Professional Documents
Culture Documents
Version: V4.11.10
ZTE CORPORATION
NO. 55, Hi-tech Road South, ShenZhen, P.R.China
Postcode: 518057
Tel: +86-755-26771900
Fax: +86-755-26770801
URL: http://ensupport.zte.com.cn
E-mail: support@zte.com.cn
LEGAL INFORMATION
Copyright 2011 ZTE CORPORATION.
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided as is, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
The ultimate right to interpret this product resides in ZTE CORPORATION.
Revision History
I
4.4 UDS Function .................................................................................................... 4-4
4.4.1 UDS Functions Overview .......................................................................... 4-4
4.4.2 Multi-Level Data Backup and Restoration................................................... 4-5
4.4.3 Replication and Synchronization................................................................ 4-7
II
8.2.9 Anti-Static Requirements .......................................................................... 8-4
8.2.10 Lightning Protection Requirements .......................................................... 8-5
8.2.11 Quakeproof Requirement ........................................................................ 8-7
Figures............................................................................................................. I
Tables ............................................................................................................ III
Glossary .........................................................................................................V
III
IV
About This Manual
Purpose
This manual provides an overall introduction to ZXUN USPP (EIR), including the role,
applications, characteristics, system structure, basic services, basic functions, interfaces,
protocol stack, networking modes, technical indices, security measures and environmental
requirements.
In this manual ZXUN USPP (EIR) is also called EIR for short.
Intended Audience
This manual is intended for ZXUN USPP (EIR) specialists and maintenance personnel.
Chapter Summary
Chapter 3, Basic Services Describes the basic services of ZXUN USPP (EIR).
Chapter 4, Basic Functions Describes the basic functions of ZXUN USPP (EIR).
Chapter 5, Interfaces and Protocol Stack Describes the interfaces and protocol stack used in
ZXUN USPP (EIR).
Chapter 6, Networking Modes Describes the networking modes of ZXUN USPP (EIR)
of different scales.
Chapter 8, Security Measures and Describes the security measures and the environmental
Environment Requirements requirements of ZXUN USPP (EIR).
Appendix A, Narrowband SS7 Signaling Describes the narrowband SS7 signaling protocols that
Protocols the interfaces of ZXUN USPP (EIR) may use.
I
Chapter Summary
Appendix B, SIGTRAN Protocols Describes the SIGTRAN protocol that the interfaces of
ZXUN USPP (EIR) may use.
Appendix C, MAP Protocol Describes the MAP protocol that the interfaces of
ZXUN USPP (EIR) may use.
Changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
Conventions
ZTE documents employ the following typographical conventions.
Typeface Meaning
Bold Menus, menu options, function names, input fields, radio button names, check
boxes, drop-down lists, dialog box names, window names.
CAPS Keys on the keyboard and buttons on screens and company name.
II
Declaration of RoHS
Compliance
To minimize environmental impacts and take more responsibilities to the earth we live on,
this document shall serve as a formal declaration that ZXUN USPP (EIR) manufactured
by ZTE CORPORATION is in compliance with the Directive 2002/95/EC of the European
Parliament - RoHS (Restriction of Hazardous Substances) with respect to the following
substances:
l Lead (Pb)
l Mercury (Hg)
l Cadmium (Cd)
l Hexavalent Chromium (Cr (VI))
l PolyBrominated Biphenyls (PBBs)
l PolyBrominated Diphenyl Ethers (PBDEs)
ZXUN USPP (EIR) manufactured by ZTE CORPORATION meets the requirements of EU 2002/95/EC;
however, some assemblies are customized to client specifications. Addition of specialized,
customer-specified materials or processes which do not meet the requirements of EU 2002/95/EC
may negate RoHS compliance of the assembly. To guarantee compliance of the assembly, the need
for compliant product must be communicated to ZTE CORPORATION in written form.
This declaration is issued based on our current level of knowledge. Since conditions of use are
outside our control, ZTE CORPORATION makes no warranties, express or implied, and assumes no
liability in connection with the use of this information.
I
II
Chapter 1
Product Overview
Table of Contents
Role of EIR.................................................................................................................1-1
Functions of EIR.........................................................................................................1-2
Characteristics ...........................................................................................................1-4
Note:
IMEIs are used for a GSM/UMTS system, and MEIDs are used for a CDMA system. This
manual takes IMEIs as an example to introduce ZXUN USPP (EIR). The purpose of IMEIs
for GSM/UMTS is the same as MEIDs for CDMA.
The MEs is classified as white listed, grey listed, black listed or it may be unknown as
specified in TS 22.016 and TS 29.002. The IMEI of the MEs are in their certain list.
ZXUN USPP (EIR) contains one or several databases which store the IMEIs used in the
GSM/UMTS system and list attributes as white listed, grey listed or black listed.
The following figure shows the location of EIR in the mobile network by taking GSM/UMTS
as an example.
1-1
1-2
IMEIs may be stored in the lists in form of individual IMEIs or IMEI ranges. An IMEI
range has a common TAC and FAC for the IMEIs included.
ZXUN USPP (EIR) supports both formats of IMEI and IMEISV.
l ZXUN USPP (EIR) supports IMEI range match. IMEI ranges shall configure category
of white, grey or black. That means all IMEIs in the same range have the same
category.
When EIR receives check IMEI message, EIR first queries the database with individual
IMEI. If the record is present, EIR returns this IMEI. If the record is not present, EIR
matches with IMEI ranges, and returns the IMEI range list category.
l ZXUN USPP (EIR) provides three levels of list match.
The first level is single IMEI match. If the IMEI is found, EIR returns the list of the IMEI.
The second level is IMEI range match. If IMEI could not be found in the database,
then EIR searches the IMEI ranges. If the IMEI range that contains the IMEI is found,
EIR returns the list of the IMEI range.
The third level is the setting of default list. If the IMEI could not be found among the
individual IMEIs or the IMEI ranges, EIR returns the default list.
l ZXUN USPP (EIR) supports the enhanced Check IMEI message which allows IMSI
and MSISDN to be provided as optional parameters.
l ZXUN USPP (EIR) could record the quantities of black lists, grey lists, and unknown
IMEIs.
If the system enables enhanced Check IMEI function, the quantity of unmatched IMSIs
is also recorded.
l ZXUN USPP (EIR) can identify a subset of handsets that use only one SIM card. Each
mobile station (MS) entry identifies one handset (IMEI) and one SIM card (IMSI). Other
SIM cards are not allowed with that handset.
ZXUN USPP (EIR) can check the MS list when processing a Check IMEI request. If
the carried IMEI appears in the list, ZXUN USPP (EIR) restricts its use to its associated
IMSI. If the IMSI carried in the Check IMEI request is different from the one associated
with the IMEI, ZXUN USPP (EIR) returns a response, indicating the IMEI status is
blacklist.
