Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (3.09 MB, 661 trang )
PI 9.xx
Chapter 2: Programming Requirements
Branch/Option
DAA
Branch/Option
NETWORK
NODES
NIGHT SERVICE
NUMBERING PLAN
=
=
=
=
(NET)
(NODE)
(NIGHT)
(NPL)
PI MESSAGES
PICK-UP GROUP
PORT DATA-BASE
PORT LIST
PREFERENCE
=
=
=
=
=
(MSG)
(PICK)
(PDB)
(PLIS)
(PREF)
RESERVED LINKS*
RINGER P
.S.
=
=
(LINK)
(RPS)
SIZES DEF
SMDR CONTROL
STATION TIMERS
SYSTEM GEN.
SYS FEATURES
SYS TIME SET-UP
=
=
=
=
=
=
(SIZ)
(SMDR)
(ST.T)
(SYSGEN)
(SFE)
(TIME)
TERMINAL SET-UP
TOLL BARRIER
TONE PLAN
TRUNK DEFINITION
TRUNK GROUP
TRUNK GRP DEF
TRUNK PORTS
TRUNK TIMER
=
=
=
=
=
=
=
=
(TERM)
(TOLL)
(TON)
(TRK)
(TKGP)
(TGDEF)
(TRUNK)
(TK.T)
VERIFIED FORCED
ACCOUNT CODE
=
(VFAC)
WAKEUP
WIRELESS ST (PDB)
=
=
(WAKEUP)
(WST)
ZONED GROUPS
=
(VPZ)
4T/8T CARD_DB
=
(TKDB)
ALT ROUT TK.GROUP
=
(ROUT)
BELL/UNA GROUP
BOSS GROUP
BUSY PORTS
=
=
=
(BELL)
(BOSS)
(BUSY)
CARD DATA-BASE
CARD LIST
CLASS OF SERVICE
COST CALCULATION
=
=
=
=
(CDB)
(CLIS)
(COS)
(COST)
DATA SERVICES
8 DID CARD_DB
DID/E&M TRUNK GROUP
DIGITAL BUS LIST
DIGITAL TRUNK
=
=
=
=
=
(DATA)
(DIDB)
(DIDG)
(DLIS)
(DTDB)
KEYSET DEFINITION
KEYSET PROGRAMMING
KEYSET TIMERS
=
=
=
(KEY)♦
(PROG)
(EK.T)
FEATURES PORTS
FEATURE TIMERS
=
=
(FEAT)
(FE.T)
GROUPS
GROUP CALLS
=
=
(GROUP)
(CALL)
HUNTING GROUP
=
(HUNT)
IST/SLT CARD_DB
IST/SLT DEF.
=
=
(STDB)
(SLT)‡
LCR/ROUTING
LIBRARIES
=
=
(LCR)
(LIB)
DAA
* This feature is available for SVC systems only.
‡ Typing IST will also take you to the IST/SLT Definitions; this is for historical reasons.
♦ Typing EKT will also take you to the KEYSET Definitions; this is for historical reasons.
the Direct Access
The layout and order ofthe on-line version; Abbreviations shown above isonly.
slightly different from
this is for the sake of clarity
2-7
Chapter 2: Programming Requirements
PI 9.xx
H. Entering Yes/No Range
Entering the Yes or No answer to any option can be done in several ways, any of
which is accepted by the system:
YES
NO
YE
N
Y
NON
NONE
The letters can be entered in either upper or lower case or in combination. However,
if any other letters are entered the message; SYNTAX ERR, TRY AGAIN appears.
2-8
PI 9.xx
I.
Chapter 2: Programming Requirements
General Rules for Entering Names
The following rules apply for entering names in the various PI features that require
such a definition. These naming rules are generally applicable for most options.
However, when special considerations are required these are mentioned along with
the option description.
NAMI NG RULES
1)
The number of characters allowed in names is determined according to the
option requirements.
2)
Control characters are ignored and should not be used.
3)
Names cannot have spaces or tab characters. Any character entered after an
inadvertent space or tab is ignored.
4)
For space/blank, enter underscore: "_".
5)
Upper and lower case letters can be used in any combination.
Letters are displayed exactly as entered.
6)
Direct Access Abbreviations may be used for names. While entering names,
DAA access is blocked.
7)
In Semitic systems, letters appear right to left.
8)
The German system includes all German ASCII characters.
9)
Each port/group/library has a set of two names, SHORT and FULL, which
appears on a KEYSET according to the following:
DSP32
SHORT name
DSP48
SHORT name or first 9 characters of full name
(the selection between Short and Full, defined systemwide as SFE, see page ...)
DSP80
FULL name
DSP160
FULL name
10)
To remove a defined name, use R.
Entering R displays the default BLANK.
2-9
Chapter 2: Programming Requirements
J.
PI 9.xx
Authorization Items
Not utilized in the Coral SL and DX Common Control
(Relevant to Coral systems with MSX Common Control)
{V8.3x}
The Authorization set is assigned system-wide and determines the feature
implementation capabilities or feature access authorization for a customer.
The software authorization unit (SAU) contains a sequential serial number for
software authorization. This authorization includes the basic software usage
authorization, system sizing and specific feature usage authorizations. All
authorization information is included in a special diskette which is part of the
software installation set.
Any attempt to exceed limited or maximum numbers, e.g. sizing, will result in an
error message.
In the Coral with DX Common Control and Coral SL, all sizes are set to
the maximum size range and all features are enabled.
When a feature is not authorized in the system, any attempt to access that feature
results in the following message:
(feature name) is not authorized in the system.
In the following pages all options that are controlled by the authorization system
are assigned “Authorization Limit” or “Authorization Control”.
Any feature authorization upgrade can be performed by updating the system with
the contents of the authorization diskette having a serial number matching the
existing authorization unit (up to 31 upgrades).
An upgrade may also be performed by a full system installation provided a new
software set is available.
Full system installations provide 31 additional upgrades.
2-10