Provisioning User Guide Version 8.17 C3C® Provisioning Guide

Total Page:16

File Type:pdf, Size:1020Kb

Provisioning User Guide Version 8.17 C3C® Provisioning Guide Communications Network Management System Provisioning User Guide Version 8.17 C3C® Provisioning Guide Copyright RIGHTS AND RESTRICTIONS Strata Group proprietary rights are included in this document and the information disclosed therein. This document, regardless of the form in which it exists, may not be used by or disclosed for any purpose except as specifically authorized in writing by Strata Group. Copyright 1994 - 2006 Strata Group, Inc. Unpublished - Rights reserved under the copyright laws by Strata Group. ALL RIGHTS RESERVED This document contains proprietary data that is protected by copyright under the Berne Convention and the Universal Copyright Convention. No part of this document may be transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior written permission of Strata Group. TRADEMARKS C3C® is a trademark of Strata Group, Inc. i Use or disclosure of of information contained in this page is subject to the restrictions in Page i of this document C3C® Provisioning Guide 1 About This Guide.......................................................................................1-1 1.1 PURPOSE.................................................................................................................................................................1-1 1.2 ORGANIZATION ......................................................................................................................................................1-1 1.3 CONVENTIONS USED IN THE GUIDE ........................................................................................................................1-1 2 Introduction................................................................................................2-1 2.1 OVERVIEW..............................................................................................................................................................2-1 2.2 THE USER INTERFACE ............................................................................................................................................2-1 2.2.1 Windows Look and Feel.................................................................................................................................2-1 2.2.1.1 Using the Mouse ......................................................................................................................................................... 2-1 2.2.1.2 Using Keyboard Shortcuts .......................................................................................................................................... 2-2 2.2.1.3 Graphical User Interface Notes ................................................................................................................................... 2-2 3 Getting Started ..........................................................................................3-1 3.1 LOGGING IN............................................................................................................................................................3-1 3.1.1 Buttons...........................................................................................................................................................3-1 3.1.1.1 Settings........................................................................................................................................................................ 3-2 3.2 LOGGING OUT ........................................................................................................................................................3-2 3.3 ON-LINE HELP........................................................................................................................................................3-2 3.4 CHANGING YOUR PASSWORD.................................................................................................................................3-2 3.4.1 Change Password window.............................................................................................................................3-2 4 The C3C® Workspace...............................................................................4-1 4.1 WORKSPACE COMPONENTS ....................................................................................................................................4-1 4.1.1 Title Bar.........................................................................................................................................................4-1 4.1.2 Menu Bar .......................................................................................................................................................4-1 4.1.2.1 File .............................................................................................................................................................................. 4-2 4.1.2.2 Tools ........................................................................................................................................................................... 4-2 4.1.2.3 Window....................................................................................................................................................................... 4-2 4.1.2.4 Help............................................................................................................................................................................. 4-3 4.1.3 Tool Bar.........................................................................................................................................................4-3 4.1.4 Auth Code Manager.......................................................................................................................................4-3 4.1.4.1 5ESS Auth Code Details ............................................................................................................................................. 4-4 4.1.4.2 DMS100 / CS2KAuth Code Details............................................................................................................................ 4-4 4.1.4.3 EWSD Auth Code Details........................................................................................................................................... 4-5 4.1.4.4 Auth Code Bulk Procesing.......................................................................................................................................... 4-6 4.1.5 Find Tool .......................................................................................................................................................4-8 4.1.5.1 Finding a Station with the Find Tool........................................................................................................................... 4-8 4.1.5.2 Finding an Order with the Find Tool........................................................................................................................... 4-8 5 Provisioning ...............................................................................................5-1 5.1 ABOUT PROVISIONING............................................................................................................................................5-1 5.2 PROVISIONING METHOD OPTIONS ..........................................................................................................................5-1 5.3 STATION EXPLORER ...............................................................................................................................................5-1 5.3.1 Tool Button Bar .............................................................................................................................................5-1 5.3.2 Selection Panel ..............................................................................................................................................5-2 5.3.2.1 Station Finder Tab....................................................................................................................................................... 5-2 5.3.2.2 Advanced Query ......................................................................................................................................................... 5-3 5.3.2.2.1 Station Attributes Select Panel ............................................................................................................................. 5-4 5.3.2.2.2 Station Features Select panel................................................................................................................................ 5-4 5.3.2.2.3 Query panel .......................................................................................................................................................... 5-5 5.3.2.2.4 Buttons ................................................................................................................................................................. 5-5 Button.............................................................................................................................................................................. 5-5 Description ...................................................................................................................................................................... 5-5 . ii Use or disclosure of of information contained in this page is subject to the restrictions in Page i of this document C3C® Provisioning Guide 5.3.2.3 Station Folders Tab ....................................................................................................................................................
