Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY Enterprise Communications Server Release 5, CallVisor, ASAI Protocol Reference Instructions Manual

Lucent Technologies DEFINITY Enterprise Communications Server Release 5, CallVisor, ASAI Protocol Reference Instructions Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies DEFINITY Enterprise Communications Server Release 5, CallVisor, ASAI Protocol Reference Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 600
    							The ECS Congestion and Flow Control on ASAI Links
    Issue 6 June 1997
    6-5
    If the adjunct sends a STATUS ENQuiry message to the ECS, on a BRI ASAI 
    interface, the ECS treats the STATUS ENQuiry as an unexpected message and 
    responds as Chapter 5 describes.
    Layer 3 Timers
    The only layer 3 BRI Timer that the ECS ASAI uses is T316, the retry timer for 
    RESTart. T316 has a value of 120 seconds. None of the BRI Management timers 
    are used.
    The ECS adjunct routing application also makes use of an application-level timer. 
    Once this timer expires, a Cause with value ‘‘Timer Expiry’’ may be sent across 
    the ASAI interface.
    The ECS Congestion and Flow Control 
    on ASAI Links
    ECS Controls on Receive Traffic
    This section describes the ECS congestion controls on incoming ASAI traffic (that 
    is, from adjuncts to the ECS) in the following situations:
    nTotal incoming traffic causes ECS Central Processing Unit (CPU) 
    congestion
    nLayer 2 Processor congestion
    nSingle link congestion (hyperactivity)
    ECS CPU Congestion on Received Data
    The ECS automatically applies ECS congestion (overload) controls when the 
    processor occupancy for call processing tasks exceeds a predefined threshold 
    over a period of time. The measured call processing occupancy (which is 
    compared to the threshold) is a collective measurement of the occupancy of all 
    call processing-related ECS services, such as ASAI, telephone stations, and 
    trunks. Therefore, while ASAI may not be a major contributor to the ECS 
    congestion, the overload control affects ASAI interfaces.
    The ECS congestion controls prevent new originations (that is, new calls and new 
    ASAI associations). Established calls and ASAI associations are not affected by 
    the overload controls.
    During an overload control condition, the ECS denies requests for additional ASAI 
    feature access as follows: 
    						
    							Maintenance
    6-6Issue 6 June 1997 
    nWhen the ECS receives an ASAI message that begins a new association 
    (for example, REGister message), it is discarded and the ECS responds 
    with a RELease COMplete Message containing Q.931 Cause Value 42 
    (Coding Standard 0/Network Congestion).
    nWhen the ECS receives a FACility message with a Domain Control 
    Auto-Dial Request, it is discarded and the ECS responds with a FACility 
    Message containing Q.931 Cause Value 42 (Coding Standard 0/Network 
    Congestion). 
    ASAI associations opened prior to the congestion event were processed normally.
    Adjuncts should provide complementary overload controls. Instead of immediately 
    requesting the same service or other services (which may further aggravate the 
    ECS congestion), an adjunct could refrain from sending such requests to the ECS 
    for a short period of time after receiving a message containing Cause 42.
    Layer 2 Processor Congestion on Received Data
    The layer 2 (L2) processor uses a common buffer pool for receiving frames from 
    all active links (including ASAI). The availability of buffers determines whether the 
    L2 processor is congested. The L2 processor compares buffer usage against a 
    threshold. When the number of buffers in use reaches the threshold, the ECS 
    CPU is informed, and this causes the ECS processor to activate the congestion 
    control described above. The congestion control is released when the buffer level 
    returns to a normal operating range.
    Exhaustion of all buffers in the L2 processor receive buffer pool causes the L2 
    processor to take additional flow control action on selected links. If total 
    exhaustion occurs, the L2 processor sends a Receiver Not Ready (RNR) frame to 
    each link over which it has received a frame. The L2 processor keeps track of the 
    links to which to send an RNR. When the buffer level returns to a normal operating 
    range, the L2 processor sends a Receiver Ready (RR) frame on these 
    flow-controlled links.
    Link Congestion (Hyperactivity) —
    Received Data
    The ECS enables link congestion controls when traffic is greater than expected on 
    an individual link. These controls prevent a single link from taking an inequitable 
    share of the ECS resources (that is, processing power or buffers).
    The L2 processor monitors the number of frames (Info, Supervisory, UI) received 
    over each active link in a per unit time period.   If the number of frames exceeds a 
    specified threshold for the link, the L2 processor declares that link to be 
    ‘‘hyperactive.’’ 
    						
