Home > Toshiba > Communications System > Toshiba Stratagy 4/6/24 Installation And Maintenance Manual

Toshiba Stratagy 4/6/24 Installation And Maintenance Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Toshiba Stratagy 4/6/24 Installation And Maintenance Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 566 Toshiba manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL 
    SEPTEMBER 1994 
    PROGRAMMING SECTION 
    CHAPTER 2 
    HOW STRATAGY OPERATES  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TABLE OF CONTENTS 
    Chapter 2 
    - How Stratagy Operates 
    PARAGRAPH SUBJECT PAGE 
    I Introduction ________________________________________----------------------------------------------------------------- 2-j 
    2 
    Unique User IDS ________________________________________----------------------------------------------------------- 2-I 
    3 CalI Processing Control ________________________________________------------------------------------------------- 2-l 
    4 Types of User ID Mailboxes ________________________________________-------------------------------------------- 2-2 
    5 How Stratagy processes Movement Between User IDS ________________________________________-------- 2-2 
    6 
    How Stratagy processes User ID Mailboxes ________________________________________---------------------- 2-4 
    ‘ 
    FIGURE LIST 
    FIGURE TITLE PACE 
    2-l 
    Movement Between User IDS ________________________________________------------------------------------------ 2-3 
    2-2 
    User ID Mailbox Processing ________________________________________------------------------------------- --- ---- 2-5 
    2-i  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    CHAPTER 2 User ID 0: operator 
    User ID 411: directorv information - 
    HOW STRATAGY OPERATES 
    User ID 990: company greeting 
    User ID 991: instructions 
    User ID 994: fax tone detect 
    User ID 995: future deliverv 
    1 INTRODUCTION 
    Stratagy connects to standard analog extensions on your 
    telephone system. To your telephone system, Stratagy 
    looks like several ordinary telephones, not special digital 
    or “fancy” telephone sets. As a result, Stratagy waits for 
    its “telephone” or port to ring, with incoming calls directed 
    to Stratagy by your telephone system. Until a call comes 
    to Stratagy, your telephone system controls it. Once a 
    call rings on a Stratagy port, Stratagy answers and then 
    performs the actions it is programmed to perform. 
    Stratagy’s design revolves around User ID mailboxes. 
    How a User ID has been customized (see Chapter 4 for 
    details) determines what a caller hears and is able to do. 
    For example, if User ID 990 contains the initial company 
    greeting, a caller accessing User ID 990 hears the 
    greeting recorded as the greeting for User ID 990. 
    Call processing control in Stratagy involves User IDS, 
    chains, groups, menus, and a token programming 
    language. Using these control structures, you can define 
    virtually any call handling method. User ID 996: guest defaults 
    User ID 997: defaults box 
    User ID 998: direct message 
    User ID 999: System Administrator User ID 
    In addition, the following User ID provide templates for 
    fax functions: 
    User ID 7000 - 7014 
    3 CALL PROCESSING CONTROL 
    Call processing control in Stratagy goes beyond the 
    definition of unique User IDS. Stratagy provides four 
    additional structures: chains, groups, menus, and a token 
    programming language. These control structures allow 
    for more complex control, enabling you to define virtually 
    any call handling method. 
    Chains - Chains are how you tell Stratagy when one of 
    three conditions apply: Done, RNA (Ring No 
    Answer), or Busy. 
    This chapter discusses: 
    n Unique User IDS 
    n Call processing control 
    n Types of User ID mailboxes Done - The Done chain instructs Stratagy where to 
    send a caller who remains on the line after 
    leaving a message or after listening to an 
    announcement only mailbox. 
    n How Stratagy processes movement between User 
    IDS 
    n How Stratagy processes User ID mailboxes 
    2 UNIQUE USER IDS 
    Ring No Answer (RNA) - The Ring No Answer chain 
    instructs Stratagy where to send a caller when 
    there is a Ring No Answer at this User ID’s 
    extension. 
    Busy - The Busy chain instructs Stratagy where to 
    send a caller when this User ID’s extension is 
    Busy. 
