The information in this document is subject to change without notice. The statements, configurations, technical data, and
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied
warranty. Users must take full responsibility for their applications of any products specified in this document. The
information in this document is proprietary to Nortel Networks.
Trademarks
Nortel, the Nortel logo, and the Globemark are trademarks of Nortel Networks.
Microsoft, MS, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation.
All other trademarks and registered trademarks are the property of their respective owners.
Refer to the following topics for general BCM information:
•“About BCM”
•“Symbols and conventions used in this guide” on page 28
•“Related publications” on page 29
•“How to get Help” on page 31
About this guide
The Networking Configuration Guide describes how to configure and assign features to telephony
devices through Telset and through Element Manager.
25
Purpose
The concepts, operations, and tasks described in this guide relate to the BCM software. This guide
provides task-based information about how to assign features and provide basic programming for
the BCM.
Use Element Manager, Startup Profile, and Telset Administration to configure various BCM
parameters.
In brief, the information in this guide explains:
•global telephony settings
•steps to configure DNs
•product features and how to assign them
Audience
The Networking Configuration Guide is directed to installers who install, configure, and maintain
BCM systems.
To use this guide, you must:
•be an authorized BCM installer or administrator within your organization
•know basic Nortel BCM terminology
•be knowledgeable about telephony and IP networking technology
Networking Configuration Guide
26Chapter 1 Getting started with BCM
Acronyms
The following is a list of acronyms used in this guide.
Table 1 Acronyms
AcronymDescription
ASMAnalog station module
ATAanalog terminal adapter
BRIBasic Rate Interface
BCMBusiness Communications Manager
CAPCentral Answering Position
CCContact Center
CLIDCalling Line Identification
CoSClass of Service
DPNSSDigital Private Network Signaling System
ISDNIntegrated Services Digital Network
KIMKey Indicator Module
MCDNMeridian Customer Defined Networking
MCIDmalicious call identification
MWImessage wait indicator
OLIoutgoing line identification
ONNoutgoing name and number
PVQMproactive voice quality monitoring
SMsilent monitor
SWCAsystem-wide call appearance
Organization
This guide is organized for easy access to information that explains the concepts, operations, and
procedures associated with the BCM system.
About BCM
The BCM system provides private network and telephony management capability to small and
medium-sized businesses.
The BCM system:
•integrates voice and data capabilities, VoIP gateway functions, and QoS data-routing features
into a single telephony system
•enables you to create and provide telephony applications for use in a business environment
NN40020-603NN40020-603
Chapter 1 Getting started with BCM27
BCM features
BCM50 supports the complete range of IP telephony features offered by existing BCM products:
Note: You enable the following features by entering the appropriate keycodes (no
additional hardware is required).
•VoIP Gateway (H.323 and SIP): Up to 12 VoIP trunks
•VoIP Telephony Clients: Up to 32 VoIP Telephony clients, supporting the range of Nortel
IP Phones and softclients.
BCM applications
BCM50 supports many applications provided on the existing BCM platforms.
Note: You enable the following features by entering the appropriate keycodes (no
additional hardware is required).
•Voice Messaging for standard voice mail and auto-attendant features
•Unified Messaging providing integrated voice mail management between voice mail and
common e-mail applications
•Fax Suite providing support for attached analog fax devices
•Voice Networking features
•LAN CTE (computer telephony engine)
•IP Music
•Intelligent Contact Center
Networking Configuration Guide
28Chapter 1 Getting started with BCM
Symbols and conventions used in this guide
These symbols are used to highlight critical information for the BCM system:
Caution: Alerts you to conditions where you can damage the equipment.
Danger: Alerts you to conditions where you can get an electrical shock.
Warning: Alerts you to conditions where you can cause the system to fail or work
improperly.
Note: Alerts you to important information.
Tip: Alerts you to additional information that can help you perform a task.
Security Note: Indicates a point of system security where a default should be
changed, or where the administrator needs to make a decision about the level of
!
security required for the system.
Warning: Alerts you to ground yourself with an antistatic grounding strap
before performing the maintenance procedure.
Warning: Alerts you to remove the BCM main unit and expansion unit power
cords from the ac outlet before performing any maintenance procedure.
NN40020-603NN40020-603
Chapter 1 Getting started with BCM29
The following conventions and symbols are used to represent the Business Series Terminal display
and dialpad.
ConventionExampleUsed for
Word in a special font (shown in
the top line of the display)
Underlined word in capital letters
(shown in the bottom line of a
two-line display telephone)
Dialpad buttons
Pswd:
PLAY
£
Command line prompts on display telephones.
Display option. Available on two line display
telephones
option on the display to proceed.
Buttons you press on the dialpad to select a
particular option.
. Press the button directly below the
The following text conventions are used in this guide to indicate the information described:
ConventionDescription
bold Courier
text
Indicates command names and options and text that you must enter.
Example: Use the
Example: Enter
info command.
show ip {alerts|routes}.
italic textIndicates book titles.
plain Courier
text
FEATURE
HOLD
Indicates command syntax and system output (for example, prompts
and system messages).
Example:
Set Trap Monitor Filters
Indicates that you press the button with the coordinating icon on
whichever set you are using.
RELEASE
Related publications
This section provides a list of additional documents referred to in this guide. There are two types
of publications: Technical Documents on page 29 and User Guides on page 30.
Technical Documents
System Installation
BCM50 2.0 Installation and Maintenance Guide (NN40020-302)
BCM IP Softphone 2050 Installation Guide (N0022555)
WLAN IP Telephony Installation and Configuration Guide (N0060634)
User Guides
Telephones and Peripherals
BCM Telephone Features User Guide (N0060608)
BST Doorphone User Guide (P0605668)
Central Answering Position (CAP) User Guide (P0603480)
Hospitality Features Card (N0027326)
System-wide Call Appearance (SWCA) Features Card (N0027186)
T7000 Telephone User Card (P0912061)
T7100 Telephone User Card (P0609621)
T7208 Telephone User Card (P0609622)
T7316 Telephone User Card (P0935248)
T7316E Telephone User Card (P0609623)
IP Phone 1120E User Guide (NN-10300-062)
IP Phone 1140E User Guide (NN-10300-064)
IP Audio Conference Phone 2033 User Guide (N0060623)
IP Key Expansion Module (KEM) User Guide
NN40020-603NN40020-603
Chapter 1 Getting started with BCM31
Digital Mobility
DECT 413X/414X Handset User Guide (N0028550)
DECT 4145Ex/4146Ex Handset User Guide (XXXXX)
Digital Mobility Phone 7420 User Guide (N0000635)
Digital Mobility Phone 7430/7440 User Guide (N0028550)
T7406 Cordless Telephone User Card (P0942259)
IP Telephony
IP Audio Conference Phone 2033 User Guide (N0060623)
IP Phone 2001 User Guide (N0027313)
IP Phone 2002 User Guide (N0027300)
IP Phone 2004 User Guide (N0027284)
IP Phone 2007 User Guide (N0064498)
BCM WLAN 2210/2211/2212 Handset User Guide (N0009103)
How to get Help
This section explains how to get help for Nortel products and services.
Getting Help from the Nortel Web site
The best source of support for Nortel products is the Nortel Support Web site:
http://www.nortel.com/support
This site enables customers to:
•download software and related tools
•download technical documents, release notes, and product bulletins
•sign up for automatic notification of new software and documentation
•search the Support Web site and Nortel Knowledge Base
•open and manage technical support cases
Getting Help over the telephone from a Nortel Solutions Center
If you have a Nortel support contract and cannot find the information you require on the
Nortel Support Web site, you can get help over the telephone from a Nortel Solutions Center.
In North America, call 1-800-4NORTEL (1-800-466-7835).
Outside North America, go to the Web site below and look up the telephone number that applies
in your region:
Networking Configuration Guide
32Chapter 1 Getting started with BCM
http://www.nortel.com/callus
When you speak to the telephone agent, you can reference an Express Routing Code (ERC) to
more quickly route your call to the appropriate support specialist. To locate the ERC for your
product or service, go to:
http://www.nortel.com/erc
Getting Help through a Nortel distributor or reseller
If you purchased a service contract for your Nortel product from a distributor or authorized
reseller, you can contact the technical support staff for that distributor or reseller.
NN40020-603NN40020-603
Chapter 2
System telephony networking overview
The system supports both public and private networking for telephony traffic.
•The public network is created by PSTN trunk connections from a Central Office terminating
on a telephone system such as the BCM.
•A private network is created when the system is connected through dedicated PSTN lines or
VoIP trunks to other systems. This system may take several forms. At the simplest level, your
system may be behind a private PBX, which connects directly to the Central Office. A more
complicated system may be a node in a network of systems of various types, where calls not
only terminate at the system, but calls may need to be passed through the system to other
nodes unconnected to the originating node.
Refer to the following information:
•“Basic system configurations”
33
•“Private network parameters” on page 37
Basic system configurations
In the most basic application, your system can provide support for system telephones to make and
receive calls over public network (PSTN) lines.
Two basic system telephony configurations
The following provides a broad overview of the telephony setup for two of the most common
office-telephone configurations.
PBX system
This setup is for larger offices which have fewer CO lines than telephones. In this case the lines are
pooled, and the line pool access is assigned to all DNs. There may also be a designated attendant
with a telephone that has all lines individually assigned.
Networking Configuration Guide
34Chapter 2 System telephony networking overview
Figure 1 PBX system
Lines are assigned to a line pool
CO line 1
CO line 2
All telephonesare assignedaccess to the line pool for outgoing calls
Incoming calls
1A call comes in on a line.
2The receptionist answers the call and finds out who the call is for.
3The receptionist transfers the call to a specific telephone (DN).
4The person can pick up the call at that DN only.
CO line 3
CO line 4
ReceptionistAssigned all lines/appearance andring
Outgoing calls
1User selects the intercom button or dials a line pool access code, which selects a line in the line
pool.
2The user dials the outgoing telephone number.
DID system
This setup allows you to assign a dedicated phone number to each telephone. The CO assigns a list
of available numbers for each DID (Direct Inward Dial) line. You can change your DN range to
match these numbers, and you use target lines to match each number with a DN.
NN40020-603NN40020-603
Figure 2 DID system
Chapter 2 System telephony networking overview35
Target line mapped to
DN (4005)
Target line mapped to
DN (4006)
Target line mapped to
DN (4007)
Incoming calls
1DID trunks are assigned to be auto-answer.
Note: PRI lines are automatically set to auto-answer.
CO DID line
i.e. 769
with range of call
numbers (4005 to
4020)
Target line mapped to
DN (4008)
2All DNs are assigned target lines.
