Lucent Technologies Release 3 manual Copyright  2000, Lucent Technologies All Rights Reserved

Page 2

Copyright 2000, Lucent Technologies

All Rights Reserved

Printed in U.S.A.

Notice

Every effort was made to ensure that the information in this book was complete and accurate at the time of printing. However, information is subject to change.

Preventing Toll Fraud

“Toll fraud” is the unauthorized use of your telecommunications sys- tem by an unauthorized party (for example, a person who is not a cor- porate employee, agent, subcontractor, or working on your company’s behalf). Be aware that there may be a risk of toll fraud associated with your system and that, if toll fraud occurs, it can result in substantial additional charges for your telecommunications services.

Lucent Technologies Fraud Intervention:

If you suspect that you are being victimized by toll fraud and you need technical assistance or support, call the Technical Service Center’s Toll Fraud Intervention Hotline at 1-800-643-2353.

Providing Telecommunications Security

Telecommunications security (of voice, data, and/or video communi- cations) is the prevention of any type of intrusion to (that is, either unauthorized or malicious access to or use of your company’s tele- communications equipment) by some party.

Your company’s “telecommunications equipment” includes both this Lucent product and any other voice/data/video equipment that could be accessed via this Lucent product (that is, “networked equipment”). An “outside party” is anyone who is not a corporate employee, agent, subcontractor, or working on your company’s behalf. Whereas, a “malicious party” is anyone (including someone who may be other- wise authorized) who accesses your telecommunications equipment with either malicious or mischievous intent.

Such intrusions may be either to/through synchronous (time-multi- plexed and/or circuit-based) or asynchronous (character-, message-, or packet-based) equipment or interfaces for reasons of:

Utilization (of capabilities special to the accessed equip- ment)

Theft (such as, of intellectual property, financial assets, or toll-facility access)

Eavesdropping (privacy invasions to humans)

Mischief (troubling, but apparently innocuous, tampering)

Harm (such as harmful tampering, data loss or alteration, regardless of motive or intent)

Be aware that there may be a risk of unauthorized intrusions associ- ated with your system and/or its networked equipment. Also realize that, if such an intrusion should occur, it could result in a variety of losses to your company (including but not limited to, human/data pri- vacy, intellectual property, material assets, financial resources, labor costs, and/or legal costs).

Your Responsibility for Your Company’s Telecommunications Security

The final responsibility for securing both this system and its net- worked equipment rests with you – a Lucent customer’s system administrator, your telecommunications peers, and your managers. Base the fulfillment of your responsibility on acquired knowledge and resources from a variety of sources including but not limited to:

Installation documents

System administration documents

Security documents

Hardware-/software-based security tools

Shared information between you and your peers

Telecommunications security experts

To prevent intrusions to your telecommunications equipment, you and your peers should carefully program and configure your:

Lucent-provided telecommunications systems and their interfaces

Lucent-provided software applications, as well as their underlying hardware/software platforms and interfaces

Any other equipment networked to your Lucent products. Lucent Technologies does not warrant that this product or any of its networked equipment is either immune from or will prevent either unauthorized or malicious intrusions. Lucent Technologies will not be responsible for any charges, losses, or damages that result from such intrusions.

Federal Communications Commission Statement

Part 15: Class A Statement. This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide rea- sonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to corect the interference at his/her own expense.

Part 15: Personal Computer Statement. This equipment has been certified to comply with the limits for a Class B computing device, pursuant to Subpart J of Part 15 of FCC Rules. Only peripherals (computing input/output devices, terminals, printers, etc.) certified to comply with the Class B limits may be attached to this computer. Operation with noncertified peripherals is likely to result in interfer- ence to radio and television reception.

Part 68: Network Registration Number. This equipment is regis- tered with the FCC in accordance with Part 68 of the FCC Rules. It is identified by FCC registration number AS5USA-20411-VM-E.

Part 68: Answer-Supervision Signaling. Allowing this equipment to be operated in a manner that does not provide proper answer-supervi- sion signaling is in violation of Part 68 rules. This equipment returns answer-supervision signals to the public switched network when:

Answered by the called station

Answered by the attendant

Routed to a recorded announcement that can be adminis- tered by the CPE user

This equipment returns answer-supervision signals on all DID calls forwarded back to the public switched telephone network. Permissi- ble exceptions are:

A call is unanswered

A busy tone is received

A reorder tone is received

Canadian Department of Communications (DOC)

Interference Information

This digital apparatus does not exceed the Class A limits for radio noise emissions set out in the radio interference regulations of the Canadian Department of Communications.

Le Présent Appareil Nomérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la class A préscrites dans le reglement sur le brouillage radioélectrique édicté par le ministére des Communications du Canada.

Lucent Technologies Fraud Intervention

If you suspect that you are being victimized by toll fraud and you need technical support or assistance, call BCS Technical Service Center Toll Fraud Intervention Hotline at 1 800 643-2353.

European Union Declaration of Conformity

Lucent Technologies Business Communications Systems declares that the equipment specified in this document conforms to the referenced European Union (EU) Directives and Harmonized Standards listed below:

EMC Directive 89/336/EEC Low-Voltage Directive73/23/EEC

The “CE” mark affixed to the equipment means that it conforms to the above directives.

