Professional Documents
Culture Documents
GSM
DMS-MSC/HLR
Student Guide
Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as
progress in engineering and manufacturing may warrant.
Trademarks are acknowledged with an asterisk (*) at their first appearance in the document.
Nortel Networks Confidential v
Publication history
July 1999 0
Issue 08.01
• This issue is in accordance with the Nortel templates and incorporates
review comments.
• It contains information up to release GSM10.
December 1999 0
Issue 10.03
• This issue is in accordance with the Nortel templates and incorporates
review comments.
• This issue is the standard version after reviews. It contains information up
to release GSM10.
December 2000 0
Issue 12.02
• This issue is in accordance with the Nortel templates and incorporates
review comments.
• This issue is the standard version after reviews. It contains information up
to release GSM12.
February 2001 0
Issue 12.03
• This issue is the standard version after additional review comments have
been incorporated. It contains information up through release GSM12.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential vii
Contents 1
About this course xvii
Course objectives xvii
NSS training curriculum xviii
IntraNet address xix
GSM DMS engineer (beginner) xix
GSM DMS engineer (expert) xix
GSM MSC/VLR datafill engineer xx
GSM HLR datafill engineer xx
GSM subscriber service provisioning engineer xxi
Additional GSM NSS application courses xxii
Lesson 1
Introduction 1-1
Objectives 1-1
Basic telecommunications concepts 1-3
Switching system evolution 1-4
Analog signals and digital concepts 1-6
PCM concept 1-7
Sampling 1-8
Quantization 1-8
Coding 1-10
Nortel switching systems 1-12
Nortel DMS SuperNode 1-13
Public applications 1-13
GSM applications 1-14
DMS-MSC functions 1-15
DMS-MSC mobile call handling 1-15
DMS-MSC mobile voice call handling 1-15
DMS-MSC mobile data call handling 1-15
DMS-MSC emergency call handling 1-16
DMS-MSC supplementary services 1-16
DMS-MSC enhanced services 1-17
Intelligent Network (IN) 1-17
DMS-MSC external interfaces 1-17
DMS-MSC gateway function 1-19
DMS-MSC support of Primary Rate Interface (PRI) 1-20
DMS-HLR functions 1-20
DMS-MSC/HLR functions 1-21
Lesson 2
GSM DMS overview 2-1
Objectives 2-1
DMS 2-2
DMS family attributes 2-2
Distributed processing 2-2
Stored program control 2-2
Digital network 2-2
Trunk input 2-3
DMS-MSC hardware architecture 2-4
Service processing hardware layer 2-4
Messaging and connectivity hardware layer 2-5
Physical access hardware layer 2-5
Functional hardware layers 2-5
Service processing hardware 2-5
Messaging and connectivity hardware 2-5
Physical access hardware 2-5
Duplication for reliability 2-6
DMS-Core 2-7
DMS-Core functions 2-8
System Load Module (SLM) 2-8
File Processor (FP) 2-8
DMS-Bus (or Message Switch) 2-9
Enhanced NETwork (ENET) 2-11
DMS internal speech and message links 2-13
DMS-MSC internal speech links 2-13
DMS-MSC internal message links 2-14
P-side and C-side 2-15
Peripheral Modules (or PMs) 2-16
Input/output Controller (IOC) 2-18
SuperNode Data Manager (SDM) 2-20
Hardware packaging 2-21
GSM DMS architectures 2-22
DMS SuperNodeLineup 2-23
SuperNode Size Enhanced Lineup (SNSE) 2-25
MicroNode lineup 2-27
DMS system limitations 2-28
E1 limitations 2-28
C7 link limitations 2-29
Equipment labelling 2-31
Cards and paddleboards 2-33
Product Engineering Code Identifier (PEC) 2-34
DMS-MSC software architecture overview 2-35
DMS-MSC software structure 2-35
GSM-based product layer and markets 2-36
GSM services 2-37
GSM base 2-37
Shared layer 2-37
Telecom layer 2-37
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Contents ix
Lesson 3
DMS-Core and DMS-Bus 3-1
Objectives 3-1
DMS-Core 3-2
Computing module 3-3
Control processor 3-3
Memory 3-4
DMS-Bus interfaces 3-4
System Load Module (SLM) 3-5
SLMs 3-5
Interfaces 3-5
DMS-Bus 3-7
MS functional subsystems 3-7
Control processor 3-7
Transaction bus 3-7
Processor bus 3-8
System clock 3-8
MS connectivity 3-9
Operation of DMS hardware components 3-10
Plane 3-10
Operation of the DMS-Core in duplex mode 3-10
Fault recovery of the DMS-Core 3-10
Operation of the DMS-Core in simplex mode 3-10
DMS base cabinets 3-11
SuperNode base cabinet 3-11
SNSE & MicroNode base cabinet 3-13
Office image and journal file 3-14
Office image 3-14
Journal file 3-15
Device Independent Recording Package (DIRP) 3-16
DIRP subsystems 3-17
GSM Call Detail Records (GCDR) 3-17
Journal file 3-17
Operational Measurements (OM) 3-18
DLOG 3-18
Lesson 4
Input/Output Device (IOD) 4-1
Objectives 4-1
Input/Output Devices (IODs) 4-2
Cabinetized Input/Output Equipment (CIOE) 4-3
Device controller cards 4-5
Devices 4-6
Maintenance and Administration Position (MAP) terminal 4-6
Disk drive unit 4-6
Magnetic tape drive 4-8
IOD cards, ports, and circuits 4-9
Input/Output Module (IOM) 4-10
Lesson 5
Enhanced Network (ENET) 5-1
Objectives 5-1
Enhanced network 5-2
Hardware configuration 5-5
ENET cabinets 5-5
ENET shelf layout 5-8
Control and messaging 5-9
Interface to PMs 5-9
Interface to MS 5-9
PM synchronization 5-9
Shelf communication (V-Bus & H-Bus) 5-10
ENET operation 5-11
ENET crosspoint cards & I/F paddleboards 5-12
ENET switching examples 5-13
Lesson 6
Peripheral Modules (PMs) 6-1
Objectives 6-1
Peripheral modules 6-2
PM network interface 6-4
Voice access PMs 6-5
PCM-30 Digital Trunk Controller (PDTC) 6-6
PDTC to ENET message links 6-8
Digital Trunk Controller ISDN (DTCi) 6-8
Other PMs 6-9
Maintenance Trunk Module (MTM) 6-9
Integrated Service Module (ISM) 6-10
Digital Recorded Announcement Machine (DRAM) 6-13
Enhanced Digital Recorded Announcement Machine (EDRAM) 6-13
Common Channel Signaling # 7 (CCS7) networks 6-14
Link Peripheral Processor (LPP) 6-14
Link Interface Unit #7 (LIU7) 6-17
Mobility management unit (MMU) 6-22
Check out 6-23
Lesson 7
SuperNode Data Manager/Fault Tolerant (SDM/FT) 7-1
Objectives 7-1
SDM/FT cabinet 7-2
SDM/FT overview 7-3
General Description 7-3
Fault tolerant architecture 7-5
SDM/FT main chassis 7-7
OMC-S application overview 7-8
OMC-S software architecture 7-9
OMC-S element manager application 7-10
HLR-PS functionality 7-12
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Contents xi
Lesson 8
Using MAP terminal 8-1
Objectives 8-1
Introduction to the Visual Display Unit 8-2
Terminal setup procedures 8-2
Command system tasks 8-4
Syntax conventions 8-5
Keyboard commands 8-6
Editing command lines 8-6
Line editing commands 8-6
Changing output displays 8-7
MAP commands 8-8
Command name: LOGIN 8-8
Command name: LOGOUT 8-8
Command name: QUSER 8-9
Command name: DATE 8-9
Command name: TIME 8-9
Command name: COMMAND 8-10
Command name: MSG 8-12
Command name: SETLOGMSG 8-13
Command name: SHOW USERS 8-13
Command name: PRINT 8-14
Command name: PERMIT 8-15
Command name: UNPERMIT 8-17
Command name: RECORD 8-18
Command name: REPEAT 8-19
Command name: SEND 8-20
CI menu hierarchy 8-21
MAPCI display areas 8-22
MAP Command Interpreter menu level 8-24
Maintenance level menu 8-25
Alarm indicator display 8-26
Command menu display 8-27
MAP level command types 8-28
Entering commands 8-28
Commands from other menus 8-30
Instructions 8-34
Instructions 8-40
Instructions 8-43
Lesson 9
Table editor 9-1
Objectives 9-1
Table editor 9-2
Table and subtable structure 9-5
Fields 9-5
Tuples 9-5
Subfields 9-5
Subtables 9-7
Selectors 9-8
Input prompter 9-8
Table editor commands 9-12
Command name: ADD 9-14
Command name: BOTTOM (BOT) 9-14
Command name: CHANGE (CHA) 9-14
Command name: COUNT 9-14
Command name: DELETE (DEL) 9-15
Command name: DOWN (DOW) 9-15
Command name: FORMAT PACK / FORMAT UNPACK 9-16
Command name: HELP 9-16
Command name: LIST (LIS) 9-17
Command name: POSITION (POS) 9-17
Command name: QUIT (QUI) 9-18
Command name: RANGE (RAN) 9-18
Command name: REPLACE (REP) 9-18
Command name: SUBTABLE (SUB) 9-19
Command name: TABLE 9-20
Command name: TOP 9-20
Command name: UP 9-20
Command name: VERIFY (VER) 9-20
Command name: FINDTAB 9-21
Other commands 9-21
Table editor - quick command reference list 9-23
Instructions 9-26
Instructions 9-28
Self check 9-29
Instructions 9-30
Instructions 9-31
Lesson 10
Universal Translations (UXLA) 10-1
Objectives 10-1
DMS-MSC translations 10-2
Stages of translations 10-2
Translations Verification (TRAVER) tool 10-4
Land to MS call 10-5
Lesson 11
Operational measurements & log reports 11-1
Objectives 11-1
Operational Measurements (OMs) and OMSHOW 11-2
Operational Measurement system 11-4
OM register data collection 11-8
Accumulating OM data 11-12
Log reports and LOGUTIL 11-15
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Contents xiii
Lesson 12
NTPs and Helmsman 12-1
Objectives 12-1
NTPs and Helmsman 12-2
NTPs 12-2
DMS-MSC/HLR documentation listing 12-4
Helmsman CD-ROM 12-5
Instructions 12-8
Questions 12-8
Instructions 12-13
Questions 12-13
Lesson 13
DMS-MSC call processing 13-1
Objectives 13-1
Call processing 13-2
Call processing architecture 13-3
PSTN to mobile call progression 13-4
Call progress description 13-5
Glossary A-1
List of figures
Figure 0-1 NSS training curriculum xvi
Figure 1-1 Lines and trunks in a Nortel DMS network 1-3
Figure 1-2 A/D conversion 1-6
Figure 1-3 Steps to produce PCM samples 1-7
Figure 1-4 Quantization 1-9
Figure 1-5 Multiplexing channels 1-10
Figure 1-6 PCM Frame 1-11
Figure 1-7 Typical network using Nortel DMS switch family components 1-12
Figure 1-8 Typical network subsystem 1-19
Figure 2-1 DMS-MSC hardware architecture 2-4
Figure 2-2 Duplications for reliability 2-6
Figure 2-3 DMS-Core 2-7
Figure 2-4 DMS-Bus plane 2-10
Figure 2-5 Network connections 2-12
Figure 2-6 P-Side and C-Side 2-15
Figure 2-7 Typical DMS-MSC PM connections 2-17
Figure 2-8 Input/output controller and devices 2-19
Figure 2-9 SuperNode Data Manager/Fault Tolerant 2-20
Figure 2-10 Hardware packaging 2-21
Figure 2-11 DMS cabinet lineup with DMS SuperNode Base 2-23
Figure 2-12 DMS cabinet lineup with SNSE Base 2-25
Figure 2-13 MicroNode cabinet lineup 2-27
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Contents xv
List of tables
Table 2-1 Commonly used GSM peripheral modules 2-16
Table 2-2 DMS architectures 2-22
Table 2-3 PCM limitations 2-28
Table 3-1 SNSE memory card configurations 3-4
Table 3-2 SLM configurations 3-5
Table 6-1 MTM PEC codes to ISM codesTable 6-1 6-11
Table 7-1 SDM-FT parts 7-5
Table 7-2 CIS functions 7-15
Table 8-1 VDU configuration 8-3
Table 8-2 Line editing command functions 8-6
Table 8-3 Changing output display commands 8-7
Table 8-4 Alarm indicator display alarm codes 8-26
Table 9-1 Table editor commands 9-12
Table 11-1 Searching log buffers associated with each subsystem 11-23
Table 12-1 Division and layer number 12-3
Table 12-2 Group number 12-3
Table 12-3 DMS-MSC/HLR documentation 12-4
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential xvii
Course objectives 0
Upon completion of this course, you will be able to:
• describe basic telecommunication concepts
• describe the basic components of a DMS system
• describe the DMS-Core and DMS-Bus
• describe the Input/Output Devices (IOD)
• describe the Enhanced Network (ENET)
• describe the Peripheral Modules (PM)
• describe the SuperNode products
• use the MAP terminal
• use Table Editor
• describe what translations are and how they work
• describe Operational Measurement (OM) and Log Reports (LOG)
• use LOGUTIL and OMSHOW commands
• explain the Nortel documentation structure
• explain GSM call processing
Figure 0-1
NSS training curriculum
930 / 3 Days
974 / 5 Days
GSM DMS Overview
GSM CCS7 Translations
& Operations Additional GSM Application Courses
950 / 5 Days
GSM DMS 900 / 3 Days 938 / 5 Days
970 / 10 Days
Maintenance Part 1
GSM MSC/VLR GSM Intelligent GSM IWF
Translations Networks
937 / 2 Days
O M C -S GSM Subscriber
Overview & Operation Service Provisioning
Engineer
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential About this course xix
IntraNet address 0
http://136.147.68.68/training/index.html
Most of GSM NSS Engineering curricula start with the following overview
course:
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential About this course xxi
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 1-1
Lesson 1
Introduction
Objectives 1
Given student lesson, instructor lecture and appropriate documentation, you
will be able to:
• describe the term switching in the telecommunications industry
• explain the function of a line and a trunk as interconnecting mediums
• differentiate between digital and analog transmission
• explain a PCM
• briefly describe the Nortel DMS-type switch family products
• describe the major functions of the Nortel DMS for GSM
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Introduction 1-3
Figure 1-1
Lines and trunks in a Nortel DMS network
Trunks
Central DMS 100 Line Residential Line DMS 100
Central
Office DMS 200 sets DMS 200 Office
Trunks
Trunks
Line Business
PBX sets Line PBX
SL100 SL100
Many calls a user makes are to locations more than five miles away. To
complete these calls, COs are connected to each other. A call may go through
several central offices before reaching its destination. COs are connected via
trunks.
Digital switching uses computer technology and stored program control. This
phase of development replaces reed relays with solid-state switching
(switches with no moving parts).
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Introduction 1-5
Figure 1-2
A/D conversion
A/D Conversion
Analog Digital
A/DConversion
A/D Conversion
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Introduction 1-7
PCM concept 1
The PCM concept is a common method used in telecommunication systems.
The PCM signal can be transmitted by a/an:
• copper twisted pair
• coaxial pair
• optical fiber
• microwave
• satellite
Figure 1-3
Steps to produce PCM samples
A Law
... 0 0 1 1 0 ...
8 kHz µ Law
Sampling
Sampling involves measuring the analog signal at specific time intervals.
Each measurement is called a sample and the sampling time interval is
defined as Time Slot (s) (TS).
Applying the sampling principle when sampling analog speech the sampling
frequency should be 2*4kHz=8kHz. It means, that you have 8000 samples
per second (125µsec/sample) from a 4kHz bandwidth.
Quantization
To limit the number of values transmitted, the amplitude levels divided into a
finite set of levels. Each sample within a certain interval is represented by one
of levels. In most cases, 256 levels are used to quantify samples.
For example the Public Switch Telephone Network (PSTN) uses A law or µ
law for logarithmic quantization.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Introduction 1-9
Figure 1-4
Quantization
10
1010110001011
Sampling Coder
10
10100101100010110001
Coding
As described above, quantified value is represented by a binary code. To
obtain the 256 levels, 8 bits are used (28=256).
The PCM process includes sampling at 8 kHz and performs quantization and
coding using 8 bits. It produces a bit rate of 8000 x 8 = 64 Kbit/s. This digital
signal coded onto 8 bits and transmitted at 64 kbit/s is called a Time Slot
(TS).
These 32 TSs or channels are multiplexed onto the one PCM link. The
technique used to multiplex channels in a same link is called Time Division
Multiple Access (TDMA).
Figure 1-5
Multiplexing channels
Multiplexing Channels
A/D
A/D
Conversion
Conversion
00
10
11
01
. .
A/D
A/D 00 1 01 1 0 1 2 3 3
9 0 1
0 1 2 3 .
2. 3 3 0
9. 0 1 1 2
.
