All rights reserved. November 2005
The information in this document is subject to change without notice. The statements,
configurations, technical data, and recommendations in this document are believed to be
accurate and reliable, but are presented without express or implied warranty. Users must take
full responsibility for their applications of any products specified in this document. The
information in this document is proprietary to Nortel Networks Inc.
The software described in this document is furnished under a lice nse agreement and may be
used only in accordance with the terms of that license.
Trademarks
Nortel, the Nortel logo, the Globemark, Unified Networks, PASSPORT and BayStack are
trademarks of Nortel Networks.
Adobe and Acrobat Reader are trademarks of Adobe Systems Incorporate.
All other Trademarks are the property of their respective owners.
Technical Configuration Guide for: BCM50 to CS2K V2.0 November, 2005
Abstract
The proliferation of VoIP technologies and the subsequent interconnect of Nortel’s Enterprise and
Carrier networks, requires the dissemination of detailed concepts and configuration information.
This document describes the setup of a converged Carrier / Enterprise service consisting of PBX
hosted subscribers that can leverage the wealth of services offered by the IP Telco Network.
Target Audience
This document is intended for an informed audience of Nortel Networks Sales Engineers,
Deployment Primes, Installation personnel, and especially Customers.
Acknowledgements
This Configuration Guide is the product of numerous individuals and teams who have
demonstrated the very best in teamwork, innovation, and integrity. The authors wish to extend
their personal appreciation for their talented effort.
Technical Configuration Guide for: BCM50 to CS2K V2.0 November, 2005
1. Introduction
The coupling of Nortel’ Succession Solution with the Business Communication Manager (BCM)
has proven to be a significant step forward in the convergence of Enterprise and Carrier
Networks.
It is fully anticipated that the addition of CS2K Gatekeeper functionality will result in a new specter
of service offerings, and interconnect scenarios, to the Enterprise. This guide details the setup of
a field deployable solution.
The nuts and bolts of the architecture are the workings of the IP domain that binds the BCM to
the CS2K (see Figure 2: Detailed Network Diagram). This new coupling of the traditional Carrier
and Enterprise environments will require that SEs and Partners have a basic understanding of the
components within this hybrid topology.
Technical Configuration Guide for: BCM50 to CS2K V2.0 November, 2005
CS2K
MS
ENET
LTC
LCME
Set C
TDM
Phone
613-234-4025
10.102.40.8
Interwork
SPM
GWC
(Gatekeeper)
10.102.40.60
10.102.40.13
BCM_M50
10.102.40.108
613-235-4353
IP
10.102.40.110
613-236-4353
BCM2_M50
Figure 2: Detailed Network Diagram
Set A
i2004
10.102.40.109
Extension 353
Target Line 126
Set B
i2004
10.102.40.112
Extension 353
Target Line 127
From the Enterprise, Succession’s CS2K will appear as a Gatekeeper in the IP space; and as
such will require minimum programming to interoperate correctly. However, the challenge for SEs
will rest with the design, implementation, and understanding of the carrier portion of the network.
The CS2K will view the BCM as a call processing destination, defined in terms of Directory
Numbers (DN), virtual trunks, and gateway endpoints. Detailed examples of these entities are
available in the following chapters of this document
.
1.2 Availability and Ordering
This solution applies to the following Generally Available (GA) software streams:
• BCM50 Release 1
•
SN07, ISN07, SN08, and ISN08
1.3 Use Case
Within this document, a simple office-code translation plan will be used as a reference framework.
From
Figure 2: Detailed Network Diagram
550; a VoIP Trunk access code of 9 will be used on the BCMs. From the above diagram, here are
a few examples of dialing sequences:
• A (BCM_M50) calls B (BCM2_M50) via the CS2K, A dials: 9-550-236-4353
• B (BCM2_M50) call A (BCM_M50) via the CS2K, B dials: 9-550-235-4353
• A calls C (CS2K analogue line), A dials: 9-234-4025
Technical Configuration Guide for: BCM50 to CS2K V2.0 November, 2005
2. CS2K Setup
It should be clearly understood by the reader that the design and implementation of translations is
customer specific. What is contained herein is one way of accomplishing the objective; there are
other methods which are equally effective.
To simplify the vulgarization of the concepts within, a North American ISDN PRI context was
selected. This does not limit this solution to that signaling context; it does work with other PRI
variants.
