Home
>
Lucent Technologies
>
Communications System
>
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual
Have a look at the manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1177 Automatic Number Identification 20 Related topics Refer to ‘‘ Trunk Group’’ on page 980 for information about setting Inband ANI on the trunk group form. Outgoing Automatic Number Identification Outgoing automatic number identification (ANI) applies to outgoing Russian multi-frequency (MF) ANI, R2-MFC ANI , and Spain Multi Frequency Espana (MFE) ANI trunks only. Use Outgoing ANI to specify the type of ANI to send on outgoing calls. You can define MF ANI (the calling party number, sent via multifrequency signaling) prefixes by class of restriction. This allows a switch to send different ANIs to different central offices. For a tandem call that uses different types of incoming and outgoing trunks, the switch uses: nthe incoming trunk’s COR -assigned call type for Russian or R2-MFC outgoing trunks nARS call types for MFE outgoing trunks Interactions nAttendant Console If an attendant extends a call, the attendant’s COR is used to select ANI. nAuthorization Codes The authorization code COR is not used to select the ANI. The extension’s ANI is used if an extension originates the call, and the ANI for the switch is used if the originating endpoint is an incoming trunk. nBridged Call Appearance A call from a bridged call appearance uses the ANI of the primary extension. nCall Vectoring The ANI of the originating party is used, not the ANI of the call vector, when a call vectoring route-to command routes a call over an outgoing trunk.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1178 Automatic routing — general 20 nDistributed Communications System (DCS) In a DCS, the ANI sent to the CO is determined by the ANI for PBX on PBX_B, but the category sent to the CO is determined by the Category for MF ANI field on the Class of Restriction screen for the incoming DCS trunk or by the type of call. nExpert Agent Selection (EAS) The EAS agent’s login extension and COR is used to determine ANI. nHunt Groups and Automatic Call Distribution (ACD) Splits The phone’s extension and COR is used to determine ANI for a hunt group or ACD split. nMultimedia Call Handling (MMCH) For call origination, multimedia complexes use the COR assigned to their phones. nPersonal Station Access (PSA) For ANI, the PSA extension and COR overrides the phone’s extension and COR. nRemote Access A remote access barrier code COR is not used for ANI. The extension’s ANI is used if an extension originates the call, and the ANI for the switch is used if the originating endpoint is an incoming trunk. Related topics Refer to ‘‘ Displaying ANI calling party information’’ on page 122 for instructions on setting up ANI display in the U.S. Refer to ‘‘ Multifrequency Signaling’’ on page 1448 for more information on signaling. Refer to ‘‘ Class of Restriction’’ on page 1313 for more information on Class of Restriction. Automatic routing — general DEFINITY ECS automatically routes outgoing calls using the most preferred (normally the least expensive) route available at the time the call is placed. Generally, Automatic Alternate Routing (AAR) routes calls over a private network and Automatic Route Selection (ARS) routes calls using the public network numbering plan. However, both AAR and ARS support public and private networks.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1179 Automatic routing — general 20 Figure 55 shows you an overview of automatic routing. Figure 55. Automatic Routing Figure Notes 1. Input from phone, public network trunk, or private network trunk 2. Analyze digits to determine address type (First Digit Table) 3. Direct to AAR/ARS 4. Direct to Uniform Dial Plan (UDP) 5. Analyze digits using UDP to determine route 6. Delete and insert digits (AAR and ARS Digit Conversion Tables)7. Terminate call at phone 8. Analyze digits (AAR and ARS Digit Analysis Tables) and determine route pattern (Route Pattern, Node Number Routing, Extended Trunk Access screens) 9. Select outgoing trunk group and delete and insert digits 10. Output to public network trunk or private network trunk
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1180 Automatic routing — general 20 AAR AAR routes calls over private networks. When a user dials the AAR feature access code (normally 8 in North America) and phone number, AAR selects the least expensive route for the call in the private network and performs any digit conversion. If the first-choice route is not available, another route is chosen automatically. AAR routes private-network numbers, public-network numbers, service codes, an international number, operator access code, or an operator-assisted dialing number. AAR routes calls route as far as possible over the private network, and then accesses the public network. This saves long-distance charges and allows you to use your private network as much as possible. ARS ARS routes calls over the public network. When a user dials the ARS feature access code (normally 9 in the US and 0 outside of the US) and phone number, ARS selects the least expensive route for the call when there are one or more long-distance carriers or services. ARS, like AAR, routes private-network numbers, public-network numbers, service codes, an international number, operator access code, or an operator-assisted dialing number, and also routes to Inter-exchange carriers (IXC). These are your long-distance providers. You can route ARS calls to a variety of types of public-network and private-network trunk groups including Central Office (CO), Foreign Exchange (FX), Integrated Services Digital Network (ISDN), Tie, and Wide Area Telecommunications Service (WATS). See ‘‘ Managing trunks’’ on page 349 for more information.