While reasonable efforts were made to ensure that the infor mation in this
document was complete and accurate at the time of printing, Avaya Inc. can
assume no liability for any errors. Changes and corrections to the information
in this document may be incorporated in future releases.
Documentation disclaimer
Avaya Inc. is not responsible for any modifications, addition s, or deletions to
the original published version of this Documentation unless such modifications,
additions, or deletions were performed by Avaya.
Link disclaimer
Avaya Inc. is not responsible for the contents or reliability of any linked third
party Web sites referenced elsewhere within this Documentation and Avaya
does not necessarily endorse the products, services, or information descri bed
or offered within them. We cannot guarantee that these lin ks will work all of the
time and we have no control over the availability of the linked pages.
License
USE OR INSTALLATION OF THE PRODUCT INDICATES THE END USER'S
ACCEPTANCE OF THE TERMS SET FORTH HEREIN AND THE GENERAL
LICENSE TERMS AVAILABLE ON THE AVAYA WEBSITE AT
http://support.avaya.com/LicenseInfo/
YOU DO NOT WISH TO BE BOUND BY THESE TERMS, YOU MUST
RETURN THE PRODUCT(S) TO THE POINT OF PURCHASE WITHIN TEN
(10) DAYS OF DELIVERY FOR A REFUND OR CREDIT.
Avaya grants End User a license within the scope of the license types
described below. The applicable number of licenses and units of capacity for
which the license is granted will be one (1), unless a different number of
licenses or units of capacity is specified in the Documentation or other
materials available to End User. "Designated Processor" means a single
stand-alone computing device. "Server" means a Desi gnated Processor that
hosts a software application to be accessed by multiple users. "Software"
means the computer programs in object code, originally licensed by Avaya and
ultimately utilized by End User, whether as stand-alone Products or
pre-installed on Hardware. "Hardware" means the standard hardwa re
Products, originally sold by Avaya and ultimately utilized by End User.
License Type(s):
Concurrent User License (CU). End User may install and use the Software
on multiple Designated Processors or one or more Servers, so long as only the
licensed number of Units are accessing and using the Software at any given
time. A "Unit" means the unit on which Avaya, at its sole discretion, bases the
pricing of its licenses and can be, without limitation, an agent, port or user, an
e-mail or voice mail account in the name of a person or corporate function
(e.g., webmaster or helpdesk), or a directory entry in the administrati ve
database utilized by the Product that permits one user to interface with the
Software. Units may be linked to a specific, identified Server.
Database License (DL). Customer may install and use each copy of the
Software on one Server or on multiple Servers provided that each of the
Servers on which the Software is installed communicate with no more than a
single instance of the same database.
Copyright
Except where expressly stated otherwise, the Product is protected by copyrigh t
and other laws respecting proprietary rights. Unauthorized reproduction,
transfer, and or use can be a criminal, as well as a civil, offense un der the
applicable law.
Third-party Components
Certain software programs or portions thereof included in the Product may
contain software distributed under third party agreements ("Third Party
Components"), which may contain terms that expand or limit rights to use
certain portions of the Product ("Third Party Terms"). I nformation identifying the
copyright holders of the Third Party Components and the Third Party Terms
that apply is available on Avaya's web site at:
http://support.avaya.com/ThirdPartyLicense/
For full information, please see the complete document, Avaya Third Part y
Terms, Document number 04-601558. To locate this document on the web si te,
simply go to http://www.avaya.com/support
number in the search box.
Warranty
Avaya Inc. provides a limited warranty on this product. Refer to your sales
agreement to establish the terms of the limited warran ty. In addition, Avaya’s
standard warranty language, as well as information regarding support for this
product, while under warranty, is available through the following Web site:
http://www.avaya.com/support
("GENERAL LICENSE TERMS"). IF
and search for the document
.
Avaya fraud intervention
If you suspect that you are being victimized by toll fraud and yo u need technical
assistance or support, call Technical Service Center Toll Fraud Intervention
Hotline at +1-800-643-2353 for the United States and Canada. Suspected
security vulnerabilities with Avaya Products should be reported to Avaya by
sending mail to: securityalerts@avaya.com.
