Home
>
Toshiba
>
Communications System
>
Toshiba Stratagy 4/6/24 Installation And Maintenance Manual
Toshiba Stratagy 4/6/24 Installation And Maintenance Manual
Have a look at the manual Toshiba Stratagy 4/6/24 Installation And Maintenance Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 566 Toshiba manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 TOKEN FUNCTION 1 Defined Tokens (continued) DEFINITION H( ) Hang-up process. Syntax: H&id) Where: uid Any valid User ID. Description: Defines the specified uid as the uid that Stratagy processes when it detects a hang-up condition. This is useful for performing cleanup and/or exit routines when a caller hangs up. If the User ID is omitted, Stratagy hangs up without processing the specified User ID. I( ) If conditional. Syntax: I(string,relationship,string,uid) Where: string Any quoted set of charaters, numbers, and/or variables. relationship Either >,
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 TOKEN FUNCTION ( Defined Tokens (continued) DEFINITION J( ) Receive fax. Syntax: J(fi/e, “string”) J (file, ” “, “tokens “) Where: file File name of the fax you want to receive. Any valid DOS file name. Use two backslashes \ to signify one backslash \. For example, to specify the file name C:\STRATAGYINEW.TXT, use C:\\STRATAGY\\NEW.TXT. If it consists of only numbers, it is assumed to be a User ID and the received fax is stored as a message. “string” DTMF digits representing the telephone number that should be dialed to connect to the fax device that will send the transmission. If it is the empty,string, i.e., “‘I, then Stratagy waits until a call rings into the appropriate fax port. ‘tokens” Actions Stratagy should take to properly connect the call to the fax port. For more information, see the T( ) token. Description: The J( ) token allows you to receive faxes as User ID messages or for later transmission with the T( ) token. Examples: J(C:\\FAXES\\FAXl ,““) Causes Stratagy to set up one of the fax modems to wait for a call and accept a fax called C:\FAXES\FAXI. This is useful for loading a fax into Stratagy. J(123, ““,“P(Gl)F-%FH”) Sets up a personal fax mail User ID that allows for one-call fax transmission. P(G1) Play “Start your fax machine at the tone” F Hook-flash to put the call on hold - Pause %F Dial the extension of the fax port being used H Hang-up (completes an unsupervised transfer) L( ) Switch system Syntax: L(language-file) language. Where: language-file File name in the Stratagy directory that represents a Strataagy system language file which has the DOS suffix .IDX. Description: Immediately changes the system prompts to use the specified file (usually the specified file’s name indicates the language). All system prompts change, including User mode prompts. Examples: L(ENGLISH) Uses the ENGLISH.IDX system prompt file in the C:\STRATAGY directory. L(SPANISH) Uses the SPANSIH.IDX system prompt file in the C:\STRATAGY directory. STRW.INST w-c Table 6-2 Token Programming Language Tokens (continued) 6-6
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 TOKEN FUNCTION ( Defined Tokens (continued) DEFINITION M( ) Audiotext menu. Syntax: M(Gn,count,de/ay) Where: Gn User ID’s greeting number (range: 1 - 7). count Number of times to play the greeting. delay Time (in 1 Oths of seconds) to wait after each saying of the greeting. Description: The M( ) token allows you to specify fast single-digit entry for audiotext menu selections. While Stratagy processes this token, it plays (or says) the specified greeting while waiting for a single DTMF digit to be pressed by the caller. As soon as the caller presses the single DTMF digit, Stratagy looks up the menu selection that matches and continues processing at the specified User ID. Therefore, this eliminates the normal delay for determining completed DTMF entry. Examples: M(Gl,2,20) Plays greeting 1 up to 2 times with a 2 second delay after each time the greeting plays, waiting for the caller to press a DTMF. n If the caller presses 5, Stratagy immediately continues processing at the User ID specified in Menu field 5. .. n If the caller makes no selection, Stratagy continues processing at the next token. H If the caller makes an invalid selection, Stratagy continues processing at the Done chain. 0( ) Timed on-hook. Syntax: O(tenths) Where: tenths Time in tenths of seconds. Description: An on-hook condition for the specified amount of time. Depending upon the value of tenths, you can effect a flash, or even a hang-up condition. This is useful for generating an intermediate hang-up condition during token processing without terminating the actual continued token processing. Example: O(60) Go on-hook for 6 seconds (60 + 10 = 6). Table 6-2 Token Programming Language Tokens (continued) 6-7
