Amanda Work Group Manual
Here you can view all the pages of manual Amanda Work Group Manual. The Amanda manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 131
Chapter 10: Programming Amanda 121 Most system variables do not have parameters. However, a couple of system variables have parameters that affect the contents of that system variable. For example, to use %I, the system variable that retrieves data from specific fields of specific messages, you use parameters to indicate which field, message number, and mailbox you want the data from. Syntax The exact sequence of characters for each token is defined by its syntax, so you have to learn to read syntax....
Page 132
122 Installing [email protected]/Windows Because the %I and parentheses are bold, you know that you have to include them in the command. The commas are bold, but the one in front of mailbox is inside brackets […], which surround optional parts of the syntax. If you use the bracketed part of the syntax, you must use the comma. Because field is italicized, you know that it is a place holder for information that you must provide. Field can be any one of the following fields associated with messages: D...
Page 133
Chapter 10: Programming Amanda 123 Both the Extension and Notify Method fields can contain up to 65 characters. If you need more than 65 characters for your program, you use: A command that reads additional tokens from a file The G() command to tell Amanda to go to the Extension field for another mailbox and process the tokens the system finds there Files and Directories This section points out what you need to know about files and file names when using the Token Programming Language. It assumes...
Page 134
124 Installing [email protected]/Windows dBase files are created using dBase, a database software product. For dBase files, you tell Amanda the name of the field instead of its number. When Amanda reads data from a dBase file, the system deletes any spaces at the end of the data as the system stores the data into a variable. For example, if the field contains MARY , Amanda reads only MARY. Flow of Control: Branching and Looping When programming Amanda, you often type the tokens for a...
Page 135
Chapter 10: Programming Amanda 125 mailbox 153, before returning to mailbox 151. This is still a loop because eventually Amanda returns to mailbox 151. It is just a longer, more complicated loop than the earlier examples. T1 Lines If you are using a T1 line, the only tokens you can use are: Any DTMF digit (0–9, A, B, C, D, # , *) Any system, port, or global variable (any token that starts with %) E F P W Examples This section provides practical examples using some of the available tokens....
Page 136
126 Installing [email protected]/Windows 3. If more than one employee matches the digits, Amanda asks the caller to choose. For example, Amanda might say “For Steve Smith, press 1; for Stella Clark, press 2.” 4. Amanda dials the extension. Translating to Amanda’s Tokens This example shows the use of the G() command, which stops Amanda from processing the current mailbox and goes directly to the specified mailbox. It also illustrates the M() command that causes Amanda to play a greeting and wait for a...
Page 137
Chapter 10: Programming Amanda 127 Because 262 matches Bob Knapp, the Extension field for mailbox 262 should be: @G(107) or @P(G1)P(N,107)G(107) 6. For mailboxes that match more than one of the employees: a. Record G1 (Greeting 1) as “For first matching name, press 1; for second matching name, press 2; …” substituting the real names of employees for the italicized words. b. In the Menus fields, put the mailbox for the first matching name in 1; the mail- box for the second in 2, and so forth. c. In the...
Page 138
128 Installing [email protected]/Windows Token Reference This section contains two tables, each of which lists all of the tokens in the Token Programming Language: A quick token reference table, which lists each token by its function or purpose. The functions are in alphabetical order so that you can easily find all the tokens that perform similar functions. For example, the J() and T() commands both deal with faxes so they are grouped under Fax. This table provides only the syntax for each token....
Page 139
Chapter 10: Programming Amanda 129 Current mailbox’s Extension field%E Date%I( field, msg_no[, mailbox]) P[ repetition]( date,D[, hangup]) %Y Days of week%W Deleting fileY[( file)] Deleting, messageKD( msg_no[, mailbox]) Dial (pulse dial)~ Dial codesF dial tone%X dial tone, wait forW( n,T[, mailbox]) Directory Name field%F( field[, mailbox]) Disk space%D P[ repetition](D) DollarsP[ repetition]( amount, currency[, hangup]) DTMF digitsP[ repetition]( DTMF) P[ repetition](R) 01 23 45 67 89 AB CD...
Page 140
130 Installing [email protected]/Windows Fax, incremental( file) Fax, initialization%A Fax, messagesKQ( phone_no[, mailbox]) Fax, receiveJ( file_or_box, phone_no[, tokens]) Fax, sendT( file, phone_no[, tokens]) Fields, process extension or Notify field as tokens@ Fields, returns number of characters in a stringLEN[ string] Fields, values in mailbox record%F( field [, mailbox]) Fields, Variable field in notification record%V Fields, Extension %E Fields, information%I( field, msg_no[, mailbox])...