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1181 Automatic routing — general 20 AAR and ARS digit analysis default translations Your switch contains built-in AAR and ARS Digit Analysis Default Translations. These default translations are used for call processing whether or not AAR or ARS is enabled on your switch. Any 7-digit dialed string that begins with any number 2 through 9 is processed as an AAR call. Exceptions are listed in the ARS Digit Analysis Default Translations Table. The translations shown on the ARS Digit Analysis Default Translations table are displayed in sorted order (including additions) on each of the 8 possible ARS Digit Analysis Tables. NOTE: For service outside of North America, these defaults should be deleted. You can delete the defaults by entering change ARS analysis 0. Then use spaces to blank out all of the Dialed String entries. Table 13. ARS Digit Analysis Default Translations Total Digits Dialed String Min. Max. Route Pattern Call Type 011denyop 088denyop 01111denyop 00 2 2 deny op 01 9 17 deny iop 011 10 18 deny intl 1010XXX0 8 8 deny op 1010XXX0 18 18 deny op 1010XXX01 16 24 deny iop 1010XXX011 17 25 deny intl 1XXX555 11 11 deny fnpa 1XXX976 11 11 deny fnpa 18000555 11 11 deny fnpa 1809 11 11 deny fnpa Continued on next page
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1182 Automatic routing — general 20 Trunking facilities DEFINITY ECS can serve as an electronic tandem network (ETN). An ETN is a network of privately-owned trunk and switching facilities that provide a cost-effective alternative to long-distance calling between locations. Each switching facility in an ETN has a unique private-network office code consisting of 1–8 digits. Traveling Class Marks (TCM) represent the caller’s Facility Restriction Level (FRL) or the FRL of the caller’s access trunk group, and are sent with AAR and ARS numbers sent on ETNs. 1900555 11 11 deny fnpa 411 3 3 deny svc 555 7 7 deny hnpa 611 3 3 1 svc 811 3 3 1 svc 911 3 3 1 svc 976 7 7 deny hnpa N 7 7 2 hnpa 1N00 11 11 deny fnpa 1NX 11 11 deny fnpa Legend: N - 2 through 9 X - any digit (0 - 9) deny - deny fnpa - foreign number plan area (10-digit call) hnpa - home number plan area (7-digit call) intl - international iop - international operator op - operator svc - service Table 13. ARS Digit Analysis Default Translations — Continued Total Digits Dialed String Min. Max. Route Pattern Call Type Continued on next page
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1183 Automatic routing — general 20 Routing with ISDN and overlap sending You can turn on overlap sending to work on AAR and ARS calls that are routed over ISDN trunk groups. Overlap sending sends ISDN call-address information one digit at a time instead of all the address information going out in one block. This significantly decreases call setup time in countries with complex public-network numbering plans, and is most useful for tandemed calls. See ISDN-PRI Trunk Group and ISDN-BRI Trunk group screens for information on how to set up overlap sending. Interactions nAbbreviated Dialing The switch does not check the FRL on an AAR or ARS call that uses a privileged Abbreviated Dialing Group List. Related topics nAAR and ARS Digit Analysis Table nAAR and ARS Digit Conversion Table nAAR and ARS partitioning nARS Toll Table (ARS only) nClass of Restriction nDial Plan Record nFeature Access Codes nGeneralized Route Selection nLook-Ahead Routing nNode Number Routing nRoute Pattern nRemote Home Number Plan Area nTime of Day Routing Plan nToll Analysis (ARS only)
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1184 Barrier codes 20 Barrier codes A barrier code is a security code used with Remote Access to prevent unauthorized access to your system. Brief description Each barrier code must have a Class of Restriction (COR) and Class of Service (COS) assigned. Remote Access has inherent risks; it can lead to large-scale unauthorized long-distance use. To increase your system’s security use a 7-digit barrier code with Remote Access Barrier Code Aging. You can administer Remote Access Barrier Code Aging to: nLimit the length of time an access code remains valid and/or nLimit the number of times an access code can be used A barrier code automatically expires if an expiration date or number of accesses has exceeded the limits you set. If both a time interval and access limits are administered for a barrier code, the barrier code expires when one of the conditions is satisfied. You determine the barrier code length, the actual barrier code, and the barrier code expiration date on the Remote Access screen. You must administer expiration dates and access limits for each of the possible 10 barrier codes. If your system has more than 10 Remote Access users, they must share codes. When you no longer need a barrier code, remove it from the system. Barrier codes should be safeguarded both by you and their users. If you use barrier codes for outside calls, change them often. If barrier codes are administered, a special answer-back tone causes a calling modem to leave dial mode. A modem’s dialer is sometimes used to gain access (this tone also cancels echo suppressors in the network, preventing DTMF tones from breaking dial tone from a switch). Barrier codes can be used alone or with authorization codes. Use the status remote-access command to view the status of a Remote Access barrier code. NOTE: Barrier codes are not tracked by Call Detail Recording (CDR). Barrier codes are incoming access codes, whereas, authorization codes are primarily outgoing access codes. Related topics Refer to ‘‘ Remote Access’’ on page 1479 for more information.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1185 Bridged Call Appearance 20 Bridged Call Appearance Bridged Call Appearance allows single-line and multiappearance telephone users to have an appearance of another user’s primary extension number. The bridged call appearance can be used to originate, answer, and bridge onto calls to or from the other user’s primary extension number. An appearance of a telephone’s primary extension number at another telephone is called a bridged call appearance. A bridged call appearance can be used to originate, answer, or bridge onto an existing call to or from the primary telephone user’s extension number. On single-line telephones, Bridged Call Appearance is used by going off-hook. On multiappearance telephones, Bridged Call Appearance is used by going off-hook and pressing the bridged appearance button. In both cases, the user is then bridged onto the primary telephone’s extension number and can handle calls on that extension number. An incoming call rings the primary extension number’s telephone and all telephones that have a bridged call appearance of the telephone’s primary extension number. Each telephone is visually alerted for all bridged appearances on the telephone, but has the option of audible ringing. On multiappearance telephones, a bridged call appearance can be assigned to any 2-lamp button. It does not require the use of a regular call appearance. A bridged call appearance can be used just like a regular call appearance for most features. For example, Conference, Transfer, Hold, Drop, and Priority Calling can be used from a bridged appearance, just as they are used from a regular call appearance. You can administer a telephone with zero call appearances of its primary extension. In this way, a telephone can be administered to have only bridged appearances. Extension administrable buttons and lamps for multiappearance telephones You can administer the message lamp and some feature buttons to apply to a specified extension rather than the extension of the telephone they reside on. nYou can administer the message lamp to light when messages are waiting for the extension specified on the Station screen. In this way, the bridged user’s telephone can be set up to indicate when messages are waiting for the primary extension.
DEFINITY ECS Release 8.2 Administrator’s Guide 555-233-506 Issue 1.1 June 2000 Features and technical reference 1186 Bridged Call Appearance 20 nYou can administer the call forwarding all calls and call forwarding busy/don’t answer buttons to activate Call Forwarding for any extension that is on the telephone, even if this extension is a bridged appearance. In addition, you can administer the lamp associated with the call forwarding button to track the call forwarding status of any extension. In this way, a bridged user can activate or deactivate Call Forwarding for all primary and bridged appearances of the extension from the bridged appearance telephone, and the bridged appearance telephone shows the call forwarding status of the specified extension. nYou can administer the send all calls button to activate Send All Calls for any administered extension. The lamp associated with Send All Calls tracks the status of the administered extension. In this way, a bridged user can activate Send All Calls for the primary extension user. Considerations for single-line telephones nThe number of bridged call appearances allowed varies by system. See DEFINITY ECS System Description for those numbers. A bridging user cannot have more than one bridged appearance for a particular primary telephone. However, a multiappearance bridging user can have appearances of more than one analog telephone on their telephone (a multiappearance bridging user, by use of different buttons, can bridge onto several different primary telephones). nThe number of bridged appearances allowed on a multiappearance bridging user’s telephone is limited only by the number of 2-lamp buttons available on the telephone. nIf the primary single-line telephone is correctly administered, but not in service, calls can still be placed by the bridging users, and received on the bridged appearances of the telephone. The primary telephone can be out of service for several reasons, such as an unplugged telephone, a nonexistent telephone system technician busyout command, etc. nIf more than one user goes off-hook on a bridged appearance at the same time, only the user who was the first to go off-hook can dial. nIf a bridging user is not active on a call, and bridges onto the appearance of an active call, the user is bridged onto the active call. If a multiappearance bridging user is active on a call, and bridges onto the appearance of an active call, the previously selected call is dropped and the user is bridged onto the active call. nThe Privacy-Manual Exclusion feature can be activated by the bridging user only, while active on a call, to prevent accidental bridging of an active call.