This document provides instructions for configuring Cisco IP phones. It includes details about the buttons and ports on the front and back of the phones. It then describes two topology scenarios covering internal calling, speed dials, busy lamp field, customized ringtones, and shared lines. The tasks include enabling CDP, assigning VLANs and IP addresses, configuring DHCP, registering phones and assigning DNs, enabling telephony services, and customizing phone screens. The goal is to demonstrate basic call functionality between the phones including internal and shared line calls.
The Icecrypt S3700CHD is a triple tuner PVR receiver characterized by its reliable hardware and sophisticated yet easy-to-use software. It features three tuner inputs, a variety of output ports, and built-in multimedia functions. The software allows for flexible channel scanning and organization, customizable settings, and integrated EPG and multimedia apps. Testing found the receiver's blind scan performance and copying of motor settings between satellites to be particularly useful features.
This document describes an automatic toll ticketing system that improves on prior systems by removing certain apparatus, including a switching mechanism, from each register sender and making it available to multiple register senders. Specifically, it provides common office code translating apparatus that can be selected for exclusive use by a register sender to translate an office code into routing digits to route the call. It also allows charging the called subscriber instead of the calling subscriber by using a special office code.
This document describes an automatic toll ticketing telephone system that produces records of call information. It aims to improve the system by eliminating certain apparatus from individual register senders and making it available to multiple register senders instead. This involves removing switching mechanisms from each register sender and controlling common translating apparatus based on called office code digits to select routing for calls. The goals are to simplify register sender design and translate office codes into routing digits even if the full called number is not received.
This document outlines the network design for a new and old building. It shows the different floors and network closets (IDFs). Each floor and closet is connected to core switches in the new building with HP 2620 and HP 1910 switches providing connections for guest, mini bar, IPTV, and VoIP networks. The old building uses an existing HP 5406 core switch with HP 3800 and 2920 distribution switches connecting floors and networks. Fiber uplinks between the new and old buildings are included.
This document describes the configuration of VLANs on a Cisco switch. The key steps are:
1. Six VLANs are created and named for different departments.
2. Ports on the switch are assigned to each VLAN to segregate network traffic for each department.
3. IP addresses are configured for each VLAN interface and routing is enabled with RIP to allow communication between VLANs.
4. Ping tests confirm connectivity between devices on different VLANs, showing the VLAN configuration is functioning properly.
This document provides a summary of the network infrastructure of a medical office. It includes details on servers, routers, switches, wireless access points, virtual local area networks, IP addressing schemes, and connected devices such as printers, scanners, and IP phones. The network utilizes Cisco switches and routers to separate data, voice, and wireless traffic onto different VLANs with IP schemes like 192.168.144.x for data and 192.168.2.x for voice. Critical servers run applications for Active Directory, Eclinicalworks, faxing, and virtualization. The network also connects to an external extranet and supports a wireless guest network.
This document provides instructions for configuring Cisco IP phones. It includes details about the buttons and ports on the front and back of the phones. It then describes two topology scenarios covering internal calling, speed dials, busy lamp field, customized ringtones, and shared lines. The tasks include enabling CDP, assigning VLANs and IP addresses, configuring DHCP, registering phones and assigning DNs, enabling telephony services, and customizing phone screens. The goal is to demonstrate basic call functionality between the phones including internal and shared line calls.
The Icecrypt S3700CHD is a triple tuner PVR receiver characterized by its reliable hardware and sophisticated yet easy-to-use software. It features three tuner inputs, a variety of output ports, and built-in multimedia functions. The software allows for flexible channel scanning and organization, customizable settings, and integrated EPG and multimedia apps. Testing found the receiver's blind scan performance and copying of motor settings between satellites to be particularly useful features.
This document describes an automatic toll ticketing system that improves on prior systems by removing certain apparatus, including a switching mechanism, from each register sender and making it available to multiple register senders. Specifically, it provides common office code translating apparatus that can be selected for exclusive use by a register sender to translate an office code into routing digits to route the call. It also allows charging the called subscriber instead of the calling subscriber by using a special office code.
This document describes an automatic toll ticketing telephone system that produces records of call information. It aims to improve the system by eliminating certain apparatus from individual register senders and making it available to multiple register senders instead. This involves removing switching mechanisms from each register sender and controlling common translating apparatus based on called office code digits to select routing for calls. The goals are to simplify register sender design and translate office codes into routing digits even if the full called number is not received.
This document outlines the network design for a new and old building. It shows the different floors and network closets (IDFs). Each floor and closet is connected to core switches in the new building with HP 2620 and HP 1910 switches providing connections for guest, mini bar, IPTV, and VoIP networks. The old building uses an existing HP 5406 core switch with HP 3800 and 2920 distribution switches connecting floors and networks. Fiber uplinks between the new and old buildings are included.
This document describes the configuration of VLANs on a Cisco switch. The key steps are:
1. Six VLANs are created and named for different departments.
2. Ports on the switch are assigned to each VLAN to segregate network traffic for each department.
3. IP addresses are configured for each VLAN interface and routing is enabled with RIP to allow communication between VLANs.
4. Ping tests confirm connectivity between devices on different VLANs, showing the VLAN configuration is functioning properly.
This document provides a summary of the network infrastructure of a medical office. It includes details on servers, routers, switches, wireless access points, virtual local area networks, IP addressing schemes, and connected devices such as printers, scanners, and IP phones. The network utilizes Cisco switches and routers to separate data, voice, and wireless traffic onto different VLANs with IP schemes like 192.168.144.x for data and 192.168.2.x for voice. Critical servers run applications for Active Directory, Eclinicalworks, faxing, and virtualization. The network also connects to an external extranet and supports a wireless guest network.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document provides a test report of the Icecrypt S3700CHD triple tuner PVR HDTV receiver. It has an elegant front panel with a VFD display and smartcard readers. The back panel features three tuner inputs, HDMI, and network interfaces. It has a quick and responsive interface thanks to its powerful CPU and memory. It supports various satellite settings and protocols. Channel search results in over 1500 TV channels found on HOTBIRD. Built-in multimedia features include YouTube, radio, and a web browser. The receiver provides a user-friendly experience with its three-row channel list, EPG integration, and on-screen manual.
ISP ABC provides ADSL service to subscribers using IP addresses between 205.1.1.2-205.1.1.100. Subscribers use PPPoE authentication with PAP. The ISP uses DHCP to assign IP addresses to subscribers and NAT-overload to allow subscribers on the same LAN to access the internet.
This document contains the configuration of a CPU 1214C DC/DC/Rly programmable logic controller. It includes the configuration of digital and analog inputs and outputs, communication modules, and blocks for counting, timing and communication. The document contains the module configuration, I/O addressing, and block programming to implement control logic for the PLC.
The document provides a test report of the Icecrypt S3700CHD triple tuner PVR HDTV receiver. It has an elegant front panel with a readable display and smartcard readers. The back panel has three tuner inputs, various audio/video outputs, and a network interface. The remote is comfortable and labels are clear. Setup includes language selection, network setup, and video resolution selection. A blind scan found more channels than a standard search. The software allows copying motor settings between satellites and has a user-friendly channel list and settings menu. It also has a variety of multimedia and smart TV apps. In summary, the receiver has excellent hardware and sophisticated but easy-to-use software.
Packet Tracer Simulation Lab Layer3 RoutingJohnson Liu
The document describes setting up routing between two routers. It involves:
1. Configuring WAN interfaces on each router and assigning IP addresses between them.
2. Setting up LAN segments behind each router by configuring LAN interfaces and assigning IP addresses.
3. Enabling static routing on each router to allow routing between the LAN segments since dynamic routing protocols have not been configured yet.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document describes 11 tobacco feeder modules that use RFID and other sensors for monitoring and automation. Each module includes an RFID interrogator, antenna, proximity sensor, communication module, and PLC electronic block for control. The modules will be installed at the Pakistan Tobacco Company factory in Akora Khattak, Pakistan.
The document tests and evaluates the Antiference DTT Headend system for processing digital terrestrial television (DTT) signals. Key features of the system include its ability to:
1) Receive up to 10 DTT channels, filter out unwanted interference, amplify the signals, and move the channels to new frequencies if desired.
2) Maintain high signal quality even when converting adjacent channels, demonstrating the effectiveness of its steep cutoff SAW filters.
3) Be configured and controlled remotely via an embedded web server, allowing for maintenance from outside the installation point.
4) Reliably process real-world DTT signals from an antenna while improving signal-to-noise ratios and only slightly decreasing
The document lists various networking equipment and components located in an office including multiple Hewlett Packard LAN switches, VoIP phones, servers such as app and database servers, a firewall/proxy server, UPS's, tape drives, and drops for phones and wall jacks connected via a Verizon and US-LEC T3, KVM switch, DMZ switch and DSL Extreme drop to a wireless access point. IP addresses and models are provided for some devices.
This document provides information about a 4 channel RF remote controller board that operates at 433/315 MHz with relays. It includes a description of the 10 pin box header pin out and notes that the DIP 8 bit address switch must match between the transmitter and receiver boards. It also provides links to purchase compatible motor driver and receiver boards from the same manufacturer.
The FT-5OR is a compact dual-band FM hand-held transceiver that provides 5 watts of power on 2 meters and 70 cm bands. It has features like 100 memory channels, duplex mode, dual watch, CTCSS and DCS encoding/decoding, ARTS functions, DTMF encoding, and options for digital voice recording and tone signaling with an external keypad. Accessories include various battery packs, battery chargers, carrying cases, and other accessories to enhance its portability and functionality.
Kumar gunjan 20160213 mobile communication securitynullowaspmumbai
The document discusses mobile communication technologies and security issues in GSM. It provides an overview of the evolution of mobile communication from 1G to 2G technologies such as GSM. It describes the GSM architecture including components like the SIM card, authentication and encryption schemes, and GSM channels. It also outlines the basic call sequences for mobile-to-land and land-to-mobile calls. Finally, it discusses some security issues in the GSM network like vulnerabilities to sniffing and man-in-the-middle attacks.
This document describes a 5-zone IP network audio system for offices, schools, and hotels. It includes a touchscreen PC server, IP network audio software, audio sources, IP network paging microphones, IP network audio adapters with amplifiers, IP network amplifiers, ceiling and wall mount speakers, and a LAN switch to set up the system over a network. The system provides multi-room background music, paging to specific or all zones, and two-way intercom capabilities using minimal equipment and wiring for low installation and expansion costs.
This document describes an economy 6 zone sound system solution for factories, offices, and hotels. It includes a 6 zone controller that can play background music from CDs, MP3s, and AM/FM radio. It also has a voice alarm system that can broadcast prerecorded emergency messages through connected speakers. The system supports 6 remote paging microphones to allow zone-by-zone paging. A bill of materials lists the components included in the system, such as amplifiers, speakers, and a remote paging station.
This document describes an 8 zone audio matrix and zone paging system. It includes 8 different music sources that can broadcast to 8 zones, with the ability to expand to 32 zones. The system includes a controller, CD/MP3 player, remote paging microphones, power amplifiers, remote wall plates for volume control, and various outdoor and indoor speakers to cover different zones such as offices, parking areas, and fitness centers. The speaker distribution table at the end provides details on the speaker models, quantities, and power output allocated for each zone.
The document describes the initial configuration of two Cisco routers and one switch. It summarizes the steps taken to configure basic settings such as hostname, passwords, interfaces and IP addresses on each device. It also describes creating VLANs 10, 20 and 30 on the switch and assigning ports to each VLAN.
This document provides a user manual for the Solidyne ADA102 Encoder/Decoder, which is designed to transmit stereo audio over IP networks as a studio-to-transmitter link (STL). The ADA102 can operate as either an encoder that converts audio inputs to an IP stream, or a decoder that converts an incoming IP stream to audio outputs. It supports various audio encoding formats including MP3, G.711, and PCM. The unit has balanced audio I/O, an Ethernet port for IP transmission, and optional MPX output. The manual describes hardware connections, software configuration, operation modes, and technical specifications.
The document describes Krypto500 software for analyzing narrowband signals between ELF and SHF frequencies. It offers demodulation, decoding, and parsing tools to interpret signal information. The software supports over 60 protocols and integrates with various collection systems. It provides an intuitive interface and embedded intelligence to assist operators. The document outlines the software's features such as robust collection of signal decoders, spectrum analyzer, and support for hundreds of receivers and digitizers.
This document provides technical specifications for a public address solution for Prototype 3 at Site 6. It includes:
1. An introduction describing the project and reference drawings.
2. A single line diagram showing the components and connections of the system.
3. Bills of quantities listing the required equipment, including an audio matrix, sources, amplifiers, microphones, rack, speakers and cables.
4. Component specifications describing each major piece of equipment, including the audio matrix and sources, amplifiers, microphones, monitor panel, and cabling. Appendices provide datasheets for each component.
105 david e. mello - 7526079 - system and method for data attachment in liv...Mello_Patent_Registry
This patent document describes a system and method for attaching data to live call transfers. A call recipient can append notes or other information about a call being transferred without the caller's knowledge. When the call is transferred, the attached data is simultaneously transmitted to the next recipient. The data can then be viewed, modified, or deleted by subsequent recipients as the call is transferred throughout the communication system. This allows additional context to be provided with each transferred call.
This patent application describes a method for compiling a database that associates virtual channel identifiers (VCIDs) from ATM cells to telephony ports in a telecommunications access system. The method involves sending calling line identification presentation (CLIP) information across an ATM network along with the VCID to a virtual identification line (VIL) port. The CLIP information is read and used to store the association between the VCID and the corresponding telephony port in the database. This allows identification of virtual connections to physical ports, helping with troubleshooting between different parts of the telecommunications system.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document provides a test report of the Icecrypt S3700CHD triple tuner PVR HDTV receiver. It has an elegant front panel with a VFD display and smartcard readers. The back panel features three tuner inputs, HDMI, and network interfaces. It has a quick and responsive interface thanks to its powerful CPU and memory. It supports various satellite settings and protocols. Channel search results in over 1500 TV channels found on HOTBIRD. Built-in multimedia features include YouTube, radio, and a web browser. The receiver provides a user-friendly experience with its three-row channel list, EPG integration, and on-screen manual.
ISP ABC provides ADSL service to subscribers using IP addresses between 205.1.1.2-205.1.1.100. Subscribers use PPPoE authentication with PAP. The ISP uses DHCP to assign IP addresses to subscribers and NAT-overload to allow subscribers on the same LAN to access the internet.
This document contains the configuration of a CPU 1214C DC/DC/Rly programmable logic controller. It includes the configuration of digital and analog inputs and outputs, communication modules, and blocks for counting, timing and communication. The document contains the module configuration, I/O addressing, and block programming to implement control logic for the PLC.
The document provides a test report of the Icecrypt S3700CHD triple tuner PVR HDTV receiver. It has an elegant front panel with a readable display and smartcard readers. The back panel has three tuner inputs, various audio/video outputs, and a network interface. The remote is comfortable and labels are clear. Setup includes language selection, network setup, and video resolution selection. A blind scan found more channels than a standard search. The software allows copying motor settings between satellites and has a user-friendly channel list and settings menu. It also has a variety of multimedia and smart TV apps. In summary, the receiver has excellent hardware and sophisticated but easy-to-use software.
Packet Tracer Simulation Lab Layer3 RoutingJohnson Liu
The document describes setting up routing between two routers. It involves:
1. Configuring WAN interfaces on each router and assigning IP addresses between them.
2. Setting up LAN segments behind each router by configuring LAN interfaces and assigning IP addresses.
3. Enabling static routing on each router to allow routing between the LAN segments since dynamic routing protocols have not been configured yet.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document describes 11 tobacco feeder modules that use RFID and other sensors for monitoring and automation. Each module includes an RFID interrogator, antenna, proximity sensor, communication module, and PLC electronic block for control. The modules will be installed at the Pakistan Tobacco Company factory in Akora Khattak, Pakistan.
The document tests and evaluates the Antiference DTT Headend system for processing digital terrestrial television (DTT) signals. Key features of the system include its ability to:
1) Receive up to 10 DTT channels, filter out unwanted interference, amplify the signals, and move the channels to new frequencies if desired.
2) Maintain high signal quality even when converting adjacent channels, demonstrating the effectiveness of its steep cutoff SAW filters.
3) Be configured and controlled remotely via an embedded web server, allowing for maintenance from outside the installation point.
4) Reliably process real-world DTT signals from an antenna while improving signal-to-noise ratios and only slightly decreasing
The document lists various networking equipment and components located in an office including multiple Hewlett Packard LAN switches, VoIP phones, servers such as app and database servers, a firewall/proxy server, UPS's, tape drives, and drops for phones and wall jacks connected via a Verizon and US-LEC T3, KVM switch, DMZ switch and DSL Extreme drop to a wireless access point. IP addresses and models are provided for some devices.
This document provides information about a 4 channel RF remote controller board that operates at 433/315 MHz with relays. It includes a description of the 10 pin box header pin out and notes that the DIP 8 bit address switch must match between the transmitter and receiver boards. It also provides links to purchase compatible motor driver and receiver boards from the same manufacturer.
The FT-5OR is a compact dual-band FM hand-held transceiver that provides 5 watts of power on 2 meters and 70 cm bands. It has features like 100 memory channels, duplex mode, dual watch, CTCSS and DCS encoding/decoding, ARTS functions, DTMF encoding, and options for digital voice recording and tone signaling with an external keypad. Accessories include various battery packs, battery chargers, carrying cases, and other accessories to enhance its portability and functionality.