2.1 Software Optionality Control (SOC)
It is critical that the CS2K have the H.323 Gatekeeper functionality activated. For further
information on the SOC, please consult NTP 297-8991-901 (www.nortel.com); customers may
purchase software activation codes from authorized Nortel Sales Representatives.
For the H.323 Gatekeeper, please ensure that CS2B0004 is enabled. Firstly, you need to unlock
the SOC by assigning a limit; this will also set the right to use flag:
•assign limit 100 <license key #1> to CS2B0004
Secondly, activation is accomplished by setting the state. This requires a second license key:
• assign state on <license key #2> to CS2B0004
When completed, the CS2B004 option should appear as follows:
>soc
SOC:
OPTION NAME RTU STATE USAGE LIMIT UNITS LAST_CHG
CS2B0004 H323 Gatekeeper Y ON 8 100 1VC 05/01/20
2.2 Trunking
The CS2K needs to have unique addressable connection paths on which it may route calls to
each BCM. These are referred to as trunk members within a group. They are defined in the
following order through the tables.
2.2.1 TABLE: CLLI
The Common Language Location Identifier, or CLLI, is the route of the trunk group datafill. In this
example, the CLLI BCM_M50 is associated to an administrator.
Designing CallP translations requires training and experience. The text of this section
provides enough information to permit qualified personnel to complete the task. It is not a
replacement for adequate training; please do not attempt unless properly qualified to do
so.
The trunk group has been defined as an ISDN PRI, so the next step is to define a set of
rudimentary translations to be able to route the calls to and from the BCM. For this,
• a “type” of translation is defined in XLAPLAN
• an office route in table OFRT
• association between the dialed digits and the office routes in HNPACONT and its sub
tables
•and finally, the ISDN specifics in “LT” family (ISDN Logical Terminal) of tables
---------------------------------------------------------------613 Y 1023 0 (237) (1) (0) (0) $
2.3.3.1 SUB RTEREF
RTE RTELIST
----------55 (T OFRT 550) $
RET
613 Y 1023 0 (237) (1) (0) (0) $
2.3.3.2 SUB HNPACODE
FROMDIGS TODIGS CDRRTMT
----------------------235 235 LRTE 55
RET
613 Y 1023 0 (237) (1) (0) (0) $
2.3.4 TABLE LTDEF
Is the Logical Terminal (LT) definition table; it defines logical terminals and access
privileges. It also specifies an LTID and access privileges for the PRI trunk group.
Technical Configuration Guide for: BCM50 to CS2K V2.0 November, 2005
ISDN 550 B PRA 47 NTNAPRI V1 NIL (NOPMD ) $
2.3.5 TABLE LTDATA
The logical terminal data table stores service-related data associated with the logical
terminal identifier (LTID), field LTDKEY, which is the key to this table.
LTDKEY LTDRSLT
-------------ISDN 550 SERV SERV Y Y ALWAYS ALWAYS (PRI_IP_PROT H323) $
2.3.6 TABLE LTCALLS
Logical terminal calls table. It specifies the types of calls that can route over each PRI
trunk group. This table defines the first translations for each trunk group and call type.
Succession CS2K Solution supports both 10 and 20 millisecond (ms) rates; what is critical is that
all components bet set to the same value. Care must be taken to ensure that the IW-SPM and the
GWC are set to the same rate as the CS2K and the BCM.
The IW-SPM, required for interwork with locally hosted legacy lines, is set as follows for 20 ms:
TABLE MNIPPARM
Technical Configuration Guide for: BCM50 to CS2K V2.0 November, 2005
Please see 4.4
Configuring Voice Network Settings
for information on the GWC packetization
setup.
2.5 ETSI PRI Trunks & Overlap Signaling
There are two types of signaling associated with ISDN PRI: ENBLOC and OVERLAP. Both
pertain to the method in which digits are forwarded, first refers to the method when all digits are
sent at one time and the latter where they are forwarded in multiple messages. Unused in North
America, overlap is quite common in the remainder of the world.
There are a few key points that should be highlighted to ensure simple operation of a BCM
connected to an overlap aware network:
•In general BCMs, who do not support overlap signaling, can interoperate with PRI
overlap signaling provided all digits are contained within the H.323 setup message.
•Future CS2K releases intend to incorporate PRI variant checking to ensure that H.323
trunk groups destined to BCMs will not support overlap signaling.
2.5.1 Problem Identification
The BCM will reject H.225 setup messages that contain the “canOverlapSend” flag set to “True”,
see highlight box inError! Reference source not found.