Beruflich Dokumente
Kultur Dokumente
Secret
Secret
Table of Contents
Chapter 1 eSpace Service Overview ...........................................................................................1
1.1 Service Concept................................................................................................................1
1.2 Product description ...........................................................................................................1
1.3 Service & System features ................................................................................................2
1.4 Use cases.........................................................................................................................4
Chapter 2 eSpace System Technical...........................................................................................1
2.1 eSpace Architecture..........................................................................................................1
2.1.1 System architecture: ...............................................................................................1
2.1.2 Interface of eSpace platform ...................................................................................3
2.2 Service flows.....................................................................................................................5
2.2.1 Basic Flow ..............................................................................................................6
2.2.2 Voice Communication .............................................................................................8
2.2.3 Message Communication......................................................................................14
2.3 Technical Specification....................................................................................................19
2.3.1 Making Calls via eSpace PC Clients......................................................................19
2.3.2 Making Calls to eSpace Clients via Mobile Phones................................................20
2.3.3 SMS .....................................................................................................................22
2.3.4 IM .........................................................................................................................24
2.4 System Configuration Management.................................................................................25
2.5 Service Operation ...........................................................................................................28
2.5.1 eSpace & BSS API ...............................................................................................28
2.5.2 Service provisioning..............................................................................................30
2.5.3 eSpace charging...................................................................................................36
2.6 System Report ................................................................................................................41
2.6.1 Report for Operator...............................................................................................41
2.6.2 Report for Enterprise.............................................................................................44
2.7 System Alarm .................................................................................................................45
2.7.1 eSpace Alarm Concept .........................................................................................45
2.7.2 eSpace connects to NMS......................................................................................47
2.7.3 List of eSpace Alarm.............................................................................................48
2.8 System and Network dimensioning..................................................................................50
2.8.1 System sizing including assumption and calculation ..............................................50
2.8.2 Bill of Material (both HW and SW) .........................................................................51
2.8.3 HW Specification...................................................................................................52
Chapter 3 Acronyms ....................................................................................................................1
Secret
List of Figures
Figure 1-1 eSpace enterprise information communication solution ........................................ 2
Figure 1-2 Enterprise address book...................................................................................... 5
Figure 1-3 Group address book ............................................................................................ 6
Figure 1-4 Personal address book........................................................................................ 6
Figure 1-5 Export personal address book ............................................................................. 7
Figure 1-6 Instant message dialog........................................................................................ 7
Figure 1-7 Send short message dialog ................................................................................. 8
Figure 2-1 Networking of the eSpace.................................................................................... 1
Figure 2-2 External interfaces of the eSpace ........................................................................ 3
Figure 2-3 Login and register to eSpace ............................................................................... 6
Figure 2-4 Get eSpace address book ................................................................................... 7
Figure 2-5 Maintain Enterprise/Group Address book ............................................................. 8
Figure 2-6 Making a call from the eSpace client.................................................................... 9
Figure 2-7 Making a call to the eSpace client via a mobile phone........................................ 10
Figure 2-8 Making a call to eSpace client from mobile phones-Handover ............................ 12
Figure 2-9 Call Hold via eSpace client ................................................................................ 14
Figure 2-10 Sending SMS .................................................................................................. 15
Figure 2-11 Receiving SMS................................................................................................ 16
Figure 2-12 Sending IM...................................................................................................... 17
Figure 2-13 Forward IM to SMS ......................................................................................... 17
Figure 2-14 Transferring a file online .................................................................................. 18
Figure 2-15 Signaling flow of making a call from eSpace Client........................................... 19
Figure 2-16 Signaling flow of making a call to the eSpace client via a mobile phone............ 21
Figure 2-17 eSpace sending and receiving SMS signal flow ............................................... 23
Figure 2-18 eSpace IM signaling flow ................................................................................. 24
Figure 2-19 Interfaces view between BSS with eSpace....................................................... 28
Figure 2-20 Registering an enterprise/Modifying the account number of an enterprise ........ 30
Figure 2-21 Deregistering an enterprise.............................................................................. 32
Figure 2-22 Registering a staff member.............................................................................. 33
Secret
Secret
List of Tables
Table 1-1 eSpace Service features........................................................................................ 2
Table 2-1 List of required devices ......................................................................................... 1
Table 2-2 Description of external interfaces........................................................................... 4
Table 2-3 Description of internal interfaces............................................................................ 5
Table 2-4 eSpace service flows............................................................................................. 5
Table 2-5 eSpace Role Table .............................................................................................. 25
Table 2-6 eSpace configure & management list................................................................... 26
Table 2-7 Operator interface between BSS with eSpace ..................................................... 28
Table 2-8 eSpace charging model ....................................................................................... 37
Table 2-9 Month Fee........................................................................................................... 37
Table 2-10 Charging Point .................................................................................................. 37
Table 2-11 eSpace SMS Fee .............................................................................................. 38
Table 2-12 CDRs of Ordinary Voice Calls............................................................................ 40
Table 2-13 CDRs of SMS.................................................................................................... 40
Table 2-14 Report for Operator ........................................................................................... 41
Table 2-15 eSpace Service subscriber Report..................................................................... 42
Table 2-16 eSpace Using Report ........................................................................................ 42
Table 2-17 Customer Manager Report ................................................................................ 43
Table 2-18 Report for Enterprise ......................................................................................... 44
Table 2-19 Enterprise subscriber Report ............................................................................. 44
Table 2-20 Enterprise Using Report .................................................................................... 45
Table 2-21 Alarm Type ........................................................................................................ 45
Table 2-22 Alarm Event Type .............................................................................................. 46
Table 2-23 Alarm Perceived Severity .................................................................................. 46
Table 2-24 eSpace Alarm List ............................................................................................. 48
Table 2-25 eSpace Call model ............................................................................................ 50
Table 2-26 Bandwidth calculate expression......................................................................... 50
Table 2-27 Bill of Material ................................................................................................... 51
Secret
These functions improve the work and communication efficiency of the enterprise
staff and hold the staff together.
