Professional Documents
Culture Documents
HiPath
HiPath Gateway 3550
HiPath HG 3550
Technical Description
*1PA31003-H3101-C104-1-7620*
1P A31003-H3101-C104-1-7620
This device has been manufactured in accordance with our certified envi-
ronmental management system (ISO 14001). This process ensures that en-
ergy consumption and the use of primary raw materials are kept to a mini-
mum, thus reducing waste production.
The informaton in this document contains general descriptions of the technical options available, which do not
always have to be present in individual cases.
The required features should therefore be specified in each individual case at the time of closing the contract.
Siemens AG 2002 Information and Communication Networks, Hofmannstraße 51, D-81359 München, Germany
●
Content 0
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 0-1
tedTOC.fm
A31003-H3101-C104-1-7620, 2002-04-25
0-2 HG3550, Technical Description
tedTOC.fm
Nur für den internen Gebrauch Content
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 0-3
tedTOC.fm
A31003-H3101-C104-1-7620, 2002-04-25
0-4 HG3550, Technical Description
tedLOF.fm
Nur für den internen Gebrauch List of Figures
List of Figures 0
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 0-5
tedLOF.fm
A31003-H3101-C104-1-7620, 2002-04-25
0-6 HG3550, Technical Description
tedLOT.fm
Nur für den internen Gebrauch List of Tables
List of Tables 0
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 0-7
tedLOT.fm
List of Tables Nur für den internen Gebrauch
A31003-H3101-C104-1-7620, 2002-04-25
0-8 HG3550, Technical Description
ted1.fm
Nur für den internen Gebrauch Introduction
Business advantages of IP telephony
1 Introduction
The HiPath HG 3550 is a new-generation Voice over Internet Protocol (VoIP) gateway. It is used
to through-connect connections between IP-based networks (LANs, intranets, Internet) and cir-
cuit-switched networks (ISDN, PSTN).
This Technical Description (TED) describes the functionality and the architecture of the
HiPath HG 3550.
This chapter gives you a first overview of the HiPath HG 3550 applications and the documen-
tation architecture. It contains the following sections:
Section 1.1, “Business advantages of IP telephony”
Section 1.2, “Summary of features”
Section 1.3, “Contents of this description”
Section 1.4, “Associated documents”
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 1-1
ted1.fm
Introduction Nur für den internen Gebrauch
Summary of features
A31003-H3101-C104-1-7620, 2002-04-25
1-2 HG3550, Technical Description
ted1.fm
Nur für den internen Gebrauch Introduction
Contents of this description
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 1-3
ted1.fm
Introduction Nur für den internen Gebrauch
Associated documents
A31003-H3101-C104-1-7620, 2002-04-25
1-4 HG3550, Technical Description
ted2.fm
Nur für den internen Gebrauch H.323 IP Telephony
2 H.323 IP Telephony
This chapter describes basic protocols and components in an H.323 IP telephony network and
contains the following sections:
Section 2.1, “Components of H.323 networks”
Section 2.2, “H.323 and related protocols”
Section 2.3, “The HiPath HG 3550 as an H.323 gateway”
Section 2.4, “IP Trunking with the HiPath HG 3550”
Abstract
H.323 describes how voice (i.e., telephone) and fax traffic is handled on packet-based networks
such as IP networks. The relevant standards are defined in the H.323 series of ITU-T (Interna-
tional Telecommunication Union – Telecommunication Standardization Sector) recommenda-
tions.
These standards define how participating devices set up calls, exchange compressed audio
and video data, participate in multi-unit conferences, and co-operate with non-H.323 endpoints.
H.323 allows customers to use multimedia applications without changing their network (LAN)
infrastructure.
H.323 provides:
● call control and management for point-to-point and multipoint conferences,
● quality of service (QoS) control with a centralized gatekeeper component to manage media
traffic, bandwidth, and user participation,
● gateway functions enabling calls to be set up between the LAN and the public switched
telephone network (PSTN) and to H.323 standards-based terminals.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 2-1
ted2.fm
H.323 IP Telephony Nur für den internen Gebrauch
Components of H.323 networks
2.1.3 Gatekeepers
A gatekeeper routes calls to their destinations. It provides address resolution and accounting
services. A gatekeeper provides call control services for H.323 endpoints, such as:
● translation between telephone numbers and IP addresses,
● address translation from LAN aliases for terminals and gateways to IP or IPX addresses,
● bandwidth management to limit the conferencing bandwidth to a fraction of the total avail-
able bandwidth.
A31003-H3101-C104-1-7620, 2002-04-25
2-2 HG3550, Technical Description
ted2.fm
Nur für den internen Gebrauch H.323 IP Telephony
H.323 and related protocols
2.1.4 Routers
A router forwards data packets over the IP network. Typical data packets travel across several
routers from their source to their destination.
2.1.6 Servers
Supplementary servers may be used for authorization and call-pick up.
2.1.7 Gateways
An H.323 gateway interconnects H.323 endpoints on IP-based networks to non-H.323 entities
(e.g., telephones on public circuit-switched networks). It provides the protocol translation be-
tween different transmission formats, communications procedures, and audio codecs.
The gateway also authenticates the participants. (This function can also be undertaken by the
HiPath 4000 server.) Authentication is a mechanism to verify the identities of endpoints partic-
ipating in a conference.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 2-3
ted2.fm
H.323 IP Telephony Nur für den internen Gebrauch
H.323 and related protocols
2.2.4 H.235
This protocol defines signaling for the authentication of users and components, as well as for
the encryption of data.
