This product and related documentation are protected by copyright and are distributed un der
license restricting its use, copying, distributing and decompilation. No part of this product or
related documentation may be reproduced in any form by any means without prior written
authorization from TLC Solutions, Inc. or its licensors, if any.
SPECIFICATIONS ARE SUBJECT TO CHANGE!
While all reasonable efforts have been made to assure the accuracy of this document, TLC
Solutions, Inc. assumes no liability resulting from any errors or omissions in this document or
from the use of the information obtained herein. The information contained in this document has
been carefully reviewed and is believed to be reliable. However, no responsibility is assumed for
inaccuracies. TLC Solutions, Inc. re serves the right to make changes to any equipment
described herein to improve reliability, function, or design, and reserves the right to revise this
document and to make changes in content hereof with no obligation to notify any person of
revisions or changes. TLC Solutions, Inc. does not assume any liability arising out of the use or
application of any equipment or circuit described herein.
SOFTWARE COPYRIGHT!
The equipment described in this manual includes computer program(s) (the “SOFTWARE”) which
are stored in semiconductor memories or other media. The SOFTWARE is licensed through TLC
Solutions, Inc. by its respective vendor and is protected by copyright, trade secret, patent and
other intellectual property laws. Accordingly, the use of the SOFTWARE described in this manual
requires a separate software license from the respective vendor and may not be copied or
reproduced in any manner inconsistent with that license. The purchase of equipment shall not be
deemed to grant either directly or implied, any license under copyrights, trade secrets, patents, or
patent applications of TLC Solutions Inc. or its vendors.
RADIO TRANSMISSION SYSTEM RESTRICTIONS OF USE!
The equipment described in this document generates Radio Frequency (RF ) waves and requires
proper Federal Communications Commission (FCC) frequency clearance before being used.
TLC Solutions, Inc. is not responsible for seeking the approval and assumes no liability from the
use of the equipment. It is solely the responsibility of the END USER to obtain proper approval
and frequency clearance prior to operations. While TLC Solutions, Inc. may assist the END
USER in obtaining proper clearance, at no time will any submission be submitted in the name of,
by or for TLC Solutions, Inc. All applications shall be submitted in the name of, by and for the
END USER only. TLC Solutions, Inc. does not assume any liability arising out of the improper
use of any equipment described herein.
General Information ..................................................................................................................................... 1
Intended Users of this Guide ...................................................................................................................... 1
Conventions Used in this Guide ................................................................................................................. 1
Single Carrier BTS ........................................................................................................................................ 6
Small Portable Packaging ........................................................................................................................... 6
System Installation ................................................................................................................... 7
Unpacking the System ................................................................................................................................. 7
Deploying the system ‘without’ the use of an Ethernet HUB or Switch ................................................. 7
Deploying the system ‘with’ the use of an Ethernet HUB or Switch ....................................................... 7
Connecting a second BTS to the system .................................................................................................. 7
Connecting a Range Enhancement Package ............................................................................................ 7
System Configuration .............................................................................................................. 8
LA Configuration ....................................................................................................................................... C6
SMS Distribution Lists ............................................................................................................................ C21
Appendix D - I/O Connector Pinouts .................................................................................... D1
Ethernet Port .............................................................................................................................................. D1
Ethernet Cable Pin Outs “Cross Over Cable” ........................................................................................ D1
Appendix E - dBm-to-Watts Conversion Table ................................................................... E1
Appendix F - ARFCN Frequencies ........................................................................................ E1
F-1.GSM-850 ARFCN Frequencies (in MHz) ..................................................................................... E1
F-2.E-GSM-900 ARFCN Frequencies (in MHz) ................................................................................. E3
F-3.GSM-1900 ARFCN Frequencies (in MHz) ................................................................................... E5
F-4.GSM-1800 ARFCN Frequencies (in MHz) ................................................................................... E9
Preface
General Information
The information in this document describes the connectivity and deployment of TLC
Solutions’ Laptop GSM (LTGSM) System (Separate Components).
Intended Users of this Guide
This guide is intended to be read by individuals responsible for the deployment and use
of the LTGSM System. It is assumed that the reader has a basic knowledge of Global
Systems for Mobile Communications (GSM) technology.
Conventions Used in this Guide
WARNING – Alerts the reader to a situation that
WARNING – Alerts the reader to a situation that
might affect personal safety.
might affect personal safety.
WARNING
WARNINGWARNING
!
!
!
CAUTION
CAUTION
CAUTION
NOTE
NOTENOTE
STOP
STOP
Guide Organization
CAUTION – Alerts the reader to a situation that
CAUTION – Alerts the reader to a situation that
might affect the integrity of equipment, software or
might affect the integrity of equipment, software or
data.
data.
NOTE – Provides the reader with important or
NOTE – Provides the reader with important or
supporting information.
supporting information.
STOP – Informs the reader that a procedure is
STOP – Informs the reader that a procedure is
finished.
finished.
The guide is organized as follows:
Section 1, “The TLC Laptop GSM System”, describes the subsystem and its
characteristics and provides a list of items provided with the package.
_____________________________________________________________________________________
LTGSM User Manual 1 Confidential
Section 2, “Installation”, covers the procedures to unpack and install the equipment.
Section 3, “System Configuration”, provides current system information as well as
screenshots and configuration commands for the MSC, BSC and BTS.
Section 4, “Upgrades to the MSC and BSC”, provides instructions for LTGSM
upgrades.
Section 5, “Periodic Maintenance”, describes the procedures that should be
performed periodically to ensure the LTGSM operates properly.
Section 6, “Technical Support”, provides information to obtain additional technical
assistance, if required.
Appendix A, “Acronyms”, provides a list of acronyms used in this manual.
Appendix B, “Quick Installation Guide”, provides step by step procedures on
installing the LTGSM.
Appendix C, “Configuration Guide”, provides information on the Web Browser
interface and how to proper administer the LTGSM
Appendix D, “I/O Connector Pinouts”, provides pinouts for all external connectors on
the LTGSM.
Appendix E, “dBm to Watts Conversion Table”, provides a dBm to Watts conversion
table.
Appendix F, “ARFCN Frequencies”, provides the ARFCN frequencies for the 850,
900, 1800, and 1900 MHz frequency bands.
_____________________________________________________________________________________
LTGSM User Manual 2 Confidential
Safety Precautions
The following general safety precautions must be observed during all phases of system
installation, service, and repair of this equipment. Failure to comply with these
precautions or specific warnings elsewhere in this manual violates safety standards of
design, manufacture, and intended use of this equipment. TLC Solutions, Inc. assumes
no liability for the customer’s failure to comply with these requirements.
The safety precautions listed below represent warnings of certain dangers that TLC
Solutions, Inc. is aware of. As the user of the product, you should follow these warnings
for the safe operation of the equipment in your operating environment.
Read this Guide Thoroughly
!
CAUTION
CAUTION - The technician must be completely familiar with the procedures
contained in this document before beginning the actual installation.
Complete all Steps
!
CAUTION
CAUTION - The technician must perform each procedure in its entirety.
Ground the Equipment
WARNING - To minimize shock hazard, the equipment should be connected to a
WARNING
properly grounded electrical outlet.
Only Qualified Personnel Should Service the Equipment
WARNING
WARNING - Only trained personnel may remove equipment covers to install and
service the internal assemblies of the LTGSM. The LTGSM contains highenergy equipment that can cause injury or death. Under certain conditions,
dangerous voltages and/or currents may exist even with the power supply
removed.
Do Not Service or Adjust Alone
WARNING - Do not attempt internal service or adjustment unless another person
capable of rendering first aid and resuscitation is present. Dangerous voltages
WARNING
and/or currents, capable of causing injury or death, are present in this
equipment.
_____________________________________________________________________________________
LTGSM User Manual 3 Confidential
Do Not Operate in an Explosive Atmosphere
WARNING - Do not operate the equipment in the presence of flammable gases
or fumes. Operation of electrical equipment in such an environment creates a
WARNING
definite safety hazard.
Do Not Substitute Parts or Modify Equipment
WARNING - Because of the danger of introducing additional hazards, do not
install substitute parts or perform any unauthorized modification of equipment.
WARNING
_____________________________________________________________________________________
LTGSM User Manual 4 Confidential
TLC’s Laptop GSM System
The LTGSM System is a complete GSM system in a suitcase. The package contains a
MSC, GSN*, SMSC, AUC*, MMSC*, BSC and BTS. This system is capable of providing
Voice, Circuit Switched Data (CSD) and High Speed Data. Due to the system type, the
area of coverage is limited to 500 feet indoors and approximately 100 yards outdoors
depending on the environment. Larger footprints can be achieved with the addition of
TLC’s Range Enhancement Pack (REP) and external antennas.