Secret
system. By using the eSpace, the staff can communicate more effectively, which
improves working efficiency and increases enterprise cohesiveness.
Function
Sub-Function
Description
Unified number
Numbering Rules
1.1
Address Book
Enterprise
address book
Secret
Group address
book
2.3
Personal
address book
Communication
Functions
3.1
3.2
Voice
communication
by using the
eSpace client
IM
3.3
Group IM
3.4
SMS
and
Group SMS
3.5
Forward IM to
SMS
3.6
One
Switch
Key
3.7
Call Holding
Secret
3.8
Call
Forwarding
Enterprise
Information
Service/Customized
IT Application
4.1
Enterprise
Management
enterprise
management
information
and
service
4.2
Enterprise
daily
information
service
4.3
Pushing public
information
44
Calendar
Planning
4.5
Single Sign On
Secret
I. Unified Number
The account of login eSpace client is the same with users mobile phone number.
When you communicate with the others via calls, IM and SMS, the terminal of the
other party will display calling mobile phone number. When the other party dials your
mobile phone number, you can receive the call by using eSpace client.
By this solution, eSpace really and truly realizes one number link you and one dialing
reach you.
For example, when users are roaming international, he can also make or receive a
call by using eSpace client without considering expensive international roaming fee.
It help operator to arouse the sleeping subscribers who are international roaming.
Another example, normal VoIP service displaying CLIP number can not be called
back. But in eSpace, the VoIP CLIP number is just users mobile phone, so called
can call back to calling according to displaying number.
Secret
Group address book is just for group users. Group user can see the group user
information easily and also can use eSpace communication function quickly.
Secret
III. IM
eSpace provides instant message for user, including online IM, offline IM, IM forward
SMS, Group IM and transfer files. With these, employees can communicate with
each other instantaneous.
For example, when you find user is online, you can send IM to him and get response
quickly which is more efficiency than normal notes or email.
Another way, the function of IM forwarding to SMS can also ensure the IM to be
received by users mobile phone.
IV. SMS
Employees can send SMS, Group SMS via eSpace client easily which is more
efficiency than mobile phone.
Huawei Technologies Proprietary
7
Secret
For example, there are lots of work groups in enterprise. Employees can only send
group email before. Now, employees can send group short messages via eSpace
client.
For Operator
eSpace will help operator to expand enterprise markets and occupy enterprise
desktop.
eSpace will stimulate communication traffic and ARPU.
For Enterprise
eSpace speeds up communication response (IM).
eSpace improve communication efficiency (Address book, VOIP, group SM,
group IM).
For Employee
eSpace easy and convenient to communicate with others (One number, SMS...).
eSpace unifies the users PC client and mobile phone, provides convergent
communication experience.
Secret
Function
Voice Gateway provides voice access function. It
function:
multiple networks
Voice GW
GW/MMS GW).
Secret
Service Application
Layer: The service
logic
including
Call AS
application layer
provides the
same number.
enterprise-oriented
Messaging provides two type service:
applications, including:
l
Management of
data service and
voice service
Address book,
which is the
basis of service
applications
Address books
can be classified
into personal
address book,
team address
book, and
enterprise
address book.
Presence
Group
Service
Layer:
Management
The
service
management
layer
provides
data
uniform
management,
device
management,
network
monitoring,
BMS
statistics
Report
Secret
output.
I2000
IN:
include
service
and
prepaid
Existing IN
postpaid
BSS/NMS
Secret
Between
Protocol
Client<->Voice GW
SIP
Description
No.
The SIP interface between Voice GW and PC
E-INF-01
E-INF-02
Mobile Client<->Voice
GW
E-INF-03 GMSC/MSC<->SCP/VPN
CAP2
E-INF-04
GMSC/MSC<->Voice
GW
ISUP
E-INF-05
Call AS<->OCS
Diameter
E-INF-06
OSS<->BMS
HTTP+XML
E-INF-07
BSS<->RBI
FTP
diameter protocol.
The BSS can subscribe users by HTTP+XML
interface which can be supply from BMS.
