SlideShare a Scribd company logo
l UAP: The U-SYS universal access platform (UAP8100 for short) is developed by Huawei 
and is used for both narrowband and broadband access. It is the next generation product 
of C&C08-Q and inherits features of C&C08-Q. The UAP8100 provides abundant media 
resources and powerful networking capability. Therefore, it provides call access, agent, 
and media resource functions for IPCC.
l The part mainly introduces the concept of call center, the development step of call center, 
the concept of IPCC, the typical service of IPCC.
l There is no fixed and definite concept for the call center. The initial definition of the call 
center is a place where quantities of incoming calls are processed in a centralized way. The 
definition of the call center is more definite after the emergence of the CTI technology. 
l The definition of the call center is a system integration product with powerful 
communication and data processing capabilities based on the CTI technology. 
l The connotation and denotation of the call center are extended along with the 
development of Internet technology. Besides the original telephony mode, the access 
modes of the call center include voice, text, pictures, and so on. Meanwhile, the call center 
can integrate the Web technology, thus implementing more powerful information 
interaction function.
l First generation 
p The customer call directly connect to some specified telephone, all of the calls are 
answered by agents. This is the same as the normal call. 
l Second generation 
p Based on switch, there is ACD (Automatic Call Distribution) for call accessing. It can 
provides the call queue and agent queue for call center. In this generation, there is 
IVR (Interactive Voice Response). This is a very powerful function to call center. 
l Third generation 
p CTI (Computer & Telephony Integration) is the most important technology for call 
center. After CTI, we can connect service computer to telecom communication 
network 
l Fourth generation 
p Because of 3G and NGN network, we need to connect call center to IP network. 
IPCC is based on soft-switch network, provides more capacity and more service.
l IPCC provides the DTMF, play prompt, record voice, IP agent and so on in PSTN/PLMN. 
Except that, IPCC can provide play prompt, IP agent, play media(H.263,MPEG4) and so on 
in NGN/3G network.
l The TopEng-IPCC is an intelligent device platform with personalized processing capability. 
It can process many manual or automatic services such as processing complaints, 
recommendations, consultations, call fee query, phone number query and integrated 
information service. It provides powerful service creation capability so that operators can 
create, modify and adjust services according to their actual requirements.
l The Huawei networked call center can distribute calls uniformly in the whole network or 
among multiple isolated call centers. It implements the call distribution, resource and load 
sharing within the whole network, thus realizing the target of “one point access, whole 
network service”.
l Enterprise call centers (ECCs), namely, virtual call centers (VCCs), are created by enterprises 
or organizations based on the public call center platform rent from operators. The call 
center operator constructs one call center, creates VCCs for enterprises and allocates 
resources (agents, automatic flows, and so on) to enterprises. 
l A VCC has the following features: 
p Compared with a conventional call center, the initial investment of a VCC, 
especially the investment in device purchase, is lower. 
p A VCC can easily be integrated with the IT platform of an enterprise or an 
organization, so there is small amount of workload for customization. 
p A VCC provides solutions for various levels, from the most economic and simplest 
mode to the comprehensive CTI function, and each solution is easy to upgrade.
l This is an important extended function of IPCC, it provides users with such services as 
reserved calls, mass calls, telephone advertisement (marketing) and telephone notification 
of defaulting call fee. 
l The automatic call function of the IPCC is implemented through the Outbound call 
management system, and it can support the skill queue, IVR, e-mail and fax calls. Users 
can, according to their own requirements, customize outgoing call tasks, including 
outgoing call conditions and outgoing call contents. Once the outgoing call conditions are 
met, the Outbound call management system can make automatic outgoing calls.
l The part mainly introduces the architecture, system components, functions of main 
components of IPCC.
l The IPCC adopts the design that is independent from accessed media, so it has good 
openness and extendibility. The system adopts the design concept of separating services 
