Dpnss 1 Capabilities; Dpnss 1 Features - Nortel BCM50 Configuration Manual

Nortel bcm50: network guide
Table of Contents

Advertisement

DPNSS 1 capabilities

A single BCM node, acting as a terminating node on the network, supports the following
capabilities over DPNSS 1 lines:
Direct Dial Inward (DDI) for incoming calls.
Originating Line Identification (OLI) for incoming and outgoing calls:
— For incoming calls, the Calling Line Identification (CLI/CLID) information is displayed to
the user on telephones with line display. This must be configured in programming.
— For outgoing calls, the directory number of the originating party is sent out as OLI.
Terminal Line Identification (TLI) for incoming and outgoing calls. Referred to as Called Line
Identification.
Selective Line Redirect (SLR) and External Call Forward (ECF) implemented on calls
between DPNSS 1, and BRI/PRI, DASS2, and analog lines.
These remote access features are supported on DPNSS: DDI, line pool access code,
destination codes and remote page feature codes.
Keycodes are required to enable DPNSS 1.
DPNSS to Embark connections
DPNSS lines connected to an Embark switch perform call redirection/diversion using the Call
Forward feature to create a tandem link back to the switch. Since this is different from other
switches, you must select the type of switch DPNSS will be connecting to when you do module
programming.
Before you program Call Forwarding, ensure that:
Both real channels and virtual channels are provisioned.
Destination or line pool codes are programmed for the DPNSS to Embark link.
Also, during programming for Call Forward No Answer and Call Forward on Busy, when you
enter the Forward to: digits, the system does a validation check with the switch on the number.
(Configuration > Telephony > Sets > Active Sets > Line Access)

DPNSS 1 features

The following features are available and can be programmed over DPNSS lines:
"Three party service" on page 54
Diversion
("Using the diversion feature" on page
Redirection
("Using the Redirection feature" on page
"Executive intrusion" on page 57
Chapter 2 System telephony networking overview
55)
56)
Networking Configuration Guide
53

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents