Huawei IAD108A, IAD108E, IAD108V User Manual

Chapter 1 System Overview 1-1.......................
1.1 Introduction to Product 1-1.......................
1.2 Service Functions 1-3...............................
1.3 System Structure 1-4................................
1.3.1 Hardware Structure 1-4....................
1.3.2 Software Structure 1-5.....................
Chapter 2 Installing Hardware 2-1....................
2.1 Installation Requirements 2-1...................
2.1.2 Requirements for Installation
Environment 2-2........................................
2.1.3 Requirements for
2.1.4 Tools and Meters 2-3.......................
2.2 Installing Hardware 2-4............................
2.2.1 Putting IAD108 on Desktop 2-4.......
2.2.2 Connecting Serial Port Cable 2-4....
2.2.3 Connecting Uplink Cable 2-6...........
2.2.4 Connecting the Cable on User
Side 2-8.....................................................
2.2.5 Connecting Power Cable 2-9...........
Chapter 3 Loading Software 3-1.......................
3.1 Setting up Configuration
Environment for Loading 3-1..........................
3.1.1 Setting up Configuration Environment for Loading through
Local Serial Port 3-1.................................
3.1.2 Setting up the Environment
for Loading through Telnet 3-8..................
3.2 Updating Software 3-10..............................
3.2.1 Configuring TFTP Server 3-10...........
3.3 Loading Software 3-17...............................
3.3.1 BIOS Mode 3-17................................
3.3.2 Command Line Loading Mode 3-28...
Chapter 4 Configuring Data 4-1........................
4.1 Preparations Before Configuration 4-1.....
4.1.1 Collecting Data 4-1..........................
4.1.2 Login Environment 4-3.....................
4.2 Basic Commands 4-7...............................
4.2.1 Command Modes 4-8......................
4.2.2 Usually Use Commands 4-10............
4.2.3 Examples 4-11...................................
4.3 Process of Data Configuration 4-12...........
4.4 Configuring Basic Data of the
Equipment 4-13................................................
4.4.1 Task List 4-13....................................
4.4.2 Configuring the Data of This
Equipment 4-15...........................................
4.4.3 Configuring IP Address of
IAD108 4-19................................................
4.4.4 Configuring System Time of
IAD108 4-25................................................
4.4.5 Starting DNS Client 4-28....................
4.4.6 Adding IADMS 4-29...........................
4.5 Configuring MG Data 4-33.........................
4.5.1 Task List 4-33....................................
4.5.2 Configuring MG Registration
Information 4-33..........................................
4.5.3 Configuring MG Attribute 4-35...........
4.6 Configuring Voice User Data 4-39..............
4.6.1 Configuring Ordinary Voice
User 4-40....................................................
4.6.2 Configuring SPC Service 4-45...........
4.7 Configuration Examples of IAD108 4-51....
4.7.1 Description of Networking 4-51..........
4.7.2 Collecting Data 4-53..........................
4.7.3 Configuring Basic Information
of IAD108 4-54............................................
4.7.4 Configuring MG Attribute Data 4-56...
4.7.5 Configuring Voice User Data 4-58.....
4.7.6 Saving Configuration Data 4-61.........
Chapter 5 Advanced Configuration 5-1...........
5.1 Configuring Common Attributes of
Access User 5-1.............................................
5.1.1 Configuring Ringing Mapping
Record 5-1................................................
5.1.2 Configuring PSTN Port
Attribute 5-3..............................................
5.2 Configuring Parameters of Built- In
LAN Switch 5-8...............................................
5.2.1 Configuring Precedence of
Voice Packets 5-9.....................................
5.2.2 Other Configurations of LAN
Switch 5-14.................................................
5.3 Configuring Software Parameters 5-18......
5.3.1 Configuring System Software
Parameters 5-18.........................................
5.3.2 Configuring MG Software
Parameters 5-22.........................................
5.4 Configuring Standby MGC 5-24.................
5.5 Configuring MGCP Parameters 5-26.........
Chapter 6 ADSL Service Configuration 6-1.....
6.1 Creating Configuration
Environment 6-1.............................................
6.1.1 CSP Hardware Version 6-1..............
6.1.2 ADSL Subboard 6-2.........................
6.1.3 Connecting Uplink Interface 6-6.......
6.1.4 Connecting Downlink
Interface 6-6..............................................
6.1.5 Example of Configuration
Environment 6-7........................................