Kumar gunjan 20160213 mobile communication securitynullowaspmumbai
The document discusses mobile communication technologies and security issues in GSM. It provides an overview of the evolution of mobile communication from 1G to 2G technologies such as GSM. It describes the GSM architecture including components like the SIM card, authentication and encryption schemes, and GSM channels. It also outlines the basic call sequences for mobile-to-land and land-to-mobile calls. Finally, it discusses some security issues in the GSM network like vulnerabilities to sniffing and man-in-the-middle attacks.
This document describes a 5-zone IP network audio system for offices, schools, and hotels. It includes a touchscreen PC server, IP network audio software, audio sources, IP network paging microphones, IP network audio adapters with amplifiers, IP network amplifiers, ceiling and wall mount speakers, and a LAN switch to set up the system over a network. The system provides multi-room background music, paging to specific or all zones, and two-way intercom capabilities using minimal equipment and wiring for low installation and expansion costs.
This document describes an economy 6 zone sound system solution for factories, offices, and hotels. It includes a 6 zone controller that can play background music from CDs, MP3s, and AM/FM radio. It also has a voice alarm system that can broadcast prerecorded emergency messages through connected speakers. The system supports 6 remote paging microphones to allow zone-by-zone paging. A bill of materials lists the components included in the system, such as amplifiers, speakers, and a remote paging station.
This document describes an 8 zone audio matrix and zone paging system. It includes 8 different music sources that can broadcast to 8 zones, with the ability to expand to 32 zones. The system includes a controller, CD/MP3 player, remote paging microphones, power amplifiers, remote wall plates for volume control, and various outdoor and indoor speakers to cover different zones such as offices, parking areas, and fitness centers. The speaker distribution table at the end provides details on the speaker models, quantities, and power output allocated for each zone.
The document describes the initial configuration of two Cisco routers and one switch. It summarizes the steps taken to configure basic settings such as hostname, passwords, interfaces and IP addresses on each device. It also describes creating VLANs 10, 20 and 30 on the switch and assigning ports to each VLAN.
This document provides a user manual for the Solidyne ADA102 Encoder/Decoder, which is designed to transmit stereo audio over IP networks as a studio-to-transmitter link (STL). The ADA102 can operate as either an encoder that converts audio inputs to an IP stream, or a decoder that converts an incoming IP stream to audio outputs. It supports various audio encoding formats including MP3, G.711, and PCM. The unit has balanced audio I/O, an Ethernet port for IP transmission, and optional MPX output. The manual describes hardware connections, software configuration, operation modes, and technical specifications.
The document describes Krypto500 software for analyzing narrowband signals between ELF and SHF frequencies. It offers demodulation, decoding, and parsing tools to interpret signal information. The software supports over 60 protocols and integrates with various collection systems. It provides an intuitive interface and embedded intelligence to assist operators. The document outlines the software's features such as robust collection of signal decoders, spectrum analyzer, and support for hundreds of receivers and digitizers.
This document provides technical specifications for a public address solution for Prototype 3 at Site 6. It includes:
1. An introduction describing the project and reference drawings.
2. A single line diagram showing the components and connections of the system.
3. Bills of quantities listing the required equipment, including an audio matrix, sources, amplifiers, microphones, rack, speakers and cables.
4. Component specifications describing each major piece of equipment, including the audio matrix and sources, amplifiers, microphones, monitor panel, and cabling. Appendices provide datasheets for each component.
105 david e. mello - 7526079 - system and method for data attachment in liv...Mello_Patent_Registry
This patent document describes a system and method for attaching data to live call transfers. A call recipient can append notes or other information about a call being transferred without the caller's knowledge. When the call is transferred, the attached data is simultaneously transmitted to the next recipient. The data can then be viewed, modified, or deleted by subsequent recipients as the call is transferred throughout the communication system. This allows additional context to be provided with each transferred call.
This patent application describes a method for compiling a database that associates virtual channel identifiers (VCIDs) from ATM cells to telephony ports in a telecommunications access system. The method involves sending calling line identification presentation (CLIP) information across an ATM network along with the VCID to a virtual identification line (VIL) port. The CLIP information is read and used to store the association between the VCID and the corresponding telephony port in the database. This allows identification of virtual connections to physical ports, helping with troubleshooting between different parts of the telecommunications system.
The document provides details about a proposed IP telephony solution for Steel Authority of India consisting of server-based call processing with redundancy and various media gateways. The solution includes three call server stacks for redundancy between the main plant exchange building and backup admin building. It also describes local survivability at remote sites using a passive communication server if the link to the main call servers fails. The solution supports various TDM interfaces and services integrated with the call servers like voice mail, conferencing, and a complaint logging IVR system. Management is provided through an NMS for configuration, alarms, and call billing.
Us3997874 time divided switching and concentration apparatussatyanpitroda
This patent describes a time divided switching apparatus for switching time division multiplexed channels carrying PCM encoded signals. The apparatus includes two data memories - a buffer memory connected to a subscriber channel bus, and an information memory connected to a central office channel bus. A clock and control unit selectively transfers addressing codes between the data memories under control of a local processing unit. This allows the transfer of PCM codes between the memories to effect time divided connections without the need for conventional crosspoints or time switched points.
Programmable command-line interface API for managing operation of a network d...Tal Lavian Ph.D.
A method of managing a network device, includes providing a command-line interface application programming interface (CLI-API) compatible with a command-line interface (CLI) of the network device, receiving instructions from an application that calls one or more routines in the CLI application programming interface, and generating at least one command in response to receiving instructions from the application wherein the at least one command is compatible with the CLI of the network device. An apparatus includes a remote serial command-line interface (RS-CLI) device having a storage device capable of storing instructions, a network port capable of being connected to the network and capable of processing a network protocol stack in addition to receiving the instructions, a serial port capable of processing a serial protocol and capable of being connected to the non-application enabled network device, and a processor capable of processing instructions stored in the storage area of the RS-CLI device.
https://www.google.com/patents/US7039724?dq=US+7039724&hl=en&sa=X&ei=83dSVOCGGYvz8gXSrIHoDA&ved=0CB8Q6AEwAA
Method and apparatus for automatically configuring a network switchTal Lavian Ph.D.
A method and apparatus for automatically configuring a network switch having external network data ports, a processor, and memory. Network data is monitored on the external network data port. Information about the network data traffic is compared to one or more threshold conditions. The network switch is automatically configured if the network data meets one of the threshold conditions. The monitor and configuration functions can be performed by software running on the processor which has been downloaded from an external network maintenance station through a maintenance data port. Information about the network data traffic can be uploaded to the external network maintenance station through a maintenance data port.
https://www.google.com/patents/US6175868?dq=US+6175868&hl=en&sa=X&ei=-MBTVNaoOoXbmgWe6oHADw&ved=0CB8Q6AEwAA
The document specifies requirements for a Physical Access Control System (PACS) including components such as a system server, workstations, software, controllers, card readers, biometric devices, and interfaces with other systems. The PACS must securely identify employees using credentials and provide access control through doors and other devices. It must meet standards for federal information systems and allow for features such as anti-passback, monitoring of devices, reporting, and coordination with security functions.
A method and apparatus for automatically configuring a network switch having external network data ports, a processor, memory, data bus, and coprocessor. Network data is monitored on the external network data port. Information about the network data traffic is compared to one or more threshold conditions. The network switch is automatically configured by the coprocessor if the network data meets one of the threshold conditions. The monitor and configuration functions can be performed by software running on the coprocessor which has been downloaded from an external network maintenance station through a maintenance data port. Information about the network data traffic can be uploaded to the external network maintenance station through a maintenance data port.
https://www.google.com/patents/US6170015?dq=US+6170015&hl=en&sa=X&ei=cMFTVIuBE8eumAW75oGABA&ved=0CB8Q6AEwAA
The document describes a multi-user simulation system that utilizes a processing unit with multiple ports to emulate multiple users of a communications network. The processing unit runs test software and communicates with a central unit via its multiple ports to simulate real-world loading conditions. This allows testing of the central unit while simulating a large number of network connections without needing a separate computer for each connection.
Us4154988 method and means for accessing program memory of a common control t...satyanpitroda
The patent describes a method for providing remote access to the program memory of a stored program telecommunications switching system in a secure manner. It involves setting up an initial limited connection to check for a predetermined access code. If detected, the initial connection is taken down and a new outgoing connection is established by dialing the number of an authorized remote station stored in the program memory. Full access is then granted only when that authorized station answers. This ensures access is only provided to authorized stations, not individuals, maintaining security of the program memory.
