Alcatel Omnipcx Enterprise: Audit and Broadcast
Alcatel Omnipcx Enterprise: Audit and Broadcast
Alcatel Omnipcx Enterprise: Audit and Broadcast
Copyright (c) 2006 Alcatel. All rights reserved for all countries. This
document may not be reproduced in whole or in part without the express
written permission of Alcatel.
Alcatel® and the Alcatel logo are registered trademarks of Alcatel. All other
trademarks are the property of their respective owners.
The CE mark indicates that this product conforms to the following Council
Directives:
- 89/336/CEE (concerning electro-magnetic compatibility)
- 73/23/CEE (concerning electrical safety)
- 1999/5/CE (R&TTE)
Chapter 1
Overview
Chapter 2
Detailed description
0-1
Chapter 3
Object behavior
0-2
0-3
Chapter 4
Configuration procedure
0-4
Verification of the Sequence Numbers of Log Files .................. 4.4
Consultation of the State of the Nodes .......................................... 4.4
Running an Update Audit .................................................................... 4.5
Chapter 5
Audit
0-5
0-6
1
1.1 Overview
Audit and Broadcast tools are used in the context of the management of a PCX network in
order to maintain the consistency of their databases.
The audit is used to render the databases of the various PCXs consistent, regardless of their
status.
Its vocation is to be activated on explicit manager command.
The audit should be used on system start-up, when a node is added or when a node is
isolated or else in case of excessive duration or when, for an undetermined reason, broadcast
generates errors.
The broadcast tool is used to maintain the coherence of all the elements of the network in real
time. When a management operation allocates the elements that depend on a network node,
the broadcast is responsible for transmitting the modifications required to the other nodes in
order to maintain overall coherence.
The broadcast is activated when the PCX is started up, then reactivated after certain
management commands. The range of the broadcast may be either the network as a whole or
the areas defined on management.
Audit and Broadcast work on the same database objects (see module Audit and broadcast -
Object behavior ).
The IP/X25 tunnel created between each of the nodes is the communication medium for both
tools, in the case of inter-connection by T2, T1 or T0 links.
For hybrid logical links with signaling over IP, the communication medium can be either IP/X25
tunnel or IP directly. For R6.1, the IP/X25 tunnel must be used as communication medium
when one of the nodes, interconnected by the hybrid logical link, is a node with duplicated Call
Server and both Call Servers on different IP subnetworks.
2
2.1 Audit
2.1.1 Principle
The audit renders the databases on the various PCXs consistent. It is activated by the
manager. The audit is carried out in two stages:
- constitution of a reference on the local node,
- loading the reference on the various PCXs.
The constitution (or construction) of a reference is done by "mixing" the data from the PCXs
determined by the manager. The database of the PCX on which this reference is constituted is
modified.
The objects concerned by the audit (building and loading) are, at present, as follows:
2.2 Broadcast
"
present.
X25 access points have X25 physical access points which are managed dynamically. For the
access points concerned, the only management intervention required is ensure that the access
point is in an operational state.
2.2.2.1.2 Range of the Audit and Broadcast Applications
All the nodes in a sub-network which are acknowledged by the broadcast and audit
applications are defined in management (X25 > Network Nodes).
The addresses contained in this object are automatically obtained according to the logical links
and IP/X25 links managed on the node. For the logical links:
- object Inter-Node Links > Logical Links (ABC-F),
- object Inter-Node Links > Logical Links (ABC-F) > Hybrid Link Access.
For the IP/X25 links: object X25 > IP/X25 Tunnel.
Using the object X25 > Network Nodes, it is possible, for hybrid links, to select either IP/X25
or IP as communications medium.
When a new node is added to the network, it is automatically acknowledged in the Network
Nodes table.
2.2.2.1.3 Physical Media
The broadcast application is compatible with network architectures which support T2 , T1 or T0
links, hybrid links and dynamic links. The implementation of the broadcast is different on the
less available dynamic links, which it uses in specific conditions. For more details, see §
Broadcast on Dynamic Links .
2.2.2.2 Operations Broadcast
The management operations, supported by the broadcast, saved in the LOG files and which
are applicable to the network objects, are the following CMISE primitives in CMIP format
(ASN1 coding):
- Create,
- Set,
- Delete.
Management operations are saved in the LOG files by the maoagent process.
The operations broadcast on the other nodes are those that result from a management
operation carried out on another node.
Example: For example, when a user is created on a node, a name, a directory number and a PIN must
be created on the other network nodes.
The file broadcast will contain all the management operations to be carried out on the other
nodes, resulting from the creation of a user on a node.
