IP DECT Installation Guide: NDA-31474 Issue 1.01
IP DECT Installation Guide: NDA-31474 Issue 1.01
IP DECT Installation Guide: NDA-31474 Issue 1.01
NDA-31474
Issue 1.01
NEC Corporation of America reserves the right to change the specifications, functions, or features at any time
without notice.
NEC Corporation of America has prepared this document for use by its employees and customers. The
information contained herein is the property of NEC Corporation of America and shall not be reproduced without
prior written approval of NEC Corporation of America.
Dterm, NEAX and UNIVERGE are registered trademarks of NEC Corporation and Electra Elite is a registered
trademark of NEC America, Inc.
Copyright 2014
Chapter 1
Chapter 2
Chapter 3
___________________________________________________________________________________
Chapter 4
___________________________________________________________________________________
___________________________________________________________________________________
Chapter 5
Section 7 Where to Enter and Where to Find the License Data?...................... 5-4
Chapter 6
___________________________________________________________________________________
Chapter 7
Chapter 8
Chapter 9
___________________________________________________________________________________
Chapter 10
Chapter 11
___________________________________________________________________________________
8.2 PBX Settings, Tab "Three party conference Settings" ........................ 11-33
___________________________________________________________________________________
Chapter 12
Chapter 13
___________________________________________________________________________________
Chapter 14
Chapter 15
Chapter 16
Chapter 17
Chapter A
Chapter B
Chapter C
Chapter D
Chapter E
___________________________________________________________________________________
x Table of Contents
UNIVERGE SV8100 Issue 1.01
___________________________________________________________________________________
Chapter F
3.2 IP DECT SIP With Branch Offices and Traditional DECT .......................F-3
Chapter G
___________________________________________________________________________________
___________________________________________________________________________________
Figure 2-2 DtermVSR Call Manager – License Agreement Screen ..................................... 2-3
Figure 2-3 DtermVSR Call Manager – Choose Destination Location Screen ...................... 2-4
Figure 2-4 DtermVSR Call Manager – Select License System Screen ............................... 2-5
Figure 2-5 DtermVSR Call Manager – Ready to Install the Program Screen ...................... 2-6
Figure 2-6 DtermVSR Call Manager – Wizard Complete Screen ........................................ 2-7
Figure 2-7 DtermVSR Call Manager – Play History Tab ...................................................... 2-8
Figure 2-8 DtermVSR Call Manager – Select License Manager Client (LMC) .................... 2-9
Figure 2-9 DtermVSR Call Manager – Select License Manager System (LMS) ................ 2-10
Figure 2-11 DtermVSR Call Manager – Select USB Dongle ............................................... 2-12
Figure 3-2 DECT System Parts in an IP Solution as Add-on to a PBX .............................. 3-3
Figure 3-3 Carriers and Timeslots in the DECT Air Interface ............................................. 3-5
Figure 3-4 Each time slot can use any of the 10 Carrier Frequencies ................................ 3-5
Figure 3-6 UAK Relation between the IPUI and the PARI ................................................ 3-11
Figure 4-6 Handover Taken Place, New Connection Active .................................. 4-10
Figure 6-3 Example of an IP DECT Configuration with a Branch Office .................. 6-4
Figure 6-5 Example of an IP DECT Routed Head Quarter Configuration ............... 6-6
Figure 6-8 Routed Head Quarter with Branch Office Configuration ........................ 6-9
Figure 6-10 Routed Head Quarter with Routed Branch Office Setup
Configuration Example ......................................................................... 6-12
Figure 7-1 Layout Ethernet Connector RJ45 on the DAP ........................................ 7-2
___________________________________________________________________________________
___________________________________________________________________________________
Figure 13-5 Message from handset when Primary DAP Controller is active ......................13-6
___________________________________________________________________________________
Figure 13-7 Example of DAP Controller Redundancy with two Central DAP Controllers
and two Local DAP Controller ......................................................................... 13-9
Figure 13-8 Example of DAP Controller Redundancy with Secondary DAP Controller
in the Branch Office ....................................................................................... 13-10
Figure 14-1 Example of Proxy settings required for the "Fail Over" example ..................... 14-3
Figure 14-2 Example of Return to Primary Setting for "Fail Over" Example ....................... 14-4
Figure 14-3 Example of Proxy Settings Required for the "Alternating" Example ................ 14-5
Figure 14-4 Return to Primary Setting for "Alternating" Example ....................................... 14-5
Figure 14-5 Example of Proxy Settings Required for the "Load Balancing" Example ........ 14-6
Figure 14-6 Example of Return to Primary Setting for "Load Balancing" Example ............ 14-7
Figure 14-7 Proxy Settings Required for the "Using Different Domains" Example ............. 14-8
Figure 14-8 Return to Primary Setting for "Using Different Domains" Example ................. 14-9
Table D-1 Default ports used in Business Mobility IP DECT ............................................. G-1
___________________________________________________________________________________
___________________________________________________________________________________
This manual is valid for Business Mobility IP DECT Software Release 6.0.
Chapter
SECTION 1 IMPORTANT
Please be informed that a fine may be imposed for illegal disposal of electrical and
electronic products via the general municipal waste stream.
Disposal of electrical and electronic products in countries outside the European Union
should be done in line with the local regulations. If no arrangement has been made
with your supplier, please contact the local authorities for further information.
Within the SRTP and TLS, open libraries are applied. The following text is applicable
for these open libraries:
3.1 SRTP
For SRTP version 1.4.4 is applied. The following license text is applicable to the
SRTP library:
3.2 TLS
OpenSSL License:
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
This library is free for commercial and non-commercial use as long as the
following conditions are adhere to. The following conditions apply to all code
found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the
SSL code.
The SSL documentation included with this distribution is covered by the same
copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code
are not to be removed. If this package is used in a product, Eric Young should be
given attribution as the author of the parts of the library used. This can be in the
form of a textual message at program startup or in documentation (online or
textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list
of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must
display the following acknowledgement: "This product includes
cryptographic software written by Eric Young (eay@cryptsoft.com)" The
word 'cryptographic' can be left out if the routines from the library being
used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from
the apps directory (application code) you must include an
acknowledgement: "This product includes software written by Tim
Hudson (tjh@cryptsoft.com)"
The licence and distribution terms for any publicly available version or derivative
of this code cannot be changed. i.e. this code cannot simply be copied and put
under another distribution licence [including the GNU Public Licence].
Chapter
SECTION 1 DESCRIPTION
2
The NEC IP/Digital Manager provides advanced visibility, access,
retrieval, and playback tools for the NEC BackOffice administrators. It also
provides an intuitive interface for establishing shortcuts to any number of
storage folders and allows the supervisor to search across all storage
folders for specific call information such as User, Time/Date, Length of
Call, etc. The application can be used to access and manage recordings
whether created by the single port, the 4-Port Digital Logging Unit or IP. IP/
Digital Manager is built on the robust Microsoft.net frame-work and
manipulates large volumes of recordings. It is a workhorse that delivers
truly feature rich productivity tools in a familiar, ergonomic and easy to use
MS Office style interface.
3. Click Next, the License Agreement screen opens, Figure 2-2 DtermVSR Call
Manager – License Agreement Screen.
4. Select Yes, the Choose Destination Location screen opens, Figure 2-3
DtermVSR Call Manager – Choose Destination Location Screen.
5. Click Next, the Select License System screen displays, Figure 2-4 DtermVSR
Call Manager – Select License System Screen.
7. Click Next, the Ready to Install the Program screen displays, Figure 2-5
DtermVSR Call Manager – Ready to Install the Program Screen.
Figure 2-5 DtermVSR Call Manager – Ready to Install the Program Screen
9. Click Finish. Following initial installation, the Dterm VSR Call Manager screen
opens displaying the Play History tab, Figure 2-7 DtermVSR Call Manager – Play
History Tab.
Figure 2-8 DtermVSR Call Manager – Select License Manager Client (LMC)
4. Click Install.
Figure 2-9 DtermVSR Call Manager – Select License Manager System (LMS)
4. Click Install.
2. Insert the USB dongle into an available USB port on the PC.
4. Click Next.
3
telecommunication facilities provided by a SIP Proxy system. Such a
mobile user can make or receive calls by using a cordless handset. Many
call handling facilities of the SIP Proxy are available on the cordless
handset. As the cordless connection is a digital connection, other services
will also be possible in the future.
A radio transceiver in the DECT System is called the Radio Fixed Part
(RFP) according to the DECT Standard. The RFP is also referred to as a
base station. However, in the Business Mobility IP DECT configuration, the
RFP is comprises more than just a transceiver, and is therefore called:
DAP (DECT Access Point).
Figure 3-1 DECT System Parts (General) shows a general DECT system
setup.Figure 3-2 DECT System Parts in an IP Solution as Add-on to a
PBXshows a general IP DECT Solution. It shows the basic system setup
for the Business Mobility IP DECT system.
The radio area covered by a single RFP (DAP) is called a cell. The RFPs (DAPs) are
located so that the cells overlap slightly and the PP can remain in contact with the
DECT system when moving from one cell to another. A group of cells belonging to
one DECT system is called a cluster. According to the DECT standard, the maximum
number of simultaneous calls per RFP can be 12. (The DAP in the Business Mobility
IP DECT supports up to 12 simultaneous calls, depending on the licenses.)
The number of RFPs (DAPs) needed to cover a certain area (within which the mobile
telephone users might roam) depends on many factors such as:
The amount of telephone users in an area, and how often they make or receive
calls
The speech signal through the air will be encrypted, if the portable handset allows it,
to ensure the privacy of the conversation. This encryption is done fully automatically,
without the intervention of a technician.
The radio link between the RFP and a PP can carry information on any one of ten
carrier frequencies and in one out of twelve pairs of time slots (12 in each direction).
The ten carrier frequencies are separated by 1728 kHz. The frequency range
depends on the region where DECT is used:
Each time slot may carry 32 kbs Adaptive Differential Pulse Code Modulated
(ADPCM) speech/user data. Each time slot pair can contain ADPCM speech/user
data on any one of the ten carrier frequencies so that the RFPs carrier frequency
often needs to be changed between time slots: Refer to Figure 3-4 Each time slot can
use any of the 10 Carrier Frequencies. The information within the time slot does not
completely fill the time slot; time is allowed for propagation delays, ramp up and ramp
down of the transmitter and for switching of the carrier synthesizer between slots.
Figure 3-4 Each time slot can use any of the 10 Carrier Frequencies
A PP can use any of the 12 time slots (in each direction) on any of the 10 frequencies
for a full duplex connection. So a maximum of 120 full duplex channels are available
for connections to the PPs, within a cluster of a micro-cellular DECT system. In fact,
this is only possible under ideal conditions; no disturbance, no interference, no other
channels used, etc. Normally the conditions are not ideal in office or factory buildings,
but the number of channels available will still be more than sufficient.
Note that there is always a fixed relation between the downstream timeslot number
(from RFP to PP) and the upstream timeslot number (from PP to RFP) in one
connection:
3.1 General
The beacon signal is a signal which is transmitted by an RFP in case the RFP is
idle (no active calls).
This beacon signal contains the System Identifier of the DECT System, the so
called PARI (Primary Access Rights Identifier) and the number of the RFP, the
RPN (Radio Part Number). By means of this information the PP recognizes to
which system a signal belongs, and whether it is subscribed to that system or not.
When there is a call for a PP, it also contains paging information.
When the RFP is not idle (there is an active call via the RFP), the beacon signal
information is also transmitted in the call connection. Therefore, the beacon signal
is not necessary at an RFP which has one or more calls active. In the DECT
application in the Business Mobility IP DECT, there are two beacon signals
transmitted per RFP (DAP) when the RFP (DAP) is in idle condition. If there is a
call only one beacon signal remains active. When there are a number of calls via
the RFP (DAP), no beacon signal is transmitted anymore.
The PP uses the signal to synchronize its timing with the central system, and then
it monitors the information transmitted via that RFP for calls to itself.
In this way, the PP user can move around the area from cell to cell and remain in
contact with the DECT system via a radio link with a very good quality.