    All of Stratagy’s User IDS are stored in a flatfile database. 
    As a result, every User ID in Stratagy must be unique; Groups - Groups control which User IDS a call may 
    you cannot have two User IDS with the same number. access. Each User ID mailbox user may be a 
    member of ULJ to four qrouos. To be able to access 
    Whenever a caller enters a User ID, Stratagy always another User ID, the caller User ID must share at 
    accesses the same User ID. The exception is single-digit least one group number with the currently accessed 
    menus. If you define a single-digit menu key (0 - 9), User ID. 
    Stratagy processes the Use; ID given for the menu key 
    rather than the User ID with the single digit number. For Menus - Menus define the destination a caller will be 
    example, if a caller were in User ID 100 and User ID 100 sent when he presses one of ten possible single-digit 
    had a single-digit key 0 mapped to User ID 222, then by menu options while listening to the greeting of this 
    pressing 0 the caller would be sent to User ID 222 rather mailbox. Menus can accommodate an unlimited 
    than to the operator defined by User ID 0. number of special applications. 
    Stratagy comes with several reserved User IDS. Only Token Programming Language - StratagY’s 
    User ID 999 cannot be assigned to another User ID programming language gives versatility to obtain 
    number: other features, such as fax on demand, message 
    2-1  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    waiting light control, and confirming digits entered by 
    a caller. A series of tokens instruct Stratagy what 
    actions to perform. 
    4 TYPES OF USER ID MAILBOXES 
    User IDS fall into one of several general categories, 
    based on how they are customized. 
    User - A typical User ID mailbox records messages from 
    callers. A user will periodically check the User ID for 
    messages, or be notified by a variety of automatic 
    notification methods. Typically, there is one user for 
    each User ID, although several User IDS may share 
    ‘ a single extension because the users themselves 
    share a single phone line. 
    Information - An information User ID mailbox does not 
    accept messages from callers. Instead, Stratagy 
    plays its greeting to callers in order to provide them 
    with information, such as the company’s hours of 
    operation and location. No real user or phone 
    extension corresponds to this type of User ID. 
    Control - A control User ID mailbox directs the flow of a 
    call. Typically, it interacts with the caller in some way, 
    then transfers the call to one or more additional User 
    IDS for further processing. For example, a User ID 
    might ask the caller to input his or her phone number. 
    If the phone number is 7 digits long, Stratagy 
    assumes it is valid and the User ID passes control to 
    a second User ID, which will make use of that phone 
    number in some way (such as faxing a document to 
    it). If the phone number is not 7 digits long, Stratagy 
    might transfer to a third User ID, which would be an 
    information box whose recording informs the caller 
    that the phone number was not the right length. The 
    User ID might then transfer control back to the 
    original User ID to give the caller another chance to 
    enter the correct number of digits. 
    5 HOW STRATAGY PROCESSES 
    MOVEMENT BETWEEN USER 
    IDS 
    Whenever a call rings a port on Stratagy, Stratagy 
    answers and begins processing the call starting at a 
    predefined User ID. After processing the initial User ID, 
    Stratagy continues processing by following a chain to the 
    next User ID. At any time, should a caller enter DTMF, 
    Stratagy translates the DTMF to a User ID and continues 
    processing at that User ID. Therefore, movement 
    between User IDS is accomplished automatically by 
    following chains or by DTMF entry. (And a third way: 
    Stratagy’s Token Programming Language.) How Stratagy processes movement between User IDS is 
    described in Figure 2-1. Reference the text below for 
    clarification. 
    The process described is the default setup in Stratagy. 
    For example, User ID 990 (company greeting) and User 
    ID 991 (instructions) are defaults; you can assign other 
    User ID mailboxes to perform these functions. In 
    addition, you may override any of the described 
    processing by changing the chain and User ID 
    definitions. 
    New Call - The process starts with an incoming call. 
    Stratagy directs the call to the greeting User ID. 
    Company Greeting User ID - Default: User ID 990). 