Conversion
Conversion MUX
MUX
1
1 10
10
A/D
A/D 00
Conversion
Conversion
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Introduction 1-11
Figure 1-6
PCM Frame
PCM Structure
PCM E1
a E1 PCM • A law
32 TSs • 1 TS 64kbit/s
• 8 bits per TS
29 30 31 0 1 2 3 ... ... 30 31 0
29 1 2 • 32 TSs
• 2048 kbit/s per PCM frame
PCM T1
• µ law
• 1 TS 64kbit/s
0 0 1 0 1 1 0 1 • 8 bits per TS
a time slot • 24 TSs
8 bits • 1544 kbit/s per PCM frame
Figure 1-7
Typical network using Nortel DMS switch family components
PBX
Trunks
Trunks
Trunks
SL100
GSM Switch
DMS-MSC
DMS-MSC
International
Gateway
DMS 250
BSS
The following are some advantages of the Nortel DMS switch family:
• high digital transmission quality virtually eliminates noise
• system modularity allows the easy addition of optional features which
generate revenue
• plug-in provisioning allows customers to plug-in trunk cards up to the
maximum engineered hardware and software capacity available
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Introduction 1-13
The cabinet modules of a DMS switch are fully factory assembled and tested,
requiring minimal on-site installation or commissioning. To order a complete
DMS switch is simple. It is a one-step process that involves selecting the
appropriate Product Engineering Codes (PECs).
Public applications
These DMS-type switches are purchased by long distance and wireless
carriers and are FCC regulated in the North American market.
• DMS-200
A toll central or tandem office that provides the first stage of collection
from offices serving subscribers and the final stage of distribution to
offices serving subscribers. The DMS-200 is capable of handling 400 to
60,000 trunks of various types.
• DMS-100/200
A local and toll central office handling combinations of subscriber lines
and trunks, with the ranges of the DMS-100 and DMS-200, as specified
by the customer. The DMS-100/200 is utilized in systems needing to
expand in either or both local/toll service. After installation, the DMS-
100/200 can add (without major system changes) specialized services, as
needs arise.
• DMS-250
A specialized common carrier system capable of handling from 960 to
30,000 trunks. The DMS-250 is designed for special and resale carrier
applications. The system's flexible configurations allow for a broad range
of capabilities, including multiple tenant groups and integrated data
service.
• DMS-300
An international (gateway) switching center capable of handling up to
27,000 international trunks. The DMS-300 serves as an interface to both
domestic and international networks.
• DMS-500
A local and long distance switch SuperNode application that combines
local services of the DMS-100 switch, and long distance services of the
DMS-250 switch.
GSM applications
The following DMS type switches are supporting GSM standard:
• DMS-MSC
Digital Multiplex System Mobile-services Switching Center. A Northern
Telecom product that offers all of the functionality of a Mobile-services
Switching Center (MSC) in a PLMN. DMS-MSC also contains an
integrated Visitor Location Register (VLR).
• DMS-HLR
Digital Multiplex System Home Location Register. A Northern Telecom
product that offers all of the functionality of a Home Location Register
(HLR) in a PLMN. DMS-HLR also contains an integrated Authentication
Center (AUC).
• DMS-MSC/HLR
A Northern Telecom product that offers all of the functionality of a
Mobile-services Switching Center (MSC) and a Home Location Register
(HLR) in a PLMN. It also includes an integrated Visitor Location Register
and Authentication Center.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Introduction 1-15
DMS-MSC functions 1
The Nortel DMS-MSC performs the following functions:
• basic switching function of the Network and Switching Subsystem (NSS)
within a GSM PLMN
• mobile voice call handling
• mobile data call handling
• emergency call handling
• supplementary services
• enhanced services
• intelligent networks
• external interfaces
• Gateway MSC function
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Introduction 1-17
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Introduction 1-19
Figure 1-8
Typical network subsystem
EIR HLR
SMS-SC
AuC
VLR VLR
Another GSM
Network, or ISDN
Intelligent BSS
Networks
The DMS-MSC supports both variants of PRI: ANSI PRI and ETSI PRI.
The AUC helps to ensure that only authorized users have access to the
network. The DMS-HLR integrated AUC performs all of the functions
required of an AUC in an NSS.
Note: Although the DMS-HLR contains an integrated AUC, the two are
separate functional entities within the NSS.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Introduction 1-21
DMS-MSC/HLR functions 1
The Mobile-services Switching Center (MSC) performs all of the switching
functions needed for the Mobile Stations located in its geographical area,
known as its Serving Area.
To perform its switching and call processing functions, the MSC must interact
with other components in the network. The MSC may be paired with a Visitor
Location Register (VLR). Following is a list of major MSC functions:
• mobile subscriber call establishment and routing
• dialed digits translation
• call control and signaling
• billing data capture and formatting
• authentication and ciphering
• locating and contacting mobile stations for call termination
• handover of call from one cell to another
• management of facilities for calls
• echo control
• Short Message Service support
• Supplementary Services support
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Introduction 1-23
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 2-1
Lesson 2
GSM DMS overview
Objectives 2
Given student lesson, instructor lecture, and appropriate documentation, you
will be able to:
• describe the main hardware layers of the GSM DMS
• describe the main hardware components of the GSM DMS
• describe the hardware architecture of the GSM DMS
• describe the GSM DMS cabinets
• describe the SuperNode, SNSE, and MicroNode architecture
• identify the layers of the GSM software
DMS 2
The DMS is a software-controlled, large-scale switching system that is
capable of handling up to 58,000 trunks with the SuperNode processor. For
more information about DMS system limitations, refer to “DMS system
limitations”
The DMS system is based on a family or series concept and provides a wide
range of digital switching and networking functions. Modular design
techniques have been applied to various DMS family products that serve the
market, such as local, toll, cellular, and military network switches and provide
special business services.
Digital network
All facilities entering and leaving the network carry digital information. The
DMS switches voice and data using a fully digital network. The ability to
implement time division switching in a digital network greatly enhances the
flexibility of the switching matrix and eliminates network blocking and
crosstalk.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-3
Trunk input
Depending on how the DMS is used, trunk information must be made available
to the system.
• when processing a call, the system utilizes customer-related data
including directory numbers
• to serve trunk group types
• to start dial signals
Figure 2-1
DMS-MSC hardware architecture
Service
Processing DMS-Core
DMS-Core File
File Processor
Processor SDM
SDM
Hardware
DMS-Bus
DMS-Bus
Messaging/
Connectivity
Hardware
Enhanced
Enhanced Network
Network
Physical Link
Link
Peripheral
Peripheral Modules
Modules
Access Peripheral
Peripheral IOC
(PDTCs,
(PDTCs, MTM,
MTM, etc.)
etc.)
Hardware Processor
Processor
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-5
This layer also includes the DMS-Bus, which is a packet switch that routes
messages between the various nodes in the switch.
Figure 2-2
Duplications for reliability
DMS ENET
SDM IOC
Core (Active/Active mode) 1 FP
1
0 0
(Hot/
01
Active PMs
Standby
Mode) PDTC 1
0
1 MTM
0
(Hot/Active Standby Mode)
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-7
DMS-Core 2
The DMS-Core:
• is a part of the service processing hardware layer of the DMS-MSC and is
the computing engine for the entire DMS-MSC
• consists of a duplicated, high-capacity, single-chip microprocessor with
duplicated memory, communications buses, and interfaces to the DMS-
Bus (see Figure 2-3)
• controls all events on the switch, including call processing, call
accounting, and switch performance
• contains a dedicated operating system known as the Support Operating
System (SOS)
In some systems, File Processors (FPs) are deployed in support of the DMS-
Core to provide enhanced DMS-MSC functions.
The DMS-Bus provides the clock to the DMS-Core (and to all other DMS-
MSC components as well). It is the central clock for the entire DMS-MSC,
and can be synchronized to a network clock source.
Figure 2-3
DMS-Core
SuperNode DMS-Core
Unit 0 Unit 1
CPU 0 CPU 1
Memory MEB Memory
SCSI SCSI
Crossover
Disk
POWER
Disk
Disk
POWER
LOAD
ON LINE
REWIND
FORWARD
Buses Disk LOAD
ON LINE
REWIND
FORWARD
REVERSE
WRITE
ENABLE
REVERSE
WRITE
ENABLE
DMS-Core functions 2
The specific functions of the DMS-Core include the following:
• operations, administration, and maintenance
• translation of call address digits (telephone numbers)
• selection of outgoing trunks
• call feature processing
• call supervision (monitoring and control functions associated with a call)
• ENET connection control
• subset of ISDN User Part (User Part is a portion of the ISDN protocol)
• maintenance of the DMS-Core and its links
• loading of switch software and monitoring of processor sanity
• loading of peripheral software
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-9
redundant 600 Mb hard disks and 1.3 Gb digital tape drives. As the CM, the
FP uses the SOS operating system.
DMS-Bus (or Message Switch) 2
The DMS-Bus is part of the DMS-MSC messaging/connectivity hardware
layer. The DMS-Bus:
• is a dual high speed transaction bus that provides message transport for
the distributed processors of the DMS on a peer-to-peer basis
• supports equal access to all ports
The DMS-bus access ports can be configured as DS-30 copper interfaces
and/or DS-512 fiber-optic interfaces.
• houses the system clock. The system clock provides synchronization for
the entire DMS-MSC and can serve as a network master clock source to
allow an entire network to run with the same time reference.
The DMS-Bus and the DMS-Core use the system clock to carry out
general clocking and timing functions.
Figure 2-4 shows that the DMS-Bus consists of two load-sharing planes, each
plane being an independent DMS-Bus (duplicated hardware). Each load-
sharing plane has a CPU, memory, and a set of interfaces to all other DMS-
Bus components.
Figure 2-4
DMS-Bus plane
SuperNode DMS-Bus
Message Switch 1 has:
• CPU
• Memory
• Set of interfaces
Slave Clock Plane 1
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-11
The ENET imparts a consistent delay to all connections, but its performance
is unaffected by voice or data mix or by traffic load. In addition, it switches
multiple DS0 channels together for higher bandwidth connections.
Increasing the ENET channel capacity does not require re-cabling or re-
engineering: rather it requires only adding or upgrading some network circuit
packs.
The ENET contains duplicated planes. Each plane consists of one or more
shelves, where each shelf is paired with a shelf in the other plane. Each ENET
plane shelf is connected to both DMS-Bus planes as shown in .
Figure 2-5 is a simplified block diagram that shows how the voice, data, and
message signals flow into and out of the ENET.
Figure 2-5
Network connections
Network Connections
DMS
DMS -- Bus
Bus
Message Links
to/from PMs
DMS
DMS -- Core
Core
ENET
ENET
PM
PM PM
PM PM
PM PM
PM
Speech, Data, and
Message Links
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-13
The speech link connects the peripheral module area with components of the
DMS-MSC through the ENET. Each link provides a two-way (four-wire)
transmission path for 32 channels of time division multiplexed data.
The speech links have 30 channels allotted for transmission of pulse code
modulated (PCM) speech samples and two channels (signaling channels) for
control messages. Signaling channels 0 and 16 (currently only 0 is used) serve
to pass messages (using the network), to and from the DMS-MSC. The
transmission format on a speech link is designated DS-30. For this reason,
speech links and DS-30 links are often used interchangeably.
The DS-512 protocol was introduced to maximize fiber optic usage in DMS
SuperNode-based systems. DS-512 links connect the CM and the MS in the
SuperNode and SNSE systems. DS-512 links are also used to connect the
ENET to the MS and the ENET to some PMs.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-15
C-side refers to the central control side. It identifies that side of a subsystem
which interfaces closest with the central control.
Figure 2-6 illustrates that the P-side of all the subsystems is facing out toward
the peripherals, while the C-side is facing the opposite direction.
Figure 2-6
P-Side and C-Side
MS
MS (Central
(Central Control)
Control)
P-side
P-side
C-side
C-side
C-side
C-side C-side
C-side
ENET
ENET
CM
CM IOC
IOC
Switching Matrix
P-side
P-side P-side
P-side
P-side
P-side
C-side
C-side
PM
P-side
P-side
411-0930-001 12.02/EN December, 2000 Lesson 2 DMS-MSC Overview 2-11
The PMs are controlled by the DMS-Core, and reduce the DMS-Core
processing load by doing much of the processing required for call handling,
as well as trunk interfaces. For example, once the DMS-Core has established
digital connections among PMs, the PMs can pass voice, data, signaling, and
control messages among themselves without supervision from the DMS-
Core.
There are numerous types of PMs that are used in all the various DMS switch
types.
The PMs used most commonly in the DSM-MSC are listed and explained in
Table 2-1.
Table 2-1
Commonly used GSM peripheral modules
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-17
Figure 2-7
Typical DMS-MSC PM connections
Peripheral
Peripheral Peripheral
Peripheral Peripheral
Peripheral Peripheral
Peripheral
Module
Module Module
Module Module
Module Module
Module
Trunks to BSS
Trunks to Another
DMS-MSC
Connections to Trunks to
CCS7 Network PSTN BSS
BSS
DMS-MSC
DMS-MSC
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-19
Figure 2-8
Input/output controller and devices
I/O
I/O I/O
Central
Central I/O POWER
Message
Message Device
LOAD
ON LINE
REWIND
Device
FORWARD
Control
Control REVERSE
WRITE
ENABLE
Processor
Processor Controller
Controller
Tape Drive
I/O
I/O
Device
Device
Controller
Controller
MAP Terminal
SDM is fault tolerant; no single hardware failure can cause a system outage or
service failure.
Figure 2-9
SuperNode Data Manager/Fault Tolerant
OMC-S
HLR-PS CIS
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-21
Hardware packaging 2
As shown in Figure 2-10, the hardware components include the following:
• cards are pieces of rigid material on which electronic components are
mounted and connected. Cards, also known as circuit packs, are held in
shelves.
• shelves hold the cards which make up a particular function. For example,
a network module shelf holds all the network module cards.
• cabinets, also known as bays or frames, are enclosed metal framework
structures that hold up to four shelves of equipment. Cabinets are always
72 inches tall, 28 inches deep, and either 42 inches or 28 inches wide.
• a DMS-MSC consists of a combination of cabinets
The external distribution cables, their associated protective devices, and the
internal cables to the central office line units terminate on the main
distribution frame (MDF).
Figure 2-10
Hardware packaging
Hardware Packaging
Frame Supervisory Panel Frame Supervisory Panel
Cards within
39 a Shelf 47
26
33
72” Four
Shelves
13
19
0 5
Table 2-2
DMS architectures
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-23
DMS SuperNodeLineup 2
The following are typical examples of how DMS-MSC cabinet lineups are
combined together (as a system). Refer to Figure 2-11.
Figure 2-11
DMS cabinet lineup with DMS SuperNode Base
SuperNode Lineup
FSP FSP FSP FSP
P P P P P P P P PP PP PP PP PP PP
S S S S S S S S SS MS 0 SS SS ENET 0.0 SS SS LMS 0 LMS1 S S
U U U U U U U U UU UU UU UU UU UU
P P P P P P P P PP PP PP PP PP PP
S S S S S S S S SS MS 1 SS SS ENET 0.1 SS SS LIS SS
U U U U U U U U UU UU UU UU UU UU
P P P P P P P P PP PP PP PP PP PP
S S S S S S S S SS CPU 0 CPU 1 SS SS ENET 1.0 SS SS LIS SS
U U U U U U U U UU UU UU UU UU UU
P P P P P P P P PP PP PP PP PP PP
S S S S S S S S SS SLM 0 SLM 1 SS SS ENET 1.1 SS SS LIS SS
U U U U U U U U UU UU UU UU UU UU
PP PP REVERSE
PP P
SS SS
WRITE
ENABLE P P P
UU UU SS S
S S S
UUU U U
PP
SS
PP
SS
PP
SS
PP
SS
PP Storage
16 PCM30s P P
IOC UU Expansion I/O S S S S
UU UU UU
UU Devices U U
PCM30 Digital
Trunk Controller
PDTC 0
PP
SS
PP
SS
PP
SS
PP
SS
P P Storage P P
UU DDU SDM/FT S S S S
UU UU UU
U U
Devices U U
16 PCM30s
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-25
Figure 2-12
DMS cabinet lineup with SNSE Base
P P P P P P P P PP PP REVERSE
WRITE
ENABLE
PP PP
SS SS
S S S S S S S S SS LIS SS UU UU
U U U U U U U U UU UU
ENET
P P P P P P P P PP PP PP PP PP PP
SS SS SS SS
S S S S S S S S SS SS UU IOC UU UU UU
Plane 0 Plane 1
U U U U U U U U UU UU
PCM30 Digital
Trunk Controller
PDTC 0
P P P P P P P P PP PP PP PP PP PP
SS SS SS SS
S S S S S S S S S S SLM CPU 0 CPU 1 SLM S S UU DDU UU UU UU
U U U U U U U U UU 0 1 UU
PP
SS Maintenance
PP
SS
P P Billing Server P P
UU UU S S S S
Trunk Module U U File Processor U U
PP PP P
SS Maintenance SS P P P P
UU UU S
S S
S S S
Trunk Module U
U U U U
PP PP P P Storage
16 PCM30s P P
SS Maintenance SS
Expansion I/O S S S S
UU
Trunk Module
UU
UU Devices U U
PP
SS Maintenance
PP
SS
P P Storage P P
UU SDM/FT S S S S
UU
Trunk Module U U
Devices U U
16 PCM30s
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-27
MicroNode lineup 2
The GSM Integrated MicroNode is the newest addition to the Nortel DMS-
MSC product portfolio. It is a pre-engineered DMS-MSC/HLR/STP based
on the SNSE (SuperNode Size Enhanced) platform with a reduced hardware
configuration. This configuration allows reduced engineering and installation
costs while offering the same feature rich portfolio as a regular DMS-MSC
switch.
Figure 2-13
MicroNode cabinet lineup
PP PP
SS MS 0 MS 1 SS PDTC 0 unit 1 DSX
UU UU
PP PP
SS LIS SS PDTC 0 unit 0 Echo Cancellor
UU UU
ENET
PP PP
SS SS AC/DC Rectifier
Plane 0 Plane 1 ISM 1
UU UU
PP PP
S S SLM Battery Backup
CPU 0 CPU 1 SLM S S SDM/FT
ISM 0
UU 0 1 UU
E1 limitations
In a DMS-MSC system for the global markets, PDTCs (PCM Digital Trunk
Controller) is used to terminate E1 trunks that come into the system. Each
PDTC can terminate a maximum number of 16 E1 trunks. From the PDTC
limitations, the maximum number of CDTO cabinets and Time Slots are
shown in the following table.