The main features of the LTGSM System are as follows:
• Single Chassis MSC, BSC, GSN*, AUC* and SMSC with single PCI slot
for external voice connectivity
• External connectivity is achieved via a SIP interface
• Single Carrier BTS with internal antenna (up to 20 supported)
• Small package consisting of all communications equipment and power
equipment
Note: * Indicates a non-standard feature and the purchase of a separate software
license is required.
Single Chassis MSC, BSC, GSN, and SMSC
A single Laptop computer running Windows XP with Linux Redhat on a virtual machine
is used to support the MSC, BSC, GSN, AUC and SMSC functionality of the network.
While this is a very small package it is capable of supporting up to 20 single carrier
BTSs.
External Connectivity
External connectivity is achieved with a single Ethernet interface. Both administration as
well as voice traffic is carried over this interface.
_____________________________________________________________________________________
LTGSM User Manual 5 Confidential
Single Carrier BTS
The single carrier BTS is offered in all four (4) standard GSM Bands. As with most
single carrier base stations this one offers 8 total timeslots (7 usable + 1 control). Voice,
CSD and General Packet Radio Service (GPRS) are supported. The LTGSM can
support up to 20 single carrier BTSs.
!
CAUTION
CAUTION – The single carrier BTS used in the LTGSM system was designed as
an indoor base station. As such, the receiver on the BTS is not as efficient as
those found in commercial grade outdoor base stations. This means that the
LTGSM system will be more susceptible to interference and may not provide a
balanced link to and from the GSM handset. TLC has taken steps to resolve
some of the complications associated with the BTS, but can not guarantee
optimal service during its use.
Note – The standard GSM bands are 850 MHz, 900 MHz, 1800 MHz and 1900
MHz.
Small Portable Packaging
The packaging is system dependant, but in most situations the major components are in
a single suitcase with additional base stations and peripheral equipment packaged in
additional cases. The typical packaging is as follows:
• Laptop PC consisting of the MSC, BSC, GSN, AUC and SMSC with associated
voice connectivity module (if any)
• USB Security Dongle for the MSC/BSC software
• Power Supply and cord for the Laptop
• Single Carrier BTS
• Range Enhancement Package
• One (1) Straight Through Ethernet cable
• One (1) Crossover Ethernet cable
• Two (2) standard AC power cords
If there are additional BTSs they will be supplied in a separate case so that they may be
deployed separately from the main set-up. The separate case will normally include the
following:
• Single Carrier BTS
• Range Enhancement Package
• One (1) Straight Through Ethernet cable
• One (1) Crossover Ethernet cable
• Two (2) standard AC power cord
_____________________________________________________________________________________
LTGSM User Manual 6 Confidential
System Installation
Completely read and understand this entire section as well as Appendix B of this
document before deploying and operating the LTGSM.
There are several ways to deploy the LTGSM. It may be deployed as a single carrier
system with no external connectivity or there could be multiple carriers connected across
the world via the internet using technology such as VPN connectivity. The following
sections will provide the user with instructions on how to unpack and connect the system
for the best results. The following scenarios will be covered:
• Unpacking the system
• Deploying the system without
• Deploying the system with
• Connecting a second BTS to the system
• Connecting to a Range Enhancement Package
Unpacking the System
1. Ensure that there is adequate space to operate the system.
2. Remove all equipment from the foam case.
3. Inventory the equipment in accordance with the packing slip.
4. Ensure that none of the components are damaged.
5. Proceed to system installation.
the use of an Ethernet HUB or Switch
the use of an Ethernet HUB or Switch
CAUTION – Do not operate the system while it is still in the foam. Doing so
could damage components due to overheating.
Deploying the system ‘without’ the use of an Ethernet HUB or Switch
See section 1 of the Quick Installation Guide in Appendix B of this document.
Deploying the system ‘with’ the use of an Ethernet HUB or Switch
See section 2 of the Quick Installation Guide in Appendix B of this document.
Connecting a second BTS to the system
See section 3 of the Quick Installation Guide in Appendix B of this document.
Connecting a Range Enhancement Package
See section 4 of the Quick Installation Guide in Appendix B of this document.
_____________________________________________________________________________________
LTGSM User Manual 7 Confidential
System Configuration
The software configuration is vitally important to how the LTGSM operates. No matter
how well the system is deployed and connected it will not work without the appropriate
software settings. Most systems are delivered to the end user ready to operate out of
the box with the exception of a couple of items. Those items are typically the subscriber
database and the routing tables. In some instances this information is provided to TLC
prior to shipment and has already been administered according to the contract and
instructions. If this is the case, the system should be ready to operate as soon as you
receive it, if not follow the instructions provided in this section as well as Appendix C of
this document to complete the database administration. This section provides the
following information:
• Administration procedures using the Web Browser interface
Previously Configured Parameters
The following information is system dependant and was recorded from the LTGSM prior
to shipment. While this information may appear to be part of the master configuration
guide, it is changed for each individual customer.
• MSC IP Address contact support
• Web Access Address Local Host (127.0.0.1)
• BSC IP Address LAN #1 contact support
• User Name pmnowner
• Password admin
Note – IP Addresses may be different depending on the end user’s request.
Hardware and Software Information
With the exception of the operating system and software version the following
information is system dependant and was recorded from the LTGSM prior to shipment.
While this information may appear to be part of the master configuration guide, it is
changed for each individual customer.
• Operating System Windows XP
• MSC/BSC Software Version 2.0.0.14 / 3.0.64.38
• License # XXXXX
• Chassis Type Dell E6400 ATG
All other pertinent information can be found on the accompanying packing list.
_____________________________________________________________________________________
LTGSM User Manual 8 Confidential
Administration Procedures Using the Web Browser interface
It is extremely important that you read and understand the System Administrator
User Guide before attempting to make administrative changes to the system.
Please refer to Appendix C “System Administrator User Guide” for all administrative
procedures.
Note: For information on how to configure the BSC and BTS please refer to the
Configuration Manager user guide that is provided as a separate document.
Upgrades to the System
TLC provides software upgrades as they become available to customers with a Software
License Agreement (SLA). It should be noted that a SLA is not necessary to resolve
problems with the software. If a problem should arise it will be addressed on a case by
case basis. For the purposes of the guide TLC will address only those issues
surrounding the SLA.
If the end user has a SLA and a software upgrade becomes available TLC will contact
the user via telephone and email to inform him/her at the time of availability. The
customer will be provided an FTP site from which to download the patch/software
upgrade. The username and password will be provided in a separate email for security
purposes. Instructions on how to apply the upgrade will be provided at the time of the
download.
TLC does not provide hardware upgrades unless specified and agreed upon during the
contracting phase of the business transaction. All hardware is considered operational at
the time of acceptance. If a problem should arise with the hardware during the warranty
period it will be repaired or replaced at no charge to the customer. All other hardware
issues will be addressed on a case by case basis.
_____________________________________________________________________________________
LTGSM User Manual 9 Confidential
Periodic Maintenance
Due to the simplicity of the LTGSM very little maintenance is required. The following
items should be performed on a periodic basis:
• Back up the configuration database (after every major system change)
• Test the system monthly to ensure it operates correctly
• Clean all components of the system with a soft damp cloth and compressed air
as needed
• Test cables periodically and replace as needed.
CAUTION – Do not clean the system components when in operation. Never use
a wet cloth to clean the system as there are vent holes that may allow moisture
inside the chassis. If a damp cloth is used to clean the system components allow
24 hours of drying time before the next power up.
WARNING – Never use a damp cloth on the system while it is in operation.
Doing so may cause death or injury from electric shock! Always unplug any
WARNING
device before maintenance or cleaning.
Technical Support
TLC provides technical support to its customers based on contract requirements. The
technical support department can be reached at 904-829-0323 option #3 24 hours a day.
In addition each customer is provided with a user name and password to access user
documentation and other important information at TLC’s web site. The URL is
www.toplevelcom.com/support
documentation and software.
