviations
Abbreviations Full Name
TK Trunk
25.10 FAQ
FAQ1
The quality of calls on a certain MGW office direction becomes poorer but the subsequent
calls are still being connected.
Step 1 Check whether the IP QoS flow control function of the MSC server is enabled and BIT2 of
P353 is set to 1. If the flow control function is disabled, enable it.
Step 2 If the flow control function is enabled. Run LST QOSPARA to check whether the Minimal
threshold is set to a bigger value. If yes, modify the value to a smaller one (In call barring
status, the number of calls connected per minutes is over this value).
Step 3 If the problem remains, check the MGW configuration (see MGW user manual for details) to
confirm the relation between the MGW QoS alarm value and the network QoS detected by the
MGW. This problem occurs when the lower QoS alarm value maps the higher package
discarding rate.
Step 4 If the problem remains, save related information and contact Huawei technical support
engineers for help.
----End
FAQ2
The quality of calls on a certain MGW office direction is good but some of the subsequent
calls cannot be connected.
Step 1 Check whether the IP QoS flow control function of the MSC server is enabled (follow the
preceding steps). If the function is disabled, check whether the problem occurs due to other
causes.
Step 2 If the problem remains, check the MGW configuration (see MGW user manual for details) to
confirm the relation between the MGW QoS alarm value and the network QoS detected by the
MGW. This problem occurs when the lower QoS alarm value maps the higher package
discarding rate.
Step 3 If the problem remains, save related information and contact Huawei technical support
engineers for help.
----End
Contents
Figures
Figure 26-1 Internal processing of system when the sending of short message is allowed by the SCP ...........26-5
Figure 26-2 Internal processing of system when the sending of short message is prohibited by the SCP .......26-6
Figure 26-3 Service flow when the sending of short message is allowed by the SCP .....................................26-8
Figure 26-4 Service flow when the sending of short message is prohibited by the SCP................................26-10
Figure 26-5 Procedure for querying the table to obtain the O-CSI SMS processing information ..................26-15
Figure 26-6 Procedure for querying the table to obtain the location number in the INITIAL-DP message...26-16
Tables
Table 26-4 Versions of Huawei core network products that support the O-CSI SMS ......................................26-3
Table 26-5 Parameters in the Initial-DP message .............................................................................................26-7
Table 26-6 Logical relationship to determine whether to allow the triggering of the O-CSI............................26-9
26 O-CSI SMS
Section Describes
26.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
26.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
26.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
26.4 Service Flow The flow of the service.
26.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
26.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
26.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
26.8 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
26.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
26.10 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
26.11 FAQ The frequently asked questions related to the service and
the solutions.
Name Code
26.1.2 Definition
O-CSI SMS means that subscribers subscribing to O-CSI (hereinafter O-CSI refers to O-CSI
DP2) without subscribing to SMS-CSI can also trigger the MOS SMS flow.
26.1.5 Benefits
Table 26-2 lists the benefits of the software management service.
26.2 Availability
26.2.1 Requirements for NEs
Table 26-3 lists the network elements (NEs) required to implement the O-CSI SMS, including
MS/UE, BTS/Node B, BSC/RNC, MSC Server, SMC, HLR, and SCP.
√ √ √ √ - √ √ √
Table 26-4 Versions of Huawei core network products that support the O-CSI SMS
Product Applicable Version
26.2.4 Others
None.
Figure 26-1 Internal processing of system when the sending of short message is allowed by the
SCP
RCF
CP_DATA
1.
CP_ACK
SEND INFO
2. FOR MO-SMS
COMPLETE SMO
CALL (TC_CONT)
DP-SO-COLLECTED-INFO
INITIAL-DP
3.
CONTINUE
4.
CONTINUE
SEND INFO
5. FOR MO-SMS
COMPLETE SMO
CALL (TC-END)
Forward Short
6. Message
Forward Short
Message ack
CP_DATA(RP_ACK)
CP_ACK
When the sending of short message is allowed by the SCP, the service flow is as follows:
1. The MSC server receives the CP_DATA short message from the subscriber.
2. By sending the SEND INFO FOR MO-SMS message to the VLR, the MSC server
checks the ODB BAOC of the subscriber to see whether the barring of all outgoing
services of the subscriber is enabled.
3. The MSC server triggers the O-CSI SMS and sends the INITIAL-DP message to the
SCP.
4. The SCP sends the CONTINUE message to the MSC Server, indicating to continue with
the flow.
5. The MSC server sends the SEND INFO FOR MO-SMS message to complete the ODB
BOIC check and to see whether the barring of all outgoing international services is
enabled.
6. The MSC server forwards the short message to the SMC.
z The MSC server acts as both the RCF and the VLR in the preceding figure.
z When the MSC server checks the ODB BAOC and BOIC of the subscriber and finds that the
services are barred, the MSC server terminates the O-CSI SMS flow.
Figure 26-2 Internal processing of system when the sending of short message is prohibited by the
SCP
RCF
CP_DATA
1.
CP_ACK
SEND INFO
2. FOR MO-SMS
DP-SO-COLLECTED-INFO
INITIAL-DP
3.
RELEASE CALL
4.
int-RELEASE
CP_DATA(RP_error)
5.
CP_ACK
When the sending of short message is prohibited by the SCP, the service flow is as follows:
1. The MSC server receives the CP_DATA short message from the subscriber.
2. By sending the SEND INFO FOR MO-SMS message to the VLR, the MSC server
checks the ODB BAOC of the subscriber to see whether the barring of all outgoing
services of the subscriber is enabled.
3. The MSC server triggers the O-CSI SMS and sends the INITIAL-DP message to the
SCP.
4. The SCP sends the RELEASE CALL message to the MSC server to terminate the flow.
5. The MSC server terminates the O-CSI SMS flow by sending the CP_DATA (RP_error)
message to the MS.
Parameter M/O
ServiceKey M
CalledPartyNumber NA
CallingPartyNumber M
CallingPartysCategory M
LocationNumber M
OriginalCalledPartyID NA
Extensions NA
HighLayerCompatibility NA
AdditionalCallingPartyNumber NA
BearerCapability NA
EventTypeBCSM M
RedirectingPartyID NA
RedirectionInformation NA
IMSI M
SubscriberState NA
LocationInformation M
--locationNumber NA
--CellIdOrLAI M
--GeographicalInformation O
--AgeOf location M
--VLRNumber M
Ext-basicServiceCode M
CallReferenceNumber M
MscAddress M
CalledPartyBCDNumber M
Figure 26-3 Service flow when the sending of short message is allowed by the SCP
Access process
1.CP_DATA
2.Intial-DP
3.CONTINUE
4.FORWARD_SHORT_MESSAGE_REQ
FORWARD_SHORT_MESSAGE_CNF
5.CP_ACK
When the sending of short message is allowed by the SCP, the service flow is as follows:
1. After the subscriber access is completed, the content of the short message is sent to the
MSC server through the CP_DATA message.
2. After receiving the short message content, the MSC server obtains the subscriber data
(including CAMEL data) from the VLR and checks whether the subscriber subscribes to
the SMS-CSI. If the subscriber subscribes to the SMS-CSI, the MSC server triggers the
SMS-CSI flow. If the subscriber subscribes to the O-CSI but not the SMS-CSI, and the
local office supports the O-CSI SMS by using the software parameters, the MSC server
triggers the O-CSI and sends the Initial-DP message to the SCP.
3. After receiving the Initial-DP message, the SCP determines to allow the sending of short
messages, and sends the CONTINUE message to the MSC server.
4. After receiving the CONTINUE message, the MSC server sends the content of the short
message to the SMC through the FORWARD_SHORT_MESSAGE_REQ message.
5. After receiving the FORWARD_SHORT_MESSAGE_CNF message from the SMC, the
MSC server sends the CP_ACK message to the subscriber, indicating that the short
message is sent successfully.
After receiving the content of the short message from the BSC and before sending the Initial-
DP message to the SCP, the MSC server checks whether to allow the triggering of the O-CSI
based on the logic relationship listed in Table 26-6. The software parameter that controls
whether the local office supports the O-CSI SMS must be enabled for the MSC server to
complete the check.
Table 26-6 Logical relationship to determine whether to allow the triggering of the O-CSI
Figure 26-4 Service flow when the sending of short message is prohibited by the SCP
Access process
1.CP_DATA
2.Intial-DP
3.RELEASE_CALL
4.CP_ACK(RP_ERROR)
When the sending of short message is prohibited by the SCP, the service flow is as follows:
1. After the subscriber access is completed, the content of the short message is sent to the
MSC server through the CP_DATA message.
2. After receiving the short message content, the MSC server checks whether the subscriber
subscribes to the SMS-CSI. If the subscriber subscribes to the SMS-CSI, the MSC server
triggers the SMS-CSI flow. If the subscriber subscribes to the O-CSI but not the SMS-
CSI, and the local office supports the O-CSI SMS by using the software parameters, the
MSC server triggers the O-CSI and sends the Initial-DP message to the SCP.
3. After receiving the Initial-DP message, the SCP determines to prohibit the sending of
short messages, and sends the RELEASE CALL message to the MSC server.
4. After receiving the RELEASE CALL message, the MSC server terminates the MO SMS
flow, and sends the CP_ACK message to the subscriber, indicating that the short
message fails to be sent.
Run MOD MSFP to set whether MSOFTX3000 supports the O-CSI SMS. Configure the
parameter as follows:
Bit 6 of P650 (MAP part2 software parameter 1)
The bit is used as a function switch to control whether the MSOFTX3000 supports the
O-CSI SMS. The value options are:
− 0: No.
− 1: Yes.
− The default value is 0.
CALLEDBCDNUMPA Called Party BCD The type of called number entered in the
RTY Number Type INITIAL-DP message.
The value options are:
z CALLEDPARTY (the called number of
the short message)
z SMCADDR (the SMC number)
z In the O-CSI SMS flow, the CAMEL version (which is the value of CAMEL Version in the
preceding table) in the INITIAL-DP message must not be higher than the CAMEL version
configured in the local MSC server.
z The CAMEL versions supported by the local office can be queried by LST MAPACCFG.
z In the O-CSI SMS flow, IDP location number must be configured. IDP location number is
configured by ADD LAISAI (3G) or ADD LAIGCI (2G).
z In a 2G network, use ADD LAIGCI to configure the IDP location number (LOCATIONNUM).
z In a 3G network, use ADD LAISAI to configure the IDP location number (LOCATIONNUM).
z Note the difference between IDP location number and Location number name (LOCNONAME).
Location number name is used for enhanced roaming restriction and connection mode sharing.
z If the IDP location number (LOCATIONNUM) is not configured in ADD LAISAI (3G) or ADD
LAIGCI (2G), Location Number in the INITIAL-DP2 message is set to the MSC number of the
local office.
Configuration Script
The configuration steps are as follows
Step 1 Use the function switch to enable the O-CSI SMS.
Description Configure the location number of the location area. The location number is
required in the Initial-DP message.
Script ADD LAISAI: SAI="460510001", MSCN="86139075511",
VLRN="86139075511", LAICAT=LAI, LAIT=HVLR, RNCID1=0,
CSNAME="A", LOCATIONNUM="1111111111111111";
ADD LAIGCI: GCI="460510002", MSCN="86139075511",
VLRN="86139075511", LAICAT=LAI, LAIT=HVLR, BSCDPC1="C1",
CSNAME="A", LOCATIONNUM="2222222222222222";
Remark The location number for the 3G location area is configured by ADD
LAISAI, and the location number of the 2G location area is configured by
ADD LAIGCI.
Description Configure the location number of the cell. The location number is required
in the Initial-DP message.
Script ADD LAISAI: SAI="4605100010001", MSCN="86139075511",
VLRN="86139075511", LAICAT=SAI, LAIT=HVLR, RNCID1=0,
CSNAME="B", LOCATIONNUM="1111111111111111";
ADD LAIGCI: GCI="4605100020001", MSCN="86139075511",
VLRN="86139075511", LAICAT=GCI, LAIT=HVLR, BSCDPC1="C1",
CSNAME="B", LOCATIONNUM="2222222222222222";
Remark The location number for the 3G cell is configured by ADD LAISAI, and
the location number of the 2G cell is configured by ADD LAIGCI.
----End
SM Over Contains multiple records about the IMSI prefix and ADD SMOCSI
OCSI corresponding CAMEL short message processing
Process information, such as the CAMEL service key,
table CAMEL version, and called number type.
3G/2G LAI Contains multiple records about the location area or ADD LAISAI
or SAI/GCI cell (GCI for 2G and SAI for 3G). The parameter ADD LAIGCI
Information related to the O-CSI SMS is the Initial-DP location
table number corresponding to the location area or cell.
Figure 26-5 Procedure for querying the table to obtain the O-CSI SMS processing information
Yes
Yes
To obtain the INITIAL-DP location number of the location area or cell to trigger the O-CSI
and generate the INITIAL-DP message, carry out the procedure shown in Figure 26-6 to
query the LAI Information table based on the location area or cell.
Figure 26-6 Procedure for querying the table to obtain the location number in the INITIAL-DP
message
Input location area or location area
cell
Yes
Yes
Provision
The steps of the operation are as follows:
Step 1 On the MSOFTX3000 LMT, run LST MSFP to list the value of bit 6 of software parameter
650 that controls whether to enable the O-CSI SMS.
Step 2 On the MSOFTX3000 LMT, run MOD MSFP. Set bit 6 of software parameter 650 to 1 to
enable the O-CSI SMS.
----End
Cancellation
The steps of the operation are as follows:
Step 1 On the MSOFTX3000 LMT, run LST MSFP to list the value of bit 6 of software parameter
650 that controls whether to enable the O-CSI SMS.
Step 2 On the MSOFTX3000 LMT, run MOD MSFP. Set bit 6 of software parameter 650 to 0 to
disable the O-CSI SMS.
----End
Register
The steps of the operation are as follows:
Step 1 On the HLR SMU Client, run MOD OCSI to subscribe to the O-CSI for the subscriber. Set
PROV to True.
Step 2 On the MSOFTX3000 LMT, run ADD SMOCSI to configure the O-CSI SMS processing
information.
----End
Erase
The steps of the operation are as follows:
Step 1 On the HLR SMU Client, run MOD OCSI to remove the subscribed O-CSI. Set PROV to
False.
Step 2 On the MSOFTX3000 LMT, run RMV SMOCSI to remove the O-CSI SMS processing
information.
----End
26.7.2 CDR
The CDRs of O-CSI short messages are the same as those of MO-SMS-CSI short messages.
Table 26-11 interactions between the O-CSI SMS and other services
Service Interaction
O-CSI SMS and The O-CSI SMS is embedded in the MO SMS. If the conditions are
MO SMS met, the O-CSI SMS is triggered during the MO SMS flow.
O-CSI SMS and If a subscriber subscribes to the MO-SMS-CSI and both the MAP
MO-SMS-CSI version and the CAMEL version supported by the local office are
higher than 3, the MO-SMS-CSI is valid, but the O-CSI SMS is not.
O-CSI SMS and No interaction between them. The O-CSI SMS is used only in the MO
MT-SMS-CSI SMS.
26.10 Reference
26.10.1 Specifications
The references of the O-CSI SMS are as follows:
z 3GPP TS 03.78, "Customised Applications for Mobile network Enhanced Logic
(CAMEL) Phase 2;Stage 2"
26.11 FAQ
Symptom
A subscriber subscribes to the O-CSI, but the O-CSI SMS is not triggered in the MO SMS
flow.
Troubleshooting
To troubleshoot the problem, perform the following steps:
Step 1 Check whether the O-CSI SMS is enabled on the local office. If it is disabled, run MOD
MSFP to enable it.
Step 2 Check whether the O-CSI SMS processing information is configured on the local office. If it
is not configured, run ADD SMOCSI to configure the data.
Step 3 Check whether the service key in the O-CSI SMS processing information is the same as the
service key subscribed by the subscriber. If not, run MOD SMOCSI to modify the service
key.
Step 4 Check whether the values of CAMEL Version and Called Party BCD Number Type in the
O-CSI SMS processing information configured on the local office are valid. If the values are
invalid, run MOD SMOCSI to modify the values. The value of CAMEL Version must be
set based on the configuration of the CAP interface of the local office.
----End
Contents
Figures
Figure 27-1 Call flow when a narrowband trunk connects to a BICC trunk ....................................................27-4
Figure 27-2 Call flow when a narrowband trunk connects to a narrowband trunk (crossing multiple IP gateways)
...........................................................................................................................................................................27-5
Figure 27-3 Call flow when the access side connects to a BICC trunk (TS61)................................................27-6
Figure 27-4 Call flow when the access side connects to a narrowband trunk (crossing multiple IP gateways)27-7
Figure 27-5 Call flow when the access side connects to a BICC trunk (TS62)................................................27-8
Figure 27-6 Service flow when a narrowband trunk connects to a BICC trunk (voice service switching to fax
service) ............................................................................................................................................................27-10
Figure 27-7 Service flow when a narrowband trunk connects to a narrowband trunk (crossing multiple IP
gateways) (TS61) ............................................................................................................................................ 27-11
Figure 27-8 Service flow when the access side connects to a BICC trunk (using IP bearer between offices)
(TS61) .............................................................................................................................................................27-13
Figure 27-9 Service flow when the access side connects to a BICC trunk (TS62) ........................................27-14
Tables
Section Describes
27.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
27.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
27.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
27.4 Service Flow The flow of the service.
27.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
27.6 Performance The operations that carrier and mobile subscribers must
Measurement perform when the service is provided.
27.7 Service Interaction The association between the service and other services as
well as the restrictions on each other.
27.8 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
27.9 FAQ The frequently asked questions related to the service and
the solutions.
27.1.2 Definition
The user plane (UP) header redundancy service is designed to solve the undesirable effects in
some data services (such as poor quality or even failure in faxing) caused by unreliable data
transmission over IP bearer networks. Based on RFC 2198, the service uses the free bytes in
voice packets (such as G.711A/U) to transmit redundancy packets. This reduces the chances of
successive packet losses and improves the reliability in data transmission.
27.1.3 Benefits
Beneficiary Description
Carriers More reliable data services like fax and video call can be implemented
on IP bearer networks.
Subscribers A subscriber can gain better experience in fax and video call, and the
services are more reliable.
27.2 Availability
27.2.1 Requirements for NEs
Table 27-2lists the network elements (NEs) required to implement the UP header redundancy
service.
- - - √ √ - - -
Table 27-3 Versions of the Huawei GSM/UMTS products that support the UP header redundancy
service
27.2.4 Others
None.
The narrowband trunk mentioned in this document refers to an ISUP trunk and a TUP trunk.
Figure 27-1 Call flow when a narrowband trunk connects to a BICC trunk
4 MSC
MSC
Server A Sever B
2 3 5
1 6 7
MGW A MGW B
PSTN A PSTN B
In the above figure, the signaling between PSTN A and MSC server A, PSTN B and MSC server B is
narrowband signaling, while that between MSC server A and MSC server B is BICC signaling.
Figure 27-2 Call flow when a narrowband trunk connects to a narrowband trunk (crossing
multiple IP gateways)
MSC Server
3 3
1 MGW A MGW B 5
PSTN A
PSTN B
In the above figure, the signaling between PSTN A and the MSC server, and that between PSTN B and
the MSC server is narrowband signaling.
Figure 27-3 Call flow when the access side connects to a BICC trunk (TS61)
2 5
1
4
MGW A MGW B
UE A UE B
In the preceding figure, the signaling between MSC server A and the MSC server B is BICC signaling.
Figure 27-4 Call flow when the access side connects to a narrowband trunk (crossing multiple IP
gateways)
2 2
1 3
IP TDM
UE A FAX USER
In the preceding figure, the signaling between the VMSC server and the GMSC Server is narrowband
signaling.
Figure 27-5 Call flow when the access side connects to a BICC trunk (TS62)
MSC Sever A
MSC Sever B
3
6
8
2 5
4
1
7
MGW A MGW B
UE A UE B
Figure 27-6 Service flow when a narrowband trunk connects to a BICC trunk (voice service switching to fax service)
MGW A MGW B
2: Notify Rep
3: Modify Req
4: Modify Rep
7. MGW A changes the service mode and returns a Reserve Char Rsp message.
8. After receiving the Reserve Char Rsp message, MSC server A delivers a Confirm Char
message to MGW A.
9. MGW A returns a Confirm Char Rsp message.
10. MGW A sends a Modify Bearer message to MGW B, instructing MGW B to re-initialize
the bearer.
11. MGW B returns a Modify Rep message.
12. MGW A reports to MSC server A that the service mode has been changed to data service
successfully.
13. MSC server A returns a Notify Rep message.
14. MSC server A sends an APM message to MSC server B, indicating that the modification
is successful.
