new

Tuesday, October 23, 2012

Nokia Lumia FX800

 Nokia Lumia FX800 features a 4.65 inch ClearBlack AMOLED HD screen, a laser cut body and measures just 8 mm in thickness. It packs a 1.5 GHz dual core Snapdragon S4 processor and 1 GB of RAM, plus 16 GB of storage. These specs are very much like the ones of the Lumia 920 in real life, to which the designer added a 12 megapixel camera. The screen supports a 720p resolution and its design seems to be a combo between the Nokia 8910 Titanium, Nokia X7 and the N9 model from last year.
People have been criticizing a lot the user of plastic materials like polycarbonate for modern handsets. They want the styling of the iPhone 5 with glass and aluminum and I expect that future Windows Phone and Android devices will take that requirement into account. So, are you for titanium or plastic materials? Have your say in the comments below!

Monday, October 22, 2012

Avaya IP Office 500


How to set up Music on hold on the Avaya IP Office 500


I will show you how to easily configure Music on Hold on the Avaya IP Office 500 system. Music on hold allows you to fill the silence whilst a caller is waiting to speak to someone at your organisation. Relaxing music is often selected for this task but it can also be an opportunity for you to inform callers about special offers or upcoming events. In this article I will explain the options you can use to add music on hold to the system and how it can be used.



Music on Hold Source

You can choose from 3 different sources for music on hold on the Avaya IP Office 500 system. 

• WAV file

• External

• Tone



On the Manager application go to the System and select the Telephony tab. You then need to select the sub tab “Tones and Music”.



On this screen you can see the section Hold Music and the first option is to choose the System Source. If you drop down the option box you can see the three different options.



WAV File - Internal Music on hold


The system, by default, uses a file named holdmusic.wav

On the IP Office 500 the file should be a 8kHz, 16bit, mono recording. The length of the file should be a maximum length of 90 seconds. 

NOTE: This is different to previous versions of IP office where the maximum length of the holdmusic.wav file was 30 seconds.

The file can be stored on the systems memory card. 

How to upload a new WAV file to the system


If no holdmusic.wav file exists on the system when the IP office 500 system is switched on it will try to locate the file from a TFTP server running on the network. 

The Manager application acts as a TFTP server while it is running so it is possible to upload the holdmusic.wav file to the system by running the Manager application. You need to place the WAV file in the working directory of the Manager application.

After uploading the new WAV file to the system it will also place a copy of it on the memory card for future use.

External Music on Hold


You can buy a number of different MOH devices which allow you to easily change the music on hold. If you regularly record different information that you might use for marketing purposes it could well be worth investing in an external device which makes it easier to have different recordings available. 

How to set it up


Change the System Source to External and plug the device into the Audio Port on the back of the IP Office system. 

NOTE: The system will need to be rebooted to make this change.


Tone


If no WAV file or External source is available then the system will use a default tone for music on hold. You can also select this as a system source from the drop down list. The tone is simply a double beep which is not really very informative for people waiting on hold so I would recommend setting up one of the other options as soon as possible.


Alternate Sources

It is possible to set up three additional sources of Music on Hold. This would be useful if you wanted to be able to switch to other sources quickly. For instance if you had an event coming up and wanted to be able to switch over to a different recording for a short period before switching back to the standard recording. 

These three alternate sources can be either the name of a WAV file or the extension number of an analog extension port.

Some external music on hold devices have an adapter which allows them to be plugged into an extension.

The alternate sources need to be numbered 2 to 4 as number one is either the WAV file, External, or Tone.

You can enter the number in the box or if you don’t the manager application will automatically number it for you. 

Enter the name of the option in the name column and then in the source enter either the wav file or the extension number. They need to be entered in the correct format.

If using an alternate WAV file you need to enter the information in the format: 

WAV:musiconhold.wav

If using an extension number enter the information in the source column in the format: 

XTN:extension number.

See these examples:-



Once you’ve set up music on hold for the main system and alternate sources you should be aware that there are a couple of other places where you can configure a different music on hold source. 

These are for Incoming Call routes and Hunt Groups. You might want to have a different on hold music or recorded announcements for a specific number or hunt group and it is easy to go to these options and configure an alternate source.

Listen to current music on hold

Now you’ve spent all this time configuring the music on hold on your system you may well want to check what callers will be hearing. From any handset press *34 to listen to the current music on hold set on the system.