6.2 ADSL Configuration Commands 6-8........
6.2.1 ATM Related Commands 6-9..........
6.2.2 PPP Related Commands 6-10...........
6.2.3 EoA Related Commands 6-11...........
6.2.4 Bridging Related 6-11........................
6.3 Bridging Mode 6-12....................................
6.3.1 Introduction to Bridging
Principles 6-12............................................
6.3.2 Networking Examples 6-13................
6.3.3 Configuration Procedures 6-15..........
Chapter 7 Maintaining System 7-1...................
7.1 System Management 7-1.........................
7.1.1 Saving Data 7-1...............................
7.1.2 Rebooting the System 7-2...............
7.1.3 Showing CPU Occupancy 7-3.........
7.1.4 Showing System Date and
Time 7-3....................................................
7.1.5 Showing Version Information 7-4.....
7.1.6 Controlling the Information
Output to the Terminals 7-5......................
7.2 Access Service Management 7-11.............
7.2.1 Starting/Terminating Access
Service 7-11................................................
7.2.2 Resetting Access User Port 7-13.......
7.2.3 Showing Port Status 7-13..................
7.2.4 Showing Access User Data 7-14.......
7.2.5 Sending On-hook Signals to
Console 7-15...............................................
7.3 Operator Management 7-16.......................
7.3.1 Adding/Deleting Operator 7-17..........
7.3.2 Setting Operator Authority 7-19.........
7.3.3 Changing Operator’s
Password 7-20............................................
7.3.4 Setting Reenter Number 7-21............
7.3.5 Setting Operator’s Appendix
Information 7-22..........................................
7.3.6 Showing Operator’s
Information 7-23..........................................
7.3.7 Disconnecting Login Operator 7-25...
7.4 Management of Operation Log 7-25..........
7.4.1 Adding Log host 7-27.........................
7.4.2 Deleting Log Host 7-28......................
7.4.3 Activating Log Host 7-28....................
7.4.4 Deactivating Log Host 7-31................
7.4.5 Showing Operation Log
Information 7-33..........................................
7.4.6 Showing Operation Log List 7-34.......
7.4.7 Showing Log Host
Configurations 7-37.....................................
7.4.8 Setting Information Output
Control Switch of Log Host 7-38.................
7.4.9 Setting Information Output
Control Level of Log Host 7-40...................
7.4.10 Querying Information Output
Control Switch of Log Host 7-42.................
7.4.11 Showing Information Output
Control Level of Log Host 7-43...................
7.5 Alarm Management 7-44............................
7.5.1 Description of Common Alarm
Attributes 7-44.............................................
7.5.2 Alarm Management Task 7-46...........
7.5.3 Showing Alarm Records 7-47............
7.5.4 Showing Alarm Configuration
Information 7-52..........................................
7.5.5 Setting Alarm Output to
Command Line Terminal 7-52....................
7.6 Setting RTCP Alarm Threshold 7-56..........
7.7 Patch Management 7-58............................
7.7.1 Overview of Patch 7-58......................
7.7.2 Steps of Operating Patches 7-59.......
7.8 Network Test Tools 7-60............................
7.8.1 ping 7-60............................................
7.8.2 tracert 7-62.........................................
7.8.3 Example for Command Ping 7-63......
7.8.4 Example for Command tracert 7-66...
Chapter 8 Troubleshooting 8-1.........................
8.1 Common Fault- locating Means 8-1.........
8.1.1 Showing Important System
Information 8-1..........................................
8.1.2 Showing Alarms 8-5.........................
8.1.3 Capturing Network Packets 8-7.......
8.1.4 Tracing Signaling 8-7.......................
8.2 IAD Port ID Error Leads to Call
Failure. 8-8.....................................................
