561
Silent monitor and barge in services
Silent monitor service—Allows a supervisor to monitor active calls without being heard.
Barge in service—Allows a supervisor to participate in a monitored call to implement three-party
conference. For example, suppose subscribers A and B are in a conversation and subscriber C is the
supervisor. If C wants to join the conversation, it sends a request to A. If A permits, the three-party
conference can be held. In this example, C is called the active participant of the conference, A is the
voice mixer, and B is the original participant of the conversation.
Silent monitor and barge in services can be considered as the extensions of three-party conference. To
distinguish them from traditional three-party conference, these two services are called three-party
conference in active participation mode.
Calling party control
The calling party control service allows the called party to resume the conversation with the calling party
by picking up the phone within the specified time. For example, subscriber A is the calling party, and
subscriber B is the called party. The on-hook delay is set to m seconds on the voice subscriber line of
subscriber B. After the call between A and B is established, if the calling party A hangs up first, the call
is ended up. If the called party B hangs up first, it can resume the call with A by picking up the phone
within m seconds. After that, no matter how many times B hangs up within m seconds, it can resume the
call with A by picking up the phone.
In this example, after B hangs up for the first time, A hears silent tones from the headphone within m
seconds. If subscriber C dials subscriber B during this time, the telephone of B does not ring, and C hears
busy tones.
Door opening control
The door opening control service allows a user to open a door remotely. The process is as follows: user
A that wants to access a door calls user B. After the session is established, user B enters a password
starting with an asterisk (*) and ending with a pound (#) on the phone,
•
If the entered password is correct (the password matches the door opening control password
configured for the voice subscriber line), the door control relay opens the door. After a predefined
door open duration, the door control relay locks the door automatically.
•
If the entered password is incorrect, the door cannot be opened.
CID on the FXS voice subscriber line
The CID service means that the calling identity information (including the calling number and calling
name) such as calling number, calling name, date, and time is displayed on the called terminal.
With the CID function, calling numbers and calling time in single-data-message format can be
transmitted or received in an on-hook state. When the CID function is combined with services such as
CFU and CFB, calling identity information can also be transmitted if required. A message in the SDMF
contains the following information:
•
Date and time when the voice call occurs (MM DD hh:mm)
•
Calling number if CID is enabled on the device
•
P if CID is disabled on the device
Содержание MSR SERIES
Страница 17: ...xv Documents 835 Websites 835 Conventions 836 Index 838 ...
Страница 20: ...3 Figure 3 Initial page of the Web interface ...
Страница 42: ...25 Figure 13 Firefox Web browser setting ...
Страница 59: ...42 Figure 27 Checking the basic service configuration ...
Страница 73: ...56 Figure 35 Sample interface statistics ...
Страница 156: ...139 Figure 139 Rebooting the 3G modem ...
Страница 168: ...151 Figure 152 Configuring Web server 2 ...
Страница 174: ...157 Figure 158 Configure the URL filtering function ...
Страница 187: ...170 Upon detecting the Land or Smurf attack on Ethernet 0 2 Router outputs an alarm log and drops the attack packet ...
Страница 242: ...225 Figure 233 Enabling the DHCP client on interface Ethernet 0 1 ...
Страница 247: ...230 Figure 236 The page for configuring an advanced IPv4 ACL ...
Страница 255: ...238 Figure 241 Advanced limit setting ...
Страница 298: ...281 e Click Apply 2 Configure Router B in the same way Router A is configured ...
Страница 354: ...337 Figure 339 Configuring a login control rule so Host B cannot access Router through the Web ...
Страница 400: ...383 Figure 387 Verifying the configuration ...
Страница 405: ...388 ...
Страница 523: ...506 Figure 530 Ping configuration page ...
Страница 538: ...521 a Click Device A on the topology diagram b Click Ethernet 0 2 on the panel diagram c Click Port Guard ...
Страница 744: ...727 Verifying the configuration In the case that the IP network is unavailable calls can be made over PSTN ...
Страница 775: ...758 Figure 785 Configuring a jump node ...
Страница 791: ...774 Figure 801 Configuring a jump node ...