Home
>
ATT
>
Communications System
>
ATT DEFINITY Communications System Generic 3V4 Instructions Manual
ATT DEFINITY Communications System Generic 3V4 Instructions Manual
Have a look at the manual ATT DEFINITY Communications System Generic 3V4 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 164 ATT manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 555-230-220 September 1995 DEFINITYÒCommunications System Generic 3V4 CallVisorÒASAI Technical Reference 1
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb CopyrightÓ1993 AT&T All Rights Reserved Printed in USA Notice While reasonable effort was made to ensure that the information in this document was complete and accurate at the time of printing, AT&T cannot assume responsibility for any errors. Changes and/or corrections to the information contained in this document may be incorporated into future issues. Your Responsibility for Your Systems Security Toll fraud is the unauthorized use of your telecommunications system by an unauthorized third party, for example, persons other than your companys employees, agents, subcontractors, or persons working on your companys behalf. Note that there may be a risk of toll fraud associated with your telecommunications system, and if toll fraud occurs, it can result in substantial additional charges for your telecommunications services. You and your system manager are responsible for the security of your system, such as programming and configuring your equipment to prevent unauthorized use. The System Manager is also responsible for reading all installation, instruction, and system administration documents provided with this product in order to fully understand the features that can introduce risk of toll fraud and the steps that can be taken to reduce that risk. AT&T does not warrant that this product is immune from or will prevent unauthorized use of common-carrier telecommunication services or facilities accessed through or connected to it. AT&T will not be responsible for any charges that result from such unauthorized use. AT&T Corporate Security Whether or not immediate support is required, alltoll fraud incidents involving AT&T products or services should be reported to AT&T Corporate Secuirty at 1 800 821-8235. In addition to recording the incident, AT&T Corporate Security is available for consultation on security issues, investigation support, referral to law enforcement agencies, and educational programs. AT&T Fraud Intervention If you suspect you are are being victimized by toll fraud and you need technical support or assistance, call the GBCS Technical Service Center Toll Fraud Intervention Hotline at 1 800 643- 2353. Federal Communications Commission (FCC) Statement This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause interference to radio communications. It has been tested and found to comply with the limits for a Class A computing device pursuant to Subpart J of Part 15 of FCC Rules, which are designed to provide reasonable protection against such interference when operated in a commercial environment. Operation of this equipment in a residential area is likely to cause interference, in which case the user at his or her own expense will be required to take whatever measures may be required to correct the interference. Trademarks DEFINITY, CallVisor, MultiQuest, and Vari-A-Bill are registered trademarks of AT&T. UNIX is a registered trademark of Novell in the United States and other countries, licensed exclusively through X/Open Company Limited. Netware Telephony Services is a registered trademark of Novell. PassageWay Telephony Services is a trademark of AT&T. Ordering Information Call:AT&T GBCS Publications Fulfillment Center Voice 1 800 457-1235 Fax 1 800 457-1764 International Voice.: 1 317 361-5353 International Fax: 1 317 361-5355 Write:AT&T GBCS Publications Fulfillment Center P.O. Box 4100 Crawfordsville, IN 47933 Order:Document No. AT&T 555-230-220 Issue 4, September 1995 Published by GBCSystems Product Documentation Development Group AT&T Bell Laboratories Middletown, NJ 07748-1998 2
