IEEE Network Operations and Management Symposium: Symposium Record : NOMS., Volumes 1-4IEEE Communications Society, 1992 - Computer networks |
From inside the book
Results 1-3 of 4
Page 725
... calls and trunk groups , SSP / 800 attempts and blocked calls , trunk group controls , call gap controls , and overload controls . The NTM center requires an increasing amount of real time event data to monitor network events that ...
... calls and trunk groups , SSP / 800 attempts and blocked calls , trunk group controls , call gap controls , and overload controls . The NTM center requires an increasing amount of real time event data to monitor network events that ...
Page 727
... Call gap on dialed digits EO ( NAP • Call gap on carrier access code • Trunk group controls • DOC / ACC LEC Network ICN ISDN - UP / Network Interconnect Strategy NTM for SS7 ISDN - UP is similar to existing non - SS7 NTM strategies ...
... Call gap on dialed digits EO ( NAP • Call gap on carrier access code • Trunk group controls • DOC / ACC LEC Network ICN ISDN - UP / Network Interconnect Strategy NTM for SS7 ISDN - UP is similar to existing non - SS7 NTM strategies ...
Page 728
... Call gap on called number • Trunk group controls SCP Automatic Call Gap • SCP Overload • Destination Mass Calling SMS Manual Control STP STPH SCP SCP ( SSP ) • Selective Originating Code Control on service key EO NAP Post - query ...
... Call gap on called number • Trunk group controls SCP Automatic Call Gap • SCP Overload • Destination Mass Calling SMS Manual Control STP STPH SCP SCP ( SSP ) • Selective Originating Code Control on service key EO NAP Post - query ...
Contents
Tabata O 9 | 627 |
Modeling Using TMN Architectures and Principles | 629 |
Papavassiliou S 7 3 | 728 |
Copyright | |
Other editions - View all
Common terms and phrases
access control adjuncts Advanced Intelligent Network AIN services AT&T Bell Laboratories authentication automation Bell Canada Bell-Northern Research Bellcore building blocks C-Log data Call gap CALL HISTORY LOGS common carrier communications concurrency control confidentiality congestion deployment downsizing enable end-to-end environment GO Intelligence implementation IMPROVE OPERATIONAL INFRASTRUCTURES Integration of Operations Interconnect intrusion detection ISDN ISDN-UP LEC network management and administration management functions mechanisms messages monitor network elements Network Layer network management Network Operations network security network traffic manager NOMS 92 NTM center NTM data NTM strategy OAM Intelligence OAM&P Operations Systems protocol requirements Security Architecture security management security services servers service assurance process SESSION specific SS7 Network Traffic SS7 NTM subnetwork subscriber's symmetric target architecture telecommunications Telecommunications Network test call controller test call processing Testing OS user transactions trigger trunk group controls USA Chair