Home
[ -- Zed-3. GTXT Software for the GS8 Modular Gateway, User`s
Contents
1. A AA ac ACD ACL AES ALG ANI ANM API ARP ASCII B2BUA b s B s BHCA CAS CDR CHAP CID CLID CND CNG CO Ampere auto attendant alternating current automatic call distributor access control list advanced encryption standard application level gateway automatic number identification answer message application programming interface address resolution protocol American standard code for information interchange back to back user agent bit byte bits per second bytes per second busy hour call attempts channel associated signaling call detail recording challenge handshake authentication protocol caller identification calling line identification calling number delivery comfort noise generator central office 51 SE System User s Manual CODEC CoS CPE CRM CSID CSV CT CTI dB dc DHCP DID DMZ DND DN DNS DSCP DSP DTMF E1 EMC EMI ENUM EPABX ESD ETSI FCC ft FODN FTP FXO FXS GB Gb s GMT coder decoder class of service customer premises equipment customer relations management fax sender ID comma separated variable computer telephony computer telephony integration decibel direct current dynamic host configuration protocol direct inward dial de militarized zone do not disturb domain name domain name service differentiated services code point digital signal processor dual tone multi frequency digital signal level 1 specified by ITU T
2. 1 2 1 3 1 4 Basic Functionality The GTXT application works with the GS8 modular gateway to be able to send and receive SMS messages It is a graphical user interface that can be used to senda message immediately senda message at a predetermined time a schedule send a message where the contents are extracted from a database and at a time that depends on a change of data in the database a link receive a message sent to you as a reply to an earlier message that you had sent receive all messages sent to the GS8 modular gateway You can send and receive ASCII messages 160 characters per message or Unicode messages 72 characters per message GTXT operates with or without Microsoft Outlook When you use GTXT without Outlook you can send messages to contacts that are stored in a local file You can easily add edit and delete those contacts and create different files for these contacts When you use GTXT with Outlook you can send messages to contacts stored in your Outlook contact files as well as to contacts stored in your local files GTXT saves incoming and outgoing messages in Outlook data files Installation This application runs under Windows XP SP3 and Windows Vista SP1 It works in conjunction wit Outlook 2003 and Outlook 2007 It operates on PCs with a single or dual monitor Unzip the application and run setup exe GTXT uses the Microsoft NET Framework This is Microsoft s programming model fo
3. 4 If you selected Unconditionally or Program in step 2 above GTXT displays a list of the fields in the database You can make no changes to this pane This is shown below x Name of this link Car is ready x Fields Field Name Field Type b int 3 Car Make varchar 20 Car Model varchar 20 Name of Owner varchar 30 Mobile Number varchar 12 Status varchar 20 Repair Cost varchar 10 Date varchar 30 Time varchar 10 Save Cancel 27 GTXT User s Manual 5 If you selected On Conditions in step 2 above GTXT displays a list of the fields in the database and you can decide under what conditions GTXT will send the message An example is shown below Link to Database xl Name of this link Car is ready x Fields For the Expression you can type lt gt lt or gt LIKE NOT LIKE Type the value in the same row Press Enter after you write each expression or value Sous You can create multiple conditions All conditions must be true for GTXT to send the message 10 Click on the Preview tab 11 GTXT shows you those entries in the database that match all the conditions if any that you have configured in step 6 and step 7 above 28 6 Linking to a Database 6 2 3 Writing Back to the Database 1 Click on Write back GTXT shows a window as follows x Name of this link Car is ready x Write
4. 2 048 Mb s electromagnetic compatibility electromagnetic interference E 164 number electronic private automatic branch exchange electrostatic discharge European Telecommunication Standards Institute Federal Communications Commission feet fully qualified domain name file transfer protocol foreign exchange office analog subscriber side interface foreign exchange subscriber analog exchange side interface giga byte 1 073 741 824 bytes giga bits per second Greenwich Mean Time 52 C Acronyms GND GSM GUI HA HDLC HTML HTTP I O ICMP IE IETF IGMP IGP in IP IPSec IPv4 IPv6 ISDN ISO ISP ITSP ITU IVR KB kb s kHz km kW L2TP LAN ground global system for mobile communications graphical user interface hour s high availability high level datalink control hyper text markup language hyper text transport protocol Hertz input output Internet control message protocol information element Internet engineering task force Internet group management protocol interior gateway protocol inch Internet protocol IP security Internet protocol version 4 Internet protocol version 6 integrated services digital network International Organization for Standardization Internet service provider Internet telephony service provider International Telecommunication Union interactive voice response 1024 kilo 1000 kilo byte 1024 bytes kilo bits per second kilo Hertz kilometer
5. CIOSSAR Wc PED 57 INDO OS 65 4 GTXT Users Manual 1 1 Chapter 1 Installation Scope Purpose This manual is intended for users of GTXT and administrators of the network that includes the GS8 It also has details of the GTXT API so that software developers who want to write their own programs to communicate with the GS8 can do so The manual assumes you have a GS8 modular gateway that is installed and functional For Experienced Users Experienced users may need to review only the screen shot and subsequent description in section 1 5 on page 8 Other users should carefully study this annual to ensure you obtain the maximum benefit from the GS8 and GTXT Not Included This manual does not describe the features and functionality of the GS8 It does not explain how to install the GS8 nor does it contain complete technology details of the product This manual does however describe some technology aspects to allow you to interface with the GS8 This manual does not include information on warranty service or support Consult the Zed 3 web site for details on these or consult documentation that may have accompanied the product The manual does not provide pricing names of sales representatives or names of distribution channels Access the Zed 3 web sites for all further information Zed 3 is very open about its products and most of the manuals are available on line at http www Zed 3 com GTXT User s Manual
6. Click on the Filter button at the top of the panel 4 Select which types of numbers you want to see displayed For example you usually cannot send an SMS to a home number or a fax number so there is no point showing these In general you will show numbers that are Mobile and Business 2 5 GTXT will show only the contact types that are relevant Show 1 Clickon the Show button at the top of the panel 2 Select what you want to see and click OK The choices are show icon GTXT displays a picture to the left of each contact show phone GTXT displays the phone number of this contact show type GTXT displays the type of this phone number 3 The selection you make on the Show button also affects how GTXT displays information about the selected recipient 1 If the contact has a GS8 at their business to make and receive calls you may wish to choose Business 2 or Radio to in dicate this number 2 When you select All the performance will be degraded as GTXT needs to search through many more names and num bers 3 We recommend that you use Business 2 for contacts that have a GS8 in their business that you can call or send SMS to 16 3 Selecting the Recipient 3 3 3 3 4 3 4 1 3 4 2 Match 1 Type ina few characters of the person or phone number you want to locate into the text field at the bottom of the contacts panel 2 GIXT will display only those names or number that match the characters that
7. PINS Ad a 9 selecting cies eee 15 18 regional options 11 RUSSIAN 3a 808 nox mh 11 19 48 S sales Offices suai e manuki ear enia 5 schedule button 9 23 scheduling a message caution regarding closing GTXT 7 description 23 24 screen shot configure window 11 link window o o ooooo o o 25 main GTXT window 8 schedule window 23 SDK see software API search field o ooooooooooooo 9 select folder o oooooooooooo o 8 send button seconda 0 cece eee eee 9 send tab link to database 26 sending messages character counter 9 19 48 immediately 19 linked toa database 25 33 multiple SMSs 19 48 on a schedule 23 24 send button o o oooo 20 see also linking messages see also SMS messages Set p raro acta pi te eie te eed 6 show button 06 9 16 slot number on GS8 13 SMS messages Chinese Seco cad 19 default alphabet 45 47 encoding and languages 45 48 message size 12 45 text messages o oooooocococcoooo 6 Unicode characters 19 see also receiving messages see also sending messages software API ooo ooo o 35 43 Spanish ce ras cesto idea pee 11 success database write back 29 system tay aia 7 T tabs active na
8. private network and the outside public network to prevent outside users from gaining direct access to a server that contains company data The term is derived from the geographic area between two opponents where fighting is prohibited A DMZ is an optional more secure approach to a firewall and effectively acts as a proxy server as well Direct Inward Dialling DID DID is a service that allows users that are connected to a common server such as a media exchange or a PBX to receive calls from sources external to the server without the intervention of an auto attendant or operator Under DID each user is assigned a unique telephone number as opposed to the typical PBX setup that assigns extensions that are based on a common telephone number Domain Name System DNS Defines the manner that the Internet translates names of network nodes into addresses SIP uses DNS to resolve the host names of endpoints to IP addresses Dynamic Host Configuration Protocol DHCP A communication protocol that defines a method where network administrators manage and automate Internet Protocol IP address assignment within an enterprise network DHCP allows you to move network devices from one subnet to another without administrative attention If using DHCP you can connect IP phones to the network and become operational without having to manually assign an IP address and additional network parameters The ZIP 4x4 phone complies with the DHCP specifications documen
9. Car Make Car is ready Car Model and it is now ready g Status for you The total bill is Car is ready Repair_Cost Thank you Mike s Garage Mobile_Number a varchar 12 Repair Cost m Date This may result in a message such as Hello Susan Thomas We have repaired your Ford Escort and it is now ready for you The total bill is 123 45 Thank you Mike s Garage GTXT will send the message to the mobile phone number on record for Susan Thomas Sending the Message Immediately 1 Clickon the Send button to send the messages 2 GTXIT will access each row of the database and see if the fields in that row match the criteria if any that you configured in section 6 2 2 on page 26 3 Ifthe fields match the expressions and values GTXT will send build the messages using the data in the database and to the phone numbers that you have specified 4 If you selected that the messages will be sent unconditionally GTXT will send a custom message to each person Scheduling a Linked Message You may want to schedule a linked message so that a the message is sent at a time more convenient or appropriate for the recipient 1 You cannot send a linked message to a contact contained in your local or Outlook folders GTXT can send a linked mes sage only to a number that is contained in the database 2 If you have a message that will occupy more than one SMS and you selected the option not to send such messages TXT wil
10. IP virtual private network Volts peak to peak Watt wide area network 56 Appendix D Glossary 10BaseT A physical media specified by the IEEE 802 3 standard for supporting Ethernet with a maximum transmission rate of 10 Mb s 10BaseT consists of copper twisted pair cable normally used for wiring ordinary telephones Ethernet is a common technology used for connecting computers into a local area network LAN 100BaseT A local area network transmission standard that supports a data rate of 100 Mb s Also known as Fast Ethernet similar in function to 10BaseT Address Resolution Protocol ARP Defines the process of mapping an Internet Protocol address IP address to a physical machine address recognized in the local network An ARP table maintains the correlation between each MAC address and its corresponding IP address within a network ARP provides the protocol rules for defining this correlation and converting addresses in both directions ARP is described by REC 826 Advanced Intelligent Network AIN A telephone network architecture that separates service logic from switching equipment AIN encourages competition among service providers by allowing the addition of new services without requiring the re design of existing switches Authentication The process of ensuring that digital data transmissions are delivered to the intended receiver Authentication also assures the receiver of the integrity of the message conte