Table 2-3
PCM limitations
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-29
C7 link limitations
The MSC uses C7 Links as a signaling system to communicate with other
nodes in the network.
C7 links between BSC and MSC use channelized access LIU7s, which
depend on NIUs (Network Interface Unit) for the physical connection
between a BSC and the MSC.
Since each C7 link requires an LIU7 to terminate on the MSC side, the
number of C7 links that an MSC can support depends on the number of
LIU7s that the system can support.
Figure 2-14 summarizes the maximum C7 Links in the DMS and their related
limitations.
Figure 2-14
C7 link limitations
C7 Link Limitations
SNSE with 11
134 3 1
APC
SNSE without
122 3 0 10
APC
Note: A SNSE by itself can include 14 ASUs, including the two on the ENET shelf.
The same is true for the MicroNode.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-31
Equipment labelling 2
The equipment labels are made up of the following discriminators: function
references, discrimination numbers, and location identifiers.
Figure 2-15
Equipment labels for 42” cabinet
Discriminator
Numbers 39
N
PEC T
0
Reference X
5
0
A
Card 26
01
Position or
Slot Number
13
00
Cooling Unit
411-0930-001 12.03 February, 2001 Lesson 2 DMS-MSC Overview 2-20
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-33
Figure 2-16
Cards and paddleboards
P
a
d
d
l
Front Rear
Card e
b
o
a
r
d
Backplane
NT is Nortel Networks
N is numeric
A is alphabetic
X is either numeric or alphabetic
Examples of PECs are NTFX42AA and NT6X24AC.
Prefix The prefix NT is assigned to all codes, thereby
identifying this item as a Nortel Netowrks product.
Base Code Group Uniquely identifies the function of a card.
Suffix A 2-character suffix identifies each version of
products. It is assigned in sequence: AA, AB, AC.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-35
These units combine to create the complete function package of the DMS-
MSC, as shown in Figure 2-17. Note that the structures do not necessarily
imply interrelationships.
GSM maintains North American services and global services. These markets
are supported with software specific to that particular market. For example,
the global services layer contains the software applicable to global (non-
North American) GSM markets. This layer includes country specific features
and signaling.
Figure 2-17
DMS-MSC software structure
ATUP
North American Services Global Services
BTUP
CTUP
Chinese R1
GSM Services
Taiwan R1
Mobility Translations
MAP Base &
Mgmt.
Routing
Handover
A-Interface VLR
Shared Layer
CSP
Telecom Layer
Base Layer
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-37
GSM services 2
This layer contains the software related to GSM-defined services including:
• supplementary services
• short message service
• data service
GSM base 2
This layer contains the software related to the basic GSM functions including:
• mobility management
• visitor location register
• handover
• A-interface
• MAP base
Shared layer 2
Shared layer contents are obtained from the shared library. This library is a
central repository for storage of software features and frameworks for
multiple products. This centralized database provides the means for the
management of common software allowing market and product
independence, the evolution of services and a cost-effective structure for
software reuse.
GSM uses selected elements of the shared library including portions of the
CCS7 base, equal access, and data services.
Telecom layer 2
The telecom layer includes general purpose utilities such as call processing
and communications protocols and maintenance systems for DMS
telecommunications products. These utilities include CCS7, call processing
base, run-time support, ENET maintenance, and basic translations. This layer
does not necessarily contain all the functionality required to place calls.
Base layer 2
The base layer contains resource management for system resources,
maintenance systems for general purpose computing devices and operations,
administration and maintenance for the system.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential GSM DMS overview 2-39
6. What is a DRU?
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 3-1
Lesson 3
DMS-Core and DMS-Bus
Objectives 3
Given student lesson, instructor lecture and appropriate documentation, you
will be able to:
• describe the DMS-Core architecture
• describe the DMS-Bus architecture
• describe the base cabinet for the DMS SuperNode
• describe the base cabinet for SuperNode Size Enhanced (SNSE)
• explain the importance of taking an office image and Journal File (JF)
• describe the purpose of the Device Independent Recording Package
(DIRP)
DMS-Core 3
The DMS-Core (Figure 3-1) provides the processing power for the DMS
SuperNode. Using high-performance processors, the DMS-Core manages and
controls calls as they move through the system. The DMS-Core also handles
system integrity, maintenance and software loading and downloading.
Two high-speed SLMs are used for software loading, office images and PM
loads. Each SLM consists of one Magnetic Tape Drive (MTD) and one high-
capacity Disk Drive Unit (DDU). The SLMs are configured as extensions of
the DMS-Core.
Figure 3-1
SuperNode DMS-Core
SuperNode DMS-Core
DMS-Core
CM Processor Bus 0
Processor Bus 1
MEB
DMS-Bus 0
DMS-Bus 1
411-0930-001 12.02/EN December, 2000 Lesson 3 DMS Core & DMS Bus 3-3
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-Core and DMS-Bus 3-3
Computing module 3
The fully duplicated and synchronized CM processor performs the actual
system processing functions of the DMS SuperNode. The CM is based on a
32-bit processor with a built-in instruction cache facility and an on-board
high-speed data cache.
The CM has up to 960 Mbytes of memory for each plane. A single shelf holds
both planes. The CM shelf is equipped with cards on the front of the shelf and
corresponding paddleboards on the rear. The cards share a common bus with
the paddleboards.
RTIF paddleboard
The RTIF paddleboard:
• monitors and decodes commands from the local terminal
• passes these commands to the CPU as control signals
• monitors processor signals and relays them to the local terminal or remote
scanning system
The RTIF paddleboard has one interface port connected to the RTIF terminal.
RTIF terminal
The RTIF terminal:
• displays processor state information
• provides a facility for local resetting of the CM
Mate exchange bus
The Mate Exchange Bus (MEB) is the medium by which the two CPUs
maintain their operation of redundancy (or duplication). This medium allows
the two CPUs to routinely check each others modes of operation.
Memory
Memory cards store data used internally by the processor for call data and
program store. CM shelf is equipped with as many memory cards as needed (a
SNSE can have up to five cards per plane and a SuperNode can have up to ten
cards per plane). At any time, memory cards can be added. The need is
determined by:
• feature upgrades and software loads
• size of the office also determines how many memory cards are needed
Table 3-1
SNSE memory card configurations
DMS-Bus interfaces
The transmission subsystem controls in-band data communication with the
MSs and provides the crossover for links. It consists of a CPU port card and
DS-512 interface paddleboards.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-Core and DMS-Bus 3-5
The CPU port card provides serial message communications between the CM
and the MS. The DS-512 paddleboard provides the transmission interface for
a single, bi-directional, two-fiber DS-512 format.
The SLM is also equipped with cards on the front and corresponding
paddleboards on the rear. The cards share a common bus with the
paddleboards.
Either CPU of the CM can be loaded from either SLM through the crossover
bus.
Table 3-2
SLM configurations
Interfaces
The transmission system controls in-band data communication with the CM
and MS and provides the crossover for links. It consists of a CPU port card
and two parallel port interface paddleboards.
The CPU port card provides serial message communications between the
SLM and the CM. The parallel port interface paddleboards connect the
synchronous bus on the CPU card to the SLM with the aid of an interconnect
cable.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-Core and DMS-Bus 3-7
DMS-Bus 3
The DMS-Bus (see Figure 3-2) is the messaging component of the DMS
SuperNode. For reliability, the DMS-Bus consists of two MSs.
Transaction bus
The transaction bus carries payload messages, the actual traffic sent from one
module to another over the DMS-Bus.
Processor bus
The processor bus supervises and controls the transaction bus and port
interfaces. The processor bus carries only the control messages required for
DMS-Bus operation.
System clock
The DMS-Bus also houses the system clock, used by both the bus and the
core to carry out general clocking and timing functions.
The system clock provides synchronization for the DMS SuperNode and can
serve as a network master clock source to allow the entire network to run at
the same frequency.
Figure 3-2
SuperNode DMS-Bus
SuperNode DMS-Bus
DMS-Core
DMS-Bus
DMS-Bus
Port
Interface
Transaction Bus Processor/
Transaction
Bus
Processor Bus
Control
Processor
Bus
Port … Port Port System
Address
Interface Interface Interface Clock
Mapper
Link
Link Input/
Input/
Enhanced
Enhanced …
Peripheral
Peripheral Output
Output
Network
Network
Processor
Processor Controller
Controller
411-0930-001 12.03/EN February, 2001 Lesson 3 DMS Core & DMS Bus 3-4
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-Core and DMS-Bus 3-9
MS connectivity 3
The MS concentrates and distributes messages in the DMS SuperNode and
allows other components to communicate directly with each other.
The DMS-Bus can be configured with up to two inter-MS links, which can be
connected to any interface card in the MS shelf. As shown in Figure 3-3, the
DMS-Bus (message switch 0 and 1) concentrates and distributes messages to
and from the various nodes (CM, ENET, IOCs, and application processors)
connected to its ports. Access ports on the DMS-Bus can be configured as
DS-30 copper interfaces or as DS-512 fiber optic interfaces.
Figure 3-3
Inter-MS link configuration
Bus
Message Switch 0
D-S30
CM
LPP IOCs
ENET
SLM
RTIF
Modems
MTD
CCS7 DDU
Terminals
DS-512 Fiber
or DS-30 Copper
PM PM
411-0930-001 12.03/EN February, 2001 Lesson 3 DMS Core & DMS Bus 3-5
Plane
The term plane refers to a single side of a SYNC-matched node. Each plane
includes a single processor, memory, link interface circuitry, application
hardware, and power.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-Core and DMS-Bus 3-11
Figure 3-4
DPCC Cabinet
PP P P
SS MS 0 S S
Self 39
UU UU
PP P P
SS MS1 S S
Self 26 UU UU
PP P P
Self 13 SS CM0 CM1 S S
UU UU
PP PP
Self 00 SS SLM 0 SLM 1 SS
UU UU
COOLING UNIT
411-0930-001 12.02/EN December, 2000 Lesson 3 DMS Core & DMS Bus 3-6
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-Core and DMS-Bus 3-13
Figure 3-5
DMS SuperNode SE (SNSE) configuration
PP P P
Self 39 SS MS 0 MS 1 S S
UU U U
PP P P
SS LIS S S
Self 26
UU U U
ENET
PP P P
Self 13
SS
Plane 0 Plane 1
S S Enhanced Network
UU U U
PP P P Computing Module
S S SLM CPU 0 CPU 1 SLM S S
Self 00 UU 0 1 U U System Load Module
COOLING UNIT
411-0930-001 12.02/EN December, 2000 Lesson 3 DMS Core & DMS Bus 3-7
Office image
An office image is a copy, stored on Magnetic Tape Drive (MTD) or disk
drive unit (DDU) of the information in the CPU, program store, and data
store. This includes customer data tables, call processing programs, etc.
Office images are taken to protect the DMS in the event of a switch failure
which could corrupt the data base. If a failure does occur, the image needs to
be put back into memory.
Figure 3-6
Office image dump and manual bootstrap load
PROGRAM
STORE CPU "DUMP"
IMAGE
DATA STORE
TAPE/DISK
PROGRAM
STORE CPU "REBOOT"
IMAGE
DATA STORE
411-0930-001 12.02/EN December, 2000 Lesson 3 DMS Core & DMS Bus 3-8
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-Core and DMS-Bus 3-15
Journal file
If it is necessary to reboot the office from an image, all data changes made
since the date/time of that image could be lost (Figure 3-7). However, the
journal file feature provides a means of saving any modifications to the data
tables that may occur after an image dump. Therefore, the database always
has a current backup, in case of a system failure.
Figure 3-7
Journal file
Journal File
Data BUFFERS
Modifications
DIRP
Disk
Disk
411-0930-001 12.02/EN December, 2000 Lesson 3 DMS Core & DMS Bus 3-9
Through the journal file, all data modifications are collected in buffers and
sent to a dedicated storage device (tape or disk) by DIRP (Device
Independent Recording Package).
By interacting with the remote data polling system (XFER) and a data
link, DIRP makes data available to other locations.
XFER:
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-Core and DMS-Bus 3-17
Figure 3-8
DIRP block diagram
GSM Call
Operational
Other Journal File (JF) Detail Records
Measurements
Subsystems Subsystem (GCDRs)
(OM) Subsystem
Subsystem
Data Link
Administration
Center Disk
POWER
Disk LOAD
ON LINE
REWIND
FORWARD
REVERSE
WRITE
ENABLE
Recording Devices
411-0930-001 12.02/EN December, 2000 Lesson 3 DMS Core & DMS Bus 3-10
DIRP subsystems
As shown in Figure 3-8, DIRP directs data originating from the subsystems to
an appropriate storage device, such as magnetic tape or disk. By interacting
with the remote data polling system and a data link, the DIRP utility makes
data available to other locations. Although Figure 3-8 only shows three
subsystems, namely the JF, GCDR, and OM subsystems, other subsystems
are also available.
Journal file
The JF is a facility that preserves, on a recording device, changes made to the
data tables of the DMS-100 family systems. The JF provides a means of
restoring tables should a reload of office software from a backup image be
required.
DLOG
DLOG is a log retrieval facility for Emergency One Condition records.
DLOG records raw data before it is structured into reports. DLOG data is
intended for use by Emergency Technical Assistance (ETAS) and field
support personnel.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-Core and DMS-Bus 3-19
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-Core and DMS-Bus 3-21
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 4-1
Lesson 4
Input/Output Device (IOD)
Objectives 4
Given student lesson, instructor lecture and appropriate documentation, you
will be able to:
I/O
I/O
Device
Device
Controller
Controller Disk Drive Unit (DDU)
I/O
I/O I/O
I/O
DMS-BUS Message
Message Device
POWER
Device LOAD
ON LINE
REWIND
FORWARD
Processor
Processor Controller
REVERSE
WRITE
ENABLE
Controller
I/O
I/O
Device
Device
Controller
Controller
MAP Terminal
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Input/Output Device (IOD) 4-3
Figure 4-2
CIOE cabinet
CIOE Cabinet
FSP
CIOE
MTD Cabinetized Input/Output Equipment
POWER
LOAD
ON LINE
REWIND
FORWARD
REVERSE
WRITE
ENABLE
P P P P
S S S S
U U IOC U U
P P P P
S S S S
U U DDU U U
COOLING UNIT
An IOC occupies a single shelf and can be equipped with up to nine device
controllers.
Figure 4-3
Input/Output controller
...
8 Max.
MTD 1
MTD
CPU m
MS 1 a Modem
(inact) x
CM 1 TC 4
d Printer
e VDU
0 v
…….
IOC
m Modem
1 a
x
8 TC 4 Printer
d
...
e VDU
v
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Input/Output Device (IOD) 4-5
Devices 4
Several types of devices, including consoles, Magnetic Tape Drives (MTDs),
and Disk Drive Units (DDUs) can be connected to the DMS-MSC.
The DDU is used for the storage and retrieval of information. The storage
capacity of the DDU is greater than that of the magnetic tape drive and data is
accessed faster. Because of this storage capacity and speed, the DDU is used
to store large amounts of information from different sources.
The disk stores automatic message accounting GCDR, OM, JF.... Recording
of information from these subsystems is conducted by DIRP.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Input/Output Device (IOD) 4-7
Figure 4-4
Disk drive unit shelf
NT1X78AA
NT1X78AA
The MTD stores data for several applications including the following:
• OM
• DLOG
• GCDR
• JF
Figure 4-5
Magnetic tape drive
POWER
LOAD
ON LINE
REWIND
FORWARD
REVERSE
WRITE
ENABLE
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Input/Output Device (IOD) 4-9
In the table associated with IOD/IOC configuration, the system refers to these
ports as circuits and numbers them from 0-35. For example, if a VDU is
connected to card 2 on port #1, then this VDU is on card 2, circuit #9.
Figure 4-6
IOC cards, ports, and circuits
3 3 7 3 11 3 15 3 35 3
2 2 6 2 10 2 14 2 34 2
…
1 1 5 1 9 1 13 1 33 1
0 0 4 0 8 0 12 0 32 0
Note: The ISM shelf is presented later in this document. For more
information, refer to Peripheral Modules (PMs) section.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Input/Output Device (IOD) 4-11
Figure 4-7
ISM shelf and IOM circuit pack
ISM Shelf F
X
3
1
Rear View
Slots 3 4 5
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Input/Output Device (IOD) 4-13
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 5-1
Lesson 5
Enhanced Network (ENET)
Objectives 5
Given student lesson, instructor lecture and appropriate documentation, you
will be able to:
Enhanced network 5
The ENET provides the following:
• dedicated path for calls and data between the various Peripheral Modules
(PMs)
• communication links via MS to PMs
The network area establishes and maintains full duplex (four-wire) speech
and message paths between the PMs and the central control. Since ENET is
fully duplicated, every active connection is backed up by a corresponding
inactive connection. If any connection fails, the backup automatically
becomes active.
Figure 5-1 shows a call with a parallel connection set up through both planes
0 and 1.
Figure 5-1
Duplicated switching network
ENET
Originating Terminating
PM Plane 0 PM
Unit 1 Unit 1
Plane 1
Unit 0 Unit 0
With ENET, the single-stage architecture guarantees a dedicated path for each
call.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Enhanced Network (ENET) 5-3
Figure 5-2
Enhanced network reduces footprint
8x11
16
Frames
1986
5x13
32
Frames
1983
0x48
64
Frames
1979
The single-cabinet ENET is equipped with a minimum of one shelf per plane
and is expandable to two shelves per plane.