Recommended publications
  • Line Card Codec/Filter Combo System/Design
    PCM Codec/Filter Combo Family Device Design-In and Application Data Design Considerations SLWA006 August 1996 Printed on Recycled Paper IMPORTANT NOTICE Texas Instruments (TI) reserves the right to make changes to its products or to discontinue any semiconductor product or service without notice, and advises its customers to obtain the latest version of relevant information to verify, before placing orders, that the information being relied on is current. TI warrants performance of its semiconductor products and related software to the specifications applicable at the time of sale in accordance with TI’s standard warranty. Testing and other quality control techniques are utilized to the extent TI deems necessary to support this warranty. Specific testing of all parameters of each device is not necessarily performed, except those mandated by government requirements. Certain applications using semiconductor products may involve potential risks of death, personal injury, or severe property or environmental damage (“Critical Applications”). TI SEMICONDUCTOR PRODUCTS ARE NOT DESIGNED, INTENDED, AUTHORIZED, OR WARRANTED TO BE SUITABLE FOR USE IN LIFE-SUPPORT APPLICATIONS, DEVICES OR SYSTEMS OR OTHER CRITICAL APPLICATIONS. Inclusion of TI products in such applications is understood to be fully at the risk of the customer. Use of TI products in such applications requires the written approval of an appropriate TI officer. Questions concerning potential risk applications should be directed to TI through a local SC sales office. In order to minimize risks associated with the customer’s applications, adequate design and operating safeguards should be provided by the customer to minimize inherent or procedural hazards. TI assumes no liability for applications assistance, customer product design, software performance, or infringement of patents or services described herein.
    [Show full text]
  • Telecom Acronym Guide
    Telecom Acronym Guide Fourth Edition Telecom Acronym Guide Fourth Edition Numerics ACAC Actual Call Admission Control 2F Two-fiber ACEG Alternating Current Equipment Ground 10 GbE 10 Gigabit Ethernet ACK Acknowledge 10 GFC 10 Gigabit Fibre Channel (Same as FC1200) ACL Active Control List; Access Control List 100G 100 Gigabits ACO Alarm Cutoff 16-QAM 16 (points) Quadrature Amplitude Modulation ACQ Acquire 3D Three-dimensional ACR Allowed Cell Rate 3G Third Generation ACS Automatic Channel Shutdown; Alarm Correlation and Suppression 3GPP Third Generation Partnership Project ACSE Association Control Service Element 40G 40 Gigabits ACSS Automatic Channel Shutdown Suppression; 4C Consortium of Intel, IBM, Matsushita, and Toshiba Automatic Channel Shutdown State 4F Four-fiber ACT Active 4G Fourth Generation ADC Analog-to-Digital Converter; Add/Drop Coupler 5C Consortium of Intel, Sony, Matsushita, Toshiba, ADI Asset Distribution Interface and Hitachi ADM Add/Drop Multiplexer 5G Fifth Generation ADP Actual Departure Potential; Automatic A Data Processing ADSL Asymmetric Digital Subscriber Line A/D Analog-to-digital ADT Actual Departure Time; Automatic AAL ATM Adaptation Layer Data Transmission AAL0 ATM Adaptation Layer Type 0 AE Automation Engine; Automation Environment A AL1 ATM Adaptation Layer Type 1 AES Advanced Encryption Standard; AAL2 ATM Adaptation Layer 2 Transport Application Environment Specific AAL3/4 ATM Adaptation Layer Types 3 and 4 AESA ATM End System Address; ATM End Station AAL5 ATM Adaptation Layer 5 Address ABR Available Bit
    [Show full text]
  • ADSL) Services to Remote Digital Loop Carrier (DLC) Locations
    Extending Asymmetric Digital Subscriber Line (ADSL) Services to Remote Digital Loop Carrier (DLC) Locations Definition Digital loop carriers (DLCs) consolidate the voice traffic of remotely located customers onto a few transport lines running back to the central office (CO), thus reducing the cost and space requirements of serving those customers. Asymmetric digital subscriber line (ADSL) technology is used to transport large amounts of data traffic over existing copper telephone lines—up to 8 Mbps downstream and 640 kbps upstream—while simultaneously supporting plain old telephone service (POTS). Overview This tutorial discusses the process of delivering ADSL services to remote end- users fed by DLC systems. With increasing suburbanization, areas outside urban centers are experiencing a rapid growth in both businesses and new residential communities. These new populations are prime candidates for high-speed data services such as ADSL. Therefore, as demand for high-speed data access grows, being able to cost-effectively deliver ADSL to these outlying areas, which typically receive their communications services via DLC systems, becomes increasingly important. Delivering ADSL to DLC–fed end-users is a difficult challenge to meet because ADSL does not work with DLC systems without some sort of infrastructure upgrade. However, solutions are being developed, and some of these are quite promising. This tutorial provides a brief background of the challenge of delivering ADSL to DLC–fed end users, as well as a number of ways this challenge is being addressed. The tutorial places particular emphasis on remote access multiplexer (RAM) solutions. Topics 1. Market Demand: ADSL and DLC–Fed Customers Web ProForum Tutorials Copyright © 1/19 http://www.iec.org The International Engineering Consortium 2.
