Telephony and data network services at a telephone

ABSTRACT

A packetised data network includes IP telephones (ITs) and a network intelligence (NI). All of the keys of each IT are “soft” keys (i.e., they have no fixed function). The NI associates a configuration data structure with the IT which correlates the keys with functions, and, based on this, may control the display of the IT to indicate the current function of certain of the soft keys. Some of the functions are requests for data services at the telephone (e.g., video or programmed audio over the internet). When a user requests such a service with a key press, the NI sets up the service between the data source and the telephone. This may require associating a new configuration data structure with the keys of the IT. The IT user may activate multiple data services through the NI.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of prior application Ser. No.09/564,561 filed on May 4, 2000 now abandoned, which is acontinuation-in-part of application Ser. No. 09/307,356 filed May 7,1999 now U.S. Pat. No. 7,068,641 and entitled TELEPHONY AND DATA NETWORKSERVICES AT A TELEPHONE, and which is incorporated herein by reference.

FIELD OF THE INVENTION

This invention relates to the provision of telephony and corporate andpublic data network services at a telephone. The system has applicationto internet protocol (IP) based telephony.

BACKGROUND OF THE INVENTION

Traditionally, a private branch exchange (PBX) has been used to providetelephone services to a network of local telephones. The PBX may existin parallel with a local area network (LAN) which provides data servicesto a network of local computers. It has been contemplated to provision aLAN not only with computers but also with special telephones so that thenetwork can provide telephony services in addition to data servicesthereby avoiding the need for parallel networks. In a known system, IPtelephones connect to the LAN backbone as does a call manager (which isa server configured with call management software) and a gateway to thepublic switched telephone network (PSTN). The IP telephones include avocoder so that audio signals may be converted between analog and IPpackets. The call manager has a configuration file for each telephone onthe LAN assigning call functions to certain of the buttons on the phone,which call functions will be handled by the call manager. Other callfunctions (e.g., “mute”) are handled by the telephone itself. When thecall manager receives keypad digits from a calling phone on the LANindicative of a called station, it sets up a call by instructing thecalling phone to set up a Real-Time Protocol (RTP) audio stream toeither the called telephone, if the called telephone is on the LAN, orto the gateway, if the called telephone is on the PSTN. Once the call isset up, the call manager is out of the loop unless the call managerreceives a key press indication indicative of a call control functionhandled by the call manager, such as a call transfer, call hold, callforward, call park, multiple line appearance, or disconnect.

SUMMARY OF THE INVENTION

According to one aspect, the present invention provides an IP telephone(IT) where preferably all of the keys are “soft” keys (i.e., they haveno fixed function). The network intelligence (NI) associates aconfiguration data structure with the IT which correlates the keys withfunctions, and, based on this, may control the display of the IT toindicate the current function of certain of the soft keys. Some of thefunctions may be requests for data services at the telephone (e.g.,video or programmed audio over the internet). When a user requests sucha service with a key press, the NI sets up the service between the datasource and the telephone. This may require associating a newconfiguration data structure with the keys of the IT. The IT user mayactivate multiple data services through the NI. If none of the keys ofthe IT has a fixed function, the NI can more easily arrange for theprovision of the services without conflicting with any telephony callsat the telephone.

According to the present invention, there is provided a networkintelligence for a data network, comprising: a call service providerfor, when connected to a plurality of data network telephones,facilitating provision of telephony services for said plurality oftelephones; and at least one service proxy for, when connected to atleast one data source, setting up at least one data service between saidat least one data source and said plurality of telephones.

According to another aspect of the invention, there is provided atelephony system, comprising: a plurality of telephones connected to adata network; a network intelligence connected to said network forfacilitating provision of telephony services to said plurality oftelephones and, where said network is also connected to a data source,for providing a data service between said plurality of telephones andsaid data source.

According to a further aspect of the invention, there is provided amethod of remotely managing a telephone over a data network, comprising:receiving indications from said telephone over said data network; basedon said indications, activating a plurality of data services on saiddata network; determining an active one of said plurality of dataservices and sending control messages to said telephone over said datanetwork so that said telephone can provide said active data services;and based on further indications received from said telephone over saiddata network, sending control messages to said telephone to establish avoice call.

According to yet a further aspect of the invention, there is provided amethod of coordinating a telephone and personal computer (PC) at aworkstation which are both connected to a data network, comprising:setting up a data service at said PC from a data source; and setting upa co-ordinated data service between said telephone and said data sourceover said data network.

According to another aspect of the invention, there is provided a methodof managing a telephone connected to a data network, comprising: basedon user input messages from said telephone, establishing a voice call;before or after establishment of said voice call, establishing at leastone non-telephony data service between said telephone and at least onedata source such that said at least one non-telephone data serviceremains established during pendency of said voice call, at least wheresaid at least one data service does not conflict with said voice call.

BRIEF DESCRIPTION OF THE DRAWINGS

In the figures which illustrate example embodiments of the invention,

FIG. 1 is a schematic diagram of a telephony system made in accordancewith this invention,

FIG. 2 is a functional block diagram of the software architecture for anIT of FIG. 1,

FIG. 3 is a functional block diagram of a portion of the system of FIG.1 detailing the software architecture for the NI,

FIG. 4 is a functional block diagram detailing a portion of FIG. 3,

FIG. 5 is a process flow diagram,

FIG. 6 is another process flow diagram, and

FIG. 7 is a schematic diagram of a telephony system made in accordancewith another embodiment of this invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Referring to FIG. 1, a telephony system 10 comprises a private IPnetwork 12 connected to an NI 14, ITs 16 a, 16 b, 16 c, a data service11, a telephone service 13, a public switched telephone network (PSTN)gateway 18, and a public IP network 19. PSTN gateway 18 connects to aPSTN 20. The public IP network 19 may include an IT 16 d, a data service21 and a telephony service 23 and an internet protocol telephone 27connected to the public IP network 19 through a gateway 29. The NI 14may also connect to a non-IP network 25 through a gateway 31. Theprivate UP network could be in the nature of a local area network (LAN),such as an ethernet, or a wide area network (WAN). The public IP networkcould be an internet. The non-IP network could be an integrated servicesdigital network (ISDN), a wireless network, or a proprietary network.

The NI is software which executes on a processing entity 15 comprising acentral processing unit, memory and a network interface. The processingentity may be a personal computer (PC), network server, or other generalcomputer resource which may or may not be dedicated to running the NI.The processing entity may be loaded with the NI from any computerreadable medium, such as disk 17, a tape, or a memory chip. Also, the NImay be down loaded from a remote source on the private or public UPnetwork. Optionally, the processing entity 15 may be a dedicatedprocessor, memory, and network interface into which the NI is embedded.

The IT reacts to events generated by a user (e.g., key presses, hookswitch transitions) and reports these to the NI by sending IP messagesover the private UP network in accordance with an elemental controlprotocol described hereinafter. The UP messages are transported usingthe IP protocol suite (specifically, messages are transported over areliable user datagram protocol—UDP—layer). The NI, which implements thefunctional model of the IT, reacts to these events and controls thefunction of the terminal (user interface, visual/audio feedback, audiohardware control etc.) by sending elemental control messages to the IT.Using this approach, the IT software design can be static but thefunctional model of the IT may change, as new features and servicesbecome available, by simply changing the functional IT emulator softwarein the NI. This removes design complexity in the IT. Because the IT doesnot execute industry evolving functional protocol stacks locally (e.g.H.323), the IT does not become obsolete as new versions of the protocolsevolve. All evolving protocol dependant software is maintained in the NIwhere software updates are handled easily. In this model, the NI acts asa proxy agent for the IT by converting messages received from the IT toappropriate standard protocol.

All of the keys of the IT are “soft keys”, that is, the keys can beassigned a function within the NI. This facilitates the provision of,along with telephony services, services not usually associated with atelephony device, such as access to live or archival audio programmingavailable over the IP network (e.g., REAL AUDIO™), stock quotationupdates, and web browsing.

The architecture for each IT is illustrated in FIG. 2. Turning to FIG.2, the hardware of an IT 16 comprises a digital signal processor (DSP)24, a text display 26, a set of keys (and a hookswitch) 28, and anethernet controller 30 (which includes a port to the private IPnetwork). These devices interface with a processor 33 which maintains,for each of the devices, a software driver 44, 46, 48, and 50,respectively. An event originating at any of these devices passes to asoftware event interface 64, 66, 68, and 70 for the respective devices.The processor 33 may also establish a connection between the ethernetcontroller 30 and any of the other devices through an IP protocol stack75. An event queue 74 receives inputs from the event interfaces and froma window manager 76 and outputs to an event dispatcher 78. The eventdispatcher 78 outputs to functional element managers 80 and anyassociated stream handlers 82 created by the functional elementmanagers. The stream handlers of the functional element managers areinterconnected with the IP protocol stack 75 and they, through theirfunctional element managers 80, output to the device drivers. Thefunctional element managers also output to the window manager 76.Communication with the device drivers is through a real time operatingsystem (RTOS) 84. The RTOS maintains the IP protocol stack 75 as well assoftware sockets 86 in the stack.

The DSP 24 is connected to speaker 90 and microphone 92 of handset 94through a codec 96 (which is an analog-to-digital (A/D) anddigital-to-analog (D/A) converter) and to handsfree speaker 97 andhandsfree microphone 98 through codec 99.

Each functional element manager 80 is designed to control a particularhardware device, group of hardware devices, or a specific set of bookkeeping tasks. These managers interact directly with the NI viaelemental control messages to provide a control entry point to the IT.The managers provide two major capabilities:

-   -   1. They are responsible for parsing incoming elemental command        messages from the NI and translating the high level messages        into low level commands directed to specific hardware devices        within the IT. The managers 80 control each of the hardware        devices, other than the ethernet controller 30, via its        corresponding device driver.    -   2. They are responsible for monitoring internally generated        events (keypad presses, software timeouts) and reformatting        these into elemental control messages, which are sent to the NI.

The specific functional element managers are as follows: a broadcastmanager; network manager; basic manager; key/indicator manager; audiomanager; and display manager. The broadcast manager is used to broadcastcommands to all of the hardware devices of the IT. The network managerprovides terminal initialisation, network maintenance and encryption.The basic manager provides an interface to query the status andoperating parameters of the IT (e.g., the NI may query a hardwareidentifier). The key/indicator manager is responsible for managing allof the keys, indicators and associated commands within the IT. Key pressevents, hook switch events, key/indicator status, icon states and LEDcadencing are all governed by this manager. The audio manager isresponsible for all aspects of the audio including path setup, audiostream setup, and path maintenance. The display manager controls thedisplay of the IT.

The elemental control messages sent by the NI to the functional elementmanagers and from the functional element managers to the NI follow IPand are, therefore, packetised messages. The protocol for the messagescontemplated for each of the functional element managers 80 is set outin Appendix A.

The managers sit on top of the RTOS 84, which provides the hardwareabstraction layer. In particular, the RTOS provides priority basedscheduling of system tasks; consistent application programminginterfaces (APIs) for low level driver abstraction; inter-taskcommunications primitives and data memory management control; and atightly integrated transport control protocol/internet protocol (TCP/IP)stack, through which the ethernet driver 50 is controlled. While notpreferred, optionally, the RTOS may be replaced by a simple taskmanager. In such case, the functional element managers would requiregreater sophistication in order to handle the different APIs of thevarious device drivers.

Below the RTOS sits the physical hardware drivers. If a piece ofhardware changes, only the driver for that hardware and the respectiveevent interface will need to change. Hardware can therefore be added orremoved without impacting the rest of the software. The drivers aregenerally designed to be aware of two types of data—signalling eventsand media streams—and provide a separate API for each.

While all drivers except the ethernet driver 50 are controlled by thefunctional element managers, the ethernet driver 50 is controlled by theRTOS through the IP protocol stack 75. All functional element managercommunication with the ethernet driver 50 is therefore done indirectlyby opening a socket 86 at one of the IP protocol layers 75 (e.g., asimple IP socket or a datagram-based UDP socket). Data from thefunctional element managers thus passes through an opened socket, downthe IP protocol stack to the ethernet driver; conversely, the ethernetdriver 50 passes received data to the IP stack, up to the socket APIlayer such that the element manager that had opened the socket willreceive the data.

There is only one event queue 74 and all internal and external events(elemental control messages) are placed in that event queue. Thisensures that all events acted upon by the IT will be processed based onorder of arrival. Media streams, on the other hand, bypass the eventqueue, as described hereinafter.

The window manager 76 intercepts all incoming elemental controlmessages. The purpose of the window manager is to allow the IT to beresponsive to commands from more than one NI (and, as describedhereinafter, in some instances to facilitate start-up). However, at anypoint in time, only one NI's commands are directed to the hardwareresources. While a particular NI is controlling the IT resources, it hascomplete control of the IT (no resource sharing with other NIs). To gainaccess to a different NI, the user must activate that NI via the windowmanager. This forces the IT to switch the hardware resources to thenewly activated NI providing a window to the IT.

As the user switches from NI ‘A’ to NI ‘B’, NI ‘A’ no longer has controlof the IT resources and must be informed of this condition. The IT usesthe “suspend Connection with Server” command from the elemental controlmessage protocol for this purpose. Similarly, the IT uses “ResumeConnection with Server” message to ‘start’ or ‘resume’ the session withNI ‘B’. NI ‘B’ uses this message as a signal to refresh the display andother IT hardware components as required.

As stated above, only one NI has access to the IT resources at a giventime. There may be situations, however, when it is necessary for one ofthe “suspended” NIs to inform the IT of a special event. An examplewould be the reception of an incoming call on a suspended server. Toallow the disconnected NI to inform the IT, and hence the user, of animportant event, thereby allowing the user to decide how to handle theevent, the elemental control message protocol provides the “ServerAlarm” message. The “Server Alarm” message allows a disconnected NI tosignal an event and a text string to the IT. The IT decodes the event,and informs the user of the pending event. The user may then decide toaccept or reject the event. Upon reception of the event, the IT wouldsuspend the current NI and switch to the new NI via “Suspend Connectionwith Server” and “Resume Connection with Server” messages as describedabove. If the user elects to reject the event, then the terminal sends a“Resume Connection with Server” message to the current NI to inform itthat it needs to refresh the display.

One final capability of the elemental control message protocol, relatedto the handling of multiple NIs, is the ability to reserve a ‘block’ ofUDP port numbers. In the IP domain, the media streams associated withvoice and or video are typically transported using UDP. The setup of themedia streaming with the far end device is performed by the NI on theIT's behalf. However, the IP stack is operated locally by the IT. Asdifferent NIs are added to the IT's list of supported NIs, there is noguarantee that a given UDP port number is available for a call setupsession. To allow a given NI to guarantee that the negotiated UDP portis available on the IT, the NI must have previously reserved the UDPport via the “Reserve UDP Port Block” message. The IT responds with the“Reserve UDP Port Block Report” message. Once a successful messageexchange has taken place, the IT will guarantee that the reserved portnumbers are not given out to other NIs.

The architecture for the NI is illustrated in FIG. 3. Turning to FIG. 3,NI 14 comprises an elemental control message event router 102 whichreceives inputs from ITs 16 a, 16 b, 16 c over the private IP network 12and outputs to terminal emulators 110 a, 110 b, 110 c. A terminal bootserver 104 and an associated operations, administration, and maintenance(OA&M) manager 105 are connected for two-way communication with theprivate IP network 12 and with a terminal emulator manager 106. Theterminal emulator manager manages the terminal emulators. The terminalemulators are connected for two-way communication with the private IPnetwork 12 on lines 114 and also output to the network through elementalcontrol message formatter 108. The NI also includes configuration datastructures 112. Each configuration data structure correlates key codeswith functions and, optionally, with text (or graphics) which explainthe functions. Each configuration data structure also includesinformation sufficient to allow the launching of a service proxy foreach of the functions.