The document provides an overview of ZigBee/IEEE 802.15.4 wireless technology. It discusses the need for low-power, low-cost wireless connectivity for applications like home automation, medical devices, and industrial sensors. It describes the ZigBee Alliance's role in developing networking and application standards on top of the IEEE 802.15.4 physical radio specification. Key features of ZigBee networks include low power consumption, large network capacity, low data rates, and flexibility for many applications.
Transport layer protocols provide services like reliable data transfer and connection establishment between applications on networked devices. They address this need through protocols like TCP and UDP. TCP provides reliable, ordered data streams using mechanisms like three-way handshake, sequence numbers, acknowledgments, retransmissions, flow control via sliding windows, and connection termination handshaking. UDP provides simple datagram transmissions without reliability or flow control.
Transport layer protocols provide services like reliable data transfer and connection establishment between applications on networked devices. They address this need through protocols like TCP and UDP. TCP provides reliable, ordered data streams using mechanisms like three-way handshake, sequence numbers, acknowledgments, retransmissions, flow control via sliding windows, and connection termination handshaking. UDP provides simple datagram transmissions without reliability or flow control.
The document discusses the LTE attach call flow process, including:
1. An overview of the evolution of cellular systems and the introduction of 5G.
2. The decoding processes involved in LTE attach which include frequency scanning, decoding the PSS, SSS, MIB, PDCCH, and SIBs.
3. The steps in the LTE attach process such as the random access channel process, sending an RRC connection request, receiving an RRC connection setup, and responding with an RRC connection setup complete message.
This patent application describes methods and systems for evaluating quality of service in an IP telephony network using call forwarding. A test call is generated and forwarded between network devices to exchange a test signal. The quality of service of the network is then evaluated based on characteristics of the test signal.
Interface method and system for accessing inner layers of a network protocolTal Lavian Ph.D.
A method of performing network communications includes receiving a datagram for transmitting information over a network, selecting a layer in a network protocol stack to establish communication over the network using an inner layer application programming interface (IL API), establishing an inner layer socket at the selected network layer using the IL API without accessing other layers in the layered network protocol stack, and transmitting the datagram packet over the selected layer using the inner layer socket.
https://www.google.com/patents/US6845397?dq=US+6845397&hl=en&sa=X&ei=zrxTVJv8C-GsmAXaoYLwCQ&ved=0CB0Q6AEwAA
VOIP allows voice calls over the internet using IP packets. It uses protocols like H.323 and SIP to set up and manage calls. H.323 uses terminals, gateways and gatekeepers to make calls. SIP is a lighter alternative that uses messages like INVITE, ACK and BYE. Both protocols support RTP for carrying voice data and have grown significantly with telecom companies now offering VOIP services.
This document discusses various topics related to WAN technologies including backup and restoration of Cisco IOS images, resolving hostnames, WAN connection types, encapsulation protocols, and an overview of technologies like ISDN, Frame Relay, ATM, and PPP. Specific configuration examples are provided for setting up PPP and CHAP authentication between two routers over a serial interface.
Systems and methods for communicating with an interactive voice response systemTal Lavian Ph.D.
Embodiments of the present invention provide a communication device. The communication device comprises a processor. Further, the communication device comprises a memory coupled to the processor. The memory comprises a database comprising at least one visual Interactive Voice Response (IVR) menu associated with at least one IVR system. Further, the memory comprises instructions executable by the processor for sending a first section of a data packet to a second communication device. The first section comprising first information is sent based on a visual IVR menu associated with the second communication device. Further, the memory comprises instructions executable by the processor for receiving an acknowledgement message from the second communication device based on the first section of the data packet. Furthermore, the memory includes instructions executable by the processor for sending a second section of the data packet to the second communication device based on the acknowledgement message. The second section comprises second information.
Similar to 70 laura s. schultz - 6760427 - computer telephone (ct) network serviing multiple telephone switches (20)
134 mark s. thompson - 8449349 - elevator load bearing member having a jack...Mello_Patent_Registry
Mark S. Thompson, William A. Veronesi, John Pitts, Ary O. Mello, Hugh J. O'Donnell, John P. Wesson, William C. Perron, Douglas E. Logan, Kathryn Rauss Sherrick, Richard Phillips, Peter Schreiner, Pierangelo Jotti - Elevator Load Bearing Member Having a Jacket with at Least One Rough Exterior Surface
133 stephanie mello - 8439759 - system and method of facilitating external ...Mello_Patent_Registry
Stephanie Mello, Deepak Polamarasetty, Wendy Yu - System and Method of Facilitating External Notifications for Events that Occur in a Plurality of Different Virtual Spaces
129 andrew z. fire - 8283329 - genetic inhibition of double-stranded rnaMello_Patent_Registry
Andrew Z. Fire, Stephen A. Kostas, Mary K. Montgomer, Lisa Timmons, SiQun Xu, Hiroaki Tabara, Samuel E. Driver, Craig C. Mello - Genetic Inhibition of Double-Stranded RNA
128 phillip d. zamore - 8232260 - in vivo production of small interfering r...Mello_Patent_Registry
Phillip D. Zamore, Juanita McLachlan, Gyorgy Hutvagner, Alla Grishok, Craig C. Mello - In Vivo Production of Small Interfering RNAs that Mediate Gene Silencing
126 daniel j. nelson - 8180712 - methods and apparatus for determining whet...Mello_Patent_Registry
Daniel J. Nelson, Brian Scott Mello, Luc Zio, David James Croy - Methods and Apparatus for Determining Whether a Media Presentation Device is in an On State or an Off State
125 robert f. bigelow, jr. - 8100754 - gaming system having multi-player wh...Mello_Patent_Registry
Robert F. Bigelow, Jr., Christiaan R. Champagne, Dwayne A. Davis, Damien C. Ennis, Michael P. Khamis, Marcos A. Mello, David N. Myers, Michael M. Oberberger, David M. Palmer - Gaming System Having Multi-Player Wheel Bonus Game and Characteristic Selection
123 goldino alves - 7971687 - elevator belt assembly with noise reducing gr...Mello_Patent_Registry
Goldino Alves, Ary Mello, Xiaodong Luo, Bill Perron, Hugh O'Donnell, Paul von Hardenberg, Mark Marler, John Pitts, Randy Roberts, Hubert E. Goeser, Christoph Bederna - Elevator Belt Assembly with Noise Reducing Groove Arrangement
122 thomas s. wiggin - 7963242 - anchor containing a self deploying mooring...Mello_Patent_Registry
Thomas S. Wiggin, David A. Sharp, Marc A. Brown, Christopher C. Mello, Frank H. Hitzke, David A Giroux, Douglas L. Veilleux II, Emily J. Pikor, Edward M. Gaborlaut Jr. - Anchor Containing a Self Deploying Mooring System and Method of Automatically Deploying the Mooring System from the Anchor
119 phillip d. zamore - 7893036 - in vivo production of small interfering r...Mello_Patent_Registry
Phillip D. Zamore, Juanita McLachlan, Gyorgy Hutvagner, Alla Grishok, Craig C. Mello - In Vivo Production of Small Interfering RNAs that Mediate Gene Silencing
117 mark s. thompson - 7883634 - elevator load bearing member having a jack...Mello_Patent_Registry
Mark S. Thompson, John P. Wesson, William A. Veronesi, Hugh J. O’Donnell, John Pitts, William C. Perron, Ary O. Mello, Kathryn Rauss - Elevator Load Bearing Member Having a Jacket with at Least One Traction-Enhancing Exterior Surface
115 steven m. mello - 7766223 - method and system for mobile servicesMello_Patent_Registry
This patent describes a method and system for providing mobile financial services using a mobile device. The system associates a unique identification number of a mobile device, such as an MDN or MEID, with a user's financial account. Transactions are conducted using the mobile device. Security authentication involves multiple factors including the device ID, passwords, and voice biometrics. The financial institution has ownership rights over the mobile device including the ability to disable it.
113 phillip d. zamore - 7691995 - in vivo production of small interfering r...Mello_Patent_Registry
Phillip D. Zamore, Juanita McLachlan, Gyorgy Hutvagner, Alla Grishok, Craig C. Mello - In Vivo Production of Small Interfering RN's that Mediate Gene Silencing
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
70 laura s. schultz - 6760427 - computer telephone (ct) network serviing multiple telephone switches
1. (12) United States Patent
Schultz et al.
(54) COMPUTER TELEPHONY (CT) NETWORK
SERVING MULTIPLE TELEPHONE
SWITCHES
(75) Inventors: Laura S. Schultz, Gilbert, AZ (US);
Mark J. Dancho, Chandler, AZ (US);
David Mello, Chandler, AZ (US)
(73) Assignee: Inter-Tel, Inc., Tempe, AZ (US)
( *) Notice: Subject to any disclaimer, the term of this
patent is extended or adjusted under 35
U.S.C. 154(b) by 460 days.
(21) Appl. No.: 09/894,047
(22) Filed:
(65)
Jun.28,2001
Prior Publication Data
(51)
(52)
(58)
(56)
US 2003/0002647 A1 Jan. 2, 2003
Int. Cl? ................................................. H04M 7/00
U.S. Cl. ................... 379/225; 379/219; 379/220.01
Field of Search ........................... 379/88.13, 88.14,
379/88.17, 142.D7, 207.12, 207.14, 211.02,
220.01, 221.06, 265.02, 265.09, 219, 225
References Cited
U.S. PATENT DOCUMENTS
4,527,012 A
4,653,085 A
5,339,356 A *
5,414,762 A
5,479,487 A
5,499,289 A
5,546,452 A
7/1985
3/1987
8/1994
5/1995
12/1995
3/1996
8/1996
Caplan
Chan
Ishii ........................... 379/234
Flisik
Hammond
Bruno
Andrews
111111 1111111111111111111111111111111111111111111111111111111111111
US006760427B2
(10) Patent No.: US 6,760,427 B2
Jul. 6, 2004(45) Date of Patent:
5,848,143 A
5,987,102 A
6,011,844 A
6,021,428 A
6,026,087 A
6,091,808 A
6,094,479 A *
6,154,465 A
6,181,788 B1
6,295,350 B1 *
6,359,711 B1 *
6,359,892 B1 *
6,381,324 B1 *
6,393,017 B1 *
6,453,035 B1 *
6,480,595 B1 *
6,584,110 B1 *
6,636,587 B1 *
* cited by examiner
12/1998
11/1999
1!2000
2/2000
2/2000
7/2000
7/2000
11/2000
1!2001
9/2001
3/2002
3/2002
4/2002
5!2002
9/2002
11/2002
6/2003
10/2003
Andrews
Elliott
Uppaluru
Miloslavsky
Mirashrafi
Wood
Lindeberg et a!. ..... 379/220.01
Pickett
Miloslavsky
Schreyer et a!. ....... 379/221.01
Cole et a!. .................... 398/58
Szlam ........................ 370/401
Shaffer et a!. ......... 379/211.02
Galvin et a!. ............... 370/352
Psarras et a!. ......... 379/221.08
Hamano ..................... 379/225
Mizuta et a!. .............. 370/401
Nagai eta!. ............. 379/88.14
Primary Examiner-Bing Bui
(74) Attorney, Agent, or Firm-Michelle Whittington
(57) ABSTRACT
An enhanced computer telephony (CT) network design for
a private branch exchange (PBX) telephone system network
improves the computer telephony interface (CTI) capabili-
ties of the network. Bi-directional data from remote tele-
phone switching nodes of different PBX systems, each using
a common software application, is combined into a single
data stream by the network to simplify control of the remote
PBX systems. Commands to, and events received from, the
different PBX switching nodes are combined by use of a
gateway to automatically and transparently route digital
information for control of the correct remote system node.
20 Claims, 5 Drawing Sheets
2. U.S. Patent Jul. 6, 2004 Sheet 1 of 5 US 6,760,427 B2
44
GATEWAY SITE
60
LOCAL AREA NETWORK
66
64
62 LISTENING IP SOCKET
SOCKET1 •••
70
=0 =- -- -- -- -- -
CTI PROCESSOR
Fig. 1
3. U.S. Patent Jul. 6, 2004 Sheet 2 of 5
START GATEWAY PROCESSING
8 0
+
REPEAT FOR EACH PBX SYSTEM ~ 82
NODE'S IP ADDRESS ON FILE
+
QUERY THE NODE FOR ~
CONFIRMATION OF OPERATING
84
STATUS AND SOFTWARE VERSION
•QUERY NODE FOR SPECIFIC DEVICE ID'S 86
•GATHER DEVICE ID'S FOR ~ 88
SYSTEM-lEVEL DEVICES IN
THE GATEWAY DATABASE
•UPDATE GATEWAY'S 1------90
TRANSlATION DATABASE
•INFORM PBX NODE THAT AN OAI ~ 92
GATEWAY HAS BEEN SUCCESSFULlY
CONNECTED
•BEGIN MONITORING PBX NODE'S ~ 94
SYSTEM EVENTS
•ASCERTAIN ANY SPECIAl MODES OF
_...___ 96
OPERATION FOR THE PBX NODE
•~---RE_PEA_T_BL~OC_K(_EN_D)__~~97
•PBX NODES ARE READY
FOR PROCESSING
Fig. 2
98
US 6,760,427 B2
4. U.S. Patent Jul. 6, 2004 Sheet 3 of 5 US 6,760,427 B2
START SOFTWARE APPLICATION PROCESSING
100
~
OAI SOFTWARE APPLICATION CLIENTS LOGIN TO THE OAI GATEWAY SERVER
102
tEACH SOFTWARE APPLICATION BEGINS BY SENDING DEVICE MONITOR REQUESTS 104
~
INTERVENE AND DIRECTLY CONFIRM ANY DEVICES ALREADY BEING MONITORED 106
~
DEVICE# :NODE# ~108
MAPPING
~
ISSUE TRANSLATED DEVICE "EXTENSION NUMBERS" FOR INITIALIZATION COMMANDS
110
~
APPL#: COMMAND ID ~112
MAPPING
~
SEND SOFTWARE APPLICATION CONFIRMATIONS TO PBX NODES
114
t
INITIALIZE COMMAND SEQUENCE NUMBERS AND ASSOCIATE WITH SOFTWARE ~ 116
APPLICATIONS
~
INITIALIZE OPERATION OF [GATEWAY<> PBX NODE] r--118
SEQUENCE NUMBER VERIFIER
t( SOFTWARE APPLICATION INITIALIZATION COMPLETE
120
Fig. 3
5. U.S. Patent Jul. 6, 2004 Sheet 4 of 5 US 6,760,427 B2
APPLICATION(S) SENDS COMMAND TO THE GATEWAY
130
INVOKE APPROPRIATE CALl HANDLING ROUTINE(S)
132
ISSUE APPROPRIATE CALl CONTROl COMMAND(S)
134
DEVICE# :NODE# r--136
MAPPING
COMMAND IS SENT TO THE APPROPRIATE PBX SYSTEM NODE &DEVICE
138
COMMAND IS PROCESSED AND ACKNOWlEDGED BY THE PBX NODE'S DEVICE 140
PBX NODE SENDS ACONFIRMATION MESSAGE TO THE GATEWAY
141
GATEWAY DETERMINES WHICH APPLICATION IS WAITING ~ 142
FOR THE COMMAND CONFIRMATION THROUGH ALOOKUP TABlE
APPLICATION(S) RECEIVES THE ACKNOWLEDGMENT
144
BASIC CAll CONTROl SEQUENCE IS COMPlETE
146
Fig. 4
6. U.S. Patent Jul. 6, 2004 Sheet 5 of 5
PBX NODE SENDS AN ASYNCHRONOUS
EVENT TO THE GATEWAY
YES
NO
164
GATEWAY DETERMINES WHICH (IF ANY) CTI
APPLICATIONS WANT TO RECEIVE THE EVENT
GATEWAY SENDS THE EVENT TO ALL
APPROPRIATE CTI APPLICATIONS
EVENT HANDLING SEQUENCE
IS COMPLETE
Fig. 5
US 6,760,427 B2
160
162
GATEWAY UPDATES THE
DEVICE# :NODE#
MAPPING TABLE TO
REFLECT THE CHANGE
166
168
7. US 6,760,427 B2
1
COMPUTER TELEPHONY (CT) NETWORK
SERVING MULTIPLE TELEPHONE
SWITCHES
BACKGROUND
Customer owned private branch exchange (PBX) systems
are in widespread use. PBX systems adequately serve a large
number of stations or telephone extensions in a single
location. Frequently, however, customers have multiple
locations, each having a PBX system or hybrid key system
associated with it. These systems typically are controlled by
computer-telephone integration (CTI) processors into vari-
ous types of networks.
An early communications switching concept was dis-
closed in U.S. Pat. No. 4,527,012 to allow telephone call
processing to be carried out by a host computer connected to
a telephone system. The host computer viewed the telephone
system as a peripheral device. The host computer then
controlled the switching system with a series of high level
commands exchanged between the switching system and the
host computer. The commands were referenced to physical
system ports to control the operation of those ports directly,
based on the current call processing state. The connection of
the host computer to the telephone system was accomplished
by using a serial port (such as the RS-232 port). The system
of this patent, however, and systems similar to it, are not
inherently capable of connections or control using a com-
puter network like TCP/IP because of the electrical network
interface limitations of serial ports. In addition, computer
programs of the type disclosed in the '012 patent must be
aware of each equipped physical system port, and maintain
2
The system of the patent, however, provides no functional
support for an application software developer to address the
needs of multiple PBX systems, or for expanded networks of
PBX systems in multiple locations. In either of these cases,
5 the application software must be enhanced to allow it to be
aware of, and to properly control, multiple PBX nodes.