    The greeting User ID plays the opening greeting 
    (“Thank you for calling... “). Stratagy determines 
    whether the caller entered DTMF during the greeting. 
    H 
    n YES - Stratagy directs the call to that DTMF and 
    processes the User ID. It then follows the Done 
    chain of the User ID. If there is no Done chain for 
    this User ID, it follows the Done chain for the 
    greeting User ID. 
    NO - Stratagy directs the call as per the greeting 
    User ID 990’s Done chain to the instruction User 
    ID. 
    Instruction User ID - Default: User ID 991. The 
    instruction User ID plays the caller instruction 
    message, which is a menu of dialing choices (“To 
    reach... press...“). Stratagy determines whether the 
    caller entered DTMF during the message. 
    YES - Stratagy directs the call to that DTMF and 
    processes the User ID. It then follows the Done 
    chain of the User ID. If there is no Done chain for 
    this User ID, it follows the Done chain for the 
    greeting User ID. 
    n NO - Stratagy looks at the value of the Stratagy 
    System Configuration option d&&gate. 
    dtmf- gate - Stratagy determines if the Stratagy 
    System Configuration option dtmf_gate is TRUE. For 
    information on configuring dtmf-gate, see the 
    Installation section. 
    H YES - Stratagy prompts the caller to say “yes” to 
    the tone. If Stratagy detects any sound, Stratagy 
    transfers the call to User ID 0 (operator). If not, 
    Stratagy hangs up. 
    H NO - Stratagy transfers the call to User ID 0 
    (operator). 
    I 
    User ID 0 (Operator) - This is the end of the company 
    instructions User ID’s Done chain. 
    2-2  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    New Call 
    Greeting User ID 
    (default is User ID 990) 
    p Caller enters 
    DTMF “Thank you for calling...” 
    DONE Chain 
    Instruction User ID 
    (default is User ID 991) ‘I 
    DTMF 
    p Caller enters 
    DTMF Process the User ID 
    “To reach the person you are ) Does this User ID have a valid 
    calling, enter their extension Done chain? 
    number. 
    To reach an Operator, press 
    q or stay on the line.” pp\;JDDone chain of Instructions 
    Done chain 
    Follow the User ID 
    Done chain. 
    dtmf-gate 
    Is the configuration option 
    dtn-dgate 
    TRUE? 
    NO 1 
    User ID 0 I 
    NO 
    1 Proc(essekse$D 0 1 
    Hang Up 
    Figure 2-1 
    Movement Between User IDS 
    2-3  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    6 HOW STRATAGY PROCESSES 
    USER ID MAILBOXES 
    Stratagy processes a User ID mailbox based on: 
    H User ID mailbox field settings 
    H whether an Answer, Busy, or Ring No Answer 
    condition exists 
    The process is described in Figure 2-2. Reference the 
    text below for clarification. 
    Start - Stratagy directs the call to this User ID. 
    Do Not Disturb - Stratagy determines whether the User 
    ID mailbox field Do Not Disturb is ON. 
    H YES - Stratagy directs the call to the Ring No 
    Answer greeting and proceeds with the Ring No 
    Answer condition. 
    n NO - Stratagy determines whether Call 
    Screening is ON. 
    Call Screening - Stratagy determines if Screen Calls is 
    ON. 
    4 YES - Stratagy records the caller’s name and 
    then proceeds to dial the Extension. 
    H NO - Stratagy dials the Extension. 
    Evaluate Extension - Stratagy determines if the 
    Extension’s first character is @. 
    YES - Stratagy suppresses the normal process. 
    Stratagy processes the Token Programming 
    Language, then proceeds to the Ring No Answer 
    condition. If there is an error during processing, 
    Stratagy follows the Done chain of the greeting 
    User ID. 
    NO - Stratagy places the call on transfer hold. 
    Stratagy process the Token Programming 
    Language, then proceeds to the Answer, Busy, or 
    Ring No Answer condition, as appropriate. 