Figure 27-7 Service flow when a narrowband trunk connects to a narrowband trunk (crossing multiple IP gateways)
(TS61)
1: ISUP:IAM
6: ISUP:ACM
7: ISUP:ACM
8: ISUP:ANM
9: ISUP:ANM
Access Side Connecting to BICC Trunk (Using IP Bearer Between Offices) (TS61)
Figure 27-8 shows the service flow when the access side connects to a BICC trunk and IP
bearer is used between offices (TS61).
Figure 27-8 Service flow when the access side connects to a BICC trunk (using IP bearer between offices) (TS61)
MSC MSC
UE A MGW A MGW B UE B
Server A Server B
1:modify
7:Modify
8:Modify
Complete
9:Confirm Char
Req
10:Confirm Char
Rsp
11:APM(Success
Codec Modify)
12:Modify
Complete
13:Fax
Proceeding
Figure 27-9 Service flow when the access side connects to a BICC trunk (TS62)
MSC MSC
UE A MGW A MGW B UE B
Server A Server B
1: Setup
2: Add Request
3: Add Reply
4: IAM (With
2198 Codec)
5: Paging
6: Paging
Response
7: Add Request
10: Bearer
Estiblish
11:alerting/ACM
12:Connect/ANM
13:Fax
Proceeding
4. MSC server A sends an IAM message to MSC server B. The message specifies that the
service type is data service. The Codec List of the message contains 2198 redundancy
parameters, which indicate that the local end supports 2198 redundancy.
5. MSC server B sends a paging message to locate UE B.
6. UE B responds with a message.
7. MSC server B sends an Add_Request message to MGW B. The message carries 2198
redundancy parameters.
8. MGW B returns an Add Reply message to MSC server B.
9. MSC server B sends an IAM message to MSC server A. The Codec List of the message
carries 2198 redundancy parameters, which indicate that MSC server B also uses 2198
redundancy mode to transmit data.
10. The bearer between MGW A and MGW B is established.
11. UE B returns an ACM message to UE A, indicating that the call is connected.
12. UE B answers the call.
13. The fax is transmitted between UE A and UE B.
It is one of the parameters used when the MSOFTX3000 interworks with the peer office. It
specifies whether the office in the current office direction supports data redundancy. Data
redundancy is designed to solve the packet loss problem in data transmission. The data
redundancy improves the quality of data transmission and reduces or avoids service failure
due to poor data transmission quality.
z SET OFI
Support FAX detection
This parameter specifies whether the local MSOFTX3000 supports fax detection. The
MOSFTX3000 notifies the MGW to check the fax event. The MGW then reports the checking
events such as fax tone and fax status to the MOSFTX3000, which then handles the event
according to the report.
Note that if the Special attributes for the gateway is set to No fax, the call may fail.
Support 2198 redundancy
This parameter specifies whether the local MSOFTX3000 supports 2198 redundancy. This
function is supported by default. If you choose Support, configure the 2198 redundancy
parameters. In implementing this function, the MSOFTX3000 delivers the 2198 redundancy
parameters to the MGW during a call.
2198 data redundancy is designed to solve the packet loss problem in data transmission. The
2198 data redundancy improves the quality of data transmission and reduces or avoids service
failure due to poor data transmission quality.
2198 redundancy level
As one of the parameters for 2198 data redundancy, this parameter is valid only when
Support 2198 redundancy is set to Support. The parameter is used to specify the 2198
redundancy level, which is 1 by default.
2198 redundancy payload type value
As one of the parameters for 2198 data redundancy, this parameter is valid only when
Support 2198 redundancy is set to Support. The parameter is used to specify the 2198
redundancy payload type value, which ranges from 96 to 127 and defaults to 97.
2198 redundancy codec type
This parameter is valid only when Support 2198 redundancy is set to Support. It is used to
specify the codec type for 2198 redundancy, either G.711u or G.711a. The default is G.711a.
z ADD CODECCFG
Codec ID
This parameter defines a codec ID in the configuration database of the MSOFTX3000. The ID
ranges from 0 to 254.
PAYLOAD TYPE
It is a parameter of the H248 signaling used when the MSOFTX3000 interacts with the MGW.
The default value is 96. You can refer to RFC 1890 for the mapping between a Codec and its
payload type.
Note that the value must not be the same as the value of 2198 redundancy payload type
value in the Basic Local Info table.
PACKET TIME
It is a parameter of the H248 signaling used when the MSOFTX3000 interacts with the MGW.
CLOCK RATE
It is a parameter of the H248 signaling used when the MSOFTX3000 interacts with the MGW.
Notes
Note the following during your configuration:
z You must enable 2198 redundancy support and fax detection in the local office
information table.
z You must not set Special attributes in the MGW configuration table to No fax.
z You must enable 2198 redundancy support and TrFO negotiation support in the BICC
office direction table.
z The payload type of 2198 redundancy in the local office information table must not be
the same as that in the codec configuration table.
Configuration Scripts
Follow these steps to configure the MSOFTX3000, assuming that the related tables have not
been configured.
Step 1 Configure the Basic Local Info table.
Description Configure the information tables for the local office. Enable fax detection
and redundancy support. Set the payload type to 97, the redundancy level
to 2, the redundancy codec to G.711A.
Description Configure the codec configuration table, and add virtual redundancy codec
parameters. The codec ID is set to 82, the payload type to 96, the
packetization time to 5 and the clock rate to 8000.
Description Modify the BICC office direction by setting BICC support TrFO to Yes
and BICC support red to Yes.
Script MOD OFC: ON="xxx", SUPTTRFO=YES, IFSUPPORTRED=YES;
Remark None.
Remark Modify the software parameters so that audio services with the bearer
service type of 3.1K are considered as data services.
----End
Description Configure the codec capability on the gateway to support NGN codec
capabilities.
Script SET CODECCAP: BN=XXX, CODEC=NGN-1;
Remark None.
----End
27.8 Reference
27.8.1 Specifications
z 3GPP TS 23.153, "Out of band transcoder control, V4.a.0".
z IETF RFC 2198, "RTP Payload for Redundant Audio Data"
2198 A mechanism developed based on RFC 2198, which uses voice packets to
redundancy transmit data services and increases reliability by providing redundancy
transmission.
27.9 FAQ
None.
Contents
Figures
Tables
Section Describes
28.1 Feature Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
28.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
28.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
28.4 Service Flow The flow of the service.
28.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
28.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
28.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
28.8 Interaction with Other The association between the service and other services as
Services well as the restrictions on each other.
28.9 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
Dual-homing WMFD-160500
VDB dynamic data backup WMFD-164400
Concept Description
Backup capacity To ensure the backup capacity of a standby MSC server, the data of
backup subscribers is stored by means of compression in the standby
server. Each standby MSC server can store the data of 2,000,000
backup subscribers, and the whole office supports 20,000,000 backup
subscribers.
The VDB supports up to 200,000 subscribers. Therefore, each VDB
decompresses only 200,000 subscribers and deletes excessive
subscribers and subscribers of other offices.
Each MSC server supports backup of 20,000,000 subscribers and
takes over the service of backup subscribers in an office only.
Operator This function helps to avoid the impact on the A/IU/C/D interface of
the system after dual-homing switchover so that the dual-homing
switchover can be more secure and effective. It provides more reliable
assurance for remote dual-homing disaster recovery.
Mobile subscriber None.
subscriber data in other active MSC servers is deleted, that is, the standby server can take over
the subscriber data of one active server only.
28.2 Availability
28.2.1 Requirements for NEs
VDB Dynamic Data Backup can be and is only performed in the mutual-aid MSC/VLR. The
requirements for NEs are listed in Table 28-3.
Table 28-3 NEs required for the VDB dynamic data backup
UE Node RNC MSC MGW SGSN GGSN HLR
B server
- - - √ - - - -
Backup link
Master Channel
Slave Channel
Slave Channel
N+1 backup networking means dual-homing networking at the MSC server layer using N+1
MSOFTX3000s, N of which are active and the other one is standby for these N
MSOFTX3000s. The typical networking diagram is shown in Figure 28-2. In this networking
scheme, each active MSC server VLR must back up user data to the standby MSC server and
the standby MSC server must back up user data back to the said active MSC server after it
takes over the service. For this purpose, each MSC server and the standby MSC server shall
have one or two dual-homing backup link(s).
Node 1 Node 2
4. The backup server saves the subscriber data and acknowledges backup success.
Change of non-subscription data, such as location information, handset on/off status, and
authentication data are backed up through normal backup task, where data change is directly
sent to the backup server.
VDB dynamic backup is built on M3UA links, which ensures backup reliability. Each backup
message is confirmed by acknowledgement. If active server fails to receive backup success
message from standby server, it repeats the backup task every 100s. If it still fails after five
repeats, it sends backup failure alarm.
VDB dynamic data backup supports 1+1 mutual-aid and N+1 mutual-aid networking. This is
the same as dual-homing mutual-aid networking.
Real-time initialization is configured through SET DHBKPCFG. The backup method in real-time
initialization is not applicable to N+1 mutual-aid. In the standby MSC, Real time initialize backup
data in the Dual Home Backup Configuration table is invalid. The standby MSC saves backup
subscriber data in compressed format.
A_LU_REQUEST
MAP_UPDATE_LOCATION_REQ
PVLR
MAP_CANCEL_LOCATION
MAP_CANCEL_LOCATION ack
MAP_INSERT_SUBSCRIBER_DATA
MAP_INSERT_SUBSCRIBER_DATA ack
MAP_UPDATE_LOCATION ack
A_LU_CONFIRM
1. When HLR goes to front VLR to cancel location registration, if front MSC/VLR
supports VDB dynamic backup, then the front VLR registers synchronized deletion task,
deleting the backup data in its standby MSC server.
2. When HLR inserts subscription data, VLR will register two backup tasks: "Dirty"
backup task and complete backup task. "Dirty" backup is similar to real-time backup;
therefore, when subscriber data changes, the standby MSC server can sense and record
the change of subscriber data at once.
DHBKP_DIRTY_REQ
DHBKP_DIRTY_RSP
DHBKP_ALL_DATA_REQ
DHBKP_ALL_DATA_RSP
Data dictionary is configured through ADD/MOD/RMV/LST USRDD and SET USRDDVER. These
two commands are implicit commands. Generally modifying data dictionary gives rise to fatal disaster
and is not allowed. If you want to customize the backup through data dictionary, contact Huawei
engineers.
DHBKP_LOC_INFO_REQ
DHBKP_LOC_INFO_RSP
DHBKP_STATUS_INFO_REQ
DHBKP_STATUS_INFO_RSP
1. The active MSC server sends subscriber status information (including only IMSI
attach/detach status at present) to the standby MSC server through a
DHBKP_STATUS_INFO_REQ message.
2. Upon receiving the DHBKP_STATUS_INFO_REQ, the standby MSC server updates
the subscriber status information and returns a DHBKP_STATUS_INFO_RSP message,
indicating backup success.
3. Upon receiving the DHBKP_STATUS_INFO_RSP, the active MSC server completes
the status information backup and continues to process other backup tasks of the
subscriber.
DHBKP_AUTH_SET_REQ
DHBKP_AUTH_SET_RSP
Subscriber data deletion due to VDB distribution parameter change will not delete the backup
subscriber data.
DHBKP_DELETE_SUB_REQ
DHBKP_DELETE_SUB_RSP
flows, if the called party is a backup subscriber and switches off the phone, paging is
delivered. If paging fails, it is not regarded as unavailable but is processed as OFF status. For
example, announcement is played as in power-off status; PRN pre-paging replies "HLR
subscriber is turned off"; for short messages the system prompts that the handset of the
subscriber is powered off. Next time when the subscriber is called, no more paging is made.
Bit 0 of software parameter 1151 controls MT flow optimization. When bit 0 of the software
parameter is set to "1", only one global paging is delivered to the backup subscriber. When bit
0 of the software parameter is set to "0", subscriber paging is processed according to the
original paging control table. By default, bit 0 of the software parameter is set to "0".
SET DHBKPCFG It is used to configure the dual-homing backup function and set
backup related parameters.
LST DHBKPCFG It is used to query the configuration data of dual-homing
backup.
----End.
28.5.4 Example
Scenario Description
The 1 + 1 mutual-aid networking scheme is used for a dual-homing office. The two mutual-
aid MSC servers are MSCA and MSCB, and are configured with a dual-homing function. The
signaling point codes for the domestic active network of MSCA and MSCB are 3A1106 and
3A1108 respectively. The Dual-homing Server Node table is configured.
Description Set dual-homing backup configuration. Set Support dual home backup to
Yes.
Step 2 Configure the backup function for a dual-homing node in the local office.
Description Modify a dual-homing Server node. Configure the dual-homing node of the
local office to support backup of subscribers.
Script MOD SRVNODE: SN="LOCAL", DHBKPUSER=SUPPORT;
Remark By default, the system does not support backup of subscribers of the local
server node.
Remarks By default, the system does not support backup of subscribers of the local
server node.
Description Add an M3UA local entity. Set Signaling point code of local entity to
3A1106, and Local entity type to Application server.
Script ADD M3LE: LENM="LOCAL_BAK", OPC="3A1106", LET=AS;
Description Add an M3UA destination entity. Set Signaling point code of destination
entity to 3A1108, Destination entity type to Application server, and
Network mode to Shared SPC.
Script ADD M3DE: DENM="MSCB_BAK", LENM="LOCAL_BAK",
DPC="3A1108", DET=AS, NM=INCLUSIVE;
Remarks Destination entity type must be set to Application server. Adjacent flag
must be set to True, and Network mode must be set to Shared SPC.
Step 7 Add an M3UA link set between the local office and the mutual-aid office MSCB.
Step 8 Add an M3UA link between the local office and the mutual-aid office MSCB.
Description Add an M3UA link. Set WBSG module number to 135 and Client/Server
mode to Server side.
Script ADD M3LNK: MN=135, LNKNM="MSCB_BAK",
LOCIP1="192.168.0.252", LOCPORT=7000, PEERIP1="192.168.0.253",
PEERPORT=7000, CS=S, LSNM="MSCB_BAK", QoS=TOS;
Remark One or more links can be configured for an M3UA link set.
Step 9 Add an M3UA route between the local office and the mutual-aid office MSCB.
Description Add the backup route configuration to the mutual-aid office MSCB.
Remark It is recommended to add two backup routes for the destination server node
to be configured.
---End.
Description Set dual-homing backup configuration. Set Support dual home backup to
Yes.
Remarks By default, the system does not support dual-homing backup. To enable
this function, this command must be executed.
Step 2 Configure the backup function for a dual-homing node in the local office.
Description Modify a dual-homing server node: Make the dual-homing node in the
local office support backup of subscribers through setting.
Script MOD SRVNODE: SN="LOCAL", DHBKPUSER=SUPPORT;
Remark By default, the system does not support backup of subscribers of the local
server node.
Remark By default, the system does not support backup of subscribers of the local
server node.
Description Add an M3UA local entity. Set Signaling point code of local entity to
3A1108 and Local entity type to Application server.
Script ADD M3LE: LENM="LOCAL_BAK", OPC="3A1108", LET=AS;
Description Add an M3UA destination entity. Set Signaling point code of destination
entity to 3A1106, Destination entity type to Application server, and
Network mode to Shared SPC.
Script ADD M3DE: DENM="MSCA_BAK", LENM="LOCAL_BAK",
DPC="3A1106", DET=AS, NM=INCLUSIVE;
Remark Destination entity type must be set to Application server. Adjacent flag
must be set to True, and Network mode must be set to Shared SPC.
Step 7 Add an M3UA link set between the local office and the mutual-aid office MSCA.
Description Add an M3UA link set: Set the work mode to IPSP.
Step 8 Add an M3UA link between the local office and the mutual-aid office MSCA.
Description Add an M3UA link. Set WBSG module number to 135 and Client/Server
mode to Client side.
Script ADD M3LNK: MN=135, LNKNM="MSCA_BAK",
LOCIP1="192.168.0.253", LOCPORT=7000, PEERIP1="192.168.0.252",
PEERPORT=7000, CS=C, LSNM="MSCA_BAK", QoS=TOS;
Remark One or more links can be configured for a backup link set.
Step 9 Add an M3UA route between the local office and the mutual-aid office MSCA.
Description Add the backup route configuration to the mutual-aid office MSCA.
Remark It is recommended to add two backup routes for the destination server node
to be configured.
---End.
For the active MSC server, the operation result shows the progress of current backup,
including the following:
z Number of all subscribers
z Number of backup subscribers
z Number of subscribers acknowledged by the HLR
z Progress percentage
z Subscriber data compression failures
z Number of complete backup subscribers
For the standby MSC server, the operation result shows the number of backup subscribers
who are served by the active VMSC, and the number of subscribers acknowledged by the
HLR.
28.9 Reference
28.9.1 Specifications
None.
Contents
Figures
Tables
Table 29-4 NEs required for role-based and domain-based management feature ............................................29-7
Table 29-5 Versions applicable to role-based and domain-based management feature ....................................29-8
Section Describes
29.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
29.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
29.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
29.4 Service Flow The flow of the service.
29.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
29.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
29.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
29.8 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
29.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
29.10 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
Section Describes
29.11 FAQ The frequently asked questions related to the service and
the solutions.
29.1.2 Definition
The role-based and domain-based management feature assigns different operation authority to
different operators through domains, hence controlling the operator's operations on the
system resources (for example, running ADD/MOD/RMV/LST).
The concepts related to the role-based and domain-based management feature are resources,
domains, operators, and relationship between domain and resource.
The role-based and domain-based feature is implemented to meet the requirement of multi-area network
management. Therefore, the feature is called multi-area network role-based and domain-based
management.
Resources
Resources are physical entities or logical entities used by the system, such as office directions,
MSC, signaling points, office direction number, route numbers, number segments, trunk
circuits, and MGW.
Resources are classified into private domain resources, non-domain resources, and public
domain resources, as listed in Table 29-2.
Domain
A domain is a set of resources. Domains are classified into public domains and private
domains. An instance of a resource can belong to the public domain or a private domain, or
neither the public domain nor a private domain. The instance cannot belong to multiple
domains.
A domain is classified into the following:
z Public domain
The public domain exists by default, and its corresponding domain index is 0 and
domain name is "PUBLIC". The public domain cannot be added, deleted, or modified.
Resources without requirement for authority-base domain-based management belong to
the public domain by default.
z Private domain
A private domain is added by administrators on the M2000. The private domain is
numbered from 1. ADD/RMV/MOD/LST commands are available to operators.
Operators
The operators of the MSOFTX3000 are classified into the following:
z Administrator
z Operator
z User
z Guest
z Custom
The domain users of the M2000 are classified into the following:
z Administrator
z Operator
z Guest
You can add a local operator on the MSOFTX3000 LMT by running ADD OP, and can also
add a domain operator on the M2000 client. On the M2000 client, you can assign domains to
which each operator belongs. An operator can belong to the public domain or a private
domain. An operator belongs to only one domain and a domain can have multiple operators.
The domain is an attribute of the operators. You can modify the domain attributes of the
operators. Operators without a specified domain belong to the public domain by default.
An operator's operation authority on a domain is classified into full control and read-only. Full
control includes modify and read rights. Modify means to modify static attributes and
dynamic attributes. Modifying static attributes means to add, delete, and modify static data.
Modifying dynamic attributes refers to maintenance operations that change host status, such
as activating, deactivating, and blocking. Read-only right includes query (LST and DSP
operations) and reference.
z You can add a domain before adding an operator, or add an operator before adding a domain.
z When no domain is specified for a new operator, that operator belongs to the public domain by
default.
z If an operator has no authority to specify the domain attributes of a resource, the resource
added by the operator automatically belongs to the domain of the operator.
In principle, public domain operators have full control authority on global resources including
public domain resources and private domain resources. Their operations on the resources only
depend on the command execution authority of the operators (existing command group
authority of the operators). Private domain operators have read-only authority on public
domain resources and other private domain resources, and have full control authority on
resources in the domain to which the operators belong. A super administrator belongs to the
public domain by default. You are not allowed to assign a super administrator to a private
domain. The relationship between domains and resources is shown in Figure 29-1.
Public
Resources domain
Private Private
domain 1 domain 3
Private Private
domain 2 domain n
29.1.5 Benefits
The benefits are listed in Table 29-3.
Beneficiary Description
29.2 Availability
29.2.1 Requirements for NEs
Role-based and domain-based management feature requires MSC server and M2000. The
NEs required for this feature is listed in Table 29-4.
Table 29-4 NEs required for role-based and domain-based management feature
- - - √ √ - - - -
29.2.4 Others
None.