3A caller dials a system code and a DN. In the example shown above, it might be 769-4006.
4The call comes into the trunk, which answers and maps the call on the target line assigned to
the matching received digits.
5The DN assigned to that target line rings.
You can assign unanswered or busy telephones to Call Forward to another DN, such as a
designated attendant or a voice-mail system.
Basic telephony routing
In a basic configuration, simple access codes (for example Line Pool Codes) are used to access the
PSTN network.
In a more complex configuration, more advanced destination codes are required to access multiple
PSTNs, private network resources, and remote nodes. Access to these resources enables advanced
features, such as tandem routing.
Networking Configuration Guide
36Chapter 2 System telephony networking overview
Tandem calling to a remote PSTN
A system connected to a private network that uses dedicated circuits or VoIP circuits can allow a
user to dial directly to many other users, on different nodes, using a coordinating dialing plan.
Using a private network saves on toll charges, and local charges, as fewer PSTN accesses are
required for internal and external calling. Several nodes located on one site initiate their external
local calls to a centralized BCM having a T1 termination to the PSTN. This type of configuration
avoids multiple PSTN terminations at other local nodes.
The same tandeming concepts can be applied to inbound calls. DID numbers dialed from the
PSTN can be processed and tandem routed out of the centralized system to the localized remote
nodes. See other details on Tandem routing “Creating tandem private networks” on page 43.
Figure 3 Tandem dialing through a BCM to/from a private network
In the above example, there are three types of callers.
Each type of caller has a specific method of accessing the other two systems.
Callers using BCM
These callers can:
•call directly to a specific telephone
•select an outgoing line to access a private network
•select an outgoing line to access features that are available on the private network
NN40020-603NN40020-603
Chapter 2 System telephony networking overview37
•select an outgoing central office line to access the public network
•use all of the BCM features
Callers in the public network
These callers use the public lines to:
•call directly to one or more BCM DNs
•call into BCM and select an outgoing TIE line to access a private network
•call into BCM and select an outgoing central office line to access the public network
•call into BCM and use remote features
Callers in the private network node
These callers use the private lines to:
•call directly to one or more BCM DNs
•call into BCM and select an outgoing TIE line to access other nodes in a private network
•call into BCM and select an outgoing central office line to access the public network
•call into BCM and use remote features
System numbering and dialing plans
All systems on a private network must coordinate dialing plans, to ensure that calls get directed to
the correct network node. As well, routing becomes more complex, especially if the system is not
an end node and must be configured to relay calls to nodes not directly connected to the system.
The type of dialing plan supported by the network determines whether each node also requires
unique DNs.
Private network parameters
The following provides an overview of the system values that affect private networking.
Private networking protocols
The BCM supports the following protocols for private networking:
•PRI: ETSI QSIG, Nortel Voice Networking (MCDN)
Networking Configuration Guide
38Chapter 2 System telephony networking overview
•DPNSS
•BRI: ETSI QSIG
•T1: E&M
•VoIP trunks (with optional MDCN)
Note: MCDN is referred to as SL-1 in Element Manager.
BCM systems can be networked together using T-1, PRI or VoIP trunks. PRI SL-1 lines and VoIP
trunks also offer the opportunity to use the MCDN protocol, which provides enhanced trunking
features and end-to-end user identification. If a Meridian 1 is part of the MCDN network, the
network can also provide centralized voice mail and auto attendant off the Meridian.
MCDN note: MCDN networking requires all nodes on the network to use a common Universal
Dialing Plan (UDP) or a Coordinated Dialing Plan (CDP).
Keycode requirements
Keycodes are required to activate the protocols that are used to create private networking,
including:
•VoIP Gateway keycodes
•an MCDN, DPNSS, or Q. Sig keycode, if you want to use a networking protocol between the
systems
You must purchase and install these keycodes before you can create any of the networks described
in this chapter. Consult with your Nortel distributor to ensure you order the correct keycodes for
the type of network you want to create.
Remote access to the network
Authorized users can access TIE lines, central office lines, and features from outside the system.
Remote users accessing a private network configured over a large geographical area can avoid toll
charges.
Note: You cannot program a DISA DN or Auto DN to a VoIP trunk, as they
act as auto-answer trunks from one private network to the next. However, you
can configure VoIP line pools with remote access packages so that callers can
access telephones or the local PSTN on remote nodes on a tandemed network
that use VoIP trunks between systems.
NN40020-603NN40020-603
Chapter 2 System telephony networking overview39
Lines used for networking
External (trunk) lines provide the physical connection between BCM and other systems in a
private or public network.
The BCM50 numbers physical lines from 061 to 124. Default numbering depends on the type and
connection to the BCM (EXP1 - EXP2).
VoIP trunks: Although a VoIP gateway does not use physical lines, it is easier to think of them
that way. Therefore, in the BCM, lines 001 to 012 are used for VoIP trunk functionality.
BCM networking configurations that use PRI and T1 lines, require specific DTM modules.
•DTMs configured for PRI are used for incoming and outgoing calls (two-way DID). Incoming
calls are routed directly to a BCM DN that has a properly configured and assigned target line.
All outgoing calls made through PRI, are initiated using the destination codes.
•DTMs configured for T1 can have digital lines configured as Groundstart, E&M, Loop,
or DID.
Target lines are virtual communication paths between trunks and telephones on the BCM system.
They are incoming lines only, and cannot be selected for outgoing calls or networking
applications. With target lines, you can concentrate incoming calls on fewer trunks. This type of
concentration is an advantage of DID lines. BCM target lines allow you to direct each DID number
to one or more telephones. VoIP trunks also require target lines to direct incoming traffic. Target
lines are numbered 125 to 268.
Telephones can be configured to have an appearance of analog lines or multiple appearances of
target lines.
Note: PRI B-channels cannot be assigned as line appearances. PRI
B-channels, or “trunks”, can only be configured into PRI line pools for
inbound routing through target lines with receive digits or outbound routing
through destination codes.
Types of private networks
There are several ways you can create private networks. Configuration can be based on such things
as cost of trunks, proximity of network nodes, size of the private network, and business
requirements for communications.
VoIP-based networking also requires an understanding of IP features such as codecs, jitter buffers,
Quality of Service (QoS) function, and silence compression.
The services provided within networks is based on the type of trunks and the protocols assigned to
the trunks. All trunks within the network should be running the same protocols, to provide a
technically sound and stable network.
The following links are procedures to set up basic networks to advanced networks, using the
support protocols within BCM:
•“Routing-based networks using T1 E&M lines” on page 40
Networking Configuration Guide
40Chapter 2 System telephony networking overview
•“PRI networking using Call-by-Call services” on page 41
•“PRI SL-1/Q.Sig/DPNSS and VoIP trunk networking” on page 42
Routing-based networks using T1 E&M lines
By properly planning and programming routing tables and destination codes, an installer can
create a dialing plan where T1 E&M lines between BCM systems are available to other systems in
the network
Figure 4 shows a network of three BCM systems. Two remote systems connect to a central system.
Figure 4 Dialing plan for T1 E&M routing network
New YorkNetwork # 2221Received # 2221Internal #2221
Santa ClaraNetwork # 4221Received # 4221Internal # 4221
Each system must be running BCM software. Each system must be equipped with target lines and
a BCM expansion unit with a DTM with at least one T1 E&M line.
NN40020-603NN40020-603
Chapter 2 System telephony networking overview41
The call appears on the auto answer line on the BCM in Santa Clara as 6-221. Because 6 is
programmed as a destination code for Toronto on the Santa Clara system, another call is placed
using route 002 from Santa Clara to Toronto. At the Toronto system, the digits 6-221 are
interpreted as a target line Private received number. The call now alerts at DN 6221 in Toronto.
Note: Network calls that use routes are subject to any restriction filters in
effect. If the telephone used to make a network call has an appearance of a line
used by the route, the call will move from the intercom button to the Line
button. The telephone used to make a network call must have access to the line
pool used by the route. Network calls are external calls, even though they are
dialed as if they were internal calls. Only the features and capabilities available
to external calls can be used.When programming a button to dial a Network
number automatically (autodial), network calls must be treated as external
numbers, even though they resemble internal telephone numbers. Routes
generally define the path between your BCM switch and another switch in
your network, not other individual telephones on that switch.
PRI networking using Call-by-Call services
The example shown in Figure 5 highlights the use of PRI Call-by-Call services. It shows two
offices of a company, one in New York and one in Toronto. Each office is equipped with a BCM
system and a PRI line. Each office has to handle incoming and outgoing calls to the public
network. In addition, employees at each office often have to call colleagues in the other office.
Refer to “Private networking: PRI Call-by-Call services” on page 343 for more information.
Networking Configuration Guide
42Chapter 2 System telephony networking overview
Figure 5 PRI networking using Call-by-Call Services
To reduce long distance costs, and to allow for a coordinated dialing plan between the offices,
private lines are used to handle inter-office traffic.
If call-by-call services were not used, each BCM system might have to be equipped with the
following trunks:
•12 T1 DID lines needed to handle peak incoming call traffic.
•eight T1 E&M lines needed to handle inter-office calls.
•eight lines needed to handle outgoing public calls
PRI SL-1/Q.Sig/DPNSS and VoIP trunk networking
You can use PRI SL-1 trunks and VoIP trunks to create private networks between BCM systems or
between BCM systems and larger call servers such as Meridian 1, Succession 1000/M, DMS-100/
250 and CSE.
ETSI-QSIG and DPNSS private networking is configured very similarly, although network
features may be supported slightly differently due to local line and network requirements.
If the MCDN protocol is added to this type of private network, the network provides additional
network management features, as well as allowing centralized voice mail features to be available
to all nodes on the network.
The following topics describe the different aspects of SL-1 and MCDN private networking.
•“System dialing plans” on page 43
•“Creating tandem private networks” on page 43
NN40020-603NN40020-603
Chapter 2 System telephony networking overview43
•“Understanding Nortel Voice Networking (MCDN) network features” on page 46
•“Networking with ETSI QSIG” on page 50
•“Private networking with DPNSS” on page 60
The type of network you require depends on the equipment in the network, and how you want to
use the network.
•With MCDN, you can tie a set of BCM systems together with PRI SL-1 (MCDN)/ETSI-QSIG,
DPNSS, or VoIP trunks to create a tandem network. This type of network provides the
additional advantage of providing private line access to local PSTNs for all the nodes on the
network.
Note: A keycode is required to use the Nortel Voice Networking functionality
which is referred to as SL-1 in the BCM Element Manager.
System dialing plans
Both of these types of networks require similar setups for dialing plans and routing. Each node
must have a way to route external calls to the adjacent node or nodes. To do this, all nodes must
have the same Private DN lengths.