Figure 5-3
ENET in system architecture
Service
Processing DMS-Core
DMS-Core File
File Processor(s)
Processor(s)
Hardware
DMS-Bus
DMS-Bus
Messaging/
Connectivity
Hardware
Enhanced
Enhanced Network
Network (ENET)
(ENET)
Physical Link
Link
Peripheral
Peripheral Modules
Modules
Access Peripheral
Peripheral IOC
(PDTCs,
(PDTCs, DTCi,
DTCi, etc.)
etc.)
Hardware Processor
Processor
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Enhanced Network (ENET) 5-5
Hardware configuration 5
ENET cabinets
A single cabinet configuration supports up to 64K channels, both planes are
housed in one cabinet. The dual cabinet supports up to 128K channels and
each plane is housed in a separate cabinet. Each ENET cabinet comes
equipped with a frame supervisory panel (FSP), a cooling unit and one ENET
shelf assembly. Up to four ENET shelves can be provisioned per cabinet
(Figure 5-4).
Figure 5-4
ENET cabinet for SuperNode (one plane shown)
PP PP
SS ENET 0.0 SS
UU UU
PP PP
SS ENET 0.1 SS
UU UU Enhanced Network Shelves
PP PP
SS ENET 1.0 SS
UU UU
PP PP
SS ENET 1.1 SS
UU UU
COOLING UNIT
Figure 5-5 illustrates the ENET shelf for the SNSE & MicroNode switches.
Figure 5-5
ENET shelf for SNSE or MicroNode
P P P P
S S MS 0 MS 1 S S DMS-Bus
U U U U
P P P P
S S LIS S S LIS
U U U U
ENET
P P P P
ENET
S S S S
Plane 0 Plane 1
U U U U
P P P P
S S CPU 0 CPU 1 S S DMS-Core
SLM SLM
U U 0 1 U U
COOLING UNIT
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Enhanced Network (ENET) 5-7
Figure 5-6
ENET configurations
ENET Configurations
SuperNode 128K Channels
Plane 0 Cabinet Plane 1 Cabinet
Shelf 0 Shelf 0
Shelf 1 Shelf 1
Shelf 2 Shelf 2
Shelf 0 MS MS
Plane 0 LIS
Shelf 1
Plane Plane
Shelf 0
Plane 1 ENET shelf 0 1
Shelf 1 CM/SLM CM/SLM
Figure 5-7
ENET shelf layout
R I F I I I I I I I F F F F F F F F I I I I I I I I
T / i / / / / / / / i i i i i i i i / / / / / / / /
I F l F F F F F F F l l l l l l l l F F F F F F F F
F l l l l l l l l l
e e e e e e e e e
r r r r r r r r r
B A C K P L A N E
P P P C X X X X X X X X F F F F F F F F X X X X X X X X P P
o o r l p p p p p p p p i i i i i i i i p p p p p p p p o o
w w o o t t t t t t t t l l l l l l l l t t t t t t t t w w
e e c c l l l l l l l l e e
r r e k t t e e e e e e e e t t r r
s & e e r r r r r r r r e e
C C s M r r r r C C
o o o s m m m m o o
n n r g n n
v v v v
01 14 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 36
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Enhanced Network (ENET) 5-9
The processor card communicates with the crosspoint cards using a 16-bit
address bus and an 8-bit data bus. Up to 64 fibers terminate on an ENET
shelf. Two of these fibers are reserved for messaging to the DMS-Bus. One
link is connected to the DMS-Bus plane 0 and the other to plane 1.
Interface to PMs 5
ENET supports the option of interfacing PMs through the DS-30 copper
interface. However, to make full use of ENET capacity and performance, a
DS-512 fiber optic interface is typically provisioned for extended peripheral
modules (XPMs), such as PDTCs.
Interface to MS 5
Two major enhancements to the DMS-Bus have been introduced with the
ENET:
• The physical communication links between MS and ENET are DS-512
fiber optic connections. PMs connected to ENET are assigned
independent MS ports on each plane.
• Each ENET shelf is independently synchronized to the MS. The message/
clock card is responsible for synchronization and clock timing for the
ENET shelf. The message/clock card connects a DS-512 fiber link from
each plane of the message switch. The fiber link provides the connection
for the timing and control signals to be sent between the ENET and the
MS.
PM synchronization 5
PMs attached to ENET are also synchronized via the fiber links between the
ENET and the PMs.
As shown in Figure 5-8, traffic enters ENET from PMs by way of fiber DS-
512 or copper DS-30 links. Under the control of the CM and the local ENET
processor, crosspoint circuits switch the signal to the appropriate PM.
Figure 5-8
Block diagram of ENET architecture
64-port Card
DMS-Bus DS-512 Interface
Plane 1
H-Bus
DS-512 I/F RTIF
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Enhanced Network (ENET) 5-11
ENET operation 5
ENET performs the actual switching of channels in the crosspoint circuit
pack. The switching process can be visualized (Figure 5-9) as a grid or a
squared matrix, formed by the vertical and horizontal buses in the ENET
cabinet. The H-Buses run between and connect the crosspoint cards on each
shelf. V-Buses run between and connect the ENET shelves in an ENET
cabinet.
Unswitched channels enter through the ENET paddleboards onto the ENET
V-Bus. The unswitched channels on the V-Bus are written into a double-
buffered memory in each crosspoint card. (The connection-memory control
on the crosspoint card itself manages this read-process at the core of the
single-stage time switch. The connection-memory control is updated by
messages from the CM, which are in turn interpreted by the local ENET
processor). From this memory, the appropriate crosspoint circuit pack takes
unswitched channels from the V-Bus and feeds them to the appropriate H-
Bus in the appropriate time slot. From the H-Bus, it goes back through the V-
Bus, where it is transmitted through the paddleboards to the appropriate
terminating PM.
Figure 5-9
ENET single-stage switch
Paddleboards
Fiber Links
Crosspoint V-Bus
Circuit Packs
Sh 0 HBUS 0
9 10 11 12 13 14 15 16 25 26 27 28 29 30 31 32 HBUS 1
Sh 1 HBUS 2
HBUS 3
Sh 2
HBUS 4
HBUS 5
Sh 3 HBUS 6
9 10 11 12 13 14 15 16 25 26 27 28 29 30 31 32 HBUS 7
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Enhanced Network (ENET) 5-13
Figure 5-11
ENET switching example 1
Sh 0 HBUS 0
9 10 31 32 HBUS 1
Sh 1
Sh 2
PDTC 3
Sh 3 HBUS 6
9 10 31 32 HBUS 7
VBUS 0 VBUS 7
Figure 5-12 shows PDTC 3 connecting to PDTC 5 using shelf 0 slot 32 as the
switching card.
Figure 5-12
ENET switching example 2
Sh 0 HBUS 0
9 10 31 32 HBUS 1
Sh 1
Sh 2
PDTC 3
Sh 3 HBUS 6
9 10 31 32 HBUS 7
VBUS 0 VBUS 7
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Enhanced Network (ENET) 5-15
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 6-1
Lesson 6
Peripheral Modules (PMs)
Objectives 6
Given student lesson, instructor lecture and appropriate documentation, you
will be able to:
Peripheral modules 6
The DMS-MSC/HLR family of PMs is the basic access vehicle for most
services.
In general, PMs provide low level scanning, signaling, call processing, and
maintenance functions in support of the higher level processing done by the
CM. The PMs used in the GSM network include the following equipment:
• PCM-30 Digital Trunk Controller (PDTC), PCM-24 Digital Trunk
controller (DTC), Digital Trunk controller ISDN (DTCi)
• Link Peripheral Processor (LPP)
• Maintenance Trunk Module (MTM)
• Office Alarm Unit (OAU)
• Digital Recorded Announcement Machine (DRAM) or Digital Trunk
Module (DTM)
• Integrated Service Module (ISM)
Figure 6-1
Typical PMs cabinets
Typical PM Cabinets
CDTCO Cabinetized CTME Cabinetized
Digital Trunk Controller for Offshore Trunk Module Equipment
FSP FSP
P P PP P P P P
S S SS S S Maintenance S S
UU UU U U U U
Trunk Module
PCM30 Digital
Trunk Controller
PDTC 1
PP PP P P P P
SS SS S S Maintenance S S
UU UU U U
U U Trunk Module
PP PP P P P P
SS SS S S Maintenance S S
UU UU U U U U
Trunk Module
PCM30 Digital
Trunk Controller
PDTC 0
PP PP P P P P
SS SS S S Maintenance S S
UU UU U U U U
Trunk Module
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Peripheral Modules (PMs) 6-3
PM network interface 6
As shown in Figure 6-2, all PMs connect to the rest of the switch via the
ENET shelf, by duplicated links (that is, one link to plane 0 and another to
plane 1).
These links are either DS-30 or DS-512 and carry both speech and message
channels. Each channel connection between a PM and the network consists of
separate transmit and receive paths.
Figure 6-2
PM connections
PM Connections to ENET
MS
CM ENET ENET
Plane 0 Plane 1
PM PM
Unit 0 Unit 1
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Peripheral Modules (PMs) 6-5
The DMS-MSC uses 30 of the 32 channels for speech paths between the PM
and the network. The remaining two channels provide paths for an internal
message system (PM to PM or CM) and an external C7 messaging system.
The two message channels provide control and communication interfaces
between the PM and the Front-end.
Course 930 Standard 12.03 February 2001 For training purposes only
Unit 0
Unit 1
Nortel Networks Confidential
Figure 6-3
1 2
1 2
6X27BB NIL 6X27BB NIL
6X27BB NIL 6X27BB NIL
PDTC dual shelf
3 4
3 4
6X27BB NIL 6X27BB NIL
6X27BB NIL 6X27BB NIL
5 6
5 6
0X50AA NIL 0X50AA NIL
0X50AA NIL 0X50AA NIL
411-0930-001
7 8
7 8
12.03
0X50AA NIL 0X50AA NIL
GSM
0X50AA NIL 0X50AA NIL
MX77AA NIL MX77AA NIL
6X70AA NIL 0X50AA NIL
6X44EA NIL 6X44EA NIL
6X92CA NIL 6X92CA NIL
February, 2001
0X50AA NIL BX01BA NIL
0X50AA NIL 0X50AA NIL
6X69LB NIL 6X69LB NIL
6X28AA NIL 6X28AA NIL
6X42AA NIL 6X42AA NIL
PDTC Dual Shelf
NIL NIL
REAR
REAR
Peripheral Modules (PMs)
GSM12
6-7
6-8 Peripheral Modules (PMs) Nortel Networks Confidential
Figure 6-4
PDTC to ENET message links
3
ENET 1
14 10 6 2 5
13 9 5 1 4
ENET 0
2
12 8 4 0 0
1 DS512 =
16 DS30
PCMs
The DTCi:
• interfaces to all incoming and outgoing ISDN PRI trunks
• is configured as an XPM with a Unified Processor (UP) and an enhanced
ISDN signaling preprocessor (EISP) card (NTBX01AB)
• uses the EISP to provide D-channel processing for ISDN PRI and the
6X44EA Time Switch (TS) for data and A-law/µ−law PCM voice
conversions
The Universal Tone Receiver (UTR) is used for inband digit collection.
Provisioning of trunks other than ISDN PRI is not supported on the DTCi.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Peripheral Modules (PMs) 6-9
Other PMs 6
Several PMs are available in GSM for use with the DMS-MSC for functions
other than voice trunk access:
• MTM
• ISM
• DRAM, EDRAM or DTM
• IOM
Because of the special test and service circuit cards used, the MTM requires
two extra buses for directing data exchange between the test circuit cards and
two power converter cards. The DMS-MSC supports the Cabinetized Trunk
Module Equipment (CTME) with up to four MTMs (Figure 6-5).
Figure 6-5
Integrated Service Module
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
NIL
REAR
2X75BA
0X50AC
0X50AC
0X50AC
2X71AA
2X71AA
0X50AC
0X10AA
0X50AC
0X10AA
3X83AC
0X50AC
3X83AJ
FX42AA
1X80AA
2X57AA
5X30BA
0X10AA
4X45AA
FX43AA
FRONT
1 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Transmission termination trunk
Blank Card
Controller card
ISM DC Converter
Blank Card
Blank Card
Blank Card
Blank Card
Up to 14 scan point/card
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Peripheral Modules (PMs) 6-11
Table 6-1 lists the existing MTM PEC codes to the corresponding new ISM
codes.
Table 6-1
MTM PEC codes to ISM codesTable 6-1
The IOM controller card (NTFX30AA) resides in slot 3 (or 3 and 4) of the
ISM shelf.
The storage media card provides the interface to the DAT and DDU plug-in
units.
Figure 6-6
ISM cabinet & IOM
F
FS P X
3
1
FX30AA
+ FX32AA
IOM Packs =
+ FX32BA
+ FX32CA
411-0930-001 12.03 February, 2001 Lesson 6 Peripheral Modules (PMs) 6-8
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Peripheral Modules (PMs) 6-13
CCS7 link expansion and NIU is supported by GSM. It increases the number
of NIUs in a GSM office datafillable from 9 to 18. It also increases the number
of CCS7 links datafillable in a GSM office from 108 to 180. This is only possible
when:
• node is a World Trade Product
• switch is datafilled exclusively SSP (there is not INode datafill)
• T1-DTCs are not datafilled in the office
European customers should have end offices with a higher NIU and CCS7
link limit. The European network architecture is primarily fully associated
and an increased link-limit would allow a single end-office to connect to a
greater portion of the network via associated links.
The PM used to interface with the CCS7 network is the Link Interface Unit #
7 (LIU7). The LIU7 circuit packs are mounted in specific cabinets called Link
Peripheral Processor (LPP)
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Peripheral Modules (PMs) 6-15
Figure 6-7
LPP cabinet
LPP Cabinet
Frame Supervisory
Panel
Local Local
Message Message Local
Switch Switch Message Switch
0 1 Shelf 0
Link Interface
Shelf 1
Link Interface Units
Link Interface
Link Interface Units
Shelf 2
Link Interface
Link Interface Units Shelf 3
Cooling Unit
Figure 6-8
Link Peripheral Processor interconnections
LPP Interconnections
DMS-MSC
MS
Signaling
ENET
TCP/IP on Ethernet
IWF
CCS7 on V.35
DMS-HLR LPP
CCS7 on V.35 MTM
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Peripheral Modules (PMs) 6-17
Figure 6-9
Link Interface Unit
Rear Part PB
MTP1
Front Part
ST IPF
MTP2 MTP3
Figure 6-10
Link interface shelf in a SNSE cabinet
PP P P
SS MS 0 MS 1 S S
UU UU
PP P P
SS Link Interface Shelf S S
UU UU
PP L L P P
I ENET 0 ENET 1 I
SS U U S S
UU 0 16K 16K 1 U U
PP P P
S S SLM CPU 0 CPU 1 SLM S S
UU 0 1 UU
COOLING UNIT
Note: The LIUs on the ENET shelf cannot support channelized access
only V.35 or can be replaced by EIU.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Peripheral Modules (PMs) 6-19
The SNSE integrates the LIM functions and the message switch functions on
the same DMS-bus hardware.
The SNSE LIS is a Link Interface Shelf (LIS) provisioned in one shelf of the
DMS SNSE core cabinet. A resident rate adapter in each message switch
enables the link peripheral processor functionality to be provided in the DMS
SNSE configuration, without using separate Local Message Switches (LMS).
No redundant access is provided between the MSs and the F-Bus; Inter-
Message Switch Links (IMLs) are used for this function. Otherwise, the
functionality of the LPP in the SNSE configuration is the same as the regular
LPP.
NIUs reside on the same shelves as the LIU7s, and one NIU is allowed on
each shelf. NIUs are located in the middle of each shelf and are composed of
three cards per unit, two in the front and one in the back.
Note: When NIUs are installed, the maximum number of LIU7s available
drops from 12 ro 10 on a LIS and from 36 to 30 overall within one LPP
cabinet.
Channelized Access
Channelized access is the name given to CCS7 signaling using NIUs to
transfer signaling links to LIU7s.
Figure 6-11 shows how messages enter an LIU7 via an NIU: this method of
entering an LIU7 is channelized access.
A signaling message goes through the following steps to reach an LIU7 via
channelized access:
1. signaling message enters switch via a PDTC
2. signaling message enters both network planes
3. signaling message enters an NIU from one network plan
4. signaling message uses both C-Bus links to enter an LIU7
5. LIU7 chooses one of the C-Bus links (the other remains on stand-by)
Note: The BSCs do not support V.35, 50. Channelized access must be
used for the A-interface connection.
Figure 6-11
Entering an LIU7 via channelized access
LPP ENET
LMS 0 LMS 1
DS30, DS512
LIS 1 DS30
PDTC
LIS 2
LIS 3 N N L LL
I I I I I
U U U UU
0 1
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Peripheral Modules (PMs) 6-21
LIU7s which use the NIU must be equipped with the NTEX25 C-Bus
interface paddleboard. The LIU7 puts data on the C-Bus which the NIU
transfers to the network through one to four DS-30 links on its channel bus
controller paddleboard.
As shown in Figure 6-12, the NIUs and the LIU7s share the F-Bus and the C-
Bus. However, where the F-Bus is common to all shelves in a LPP, each shelf
has its own C-Bus. The C-Bus is used by LIU7s and NIUs for data only. Note
that NIU 0 only connects to C-Bus 0, and NIU 1 only connects to C-Bus 1.
LIU7s use the F-Bus for both data and maintenance messaging, but the NIUs
only use the F-Bus for maintenance messaging.
