AU607622B2 - An exchange communications device - Google Patents

An exchange communications device Download PDF

Info

Publication number
AU607622B2
AU607622B2 AU37081/89A AU3708189A AU607622B2 AU 607622 B2 AU607622 B2 AU 607622B2 AU 37081/89 A AU37081/89 A AU 37081/89A AU 3708189 A AU3708189 A AU 3708189A AU 607622 B2 AU607622 B2 AU 607622B2
Authority
AU
Australia
Prior art keywords
alarm
port
communications device
exchange
exchange communications
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU37081/89A
Other versions
AU3708189A (en
Inventor
John Franchina
Eugene Hedemann
Adrian Millard
Simon Uren
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telstra Corp Ltd
Original Assignee
Australian Telecommunications Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Australian Telecommunications Corp filed Critical Australian Telecommunications Corp
Priority to AU37081/89A priority Critical patent/AU607622B2/en
Publication of AU3708189A publication Critical patent/AU3708189A/en
Application granted granted Critical
Publication of AU607622B2 publication Critical patent/AU607622B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/36Statistical metering, e.g. recording occasions when traffic exceeds capacity of trunks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/08Indicating faults in circuits or apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q1/00Details of selecting apparatus or arrangements
    • H04Q1/18Electrical details
    • H04Q1/20Testing circuits or apparatus; Circuits or apparatus for detecting, indicating, or signalling faults or troubles
    • H04Q1/22Automatic arrangements
    • H04Q1/26Automatic arrangements for signalling trouble in unoccupied sub-exchanges
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/58Arrangements providing connection between main exchange and sub-exchange or satellite
    • H04Q3/62Arrangements providing connection between main exchange and sub-exchange or satellite for connecting to private branch exchanges
    • H04Q3/625Arrangements in the private branch exchange