In case the PP user wants to make a call, he/she goes off hook. The PP selects
an unused channel at the RFP to which it is locked. This channel is in one of the
timeslots (0 ... 11) from RFP to PP; for the communication from the PP to the RFP,
the corresponding timeslot is selected in the timeslot range 12 ... 23. This results
in a full duplex connection via the air. The connection setup goes through this
RFP via the Business Mobility IP DECT system to the SIP Proxy. (The voice
connection is setup between the RFP/DAP and the SIP User Agent.)
4.3 Encryption
Most portable sets are capable of encryption and so the user data is encrypted
over the air interface. This ensures the privacy of the conversation. Encryption is
a process by which the digitised speech is "scrambled" making it impossible for
anyone monitoring the frequency to listen to the conversation. For this
scrambling, a DCK (DECT Ciphering Key) is used. This is a key which is agreed
at the first time data has been transferred between the PP and the RFP (the
moment that the PP "locks" to the DECT system).
5.1 General
Each RFP constantly scans the area for signals in each channel. These signals
can be generated by other RFPs or other equipment. The RFP selects one or two
free channels to transmit the beacon signal. (The number of beacon signals
depends on the number of active calls via the RFP.)
The PP also picks up all sorts of signals which may come from the closest RFP,
the next cell or from outside equipment. It locks onto a good RFP signal, and
when it must make or receive a call it chooses a channel with the least
interference to do this.
When a call is made to a portable telephone then that telephone must be paged.
This means that all RFPs transmit a paging message. The information in each
active timeslot transmitted by the RFP contains paging data, whether it is in use
The PP alerts the PP user, who can then answer the call.
In case the PP user wants to make a call (own initiative), he/she presses the off-
hook button. It starts setting up a connection with the RFP. (The PP scans the
channels regularly so that it knows which channels are available at the nearby
RFP.) The PP selects a channel which is not being used and uses this channel to
set up the call.
SECTION 6 HANDOVER
Both the RFP and PP monitor the quality of the radio link. If the interference on a
certain carrier frequency and timeslot combination causes problems, it might be
necessary to switch to another frequency and/or timeslot at that same base station.
This is called intra-cell handover. This handover procedure requires that the
connection can be supported on 2 channels simultaneously, for a while, to allow a
"seamless handover" (no breaks and hiccups during the handover). First, the new
channel is chosen and the connection is set up via this channel, while the old channel
is still in use. Then the old channel is disconnected.
If the mobile user roams from one cell to another, during the conversation, he goes
probably out of range of the first RFP and into the range of the second. In that case,
when the quality of the transmission requires it, the radio link switches over to the new
RFP. This is called inter-cell handover. Once again it is a seamless handover.
If the mobile user roams from one cell to another, during the conversation, he goes
probably out of range of the first RFP and into the range of the second. In that case,
when the quality of the transmission requires it, the radio link switches over to the new
RFP. This is called inter-cell handover. Once again it is a seamless handover.
Both the RFP and the PP monitor the quality of the call.
If the PP decides that the quality is not acceptable, it can do one of three things:
1. Request that the RFP uses its other antenna to communicate with the PP. The
signal in the cell may suffer from fading, so that at one place the signal might be
poor while very close to it the signal may be acceptable. To counteract this,
each RFP has two antennas mounted close together. The system tries to select
the best antenna for each channel separately. This method of using two
antennas is referred to as antenna diversity.
2. If the quality of the connection warrants it, the PP can request a handover to
another channel. That channel may be on the same RFP (intra-cell handover) or
on another RFP (inter-cell handover).
During handover, the communication to the PP is built up over the new channel
so that for a short time the communication is available over both the old and the
new channel. Then the old channel is disconnected. The user does not notice
any break in the communication due to handover.
3. Mute the output (voice connections). It blocks the stream of information from
radio signal to user (ear piece, in a telephone). This stops noisy signals being
passed on to the user. It is done as a temporary measure, only. Note that muting
is done on both ends of the connection independently.
If the RFP decides that the quality of the connection to a certain PP is not acceptable
it can do one of three things:
1. Use the other antenna (antenna diversity). The PP does not notice the change.
2. Tell the PP that a handover is necessary. The PP always initiates the handover
after selecting the best channel as seen from the PP.
3. It can temporarily block the data stream from PP to the SIP Proxy. (Note that
muting is done on both ends of the connection independently.)
Figure 3-6 UAK Relation between the IPUI and the PARI
For the subscription procedure the WEB interface for Management must be used.
This WEB interface provides access to the configuration settings in the DAP
Controller/Manager, which is the Server that controls the DECT System. In the WEB
interface for DECT Management, one or more extension numbers can be created and
then selected to start the subscription procedure the (these) extensions (PP). Also
one or more existing extension number(s) can be selected to subscribe a handset to.
Then the DAP Controller/Manager generates a code ("PIN code" or also called
"Authentication Code") which is visible via the WEB Interface. This code must be
entered in the PP within a certain time period. If the operation has been completed
successfully, the PP is subscribed to the system and is allowed to make and receive
calls. (Assumed that the handset is known and registered in the PABX as well.)
A portable can be subscribed to more than one DECT system. Therefore, it can be
used in areas covered by different DECT systems or in different areas with their own
DECT system. This allows you for example, to use the same PP for the DECT system
which is operational in your company and also for your home DECT. Also if the
company is located at different sites, it is possible to use the same PP at the different
sites, if DECT systems are present on these sites. It has a different extension number
for each DECT system. It cannot roam from one of these areas to the other, while
busy with a conversation. The user of the portable must ensure that his set is
communicating with the required DECT system, when making calls in a certain area.
This may be done manually by a selection key, depending on the type of the portable.
There are also PPs which selects DECT systems automatically.
The WEB interface for DECT Management can be used to de-subscribe ("terminate"
or "disable") the PP. Such a service condition of a PP can always be displayed at the
WEB interface for DECT Management.
A portable which has been "terminated", still contains the subscription data, but
cannot gain access to the system. (If the PP supports a "reset" and this is executed at
the PP, the subscription data in the portable is removed also.) The Administrator (user
of the WEB interface for DECT Management) can use the "terminate" command
(remove subscription) in case the portable has been lost or damaged.
A portable which has been "disabled" via the WEB interface for DECT Management
has been put on the blacklist in the DAP Controller/Manager. When the PP is or
becomes within reach of the radio signals, the DAP Controller/Manager and the PP
exchange information which results in the de-subscription of that PP. It is no longer
recognized by the DECT system and it is free to be subscribed again. This is the
normal way to de-subscribe a portable set.
If a portable has been disabled, but the DECT System cannot reach the PP and
complete the de-subscription, the "terminated" command can be used after the
"disable" command.
The SARI (Secondary Access Right Identifier) has the same function as the PARI, but
it is used as a second identifier in case the PARI does not match between the DECT
system and the PP.
The PARI is a unique number belonging to one DECT system only. The SARI can be
the same identifier, used in more than one DECT system. The DECT system
transmits both PARI and SARI as identification signals.
If the PP detects a DECT signal in the air, it checks whether the PARI in that signal
matches with its own PARI data in the subscription record. If so, the PP "locks" to that
signal. If not, the PP does a second check but now on the received SARI. If that
matches, the PP "locks" to that signal.
The Secondary Access Rights (SARI) is used in case you want to use your PP on
more than one DECT system (no handover possible between the systems!). The PP
uses the same subscription record (comprising the PARK, IPUI and UAK) in the
handset for PARI or SARI. For using a SARI, you must subscribe your PP to one
system, and copy the subscription record to other systems, all having the same SARI.
You don't need to subscribe that PP anymore to the other systems.
Figure 3-7 Using SARI in three DECT Systems gives an example of three different
DECT systems (three different PARIs) and one SARI. In this example the PP is
subscribed to the SARI of system X. This SARI is not unique because the other
systems have the same SARI. Therefore the subscription record can be copied from
DECT System X to the other DECT Systems. (The DECT Manager allows you to copy
the subscription record from one DECT System to another.) When the PP receives
radio signals from system Y or system Z, it first checks the PARI of that system and if
that doesn't match with its PARK it will do a check for the SARI of that system. The
SARI matches with the PARK in the PP, and because the subscription data was
copied, the UAK will also match. So, the PP can also be used on systems Y and Z.
4
the general configuration of the Business Mobility IP DECT system in an
SIP Proxy configuration.
1.1 DAP
The DAP (DECT Access Point) is the actual DECT transmitter/receiver. There are
three generations of DAP types: AP200, AP300 and the AP400. The AP400
series is the latest model.
All DAP Types supports up to 12 simultaneous calls. For the AP400, functionality
licenses are applicable.
Besides radio traffic, the DAPs take care of subscription control and call control
data handling to/from the SIP Proxy.
The AP200, AP300 and AP400 are equipped with internal antennas. For all types,
there is a version that supports connecting external antennas: the AP200E,
AP300E and the AP400E.
Besides the items mentioned above, the DAP Controller software comes with a
Configurator, to setup the IP DECT Configuration.
The SIP Proxy Server accepts session requests made by a SIP UA (User Agent).
The UA in this configuration, is the user that is subscribed to the IP DECT system,
or any other SIP phone. When the SIP Proxy receives a call requests it will
normally consult the SIP Registrar server to obtain the recipient UA's addressing
information. The SIP Proxy can be combined with the SIP Registrar.
The SIP Registrar server contains a database with the address information of all
User Agents in the SIP domain. The Registrar server receives and sends UA IP
addresses and other pertinent information to the SIP Proxy server.
The SIP Registrar and SIP Proxy are logical "roles" in the SIP structure that can be
played by separate devices but also by one device. For the purpose of clarity, in the
figures in this chapter the two roles are depicted on separate devices.
In this manual you will only see the SIP Proxy server and the SIP Registrar server and no
other SIP servers like a SIP REdirect server or SIP Location server. The reason for this is
that the IP DECT system (holding the SIP UA's) communicates with the SIP and Proxy
and SIP Registrar and not to other SIP server types. The other SIP servers work on a
different level in the SIP configuration.
The VLAN Router is a "switch" that separates the IP traffic between the WAN and
the VLAN. It is strongly recommended to setup a dedicated Ethernet network for
the Business Mobility IP DECT configuration because of the high Quality of
Service (QoS) requirements.
The load on the network can be high due to rerouting of calls via the LAN.
Via the WEB Browser, you can access the DAP Manager. Via this WEB interface,
you can subscribe handsets and change a limited number of configuration
settings. Note that the WEB browser must be Internet Explorer 6.0 or higher!
The WEB Browser is shown in the picture as a separate PC. However, the WEB browser
on the DAP Controller PC can be used as well! This means that a separate PC with WEB
browser is not necessary.
When there is a call for a DECT handset, SIP Proxy sends a call setup message
(Invite) to a DAP. The DAP forwards this message to the handset. When the
handset goes off hook, the speech path is established between the handset, the
DAP (as SIP UA) and the other party (other UA).
However, before you can establish a call, the handset must have been subscribed
and registered in the SIP Registrar. If the handset is subscribed in the IP DECT
system but not in the SIP Registrar, it is no problem because the registration will
automatically take place. It is also possible to setup calls without registration in a
Registrar server. In that case you must setup the Business Mobility IP DECT
system, to communicate with the SIP Proxy only.
In the following sections, processes in the system are described in more detail.
Before you can use a handset, the handset must be subscribed to the Business
Mobility IP DECT system. Besides that the handset must be registered as UA in the
SIP Registrar server. Subscription requires manual intervention, registration is done
automatically. Figure 4-2 Phases in the Subscription Process shows the phases in the
subscription process.
1. The administrator starts a subscription process via the DECT Manager WEB
page. This WEB page is accessible from a WEB browser in the network.The
administrator "enables" a subscription, which means that the subscription
process is started. The Business Mobility IP DECT System is now waiting for
action from a handset.
2. Now the subscription must be executed from the handset. The handset user
must enter the PIN code that is displayed on the DECT Manager WEB page.
When the PIN code is entered on the handset, the subscription record is created
in the DAP Manager Database.
3. The DAP Manager will distribute the subscription data to one of the DAPs.
Distribution has the following characteristics:
The DAP Manager tries to distribute the subscription records equally over
the DAPs.
The maximum number of subscription records per DAP is 25.