2.2.2.3 Objects Concerned
- Numbering plan,
- Entities,
- Trunk groups,
- Categories,
- PIN,
- Timeouts
- Suffixes,
- Data configuration,
- Directory,
- Call distribution tables,
- Direct abbreviated numbers,
- Cost center,
- Business Account numbers
- Tones,
- DDI,
- X25 configuration.
2.2.3 Principles
2.2.3.1 Source of Management Operations
Management operations, which are saved in files and acknowledged by the broadcast, may
have as source:
- mgr,
- an A47xx platform,
- attendant management,
- a telephone operation carried out by a user.
2.2.3.2 Processes Implemented
The maintenance of overall homogeneity is based on 5 processes:
- broadcast,
- cmisd: this process ensures the interface between the applications and the "maoagent",
- maoagent : this process ensures:
• the saving of management operations to be applied on remote node elements in files,
• the reactivation of the broadcast process if an urgent broadcast is required,
• the processing of management operations contained in files received on a node,
• the allocation of sequence number values in LOG files,
• the saving of any errors in an ERRLOG file.
- dis 25: Linux process, Chorus emulation time, which manages the X25 protocol on the
inter-node links and the routing information that relates to the links.
- Linux : used in this context as a media for the transmission of TCP/IP frames, either in
direct mode or encapsulated packet mode (IP/X25 tunnel).
2.2.3.3 Broadcast Range
"
Broadcast areas may be defined in a network. The range of the operations broadcast may
therefore be limited to an area. Depending on the object implicated by the broadcast and its
behavior defined in management, management operations which relate to it may be broadcast
locally or over a whole network.
In the same way, the receptivity of an element in relation to management operations received
by broadcast is defined in management, and the objects acknowledge them according to their
source: a specific area or the whole network.
2.2.3.4 Identification of Broadcast Files
Two categories of broadcast files are distinguished according to their global or local range:
respectively, the LOG files (global broadcast) and the A files (broadcast by area).
The content of the broadcast files may be consulted using the prog_diff tool.
2.2.3.4.1 Identification of LOG Files
The LOG files, global in range (without broadcast area), which contain the management
operations to be carried out on the remote nodes, created in the mao, are identified in the
following way:
In the same way as for LOG files, if an error occurs during the execution of one of these files,
an error file, identified in the following way, is generated:
"
to it. The polling period is defined in management as 10 minutes by default (broadcast sensor
probe, see module Audit and broadcast - Configuration procedure § Configuration of
Broadcast Settings ).
For certain urgent operations (prefix deletion, for example), it may be reduced to 20 seconds.
The adjacent nodes are consulted in sequence, if T is the poll period and the node is in
relation to n adjacent nodes, the total duration of the consultations will be nT.
When a shift in the values of the sequence numbers of the LOG or A files is observed between
the content of the lupd_tb files of the two adjacent nodes, depending on the range of the
broadcast, a transfer of the most recent files to the node whose objects have not been updated
is required. The LOG file containing the management operations to be carried out is
transferred to the node whose objects require an update using the RCP file transfer tool.
2.2.3.6.4 Execution of the Broadcast File
Once the files have been recovered on the node, the management operations they contain are
triggered as local requests. After they have been transmitted and acknowledged by all the
adjacent nodes, the broadcast files are destroyed. In order to save disk space, only the last 20
files produced are stored on each node. The number of files stored by the node is defined in
management, with 20 as the default value.
If management operations generated consecutively to the execution of the LOG or A file,
according to the broadcast range, produce errors, the messages that appear are saved in the
error files identified by the same sequence number as their source file. The generation of an
error during the execution of a file does not end the broadcast process.
2.2.3.6.5 Fast Polling and Propagation
Another adjacent node, whose objects have not been updated, is therefore advised when its
neighbor is updated. When a rapid polling of 20 seconds is complete, it acknowledges the
lupd_tb file of its neighbor which has just undergone a management intervention by broadcast;
a shift between the sequence numbers is observed, the cycle restarts and the broadcast then
propagates from adjacent node to adjacent node.
Stability is achieved when the content of the lupd_tb files is homogenous on the whole
network or an area, depending on the broadcast range.
The Cleanbroad command is used to reset the broadcast. When its application is complete,
the values of the sequence numbers of the broadcast files are reset to 0.
This command applied to a single node is transmitted to all the nodes of the network.
2.2.3.7 Broadcast Example
Take a network of 4 nodes with the following topology:
"
Node 2 has been modified and must inform its neighbors (here, node 4)
Node 3 has also been modified and must inform its neighbors, in this case node 4.