11. Some RFCs are informational in natural while others become Internet standards RFCs are the result of committee drafting and subsequent review by interested parties No further comments or changes to an RFC are permitted once it becomes an Internet standard changes to internet standards are enacted through subsequent RFCs that supersede or elaborate on all or parts of existing RFCs 61 SE System User s Manual Reverse Address Resolution Protocol RARP A protocol by which a physical machine in a local area network can request its IP address from a gateway server s Address Resolution Protocol table or cache RARP is described in RFC 903 RJ 45 A single line digital transmission interface Resembling a standard phone connector an RJ 45 connector is twice as wide with eight wires and is used for connecting computers to local area networks LANs or phones with multiple lines Router A device that determines the next network point to which a data packet should be sent on the to its final destination Routers also act as traffic cops allowing only authorized machines to transmit data into the local network so that private information can remain secure In addition to supporting these dial in and leased connections routers also handle errors maintain network usage statistics and handle security issues Routing Information Protocol RIP A widely used protocol for managing router information within a self contained network such as a
12. addressing type of service ToS specification security fragmentation and reassembly features The most widely used IP version is Internet Protocol Version 4 IPv4 The ZIP 4x4 phone supports IP as defined in RFC 791 59 SE System User s Manual Internet Protocol Version 6 IPv6 The latest level of the IP that is included in many projects including the major computer operating systems The most obvious improvement in IPv6 over IPv4 is the lengthening of IP addresses from 32 bits to 128 bits All servers that support IPv6 will also support Internet Protocol Version 4 Intranet A restricted access network that works like the Web but isn t on it Usually owned and managed by a corporation an intranet enables a company to share its resources with its employees without making available confidential information to everyone with Internet access IP Address version 4 A 32 bit number that identifies each sender or receiver of information sent across the internet An IP address has two parts the network identifier and the identifier of a specific device on the network On the Internet itself between the router that moves packets between points along the route only the network part of the address is examined IP Security IPSec Security standard produced by the Internet Engineering Task Force IETF a protocol suite that provides all necessary elements for secure communications authentication integrity and confidentiality an
13. back On success O Do nothing O Change Status Y to SENT x O Program On failure O Do nothing 9 Change y to O Program If message length greater than one SMS O Do not send message O Do nothing O Change v to O Program 2 You can select whether GTXT will modify the database after it has sent or attempted to send the message The three events are On success If GTXT successfully sent the message to the GS8 it will execute this selection On failure 1f the GTXT application is unable to send the message to the GS8 it will execute this selection If message length is greater than one SMS If the message is greater than can be transmitted in a single SMS GTXT will execute this selection One SMS is typically 160 ASCII characters or 70 Unicode characters You may use this if you think that a longer message will disturb the recipient You can decide whether GTXT should send the message or not 3 Within each event you can select to do one of the following Do nothing GTXT will make no modifications to the database when it executes that event Change GTXT will send the appropriate SOL command to the database to change a variable Use the pull down list to select the field that you want changed Type in the new value of that field GTXT does not perform any error checking so if you indicate that you want a numerical field to be set to a character string the database will reject that instruction and the field will not c
14. circuit board or card that is installed in a computer for the purpose of connecting the computer to a network Personal computers on a LAN usually contain a NIC designed for a specific LAN transmission technology such as Ethernet Network Time Protocol NTP A protocol that synchronizes computer clocks on an IP network Described by RFC 1305 Per Hop Behavior The differential treatment an individual packet receives while being routed through a network as implemented by queue service or queue management disciplines These per hop behaviors are useful and required in network nodes to deliver differentiated treatment of packets regardless of end to end construction or intra domain services Per Hop behavior is discussed in RFC 2474 and Per Hop Identification codes are defined in RFC 3140 Point to Point Protocol PPP A protocol that defines a communication method between two computers using a serial interface Typically used to connect a personal computer to a server through a phone line Proxy Server A server that acts as an intermediary between a workstation and the Internet to provide a caching service and ensure security and administrative control for the enterprise The proxy server is invisible to the workstation all Internet requests and returned responses involving the workstation appear to be directly with the addressed Internet server Public Switched Telephone Network PSTN The world wide collection of voice oriented public telep
15. constructive feedback on all our documentation If you have comments or error reports on any Zed 3 documentation please submit your feedback to Technical Publications Department Zed 3 501 Valley Way Milpitas CA 95035 USA techpubs zed 3 com 10 2 1 2 2 2 2 1 Chapter 2 Configuration Introduction You can select the language for the GTXT application This changes the menus and messages of the sortare program and does not limit the languages of the messages you can send and receive You need to let GTXT know where and how it can communicate with the GS8 Follow the instructions in this chapter to do this You can use the GTXT application free to send your first 300 messages After that you need to obtain a license to continue to use the software This section explains how to obtain and install a license The various elements of the GTXT window are shown in section 1 5 on page 8 Configuring the Regional Options Selecting the Language for the Application 1 Open the GS8 application either within Outlook or stand alone see section 1 4 on page 6 for details how to do this 2 Ensure the Contacts panel is visible If it is not click on the Contacts button on the bottom of the GTXT window 3 Click on the Z button in the bottom right corner of the GS8 application and select Configure GTXT opens the Configure window as shown below 4 Intheregional settings use the pull down menu to select the la
16. of response received within the time out limitation fail to get line information Function GTXT ResponseClientAuth does not contain or contains part of line information Server Responding Function prototype int GTXT ResponseLineStatus LPGTXT LINEDATA pLineData Description To get the line information Parameters pLineData The line information Return value GTXT ERROR NOTCONN if there is no connection to server GTXT ERROR NOTAUTH before authentication GTXT ERROR NOTDATA if no data GTXT ERROR OK if succeeds Explanation There may be several lines if the function returns GTXT ERROR OK you should repeat this function until it returns GTXT ERROR NOTDATA Calling time refers to the explanation of function GTXT RequestLineStatus Message Sending Client Requesting Function Prototype int GTXT RequestSendSMS unsigned short pwDestID const char pszDest const char pszSMS WORD wLine unsigned long dwFlag Description To send a request for message sending Parameters pwDestID The corresponding ID to destination It s the only item when returns result e pszDest Several destinations separated by semicolon 7 The number of destinations must be the same as the number of IDs pszSMS The content of message wLine Line for sending dwFlag ID generated by clients which marks a specific sending Return value GTXT ERROR NOTCONN if there is no connection to server GTXT ERROR NOTAUTH before authentication GTXT ERR
17. on that tab 3 Confirm that you want to delete the message 33 GTXT User s Manual 34 7 1 7 2 7 2 1 7 2 2 Chapter 7 Software API About the API This section describes how you can interface with the GTXT application programming interface if you want to write your own software to send and receive SMS and MMS messages The following operating systems are supported by the API Windows 98 Windows 2000 Windows XP The following programming languages are supported by the API C MFC The format of the library is as Microsoft VC 6 0 compiler with format of Regular DLL With MFC Statically Linked API The functions are called in stdcall way Notifying Message Function and Format The GTXT API sends to clients the results of the requests that have been sent to server and event notifications from server via WM_GTXT_MESSAGE message The message format is WM_GTXT_MESSAGE unsigned long wParam unsigned long IParam Parameter wParam The low order word of wParam contains the type of the command say GTXT_EVENT_CLIENT_AUTH The high order word of wParam contains the result of the request the value may be RESPONSE_SUCCEEDED Request succeeds and you may get the result in the following part RESPONSE_FAILED Request fails no usable value 35 GTXT User s Manual 7 2 3 7 3 7 3 1 7 3 2 7 3 3 RESPONSE_TIMEOUT Request time outs no usable value Parameter IParam Ther
18. recipients of the messages on the tab that you closed into the recipient pane GTXT shows the history associated with this contact or these contacts This is described further in section 4 5 below 21 GTXT User s Manual 4 5 4 5 1 4 5 2 History Messages Saved in Outlook Upon installation GTXT creates sub folders titled SMS under the Inbox Outbox and Sent Items folders of Outlook When you send an SMS GTXT saves it under Personal Folders Outbox Sent Items SMS When you receive an SMS GTXT saves it under Personal Folders Inbox SMS When you have attempted to send an SMS that was not sent GTXT saves it under Personal Folders Outbox SMS You can view move and delete these as you would with e mail messages Messages Saved in GTXT When you select a recipient for message as described in section 3 4 on page 17 GTXT automatically displays the history of your previous messages sent and received with this contact If you had sent a message to a group of contacts and the contact you have selected was a member of that group GTXT displays the messages that you sent to that group However GTXT does not display the messages you received from all members of that group Instead GTXT will display only those messages received from the selected contact regardless whether they were sent in response to the group message or individual messages 22 5 1 5 2 Chapter 5 Scheduling a Message I
19. request addresses The FODN includes the second level domain name such as Zed 3 com and any other levels such as www Zed 3 com Gateway A network point that serves as an entrance to another network Computers that control traffic within an enterprise s network or at the local Internet Service Provider ISP are gateways IP datagrams are transferred from network to network through gateways until it reaches its final destination See Router Hub A hub network topology consists of a backbone main circuit to which a number of outgoing lines can be attached each providing at least one connection port for attaching devices As a network product a hub may include a group of modem cards for dial in users a gateway card for connections to a local area network and a line connection Hypertext Transfer Protocol HTTP An application layer protocol that defines a set of rules for exchanging files text images sound video and other multimedia files on the Internet Described by RFC 2068 Incoming call A call originated by a source that is external to the enterprise Internet A worldwide computer network system in which users at any one computer can with permission exchange information from any other computer and sometimes talk directly to users at other computers also known as the Net Originally designed by the Advanced Research Projects Agency ARPA of the U S Defense Department in 1969 so that a communication signal could withsta
20. 1 4 3 2 6 When you are satisfied with your message click Send or press Ctrl Enter 7 GTXT sends the message to the GS8 If you are sending a message to multiple recipients GTXT sends separate messages to the GS8 for each recipient One port on the GS8 can send out approximately ten messages per minute 8 GIXT changes the status in the title bar briefly to indicate it is sending the message 9 GTXT changes the name of the current tab to be the name of the recipient or in the case of a message sent to a group of contacts it displays the number of recipients followed by the word contacts 10 GTXT moves the message to the history pane and precedes it with the date and time The format for the date and time is that which you have configured for your PC GTXT shows this message in grey color Receiving Messages Conditions for the GS8 to Send a Message to You When a recipient replies to your SMS the GS8 may return the message to you This depends on the way you or your system administrator have configured the GS8 When you have a GS8 that is used by multiple people and the GS8 receives a message the default setting may be to send it to a specific person for example the operator However you can configure the GS8 so that when a message is received then that message is sent to a specific GTXT user if that user had previously sent a message to that recipient within a specific time You might select the time to be several min
21. 7 bit characters o o ooooooo oooo 45 A ACFONYMS cidcid 51 56 active tab essor cete pan 8 add new tab oo ooooooccooooo 8 addresses see contacts alphabet default for messages 45 47 API see software API application notes oooooooooo 9 Arabic characters 48 ASCII characters 45 47 buttons dlo8e vene M APER 7 9 CONTACTS rei iis lie Gets 18 filter E EN 8 16 hide ari ERE 9 18 link 3 snes sea tee en 9 25 schedule 9 23 SENA crues deitas ia bee o and 9 20 Show olee inen e 9 16 Z Dutton ente ever 9 Cc characters T6bit ir ete bees a 48 A APP 45 double word 46 Unicode usem ae dare ias 48 see also languages Chinese cersetor bees 11 19 48 close button 1 rue Ee ioe 9 CAUHON are rure rb TEES 7 move to system tray 7 close tab corr hie E b bie n as 8 configuration description 11 14 EQDN iii ind 12 GS8 user name and password 13 IF addr ss A ion rotear os 12 licensing coi aires aa sans 14 name of GS8 ssssss 13 port address 13 user name and password 14 Zb tton ri ds 11 connect to database 26 connection status authenticating 13 connected uan 14 login failure o ooo o 14 resolving domain name 13 unable to resolve domain name 13 contacts button xicas er 18 disti
