25.06.2013 Views

2.0 Mb DTI/PRI Administration and Maintenance Guide Book ... - Home

2.0 Mb DTI/PRI Administration and Maintenance Guide Book ... - Home

2.0 Mb DTI/PRI Administration and Maintenance Guide Book ... - Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 3 — DPNSS1/DASS2 features description <strong>and</strong> implementation Page 727 of 1536<br />

Feature operation<br />

Activating Call Forward All Calls over DPNSS1<br />

Set A invokes Call Forward All Calls (CFAC) to Set B, the forwarded to party<br />

over a DPNSS1 network. In a non-DPNSS1 network environment, then the<br />

Call Forward All Calls is normal operation.<br />

1 If the dialing plan reaches Set B via DPNSS1, a VALIDATION<br />

REQUEST is sent to Set B. The CFAC key remains flashing.<br />

2 Upon receipt of the request, Set B’s node responds to the validity of Set<br />

B’s DN. If the DN is valid, the CFAC feature is activated. The CFAC key<br />

is lit. However, if the DN is not valid, Set A hears an overflow tone, <strong>and</strong><br />

the CFAC key remains flashing.<br />

3 If the forwarded DN is local or reached through a non-DPNSS1 network,<br />

the usual CFAC activation process applies. No DPNSS1 messaging<br />

occurs.<br />

DPNSS1 Executive Intrusion<br />

Digital Private Network Signaling System 1 (DPNSS1) Executive Intrusion<br />

enables an originating party to break-in to an established call under certain<br />

circumstances. The Meridian 1 only allows this feature to be activated from<br />

Attendant Consoles; however, it will accept an Executive Intrusion activation<br />

request from a regular set on a third-party PBX.<br />

For the purposes of this feature description the term “requested” party will be<br />

used to describe the person on the established call who the originating party<br />

desires to talk with, <strong>and</strong> the “unrequested” party will mean the person on<br />

other end of the call. On an Option 11, Executive Intrusion is only activated<br />

if the attendant places the call to the requested party over a DPNSS1 link. If<br />

the attendant <strong>and</strong> the requested party are located on the same node, the current<br />

Attendant Break-in feature is activated. Executive Intrusion is activated by<br />

using the existing Break-In key on an Attendant Console.<br />

When an attendant presses the Break-In (BKI) key to invoke Executive<br />

Intrusion, the node where the requested party resides checks the Intrusion<br />

Capability Level (ICL) of the Attendant Console against the Intrusion<br />

Protection Levels (IPLs) of the parties involved in the call. If the ICL is higher<br />

than the IPLs, Executive Intrusion is allowed <strong>and</strong> a conference is set up<br />

between the attendant, requested, <strong>and</strong> unrequested parties.<br />

Option 11C <strong>2.0</strong> <strong>Mb</strong> <strong>DTI</strong>/<strong>PRI</strong> <strong>Administration</strong> <strong>and</strong> <strong>Maintenance</strong> guide

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!