For additional support telephone numbers, see the Avaya Web site:
http://www.avaya.com/support
Trademarks
Avaya and the Avaya logo are registered trademarks of Avaya Inc. in the
United States of America and ot her j urisdictions. Unless other wise provided in
this Documentation, marks identified by "®," "™" and "SM" are registered
marks, trademarks and service marks, respectively, of Avaya Inc. All other
trademarks are the property of their respective owners.
10 Administration and Maintenance of the CS700/CS780 Audio Conferenc ing Server
Preface
This guide describes CS700/CS780 Conferencing Server features and how to configure
audioconferencing and network settings for the CS700/CS780 Conferencing Server
audioconferencing system, which is referred to as the “system” throughout the remainder of th is
guide unless specified otherwise. Although this guide includes basic information about system
hardware, maintenance procedures, and tasks you can perform from the system’s UNIX shell
interface, it primarily describes configuration options available from the system’s text-based
management interface and how to configure those options for your particular aud ioconferencing
requirements.
Audience
This guide is intended for qualified personnel who manage the system. It describes procedures
that have a direct impact on system functions. System administrators should have a working
knowledge of teleconferencing concepts, customer requirements, and, under some
circumstances, telecommunication protocols and specifications, TCP/IP protocols, and UNIX
commands.
Contact a technical support representative if you require assistance with configuring system
and audio conference settings or require in-depth training on using the CS700/CS780
Conferencing Server or Avaya desktop products.
Conventions
This guide uses the following conventions
:
ConventionDescription
SMALLCAPSUsed for keystrokes. For example: Press the ESC key.
Courier
Courier BoldUsed for text you enter at the command line.
BoldUsed for menu options. For example: Select Call
Used for text the system displays.
For example:
For example:
Branding.
ERROR: Digit collection in progress.
rlogin host [-ec] [-8]
Issue 1 August 200711
Preface
ConventionDescription
ItalicUsed for references to publications. For example:
See Meeting Exchange 5.0 Bridge Talk User’s Guide.
Menu > OptionUsed to indicate the path to management interface options.
For example: Select System Administrator Main >
Configurations.
Note:
Note:Provides information of special importance.
Tip:
Tip:Provides information about alternative procedures or shortcuts.
!
CAUTION:
CAUTION:Provides information about actions that may disrupt or damage
system resources.
Related Documents
The following documents may provide additional information:
l Meeting Exchange 5.0 CS700/CS780 Conferencing Server Release Notes
l Meeting Exchange 5.0 Installing the S700/780 Conferencing Server
l Meeting Exchange 5.0 Relational Database Guide
l Meeting Exchange 5.0 Bridge Talk User’s Guide
l MultiSite for Meeting Exchange 5.0 Installation and Configuration Guide
12 Administration and Maintenance of the CS700/CS780 Audio Conferenc ing Server
How to Get Help
Information
Telephone+1-877-742-8351
Web sitehttp://www.avaya.com/support
US and Canada Technical Support*1-800-242-2121
International Technical Support+353-1-207-5667 (CS700/CS780)
14 Administration and Maintenance of the CS700/CS780 Audio Conferenc ing Server
Chapter 1:System Features
Includes system configuration, audioconferencing, and hardware features. This chapter also
describes client applications supported by the system and provides an overview of the different
ways conferees gain access to conferences.
Introduction
The CS700/CS780 Conferencing Server is a scalable, multi-featured audioconferencing system
designed to support a variety of audioconferencing requirements including:
l Control of large conferences from a single user interface.
l Dynamic allocation of unused ports to form new conferences.
l Conference support (up to 100,000 ports) across geographically distributed CS700/
CS780.
l Web-based conference scheduling and management and data conferencing support.
l Specified-interval and ad hoc conference scheduling options.
l T1, E1, T1-ISDN, T3 CAS, and T3-ISDN network interface support.
l Operator assisted conferences and security code
l Flex conferencing allows service providers to set up and implement a mixture of
predefined call flows.
This chapter is organized as follows:
l System Configuration Overview on page 16 illustrates representative system feature
configurations.
l Audioconferencing Features on page 16 describes audioconference features and services
supported by the system.
l SNMPv2 Management Support on page 24 describes the system’s SNMP management
components.
l Conference Call Modes on page 25 describes the different ways in which conferees gain
access to conferences and introduces terminology used and concepts referred to
throughout this manual.
l Hardware Features on page 27 describes standard and optional system hardware
components.
Issue 1 August 200715
System Features
System Configuration Overview
The CS700/CS780 can be configured to conduct audio conferences using Public Switched
Telephone (PSTN) lines. Operator audio paths and links can be set up as conventional lines.
Figure 1
depicts various system components and features in a PSTN environment.
Figure 1: System Feature Configuration
Audioconference System
Console Port
Monitor Port
Keyboard Port
Analog Music Source
Revenue lines
Operator lines
Music (FDAPI)
Play/Record
Link lines
Digital Music Source
Analog Record/Playback
Linked Bridge
NICs/DSPs
Digital Record/Playback
LAN Ports
Ethernet
LAN Hub
Reserver
Enterprise
Billing
Web Conferencing
Server
PIN Code
Administration
External
Passcode Server
MultiSite
Web Portal
SNMPClient
RCA Jack
Modem Port
External
Modem
Operator
Data & Control
Operator
Audio
Network
Conferees
Audioconferencing Features
This section provides an overview of the system’s audioconference feature set. It also
introduces concepts and terminology used throughout the remainder of this manual.
16 Administration and Maintenance of the CS700/CS780 Audio Conferenc ing Server
Attended Conferences
An attended conference is a conference in which an operator, using the Bridge Talk application
for managing and scheduling conferences, places callers into the conference and remains
available to assist conferees and moderators throughout its duration. The CS700/CS780 can be
configured for support operators, who can manage and monitor conferences alone or as part of
a team. They can also record annunciator messages, create and edit dial lists, dial out to
conference participants, record and playback recorded conference dialog, run question and
answer and polling sessions, and print conference reports directly from their workstations.
Attended conferences are scheduled and configured with the Conference Scheduler
application. To join an attended conference, conferees either dial in at a designated time or an
operator dials out to conferees. When dialing out, an operator can either dial a phone number
directly from the keyboard or launch an automated dialing function that dials numbers from a list
stored on the system (blast dialing).
See the Bridge Talk User’s Guide for details on the Conference Scheduler.
Audioconferencing Features
Unattended Conferences
An unattended conference is a conference in which conferees g ain access to and participate in
a conference without operator assistance. (Operator assistance, however, can be provided as
necessary .) When callers dial in to the unattended conference they are prompted to provide one
or more security codes to enter the conference. Once the system validates the code(s), the
caller is routed directly to the conference, but the system can also be configured to rou te callers
to a waiting queue to receive operator assistance.
Like attended conferences, specific conference features are set up using the Conference
Scheduler application from Bridge Talk. For instance, Auto Blast, a feature that enables
moderators to initiate a blast dial or enables the system to initiate a blast dial when the
moderator enters a conference is a conference-specific feature. System-wide operational
parameters for unattended conferences are specified by the Conference Scheduler
Configuration set up by a system administrator. See Chapter 7:
Scheduler on page 169 for details on configuring the Conference Scheduler and other
unattended conference features.
Other features that can be configured for unattended conferences on a system-wide basis
include:
l Auto Extend Duration — The system attempts to extend a conference beyond its
scheduled end time.
l Auto Extend Ports — The system attempts to allocate additional ports to conference to
accommodate additional conferees.
Configuring Conference
l Early Start Minutes — Conferees can enter a conference 1 to 30 minutes earlier than the
scheduled start time if ports are available.
Issue 1 August 200717
System Features
l External Passcode Validation — An external database validates the first access code
submitted for entry to a conference and then uploads conference parameters to the
system.
l PIN Mode — Specifies whether PIN code implementation is optional, whether non-unique
PIN codes are required (all conferees enter same PIN code), or whether unique PIN codes
are required (all conferee enter a different PIN code).
On-Demand Conferences
The system enables you to designate a percentage of system lines for On-Demand
conferences — ad hoc, unattended conferences that can be convened on a first-come,
first-served basis during a pre-scheduled time period. On-Demand conferences are configured
using the Conference Scheduler application. Schedulers can schedule one-time conferences or
a reoccurring conferences. An On-Demand conference can, for example, extend continuously
(24 hours a day, seven days a week), 9 AM to 5 PM Monday through Friday, 1 AM to 6 AM
every Saturday, 9 AM to 5 PM on 10th of each month, 12 AM to 12 PM on August 31, 2007, or
over any other span during which conferees want to insure lines are available for a conference
at a moment’s notice. See Meeting Exchange 5.0 Bridge Talk User’s Guide for details on
scheduling On-Demand conferences.
Like other unattended conferences, an On-Demand conference begins when the first conferee
calls in and provides a valid access code, and an On-Demand conference customer can
convene as many consecutive conferences as they want within the specified time period.
However, lines for On-Demand conferences are available on a first-come, first-served basis;
that is, successful convocation of On-Demand conferences is dependent on the availability of
lines for On-Demand conferences. See Configuring Conference Scheduler
details on apportioning a percentage of syste m lin es for On-de mand co nferen ces tha t will meet
your requirements.
Flex Conferences
Flex is a type of unattended, on-demand conference in which participants can join a conference
directly. This “reservationless” conference uses a profile to keep track of all the selected
conference features, such as Hang up or Name Record/Playback.
Once the system administrator has defined the settings in a profile, participants can join Flex
conferences on a first-come, first-served basis. However, there can be only one moderator
(leader). Leaders can change profile settings before a conference begins, and create, control,
and end a conference call using DTMF telephone commands. For example, moderators can:
l SPECIFY A CONFERENCE PASSWORD. Leaders can optionally add another layer of
security by specifying a passcode that participants must enter before they can join the
conference.This password is valid only for the duration of the conference and is not stored
on the system.
on page 169 for
18 Administration and Maintenance of the CS700/CS780 Audio Conferenc ing Server
Audioconferencing Features
Note:
Note:If Music is turned on for the conference, participants who arrive early wait on
standby. If the moderator specifies a passcode upon arrival, the waiting
participants must enter the passcode before they are allowed into the
conference. However, if Music is turned off, participants who arrive before the
moderator can enter the conference without the passcode.
l CHANGE CONFERENCE OPTIONS. When a participant enters a leader PIN code and
assumes leader (moderator) status, the system immediately prompts the lead er to press 1
to start the conference. However, the leader can press 2 to change several conference
options before the conference starts. After changing options, the leader can press 1 to
start the conference.
l USE SPECIAL STAR COMMANDS. Flexconferences require that leaders and
participants use special DTMF commands during the conference. A leader can create,
control, and end a conference call using keypad star commands, which toggle on and off.
For more information on the default call flow and Flex options, see Reservation Features
page 125. For instructions on configuring bridge settings for Flex conferences, see Flex
Configuration Settings on page 76.
For more information on scheduling Flex conferences, refer to the Bridge Talk User’s Guide.
Note:
Note:Flex does not support Polling or Q&A.
Conference Overbooking
The system’s overbooking feature enables you to specify the percentage of system lines you
want available for Conference Overbooking. Overbooking enables you to schedule more
conference lines than the system supports. In light of the fact that some conference p articip ants
do not attend conferences as scheduled, this feature ensures that those scheduled yet unused
lines are immediately available for other conferences.
Refer to Chapter 7:
a percentage of system lines for Conference Overbooking that will meet your requirements.
Configuring Conference Scheduler on page 169 for details on apportioning
on
External Passcode Validation
External Passcode Validation (EPV) is an optional feature that enables the system to validate
conference security passcodes (conferee and moderator codes) for unattended conferences
from an external database (e.g., Oracle database) instead of from the system database.
Basically, the system submits to an external database the passcode entered by the first caller
(moderator or conferee) who attempts to enter a conference. Upon determining the code is
Issue 1 August 200719
System Features
valid, the database provides the system the conference information required to convene the
conference and validate passcodes entered by subsequent callers.
See Using External Passcode Validation
on page 177 for details.
Call Routing Service
The Call Routing Service provides automated processing of incoming calls based on either
DNIS or DDI digits. Services include:
l Call branding — Lets you assign conference-specific greeting and instructional messages
to callers.
l Call routing — Lets you specify the method used to process a call.
Conference Record and Playback
The system supports two modes of conference record and playback:
l Digital Record/Playback (DRP) — DRP enables conference operators and moderators to
digitally record up to 12 hours of dialog per conference and play it back. Up to 1,000
simultaneous recordings and playbacks can be running on a system. 770 hours of digit ally
recorded conference dialog can be stored on either the system’s removable hard drive or
the RAID system, depending on how the system is configured.
l Analog Record/Playback — Using FDAPI, the system can support up to 48 analog record/
playback channels. Conferences are recorded on and played back from an external
audio-recording device. The audio recording device is accessed over a dedicated phone
line that has been set up for that purpose in the FDAPI configuration (see C
FDAPI on page 159).
l Off-Bridge Recording — This mode allows the system to connect to an external recording
device. The time limit is determined by the recording device.
See the Bridge Talk User’s Guide for details on recording and playing back conference dialog.
Sub-Conferences
Sub-conferencing enables a group of participants to leave a main conference to discuss topics
of a confidential nature or that are unrelated to the topic of discussion in the main conference.
The CS700/CS780 can be configured to allow a conferee, a moderator, or both to convene a
sub-conference from a main conference. Both conferees and moderators, however, can join a
sub-conference regardless of which type of conference participant started the conference.
onfiguring the
20 Administration and Maintenance of the CS700/CS780 Audio Conferenc ing Server
Audioconferencing Features
The system allows up to nine concurrent sub-conferences to be created from a main
conference, but it does not impose any limits on the number of successive sub-conferences that
can be created. The system does not permit creation of a sub-conference from another.
See System Configuration
on page 45 for details on enabling the sub-conference feature o n the
system.
Although it inherits most of the configuration settings of the main conference from which it is
created, a sub-conference is essentially a distinct conference:
l A sub-conference can be secured (no one allowed entry into the conference) by a
moderator in the sub-conference. Whether or not a main conference is secured has no
effect on the sub-conference.
l Once a moderator secures a main conference, participants in a sub-conference may not
rejoin the main conference until the moderator unsecures it. When the participant attempts
to rejoin a secured main conference:
l the system plays the moderator a notification message such as, “Your conference is
currently secured. A participant of the Sub Conference is requesting re-e ntry. Please turn
off security to unlock the conference.”
l the participant hears a message such as, “The main conference has been secured and
entry is not allowed at this time. The moderator has been notified of your request, please
stand by...” Once the moderator removes the security, the system plays a message such as, “Re-entry to the main conference is now allowed.
l A sub-conference’s roster is played independently of its main conference roster.
l The system generates a Conference Detail Record (CODR) for each sub-conference
”
created from a main conference. (A CODR is a daily report that contains data from all
conferences that occurred for the day. See CODR Configuration, screen 1
on page 274 for
details.)
Important information about main and sub-conference CODRs:
l The values for the Cross Ref fields and the values for the Conference ID fields for main
and sub-conference CODRs are identical. This enables billing or auditing personnel to
correctly associate sub-conferences with main conferences.
l The User Conf Type field in a sub-conference CODR identifies the conference as a
sub-conference.
l Sub-conferences are recorded separately from the main conference.
The following system-wide conference features applicable to a main conference are not
applicable to a sub-conference:
l Auto-Extend-Ports — The system does not extend ports for a sub-conference. Ports
added to a main conference are also available for any new or existing sub-conference
created from the main conference. Any additional participants who wish to join a
sub-conference can enter the main conference and then transfer to the sub-conference.
Issue 1 August 200721
System Features
l Auto-Extend-Duration — The system does not allow individual extension of a
sub-conference. The duration of an existing sub-conference extends as long as the main
conference duration extends.
