6
System functions and features as of R3.0
syd-0367/1.3 – R3.0 – 03.2013
6. 5. 3. 3 Call to the public Network via an operator console. . . . . . . . . . . . . . 216
6. 5. 3. 4 Call to the public network via SIP network interfaces. . . . . . . . . . . . 216
6. 5. 3. 5 Call to a virtual Network PISN User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
6. 5. 3. 6 Exchange access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
6. 5. 3. 7 Priority exchange allocation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
6. 5. 4 Call to the private Leased-Line Network . . . . . . . . . . . . . . . . . . . . . . . . 220
6. 5. 5 Call to a DSS1 Terminal equipment on the S Bus (DDO) . . . . . . . . . 221
6. 6 Least Cost Routing (LCR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
6. 6. 1 Direct or indirect Selection of the Network Provider. . . . . . . . . . . . . 222
6. 6. 2 LCR function. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
6. 6. 3 Allocating the Internal Routing Table (LCR Table) . . . . . . . . . . . . . . . 227
6. 6. 4 Selecting the Network Provider (Routing Tables). . . . . . . . . . . . . . . . 230
6. 6. 4. 1 Time zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
6. 6. 4. 2 Alternative Routing (Fallback Routing) . . . . . . . . . . . . . . . . . . . . . . . . . 232
6. 6. 4. 3 Restricted scope of performance by a Network Provider . . . . . . . . 232
6. 6. 5 Conversion and Routing (Network Provider Table) . . . . . . . . . . . . . . 233
6. 6. 6 Bypassing LCR manually (Forced Routing) . . . . . . . . . . . . . . . . . . . . . . 236
6. 6. 7 LCR with Key Telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
6. 6. 8 LCR in the private Leased-line Network . . . . . . . . . . . . . . . . . . . . . . . . . 237
6. 6. 9 Call logging and Data Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
6. 6. 10 Examples of LCR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
6. 6. 11 Higher-Level LCR Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
6. 7 Exchange-to-Exchange Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
6. 7. 1 Exchange-to-Exchange Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
6. 7. 1. 1 Setting up Exchange-to-Exchange Connections . . . . . . . . . . . . . . . . 242
6. 7. 1. 2 Clearing down Exchange-to-Exchange Connections . . . . . . . . . . . . 243
6. 7. 1. 3 Possible Exchange-to-Exchange Connections. . . . . . . . . . . . . . . . . . . 246
6. 7. 2 Transferring Call Forwarding Unconditional to the Exchange. . . . 249
6. 7. 3 Three-Party Connections in the Exchange . . . . . . . . . . . . . . . . . . . . . . 252
6. 8 Transit Routing in the Private Leased-Line Network . . . . . . . . . . . . . 256
6. 8. 1 From the Public Network to the Private Leased-Line Network . . . 257
6. 8. 2 From the private leased-line network into the public network . . . 261
6. 8. 3 From the private leased-line network into the private leased-
line network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
6. 9 Testing overflow routing in the PISN . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
6. 9. 1 Overflow routing within the private leased-line network . . . . . . . . 266
6. 9. 2 Overflow routing via the public network . . . . . . . . . . . . . . . . . . . . . . . 267
6. 10 Break-Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
7 Data service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
7. 1 Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
7. 2 Data-service connections and destination tables. . . . . . . . . . . . . . . . 276