And that’s it. Hope you’ve found this article useful.

Sunday, October 21, 2012

Network Basics For Beginners


                 

Why use a Network?

Quite simply explained we use networks for communication between computers, sharing of data and peripherals. In the business world we use networks for ease of administration and to cut costs.
Sharing data example imagine an office with 5 secretaries working on 5 different computers, one requires a file from another computer in a non networked office this file would have to be written to a portable media then loaded onto the computer. In a networked office the file could be accessed via the network from a shared folder.

Sharing peripherals example the same office with 5 secretaries working on 5 different computers, in order to print their work each computer would need to have a printer attached. In a networked office you could have one shared printer, cutting costs.

What do you need?

A common language or protocol (TCP/IP IPX/SPX, APPLE TALK) is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints.
A common language or protocol (TCP/IP IPX/SPX, APPLE TALK) is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints.
Cabling BNC,Cat5, fibre optic
Hardware NIC(Network Interface Card), router, switch, hub, modem wireless access point.
Network Service (DNS, WINS, DHCP).

Network Hardware

Network Interface Card

A network card, network adapter, network interface card or NIC is a piece of computer hardware designed to allow computers to communicate over a computer network. It has a MAC address. Every network card has a unique 48-bit serial number called a MAC address, which is written to ROM carried on the card. Every computer on a network must have a card with a unique MAC address. The IEEE is responsible for assigning MAC addresses to the vendors of network interface cards. No two cards ever manufactured should share the same address.


Hubs

                          
An Ethernet hub or concentrator is a device for connecting multiple twisted pair or fibre optic Ethernet devices together, making them act as a single segment. It works at the physical layer of the OSI model, repeating the signal received at one port out each of the other ports (but not the original one). The device is thus a form of multiport repeater. Ethernet hubs are also responsible for forwarding a jam signal to all ports if it detects a collision. Hubs also often come with a BNC and/or AUI connector to allow connection to legacy 10BASE2 or 10BASE5 network segments. The availability of low-priced Ethernet switches has largely rendered hubs obsolete but they are still seen in older installations and more specialist applications.

Switches


A network switch or switch for short is a networking device that performs transparent bridging (connection of multiple network segments with forwarding based on MAC addresses) at full wire speed in hardware. As a frame comes into a switch, the switch saves the originating MAC address and the originating (hardware) port in the switch’s MAC address table. This table often uses content-addressable memory, so it is sometimes called the “CAM table”. The switch then selectively transmits the frame from specific ports based on the frame’s destination MAC address and previous entries in the MAC address table. If the destination MAC address is unknown, for instance, a broadcast address or (for simpler switches) a multicast address, the switch simply transmits the frame out of all of the connected interfaces except the incoming port. If the destination MAC address is known, the frame is forwarded only to the corresponding port in the MAC address table.

Hubs VS Switches

A hub, or repeater, is a fairly unsophisticated broadcast device. Any packet entering any port is broadcast out on every port and thus hubs do not manage any of the traffic that comes through their ports. Since every packet is constantly being sent out through every port, this results in packet collisions, which greatly impedes the smooth flow of traffic. A switch isolates ports, meaning that every received packet is sent out only to the port on which the target may be found (assuming the proper port can be found; if it is not, then the switch will broadcast the packet to all ports except the port the request originated from). Since the switch intelligently sends packets only where they need to go the performance of the network can be greatly increased.

Routers


A router is a computer networking device that forwards data packets across a network toward their destinations, through a process known as routing. A router acts as a junction between two or more networks to transfer data packets among them. A router is different from a switch. A switch connects devices to form a Local area network (LAN).
One easy illustration for the different functions of routers and switches is to think of switches as local streets, and the router as the junctions with the street signs. Each house on the local street has an address within a range on the street. In the same way, a switch connects various devices each with their own IP address(es) on a LAN. Routers connect networks together the way that on-ramps or major junctions connect streets to both main roads and motorways. The street signs at the junctions the (routing table) show which way the packets need to flow.