1-3
The International Mobile station Equipment Identity and Software Version Number
(IMEISV) is composed of the following elements (each element shall consist of decimal
digits only):
l Type Approval Code (TAC): Its length is 8 digits.
l Serial Number (SNR): It is an individual serial number identifying equipment within
each TAC. Its length is 6 digits.
l Software Version Number (SVN): It identifies the software version number of the
mobile equipment. Its length is 2 digits.
The Mobile station Equipment Identity (MEID) is composed of the following elements (each
element shall consist of hex digits only). Its format is as shown below.
1.3 Characteristics
1.3.1 Comprehensive Reliability
l The distributed architecture ensures that all front end (FE) nodes and back end (BE)
nodes work in a geographical redundancy mode of N+K load sharing.
l The BE provides triple-level data backup/restoration mechanism, namely, memory
level, local hard disk level and disk array level.
l The open ETCA platform provides high reliability, high integration, ease for expansion
and green and intelligent power saving technology.
l The system provides multi-level overload control for service processing, service
provisioning and network maintenance.
1-4
1-5
upon the following conditions: source IP address and port number, destination IP
address and port number, and type of service (ToS).
l Service Layer Security
Access control and view control allow only authenticated FEs to access
authorized subscriber data by specified operations including data creation,
reading, updating and deletion.
The encryption module provides hardware and software security encryption
mechanism to protect the private data (for example, Ki) and hence to protect
subscriber data.
1-6
1.3.6 Convergence
ZXUN USPP (EIR) can be deployed in convergence with GSM/UMTS HLR, CDMA HLR,
MNP, HSS or independently.
1-7
1-8
2-1
Figure 2-2 shows an instance of hardware configuration of a 42U-high cabinet, and Figure
2-3 shows an instance of hardware configuration of two 47U-high cabinets.
2-2
For more details the hardware of ZXUN USPP (EIR), refer to the ZXUN USPP Universal
Subscriber Profile Platform Hardware Description manual.
2-3
2-4
2-5
The data access interface module supports interaction with DSP interface, interaction
with the other nodes of the DSP inside the DSA cluster, as well as data transfer to
another DSA cluster.
l Memory Database module
The memory database module provides storing partitioning layer related data in
memory data base.
l Data Replication Module
The data replication module provides real-time and semi-real-time synchronization.
l Data Backup Module
The data backup module achieves data backup, backing up the data from the memory
database to the local hard disk and disk array.
l In addition, common modules of the storage layer include resource control &
management, IP switch and operating system. Other modules are based on the
common modules and new application modules can be added on the common
module flexibly.
FE Software Structure
FE provides multi-protocol stack, service logics and data access interfaces. In addition,
common modules includes resource control & management, IP switch and operating
system (OS), other modules are based on the common module and new application
modules can be added on the common module flexibly. ZXUN USPP (EIR) FE software
structure is as shown in the following figure.
2-6
SLB unit For the connection with E1/T1, an SLB SLB SLB
unit provides 32 E1/T1 links to the SS7
network, processes HDLC messages or
SS7 signaling messages below the MTP2
layer, and transfers MTP3 packets to SMP
modules.
For the connection with ATM over E1,
SLB units receive ATM cells from the
E1/T1 interfaces and then distribute them
to the TDM interfaces of the SLB blades
after time slot switching. The SLB blades
convert the TDM signals into ATM cells,
perform AAL5 fragments reorganization,
SSCS processing, and then transfer
service-related data to SMP modules.
RPU module Maintains the route table of the entire DPBA2 DPBB2
network element, and processes the route
packets received by SIPI units. The RPU
module refreshes its route table in real
time, constructs a transfer table based on
the route table, and then synchronizes the
transfer table to each SIPI unit.
Functions
The FE subsystem of ZXUN USPP (EIR) provides the following functions:
2-7
2-8
Functions
l Interface Processor:
Manages the IP connections with the BOSS.
Accesses all local DBIO servers.
Supports interface with BOSS in MML, SOAP, binary, or electronic worksheet
modes.
Distributes MML commands of BOSS to local DBIO, and returns the MML
acknowledgements of local DBIO to the BOSS.
l Agent:
Each module of the web agent realizes the following functions.
Web client: provides the web interfaces for you to provision services provided by
NEs.
Web resource server: saves the programs and files of the web client, and allows
the web client to download these programs and files.
Web agent server: communicates with the web client and the DBIO to perform
such functions as message forwarding, link management and web client
management.
l DBIO:
2-9
A UDS consists of one or more DSA clusters. A DSA cluster includes 180 DSA nodes.
With the UAGW module, the UDS supports access from third-party devices.
There are two types of DSA clusters: Identity DSA cluster (IDSA) and Profile DSA cluster
(PDSA). IDSA stores subscriber data routing information and transfers the directory data
access requests of FE or PROVISION to PDSA. PDSA stores subscriber data.
2-10
DSA nodes of a DSA cluster are of the same type, which means that DSA nodes of an
IDSA are all IDSA nodes and DSA nodes of a PDSA are all PDSA nodes.
In UDS, data may be stored in the following modes:
l Local storage
Data are saved on the hard disks of the DSA node.
l Storage transfer
Data are transferred by the DST node onto the hard disks of the DST node or on the
disk array connected to the DST.
Note:
The DST node provides the data persistency function for one or more DSA clusters.
Functionally, DST node belongs to the DSA cluster storage subsystem.
The UDS monitoring center implements the active/standby status maintenance, the
selection of the primary node, and the computing of inter-module links.
The monitoring center runs on the OMP module as an independent process. Every office
has a monitoring center, and one monitoring center may manage multiple DSA clusters.
Functionally, the monitoring center belongs to the DSA cluster distributed monitoring
subsystem.
The PROVISION subsystem uses the following hardware:
l In case of a 13U shelf
The DSA cluster runs over 64-bit CGEL on DPBA2 blades. The DST node runs over
64-bit CGSL on a DPBA2 blade.
l In case of a 14U shelf
The DSA cluster runs over 64-bit CGEL on DPBB1 blades. The DST node runs over
64-bit CGSL on a DPBB1 blade.
Functions
The UDS subsystem provides the following functions:
l Storing ZXUN USPP (EIR) application related subscriber data
l Ensuring high availability through synchronous duplication, active/standby
changeover as well as geographical redundancy
l Providing standard and exetended LDAP interfaces for other subsystems to access
subscriber data
l Overload control
l Load balancing between the receiving end and transmitting end within the UDS
subsystem
l Hot-patch function
2-11
Note:
Schema describes and defines the format of data stored in directory services,
including the object, attributes and DIT architecture of directory services.
2-12
Note:
2-13
Single-Layer Structure
When the NMS adopts the single-layer structure, its architecture is as shown in the
following figure. This structure is suitable for a small-scale office or a trial office. And
OMM may manage all NEs.
Note:
An OMM server can use a single computer or a dual-computer cluster.
Hardware
The NMS uses the following hardware:
2-14
An OMM server runs over 32-bit CGSL on a DPBX0 blade. The EMS server runs over
32-bit CGSL on an OPBA1 blade. The OMM clients and EMS clients each run over
32-bit Windows on a PC.
l In case of a 14U shelf
An OMM server runs over 32-bit CGSL on a DPBX1 blade. The EMS server runs over
32-bit CGSL on an OPBB1 blade. The OMM clients and EMS clients each run over
32-bit Windows on a PC.