The RBI uploads all the CDRs of AS to the Billing
system through the FTP protocol.
The I2000 is the unify management platform for all
E-INF-08
NMS<->I2000
SNMP
E-INF-09
MMS<->Messaging
MM7
E-INF-10
SMSGW<->Messaging
SMPP
E-INF-11
PC Client<->Group
XCAP
Secret
Between
Protocol
Description
No.
I-INF-01
Voice GW<->Call AS
I-INF-02
Group<->Presence
I-INF-03
Voice GW<->Messaging
SIP
I-INF-04
Call AS<->MRS
SIP
I-INF-05
Call AS<->Conference
SIP
SIP
XCAP
Service Scenario
Login and Register eSpace
eSpace Client gets Address book
Basic Flow
Maintain Enterprise, Group Address book
Synchronization Address book from Outlook
Making Calls from eSpace Clients via PCs
Making
Voice Communication
Calls
from
eSpace
Clients
via
PCs
(Handover)
Making Calls to eSpace Clients via Mobile Phones
Call Hold via eSpace client
Message Communication
Secret
Following figure shows the service process when an eSpace user logins and
registers to eSpace.
1)
Secret
A user inputs eSpace account which is same with his mobile number
0807827645. The eSpace client automatically login to AA Server by HTTP+XML
interface.
2)
3)
4)
Following figure shows the service process of eSpace user getting eSpace address
book.
User A inputs eSpace account which is same with his mobile number
0807827646. The eSpace client automatically login to AA Server.
2)
3)
Secret
2)
2)
Following figure shows the call flow when a user makes a call from the eSpace client
on the PC.
Secret
A user dials the mobile number 0807827646 from the eSpace client. The
eSpace client sends the number to the Voice GW via INVITE message.
2)
The Voice GW analyzes the number, query the IFC from HSS based on calling
3)
The Call AS processes the service logic of calling parties and then the Call AS
Call AS will invite Called number B to the PC client, which is used for connect to
PC; at the same time Call AS will send called number B to the GSM side which
is used for connect to GMSC, and before calling number, Call AS will add the
prefix X for prevent repeat trigger from GSM network.
5)
The GMSC queries the HLR. After obtaining the Terminating CAMEL Subscription
Information (T-CSI) of the called number 0807827646. The GMSC triggers the
6)
According to the prefix X, the VPN service judge that the call is initiated from the
eSpace. The VPN then instructs the GMSC to connect to the mobile phone
directly.
Huawei Technologies Proprietary
9
7)
8)
9)
Secret
Following figure shows the service process when a mobile phone user makes a call
to the eSpace client.
Figure 2-7 Making a call to the eSpace client via a mobile phone
Call flow description of making a call to the eSpace client via a mobile phone:
1)
2)
3)
The HLR returns Terminating CAMEL Subscription Information (T-CSI) of the called
number 0807827646.
Huawei Technologies Proprietary
10
4)
Secret
The MSC triggers the intelligent service of the called number 0807827646
according to the T-CSI.
5)
The VPN service analyzes the called number. The called number is both an
eSpace user and also a VPN user. VPN finds the calling number does not
contain the access code of unified number X (124); Then VPN service changes
the called number to the eSpace route code 13800200555 and sets the original
called number to 0807827646. At the same time, the VPN service delivers the
connect message to MSC.
6)
The MSC analyzes the number 13800200555 and identifies that the called
number is the route code of the eSpace and routes the call to the GMSC. The
original called number is 0807827646.
7)
The GMSC routes the call to Voice GW according to the number 13800200555.
8)
The Voice GW will process the called number and original number, then voice
GW will query the IFC from HSS based the called number, and triggers service
to Call AS.
9)
Then Call AS handle the service logic of called parties and process the call flow
Call AS will invite Called number B to the PC client, which is used for connect to
PC; and then Call AS will send called number B to the GSM side which is used
for connect to GMSC, and before calling number, Call AS will add the prefix X
for prevent repeat trigger from GSM network; and if concurrent call, Call AS will
send the two Call number B in the same time, one is for PC client, and another
for mobile number.
10) Voice GW route one number to PC client and route another number to GSM via
MGCF.
11) The GMSC queries the HLR.
12) HLR return the T-CSI.
13) The GMSC triggers intelligent services according to the T-CSI.
14) According to the prefix X (eg.124), the VPN then instructs the GMSC to connect
the mobile phone directly.
15) The GMSC queries HLR and gets MSRN of called number.
16) Then GMSC connects to the user B mobile phone.
17) B can receive this call by using PC client or mobile phone.
Secret
Following figure shows the call flow when a user makes a call to eSpace client from
mobile phones.
2)
3)
The HLR returns Terminating CAMEL Subscription Information (T-CSI) of the called
number 0807827646.
4)
The MSC triggers the intelligent service to Huawei IN-VPN according to called
5)
The Huawei IN-VPN service analyzes the called number. The called number is
T-CSI.
both an eSpace user and also a VPN user. IN-VPN finds the calling number
does not contain the access code of unified number X (124); Then VPN service
changes the called number to the eSpace route code 13800200555 and sets
the original called number to 0807827646. At the same time, the VPN service
delivers the connect message to MSC.
