background image

1  

Administration Overview 

UCS 1000 R4.2 User Interface

UCS 1000 R4.2 Administration 585-313-507

Issue 3 April 2000 13

Optional Function 
Key Labels

The optional function key labels change based on the active menu or window, 
and provide commands that are unique to the menu or window. See 

Table 3 

on page 14

 for a description of optional function key labels.

Table 2.

Standard Function Key Labels

Key

Description

F 1

 Help

Opens an online help window. See 

Online Help on page 

17

 for more information about online help.

F 6

 Cancel

Closes the active screen and cancels any additions, 
deletions, or changes made. The screen that 
immediately precedes the just-closed screen becomes 
the active screen. If there is an activity in progress, such 
as making a backup copy of an application on a floppy 
disk, pressing 

F 6

 (CANCEL) does not interrupt the 

operation.

F 7

 Cmd-Menu

Opens the Command Menu. Options include System 
Monitor, Trace Service, and Exit. See 

Command Menu 

on page 297

 in 

Chapter 7, Common Administration 

, for 

more information.

Summary of Contents for R4.2

Page 1: ...UCS 1000 R4 2...

Page 2: ...Copyright 2000 by Lucent Technologies All rights reserved...

Page 3: ...y fashion by any entity either internal or external to Lucent Technologies except in accordance with applicable agreements contracts or licensing without the express written consent of the Enterprise...

Page 4: ...marks Adobe Acrobat Enhanced Software Technologies Inc Trademark Quickstart Equinox Systems Inc Registered trademark Equinox Hewlett Packard Corporation Registered trademarks Hewlett Packard and HP In...

Page 5: ...Microsystems Registered trademarks Sun Sun Microsystems Sun Workstation Solaris computer and peripherals Trademarks Solaris operating system utilities and Java UNIX System Laboratories Inc Registered...

Page 6: ...structions may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to c...

Page 7: ...that this product is immune from or will prevent unauthorized use of common carrier telecommunication services or facilities accessed through or connected to it Lucent Technologies will not be respons...

Page 8: ...1764 International FAX 317 322 6699 To Order To order a document contact the Lucent Technologies Publications Center and specify the 9 digit document number the issue number and the issue date Standi...

Page 9: ...rview xxii Intended Audiences xxiii How This Book Is Organized xxiii Administration Procedures and Information xxiv Reference Material xxv To Locate Specific Topics xxv Conventions Used in This Book x...

Page 10: ...dows 5 Message Line 10 Function Keys 11 Online Help 17 Accessing the Administration Menus 18 Administration Menu Options 20 2 UNIX Administration 22 Overview 22 UnixWare Documentation 22 UNIX System A...

Page 11: ...chedule Automatic Task 50 Security Management 51 Software Installation and Removal 52 Storage Device Operations and Definition 53 System Name Date and Time and Initial Password Setup 54 User Login and...

Page 12: ...odifying Threshold Periods 81 Saving Changes and Exiting Message Administration 83 System Control 84 Diagnose 85 Renumbering Voice Channels 87 Reporting Voice System Status 89 Stopping the Voice Syste...

Page 13: ...erfaces 144 Accessing the Digital Interfaces Menu 144 Displaying Digital Interface Assignments 146 T1 A B Robbed bit E M Protocol 150 E1 CAS Protocols 163 ISDN PRI Layer 1 Protocol 174 T1 for 4ESS App...

Page 14: ...ll Data Tables 208 Table Searches 210 Database Interface Process 213 Database DIP Timeout 213 Database Cursors 215 Increasing Database Storage Size 217 Decreasing the Database Storage Size 220 Reducin...

Page 15: ...moving a Database Access ID 245 SQL PLUS Database Administration 246 Monitoring the Database 247 Database Commands 247 Database Trace Files 252 6 Peripheral Administration 253 Overview 253 Accessing t...

Page 16: ...298 System Monitor 298 Trace Service 306 Reports Administration 308 Accessing the Reports Administration Menu 309 Call Classification Report 310 Call Data Detail Report 317 Call Data Summary Report 3...

Page 17: ...alarm_cutoff 374 annotate 374 assign card channel 375 assign_permissions 377 assign service startup 379 attach 382 autoreboot 384 bbs 387 ccarpt 390 cddrpt 391 cdsrpt 394 codetype 396 configure_tam 39...

Page 18: ...annel 416 delete eqpgrp 419 delete service startup 420 detach 423 diagnose bus 1 426 diagnose card 427 dip_int 431 display assignments 433 display card 435 display channel 441 display dnis 443 display...

Page 19: ...encode 463 erase 464 explain 466 findHomes 471 fixLogFile 473 iCk iCkAdmin 477 logCat 498 lComp 509 list 512 logCat 514 logDstPri 520 logEvent logMsg 522 logFmt 526 mkAlerter 530 mkheader 533...

Page 20: ...restore 559 retireAlarms 562 rmdb 564 show_sys 568 soft_disc 570 soft_szr 572 spadc 574 spar 575 spsav 581 spStatus 583 spVrsion 594 start_vs 594 stop_vs 596 striphdr 597 sysmon 598...

Page 21: ...vusage 618 wl_copy 619 wl_edit 620 wl_gen 622 wl_init 624 wl_install 625 Glossary 627 Index 699...

Page 22: ...dures needed to perform full system administration for the following areas The UNIX operating system The voice system Databases Switch interfaces This document also describes the procedures needed to...

Page 23: ...d customers who choose to administer their own systems Secondary audiences include the field support personnel We assume that the primary users of this book have completed the UCS 1000 R4 2 hardware i...

Page 24: ...s to perform basic UnixWare level administration See Chapter 3 Voice System Administration for information about how to access the Voice System Administration menu and a description of all the adminis...

Page 25: ...common procedures such as system monitoring media formatting and backups and administering the date and time Reference Material See Appendix A Summary of Commands for an alphabetical list of the comma...

Page 26: ...e an instruction to type the letter y is shown as Type y to continue The word enter means to type a value and then press the ENTER key on the keyboard For example an instruction to type the letter y a...

Page 27: ...us Figure 1 present options from which you can choose to view another menu or a screen or window Screens and windows both show Figure 2 on page xxviii and Figure 3 on page xxix and request Figure 4 on...

Page 28: ...press ENTER you will be shown a screen that will allow you to create new partitions delete existing partitions or change the active partition of your primary hard disk the partition that your compute...

Page 29: ...of a UCS 1000 R4 2 Window Showing Information Figure 4 Example of a UCS 1000 R4 2 Screen Requesting Information UNIX System Installation Set Slice Sizes Please select whether you would like the recom...

Page 30: ...lized BOLD text For example an instruction to press the Enter key is shown as Press ENTER Two or three keys that you press at the same time on your terminal or PC that is you hold down the first key w...

Page 31: ...messages field names and prompts that appear on the screen are shown in typewriter text as shown in the following examples Enter the number of ports to be dedicated to outbound traffic in the Maximum...

Page 32: ...en Simulations Text in a simulated screen display appears in typewriter text Example Items That May or May Not Appear Grayed out type represents optional items that may or may not appear in a given di...

Page 33: ...ch time zone at the Enter command prompt Example 2 Type high or low in the Speed field Command variables are shown in bold italic type when they are part of what you must type in and in italics when t...

Page 34: ...of data service interruptions or breaches of toll fraud security CAUTION Indicates the presence of a hazard that if not avoided can or will cause minor personal injury or property damage including lo...

Page 35: ...ng call the BCS Education and Training Center at one of the following numbers Organizations within Lucent Technologies 904 636 3261 Lucent Technologies customers and all others 800 256 8988 Documentat...

Page 36: ...obe Acrobat Reader application you can read these documents on a Windows PC on a Sun Solaris workstation or on an HP UX workstation Acrobat Reader displays high quality print like graphics on both UNI...

Page 37: ...ext Links Hypertext linked text appears in blue italics and underlined These links are shortcuts to other sections or books Navigating with Double Arrow Keys The double right and double left arrows an...

Page 38: ...ain menu screen select one of the print optimized documents Print optimized documents print two screens to a side both sides of the sheet on 8 5x11 in or A4 paper 2 Select File Print 3 Enter the page...

Page 39: ...return a comment card to us If the comment card has been removed from this book send you comments to the address below Be sure to include the name and document number of this book UCS 1000 R4 2 Admin...

Page 40: ...an overview of system administration and is designed to familiarize you with the UCS 1000 R4 2 user interface and the system administration process including User interface overview User interface com...

Page 41: ...r Interface Administering the voice system through the administrative screens involves many activities and all share a common user interface Although the information on the screen changes often the in...

Page 42: ...1 Administration Overview UCS 1000 R4 2 User Interface Figure 6 Sample UCS 1000 R4 2 System Screen Message Line Function Key Labels Menu or Window...

Page 43: ...ys Table 1 Cursor Movement Keys Type of Movement Key Move to next line in menu list or text wrap from last item to first item in a menu or form Move to previous line in menu list or text wrap from fir...

Page 44: ...making menu selections or populating fields Since the display may contain more than one menu or window at the same time each menu window is outlined so that it is clear what information it contains At...

Page 45: ...uration Management menu Scroll Indicator The scroll bar indicates whether there is additional text to be displayed The indicates there is more information to view below what is presently shown The ind...

Page 46: ...ect System Control If there is another menu item beginning with s type more characters The menu items are not case sensitive that is typing A is the same as typing a If you type a letter for which the...

Page 47: ...n this book titles are shown with the first letter of each word capitalized followed by the word window such as Voice Equipment window Scroll Indicator The scroll bar indicates whether there is additi...

Page 48: ...m beeps and removes the invalid characters For example given the Day field in Figure 10 on page 10 assume that valid entries are the names of the days in the week When you type M the system fills in t...

Page 49: ...and type the entire entry While in a field you can also edit the entry Use the CHOICES screen selections Press F2 Choices to open a menu that shows the available choices for a field Select an option a...

Page 50: ...that is sent to the system when you press the corresponding function key The commands and therefore the labels that are available at any given time vary depending on the active menu or window Menus an...

Page 51: ...User Interface Figure 11 Function Key Labels System Monitor Window Standard Function Key Labels Standard function key labels remain constant regardless of the active menu or window They represent com...

Page 52: ...ls any additions deletions or changes made The screen that immediately precedes the just closed screen becomes the active screen If there is an activity in progress such as making a backup copy of an...

Page 53: ...icular field Move the cursor to the field you want to fill and press F2 CHOICES The CHOICES menu opens displaying the options available for that field F2 Prevpage Scrolls back one full page towards th...

Page 54: ...gement Menu See Command Menu on page 297 in Chapter 7 Common Administration for more information Options include list move refresh and UNIX system F8 Chg Keys Switches the function key labels displaye...

Page 55: ...Administration Overview UCS 1000 R4 2 User Interface Figure 12 Change Keys System Monitor Screen Note In Figure 12 the Host Mon function key selection does not appear if host software is not installe...

Page 56: ...nformation Figure 13 shows the help screen associated with the Database Access ID Table window The system online help windows are not designed to be a substitute for this book They briefly describe ea...

Page 57: ...At the Console Login prompt enter root The system prompts you for a password 2 Enter your root password The system displays the system prompt 3 Enter one of the following commands at the prompt To dis...

Page 58: ...tion Menus CAUTION Do not create multiple simultaneous cvis_menu processes This could severely impact performance and may lock up the system The system displays the Voice System Administration menu Fi...

Page 59: ...operations and peripheral setup See Chapter 2 UNIX Administration for more information and procedures on UNIX administration Voice System Administration From the Voice System Administration menu you...

Page 60: ...ministration Menus Note F6 Cancel does not exit from the UNIX System Administration menus See Exit UNIX System Administration Menu on page 57 in Chapter 2 UNIX Administration for the procedure to exit...

Page 61: ...u and the procedures to perform basic UnixWare level administration The sections in this chapter are arranged in the same order as the administration services in the UnixWare administration main menu...

Page 62: ...ess SYSADM the OA M menu interface of UnixWare 1 At the Console Login prompt enter root The system prompts you for a password 2 Enter your root password The system displays the system prompt 3 Enter c...

Page 63: ...Administration UNIX System Administration Access 4 Select The system displays the UNIX System V Administration menu Figure 17 on page 24 Figure 17 UNIX System V Administration Menu UNIX System Adminis...

Page 64: ...ration The Application Administration menu provides menus and tasks for administering custom applications Application developers can use this option to place menus from which to administer add on or c...

Page 65: ...quests Back up all system and user files that have been modified or created since your voice system was installed The extended backup services allow you to Determine the backup rotation period Specify...

Page 66: ...up and Control To access backup services 1 Start at the UNIX System V Administration menu Figure 17 on page 24 and select The system displays the Backup Service Management menu Figure 18 Figure 18 Bac...

Page 67: ...up and Control Basic Backup To perform a basic backup 1 Start at the Backup Service Management menu Figure 18 on page 27 and select The system displays the Backup to Removable Media menu Figure 19 Fig...

Page 68: ...y menu option displays the date and time of the last system and incremental backup To view the backup history 1 Start at the Backup to Removable Media menu Figure 19 on page 28 and select The system d...

Page 69: ...our HOME or personal directory to either tape or formatted diskettes To back up all files in your personal directory 1 Start at the Backup to Removable Media menu Figure 19 on page 28 and select The s...

Page 70: ...ystem periodically prompts you to insert more diskettes or tapes until the backup is complete 3 Press ENTER when the backup is complete The system redisplays the Backup to Removable Media menu Figure...

Page 71: ...movable media type The system displays the Selective Backup of Files under window Figure 22 Figure 22 Selective Backup of Files under Window 3 Enter the file names and directory names to be backed up...

Page 72: ...em redisplays the Backup to Removable Media menu Figure 19 on page 28 Schedule a Backup to Tape The Schedule Backup to Tape menu option allows you to Add a system or incremental backup Change a previo...

Page 73: ...dd a Backup To schedule a new backup to tape 1 Start at the Backup to Removable Media Menu Figure 19 on page 28 and select The system displays the Schedule a System Backup window Figure 23 Figure 23 S...

Page 74: ...r files since the last backup 3 Use one of the following methods to enter a value in the Month s of the Year field Type a number from 1 to 12 where January is 1 and December is 12 to indicate a single...

Page 75: ...to the Day s of the Month field The default is all to back up all days of the month 5 Use one of the following methods to enter a value in the Day s of the Week field Type the first letter of the day...

Page 76: ...ces to select from a menu b Press The system places the cursor in the minutes portion of the field c Type a number from 0 to 59 to indicate the minutes past the hour The default time is 02 00 to start...

Page 77: ...led Backup Settings To change scheduled backup settings 1 Start at the Backup to Removable Media menu Figure 19 on page 28 and select The system displays the Change Scheduled Backup window Figure 24 F...

Page 78: ...tup and Control Figure 25 Change Scheduled Backup Information Window 4 Change the information as appropriate See step 2 through step 6 in Add a Backup on page 34 for information on how to add data to...

Page 79: ...Cont The system returns to the Schedule Backup to Tape menu To cancel the backup schedule press F6 Cancel The system returns to the Schedule Backup to Tape menu Delete a Scheduled Backup To delete sch...

Page 80: ...eted and press F2 Mark Select as many of the entries as necessary 3 Press F3 Enter The system displays a confirmation window to confirm the backups marked for deletion 4 Do one of the following To con...

Page 81: ...uled Backups To display a list of scheduled backups 1 Start at the Backup to Removable Media menu Figure 19 on page 28 and select The system displays the Display Scheduled Backup window Figure 27 Figu...

Page 82: ...es in UCS 1000 R4 2 System Reference 585 313 210 for information on when and how to conduct extended backups File System Creation Checking and Mounting File Systems administration allows you to Check...

Page 83: ...and Shutdown Figure 28 shows the options available for file system administration See System Files and Devices Reference in the Novell UnixWare documentation set for additional information about each...

Page 84: ...dministration See System Files and Devices Reference in the Novell UnixWare documentation set for additional information about each of these options Figure 29 Machine Configuration Display and Shutdow...

Page 85: ...elections Manage distributed file systems Perform name to address translations Manage basic networking Figure 30 displays the options available for network services administration See Network Administ...

Page 86: ...vice ports set up quick terminal and manage terminal line tty settings Figure 31 shows the options available for ports administration See System Administration Volume 1 in the Novell UnixWare document...

Page 87: ...llows you to perform basic and extended restore services Note If you want to back up and restore speech files see the spsav command in Appendix A Summary of Commands Figure 32 shows the options availa...

Page 88: ...ld be notified when a request that requires operation intervention is queued Respond to restore requests Restore files directories file systems or a data partition from a backup archive Display or mod...