    Answer Condition - Stratagy processes the Answer 
    condition as follows: 
    1. ID Call - Stratagy determines if ID Call is YES. 
    n YES - Stratagy plays the user’s recorded name 
    and extension. If the recording does not exist, 
    Stratagy plays a tone. Stratagy proceeds to 
    Call Screening. 
    H NO - Stratagy proceeds to Call Screening. 
    2. Call Screening - Stratagy determines if Screen 
    Calls is ON. 
    n YES - Stratagy plays the name the caller 
    recorded. n NO - Stratagy connects the caller (step 4). 
    3. Play Caller’s Name. User Accepts or Rejects - 
    Stratagy plays “To accept... ‘I 
    n ACCEPTS CALL - User accepts call 
    (presses 1). Stratagy proceeds connect the 
    caller (step 4). 
    n REJECTS CALL - User rejects call (presses 
    2). Stratagy proceeds to the Ring No Answer 
    condition. 
    4. Connect the Caller - Stratagy connects the caller 
    and the user. 
    Busy Condition - Stratagy processes the Busy 
    condition a follows: 
    1. 
    2. 
    3. 
    4. 
    5. Busy Chain - Stratagy determines if the Busy 
    chain is defined. 
    n YES - Stratagy follows this User ID’s Busy 
    chain. 
    q NO - Stratagy proceeds to play the Busy 
    message. 
    Play Busy Message - Stratagy determines if 
    there is a custom busy message. 
    H YES - Stratagy plays the user’s custom Busy 
    message. 
    n NO - Stratagy plays the system Busy message. 
    Caller Response. Stratagy directs the call 
    depending upon the caller’s response. 
    HOLD - If the caller presses * to hold, Stratagy 
    starts a hold queue for this User ID. 
    Another User ID - If the caller enters another 
    User ID, Stratagy processes that User ID. 
    Nothing - If the caller does nothing, Stratagy 
    determines if Store Messages is YES. 
    Store Messages. Stratagy determines if Store 
    Messages is YES. 
    n YES - Stratagy records the caller’s message. 
    Then determines if there is a Copy Message 
    To. 
    n NO - Stratagy determines if there is a Copy 
    Message To. 
    Copy Messages To. Stratagy determines if Copy 
    Message To contains a valid User ID. 
    n YES - Stratagy copies/records that message to 
    that User ID. Stratagy then proceeds to the 
    User ID Done chain. 
    2-4  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    DO Not Disturb 
    - YES 
    Is Do Not Disturb ON? 
    Call Screening 
    Is Screen Calls ON? Record Caller Name 
    Evaluate Extension 
    Is the first 
    character “@‘I? 
    Transfer Hold 
    Process Token 
    Programming Language 
    (usually dial the extension). SUCCESSFUL 
    Programming Language 
    NOT SUCCESSFUL 
    Follow the Done chain of the 
    Greeting User ID (typically 991) 
    I Answer 
    If ID callee is YES, then 
    Stratagy plays the User ID’s 
    recorded name and extension. 
    Otherwise, Stratagy plays a 
    tone. 
    I NO v 
    Call Screening 
    Is Screen Calls ON? 
    I YES 
    I f Play Caller Name 
    I 
    User accepts or rejects call. 
    “To accept call, press 1. To 
    reject call, press 2 and hang 
    up.” NO 
    - 
    If the user presses 0 or does 
    nothing, Stratagy continues as 
    if it received a Ring No Answer 
    after dialing the extension. 
    Otherwise, continue. 
    I 
    I Connect the Caller 
    I+ L 
    Figure 2-2 
    User ID Mailbox Processing 
    + 
    Busv I 
    Otherwise, play either the 
    system busy message or the 
    custom busy message, per the 
    User ID’s configuration. 
    If the caller enters another 
    User ID, Stratagy starts 
    processing at that User ID. 
    If the caller pressesB to hold, 
    Stratagy starts a hold queue 
    for the User ID. 
    If the caller does nothing, 
    Stratagy continues. 
    I If the User ID’s RNA chain is 
    defined, then follow it. 
    Otherwise, continue. 