2.2.6 H.323
This is a standard developed for packet-based multimedia communication systems by the In-
ternational Telecommunication Union (ITU).
2.2.7 H.341
This protocol defines the management information base (MIB) for controlling and managing an
H.323 network.
2.2.8 H.450
This protocol series defines signaling between endpoints for supplementary services such as
call transfer. Call transfer allows a call between two endpoints to be rerouted to a third endpoint.
A31003-H3101-C104-1-7620, 2002-04-25
2-4 HG3550, Technical Description
ted2.fm
Nur für den internen Gebrauch H.323 IP Telephony
H.323 and related protocols
2.2.10 TCP
The Transmission Control Protocol (TCP) provides a connection-oriented mode for data trans-
mission. TCP guarantees the sequenced, error-free, flow-controlled transmission of data pack-
ets, but can therefore delay transmission and reduce throughput. H.323 uses TCP end-to-end
services for the H.245 control channel, the data channels, and the call signaling channel.
2.2.11 UDP
User Datagram Protocol (UDP) provides a connectionless transmission mode that promises
nothing more than “best-effort” delivery. UDP offers minimal control information. H.323 uses
UDP for the audio, video, and the RAS channel (see RFC 768).
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 2-5
ted2.fm
H.323 IP Telephony Nur für den internen Gebrauch
The HiPath HG 3550 as an H.323 gateway
An important feature of this version of HiPath HG 3550 is that it can be configured to work
through a HiPath IP Trunking gatekeeper, in conjunction with other gateways. The gatekeepers
are used to create address spaces (H.323 zones).
A31003-H3101-C104-1-7620, 2002-04-25
2-6 HG3550, Technical Description
ted2.fm
Nur für den internen Gebrauch H.323 IP Telephony
IP Trunking with the HiPath HG 3550
Up to 300 HiPath HG 3550s may be linked together. They may be devided into several subdo-
mains, where one subdomain contains two HiPath IP Trunking gatekeepers and up to 30
HiPath HG 3550 gateways. The secondary HiPath IP Trunking gatekeeper of a subdomain pro-
vides a reliability enhancement, as it takes over the operation in case of failure of the primary
gatekeeper.
Three trunking modes are provided:
● Trunking without HiPath IP Trunking gatekeeper
The HiPath HG 3550 provides the point-to-point routing.
● Single Subdomain Trunking
Two HiPath IP Trunking gatekeepers are provided in one subdomain, where each gate-
keeper control its own H.323 zone. Each HiPath HG 3550 is registered either with the pri-
mary or the secondary gatekeeper.
● Multiple Subdomain Trunking
This trunking mode provides for two or more single subdomains. Each HiPath HG 3550 is
registered either with the primary or the secondary gatekeeper. The HiPath HG 3550 gate-
ways of one zone communicate directly among each other.
The multiple subdomain trunking functionality are realized for specific projects
> only.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 2-7
ted2.fm
H.323 IP Telephony Nur für den internen Gebrauch
IP Trunking with the HiPath HG 3550
A31003-H3101-C104-1-7620, 2002-04-25
2-8 HG3550, Technical Description
ted3.fm
Nur für den internen Gebrauch Features
Throughput and speed
3 Features
This chapter describes the main features of the HiPath HG 3550. These include the following:
Section 3.1, “Throughput and speed”
Section 3.2, “Security”
Section 3.3, “Autodiscovery function”
Section 3.4, “Voice over IP”
Section 3.5, “Layer 2 and Layer 3 prioritization”
Section 3.6, “Voice quality”
Section 3.7, “Implementation of voice activity detection in HiPath HG 3550”
Section 3.8, “Overview of T.38 and transparent fax modes”
Section 3.9, “Routing Information Protocol (RIP)”
Section 3.10, “Support for Hunting Groups”
Section 3.11, “Bandwidth efficiency”
Section 3.12, “Conferencing using an external MCU”
Section 3.13, “Clear channel”
Section 3.14, “Numbering plan integration”
3.2 Security
The HiPath HG 3550 is designed to be used in a customer’s intranet, which is inherently a se-
cure environment. The HiPath HG 3550 employs the security mechanisms of the gatekeeper
(see Section 2.1) for all of its transmission functions. This includes supporting the HiPath 4000
password transmission mechanisms.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 3-1
ted3.fm
Features Nur für den internen Gebrauch
Autodiscovery function
A31003-H3101-C104-1-7620, 2002-04-25
3-2 HG3550, Technical Description
ted3.fm
Nur für den internen Gebrauch Features
Voice over IP
The HiPath HG 3550 supports G.729A (which does not use voice activity detection)
> and G.729AB (which uses voice activity detection). See Section 3.6.4 for more infor-
mation about voice activity detection (VAD).
3.4.2.1 DTMF
Dual-tone multifrequency (DTMF) is the type of audio signal used for tone dialing according to
ITU-T standard Q.24. It is used for call setup and post-dial purposes.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 3-3
ted3.fm
Features Nur für den internen Gebrauch
Voice over IP
A31003-H3101-C104-1-7620, 2002-04-25
3-4 HG3550, Technical Description
ted3.fm
Nur für den internen Gebrauch Features
Voice over IP
3.4.6.1 Trunking
Two or more private branch exchanges (PBXs) can be connected using HiPath HG 3550 gate-
ways in the trunking mode. This is done by using a proprietary tunneling protocol. The services
work transparently over the ‘IP-Trunk’.