Page 89: ...ou to add change delete and display a task scheduled through cron Figure 35 shows the options available for schedule task administration See System Administration Volume 1 in the Novell UnixWare docum...

Page 90: ...able for audit trail facility management This menu includes the functions for Managing audit criteria Enabling and disabling auditing Displaying audit information Displaying and setting event log para...

Page 91: ...formation about software packages store software without installing it and remove software Figure 37 shows the options available for software administration See System Files and Devices Reference in t...

Page 92: ...nfigure a storage device on the system Reconfigure a storage device on the system A storage device may be integral disks diskettes SCSI data storage devices nine track tapes and other devices configur...

Page 93: ...nitial Password Setup Figure 38 Storage Device Operations and Definitions Menu System Name Date and Time and Initial Password Setup System setup administration allows you to administer the following s...

Page 94: ...s machine name is used by the Feature Licensing software Call your support center before changing the machine name to avoid losing any of your feature licenses Figure 39 shows the options available f...

Page 95: ...ps Defining defaults for adding users Listing users or groups Modifying attributes of users or groups Redefining user password information Removing users or groups Figure 40 shows the options availabl...

Page 96: ...ration Exit UNIX System Administration Menu Exit UNIX System Administration Menu To exit Unix System Administration 1 Press F7 Cmd Menu The system displays the Command Menu Figure 41 Figure 41 Command...

Page 97: ...ibes how to access the Voice System Administration menu and describes all of the administrative options This chapter contains the reference and procedural information for the Configuration Management...

Page 98: ...tration Overview Figure 42 Voice System Administration Menu Voice System Administration Menu Options From the Voice System Administration menu you have access to all of the major administrative featur...

Page 99: ...S 1000 R4 2 System Reference 585 313 210 for more information on performing backup and restore procedures Configuration Management The Configuration Management menu provides capabilities for you to pe...

Page 100: ...or Call classification and data System messages System traffic See Chapter 7 Common Administration for more information on using the Reports menu Switch Interfaces The Switch Interfaces menu provides...

Page 101: ...nters and modems install and remove software and modify the system time and date See Chapter 6 Peripheral Administration for more information on administering printers modems and terminals Configurati...

Page 102: ...guration Management Menu The Configuration Management menu contains the following options Feature licensing display Feature Licensing only Message administration Remote alarming administration Note Re...

Page 103: ...dified by the administrator An administrator can display and print a report of the current feature licenses CAUTION Your system s machine name is used by the Feature Licensing software Call your suppo...

Page 104: ...Administration Feature Licensing Note Figure 44 is a sample window Your Display Feature Licensing window may look different depending on the feature packages you purchased Figure 44 Display Feature Li...

Page 105: ...a Feature License Report To print a report of the current system feature licenses 1 Start at the Display Feature Licensing window Figure 44 on page 65 and press F8 Actions The system displays the Acti...

Page 106: ...st all the parameters associated with a particular system message Add or remove a new destination to or from the current list of destinations for the current system message Modify a message priority M...

Page 107: ...ge Administration To access message administration 1 Start at the Configuration Management menu Figure 43 on page 63 and select The system displays the System Message Administration window Figure 46 F...

Page 108: ...Administration Message Administration 3 Press F3 Save The system displays the System Message Display window Figure 47 Figure 47 System Message Display Window Table 4 on page 70 describes the fields i...

Page 109: ...ge Priority may be NONE or for none for minor for major or C for critical Message Destinations Specifies a list of destinations where the message should be sent By default messages are sent to the mes...

Page 110: ...and the destinations for the threshold message should be meaningful as a thresholding action For example message ID VROP003 may have a priority of minor while its corresponding threshold message ID co...

Page 111: ...ge is changed from the event destination to the alarm destination a similar change should be made on the message priority from none to minor and vice versa To add a destination to a message 1 Start at...

Page 112: ...n the message being sent to the system console console The system console or dev console alertPipe A specially named pipe for messages that must be sent directly to the alerter The alerter pipe is use...

Page 113: ...Report window 4 Press F3 Save The system redisplays the System Message Display window Figure 47 on page 69 showing the new message destination 5 Complete the Saving Changes and Exiting Message Admini...

Page 114: ...ge Destination that you want to remove in the Message Destination field or press F2 Choices to select from a menu Note The destination on log is not a valid choice since this destination cannot be rem...

Page 115: ...long time intervals However an increase of message occurrences over shorter time intervals may indicate more serious problems with the system Message thresholding sends a new message to be sent when a...

Page 116: ...Enter a nonnegative integer threshold value or none in the Threshold field 4 Enter THR001 for none THR002 for minor THR003 for major or THR004 for critical in the Threshold Message Id field or press...

Page 117: ...nt system message To remove a message threshold 1 Start at the System Message Display window Figure 47 on page 69 for a given message and press F8 Chg Keys The system displays the alternate set of fun...

Page 118: ...each message is assigned a particular priority In most cases these priorities are appropriate and do not need to be modified Depending on the type of application however you may want to modify a messa...

Page 119: ...page 69 for a given message and press F8 Chg Keys The system displays the alternate set of function keys 2 Press F5 Msg Prio The system displays the System Message Priority window Figure 52 Figure 52...

Page 120: ...which messages are counted for a given threshold To modify a threshold period 1 Start at the System Message Display window Figure 47 on page 69 for a given message and press F8 Chg Keys The system dis...

Page 121: ...ax number dimension number dimension where number is a positive integer and dimension is one of the following single characters w for weeks d for days h for hours m for minutes s for seconds Table 5 p...

Page 122: ...on page 83 procedure The system installs the changes on the voice system Saving Changes and Exiting Message Administration CAUTION You MUST perform this procedure if you want to save your message admi...

Page 123: ...f the UCS 1000 R4 2 system Start and stop the voice system Diagnose circuit cards channels and buses To access the System Control menu 1 Start at the Configuration Management menu Figure 43 on page 63...

Page 124: ...Equipment You can run diagnostics on E1 T1 LSPS and SSP circuit cards Run diagnostics whenever the system displays a message indicating circuit card failure To diagnose equipment 1 Start at the Syste...

Page 125: ...number that identifies each E1 T1 LSPS or SSP circuit card Equipment numbers are defined by the position of the circuit card in the circuit card table shown on the Display Voice Equipment window Figur...

Page 126: ...the System Control menu For more information on diagnostics see Chapter 2 Diagnostics of UCS 1000 R4 2 System Reference 585 313 210 Renumbering Voice Channels The Renumber Voice Channels option remove...

Page 127: ...tion a warning is displayed and you are given the option of continuing with the procedure or returning to the System Control menu To renumber voice channels 1 Start at the System Control menu Figure 5...

Page 128: ...er the voice system is running or stopped and to view the current voice system run level 1 Start at the System Control menu Figure 54 on page 84 and select The system displays the Status of Voice Syst...

Page 129: ...stem is usually done when you are performing some type of routine service such as backup and restore When the system is stopped the CPU does the following Places the entire system in the idle state wh...

Page 130: ...time all calls in progress are completed but no new calls are accepted 3 Press F3 Save The system displays a message telling you it will stop the voice system if you press ENTER Note To return to the...

Page 131: ...em 1 Start at the System Control menu Figure 54 on page 84 and select The system displays the Wait Time window Figure 59 Figure 59 Wait Time Window 2 Enter a time interval between 60 and 600 seconds i...

Page 132: ...channels that were deactivated when you stopped the voice system are returned to service in the maintenance state they had when the voice system was last running To start the voice system 1 Start at t...

Page 133: ...ards and their associated channels in the system that provide voice system functionality To access the Voice Equipment menu 1 Start at the Configuration Management menu Figure 43 on page 63 and select...

Page 134: ...and unassign voice system equipment options and states Change channel maintenance states Assign display and unassign channel and telephone number services Assign display and unassign circuit card and...

Page 135: ...System Administration Voice Equipment The system displays the Display Equipment window Figure 61 Figure 61 Display Voice Equipment Window This window by default displays all channels currently in the...

Page 136: ...F2 Prev Page and F3 Next Page to move up and down through the pages of this window Press F4 First Page to view the first page of the window Press F5 Last Page to view the last page of the window Note...

Page 137: ...window to show a full range of channels or a subrange The parameters you specify are saved in a file and remain in effect until you change them To change the display parameters 1 Start at the Display...

Page 138: ...ay Voice Equipment Window 3 Enter one of the following in the Equipment field or press F2 Choices to select from a menu card This parameter displays the version of software running on each circuit car...

Page 139: ...ys the version of software that is running on each circuit card in the FUNCTION field circuit card options and the circuit card O S Index slot number group In the standard display with the GROUP colum...

Page 140: ...the Service field enter a service name or press F2 Choices to select from a menu This field is used to limit the voice equipment display to channels that are associated with a particular service or f...

Page 141: ...tdm It is the only valid setting To change voice equipment options for digital circuit cards 1 Start at the Voice Equipment menu Figure 60 on page 94 and select The system displays the Change Options...

Page 142: ...t card the option is set for all channels of that circuit card 4 Enter a single number or range of numbers to select the voice circuit cards or channels to change in the Equipment Number field or ente...

Page 143: ...on the system The MANOOS state disrupts voice playback on all speech processing circuit card channels if only one speech processing circuit card is installed or negatively affects voice playback perfo...

Page 144: ...channel to go inserv but is waiting for the network switch to also be ready for the channel to go inserv Note that channels can freeze in this state if the switch is not ready for the channel to go in...

Page 145: ...select Table 7 Valid Equipment State Changes If a Card Channel is You May Change It to For Equipment Type MANOOS INSERV circuit cards or channels INSERV MANOOS circuit cards or channels FOOS MANOOS c...

Page 146: ...uipment should be changed in the New State field or press F2 Choices to select from a menu Valid choices are inserv in service and manoos manual out of service 3 Enter channel or card for the type of...

Page 147: ...ls Using E M Protocol The following suggestions apply only to individual MANOOS E1 T1 channels using the E M protocol Other E1 T1 protocols provide the ability to remove individual channels from servi...

Page 148: ...idle channels starting at the beginning of the hunt group On a 4ESS switch for example this is achieved by requesting a trunk hunt without memory You can then limit the number of simultaneous incomin...

Page 149: ...he Voice Equipment menu Figure 60 on page 94 and select The system displays the Assign Channels to Groups window Figure 66 Figure 66 Assign Channels to Groups Window 2 Enter the channel or range of ch...

Page 150: ...up 31 is a reserved group It is used to specify channels that the system should ignore when it executes a soft seizure soft_szr command This allows you to mark certain channels as not being in the cha...

Page 151: ...Channels To unassign an equipment group to channels 1 Start at the Voice Equipment menu Figure 60 on page 94 and select The system displays the Unassign Channels From Groups window Figure 67 Figure 6...

Page 152: ...umbers are 0 to 30 with equipment group 31 used as a reserved group 4 Press F3 Save The system unassigns the specified channels from the selected equipment groups LSPS Functions The LSPS Functions men...

Page 153: ...nctions To assign functions to LSPS circuit cards 1 Start at the Voice Equipment menu Figure 60 on page 94 and select The system displays the Assign LSPS Functions window Figure 68 Figure 68 Assign LS...

Page 154: ...a menu in the Card Number field After entering the card number the current settings are displayed 3 In the remaining fields enable the function with Yes or disable with No Several of these functions...

Page 155: ...or the LSPS cards in your system 1 Start at the Voice Equipment menu Figure 60 on page 94 and select Table 8 Valid LSPS Function Combinations Function Valid for LSPS Text to Speech Yes Code Play Yes C...

Page 156: ...s the Display LSPS Functions window Figure 69 Figure 69 Display LSPS Functions Window 2 In the Card Number field enter a single number or press F2 Choices to select from a menu After entering the card...

Page 157: ...Display LSPS Functions Window 3 Press F6 Cancel twice to return to the Voice Equipment menu Figure 60 on page 94 SSP Functions Using the SSP Functions menu option you can assign functions to SSP circu...

Page 158: ...ign functions to SSP circuit cards 1 Start at the Voice Equipment menu Figure 60 on page 94 and select The system displays the Assign Change Functions to SSP Cards window Figure 71 Figure 71 Assign Ch...

Page 159: ...m a menu in the Card Number field After entering the card number the current settings are displayed 3 In the remaining fields enable the function with Yes or disable with No The optional feature packa...

Page 160: ...To view the current assignments for the SSP cards in your system 1 Start at the Voice Equipment menu Figure 60 on page 94 and select The system displays the Display SSP Functions window Figure 72 Figu...

Page 161: ...d enter a single number or press F2 Choices to select from a menu After entering the card number the current settings are displayed Figure 73 Figure 73 Example Display SSP Functions Window 3 Press F6...

Page 162: ...vices menu Figure 74 Figure 74 Voice Services Menu Channel Services The Channel Services menu option allows you to assign display and unassign channel services To access the Channel Services menu 1 St...

Page 163: ...Figure 75 Channel Services Menu Assign Service The Assign Services to Channels window allows you to specify the service or application to use for incoming calls on one or more channels To assign serv...

Page 164: ...hannel Numbers field enter the channel number or range of numbers Valid numbers range from 0 to the maximum number of channels in the system You can enter multiple channels separated by commas or a ra...

Page 165: ...ng party is available with PRI 4 Leave the Startup Service field blank 5 Press F3 Save Assign The system assigns the indicated services to the selected channel or range of channels Display Channel Ser...

Page 166: ...3 Voice System Administration Voice Equipment The system displays the Display Channel Services window Figure 77 Figure 77 Display Channel Services Window...

Page 167: ...m one or more channels Table 9 Field Descriptions for the Display Channel Services Window Column Name Description CHANNEL Channel number assigned to the service displayed in the SERVICE column SERVICE...

Page 168: ...hannels Window 2 Enter the channel number or range of numbers to be unassigned in the Channel Numbers field Valid numbers range from 0 to the maximum number of channels in the system You can enter mul...

Page 169: ...es menu option allows you to assign display and unassign numbers services To access the Number Services menu 1 Start at the Voice Services menu Figure 74 on page 123 and select The system displays the...

Page 170: ...lication to use for incoming calls on the called number DNIS or calling number ANI It is only valid for channels assigned to DNIS_SVC To assign number service 1 Start at the Number Services menu Figur...

Page 171: ...cond column contains the last number in the range For example to specify the extension 4876 enter 4876 in column 1 and leave column 2 blank To specify any number enter any in column 1 and leave column...

Page 172: ...he service that handles the incoming call on the channel or channels 5 Press F3 Save The system assigns a service to the specified number or numbers Displaying Number Services The Display Number Servi...

Page 173: ...3 Voice System Administration Voice Equipment The system displays the Display Number Services window Figure 81 Figure 81 Display Number Services Window...

Page 174: ...or more numbers To unassign number service Table 10 Column Description for the Display Number Services Window Column Name Description CALLED NUMBERS Displays the called number corresponding to the se...

Page 175: ...or range represents the telephone number or numbers to dial to reach the specified service The number of digits must match those that the switch provides You can enter numbers with a comma a dash or...

Page 176: ...number the word any or the first number in the range The second column contains the last number in the range For example to specify the single number 6145554876 enter 6145554876 in column 1 and leave...

Page 177: ...n page 278 in Chapter 6 Peripheral Administration for more information about printer administration FAX Administration With the Next Generation FAX feature package you can send and receive faxes IRAPI...

Page 178: ...upply this number access the Alarm Management window and in the Product ID field enter a 10 digit number starting with a 2 This number must be unique within other UCS 1000 R4 2 systems that will send...

Page 179: ...Alarm Management Window 2 In the Product ID field enter a 10 digit number starting with a 2 that is unique within other UCS 1000 R4 2 systems that will be sending or receiving faxes Do not enter infor...

Page 180: ...ch Interfaces menu allows you to define the interaction between the system and the switches connected to it by allowing you to modify switch interface parameters and protocol options for digital inter...

Page 181: ...To access the Switch Interfaces menu 1 At the Console Login prompt enter root The system prompts you for a password 2 Enter your root password The system displays the system prompt 3 Enter cvis_menu T...

Page 182: ...Switch Interface Administration Accessing the Switch Interfaces Menu 4 Select 5 Press ENTER The system displays the Switch Interfaces menu Figure 85 Figure 85 Switch Interfaces Menu Switch Interfaces...

Page 183: ...n the system The digital interfaces currently support the E1 T1 digital circuit card with the following protocols T1 A B Robbed bit E M E1 CAS ISDN Primary Rate Interface PRI The process of administer...

Page 184: ...t the Switch Interfaces menu Figure 85 on page 143 and select The system displays the Digital Interfaces menu Figure 86 Figure 86 Digital Interfaces Menu Note Figure 86 displays the installed digital...

Page 185: ...T1 circuit cards installed in the voice system and the function to which each is assigned To display the installed E1 T1 circuit cards and their digital protocol assignments 1 Start at the Digital In...

Page 186: ...re 87 Display Digital Interface Assignments By default a circuit card is marked unassigned A protocol must be installed on the voice system before it can be assigned to an E1 T1 card CWB2 See E1 T1 Ci...

Page 187: ...id Parameter Values Protocol Name T1 A B Robbed bit E M Default ISDN PRI Layer 1 E1 CAS Framing Line Coding D4ZCS ESFB8ZS CEPTHDB3 D4ZCS ESFB8ZS CEPTHDB3 DTMF Muting Yes No Yes Yes Yes CSU Distance 0...

Page 188: ...7 707 Outgoing Addressing Type MFC MFC Incoming Addressing Type MFC MFC Outgoing Text Volume2 0 32000 30 to 30 dB 1000 1000 1000 Table 11 Valid Parameter and Default Values for E1 T1 Digital Protocols...

Page 189: ...obbed bit E M signaling on a link using D4 framing with zero code suppression ZCS The E1 T1 interface outpulses dual tone multifrequency DTMF tones at 7 pulses per second when originating outbound cal...

Page 190: ...it Cards Note Before a new protocol can be assigned to a circuit card any existing protocol must first be unassigned See Unassigning T1 A B Robbed bit E M to Digital Circuit Cards on page 161 below fo...

Page 191: ...ces To assign the T1 A B Robbed bit E M protocol to a digital circuit card 1 Start at the T1 A B Robbed bit E M menu Figure 88 on page 151 and select The system displays the Assign Card T1 A B Robbed...

Page 192: ...4 Switch Interface Administration Digital Interfaces Figure 89 Assign Card T1 A B Robbed bit E M Window...

Page 193: ...n the interface is used for bridging DTMF needs to pass through without muting 4 Enter the cable distance in feet between the Channel Service Unit CSU and the voice system in the CSU Distance field or...

Page 194: ...is DTMF 10 Enter the type of signaling to be used with outgoing calls either Wink or Immediate in the Outgoing Signaling Type field The default is Wink 11 Enter the type of signaling to be used with...

Page 195: ...time and so on See Table 15 on page 192 for the relationship between the volume number and the actual change in volume expressed in decibels Note The incoming speech volume value is set on a per card...

Page 196: ...to use this procedure See Assigning T1 A B Robbed bit E M to Digital Circuit Cards on page 151 for more information about making the initial assignment Note Before attempting to make any assignment ch...

Page 197: ...4 Switch Interface Administration Digital Interfaces The system displays the Change Parameters T1 A B Robbed bit E M window Figure 90 Figure 90 Change Parameters T1 A B Robbed bit E M Window...

Page 198: ...rcuit Cards on page 151 4 Press F3 Save The system changes the protocol parameters on the selected circuit card Displaying T1 A B Robbed bit E M Parameters The circuit card must first be assigned to t...

Page 199: ...4 Switch Interface Administration Digital Interfaces The system displays the Display Parameters T1 A B Robbed bit E M window Figure 91 Figure 91 Display Parameters T1 A B Robbed bit E M Window...

Page 200: ...E M menu Unassigning T1 A B Robbed bit E M to Digital Circuit Cards Note Before attempting to make any assignment changes to circuit cards they must be in the MANOOS state See Equipment State on page...

Page 201: ...4 Switch Interface Administration Digital Interfaces The system displays the Unassign Card T1 A B Robbed bit E M window Figure 92 Figure 92 Unassign Card T1 A B Robbed bit E M Screen...

Page 202: ...igital Interfaces menu E1 CAS Protocols The UCS 1000 R4 2 supports the E1 Channel Associated Signaling CAS protocol Mexico for use with the DEFINITY switch The following CAS protocol is supported with...

Page 203: ...o Menu Use the procedures below to assign or unassign the Digital R2 MFC Mexico protocol to or from digital circuit cards and administer the switch interface parameters Assigning the Digital R2 MFC Me...

Page 204: ...f you also change digital protocol assignments on the voice system you must make the change on the switch To assign the Mexico protocol to an E1 circuit card 1 Start at the Digital R2 MFC Protocol Mex...

Page 205: ...4 Switch Interface Administration Digital Interfaces The system displays the Assign Card Digital R2 MFC Protocol Mexico window Figure 94 Figure 94 Assign Card Digital R2 MFC Protocol Mexico Window...

Page 206: ...Card Digital R2 MFC Mexico Window Field Name Value Framing Line Coding CEPTHDB3 Idle Code 01010100 DTMF Muting Yes A LAW or MU LAW A LAW CRC Yes Max Digits in Called Number 4 Outgoing Addressing Type...

Page 207: ...nformation about making the initial assignment Note Before attempting to make any assignment changes to circuit cards they must be in the manoos state See Equipment State on page 103 in Chapter 3 Voic...

Page 208: ...on Digital Interfaces Figure 95 Change Parameters Digital R2 MFC Protocol Mexico Window 2 Enter the circuit card number in the Card Number field or press F2 Choices to select from a menu Initially all...

Page 209: ...igning the Digital R2 MFC Mexico Protocol to E1 Circuit Cards on page 164 for more information about making the initial assignment To display the Digital R2 MFC Mexico parameters of an E1 circuit card...

Page 210: ...Interface Administration Digital Interfaces Figure 96 Display Parameters Digital R2 MFC Protocol Mexico Window 2 Enter the circuit card number in the Card Number field or press F2 Choices to select fr...

Page 211: ...t cards they must be in the manoos state See Equipment State on page 103 in Chapter 3 Voice System Administration for additional information To unassign the Digital R2 MFC Mexico protocol 1 Start at t...

Page 212: ...h Interface Administration Digital Interfaces Figure 97 Unassign Card Digital R2 MFC Protocol Mexico Window 2 Enter the circuit card number in the Card Number field or press F2 Choices to select from...

Page 213: ...to return to the Digital Interfaces menu ISDN PRI Layer 1 Protocol Accessing the ISDN PRI Layer 1 Menu Note All selected options must match the corresponding options on the network switch If they do n...

Page 214: ...be assigned to a circuit card any existing protocol must first be unassigned See Unassigning T1 A B Robbed bit E M to Digital Circuit Cards on page 161 for more information Before attempting to make a...

Page 215: ...o assign the ISDN PRI Layer 1 to a digital circuit card 1 Start at the ISDN PRI Layer 1 menu Figure 98 on page 175 and select The system displays the Assign Card ISDN PRI Layer 1 window Figure 99 Figu...

Page 216: ...for T1 PRI are D4ZCS or ESFB8ZS ESFB8ZS is the default 4 Enter Yes to enable or No to disable in the DTMF Muting field or press F2 Choices to select from a menu Yes is the default Enter Yes to use du...

Page 217: ...PRI interface has its own D channel and the system supports up to three 30B D interfaces 6 Enter the volume adjustment for all incoming speech on circuit cards in the Incoming Speech Volume field Val...

Page 218: ...the volume number and the actual change in volume expressed in decibels Note The incoming speech volume value is set on a per card basis for digital circuit cards 7 Enter the volume adjustment for all...

Page 219: ...able distance between the voice system and the equipment to which it is connected 11 E1 only Enter Yes to enable the cyclical redundancy check error checking or No to disable the error checking in the...

Page 220: ...d be provisioned so that the channel number is exclusive and not preferred If the switch is configured to deliver ANI on a subscription basis it is not possible for the voice system to request a diffe...

Page 221: ...t be assigned to the ISDN PRI Layer 1 protocol to use this procedure See Assigning an ISDN PRI Layer 1 to Digital Circuit Table 14 PRI Layer 3 Parameters Layer 3 Parameter Value seconds Timer T302 15...

Page 222: ...change the ISDN PRI Layer 1 parameters 1 Start at the ISDN PRI Layer 1 menu Figure 98 on page 175 and select The system displays the Change Parameters ISDN PRI Layer 1 window Figure 100 Figure 100 Cha...

Page 223: ...RI Layer 1 to Digital Circuit Cards on page 175 4 Press F3 Save The system changes the specified parameters for the selected circuit card Displaying ISDN PRI Layer 1 Parameters The circuit card must f...

Page 224: ...ration Digital Interfaces The system displays the Display Parameters ISDN PRI Layer 1 window Figure 101 Figure 101 Display Parameters ISDN PRI Layer 1 Window 2 Enter the circuit card number in the Car...

Page 225: ...e 103 in Chapter 3 Voice System Administration for additional information If you change digital protocol assignments on the voice system you must also make the change on the switch To unassign the ISD...

Page 226: ...ital Interfaces Figure 102 Unassign Card ISDN PRI Layer 1 Window 2 Enter the circuit card number in the Card Number field or press F2 Choices to select from a menu The system displays the current para...

Page 227: ...ou have made changes For example when changing the frame format from D4ZCS to ESF your PRI link to the switch may not come up if you have not stopped and started the voice system See Stopping the Voic...

Page 228: ...sioning the 4ESS switch for an E1 T1 connection TYPE CPE DIGITAL PBX ACD WITH DS1 INTERFACE 4E NETWORK SWITCHED BASED SERVICES MEG Megacom MEG8 Megacom 800 or MULTIQUEST as desired ACCESS TYPE T1 TRUN...

Page 229: ...E DOES NOT SUPPORT DIFFERENT SIGNALING BIDIRECTIONALLY NUMBER OF DIGITS OUTPULSED TO CPE This number should match the number selected in the Maximum Digits in Called Number E1 T1 option THE CPE CAN AC...

Page 230: ...h system parameters Note You must stop the voice system before changing the switch system parameters 1 Start at the Switch Interfaces menu Figure 85 on page 143 and select The system displays the Chan...

Page 231: ...tion Changing Switch System Parameters 2 Change the field values using the information in Table 15 and Table 16 on page 193 Table 15 DTMF Tone Table Keys on the Telephone Keypad Corresponding DTMF Ton...

Page 232: ...s Field Name Description Valid Values Background Output Volume This parameter specifies the adjustment to the output volume level in percent for the speech being played in the background A numeric ent...

Page 233: ...w the current setting for the switch system parameters To display the switch system parameters Note You must stop the voice system before changing the switch system parameters 1 Start at the Switch In...

Page 234: ...4 Switch Interface Administration Displaying Switch System Parameters Figure 104 Display Switch System Parameters Window 2 Press F6 Cancel to return to the Switch Interfaces menu...

Page 235: ...mation in this chapter is applicable only if you have the ORACLE 7 software installed on your system This chapter includes procedures for determining database space requirements sizing the databases a...

Page 236: ...the sqlplus user sti sti Table 17 ORACLE Call Data Tables Table Name Table Description CCA Call classification analysis data contains one record for each attempted transfer or outdial CCASUM Summary...

Page 237: ...affic summary data contains one record per hour and channel 1 The CALL and SERVICE tables replace the CDH table Since more than one service application may be running during a call there may be multip...

Page 238: ...fies the telephone number of an attempted transfer or outdialed call This field can be up to 16 characters in length RESULT_CODE is a variable length character field that indicates the disposition of...

Page 239: ...tion of the call This field can be 1 or more characters in length Note Records are generated on a per hour per telephone number and per result_code basis CALL Table The CALL table contains the followi...

Page 240: ...to handle the call All SERVICE records associated with a call have the same SERVICE CID as the CALL CID in the CALL record See Relationship Between the CALL SERVICE and EVENT Tables on page 204 SID is...

Page 241: ...that specifies the service application name This field can be up to 16 characters in length START_TIME is a date field that specifies the start of the hour for example 10 00 00 DURATION is a numeric...

Page 242: ...more information EVSUM Table The EVSUM table contains the following information SUMID is a numeric field that specifies a unique identification number Note The values in this field are related to the...

Page 243: ...indicates the channel number This field can be up to 3 digits in length CALL_TOT is a numeric field that specifies the total number of calls DUR_TOT is a numeric field that specifies the total duratio...

Page 244: ...es Each record in the CALL table is linked to one or more records in the SERVICE table Each record in the SERVICE table is linked to zero or more records in the EVENTS table Figure 105 Relationship Be...

Page 245: ...accommodate the heavier traffic on your system or the greater number of events defined in your applications The most likely candidates for resizing are the EVENTS SERVICE and CALL tables and their in...

Page 246: ...gger number where 999 is the current initial size for the table and k stands for kilobytes 1024 bytes Note The new values specified should be at least twice as large as the current table size you wrot...

Page 247: ...nter sqlplus oracle dist cdh sql The system reinitializes the table or tables 11 Enter systblres file The system restores the table storage information from the UNIX file or device name where it was s...

Page 248: ...sti sti The system starts a sqlplus session 4 Enter describe CCA Note If the table name is lowercase do not use the describe command Instead use desc as described below desc table_name The system dis...

Page 249: ...dexes and Key Fields For large databases you can use indexes on key fields to greatly reduce the time necessary to search the tables Indexed fields can be especially important in applications that req...

Page 250: ...Unique indexes on fields enforce uniqueness of the data in that field across the entire table of records For example a field for which you might create a unique index is one that contains a social se...

Page 251: ...al records in the same table For example if a field contains the area code of a telephone number and an index is created for that field it must be a non unique index since other records may require th...

Page 252: ...abase interface process DIP A DIP is a software program that connects to the database and provides the only interface between the application and the database Database DIP Timeout The voice system and...

Page 253: ...the DIP is equipped with a timeout mechanism By default the DIP times out every 45 seconds while waiting for a response After the timeout the DIP deletes the messages currently queued and continues to...

Page 254: ...which the cursor was allocated The number of cursors is tunable in the oracle dbs initA ora file open_cursors is a tunable parameter At least 500 cursors are supported Once the limit of cursors is re...

Page 255: ...ng are sample calculations using various configurations and numbers of read table operations If you have a 24 channel system running an application that performs four read table operations on four dif...

Page 256: ...an application that executes six read table operations on six different tables per channel 500 6 1 83 33 Therefore the application can run on as many as 80 channels before it encounters database acces...

Page 257: ...prompt enter root The system prompts you for a password 2 Enter your root password The system displays the system prompt 3 Enter vs bin util dbfrag The system displays the number of free database blo...

Page 258: ...already exists in this directory use dbsA3 dbf 11 Enter size number where number is the number of bytes calculated in step 6 that you want to add to the database 12 Enter exit Note We recommend that y...

Page 259: ...ce the number of days for which data is stored Reducing the Amount of Call Data Stored You can decrease the amount of database space needed by reducing the number of stored call data events This reduc...

Page 260: ...file Start the ORACLE DBMS VSUTIL vs bin util ORACLE_SID A export ORACLE_SID ORACLE_HOME usr lbin dbhome ORACLE_SID PATH PATH ORACLE_HOME bin export PATH ulimit 2113674 if usr lbin orastat s dev null...

Page 261: ...of data means that only the call classification data for the current day is available until the clean up and summary programs run each night after midnight The voice system always maintains the curren...

Page 262: ...if usr lbin orastat s dev null then else ulimit 2113674 ior w fi perform the cron jobs VSUTIL cdhsum VSUTIL cdhdel 2 VSUTIL ccasum VSUTIL ccadel 4 cleanout the unwanted ORACLE files VSUTIL logdel vs...

Page 263: ...ign in front of the value shared_pool_size 3500000 4 Remove the pound sign from the front of the value shared_pool_size 6000000 5 Save and exit the file 6 Enter oracle bin ior c to stop the database s...

Page 264: ...e voice system and the database system be stopped If possible avoid reducing the size of the rollback segment when call traffic is heavy The procedure to verify the size of the rollback segment does n...

Page 265: ...nal size of the rollback segment was set to 653312 bytes If the current size is close to this number or if it is less than one fourth of your total database size you do not need to reduce the size of...

Page 266: ...age if the database system is running The database system is running Is it OK to shutdown the database y n 7 Enter y The system stops the database system and executes the rb_init command When the rb_i...

Page 267: ...the Database Administration window 1 At the Console Login prompt enter root The system prompts you for a password 2 Enter your root password The system displays the system prompt 3 Enter cvis_menu Th...

Page 268: ...nistration Voice System Database Administration 4 Select The system displays the Database Access ID Table window Figure 107 Figure 107 Database Access ID Table Window Database Administration Configura...

Page 269: ...ocal or remote database access ID Remove a local or remote database access ID Table 18 describes each field in the Database Access ID Table window Table 18 Field Descriptions for the Database Access I...

Page 270: ...n represents each local or remote database to the voice system An application can access multiple database tables in a local database that is a database that resides on the voice system s hard disk Ho...