    Greeting 
    Store Messages 
    NO 
    !  ( Is StoyE3r 
    I Record Caller’s Message 
    I 
    Done Chain 
    If the User ID’s Done chain is 
    defined, follow it. 
    Otherwise, follow the Done 
    chain of the Instructions User 
    ID (typically 991). 
    2-5  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    H NO - Stratagy proceeds to the User ID Done 
    chain. 
    6. User ID Done Chain. Stratagy determines if the 
    User ID Done chain is defined. 
    H YES - Stratagy follows the User ID Done chain. 
    n NO - Stratagy follows the Done chain of the 
    User ID. 
    7. Instructions User ID Done Chain - Stratagy 
    follows the Done chain of the instructions User ID 
    (typically 991). 
    Ring No Answer Condition - Stratagy processes the 
    Ring No Answer condition as follows: 
    1. Ring No Answer Chain. Stratagy determines if 
    the Ring No Answer chain is defined. 
    H YES - Stratagy follows the User ID’s Ring No 
    Answer chain. 
    W NO - Stratagy plays the current greeting. 
    2. Play the Current Greeting. Stratagy determines if 
    there is a custom greeting. 
    n YES - Stratagy plays the user’s custom 
    greeting. 
    H NO - Stratagy plays the system greeting. 3. 
    4. 
    5. 
    6. Store Messages. Stratagy determines if Store 
    Messages is YES. 
    4 YES - Stratagy records the caller’s message. 
    Then determines if there is a Copy Message To 
    mailbox. 
    n NO - Stratagy determines if there is a Copy 
    Message To mailbox. 
    Copy Messages To. Stratagy determines if Copy 
    Message To contains a valid User ID. 
    H YES - Stratagy copies/records that message to 
    that User ID. Stratagy then proceeds to the 
    User ID Done chain. 
    n NO - Stratagy proceeds to the User ID Done 
    chain. 
    User ID Done Chain. Stratagy determines if this 
    User ID Done chain is defined. 
    n YES - Stratagy follows the User ID Done chain. 
    4 NO - Stratagy follows the Done chain of the 
    greeting User ID. 
    Instructions User ID Done Chain. Stratagy 
    follows the Done chain of the instructions User ID 
    (typically 991). 
    2-6  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    PROGRAMMING SECTION 
    CHAPTER 3 
    ACCESSING AND USING STRATAGY  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TABLE OF CONTENTS 
    Chapter 3 
    - Accessing and Using Stratagy 
    PARAGRAPH SUBJECT PAGE 
    1 
    Introduction ________________________________________----------------------------------------------------------------- 3-l 
    2 
    System St&up ________________________________________------------------------------------------------------------ 3-l 
    3 Accessing Stratagy ________________________________________------------------------------------------------------- 3-1 
    3.1 Local Access ________c_______________________________------------------------------------------------------------ 3-l 
    3.2 Remote Access ________________________________________--------------------------------------------------------- 3-2 
    4 
    Using the Stratagy System ________________________________________--------------------------------------------- 3-3 
    4.1 Navigating the System ------------- ____________________------------------------------------------------------- 3-3 
    4.2 Online Help Function ------------ ________________________________________-------------------------------------- 3-4 
    5 
    Using the Main Menu ________________________________________---------------------------------------------------- 3-4 
    6 
    Setting System Date and Time ________________________________________---------------------------------------- 3-7 
    7 Performing System Shutdown ________________________________________----------------------------------------- 3-7 
    FIGURE LIST 
    FIGURE TITLE ..PACE 
    3-1 Navigating the Stratagy System ________________________________________--------------------------------------- 3-3 
    3-2 
    Main Menu with Sample Data ________________________________________----------------------------------------- 3-4 
    TABLE LIST 
    TABLE 
    3-l 
    TITLE PAGE 
    Main Menu Fields ___________________L____________________--------------------------------------------------------- 3-5 
    3-i  
    						
    All Toshiba manuals Comments (0)

    Related Manuals for Toshiba Stratagy 4/6/24 Installation And Maintenance Manual