6)
Secret
The MSC analyzes the number 13800200555 and identifies that the called
number is the route code of the eSpace and routes the call to the GMSC. The
original called number is 0807827646.
7)
The GMSC routes the call to Voice GW according to the number 13800200555.
8)
The Voice GW will process the called number and original number, then voice
GW will query the IFC from HSS based the called number, and triggers service
to Call AS.
9)
Then Call AS handle the service logic of called parties and process the call flow
Call AS will invite Called number B to the PC client, which is used for connect to
PC; and then Call AS will send called number B to the GSM side which is used
for connect to GMSC, and before calling number, Call AS will add the prefix X
for prevent repeat trigger from GSM network; and if concurrent call, Call AS will
send the two Call number B in the same time, one is for PC client, and another
for mobile number.
10) Voice GW route one number to PC client and route another number to GSM via
MGCF.
11) The GMSC queries the HLR.
12) HLR return the T-CSI.
13) The GMSC triggers intelligent services to Huawei IN-VPN according to called
T-CSI.
14) According to the prefix X (eg.124), the VPN deletes the prefix and sends
TC_BEGIN (Handover) Message based on CAP to existing IN-SCP.
15) After Existing IN-SCP receives the TC_BEGIN message, it will instruct the
GMSC to connect the mobile phone directly.
16) The GMSC queries HLR and gets MSRN of called number.
17) Then GMSC connects to the user B mobile phone.
18) B can receive this call by using PC client or mobile phone.
& Note:
The Handover solution will resolve conflict between eSpace service and existing IN
service, by this way, subscriber can use eSpace service and existing IN service at
the same time.
Secret
2)
3)
After Call AS receive the message, and then Call AS send Invite message with
4)
5)
After User B response the requesting, Call AS will play back ring to User B and
6)
7)
After User responses the Invite requesting, Call AS sends update message to
8)
The update message is sent to User C through Voice GW, after User C
A inactive to User B.
Secret
2)
The Messaging checks whether the receiver of the SMS is an eSpace user. If
the receiver is an eSpace user. Then Messaging forwards the SMS to the User
Bs PC client firstly.
3)
The Messaging adds prefix before calling number and sends the SMS to SMS
GW.
4)
5)
User Bs mobile phone receive this SMS and the calling number displayed as
010101 + 0807827645.
Secret
2)
3)
The SMS GW sends this SMS to Messaging also according to access code.
4)
Messaging finds the 0807827645 is eSpace subscriber, then forward the SMS
to user As PC client.
5)
6)
Secret
III. Sending IM
2)
The Messaging checks whether the user B is online. If the friend is online, the
Messaging sends the IM to the user Bs PC client.
Secret
2)
3)
The SMS GW sends the SMS to the mobile phone of B. B receives and replies
4)
to the SMS.
User A clicks the icon for file transfer and selects the file to send. The eSpace
client sends the file transfer request to the IM.
2)
3)
If the receiver is not online, the Presence server sends a request failure
message to the eSpace client of the sender.
4)
If the B is online, the Messaging server sends the transfer request to the eSpace
5)
After receiving the request, the eSpace client of the B asks the receiver whether
6)
Secret
7)
The eSpace client of the sender starts to transfer the file to the receiver.
The access code of outgoing calls is M, which can be provisioning into HSS.
The eSpace calling prefix which used for prevent repeat trigger code is X.
A user dials the mobile number B 0807827646 from the eSpace client. The
eSpace client automatically add the prefixes M before the called number or
Secret
provisioning the number into HSS, and Voice GWSCSCF can get the M from
the HSS, and trigger the call flow to AS via INVITE message.
2)
The Call AS processes the service logic of calling parties and removes the
prefix M. Then the Call AS handles the outgoing call flow and judge the called
number is a number of the eSpace. Then Call AS will connect the called number
to Voice GW (SCSCF) to trigger the incoming call to start the service logic of
incoming sequence or concurrent call flow, otherwise Voice GW(SCSCF) will
send the number to MGCF directly.
3)
When call AS judge the called number is eSpace number, Call AS send the
called number to VoiceGW(SCSCF), SCSCF will get the called number IFC
information from HSS, and HSS will return the called IFC with eSpace access
code N to the Voice GW(SCSCF).
4)
Voice GW put the IFC information into the route filed in the SIP message, and
triggers service to Call AS.
5)
Then Call AS handle the service logic of called parties and process the
sequence or concurrent call flow which can be configuration, if sequence, Call
AS will invite Called number B to the PC client with SIP request-URI CIC
number Z to Voice GW, which is used for connect to PC; and then Call AS will
send called number B to the Mobile number with SIP request-URI CIC number Y
which is used for connect to MGCF to GMSC, and before calling number, Call
AS will add the prefix X for prevent repeat trigger from GSM network; and if
concurrent call, Call AS will send the two Call number B in the same time, one is
for PC client, and another for mobile number.
