Home > Lucent Technologies > Communications System > Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 413 Lucent Technologies manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1718
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1177 Automatic Number Identification 
    20
    Related topics
    Refer to ‘‘
    Trunk Group’’ on page 980 for information about setting Inband ANI 
    on the trunk group form.
    Outgoing Automatic Number Identification
    Outgoing automatic number identification (ANI) applies to outgoing Russian  
    multi-frequency (MF) ANI, R2-MFC ANI , and Spain  Multi Frequency Espana 
    (MFE) ANI trunks only.
    Use Outgoing ANI to specify the type of ANI to send on outgoing calls. You can 
    define MF ANI (the calling party number, sent via multifrequency signaling) 
    prefixes by class of restriction. This allows a switch to send different ANIs to 
    different central offices.
    For a tandem call that uses different types of incoming and outgoing trunks, the 
    switch uses: 
    nthe incoming trunk’s COR -assigned call type for Russian or R2-MFC 
    outgoing trunks 
    nARS call types for MFE outgoing trunks
    Interactions
    nAttendant Console
    If an attendant extends a call, the attendant’s COR is used to select ANI.
    nAuthorization Codes
    The authorization code COR is not used to select the ANI. The extension’s 
    ANI is used if an extension originates the call, and the ANI for the switch is 
    used if the originating endpoint is an incoming trunk.
    nBridged Call Appearance
    A call from a bridged call appearance uses the ANI of the primary 
    extension.
    nCall Vectoring
    The ANI of the originating party is used, not the ANI of the call vector, 
    when a call vectoring route-to command routes a call over an outgoing 
    trunk. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1178 Automatic routing — general 
    20
    nDistributed Communications System (DCS)
    In a DCS, the ANI sent to the CO is determined by the ANI for PBX on 
    PBX_B, but the category sent to the CO is determined by the Category for 
    MF ANI field on the Class of Restriction screen for the incoming DCS 
    trunk or by the type of call.
    nExpert Agent Selection (EAS)
    The EAS agent’s login extension and COR is used to determine ANI.
    nHunt Groups and Automatic Call Distribution (ACD) Splits
    The phone’s extension and COR is used to determine ANI for a hunt group 
    or ACD split.
    nMultimedia Call Handling (MMCH)
    For call origination, multimedia complexes use the COR assigned to their 
    phones.
    nPersonal Station Access (PSA)
    For ANI, the PSA extension and COR overrides the phone’s extension and 
    COR.
    nRemote Access
    A remote access barrier code COR is not used for ANI. The extension’s 
    ANI is used if an extension originates the call, and the ANI for the switch is 
    used if the originating endpoint is an incoming trunk.
    Related topics
    Refer to ‘‘
    Displaying ANI calling party information’’ on page 122 for instructions 
    on setting up ANI display in the U.S.
    Refer to ‘‘
    Multifrequency Signaling’’ on page 1448 for more information on 
    signaling.
    Refer to ‘‘
    Class of Restriction’’ on page 1313 for more information on Class of 
    Restriction. 
    Automatic routing — general
    DEFINITY ECS automatically routes outgoing calls using the most preferred 
    (normally the least expensive) route available at the time the call is placed. 
    Generally, Automatic Alternate Routing (AAR) routes calls over a private 
    network and Automatic Route Selection (ARS) routes calls using the public 
    network numbering plan. However, both AAR and ARS support public and 
    private networks.  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1179 Automatic routing — general 
    20
    Figure 55 shows you an overview of automatic routing. 
    Figure 55. Automatic Routing Figure Notes
    1. Input from phone, public network 
    trunk, or private network trunk
    2. Analyze digits to determine address 
    type (First Digit Table) 
    3. Direct to AAR/ARS
    4. Direct to Uniform Dial Plan (UDP)
    5. Analyze digits using UDP to determine 
    route
    6. Delete and insert digits (AAR and ARS 
    Digit Conversion Tables)7. Terminate call at phone
    8. Analyze digits (AAR and ARS 
    Digit Analysis Tables) and 
    determine route pattern (Route 
    Pattern, Node Number Routing, 
    Extended Trunk Access screens)
    9. Select outgoing trunk group and 
    delete and insert digits
    10. Output to public network trunk 
    or private network trunk 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1180 Automatic routing — general 
    20
    AAR
    AAR routes calls over private networks. When a user dials the AAR feature 
    access code (normally 8 in North America) and phone number, AAR selects the 
    least expensive route for the call in the private network and performs any digit 
    conversion. If the first-choice route is not available, another route is chosen 
    automatically. 
    AAR routes private-network numbers, public-network numbers, service codes, an 
    international number, operator access code, or an operator-assisted dialing 
    number. AAR routes calls route as far as possible over the private network, and 
    then accesses the public network. This saves long-distance charges and allows you 
    to use your private network as much as possible.
    ARS
    ARS routes calls over the public network. When a user dials the ARS feature 
    access code (normally 9 in the US and 0 outside of the US) and phone number, 
    ARS selects the least expensive route for the call when there are one or more 
    long-distance carriers or services. 
    ARS, like AAR, routes private-network numbers, public-network numbers, 
    service codes, an international number, operator access code, or an 
    operator-assisted dialing number, and also routes to Inter-exchange carriers (IXC). 
    These are your long-distance providers. 
    You can route ARS calls to a variety of types of public-network and 
    private-network trunk groups including Central Office (CO), Foreign Exchange 
    (FX), Integrated Services Digital Network (ISDN), Tie, and Wide Area 
    Telecommunications Service (WATS). See ‘‘
    Managing trunks’’ on page 349 for 
    more information.  
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1181 Automatic routing — general 
    20
    AAR and ARS digit analysis default 
    translations
    Your switch contains built-in AAR and ARS Digit Analysis Default Translations. 
    These default translations are used for call processing whether or not AAR or 
    ARS is enabled on your switch. 
    Any 7-digit dialed string that begins with any number 2 through 9 is processed as 
    an AAR call. Exceptions are listed in the ARS Digit Analysis Default Translations 
    Table. The translations shown on the ARS Digit Analysis Default Translations
     
    table are displayed in sorted order (including additions) on each of the 8 possible 
    ARS Digit Analysis Tables.
    NOTE:
    For service outside of North America, these defaults should be deleted. You 
    can delete the defaults by entering 
    change ARS analysis 0. Then use 
    spaces to blank out all of the Dialed String entries.
    Table 13. ARS Digit Analysis Default Translations
    Total Digits
    Dialed String Min. Max. Route Pattern Call Type
    011denyop
    088denyop
    01111denyop
    00 2 2 deny op
    01 9 17 deny iop
    011 10 18 deny intl
    1010XXX0 8 8 deny op
    1010XXX0 18 18 deny op
    1010XXX01 16 24 deny iop
    1010XXX011 17 25 deny intl
    1XXX555 11 11 deny fnpa
    1XXX976 11 11 deny fnpa
    18000555 11 11 deny fnpa
    1809 11 11 deny fnpa
    Continued on next page 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1182 Automatic routing — general 
    20
    Trunking facilities
    DEFINITY ECS can serve as an electronic tandem network (ETN). An ETN is a 
    network of privately-owned trunk and switching facilities that provide a 
    cost-effective alternative to long-distance calling between locations. Each 
    switching facility in an ETN has a unique private-network office code consisting 
    of 1–8 digits.
    Traveling Class Marks (TCM) represent the caller’s Facility Restriction Level 
    (FRL) or the FRL of the caller’s access trunk group, and are sent with AAR and 
    ARS numbers sent on ETNs. 1900555 11 11 deny fnpa
    411 3 3 deny svc
    555 7 7 deny hnpa
    611 3 3 1 svc
    811 3 3 1 svc
    911 3 3 1 svc
    976 7 7 deny hnpa
    N 7 7 2 hnpa
    1N00 11 11 deny fnpa
    1NX 11 11 deny fnpa
    Legend:
    N - 2 through 9
    X - any digit (0 - 9)
    deny - deny
    fnpa - foreign number plan area (10-digit call)
    hnpa - home number plan area (7-digit call)
    intl - international
    iop - international operator
    op - operator
    svc - service
    Table 13. ARS Digit Analysis Default Translations — Continued
    Total Digits
    Dialed String Min. Max. Route Pattern Call Type
    Continued on next page 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1183 Automatic routing — general 
    20
    Routing with ISDN and overlap sending
    You can turn on overlap sending to work on AAR and ARS calls that are routed 
    over ISDN trunk groups. Overlap sending sends ISDN call-address information 
    one digit at a time instead of all the address information going out in one block. 
    This significantly decreases call setup time in countries with complex 
    public-network numbering plans, and is most useful for tandemed calls. See 
    ISDN-PRI Trunk Group and ISDN-BRI Trunk group screens for information on 
    how to set up overlap sending.
    Interactions
    nAbbreviated Dialing
    The switch does not check the FRL on an AAR or ARS call that uses a 
    privileged Abbreviated Dialing Group List.
    Related topics
    nAAR and ARS Digit Analysis Table
    nAAR and ARS Digit Conversion Table
    nAAR and ARS partitioning
    nARS Toll Table (ARS only)
    nClass of Restriction 
    nDial Plan Record
    nFeature Access Codes
    nGeneralized Route Selection
    nLook-Ahead Routing
    nNode Number Routing
    nRoute Pattern
    nRemote Home Number Plan Area
    nTime of Day Routing Plan
    nToll Analysis (ARS only) 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1184 Barrier codes 
    20
    Barrier codes
    A barrier code is a security code used with Remote Access  to prevent 
    unauthorized access to your system.
    Brief description
    Each barrier code must have a Class of Restriction (COR) and Class of Service 
    (COS) assigned. Remote Access has inherent risks; it can lead to large-scale 
    unauthorized long-distance use. To increase your system’s security use a 7-digit 
    barrier code with Remote Access Barrier Code Aging. You can administer 
    Remote Access Barrier Code Aging to:
    nLimit the length of time an access code remains valid and/or
    nLimit the number of times an access code can be used
    A barrier code automatically expires if an expiration date or number of accesses 
    has exceeded the limits you set. If both a time interval and access limits are 
    administered for a barrier code, the barrier code expires when one of the 
    conditions is satisfied.
    You determine the barrier code length, the actual barrier code, and the barrier code 
    expiration date on the Remote Access screen. You must administer expiration 
    dates and access limits for each of the possible 10 barrier codes. If your system 
    has more than 10 Remote Access users, they must share codes.
    When you no longer need a barrier code, remove it from the system. Barrier codes 
    should be safeguarded both by you and their users. If you use barrier codes for 
    outside calls, change them often.
    If barrier codes are administered, a special answer-back tone causes a calling 
    modem to leave dial mode. A modem’s dialer is sometimes used to gain access 
    (this tone also cancels echo suppressors in the network, preventing DTMF tones 
    from breaking dial tone from a switch). Barrier codes can be used alone or with 
    authorization codes.
    Use the 
    status remote-access command to view the status of a Remote Access 
    barrier code.
    NOTE:
    Barrier codes are not tracked by Call Detail Recording (CDR). Barrier codes 
    are incoming access codes, whereas, authorization codes are primarily 
    outgoing access codes.
    Related topics
    Refer to ‘‘
    Remote Access’’ on page 1479 for more information. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1185 Bridged Call Appearance 
    20
    Bridged Call Appearance
    Bridged Call Appearance allows single-line and multiappearance telephone users 
    to have an appearance of another user’s primary extension number. The bridged 
    call appearance can be used to originate, answer, and bridge onto calls to or from 
    the other user’s primary extension number.
    An appearance of a telephone’s primary extension number at another telephone is 
    called a bridged call appearance. A bridged call appearance can be used to 
    originate, answer, or bridge onto an existing call to or from the primary telephone 
    user’s extension number.
