Benutzeranleitung / Produktwartung 3725-70003-009F des Produzenten Polycom
Zur Seite of 300
ReadiV oice ® Administration & Maintenance Guide.
ReadiV oice Administration & Maintenanc e Guide ii Proprietar y & Confidential T rademark Information Polycom®, the Polycom logo design, ReadiVoice®, InnoVox®, and the Voyant logo are registered trademarks of Polycom, Inc. Voyant Technologie s TM is a trademark of Polycom, Inc.
Proprietar y & Confidential iii Contents About This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Document Conventions .
ReadiV oice Administration & Maintenanc e Guide iv Proprietar y & Confidential Working with Translation Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Adding Translation Numbers to a Brid ge . . . . . . . . . . . . . . . . .
Conte nts Proprietar y & Confidential v Deleting an Internal User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Defining Invalid Subscriber Pass words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Adding Entries to the List of Invalid Subscriber Pas swords .
ReadiV oice Administration & Maintenanc e Guide vi Proprietar y & Confidential Purging the CacsEventUpdate Table . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Purging the AccOptChanges Table . . . . . . . . . . . . . . . . . . . . .
Conte nts Proprietar y & Confidential vii Logging Database Activity with the Database Monitoring Script . . 148 Running the dbMon.pl Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Contents of dbMon.pl Log File . . . . . . . .
ReadiV oice Administration & Maintenanc e Guide viii Proprietar y & Confidential Call Flow Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 B CDR Data Reference CDR Processing Database . . .
Figures Proprietar y & Confidential ix Figure 2-6 Routing Lists page (routed system only) . . . . . . . . . . . . . . . . . . . . . . . . 27 Figure 2-7 Edit Routing List page (routed system only) . . . . . . . . . . . . . . . . . . . . 28 Figure 2-8 Number Groups page (routed system) .
ReadiV oice Administration & Maintenanc e Guide x Proprietar y & Confidential Figure 3-20 Applet window with details for the selected channel (port) . . . . . . . . 89 Figure 4-1 Checking the ReadiVoice processes . . . . . . . . . . . . . . . .
Figures Proprietar y & Confidential xi Figure A-18 Conference secu rity code process (participant) . . . . . . . . . . . . . . . . . . 222 Figure A-19 Music hold process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ReadiV oice Administration & Maintenanc e Guide xii Proprietar y & Confidential T ables Table 2-1 Maximum number of translation numbers needed per bridge . . . . . . 22 Table 2-2 Provider Information fields . . . . . . . . . . . . . . . . . . .
T ables Proprietar y & Confidential xiii Table C-2 The SNMP MIB’s system hi stogram table . . . . . . . . . . . . . . . . . . . . . . 264 Table C-3 The SNMP MIB’s bridge in formation table . . . . . . . . . . . . . . . . . . . . . 264 Table C-4 The SNMP MIB’s bridge hi stogram table .
ReadiV oice Administration & Maintenanc e Guide xiv Proprietar y & Confidential.
Proprietar y & Confidential xv About This Manual This introduction provides a brief overview of the ReadiVoice Admi nistration & Maintenance Guide , describes the conve ntions used in this manual, and explains how to get additi onal information or support.
ReadiV oice Administration & Maintenanc e Guide xvi Proprietar y & Confidential Document Conventions This document uses the follow ing typographical conventions.
About This Manual Proprietar y & Confidential xvii Suppor t Recognizing that technology alone cannot solve today’s comple x challenges, Polycom Global Services provides the in d ustry’s best technica l support staff and programs to let you concentrate on th e task at hand.
ReadiV oice Administration & Maintenanc e Guide xviii Proprietar y & Confidential.
Proprietar y & Confidential 1 1 Introducing the ReadiV oice ® System This chapter offers a general overview of the ReadiVoice conferencing system and its features, functi onality, and components. What is the ReadiV oice System? The ReadiVoice is the industry-leading , on-demand conferencin g system.
ReadiV oice Administration & Maintenanc e Guide 2 Proprietar y & Confidential Star ting and Joining a Conference Once provisioned, a subscriber can hold a conference at any time.
Introducing the ReadiV oice ® System Proprietar y & Confidential 3 Managing Y our ReadiV oice System Day-to-day management and operati on of your ReadiVoice system is accomplished using ope rator/maintenance stations, which are typically s tandard PCs connected to your company’s LAN (local area network) or WAN (wide area network).
ReadiV oice Administration & Maintenanc e Guide 4 Proprietar y & Confidential When operators answer a request or select a conference to monitor, th e system registers them for the conference and displays all the available information about the conference and its participants.
Introducing the ReadiV oice ® System Proprietar y & Confidential 5 Components of the ReadiV oice System A ReadiVoice system includes: • A Conference Allocation and Control System (CACS) server.
ReadiV oice Administration & Maintenanc e Guide 6 Proprietar y & Confidential The SCP (if required), subscriber database, and Web server can physically reside on the CACS server. In large systems, however, these components may be distributed among multiple servers in or der to distribute the proce ssing load.
Introducing the ReadiV oice ® System Proprietar y & Confidential 7 4 The carrier switch uses the routing so lution to route the call to the InnoVox bridge selected by the CACS call router.
ReadiV oice Administration & Maintenanc e Guide 8 Proprietar y & Confidential Figure 1-2 ReadiVoice-PSTN INCR signaling flow Start User dials ReadiVoice access phon e number Origina ting sw it.
Introducing the ReadiV oice ® System Proprietar y & Confidential 9 ReadiV oice-IP Systems All ReadiVoice-IP systems ar e routed. That is, the CACS uses SIP ( Session Initiation Protocol) signaling over IP to route calls dynamically among available bridges.
ReadiV oice Administration & Maintenanc e Guide 10 Proprietar y & Confidential ReadiV oice-IP Call Processing When a caller dials a ReadiVoice-IP su bscriber’s access phone number on a typic.
Introducing the ReadiV oice ® System Proprietar y & Confidential 11 “Dialing” in ReadiV oice-IP Systems For the sake of simplicity, we refer to “dialed phone numbers” through out this document. Actually, in IP telephony, end points are identified by a Universal Resource Identifier (U RI).
ReadiV oice Administration & Maintenanc e Guide 12 Proprietar y & Confidential ReadiV oice Call Flow The basic call flow is the same for ReadiVoice-PSTN and ReadiVoice-IP (see Figure 1-4 ). Var ious system-level and subs criber-level configur ations and settings affect the basic ca ll flow, however.
Introducing the ReadiV oice ® System Proprietar y & Confidential 13 Figure 1-4 ReadiVoice call flow (1) In an Intelligent Networ k Call Routing (INCR) sys tem, the carrier's networ k takes care of this. (2) If the Access Phone Numb er is shared, an Access Co de is required to identify the specific subscriber.
ReadiV oice Administration & Maintenanc e Guide 14 Proprietar y & Confidential How A T wo-Password Configu ration Af fects Call Flow In the tradit ional ReadiVoice call flow s, the system: • Prompts all callers for an access code (unless the subscriber has a private access number) to identify the conference.
Proprietar y & Confidential 15 2 Administering the ReadiV oice System This chapter describes how to use the ReadiVoice system’s Web-based System Administration interface to add, modify, and view the system and user data.
ReadiV oice Administration & Maintenanc e Guide 16 Proprietar y & Confidential Opening ReadiV oice System Administration You can access the ReadiVoice System Administration interface from any computer that can connect to the Read iVoice system’s Web server and has a compatible Web browser (Microsoft Internet Explorer, version 5.
Administering the ReadiV oice System Proprietar y & Confidential 17 Figure 2-1 System Administration home page Figure 2-2 Login dialo g box 3 Enter a user name and password aut horized for Administration access.
ReadiV oice Administration & Maintenanc e Guide 18 Proprietar y & Confidential Maintaining Bridge Information When Polycom instal ls your ReadiVoice sys tem, we configure the application with the correct bridge information. If any of this inf ormation changes, you must update the system’s bridge table.
Administering the ReadiV oice System Proprietar y & Confidential 19 4 In the Add Bridge section at the bottom, complete the following fields: Reserve Ports — Enter th e number of ports y ou want to re serve for operator voice paths. These ports are not available for conferencing.
ReadiV oice Administration & Maintenanc e Guide 20 Proprietar y & Confidential 7 In the navigation bar, click Bridges . 8 To make the bridge avai lable for service, s elect In Ser vice in its Bridge Status field and clic k the Commi t button (blue “c”).
Administering the ReadiV oice System Proprietar y & Confidential 21 4 To save your changes, click the Commit button (blue “c”). The system confirms that the bridge ha s been modified and provides a link back to the Bridges page.
ReadiV oice Administration & Maintenanc e Guide 22 Proprietar y & Confidential W orking with T ranslation Numbers A translation number is the telephone network’s translation of the dialed telephone number into a number used to route the call: • For a routed PSTN system, your carri er provid es a bloc k or blocks of translation numbers.
Administering the ReadiV oice System Proprietar y & Confidential 23 These numbers are the worst-case scenar io: each conference contains three lines, and each line used a different access nmber.
ReadiV oice Administration & Maintenanc e Guide 24 Proprietar y & Confidential 6 Click the Add button. The system assigns the translation numbers to the bridge .
Administering the ReadiV oice System Proprietar y & Confidential 25 W orking with Bridge Groups and Routing Lists Bridge groups and routing lists apply onl y to routed systems (PSTN or IP). If you have a non-routed system, the access phone number determines which bridge receives a call , and this secti on doesn’t apply to you.