How Participants Access and Exit a Sub-Conference
A conference participant (moderator or confer ee) uses the keypad command, *93, to create and
transfer to and from a sub-conference:
l When a participant in a default call flow main conference presses *93 plus a digit 1- 9,
where the digit corresponds to the subconference, the system creates a sub-conference
or, if sub-conference has already been created, the system routes the participant to that
sub-conference.
l Participant lines are transferred to the sub-conference and thus subtracted from the main
conference. The Call Detail Record (CDR) the system generates for each line in a
conference indicates that the line was transferred.
l When a participant presses *930 while in the sub-conference, the system returns the
participant line to the main conference.
A sub-conference ends when all participants have left the sub-conference.
Tip:
Tip:For a Flex conference, one sub-conference only is supported. Press *93 to
access a Flex sub-conference.
Role of the Conference Moderator
A sub-conference “shares” the moderator(s) from the main conference. That is, no additional
moderators are required to manage a sub-conference; moderators can enter and exit a
sub-conference at will.
Questions and answers about the role of a moderator in a main conference and a
sub-conference:
l What happens when the only or last moderator in the main conference joins a
sub-conference and the system is configured to automatically end a conference (Auto
Hang-up feature enabled) when the last moderator in the conference disconnects?
l The system does not end the main conference. The feature is applicable only when the
last moderator leaves the main conference.
l What happens when the only or last moderator in the main conference disconnects from a
sub-conference and the system is configured to automatically end a conference (Auto
Hang-up feature) when the last moderator in the conference disconnects?
l The system ends both the main conference and the sub-conference.
l When a moderator secures a main conference (disallows entry to any additional
participants) is the sub-conference secured as well?
22 Administration and Maintenance of the CS700/CS780 Audio Conferenc ing Server
l No. A moderator can secure a sub-conference only while in the sub-conference.
l Can participants become stranded in a sub-conference (unable to transfer back to the
main conference) if the only moderator transfers from a secured main conference to
sub-conference?
l No. An annunciator message notifies the moderator to unsecure the main conference
before transferring to the sub-conference. The moderator cannot transfer to the
sub-conference until the main conference is unsecured.
l Can participants become stranded in a sub-conference (unable to transfer back to the
main conference) if the only moderator disconnects from a secured main conference and
the Auto Hang-up feature is not in effect (the conference continues as scheduled)?
This scenario is possible. If a conference requirement is that all particip ants must b e able to
re-join a main conference before it ends, the moderator must ensure that all participants can
re-join the conference by not securing the conference prior to hanging up.
Conference Scheduler
Audioconferencing Features
The Conference Scheduler, which can be accessed from the Bridge Talk application, enables
you to schedule every type of conference supported by the system — attended, unattended,
and on-demand conferences. The system stores and automatically activates schedules.
Reservations that do not include an end date are considered to be valid for as long as the sytem
is active.
The Scheduler lets you specify conference setup information such as, but not limited to, start
time, end time, and number of lines. Also, the Scheduler notifies you if it detects scheduling
conflicts such as those related to the availability of lines or security codes, and it allows you to
modify the schedule as required. You can use the Scheduler to modify scheduled conference
settings at any time prior to a conference, and you can also modify the number of lines and the
duration of the conference and its security code while a conference is in progress. The
Scheduler also enables you to view and print scheduling reports and purge expired conference
information.
See the Bridge Talk User’s Guide for Conference Scheduler details.
Auto Blast
The optional Auto Blast feature provides blast-dial capability for moderators in unattended
conferences. From the Conference Scheduler application, Auto Blast can be disabled, set for
manual implementation, or set for automatic implementation.
l Manual implementation — The conference moderator enters *92 on the telephone keypad
to initiate the blast dial.
Issue 1 August 200723
System Features
l Automatic implementation — The system initiates the blast dial when the first moderator
enters the conference via a moderator code.
The total number of blast dial recipients called from the blast dial list is dependent on the
maximum number of lines available for the conference. A system message announces to the
conference how many numbers from the dial list are dialed.
See Blast Dial Parameters
on page 69 for information about blast dial settings, including
important details on setting the CLPG (call in progress) timeout period for Auto Blast used in
unattended conferences.
Saved Roster Recordings
The system can be configured to generate and save an audio recording of information provided
by conference participants (name, af filiation, and so on). For conferences that include the r oster
recording feature, participants provide the information in response to an audio prompt when
they attempt to enter a conference.
A raw audio file is created and saved on the system as soon as a participant records his name.
Each time a participant records his name, the information is appended to the raw audio file—so
the file grows as conference participation grows. The audio files are saved in pcm format.
See System Configuration
on page 45 for details on enabling roster recordings. See Saved
Roster Audio Files on page 206 for more information on roster recording files.
SNMPv2 Management Support
The system’s SNMPv2 management agent provides the interface betwe en the system MIB and
SNMP-compliant network management applications that connect to the system to monitor
system, runtime, telecom trunk, and LAN resources. Comprising a combination of select MIB-II
objects and platform-specific object, the MIB provides remote monitoring support for crucial
system components.
Unsolicited data from SNMP trap objects notify network management stations of actual and
potential problems with system, processor, memory, and network components (see System
Component Alerts on page 25. Current, average, and accumulated data from the MIB’s
read-only objects derived and monitored by management applications can be used by system
and network administrators to evaluate system performance. Most importantly, both unsolicited
and solicited data from the MIB can serve as input for automated alarm notification or
trouble-ticket applications used in conjunction with or part of the network management platform.
See SNMP Agent Configuration and MIB Object Definitions
on page 333 for agent configuration
guidelines and a list of MIB object definitions.
Contact Customer Support for assistance with enabling and configuring SNMP support on your
system.
24 Administration and Maintenance of the CS700/CS780 Audio Conferenc ing Server
System Component Alerts
The system MIB’s trap objects alert network managers about potential and actual problems with
system elements and processes:
l Core system resources — Fan, temperature, power supply.
l Runtime resources — Disk space (90% threshold), memory (75% threshold), host and
DSP processor, NICs.
l Telco resources — Signaling and frames.
l LAN resources — Link down and transmit and receive errors.
Conference Call Modes
A call mode is the method by which a conferee gains access to a conference. The system
supports several call modes to accommodate various customer requirements. A conference
can be conducted several ways. The system accommodates attended and unattended
conferences simultaneously, and even allows semi-attended calls, depending upon system
configuration.
Conference Call Modes
In an attended conference, the operator greets the participant and places them directly into a
conference. No passcode is required. In an unattended conference the participant enters a
passcode to be placed directly into a conference. No operator is required. Operators can
manage participants in both attended and unattended conferences.
For example, if you have an operator, you can arrange unattended coded conferences, which
allow conferees, who forget their conference codes, to reach an operator, rather than being
automatically disconnected. In addition, you can run a conference that is unattended except for
an operator initiated blast dial.
The system also permits combinations of certain modes. For example, the moderator of an
attended dial-in conference can ask an operator to dial out to a conferee who has not dialed in.
How a Conferee Is Placed in a Conference
Conferees gain access to conferences in eight different ways.
l Five ways involve dial-outs from the system to the conferee.
l Three ways involve dial-ins from conferees to the system.
Issue 1 August 200725
System Features
Dialing Out to Conferees
There are different ways for operators and moderators to di al out to a participant:
Operator Dial Out
l Immediate — An operator manually dials a phone number directly from the keyboard.
l Fastdial — An operator dials participants from a list stored on the system.
l Blast Direct — An operator has the system simultaneously dial an entire list of numbers.
Conferees are automatically placed in the conference after they answer the call and enter
a “1.”
l Blast Direct to Conference—An operator invokes the system’s blast dial feature to
simultaneously dial an entire list of numbers. The system places answered lines directly
into a conference.
l Blast Coded — An operator invokes the system’s blast dial feature to simultaneously dial
an entire list of numbers. The system prompts conferees for a conference code, befo re the
system places them in the conference.
Moderator Dial Out
l Originator Dial Out (ODO) — A moderator dials out to a conferee during the conference.
l Automatic Blast—As soon as the moderator joins the conference, the system dials a pre-
configured blast list.
l Manual Blast—A moderator initiates dialout to a preconfigured list using DTMF
commands.