STRATAGY 4 / 6 / 2 4 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 TOKEN FUNCTION 1 DEFINITION Defined Tokens (continued) P( ) Play. Syntax: Prepeaf(ifem) Where: repeat Number of times to play the item. If omitted, defaults to 1. item Each item causes Stratagy to say specific information. The items are defined as follows: D Percentage of remaining disk space. Gn Greeting n of the current User ID. Gn, uid Greeting n of User ID uid. M Total number of messages and number of new messages for the current User ID. M, uid Total number of messages and number of new messages for the current User ID uid. R DTMF digits entered by a caller who has invoked relay paging (used only in the Notify record Method field). %Sn DTMF digits currently represented by the variable %Sn, where n is a number from 0 to 9. This is most effective for repeating the DTMF entered by a caller for confirmation. %Sn, N DTMF digits currently represented by the variable %Sn as a number where the range is assumed to be between 0 and 999 million. %Sn, D DTMF digits currently represented by the variable %Sn as a date, where the format is assumed to be either mmddyy (which assumes a year in the 1900s) or mmddyyyy. %Sn, T DTMF digits currently represented by the variable %Sn as a time of day, where the format is assumed to be hhmm. %Sn, $ DTMF digits currently represented by the variable %Sn as a dollar amount, where the last two digits are assumed to be cents. %Sn, F The same as %Sn, $ except Stratagy uses francs and centimes. %Sn, P The same as %Sn, $ except Stratagy uses pesos and centavos. U “Name and extension” recording for the current User ID. If there is no recoding, Stratagy says the User ID digits. U, uid “Name and extension” recording for the User ID uid. If there is no recoding, Stratagy says the User ID digits uid. v Digits in the Notify record’s Variable field. STRG”.,NST-Ne Table 6-2 Token Programming Language Tokens (continued) 6-8
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 TOKEN 1 FUNCTION 1 Defined Tokens (continued) DEFINITION P( 1 Play. (continued) Description: The P( ) token allows you to communicate information in a variety of ways to a caller or to a user when used in a Notify record’s Methodfield. While Stratagy is playing, the skip (*, #) and volume (8, 0) keys on the telephone work. Examples: P(G1) Stratagy plays greeting 1 for the current User ID. This allows you to record and play any prompt. P(O6261994,D) Stratagy says “June twenty-sixth, nineteen ninety- four.” P(O6261994,$) Stratagy says “Sixty-two thousand six hundred ninteen dollars and ninety-four cents.” P(O6261994,N) Stratagy says “Six million two hundred sixty-one thousand nine hundred ninety-four.” Q( ) Question and Syntax: Q(Gn...) answer. Where: Gn Greeting number (range: 1 - 7). . . . Additonal greetings to use. Description: The Q( ) token allows you to ask a caller a series of questions and store all the caller’s responses as a single message in the current User ID. Record each question as a greeting. Stratagy plays each question/greeting with a tone, records a response, and then plays the next queston/greeting until all the specified questions/greetings have been played. You can ask the caller up to 20 questions. To play more than 7 questions (using greetings 1 to 7 for the current User ID), use questions from other User IDS by specifying which User ID’s greeting to access with a # sign followed by the uid. For example, G7#123 would use greeting 7 from User ID 123. Example: Q(G1 ,G2 ,G3,G4,G5,G6,G7,G1#9000,G2,#9000) Stratagy asks 9 questions as recorded in the specified greetings, records 9 responses, and stores the responses as one message. Table 6-2 Token Programming Language Tokens (continued) 6-9
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 TOKEN 1 FUNCTION 1 Defined Tokens (continued) DEFINITION R( ) Read DTMF from Syntax: R(Gn,%Sm,de/ay) a caller. Where: Gn Greeting number for the current User ID (range 1 - 7). %Sm One of the %S storage variables (range: 0 - 9). delay Time in tenths of seconds to wait for DTMF after playing the greeting (range: 0 - 99). If omitted, defaults to 0. Description: The R( ) token allows you to obtain caller information while prompting the caller with the specified recorded greeting. The token plays the greeting specified for the current User ID and allows the caller to make DTMF entry which is stored in the specified %S variable. Stratagy interrupts the greeting as soon as the caller enters the first DTMF tone. If there is no caller DTMF entry, Stratagy initializes the %S variable to empty, i.e., “‘I. Example: To prompt and have a caller enter a telephone number and have Stratagy store that telephone number to be used later, you could: n Record in greeting 1: “Enter your telephone number. Finish by pressing the # sign.” n Use R(GI ,%S6,20), which: l Plays greeting 1. l Stores the caller’s entry in variable %S6. l Waits 2 seconds (20 + 10 = 2) for DTMF after playing the greeting. S( ) Serial port access. Syntax: S(port, “9, %Sn, “termination”,length, timeout) Where: port Logical