You use routing and a private dialing plan to control calls over the network. Each example in this
section describes the routing configurations that are required to support calls over the network.
Depending on the type of dialing plan you choose, each node must also have a unique location or
steering code so the calls can be correctly routed through the nodes of the network. MCDN
networks also require a Private Network ID, which is supplied by the Meridian network
administrator to define how the Meridian system identifies each node.
Creating tandem private networks
You can tie a number of BCM systems together with SL-1 lines. This tandem network provides
you with the benefits of end-to-end name display and toll-free calling over the SL-1 private link.
Each BCM system becomes a node in the network. In this type of network, you must ensure that
each BCM system, known as a node of the network, is set up to route calls internally as well as to
other nodes on the system. This means each node must have a route to the immediately adjacent
node, and the correct codes to distribute the called numbers. Each node must have a unique
identification number, which is determined by the type of dialing plan chosen for the network.
As well, you can save costs by having a public network connection to only one or two nodes, and
routing external calls from other nodes out through the local PSTN, thus avoiding toll charges for
single calls.
VoIP note: You can also use VoIP trunks between some or all of the nodes. The setup is the same,
except that you need to create gateway records for each end of the trunk, and routing tables to
accommodate the gateway codes, or you can configure a gatekeeper. Refer to “VoIP
interoperability: Gatekeeper configuration” on page 389.
Networking Configuration Guide
44Chapter 2 System telephony networking overview
Routing for tandem networks
In tandem networks, each node needs to know how to route calls that do not terminate locally. To
do this, you set up routes for each connecting node by defining destination codes for each route.
If the node is also connected to the public network, the usual routing is required for that
connection.
The following tables show the routing tables for Node A and Node C for external and internal
terminating calls.
Note: The PRI and VoIP trunks are en bloc dialing lines, so all dialed digits
are collected before being dialed out.
NN40020-603NN40020-603
Chapter 2 System telephony networking overview45
Table 1 Node A destination code table, external termination
RouteAbsorb lengthDestination code (public DNs)
4 (PSTN)191604
3 (Node B)091403762 (Node B)
3 (Node B)091403765 (Node E)
4 (PSTN)19140376* (not internal network)
4 (PSTN)1914037* (not internal network)
4 (PSTN)191403* (not internal network)
4 (PSTN)19* (not internal network)
* This wild card represents a single digit.
Table 2 Node A destination code table, internal termination
RouteAbsorb lengthDestination code (private DNs)
3 (Node B)0392 (Node B)
3 (Node B)0395 (Node E)
5 (Node C)0393 (Node C)
5 (Node C)0394 (Node D)
5 (Node C)0396 (Node F)
Table 3 Node C destination code table, external termination
RouteAbsorb lengthDestination code (Public DNs)
3 (Node B)09
3 (Node B)09
4 (PSTN)19161376* (not internal network)
4 (PSTN)1916137* (not internal network)
4 (PSTN)191613* (not internal network)
4 (PSTN)19161* (not internal network)
4 (PSTN)1916* (not internal network)
4 (PSTN)191* (not internal network)
4 (PSTN)19 (not internal network)
* This wild card represents a single digit.
1613764 (Node D)
1613766 (Node F)
Networking Configuration Guide
46Chapter 2 System telephony networking overview
Table 4 Node C destination code table, internal termination
RouteAbsorb lengthDestination code (Private DNs)
3 (Node D)0394 (Node D)
3 (Node D)0396 (Node F)
5 (Node A)0391 (Node A)
5 (Node A)0392 (Node B)
5 (Node A)0395 (Node E)
Understanding Nortel Voice Networking (MCDN) network
features
When you connect your BCM systems through PRI-SL-1/ETSI QSIG/DPNSS or VoIP trunks, and
activate the MCDN protocol, your network provides a number of network call features. You can
use this protocol to network other BCM systems, such as the tandem system shown in “Creating
tandem private networks”, Norstar systems, Meridian 1 systems, Succession systems, DMS-100
systems or CSE systems.
Table 5 lists the MCDN features that are provided by all SL-1/VoIP networks where MCDN is
active. The features affect call redirection and trunking functions.
Table 5 MCDN network features
Centralized messaging“Network Call Redirection Information” on page 46 (NCRI)
Centralize trunking“ISDN Call Connection Limitation” on page 47 (ICCL)
“Trunk Route Optimization” on page 48 (TRO)
“Trunk Anti-tromboning” on page 49 (TAT)
Network Call Redirection Information
Network Call Redirection Information (NCRI) builds on the following BCM features:
•External Call Forward
•Call Transfer
•Call Forward
NCRI adds the ability to redirect a call across an MCDN network using Call Forward (All Calls,
No Answer, Busy) and Call Transfer features. The call destination also receives the necessary
redirection information. This feature allows the system to automatically redirect calls from within
a BCM system to the mail system, such as Meridian Mail, which resides outside the BCM system
on the Meridian 1.
Figure 6 shows an example of this situation, where user A calls user B on the same BCM. If user B
is busy or not answering, the call automatically gets transferred to a Meridian Mail number
(user C) across an MCDN link between the BCM system and the Meridian 1 system where the
mailboxes are set up.
NN40020-603NN40020-603
Figure 6 Network call redirection path
Telephone A
Original call
Call forwarded to Meridian Mail
ISDN Call Connection Limitation
The ICCL (ISDN Call Connection Limitation) feature piggybacks on the call initiation request and
acts as a check at transit PBX points to prevent misconfigured routes or calls with errors from
blocking channels. Also refer to “ISDN overview” on page 535.
Chapter 2 System telephony networking overview47
Meridian 1
BCM
SL-1 MCDN
Telephone B
with Meridian Mail
This feature adds a transit/tandem counter to a call setup message. This counter is compared at
each transit PBX with a value programmed into the transit PBX, in a range from 0 to 31. If the call
setup counter is higher than the PBX value, the call will be blocked at the PBX system and cleared
back to the network. This prevents calls from creating loops that tie up lines.
Figure 7 demonstrates how a call might loop through a network if the system is not set up
with ICCL.
Networking Configuration Guide
48Chapter 2 System telephony networking overview
Figure 7 Call loop on system without ICCL
BCM
Meridian 1
BCM
Meridian 1
Telephone A
BCM
Trunk Route Optimization
Trunk Route Optimization (TRO) finds the most direct route through the network to send a call
between nodes. This function occurs during the initial alerting phase of a call.
To set BCM configurations:
•Select Configuration > Dialing Plan > Private Network, and select the check box beside
TRO.
•Configure call routing for all optimal routes.
•Configure call forward (All Calls, No Answer, Busy) or Selective Line Redirection to use the
optimal routes.
This feature avoids the following situation: A call originating from a BCM system may be
networked to a Meridian system, which, in turn, is networked to another Meridian system, which is
the destination for the call. If the call routes through the first Meridian (M1) to reach the second
Meridian (M2), two trunks are required for the call. An optimal choice is a straight connection to
M2. This finds these connections and overrides the less-efficient setup.
Figure 8 shows two call paths. The first route, through the Meridian, demonstrates how a call
might route if TRO is not active. The second route, that bypasses the Meridian, demonstrates how
TRO selects the optimum routing for a call.
NN40020-603NN40020-603
Figure 8 Call paths with and without TRO
Meridian 1
Chapter 2 System telephony networking overview49
Telephone B
Meridian 1
BCM
Telephone A
PRI SL-1
PRI SL-1
Original call (no TRO)
Forwarded call (no TRO)
Call path with TRO
PRI SL-1
Telephone C
Trunk Anti-tromboning
Trunk Anti-Tromboning (TAT) is a call-reroute feature that works to find better routes during a
transfer of an active call. This feature acts to prevent unnecessary tandeming and tromboning of
trunks.
Note: This feature is not applicable for alerting calls.
Figure 9 shows how TAT reduces the line requirements. The solid line shows Telephone A calling
Telephone B and being transferred over an additional PRI line to Telephone C. With TAT active,
the same call is transferred to Telephone C over the same PRI line.
Networking Configuration Guide
50Chapter 2 System telephony networking overview
Figure 9 Call paths with and without TAT
BCM
Telephone C
Telephone A
Forwarded call (no TAT)
Forwarded call (using TAT)
Networking with ETSI QSIG
(International systems only)
ETSI QSIG is the European standard signaling protocol for multi-vendor peer-to-peer
communications between PBX systems and/or central offices.
BCM
Telephone B
See: “ETSI Euro network services” on page 51.
Figure 10 illustrates an ETSI QSIG network. Note that this is exactly the same setup as that shown
in the MCDN section for North America. The hardware programming for ETSI QSIG is described
in Table 6. All other configurations are the same as those shown in the MCDN section for North
America.
NN40020-603NN40020-603
Figure 10 ETSI QSIG networking
Network # 2221
Received # 2221
Internal # 2221
Chapter 2 System telephony networking overview51
Network # 6221
Received # 6221
Internal # 6221
PRI/BRI ETSI QSIG
BCM West end branch
Central
Office
Table 6 lists the settings for some of the hardware parameters for ETSI QSIG networking example
shown in Figure 10.
Table 6 Hardware programming for branch offices
West End office:
Hardware
programming
DTM/BRIMPRI/BRIHardware
ProtocolETSI QSIGProtocolETSI QSIG
BchanSeqAscend
(PRI only)
ClockSrcPrimaryClockSrcPrimary
PRI/BRI
PBX
ETSI QSIG
East End office:
programming
BCM East end branch
DN 4221
DTM/BRIMPRI/BRI
BchanSeqAscend
(PRI only)
ETSI Euro network services
If your system has ETSI ISDN BRI/PRI lines, you can activate the malicious call identification
(MCID) and Network Diversion features. Advice of charge-end call (AOCE) is active if your
service provider has activated that service on the line.
Networking Configuration Guide
52Chapter 2 System telephony networking overview
When the features are activated, users can:
•display a call charge
•redirect calls over the ETSI ISDN BRI/PRI line to the outside network
•tag malicious calls
Advice of Charge-End of Call (AOCE) — AOCE is a supplementary service available from your
service provider on ETSI ISDN BRI/PRI links. This feature allows the BCM user to view the
charges for an outgoing call after the call completes. This information is also reported to the Call
Detail Reporting Application. The information can be provided in currency or charging units,
depending on how the feature is set up by your service provider.
To invoke the feature, the user presses FEATURE 818.
DPNSS 1 services
The Digital Private Network Signaling System (DPNSS 1) is a networking protocol enhancement
that extends the private networking capabilities of existing BCM systems. It is designed to offer
greater centralized functionality for operators, giving them access to BCM features over multiple
combined networks.