. You must have a username and password to access
_____________________________________________________________________________________
LTGSM User Manual 10 Confidential
Appendix A – Common Acronyms
Abis Refers to the BSC-BTS data link
ARFCN Absolute Radio Frequency Channel Number
BCCH Broadcast Control Channel
BSC Base Station Controller
BSS Base Station System
BTS Base Transceiver Station
CPU Central Processing Unit
CSD Circuit Switch Data
DSP Digital Signal Processor
EDGE Enhanced Data Rates for GSM Evolution
FTP File Transfer Protocol
GGSN Gateway GPRS Support Node
GPRS General Packet Radio Service
GSM Global Systems for Mobile Communications
GSN GPRS Support Node
HLR Home Location Registry
HPA High Power Amplifier
IP Internet Protocol
ISDN Integrated Services Digital Network
MCPA Multi-Carrier (High) Power Amplifier
MMS Multimedia Message Service
MMSC Multimedia Messaging Service Center
MS Mobile Station
MSC Mobile Switching Center
OMC-R Operations Maintenance Center – Radio
PBX Private Branch Exchange
PRI Primary Rate Interface
PSTN Public Switched Telephone Network
RF Radio Frequency
SCPA Single Carrier Power Amplifier
SGSN Serving GPRS Support Node
SMS Short Message Service
SMSC Short Messaging Service Center
_____________________________________________________________________________________
LTGSM User Manual A1 Confidential
TRAU Transcoder and Rate Adaptation Unit
VLR Visitor Location Registry
_____________________________________________________________________________________
LTGSM User Manual A2 Confidential
_________________________________________________________________________________________________________________________________
LTGSM User Manual B1 Confidential
Appendix B – Quick Deployment Guide
_________________________________________________________________________________________________________________________________
LTGSM User Manual B2 Confidential
!
CAUTION
NOTE
WARNING
STOP
WARNING – Alerts the reader to a situation that
might affect personal safety.
CAUTION – Alerts the reader to a situation that
might affect the integrity of equipment, software or
data.
NOTE – Provides the reader with important or
supporting information.
STOP – Informs the reader that a procedure is
finished.
STRAIGHT ETHERNET CABLE
CROSS OVER ETHERNET CABLE
CONVENTIONS USED
SMA MALE TO SMA MALE (TX)
SMA MALE TO SMA MALE (RX)
N-Type Male to 7/16 DIN Male (ANT)
_________________________________________________________________________________________________________________________________
LTGSM User Manual B3 Confidential
Deploying the system ‘without’ the use of an Ethernet HUB or Switch
_________________________________________________________________________________________________________________________________
LTGSM User Manual B4 Confidential
Set-Up Without Ethernet HUB or Switch
Step # 1:
Insert Security Dongle into any available USB port.
Security Dongle
_________________________________________________________________________________________________________________________________
LTGSM User Manual B5 Confidential
Set-Up Without Ethernet HUB or Switch
Step # 2:
Connect the LAN port on the Laptop to the LAN port on the
BTS Power Block using an Ethernet crossover cable.
AC to DC Power Block
!
CAUTION
DO NOT PLUG THE CABLE INTO THE BTS SIDE OF THE BTS
POWER BLOCK. THIS PORT PROV IDES PO E (P ower Over
Ethernet) [48 VDC] FOR THE BTS. IF THESE PORTS ARE
MISTAKEN THE LAPTOP COULD BE DAMAGED!!!
NOTE
ENSURE THAT A CROSSOVER CABLE IS USED BETWEEN
THE LAPTOP MSC AND THE POWER BLOCK. THIS IS
ONLY NECESSARY W HEN A HUB OR SWITCH IS NOT
USED.
LANBTS
X
_________________________________________________________________________________________________________________________________
LTGSM User Manual B6 Confidential
Set-Up WithoutEthe rnet HUB or Switch
Step # 3:
Connect the BTS port on the BTS Power Block to the main
Ethernet Port on the BTS. This port can be identified by the 48
VDC marking above it. This connection will be accomplished
with a straight through Ethernet cable.
AC to DC Power Block
NOTE
ENSURE THAT A STRAIGHT THROUGH CABLE IS USED
BETWEEN THE POWER BLOCK AND THE BTS.
OTHERWISE THE SYSTEM WILL NOT WORK
48 VDC
BTS
_________________________________________________________________________________________________________________________________
LTGSM User Manual B7 Confidential
Set-Up Without Ethernet HUB or Switch
Step # 4:
Connect the AC Power to both the Laptop and the BTS Power
Block.
AC to DC Power Block
48 VDC
To AC Outlet
WARNING
ALWAYS USE CAUTION WHEN PLUGGING IN AC
ADAPTER. SERIOUS INJURY OR DEATH COULD BE
CAUSED BY ELECTRIC SHOCK!!!
To AC Outlet
_________________________________________________________________________________________________________________________________
LTGSM User Manual B8 Confidential
Set-Up Without Ethernet HUB or Switch
Step # 5:
Press the power button above the keyboard on the laptop.
_________________________________________________________________________________________________________________________________
LTGSM User Manual B9 Confidential
STOP
THIS COMPLETES THE SET-UP W HEN DEPLOYED
WITHOUT AN ETHERNET HUB OR SWITCH.
_________________________________________________________________________________________________________________________________
LTGSM User Manual B10 Confidential
Deploying the system ‘with’ the use of an Ethernet HUB or Switch
_________________________________________________________________________________________________________________________________
LTGSM User Manual B11 Confidential
Set-Up With Ethernet HUB or Switch
Step # 1:
Insert Security Dongle into any available USB port.
Security Dongle
_________________________________________________________________________________________________________________________________
LTGSM User Manual B12 Confidential
Set-Up With Ethernet HUB or Switch
Step # 2:
Connect the LAN on the Laptop to any of the LAN ports on the
Ethernet Switch (except port 5).
NOTE
IT IS NOT NECESSARY TO USE CROSSOVER CABLES
WHEN CONNECTING DEVICES THROUGH A HUB OR
SWITCH.
NOTE
PORT 5 ON THE ETHERNET SWITCH IS AN UPLINK PORT.
DO NOT USE THIS PORT UNLESS IT NECESSARY. IF THE
PORT IS USED IT WILL REQUIRE A CROSSOVER CABLE.
1 2 3 4 5
Ethernet Switch
_________________________________________________________________________________________________________________________________
LTGSM User Manual B13 Confidential
1 2 3 4 5
Ethernet Switch
Set-Up With Ethernet HUB or Switch
Step # 3:
Connect any port on the Ethernet Hub (except port 5) to the
LAN port on the BTS Power Block.
AC to DC Power Block
NOTE
IT IS NOT NECESSARY TO USE CROSSOVER CABLES
WHEN CONNECTING DEVICES THROUGH A HUB OR
SWITCH.
!
CAUTION
DO NOT PLUG THE CABLE INTO THE BTS SIDE OF THE BTS
POWER BLOCK. THIS PORT PROVIDES POE (Power Over
Ethernet) [48 VDC] FOR THE BTS. IF THESE PORTS ARE
MISTAKEN THE ETHERNET SWITCH COULD BE
DAMAGED!!!
NOTE
PORT 5 ON THE ETHERNET SWITCH IS AN UPLINK PORT.
DO NOT USE THIS PORT UNLESS IT NECESSARY. IF THE
PORT IS USED IT WILL REQUIRE A CROSSOVER CABLE.
LANBTS
X
_________________________________________________________________________________________________________________________________
LTGSM User Manual B14 Confidential
Set-Up With Ethernet HUB or Switch
Step # 4:
Connect the BTS port on the BTS Power Block to the Main
Ethernet port on the BTS labeled 48 VDC
AC to DC Power Block
NOTE
IT IS NOT NECESSARY TO USE CROSSOVER CABLES
WHEN CONNECTING DEVICES THROUGH A HUB OR
SWITCH.
NOTE
PORT 5 ON THE ETHERNET SWITCH IS AN UPLINK PORT.
DO NOT USE THIS PORT UNLESS IT NECESSARY. IF THE
PORT IS USED IT WILL REQUIRE A CROSSOVER CABLE.
48VDC
BTS
1 2 3 4 5
Ethernet Switch
_________________________________________________________________________________________________________________________________
LTGSM User Manual B15 Confidential
1 2 3 4 5
Ethernet Switch
Set-Up With Ethernet HUB or Switch
Step # 5:
Connect the AC Power to both the Laptop and the BTS Power
Block.
AC to DC Power Block
NOTE
PORT 5 ON THE ETHERNET SWITCH IS AN UPLINK PORT.
DO NOT USE THIS PORT UNLESS IT NECESSARY. IF THE
PORT IS USED IT WILL REQUIRE A CROSSOVER CABLE.
48VDC
To AC Outlet
To AC Outlet
WARNING
ALWAYS USE CAUTION WHEN PLUGGING IN AC
ADAPTER. SERIOUS INJURY OR DEATH COULD BE
CAUSED BY ELECTRIC SHOCK!!!
To AC Outlet
_________________________________________________________________________________________________________________________________
LTGSM User Manual B16 Confidential
Set-Up With Ethernet HUB or Switch
Step # 6:
Press the power button on the front of the MSC.