22. Cost Date Characters number unknown Send Schedule Link Close Insert Send to 3 Type text into the message window to create the message 4 Specify a field that will be part of the message by doing one of the following highlight the field in the list on the right and double click on the field highlight the field in the list on the right right click and select Insert highlight the field in the list on the right then click on the button labelled Insert below inthe message pane right click and select the field from the list 5 GTXT adds the field into the message at the cursor location The field name is displayed in red characters between square brackets Remember to add space characters as required before or after the field 6 3 2 Message Recipient 1 Once you have created the message highlight the field in the database that contains the number where GTXT should send the message and do one of the following right click and select Send to e click on the button labelled Send to below 30 6 Linking to a Database 6 3 3 6 3 4 2 GTXT displays the field name containing the recipient s phone number in the recipient pane 3 The window may look like this example Zed 3 SMS Connected to dbase garage com E 101 xl 8 Caris ready auto repair mikes _ g id g Car_Make Car_Model Name of Owner d 19130 Hello Car is ready Name of Owner We Mobile Number have repaired your Car is al ready
23. GTXT PC Software for SMS Messages User s Manual Manual Part Number 96 00594 LZED 3 A 4 501 Valley Way Milpitas CA 95035 USA 1 408 587 9333 http www zed 3 com Notice The information contained in this document is subject to change without notice Zed 3 makes no warranty of any kind with regard to this material including but not limited to the implied warranties of merchantability and fitness for a particular purpose Zed 3 shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing performance or use of this material Zed 3 assumes no responsibility for the use or reliability of interconnected equipment that is not furnished by Zed 3 This document contains proprietary information which is protected by copyright The contents of this manual and the associated software are the property of Zed 3 and all rights are reserved No part of this document may be photocopied reproduced stored in any computer format translated to another language or publicly displayed without the prior written consent of Zed 3 The information contained herein has been prepared by Zed 3 solely for use by Zed 3 ss employees agents and customers Dissemination or use of the information or concepts contained herein to or by other parties is prohibited without prior written consent from Zed 3 Zed 3 the Zed 3 logo the Zed 3 mark CN2x2 CN2x2P CN2x4 CU3 GA90 GS8 GTXT MDS
24. Get the result of deleting a message Parameters e dwSMSID The message ID of which going to be deleted pbDelete The result of delete operation TRUE is success FALSE is failure Return value GTXT ERROR NOTCONN if there is no connection with server GTXT ERROR NOTAUTH before authentication GTXT ERROR NOTDATA if no data GTXT ERROR OK if succeeded Explanation Calling time refers to the explanation of function GTXT_RequestUpdateSMS 42 7 Software API 7 4 12 New Message Notifying Function prototype int GTXT ResponseNewSMS LPGTXT RECVSMS pRecvSMS Description To receive a new message Parameters e pRecvSMS The structure of received message Return value GTXT ERROR NOTCONN if there is no connection to server GTXT ERROR NOTAUTH before authentication GTXT ERROR NOTDATA if no data GTXT ERROR OK if succeeds Explanation Client will get WM GTXT MESSAG message The low order word of wParam is GTXT EVENT UPDATE SMS and the high order word of wParam is invalid Client call function GTXT ResponseNewSMS to get new message 43 GTXT User s Manual 44 Appendix A Encoding for SMS Messages A 1 Introduction An SMS message sent on a GSM system uses 140 octets to transmit the message The default GSM alphabet uses characters that are 7 bits in length described in section A 2 below GTXT also support characters that are 16 bits in length described in section A 4 on page 48 The 7 bit al
25. Japanese and Korean characters sometimes called Kanji characters Hebrew and Arabic characters Greek Russian and other European characters and those for most languages in the world 2 Long Messages Each SMS occupies 140 octets and as described above that permits the transmission of nominally 160 characters of the default alphabet or 70 Unicode characters The GSM system sends messages that are longer than this length in multiple SMS messages There are six octets used for overhead to link the two messages together A mobile phone will take these multiple messages and display them as a single large message The six octets reduce the size of each message to 153 7 bit characters and 64 Unicode characters When you are typing a long message in GTXT the counter that indicates the size of the message displays the following Number of 7 bit characters in message Display of counter on GTXT 0 SMS 1 160 characters left 1 SMS 111 159 characters left 160 SMS 1 0 characters left 161 SMS 2 145 characters left 206 SMS 2 0 characters left 207 SMS 2 152 characters left There is a jump after the 161st character is typed to 145 characters remaining This is because after you type character 161 GTXT moves eight characters from the first SMS to the second SMS The second SMS can accommodate 153 characters so this leaves 153 8 145 characters remaining in the second SMS If you type a character th
26. MS and the return is only about one destination every time If the return value is GTXT ERROR OK you should keep on calling this function until you get GTXT ERROR NOTDATA Calling time refers to the explanation of function GTXT RequestSendSMS 7 4 10 Message Updating 7 4 10 1 Client Requesting Function Prototype int GTXT RequestUpdateSMS Description To send a request to update messages Parameters none Return value GTXT ERROR NOTCONN if there is no connection to server GTXT ERROR NOTAUTH before authentication GTXT ERROR PENDING if server has not given out response yet GIXT ERROR OK if succeeds Explanation GTXT ERROR OK only means the function s success but not you can receive the message Clients need to wait for WM GTXT MESSAGE message The low order word of wParam is GTXT EVENT UPDATE SMS and the high order word of wParam is the result RESPONSE SUCCESSED on high order word of wParam means got server s response call function GTXT ResponseUpdateSMS next to get the message RESPONSE TIMEOUT on high order word of wParam means only part of response received within the time out limitation and the update operation fails 7 4 10 2 Server Responding Function Prototype int GTXT ResponseUpdateSMS LPGTXT RECVSMS pRecvSMS 41 GTXT User s Manual 7 4 11 7 4 11 1 7 4 11 2 Description To get updated messages Parameters e pRecvSMS the structure of received message Return value GTXT ERROR NOTCONN if there
27. Microsoft SQL or CSV The CSV file is not really a database but can be very useful for simple linked messages You can easily create a CSV file from a spreadsheet such as Microsoft Excel Specify the location for the database or for a CSV file its directory You can specify the location of the database either by an IP address or an FODN We recommend you use an FODN asit allows your use of the GS8 to be more portable Write the FODN like this example my database my company com Write the IP address like this example 123 456 78 90 Enter the port used for your database The default port for MySQL database is 3306 Do not enter a comma Use the actual port specified by your administrator Enter the user name and password that you or your administrator configured on the database Click on Connect GTXT will show an error message if it cannot access the database if it cannot open the database or if the database is of the wrong format If GTXT can open the database it makes the connection panel grey Select the database name and the table name from the pull down menu The window willlook like the figure below x Name of this link Car is ready x File Database type MySQL Connection O IP Address O Domain name dbase garage com x Port 3306 x User name Zed 3_Demo Database name auto repair y Password test Table name mkes garage y Disconnect Save Cancel Specifying the Conditions Under Which the Messag
28. OR OK if succeeds Explanation GTXT ERROR OK only means the function s success but not the sending result of the message Clients need to wait for WM GTXT MESSAGE message The low order word of wParam is GTXT EVENT SEND SMS and the high order word of wParam is the result lParam has the dwFlag value set when calling function GTXT RequestSendSMS which indicates a specific message sending RESPONSE SUCCESSED on high order word of wParam means got servers response call function 40 7 Software API GTXT ResponseSendSMS to get the result of message sending RESPONSE TIMEOUT on high order word of wParam means only part of response received within the time out limitation As the function can send multiple messages to different destinations at one time the sending to certain destination from where client does not receive the response is failed 7 4 9 2 Server Responding Function Prototype int GTXT ResponseSendSMS LPGTXT SENDRESULT pSendResult unsigned long dwFlag Description To get the result of message sending Parameters pSendResult The result of message sending dwFlag The dwFlag value when calling function GTXT RequestSendSM indicates a specific message sending Return value GTXT ERROR NOTCONN if there is no connection to server GTXT ERROR NOTAUTH before authentication GTXT ERROR NOTDATA if no data GTXT ERROR OK if succeeds Explanation You may specify multiple destinations when calling function GTXT RequestSendS
29. P does not provide the sequencing of packets the application program that uses UDP must be able to verify that the entire message has arrived in the proper order UDP is in the Transport Layer or Layer 4 of the OSI communication model The ZIP 4x4 phone supports UDP as defined in RFC 768 for SIP signalling Virtual Local Area Network VLAN A Local Area Network that maps workstations on a logical basis such as department or primary application rather than by physical location VLAN members are not identified by their location on a physical subnetwork but through the use of tags in the frame headers of their transmitted data VLANs are described in the IEEE 802 10 standard Virtual Private Network VPN A method of using the Internet to provide remote offices or individual users with secure access to their organization s network A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization The goal of a VPN is to provide an organization with the same capabilities but at a much lower cost VPNs are possible because of technologies and standards such as tunneling screening encryption and IPSec Wide Area Network WAN A geographically dispersed telecom network Although a WAN may be privately owned the term usually implies the inclusion of public networks 64 Symbols NET framework ooo ooooooooo 6 Numerics 16 bit characters sus 48
30. SE30P SE30 SE30X SE150 SE500 SE500X SEME and SP3 are trademarks of Zed 3 and may beregistered trademarks in certain countries All other names may be trademarks or registered trademarks of their respective owners Revision History Release Release Date 12 01 October 2008 1 3 5 November 2008 14 29 January 2009 Contents Chapter 1 Installation cortar A 5 1 1 A e dl do 5 1 2 Basic Functionality AAA hoy aian nd aT a ste 6 1 3 Installation innr rea ba O pr a a SU Saye dcos 6 1 4 Running the program rica e e e arteries 6 1 5 The Main GLXT WIDdOW ui rese a 8 1 6 About our Documentation i000 202 vis SEI rr RE Re S 9 Chapter 2 Configuration ode as qa ev aa cw oa 11 2 1 Introduction e ks exe ge CY Ro xad Cx a eie D i e 11 2 2 Configuring the Regional Options i20 ve TRE head 11 2 3 Configuring the Connection totheGS8 oooooccccooommmoo 12 24 Connecting to the G58 ico EE RRERE ORBE 13 2 5 Licensing oe vvv uou pes URE b erasa oy beds d 14 Chapter 3 Selecting the Recipient 0 0 0 cece eee eee 15 3 1 Introducti iaa A AA E RR eR d es 15 3 2 Editing a Local File of Names and Numbers 15 3 3 Filtering and Displaying Information for the Contacts 16 3 4 Choosing Recipients of the SMS n n na aos 17 3 5 Hiding and Showing the Contacts Panel ooooooommmm o o 18 3 6 Tale LOCAHONS ais sind eve er edo nets ao ER Dr 18 Chapter 4 Messages and History llle een
31. a Scheduled Message 1 Open the list of scheduled messages or the schedule window for the SMS you want to delete as described in section 5 3 above Click on Delete Confirm that you want to delete the scheduled SMS 1 If you do not enter a name GTXT will assign the name Untitled Schedule 1 for the first such scheduled message 24 6 1 6 2 6 2 1 Chapter 6 Linking to a Database Introduction This feature allows you to send a message in which the contents of the message comprise data from fields in a database The message is sent to a recipient whose phone number is also in the database The message can be sent only when there is a change to the data in the database The various elements of the GTXT window are shown in section 1 5 on page 8 Specifying the Database and Fields Connecting to the Database 1 From the main GTXT window do not select the recipient or group of recipients as you usually do from the contacts panel 2 Clickonan empty tab or on the symbol to open a new empty tab 3 Clickon the Link button GTXT opens the Link window as shown below x Name of this link File Database type MySQL Connection IP Address O Domain name Port User name Database name y Password Table name y 4 Entera name for this link This is used to access the link in future 25 GTXT User s Manual 6 2 2 10 11 Select the type of database The choices are MySQL