6)
For the mobile number, MGCF route the called number to GMSC, and GMSC
will queries the HLR. And obtaining the Terminating CAMEL Subscription
Information (T-CSI) of the called number 0807827646.
7)
The GMSC triggers the intelligent service according to the Terminating CAMEL
Subscription Information (T-CSI).
8)
According to the prefix X, the VPN service determines that the call is initiated
9)
from the eSpace client, and then connects to the mobile phone directly.
10) Then GMSC connects to the user Bs mobile phone.
11) Called will receive this call by using PC client or mobile phone, if terminal (PC
Client or mobile number) answer, the other terminal will stop ringing.
Secret
The access code of incoming calls is N, which can be provisioning into HSS.
The eSpace calling prefix which used for prevent repeat trigger code is X.
Figure 2-16 Signaling flow of making a call to the eSpace client via a mobile phone
Signal flow description of making a call to the eSpace client via a mobile phone:
1)
2)
3)
The HLR returns Terminating CAMEL Subscription Information (T-CSI) of the called
4)
The MSC triggers the intelligent service of the called number 0807827646
number 0807827646.
according to the T-CSI.
5)
The VPN service analyzes the called number. The called number is both an
eSpace user and also a VPN user. VPN finds the calling number does not
contain the access code of unified number X, Then VPN service changes the
called number to the eSpace route code 13800200555 and sets the original
called number to 0807827646. Then VPN will connect the called number with
13800200555(can be configuration) to GMSC/MSC.
6)
The MSC analyzes the number 13800200555 and route the called number to
the GMSC. The original called number is 0807827646.
7)
Secret
The GMSC routes the call to Voice GW (MG/SG/MGCF) firstly, and MGCF
judge the called number 13800200555 and will delete the number, then set the
original called number 0807827646 to called party filed.
8)
The Voice GW will get the IFC information from the HSS base on called number
0807827646, and triggers service via INVITE message to Call AS.
9)
Then Call AS handle the service logic of called parties and process the
sequence or concurrent call flow which can be configuration, if sequence, Call
AS will invite Called number B to the PC client with SIP request-URI CIC
number Z to Voice GW, which is used for connect to PC; and then Call AS will
send called number B to the Mobile number with SIP request-URI CIC number Y
which is used for connect to MGCF to GMSC, and before calling number, Call
AS will add the prefix X for prevent repeat trigger from GSM network; and if
concurrent call, Call AS will send the two Call number B in the same time, one is
for PC client, and another for mobile number.
10) For the mobile number, MGCF route the called number to GMSC, and GMSC
will queries the HLR. And obtaining the Terminating CAMEL Subscription
Information (T-CSI) of the called number 0807827646.
11) The GMSC queries the HLR. After obtaining the T-CSI of the called number
0807827646, the GMSC triggers the intelligent service.
12) According to the prefix X, the VPN then connect the mobile phone directly.
13) The GMSC queries HLR and gets MSRN of called number.
14) Then GMSC connects to the user B mobile phone.
15) Called will receive this call by using PC client or mobile phone, if terminal (PC
Client or mobile number) answer, the other terminal will stop ringing.
2.3.3 SMS
In this section, we will see the eSpace subscriber can send SMS by eSpace client
and also can receive SMS by eSpace client and mobile phone at the same time.
Secret
User A send short message to eSpace subscriber B via eSpace PC client. This
2)
After that, Messaging Server adds prefix 010101 before calling number and
sends the short message to SMS GW via SMPP.
4)
SMS GW submits the short message to SMSC after received the message.
5)
SMSC deliver the short message to User As mobile phone. The CLIP number
displaying on User A mobile phone is 010101+0807827645.
6)
7)
SMSC delivers the reply short message to SMS GW according to the eSpace
access code: 010101.
8)
SMS GW also delivers the short message to Messaging Server according to the
eSpace access code.
9)
Secret
Messaging Server finds User A is also eSpace subscriber, then sends the short
message to User As PC Client.
10) At the same time, Messaging Server adds prefix before User Bs mobile number
and submits the short message to SMS GW via SMPP.
11) SMS GW then submits this short message to SMSC.
12) SMSC delivers this short message to User As mobile phone finally.
& Note:
The eSpace access code is necessary. Because eSpace need the SMS to be routed
to Messaging according to the SMS access code. Otherwise the SMS will not be sent
PC Client.
2.3.4 IM
In this section, we describe the IM signaling flow. The flow includes online IM and IM
forward to SMS.
2)
3)
Secret
If user B is online, then Messaging sends the IM to User Bs PC Client and User
B receives the IM on PC Client.
4)
If user B is offline, then Messaging adds eSpace SMS access code before
calling number and submits the IM to SMS GW.
5)
6)
7)
After User Bs mobile phone receives this short message successfully, it returns
the response message and User As PC Client will get the response message.
Role
Description
Administrator
area
function
and
Operator Side
Customer Manager
Administrator
information.
Query
Enterprise Side
The
function
administrator
of
is
department
distributed
by
enterprise administrator.
Different roles have different system configure and management shown as following
table:
Secret
Description
Operator Side
Administrator
Maintain
Popedom
distribute
distribute
different
level
management.
system
configure
for
System
Configuration
Customer Manager
Query report
Query report.
Enterprise/Employee
Realize
subscribe
enterprise/employee
administrator
administrator.
Query report
Query report.
Enterprise Side
Administrator
Configure column
Maintain
of importing and
and
system
exporting
address book.
configure
enterprise
exporting
enterprise
address book
Configure column
of importing and
and
exporting
enterprise
customer
exporting
enterprise
Secret
address book
Configure system
parameters
on eGroup.
Configure system
default policy
on eGroup.
Modify
enterprise
administrator
Modify
enterprise
basic
information on eGroup.
Query report
Query log
Enterprise
Create
Administrator
administrator
administrator on eGroup.
Maintain
book
book on eGroup.
book
book on eGroup.
Register
department
and
deregister
Create
department
enterprise
Register
and
employees
employees.
Maintain
enterprise
address
deregister
data
on
eGroup.
Query report
Department
Maintain
Administrator
book
book on eGroup.
book
book on eGroup.
Register
and
deregister
enterprise
Register
and
employees
employees.
Maintain
enterprise
address
deregister
data
eGroup.
Query report
on
Secret
For more detail configure and management, please refer to eSpace system operation
and maintenance manual.
Provider
eSpace
No
Description
INF-01
INF-02
INF-03
INF-04
INF-05
INF-06
Secret
e
INF-07
INF-08
INF-09
INF-10
INF-11
INF-01
INF:
INF-02
eSpace->BSS
(Enterprise or
BSS
employee can
INF-03
web portal)
INF-04
For more detail information about API interface parameter, please refer to eSpace
API interface for BSS criterion.
Secret
Ordering the eSpace via the BSS If an enterprise already orders the VPN
service, the enterprise needs to order only the eSpace.
StepI
1)
2)
3)
Secret
4)
5)
StepII
1)
After the enterprise is registered on the BSS, the customer manager logs in to
the BSS to order the VPN service.
2)
The customer manager checks whether the enterprise already orders the VPN
service on the BSS. If the enterprise does not order the VPN service, the
customer manager orders the VPN service for the enterprise. The BSS registers
the enterprise on the VPN through the MML interface.
StepIII
1)
The BSS registers the enterprise by invoking the http + XML interface provided
by the eBMS of the eSpace.
2)
The eBMS invokes the MML interface to synchronize the registration data with
the data of the Call AS.
Secret
StepI
3)
4)
On the BSS, the customer manager checks whether the enterprise requests to
cancel the order for the VPN service.
5)
If the enterprise requests to cancel the order, the BSS deregisters the enterprise
from the VPN through the MML interface.
StepII
6)
The BSS deregisters the enterprise by invoking the http + XML interface
provided by the eBMS of the eSpace.
7)
The eBMS invokes the MML interface to deregister the enterprise on the Call
AS.
8)
StepIII
Secret
The customer manager arranges related personnel to uninstall the devices at the
enterprise.
StepI
1)
A staff member logins to the eGroup to apply for the eSpace. The staff member
enters the mobile number, name, and other information, and selects the needed
functions.
Huawei Technologies Proprietary
33
2)
Secret
The eGroup generates a service verification code and invokes the interface of
the Messaging for sending SMS to send the verification code to the mobile
number that the staff member entered.
3)
After receiving the verification code, the staff member enters the verification
code on the application page. After the verification is passed, the system notifies
the staff member that applying for the eSpace is successful.
4)
The staff member submits the application and waits for the approval of the
enterprise administrator.
5)
After the enterprise administrator approves the application, the eGroup invokes
the interface of the eBMS for registering staff to register the staff member.
StepII
1)
The eBMS receives the application information and generates a registration TT.
2)
3)
The BSS invokes the interface of the eBMS to register the staff member on the
eSpace.
4)
The eBMS invokes the MML interface to register the staff member on the Call
5)
The eSpace returns a message to eGroup, saying that registering the staff
AS.
member on the eSpace is successful.
StepIII
1)
After registering the staff member on the eSpace is successful, the eSpace
2)
The BSS invokes the MML interface to register the staff member on the VPN as
StepIV
1)
The BSS invokes the interface of the eBMS to set the unified number feature as
required.
2)
The eBMS invokes the MML interface of the VPN to set the tag of ONLY.
3)
The eBMS invokes the MML interface of the Call AS to set the tag of the unified
number.
4)
After setting the unified number feature is successful, the eBMS notifies the
5)
The eBMS also notifies the BSS that the unified number feature is set
Secret
StepI
1)
2)
After the application is submitted successfully, the staff member needs to wait
3)
After the enterprise administrator approves the application, the eGroup invokes
StepII
1)
2)
Secret
The customer manager submits the TT generated by the eBMS to the BSS to
deregister the staff member from the eSpace.
3)
The BSS invokes the interface of the eBMS to cancel the unified number
feature.
4)
The eBMS invokes the MML interface of the VPN to cancel the tag of ONLY.
5)
The eBMS invokes the MML interface of the Call AS to cancel the tag of the
unified number.
StepIII
1)
The eBMS returns the result of deregistering the staff member from the eSpace
to the BSS. The BSS checks whether the staff member requests to cancel the
order for the eSpace service.
2)
The BSS invokes the interface of the eBMS to deregister the staff member from
the eSpace.
3)
The eBMS invokes the MML interface to deregister the staff member on the Call
4)
The eSpace returns a message, saying that deregistering the staff member from
AS.
the eSpace is successful.
StepIV
1)
The eBMS returns the result of deregistering the staff member from the eSpace
to the BSS. The BSS checks whether the staff member requests to cancel the
order for the VPN service.
2)
If the staff member requests to cancel the order, the BSS invokes the MML
interface to deregister the staff member from the VPN. At the same time, the
BSS deletes the subscription information about the staff member from the HLR.
StepV
After receiving the notification saying that deregistering the staff member is
successful, the eGroup deletes the data related to the staff member to deregister the
staff member locally.
Secret
XXX/Month
Basic
PC Client initiate:
Local XXX/Minute;
eSpace Fee
Voice Call
International
Communication Fee
Call
XXX/minute;
PC Client answer: Free
SMS Fee
XXX/item
Month Fee
Base on Function
XXX/Month
1. eSpace basic month fee will be charged base on fix date per-month.
2. Suggesting month fee will be charged from next month, but when user subscribe, the
eSpace service can be used, operator can charge base on the communication fee first.
3. Base month fee will be charged base on the different user type and different charge point.
Table 2-10 Charging Point
User type
Postpaid user
BSS
Prepaid user
of SCP
Prepaid user
of BSS
OCS user
Description
BSS will charge month fee for postpaid user
who subscribe eSpace service.
SCP will charge month fee for prepaid user
SCP
BSS
OCS
Secret
SMS Fee
eSpace can support different paying type base on fill with different parameter by the
SMPP protocol as following:
Table 2-11 eSpace SMS Fee
Pay Type
Charge
Source Num
Account
Type
03:charge
Enterprise
Payment
Fee Type
month
1: Charge for
Enterprise
the
Code(eg:106575580005)
source
Null
number
fee
base
on
Charge
Account
Employ
Payment
Fee
SMS
Access
02:
3charge will
Code(eg:106571707)+Mobile
refer
to
Number
account
the
Mobile Number
Charge
Charge
Account
1: Charge for
Enterprise
the
Code(eg:106575580005)
source
Null
01:Free base
number
on
SMS
Access
3charge will
Code(eg:106571707)+Mobile
refer
to
Number
account
the
Charge
Account
Mobile Number
eSpace send SMS to SMS gateway via messaging, and SMS-GW will handle the
authentication and charge.
1For the enterprise payment, messaging will send SMS to SMS-GW by SMPP protocol
with charge base on the enterprise special code , eg:106575580005.
2For the employ payment , and for postpaid user, messaging will send SMS to SMS-GW
by SMPP protocol with charge base on the mobile number, and BSS need handle charge
from the SMS-GW.
Secret
3For the employ payment , and for prepaid user, messaging will send SMS to SMS-GW
by SMPP protocol with charge base on the mobile number. And for the SCP user,
SMS-GW will charge from SCP base on SMPP+ (SMPP extension) protocol; and for the
OCS user, SMS-GW will charge from OCS base on diameter protocol.
Secret
Charging Point
Description
party: Call AS
party: Call AS
party.
party:
called party:
SCP/MSC/GMSC
Phone2PC
party:
SCP/MSC/GMSC
party:
SCP/MSC/GMSC
CDRs of the called
party:
SCP/MSC/GMSC
CDRs of SMS
Charging Point
SMS GW
Description
When enterprise manager send SMS
SMS
scenarios
Secret
Charging Point
Description
Enterprise account.
SMS GW
SMS GW
Description
Secret
Description
Description
Times of login
Secret
Items of IM
Description
Customer ID
Customer ID
Customer Name
Customer Name
Enterprise NO
Enterprise Name
Enterprise Name
Enterprise Type
Times of login
Secret
Items of IM
Description
Description
Enterprise NO
Enterprise Name
Enterprise Name
prise
Total number of address book
Secret
Description
Enterprise Name
Enterprise Name
Times of login
Items of IM
& Note:
Reports can be developed according to requirement.
Define
ADAC
(Automatically
Detected and
Automatically
Cleared)
ADMC
(Automatically
Detected and
Manually Cleared)
Secret
by the system when they occur and when they are repaired.
Define
Communications alarm
Equipment alarm
Name
Define
Critical
Such
Major
Such a
Minor
Secret
Warning
Secret
Call AS can connect to I2000 via SNMP, so Call AS can send alarm messages to
I2000 directly.
Other components, such as eBMS, Presence, Group, Messaging connect to I2000
via UOA which supports SNMP. Thus, these components create and send alarms to
UOA via SXP, after that UOA will submit these alarms message to I2000 via SNMP.