Wireless


Wireless Access Point (WAP) A wireless access point (AP) connects a group of wireless stations to an adjacent wired local area network (LAN). An access point is similar to an Ethernet hub, but instead of relaying LAN data only to other LAN stations, an access point can relay wireless data to all other compatible wireless devices as well as to a single (usually) connected LAN device, in most cases an Ethernet hub or switch, allowing wireless devices to communicate with any other device on the LAN.
Wireless Routers A wireless router integrates a wireless access point with an Ethernet switch and an Ethernet router. The integrated switch connects the integrated access point and the integrated Ethernet router internally, and allows for external wired Ethernet LAN devices to be connected as well as a (usually) single WAN device such as a cable modem or DSL modem. A wireless router advantageously allows all three devices (mainly the access point and router) to be configured through one central configuration utility, usually through an integrated web server. However one disadvantage is that one may not decouple the access point so that it may be used elsewhere.

Cables

Cable Terminology

10BASE2 (also known as cheapernet or thinnet) is a variant of Ethernet that uses thin coaxial cable. The 10 comes from the maximum transmission speed of 10 Mbit/s (millions of bits per second). The BASE stands for baseband signaling, and the 2 represents a rounded up shorthand for the maximum segment length of 185 metres (607 feet).
10BASE5 (also known as thicknet) is the original “full spec” variant of Ethernet cable. The 10 refers to its transmission speed of 10 Mbit/s. The BASE is short for baseband signalling as opposed to broadband, and the 5 stands for the maximum segment length of 500 metres.
10BASE-T is an implementation of Ethernet which allows stations to be attached via twisted pair cable. The name 10BASE-T is derived from several aspects of the physical medium. The 10 refers to the transmission speed of 10 Mbit/s. The BASE is short for baseband.The T comes from twisted pair, which is the type of cable that is used
100BASE-T is any of several Fast Ethernet 100 Mbit/s CSMA/CD standards for twisted pair cables, including: 100BASE-TX (100 Mbit/s over two-pair Cat5 or better cable). The segment length for a 100BASE-T cable is limited to 100 metres

Coaxial

Coaxial cable is an electrical cable consisting of a round conducting wire, surrounded by an insulating spacer, surrounded by a cylindrical conducting sheath, usually surrounded by a final insulating layer. It is used as a high-frequency transmission line to carry a high-frequency or broadband signal.
BNC connectors were commonly used on 10base2 thin Ethernet networks, both on cable interconnections and network cards, though these have largely been replaced by newer Ethernet devices whose wiring does not use coaxial cable.

CAT 5


Category 5 cable, commonly known as Cat 5, is an unshielded twisted pair cable type designed for high signal integrity. Category 5 has been superseded by the Category 5e specification. This type of cable is often used in structured cabling for computer networks such as Gigabit Ethernet, although they are also used to carry many other signals such as basic voice services, token ring.
Category 5 cable included four twisted pairs in a single cable jacket. It was most commonly used for 100 Mbit/s networks, such as 100BASE-TX Ethernet
Cat5 cable uses an RJ-45 (Registered Jack-45) connector at each end of the cable with a fixed wiring scheme. The ends are then crimped on to the cable

Wiring Scheme


Patch or straight through cables have Wiring scheme 1 at both ends of the cable and are used to connect computers to network wall sockets or hubs.
Crossover cables have Wiring scheme 1 at one end of the cable and Wiring scheme 2 at the other. These cables are used to connect network hardware together e.g. PC to PC, hub to hub.

Protocols

A protocol (TCP/IP IPX/SPX, APPLE TALK) is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. Sending and receiving systems need to use the same protocol unless a gateway service sits between networks and translates from one to the other.
Most protocols specify one or more of the following properties:
  • Detection of the underlying physical connection (wired or wireless), or the existence of the other endpoint or node
  • Handshaking
  • Negotiation of various connection characteristics
  • How to start and end a message
  • How to format a message
  • What to do with corrupted or improperly formatted messages (error correction)
  • How to detect unexpected loss of the connection, and what to do next
  • Termination of the session or connectio

NetBIOS

NetBIOS is an acronym for Network Basic Input/Output System. The NetBIOS API allows applications on separate computers to communicate over a local area network. NetBIOS must be enabled for Windows File and Print Sharing to work.
NetBIOS provides three distinct services:
  • Name service for name registration and resolution
  • Session service for connection-oriented communication
  • Datagram distribution service for connectionless communication.
Name service In order to start Sessions or distribute Datagrams, an application must register its NetBIOS name using the Name service. NetBIOS names are 16 bytes in length
Session service Session mode lets two computers establish a connection for a “conversation,” allows larger messages to be handled, and provides error detection and recovery. In NBT, the session service runs on TCP port 139.
Datagram distribution service Datagram mode is “connectionless”. Since each message is sent independently, they must be smaller; the application becomes responsible for error detection and recovery. In NBT, the datagram service runs on UDP port 138.