32. at consumes two 7 bit spaces as described in section A 2 2 on page 46 in the last character position of an SMS GTXT will move both 7 bit words into the next message The counter will then jump to show only 144 characters are remaining in that message 1 The special double word characters described in section A 2 2 on page 46 do not force the message to be sent as Unicode 2 Under Windows the Unicode characters are encoded in two three or four bytes The MSB of the first byte is set to one to distinguish the character from ASCII An ASCII character has the MSB of the byte set to zero 48 Appendix B Creating an Operator User on the GS8 The creation of a user of GTXT to be the operator becomes necessary when you want to collect all incoming SMS messages through GTXT By default the GS8 forwards an incoming SMS message to a GTXT user only if all of the following conditions are true the GTXT user has previously sent a SMS message to this phone number in the last x seconds where x is defined in SMS Configuration Return Message noother GTXT user has sent a message to this phone number before this SMS is received the GTXT user is logged in The SMS configuration window on GTXT is shown below Setting GTXT GTXT Access Enabled Disabled Listen Port 16200 Update Request Accept C Reject Return Message IV If received within 180 seconds return to sender Save Message Which messages
33. b tabto tab to show folder number types to show title bar N individual group more tabs Zed 3 SMS onnected to Milpitas California f ox Customers Y a Show button select what Joe s Body Shop Business 2 to show or They ju Sarah Jane Mobile 2008 09 23 13 17 18 Can you deliver them ASAP Elizabeth Smyth Business 2 Elizabeth Smyth Mobile History Richard Edwards Business 2 Pane TR Richard Edwards Mobile ivi Al s Rest Stop Mobile E bojo 2 ab Wayne s Burgers Business 2 Pane displays Petey Pact Ot e only names in ajeev Pat lobile Cabin Auto Mechanic Business 2 Ae cuart ich Yes our driver will be there at 2 pm Milpitas Cars Mobile Cabin Auto Mechanic Mobile older that matc Thanks again for your business Joe rd the current filter WEM Electric Mobile era Contacts panel SMS and character SMS 1 85 characters left Search or counter add number Link Send Schedule Send the Send the Link the Close Recipient Contacts Hide the Z button message message message GTXT Pane button when contacts for options now later to a data contacts panel panel base is hidden This is a brief description of the elements of the GTXT window These are listed starting with the title bar and continuing clockwise Click on the links below to view a description of the feature or function Title bar This shows you whether the GTXT software is connected to the GS8 and if not
34. basis For example the user agent initiating a call acts as a UAC when sending the initial INVITE request and as a UAS when receiving a BYE request from the calling station Similarly the same software can act as a proxy server for one request and as a redirect server for the next request 63 SE System User s Manual User Agent Client A SIP logical entity that creates a new request and then uses the client transaction state machinery to send it The role of UAC lasts only for the duration of that transaction if a piece of software initiates a request it acts as a UAC for the duration of that transaction If it receives a request at a later time it assumes the role of a user agent server to process that transaction User Agent Server A SIP logical entity that generates a response to a SIP request The response accepts rejects or redirects the request This role lasts only for the duration of that transaction if a piece of software responds to a request it acts as a UAS for the duration of that transaction If it generates a request later it assumes the role of a user agent client to process that transaction User Datagram Protocol UDP A communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses IP An alternative to TCP UDP uses the IP to transfer a data unit between computers without dividing it into packets and reassembling it at the other end Because UD
35. copy the text you want to send from another application such as Word or Notepad click in the message pane and press Ctrl V paste c highlight the text you want to send in another application such as Word or Notepad then drag the text into the message pane use Ctrl drag if you want to retain the text in the original application 3 As you type GTXT indicates how many characters remain to fully use this SMS If you are typing regular text characters similar to ASCII characters an SMS can have 160 characters If you are typing with Unicode extended characters such as Chinese or Russian characters an SMS can have 70 characters 4 If you exceed the number of characters that will fit into a single SMS GTXT indicates you have two SMSs and restarts the counter for the number of characters that remain in the second message 5 You can continue to create a very long message that will comprise many SMSs 1 Appendix A starting on page 45 describes in detail the encoding used to send an SMS message and the total number of characters available in a specific message 2 If therecipient is using a mobile phone one communication split across many separate SMSs may be a distraction We therefore advise you to limit a message to one or two SMSs Depending on the service provider and the mobile phone the message may appear as separate SMSs on the recipient s mobile phone or as a single SMS 19 GTXT User s Manual 4 3 4 3
36. corporate LAN A gateway host sends its entire routing table to it closest neighbor every 30 seconds which in turn passes the table to its neighbor this process is repeated until all hosts in the network have the same information RIP is described by RFC 1058 Server A computer program or device that provides services to other computers Session Description Protocol SDP An ASCII based protocol that describes multimedia sessions and their related scheduling information including information transport session participant port numbers and contact addresses The ZIP 4x4 phone uses SDP for session descriptions as documented in RFC 2327 Session Initiated Protocol SIP An Internet standard protocol that defines a method of initiating an interactive user session involving multimedia elements such as voice chat gaming video and virtual reality SIP is a request response protocol that deals with requests from clients and responses from servers through any transport protocol such as UDP or TCP Described by RFC 3261 SIP can establish modify or terminate multimedia sessions or Internet telephony calls Simple Network Management Protocol SNMP The protocol that governs network management and the monitoring of network devices and their functions SNMP is described formally in RFC 1157 and in a number of related RFCs Simple Network Time Protocol SNTP A protocol that synchronizes computer clocks on an IP network Similar to NTP with fewer f
37. d makes key exchange practical even in larger networks Jitter Jitter is the deviation in some aspect of the pulses in a high frequency digital signal or the period frequency displacement of the signal from its ideal location The SE system utilizes Jitter Buffers to compensate for jitter Key Management The management and handling private keys used for signing or encryption The only reasonable way to protect the integrity and privacy of information is to rely upon the secure use of these keys including the activities of selection exchange storage certification expiration revocation changing and transmission Most of the work in managing information security systems lies in the key management Lightweight Directory Access Protocol LDAP A software protocol that enables anyone to locate organizations individuals and other resources such as files and devices in a network whether on the public Internet or on a corporate intranet LDAP is a lightweight smaller amount of code version of Directory Access Protocol DAP which is part of X 500 a standard for directory services in a network LDAP is lighter because in its initial version it did not include security features Described by REC 2251 Load balancing The mapping or re mapping of work to processors with the intent of improving the efficiency of a concurrent computation Local Area Network LAN A group of computers and associated devices that share a common commun
38. da AD 8 add neW dese rans te etd 8 CIOS o ra 8 BrOUD e espe nies eder ih aust ene teat 8 inactive cose ss aus ees 8 pulldown 0 8 text messages see SMS messages title bar hide X i e 7 indication 000 8 U Unicode characters 19 48 BSCEDAME allg AAA 13 W web site addresses 5 white papers ooocccococcccccccncso 9 write back ooooooooomoooo 29 Z Z button configuration ooooocmoo o 11 location io aa dar lee 9 66
39. directly typing in the number Sending Messages You can send one SMS to one recipient or you can send the same SMS to multiple recipients You can send many different SMSs to one or many different recipients The various elements of the GTXT window are shown in section 1 5 on page 8 Editing a Local File of Names and Numbers Adding Names to the Local Files 1 Ensure the contact panel is visible Click on Contacts if it is not 2 From the pull down list of folders at the top of the contacts panel select Local 3 Click on the Z button at the bottom and choose Add 4 Type in the name and number of this contact GTXT User s Manual 3 2 2 3 3 3 3 1 3 3 2 5 6 7 Select a phone type from the list Usually this will be Mobile Click Save Repeat to add as many contacts as required Changing or Removing a Name from the Local File 1 2 3 Ensure the contact panel is visible Click on Contacts if it is not From the pull down list of folders at the top of the contacts panel select Local Click on the Z button at the bottom and choose Delete or Edit Filtering and Displaying Information for the Contacts Type Filter 1 Ensure the contacts panel is visible Click on Contacts if it is not 2 From the pull down list of folders at the top of the contacts panel select the folder that contains the name you want to use or select All if you are unsure in which folder the specific contact is located 3
40. e 19 4 1 tro dia 19 4 2 Sending a Message plas ites Pal tates 19 4 3 Receiving Messages rei RA sunga ad 20 4 4 Use Tas A AS 21 4 5 PASO ppt ERRA CEEE ST RR greca 22 Chapter5 Scheduling a MesSage 0oooocororrorrrn leere 23 5 1 o A aie RE DR E AER 23 5 2 Configuring the Sched tle eco ek HERE RENE E a 23 5 3 Editing a Scheduled Message esee ee em Rn 24 5 4 Deleting a Scheduled Message pa rirana s 24 Chapter 6 Linking to a Database 00 cee eee eee eee ee 25 6 1 Introduction zc c a ER Ar Ra 25 6 2 Specifying the Database and Fields 0 0 eee eres 25 6 3 Creating a Linked Message coo PER EUER Y 30 GTXT User s Manual 3 Contents Chapter 7 Appendix A Appendix B Appendix C Appendix D 6 4 Editing a Linked Message micros cnc ea 33 6 5 Deleting a Linked Message ss pes een phar WR che Ead 33 Software APh ux REX pr di ee E Aa RECEA 35 74 About the APT sch ox ca Ehe DEREN AR ELE S teu 3b 7 2 Notifying Message orense rt ses aa 35 7 3 Data Str ct r piee is As 36 7 4 Function Specification RA e ces 37 Encoding for SMS Messages 00c cee cece eee o 45 A 1 Inttoductiori ss euadere au YR Aa 45 AZ TDiChataetets xe cid n od gae eg e I e ER RR a da 45 AS Default Alphabetical o 47 Ad Unicode Characters 16 bis P RE 3x 48 Ro Long Messages airada s EE 48 Creating an Operator User on the GS8 LLe 49 ACEON cos ex uos Rx ation a RT QU dale a M RR 51
41. e application and click on Retry If you have Outlook installed on your PC and you run GTXT as a stand alone application GTXT warns you that you cannot use the contacts from Outlook when you run the application stand alone Click Continue to proceed Running from within Outlook With Outlook open select File New Zed 3 SMS Message or press Ctrl Shift Z You cannot access GTXT if you started GTXT as a stand alone application and then subsequently started Outlook The first time you run the software after you have installed it the Microsoft NET framework registers the application This may take 20 seconds Please be patient it does not take so long on subsequent starts Hiding the Program To move GTXT to the system tray click on the X on the title bar The application is still active but is no longer shown on the task bar To restore GTXT click on the Z icon in the system tray Exiting the Program To exit GTXT click on the Close button If you have started GTXT within Outlook GTXT will also close when you close Outlook Caution Ifyou have any scheduled SMS or linked SMS GTXT cannot send these when it is not running Therefore you should not close the application if you want these sent GTXT User s Manual 1 5 The Main GTXT Window The main window is shown below Status of connection Inactive Active Close Inactive Add new Pull down Select Filter button select the with GS8 shown in tab to tab ta
42. e are two types of value they are The dwFlag set when calling function GTXT_RequestSendSMS is used to mark a specific message sending User remove a message by message ID Data Structure The Result of Message Sending typedef struct tagGTXT SENDRESULT unsigned short wDest unsigned short wResult GTXT_SENDRESULT LPGTXT_SENDRESULT wDest The objective ID corresponding to the destination when sending a message wResult The result of sending GTXT SENDRESULT SUCCESSED means success GTXT SENDRESULT FAILED means failure Line Information typedef struct tagGTXT LINEDATA int nLine char szLine GTXT_STRLEN GTXT_LINEDATA LPGTXT_LINEDATA nLine Line s ID szLine Line s name Message Receiving typedef struct tagGTXT RECVSMS unsigned long dwSMSID char szSender GTXT_STRLEN int nLine 36 7 Software API 7 4 7 4 1 7 4 2 7 4 3 char szLine GTXT_STRLEN unsigned long dwTime char szContent GTXT SMS STRLEN GTXT RECVSMS LPGTXT_RECVSMS dwSMSID Message ID received szSender Sender s number nLine Sender s line ID szLine Sender s line name dwTime Send time szContent The content Function Specification Whether has uncompleted requests Function Prototype BOOL GTXT IsBusy Description To find out if there is uncompleted requests Parameters None Return value Return TRUE if there is uncompleted requests FALSE otherwise Explanation No whether c