Note: The DPNSS feature is dependent on which region loaded on your
system at startup and that a software keycode was entered to enable the
feature.
For more information, see:
•“DPNSS 1 capabilities” on page 53
•“DPNSS 1 features” on page 53
•“Private networking with DPNSS” on page 60
DPNSS 1 allows a BCM local node, acting as a terminating node, to communicate with other
PBXs over the network. For example, corporate offices separated geographically can be linked
over DPNSS 1 to other BCM nodes, bypassing the restrictions of the PSTNs to which they may be
connected. Connected BCM nodes can therefore function like a private network, with all features
of BCM accessible.
Note: BCM DPNSS 1 works as a terminating node only. BCM-to-BCM
DPNSS is not supported.
You can use DPNSS 1 features on any BCM telephone. On most BCM telephones, you must use
specific keys and/or enter a number code to access the features.
NN40020-603NN40020-603
Chapter 2 System telephony networking overview53
DPNSS 1 capabilities
A single BCM node, acting as a terminating node on the network, supports the following
capabilities over DPNSS 1 lines:
•Direct Dial Inward (DDI) for incoming calls.
•Originating Line Identification (OLI) for incoming and outgoing calls:
— For incoming calls, the Calling Line Identification (CLI/CLID) information is displayed to
the user on telephones with line display. This must be configured in programming.
— For outgoing calls, the directory number of the originating party is sent out as OLI.
•Terminal Line Identification (TLI) for incoming and outgoing calls. Referred to as Called Line
Identification.
•Selective Line Redirect (SLR) and External Call Forward (ECF) implemented on calls
between DPNSS 1, and BRI/PRI, DASS2, and analog lines.
•These remote access features are supported on DPNSS: DDI, line pool access code,
destination codes and remote page feature codes.
Keycodes are required to enable DPNSS 1.
DPNSS to Embark connections
DPNSS lines connected to an Embark switch perform call redirection/diversion using the Call
Forward feature to create a tandem link back to the switch. Since this is different from other
switches, you must select the type of switch DPNSS will be connecting to when you do module
programming.
Before you program Call Forwarding, ensure that:
•Both real channels and virtual channels are provisioned.
•Destination or line pool codes are programmed for the DPNSS to Embark link.
Also, during programming for Call Forward No Answer and Call Forward on Busy, when you
enter the Forward to: digits, the system does a validation check with the switch on the number.
(Configuration > Telephony > Sets > Active Sets > Line Access)
DPNSS 1 features
The following features are available and can be programmed over DPNSS lines:
•“Three party service” on page 54
•Diversion (“Using the diversion feature” on page 55)
•Redirection (“Using the Redirection feature” on page 56)
•“Executive intrusion” on page 57
Networking Configuration Guide
54Chapter 2 System telephony networking overview
•“Call Offer” on page 58
•“Route Optimization” on page 59
•“Loop avoidance” on page 59
•Message Waiting Indication
The following parameters can be configured for DPNNS 1 lines:
•Line type
•Prime set
•CLID set
•Auto privacy
•Answer mode
•Auxiliary ringer
•Full autohold
Some features are transparent to the user, but must be programmed to be activated. Others are
available for end-user programming at the telephone. Details about these features are given below.
Three party service
Three Party Service is a DPNSS 1 feature for BCM that is similar to the BCM Conference feature.
The Three Party Service allows a user, usually an operator, to establish a three-party conference by
calling two other parties from one telephone. Once the connection is made, the controlling party
can hang up, leaving the other two connected. The controlling party can even put one party on
hold, and talk to the other party.
Note: BCM does not support Hold over the DPNSS link itself. This means
that the conferenced party on the distant end of the network cannot place a
Three Party Service call on Hold.
This feature is designed to allow operators to assist in the connection of calls from one main
location.
NN40020-603NN40020-603
Chapter 2 System telephony networking overview55
Making a conference call
To initiate or disconnect from a conference call on a BCM system over DPNSS 1, use the
procedure described in the Device Configuration Guide (NN40020-300)
Note: Three Party Service is supported on model 7000 telephones, but in a
receive-only fashion. These telephone types cannot initiate Three Party
Service. For more information about these telephone types, see the Telephony Device Installation Guide (NN40020-309) (model 7000 phones, supported in
Europe only).
.
Using the diversion feature
Diversion is a DPNSS 1 feature for BCM that allows users to forward their calls to a third party on
the DPNSS 1 network. This feature is similar to Call Forward on BCM but takes advantage of the
broader capabilities of DPNSS.
There are five variations of Diversion: Call Diversion Immediate, Call Diversion On Busy, Call
Diversion On No Reply, Bypass Call Diversion, and Follow-me Diversion. These variations are
described below:
•Diversion Immediate diverts all calls to an alternate telephone. This function is programmed
by the user at their telephone.
•Diversion On Busy diverts all calls to an alternate telephone when a telephone is busy. This
feature is programmed in the Element Manager.
•Diversion On No Reply diverts calls that go unanswered after a specified amount of time. This
feature is programmed in the Element Manager.
•Bypass Call Diversion overrides all call forward features active on a telephone over a DPNSS
line. An incoming call to the telephone will not be forwarded; instead, the telephone will
continue to ring as if call forward were not active. This feature is used to force a call to be
answered at that location. Bypass Call Diversion is a receive-only feature on BCM and cannot
be used from a BCM telephone.
•Follow-me Diversion is also a receive-only feature. It allows the call-forwarded destination to
remotely change the BCM call-forwarding programming (Call Forward All Calls [CFAC]
feature) to a different telephone.
Note: BCM CFAC must be active, and the destination set/PBX system must
support the feature.
For example, user A forwards all calls to telephone B, a temporary office. Later, user A moves
on to location C. The user does not have to be at telephone A to forward calls to location C.
Using telephone B and Follow-me Diversion, the user can forward calls from A to location C.
Networking Configuration Guide
56Chapter 2 System telephony networking overview
Follow-me diversion can be cancelled from the forwarded location.
•Diversion on Busy and Diversion on No Reply cannot be cancelled from the forwarded
telephone. These are programmable only by an installer and not by the user.
•If multiple telephones are programmed to take a call, the first telephone to respond will act. All
other telephones responding are ignored. Therefore, if the first telephone to respond has
Diversion enabled, this feature will be invoked.
Restrictions by telephone type
•all variations supported on BCM digital and IP telephones
•ATA2/ASM8+—all variations supported on an ATA
•ISDN—all variations supported on ISDN telephones, except Diversion on Busy and CFWD
Busy
Setting Diversion
You set Diversion for DPNSS in the same way as Call Forward. You will need to enter the end DN
when prompted. You may also need to include the DPNSS 1 routing number.
Using the Redirection feature
Redirection is a DPNSS 1 feature similar to BCM Transfer Callback. With Redirection, a call
awaiting connection, or reconnection, is redirected by the originating party to an alternate
destination after a time-out period. Failed calls can also be redirected. Priority calls are not
redirected.
Note: The address to redirect depends on the history of the call. Calls that
have been transferred are redirected to the party that transferred them. In all
other cases, the address to redirect is the one registered at the PBX system
originating the redirection.
Note: BCM does not support the redirection of BCM-originated calls, even
over DPNSS 1.
The Diversion on No Reply feature takes precedence over Redirection.
Restrictions by telephone type
•For telephones with a single line display, the number key (#) acts as MORE and the star key (*)
acts as VIEW
•ISDN—all variations supported on ISDN telephones
NN40020-603NN40020-603
Chapter 2 System telephony networking overview57
Setting redirection
The timer used for the network Callback feature is also used for redirection.
Executive intrusion
Executive Intrusion (EI) is a DPNSS 1 feature that allows an operator, or other calling party, to
intrude on a line when it is busy. An example of the use of this feature is to make an important
announcement when the recipient is on another call.
EI is similar in functionality to BCM Priority Call, but it is a receive-only feature on BCM
telephones. EI cannot be initiated from a BCM telephone. The person using this feature must be on
another PBX system on the DPNSS 1 network.
When EI is used to intrude on a call in progress, a three-way connection is established between the
originating party and the two parties on the call. The result is very much like a conference call.
When one of the three parties clears the line, the other two remain connected, and EI is terminated.
Restrictions by telephone type
•ATA2/ASM8+—supported
•ISDN—not supported
The telephone receiving the intrusion displays Intrusion Call. A warning indication tone
will sound after intrusion has taken place, and the standard conference call tone will sound every
20 seconds.
Intrusion levels
Whether a telephone accepts or rejects an Executive Intrusion request depends on the level of
intrusion protection programmed. Each telephone (DN) has an Intrusion Capability Level (ICL)
and four Intrusion Protection Levels (IPL).
When the ICL of the intruding telephone is higher than the IPLs of both telephones on the active
call, EI occurs. Nortel recommends that you set the IPLs of most BCM telephones to the default of
None, or Low or Medium.
Intrusion levels are described as follows:
•ICL: determines the ability of the attendant to intrude. As long as the ICL is higher than the
IPL of the wanted party, EI is allowed. Because EI is a receive-only feature, the ICL cannot be
set on BCM.
•IPL: determines the ability of the attendant to refuse intrusion. If the IPL is lower than the ICL
of the originating party, EI is allowed. For general purposes setting the IPL to None, Low or
Medium is recommended, unless intrusion is not wanted.
Networking Configuration Guide
58Chapter 2 System telephony networking overview
Call Offer
Call Offer over DPNSS 1 allows a calling party to indicate to the wanted party that there is an
incoming call available, even though there is no answer button available to present the call on the
telephone. The intended recipient can ignore, accept, or decline the offered call. Call Offer is
useful in increasing the call-coverage capability of a BCM system, and helps to lift the network
processing load. It is a receive-only capability on BCM; incoming calls are initiated at another
PBX system on the DPNSS 1 network.
An example of Call Offer in use is an operator or attendant who has a number of calls coming in at
once. The operator can call offer one call and move to the next without waiting for the first call to
be answered.
Call Offer Displays
When a Call Offer is made by the originating exchange, the target telephone displays a message,
and a tone is heard. When an offered call arrives on telephones with line display, the user sees
XX...X wtng if the calling party ID is available and CLID is enabled. If CLID is not available
or CLID is disabled, Line XXX waiting appears (the line name associated with the call). If
there are more than 11 digits in the incoming number, only the last 10 will display.
If Call Queuing is programmed for the system, the display shows Release Line XXX.
This is the line name of the highest-priority queued call if it is an offered call.
Restrictions by telephone type
•model 7000 telephone — associated LED or LCD flashes, and a tone is heard (model 7000
phones, supported in Europe only.)