IPX/SPX (NWLINK)

Internetwork Packet Exchange (IPX) is the OSI-model Network layer protocol in the IPX/SPX protocol stack. The IPX/SPX protocol stack is supported by Novell’s NetWare network operating system. Because of Netware’s popularity through the late 1980s into the mid 1990s, IPX became a popular internetworking protocol. Novell derived IPX from Xerox Network Services’ IDP protocol. IPX usage is in general decline as the boom of the Internet has made TCP/IP nearly universal. Computers and networks can run multiple network protocols, so almost all IPX sites will be running TCP/IP as well to allow for Internet connectivity. It is also now possible to run Novell products without IPX, as they have supported both IPX and TCP/IP since NetWare reached version 5.
Sequenced Packet Exchange (SPX) is a transport layer protocol (layer 4 of the OSI Model) used in Novell Netware networks. The SPX layer sits on top of the IPX layer (layer 3 – the network layer) and provides connection-oriented services between two nodes on the network. SPX is used primarily by client/server applications.
NWLink is a IPX/SPX-compatible protocol developed by Microsoft and used in its Windows NT product line.NWLink is Microsoft’s version of Novell’s IPX/SPX Protocol. The Microsoft version of NWLink includes the same level of functionality as the Novell Protocol. NWLink includes a tool for resolving NetBIOS names.NWLink packages data to be compatible with client/server services on NetWare Networks. However, NWLink does not provide access to NetWare File and Print Services. To access the File and Print Services the Client Service for NetWare needs to be installed.

AppleTalk

AppleTalk is a suite of protocols developed by Apple Computer for computer networking. It was included in the original Macintosh (1984) and is now used less by Apple in favour of TCP/IP networking.
AppleTalk contains two protocols aimed at making the system completely self-configuring. The AppleTalk address resolution protocol (AARP) allowed AppleTalk hosts to automatically generate their own network addresses, and the Name Binding Protocol (NBP) was essentially a dynamic DNS system which mapped network addresses to user-readable names.
For interoperability Microsoft maintains the file services for Macintosh and the print services for Macintosh

TCP/IP


The Internet protocol suite is the set of communications protocols that implement the protocol stack on which the Internet and most commercial networks run. It is sometimes called the TCP/IP protocol suite, after the two most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were also the first two defined.The Internet protocol suite like many protocol suites can be viewed as a set of layers, each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted.The OSI model describes a fixed, seven layer stack for networking protocols. Comparisons between the OSI model and TCP/IP can give further insight into the significance of the components of the IP suite, but can also cause confusion, as TCP/IP consists of only 4 layers.
The four layers in the DoD model, from bottom to top, are:
  • The Network Access Layer is responsible for delivering data over the particular hardware media in use. Different protocols are selected from this layer, depending on the type of physical network.
  • The Internet Layer is responsible for delivering data across a series of different physical networks that interconnect a source and destination machine. Routing protocols are most closely associated with this layer, as is the IP Protocol, the Internet’s fundamental protocol.
  • The Host-to-Host Layer handles connection rendezvous, flow control, retransmission of lost data, and other generic data flow management. The mutually exclusive TCP and UDP protocols are this layer’s most important members.
  • The Process Layer contains protocols that implement user-level functions, such as mail delivery, file transfer and remote login.

Network Services

DNS (Domain Naming System)

The Domain Name System (DNS) stores and associates many types of information with domain names, but most importantly, it translates domain names (computer hostnames) to IP addresses. It also lists mail exchange servers accepting e-mail for each domain. In providing a worldwide keyword-based redirection service, DNS is an essential component of contemporary Internet use.
The DNS pre-eminently makes it possible to attach easy-to-remember domain names (such as “es-net.co.uk”) to hard-to-remember IP addresses (such as 270.146.131.206). People take advantage of this when they recite URLs and e-mail addresses.