ReadiV oice Administration & Maintenanc e Guide 26 Proprietar y & Confidential Figure 2-5 Bridge Groups page (routed system only) Repeat the above procedure to add anothe r bridge group. When you’r e finished, make the necessary changes to the routing list s.
Administering the ReadiV oice System Proprietar y & Confidential 27 Managing Routing Lists This section applies only to routed syst ems (PSTN or IP).
ReadiV oice Administration & Maintenanc e Guide 28 Proprietar y & Confidential Modifying a Routing List 1 On the Routing Lists page, find the entry you want to modify and click its Edit Routing List button. The Edit Rout ing List page appears ( Figure 2- 7 ).
Administering the ReadiV oice System Proprietar y & Confidential 29 7 Click the link to reload the Edit Routi ng List page. The bridge group entry you deleted is gone from the list. The system doesn’t update the Search Order numbers of remaining entries.
ReadiV oice Administration & Maintenanc e Guide 30 Proprietar y & Confidential W orking with Number Groups Number groups are logical groupings of telephone numbers used to control the assignment of access phone numbers to subscribers.
Administering the ReadiV oice System Proprietar y & Confidential 31 Adding a Number Group 1 In the System Administrat ion navigation bar, click Number Groups . The Number Groups page appears ( Figure 2-8 ).The list shows the existing number groups.
ReadiV oice Administration & Maintenanc e Guide 32 Proprietar y & Confidential Modifying a Number Group 1 In the navigation bar, click Number Groups . The Number Groups page appears, listing th e available numb er groups. 2 To rename a number group, edit its name.
Administering the ReadiV oice System Proprietar y & Confidential 33 W orking with Access Classes Access classes are logical groupings of access phone numbers you can use to group numbers by carrier, kind of number (such as toll-free), or other criteria.
ReadiV oice Administration & Maintenanc e Guide 34 Proprietar y & Confidential Renaming an Access Class 1 In the navigation bar, click Access Classes . The Access Classes page appears, listing the available access classes. 2 Find the class you want to rename and type the new name into its New Name field.
Administering the ReadiV oice System Proprietar y & Confidential 35 W orking with Access Phone Numbers Access phone numbers are the telephone numbers (or, for IP systems, SIP addresses) that customers dial to reach your ReadiVoice system. They’re often toll-free numbers, and your carr ier usually tells you which numbers to use.
ReadiV oice Administration & Maintenanc e Guide 36 Proprietar y & Confidential Adding Access Phone Numbers To put the new access phone numbers into a new number group or access class, create the number grou p or access class f irst. See “Adding a Number Group” on page 31 or “Adding an Access Class” on page 33.
Administering the ReadiV oice System Proprietar y & Confidential 37 Moving Fixed Access Numb ers to Another Bridge In non-routed systems, access numbers ar e assigned to specific bridges. If necessary, you can move access number s from one bridge to another.
ReadiV oice Administration & Maintenanc e Guide 38 Proprietar y & Confidential Figure 2-1 1 Access Phone Numbers page after search Reassigning an Access Ph one Number’ s Subscribers You can globally reassign subscribers fr om one access number to another.
Administering the ReadiV oice System Proprietar y & Confidential 39 T o reassign subscribers to a different access phone number: 1 In the navigation bar, click Access Numbers . The Access Phone Numbers page appears ( Figure 2-10 ). 2 In the Search panel, enter criteria to retrieve the access number whose subscribers you want to reassi gn.
ReadiV oice Administration & Maintenanc e Guide 40 Proprietar y & Confidential Changing an Access Phone Number’ s Access Class You can’t change an access phone number’s access class if subscribers are assigned to it. First, re assign the su bscribers to an other acces s number.
Administering the ReadiV oice System Proprietar y & Confidential 41 Changing Hidden Numbers This section doesn’t appl y to IP systems, which don’t use hidden numbers. If your system uses hidden numbers, you can use the Modify Existing Access Phone Number page to change the hidd en number associ ated with an access number.
ReadiV oice Administration & Maintenanc e Guide 42 Proprietar y & Confidential Deleting an Access Phone Number Before you delete an access phone number, keep the following points in mind: • Access phone number changes require te lephone network changes to ensure that calls are routed properly.
Administering the ReadiV oice System Proprietar y & Confidential 43 W orking with Multiple Providers You can configure ReadiVoice for access by multiple application s ervice providers (ASPs).
ReadiV oice Administration & Maintenanc e Guide 44 Proprietar y & Confidential Allowed IP Enter a specific IP or an IP mask that defines valid IP addresses from which this provider can connect. For instance, if you enter 192.168.56.255, all IP ad dresses in the 192.
Administering the ReadiV oice System Proprietar y & Confidential 45 Figure 2- 15 Add Provider page Editing a Provider Account 1 In the navigation bar, click Application Providers . The Applicat ion Providers page appears ( Figure 2-14 ). 2 Find the provider that you want to edit and click its Edit button (purple “e”).
ReadiV oice Administration & Maintenanc e Guide 46 Proprietar y & Confidential Deleting a Provider You can’t delete a provider account to which subscribers are assigned. T o delete a provider account from the system: 1 In the navigation bar, click Application Providers .
Administering the ReadiV oice System Proprietar y & Confidential 47 The following sections describe how to create, edit, and delete a group. For information about adding subs cribers to a group, see the ReadiVoice Provisioning Guide .
ReadiV oice Administration & Maintenanc e Guide 48 Proprietar y & Confidential Editing a Subscriber Group 1 In the navigation bar, click Subscriber Groups . The Subscriber Group page appears. 2 Find the group that you want to ed it and click its E dit Group button (purple “e”).
Administering the ReadiV oice System Proprietar y & Confidential 49 4 If Group Type is Corporate: a Enter or modify the data in the Company Infor mation fields. See Table 2-4 for descriptions. All fields are required . b Enter or modify the data in the Billing Information section.
ReadiV oice Administration & Maintenanc e Guide 50 Proprietar y & Confidential Figure 2-18 Company and Billing sections of Edit Group p age Ta b l e 2 - 4 Company Information fields Field Description Company Name Enter the name of the comp any .
Administering the ReadiV oice System Proprietar y & Confidential 51 5 Configure the prompt settings in the Call Flow and Voice Prompt section ( Figure 2-19 ). Table 2-6 descri bes the settings. Figure 2- 19 Call Flow and V oice Prompt section of Edit Group page Ta b l e 2 - 5 Billing Information fields Field a a.
ReadiV oice Administration & Maintenanc e Guide 52 Proprietar y & Confidential 6 In the Conference Options section ( Figure 2-20 ), configure Account Options and Roll Call Options. Each of the feature s has two settings: Setting — Det ermines the feature’s default setting.
Administering the ReadiV oice System Proprietar y & Confidential 53 8 If your system ha s any Applicat ion Control Mode (ACM) features installed, place a check mark next to t hose that you wish to enable for this subscriber group. ACM applications must be both installed and activated to appear here.
ReadiV oice Administration & Maintenanc e Guide 54 Proprietar y & Confidential Ta b l e 2 - 7 Conferen ce Option s Field a Description Auto Continuation Setting: On — By defa ult, conferences begin with continuation turned on (which means that the conference conti nues until the last participant disconnects).
Administering the ReadiV oice System Proprietar y & Confidential 55 W aiting Room Setting : Off — The waiting room isn’t avai lable. If a subscriber locks a conference, callers after that are told that the conference is locked and are disconnected .
ReadiV oice Administration & Maintenanc e Guide 56 Proprietar y & Confidential Confer ence Continuation Determines whether subscribers can override their account s’ default continuation beha.
Administering the ReadiV oice System Proprietar y & Confidential 57 Conferen ce Entry with Count On — Upon entering the conference, participant s hear a private message telling them h ow many people, incl uding themselves, are now in the conference.
ReadiV oice Administration & Maintenanc e Guide 58 Proprietar y & Confidential 9 Click Commit Group . The system e ither confirm s that the group has been updated or tells you which information is missing. 10 If the update failed, note what’s missin g.
Administering the ReadiV oice System Proprietar y & Confidential 59 If they may do so, subscribers can ch ange the continuation behavior of all future conferences in two ways: • By accessing the account options me nu when dialing into the system (available if Prompt for Menu is turned on).
ReadiV oice Administration & Maintenanc e Guide 60 Proprietar y & Confidential Setting Up the Provisioning Inter face After working with the subscriber grou p settings, you may realize that your company doesn’t need or want to use all the available fields when provisioning subscribers or modifying their accounts.
Administering the ReadiV oice System Proprietar y & Confidential 61 4 When you’re finished making changes, click the Update Quick Provisionin g Settings button. The system confirms the provisioning setup changes and provides a link back to the System Administr ation page.
ReadiV oice Administration & Maintenanc e Guide 62 Proprietar y & Confidential Figure 2- 22 Quick Provisio ning Setup page (bottom).
Administering the ReadiV oice System Proprietar y & Confidential 63 Managing System Access The ReadiVoice sy stem supports several kinds of users with dif ferent roles and responsibilities. To give internal users (not subscribers) access to the system, you create entries for them on the Passwords page, assigning each a user name and password.
ReadiV oice Administration & Maintenanc e Guide 64 Proprietar y & Confidential Figure 2- 23 Passwords page 4 In the User Type list, select the use r type. The user types are operator, provisioner, gr oup operator, group provisioner, and system administrator.
Administering the ReadiV oice System Proprietar y & Confidential 65 Figure 2- 24 Operator Registered Subscr iber Groups page 9 Use the Add and Remove buttons to move selected groups into or out of this operator’s Registered Subscriber Groups list.