Once a subscription record is stored into a DAP, it will normally not be
moved to another DAP anymore. There are two exceptions on this: If you
"Delete" a DAP manually from the DAPs list in the DECT Manager, the
subscription records of that DAP will be distributed over the remaining
DAPs. If the handset moves to/from a branch office, the subscription
record moves with the handset to/from the branch office. Moving
subscription between main site and branch office(s) is activated when the
handset does a "location registration" in the main site or branch office.
Note that the DAP Manager must be active to make this moving possible.
If DAPS are connected in a Branch office, the Branch office is regarded as
a subscription island. The subscription record for a handset is either in a
DAP at the main site or in a DAP at (one of) the branch office(s). When a
handset executes a "location registration" at the main site or one of the
branch offices, the subscription record is moved to the island where the
location registration was done.
4. The DAP sends a SIP Register to the SIP Proxy/Registrar to register itself as a
SIP extension (UA).
After the subscriptions are executed, each DAP contains a number of subscription
records. The DAP Manager contains subscription data of all handsets in the system. If
the DAP Manager is disconnected, the system remains operational.
When a DAP goes down, the subscription records in that DAP are not accessible
anymore, and therefore, the associated handsets cannot be used anymore. However,
the subscription records of a broken DAP are automatically distributed over other
DAPs after 10 minutes down time. This time is adjustable, the shortest time is 5
minutes.
This automatic distribution requires that the DAP Manager must be up and running. If
not, automatic distribution does not take place!
When you connect the DAP Manager after a DAP went down, the timer starts from
the moment that the DAP Manager is up and running. This means the you can
replace the faulty DAP with a new one, with moving the original subscriptions to the
new DAP within those 10 minutes. This time is configurable.
DECT Handset registration means that a DECT Handset makes itself know to the SIP
Registrar. This information is needed to store relation between the extension (UA)
number and its IP address and/or the full computer/device plus domain name. The
Registrar holds a database containing the data of all UAs that are registered in the
(local) domain.
Registration data can be stored for a limited time period only, which is by default 3600
seconds. This time period is issued to the Registrar server. The Registrar server
normally accepts this time period, but may also change the time period. The Registrar
tells the Business Mobility IP DECT system the stored time period (in the "ACK"
message). When the time expires, the registration is removed from the Registrar.
However, the Business Mobility IP DECT system knows when the timer expires and
will execute a register again.
At subscription
When the DAP holding the subscription record of an extension (UA) starts up
With an interval of 1 up to 25 minutes (depending on the number of
subscriptions in the DAP.
It is not always necessary to do a registration to a Registrar service. Depending on the
SIP servers configuration and the SIP Proxy type, registration can be done implicitly via
a call setup (INVITE) request from the UA to the SIP Proxy. In that case no Registrar
server is used and no registration expiry timer is used.
The registration takes place between the DAP where the subscription record of the
handset resides and the SIP Registrar. So, the handset does not have an IP address and
the handset does not contact the SIP Registrar directly.
The handover mechanism ensures seamless handover from one DAP to the other
DAP in a multi DAP (radio) environment. So in other words, when a handset is in an
existing voice call, it can move between the DAPs without losing the connection or
hearing a click.
In Figure 4-4 Call Connection Before Handover, a call is depicted between a SIP IP
telephone and a DECT handset with extension number 200. The speech path is a
peer-to-peer VoIP connection between the SIP IP extension and a DAP.
However, handset 200 moves from one DAP to another DAP. See Figure 4-5
Handover Action Started. The handset searches for a better radio signal, and detects
that the second DAP has a better signal. The handset issues a request for handover
to the new DAP. However, the new DAP does not know where the existing voice
connection to handset 200 resides so it issues a multicast request for searching
previous connection to handset 200 over the network with DAPs. The original/first
DAP responds to this request because the call was initially be set up via this DAP.
Now the connection is copied from the original/first DAP to the second/new DAP. See
Figure 4-6 Handover Taken Place, New Connection Active. The original/first DAP will
release the radio connection to the handset and the new connection remains in place.
Note that the original connection is not removed from the original DAP, but this DAP
"relays" the connection to the second DAP. The original DAP cannot release the IP
voice connection, because the IP voice connection between the SIP IP extension and
the DAP 4 is established, based on a combination of sockets. This combination is
fixed during the connection.
When a second handover takes place from DAP 2 to DAP 3, DAP 1 will setup a second
relay to DAP 3 and REMOVE the relay to DAP 2. So the maximum number of relayed
RTP streams per call in the network is 1.
The DAP Manager is not required for call handling. A simple Business Mobility IP
DECT system will therefore look like Figure 4-7 Simple Business Mobility IP DECT
configuration without DAP Manager.
Figure 4-7 Simple Business Mobility IP DECT configuration without DAP Manager
The radio network structure supports seamless handover of existing calls. This
means that when there is a call, and the handset moves from one radio to
another, that other radio should take over the call. The call may not be interrupted
and the user may not hear any click or what so ever. If the handset needs to re-
synchronize to the other radio, then the user will hear at least a click. So,
supporting handover requires an accurate synchronization of the radio signals in
the air. How is this achieved?
Synchronization cannot take place via the cabling structure, because Ethernet
does not allow transport of synchronous data, or in other words, the timing of data
sent via Ethernet is not accurate enough. Therefore synchronization must go via
the air.
A DAP (Radio) cell can be seen theoretically as a circle around the DAP. In Figure
4-8 Radio Synchronization, you see two circles around the DAP: one in which you
have sufficient radio signal strength for a good voice quality, and another (wider)
circle with sufficient signal strength for synchronization. Due to the cellular
structure of a DECT Radio Network, there must always be overlap in the cells with
sufficient voice quality. The wider cell limit around the DAP will therefore have
quite some overlap with the other cell, and will reach to the radio of the other cell.
This means that the DAPs of the overlapping cells receive (weak) radio signals of
each other. However these radio signals are still strong enough for
synchronization purposes.
The receiving DAP checks the radio signals on PARI, to make sure that it belongs
to the same DECT system. If they belong to the same DECT system, the DAPs
will synchronize with each other according to predefined rules.
The DAPs are always transmitting via a minimum of two bearers. If there are no
voice calls via a DAP, the DAP will transmit two dummy bearers. If there is one or
more voice calls via the DAP, there will be one dummy bearer plus the voice
call(s).
When DAPs try to synchronize to each other, there must be a hierarchy structure.
One or more DAPs must be assigned as synchronization source. The system
arranges this itself, and under normal conditions you don't need to do anything.
However, if you have a complex DAP cell structure, manual intervention might be
needed.
When a DAP is started up, it will try to synchronize to a DAP in the environment.
Each DAP has its own unique identifier, the RPN (Radio Part Number). The RPN
is a hexadecimal two digit number. A DAP will always try to synchronize to a DAP
that has a lower RPN.
If a DAP "sees" more than one other DAPs, the DAP will synchronize to the DAP
that has the shortest path to the synchronization master. If the path to the master
is the same number of hops for more DAPs, the DAP will synchronize to the DAP
with the lowest RPN.
It is possible that there are more than one "synchronization islands" in the system.
In that case, each synchronization island has its own synchronization master. The
synchronization algorithm is applicable for each individual island.
The DAP Controller keeps track of the synchronization structure. Note that the
RPN number that the DAPs have, are assigned once, when they start up after
installation. The DAP that reports itself at first will get the lowest number, which
means that it will become the source for providing the synchronization to the DAP
network structure.
010
The automatic assignment of RPNs starts at 010 when the IP DECT system is
setup as Distributed DAP Controller.
After the numbers are assigned at the first time start up, these numbers are stored
in a file in the DAP Manager and will not change anymore, even after system
start-up.
Practice has indicated that coverage measurements for traditional DECT can also
be applied for Business Mobility IP DECT.
IP Port Numbers are assigned for a speech connection. They are assigned per
session, and then released again.
9.1 General
Features
The following list contains features that are only supported if the PBX supports it at well.
The AP200 is the General release of the DAP for the Radio Traffic. It complies
with all characteristics mentioned in section 2.9.2 "Common Characteristics". In
addition to that it supports G.729 (G.729AB).
The AP200S complies with the common characteristics as given in 9.2 Common
Characteristics. The AP200S does not support G.729.
The AP200S must be used with the associated DAP Controller software Release
4 for AP200S or with DAP Controller Release 5.
The AP200E is the same as the AP200 but allows you to connect external
antennas. When used in an AP200S configuration it behaves as if it is an
AP200S.
9.6 AP300
The AP300 is described in the AP300 Customer Engineer Manual. Please consult
the AP300 Installation Manual for more information:
The AP300 and AP300E can be mixed with the AP200 and AP200S in the same system.
However, make sure that either all DAPs in the same system do support G.729 or all DAPs
do not support G.729. A mix is not allowed.
9.7 AP300E
The AP300E is the same as the AP300 but allows you to connect external
antenna's. When used in an AP200S configuration it does not support G.729.
9.8 AP400
9.9 AP400G
9.10 AP400E
9.11 AP400C
The AP400C is used for IP DECT with PBX type: IPC100/IPC500, SV8100,
SL1000/1100
9.12 AP400S
The AP300/AP400 is powered via PoE. It supports Class detection. The AP300/
AP400 is a Class 2 device when used on PoE Switches. For more information consult
the AP300/AP400 Installation Manual.
IP DECT allows you to setup an IP DECT System with more than 256 DAPs. There
are two possibilities.
System with Branch offices - Maximum number of DAPs per IP DECT system
with Branch Offices is 750. Per Main site or Branch Office, the maximum
number of DAPs is 256.
This configuration can be setup with the standard IP DECT installation. For
more info, see Section 13 RPN Number Ranges per Branch Office on page 4-20
and Section 5 System Configuration on page 11-17.
One IP DECT Cluster with seamless handover - Maximum number of DAPs
per IP DECT System is 750, all on one location (Main Site). Please note that this
type of system is possible on "project" base and is not part of the standard
installation. For more information, please contact your IP DECT supplier.
You can specify the range of RPN numbers that you want to use in the Head Quarter
and in the individual Branch Offices. That allows you to use up to 750 DAPs in one IP
DECT installation. Per Branch Office, the maximum number of DAPs is 256. Also in
the Head Quarter, the maximum number of DAPs may not exceed 256.
The Branch office DAPs are not allowed to "see" DAPs of other Branch Offices or the
Head Quarter.
Because the RPN number range is related to the Head Quarter or to Branch Offices,
the RPN number range is related to an IP network segment.
The DAP Configurator lets you set up the configuration in a very simple way, by
means of assigning RPN numbers to a Branch Office.
The RPN numbers in the DAP Manager exist of three digits instead of two. The RPN
number that is displayed in the handset (in special mode) consists of the two least
significant digits of the RPN number in the DAP Manager.
SECTION 1 GENERAL
Chapter
From IP DECT Release 6.0 onwards, licenses are introduced. All licenses
5
has to be entered into the DAP Controller.
Please note that this license is made dependant on the system size. The steps
are:
10 DAPs
50 DAPs
100 DAPs
256 DAPs
Please note that the total number of DAPs is the sum of the licences. E.g. when you
have 70 DAPs, you need one license for 50 DAPs and 2 licenses for 10 DAPs. (1x50)
+ (2x10).
There are a number of licenses that are only available on project base. Special
support is required.
The system assurance license is a license to allow software upgrading from Release
6.0 to higher versions. The license is based on the number of DAPs. The license is
already mentioned in Section 2 Functional Licenses.
Note that there are two ways to get the Software Upgrade License:
IP DECT Release 5 was license free, in IP DECT Release 6.0 and higher you need
license for the various functions and features.
When you upgrade from Release 5 to Release 6, the system will automatically
generate a license file with all the features that your system had in Release 5. So, you
do not need to have a license prior to upgrading.
From Release 6 onwards, the DMLS is licensed in the DAP Controller License
mechanism. You don't need a dedicated license for the DMLS anymore. The license
is based on the number of DAPs.
In the DAP Controller, there is a license for "DECT Messaging" and for "DECT
Location detection". The Location Detection license is on top of the Messaging
License.
DMLS License String - When you already have a DMLS license string, you can
use that license in the DMLS and you can import that license string into the DAP
Controller License mechanism by means of the button "Add DMLS". (See
section 9.13.3 License Information Window.). Please note that this is applicable
for the Messaging license as well as for the Location license.
DAP Controller License for Messaging and perhaps also Location
detection - When you have a license for Messaging or Location detection on
the DAP Controller, you can synchronize the DMLS application with it. The
DMLS can retrieve the license data from the DAP Controller license mechanism
by means of one button.
When you have a "CTI license" for Messaging on the DAP Controller, you do not need
to have the Messaging license in the DAP Controller.
With version 6.0 DAP Controller software you must obtain a license from the License
Manager Server (LMS). To do this you must create a DECT site to apply the version
6.0 licenses to using the PARI code from the IP DECT license CD as the hardware
key code. The DECT license is not applied to the main SV8100 site, but is applied to
the DECT site that you create.
3. Create a DECT site using the PARI Code from the IP DECT License CD as the
hardware key code.
4. Apply DECT license from the Available Purchase Orders to the DECT system
created in step 3.
6. Apply DECT license to DAP Controller following the steps in section 9.9 License
Handling on page 11-42.
For more information, consult the applicable sections in the chapter that describes the
DAP Configurator Settings:
From IP DECT Release 6.0 onwards, licenses are introduced. All licenses
6
has to be entered into the DAP Controller.
All IP switches that are involved must support IP multicast, with "IGMP
snooping" disabled.
Furthermore, disable "Spanning Tree Protocol" on ports that are used for
DAPs and set the switch ports to "fast forwarding".
Please note that the TTL is the TTL value for IP Multicast, which must allow
Multicast traffic over the Routers in the Routed Head Quarter. That should be
higher than 1, but based on the TTL settings in the Router, it is advised to use a
TTL value of 32.
Please note that the Aggregated subnet mask is the subnet mask that includes all
three networks in the Head Quarter. So, this is NOT the IP subnet mask on the
Network adaptors on the IP Network segments. Please do not mix up the
Aggregated Subnet Mask and the normal IP Subnet mask.
Figure 6-7 Example of an IP DECT Routed Head Quarter Configuration with Branch Office
Figure 6-9 Example of an IP DECT Routed Head Quarter Configuration with a Routed Branch Office
In the Head Quarter the Multicast TTL >1, and in the branch Office the
Multicast TTL >1(!).
Edge Router, connected to the WAN, should not forward Multicast
packages to the WAN.
The Routers between the Routed Head Quarter and the Routed Branch
Office should block Multicast!
Full support of seamless handover between all DAPs in the Head
Quarters configuration with the subnet. Full support of hand over in the
Routed Branch Office. No handover between the Routed Head Quarter
and the Routed Branch Office.
Routers in the Head Quarter must support IP Multicast routing.
Routers in the Routed Branch Office should support IP Multicast
Routing.
In the IP DECT configuration, you must define which subnets are in the
Head Quarters and which subnet(s) is/are Branch Office subnets. You
must do that by means of specifying the Aggregated subnet mask that is
needed to cover all Head Quarters subnetworks (e.g. 255.255.252.0 for
in this example.). Also in the Routed Branch Office, you must calculate
the Aggregated subnet mask that covers all subnets in the Routed
Branch Office.
Figure 6-10 Routed Head Quarter with Routed Branch Office Setup Configuration Example
SECTION 1 GENERAL
Chapter
7
the Site Survey (also called Deployment). Besides that, the following
should be respected:
The DAPs support Power over Ethernet, the so called PoE (laid down in
IEEE802.3af specification). The DAPs support both types of PoE:
phantom power as well as power over spare wires.
The DAPs must get their IP addresses, configuration file and firmware from the IP
network using a DHCP Server and a TFTP Server.
When a DAP starts up, it tries to contact a DHCP server on the network. It should
get the following items from the DHCP server:
1. IP Address
2. Subnet Mask
3. Default Gateway IP address
4. Next Boot Server IP address. This is the IP address of the TFTP Server
(DHCP option 066)
5. Configuration file name (dapcfg.txt) available via the TFTP server
(DHCP option 067)
Note that you must enable option 67 in the DHCP server whether you fill in a
file name or not. If you do not fill in a file name, the DAP will try to upload the
default configuration file name dapcfg.txt. If you fill in a file name in option
67, the DAP will upload the configuration file name that you have entered
here. It is strongly recommended to leave the file name field blank.
The easiest way to provide the DAPs with the correct data from the DHCP server,
is using the DHCP server that comes with the DAP Controller installation
software. The DAP Configurator tool allows you to setup the required DHCP
server configuration easily.
The DHCP Server that comes with the installation of the DAP Controller/Manager is by
default installed when you do the installation for "Multiple System". If you do the
installation for "Single System", the DHCP server is not installed by default. However, if
you select "Custom" installation you can choose to install or not install the DHCP server.
However, if you don't want to use the DHCP server that comes with the DAP
Controller installation, e.g. because there is DHCP server already in the network,
you can use a DHCP server of your choice. But make sure that the required
parameters are delivered to the DAPs.
The configuration file and the firmware are uploaded to the DAP(s) using a TFTP
server. The DAP Controller software includes a TFTP Server. You can select that
TFTP server using the DAP Configurator. When you use the TFTP server that
comes with the DAP Controller, the TFTP Server configuration is automatically
setup correctly.
The TFTP Server that comes with the installation of the DAP Controller/Manager is by
default installed when you do the installation for "Multiple System". If you do the
installation for "Single System", the TFTP server is not installed by default.
However, if you select "Custom" installation you can choose to install or not install the
TFTP server. See installation procedure in Section 7.2 Installing the DAP Controller
Release .
Do not use the TFTP Server that comes with the DAP Controller for permanent use. The
TFTP Server is included in the DAP Controller software, in order to allow you to setup a
system easily, without DAP Controller permanently connected. In a customer network
with the DAP Manager permanently connected, please use the TFTP server that the IT
Manager recommends you to use.
If your DHCP server and or TFTP server is not permanently connected, you can
store the IP address and the configuration file in the DAPS in Flash memory. Note
that the firmware is always stored in Flash memory in a DAP.
To store the IP address configuration in Flash memory in the DAP, the following
two requirements must have been met:
The DHCP server must issue an "Infinite" lease time. (The DHCP server
that comes with the DAP Controller issues such a lease time by default!)
In the configuration setup, you must select "Replace" from the drop
down menu for IP Configuration in the boot options in the DAP
Configurator screen. See Section 3 IP Settings on page 11-3.
After this the DAP does not need a DHCP server anymore.
To store the Configuration file in Flash memory in the DAP, the following two
requirements must have been met:
The DHCP server must issue an "Infinite" lease time. (The DHCP server
that comes with the DAP Controller issues such a lease time by default!)
In the configuration setup, you must select "Replace" from the drop
down menu for DAP Configuration in the boot options in the DAP
Configurator screen. See Section 3 IP Settings on page 11-3.
When IP configuration and configuration file are stored in the DAP, the DAP does
not need to have a DHCP server nor TFTP server anymore in the startup
processes.
When a DAP starts up, it still does a DHCP request and TFTP request. If it gets valid data
from the DHCP Server and TFTP server, and a valid configuration file with boot options
set to "erase" or "Replace" it will either erase or replace the stored data. If it doesn't get
those three items (DHCP, TFTP and valid file) the DAP ignores the data that it has got,
and starts up with the stored data.
If you install the DAP controller/Manager software as "Single System" the DHCP and
TFTP server are normally not installed. This means that you must use your own DHCP or
TFTP server. Consult the "Business Mobility IP DECT Advanced Data Manual", Chapter
"Other DHCP/TFTP Servers" for examples of other servers.
It is possible to use a DHCP server or TFTP server of your choice. However, the
DHCP server must provide the five parameters as mentioned in 3.1 DHCP Server
on page 7-2. Also mind the lease time specification if you want to store IP
configuration and/or DAP configuration data in the DAP(s).
In the IP DECT Advanced Data Manual, you find examples of how to setup other
DHCP and TFTP servers.
The PC that is used for the Business Mobility IP DECT software must
8
comply with the following requirements:
Besides the operating system, the Windows WEB server, called IIS (Internet
Information Services) is required. However, during installation, IIS is automatically
installed.
When you install the DAP Controller software under Windows XP or Windows
2003, the system may ask for the Operating System CD-ROM/DVD-ROM.
On the client computer, you must use Internet Explorer 6.0 or higher to view the DECT
Manager WEB pages.
The DAP Controller software requires .NET Framework 4.0. However, this is
automatically installed when installing the DAP Controller software.
If there is already another version of .NET Framework on your PC, it does not do
any harm. .NET Framework versions can co-exist.
You should use the built-in DHCP server that comes with the DAP Controller only in very
small installations (< 10 DAPs).
SECTION 3 VIRTUALIZATION
The Virtual Machine system should meet the requirements for a non virtalized server.
If the network connection on the virtual machine is shared with another virtual
machine or the Host, make sure that there is sufficient bandwidth available for the
DAP Controller Virtual Machine.
Marathon software with the EverRun® software and Citrix XenServer can be used to
provide fault tolerance on various software applications. IP DECT Release 6 supports
working on a Marathon platform, to provide fault tolerance.
For more information on the Marathon software, please consult the NEC Unified web
page.
Please note, that IP DECT supports built-in Redundancy on the DAP Controller and
Proxy without Marathon,. See Redundancy (General) on page 12-1.
SECTION 1 PRECONDITIONS
Chapter
Make sure that you have decided which DHCP Server you are going to
9
use. Also make sure that you have decided which TFTP server you are
going to use.
Also make sure that the network components (Switches, Routers) are
correctly configured for VoIP and IP multicast. Be fully aware of the
network topology! Make sure that the network supports IP Multicast
between all network components that are used for Business Mobility IP
DECT.
Now the installation of "Prerequisites" takes place. Note that this can take
several minutes! When all required prerequisites are installed, Figure 9-2 Install
Prerequisites displays.
In case of Windows XP or Windows 2003, the system may ask for the Windows
Operating System CD/DVD-ROM. If asked for, insert the CD/DVD-ROM.
7. Click Next to continue. Figure 9-3 Install Shield Wizard displays, indicating that
the system is ready to start the installation of the DAP Controller.
9. Please select the system type that you prefer, Multiple System or Single
System.
Select Single System if you want to manage only one IP DECT system, or
Multiple System if you want to manage more than one IP DECT system with
your PC. Click Next.
If you select Single System the DHCP Server and TFTP Server are not installed (by
default). However, if you want to install them anyway, select the option "Custom" in step 9,
and select DHCP Server and TFTP Server to install.
If you select Multiple System, the Services that are installed for IP DECT are installed
with startup parameters "Manual". This means that they will not start automatically when
Windows boots up. If you select Single System, the Services will be installed with startup
parameters "Automatic".
You can always change the settings from Multiple System to Single System and vice versa
later on. See Section 4 Single Site / Multi Site on page 10-8.
12. Click Install to begin the installation. When the installation is finished, Figure 9-7
Installation Complete displays.
When the Launch DAP Configurator is checked, the DAP Configurator will
start after clicking Finish. If not, the installation finishes, but the DAP
Configurator will not start. However, you can start the DAP Configurator from the
Programs menu later.
SECTION 1 GENERAL
Chapter
The DAP Configurator is a tool for creating the configurations files for the
10
DAP Manager and DAPs. It is automatically installed when you install the
DAP Controller/Manager. It is also automatically started up during the
installation of the DAP Controller/Manager.
After you went through the DAP Configurator windows and you have
entered the correct data, a number of configuration files are created.
You can always start-up the DAP Configurator tool using the shortcut to
the DAP Configurator tool in the Start > All Programs > DAP Controller
> DAP Application > DAP Configurator menu.
If there is a problem with your network card (e.g. no cable connection), you
will receive a message. Please solve the problem. If you do not see this
message, continue with the next step in this procedure.
If you are starting the DAP Configurator for the first time, the system asks
you for the license file as seen in Figure 10-2 Select License File.
3. Select the license file and click open. Figure 10-3 System Control
displays.
If you do not have a license file, the system allows only up to 4 AP400S DAPs.
If you start-up the DAP Configurator after configuring a system, you will see
one or more extra buttons highlighted.