Page 271: ...ystem Database Administration Figure 108 Add A Database Access ID Menu 4 Select The system displays the Add a Local Database Access ID window Figure 109 Figure 109 Add a Local Database Access ID Windo...

Page 272: ...twice to return to the Configuration Management menu 8 Stop and start the voice system See Stopping the Voice System on page 90 and Starting the Voice System on page 93 in Chapter 3 Voice System Admi...

Page 273: ...exists but manual alterations are sometimes necessary For assistance with this requirement see the database administrator See Configuring the TNS Listener LISTENER ORA and Identifying the Servers TNS...

Page 274: ...stration Voice System Database Administration 4 Select The system displays the Add V2 Remote Database ID window Figure 111 Figure 111 Add V2 Remote Database Access ID Window Add a SQL Net V2 Remote Da...

Page 275: ...er to this connection Remote DB s Connect Descriptor This field specifies the database instance on the remote database server to which you want to connect This connect descriptor is put into the oracl...

Page 276: ...lready exist in the local etc hosts file Contact the network administrator for this name or TCP IP address TCP IP Port Number This field contains the TCP IP port number This port number must match the...

Page 277: ...e server due to performance considerations Yes or No If No the system can only be a client to a remote database server If Yes the system can be both a client and a database server Also if Yes the syst...

Page 278: ...CS 1000 R4 2 If the database server is a UNIX based system running ORACLE V7 but not a UCS 1000 R4 2 system you must perform the following procedures to complete the ORACLE environment setup Note This...

Page 279: ...ing PRO C or SQL PLUS programs Setting the Connect Descriptor If you are using PRO C or SQL PLUS with an IRAPI application you must change or verify the correct form of the connect string The database...

Page 280: ...ecutable file using the move command but keep it in the same directory 3 Using your favorite editor edit a file with the same name as the original executable file 4 Enter the following on the first li...

Page 281: ...d to illustrate these steps The executable file that communicates with the database is called get_pin_uac The name of the instance of the ORACLE database is A 1 Compile the get_pin_uac executable file...

Page 282: ...lowing describes the putenv approach The putenv function call permits the developer to directly place the ORACLE_SID and the ORACLE_HOME environmental shell variables into a Pro C program Perform the...

Page 283: ...hat make up the custom software The following example is used to illustrate these steps The name of the instance of the ORACLE database is A The name of the ORACLE_HOME directory is oracle start of he...

Page 284: ...the associated ORACLE database CAUTION When you remove a remote database access ID make sure that no applications use that database access ID If an application uses an ID that has been removed the ap...

Page 285: ...field or press F2 Choices to select from a menu 5 Press F3 Save The system saves the ID of the remote database connection to be deleted 6 Stop and start the voice system See Stopping the Voice System...

Page 286: ...1000 R4 2 applications that is not covered under the warranty If you use SQL PLUS to drop a table or change a table schema you must reverify and reinstall the application that refers to the table The...

Page 287: ...croncdh job that runs once a day The i option also asks if you want new error messages added to the att errors file along with explanations used with the explain command This installation only needs...

Page 288: ...rints the warning messages to standard output The m user option allows for the messages to be mailed to user Multiple users can be sent the mail by separating the user names with a tilde Following are...

Page 289: ...dbfrag Command The dbfrag command is a shell script that reports on database allocation usage and fragmentation The block size reported is in ORACLE blocks 2048 bytes This command is useful to get a q...

Page 290: ...nt of space used by each object for a given user Objects are tables indexes clusters rollback and cache The default user is sti sti dbused Command Options The dbused command has three options h prints...

Page 291: ...tomatically removed by ORACLE and must be removed by the user or administrator if the files are no longer wanted In addition ORACLE creates a log file oracle tcp log orasrv log that contains all of th...

Page 292: ...es needed to configure and administer the peripheral equipment connected to your voice system namely modems printers and remote terminals Accessing the Unix Management Menu To access the Unix Manageme...

Page 293: ...Peripheral Administration Accessing the Unix Management Menu 3 Enter cvis_menu The system displays the Voice System Administration menu Figure 113 Figure 113 Voice System Administration Menu 4 Select...

Page 294: ...Unix Management menu Figure 114 Figure 114 Unix Management Menu The procedures in this chapter detail administration for modems terminals and printers The other menu options in the UNIX Management me...

Page 295: ...lation in UCS 1000 R4 2 New System Installation 585 313 127 for the procedure to physically connect the modem Configuring the Modem In order for the 3820 or 3920 plus modem to work properly with the v...

Page 296: ...s below to configure the 3820 modem via its control panel Activate the Unix Dial Default Factory Configuration To activate the UNIX Dial default factory setting 1 Turn the modem off and then back on 2...

Page 297: ...ministration 7 Press F2 Select Modem response Choose Function Edit and Save 8 Press F3 Save Modem response Sav EditArea to Active 9 Press F1 Save 3820 modem response Command Complete 3920 Plus modem r...

Page 298: ...set the Async DTE rate to the required speed 1 Press or on the modem to display Configure 2 Press the function key under Configure F1 or F2 Modem response Ld EditArea frm 3 Press or to display Active...

Page 299: ...the next procedure Setting the DTR Action and DSR Control to Standard RS 232 on the Modem on page 260 Do not return to the top level menu Setting the DTR Action and DSR Control to Standard RS 232 on t...

Page 300: ...single Modem response Edit StrapGroup 8 Press or to display DTE Dialer 9 Press F1 Edit Modem response DTE Dialer Type 10 Press F1 Next to display AT Escape Char 11 Use or and F2 Select to adjust the...

Page 301: ...trapGroup 18 Continue with the next procedure Setting the Error Control Mode to Buffer Mode on the 3820 Modem on page 262 Do not return to the top level menu Setting the Error Control Mode to Buffer M...

Page 302: ...tration Modem Administration 6 Press or to display CTS_to_DTE 7 Press F2 Select 8 Press Modem response Edit StrapGroup 9 Press Modem response Choose Function Edit and Save 10 Press F3 Save Modem respo...

Page 303: ...the terminal for connection instructions 2 Verify that the terminal is acting as a DTE 3 Set the terminal line to 8 bits no parity and 1 stop bit 4 Set the baud of the terminal line to the required m...

Page 304: ...the 3820 modem to use COM1 where the baud is 19200 enter 20 as the dial line rate as shown below AT TF3L0 D2 S1 N0 Q3S41 20S2 128 W0 Modem response OK 7 Disconnect the terminal 8 Connect the modem to...

Page 305: ...h the voice system you must administer the voice system to recognize the modem port To administer the voice system to recognize the modem 1 At the Console Login prompt enter root The system prompts yo...

Page 306: ...l window Figure 115 Figure 115 Install Modem Terminal Window 5 Enter modem in the Device field 6 Press F2 Choices to display a list of valid port numbers for the Serial Port Number field a Select COM...

Page 307: ...o configure UnixWare for a modem 1 Start at the UNIX System V Administration menu Figure 17 on page 24 and select The system displays the Adds a Device for Use by Basic Networking window Figure 116 Fi...

Page 308: ...sic Networking 1 window Figure 117 Figure 117 Add a Modem Device for use by Basic Networking 1 Window 4 Enter ACU in the Device Type field 5 Enter the appropriate modem in the Modem Type field or pres...

Page 309: ...by Basic Networking 2 window Figure 118 with several of the fields already filled in Figure 118 Add a Modem Device for use by Basic Networking 2 Window 7 Enter dev tty00 for COM port 1 Note COM port 2...

Page 310: ...inistration Setting Up UnixWare to Use a Modem for Incoming Calls To configure UnixWare for a modem that can process incoming calls 1 Start at the UNIX System V Administration menu Figure 17 on page 2...

Page 311: ...6 Peripheral Administration Modem Administration The system displays the Add A Port Monitor window Figure 119 Figure 119 Add A Port Monitor Window...

Page 312: ...ter Yes in the Start port monitor immediately field 7 Enter Enabled in the Start state field 8 Enter 0 in the Restart count field 9 Press F3 Save The system displays the Service Access Management menu...

Page 313: ...6 Peripheral Administration Modem Administration 10 Select ModemMon add to one add port services...

Page 314: ...6 Peripheral Administration Modem Administration The system displays the Add Port Services to Port Monitor window Figure 121 Figure 121 Add Port Services to Port Monitor Window...

Page 315: ...in the utmp entry to be created for this service field 16 Enter 2 in the Version number field Leave the remaining fields blank 17 Press F3 Save The system displays the Add Port Services for ttymon win...

Page 316: ...rvice command field 21 Enter No in the Hangup field 22 Enter No in the Connect in Carrier field 23 Enter Yes in the Bidirectional field 24 Enter No in the Wait read Count field 25 Enter 0 in the Timeo...

Page 317: ...rt Service Management menu Figure 123 Figure 123 Port Service Management Menu 31 Press F6 Cancel repeatedly to return to the UNIX System V Administration menu Printer Administration This section descr...

Page 318: ...Contact your field support personnel if you want to connect a serial printer to the system To configure a local parallel printer 1 At the Console Login prompt enter root The system prompts you for a p...

Page 319: ...Peripheral Administration Printer Administration 4 Select The system displays the Add a New Printer window Figure 125 Figure 125 Add a New Printer Window add printers printers UNIX System Administrati...

Page 320: ...8 Enter none in the Similar printer to use for defaults field 9 Enter no in the Do you want to use standard configurations eg alerts banners field 10 Enter yes in the Do you want to use standard port...

Page 321: ...ion Printer Administration The system displays the Configure New Printer window Figure 126 Figure 126 Configure New Printer Window 14 Enter none in the Class field 15 Enter printer one in the Descript...

Page 322: ...char pitch Default line pitch Default page width Default page length 19 Enter mail lp in the Command to run for alerts field 20 Enter once in the Frequency of alert in minutes field 21 Enter beginning...

Page 323: ...stration The system displays the Printer Successfully Added window Figure 127 Figure 127 Printer Successfully Added Window 24 Press F8 Cont The system displays the Setup Printer Access window Figure 1...

Page 324: ...ields are complete 26 Enter none in the Users who are denied access to this printer field 27 Enter all in the Forms allowed on this printer field 28 Enter none in the Forms denied on this printer fiel...

Page 325: ...30 Press F6 Cancel The system displays the Line Printer Services Configuration and Operations window Figure 130 Figure 130 Line Printer Services Configuration and Operations Window Note Wait at least...

Page 326: ...the name of the printer in the Printer s and or Class es field or press F2 Choices to select from a menu If you select from the Choices menu you must press F2 Mark to mark each class or printer you wa...

Page 327: ...6 Enter the name of the printer in the Printer s field or press F2 Choices to select from a menu If you select from the Choices menu you must press F2 Mark to mark each printer you want to enable and...

Page 328: ...estination Window 40 Enter the name of the printer in the Default Printer or Printer Class field or press F2 Choices to select from a menu 41 Press F3 Save The system saves the printer configuration i...

Page 329: ...ripheral Administration Printer Administration OR Install Okidata 320 Printer Software Printer Administration UNIX Management Install Okidata Laser Printer Software Printer Administration UNIX Managem...

Page 330: ...d an entry for the printer This entry must include the hex representation for the printer IP address and port hp4si Any hplaser x002 hex value for port hex value for IP address For example hp4si Any h...

Page 331: ...not want a banner page to print complete the following steps a through c a Enter usr lib lp model b Enter cp standard LANHP c Edit the LANHP file and change nobanner no to nobanner yes 9 Enter lpstat...

Page 332: ...Remote Terminal Administration Configuring the Remote Terminal Use the following procedure to configure a terminal monitor 1 Start at the UNIX System V Administration menu Figure 17 on page 24 and sel...

Page 333: ...nal Setup window Figure 134 Figure 134 Quick Terminal Setup Window 2 If you know the name of the port monitor enter the name in the Port Number s field or press F2 Choices to select from a menu 3 Ente...

Page 334: ...e Terminal To administer the voice system to recognize the modem 1 At the Console Login prompt enter root The system prompts you for a password 2 Enter your root password The system displays the syste...

Page 335: ...indow Figure 135 Figure 135 Install Modem Terminal Window 5 Enter terminal in the Device field 6 Enter a serial port number or press F2 Choices to display a list of valid port numbers for the Serial P...

Page 336: ...daily administrative tasks Common administration includes running system reports and performing procedures such as system monitoring media formatting backups and administering the date and time Comma...

Page 337: ...s the Command Menu 1 Once you have accessed the Voice System Administration menus as described in Chapter 3 Voice System Administration from almost any menu or window press F7 Cmd Menu The system disp...

Page 338: ...Monitor To access the System Monitor window from the Command Menu 1 Start at the Command Menu Figure 136 on page 298 and select The system displays System Monitor Voice Channels window Figure 137 Figu...

Page 339: ...only applications The number of virtual channels in the system depends on the software applications installed In most systems there is a single virtual channel for the playing of background speech Ca...

Page 340: ...example when a caller enters an account number in response to a transaction prompt a series of touchtone digits is registered in the voice system from the caller This information is collected by the v...

Page 341: ...h an asterisk Table 21 Entries for the Service Status Column Service Status Entry Description BROKEN The channel is broken CCA The channel is in process of call classification Coding The channel is pe...

Page 342: ...ice D NONEX PRI feature only The D channel is nonexistent DIP 0 34 The channel is processing a request from a data interface process FOOS The channel is facility out of service Host The channel is cur...

Page 343: ...K The channel is in service and is waiting for a call Pending The channel is going into or leaving an operational state Talking The channel is playing speech Transfer The channel is transferring a cal...

Page 344: ...em Monitor Voice Channels window Figure 137 on page 299 and press F8 Chg Keys The system displays the alternate set of function keys 2 Press F1 Chg Rate The system displays the Change Refresh Rate win...

Page 345: ...8 Chg Keys The system displays the alternate set of function keys 2 Press F6 Print The system prints the System Monitor Voice Channel Report Trace Service A trace is a record of the events that occur...

Page 346: ...ys the Trace Service window Figure 139 Figure 139 Trace Service Window 2 Enter a single channel or session number or all in the Channel or Session field 3 Press F3 Save The system displays the Trace O...

Page 347: ...the display Press F1 Resume to continue scrolling through the trace output Press DELETE to stop the trace Press F2 Print from the Trace Service window to print the last 250 lines of output Note Space...

Page 348: ...cess the Reports Administration menu 1 At the Console Login prompt enter root The system prompts you for a password 2 Enter your root password The system displays the system prompt 3 Enter cvis_menu T...

Page 349: ...the Reports menu Figure 141 Figure 141 Reports Menu Use the procedures in this section to access and run the various reports in this menu Call Classification Report The Call Classification Report prov...

Page 350: ...ry statistics Displaying the Call Classification Report To display the Call Classification Report 1 Start at the Reports menu Figure 141 on page 310 and select The system displays the Call Classificat...

Page 351: ...are displayed in the report Longer numbers are truncated and displayed with an asterisk Total Specifies the total transfer attempts to connect to the Dialed Number This number is the sum of Failed Un...

Page 352: ...pecifies the number of transfer attempts that rang with no answer This number corresponds to call dispositions equal to N Other Specifies the number of times the network is busy and cannot complete a...

Page 353: ...Administration The system displays the Actions Menu Figure 143 Figure 143 Actions Menu 2 Select The system displays the Modify Call Classification Report window Figure 144 Figure 144 Modify Call Clas...

Page 354: ...ns that the voice system displays call classification information on calls made in the month of April 2000 You can specify a range of up to 365 days including the current date If you specify only the...

Page 355: ...r use with the voice system See Printer Administration on page 278 in Chapter 6 Peripheral Administration for more information about printer administration To print the Call Classification Report 1 St...

Page 356: ...flects the values last saved to the voice system To update the Call Classification Report 1 Start at the Call Classification Report window Figure 142 on page 311 and press F8 Actions The system displa...

Page 357: ...he Call Data Detail Report To display the Call Data Detail Report 1 Start at the Reports menu Figure 141 on page 310 and select The system displays the Call Data Detail Report window Figure 145 Figure...

Page 358: ...pecifies the database record number of each call made to the voice system Channel Specifies the channel on which the call was made Start Specifies the time and date the call began If multiple applicat...

Page 359: ...re of the following parameters Number of most recent call records you want to include Date of the data to include in the report Service associated with the call data To modify the Call Data Detail Rep...

Page 360: ...all in the Number of Call Records field to specify the number of most recent records to include in the report The default is all 4 Enter the date to which you want to limit the report information or...

Page 361: ...l in the Number of Call Records field and yesterday s date in the Date field the Call Data Detail Report displays only the records from yesterday 5 Enter a service name in the Service field to limit t...

Page 362: ...w parameters Printing the Call Data Detail Report The print option provides a complete printout of the Call Data Detail report Note You cannot print this report if a printer is not configured for use...

Page 363: ...rt Use the Update function to redisplay the report The report reflects the values that were last saved to the voice system See Modifying the Call Data Detail Report on page 320 for how to modify this...

Page 364: ...Report shows the calls on an hourly basis by service The system maintains approximately 7 days worth of data Note Call data summary information is prepared at midnight for the entire day Therefore ca...

Page 365: ...7 Common Administration Reports Administration The system displays the Call Data Summary Report window Figure 147 Figure 147 Call Data Summary Report Window...

Page 366: ...increments when calls were made to the voice system Service Script associated with a group of calls made during the specified time Average Hold Time Average duration of a call for the specified time i...

Page 367: ...ppears only when the Include Call Data Fields field is set to Yes See Modifying the Call Data Summary Report Count Either the total value of all calls for this event during the period if the event is...

Page 368: ...ys the Actions Menu Figure 143 on page 314 2 Select The system displays the Options for Call Data Summary Report window Figure 148 Figure 148 Options for Call Data Summary Report Window 3 Enter the da...

Page 369: ...ll not be displayed until the following day Wednesday 5 Enter a service name or all or press F2 Choices to select from a menu in the Service field to limit the report to a particular service The defau...

Page 370: ...e printout of the Call Data Summary report Note You cannot print this report if a printer is not configured for use with the voice system See Printer Administration on page 278 in Chapter 6 Peripheral...

Page 371: ...ll Data Summary Report Use the Update function to redisplay the report The report reflects the values last saved to the voice system See on page 327 for how to modify this report To update the Call Da...

Page 372: ...Priority level of the error Date and time the error occurred Source of the message Type of circuit card associated with the message as well as the circuit card number and channel number Descriptive te...

Page 373: ...mmon Administration Reports Administration The system displays the Message Log Report window Figure 149 Figure 149 Message Log Report Window Use F2 Prev Page and F3 Next Page to scroll through the rep...

Page 374: ...f error messages The priority is identified by one of the following codes C critical the problem is interrupting service and immediate action is needed major a potentially serious problem exists that...

Page 375: ...mulates generic call statistics and application messages The data interface process DIP The maintenance MTC process runs temporary diagnostics The transaction state machine TSM process controls transa...

Page 376: ...u allows you to display more information about a specific message To get additional information about a particular message in the Message Log Report window 1 Start at the Message Log Report window Fig...

Page 377: ...xplain Message ID Window 3 Enter the ID of the message for which you want more information in the Message ID field 4 Press F3 Save The system displays additional information about the specified messag...

Page 378: ...layed By default the Message Log Report is configured to display every message To limit what is displayed in the Message Log Report window 1 Start at the Message Log Report window Figure 149 on page 3...

Page 379: ...Figure 152 Modify Message Log Report Window 3 Enter C critical major minor alarms all or events in the Priority field to limit the type of messages you want to see based on priority or press F2 Choic...

Page 380: ...e search in the Start Time field that is the time of the first message to be displayed For example entering 02 05 10 00 indicates that you want to search messages that occurred on February 5 after 10...

Page 381: ...e displayed If you enter all the report displays all messages maintained by the log If you enter a single number the voice system searches all records and displays only that number of the most recent...

Page 382: ...Note You cannot print this report if a printer is not configured for use with the voice system See Printer Administration on page 278 in Chapter 6 Peripheral Administration for more information about...

Page 383: ...nd press F8 Actions The system displays the Actions Menu Figure 150 on page 337 2 Select The system updates the report and displays the values last saved Administrative Commands Log Report The Adminis...

Page 384: ...stop_vs disable autoreboot delete remove restore hdelete trace erase diagnose vs_enable Talkfile speech files commands add phrase copy phrase Content of the Administrative Commands Log Report The com...

Page 385: ...ration Reports Administration The system displays the Message Log Report window Figure 149 on page 334 2 Press F8 Actions The system displays the Actions Menu Figure 150 on page 337 3 Select Message L...

Page 386: ...system displays the Modify Message Log Report window Figure 153 Figure 153 Modify Message Log Report Window 4 Enter admin in the Priority field 5 Enter a software process source in the Source field or...

Page 387: ...or month day hour and minute If the Stop Time field is left blank the end of the administrative command log is used Note If nothing is entered in the Start Time and Stop Time fields the entire adminis...

Page 388: ...stration 11 Press F3 Save The system displays the Message Log Report window now with the Administrative Commands Log Report data Figure 154 Figure 154 Administrative Commands Log Report Window Display...

Page 389: ...ity Login ID Login ID that executed the command or activity if applicable A common login ID listed is root Administrative command text Full text of the command or activity executed with all applicable...

Page 390: ...mmands Log Report 1 Start at the Administrative Commands Log Report window Figure 154 on page 349 displayed under the Message Log Report window and press F8 Actions The system displays the Actions Men...

Page 391: ...9 displayed under the Message Log Report window and press F8 Actions The system displays the Actions Menu Figure 150 on page 337 2 Select The system updates the report and displays the values last sav...

Page 392: ...istration Displaying the Traffic Report To display the Traffic Report 1 Start at the Reports menu Figure 141 on page 310 and select The system displays the Traffic Report window Figure 155 Figure 155...

Page 393: ...Table 26 Entry Description for the Traffic Report Entry Description Channel Channel that handled the call Period Time period when system traffic is monitored Calls Number of calls made during the indi...

Page 394: ...The system displays the Actions Menu Figure 143 on page 314 2 Select The system displays the Modify Traffic Report window Figure 156 Figure 156 Modify Traffic Report Window 3 Enter a day of the week M...

Page 395: ...t The two reports are described below The Traffic Summary report provides information on the total traffic volume for each channel for the range of hours specified in the Traffic Report window The Tra...

Page 396: ...t if a printer is not configured for use with the voice system See Printer Administration on page 278 in Chapter 6 Peripheral Administration for more information about printer administration To print...

Page 397: ...e 353 and press F8 Actions The system displays the Actions Menu Figure 143 on page 314 2 Select The system updates the report and displays the values last saved Signal Processing Activity Report The S...

Page 398: ...for example 09 12 2000 The mm dd yyyy file contains one line of data for each 5 minute period during which the voice system is running Each line consists of 10 fields Field 1 Date and time using the...

Page 399: ...n page 575 in Appendix A Summary of Commands for more information about creating a Signal Processing Activity report Custom Database Reports To write a cron job that generates your own ORACLE database...

Page 400: ...ures See Common System Procedures in UCS 1000 R4 2 System Reference 585 313 210 for information and procedures to perform the following common administrative tasks Format diskettes and cartridge tapes...

Page 401: ...f all commands Table 27 lists all the commands Table 27 Command Synopsis Command Function add Adds a phrase to a UNIX talkfile SSP only addhdr Adds a voice or code header to a speech file SSP only ala...

Page 402: ...Generates a call classification data summary report cddrpt Generates a call data detail report cdsrpt Generates a call data summary report for a specific date checktf Checks for the existence of talk...

Page 403: ...abase use by oracle user decode Converts adpcm16 or adpcm32 files to pcm64 files SSP only defservice Defines an IRAPI service delete card channel Removes a card or channel from a service or an equipme...

Page 404: ...ed to DNIS and ANI numbers display eqpgrp group Displays an equipment group report display messages Displays system messages display_permissions Displays voice system security permission information f...

Page 405: ...nsmissions findHomes Populates a user s home directory with files saved as part of an assisted upgrade fixLogFile Upgrades existing logging files iCk Performs various integrity checks based on the rul...

Page 406: ...d generates the code that implements the description mkheader Allocates user memory for script variables mkimage Performs a complete system backup msgadm Facilitates the administration of system messa...

Page 407: ...and critical alarms on the TAM unit rmdb Displays the state of the resource manager and modify debug levels show_sys Allows you to retrieve configuration and administration information from customer...

Page 408: ...vs Brings the voice system up to a fully operational state stop_vs Stops the voice system software gracefully striphdr Strips voice or code headers from a speech file SSP only sysmon Executes a progra...

Page 409: ...ormat vsdisable Disables the automatic restarting of the voice system vsenable Enables the automatic starting of the voice system at system reboot vusage Displays the current load on the voice system...

Page 410: ...at were previously extracted from another talkfile using the copy command The path name for the file may be the full pathname or the relative pathname If no path is specified the file is created in th...

Page 411: ...s speech talk pl Examples The following example adds phrase number 275 to talkfile 25 from the phrase stored in the UNIX file phr275 in the directory tmp junk add phrase 275 to talkfile 25 from tmp ju...

Page 412: ...speech file Two mutually exclusive types of headers are supported voice and code A voice header identifies a file as being editable and includes an optional identifying tag A code header which can be...

Page 413: ...disables the buzzer on the TAM unit Synopsis alarm_cutoff There are no arguments for this command Description The alarm_cutoff command disables the buzzer on the TAM unit annotate The annotate command...

Page 414: ...the message is associated with the channel s trace stream The message must be fewer than 160 characters The annotate trace message is displayed in the trace output if a trace is running when the anno...

Page 415: ...r of channels or cards changes scripts are added or deleted telephone numbers change or the user wants to reconfigure the system The system uses the card and channel assignments to route an incoming c...

Page 416: ...xample assigns channels 0 through 47 to equipment group 1 assign chan 0 47 to eqpgrp 1 See Also assign service startup display eqpgrp group delete eqpgrp assign_permissions The assign_permissions comm...

Page 417: ...ity permissions The permissions level argument is the specific security class permission to be assigned The security classes are as follows Administration Allows the user full voice system capabilitie...

Page 418: ...up The assign service startup command assigns an installed service to DNIS and ANI numbers or directly to a channel Synopsis assign service service_name startup startup_name to chan chan_list assign s...

Page 419: ...ndicates telephone numbers or telephone number ranges in the form phone1 phone2 A comma or space should be used to separate the list of telephone numbers or ranges for example phone1 phone2 Examples T...

Page 420: ...ce stdout to DNIS 5000 through 5008 and ANI any assign service stdout to dnis 5000 5008 The following example assigns the service stdout to DNIS 5000 through 5008 and ANI 6000 assign service stdout to...

Page 421: ...etached Use the attach command to allow the voice system to use a card that has just been replaced by hot swapping that is like for like replacement To put the card into service use the restore comman...

Page 422: ...and is being run remove detach attach restore or diagnose the request to attach is blocked and a message is printed to the screen If i is not used and any maintenance command is being run the request...

Page 423: ...les The following example attaches a card 2 attach card 2 The following example attaches port 1 of card 2 attach card 2 1 The following example attaches a card to channel 2 port 1 attach card 2 1 See...

Page 424: ...to change parameters associated with the auto reboot feature and to monitor the status of these parameters The following options are recognized enable disable This option specifies whether to enable...

Page 425: ...nabled and activated the system automatically reboots after a UNIX panic The auto reboot feature is activated as follows If there were fewer reboots than unanticipated reboots during the window minute...

Page 426: ...ing example enables autoreboot feature and changes window to two hours autoreboot enable window 120 Caveat This command must be run from ksh KORN shell bbs The bbs command reports status of the voice...

Page 427: ...e bbs listing are given in Table 28 on page 388 In the table the letter l indicates the long option which causes the corresponding heading to appear The all option means that the heading always appear...

Page 428: ...status if the voice system is not running or if for some other reason it can not access the BB Example SKEY l The semaphore key associated with the process and slot QID l The message queue ID RE SPA l...

Page 429: ..._date Description The ccarpt command generates a call classification data summary report This report is stored in standard out stdout The date start_date and end_date arguments may be in the form mm d...

Page 430: ...ort for October 10 1993 and are equivalent command statements ccarpt 10 20 93 ccarpt 10 20 1993 The following two examples generate the call classification data summary report from October 14 through...

Page 431: ...represents the number of records to be reported It can be any number a range of numbers or all indicating all records in the system service This parameter represents the script application name or all...

Page 432: ...s Call event data if any is also included in the report cddrpt 100 balance_chk y all 10 20 93 cddrpt 100 balance_chk y all 10 20 1993 The following example generates a call data detail report for all...

Page 433: ...d generates the call data summary report for a date specified The report is stored in standard out stdout Before this can be done the database system must be up and running but the voice system does n...

Page 434: ...27 96 is interpreted as May 27 1996 If the year argument is between 00 and 69 the 21st century is assumed For example 5 27 06 is interpreted as May 27 2006 Examples The following two examples generate...

Page 435: ...get the above message while running cdsrpt take the following remedial steps Make certain the vs trans application D file exits and is current Remove unnecessary files from the vs trans directory code...

Page 436: ...striphdr configure_tam The configure_tam command is used to download the configuration file for the TAM unit Syntax configure_tam There are no arguments for this command Description The configure_tam...

Page 437: ...cription The copy phrase command copies a phrase from one UNIX talkfile to another UNIX talkfile The path name for the file may be the full path name or the relative path name If no path is specified...

Page 438: ...umber 2 from talkfile 1 to the file speech talk a 1 copy phrase 2 from talkfile 1 to speech talk a 1 The following example copies phrase number 174 from talkfile 25 to the file speech talk h 4 copy ph...

Page 439: ...e using a 386 If the cpuType command returns a 4 you are using a 486 To determine the return value examine the shell variable cvis_mainmenu The cvis_mainmenu command accesses the administration menus...

Page 440: ...s cvis_menu cvis_menu The cvis_menu command accesses the Voice System Administration menu Synopsis cvis_menu Description This command provides access to the Voice System Administration menu See Also c...

Page 441: ...support for logger alerter messages The i option only needs to run once The cron job can be placed in either roots cron file or added to the end of the vs bin util croncdh job that runs once a day The...

Page 442: ...elow if the database falls below n percent free or if the rollback segment grows to be more than m percent of the total database size The dbcheck command by default sends warning messages to the logge...

Page 443: ...dh Mon Feb 15 16 35 06 1993 dbcheck logTest c 418 DBC001 Database 10 percent free 3072 Blocks of 30720 available Reason Low DB Space Mon Feb 15 16 35 06 1993 dbcheck logTest c 418 DBC002 Extents low 1...

Page 444: ...xceeded 2 Processing error 3 Database is not running Caveat Once dbcheck log messages are installed using dbcheck i the alarm priorities destinations and thresholds can not be changed through the Syst...

Page 445: ...ge and fragmentation The block size reported is in ORACLE blocks 2048 bytes You can request the information to be reported in Mbytes with the b option This tool is useful to get a quick check on datab...

Page 446: ...rgest contiguous ORACLE space available dbfrag h awk length 1 print 5 10240 Diagnostics The program returns the following 0 Success SYSTEM Tablespace Space is in Mega Bytes ALLOCATED 129 00 FREE 108 8...

Page 447: ...pt that lists the amount of free space in the database by free contiguous blocks The result is a detailed listing of each free memory area followed by the sum of each partition The free blocks are lis...

Page 448: ...NAME SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM sum 29 rows selected FILE_ID 1 1 1 1 1 1 1 1 1 1 START_BLOCK 5142 5560 4892 7892 4164 5598 8946 12650 25179 14939 MBYTES FRE...

Page 449: ...ates a temporary table dba_fragments under user system that compresses the adjacent entries provided by the dictionary view dba_free_space See Also dbfrag dbcheck dbused dbused The dbused command prov...

Page 450: ...d password the default is sti sti all for all users Below is an output summary for user all dbused su all Space allocated to objects Oracle blocks 2048 Bytes Block NAME C1 CCA CCASUM CDH CDHSUM E2 EVE...

Page 451: ...s Space allocated to objects Oracle blocks 2048 Bytes Block NAME C1 CCA CCASUM CDH CDHSUM E2 EVENTS EVSUM LDBCOLS TYPE INDEX TABLE TABLE TABLE TABLE TABLE TABLE TABLE TABLE BLOCKS 5 5 5 5 5 5 5 5 5 MB...

Page 452: ...dpcm16 or adpcm32 files to pcm64 files SSP only Synopsis decode adpcm32 adpcm16 Description Decode is a filter that converts ADPCM16 or ADPCM32 files to PCM64 files Warning Coding headers should be st...

Page 453: ...y IRAPI application developers It creates the registration file for an IRAPI service that is necessary for assigning or deleting service to or from a channel or DNIS and or ANI For TSM scripts the out...

Page 454: ...cess The default is P for permanent If the process that provides the IRAPI application application is a permanent process then p process must be the name the process uses as an argument to irRegister...

Page 455: ...ent specifies the IRAPI application No default exists for this argument Upon successful completion the defService command creates the vs trans application T file Files vs trans T See Also assign delet...