Resources are used in the principle of "Creator owns". The ownership and operation authority
of a resource are marked by domain. The resources created by an operator belong to the
domain of that operator. All operations on resources must pass the match check between the
domain authority of the operator and the domain of the resource. If the operator has no
authority to access the domain, the operation cannot proceed.
M2000/LMT BAM
Add/MOD/LST/RMV
domains
The system does not perform domain authority matching check for commands such as ADD.
6. The database returns the execution result.
z The domain name can contain 1–30 characters. The system does not support any special character
except an underline.
z You can select NEs and users under NE List and User List to bind them to the local network
domain. In this manner, users can perform operations on data of the NEs.
----End
----End
Before managing NEs in the local network domain, ensure that the NEs added to or removed
from a domain are connected to the M2000.
To manage NEs in the local network domain, perform the following steps:
Step 1 Choose Configuration > Domain Management.
Step 2 Select a domain under the Domain node in the navigation tree on the left side or under NE
List. Right-click the domain and choose Bind NE, or click Bind NE.
A Bind NE dialog box is displayed as shown in Figure 29-5.
If the NEs are not connected to the M2000, the NEs cannot be bound to the domain.
Step 3 Under NE List, select or clear NEs that are to be bound to the domain.
Step 4 Click OK.
----End
Step 2 Modify the domain name with one of the following methods:
z Method 1
1. In the Domain navigation tree on the left side, select a domain.
2. Right-click the domain and choose Rename.
A Rename Domain dialog box is displayed as shown in Figure 29-6.
3. In the Please Input Domain Name: text box, enter a new name.
4. Click OK.
z Method 2
1. Under Domain List on the right side, select a domain.
2. Right-click the domain and choose Rename, or click Rename.
A Rename Domain dialog box is displayed as shown in Figure 29-6.
3. In the Please Input Domain Name: text box, enter a new name.
4. Click OK.
If the NEs in the domain are not connected to the M2000, after you modify the local network domain
name, the data of the M2000 is not the same as that of the NEs. After the NEs are connected to the
M2000, select the NE whose Synchronized State is Different under NE List. Right-click the NE and
choose Synchronize. Then the domain name on the M2000 is the same as that on the NE.
----End
----End
If the NEs in the domain are not connected to the M2000, the domain cannot be deleted.
Deleting Users
Log in to the M2000 as an administrator.
To delete a user, perform the following steps:
Step 1 On the M2000 Client, choose System > Security Management.
Step 2 Select a user under the User node in the navigation tree on the left side or in the detail list on
the right side. Right-click the user and choose Delete.
----End
Step 1 On the M2000, add an operator named USER01 and a domain named DOMAIN01, and bind
the operator to the domain. For details, see section 29.5.2 "Data Configuration on the
M2000."
Description On the M2000, add an operator named USER01 and a domain named
DOMAIN01, and bind the operator to the domain.
Script For details, see section 29.5.2 "Data Configuration on the M2000."
Description On the MSOFTX3000 LMT, run ADD CNACLD and set Domain to
PUBLIC.
Step 4 On the MSOFTX3000 LMT, run ADD CNACLD and set Domain to DOMAIN02.
Description On the MSOFTX3000 LMT, run ADD CNACLD and set Domain to
DOMAIN02.
Script ADD CNACLD: PFX=K'13907283, CSTP=NEW, MINL=5, MAXL=32,
DMNAME="DOMAIN02";
Remark The operation fails. The reason is that the operator of the private domain
DOMAIN01 cannot add a call prefix with a DOMAIN02 domain attribute.
Step 5 On the MSOFTX3000 LMT, run ADD CNACLD and set Domain to DOMAIN01.
Description On the MSOFTX3000 LMT, run ADD CNACLD and set Domain to
DOMAIN01.
Script ADD CNACLD: PFX=K'13907283, CSTP=NEW, MINL=5, MAXL=32,
DMNAME="DOMAIN01";
Step 6 On the MSOFTX3000 LMT, run ADD CNACLD and set Domain to DOMAIN03 (not
exists).
Description On the MSOFTX3000 LMT, run ADD CNACLD and set Domain to
DOMAIN03.
Remark The operation fails. The reason is that the operator of the private domain
DOMAIN01 cannot add a call prefix of the domain that does not exist.
Step 7 On the MSOFTX3000 LMT, run ADD CNACLD and do not set Domain.
Description On the MSOFTX3000 LMT, run ADD CNACLD and do not set Domain.
Step 8 On the MSOFTX3000 LMT, run MOD CNACLD and set Domain to PUBLIC.
Description On the MSOFTX3000 LMT, run MOD CNACLD and set Domain to
PUBLIC.
Script MOD CNACLD: P=0, PFX=K'12345678, DMNAME="PUBLIC";
Remark The operation fails. The reason is that the operator of the private domain
cannot modify public domain resources.
Step 9 On the MSOFTX3000 LMT, run MOD CNACLD and set Domain to DOMAIN02.
Description On the MSOFTX3000 LMT, run MOD CNACLD and set Domain to
DOMAIN02.
Remark The operation fails. The reason is that the operator USER01 of the private
domain DOMAIN01 cannot modify the domain attribute of the specified
resource to another private domain DOMAIN02.
Step 10 On the MSOFTX3000 LMT, run MOD CNACLD and set Domain to DOMAIN01.
Description On the MSOFTX3000 LMT, run MOD CNACLD and set Domain to
DOMAIN01.
Description On the MSOFTX3000 LMT, run RMV CNACLD and set Call prefix to
13907285. The call prefix 13907285 belongs to DOMAIN01.
Remark The operation fails. The reason is that the operator USER02 of the domain
DOMAIN02 cannot remove the call prefix of the private domain
DOMAIN01.
Description On the MSOFTX3000 LMT, run RMV CNACLD and set Call prefix to
12345678. The call prefix 12345678 belongs to the PUBLIC domain.
Script RMV CNACLD: PFX=K'12345678;
Remark The operation fails. The reason is that the operator USER02 of the domain
DOMAIN02 cannot remove the call prefix of the PUBLIC domain.
Description On the MSOFTX3000 LMT, run RMV CNACLD and set Call prefix to
13908625. The call prefix 13908625 belongs to the DOMAIN02 domain.
Remark The operation is successful. The reason is that the operator USER02 of the
domain DOMAIN02 can remove the call prefix of the domain
DOMAIN02.
----End
29.10 Reference
29.10.1 Specifications
None.
29.11 FAQ
None.
Contents
Figures
Figure 30-1 Processing of the NEs for the alarm for malicious short messages service ..................................30-5
Figure 30-2 Process of the alarm for malicious short messages.......................................................................30-6
Tables
Table 30-1 Function code of the alarm for malicious short messages function ................................................30-2
Table 30-2 Benefits of the alarm for malicious short messages function .........................................................30-2
Table 30-3 NEs required to implement the alarm for malicious short messages ..............................................30-3
Table 30-4 Versions of the Huawei CS products that support the alarm for malicious short messages ...........30-3
Table 30-5 Commands involved in the alarm for malicious short messages ....................................................30-7
Section Describes
30.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
30.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
30.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
30.4 Service Flow The flow of the service.
30.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
30.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
30.7 Service Interaction The association between the service and other services as
well as the restrictions on each other.
Table 30-1 Function code of the alarm for malicious short messages function
Function name Function code
30.1.2 Definition
A malicious short message subscriber refers to the one who sends more short messages than
the preset threshold in a certain period.
The function, alarm for malicious short messages, enables the system to discriminate
malicious short message subscribers by means of alarm according to requirements of carriers.
Based on malicious short message alarms, carriers take corresponding measures on the
malicious short message subscribers.
30.1.5 Benefits
Table 30-2 lists the benefits of the alarm for malicious short messages function.
Table 30-2 Benefits of the alarm for malicious short messages function
Beneficiary Description
It is a basic feature of the MSOFTX3000. Carriers can use it based on actual conditions.
For example, if some subscribers use tools to send a lot of advertising or harassing short
messages to mobile subscribers in the network, the customer satisfaction will be affected. In
this case, carriers can use this feature to find out those subscribers based on alarms, and take
measures to reduce or put an end to such actions to improve customer satisfaction.
30.2 Availability
30.2.1 Requirements for NEs
Table 30-3 lists the network elements (NEs) required to implement the alarm for malicious
short messages.
Table 30-3 NEs required to implement the alarm for malicious short messages
- - - √ - - √ √ √
Table 30-4 Versions of the Huawei CS products that support the alarm for malicious short
messages
30.2.4 Others
None.
Figure 30-1 Processing of the NEs for the alarm for malicious short messages service
No
Time of sending the current short
message - Time of sending the first short
message > Time cost on statistics of
malicious short messages No
No
Whether the MSC sends an
alarm for malicious short
messages
Yes
The MSC sends an alarm
The VLR counts the number of short
for malicious short
messages; the MSC does not send an
messages
alarm for malicious short messages
Table 30-5 Commands involved in the alarm for malicious short messages
No. Action
1 Run the command ADD VLRCFG to add the configuration of VLR (if there is
no data for the configuration of VLR).
2 Run the command MOD VLRCFG to modify the configuration of VLR. Turn on
or turn off the switch of the alarm for malicious short messages and set statistical
duration for originating short messages and the alarm threshold for malicious
short messages.
3 Run the command LST VLRCFG to query the setting of the current alarm for
malicious short messages.
Configure the following parameters for the VLR Configuration Data table:
Hostility short message alarm switch
It is the switch of the alarm for malicious short messages. This parameter is used to set
whether the office supports the alarm for malicious short messages.
When the switch is off, the office does not support this function. When the switch is on, the
VLR scans all subscribers in the office and resets alarm data for each subscriber.
The data of malicious short message alarm includes the time when the first short message is
originated, number of accumulated originating short messages and the alarm flag for
malicious short messages. When resetting data of malicious short message alarm, the system
sets the time when the first short message is originated to "0", number of originating short
messages to "0" and the alarm flag for malicious short messages to "no alarm".
Original short message statistic timer(sec)
It specifies the statistical duration of originated short messages. This parameter is used to set
the length of the time required by the system for collecting statistics of originating short
messages. The start time is the time when the first short message is originated, and the end
time is the time when the current short message is sent. After receiving the statistics sent from
the MSOFTX3000, the VLR makes the following judgment:
z If the difference between the end time and the start time is less than the value of this
parameter, the VLR checks whether the number of accumulated short messages exceeds
the alarm threshold of malicious short message. If not, the VLR does not send an alarm
and continues to count short messages. If yes, the VLR checks whether the alarm for
malicious short messages is sent for the subscriber. If not, the VLR sends an alarm.
Otherwise, the VLR continues to count short messages instead of sending the alarm.
z If the difference between the end time and the start time is greater than the value of this
parameter, the system restarts to count the short messages.
Hostility short message alarm threshold
It specifies the alarm threshold of malicious short messages. This parameter is used to set the
number of short messages that the subscriber is allowed to originate within the statistical
duration of originated short messages. If the number of accumulated short messages sent by a
subscriber exceeds the preset alarm threshold and the system does not send an alarm for
malicious short messages, the system sends an alarm for malicious short messages.
Configuration Scripts
Step 1 Add the configuration of VLR.
Description Add the configuration of VLR. Set the maximum number of subscribers to
50000 and the mobile country code (MCC) to 460.
Remarks The maximum number of subscribers and the MCC are mandatory for
configuration of VLR. If there is no special requirement, use default values
for other parameters.
This step is optional. If the system has executed this step (check through
the command LST VLRCFG), execute step 2 directly.
Step 2 Modify the configuration of VLR and enable the local office to support this feature by setting.
Description Set the configuration data of VLR. Turn on the switch of the alarm for
malicious short messages and set the statistical duration of malicious short
messages to 3600 seconds and the alarm threshold for malicious short
messages to 1000.
Script MOD VLRCFG: SMALM=OPEN, SMTIMER=3600, SMCOUNT=1000;
Step 3 Query the configuration of VLR and view the setting of the malicious short message alarm.
Description View the setting of the alarm for malicious short messages.
----End
Contents
31 Call Simulation.......................................................................................................................31-1
31.1 Service Description ...................................................................................................................................31-2
31.1.1 Function Code..................................................................................................................................31-2
31.1.2 Definition .........................................................................................................................................31-2
31.1.3 System Specifications ......................................................................................................................31-3
31.1.4 Benefits ............................................................................................................................................31-4
31.1.5 Application Scenario ........................................................................................................................31-4
31.1.6 Application Limitations....................................................................................................................31-4
31.2 Availability ................................................................................................................................................31-5
31.2.1 Requirements for NEs......................................................................................................................31-5
31.2.2 Requirements for License ................................................................................................................31-5
31.2.3 Applicable Versions..........................................................................................................................31-5
31.3 Working Principle......................................................................................................................................31-5
31.3.1 Functions of the NEs........................................................................................................................31-5
31.3.2 Internal Processing of the System ....................................................................................................31-8
31.4 Service Flow..............................................................................................................................................31-8
31.4.1 Selection of LAI/GCI and Circuits ..................................................................................................31-8
31.4.2 Handling at the Trunk Side ..............................................................................................................31-9
31.5 Data Configuration..................................................................................................................................31-10
31.5.1 Configuration Description..............................................................................................................31-10
31.5.2 Data Configuration at the MSOFTX3000 Side..............................................................................31-10
31.5.3 Data Configuration at the UMG8900 Side.....................................................................................31-10
31.5.4 Data Configuration Example..........................................................................................................31-10
31.6 Service Management ............................................................................................................................... 31-11
31.6.1 Creating a Call Simulation Task..................................................................................................... 31-11
31.6.2 Message Trace and Logs During the Call Simulation....................................................................31-14
31.6.3 Description of the Shortcut Menu of the Message Output Pane ....................................................31-15
31.6.4 File Saving .....................................................................................................................................31-16
31.6.5 Operations by Carriers ...................................................................................................................31-16
31.7 Charging and CDR ..................................................................................................................................31-17
31.8 Performance Measurement......................................................................................................................31-17
31.9 Service Interaction ..................................................................................................................................31-17
31.10 Reference...............................................................................................................................................31-17
31.10.1 Specifications...............................................................................................................................31-17
31.10.2 Glossary, Acronyms, and Abbreviations ......................................................................................31-17
31.11 FAQ .......................................................................................................................................................31-18
Figures
Tables
Table 31-7 Script for querying the virtual subscriber information.................................................................. 31-11
Table 31-8 Meanings of the message contents ...............................................................................................31-15
Table 31-9 Description of the shortcut menu of the message output pane .....................................................31-15
31 Call Simulation
Section Describes
31.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
31.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
31.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
31.4 Service The flow of the service.
31.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
31.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
31.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
31.8 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
31.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
31.10 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
31.11 FAQ The frequently asked questions related to the service and
the solutions.
31.1.2 Definition
Call simulation refers to the process in which the operator delivers a command to the back
administration module (BAM) through the GUI interface to start the call simulation. After the
BAM responds to the MML command, the table querying process of a specified subscriber
call or trunk call is reported to the local maintenance terminal (LMT) in the form of message
(the tables queried and the query results are included in the message). In this way, the data
flow of the data tables can be monitored to facilitate data analysis for the data check after the
upgrade or for later maintenance.
The MSOFTX3000 supports the call simulation, thus the maintainability of the
MSOFTX3000 is improved and the maintenance cost and workload is reduced. The
MSOFTX3000 supports the following technical features:
z Mobile originated call to local mobile subscriber
z Outgoing call of the local mobile subscriber
z Incoming trunk call
The trunk type is Bearer Independent Call Control (BICC) or Integrated Services Digital
Network User Part (ISUP).
z Trunk call transit
The trunk type is BICC or ISUP.
z Inserting, deleting, and querying mobile subscriber data during the call simulation
z Querying logs of the call simulation
z Saving trace messages of the call simulation
Table 31-1 lists the definitions of the functions.
Call simulation from The call simulation is originated by interface A/Iu to the
interface A/Iu to the trunk trunk BICC or ISUP.
BICC/ISUP
Call simulation from the The call simulation is originated by the trunk BICC or
trunk BICC/ISUP to ISUP to interface A/Iu.
interface A/Iu
Item Specification
Number of the The number of the triggered call simulations is recorded through BAM
call simulations log output. In this way, the impact of the call simulation on the traffic
triggered statistic and the put-through rate is reflected.
Number of z BAM: For all the clients, the maximum number of concurrent call
concurrent call simulations allowed is 64. That is, the BAM can support a maximum
simulations (the of 64 clients to perform call simulation at the same time.
number of call z Host: A subscriber (authentic subscriber or virtual subscriber) can
simulations originates only one call simulation at one time. That is, if a
during a specific subscriber originates a call simulation, the local client or other
time period) clients cannot use the same subscriber to originate another call
simulation before the previous call simulation is terminated.
NOTE
Virtual subscribers are unreal subscribers registered in the VDB during the call
simulation.
Message output As the messages are based on the ASN.1 translation mode, they
of the call support only English.
simulation
Call simulation The call control block (CCB) only outputs the announcement record,
announcement no announcement is played.
Processing of If circuit contention occurs at the trunk side, the call simulation fails.
circuit contention
at the trunk side
Item Specification
31.1.4 Benefits
Beneficiary Description
Carrier During the call simulation, the table querying information, key
information (including software parameters), and the call detailed
records (CDRs) are reported to messages. By analyzing the messages,
the carrier can locate and rectify the fault easily, thus the
troubleshooting process is sped up and the maintainability of the
system is enhanced.
Mobile subscriber None.
31.2 Availability
31.2.1 Requirements for NEs
The call simulation requires the coordination of related NEs.
Table 31-3 lists the NEs related to call simulation.
√ √ √ √ √
command INS MS. The VLR stores the virtual subscribers based on the subscriber data
sent from the BAM. A VDB can store a maximum of 20 virtual subscribers.
z Modifying the subscriber data by using the maintenance command MOD MS
After receiving the command MOD MS, the VDB searches and modifies the data of the
virtual subscriber based on the MSISDN of the virtual subscriber. The data of the virtual
subscriber includes:
− MSC number
− VLR number
− GCI/SAI number
− Caller category
− Roaming subscriber type
z Querying virtual subscribers in the VDB by using the maintenance command DSP MS
You can display all the virtual subscribers in a single VDB by using DSP MS. The
message contains the IMSIs and MSISDNs of all the virtual subscribers.
− If you select query according to the module number, enter the module number.
The system queries the virtual subscribers based on the module number entered.
− If you select query according to the location, enter the location information.
The system queries the virtual subscribers based on the location information entered.
z Querying the basic information of virtual subscribers by using the maintenance
command DSP USRINF
You can query the basic information of a virtual subscriber by using this command.
When a call simulation is triggered, the BAM invokes the maintenance command DSP
USRINF to query the virtual subscriber. If the virtual subscriber is busy, the system
terminates the call simulation.
z Deleting virtual subscribers by using the maintenance command DEL MS
You can delete a virtual subscriber from the local VLR by using this command.
z Storing call simulation logs
The call simulation logs are stored in the BAM installation directory \Msoftx3000\
RUNLOG\SimCall. A maximum of five log files can be stored in this directory. The
maximum size of the log file is 2 MB, and the file name is from Simullation0.txt to
Simullation4.txt.
The contents of the log files are as follows:
z Information of successful/failed trigger of the call simulation
z Information of successful/failed call simulation
The contents of the logs are associated to HANDLE through the workstation number. The
workstation number is used to identify the maintenance terminal, and HANDLE is the number
of the triggering window of the call simulation.
Figure 31-1 shows an example of the BAM log.
If a virtual subscriber that meets requirement already exists in the local VLR, run DSP MS to query the
user information and use the existing virtual subscriber for call simulation.
Configuration Scripts
The configuration of various scripts is as follows:
Table 31-5 lists the script for registering virtual subscriber.
Explanation If one of the following situations occurs, registering virtual subscriber fails.
z The number of subscribers in the local VLR reaches the maximum.
z The number of virtual subscribers in the local VLR reaches the
maximum 20.
z The virtual subscriber to be registered in the local VLR already exists.
Table 31-6 lists the script for changing the virtual subscriber data.
Description Change the MSC where the virtual subscriber with MSISDN
"13907885522" locates to 08601390778000.
Table 31-7 lists the script for querying the virtual subscriber information.
Description Query all the virtual subscribers on the VDB board with module number
"102".
Script DSP MS: IM=MOD, MN=102;
In the operating network, call simulation at the caller side is performed on virtual subscribers
to avoid the impact on the services of the online subscribers.
The call simulation is originated at the A/Iu interface. To create a call simulation task, perform
the following steps:
Step 1 Run LST MDU to query the related module information.
The number of the module where the WVDB board locates is obtained from the output result.
The detailed output result is as shown in Figure 31-2.
Step 2 According to the number of the module where the WVDB board locates, run DSP MS to
query the information of virtual subscribers of the VLR specified by the existing host.
Step 3 Specify the query conditions in Figure 31-3, and then press F9
The information of virtual subscribers is displayed, as shown in Figure 31-4.
Step 4 Click Maintenance, and then double-click Call simulation under the service navigation tree,
as shown in Figure 31-5.
Step 5 Specify related parameters, and then click Start, as shown in Figure 31-6.
----End
Until now, a call simulation task is created and the call simulation starts. The message output
window will display the table query results during the call simulation and the result of the call
simulation. Check the data configuration and location the problem according to the output
table query result.
For the trunk BICC/ISUP incoming call simulation, the calling number can be any number. The called
number, however, are different in different application scenarios.
z If the called side is a trunk, the called number consists of the correct call prefix + any number.
z If the called side is the A/Iu interface, the called number must be the number of a real subscriber.
Run LST CNACLD to obtain the prefix.
Table 31-8 describes the meanings of the contents contained in the message.
Message Meaning
TABLE It indicates the name of the table queried during the call simulation.
For example, in Figure 31-7, the table name is BICC-Trunk-Group-
Info-Table.
Query-Condition It indicates the query condition.
Trunk-group-name It indicates the name of the trunk group.
For example, in Figure 31-7, the trunk group named SCTP-OUT is
queried in the BICC trunk group information table.
Query-Success It indicates that the query is successful.
The content below Query-Success is the query result.
Bearer-establish- It indicates the direction of the trunk group bearer establishment.
direction For example, in Figure 31-7, the bearer establishment direction
configured over the trunk group is Forward.
Tunnel-mode It indicates the tunnel mode of the transmission.
For example, in Figure 31-7, the tunnel mode of the transmission is
Fast.
Expected- It indicates whether to expect the COT message.
continuity-check
Table 31-9 Description of the shortcut menu of the message output pane
Menu Description
the reported messages are saved in the default path. To save the path, click and
then specify the path and file name in the displayed dialog box.
z After starting a call simulation task, the input pane is locked. If you want to save the
message, perform the following steps:
1. Right-click the output pane to display the shortcut menu.
2. Select Save As….
A dialog box is displayed, as shown in Figure 31-8.
3. Select the path and file name.
z If you do not save files before closing the call simulation window, the system will
prompt you whether to save files when you close the call simulation window.
− Choose Yes. The system displays a dialog box, in which, you can select the path and
file name.
− Choose No. The files are not saved.
− Choose Cancel. The call simulation window is not saved.
Step 4 Delete a virtual subscriber from the local VLR (DEL MS).
----End
31.10 Reference
31.10.1 Specifications
None.
31.11 FAQ
Q: During the BICC-to-BICC call simulation procedure, the CCB disconnects the call after
the BICC sends the Setup message to the CCB. The displayed cause value is "cv bearer
capability not permit (185)".
A: This is because bit 8 of P144 is set to 1 and the system does not the support the BICC-to-
BICC tandem call. After bit 8 of P144 is set to 0, the problem is solved.
Contents
Figures
Tables
32 Load-Based Handover
Section Describes
32.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
32.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
32.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
32.4 Service Flow The flow of the service.
32.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
32.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
32.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
32.8 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
32.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
32.10 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
32.11 FAQ The frequently asked questions related to the service and
the solutions.
32.1.2 Definition
Load-based handover is a mechanism for balancing the traffic and load in the UMTS network
and GSM network of carriers.
For the BSC/RNCs that support load-based handover, when inter-system handover or intra-
GSM handover happens, the destination BSC/RNC carries the cell load information in the
reported message HANDOVER REQUEST ACKNOWLEDGE/RELOCATION REQUEST
ACKNOWLEDGE or HANDOVER FAILURE/RELOCATION FAILURE, which is
transparently transmitted to the source BSC/RNC through relevant network equipment while
the message HANDOVER COMMAND/RELOCATION COMMAND or HANDOVER
REQUIRED REJECT/RELOCATION PREPARATION FAILURE is delivered to the source
BSC/RNC.
If the BSC/RNC does not support this function, handover is performed based on the common
process.
This function is provided for the following handover:
z UMTS-to-GSM intra-MSC handover, inter-MSC handover and subsequent handover
z GSM-to-UMTS intra-MSC handover, inter-MSC handover and subsequent handover
z GSM-to-GSM intra-MSC inter-BSC handover, basic inter-MSC handover and
subsequent handover
The MSC, through the For each RNC/BSC, the MSC can configure the capability
parameter configuration, of whether to support load-based handover, that is, whether
controlling whether the to process cell load information as the handover source.
BSC/RNC supports load-
based handover
Item Specification
Transparent transmission of The MSC can transparently transmit cell load information
cell load information by the during inter-system handover such as 3G-to-2G, 2G-to-2G
MSC during inter-system and 2G- to-3G handover.
handover
32.1.4 Benefits
Table 32-3 lists the benefits of the load-based handover service.
Carriers The function is used for exchanging load information between the
source cell and the destination cell during inter-system handover. With
the information, the source BSC/RNC can define a policy to better
control the handover.
Mobile subscriber Because the source BSC/RNC learns about the load information of
neighboring cells, it can control the handover to some extent. In this
case, network load can be balanced and the service experience of
mobile subscribers can also be improved.
32.2 Availability
32.2.1 Requirements for NEs
The load-based handover service must be implemented by the radio network controller (RNC),
base station controller (BSC), and the core network together. Table 32-4 lists the network
elements (NEs) required to implement load-based handover.
Other descriptions of the service availability in section 32.2 "Availability" are based on the core network
only.
- √ - √ √ - - - -
Table 32-5 The earliest version of the MSOFTX3000 that supports load-based handover
Product Applicable Version
32.2.4 Others
The requirements of the hardware and the NEs for the load-based handover are as follows:
z RNC and BSC must support sending or receiving the load information element defined
in the 3GPP R5 specifications.
z The mobile phone must be GSM phone or a GSM/UMTS dual-mode phone.
If the BSC/RNC at the source side supports the load-based handover and the following
messages sent by the MSC contain the load information of the target cell, the BSC/RNC
at the source side processes the cell load information according to the specifications:
− HANDOVER COMMAND/RELOCATION COMMAND
− HANDOVER REQUIRED REJECT/RELOCATION PREPARATION FAILURE
z The MSC must support the load-based handover. That is, the MSC at the target side must
be able to send the load information of the target cell to the source side. The MSC at the
source side must be able to send the information to the BSC/RNC.
The BSC/RNC data in the MSOFTX3000 can be configured to determine whether the
BSC/RNC supports the load-based handover. The software parameter of the
MSOFTX3000 controls whether the MSC supports the load-based handover.
At the source side of the handover, the MSOFTX3000 checks the capability list of the
BSC/RNC. Based on the capability list, the MSOFTX3000 determines whether the
BSC/RNC supports the load-based handover, and then, accordingly, decides whether to
send the cell load information through messages.
At the target side of the inter-MSC handover, the MSOFTX3000, based on the
configuration of the software parameter, decides whether to send the cell load
information to the source side.
The MSOFTX3000 uses three software parameters to control the following types of
inter-MSC load-based handover respectively:
− Inter-MSC load-based handover from the 3G network to the 2G network
If bit 13 of software parameter 157 in the target office is set to 0, indicating the
handover is supported, and the target MSC receives the load information from the
target BSC, the target MSC sends the load information to the source MSC.
If bit 13 of software parameter 157 in the target office is set to 1, indicating the load-
based handover is not supported, the target MSC does not send the load information
to the source MSC.
− Inter-MSC load-based handover from the 2G network to the 3G network
If bit 14 of software parameter 157 in the target office is set to 0, indicating the
handover is supported, and the target MSC receives the load information from the
target RNC, the target MSC sends the load information to the source MSC.
If bit 14 of software parameter 157 in the target office is set to 1, indicating the load-
based handover is not supported, the target MSC does not send the load information
to the source MSC.
− Inter-MSC load-based handover in the 2G network
If bit 15 of software parameter 157 in the target office is set to 0, indicating the
handover is supported, and the target MSC receives the load information from the
target BSC, the target MSC sends the load information to the source MSC.
If bit 15 of software parameter 157 in the target office is set to 1, indicating the load-
based handover is not supported, the target MSC does not send the load information
to the source MSC.
The default values of bit 13, 14, and 15 of software parameter 157 are 1.
In the case of intra-MSC handover, the capability of supporting the load-based handover of the
BSC/RNC at the source side must be configured on the MSC. The capability of the BSC/RNC at the
target side does not require the corresponding configuration on the MSC.
If the BSC/RNC at the target side can report the load information, the MSC must check whether the
BSC/RNC at the source side supports the load-based handover. If the BSC/RNC at the source side
supports the load-based handover, the command MOD BSC must be executed on the MSC for the
capability of the BSC/RNC. The MSC then sends the load information transparently to the BSC/RNC at
the source side.
Intra-MSC Handover
Figure 32-1 shows the flow of the intra-MSC handover.
(1) (2)
Inter-MSC Handover
Figure 32-2 shows the flow of the inter-MSC handover.
1. The BSC/RNC at the source side of the handover sends a handover request message to
the MSC server.
2. The MSC server at the source side sends the handover request to the MSC server at the
target side of the handover.
3. The MSC server at the target side sends the handover request message to the BSC/RNC
at the target side.
4. The BSC/RNC at the target side sends a response message, containing the load
information, to the MSC server at the target side.
5. If the target office supports the load-based handover (the corresponding bit of the
software parameter is set to 1), the MSC at the target side sends the load information
element to the MSC server at the source side through the response message to the inter-
MSC handover request.
6. The MSC server at the source side queries the capability of the BSC/RNC at the source
side. If the BSC/RNC is configured to support the load-based handover, the MSC sends
the load information transparently to the BSC/RNC at the source side.
Iu interface message
RELOCATION
REQUIRED
A interface message
HANDOVER
REQUEST
A interface message
HANDOVER REQUEST
ACKNOWLEDGE
Iu interface message
RELOCATION
COMMAND
The description of the flow of intra-MSC load-based handover from the RNC to the BSC is as
follows:
A interface message
E interface message
HANDOVER REQUEST
MAP-Prep-Handover resp ACKNOWLEDGE
Iu interface message
RELOCATION
COMMAND
The description of the flow of the inter-MSC load-based handover from the RNC to the BSC
is as follows:
z If the HANDOVER REQUEST ACKNOWLEDGE message sent by the BSC to the
MSOFTX3000-B contains the cell load information, and bit 13 of software parameter
157 in the MSOFTX3000-B is set to 0, the MSOFTX3000-B sends the cell load
information transparently to the MSOFTX3000-A through the E interface message
MAP-Prep-Handover resp.
z If the capability of supporting the load-based handover of the RNC at the source side is
configured on the MSOFTX3000-A, and the MAP-Prep-Handover resp message sent by
the MSOFTX3000-B to the MSOFTX3000-A contains the load information of the target
cell, the MSOFTX3000-A sends the information transparently to the RNC at the source
side through a RELOCATION COMMAND message.
z If the handover fails, the HANDOVER FAILURE message sent by the BSC contains the
cell load information, and bit 13 of software parameter 157 in the MSOFTX3000-B is set
to 0, the information is transparently sent to the MSOFTX3000-A. If the capability of
supporting the load-based handover of the RNC at the source side is configured on the
MSOFTX3000-A, the MSOFTX3000-A sends the cell load information transparently
A interface message
HANDOVER
Iu interface message
REQUIRED
RELOCATION
REQUEST
RELOCATION REQUEST
A interface message ACKNOWLEDGE
HANDOVER
COMMAND
The description of the flow of the intra-MSC load-based handover from the BSC to the RNC
is as follows:
z If the RELOCATION REQUEST ACKNOWLEDGE message sent by the RNC to the
MSC contains the cell load information, and the capability of supporting the load-based
handover of the BSC at the source side is configured on the MSC, the MSC sends the
cell load information transparently through the A interface message HANDOVER
COMMAND.
z If the handover fails, the RELLOCATION FAILURE message sent by the RNC contains
the cell load information, and the capability of supporting the load-based handover of the
BSC at the source side is configured on the MSC, the MSC sends the cell load
information transparently through the A interface message HANDOVER REQUIRED
REJECT. Whether the handover is re-originated is determined by the BSC at the source
side.
Iu interface message
E interface message
RELOCATION REQUEST
MAP-Prep-Handover resp ACKNOWLEDGE
A interface message
HANDOVER
COMMAND
The description of the flow of the inter-MSC load-based handover from the BSC to the RNC
is as follows:
z If the RELOCATION REQUEST ACKNOWLEDGE message sent by the RNC to the
MSOFTX3000-B contains the cell load information, and bit 14 of software parameter
157 in the MSOFTX3000-B is set to 0, the MSOFTX3000-B sends the cell load
information transparently to the MSOFTX3000-A through the E interface message
MAP-Prep-Handover resp.
z If the capability of supporting the load-based handover of the BSC at the source side is
configured on the MSOFTX3000-A, and the MAP-Prep-Handover resp message sent by
the MSOFTX3000-B to the MSOFTX3000-A contains the load information of the target
cell, the MSOFTX3000-A sends the information transparently to the BSC at the source
side through a HANDOVER COMMAND message.
z If the handover fails, the RELOCATION FAILURE message sent by the RNC contains
the cell load information, and bit 14 of software parameter 157 in the MSOFTX3000-B
is set to 0, the information is transparently sent to the MSOFTX3000-A. If the capability
of supporting the load-based handover of the BSC at the source side is configured on the
MSOFTX3000-A, the MSOFTX3000-A sends the cell load information transparently
through the A interface message HANDOVER REQUIRED REJECT. Whether the
handover is re-originated is determined by the BSC at the source side.
A interface message
HANDOVER A interface message
REQUIRED
RELOCATION
REQUEST
A interface message
RELOCATION REQUEST
A interface message ACKNOWLEDGE
HANDOVER
COMMAND
The description of the flow of the intra-MSC load-based handover from a BSC to another
BSC is as follows:
z If the HANDOVER REQUEST ACKNOWLEDGE message sent by the BSC-B to the
MSOFTX3000 contains the cell load information, and the capability of supporting the
load-based handover of the BSC-A is configured on the MSOFTX3000, the
MSOFTX3000 sends the cell load information transparently through the A interface
message HANDOVER COMMAND.
z If the handover fails, the HANDOVER FAILURE message sent by the BSC-B contains
the cell load information, and the capability of supporting the load-based handover of the
BSC-A is configured on the MSOFTX3000, the MSOFTX3000 sends the cell load
information transparently through the A interface message HANDOVER REQUIRED.
Whether the handover is re-originated is determined by the BSC at the source side.
A interface message
E interface message
HANDOVER REQUEST
MAP-Prep-Handover resp ACKNOWLEDGE
A interface message
HANDOVER
COMMAND
The description of the flow of the inter-MSC load-based handover from a BSC to another
BSC is as follows:
z If the HANDOVER REQUEST ACKNOWLEDGE message sent by the BSC-B to the
MSOFTX3000-B contains the cell load information, and bit 15 of software parameter
157 in the MSOFTX3000-B is set to 0, the MSOFTX3000-B sends the cell load
information transparently to the MSOFTX3000-A through the E interface message
MAP-Prep-Handover resp.
z If the capability of supporting the load-based handover of the BSC-A is configured on
the MSOFTX3000-A, and the MAP-Prep-Handover resp message sent by the
MSOFTX3000-B to the MSOFTX3000-A contains the load information of the target cell,
the MSOFTX3000-A sends the information transparently to the BSC-A through a
HANDOVER COMMAND message.
z If the handover fails, the HANDOVER FAILURE message sent by the BSC-B contains
the cell load information, and bit 15 of software parameter 157 in the MSOFTX3000-B
is set to 0, the information is transparently sent to the MSOFTX3000-A. If the capability
of supporting the load-based handover of the BSC-A is configured on the
MSOFTX3000-A, the MSOFTX3000-A sends the cell load information transparently
through the A interface message HANDOVER REQUIRED REJECT. Whether the
handover is re-originated is determined by the BSC at the source side.
Step 1 Run the command MOD BSC to modify the support capability of the source BSC for the cell
load information.
Step 2 Run the command MOD RNC to modify the support capability of the source RNC for the
cell load information
Step 3 Run the command MOD MSFP to modify software parameter 157. Set bits 13, 14 and 15 to
control whether the destination MSC supports load-based handover.
----End
Configuration Scripts
If relevant data tables are not configured in the local office, the procedure of data
configuration on the MSOFTX3000 maintenance terminal is as follows:
Step 1 Configure the capability of BSC.
Description Run the command MOD BSC to set whether the BSC supports load-
based handover.
Script MOD BSC: DPC="23", CAPABILITY=LOADHO-1;
Remark The value option Support Load-based HO of the parameter List Of BSC
Capability is used to configure whether the BSC supports this capability.
If the option is selected, load-based handover is supported. If the option is
not selected, load-based handover is not supported. By default, load-based
handover is not supported.
Description Run the command MOD RNC to set whether the RNC supports load-
based handover.
BSC table There are multiple records in this table. It records the MOD BSC
capability of the source BSCs managed by the local
MSC for cell load information.
RNC table There are multiple records in this table. It records the MOD RNC
capability of the source RNCs managed by the local
MSC for cell load information.
----End
32.10 Reference
32.10.1 Specifications
The reference of this service is 3GPP specifications, which are as follows:
z 3GPP TS 48.008, "Mobile Switching Centre - Base Station System (MSC-BSS) interface;
Layer 3 specification,V5.12.0"
32.11 FAQ
z Q: During an intra-MSC handover, the message sent by the BSC/RNC at the target side
contains the cell load information, but the MSC does not transparently sent the
information to the BSC/RNC at the source side.
A: Run the command MOD BSC or MOD RNC, and select the value option Support
Load-based HO of the parameter List Of BSC Capability or RNC capability list.
z Q: During an inter-MSC handover, the message sent by the BSC/RNC at the target side
contains the cell load information, but the MSC at the target side does not transparently
sent the information to the MSC at the source side.
A: Run the command MOD MSFP to modify the value of the corresponding bit of
software parameter 157, thus to configure the capability of supporting the load-based
handover of the MSC at the target side. For the descriptions of software parameter 157,
see 32.5.4 Step 3 "Set the software parameter."
Contents
Figures
Figure 33-1 Trace flow of the activation message received from the HLR during location update/data recovery
...........................................................................................................................................................................33-6
Figure 33-2 Trace flow of the activation message sent by the HLR.................................................................33-7
Figure 33-3 Flow of the deactivation trace sent by the HLR............................................................................33-7
Tables
Table 33-1 Function name and function code in the union subscriber trace.....................................................33-2
Table 33-2 Movements of mobile subscribers ..................................................................................................33-2
Table 33-3 Benefits for carriers ........................................................................................................................33-3
Table 33-4 NEs required to implement the union subscriber trace service.......................................................33-4
Table 33-5 Version of the Huawei UMTS products that support the union subscriber trace service................33-4
Table 33-6 Related tables of the union subscription trace ..............................................................................33-12
Section Describes
33.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
33.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
33.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
33.4 Service Flow The flow of the service.
33.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
33.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
33.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
33.8 Performance The influence of the service on performance measurement
Management and the implementation of performance measurement.
33.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
33.10 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
Table 33-1 Function name and function code in the union subscriber trace
Name Code
33.1.2 Definition
The union subscriber trace service indicates that the MSOFTX3000 can implement the HLR-
based subscriber trace in the local office. That is, a subscriber trace task can be created and
deleted in the HLR and the HLR notifies the MSC/VLR in which the subscriber is located to
perform the trace. The trace mode can provide an efficient way to remove a designated failure,
especially to process the complaint from subscribers. With the union subscriber trace, the
running status of the network is checked in the view of the terminal subscribers.
For each movement of mobile subscribers, including location update, power-on/off, mobile
originated call (MOC)/mobile terminated call (MTC), originated/terminated short message or
switchover, a trace file is generated and is saved in the UNIONTRACE directory under the
installation directory of the BAM in the MSOFTX3000. Besides the messages between
entities, the MOSFTX3000 controls whether to trace messages and logs inside each module.
Table 33-2 lists the movements of mobile subscribers.
Activation subscriber trace The activation trace message is received from the HLR
during location update and data in the flow of location update and data recovery.
recovery
Activation trace sent by the HLR The activation trace sent by the HLR is received.
Deactivation trace sent by the The deactivation trace sent by the HLR is received.
HLR
MOC trace The file of MOC trace is generated.
MTC trace The file of MTC trace is generated.
Originated short message trace The file of originated short message trace is generated.
Terminated short message trace The file of terminated short message trace is generated.
Power-on/Location update trace The file of power-on/location update is generated.