from the switching. The service layer and service control layer are separated from the 
conventional network so that the service implementing layer also has good openness and 
extendibility. 
l The system is logically composed of four layers, that is, the media accessing layer, media 
adapting layer, service supporting layer and service implementing layer.
l The media accessing layer supports the access of multiple media such as voice/fax, VoIP, Web and 
e-mail and provides the lower-layer access function for the IPCC.
l Media adapting layer is responsible for adaptation for various call media. Speech calls, e-mail 
calls and Web calls are processed to be unified calls so that various media can 
communicate with the service supporting layer without the consideration of what types 
the media are.
l Service supporting layer submits the requirements of the service on calls to the service 
accessing layer through the media adapting layer, and implements the call control function 
with the cooperation of the service application layer.
l Service application layer implements specific service application with the computer 
network technology and the support of the service supporting layer, media adapting layer 
and media accessing layer.
l UAP: (Universal Access Platform)it provides call access, agent, and media resource 
functions for the call center. 
l File Server: It stores the prompt voice , agent conversation voice and so on。 
l Intess/ CSTA (Computer Supported Telecommunications Applications): The communication 
protocol between UAP and CTI platform. 
l CTI-LINK: (Computer & Telephony Integration Link )This is the communication bridge 
between UAP and platform。 
l ICDCOMM: (Intelligent Call Distribution Communication Service)This is the internal 
communication protocol of CTI platform. 
l CTI Server: (Computer & Telephony Integration Server) This is one type of media server in 
IPCC, it supports the voice accessing. 
l WebM: (Web Media Server) It provides Web interaction functions such as escorted 
browsing and text chat, and WECC (Web Enabled Call Center)functions. 
l MailM:(Email Media Server) It is responsible for processing e-mails sent by users to the 
mailbox of the call center, that is, transferring the e-mails to specified agents, and finally 
transferring back e-mail replies made by agents to users.
l CCS: (Call Center Server), the core of the IPCC, implements management of calls unrelated 
to media. It provides a standard protocol interface for the lower layer. When various 
media servers request the CCS for serving calls, the CCS provides call management 
regardless what media servers are currently requesting. 
l IVR: (Interactive Voice Response),it is responsible for solving and carrying out flow files 
loaded to it. The flow files can be .gsl file which are customized with SCE software or 
VXML files developed by Voice XML.The flow files can perform specific functions such as 
automatic voice prompt and user information collection. 
l Aplogic:(Application Logic Server),it provides data access proxy to some components of 
the call center system. In the system, each Aplogic runs in the load sharing mode to ensure 
the stability of database operations. 
l UIDB: (User Interface Database) is a database specialized for the IPCC. It is responsible for 
managing and maintaining customer information data and statistics data of various 
systems. 
l MCP: (Management Application Connection Proxy) It executes the message distribution 
between client and CCS, manages the connection between client and CCS. 
l iUAS: (Intelligent UNIX Application Server) It provides the access interface for database or 
protocol. This is used for agent, web work flow, knowledge base and so on. 
l SCDB: (Service Center Database)This is a specialized database for IPCC. It stores the 
information for knowledge base, bulletin and so on, and provides the service application 
authority for agent. 
l DT Proxy: (Database Transition Proxy) This is a connection proxy for IPCC, such as billing 
system.
l The part mainly introduces the call flow classification, the typical call flow of IPCC.
l 1.The user hooks off and dials. 
l 2.After receiving the call, the UAP sends a call establishing request to the CTI server. 
l 4.After receiving the call, the CTI server sends a routing request to the CCS. 
l 3.The CCS sends an acknowledgement to the CTI server. 
l 5.After receiving the routing request, the CTI server sends an application to the IRC. According to 
the system routing policy, the IRC checks the status of system resource occupation through the 
CCS. 
l 6.IRC delivers the CCS request to IVR, IVR plays prompt to user. 
l 7.After hearing the prompt, user select 0 and forward the call to agent. 
l 8.According to the system routing policy, the IRC checks the status of system resource occupation 