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb bbbbb Contents bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb About This Documentxvii Intended Audience xvii Terminology xviii Conventions Used in This Document xviii Related Documents xix bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 1ASAI and Capability Groups1-1 Introduction 1-1 Capabilities 1-3 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 2ASAI and Supported Applications2-1 Introduction 2-1 Applications 2-2 Sample Applications 2-3 Inbound Call Management 2-5 Office Automation 2-12 Additional Configurations 2-16 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 3Event Reporting and U-Abort Capabilities3-1 Introduction 3-1 Event Reports 3-2 U-ABORT 3-46 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 4ASAI and Call Control4-1 Third Party Make Call 4-4 Third Party Make Call and Supported Call Types 4-7 Third Party Take Control 4-27 Third Party Selective Hold 4-30 Third Party Reconnect 4-33 Redirect Call 4-35 Issue 4 September 1995 vii
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb bbbbb Contents Third Party Merge 4-38 Third Party Selective Drop 4-42 Third Party Relinquish Control 4-44 Third Party Clear Call 4-45 Third Party Send DTMF Signals (G3V4) 4-47 Third Party Call Ended 4-50 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 5ASAI and Domain Control5-1 Domain (Station) Control Description 5-3 Domain Call Control Capabilities 5-4 Third Party Domain (Station) Control Request 5-5 Third Party Domain Control Request for ACD Split/ EAS Skill Domain 5-7 Third Party Answer 5-9 Third Party Selective Hold 5-12 Third Party Reconnect 5-14 Redirect Call 5-16 Third Party Merge 5-19 Third Party Selective Drop 5-22 Third Party Auto Dial 5-24 Third Party Relinquish Control 5-26 Third Party Send DTMF Signals 5-28 Third Party Domain Control Ended 5-30 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 6Event Notification Capabilities6-1 Event Notification Request 6-2 Event Notification Cancel 6-4 Stop Call Notification 6-5 Event Notification Ended 6-7 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 7ASAI and Call Routing7-1 Route 7-2 Route Select 7-5 Route End 7-9 viii Issue 4 September 1995
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb bbbbb Contents bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 8ASAI and Request Feature Capabilities8-1 Request Feature Capability Group 8-2 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 9ASAI and Value Query Capabilities9-1 Value Query 9-2 Value Query Response 9-14 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 10ASAI and Set Value Capabilities10-1 Set Value 10-2 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 11ASAI Maintenance Capabilities11-1 Heartbeat 11-2 Suspend Alarms 11-3 Resume Alarms 11-5 Restart 11-6 Link Versions 11-6 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 12ASAI and Feature Interactions12-1 Administration without Hardware (AWOH) 12-1 Analog Sets 12-2 Announcements 12-4 Answer Supervision 12-4 ARS/AAR 12-5 Attendants and Attendant Groups 12-5 Attendant Auto-Manual Splitting 12-6 Attendant Call Waiting 12-7 Attendant Control of Trunk Group Access 12-7 AUDIX 12-8 Authorization Codes 12-8 Automatic Call Distribution (ACD) 12-8 Automatic Callback on Busy/No Answer 12-11 Auto-Available Split 12-12 Issue 4 September 1995 ix
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb bbbbb Contents BCMS Login IDs 12-12 Bridged Call Appearance 12-12 Busy Verification of Terminals 12-13 Call Coverage 12-13 Call Forwarding All Calls 12-15 Call Park 12-16 Call Pickup 12-16 Call Vectoring 12-17 Call Waiting 12-20 Class of Restriction (COR) 12-20 Class of Service (COS) 12-21 Conference 12-21 DCS 12-21 Direct Agent Calling 12-22 Do Not Disturb 12-27 Drop Button Operation 12-27 Duplication 12-28 Expansion Port Network (EPN) 12-28 Expert Agent Selection (EAS) 12-28 Facility Restriction Levels (FRLs) 12-34 Forced Entry of Account Codes 12-34 Hold 12-34 Hot Line 12-34 Integrated Services Digital Network (ISDN) 12-34 Last Number Dialed 12-34 Leave Word Calling 12-35 Lookahead Interflow 12-35 Multiple Split Queuing 12-35 Music On Hold 12-35 Personal Central Office Line (PCOL) 12-35 Primary Rate Interface (PRI) 12-36 Priority Calling 12-37 Privacy-Manual Exclusion 12-37 Ringback Queuing 12-37 Send All Calls (SAC) 12-37 Service Observing 12-38 Single-Digit Dialing and Mixed Station Numbering 12-38 Station Message Detail Recording (SMDR) 12-38 System Reports 12-39 Temporary Bridged Appearances 12-39 x Issue 4 September 1995
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb bbbbb Contents Terminating Extension Group (TEG) 12-39 Timed Reminder 12-40 Transfer 12-41 Trunk-to-Trunk Transfer 12-41 Voice (Synthesized) Message Retrieval 12-41 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 13ASAI-Ethernet13-1 Overview 13-1 Physical Connectivity 13-1 Administration 13-5 System Operation 13-6 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 14Installation and Test for CallVisor ASAI14-1 Hardware Installation 14-1 Software Installation 14-2 CallVisor ASAI Link Administration 14-3 CallVisor ASAI Link Testing 14-6 AT&T Vendor Partners 14-6 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb ACall Scenarios and ApplicationsA-1 1. Basic Application Call Scenarios A-2 2. Calls Across Multiple Switches A-24 3. Expert Agent Selection Interactions A-37 4. Converse Vector Command Interactions A-46 5. Redirection On No Answer (RONA) Interactions A-50 6. VDN in Coverage Path Interactions A-55 7. User Scenarios Ð User to User Information (UUI) A-62 8. User Scenarios Ð Connected IE for Non-ISDN Trunks A-66 9. User Scenarios Ð ASAI-Provided Dial-Ahead Digits A-67 10. User Scenarios Ð ASAI-Requested Digit Collection A-68 11. User Scenarios Ð VDN Return Destination A-69 12. ASAI Messaging Scenarios Ð VDN Return Destination A-71 13. User Scenarios Ð Flexible Billing A-72 Issue 4 September 1995 xi
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb bbbbb Contents bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb BASAI and Generic 3 Switch RequirementsB-1 Capacity Requirements and Constraints B-1 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb GLGlossaryGL-1 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb INIndexIN-1 xii Issue 4 September 1995
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb bbbbb Figures bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 2ASAI and Supported Applications 2-1. Single Link Ð Single Processor Configuration 2-1 2-2. Multiple Link Ð Single Processor Configuration 2-16 2-3. Single Link Ð Multiple Processors Configuration 2-17 2-4. Single Link Ð Gateway/Server Configuration 2-18 2-5. ASAI Integration with a VRU Configuration 2-19 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb 13ASAI-Ethernet 13-1. DEFINITY LAN Gateway System Assembly in a DEFINITY Carrier 13-2 13-2. Cable Connectivity to the System Assembly 13-3 13-3. Overall System Connectivity 13-5 13-4. Relationship of Virtual BRI Ports, Brouter, and DEFINITY LAN Gateway Clients 13-7 bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb ACall Scenarios and Applications A-1. Multiple Switch Configuration A-24 A-2. Call Flow for Blind Transfer to Another Switch A-26 A-3. Call Flow for Consultation Transfer to Another Switch A-28 A-4. Call Flow for Incoming Call to Lookahead Interflow Vector A-31 A-5. Call Flow for a Transfer to a Lookahead Interflow Vector A-34 A-6. Call Flow for Incoming Call to Skill VDN A-38 A-7. Call Flow for Incoming Call to Logical Agent Transferred to Another Logical Agent A-40 A-8. Call Flow for Direct Agent Call to Logical Agents Login ID A-42 A-9. Skill Hunt Groups and Logical Agents A-44 A-10. Call Flow for a Converse Step that can be Interrupted A-46 A-11. Call Flow for a Converse Step that will not be Interrupted A-48 A-12. Call Flow for a Call where RONA Timer Expires A-50 A-13. Call Flow for a Direct Agent Call where RONA Timer Expires A-53 Issue 4 September 1995 xiii
bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb bbbbb Figures A-14. Call Flow for an Agent who has a VDN in the Coverage Path A-55 A-15. Call Flow for Call to a VDN with Announcement and Routed to Another VDN A-57 A-16. Outgoing Call over Non-ISDN Trunk A-59 A-17. Call Flow for Outgoing ISDN Call that Traverses a Non-ISDN Network A-60 A-18. Distributed ACD Configuration A-62 xiv Issue 4 September 1995