    							The ECS Congestion and Flow Control on ASAI Links
    Issue 6 June 1997
    6-7
    For hyperactive ASAI links, the L2 processor takes two actions:
    1. It flow controls the link by sending an RNR to the link endpoint each time a 
    frame is received from the endpoint.
    2. It reports the hyperactivity event to the ECS CPU.
    The L2 processor continues to flow control the link until the ECS processor 
    notifies it to withdraw hyperactivity control on that link. The ECS waits a 
    designated period of time (in seconds) after a hyperactivity event before it notifies 
    the L2 processor to resume normal processing on the link. The L2 processor 
    transmits an RR frame on the link to resume normal link activity.
    ASAI adjuncts must recognize and respect this control by suspending info frame 
    transmission until receiving an RR across the link.
    The ECS maintenance software keeps track of the frequency of hyperactivity 
    events on each BRI link. ASAI hyperactivity is most likely due to fluctuations in 
    adjunct traffic or under-engineering of the link traffic parameters rather than faulty 
    hardware. The current hyperactivity strategy for ASAI is to monitor the frequency 
    of hyperactivity on the links, and alarm links with persistent hyperactivity, but keep 
    such links in service. ASAI link alarms for hyperactivity should alert technicians 
    and system administrators that traffic re-engineering for that link is required.
    Parameters controlling the hyperactivity strategy for ASAI are:
    nPrior to G3V4, the L2 processor uses the threshold level of 80 frames per 
    five seconds to detect hyperactivity for G3i, and 50 frames per second for 
    G3r. Starting with Release
     G3V4, the frames (messages per second) are 
    higher: 160 frames per five seconds for G3i, and 200 frames per second for 
    G3r. For Ethernet, these numbers are the same.
    nThe time for which hyperactivity controls (flow control of the link by sending 
    RNRs) are applied by the L2 processor after detecting a hyperactive link is 
    20 seconds. 
    nThe frequency (rate) of hyperactive events for a link which triggers 
    maintenance to raise an alarm is five events over a 15-minute period.
    nThe length of time to retire a hyperactivity alarm on a link is approximately 
    one hour.
    n(R5 only) If an ASAI link is reestablished more than three times within a five 
    second interval, then the link is considered hyperactive and is taken out of 
    service.
    NOTE:
    These parameter values are not set on a per ASAI link basis; common 
    values are defined for all ASAI links. 
    						
    							Maintenance
    6-8Issue 6 June 1997 
    Controls on Send Traffic
    This section discusses the ECS congestion controls for traffic from the ECS 
    toward the adjuncts (the transmit direction):
    1. Over all links (that is, the ECS congestion).
    2. Over a single link (that is, link congestion).
    Layer 2 Processor Congestion on Send Traffic
    L2 processor congestion in the transmit direction (toward adjuncts) is measured 
    by the number of available transmit buffers. A common buffer pool is used by the 
    L2 processor for transmitting frames to all links (including ASAI). Exhausting all 
    the buffers in the L2 processor transmit buffer pool results in the ASAI software 
    receiving an indication of the condition. If ASAI discards a frame, the ECS 
    maintenance is notified and takes corrective action.
    Link Congestion on Send Traffic
    Congestion on a single link occurs when the number of L2 buffers queued for 
    transmission over a link exceeds a threshold. A thresholding mechanism is used 
    such that when a low water-mark is reached, all new initiating associations on that 
    link are denied. Further, when a high water-mark is reached, the ECS is no longer 
    able to buffer messages and they are dropped.
    The congestion of a single link is likely NOT due to traffic overflow by the ECS, but 
    occurs when the L2 processor stops frame transmission in response to adjunct 
    flow control. The adjunct can withhold an L2 acknowledgment or transmit an RNR 
    frame to cause such a situation.
    The threshold parameters for link transmit queues are as follows: The value of the 
    low water-mark is 25 (R5i) and 75 (R5r). The value of the high water-mark is 75 
    (R5i) and 150 (R5r). These parameters are not individually set for each ASAI link; 
    common values are defined for all ASAI links. 
    						
    							Issue  6 June 19977-1
    7
    TCP Tunnel Protocol
    Overview
    This chapter describes version 1 of the TCP tunnel protocol.
    CallVisor ASAI over the DEFINITY LAN Gateway is a communications interface 
    that provides the functionality of the Adjunct/Switch Application Interface (ASAI) 
    using an Ethernet transport instead of a Basic Rate Interface (BRI) transport.
    DEFINITY LAN Gateway uses a TCP tunnel protocol in addition to the protocols 
    defined by ASAI for layer 3 Q.931/2. This tunnel protocol works as follows: Before 
    a client connects, the DEFINITY LAN Gateway application or brouter
    1 issues 
    ICMP Echo Request packets (that is, ‘‘ping’’) to each administered client to 
    determine whether the client can be reached. As long as the ICMP Echo Request 
    packets are being answered (by ICMP Echo Reply packets), the brouter reports to 
    DEFINITY ECS that layer 1 is up for a particular virtual BRI port. If ICMP Echo 
    Request packets are not being answered, then layer 1 is reported as down.
    The software used by CallVisor ASAI over the DEFINITY LAN Gateway is shipped 
    from the factory with a default IP address of 192.168.25.10 and a default 
    hostname ‘‘definity.’’ It is also shipped with a default client IP address of 
    192.168.25.20 and hostname ‘‘client.’’ The brouter listens for connections from 
    clients on TCP port number 5678.   The client must establish a TCP connection to 
    the brouter at this port and IP address. The customer may change the IP address 
    and/or hostname, but the TCP port is fixed.   
    In addition to the normal TCP mechanism for establishing a connection, the 
    brouter imposes its own protocol for all clients. Once the client has used the 
    protocol to request service and the brouter has accepted the request, an 
    1.The term “brouter” is synonymous with DEFINITY LAN Gateway application. For brevity, 
    “brouter” is used throughout this chapter. 
    						
    							TCP Tunnel Protocol
    7-2Issue  6 June 1997 
    ASAI-Ethernet connection is established, and pinging of the client ceases for that 
    link. It resumes when the ASAI-Ethernet connection is closed. Since the 
    ASAI-Ethernet connection rides on top of the TCP connection, closing the TCP 
    connection terminates the ASAI-Ethernet connection.
    TCP only insures the reliable delivery of a data stream, yet ASAI protocol expects 
    to interact in complete messages. To overcome this mismatch, both the client and 
    brouter must ensure that an entire message is sent or received before processing 
    a subsequent message.
    All network communication between clients and the brouter is 
    message-oriented.   A small number of messages are used in the TCP tunnel 
    protocol, each of which is prefixed by a 4-octet header as shown in Table 7-1. All 
    four octets of the header are always present on each message, even if they are 
    not used. 
    NOTE:
    ‘‘Brouter’’ and ‘‘server’’ are used interchangeably in this chapter.
    These octets are explained as follows:
    nOctet 1 contains the Message Type. Values are provided as an 8-bit 
    unsigned integer.
    nOctet 2 contains a Message Cause. Values are provided as an 8-bit 
    unsigned integer.
    nOctets 3 and 4 contain an Additional Data Size. This size represents the 
    number of additional octets of data that are part of this Tunnel Protocol 
    message. Octets 3 and 4 are used together to represent a 16-bit unsigned 
    integer in network byte order.
    nAdditional Data may follow the above four octets. There must be exactly the 
    number of octets of Additional Data indicated in the Additional Data Size. 
    All values for additional data are provided as single octet unsigned integers 
    unless explicitly stated otherwise.
    Table 7-1. TCP Tunnel Protocol Header Format
    Octet 1 Octet 2 Octet 3 Octet 4Add’l Data...
    Message Type Message CauseAdd’l Data Size
    High OctetAdd’l Data Size
    Low OctetAdd’l Data ...
    (defined by type) 
    						
    							Overview
    Issue  6 June 1997
    7-3
    Table 7-2 that follows lists the message types. A single asterisk (*) next to a 
    message indicates that it is sent only by the server. A double asterisk (**) means 
    that it is sent only by the client.
    Table 7-2. TCP Tunnel Protocol Message Header Values 
    Octet 1 value
    Message Type
    Value and DescriptionOctet 2 value
    Message Cause
    Value and DescriptionOctet 3 and 4 value
    Additional Octet Count
    Value and Description
    0
    Error Notification
    The server will 
    immediately close the 
    TCP connection.1
    Client too slow
    The server established a 
    TCP connection but did 
    not receive the first TCP 
    Tunnel Protocol message 
    quickly enough.0
    No additional data.
    2
    Out of service
    A connected 
    ASAI-Ethernet connection 
    was taken out of service 
    on the brouter.0
    No additional data.
    3
    Invalid type
    A message with an invalid 
    type has arrived on this 
    connection.1
    Octet 5 contains the 
    offending message type.
    4
    Invalid cause
    A message with an invalid 
    cause has arrived on this 
    connection.2
    Octet 5 contains the 
    offending message type.
    Octet 6 contains the 
    offending message cause.
    5
    No reply to heartbeat
    A ‘‘heartbeat reply’’ was 
    not received within the 
    allotted time.0
    No additional data.
    (Continued on next page) 
    						
    							TCP Tunnel Protocol
    7-4Issue  6 June 1997 
    6
    Too much (or little) data
    The octet count specified 
    exceeds the maximum 
    allowable for a particular 
    message type/cause, or 
    the size was not sufficient 
    for the particular message 
    type.6
    Octet 5 contains the 
    offending message type.
    Octet 6 contains the 
    offending message cause. 
    Octets 7 and 8 contain the 
    offending octet count as a 
    16-bit unsigned integer in 
    network byte order.
    Octets 9 and 10 contain 
    the maximum octet count 
    as a 16-bit unsigned 
    integer in network byte 
    order.
    7
    Invalid client
    The client is not 
    administered on the 
    brouter.0
    No additional data.
    8
    New connection made
    A new connection has 
    been accepted for the 
    same host/link as an 
    existing ASAI-Ethernet 
    connection. This 
    message will be sent on 
    the old ASAI-Ethernet 
    connection.0
    No additional data.
    9
    Invalid Context 
    A TCP tunnel protocol 
    message was received by 
    the server at an 
    inopportune time.2
    Octet 5 contains the 
    inopportune message 
    type.
    Octet 6 contains the 
    inopportune message 
    cause.
    (Continued on next page)
    Table 7-2. TCP Tunnel Protocol Message Header Values  — (Continued)
    Octet 1 value
    Message Type
    Value and DescriptionOctet 2 value
    Message Cause
    Value and DescriptionOctet 3 and 4 value
    Additional Octet Count
    Value and Description 
    						
    							Overview
    Issue  6 June 1997
    7-5
    255
    Server error
    The server experienced 
    an internal error. 
    Reconnecting may 
    eliminate the error 
    condition.0
    No additional data.
    1
    Connection Request**
    A client uses this message 
    type to request an 
    ASAI-Ethernet connection.0
    Not used.2
    Octet 5 contains the 
    client’s link number.
    Octet 6 contains the 
    client’s TCP Tunnel 
    protocol version number.
    2
    Connection Accepted*
    The server has accepted 
    the connection request.10
    Link up
    ASAI data messages can 
    now be exchanged.0
    No additional data.
    11
    Link Down
    ASAI data messages 
    cannot be exchanged.1
    Octet 5 contains the link 
    down reason.
    Octet 5 Value and 
    Description:
    101 DEFINITY ECS is 
    down.
    102 Virtual BRI port    
    administered.
    103 DEFINITY ECS has 
    taken layer 2 down.
    104 Virtual BRI port 
    busied-out on 
    DEFINITY LAN 
    Gateway system 
    assembly.
    (Continued on next page)
    Table 7-2. TCP Tunnel Protocol Message Header Values  — (Continued)
    Octet 1 value
    Message Type
    Value and DescriptionOctet 2 value
    Message Cause
    Value and DescriptionOctet 3 and 4 value
    Additional Octet Count
    Value and Description 
    						
    							TCP Tunnel Protocol
    7-6Issue  6 June 1997 
    3
    Connection Rejected*
    The server has rejected 
    the connection request, 
    and will close the TCP 
    connection.12
    Invalid link
    The requesting client’s link 
    number is unknown to the 
    server.0
    No additional data.
    2
    Out of service
    The requested link 
    number has been taken 
    out of service on the 
    brouter.0
    No additional data.
    13
    Unsupported TCP Tunnel 
    Protocol version
    The client’s TCP Tunnel 
    protocol version is not 
    supported by the server.1
    Octet 5 contains the 
    server’s TCP Tunnel 
    protocol version number.
    4
    Disconnect Notification**
    Used to inform the server 
    that the client no longer 
    needs an ASAI-Ethernet 
    connection. The server will 
    immediately close the 
    TCP connection upon 
    receipt.0
    Not used.0
    No additional data.
    5
    Link Status*
    The server sends this 
    message any time the 
    status of a link changes. 
    The ASAI-Ethernet 
    connection remains up.10
    Link up
    ASAI data messages can 
    now be exchanged.0
    No additional data.
    (Continued on next page)
    Table 7-2. TCP Tunnel Protocol Message Header Values  — (Continued)
    Octet 1 value
    Message Type
    Value and DescriptionOctet 2 value
    Message Cause
    Value and DescriptionOctet 3 and 4 value
    Additional Octet Count
    Value and Description 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies DEFINITY Enterprise Communications Server Release 5, CallVisor, ASAI Protocol Reference Instructions Manual