Functions
The network element management subsystem performs the integrated and local
management of all other subsystems and virtual applications of ZXUN USPP (EIR).
l EMS communicates with OMM through the EMB interface. EMS implements
the operation, management and maintenance of all ZXUN USPP (EIR) devices,
including fault management, performance management, security management, log
management, topology management, signaling trace, global configuration and the
monitor console function.
l OMM communicates with the objects under management through ZTE-defined
interfaces. OMM implements the operation, management and maintenance of
the local ZXUN USPP (EIR) devices, including MML terminal, fault management,
performance management and trace management.
The structure of the fault recovery subsystem is shown in the following figure.
2-15
Functions
l Disaster Reserved Sync (DRSync):
Takes charge of bidirectional data synchronization between the active ZXUN USPP
(EIR) and the standby ZXUN USPP (EIR).
l Inspect and Control Centre (ICC):
Takes charge of management of user data on the ZXUN USPP (EIR), system control,
and the trusteeship, takeover, reclaim and giveback operations of the redundancy
protection system.
2-16
An HSM module is a hardware device that is used to encrypt sensitive data and has got
the certification from FIPS and CC.
The HSM subsystem is optional. If you need hardware encryption for encrypting Ki, for
the redundancy protection purpose, at least two HSM modules (working in active/standby
mode) are required for each office. HSM devices are outsourcing parts. For the hardware
composition of an HSM module, see the following table.
HSM PCI card 1 ZXUN USPP (EIR) implements key management and
data encryption and decryption through the HSM PCI
card.
Blank HSM USB Key At least 3 Used for operator authorization. There are three types
of HSM operators: HSM Admin, Domain, and Partition
Owner. Each operator should have at least one blank
HSM USB Key.
PED keyboard 1 External PED keyboard connected to the PCI card, used
for initialization and entering PED password.
For the software composition of an HSM module, see the following table.
Software Description
LunaPCI Installed on the PC where the HSM PCI card is mounted, used to update
HSM PCI driver, and to create the HSM configuration tool (Lunacm).
Lunacm is used for HSM initialization, partition creation, password policy
settings, and key backup and restoration.
HSM Client Runs on the PC where the HSM PCI card is mounted, used to generate
the serial numbers of encrypted keys.
Functions
SMP modules of the FE subsystem and DBIO modules of the PROVISION subsystem
request HSM PCI through HSM App (the encryption/decryption module) for encryption and
decryption.
The encrypted keys are saved on the HSM encryption/decryption module. During an
encryption or decryption process, the serial number of a key, instead of the content of
2-17
the key, is invoked. Therefore it is impossible to get the plain text by illegally decrypting
the encrypted text.
HSM encryption/decryption has the following features:
l The HSM subsystem saves the keys in the internal memory that no intruders can
access.
l The encryption/decryption modules (HSM App) are installed on PCs that have an HSM
PCI card mounted. No intruders can access the encryption/decryption modules from
an external network.
l Each HSM module has a micro controller and an encryption/decryption processor.
The security of an encryption/decryption module does not depend on the operating
system.
l Each HSM module provides a modification-proof space for key management. The
generation, use, storage and destroy of a key are all done inside HSM modules, and
no intruders can access the keys from an external network.
l Each HSM module has a special encryption/decryption processor that does all and
only encryption/decryption operations.
There three types of HSM operators, and each type has different operation permissions.
l HSM Admin: super administrator, mainly used for initializing HSM. During an
initialization process, when you fail to enter the correct PED PIN of an HSM Admin
user for the third time, the data in the HSM module is cleared.
l Domain: domain administrator. You must use the same domain administrator to back
up and restore the serial number of a key.
l Partition Owner: Used to create partitions and set password policies. The password
of a partition owner is used on HSM Client and HSM App.
2-18
The MSC or SGSN queries the IMEI status on the EIR, so as to reach the goal of managing
subscriber's mobile terminals.
3-1
The MSC queries the MEID status on the EIR, so as to reach the goal of managing
subscriber's MEs.
3-2
Function Description
MML terminal The MML terminal provides configuration and management of network
resources.
It also provides tools for data transmission, data backup and recovery.
4-1
Function Description
Fault management The fault management consists of two parts which are real-time alarm
display and alarm-relative operation.
Real-time alarm display shows the information of equipment alarms,
telecommunication alarms, service alarms and processing error alarms
through a GUI interface to arouse operator notification providing a list
which contains the details of alarm information including alarm origin,
alarm level, alarm time, alarm carrying, alarm cause, alarm type and
additional information.
Performance management The performance management provides statistic data about some
performance parameters and traffic data of the mobile system for
reference of operation departments.
With the maintenance terminal of performance management, you can
define performance measurement flexibly.
Topology management The topology management module collects topology information from
the source, and displays the topological relationships between MOs
and their running statuses through topology tree or topology map on
the user interface. The maintenance personnel can operate on the
topology map and navigate to different application interfaces.
Maintenance management l The system backup and restoration function provides a convenient
way for backing up and restoring the system configuration data.
l The task management function is used to manage timing tasks.
l The system monitor provides a unified platform to maintain and
manage the NE management system, through which users can
monitor and maintain the application server and the database
server.
l CN maintenance includes license management, KPI message
forwarding and USPP global management.
System management The system management provides the custom setting and system
time querying.
Query and statistics The EMS provides query and statistics on history alarms and
performance data.
Functions of OMM
The following table introduces the operation and maintenance functions of the OMM
system.
4-2
Function Description
MML terminal l The MML terminal provides user-friendly interfaces for the
configuration and management of network resources. It also
provides tools for data transmission, data backup and recovery.
l It also provides tools for device maintenance such as dynamic
management, board maintenance, diagnosis and test, patrol
management.
l Security management ensures the legal access to the system
by the user.
l Logs management ensures the query for user operation
information and user login status information.
Fault management The fault management consists of two parts which are real-time alarm
display and alarm-relative operation.
Real-time alarm display shows the information of equipment alarms,
telecommunication alarms, service alarms and processing error alarms
through a GUI interface to arouse operator notification providing a list
which contains the details of alarm information including alarm origin,
alarm level, alarm time, alarm carrying, alarm cause, alarm type and
additional information.
Performance management The performance management provides statistic data about some
performance parameters and traffic data of the mobile system for
reference of operation departments.
With the maintenance terminal of performance management, you can
define performance measurement flexibly.
Trace management l The failure observation helps to find the fault cause and locating
the fault quickly.
l The signaling tracing is to trace the signaling data of a specified
signaling link or of a specified subscriber to make an analysis of
service operation and the correctness of sent signaling. Signaling
tracing presents the signaling tracing contents and convenient
means of locating problems so as to facilitate debugging, querying
signaling flow and detecting the error existing in signaling
cooperation.