through the CCS, judges out the routing result, and then returns the result to the CCS. 
l 9.After receiving the routing result, the CCS returns an acknowledgment to the CTI server, notifying 
it to schedule the call to the specified agent. 
l 10.The CTI server sends a call notification to the agent, requesting for an acknowledgement. 
l 11.The agent returns an acknowledgement to the CTI server. 
l 12.The CTI server notifies the UAP of the start of the call, and then connects the call to the agent. 
l 13.User and agent start talk with each other.
l 1.The user hooks off and dials. 
l 2.After receiving the call, the UAP sends a call establishing request to the CTI server. 
l 4.After receiving the call, the CTI server sends a routing request to the CCS. 
l 3.The CCS sends an acknowledgement to the CTI server. 
l 5.After receiving the routing request, the CTI server sends an application to the IRC. 
According to the system routing policy, the IRC checks the status of system resource 
occupation through the CCS. 
l 6.IRC delivers the CCS request to IVR, IVR plays prompt to user. 
l 7.After hearing the prompt, user select 1 and forward the call to billing system. 
l 8. IVR executes the flow,sends the query request to DtProxy。 
l 9. DtProxy sends request to billing system,billing system queries the bill。 
l 10. Billing system sends the result to Dtproxy。 
l 11. DtProxy sends the result to IVR。 
l 12. IVR play the query result to user。
l 1.The MailM scans the mail box periodically. 
l 2.The MailM saves the e-mail in the local server. 
l 3.The MailM sends a routing request to the CCS. 
l 4.After receiving the routing result, the CCS sends it to the MailM. 
l 5.The MailM sends an e-mail to the routed agent, requesting for an acknowledgement. 
l 6.The agent sends an acknowledgement to the MailM. 
l 7.The MailM sends the e-mail to the private receiving e-mail box of the agent. 
l 8.The E-mail Server sends a notification to the agent, and then processes the e-mail.
l 1.The IVR fax incoming process receives a fax. 
l 2.The IVR fax incoming process sends a request to the database for the skill e-mail box 
address. 
l 3.The database returns the skill e-mail box address that corresponds to the fax index 
number. 
l 4.The IVR fax incoming process sends a request to the database for related SMTP 
information. 
l 5.The database returns the SMTP information. 
l 6.The IVR automatically sends an e-mail to the skill e-mail box, attaching the *.tif file 
generated on the FP. 
l 7.An agent receives the fax (e-mail) and processes it. This step is the same as e-mail call 
flow, please refer to e-mail call flow. 
l 8.The agent sends the reply e-mail to the fax outgoing e-mail box. 
l 9.The Change server checks the e-mail box periodically. 
l 10.When the Change server detects an e-mail, it generates one or more *.tif files, saves 
them into a specified directory, and then deletes the e-mail from the e-mail server. 
l 11.The Change server stores related information (including the fax set number, the 
absolute faxing path, and so on) into the database.
l 12.The Change server stores related information such as the bill into the database. 
l 13.The IVR starts the fax outgoing process after a specified time segment to obtain the fax 
outgoing record from the database. 
l 14.The database returns the fax outgoing record. 
l 15.The IVR fax outgoing process obtains the fax outgoing record to control the FP to send 
faxes. 
l 16.If the IVR fax outgoing process successfully sends a fax, it writes a bill into the database. 
Then finish the process. 
If the IVR fax outgoing process fails to send a fax, the corresponding records are updated 
in the database. Then the process ends.
l 1. IVR executes the flow and gets the SM (short message), including calling party number, 
called party number. 
l 2.The IVR short message incoming process sends a request to the database for the skill e-mail 
box address and SMTP address. 
l 3.IVR converts the SM to e-mail, sends the e-mail to skill e-mail box. 
l 4.MailM checks the e-mail box periodically, gets the e-mail. 
l 5.MailM sends route request to CCS, CCS returns the result. 
l 6. MailM gets the result, sends the request to specified agent. 
l 7. Agent answers the request. 
l 8. MailM send the e-mail to specified agent e-mail box. 
l 9. Email Server sends message to agent and then handles the e-mail. 
l 10. Agent receives the e-mail, sends the answer e-mail to agent’s private sent out e-mail 
box. 
l 11. MailM scans Email Server periodically, gets the answer e-mail, sends the e-mail to 
message send out e-mail box. 
l 12.IVR starts SM sent out flow, get the e-mail from send out e-mail box. 
l 13.IVR converts the e-mail to SM, sends the SM to SMSC.
01 introduction to ipcc system issue1.0