The operator administrator can query and check all the alarms on I2000.
II. Voice GW
Voice GW is core network equipment and supports SNMP, so Voice GW should
connect to core network NMS and send the alarm messaging to NMS of core
network. Normally, Voice GW connects to M2000 to realize network management.
Alarm
Alarm Severity
Alarm
Type
eBMS
Communications alarm
Major
ADAC
eBMS
Major
ADAC
Call AS
Connection
setup
Communications alarm
Critical
ADAC
Disconnection between
Communications alarm
Minor
ADAC
Critical
ADAC
failure
Call AS
Disconnection from a
database
Call AS
Major
ADMC
Call AS
Minor
ADAC
Major
ADAC
Suspended process
Call AS
Secret
Warning
ADMC
Major
ADAC
Failures
to
run
database
SQL
statements
Call AS
Message congestion
Minor
ADAC
Call AS
Over-long
Minor
ADAC
message
queue
Call AS
Service is unavailable
Major
ADAC
Call AS
Excessive number of
Major
ADAC
Minor
ADAC
Equipment alarm
Major
ADMC
Pre-alarm
number
on
of
the
operators
Disk
access
time
exception
Call AS
Disk Failure
Equipment alarm
Major
ADMC
Call AS
Equipment alarm
Major
ADMC
Call AS
Equipment alarm
Major
ADMC
Call AS
Network
Equipment alarm
Major
ADMC
Equipment alarm
Major
ADMC
Major
ADMC
Major
ADAC
adapter
exception
Call AS
Fan exception
Call AS
Failure of automatically
backing up database
Call AS
CPU overload
Call AS
Memory exception
Equipment alarm
Major
ADMC
Call AS
Database deadlock
Critical
ADMC
Call AS
Major
ADAC
Call AS
Minor
ADAC
Call AS
Readonly
file
being
modified
Secret
Security service or
Minor
ADMC
mechanism violation
Duration (S)
0.5
Call
Incoming
0.5
Call
Instant
conference
General parameter
Outgoing
Call
Incoming
Call
Instant
90
Amount
90
Active
conference
Roll back
20
Tone
50,000
50%
Voice
package(kbps)
Conference
Party
SIP
46
Outgoing
21
Call
Incoming
33
Call
SIP(Byte)
750
SIP
bandwidth(Mbps)
Caps SIP
Count SIP
package
8(bit/Byte)/1024/1024
voice
So, according to the call model and calculate expressions, we can get the following
bandwidth data.
Table 2-26 Bandwidth calculate expression
Service
Voice
Bandwidth Calculate
Units(Mbps)
50,00050%0.5/3600
Outgoing
SIP Bandwidth
0.66
Secret
337508/1024/1024
call
Audio
50,00050%0.5/3600
Bandwidth
4690/10242
call
SIP Bandwidth
Incoming
call
50,00050%0.5/3600
217508/1024/1024
Audio
50,00050%0.5/3600
Bandwidth
4690/10242
Audio
50,00050%0.5/3600
Bandwidth
4620/1024
28.08
0.42
28.08
3.12
95.46
Redundancy (Total/70%)
136.37
According to the up table, if there is total 50,000 eSpace subscriber, we suggest operator
preparing total bandwidth 136.37 Mbps to provide capability of Voice call.
& Note:
The eSpace call model about BHCA (outgoing, incoming) and user active rate is
supposed by us, Operator can modify these general parameters and BHCA by
themselves according to their practicality.
Component
Call AS
CALL SMP
Messaging
Presence
Huawei Technologies Proprietary
51
Secret
eGroup Server
eBMS Server
Report Server
DB Server
I2000 Server
ATAE Storage
ATAE Frame
ATAE Outsourcing Software
USM(Universal Server Manager)
2.8.3 HW Specification
ATAE (Advanced Telecommunication Application Environment) is the integration hardware
platform of telecom level, supply integrity solution which includes service board, storage solution,
management server, switch, e.g.
high-powered, e.g.
ATAE is the framework of CPCI, supply hardware, OS, Cluster, and DB , is the integrated platform
of Service.
High usability
High Integration
High Expansibility
Flexible
Unify Management
Huawei Technologies Proprietary
52
IPMI
USM
Secret
Support 14 slot
th
th
Adopt Intel double Xeon processor and E7501 chip group, support high capability handle
and calculate capability
Adopt absolute BMS controller for power supply, support absolute double IPMB bus
topology, support IPMI 1.5 protocol, support board stat management and monitor
Chapter 3 Acronyms
Voice GW
Voice Gateway
BSS
eBMS
RBI
SNMP
FTP
VPN
MSC
SIP
MRS
SMSC
SMPP
CMPP
ISUP
CDR
AS
Application Server
PC
PA
MML
IMPS
GMSC
SCP
IN
SMS GW
Intelligent Network
Short Message Service Gateway
Secret
FTP
SMS
NAT
eBMS
SBC
HTTP
SME
HW
Hardware
SW
Software
Secret