Description

(a member of the firm of DAVIES COLLISON for and on behalf of the Applicant).
To: THE COMMISSIONER OF PATENTS
I
Davies Collison. Melbourne and Canberra.
I I.
OF
AAS
COMMONWEALTH
PATENT ACT 1952 COMPLETE SPECIFICATION
(ORIGINAL)
FOR OFFICE USE CLASS INT. CLASS Application Number: Lodged: Complete Specification Lodged: Accepted: Published: Priority: Related Art-: of a 00 a *0 0 0 0 a a oa 0 0 9 M 04 0 4 o 0 *0 0 o NAME OF APPLICANT: ADDRESS OF APPLICANT: NAME(S) OF INVENTOR(S) ADDRESS FOR SERVICE: CorpOo,,.ho- Australian Telecommunications -ewmissjcn= 199 William Street, Melbourne, in the State of Victoria, Commonwealth of Australia.
010244 270689 DAVIES COLLISON, Patent Attorneys 1 Little Collins Street, Melbourne, 3000.
COMPLETE SPECIFICATION FOR THE. INVENTION ENTITLED: "An Exchange Communications Device" The following statement is a full description of this invention, including the best method of performing it known to us
I
I
I
-I-
Intellectual Property and Information Branch.
901026,dbwdot.031,1Mcl1i r
I
I
1 0 0 o o« 0 0 0 0 O o e e- 004 0 0 0 0 0004 0 0 o0 0 Qe 9 0 00 0 00 O 00 0 00 0 00 0 0 0 0 0 0 C S1 C
SCC
"AN EXCHANGE COMMUNICATIONS DEVICE" The present invention relates to an exchange communications device which is particularly, but not exclusively, adapted for use with private automatic branch exchanges (PABXs).
With the increase in the use of and complexity of PABXs, the level of maintenance which is required to enable a PABX to operate efficiently has also increased. The extensive hardware and operational features associated with a PABX makes the PABX subject to various forms of hardware and software failure. Also to meet various user requirements a PABX is configured with a considerable amount of flexibility which enables a user to dictate how the PABX will perform particular functions, such d
B
I1
I
3 as how many extensions can be operated therefrom, which extensions are to be placed in a call pick-up group and how certain executive facilities should operate e.g. forwarding of calls directed to a busy extension. Similar comments apply in respect of other types of telecommunications exchanges, such as an exchange which has a number of computer terminals connected thereto or one which has a combination of computer terminals and telephone extensions connected thereto.
Maintenance of a PABX is normally performed **Cw by accessing a PABX via an input/output maintenance .0 port and a PABX may have more than one maintenance 0 0 0o o port to enable access thereto. A person accessing a 0006 PABX via a maintenance pcrt is normally able to a Go analyse hardware and software failures which may have O0 0 a I 0 o occurred in the PABX and, either partially or fully, a restore the PABX to normal operation. Some of the oo.o hardware failures, however, may require particular 0 2" components to be replaced. Most of the corrective maintenance required to be performed on a PABX, .0 however, can be completed by merely accessing the PABX via a maintenance port. Maintenance of the type required to alter or establish certain functional .c parameters of a PABX is also performed by accessing cc Cthe PABX via a maintenance port and thereby modifying C I data stored in the PABX so that it operates in a ii desired manner.
Performing maintenance on a PABX via a maintenance port is usually achieved using a device known as an administration terminal which is connectable to the maintenance port of a PABX and of which there are generally two types. A maintenance s
I.
4 administration terminal (MAT) is the type used by service personnel who are specifically employed to carry out maintenance on PABXs and enables the service personnel to perform a wide variety of maintenance functions. A customer administration terminal (CAT) is the type generally sold to owners of PABXs and enables the user to perform only limited maintenance on a PABX, such as deleting extensions, changing call pick-up groups and changing executive facilities, whereas operations such as enabling an extension to use International Subscriber Dialing (ISD) are prohibited. A problem associated with such
C'"
l I administration terminals is that they need to be *4 directly connected to a PABX and therefore operated wherever the PABX is located. A service person, who is required to perform most of the maintenance on a PABX, must travel to and from the location of the PABX, which involves considerable cost and does not enable supervision of the service person. It is therefore desirable to provide means which enables maintenance to be performed on an exchange from a remote location via a telecommunications link.
remote location via a telecommunications link.
4 4r It C C cC c C( Also if a number of different administration terminals are used to perform maintenance on a PABX, as is generally the case, there is considerable difficulty involved with trying to formulate a complete record of all maintenance performed on a PABX. There is also the additional problem associated with security of PABXs as most exchanges do not incorporate security features and any person possessing an administration terminal or similar device would be able to gain uncontested access to a PABX and cause the owner of the exchange considerable inconvenience
I
N by rendering the exchange inoperable for a substantial period of time. Most PABXs also include ports which output alarm and traffic information and generally this information remains unused. Hence, it is also desirable to provide some means for accessing, processing and storing this information, if required, for use at a later date and, in particular, in relation to the alarm information it would be advantageous to provide means which acts on the information accordingly, to the extent that a servicing body, or other party, may be contacted via an established telecommunications system.
10 In accordance with the present invention there is provided an exchange 'communications device, comprising: of. a first port for inputting maintenance data from and outputting maintenance data to an exchange maintenance port of an exchange; a second port for inputting maintenance data from and outputting o 15 maintenance data to a remote device, via a modem; and means which monitors data inputted on said second port and if said inputted data constitutes information which indicates that a user wishes to gain access to s said communications device, determines if said user is an authorised user and if 0 o" said means determines said user is an authorised user, enables access to said I communications device and thereafter enables maintenance data from said 0 exchange or said remote device to be transmitted therebetween via said first and second ports and if said means determines the user is not an authorised user, said means inhibits said user from gaining access to said exchange communications i device; said means including memory for storing data transmitted between said first and second ports in order to provide a record of maintenance performed on said exchange via said maintenance port.
I__
i 1 ei' I n L1 S 901126,dblwmpeA20lcIlspe5 L ;~i I 6 said means including mem -onr- toring data Strjnsi~-t-e~i eween said first and second ports.
Preferably said exchange communications device further includes a third port for inputting and outputting data from/an administration terminal and said means consecutivelyaccesses said second and third ports and stores datakreceied on said second and third ports until data reeoved on one of said second and third ports constitutes information which causes said means to perform an operation corresponding to said information, and on performing S° said operation said means resumes consecutive o° accessing of said second and third ports.
000 :0 Preferably said exchange communications device further includes a fourth port for inputting 0 o0 alarm data from an alarm circuit or an alarm port of said exchange and said means consecutively accesses o and stores data received on said second, third and *0 fourth ports and when data received on said fourth port constitutes alarm information, said means 0 processes said alarm information to determine if said alarm information must be stored in said means, if an alarm flag must be set and if an alarm message must S be outputted from said second port.
Preferably said exchange communications device further includes a fifth port for inputting traffic data from a traffic port of said exchange and said means consecutively accesses and stores data received on said second, third, fourth and fifth ports and when data received on said fifth port constitutes traffic information, said means converts
LS
i I 7 said traffic information to a predetermined format from which a user may determine aspects of traffic handled by said exchange and stores converted traffic information, said means enabling authorised users to access said stored traffic information.
Preferably said means communicates with a terminal of a user to determine if said user is an authorised user.
Preferably said exchange communications device includes said modem.
l In accordance with the present invention there is also provided/an exchange ennected= to and *o in co-b--inaTlo wit-h an exchange communications device as described above.
Preferred embodiments of the present invention will now be described, by way of example 4 only, with reference to the accompanying drawings, wherein: Figure 1 is a block diagram of a first preferred embodiment of an exchange communications device connected to a telecommunications exchange; Figure 2 is a second preferred embodiment of an exchange communications device connected to a exchange; Figure 3 is a more detailed block diagram of the device of Figure 2; Figure 4 is a flow diagram of an operating routine of-the device of Figure 2; Figure 5 is a flow diagram of a sub-routine
I.
LS 1 iL PROCESS CHARACTER; Figure 6 is a flow diagram of a sub-routine PROCESS COMMAND; Figure 7 is a block diagram of an alarm card of the device of Figure 2; IFigure 8 is a flow diagram of a sub-routine PROCESS ALARM; Figure 9 is a flow diagram of a sub-routine PROCESS CALL RECORD; and Figure 10 is a flow diagram of a sub-routine PROCESS TIMS COMMAND.
A PABX communications device 2, as shown in r, 6 0 °oo Figure 1 includes a processing circuit 4, a memory circuit 6 which is coupled to and may be accessed by the processing circuit 4, via a bus 8, and a modem which is connected to the bus 8 and is connectable to a remote telephone exchange 12 of a telecommunications system. The device 2 also includes input/output ports 14, 16 and 18 connected o to the bus 8 and which enable the device 2 to communicate with peripheral devices. The processing circuit 4 includes a microprocessor and controls all of the functions of the device 2 according to software stored in the memory circuit 6 and information received from the ports 14, 16 and 18 and the modem 10. The modem 10 is controlled by the processing circuit 4 and enables the device to ei kcommunicate with a variety of other devices at remote locations which are accessible via a common telecommunications system. The modem 10 is configured so that it is able to receive and transmit data at various baud rates. The memory circuit 6 includes ROM and RAM chips and a 3.5 inch floppy disc
I-
9 drive. The ports 14, 16 and 18 are serial ports and the first two ports 14 and 16 are designated for connection to a CAT 20 and a MAT 22, respectively, and the third port 18 is designated for connection to a maintenance port 24 of a PABX 26, as shown in Figure 1.
00 o 0s 0'0 0 0 COO 0 00 4C p (00 4' O CO 0 0
II
0000 o I O oPi It I CL C The device 2 is preferably provided in a sealed casing 28 which only provides connections to the administration terminals 20 or 22, a power plug, the maintenance port 24, and a telecommunications plug for the output modem interface 30, with at least one opening to enable insertion and removal of a floppy disc in the disk drive of the memory circuit 6. The device 2 constitutes a relatively secure unit which is accessible only via the ports 14 and 16 and the modem To perform maintenance on the PABX 26 a user must first gain access to the device 2 using an administration terminal 20 or 22 at the location of the PABX 26 or preferably using a remote terminal which communicates with the device 2 via the exchange 12. The CATs 20 sold to owners of PABXs and the MATs 22 distributed to service personnel are now altered and are only able to communicate with the communication device 2 and cannot gain direct access to a maintenance port 24 of a PABX 26. The device 2 enables access thereto only after an administration terminal 20 or 22 or a remote terminal connected via the exchange 12 has supplied information to the device 2 which indicates the user associated therewith is an authorised user. On gaining access to the device 2, the user may utilise the device 2 to i i t ~zc establish a connection between the user terminal and the maintenance port 24 so that maintenance may be performed on the PABX 26. Data transmitted between the maintenance port 24 and an administration terminal 20 and 22 or a remote termial is stored by the device 2 in the memory circuit 6 so as to form part of an audit trail file which comprises a record of all data transactions made between the PABX 26 and an external terminal coupled to the device 2.
A second embodiment of device 2 is illustrated in Figure 2 and is the same as the 0 00 embodiment illustrated in Figure 1, as indicated by the similar reference numerals, except this o. embodiment includes further circuitry and software to a e cn perform alarm functions and retrieve and utilise traffic information in relation to the network associated with the PABX 26. In addition to the 0. device 2 of Figure 1, the processing circuit 4 o o. includes a separate microprocessor and associated 0 circuitry to process alarm signals received from o"o peripheral devices other than the PABX 26, the memory circuit includes further ROM and RAM chips which are used in processing the alarm signals and further input/output ports 32, 34, 36, 38 and 39 are o included. The fourth port 32 is designated to 0 receive software alarm messages from the alarm port of the PABX 26 and the fifth port 34 is designated to receive traffic messages from the traffic port 42 of the PABX 26, the traffic messages being in accordance with a telephone information system, known as TIMS, which is a facility for providing information concerning billing, traffic and other information associated with extensions connected to a i. ii r i
I-
a.
90999o 9 9 9 Do 99 o 990 o 9999
O.
9 0 0 O O O O O 0 0 99
OD
S09 O OG o 00 O 0 S00 0 09.
0 9 9 9 0 PABX 26. All of the ports 14, 16, 18, 32 and 34 are single serial ports whereas the remaining sixth, seventh, and eighth ports 36, 38 and 39 may each comprise a number input/output lines or ports. The sixth port 36 is designated to receive alarm signals from peripheral devices, such as fire and burglar detecting devices, and these signals are processed by the additional circuitry in the processing and memory circuits 4 and 6 as discussed previously. The seventh port 38 is designated to output signals to control initialisation and switches of the PABX 26, or peripheral devices, such as printers and lighting controls and the eighth port 39 is bidirectional and nay be used by the device 2 to communicate with peripheral devices, such as printers.
All alarm signals and messages received by the device 2 are analysed by the processing circuit 4 which determines what appropriate action is to be taken according to the seriousness of the event which the message or signal relates to. For instance, the processing circuit may merely keep a record of the event in the memory circuit 6, may set an alarm flag to indicate that some further action should be taken in due course, and in the case of events necessitating an urgent response, the processing circuit may activate an external audible alarm via the seventh port 38 or contact a particular remote terminal via the telecommunications exchange 12.
The traffic information received on the fifth port 34 is converted to a format which is more easily understood by a user accessing the device 2 and is stored in the memory circuit 6. The stored ;e ;I i i i t.- I:r, i
I--
a,( tart o t o a .555 t IS a, o t1 t Ia 12 information may be used for a number of purposes, such as determining what maintenance is required to be performed on the PABX 26 in order to efficiently restructure the grouping of extensions or to determine which extensions should be denied the use of certain facilities, such as ISD.
The circuitry of the device 2 may be constructed using standard personnel computer components to provide the basic processing circuit 4, memory circuit 6 and bus 8 and then appropriate intergrated circuit cards, such as an alarm card, serial ports card and modem card, added to provide the additional circuitry, such as the modem 10 and extra serial ports, as required. All of the components are then housed in a sealed casing 28 as described previously. The first embodiment of the device 2 illustrated in Figure 1 is a basic form of the device 2 and additional components and features may be added as required. For instance, perhaps initially only the software of the device 2 is adjusted so that only a capability to process alarm information from the PABX 26 is provided and then at a later date an alarm card is included in the device 2 so as to enhance the processing in memory circuits 4 and 6 and thereby provide a capability for processing alarm signals received via an extra port 36. The number of peripheral devices which may be connected to and controlled by the device 2 is dependent on the number of port cards which can be inserted in the device 2 and the number of ports which the processing and memory circuits 4 and 6 can control. The second embodiment of the device 2 illustrated in Figure 2 is a version of the device 2 ij it' ~Y c _1 -Y exchange or said remote device to be transmitted therebetween via said first and second ports and if said means determines the user is not an authorised user, said means inhibits said user from gaining access to said exchange communications device; said means including memory for storing data transmitted between said first it
B
/2 '-ttiitty h I1
C
t t aC t t a o o aD O 00 I t a ao, o D i 0 It S tt 13 which is able to perform most of the functions of which the communications device is capable.
The device 2 of Figure 2, as shown in Figure 3, includes a master port card 50, a slave port card 52, an alarm card 54, a modem 10, a memory circuit 6, and a processing circuit 4 coupled to parallel and serial ports which may be used to drive printers.
The device 2 also includes a bus 8 for carrying addresses and data and which is connected to the port cards 50 and 52, the modem 10, the memory circuit 6 and the processing circuit 4.
The master port card 50 includes the first and second ports 14 and 16 for connection to a CAT and an MAT 22, respectively, tae third port 18 for connection to the maintenance port 24 of the PABX 26, and the fourth port 32 for connection to the alarm port 40 of the !ABX 26. The master card 50 also includes two relay contact output circuits 51, for driving two ports 38, and a timer circuit 55. The relay circuits 51 comprise coils and contacts and are used to ouput signals on the ports 38 to drive or activate peripheral devices. The timer circuit 55 is connected to a reset port 56 which is used to ouput a reset signal from the timer circuit 55 to the processing circuit 4 in order to reset the microprocessor therein. The reset signal is outputted whenever the processing circuit 4 does not complete, within a predetermined time, a loop in the main operating routine which controls the operation of the device 2, as described hereinafter. The slave port card 52 comprises the same hardware as the master port card 50 and includes the fifth port 34
I
XI
A
pi sol i i 14 for connection to the traffic (or TINS) port 42 of the PABX 26 and a number of ports which form part of the seventh and eighth ports 38 and 39.