serial port (1 or 2) mapped onto a physical port number by the Setup Utility configuration option serial-port1 for logical port 1 or serial-port2for logical port 2 (Section 2, /nsta//ation). “S” String sent out on the specified port. It may contain any alphanumeric characters, %S variables, and the following special characters: \A Attention (bell sound), or Ctrl + G \N Newline, or Ctrl + J \R Return, or Ctrl + M \T Tab, or Ctrl + I \ Backslash, the actual character %Sn One of the %S storage variables (range: 0 - 9), which stores any response from the serial port. If omitted, Stratagy will not wait for a response. “termination ” List of characters that defines when Stratagy should stop reading from the serial port for storing in the specified %Sn variable. If omitted, defaults to “IN\R” as specified under “S’. The terminating character, if any, will not be pat-t of %Sn. *Tm”.tNSIzo Table 6-2 Token Programming Language Tokens (continued) 6-l 0
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 TOKEN 1 FUNCTION 1 Defined Tokens (continued) DEFINITION S( ) Serial port access. (continued) length Maximum number of characters to expect as input on the serial port. If the maximum number of characters is received, processing continues immediately with whatever characters that were received placed in the %Sn variable. If this option is omitted, it defaults to the maximum length of %Sn (128 characters). timeout Maximum time (in 100 ms units) Stratagy waits for input on the serial port when reading into the %Sn variable. When the timeout expires, Stratagy continues processing with the next token. Whatever characters, if any, received up to that point are placed in the %Sn variable. If this option is omitted, the default is the value of the Setup Utility’s configuration option tmo-serial (Section 2, Installation). Description: The S( ) token gives Stratagy access to serial ports. By communicating over serial ports, Stratagy can access other computers and store and/or retrieve information from remote databases. Once an S( ) token has been executed, the serial port is locked for exclusive access by the current User ID. The lock is removed only when Stratagy finishes executing the User ID’s Extension field. This allows for several related S( ) tokens to be executed while the port is locked. To properly use this token, the physical serial port must have certain configuration parameters defined. These parameters are grouped together in the Stratagy Configuration Utility’s System Configuration options (Installation section, Chapter 5, “Configuring and Backing Up Stratagy”). T( ) Transmit fax. Syntax: T( file, “string” ) T( file, “tokens ” ) Where: file File name of the fax you want to transmit. Any valid DOS file name. Use two backslashes \ to signify one backslash \. For example, to specify the file name C:\STRATAGY\NEW.TXT, use C:\\STRATAGY\\NEW.TXT. “string” DTMF digits representing the telephone number that should be dialed to connect to the fax device that will accept the transmission. It may contain %S storage variables. If it is the empty string, i.e., “I’, then Stratagy waits until a call rings into the fax port. “tokens” Actions Stratagy should take to properly connect the call to the fax port. Typically it would be P(GI)F-%FH, which allows for one-call fax transmission. P(G1) Say “Stat-t your fax machine at the tone.” F Hook-flash to put the call on hold. - Pause (0.5 second). %F Dial the extension of the fax port being used. H Hang up (completes an unsupervised transfer). s,RO”.INST-m61121 Table 6-2 Token Programming Language Tokens (continued) 6-11
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 ‘ TOKEN 1 FUNCTION 1 Defined Tokens (continued) DEFINITION T( ) Transmit fax. (continued) Description: Performs fax transmissions to either a specified telephone number or to a connected call. For a two-call fax back, use the two option syntax. For a one-call fax on demand, use the three option syntax. If Stratagy has a free fax port available, transmission begins shortly on that port. Otherwise, the request will be queued for transmission along with any other such requests. Normally you will install your fax software so that if a transmission fails (for instance, if the remote fax is busy), then the request will be retried automatically at a later time, up to a maximum number of retries. Naturally, you must have installed and configured at least one fax/modem on Stratagy. Example: Suppose you obtained the caller’s fax number and stored it in %Si. Then to fax the specified file to that user, you might use: T(FAX.DCX,“S,%Sl”) FAX.DCX name of the file to transmit 9 dial 9 for an outside line pause2seconds %S; dial the DTMF digits stored in %Si V( ) Search for value. Syntax: V(file,field,item,field,%Sn) Where: file ASCII DOS file that is field comma-delimited and record-return delimited. field Number of the field in file (1 is the value of the field