The way the buttons are greyed out may be different in your system.
4. In the System Control section (left side) click the button that is applicable
to your need. For a new installation it will be New System.
If you don't want to start a new system installation, consult Section 3 System
Control Section for more information on the buttons.
If you want to change system settings, you must use the buttons in the top part
of the window. These buttons are described in Section 1 Settings Buttons
on page 11-1.
5. Continue with the section that is applicable for your situation.
3.1 General
The System Control section is located at the left side of the IP DECT Configurator
window.
Using one PC, you can manage more than one IP DECT system. For such an IP
DECT system you must setup a configuration on your PC. For each individual
system, you can change settings, using the buttons in the top part of the window.
However, you can have only one IP DECT system configuration active at the time.
Therefore, you can start or stop an IP DECT system.
When you "Stop" an IP DECT system, the DAPs remain up-and-running. This means that
you can still make and receive phone calls. However, the DAP Controller/Manager
function is stopped, which means that some functionality (e.g. messaging or moving
between Branch Offices) does not work anymore.
Figure 10-4 System Status Window displays when you click the System Status
button. Note that when you have more than one IP DECT system (configuration)
you must selected a System first, using the Modify System button and that you
have saved your new configuration before starting it.
Make sure that you have stopped a previously running system.
If you have made a new configuration, or if you have changes configuration settings, make
sure that you have saved the configuration first, using the Save System button.
Starting or stopping the system, only starts or stops the services and applications running
on the DAP Manager PC. This means that the DAPs remain operational. Basic call
handling is still possible if the DAPs are up and running.
In addition to the services and applications on the PC, you can also reboot the
DAPs.
When you start a System, the IP DECT Configurator may ask you if you want to
reboot the DAPs as well, Figure 10-5 Reboot DAPS. Note that this can be
necessary, because the configuration changes must be uploaded to the DAPs as
well. This requires a reboot!
If you use the DAP Manager PC to manage one IP DECT system only, you can create
a single site system. If you want to use your DAP Manager PC to manage more than
one IP DECT system you can setup the DAP Configurator to manage more than one
site, "multi site". You have made a selection during the installation.
However, if you want to change the single site or multi site setting, follow the steps
below:
1. Make sure that the IP DECT Configurator is open. If not, open the IP DECT
Configurator/DAP Configurator. See Section 2 Using the DAP Configurator.
2. Using the DAP Configurator, left mouse click the top left IP DECT Configurator
3. In the window that is opened, click More. Figure 10-7 About Configurator
displays.
4. You can switch to Multiple system Support or Single System by means of the
check box in the window. Click OK to activate your selection.
In the top part of the IP DECT Configurator window, you see a number of
11
buttons that allows you to change settings in the system. In the following
subsections these settings are explained.
When you click General Settings, Figure 11-1 General Settings displays.
System Name - Can be any given name. Note that this name will be used for a
directory on the hard disk. This means that the name must comply with the
requirements for Windows directory names.
PBX Type - Select the platform to which the IP DECT system is (going to be)
connected. Please note that there is a list of SIP Servers. Choose the SIP
server of your choice. If your SIP server is not in the list, select "SIP" as for
generic SIP.
AP200/300 Package - Here you must enter the firmware file specification for the
firmware package for the AP200 and AP300. For SIP, the file name should look
like this: 4910bxyz.dwl (e.g. 4910b610.dwl).
AP400 Package - Here you must enter the firmware file specification for the
firmware package for the AP400. For SIP, the file name should look like this:
4920bxyz.dwl (e.g. 4920b610.dwl).
AP400 Loader - The AP400 Loader is used for trouble shooting purposes only
and is provided per site on an as needed basis. If you received this firmware
you would enter the Loader firmware package for the AP400. The file name
would be similar to this: 49920112.dwl
When finished, click Apply. On the bottom of the window, you should see, License
valid. Continue by clicking button IP Settings.
SECTION 3 IP SETTINGS
When you click the IP Settings button, Figure 11-2 IP Settings displays.
Please click the tab: DAPs IP configuration. Now the following fields can be
edited:
DAPs Multicast IP address - Specify a Multicast IP address. If the
network for your IP DECT system is used for other purposes than IP
If you have a multiple DAP Controller system, please read DAP Controller
Redundancy on page 13-1, before you continue making the configuration.
You fill in the data of all DAP Controllers in the DAP Configurator of the Primary
DAP Controller.
DAP Controller IP Address - DAP Controller/Manager PC IP address.
You can easily click the button "This PC IP" to copy the IP address of
your PC into this field.
Port range from - Start of port range in use for IP DECT on the DAP
Controller/Manager PC. Note that this port range is automatically filled
in. Please do not change manually.
Enter the IP Addresses of the DAP Controllers that are in your system.
When you enter more DAP Controllers than your License allows, you will get the message
"License Violation".
Please click the tab: Proxy IP configuration, Figure 11-6 Proxy IP Configuration
displays. Now the following fields can be edited:
Single Gate Keeper - Click this radio button to select a system type with
only one gatekeeper.
Proxy IP address - Enter the IP address of the SIP Proxy.
Proxy port number - Enter SIP port number on the SIP Proxy. The
default port is 5060
Multiple gatekeepers - When you click this radio button, are able to
enter more than one SIP Proxy address. This is can be useful for
redundancy reasons when having a dual SIP Proxy. You can add as
many proxies as you want. Please note that this option is only available
for SIP servers that support redundancy.
Strip DNR prefix - When you check this checkbox, the system will strip
one or more digits from the subscribed number and send the remaining
digits to the SIP proxy. In case of a system with one SIP proxy the
digit(s) are configured in the "SIP Settings" window, under the tab:
"Configuration settings". In case of a multi gatekeeper configuration,
the digits are specified in the table of Proxies in this window.
Please click the tab: CDA IP Configuration, see Figure 11-7 CDA IP
Configuration. Now the following fields can be edited:
Corporate directory IP address - The IP address of the Central
Directory Server (if applicable)
Corporate Directory port number - Port number on the Central
Directory server. Default port number is 30160
Please click the tab: Network card settings, see Figure 11-8 Network Card
Settings. Now the following fields can be edited:
Please not that the IP settings on the network card are automatically
changed, but are not changed back to the previous settings.
Please click the tab: DHCP Settings, see Figure 11-9 DHCP Settings. Now the
following fields can be edited:
Run DHCP Server on this PC - If you check this box, the DHCP Server
that is installed on your PC for IP DECT will be activated. Note that this
DHCP Server accepts DHCP requests from DAPs only if you check the
checkbox "DAP IP range exclusive for DAPs only". In that case it will
ignore other DHCP requests. When you use the DHCP Server it will
issue addresses in the range that you specify in the "DAP IP Range".
When enabled, it runs as an Application under MS Windows. The settings
are stored in the file dhcpsrv.ini in the system directory.
Please click the tab: TFTP Settings, see Figure 11-10 TFTP Settings. Now the
following fields can be edited:
Run TFTP Server on this PC - If this box is checked, a TFTP Server will
be running on your PC as "Service". The settings for the TFTP Server
are automatically set correct for your configuration. Note that a TFTP
Server is needed when a DAP starts up, unless the configuration file is
stored in the DAP.
TFTP Server - Select the TFTP Server that you want to use for the IP
DECT Configuration. If you select the "3Com Tftp Server on this PC" it
enables the TFTP server that is part of the DAP Controller/Manager
software package. When enabled, it runs as "Service" under MS
Windows. The settings are stored in the file 3CTftpSvc.ini.
TFTP Folder - Automatically filled in. The TFTP folder is the folder
where all system information is stored. Default folder is: C:\Documents
and Settings\All Users\Application data\Nec\DAP
Controller\<system name>. When you are using Windows 7 or
Windows 2008, the directory is C:\ProgramData\Nec\DAP
Controller\<system name>.
TFTP Server IP Address - This is the IP address of the machine where
the TFTP server is running. When you have chosen to use the built-in
TFTP server, you cannot change this IP address because it is the IP
address of your machine.
Monitor TFTP Server - This allows you to monitor the TFTP activity of
the built-in TFTP server. You see the results in the System Status
Window, which is opened when you click the button "Activate /
Deactivate / System Status". See section 3.2 System Status Window on
page 10-6.
Please click the tab: Leased IP Addresses, see Figure 11-11 Leased IP
Addresses. Now you see a list of Leased IP addresses in the Built-in DHCP
Server.
Please click the tab: QoS Settings, see Figure 11-12 QoS Settings. Now the
following fields can be edited:
User Priority - The Priority value is a three bit value which must be
entered as decimal value 0 ... 7, where 7 is the highest priority.
VLAN ID - Here you can specify a VLAN ID. Note that "0" means no
VLAN specified.
QoS on Layer 3 - Here you can enable Quality of Service on Layer 3.
DSCP - If you have enabled QoSon layer 3, you must specify the
Please click the tab: Boot Options, see Figure 11-13 Boot Options. Now the
following fields can be edited:
DAP Boot options - This allows you to store the IP address data and
Configuration data into Flash memory in the DAP. When stored, a DAP
does not need a DHCP/TFTP server anymore. Note that you can "Store"
or "Erase" data.
Data is stored when you have selected to store data AND when the DHCP server issues an
"Infinite" lease time.
When finished, click Apply and continue with clicking button System
Configuration.
When you click the System Configuration button, Figure 11-14 System
Configuration displays.
You can select the type of system that you want to use. Please consult Network
Configurations for more information. Once you have decided which network
configuration you need, continue with the information in this chapter and setup the
configuration as needed.
When you click the pull down icon, you will see the following options as shown in
Figure 11-15 System Configuration Options.
This configuration allows you to have the IP DECT system over various subnets.
A number of configurations are possible. You will need this configuration window
to setup:
A Head Quarter with Branch Office
A Routed Head Quarter with Branch Office
A Routed Head Quarter with a Routed Branch Office
The window Multiple Subnets offers the possibility to specify a certain RPN
range per Branch Office Subnet. Note that you should set the RPN range wide
enough to allow future system expansion. Figure 11-16 Multiple Subnets
displays.
In this window you can right mouse click a line in the shown table. Then you can
add, edit or delete a Branch Office configuration. The following items must be
specified:
Subnet - In almost all configurations, this is the subnet address. It is the
first address in the subnet range, e.g. 192.168.1.0/24.
However, note that this subnet can also be an Aggregated Subnet. An
"Aggregated Subnet" is a Virtual network definition which determines the
network boundaries for an IP DECT Network in which seamless handover is
possible AND which is running over more than one IP subnet. An
Aggregated subnet is a kind of "virtual" subnet that combines several real
subnets.
All DAPs within the Aggregated Subnet allow seamless handover between
each other, although they are spread over different real subnets with
Routers in between.
So, if you have IP DECT running on more than one IP subnet, where
seamless handover is required, you must calculate the Aggregated subnet
and fill it in, in this window
There are two subnets in which IP DECT is installed. The Router supports
IP Multicast and there is seamless handover between the DAPs in different
IP subnets. One subnet is 192.168.1.0/24 and the other is 192.168.4.0/24.
The aggregated subnet is 192.168.0.0/21. This covers both subnets.
Mask Length - This is the subnet mask length, the number of bits used
to identify the network part.
In general, this will be a real netmask length, applicable for one network
segment.
Example:
When your subnet mask is 255.255.255.0, it means 24 bits for the network
part and 8 bits to identify the host part. So, in this example you must fill in
24.
The Mask Length can be the Aggregated subnet mask length. See the bullet above (Subnet) where
the Aggregated subnet is explained.
RPN range - Lowest RPN and highest RPN in this Branch Office.
Make sure that you enter all subnet. DAP in subnets, not included in this list will fail to complete
the boot process.
Time to Live value - The Time to Live value is used for the Multicast
traffic. If the Time to Live for the Multicast is set to "1", Router(s) will not
forward multicast traffic for the associated Multicast Group. If the Time to
Live is higher than "1", Router(s) will forward multicast traffic for the
associated Multicast Group (depending on settings in a Router).
If you are using an Aggregated subnet (see bullet "Subnet" above),
multicast routing is required between the different Subnets and therefore the
TTL must be set to a value higher than 1 (advised 32).