ReadiV oice Administration & Maintenanc e Guide 66 Proprietar y & Confidential Deleting an Internal User 1 In the navigation bar, click Passwords . The Passwords page appears ( Figure 2-23 ). 2 Locate the entry for the user you want to remove and click its Delete button (red “–”).
Administering the ReadiV oice System Proprietar y & Confidential 67 Deleting Entries from the List of Invalid Subscriber Passwords 1 In the navigation bar, click Invalid Subscriber Passwords . The Invalid Subscriber Password Table page appears ( Figure 2-25 ).
ReadiV oice Administration & Maintenanc e Guide 68 Proprietar y & Confidential.
Proprietar y & Confidential 69 3 Monitoring the ReadiV oice System This chapter describes the ReadiVoice system monitoring functions that you can access with your browser. You can vi ew the overall status of your system, usage levels, bridge and span status, operator data, and conference data.
ReadiV oice Administration & Maintenanc e Guide 70 Proprietar y & Confidential — Click Show Confer ence Status to see information about current conferences. — Click Show Conference Report to view call detail record (CD R) data for completed conferences sorted by subscriber .
Monitoring the ReadiV oice System Proprietar y & Confidential 71 Checking System Status The Sy stem Status page ( Figure 3-2 ) appears when you click the Show System Status link in the navigation bar. The System Disk Usage and Informix Disk Usage panels show disk usage statistics for your CACS server’s Sola ris partitions and Informix chunks.
ReadiV oice Administration & Maintenanc e Guide 72 Proprietar y & Confidential Viewing Conferencing Information The Conference Information links in the navigation bar let you look at: • Information about the conf erences currently running.
Monitoring the ReadiV oice System Proprietar y & Confidential 73 CDR Data by Subscriber When you click the Show Confer ence Report link in the navigation bar, the CDR Data page displays CDR data by subscriber. Each entry in the Conferenc e Report panel shows the aggregate conferencing data for one subscriber.
ReadiV oice Administration & Maintenanc e Guide 74 Proprietar y & Confidential CDR Data by Conference When you click the Show CDR Data link in the navigation bar, the CDR Data page presents an expanded search panel ( Figure 3-5 ), where you can specify various criteria, such as s ubscriber ID or name, and set a date range.
Monitoring the ReadiV oice System Proprietar y & Confidential 75 Figure 3-5 Retrieving CDR data by conference.
ReadiV oice Administration & Maintenanc e Guide 76 Proprietar y & Confidential Detailed CDR Data for One Conference While viewing CDR data by conference, click a conference ID for more information about that conference. The CD R Data page displays detailed CDR data for the conference ( Figure 3-6 ).
Monitoring the ReadiV oice System Proprietar y & Confidential 77 Viewing Operator Information The Operator Statistics page appears when you click the Operator St atistics link in the navigation bar of the Read iVoice internal user home page .
ReadiV oice Administration & Maintenanc e Guide 78 Proprietar y & Confidential Figure 3-7 The Operator Statistics Requests pag e Figure 3-8 Searching for operator requests by subscriber 5 Set the Begin Date and End Date fields by doing one of the following: — Click in the field and edit the date.
Monitoring the ReadiV oice System Proprietar y & Confidential 79 — How long the operator spent on the request (talking with the subscriber or conference). — Subscriber ID for the conference in question. Click the ID to retrieve a conference report for that subscriber.
ReadiV oice Administration & Maintenanc e Guide 80 Proprietar y & Confidential Figure 3- 10 Generating statistics for all operators 4 Set the Begin Date and End Date fields by doing one of the following: — Click in the field and edit the date.
Monitoring the ReadiV oice System Proprietar y & Confidential 81 Figure 3-1 1 Results of generating statistics for all operators Using the SNMP Monitor The ReadiVoice system supports the Si mple Network Management Protocol (SNMP).
ReadiV oice Administration & Maintenanc e Guide 82 Proprietar y & Confidential Figure 3- 12 Perfmeter tab of SNMP Monitor window 2 Point your mouse pointer at a specific data point on a graph. A small window displays the MIB data value and tim e for that point on the graph.
Monitoring the ReadiV oice System Proprietar y & Confidential 83 Figure 3- 13 SNMP Monitor Properties dialog box 4 Change the polling interval and time horizon, if you want, and choose the graphs you want displayed. Then click Apply . The SNMP Moni tor window reflects the changes you made.
ReadiV oice Administration & Maintenanc e Guide 84 Proprietar y & Confidential Figure 3- 14 Statistics t ab of SNMP Monitor window 8 To see a record of th e system’s conf erence and port usage levels over a longer time period, select Histograms from the Histograms menu.
Monitoring the ReadiV oice System Proprietar y & Confidential 85 Figure 3- 15 Histograms window of SNMP Monitor.
ReadiV oice Administration & Maintenanc e Guide 86 Proprietar y & Confidential Using the Channel State Monitor In a PSTN syst em, you can use the C ha nnel State Monitor tool to monitor the teleconferencing bridg e resources of the system (cards, spans, and ch annels) and to enable or disable telephony spans.
Monitoring the ReadiV oice System Proprietar y & Confidential 87 Figure 3- 17 Channel St ate Monitor ’s summary information for a br idge 3 Click on a card to see detailed information about that card. Channel State Monitor opens an applet window for the card ( Figure 3-18 ).
ReadiV oice Administration & Maintenanc e Guide 88 Proprietar y & Confidential Figure 3- 18 Applet window with details for the selected card 4 To see additional information about a sp an, click its status indi cator in the card window.
Monitoring the ReadiV oice System Proprietar y & Confidential 89 Figure 3- 19 Applet window with details for the selected span 5 To see additional information about a channel, cli ck its status indicator in the card window. Another applet window appears, di splaying configur ation and status details for the s elected channel ( Fi gure 3-20 ).
ReadiV oice Administration & Maintenanc e Guide 90 Proprietar y & Confidential.
Proprietar y & Confidential 91 4 Maintaining the ReadiV oice System This chapter describes how to maintain your ReadiVoice Intelligent Voice Conferencing System.
ReadiV oice Administration & Maintenanc e Guide 92 Proprietar y & Confidential Quick Maintenance Checklist Table 4-1 summarizes the daily and wee kly maintenance tasks, whic h are covered in more detail later in th e chapter.
Maintaining the ReadiV oice System Proprietar y & Confidential 93 Understanding Informix Backup The ReadiVoice system actually uses two Informi x databases. One, cdrcnow , consists of all the CDR (call de tail record) tables. The other, cnow , contains everything else, including your subscriber data.
ReadiV oice Administration & Maintenanc e Guide 94 Proprietar y & Confidential In the event of database corruption, a cr ash, or catastrophic disk failure, you can restore the database from the most r ece nt archive tape to th e state it was in when the archive was created.
Maintaining the ReadiV oice System Proprietar y & Confidential 95 Even in the event of a catastrophic disk failure, the most recent archive tape and current logical log tape l et you recover all the transactions up to the point where the last logical log file was written to tape.
ReadiV oice Administration & Maintenanc e Guide 96 Proprietar y & Confidential Backing Up Logical Logs This procedure assumes the CACS is easily accessible. If it’s not, you can: • Use ontape -a to perform a one-time backup of all the full logical log s until you can get to the site to restart continual backup.
Maintaining the ReadiV oice System Proprietar y & Confidential 97 Daily Maintenance T asks This section describes task s you should perform daily, as suming that you archive nightly and back up logical log s to tape. Perform them first thing in the morning or any time after the archive process is complete.
ReadiV oice Administration & Maintenanc e Guide 98 Proprietar y & Confidential T o check the ReadiV oice processes: 1 Open a Telnet ses sion to the CACS as user cnow and s witch user to root (or log into the CACS as root and use an XTerm window).
Maintaining the ReadiV oice System Proprietar y & Confidential 99 Checking Informix Dynamic Ser ver 1 In the same XTerm window in which you’re logged in as root, switch user to informix and enter tcsh to set the Informix environment. 2 Check the database space by entering onstat -d .
ReadiV oice Administration & Maintenanc e Guide 100 Proprietar y & Confidential Figure 4-3 Checking In formix us ers 6 Check logging by entering onstat -l . Informix displays information about phys ical and logical logging of the database. Figure 4-4 shows an example.
Maintaining the ReadiV oice System Proprietar y & Confidential 101 Figure 4-4 Checking logical lo gging ragnar </ra home> cnow> onstat -l Informix Dy namic Server Versi on 9.30.UC1 -- On- Line -- Up 21 days 10:14:39 -- 34944 Kbyte s Physical Lo gging Buffer bufu sed bufsize nump ages numwrits page s/io P-1 0 16 1043 6 923 11.
ReadiV oice Administration & Maintenanc e Guide 102 Proprietar y & Confidential Restar ting Backup and V erifying T ape Drive Status 1 In the CACS XTerm window in which you stopped ontape (see “Stopping Logical Log Backup and Replacing Tape s” on page 97), restart logical log backup by entering ontape -c .
Maintaining the ReadiV oice System Proprietar y & Confidential 103 W eekly Maintenance T asks This section describes procedures that you should perform at least weekly and perhaps more often for a large and busy system.
ReadiV oice Administration & Maintenanc e Guide 104 Proprietar y & Confidential Checking for Defunct Processes 1 As root, enter ps -ef | grep '<defunc t>' | grep -v grep . The system lists any defunct processes (processes that have no par ent).
Maintaining the ReadiV oice System Proprietar y & Confidential 105 Database Maintenance T asks Without proper maintenance, your Re adiVoice databases will grow ever larger, slowing the sys tem. It’s imperative that you routinely remove (purge) old records.