4-3
In normal cases, all FEs and BEs are active and there is no standby nodes. ZXUN USPP
(EIR) detects equipment and network failures and performs service switching action
automatically to minimize service interruption time.
4-4
4-5
ZXUN USPP (EIR) has three types of data restoration, as shown in Figure 4-3.
l Type 1: Data on the standby DSA node is restored from the active node.
l Level 2: Data in the memory of the standby DSA node is restored by copying data from
the local hard disk and then synchronizing the changed data from the active node.
l Level 3: Data in the memory of the standby DSA node is backed up by copying data
from the disk array or an external medium and then synchronizing the changed data
from the active node.
4-6
4-7
If a secondary node breaks down or the network breaks down between nodes, the primary
node cannot update secondary nodes successfully and will roll back the transaction, and
a failure response is sent to the application.
Figure 4-5 shows the asynchronous data replication procedure.
4-8
network connection is restored, the primary node re-sends the modification information to
secondary nodes.
4-9
4-10
5.1 Interfaces
5.1.1 Interfaces with Other NEs
The interfaces related to EIR in mobile network as follows:
5-1
l The S13 and S13 interfaces are between EIR and MME.
5-2
S13 interface enables ME Identity check procedure between MME and EIR as
described in 3GPP TS 23.401.
S13' interface enables ME Identity check procedure between SGSN and EIR as
described in 3GPP TS 23.060.
The SOAP/XML or MML protocol can be used on the interface between the BOSS system
and the PROVISION pool.
5-3
The network management interfaces are shown in the following figure. The devices are
managed by the OMM server, and the EMS server manages and maintains all the network
element devices in an integrated way by managing the OMM servers.
l EMS provides the interface for communication with the superior network management
center (NMC): CORBA interface.
l The interface between OMM server and objects of management (FE, BE) are defined
by ZTE.
l The interface between EMS server and EMS client and the interface between OMM
server and OMM client are the F interface.
l The interface between EMS server and OMM server is the CORBA interface or MML
interface.
5-4
Note:
In a single-layer network, there is no EMS. OMM provides CORBA interface for
communication with the superior NMC.
5-5
5-6
6-1
Multi-VLAN Partition
For networking with VLANs, the following VLANs should be created:
l The VLAN for local communication between OMP, OMM (server and clients) and
alarm boxes
l The VLAN for external communication of OMM
l The VLAN for external communication of EMS (for EMS to communicate with the local
OMM and the remote OMMs)
l The VLAN for storage access
l The VLAN for external access of the interface processor
l The VLAN for communication between ETCA shelves (in case of more than one ETCA
shelf)
The inter-connection between ZXUN USPP (EIR) switch and PE adopts ports of three
layers, and therefore there is no VLAN for it.
6-2
The system consists of two sites, with each site configured with an FE and BE nodes.
l Each site accesses the IP signaling network through its corresponding FE node.
l The IP network for data sync implements the data sync and access between DSA
nodes in the two sites and the data sync and access between FE and BE in different
sites.
l The sites access the network management system and BOSS through the IP signaling
network.
The EMS may be installed in either one site. EMS is used to maintain the ZXUN USPP
(EIR) system and accesses the NMS superior network management system so that the
OMM of each site do not have to directly access the NMC.
6-3
In the ZXUN USPP (EIR) system, the nodes of FE and BE are distributed at three sites.
l The three sites synchronize and access the internal node data of DSA between the
office addresses through the IP network (data synchronization network).
l The three sites access to the superior NMC and the BOSS system through the IP
network (management network).
l The three sites access to the IP signaling network through the FE nodes, respectively.
ZXUN USPP (EIR) selects one from the three sites for installing the EMS, performs ZXUN
USPP (EIR) system maintenance, and completes the access to the NMC.
All FE nodes and BE nodes work in load sharing mode. The following figure shows a
possible case of taking over for disaster tolerance.
6-4
In normal situation, each DSA node bears 1/3 load. When a fault occurs on one of the
DSA nodes, the other DSA nodes take over the load of the faulty DSA node and remain
working in the load-sharing mode.
6-5
6-6
The physical specifications of a 47U cabinet of ZXUN USPP (EIR) are given in the following
table.
7-1
7.2 Capacity
The typical capacity indices of the ZXUN USPP (EIR) are shown in the following table.
Parameter Value
7-2
Parameter Value
Parameter Value
7-3
Parameter Value
7-4
8-1
Parameter Index
Net height 3m
-48VGND is provided by the primary power supply and is not connected to GNDP, GND
or the rack.
1. The temperature and humidity of the operating environment inside the equipment room are measured
at the spot that is 1.5 m above the floor and 0.4 m before the equipment when there is no protective
plate in front or back of the equipment rack.
2. Short-term operation means that the equipment works continuously for no more than 96 hours and
works for no more than 15 days in one year.
8-2
The electric field intensity and the magnetic field intensity of the equipment room should
meet the following requirements:
l Electric field intensity 130 dB (V/m)
l Magnetic field intensity 800 A/m
The equipment room should adopt proper shielding measures to reduce the interference
of the external electromagnetic environment on equipment in the equipment room and
interference between different devices in the equipment room.
The equipment room should be far from high power radio transmitting stations, radar
stations and high-frequency strong-current devices. The actual radiant energy received
by the equipment room should be controlled under 300 mV/m. The magnetic field intensity
around the equipment room should be less than 11 Gs.
8-3
The fire fighting water reserve should be sufficient for 2 hours use. However, the water
pipes (including drain pipes and rainwater pipes) should not cross the equipment room,
and the fire hydrants should not be placed in the equipment room.
8-4
l Remove insulated oil films, resin and rubber from anti-static mattresses, floors and
ground mats in a timely manner. The ground mats must be cleaned with neutral
detergents or anti-static agents.
l Anti-static instruments, tools and static-sensitive materials should bear clear
anti-static signs. The anti-static grounding system should have a clear grounding
sign and descriptions.
l During device operations, the service personnel should follow anti-static regulations,
such as wearing anti-static clothes or anti-static wrist straps.
l To completely control electrostatic on human bodies, the working chairs should also be
anti-static. Do not used chairs with common artificial surface, chemical fabric surface
or plastic surface. Do not replace anti-static chairs with wood chairs.
Item Requirements
Equipment Room The equipment room building should be built with the reinforced concrete
Foundation structure.
Requirements The building should have a lightning rod or other protection devices against
direct lightning flashes.
The building and the equipment room should share the same grounding body.
The AC power The telecom station should have a special power transformer. The power
should be supplied cable should have metal or insulated casing and connected to the telecom
by the TN-S power station through an iron pipe that is buried underground. The ends of the
supply system. metal casing or the iron pipe should be grounded. The buried part should be
no shorter than 15 m.
Seamless zinc oxide varistors should be installed on the three live lines on
the low-voltage side of the AC power transformer of the telecom station and
grounded. The transformer shell, the AC zero line on the low-voltage side and
the metal casing on the power line connected to the transformer shell should
be grounded at a convenient location.