More Related Content

What's hot

What is a Private 5G Network.pdf
What is a Private 5G Network.pdfWhat is a Private 5G Network.pdf
What is a Private 5G Network.pdf
Antenna Manufacturer Coco
 
Avaya IP Office Presentation - Updated!
Avaya IP Office Presentation - Updated!Avaya IP Office Presentation - Updated!
Avaya IP Office Presentation - Updated!pilihpk
 
Avaya Networking Solution Overview
Avaya Networking Solution OverviewAvaya Networking Solution Overview
Avaya Networking Solution Overview
Motty Ben Atia
 
Wi-Fi 6.pptx
Wi-Fi 6.pptxWi-Fi 6.pptx
Wi-Fi 6.pptx
NicJones15
 
5G Core Network White Paper
5G Core Network White Paper5G Core Network White Paper
5G Core Network White Paper
ssusere032f4
 
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideCisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Alberto Rivai
 
Fortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdfFortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdf
AlonzoJames2
 
Avaya call routing_flowchart
Avaya call routing_flowchartAvaya call routing_flowchart
Avaya call routing_flowchart
dborsan
 
Sigtran oracle
Sigtran oracleSigtran oracle
Sigtran oracle
dborsan
 
Ch2 gsm network architecture
Ch2 gsm network architectureCh2 gsm network architecture
Ch2 gsm network architectureMohamed Shaaban
 
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using YubikeyPalo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Alberto Rivai
 
Ericsson Distributed Cloud
Ericsson Distributed CloudEricsson Distributed Cloud
Ericsson Distributed Cloud
Ericsson
 
Network Security- port security.pptx
Network Security- port security.pptxNetwork Security- port security.pptx
Network Security- port security.pptx
SulSya
 
Ericsson 5G plug-ins
Ericsson 5G plug-insEricsson 5G plug-ins
Ericsson 5G plug-ins
Ericsson
 
4G wireless Network
4G wireless Network4G wireless Network
4G wireless Network
Masuma Akhatar
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
ShubhamYadav73126
 
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 5G SA security: a comprehensive overview of threats, vulnerabilities and rem... 5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
PositiveTechnologies
 
Cellular Services over WiFi
Cellular Services over WiFiCellular Services over WiFi
Cellular Services over WiFi
3G4G
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
QOS Networks
 

What's hot (20)

What is a Private 5G Network.pdf
What is a Private 5G Network.pdfWhat is a Private 5G Network.pdf
What is a Private 5G Network.pdf
 
Avaya IP Office Presentation - Updated!
Avaya IP Office Presentation - Updated!Avaya IP Office Presentation - Updated!
Avaya IP Office Presentation - Updated!
 
Avaya Networking Solution Overview
Avaya Networking Solution OverviewAvaya Networking Solution Overview
Avaya Networking Solution Overview
 
Wi-Fi 6.pptx
Wi-Fi 6.pptxWi-Fi 6.pptx
Wi-Fi 6.pptx
 
5G Core Network White Paper
5G Core Network White Paper5G Core Network White Paper
5G Core Network White Paper
 
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config GuideCisco Wireless LAN Controller Palo Alto Networks Config Guide
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
 
Satellite Sys
Satellite SysSatellite Sys
Satellite Sys
 
Fortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdfFortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdf
 
Avaya call routing_flowchart
Avaya call routing_flowchartAvaya call routing_flowchart
Avaya call routing_flowchart
 
Sigtran oracle
Sigtran oracleSigtran oracle
Sigtran oracle
 
Ch2 gsm network architecture
Ch2 gsm network architectureCh2 gsm network architecture
Ch2 gsm network architecture
 
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using YubikeyPalo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
 
Ericsson Distributed Cloud
Ericsson Distributed CloudEricsson Distributed Cloud
Ericsson Distributed Cloud
 
Network Security- port security.pptx
Network Security- port security.pptxNetwork Security- port security.pptx
Network Security- port security.pptx
 
Ericsson 5G plug-ins
Ericsson 5G plug-insEricsson 5G plug-ins
Ericsson 5G plug-ins
 
4G wireless Network
4G wireless Network4G wireless Network
4G wireless Network
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 5G SA security: a comprehensive overview of threats, vulnerabilities and rem... 5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
5G SA security: a comprehensive overview of threats, vulnerabilities and rem...
 
Cellular Services over WiFi
Cellular Services over WiFiCellular Services over WiFi
Cellular Services over WiFi
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 

Similar to 01 introduction to ipcc system issue1.0

e-2joelezell.ppt
e-2joelezell.ppte-2joelezell.ppt
e-2joelezell.ppt
ssuser91ac301
 
Aspect UIP Logical Architecture
Aspect UIP Logical ArchitectureAspect UIP Logical Architecture
Aspect UIP Logical Architecture
Vishad Garg
 
imsipmultimediasubsystempresent-101117110625-phpapp01.ppt
imsipmultimediasubsystempresent-101117110625-phpapp01.pptimsipmultimediasubsystempresent-101117110625-phpapp01.ppt
imsipmultimediasubsystempresent-101117110625-phpapp01.ppt
akimor
 
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISEANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
AIRCC Publishing Corporation
 
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISEANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ijcsit
 
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...
AIRCC Publishing Corporation
 
Crosscode Technologies Private Limited - Company profile
Crosscode Technologies Private Limited - Company profileCrosscode Technologies Private Limited - Company profile
Crosscode Technologies Private Limited - Company profile
acuser30
 