    [Show full text]
  • %Ec E\Fv VIA HAND DELIVERY Sandra Squire, Executive Secretary Public Service Commission of West Virginia 201 Brooks Street Charleston, WV 25323
    ATTORNEYS Jared M. Tully Attorney at Law 304.348.2404 December 1,2010 [email protected] Brg:B? pfi DEC @$ 2 20 PSC %Ec E\fV VIA HAND DELIVERY Sandra Squire, Executive Secretary Public Service Commission of West Virginia 201 Brooks Street Charleston, WV 25323 Re: CASE NO. 10-0383-T-C EMERGENCY OPERATIONS CENTER OF KANAWHA COUNTY, V. YMAX COMMUNICATIONS CORPORATION and MAGIC JACK, LP Dear Ms, Squire, Please find enclosed for filing in the above proceeding an original and twelve copies of the direct testimony of Billy Jack Gregg, W. Kent Carper, and Carolyn Karr Charnock on behalf of the Emergency Operations Center of Kanawha County. Copies of the same have been forwarded to parties of record. Thank you for your assistance in this matter. hclosures Terry C. Owen, Esq. Marc Weintraub, Esq. Richard M. Firestone, Esq. E. Dandridge McDonald, Esq. Laidley Tower, Suite 401 I Charleston, West Virginia 25301-3207 I 304.345.0111 I frostbrowntodd.com 500 Lee Street STATE OF WEST VIRGINIA PUBLIC SERVICE COMMISSION CHARLESTON, WEST VIRGINIA EMERGENCY OPERATIONS CENTER OF KANAWHA COUNTY and W. KENT CARPER, in his capacity as President of the EMERGENCY OPERATIONS CENTER OF KANAWHA COUNTY, Executive Committee Complainants, EC 0% 2@2f;psc EXEC Dn V. Case No. 10-0383-T-C YMAX COMMUNICATIONS CORPORATION And MAGIC JACK, LP Defendants. CERTIFICATE OF SERVICE I, Jared M. Tully, hereby certify that a copy of the foregoing Direct Testimony ofBilly Jack Gregg was served via US Mail, postage prepaid the lStday of December, 2010 upon the following parties: Terry C. Owen, Esq.
    [Show full text]
  • The Application of Various Digital Subscriber Line (Xdsl) Technologies to ITS: Traffic Video Laboratory Assessments
    MITRETEK PAPER MP 1999-27 The Application of Various Digital Subscriber Line (xDSL) Technologies to ITS: Traffic Video Laboratory Assessments February 1999 Keith Biesecker Giles Charleston Mitretek Systems Center for Telecommunications and Advanced Technology McLean, Virginia MITRETEK PAPER MP 1999-27 The Application of Various Digital Subscriber Line (xDSL) Technologies to ITS: Traffic Video Laboratory Assessments February 1999 Keith Biesecker Giles Charleston Sponsors: Federal Highway Administration Contract No.: DTFH61-95-C-00040 Dept. No.: Q020 Project No.: 099818B5-0A Mitretek Systems Center for Telecommunications and Advanced Technology McLean, Virginia ABSTRACT Various digital subscriber line (xDSL) technologies are those methods used to implement high-speed data services (e.g., 2 Mbps Frame Relay) on a twisted pair (wire) communications medium. They are also considered strong candidates for rapidly deploying Intelligent Transportation Systems (ITS) services over existing communications infrastructure. For example, xDSL technologies provide the potential to integrate full motion traffic video over the twisted pair currently used by many traffic control systems. Commercially available xDSL products and services exist, and field trials have occurred for the more popular applications, including Internet access and video on-demand. However, ITS applications such as freeway surveillance video are untested. Although xDSL technologies offer great potential for ITS, they remain largely unknown to the transportation industry, and further evaluation is required. This paper summarizes some features of these technologies and a successful Federal Highway Administration (FHWA) proof-of-concept test to assess their application to ITS. Suggested Keywords: digital subscriber line (DSL), traffic video, Intelligent Transportation Systems (ITS) i ii ACKNOWLEDGMENTS The authors wish to thank Mr.
    [Show full text]
  • HTC-1100E Digital Loop Carrier System Description
    HTC-1100E Digital Loop Carrier System Description September 2003 1B.1 Copyright © 2003 HitronTechnologies All Rights Reserved. This document contains information that is the property of HitronTechnologies. This document may not be copied, reproduced, reduced to any electronic medium or machine readable form, or otherwise duplicated, and the information herein may not be used, disseminated or otherwise disclosed, except with the prior written consent of HitronTechnologies HitronTechnologies 0 HTC-1100E System Description Contents NEW PRODUCT INFORMATION RELEASE .......................................................................................5 BROADBAND ADSL SOLUTION .....................................................................................................5 QUAD E1 TRANSCEIVER (QE1X-XCVR) ......................................................................................... 12 ELU-T / EBC-T................................................................................................................ 15 ELU-T / EBC-T................................................................................................................ 16 HTC-2100 ..................................................................................................................... 18 ISDN- PRI...................................................................................................................... 19 QV52 (QV52CU) .............................................................................................................. 22 LAN CARD
    [Show full text]
  • 297-1001-825
    297-1001-825 DMS-100 Family Glossary of Terms and Abbreviations Reference Manual NA008 Standard 04.03 August 1999 DMS-100 Family Glossary of Terms and Abbreviations Reference Manual Publication number: 297-1001-825 Product release: NA008 Document release: Standard 04.03 Date: August 1999 1992–1999 Northern Telecom All rights reserved Printed in the United States of America NORTHERN TELECOM CONFIDENTIAL: The information contained in this document is the property of Northern Telecom. Except as specifically authorized in writing by Northern Telecom, the holder of this document shall keep the information contained herein confidential and shall protect same in whole or in part from disclosure and dissemination to third parties and use same for evaluation, operation, and maintenance purposes only. Information is subject to change without notice. Northern Telecom reserves the right to make changes in design or components as progress in engineering and manufacturing may warrant. DMS, DMS SuperNode, MAP, Nortel, and NT are trademarks of Northern Telecom. DMS-100 Family Glossary Reference Manual NA008 iii Publication history August 1999 BASE08 Standard 04.03 Updated the definition for the Cutoff On Disconnect (COD) feature. March 1998 BASE08 Standard 04.02 Text converted to comply with Nortel Standard English. May 1997 BASE08 Standard 04.01 Added terms. December 1993 BCS36 Standard 03.01 • made technical and editorial changes to existing terms • added terms March 1993 BCS35 Standard 02.01 • made technical and editorial changes to existing terms
    [Show full text]
  • Local Loop Unbundling a View from Opal Telecom Networks & The
    Local Loop Unbundling A View from Opal Telecom Networks & The Carphone Warehouse April 2006 Contents Preface 1. How telecoms is regulated in the UK 2. The structure of the residential telecoms market today 3. Economics of LLU 4. The Opal network today 5. The Opal network tomorrow 6. VoIP in the residential market 7. Other revenue and cost opportunities from LLU 8. Glossary Preface This document is designed to act as a basic primer to the regulatory structure of the UK residential telecoms market, the introduction of Local Loop Unbundling (“LLU”), some technical aspects of the Opal network, and one or two issues that regularly arise in our discussions with investors and analysts. It also serves to flesh out some of the points we touch on in our slide presentations. Its target audience is primarily those who come from a predominantly retail or generalist background, so we appreciate it may add little to the knowledge of telecoms specialists. We have tried to keep technical jargon down to a minimum, but some degree of telco-speak is unavoidable and we have included a glossary at the back that should help to explain some of the more obscure acronyms, rather than explaining every technological term where it appears in the text. In addition we have avoided charts and diagrams because more often than not we believe that they are more confusing than helpful. This is a document to be read and annotated rather than looked at, but can be consulted in conjunction with our slide presentations. The intention is to supplement this document over time with additional publications on key topics relating to the UK telecoms market in general or, more specifically, on Carphone Warehouse’s position within it.
    [Show full text]