8.2.1 Symptom Description 8-8.................
8.2.2 Causal Analysis 8-8.........................
8.2.3 Processing Procedure 8-9...............
8.2.4 Suggestion and Summary 8-10.........
8.3 Echo Occurs in PSTN Calls. 8-11..............
8.3.1 Fault 8-11...........................................
8.3.2 Cause 8-11........................................
8.3.3 Processing Procedure 8-12...............
8.4 Call Fails After Telephone Ringing 8-12.....
8.4.1 Fault 8-12...........................................
8.4.2 Cause 8-12........................................
8.4.3 Processing Procedure 8-13...............
8.5 Monolog 8-14.............................................
8.5.1 Fault 8-14...........................................
8.5.2 Cause 8-14........................................
8.5.3 Processing Procedure 8-14...............
8.6 Voice Quality Deterioration 8-15................
8.6.1 Fault 8-15...........................................
8.6.2 Cause 8-15........................................
8.6.3 Processing Procedure 8-16...............
8.6.4 Suggestion and Summary 8-16.........
8.7 IAD Echo 8-16............................................
8.7.1 Fault 8-16...........................................
8.7.2 Cause 8-17........................................
8.7.3 Processing Procedure 8-17...............
8.8 Voice Abnormality 8-19..............................
8.8.1 Fault 8-19...........................................
8.8.2 Cause 8-19........................................
8.8.3 Processing Procedure 8-20...............
Appendix A Command List A-1.........................
Appendix B Acronyms B-1................................
HUAWEI
U-SYS IAD108 Integrated Access Device
User Manual
V200R002
U-SYS IAD108 Integrated Access Device
User Manual
Manual Version
Product Version
BOM
T2-010131-20041015-C-2.20
V200R002
31013731
Huawei Technologies Co., Ltd. provides customers with
comprehensive technical support and service. Please feel free to
contact our local office or company headquarters.
Huawei Technologies Co., Ltd.
Add r e s s : Administration Building, Huawei Technologies Co., Ltd.,
Bantian, Longgang District, Shenzhen, P. R. China
Postal Code: 518129
Website:
http://www.huawei.com
Email: support@huawei.com
Copyright © 2004 Huawei Technologies Co., Ltd.
All Rights Reserved
No part of this manual may be reproduced or transmitted in any form
or by any means without prior written consent of Huawei Technologies
Co., Ltd.
Trademarks
, HUAWEI, C&C08, EAST8000, HONET, , ViewPoint, INtess,
ETS, DMC, TELLIN, InfoLink, Netkey, Quidway, SYNLOCK, Radium,
M900/M1800, TELESIGHT, Quidview, Musa, Airbridge, Tellwin,
Inmedia, VRP, DOPRA, iTELLIN, HUAWEI OptiX, C&C08 iNET,
NETENGINE, OptiX, iSite, U-SYS, iMUSE, OpenEye, Lansway,
SmartAX, infoX, TopEng are trademarks of Huawei Technologies Co.,
Ltd.
All other trademarks mentioned in this manual are the property of their
respective holders.
Notice
The information in this manual is subject to change without notice.
Every effort has been made in the preparation of this manual to ensure
accuracy of the contents, but all statements, information, and
recommendations in this manual do not constitute the warranty of any
kind, express or implied.

About This Manual

Release Notes
The product version that corresponds to the manual is U-SYS IAD108
Integrated Access Device V200R002.
Organization
The manual introduces the functions and operations of the U-SYS
IAD108 Integrated Access Device.
There are 8 chapters and 2 appendixes in the manual.
Chapter 1 System Overview profiles the system characteristics,
main functions, system structure, and external interfaces of the
IAD108.
Chapter 2 Installing Hardware introduces how to install the
hardware of IAD108.
Chapter 3 Loading Software elaborates on the establishing of
configuration environment and how to load the software.
Chapter 4 Configuring Data presents how to configure various data
needed for providing various services.
Chapter 5 Advanced Configuration introduces various advanced
configurations related to IAD108 when cooperating with other devices.
Chapter 6 ADSL Service Configuration introduces how to configure
ADSL services.
Chapter 7 Maintaining System introduces how to maintain the
system.
Chapter 8 Troubleshooting introduces how to locate and remove the
faults of the system.
Appendix A Command List lists all the commands used for
configuring IAD108 in alphabetic order.
Appendix B Acronyms lists all the acronyms appeared in the
manual.
Intended Audience
The manual is intended for the following readers:
Installation engineers and technicians
z
Operation and maintenance personnel
z
Conventions
The manual uses the following conventions:
I. General conventions
Convention Description
Arial Normal paragraphs are in
Arial Narrow
Warnings, Cautions, Notes and Tips are in Arial Narrow.
Arial
.
Boldface Headings are in Boldface.
Courier New
Terminal Display is in Courier New.
II. Command conventions
Convention Description
Boldface The keywords of a command line are in Boldface.
italic Command arguments are in italic.