The following switched-circuit network (SCN) services are supported in trunking calls:
● ISDN voice
● ISDN data
● Group 4 fax
● Video telephony (H.320)
● Modem (tone detection)
● Group 3 fax (configurable transmission mode G.711 transparent or T.38)
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 3-5
ted3.fm
Features Nur für den internen Gebrauch
Layer 2 and Layer 3 prioritization
Fallback to SCN works only if the connected PBX supports Call Rerouting on Cause
> Value.
A31003-H3101-C104-1-7620, 2002-04-25
3-6 HG3550, Technical Description
ted3.fm
Nur für den internen Gebrauch Features
Voice quality
The 802.1q VLAN configuration is a standard that simplifies setting up and defining VLANs in
a frame-based network (e.g., Ethernet). A field (or tag) is added to the frame format so that the
frame can be associated with a specific VLAN.
Layer 2 and 3 prioritization is managed in the WBM (see the Configuration Manual for more
details).
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 3-7
ted3.fm
Features Nur für den internen Gebrauch
Voice quality
3.6.3.1 HLB2
In the HLB2 jitter buffer algorithms, the local DSP statistics are used to sample network jitter in
the LAN. This sample is used to adjust the rate at which Real-time Transport Protocol (RTP)
packets are passed to the switched-circuit network (SCN). The adjustment is made by increas-
ing or decreasing the jitter buffer average delay in the DSP; an adjustment is made only if the
jitter changes significantly.
3.6.3.2 TIS
In the TIS algorithms, the jitter buffer compares the jitter in the current data with the known his-
tory of the destination. The buffer uses the result of the comparison to dynamically adjust the
rate at which packets are passed to the SCN. This results in more accurate jitter buffering from
the beginning of the connection because performance is immediately optimized to both the
destination and the current state of the system.
A31003-H3101-C104-1-7620, 2002-04-25
3-8 HG3550, Technical Description
ted3.fm
Nur für den internen Gebrauch Features
Implementation of voice activity detection in HiPath HG 3550
3.7.1.1 Receive
VAD is supported in the receive direction by all codecs in all cases (including G.723 low bit
rate).
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 3-9
ted3.fm
Features Nur für den internen Gebrauch
Overview of T.38 and transparent fax modes
3.7.1.2 Send
Whether or not VAD is used in the send direction depends on the codec selected.
A31003-H3101-C104-1-7620, 2002-04-25
3-10 HG3550, Technical Description
ted3.fm
Nur für den internen Gebrauch Features
Routing Information Protocol (RIP)
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 3-11
ted3.fm
Features Nur für den internen Gebrauch
Bandwidth efficiency
A31003-H3101-C104-1-7620, 2002-04-25
3-12 HG3550, Technical Description
ted3.fm
Nur für den internen Gebrauch Features
Numbering plan integration
Working principle
Once a call is received, the format of the number of the called party is analyzed (whether its
format is explicit or implicit). This format must be known for the gateway to be able to transfer
a party number (e.g., when calls are rerouted using the call transfer feature). Thereafter, the
number of the called party is converted to its lowest possible implicit format. The converted
number is used for call routing as defined by the dial plans, and the outdial rules are applied to
this number. The called party number as well as the calling party number are set to the same
format – implicit or explicit, depending on the outdial rule.
Before it is transmitted the calling number is modified according to the type of numbering (TON)
settings of the destination port. If there is no entry in the TON table for the destination port of
the call, the fully qualified format, which consists of country code, area code, location code, and
extension (E.164); or level 2 code, level 1 code, level 0 code, and extension (private numbering
plan) is used as the default for explicit numbers. For implicit numbers the lowest possible format
is used as the default.
For processing in the reversed call direction (e.g. for transmittal of a party number in case of a
call transfer) the number is converted to the format (implicit or explicit) as detected from the
original called party number. Before it is transmitted the number is modified according to the
type of numbering (TON) settings of the source port. If there is no entry in the TON table for the
used source port, the fully qualified format, which consists of country code, area code, location
code, and extension (E.164); or level 2 code, level 1 code, level 0 code, and extension (private
numbering plan) is used as the default for explicit numbers. For implicit numbers the lowest pos-
sible format is used as the default.
How the call numbers are modified thus depends on the settings of all of the following:
– routing parameters
– dial plan
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 3-13
ted3.fm
Features Nur für den internen Gebrauch
Numbering plan integration
– routing table
– outdial rule
– type of number table.
Numbering plan integration requires that the entire system use a coordinated num-
> bering plan. Each gateway can support only one E.164 numbering plan and only one
private numbering plan.