ReadiV oice Administration & Maintenanc e Guide 106 Proprietar y & Confidential The purgeCDR command syntax is: Table 4-2 describes the options (command-line arguments). Both the cutoff date and number of days options use midnight as the boundary.
Maintaining the ReadiV oice System Proprietar y & Confidential 107 Table 4-3 gives examples of the command wi th various options and values and describes the result of running the command.
ReadiV oice Administration & Maintenanc e Guide 108 Proprietar y & Confidential Scheduling Automatic Pu rges of CDR Records To s c h e d u l e purgeCDR to run per iodically and automatically in the cron task scheduler: 1 Decide how many days you want to retain CDR records in the database.
Maintaining the ReadiV oice System Proprietar y & Confidential 109 6 Restore the data from the CDR backup file to the cdrcnow database by entering (all on one line): /rahome/dbcd r/loadtable.pl DB= cdrcnow < /rahome/cdr/ archives/ YYYYMMDDh hmmss cdr.
ReadiV oice Administration & Maintenanc e Guide 110 Proprietar y & Confidential Purging the CacsEventUpdate T able If you use the Provisioning Stored Proc edure Interface (PSPI) for provisioning, you need to purge the CacsEventUpda te table from time to time to keep it from growing too large.
Maintaining the ReadiV oice System Proprietar y & Confidential 111 The cleanAccOptC hanges.pl script resides in /rahome/data base/scripts . The syntax is: cleanAccOptCh anges.pl [-rt nn ] The -rt parameter lets you specify a run time, nn , in minutes.
ReadiV oice Administration & Maintenanc e Guide 112 Proprietar y & Confidential I t ’ s b e s t t o s t o p a n d r e s t a r t R e a d i V o i c e processes only when there are no active conferences. In an emergency, however, you may have to do this while conferences are running.
Maintaining the ReadiV oice System Proprietar y & Confidential 113 T o reboot the Sun ser ver: 1 As root, stop the ReadiVoice processes as described above. 2 To perform a warm reboot in 30 seconds, enter shutdown -g30 -i6 -y . Solaris begins shutting down in 30 seconds without prompting for verification.
ReadiV oice Administration & Maintenanc e Guide 114 Proprietar y & Confidential The VCE/HMod cards in the bridge must be able to access files on the server in order to boot and to initia te various processes. If you’re also rebooting the server, be sure it has finished booting befor e restoring power to the bridge.
Maintaining the ReadiV oice System Proprietar y & Confidential 115 Manually Backing Up and Restoring You may want to manually back up your ReadiVoice system at times, such as prior to an upgra de. The backed -up data lets you to revert to the previou s version if there’s a problem with the upgrade.
ReadiV oice Administration & Maintenanc e Guide 116 Proprietar y & Confidential Restoring from a Manual Backup T ape 1 In an XTerm window, as root, stop the Web server process by entering sh /etc/rc3.d/S 91rvhttpd stop . 2 Change directories to /rahome and enter .
Proprietar y & Confidential 117 5 Configuring the ReadiV oice System This chapt er describe s how to ch ange yo ur ReadiVoice system’s configuration settings and which capabilities, fe atures and options are enabled.
ReadiV oice Administration & Maintenanc e Guide 118 Proprietar y & Confidential Changing System Configuration Settings 1 In the System Administrat ion navigation bar, click System Configuration . The System Configur ation page appears ( Figure 5-1 ).
Configuring the ReadiV oice System Proprietar y & Confidential 119 Min Code Length — The t he minimum number of digits permitted in an access code, subscriber password, or participant password.
ReadiV oice Administration & Maintenanc e Guide 120 Proprietar y & Confidential If you change Routing Mode from Non-Routed System Private to Non-Routed System Shared , delete all existing (pri.
Configuring the ReadiV oice System Proprietar y & Confidential 121 If you se lect this setting , then th e ExternalId field for each subscriber must be unique (that is, no two subscribers on this ReadiVoice system may have the same external ID).
ReadiV oice Administration & Maintenanc e Guide 122 Proprietar y & Confidential — Routed System: The Traditional Shared , Traditional P rivate , and Two Passcode Private call flow options are available. Voyant has tested and supports only the combinations shown in Table 5-3 .
Configuring the ReadiV oice System Proprietar y & Confidential 123 Changing the T alker Update Frequency Through the Operator and Moderator interfaces (and the APIs), the ReadiVoice system can report which two channels in a conference have talk slots.
ReadiV oice Administration & Maintenanc e Guide 124 Proprietar y & Confidential Configuring Shor tened Dial-Out Call Flow In the standard dial-out call flow, afte r the subscriber enters and confirms the phone number to dial, the system supports four commands for processing the call.
Configuring the ReadiV oice System Proprietar y & Confidential 125 5 To also turn off dialed number confirmation: a As user cnow, open the ive.ini file for editing. b In the [Dialout] section, add the following line: ConfirmDialNu m = 0 c Save and close the file.
ReadiV oice Administration & Maintenanc e Guide 126 Proprietar y & Confidential 3 As user cnow, open the ive.ini file for editing and find this section near the end: 4 Change the value after the WRAnnounceDe fault keyword from 1 to 0 . Then, save and close the ive.
Configuring the ReadiV oice System Proprietar y & Confidential 127 3 If necessary, update your existing subscriber records with the required identifiers. You may want to do this using th e Provisioning Stored Procedure Interface (PSPI). See the ReadiVoice PSPI Reference .
ReadiV oice Administration & Maintenanc e Guide 128 Proprietar y & Confidential Enabling Account Options Updating With Account Options Updating enabled, you can use the Provisioning Stored Pro.
Configuring the ReadiV oice System Proprietar y & Confidential 129 4 As root, stop and restart the Read iVoice system as described in “Stopping and Restarting ReadiVoice Processes” on page 111. 5 Use the GetAccOptCh anges stored procedure to retrieve records from the AccOptChange s table period ically.
ReadiV oice Administration & Maintenanc e Guide 130 Proprietar y & Confidential Using the Music Hold Extender Message If many participants are waiting on hol d when the subscriber arrives, there may be a short delay (a few seconds) be tween the time when they stop hearing the hold music and the time when they’re placed into conference.
Configuring the ReadiV oice System Proprietar y & Confidential 131 Configuring Remote Alarm Notifications The ReadiVoice system can notify someone when an alarm occurs. The ReadiVoice installation script provides the opportunity to enter one or more pager numbers, email addresses, or both, to which you want remote alarm notification s sent.
ReadiV oice Administration & Maintenanc e Guide 132 Proprietar y & Confidential Each line in the /etc/phones file takes the form pager PHONENUMBER ,,,,,,_ALARMCODE_ where PHONENUMBER is the complete phone number needed to reach the pager, including any digits required to access an outsid e line.
Configuring the ReadiV oice System Proprietar y & Confidential 133 The /rahome/bi n/email file specifies the addresses to which to send email alerts. When you enter email addresses during the installation, the install script creates an ent ry in this fi le for each.
ReadiV oice Administration & Maintenanc e Guide 134 Proprietar y & Confidential Changing the Alarm Settings T o change the default alarm settings: 1 Establish a Telnet connection to the Sun server and log in as cnow. 2 Change directory to /rahome/bi n .
Configuring the ReadiV oice System Proprietar y & Confidential 135 Continuously Monitoring for Alarms T o monitor your system co ntinuously for alarms: 1 On the Sun server, log in as root, open an XTerm window, and switch user to cnow. You can’t use a Telnet session for this purpose.
ReadiV oice Administration & Maintenanc e Guide 136 Proprietar y & Confidential Interpreting the Alarm Codes When an alarm condition occurs, the ReadiVoice Monitoring Tool se nds a numeric alarm code to designated pa ger numbers and email addresses.
Configuring the ReadiV oice System Proprietar y & Confidential 137 Enabling Conference Recording You can enable your subscribers to re cord their conferences by configuring your ReadiVoice system to conne ct to a recording device or service using a dial-out connection.
ReadiV oice Administration & Maintenanc e Guide 138 Proprietar y & Confidential 6 Verify that the tes t conference was re corded by listening to the recording. If the test conference was recorded, continue to the next step. If not, review the previou s steps or call your Polycom Global Serv ices representative for assistance.
Configuring the ReadiV oice System Proprietar y & Confidential 139 Since the recorderSetu pString is outpulsed as DTMF digits, data referenced by the variables that you use must be nu meric. If a retrieved variable string contains a non-numeric character, the syst em omits the entire string for that variable from the outpulsed data.
ReadiV oice Administration & Maintenanc e Guide 140 Proprietar y & Confidential the External ID field. If you intend to use any of these fields for recorder setup information, it's up to you to ensure that they contain numeric data and that your provisioning process po pulates the fields properly.
Configuring the ReadiV oice System Proprietar y & Confidential 141 Enabling SNMP Logging The SNMP logging function writes system usage and performance data to log files on an ongoing basis. For more in formation about SNMP, logging, and the log files, see .
ReadiV oice Administration & Maintenanc e Guide 142 Proprietar y & Confidential Changing the W eb Ser ver Por t This procedure allows you to change the Web server port used by the ReadiVoice HTML pa ges (Administration, Provisioning, Operator login, and Moderator) from port 80 to something else.
Configuring the ReadiV oice System Proprietar y & Confidential 143 8 If the script succeeded, test the URL that includes the new Web server port number by pointing a browser to: http:// hostip : por tnum /index2.html Use the IP address of the SUN (CACS) for hostip and the port number you specifi ed for portnum .