If the subnet that you have filled in, is a real subnet, not Aggregated, you
must make sure that the Time to Live is always 1.
Gate Keeper - This is the Proxy address for the DAPs in this Subnet.
Subnet name - Can be any given name. It is used to identify the Branch
Office.
In this configuration (Figure 11-17 Routed Head Quarter), there are more than
one network segments in the Head Quarter. The routers in this configuration must
forward IP Multicast packages.
Because you have selected the Router Head Quarter configuration, the
Time to Live will always be higher than one. Advised value is 32.
Aggregated Subnet mask - The "Agg. subnet mask" is the subnet mask
for the DAPs to determine the network boundaries for an IP DECT
Network in which seamless handover is possible. It should cover the
network segments that are connected together using routers that
supports IP Multicast. If there are DAPs outside this Aggregated Subnet
Mask, the DAP(s) is/are regarded as in a Branch Office.
If the IP addresses are in the same Aggregated Subnet, according to this
mask, the system assumes that they are in the same subnet. The term
"Aggregated" means that the subnet consists of smaller subnets which are
connected over a router, but according to the subnet mask, all behaving as
one subnet. This is applicable for the "Routed Head Quarter" network
solution either with or without Branch Offices, see 5.3 Routed Head Quarter
and Section 5 Routed Head Quarter with Branch Offices on page 6-8.
Please click the tab: General Settings, see Figure 11-18 SIP Settings - General
Settings. Now the following fields can be edited:
Please click the tab: Configuration Settings, see Figure 11-19 SIP Settings -
Configuration Settings. Now the following fields can be edited:
transport protocol - Use the default protocol UDP. Only for iS3000
other protocols are supported.
Maximum Registration Interval=1 - This is the SIP registration interval
in minutes. This is not the registration interval per handset.
When there is only one subscription in the DAP, the registration interval for
that subscription will be the time specified here. When there are two
subscriptions in the DAP, the registration interval for each of the
subscriptions will be 2/<time specified>. So it will be 2/1 minute. This means
that each subscription will register each two minutes.
Proxy redundancy for SIP. See SIP Proxy Redundancy on page 14-1.
multiple_call_appearance - When the handset is busy and a second
call comes in, you will hear a ticker tone and the display shows "waiting
<cli>". By means of the * button, you can toggle between the two calls. It
behaves in a similar way as having a call on hold. Please note that the
SIP Proxy must be able to support multiple call to one extension number
as well.
Hash_is_release_enquiry_call - When you are in an enquiry call and
you end up on a device like a voice mail server, you cannot hangup the
phone without losing your call. I that case you can press the # key to end
you enquiry call but keep your original call.
Unattended_transfer_method - There are three options: Proxy,
Cancel, Replace. The following options should be chosen for the related
PBX types.
In the following bullet list, with hyphenated sub list, the parameters are explained.
Please click the tab: Authentication Settings, see Figure 11-20 SIP Settings -
Authentication Settings. Now the following fields can be edited:
A Realm name must be unique, do not enter a same Realm name in more
than one field.
You can do authentication based on the User Name in the handset and on entering a password
into the handset. To achieve this functionality, do not enter a Realm name that matches the Realm
name of the Proxy. If IP DECT cannot find a Realm name match, it will copy the Realm name that
comes from the Proxy back to the Proxy again and will request for handset name authentication.
This mechanism works for the G355, G955 and I755 handset only with the latest software in the
handset.
User
The "user" is the name for login on the Proxy/Registrar server.
You can fill in an actual username OR a %s . When you enter %s , the IP DECT system sends the
extension number of the handset making a call. This makes the username extension number
specific.
Password
Password for authentication in the Proxy/Registrar. When you enter %s as
password or part of the password, IP DECT converts that to the extension
number.
When finished, click Apply and continue with clicking button DECT Settings.
Please click the tab: DECT Settings, see Figure 11-21 DECT Settings. Now the
following fields can be edited:
Country Code - The Country code specifies the tone plan for IP DECT
and also selects the correct frequency range and transmitter output
power.
PARI - Primary Access Rights Identifier. This is the Unique DECT
System Identifier. It is an 8 digit hexadecimal string. It is a worldwide
Unique Identifier which you should have received together with your
DECT system.
SARI - The SARI is the Secondary Access Rights Identifier, which is only
needed if you use Multi-Site subscriptions. If you do not use multi-site
Subscriptions, leave this field to the default "FFFFFFFF".
Frequency Table - This shows which DECT frequency range is used.
This differs per part of the world.
You cannot change the setting here, it is a result of the country that you have selected.
Used carriers - By means of this field you can enable/disable the DECT
carriers. Leave all carriers enabled to make sure maximum bandwidth is
available.
Please click the tab: Handset Settings, see Figure 11-22 DECT Settings -
Handset Settings. Now the following fields can be edited:
Handset Page Timer - The Page Timer specifies the time in seconds
between two page requests (retries).
Page timer retry value - The Page Retry Value specifies the maximum
number of paging retries that are issued, if paging a handset fails.
Send date and time to handset - Self explanatory.
Display handset name in DAP Manager INT - When enabled, the
handset name (if present in the handset) will be displayed in the DAP
Manager, in the Subscriptions window, in the Comment field. The
handset name will be displayed between brackets.
Handset Polling time interval - This is a mechanism to check if the
handset is still reachable. Here you specify the polling interval time. If the
handset is does not respond, it will be switched absent in the IP DECT
system.
Please click the tab: DAP Settings, see Figure 11-23 DECT Settings - DAP
Settings. Now the following fields can be edited:
When finished, click Apply and continue by clicking button PBX Settings.
When you see a tab called "Synchronization Settings", it indicates that you have a
license for IP DECT in an environment with a lot of metal causing reflections. The
license is offers additional functionality to reduce the effects of the reflections.
However, it is only available on "Project Base" which means that it has to be
installed by special maintenance engineers. Therefore the Synchronization
Settings window is not explained here.
When you click the Handset Sharing tab, Figure 11-24 PBX Settings - Handset
Sharing displays.
When you click the Three party Conference Settings tab, Figure 11-25 PBX
Settings - Three Party Conference Settings displays.
When finished, click Apply and continue with clicking button Performance /
Email Settings.
When you click the PCR Settings tab, Figure 11-26 Performance Email Settings -
PCR displays.
When you click the Alarm Settings tab, Figure 11-27 Performance/E-mail
Settings - Alarm Settings displays.
Emails can be send automatically when a DAP goes down or when the channel
occupation threshold is exceeded for more than a number of seconds. Note that
this will only work when the DAP Controller/Manager is up-and-running. The PCR
service must be running on the DAP Controller/Manager PC.
Alarm Notification - Alarm notifications can be sent as an e-mail and/or
to the Windows Event Log. See Figure 11-28 Alarm Notification. Please
not that it is possible to convert the events, written to the event log, into
SNMP Traps (consult the Advanced Data Manual.).
When you click the Archive Settings tab, Figure 11-29 Performance/E-mail
Settings - Archive Settings displays.
When you click the E-mail Settings tab, Figure 11-30 Performance/E-mail
Settings - E-mail Settings displays.
CDS port - Here you can change the port number of the CDS. The CDS
takes care of showing the WEB pages. When you change the port here,
the port of the WEB server for CDS is changed. This means that you
must enter the new port number in the URL that you use to reach the
WEB page.
HTTP execution time out - This is a guarding timer for the ASP scripts.
E.g. if the ASP web pages try to send an archive and it takes longer than
the time specified here, it will be terminated.
The time is specified in seconds.
Use client resolution - If you check this box, you cannot scroll anymore
through lists but the available information is chopped up into pages. You
can select pages using tabs. If this box is unchecked, information is
presented in a way that you can scroll through it using the scroll bar.
Note the information is still chopped up into pages, but the pages contain
(much) more information.
Redundancy Time out value - This value is the polling time from the
DAPs to the DAP Controller. When it times out, the DAPs will try to
connect to another redundant DAP Controller
When finished, click Apply and continue by clicking button Customer
Information.
When you click the Customer button, Figure 11-32 Customer Information
displays.
In this window, you can enter customer information. It is only for administrative
purposes. The system does not use this information.
When finished, click Apply. Continue with 9.7 Save System and Start System.
When you have finished with setting up the configuration, you must do the
following:
If you use another TFTP server or DHCP server than the build in TFTP/DHCP server,
consult Using Other TFTP Server on page 15-1 first.
1. Click the Save System button (left side of the DAP Configurator
window), to save the changes you have made.
2. If the firmware file is not yet in the TFTP directory, copy the firmware
file(s) 4910bvxx.dwl (AP300) and/or 4920bvxx.dwl (AP400) into the
TFTP directory. When having AP400, also copy the Loader file
49920111.dwl into the TFTP directory. This directory will normally be the
following directory: C:\Documents and Settings\All Users\Application
Data\Nec\DAP Controller\<system name>\.
When you are using Windows 7 or Windows 2008, the directory is:
C:\ProgramData\Nec\DAP Controller\<system name>.
For more information, see Section 3 System Control Section on page 10-5.
When the system is running correctly, generate a visadm.txt file (in the WEB
Page http://<DAP Controller IP Address>/cds/perfform.aspx) and analyze the
file, using the SyncAnalyser tool.
When you click the button, you will see the licenses presented as
shown in 9.9.3 License Information Window.
Please note that the licenses DAPS, DMESS, DLOCI and DSWU are
based on the number of DAPs.
Licenses that are based on the number of DAPs must always have the
same number of DAPs as licensed in the first item: DAPS. So, if the
number of DAPS is 40, the other licenses (if required) that are based on
the number of DAPs should be forty as well. They cannot be less than
the number of DAPs.
When you have a DMLS license for the DAP Controller License
mechanism, the license information is automatically copied into the
DMLS, when the DMLS starts up (make sure that you have the latest
DMLS.)
When you have a DMLS license for the DMLS itself, (to import into the
DMLS directly), you can enter that license into the DAP Controller, by
means of the button Add DMLS.
SECTION 1 GENERAL
Chapter
Voice
Roaming
Messaging
12
It is important to determine which type of redundancy is required for your
system.
Proxy redundancy has already existed for many years. When a SIP
connection between a DAP and a Proxy goes down or fails, the DAP
can select another (redundant) Proxy. In the DAP, you can set up a list
of Proxy IP addresses with Priorities. For more information about this
type of redundancy, please consult SIP Proxy Redundancy on page
14-1.
DECT Messaging (LRMS) always goes via the DAP Controller. When there is only
one DAP Controller, it is a single point of failure for messaging. In certain
environments, messaging is an important functionality and must be highly reliable.
Therefore it can be necessary to have a Redundant DAP Controller configuration.
The DAP Controller can be made redundant, by means of adding second DAP
Controller in the IP DECT System.
When LRMS is required in individual Branch Offices, you can install a Local DAP
Controller in the Branch Office, that takes care of the DAP Controller functionality
in case the connection to the Central DAP Controller(s) fail. Each Branch Office
can have its own Local DAP Controller. ( DAP Controller Redundancy on page
13-1).
13
DAP Controller Redundancy means that you will have one or more
redundant DAP Controller(s) in you network. If the main DAP Controller
goes down, another DAP Controller takes over the functionality.
So, for the Central DAP Controller(s), you specify a Primary (index 1) and if required,
a Secondary (index 2) DAP Controller.
A special "service" (Redundancy Service) in the DAP Controller takes care of the
redundancy tasks.
All configuration actions are done by means of the DAP Configurator in the Primary
DAP Controller. When done, the configuration must be exported from the Primary to the
other DAP controller(s)
DAP Controller Redundancy in a messaging configuration, means that you have two
DAP Controllers and two DMLS services. Please note that in this description, we
assume that we have Central DAP Controllers (Primary and Secondary), and no
Local DAP Controllers. However, there could be a Local DAP Controller as well. (The
characteristics of the Local DAP Controller are explained in one of the following
subsections.).
The Messaging Application could have been duplicated as well, or it can have an IP
connection to each of the DMLS services.
Figure 13-3 Messaging when Primary DAP Controller Active, shows that, when the
Primary DAP Controller is active, the Messaging Application will send the message to
the DMLS (DMLS 1) that is connected to the Primary DAP Controller. The DMLS will
send the message to the Primary DAP Controller. The Primary DAP Controller will
issue a paging request via all DAPs in the system, to page the handset. When the
handset responds, the message is sent to the handset.
Figure 13-4 Messaging when primary DAP Controller down shows that, when the
Primary DAP Controller is down, the Messaging Application will send the message to
the DMLS (DMLS 2) that is connected to the Secondary DAP Controller. The DMLS
will send the message to the Secondary DAP Controller. The Secondary DAP
Controller will issue a paging request via all DAPs in the system, to page the handset.
When the handset responds, the message is sent to the handset.
Figure 13-5 Message from handset when Primary DAP Controller is active shows the
path of a message from a handset. It will go from the handset to the Primary DAP
Controller. Only if the Primary DAP Controller is down or not reachable, the DAP will
send the message to the Secondary DAP Controller (not shown in the figure.)
Figure 13-5 Message from handset when Primary DAP Controller is active
Please note that the DAP determines where to send the message to: the Primary or
the Secondary DAP Controller. The DAP checks if the Primary DAP Controller is up-
and-running. If it is up-and-running, it will send the message to the Primary DAP
Controller. If not running, it will send the message to the secondary DAP Controller.
connect to the Secondary DAP Controller, based on the on-board priority list of
DAP Controllers. See Figure 13-6 DAP Controller Redundancy. The Secondary
DAP Controller detects that the Primary is not reachable anymore, and will not
allow to do any manual changes in subscriptions anymore.
When the Primary DAP Controller becomes operational gain
When the Primary becomes operational again, the following will happen:
The DAPs continuously poll the Primary DAP Controller to check if it is back again.
Because of that, they will detect that the Primary DAP Controller is up again. Then
they will "lock" on the Primary DAP Controller.
Then the Primary DAP Controller will retrieve the configuration data (subscription
data etc.) from the DAPs, to make the system consistent again. ‘
The Secondary DAP Controller polls the Primary DAP Controller continuously.
When it detects that the Primary DAP Controller is back again, it will request for
configuration data from the Primary DAP Controller. The Primary DAP Controller
already received the latest configuration data from the DAPs, and is up-to-date. The
Secondary DAP Controller will get the configuration data from the Primary, and then
the IP DECT System is consistent again.
What happens when there is a change in the configuration data in the
Primary DAP Controller
When there is a change in the configuration data in the Primary DAP Controller
(e.g. a handset is subscribed, the Redundancy Service in the Primary DAP
Controller sends a notification to all other DAP Controllers (Secondary and
Local DAP Controllers).
Besides the Central DAP Controllers, there can be Local DAP Controllers. A Local
DAP Controller is located in a Branch Office and takes care of the DAP Controller
functionality in the associated Branch Office only, in case the Central DAP Controllers
(Primary and/or Secondary) are not reachable anymore. It performs a kind of
Survivability task.
There can be up to 10 Local DAP Controllers. The DAPs in the Branch Office will
check if the Central DAP Controllers are reachable. If not, they will check if the Local
DAP Controller is reachable, and they lock on the local DAP Controller.
Figure 13-7 Example of DAP Controller Redundancy with two Central DAP
Controllers and two Local DAP Controller shows a configuration with mixed DAP
Controllers, Central and Local. Although capable to send/receive messages, the
Local DAP Controllers are not used for messaging in this example. However, if the
Messaging Application supports it, the Messaging Application could connect to a
Local DAP Controller, to assure that messaging works to the Branch Office.
Figure 13-7 Example of DAP Controller Redundancy with two Central DAP Controllers and two Local DAP
Controller
As a matter of fact, the Secondary DAP Controller does not necessarily have to be
located in the Head Quarter, but can be located anywhere else, e.g. in a Branch
Office. See Figure 13-8 Example of DAP Controller Redundancy with Secondary DAP
Controller in the Branch Office.
In this configuration the Secondary DAP Controller controls the entire IP DECT
system when the Primary DAP Controller fails. The Messaging Application can
connect to the Secondary DAP Controller, via the IP network.
Figure 13-8 Example of DAP Controller Redundancy with Secondary DAP Controller in the Branch Office
When you open a WEB Page on the Secondary DAP Controller, you will see the WEB
Page (DAP Manager screen) on the Primary DAP Controller. So, when you click the
Archive Button, an Archive is created of the Primary DAP Controller, but stored on
the Secondary DAP Controller!
When you want to make an Archive of the Secondary DAP Controller, you cannot do
that via the WEB Page (DAP Manager), unless the Primary DAP Controller is down.
So, you must use the button Archive in the DAP Configurator of the Secondary DAP
Controller.
In the top right corner of the DECT Manager WEB interface, the Redundancy status is
displayed. The redundancy status is either Redundant or Stand Alone. See Figure
13-10 Display Redundant Mode.
SECTION 1 IMPLEMENTATION
Chapter
14
register to a Proxy out of a list of Proxies. Selection criteria (like availability
of the Proxies) determine which Proxy is chosen.
Fail Over - All UAs of one DAP, should register at the same primary
Proxy. In case the Proxy fails all UAs will register at the same
secondary Proxy or when that fails to a tertiary Proxy, etc. When the
primary Proxy is back, all UAs should re-register at the primary
Proxy.
The first Proxy defined in the Proxy List is the primary Proxy, the
second one the secondary Proxy, etc.
At a certain interval, the DAP checks if the primary Proxy is back
again. This is the return-to-primary timer. The time period is specified
in minutes.
Alternating - Two different Proxies are each other's standby. Either
one of the Proxies is active. If one fails, the other one becomes
active. Therefore there is no primary nor secondary Proxy.
The Proxy List contains just a list of Proxies and there is no priority.
Also, there is no timer needed to check if the other Proxy is back
again.
Because no timer is needed, the "return-to-primary timer" is set to
0 minutes, which means "disabled".
Load-balancing - Several Proxies are capable of handling all UAs.
When all Proxies are active, they try to divide the registrations. When one fails,
others will accept the registrations of the failing Proxy.
Proxies in the Proxy List are associated with an extension number prefix, used
as discriminator to determine the primary Proxy.
At a certain interval, the DAP checks if the primary Proxy is back again. This is
the return-to-primary timer. The time period is specified in minutes.
The following algorithms are used for selecting the preferred Proxy:
Selecting the Primary Proxy - The DAP searches from top to bottom in the
proxy-list for the first Proxy that matches the DNR prefix; a Proxy without DNR
prefix always matches. If also a domain name is assigned to this Proxy, the
domain name is always used in each message, also when registered at an
alternative Proxy.
Selecting the Alternative Proxy - If the current or chosen Proxy does not
accept the registration, the next Proxy that matches will be chosen with the
same domain name (irrespective of the DNR prefix, an entry without domain
name always matches); if not successful then restart at the top of the proxy-list
until the current one is reached again; If this still fails then after a timeout the
process starts all over again.
The following triggers will start searching for an alternative Proxy:
Registration Timer - The DAP re-registers the registered handset with the
oldest expiry time for every Proxy (with handsets registered at). The interval is
not a fixed time but a computed value. If a Proxy is not operational (doesn't
answer upon 2 registration attempts) all the handsets registered at that Proxy
will try to re-register. If successful they will stay registered at that Proxy. If not
they will register at the next Proxy configured for that handset. When also the
next Proxy doesn't react, the search for an alternative Proxy will be postponed
and picked up by the regular registration process.
In this scenario worst case it will take 1 minute + the number of handsets per
DAP * 5 seconds before all handsets will be registered at the secondary Proxy
(if this Proxy is up-and-running).
Return-to-Primary timer - At the return-to-primary timer all handsets that are
not active in a call and not registered to their primary Proxy will try to re-register
at their primary Proxy again. If the registration is successful they will stay
registered at the primary. Otherwise they will re-register at their current Proxy.
Handsets that are active in a call or handsets of which the primary is not present
have to wait for the next expiry of this timer before another attempt to re-register
them at the primary will be done. Note that the value 0 means that the timer is
disabled.
With some extra configurations effort it is even possible to give DAPs at different
locations different configuration files and thus different Proxy lists.
The Proxy list must be entered in the DAP Configurator, in the "IP Settings" window.
SECTION 3 EXAMPLES
In this example the first Proxy is preferred. Each 4 minutes a primary check is
done (based on the timer value in the return-to-primary timer), to check if the
primary Proxy is back again.
Refer to Figure 14-1 Example of Proxy settings required for the "Fail Over"
example to see the settings in the DAP Configurator "IP Settings" window.
Figure 14-1 Example of Proxy settings required for the "Fail Over" example
In this example, the timer settings in the DAP Configurator "SIP Settings" window
can be set to 4 minutes. See Figure 14-2 Example of Return to Primary Setting for
"Fail Over" Example.
Figure 14-2 Example of Return to Primary Setting for "Fail Over" Example
After saving the configuration, the following lines (amongst others) should be
present in the dapcfg.txt file:
[GK]
192.168.1.1 5060
192.168.1.2 5060
[XDS]
return-to-primary=4
In this example, the first one that matches will be used until it fails. If it fails, the
second one will be chosen. The second one remains selected until it fails.
The settings in the DAP Configurator "IP Settings" window can be seen in Figure
14-3 Example of Proxy Settings Required for the "Alternating" Example.
Figure 14-3 Example of Proxy Settings Required for the "Alternating" Example
The timer settings in the DAP Configurator "SIP Settings" window should be set
to 0 seconds (to disable the timer), as shown in Figure 14-4 Return to Primary
Setting for "Alternating" Example.
After saving the configuration, the following lines (amongst others) should be
present in the dapcfg.txt file:
[GK]
192.168.1.1 5060
192.168.1.2 5060
[XDS]
return-to-primary=0
In this example, all extension numbers that start with 1 or 2 will have primary
Proxy 192.168.1.1 and all other extension numbers will have primary Proxy
192.168.1.2.
When the primary Proxy for the extension numbers that start with 1 or 2 is
unreachable, Proxy 192.168.1.2 will be used.
The settings in the DAP Configurator "IP Settings" window can be seen in Figure
14-5 Example of Proxy Settings Required for the "Load Balancing" Example.
Figure 14-5 Example of Proxy Settings Required for the "Load Balancing" Example
In this example, the timer settings in the DAP Configurator "SIP Settings" window
can be set to e.g. 10 minutes, as shown in Figure 14-6 Example of Return to
Primary Setting for "Load Balancing" Example.
Figure 14-6 Example of Return to Primary Setting for "Load Balancing" Example
After saving the configuration, the following lines (amongst others) should be
present in the dapcfg.txt file:
[GK]
192.168.1.1 5060 0 1
192.168.1.1 5060 0 2
192.168.1.2 5060
[XDS]
return-to-primary=10
The settings in the DAP Configurator "IP Settings" window can be seen in Figure
14-7 Proxy Settings Required for the "Using Different Domains" Example.
Figure 14-7 Proxy Settings Required for the "Using Different Domains" Example
The timer settings in the DAP Configurator "SIP Settings" window should be as
shown in Figure 14-8 Return to Primary Setting for "Using Different Domains"
Example.
Figure 14-8 Return to Primary Setting for "Using Different Domains" Example
After saving the configuration, the following lines (amongst others) should be
present in the dapcfg.txt file:
[GK]
192.168.1.1 5060 0 1 6 test1.com
192.168.1.1 5060 0 1 6 test1.com
192.168.1.1 5060 0 2 6 test2.com
192.168.1.3 5060
[XDS]
return-to-primary=10
Please note that there is a system type identifier as fifth field in the proxy definition
line. In this example the system type identifier is 6, which means SIP Proxy.
The selection criteria for a change over to a secondary proxy in the list is primarily based
on the domain specification. So, when the primary proxy fails, the system will select the
next proxy in the list that has the same domain name.
SECTION 1 GENERAL
Chapter
The previous sections assume that you are using the built in TFTP Server
15
in the DAP Controller/Manager Software. That is the easiest way because
paths etc. are automatically set correct. However, if you have chosen to
use another TFTP server, paths must be set correct and files needs to be
copied into the TFTP root directory. Consult the following section.
The DAPs will only become operational if they can load the required files
via TFTP. This requires that the DHCP server and the TFTP server are up-
and-running with the correct configuration and it requires that the files for
the DAP are available in the TFTP directory.