Figure 6-12
NIU and LIU7 connections in the LPP
FBUS 0
FBUS 1
CBUS 0
CBUS 1
NIU cards
The three cards which comprise an NIU (one unit) are as follows:
• NIU Processor - NTEX22
• C-Bus interface - NTEX25
• paddleboard - NTEX28
Note: NIUs are always deployed in pairs. A fully provisioned NIU pair
consists of two of each card listed above, for a total of six cards.
Figure 6-13
MMU functionality
MMU Functionality
DMS
DMS BUS
BUS (MS)
(MS)
VLR
VLR Mobility
Mobility Mgmt.
Mgmt.
LPP
DMS-CM
Trunk Call Trunk Call M+N
MMUs
Processing Processing
Connector Management
Distribute this
Work to MMUs
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Peripheral Modules (PMs) 6-23
Figure 6-14
MMU simplified functions. location, and flow
CM
MS Call
MAP / MM
MEL
Sub to MMU
VLR
Virtual MMU
LIM
MAP / MM
Router
MEL VLR
VLR
SCCP
SCCP
MTP LIU7 MMU
LPP
Check out
Each MMU possesses a local VLR. Active subscribers are assigned, or
checked out, from the CM VLR to an MMU VLR for mobility management
and call processing. While a copy of the VLR tuple is retained on the CM, it
is considered stale and not used to process any transaction requests.
Subscribers are checked out to the least busy MMU. As a result no fixed
partitioning of the VLR database to MMUs exists. A VLR tuple is checked
out to a single MMU at any one time, and once a tuple has been checked out,
all subsequent requests for the corresponsing subscriber will be forwarded to
that MMU. Any request received at the CM for a subscriber whose VLR tuple
has not been checked out to an MMU, an MMU is selected, the VLR data is
copied to the MMU VLR, and the corresponding request is processed.
The MSC capacity gain from the MMU program is directly driven by the
amount of work offloaded from the CM processor. The amount of offloaded
work is a function of the amount of mobility management work performed on
the MSC, which is dependent upon the site’s call profile. As a result, multiple
MMUs are required to realize capacity gains. The number of MMUs required
is a function of VLR size and the mobility profile of the site. MMUs should
be provisioned for M+N sparing. Physically, a minimum of two MMUs per
system and a maximum of 14 are supported.
Figure 6-15
Hardware configuration with MMUs
SLM CM
MS
LMS ENET
ENET
NIU LMS
MMU-1
LIU7-1
MMU-2
NIU
MMU-1
LIU7-2
MMU-3 XPMs
XPMs
LIU7-1
LIU7-3 MMU-2
MMU-4
LIU7-2
. . MMU-3
CBUS
FBUS
. .
. LIU7-3 . MMU-4
. .
CBUS
FBUS
LIU7-n
.MMU-m .
. .
LPP1
. LIU7-n
MMU-m
.
. LPPn
411-0930-001 12.01/EN December, 2000 Lesson 6 Peripheral Modules (PMs) 6-17
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Peripheral Modules (PMs) 6-25
1. How is the DTCO linked to the rest of the subsystems within the switch?
6. By how much does the ISM increase capacity for service circuit
utilization per shelf?
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 7-1
Lesson 7
SuperNode Data Manager/Fault Tolerant
(SDM/FT)
Objectives 7
Given student lesson, instructor lecture and appropriate documentation, you
will be able to:
• describe the purpose of the SDM/FT
• describe the platform hardware of the SDM/FT
• explain OAMP
• describe the OMC-S applications
• describe the HLR-Provisioning Server (HLR-PS) application
• describe the Call Intercept System application
SDM/FT cabinet 7
The SDM/FT cabinet supports the following software:
• operating system services
Operating system services include system kernel, data reliability, and
process control services.
• SDM-internal software
The internal services include fault detection, system administration, and
maintenance services.
Figure 7-1
OAMP platform software
AIX
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential SuperNode Data Manager/Fault Tolerant (SDM/FT) 7-3
SDM/FT overview 7
The SDM/FT is a UNIX-based computing platform on which a variety of
services and applications can be hosted to provide OAMP services.
General Description
The SDM/FT is based on a Motorola PowerPC-based dual-processor system.
System I/O is achieved using fault tolerant I/O buses, mirrored disk storage,
and redundant communications links.
Figure 7-2
SDM/FT cabinet
SDM-FT Platform
MSP
Shelf 2
I/O Expansion Chassis
(optional)
1 2 3 4 5 6 7 8 9 10111213141516
Shelf 1
Main Chassis
1 2 3 4 56 78 10
9 11
1213141516
Cooling Unit
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential SuperNode Data Manager/Fault Tolerant (SDM/FT) 7-5
Figure 7-3
SDM-FT architecture
CPU 0
CPU 1
Disk Comm & I/O
Subsystem
I/O Domain 1
- 48 V dc
B Feed
Table 7-1
SDM-FT parts
Part Description
Part Description
DAT Drives Two digital audio tape (DAT drives) are provided on the SDM/
FT for software/data loading and backup. One DAT drive is
located in each I/O domain for reliability. Both DAT drives are
accessible by either CPU.
Dual-bus The SDM/FT employs dual fault tolerant maintenance, power,
Architecture and I/O buses to provide uninterrupted service in the event of
any single hardware failure on the system.
Hard Disk Storage These disks are mirrored: all data is written to and available
from both disks.
• In normal operation (mirrored storage) all system data is
written simultaneously to both disks. Reads from disk are
alternated between the two disks.
• When one disk fails, it is manually removed from service,
or is unavailable due to loss of one power feed. All system
software and data are available from, and written to, the
remaining disk. When the out-of-service disk is returned to
service, all data is automatically synchronized between
the two disks and mirrored operation resumes.
LAN Connectivity provides connectivity to the operating company LAN and is
Hardware also duplicated. These modules operate in active-standby
mode.
• If the active Ethernet link fails or becomes unavailable for
any reason, Ethernet traffic is automatically switched to
the standby link. The transition occurs without service
interruption and is transparent to application users. There
is no loss of data packets during the switchover.
DS512 provides DS512 connectivity to the DMS Message Switch
Connectivity (MS). It is fully duplicated on the MS and SDM sides of the
Hardware four links.
• In normal operation, traffic is shared across the four
DS512 links.
• In the event of failed or unavailable hardware on the MS,
the SDM, or the physical links themselves, full CM-SDM
communications can continue without service interruption
or impact to application users with a minimum of one in-
service DS512 link.
Power The SDM/FT is powered by two -48Vdc power feeds. The
system is capable of full operation on a single feed. While
operating on a single power feed, the computing core
operates in duplex mode; one input-output (I/O) domain
remains fully operational in simplex mode. The transition to
single-feed operation, and back to dual-feed operation, occurs
without service interruption or impact to application users.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential SuperNode Data Manager/Fault Tolerant (SDM/FT) 7-7
Part Description
Cooling Each SDM/FT chassis is cooled by two fan modules which are
both active during normal operation. Each fan module
contains 3 fans. If either fan module in a chassis fails, is
removed from service, or is unoperational due to loss of one
power feed, the chassis can operate on a single fan module
without impact.
All modules are 6U (10.5 in.) in height. Modules requiring more than one slot
are multiples of one inch. The middle six slots are dedicated for three double
slot wide CPU modules. The center CPU position is not used on the SDM/FT
and is provisioned with filler plates. The five remaining slots on either side
from the two I/O domains. Figure 7-4 shows the SDM/FT main chassis
populated with its baseline module set.
Figure 7-4
SDM/FT main chassis
ESD Grounding
Point
CPU modules
Filler Plates
Q3
» Centralized management of
multiple network elements
» Powerful Fault and Performance
Management toolsets
» Easy to use GUI and pop-up on-
line help menus
FM agent FM agent
» PC-based platform utilizing Java PM agent PM agent
» Open Q3 interface
NES
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential SuperNode Data Manager/Fault Tolerant (SDM/FT) 7-9
Figure 7-6
OMC-S software architecture
Workstation SDM-FT
Configuration Mgt
SDM Agents
DMS
Performance Mgt
Windows NT
AIX Operating
System
This manual focuses on the OMC-S network that manages the GSM Network
and Switching Subsystem (NSS).
Figure 7-7
Configuration management application
MOI EM Server
Identification Application
Switch Elements
Containment Tree
Administrative & Availability status
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential SuperNode Data Manager/Fault Tolerant (SDM/FT) 7-11
Figure 7-8
Fault management application
Workstation
Fault
Manager DMS-MSC/VLR
SDM-FT DMS-HLR/AuC
MOIs
Switch Elements
Containment Tree
Figure 7-9
Performance management application
Switch Elements
Containment Tree
Elements with OMs
HLR-PS functionality 7
The HLR-PS:
• provides access to the DMS-HLR database allowing subscribers and
subscriber data to be queried, added, modified and deleted
• provides provisioning operations related to Subscribers and Services can
be performed via the datafill of the DMS tables
• uses the powerful UNIX tools (NFS, scripts, FTP) to datafill tables
• allows the operating company to create simple text files complying the
MSP format (Mobile Subscriber Provisioning)
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential SuperNode Data Manager/Fault Tolerant (SDM/FT) 7-13
Figure 7-10
HLR-PS general architecture
X.25
X.25
Network Transfer Network
Network PSTN
NFS Manual Transfer
TCP/IP 32 Links RS-232 or
X.25 TERMINAL FTP
GATEWAY SERVER
LAN
TCP/IP
The CIS provides the ability to monitor communications events of the target
MS from a remote surveillance facility, or from within the Mobile Switching
Centers (MSCs).
The target subscriber activities can be monitored even if the subscriber roams
to a different MSC within the home PLMN. Subscribers who roam
internationally are selected for call interception by the monitoring agency in
the visiting PLMN.
Call Intercept
Multiple Monitoring Provisioning Center
Center(s)
Feature Overview
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential SuperNode Data Manager/Fault Tolerant (SDM/FT) 7-15
CIS functions
The CIS performs the following functions:
• call monitoring performed at the Monitoring Centers
• call intercept provisioning performed at the CIPC
• nodal security
• configuration management
Table 7-2
CIS functions
Call Monitoring Every voice call that either originates from or terminates to
a targeted subscriber, and every non-call mobility event, is
intercepted at the DMS-MSC, and routed to the
authorized agency monitoring center. Both the call
contents and the call associated data are intercepted and
routed to the monitoring center.
Call Intercept The CIS allows either an authorized security agency, or
Provisioning the service provider on behalf of an authorized security
agency, to provision mobile subscribers for call
interception.
Nodal Security Nodal security is accomplished on the CIS by enforcing
use of passwords.
Configuration The Configuration Management function allows the
Management provisioning operator to assign Security Agency IDs and
monitoring center IDs. If the CIS configuration is
centralized, the provisioning operator can act on behalf of
multiple security agencies.
CIS architecture
The CIS architecture includes three major hardware/software components that
can be connected in either a centralized or a decentralized configuration:
• DMS-MSC switch is a Network Element (NE) in the PLMN
• each DMS-MSC has its own SDM/FT which acts as a mediation device. It
is connected to the CIPC over a LAN/WAN in the GSM network
• monitoring center(s), where targeted mobile subscribers are monitored
Figure 7-12
CIS architecture
CADRs/ CADRs/
NCADRs NCADRs
only only
LAN Call
Contents
ANSI/
Note: ETSI-ISUP
The Monitoring
Centers are not Call
provided by Contents
NORTEL.
ANSI/
ETSI-ISUP
FTAM/X.25
TCP/IP -
TCP/IP TCP/IP
Ethernet
TCP/IP-Ethernet
FTAM/X.25 LAN
ANSI/ ANSI/
ETSI ISUP SDM/FT
ETSI ISUP
SDM/FT DMS-MSC
DMS-MSC (PET7)
(PET7)
PLMN
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential SuperNode Data Manager/Fault Tolerant (SDM/FT) 7-17
CIS capacity 7
The CIS capacity is based on agencies. It can be:
• up to 5 agencies
• up to 2048 target subscribers per agency
• multiple operators
• up to 32 parallel interceptions at MSC level
• up to 20 MSCs per CIPC
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential SuperNode Data Manager/Fault Tolerant (SDM/FT) 7-19
5. What is CIPC?
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 8-1
Lesson 8
Using MAP terminal
Objectives 8
Given student lesson, instructor lecture and appropriate documentation, the
student will be able to:
a. press the setup key (F3) located at the top left section of the keyboard
to display the setup directory on the screen
b. use the arrow keys to move the field cursor to the default field. The
selected field is highlighted
c. press the ENTER key in the numeric keypad situated at the lower
right corner of the keyboard. This action puts the terminal into the
factory setting. Always use this ENTER key to change field values to
the desired settings
Confirmation “Done” appears on the bottom of the screen.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-3
Table 8-1
VDU configuration
(3) XOFF at 64
Figure 8-1
CI level tasks
CI Level Tasks
LOGIN
CI LEVEL
DISKUT Table
DSKUT MAPCI LOGUTIL
Editor
MTC
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-5
Syntax conventions
Use the following syntax conventions when inputting MAP commands:
You must enter the appropriate parameter. Text indicating a parameter but
not providing a literal string is displayed in lower case. Unless explicitly
told to do so, do not enter angle brackets.
Keyboard commands 8
The following keyboard commands are essential for effective MAP
operation.
Table 8-2
Line editing command functions
Command Explanation
? The user may recall one of the LAST THREE lines which were
entered. (Timesaver - allows you to repeat a part or an entire
command without retyping it.)
CTRL F moves the cursor one position to the right
CTRL U deletes the entire line
CTRL E deletes all typed in characters from the cursor position to the end
of the line
CTRL I places the terminal mode to insert; subsequently typed characters
are placed into the line. As each inserted character is typed, all
characters from the cursor position moves one position to the
right.
CTRL X exits from the character insert mode
CTRL S stops scroll
CTRL Q begins scroll
CTRL H backspace
BACK SPACE moves the cursor to the left
DELETE or deletes the character at the cursor position
CTRL 8
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-7
Table 8-3
Changing output display commands
Command Explanation
HT Halt typing (HT). The display of responses stops, but the process
continues unseen.
MAP commands 8
The MAP commands allow you to operate, maintain and provision the
switch.
The following commands provide basic functions needed to access and use
the DMS-MSC/HLR.
Input: LOGOUT
Response: The system responds with BYE BYE and a flashing cursor.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-9
Example
Input: QUSER
Response: The list of logged-on users and their associated terminal.
Example
Input: DATE
Response: Date is WED. 15/MAY/1996 15:30:10
Example
Input TIME
Response: Time is 15:29:22
Where: Hours (15)
Minutes (29)
Seconds (22)
The command will be removed automatically when the user logs out.
Note: The user created a new command called T. When T is entered, the
command TIME will be executed by the system.
— states that a format pack and a lis all commands will be performed on
the Table named “@1”.
— creates the new command with the following parameters:
– table @1 - “@1” determines which Table the remaining two parts
of the sequence will be performed on. Entering the variable “@1”
in the definition line allows you to perform mycommand on any
Table.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-11
mycommand Definition
Removes extraneous
spaces from Table @1.
This customized command format pack Table C7link, and display the
entire contents of table C7link.
Example
To send a message to a specific user.
Note: The message must be enclosed in single quotes and cannot exceed
one line in length.
Example
To send a message to ALL logged in users.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-13
The office header message helps lab personnel to know what BCS load is in
the switch. It usually contains the: COEO number, Office name, BCS load,
BCS release and BCS release date.
The new message will override the previous office header. To verify, hit the
RETURN key twice.
Note: The message MUST be in single quotes and cannot exceed one line
in length.
Example
Example
Example
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-15
Stack size
The size of memory (bytes) allocated to run switch software processes. If the
memory is not set large enough, the user cannot run all software systems in
the switch. A value between 2000 and 10000 is recommended.
The larger value gives the user more memory. (Default = 7000)
Language
The language for the system output messages and input commands. Value can
be DEFAULT, ENGLISH, FRENCH or SPANISH.
(Default = ENGLISH)
Command class
Two options are available. ALL or a number in the range 0–30.
(Default = ALL)
For example, a terminal assigned to service orders does not need to have
access to the commands used by network management; thus, they would be
assigned different classes associated with different commands.
Note: To override the default ALL, enter PERMIT, followed by all the
desired attributes, before the RETURN key is pressed.
Example
Note: Verify the proper data was entered by logging in as the new user.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-17
Any user having the command class ALL can delete another user, but only if
you know the other user password. This restriction limits the ability to do
UNPERMIT to the ADMIN user. Remember, ADMIN has the power to
assign a new password to any user.
When two devices are linked, all input and output on the FROM device are
echoed on the ONTO device. Device parameters default to INPUT and
OUTPUT.
Parameters
<Function> {START,STOP,QUERY}
[<FromDevice> {FROM <Device> DEVICE name}]
[<OntoDevice> {ONTO <Device> DEVICE name}]
Example 2
Start a recording link from the initiating terminal R324U1 onto PRT0, and
then QUERY the recording link
.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-19
Example 3
Start a recording link from R324U2 onto disk volume D010MISC. Recording
link started by user TOM from the R324U1 terminal.
Parameters
<number> <expression>
<number> A numerical value (1 TO 32767) representing
the number of times the CI command or
expression is to be executed repeatedly.
<expression> Any valid CI command or expression
Example
The same command is also used to reinstate the user terminal response to the
originating device.
Note: The SEND command will not display the contents of the rerouted
information on the originating device.
Parameters
{devname [tapefilename] ,
systemfilename
PREVIOUS} Cancels the SEND command previously entered. The
PREVIOUS parameter is to the SEND command as
the STOP parameter is to the RECORD command.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-21
CI menu hierarchy 8
As shown in Figure 8-3, the CI menu system is developed in a layered or
hierarchical manner. This means you must enter a menu level at a higher level
before you can access a lower level.