ReadiV oice Administration & Maintenanc e Guide 144 Proprietar y & Confidential.
Proprietar y & Confidential 155 7 Customizing & Branding Y our ReadiV oice System This chapter describes some of the cu stomizing and branding options in the ReadiVoice system. It assumes th at you know Solaris UNIX, Sun servers, personal computers, software config ur ation, telephony, and networ king.
ReadiV oice Administration & Maintenanc e Guide 156 Proprietar y & Confidential Rules and Guidelines for Customizing Commands Figure 7-1 shows the default ive.ini file’s [ DTMF_CMDS] section. For each entry, the touchtone key sequence is to the left of the equal sign, and the command to which it’s assigned is to th e right.
Customizing & Branding Y our ReadiV oice System Proprietar y & Confidential 157 Figure 7-1 [DTMF_CMDS] section of default ive.ini file 4 To disable a command, comment out it s line by putting two slashes ( // ) at the beginning of the line. Don’t delete lines that you don’t want to use.
ReadiV oice Administration & Maintenanc e Guide 158 Proprietar y & Confidential 5 To enable a disabled command, remove the two slashes ( // ) at the beginning of the line. 6 To change the DTMF key sequence that invokes a command, edit the two characters to the left of th e equal sign for that command.
Customizing & Branding Y our ReadiV oice System Proprietar y & Confidential 159 With the standard toggle option, pressing *4 locks a conference and pressing *4 again unlocks it .
ReadiV oice Administration & Maintenanc e Guide 160 Proprietar y & Confidential Mute All / Unmute All Muting and unmuting of all participants can be controlled either with two separate commands or with a single co mmand that toggles the mute state of the conference.
Customizing & Branding Y our ReadiV oice System Proprietar y & Confidential 161 With the standard toggle option, pressing #1 turns on listen only mode and pressing #1 again turns it off. To enable this configuration, change the relevant lines in ive.
ReadiV oice Administration & Maintenanc e Guide 162 Proprietar y & Confidential Customizing Confirmation Sounds The [CustomSound s] section in ive.ini controls how the system confirms the following changes: • Mute and unmute of an individual line.
Customizing & Branding Y our ReadiV oice System Proprietar y & Confidential 163 The default prompt set installed with the R eadiVoice system contains six .wav files with spoken messages designed to work with these commands: global_muted. wav global_unmute d.
ReadiV oice Administration & Maintenanc e Guide 164 Proprietar y & Confidential 2 Use file transfer protocol ( ftp ) to copy the replacement image file to a local directory on the CACS server. Be sure to use binary transfer mode . 3 Open a Telnet session to the CACS server, log in as cno w, and switch user to root.
Customizing & Branding Y our ReadiV oice System Proprietar y & Confidential 165 T o customize the Moderator for a specific subscriber group: 1 In the System Administ ration Subscriber Groups page, dete rmine the Group ID of the subscriber group.
ReadiV oice Administration & Maintenanc e Guide 166 Proprietar y & Confidential W orking with Prompt Sets Prompt sets are sets of .wav audio files (in the WAVE format; see “Details About the WAVE File Format” on page 175) that the Re adiVoice syst em uses for the messages and prompts played to subscribers and participants.
Customizing & Branding Y our ReadiV oice System Proprietar y & Confidential 167 For InnoVox 480 bridges, the .wav f i l e s m u s t b e i n 4 - b i t I M A A D P C M f o r m a t (8000 samples/second, 16-bit mono, compressed 4:1). For InnoVox 4000 bridges, they must be in 8-bit µ -law format (8000 samples/sec ond, 16-bit mono or higher).
ReadiV oice Administration & Maintenanc e Guide 168 Proprietar y & Confidential 10 When you’re finished adding prompt sets, create the symbolic links for the initial greetings (see “About Ini tial Greetings” on page 18 1) by running the tnl_mkln script: a Log into the CACS as root and, in an XTerm window, enter tcsh .
Customizing & Branding Y our ReadiV oice System Proprietar y & Confidential 169 Deleting the prompt set from within System Administration only makes it unavailable to the ReadiVoice system. It doesn’t delete the .wav files from t he CACS server or remove the directory that contains them.
ReadiV oice Administration & Maintenanc e Guide 170 Proprietar y & Confidential For example, if the system is Non-routed Private, and the bridge receives the digits 1111, it plays 1111helo_in bound.wav to the caller if the file exists. Another caller, whose DNIS digits are 2222, would hear 2222helo_inb ound.
Customizing & Branding Y our ReadiV oice System Proprietar y & Confidential 171 Creating Y our Own Indexed W A VE Files ReadiVoice uses an indexed WAVE file to store the short sound clips that are played in various combinations to speak numbers, dates, and time s.
ReadiV oice Administration & Maintenanc e Guide 172 Proprietar y & Confidential • Only in predefined key files , the first line contains LANG= followed by the upper-case English name of the desired language. The se names are converted into an appropri ate integer for the indexed WAVE file.
Customizing & Branding Y our ReadiV oice System Proprietar y & Confidential 173 The example below shows part of a German predefined key file: LANG=GERMAN 0; number_0; null.wav 1; number_1; eins.wav 2; number_2; zwei.wav . . . 107; 30th; dr eizigste.
ReadiV oice Administration & Maintenanc e Guide 174 Proprietar y & Confidential Running the Build Process To build an indexed WAVE fi le, use the genvoice utility in the /rahome/brid ge/binaries/too ls/ directory as follows: 1 Create or edit the key file as described above.
Customizing & Branding Y our ReadiV oice System Proprietar y & Confidential 175 Details About the W A VE File For mat A WAVE file stores di gital (sam pled) audio data in Microsoft’s Resource Interchange File Format (RIFF) . RIFF is a variant of Electronic Arts’ Interchange File Format (IFF).
ReadiV oice Administration & Maintenanc e Guide 176 Proprietar y & Confidential Indexed W A VE File Specifications In Polycom’s indexed WAVE files, th e Data chunk consists of a set of individual sound files that are concatenated together.
Customizing & Branding Y our ReadiV oice System Proprietar y & Confidential 177 • GERMAN • JAPANES E • SPANISH • SWEDISH The Language chunk consists of the chunk identifier ( lang ), the size of the data member ( DWORD ), and the two-byte integer ( WORD ) language fiel d.
ReadiV oice Administration & Maintenanc e Guide 178 Proprietar y & Confidential.
Proprietar y & Confidential 145 6 Diagnostics and T roubleshooting This chapter describes how to perfor m some diagnostic and troubleshooting tasks. Viewing Critical Logs The Critical Log s page ( Figure 6-1 ) appears w hen you click t he View Critical Logs link in the ReadiVoice home page’s na vigation bar.
ReadiV oice Administration & Maintenanc e Guide 146 Proprietar y & Confidential The critical log file s hows you critical entries about bridge processe s, such as: • Bridge up or down. • Span trouble (doesn ’t apply to IP systems). • Port capacity changes.
Diagnostics and T roubleshooting Proprietar y & Confidential 147 Database T roubleshooting This section suggests some method s for diagnosing the database and investigating database problems. Checking for Informix Ser ver Engine Errors To determine if an error has occurred in the Informix server engine, check the /usr/informi x/online.
ReadiV oice Administration & Maintenanc e Guide 148 Proprietar y & Confidential Logging Database Activity with th e Database Monitoring Script Your ReadiVoice installation includes a P erl script, dbMon.
Diagnostics and T roubleshooting Proprietar y & Confidential 149 Active sessions : This section shows the session IDs, user types (such as root, web, or cnow), and total used memo ry of active database connections.
ReadiV oice Administration & Maintenanc e Guide 150 Proprietar y & Confidential When you run the diagnose utility: 1 The bridge you’re testing calls you a t the number you s pecified, using the first bridge resource to be tested.
Diagnostics and T roubleshooting Proprietar y & Confidential 151 6 Enter the logical number of the first card you want to test (card numbering begins with zero). You see: 7 Enter the logical number of the last card you want to test. To test only the card you entered in step 6 , enter the same number again.
ReadiV oice Administration & Maintenanc e Guide 152 Proprietar y & Confidential 12 Answer the phone, listen to the message, and then hang up. For each call, you hear th ree numbers indicating the card, span, and channel being used for the call (or, in an IP system, a single number indicating the card).
Diagnostics and T roubleshooting Proprietar y & Confidential 153 T o star t dial-in channel testing: 1 Remove the bridge or bridges from se rvice and wait until all confere ncing activity has finished. 2 Open the ive.ini file for editing. 3 In the [Debug] section, set LOG_CHAN_DE BUG to 1 .
ReadiV oice Administration & Maintenanc e Guide 154 Proprietar y & Confidential.
Proprietar y & Confidential 179 A V oice Prompts and Call Flows This appendix describes the defaul t voice prompts in stalled with the ReadiVoice system, how they’re used , and the ReadiVoice call flows. Over view You can use mult iple sets of voice prompts in the ReadiVoice syst em, which you can customize for specific needs.
ReadiV oice Administration & Maintenanc e Guide 180 Proprietar y & Confidential The default prompt se t includes a file, silence.wav , containing only a very brief silence.
V oice Prompts and Call Flows Proprietar y & Confidential 181 About Initial Greetings In a non-routed system, the bridge plays th e initial greeting to callers. The file that’s appropriate de pends on your system configuration: • If your system is Non-routed Private, then the initial greeti ng is always the helo_inbound.
ReadiV oice Administration & Maintenanc e Guide 182 Proprietar y & Confidential V oice Prompt File Reference This section documents the default vo ice prompt files installed in the ReadiVoice system. Table A -1 lists the default voice prompt files in alphabetical order.