Ingress power lines Ingress and egress lines of the telecom station should not be overhead AC/DC
should be installed power lines.
with surge arresters. After low-voltage power lines are conducted into the equipment room, they
should be installed with power arresters in the AC voltage regulator and the
AC distribution panel (box). The arresters should be grounded at a convenient
location.
If the telecom station is built in a city, it is recommended to install power
arresters with a nominal current of no less than 20 kA. If the telecom station is
built in the suburban area of a region with a middle keraunic level or above, it
is recommended to install power arrestors with a surge discharge current of
more than 60 kA. If the telecom station is built in the mountainous area of a
8-5
Item Requirements
DC power The DC working grounding wire of the telecom station (usually the positive
distribution pole of -48 V DC power or the negative pole of 24 V DC power) should be
grounding connected to the nearest indoor main earthing conductor. The ground wire
should meet the maximum load requirements of the equipment.
The power devices that supply power to the telecom station should have DC
working ground wires that are connected to the main earthing conductor of the
telecom building (or the main grounding busbar of the equipment room).
Equipotential The communication devices and auxiliary devices (base stations, transmission
Bonding devices, exchange devices, power sources, wire distribution frames, etc.)
in the equipment should be grounded. The ground wires of devices in one
telecom station should be connected to the same main grounding busbar; the
ground wires of devices in the same equipment room should be connected to
the same grounding busbar in the equipment room.
The working ground wires and protection ground wires share the same group
of grounding network.
The cable racks, hanging iron shelves, racks or shells, metal ventilation pipes
and metal doors and windows should also be grounded with protection ground
wires.
General grounding AC neutral lines should NOT be connected to the protection ground wires of
requirements telecommunications devices in the equipment room.
Fuses and switches should NOT be installed on ground wires.
All ground wires should be as short and direct as possible and avoid curling.
Wiring requirements Overhead signal cables should not be used in the telecom station. Signal
of signal cables cables should be connected to the telecom station from underground.
Ingress/egress communication cables should have metal or insulated casing
or placed in metal pipes.
The ground wire of an arrestor should be as short as possible. Unused cable
pairs should be grounded with the protection grounding wire in the equipment
room.
8-6
Item Requirements
Main earthing The main earthing conductor should be a ring earth electrode or a grounding
conductor busbar.
requirements The ground wire should not use aluminum materials. Galvanic corrosion
prevention measures should be taken when different metals are connected.
The main earthing conductor should be copper or galvanized flat steel busbar
with a cross-sectional area of no less than 120 mm2. The main earthing
conductor should be insulated from reinforced steel bars in the building.
Earth lead The earth lead should be no longer than 30 m. It should be made of galvanized
requirements flat steel with a cross-sectional area of 40 mm 4 mm or 50 mm 5 mm.
8-7
8-8
A-1
Because the links configured on the database are one-to-one corresponding to the
processing modules, the link management and message transmission is directly related
to only the configured L3 module. The links managed by MTP2 can be of 64 k, n64 k, or
2M.
Signaling Unit
In the narrowband SS7, the signaling messages and other messages generated at the
user part are transmitted in the form of signaling unit over the signaling links.
The narrowband SS7 has three different signaling units, Message Signaling Unit (MSU),
Link Status Signaling Unit (LSSU), and Fill-in Signaling Unit (FISU).
The arrows shown in from Figure A-2 to Figure A-5 indicate the sequence in which the
messages are sent.
A-2
A-3
Functions
The functions of the MTP2 protocol module include:
l Delimits and locates the signaling units: both the start and the end of each signaling
unit have a special 8-bit code that is called tag, ensuring that the code will not appear in
other locations of the unit. If non-allowed bit code pattern (more than six consecutive
ones) are received during the delimitation, or the signal unit exceeds the permitted
maximal length, it will regard that the signal unit location has been lost.
l Detects errors: The error detection is completed by the 16-bit check code at the end
of each signal unit.
l Correct errors: Two error correction methods are available, Basic method and
preventive cyclic retransmission method.
l Initially locating: When a link is initially started (i.e., after connected) or recovered from
a fault, it first transmits messages for a time duration. If the number of errors occurring
is within the allowed scope, the link is put into use; Otherwise, the link is removed.
l Monitors the errors of signaling links: Monitors the error rate of messages transmitted
over links upon initial location and in service status. If the error rate exceeds the set
value, the links are removed.
l Detects faults of the processor: Detects the local processing faults and reports to the
opposite end; or reports to MTP3 upon receiving processor fault messages from the
opposite end.
l Controls the link status: Controls the transformation of link statuses, and reports the
changes of the link statuses to MTP3.
l Controls traffic: Determines whether congestion occurs based on the use of the buffer
over links and reports to the upper layer or the opposite end.
A-4
Composition of Modules
MTP3 has two modules, Signaling Message Handling (SMH), and signaling network
management.
l Signaling Message Handling implements the distribution of the routing messages.
Signaling Message Handling is used to ensure that the signaling messages of the
user part of a signaling point will be delivered to the corresponding user part of the
destination specified in the user part, and implement the load sharing of signaling
messages over different links according to the selection of users, and ensure that the
transmitted messages will not be lost, retransmitted, or wrongly sequenced. Signaling
Message Handling includes three parts, message routing, message discrimination,
and message distribution. The relationship between the three parts is as described
below.
Message Routing (HMRT): Used at each signaling point to select sets of signaling
links or signaling links to the destination of the signaling messages from the
A-5
routing table. The routing function is implemented through routing tags. A routing
tag includes three parts: DPC, OPC, and SLS. DPC indicates the signaling point
code of the destination of a message, OPC indicates the signaling point code of
the source of a message, and SLS indicates the signaling link selecting code used
for load sharing among signaling links. For some messages only transmitted to
the third level, SLS corresponds to the SLC (Signalling Link Code) of the signaling
link between the destination and the source. While for some level-3 messages
unrelated to signaling links, SLC is 0000.
Message Discrimination (HMDC): a method in which the signaling point
processes a message signaling unit received from the signaling-link-function
level. Whether the signaling point is the destination signaling point is determined
based on the DPC in the message routing tag. If it is, it delivers the message
to the message distribution function; Otherwise, it delivers the message to the
message routing function to forward the message.
Message Distribution (HMDT): the function of the destination signaling point of a
signaling message to process a received message. It determines the user part of
the message based on the code of the service message octet SIO in the signaling
unit received from the message discrimination function, and delivers the message
to the corresponding upper-layer users.
l Signaling network management: In case of network faults, MTP3 coordinates with
other signaling points over the network to complete route update and guarantee
reliable message transmission.
The signalling network management is divided into three parts, signalling service
management, signalling link management, and signalling route management. The
network management has its own message format and coding scheme. If a signalling
link or a signalling point fails on the signalling network, the signalling management
can take actions and process necessary to maintain the signalling service and
recover normal signalling conditions. The relationship between the three parts is as
described below.
Signaling service management: Includes switchover, switchback, forced
rerouting, controlled rerouting, restart of signaling point, flow control, blocking
management and deblocking.