Name Definition
33.1.3 Benefits
Table 33-3 lists the benefits for carriers.
Beneficiary Description
33.1.6 Others
The service requires the related HLR to support the union subscriber trace.
33.2 Availability
33.2.1 Requirements for NEs
The HLR must interwork with the MSC server to implement the union subscriber trace
service. Table 33-4 lists the NEs required to implement the union subscriber trace service.
Table 33-4 NEs required to implement the union subscriber trace service
√ √ √ √ - - - √
Table 33-5 Version of the Huawei UMTS products that support the union subscriber trace service
Product Applicable Version
Figure 33-1 Trace flow of the activation message received from the HLR during location
update/data recovery
UPDATE_LOCATION_REQ/
RESTORE_DATA_REQ
ACTIVATE_TRACE_MODE_IND
ACTIVATE_TRACE_MODE_RSP
UPDATE_LOCATION_CNF/
RESTORE_DATA_CNF
After the MSOFTX3000 sends the location update/ data recovery message, if the HLR does
not sends the activation subscriber request, the processing is the same as that in normal cases.
If the HLR sends the activation subscriber trace request, the processing process is as follows:
1. Configure Support UNIONTRC in the function configuration table of the
MSOFTX3000. If it is set to No, the SOFTX3000 notifies the HLR that the device does
not respond.
2. If it is set to Yes, the MSOFTX3000 determines whether the message contains
mandatory information elements, including Trace Reference and Trace Type. (In this
case, the IMSI is an optional information element. If the IMSI does not exist, use the
IMSI of the current subscriber). If the mandatory information elements are not contained,
the MSOFTX3000 sends the data loss message to the HLR. If the IMSI is contained, but
it is not consistent with the IMSI of the subscriber after location update/data recovery,
the MSOFTX3000 sends the data not expected message to the HLR.
3. If the IMSI contained is consistent with that of the current subscriber, the MSOFTX3000
transfers the trace request of the HLR to the BAM. Then, the BAM performs the union
subscriber trace to the subscribers.
4. The MSOFTX3000 returns the union subscriber trace result to the HLR.
Figure 33-2 Trace flow of the activation message sent by the HLR
ACTIVATE_TRACE_MODE_IND
ACTIVATE_TRACE_MODE_RSP
The trace flow of the activation message sent by the HLR is as follows:
1. Configure Support UNIONTRC in the function configuration table of the
MSOFTX3000. If Support UNIONTRC is set to No, the SOFTX3000 notifies the HLR
that the device does not respond.
2. If Support UNIONTRC is set to Yes, the MSOFTX3000 determines whether the
message contains mandatory information elements, including IMSI, Trace Reference
and Trace Type. If the mandatory information elements are not contained, the
MSOFTX3000 sends the data lost message to the HLR.
3. If the subscriber data exists in the MSOFTX3000, the MSOFTX3000 starts the union
subscriber trace. If the subscriber data does not exist in the MSOFTX3000, the
MSOFTX3000 returns the unknown subscriber response to the HLR.
4. The MSOFTX3000 returns the union subscriber trace result to the HLR.
DEACTIVATE_TRACE_MODE_IND
DEACTIVATE_TRACE_MODE_RSP
The trace flow of the deactivation message sent by the HLR is as follows:
MS MSC Server
CM_Serv_Req
After a mobile subscriber in the local office initiates the call service request, the
MSOFTX3000 performs the initiation call trace and generates a union subscriber trace file.
MSC Server
IAM
After receiving the call service request from the peer office, but before acquiring the
subscriber data of the called party, the MSOFTX3000 performs the union subscriber trace of
the termination call and generates a union subscriber trace file. For an intra-office call, the
IAM message does not exist. The MSC server generates the trace file after internal processing
of the termination call.
MS MSC Server
CM_Serv_Req
After a mobile subscriber in the local office initiates the short message service request, the
MSOFTX3000 performs the originated trace and generates a union subscriber trace file.
MT_FORWARD_SM
After the SMC sends the short message request, the MSOFTX3000 performs the union
subscriber trace of the terminated short message and generates the union subscriber trace file.
MS MSC Server
UpdateLocation_Request
The power-on/location
update trace is performed
and a trace file is generated.
After the power-on/location update of an MS, the MSOFTX3000 performs the union
subscriber trace and generates a trace file.
MS MSC server
IMSIDetach
When the MS reports the power-off event, the MSOFTX3000 performs the power-off trace
and generates s trace file.
Configuration Script
Step 1 Configure that the local office supports the union subscription trace.
Remark Adopt the default value for Max Trace Number, Days To Preserve File
and File Delete Time.
Description To add a union subscriber trace task, set Trace reference to 1, IMSI to
460077552000322, Trace type to 48, Task valid days to 10 and Inner
trace to Yes.
Script ADD UTRCTSK: TRACREFERENCE=1, IMSI=K'460077552000322,
TRACETYPE=48, VALIDDAYS=10, IFINNERTRACE=YES;
----End
33.10 Reference
33.10.1 Specification
The reference lists for the service are as follows:
z 3GPP TS 29.002: "Mobile Application Part (MAP) specification".
z 3GPP TS 52.008: "GSM Subscriber and Equipment Trace".
z 3GPP TS 32.432: "Performance measurement: File format definition".
Trace handle Trace handle is a message generated after the SMU receives the trace
startup message of the BAM to identify the trace task. The message
records the trace task and trace message reported by the BAM and is
broadcasted to each CCU module by the SMU.
Contents
34.10 Reference...............................................................................................................................................34-25
34.10.1 Specifications...............................................................................................................................34-25
34.10.2 Acronyms and Abbreviations .......................................................................................................34-25
34.11 FAQ .......................................................................................................................................................34-26
Figures
Tables
Section Describes
34.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
34.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
34.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
34.4 Service Flow The flow of the service.
34.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
34.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
34.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
34.8 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
34.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
34.10 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
34.11 FAQ The frequently asked questions related to the service and
the solutions.
34.1.2 Definition
Service restriction by cell includes three sub-features: cell-based charging, local-based service
restriction, and service restriction by cell.
Name Definition
Cell-based charging When using a service, the mobile station (MS) checks
whether the subscriber's location maps a zone code (ZC) and
then writes down traffic code (TC) in the CDR based on the
tariff information of the zone code. Also, the MSC informs
whether the subscriber is in preferential cell through USSD.
The billing center performs preferential billing according to
the traffic code.
Local-based service When a subscriber performs location update or uses a service,
restriction the MS judges whether the subscriber's location belongs to a
zone code, then makes the following logical judgment based
on the zone service.
z Subscriber is allowed or not allowed to perform location
update.
z Subscriber is allowed or not allowed to originate or
terminate calls.
z Subscriber is allowed or not allowed to use short message
service (SMS).
z Subscriber is allowed or not allowed to use supplementary
services that are irrelevant to calls.
z Subscriber is allowed or not allowed to use the location
service (LCS).
z Subscriber is allowed or not allowed to use the unstructured
supplementary service data (USSD) service.
Name Definition
Service restriction by cell The current enhanced roaming restriction and ZC roaming
(SRC) restriction can only provide precision at location area level,
while service restriction by cell provides cell-based service
control. It is classified into two types:
z SRC in ZC mode
z SRC in user group mode
34.1.4 Benefits
The benefits are listed in Table 34-2.
34.2 Availability
34.2.1 Requirement for NEs
Local-based service restriction, cell-based charging, and service restriction by cell require
MSC and HLR.
Table 34-3 Earliest version applicable to local-based service restriction, cell-based charging, and
service restriction by cell
34.2.4 Others
None.
With SRC in user group mode, the system obtains the location number name (based on the
cell where the subscriber is in), the location group name, the subscriber group name (based on
the subscriber's IMSI, MSISDN or subscriber's roaming subscriber type), and finally SRC
restricted service list (based on the location group and subscriber group) and determines
whether to restrict roaming.
z Implementation of local-based service restriction
The system uses Local subscription ZC sets name corresponding to the cell to query
the ZC table and to obtain all the ZC of the ZC set, obtains intersection with the list of
the ZCs subscribed to in the HLR. If intersection exists, it means the subscriber is
allowed to continue the service. If intersection does not exist, it means the subscriber is
outside the roaming area. The system further obtains the ZC of highest priority in the ZC
set. Based on the service list of local-based service restriction, which is configured by
ZC, and the service that the subscriber is using, the system determines whether to allow
the subscriber to continue the service.
z Implementation of service restriction by cell
Service restriction by cell has two types: SRC in ZC mode & SRC in user group mode.
− With SRC in ZC mode, the system uses Service restriction by cell ZC set name to
query the ZC table to obtain all ZC of the ZC set, and obtains intersection with the
list of the ZCs subscribed to in the HLR. If intersection exists, the system queries the
SRC restricted service list and decides whether to allow the subscriber continuing the
service.
− With SRC in user group mode, the system uses location number name of the cell and
subscriber identification (IMSI/MSISDN/roaming subscriber type) to query the home
subscriber group to check whether roaming is allowed. If not, the system restricts the
subscriber from continuing. If yes, the system checks the SRC prohibit service list
and then decides whether to allow the subscriber to continue.
z Implementation of cell-based charging
The system uses Cell billing ZC sets name of the cell to obtain all ZC of the ZC set and
then obtains intersection with the list of the ZCs subscribed to in the HLR. If intersection
exists, that is, if subscriber is in preferential cell, then the system obtains the tariff
corresponding to the ZC of highest priority in the intersection. If intersection does not
exist, it means the subscriber is not in preferential cell and the system obtains the default
non-preferential tariff value. The system judges whether to deliver USSD notice to
subscriber. If yes, the system queries the corresponding USSD notice content depending
on whether the subscriber is in preferential cell. If not, no USSD notice is delivered and
the subscriber continues the service. After the service is over, the CDR is filled in with
the service traffic code.
LocationUpdate_REQ
Authentication_Req
Authentication_Rsp
UpdateLocation_REQ
InsertSubscriberData_IND
InsertSubscriberData_RSP
UpdateLocation_RSP
LocationUpdate_Accept
In the location update flow, upon receiving the InsertSubscriberData_IND message, the VLR
performs ZC LIST check to see if the ZC LIST that the subscriber registers in HLR is
configured in VLR.
When the system supports ZC roaming restriction and local-based service restriction, if they
are configured, it means local VLR has areas where subscriber roaming is allowed and hence
subscriber registration is allowed; if they are not configured, it means the local VLR has no
areas where subscriber roaming is allowed and hence VLR responds with location update
refusal.
When the system does not support ZC roaming restriction and local-based service restriction,
the existing flow is not affected.
UE/MS MSOFTX3000
CM_Service_Request
Authentication_Req
Authentication_Rsp
TMSI_Reallocation_Command
TMSI_Reallocation_Complete
Cm_Service_Accept
Setup/CPDATA/(SS)/
In the case of
short message
origination, it
belongs to another
Register independent flow.
Facility
Release_Complete
The succeeding flow is the same as that of the origination of a normal call
or short message.
If the roaming of calls, short messages, and location service are restricted, then the system
returns CM_Service_Reject. If roaming is allowed and the subscriber has not subscribed to
ZC, then the existing flow is not affected. If roaming is allowed and the subscriber has
subscribed to ZC, then the processing is as follows:
z In case of an originated call, the message upon completion of access flow is Setup. The
system determines the new services, local-based service restriction and service
restriction by cell, based on GSM BC sent by the MS. If the originated call service is not
allowed, then the system returns CMRelease and ends the call flow. If the originated call
service is allowed, then the system checks the caller data in the call flow, then inserts
USSD billing notice, sends USSSD, and continues the call.
z In case of an originated short message, the short message upon completion of access
flow is CPDATA. Upon completing subscriber data check in the short message flow, the
system restarts another flow that is parallel to the originated short message to deliver
USSD notice. The short message flow remains unchanged. In the call service, USSD
billing notice is embedded in the call flow, whereas in the short message flow, USSD
billing notice flow is parallel to the short message flow.
z The location service does not perform USSD notice and continues the service.
MSC/VLR MS/UE
Paging
PageResponse
In the case of
short message
termination, it
Register belongs to another
independent flow.
Facility
Release_Complete
The succeeding flow is the same as that of the origination of a normal call
or short message
If roaming of call service, short message service, and location service are restricted, then
CMService_Reject is returned. If roaming is allowed and the subscriber has not subscribed to
ZC, then the existing flow is not affected; if roaming is allowed and the subscriber has
subscribed to ZC, then the processing is as follows:
z In case of a terminated call, upon completion of the access, the system determines the
new services, local-based service restriction and service restriction by cell, based on
GSM BC. If the terminated call service is not allowed, then the system returns
CMRelease and ends the call flow. If the terminated call service is allowed, then the
system completes the access flow, inserts USSD billing notice, sends USSD, and
continues the call.
z In case of a terminated short message, upon completion of the access, the system restarts
another flow that is parallel to the originated short message flow to deliver USSD notice.
The short message flow is not affected. In the call service, USSD billing notice is
embedded in the call flow, whereas in the short message service, USSD billing notice
flow is parallel to the short message flow. The location service or supplementary service
(including USSD service) do not perform USSD notice and continue the service.
z The location service does not perform USSD notice and continues the service.
Enabling or Disabling
Run SET MAPACCFG to enable or disable local-based service restriction on the
MSOFTX3000. The parameters are explained as follows:
Support local subscription function
This parameter is used to enable or disable local-based service restriction on the
MSOFTX3000. The value options are:
z No
z Yes
Support cell billing function
This parameter is used to enable or disable the cell-based charging function of the
MSOFTX3000. The value options are:
z No
z Yes
Cell billing USSD notice list
This parameter is used to enable or disable USSD notice function under cell-based charging
on the MSOFTX3000, and the services that send USSD notice. The value options are:
z Select all
z Clear all
z Notify when calling
z Notify when short message
USSD notice function is a function of cell-based charging. It is effective only when cell-based charging
is enabled. If cell-based charging is disabled, even if USSD notice is enabled, no USSD notice will be
delivered to handset.
SET MAPPARA MAP Function Parameter table. The command sets non-
preferential cell default tariff.
LST MAPPARA Lists details of MAP Function Parameter table.
ZC Command Setting
Run ADD ZC to add ZC for local-based service restriction, cell-based charging, and service
restriction by cell. The parameters are explained as follows:
ZC config name
It identifies the name of the new record.
Zone code
It defines zone code of the local MSC in the global network.
Zone code name
Zone code name, for easy of identification.
Zone code type
Subscribers specify the functions that ZC is used in. The value options are:
z ZC roaming restrict: The ZC is used in ZC roaming restriction.
z ZC cell billing: The ZC is used in cell-based charging.
z Local-based service restriction: The ZC is used in local-based service restriction.
z Service restriction by cell: The ZC is used in SRC in ZC mode.
Zone code sets name
It specifies the name of the ZC set where the ZC belongs to, referenced by the LOCGRP
command.
Zone code priority
It indicates the ZC priority in a ZC set. The value range is 0–127.
TC value
When Zone code type is set to ZC cell billing, this parameter is effective. It is used to set
preferential cell tariff. The value range is 0–255. A value within 0–255 corresponds to a tariff.
The particulars are determined by the carrier in their marketing policy.
LS permit service list
When Zone code type is set to Local-based service restriction, this parameter is effective. It
is used to set the list of services where local-based service restriction is enabled. The value
options are:
z Select all
z Clear all
z MOCALL (Subscriber originated call)
z MTCALL (Subscriber terminated call)
z SMMO (Subscriber originated short message)
z SMMT (Subscriber terminated short message)
z MOUSSD (Subscriber originated USSD)
z MTUSSD (Network originated USSD)
z MOLCS (Mobile originated location request)
z MTLCS (Mobile terminated location request)
z SS (Call-independent supplement service operation)
SRC prohibit service list
When Zone code type is set to Service restriction by cell, this parameter is effective. It is
used to set list of SRC in ZC mode. The value options are:
z Select all
z Clear all
z MOCALL (Subscriber originated call)
z MTCALL (Subscriber terminated call)
z SMMO (Subscriber originated short message)
z SMMT (Subscriber terminated short message)
z MOUSSD (Subscriber originated USSD)
z MTUSSD (Network originated USSD)
List of services to which service restriction by cell is unavailable. It specifies the services that
are restricted for a subscriber group in a location group. The value options are:
z Select all
z Clear all
z MOCALL (Subscriber originated call)
z MTCALL (Subscriber terminated call)
z SMMO (Subscriber originated short message)
z SMMT (Subscriber terminated short message)
z MOUSSD (Subscriber originated USSD)
z MTUSSD (Network originated USSD)
z MOLCS (Mobile originated location request)
z MTLCS (Mobile terminated location request)
z MOGSMBS20(Mobile originated GSMBS20)
z MTGSMBS20(Mobile terminated GSMBS20)
z MOGSMBS30(Mobile originated GSMBS30)
z MTGSMBS30(Mobile terminated GSMBS30)
z MOGSMTS61(Mobile originated GSMTS61)
z MTGSMTS61(Mobile terminated GSMTS61)
z MOGSMTS62(Mobile originated GSMTS62)
z MTGSMTS62(Mobile terminated GSMTS62)
z MOGSMTS63(Mobile originated GSMTS63)
z MTGSMTS63(Mobile terminated GSMTS63)
z MOALS (Mobile originated ALS)
z MTALS (Mobile terminated ALS)
z MOGSMBS40(Mobile originated GSMBS40)
z MTGSMBS40(Mobile terminated GSMBS40)
z MOGSMBS50(Mobile originated GSMBS50)
z MTGSMBS50(Mobile terminated GSMBS50)
The commands to edit user group roaming right are listed in Table 34-10
Configuration Script
Assuming that the related tables of local office are not configured, the configuration on the
MSOFTX3000 LMT takes the following steps:
Step 1 Enable local-based service restriction.
Remark None.
Description Configure Local subscription zone code to be 2345 and the corresponding
Local subscription ZC set to be ZoneCodeSet1.
Script ADD ZC: ZCCFGNAME="ZC config 1", ZC="2345",
ZCNAME="ZoneCode1", ZCTYPE=LOCALSUBSCRIPTION,
ZCSETSNAME="ZoneCodeSet1";
Remark None.
Remark None.
----End
Scenario Description 2
Configure local-based service restriction so that subscriber is restricted to roam in cell
4607600210001 and that originated and terminated short messages are allowed in this cell.
The subscriber's HLR subscription zone code 2345, the current MSC/VLR number is
8613900888. The call source name is "CALLSRC1".
Configuration Script
Assuming that the local office has not configured the related tables, the configuration on the
MSOFTX3000 LMT takes the following steps:
Step 1 Enable local-based service restriction.
Remark None.
Description Configure Local subscription zone code to be 3456 and the corresponding
ZC set to be ZoneCodeSet1. The allowed services are call origination and
short message termination.
Script ADD ZC: ZCCFGNAME="ZC config 1", ZC="3456",
ZCNAME="ZoneCode1", ZCTYPE=LOCALSUBSCRIPTION,
ZCSETSNAME="ZoneCodeSet1", ZCPRIORITY=127,
LOCSUBSERVICE=MOCALL-1&MTCALL-0&SMMO-0&SMMT-
1&MOUSSD-0&MTUSSD-0&MOLCS-0&MTLCS-0&SS-0;
Remark None.
Description Configure the zone code of local-based service restriction to be 2345. The
corresponding ZC set is named "ZoneCodeSet2". The service list can be
null.
Script ADD ZC: ZCCFGNAME="ZC config 2", ZC="2345",
ZCNAME="ZoneCode2", ZCTYPE=LOCALSUBSCRIPTION,
ZCSETSNAME="ZoneCodeSet2", ZCPRIORITY=125,
LOCSUBSERVICE=MOCALL-0&MTCALL-0&SMMO-0&SMMT-
0&MOUSSD-0&MTUSSD-0&MOLCS-0&MTLCS-0&SS-0;
Remark The configuration of zone code 2345 indicates that subscribers can roam
(register) in a zone served by the local VLR. See section 34.4.1 "Location
Update Message Flow."
Remark The subscriber's subscription zone code and the zone code set of local-
based service restriction corresponding to the cell do not contain
intersection, hence roaming is restricted. The local office is configured with
the zone code of the highest priority in the zone code set of local-based
service restriction corresponding to the local cell. Its list of allowed
services is originated and terminated short messages. Therefore subscribers
can send originated and terminated short messages.
----End
Scenario Description 3
The preferential tariff that the subscriber subscribes to cell 4607600210001 is 60. The tariff is
USSD-noticed to subscriber.
The subscriber's HLR subscription zone code is 2345 and the current MSC/VLR number is
8613900888. The call source name is "CALLSRC1".
Configuration Script
Assuming that the local office has not configured related tables, the configuration at the
MSOFTX3000 LMT takes the following steps:
Step 1 Enable cell-based charging and USSD notice.