[ ]
{ x | y | ... }
[ x | y | ... ]
{ x | y | ... } *
[ x | y | ... ] *
Items (keywords or arguments) in square brackets [ ] are optional.
Alternative items are grouped in braces and separated by vertical bars. One is selected.
Optional alternative items are grouped in square brackets and separated by vertical bars. One or none is selected.
Alternative items are grouped in braces and separated by vertical bars. A minimum of one or a maximum of all can be selected.
Optional alternative items are grouped in square brackets and separated by vertical bars. Many or none can be selected.
III. GUI conventions
Convention Description
< >
[ ]
Button names are inside angle brackets. For example, click the <OK> button.
Window names, menu items, data table and field
Convention Description
names are inside square brackets. For example, pop up the [New User] window.
/
Multi-level menus are separated by forward slashes. For example, [File/Create/Folder].
IV. Keyboard operation
Format Description
Press the key with the key name inside angle
<Key>
<Key1+Key2>
<Key1, Key2>
brackets. For example, <Enter>, <Tab>, <Backspace>, or <A>.
Press the keys concurrently. For example, <Ctrl+Alt+A> means the three keys should be pressed concurrently.
Press the keys in turn. For example, <Alt, A> means the two keys should be pressed in turn.
V. Mouse operation
Action Description
Click
Double Click Press the left button twice continuously and quickly.
Drag
Press the left button or right button quickly (left button by default).
Press and hold the left button and drag it to a certain position.
VI. Symbols
Eye-catching symbols are also used in this manual to highlight the
points worthy of special attention during the operation. They are
defined as follows:
Caution, Warning, Danger: Means reader be extremely careful
during the operation.
Note, Comment, Tip, Knowhow, Thought: Means a
complementary description.
Environmental Protection
This product has been designed to comply with the requirements on
environmental protection. For the proper storage, use and disposal of
this product, national laws and regulations must be observed.
User Manual U-SYS IAD108 Integrated Access Device Table of Contents
Table of Contents
Chapter 1 System Overview .........................................................1-1
1.1 Introduction to Product.......................................................1-1
1.2 Service Functions............................................................... 1-3
1.3 System Structure................................................................1-4
1.3.1 Hardware Structure .................................................1-4
1.3.2 Software Structure...................................................1-5
Chapter 2 Installing Hardware ......................................................2-1
2.1 Installation Requirements ..................................................2-1
2.1.1 Attentions in Installation ..........................................2-1
2.1.2 Requirements for Installation Environment .............2-2
2.1.3 Requirements for Electromagnetic Environment.....2-2
2.1.4 Tools and Meters ..................................................... 2-3
2.2 Installing Hardware ............................................................2-4
2.2.1 Putting IAD108 on Desktop .....................................2-4
2.2.2 Connecting Serial Port Cable ..................................2-4
2.2.3 Connecting Uplink Cable.........................................2-6
2.2.4 Connecting the Cable on User Side ........................2-8
2.2.5 Connecting Power Cable.........................................2-9
Chapter 3 Loading Software ......................................................... 3-1
3.1 Setting up Configuration Environment for Loading ............3-1
3.1.1 Setting up Configuration Environment for Loading
through Local Serial Port .................................................. 3-1
3.1.2 Setting up the Environment for Loading through Telnet
..........................................................................................3-8
i
User Manual U-SYS IAD108 Integrated Access Device Table of Contents
3.2 Updating Software............................................................3-10
3.2.1 Configuring TFTP Server ......................................3-10
3.2.2 Configuring FTP Server......................................... 3-13
3.3 Loading Software .............................................................3-17
3.3.1 BIOS Mode ............................................................3-17
3.3.2 Command Line Loading Mode ..............................3-28
Chapter 4 Configuring Data .......................................................... 4-1
4.1 Preparations Before Configuration..................................... 4-1
4.1.1 Collecting Data ........................................................4-1
4.1.2 Login Environment...................................................4-3
4.2 Basic Commands ...............................................................4-7
4.2.1 Command Modes ....................................................4-8
4.2.2 Usually Use Commands........................................4-10
4.2.3 Examples ............................................................... 4-11
4.3 Process of Data Configuration .........................................4-12
4.4 Configuring Basic Data of the Equipment ........................4-13
4.4.1 Task List ................................................................4-13
4.4.2 Configuring the Data of This Equipment ............... 4-15
4.4.3 Configuring IP Address of IAD108 ........................4-19