•ATA2/ASM8+—Call Offer is supported as a Camp On feature, and a tone is heard
•ISDN—not supported
Note the following general conditions and restrictions:
•Clear the DND on busy check box (DN ##/Capabilities) for a telephone to accept Call Offer.
•If CF on busy is programmed for the telephone, Call Offer is not accepted.
•The target line for the telephone must be set to: If busy: busy tone, which is the default.
•Call Offer does not work if sent over Manual answer lines. It is recommended that the lines be
left at the default: Auto.
User actions
The party receiving a Call Offer has three choices:
•Ignore it. After a programmed time interval, the Offer request is removed.
NN40020-603NN40020-603
Chapter 2 System telephony networking overview59
•Reject it. If the user activates Do Not Disturb on Busy (DND) when the Call Offer request is
made, the request is removed from the telephone. The calling party is informed of the
rejection.
Note: A call cannot be offered to a telephone with DND active. The line
indicator for external incoming calls still flashes.
•Accept it. The Offer is accepted by releasing the active call.
Note: Forward on Busy takes priority over DND on Busy. Call Offer cannot
be accepted by putting an active call on hold.
Route Optimization
Route Optimization is a DPNSS 1 feature for BCM that allows calls to follow the optimum route
between two end PBXs. This allows efficient use of network resources.
Route Optimization is initiated by the system and is transparent to the user. However, the user may
see a call switch from an appearance on the telephone to another appearance key or from an
intercom button to the appearance key or vice versa. This occurs when BCM receives a Route
Optimization request and initiates a new call to follow the optimal route.
If a telephone is active on a private line call, the Route Optimization call being established may go
on a public line. This will cause a loss of privacy on that line.
Data calls are rejected by Route Optimization in order to ensure the data transmission is not
affected.
Certain situations result in Route Optimization not taking place. For example, calls that are using
Hold, Parking or Camp features do not undergo Route Optimization, and if a Route Optimization
call undergoes Diversion, the Route Optimization is dropped.
Setting Route Optimization
System programming is not required for the feature when BCM is working as a terminating PBX
system. However, BCM must have a private access code programmed that maps to a valid
destination code or line pool code on DPNSS lines. Further, Allow Redirect must be selected.
Loop avoidance
Errors in the configuration of a network may make it possible for a call to be misrouted, and arrive
at a PBX system through which it has already passed. This would continue, causing a loop which
would eventually use up all of the available channels. The Loop Avoidance service permits
counting of DPNSS 1 transit PBXs and rejecting a call when the count exceeds a predetermined
limit.
Networking Configuration Guide
60Chapter 2 System telephony networking overview
Private networking with DPNSS
(International only)
DPNSS supports the Universal Dialing Plan (UDP), an international standard for sending and
receiving private numbers over networks. The UDP requires that a dialing number include the
following:
•a Private Access Code, programmed into the system as part of the destination code table to
prevent conflicts with the internal numbering system. (Access Codes)
•a Home Location Code (HLC) assigned to each PBX system, and configured as part of the
destination code (a maximum of seven digits). For each HLC, a destination code must be
programmed in the system. (Configuration > Telephony > Dialing Plan > Private Networking)
•a Directory Number (DN) assigned to each extension as a line appearance. The DN appears as
the last string segment in a dialed number. In the number 244-1111, 1111 is the DN.
A typical Private Number, using a private access code and dialed from another site on the network,
appears below.
Private Access
Code
6+ 848+ 2222= 6-848-2222
+ Home Location
Code
+ Directory
Number
= Calling Party
Number
In this networking example, a private network is formed when several systems are connected
through a Meridian 1 and a terminating BCM system. Each site has its own HLC and a range of
DNs. Figure 11 illustrates this example.
Table 7 shows examples of the construction of numbers used when dialing within the example
network. Note that 6 is the Private Access code.
Table 7 Calling numbers required for DPNSS network example
Calling Site LOC/HLCCalling Party
Number
Site A 244244 1111Site B6 668 2222668 2222
Site B668668 2222Site D6 848 2222848 2222
Site D8482222Site D22292229
Site C496496 3333Public DN9 563 3245563 3245
Called SiteDialing StringCalled Party
Number
NN40020-603NN40020-603
Figure 11 DPNSS networking
Chapter 2 System telephony networking overview61
Private
Network
Terminating
BCM Site A
DN # 111
LOC # 244
DPNSS
DPNSSDPNSS
Meridian M1
LOC # 563
BCM Site B
DN # 2222
LOC # 668
DPNSS
BCM Site C
DN # 3333
LOC # 496
BCM Site D
DN # 2229
Extension 2222
LOC # 848
Calls are dialed and identified to the system as follows:
•To reach a telephone inside the Private Network, at the BCM site, dial the DN of choice.
•To reach a telephone inside the Private Network, from another site, dial HLC + DN.
•To reach a telephone outside the Private Network, dial an Access Code + HLC + DN.
Each node has its own destination (dest) code, which includes the appropriate access and HLC
codes to route the call appropriately.
BRI Euro Protocol
The Kapsch enhancement introduces two protocol types in BRI Euro Protocol.
•S-T user
•T-T user
The existing protocol type is renamed to S-T user.
Networking Configuration Guide
62Chapter 2 System telephony networking overview
Naming convention
Choose the protocol type for consistency with PRI trunk configuration. The PRI protocol type can
be either User (Slave) or Network (Master). The BRI protocol type can be extended with T-T
(Network). You can connect two BCMs through a BRI link.
S-T refers to a far end which has an S interface (Line in M1 terminology).
T-T refers to a far end which has a T interface (Trunk in M1 terminology).
In both cases, User is the user or slave end of the connection.
Application level differences
BRI Euro Protocol gives you the option to set the protocol type as S-T user or T-T user. The
default setting is S-T user.
The S-T user type provides lines in Pool X mode, which already exist. If the far end interface is
BRI loop choose the S-T user type. The T-T user type provides the lines in BlocX mode, which is
newly introduced. If the far end interface is BRI trunk choose the T-T user type.
Protocol level differences
The following are the protocol level differences in the Kapsch enhancement:
•The S-T user type has the existing functionality which does not support
PROGRESS_MESSAGE.
•The T-T user type supports PROGRESS_MESSAGE.
•After the destination telephone starts to ring in the S-T user, BCM does not send a message to
the network.
•After the tandem occurs in the T-T user, BCM sends a message to the network.
•In the S-T user type, the BRI call is answered prior to the tandem, while in the T-T user type,
the message is sent when the call is tandemed and answered only when the destination
telephone answers the call.
•When the S-T user type is chosen, this can impact the billing in tandem cases. The billing
metrics start once the call is tandemed and not when the destination telephone is answered. But
in the case of the T-T user type, the billing is triggered when the far end answers the call and
not when the call is tandemed.
NN40020-603NN40020-603
Chapter 3
Telephony programming: Configuring call traffic
Telephony call traffic has a number of configuration requirements. Some configuration is common
to both incoming and outgoing traffic. Other settings are specific to the call direction.
In the case of private networking, call configuration becomes more complex, as remote systems
send calls over the private network to other nodes or to your system PSTN network and your local
PSTN handles calls directed to remote nodes through your system.
Line programming and number planning both play critical roles in controlling call traffic for your
system.
For incoming calls, you can have a central reception point, or you can specify target lines to one or
more telephones to receive directed calling.
You can arrange your telephones in Hunt groups, ringing groups, or call groups that use
system-wide call appearance (SWCA) assignments to share calls.
You can also configure lines for use by system users who call in from outside the system. You can
give them direct access to the system with an Auto DN, or you can configure the line so they hear
a stuttered dial tone, at which point they need to enter a password (CoS) to gain access
(DISA DN).
For outgoing calls, you can assign one or more intercom keys to directly link to a line pool or
prime line, or allow line pool access codes, destination codes, or internal system numbers to direct
the call. Telephones without intercom keys on the telephone have intercom keys assigned, but the
user must pick up the handset to access calls. In this case, the intercom key is an assigned DN.
For calls within the system, all telephones are virtually linked within the system. To call another
telephone inside the system, lift the handset and dial the local DN. In this case, the prime line has
to be set to intercom or none.
For calls going outside the system:
•If you assign the prime line to a line pool, all the lines in that line pool must be assigned to the
telephone. When you pick up the handset, the telephone automatically grabs the first available
line from the assigned line pool. In this configuration, you must ensure that the outgoing
number is allowed by the line pool.
•If you assign the prime line to an intercom button, when you press the intercom button you get
system dial tone. Then, you enter a line pool access code or a destination code to direct the
outgoing call to the appropriate line pool, where it exits the system on any available line in that
pool.
Figure 18 Configuring outgoing call traffic (Sheet 2 of 2)
NN40020-603NN40020-603
Chapter 4
Application Resources overview
Application Resources is a management tool for allocating system resources such as signalling
channels, VDI channels, media channels, and DSP resources. While the BCM manages resources
for different services by making resources available as they are needed, you can manage the
resources by setting minimums and maximums for each service.
For information on configuring application resources, see “Application Resources panel” on
page 77.
Types of resources
There are four types of resources managed by the Application Resources panel:
•Signalling channels
73
•VDI channels
•Media channels
•DSP resources
Different applications require different resources. For example, each media gateway requires one
DSP Resource and one media channel, but does not require any signalling channels or VDI
channels. Use the Application Resources Reservations table to see what resources are required by
each application. Whenever an entry contains N/A, the application does not use that resource.
Total and Reserved Resources
The total and reserved resource options display the current levels of total and reserved resources.
The total resource table displays the total resources on the system, while the reserved resource
table displays what resources are currently allocated or in use.
The total number of resources for signalling channels, VDI channels, and media channels exceeds
the maximum capacity for the BCM, you do not need to manage the resources based on these
channels. For example, IP Trunks are the only application that use VDI channels, and even if the
BCM maximum of 12 IP trunks are in use, they will not exceed the total of 62 VDI channels.
There is no need to modify the IP trunks minimum and maximum, since the necessary VDI
resources will always be available.
The only resource you need to manage is DSP, which is used by media gateways, voice mail and
Call Centre, Fax, and Conferencing.
Networking Configuration Guide
74Chapter 4 Application Resources overview
Setting values for application resources
For all applications, you can modify the minimum and maximum values. The minimum values
reflect the number of resources that will always be reserved for a particular application, while the
maximum reflects the maximum instances of an application the system will allow at once. If an
application attempts to use system resources and the system is already supporting the maximum
for that application, the service will be declined, regardless of whether there are sufficient
resources available. A value of MAX is also acceptable, which sets the maximum number of
applications allowed to the maximum number possible. For example, the System Maximum for
Media Gateways is 80. If the Maximum value for Media Gateways is set to MAX, then the system
allows up to 80 Media Gateways at once, as long as sufficient resources are available.