Example
Assume that the general routing parameters are set to:
International Prefix = 000 Country Code = 49
National Prefix = 00 Area Code = 89
Subscriber Prefix = 0 Location Code = 722
Then all following called party numbers are converted to the lowest implicit format of “52300”:
A31003-H3101-C104-1-7620, 2002-04-25
3-14 HG3550, Technical Description
ted4.fm
Nur für den internen Gebrauch Management
4 Management
This chapter gives an overview of HiPath HG 3550 management tools for installation, configu-
ration, administration and maintenance. It contains the following section:
Section 4.1, “Web-based configuration and administration”
Section 4.2, “Command line management”
Section 4.3, “Simple Network Management Protocol”
Section 4.4, “Maintenance”
The HiPath HG 3550 supports three types of management:
● Web-based management (WBM) via an integrated HTTP server
● Command line management via a V.24 serial port or Telnet
● SNMP-based management via an SNMP agent
The HiPath HG 3550 does not require regular maintenance, but managers may want to period-
ically check the performance of the gateway. Other common management requirements may
include network traffic monitoring to ensure that the LAN is not overloaded and system moni-
toring to ensure that the gateway is not overloaded.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 4-1
ted4.fm
Management Nur für den internen Gebrauch
Web-based configuration and administration
●
Windows 98, 2000, and NT 4.0
Internet Explorer 5.01 or 5.5
● The Java plug-ins 1.2.2_005, 1.2.2_008, and 1.3.1 (recommended)
● The XML extension DLL V3.0
The Web-based management is available over any TCP/IP based connection, provided that the
root administrator has activated WBM on the HiPath HG 3550. Such connections can be made
over a LAN.
A31003-H3101-C104-1-7620, 2002-04-25
4-2 HG3550, Technical Description
ted4.fm
Nur für den internen Gebrauch Management
Web-based configuration and administration
Authentication
The authentication function can be undertaken by both the HiPath HG 3550 and by a HiPath
5000 server. When a client attempts to access a protected page, an authentication server
checks for the presence of a cookie. This cookie records information about the user or admin-
istrator name, authorization level and credential expiration time. If the cookie is not present, the
authorization level indicated by the cookie is insufficient, or access to the central authentication
server fails, the client is redirected to a login page.
The use of cookies for authentication lets a user or administrator log in once for all parts of the
WBM, instead of requiring a separate log-in for each new page.
There is no link to the login page. The client is redirected to the login page as nec-
> essary.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 4-3
ted4.fm
Management Nur für den internen Gebrauch
Web-based configuration and administration
The display of the front panel periodically updates to indicate the current operational status.
The front panel display shows a representation of the actual front panel of the HiPath HG 3550
in the upper part. The front panel LEDs indicate the status of the corresponding interfaces and
hardware. Textual and graphical results are displayed at the bottom of the window.
Some elements of the front panel display act as pop-up menus which offer access to additional
options, e.g., statistical information or commands to switch status elements. Results are shown
in the lower screen part.
4.1.1.2 Wizards
The Web-based management (WBM) wizards are used to simplify the initial configuration of
the HiPath HG 3550. Wizards guide users through particular tasks by presenting them with se-
quences of dialog boxes, thus simplifying standard configuration procedures.
The general form of a wizard is a managed sequence of dialog boxes. The order and type of
dialog boxes depend on the task you select in the wizard function.
A31003-H3101-C104-1-7620, 2002-04-25
4-4 HG3550, Technical Description
ted4.fm
Nur für den internen Gebrauch Management
Web-based configuration and administration
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 4-5
ted4.fm
Management Nur für den internen Gebrauch
Web-based configuration and administration
4.1.1.3 Maintenance
Maintenance is a sequence of dialog boxes to simplify standard maintenance procedures.
The WBM supports the following tasks:
● configure the TFTP server,
● load a configuration,
● store a configuration,
● restore a configuration,
● store a software image,
● activate software,
● load the trace log,
● load the event log.
4.1.1.4 Explorers
The explorers are comprised of hierarchical, tree-oriented directories. Sorted by keywords, all
available pages can be opened. There is no combination of screens in terms of procedures or
tasks and therefore no step-by-step guidance for the administrator in completing those proce-
dures and tasks is provided.
In the explorer function access to all MIB entries is realized using an explorer-like tree display.
Directories containing the desired functions can be selected from the list in the menu area.
Double-clicking a directory symbol in the explorer window opens or closes the directory. Click-
A31003-H3101-C104-1-7620, 2002-04-25
4-6 HG3550, Technical Description
ted4.fm
Nur für den internen Gebrauch Management
Web-based configuration and administration
ing the right mouse button on an individual function opens up a pop-up menu, from which a spe-
cific activity can be started. The content of the pop-up depends on which icon is clicked and on
the state of the corresponding object.
The explorer window consists of the following areas:
● Function area
with all available functions. Select a desired function by clicking on it.
● Menu area
where the available explorers are listed. Select a desired explorer by clicking on it.
● Contents area
where the directories, functions, pop-up menus and actual data for the selected explorer
appear. Depending on the function selected, data can be displayed, edited or deleted.
The contents area is subdivided into two further frames:
– an overview on the left side
– a details view on the right side.
The overview is always presented as a tree.
● Control buttons
with the buttons for controlling the application of changes:
– “Apply change” button will activate the change(s) made to the entry field(s).
– “Undo change” button to remove all changes.
Navigation is possible by clicking on an individual function, by clicking on an item in the menu
list, or by double-clicking a directory symbol. Each directory containing undisplayed functions
is marked with a “+” sign in front of a directory symbol. Double-clicking this directory displays
the additional functions and the sign changes to “-”. Double-clicking a directory marked “-” clos-
es the directory again.
