The document provides an overview of call centers and IPCC (Internet Protocol Contact Center) systems. It discusses the evolution of call centers from earlier generations to IP-based systems. It also summarizes the typical components and architecture of an IPCC system, including media servers, databases, and call flows. Key components include the UAP (Universal Access Platform) for call handling, CCS (Call Center Server) for call management, IVR (Interactive Voice Response) for automated services, and various media servers. The document outlines sample call flows for voice, email, fax, and SMS interactions with the IPCC system.
With 5G use cases placing more demanding requirements on the networks, Ericsson is strengthening its end-to-end mobile transport solutions by building on its radio expertise and adding best-in-class transport technologies from Juniper Networks and ECI Telecom.
Aura 7.0—What’s New? Avaya Aura 7.0 became available in August 2015 and we’re still getting to know the enhancements to the platform. From what David Lover has seen, those enhancements are beneficial to both the users and the administrators. In this presentation, David will provide his insight on the platform—covering what he sees as the biggest and most useful enhancements and how you can apply them in your environment to cut costs and increase support.
Introducing our 5G Platform for the first movers in 5G, the first completely end-to-end solution that combines core and radio solutions in 5G to enable new opportunities and use cases
With 5G use cases placing more demanding requirements on the networks, Ericsson is strengthening its end-to-end mobile transport solutions by building on its radio expertise and adding best-in-class transport technologies from Juniper Networks and ECI Telecom.
Aura 7.0—What’s New? Avaya Aura 7.0 became available in August 2015 and we’re still getting to know the enhancements to the platform. From what David Lover has seen, those enhancements are beneficial to both the users and the administrators. In this presentation, David will provide his insight on the platform—covering what he sees as the biggest and most useful enhancements and how you can apply them in your environment to cut costs and increase support.
Introducing our 5G Platform for the first movers in 5G, the first completely end-to-end solution that combines core and radio solutions in 5G to enable new opportunities and use cases
What exactly is a private 5G network?
A private 5G network is a local area network (LAN) that will use 5G technology to create a private network with unified connectivity, optimized services, and secure communication methods in a specific area.
In fact, the concept of a private 5G network has been around since the 2G/3G/4G era, and it is not new to us. A private network is a professional network that provides network signal coverage in a specific area to provide communication services to specific users.
In short, a private network is a dedicated network that provides network communication services for specific users. The difference between a public network and a private network is mainly that a public network serves the general public, while a private network serves specific objects.
This presentation briefly describes the Wi-Fi 6 Technology or the latest wi-fi: IEEE802.11ax which I have used at IIT Madras to present and explain my course work(reading assignment). here I have covered all the problems, solutions, and benefits of wi-fi 6, how Wi-Fi evolved, standards, security, advantages, and innovations.
Palo Alto Networks Next-Gen Firewall PANOS 5.0 integration guide with Cisco SecureACS 4 using VSA attributes.
the second section talks about how to integrate Yubikey with Palo Alto Networks firewall
Ericsson Distributed Cloud goes beyond NFV and Edge Computing. It brings to operators the best of telecom and cloud capabilities, placing the application where it’s needed the most (centrally, distributed or at the edge). It’s an open platform, with end-to-end orchestration, that allows operators to prepare their infrastructure to unlock at least 25% of the business potential of 5G use cases. Visit our page: www.ericsson.com/distributed-cloud
5G will give consumers higher smartphones speeds and fiber-like wireless connections to the home, and it will unlock exciting new IoT use case from immersive augmented reality to remote haptic-enabled surgery to connected cars and smarter cities. 5G will impact the entire mobile network and associated ecosystem, from devices to radio access to the mobile core and into the cloud. Ericsson 5G Plug-Ins are designed for the radio access network and leverage the technology innovations enabled by the award-winning Ericsson 5G Radio Test Bed and Ericsson 5G Radio Prototypes already deployed and in operator 5G field trials worldwide.
Learn more: http://www.ericsson.com/spotlight/networks/secure-app-coverage/5g-plug-ins
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...PositiveTechnologies
Mobile network operators are planning to invest heavily in coming years to implement the transition to stand-alone 5G. However, in likening to 5G with interconnected infrastructure, 5G SA is prone to protocol vulnerabilities that can allow the malicious actor to impersonate subscribers, disclose subscriber profiles and cause a denial of service (DoS).
What you'll learn:
- How to spot the various types of threats in the 5G stand-alone core
- Network misconfigurations that open doors to attacks on subscribers
- 5G SA protocol components that malicious actors actively target
- An effective security strategy for the avoidance of network disruption
What is SASE and How Can Partners Talk About it?QOS Networks
Security + SD-WAN is the next step in the network story. Customers today are keen to identify how to keep their ecosystems secure and business continuity intact. Join us as we discuss the SASE approach and how to have that conversation with your customers.
What exactly is a private 5G network?
A private 5G network is a local area network (LAN) that will use 5G technology to create a private network with unified connectivity, optimized services, and secure communication methods in a specific area.
In fact, the concept of a private 5G network has been around since the 2G/3G/4G era, and it is not new to us. A private network is a professional network that provides network signal coverage in a specific area to provide communication services to specific users.
In short, a private network is a dedicated network that provides network communication services for specific users. The difference between a public network and a private network is mainly that a public network serves the general public, while a private network serves specific objects.
This presentation briefly describes the Wi-Fi 6 Technology or the latest wi-fi: IEEE802.11ax which I have used at IIT Madras to present and explain my course work(reading assignment). here I have covered all the problems, solutions, and benefits of wi-fi 6, how Wi-Fi evolved, standards, security, advantages, and innovations.
Palo Alto Networks Next-Gen Firewall PANOS 5.0 integration guide with Cisco SecureACS 4 using VSA attributes.
the second section talks about how to integrate Yubikey with Palo Alto Networks firewall
Ericsson Distributed Cloud goes beyond NFV and Edge Computing. It brings to operators the best of telecom and cloud capabilities, placing the application where it’s needed the most (centrally, distributed or at the edge). It’s an open platform, with end-to-end orchestration, that allows operators to prepare their infrastructure to unlock at least 25% of the business potential of 5G use cases. Visit our page: www.ericsson.com/distributed-cloud
5G will give consumers higher smartphones speeds and fiber-like wireless connections to the home, and it will unlock exciting new IoT use case from immersive augmented reality to remote haptic-enabled surgery to connected cars and smarter cities. 5G will impact the entire mobile network and associated ecosystem, from devices to radio access to the mobile core and into the cloud. Ericsson 5G Plug-Ins are designed for the radio access network and leverage the technology innovations enabled by the award-winning Ericsson 5G Radio Test Bed and Ericsson 5G Radio Prototypes already deployed and in operator 5G field trials worldwide.
Learn more: http://www.ericsson.com/spotlight/networks/secure-app-coverage/5g-plug-ins
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...PositiveTechnologies
Mobile network operators are planning to invest heavily in coming years to implement the transition to stand-alone 5G. However, in likening to 5G with interconnected infrastructure, 5G SA is prone to protocol vulnerabilities that can allow the malicious actor to impersonate subscribers, disclose subscriber profiles and cause a denial of service (DoS).
What you'll learn:
- How to spot the various types of threats in the 5G stand-alone core
- Network misconfigurations that open doors to attacks on subscribers
- 5G SA protocol components that malicious actors actively target
- An effective security strategy for the avoidance of network disruption
What is SASE and How Can Partners Talk About it?QOS Networks
Security + SD-WAN is the next step in the network story. Customers today are keen to identify how to keep their ecosystems secure and business continuity intact. Join us as we discuss the SASE approach and how to have that conversation with your customers.
The current technology advancements have enabled Telephony system manufactures to Integrate IP with existing telephony networks and offer converged solution for more optimum utilization of organization's IT infrastructure as well as internet bandwidth. The paper proposes an analytical method for determining basic traffic characteristics of systems servicing multi-rate overflow traffic streams generated by a finite number of sources. In particular, we describe an optimum solution for the implementation of telephony system. Analytical results of blocking probability calculated using the presented methodology has been compared with the data obtained from the system simulation process.
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISEijcsit
ABSTRACT
The current technology advancements have enabled Telephony system manufactures to Integrate IP with existing telephony networks and offer converged solution for more optimum utilization of organization's IT infrastructure as well as internet bandwidth. The paper proposes an analytical method for determining basic traffic characteristics of systems servicing multi-rate overflow traffic streams generated by a finite number of sources. In particular, we describe an optimum solution for the implementation of telephony system. Analytical results of blocking probability calculated using the presented methodology has been compared with the data obtained from the system simulation process.
Worldwide, a large number of people interact with each other by means of online chatting. There has been a significant rise in the number of platforms, both social and professional, such as WhatsApp, Facebook, and Twitter, which allow people to share their experiences, views and knowledge with others. Sadly enough, with online communication getting embedded into our daily communication, incivility and misbehaviour has taken on many nuances from professional misbehaviour to professional decay. Generally flaming starts with the exchange of rude messages and comments, which in turn triggers to higher scale of flaming. To prevent online communication from getting downgraded, it is essential to keep away the hostile users from communication platforms. This paper presents a Security Detection Model and a tool which checks and prevents online flaming. It detects the presence of flaming while chatting or posting blogs, and censors swear words as well as blocks the users from flaming.
Crosscode Technologies Private Limited - Company profileacuser30
CROSSCODE Technologies is a telecom software and solutions company specializing in customer lifecycle management (CLM), call center and CTI technologies. With a core team consisting of professionals from the industry with a considerable amount of experience and expertise in various types of contact center implementations ranging from multi-location global BPOs running 1000+ seats to enterprise level customer care centers with complex back end integrations to enterprise wide ERP platforms like SAP, Siebel, SalesForce, Talisma or custom built solutions or with existing legacy PBX platforms like Avaya, Cisco, Siemens, Nortel or any other make.
CROSSCODE is catering to a diverse set of clients who are being serviced under long term managed service or annualized service agreements for 1 – 3 years. The domains that we cater to are, diverse, ranging from automobile dealers to healthcare majors, from BPO service providers to pharmaceutical service providers, from manufacturers to public utility corporations.
Voice over Internet Protocol (Voice over IP, VoIP and IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Internet telephony, broadband telephony, and broadband phone service specifically refer to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN).The steps and principals involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.
Executive SummaryThe purpose of this report is to design a moder.docxgitagrimston
Executive Summary
The purpose of this report is to design a modern efficient network solution that will benefit the Continuous Corporation’s global enterprise operations in the US, Canada and Mexico. As a division of a Fortune 500 manufacturer, Continuous Corporation currently handles the sales and marketing, finance and accounting, distribution and logistics of the packaging materials used in packaging cereal boxes, cigarette cartons, ice cream containers, and must report its diverse department’s results to the parent company.
Currently, Continuous Corporation does not have the infrastructure to link supply chain vendors with marketing and customer service, logistics, finance, and senior management. The solutions proposed within this report will expose senior management to a wide array of distributed network technologies that will provide manufacturing and distribution centers the ability to keep in close contact with sales and marketing, notifying them immediately of inventory availability. Finance and Accounting will have up-to-the-minute information on the financial health of this division. Logistics will have updates on the availability of trucking resources for fulfilling customer orders.
A major finding indicates that Continuous Corporation
is in need of replacing the time-shared mainframe computer and antiquated billing system that will no longer be supported by the corporate office. The IT department of Continuous Corporation is looking at designing and creating a cost efficient billing system internally that will extend throughout the United States, Canada and Mexico. The system will provide to the company a system entailing payment processing including credit card and electronic fund transfers, point-of-sale invoicing, sales management, revenue reporting, commission tracking for sales representatives, inventory management and will also support multiple languages.
As internal staff within the company, we are familiar with the current networking and have management onsite to reduce preliminary work. There will be no issues with hidden costs or legal problems and confidentiality will be adhered to per company’s policies. Costs will be lowered as we will provide services onsite at Continuous Corporation while designing the system. We will be able to provide a high quality system as we can provide one hundred percent of our time to this project which will reduce any delays.
This report presents recommendations that allow Continuous Corporation to remain successful for years to come.
About Ethernet and its Benefits to Continuous Corporation
Originally specified in the standard, IEEE 802.3, Ethernet is a transmission medium cable that is often used in local area networks (Rouse, Ethernet, 2006). Modern Ethernet allows many computers to connect to a central hub or router via a network
card. The use of Ethernet is fairly versatile as it can be used in many network topologies. Often referred to as the backbone of LANs, Ethernet is essentiall ...
This research work investigates and improves the performance of Voice over Internet Protocol (VoIP) traffic using IPV4 and IPV6 over WiMAX networks and the impact of various voice codec schemes and statistical distribution for Voice over Internet Protocol (VoIP) over WiMAX has been investigated in detail.
n the system layer all communication channels can be linked with interactive actions that aim for an optimisation of the customer experience, e.g. the IVR (Interactive Voice Response), ICC (Interactive Call Collector), Chatbots, Self-Services or QM measures.
This all is based on cognitive computing, on which the artificial intelligence used by telerion is built on.
In the telerion end-to-end solution it is out of the system layer that feedback can be given to a caller on the expected waiting time, while at the same time he is informed on alternative contact options through which his request can be accepted and handled faster.
2. l UAP: The U-SYS universal access platform (UAP8100 for short) is developed by Huawei
and is used for both narrowband and broadband access. It is the next generation product
of C&C08-Q and inherits features of C&C08-Q. The UAP8100 provides abundant media
resources and powerful networking capability. Therefore, it provides call access, agent,
and media resource functions for IPCC.
3.
4. l The part mainly introduces the concept of call center, the development step of call center,
the concept of IPCC, the typical service of IPCC.
5. l There is no fixed and definite concept for the call center. The initial definition of the call
center is a place where quantities of incoming calls are processed in a centralized way. The
definition of the call center is more definite after the emergence of the CTI technology.
l The definition of the call center is a system integration product with powerful
communication and data processing capabilities based on the CTI technology.
l The connotation and denotation of the call center are extended along with the
development of Internet technology. Besides the original telephony mode, the access
modes of the call center include voice, text, pictures, and so on. Meanwhile, the call center
can integrate the Web technology, thus implementing more powerful information
interaction function.
6. l First generation
p The customer call directly connect to some specified telephone, all of the calls are
answered by agents. This is the same as the normal call.
l Second generation
p Based on switch, there is ACD (Automatic Call Distribution) for call accessing. It can
provides the call queue and agent queue for call center. In this generation, there is
IVR (Interactive Voice Response). This is a very powerful function to call center.
l Third generation
p CTI (Computer & Telephony Integration) is the most important technology for call
center. After CTI, we can connect service computer to telecom communication
network
l Fourth generation
p Because of 3G and NGN network, we need to connect call center to IP network.
IPCC is based on soft-switch network, provides more capacity and more service.
7. l IPCC provides the DTMF, play prompt, record voice, IP agent and so on in PSTN/PLMN.
Except that, IPCC can provide play prompt, IP agent, play media(H.263,MPEG4) and so on
in NGN/3G network.
8. l The TopEng-IPCC is an intelligent device platform with personalized processing capability.
It can process many manual or automatic services such as processing complaints,
recommendations, consultations, call fee query, phone number query and integrated
information service. It provides powerful service creation capability so that operators can
create, modify and adjust services according to their actual requirements.
9. l The Huawei networked call center can distribute calls uniformly in the whole network or
among multiple isolated call centers. It implements the call distribution, resource and load
sharing within the whole network, thus realizing the target of “one point access, whole
network service”.
10. l Enterprise call centers (ECCs), namely, virtual call centers (VCCs), are created by enterprises
or organizations based on the public call center platform rent from operators. The call
center operator constructs one call center, creates VCCs for enterprises and allocates
resources (agents, automatic flows, and so on) to enterprises.
l A VCC has the following features:
p Compared with a conventional call center, the initial investment of a VCC,
especially the investment in device purchase, is lower.
p A VCC can easily be integrated with the IT platform of an enterprise or an
organization, so there is small amount of workload for customization.
p A VCC provides solutions for various levels, from the most economic and simplest
mode to the comprehensive CTI function, and each solution is easy to upgrade.
11. l This is an important extended function of IPCC, it provides users with such services as
reserved calls, mass calls, telephone advertisement (marketing) and telephone notification
of defaulting call fee.
l The automatic call function of the IPCC is implemented through the Outbound call
management system, and it can support the skill queue, IVR, e-mail and fax calls. Users
can, according to their own requirements, customize outgoing call tasks, including
outgoing call conditions and outgoing call contents. Once the outgoing call conditions are
met, the Outbound call management system can make automatic outgoing calls.