Changes pending
In some cases, a change you make to the application resources panel may not be able to take effect
immediately. For example, if you change the number of conference calls allowed from three to
two, while there are three calls in progress, the resource allocations will not change until after one
of the calls has been disconnected. In a situation where the changes cannot be made immediately, a
checkmark appear in the Changes Pending box, and you can view details of these changes by
clicking on the application and viewing the details below.
IP set resources
Because there is no circumstance where the number of IP sets on the system would exceed the
available resources, there is generally no need to modify the resources for this application.
However, if you want to limit the number of IP set connections, you can change the maximum
value.
IP trunk resources
Because there is no circumstance where the number of IP trunks on the system would exceed the
available resources, there is generally no need to modify the resources for this application.
However, if you want to limit the number of IP trunk connections, you can change the maximum
value.
Media gateway resources
Media gateways require DSP resources. Because there is often a slight delay in allocating the DSP
resources, you may want to set the minimum to 2 or more. This will ensure that there is generally
no delay in setting up the media gateway.
NN40020-603NN40020-603
Chapter 4 Application Resources overview75
Voice mail and CC resources
These resources require DSP resources. Because there is often a slight delay in allocating DSP
resources, you may want to set the minimum to 2 or more. This setting generally ensures that there
is no delay occurs in setting up the application.
Fax
Fax has a maximum of 2. Each fax uses three DSP resources, so if you find that your system is
always running low on resources, you may want to limit fax to 1.
Conf. Parties
The total number of parties across all simultaneous conferences cannot exceed 18, and a single
conference can contain up to 18 parties.
Conf. Mixers
A conference mixer allows several conference parties to be mixed into a conference. BCM
supports up to 9 simultaneous conferences.
SIP Trunks
Because there is no circumstance where the number of SIP trunks on the system would exceed the
available resources, there is generally no need to modify the resources for this application.
However, if you want to limit the number of SIP trunk connections, you can change the maximum
value. BCM supports a maximum of 12 SIP trunks.
Digital Trunks
Because there is no circumstance where the number of digital trunks on the system would exceed
the available resources, there is generally no need to modify the resources for this application.
However, if you want to limit the number of digital trunk connections, you can change the
maximum value. BCM supports a maximum of 2 digital trunks.
Networking Configuration Guide
76Chapter 4 Application Resources overview
NN40020-603NN40020-603
Chapter 5
Application Resources panel
The application resources panel allows you to modify resources allocated to applications on the
BCM. While the panel tracks four types of resources, DSP resources are generally the only type of
resources that affect performance on the BCM. For more information on planning your application
resources, see “Application Resources overview” on page 73.
Note: Do not change these settings unless you want to restrict resources.
The application resources panel consists of three tables and a panel:
•Total Resources
•Reserved Resources
•Application Resource Reservations
77
•Details for application
Total Resources
The total resources options show the maximum resources available for each type of resource.
Reserved Resources
The Reserved Resources options show the resources currently reserved or in use.
Application Resource Reservations
Use the Application Resource Reservations table allow you to set minimum and maximum values
for telephony resources. The table contains 10 columns, 8 of which are read-only. For information
about determining the appropriate values for each type of application, see “Setting values for
application resources” on page 74.
Details for application
The Details for Application panel changes whenever you select a different row from the
Application Resource Reservations table. The panel reflects the current minimum and maximum
limits, in instances where changes do not happen immediately.
Networking Configuration Guide
78Chapter 5 Application Resources panel
Figure 19 Application resources panel
Table 8 Application Resources panel (Sheet 1 of 3)
AttributeValueDescription
Total Resources
Signalling channels<read-only>The total number of signalling channels on the system.
VDI channels<read-only>The total number of VDI channels on the system.
Media channels<read-only>The total number of media channels on the system.
DSP resources<read-only>The total number of DSP resources on the system.
Reserved Resources
Signalling channels<read-only>The number of signalling channels in use on the system. This
number can change based on the values entered for
applications, and on the those applications currently in use.
NN40020-603NN40020-603
Chapter 5 Application Resources panel79
Table 8 Application Resources panel (Sheet 2 of 3)
AttributeValueDescription
VDI channels<read-only>The number of VDI channels in use on the system. This
number can change based on the values entered for
applications, and on the those applications currently in use.
Media channels<read-only>The number of media channels in use on the system. This
number can change based on the values entered for
applications, and on the those applications currently in use.
DSP resources<read-only>The number of DSP resources in use on the system. This
number can change based on the values entered for
applications, and on the those applications currently in use.
Application Resource Reservations
Application<read-only>The name of the application.
Minimum<numeric value>The minimum number of resources reserved at all times for
the application. If a value of 2 is entered, the system will
always reserve enough resources for 2 instances of the
application.
Maximum<numeric value, or
the string MAX>
Licence<read-only>The number of licenses the system has activated for the
System Max.<numeric value>The maximum instances of an application the BCM can
The maximum number of applications to allow. If the value is
set to MAX, the system will allow up to the system maximum,
as long as there are enough resources.
application. If the value is N/A, the application does not require
licenses.
support.
Change Pending<read-only>If this box is selected, a change is pending to the system. Most
changes take effect immediately, but in some instances, a
change may wait until applications shut down. Details about
changes pending can be seen in the details panel.
Sig. Ch.<read-only>The number of signalling channels reserved by the
application. This can be changed by modifying the minimum
and maximum values for the application. If the field has a
value of N/A, the application does not require this type of
resource.
VDI Ch.<read-only>The number of VDI channels reserved by the application. This
can be changed by modifying the minimum and maximum
values for the application. If the field has a value of N/A, the
application does not require this type of resource.
Media Ch.<read-only>The number of media channels reserved by the application.
This can be changed by modifying the minimum and
maximum values for the application. If the field has a value of
N/A, the application does not require this type of resource.
DSP<read-only>The number of DSP resources reserved by the application.
This can be changed by modifying the minimum and
maximum values for the application. If the field has a value of
N/A, the application does not require this type of resource.
Networking Configuration Guide
80Chapter 5 Application Resources panel
Table 8 Application Resources panel (Sheet 3 of 3)
AttributeValueDescription
Details for Application
Current minimum
assigned limit
Current maximum
assigned limit
Note<read-only>Indicates any pending changes.
<read-only>The current minimum assigned for an application.
<read-only>The current maximum assigned for an application.
NN40020-603NN40020-603
Chapter 6
Module configuration: Trunk modules
This following describes the Element Manager headings that define and control the settings for the
trunk media bay modules installed on your system.
The following paths indicate where to access the trunk modules in Element Manager and through
Telset Administration:
For an overview of the Telephony Resources panel, refer to “Configuring telephony resources” on
page 101.
Task: To confirm settings for the trunk media bay modules installed in the system.
81
•Confirm that all prerequisites are complete. Refer to “Configuring the trunk module
parameters” on page 83.
•Confirm or set module parameters as follows:
•If your module supports T1, PRI, or DASS2, refer to “Call-by-Call Service
Selection” on page 108 and “Provisioning module lines/loops” on page 112.
•For other types of trunk modules, configure each line record. Refer to
“Configuring lines” on page 129.
•Provision modules and confirm auto-entry information. Refer to “Provisioning
module lines/loops” on page 112.
Prerequisites
Complete the following prerequisites checklist before configuring the modules.
System hardware is installed and operating correctly.
All relevant central office/service provider information for the trunk type
has been obtained.
Keycodes have been activated for core module trunks.
Expansion modules are installed and operating, and LEDs are correct.
Networking Configuration Guide
82Chapter 6 Module configuration: Trunk modules
Figure 20 Fitting the procedure into the overall picture
NN40020-603NN40020-603
Chapter 6 Module configuration: Trunk modules83
Configuring the trunk module parameters
Modules automatically configure to a free bus when they are connected to the system.
•That bus determines what line numbers are supported by the module.
•Module programming determines the type of line.
•Trunk configuration determines the line properties for the system.
To define the modules to the system
1On the Modules panel, click the trunk module entry that you want to view.
2On the Module Parameters tab panel, review the settings to ensure they support the type of line
function provided from the Central Office (CO). For details of the configurable parameters for
a trunk type, refer to “Module parameters list” on page 83.
3If your module supports T1, PRI, or DASS2, refer to “Call-by-Call Service Selection” on
page 108 and “Provisioning module lines/loops” on page 112.
If your module supports other types of trunks, configure each line record. Refer to
“Configuring lines” on page 129.
Module parameters list
The following contains information about the module parameters that are specific to a module
type.
Refer to “Trunk Module Parameters” on page 104 for detailed field descriptions.
Configuring digital and analog loop module parameters
•Module mode: The mode for the type of line being supported (DS/CLID, Global, Legacy).
•Disconnect Timer: Enter the time delay for disconnect supervision for lines supplying
supervised external lines. This setting must match the CO setting.
Configuring DTM-T1/E1 module parameters
•Clock Source: Determine how the module functions for timing on the network (Primary
External, Secondary External, Internal).
Networking Configuration Guide
84Chapter 6 Module configuration: Trunk modules
Warning: Changing the clock source may disconnect calls.
If you change the clock source for your system, you may cause your system DTM
interface(s) to reset, resulting in dropped calls. Choose a suitable time to change the clock
source and use the Page feature to inform users of possible service disruptions.
•CO fail: Use the carrier failure standard used by the service provider (TIA-5474, TR62411).
•Interface levels: Choose the loss plan setting supported on the lines (ISDN, PSTN).
•Framing: Choose the framing format supported by the service provider (ESF, SF).
•Internal CSU: Turn the internal channel on or off.
Warning: Disable the module before changing the internal CSU setting.
•CSU line build (Internal CSU set to ON): Set the gain level of the transmitted signal (0, 7.5,
15 dB)
•DSX1 build (Internal CSU set to OFF): Set the distance between the system hardware and the
external channel service unit (000-100, 100-200, 200-300, 300-400, 400-500, 500-600, or
600-700 feet)
•Line coding: Select the encoding signal used by the service provider (B8ZS, AMI)
•CRC4 (E1 lines only): Set the parameter to match the setting at the other end of the line.
Configuring DTM-PRI module parameters
•Protocol: Set to the protocol used by the CO.
Warning: Always confirm the line protocol with the head office. Failure to set the
correct protocol could result in erratic service or service failure on the lines.
•Protocol type (for SL-1): Select the setting that applies to the way in which the system is
viewed by the network. Default is User (Slave) (the CO or another network node controls the
network).
If you want this system to control the network protocol, select Network.