The WBM supports the following explorers:
● System
This explorer displays MIB data about:
– CPU (central processing unit),
– memory,
– Flash,
– help,
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 4-7
ted4.fm
Management Nur für den internen Gebrauch
Web-based configuration and administration
A31003-H3101-C104-1-7620, 2002-04-25
4-8 HG3550, Technical Description
ted4.fm
Nur für den internen Gebrauch Management
Command line management
4.1.1.5 Traps
Using the WBM it is possible to display the current traps. This is important to ensure a quick
response to alarms which have been generated by the HiPath HG 3550.
For a more detailed description of Traps, see the Administration and Maintenance Manual.
SNMP Traps
SNMP can be used to generate traps. When a trap is generated, the HiPath HG 3550 sends a
trap protocol data unit (PDU) to the SNMP manager (see RFC 1215 and RFC 1315), which
then forwards the traps to the NMS.
4.4 Maintenance
The HiPath HG 3550 requires no regular maintenance. If problems unexpectedly occur which
cannot be solved using the available tools, an authorized partner at one of Siemens service
centers should be contacted.
The HiPath HG 3550 supports downloading of software updates (new software images) during
operation. The HiPath HG 3550 stores two separate software images for recovery if it is
equipped with a sufficient amount of flash memory.
The HiPath HG 3550 has an intuitive graphical Web-based interface (see Section 4.1) which
provides for easy maintenance (see also the Administration and Maintenance Manual).
A31003-H3101-C104-1-7620, 2002-04-25
4-10 HG3550, Technical Description
ted5.fm
Nur für den internen Gebrauch Interfaces
LAN interface
5 Interfaces
This chapter describes the physical interfaces for LAN connections to the HiPath HG 3550.
This chapter contains the following sections:
Section 5.1, “LAN interface”
Section 5.2, “Local management port”
The LAN interface provides 10 Mbit/s or 100 Mbit/s access to standard Ethernet (IEEE 802.3).
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 5-1
ted5.fm
Interfaces Nur für den internen Gebrauch
Local management port
Usage
● Routing and bridging from LAN (Ethernet) to WAN (e.g., ISDN)
● Connecting a Web-based management (WBM) terminal
Limitations
● Ethernet types 10Base2 (BNC connector) and 10Base5 (AUI connector) are not directly
supported.
● If no twisted-pair Ethernet network is available, use an off-the-shelf adapter from 10Base-
T to 10Base2 or 10Base5 cabling.
Related standards
Usage
● Configuring the IP address
● Maintenance
A31003-H3101-C104-1-7620, 2002-04-25
5-2 HG3550, Technical Description
ted5.fm
Nur für den internen Gebrauch Interfaces
Local management port
Related standards
:
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 5-3
ted5.fm
Interfaces Nur für den internen Gebrauch
Local management port
A31003-H3101-C104-1-7620, 2002-04-25
5-4 HG3550, Technical Description
ted6.fm
Nur für den internen Gebrauch Hardware Architecture
Board Interfaces
6 Hardware Architecture
This chapter describes the hardware components of the HiPath HG 3550.
6.1.1 Microcontroller
The HiPath HG 3550 is based on the Motorola PowerQUICC (MPC860P) architecture, an en-
hanced version of the MPC8600. The 80 Mhz CPU is a PowerPC implementation with addition-
al embedded functionality:
● embedded PowerPC core
● communication processor module (CPM)
● instruction cache (16 KB)
● data cache size (8 KB)
● dual port RAM (8 KB)
● memory controller for SDRAM (flash and periphery)
● interrupt controller
● timers
● serial communication controllers: UART and Ethernet mode
● Fast Ethernet controller
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 6-1
ted6.fm
Hardware Architecture Nur für den internen Gebrauch
Board Interfaces
Resetting the HiPath HG 3550 invalidates the contents of the synchronous DRAM.
7
A31003-H3101-C104-1-7620, 2002-04-25
6-2 HG3550, Technical Description
ted6.fm
Nur für den internen Gebrauch Hardware Architecture
Board Interfaces
Each DSP has its own synchronous DRAM. The power consumption of a DSP module is ap-
proximately 1.9 W. The synchronous DRAM power consumption is typically 0.6 W.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 6-3
ted6.fm
Hardware Architecture Nur für den internen Gebrauch
Board Interfaces
A31003-H3101-C104-1-7620, 2002-04-25
6-4 HG3550, Technical Description
ted7.fm
Nur für den internen Gebrauch Software Architecture
Call processing
7 Software Architecture
This chapter provides a summary of the main software components and protocols of the
HiPath HG 3550.
The software architecture can be described with two blocks:
Section 7.1, “Call processing”
Section 7.2, “Software platform”
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 7-1
ted7.fm
Software Architecture Nur für den internen Gebrauch
Software platform
7.2.1 Firmware
The firmware resides in the flash memory. It is restarted when the HiPath HG 3550 is reset. The
firmware code (boot ROM image) is the first code that is executed after power is applied.
The firmware of the HiPath HG 3550 provides the following functions:
1. Performing the built-in self tests (BIST) and writing the results to a reserved memory area
to make them available to the system.
2. Initializing the hardware components of the board.
3. Supporting the decompression and loading of the operating instructions from the flash file
system to the RAM (random access memory).
4. Starting the operating code in RAM.
5. Installing the drivers.
6. Starting the WAN and the drivers.
7. Starting the management application. It reads and parses the configuration file. If an error
is found, the manager determines from the start-up configuration whether the system
should start with an alternate configuration file (held in the flash) or restarts.