WINS (Windows Internet Naming Service)

Windows Internet Naming Service (WINS) is Microsoft’s implementation of NetBIOS Name Server (NBNS) on Windows, a name server and service for NetBIOS computer names. Effectively, it is to NetBIOS names what DNS is to domain names – a central mapping of host names to network addresses. However, the mappings have always been dynamically updated (e.g. at workstation boot) so that when a client needs to contact another computer on the network it can get its up-to-date DHCP allocated address. Networks normally have more than one WINS server and each WINS server should be in push pull replication; the favoured replication model is the hub and spoke, thus the WINS design is not central but distributed. Each WINS server holds a full copy of every other related WINS system’s records. There is no hierarchy in WINS (unlike DNS), but like DNS its database can be queried for the address to contact rather than broadcasting a request for which address to contact. The system therefore reduces broadcast traffic on the network, however replication traffic can add to WAN / LAN traffic.

DHCP (Dynamic Host Configuration Protocol)

The Dynamic Host Configuration Protocol (DHCP) automates the assignment of IP addresses, subnet masks, default routers, and other IP parameters. The assignment usually occurs when the DHCP configured machine boots up or regains connectivity to the network. The DHCP client sends out a query requesting a response from a DHCP server on the locally attached network. The DHCP server then replies to the client with its assigned IP address, subnet mask, DNS server and default gateway information.The assignment of the IP address usually expires after a predetermined period of time, at which point the DHCP client and server renegotiate a new IP address from the server’s predefined pool of addresses. Configuring firewall rules to accommodate access from machines who receive their IP addresses via DHCP is therefore more difficult because the remote IP address will vary from time to time. Administrators must usually allow access to the entire remote DHCP subnet for a particular TCP/UDP port. Most home routers and firewalls are configured in the factory to be DHCP servers for a home network. ISPs (Internet Service Providers) generally use DHCP to assign clients individual IP addresses.DHCP is a broadcast-based protocol. As with other types of broadcast traffic, it does not cross a router.

APIPA (Automatic Private IP Addressing)

If computers are unable to pick an address up from a DHCP server they use Automatic Private IP Addressing (APIPA). This means the computer will assign itself a random address between 169.254.0.1 – 169.254.254.254/16, allowing it to communicate with other clients who are also using APIPA.
Automatic Private IP Addressing (APIPA), this allows unknowledgeable users to connect computers, networked printers, and other items together and expect them to work. Without Zeroconf or something similar, a knowledgeable user must either set up special servers, like DHCP and DNS, or set up each computer by hand.

Networks

LAN :


A Local Area Network (LAN) is a computer network covering a small local area, like a home, office, or small group of buildings such as a home, office, or college. Current LANs are most likely to be based on switched Ethernet or Wi-Fi technology running at 10, 100 or 1,000 Mbit/s.The defining characteristics of LANs in contrast to WANs (wide area networks) are: their much higher data rates; smaller geographic range; and that they do not require leased telecommunication lines.
PAN :

A Personal Area Network (PAN) is a computer network used for communication among computer devices (including telephones and personal digital assistants) close to one person. The reach of a PAN is typically a few metres and may use Bluetooth, wireless or USB for connection.
WAN :

A Wide Area Network (WAN) is a computer network covering a wide geographical area, involving a vast array of computers. This is different from personal area networks (PANs), metropolitan area networks (MANs) or local area networks (LANs) that are usually limited to a room, building or campus. The most well-known example of a WAN is the Internet. WANs are used to connect local area networks (LANs) together, so that users and computers in one location can communicate with users and computers in other locations.

Saturday, October 20, 2012

Siemens / HiPath 3550


Siemens / HiPath 3550


Highlights

Max Digital Users: 72
Max Analog Users: 96
Max IP Users: 192
  • Support for Remote Teleworkers (Voice & Data) Over IP
  • Support for both Analog CO Trunks and BRI Trunks with Caller ID
  • Support for One T1/PRI Circuit
  • Supports CorNet IP
  • Supports CorNet Digital Networking (as an End-node)
  • Two Form Factors – 19” Rack Mount and Wall Mount Cabinets
  • Supports Three HiPath HG 1500 Modules
  • Integrated voicemail
    (max. number of boxes) - 24 
  • Dimensions - 450 x 460 x 200
  •  Weight - ca. 8kg 
  •  Case color - warm gray
Telephony Features
As a software suite, HiPath ComScendo provides both the realtime IP system, HiPath 3000, as well as the telephones, with the most comprehensive array of voice communication services. And all of this regardless of whether it is used via IP, TDM telephones or PC clients.