NN40020-603NN40020-603
Chapter 6 Module configuration: Trunk modules85
•NSF Extension: None (DMS-100/250 switches); WATS (Siemens, ESWD, Lucent 5ESS
switches); ALL (GTD5 and DMS-10 switches).
•B-channel selection sequence: choose how B-channel resources are selected for call
processing.
•Clock Source: Determine how the module functions for timing on the network (Primary
External, Secondary External, Internal)
Warning: Changing the clock source may disconnect calls.
If you change the clock source for your system, you may cause your system DTM
interface(s) to reset, resulting in dropped calls. Choose a suitable time to change the clock
source and use the Page feature to inform users of possible service disruptions.
•Send Name Display: select check box to activate outgoing name display (OLI).
•Remote Capability MWI (SL-1): Select the check box only if connecting to a Meridian 1, or
other compatible endpoint, with the appropriate MWI package and RCAP set to MWI.
•Maximum transits (SL-1): Default: 31. Set the number of times a call will be transferred
within the private network before being dropped.
•CO fail: Use the carrier failure standard used by the service provider (TIA-5474A, TR62411)
•Interface levels: Choose the loss plan setting supported on the lines (ISDN, PSTN)
•Framing: Choose the framing format supported by the service provider (ESF, SF)
•DSX1 build (Internal CSU set to OFF): Set the distance between the system hardware and the
external channel service unit (000-100, 100-200, 200-300, 300-400, 400-500, 500-600, or
600-700 feet)
Configuring BRI Loop module parameters
•Clock Source: Determine how the module functions for timing on the network (Primary
External, Secondary External, Internal). When the BRI module is configured as a T-loop this
parameter is configured under Configuration > Telephony > Loops.
Warning: Changing the clock source may disconnect calls.
If you change the clock source for your system, you may cause your system BRI S/T
interface(s) to reset, resulting in dropped calls. Choose a suitable time to change the clock
source and use the Page feature to inform users of possible service disruptions.
•Send Name Display (BRI-QSIG): select check box to activate outgoing name display (OLI).
When the BRI module is configured as a T-loop this parameter is configured under
Configuration > Telephony > Loops.
Networking Configuration Guide
86Chapter 6 Module configuration: Trunk modules
Configuring DASS2 module parameters
•Clock Source: Determine how the module functions for timing on the network (Primary
External, Secondary External, Internal)
Warning: Changing the clock source may disconnect calls.
If you change the clock source for your system, you may cause your system DTM
interface(s) to reset, resulting in dropped calls. Choose a suitable time to change the clock
source and use the Page feature to inform users of possible service disruptions.
Configuring European DTM/DPNSS line parameters
•Host node: Choose the type of switch the lines connect to, to ensure correct call forwarding
(M1, Embark, IDPX, DSM).
NN40020-603NN40020-603
Chapter 7
Managing modules
When you need to find out information about a module, you can determine the status of any of the
settings under the media bay module headings. To correct a problem or change a module setting,
you may need to enable or disable a bus/module or select ports on the module. Refer to the
following procedures:
•“Disabling or enabling a bus or module” on page 87
•“Disabling or enabling a port channel setting” on page 87
•“Trunk module metrics” on page 88
Disabling or enabling a bus or module
The following procedure describes the process for enabling or disabling a bus. This means that if
there is more than one module assigned to the DS30 bus, all modules will be disabled.
87
To enable or disable a bus
1Click Configuration > Resources > Telephony Resources > Modules panel, and then click
the module you wish to enable or disable.
2Click either Enable or Disable.
The system prompts you to confirm your request.
3Click OK.
Disabling or enabling a port channel setting
If you need to isolate a problem or block access from the module, you may need to turn off
individual port channels, rather than the entire module.
To turn a port channel on or off
1Click Configuration > Resources > Telephony Resources > Modules panel, and then click
the module supporting the port you want to enable/disable.
2Select the port you want to enable/disable in the Set Port Details tab.
3Click either the Enable or Disable button.
The State field indicates the mode of operation for the port, as shown in Figure 21. If the port
is enabled, this field shows unequipped unless a device is physically connected.
Networking Configuration Guide
88Chapter 7 Managing modules
Figure 21 Set Port Details
Note: A trunk media bay module has no changeable settings on the
Trunk Port Details record.
Trunk module metrics
To view the current status of the module trunks, you can use the Telephony Metrics – Trunk
Modules Metrics panel. See the Administration Guide (NN40020-600) for more information about
telephony metrics.
NN40020-603NN40020-603
Chapter 8
Lines overview
Telephony signals into the system, within the system, and out of the system are carried over
channels. For consistency, these channels are all called lines or trunks. This designation includes:
•circuit switched lines (PSTN): connect to the system through media bay modules
•Voice over IP (VoIP) trunks: connect through the LAN or IP network
•target lines, internal channels: connect PRI, T1 and VoIP trunks to specific devices
•intercom lines: connect all internal telephones together through the DN numbers, and allow
the user to access line pools for making outgoing calls, as well as being required for other call
features such as conference calling and system-wide call appearance (SWCA) calls. Intercom
designations are assigned in the DN record, or automatically by the system for each telephone.
Prerequisites
89
You must configure the media bay modules and/or the VoIP trunk parameters before you can set
up line programming.
•The position on the system bus of the trunk media bay modules determines the line numbers
that are available. See the Installation and Maintenance Guide (NN40020-302).
•The position on the system bus of the station media bay modules determines which DNs are
available, although DN numbers can be changed.
•Available VoIP lines are determined by the number of VoIP keycodes entered on the system
(between 01 and 12), starting with line 001 and ending at line 012.
See the following information:
•“Understanding how the system identifies lines” on page 90
•“Line record” on page 93
•“Line Job Aids” on page 94
Other line configuration options or requirements:
•BRI loops require configuration and provisioning before the BRI lines can be configured.
•The BCM50 does not support the DDIM (Digital Drop Insert MBM).
Networking Configuration Guide
90Chapter 8 Lines overview
Understanding how the system identifies lines
On a new system, lines and loops are numbered and assigned defaults based on the type of media
bay modules that have been connected to the system. The exception are the VoIP trunks, which
require a keycode to activate.
These panels allow you to easily view which lines have been enabled through a media bay module.
From this heading, you can access each line record and assign attributes, as you require.
Determining which lines you need to program
Under Lines, note that line types are divided into five headings. The fifth heading contains all line
numbers.
•“Active physical lines”
•“Active VoIP lines (require keycode)”
•“Target lines” on page 91
•Inactive Lines
•All Lines
Active physical lines
Lines 061-124 are reserved for physical lines.
Active VoIP lines (require keycode)
Voice over IP (VoIP) lines are signaling channels that simulate how CO lines work. However,
VoIP lines transmit data to the IP network over a LAN or IP network rather than over physical
lines. Once the VoIP trunks are set up, you can assign them to line pools, and program their
behavior in the same way you would PRI lines.
VoIP lines use line numbers 001 to 012. These line records appear under Configuration > Telephony > Lines > Active VoIP Lines. To access VoIP lines, you need to enter software
keycodes. Each keycode supports a specific number of lines. No entries appear in the Enabled
VoIP lines field until you complete the IP Trunks Settings field, which appears when you click IP
Trunks under Configuration > Resources > Telephony Resources > IP trunks.
VoIP trunks should be configured to use a single line pool per trunk type. Do not mix other trunk
types on the same line pool. The VoIP line pools are assigned to routes, which, in turn, are
configured with destination codes that route calls to the designated remote gateways of other BCM
systems or Succession, or MCS5100 systems.
You can also create a fallback for the trunk. This is a situation where the system reroutes the call to
a PSTN line pool if the primary route is not available or the call quality is not suitable. If you do
not configure your network for fallback and the call quality is below threshold, the IP call fails.
NN40020-603NN40020-603
Chapter 8 Lines overview91
Target lines
Target lines are internal communications paths that directly connect auto-answer trunks to system
telephones. These lines are incoming only.
Target lines allow you to make more efficient use of DID line resources.You can map a range of
target lines for each DID line. The incoming call is routed according to the mapped dialed digits,
rather than a one-to-one line assignment. Systems configured using the DID template
automatically assign target lines to all assigned DNs.
You also require target lines when you use PRI, T1 or VoIP trunks.
Target lines use line numbers 125 to 268. To view these lines, select Configuration > Telephony > Lines > Target Lines. Record this information in your system Programming Records so you
have a clear view of where each line is assigned.
Other features:
•Each target line can be assigned to more than one telephone.
•A telephone can have multiple appearances of a target line.
Target lines are internal direct links the BCM uses to allow external callers to dial specific system
telephones or a group of system telephones. You assign the target line to one or more telephone
DNs, and then configure the target line to function as you require. You can also assign multiple
appearances of a target line to one telephone. This allows more than one call to simultaneously use
the target line. Target lines are required by lines that support multiple numbers over one trunk (T1
E&M, DID trunks, T1 DID trunks, PRI trunks, and VoIP trunks).
Caution: Changing the received # length:
If you change the received # length for your system, the Public number entry for the
target lines will clear if the new received # length is less than the number entered in this
field.
If the new received # length has more digits than the number entered in this field, you need
to change the entry manually, if changes are required.
Programming note: The following trunks use one or both of these settings to route calls:
•DPNSS lines use the Private received number to route calls in the system.
•BRI ETSI-QSIG, PRI ETSI-QSIG, MCDN, DMS-100, DMS-250, and VoIP trunks route calls
on a per-call basis to either the public or private received digits.
Note: VoIP trunking MCDN calls do not support Auto DN/DISA DN
functionality.
•BRI (ETSI-Euro, NI), PRI (ETSI-Euro, NI, 4ESS), T1 (LoopStart, E&M, DID, GroundStart),
Analog LEC (LoopStart), and DASS2 trunks route calls using the Public received number.
Networking Configuration Guide
92Chapter 8 Lines overview
Physical lines
Physical lines are the central office (CO) trunks assigned to the trunk media bay modules. See the
Installation and Maintenance Guide (NN40020-302) for information about which lines are
enabled.
You can change the line types to suit your system. For instance, BRI and DTM modules can be
designated to a number of line types, depending on the type of line service provided through the
central office (CO). However, the line numbers are associated for specific tasks or to specific
DS30 bus numbers.
The line record allows you to program settings for lines that affect how the lines operate in the
network and with other switches, as well as how the system uses the line.
Trunk types:
•VoIP
•DTM (digital): TI types (Loop, E&M, DID, Ground, or fixed data channel), PRI, DASS2,
DPNSS.
•CTM (North America)/GATM: Analog Loop
•BRI: BRI S/T
•Target lines
BRI loops programming
The Loops panels define the loop numbers and loop attributes that correspond to the DIP switch
settings that were configured on the BRI trunk media bay modules installed on your system. Check
your Programming Record to see which modules are installed, and what settings were chosen.