Figure 8-3
CI menu hierarchy
CI Menu Hierarchy
CI
Table LOGUTIL
MAPCI DSKUT DISKUT
Editor
MTC
Figure 8-4
MAPCI display areas
Command
Menu
Display
Command Interpreter
Output Display Area
Area
User ID
Time Input Echo Display Area
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-23
• User ID area
Indicates the identification of the terminal to the I/O system.
• Time area
Indicates the time of day.
• MTC
Enters the maintenance menu level.
Figure 8-5
MAPCI display
MAPCI Display
MAPCI MAPCI
0 Quit
2 MTC
3 SASelect
4 NWM
5 CPSys
6
7
8 To move from the MAPCI level to the MTC level, enter
9 the command MTC or 2, followed by the RETURN key.
10
11
12
13
14
15
16
17
18
OPERATOR
Time 10:15 >
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-25
The MTC menu displays all the major maintenance levels available to the
user. Through this level, the maintenance sublevels can be accessed to
perform specific functions, that are directly related to the physical modules.
Figure 8-6
Maintenance MAP display
OPERATOR
Time 09:09 >
When a failure is detected by the system, the alarm system status display area
is updated to indicate the fault. When more than one alarm condition exists on
a subsystem, only the most severe alarm status displays. The three alarm
codes are shown in Table 8-4.
Table 8-4
Alarm indicator display alarm codes
If an additional alarm is reported to the MAP, the appropriate alarm class code
flashes for that fault. The additional alarm also requires corrective action to
be silenced.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-27
• Quit
May accept, but does not require, a nonmenu parameter. An example of
this is the QUIT ALL command.
Figure 8-7
Command menu display
Not all commands available to a level are shown on the command menu
display. Infrequently used hidden commands are available for advanced
maintenance procedures. The hidden commands for each menu level can be
accessed by entering the LISTST command at the MAPCI prompt. This
command lists a group of directories. When the top directory listed is printed
using PRINT <directory name>, all the commands that can be entered at the
current MAP level, including the hidden commands, displays.
Entering commands
To enter and activate commands, press the Return key on the keyboard.
If the command requires a parameter and the parameter code displayed on the
menu:
1. enter the parameter
To do this, you can enter the menu number or parameter code.
When replying to a prompt for parameters, the first character you type at the
prompt must always be a space, followed by the required parameter.
Example
In the following example, three command entry options are shown. These
options perform the same function, (see Figure 8-8.)
enter 60 or 6 0 or TST 0
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-29
Figure 8-8
Command entry
Command Entry
CM MS IOD Net PM CCS LNS Trks Ext APPL
• • • • • • • • • •
MS
0 Quit
2
3 Message Switch Clock Shelf 0 Inter-MS link 0 1
4 MS 0 • FREE • • •
5 MS 1 • SLAVE • • •
6 Tst_
7 Bsy_
8 RTS_
9
10 LoadMS_
11
12 SwMast
13 Shelf
14 QueryMS
15
16 MtcChk_
17 InterMS_
18 Clock
OPERATOR
Time 10:30 >
Example
The following example is entered from the SHELF level of the MS
subsystem.
Input
PM; POST DTC 0; BSY UNIT 0; TST UNIT 0
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-31
EXAMPLE
To record a soft copy of menu level and hidden commands, use the following
procedure:
At the CI prompt:
Example
To print a hard copy of the menu level and hidden commands:
1. select the <device> (example: printer) to which you send your file
2. complete with the following steps
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-33
1. What command provides a list of all users that have access to a switch?
Which commands show the users currently logged in?
2. If you are about to do something on the switch that would knock all
current users off the switch, what command (and its parameters) allows
you to notify logged in users that this is about to happen?
3. If you wanted to record some screen information from a user named Joe
onto a printer called PRT0, what command (and its parameters) must be
entered?
4. If a person had a user name and password assigned and then left the
company, what command allows you to remove this person’s user name
from the switch?
Note: Assume the user password is known.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-35
First Subsystem
Level Level Status Display Area
Command
Menu
Display
Command Interpreter
Area Output Display Area
User ID
Time Input Echo Display Area
6. If the screen shows the shelf level of message switch 0 and a card failure
occurred, what area would provide a CARD level indicator of the failure?
8. If the screen shows the shelf level of message switch 0 and a failure
occurs in the ENET shelf, what area provides corresponding alarm
information?
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-37
Answers
Check your answers to the review questions with the following. Review any
questions for which the answer was missed with the information in this lesson
and with your instructor.
1. What command provides a list of all users that have access to a switch?
Which commands shows the users currently logged in?
SHOW USERS lists all the users who can log into a switch. QUSER or
PRINT USERS shows those users currently logged in to the switch.
2. If you were about to do something on the switch that would knock all the
logged-in users off the switch, what command (and its parameters) allows
you notify them this is about to happen?
MSG ALL ‘message string’
3. If you wanted to record some screen information from a user named Joe
onto a printer called PRT0, what command (and its parameters) must be
entered?
RECORD START FROM JOE ONTO PRT0
4. If a person had a user name and password assigned and then left the
company, what command allows you to remove this person’s user name
from the switch?
Note: Assume the user password is known.
First Subsystem
Level Level Status Display Area
Command
Menu
Display
Command Interpreter
Area Output Display Area
User ID
Time Input Echo Display Area
6. If the screen was showing the shelf level of message switch 0 and a card
failure occurred, what area would provide a CARD level indicator of the
failure?
level status display area
8. If the screen was showing the shelf level of message switch 0 and a failure
occurred in the ENET shelf, what area would provide corresponding
alarm information?
alarm system status display area
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-39
this command string would enter the message switch (MS) maintenance
menu (MAPCI:MTC:MS), manually busy MS 0 (BSY 0), test it (TST 0),
then return it to service (RTS 0).
Input: LOGOUT
The system responds with BYE BYE and a flashing cursor. Each student
should practice logging in and out until confident with the procedure.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-41
Input: QUSER
Response: The list of logged-on users and their associated
terminal.
Note: The message must be enclosed in single quotes and cannot exceed
one line in length.
Example
Query status of record links.
Example
Start a recording link from the initiating terminal R324U1 onto PRT0 and
QUERY the recording link
Disable all record links you have started and query status.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Using MAP terminal 8-43
1. Enter MAPCI;MTC;IOD
Enters the IOD level.
4. Enter IOC 0
Enters the IOC level and displays the status of each equipped controller
card on IOC 0.
5. Enter TRNSL
Displays the MS port assigned on both MSs and connects to IOC 0.
6. Enter IOC 1
Enters IOC 1 level and displays the status of each equipped controller
card.
8. Enter CARD 1
Displays the status and state of card 1, IOC 1.
9. Enter ALLOC
Displays the disk volume names, volume size, address and status of files.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 9-1
Lesson 9
Table editor
Objectives 9
Given student lesson, instructor lecture and appropriate documentation, you
will be able to:
Table editor 9
In the DMS-MSC/HLR system, the data for a given office is located within a
software structure known as tables. An office has requirements for different
types of data such as trunks, routing, translation, screening and hardware
inventory which are entered into associated tables within the DMS-MSC/
HLR.
Table editor is a software subsystem in the MAP that is used to read and
manipulate the data tables contained in the system. The user has access to the
information already contained in the database as well as the ability to
customize the data tables to support the specific telecommunication needs of
each site. The table names and formats are hardcoded and cannot be changed
by the customer. However, the entries into these tables are customer-
definable.
The number of tuples in a table is limited only by the table size and the
memory allocation engineered for the system.
Each table in the DMS-MSC/HLR has a unique table structure and contains
information relative to its function. For example, table TERMDEV (terminal
device) contains all of the input for VDUs, printers and modems.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-3
Figure 9-1
Table editor
CI Level Tasks
LOGIN
CI LEVEL
Table
DSKUT DISKUT MAPCI LOGUTIL
Editor
MTC
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-5
Fields
The fields in a table or subtable have the following properties:
• each field has a unique identifier called a field name or a field number by
which the field may be accessed
• fields are consecutively numbered from left to right, starting at number 1
• number of fields varies from table to table
• field data enclosed by brackets (x) are pointers to a subtable
• contents of a field may contain one or more elements of data
• field data may consist of letters, numbers or alphanumeric characters
Tuples
The tuples in a table or subtable have the following properties:
• each tuple has a unique identifier called a key. The key field for each tuple
in most cases is field number 1 and is known as the key field name. Some
tables have more than one key field.
• all of the data (fields) making up a tuple contain information about the
key
• tuples are referenced either by their key or by the table editor cursor. The
cursor is an internal pointer to a tuple within a table. The cursor pointer
can be positioned by utilizing the table editor commands.The tuple to
which the cursor points at any given time is called the current tuple.
• tuples are consecutively numbered from top to bottom, with number 0 at
the top
Subfields
A field may be composed of two or more pieces of information called
subfields. In this case, it is necessary to enter all of the subfield information to
equal one field. Subfields are usually found in the key field when extra
information is needed to make each tuple unique.
The example below shows a key field (XLAKEY) that is composed of three
subfields: XLANAME, FROMD and TOD.
XLAKEY
XLANAME FROMD TOD XLASEL OSEL
GSMOBILE 214 214 RTE DEST 2
GSMOBILE 314 514 RTE DEST 7
GSMOBILE 614 914 RTE DEST 21
Figure 9-2
Table structure
Table Structure
TABLE Fields
1 2 3 .... N
Field Field Field Field
Name Name Name Name
SUBTABLE Fields
1 2 3 .... N
Field Field Field Field
Name Name Name Name
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-7
Subtables
Some fields within a table contain more information than can be displayed in
the actual space allocated for it in the main table. When this situation occurs,
the software allocates space in another area of memory and creates a subtable
entry for that particular field. A subtable is denoted in the main table by a
number with parentheses around it under a specific field name.
To view the data in a subtable, position on the tuple with the desired subtable.
If the cursor is not positioned on a specific tuple, the first tuple in a table is
indexed by default.
The example given in Figure 9-3 shows the structure of a subtable within a
table. Note the parentheses around a number in the field titled TREAT; these
parentheses indicate a subtable. In this example, the CELL1 tuple has six
entries in its subtable. If a zero is in the parentheses, no tuples exist in a
subtable.
Figure 9-3
Accessing subtables
Accessing Subtables
TABLE TMTCNTL
EXTTMNM TREAT
MSTREAT (6)
SUBTABLE TREAT
UNDT Y S ANN1B
PDIL Y S ANN1A
PSIG Y S ANN1B
VACT Y S VACT
RODR Y T OFRT 1
GNCT Y T OFRT 2
Selectors
Selectors are specific data choices which are placed in a field in a table. The
field may have several selectors. The chosen selector may have additional
prompts associated with it or may reference additional fields in a later table
during the software trace of the call. Choosing the wrong selector could create
call processing problems in later tables. Translations are used to define the
various selectors and their impact on the call type associated with it.
Subtable TREAT
UNDT Y S ANN1B
PDIL Y S ANN1A
PSIG Y S ANN1B
VACT Y S VACT
RODR Y T OFRT 1
GNCT Y T OFRT 2
Input prompter
A prompter tells the user that the data has been entered incorrectly or not all
the mandatory data has been entered. The table editor commands may be
executed in a prompt or a non-prompt mode.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-9
Prompt mode
The prompt mode is a method of entering data in which the system prompts
the user for each piece of information needed. The user enters the command
in the prompt mode, followed by a return. If all the required data is not
entered, the system guides the user through each field. See Figure 9-4 for an
example.
Figure 9-4
Example MAP display of prompt mode
CI:
>table pmloads
TABLE:PMLOADS
>add
>y
LOADNAME:
>enc36cj
ACTFILE:
>enc36cj
ACTVOL:
>s010dmisc
BKPFILE:
>enc36cj
BKPVOL:
>s000dmisc
UPDACT:
>n
TUPLE TO BE ADDED:
ENC36CJ
ENC36CJ S010DMISC
ENC36CJ S000DMISC N
ENTER Y TO CONFIRM, N TO REJECT OR E TO EDIT.
>Y
Nonprompt mode
Once the user is familiar with input for a particular activity, he or she may
enter commands more efficiently by using the nonprompt mode. In the
nonprompt mode, the user simply enters the command and all the information
for each field in a continuous line of data with spaces between information.
See Figure 9-5 for an example.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-11
Figure 9-5
Example MAP display of nonprompt mode
CI:
>table pmloads
TABLE: PMLOADS
>add enc36cj enc36cj s010dmisc enc36cj s00dmisc n
TUPLE TO BE ADDED
ENC36CJ
ENC36CJ S010DMISC
ENC36CJ S000DMISC N
If you enter only the TABLE command and do not provide a table name, the
system prompts you for the table name: enter the table name
The commands in Table 9-1 show the common table editor commands
grouped together by function.
Table 9-1
Table editor commands
Function Commands
Access tables TABLE, SUBtable
Exit From tables QUit, QUit ALL, RETurn, LEAVE
Modify tables ADD, CHAnge, DELete, REPlace
Display table contents LISt, DISplay
Move cursor POSition, TOP, BOTtom, UP, DOWn
Obtain table information COUNT, RANge, HEADING, INForm
Other FINDTAB
COMMAND
Note: The table editor command functions are identical in both tables and
subtables. the commands that have capitalized prefixes will work by
entering the prefix (for example, SUB for subtable).
The ABORT command is used to cancel a command or input that has been
entered by accident or incorrectly.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-13
Use the ABORT command to cancel the previous command and permit you
to try again. If the system continues to prompt the user for the correct field
value:
Depending upon the table, the tuple is automatically placed on the bottom of
the table or in a specific location within the table. Therefore, the ADD
command can be executed from any location within the table.
Parms: none
The command is executed on the current tuple only. More than one field
value may be changed in a single command, providing that the field values
are separated with a semicolon.
The tuples searched and counted will be determined by the parameters which
follow the command. The number of subtable entries for a subtable pointer in
a main table is also updated.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-15
Parms: <CONDITION> Display the count of all tuples within a table which meet
the defined conditions. The conditions and their
meanings are as follows:
& AND
EQ Equal to
GE Greater than or equal to
GT Greater than
LE Less than or equal to
LT Less than
NE Not equal to
| OR
No parameter = a count of ALL tuples in the
table.
Parms: <KEY FIELD 1> <KEY FIELD 2>... <KEY FIELD 3>]
The KEY name of the tuple or tuples to be deleted from the table or subtable.
The number of tuples below the current tuple must be specified unless the
number is 1, which is the default value.
The number of tuples (0-32767) below the current tuple to which the internal
pointer is to be positioned.
Default value = 1.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-17
A header (field names) is displayed first, followed by the tuple entries. The
number and type of tuples displayed is determined by the parameters which
follow the command.
• If the user is two or more levels deep in tables, the QUIT command exits
the current table and indexes into the previous table.
The cursor will be positioned on the exact tuple on which it was originally
located.
Since the tuple to be replaced is specified by the KEY, the command can be
entered from any location within the table. All data field values for the tuple
must be entered.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-19
The main table must be entered via the table command before the subtable
can be accessed.
Note 1: These are optional parameters and would only be used when a
table has pointers to more than one subtable for each tuple entry.
Note 2: A table structure with only one subtable pointer per tuple entry
does not require the use of optional parameters. Use caution prior to
editing a subtable. Always verify the internal pointer position to ensure
that the targeted subtable will be changed. Failing to do this may
introduce a potential problem which could negatively impact the system
operation.
The system allocates a TABDIR to the user's symbol table which provides
access to the table editor commands.
Parms:none
Command name: UP
Use the UP command to position the internal pointer on a tuple which is
above the current tuple and display the tuple entry.
The number of tuples above the current tuple must be specified unless the
number is one, which is the default value.
Parms:<COUNT>
The default value is reinstated each time you QUIT a table or subtable.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-21
• Specify the first two characters of the tables to display. For example, the
command:
>FINDTAB C7
a list of all table names beginning with the characters “C7” is displayed.
Therefore Tables C7network, C7link, etc. would be displayed.
Other commands
In addition to the table editor commands, there are two additional commands
which provide useful information about tables: SHOWUSERS and
SHOWUSES. These commands are entered at the CI prompt and provide the
following information.
SHOWUSERS
Use the SHOWUSERS command to display a list of tables which are
dependent upon the datafill in the specified table. The listed tables require a
tuple be created in the specified table before they will work properly.
SHOWUSES
Use the SHOWUSES command to display a list of tables on which the
specified table is dependent for datafill. The specified table requires a tuple be
created in at least one of the listed tables before it will work properly.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-23
Command Function
ADD adds a tuple to the current table or subtable
BOTTOM (BOT) positions the internal pointer on the last tuple in the table
and displays the tuple entry
CHANGE (CHA) changes the value of a specified field in the current tuple
COUNT displays a count of the number of tuples within the table
DELETE (DEL) deletes one or more tuples from the current tuple
DISPLAY (DIS) displays the tuple entry for the current tuple
DOWN (DOW) positions the internal pointer on the tuple that is below the
current tuple and displays the tuple entry
FIRST positions the cursor on the first tuple in the table or in the
subtable. No display appears.
FORMAT PACK packs the spacing format of a table or subtable
FORMAT UNPACK reverts to normal spacing format
HEADING displays the header (field names) for a given table
HELP displays an explanation of what a command does and how
it may be executed
LAST positions the cursor on the last tuple in the table or
subtable. No display appears.
LIST (LIS) displays tuples within a table
LOCATE (LOC) positions the cursor on a specified tuple. No display
appears.
NEXT positions the cursor on the tuple following the current tuple.
No display appears.
