Amanda Work Group Manual
Here you can view all the pages of manual Amanda Work Group Manual. The Amanda manuals for Communications System are available online for free. You can easily download all the documents as PDF.
Page 171
Chapter 10: Programming Amanda 161 S( port,[ string], [ variable], [ termination], [ length],[ timeou t]) Command that gives Amanda access to other computers via the serial ports. Amanda can send a string to and/or receive a string from the remote computer. When receiving, Amanda terminates the connection when the first of the following occurs: Amanda receives the specified termination string Amanda receives the maximum number of characters A timeout occurs When sending, Amanda terminates the...
Page 172
162 Installing [email protected]/Windows T( file, phone_no [, tokens]) Command that sends faxes to either a specified telephone number or to a connected call. Before using this command, be sure at least one fax modem is installed and configured on Amanda. Before using this command, make sure the configuration settings for the physical serial port have been defined. See “Serial Port Settings” on page 221. fileThe file name of the fax you wish to transmit. It can be any valid DOS file name. Use the...
Page 173
Chapter 10: Programming Amanda 163 V( file, field, value{, field, variable}[, n])Command that searches the specified file for the nth record that has the specified value in the specified field. It retrieves values from up to 8 other fields in that record, putting the retrieved values in the specified variables. See also the N() command. fileA string or variable containing a valid DOS file name for the text or .DBF file. Use the complete path to the file unless the file is in C:\AMANDA. No line in the...
Page 174
164 Installing [email protected]/Windows W( n,[ event [, mailbox]]) Command that tells Amanda to: Wait a number of tenths of seconds Wait for an event, such as a dial tone or another appropriate answer. If the event does not occur, Amanda goes to the specified mailbox. nWithout an event parameter (P, V, or T), a number of tenths of seconds. For dial tone (T), the number of seconds. For pager (P) and voice (V), the number of rings to wait before continuing. If n is 0 for pager or voice, the 0 is...
Page 175
Chapter 10: Programming Amanda 165 Troubleshooting Check for the following mistakes: 1. Did you start the string of tokens without @ when you wanted Amanda to perform a hookflash or PCPM? 2. Did you start the string of tokens with @ when Amanda should NOT perform a hook- flash or PCPM? 3. If the tokens are in an Extension field, did you forget that both Do Not Disturb and Call Screening must be OFF? 4. Did you check the trace file for information about what went wrong? Y[( file)] Command that deletes...
Page 176
166 Installing [email protected]/Windows TIP:Remember that when a string of tokens in an Extension field fails, Aman- da goes to the mailbox specified in the Done Chain for that mailbox. If you are testing a program and are not sure which strings of tokens fails, use different mailboxes in the Done Chain fields to help you. For exam- ple, if you do not know which of two strings fails, you might put mailbox 4000 in one Done Chain and mailbox 4001 in the other. If you use @P(G1, your_personal_UserID)...
Page 177
Chapter 11: Programming Examples Overview This chapter contains programming examples for: System paging Switching and maintaining languages Retrieving order shipment information Allowing one and two-call faxbacks Using IVR and voice-form applications System Paging of a User for Special Callers This example illustrates inter-mixing tokens with Amanda’s standard call processing. Application This application creates a special mailbox (for example, 611) for family, friends, or special customers....
Page 178
168 Installing [email protected]/Windows 3. Play a greeting that you have already recorded such as “There is an important call for David” using the P() token. 4. Dial the code for retrieving the caller from Transfer Hold and then transfer the caller to a “backdoor” mailbox that rings the extension. For example, to retrieve the caller you use %X and to access the “backdoor” mailbox use the G() token. Result The final result might be: 33*P(G1)%XG(6111) where G1 for the current mailbox has the “important...
Page 179
Chapter 11: Programming Examples 169 The following diagram helps illustrate this: This now gives your callers the option to hear their instructions in the language of their choice (realize that you can have additional language selections as additional menu choices). However, after the caller selects Spanish by pressing 1, when they access a mailbox, Amanda still says in English, “Please hold while I try that extension.” We have changed which language instructions a caller hears, but we still have not...
Page 180
170 Installing [email protected]/Windows mailbox 980’s Extension field contains the tokens @L(MEXICAN)G(981) which causes Amanda to: 1. Not put the caller on transfer hold 2. Change the system prompts to the file MEXICAN 3. Continue processing at mailbox 981. N OTE:There are several ways this same activity could have been accomplished. For example, instead of using the G(981) token, mailbox’s RNA Chain could have had 981 in it. (We use the RNA Chain, since Amanda returns Ring No Answer after...