H. 323 Software ip interface Requirements / Feature Specifications compas id 143543 Issue 4 June 02, 2014 John W. Soltes (retired)



Download 4.77 Mb.
Page12/48
Date28.05.2018
Size4.77 Mb.
#51006
1   ...   8   9   10   11   12   13   14   15   ...   48

2.2 Files




96x1H-IPI.2.2.100: File names


Approved

File names that contain up to 50 of the following ASCII characters will be supported:







30-39 hex (ASCII digits 0-9),
41-5A hex (ASCII upper-case alphabetic characters A-Z),
61-7A hex (ASCII lower-case alphabetic characters a-z),
2D hex (dash),
2E hex (period) or
5F hex (underscore).




File names that do not conform to this format are invalid and will be ignored.

Note:

While version information is typically incorporated into software code file names, the telephone is not required to understand the naming convention or to know whether it is being “upgraded” to a newer release or “downgraded” to an earlier release.

Rationale:

Restricting the characters in the file name to numeric digits, upper-case alphabetic characters, lower-case alphabetic characters, dash, underscore and period conforms to the POSIX (the ANSI/IEEE/ISO/IEC standardized version of UNIX) portable filename character set (see Section 2.2.2.82 of [7.2-12]) and should provide compatibility with Windows 95’s VFAT (Virtual File Allocation Table) , Windows 98’s FAT32, Windows NT’s NTFS (New Technology File System), OS/2’s HPFS (High-Performance File System), MAC OS’s HFS (Hierarchical File System), MAC OS Extended Format (previously known as HFS+) and most versions of UNIX and POSIX. It does not provide compatibility with DOS, MS-DOS and Windows 3.1’s FAT (File Allocation Table, also sometimes called FAT16), in which all alphabetic characters are assumed to be upper-case and the part of the file name before the period is restricted to 8 characters or less and the part after the period is restricted to 3 characters (8.3 format), or with some older versions of UNIX (such as UNIX System V, see [7.2-12] Annex B.5.7.1) unless the total length of the file name is restricted to 14 characters or less.



96x1H-IPI.2.2.600: Display text language files


Approved

Up to four language files will be able to be stored in non-volatile memory, in addition to the built-in English text strings.

Language file content will be processed as UTF-16-encoded Unicode characters.



Note:

The specific languages to be supported are specified in 96x1PKG.2.5.100 in [7.1-10].

Rationale:

Unicode encoding is specified so that language files can be created and edited with available text editors such as Microsoft Word even if a custom language file editing application is not available.
UTF-16 encoding was selected because it was previously specified for backup files in
96x1LA.7.1.500 in [7.1-5]. Since customers may wish to edit either type of file, the use of a common encoding should help reduce the probability of creating miscoded files.



96x1H-IPI.2.2.700: Downloaded trusted certificates


Deleted

The content of this requirement was moved to flowcharts 3a-3 and 3b-3 in 96x1H-IPI.3.1.100.



96x1H-IPI.2.2.800: Voice language files


Approved
only for releases prior
to R6.3


One voice language file will be able to be downloaded and stored in non-volatile memory.



3.0 IP-SPECIFIC PROCEDURES

3.1 Power-Up and Reset Operation


This section specifies the power-up and reset initialization procedures, which precede any H.323 signaling protocol initialization. The intent of the initial display messages, some of which are specified as part of DHCP (see 96x1H-IPI.5.1.600), is to give a “power on” indication and dynamic feedback as the telephone initializes, to reassure the user that the phone is active and has not “locked up”, and to provide useful information about the status of network, server or downloading operations before the availability of dial tone, without causing start-up to take any longer than it would otherwise. During initialization, it is assumed that all button presses will be reported to these procedures.

The following description is not a requirement, but it is provided to document the understanding of the software architecture upon which the requirements are based, as well as to provide a high-level overview of how the telephone is expected to operate during startup and software upgrades. This is by no means a comprehensive description of all of the internal tasks performed during startup, and the requirements take precedence over this description.



Note: The naming, format, content and hierarchy of downloaded files are specified in [7.1-10].

Files will be stored in five areas of non-volatile (flash) memory in the telephones: a boot program area, two Kernel/Root File Systems, one Application File System, and one Temporary Storage area. Two Kernel/Root File Systems are supported in case one becomes corrupted, but only one is activated when the telephone powers up or resets. Temporary Storage will be used to store a new Signed Application/Library Software Package that has been downloaded by the current application until it can be installed by a process in the active Kernel/Root File System after the next reset.

When a telephone starts up, the boot programs will check the Kernel/Root File System that has previously been marked as the one to be activated to ensure that it has not become corrupted, and if it has not, it will transfer control to a process in that file system. If that file system is corrupted, the boot program will check the other Kernel/Root File System. If that file system is not corrupted, it will be marked as the one to be activated, the value of RFSINUSE will be set to the name of the Signed Kernel/Root Software Package that was used to install that file system, and control will be transferred to a process in it. If both Kernel/Root File Systems are corrupted, the telephone will not operate and must be returned for repair.

