7
System functions and features as of R4.1
syd-0570/1.2 – R4.1 – 08.2016
6. 4. 3. 6 Exchange access authorization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
6. 4. 3. 7 Priority exchange allocation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
6. 4. 4 Call to the private Leased-Line Network . . . . . . . . . . . . . . . . . . . . . . 205
6. 4. 5 Call to a DSS1 terminal equipment on the S Bus (DDO) . . . . . . . . . 206
6. 5 Least Cost Routing (LCR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
6. 5. 1 Direct or indirect selection of the network provider . . . . . . . . . . . . . . 207
6. 5. 2 LCR function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
6. 5. 3 Allocating the internal routing table (LCR table) . . . . . . . . . . . . . . . . 212
6. 5. 4 Selecting the Network Provider (Routing Tables) . . . . . . . . . . . . . . . 215
6. 5. 4. 1 Time zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
6. 5. 4. 2 Alternative Routing (Fallback Routing) . . . . . . . . . . . . . . . . . . . . . . . 216
6. 5. 4. 3 Restricted scope of performance by a Network Provider . . . . . . . . . 217
6. 5. 5 Conversion and Routing (Network Provider Table) . . . . . . . . . . . . . . 217
6. 5. 6 Bypassing LCR manually (Forced Routing) . . . . . . . . . . . . . . . . . . . 220
6. 5. 7 LCR with Key Telephones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
6. 5. 8 LCR in the private Leased-line Network . . . . . . . . . . . . . . . . . . . . . . 221
6. 5. 9 Call logging and Data Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
6. 5. 10 Examples of LCR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
6. 5. 11 Higher-Level LCR Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
6. 6 Exchange-to-Exchange Connection . . . . . . . . . . . . . . . . . . . . . . . . . 224
6. 6. 1 Exchange-to-Exchange Connections . . . . . . . . . . . . . . . . . . . . . . . . 224
6. 6. 1. 1 Setting up Exchange-to-Exchange Connections . . . . . . . . . . . . . . . . 226
6. 6. 1. 2 Clearing down Exchange-to-Exchange Connections . . . . . . . . . . . . 226
6. 6. 1. 3 Possible Exchange-to-Exchange Connections . . . . . . . . . . . . . . . . . 228
6. 6. 2 Transferring Call Forwarding Unconditional to the Exchange . . . . . . 231
6. 6. 3 Three-Party Connections in the Exchange . . . . . . . . . . . . . . . . . . . . 234
6. 7 Transit Routing in the Private Leased-Line Network . . . . . . . . . . . . . 237
6. 7. 1 From the Public Network to the Private Leased-Line Network . . . . . 238
6. 7. 2 From the private leased-line network into the public network . . . . . . 241
6. 7. 3 From the private leased-line network into the private leased-line
network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
6. 8 Testing overflow routing in the PISN . . . . . . . . . . . . . . . . . . . . . . . . . 246
6. 8. 1 Overflow routing within the private leased-line network . . . . . . . . . . 247
6. 8. 2 Overflow routing via the public network. . . . . . . . . . . . . . . . . . . . . . . 248
6. 9 Break-Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
7 Data service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .255
7. 1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
7. 2 Data-service connections and destination tables . . . . . . . . . . . . . . . 255
7. 3 Routing in the private leased-line network. . . . . . . . . . . . . . . . . . . . . 259
7. 4 User-to-user signalling (UUS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
7. 5 Fax service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
8 Call logging (CL) . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
8. 1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262