Page 456: ...arameters for the delete card channel command are card port Specifies the card or channel number a single card or channel number from a range of 0 255 a range of card or channel numbers in the form m...

Page 457: ...xamples The following example deletes card 4 from service group 1 delete card 4 from svcgrp 1 The following example deletes channels 10 through 13 from equipment group 3 delete channel 10 13 from eqpg...

Page 458: ...nt group Synopsis delete eqpgrp group number Description The delete eqpgrp removes an equipment group The group number argument is the equipment group list To remove all equipment groups use all as th...

Page 459: ...DNIS and ANI numbers or of a service assigned directly to a channel Synopsis delete service service_name startup startup_name from chan chan_list delete startup startup_name service service_name from...

Page 460: ...umbers or channel number ranges in the form chan1 chan2 Use a comma or space to separate the list of channel numbers or ranges The phone_list variable indicates telephone numbers or telephone number r...

Page 461: ...e deletes the service stdout from DNIS 5000 through 5008 and ANI 6000 delete service stdout from dnis 5000 5008 ani 6000 The following example deletes the service stdout from DNIS any and ANI 6000 thr...

Page 462: ...indicates that is ready to be removed from the system Synopsis detach unit number i n Description The detach command places a unit currently in the manual out of service MANOOS state into the nonexist...

Page 463: ...tenance command is being run remove detach attach restore diagnose the request to detach is blocked and a message is printed to the screen If i is not used and any maintenance command is being run the...

Page 464: ...ches card 4 and places it in the NONEX state as far as the system is concerned detach card 4 The following example detaches channels 1 through 3 and places them in the NONEX state as far as the system...

Page 465: ...ption The diagnose bus command changes the temporary state of a unit to diagnostic DIAG If a unit fails the diagnostics the permanent state is changed to BROKEN otherwise the permanent state is unchan...

Page 466: ...umber option is the card number you want to diagnose The word all can be used to specify all cards This command changes the temporary state of a unit to diagnostic DIAG If a card is stuck in the INSER...

Page 467: ...f T1 diagnostics are being run this option allows another card to be diagnosed If i is used and another maintenance command is being run remove detach attach restore the request to diagnose a non T1 c...

Page 468: ...BROKEN and it passes diagnostics it is put in the MANOOS state Otherwise the permanent state is unchanged When diagnostics are complete if the diagnostics passed the T1 E1 SSP and LSPS cards are reini...

Page 469: ...d state The diagnostics command for board board number has been stopped The card will be marked as BROKEN Or the system may display Could not stop diagnostics for board board number The diagnostics ma...

Page 470: ...ip_int command sends a message or messages to TSM requesting that TSM send interrupt messages to the script running on channel or the range of channels channelStart channelEnd If no script is running...

Page 471: ...send interrupt messages on channels one through 32 dip_int 1 32 Return Values If the dip_int is successful a 0 value is returned If any value other than 0 is returned the dip_int command completely or...

Page 472: ...ces assigned to channels Synopsis disp assignments option option Description The display assignments command is used to display all the services and startup services assigned to channels The display a...

Page 473: ...s given the system displays an error message Examples The following example displays information for channel 1 disp assignments channel 1 startup startup name Displays channels assigned with a specifi...

Page 474: ...or about cards in a specified state In the output the physical slot number the osindex and the voice system card number are all the same The output also correctly reflects which card is primary maste...

Page 475: ...n service state netoos Displays all cards that have at least one channel in the network out of service state hwoos Displays all cards that have at least one channel in the hardware out of service stat...

Page 476: ...NAME PHONE GROUP OPTS TYPE 6 0 0 Manoos Mar 24 11 26 02 feature_tst 2 tdm T1 5 6 1 1 Manoos Mar 24 11 26 02 feature_tst 2 tdm T1 5 6 2 2 Manoos Mar 24 11 26 02 feature_tst 2 tdm T1 5 6 3 3 Manoos Mar...

Page 477: ...tdm T1 5 6 22 22 Manoos Mar 24 11 26 03 feature_tst 2 tdm T1 5 6 23 23 Manoos Mar 24 11 26 03 feature_tst 2 tdm T1 5 CARD 13 STATE Manoos CLASS Signal_Processor SSP O S INDEX 13 NAME CWB1 OPTIONS sla...

Page 478: ...11 26 16 feature_tst 2 tdm T1 5 15 17 41 Manoos Mar 24 11 26 16 feature_tst 2 tdm T1 5 15 18 42 Manoos Mar 24 11 26 16 feature_tst 2 tdm T1 5 15 19 43 Manoos Mar 24 11 26 16 feature_tst 2 tdm T1 5 15...

Page 479: ...re_tst 2 tdm T1 5 16 15 63 Manoos Mar 24 11 26 09 feature_tst 2 tdm T1 5 16 16 64 Manoos Mar 24 11 26 09 feature_tst 2 tdm T1 5 16 17 65 Manoos Mar 24 11 26 09 feature_tst 2 tdm T1 5 16 18 66 Manoos M...

Page 480: ...n option Description The display channel command is used to list information at the channel level The display channel command options are number Displays information on the channel specified by channe...

Page 481: ...ays all channels assigned to hardware service foos This options displays all channels assigned to facility service If more than one option is used the system displays only channels that satisfy all th...

Page 482: ...e services assigned to DNIS and ANI numbers Synopsis disp dnis Description The display dnis command is used to display all the services assigned to DNIS and ANI numbers Example The following example d...

Page 483: ...pgrp group number disp group group number Description The display eqpgrp command is used to list all the equipment assigned to the specified equipment group The group number is the number of the equip...

Page 484: ...p eqpgrp all See Also assign card channel delete eqpgrp display equipment The display equipment command displays the following output serial number displayed for E1 T1 SSP and SBC including CPU IO MEM...

Page 485: ...ssage ID1 message ID2 all source TSM VROP SPIP TRIP all pattern regular expression search pattern number all Description The display messages command displays error and status messages that have been...

Page 486: ...y the last 100 alarms type the following display messages priority alarms 100 You can also display specific priorities using the priority option You can specify either the name of the priority or its...

Page 487: ...c types of messages you may precede the number of messages to be displayed with one or more of the following options start stop card channel id source pattern number If more than one of the options is...

Page 488: ...with the item xx format If portions of the time are not specified the time default is 0 hours 0 minutes and 0 seconds Also giving only the time of day indicates the current date For example if today...

Page 489: ...ogether to display messages that were logged over a specific period of time For example display messages start May 1 stop May 2 displays all messages logged on May 1 of this year If you want the start...

Page 490: ...l messages logged about T1 channels whereas display messages channel 5 displays all messages logged about channel 5 Note The channel option requires an argument Typing display messages channel 100 att...

Page 491: ...cess Table 30 shows some of the standard system processes Table 30 Standard System Processes Process Name Function Types of Messages Reported MTC System Maintenance Process Card Channel status Diagnos...

Page 492: ...sages that use the pattern XYZ anywhere in the message Note The pattern option is case sensitive number The number option specifies the number of messages you want to display or you can use the all va...

Page 493: ...s to the following format PR DAY MON DD HH MM SS ZZZ YYYY SOURCE TTTTTTTT YY UU NUM TEXT TEXT continuation if necessary blank line Table 31 System Message Formats Field Definition Examples PR Priority...

Page 494: ...messages MESSAGE LOG REPORT Pr Time Source Wed Dec 30 15 55 16 1992TWIP TWIP017 T1 CA 0 Facility out of service UU Unit Type CA Card or CH Channel or if N A NUM Unit Number 000 to 999 or if N A TEXT...

Page 495: ...ticular user Synopsis display_permissions user login Description The display_permissions command displays the current voice system security permissions for a particular user if any are assigned The us...

Page 496: ...command lists all valid services or scripts Synopsis display services disp services Description The display services command lists all valid services or scripts on a system Example The following examp...

Page 497: ...guments for this command Description The display_tam command displays all the values of the sensors monitored by the TAM unit If necessary the display_tam command sends this output to page dspActAlarm...

Page 498: ...t specifies the place to start printing z locant specifies the place to stop printing s locant search for specific patterns or times There may be more than one specification See Also dspRetAlarms reti...

Page 499: ...le a locant specifies the place to start printing z locant specifies the place to stop printing s locant search for specific patterns or times There may be more than one specification See Also dspActA...

Page 500: ...he explanation text The default is vi EXPLAINDIR This is the root directory of the explanation texts The default is gendb data explain VERBOSITY If set to anything edExplain will run verbosely An expl...

Page 501: ...text that will be displayed to the user Any line beginning with a pound sign character is considered to be an internal comment and is not displayed Lines beginning with explain are special directives...

Page 502: ...files Synopsis encode adpcm32 adpcm16 Description Encode is a filter that converts PCM64 files to ADPCM16 or ADPCM32 files ADPCM16 is easy to code and saves space but does not provide good quality so...

Page 503: ...The erase command deletes a phrase from a UNIX talkfile SSP only Synopsis erase phrase phrase number from talkfile talkfile number Description The erase command deletes the phrases identified by the p...

Page 504: ...option is used for phrases the system prompts you only once to confirm the command Are you sure you want to erase ALL phrases from talkfile talkfile y n If the specified phases does not exist the syst...

Page 505: ...hrough 222 and phrase 225 from talkfile 26 erase phrase 218 222 225 from talkfile 26 The following example erases all phrases from talkfile 29 erase phrase all from talkfile 29 See Also add copy list...

Page 506: ...4 lines and only a single explanation is requested it is printed without interruption If the explanation is longer than 24 lines or more than one explanation is requested the output is paged via the u...

Page 507: ...or setting PAGER cat will disable paging A one line form would be PAGER cat explain msgID or explain d msgID EXPLAINDIR The directory in which the explanation directories are found The default is PROD...

Page 508: ...They cause the inclusion of the explanation text specified by the msgID This allows you to have common explanations and reference from more than one explanation The recommended format for an explanati...

Page 509: ...r is meaningless A file name of the form CLASS nnn does not provide a sophisticated user with much information about the contents of the file while the mnemonic form does If the mnemonic is longer tha...

Page 510: ...h explanation directories are located gendb data explain translateLst file containing the synonym list of msgID s See Also edExplain findHomes The findHomes command populates your home directory with...

Page 511: ...login IDs change from the pre upgrade system to the upgraded system must be manually moved from their saved location to their new home directory This manual intervention is also required for any user...

Page 512: ...which all the files are not successfully relocated Example The following example causes all files found in home o homedir and usr homedir to be moved to the home directory specified for each non syst...

Page 513: ...ins expandable by logCat Each message is examined If the class of messages appears in the new environment and still covers the index assigned to the message a new index is assigned based on where it a...

Page 514: ...these files are to be used the o and n flags are used Each of these flags takes a spec argument which has the following form dir systemLog h textLogFmt The default values for these two specifications...

Page 515: ...r example if the class PERM was added removed or moved fixLogFile could correctly deal with the changes to the logging files The fixLogFile command does not deal with reorganizations or changes of mes...

Page 516: ...ystem based on rules in a script file The iCkAdmin command is a related administration command Synopsis iCk v NNN envName value rule file iCk c i f file cmd iCkCmd i f file cmd iCkAdmin c a on off s e...

Page 517: ...sity Flag Values Bit Name Description 0x0001 V_RESCANBB Log messages whenever the Bulletin Board is rescanned 0x0002 V_TIMINGMSG Log messages when timing messages are sent 0x0004 V_HUNGPROCESS Log mes...

Page 518: ...affect the behavior of the iCk command VERBOSITY This is an alternative way to set the internal verbosity flags The meanings of the bits are the same as for the value supplied to the v flag SHELL Thi...

Page 519: ...lag iCk silently accepts input from its standard input This might be useful if used in a shell script f file This value causes iCk to read a series of commands from the specified file or device instea...

Page 520: ...ries to be shown e entryType ID This option allows interactive editing of the specified entries This feature is not yet complete For both the s and e options the entryType is the name of a type of ent...

Page 521: ...ication of either how often to perform the activity or at what times of the day or week to perform the activity One of three forms is used Perform the activity once when the rules are first read and t...

Page 522: ...the specification to be accepted Each element can be All items in class days of the month hours in the day and so on N The specific item N M The items between N and M inclusive N M The individual ite...

Page 523: ...on any Friday the 13th cmd This specific command is executed if the activity so dictates Within the command itself there are four meta words that can be used to generate flexible commands Not all fou...

Page 524: ...eriod Time timeout fill report exec cmd This activity causes a specific process whose name appears in the Bulletin Board to be evaluated to see if it is hung in regard to reading its messages Processi...

Page 525: ...flag is as follows The number of unanticipated reboots of the kernel is determined by examining the etc wtmp file the history file of init actions for change of run level entries and boot time entries...

Page 526: ...until 60 minutes after reaching run level 4 fileMax file maxSize checkPeriod Time reduce minSize fileMax file maxSize checkPeriod Time remove fileMax file maxSize checkPeriod Time exec cmd This activi...

Page 527: ...be used to ensure that a specific file or files exist and have the proper ownership and modes file specifies the file or a pattern that selects a set of patterns runlevels specify at which run levels...

Page 528: ...table by anyone If a file fails to pass a fileCheck test it is always reported If the optional cmd is specified then this command is executed The meta words f d and b are set to the various parts of t...

Page 529: ...Do this only once fileMax tmp hist 0 exex bin mv f d o b For any nonzero length files in tmp with an extension of hist save them as tmp o hist Commands In command mode iCk responds to the following co...

Page 530: ...umber of unanticipated reboots This request does not communicate with the iCk daemon process autoReboot set clear This command forces the kernel autoreboot flag into the specified state readRules rule...

Page 531: ...ommand sets the iCk daemon s verbosity flags to the specified values In this case the symbolic names are accepted as well as octal decimal or hexidecimal values Combined values can be produced by sepa...

Page 532: ...W_RUNLEVEL meaning that when the run levels change this activity is checked to see if it should reactivate and AF_DEBUG_OFF which is set for any activity that has been inhibited by the inhibit command...

Page 533: ...object is the autoReboot activity fileMax This object is all the fileMax activities fileCheck This object is all the fileCheck activities miscellaneous This object applies to the print command only It...

Page 534: ...work count time flag slot and instance The flag can have values of HP_STUCK meaning that it does not seem to be reading its message queue HP_SIGUSR1 meaning it has been sent a SIGUSR1 signal to reques...

Page 535: ...top but you do get a reliable core of iCk for debugging evaluation Default File The iCk process responds to default parameters placed in vs etc default iCk Initially there are two values These values...

Page 536: ...Ck vs etc default iCk default parameters Caveats The iCk process is a daemon process running as root Since the rules support the concept of executing an arbitrary command the vs and the vs etc directo...

Page 537: ...lection of messages P priority d data l log prefix Source of data L cmpMsg file r root f format V Display options w width p continuation prefix T textLogFmt A s c abbreviations B breakChrs U H v D Mis...

Page 538: ...e name and modification date This is slower but more reliable r root Specify alternate root directory for textLogFmt file The default is usr spool log a locant Specifies the place to start printing z...

Page 539: ...nvironment variable LOGDATA The default is LOGROOT data l log prefix Prefix of the log files to examine The default is the first log file in the Config file The log prefix can also be provided by the...

Page 540: ...E_MAJOR and E_CRITICAL msgs P P C All E_MINOR and E_CRITICAL msgs T textLogFmt Specifies an alternate textLogFmt file to be used when expanding logging messages This feature must be used carefully The...

Page 541: ...ich causes locants to be printed at the beginning and some statistics to be listed at the end of the run logCat can take its options from HOME logCatRC This allows the user to tailor his or her logCat...

Page 542: ...03 98 would put it more than 1 month in the future which is unlikely to be what the user had intended You can force the proper interpretation of any date by fully specifying it that is adding the day...

Page 543: ...to apply search locants to specific fields of a message by specifying a synthetic field and an equal sign prior to the search pattern For example s sym LG_BADARGS means all messages that are not of ty...

Page 544: ...le unspecified character xxx Any character is the list xxx xxx may include ranges of characters A Z etc xxx Any character not in the list xxx chr Any number of occurrences of chr including 0 chr Any n...

Page 545: ...equences to specify the various parts of a message The default format is P T N S L n M P Priority level format d or s T Time level format all options supported by date cmd There is also an additional...

Page 546: ...or index The legal synthetic fields are index OR id OR i The absolute index of the message symbol OR sym OR s The symbolic name of the message class OR c The class of the message classIndex OR ci The...

Page 547: ...ile abbreviations is the source of the translations Translations is done in one of two forms simple denoted by s or complex denoted by c In simple translation mode each abbreviation found in a message...