Integrated Voice Mail (EVM)
The integrated voice mail module for the central boards of the HiPath 3500 gives the system an integrated voice mail application.

IP-Telephony / IP-Networking
The use of IP telephony/IP networking between HiPath communications platforms produces several advantages for our customers:
- Gradual or complete migration of voice communication to the IP network, while maintaining the known level of reliability, user interfaces, and features
- HiPath Feature Access (HFA) makes all functions available to IP workpoints, which the optiPoint telephones can use in the traditional environment
- Convergence of communication networks for voice and data over several locations
- Savings on expensive leased lines not only for telephony
- Reduced operating costs through purely IP based communication with Internet Telephony Service Providers
- Standard contact partner for the infrastructure, etc.
- Significant cost savings by using a single infrastructure for data and voice
- Additional savings by using voice compression 

The HiPath 3000 communication platforms are networked using the customer's existing LAN infrastructure with the IP gateway HG 1500 V3.0.

Wednesday, October 17, 2012

HTC J Butterfly preview


A Stunning 5-inch 1080p phone for Japan

HTC J Butterfly
The rumors were true: HTC has been working on a new flagship phone with a 5-inch 1080p display, and we got to see it in Tokyo today. It's the HTC J Butterfly, and it's set for a release this December on AU / KDDI. A follow-up to the previous HTC J, the Butterfly uses the same red and black color scheme and Rhyme-inspired skin, though this time it's running on top of Android 4.1 Jelly Bean. Inside there's a quad-core 1.5GHz Snapdragon S4 Pro APQ8064 processor, 2GB of RAM, and an 8-megapixel camera with an f/2.0 lens.
The real attraction, though, is the 5-inch full HD Super LCD 3 screen — it's truly a sight to behold. The Super LCD 2 seen in HTC's previous flagship One X was arguably the best panel on the market, but we think its successor is the new champion. Color reproduction is excellent, the 440 ppi resolution is astonishing, and the screen's slightly curved edges make the image look like it's melting off the side of the phone. It doesn't feel overbearing in the hands, either; the phone's 9.1mm thinness and slim bezel make it surprisingly compact, and we found it was easily pocketable. The J Butterfly's 2,020mAh battery is above average in capacity, though we're interested to find out how it'll keep up with powering so many pixels throughout the course of a day.










Panasonic PBX Installation TEA308





The Panasonic KX-TEA 308 is supplied with a full set of documentation that includes Getting Started Guide, Installation Manual, User Guide, Programming Tables and Feature Guide. The notes on this web page are not intended to be a complete installation manual but we hope they will give you a feel for how easy the system is to install.   We will do our best to keep the information up to date but mistakes can happen.  If you see any errors, or would like to make suggestions for improvement, please let us know. Remember - the Panasonic documentation supplied with the system is the only authorised installation guide.

1. System  Construction
The Panasonic KX-TEA 308 system has capacity for 8 extensions and 3 exchange lines. It is capable of supporting Panasonic proprietary phones (Panasonic KX-T7750, 7720, 7730, 7735) and / or single line devices such as ordinary phones, fax and data modems.  This is an excellent system but it is not expandable.  If you are going to require more than 3 lines and 8 extensions we suggest you look at the Panasonic KX-TES824 or the NEC XN120.

2. Wiring the extensions sockets to line jack units (telephone wall sockets).
The initial system is supplied with eight plug-ended extension cords that plug directly into eight sockets (numbered 01 to 08) located on top of the side of the control unit..  The loose end of the cord (no plug) must be terminated to telephone sockets.
The wiring colour code is as follows:
Black  to  pin 3 on socket
Red to pin 5 on socket
Green to 2 on socket
Yellow to  4 on socket
Note:
Pins 2 and 5 are the Voice pair
Pins 3 and 4 are the Data pair
A Panasonic 7730 ( or the earlier 7735) can be used to configure the system if be connected to the first extension jack (marked jack 01).  All proprietary phones ( Panasonic7750, 7720, 7730, 7735,  7050, 7020, 7130) must be connected via a secondary wall socket (2/3A).  All four wires (as shown above) must be connected. 
Ordinary phones can be connected to extension jacks 02 to 08.  For ordinary phones only connect two wires to the telephone sockets,  red to pin 5, and green to pin 2.  These must be connected to a master line jack unit (2/2A). DO NOT connect wires to pins 3 and 4.  You can identify a master socket because you'll see a fairly large capacitor (usually yellow) wired onto the circuit.
Note: Wiring from the control unit to the wall sockets is normally via an MDF (distribution box). We supply a wide range of installation material.