4.4.4 Configuring System Time of IAD108 .....................4-25
4.4.5 Starting DNS Client ...............................................4-28
4.4.6 Adding IADMS .......................................................4-29
4.5 Configuring MG Data .......................................................4-33
4.5.1 Task List ................................................................4-33
4.5.2 Configuring MG Registration Information ..............4-33
4.5.3 Configuring MG Attribute.......................................4-35
4.6 Configuring Voice User Data ...........................................4-39
4.6.1 Configuring Ordinary Voice User........................... 4-40
4.6.2 Configuring SPC Service....................................... 4-45
ii
User Manual U-SYS IAD108 Integrated Access Device Table of Contents
4.7 Configuration Examples of IAD108 ..................................4-51
4.7.1 Description of Networking .....................................4-51
4.7.2 Collecting Data ......................................................4-53
4.7.3 Configuring Basic Information of IAD108 ..............4-54
4.7.4 Configuring MG Attribute Data ..............................4-56
4.7.5 Configuring Voice User Data.................................4-58
4.7.6 Saving Configuration Data ....................................4-61
Chapter 5 Advanced Configuration .............................................5-1
5.1 Configuring Common Attributes of Access User ...............5-1
5.1.1 Configuring Ringing Mapping Record .....................5-1
5.1.2 Configuring PSTN Port Attribute .............................5-3
5.2 Configuring Parameters of Built-In LAN Switch .................5-8
5.2.1 Configuring Precedence of Voice Packets..............5-9
5.2.2 Other Configurations of LAN Switch...................... 5-14
5.3 Configuring Software Parameters .................................... 5-18
5.3.1 Configuring System Software Parameters ............ 5-18
5.3.2 Configuring MG Software Parameters ..................5-22
5.4 Configuring Standby MGC ............................................... 5-24
5.5 Configuring MGCP Parameters .......................................5-26
Chapter 6 ADSL Service Configuration ....................................... 6-1
6.1 Creating Configuration Environment..................................6-1
6.1.1 CSP Hardware Version ...........................................6-1
6.1.2 ADSL Subboard.......................................................6-2
6.1.3 Connecting Uplink Interface .................................... 6-6
6.1.4 Connecting Downlink Interface................................6-6
6.1.5 Example of Configuration Environment...................6-7
6.2 ADSL Configuration Commands........................................6-8
6.2.1 ATM Related Commands ........................................6-9
6.2.2 PPP Related Commands ......................................6-10
iii
User Manual U-SYS IAD108 Integrated Access Device Table of Contents
6.2.3 EoA Related Commands.......................................6-11
6.2.4 Bridging Related ....................................................6-11
6.3 Bridging Mode ..................................................................6-12
6.3.1 Introduction to Bridging Principles.........................6-12
6.3.2 Networking Examples............................................ 6-13
6.3.3 Configuration Procedures......................................6-15
6.3.4 Configuration Examples ........................................6-16
Chapter 7 Maintaining System .....................................................7-1
7.1 System Management ......................................................... 7-1
7.1.1 Saving Data .............................................................7-1
7.1.2 Rebooting the System .............................................7-2
7.1.3 Showing CPU Occupancy .......................................7-3
7.1.4 Showing System Date and Time .............................7-3
7.1.5 Showing Version Information ..................................7-4
7.1.6 Controlling the Information Output to the Terminals7-5
7.2 Access Service Management ..........................................7-11
7.2.1 Starting/Terminating Access Service ....................7-11
7.2.2 Resetting Access User Port ..................................7-13
7.2.3 Showing Port Status ..............................................7-13
7.2.4 Showing Access User Data...................................7-14
7.2.5 Sending On-hook Signals to Console ...................7-15
7.3 Operator Management .....................................................7-16
7.3.1 Adding/Deleting Operator......................................7-17
7.3.2 Setting Operator Authority.....................................7-19
7.3.3 Changing Operator’s Password ............................7-20
7.3.4 Setting Reenter Number........................................ 7-21
7.3.5 Setting Operator’s Appendix Information ..............7-22
7.3.6 Showing Operator’s Information............................7-23
7.3.7 Disconnecting Login Operator...............................7-25
iv
User Manual U-SYS IAD108 Integrated Access Device Table of Contents
7.4 Management of Operation Log ........................................ 7-25
7.4.1 Adding Log host.....................................................7-27
7.4.2 Deleting Log Host ..................................................7-28
7.4.3 Activating Log Host................................................7-28
7.4.4 Deactivating Log Host ...........................................7-31
7.4.5 Showing Operation Log Information......................7-33