V oice Prompts and Call Flows Proprietar y & Confidential 183 40.wav “Forty” All 0.5 5.wav “Five” All 0.6 50.wav “Fifty” All 0.6 6.wav “Six” All 0.4 60.wav “Sixty” All 0.5 7.wav “Seven” All 0.6 70.wav “Seventy” All 0.6 8.
ReadiV oice Administration & Maintenanc e Guide 184 Proprietar y & Confidential ao_none_avail. wav “This option is not currently available.” Account Options process ao_not_enabled .wav “I’m sorry , this feature is not enabled.” Account Opti ons menu 2.
V oice Prompts and Call Flows Proprietar y & Confidential 185 cc_auto_on.wav “Auto Continuation is on.” Continuation [Autocontinuation setting] 2.9 cc_auto_overvi ew.wav “Auto Continuation turns continuation on for all of your confer ences, so they can continue after you disconnect.
ReadiV oice Administration & Maintenanc e Guide 186 Proprietar y & Confidential cf_conf_start. wav “Thank you. Y our conferen ce will now begin.” All [Sub call flow] 2.5 cf_default_non _part_ disconnect.wav “Thank you.” All (default part disconnect message) 0.
V oice Prompts and Call Flows Proprietar y & Confidential 187 cf_in_conf_sub s_cmd_ help.wav “The following conference co mmands are available to the subscriber: T o request an operator , press star zero. T o request an operator join your conference, press zero zero.
ReadiV oice Administration & Maintenanc e Guide 188 Proprietar y & Confidential cf_part_music_ wait.wav “The subscriber has not yet arrived. Please stand by .” Quick S tart off [Part call flow] 4.3 cf_please_stan dby.wav “Please wait.” All [Newcomer , d ial-in or dial-out] cf_subs_discon nect.
V oice Prompts and Call Flows Proprietar y & Confidential 189 cr_code_prompt .wav Not a prompt, but a symbolic link to either cr_access_cod e_prompt.wav or pw_prompt.wav . See “About Initial Greetings” o n page 18 1. Shared Access System [Dial-in, shared] cr_conf_ending .
ReadiV oice Administration & Maintenanc e Guide 190 Proprietar y & Confidential csn_wrong_.wav “I’m sorry , your entry…” Conference Security Code [Part CSC flow] 1.9 _csn_wrong.wav “… is not valid. Please enter the valid digits followed by the pound sign.
V oice Prompts and Call Flows Proprietar y & Confidential 191 _do_bad_num.wa v “… is not valid. Please enter the vaild digits followed by the pound sign.” Dial-out [Sub dial-out] 1.8 do_blast_dial_ subname_ announce_.wav <silence> Dial-out [Dial-out part call flow] _do_blast_dial _subname_ announce.
ReadiV oice Administration & Maintenanc e Guide 192 Proprietar y & Confidential do_part_discon nected.wav “The participant was disconnected.” Dial-out (shortened call flow) [Sub dial-out short] do_part_joined .wav “The participant has entered the conference.
V oice Prompts and Call Flows Proprietar y & Confidential 193 eea_name_entry _no_rc.wav “I’m sorry , Particip an t Name Record must be on to choose thi s option.” Entry/Exit Announcement changeable [Announce setting] 6.1 eea_name_join_ .wav <silence> Name Announce [Entry announce] _eea_name_join .
ReadiV oice Administration & Maintenanc e Guide 194 Proprietar y & Confidential global_unmuted .wav “The conference ha s been un-muted.” Custom mute/unmute confirmation ( s e e page 162 ) [Sub in conf] helo_inbound.w av “Hello and welcome to the Conferencing Center .
V oice Prompts and Call Flows Proprietar y & Confidential 195 lo_subs_join.w av “This is a Listen Only conference.” Listen Only Entry [Sub call flow] mute_not_enabl ed.wav “I’m sorry , this feature is not enabled.” Mute unavaila ble [In conf part or sub] 2.
ReadiV oice Administration & Maintenanc e Guide 196 Proprietar y & Confidential op_music.wav <hold music> Operator available [Oper wait] 30.0 op_no_op_disco nnect.wav “Y ou have been disconnected by the system. Please try your call again.
V oice Prompts and Call Flows Proprietar y & Confidential 197 pt_recorder.wa v “A recorder…” Roll Call (private) [In conf part or sub] 2.0 pw_confirmatio n.wav “Thank you.” T wo-password private ca ll flow [2-passwd private] pw_disconnect.
ReadiV oice Administration & Maintenanc e Guide 198 Proprietar y & Confidential qs_part_join.w av “This is a Quick S tart conference, you will be placed into the conference.” Quick S tart [Part call flow] 4.7 qs_set_off_pro mpt.wav “T o turn Quick S t art off, press 1.
V oice Prompts and Call Flows Proprietar y & Confidential 199 rc_on.wav "Roll call is on. Participants will be prompted to record their names." Roll Call [Roll Call setting] rc_overview.wa v “Roll Call prompts particip ants to record their names as they join a conference.
ReadiV oice Administration & Maintenanc e Guide 200 Proprietar y & Confidential rec_wait.wav “Please stand by while your recording connection is established. T o cancel the recording, press star 2.” Recorder Dial Out [Recording] 7.2 sd_chan_.
V oice Prompts and Call Flows Proprietar y & Confidential 201 spw_overview.w av “The subscriber passwor d is the password you use to log into the conf erencing system, to star t and join your conferences, and to change your account options.” Password changeable [Account Options help] spw_prompt.
ReadiV oice Administration & Maintenanc e Guide 202 Proprietar y & Confidential wr_conf_locked .wav “This conference has been locked with W aiting Room on.” W aiting Room [In conf sub] wr_count_.wav “There are…” W aiting Room [Sub WR processing] _wr_count.
V oice Prompts and Call Flows Proprietar y & Confidential 203 wr_off.wav "Currently , your conferences start unlocked, so participant s are put directly into conference." Lock (W aiting Room) available [WR setting] wr_on_entry.wa v "Currently , your conferences start locked, so particip ants are put into the waiting room.
ReadiV oice Administration & Maintenanc e Guide 204 Proprietar y & Confidential wr_sub_hold.wa v “The subscrib er has retu rned you t o the waiting room. Please hold.” W aiting Room [Part lock/full processing] wr_subs_discon nect.wav “Y ou have been disconnected by the conference moderator .
V oice Prompts and Call Flows Proprietar y & Confidential 205 Call Flow Diagrams The following pages contain call flow diagrams for the ReadiVoice system. Figure A-2 provide s a legend that explains some of the symbols and conventions used in the diagrams.
ReadiV oice Administration & Maintenanc e Guide 206 Proprietar y & Confidential Figure A-2 Understanding the call flow diagrams Call Flow Legend Examples of and information about certain symbols and conventions used in the call flow diagrams. Message to the user, usually one or more .
V oice Prompts and Call Flows Proprietar y & Confidential 207 Figure A-3 T raditional shared call flow (initial entry) Valid access code? cf_you_subs_ prompt.wav cr_code_prompt.wav (see note) Hook Yes Operator available? No cr_access_code_wrong.wav Failed attempts? No Yes Start <3 No cr_access_code_ good.
ReadiV oice Administration & Maintenanc e Guide 208 Proprietar y & Confidential Figure A-4 T raditional private call flow (initial entry) Bad access number? Hook Yes cr_access_number_ wrong.wav No Traditional Private Call Flow Non-Routed System Private, Participant Password not available helo_inbound.
V oice Prompts and Call Flows Proprietar y & Confidential 209 Figure A-5 T wo-password shared call flow (initial entry) Two Password Shared Call Flow Non-routed System Shared, Prompt for Subscriber off, Participant Password required Valid password? cr_code_prompt.
ReadiV oice Administration & Maintenanc e Guide 210 Proprietar y & Confidential Figure A-6 T wo-password private call flow (initia l entry) Two Password Private Call Flow Non-routed System Private, Prompt for Subscriber off, Participant Password optional Get tones 10 sec.
V oice Prompts and Call Flows Proprietar y & Confidential 211 Figure A-7 Routed (INCR) call flow (initial entry) Start Routed Call Flow Routed (INCR) System – Access Code, if any, collected by switch. Starts when inbound call hits bridge. Ends at named process.
ReadiV oice Administration & Maintenanc e Guide 212 Proprietar y & Confidential Figure A-8 IP Call process IP Call Process Start IP Call Process cf_call_not_ completed.wav Any error? Hook Yes No Applies to ReadiVoice-IP systems. Starts and ends in Routed (INCR) Call Flow.
V oice Prompts and Call Flows Proprietar y & Confidential 213 Figure A-9 Recording dial-ou t process rec_not_enabled.wav Start Recording Process Recording Process Starts in conference when subscriber enters recording command. Ends at Rejoin Conference process.
ReadiV oice Administration & Maintenanc e Guide 214 Proprietar y & Confidential Figure A-10 Subscriber dial-out p rocess (long) Start Subscriber DO Process Subscriber Dial-out Process – default (long) configuration Starts in conference when subscriber presses *1.
V oice Prompts and Call Flows Proprietar y & Confidential 215 Figure A-1 1 Subscriber dial-out process (sho rt) Start Short Subscriber DO Process Subscriber Dial-out Process – optional short configuration Starts in conference when subscriber presses *1.
ReadiV oice Administration & Maintenanc e Guide 216 Proprietar y & Confidential Figure A-12 Called party dial-out process No Yes Called Party Dial-out Process Describes system interaction with the dialed-out line (the called party). Starts when system accesses line to place outbound call.