Conferee Dial In
The system provides three methods of processing conferee calls to the system:
l Direct — The system automatically routes incoming callers directly to a specified
conference. No access code is required.
l Coded (Unattended) — The system requests that a caller enter a pre-specified access
code to enter the conference. The system automatically routes the caller to the specified
conference. An additional security layer is available by using PIN codes.
l Attended — Operator places callers into the conference.
While not all calls require an operator to respond to incoming calls, there is often the need to
have one or more operators available to initiate and/or process calls, and to be availa ble to help
moderators or conferees needing assistance.
26 Administration and Maintenance of the CS700/CS780 Audio Conferenc ing Server
Hardware Features
Table 1 summarizes the operator involvement in the various conference call modes.
.
Table 1: Operator Involvement in Various Conference Call Modes
Conference
Call Mode
DirectNoNoNoNo
CodedNoNoNoYes
Dial In
AttendedNoYesYesNo
ImmediateYesYesYesNo
FastdialYesYesYesNo
Blast DirectYesNoYesNo
Blast CodedYesNoYesYes
Dial Out
Hardware Features
The foundation of the CS700/CS780 is the scalable, modular chassis, which can be rack
mounted or simply placed on a suitably sturdy structure. (See Site Requirements
for details.) It accommodates all hardware, software, and environment al components necessary
to support the system’s audioconferencing features and basic data storage requirements.
Operator
Initiated?
Operator
Processed?
Operator
Attended?
Code
Required?
on page 319
CS700/CS780 Conferencing Server hardware components:
l Te lecommunication Network Interface Cards (NICs), each with eight RJ-45 ports that
support scalable T1, T1-ISDN, or E1 channel configurations.
l The CS700 supports up to six NICs (1152 T1, 1104 T1-ISDN PRI, and 1200 E1
channels).
l The CS780 supports up to 3 NICs (576 TI, 552 T1-ISDN PRI, and 600 E1 channels).
l Up to three (3) hot-swappable Digital Signal Processing (DSP) cards in the CS780, and six
(6) in the CS700. DSP cards process audioconference operations. Use these equations to
calculate the number of DSP resources:
l T1 systems require T1 = 1 DSP board.
l T3 systems require T3 = 3n DSP +1, where n is the number of T3 cards.
Issue 1 August 200727
System Features
l CPU host processor card with a minimum processing power and RAM to support the
installed system features. Table 2
various system features and Table 3
.
Table 2: Supported T1/E1 Configurations
identifies the supported T1/E1 that are required for
The CPU card can be configured to include a hard drive and 3.5” disk drive if a RAID
system is not used. It also includes two DB9 serial ports, a keyboard /mouse port, a SVGA
port, a USB port, and two RJ-45 LAN ports that are each configurable for 10 or 100 Mbps
Ethernet connections.
28 Administration and Maintenance of the CS700/CS780 Audio Conferenc ing Server
Redundant, hot-swappable power supplies: up to four for the CS700; up to two for the
l
CS780.
l RCA Jack (on a DSP card) for connection to analog music source (CD player for
example).
l Removable hard drive (for storing digitally recorded conferences and system file backups).
Note:
Note:Your system might be configured with a RAID drive instead of a removable hard
drive. See RAID System
on page 38 for more information.
Standard System Components
Figure 2 shows CS700 components for a non-RAID configuration and Figure 3 shows CS780
components for a non-RAID drive configuration. See RAID System
on a RAID configurations.
on page 38 for information
Issue 1 August 200729
System Features
Note:
Note:The system has video and keyboard connections on the host CPU and on the
Serial ports are available on the front and the back of the system, but only one of the two ports
can be functional. If the front port is in use, the rear port is disabled, and if the rear port is used ,
the front port is disabled. LAN ports are available on the front and the back of the system.
When the front port is in use, the rear port is disabled, and if the rear port is u sed, the fro nt po rt
is disabled.
optional embedded CPU (eCPU). These connections are used only for initial
startup of the system during installation and for local system diagnostics and
troubleshooting. The serial and ethernet ports on the NIC card and the serial port
on the DSP card are only used by the CS700/CS780 developers for application
development.
30 Administration and Maintenance of the CS700/CS780 Audio Conferenc ing Server
Loading...
+ 366 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.