A-6
Service Categories
SCCP provides non-connection service and connection-oriented services for users,
specifically, it has four types of protocols.
l Type 0 (DT0): primary connectionless service
l Type 1 (DT1): connectionless service with sequenced messages
l Type 2 (DT2): primary connection-oriented service
l Type 3 (DT3): connection-oriented service with traffic control
Structure Diagram
The structure of the SCCP protocol is as shown below.
Functional Modules
The SCCP protocol is composed of four functional modules, the SCCP routing control
module, the SCCP connection-oriented transfer control module, the SCCP connectionless
transfer control module, and the SCCP management control module.
A-7
The connectionless data service can further transfer SCMG messages except SCCP
upper-layer user data. The content of the SCCP management messages is in the user
data block of the UDT messages. After receiving UDT, XUDT and LUDT messages
that are not SCMG messages, the SCCP of the destination node notifies the SCCP
users with the N-UNITDATA indication primitive. If the received messages are SCMG
messages, the SCCP will send them to SCMG for processing.
A-8
Connection-oriented services are available in two types, class2 and class3. The
former does not provide flow control while the latter does. The services of class3 are
not applied currently.
The connection-oriented control (SCOC) module implements a series of procedures
of connection-oriented data transmission, including connection setup, data transfer,
connection release, and inactivity detection. The procedures of SCCP connection are
described below:
SCCP connection setup
SCCP users request SCCP to set an SCCP connection, SCCP allocates the
resources such as the local reference number to the source end after receiving
the requests, sends CR messages to the destination end, and enable the
connection timer.
The destination end receives the CR messages and inform the upper-layer SCCP
users. When it receives the response from the SCCP users, it allocates the local
reference number and other resources to the input connection end and sends the
connection response CC messages to the source end, and enable the inactivity
control timer.
Receiving the CC messages, the source end informs SCCP users of the successful
SCCP connection setup, stops the connection timer, and enable the inactivity
control timer.
Up to now, the SCCP connection between the source node and destination node
has been successfully set up. Then, SCCP users can use this connection to
transmit data.
SCCP connection release
The SCCP connection release can be initiated by any end of the connection.
When an SCCP user at an endpoint connected to SCCP requests SCCP to
release the connection, the node at which the SCCP connection release is
started will send an SCCP connection release request message RLSD at the
current connection section, start the release timer, and stop the inactivity
detection timer.
After receiving the RLSD message, the other endpoint of the SCCP connection
sends a release complete message to the release-initiating node and stops
the inactivity control timer. Moreover, it releases all resources related to the
current connection section (including the local reference number) and notify the
upper-layer SCCP users.
After receiving RLC, the release-initiating node releases all resources related to
the current connection section (including the local reference number) and stops
the timer.
Inactivity detection
A-9
A-10
Hierarchical Structure
To implement the controlling on operations and dialogs, TCAP is divided into two
sub-layers, Component SubLayer (CSL) and Transaction SubLayer (TSL). CSL
implements operation management, and TSL implements transaction (that is, dialogs)
management. Figure A-8 shows the hierarchical structure. TC users communicate with
CSL through the TCAP primitive interface, and CSL communicates with TSL through the
TR primitive interface.
Introduction to Sublayers
l Transaction Sub Layer (TCAP TSL)
The transaction sub-layer (TCAP TSL) is used to manage the signaling
communication process (that is, transaction) between the local TCAP TSL users and
the remote TCAP TSL users. The TCAP TSL users are the TR users. The only TR
A-11
user known at present is the component sub layer. The communication of the peer
component sub layers is the communication between peer TC users, which is called
a dialog. Consequently, in the currently defined TCAP protocol, the transactions
and dialogues are completely the same, with a one-to-one correspondence between
them.
To complete the signaling procedure of an application service, two TC-users
exchange a series of TCAP messages in a bidirectional way. The TC-users control
and interpret the start, end and sequence of message exchange, and the message
contents, while TCAP TSL manages the initiation, holding and termination of dialogs,
including detection and handling of abnormal dialogs. The protocol process is
applicable to dialogs of any application services.
l Component sub layer (TCAP CSL)
The main functions of TCAP CSL cover the operation management, component error
detection and dialog component allocation.
Under normal conditions, when a TC-user initiates an invocation request for an
operation, the TCAP CSL will establish a status diagram for each operation to
implement operation management.
Component errors involve protocol errors and response timeout. A protocol error
refers to the inconsistency between the component type received at the TCAP CSL
and the expected input of the operation status diagram, or that the component format
has syntax errors or is unidentifiable. The response timeout refers to the timeout of
operation timers.
The TCAP CSL allocates the dialog components through its management over dialog
IDs.
Circuit blocking, that is, making a circuit that is faulty or being tested failed to
accept or generate signal service (or recovery service).
A-12
A-13
A-14
The SIGTRAN protocol stack has three parts as listed below. In this manual, only the
protocols related to ZXUN USPP (EIR) are described.
1. Standard IP Transport Protocol
2. The universal signaling transport protocol (SCTP) supports the universal and reliable
transport function needed for signaling transport. For details, see B.2 SCTP Protocol.
3. Signaling adaptation sub-layer. It supports specific primitives, for example, the
management indicator. These primitives are necessary for a specific SCN signaling
protocol, including M3UA (see B.3 M3UA Protocol for details), IUA, M2UA, M2PA,
and SUA.
B-1
SCTP is actually a connection-oriented protocol, but the SCTP association covers more
than a TCP connection. SCTP removes some defects of TCP and makes the signaling
transmission more reliable. The design for SCTP includes proper congestion control,
unrestricted spread and impersonation attack prevention, more desirable real-time
property and multi-homing propery. The SCTP is regarded as a transmission-layer
protocol, with its upper layer as SCTP user application and the lower layer as the packet
network. In application of the SIGTRAN protocol, the SCTP upper layer are the adapting
modules (such as M2UA and M3UA) of the SCN signaling, and the bottom layer is the
IP network.
Transfer Modes
The SCTP protocol provides reliable message transfer service for two SCTP users
through the association created between two SCTP ends. Further, the SCTP protocol
provides a method to create associations between a set of transfer addresses of two
SCTP endpoints. With these created associations, the SCTP endpoints can send SCTP
packets. An SCTP association may include combinations of multiple possible source
addresses and destination addresses. These combinations are included in the transfer
address list of each endpoint, as shown below.
Features
SCTP has the following features:
B-2
l Capable of creating multiple streams in an association and the data transport between
streams does not interfere with each other;
l Having more reliable associations because of multi-homing property at one or both
ends of an association;
l The association creation must pass the COOKIE authentication, thus ensuring the
security of the association;
l Having the real-time path-fault test function.
Related Terms
The terms involved in SCTP are introduced below:
l Transmission address
An SCTP transmission address consists of an IP address and an SCTP port number.
SCTP identifies the users using the same address through the SCTP port number.
For example, the IP address 10.105.28.92 and the SCTP port number 1024 indicate
an SCTP transmission address, while the IP address 10.105.28.93 and the port
number 1024 indicate another transmission address. Likewise, the IP address
10.105.28.92 and the port number 1023 also indicate another transmission address.
l Host and End Point
Host: A computer, which has one or more IP addresses, is a physical entity.