    On single-line telephones, Bridged Call Appearance is used by going off-hook. 
    On multiappearance telephones, Bridged Call Appearance is used by going 
    off-hook and pressing the bridged appearance button. In both cases, the user is 
    then bridged onto the primary telephone’s extension number and can handle calls 
    on that extension number.
    An incoming call rings the primary extension number’s telephone and all 
    telephones that have a bridged call appearance of the telephone’s primary 
    extension number. Each telephone is visually alerted for all bridged appearances 
    on the telephone, but has the option of audible ringing.
    On multiappearance telephones, a bridged call appearance can be assigned to any 
    2-lamp button. It does not require the use of a regular call appearance.
    A bridged call appearance can be used just like a regular call appearance for most 
    features. For example, Conference, Transfer, Hold, Drop, and Priority Calling can 
    be used from a bridged appearance, just as they are used from a regular call 
    appearance.
    You can administer a telephone with zero call appearances of its primary 
    extension. In this way, a telephone can be administered to have only bridged 
    appearances.
    Extension administrable buttons and lamps for 
    multiappearance telephones
    You can administer the message lamp and some feature buttons to apply to a 
    specified extension rather than the extension of the telephone they reside on.
    nYou can administer the message lamp to light when messages are waiting 
    for the extension specified on the Station screen. In this way, the bridged 
    user’s telephone can be set up to indicate when messages are waiting for 
    the primary extension. 
    						
    							DEFINITY ECS Release 8.2
    Administrator’s Guide  555-233-506  Issue 1.1
    June 2000
    Features and technical reference 
    1186 Bridged Call Appearance 
    20
    nYou can administer the call forwarding all calls and call forwarding 
    busy/don’t answer buttons to activate Call Forwarding for any extension 
    that is on the telephone, even if this extension is a bridged appearance. In 
    addition, you can administer the lamp associated with the call forwarding 
    button to track the call forwarding status of any extension. In this way, a 
    bridged user can activate or deactivate Call Forwarding for all primary and 
    bridged appearances of the extension from the bridged appearance 
    telephone, and the bridged appearance telephone shows the call forwarding 
    status of the specified extension.
    nYou can administer the send all calls button to activate Send All Calls for 
    any administered extension. The lamp associated with Send All Calls 
    tracks the status of the administered extension. In this way, a bridged user 
    can activate Send All Calls for the primary extension user.
    Considerations for single-line telephones
    nThe number of bridged call appearances allowed varies by system. See 
    DEFINITY ECS System Description for those numbers. A bridging user 
    cannot have more than one bridged appearance for a particular primary 
    telephone. However, a multiappearance bridging user can have 
    appearances of more than one analog telephone on their telephone (a 
    multiappearance bridging user, by use of different buttons, can bridge onto 
    several different primary telephones). 
    nThe number of bridged appearances allowed on a multiappearance bridging 
    user’s telephone is limited only by the number of 2-lamp buttons available 
    on the telephone.
    nIf the primary single-line telephone is correctly administered, but not in 
    service, calls can still be placed by the bridging users, and received on the 
    bridged appearances of the telephone. The primary telephone can be out of 
    service for several reasons, such as an unplugged telephone, a nonexistent 
    telephone system technician busyout command, etc.
    nIf more than one user goes off-hook on a bridged appearance at the same 
    time, only the user who was the first to go off-hook can dial.
    nIf a bridging user is not active on a call, and bridges onto the appearance of 
    an active call, the user is bridged onto the active call. If a multiappearance 
    bridging user is active on a call, and bridges onto the appearance of an 
    active call, the previously selected call is dropped and the user is bridged 
    onto the active call.
    nThe Privacy-Manual Exclusion feature can be activated by the bridging 
    user only, while active on a call, to prevent accidental bridging of an active 
    call. 
    						
    All Lucent Technologies manuals Comments (0)

    Related Manuals for Lucent Technologies DEFINITY Enterprise Communications Server Release 8.2 Instructions Manual