Image 2
Contents Lucent Intuity Copyright  2000, Lucent Technologies All Rights Reserved Contents Channel Mapping Using the Change Extensions Command Vi Issue 1 June How this Document Is Organized OverviewIntended Audience Conventions Used Document Number Issue Related ResourcesIssue 1 June Trademarks and Service Marks Training How to Make Comments About this Document Conversion Checklist Conversion Checklist Conversion Instructions Select How to Use Lucent Intuity ScreensConversion Procedures EnterTask 2 Deactivate Alarm Origination Task 1 Inventory MaterialsAlarm Management Screen Task 3 Stop the Voice System Information ScreenTask 4 Make an Attended Back-up Tape Backup Screen Do not use the nightly backup tape for this procedure Tape 1 pre-process started Task 5 Remove the Previous Switch Integration Software Example Software Installed ListS25SWIN Task 6 Shutdown the System MAP/5 Remove the Front Panel Task 7 Remove Hardware for the Previous IntegrationMAP/5 Instructions Removing the MAP/5 Front Panel MAP/5 Remove the Top Cover 10. Removing the Top Cover on the MAP/5 MAP/5 Locate and Remove the GP Synch or Dciu Circuit Card 11. GP Synch and Dciu Circuit Card FaceplatesMAP/5 Replace the Top Cover and Cables Card can be located in Slot 1, 3, 4, 6, orMAP/40 Instructions MAP/40 Open the MAPPage 13. Remove the Bezel and the Dress Cover Screws 14. Remove the Dress and Access Covers MAP/40 Locate and Remove the GP Synch or Dciu Circuit Card 15. Remove the Retaining BracketMAP/40 Replace the Cover and Cables 16. GP Synch and Dciu Circuit Card FaceplatesMAP/100 Instructions MAP/100 Open the MAPCard cage access door 1/4-turn fasteners MAP/100 Locate and Remove the GP Synch or Dciu Circuit CardMAP/100 Replace the Covers and Cables 18. GP Synch and Dciu Circuit Card FaceplatesTask 8 Allow the System to Finish Booting Task 9 Install the Merlin Legend Switch Integration Software Stop the Voice SystemInstall the Merlin Legend Switch Integration Software Page Start the Voice System Task 11 Shutdown the Lucent Intuity System Task 13 Apply Power to the System Task 14 Test the Channels if the Mapping Changed Task 15 Change the CAS Switch Assignment Task 16 Clear any Alarms 19. Alarm Log Display ScreenTask 17 Place Test Calls to the System Task 18 Assign the System Date and Time20. Set Date and Time Screen Task 19 Stop the Voice System Task 20 Back Up the System-Data Task 21 Start the Voice SystemTask 22 Activate Alarm Origination 21. Alarm Management Screen22. Alarm Origination Menu 25. Alarm Origination Test Results Screen Task 23 Create a Test Alarm 26. Audix Administration Screen Task 24 Replace the Nightly Backup Tape Task 25 Remove the Old Software from the Site48Issue 1 June Administer the Intuity Switch Interface Map Channels to Switch ExtensionsPage Figure A-2. Assign Screen Verify Channel State Figure A-4. Voice Equipment Screen Figure A-5. Diagnose Voice Equipment Screen Figure A-6. Release of Voice Equipment Screen Assign Service to Channels for Testing Figure A-7. Voice Equipment ScreenFigure A-9. Assign Services to Voice Channels Screen Test Each Channel Test Each Channel These are different voice encoding algorithms Assign Services to Called Numbers Figure A-11. Voice Equipment Screen Figure A-13. Assign Service to Called Number Screen Page Map Services to Channels for Operation Figure A-15. Assign ScreenPage Page Channel Mapping 20Issue 1 June Using the Change Extensions Command Busyout the Voice Ports Figure B-1. Diagnose Voice Equipment ScreenBusyout the Networking Ports Number of the last cardFigure B-3. Busyout Networking Channel Screen Stop the Voice System Changing a Block of Extensions With Extension Length Change Change extensions Ch eFigure B-4. Change Extension Screen 8Issue 1 June Change extensions Ch e Figure B-5. Change Extension Screen Page Release the Voice Ports Figure B-6. Diagnose Voice Equipment ScreenFigure B-7. Release of Voice Equipment Screen Release the Networking Ports Figure B-8. Release Networking Channel Screen

Release 3 specifications

Lucent Technologies Release 3 was a significant milestone in the evolution of telecommunications. Launched in the late 1990s, it represented a comprehensive suite of solutions designed to improve network performance, reliability, and scalability. Aimed primarily at enhancing communication services, Release 3 showcased advanced technologies and features that reshaped the industry landscape.

One of the standout features of Release 3 was its support for both circuit-switched and packet-switched networks. This dual capability allowed service providers to utilize a single platform to provide a variety of services, including traditional voice services and emerging data applications. The integration of these two technologies led to more efficient use of network resources and improved service quality.

Release 3 also emphasized flexibility and modularity. Its architecture was designed to support a range of hardware and software configurations, enabling telecom operators to customize their deployments according to specific business needs. This modular design allowed for easier upgrades and scaling, which was essential as the demand for bandwidth and services continued to grow.

Another key technology featured in Release 3 was its advanced signaling and control capabilities. By implementing protocols like SS7 and integrating them with IP-based communications, Lucent enabled more efficient call routing and management. This capability was critical for managing increasing traffic loads and offering enhanced features like caller ID, call waiting, and other value-added services that were becoming popular at that time.

In addition, Release 3 introduced improved quality of service (QoS) mechanisms, critical for ensuring that voice and data services could coexist on the same network without degradation. This was especially important as the world began to embrace the Internet, leading to a surge in data-intensive applications that needed reliable delivery.

Security was another focus with Release 3, as telecom operators faced growing concerns about fraud and cyber threats. Enhanced encryption methods and secure access controls were built into the system, providing operators with the tools needed to safeguard their networks and customer data.

Overall, Lucent Technologies Release 3 represented a forward-looking approach to telecommunications, combining innovative technology with the flexibility needed in a rapidly changing industry. It laid the groundwork for future advancements in both voice and data communications, helping operators to adapt to the burgeoning digital landscape. As a result, it played a pivotal role in the transition towards more integrated and efficient telecommunication networks.