V oice Prompts and Call Flows Proprietar y & Confidential 217 Figure A-13 Dial-out newcomer process Start DO Newcomer Process Dial-Out Newcomer Process Starts in Called Party Dial-Out process when caller type (subscriber or participant) isn’t known.
ReadiV oice Administration & Maintenanc e Guide 218 Proprietar y & Confidential Figure A-14 Subscriber call flow (after initial entry) Subscriber Start Subscriber Process Starts after initial entry process (inbound call flow or called party dial-out process).
V oice Prompts and Call Flows Proprietar y & Confidential 219 Figure A-15 Participant call flow (after initial entry) No Yes Participant Start Quick Start? Yes qs_part_join.wav cf_first_caller.wav Yes No No Yes No lo_part_join.wav First into conf? Conf Entry with Count? Roll Call? cf_caller_count_.
ReadiV oice Administration & Maintenanc e Guide 220 Proprietar y & Confidential Figure A-16 Subscriber validation process Start Subscriber Validation Subscriber Validation Starts in Subscriber Call Flow or Music Hold. Ends in Subscriber Call Flow.
V oice Prompts and Call Flows Proprietar y & Confidential 221 Figure A-17 Conferen ce security co de process (subscriber) No Preceded by 4-9 digits? csn_verify_prompt_.wav code (numbers.wav) _csn_verify_prompt.wav * entered? csn_wrong_ length.wav No <5 Anything entered? 5 Yes # Yes No Yes * csn_setup_prompt.
ReadiV oice Administration & Maintenanc e Guide 222 Proprietar y & Confidential Figure A-18 Conference security code process (participant) csn_prompt.wav Correct? No Yes Failed attempts? Hook csn_wrong_.wav code (numbers.wav) _csn_wrong.wav Operator available? No Yes csn_wrong.
V oice Prompts and Call Flows Proprietar y & Confidential 223 Figure A-19 Music hold process Hold time expired? Start Music Hold Process Music Hold Process Starts and ends in Participant Call Flow. Conf started? End Music Hold Process No No Yes Hook HR_CONF_LOCKED lck_locked_disconnect.
ReadiV oice Administration & Maintenanc e Guide 224 Proprietar y & Confidential Figure A-20 Name record process rc_identify_prompt.wav Anything recorded? rc_rerecord_prompt.wav Recording Start Name Record Process Subscriber/Participant Name Record Process Starts and ends in Subscriber or Participant Call Flow.
V oice Prompts and Call Flows Proprietar y & Confidential 225 Figure A-21 Locked/full conference p rocess (participant) Subscriber entered #5 and then # Locked/Full Conference Process Start Locked/Full Process Conf full or ending? Waiting Room? Locked? Hook Full No No Yes End Locked/ Full Process No wr_hold.
ReadiV oice Administration & Maintenanc e Guide 226 Proprietar y & Confidential Figure A-22 Operator wait process Start Operator Wait Process Operator Wait Process Starts in Traditional Shared, Two Password Shared, Two Password Private, Routed, IP Call, Subscriber Validation, or Participant Conference Security Code.
V oice Prompts and Call Flows Proprietar y & Confidential 227 Figure A-23 Account options process Digits entered? No Start Account Options Process 1 or 2? Account Options Process Starts and ends in Subscriber Call Flow. ao_initial_menu.wav Get tones 10 sec.
ReadiV oice Administration & Maintenanc e Guide 228 Proprietar y & Confidential Figure A-24 Account options menu Start AO Menu Process Account Options Menu Process Starts and ends in Account Options Process.
V oice Prompts and Call Flows Proprietar y & Confidential 229 Figure A-25 Account options help Is quick start configurable? Is password configurable? Is roll call configurable? Is autocontinue configurable? Is listen only entry configurable? Is waiting room configurable? spw_overview.
ReadiV oice Administration & Maintenanc e Guide 230 Proprietar y & Confidential Figure A-26 Announcement setting process Anything entered? No Start Announce Setting Process 1, 2, or 3? Announcement Setting Process Starts either from roll call setting process or from subscriber entering DTMF command (default is *3) while in conference.
V oice Prompts and Call Flows Proprietar y & Confidential 231 Figure A-27 Autocontinu ation settin g process Anything entered? No Start Autocontinue Setting Process 1? Autocontinuation Setting Process Starts and ends in account options menu. Get tones 10 sec.
ReadiV oice Administration & Maintenanc e Guide 232 Proprietar y & Confidential Figure A-28 Listen only entry setting process Start LO Entry Setting Process Listen Only Entry Setting Process Starts and ends in account options menu. LOE setting? lo_entry_on.
V oice Prompts and Call Flows Proprietar y & Confidential 233 Figure A-29 Password setting process Anything entered? No Start Password Setting Process Valid number of digits? Password Setting Process Starts and ends in account options menu. Get tones 10 sec.
ReadiV oice Administration & Maintenanc e Guide 234 Proprietar y & Confidential Figure A-30 Quick start setting process Anything entered? No Start Quick Start Setting Process 1? Quick Start Setting Process Starts and ends in account options menu.
V oice Prompts and Call Flows Proprietar y & Confidential 235 Figure A-31 Roll call setting process Anything entered? No Start Roll Call Setting Process 1 or 2? Roll Call Setting Process Starts and ends in account options menu. Get tones 10 sec. timer Yes Failed attempts? No 1 End Roll Call Setting Process Is Roll Call on? rc_on.
ReadiV oice Administration & Maintenanc e Guide 236 Proprietar y & Confidential Figure A-32 Wai ting room setting process Anything entered? No Start WR Setting Process 1, 2, or 3? Waiting Room Setting Process Starts and ends in account options menu.
V oice Prompts and Call Flows Proprietar y & Confidential 237 Figure A-33 Entry announce process 19 (DTMF) Start Entry Announce Process Entry Announce Process Describes what the system plays to the conference (shaded boxes) as someone enters the conference.
ReadiV oice Administration & Maintenanc e Guide 238 Proprietar y & Confidential Figure A-34 Exit announce process 91 (DTMF) Start Exit Announce Process Exit Announce Process Describes what the system plays to the conference (shaded boxes) as someone leaves the conference.
V oice Prompts and Call Flows Proprietar y & Confidential 239 Figure A-35 Waiting room process (subscriber) wr_new_caller_.wav <recorded name> _wr_new_caller.wav #5 entered (process callers)? 10 sec. timer Yes 1 entered? Yes * entered? #6 entered (toggle notif.
ReadiV oice Administration & Maintenanc e Guide 240 Proprietar y & Confidential Figure A-36 T ogg le waiting room reminders process Reminders on? Toggle acknowledge type? wr_notification_off.
V oice Prompts and Call Flows Proprietar y & Confidential 241 Figure A-37 Roll call process Any recorded names? No Yes rc_conf_.wav count (numbers.wav) _rc_conf.wav recorded names (pt_operator.wav for ope rator; pt_recorder.wav for recorder) Roll Call Process Starts in conference when participant or subscriber enters roll call command.
ReadiV oice Administration & Maintenanc e Guide 242 Proprietar y & Confidential Figure A-38 Operator request process Operator Request Process Starts in conference when participant or subscriber enters operator request command (via DTMF or Moderator/API).
V oice Prompts and Call Flows Proprietar y & Confidential 243 Figure A-39 Rejoin conference process mute_part_join.wav Start Rejoin Conf Process Rejoin Conference Process When someone in conferenc.
ReadiV oice Administration & Maintenanc e Guide 244 Proprietar y & Confidential Figure A-40 End conference process (subscriber) Start Sub End Conf Process ct_manual_prompt.wav Get tones Error 1 entered? 10 sec. timer Yes Subscriber End Conference Process Starts in conference when subscriber enters end conference command (default is #8 ).
V oice Prompts and Call Flows Proprietar y & Confidential 245 Figure A-41 In-conference commands by su bscriber In-conference Subscriber/Moderator Commands Subscriber entered *4 (or Moderator) Subscriber entered ** cf_in_conf_subs_cmd_help.wav Rejoin Conference Waiting room? lck_conf_locked.
ReadiV oice Administration & Maintenanc e Guide 246 Proprietar y & Confidential Figure A-42 In-conference commands by subscriber (continued) In-conference Subscriber/Moderator Commands All start in conference when subscriber enters indicated DTMF (touchtone) command (defaults shown) or corresponding Moderator command.
V oice Prompts and Call Flows Proprietar y & Confidential 247 Figure A-43 In-conference commands by subscriber (continued) In-conference Subscriber DTMF and Moderator Commands All start in conference when subscriber enters indicated DTMF (touchtone) command (defaults shown) or corresponding Moderator command.
ReadiV oice Administration & Maintenanc e Guide 248 Proprietar y & Confidential Figure A-44 In-conference commands by participant In-conference Participant Commands Participant entered ** cf_in_conf_part_cmd_help.wav Rejoin Conference All start in conference when participant enters indicated DTMF (touchtone) command (defaults shown).
V oice Prompts and Call Flows Proprietar y & Confidential 249 Figure A-45 Conferen ce termina tion proce ss Start Conf Termination Process Conference Termination Process Starts in conference when system determines that conference has exceeded the maximum time for a one-person (or configured minimum) conference.
ReadiV oice Administration & Maintenanc e Guide 250 Proprietar y & Confidential Figure A-46 Other in-conference events Miscellaneous Events In-conference events experienced by those indicated in circumstances shown. ct_manual_disconnect.wav Subscriber entered #8 and then 1 Hook Hook sd_conf_now.