OVERRIDE (OVE) cancels the prompt that occurs when the CPUs are out of
sync or when the Journal File is not available
POSITION (POS) positions the internal pointer on a specific tuple and
displays the tuple entry
PREV positions the cursor on the tuple previous to the current
tuple. No display appears.
QUIT (QUI) exits the user from one table editor level. The command
QUIT ALL returns the user to the CI level.
RANGE (RAN) displays table field (s) by field number and field name
REPLACE (REP) replaces a specified tuple with a new tuple
RETURN (RET) returns the user from a subtable to the main table
SUBTABLE (SUB) permits entry to a subtable from a main table
TABLE enters the table editor subsystem for a specific table name
TOP positions the internal pointer on tuple 0 which is the first
entry in a table or subtable and displays the tuple entry
UP positions the internal pointer on the tuple which is above
the current tuple and displays the tuple
VERIFY (VER) turns verification on or off
Other associated table commands
SHOWUSES displays a list of tables on which the specified table is
dependant for datafill
SHOWUSERS displays a list of tables which are dependant upon the
datafill in the specified table
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-25
F. POSition
G. QUIt
H. RETurn ___ Moves the cursor down a specific number of
tuples.
I. SUBtable ___ This command places the cursor on a specific
tuple.
J. TOP ___ Positions the cursor one tuple below the current
tuple.
K. UP ___ Takes you to the CI level from a table or any of its
subtables.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-27
Answers
Check your answers to the review questions with the following. Review any
questions for which the answer was missed with the information in this
lesson, and with your instructor.
C. CHAnge
D. COUNT ___ Displays the available table editor commands or
gives details about a specific command.
E. DELete
___ Edits tables.
F. DISPLAY ___ Removes tuples.
G. HEADING ___ Inputs a new tuple.
H. HELP ___ Tells how many total tuples there are or how
many tuples there are that fit a given condition.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-29
Self check 9
Check your answers to the review questions with the following. Review any
questions for which the answer was missed with the information in this lesson
and with your instructor.
C. CHAnge
D. COUNT _H_ Displays the available table editor commands or
gives details about a specific command.
E. DELete
_C_ Edits tables.
F. DISPLAY _E_ Removes tuples.
G. HEADING _B_ Inputs a new tuple.
H. HELP _D_ Tells how many total tuples there are or how
many tuples there are that fit a given condition.
Input: >Quit
Response: CI:
Input: >Table Tmtcntl
Response: TABLE: TMTCNTL
Input: >LIST
Response: The first tuple of this table is displayed.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-31
Enter in a table
1. Enter TABLE CUSTHEAD
2. Enter LIS. The system lists the table header and the tuple to which the
cursor is currently positioned.
3. Enter RAN. The system displays fields for Table CUSTHEAD. Notice
that it shows the field number, field name and general description. If the
description for a field is TABLE_OWNERSHIP, it means this field has a
sub-table.
4. Enter RAN 1. The system displays parameters for field 1 of Table
CUSTHEAD.
5. Enter TOP. The system positions the cursor at the top tuple and displays
its contents.
6. Enter Q BOTTOM. The system displays parameters associated with the
BOTTOM command.
7. Enter BOTTOM. The system positions the cursor on the bottom tuple
and displays its contents.
8. Enter Q POSITION. The system displays parameters associated with the
POSITION command.
9. Enter POS EXAMPLE. The system displays the contents for tuple
EXAMPLE.
10. Enter LISt. The system lists the table header and the tuple the cursor is
currently positioned on EXAMPLE.
11. Enter LEAVE. The system returns to the CI level.
Enter in a subtable
1. Enter TABLE TMTCNTL
2. Enter POS OFFTREAT
3. Enter SUB TREAT. No display of the table contents will appear. So,
depress the carriage return three times and the system will show TABLE:
TMTCNTL OFFTREAT: TREAT. This means that you are in Table
TMTCNTL positioned on OFFTREAT and specifically in Subtable
TREAT.
4. Enter Q SUB. The system displays the parameters of the command
“subtable.” Notice that you can use either the field name or the field
number to enter a subtable.
5. Enter LIS 5. The system lists 5 of the tuples in this subtable. (The
commands are the same in the subtables as in the tables.)
6. Enter RET. The system returns from subtable 5 to the main table and
displays the tuple on which you entered a subtable. (Depress CR three
times to show you that you are in the main table).
7. Enter LEAVE
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Table editor 9-33
Adding tuples
1. Enter TABLE CUSTENG
2. Enter ADD. At each prompt, enter the following information.
3. Enter CUST <assigned student position number> at the CUSTNAME
prompt.
EXAMPLE: CUST2 for the student in position 2.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 10-1
Lesson 10
Universal Translations (UXLA)
Objectives 10
Given student lesson, instructor lecture and appropriate documentation, you
will be able to:
DMS-MSC translations 10
Stages of translations
The following is a description of the two main stages of translations:
• screening involves the analysis of dialed digits in selected data tables to
determine if correct rules were followed. For instance, the table verifies
that the leading digits of a number were for a call going outside the
system.
• routing involves certain data tables determining appropriate routes a call
should take. For example, the table selects a long-distance trunk group for
a call or sends a call to a recorded announcement.
Figure 10-1
Translations area processing
OUTPULSED
INCOMING DIGITS DIGITS
TRANSLATIONS
AREA
(UXLA)
ACTION
TRANSLATOR
NAME • Routing
• Database query (DBQ)
• Treatment (Tone or
Announcement)
• Activation of a feature
(Handover Number, Paging)
• Activation of an IN trigger
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Universal Translations (UXLA) 10-3
Figure 10-2
DMS-MSC translation picture
AMHEAD AMCODE
NO NO NO
Table Trunk Treatment Feature
YES YES
YES YES
OFRT ** Appropriate RTE table in
universal translations table Launch Feature
Terminates to treatment
** This table is not part of UXLA and cannot be used to manipulate digits
Parameters Description
origin MS indicates that the originator is a Mobile Station.
TR indicates that the originator is a Trunk.
Figure 10-3
TRAVER for MO call
Sample TRAVER
TRAVER MS 2224900 LAC 1 CID 1 6842930 b
TABLE LAC
1 1 MSC_BSS_RS UNRSTRCT 0 0 0 ( 20) $ $
TABLE XLAENTRY
20 PX GSMOBILE
TABLE PXHEAD
GSMOBILE SDFLT NODFOP CON 9
THE DIGITS USED TO INDEX THE NEXT TABLE ARE:6842930
TABLE PXCODE
GSMOBILE 684 684 CONT ( CONSUME 3) ( XLT OFC GSMOBILE) $
TABLE OFCHEAD
GSMOBILE SDFLT NODFOP NOCON 9
THE DIGITS USED TO INDEX THE NEXT TABLE ARE: 2930
TABLE OFCCODE
GSMOBILE 2930 2930 RTE ( DEST 12) $
TABLE: OFCRTE
KEY: GSMOBILE 12
. T OFRT 12
. . TABLE OFRT
. . 12 S D GSM1900_2W
. . EXIT TABLE OFRT
EXIT TABLE OFCRTE
+++ TRAVER: SUCCESSFUL CALL TRACE +++
DIGIT TRANSLATION ROUTES
1 GSM1900_2W 6842930 ST
BILL 2224900 ST
411-0930-001 12.02/EN December, 2000 Lesson 10 Translations 10-5
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Universal Translations (UXLA) 10-5
Land to MS call
Figure 10-4 shows the output of a typical TRAVER for a PET scenario.
Figure 10-4
Typical TRAVER output
TABLE TRKGRP
PET_TRK PET 0 NPDGP NCRT 0 MIDL PX PETXLA NILLATA MSC N 5 0 NOCONT UNDT
NEVER
NEVER N 9 $
TABLE PXHEAD
PETXLA SDFLT NODFOP CON STD
THE DIGITS USED TO INDEX THE NEXT TABLE ARE: 5446123123
TABLE PXCODE
PETXLA 544 544 CONT ( MM 10 10) ( CONSUME 3) ( XLT FA PETXLA)$
TABLE FAHEAD
PETXLA SDFLT NODFOP CON STD
THE DIGITS USED TO INDEX THE NEXT TABLE ARE: 6123123
TABLE FACODE
PETXLA 61 61 DBQ ( NSC GSMSRI) ( GSMIDX SRINATL)$
TABLE GSMDEFS
SRINATL (MODIFY ( NOA NOA_NATL) (NPI NPI_ISDN) (TIMEOUT 20) $)$
+++ CALL WILL QUERY GSM DATABASE FOR TRANSLATION INFORMATION
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Universal Translations (UXLA) 10-7
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 11-1
Lesson 11
Operational measurements & log
reports
Objectives 11
Given student lesson, instructor lecture and appropriate documentation, you
will be able to:
• describe an OM group and counters
• describe how OMs are generated
• use OMSHOW to access OM counters
• understand how to use OMs
• describe a log report
• use LOGUTIL to access log reports
• understand how to use log reports
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-3
Figure 11-1
OM counters and groups
OM Group
OM Counter
Counter OM Counter OM Counter
OM Counter
Counter
OM Counter
OM Counter OM Counter
OM Counter OM Counter
OM Counter OM Counter
OM Group
OM Group
OM Group OM Counter
OM
OM Counter
OM Counter OM
OM Counter OM Counter OM Counter
OM Counter
OM Counter
OM Counter
Counter
OM Counter
OM Counter
411-0930-001 12.02/EN December, 2000 Lesson 11 Introducing OMS & Log Reports 11-3
In , the OM register INCATOT monitored and recorded each time the trunks
were seized. The four trunks were seized seven times.
100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100 100
sec sec sec sec sec sec sec sec sec sec sec sec sec sec sec sec sec sec
Trunk #1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Trunk #2 2 2 2 2 2 1 2 2 2 2 2 2 1
Trunk #3 2 3 3 3 3 3 2 3 3 3 3 3 2 2
Trunk #4 3 4 4 4 4 4 3 1 2 3 4 4 4 4 4 3 3 1
411-0930-001 12.02/EN December, 2000 Lesson 11 Introducing OMS & Log Reports 11-4
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-5
Figure 11-3
Monitoring trunk seizure 2/2
OM REPORT:
START: 1987/02/13 10:00:00 FRI; STOP: 1987/02/13 10:30:00 FRI;
411-0930-001 12.03 February, 2001 Lesson 11 Introducing OMS & Log Reports 11-5
Usage counters
Some registers do not peg how many times an event happens, but rather how
long these events lasts. These registers are known as usage registers. Usage
registers do not actually count the exact number of seconds that an event lasts.
Instead, usage registers take “snapshots” (samples) on a regular basis to see if
the event is continuing.
To determine the length of time the trunks in were used, the user must rely on
the usage counter called traffic usage (TRU). This OM register monitors
trunks by taking a “snapshot” of how many trunks in each trunk group are
used every 100 seconds.
The OMs and especially the high watermark OMs can be used as a
benchmark of the levels of traffic-dependent activity in the switch during the
current interval. The high watermark OMs display the highest level of
simultaneous usage reached in critical office parameters for the collection
period. Overflow OMs display the number of times that the parameter was
required but no resources were available.
True peak utilization can be predicted by taking the maximum value of all the
high watermarks observed during individual transfer periods, during the
busiest days of the year. An additional amount should be added to this value
to ensure that the target 80% peak utilization of software resources is not
exceeded, even during the busiest times.
Figure 11-4
High watermark registers
Largest Value
Active Counters
411-0930-001 12.02/EN December, 2000 Lesson 11 Introducing OMS & Log Reports 11-6
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-7
Figure 11-5
OM example
OM Example
>o m s h o w c 7 m t p h o l d i n g
CLASS: HOLDING
0 0 0 0
0 0 0 0
0 0 0 0
411-0930-001 12.03 February, 2001 Lesson 11 Introducing OMS & Log Reports 11-7
Scan rates
A scan rate determines how often a register takes a snapshot (sample). Two
scan rates are available. Scan rates can be;
• every 10 seconds
• every 100 seconds one CCS
Scans taken every 10 seconds are called fast scans; their snapshots are called
fast samples. Scans taken every 100 seconds are called slow scans; their
Accumulation period
The second important variable for a usage counter is the length of time during
which the counter is to take snapshots. This length of time is the accumulation
period. The accumulation period determines the number of fast or slow scans
that can be gathered.
Erlangs
An erlang is a unit of measurement. One erlang represents the same value as
36 CCS, which equals one hour.
Example:
To convert 72 CCS to erlangs, divide 72 by 36. The result is 2 erlangs. To
convert 3 erlangs to CCS, multiply 3 by 36. The result is 108 CCS.
Active register
Active registers store peg and usage counts as they occur. Data cannot be
routed directly from the active registers to an output device. Instead, the data
must first be transferred to the holding registers and the active registers
cleared.
Holding register
Holding registers temporarily retain data for display or transmission prior to
the next active/holding transfer. The holding register sends data to the
accumulating register or output device. Data held in a holding register is
eventually overwritten by incoming data from an active register.
Data can be transferred between the active and holding registers either every
15 or every 30 minutes. No other transfer periods are available.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-9
Figure 11-6
OM flow showing active, holding, and accumulating registers
Active Register
Available through
OMSHOW
command
Holding Register
Available through
OM Studies
Accumulating Register (out of scope of
this course)
411-0930-001 12.02/EN December, 2000 Lesson 11 Introducing OMS & Log Reports 11-8
Accumulating register
Accumulating registers gather the data from the holding registers for a user-
defined time period. For example, the active-to-holding transfer occurs every
15 minutes and the busy hour of the day must be determined. The
accumulating registers must be set up so that data is gathered for an hour’s
worth of data from the holding registers every hour at 15-minute intervals.
Every time a new transfer period of data is sent to the accumulating registers,
it is added to the registers’ current count value.
In the active and holding registers, all registers gather data continuously.
None of these registers can be turned off.
Not all accumulating registers must be turned on. The service provider
decides which registers gather data and which registers do not. This is
accomplished by setting up OM classes; the registers that are members of an
OM class are always accumulating registers.
Extension registers
When there is a possibility that the active count may exceed 65,535 in the
maximum count period (30 mins), an extension register will be allocated. If
an extension register exists, its name will normally be similar to that of the
basic register (i.e. CCBSZ2 is an extension for CCBSZ).
Figure 11-7
OM flow showing active and holding extension registers
Extension
Overflow
411-0930-001 12.02/EN December, 2000 Lesson 11 Introducing OMS & Log Reports 11-9
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-11
Figure 11-8
Relationship between an OM class, group, and register
OM groups
MSCCP
…/...
INCATOT
411-0930-001 12.02/EN December, 2000 Lesson 11 Introducing OMS & Log Reports 11-10
Figure 11-9
OM class, group, and register relationship
Accumulating OM data
OM groups
An OM group is made up of a cluster of OM registers that all pertain to the
same structure in the DMS-MSC. Since registers INCATOT and TRU relate
to trunks, they are assigned to the OM group called trunks (TRK). There are
other OM registers such as PRERTEAB, INFAIL, etc. that also monitor the
activity of trunks; consequently, these registers are also assigned to OM group
TRK.
Viewing OM groups
To view OM groups, enter the following at the CI prompt:
EXAMPLE: >
OMSHOW <group>
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-13
OM classes or studies
An OM class is a customer-defined set of registers and OM groups all placed
under one name. For example, the cellular service provider wants to gather
data on mobile originations on a cell site controller (CSC) and an intelligent
cellular peripheral (ICP). Two groups of registers are involved. To make it
simpler, these two OM groups are combined into one class named Mobile
Organizations.
Also, it is important to note that not all registers within an OM group must be
members of a class. A class is created by the user. Those registers not
applicable can be deleted from the OM class. Registers cannot be defined
within an OM group, because these groups are predefined by Nortel.
The service provider defines the class. The service provider also decides what
groups and what registers within those groups make up a particular class. For
example, the provider wants to study the events related only to incoming
traffic on a trunk. To do this, an OM class made up of the OM group TRK is
set up; however, some of the registers within group TRK relate to outgoing
traffic events; it is then necessary to determine which registers deal with
outgoing traffic and delete these registers from the class.
OM class usage
Time and data relevance are two reasons to combine OM groups into classes:
• Time. OM classes are customized to meet specific needs. By combining
OM groups into classes, the service provider can quickly obtain relevant
data. The sooner information is gathered about the system, the faster any
maintenance trouble can be fixed, traffic can be balanced, or equipment
can be provisioned.
• Data relevance. The service provider is the creator of the OM class. The
provider decides what combination of groups and registers provide the
relevant data.
CLASS: HOLDING
0 0 0 0
0 0 0 0
0 0 0 0
411-0930-001 12.03 February, 2001 Lesson 11 Introducing OMS & Log Reports 11-12
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-15
Figure 11-11
Log buffers in CM memory
Log Buffer
411-0930-001 12.02/EN December, 2000 Lesson 11 Introducing OMS & Log Reports 11-13
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-17
Figure 11-12
Log buffer
First Last
Log Buffer
Log Reports
Forward Back
411-0930-001 12.03 February, 2001 Lesson 11 Introducing OMS & Log Reports 11-14
Log reports
A log report is a record of an event that provides information for maintenance
and administrative purposes. An event can be an equipment fault, a test, a
change in state of a piece of equipment, a software error, etc. The record of
the event identifies the date and time the event occurred, the type of event
(fault, test, software error, etc.), the equipment which caused the report to be
generated, the subsystem which detected or caused the report and the
particular event itself (type of faults, tests, software error etc.).