Description Configure the cell-based charging zone code to be 2345, the corresponding
cell charging ZC set to be ZoneCodeSet1, and the preferential tariff to be
60.
Script ADD ZC: ZCCFGNAME="ZC config 1", ZC="2345",
ZCNAME="ZoneCode1", ZCTYPE=ZCCELLBILL,
ZCSETSNAME="ZoneCodeSet1", ZCPRIORITY=127, TCVALUE=60;
Remark None.
----End
Scenario Description 4
In the SRC in ZC mode, the subscriber is restricted from short message service in cell
4607600210001.
The subscriber's HLR subscription zone code is 2345 and the current MSC/VLR number is
8613900888. The call source name is "CALLSRC1".
Configuration script
Assuming that the local office has not configured the related tables, the configuration on the
MSOFTX3000 LMT takes the following steps:
Step 1 Enable SRC in ZC mode.
Remark None.
Description Configure the zone code of SRC in ZC mode to be 2345, the corresponding
ZC set to be ZoneCodeSet1. The restricted services are originated and
terminated short messages.
Script ADD ZC: ZCCFGNAME="ZC config 1", ZC="2345",
ZCNAME="ZoneCode1", ZCTYPE=SRVRESTRICTBYCELL,
ZCSETSNAME="ZoneCodeSet1", ZCPRIORITY=127,
SRCPROHIBITSERVICE=MOCALL-0&MTCALL-0&SMMO-
1&SMMT-1&MOUSSD-0&MTUSSD-0&MOLCS-0&MTLCS-
0&MOGSMBS20-0&MTGSMBS20-0&MOGSMBS30-0&MTGSMBS30-
0&MOGSMTS61-0&MTGSMTS61-0&MOGSMTS62-0&MTGSMTS62-
0&MOGSMTS63-0&MTGSMTS62-0&MOALS-0&MTALS-
0&MOGSMBS40-0&MTGSMBS40-0&MOGSMBS50-0&MTGSMBS50-
0;
Remark None.
----End
Scenario Description 5
In the SRC in user group mode, the subscriber (IMSI 460881104008802) is restricted from
originated and terminated short message services in cell 4607600210001.
The current MSC/VLR number is 8613900888. The call source name is "CALLSRC1".
Configuration Script
Assuming that the local office has not configured the related tables, the configuration on the
MSOFTX3000 LMT takes the following steps:
Step 1 Enable SRC in user group mode.
Remark None.
----End
CDR
CDR remains unchanged. Only a preferential tariff is added.
34.10 Reference
34.10.1 Specifications
The reference is as follows:
3GPP TS 29.002: "Mobile Application Part (MAP) specification"
34.11 FAQ
None.
Contents
Figures
Figure 35-1 Dialing test model on the designated TDM circuit. ......................................................................35-2
Figure 35-2 Processing flow inside the system ................................................................................................35-4
Figure 35-3 Flow of the dialing test on the designated TDM circuit for the trunk outgoing call from the MS to
the PSTN ...........................................................................................................................................................35-6
Figure 35-4 Message flow of the dialing test on the designated TDM circuit for the intra-office call.............35-8
Tables
Table 35-1 Function name and function code in the dialing test on the designated TDM circuit.....................35-2
Table 35-2 Benefits for carriers ........................................................................................................................35-3
Table 35-3 NEs required to implement the dialing test on the designated TDM circuit...................................35-3
Table 35-4 Versions of the Huawei UMTS products that support the dialing test on the designated TDM circuit
...........................................................................................................................................................................35-4
Table 35-5 Related software parameters.........................................................................................................35-10
Section Describes
35.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
35.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
35.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
35.4 Service Flow The flow of the service.
35.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
35.6 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
35.7 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
35.8 Service Interaction The association between the service and other services as
well as the restrictions on each other.
35.9 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
35.10 FAQ The frequently asked questions related to the service and
the solutions.
Table 35-1 Function name and function code in the dialing test on the designated TDM circuit
Name Code
35.1.2 Definition
The dialing test on the designated TDM circuit is to test the availability of the TDM circuit
between the two MGWs in the same MSC server, without blocking circuits. The test is
performed to check whether the circuits between the MGWs are faulty. It is applied to the
running device test and troubleshooting. The result of the trunk dialing test is printed in the
trunk trace window and is saved in a file.
The designated dialing test indicates when a subscriber dials the same number for multiple
times, the MSC server selects the corresponding TDM circuits for test based on the trunk test
task table.
The dialing test on the designated TDM circuit is to test the timeslot of the E1 cable
connecting the two MGWs of the peer office. As shown in Figure 35-1, there are two MGWs,
namely MGW1 and MGW2, in the MSC server. The dialing test on the designated TDM
circuit can be conducted when a subscriber in the MGW1 calls a subscriber in the MGW2, or
a PSTN subscriber.
MSCserver
H248 H248
E1 E1
MGW1 MGW2 PSTN
TDM TDM
The dialing test on the designated TDM circuit supports the trunk outgoing call, trunk
incoming call and intra-office call.
35.1.3 Benefits
Table 35-2 lists benefits for carriers.
Carriers The service helps maintenance personnel check the availability of the
circuit. It eases to test the circuits and troubleshoot the failure.
35.2 Availability
35.2.1 Requirements for NEs
The NodeB/BTS and RNC/BSC must interwork with the devices at the core network side to
implement the dialing test on the designated TDM circuit. Table 35-3 lists the NEs required to
implement the dialing test on the designated TDM circuit.
Table 35-3 NEs required to implement the dialing test on the designated TDM circuit
UE/ NodeB/ RNC/ MSC MGW SGSN VLR HLR
MS BTS BSC Server
√ √ √ √ √ - √ √
Table 35-4 Versions of the Huawei UMTS products that support the dialing test on the designated
TDM circuit
MGW1 MGW2
The processing flow of the dialing test on designated circuit inside the system is as follows:
1. The calling party initiates the designated dialing test request based on the designated
trunk dialing test scheme.
2. After receiving the dialing test request, the MSC server analyzes the request and
determines one TDM circuit between the MGWs for dialing test.
3. The MSC Sever sends the resource to the MGW and notifies the MGW to prepare the
termination point of the TDM circuit.
4. The MSC server connects the call to the actual called party.
5. The called party answers the call and the call connection is set up.
6. Check whether the designated circuit is normal through the call connection.
7. Print the designated trunk test result or ultimate test result through the trunk trace
window, which is started.
35.4.1 Dialing Test on the Designated TDM Circuit for the Trunk
Outgoing Call
Figure 35-3 shows the message flow of the dialing test on the designated TDM circuit for the
trunk outgoing call from the MS to the PSTN.
Figure 35-3 Flow of the dialing test on the designated TDM circuit for the trunk outgoing call
from the MS to the PSTN
(1)Setup
(2) P1
(3)Add.req
(4)Add.rsp(C1,T1)
(5)Add.req(C1,Termination ID)
(6)Add.rsp(C1,T2)
(7)IAM
(8)ACM
(9)Alerting
(10)ANM
(11)Connect
(12)Connect_ack
(13) P2
P1: The system analyzes the dialing test type and dialing test circuits.
P2: The system prints the test result and refreshes the data in test task buffer area.
X* is the call prefix of the called number during the dialing test on the designated circuit. Therein, X
stands for the designated number, * stands for the wildcard, and the combination of X and * is the call
prefix.
2. After analyzing the dialing test number, the MSC server determines that Service
category is Test and Service attribute is Special number prefix test. The MSC server
excludes X* and then queries the trunk test task table through the called number and
calling number after the first *. After the query, the MSC server can obtain the detailed
circuit number (BSN) through analyzing the data. It connects the call to the actual PSTN
subscriber B configured in the trunk test table. The MSC server queries the database to
obtain the TDM circuit endpoints between the two MGWs based on the E1 numbers.
3. The MSC server sends the resource request to MGW A to prepare the endpoint of the
calling party.
4. MGW A returns the contact 1 and termination 1 (C1, T1) involved in the call to the MSC
server.
5. The MSC server sends the resource request to MGW B with the endpoint of the MGW
designated.
6. MGW B returns the termination 2 (including C1 and T2) to the MSC server.
7. The MSC server sends the IAM message out of the office.
8. The backward office PSTN returns the ACM message.
9. After receiving the ACM message, the MSC server sends the ALERTING message to
MS A.
10. After the called party answers the call, the backward office PSTN returns the ANM
message.
11. After receiving the ANM message, the MSC server sends the CONNECT message to
MS A.
12. The MS A returns the CONNECT_ACK message and the call connection is established.
13. After receiving the CONNECT _ACK message, the MSC server prints the trunk test
result in the trunk trace window and refreshes data in the test task buffer area.
35.4.2 Dialing Test on the Designated TDM Circuit for the Intra-
Office Call
Figure 35-4 shows the message flow of the dialing test on the designated TDM circuit for the
intra-office call.
Figure 35-4 Message flow of the dialing test on the designated TDM circuit for the intra-office call
(1)Setup
(2) P1
(3)SRI
(4)SRI ACK
PAGE
(5)Setup
(6)Call Confirmed
(7)Add.req
(8)Add.rsp(C1,T1)
(9)Add.req(C1,Termination ID)
(10)Add.rsp(C1,T2)
(11)Alerting (11)Alerting
(12)Connect (12)Connect
(13)Connect_ack
(13)Connect_ack
(14) P2
P1: The system analyzes the dialing test type and dialing test circuits.
P2: The system prints the test result and refreshes the data in test task buffer area.
Step 2 Run ADD DNC to configure the number change table. The number change table is configured
together with the auxiliary number processing table. They are used to convert the dialing test
number.
Step 3 Run ADD AIDNUMPRO to configure the auxiliary number processing table. Set Number
type to Trunk test number and Number prefix to the prefixed designated in Step 1.The
Number change name references the record in the number change table.
Step 4 Run ADD TKTEST to configure the trunk test task table. Set Circuit type to
INTER_MGW and Called number to actual called number. The parameter Step indicates
the test step from the last E1 timeslot tested to the next E1 timeslot during the dialing test on
the TDM trunk.
Step 5 Run ADD CNACLD to configure the number analysis table and analyze the actual called
number.
----End
Configuration Scripts
Assume that the related table of the local office has been configured. The procedure for
configuring the MSOFTX3000 client is as follows:
Step 1 Configure the called number analysis table.
Description Set Service Category of the call prefix 139* to TEST and Service
attribute to SPFXT.
Description Define the number change record where the special prefix designated for
dialing test is deleted. Delete four special number prefixes from the
position 0.
Description Delete the special number prefix. Set Number type of the number change
to Trunk test number (TY8).
Script ADD AIDNUMPRO: CSCNAME="CALL_SRC", NUMTY=TY8,
PFX=K'139*, CDN="DEL_TKTEST_SUFFIX";
Description The MSC server analyzes subscriber B' number for outgoing route
selection. Set Route selection name of subscriber B to TO_PSTN.
----End
35.9 Reference
35.9.1 Specifications
None.
35.10 FAQ
Symptom
The dialing test result is not displayed in the dialing test task window.
Handling Procedure
Open the trace window to set up subscriber trace and observe whether the subscriber trace
message contains the message concerning with the dialing test on the trunk and print logs. If
not, check the operation based on the data configuration in the guide. The common causes are
as follows:
z No special number analysis data is configured to identify that the dialing test is for a
designated trunk.
z The number change is configured incorrectly and thus the number change cannot be
conducted.
Result
The dialing test result is displayed normally.
Contents
Figures
Figure 36-1 Transiting a call out after caller IN service invoked in the local office ........................................36-6
Figure 36-2 Callee IN service invoked in the local office for a trunk incoming call........................................36-7
Figure 36-3 WIN user calling fixed user ..........................................................................................................36-8
Figure 36-4 WIN user calling other MSC user without acquiring roaming number in the local office............36-9
Figure 36-5 WIN user calling other MSC user with acquiring roaming number in the local office...............36-10
Figure 36-6 Fixed user calling WIN user ....................................................................................................... 36-11
Tables
Table 36-1 Function name and function code in the IN service performance measurement enhancement ......36-3
Table 36-2 System specifications .....................................................................................................................36-3
Table 36-3 Benefits for carriers ........................................................................................................................36-4
Table 36-4 NEs required to implement the IN service performance measurement enhancement ....................36-4
Table 36-5 Version of the Huawei UMTS products that support the IN service performance measurement
enhancement......................................................................................................................................................36-5
Table 36-6 Operation modes of the IN performance measurement enhancement ..........................................36-18
Section Describes
36.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
36.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
36.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
36.4 Service Flow The flow of the service.
36.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
36.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
36.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
36.8 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
36.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
36.10 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
Section Describes
36.11 FAQ The frequently asked questions related to the service and
the solutions.
Table 36-1 Function name and function code in the IN service performance measurement
enhancement
Name Code
36.1.2 Definition
The IN service performance measurement enhancement is to modify the original "Traffic For
WIN User Calling Fixed User" and "Traffic For Fixed User Calling WIN User" to "Traffic
For WIN User TK Outgoing Call" and "Traffic For TK Incoming Office Calling WIN User".
At the same time, the two measurement units are divided into four units to enhance the
precision of the IN service performance measurement. Such division helps to estimate the
system performance and each performance measurement efficiently.
z Traffic For WIN User TK Outgoing Call
− Traffic For WIN User Calling Fixed User: It is used to perform the statistics for the
WIN user calling the fixed user.
− Traffic For WIN User Calling Other MSC User: It is used to perform the statistics for
the WIN user calling the other MSC user.
z Traffic For TK Incoming Office Calling WIN User
− Traffic For Fixed User Calling WIN User: It is used to perform the statistics for the
fixed user calling the WIN user.
− Traffic For Other MSC User Calling WIN User: It is used to perform the statistics for
the other MSC user calling the WIN user.
Items Specifications
WIN User The system has invoked the IN service of the user.
NOTE
When the subscription data exists but the IN service is not invoked, the system
considers the user as a non-IN user.
Items Specifications
WIN relation end After the IN relation end, the system does not perform the statistics for
the subsequent specifications.
NOTE
When the IN relation is complete, the call connection may not be complete.
36.1.4 Denefits
Table 36-3 lists benefits for carriers.
36.2 Availability
36.2.1 Requirements for NEs
The IN service performance measurement enhancement feature can be implemented by the
MSC server independently. Table 36-4 lists the NEs required to implement the IN service
performance measurement enhancement.
Table 36-4 NEs required to implement the IN service performance measurement enhancement
MS/U BTS/Node BSC/RNC MSC MGW PSTN VLR SC HLR
E B Server P
- - - √ √ √ √ √ √
Table 36-5 Version of the Huawei UMTS products that support the IN service performance
measurement enhancement
36.2.4 Others
None.
Transiting a Call out after Caller IN Service Invoked in the Local Office
It consists of "Traffic For WIN User Calling Fixed User" and "Traffic For WIN User Calling
Other MSC User". Figure 36-1 shows the networking structure.
Figure 36-1 Transiting a call out after caller IN service invoked in the local office
Called party
Calling party 2
Calling party 1
MSC server C
SCP PSTN
Called party
MSC server B is the IN invocation office. Office B succeeds in invoking the caller IN service
and the IN call connection is not complete. If the called party is a fixed user or other MSC
user, MSC server B performs the corresponding performance measurement.
Callee IN Service Invoked in the Local Office for a Trunk Incoming Call
It consists of "Traffic For Fixed User Calling WIN User" and "Traffic For Other MSC User
Calling WIN User". Figure 36-2 shows the networking structure.
Figure 36-2 Callee IN service invoked in the local office for a trunk incoming call
Calling party
MSC Server A
Calling party
PSTN
SCP
MSC server B is the WIN invocation office. It succeeds in invoking the callee IN service, but
the IN call connection is not complete. If the calling party is the PSTN user or other MSC user,
MSC server B performs the corresponding performance measurement.
The regulation principle of the calling number is regulation for the calling number temporarily based on
"Traffic For Fixed User Calling WIN User" and "Traffic For Other MSC User Calling WIN User". It is
independent of the call flow of the system. When the system terminates the two traffic tasks, the
regulation for the calling number becomes invalid. Therefore, the regulation described in the document
is for the two traffic tasks only. It does not affect the calling number itself during the call connection.
The regulation principle of the calling number for "Traffic For Fixed User Calling WIN User"
and "Traffic For Other MSC User Calling WIN User" is as follows:
z The system queries the Auxiliary Number Processing table.
The system queries the record when Number type is set to TK incoming office caller
number in ADD AIDNUMPRO in the auxiliary number processing table. If querying
Auxiliary Number Processing table is successful, the result of the auxiliary number
change is that of the calling number regulation.
z If the system fails to query the table, the calling number regulation is performed.
The format of the calling number after the regulation is as follows:
− For an international call: international number prefix + country code of called party +
fixed line number/mobile number
− For a national toll call: national number prefix + area code of called party + fixed line
number
− For a mobile call: mobile number
− For a local PSTN call: fixed line number
Assume that the country code (home country) is 86, the country code of Hong Kong is
852, local area code is 755, Beijing area code is 10, the international number prefix is 00,
national number prefix is 0, mobile number is 13907520511, fixed number is 6660050,
the format of the calling number after the regulation is as follows:
− For an international call: 00 852 13907520511 or 00 852 6660050
− For a national toll call: 0 10 6660050
− For a mobile call: 13907520511
− For a local PSTN call: 6660050
The number regulation data involved in the calling number regulation performed for "Traffic For Fixed
User Calling WIN User" and "Traffic For Other MSC User Calling WIN User" comes from the general
data tables of number regulation. The tables include Local Information table, Multi-area Statistics
Configuration table, Mobile Station information table, Call Source table, Mobile National Access Code
table, National Toll Area Code table, and Country Code or Area Code table.
RRBE
AC
Continue
IAM
The flow of the WIN user calling the fixed user is as follows:
1. MSC server B receives the Setup message from the mobile side or receives the IAM
message from the trunk side.
2. After determining that the calling party is a WIN user, MSC server B invokes the caller
IN service and sends the IDP message to the SCP.
3. The SCP sends the RRBE, AC, and Continue message to MSC server B.
4. After receiving the Continue message, MSC server B performs the number analysis and
queries the Called Number Analysis table. Service attribute and Called number type
of the called party are returned.
5. The system performs the performance measurement based on the specification Traffic
For WIN User Calling Fixed User when the following conditions are met:
z The service attribute parameter is set to Local, Local toll, National toll or
International toll.
z The called number type parameter is set to PSTN or Unknown.
6. MSC server B sends the IAM message to the PSTN.
WIN User Calling Other MSC User Without Acquiring Roaming Number in the
Local Office
Figure 36-4 shows the message flow of the WIN user calling other MSC user without
acquiring roaming number in the local office.
Figure 36-4 WIN user calling other MSC user without acquiring roaming number in the local
office
BSC/RNC MSC MSC
SCP
(MSC Server A) Server B Server C
Setup (IAM)
IDP
RRBE
AC
Continue
IAM
The message flow of the WIN user calling other MSC user without acquiring roaming number
in the local office is shown as follows:
1. MSC server B receives the Setup message from the mobile side or receives the IAM
message from the trunk side.
2. After determining that the calling party is a WIN user, MSC server B invokes the caller
IN service and sends the IDP message to the SCP.
3. The SCP sends the RRBE, AC, and Continue message to MSC server B.
4. After receiving the Continue message, MSC server B performs the number analysis and
queries the Called Number Analysis table. The Service attribute and Called number
type parameters of the called party are returned.
5. The system performs the performance measurement based on the specification Traffic
For WIN User Calling Other MSC User when the following conditions are met:
z The Service attribute parameter is PLMN local MSC, PLMN other MSC, PLMN
national toll MSC or PLMN international toll MSC.
z The Called number type parameter is PSTN or Unknown.
6. MSC server B sends the IAM message to the MSC server C.
WIN User Calling Other MSC User with Acquiring Roaming Number in the
Local Office
Figure 36-5 shows the message flow of the WIN user calling other MSC user with acquiring
roaming number in the local office.
Figure 36-5 WIN user calling other MSC user with acquiring roaming number in the local office
BSC/RNC MSC MSC
SCP HLR server C
(MSC server A) server B
Setup (IAM)
IDP
RRBE
AC
Continue
SRI
SRI ACK
IAM
The message flow of the WIN user calling other MSC user with acquiring roaming number in
the local office is shown as follows:
1. MSC server B receives the Setup message from the mobile side or receives the IAM
message from the trunk side.
2. After determining that the calling party is a WIN user, MSC server B invokes the caller
IN service and sends the IDP message to the SCP.