Proprietar y & Confidential 251 B CDR Data Reference This appendix describes post-conference data found in the Call Detail Rec ords (CDRs). CDRs provide th e billing info rmation for your ReadiVoice system. CDR Processing Database The CDR database is composed of five Informix tables.
ReadiV oice Administration & Maintenanc e Guide 252 Proprietar y & Confidential Informix CDR T ables Five Informix tables hold informat ion from completed conferences: • Conference Informati.
CDR Data Reference Proprietar y & Confidential 253 reserver_title CHAR(10) T itle of subscriber . In the CNOW database, this is TITLE from the SU BSCRIBER DET AIL table. reserver_first CHA R(30) First name of subscriber . In the CNOW database, this is FIRSTNAME from the SUBSCRIBERINFO table.
ReadiV oice Administration & Maintenance Guide 254 Proprietar y & Confidential r_se curity _enab le S MALLIN T Forced to ze ro (0). r_pr e_noti fy SMAL LINT Forced to ze ro (0). r_fu ll_dup lex SMAL LINT Forced to ze ro (0). u_no _show SMAL LINT Forced to ze ro (0).
CDR Data Reference Proprietar y & Confidential 255 Ta b l e B - 2 Participant Information (cdr_post_p art) Field Name Fiel d T ype Description conf_id INTEGE R Conference ID (key to cdr_post_conf table) (indexed with part_id). sub_id SMALLINT Forced to zero (0).
ReadiV oice Administration & Maintenanc e Guide 256 Proprietar y & Confidential part_first CHAR(30) If subscriber record, one of the following: • ACM Pins value, if any • Blank, if partici.
CDR Data Reference Proprietar y & Confidential 257 port_group SMALLINT Forced to zero (0). res_port_group SMALLINT Forced to zero (0). line_number INTEGER Forced to zero (0). card_num SMALLINT Identifies the card on which the conference was running.
ReadiV oice Administration & Maintenanc e Guide 258 Proprietar y & Confidential Ta b l e B - 3 Feature Informatio n (cdr_post_state) Field Name Fiel d T ype Description conf_id INTEGE R Conference ID (key to cdr_post_conf table). part_id INTEGE R Participant ID (key to cdr_post_p art table).
CDR Data Reference Proprietar y & Confidential 259 The ACM Data table is available for storing additional data collected by ACM (Application Control Mode) applicat ions that you develop. The ACM application is responsible for sending the collected data to the ACM manager in the form key:value .
ReadiV oice Administration & Maintenanc e Guide 260 Proprietar y & Confidential.
Proprietar y & Confidential 261 C SNMP Events and Alarms This appendix contains reference in formation for ReadiVoice system and bridge events and their SNMP variable s.
ReadiV oice Administration & Maintenanc e Guide 262 Proprietar y & Confidential Figure C-1 SNMP overview ReadiVoice System SNMP Agent SNMP Module Voyant -Written Custom A gent Extension for Re.
SNMP Events and Alarms Proprietar y & Confidential 263 Contents of the SNMP MIB The MIB contains four tables: sysTable — system information sysHistogram Table — system histogram (s tatistical).
ReadiV oice Administration & Maintenanc e Guide 264 Proprietar y & Confidential sysCrNoCapacit y SS7 routing failures – no capacity . sysCrNoDBEntry SS7 routing failures – no DB entry (bad number). sysCrOutOfTran slationNum SS7 routing failures – out of translation number .
SNMP Events and Alarms Proprietar y & Confidential 265 brgNumDTMFDial Outs Number of d ial out s made b y DTMF . brgNumDialsIn Number of dial ins. brgNumConfsAct ive Number of active conferences. brgPortMaxCapa city T otal number of availabl e ports in the bridge.
ReadiV oice Administration & Maintenanc e Guide 266 Proprietar y & Confidential Using the SNMP Log Files If you enable the SNMP logging function (see “Enabl ing SNMP Logging” on page 141), it writes system usage and performance data to log files on an ongoing basis.
SNMP Events and Alarms Proprietar y & Confidential 267 Figure C-2 Sample SNMP log file DATE/TIME,B RIDGEID,CONFERENCE S,MAX_CAPACITY,ACT IVE_PORTS,ALLOCATE D_PORTS,DIAL_INS,D TMF_DIAL_ OUTS,MODERA.
ReadiV oice Administration & Maintenanc e Guide 268 Proprietar y & Confidential SYS_CONFERENCE Number of active conferences for the system 35 SYS_MAX_CAPACI TY Port capacity available (number .
SNMP Events and Alarms Proprietar y & Confidential 269 MAX_CAPACITY Port capacity av ailable 480 480 ACTIVE_PORTS Ports in us e – active for the bridge 12 12 ALLOCATED_PORT S Ports in us e – r.
ReadiV oice Administration & Maintenanc e Guide 270 Proprietar y & Confidential Contents of Histogram Log File Figure C-3 shows a sample of a histogram log file. The first line in the sample contains the field names. The remaining lines are e xample records.
Proprietar y & Confidential 271 D ReadiV oice-IP with IP T ributaries ReadiVoice-IP systems can be configured to enable the IP Tributaries feature.
ReadiV oice Administration & Maintenanc e Guide 272 Proprietar y & Confidential Password Included — One-Password Call Flow ReadiVoice-IP has three possible IP tr ibutaries for one-password call flows. Clear T ext Password In this type of SIP INVITE , the TO header includes the access code and password.
ReadiV oice-IP with IP T ributaries Proprietar y & Confidential 273 or TO: sip: accessnum ber @ host ;PCODE= passwor d When the header has one of these formats, the caller enters the traditional ReadiVoice call flow after the password prompt (rather than being prompted for a password).
ReadiV oice Administration & Maintenanc e Guide 274 Proprietar y & Confidential Implementing IP T ributaries To implement IP tributaries: 1 Voyant technical support must modify the . suarc configuration file and enable the IP tributary config uration parameters.
Proprietar y & Confidential 275 Index Symbols .odprocrc file 138 A access managing 63 phone numbers 35 translation numbers 22 access class access number assignments 40 adding 33 defined 33 deletin.
ReadiV oice Administration & Maintenanc e Guide 276 Proprietar y & Confidential monitoring 86 rebooting 113 routing lists 25 troubleshooting channels 149 bridge groups adding 25 deleting 26 ma.
Index Proprietar y & Confidential 277 troubleshooting 147 dbMon.pl 147 , 148 defunct processes 104 deleting access class 34 access phone number 42 bridge 21 bridge group 26 internal user 66 invali.
ReadiV oice Administration & Maintenanc e Guide 278 Proprietar y & Confidential system diagram 9 IP Tributaries, overview 14 ive.ini ConfirmDialNum 124 Waiting Room notifications 125 K killing.
Index Proprietar y & Confidential 279 P page Access Classes 33 Access Phone Numbers 36 , 38 Add Provider 45 Application Providers 43 Bridge Groups 26 Bridges 20 Conference Status 72 Edit Group 48 .
ReadiV oice Administration & Maintenanc e Guide 280 Proprietar y & Confidential routing list 29 restarting ReadiVoice processes 111 Solaris 112 restoring manual backup 115 , 116 purged CDR rec.
Index Proprietar y & Confidential 281 customizing 155 listen only 160 lock/unlock 158 mute all / unmute all 160 mute/unmute 159 roll call 161 touchtone initiated changes, updating 128 translation .
ReadiV oice Administration & Maintenanc e Guide 282 Proprietar y & Confidential.
Ein wichtiger Punkt beim Kauf des Geräts Polycom 3725-70003-009F (oder sogar vor seinem Kauf) ist das durchlesen seiner Bedienungsanleitung. Dies sollten wir wegen ein paar einfacher Gründe machen:
Wenn Sie Polycom 3725-70003-009F noch nicht gekauft haben, ist jetzt ein guter Moment, um sich mit den grundliegenden Daten des Produkts bekannt zu machen. Schauen Sie zuerst die ersten Seiten der Anleitung durch, die Sie oben finden. Dort finden Sie die wichtigsten technischen Daten für Polycom 3725-70003-009F - auf diese Weise prüfen Sie, ob das Gerät Ihren Wünschen entspricht. Wenn Sie tiefer in die Benutzeranleitung von Polycom 3725-70003-009F reinschauen, lernen Sie alle zugänglichen Produktfunktionen kennen, sowie erhalten Informationen über die Nutzung. Die Informationen, die Sie über Polycom 3725-70003-009F erhalten, werden Ihnen bestimmt bei der Kaufentscheidung helfen.
Wenn Sie aber schon Polycom 3725-70003-009F besitzen, und noch keine Gelegenheit dazu hatten, die Bedienungsanleitung zu lesen, sollten Sie es aufgrund der oben beschriebenen Gründe machen. Sie erfahren dann, ob Sie die zugänglichen Funktionen richtig genutzt haben, aber auch, ob Sie keine Fehler begangen haben, die den Nutzungszeitraum von Polycom 3725-70003-009F verkürzen könnten.
Jedoch ist die eine der wichtigsten Rollen, die eine Bedienungsanleitung für den Nutzer spielt, die Hilfe bei der Lösung von Problemen mit Polycom 3725-70003-009F. Sie finden dort fast immer Troubleshooting, also die am häufigsten auftauchenden Störungen und Mängel bei Polycom 3725-70003-009F gemeinsam mit Hinweisen bezüglich der Arten ihrer Lösung. Sogar wenn es Ihnen nicht gelingen sollte das Problem alleine zu bewältigen, die Anleitung zeigt Ihnen die weitere Vorgehensweise – den Kontakt zur Kundenberatung oder dem naheliegenden Service.