Figure 11-13
Log report example
TRAININGCNTR NET120 DEC31 14:38:50 7000 FAIL NET LINK NET 1- 0 LINK27 SPEECH TEST FAILED
Date
& Equipment ID
Event ID, Equipment Type
Information:
Time
Site
Event Type
411-0930-001 12.02/EN December, 2000 Lesson 11 Introducing OMS & Log Reports 11-15
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-19
Report format
Each report is printed in a standard format containing the following data:
• site is where the log is generated
• alarm type—every report type generated is assigned an output report
class. The class governs where (output device) the report is routed. Table
LOGCLASS assigns the output report classes (0-31). The level of alarm is
defined as follows:
— blank - status indicator or non-service affecting change of state
— * - minor alarm
— ** - major alarm
— *** - critical alarm
• report name (ID) is an identifier consisting of two parts:
— logname is a two-to eight-character name that identifies the
subsystem that generated the report.
— report number is a three-character number that specifically identifies
a report within the subsystem. A number is not assigned to all log
reports.
• date is the date in month/day on which the event occurred
• time is the time in hours/minutes/seconds (12:15:43) that the event
occurred
• sequence number is a four-digit number indicating the number of times a
report is generated since the switch was commissioned. This number will
reset to 0000 after reaching the count of 9999.
• event type is the type of event that caused the report to be generated
• event ID is the identity of the event that caused the report to be generated
• equipment type is the type of equipment to which the report corresponds
• equipment ID is the identity of the equipment to which the report
corresponds
Figure 11-14
Report format
FIRST TRAININGCNTR TRK103 APR01 11:55:50 2400 FLT GROUP ALARM N5LOOP 75% BUSY
(OLDEST)
REPORT NAME
SEQUENCE #
EVENT TYPE
DATE
SITE
ALARM
TIME
EQUIP TYPE
& EQUIP ID
EVENT ID,
105065
060289
411-0930-001 12.02/EN December, 2000 Lesson 11 Introducing OMS & Log Reports 11-16
Accessing a log
The OPEN command under LOGUTIL allows a user to access a particular
Log Buffer and display its most recent Log Report.
After entering this command, a user can access any report which has been
generated by entering the following commands: FIRST, LAST, BACK,
FORWARD and WHILE (BACK) ().
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-21
LOGUTIL 11
LOGUTIL allows you to look in any log buffer and examine the contents (log
reports) for information concerning switch operations.
Figure 11-15
LOGUTIL command functions
FUNCTION COMMANDS
411-0930-001 12.02/EN December, 2000 Lesson 11 Introducing OMS & Log Reports 11-17
• To access a particular log buffer and display its most recent report, enter:
OPEN <Log name>
You can access a particular log report by entering FIRST, LAST, BACK,
FORWARD or TYPE.
Example
> OPEN TRK
> DONE
FORMAT
The options are short and normal. The short option provides a less
detailed description of the log reports when they are displayed.
To move within an open log buffer, use one of the following command:
• FIRST
Moves the cursor to the first (oldest) report in the current LOG buffer. No
display is given. Before entering this command, you must first OPEN a
log.
• LAST
Moves the cursor to the most recent report in the current LOG buffer. No
display is given. Before entering this command, you must first OPEN a
log.
• BACK
Displays the previous report in the current log. If there is not a report
which matches this condition, BACK returns a NOT FOUND.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-23
Before entering this command, you must first OPEN a log. The command
OPEN displays the most recent report in the log.
Example
> BACK
• FORWARD
Displays the next report in the current log. If there is no report which fits
this condition, a NOT FOUND is displayed.
Example
> FORWARD
Table 11-1
Searching log buffers associated with each subsystem
>FORMAT SHORT
CLEAR >CLEAR PM Erases ALL log reports from the PM
buffer.
OPEN >OPEN PM Displays most recent log report in the PM
subsystem.
>WHILE FORWARD ( )
FIRST >FIRST Displays the first (oldest) log report in a
buffer.
LAST >LAST Displays the last (most recent) log report
in a buffer.
TYPE >TYPE Prints the current report entry.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Operational measurements & log reports 11-25
2. What is LOGUTIL?
4. What command do you use to display the latest Log Report in Log Buffer
CM?.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 12-1
Lesson 12
NTPs and Helmsman
Objectives 12
Given student lesson, instructor lecture and appropriate documentation, you
will be able to:
NTPs
NTPs are a series of documents that follow a specific numbering pattern and
provide information on DMS products. The numbering system is composed
of a ten digit format that has three functional parts: division number, layer
number, and group number. An example of the format is shown in Figure 12-
1.
Figure 12-1
Components of an NTP number
Layer Number
411-2231-001
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential NTPs and Helmsman 12-3
Division number
The first 3 digits identify the broad subject matter of the publication. These
numbers are generally associated with a family of switches or products, all
having a common function or design. For example, NTPs with a 411 division
number contains information about Nortel’s wireless/cellular systems. Also,
NTPs with a 297 division number contain information common to all DMS
switches. These two division numbers are commonly used by DMS-MSC/
HLR technicians.
Layer number
The next four digits of the ten digit number define the contents of a particular
NTP within the series. It provides details on a specific switch within the broad
category. For example, 2231 indicates a manual that deals specifically with
the DMS-MSC.
Group number
The last three digits of the ten digit number identify a specific area of that
switch, and are known as group numbers. The group numbers range from
000-899 and have the same function for each switch type. For example, 510 is
a Logs reference manual NTP for any digital switching system.
DMS-MSC/HLR documentation
DMS-MSC/HLR publications use particular division and layer numbers as
shown in Table 12-1.
Table 12-1
Division and layer number
Table 12-2
Group number
NTPs and other Nortel documents usually exist in more than one version. Use
the DMS-MSC/HLR Product Documentation Directory to determine the
correct release code for a specific software release.
Table 12-3
DMS-MSC/HLR documentation
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential NTPs and Helmsman 12-5
Helmsman CD-ROM
Helmsman is a software tool that provides access to the latest NTPs stored on
CD-ROM (Compact Disk - Read Only Memory).
The instructor and the exercises in this lesson demonstrate the advantages of
this software program.
GSM CD-ROMs
All NTPs that are GSM specific (specifically, those that are listed in
Table 12-3) are included on one CD-ROM part number HLM-2231-001. In
addition to the GSM NTPs, numerous other NTPs needed for operating and
maintaining the various GSM network components are contained on this CD-
ROM.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential NTPs and Helmsman 12-7
Questions 12
1. Docubase browser window:
a. Explain the “Document Selection” window.
3. Window menu.
a. Explain the window menu.
4. Annotate menu:
a. Contrast annotations vs. bookmarks.
5. Navigate menu:
a. Explain “Next Occurrence and Previous Occurrence”.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential NTPs and Helmsman 12-9
6. Search menu:
a. Explain “Limiting by Category”.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential NTPs and Helmsman 12-11
Answers
1. Docubase browser window:
The document selection window lists all of the documents in which the
search terms were found.
The page selection window lists the page numbers and the number of
occurrences per page in each document in which the search terms were
found. You can go directly to the page by double-clicking on the page
number.
The Search term window lists all of the search terms that pertain to a
particular search.
The Search proximity function allows you to control the size of the
Search Set. It has to do with how many words separate terms in the
Search Term window that are connected by the boolean operator AND.
The larger the proximity, the more likely it is to find occurrences of the
terms linked by the AND operator.
3. Window menu.
The window menu lists all of the viewer windows that are open. A check
mark indicates the current active window. You can make a window in
the list active by selecting it. The CASCADE and TILE options affect
how the windows are placed on the screen in relation to each other. Try
these options and see if you have a preference for a configuration.
4. Annotate menu:
Annotations are marks you can place on documents for later reference.
You can also enter notes to clarify or explain the part of the text it marks.
Bookmarks only allow you to mark the text for later reference.
The Marks List shows the bookmarks and annotations you have made
for the document, along with the page on which the mark is found. It can
be used as a table of contents for your marks and as a quick way to open
a document to references you use regularly.
5. Navigate menu:
6. Search menu:
The Expand Plurals box allows Helmsman to search for the singular as
well as the plural form of the search term.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential NTPs and Helmsman 12-13
Questions 12
Work through Appendix D of the Helmsman user’s guide at a Helmsman
workstation. When you arrive at the section on Search Proximity, use a value
of 10 instead of 1.
Note: Be sure to check the search term window before every search and
verify that the search terms and Boolean operators (and/or) are the ones
you want. Delete any search terms that do not apply.
1. Locate and open NTP 297-1001-592. Using the Search Editor, locate the
beginning of the section on clearing sysb faults and place a bookmark
there (Name it “SYSBfault”).
2. Using the Search Editor, go to point in the book which talks about the
Ethernet interface unit and troubleshooting a critical alarm. Use the
boolean expression “and” to search for all three words highlighted above.
Place a bookmark at this point. (Name it “EIUcritical”).
3. Close the document.
4. You have just started as a new technician and want to find the NTP on
how to perform routine maintenance.
a. Using Helmsman locate the NTP that contains information on
peripheral module maintenance. What is the NTP name and number?
b. Open the peripheral module maintenance and use the Search Editor to
locate the procedure on inspecting cooling unit filters. Use the Search
Editor and key words cooling unit filters. How often should the filter
be replaced?
5. What feature in Helmsman allows you to get a list of all of the bookmarks
and the page numbers they are on? Delete the bookmarks.
6. As a maintenance technician, the Table LTCINV is used quite often. What
is the description of this table? HINT: Customer Data Schema NTPs
usually define this type of information.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential NTPs and Helmsman 12-15
Answers
4.
b. every 3 months
5. Under the Annotate menu, the Marks list... selection will display all the
bookmarks and/or annotations in the open NTP.
6. Table LTCINV contains the inventory data, except the P-side link
assignment, for various peripheral module (PM) types.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential 13-1
Lesson 13
DMS-MSC call processing
Objectives 13
Given student lesson, instructor lecture and appropriate documentation, you
will be able to:
• describe the function of the DMS-MSC/HLR call processing software
• describe the progress of a typical call setup through the DMS-MSC and
DMS-HLR components
Call processing 13
The DMS-MSC call processing software consists of the code and data
necessary for advancing a call from setup to tear down. A call consists of a
series of information exchanges between the SuperNode and the peripheral
modules. The software is designed to provide a flexible system capable of
supporting a number of features and call types. The DMS-MSC is used in all
examples in this lesson.
Note: Other DMS family switches handle some call processing functions
in slightly different ways than the DMS-MSC.
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-MSC call processing 13-3
Figure 13-1
DMS-MSC call processing architecture
S 0
1 Application
L CM
M Processor
RTIFs
Message Links
ENET 0
1
M&A 0
IOC 1
Voice and Message Links
MTD
PMs
VDU VDU LPP PDTC PDTC
PTR
DDU
BSS
PSTN
SMS CCS7 V.35
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-MSC call processing 13-5
Figure 13-2
PSTN to mobile call: IAM message
DMS-MSC
VLR
CM MS DMS-HLR
CM
MS
LPP
L V 35 Link
I
U
7
L L
I N
I I
U PDTC PDTC U
U
7 7
PDTC PDTC
1. IAM [MSISDN] C7
PCM 30
PSTN
Figure 13-3
PSTN to mobile call: SRI message
LMS 0 LMS 1
LMS 0 LMS 1
L
I N
I L
U I N
U ENET
7 2. SRI [MSISDN] U I
L 7 U
I
V 35
U ENET
7
L
I L
U PDTC PDTC I
7 U
7
PDTC PDTC
PCM 30
PSTN
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-MSC call processing 13-7
LMS 0 LMS 1
LMS 0 LMS 1
L
I N
I L
U I N
U ENET
7 3. PRN [IMSI] U I
L 7 U
I L
V 35
U ENET I
7 U
L 7
I L
U PDTC PDTC I
7 U
7
PDTC PDTC
PCM 30
PSTN
Figure 13-5
PSTN to mobile call: PRN Ack message
LMS 0 LMS 1
LMS 0 LMS 1
L
I N
I L
U I N
7 U
4. PRN_ACK [MSRN] U I ENET
L 7 U
I L
U V 35 ENET I
7 U
L 7
I L
U PDTC PDTC I
7 U
7
PDTC PDTC
PCM 30
PSTN
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential DMS-MSC call processing 13-9
5. The HLR sends an SRI_ACK message to the MSC. The following figure
illustrates the message passthrough the HLR and MSC.
Figure 13-6
PSTN to mobile call: SRI Ack message
LMS 0 LMS 1
LMS 0 LMS 1
L
I N
I L
U I N
U ENET
7 5. SRI_ACK [MSRN] U I
L 7 U
I L
U V 35
I
7 ENET U
L 7
I L
U PDTC
7 PDTC I
U
7
PDTC PDTC
PCM 30
PSTN
Figure 13-7 illustrates the message through the MSC elements to the MS.
Figure 13-7
PSTN to mobile call: paging message
LMS 0 LMS 1
LMS 0 LMS 1
L
I N ENET L
U I
U I N
7 U I ENET
6. Paging U
L 7
I L
U I
7 U
N L 7
I I L
U U PDTC PDTC I
7 U
7
PDTC PDTC
PCM 30
PSTN
Course 930 Standard 12.03 February 2001 For training purposes only
A-1 Glossary Nortel Networks Confidential
Glossary A
A
AIN
Advanced Intelligent Network
ANSI
American National Standard Institute
ASCII
American Standard Code for Information Interchange
ASU
Application Specific Unit
B
BSS
Base Station Subsystem
C
CADR
Call Associated Data Record
CISM
Cabinetized ISM
CCS7
Common Channel Signaling 7
CDR
Call Detail Recording
CIOE
Cabinetised Input/Output Equipment
CM
Computing Module
CM
Configuration Management; Core Module
CO
Central Office
CPU
Central Processing Unit
Course 930 Standard 12.03 February 2001 For training purposes only
A-2 Glossary Nortel Networks Confidential
CTM
Conference Trunk Module
D
DAT
Digital Audio Tape
DDU
Disk Drive Unit
DIRP
Device Independent Recording Package
DMS-MSC
Digital Multiplex System-Mobile Service Switching Center
DNI
Digital Network Interconnecting
DPCC
Dual Plane Combined Core
DPN
Data Packet Network
DRAM
Digital Recorded Announcement Machine
DTCI
Digital Trunk Controller ISDN
DTCO
Digital Trunk Controller For Offshore
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Glossary A-3
E
EDRAM
Enhanced Digital Recorded Announcement Machine
EIR
Equipment Identity Register
EIU
Ethernet Interface Unit
EIU
Ethernet Interface Units
EMPC
Enhanced Multi-Protocol Controller
ENET
Enhanced NETwork
ETSI
European Telecommunication Standard Institute
F
FLIS
Fiberized Link Interface Shelf
FM
Fault Management
FP
File Processor
ISME
Frame ISM
FRU
Field Replaceable Unit
FSP
Frame Supervisor Panel
FTFS
fault-tolerant file system
G
GCDR
GSM Call Data Record
GMSC
DMS-MSC Gateway
GUI
Graphical User Interface
H
HLR
Home Location Register
HLR-PS
HLR-Provisioning Server
HMI
Human-Machine Interface
HLR-PS
Home Location Register Provisioning Server
I
IMEI
International Mobile Equipment Identity
INAP
Intelligent Network Application Part
IN
Intelligent Networks
IOC
Input/Output Controller
IOD
Input/Output Device
IOE
Input /Output Equipment
IOM
Input/Output Module
IP
Intelligent Peripherals
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Glossary A-5
ISDN
Integrated Services Digital Network
ISM
Integrated Service Module
IWF
Interworking Function
J
JF
Journal File
L
LIS
Link Interface Shelf
LIU7
Link Interface Unit for CCS7
LIU
Link Interface Unit
LMS
Local Message Switch
LPP
Link Peripheral Processor 2
M
MAP
Maintenance and Administration Position
MC
Message Controller
MEB
Mate Exchange Bus
MF
Multi Frequency
MPC
MultiProtocol Controller
MS
Message Switch
MTD
Magnetic Tape Drive
MTM
Maintenance Trunk Module
N
NCAR
Non Call Associated Data Record
NIU
Network Interface Units
NSS
Network and Switching Subsystem
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Glossary A-7
O
OAM&P
Operation, Administration, Maintenance, and Provisioning
OAU
Office Alarm Unit
OAU
Office Alarm Unit
OMC-S
Operations And Maintenance Center Switching
OM
Operational Measurement
OSS
Operations Support Systems
P
PBX
Private Branch Exchange
PCM
Pulse Coded Modulation
PDTC
PCM30 Digital Trunk Controller
PEC
Product Engineering Code
PM
Performance Management
PRI
Primary Rate Interface
PSDN
Packet Switching Data Network
PSTN
Public Switch Telephone Network
PSU
Power Supply Unit
R
RTIF
Remote Terminal Interface
S
SCC
Simple Combined Core
SCP
Service Control Point
SCSI
Small Computer Serial Interface
SDM/FT
SDM/Fault Tolerant
SDM
SuperNode Data Manager
SLM
System Load Module
SMS-SC
Short Message Services Service Center
SNSE
SuperNode Size Enhanced
SS7
Signaling System 7
SSP
Service Switching Point
Course 930 Standard 12.03 February 2001 For training purposes only
Nortel Networks Confidential Glossary A-9
T
TC
Terminal Controller
TDMA
Time Division Multiple Access
TDM
Time Division Multiplexed
TS
Time Slot
TUPLE
V
VDU
Visual Display Unit
VME
Virtual Machine Engine
X
XFER
Remote Data Polling System
Course 930 Standard 12.03 February 2001 For training purposes only
Family Product Manual Contacts Copyright
GSM
DMS-MSC/HLR
Student Guide
Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as
progress in engineering and manufacturing may warrant.
Trademarks are acknowledged with an asterisk (*) at their first appearance in the document.
Course number: Course 930
Product release: GSM12
Document version: Standard 12.03
Date: February 2001
Printed in the United States of America