Calls
STE User’s Manual
7-14
Rel. 2.6
If you are connected to a DMS-100 switch, use the following procedure:
•
Press
CONF
. You will get a dial tone.
•
Call the party you want to transfer the call to and when the party answers you can hang up.
7-3.7
ISDN - Conference Call
You may be capable of holding a non-secure conference call by using the
CONF
key. Consult your local
ISDN network operating instructions. Generally, to add a third party to your call:
•
Press
CONF
. You will get a dial tone.
•
Call the party you want to add to the conference call. When the party answers press
CONF
.
7-3.8
ISDN - STE Secure Casual Conference
The STE Secure Casual Conference is a STE secure voice only function in which three-party
conferencing is established on an ISDN network. Conferencing is supported on ISDN UDI-64 data
bearers, ISDN UDI-56 data bearers, or ISDN 3.1 kHz audio bearers (if they pass VBSCT).
The conference is composed of one Bridgenode Terminal (the STE initiating the conference) and two
Endnode Terminals (the STEs responding to the conference request) as shown in
Bridgenode Terminal initiates the bridge establishment procedures on two ISDN B-channels (one to each
Endnode) and then bridges the audio signals from both of its ISDN B-channels during conference. The
Endnode Terminal participates using one ISDN B-channel in the conference. A STE terminal is capable of
taking on either role on the network. For simplicity, we will refer to Endnode #1 and Endnode #2 as STE-1
and STE-2 respectively, and the Bridgenode as STE-3 in this section.
Figure 7-11. STE Secure Casual Conference Network Diagram
7-3.8.1 Set up the STE Secure Casual Conference
To set up a STE Secure Casual Conference call, first establish an initial secure voice call between the
Bridgenode and one of the Endnodes (see section 7.3.2). Upon connection, a Call Connect menu (
7-12
) is displayed at STE-1 and STE-3.
Figure 7-12. Secure Casual Conference First Call Connect Menu
Where:
“XXXXXXXXXXXX” is the classification of the call
UNCLASSIFIED,
CONFIDENTIAL,
SECRET, or TOP SECRET as appropriate.
“n” is the line number used to make the call (1-4 or 1-8 on 5ESS-8510)
“mmm” is the application type (SV)
“ssss” is the application rate (32 kbps)
“AAAAAAAAAAAAAAAAAAAA” is the DAO descriptor
Notice the classification level of the connected call. All three parties (Bridgenode and both Endnodes)
must have the same classification level, otherwise a downgrading agreement must be reached.
Downgrading is discussed later in this section.
XXXXXXXXXXXX LINEn mmm ssss
NONSEC
SCROLL
AAAAAAAAAAAAAAAAAAAA
Endnode #1
(STE-1)
Endnode #2
(STE-2)
Bridgenode
(STE-3)
Channel #1
Channel #2
Содержание CEU
Страница 2: ...Copyright 2006 L 3 Communications Corporation ...
Страница 26: ...List of Tables STE User s Manual xiv Rel 2 6 This page intentionally left blank ...
Страница 32: ...Introduction STE User s Manual 1 6 Rel 2 6 This page intentionally left blank ...
Страница 92: ...Controls Indicators and Interfaces STE User s Manual 3 12 Rev 2 6 This page intentionally left blank ...
Страница 132: ......
Страница 181: ...STE User s Manual Crypto Card Management Rel 2 6 6 25 ...
Страница 182: ......
Страница 210: ...Calls STE User s Manual 7 28 Rel 2 6 This page intentionally left blank ...
Страница 234: ...Remote Control Operations STE User s Manual 8 24 Rel 2 6 This page intentionally left blank ...
Страница 258: ...8510 Capabilities STE User s Manual 9 24 Rel 2 6 This page intentionally left blank ...
Страница 284: ...User Maintenance STE User s Manual 11 6 Rel 2 6 This page intentionally left blank ...
Страница 288: ...Notes STE User s Manual 12 4 Rel 2 6 12 4 CE DECLARATION OF CONFORMITY ...
Страница 306: ...Index STE User s Manual Index 18 Rel 2 6 This page intentionally left blank ...
Страница 308: ...Rel 2 6 FP 2 FO 2 User Tree ...
Страница 311: ......