before the comma). item An alphanumeric string which may contain %S variables. %Sn One of the %S storage variables (range: 0 - 9). Description: The V( ) token searches the specified file, in the specified field, for the value given by item. If Stratagy finds the value, Stratagy stores the contents of the second field into variable %Sn. If Stratagy does not find the value, the token terminates and returns to the DONE state. W( ) Wait or pause Syntax: W(n) for event. WhV Wn,W Wn,T) Where: n Wait (pause) for n tenths of a second. n, P Wait up to n rings for a pager/beeper to answer. n, V Wait up to n rings for a voice to answer. n, T Wait up to n seconds to hear a dial tone. Description: General wait token that allows Stratagy to wait for confirmation of specific events. It is useful for confirming dial tone and for notification to confirm that the appropriate answer has occurred. If the event does not occur, Stratagy terminates all remaining token processing. SIRCIINSTW Table 6-2 Token Programming Language Tokens (continued) 6-l 2
, STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 TOKEN 1 FUNCTION Defined Tokens (continued) DEFINITION W( ) Wait or pause (continued) for event. Example: W(3,P) Wait up to 3 rings for a paging/beeping system to answer. You can use this to confirm that the paging company answered before playing DTMF to the paging company for pager notification of messages. +( 1 Addition. Syntax: +(%Sn,item) Where: =( ) Assignment. %Sn One of the %S storage variables (range: 0 - 9). item Positive or negative value or another %S variable. Description: Allows you to perform modifications to values for calculation and control. Ideal for controlling limits and loops. Syntax: =(%Sn,“item’? =(%Sn, “item’,start,end) Where: %Sn One of the %S storage variables (range: 0 - 9). item Any alphanumeric string. May contain %S variables. start Starting character position for assigning a portion of item. end Ending character position to assign when used with start. Description: Gives the specified storage variable the value specified. The value may be a sting or a numeric and should be quoted. The four- option syntax allows for substring assignments. Examples: =(%Sl ,“FRENCH”) Gives %Sl the value of “FRENCH”. =(%Sl ,“FREN CH”,3,5) Gives %Sl the value of ENC (E is the start character and C is the end character). =(%Sl ,%S2,1,3) where %S2 = 7530414 Extracts prefix of the telephone number in %S2 (the first through third number) and gives %Sl the value of 753. Table 6-2 Token Programming language Tokens (continued) 6-13
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 TOKEN 1 FUNCTION Defined Tokens (continued) ?( ) Exists in file. Syntax: ?(ifem,fi/e,uid) Where: DEFINITION item Any alphanumeric string. May also contain %S variables. file ASCII text file specified by a DOS file name. Use two backslashes \ to signify one backslash \. For example, to specify the file name C:\STRATAGY\NEW.TXT, use C:\\STRATAGY\\NEW.TXT. uid Valid User ID. Description: Searches the specified file for the specified item. Stratagy searches the file on a line-by-line basis and the item is found when it matches an entire line within the file. If the item is found, processing continues at the User ID specified; otherwise, processing continues with the next token. One use of this token is to control the use of a fax-on-demand feature. If you find that someone is having a document faxed repeatedly to a phone number (perhaps the phone number of someone who does not want your fax), you can enter such numbers into a file, then program Stratagy to check an entered fax number against those in the file and, if it’s found,‘ branch to a User ID which plays a greeting saying that the entered phone number is invalid and then hang up. If the entered number were not found in the file, then processing would continue normally and the fax would be sent to the requester. c( ) Start incremental fax. Syntax: C( ‘Wring’J Where: string DTMF digits representing the telephone number that should be dialed. It may contain %S variables. If it is the empty string, i.e., ” ‘I, then Stratagy waits until a call rings into the fax port. Description: Allows you to have a caller request multiple FAX documents and then to transmit the requested documents with one call. The ( ) token. To FAX multiple documents, first initiate the process with this token and as the caller requests faxes, add the requested document using the >( ) token. The fax is sent automatically after the caller hangs up. 4 ) Add incremental fax. Syntax: >( “fi/e’? Where: file DOS file name of the FAX you want to transmit. Any valid DOS file name. Use two backslashes \ to signify one backslash \. For example, to specify the file name C:\STRATAGY\NEW.TXT, use C:\\STRATAGY\\NEW.TXT. Description: Allows you to transmit more than one requested document with one call. Before using this token, you must first start incremental faxing with the