The alarm card 54 includes microprocessor, ROM and RAM chips 58, two serial ports 60 and alarm interface circuitry 62, which includes the sixth port 36 adapted to receive alarm signals on sixteen input lines. The interface, microprocessing and memory circuitry 62 and 58 of the alarm card 54 is used to process the alarm signals received by the port 36 so as to place them in a format which is similar to the format of the alarm information outputted by the PABX 26 on the alarm port 40. Once the alarm signals have been processed so as to be placed in the predetermined format, they are outputted from one of the serial ports 62 to a serial port 64 of the slave port card 62. Thus the processing circuitry 4 of the ooOo device 2 is able to process the alarm signals o received via the sixth port 36 and the alarm 'information received from the alarm port 40 in the o same manner and is unable to distinguish between the two types. This represents considerable savings in the amount of operating software required for the 1 device 2. Also the alarm card 54 is only dependent I on the device 2 for housing and power requirements and essentially operates as a separate unit. If a significant number of external alarm signals need to be monitored and analysed by the device 2 then an external alarm device may be provided which on receiving an alarm signal inputs the signal in the predetermined format to a spare port of the seventh port 39 for processing by the device 2 in the same manner as alarm information received from the master "An Exchange Communications Device" The following statement is a full description of this invention, including the best method of performing it known to us -1-
'I-
4 i i /4 i C 41 o( 4 4C 0. *4 44 4 o 4 44 0 4 4( -4 44 4- 4 4, 4 I -4 port card 50 or alarm signals received from the alarm card 54 would be processed.
The main operating routine 100 of the device 2, as shown in Figure 4, begins whenever the device 2 is activated and runs continuously unless an error occurs in the device 2. The first step 102 of the routine 100 involves resetting of all of the microprocessors and ports of the device 2 and then at the second step 104 the processing circuit 4 reads a system configuration file from the memory circuit 6.
The system configuration file enables the processing circuit 4 to initialise all the components of the device 2, such as establishing which ports are able to communicate with other ports, at whaL speed each port is to operate and designating ports for particular operations. At the next step 106 an alarm configuration file is read from the memory circuit 6 which identifies the different types of alarms which the device 2 may encounter and places them into categories. For instance, one type of PABX 26 is capable of issuing 122 different types of alarm information from the alarm port 40 in relation to the hardware and software of the PABX 26 and the device 2 is able to place each type into one of seven different alarm categories.
The next step 108 of the routine 100 involves configuring and initialising the ports 14, 16, 18, 32, 34, 36, 38 and 39 of the device 2 on the basis of the information contained in the system configuration file. The steps 102, 104, 106 and 108 are merely initialisation procedures and the main loop 110 of the routine 100 begins at step 112 at Ii how the PABX will perform particular functions, such I -l t- i~l rl ri jt:_ i 4.
I
r
I
0 oooo 0r o 00 o3 0 0 o 00 e o o o00 o o o ao 0000 o 0 0 00 00 00 0 0 0 0 0 oo o 0 0 0 00 0 o o a a o oro o o0+ o o S0 o 9 0 O o0 0 0 0 0000 p 0 which the processing circuit 4 looks at what is present on a selected port to determine whether a character has been received thereon. The port accessed at step 112 is an input serial port or input/output serial port of the device 2 and a character is a byte of data which represents an alphanumeric character, symbol or instruction (e.g.
line feed return etc.) according to a binary character code such as the ASCII code. If a character is received on the accessed port it is then processed using a PROCESS CHARACTER sub-routine 113, described hereinafter with reference to Figure The routine 100 resumes at step 114 at which a determination is made as to whether all of the serial ports on which data may be inputted have been accessed or not. If when accessing a port at step 112, a character is not present, the routine 100 proceeds directly to step 114. If all of the ports have not been accessed then the routine 100 enters a sub-loop 116 in which a another port is accessed at step 118 and then step 112 is executed. If all of the ports have been accessed then the next step 120 of the routine 100 is executed at which it is determined whether an alarm flag has been set or not. If the flag is not set then the routine proceeds directly to step 122 otherwise if the flag is set, a determination is made at step 124 as to whether the line to the exchange 12 is busy or not.
If the line is busy the routine 100 proceeds to step 122 otherwise the modem 10 is used to telephone a predetermined remote terminal, using a system as known as KEYLINK*, and send an alarm message to the predetermined terminal at step 126. After performing Trade Mark i p i maintenance port is usually achieved using a device known as an administration terminal which is connectable to the maintenance port of a PABX and of which there are generally two types. A maintenance
I'
Ir ii Ar
I;
Ui s r 4 (4 4t 6 4 4 44~
CI
.4 It 4 44 4 4 4 44 4 o 4 4 44(4 .4 C CL step 126, a decision is made at step 122 as to whether it is time to forward a daily alarm summary file to a second predetermined terminal. The second predetermined terminal may be different or the same as the predetermined terminal involved in step 126.
If it is not time to forward the summary file the routine 100 proceeds to the final step 128 of the routine. If it is time to forward the summary file a determination is made at step 129 to determine whether the line to the exchange 12 is busy and if it is the routine 100 proceeds to the step 128, otherwise the alarm summary file is sent to the second predetermined terminal at step 130 using the KEYLINK system. After executing step 130 the routine proceeds to step 128.
At step 128 a timer circuit in the device 2 is reset and the routine 100 returns to the beginning of the main loop 110 and step 112 is executed. The timer circuit of the device 2 is configured so as to continuously measure a predetermined period of time and if the circuit reaches the expiration of the period without having been reset at step 128, so as to begin the measuring the full period, then the mircroprocessors of the device 2 are reset so that the device 2 begins operating again at step 102 of the routine 100. Thus if the device 2 operates normally and the main loop 110 is continuously executed without inordinate delay then the timer circuit will always be reset before the predetermined period expires, however, if an error occurs in execution of the loop 110 then the provision of the timer circuit and the step 128 enable the device 2 to be reset and resume normal operation.
i:i i uu not incorporate security features and any person possessing an administration terminal or similar device would be able to gain uncontested access to a PABX and cause the owner of the exchange considerable inconvenience i .jii~ eeeet oee0 00 0 4 0 0 t S* 44 0 0000 o o 0 0 o oo 00 «0 0 0 0 0 0 0 o 0 44( 4 0 4 00 0 A 0 0 o 40 0 0 00 0 I (0t C C The PROCESS CHARACTER sub-routine 113, as shown in Figure 5, begins at step 132 at which a determination is made as to whether the currently accessed port is an alarm port, such as serial ports 32 and 36 illustrated in Figure 3, and if it is isn't then the routine 113 proceeds to step 134. If the current port is an alarm port then a determination is made at step 136 as to whether the character is the last byte in a series of consecutive bytes received from the alarm port which represent alarm information and if so the routine 113 enters a PROCESS ALARM sub-routine 138, otherwise the routine 113 proceeds to step 134. After returning from the PROCESS ALARM sub-routine 138 the routine 113 resumes execution at step 134. At step 134 a determination is made as to whether the current port is a traffic port, such as the fifth port 34 illustrattd in Figure 3 and if it isn't then the routine 113 proceeds to step 140. If the current port is a traffic port then a determination is made at step 142 as to whether the received character is the last byte of a series of characters which form a record relating to a call associated with an extension of the PABX 26 and if so that routine 113 enters a PROCESS CALL RECORD sub-routine 144, otherwise the routine 113 proceeds to step 140. After execution of the PROCESS CALL RECORD sub-routine 144 the routine 113 resumes at step 140.
A determination is made at step 140 as to whether the current port is in a PABX connect mode and if not the routine 113 proceeds to the next step 146. The ports which may be in a PABX connect mode i le 9qOl26Adbwspe020.I4JPc.5 11: -r ill a ar
C
a' a ar a a 0 ao O t~ atr Ca are the first, second and third ports 14, 16 and 18 associated with the administration terminals 20 and 22 and the maintenance port 24 and the input interface 31 of the modem 10 connected to the bus 8, which effectively appears as a port to the processing circuit 4. The interface 31, the first port 14 and the second port 16 are the ports which may be directly connected to the PABX 26 via the third port 18 so as to transfer data therebetween in order to perform maintenance on the PABX 26. If the current port is in a PABX connect mode then the character present on the current port is transmitted, at step 148, to the other port between which data is presently being transferred and at step 150 the transmitted character is added to an audit trail file stored in the memory circuit 6.
After step 150 the routine 113 proceeds to step 146 at which a determination is made as to whether the.current port is in an idle or busy mode.
The only ports which may appear in an idle or busy mode are those which are associated with external communication devices, such as the first port 14 the second port 16 and the interface 31 of the modem If the current port is not in an idle or busy mode then the routine 113 proceeds to the end 148 of the routine 113. If the current port is in an idle or busy mode then a determination is made at step 150 as to whether the character received on the port is the last byte of a complete line which may be processed by the processing circuit 4 and if it isn't then the routine 113 proceeds to the end 148.
At each of the steps 136, 142 and 150 of the a e t' iibaia means consecutively accesses and stores data received on said second, third, fourth and fifth ports and when data received on said fifth port constitutes traffic information, said means converts I r ii,;
L:
r 2 i j- .1 -iea 0 S0 0 0 00 0 0 0000 0 0 o 0 0 00 00 000 o 0 o0 0 00 0 0000 0 00 00 0 00 00 000 0 4 4 routine 113 even if the character received does not constitute the last byte of information which may be processed, the received character is stored in a volatile merory location of the circ'it 6 so that on subsequent entries to the sub-routine 113 subsequent characters received from the same port may be stored at adjacent volatile locations until the characters received from one port constitute information which can be processed by the device 2. Thus the main routine 100 and the sub-routine 113 enable information received from a number of ports to be established or "built up" simultaneously, which gives rise to considerable savings in processing time whilst ensuring that the device 2 is able to process characters received simultaneously efficiently.
If at step 150 of sub-routine 113 it is determined that the received character constitutes the last byte of a complete line input then the routine proceeds to step 152 at which it is determined if the current port is in a busy mode and if it is the routine 113 enters a PROCESS COMMAND sub-routine 154, otherwise the routine 113 proceeds to step 156. When the sub-routine 154 is completed the routine 113 proceeds to the end 148 at step 156.
If the current port is not in a busy mode then it is in an idle mode and has just received a line input constituting a user name and password inputted by a user of the terminal connected to the current port.
The device 2 at step 156 processes the inputted user name and password to determine if they are a valid combination. If the name and password prove to be a valid combination then the device 2 performs a further security step which involves sending a random i F giyure q is a tiow diagram of an operating routine of the device of Figure 2; Figure 5 is a flow diagram of a sub-routine *1I i 0006 0 0 00 0 0 0 0 P0 e 000 0 0 0 0 0 0 00 00 0 P o00 byte to the terminal of the user to perform a predetermined coding operating thereon. The coding operation is performed by the user's terminal independently of the user and the coded byte must be returned to the device 2 within a predetermined period of time in order for the user to achieve access to the device 2. On receiving the coded byte the device 2 processes it to determine if the coding operation has been performed correctly by the user's terminal and if so then the user is allowed access to the device 2 and the logging on of the user to the device is recorded in an event file stored in the memory circuit 6.
After step 156 the routine 113 proceeds to step 158 at which a determination is made as to whether successful access to the device has been achieved or not and if it hasn't then the routine 113 proceeds directly to the end 148, otherwise the mode of the current port is set to busy mode at step 160 so as to enable the user of the terminal connected thereto to input commands. After step 160 the sub-routine 113 proceeds to the end 148. At the end 148 the sub-routine 113 returns operation of the device 2 to the main loop 110. Prior to the end 148 another step may be inserted therein so as to determine whether the port is a port other than those associated with steps 132, 134, 140 and 146. This is a port which may be used to communicate with an external device, e.g. a particular type of printer, and steps can then be included to enable the device 2 to communicate with the external device.
rl i
:I
a i
B
;i1 e
V.
00 00 0 4 (0 i 12 The PROCESS COMMAND sub-routine 154, as i i .v.Uimau.diic;aons system. The modem 10 is configured so that it is able to receive and transmit data at various baud rates. The memory circuit 6 includes ROM and RAM chips and a 3.5 inch floppy disc
I
I
0i* t a* t0 0 4 t0 a0 o O 0 0000 0 0 00 o 0 00 0 O I CC shown in Figure 6, begins at step 162 at which the command inputted on the current port is decoded and then at step 164 the decoded command is used to access a command table to determine which command option has been selected and then in accordance with the options selected the sub-routine 156 proceeds to one of a number of available command routines 166.
On completion of a command routine 166 the sub-routine 156 proceeds to the end 168 and operation of the device 2 is returned to the PROCESS CHARACTER sub-routine 113, except in the case of the terminate command routine 170 which holts execution of the sub-routine 156 and waits for the timer circuit to reset the device 2. Some of the command options which are available include list all the names and passwords of authorised users, edit the list of authorised users and passwords, display all of the different types of alarm categories, edit the parameters associated with the alarm categories or edit the categories themselves, display the contents of the event file, display -he contents of the audit trail file, display the alarm messages which may be sent and what they relate to, connect the terminal of the user to a maintenance port 24 of the PABX 26, log the user off the device 2, upload or download a file on or from the memory circuit 6 of the device 2, enter a PROCESS TIMS COMMAND sub-routine 172 and instruct the device 2 to activate an external device via the seventh port 38.
The alarm card 54, as shown in Figure 7 includes a microprocessor 174, an EPROM 176, a RAM 178, battery backup memory 180, a DUART 182, an address decoder 183 and an input latch 184. The
I
L
I
8 =.LIdHnge iz nas supplied information to the device 2 which indicates the user associated therewith is an authorised user. On gaining access to the device 2, the user may utilise the device 2 to 23 memories 176, 178 and 180, the DUART 182 and the input latch 184 are all controlled by the microprocessor 174 and connected thereto by a data bus 186 and an address bus 188. The address decoder 183 is coupled to the address bus 188 and in response to the state of address bus 188 selectively enables the DUART 182, the input latch 184 or one of the memories 176, 178 and 180 for access by the microprocessor 174. I Alarm signals are receivable on any one of alarm port 36 of the alarm card 54. The alarm port S° 36 is connected to an alarm interface circuit 192 which monitors the state of the lines 190 connected .o to the port 36 and stores the state of the lines 190 in the sixteen bit input latch 184. The microprocessor 174, in accordance with the operating I program stored in the memories 176 and 188, do' continually accesses the contents of the input latch 184 and if a bit stored in a latch 184 is high then an alarm signal has been received on the corresponding one of the lines 190 and the processor 174 outputs a corresponding alarm information signal ij to the DUART 182. The DUART 182 converts the alarm 'B information signal to a serial format and outputs the signal via a serial port 194 to the port 64 of the slave port card 62, as shown in Figure 3.
v 1 The alarm information signal outputted by the alarm card 54 constitutes alarm information, as mentioned previously, of a format which can be processed by the processing circuit 4 of the device 2. The alarm information comprises four fields, the It~ ~~~VllL~I 1 w.IL. a ceiepnone information system, known as TIMS, which is a facility for providing information concerning billing, traffic and other information associated with extensions connected to a 24 first field being a header for identification, the second field representing an alarm number which, in the case of the alarm card 54, indicates on which one of the lines 190 the original alarm signal was received, the third field represents a scanner number which identifies which card or device outputted the information, and the fourth field represents the time and date at which the information is outputted. The scanner number for alarm cards 54 is determined by i the state of a bank of switches 198 which is read by the DUART 182 from an input/output port 195 when converting the alarm information signal to a serial format.
As mentioned previously, alarm signals may be received on the port 36 of the alarm card 54 from a variety of peripheral devices, such as a fire alarm, a device which indicates that the sprinklers e400 in a building have been activated, a device which indicates that the air conditioning in the building has failed, a device which indicates that a security 0aa4 door has been opened, a device which indicates overheating of external units or the PABX 26, and a device which indicates that the PABX 26 has lost a S((I digital line to the telecommunications system connected thereto.
1 The alarm card 54 further includes an LED display 200, a power level detection circuit 202, a t timer circuit 204 and a relay contact output circuit 206. The LED display 200 comprises sixteen LEDs which display the state of the contents of the input latch 184. The power level circuit 202 monitors the positive supply rail 203, which powers the components of the device 2, to determine when the supply reaches uLaiLLi. inrormation received on the fifth port 34 is converted to a format which is more easily understood by a user accessing the device 2 and is stored in the memory circuit 6. The stored A- l1-"i:~ Ni 1 A'h r r *r 0 Ge,.
0t *o 0 0 00 o 00O o 00 *S 0 0 0 I a predetermined low level which indicates that the supply may be disabled shortly. On detecting the predetermined low level the power level circuit 202, in conjunction with a restart circuit 208, enables the backup memory 180, and using the address decoder 183, causes the processor 174 to access the backup memory 180 and store any alarm data present in the processor's memory or registers in the backup memory 180. The processor 174 is then reset by the restart circuit 208. Thus any alarm data present in the microprocessor 174 is not lost in the event of the supply 203 being disabled. The backup memory 180 comprises RAM and EEPROM. The timer circuit 204 is connected to the input/output port 195 of the DUART 182 and is similar to the timer circuit used to reset the processing circuit 4, in that if the timer circuit 204 is not reset periodically by the processor 174 it then resets the processor 174 using the restart circuit 208. The relay circuit 206 is also connected to the input/output port 195 of the DUART 182 and is similar to the relay circuits 51 of the port cards 50 and 52 in that it can be used to drive or activate external devices via the port 36, which may be bidirectional with respect to some of the lines 190.
The PROCESS ALARM sub-routine 138 begins at step 250 which involves using the alarm information received from the current port to access an alarm table to determine what type the alarm information is and in what category it belongs. The device 2, as mentioned previously, has seven alarm categories.
A
I
I4 In the case of alarm information received lio=c.LLu 1n ne aevice z ana tne number or ports which the processing and memory circuits 4 and 6 can control. The second embodiment of the device 2 illustrated in Figure 2 is a version of the device 2 mon i i b I 71i o a o 0 0 0 o 0 0 o o o o u o o 0 0 a Q o 0 0 0 00 from the PABX 26, a category 1 alarm indicates the occurrence of a fault which has resulted in the PABX 26 being completely inoperable and immediate attention by maintenance personnel is required. A category 2 alarm relates to a fault which has resulted in the PABX 26 being not completely inoperable but a critical part of the PABX has failed which results in a serious deterioration of the service provided by the PABX 26 and immediate attention by maintenance personnal may be required.
A category 3 alarm relates to a fault which would be in category 1 or 2 but due to the provision of redundant components in the PABX 26, the PABX 26 is able to operate normally. Attention is required to check, test or replace components of the PABX 26 as soon as possible as another fault could create a category 1 or 2 situatior. Alarm category 4 relates to a fault which causes a minor deterioration in the quality of the service provided by the PABX 26, such as an extension or register being inoperable and the owner of the PABX 26 may not even be aware of the fault. As the hardware of the PABX 26 may be faulty and requiring checking, testing or replacement, notification to maintenance personnel as soon as possible is, necessary to allow early attention to the fault to be arranged. Alarm category 5 relates to faults of a minor nature, such as'temporary loss of a digital link, but recurring occurrences of such alarms require a report to be sent to maintenance personnel to allow investigation if necessary. Alarm category 6 relates to faults of which are of a minor nature that do not require any maintenance activity unless they occur excessively. Alarm category 7 relates to faults of a minor nature which do not
I
;LI
of the device 2, as described hereinafter. The slave port card 52 comprises the same hardware as the master port card 50 and includes the fifth port 34 i ~1 c~ o Ir 09 S 9 9 *1 IIr 0 9 0 9.
0Or 0*00
U
27 require any action at all, such as removal of a handset of an extension, and can be completely ignored.
After completing step 250 the routine 138 proceeds to step 252 at which a determination is made as to whether a printer is installed on which the alarm information received may be printed. If the printer is installed a copy of the alarm information is outputted thereto at step 254 and the routine proceeds to step 256 otherwise the routine proceeds directly from step 252 to step 256. At step 256 a determination is made as to whether the information relates to an alarm of one of the categories 1 to 6 and if not the routine 138 proceeds directly to -he next step 258. If the alarm information represents an alarm falling within one of the categories 1 to 6 then the information is stored, at step 260, in the event file mentioned previously and after storing the information the routine resumes its execution at step 258. The device 2 at step 258 determines whether the alarm information represents an alarm of category 1 or 2 and if not the routine 138 proceeds to step 262. If the alarm information does relate to an alarm of category 1 or 2 a determination is made at step 264 as to whether the line to the exchange 12 is busy or not and if it is the user of the line is disconnected and the modem 10 is reset at step 266 and -hen step 264 is executed again and, of course, the determination as to whether the line is busy will now normally be that it is available for use. If the line is determined to be available for use at step 64 the routine 138 proceeds to step 268 at which a predetermined remote terminal is sent an appropriate r i i
I
I_
predetermined format to a spare~ port of the seventh port 39 for processing by the device 2 in the same manner as alarm information received from the master §1 4 '43 000000 0 0 0 00 0 0 0 0 00 0.00 0 0 0000 00 0 000 00 00 00 0 0 0 0000 0 0 0 00 0 0 00 0 00 0 00 00 4 0000 0 0 0 4' 0 0 O 00 28 alarm message using the KEYLINK system. On completing step 268 the routine 138 proceeds to the end 270 of the routine 138.
At step 262 of the routine 138 a determination is made as to whether the alarm information represents an alarm of alarm category 3 or 4 and if not the routine 138 proceeds to step 272. If the alarm information does represent an alarm of category 3 or 4 then an alarm flag is set at set 274 and the routine 138 proceeds to the end 270.
A determination is made at 272 to decide whether the alarm information represents an alarm of category and if it doesn't then the routine 138 proceeds to step 276. If the alarm information does represent an alarm of category 5 then the alarm information is stored in the alarm summary file at step 278. After executing step 278 a counter which is used to record the occurrence of alarms of category 5 is incremented at step 280 and then a determination is made at step 282 as to whether the recorded occurrences of alarms of cat gory 5 has exceeded a predetermined threshold. If the recorded octurrences have exceeded the threshold then the alarm flag is set at step 284 and the routine 138 proceeds to the end 270, otherwise the routine 138 proceeds directly to the end 270. At step 276 a determination is made as to whether the alarm information represents an alarm of category 6 and if not the routine 138 proceeds to the end 270. If the alarm information represents an alarm of category 6 then a counter which is used to record the occurrence of alarms of category 6 is incremented at step 286 and then at step 288 a determination is made as to whether the number of ~Ji '1'
I
I
configuration file. The steps 102, 104, 106 and 108 are merely initialisation procedures and the main loop 110 of the routine 100 begins at step 112 at
I
I:
'4 000000 09 r eoa 9 9 «a oo oeoo oa oo S o o9 4*09 o 09 0 0 0 a a 9 0 0 oo o a o o 0 9 99 0 9 0.
0 9 0 a a 0009 recorded occurrences exceeds a predetermined threshold for alarms of category 6. If the threshold is exceeded then the alarm flag is set at step 290 and the routine 138 proceeds to the end 270, otherwise the routine 138 proceeds directly to the end 270. At the end 270 the sub-routine 138 returns operation of the device 2 to the PROCESS CHARACTER sub-routine 113.
.The PROCESS CALL RECORD sub-routine 144, as shown in Figure 9, begins at step 300 where the received traffic information which constitutes a call record is converted into a format which can be processed by the processing circuit 4. A call record is a data stream which is outputted from the traffic port 42 of the PABX 26 at the completion of every call which is established through the PABX 26. The record comprises information relating to various aspects of an established call, including which extension connected to the PAEX 26 was associated with the call and the length of the call. On converting the call record at step 300 a determination is made at step 302 as to whether the call of the record was an outgoing call from the PABX 26 and if it wasn't the sub-routine 144 proceeds directly to step 304 near the end 306 of the routine 144. If the call of the call record was an outgoing call then a determination is made at step 304 as to whether the call was from an extension for which a call list has already been established and if it is then the routine 144 proceeds to step 306, otherwise a call list has to be established at step 308 for the extension from which the call is made and then the routine proceeds to step 306. At step 306 the call 00 0 *~C 01 C 4 0 1 I CL ii 4 i :i predetermined remote terminal, using a system as known as KEYLINK*, and send an alarm message to the predetermined terminal at step 126. After performing Trade Mark 11
I
N Ii /VF1
W
I
4 4 0t 0 o 5.
4 6990 009 9* #9 0 0 0000 o 00 99 0 9 00 0 00 o 00 00 0 0000 00 0 O lit 0t C £4
(C
record is stored or added to the extension's call list, which is stored in the memory circuit 6. After step 306 the routine 144 proceeds to step 308 at which a determination is made as to whether there is sufficient space on a disc in the disc drive of the memory circuit 6 to store the call record. If there is sufficient space then the record is stored on the disc at step 310, otherwise the call record having been on the disc the longest is located at step 312, this record is erased at step 314 and then the recently accessed call record is stored on the disc at step 310. On completing step 310 the routine 144 proceeds to step 304 at which a traffic count in erlangs is updated to provide a record of the incoming and outgoing traffic through the PABX 26.
The erlang is a unit of traffic intensity, normally measured in the number of calls established per a predetermined service time. The predetermined service time used by the device 2 is preferably minutes. After step 304 the routine 144 proceeds to the end 306 at which operation of the device 2 is returned to the PROCESS CHARACTER sub-routine 113.
The PROCESS TIMS COMMAND sub-routine 172, illustrated in Figure 10, begins at step 320 at which the command received on the current port is used to access a command table to determine which one of the command routines 322 is to be executed. After execution of one of the command routines 322 the sub-routine 172 proceeds to the end 324 of the sub-routine 172 at which control of the device 2 is returned to PROCESS CHARACTER sub-routine 113. Some of the command routines which may be selected include allocating or deleting extensions associated with a
A
I
ii
A
1$ execution of the loop 110 then the provision of the timer circuit and the step 128 enable the device 2 to be reset and resume normal operation.
fi..
Il 1;
I
particular group or department, allocating or deleting extensions associated with a particular room of a building, adding an extension to a department or group, providing a report of the costs of calls made by a department, providing a summary report of the cost of calls by each extension in a department, providing a report of the details and costs of each call made by an extension, clear all records associated with an extension of a room, list call details and costs associated with an extension of a room and provide a traffic report giving the current traffic counts in erlangs for incoming and outgoing calls.
C C r C a tt a *0 'Ga.
a a S 000
I
Ct C a C I::r.
P
i j 1

Claims (20)

1. An exchange communications device, comprising: a first port for inputting maintenance data from and outputting maintenance data to an exchange maintenance port of an exchange; a second port for inputting maintenance data from and outputting maintenance data to a remote device, via a modem; and means which monitors data inputted on said second port and if said inputted data constitutes information which indicates that a user wishes to gain access to said communications device, determines if said user is an authorised user and if said means determines said user is an authorised user, enables access to said communications device and thereafter enables maintenance data from said exchange or said remote device to be transmitted therebetween via said first and second ports and if said means determines the user is not an authorised user, said means inhibits said user from gaining access to said exchange communications device; said means including memory for storing data transmitted between said first and second ports in order to provide a record of maintenance performed on said exchange via said maintenance port.
2. An exchange communications device as claimed in claim 1, further comprising a third port for inputting data from and outputting data to an administration terminal and said means consecutively accesses said second and third ports and stores data inputted on said second and third ports until data inputted on one of said second and third ports constitutes information which causes said means to perform an operation corresponding to said information, and on performing said operation said means resumes consecutive accessing of said second and third ports. Sa a 1 4 4 I c 4 t 4t I 90112Z6dbwspe.02,tlspc,32 combination. If the name and password prove to be a valid combination then the device 2 performs a further security step which involves sending a random i 33
3. An exchange communications device as claimed in claim 2, wherein said means is adapted to set said first port and said second or third port in a port connect mode wherein maintenance data is transmitted serially between the two ports in said port connect mode and is stored simultaneously in an audit trail file in said memory.
4. An exchange communications device as claimed in claim 3, wherein said means determines if said user is an authorised user by processing an identification code and a password inputted from said second or third port and if said identification code and password correspond and are valid, said means Oo ,outputs random data to said second or third port for 0 000 :O oo encoding by a terminal of said user, said encoding being performed independently of said user, and if said means receives said random data encoded o°:Oo according to a predetermined method within a .oOo o predetermined period of time of outputting said r random data, said user is an authorised user. An exchange communications device as claimed in claim 4, wherein if said second or third port is I in an idle mode and said means determines said user is an authorised user, said means sets said second or third port to a busy mode to enable access therethrough to said exchange communications device
6. An exchange communications device as claimed in claim 5, wherein said means includes a first microprocessor and an address and data bus which connects said microprocessor to said memory and said first, second and third ports, which are serial ports. I to communicate with the external device. The PROCESS COMMAND sub-routine 154, as 34
7. An exchange communications device as claimed in any one of claims 2 to 6, further comprising said c,0a& econd 9orA modem which is connected to said second port,( whch comprising an interface between said modem and said means.
8. An exchange communications device as claimed in Claim 7, further comprising a sealed casing which houses said ports, said means and said modem, said memory including chip memory and a disk drive, said casing providing external physical access to said o .o first and third ports, a telecommunications plug of 00oo said modem and an opening of said disk drive in which disks are insertable. 000 0 0
9. An exchange communications device as claimed in any one of claims 2 to 8, further comprising a oo00 fourth port for inputting alarm data from an alarm ,000o circuit or an alarm port of said exchange and said means consecutively accesses and stores data received on said second, third and fourth ports and when data received on said fourth port constitutes alarm Sinformation, said means processes said alarm a Cinformation to determine if said alarm information must be stored in said means, if an alarm flag must be set and if an alarm message must be outputted from said second port. AL I An exchange communications device as claimed in claim 9, wherein said means processes said alarm information to determine which one of at least four alarm classes said alarm information represents and if said alarm information represents a first alarm class, said means outputs an alarm message from said second port immediately.
11. An exchange communications device as claimed in claim 10, wherein if said alarm information Srepresents a second alarm class, said means sets said °o0 alarm flag which causes said means to output an alarm message from said second port when said second port is available. o 000
12. An exchange communications device as claimed i in claim 11, wherein if said alarm information represents a third alarm class, said means increments an alarm count stored therein and if said alarm count i exceeds a predetermined value, said means sets said 0 alarm flag.
13. An exchange communications device as claimed 'in claim 12, wherein if said alarm information represents a fourth alarm class, said means takes no further action in relation to said alarm information.
14. An exchange communications device as claimed in claim 13, wherein said alarm information is stored in an alarm event file if said alarm information represents said first, second or third alarm class. i- mentioned previously, of a format which can be processed by the processing circuit 4 of the device 2. The alarm information comprises four fields, the IA L !1 ,1 i l I 0 4 Va a 0 0 O 44 b00 o 00 0040 0 a 0 00 04 0 o0 oo 4 .000 0 C1 t 0 44 36 An exchange communications device as claimed in any one of claims 9 to 14, wherein said alarm information includes a field which indicates to said means whether said alarm information was received from said alarm circuit or said alarm port.
16. An exchange communications device as claimed in any one of claims 9 to 15, further comprising said alarm circuit which includes an alarm microprocessor, a latch for latching alarm signals received from external devices, and a parallel to serial converter, wherein said alarm microprocessor accesses and processes the contents of said latch to generate an alarm information signal which is outputted in parallel to said converter for conversion to a serial format so to form alarm information for output to and which can be processed by said means.
17. An exchange communications device as claimed in claim 16, wherein said alarm circuit includes a power monitoring circuit and a backup memory, said power monitoring circuit being adapted to monitor a supply voltage to said alarm circuit and generate signals to cause said alarm microprocessor to store current alarm data in said backup memory when said supply voltage decreases below a predetermined level.
18. An exchange communications device as claimed in claim 16 or 17, wherein said alarm circuit is housed on an alarm card which is removably insertable in said communication device. V. 4 YI LV W wiliiyL zai i sIAiLtmI LLU S which display the state of the contents of the input latch 184. The power level circuit 202 monitors the positive supply rail 203, which powers the components of the device 2, to determine when the supply reaches ri j i: ~q 6 r. I LU *L I
19. An exchange communications device as claimed in claim 18, further comprising a plurality of said alarm circuit. An exchange communications device as claimed in any one of claims 16 to 19, further comprising at least one relay output circuit connected to a respective relay port and controllable by said means or said alarm microprocessor to issue signals via said relay port to control an external device connected to said relay port.
21. An exchange communications device as claimed in any one of claims 9 to 20, further comprising a fifth port for inputting traffic data from a traffic port of said exchange and said means consec'.tively accesses and stores data received on said second, third, fourth and fifth ports and when data received on said fifth port constitutes traffic information, said means converts said traffic information to a predetermined format from which a user may determine aspects of traffic handled by said exchange and stores converted traffic information, said means enabling authorised users to access said stored traffic information.
22. An exchange communications device as claimed in claim 21, wherein said means stores converted traffic information in a call list for a calling station if said converted traffic information relates to a call from said exchange. t~l t I T t 0 i t. I r I 44 I'r 1 c r mentioned previously, has seven alarm categories. In the case of alarm information received I 1A f" 38
23. An exchange communications device as claimed in claim 21 or 22, wherein said means increases a stored erlang count of traffic in response to traffic information.
24. The combination of an exchange and an exchange communications device as claimed in any one of the preceding claims. An exchange communications device substantially as hereinbefore described with reference to the accompanying drawings. *ftfOc tt t. 0 0 00 00 DATED this 22nd Day of November, 1990. o 0 0000 0 o 0* o tl tt AUSTRALIAN TELECOMMUNICATIONS COMMISSION By its Patent Attorneys DAVIES COLLISON 1 i 901126,dbwspc.020,dllspc,38
AU37081/89A 1988-06-27 1989-06-27 An exchange communications device Ceased AU607622B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU37081/89A AU607622B2 (en) 1988-06-27 1989-06-27 An exchange communications device

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
AUPI8990 1988-06-27
AUPI899088 1988-06-27
AU37081/89A AU607622B2 (en) 1988-06-27 1989-06-27 An exchange communications device

Publications (2)

Publication Number Publication Date
AU3708189A AU3708189A (en) 1990-01-04
AU607622B2 true AU607622B2 (en) 1991-03-07

Family

ID=25623866

Family Applications (1)

Application Number Title Priority Date Filing Date
AU37081/89A Ceased AU607622B2 (en) 1988-06-27 1989-06-27 An exchange communications device

Country Status (1)

Country Link
AU (1) AU607622B2 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0207255A1 (en) * 1985-07-05 1987-01-07 Siemens-Albis Aktiengesellschaft Arrangement for operating and maintaining a telecommunication exchange, especially a telephone exchange
AU574617B2 (en) * 1986-09-30 1988-07-07 American Telephone And Telegraph Company Computer port access security in a communication system
AU2538988A (en) * 1987-10-05 1989-04-18 John Richard Prohs Telephone line communications control system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0207255A1 (en) * 1985-07-05 1987-01-07 Siemens-Albis Aktiengesellschaft Arrangement for operating and maintaining a telecommunication exchange, especially a telephone exchange
AU574617B2 (en) * 1986-09-30 1988-07-07 American Telephone And Telegraph Company Computer port access security in a communication system
AU2538988A (en) * 1987-10-05 1989-04-18 John Richard Prohs Telephone line communications control system

Also Published As

Publication number Publication date
AU3708189A (en) 1990-01-04

Similar Documents

Publication Publication Date Title
CA1217261A (en) Method and apparatus for sending a data message to a selected station during a silent interval between ringing
US6003070A (en) E-mail system and interface for equipment monitoring and control
AU583228B2 (en) Bi-directional data telemetry system
US5367670A (en) Computer system manager for monitoring events and operating parameters and generating alerts
US4686697A (en) Telephone care system with telephone line-checking
CA1143826A (en) Data communications terminal
CN1168589A (en) Distributed signaling system seven call handling system
CN100593764C (en) Universal monitoring system interface control system
JP3118465B2 (en) How to monitor the status of the interconnect network
JPS6273897A (en) Remote communication exchange construction
AU607622B2 (en) An exchange communications device
CN1076910C (en) Multi-master supervisory system
US4527235A (en) Subscriber terminal polling unit
CA1130407A (en) Automatic telecommunication exchange system
US4654638A (en) Security monitoring system
JP2839781B2 (en) Centralized meter reader
US6924747B2 (en) System for exchanging data
KR100208947B1 (en) Administration method of obstacle data for unmanned anti-crime terminal in remote safe adminstration system
KR100237452B1 (en) A method for traffic control between network management system and switching system using memory device and a management apparatus of switching system
ES2275290T3 (en) DEVICE FOR RESTARTING DISTANCE FROM CALCULATION EQUIPMENT, IN SPECIAL MICROCOMPUTERS.
JPS59191960A (en) Communication system
US5907579A (en) Repeater bipolar violation in-service detection system
JPS61500643A (en) Transmission network automatic control device
KR19990060600A (en) How to Prevent Loss of Billing Data in Electronic Switching System
JP2953183B2 (en) Maintenance operation module monitoring method