12. l The part mainly introduces the architecture, system components, functions of main
components of IPCC.
13. l The IPCC adopts the design that is independent from accessed media, so it has good
openness and extendibility. The system adopts the design concept of separating services
from the switching. The service layer and service control layer are separated from the
conventional network so that the service implementing layer also has good openness and
extendibility.
l The system is logically composed of four layers, that is, the media accessing layer, media
adapting layer, service supporting layer and service implementing layer.
14. l The media accessing layer supports the access of multiple media such as voice/fax, VoIP, Web and
e-mail and provides the lower-layer access function for the IPCC.
15. l Media adapting layer is responsible for adaptation for various call media. Speech calls, e-mail
calls and Web calls are processed to be unified calls so that various media can
communicate with the service supporting layer without the consideration of what types
the media are.
16. l Service supporting layer submits the requirements of the service on calls to the service
accessing layer through the media adapting layer, and implements the call control function
with the cooperation of the service application layer.
17. l Service application layer implements specific service application with the computer
network technology and the support of the service supporting layer, media adapting layer
and media accessing layer.
18. l UAP: (Universal Access Platform)it provides call access, agent, and media resource
functions for the call center.
l File Server: It stores the prompt voice , agent conversation voice and so on。
l Intess/ CSTA (Computer Supported Telecommunications Applications): The communication
protocol between UAP and CTI platform.
l CTI-LINK: (Computer & Telephony Integration Link )This is the communication bridge
between UAP and platform。
l ICDCOMM: (Intelligent Call Distribution Communication Service)This is the internal
communication protocol of CTI platform.
l CTI Server: (Computer & Telephony Integration Server) This is one type of media server in
IPCC, it supports the voice accessing.
l WebM: (Web Media Server) It provides Web interaction functions such as escorted
browsing and text chat, and WECC (Web Enabled Call Center)functions.
l MailM:(Email Media Server) It is responsible for processing e-mails sent by users to the
mailbox of the call center, that is, transferring the e-mails to specified agents, and finally
transferring back e-mail replies made by agents to users.
19. l CCS: (Call Center Server), the core of the IPCC, implements management of calls unrelated
to media. It provides a standard protocol interface for the lower layer. When various
media servers request the CCS for serving calls, the CCS provides call management
regardless what media servers are currently requesting.
l IVR: (Interactive Voice Response),it is responsible for solving and carrying out flow files
loaded to it. The flow files can be .gsl file which are customized with SCE software or
VXML files developed by Voice XML.The flow files can perform specific functions such as
automatic voice prompt and user information collection.
l Aplogic:(Application Logic Server),it provides data access proxy to some components of
the call center system. In the system, each Aplogic runs in the load sharing mode to ensure
the stability of database operations.
l UIDB: (User Interface Database) is a database specialized for the IPCC. It is responsible for
managing and maintaining customer information data and statistics data of various
systems.
l MCP: (Management Application Connection Proxy) It executes the message distribution
between client and CCS, manages the connection between client and CCS.
l iUAS: (Intelligent UNIX Application Server) It provides the access interface for database or
protocol. This is used for agent, web work flow, knowledge base and so on.
l SCDB: (Service Center Database)This is a specialized database for IPCC. It stores the
information for knowledge base, bulletin and so on, and provides the service application
authority for agent.
l DT Proxy: (Database Transition Proxy) This is a connection proxy for IPCC, such as billing
system.
20. l The part mainly introduces the call flow classification, the typical call flow of IPCC.
21.
22. l 1.The user hooks off and dials.
l 2.After receiving the call, the UAP sends a call establishing request to the CTI server.
l 4.After receiving the call, the CTI server sends a routing request to the CCS.
l 3.The CCS sends an acknowledgement to the CTI server.
l 5.After receiving the routing request, the CTI server sends an application to the IRC. According to
the system routing policy, the IRC checks the status of system resource occupation through the
CCS.
l 6.IRC delivers the CCS request to IVR, IVR plays prompt to user.
l 7.After hearing the prompt, user select 0 and forward the call to agent.
l 8.According to the system routing policy, the IRC checks the status of system resource occupation
through the CCS, judges out the routing result, and then returns the result to the CCS.
l 9.After receiving the routing result, the CCS returns an acknowledgment to the CTI server, notifying
it to schedule the call to the specified agent.
l 10.The CTI server sends a call notification to the agent, requesting for an acknowledgement.
l 11.The agent returns an acknowledgement to the CTI server.
l 12.The CTI server notifies the UAP of the start of the call, and then connects the call to the agent.
l 13.User and agent start talk with each other.