End Point is a basic logical concept for SCTP, a logic entity indicating the logical
datagram sender and receiver.
The SCTP protocol stipulates that one and only one association can be established
between two end points, however, one host can contain many end points.
l Association and Stream
Association: A logical connection or channel for data transmission between two
SCTP end points established through four-handshake mechanism in the SCTP
protocol. One association can be identified by the transmission addresses of the
two SCTP end points.
Stream is a special term of the SCTP protocol. Strictly speaking, stream refers to
a one-way logical channel from one end point to another in an SCTP association.
The data expected to sent in sequence must be transmitted in one stream.
One association can contain multiple streams.
l TSN and SSN
Transmission Sequence Number (TSN)A 32-digit sequence number, based on
the initial TSN, allocated to each locally-sent data block at one end of an SCTP
association, which ensures that the peer end can perform acknowledgement
upon receiving the data. TSN is based on association maintenance.
Stream Sequence Number (SSN)A 16-digit sequence number allocated to each
data block locally sent in each stream of an SCTP association, which ensures the
sequenced transfer within the stream. SSN is based on stream maintenance.
B-3
Function Structure
The function structure of the SCCP protocol is as shown below:
B-4
B-5
the SCTP control messages. SCTP users have an option, that is, they can request
to send one more user message which is bound in an SCTP packet or not. The data
block binding function of SCTP enables the generation of a complete SCTP packet at
the sending end, and the receiving end will disassemble the SCTP packet.
When congestions occur, users may not request SCTP to perform binding, but
SCTP still will perform the binding function. If users prohibit the binding, only SCTP
processing will be influenced. That is, a short time of delay will occur before the
SCTP packet is delivered.
l Verifies packet validity.
Each SCTP public packet header has a necessary verification tag field and a 32-bit
check field. The verification tag is valued based on the selection of the endpoints of
an association while enabling the association. If the received packet does not contain
the expected verification tag value, it will be discarded. The check code is set by the
SCTP packet sending party to provide additional protection and avoid data errors due
to networks. The receiving party will discard the SCTP packets without a check code.
l Manages paths
The SCTP users at the sending side can use a group of transfer addresses as
the destination of the SCTP packets. With the SCTP path management function,
a destination transfer address is selected for each sent SCTP packet, based on
the instructions from SCTP users and the accessibility of the currently qualified
destination set. When the packet service amount cannot exactly indicate the
accessibility, the path management function can monitor the accessibility of a
destination address through heart-beating messages, and provide directives for
SCTP users when the accessibility of any remote transfer address changes. The
path management function can also be used when an association is created. It
reports the qualified local transfer address set to the remote end, and reports the
transfer address returned from the remote end to the local SCTP users.
After the association is created, a preferred path is defined for each SCTP end point to
be used to send SCTP packets normally. At the receiving end, the path management
function is used, before processing an SCTP packet, to verify whether the association
of the incoming SCTP packets exists.
B-6
l TCP transfers messages based on data byte, the sequence number of TCP is
numbered based on bytes; SCTP transfers messages based on data messages and
the sequence number of SCTP is numbered based on messages. With the sliding
window control, the throughput of the SCTP data can be greatly increased.
l The transfer parameters for TCP are fixedly calculated; While SCTP parameters such
as RTO and the heart-beating time interval can be set by upper-layer users.
l TCP has a weak ability in preventing the network attacks; SCTP has an enhanced
network security.
Related Terms
The terms involved in SCTP are introduced below:
l Application Server (AS): a logic entity indicating a certain resources and
corresponding to a "ROUTE KEY". For example, AS can be a virtual database cell
processing the events identified by the incorporation PC/OPC/SUA_SSN of SS7. AS
includes a group of unique application server processes, and one or several of them
are activated for service processing.
l Application Server Process (ASP): a process of AS which is activated or standby. For
example, ASP can be the process of MGC, SCP, or HLR. ASP includes SCTP end
point and can be configured as processing a number of AS signaling services.
l IP Service Process (IPSP): a process instance based on IP application. Essentially,
IPSP and ASP are consistent except that IPSP uses point-to-point M3UA instead of
services of signaling gateway.
l Signaling Gateway (SG): SG receives or sends the messages of high-level users of
SS7 at the boundary of the IP signaling network and SS7 network.
l Signaling Gateway Process (SGP): a process instance of SG used as the activated,
standby, or load sharing process.
l ROUTE KEY: describes a group of parameter and corresponding values of SS7 (such
as DPC, SIO+DPC, and SIO+DPC+OPC, etc.). It uniquely defines the signaling
services processed by a special application server. The parameters in the routing
keywords cannot be based on a number of destination signaling point codes.
B-7
Function Structure
The M3UA protocol functions are as shown below:
B-8
Note:
In this topic, HLR generally refers to HLR over the networks such as WCDMA, TD-SCDMA,
and CDMA2000; MSC generally refers to MSCS over the networks such as WCDMA,
TD-SCDMA and MSC over CDMA2000 network; GMSC generally refers to GMSCS over
the networks such as WCDMA, TD-SCDMA and GMSC over CDMA2000 network.
The Mobile Application Part is called MAP for short. MAP is located at the top layer
of the TCAP in the OSI reference model, and only uses the non-connection mode of
SCCP. The entities between MSC/VLR and HLR/EIR, SMS-VMSC and SMS-IWMSC, and
SMS-MSC and SMS-GMSC all utilize the standard MAP protocol to create dialogs and
transmit messages between different entities.
MAP has the following functions:
l Sets up dialogs between an MSC/VLR and entities such as HLR, other MSCs/VLRs,
SMS-IWGMSC/SMS-GMSC and SCP by invoking TC primitives.
l Cooperates with the access processing module to complete various services of the
mobile communication network.
l Obtains the information related to a subscriber by querying on the database, and
informs the database of the latest data of the subscriber for proper modification.
C-1
Note:
In this topic, HLR generally refers to HLR over the networks such as WCDMA, TD-SCDMA,
and CDMA2000; MSC generally refers to MSCS over the networks such as WCDMA,
TD-SCDMA and MSC over CDMA2000 network; GMSC generally refers to GMSCS over
the networks such as WCDMA, TD-SCDMA and GMSC over CDMA2000 network.
VLR requests an authentication triplet from HLR. This is performed when the
authentication triplet saved on VLR is lower than the threshold.
C-2
VLR requests the subscriber information from the previous VLR during the
location update, covering authentication triplet and IMSI.