A process in the active Kernel/Root File System will first check whether a Signed Application/Library Software Package is stored in Temporary Storage, and if it finds one, it will install the Application Software Package and/or the Library Software Package if either has a different file name than the currently installed version, replacing the existing corresponding files in the Application File System. The Hardware Version File included in the Signed Application/Library Software Package will be retained for future compatibility checking.

If a Signed Application/Library Software Package is not found in Temporary Storage, the process will check the integrity of the application files, and if they are corrupted, the process will install files from the Backup Package, replacing the corrupted application files in the Application File System. Any time an Application Software Package or a Library Software Package is installed, the value of the persistent parameter APPINUSE will be set to the file name of the Signed Application/Library Software Package from which it was installed. If the application files are not corrupted, or after the Backup Package has been installed, control will be transferred to the application installed in the Application File System. Note that the processes in the Kernel/Root File System do not connect to the network or download files.

The application will connect to the network, obtain any necessary IP address information, and download files, starting with the upgrade and settings configuration files, and including Signed Software Packages and other separately downloaded files such as Language Files and Certificate Files. When a Signed Software Package (which can contain either Kernel and Root Software Packages or Application and Library Software Package) is downloaded, it will be initially stored in volatile memory (RAM). Other downloaded files (such as Language Files and Certificate Files) will be installed directly in the Application File System.

When either type of Signed Software Package is downloaded, the Signing Authority Certificate will be extracted from the package and it will be validated using a copy of the Avaya Product Root Certificate Authority Certificate that is contained in the existing application software files. If the Signing Authority Certificate is invalid, the package will be deleted. If the Signing Authority Certificate is valid, the Hardware Version File in the package will be validated using the corresponding Signature File in the package and the Signing Authority Certificate. If the signature is invalid, the package will be deleted. If the signature is valid, the Hardware Version File will be used to validate whether the package is valid for the model and hardware version of the telephone. If it is invalid, the package will be deleted. If it is valid, the signature of the Software Packages will be validated using the corresponding Signature Files in the package and the Signing Authority Certificate. If either signature is invalid, the package will be deleted.

If the signatures are valid and the Signed Software Package is a Signed Kernel/Root Software Package, the Kernel Software Package and/or the Root File System Software Package will be installed if either has a different file name than the currently installed version, replacing the existing corresponding files in the Kernel/Root File System that was not active during startup (a Root File System Software Package may also install new boot programs in the boot program area), that Kernel/Root File System will be marked as the one to be activated after the next power-up or reset, and the value of the persistent parameter RFSINUSE will be set to the file name of the Signed Kernel/Root Software Package that was installed.

To ensure that compatible Application/Library and Kernel/Root packages are installed in the telephone, if the Signed Application/Library Software Package that is named in the upgrade file cannot be downloaded, or if it is downloaded but, based on information in its Hardware Version File, it is not compatible with the Signed Kernel/Root Software Package named in the upgrade file, the Signed Kernel/Root Software Package that is named in the upgrade file will not be downloaded, and the packages that are already installed in the telephone will continue to be used. Likewise, if the Signed Application/Library Software Package that is named in the upgrade file is successfully downloaded, but the Signed Kernel/Root Software Package that is named in the upgrade file cannot be downloaded, the downloaded Signed Application/Library Software Package will be discarded and the packages that are already installed in the telephone will continue to be used. Also, if the Signed Kernel/Root Software Package is downloaded but, based on information in its Hardware Version File, it is not compatible with Application or Library Software Packages with which it is to be used, it will be discarded and the packages that are already installed in the telephone will continue to be used.

Finally, if a new Application/Library and/or Kernel/Root package has been downloaded, the telephone will reset. If a new Kernel/Root File System has been installed, it will be activated. If a new Application/Library package is stored in Temporary Storage, it will be installed as described above and then executed. If the application stops running within the first minute or so, the Backup Package will be installed and executed. If the application stops running after that, the telephone will reset.

After it has been determined that the application runs compatibly with the Kernel/RFS, if a Signed Application/Library Software Package is stored in Temporary Storage, and if the Backup Flag is set in the Hardware Version File in that package, the package will be made the Backup Package and the value of BACKUPAPP will be set to the original file name of the package.


Directory: public -> downloadFile.jsp?file= -> resources -> sites -> AVAYA -> content -> live -> SOLUTIONS
public -> The german unification, 1815-1870
public ->  Preparation of Papers for ieee transactions on medical imaging
public -> Harmonised compatibility and sharing conditions for video pmse in the 7 9 ghz frequency band, taking into account radar use
public -> Adjih, C., Georgiadis, L., Jacquet, P., & Szpankowski, W. (2006). Multicast tree structure and the power law
public -> Duarte, G. Pujolle: fits: a flexible Virtual Network Testbed Architecture
public -> Swiss Federal Institute of Technology (eth) Zurich Computer Engineering and Networks Laboratory
public -> Tr-41. 4-03-05-024 Telecommunications
public -> Chris Young sets 2016 “I’m Comin’ Over” Tour headlining dates
SOLUTIONS -> CM: How to enable 'auto answer' feature

Download 4.77 Mb.

Share with your friends:
1   ...   8   9   10   11   12   13   14   15   ...   48




The database is protected by copyright ©ininet.org 2024
send message

    Main page