23. l 1.The user hooks off and dials.
l 2.After receiving the call, the UAP sends a call establishing request to the CTI server.
l 4.After receiving the call, the CTI server sends a routing request to the CCS.
l 3.The CCS sends an acknowledgement to the CTI server.
l 5.After receiving the routing request, the CTI server sends an application to the IRC.
According to the system routing policy, the IRC checks the status of system resource
occupation through the CCS.
l 6.IRC delivers the CCS request to IVR, IVR plays prompt to user.
l 7.After hearing the prompt, user select 1 and forward the call to billing system.
l 8. IVR executes the flow,sends the query request to DtProxy。
l 9. DtProxy sends request to billing system,billing system queries the bill。
l 10. Billing system sends the result to Dtproxy。
l 11. DtProxy sends the result to IVR。
l 12. IVR play the query result to user。
24. l 1.The MailM scans the mail box periodically.
l 2.The MailM saves the e-mail in the local server.
l 3.The MailM sends a routing request to the CCS.
l 4.After receiving the routing result, the CCS sends it to the MailM.
l 5.The MailM sends an e-mail to the routed agent, requesting for an acknowledgement.
l 6.The agent sends an acknowledgement to the MailM.
l 7.The MailM sends the e-mail to the private receiving e-mail box of the agent.
l 8.The E-mail Server sends a notification to the agent, and then processes the e-mail.
25. l 1.The IVR fax incoming process receives a fax.
l 2.The IVR fax incoming process sends a request to the database for the skill e-mail box
address.
l 3.The database returns the skill e-mail box address that corresponds to the fax index
number.
l 4.The IVR fax incoming process sends a request to the database for related SMTP
information.
l 5.The database returns the SMTP information.
l 6.The IVR automatically sends an e-mail to the skill e-mail box, attaching the *.tif file
generated on the FP.
l 7.An agent receives the fax (e-mail) and processes it. This step is the same as e-mail call
flow, please refer to e-mail call flow.
l 8.The agent sends the reply e-mail to the fax outgoing e-mail box.
l 9.The Change server checks the e-mail box periodically.
l 10.When the Change server detects an e-mail, it generates one or more *.tif files, saves
them into a specified directory, and then deletes the e-mail from the e-mail server.
l 11.The Change server stores related information (including the fax set number, the
absolute faxing path, and so on) into the database.
26. l 12.The Change server stores related information such as the bill into the database.
l 13.The IVR starts the fax outgoing process after a specified time segment to obtain the fax
outgoing record from the database.
l 14.The database returns the fax outgoing record.
l 15.The IVR fax outgoing process obtains the fax outgoing record to control the FP to send
faxes.
l 16.If the IVR fax outgoing process successfully sends a fax, it writes a bill into the database.
Then finish the process.
If the IVR fax outgoing process fails to send a fax, the corresponding records are updated
in the database. Then the process ends.
27. l 1. IVR executes the flow and gets the SM (short message), including calling party number,
called party number.
l 2.The IVR short message incoming process sends a request to the database for the skill e-mail
box address and SMTP address.
l 3.IVR converts the SM to e-mail, sends the e-mail to skill e-mail box.
l 4.MailM checks the e-mail box periodically, gets the e-mail.
l 5.MailM sends route request to CCS, CCS returns the result.
l 6. MailM gets the result, sends the request to specified agent.
l 7. Agent answers the request.
l 8. MailM send the e-mail to specified agent e-mail box.
l 9. Email Server sends message to agent and then handles the e-mail.
l 10. Agent receives the e-mail, sends the answer e-mail to agent’s private sent out e-mail
box.
l 11. MailM scans Email Server periodically, gets the answer e-mail, sends the e-mail to
message send out e-mail box.
l 12.IVR starts SM sent out flow, get the e-mail from send out e-mail box.
l 13.IVR converts the e-mail to SM, sends the SM to SMSC.