Available BRI trunk loop attributes are determined by the country profile that is assigned to your
system. All profiles allow BRI programming; however, there is a difference between T1-based
profiles and for E1-based profiles.
Once loops are provisioned, the system assigns two line numbers per loop. These lines are then
programmed as you would any other lines.
You can program a loop to support either trunking services to the ISDN network, or terminal
services to one or more ISDN devices. The following sections describe the programming for each
type of loop. For complete module installation instructions and safety precautions, see the
Installation and Maintenance Guide (NN40020-302).
Programming links
Determine line assignments for routing: “Line Job Aids” on page 94.
NN40020-603NN40020-603
Line record
The line record allows you to:
•Identify the line and the features on the line.
•Assign restrictions for outgoing calls.
•Assign a voice message center, if the line connects to a remote voice-mail system, either on
another node on the private network or at the central office.
Line characteristics
Line type determines what features are available. Some features must be coordinated with the
settings at the other end of the line.
Programming links
Alternate-click the Line Assignment panel tab to see a list of the line feature settings, and to see
which lines have each setting.
Chapter 8 Lines overview93
Line restrictions
Restrictions prevent certain kinds of calls from occurring over specific lines. You can also restrict
some features.
If you want different restrictions to apply at different times of the day or week, you can set up the
line restriction schedules to that effect. The Normal schedule runs when no other schedule is
specified or if fallback is used for VoIP trunks.
The default restriction filters are listed in Table 9.
Table 9 Default restriction filters
ScheduleUse filterScheduleUse filter
Normal03Schedule 400
Schedule 1 (Night)21Schedule 500
Schedule 2 (Evening) 22Schedule 600
Schedule 3 (Lunch)23
Note: When a remote user places an external call on a line, any filters
used with the line still apply.
Networking Configuration Guide
94Chapter 8 Lines overview
Programming links
The template has a set of default restrictions in Restriction 02 only. You must create your own
restriction files if you want to use other settings.
Remote restrictions
Your system can accommodate users who call in from outside the system to access system
features. Calls coming in over the Private network that are routing out of the system to remote
systems or to the PSTN are also considered to be remote call-ins.
To restrict the access remote callers have, or to control outbound private network calls, specify the
appropriate filter for the line.
If you want different restrictions to apply at different times of the day or week, you can set up the
line restriction schedules to that effect. The Normal schedule runs when no other schedule is
specified or if fallback is used for VoIP trunks.
Note: The remote restriction restricts the numbers a user can dial on an
incoming auto-answer line. If a remote user then selects a line to place an
external call, any filter used with the line still applies.
Voice message center
If you subscribe to a voice message service outside your office, you can indicate to the line with
which voice message service to connect.
Voice message centers are defined as part of the system telephony global programming. This is
located in the Element Manager under Configuration > Applications > Voice Messaging/Contact Center.
Line Job Aids
See the following additional information:
•“Determining line numbers and destination codes” on page 95
•“Line pool tips” on page 96
NN40020-603NN40020-603
Chapter 8 Lines overview95
•“Using loss packages” on page 97
•“Turn Privacy on or off for a call” on page 98
Determining line numbers and destination codes
Refer to Table 11 for a list of lines assigned per bus (DS30 bus and offset), based on the module
type configured with that address. You can use this chart to note which lines should be active for
the modules you installed. You can also note which line pool you put the lines in, and note the line
pool access codes or routes and destination codes to which you assigned the line pools (or use your
programming records).
Follow these steps to use the table:
1For each bus number, circle the module you set to that number.
2Beside the module name, circle the group of line numbers appropriate for the offset you set on
the modules.
3In the Line pool column, indicate a line pool name if you want to associate lines into a pool.
This enables assigned telephones to grab any free line from the pool.
4On the far right column, list the access codes and routes associated with the lines.
Networking Configuration Guide
96Chapter 8 Lines overview
Table 11 Line numbering for modules and VoIP
DS30
bus
N/AVoIP trunks (no module) 001-048
3Integrated BRI loops (2) 061-064
05 /06Expansion 1
ISDN loops
07/08Expansion 2
Type of moduleLine/Loop numbers (default)Line
DID465-68
DID865-76
DTM (T1) 65-88
DTM (NA-PRI)65-87
DTM (E1 PRI) 65-94
BRI65-72
CTM4, GATM4 and
4X16
CTM8, GATM8, 8X16
(upper/lower)
BRI ST 365-380
DID495-98
DID895-106
65-68
65-68
73-76
pool
A-O/Bloc
Access codes
and routes
DTM (T1) 95-118
DTM (NA-PRI)95-117
DTM (E1 PRI)95-124
BRI
CTM4, GATM4 and
4X16
CTM8, GATM8, 8X16
(upper/lower)
ISDN loops
BRI ST 381-396
Line pool tips
Line pools are groups of lines. Pooling lines allows you to use fewer lines than there are users. PRI
lines and VoIP lines are always defined into line pools.
•Line pools must never contain a mixture of lines. All lines in a given line pool should go to the
same location.
NN40020-603NN40020-603
95-102
95-98
95-98
103-106
Chapter 8 Lines overview97
•Avoid putting unsupervised loop start lines in a line pool. These lines can become unusable,
especially when a remote user uses the line pool to make an external call.
•To assign line pool access to telephones, select Configuration > Telephony > Dialing Plan > Line Pools.
•To assign system-wide line pool access codes, select Configuration > Telephony > Dialing Plan > General (not applicable to Bloc pools).
•A telephone can be administered to search automatically for an idle line from several lines that
appear on the telephone. Assign a line pool as the prime line. When the user lifts the receiver
or presses Handsfree, any one of the lines, if idle, can be selected by Automatic Outgoing Line
selection.
•Changes in the settings for trunk type on a system that is in use can result in dropped calls.
•When assigning lines to line pools, consider your network configuration. You can create a
unified dialing plan by assigning lines to the same location to the same line pool on each of
your systems. For example, if system A and system B each have TIE lines to system C, assign
the TIE lines to pool D on each of the systems. You cannot assign target lines to a line pool, as
they are incoming-only.
Using loss packages
Use the loss package settings to select the appropriate loss/gain and impedance settings for each
line. The setting is based on the terminating switch type and the distance between BCM and the
terminating switch.
When measuring the distance from BCM to CO and from BCM to PBX systems, use 600 ohms as
the termination resistance setting.
Table 12 Loss package settings
Loss
Package
Short CO0 dB3 dBShortShort/<2 dB/BCM to CO
Medium CO0 dB0 dBTIA/EIA 464Medium/>2 dB and <6 dB/BCM to CO
Long CO-3 dB0 dBTIA/EIA 464Long/>6 dB/BCM to CO
Short PBX0 dB0 dBShortShort/<2 dB/BCM to PBX
Long PBX-3 dB0 dBTIA/EIA 464Long/>2 dB/BCM to PBX
A loss of 4 dB corresponds to a cable length of approximately 2700 m (9000 ft).
Receive
Loss
Transmit
Loss
ImpedanceDistance to switch/cable loss/terminating
switch
Note: Loss packages are not supported on the 4X16 combo.
Networking Configuration Guide
98Chapter 8 Lines overview
Turn Privacy on or off for a call
You can configure lines in your system to have automatic privacy. With a line not programmed
with privacy, anyone with the line assigned to their telephone can join your call by pressing the
line button. With a line programmed with privacy, one person at a time can use the line.
Use FEATURE83 to turn the Privacy feature off and on.
Privacy control cannot be used for internal or conference calls.
When another telephone joins a call, the participants on the call hear a tone, and a message appears
on the telephone display. It is not possible to join a call without everyone hearing this tone.
Note: The Auto privacy setting does not apply to target lines, PRI lines
or VoIP trunking lines.
Programming line access
There are a number of ways you can configure your lines. You can assign each line to one
telephone or several telephones, or a specific line to a specific telephone. You can also pool your
lines so that a number of telephones have access to several lines.
See the following information:
•“Making lines available” on page 98
•“Incoming calls” on page 99
•“Outgoing calls” on page 99
Making lines available
•You can determine whether a line will be assigned solely to one telephone, or if a group of
users will have access to the line.
•Even when you use line pools, it is possible that a line pool will be unavailable for outgoing
traffic. To alleviate this, you can determine overflow paths for any routes that you designate.
•Incoming lines can be assigned to telephones as individual lines or through target lines,
depending on the type of trunk supplied from the central office (CO). Incoming lines do not
need to have an appearance on the telephone. Target lines are for incoming calls only.
Two-way single lines, such as analog lines, allow the user to make an outgoing call by pressing
the (idle) assigned line button or, if the line is part of a line pool, by entering a line pool access
code or destination code to access the line pool. These lines can also be redirected on a
per-trunk basis through Element Manager or from the telephone by using FEATURE 84.
•PRI lines are always configured into line pools. These lines require a destination code for
outgoing calls. Incoming calls use target line assignments.
NN40020-603NN40020-603
Chapter 8 Lines overview99
•Voice over IP (VoIP) trunks use the data network to provide line service in and out of the
system. VoIP trunk configuration is described in the. VoIP trunks use target lines for incoming
calls, and require line pool codes or destination codes for outgoing calls.
•You can assign a line a maximum of 93 times.
Incoming calls
For incoming calls, you can have a central answering position, or you can specify lines to one or
more telephones to receive directed calling.
You can arrange your telephones in Hunt groups, ringing groups, or call groups that use
system-wide call appearance (SWCA) assignments to share calls.
You can also configure lines for use by system users who call in from outside the system. You can
give them direct access to the system with an Auto DN, or you can configure the line so they hear
a stuttered dial tone, at which point they need to enter a password (CoS) to gain access
(DISA DN).
Outgoing calls
For outgoing calls, you can assign one or more intercom keys to access a line pool or prime line,
destination code, or internal system numbers to direct the call. Telephones without intercom keys
do require intercom paths assigned, but to access calls, users must pick up the handset to connect.
For calls within the system, all telephones are virtually linked within the system. To call another
telephone inside the system, you can lift the handset and dial the local DN. In this case, the prime
line must be set to intercom.
For calls going outside the system:
•If you assign the prime line to a line pool — When you pick up the handset, the telephone
automatically grabs the first available line from the assigned line pool. In this configuration,
you must ensure that the outgoing number is allowed by the line pool.
•If you assign the prime line to an intercom button — You can enter a line pool access code or a
destination code followed by the telephone number to direct the outgoing call where it exits
the system on any available line in that pool.
Networking Configuration Guide
100Chapter 8 Lines overview
NN40020-603NN40020-603
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.