VOIP Design & Implementation
VOIP Design & ImplementationVOIP Design & Implementation
VOIP Design & Implementation
Ahmed A. Arefin
 
Executive SummaryThe purpose of this report is to design a moder.docx
Executive SummaryThe purpose of this report is to design a moder.docxExecutive SummaryThe purpose of this report is to design a moder.docx
Executive SummaryThe purpose of this report is to design a moder.docx
gitagrimston
 
Protocol For Streaming Media
Protocol For Streaming MediaProtocol For Streaming Media
Protocol For Streaming MediaKaniska Mandal
 
Intelligent Networks
Intelligent NetworksIntelligent Networks
Intelligent Networks
Susma S
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
OECLIB Odisha Electronics Control Library
 
Voip
VoipVoip
Voip
PTCL
 
EC8004 WIRELESS NETWORKS UNIT 5 - IMS
EC8004 WIRELESS NETWORKS UNIT 5 - IMS EC8004 WIRELESS NETWORKS UNIT 5 - IMS
EC8004 WIRELESS NETWORKS UNIT 5 - IMS
HemalathaR31
 
Voip on Wimax
Voip on WimaxVoip on Wimax
telerion: System Layer
telerion: System Layertelerion: System Layer
telerion: System Layer
telerion
 
IRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent LiftIRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent Lift
IRJET Journal
 

Similar to 01 introduction to ipcc system issue1.0 (20)

e-2joelezell.ppt
e-2joelezell.ppte-2joelezell.ppt
e-2joelezell.ppt
 
Aspect UIP Logical Architecture
Aspect UIP Logical ArchitectureAspect UIP Logical Architecture
Aspect UIP Logical Architecture
 
imsipmultimediasubsystempresent-101117110625-phpapp01.ppt
imsipmultimediasubsystempresent-101117110625-phpapp01.pptimsipmultimediasubsystempresent-101117110625-phpapp01.ppt
imsipmultimediasubsystempresent-101117110625-phpapp01.ppt
 
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISEANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
 
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISEANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
ANALYTICAL METHOD FOR MODELING PBX SYSTEMS FOR SMALL ENTERPRISE
 
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...
DEVELOPMENT OF SECURITY DETECTION MODEL FOR THE SECURITY OF SOCIAL BLOGS AND ...
 
Crosscode Technologies Private Limited - Company profile
Crosscode Technologies Private Limited - Company profileCrosscode Technologies Private Limited - Company profile
Crosscode Technologies Private Limited - Company profile
 
F0704024031
F0704024031F0704024031
F0704024031
 
VOIP Design & Implementation
VOIP Design & ImplementationVOIP Design & Implementation
VOIP Design & Implementation
 
Executive SummaryThe purpose of this report is to design a moder.docx
Executive SummaryThe purpose of this report is to design a moder.docxExecutive SummaryThe purpose of this report is to design a moder.docx
Executive SummaryThe purpose of this report is to design a moder.docx
 
Protocol For Streaming Media
Protocol For Streaming MediaProtocol For Streaming Media
Protocol For Streaming Media
 
Intelligent Networks
Intelligent NetworksIntelligent Networks
Intelligent Networks
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
Voip
VoipVoip
Voip
 
EC8004 WIRELESS NETWORKS UNIT 5 - IMS
EC8004 WIRELESS NETWORKS UNIT 5 - IMS EC8004 WIRELESS NETWORKS UNIT 5 - IMS
EC8004 WIRELESS NETWORKS UNIT 5 - IMS
 
Ain overview
Ain overviewAin overview
Ain overview
 
PRESENTATION FOR THE TRAINING
PRESENTATION FOR THE TRAININGPRESENTATION FOR THE TRAINING
PRESENTATION FOR THE TRAINING
 
Voip on Wimax
Voip on WimaxVoip on Wimax
Voip on Wimax
 
telerion: System Layer
telerion: System Layertelerion: System Layer
telerion: System Layer
 
IRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent LiftIRJET-Voice Operated Intelligent Lift
IRJET-Voice Operated Intelligent Lift
 

More from Christian Silva Espinoza

Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
Christian Silva Espinoza
 
Attachment 3 measures for managing and applying for licenses
Attachment 3 measures for managing and applying for licensesAttachment 3 measures for managing and applying for licenses
Attachment 3 measures for managing and applying for licenses
Christian Silva Espinoza
 
Cisco data center training for ibm
Cisco data center training for ibmCisco data center training for ibm
Cisco data center training for ibm
Christian Silva Espinoza
 

More from Christian Silva Espinoza (11)

Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
 
Attachment 3 measures for managing and applying for licenses
Attachment 3 measures for managing and applying for licensesAttachment 3 measures for managing and applying for licenses
Attachment 3 measures for managing and applying for licenses
 
06 mgw data configuration issue1.10
06 mgw data configuration issue1.1006 mgw data configuration issue1.10
06 mgw data configuration issue1.10
 
05 uap terminal system issue1.10
05 uap terminal system issue1.1005 uap terminal system issue1.10
05 uap terminal system issue1.10
 
04 hardware system of uap mgc issue1.10
04 hardware system of uap mgc issue1.1004 hardware system of uap mgc issue1.10
04 hardware system of uap mgc issue1.10
 
03 hardware system of uap mgw issue1.10
03 hardware system of uap mgw issue1.1003 hardware system of uap mgw issue1.10
03 hardware system of uap mgw issue1.10
 
02 uap fundamental issue1.10
02 uap fundamental issue1.1002 uap fundamental issue1.10
02 uap fundamental issue1.10
 
Apkt ds nn central_110620
Apkt ds nn central_110620Apkt ds nn central_110620
Apkt ds nn central_110620
 
1600 g technical_description
1600 g technical_description1600 g technical_description
1600 g technical_description
 
Apkt sn lte_091102
Apkt sn lte_091102Apkt sn lte_091102
Apkt sn lte_091102
 
Cisco data center training for ibm
Cisco data center training for ibmCisco data center training for ibm
Cisco data center training for ibm
 

01 introduction to ipcc system issue1.0

  • 1.
  • 2. l UAP: The U-SYS universal access platform (UAP8100 for short) is developed by Huawei and is used for both narrowband and broadband access. It is the next generation product of C&C08-Q and inherits features of C&C08-Q. The UAP8100 provides abundant media resources and powerful networking capability. Therefore, it provides call access, agent, and media resource functions for IPCC.
  • 3.
  • 4. l The part mainly introduces the concept of call center, the development step of call center, the concept of IPCC, the typical service of IPCC.
  • 5. l There is no fixed and definite concept for the call center. The initial definition of the call center is a place where quantities of incoming calls are processed in a centralized way. The definition of the call center is more definite after the emergence of the CTI technology. l The definition of the call center is a system integration product with powerful communication and data processing capabilities based on the CTI technology. l The connotation and denotation of the call center are extended along with the development of Internet technology. Besides the original telephony mode, the access modes of the call center include voice, text, pictures, and so on. Meanwhile, the call center can integrate the Web technology, thus implementing more powerful information interaction function.
  • 6. l First generation p The customer call directly connect to some specified telephone, all of the calls are answered by agents. This is the same as the normal call. l Second generation p Based on switch, there is ACD (Automatic Call Distribution) for call accessing. It can provides the call queue and agent queue for call center. In this generation, there is IVR (Interactive Voice Response). This is a very powerful function to call center. l Third generation p CTI (Computer & Telephony Integration) is the most important technology for call center. After CTI, we can connect service computer to telecom communication network l Fourth generation p Because of 3G and NGN network, we need to connect call center to IP network. IPCC is based on soft-switch network, provides more capacity and more service.
  • 7. l IPCC provides the DTMF, play prompt, record voice, IP agent and so on in PSTN/PLMN. Except that, IPCC can provide play prompt, IP agent, play media(H.263,MPEG4) and so on in NGN/3G network.
  • 8. l The TopEng-IPCC is an intelligent device platform with personalized processing capability. It can process many manual or automatic services such as processing complaints, recommendations, consultations, call fee query, phone number query and integrated information service. It provides powerful service creation capability so that operators can create, modify and adjust services according to their actual requirements.
  • 9. l The Huawei networked call center can distribute calls uniformly in the whole network or among multiple isolated call centers. It implements the call distribution, resource and load sharing within the whole network, thus realizing the target of “one point access, whole network service”.
  • 10. l Enterprise call centers (ECCs), namely, virtual call centers (VCCs), are created by enterprises or organizations based on the public call center platform rent from operators. The call center operator constructs one call center, creates VCCs for enterprises and allocates resources (agents, automatic flows, and so on) to enterprises. l A VCC has the following features: p Compared with a conventional call center, the initial investment of a VCC, especially the investment in device purchase, is lower. p A VCC can easily be integrated with the IT platform of an enterprise or an organization, so there is small amount of workload for customization. p A VCC provides solutions for various levels, from the most economic and simplest mode to the comprehensive CTI function, and each solution is easy to upgrade.
  • 11. l This is an important extended function of IPCC, it provides users with such services as reserved calls, mass calls, telephone advertisement (marketing) and telephone notification of defaulting call fee. l The automatic call function of the IPCC is implemented through the Outbound call management system, and it can support the skill queue, IVR, e-mail and fax calls. Users can, according to their own requirements, customize outgoing call tasks, including outgoing call conditions and outgoing call contents. Once the outgoing call conditions are met, the Outbound call management system can make automatic outgoing calls.
  • 12. l The part mainly introduces the architecture, system components, functions of main components of IPCC.
  • 13. l The IPCC adopts the design that is independent from accessed media, so it has good openness and extendibility. The system adopts the design concept of separating services from the switching. The service layer and service control layer are separated from the conventional network so that the service implementing layer also has good openness and extendibility. l The system is logically composed of four layers, that is, the media accessing layer, media adapting layer, service supporting layer and service implementing layer.
  • 14. l The media accessing layer supports the access of multiple media such as voice/fax, VoIP, Web and e-mail and provides the lower-layer access function for the IPCC.
  • 15. l Media adapting layer is responsible for adaptation for various call media. Speech calls, e-mail calls and Web calls are processed to be unified calls so that various media can communicate with the service supporting layer without the consideration of what types the media are.
  • 16. l Service supporting layer submits the requirements of the service on calls to the service accessing layer through the media adapting layer, and implements the call control function with the cooperation of the service application layer.
  • 17. l Service application layer implements specific service application with the computer network technology and the support of the service supporting layer, media adapting layer and media accessing layer.
  • 18. l UAP: (Universal Access Platform)it provides call access, agent, and media resource functions for the call center. l File Server: It stores the prompt voice , agent conversation voice and so on。 l Intess/ CSTA (Computer Supported Telecommunications Applications): The communication protocol between UAP and CTI platform. l CTI-LINK: (Computer & Telephony Integration Link )This is the communication bridge between UAP and platform。 l ICDCOMM: (Intelligent Call Distribution Communication Service)This is the internal communication protocol of CTI platform. l CTI Server: (Computer & Telephony Integration Server) This is one type of media server in IPCC, it supports the voice accessing. l WebM: (Web Media Server) It provides Web interaction functions such as escorted browsing and text chat, and WECC (Web Enabled Call Center)functions. l MailM:(Email Media Server) It is responsible for processing e-mails sent by users to the mailbox of the call center, that is, transferring the e-mails to specified agents, and finally transferring back e-mail replies made by agents to users.
  • 19. l CCS: (Call Center Server), the core of the IPCC, implements management of calls unrelated to media. It provides a standard protocol interface for the lower layer. When various media servers request the CCS for serving calls, the CCS provides call management regardless what media servers are currently requesting. l IVR: (Interactive Voice Response),it is responsible for solving and carrying out flow files loaded to it. The flow files can be .gsl file which are customized with SCE software or VXML files developed by Voice XML.The flow files can perform specific functions such as automatic voice prompt and user information collection. l Aplogic:(Application Logic Server),it provides data access proxy to some components of the call center system. In the system, each Aplogic runs in the load sharing mode to ensure the stability of database operations. l UIDB: (User Interface Database) is a database specialized for the IPCC. It is responsible for managing and maintaining customer information data and statistics data of various systems. l MCP: (Management Application Connection Proxy) It executes the message distribution between client and CCS, manages the connection between client and CCS. l iUAS: (Intelligent UNIX Application Server) It provides the access interface for database or protocol. This is used for agent, web work flow, knowledge base and so on. l SCDB: (Service Center Database)This is a specialized database for IPCC. It stores the information for knowledge base, bulletin and so on, and provides the service application authority for agent. l DT Proxy: (Database Transition Proxy) This is a connection proxy for IPCC, such as billing system.
  • 20. l The part mainly introduces the call flow classification, the typical call flow of IPCC.
  • 21.
  • 22. l 1.The user hooks off and dials. l 2.After receiving the call, the UAP sends a call establishing request to the CTI server. l 4.After receiving the call, the CTI server sends a routing request to the CCS. l 3.The CCS sends an acknowledgement to the CTI server. l 5.After receiving the routing request, the CTI server sends an application to the IRC. According to the system routing policy, the IRC checks the status of system resource occupation through the CCS. l 6.IRC delivers the CCS request to IVR, IVR plays prompt to user. l 7.After hearing the prompt, user select 0 and forward the call to agent. l 8.According to the system routing policy, the IRC checks the status of system resource occupation through the CCS, judges out the routing result, and then returns the result to the CCS. l 9.After receiving the routing result, the CCS returns an acknowledgment to the CTI server, notifying it to schedule the call to the specified agent. l 10.The CTI server sends a call notification to the agent, requesting for an acknowledgement. l 11.The agent returns an acknowledgement to the CTI server. l 12.The CTI server notifies the UAP of the start of the call, and then connects the call to the agent. l 13.User and agent start talk with each other.
  • 23. l 1.The user hooks off and dials. l 2.After receiving the call, the UAP sends a call establishing request to the CTI server. l 4.After receiving the call, the CTI server sends a routing request to the CCS. l 3.The CCS sends an acknowledgement to the CTI server. l 5.After receiving the routing request, the CTI server sends an application to the IRC. According to the system routing policy, the IRC checks the status of system resource occupation through the CCS. l 6.IRC delivers the CCS request to IVR, IVR plays prompt to user. l 7.After hearing the prompt, user select 1 and forward the call to billing system. l 8. IVR executes the flow,sends the query request to DtProxy。 l 9. DtProxy sends request to billing system,billing system queries the bill。 l 10. Billing system sends the result to Dtproxy。 l 11. DtProxy sends the result to IVR。 l 12. IVR play the query result to user。
  • 24. l 1.The MailM scans the mail box periodically. l 2.The MailM saves the e-mail in the local server. l 3.The MailM sends a routing request to the CCS. l 4.After receiving the routing result, the CCS sends it to the MailM. l 5.The MailM sends an e-mail to the routed agent, requesting for an acknowledgement. l 6.The agent sends an acknowledgement to the MailM. l 7.The MailM sends the e-mail to the private receiving e-mail box of the agent. l 8.The E-mail Server sends a notification to the agent, and then processes the e-mail.
  • 25. l 1.The IVR fax incoming process receives a fax. l 2.The IVR fax incoming process sends a request to the database for the skill e-mail box address. l 3.The database returns the skill e-mail box address that corresponds to the fax index number. l 4.The IVR fax incoming process sends a request to the database for related SMTP information. l 5.The database returns the SMTP information. l 6.The IVR automatically sends an e-mail to the skill e-mail box, attaching the *.tif file generated on the FP. l 7.An agent receives the fax (e-mail) and processes it. This step is the same as e-mail call flow, please refer to e-mail call flow. l 8.The agent sends the reply e-mail to the fax outgoing e-mail box. l 9.The Change server checks the e-mail box periodically. l 10.When the Change server detects an e-mail, it generates one or more *.tif files, saves them into a specified directory, and then deletes the e-mail from the e-mail server. l 11.The Change server stores related information (including the fax set number, the absolute faxing path, and so on) into the database.
  • 26. l 12.The Change server stores related information such as the bill into the database. l 13.The IVR starts the fax outgoing process after a specified time segment to obtain the fax outgoing record from the database. l 14.The database returns the fax outgoing record. l 15.The IVR fax outgoing process obtains the fax outgoing record to control the FP to send faxes. l 16.If the IVR fax outgoing process successfully sends a fax, it writes a bill into the database. Then finish the process. If the IVR fax outgoing process fails to send a fax, the corresponding records are updated in the database. Then the process ends.
  • 27. l 1. IVR executes the flow and gets the SM (short message), including calling party number, called party number. l 2.The IVR short message incoming process sends a request to the database for the skill e-mail box address and SMTP address. l 3.IVR converts the SM to e-mail, sends the e-mail to skill e-mail box. l 4.MailM checks the e-mail box periodically, gets the e-mail. l 5.MailM sends route request to CCS, CCS returns the result. l 6. MailM gets the result, sends the request to specified agent. l 7. Agent answers the request. l 8. MailM send the e-mail to specified agent e-mail box. l 9. Email Server sends message to agent and then handles the e-mail. l 10. Agent receives the e-mail, sends the answer e-mail to agent’s private sent out e-mail box. l 11. MailM scans Email Server periodically, gets the answer e-mail, sends the e-mail to message send out e-mail box. l 12.IVR starts SM sent out flow, get the e-mail from send out e-mail box. l 13.IVR converts the e-mail to SM, sends the SM to SMSC.