User's Manual

Table Of Contents
c02.fm
Overview
Einleitung
A31003-C1010-S100-2-7620, 08/2010
HiPath Cordless IP, Service Manual 21
Figure 2 Optimum system synchronization over DECT
Standard synchronization
Alternative synchronization if standard synchronization fails
Figure 3 Not optimally synchronized, each DECT IP base station has only one
synchronization partner
This data is transported in a VPN tunnel to ensure that the signaling and voice
data in active voice connections between a DECT IP base station and HiPath
Cordless IP software is protected against manipulation and interception. For the
VPN encryption IPSec is used.
The DECT IP base stations are set up in communication with the HiPath Cordless
IP server software. As soon as a new DECT IP base station is connected to the
Ethernet, it starts to send multicast packets with its MAC address. The HiPath
Cordless IP server software then activates and takes over control of the DECT IP
base station. The HiPath Cordless IP server software then sends the DECT IP
base station an IP address for communication purposes as well as its own IP
address as a future target address for data traffic.