A terminal emulator 110 is detailed in FIG. 4. Turning to FIG. 4,emulator 110 comprises a number of service proxies 112 a, 112 b, 112 n.Each service proxy comprises a service plug-in 116 which is connectedfor two-way communication with the private IP network on a line 114. Theservice proxies output to a context manager 120. The context manager isconnected with an elemental control message driver 122. Elementalcontrol message driver 122 receives inputs from the elemental controlmessage router 102 and outputs to the elemental control messageformatter 108.

The context manager includes a state memory 121 which stores currentstate data for the IT emulated by the terminal emulator. The “state” ofthe IT is the current status of elements of an IT, for example: “onhook”; “off hook”; “call on handset”; “call muted on handset”;“handsfree speaker connected”. The context manager also has a memory 123for a current configuration data structure.

When an emulator 110 is first launched, it will have no service proxies.However, as further explained hereinafter, service proxies are launchedas required based on information in the current configuration datastructure in memory 123. The service proxies may be proxies forproviding telephony or data services available at processing entity 15,over the private IP network 12 (such as services 11 and 13), or over thepublic IP network 19 (such as services 21 and 23). For example, serviceproxies may provide basic telephony call services, a call messagingservice, a directory number locating service (such as an LDAP—lightweight Directory Access Protocol—service, which is described in ETFpublications 1777, 1778, and 1823), a direction finding service (such asMAPQUEST™), a stock market quotation service, an audio program service,and a personalized service.

Referencing FIGS. 1 to 4, when an IT 16 a is first plugged into theprivate IP network 12, the network manager of the IT (which is one ofthe functional element managers 80), using the dynamic hostconfiguration protocol (DHCP) tries to find an NI. An appropriatemessage is therefore sent by IT 16 a to the NI. The terminal boot server104 of the NI recognises this message and prompts the terminal emulatormanager 106 to launch a terminal emulator 110 a for IT 16 a. Whenterminal emulator 110 a is launched, it looks to the configuration datastructures 112 for an initial configuration data structure to associatewith IT 16 a. The configuration data structure is copied to memory 123of the context manager 120 for the terminal emulator and will correlateeach of the keys of IT 16 a with a function and may also correlate keyswith text (or a graphic) describing one of the functions. The NI thenconstructs elemental control reply messages to the IT 16 a which includecommands to control elements of the IT. For example, the display of theIT. 16 a could be written with text (or graphics) from the configurationdata structure for the function of keys of the IT.

If the DHCP is not available then, when an IT is first plugged in, itdefaults to a temporary user input state where the window manager 76 isresponsive to input from the keypad 28. Thus, a user may, via keypad 28,input an IP address for the IT and an IP address for an NI (as will beappreciated by those skilled in the art, the user may also be requiredto input an IP address of a gateway and a sub-net mask). Once this hasbeen keyed in, the IT sends a “new IT” message to the NI IP addresswhich was keyed in. This prompts the addressed NI to launch a terminalemulator, retrieve an initial configuration data structure for the newIT, and construct a reply message. When the IT receives the replymessage, the window manager switches out of its temporary user inputstate.

All hardware devices generate events. In operation, if, say, a key ispressed on the key pad 28 of IT 16 a, this key event is sensed by keypad driver 48. The keypad driver, recognising this as a signallingevent, signals the key event interface 68. Only one event interface issupported per driver and the output of all of these processes is sent tothe centralised event queue 74. Once the key event propagates throughthe event queue to the event dispatcher 78, the event dispatcherdispatches it to the key/indicator functional element manager 80. Thisfunctional element manager then formulates an elemental control message,opens a socket 86 on the IP protocol stack 75 and passes the elementalcontrol message to the socket where it is passed down to the ethernetcontroller 30 for transmission to the NI.

Similarly, if an elemental control message is received from the NI bythe ethernet controller, it is passed up to the event queue 74 where itpropagates through to the event dispatcher 78. The event dispatcher thendispatches the elemental control message to the appropriate functionalelement manager 80 for action.

To ensure that the audio media streams incur the minimal amount of delaywhile propagating through the system, the driver APIs are designed toallow the media to bypass the event queue and event dispatcher andinstead communicate directly with a stream handler 82 registered withthe driver. The handling of a media stream begins with the NI sendingappropriate elemental control messages to request processing of a newmedia stream. The audio functional element manager would then start anew process, a stream handler 82, to perform the stream processing task.If, for example, the elemental control message from the NI requestedprocessing of an audio stream from a voice call, the functional elementmanager for the DSP 24 would open two stream handlers 82: one forreceive stream processing and one for transmit stream processing. Thereceive stream handler would open a socket for the incoming stream ofaudio packets and the transmit stream handler would open a socket for anoutgoing stream of audio packets. Both stream handlers would registerthe process identifier with the DSP driver. The audio stream arriving atthe socket opened by the receive stream handler would pass directly tothe receive stream handler where it would be sent on to the DSP driver44 with the appropriate stream identifier. The driver would pass theaudio stream to the DSP 24 which decompresses it; the stream is thenconverted to analog audio at codec 96 or 99 and passed to a speaker 90or 97 of the IT. The DSP 24 also compresses audio received from amicrophone 92 or 98 of the phone after the audio is digitised by codec96. or 99. The DSP driver, upon reception of this audio datacorresponding to a given stream identifier, signals the registeredtransmit stream handler matching the stream identifier; the transmitstream handler then reads the data from the DSP driver. Thus, more thanone stream handler per driver can register for media streams.

When a media stream is originated from the IT to the outside world, thestream handler-responsible for managing the media stream opens,maintains and closes the required socket and hence writes the mediapackets directly to the socket.

The flexibility of the system described is illustrated in the followingexamples.

Referencing FIG. 1, assume on power-up of IT 16 a, in response to theDHCP message from the IT, the NI 14 launched a terminal emulator 110 afor IT 16 a that retrieved an initial configuration data structure forthe IT which, amongst other designations, designates (i) one key of IT16 a as a mute key to mute a transmit path, as is standard in telephonyfor a mute button, (ii) another key to request specialised callservices, (iii) a further key to request telephone directoryinformation, (iv) another key to request (street) directions, (v)another key to request stock market quotations, (vi) a key to request aspecific audio program (such as a radio station), (vii) a key as a“quit” key for use in quitting a service, and (viii) keys to designatedigits. The mute button and digit keys are typically permanently soidentified on IT 16 a. The “quit” key may also be permanently marked.For the other noted soft keys, the configuration data structure includesdata which the NI uses to control the text display 26 of the IT 16 a toindicate the function of these keys.

Now referencing FIG. 5 along with FIGS. 1 through 4, if a user of IT 16a wished to place a call to IT 16c, she may first lift the handset ofthe IT 16 a. This results in the key/indicator manager of IT 16 asending an “Off hook” elemental control message to the NI (S400). Theelemental control message event router 102 of the NI receives thismessage then passes a request to the appropriate terminal emulator, hereemulator 110 a. The request passes up through elemental control messagedriver 122 and context manager 120 of emulator 110 a to a service proxy,say 112 b, for handling basic call service (the proxy being launched, ifnecessary). The service proxy sends commands back down through thecontext manager and elemental control message driver so that theelemental control message formatter 108 is driven to generate a “StreamBased Tone On” message with appropriate parameters (S402) to cause theaudio manager of the IT to turn on a dial tone. At this point, the NIconsiders the IT to be in an “off hook” state.

Next the user may press a digit key on the key pad. This results in a“key event” message to the NI which includes the key code for the keywhich was pressed (S404). The NI collects the digit, echoes the digitback to the IT 16 a for display in a “Display Data Write” message (S406)and sends a “Stream Based Tone Off” message to turn off the dial tone(S408). Next the user may dial a series of digits, resulting in a likeseries of “Key Event” messages to the NI (S410, S412) and a like seriesof “Display Data Write” messages from the NI (S411, S413) to cause theIT to display these digits. Once the basic call service proxy 112 b ofthe NI has collected a series of digits representing a called station onthe private IP network, it obtains the IP address of the called station,here IT 16 c. The service proxy 112 b of the NI then queries the statememory 121 of emulator 110 c for IT 16 c to determine the state of IT 16c. If IT 16 c is in an on hook state, the NI may then initiate the callwith IT 16 c by sending a “Transducer Based Tone On” message to IT 16 c(S416) with appropriate parameters to cause the audio manager of IT 16 cto generate a ring cadence. The NI also sends such a message to IT 16 a(S418) causing IT 16 a to generate a ring back tone. If the user of IT16 c takes the phone off-hook, then IT 16 c sends an “Off Hook” messageto the NI (S420) causing the NI to send a “Stream Based Tone Off”message to IT 16 a (S422) so that the ringing tone at IT 16 a ceases andalso sends a “Stream Based Tone Off” message to IT 16 c (S424) so thatthe ringing cadence at IT 16 c ceases. The NI then sends (i) a “ConnectTransducer” message (S425, 427) and (ii) an “Open Audio Stream” messageto each of IT 16 a and IT 16 c (S426, S428) so that (i) either thehandset 94 or the handsfree speaker 97 and microphone 98 are connectedat each IT and (ii) a voice session is set up between the phones.Thereafter each IT will send an “Open Audio Stream Report” message tothe NI (S430, 432) and IP media stream packets will flow directlybetween the two phones (S434).

Say, during the course of the call, the conversation turned to stockprices. The user of IT 16 a could press the key designated to providestock market quotations. This would result in a “key event” messagebeing sent to the NI (S440) which is routed by router 102 to terminalemulator 110 a. Emulator 110 a refers to the current configuration datastructure in memory 123 to access a service proxy applicationcorresponding with the key code in the received “key event” message, inthe current example, this is a stock quote service proxy application.The emulator 110 a then launches this service proxy as, say, serviceproxy 112 a. Proxy 112 a then negotiates a connection with the server(i.e., the data source) providing this stock quote service, which servermay be located on public data network 19. The remote server thenaddresses packets of characters to the NI 14. Emulator 110 a of the NIthen sends a “Display Data Write” message to IT 16 a (S442) to pass thecharacters to the IT 16 a for display. Thus, while continuing the voicecall with IT 16c, the user of IT 16 a may receive stock quotationinformation (which may occupy a portion of the display of the phone).

When the user of IT 16 a requests connection to a stock quotationsource, this could prompt the context manager 120 of emulator 110 a tolook up a new configuration data structure for IT 16 a which wouldassign a different function to certain of the keys of the IT. Forexample, the star and pound keys on either side of the 0 key could bere-assigned to a “scroll up” and “scroll down” function, respectively.The NI could then send a “Display Data Write” message to the IT so thatthe phone display indicates this new function of these keys. Then, whenthe user pressed either of these keys, the NI, on receiving a “keyevent” message, would send an appropriate IP message to the remoteserver to request the next, or previous, page of information. Inresponse, the remote server would send new packets of characters causingthe NI to re-write the display of the IT 16 a with the new charactersusing a Display Data Write message.

To end the voice call, IT 16 a may be placed on hook. This results in an“On Hook” message being sent to the NI (S446). This prompts the NI tosend a “Close Audio Stream” message to each of IT 16 a and 16 c (S448,S450). Thereafter, an “On Hook” message may be received from IT 16 c(S452). To end the stock market quotation service, the user may pressthe “quit key” resulting in a “Key Event” message to the NI (S454). TheNI responds with a “Clear Field” message to IT 16 a (S456) to cause theportion of the display used for the stock quotation information to becleared. Internally, emulator 110 a of the NI would either suspend orterminate the stock market quotation proxy 112 a.

Turning to FIG. 6 along with FIGS. 1 through 3, with IT 16 a idle, theuser of IT 16 a may now decide she wishes to listen to the radio stationindicated on the display as associated with a soft key. The usertherefore presses this key resulting in a “Key Event” message being sentto the NI (S600). In response, the emulator 110 a of NI 14 launches anaudio program service proxy, say 112 b, which negotiates a connectionbetween a remote server which is the source for the appropriate audioprogram and IT 16 a. Meanwhile, the emulator 110 a sends a “ConnectTransducer” message to IT 16 a (S602) indicating the new media streamshould be directed to the handsfree speaker 97 and an “Open AudioStream” message (S604) to launch a receive stream handler which opens asocket for the incoming audio program packets from the remote server anddirects them to the DSP driver. Additionally, the pressing of the audioprogram key causes the emulator 110 a to retrieve a new configurationdata structure for IT 16 a which re-assigns the function of the mutebutton on the IT so that its function is to mute the receive path of thehandsfree audio transducers rather than the transmit path. Thus, ifsomeone enters the office of the user of IT 16 a, the user may press themute button to send a “Key Event” message to the NI (S606); the NIresponds with a “Mute/Unmute” message with a parameter causing the IT tomute the receive path (S608). The user of the IT may then conduct aconversation with the visitor and, thereafter, again press the mute key,so that the NI send a “Mute/Unmute” message with appropriate parameterssuch that the receive path for the audio program is again unmuted (S610,S612).

When the user wishes to stop listening to the audio program, she may endthe service by pressing the “quit” key on the IT resulting in an “KeyEvent” message to the NI (S614). The NI responds with a “ConnectTransducer” message which disconnects the handsfree speaker of the phone(S616) and a “Close Audio Path” message to shut down the stream handlerand associated socket for the audio program (S618). Thereafter, the NIretrieves the previous configuration data structure for IT 16 a so thatthe function of the mute button is internally re-assigned whereby it canbe used to change the state of the IT to mute the transmit path.

If, while the user is listening to an audio program a call for IT 16 areached the NI, the NI would send one or more Display Data Writemessages to the IT 16 a to emulate a pop up window announcing the call(preferably with caller information) and asking the user to press acertain key to indicate that she wishes to take the call. This may beaccompanied with a message which would result in a brief alerting toneat the IT. The NI retrieves a new configuration data structure for theIT which includes an assignment of one of the keys to an indication thatthe call is to be taken. If the user did not press this key, once thecaller hung up, the NI would clear the pop up window and restore theprevious display contents. If the user did press the key, then the NImay suspend or terminate the audio program session and connect throughthe call, as afore described. Optionally, a second key could indicatethat the call was to be taken and the audio program continued. If theuser pressed this key, the NI sets up the voice call on the handset 94,keeping the audio program on the handsfree speaker 97. By deciding uponwhether to interrupt the user, the NI may provide for a prioritisationof services.

If, while the IT was busy with a voice call on, say, the handset 94, theuser pressed the telephone key which is associated with a displaymessage indicating an audio program (e.g., radio station), a “Key Event”message would be sent to the NI. Recognising the current state of thephone as busy with a voice call, the NI would recognise providing thenew audio stream would potentially conflict with the voice call.Consequently, the NI sends a notification to the user. For example, theNI could highlight the usage conflict in a Display Data Write message.Also, the NI retrieves a new configuration data structure for the ITwhich re-assigns one key of the phone as a “warning override” key. Theuser could override the warning with the appropriate key press in whichcase the audio stream for the audio program is set up over the handsfreespeaker 97, as described in conjunction with the example of FIG. 6.However, in this instance, the NI may assign a special key for thefunction of muting the handsfree speaker 97, leaving a mute key to mutethe voice call in the standard fashion.

From the foregoing, it will be apparent that the IT may simultaneouslydeal with audio streams from different sources. Indeed, the user couldeven take two separate voice calls at the IT: one on the handset and oneon the handsfree speaker and microphone. In such instance, should a keybe pressed requesting an audio program, the NI could either ignore thekey event message as there is no way to provide this service withoutconflicting with the existing voice calls or could display options tothe user for dealing with the conflict.

As previously mentioned, another exemplary proxy which may be run on theterminal emulator is a directory number locator proxy which may be usedto find telephone numbers over the public IP network. If a user of IT 16a requested a search for a directory number (by pressing the appropriatekey), the NI would launch a directory number locator proxy 112 a interminal emulator 110 a. Possibly, this would also cause the NI toretrieve a new configuration data structure for the IT 16 a and send a“Display Data Write” message to the IT to display new functions forcertain of the keys of the phone which would facilitate a user's use ofthe directory finding service. For example, the digit keys could bereassigned to represent letters so that the user could key in a name. Ifthe user entered a last name, the NI could respond with a list of “hits”through “Display Data Write” messages and retrieve another configurationdata structure for the IT 16 a which assigns new functions to certainkeys to allow handling of the list. One of these new functions could bea “copy” function which may be used to copy information from one dataservice to another. Thus, in this instance, a user could copy a namefrom the list of “hits” to, say, a personal address book in a callmessaging service. Each configuration data structure tailored to aparticular service will normally still provide keys by way of which theuser could request other services. If the user pressed a key to requeststock market quotations, this would cause the NI to launch a stockmarket quotation proxy 112 b in emulator 110 a and, possibly, retrieveanother new configuration data structure for the phone and overwriteportions of the display to indicate new key functions according to thisnew configuration data structure. In this way, the last function keywhich is pressed sets the current configuration data structure for thephone, and a user could “toggle” amongst services. Thus, a number ofproxies may run on the terminal service emulator 110 a simultaneouslybut only the proxy most recently requested by a key press is the activeproxy, the other proxies are in the background. From this it will beapparent that the NI provides an aggregation of services for the ITs,including many services not normally associated with a telephone.

The described text-based services were assumed to provide packets ofcharacters to the NI. Some services, such as web pages on the world wideweb, forward a file written in hypertext mark-up language (HTML) whichfile typically prompts down loading of further files to allowconstruction of a web page. To accommodate such services, the IT 16 maybe provisioned with a graphics display along with an associated graphicsdriver and graphics event interface. Additionally, the ITs areprovisioned with a graphics manager and the elemental message protocolis enhanced by the provision of graphics manager elemental controlmessages. This manager and the new messages will be very similar to thedisplay manager and the display manager elemental control messages.Thus, the protocol will include a “Graphics Data Write” message similarto the “Display Data Write” message.

When a user requests a graphical service which uses the hypertexttransfer protocol (HTTP), the NI will receive the HTML file and downloadnecessary additional files to construct the web page. The NI will thenencapsulate web page information in “Graphics Display Write” messages tocause the web page to be written to the graphical display of the IT. Inso doing, the NI may also retrieve a new configuration data structurefor the IT which will assign keys different functions, such as functionsto navigate through the web page or request a hyperlink. If, forexample, the NI receives “Key Event” messages indicating a hyperlink hasbeen requested, the NI down loads information from the appropriatesource(s) and updates the graphical display of the IT with newinformation received.

With a graphics capable display, if the IT also included a newfunctional element manager 80 for the display, namely, a video manager,then the NI could control the display in the same manner as it controlsthe audio transducers, provided the elemental control protocol wereenhanced with suitable additional commands. More particularly, theconfiguration data structure for an IT 16 b could assign one key to arequest for a video program (such as a close captioned news program).Were this key on IT 16 b pressed, the NI would launch an appropriateproxy in emulator 110 b which would negotiate a connection between aremote server providing this video service and IT 16 b. The NI wouldalso send an appropriate elemental control message to IT 16 b whichresults in the video manager of IT 16 b opening a receive streamhandler, registering it with the display driver and opening a socket 86on the IP stack 75. Thereafter, when the video stream reaches theethernet controller 30 and is passed up to the socket, it is received bythe receive video stream handler and passed down to the display driver.It will therefore be apparent that the user of IT 16 b could, whilecontinuing with a voice call, view, for example, a close captioned newsservice.

The various proxies which may be launched in the terminal serviceemulator are written so as to be compatible with the protocol of theservice provided on the remote server. These different protocols aretherefore transparent to the ITs. A few exemplary data services whichmay be provided at an IT by the NI have been mentioned hereinbefore,such as a directory number locating service (e.g., using LDAP), amap/navigation service (e.g., MAPQUEST™), a stock quotation service(e.g., QUOTE.COM™), and an audio streaming service (e.g., REAL AUDIO™,MPEG3). Additional exemplary services include a weather informationservice (e.g., EARTHWATCH™) and a Short Messaging service (e.g.,AIRTOUCH™).

Another exemplary data service which may be provided at an IT by the NIis an event notification service. With this type of service, a user of adata terminal inputs certain criteria to the service; when thesecriteria are met, the service typically sends an e-mail to the dataterminal. For instance, a user may ask to be notified if the price ofcertain merchandise falls below a specified price level, or ifmerchandise is re-stocked. If an IT requests this service, the NIemulates a data terminal to the event notification service such that theservice presents its user interface (UI) to the NI. The NI then sendsappropriate messages to the IT to reflect the UI at the IT. Based onkeypad input from a user of the IT in reply, the NI sends appropriatemessages to the service in order to specify criteria desired by theuser. When the criteria are met, the NI is notified from the service(typically by e-mail and/or through the UI of the service) and the NImay, in response, control the IT to provide a notification. Thisnotification at the IT is not restricted to a text-based display, butcould, for example, constitute a distinctive ringing signal and/or agraphical display.

User interfaces for data services on an IP network are typically basedon hypertext mark-up language (HTML). Thus, NI 14 need only beprovisioned with HTML capability in order to interface with suchservices.

Data services typically require text based queries. However, the NI mayallow a user of an IT to request voice input for a given service (by anappropriate “Key Event” message). On receiving such a request, the NIlaunches a service proxy for a speech recognition service (e.g.,OPENSPEECH™) and then establishes a media channel between the IT anditself. Speech received by the NI over this media channel is then passedto the speech recognition service which returns text based equivalentsto the NI. The NI may then pass the text based equivalents to the givenservice.

Alternatively, the telephony system 10 may be configured so that when anIT is first plugged in, its NI launches a service proxy for a speechserver and opens a microphone of the IT and a media channel from the ITto the speech server. With such a configuration, voice input for a dataservice may be requested by way of a distinctive utterance by the ITuser.

A high security service might require voice recognition before theservice is unlocked. In such instance, through a service proxy, the NImay direct establishment of a media channel between the IT and the highsecurity service.

An NI may also readily provide an e-mail service to an IT. E-mail sentover the public network 19 addressed to an IT will be received andstored by an e-mail server and accessible by the NI, as enabled by ane-mail client service proxy. As e-mail is received by the e-mail server,the NI resident e-mail client data is updated. The NI may then send a“Display Data Write” message to the appropriate IT which indicates thenew mail item. Notification of new e-mail may alternatively, oradditionally, take the form of a distinctive ringing signal and/or agraphical display preferably when e-mail with a specific originatorand/or specific subject heading and/or specific body text is received.To implement this requires that the e-mail client in the NI compareportions of incoming e-mail with stored search targets. The NI willchoose a configuration data structure for the IT such that a key of theIT may be used to request e-mail messages. If a “Key Event” message isreceived by the NI indicating a request for e-mail messages, the NI willcause the IT display to display summaries of e-mail messages and willload a new configuration data structure for the IT such that keys of theIT may be used to handle the e-mail messages. Thus, for example, with anappropriate subsequent key press, the NI will cause the IT display todisplay the text of a selected e-mail message.

As aforementioned, call services are handled in the same fashion as dataservices: the NI launches a service proxy to access a server whichprovides the desired service. For example, it is possible to delivervoice mail in an identical fashion to that described for e-mail, withspeech being the payload rather than text (CALL PILOT™ is an exemplaryvoice mail service which operates in this fashion).

Since all of the keys of the IT are soft keys, the IT may display textin association with each of its keys which includes function informationprovided by the NI. Alternatively, certain keys found on the IT, such ashold, mute, handsfree, volume control, screen navigation, and headseton/off keys, may be permanently labelled as such. Notwithstanding, thesepermanently labelled keys are soft keys since their function is assignedat the NI. Thus, their function may be re-assigned where necessary (suchas described in conjunction with the foregoing example in respect of themute key). The ability to control all of the keys on the telephoneensures that the NI may provision the ITs with a variety of services,without conflicts amongst the services and without conflicting withvoice calls.

While it is preferred that all of the keys of each IT are soft keys, thesystem of this invention could function even if some keys of an IT were“hard wired”. For example, the mute key of an IT could be hard wired tomute the transmit path of the phone. In such instance, were a user torequest an audio program service, the NI could still allow muting of thereceive path through assigning this function to a soft key on the phone.

While the user input elements of the telephone have been described askeys (and the hook switch), it will be appreciated that the telephonecould equally have other user input elements, such as a touch screen(i.e., a screen where x and y co-ordinates are obtained from a touchsensitive matrix) and proximity or motion detectors. If so, appropriateprotocol messages would log signalling “events” from these devices.Also, while the functions have been described as associated with singlekeys, it could be that the NI requires a series of key presses on thepart of a user to request a function.

The DSP in each IT provides data compression. If the bandwidth of thenetwork is sufficiently great, or if compression is accomplished in someother manner (such as with a network transcoder), the DSPs may beomitted.

The configuration data structures 112 (FIG. 3) may be different for eachIT. Thus, the configuration data structures may be based on userprofiles. In this way, different phones on the private IP network mayrequest services from a different set of services.

The NI may also provide the functional emulation for IT 16 d on publicIP network 19. Also, the NI could be directly connected to the public IPnetwork 19 instead of to a private IP network and may provide thefunctional emulation for any ITs connected directly or indirectly to thepublic IP network. The NI acts as a proxy agent for the IT by convertingmessages received from the IT to appropriate standard or proprietaryprotocol. Thus, for example, referencing FIG. 1, an Internet Protocol(IP) telephone 27 on the public IP network 19 may utilize H.323 protocolin the establishment of telephone calls. As will be understood by thoseskilled in the art, the H.323 protocol has been established by StudyGroup 16 of the International Telecommunications Union (ITU) and isdetailed in overview in http://www.webproforum.com/trillium/index.html,the contents of which are incorporated herein by reference. If a user ofone of the ITs controlled by NI 14, say IT 16 c, dialled a number forsuch an IP telephone, the NI would receive “Key Event” messages from IT16 c. The user may also send “Key Event” messages to specify theprotocol to use. Based on these received messages, the NI would sendappropriate H.323 protocol messages to the IP telephone 27 and itsgatekeeper 29 to establish the call. To do so, the NI would need to beprovisioned with software for implementing the H.323 protocol. Thissoftware would typically be configured as a Service Proxy, say 112 b inFIG. 4, through system administration, and may be dynamically loadedwhen a connection is requested to an IP telephone utilizing the H.323protocol. A user of IT 16 c could directly specify a call protocol orafter dialling a number or specifying a name using IT 16 c, a directoryreference by the NI (using LDAP protocol for example) would return afield specifying the call service(s) (and associated tariffs) throughwhich a Directory Number (DN) could be reached, and hence, theappropriate protocol(s) (e.g. H.323).

An IP telephone on public network 19 could also use a different protocolfor the establishment of a voice call, such as Session Internet Protocol(SIP) which has been established by the Internet Engineering Task Force(IETF) and is detailed in IETF RFC 2543 dated March, 1999 (available athttp://www.sunsite.auc.dk/RFC/rfc/rfc2543.html), the contents of whichare incorporated herein by reference. The NI could allow establishmentof calls between such IP telephones and ITs which it controls providedthe NI is provisioned with software to implement the SIP protocolthrough a service proxy.

Of course, as these standards-based call initiation protocols evolve,the software in the NI may be updated to reflect the latest version ofthe standard.

While the multi-service telephony system has been described in thecontext of an IP data network, the system could be adapted to functionin the context of data networks following other data protocols. Forexample, rather than sending packetised data, the data network couldemploy a synchronous transfer mode for data.

The NI could also allow an IT to communicate with a telephone on anon-IP network 25, such as an integrated services digital network(ISDN). To do so, the NI 14 would need to have a connection to the ISDNthrough a gateway 31 and be provisioned with software allowing it toemulate an ISDN terminal. The gateway converts between ISDN signallingand media streams, on the one hand, and packet data on the other. If anISDN signalling stream arrives at the NI from the gateway, the NIlaunches a service proxy to handle the ISDN messaging with the ISDNterminal in order to establish a call with a desired IT. Thereafter, theISDN media stream is directed to the IT (through the gateway) while theNI continues to receive any messaging via a signalling stream.

In a similar fashion, if the NI, through an appropriate gateway, had aconnection to a wireless network operating under any standard wirelessprotocol, such as GSM, TDMA, CDMA, or G3, and was properly provisionedto emulate a wireless telephone terminal operating under the wirelessprotocol, the NI could permit the establishment of a voice call betweena telephone on the wireless network and any of the ITs.

The NI could also permit an IT to establish a call over a proprietarynetwork if the NI had a connection to such network and the NI wereprovisioned with the proprietary protocol for establishing a call overthe proprietary network. Thus, for example, the NI, if properlyprovisioned and connected, could allow calls between an IT and atelephone on a MERIDIAN network or a NORSTAR network (MERIDIAN andNORSTAR are trademarks of Nortel Networks Corporation).

If properly provisioned, the NI may emulate any type of terminalsupported on a network. Thus, for example, the NI may emulate a pager ona wireless network if provisioned with proper interface software (e.g.,Wireless Application Protocol—WAP, Wireless Markup Language/HandheldDevice Markup Language—WML/HDML) which is utilised by a service proxy.In providing pager emulation, the NI could receive a pager messagedestined for one of the ITs and construct appropriate “Display DataWrite” elemental control messages to cause display of the text of thepager message at the appropriate IT.

The NI may also emulate proprietary services if enabled by anappropriate Service proxy. For example, text messages may be dispatchedto an IT from a COMPANION server via an appropriately configured NI.(COMPANION is a trademark of Nortel Networks Corporation).

There are situations where it is desired to have a server controltelephones and also a personal computer (PC) adjacent each telephone.For such situations, a computer telephony interface (CTI) protocol isneeded. Microsoft's TAPI provides a common application programminginterface (API) for service providers, and those writing telephonyapplications for servers or PCS running the WINDOWS™ operating system.In known call centers, for example, the telephone at each workstation isconnected to a private branch exchange (PBX) and a server is connectedto the PBX and to the client PC at each workstation. Software residenton the server co-ordinates phone activity with information displayed onthe client PC's screen. Many systems use Novel/ATT TSAPI to enablecontrol of a PBX by a server.

Telephone and PC control may be achieved with the teachings of thesubject invention without the need for a line between the telephones anda telephone switch (e.g., PBX). Turning to FIG. 7, a system 710comprises an IP network 712 connected to a telephony service 713, an NI714, ITs 716 a, 716 b and PCS 728 a, 728 b of workstations 730 a, 730 b,a PSTN gateway 718, and a co-ordination server 740. The PSTN gateway 718is connected to a PSTN 720.

The co-ordination server 740 controls the PCS directly over the IPnetwork 712. The co-ordination server 720 controls the ITs through theNI 714, which launches a suitable service proxy for each telephone. Forexample, if the co-ordination server 740 used the TAPI protocol, the NIwould proxy a TAPI client on behalf of each IT. It would also bepossible to architect system 710 such that the co-ordination servergenerates elemental control messages. These would then flow to the NIwhere they would be aggregated and prioritised with respect to otherservices.

When the NI 714 launches a service proxy in respect of an IT for theco-ordination server 740, the NI 714 may upload a new configuration datastructure for the IT which associates an “expand” operation with one ofthe keys of the IT. A suitable “Display Data Write” message to the ITwill result in this key being suitably identified at the IT. In responseto a “Key Event” message from this “expand” key, the NI sends a messageto the co-ordination server 740 such that server 740 controls the PC atthe same workstation to display information viewed in short form on thesmaller IT display in an appropriate expanded format on the PC.

With the architecture of system 710, it is also possible for PC 728 a atworkstation 730 a to run an application which communicates with the IT716 a at the workstation through the NI. The application may communicatewith the IT via the NI either in a CTI protocol, such as TAPI, orutilising the elemental control protocol. Thus, for example, the PCcould run a scheduling program with a scheduling summary appearing onthe IT display. This could be useful where the PC was running a parallelapplication that occupied the screen of the PC. (In this situation, an“expand” key on the IT could be used to pop the background schedulerapplication on the PC to the foreground.) Note that the PC control ofthe IT occurs without any direct connection between the PC and IT.Although, typically, a PC would control on the IT adjacent to it at aworkstation, the system 710 could allow a PC to control remote ITs aswell.

Conveniently, the service proxies may be implemented in the JAVAprogramming language, as this facilitates their portability across NIsimplemented in different software languages, hardware platforms, andoperating system environments.

In the described systems, the intelligence for the operation of the ITis located in the NI. The functional model for the IT resides in the NIand the user interface is projected onto the IT using the elementalcontrol protocol. This model results in a slight delay at the ITwhenever a key is pressed as a key event message must pass up to the NIand a response message must return from the NI to the IT before the ITtakes action consequent on the key press. In most instances, this slightdelay is entirely acceptable. In the case of receive volume adjustments,this delay is not preferred. Consequently, the elemental control messageprotocol allows the NI server to configure the terminal for local,receive volume control. This is accomplished using several messages.

A two-mode operation scheme allows the NI to specify whether theterminal has direct control over active-path volume adjustment or if theNI will assume control over the adjustments. The two modes are definedas follows:

-   -   “Remote Mode”: The NI controls all volume adjustments. The        terminal forwards volume key events to NI to be interpreted,        then the NI instructs the terminal to adjust the active volume        register accordingly.    -   “Local Mode”: The Terminal controls all volume adjustments        directly. The terminal still forwards volume key events (if        enabled), but the terminal interprets the volume key events and        increments or decrements the active volume register directly.

The NI can instruct the terminal to operate in either mode, by settingthe “Adjust Volume” and “Automatic Adjustable Rx Volume Report” optionsof the “Audio Manager Options” elemental control message. If the“Adjustable Rx Volume Report” option of the “Audio Manager Options”message is enabled, the terminal will send an “Adjustable Rx VolumeReport” message each time after a volume key is pressed by the user.This report informs the NI that the volume has been adjusted andindicates whether one of the rails (min./max. volume) has been reached.This provides a clean interface for NI visual feedback of user volumeadjustments when the IT handles the volume control locally.

The NI uses the “Change Adjustable Rx Volume” message to adjust anactive path receive volume when local volume control handling has beendisabled. The NI uses the “Adjust Default Rx Volume” message to changethe default receive volume levels when a user is adjusting defaultvolume levels from, for example, an options list. As will be noted fromthe protocol, the NI may set audio parameters for the handset orhandsfree transducers (headset, where extant) in an audio parameter bank(APB) download message. The “Select Adjustable Rx Volume” message can beused by the NI to set or change the active APB volume register. This isuseful when multi-path calls are configured and the user wishes toadjust the volume of a specific register (i.e. receive volume registerassociated with a specific APB).

There is also a situation where maintaining the functional model for theIT solely in the NI would be unnecessarily burdensome, namely, inimplementing timers. There are many user interface features that requirea time-out function to expire if no user activity is detected for acertain period of time. An example of such a feature is the viewing of acaller's list. When the user enters the list, as each new item isviewed, a timer is started. If the timer expires before the next listitem is viewed, or the list is exited (signalled by a ‘Quit’ key press),the system will automatically exit the list and revert back to the‘Idle’ display screen. The concept of a ‘time-out if no key press’feature is very simple. This, along with the undesirability ofmaintaining possibly thousands of timers in the NI, one per eachterminal, lead to a elegant solution: Perform the timer -feature in theterminal and send back time-out notifications to the NI to ensure thatthe NI is in-sync and in control of the user interface.

The “User Activity Timer” message is used to turn on or to turn off atimer, which reloads when any key is pressed. If the timer expires,meaning no keys were pressed, then the terminal sends the “User ActivityTimer Expired” message. The “User Activity Timer Download” commandallows the NI to specify the time-out value.

Another timer which may be present in the IT is a local call durationtimer. Also, an IT may have a local time and date display (set by theNI) and will locally manage the current NI to which it responds (throughthe window manager). There are text strings displayed in conjunctionwith each of these functions. In order to maintain language independencewith this local functionality, the NI downloads text strings in theappropriate language, as follows.

The Call Duration Timer uses the time & date fields to display itsinformation. The date field is used for displaying the Call DurationTimer label (i.e., a text string) that can be defined by the NI usingthe “Call Timer Label Download” command. By allowing the NI to downloada separate label for this feature, the locally implemented featureremains language independent as the downloaded label may be implementedin any language.

The IT is configured to track the month field digitally, i.e. 1=January,2=February, etc. However, to allow a text label to be used, while at thesame time ensuring language independence, the terminal allows two monthlabels to be downloaded via the NI. These labels are applied to “this”month and “next” month. The terminal tracks the number of days per monthand automatically switches to the next month at the appropriate time.The NI downloads the month labels via the “Month Labels Download”message.

The elemental control message protocol provides a message which allowsthe NI to download a text string (or optionally an icon/bit map etc. asgraphical display capabilities are deployed) to be used as the serveridentification tag in the local user interface. The NI uses the “ServerIdentification Tag” message for this purpose.

An advantage of the elemental control message protocol is the control itprovides the NI over the characteristics of audio at an IT. As discussedpreviously, the NI may control an IT to connect audio streams to aselected transducer pair (e.g., handset, headset or handsfreemicrophones and speakers). In addition, the NI may control parameters ofan audio stream by assigning an Audio Parameter Bank (APB). The APB is agrouping of parameters that describes the characteristics of the audiostream. The IT provides several APBs. Each APB can be configured by theNI. When setting up an audio stream, the NI controls where the audiostream terminates (i.e. which transducer pair to use), and which APB toassociate with the audio stream. An APB contains the followingparameters:

-   -   RLR—Receive Loudness Rating.    -   SLR—Send Loudness Rating.    -   STMR—SideTone Masking Rating.    -   Transmit/Receive Filters.    -   Transmit/Receive Filter Gain Compensation (FGC).    -   Receive volume range (minimum/maximum volume).    -   Receive volume step size.    -   Default and current receive volume level as well as Return To        Default (R2D) enable/disable switch.    -   AGC—Automatic Gain Control.    -   SWL—Switched Loss.

The NI configures these APB parameters using the following elementalcontrol message commands:

“APB Download”, “Set APB's Rx Volume Levels”, “Adjust APB's Tx and/orSTMR Volume Level”, “Frequency Response Specification”, “Voice SwitchingParameter Download”, “Change Adjustable Rx Volume” and “Adjust DefaultRx Volume.”

The elemental control message protocol allows the IT to implementhandset detection algorithms and report the findings back to the NI viathe “Handset Connected” and “Handset Disconnected” messages. Thisflexibility allows the terminal to detect specially designed handsets,for example extended frequency response handsets, and report this to theNI. The NI, upon receiving this message, could activate enhanced audiocapabilities within the terminal to exploit the capabilities of thespecial handset. These enhanced audio capabilities could be used as aproduct differentiater in the market.

The elemental control message protocol allows the IT to be configured toswitch to a new control protocol. Upon receipt of the “Protocol Switch”message from the NI, the terminal could be directed to startcommunicating using the newly specified protocol instead of theelemental control message protocol of Appendix A. This would allow oneterminal to be built that could be compatible with several distinctcontrol protocols.

The elemental control message protocol allows the NI to query the IT fora ‘copyright’ identification string. The NI queries the IT using the“Copyright” option of the “Query Network Manager” command. The ITresponds with the “Copyright Report” message.

The amount of information to be presented to a user may exceed thevisible area of the display for the IT. This may typically occur whenviewing e-mail, directories, or incoming callers logs. To accommodatesuch situations, the elemental control message protocol provides forpage scrolling. The NI may send a “page” of information via a “PageDownload” message. The IT saves this “page” of information locally andpresents the first portion of the page on the display. If a user uses apage scrolling key (such as a key on a navigation cluster, or anotherkey assigned to this purpose by the NI), on receiving the resulting “KeyEvent” message, the NI responds with a “Page Scroll” message, causingthe IT to scroll to another portion of the “page”.

The elemental control message protocol allows the NI the disablespecific portions of the display via the “Disable Display Field”message. Once disabled, all writes to this portion of the display aresaved in an off-screen buffer but are not visible on the screen. Toenable the field, the NI sends a second the “Disable Display Field”message with the associated field bit enabled. Once enabled, thepreviously ‘hidden’ information is displayed on the screen.

Other modifications will be apparent to those skilled in the art

APPENDIX A

Broadcast Manager

NI to IT Broadcast Commands

-   -   Logical Icon Update    -   Time and Date download    -   Set Default Character Table Configuration        Logical Icon Update

The Logical Icon Update command is used for updating the state of alogical icon. The IT keeps a map of the association between logical andphysical icons. When the state or cadence of a logical icon changes, theNI sends this command to update the corresponding physical icon with thenew state and cadence.

Parameters: Logical Icon ID specifies logical ID of icon to be updatedIcon State specifies desired state of icon Icon Cadence Off On FlashFlicker Wink Twinkle Blink Downloadable cadenceTime and Date Download

The Time and Date Download command is used to set the IT's time anddate. This new time and date will overwrite the current time and datedata stored in the IT. The command contains the year, month, day, hours,minutes and seconds. All numbers are expressed in hexadecimal.

Parameters:

-   -   Year    -   Month    -   Day    -   Hour    -   Minute    -   Second        Set Default Character Table Configuration

This command downloads the default character table configuration thatthe display manager uses. It specifies the mapping of the charactertables to graphics tables and it also specifies which one of thegraphics table is to be lock-shifted (code A0 to FF hex).

IT to NI Broadcast Commands

-   -   None        Network Manager

The Network Manager is responsible for configuring and maintaining thenetwork connections between the NI and the IT.

NI to IT Network Manager Commands

-   -   Soft Reset    -   Hard Reset    -   Query Network Manager    -   Network Manager Options    -   Control Channel QoS Configuration    -   Reserve UDP Port Block    -   Server Identification Tag    -   Set RTCP Source Description Items    -   Protocol Switch    -   Download Backup Server Information    -   Server Switch    -   Server Alarm        Soft Reset

The Soft Reset command is sent by the NI to reset the IT as well as theaccessory ports. This command is intended to reset the IT datastructures to their default states.

Hard Reset

The Hard Reset command is sent when the NI wants to fully re-initializethe IT to its power-up default state.

Query Network Manager

The Query command is used to request the status or information from theNetwork Manager.

Parameters: Diagnostic requests the diagnostic info command to be sentto the NI. Managers requests the Manager's ID command to be sent to theNI. Attributes requests the Attributes Info command to be sent to theNI. RTCP requests the RTCP stats to be sent to the NI. Options requeststhe Options status command to be sent to the NI. Copyright requests theCopyright report containing a copyright string. Sanity requests the ITto reply with a Sanity OK response. This insures that the IT is aliveand well.Network Manager Options

This command updates the programmable options supported at the IT by theNetwork Manager.

Parameters: Diagnostics Enables or disables automatic diagnostic datatransmission Reliable UDP Enables or disables reliable UDP layer forcontrol channelControl Channel QoS Configuration

This command is used tell the IT which QoS features to make use of whencommunicating with the NI.

Parameters: Type Of Service Enable Enables ToS field of command ToSMinimize delay Maximize throughput Maximize reliability Minimizemonetary cost Normal service Precedence Routine Priority Immediate FlashFlash override Critical Internetwork control Network controlReserve UDP Port Block

The NI uses this command to force the IT to reserve a continuous blockUDP ports. Once the ports are successfully reserved the NI can make useof them without fear of interfering with other servers controlling theIT. The command contains the number of ports to reserve and a startingport number. The IT will reply to this command with the Reserved UDPPorts Report stating how many ports were successfully reserved and thestarting port number. The NI could use those reserved port numbers toopen audio streams for example.

Parameters: Number of UDP Number between 1 and 255 which ports toreserve indicates the number of UDP ports that the NI wants to reserve.Starting UDP Indicates the number of the first UDP port number port ofthe block of ports to reserve. When set to 0x00, the IT chooses thestarting UDP port.Server Identification Tag

This command is used by the NI to download a character string orientedtag which identifies the server. The IT could place this information onthe display to identify the active server for the user.

Set RTCP Source Description Items

This command is used by the NI to configure the different sourcedescription items that are part of the SDES report of the RTCP protocol.

Parameters: Source Description Name used to describe the IT e.g. “HomerDoe's IT” E-mail address associated with the IT Phone number of the ITGeographic location of the IT IT software version Notice/StatusinformationProtocol Switch

The NI sends this command to an IT that supports multiple protocols toforce it to change control protocols. The other protocols that the ITsupports could have a similar command to enable a switch-back toUNIStim.

Parameters: Protocol ID An identifier for different protocolsDownload Backup Server Information

This command is used by the NI to download network-related informationregarding backup servers into the IT. Note this command supports thedownload of info for several backup servers.

Parameters: Server ID Server identifier, used to reference a specificbackup server per the following parameters. Server Port Port number anidentified server uses for Number UNIStim channel. Server IP IP addressof the identified server. AddressServer Switch

The NI sends this command to force the IT to stop accepting UNIStimcommands from the current server and start listening to the serverspecified in the command. This command assumes that the IT has been madeaware of the new server's network address in the configuration processor through the Download Backup Server Information.

Parameters: Server ID Server identifier, used to reference a specific,previously identified serverIT to NI Network Manager Commands

-   -   Soft Reset Ack    -   Sanity OK    -   Network Manager Attributes info    -   Network Manager Diagnostic Info    -   Manager IDs    -   Network Manager Options Report    -   Resume Connection With Server    -   Suspend Connection With Server    -   Reserved UDP Ports Report    -   Copyright Text        Soft Reset Ack

The Soft Reset Ack command is sent to the NI after the IT has been resetvia the reception of the Soft Reset command. The command will betransmitted only after a successful reset has been performed.

Sanity OK

The Sanity OK command is used in response to a Query Sanity command. Itindicates that the IT can still receive and transmit from/to the NI.

Network Manager Attributes Info

This command is used in response to the Query Network Manager(Attributes) command generated from the NI. The IT replies by sendingthe Network Manager Attributes.

Parameters: Supported List of protocols supported, Protocols by protocolidentifierNetwork Manager Diagnostic Info

The Diagnostic Info command is sent after it has been requested by theQuery Network Manager (Diagnostic) command or when an error occurs andthe Diagnostic Command transmission has been enabled via the NetworkManager Options command.

Parameters: RXBUFOVF Rx Buffer Overflow TXBUFOVF Tx Buffer OverflowRXBEMPTY Rx Buffer Empty INVALMSG Invalid Command ReceivedManager IDs

This command is sent from the IT after reception of the Query NetworkManager (managers) command from the NI. The IT replies with a list ofall managers contained in the IT with the exception of the NetworkManager and the Broadcast Manager. A flag, for each manager, indicatesif the manager is active or inactive. The format of the command is asfollows.

Parameters: Managers List of managers supported by the IT ActiveActive/Inactive indication for each managerNetwork Manager Options Report

This command is sent after reception of the Query Network Manager(Options) command. It sends the setup of the options to the NI.

Parameters: Diagnostics Automatic diagnostic data transmission enabledor disabled Reliable UDP Reliable UDP layer for control channel enabledor disabledCopyright Report

This command is used to respond to the Query Network Manager (Copyright)request from the NI. It provides the copyright information as an ASCIIstring.

Resume Connection With Server

The IT sends this unsolicited command to inform the NI that it is readyto accept commands from NI. The transmission of this command can eitherbe triggered by a power-up or by a user choosing to connect to a new NIafter power-up.

Suspend Connection With Server

The IT sends this unsolicited command to inform the NI that it willdisconnect itself from the NI. The transmission of this command isnormally triggered by a user choosing to connect to a different NI.Typically, this is the last command that the NI will receive from the ITuntil the user chooses to switch back to the NI.

Reserved UDP Ports Report

This command is sent to inform the NI of the UDP ports that have beenreserved as a result of the Reserve UDP Port Block command. The commandpayload reports the number of UDP ports reserved as well as the numberof the first UDP port of the reserved block.

Parameters: Number reserved Number between 1 and 255 which UDP portsindicates the number of UDP ports that are reserved by the IT. A ‘0’ inthis field means that the command failed. First UDP Port Indicates thenumber of the first UDP of block port of the reserved block.Basic Manager

The Basic manager handles the IT maintenance functions.

NI to IT Basic Commands

-   -   Start Selftest    -   Query Basic Manager    -   Basic Manager Options    -   General Read/Write    -   EEprom Write    -   Encapsulate Command        Start Selftest

The start selftest command is used for running a selftest in the IT. Theself tests are device specific. This message requires that the securecode of the IT be set using the Basic Managers Options (Secure Code)command.

Query Basic Manager

The Query command is sent by the NI. It is used to request the status orinformation from the Basic manager.

Parameters: Attributes requests the Attributes Info command to be sentOptions requests the Options Status command to be sent F/W requests theF/W version command to be sent version H/W ID requests the IT H/W IDcommand to be sent (serial number, color and the release number) IT Typerequests the IT Type command to be sent Selftest requests the SelftestResult command to be sent PEC requests the Product Engineering Codecommand to be sentBasic Manager Options

This command updates the programmable options supported by the IT'sBasic manager.

Parameters: Secure Code Enables or disables the secure code for criticalmessagesGeneral Read/Write

This command allows direct read or write access to the devices (EEProm,microprocessor, etc . . . ) of the IT. For the write operation, theSECURE CODE flag must be set through the Basic Manager Options (SecureCode) command. For a read operation, the data bytes must not be presentin the command.

Parameters: Operation Read or Write Device Hardware device identifierAddress address within the requested device Data Data to be written inthe case of a Write operationEEprom Write

This command allows specific EEprom data byte locations to be written bythe NI. In order for this command to succeed, the secure code must beset through the Basic Manager Options (Secure Code) command. Thiscommand allows access to EEprom data bytes, without having to know theexact location of the data in the EEprom.

Parameters: Element ID Dynamic EE Chksm Static EE Chksm PEC IndexRelease Number Color Serial Number Data Data bytes to be written toElement IDEncapsulate Command

This command enables the NI to use UNIStim to encapsulate commands thatbelong to UNIStim or other protocols. For example, the NI could forcethe IT to send out a Key Event command by encapsulating it in theEncapsulate Command. This command could also be used to directly accessresources (such as a DSP, VGA screen etc) in the IT without using aUNIStim command.

Parameters: Encapsulated Identifies protocol ID of encapsulated ProtocolID protocol Encapsulated Data corresponding to command in Commandidentified protocolIT to NI Basic Commands

-   -   Basic Manager Attributes Info    -   Basic Manager Options Report    -   F/W version    -   IT Type    -   Selftest result    -   General Read Response    -   Hardware ID    -   Product Engineering Code        Basic Manager Attributes Info

This command is used in response of the Basic Manager Query (Attributes)command to inform the NI of both the EEPROM static and dynamicchecksums. Both values are read directly from the EEPROM.

Parameters: Static Checksum Static Checksum of EEPROM Dynamic ChecksumDynamic Checksum of EEPROMBasic Manager Options Report

This command is sent after reception of the Basic Manager Query(Options) command. It sends the basic manager's options configuration tothe NI.

Parameters: Secure Code Status Enabled or DisabledF/W Version

This command is used in response to the Basic Manager Query (F/Wversion) command. The F/W version command contains the F/W version codeof the IT's code.

Parameters: F/W Version 7 character ASCII string representing the F/WVersionIT Type

The IT Type command is sent in response to the Basic Manager Query (ITType) command from the NI. It is used to inform the NI on the type ofIT.

Parameters: IT Type IT type identifierSelftest Result

The result of each test performed during a selftest is given by thiscommand. This command is send after reception of the Basic Manager Query(Selftest) command from the NI.

Parameters: Test ID An identifier for each test Test Result A pass/failindication for each test identifiedGeneral Read Response

This command is used in response to the General Read/Write command whena read operation is performed.

Parameters: Device Hardware device identifier Address address within therequested device Data Data read from the device.Hardware ID

This command is sent in response to the Basic Manager Query (H/W ID)command. It provides the unique number that identifies the IT.

Parameters: Serial Number Unique serial number of the IT Release NumberHW release number of the IT Colour Colour code of the ITProduct Engineering Code

This command is sent in response to the Query Basic Manager (PEC)command from the NI. It provides the Product Engineering Code of the IT.

Parameters: PEC Product Engineering Code for the ITKey/Indicator Manager

The Key/Indicator Manager is the manager responsible for managingparameters associated with keys and the indicators on the IT.

NI to IT Key/Indicator Commands

-   -   LED Update    -   Query Hookswitch    -   User Activity Timer    -   Downloadable Free Form Icon Access    -   Query Key/Indicator Manager    -   Key/Indicator Manager Options    -   Logical Icon Mapping    -   Key Repeat Timer Download    -   Query LED State    -   Query IT Icon State    -   Indicator Cadence Download    -   User Activity Timer Download    -   Free Form Icon Download    -   IT Icon Update        LED Update

The LED Update command is used to update the state and cadence of LEDson the IT.

Parameters LED ID LED identifier LED State Off On Flash Flicker WinkTwinkle Blink Downloadable cadenceNote that cadence should be downloaded using Indicator Cadence Downloadbefore selecting Downloadable cadence as the LED State.Query Hookswitch

The Query Hookswitch command is used to query the state of hookswitch onthe IT. The IT must send back the Hookswitch State command in reply.

User Activity Timer

The User Activity Timer can be turned on and off using this command. Thetime-out value of the timer is defined using the User Activity TimerDownload command. When the User Activity timer starts, if no key eventhappens (depression, repeat or release) in the IT before the timertimes-out, the IT will send the User Activity Timer Expired command backto the NI. If at least one key event happens then the timer will resetand start the count down again until the User Activity timer is stopped.

Parameters: Start/Stop Starts or stops the timerDownloadable Free Form Icon Access

The Downloadable Free Form Icon Access command is used to enable ordisable the download Icon RAM bit map. This command allows ‘overloading’the existing Free Form Icon ROM bit maps.

Parameters: Free Form Icon Hard coded Free Form ROM bit map or Sourcedownloaded Free Form RAM bit mapQuery Key/Indicator Manager

The Query Key/Indicator manager command is used to request informationabout various states or information handled by the Key/Indicatormanager.

Parameters: Options Requests the status of the option setting AttributesRequests the information of the Key/Indicator manager's Attributes.Key/Indicator Manager Options

This NI uses this command to set the Key/Indicator manager options.

Parameters: Key Release Enable/Disable the transmission of Key MessageEvent message with Key Release flag set when a valid key release occursVolume Key Enable/Disable the transmission of Message Volume Key Eventmessages Local Dial Pad No Feedback Feedback Key Click DTMFLogical Icon Mapping

The Logical Icon Mapping command is used to define the relationshipbetween physical and logical icons in the IT.

Parameters: Command Global NIL mapping One-to-one mapping Single mappingPhysical Icon ID Same as defined in the IT Icon Update command LogicalIcon ID Logical ID to be assigned to the specified Physical IconNotes: 1) The Global NIL mapping command removes all the mapping betweenthe logical icons and the physical icons. 2) The one-to-one mappingcommand is used to map the physical icon 0 with the logical icon 0,physical icon 1 with the logical icon 1 and so on. 3) The single mappingcommand maps a single physical icon to a logical icon ID. 4) ThePhysical and Logical Icon ID fields are not required when theAdministration command is the Global NIL mapping or the one-to-onemapping.Key Repeat Timer Download

The Key repeat Timer Download is used by the NI to specify the time(first timer) before sending the key repeat command when the key remainsdepressed and also for specifying the time (second timer) to wait beforesending all subsequent key repeat commands if the same key remainsdepressed.

Parameters: Key Repeat Initial Duration key must be pressed prior toTime sending key repeat command Key Auto Repeat Time interval betweensuccessive key Interval repeat commands while key remains depressedNotes: 1) The key repeat function may not be supported on all keysQuery LED State

The Query LED State command is used by the NI to extract LED stateinformation from the IT.

Parameters: LED ID Specifies LED to be queriedQuery IT Icon State

The Query IT Icon State command is used by the NI to extract IT iconstate information from the IT.

Parameters: Physical Icon ID Specifies the physical icon to be queriedIndicator Cadence Download

The Indicator Cadence Download command is used to specify a new customcadence that can be used to flash the icons and LEDs when using thedownloadable cadence option in the LED Update and IT Icon Updatecommands.

Parameters: Cycle 1 On Time On duration for first cycle Cycle 1 Off TimeOff duration for first cycle Cycle 2 On Time On duration for secondcycle Cycle 2 Off Time Off duration for second cycle Cycle 3 On Time Onduration for third cycle Cycle 3 Off Time Off duration for third cycleCycle 4 On Time On duration for fourth cycle Cycle 4 Off Time Offduration for fourth cycle Notes: 1) A maximum of four on-off cycles canbe specified. 2) Not all four cycles have to be used.User Activity Timer Download

The User Activity User Download command is used to download the time-outvalue used by the User Activity timer. This time-out value will be usedwhen the user Activity is started by the User Activity Timer command.Upon receipt of the command the IT will restart the timer with the newtime-out value.

Parameters: User Activity Timeout Value Duration of user activitytimeout.Free Form Icon Download

This command is used to download a free form icon representation that isnot already hard coded in the IT ROM. The command contains the ID of thedownloadable icon, and the bitmap that represents the free form icon.

Parameters: Free Form Icon ID Identifier of downloaded icon Icon BitmapData Bitmap data of icon representationIT Icon Update

This command is used to change the current state and cadence of an ITicon. The IT icon will be updated with the new state and cadence only ifthe physical icon IS NOT mapped to a logical icon.

Parameters: Physical Icon ID specifies physical ID of icon to be IconState updated specifies desired state of icon Icon Cadence Off On FlashFlicker Wink Twinkle Blink Downloadable cadenceIT to NI Key/Indicator Commands

-   -   Key Event    -   LED Status Report    -   On hook    -   Off hook    -   User Activity Timer Expired    -   Hookswitch State    -   Key/Indicator Manager Attributes info    -   Key/Indicator Manager Options Report    -   IT Icon Status Report        Key Event

This command is used to report an event related to the keys. The eventcan be a key depression, key repeat or a key released.

Parameters: Key ID dial pad 0 dial pad 1 dial pad 2 dial pad 3 dial pad4 dial pad 5 dial pad 6 dial pad 7 dial pad 8 dial pad 9 dial pad * dialpad # Navigation Up Navigation Down Navigation Right Navigation LeftQuit Copy Volume Up Volume Down Hold Release Mute Headset HandsfreeProgrammable Key 1 to N Key Event Key released Key depressed KeyRepeated Notes: 1) A number (N) of non specific “programmable” keys aresupportedLED Status Report

This command is sent to the NI in response to the Query LED State. Itinforms the NI on the state and cadence of LEDs.

Parameters LED ID LED identifier LED State Off On Flash Flicker WinkTwinkle Blink Downloadable cadenceOff Hook

The Off Hook command is sent to the NI when the IT detects an On hook toOff hook transition.

User Activity Timer Expired

This command is sent to the NI when the User Activity timer times out.The actual time-out value for the User Activity Timer is specified bythe User Activity Timer Download command.

Hookswitch State

This command is sent to the NI in response to the Query Key/IndicatorManager (Hookswitch) command.

Parameters: Hookswitch State On hook Off hookKey/Indicator Manager Attributes Info

This command is sent to the NI in response to the Query Key/IndicatorManager (Attributes) command and informs it of the attributes of theKey/Indicator manager. The format of the command is as follows.

Parameters: Programmable contains the number of programmable keys keyson the IT Soft Keys contains the number of soft keys on the IT HeadsetKey indicates existence of a Headset Key on the IT Mute Key indicatesexistence of a Mute Key on the IT Quit indicates existence of a Quit Keyon the IT Copy indicates existence of a Copy Key on the IT MessageWaiting indicates existence of a Message Indicator Waiting Indicator onthe IT Navigation keys none two fourKey/Indicator Manager Options Report

This command is sent to the NI in response to a Query Key/IndicatorManager (Options) command. It sends the Key/Indicator Manager's optionsconfiguration to the NI.

Parameters: Key Release Message Enabled/Disabled Volume Key MessageEnabled/Disabled Local Dial Pad Feedback No Feedback Key Click DTMF

The options are set via the Key/Indicator Manager Options command.

IT Icon Status Report

This command is used in response of the Query Key/Indicator Manager(Icon State) command. It informs the NI of the state of icons.

Parameters: Physical Icon ID specifies physical ID of icon to be queriedIcon State specifies state of icon Icon Cadence Off On Flash FlickerWink Twinkle Blink Downloadable cadenceAudio Manager

The Audio manager is the entity that manages every aspect of the audioconfiguration of the IT. The main tasks of the manager are to configurethe loss plan and tones, setup voice paths and establish end-to-endvoice connections.

NI to IT Audio Commands

-   -   Query Audio Manager    -   Query Supervisor Headset Status    -   Audio Manager Options    -   Mute/unmute    -   Transducer Based Tone On    -   Transducer Based Tone Off    -   Alerting Tone Configuration    -   Special Tone Configuration    -   Paging Tone Configuration    -   Alerting Tone Cadence Download    -   Special Tone Cadence Download    -   Paging Tone Cadence Download    -   Transducer Based Tone Volume Level    -   Alerting Tone Test    -   Visual Transducer Based Tones Enable    -   Stream Based Tone On    -   Stream Based Tone Off    -   Stream Based Tone Configuration    -   Stream Based Tone Frequency Component List Download    -   Stream Based Tone Cadence Download    -   Select Adjustable Rx Volume    -   Set APB's Rx Volume Levels    -   Change Adjustable Rx Volume    -   Adjust Default Rx Volume    -   Adjust APB's Tx and/or STMR Volume Level    -   Query APB's Tx and/or STMR Volume Level    -   ABP Download    -   Open Audio Stream    -   Close Audio Stream    -   Connect Transducer    -   Frequency Response Specification    -   Biquad Download    -   Voice Switching Configuration    -   Query RTCP Statistics    -   Vocoder Configuration    -   Jitter Buffer Configuration        Query Audio Manager

The Query Audio Manager command is used to request various status orinformation from the Audio manager.

Parameters: Attributes requests the Attributes of the Audio Optionsmanager request the option setting of the Audio manager Alertingrequests the Alerting selection (warbler rate and cadence) Adjustable Rxrequests the IT to send the Volume Adjustable Rx Volume Informationcommand. APB Default Rx requests the IT to send the Default Volume RxVolume of the specified APB Handset requests the handset status Headsetrequests the headset status APB number specifies the APB for the APBDefault Rx Volume queryQuery Supervisor Headset Status

This command is used to query the connection status of the supervisorheadset.

Audio Manager Options

This command updates the programmable options supported by the Audiomanager.

Parameters: Volume Adjustment Remote: volume adjusted by the NI Local:volume adjusted by IT Volume Adjustment Enable/Disable the transmissionReports of volume adjustment reports when volume keys are depressedHeadset Rfeature Key Enable/Disable the transmission Message of HeadsetRfeature Key message when key event is detected on headset interface.Mute/Unmute

This command is used to mute/unmute Rx and Tx streams.

Parameters Stream ID Identifies stream to mute/unmute Direction Rx TxMute Function Mute Unmute Notes: 1) A single command can be used tochange the mute setting of many streams at once by replicating theparameters of the command as many times as required.Transducer Based Tone On

This command is used to turn on one of the transducer based tone(alerter, paging or special tone ). The association between a transducerbased tone and a transducer is done using the Alerter Tone Setup, PagingTone Setup and Special Tone Setup commands of the audio manager. Some ofthese tones may be mutually exclusive.

Parameters: Transducer based Alerting Tone ID Special Tones Paging TonesAttenuation Downloaded tone volume level Downloaded tone volume level -2Transducer Based Tone Off

This command is used disconnect a transducer based tone from itsassociated transducer.

Parameters: Transducer Based Tone ID Alerting Special Tones Paging TonesAlerting Tone Configuration

This command is used to configure the various parameters that areassociated with the Alerting tone. Through this command the alertertone's volume range, warbler effect, cadence and transducer routing canbe configured.

Parameters: Warble Select Specifies the warble to use with the alertingtone Tone Volume Range Number of steps from the maximum tone volumevalue, which is set by hardware. Transducer Routing Handset SpeakerHeadset Speaker Handsfree Speaker Cadence Select cadence 0 cadence 1cadence 2 cadence 3 cadence 4 cadence 5 cadence 6 downloadable alertertone cadenceSpecial Tone Configuration

This command is used to configure the various parameters that areassociated with the special tone. Through this command the specialtone's volume range, cadence and transducer routing can be configured.

Parameters: Tone Volume Range Number of steps from the maximum tonevolume value, which is set by hardware. Transducer Routing Transducer towhich the special tone will be routed when turned on. Handset speakerHeadset speaker Handsfree speaker Cadence Select cadence 0 cadence 1cadence 2 cadence 3 cadence 4 cadence 5 cadence 6 downloadable specialtone cadence Special Tone Selects the frequencies that make up Contentthe special tonePaging Tone Configuration

This command is used to configure the various parameters that areassociated with the paging tone. Through this command the paging tone'svolume range, cadence and transducer routing can be configured.

Parameters: Tone Volume Range Number of steps from the maximum tonevolume value, which is set by hardware. Transducer Routing Transducer towhich the special tone will be routed when turned on. Handset speakerHeadset speaker Handsfree speaker Cadence Select cadence 0 cadence 1cadence 2 cadence 3 cadence 4 cadence 5 cadence 6 downloadable pagingtone cadenceAlerting Tone Cadence Download

The Alerting Cadence Download command is used by the NI to download analerting cadence in the IT. This new Alerting Tone cadence will be usedthe next time the IT receives the Tone On (Alerting Tone) command ifthis tone is set to use the downloadable cadence (see Tone CadenceSelect command).

Parameters: Cycle 1 On Time On duration for first cycle Cycle 1 Off TimeOff duration for first cycle Cycle 2 On Time On duration for secondcycle Cycle 2 Off Time Off duration for second cycle Cycle 3 On Time Onduration for third cycle Cycle 3 Off Time Off duration for third cycleCycle 4 On Time On duration for fourth cycle Cycle 4 Off Time Offduration for fourth cycle Notes: 1) A maximum of four on-off cycles canbe specified. 2) Not all four cycles have to be used.Special Tone Cadence Download

The Special Tone Cadence Download command is used to download a SpecialTone cadence in the IT. This new Special Tone cadence will be used thenext time the IT receives the Tone On (Special Tone) command if thistone is set to use the downloadable cadence (see Tone Cadence Selectcommand).

Parameters: Cycle 1 On Time On duration for first cycle Cycle 1 Off TimeOff duration for first cycle Cycle 2 On Time On duration for secondcycle Cycle 2 Off Time Off duration for second cycle Notes: 1) A maximumof two on-off cycles can be specified. 2) Not all two cycles have to beused.Paging Tone Cadence Download

The Paging Tone Cadence Download command is used to download theconfiguration for the paging tone. The command is used to specify thetone frequency and On/Off duration of all the tones that make up thepaging tone. This new Paging Tone cadence will be used the next time theIT receives the Tone On (Paging Tone) command if this tone is set to usethe downloadable cadence (see Tone Cadence Select command).

Parameters: Cycle 1 Paging Tone Content Specifies the tone frequecies tobe used in the first cycle Cycle 1 On Time On duration for first cycleCycle 1 Off Time Off duration for first cycle Cycle 2 Paging ToneContent Specifies the tone frequecies to be used in the second cycleCycle 2 On Time On duration for second cycle Cycle 2 Off Time Offduration for second cycle Cycle 3 Paging Tone Content Specifies the tonefrequecies to be used in the third cycle Cycle 3 On Time On duration forthird cycle Cycle 3 Off Time Off duration for third cycle Notes: 1) Amaximum of three paging tone cycles can be specified. 2) Not all threecycles have to be used. 3) The paging tone frequency content isspecified for each cycleTransducer Based Tone Volume Level

The Transducer Based Tone Volume Level command is used to specify thevolume level for different transducer based tones. The volume is definedin steps from the lowest level of the volume range. If the volume levelspecified in the command is outside the volume range, the upper boundaryof the range will be used as the new volume level.

Parameters: Transducer Based Tone ID Alerting Special Tones Paging TonesTone Volume Specifies tone volume from lowest level of volume rangeAlerting Tone Test

The Alerting Tone Test command is used to start the alerting tone on theIT without changing the current selection of alerting. This command isusually used when the user selects the type of alerting. Only thewarbler can be selected.

Parameters: Warble Select Specifies the warble to use with the alertingtoneVisual Transducer Based Tones Enable

This command is used to configure the IT with respect to providingvisual tones feedback when it receives the Transducer Based Tone Oncommand.

Parameters: Visual Tones Enable/Disable Visual TonesStream Based Tone On

This command is used to inject a stream based tone into an audio stream.The actual parameters that define the stream based tone specified in thecommand can be set using the Stream Based Tone Configuration commandwhich is used to bind a cadence and a frequency component list with thetone.

Parameters: Stream Based Identifies the stream based tone to be Tone IDinjected in audio stream Stream ID Identifies the stream in which toinject the stream based tone Direction Rx Tx Tone Level Volume level atwhich the tone should be played out, in steps from minimum.Stream Based Tone Off

This command to stop the injection of the specified stream based tone inthe specified audio stream.

Parameters: Stream Based Identifies the stream based tone to be Tone IDstopped in audio stream Stream ID Identifies the stream in which toinject the stream based tone should be stopped Direction Rx TxStream Based Tone Configuration

This command is used to bind one of the 32 stream based tone cadencesand one of the 32 frequency component lists with a stream based tone.The next time the stream based tone referred to in the command is turnedon through the Stream Based Tone On command, it will use the cadence andfrequency component list specified in this command. The actual cadencesand frequency component lists can be modified through the Stream BasedTone Cadence Download and the Stream Based Tone Frequency Component ListDownload.

Parameters: Stream based Stream based tone to bind with cadence Tone IDin frequency component list specified in the command. Stream basedCadence to use next time stream based Tone Cadence ID tone specified incommand is turned on. Stream based Frequency components to use next timeTone Frequency stream based tone specified in Component List command isturned on.Stream Based Tone Frequency Component List Download

This command is used to reconfigure one of the 32 frequency componentlists available for stream based tones.

Parameters: Frequency Component 1 Specifies the frequency of the firstcomponent Frequency Component 2 Specifies the frequency of the secondcomponent Frequency Component 3 Specifies the frequency of the thirdcomponent Frequency Component 4 Specifies the frequency of the fourthcomponent Notes: 1) A maximum of four frequency components can bespecified. 2) Not all four components have to be used.Stream Based Tone Cadence Download

This command is used to reconfigure one of the 32 cadences available forstream based tones. The command specifies up to four On/Off durationpairs.

Parameters: Stream based Cadence to use next time stream based ToneCadence ID tone specified in command is turned on. Cycle 1 On Time Onduration for first cycle Cycle 1 Off Time Off duration for first cycleCycle 2 On Time On duration for second cycle Cycle 2 Off Time Offduration for second cycle Cycle 3 On Time On duration for third cycleCycle 3 Off Time Off duration for third cycle Cycle 4 On Time Onduration for fourth cycle Cycle 4 Off Time Off duration for fourth cycleNotes: 1) A maximum of four cycles can be specified. 2) Not all fourcomponents have to be used. 3) If the off time of cycle 1 is notspecified, the stream based tone will be played until it is turned offthrough the Stream Based Tone Off command.Select Adjustable Rx Volume

This command is used to select the Rx volume that will be affected bythe Change Adjustable Rx Volume command.

Parameters: Adjustable Rx none Volume Audio Parameters Bank 1 AudioParameters Bank 2 Audio Parameters Bank 3 Audio Parameters Bank 4 AudioParameters Bank 5 Audio Parameters Bank 6 Audio Parameters Bank 7Alerting Special Tones Paging TonesSet APB's Rx Volume Levels

The Set APB's Rx Volume Level command is used to specify the new CurrentRx Volume for the specified APB. The command can also force the DefaultRx Volume to be changed to the specified Current Rx Volume by settingthe Default flag. The volume level is specified as an offset in numberof steps from the system RLR for the path specified APB. This commandwill override volume control adjustments done by the user. This commandis intended to be used by the system to convey volume controladjustments made by the user in list based option controls.

Parameters: APB number none Audio Parameters Bank 1 Audio ParametersBank 2 Audio Parameters Bank 3 Audio Parameters Bank 4 Audio ParametersBank 5 Audio Parameters Bank 6 Audio Parameters Bank 7 RLR OffsetIndicates whether the offset is a positive or Direction a negativeoffset with respect to the APB's system RLR. Update Default Specifieswhether the default volume for the APB should be updated Rx VolumeSpecifies the volume offset in steps to be Level Offset applied to theAPB's system RLR.Change Adjustable Rx Volume

This command is used to increase or the decrease the receive volumeselected through the Select Adjustable Rx Volume command by one stepwithin the limits of its loss plan. This command is used when the volumeadjustments are performed by the NI instead of locally in the IT.

Parameters: Down One step quieter Up One step louderAdjust Default Rx Volume

This command is used to increase or decrease the Default Rx Volume valueof the specified Audio Parameters Bank (APB) or transducer based tone byone step within the limits of its loss plan. This command should be usedwhen the user increases or decreases the default Rx volume from anoption list. Also notice that this command will only change the defaultRx volume and not the system default value which is the RLR (downloadedvia the Receive Loudness Rating command) so the loss plan will not bechanged with this command.

Where Down One step quieter Up One step louder Default Rx Volume toChange none Audio Parameters Bank 1 Audio Parameters Bank 2 AudioParameters Bank 3 Audio Parameters Bank 4 Audio Parameters Bank 5 AudioParameters Bank 6 Audio Parameters Bank 7 Alerting Special Tones PagingTonesAdjust APB's Tx and/or STMR Volume Level

The Adjust APB's Tx and/or STMR command is sent by the NI to allow Txand STMR volume adjustments for different transducer types. It is usedto adjust the APB's Tx or STMR volume level, either increasing ordecreasing it by one step. The adjustment enable bits allow the NI toadjust both Tx and STMR volumes with a single command. Alternatively,either the STMR or Tx volumes can be adjusted individually. This commandis intended to be used for multi-vendor headset configuration.

Parameter APB number none Audio Parameters Bank 1 Audio Parameters Bank2 Audio Parameters Bank 3 Audio Parameters Bank 4 Audio Parameters Bank5 Audio Parameters Bank 6 Audio Parameters Bank 7 STMR Volume STMRvolume increase/decrease by Increment Direction one increment STMRVolume Enables/Disables volume adjustments Adjust Enable to be made tothe STMR path Tx Volume Increment Tx volume increase/decrease by oneDirection increment Tx Volume Adjust. Enables/Disables adjustments to beEnable made to the Tx pathQuery APB's Tx and/or STMR Volume Level

The Query APB's Tx and/or STMR command is sent by the NI to query thecurrent STMR and/or Tx volume level settings. This command is intendedto be used for multi-vendor headset configuration.

Parameters: APB number none Audio Parameters Bank 1 Audio ParametersBank 2 Audio Parameters Bank 3 Audio Parameters Bank 4 Audio ParametersBank 5 Audio Parameters Bank 6 Audio Parameters Bank 7 STMR Volume LevelRequest requests STMR volume level information from audio manager TxVolume Level Request requests Tx volume level information from audiomanagerABP Download

This command is used to download all the audio parameters (such as lossplan) associated with a specific audio parameter bank. The newparameters will be used the next time a voice call involving the ABP isset up. This command uses flags to indicate the presence (or absence) ofeach audio parameter.

Parameters: APB number Audio Parameters Bank 1 Audio Parameters Bank 2Audio Parameters Bank 3 Audio Parameters Bank 4 Audio Parameters Bank 5Audio Parameters Bank 6 Audio Parameters Bank 7 Switched Loss Amount ofSwitched Loss used by the Switching algorithm Step Size The volume stepsize Minimum Volume Minimum Volume relative to the RLR Automatic GainControl Specifies if AGC is implemented for this APB. Maximum VolumeMaximum Volume Relative to the RLR Receive Loudness Rating The RLR touse for this APB Return to Default Specifies if the volume control forthis APB is to operation in return to default mode Send Loudness RatingThe SLR to use for this APB SideTone Masking Rating The STMR to use forthis APBOpen Audio Stream

This command is used to set up full or half-duplex end-to-end RTP voicesessions between the IT and an IP connected far-end. This command isalso used to specify RTCP ports and DTMF support for the specified voicesession.

Parameters: Rx Stream ID Tells the IT which stream it must use as thedestination of voice data originating from the far end. Tx Stream IDTells the IT which stream it must use as the source of voice datadestined to the far-end. Rx Vocoder Type Specifies to type of vocoder touse to decode the Rx Stream. Tx Vocoder Type Specifies to type ofvocoder to use to encode the Tx Stream. Frames per Specifies how manyaudio frames are Packet contained in a single UDP packet ToS Minimizedelay Maximize throughput Maximize reliability Minimize monetary costNormal service Precedence Routine Priority Immediate Flash Flashoverride Critical Internetwork control Network control Tx DTMF This bitis used to indicate whether or not DTMF key pressed information will betransmitted as part of the voice session. Rx DTMF This bit is used toindicate whether or not DTMF key pressed information will be recieved aspart of the voice session. IT RTP Port Local UDP port to use fortransmitting and receiving voice data. IT RTCP Port Local UDP port touse for transmitting and receiving RTCP control messages. An RTCP portof “zero” means that the audio stream does not have an RTCP channel andthat the Far-End RTCP port field is a “don't care”. Far-End RTP PortFar-end UDP port to/from which the voice data should be sent/received.Far-End RTCP Far-end UDP port to/from which the Port RTCP controlmessages should be sent/received. Far-End IP Specifies the IP address ofthe end Address point that is at the other end of the RTP connection.Close Audio Stream

This command is used to kill audio voice sessions associated with thestream Ids specified in the payload of the command.

Parameters: Rx Stream ID Tells the IT which Rx stream it must terminateTx Stream ID Tells the IT which Tx stream it must terminateConnect Transducer

This command is used to cross-connect the transducers specified in thecommand with a quantity of streams in an uni-directional orbi-directional fashion. The actual streams referred to in this commandare created through the Open Audio Stream command. This command can alsobe used to assign an Audio Parameters Bank (APB) to the transducer pairdesignated in the command.

Parameters Transducer Pair ID Handset Headset HandsfreeSpeaker/Microphone All Transducer Pairs Stream ID ID of the stream toconnect to the transducer specified in the command. Tx Enable Streamsspecified in the command are connected the microphone of the designatedtransducer pair. Rx Enable Streams specified in the command areconnected the speaker of the designated transducer pair. APB Specifiesif an APB is to be used in conjuction with the specified transducer pairSidetone Specifies if sidetone is enabled for transducer pair specifiedin command Destructive/Additive Specifies whether this command shouldaugment or replace transducers that were connected to the streams listedin the command prior to its reception. APB number none Audio ParametersBank 1 Audio Parameters Bank 2 Audio Parameters Bank 3 Audio ParametersBank 4 Audio Parameters Bank 5 Audio Parameters Bank 6 Audio ParametersBank 7Frequency Response Specification

The Frequency Response Specification command specifies the filterbuilding blocks to be used to implement the desired frequency responsefor a given transducer. The command is used by the IT to fill in afrequency response specification table, specifying which filters need tobe set up for a given transducer. The Frequency Response Specificationcommand contains a list of filter numbers which correspond to predefinedfilter building blocks in the IT. Each filter ID will program apredefined number of biquadratic sections (biquads). The biquad ID fieldspecifies the first biquad to be used for implementing the filter. TheFilter Gain Compensation is sent as part of the Frequency ResponseSpecification. The Filter Gain Compensation specifies a gain adjustmentto compensate for any deviation from the Loudness Rating (LR) caused bythe filter shape specified by the frequency response specification. Boththe Rx and Tx FGC values must be provided each and every time thiscommand is sent.

Parameters: Transducer ID Handset Headset Handsfree Speaker/MicrophoneRx Filter Count number of new filter in the Rx direction Tx Filter Countnumber of new filter in the Tx Starting BQ ID ID of the first biquad touse for implementing the filter. Rx/Tx Filter ID Filter Id as specifiedin the functional description. Notes: 1) The number of Rx and Tx FilterID bytes must match the filter count provided in the first data byte. 2)Each filter occupies a certain number of biquads. The NI should knowexactly the number of biquads each filter occupies in order to fill upthe biquads in the IT correctly.Biquad Download

The Biquad Download command is used to adjust the IT frequency responseby downloading new set of coefficients for a specific biquad. The nexttime the IT will program the biquads, it will use the new set ofcoefficients. The downloaded biquad can be selected using the FrequencyResponse Specification command. Each biquad takes five coefficients, B0,B1, B2, A1 and A2.

Biquad ID Biquad Identifier Parameters: B0 Coefficient B0 B1 CoefficientB1 B2 Coefficient B2 A1 Coefficient A1 A2 Coefficient A2Voice Switching Configuration

This command is used to download the voice switching parametersassociated with a specific transducer. These parameters will be used thenext time the voice switching is enabled.

Note that unlike the Connect Transducer command, there is no need forthe Transducer Direction bit since the command specifies frequencyresponses for both the receive and transmit transducers. For eachreceive transducer specified in the Tranducer ID field, the command willalso be used to configure its transmit-side counterpart.

Parameters: Transducer ID Handset Headset Handsfree Speaker/MicrophoneAGC Threshold Input threshold for application of AGC Rx Virtual Pad Txblocking margin of the switching algorithm Dialtone threshold Inputthreshold for considering a dialtone Tx Virtual Pad Rx blocking marginof the switching algorithm Echo Mute Enable Enable/Disable talker echomuting Dynamic Sidetone Enable/Disable sidetone variation Enable basedon noise floorQuery RTCP Statistics

This command is used by the NI to request RTCP data gathered in themedia session associated with the stream ID specified.

Parameters: Stream ID ID of the stream to be queried Stream Direction RxTx IT Packet Count Requests the total number of packets sent by the ITin the session up to this point IT Octet Count Requests the total numberof octets sent by the IT in the session up to this point InterarrivalJitter Requests an estimate of the statistical variance of the delaybetween each received media packets Fraction Lost Requests the fractionof media packets lost as reported in the last RTCP packet Total PacketLoss Requests the total number of lost packets since the beginning ofthe media sessionVocoder Configuration

This command is used to configure parameters that are associated withthe vocoder specified in the command. The command contains a field thatidentifies the vocoder to modify followed by a list of new parametersettings. Note that not all vocoders support the entire listconfigurable parameters.

Parameters: Vocoder Type Specifies the vocoder on which to apply theparameter settings Direction Rx Tx Both Voice Activity DetectionEnable/Disable Bad Frame Interpolation Algorithm Enable/Disable PostFilter Enable/Disable High Pass Filter Enable/Disable Frame SizeSpecifies number of bytes per frameJitter Buffer Configuration

This command is used to configure parameters that are associated withthe jitter buffer of the specified stream.

Parameters: Stream ID ID of the stream to associated with the jitterbuffer to be configured. Jitter Buffer Maximum number of frames injitter Maximum Size buffer beyond which uncontrolled frame loss willoccur. Desired Jitter Desired number of frames in jitter buffer. Whencontrolled frame deletion occurs, enough frames will be deleted to reachthis number. High Water Mark Threshold number of frames in jitter bufferat which point controlled frame deletion will occur.IT to NI Audio Commands

-   -   Handset connected    -   Handset disconnected    -   Headset connected    -   Headset disconnected    -   Supervisor Headset connected    -   Supervisor Headset disconnected    -   Headset Rfeature Key Pressed    -   Audio Manager Attributes info    -   Audio Manager Options Report    -   Adjustable Rx Volume Report    -   Adjustable Rx Volume Information    -   APB's Default Rx Volume Value    -   Alerting Tone Select    -   APB's Tx and/or STMR Response    -   RTCP Statistics Report    -   Open Audio Stream Report        Handset Connected

The Handset Connected command is sent to the NI when a handset isdetected in the handset port of the IT.

Parameters: Handset Type Specifies the type of handset detectedHandset Disconnected

The Handset Disconnected command is sent to the NI when the handset isdisconnected from the handset port of the IT.

Headset Connected

The Headset Connected command, is sent to the NI when a headset isdetected in the headset port of a so equipped IT

Headset Disconnected

The Headset Disconnected command is sent to the NI when the headset isdisconnected from the headset port.

Supervisor Headset Connected

The Supervisor Headset Connected command is sent to the NI when thesupervisor headset is detected on the supervisor headset port of a soequipped IT.

Supervisor Headset Disconnected

The Supervisor Headset Disconnected command is sent to the NI when thesupervisor headset is disconnected from the supervisor headset port.

Headset Rfeature Key Pressed

The Headset Rfeature Key Pressed command is sent to the NI in responseto the IT receiving the predefined headset based feature key event onthe headset port. The transmission of this message is enabled by theAudio Manager Options (Headset Rfeature Key Message) command.

Audio Manager Attributes Info

This command is used in response of the Query Attributes command toinform the NI of all the attributes that the Audio manager has.

Parameters: Handsfree Handsfree supported Supported Vocoders List of allvocoders supported by the IT.Audio Manager Options Report

This command is sent after reception of the Audio Manager Query(Options) command. It informs the NI of the Audio manager's optionsetup.

Parameters: Volume Adjustment Remote: volume adjusted by the NI Local:volume adjusted by IT Volume Adjustment Enable/Disable the transmissionof Reports volume adjustment reports when volume keys are depressedHeadset Rfeature Enable/Disable the transmission of Key Message HeadsetRfeature Key message when key event is detected on headset interface.Adjustable Rx Volume Report

This command is sent to the NI after a volume key has been depressed andthe “Volume Adjustment Reports” option has been enabled via the AudioManager Options command. The command shows which volume key has beendepressed and if it caused the rx volume reach its “floor” or “ceiling”.The NI could use this information to display a visual representation ofthe volume adjustment to the user.

Parameters: Volume ID none Audio Parameters Bank 1 Audio Parameters Bank2 Audio Parameters Bank 3 Audio Parameters Bank 4 Audio Parameters Bank5 Audio Parameters Bank 6 Audio Parameters Bank 7 Alerting Special TonesPaging Tones Steam Based Tones Vol. Down Indicates that the volume downkey has been depressed. Vol. Up Indicates that the volume up key hasbeen depressed. Floor Indicates that the volume setting of the specified.volume register has decreased to the “floor” Ceiling Indicates that thevolume setting of the specified .volume register has increased to the“ceiling”Adjustable Rx Volume Information

This command is used to inform the NI of the active Rx volume registerin the IT. It contains the APB or transducer based tone number, itscurrent Rx volume setting and volume range as well as the floor ceilingindications. This command is sent generally after reception of the QueryAudio Manager (Adjustable Rx Volume) command

Parameters: Active Volume ID none Audio Parameters Bank 1 AudioParameters Bank 2 Audio Parameters Bank 3 Audio Parameters Bank 4 AudioParameters Bank 5 Audio Parameters Bank 6 Audio Parameters Bank 7Alerting Special Tones Paging Tones Stream Based Tones Floor Indicatesthat the volume setting of the specified .volume register is at its“floor”. Ceiling Indicates that the volume setting of the specified.volume register is at its “ceiling”. Rx Volume Level Current setting ofthe specified volume register. Rx Volume Range Range of the specifiedvolume register.APB Default Rx Volume Value

The Audio Parameters Bank Default Rx Volume Value command is used inresponse to the Query Audio Manager (APB Default Rx Volume) command. Itgives the default Rx volume level of the specified APB. It contains theAPB number, the default volume setting of the APB, the floor ceilingindicators.

Parameters: APB Identifier none Audio Parameters Bank 1 Audio ParametersBank 2 Audio Parameters Bank 3 Audio Parameters Bank 4 Audio ParametersBank 5 Audio Parameters Bank 6 Audio Parameters Bank 7 Alerting SpecialTones Paging Tones Stream Based Tones Floor Indicates that the volumesetting of the specified .volume register is at its “floor”. CeilingIndicates that the volume setting of the specified .volume register isat its “ceiling”. Default Volume Default volume of the specified volumeLevel register. Volume Range Range of the specified volume register.Alerting Tone Select

This command is used in response to the Query Audio Manager (Alerting)command. The alerting information as well as the warble rate selectionare sent as part of this command. The format of the command as follows.

Parameters: Alerting Cadence Selection cadence 0 cadence 1 cadence 2cadence 3 cadence 4 cadence 5 cadence 6 downloadable cadence WarblerSelect Specifies warble selectedAPB's Tx and/or STMR Response

The Query APB's Tx and/or STMR response is sent by the IT in response tothe corresponding query command. The response sent by the IT indicatesthe current STMR and/or Tx volume level setting for the specified APBnumber.

Parameters: APB number none Audio Parameters Bank 1 Audio ParametersBank 2 Audio Parameters Bank 3 Audio Parameters Bank 4 Audio ParametersBank 5 Audio Parameters Bank 6 Audio Parameters Bank 7 Tx Vol Levelcurrent Tx volume level for the specified APB STMR Vol. Level currentSTMR volume level for the specified APBRTCP Statistics Report

This command is sent in response to the Query RTCP Statistics commandsent by the NI.

Parameters: IT Packet Count Total number of packets sent by the IT inthe session up to this point. IT Octet Count Total number of octets sentby the IT in the session up to this point. Interarrival Jitter Estimateof the statistical variance of the delay between each received mediapacket. Fraction Lost Fraction of media packets lost as reported in thelast RTCP packet. Total Packet Lost Total number of lost packets sincethe beginning of the media session.Open Audio Stream Report

The IT automatically sends this command to the NI after it receives anOpen Audio Stream command. The command reports on the status of thestream created by the Open Audio Stream command.

Parameters: Status Code Stream opened successfully Operation failed -RTP port not available Operation failed - RTCP port not availableDisplay Manager

The main task of the display manager is to present the information sentby the NI on the LCD. The NI does not have to know the physical locationof where the information is presented. Another big task of the displaymanager is to maintain the configuration tables for the multi-languagecharacter tables.

NI to IT Display Commands

-   -   Page Scroll    -   Restore Default Character Table Configuration    -   Display Backlight Control    -   Arrow    -   Query Status Bar Icon    -   Highlight On/Off    -   Restore Time and Date    -   Clear Time and Date    -   Call Duration Timer    -   Query Display Manager    -   Download Call Duration Timer Delay    -   Disable Display Field    -   Clear Field    -   Cursor Control    -   Page Download    -   Display Scroll with Data    -   Status Bar Icon Update    -   Month Label Download    -   Call Timer Label Download    -   Time and Date Format    -   Display Data Write    -   Context Info Bar Format    -   Set Default Character Table Configuration    -   Set Current Character Table Configuration    -   Special Character Download    -   Highlighted Field Definition    -   Contrast    -   Caller Log Download        Page Scroll

This command is used to scroll up or down one page of display. Thiscommand assumes that the information of the page to scroll to is alreadydownloaded in the IT.

Restore Default Character Table Configuration

This command is used to restore the character table configuration of thedisplay to the one downloaded through the Set Default Character TableConfiguration command. The G1, G2 and G3 tables will contain thecharacter sets specified by the default configuration and one of the Gtable will be lock-shifted (code A0 to FF hex).

Display Backlight Control

This command is used to turn on and off the display backlight. Thiscould be used in power saving mode when back lighting is supported bythe IT.

Parameters: Backlight Turn Backlight on or offArrow

This command turns on or off the dedicated arrow fields on the display.

Parameters: Left Turn Left arrow on or off Right Turn Right arrow on oroff Up Turn Up arrow on or off Down Turn Down arrow on or offQuery Status Bar Icon

This command is used to query the state of a specific icon in the statusbar. The IT will reply with the Status Bar Icon State command specifyingthe state of the queried icon.

Parameters: Status Bar Icon ID Specifies the status bar icon to bequeriedHighlight On/Off

This command is used to turn on or off the highlight on the display.When the highlight is turned on, the field that is specified by theHighlighted Field Definition command will be highlighted.

Parameters: Highlight Turn Highlight on or offRestore Time and Date

This command is used to revert the effect of the Clear Time and Date andCaller Log Download commands by restoring the time and date in the time& date fields of the IT. The time and date or the call durationinformation, whichever was the last one active prior to receipt of aClear Time and Date command or the Caller Log Download command, will beshown in the time and date field.

Clear Time and Date

This command clears the time and date fields and inhibits the update ofthe fields with the time and date information. The time and dateinformation is still kept in the IT in case it is restored with aRestore Time & Date command.

Call Duration Timer

This command is used to configure the call duration timer. Through thiscommand, the call duration timer can be started or stopped, reset, shownor hidden, with or without a delay.

Parameters: Function Start Stop Reset Resets the Timer Display Show HideDelay None Action specified by Display bit executed after Call DurationTimer DelayQuery Display Manager

The Query Display Manager command is sent by the NI to request variousstatus information from the Display manager. The format of the commandis as follows.

Para- Attributes requests the Attributes Info command to be sent.meters: TAD requests the Time and Date Format command to be sent. Cursorrequests the Cursor Location command to be sent. Contrast requests theContrast Level command to be sent. Backlight requests the BacklightStatus Info command to be sent. Highlight requests the Highlight Statuscommand to be sent. Current requests the Current Character TableCharacter Configuration Status command to be sent. Table Defaultrequests the Default Character Table Configuration Character Statuscommand to be sent. TableDownload Call Duration Timer Delay

The Download Call Duration Timer Delay command is used to specify thedelay to be used by the Call Duration Timer command when the Delayoption is selected in the Call Duration Timer command.

Parameters: Call Duration Timer specifies the delay duration of callDelay duration timer.Disable Display Field

The Disable Display Field command is used to enable and disable fieldsof the LCD. When a field is disabled it becomes blank until it isre-enabled. However, if the NI writes data to a disabled field, the datawill be stored in the IT and will become visible on the LCD once it isre-enabled. All fields that have their corresponding bit set will bedisabled and all others with their bit cleared will be enabled.

Parameters: Numeric Enable/Disable Numeric Index Field in the Info BarContext Enable/Disable Context Field in the Info Bar Date Enable/DisableDate Field Time Enable/Disable Time Field Line X Enable/Disable Line XSoftkey Y Enable/Disable Softkey Y All Enable/Disable all fieldsClear Field

This command is used to erase fields of the LCD. Many portion of thedisplay can be cleared at the same time. Once a field is cleared, thedata it contained is lost and cannot be re-displayed on the field unlessre-downloaded by the IT.

Parameters: Numeric Clear Numeric Index Field in the Info Bar ContextClear Context Field in the Info Bar Date Clear Date Field Time ClearTime Field Line X Clear Line X Softkey Y Clear Softkey Y All Clear allfieldsCursor Control

This command is used to activate, configure and move the cursor on thedisplay.

Parameters: Cursor Movement Set cursor at home (first character on thefirst text line) Set cursor at the specified position within thespecified field Move the cursor by one to the left Move the cursor byone to the right Move the cursor a specified number of positions to theleft Move the cursor a specified number of positions to the right CursorState ON OFF Blink Field Numeric Line SoftKey Softkey ID The Softkey IDwhen field specifies softkey Line Number Line number when fieldspecifies line. Character Position of the cursor in the specifiedPosition field (zero being the first position within the field) PositionDelta Specifies number of positions left or right to move cursorPage Download

This command downloads portions of next up or next down page in the IT.A portion can be any field that characterizes the display, i.e., line,softkey, etc.

Parmeters: Field Softkey Line Line Number Specifies line number whenLine field is specified Softkey ID Specifies softkey when Softkey fieldis specified Character Position Specifies starting character positionwhen Line field is specified Display Data Data to be written tospecified field and positionDisplay Scroll with Data

This command is used to download a new line of text and to scroll theothers up or down. This command only affects the line fields of thedisplay. This command cannot download more than one new line of text atthe time.

Parameters: Scroll Direction Down: Place text data on first line andscroll others down Up: Place text data on last line scroll others upDisplay Data Data to be writtenStatus Bar Icon Update

This command is used to change to current state and cadence of a statusbar icon.

Parameters: Status Bar Icon ID specifies the status bar icon to beupdated Icon State specifies desired state of icon Icon Cadence Off OnFlash Flicker Wink Twinkle Blink Downloadable cadenceMonth Labels Download

This command is used to download the label for the current and nextmonths. These labels are used in the date field and enable the date toroll over to next month.

Parameters: Current Month Label Text string representing current monthNext Month Label Text string representing next monthCall Duration Timer Label Download

This command is used to download the call duration timer label whichwill be displayed on the IT's display when the call duration timer isactivated.

Parameters: Call Duration Timer Label Text string representing callduration timer labelTime and Date Format

This command is used to specify the format that the Display manager willuse to present the time and the date information to the user.

Parameters: Time Format 12-hour clock (e.g. 10:34 pm) French clock (e.g.22 h 34) 24-hour clock (e.g. 22:34) Date Format day first (e.g. 16 Sep)month first (e.g. Sep 16) numeric standard (e.g. 09/16) numeric inverse(e.g. 16/09) Notes: 1) For the day-first and for the month-firstformats, the month label has to be downloaded, via the Month LabelDownload command.Display Data Write

This command is used as a generic command for writing to the display. Itis composed of four parts: the address, the control, the tag and thedata. Three of these parts, the address, the control, and the tag, areoptional. The display data part is mandatory. The address byte is usedto specify where the text to write starts. If no address is specified,the data will start at the current cursor position. The tag field isused to give a meaning to the attached text (directory, CLID, etc.). Thecontrol field is used to control characteristics of the display. If thecontrol field is not present, the default control setup will be used.

Parameters: Address Field Numeric Context Line SoftLabelKey Softkey LineNumber Specifies line number when Line field is specified SoftLabelKeyID Specifies soft labelled key when Soft Labeled Key field is specifiedSoftkey ID Specifies softkey when Softkey field is specified CharacterSpecifies starting character position Position when Line field isspecified Control Cursor Movement None Cursor moves to end of new textClear Left Clears the text at the left of the active position beforewriting the new text. Clear Right Clears the text at the right of theactive position before writing the new text. Shift Left Shifts text atthe specified position to the left when writing new text. Shift RightShifts text at the specified position to the right when writing newtext. Highlight Highlights new text Extended Height Displays new text inextended height format Tag Tag Data Non displayed data indicatingpurpose of data Data Display Data Data to be displayed per commandContext Info Bar Format

This command is used to specify the format of the Context Info barfield. The supported formats are the ones specified in the functionaldescription of the IT in question.

Parameters: Format none Underline Overline Marquee Border Reverse-videoReverse-video with border Field Numeric Context Date TimeSet Default Character Table Configuration

This command downloads the default character map configuration that thedisplay manager must use. It specifies the mapping of the charactertable to the graphics tables and it also specifies which one of thegraphics table is to be lock-shifted (code A0 to FF hex).

Parameters: Default Character Data representing Default TableConfiguration character table configurationSet Current Character Table Configuration

This command downloads the current character map configuration that thedisplay manager must use. It specifies the mapping of the charactertable to the graphics tables and it also specifies which one of thegraphics table is to be lock-shifted (code A0 to FF hex).

Parameters: Default Character Table Data representing DefaultConfiguration character table configurationSpecial Character Download

This command is used to download special characters that are notspecified in the character ROM tables of the IT. In the command, thespecial character address is specified as well as bitmap.

Parameters: Character ID identifies character to be downloaded BitmapData data defining the characterHighlighted Field Definition

This command is used to highlight a portion of the display.

Parameters: Field Numeric Context Line SoftKey Line Number Line numberwhen field specifies line. Softkey ID The Softkey ID when fieldspecifies softkey Starting Position Starting character position of thehighlighted portion. Ending Position Ending character position of thehighlighted portion.Contrast

This command sets the contrast level.

Parameters: Contrast Specifies contrast level to be setCaller Log Download

This command is used to update the time and date fields with adownloaded time and text label instead of the usual time and dateinformation.

Parameters: Hour Specifies hour Minutes Specifies minutes Text LabelText data to be written to the Date fieldIT to NI Display Commands

-   -   Display Manager Attributes Info    -   Contrast Level Report    -   Cursor Location Report    -   Highlight Status On    -   Current Character Table Configuration Status    -   Default Character Table Configuration Status    -   Time and Date Format Report    -   Status Bar Icon State Report    -   Backlight Status    -   Highlight Status Off        Display Manager Attributes Info

This command is used in response to the Query Display Manager(Attributes) command.

Parameters: Line Width The width of the text area lines expressed incharacters Lines Number of lines in the text area Line Icon When set, itindicates that an icon is associated with each line in the text area ofthe display Softkey Width The width of the softkeys expressed incharacters. Softkeys Number of softkeys Soft Labeled Key Width The widthof the Soft-Labeled key area expressed in characters. Soft Labeled KeysNumber of soft labeled keys Context Field Width The width of the contextfield expressed in characters. Numeric Width Number of digit supportedin the numeric index field. Time Width Number of Character supported inthe time field. Date Width Number of Character supported in the datefield. Character Download Number of downloadable characters. Free FormIcon Download Number of downloadable free form icons Character sets Listof supported character setsContrast Level Report

This command is used in response to the Query Display Manager (Contrast)command. It gives the current display contrast level. The level is setby the NI with the Contrast command.

Parameters: Contrast Level Current setting of display contrastCursor Location Report

This command is used in response to the Query Display Manager (Cursor)command. It gives the position of the cursor on the display.

Parameters: Field Numeric Line SoftKey Softkey ID The Softkey ID whenfield specifies softkey Line Number Line number when field specifiesline. Character Position of the cursor in the specified field Position(zero being the first position within the field)Highlight Status On

This command is used in response to the Query Display Manager(Highlight) command when the highlight feature is on. The commanddefines the display area that is currently highlighted.

Parameters: Field Numeric Context Line SoftKey Line Number Line numberwhen field specifies line. Softkey ID The Softkey ID when fieldspecifies softkey Starting Starting character position of thehighlighted Position portion. Ending Ending character position of thehighlighted Position portion.Current Character Table Configuration Status

The Current Character Table Configuration Status command is used inresponse to the Query Display Manager (Current Config) command. Itinforms the NI about the current character table configuration of thedisplay manager.

Parameters: Contrast Level Current contrast setting Current CharacterTable Data representing current Confuration character tableconfigurationDefault Character Table Configuration Status

The Default Character Table Configuration Status command is used inresponse to the Query Display Manager (Default Config) command. Itinforms the NI about the default character table configuration of thedisplay manager.

Parameters: Contrast Level Current contrast setting Default CharacterTable Data representing default Confuration character tableconfigurationTime and Date Format Report

The Time and Date Format command is used in response to the QueryDisplay Manager (TAD) command. It reports on the format that the IT usesto present the time and date information to the user.

Parameters: Time Format 12-hour clock (e.g. 10:34pm) French clock (e.g.22h34) 24-hour clock (e.g. 22:34) Date Format day first (e.g. 16Sep)month first (e.g. Sep16) numeric standard (e.g. 09/16) numeric inverse(e.g. 16/09)Status Bar Icon State Report

This command is used in response to the Query Display Manager (Icon)command. It gives the current state and cadence of the selected statusbar icon.

Parameters: Status Bar Icon ID specifies the status bar icon to beupdated Icon State specifies desired state of icon Icon Cadence Off OnFlash Flicker Wink Twinkle Blink Downloadable cadenceBacklight Status

This command is used in response to the Query Display Manager(Backlight) command. It gives the current state of the backlight. Thebacklight is controlled by the NI with the Display Backlight Controlcommand.

Parameters: Backlight Status On OffHighlight Status Off

This command is used to respond to the Query Display Manager (Highlight)command when the status of the highlight is off.

COMMAND SUMMARY

TABLE 1 Broadcast Manager Commands NI to IT IT to NI Logical Icon UpdateTime and Data Download Set Default Character Table Configuration

TABLE 2 Network Manager Commands NI to IT IT to NI Soft Reset Soft ResetAck Hard Reset Sanity OK Query Network Manager Network ManagerAttributes info Network Manager Options Network Manager Diagnostic InfoControl Channel QoS Configuration Manager Ids Reserve UDP Port BlockNetwork Manager Options Report Server Identification Tag ResumeConnection With Server Set RTCP Source Description Items SuspendConnection With Server Protocol Switch Reserved UDP Ports ReportDownload Backup Server Copyright Text Information Server Switch ServerAlarm

TABLE 3 Basic Manager Commands NI to IT IT to NI Start Selftest BasicManager Attributes Info Query Basic Manager Basic Manager Options ReportBasic Manager Options F/W version General Read/Write IT Type EepromWrite Selftest result Encapsulate Command General Read Response HardwareID Product Engineering Code

TABLE 4 Key/Indicator Manager Commands NI to IT IT to NI LED Update KeyEvent Query Hookswitch LED Status Report User Activity Timer On hookDownloadable Free Form Off hook Icon Access Query Key/Indicator ManagerUser Activity Timer Expired Key/Indicator Manager Options HookswitchState Logical Icon Mapping Key/Indicator Manager Attributes info KeyRepeat Timer Download Key/Indicator Manager Options Report Query LEDState IT Icon Status Report Query IT Icon State Indicator CadenceDownload User Activity Timer Download Free Form Icon Download IT IconUpdate

TABLE 5 Audio Manager Commands NI to IT IT to NI Query Audio ManagerHandset connected Query Supervisor Headset Status Handset disconnectedAudio Manager Options Headset connected Mute/unmute Headset disconnectedTransducer Based Tone On Supervisor Headset connected Transducer BasedTone Off Supervisor Headset disconnected Alerting Tone ConfigurationHeadset Feature Key Pressed Special Tone Configuration Audio ManagerAttributes info Paging Tone Configuration Audio Manager Options ReportAlerting Tone Cadence Download Adjustable Rx Volume Report Special ToneCadence Download Adjustable Rx Volume Information Paging Tone CadenceDownload APB's Default Rx Volume Value Transducer Based Tone VolumeLevel Alerting Tone Select Alerting Tone Test APB's Tx and/or STMRResponse Visual Transducer Based Tones Enable RTCP Statistics ReportStream Based Tone On Open Audio Stream Report Stream Based Tone OffStream Based Tone Configuration Stream Based Tone Frequency ComponentList Download Stream Based Tone Cadence Download Select Adjustable RxVolume Set APB's Rx Volume Levels Change Adjustable Rx Volume AdjustDefault Rx Volume Adjust APB's Tx and/or STMR Volume Level Query APB'sTx and/or STMR Volume Level ABP Download Open Audio Stream Close AudioStream Connect Transducer Frequency Response Specification BiquadDownload Voice Switching Configuration Query RTCP Statistics VocoderConfiguration Jitter Buffer Configuration

TABLE 6 Display Manager Commands NI to IT IT to NI Page Scroll DisplayManager Attributes Info Restore Default Character Contrast Level ReportTable Configuration Display Backlight Control Cursor Location ReportArrow Highlight Status On Query Status Bar Icon Current Character TableConfiguration Status Highlight On/Off Default Character TableConfiguration Status Restore Time and Date Time and Date Format ReportClear Time and Date Status Bar Icon State Report Call Duration TimerBacklight Status Query Display Manager Highlight Status Off DownloadCall Duration Timer Delay Disable Display Field Clear Field CursorControl Page Download Display Scroll with Data Status Bar Icon UpdateMonth Label Download Call Timer Label Download Time and Date FormatDisplay Data Write Context Info Bar Format Set Default Character TableConfiguration Set Current Character Table Configuration SpecialCharacter Download Highlighted Field Definition Contrast Caller LogDownload

1. An apparatus for facilitating provision of services in an IP datanetwork for a data network telephone, the apparatus comprising: anetwork intelligence for communicating IP messages to the data networktelephone over the IP data network and facilitating provision ofservices for the data network telephone; and wherein the networkintelligence comprises a first service proxy launched in response to afirst input received at the data network telephone based uponinformation in a first configuration data structure associated with thedata network telephone, the first service proxy operable for setting upa first service between a first data source and the data networktelephone, and wherein the first configuration data structure correlatesuser input elements from the data network telephone with functions. 2.The network intelligence of claim 1 wherein the network intelligence isprovisioned with software for implementing a one of an H.323 protocoland a Session Initiation Protocol.
 3. The network intelligence of claim1 wherein the network intelligence is arranged for connection to aplurality of data network telephones of a first data network runningunder a first protocol and wherein the network intelligence is arrangedfor connection to a second network running under a second protocol. 4.The network intelligence of claim 3 wherein the first data network is aninternet protocol network.
 5. The network intelligence of claim 4wherein the second network is a wireless network.
 6. The networkintelligence of claim 1 wherein the first service proxy is arranged forsetting up a one of an audio streaming service.
 7. The networkintelligence of claim 1 wherein the first service proxy is arranged forsetting up a directory number locating service.
 8. The networkintelligence of claim 1 wherein the first service proxy is arranged forsetting up a map navigation service.
 9. The network intelligence ofclaim 1 wherein the first service proxy is arranged for setting up aweather information service.
 10. The network intelligence of claim 1wherein the first service proxy is arranged for setting up a ShortMessaging service.
 11. The network intelligence of claim 1 wherein thefirst service proxy is arranged for setting up an event notificationservice.
 12. The network intelligence of claim 1 wherein the firstservice proxy is arranged for setting up a speech recognition service.13. The network intelligence of claim 1 wherein the first service proxyis arranged for providing an e-mail service.
 14. The networkintelligence of claim 1 wherein the first service proxy is provisionedwith HTML capability.
 15. The network intelligence of claim 1 whereinthe network intelligence further comprises a second service proxylaunched in response to a second input received at the data networktelephone based upon information in a second configuration datastructure associated with the data network telephone, the second serviceproxy operable for setting up a second service between a second datasource and the data network telephone.
 16. An apparatus for facilitatingprovision of services in an IP data network for a data networktelephone, the apparatus comprising: a network intelligence forcommunicating IP messages to the data network telephone over the IP datanetwork and facilitating provision of services for the data networktelephone; wherein the network intelligence comprises a first serviceproxy launched in response to a first input received at the data networktelephone based upon information in a first configuration data structureassociated with the data network telephone, the first service proxyoperable for setting up a first service between a first data source andthe data network telephone; and a plurality of configuration datastructures for each of a plurality of data network telephones, eachconfiguration data structure for a given one of the plurality oftelephones correlating user input elements of the given telephone withfunctions.
 17. The network intelligence of claim 16 wherein the userinput elements comprise key press indications.
 18. A method forfacilitating provision of services in an IP data network for a datanetwork telephone, the method comprising: communicating IP messages tothe data network telephone over the LP data network; and facilitating afirst service between a first data source and the data networktelephone, comprising launching a first service proxy in response to afirst input received at the data network telephone based uponinformation in a first configuration data structure associated with thedata network telephone, and wherein the first configuration datastructure correlates user input elements from the data network telephonewith functions.