7.4.6 Showing Operation Log List ..................................7-34
7.4.7 Showing Log Host Configurations .........................7-37
7.4.8 Setting Information Output Control Switch of Log Host7-38
7.4.9 Setting Information Output Control Level of Log Host7-40
7.4.10 Querying Information Output Control Switch of Log
Host ................................................................................7-42
7.4.11 Showing Information Output Control Level of Log
Host ................................................................................7-43
7.5 Alarm Management..........................................................7-44
7.5.1 Description of Common Alarm Attributes ..............7-44
7.5.2 Alarm Management Task ......................................7-46
7.5.3 Showing Alarm Records........................................7-47
7.5.4 Showing Alarm Configuration Information.............7-52
7.5.5 Setting Alarm Output to Command Line Terminal 7-52
7.6 Setting RTCP Alarm Threshold........................................ 7-56
7.7 Patch Management ..........................................................7-58
7.7.1 Overview of Patch .................................................7-58
7.7.2 Steps of Operating Patches ..................................7-59
7.8 Network Test Tools ..........................................................7-60
7.8.1 ping ........................................................................ 7-60
7.8.2 tracert ....................................................................7-62
7.8.3 Example for Command Ping .................................7-63
7.8.4 Example for Command tracert ..............................7-66
v
User Manual U-SYS IAD108 Integrated Access Device Table of Contents
Chapter 8 Troubleshooting...........................................................8-1
8.1 Common Fault-locating Means ..........................................8-1
8.1.1 Showing Important System Information ..................8-1
8.1.2 Showing Alarms.......................................................8-5
8.1.3 Capturing Network Packets.....................................8-7
8.1.4 Tracing Signaling ..................................................... 8-7
8.2 IAD Port ID Error Leads to Call Failure..............................8-8
8.2.1 Symptom Description ..............................................8-8
8.2.2 Causal Analysis .......................................................8-8
8.2.3 Processing Procedure .............................................8-9
8.2.4 Suggestion and Summary .....................................8-10
8.3 Echo Occurs in PSTN Calls. ............................................8-11
8.3.1 Fault....................................................................... 8-11
8.3.2 Cause ....................................................................8-11
8.3.3 Processing Procedure ...........................................8-12
8.4 Call Fails After Telephone Ringing ..................................8-12
8.4.1 Fault....................................................................... 8-12
8.4.2 Cause ....................................................................8-12
8.4.3 Processing Procedure ...........................................8-13
8.5 Monolog ...........................................................................8-14
8.5.1 Fault....................................................................... 8-14
8.5.2 Cause ....................................................................8-14
8.5.3 Processing Procedure ...........................................8-14
8.6 Voice Quality Deterioration ..............................................8-15
8.6.1 Fault....................................................................... 8-15
8.6.2 Cause ....................................................................8-15
8.6.3 Processing Procedure ...........................................8-16
8.6.4 Suggestion and Summary .....................................8-16
8.7 IAD Echo ..........................................................................8-16
vi
User Manual U-SYS IAD108 Integrated Access Device Table of Contents
8.7.1 Fault....................................................................... 8-16
8.7.2 Cause ....................................................................8-17
8.7.3 Processing Procedure ...........................................8-17
8.8 Voice Abnormality ............................................................8-19
8.8.1 Fault....................................................................... 8-19
8.8.2 Cause ....................................................................8-19
8.8.3 Processing Procedure ...........................................8-20
Appendix A Command List.......................................................... A-1
Appendix B Acronyms .................................................................B-1
vii
User Manual U-SYS IAD108 Integrated Access Device Chapter 1 System Overview

Chapter 1 System Overview

1.1 Introduction to Product

Integrated Access Device (IAD) is an important component of
the Next Generation Network (NGN).
Huawei’s IAD108 is an Access Media Gateway (AMG) based on
the technologies of Voice over IP (VoIP) and Fax over IP (FoIP). It
not only provides efficient and excellent voice services on the
world-wide IP network (the Internet or Intranet), and also provides
small-capacity VoIP/FoIP solutions for enterprises, users in
communities and companies.
IAD108 adopts the box design, and is usually installed on the
desktops or hung in the corridors. The appearance is as shown in
Figure 1-1.
Figure 1-1 Appearance of IAD108
1-1
User Manual U-SYS IAD108 Integrated Access Device Chapter 1 System Overview
According to different uplink interfaces, IAD108 series include
three models as listed in Table 1-1.
Table 1-1 Three models of IAD108 series
Model Uplink interface
IAD108A
The uplink interface type is asymmetric digital subscriber line (ADSL).
IAD108E The uplink interface type is fast Ethernet (FE).
IAD108V
The uplink interface type is very-high-data-rate digital subscriber line (VDSL).
IAD108 is located in the user access level of NGN, as shown in
Figure 1-2.
1-2
User Manual
H.323GK
MRS
3rd Party Server
SoftSwitch
Ephone
PCphone
SIP multimedia terminal
MGCP/H.248
AMG5000
MGCP/H.248
AAA
SCP
PSTN
IP network
TMG
SoftSwitch
IAD108
PSTN
TMG
SG
R
R
U-SYS IAD108 Integrated Access Device Chapter 1 System Overview
AAA: Authentication, Authorization and Accounting
SG: Signaling Gateway
SCP: Service Control Point TMG: Trunk Media Gateway
MRS: Media Resource Server AMG: Access Media Gateway
Figure 1-2 Location of IAD108 in NGN

1.2 Service Functions

provide abundant services:
Acting as a device in the user access layer of NGN, IAD108 can
Access POTS users to IP network.
z
Access Ethernet users into IP packet network.
z
Support IP semi-permanent connection (SPC) and internal
z
SPC.
Support T.38 fax or transparent transmission of fax.
z
Support transparent transmission of Modem signals.
z
1-3
User Manual U-SYS IAD108 Integrated Access Device Chapter 1 System Overview
Test on subscriber line. (optional)
z
Support the power supply from remote place.
z
Support traditional PSTN telephone services, including:
z
call forwarding, Caller Identification Display (CID) and call
waiting. With the right telephone set, voice message
indicator function can also be provided.
Support the supplementary services in coordination with a
z
softswitch.
Support intelligent services and special applications in
z
coordination with a softswitch.

1.3 System Structure

1.3.1 Hardware Structure
There are indicators on the front panel of IAD108, and their
names and meanings are as shown in Table 1-2.
Table 1-2 Table of IAD108 indicators
Indicator Color Name Meaning
When local power supply is connected, it is on. If there is no
PWR Green
Power supply indicator
power supply, it is off.
When remote power supply is connected, it blinks. If there is no power supply, it is off.
It blinks two times per second when
RUN Green
Running indicator
loading.
It blinks one time per second when running normally.
1-4
User Manual U-SYS IAD108 Integrated Access Device Chapter 1 System Overview
Indicator Color Name Meaning
Indicator for
WAN Green
uplink interface
1–8 Green
Indicator for telephone user
When the unplink interface is normal, it is on, and if no network cable is inserted, it is off.
When the user on the corresponding interface off-hooks, it is lighted up.
The external interfaces provided by IAD108 are located on the
back panel as shown in Figure 1-3.
(1) Local power supply interface (2) Upstream interface (3), (4) Data user interface (5)–(12) POTS ports (13) Local maintenance serial port
Figure 1-3 External interface of IAD108
1.3.2 Software Structure
The software system of IAD108 consists of the main CPU
software and DSP software of the CSP. As the core of IAD, the main
CPU software implements the call control of the whole system,
management and maintenance function and forwarding of media
flow. The DSP software mainly implements the coding and decoding
of voice, detection and generation of Dual-tone Multifrequency
1-5
User Manual
Service
access
module
SPC processing module
TDM/DSP
TDM/DSP
VoIP service processing module
Protocol processing module
MGCP/H248
Bottom layer drive module
POTS
Management, maintenance and operation module
U-SYS IAD108 Integrated Access Device Chapter 1 System Overview
(DTMF)/ Frequency Shift Keying (FSK), Voice Activity Detection
(VAD) and Comfort Noise Generation (CNG).
In terms of software structure, IAD108 consists of the following
functionality modules.
Management, maintenance and operation system module
z
Service access module
z
SPC service processing module
z
VoIP service processing module
z
Protocol processing module
z
Bottom layer drive module
z
The relations among the modules are shown in Figure 1-4.
Figure 1-4 Functionality modules of IAD108
The functions of these modules are listed in Table 1-3.
1-6
Loading...
+ 265 hidden pages