Paralleled connection

An ordinary extension (phone, answering machine etc) can be connected in parallel to a proprietary phone. When an incoming call is received both phones will ring and either can answer the call.
To add an ordinary extension, in parallel to the Proprietary phone, you simply run a lead from pins 2 and 5 of the secondary socket to pins 2 and 5 of the master socket where the ordinary extension will be connected.
3.  Wiring to the exchange lines
In addition to the eight extension cords already mentioned, the system is supplied with three plug-ended extension cords that plug directly into three sockets (numbered CO1 to CO3) located on the top of the system.  The loose end of the cord (no plug) must be terminated to the exchange lines.  If your exchange lines are terminated on a wall socket, you will wire the two wires to pins 2 and 5.

4.  Programming
The Getting Started Guide gives clear instructions as to basic programming  via a KX-T7730 system-phone.  To enter the program mode with a KX-T7730 simply press the programme button followed by * # and your password.  However, one of the interesting aspects of this system is the ability to use a PC to configure the system. Windows based software is supplied with the system.  You simply load the software and connect to your PC via a USB port. The USB lead is not supplied with the system.
Programming Tips...
Auto Attendant message:-
To activate the auto-attendant feature, use your programming software, click on No. 7 (DISA), then 1. (auto-attendant), Tick the box that says 'with auto-attendant. 
To programme your message...Press the program key (using a KX-T7730 or 7735 system-phone), press store key, go off hook, press 9, press 1 (to record) press 1 to 8 (for auto-attendant message number 1 to 8) ,record the message, press store key, message is played back, press program key, go on hook. (ref to page 130 of the User Manual). '
Now you have to tell system what message you want the caller to hear...Use your programming software, click on No. 2 (C.O.), then No. 1 (Line Mode), Under Type click Disa...then in the detail box select which message you want the caller to hear...often you will only need one message, i.e. press one for sales, 2 for technical etc.
Idle Extension Hunting:-
Setting up your extension groups is easy and well documented.  Once set up, the incoming call will 'hunt' for an idle extension within the group.  We've had a few cases where customers have said group hunting works fine with internal calls but external calls fail to hunt within the group.  
To get external calls to hunt correctly the 'line' must be configured to direct the call to 'one' extension that is within the group.  This is called DIL (Direct in Line) mode.  To accomplish this you use your Maintenance Console software...click on CO...settings, and you will see that the first column is titled 'mode'.  Click on the word 'normal' and change to 'DIL'.  Assign any extension number that is within the hunt group.  Presto...the incoming call will now hunt for an idle extension within the group.  If you have any  problems just give us a call.

External Call Diversion:-
Traditional analogue lines cannot reliably support trunk to trunk call forwarding. If it is necessary to divert calls to an external number, such as a mobile or home number, we suggest using the 'BT Divert Calling Feature'. When you order your lines ask for 'Business Divert Lines'...the last we heard BT did not charge extra when these lines were ordered.  However, if you already have lines they may charge £1.75 per month, per line.  If you have this feature, you can select the line and then key in a code to divert calls...i.e. *21*(number to divert to)#.  To turn off the diversion you simply access the line and key #21# .  Be sure to check with your service provider ( BT etc.) for current availability and prices.


Important ... A CE stamp is not proof that the system was manufactured for specific use in the United Kingdom but this can be determined by looking at the product label.  Systems marked KX-TEA308'E' are for the U.K.  If it is not marked with an E, you may have problems with connection to the U.K. network.  Also...the notes on this page may not apply. The Panasonic systems we supply are all E marked and supplied with the standard Panasonic U.K. 12 month warranty.  We do not supply grey imports.