3. The SCP sends the RRBE, AC, and Continue message to MSC server B.
4. After receiving the Continue message, MSC server B sends the SRI message to the HLR
at which the called party is located to acquire the roaming number.
5. After receiving the SRI ACK message, MSC server B analyzes the number contained the
roaming number and queries the Called Number Analysis Table. The Service attribute
and Called number type parameters of the called party are returned.
6. The system performs the performance measurement based on the specification Traffic
For WIN User Calling Other MSC User when the following conditions are met:
z The Service attribute parameter is PLMN local MSC, PLMN other MSC, PLMN
national toll MSC or PLMN international toll MSC.
z The Called number type parameter is MSRN.
7. MSC server B sends the IAM message to the MSC server C.
MSC
PSTN SCP
Server B
IAM
IDP
RRBE
AC
Continue
The flow of the fixed user calling the WIN user is as follows:
1. MSC server B receives the IAM message from the trunk side.
2. MSC server B uses the regulated calling number to query the Called Number Analysis
table. According to the maximum matching principle, the called number analysis record
matching the calling number is obtained. The service attribute in the record is the service
attribute corresponding to the calling number.
z If Service attribute is Local, Local toll, National toll or International toll, the calling
party is a fixed user.
z If the calling number does not exist or the query fails, the calling party is a fixed number.
When performing the performance measurement for "Traffic For Fixed User Calling WIN User" and
"Traffic For Other MSC User Calling WIN User", the system can use the calling number to query the
Called Number Analysis table and obtain the service attribute of the calling number. It is the special
processing mode of the system.
3. After determining that the called party is a WIN user, MSC server B invokes the callee
IN service and sends the IDP message to the SCP.
4. The SCP sends the RRBE, AC, and Continue message to MSC server B.
5. The system performs the performance measurement based on the measurement point of
"Traffic For Fixed User Calling WIN User".
IAM
IDP
RRBE
AC
Continue
The flow of other MSC user calling the WIN user is as follows:
1. MSC server B receives the IAM message from the trunk side.
2. MSC server B uses the regulated calling number to query the Called Number Analysis
Table. According to the maximum matching principle, the called number analysis record
matching the calling number is obtained. The service attribute in the record is the service
attribute corresponding to the calling number.
z If Service attribute is PLMN intra MSC, PLMN local office, PLMN other MSC,
PLMN national toll MSC or PLMN international toll MSC, the calling party is other
MSC user.
z If the calling number does not exist or the query fails, the calling party is a fixed number
and is not counted into this statistics unit.
When performing the performance measurement for "Traffic For Fixed User Calling WIN User" and
"Traffic For Other MSC User Calling WIN User", the system can use the calling number to query the
Called Number Analysis table and obtain the service attribute of the calling number. It is a special
processing mode of the system.
3. After determining that the called party is a WIN user, MSC server B invokes the callee
IN service and sends the IDP message to the SCP.
4. The SCP sends the RRBE, AC, and Continue message to MSC server B.
5. The system performs the performance measurement based on the measurement point of
"Traffic For Other MSC User Calling WIN User".
Start
Y
Change the calling number based
on the number change table
End
For details on the special flow of number regulation performed for "Traffic For Fixed User Calling WIN
User" and "Traffic For Other MSC User Calling WIN User", refer to "Regulation Principle of the
Calling Number."
You need not configure the called number analysis table when the table has been configured with the
corresponding data. If Service attribute configured in the called number analysis table, however, is
incorrect and may result in performance measurement failure or missing, you need to modify the data
table based on the preceding description.
z The number change table is configured with the auxiliary number processing table. If the auxiliary
number processing table requires no configuration, you need not modify the current Number Change
table.
z When other data table needs to reference Other conversion number source, you need to configure
the number change table.
Step 3 Run ADD AIDNUMPRO to configure the auxiliary number processing table. Set Number
type to Trunk incoming calling number.
z In normal cases, the national country code and local area code are not configured in the called
number analysis table. In some special cases, the called number containing the national country code
and local area code is configured in the called number analysis table. To match the called number
with the calling number, configure the auxiliary number processing table.
z To perform statistics for "Traffic For Fixed User Calling WIN User" and "Traffic For Other MSC
User Calling WIN User", configure the auxiliary number processing table.
----End
Configuration Script 1
Description Configure the service attributes of the called number 66600050.
----End
Scenario Description 2
A WIN user calls other MSC user. The calling number is 8613807520511 and the calling
party is a WIN user in office B. The called number is 13807520001 and the called party is the
mobile user in office C. The roaming number prefix allocated by office C is 13903. The route
selection name from office B to office C is B2C.Office B is the local office and 86 is national
country code.
Configuration Script 2
The procedure for configuring the MSOFTX3000 is as follows:
Step 1 Configure the called number 13807520001, to which the local office allocates the roaming
number.
Remark Set Service attribute to PLMN other MSC and Called number type to
MSRN/HON.
----End
Scenario Description 3
A fixed user calls a WIN user. The calling number is 075566600050 and the calling party is
the fixed user in office A. The called number is 13807520511 and the called party is the WIN
user in office B. The roaming number prefix allocated by office B is 13902. The route
selection name from office B to office A is B2A. Office B is the local office.0 is the national
number prefix and 755 is the local area code.
Configuration Script 3
The procedure for configuring the MSOFTX3000 is as follows:
Step 1 Configure the service attribute of the called number 075566600050. (It corresponds to the
calling number when the system queries the data table through the calling number).
Step 2 Configure the called number 13807520511, to which the local office allocates the roaming
number.
Remark Set Service attribute to PLMN local MSC and Called number type to
MSRN/HON.
----End
Scenario Description 4
Other MSC user calls a WIN user. The calling number is 13807520001 and the calling party is
the mobile user in office A. The called number is 8613807520511 and the called party is the
mobile WIN user. The call source name of office A configured in office B is A2B.The
roaming number prefix is 13902.Office B is the local office and 86 is the national country
code.
Configuration Script 4
The procedure for configuring the MSOFTX3000 is as follows:
Step 1 Configure the called number analysis table, to which the local office allocates the roaming
number.
Remark Set Call prefix to 861380752, Service attribute to PLMN local MSC and
Called number type to MSISDN.
----End
36.10 Reference
36.10.1 Specifications
The reference lists of the feature are as follows:
z 3GPP 23078, "Customised Applications for Mobile network Enhanced Logic (CAMEL)
Phase 3 - Stage 2"
z 3GPP 24.007, "Mobile Radio Interface Layer 3 specification; Core Network Protocols;
Stage 3"
36.11 FAQ
Symptom of Failure
The calling number is 8613907520511 and the calling category is other MSC user. Called
prefix configured in the called number analysis table is 861390752. The system, however,
fails to query the called number analysis table and performs the performance measurement for
fixed user calling WIN user.
Contents
Figures
Tables
Section Describes
37.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
37.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
37.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
37.4 Service Flow The flow of the service.
37.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
37.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
37.7 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
37.8 FAQ The frequently asked questions related to the service and
the solutions.
37.1.2 Definition
International mobile equipment identity software version (IMEISV) is used to mark the
software version of the mobile equipment. The MSOFTX3000 supports the automatic
detection function of the IMEISV. That is, the IMEISV information of the mobile station is
updated in real time in the HLR so that the network knows the changes of the subscriber
equipment.
Automatic device detection (ADD) service requires that the MAP protocol of both the
MSOFTX3000 and the HLR support the location update message carrying add-info
information. Therefore, the MSOFTX3000 can send the updated IMEISV information of the
mobile station (MS) to the HLR in real time during the location update of mobile subscribers.
37.1.5 Benefits
Table 37-2 lists the beneficiaries and description of the benefits of the ADD service.
Table 37-2 Beneficiaries and description of the benefits of the ADD service
Beneficiary Description
Carriers Carriers can provide new services that are applicable to the equipment
version by obtaining the IMEISV. The ADD service helps carriers
with the market orientation and improves the satisfaction of the
subscriber.
Mobile The subscriber can provide more related information of equipments to
subscribers the network. Thus, the subscriber has more chances to select the new
services supported by the software.
37.2 Availability
37.2.1 Requirements for NEs
Table 37-3 lists the network elements involved in the ADD service.
√ √ √ √ - - - √
37.2.4 Other
To support the ADD service, the MAP version used must be set to MAP phase2+ or later
version
MS
D1 D2
D4
D3
MSOFTX3000 HLR
Location_Updating_Request
Identity_Qeuest
Identity_Response
MAP_UPDATE_LOCATION_REQ
MAP_UPDATE_LOCATION_CNF
Location_Updating_Accept
=0: IMEISV
=1: IMEI
Default value: 1
4. If IMEISV fails to be obtained from the MS, and both the local office and the peer HLR
support the ADD service, the MSC server determines whether to terminate the flow of
location update based on bit 0 of P650. If bit 0 of P650 is set to 0, the location update
flow continues and IMEI is no longer obtained. If bit 0 of P650 is set to 1, the location
update flow is terminated.
5. In the following flow, the local office judges whether to carry out location update in the
HLR. The cases are as follows:
− In the original flow, location update need be carried out in the HLR. The local office
and peer HLR support the ADD service. If the IMEISV is successfully obtained, the
IMEISV is sent to the HLR through the information element add_info.
− In the original flow, location update need be carried out in the HLR. The local office
and peer HLR support the ADD service. If IMEISV fails to be obtained from the MS,
but the flow controlled by the software parameter continues, the original IMEISV of
the local office is updated in the HLR. If the local office does not save the IMEISV,
the location update request sent to the HLR does not carry IMEISV.
− In the original flow, location update need not be carried out in the HLR. The local
office and peer HLR support the ADD service. If IMEISV is successfully obtained
from the MS, the obtained IMEISV is compared with the saved IMEISV.
If the new and old IMEISV are different, such as the local office does not save the
IMEISV, location update need be carried out in the HLR; If the new and old IMEISV
are the same, but the local office does not support ADD in the location update of last
time, location update need be carried out in the HLR; If the new and old IMEISV are
the same, and the IMEISV is updated to the HLR in the location update of last time,
location update need not be carried out in the HLR.
− If the local office or the peer HLR does not support the ADD service, the flow
continues in the same way as the original one.
6. After receiving the location update response, the local office updates the ADD support
capability of the HLR in the local HLR list based on the response.
If bit 1 of P650 is set to 1, the response from the HLR must be sent to the other
WCCU/WCSU boards. If the ADD support capability is configured as Peremptory
Support or Peremptory Not Support, the MSOFTX3000 does not update the ADD
support capability of the HLR in local HLR list. The description of the software
parameter is as follows:
Bit 1 of P650 (IF_BROADCAST_WHEN_ADD_SUPPORT_HLR_LIST_CHANGE):
determines whether to send the response to the other WCCU/WCSU boards when the
response from the HLR to the location update request leads to the global update of
ADDSupportHLRList.
=0: Not send the response to the other WCCU/WCSU boards
=1: Send the response to the other WCCU/WCSU boards
Default value: 0
Serial Operation
Number
When you run the command SETADDSUPHLR/ADD ADDSUPHLR to configure the local HLR list,
you can configure the support of the ADD service of the HLR through the parameter Support ADD. The
value options of Support ADD are described in the following:
z Default Not Support: The initial configuration of the system determines that the HLRs with the
specified HLR number prefix do not support the ADD service. If the system configuration
determines that the local office supports ADD, the data is updated subsequently based on the
location update response from the HLR.
z Default Support: The initial configuration of the system determines that the HLRs with the
specified HLR number prefix support the ADD service. If the system configuration determines that
the local office does not support ADD, the data of ADD support capability is updated subsequently
based on the location update response from the HLR.
z Peremptory Support: The initial configuration of the system determines that the HLRs with the
specified HLR number prefix support the ADD service. The data of ADD support capability is not
updated subsequently based on the location update response from the HLR.
z Peremptory Not Support: The initial configuration of the system determines that the HLRs with
the specified HLR number prefix do not support the ADD service. The data of ADD support
capability is not updated subsequently based on the location update response from the HLR.
Configuration Script
The configuration flow of the ADD service is as follows:
Step 1 Configure the data in the local office to support the ADD service.
Description Configure the data in the local office to support the ADD service.
Remark None.
Step 2 Configure the ADD support strategy of the HLR in the default HLR list.
Description Configure the HLR with number prefix 8613755 to peremptorily support
the ADD service.
Script ADD ADDSUPHLR: HLRNUMPREFIX=K'8613755, IFSUPADD=PS;
Remark 127 HLR items can be configured at most by running this command.
Description Query the configuration item of HLR with number prefix 8613755 in the
HLR list.
Script LST ADDSUPHLR: HLRNUMPREFIX=K'8613755;
Remark If the prefix of HLR number is not entered, all HLR lists and configuration
items are listed.
----End
Table 37-6 Name and function of tables related to the ADD service
Figure 37-3 shows the table query flow of the ADD service.
Start
Querying
the tbl_MAPCfg table
No
to determine whether the local
MSC supports ADD is
successful.
Yes
Yes
Querying
Querying the tbl_HLRADDList
the tbl_ImsiHome table No table to check whether the No.0 No
Carrying out the original
to obtain the HLR number of record determines the peer location update flow.
the subscriber is HLR supports ADD
successful. by default
Yes
Yes
Querying the
tbl_HLRADDList table No
to determine whether the peer
HLR supports ADD
Yes
Operations by MS None.
mobile
subscribers
37.7 Reference
37.7.1 Specifications
Reference list of this service is as follows:
z 3GPP TS 23012
z 3GPP TS 29002.
37.8 FAQ
37.8.1 Problem Description
The command ADD ADDSUPHLR is run and the home HLR is configured for the support of
ADD, but the IMEISV is not carried in HLR location update message.
37.8.3 Method
Run ADD IMSIHOME to match the IMSI of the subscriber with the HLR number.
Contents
38.10 Reference...............................................................................................................................................38-12
38.10.1 Specifications...............................................................................................................................38-12
38.10.2 Glossary, Acronyms and Abbreviations .......................................................................................38-12
38.11 FAQ .......................................................................................................................................................38-13
Figures
Figure 38-4 Table query flow of noise suppression service (Support noise removing benefit peer end) ....... 38-11
Tables
38 Noise Suppression
Section Describes
38.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
38.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
38.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
38.4 Service Flow The flow of the service.
38.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
38.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
38.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
38.8 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
38.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
38.10 Reference The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
38.11 FAQ The frequently asked questions related to the service and
the solutions.
38.1.2 Definition
Name Definition
Noise suppression feature The feature provides the following two functions: Noise
removing benefit local end and Noise removing benefit
peer end.
z Noise removing benefit local end: When this function is
selected, the system effectively reduces the noise brought
by the background sound of the peer end during the call in
order that the local end receives higher-quality voice.
z Noise removing benefit peer end: When this function is
selected, the system effectively reduces the noise brought
by the background sound of the local end during the call in
order that the peer end receives higher-quality voice.
Noise suppression After configured with the MGW and trunk group information, the
feature MSC server sends messages to support noise suppression service
when the network bearer is set up.
The functions provided by the noise suppression service are
subordinated to the enhanced voice service. Currently, noise
suppression provides only two functions: noise suppression beneficial
to the local end and noise suppression beneficial to the peer end. The
noise suppression is applied to only voice service and cannot be used
with data service. The switch and direction (local end beneficial, peer
end beneficial or mutually beneficial) of the noise suppression are
controlled by the MSC server through the MC interface.
The degree of noise suppression is configured by the SET
VQEPARA command. (In this manual, the MGW delivered with the
MSC Server is the UMG8900 of Huawei. For configuring other
MGWs, refer to the UMG8900.)
38.1.5 Benefits
Beneficiary Describes
Carrier The service satisfies the needs of subscribers and improves the quality
of call and the satisfaction of subscribers.
Mobile subscriber Subscribers receive high-quality calls after the system supports the
noise suppression feature.
38.2 Availability
38.2.1 Requirements for NEs
The function of the noise suppression service is implemented by the MSC Server and MGW.
See Table 38-2.
- - - √ √ - - -
38.2.4 Others
None.
The MGW analyzes the received messages of noise suppression parameters and enables the
noise suppression function on the corresponding port.
MSC Server
(MSOFTX3000-1)
MGW1 Subscriber B
Bearer
network
Trunk group1
Subscriber A
As shown in Figure 38-1, the calls of subscribers A and B are borne over trunk group1 and
MGW1. On the MSC Server, the operator must configure the noise suppression function for
trunk group1 and MGW1.
z If the noises that are caused by subscriber B's background voice and that subscriber A
hears must be reduced, set Enhanced voice attribute to Noise removing benefit local
end.
z If the noises that are caused by subscriber A's background voice and that subscriber B
hears must be reduced, set Enhanced voice attribute to Noise removing benefit peer
end.
Whether the MSC Server sends noise suppression parameters to the MGW is determined by the MGW
noise suppression configuration and trunk group noise suppression configuration in the MSC Server.
Only when the noise suppression function is configured for the MGW and trunk group in the MSC
Server database, the information that the MSC Server sends to the MGW carries the noise suppression
parameters and the noise suppression is valid.
ADD(NR/NRDIR)
ADD Reply
Call Connection
z Whether the noise suppression service is supported depends on the VQE resource configured on the
UMG8900. Only one VQE subboard can be inserted in a VPU board. Configure related parameters
of the noise suppression by the SET VQEPARA command on the MGW before using the function.
After that, configure related parameters of the noise suppression by the following parameters on the
MSOFTX3000:
− Special attributes in ADD/MOD MGW
− Enhanced voice attribute in ADD/MOD N7TG, ADD/MOD CASTG, ADD/MOD PRATG
and ADD/MOD AIETG
z When the common channel signaling connects the voice call, the trunk group table is queried before
the bearer is established. If the A interface trunk module connects the voice call, the module obtains
the information of noise suppression from the result returned from A interface routing.
z If the R2 trunk is used, the noise suppression function is enabled. The system can enable the noise
suppression function only in the state of Ringing Mode or listening to the ring back tone.
z If the common channel trunk, the A interface trunk or R2 trunk is used, the noise suppression
function is disabled. If the noise suppression function is enabled, and the handover from voice to
data during the call occurs, the MSC server sends the Modify messages to the MGW, indicating
disabling the noise suppression service.
Scenario Description 1
As shown in Figure 38-1, the preconditions on MSOFTX3000-1 are as follows:
z The link between MSOFTX3000-1 and MGW1 is configured and activated. Office
direction, route, sub-route, route analysis and call prefix are all configured, and the
hardware is normal.
z Noise removing benefit local end and Noise removing benefit peer end are not
configured on MGW1.
z Trunk group name is set to NRTG, MGW name to MGW1, Circuit type to ISUP,
Sub-route name to PSTN, DPC to 123456, and Call source name to CALLSRC.
The operator must perform the noise suppression for the calls between subscribers A and B on
trunk group1 to reduce the noises caused by the peer background voice.
Description Set Trunk group name to NRTG, MGW name to MGW1, Circuit type
to ISUP, Sub-route name to PSTN, DPC to 123456, and Call source
name to CALLSRC, and select Noise removing benefit local end and
Noise removing benefit peer end for Enhanced voice attribute.
Script ADD N7TG: TGN="NRTG", MGWNAME="MGW1", CT=ISUP,
SRN="PSTN", SDPC="123456", CSCNAME="CALLSRC",
RELRED=NO, EVA=NRLE-1&NRPE-1;
Description List the trunk group of which Enhanced voice attribute is configured.
Note None.
Description Select Support Noise removing benefit local end and Support Noise
removing benefit peer end for Special attribute.
----End
Note None.
Figure 38-3 Table query flow of noise suppression service (Support noise removing benefit local
end)
Start
Yes
Figure 38-4 Table query flow of noise suppression service (Support noise removing benefit peer
end)
Start
Yes
38.10 Reference
38.10.1 Specifications
ITU-T G.160 draft
Acronym
Acronym Full Name
38.11 FAQ
None.
Contents
Figures
Figure 39-1 TDM circuit selection based on the service type ..........................................................................39-4
Tables
Table 39-1 NE required to implement the function of TDM circuit selection based on service type ...............39-3
Table 39-2 The version of the Huawei UMTS CS product that supports TDM circuit selection based on service
type....................................................................................................................................................................39-4
Section Describes
39.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
39.2 Availability The NEs required to implement the service, requirements
for the license, and versions of the products applicable to
the service.
39.3 Working Principle The functions of the NEs used to implement the service
and the requirements on the networking.
39.4 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
39.5 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
39.6 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
39.7 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
39.8 Service Interaction The association between the service and other services as
well as the restrictions on each other.
39.9 FAQ The frequently asked questions related to the service and
the solutions.
39.1.2 Definition
If the TDM bearer is adopted between two media gateways (MGWs), the carrier can use the
compression device for data transmission. Thus, when a service with a large amount of data,
such as the video phone (VP) service, is used, the data may be long delayed after processed by
the compression device.
To reduce the transmission cost in the MGW, this function solves this problem with the
following methods:
z The traffic of the services with a large amount of data (such as VP calls) goes through the
TDM circuits that are not connected to the compression device.
z The traffic of the services with small amount of data (such as voice calls) goes through
the TDM circuits that are connected to the compression device.
TDM circuits The number of TDM circuits between MGWs in the local office must
not be more than 100,000.
Compression The TDM circuits that are connected to the compression device are
circuits and called compression circuits. The TDM circuits that are not connected
non-compression to the compression device are called non-compression circuits. The
circuits compression attribute of a TDM circuit must be consistent with the
connection of the circuit to the compression device.
39.1.5 Benefits
Beneficiary Description
Carrier The carrier can choose the TDM bearer (compression circuits or
non-compression circuits) based on the service requirement. Thus, not
only the requirement of subscribers can be fulfilled, but also the
quantity of the transmission devices can be reduced.
39.2 Availability
39.2.1 Requirements for NEs
To implement TDM circuit selection based on service type, the MSC Server and the MGW
are required, as described in Table 39-1.
Table 39-1 NE required to implement the function of TDM circuit selection based on service type
UE NodeB RNC MSC MGW SGSN GGSN HLR
Server
- - - √ √ - - -
The symbol "√" indicates that the NE is required to implement the function.
Table 39-2 The version of the Huawei UMTS CS product that supports TDM circuit selection
based on service type
39.2.4 Others
None.
MGW B
Circuit A Circuit A
MGW A MGW C
z Circuit A is the non-compression circuit. Data transmission is not delayed when the data is
transmitted through circuit A.
z Circuit B is the compression circuit. Data transmission is delayed when transmitted through circuit B.
The delay of the transmission for a service with small amount of data, however, does not affect the
usage of the service.
For intra-office data transmission, the MSC Server can implement the selection of TDM
circuits based on the service type, in either of the following modes:
z For calls that require a certain bearer capability, only one type of TDM circuit is selected.
For example, for the VP service, only the non-compression TDM circuits are selected.
z For a type of calls, a certain type of circuit is assigned with higher priority. When the
circuits with higher priority are unavailable, the circuits of the other type can be selected.
For example, the compression TDM circuits are selected in preference to voice services.
When all the circuits of this type are seized, the non-compression TDM circuits are
selected.
For inter-office data transmission, the MSC Server implements the selection of TDM circuits
based on the service type, in the following mode:
The transmission capability of circuits is configured through ADD RTANA. When calls are
routed out of the office, the ISUP trunk groups (compression circuits or non-compression
circuits) are selected based on the service. Thus, data of calls with a large amount of data are
not transmitted through the compression device. The data transmission is not delayed and
therefore, the quality of the calls can be ensured. Calls with a small amount of data are
processed by the compression device. The delay of data transmission, however, is not long
and therefore is acceptable.
It specifies the type of services that can be carried out during calls, for example, the voice,
data, or audio service.
Compress Flag
It is one of the match check conditions for TDM circuit selection during a call. For the
specified transmission capability, this parameter specifies the type of TDM circuit used by the
service carried out during the call: TDM circuit with the compress capability or TDM circuit
without the compress capability. This parameter is used in ADD INTTERM.
Allow Select Other TDM Circuit
It is one of the match check conditions for TDM circuit selection during a call. In the
condition that Compress Flag is set for the specified transmission capability, if no TDM
circuit with the specified compress capability is available, this parameter specifies whether the
other type of TDM circuit or no TDM circuit is selected. If no TDM circuit is selected, the
call is released.
Configuration Scripts
Step 1 Add an internal TDM circuit.
Remark The parameter Compress Flag is newly added. It specifies whether the
TDM circuit is a compression circuit or a non-compression circuit.
Note:
The compression TDM circuits are configured by the E1 line. That is, an
E1 line cannot include both compression TDM circuits and
non-compression TDM circuits.
Step 3 Add the mapping between the transmission capability and the compression flag.
Description Add the mapping between the transmission capability and the compression
flag.
Step 4 Add the mapping between the transmission capability and the compression flag.
Description Add the mapping between the transmission capability and the compression
flag.
Script ADD TRCAPTOCFLAG: TC= VIDEO, CF=NOCOMP,
SLCTTDM=ALLOW;
Remark This command is used to define that the non-compression TDM circuits are
used in preference for the video service and the other type of TDM circuits
can also be used.
----End
Scenario Description 2
z Adding route analysis data in which the parameters are as follows:
− Route selection name: set to rt_sel_1
− Route selection source name: set to rt_src_sel_1
− Transmission capability: set to All categories
− Route name: set to rt_1
− Signaling priority: set to Prefer to select ISUP
Configuration Scripts
Step 1 Add route analysis data.
Remark This command is used to define that the route can bear all types of services.
The trunk groups in the route must be able to bear the voice service and
video service.
Remark This command is used to add an inter-office ISUP trunk group that can
bear the voice service only. All the circuits in this trunk group are
connected to the compression device.
Remark This command is used to add an inter-office ISUP trunk group that can
bear the video service only. None of the circuits in this trunk group is
connected to the compression device.
----End
39.9 FAQ
None.
Contents
40 BICC and ISUP Route Allowed for the Same Office Direction....................................40-1
40.1 Service Description ...................................................................................................................................40-2
40.1.1 Function Code..................................................................................................................................40-2
40.1.2 Definition .........................................................................................................................................40-2
40.1.3 Standard Compliance .......................................................................................................................40-3
40.1.4 System Specifications ......................................................................................................................40-3
40.1.5 Benefits ............................................................................................................................................40-4
40.1.6 Application Scenario ........................................................................................................................40-4
40.1.7 Application Limitations....................................................................................................................40-5
40.2 Availability ................................................................................................................................................40-6
40.2.1 Requirements for NEs......................................................................................................................40-6
40.2.2 Requirements for License ................................................................................................................40-6
40.2.3 Supporting Versions .........................................................................................................................40-6
40.2.4 Others...............................................................................................................................................40-6
40.3 Working Principle......................................................................................................................................40-6
40.3.1 Functions of the NEs........................................................................................................................40-6
40.3.2 Internal Processing of the System ....................................................................................................40-6
40.3.3 External Interfaces ...........................................................................................................................40-8
40.4 Service Flow..............................................................................................................................................40-8
40.5 Data Configuration....................................................................................................................................40-8
40.5.1 Overview..........................................................................................................................................40-8
40.5.2 Data Configuration at the MSOFTX3000 Side................................................................................40-8
40.5.3 Data Configuration at the UMG8900 Side..................................................................................... 40-11
40.5.4 Data Configuration Examples ........................................................................................................40-12
40.6 Service Management ...............................................................................................................................40-16
40.6.1 Operations by Carriers ...................................................................................................................40-16
40.6.2 Operations by Mobile Subscribers .................................................................................................40-16
40.7 Charging and CDR ..................................................................................................................................40-16
40.8 Performance Measurement......................................................................................................................40-16
40.9 Service Interaction ..................................................................................................................................40-16
40.10 References .............................................................................................................................................40-17
40.10.1 Standards and Specifications........................................................................................................40-17
Figures
Tables
Table 40-1 Function code of the BICC and ISUP route allowed for the same office direction service ............40-2
Table 40-2 Key parameter used in this service .................................................................................................40-3
Table 40-3 Benefits of the BICC and ISUP route allowed for the same office direction service .....................40-4
Section Describes
40.1 Service Description The function code and definition of the service and the
benefits of the service to carriers and mobile subscribers.
40.2 Availability The NEs required to implement the service, requirements for
the license, and versions of the products applicable to the
service.
40.3 Working Principle The functions of the NEs used to implement the service and
the requirements on the networking.
40.4 Service Flow The flow of the service.
40.5 Data Configuration The data configuration that must be performed at the
MSOFTX3000 side and the UMG8900 side as well as the
examples of data configuration.
40.6 Service Management The operations that carrier and mobile subscribers must
perform when the service is provided.
40.7 Charging and CDR The procedure for performing charging and generating
CDRs when the service is provided.
40.8 Performance The influence of the service on performance measurement
Measurement and the implementation of performance measurement.
40.9 Service Interaction The association between the service and other services as
well as the restrictions on each other.
40.10 References The standards and specifications with which the service
complies and the glossary, abbreviations, and acronyms
used in this chapter.
Section Describes
40.11 FAQ The frequently asked questions related to the service and the
solutions.
Table 40-1 Function code of the BICC and ISUP route allowed for the same office direction
service
Name Code
BICC and ISUP route allowed for the same office direction WMFD-165000
40.1.2 Definition
At present, in networks of China Mobile, the signaling transmitted between the end office and
tandem office is ISUP signaling. The ISUP signaling is transferred by the MGW and
transmitted over an M3UA/MTP route. During network consolidation, the signaling
transmitted between the end office and tandem office changes gradually from ISUP signaling
to BICC signaling. In addition, BICC signaling must be transmitted over direct M3UA routes.
That is, for the same office direction, BICC signaling can be transmitted over direct M3UA
routes and ISUP signaling can be transmitted over M3UA/MTP routes at the same time for a
certain period, as shown in Figure 40-1.
M3UA
ISUP
MTP
MGW MGW
This service requires that ISUP signaling should be transmitted over an existing non-direct
route (such as MSC Server A -> MGW -> MGW -> MSC Server B) and should be transferred
by the MGW. It also requires that BICC signaling should be transmitted over a direct M3UA
route (such as MSC Server A -> MSC Server B). Moreover, the non-direct M3UA/MTP route
and direct M3UA route are not required to provide the disaster tolerance function. In other
word, when the transmission of BICC signaling over the direct M3UA route fails, the BICC
signaling cannot be transmitted over the route over which ISUP signaling is transmitted.
When the transmission of ISUP signaling over the non-direct route fails, the ISUP signaling
cannot be transmitted over the direct route over which BICC signaling is transmitted.
Bearer select mode It specifies the selection mode of the bearer for message
transmission. In other words, it specifies whether the system
attempts to use other bearers such as MTP routes to send
subscriber messages after the failure of transmission over
M3UA routes. By default, subscriber messages are sent
through M3UA routes. If the transmission fails, the system
attempts to use MTP routes.
40.1.5 Benefits
Table 40-3 lists the benefits of the BICC and ISUP route allowed for the same office direction
service.
Table 40-3 Benefits of the BICC and ISUP route allowed for the same office direction service
Beneficiary Description
Carriers This service enables carriers to gradually cut over from ISUP
signaling links to BICC signaling links without changing the current
networking mode.
Scenario 1
BICC signaling is transmitted over a direct M3UA route, while ISUP signaling is transmitted
over a non-direct M3UA route and transferred by the MGW. The two routes do not provide
the disaster tolerance function. Figure 40-2 shows the scenario.
M3UA
MGW
Scenario 2
BICC signaling is transmitted over a direct M3UA route, while ISUP signaling is transmitted
over an alternative MTP route. The two routes do not provide the disaster tolerance function.
Figure 40-3 shows the scenario.
M3UA
MGW
Scenario 3
BICC signaling is transmitted over a direct M3UA route, while ISUP signaling is transmitted
over a direct MTP route. The two routes do not provide the disaster tolerance function. Figure
40-4 shows the scenario.
M3UA
MGW
40.2 Availability
40.2.1 Requirements for NEs
The service is implemented by only the MSC Server, as shown in Table 40-4.
- - - √ - - - -
40.2.4 Others
None.
Through data configuration, BICC signaling and ISUP signaling can be in the same office
direction. The office direction of the following sub-routes can be configured to the same:
z Narrowband sub-route: SS7 trunk, CAS trunk, and PRA trunk can be configured.
z Broadband sub-route: SIP trunk and BICC trunk can be configured.
percentage, the central database board selects a sub-route based on the percentage. This
ensures load sharing of the bearer network.
M3UA Module
z Preconditions of running ADD M3DS
To add an M3UA destination entity additional service, you must run ADD M3DE to add
an M3UA destination entity. The method of configuring the parameters is the same as
before. The setting of Bearer select mode of ADD/MOD M3DS is involved in this
service.
Before adding an M3UA destination entity additional service, you must set Destination
entity type to Signaling gateway or Application server, and Network mode to Shared
SPC by running ADD M3DE.
z ADD M3DE
The following describes the key parameters of ADD M3DE. For details, refer to the
online help.
Destination entity name
It specifies an M3UA destination entity in the MSOFTX3000 configuration database.
The value range is a character string of up to 32 characters. The rules for setting the
parameter are as follows:
− When there are direct M3UA signaling routes between the MSOFTX3000 and the
peer signaling device, you must specify the signaling device as a destination entity.
For example, if the MSOFTX3000 interconnects directly with the SG, MSC Server,
HLR, SCP and softswitch devices through M3UA links, these devices have to be
defined to be destination entities.
− When the peer signaling device is a destination signaling point (DSP), the signaling
device must be defined to be a destination entity. For example, the MSOFTX3000
interconnects with five MSCs and two PSTN switches through the transfer of the SG
and signaling transfer point (STP). You must specify seven destination entities (STP
is excluded).
Destination entity type
It is a parameter for interworking between the MSOFTX3000 and M3UA signaling
device. The parameter specifies the application mode of the destination entity in an
M3UA link set. The rules for setting the parameter are as follows:
− For a non-peer-to-peer network, if the destination entity is MSC, BSC, RNC, HRL or
SCP that interconnects with the MSOFTX3000 through the SG, set this parameter to
Signaling point.
− For a non-peer-to-peer network, if the destination entity is an SG that is directly
connected to the MSOFTX3000, set this parameter to Signaling gateway.
− For a non-peer-to-peer network, if the MSOFTX3000 functions as an integrated SG,
set this parameter to Application server, that is, the destination entity is an AS.
− For a peer-to-peer network, if the destination entity is an MSC Server, HRL, SCP or
softswitch that directly interconnects with the MSOFTX3000 through M3UA links
(not transferred through the SG), set this parameter to Application server.
Network mode
It specifies whether the M3UA destination entity interconnected with the MSOFTX3000
has an exclusive signaling point code or shares a signaling point code with other network
elements. The parameter is valid only when Destination entity type is set to
Application server or Signaling gateway. The value options are Exclusive SPC and
Shared SPC. The default value is Exclusive SPC.
If it is set to Shared SPC, the M3UA destination services must be configured (ADD
M3DS).
z ADD M3DS
The following introduces the key parameter description of ADD M3DS. For details,
refer to the online help.
Additional service name
It specifies an M3UA additional service name in the configuration database.
Destination entity name
It specifies the destination entity to which the MSOFTX3000 transfers the received
M3UA messages from the originating signaling point. The parameter must be defined by
ADD M3DE.
Service indicator
It specifies the scope in which the MSOFTX3000 transfers the M3UA messages. That is,
the MSOFTX3000 transfers only the M3UA messages which the value of Service
indicator field matches the service indicator defined here. Otherwise, the MSOFTX3000
discards the M3UA message. When Service indicator is set to All, it indicates that the
MSOFTX3000 does not analyze the Service indicator field in the M3UA messages.
Bearer select mode
It specifies the selection mode of the bearer for message transmission. In other words, it
specifies whether other bearers such as MTP are used to send subscriber messages after
the failure of transmission through M3UA. By default, subscriber messages are sent
through M3UA. If the transmission fails, MTP is used instead.
If you need to enable this service, configure this parameter.
Start CIC and End CIC
The parameter is valid only when Service indicator is set to TUP, ISUP, or BICC. It
specifies the scope in which the MSOFTX3000 transfers the M3UA messages. That is,
the MSOFTX3000 transfers only the M3UA messages in which the value of the CIC
field matches the CIC value defined here. Otherwise, the MSOFTX3000 discards the
M3UA message. If Start CIC and End CIC are not specified, it indicates that the
MSOFTX3000 does not analyze the CIC field in the M3UA messages.
BICC Module
ADD/MOD/LST OFC is required for data configuration at the MSOFTX3000 side.
ADD OFC
The following introduces the key parameter description of ADD OFC. For details, refer to the
online help.
Office Type
It specifies the type of an office direction. When the parameter is set to Common Office, only
ISUP trunk or BICC trunk can be configured for this office direction. When the parameter is
set to Mix Office, both ISUP trunk and BICC trunk can be configured for this office direction;
however, Signaling type can be set to BICC over MTP3/M3UA_272, BICC over MTP3B,
BICC over SCTP, or BICC over M3UA_4096 only. The default value is Common Office.
Signaling type
It is valid when Office Type is set to Common Office. The value options are as follows:
z Non-BICC signaling
z BICC over MTP3/M3UA_272
z BICC over MTP3B
z BICC over SCTP
z BICC over M3UA_4096
z IMS Ofc
z NGN Ofc
The default value is Non-BICC signaling.
BICC Signaling type
It is valid when Office Type is set to Mix Office. The value options are as follows:
z BICC over MTP3/M3UA_272
z BICC over SCTP
z BICC over M3UA_4096
The parameter is mandatory. There is no default value.
MOD OFC
The parameters of MOD OFC involved in this service are the same as those of ADD OFC.
All the parameters of MOD OFC do not have default values.
When modifying an office type, you must comply with the following rules:
z To modify the value of Office Type from Mix Office to Common Office, do as follows:
− If you modify an office direction with both ISUP/TUP signaling and BICC signaling
to the one with only BICC signaling by modifying Office Type, ensure that the value
of Signaling type is the same as that of BICC signaling type and no ISUP trunk
group is configured for the common office direction.
− If you modify an office direction with both ISUP/TUP signaling and BICC signaling
to the one with only ISUP/TUP signaling by modifying Office Type, ensure that
Signaling type is set to Non-BICC signaling (instead of IMS Ofc and NGN Ofc). In
addition, you must ensure that the following conditions are met:
Condition 1 If you modify the value of Signaling type from BICC over SCTP
to Non-BICC signaling, ensure that no SCTP link or BICC trunk
group exists.
Condition 2 If you modify the value of Signaling type from BICC over
MTP3/M3UA_272 to Non-BICC signaling, ensure that no BICC
trunk group exists.
z To modify the value of Office Type from Common Office to Mix Office, do as follows:
− If you modify an office direction with only ISUP/TUP signaling to the one with both
ISUP/TUP signaling and BICC signaling by modifying Office Type, you can modify
the value of Signaling type to only BICC over MTP3/M3UA_272, BICC over
SCTP, or BICC over M3UA_4096. If Signaling type is set to IMS Ofc or NGN
Ofc, you cannot modify the value of Office Type to Mix Office.
− If you modify an office direction with only BICC signaling to the one with both ISUP
signaling and BICC signaling by modifying Office Type, ensure that the value of
BICC Signaling type (after modification) is the same as that of Signaling type
(before modification).
LST OFC
LST OFC is used to query the information of the office direction data record in the
configuration database.
ISUP Module
z When you run ADD N7TG to add an ISUP trunk group before enabling this service, if
Signaling type of ADD OFC is not set to Non-BICC signaling, you will fail to add the
ISUP trunk group.
z When you run ADD N7TG to add an ISUP trunk group after enabling this service, if
Signaling type of ADD OFC is not set to Non-BICC signaling and Office Type is set
to Common Office, you will fail to add the ISUP trunk group.
z When you run ADD N7TG to add an ISUP trunk group after enabling this service, if
Signaling type of ADD OFC is not set to Non-BICC signaling and Office Type is set
to Mix Office, you will succeed in adding the ISUP trunk group.
z The rules for setting other parameters are the same as those used before this service is
enabled.
Description Use the default values to configure an M3UA destination entity additional
service. Set Additional service name to M3DS, Destination entity name
to M3DE, and Service indicator to BICC.
Script ADD M3DS: DSNM="M3DS", DENM="M3DE", SI=BICC;
Description Set Bearer select mode to M3UA Only, and Additional service name to
M3DS.
Script MOD M3DS: DSNM="M3DS", BSM=M3UA;
----End
Description Set Trunk group name to ISUP_MTP3, MGW name to MGW1, Circuit
type to ISUP, Sub-route name to ISUP_MTP3, OPC to 2a1114, DPC to
2a1113, and Call source name to CALLSRC.
Script ADD N7TG: TGN="ISUP_MTP3", MGWNAME="MGW1", CT=ISUP,
SRN="ISUP_MTP3", SOPC="2a1114", SDPC="2a1113",
CSCNAME="CALLSRC", RELRED=NO;
----End
----End
----End
Description Set Office Type to Mix Office, and BICC Signaling type to BICC over
MTP3/M3UA_272.
Script LST OFC: OFCTYPE=MIX, BICCSIG=MTP3;
40.10 References
40.10.1 Standards and Specifications
None.
40.11 FAQ
None.