_________________________________________________________________________________________________________________________________
LTGSM User Manual B17 Confidential
STOP
THIS COMPLETES THE SET-UP WHEN DEPLOYED
WITH AN ETHERNET HUB OR SWITCH.
_________________________________________________________________________________________________________________________________
LTGSM User Manual B18 Confidential
CONNECTING A SECOND BTS
_________________________________________________________________________________________________________________________________
LTGSM User Manual B19 Confidential
1 2 3 4 5
Ethernet Switch
Adding a Second BTS to the Network
To connect a second base station to the Laptop MSC/BSC
simply add the second BTS Power Block and connect the LAN
port from the BTS Power Block to any open LAN ports on the
Ethernet switch. After connecting the Power Block to the
Ethernet switch, connect the BTS port of the BTS Power Block
to the main Ethernet port on the BTS (identified by the 48 VDC
indication above the port).
AC to DC Power Block
NOTE
PORT 5 ON THE ETHERNET SWITCH IS AN UPLINK PORT.
DO NOT USE THIS PORT UNLESS IT NECESSARY. IF THE
PORT IS USED IT WILL REQUIRE A CROSSOVER CABLE.
48 VDC
TO PC
48 VDC
AC to DC Power Block
NOTE
SEVERAL BTSs CAN BE ADDED TO THE LAPTOP
MSC/BSC BY FOLLOWING THESE SAME INSTRUCTIONS.
REMEMBER THE SITES MUST ALSO BE AD DED IN T HE
BSC ADMINISTRATION CONSOLE
!
CAUTION
ENSURE THAT THE BTS SIDE OF THE POWER BLOCK IS
ONLY PLUGGED INTO T HE BT S. THIS PORT PROVIDE S
POE (Power Over Ethernet) [48 VDC] FOR THE BTS. IF
THESE PORTS ARE MISTAKEN THE ETHERNET SWITCH
COULD BE DAMAGED!!!
_________________________________________________________________________________________________________________________________
LTGSM User Manual B20 Confidential
STOP
THIS COMPLETES THE SET-UP FOR CONNECTING
TWO OR MORE BTSs.
_________________________________________________________________________________________________________________________________
LTGSM User Manual B21 Confidential
CONNECTING THE RANGE ENHANCEMENT PACKAGE (REP)
_________________________________________________________________________________________________________________________________
LTGSM User Manual B22 Confidential
Connecting the Range Enhancement Package
Step # 1:
Connect the BTS TX port to the REP TX Input port and then
connect the BTS RX port to the REP RX Input port using the
SMA Male to SMA Male cables provided.
48 VDC
TX
RX
_________________________________________________________________________________________________________________________________
LTGSM User Manual B23 Confidential
Connecti ng the Range Enhancement Package
Step # 2:
Connect the REP Antenna port to an appropriate antenna
using an N Type Male connector on the REP side of the cable.
!
CAUTION
DO NOT POWER ON THE REP WITHOUT AN ANTENNA OR
OTHER APPROPRIATE LOAD ON THE ANTENNA PORT.
RUNNING THE REP WITHOUT A LOAD MAY CAUSE
DAMAGE TO THE INTERNAL POWER AMPLIFIER.
NOTE
ALL CABLES, ANTENNAS AND LOADS SHOULD BE RATED
AT 50 OHMS.
_________________________________________________________________________________________________________________________________
LTGSM User Manual B24 Confidential
Connecti ng the Rang e Enhancement Package
Step # 3:
Connect AC power to the REP.
To AC Outlet
_________________________________________________________________________________________________________________________________
LTGSM User Manual B25 Confidential
Connecting the Range Enhancement Package
Step # 4:
Toggle the power button next to the AC entry point to the on
position.
_________________________________________________________________________________________________________________________________
LTGSM User Manual B26 Confidential
Connecting the Range Enhancement Package
Step # 5:
The blue LED on the from of the REP should illuminate and
the power meter should indicate an estimated power output
level.
NOTE
THE POWER METER IS SIMPLY AN INDICATOR OF OUPUT
POWER AND MAY NOT REFLECT THE ACTUAL RF
OUTPUT.
_________________________________________________________________________________________________________________________________
LTGSM User Manual B27 Confidential
STOP
THIS COM PL E TES THE SET-UP WHEN
CONNECTING THE BTS TO THE REP
_________________________________________________________________________________________________________________________________
LTGSM User Manual B28 Confidential
THIS PAGE INTENTIONALLY LEFT BLANK.
APPENDIX C Configuration Guide
Introduction
This document introduces the Management System of the LTGSM solution and
should initially be read in conjunction with the Quick Start Guide for the LTGSM. The
Quick Start Guide details how to physically connect-up your LTGSM.
This System Administrator User Guide can be used as a training and/or reference
document by anyone who requires access to the Management System in order to
configure, administer, register handsets or support the LTGSM. Typically this is likely
to be a Network Manager, System Administrator, Telecoms Administrator or a
Support member of staff.
Anyone needing to use the LTGSM Management System should refer to the
following section of this document for further information on how to use the LTGSM
interface:
Starting your PMN system configuration
PMX Administrator must first be installed on a server (running IIS) on the PMX system. For
details of how to install PMX Administrator, please refer to the PMX Administrator installation
guide.
Launch PMX Administrator either from the Private Mobile Networks program group on the
start menu of the server where it was installed,
or from a desktop shortcut or browser from any other PC with access to the network.
You will be prompted to enter your user credentials.
Having logged into PMX Administrator, you will be presented with a screen as shown below:
__________________________________________________________________________________
LTGSM User Manual C1 Confidential
For a brand new system, there will be no existing tenancies.
You should first select ‘System Settings’ in order to add a new ‘provider’:
You will be presented with the ‘System Settings’ menu:
__________________________________________________________________________________
LTGSM User Manual C2 Confidential
Provider Configuration
‘Location Area’ coverage is provided by a variety of companies in many countries. The
provider giving coverage within an area is made known to and displayed on the handset.
Each country is assigned a 3-digit identifier code, or codes, and each company auth orized to
give GSM coverage is given a 2-digit identifier code. Therefore, the PMX system allows
‘providers’ to be added so they can be allocated to individual location areas (see section on
location areas).
In most cases PMX systems will use the 2-digit identifier allocated to PMN by Ofcom and this
will be the only provider configured on the system. As shown below, this will normally be set
to code 19 in country 234. In cases where PMN pro vide co verag e on be ha lf of anothe r mobile
operator, the other operator’s code may be entere d. For demonstration equipment, code 01
and country 001 may be used as these are development codes.
Click on the ‘Providers’ icon to be presented with the providers list, then click on ‘Add
Provider’ to enter details of the new provider.
Once added to the system, a provider may be edited but not deleted.
__________________________________________________________________________________
LTGSM User Manual C3 Confidential
MSC Configuration
Creating a Mobile Switching Cen tre (MSC) will set up the top level of your system hierarchy.
Having selected ‘MSCs’ from the ‘System Settings’ menu, you will be presented with the MSC
list:
Select ‘Add MSC’ to add details of the MSC:
Enter details as given on your network diagram and click ‘Accept’.
NOTE : The loop back IP address of 127.0.0.1 should never be used as the MSC will fail to start.
__________________________________________________________________________________
LTGSM User Manual C4 Confidential
BSC Configuration
This will create the second level of the hardware hierarchy.
Select ‘Add BSC’ to configure the BSC:
Enter details as given on your network diagram and click ‘Accept’. Repeat the p rocess as
required to create all BSC’s on the network.
N.B. The configuration of cell groups (and therefore cells) must b e done via th e BSC settin gs.
Please note that, whilst cell groups will be listed under Location Areas, they may only be
configured within the BSC, not the LA.
Cell Group Configuration
This will create the second layer of the virtual hierarchy.
Select the required BSC to edit an d select ‘Add Cell Group’ to cre at e t he cell g roup:
Define a suitable name and choose the required LA from th e list and click ‘Accept’. Repeat
the process as necessary to create all cell groups required on the network.
Reminder: Although cell groups may be viewed from within LA settings, they may only be
configured via the BSC.
___________________________________________________________________________________
LTGSM User Manual C5 Confidential
Cell Configuration
This will create the final layer of the hardware hierarchy.
Select your required cell group to edit and select ‘Add Cell’ to be presented with the ‘Add Cell’
screen:
Enter details as given on your network diagram and click ‘Accept’. (The ‘Cell Number’ can be
obtained from the BSC configuration softwa re). Repeat the process as required to cre ate all
cells in the cell group.
Hardware configuration is now complete and you can move on to the tenancy configuration.
LA Configuration
This will create the first layer within the virtual hierarchy.
Select ‘Add Location Area’ to configure the LA:
Enter details as given on your network diagram along with the appropriate provider and click
‘Accept’. The ‘LA Code’ number can be obtained from the BSC configuration software.
Normally, there will only be one provider given in the drop down list.Repeat process as
required to create all LA’s on the network.
Having now created an MSC, at least one BSC and at least o ne LA, you can n ow create new
cell groups to be assigned to your LA(s) and new cells to be assigned to your cell group(s).
___________________________________________________________________________________
LTGSM User Manual C6 Confidential
PMX Administrator Password Change
For security reasons, you may wish to change your PMX administrator’s password. This can
be done by selecting the password change option from the ‘System Settings’ menu:
From there, you will be prompted to enter the current password, followed by the new
password you wish to use, then to confirm that new password and accept the change.
___________________________________________________________________________________
LTGSM User Manual C7 Confidential
Tenancy Configuration
Having configured the hardware, browse to the ‘Tenanc ies’ scree n by us in g the ‘Tenanc y L ist’
link from any page:
You will be presented with the list of tenancies:
For a brand new system, there will be no existing tenancies.
Select ‘Add Tenancy’ and yo u will be presented with the ‘Add Tenan cy ’ screen:
___________________________________________________________________________________
LTGSM User Manual C8 Confidential
General Tab
Enter a name which will be displayed in the tenancy list and add a description if required.
The length of your PMX extension numbers should be defined from the drop down list.
Location Areas will be listed in ‘Available LAs’ and can be moved into the ‘Selected LAs’ list.
The PMX system may be installed and run in one country but used by people in several
different countries. Therefore, you may set which time zone the tenancy uses so that
information relevant to the tenancy’s local time ma y be used. The local time will relate to the
sending of SMS messages and to call logging / billing.
The ‘Open Timeout’ setting defines the maximum number of minutes you expect users to
remain on a single call. Mobile handsets attempt to re-re gister periodically with their network,
the norm being every 90 minutes. This process cannot take place whils t the handset is on a
call. Therefore, the re-registration may be delayed. The open timeout will cater for this
scenario by keeping the registration alive for the set time if PMX thinks the extension is on a
call. After this time, PMX will deem that the call should have terminated and the extension will
be un-registered from the system. If the call is still in progress, it will be allowed to continue
but PMX will treat the extension as being “off net”.
The ‘Closed Timeout’ setting defines the number of minutes PMX will keep the extension
registered when not on a call. As stated above, the handset should attempt to re-register
periodically. If it fails to do so within the closed timeout period, PMX will deem that the
handset has been switched off, has roamed out of the PMX network range or switched to
another network.
Ranges Tab
From the Tenancy List, select the tenancy you have just created and, in the ‘Tenancy Menu’,
click on the ‘Tenancy Settings’ icon:
This will take you back to the details in order to create a number range:
___________________________________________________________________________________
LTGSM User Manual C9 Confidential
Click ‘Add Range’ in order to create a range of extension numbers to which SIM cards may be
allocated.
Enter the required range then click ‘Accept’ to accept the defined numbers.
Once the Tenancy has at least one number range defined, you can start associating SIM
cards with the telephone network extension numbers within the range(s).
No tenancy may use a numbering range which overlaps with that of another tenancy.
A tenancy may have multiple ranges but they must share a common number length as
defined in the ‘Tenancy Conf iguration’ screen.
Authentication Tab
The required levels of security offered by the PMX system should be determined for the
tenancy. By default, all options are selected.
___________________________________________________________________________________
LTGSM User Manual C10 Confidential
Normal External
When ticked, authentication will be required upon the handset roaming from an ‘external’ cell
(i.e. macro network), to a PMX cell.
Normal Internal
If ticked, authentication will be required when a handset roams from one PMX cell to another.
Attach
When this option is ticked, PMX will attempt to authenticate the SIM when the extension
attempts to register back on the network.
Calls
When selected, this option sets PMX to authenticate the SIM whenever the extension
attempts to make a call.
Periodic
Each mobile handset will attempt to re-register regular intervals – the norm being 90 minutes.
The frequency is set in the IP Access configuration. This setting determines whether or not
PMX attempts to authenticate th e SIM with eac h re- registr a tion . If un - tick ed , the mobile w ill be
allowed to re-register without authenticating again.
Ciphering
Allows the radio traffic between handsets and cells to be scrambled. The encryption
algorithms are set on each cell in th e IP Access configuration.
For further information about authentication, please refer to the authentication settings for
extensions.
Diverts Tab
There may be a requirement to forward / divert calls to other destinations under certain
conditions. For example, you may wish to divert calls to a voicemail sys tem or a switchboard
if an extension is busy. These diverts may either be set at tenancy level, i.e . all extensions
within the tenancy will follow the same diverts (unless overridden by an extension-specific
divert) or on individual extensions. The diver ts tab within the ‘Tenanc y Settings’ will apply the
rules for all extensions within the tenancy.
___________________________________________________________________________________
LTGSM User Manual C11 Confidential
Active?
Against each divert type is a tick box labelled ‘Active?’. Wh en ticked, the divert will become
active and, when un-ticked, the divert destination will remain but the divert will no longer be
active.
All Calls
Otherwise known as an ‘unconditional’ or ‘immedi ate’ divert, the number defined in this field
will be called under all circumstances. Caution should be exercised when activating this
divert, especially at tenancy level, as calls will no longer route to handsets. This divert, once
activated, will take precedence over all other divert types.
Busy
Allows an alternative point of answer to be defined when extens ions are busy on another call
and no second line is enabled on th e extension / handset.
NoAnswer
Sets an alternative point of answer when calls give no reply with in the ringing duration set in
‘Timeout’.
Timeout
Defines the number of seconds the system will wait for an answer from the extension before
following the ‘No Answer’ divert to the defined number.
Not Reachable
In circumstances where it can no longer be estab lished th at the e xtension is register ed on the
system i.e. the handset is switched off, is no longer within range of an access point or has
roamed to another network, the system will divert calls to the number defined here.
Allow Users to Alter Diverts
The diverts set on this tab may be defined exclusively by the administrator, in which case this
box should remain un-ticked, or you may wish to tick the box in order to allow divert
commands from handsets to up date the divert destination s.
Should you need to remove a tenancy from the system, this can be done by selecting
‘Remove Tenancies’ from the ‘Associated Links’ options in the ‘Tenancy Settings’ section.
___________________________________________________________________________________
LTGSM User Manual C12 Confidential
From the list of Tenancies offered, select those to be deleted by ticking the box for the
tenancy then click ‘Continue’ at the bottom of the screen.
You will be prompted to ‘Accept’ or ‘Cancel’ the deletion. Pleas e exercise caution when using
this facility as tenancy settings cannot be restored once deleted.
___________________________________________________________________________________
LTGSM User Manual C13 Confidential
SIM Card and Extension Number Configuration
There are two different ways to provision a SIM card against a particular extension number.
The method used will depend upon whether or not you know the unique ID (IMSI) of the SIM
card to be provisioned. If the IMSI is known to you, method 1 is the simpler method of
provisioning the SIM card.
Provisioning Method 1
Browse to the ‘Tenancy Menu’ and se le ct ‘Extensions’. This will take you to th e list of
extensions.
Select ‘Add Extension’.
___________________________________________________________________________________
LTGSM User Manual C14 Confidential
General Tab
Enter the IMSI number and give an appropriate description (normally the user’s name). The
extension number to be associated with the IMSI may be manually selected from the
remaining unassigned numbers so th at a specific extension can be used or it may be autoassigned whereby the lowest available number is used.
PMX Administrator gives the opportunity to associate two external numbers with the PMX
extension. The ‘DDI Number’ should normally be a public number which points to the gateway
connected to the PMX system. The ‘External Mobile Netwo rk Number’ should normally be the
mobile number provided by a macro network provider for any SIM c ard already owned by the
user. The user should set a divert on their macro network so that when their phone is not
using that network, calls will be forwarded to PMN via the ‘DDI Number’. By knowing that
these two numbers are associated with the PMX extension, any user on the PMX system
dialling either of those two numbers instead of the internal PMX extension number may be
routed internally within PMX, thus avoiding call charges on the public network. If the user is
not currently on the PMX network, the system can then dial the ‘External Mobile Network
Number’ via the gateway to try to contact the user on the macro networ k. This also app lies to
SMS messages so that, when the mobile is not present on the PMX netw ork, any texts can be
forwarded to the external mobile number.
Select the user class of service from the profile drop down list:
‘Normal Subscriber’ is for users who expect to be registered primarily on the PMX network.
Such users would issue their external landline number to the ir c allers. PMX w ill accept calls in
from this number and route calls to the PMX extension. If the PMX exte nsion is not regis tered
at the time, the call will be routed to the external mobile number.
‘Internal Only’ is intended for users who expect to use their macro network mobile number
most of the time. Such users would issue the ir normal mobile number to callers and forward
calls to the ‘DDI Number’ when not present on the macro network. Their normal mobile
number would be the primary point of contact with calls routed to PMX if not on the macro
network. Calls for these users are then kept ‘internal only’ on the PMX network i.e. PMX will
not dial back out to ‘External Mobile Network Number’ at any point, either for voice calls or
text messages.
‘Emergency Privilege’ – the PMX system or individual tenancies may be switched into
‘emergency mode’ which means that calls on the s ystem are restricted. Whilst in emergency
mode, only those users with emergency privilege are allowed to make calls.
Where you are not using the ‘Auto -assign Number’, the number of extensions listed in the
drop-down may be restricted so that, for example, only the first 10 unassigned extension
numbers are listed. The value is defined in the web.config file found in [x]:\Program
Files\Private Mobile Networks\iMobileNetwork
<!-- The max no of entries in a list box -->
<add key="MaxListCount" value="10" />
___________________________________________________________________________________
LTGSM User Manual C15 Confidential
GPRS Tab
The PMX system can allow GPRS-enabled handsets to access data services. As part of the
provisioning process, the rele vant settings can be configure d o n e a ch individual extension.
Enable GPRS
To allow the extension to access GPRS services this box must be ticked. All other settings
will be disabled until this is enabled.
Enable VPLMN
Allows an IP address assign ed by another network to b e us ed.
Dynamic IP
If ticked, an IP address will automatically assigned to the device. This may change from one
registration to the next. When enabled, the ‘IP Address’ setting which follows will be disabled.
IP Address
Allows a static IP address to be assigned to the extension.
APN
Sets the access point name to be used by the extension. This may be defin ed as a specific
name or, more usually, be set to a value of ‘*’ to allow the device to carry on using their
access point settings for macro network GPRS on the PMX network.
Reliability Class
Sets the required level of reliability when sending & receiving GPRS data. The values
determine whether sent data should be acknow ledged and whether or not the transmission
deals with data loss. There is a trade-off between speed and reliability i.e. the faster the
transmission, the less the qu alit y of the data can be guaranteed.
Delay Class
Sets the level of artificial latency on data transmission. If set to ‘Best Effort’, data will be
transmitted as quickly as current network conditions allow.
Precedence Class
Allows the GPRS data for this extension to be given a lower, eq ual or greater priority than the
data of other users.
___________________________________________________________________________________
LTGSM User Manual C16 Confidential
Peak Throughput
Provides a throttle for the extens ion’s data by setting the fastest rate at which data may be
transmitted (measured in b y tes per second).
Mean Throughput
Set the maximum amount of data which may be transmitted by the extens ion (measured in
bytes per hour). If set to ‘Best Effort’, as much data as cur rent ne twork con ditions a llow will be
transmitted.
Advanced Tab
Authentication Type
Sets the algorithm to be used to decrypt the Ki value e.g. ‘Milenage’ or ‘GSM- A’. Such types
would be used where the Ki’s are held on the PMX system itself. If your system uses SIM’s
issued by PMN, it is likely that the Ki values will not be divulged to you or held on your
system. They will be held centrally by PMN and authentication would take place by means of
‘authentication triplets’ sent via HTTP. Under this authentication method, your PMX system
will request authentication via one of 10 possible HTTP connections whereby a randomly
generated number is run through an algorithm and the resultant response from the SIM
checked against the result given by the central database. If the values are different,
authentication will fail. Where HTTP is used, a Ki value cannot be entered.
Ki
This is a code programmed on the SIM in addition to the IMSI. The Ki can only be determined
by means of an algorithm used during a call. The Ki cannot be determined by a card reader
and ensures that a ghosted SIM is not being used. For 3
supplied by a macro network provider, the Ki will be unknown to PMX and auth entication will
___________________________________________________________________________________
LTGSM User Manual C17 Confidential
rd
party SIM’s such as those already
not be possible. Where the SIM has been supplied by PMN, the Ki will be known and usable
as it is programmed by PMN.
Enable ODB
This sets whether or not Operator-Determined Barring will be used. ODB allows PMX to bar
calls from the extension to certain number types such as international or premium rate
numbers.
Operator-Determined Barring
The value set in this field is a combined value of the various number types that are either
allowed or disallowed. Eac h com bination will give a unique value, which may be entered here.
In most situations, ODB will not be applicable. Barring of calls may be achieved by the PMX
routes or by restrictions on the network beyond the PMX gateway. It may be required where
the PMX system links up with other network providers under roaming arrangements.
Diverts Tab
As described previously in this document, there may be a requirement to forward / divert calls
to other destinations under certain conditions. For example, you may wish to divert calls to a
voicemail system or a switchboard if an extension is busy. These diverts may either be set at
tenancy level, i.e. all extensions within the tenancy will follow the same diverts or they may be
set on individual extensions as described below. Extens ion diverts will take precedence over
tenancy diverts.
Active?
Against each divert type is a tick box labelled ‘Active?’. Wh en ticked, the divert will become
active and, when un-ticked, the divert destination will remain but the divert will no longer be
active.
All Calls
Otherwise known as an ‘unconditional’ or ‘immedi ate’ divert, the number defined in this field
will be called under all circumstances. This divert, once activated, will take precedence over
all other divert types.
Busy
Allows an alternative point of answer to be defined when the e xtension is bus y on an other call
and no second line is enabled on th e extension / handset.
NoAnswer
Sets an alternative point of answer when calls give no reply with in the ringing duration set in
‘Timeout’.
___________________________________________________________________________________
LTGSM User Manual C18 Confidential
Timeout
Defines the number of seconds the system will wait for an answer from the extension before
following the ‘No Answer’ divert to the defined number.
Not Reachable
In circumstances where it can no longer be estab lished th at the e xtension is register ed on the
system i.e. the handset is switched off, is no longer within range of an access point or has
roamed to another network, the system will divert calls to the number defined he re.
Allow User to Alter Diverts
The diverts set on this tab may be defined exclusively by the administrator, in which case this
box should remain un-ticked, or you may wish to tick the box in order to allow divert
commands from the handset to update the divert destinations.
Provisioning Method 2
Firstly, you must set up at least one ‘device’ which is allowed to extension SIM cards onto the
network. From the tenancy list, select the tenancy by using either the link on the tenancy ID or
name. This will bring you to the ‘T en an c y Menu’:
Click on the ‘Devices’ icon and you will be presented with the list of devices. Select ‘Add
Device’.
Add the IMEI number for the handset you wish to use in orde r to provision your SIM cards.
The IMEI number is the unique device number for that handset and can be obtained by
keying *#06# on the handset itself. A number of 15 or more digits in length will be presented
on screen. Enter this number in the IMEI field and give the handset a me aningful description.
Click ‘Accept’ to save the details.
Having added a device capable of provisioning extens ions, go back to the ‘Tenancy Menu’
and click on the ‘Pending Provisions’ icon.
___________________________________________________________________________________
LTGSM User Manual C19 Confidential
This will bring you to the list of extension waiting to be provisioned onto the system. Select
‘Add Pending Provision’ to be taken to the ‘Add Pending Provision’ screen:
From the device drop-down list, select the device you wish to use, then fill in the rest of the
details as per ‘Provisioning Method 1’. Repeat this pro cess as many times as necessary to
add the extensions required into the pending provisions list.
Once your pending provisions list is complete, place a SIM c ard into the handset and switch
on. If the phone does not automatically find the PMX network, use the handset’s menus
(consult the handset manual for details) to locate the network provider selection feature and
select the network detailed in your network diagram. The SIM card will be provisioned against
the first entry in the ‘Pending Pro v isio ns’ list.
Once provisioned, the SIM card will appear in the extensions list and may be removed from
the provisioning device and used in any mobile handset.
This process should be repeated until all pending provisio ns are completed and shown in the
extensions list. A careful note should be made of whic h order the SIM cards were registered
so that you know which extension number will have been allocated to each card.
Once configured, a provisioning device may be edited or deleted (once th e las t extension d ue
to be provisioned by that device has been successfully added).
Once you have created provisions in this ma nner, you may use the exten sions icon to further
edit the details of the provision and create GPRS, advanced and divert settings.
___________________________________________________________________________________
LTGSM User Manual C20 Confidential
SMS Distribution Lists
As a PMX system administrator, you may create SMS distribution lists in or der to send text
messages simultaneously to multiple recipients.
From the tenancy menu, select ‘Distribution Lists’.
You will be presented with a list of existing Distribution Lists. To create a new list, select ‘Add
Distribution List’.
Give the list a suitable name and add the required PMX extensions by highlighting them in the
‘Available Extensions’ list and clicking the right arrow to move them to the ‘Selected
Extensions’ list. Click ‘Accept’ to save the list.
Once a list has been configured, you may select the ‘Send SMS’ icon in the ‘Tenancy Menu’.
___________________________________________________________________________________
LTGSM User Manual C21 Confidential
Enter a value in the ‘SMS From’ field so recipients of the message will know who the
originator is. Please note that recipients will not be able to reply to messages sent with a
textual value or a number which does not exist. If you do wish recipients to reply to the
message, please ensure that you enter a valid PMX extension or macro network mobile
number.
Enter the text in the ‘Message’ field, up to a maximum of 160 characters.
Select the appropriate distribution list from the drop-down menu and click ‘Send SMS’.
NOTE: It is not possible to add external mobile numbers to distribution lists. Only PMX
extensions may be selected, although if a selected handset is “off net” and is on the ‘Normal
Subscriber’ profile, the system will attempt to deliver messages to the ‘External Mobile
Network Number’ defined against the extension.
___________________________________________________________________________________
LTGSM User Manual C22 Confidential
Gateways
Although a PMX system may act as a completely self-contained network, most will almost
certainly need to receive calls from and ma ke calls to a w ider netwo rk and th e PSTN. In order
to achieve this, the system must have a connection to at le ast one gateway. The gate way will
take the SIP messaging used by PMX and relay it to o ther SIP-enabled devices or convert it
to traditional TDM (Time Division Multiplex) protocols such as DPNSS or DASS. The details
of any gateway can be added using PMX Administrator and routes assigned to determine
which numbers will be placed out via each gateway.
Gateways may be allocated to the system i.e. made available for use by all tenancies , or be
assigned for use by one specific tenancy only.
In order to configure a gateway, browse to ‘System Settin gs’ and follow the ‘Gateways’ link
from the ‘System Settings’ menu.
You will be presented with the list of gateways:
___________________________________________________________________________________
LTGSM User Manual C23 Confidential
Select ‘Add Gateway’ to be pr es ented with the gateway config uration screen:
The ‘Type’ drop down list offers a choice of SIP and SMSC. Choose SIP for voice calls or
SMSC to set the gateway as an SMS Controller. The port number should be set to 5 060 for
SIP and 5080 for SMSC. These defaults may be changed if required.
The tenancy drop-down list offers a choice between ‘System’ and any existing tenancy
names. Select ‘System’ if the gateway is to be used by all ten ancies or the appropriate n ame
if only to be available to one tenancy.
___________________________________________________________________________________
LTGSM User Manual C24 Confidential
If you choose SMSC, you will be presented with a slightly different screen:
On many systems, the fields which are blank in the above screenshot may be left blank as
they will not be required. Only where the SMSC needs to register with a call server will the
SMS Centre Number (normally 8980449), SIP Password, Registrar and Proxy need to be
used in order to register onto the call server.
An IDD field may be seen in some versions of PMX Administrator. Its function is to set the
International Dialling Digits for the country where the gateway is located. For example, to dial
an international number from the UK, a prefix of 00 is required. The IDD will be used to
replace a plus symbol (+) at the front of any dialled numb er. Later versions do not inc lude the
setting as it is automatically handled by the MSC.
The PMX Administrator installation process creates two Microsoft Message Queues:
to_mms is used to deliver text messages to numbers not on PMX.
gsmregistrations is used to store text messages for extensions which are not currently
registered on PMX e.g. when the handset is switched off or out of the PMX coverage area.
When the handset re-registers with PMX, the queue d me ssages are delivered.
These two queues would normally be defined as shown in the scre enshot as these are the
standard naming convention. They may b e altered if requ ired. If the system is s et up to used
private instead of public queues, this screen offers the ability to defined the queue names as
.\private$\to_mms
and
.\private$\gsmregistrations
___________________________________________________________________________________
LTGSM User Manual C25 Confidential
Routes
Having created a gateway, you then need to decide w hich dialled numbers to send to that
gateway. When a SIM card is provisioned, you are asked to ente r an extension number to be
associated with that SIM along with any external number which may also be used in a dual
SIM handset. The purpose of the ‘External Mobile Network Number’ field is twofold. Firstly,
PMX will recognise the number and, if dialled by another extension on the PMX system, calls
can be routed to the associated handset without breaking out to the PSTN, thus saving on call
costs. Secondly, if the associated handset is “off net” we have a secondary means of
attempting to contact the user. In order to dial the number on the PSTN, there must be a
gateway which provides that connection.
To create a route, browse to the ‘Tenancy Menu’ and select ‘Routes’.
You will be presented with the list of routes:
Click on ‘Add Route’.
When creating a route, you will be presented with four main configuration sections. Changes
made in any tab may be saved at any time by clicking ‘Accept’. You will be returned to th e list
of routes. Further changes to routes may b e made by selecting the one you require from the
list.
___________________________________________________________________________________
LTGSM User Manual C26 Confidential
General Tab
Description
Allows a meaningful description for the function of the route to be given.
Emergency Route
If ticked, this box will indicate to the system that this route is to be used for r outin g em ergency
traffic. Every PMX system is pre-configured with a partially-built ‘SOS Route’ as described
earlier in this document so normally there is no need to add further routes for emergency
traffic. In most case, the box will remain un-ticked so that the route will handle ‘ordinary’
traffic.
Transmission Types
Simply tick the box for each type of transmission you wish to send along this route.
Predominantly, ‘Voice call’ will be the preferred option.
Destinations Tab
This allows you to decide where calls following this route will be sent. You may add a single
or multiple gateways (or extensions if required). Where multiple gateways are selected, PMX
will evenly load balance calls between all destinations. It may be appropriate to send calls to
particular numbers out via a certain gateway. For example, if one gateway has a connection
to an LCR (Least Cost Router) d evice, you may wish to send calls to 07 numbers via this
gateway to take advantage of lower ca ll co sts to the PSTN.
Click on the ‘Destinations’ tab to see the list of destinations.
Click on ‘Add Destination’ to sele ct from the list of available gatewa ys / extensions.
___________________________________________________________________________________
LTGSM User Manual C27 Confidential
Patterns Tab
Patterns are the numbers or number prefixes PMX will try to match in order to determine that
this route should be followed. The pattern with the closest match to the dialled number will be
used. Patterns may be built up using wild card characters and numbers in brackets. Some
examples are given below :
01845521000 This being a fully-defined number, PMX will look for an exact match.
07$ Any number beginning 07, regardless of the number of digits following this prefix.
0[12]XXXXXXXXX Any number beginning 01 or 02 followed by 9 digits of any value
(each X represents one digit of any value).
0[7-9]XXXXXXXXX Any number beginning 07, 08 or 09 followed by nine digits of any
value.
90$ Any number beginning 90. You may wish to incl ude patterns which cater for anyone
who puts a standard outside line prefix of 9 on the number. However, it is unlikely that this will
be required as mobile phone users never need to use an outside line prefix in any other
mobile environment.
D Any single character from 0 t o 9 in clu siv e .
N Any single character from 1 t o 9 in clu siv e .
Click on the ‘Patterns’ tab t o se e th e list of patterns.
Click on ‘Add Pattern’ to define the dialled numbers which are to follow this route. Repeat as
required.
___________________________________________________________________________________
LTGSM User Manual C28 Confidential
Translations Tab
Translations are made up of two component parts, each referred to as a ‘transform’. These
are the ‘CLI Transform’ and the ‘Destination Transform’.
Click on the ‘Translations’ tab to see the list of translations.
Click on ‘Add Translation’ to be presented with the ‘General’ tab for the translation where you
may give the translation a meaningful description and state whether the translation is to be
applied as part of an emergency route.
CLI Transforms
When passing out calls to a gateway, it may be necessary to modify the CLI of the calling
extension to a number more appropr iate to the recipient of the ca ll. Ordinarily, calls betw een
PMX extensions would display the extension number. When dialling to a number on the
PSTN, the extension number is not appropriate so the CLI may be modified so that the ‘DDI
Number’ for the calling extension is delivered. The CLI trans form can be given a meaningful
description and an ‘output mask’. The output mask uses the same construction method as
patterns.
To take a practical example, an internal number of 78002 has a DDI of 01845528002
associated with it. The output mask would be 0184552XXXX . The four X’ s tell PMX to ou tput
a CLI of 0184552 followed by the last four digits of the extension number.
Click on the ‘CLI Transforms’ tab so see the list of CLI transforms.
___________________________________________________________________________________
LTGSM User Manual C29 Confidential
Click on ‘Add CLI Transform’ to create a description and output mask:
The output mask may take values from the configured patterns based on two wild card
character types:
X or _ - by entering an X or an underscore, the ou tput mask (as shown in the screenshot
above) will use any literal value and suffix it with digits taken from the pattern. In this example,
a prefix of 0184552 will be used and the last four digits of the output number will be the last
four digits derived from the number on the pattern. So, if the CLI is 78123 the output will be
01845528123.
$ - entering the dollar wild card in the output mask brings the “Truncate Characters” fu nction
into play. Instead of taking the set number of characters fro m the end of the pattern (as in the
example above), truncating the pattern means that a set number of characters from the
beginning of a pattern will be dropped. So, if this transform were to allow patterns of differing
lengths but where the prefix was th e same, the prefix could be removed without the need to
define separate transforms. For example, patterns of 78XXXXXX and 78XXXXXXX may be
allowed on the transform and you wish to output the n umber minus the “ 78” prefix, regar dless
of how many digits follow. Defining an output mask of 0845$ with a value of “2” in Truncate
Characters will cause the “78” to be dropped and the output will be 0845 followed by a 6 or 7digit number.
Entering a dollar in the output mask without a value in ‘Truncate Charac ters’ (or vice versa)
will generate an error message.
N.B. The dollar wild card only has this function in an output mask. On a pattern, the dollar will
still denote any number of characters of any value.
Click ‘Accept’ to save the transform and return to the list of CLI transforms . From the lis t, click
the ‘Configure’ icon to continue entering details.
___________________________________________________________________________________
LTGSM User Manual C30 Confidential
Click the ‘Patterns’ tab to see the list of patterns for the CLI transform.
Click on ‘Add Pattern’ to determine which extension CLI’s need to be modified:
Once configured, the CLI transform must be enabled to take effect:
NOTE : Telecoms regulation s in the c ountr y or countr ies wher e the s ystem is to opera te may res trict the CLI you a re
able to deliver to the PSTN. Only ‘trusted’ E1 or T1 links may be allowed to deliver any chosen CLI.
___________________________________________________________________________________
LTGSM User Manual C31 Confidential
Destination Transform
The purpose of this transform is to modify the dialled number into any alternative form as
required by the gateway. For example, the gateway may be required to dial external numbers
using international number format e.g. 441845528002 when the user has dialled
01845528002. As with the CLI transform, an output mask is req uired. In the example above,
the mask would be 44XXXXXXXXXX (10 X’s) so that the number dialled by the gateway
would be ‘44’ followed by the last 10 digits of the nu mber entered by the ca ller . PMX th erefore
adds ‘44’ and drops the leading zero. Not only is an output mask required but we need to
know when to apply that mask. Therefore, at least one pattern is also required. In th is case,
the pattern applies to the calling extension numbers i.e. when PMX sees a call from
extensions matching the pattern, the destination transform will be applied. Where PMX
extensions are in the range 78000 to 78999, a pattern of 78XXX (3 X’s) could be applied so
that calls from any extension in the 78xxx range would u se th e transform.
Click on the ‘Dest Transforms’ tab to see the list of destination transforms.
Click on ‘Add Destination Transform’ to create a description and output mask (including
‘Truncate Characters’ rule if required):
The output mask may take values from the configured patterns based on two wild card
character types:
X or _ - by entering an X or an underscore, th e output mask (as shown in the screenshot
above) will use any literal value and suffix it with digits taken from the pattern. In this example,
a prefix of “44” will be used and the last ten digits of the output number will be the last ten
digits derived from the number on the pattern. So, if the destination is “01845528100” the
output will be “441845528100”.
$ - entering the dollar wild card in the output mask brings the “Truncate Characters” fu nction
into play. Instead of taking the set number of characters fro m the end of the pattern (as in the
example above), truncating the pattern means that a set number of characters from the
beginning of a pattern will be dropped. So, if this transform were to allow patterns of differing
lengths but where the prefix was th e same, the prefix could be removed without the need to
define separate transforms. For example, patterns of “0XXXXXXXXX” and “0XXXXXXXXXX”
___________________________________________________________________________________
LTGSM User Manual C32 Confidential
may be allowed on the transform and you wish to output “44” plus the dialed number minus
the “0” prefix, regardless of how many digits follow. Defining an output mask of 0$ with a
value of “1” in Truncate Characters will cause the “0” to be dropped and the output will be “44”
followed by a 9 or 10-digit num ber.
Entering a dollar in the output mask without a value in ‘Truncate Charac ters’ (or vice versa)
will generate an error message.
N.B. The dollar wild card only has this function in an output mask. On a pattern, the dollar will
still denote any number of characters of any value.
Click ‘Accept’ to save the transform and return to the list of CLI transforms. From the list, click
the ‘Configure’ icon to continue entering details.
Click the ‘Patterns’ tab to see the list of patterns for the destination transform.
Click on ‘Add Pattern’ to define the dialled numbers which will be transformed:
Once configured, each transform must be enabled for it to take effect.
The route itself must then also be enabled for all its components to come into effect.
___________________________________________________________________________________
LTGSM User Manual C33 Confidential
Tenancy Translations
In addition to the translations applied against a route, PMX allows translations to be configured against
internal numbers. In this case, the destination is assumed be an extension number not a gateway, so no
destination can be specified. A practical example of a tenancy translation is where the gateway presents
calls to PMX with the destination digits in a format not matching the extension number scheme e.g. with a
network node prefix. A translation would be required to remove the prefix from the received digits to match
them to a number in the tenancy’s ranges.
Another example would be where you wish to use a long number for your extensions but allow users to
dial a shortened version of that number for ease of use.
To create a tenancy translation, browse to the ‘Tenancy Menu’ and select ‘Translations’.
You will be presented with the list of translations:
Click on ‘Add Translation’ to create a description and flag as an emergency translation if required:
Click ‘Accept’ to create the translation and drop back to the list of extensions.
Select the translation from the list to continue configuring details.
___________________________________________________________________________________
LTGSM User Manual C34 Confidential
In this example, no CLI transform is required because calls will be routed within PMX. Therefore, the
internal extension number is valid as the CLI to present.
Click on ‘Add Destination Transform’ to add a description and output mask (with a ‘Truncate Characters
rule defined, if required):
Click on ‘Add a Pattern’ to determine which dialled numbers should be modified by the transform:
The transform must then be enabled to take effect:
___________________________________________________________________________________
LTGSM User Manual C35 Confidential
Presence
Each extension will appear in a list of provisioned numbers within the selected tenancy. The list is
accessible via the ‘Tenancy Menu’ by clicking on the ‘Presence’ icon.
You will be presented with the following screen:
The list may be sorted by any of the column headings or may be filtered by searching on the selected
column heading (indicated by two asterisks).
The LA column will show which Location Area the user is currently in.
The first icon
not currently on the network. When on the PMX network, the icon will be green.
The second icon
on the network and therefore not on a call. When the user is on the network but not in call, the icon will be
blue. When on a call, the icon will be pink.
Please note that this screen does not update in real time. To get the most up-to-date view, click the
refresh button.
indicates the extension’s current subscription status. A grey icon means that the user is
indicates the extension’s current call status. A grey icon means that the user is not
___________________________________________________________________________________
LTGSM User Manual C36 Confidential
Appendix D - I/O Connector Pinouts
Ethernet Port
There is one (1) Ethernet port on the Laptop and one on each of the BTSs.
Pin Wire Color Signal
1 White Orange TX+
2 Orange TX3 White Green RX+
4 Blue POE
5 White Blue POE
6 Green RX7 White Brown POE
8 Brown POE
Ethernet Cable Pin Outs “Cross Over Cable”
Below is a pin for an Ethernet cross over cable. No Pin Out is provided for a straight
through cable, because it is simply straight through.
This subsection includes the following GSM-1900 ARFCN tables:
GSM-1900 A-Band ARFCN - Frequency (in MHz) Table F-1
GSM-1900 B-Band ARFCN - Frequency (in MHz) Table F-2
GSM-1900 C-Band ARFCN - Frequency (in MHz) Table F-3
GSM-1900 D-Band ARFCN - Frequency (in MHz) Table F-4
GSM-1900 E-Band ARFCN - Frequency (in MHz) Table F-5
GSM-1900 F-Band ARFCN - Frequency (in MHz) Table F-6