43. e is Sent 1 2 Click on the Send tab You can send the message under the following conditions 1 If you do not enter a name GTXT will assign the name Untitled Link 1 for the first such linked message 26 6 Linking to a Database Unconditionally GTXT will send the message without regard to the contents of the database Use this if you want to send a message to a group of people and the message will leave at the same time For example you may want to tell all customers that you have stock of a new product so the content of the message is identical You may send a message to all your customers to tell them the balance of their account so the content of the message is taken from the database On conditions GTXT will send the message only when a field or multiple fields match requirements that you configure Use this method if you want to send a message to a group of people only when something changes in the database For example you may want to tell a customer that his or her car is now repaired is ready for collection and the repair cost You may want to send a message to your customers when their account reaches a certain credit limit Program You can write SQL code and enter it here This is for advanced users only GTXT will send that code to the database and send the message only when the database returns TRUE You are responsible for ensuring the code is properly formatted SOL code 3 Click on the Fields tab
44. e message only to be sent once click OK When you want the message to be sent with a recurrence select whether GTXT should send the message during a day intraday daily weekly monthly or yearly by clicking on the appropriate radio button GTXT changes the configuration panel to the right to match the period you selected Complete the pattern on the right pane Enter the range of the recurrence Click OK GTXT moves the message to the history pane but does not show any date or time On the tab GTXT shows a clock before the name you gave to this schedule GTXT shows a recurrent symbol if the message is set to repeat Editing a Scheduled Message You can modify the parameters in the Schedule window for a message you have configured However you cannot change the text of the SMS nor can you change the recipients of the SMS If you need to make a change to the contents or distribution list for a scheduled message delete the message and create a new one To edit the schedule 1 2 3 4 Click on the Schedule button GTXT now shows you the choice of creating a new scheduled message or editing an existing message Select Edit GTXT shows you a list of the scheduled messages Select the one you want and click Edit Alter the parameters as required and press OK As a shortcut you can select the tab for the scheduled message and double click in the history pane This opens the schedule for the selected message Deleting
45. e result of connecting RESPONSE SUCCESSED on the high order word of wParam means connection is built up RESPONSE FAILED means connection fails Cut the Connection to Server Function prototype BOOL GTXT DisconnectServer Description To cut off the connection to server Parameters none Return value TRUE if the connection is cut off FALSE if fails or the connection does not exist Explanation no User Authentication Client Requesting Function prototype int GTXT RequestClientAuth const char pszName const char pszPassword Decription To send the authenticate request for user Parameters 38 7 Software API 7 4 7 2 7 4 8 7 4 8 1 pszName User name pszPassword User password Return value GTXT ERROR NOTCONN if there is no connection to server GTXT ERROR PENDING if the server has not given out the result GTXT ERROR OK if succeeds Explanation GTXT ERROR OK only means the function s success but not the approving of authentication Clients need to wait for WM GTXT MESSAGE message The low order word of wParam is GIXT EVENT CLIENT AUTH and the high order word of wParam is the result of authentication RESPONSE SUCCESSED on the high order word of wParam means it has received server s response call function GTXT ResponseClientAuth to get the result of authentication RESPONSE TIMEOUT means the server has not given out a response within the time out limitation and the authentication is rejec
46. eatures Some IP phones use SNTP for their date and time synchronization functions Described by RFC 2030 SIP Endpoint An internet host that understands the SIP protocol SIP Registrar A SIP Registrar is a UAS that responds to REGISTER requests and maintains a list of bindings that are accessible to proxy servers and redirect servers within its administrative domain SIP Server A network device that performs special functions at the request of SIP endpoints Servers typically act in response to SIP endpoint requests but can also initiate functions on their own RFC 3261 defines three types of SIP servers SIP Proxy servers Redirect servers and Registrar servers Subnet Mask A number that when applied to an IP address can identify the subnetwork where the address resides For example within a class B network a subnet mask of 255 255 255 0 specifies that the first two portions of the decimal dot format are the network number while the third portion is a subnet number The fourth portion is the host number A subnet mask of 255 255 0 0 species a class B network that does not have a subnet 62 D Glossary Switch A network device that selects a path or circuit for sending a unit of data to its next destination A switch may also include the function of the router A switch is generally a simpler and faster mechanism than a router which requires knowledge about the network and how to determine the route switch is usually as
47. eive Itadjusts the counter on the GTXT application that indicates how many characters are in each message See section 4 2 on page 19 for information about the counter The parameter also affects how long messages are split into multiple SMSs See also section 4 2 and section A 5 on page 48 for more information Configuring the Connection to the GS8 1 Openthe Configuration window as described in section 2 2 on page 11 2 You can specify the location of the GS8 either by an IP address or an FQDN We recommend you use an FODN as it allows your use of the GS8 to be more portable Write the FODN like this example my GS8 my company com 12 2 Configuration 2 4 Write the IP address like this example 123 456 78 90 The default port is 16200 Do not enter a comma Use the actual port specified by your administrator Give this GS8 a name if you want such as My Office GS8 Select from which slots in the GS8 you want messages to be sent We recommend you put your main GSM or CDMA module in slot 1 If you use only this slot the recipients of your messages will always get messages from one number and they can associate that number with your business If you send many messages you may need to use multiple GSM or CDMA modules to send the data so that the time taken to send many messages is reduced You should then enable multiple slots GTXT will send messages in sequence to each of the slots starting with slot 1 if enabled f
48. est for comments return material authorization read only memory rest of the world resource reservation protocol real time clock rich text format real time transport protocol rack unit 1 75 in 44 45 mm receive receive data or received data second session description protocol system exchange either the SE150 or the SE500 system exchange for me session initiation protocol service level agreement simplified message desk interface small or medium size enterprise simple mail transfer protocol simple network management protocol simple network time protocol telephony application programming interface transmission control protocol transmission control protocol Internet protocol thin file transfer protocol 55 SE System User s Manual TIFF TOS TIL TxD UAC UAS UDP UI UL UM UPS URL URI USOC UTC Vac VAD Vdc VE VLAN VM VoIP VPN Vpp WAN tagged image file format type of service time to live transmit transmit data or transmitted data see RU user agent client user agent server user datagram protocol user interface Underwriter s Laboratory unified messaging uninterruptible power supply universal reference locator uniform resource identifier universal service ordering code coordinated universal time Volt Volts with alternating current voice activity detection Volts with direct current voice frequency virtual local area network voice mail voice over
49. hange You will usually use this choice if you need to indicate that an SMS has been sent or if it has not An example may be a car repair garage When the vehicle has been repaired the status may be set to READY After the message has been sent GTXT can change the status to SENT to indicate a message has been sent tot he owner of the car Program You can write SQL code and enter it here This is for advanced users only GTXT will send that code to the database You are responsible for ensuring the code is properly formatted SQL code 1 In the current version of software the GTXT application only knows that the GS8 has received the message not that it was successfully transmitted 2 See appendix A starting on page 45 for details of the characters supported by different messages and the length of mes sages 29 GTXT User s Manual 4 When you have completed each of the tabs in the window Link to Database click on Save 6 3 Creating a Linked Message 6 3 1 Message Text 1 Connectto the database and configure the conditions if any under which the message will be sent as described in section 6 2 above 2 GIXT will display the screen as shown below GTXT has replaced the list of contacts with the names and types of the fields in the database Zed 3 SMS Connected to gs8 calif zed 3 com nml x Caris ready X auto_repair mikes_ S id Make Tus Model Name of Owner ves Number Status Repair
50. hat the routing nodes in the public network are unaware that the transmission is part of a private network Tunneling is generally done by encapsulating the private network data and protocol information within the public network transmission units so that the private network protocol information appears to the public network as data Tunneling allows the use of the Internet which is a public network to convey data on behalf of a private network Universal Resource Locator URL A standard method of specifying the location of an internet resource Also referred to as a location or address URLs specify the location of files on servers A general URL has the syntax protocol address For example http www Zed 3 com index htm specifies that the protocol is http and the address is www Zed 3 com index htm Unshielded Twisted Pair UTP Also known as 10BaseT This is the standard cabling used for telephone lines It is also used for Ethernet connections Untrusted Network Networks that are outside of your security perimeter Private and shared networks over which you have no control over the administration or security policies Firewalls deal with the problem of communicating with these networks while protecting your trusted network User Agent A SIP logical entity that can act as both a user agent client UAC and user agent server UAS The role of UAC and UAS as well as proxy and redirect servers are defined on a transaction by transaction
51. hone networks Also referred to as plain old telephone service POTS Quality of Service QoS The concept that transmission rates error rate and other characteristics over a network or the Internet can be quantified improved and guaranteed to a certain extent in advance QoS is particularly concerned with the continuous transmission of high bandwidth video and multimedia data Real Time Transport Control Protocol RTCP The protocol companion to RIP that provides error session control and identification data about a transport session Described by RFC 1889 Real Time Transport Protocol RTP An Internet protocol standard that specifies a method for programs to manage the real time transmission of multimedia data over unicast or multicast network services RTP combines its data transport with an control protocol RTCP which makes it possible to monitor data delivery for large multicast networks The ZIP 4x4 phone supports RTP as a media channel for voice and video applications as described in RFC 1889 Repeater A device that receives a digital signal on a transmission medium and regenerates the signal for the next leg of the medium Repeaters overcome attenuation losses caused by free space electromagnetic field divergence or cable loss over electromagnetic media A series of repeaters facilitates the extension of a signal over long distances Request for Comments RFC A formal document issued by the Internet Engineering Task Force
52. ications line and the resources of a single processor or server within a limited geographic area such as an office building 10BaseT Ethernet is the most commonly used form of LAN A hardware device called a hub serves as the common wiring point enabling data to be sent from one machine to another over the network LANs are typically limited to distances of less than 500 meters and provide low cost high bandwidth networking capabilities within a small geographical area Media Access Control MAC Address A hardware number that uniquely identifies a computer or other device Within an Ethernet configuration the MAC address is a 6 octet address assigned to the network interface card When your computer is connected to the Internet a correspondence table relates your IP address to your computer s physical MAC address on the LAN The MAC address is used by the Media Access Control sublayer of the Datalink Control DLC protocol layer Each physical device type has a different MAC sublayer 60 D Glossary Network Address Translation NAT A standard for translating a secure IP address used within one network to a different IP address known from another network In addition to providing Internet access for trusted networks with privately assigned IP addresses NAT conserves on the number of global IP addresses required by a network because each machine in a network does not require a registered IP address Network Interface Card NIC A
53. is no connection to server GTXT ERROR NOTAUTH before authentication GTXT ERROR NOTDATA if no data GTXT ERROR OK if succeeds Explanation If there are multiple updated messages the function returns GTXT ERROR OK you should use this function to get more until it returns GTXT ERROR NOTDATA calling time refers to the explanation of function GTXT RequestUpdateSMS Message Removing Client Requesting Function prototype int GTXT_RequestDeleteSMS unsigned long dwSMSID Description To send a request to delete a message Parameters dwSMSID Is the message ID got when receiving it Return value GTXT ERROR NOTCONN if there is no connection to server GTXT ERROR NOTAUTH before authentication GTXT ERROR OK if succeeds Explanation GIXT ERROR OK only means the function s success but not deleting the message successfully Clients need to wait for WM GTXT MESSAGE message The low order word of wParam is GTXT EVENT DELETE SMS and the high order word of wParam is the result Param contains the message ID RESPONSE SUCCESSED on high order word of wParam means got server s response call function GTXT ResponseDeleteSMS next to get the result of delete operation RESPONSE TIMEOUT on high order word of wParam means the server has not given out a response within the time out limitation and the delete operation fails Server Responding Function Prototype int GTXT_ResponseDeleteSMS unsigned long dwSMSID BOOL pbDelete Parameters
54. its Non Latin Numbers and Upper Case Lower Case B4 B3 B2 B1 Characters Symbols Latin Characters Latin Characters 0000 space i p 010 40 64150 80560 96170 11 A a q 41 65 51 81 61 7171 11 0010 B b 18 22 34 32 82 e2 98 6 86 8 8 0001 0100 d 4 4 20424 36434 84 64 100 0101 0110 0111 1000 h 5 88568 1001 i y 25129 41439 57 49 73459 89169 105 79 121 J z j z 10NA 26 2A 42 3A 4A 90 6A 106 7A 122 A 1010 NUL DLE o A 0 P 0 16 20 32130 48 SOH DC1 7 1 Q 1 4 17 21 33 31 49 STX DC2 eo A 2 R 2 22 ETX DC3 Y r 3 S 3 33 19123 35133 51 EOT DC4 b a 4 T ENQ NAK 5 5 5 21125 37135 45 85965 101 ACK SYN n amp 6 V f CERA BEL ETB 7 77 23 27 39 37 47 71 57 87467 103 BS CAN z 8 x 8 8p18 24128 40138 56 HT EOM C 9 Y 9 919 SUB LF E VT ESC 1011 esc B 11he 2728 a3l3B 59 FF FS o lt IC GS CR D 13ho 29 2D 45 3D 61 SO RS A f gt E SI US I F 15hr 31l2F 47 3F 63 1100 12 1C 28 2C 4413C 1110 14 1E 30 2E 46 3E 47 GTXT User s Manual A 4 A 5 Unicode Characters 16 bits Unicode characters consume two complete octets so the total size of the SMS message is limited to 70 characters 140 2 If the message comprises characters mostly from the default 7 bit alphabet the entire message is sent as Unicode if there is at least one Unicode character The Unicode characters permit the transmission of special symbols Chinese
55. kilo Watt layer 2 tunneling protocol local area network 53 SE System User s Manual LCD LCR LDAP LED LSB liquid crystal display least cost routing lightweight directory access protocol light emitting diode least significant bit meter milli Ampere mega byte 1 048 576 bytes million bits per second media gateway control protocol mega Hertz multipart Internet mail extension millimeter multi protocol label switching milli second most significant bit milli Watt message waiting indicator not applicable North American numbering plan network address translator nanosecond network time protocol Operations administration maintenance and provisioning open systems interconnection private automatic branch exchange password authentication protocol private branch exchange personal computer printed circuit board pulse code modulation portable document format per hop behavior personal information number plain old telephone service 54 C Acronyms PPP PRA PRI PSTN PSU PTT QoS RAM RARP RFC RMA ROM ROW RSVP RTC RTF RTP RU RxD S SDP SE system SEME SIP SLA SMDI SME SMTP SNMP SNTP TAPI TCP TCP IP TFTP point to point protocol primary rate access primary rate interface public switched telephone network power supply unit post telephone and telegraph administration quality of service random access memory reverse address resolution protocol requ
56. l not send the message 31 GTXT User s Manual 6 3 5 b you want to send a message periodically with customized content and possibly to different recipients each time c you want GTXT to look at the database periodically and send a message when a field changes in the database Follow the steps below 1 Create a linked message as described in section 6 3 1 and section 6 3 2 above Ensure you are satisfied with the message and the recipient number before proceeding because you cannot edit the link after you have scheduled it 2 Click on Schedule GTXT opens the schedule window 3 Configure the schedule as shown in section 5 2 on page 23 4 If you want to send the message once as in example a above select the date and time for the message and click OK 5 Ifyou want to send the message periodically as in example b above click Recur and then select if you want the message to be sent daily weekly monthly or annually 6 If you want to send the message when a field changes in the database as in example c above click Recur Select how often you want GTXT to scan the database If the data changes frequently you may want GTXT to access the database every minute You should choose a time that is appropriate for the application When GTXT accesses the database it may create much traffic on your data network and may use much processing resources How GTXT Displays the Linked SMS After you have initiated the li
57. n Details on how you configure the language of the GTXT application are in section 2 2 1 on page 11 45 GTXT User s Manual A 2 2 The key to the table is as follows The table shows the equivalent ASCII character for that numeric value where it differs from the GSM character equivalent ASCII character GSM character hexadecimal value 125 decimal value Character 0A hex 10 decimal is a line feed LF Any characters following LF that are to be displayed are shown on the next line of the message commencing with the first character position Character 0D hex 13 decimal is a carriage return CR Any characters following CR that are to be displayed are shown on the current line of the message commencing with the first character position Double Word Characters The escape character 1B hex 27 decimal indicates that the character uses two 7 bit words There are eight of these characters When you type any of these characters in GTXT it consumes two characters These characters are not sent as Unicode characters see section A 4 on page 48 so the maximum number of characters in the message is still 160 characters The double word characters are Hexadecimal Decimal Character 1B 14 27 20 A 1B 28 27 40 1B 29 27 41 1B 2F 27 47 1B 3C 27 60 1B 3D 27 61 amp 1B3E 27 62 1B 65 27 101 46 A Encoding for SMS Messages A 3 Default Alphabet B7 B6 BS B
58. nction from recipient 15 file locations 18 A so psi a SERRA 9 local files tok oo tete 15 Outlook folder 15 panel A atom t 9 select folder 8 counter SMS characters 9 19 48 D database see linking a message default alphabet 45 47 documentation see manual double word characters 46 encoding for SMS messages 45 48 English vrai iran 11 OXI GTXT a 9 F failure database write back 29 file locations sssss 18 filter button oooooo oo o 8 16 folder file locations 18 select button oo o oooo 8 FODN configuration 12 definition suus 59 G Greek characters o o ooooooo o o 48 GS8 connectionstatus 13 device name use 13 lOs ad x havent ed 13 user name and password 13 Hebrew characters 48 hide button 9 18 hide GTXT 00 ect 7 history pane oooooocccocccccccoco 9 inactive group tab 8 inactive tab oooooooooommoo o 8 installation oo o ooooooooo o 6 IP addiess seas ni ba pretiu 12 J Japanese characters 48 K Korean characters o oooooo oo o 48 L languages for GTXT application 11 for messages 45 48 see also characters licerisi
59. nd a nuclear war and serve military institutions worldwide First known as the ARPAnet the internet has evolved into public cooperative and self sustaining facility accessible to billions of people worldwide Internet Control Message Protocol ICMP A message control and error reporting protocol between a host server and an Internet gateway that enables hosts to send error or control messages to other hosts ICMP is an integral part of IP and must be implemented by every IP module Instances for sending an ICMP message include datagram processing errors the datagram cannot reach its destination or when the gateway has insufficient buffering capacity to forward a datagram The ZIP 4x4 phone supports ICMP as documented in RFC 792 Internet Engineering Task Force IETF The organization that defines standard Internet operating protocols such as TCP IP The IETF is supervised by the Internet Society Internet Architecture Board IAB IETF members are drawn from the Internet Society s individual and organization membership Standards are expressed in the form of Requests for Comments RFCs Internet Key Exchange IKE The method for exchanging encryption and authentication keys over an unsecured medium such as the Internet Internet Protocol IP A network layer protocol that sends datagram packets between Internet nodes IP is a connection less protocol implying that there is no continuing connection between communicating endpoints IP provides
60. nguage that you want to use for the GTXT application The possible languages are English Russian Chinese simplified Spanish 1 See appendix A starting on page 45 for details on the way languages are transmitted with the GTXT application and the GS8 modular gateway 11 GTXT User s Manual 2 2 2 2 3 Configure account on GS8 x GS8 Modular Gateway Location O IP Address 10 10 1 201 x O Domain Name gs8 calif zed 3 com x Port 16200x Name optional Use slot Bll 3 User Name USofA x Password x Y Save Password O Retrieve all messages at startup operator Licensing Product Id OO1EEC1E14BC Copy ID You can send 421 more SMS messages Enter your license key to keep GTXT operational About Register Regional Language English USA SMSsize O 160 normal O 140 5 Click Save 6 Closethe GTX application by clicking on Close Start the GTXT application again for the new language settings to take effect Selecting the Default SMS Size Under the GSM specifications the size of an SMS is 160 characters You should normally leave the radio button to select the SMS size to 160 characters However some service providers have installed equipment that limits the size of the message to 140 characters If you believe that your messages are limited to 140 characters select 140 on this pane This parameter does not restrict the size of the message that you can send or rec
61. nked message GTXT moves the message to the history pane but does not show any date or time On the tab GTXT shows a database symbol before the name you gave to this linked message as shown in section 6 3 2 on page 30 If you schedule the message it appears as shown below igi xd ES Link schedule Unna 69 x auto repair mikes garage Link schedule named Unnamed schedule starts at 1 29 2009 2 41 00 PM SMS body Dear Milpitas Cars Name of Owner your Milpitas Cars Car Make Milpitas Cars Car Model is ready for pick up The total bill is Milpitas Cars Repair Cost Thank you Mike s Garage Link schedule was sent at 1 29 2009 2 41 41 PM gj CarMako Link schedule was sent at 1 29 2009 2 42 00 PM x uid Car Model Name of Owner Mobile Number Mobile Number Status m Repair Cost 1 Date m Time Characters number unknown 32 6 Linking to a Database 6 4 6 4 1 6 4 2 6 5 Editing a Linked Message Message that is not Scheduled To edit the link 1 Select the tab that has the linked message 2 Click on the Link button 3 Alter the parameters as required and press OK Message that is Scheduled You can edit only the schedule not the link 1 Select the tab that has the linked message 2 Click on the Schedule button 3 Alter the parameters as required and press OK Deleting a Linked Message 1 Select the tab that has the link or scheduled link 2 Click on X that is
62. nt and source The simplest authentication method requires a user name and password to gain access to a specified account Authentication protocols can be based on secret key encryption or on public key systems using digital signatures Authorization The process of verifying the identity of a person or device Authentication is commonly performed through logon passwords knowledge of the password is assumed to guarantee that the user authenticity Internet business and many other transactions may require a more stringent authentication process such as the use of digital certificates issued and verified by a Certificate Authority as part of a public key infrastructure Logically authentication precedes authorization although they may often seem to be combined Bridge A device that connects network segments that use the same protocol such as Ethernet A bridge forwards traffic between network segments on the basis of data link layer information these segments would require a common network layer address Called Party The person or device that receives a phone call or data transmission Calling Party The person or device that initiates a phone call or data transmission Contact A device where a user can be reached Decryption Decryption is the process of converting encrypted data to its original form See Encryption 57 SE System User s Manual De Militarized Zone DMZ A computer host or small network placed between a company s
63. ntroduction This feature allows you to send a message in the future You can send the message one time or at a recurrent period that you determine The various elements of the GTXT window are shown in section 1 5 on page 8 Configuring the Schedule 1 Selectthe recipient or group of recipients as described in section 3 4 on page 17 2 Create your message as described in section 4 2 on page 19 3 Click on the Schedule button GTXT opens the Schedule window as shown below x Name for this schedule Reminder of water pump x SMS body List of recipients Send SMS at Thursday 29 Januar 2009 v day 06 00 f I time Send O Once O Recur Recurrence pattern Q Intraday Q every 1 minutes O Daily O Weekly IF except from set to set O Monthly Oat Yearly Range of recurrence Start O No end date O Endafter Occurences O Endby Wednesday28 January 2009 23 GTXT User s Manual 5 3 5 4 10 11 12 Enter a name for this schedule This is used to access the schedule in future Choose the time of day at which you want GTXT to send this SMS GTXT displays the time format for you to enter the time in the format configured for your PC If you are going to send the SMS only at one time GTXT will send the message anywhere from one minute to 23 hours and 59 minutes in the future Select whether GTXT will send this message once with a recurrence by using the radio button If you want th
64. onnects to server Function prototype BOOL GTXT IsConnective Description To find out if the connection to server is built up Parameters none Return value TRUE if it has been connected to GS8 FALSE otherwise Explanation no Whether passes server s use authentication Function prototype BOOL GTXT IsAuthentic Description To find out if the user has passed the authentication on the server Parameters none Return value TRUE if passed FALSE otherwise Explanation no 37 GTXT User s Manual 7 4 4 7 4 5 7 4 6 7 4 7 7 4 7 1 Set Message Notifying Window Function prototype void GTXT SetMessageWnd HWND hWnd Description Set message notifying window for results of requests or events Parameters hWnd The window HANDLE for receiving results of requests and event message notifications Return value no Explanation no Connect to Server Function prototype BOOL GTXT ConnectServer const char pszServer int nPort Description To connect to server Parameters e PszServer The IP address of server nPort The port of server Return value TRUE if succeeds FALSE if the function fails or the connection exists already Explanation TRUE only indicates the running success of this function but not the success of connecting to server Clients need to wait for WM GTXT MESSAGE message The low order word of wParam is GTXT EVENT CONNECT SERVER and the high order word of wParam is th
65. or the first message slot 2 if enabled for the second message and so on This selection has no effect on received messages The GS8 will read SMS messages from any slot and will forward to GTXT users according to the rules programmed on the GS8 Enter the user name and password that you or your administrator configured on the GS8 On the GS8 administration software you configure this under SMS GTXT Client Select whether you want GTXT to read the messages stored on the GS8 at startup When no GTXT users are logged into the GS8 the GS8 will save messages that are received When you enable this selection GTXT will retrieve those SMS messages when it starts You normally enable this if you are performing an operator type of function and will distribute the messages to others who are using GTXT and the GS8 Multiple users can enable this selection and the first person to log in after the GS8 has stored messages will receive them If you are the only user of GTXT on the GS8 you should enable this selection If there is a group of users at least one of you should enable this selection Click Save Connecting to the GS8 After you close the configuration window GTXT attempts to register with the GS8 GTXT displays the status of the connection on the title bar of the GTXT application The displayed conditions are Resolving domain name This indicates that GTXT is trying to find the IP address that corresponds to the FODN that you ente
66. osing see section 4 2 on page 19 for standard messages see section 5 2 on page 23 for scheduled messages and section 6 3 4 on page 31 for messages that are linked to a database History pane Displays a standard message that you have sent or received see section 4 2 on page 19 and section 4 2 on page 19 Displays a message that you have scheduled see section 5 2 on page 23 Displays a message that is linked to a database section 6 3 5 on page 32 1 6 About our Documentation 1 6 1 Related Documentation If you are installing or supporting the GS8 please obtain the GS8 Quick Start Guide and the GS8 User s Manual from the Zed 3 web site http www zed 3 com web EN Software n Data htm On our web site we also have application notes and white papers on the use and integration of the GS8 and GTXT into your work environment These are available here http www zed 3 com web EN Application_Notes htm GTXT User s Manual 1 6 2 1 6 3 Colophon This document was produced on personal computers using Adobe s FrameMaker for Windows The headings are set in Swiss 721 Bitstream s version of the Helvetica typeface the copy is set in Zapf Calligraphic Bitstream s version of the Palatino typeface notices are set in Swiss 721 or News Gothic Bitstream s version of the Kingsley ATF Type Corporation typeface The drawings were produced using Adobe Photoshop and Adobe Illustrator Documentation Feedback Zed 3 appreciates any
67. phabet is mandatory for all GSM systems The 7 bit characters are defined in ETSI TS 100 900 GSM 03 38 version 7 2 0 Release 1998 Alphabets and language specific information 86 2 The 16 bit characters are defined in ISO IEC10646 Universal Multiple Octet Coded Character Set UCS UCS2 16 bit coding The 7 bit characters and the 16 bit characters allow you to send and receive messages in any language Your PC must be properly configured to permit you to input the language of the message you want to create and to display a message you receive in that language Consult your Windows documentation for further details A 2 7 Bit Characters A 2 1 Single Word Characters The complete character set is shown in the table in section A 3 on page 47 160 of the 7 bit characters are packed into 140 octets 160 x 7 8 140 These characters are referred to as the default alphabet and approximate the ASCII character set The differences between the default alphabet and the ASCII characters are indicated in the table 1 The GSM specification permits the use of an 8 bit character set Such usage is user defined and has never gained wide spread acceptance It is not supported on GTXT or the GS8 2 Some service providers transmit SMS messages that are only 140 characters See section 2 2 2 on page 12 for how you can indicate this to GTXT 3 Thelanguage of the message is not related to the language that you use to control the GTXT applicatio
68. r building applications for a range of business processes If you do not have the NET Framework installed on your IC the installation software will automatically installit This will take about ten minutes on a fast PC and much longer on older PCs Please be patient while this installs After the NET Framework is installed or if you already had it installed the installation software will install the GTXT application This proceeds quickly If you have Microsoft Outlook running the installation program asks you to close it Running the program After the software is installed you can run it from the Start menu or you can restart Outlook and run GTXT from within Outlook 1 SMS messages are often referred to as text messages The term SMS is used throughout this manual The term message is used in this manual to describe a communication Each SMS has a limited number of characters but a message may have many more Therefore a message may be sent as many SMSs 2 Appendix A starting on page 45 describes in detail the encoding used to send an SMS message and the total number of characters available in a specific message 1 Installation 1 4 1 1 4 2 1 4 3 1 4 4 Running as a stand alone application From the Windows main start menu select Start Programs Zed 3 GTXT SMS You cannot run the application as a stand alone application if you have Outlook running Close Outlook wait until Windows has fully exited th
69. red Unable to resolve domain name GTXT could either not communicate with a DNS server to resolve the domain name or the DNS server could not provide an IP address for the domain name The possible faults are that you do not have connectivity to the network or you incorrectly typed the domain name Authenticating This means that GTXT has found the GS8 and has sent the user name and password GTXT is waiting for a positive response 1 See appendix B starting on page 49 for details how to configure an operator type of user on the GS8 13 GTXT User s Manual 2 5 2 5 1 2 5 2 2 5 3 Login failure The login credentials user name and password were rejected by the GS8 Check that you typed these correctly If you are sure you have done so contact the administrator of the GS8 Connected to lt description gt This is the normal indication It will show the name if you have given one the FODN if you specified one or the IP address If the GTXT software has connected to the G58 you are now ready to send and receive SMS text messages Licensing License Choices You can use the GTXT application freely to send 300 SMSs After you have sent that number of messages you must buy a license to continue to use GTXT Zed 3 sells licenses that allow you to send 1000 SMSs anunlimited number of SMSs If you send only a few messages a day the license for 1000 messages may be your best choice If you use GTXT heavil
70. see section 1 5 on page 8 Then select your recipient or recipients as usual and compose and send the message as usual The new message appears in a new tab which is the active tab All other tabs are inactive Continue to add tabs as required for different communications When there is insufficient space along the top of the history pane to display all the tabs GTXT shows a pull down triangle to permit access to the tabs you cannot see 4 4 2 Receiving a Message When You Have Multiple Tabs If you have multiple communications and therefore multiple tabs GTXT will place the message in all applicable tabs that you have open The applicable tabs are those in which the recipient of an SMS is a member For example suppose you have sent the following message message 1 to Allen Beth and Charles message 2 to Beth and Danielle message 3 to Charles and Danielle message 4 to Beth only When a Allen sends a reply GTXT will display it in tab 1 b Beth sends a reply GTXT will display it in tabs 1 2 and 4 o Charles sends a reply GTXT will display it in tabs 1 and 3 a Danielle sends a reply GTXT will display it in tabs 2 and 3 4 4 3 Closing a Tab To close a tab click on the X that GTXT shows to the right of the contact s name on the tab You cannot undo this action However if you want to show the contents of the history pane again create a new tab as described in section 4 4 1 above and place the recipient or
71. select all names 3 When you have selected multiple contacts use right click and then select Remove to remove them from the list of recipients Hiding and Showing the Contacts Panel Click on the Hide button to hide the panel This occupies less space on your screen and is convenient if you have tabs open for the people you will communicate with Click on the Contacts button to display the panel again File Locations The contact files are stored in these locations For Outlook C Documents and Settings lt local user NLocal Settings Application DataMMicrosoftNOutlookNoutlook pst For GTXT local files C Documents and Settings lt local user NLocal Settings Application Data Zed 3 GTXT My_Local_Contacts xml The path for local user is that determined by your login to Windows 18 Chapter 4 Messages and History 4 1 Introduction You can keep track of each of your SMS messages using tabs within GTXT You can display many tabs to easily access a specific SMS interaction After you close a tab when you next start a communication with a specific contact GTXT shows you previous communications with that contact The various elements of the GTXT window are shown in section 1 5 on page 8 4 2 Sending a Message 1 Select the recipient or group of recipients as described in section 3 4 on page 17 2 Enter the message in the message pane by doing one of the following click in the message pane and type the message b
72. sociated with layer 2 of the OSI communications model Transmission Control Protocol TCP A set of communications protocols that when used with Internet Protocol 1P support peer to peer connectivity functions for both local and wide area networks TCP IP is a communications protocol which allows computers with different operating systems to communicate with each other and controls how data is transferred between computers on the Internet While IP handles the actual delivery of data TCP tracks the data packets into which a message is divided for efficient routing through the internet The ZIP 4x4 phone supports TCP as described by REC 793 Trivial File Transfer Protocol TFTP An Internet software utility for transferring files that while simpler to use than FTP provides fewer features TFTP is used where user authentication and directory visibility are not required The ZIP 4x4 phone uses TFTP to download configuration files and software updates from the TFTP Server as described in RFC 1350 Trunk Port A device that allows a switch to bundle traffic from several VLANs through a single physical port sorting the various packets by the VLAN identifier VID in their frame headers Trusted Network Networks inside your network security perimeter Only known and approved sources are allowed access to a trusted network Tunnelling The transmission of data intended for use only within a private network through a public network in such a way t
73. technology Originally developed at the Xerox Corporation Palo Alto Research Center Ethernet is specified in the IEEE 802 3 standard Ethernet is a best effort delivery system that uses CSMA CD technology Ethernet can be run over a variety of physical media including coaxial twisted pair and fiber optics Firewall A device located at a network gateway server that protects the resources of a private network from external entities Typically comprises a set of related programs or a dedicated computer equipped with such security features as logging reporting alarms and a control mechanism File Transfer Protocol FTP An application layer standard Internet protocol that uses the TCP IP protocols to exchange files between computers on the internet Commonly used to transfer web page files from the creator to a server or to download programs and other files from a computer to other servers Described by RFC 959 58 D Glossary Foreign Exchange Office FXO An analog interface that connects to the Public Switched Telephone Network PSTN central office and is the interface offered on a standard telephone Foreign Exchange Station FXS An analog interface that connects directly to a standard telephone and supplies ring voltage and dial tone FTP Account An SE system identifier that points to an FTP address Fully Qualified Domain Name FQDN The portion of an Internet URL that identifies the server program that an Internet
74. ted the function GTXT ResponseClientAuth returns failure at the time Server Responding Function prototype int GTXT ResponseClientAuth int pnAuth Description To get the result of user authentication Parameters pnAuth the result of authentication may be one of these GTXT AUTH OK authenticate approved GTXT AUTH FAILED authenticate rejected GTXT AUTH ALREADYLOGIN the user has logon already Return value GTXT ERROR NOTCONN if there is no connection to server GTXT ERROR OK otherwise Explanation See the explanation of function GTXT RequestClientAuth Line Information Client Requesting Function prototype int GTXT RequestLineStatus Description To send a request for line information Parameters none Return value GTXT ERROR NOTCONN if there is no connection to server GTXT ERROR NOTAUTH before authentication GTXT ERROR PENDING if the server has not given out result GTXT ERROR OK if succeeds Explanation GTXT ERROR OK only means the function s success but not getting the line information Clients need to wait for WM GTXT MESSAGE message 39 GTXT User s Manual 7 4 8 2 7 4 9 7 4 9 1 The low order word of wParam is GTXT EVENT LINE STATUS and the high order word of wParam is the result RESPONSE SUCCESSED on high order word of wParam means receiving server s response call function GTXT ResponseLineStatus next to get line information RESPONSE TIMEOUT on high order word of wParam means only part
75. ted in RFC 2131 and are DHCP enabled by default Advanced Encryption Standard AES Also known as Rijndael thisis a block cipher adopted asan encryption standard by the U S government and developed by two Belgian cryptographers Joan Daemen and Vincent Rijmen It has been analyzed extensively and is now used widely worldwide as a replacement for its predecessors the Data Encryption Standard DES and the triple DES 3DES AES was announced by the NIST on 26 November 2001 after a 5 year standardization process and became a standard on 26 May 2002 It is one of the most popular algorithms used in symmetric key cryptography and is acceptable by the US government for classified information up to Top Secret Encryption The process of converting data into a form that can be read only by the intended receiver Decryption is the process of converting encrypted data to its original form Traditional encryption schemes utilize the same key to encrypt and decrypt data Public key encryption schemes require two keys a public key which anyone may use and a corresponding private key which is possessed only by the person who created it With this method anyone may send a message encrypted with the owner s public key but only the owner has the private key necessary to decryptit PGP Pretty Good Privacy and DES Data Encryption Standard are two of the most popular public key encryption schemes Ethernet The most widely installed local area network LAN
76. the recipient to the recipient panel Adding a Number 1 Toaddanumber without creating a new contact in the local file or adding it to an Outlook file type the number in the text field at the bottom of the contacts panel 2 GTXT will start to search through the contacts in the currently selected folder to see if there is a match as described in section 3 3 3 above 1 When you select All the performance will be degraded as GTXT needs to search through many more names and num bers 17 GTXT User s Manual 3 4 3 3 4 4 3 5 3 6 3 If GTXT cannot find a match it will display all the contacts in the folder again and display a plus sign 4 to the left of the text field 4 Click on the to add that number to the list of recipients 5 GTXT moves the number you typed to the list of recipients and clears the text field Removing Contacts You can remove contacts from a local file as described in section 3 2 2 above You remove contacts from an Outlook folder using the tools incorporated into Outlook Removing Recipients of the SMS 1 Find the name you want in the recipient panel highlight it and do either a double click the name b right click and select Remove 2 You can select multiple names by doing one of the following a highlight the first name and press Shift click on a range of names b highlight one of the names and press Ctrl click on subsequent names c highlight any name and press Ctrl A to
77. the status of that connection see section 2 4 on page 13 Inactive tab to an individual Click to make this active see section 4 4 1 on page 21 Active tab Messages you compose will be added to this tab see section 4 4 1 on page 21 Close tab Removes the tab from the GTXT window but does not delete the history associated with the recipient or recipients see section 4 4 3 on page 21 Inactive tab to a group This indicates that GTXT sent a message to multiple contacts see section 4 2 on page 19 Add new tab Click to create a new tab to reflect communication with a different contact or group of contacts see section 4 4 1 on page 21 Pull down to show more tabs Display the list of tabs when there is insufficient space to view all of the tabs above the history pane see section 4 4 1 on page 21 Select folder Choose which folder contains the recipient of the message see section 3 2 1 on page 15 and section 3 3 1 on page 16 Filter button This filters the contacts from the specified folder that GTXT will show in the contacts panel see section 3 3 1 on page 16 1 Installation Show button This changes how GTXT presents or shows the contacts from the specified folder in the contacts panel see section 3 3 2 on page 16 Contacts panel Displays selected contacts see section 3 3 on page 16 To show this panel click on the Contacts button see section 3 5 on page 18 Search or add number By typing a few characters in
78. this field you can filter the contacts that GTXT displays in the contacts panel see section 3 3 3 on page 17 You can add a phone number here to be a recipient of a message by typing a number see section 3 4 2 on page 17 Z button Configure how GTXT communicates with the GS8 see chapter 2 starting on page 11 Also allows you to add and delete contacts from a local file see section 3 2 on page 15 Hide button Hides the contacts panel see section 3 5 on page 18 Contacts Button Thisis visible only when the Contacts panel is hidden Click this button to show the contacts panel Recipient pane Displays the contacts that will receive the message you are composing section 3 4 on page 17 Close button Exit the GTXT application See section 1 4 4 on page 7 Link button This feature allows you to send a message upon a change of a record in a database The contents of the message can comprise data from other fields in the database See chapter 6 starting on page 25 Schedule button This feature allows you to send a message in the future You can send the message one time or at a recurrent period that you determine See chapter 5 starting on page 23 Send button Send the message immediately see section 4 2 on page 19 SMS and character counter GTXT shows how many SMS messages your text will use and how many characters remain to fill the current SMS see section 4 2 on page 19 Message pane Displays the message that you are comp
79. tig spas toa a ese dd ot 14 link button o oooooocoomm 9 25 link multiple SMSs sent together 19 linking message fields of database 25 linking messages caution regarding closing GTXT 7 connect to database 26 description 25 33 preview tab ooooooo ooo 28 send on conditions 27 sendtab rial 26 send unconditionally 27 specify database 25 write back to database 29 local file for contacts 15 long messages character details 48 database write back 29 M manual acronyms sss 51 56 colophon 0 085 10 feedback i eme 10 related documentation 9 message pane 6 cece eee ee 9 messages see receiving messages see sending messages see SMS messages Microsoft NET framework 6 65 GTXT User s Manual Outlook see Outlook N number field add recipient 9 O operator enable for startup messages 13 Outlook folder selection 8 P password cede coke ehh Danada 13 phone numbers see contacts port address ess mate ern 13 preview tab link to database 28 productID ss setar a ev ESSAY 14 pull down to show tabs 8 R receiving messages 20 retrieval at startup 13 see also SMS messages recipient distinction from contact 15
80. utes depending on your application Alternatively if you are the only user of a specific GS8 you may choose that all messages are received by your GTXT In any event you must have GTXT active running on your PC to receive any messages Showing a Received Message in GTXT GTXT displays any received messages in the history pane and precedes it with the date and time The format for the date and time is that which you have configured for your PC GTXT shows this message in blue color If you have one communication with one recipient then you will have only one tab open and active All messages will appear under that tab 1 If you have a single port on your GS8 and you are sending a message for example to 100 recipients the time between the transmittal of the first and last messages could be 10 to 15 minutes and longer if other users are using the GS8 To reduce this time add multiple GSM or CDMA modules to your C58 2 See appendix B starting on page 49 for details how to configure an operator on the GS8 20 4 Messages and History 4 4 Using Tabs You can use GTXT with just a single tab visible at any time However if you have communications with multiple recipients or groups of recipients you will want to use the tab feature on GTXT to organize these communications 4 4 1 Creating a New Message If you want to send a message to a different recipient or group of recipients click on the to add a new tab
81. will be saved in GS8 when they can t be forwarded to destination C None C Messages From GSM C Messages From SIP All Messages If the GS8 determines that an incoming SMS message is not a reply message to any GTXT user it will try to route the message according routing plan defined in the SMS Route window If the GS8 can not route a SMS message according to the routing plan defined in SMS Route it will store the message on the GS8 in the SMS Received Message window In this case the only way to retrieve the message is through the administration UI 49 GTXT User s Manual Under most applications it is not desirable to store any SMS messages on the GS8 Therefore it is necessary to configure a user of GTXT that acts as the operator This configuration is done on the GS8 and ensure that such a GTXT user will receive all messages that are not replies or that are not forwarded to any other user To accomplish this you need to modify the routing table in the SMS Route window to route all the messages to a GTXT user In the example shown below a rule is defined to forward all incoming messages to GTXT user 16 510301 510250 ALL 510676 ALL 210212 ALL 14085858523 ALL Description Operator TEM FALL F sti gt Source Line Fa Fa F 10 Fu Faz F 14 Caller Pattern Es Callee Pattern GSM C sloti ew C1 C 10 Cu C12 Cw Destination Line 3 Ca cs ce cz C9 13 50 Appendix C Acronyms
82. y you should buy an unlimited license The license is tied to your particular PC If you change your PC you must buy a new license for the other PC Obtaining a License 1 Openthe Configuration window as described in section 2 2 on page 11 2 Click on Copy ID to copy the product ID to your PC s clipboard 3 Paste that product ID in an e mail and send it to your reseller authorized to sell Zed 3 products 4 You will receive the license by e mail Installing the GTXT License 1 Openthe Configuration window as described in section 2 2 on page 11 2 Paste the license in the window and click on Register 3 GIXT will increase the number of messages you can send or set them to unlimited 14 3 1 3 1 1 3 1 2 3 2 3 2 1 Chapter 3 Selecting the Recipient Introduction Distinction between Recipient and Contact A recipient is a person more specifically a phone number to whom you are sending a message A contact is a person again strictly a phone number that resides in one or more files accessible to your computer Choices of Contacts When you are using GTXT as a stand alone application you can select the recipient of an SMS by choosing a contact from a local file of names and numbers or by directly typing in the number When you are using GTXT from within Outlook you can select the recipient of an SMS by choosing a contact from an Outlook contact folder a local file of names and numbers or by
83. you have typed For example if you type an then GTXT will show the names Angela Frank and Wang GTXT will look only in the selected folder 3 If you type some digits GTXT will select to show the phone number regardless if you selected to have it already displayed with the Show button as described in section 3 3 2 above For example if you type 408 then GTXT will show the numbers 408 587 9333 650 408 1224 and 86 1391 6408 GTXT will look only in the selected folder 4 To remove this match delete the characters in the text field GTXT will show all the contacts once more Choosing Recipients of the SMS Adding a Contact 1 Ensure the contact panel is visible Click on Contacts if it is not 2 From the pull down list of folders at the top of the contacts panel select the folder that contains the name you want to use or select All if you are unsure in which folder the specific contact is located 3 Find the name you want highlight it and do either a double click the name b right click and select Add Selected 4 You can select multiple names by doing one of the following a highlight the first name and press Shift click on a range of names b highlight the one of the names and press Ctrl click on subsequent names c highlight any name and press Ctrl A to select all names 5 When you have selected multiple contacts use right click and then Add Selected to add them to the list of recipients 6 GTXT moves the name of
Download Pdf Manuals
Related Search
Related Contents
Bedienungsanleitung DAL-311x9x0S - ACS-Control Simpli Home 3AXCRGL007 Instructions / Assembly MC35-20 - Rhino Assembly Corporation Quadram QuadMaster III software Users Manual Electrolux EMT38409AX microwave JVC HR-P55A User's Manual Lite-On 52x 32x 52x Half-Height CD-RW Copyright © All rights reserved.
Failed to retrieve file