1. Determine which TFTP Server you are using. There are four
options:
3com TFTP Server on this PC.
2. In the following steps you must copy the firmware file (and
configuration file) to the upload directory of the TFTP Server.
Therefore, you must know the path settings of the TFPT
Server that you are using. Table 1 Overview of TFTP Servers
provides an overview of the TFTP Servers and the path
settings.
C:\ProgramData\Nec\DAP C:\ProgramData\Nec\DAP
Controller\<system name> Controller\<system name>
Windows C:\tftpdroot\ C:\tftpdroot\
Other Unknown C:\Documents and Settings\All
Users\Application Data\Nec\DAP
Controller\<system name>\
OR for Windows 7 and 2008:
C:\ProgramData\Nec\DAP
Controller\<system name>
Other on Unknown Unknown
other PC
3. Copy the firmware file to the TFTP directory of the TFTP Server that you
are using. If you are using the 3com TFTP server that came with the IP
DECT installation (default!) the default path equals the preferred path.
The dapcfg.txt file is by default stored in the directory:
C:\Documents and Settings\All Users\Application Data\Nec\DAP
Controller\<system name>\.
OR when you are using Windows 7 or Windows 2008, the directory is:
You can open the DAP Manager window using Internet Explorer 6.0 or
higher. Chapter
SECTION 1 WHAT IT IS
Chapter
17
extension number via a "login" procedure.
When a portable is enabled for Portable Sharing, you will get a "Login"
message when you go off hook after one of the following conditions:
Switching off the handset - The handset types C922, C933, C944,
I600, G355, G955, I755 and later types, will send a "Detach" signal
when they are within reach of the IP DECT system AND when the
user switches off the handset!
Putting the handset in charger with silent charging enabled -
The handset type C933, C944, I600, G355, G955, I755 and later
types, will send a "Detach" signal when they are within reach of the
IP DECT system AND when the user puts the handset in the charger
in silent charging mode.
When any type of handset goes out of range, no Detach signal is sent! Therefore "login"
is not activated when the handset comes within range again.
This Portable Sharing mechanism is supported for C922, C933, C944, I600, G355,
G955, i755 and later types. On other types of handsets, support of Portable Sharing is
not available at all, or you can login only once because there is no "Detach" possible
Portable Sharing is disabled by default for the IP DECT system, but can be switched
on using the DAP Configurator.
When enabled, you must designate a certain number range in the subscription
numbers that is used for Portable Sharing. The numbers in this range may NOT exist
as extension numbers in the SIP Proxy. These numbers must start with the same
"prefix". This prefix must be specified in the DAP Configurator and could be e.g. "00".
The DAP Manager PC is always needed for handling the Login information and
for providing the login information to the DAPs (e.g. when a DAP restarts). This
means that the DAP Manager should always be connected and should be up-and-
running. However, it is not "Single point of failure", which means that if the DAP
Manager is down, you can still make and receive calls.
The login information is stored in a file dds-login.txt on the hard disk of the DAP
Manager PC.
To upgrade to the latest release of the DAP Controller software consult the
IP DECT Advanced Data Manual. Chapter
From November 2009 onwards a new DAP will be introduced, the AP300
B
as a successor of the AP200.
In this Appendix you will find an overview of the differences between the
AP200 and the AP300.
Table B-1 Main Differences between AP200 and AP300 highlights the
major differences between the AP200 and the AP300 handsets.
Service/ One LED for AP200 Status. Two LEDs, one for AP300
Maintenance status, another for AP300
network status indication.
Color Light grey (color code 70109) Light Grey, RAL 9010
Relative 5 to 95 % 5 to 95 %
Humidity
C
the AP300.
In this Appendix you will find an overview of the differences between the
AP300 and the AP400. Please note that the AP300 and the AP400 are
similar in many aspects.
Outside 0 C . . . 45 C -5 C . . . 45 C
Temperature
SECTION 1 GENERAL
Chapter
Setting up the SIP configuration requires basic SIP knowledge. Make sure
D
that you have basic SIP knowledge before continuing this Chapter and the
Chapters that follow. The SIP implementation differs between the various
types of SIP Proxy/Registrar servers. It is important to know the basic
characteristics of the SIP Proxy/Registrar server to which you want to
connect the SIP IP DECT system.
The following overview shows the main SIP characteristics of the Business
Mobility IP DECT system:
Table D-1 Supported SIP Features provides a list of supported SIP call handling
features.
Feature Reference
Feature Reference
SIP Music-On-Hold
Table D-2 Configurable Items in SIP IP DECT gives an overview of the items that can
be configured in the SIP IP DECT configuration, in order to adapt to the SIP Proxy
Server and, if present, SIP Registrar. Note that this gives an overview only, the actual
settings must entered during the installation of the Business Mobility IP DECT
software when asked for. It is always possible to change the settings after the
installation.
5.1 General
IP DECT Release 4.2 or higher supports TLS and SRTP. The following items are
important to understand how the IP DECT TLS support is implemented.
5.2 TLS
Using TLS means that certificates must be generated, using a Root Authority. IP
DECT does not support generating Certificates. This means that the SIP Server
must have a build in Root Authority and must be capable to generate a certificate
for every new connection from the DAP. The DAP can verify the server certificate
with the SIP Server Root certificate to authenticate.
TLS is tested against the NEC iS3000 equipment. If you want to connect to another type of
SIP Server using TLS, please contact your IP DECT supplier to check if this is possible or
not.
5.3 SRTP
Note that SRTP is between the SIP User agents, the actual voice data steam. For
encryption, it uses a key that is randomly generated by one of the User Agents.
This key (crypto key) is offered to the opposite User Agent in the SDP. This means
that the crypto key can easily be read if the "Invite" with SDP data is un-encrypted.
Therefore, if you use SRTP, also use TLS, otherwise one could see the key in the
"Invite" and therefore decrypt the SRTP data. (Note that this crypto key is not the
TLS Certificate.) Note that when a call is relayed to another DAP, the encryption
key is security moved to the other DAP as well.
IP DECT Release 5 only supports AES_CM_128_HMAC_SHA1_80 encryption.
You can check the results in the dapcfg.txt file. If you do not select TLS or
TCP, there is no information in the dapcfg.txt file. If you select TLS or TCP,
you will see the following line in the dapcfg.txt file:
[XDS]
transport_protocol=tls or transport_protocol=tcp
If you have selected either TCP or TLS, IP DECT will not fall back to UDP anymore! If IP
DECT would fall back from TLS to UDP, encryption would be gone without knowing.
There is no separate configuration item to select SRTP. SRTP will only be offered when
TLS is selected.
SECTION 1 GENERAL
Chapter
Messaging can only be used with handsets that support LRMS (E2)
E
messaging.
IP DECT supports LRMS (Low Rate Message Services). There are two
options:
Note that the messaging between the Messaging Server and IP DECT, always
goes via the DAP Controller/Manager. It is an TCP/IP connection. The TCP port
for messaging on the DAP Controller/Manager is always the lowest port number
+ 1 (default 28001). The moment that there is a connection to this port, all
messages will be handled by the Messaging Server and handset to handset
messaging is only possible via the Messaging Server.
When the option "Local Message Relay Override" is selected in the DAP Configurator,
the Messaging Server can send messages to handset and handset to handset messaging
is still possible.
When the SIP option "SIP Messaging" is enabled in the IP DECT Configurator, all
messages will go via the SIP interface (SIP instant messaging) and not via the DAP
Controller. SIP messaging does not support Normal, Urgent and Emergency messages
(see Section 2 Types of Messages on page E-3) and it does not support broadcast
messaging. (see section E.3 "Broadcast Messaging")
Messaging Server - Handset Messaging with Local Message Relay
Override - In the DAP Configurator, there is an option "Local Message Relay
Override". When you activate this option, you can send messages between
handsets and the Messaging Server can send messages to handsets. Note that
you cannot send messages from handsets to the Messaging Server when
"Local Relay Override" is active.
3.1 General
Neither the portable nor the end-user can confirm reception of the
message.
No traffic bearers are occupied. This avoids congestion.
The maximum message length is 54 characters.
Broadcast Messaging is optional in IP DECT. It must be enabled using the DAP
Configurator tool.
There are three (additional) message types defined for broadcast messaging. The
Message Server must be capable of sending these messages, because the
handset is not able to send broadcast messages, it is only able to receive
broadcast messages.
Broadcast Messages - A Broadcast message is a real message which
is addressed to a group of portables. A three digit number identifies the
group. (A handset must have been made member of a group before it
can receive messages for the group.)
All portables that support broadcast messages are automatically member of
the group '000'. Next to this group a portable can be member of 5 other
groups.
SIP Messaging and messaging via the DASGIF interface are available in IP DECT. It
is important to know how this works together.
When IP DECT is connected to a SIP Proxy that supports SIP Messaging, you can
select whether you want to use LRMS or SIP Messaging. It is an option in the DAP
Configurator.
When you select "SIP Messaging", the messages from the handset are sent from the
DAP where the subscription record resides to the SIP Proxy instead of to the DAP
Controller/Manager. It uses SIP instant Messaging. The opposite way around, the SIP
Proxy can send messages straight to the DAP where the subscription record resides.
This means that the DAP Controller/Manager is not involved in the SIP Messaging.
From SIP Proxy to DAP - Using the SIP instant Messaging - SIP Method
"MESSAGE".
From External Messaging Application to the DAP Controller - From
External Messaging Application to the DAP Controller. In the External
Messaging Application, there is the Application Interface component called CTI
or DMLS as interface between the Messenger Application and the DASGIF
interface to the DAP Controller.
Both incoming messages as mentioned above, will always work, independently of
settings in IP DECT.
In a mixed configuration, the following INBOUND messaging is supported:
F
mobility. There are two types of mobility:
IP DECT SIP with Branch Offices - Please note that when you have
IP DECT SIP roaming, the DAPs of all location must be in the same
IP DECT System. This means that you have one IP DECT system
with Branch Offices in the other locations/sites.
IP DECT SIP with Branch Offices and Traditional DECT - This is the
same as mentioned in the bullet above, but now Traditional DECT is
also involved. Please note that you can have only one IP DECT SIP
system with or without Branch Offices on other locations.
The Traditional DECT system must be adapted (Signalling Group
adaptation) because you must setup communication between the
traditional DECT system and the DAP Controller.
Also please note that the DAP Controller must be up and running
permanently.
Except for the above mentioned configurations, other mobility
configurations are not possible. So, combinations of IP DECT SIP with IP
DECT iTMP are not possible.
Using Mobility, you can have only one IP DECT SIP configuration over all the
Units (MAN) or over all the Nodes. This means that you will have an IP DECT
Head quarter (main site) and Branch Offices. It is not possible to have more than
one IP DECT system!
4. For MAN: assign the DNR to the virtual circuit that you want to
use for Mobility in one of the Units.
5. For WAN: assign the DNR to the virtual circuits that you want to
use for Mobility in all Nodes.
Example for DNR 1000
CHDNRC:1000,15,2,0;
6. Assign the alternative user name to the virtual circuits that are
used for IP DECT SIP in all Units/systems involved. The
alternative user name for IP DECT SIP Mobility must comply
with the following combination DECT<DNR>.:
For example:
CHSUSR:15,2,0;
PASSWORD:;
ALTERNATIVE-USERNAME:DECT1000;
Using Mobility, you can have only one IP DECT SIP configuration over all the
Units (MAN) or over all the Nodes. This means that you will have an IP DECT
Head quarter (main site) and Branch Offices. It is not possible to have more than
one IP DECT system!
This IP DECT configuration should work together with the traditional DECT
installation. This means that you must setup IP DECT SIP as described in the
previous sub-section and you must add the Traditional DECT configuration to it.
3. Also you must enter the port number for the port on the DAP
Controller.
CHPMPD:0,9600,,,<unit>;
ITEM-NR>,BIT/BYTE>,<DATA>:26,1,109;
ITEM-NR>,BIT/BYTE>,<DATA>:27,1,105;
ITEM-NR>,BIT/BYTE>,<DATA>:;
G
Table D-1 Default ports used in Business Mobility IP DECT