"
"
Audit: the construction is carried out by analysis of all the PCXs and creation, on the
construction PCX, of all the corresponding network prefixes. The loading results in the copying
of these network prefixes on all the remote PCXs except on the owner PCX.
3.3.2 Time-outs
Objects of this type are "maintained identical".
Time-outs 22, 153, 154, 170, 171, 198 are modified directly by the telephone application. They
are not concerned by the audit and broadcast.
3.3.3 Tones
Objects of this type are "maintained identical". All the tones are taken into account by the audit
mechanism.
audit mechanism.
The network access prefixes are broadcast on the network and copied from one node to
another using the audit.
3.6.2 Attendants
The attendant identification number must be unique over the entire network; this uniqueness is
controlled by the audit.
The physical number is broadcast as network prefix.
When the attendant call prefix is defined, it is "broadcast identical".
The distribution tables of an operator call are "broadcast identical".
3.7.1 User
The call number from a set is "broadcast as network prefix". The user's name and PIN are
"broadcast identical". If a voice mail is allocated to the user, the operation is notified to all
remote voice servers using the "Voice mail holder" object.
3.10 Directory
Objects of this type are "broadcast identical".
3.17.1 ACD
The ACD call number is "broadcast as network prefix".
3.17.2 Pilot
The pilot number is "broadcast as network prefix".
4.1 General
The procedure for Audit/Broadcast feature implementation consists in:
- Managing broadcast parameters:
• Activate the broadcast
• Define the time range for the recording of management operations
• Define the poll periods
• Define the maximum number of stored files
• Define the threshold number of files from which a broadcast by dynamic logical link
may be activated
• Define the broadcast areas
• Define the behavior of the objects in relation to the broadcast
- Validate a node for the broadcast
- Reset the broadcast and relaunch the broadcast process
- Check the sequence numbers of the log files
- Consult the state of the nodes
- Run an update audit
Before starting this procedure, first perform the steps defined in § General Check .
The following table specifies the communications medium selected if hybrid links are used,
according to the configuration of the attributes IP/X25 addressing mode and IP
addressing mode.
IP addressing mode
IP/X25 addressing mode Not used Yes
Default IP/X25 An IP address must be supplied. A
preference, defined in management
(preference parameter) must be given
either to IP or to X25. The communications
medium used will be the one to which a
preference is given and the other will be
requested if the preferred medium is
unavailable.
Explicit IP/X25 Same as above.
Not used Incoherent By IP, an IP address must be provided.
5
5.3.1 Principle
This menu is used to run the audits after defining:
- the choice of the delay,
- the type of building or loading action,
- the processed PCX(s)
- the object(s) covered by the audit.
5.3.2 Simulation
It is also possible to run an audit simulation from this menu. The procedure is the same as the
one used to run a real audit, although it is not necessary to define a delay.
5.3.5 Acknowledgement
Depending on the run type (immediate, delayed, periodic), acknowledgement will result in the
execution, standby or periodic standby of the audit command.
Note 2: for certain objects, the data mix has no meaning: these data items must be identified on all the
nodes (example: the categories). Therefore, it has been decided that one node will be used as reference
node and that the data of this node will be propagated across the entire network. The reference node is
chosen as follows:
- building from a single node: this node will be the reference,
- building from several nodes: the tool asks the administrator to designate the reference node.
5.4.1 Principle
During the building or loading operations, the tool records the actions carried out concerning
consistency. The Output audit results item allows the manager to acknowledge these results,
which may be sorted, object by object and node by node.
In the case of several build/load operations, only the results of the last operation can be
consulted. The results of the previous operations are lost.
(*) : in reference build, the data coming from this node has created anomalies; in load, the data
loaded on this node has caused anomalies.
In this example, prefix 75 is defined as a prefix on node 3 and is in conflict with another local
definition of 75. The manager must delete or modify the prefix on the node that has the
incorrect information.
Note: If no precautions are taken, subscriber 0100000 is defined on each one of the nodes. In fact,
0100000 is the X25 address of TEI 108 (access to management) access 0. This adress is defined
automatically when the base is initialized. To remove any inconsistency, this address must be modified
by management.
5.6 Configuration
The Configuration item is used to store the nodes and objects in order to simplify the build
and load operations.
Selection and storage:
Each object has two states:
- selected
- not selected.
Modifying an object will change it to the other state. The "+" sign indicates that this object is
selected.
Example:
The objects and nodes selected are stored and will be available the next time the tool is used.
To use the previous selection, on start up, choose the Selected objects or Selected nodes
option.