Page 548: ...ve The abbreviations feature can also be enabled by setting the environment variable LOGABBREVIATIONS M file where M is either s or c and file is the name of the file lComp The lComp command combines...

Page 549: ...gFmt textLogFmt dataDictLog and ddMapLog respectively s name Changes the systemLog h file to name c name Changes the cmpLogFmt file to name t name Changes the textLogFmt file to name d name Changes th...

Page 550: ...message within the universe of all messages compiled by lComp If the optional SQL specification does not appear after the format lComp generates one of the form CLASSNNN_M type len precision based on...

Page 551: ...talkfile talkfile list Description The list command displays the phrases stored in the specified talkfile The valid arguments for the list command are phrase list Specifies the number or range of the...

Page 552: ...eech coding type Note The list command lists the directory entries for specific phrases in the SPEECHDIR default directory which is home2 vfs talkfiles Examples The following example displays phrase 1...

Page 553: ...ocant w width p continuation prefix d data l log prefix file f format V Description The logCat command reads in a file of compressed logging messages generated by log and expands them to a readable fo...

Page 554: ...t directory for textLogFmt file The default is usr spool log Also the data directory containing the compressed logging data files is expected to be in the root directory if not overridden by the d fla...

Page 555: ...mix standard format with the item xxx format The results are not predictable Spaces should be enclosed in quotes for example a 7 14 87 05 08 30 Search patterns are enclosed in forward slash character...

Page 556: ...provided via the environment variable LOGCONTPREFIX data d data This option is the name of the directory to find the log files in The data directory can be provided in the environment variable LOGDAT...

Page 557: ...ash conventions All other characters are printed as is The format can be provided via the environment variable LOGFORMAT V This option makes the control characters visible They are printed as X if the...

Page 558: ...le is the format in which to print the log messages The default is P T N S L n M LOGCOLUMN This variable is the column at which to wrap long expansions The default is0 meaning do not wrap long message...

Page 559: ...n The logDstPri command reads an ASCII rules file described in msgDst and then sets up a shared memory segment using the information in the rules file In this way any process in the system using the l...

Page 560: ...e values in shared memory as opposed to creating the shared memory for the first time it can be requested to delete the old shared memory and create a new segment by specifying the d flag Do not use t...

Page 561: ...he inode of the rules file and the define symbol LDP_KEY defined in log head logDstPri h The library routine ftok file LDP_KEY is used to generate the shared memory key See Also logCat logMsg logDstPr...

Page 562: ...e explicitly logged to the specified destinations and at the specific priority The logMsg command does not take a destination mask or a priority It gets these pieces of information from the logging de...

Page 563: ...with the logEvent command It is the bit mask specification of where the message will be sent It can be a number or symbolic destinations as specified in msgDst rules If more than one symbolic destina...

Page 564: ...ired by a specific message format one and only one argument is required Neither too many or not enough is acceptable Also the size and type of the argument must be appropriate s takes any kind of argu...

Page 565: ...as a class name and a mnemonic name associated with it A class name for example ICK001 is the combination of the name of the class for example ICK and the index of the message within the class for exa...

Page 566: ...global parameters You can examine the global parameters without being root display This verb causes logFmt to display the current parameters If global is specified then the system wide parameters are...

Page 567: ...when logging messages are examined with display messages mnemonics disable This option causes mnemonics not to be displayed when logging messages are examined with display messages width NN This optio...

Page 568: ...that mnemonics are not displayed Any user who wants to see mnemonics has to personally enable them You need to be root to execute this command logFmt global mnemonics disable The following example dis...

Page 569: ...hat reads an alerter description and translates it with the help of code template files into compilable C or C code It also produces a make file for compiling the code Alerter description files always...

Page 570: ...the name of the alerter description minus the A extension The o option allows you to specify an alternate executable name This is used when the make file is generated The code template files are norm...

Page 571: ...he header file AlertMain t Description of main function Alerter t Primary template describing the alerter program AlertTest t Description of the code to respond to timeouts for alerting AlertMsg t Tem...

Page 572: ...ng difficult The l option suppresses the line directives and is recommended when the debugging phase includes the use of a process debugger such as sdb or pi It is also possible to specify variable as...

Page 573: ...to interact with the transaction state machine TSM The e option specifies exact string matches The mkheader program prompts an operator to enter three types of information at the system console The in...

Page 574: ...pathnames must be given The file mesg h and the structure mbhdr are common to all scripts and are entered automatically The header files can be stored in a batch file The batch file could contain the...

Page 575: ...cation_name_aloc c to allocate the rest of user memory The resulting source code is automatically compiled using mkheader a library functions and then executed This adds the remaining structure defini...

Page 576: ...to the following format type name length Example 1 int yn Example 2 char dg 20 End input with CTRL D Variable char dg 20 Variable int yn Variable short cid Variable int iom Variable CTRL D SECOND PRO...

Page 577: ...L D Compiling application name aloc c Running application name aloc Output is called application name def h This is the final application_namedef h file produced by this example PRE ALLOCATION OF USER...

Page 578: ...the information usually entered by the users in response to system prompts The data file called data in this example contains the following information char name 20 int answer short reply D att inclu...

Page 579: ...input with CTRL D File name File name Enter the header file names and structure names needed to create the def h file Use full path names End input with CTRL D Header file List of structures or all He...

Page 580: ...AY_PNTR 26 define FILE_FIRST 26 define REC_FIRST 28 define FILE_LAST 30 define REC_LAST 32 define SZDAY_PNTR 8 CDATA STRUCTURE define CDATA 34 define SCRIPT 34 define CHAN 50 define EQUIP 52 define ST...

Page 581: ...because lowercase letters are changed to uppercase for the final output mkimage The mkimage command performs a complete system backup of all the contents of the root disk file system Note Mkimage per...

Page 582: ...le systems beside the root file system and stand that appear on the root disk in a standard voice system The system then creates a list of files to archive to tape and prompts you to insert a tape CAU...

Page 583: ...o multiuser mode The mkimage command then returns the voice system to multiuser mode by rebooting If no errors are found you are prompted to make a note of the file system partition sizes after the vo...

Page 584: ...example backs up the root and usr file system to cartridge tape mkimage newscript The newscript command updates the changes to all currently assigned scripts Synopsis newscript Description The newscri...

Page 585: ...cesses that an existing application in the directory vs trans has changed newscript pkgadd The pkgadd command transfers a software package to the voice system Synopsis pkgadd n a admin d device R root...

Page 586: ...e default administration file The token none overrides the use of any admin file and thus forces interaction with the user Unless a full path name is given pkgadd looks in the var sadm install admin d...

Page 587: ...me of the package with which it should be associated This is used for example when adding multiple interactive packages with one invocation of pkgadd Each package needs a response file If you create r...

Page 588: ...pkginfo The pkginfo command displays software package information Synopsis pkginfo q x l p i r a arch v version c category1 category2 pkginst pkginst pkginfo d device R rootpath q x l a arch v versio...

Page 589: ...option The options q x and l are mutually exclusive a Specify the architecture of the package as arch c Display packages that match the category Categories are defined in the category field of the pk...

Page 590: ...en installed r List the installation base for relocatable packages R Define the full path name of a subdirectory to use as the root path All files including package system information files are reloca...

Page 591: ...ed or partially installed package from the system A check is made to determine if any other packages depend on the one being removed If a dependency exists the action taken is defined in the admin fil...

Page 592: ...R Define the full path name of a subdirectory to use as the root path All files including package system information files are relocated to a directory tree starting in the specified root path a Use t...

Page 593: ...cription The reinitlog command is used during the procedure of creating a new logger message destination It sends a message to the logdaemon that informs it that a new config file is to be used The re...

Page 594: ...nd is used to remove a unit from service when its temporary state is idle It changes the permanent state of the unit to manual out of service MANOOS It does not remove a unit that has a temporary stat...

Page 595: ...tach attach restore diagnose the request to remove card is blocked and a message is printed to the screen If i is not used and any maintenance command is being run the request to remove card is blocke...

Page 596: ...ing for channels to be granted This option applies to remove chan and remove card requests that are removing network interface channels for example T1 This option specifies to minimize the delay in re...

Page 597: ...o the following may appear At the user s request administration of the following cmd s has been interrupted CARD NUMBERS card numbers To assure proper operation of the identified card s run diagnostic...

Page 598: ...a unit to the in service state Synopsis restore unit number i n Description The restore command is used to change the permanent state of a unit from manual out of service MANOOS to in service INSERV...

Page 599: ...tration If T1 diagnostics are being run this option allows restoring of another card to be performed If i is used and another maintenance command is being run remove detach attach restore diagnose the...

Page 600: ...ELETE If this does not stop the command you may need to press CONTROL and backslash simultaneously If while running restore you want to abort the command a message similar to the following may appear...

Page 601: ...ommands retireAlarms The following example restores all cards to service restore card all See Also attach detach remove retireAlarms Syntax retireAlarms t u user r reason selector ALL Description Vari...

Page 602: ...a matching pattern To increase the number of alarms that can be displayed on a single screen the time the alarm happened is not printed unless the t flag is specified The retireAlarms command can be...

Page 603: ...g range f range p range C range T range P range i interval tL levelMask tA levelMask tc channel tC channel Description The rmdb displays the state of the resource manager and modifies the debug level...

Page 604: ...Leaving the rm data structures locked is a system fault Also other processes that attempt to use the RM data structures are temporarily blocked until rmdb completes its query s Prints the values of t...

Page 605: ...ut the channel touchtone queues by channel number P Prints out channel profiles by channel number i Repeats the display with a sleep interval of the specified number of seconds between samples Table 3...

Page 606: ...l sets the trace channel low end The tC channel sets the trace channel high end Table 37 Rmdb Trace Area Mask Mask Value RM_TA_TIMER 0x1 RM_TA_RESOURCE 0x2 RM_TA_INPUT 0x4 RM_TA_PROFILE 0x8 RM_TA_MTC...

Page 607: ...to retrieve configuration and administration information from customer sites Synopsis vs bin tools show_sys l Description The following information can be retrieved with the show_sys command UNIX ver...

Page 608: ...oracle dbs Cron information for root Local and remote database information ASP driver speech card version DNIS information if T1s are present T1 card information if T1s are present Device Information...

Page 609: ...ay of the previous week Traffic report for a specific day of the previous week The l option prints details about each of the information that can be retrieved with the show_sys command Example show_sy...

Page 610: ...ending disconnects to the scripts or rejecting the requests Scripts running on the channel receive the ESOFTDISC event Return Values If the soft_disc is successful a 0 value is returned If any other v...

Page 611: ...cription The soft_szr command can be used to start a script on a channel The soft_szr command sends a message to TSM requesting that a script be started on a channel If the channel is in use the scrip...

Page 612: ...ipt sodapop on channels 0 through 4 soft_szr 0 4 sodapop The following example starts the script test1 on channel 10 soft_szr 10 test1 Return Values If the soft_szr is successful a 0 value is returned...

Page 613: ...he voice system signal processing resource utilization Data is sampled every s seconds and average and peak measurements are written to a file called mm dd yyyy for the day of the month and year on wh...

Page 614: ...spadc m 20 s 10 This command collects the signal processing resource data in 10 second increments for a total of 20 minutes See Also spar spar The spar command is the signal processing resource report...

Page 615: ...20 To ensure valid data the value for t should be equal to or greater than the time increment specified for data collection by the spadc command f file used to specify an input data file If no f argu...

Page 616: ...Algorithm 10 20 1997 CARD 5 STATE Inserv CLASS Signal_Processor SP O S INDEX 0 NAME AYC2 OPTIONS slave tdm1 FUNCTION play code brd wwr fwr echo cca tts dpr play code celp fax 00 20 NA NA NA NA NA NA...

Page 617: ...percentages because the peaks may not have occurred during the same interval For example if the spadc command collects data at 5 minute intervals and the spar report displays the peak 10 00 57 28 0 9...

Page 618: ...Dial Pulse Recognition play Play speech code Record speech celp Record speech with CELP algorithm fax FAX spar l This command creates a report showing average percent usage of licenses for each algor...

Page 619: ...mary of Commands spar 01 00 0 0 0 0 0 0 07 00 23 0 0 0 0 2 07 20 23 0 0 0 0 2 07 40 26 0 0 0 0 3 08 00 12 0 21 0 0 0 08 20 NA NA NA NA NA NA 08 40 NA NA NA NA NA NA 09 00 31 0 14 0 0 0 09 20 32 0 14 0...

Page 620: ...mmands spsav tts Text to Speech dpr Dial Pulse Recognition flex FlexWord recognition whole WholeWord recognition swtts Software Text to Speech fax FAX See Also spadc spsav The spsav command backs up s...

Page 621: ...his parameter specifies the output device Typically this is cartridge tape dev rmt c0s0 v This parameter is the verbose flag that gives a running commentary of speech being saved t This parameter is t...

Page 622: ...v option is used the system displays information about each step of the back up Example The following example saves listfile list cabnt from cartridge tape spsav O dev rmt c0s0 v t listfile list cabn...

Page 623: ...xamined The default is 1 r Reset the executive and task counts before starting B No bell when running in iterative mode The spStatus command can be run in once which is the default or an iterative mod...

Page 624: ...e DSPs 2 Broken DSPs 0 Busy DSPs 0 Run Queue Length 0 Sleep Queue Length 4 Running Process ID 5 Running Action Index 3 DSP Requests 4 RPC Requests Done 0 RPC Requests Queued 0 RPC Requests Discard 0 E...

Page 625: ...0 53 TDM Overruns 0 TDM Servicings Deferred 0 Letters Received 8 Letters Sent 0 Letters Deferred 0 Letters Discarded 0 Executive Time 57 Idle Time 489 Task 6 1156 Mailbox Information Index 1st Empty 1...

Page 626: ...C at last DSP Intr 0x99f08154 DSP Count 2710 463 Work Search Loops 1000 57 4 Executive Time 58 1 Idle Time 537 48 Task 6 1421 The following is a brief description of each element of the display Romsta...

Page 627: ...o TDM interrupts or the pack file is stuck at priority level 6 or 7 and so all interrupts are blocked In the former situation check your T1 cards and make sure that one of them is the TDM master In th...

Page 628: ...time processing via Action structures Free DSPs Broken DSPs Busy DSPs The number of DSP processors available to do work broken and assigned to work Run Queue Length Sleep Queue Length The number of p...

Page 629: ...scarded before the backlog was too large Exception Exception Adr The 680X0 hardware exception number and the name of the exception that has stopped the 680X0 processor and either sent it to the ROM or...

Page 630: ...requests currently outstanding the total number of timer requests that have run to completion the number of timer requests that were removed prior to execution If these values do not total up properl...

Page 631: ...etters Deferred Letters Discarded This is the number of letters received from the PC the number of letters sent to the PC the number of letters going to the PC that had to be temporarily stored in the...

Page 632: ...1st Full and if the values are changing from one display to the next you know mail is passing through that mailbox Keep in mind that mailbox 1 from the PC is now reserved by the kernel and is used by...

Page 633: ...e SSP driver currently installed on a machine Synopsis spVrsion Description The spVrsion command prints which version of the SP driver is installed This can be either the 12 MB version or the 44 MB ve...

Page 634: ...ice MANOOS state with the stop_vs command in the in service INSERV state You must be logged on to the system console as root to use the start_vs command Since the vs data spchconfig file cannot be edi...

Page 635: ...lls stop_vs waits for approximately 3 minutes before it unconditionally stops the software By waiting the system allows callers to finish their transactions The stop_vs command disables incoming call...

Page 636: ...n as root This ensures that the system is returned to the state it was in before it was rebooted Example The following example stops the voice system software stop_vs See Also start_vs striphdr The st...

Page 637: ...th the voice system See Also addhdr sysmon The sysmon command executes a program that monitors incoming telephone lines and the associated cards to see that they are functional Synopsis sysmon page nu...

Page 638: ...their current states Note that only equipped channels can be in the IDLE or MOOS state while unequipped channels are followed by dashes Enter the telephone number for the touchtone telephone Watch the...

Page 639: ...phrases The arguments must be in the order given above for the command to work properly The directory search specified by the arguments are I include file and T listfile No space is allowed between th...

Page 640: ...f there are more than 450 literals in a script the system displays the error message literal table overflow Additional limitations enforced by the tas command are whichever occurs first in a list file...

Page 641: ...he script The assembled code is stored on disk under the label example T The unassembled instructions are found in the file var applN trans example t tas example t I var include T var speech In additi...

Page 642: ...o the trace shared memory buffer or to the trace log When trace is specified with name all process specific trace messages from process name are printed Process specific trace messages are printed reg...

Page 643: ...17 Trace advanced service operations such as TTS and speech recognition EM area 18 Trace event management operations IN area 19 Trace caller input operations including touchtone and speech recognitio...