C-3
C-4
I
ZXUN USPP EIR Product Description
II
Tables
Table 2-1 FE Composition......................................................................................... 2-7
Table 2-2 HSM Hardware Composition ................................................................... 2-17
Table 2-3 HSM Software Composition..................................................................... 2-17
Table 4-1 Operation and Maintenance Functions of the EMS System ....................... 4-1
Table 4-2 Operation and Maintenance Functions of the OMM System ...................... 4-3
Table 7-1 Physical Specifications of a 42U Cabinet................................................... 7-1
Table 7-2 Physical Specifications of a 47U Cabinet................................................... 7-1
Table 7-3 Typical Capacity Indices ............................................................................ 7-2
Table 7-4 Performance Specifications ....................................................................... 7-2
Table 7-5 Power Specifications ................................................................................. 7-3
Table 7-6 Clock Specifications .................................................................................. 7-3
Table 7-7 Interfaces and Cables................................................................................ 7-3
Table 7-8 Reliability Specifications ............................................................................ 7-4
Table 8-1 Requirements for Equipment Rooms ......................................................... 8-2
Table 8-2 Temperature and Humidity Requirements.................................................. 8-2
Table 8-3 Lightning Protection Requirements ............................................................ 8-5
III
Tables
BICC
- Bearer Independent Call Control protocol
BOSS
- Business and Operation Support System
CAPEX
- Capital Expenditure
CC
- Common Criteria
CDMA
- Code Division Multiple Access
CGEL
- Commuication Grade Embedded Linux
CGSL
- Carrier Grade Server Linux
CIC
- Circuit Identification Code
CMP
- Calling Main Processor
V
ZXUN USPP EIR Product Description
CORBA
- Common Object Request Broker Architecture
DB
- DataBase
DBIO
- DataBase Input & Output
DC
- Direct Current
DIT
- Directory Information Tree
DNS
- Domain Name System
DPC
- Destination signaling Point Code
DRSync
- Disaster Reserved Sync
DSA
- Directory System Agent
DSML
- Directory Service Markup Language
DSP
- Directory System Protocol
DST
- Data Storage Transfer
EIR
- Equipment Identity Register
EMS
- Network Element Management System
ETCA
- Enhanced ATCA
FAC
- Final Assembly Code
FE
- Front End
FIPS
- Federal Information Processing Standards
FISU
- Fill-in Signaling Unit
VI
Glossary
FTP
- File Transfer Protocol
GMSCS
- Gateway Mobile Switching Centre Server
GSM
- Global System for Mobile Communication
GUI
- Graphical User Interface
HALT
- Highly Accelerated Life Test
HASS
- Highly Accelerated Stress Screening
HDLC
- High-level Data Link Control
HLR
- Home Location Register
HSM
- Hardware Security Module
HSS
- Home Subscriber Server
ICC
- Inspect and Control Center
IDSA
- Identity DSA
IETF
- Internet Engineering Task Force
IMEI
- International Mobile Equipment Identity
IMEISV
- International Mobile Equipment Identity and Software Version number
IMSI
- International Mobile Subscriber Identity
IP
- Internet Protocol
ISUP
- ISDN User Part
IUA
- ISDN User Adaptation Layer
VII
ZXUN USPP EIR Product Description
JDBC
- Java Database Connectivity
KPI
- Key Performance Index
KVM
- Keyboard, Video and Mouse
LDAP
- Lightweight Directory Access Protocol
LSSU
- Link Status Signaling Unit
LUDT
- Long Unit DaTa
M2PA
- MTP2-User Peer-to-Peer Adaptation Layer Protocol
M2UA
- MTP2-User Adaptation Layer
M3UA
- MTP3-User Adaptation layer protocol
MAP
- Mobile Application Part
ME
- Mobile Equipment
MEID
- Mobile Equipment Identifier
MGC
- Media Gateway Controller
MME
- Mobility Management Entity
MML
- Man Machine Language
MNP
- Mobile Number Portability
MS
- Mobile Station
MSC
- Mobile Switching Center
MSCS
- Mobile Switching Center Server
VIII
Glossary
MSISDN
- Mobile Station International Subscriber Directory Number
MSU
- Message Signal Unit
MTP
- Message Transfer Part
MTP1
- Message Transfer Part Level 1
MTP2
- Message Transfer Part layer 2
MTP3
- Message Transfer Part layer 3
MTU
- Maximum Transfer Unit
NAPT
- Network Address Port Translation
NAT
- Network Address Translation
NE
- Network Element
NMC
- Network Management Center
NMS
- Network element Management System
O&M
- Operation & Maintenance
ODBC
- Open DataBase Connectivity
OMM
- Operation & Maintenance Module
OMP
- Operation & Maintenance Processor
OPC
- Origination Signaling Point Code
OPEX
- Operating Expenditure
OSI
- Open System Interconnection
IX
ZXUN USPP EIR Product Description
PCI
- Programmable Communications Interface
PCM
- Pulse Code Modulation
PDSA
- Profile DSA
PE
- Provider Edge
PED
- PIN Entry Device
PIN
- Personal Identification Number
PLMN
- Public Land Mobile Network
PSTN
- Public Switched Telephone Network
RPU
- Router Process Unit
RTO
- RetransmissionTime-Out
SCCP
- Signaling Connection Control Part
SCLC
- SCCP Connectionless Control
SCN
- Switched Circuit Network
SCOC
- SCCP Connection-Oriented Control
SCP
- Service Control Point
SCRC
- SCCP Routing Control
SCTP
- Stream Control Transmission Protocol
SG
- Signaling Gateway
SGSN
- Service GPRS Supporting Node
X
Glossary
SIGTRAN
- Signalling Transport
SIM
- Subscriber Identity Module
SIO
- Service Information Octet
SIPI
- Signaling IP bearer Interface
SLC
- Signaling Link Code
SLS
- Signaling Link Selection code
SMP
- Signal Main Processor
SMS-GMSC
- Short Message Service Gateway Mobile Switching Center
SMS-IWMSC
- Short Message Service Interworking Mobile Switching Center
SMS-MSC
- Short Message Service Mobile Switching Center
SMS-VMSC
- Short Message Service Visited Mobile Switching Center
SMTP
- Simple Mail Transfer Protocol
SNMP
- Simple Network Management Protocol
SNR
- Serial NumbeR
SOAP
- Simple Object Access Protocol
SS7
- Signaling System No. 7
SSN
- Sub-System Number
SUA
- SCCP User Adaptation
SVN
- Software Version Number
XI
ZXUN USPP EIR Product Description
TAC
- Type Approval Code
TC
- Transaction Capability
TCAP
- Transaction Capability Application Part
TCP
- Transfer Control Protocol
TD-SCDMA
- Time Division-Synchronization Code Division Multiple Access
TMN
- Telecommunications Management Network
TUP
- Telephone User part
ToS
- Type Of Service
UAGW
- UDS Access Gateway
UDP
- User Datagram Protocol
UDS
- Universal Directory Server
UDT
- Unit DaTa
UMTS
- Universal Mobile Telecommunication System
USB
- Universal Serial Bus
VLAN
- Virtual Local Area Network
VLR
- Visitor Location Register
VPN
- Virtual Private Network
WCDMA
- Wideband Code Division Multiple Access
WEB
- Web
XII
Glossary
XML
- eXtensible Markup Language
XUDT
- Enhanced Unit Data
ZTE
- Zhongxing Telecommunications Equipment
XIII