Because the application software resides at the client level,
it can only control one call per work station and cannot
address the needs of the entire system. An approach to
10
resolve problems associated with routing calls to geographi-
cally distributed PBX nodes is disclosed in U.S. Pat. Nos.
5,546,452 and 5,848,143. The systems of these patents use
a central controller with global authority to allow resident
software to route calls appropriately to agents who are
15
connected at various locations within the PBX network. The
systems disclosed in these patents require the central pro-
cessor to be equipped with routing and management soft-
ware specifically designed for the expected call processing
activity. These systems do not facilitate the transposition of
20
a generic computer telephony application from a single PBX
to networked PBX environment, and must take full control
of the PBX network by correlating the identities of logged-in
agents with a physical node and port locations in the PBX.
As a consequence, the approach used in the systems of these
25
patents requires a facility which must undergo continuous
parallel maintenance to keep up with PBX user changes.
U.S. Pat. No. 5,479,487 discloses a system for allowing a
centrally located scripting language to control a call as it
passes between functional partitions within a call center
30 system. The system creates a scripted development environ-
ment for distributed call processing products; but it does not
address cases where there is a distributed network of PBX
systems which require computer telephony control from
a separate cross reference to correlate ports functionally to
the assigned extension numbers, trunk numbers and so forth. 35
some centralized application.
U.S. Pat. No. 6,011,844 is directed to a system for saving
long distance toll charges. The system uses interconnected
computer gateways to coordinate the switching of calls
between network call centers. Each of these call centers
receives telephone traffic according to methods designed to
provide the lowest cost handling of each call, and only
"bridges in" calls over the long distance network when
A different approach is disclosed in U.S. Pat. No. 4,653,
085. In the system of this patent, computer telephony is
implemented by attaching an adjunct processor to an asso-
ciated telephone system port and sending control informa-
tion for calls requiring additional call processing using a 40
data exchange with the adjunct computer to simulate the
actions of a connected station. The system of this patent
requires all telephone calls, which are to be handled accord-
ing to the stored program in the adjunct processor, to be
transmitted by the telephone system to the port associated 45
with that adjunct processor. The adjunct processor then
sends direct commands back to the telephone system indi-
cating the disposition of the call by directly sending a
command to the port being served. Consequently, the
adjunct computer simulates the behavior of a human opera- 50
tor. This system is limited by the volume of traffic which can
necessary. The system of this patent is narrowly focused on
reducing call traffic over the long distance network which
may be handled in a local call center. The system is not
capable of centralized consolidation of events arriving from
different connected PBX nodes.
With the advent of intelligent networks within the public
telephone system, U.S. Pat. No. 6,094,479 is directed to a
solution which allows for the public network service control
element to link with a PBX located within a customer's
private network by using a gateway between the private and
public network segments. The gateway, however, is limited
in its functionality because it simply provides a standard
means to link between two networks, and does not address
be processed by a single operator (adjunct computer), and
therefore it is not suitable for system-wide call handling
tasks without terminating multiple ports to simulate the
activities of multiple human operators. 55 the problems created when a customer makes the transition
from single to multiple PBX nodes within a private network.U.S. Pat. No. 5,414,762 is directed to a system for
providing computer control to a variety of PBX systems. In
the system of this patent, a controller is used to allow one or
more computers from a group of computer clients to send
commands to a PBX by way of a server computer, and also 60
to receive status information from the connected PBX. A
converter which is specific to a particular PBX manufacturer
is provided to allow the brand of PBX to be changed without
having to modify the communications protocol, and
therefore, the application software, that the computer client
contains. The primary focus of this system is to allow the
same client software to control a variety of PBX platforms.
U.S. Pat. No. 6,181,788 is directed to a system for
achieving uniform control of mixed platforms in telephony.
Not all PBX manufacturers use the same protocols to
implement computer-telephone integration (CTI) interfaces
to a control computer. This patent is directed to a solution to
solve software interface problems for customers who have a
network of mixed types of PBX systems. The solution
proposed in the '788 patent is to use the CTI processors to
65 convert the protocols from each PBX and then network
together the CTI processors by way of a peer-to-peer net-
work. Each CTI processor contains its own software with
8. US 6,760,427 B2
3
some form of messaging used to loosely link the various
systems at each site. This patent is directed to the problem
of mixed or different PBX system types. The patent does not
address the problem of system scaling (that is, adding
additional PBX's to a customer's system), and control of
networked systems using a common software application.
It is desirable to enhance the CTI functionality of a PBX
network having multiple nodes by combining bi-directional
data from remote telephone switching nodes (different PBX
systems) into one data stream to simplify the control of the
remote system.
SUMMARY OF THE INVENTION
4
a block diagram illustrating the inclusion of a CT gateway
processor as part of the system. As shown in FIG. 1, four
separate PBX systems 10, 20, 30 and 40, all using a common
software application, are employed as part of a PBX network
5 for a single user, such as a business with offices in four
different locations. Each of the PBX systems is connected
with the public switched telephone network (PSTN), shown
as 12 for the PBX 10, and includes a plurality of telephone
devices or locations, shown as 14 for the PBX 10, each of
10 which are reached by a particular extension number. For the
PBX systems 20, 30 and 40, the PSTN links are shown as 22,
32 and 42, respectively; and the telephones associated with
the individual PBX's 20, 30 and 40 are indicated as 24, 34
It is an object of this invention to provide an improved
system and method for serving multiple telephone switches.
15
and 44, respectively.
In the system shown in FIG. 1, all of the different PBX
locations are linked through a wide area network (WAN) 50,
through a site router 52, for communication with one
another. For the PBX 10, the local interconnections to a local
area network (LAN) 60 are indicated; and the LAN 60 is
It is another object of this invention to provide an
improved method and system for a private branch exchange
(PBX) telephone system network.
It is an additional object of this invention to provide an
improved interface network linking a plurality of PBX
systems over a wide area network.
It is a further object of this invention to provide an
improved system and method employing computer tele-
phony interface (CT) for a private branch exchange (PBX)
telephone system network using a common software appli-
cation for linking each of the PBX exchanges together in a
transparent manner to users at any of the exchanges.
20 shown as utilizing a computer-telephony integration (CTI)
applications processor 62 associated with it for executing
applications for communicating between the different PBX
systems on the network over the WAN 50.
In accordance with a preferred embodiment of the
invention, a computer telephony interface CT) for a private
branch exchange (PBX) telephone system network utilizes a
gateway processing system located on an adjacent computer.
Each of the PBX systems has a unique address; and they are
linked together through a wide area network (WAN), local
area network (LAN), or the Internet to the Gateway pro-
cessing system. The processing system includes translation
tables for the addresses, as well as individual station exten-
sions; so that calls originating from any one of the PBX
systems on the network and directed to a station on any of
the other PBX systems on the network pass their event (call 40
progress) notification through the gateway where it is trans-
lated and directly sent to all users (applications) that
requested the information in a manner which is transparent
Also illustrated in FIG. 1 is a CTI application desktop and
25
telephone 64 connected to the LAN 60, which can be linked
to and through the PBX 10 in a conventional manner. Other
system devices with which the computer telephony interface
(CT) gateway processor 66 communicates also may be
included; and stub-outs showing potential connections to
30
such other devices on the LAN bus 60 are indicated in FIG.
1. It should be noted that communications through the CT
gateway 66 to different PBX nodes, such as the remote
nodes 20, 30 and 40 are effected by using a standard site
router device 52 to send and receive TCP/IP packets in data
35
transfers in a conventional manner.
The operating software of the system control arrangement
which is effected by the CT Gateway 66 constantly accesses
and updates information from a common translation data-
base as data arrives by way of the WAN 50 or LAN 60 on
behalf of each of the switching system nodes 10, 20, 30, 40.
to the users of the system. Thus, the users are not aware that
more than one PBX system is involved in the call event. The 45
system also allows for changing the data in the translation
table to allow relocation of a device associated with a
particular extension number to any one of the PBX systems
Each switch node has a respective socket 74 which it uses
for communications to the CT Gateway 66. The Gateway
stream process 70 continuously polls these sockets 74 in the
event that the switching node has sent data to it. All of this
is placed into a resulting consolidated event data stream
made available to one or more CT software applications
automatically. This is illustrated generally in the diagram of
FIG. 1 by the interconnections from the listening or incom-
in the network without requiring individual programming at
that, or any other, network.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic diagram of a preferred embodiment
of the invention;
FIG. 2 is a flow chart useful in explaining the initialization
of the system;
FIG. 3 is a flow chart illustrating software application
processing;
50 ing IP sockets 68 to the Gateway stream process 70.
Although the system described immediately above refers
to specific "sockets", rather than relying on actual physical
connections employed by previous product designs, the CT
Gateway 66 only requires that a standard TCP!IP network
55 connection be available between the connected devices. This
allows a network installer to quickly verify that all required
devices are properly interconnected into the network logic
without having to interconnect complicated panels of physi-
FIG. 4 is a flow chart illustrating
system shown in FIG. 1; and
an operation of the 60
cal RS-232 ports. The end result is an interconnection
topology based on standard TCP/IP networks recognized by
the computer industry. The application-level information
FIG. 5 is a flow chart illustrating
system shown in FIG. 1.
an operation of the
DETAILED DESCRIPTION
Reference now should be made to the drawings, which
illustrate a preferred embodiment of the invention. FIG. 1 is
65
present within the TCP!IP packets acts as a transport for the
majority of the communication network infrastructure of the
preferred embodiment of the invention illustrated in FIG. 1.
In order to transparently program and/or control each of
the various telephony devices, such as 14, 24, 34, 44 or
"extensions" used with any one of the PBX systems 10, 20,
9. US 6,760,427 B2
5
30 or 40, an extension number and node translation data base
memory 72 is provided for mapping all of the extensions in
all of the PBX systems 10, 20, 30 and 40 into a single
random access memory 72. Once this is done, the specific
extension number as well as the IP address for the PBX 20, 5
30, 40 or 10 with which it is associated, is stored in the
memory 72. A link from a calling party at any of the PBX
system nodes is made by the Gateway stream process 70
through corresponding output node "sockets" 74, equal in
number to the number of PBX systems 10, 20, 30, 40 (or
10
whatever number) used in the completed network. Once
again, while specific reference is made to "sockets" on the
output side of the process 70, it should be noted that standard
TCP/IP network connections are utilized to effect the trans-
fer of data from the CT Gateway 66 back onto the LAN 60,
and then on through the site router 52 and the WAN 50, if 15
necessary, to the desired location.
In order for the Gateway to provide data to applications,
the CT Gateway 66 must be integrated into the user's
network to provide services to this network. The CT Gate-
way must then be started, either manually or automatically, 20
as determined by the user. The processing which occurs
during startup is illustrated in FIG. 2. Prior to this
initialization, the user is required to configure valid IP
address and ports for each of the PBX systems to be used,
as well as configuring the master or listening socket 68 for 25
the gateway. This master socket is used by the Gateway to
listen for clients requesting connections to the server. Upon
commencing initialization, the gateway connects to each
switch node using the respective socket 74. The processing
begins as shown on FIG. 2 "Start Gateway Processing" 80. 30
It should be noted that the following initialization may be
repeated for each PBX system node's IP address. As such
"repeat" blocks 82 and 97 are included to illustrate that
initialization may be effectuated for each PBX system. The
gateway first obtains the operating status and software
version of the switching node at 84. It will then query the 35
individual device identifiers for the node at 86 placing each
device entity obtained into the Gateway database 88 and 90.
The gateway will inform the PBX system node of the
gateway presence at 92 and begin monitoring the node for
any system event data at 94. The gateway may then also 40
ascertain if any of the PBX systems include a special mode
of operation, e.g. diagnostic. login, monitoring, perfor-
mance. etc. at 96. It will also configure the PBX system node
so that the data it sends is in the format required by the
gateway. The PBX nodes are now ready for processing at 98. 45
Once all of the PBX systems have completed this
initialization, the Gateway will begin to listen for applica-
tions request for service through the master socket 68. The
client application on the CTI application desktop 64 will
attempt to establish communication with the Gateway by 50
sending a logon message to the gateway by way of the
master socket 68. Once the Gateway has recognized this
application, it will send a "power up" response indicating it
is ready to begin servicing the client's application on the CTI
application 64. The logon message sent by the client must 55
take the form of:
<ByteCount><Type of Socket><Password>OxOO[<AppName>Ox
00]
6
Upon rece1vmg the Power Up response from the CT
Gateway 66, the application on the desktop 64 is free to send
any commands to allow it to perform its task. In most cases
this will require the application to begin monitoring a device
or set of devices. This results in monitor start request
arriving at the CT Gateway 66 from the application desktop
64. These commands are processed and are routed to the
proper PBX node socket 74 by determining which device is
affected in the command and mapping it to the correspond-
ing PBX node using the gateway database 72. In the event
that the gateway determines that a monitor already exists for
a particular device, it will not need to forward the command
to a PBX node, but simply creates a suitable response for the
application on desktop 64 immediately. In the event the
device is not yet monitored, a command is sent to a PBX
node which will shortly thereafter send a command response
back to the socket 74. The Gateway receives this command
response and determines which application the response is
destined for and routes it to the application on the desktop
64 only.
In the event the monitored device generates an event, the
event is routed to the socket 74, which is polled shortly
thereafter by the Gateway stream process 70. At this point
the Gateway 66 determines the device and type of event and
then determines if any application will require this event.
The event then is forwarded to any interested applications,
such as those on the desktop 64.
The system also routinely polls the application sockets 68
looking for commands to send to the phone system. The
commands are processed and the affected extension infor-
mation is used along with the database 72 to determine to
which switch socket(s) 74 connection the command is to be
routed. After the command(s) is sent and acknowledged by
the switch node which posts a response at socket 74, the
Gateway then subsequently routes the response to the asso-
ciated application which originated the command.
In the course of normal processing, as data arrives at a
socket 74 for each PBX node, the system uses the sequence
number of the message to determine if there has been any
data lost between messages. In the event that there has been
lost data, the Gateway 66 generates an error event to each
application which uses the specified node and once again
performs initialization processing on that node. Once the
node completes re-initialization the application processing
can recommence. While the node is not responding, the
application is unable to route commands to the switching
system (unless they are node aware, as described
subsequently).
In special cases, an application can command the Gate-
way 66 to let it be more intelligent about the topography of
the switching environment. It allows the application to know
what nodes are present, as well as to be less affected by the
failure of any one node. This mode of operation is referred
to as node awareness and allows a single node failure not to
adversely affect the behavior of the external application. In
the event of loss of communication at any single node, the
Gateway 66 sends the application a link status failure and
attempts to recommence communication with the failing
phone system node. The application is still able to send
commands to all of the other operating nodes. This is in stark
contrast to a non-node aware application, which cannot
where:
ByteCount---(the byte count for the data being passed)
Type of socket-passed as hex 87 (Ox87)
Password-up to 15 ASCII characters
60 communicate with any node until communication is restored
to the failing node.
Appname-up to 32 ASCII characters. This is optional,
but it is useful in knowing which socket connection is
connected to which application when running multiple
applications.
In the course of normal processing, extensions can be
added or deleted from a switching node. These changes
result in extension change events sent to the socket 74 for the
65 associated PBX node. Upon polling the socket, the gateway
66 adjusts the database 72 with respect to the extension
change event.
10. US 6,760,427 B2
7
FIG. 3 is an example of one manner of programming
which illustrates an operation of the system to complete
initialization at 100. The system may include a login pro-
cedure to the gateway server at 102. The system, at 104,
allows each software application to internally initiate and 5
begin sending device monitor sequences to open communi-
cations links with associated devices. If some devices
already are begin monitored, confirmation is made at 106;
and then the device numbers (telephone extensions) and the
node numbers mapping is done at 108. After the device and 10
nodes mapping, the system issues translated device "exten-
sion numbers" for initialization commands at 110; and these
are provided with application numbers and command ID
mapping at 112. Software applications then are confirmed to
the PBX nodes at 114; and command sequence numbers are 15
initialized and associated with the software applications at
116. The operation of the sequence number verifier, that is
the Gateway and the PBX node, are accomplished at 118;
and the software application initialization is completed at
120. The system is now prepared to operate as a commu- 20
nications link which is transparent to the users at each of the
different PBX nodes 10, 20, 30 and 40.