Tuesday, October 16, 2012

Review: Nokia DC-16 charger


            As more smartphones are designed with non-replaceable batteries, the potential of getting through a day of heavy use by carrying a spare battery is going away. This has in turn created a market in external batteries. For instance, the first phone with a non-replaceable battery was the iPhone, which has an array of battery jackets. However, these are fixed to just one phone design. The alternative is external batteries that connect via cable. It's a less stylish solution, but guarantees that any of your devices can be topped up. That's where Nokia's new DC-16 external battery steps in, and we've been putting it to the test in this review.

The DC-16 is Nokia's latest external battery, and as you can see from the box below, it has been designed to complement the Lumia range of phones with the distinctive, Cyan, Magenta, Black, and White colour options. However, it will work with any device that charges via Micro USB.
DC-16 Box
DC-16 Box
The box simply contains the DC-16, the CA-189CD USB to Micro USB charging and data cable, plus user guide and warranty. The charging cable is an update of Nokia's CA-101D short USB cable which has shipped with devices over the last two years. If you're familiar with that cable, the CA-189CD is less than two inches longer, and the socket casings are made from a rubbery material which improves grip, but attracts dust like a magnet. As mentioned above, the DC-16 is available in the four Lumia colours, and the supplied cable will be of a matching colour.
Both ends of the DC-16
Both ends of the DC-16
The DC-16 follows a very simplistic design, and can be mathematically described as a squircle prism; i.e. the shape used in Symbian Anna iconography. At one end, there's a Type-A USB port from which other devices are charged (i.e. the output); the other end comprises of a charge level indicator and a Micro USB port with which the DC-16 is charged (i.e. the input). This simple design is actually quite ingenious as the device can both charge and be charged with the same cable, just by reversing the ends at which they're connected, as shown in the configurations below.
Configuration - charging the DC-16
Configuration - charging the DC-16
 Configuration - DC-16 to charge another device
Configuration - DC-16 to charge another device
The DC-16's capacity is rated at 2200mAh, which is equivalent to less than two full charges of most smartphone batteries; it is also guaranteed for 500 charge cycles. Nokia say the output current is 950mA, which is quite high for a battery of this class. Anecdotally, it can quickly recharge our Lumia 800 to full (from empty). Time taken to charge the DC-16 itself will vary depending on your USB charger. If you're only charging from a PC, expect a long wait though. From a 1A wall charger, charging from flat can take up to 3 hours. While charging, the four green LEDs illuminate, with each going from flashing to constant in sequence to indicate the current charge level. For example, three constant lights with one flashing means the charge is between 75% and 100%.
Look carefully at the indicator end, and you'll find an embossed battery icon beneath the Micro USB port. This pinpoints a button, concealed by a flexible surface, which (while not recharging) switches on the LEDs to indicate the current charge level; e.g. four LEDs means the charge level is between 75% and 100%, and so on. The LEDs only stay on for 10 seconds so as to not waste energy.
DC-16 indicator LEDs
DC-16 indicator LEDs
The DC-16 has a trick up its sleeve ­– you can connect the charger in-line (in series) with your phone. In this configuration, the battery will charge up first, and then allow current to flow and recharge the phone. I love this, but there are a few caveats to keep in mind, none of which are deal breakers. Firstly, the charge level on the DC-16 can repeatedly drop just enough to make it shut off current to the phone, and then switch on again, and off again, etc. If your phone is configured to emit a sound when it begins charging, this repetition can become annoying. Even so, if you're on the road and only have a single USB port to charge from, this flexibility is ideal, as long as you put your phone on silent! Secondly, if you're trickle charging from your PC, don't expect to be able to transfer data via the DC-16 – there's no through-data connection. Then again, in this configuration you already have two charging cables, so just use two separate USB ports on your computer instead.
'Daisy chaining' the DC-16 with a Lumia 800
'Daisy chaining' the DC-16 with a Lumia 800
The DC-16 retails for £30, or slightly less if you shop around carefully. It's difficult not to compare this to the Proporta TurboChargers, all of which offer higher capacities and a better ratio of capacity to cost. Also, Proporta's TurboCharger 7000 has more than double the potential output current, allowing for faster charging, depending on device. However, the strength of the DC-16, and why I would buy one for myself, is that it can easily slip in a pocket beside your phone. This compactness, combined with its clever design, make for a product I enjoy having in my tech-kit.