A31003-H3101-C104-1-7620, 2002-04-25
7-2 HG3550, Technical Description
ted7.fm
Nur für den internen Gebrauch Software Architecture
Software platform
7.2.3 Drivers
A driver is code that communicates directly with the network interface hardware. In the
HiPath HG 3550 a driver is provided for each hardware device (e.g., ELIC, DRAM, RTC). De-
vices handled by drivers are identified by their file descriptors. The I/O (input or output) system
provides a uniform, device-independent mechanism to access devices through a set of system
calls (e.g., open, close, read, write, input or output control).
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 7-3
ted7.fm
Software Architecture Nur für den internen Gebrauch
Software platform
A31003-H3101-C104-1-7620, 2002-04-25
7-4 HG3550, Technical Description
ted8.fm
Nur für den internen Gebrauch Standards
8 Standards
This chapter lists the standards and RFCs referred to in this document in alphabetical order.
You can download current versions of these standards and RFCs via the Internet. See the end
of this chapter for addresses.
Name Standard
CSMA/CD Access IEE 802.3 and ISO
8802.3
Ethernet; unbalanced double current interface circuits up to ITU-T V.10
100 Kbit/s
SNMP traps RFC 1215
SNMP traps RFC 1315
Telnet RFC 854
User Datagram Protocol (UDP) RFC 768
V.24; DB-9 connector EIA-574
V.24; inband flow control – Xon/Xoff protocol EIA X.3 section 3.12
Table 8-1 List of standards and RFCs
Standard Address
EIA standards http://www.tiaonline.org/standards/search_n_order.cfm
ETS standards http://webapp.etsi.org/pda/
IEEE standards http://shop.ieee.org/store/
ISO standards http://pod.iso.ch/livelink/livelink/643694/home.html
(for ISO members only, requires password)
ITU-T standards http://www.itu.int/itudoc/itu-t/rec/index.html
RFCs http://freesoft.org/CIE/RFC/index.htm
Table 8-2 Internet addresses for telecommunication standards
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description 8-1
ted8.fm
Standards Nur für den internen Gebrauch
A31003-H3101-C104-1-7620, 2002-04-25
8-2 HG3550, Technical Description
tedglos.fm
Nur für den internen Gebrauch Glossary
Glossary X
A
ARP
The Address Resolution Protocol is a protocol that maps Layer 3 IP addresses to Layer 2
media access control (MAC) addresses (hardware addresses).
B
B channel
An ISDN bearer channel transmits voice or data at 64 Kbit/s.
bandwidth
The bandwidth of a channel is its data transfer capacity in bits per second (bit/s).
boot
Booting is the start-up process of any computer or similar system.
C
CAS-T1
Channel-associated signaling is a feature that supports Ear and Mouth communication
over a primary T1 interface (see also: Ear & Mouth)
codec
Codecs convert analog audio or video into a digital form (encode) and digitally encoded
audio and video back again into an analog form (decode).
CorNet-N
CorNet-N is a Siemens proprietary signaling protocol used to network different Hicom
nodes. It presents telephony features in a uniform manner across a network.
CorNet-NQ
CorNet-NQ is a superset of CorNet-N that supports QSIG.
D
D channel
A D channel is an ISDN signaling channel which transmits call control messages.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description X-1
tedglos.fm
Glossary Nur für den internen Gebrauch
Denial of service
Denial of service is an attack where the attacker prevents the computer providing a service,
typically involving overloading the system with tasks so that it cannot respond to genuine
requests.
DID
Direct inward dialing is a method for routing incoming calls directly to H.323 endpoints.
DTMF
Dual tone multifrequency (DTMF) consists of two frequencies in the audio spectrum per
number dialed.
E
E-DSS1
European-digital subscriber system no.1 is the standard ISDN transmission protocol used
in Europe.
Ear & Mouth
Ear and Mouth (E&M) is a tie line (see tie line) communication protocol employed in PBX-
to-PBX communications.
encapsulation
Encapsulation is the placing of the frame header and data of one protocol into the data field
of another (see tunneling). One analogy is to think of envelopes placed within envelopes.
Therefore, a letter designed to use the protocols of an internal departmental mailing sys-
tem can traverse the public mailing system by being placed in an envelope addressed to
use the protocols of the public postal system.
endpoint
An endpoint is an H.323 component from which calls can be made or received. It generates
or terminates information streams. Examples for endpoints are clients, gateways or MCUs.
F
fractional T1
A complete T1 carrier contains 24 channels, each of which provides 64 Kbit/s. Most phone
companies, however, also sell fractional T1 lines, which provide less bandwidth but are
also less expensive. Typically, fractional T1 lines are sold in increments of 56 Kbit/s (the
extra 8 Kbit/s per channel is used for data management).
G
G.711
G.711 is an International Telecommunication Union (ITU) standard for speech codecs at
64 Kbit/s.
A31003-H3101-C104-1-7620, 2002-04-25
X-2 HG3550, Technical Description
tedglos.fm
Nur für den internen Gebrauch Glossary
G.723.1
G.723.1 is an International Telecommunication Union (ITU) standard for speech codecs at
5.3 or 6.4 Kbit/s.
G.729 A/AB
G.729 voice compression is the ITU (International Telecommunication Union) standard
that provides toll-quality voice and uses only minimal bandwidth per voice channel. G.729A
does not use voice activity detection; G.729AB uses voice activity detection.
gatekeeper
A gatekeeper is an H.323 component that provides address resolution and access control
to endpoints on an H.323 network.
gateway
A gateway is an H.323 component that interconnects H.323 endpoints on IP-based net-
works to telephones on public switched telephone networks. It provides protocol translation
between the H.323 and ISDN standards.
H
H.235
The H.235 protocol introduces security into H.323 communications (see also H.323)
through the authentication of users, components and by the encryption of data.
H.323
H.323 describes how voice (i.e., telephone) and fax traffic is handled on packet-based net-
works such as IP networks. The relevant standards are defined in the H.323 series of ITU-
T (International Telecommunication Union – Telecommunication Standardization Sector)
recommendations.
H.450
H.450 is a series of protocols which create supplementary telephony related services, for
example: call transfer, call diversion or call hold.
Hicom Xpress
Siemens Hicom (highly integrated communications) Xpress is an innovative strategy which
implements a comprehensive, IP-based migration scheme designed to integrate traditional
voice communications into any existing corporate IP network. Hicom Xpress provides a
peak performance network that increases the effectiveness and efficiency of communica-
tions, centralizes voice and data network administration, lowers costs and increases pro-
ductivity.
HiPath
Siemens HiPath (highly integrated network) is an innovative strategy which implements a
comprehensive, IP-based migration scheme designed to integrate multi-media communi-
cations into any existing corporate IP network.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description X-3
tedglos.fm
Glossary Nur für den internen Gebrauch
I
Internet Protocol Security (IPSec)
IPSec is a protocol that adds security to the Internet Protocol (IP) by inserting authentica-
tion and encryption information into the IP data.
IP address
An Internet Protocol address is a numeric string that is used to identify a device.
IP addresses have four sets of numbers with values from 0 through 255 in each set, for ex-
ample 0.0.0.0.
ISDN
The Integrated Services Digital Network is a fully-digital public telephone network.
IVR
Interactive voice response is a method for routing incoming calls when a single line does
not possess different numbers allowing direct dialing to different H.323 endpoints. The Hi-
Path RG 2500 does not support IVR.
J
jitter
Jitter is a type of interference. The network causes varying amounts of delay to packets.
This causes some packets to arrive later than others resulting in distortion to audio and
video, both of which need smooth delivery.
jitter buffer
A jitter buffer is a short term store that collects incoming data and holds it briefly, allowing
time for late packets to arrive. The complete information can then be correctly forwarded
without the distortion caused by jitter. In the HiPath HG 3550 the size (or depth) of the buff-
er can be fixed or dynamically variable.
L
LAN
A local-area network connects computers within a company site.
Layer switching
The layering protocol identifies a common standard for the functions within a network. The
Open Systems Interconnection Model (OSI) defines the layers as: Physical (Layer 1), Data
Link (Layer 2), Network (Layer 3), Transport (Layer 4), Session (Layer 5), Presentation (lay-
er 6) and Application (Layer 7). Layer switching uses this model to divide networks into sub-
networks (or VLANs), set up routes and switch data between them.
A31003-H3101-C104-1-7620, 2002-04-25
X-4 HG3550, Technical Description
tedglos.fm
Nur für den internen Gebrauch Glossary
M
MCU
A multipoint controller unit is used for multipoint voice and video calls. It centralizes the dis-
tribution of media and mixes voice and video.
MIB
In a management information base, management characteristics and parameters of net-
work devices are described. It is used by SNMP.
multicast
Multicast is the process of transmitting from one source to many destinations.
N
Network Time Protocol (NTP)
NTP is a an Internet protocol that uses clocks located on the Internet to synchronize the
clocks of client and server computers.
P
PBX
A private branch exchange connects the telephones of a company to each other and to the
public telephone network.
PSTN
The public switched telephone network is the worldwide telephone network.
PRI
An ISDN Primary Rate Interface line consist of 30 (TS2) or 23 (TST1) 64 Kbit/s B channels
transmitting the data and one 16 Kbit/s D channel that is used for call setup and signaling.
Public Key Infrastructure (PKI)
PKI is a structure involving trusted certifying authorities that verify and authenticate users
transacting on the Internet or on intranets.
Q
Q.931
Q.931 is a call signaling protocol for setup and termination of calls.
QSIG
QSIG is the inter-node networking protocol adopted by ITU-T, an international standards
body. QSIG allows PBXs from different vendors to be networked.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description X-5
tedglos.fm
Glossary Nur für den internen Gebrauch
R
RAS
Registration, Admission and Status is a protocol that defines the signaling between the cli-
ent and the gatekeeper for discovery and registration purposes.
RIP
Route Information Protocol (RIP) automatically creates and maintains network routes
among routers that support this protocol.
router
A router is a network component that connects subnetworks which use different technolo-
gies and forwards packets between them.
RTP
The Real-time Transport Protocol defines delivery of real-time audio and video packets
from one endpoint directly to another endpoint or to multiple endpoints.
S
Secure Sockets Layer (SSL)
SSL is an interface to provide encrypted data between client and server applications.
Simple Network Time Protocol (SNTP)
The Simple Network Time Protocol (SNTP) is an adaptation of the Network Time Protocol
(NTP) used to synchronize computer clocks in the Internet. SNTP is described in RFC
1769.
spoofing
Spoofing is an attack where the attacker logs on to the system pretending to be someone
else.
T
T.38
T.38 is an ITU standard for fax transmissions. It defines how real time Group 3 facsimile
machines can communicate over IP networks.
tie line
A tie line is a private circuit leased from a communications carrier, connecting two or more
points in an organization.
Trunking
Trunking uses tunneling (see tunneling) and encapsulation (see encapsulation) to set up a
toll-free IP-based telephony connection between two PBXs.
A31003-H3101-C104-1-7620, 2002-04-25
X-6 HG3550, Technical Description
tedglos.fm
Nur für den internen Gebrauch Glossary
tunneling
Tunneling is the encapsulating (see encapsulation) one protocol within another so that it
can be transported from LAN to LAN via a connection that does not support the encapsu-
lated protocol. It can also be used to create a “private” connection on the Internet. This is
done by using encryption to place secure packets within IP packets, so allowing secure in-
formation to traverse the Internet in the normal way.
V
Voice activity detection
Voice activity detection (VAD) checks the input signal for voice. If this signal is above a
specified signal level the VAD declares it to be voice, if it is below the threshold the VAD
declares it to be silence (no voice).
VoIP
Voice over Internet Protocol (IP) enables telephone calls over IP-based data networks.
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description X-7
tedglos.fm
Glossary Nur für den internen Gebrauch
A31003-H3101-C104-1-7620, 2002-04-25
X-8 HG3550, Technical Description
tedabb.fm
Nur für den internen Gebrauch List of Abbreviations
List of Abbreviations Y
Abbreviation Definition
A
AGC automatic gain control
ANI automatic numbering identification
ARP Address Resolution Protocol
ASC audio stream control
B
BIST built-in self tests
BSP board support package
C
CPU central processing unit
CSMA/CD carrier sense multiple access with collision detection
D
DID direct inward dialing
DIMM dual in-line memory module
DOD direct outward dialing
DSP digital signal processor
DTMF dual-tone multifrequency
H
HLB Hicom LAN Bridge
I
IP Internet Protocol
IVR interactive voice response
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description Y-1
tedabb.fm
List of Abbreviations Nur für den internen Gebrauch
L
LAN local-area network
M
MAC media access control
MIB management information base
MSN multiple subscriber numbering
N
NMS network management systems
O
OSI Open System Interconnection
P
PDU protocol data unit
R
RAM random access memory
RAS registration/admission/status
RFC request for comments
RIP Routing Information Protocol
RTCP Real-time Control Protocol
RTOS real-time operating system
RTP Real-time Transport Protocol
S
SCN switched-circuit network
T
TED technical description
TFFS True Flash File System
TIS Telephony Internet Server
U
UDP User Datagram Protocol
UDP User Datagram Protocol
A31003-H3101-C104-1-7620, 2002-04-25
Y-2 HG3550, Technical Description
tedabb.fm
Nur für den internen Gebrauch List of Abbreviations
V
VAD voice activity detection
VLAN virtual local-area network
VoIP Voice over Internet Protocol
W
WBM Web-based management
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description Y-3
tedabb.fm
List of Abbreviations Nur für den internen Gebrauch
A31003-H3101-C104-1-7620, 2002-04-25
Y-4 HG3550, Technical Description
tedIX.fm
Nur für den internen Gebrauch Index
Index Z
Numbers DSP
100Base-TX 5-1 modules 6-3
10Base-T 5-1 DTMF 3-3, X-2
dual in-line memory module 6-3
A dual-tone multifrequency 3-3
AGC 3-8
ANI 3-5 E
ASC 7-3 Ear and Mouth X-2
audio stream control 7-3 E-DSS1 X-2
AUI connector 5-2 endpoint X-2
automatic gain control 3-8 Ethernet 6-2
interface 5-1
B explorer 4-6
BIST 7-2 functions 4-6
bit rate 5-1 navigation 4-7
BNC connector 5-2 window 4-7
board support package 7-3
BSP 7-3 F
FEC 5-1
C firmware 7-2
chapter overview 1-3 flash memory 6-2
CLI 4-1, 5-2 fractional T1 X-2
codec 3-3, X-1
command line interface 4-9 G
compression 3-3 G.711 3-3, X-2
CorNet-N X-1 G.723.1 3-3, X-3
CorNet-NQ 3-5, X-1
CSMA/CD 5-1, 5-2
H
H.323 2-1
D Hicom Xpress X-3
D channel X-1 HTTP 4-1, 4-2
DID 3-4, X-2 hunting groups 3-11
digital signal processor 7-3
DIMM 6-3
I
sockets 6-3 interactive voice response 3-4
direct inward dialing 3-4, X-2 ISDN X-4
direct outward dialing 3-4 IVR 3-4, X-4
DOD 3-4 L
DOS file system 7-3
LAN 5-1, X-4
driver 7-3
interface 5-1
A31003-H3101-C104-1-7620, 2002-04-25
HG3550, Technical Description Z-1
tedIX.fm
R
RAS 2-4, X-6
real-time operating system 7-2
RFC 8-1
RIP 3-11
ROM 7-2
RTCP 2-4
RTOS 7-2
RTP 2-4, X-6
S
Simple Network Time Protocol X-6
SNMP 4-1
traps 4-10
Synchronous DRAM 6-2
A31003-H3101-C104-1-7620, 2002-04-25
Z-2 HG3550, Technical Description