As processing continues in an example of a typical
gateway process, as shown in FIG. 4, the Gateway monitors
the polled data arriving from each CTI application. If the 25
Gateway receives a command from an application (system
event) at 130, the Gateway 66 invokes acceptable call
handling routines at 132, and issues appropriate call control
commands at 134 in accordance with the standard PBX
operating procedures. These commands are supplied to the 30
device number and node number mapping for translation at
136, and from there, the command is sent to the appropriate
PBX system node and device, as shown at 138. This means
that the system node IP socket 74 (FIG. 1) which is specific
to the device (extension number) is selected; and the infor- 35
mation is transmitted back out through the LAN and through
the site router 52 through the WAN 50 to the appropriate
selected one of the PBXs 10, 20, 30 or 40 which has that
particular extension 14, 24, 34 or 44 associated with it. In the
example shown in FIG. 4, the command is processed and 40
acknowledged by the PBX node at 140 in a conventional
manner, and a confirmation at 141 is sent back through the
Gateway 66 which determines through a lookup table at 142
which CTI application is waiting for this command confir-
mation message. The Gateway 66 sends the command 45
confirmation message at 142 to the appropriate CTI appli-
cation at 144. At 146, the basic call control sequence is
complete; and a call is effected between the calling and
called parties without either of the parties knowing whether
they are operating within a single one of the PBX systems 50
10, 20, 30 or 40, or whether the call has been handled from
one system, through the Gateway, to another. As far as the
individual parties are concerned, the call appears to be
handled entirely within the same PBX.
As processing continues in conjunction with the sequence 55
described in FIG. 4, the CT Gateway also monitors the
polled data arriving from each of the PBX nodes at 160
(FIG. 5). If the event received indicates a system change at
161, the Gateway 66 reads the nature of the update at 160
and makes changes to the mapping provided by the specific 60
device number (extension number) and PBX node device
translation database at 162, and supplies this information to
the device number and node number mapping memory.
These changes are made automatically.
The changes also occur on an ongoing basis; and once a 65
change has been committed to the database at 162, the
translation of packets from that point on is done according
8
to the revised translation mapping information stored in the
database (72 of FIG. 1). These changes occur continuously
and transparently to the software applications that are uti-
lizing the gateway in the manner described above in con-
junction with FIG. 4. The overall process is designed for the
applications software to be able to complete the processing
of the appropriate call event and continue to provide real
time control of the selected devices connected to each PBX
node. If the event does not reflect a system change, or once
the system change update has been completed by the
Gateway, the Gateway then determines which, if any, CTI
applications want to receive the event at 164. The Gateway
determines this by looking at which monitor sessions each
CTI application has initiated. The Gateway sends the event
to all appropriate CTI applications through the LAN at 166.
The event handling sequence is complete at 168.
The system can be programmed differently to employ the
Gateway 66 in operations other than the ones shown by way
of example in FIGS. 3, 4 and 5. Other versions of the system
may incorporate telephone switches that purely exist within
the computer servers. The network topologies for such
systems are capable of combining the functions of the CT
Gateway process into one (presumably a "main" system)
PBX node to eliminate the need for a separate server to
house the CT Gateway process. Then, any CT application
will be able to login to the main phone system server to
obtain a consolidated data stream from the entire network of
PBX nodes. Such a version further simplifies the network
topology and makes processing more efficient.
The foregoing description of the preferred embodiment of
the invention is to be considered as illustrative and not as
limiting. Various changes and modifications will occur to
those skilled in the art for performing substantially the same
function, in substantially the same way, to achieve substan-
tially the same result, without departing from the true scope
of the invention as defined in the appended claims.
What is claimed is:
1. A computer telephony (CT) network for a private
branch exchange (PBX) telephone system network includ-
ing in combination:
a plurality of private branch exchange (PBX) systems
using a common software application and linked
together through a network, each of the PBX systems
having a unique address;
a gateway processing system located on the network with
one of the plurality of PBX systems, the gateway
processing system having a plurality of application
sockets with each application socket corresponding a
CT application;
a memory in the gateway processing system for storing a
translation table identifying extension numbers on each
of the PBX systems and combining these extension
numbers with the unique addresses for each PBX
system to provide mapping information for sending a
command from any of the application sockets to a node
socket for the PBX system, the node socket represent-
ing a physical location for an affected party extension
number.
2. The CT network according to claim 1 wherein the
gateway processing system receives a system event from
one of the plurality of PBX systems through the correspond-
ing node socket for that one of the PBX systems, with the
system event processed by the CT network applied to the
translation table in the memory.
3. The CT network according to claim 1 further including
means coupled with the gateway processing system to
change the mapping of an extension number and address in
11. US 6,760,427 B2
9
the memory whenever changes in the physical location of an
extension number occurs.
4. The CT network according to claim 3 wherein the
changes supplied to the memory are received from any one
of the plurality of PBX systems where the change is to be 5
effected.
5. The CT network according to claim 1 wherein the
gateway processing system receives a system command
from one of the CT applications through the corresponding
socket for that application, with the system command 10
applied to the translation table in the memory, whereupon
the command is processed and provided to the socket for a
PBX system having an extension number for a device
corresponding to the requested command, whereupon the
translation by the gateway processing system is transparent 15
to the application sending the system command.
6. A method for expanding PBX systems from a single
PBX system to multiple interconnected PBX systems
including the steps of:
10
munication port and, in combination with the
memory, addressing the event and sending the event
to an intended application socket and sending control
commands from the processor to the PBX nodes.
11. The telecommunications system of claim 10 wherein
the event comprises a change in of one of the extension
numbers from a first PBX node to a second PBX node and
the addressing comprises updating the memory accordingly.
12. The telecommunications system of claim 10 wherein
upon receipt of a control command from the processor, the
PBX node posts a response at its corresponding node
communication port and the gateway stream system for-
wards the response to an application originating the com-
mand.
13. The telecommunications system of claim 10 wherein
the gateway stream system is configured to determine if any
the data retrieved from the port has been lost and if so, to
generate an error to all interested applications which use
providing a gateway at a PBX system for translating
bi-directional commands over a packet network to a
community of PBX nodes, each utilizing a common
software application; and
20 corresponding PBX node.
providing a translation table in the gateway to allow PBX
network changes and rearrangements by translating 25
addresses for the PBX systems and individual exten-
sion numbers for individual devices to transparently
route a system event through the gateway from and to
the different PBX nodes.
7. The method according to claim 6 further including the 30
step of receiving changes from the PBX nodes for updating
the information in the translation table of devices on a
continuous basis.
8. The method according to claim 6 further including
polling a plurality of node sockets, each of which correspond 35
to one of the PBX nodes in the community, to retrieve data
from the PBX nodes.
14. The telecommunications system of claim 10 wherein
the system is configured as node-aware such that if com-
munication fails between one of the PBX nodes and the
gateway site, then the gateway site is able to communicate
with the remaining PBX nodes.
15. The telecommunications system of claim 10 wherein
the system is configured as non-node-aware such that if
communication fails between one of the PBX nodes and the
gateway site, then the gateway site is unable to communicate
with the remaining PBX nodes until communication is
restored to the failing PBX node.
16. The telecommunications system of claim 10 wherein
the event comprises either an addition or a deletion of
extension numbers from one of the PBX nodes and the
addressing comprises an update of the memory accordingly.
17. The telecommunications system of claim 10 wherein
the packet network comprises one of a WAN, a LAN, or the
Internet.9. The method according to claim 8 further including, in
response to receiving a command from the gateway at the
PBX node, sending a notification to the corresponding node
socket at the gateway, and routing the notification to an
application originating the command.
18. A method for linking multiple CTI applications to
40 control a network of multiple interconnected PBX systems
such that the PBX systems appear to the CTI applications as
a single PBX system, the method comprising:
10. A telecommunications system comprising:
a remote site communicating with a gateway site over a 45
packet network;
the remote site having,
a plurality of individual PBX nodes identifiable by a
unique IP address for the node, each PBX node
including a plurality of associated endpoints and 50
each endpoint identified by an extension number, and
each PBX node communicating with a PSTN; and
the gateway site having,
a CT gateway processor having a software application
executing thereon for unifying a plurality of 55
bi-directional data to and from the remote site and
the gateway site,
a plurality of node communication ports wherein each
of the ports interacts with one of the PBX nodes,
a gateway stream system that periodically polls the 60
node communication ports to retrieve data received
from the PBX nodes,
a memory having retrievable storage comprising the
plurality of extension numbers for the endpoints and
the plurality of IP addresses for the PBX nodes, the 65
gateway stream system receiving an event from one
of the PBX nodes at its corresponding node com-
coupling the CTI applications and the PBX systems to a
gateway function over a packet network;
processing, at the gateway, bi-directional data routed
between the CTI applications and the PBX systems;
using a translation table in the gateway to selectively
route commands from one of the CTI applications to
the applicable PBX system;
using a translation table in the gateway to selectively
route events from one of the PBX systems to the
applicable CTI application; and
operating a service within the gateway to make modifi-
cations to the translation table in response to a change
comprising a PBX network or a device change, such
that the change appears transparent to the CTI appli-
cations.
19. The method according to claim 18 further including,
receiving the change from one of the PBX systems for
updating the translation table on a continuous basis.
20. The method according to claim 18 further including,
in response to receiving a specific command at the gateway
from one of the PBX systems, sending notification of the
change to the selected CTI application.
* * * * *