Page 644: ...is legal IL area 27 Trace internal library operations SI area 28 Trace script instructions Every TSM script instruction displays a trace message AD area 29 Trace administration operations BM area 30 T...

Page 645: ...ll user levels AE level 17 Trace internal application error messages AG level 18 Trace internal application general messages AX level 19 Trace internal application enter exit messages A levels 17 19 T...

Page 646: ...script instruction displays a trace message I levels 26 28 Trace script instructions Every TSM script instruction displays RH level 29 Trace RM Helper function enter exit messages RE level 30 Trace RM...

Page 647: ...n they are generated If date is specified the date and time are printed with each trace message The date and time are always printed for messages in the trace log file If the sleep argument is specifi...

Page 648: ...BUFFER_SIZE X in the vs data irAPI rc file where X is the number of messages that the trace buffer can hold The default is 256 Increasing the value of X should reduce the chance of losing trace messag...

Page 649: ...htone and speech recognition log can be implemented by the following trace command trace chan all area IN level F Files usr spool log data trace vs data irAPI rc trarpt The trarpt command generates a...

Page 650: ...provides information on the total traffic volume for each channel in one hour increments If the option is y the report is a summary report that provides information on the total traffic volume for eac...

Page 651: ...te a traffic report for data collected on date August 24 1993 one entry per channel and are equivalent command statements trarpt all n 08 24 93 trarpt all n 08 24 1993 unassign_permissions The unassig...

Page 652: ...le executes the command to remove voice system security permissions unassign_permissions brown See Also display_permissions assign_permissions vfyLogMsg The vfyLogMsg command verifies the information...

Page 653: ...lute message number The absolute message number format would be used if you were examining compressed logging files with an editor for example 238 symbolic name The symbolic name is found in the assoc...

Page 654: ...message format The second block of information includes the restored message format without any of the SQL field names that might have been specified in the original format SQL field name information...

Page 655: ...information describes each destination bit specified in the destination bit mask starting with the lowest order bit Example lComp See Also logCat logDstPri vsdisable The vsdisable command disables the...

Page 656: ...A Summary of Commands vsenable Example vsdisable See Also vsenable vsenable The vsenable command enables the automatic starting of the voice system at system reboot Synopsis vsenable Description...

Page 657: ...vusage Example vsenable See Also vsdisable vusage The vusage command displays the current load on the voice system SSP only Synopsis vusage Description The vusage command enables the voice system admi...

Page 658: ...age Max Current Speech Buffers used 0 0 Max Current Chans playing coding 0 0 WARNING The voice system must be running to execute this command See Also display chan sysmon wl_copy The wl_copy command c...

Page 659: ...te Make sure change to the directory where your FlexWord wordlists are located usually att asr wordlists active If any of the names are directory names the contents of the directories and any subdirec...

Page 660: ...it output The s ssp argument is used to specify which SSP circuit card to use for speech playback Circuit cards are referenced by O S index displayed in the display card command The L language argumen...

Page 661: ...RNING If the voice system is running wl_edit will prompt you to stop the voice system before continuing See Also wl_init wl_gen The wl_gen command creates data files for a FlexWord vocabulary Synopsis...

Page 662: ...The L language argument is used to specify the language output that appears on the screen that is Brazilian English French German Japanese or Spanish If more than 38 phonemes including the underscore...

Page 663: ...wordlist This means that scripts do not have to be recompiled unless they use a wordlist that was not active on the previous invocation of wl_gen Example wl_gen See Also wl_edit diagnose card wl_init...

Page 664: ...l Words are case insensitive Each line of the file will be augmented with a tab followed by the cecilbet phonetic transcription of the line Example wl_init database See Also wl_edit wl_install The wl_...

Page 665: ...A Summary of Commands wl_install Example wl_install See Also wl_copy wl_gen...

Page 666: ...on and 1 data signaling channel on a T1 PRI circuit card 30B D 30 bearer communication and 1 data signaling channel plus framing channel 0 on an E1 PRI circuit card 47B D 47 bearer communication and 1...

Page 667: ...y 5ESS 5ESS A Lucent electronic switching machine used to route calls through the telephone network or private branch exchange A AC alternating current ACD automatic call distributor AD application di...

Page 668: ...the inherent management capabilities of the product itself this is in opposition to the ability of the system to administer the switch directly ADPCM adaptive differential pulse code modulation ADU a...

Page 669: ...esentation that represents alphanumeric characters as binary numbers The code includes 128 upper and lowercase letters numerals and special characters Each alphanumeric and special character has an AS...

Page 670: ...rogramming interface application The automated transaction interactions among the caller the voice response system and any databases or host computers required for your business application administra...

Page 671: ...which bits or characters are sent at irregular intervals and spaced by start and stop bits rather than by time Compare to synchronous communication asynchronous data unit An electronic communications...

Page 672: ...e preservation of the information in a file in a different location so that the data is not lost in the event of hardware or system failure backing up an application Using a utility that makes an arch...

Page 673: ...f which is a command executable by the UNIX shell BB bulletin board blind transfer protocol A protocol in which a call is completed as soon as the extension is dialed without having to wait to see if...

Page 674: ...te A unit of storage in the computer On many systems a byte is 8 bits binary digits which is the equivalent of one character of text C call classification analysis A process that enables application d...

Page 675: ...ar department or agent caller The party who calls for a service gets connected to the system and interacts with it As the system can also make outbound calls for service the caller can also be the per...

Page 676: ...magnetic cartridge tape based on a predetermined format This tape can be removed from the system and stored as a backup or used on another system CAS channel associated signalling caution An admonishm...

Page 677: ...unication devices such as telephone switches and network access facilities are maintained These locations follow strict installation and operation requirements central processing unit See processor CG...

Page 678: ...al office code excited linear prediction A means of encoding analog voice signals into digital signals that provides excellent quality with use of minimum disk space command An instruction or request...

Page 679: ...y to SSP and E1 T1 circuit cards and perform various maintenance functions connect and disconnect C and D tones DTMF tones that inform the system when the attendant has been connected C and when the c...

Page 680: ...lity of two products or services to operate and interact with each other on a single hardware platform CPE customer provided equipment or customer premise equipment CPN called party number CPT call pr...

Page 681: ...ing exceeded CSU channel service unit custom speech Unique words or phrases to be used in system voice prompts that Lucent Technologies custom records on a per customer basis custom vocabulary A speci...

Page 682: ...sibility of personal injury or death data interface process A software process that communicates with Script Builder applications database A structured set of files records or tables database field A...

Page 683: ...up of columns and rows that holds information in a database Database tables provide a means of storing information that changes too often to hard code or store permanently in the transaction outline d...

Page 684: ...ferred to as troubleshooting default The way a computer performs a task in the absence of other instructions default owner The owner of a channel when no process takes ownership of that channel The de...

Page 685: ...coming calls to contain information about the telephone number for which it is destined dial through A capability provided by touch tone and dial pulse recognition that allows callers to enter their r...

Page 686: ...Glossary DMA DMA direct memory address DNIS dialed number identification service DPR dial pulse recognition DSP digital signal processor DTE data terminal equipment...

Page 687: ...em DTMF muting is the process of ignoring these tones which might be simulated by human speech when they are not needed for the application dump space An area of the disk that is fixed in size and sho...

Page 688: ...d Binary Coded Decimal Interexchange Code echo cancellation The process of making the channel quiet enough so that the system can hear and recognize WholeWord FlexWord and dial pulse inputs during the...

Page 689: ...available from Lucent Technologies in several languages Sometimes called standard speech error message A message on the screen indicating that something is wrong with a possible suggestion of how to c...

Page 690: ...s generally not encountered in normal operation EXTA external alarms feature message class external actions Specific predefined system tasks that Script Builder can call or invoke to interact with oth...

Page 691: ...ty of a product or an application within the system feature package An optional package that may contain both hardware and software resources to provide additional functionality to a standard system f...

Page 692: ...ng order file A collection of data treated as a basic unit of storage file transfer An option that allows you to transfer files interactively or directly to and from UNIX using the file transfer syste...

Page 693: ...key A key labeled F1 through F8 on your keyboard to which the system software gives special properties for manipulating the user interface G GEN PRISM logger and alerter general message class grammar...

Page 694: ...ed on a predetermined format for retrieval by the system at a later date hardware The physical components of a computer system The central processing unit disks tape and floppy drives etc are all hard...

Page 695: ...Glossary Hz Hz Hertz I IBM International Business Machines iCk or ICK The system integrity checking process ID identification IDE...

Page 696: ...utility that runs as an application under CICS TSO and CMS IND FILE is independent of link level protocols such as BISYNC and SDLC independent software vendor A company that has an agreement with Luc...

Page 697: ...vice state Integrated Services Digital Network A network that provides end to end digital connectivity to support a wide range of voice and data services intelligent CCA Monitoring the line after dial...

Page 698: ...tion occurs Intuity Response Application Programming Interface A library of commands that provide a standard development interface for voice telephony applications IOB I O companion card to the SBC Th...

Page 699: ...Glossary ISA ISA industry standard architecture ISDN Integrated Services Digital Network ISV independent software vendor ITAC International Technical Assistance Center K Kbps...

Page 700: ...oard codes to the host according to a configuration table set up during installation keyword spotting A capability provided by WholeWord speech recognition that allows the system to recognize a single...

Page 701: ...tware line side T1 A digital method of interfacing a system to a PBX or switch using T1 related hardware and software listfile An ASCII catalog that lists the contents of one or more talkfiles Each ap...

Page 702: ...em logger process message class logical unit A type of SNA Network Addressable Unit logdaemon A UNIX system information and error logging process logger See logdaemon logging on off Entering or exitin...

Page 703: ...card 6UB5 A high performance speech processing circuit card capable of simultaneous support for various speech technologies In addition to the basic speech processing features The LSPS II circuit card...

Page 704: ...ostics and maintains the state of circuit cards and channels manoos manually out of service state masked event An event that an application can ignore that is the application can request not to be inf...

Page 705: ...egabyte A unit of memory equal to 1 048 576 bytes 1024 x 1024 It is often rounded to one million menu Options presented to a user on a computer screen or with voice prompts MF multifrequency MHz megah...

Page 706: ...tween network switches or by network operators multichannel application A single process application that controls several channels Each channel of the application is managed explicitly Typically this...

Page 707: ...toos network out of service state non facility associated signalling NFS network file sharing NM API Network Management Application Programming Interface NMVT network management vector transport nonex...

Page 708: ...likely encounter state transition errors by trying to it null value An entry containing no value A field containing a null value is normally displayed as blank and is different from a field containin...

Page 709: ...abase management software It is also used as a generic term that identifies a database residing on a local or remote system that is created and maintained using an ORACLE RDBMS product P PBX private b...

Page 710: ...ent such as printers or terminals that is in addition to the basic processor peripheral component interconnect A newer higher speed PC bus that is gradually displacing ISA for many components permanen...

Page 711: ...ges can be programmed to reprompt the caller if the system does not recognize a spoken response phrase tag A string of up to 50 characters that identifies the contents of a speech phrase used by an ap...

Page 712: ...affic polling A network arrangement whereby a central computer asks each remote location whether it wants to send information This arrangement enables each user or remote data terminal to transmit and...

Page 713: ...tomer s premises processor In system documentation the computer on which UnixWare and system software runs In general the part of the computer system that processes the data Also known as the central...

Page 714: ...on method of encoding voice signals into digital signals See also adaptive differential pulse code modulation R RAID redundant array of independent disks RAID Array An assembly of disk drives configur...

Page 715: ...Recognition ASR which includes WholeWord and FlexWord speech recognition recognizer The part of the system that compares caller input to a grammar in order to correctly match identify the caller input...

Page 716: ...affic reports restore The process of recovering lost or damaged files by retrieving them from available back up tapes or from another disk device See also recovery restore application A utility that r...

Page 717: ...changes were last committed rollback segment A portion of the database that records actions that should be undone under certain circumstances Rollback segments are used to provide transaction rollback...

Page 718: ...ber using that information to access a local or remote ORACLE database and pulling a form full of information from the database using an ORACLE database utility package script The set of instructions...

Page 719: ...cation shared speech Speech that is a part of more than one application shared speech pools A parameter that allows the user of a voice application to share speech components with other applications S...

Page 720: ...o a PC slot is capable of controlling as many as seven different hard disks optical disks tape drives etc SNA systems network architecture SNMP simple network management protocol software The set or s...

Page 721: ...ount of energy in an audio signal Literally translated it is the output level of the sound in every phonetic utterance speech envelope The linear representation of voltage on a line It reflects the so...

Page 722: ...in a statistical average of the word This average is then used by a WholeWord speech recognition program to recognize a single spoken word speech space An area that contains all digitized speech used...

Page 723: ...ges containing simple words and phrases produced by Lucent Technologies for use with the system This package includes digits numbers days of the week and months each spoken with initial medial and fal...

Page 724: ...variable structured query language A standard data programming language used with data storage and data query applications subword technology A method of speech recognition used in FlexWord recognitio...

Page 725: ...ction between the system and switches by allowing you to establish and modify switch interface parameters and protocol options for both analog and digital interfaces switch network Two or more interco...

Page 726: ...red system architecture The manner in which the system software is structured system message An event or alarm generated by either the system or end user process system monitor A component of the syst...

Page 727: ...ll the phrases of a specific application The speech phrases are organized and stored in groups Each talkfile can contain up to 65 535 phrases and the speech filesystem can contain multiple talkfiles t...

Page 728: ...gent alarm module that provides critical major and minor alarm indicators telephone network connection The point at which a telephone network connection terminates on a system Supported telephone conn...

Page 729: ...ltaneous channels over a common transmission path by assigning the transmission path sequentially to the channels with each assignment being for a discrete time interval Tip Ring Analog telecommunicat...

Page 730: ...the system optional features such as speech recognition 3270 host interface FAX Actions etc transaction assembler script The computer program code that controls the application operating on the voice...

Page 731: ...Glossary TSO TSO time share operation TSM transaction state machine process TTS Text to Speech TWIP T1 interface process U UCS...

Page 732: ...operating system originally developed by Lucent Technologies UNIX shell The command language that provides a user interface to the UNIX operating system upgrade scenario The particular combination of...

Page 733: ...d to create and change electronic files virtual channel A channel that is not associated with an interface to the telephone network Tip Ring T1 LSE1 LST1 or PRI Virtual channels are intended to run da...

Page 734: ...ng it to the target system Voice Work An optional software package that provides a graphical interface to assist in development of voice response applications on the system see also Script Builder voi...

Page 735: ...ds and data storage devices for example hard disk etc voice response unit A computer connected to a telephone network that can play messages to callers recognize caller inputs access and update a data...

Page 736: ...h recognition An optional feature package based on whole word technology that can recognize the numbers one through zero yes and no the key words This feature is reliable regardless of the individual...

Page 737: ...erance understood by the recognizer wordlist A set of words available for FlexWord recognition by an application during a Prompt Collect action step word spotting The ability to search through extrane...

Page 738: ...om xxxvii searching xxxvii setting the default magnification xxxvi add command 371 addhdr command 373 adding remote database access ID 233 Administrative Commands Log alarm 73 alertPipe 73 annotate co...

Page 739: ...agnosing 85 CCA table 199 ccarpt command 390 CCASUM table 199 cddrpt command 391 channels assigning to groups 109 changing maintenance state 113 118 codetype command 396 command menu accessing 297 sys...

Page 740: ...7 monitoring commands 247 optimization 196 sizing increasing 224 dbcheck command 248 401 dbfrag command 406 dbfree command 249 408 dbused command 410 dfrag command 250 diagnose commands bus 426 card 4...

Page 741: ...in command 466 F feature licenses 64 findHomes command 471 fixLogFile command 473 function keys labels 2 11 optional 13 I iCk command 477 iCkAdmin command 477 L lComp 509 license management 64 list co...

Page 742: ...ons 338 report 333 priority 79 thresholds 78 mkAlerter command 530 mkheader command 533 mkimage command 542 modems administration 255 non unique indexes 212 O online help 17 options call data detail 3...

Page 743: ...ee remote terminal administration remove command 555 remove_appl command 559 removepkg command 559 removing reports administrative commands log 344 call classification 310 call data detail 317 call da...

Page 744: ...Vrsion command 594 start voice system 93 start_vs command 594 stderr 73 switch interface administration digital interfaces 141 switch system parameters change 191 display 194 sysadm 22 sysmon command...

Page 745: ...e service 306 traffic report 354 trarpt command 610 TRASUM table 204 U V vfyLogMsg command 613 voice channels renumbering 87 equipment changing maintenance states 104 113 118 system operations renumbe...

Reviews: