Telephony Services
Application Programming Interface
(TSAPI)
Version 2
Lucent Technologies – Formerly the systems and technology units of AT&T
Issue 2.0
January 1997
Copyright 1997 Lucent Technologies Inc.
All Rights Reserved
Printed in U.S.A.
Notice
Every effort was made to ensure that the information in this document was complete
and accurate at the time of printing. However, information is subject to change.
Your Responsibility for Your System’s Security
Toll fraud is the unauthorized use of your telecommunications system by an
unauthorized party, for example, persons other than your company’s employees,
agents, subcontractors, or persons working on your company’s behalf. Note that there
may be a risk of toll fraud associated with your telecommunications system and, if toll
fraud occurs, it can result in substantial additional charges for your telecommunications
services.
You and your system manager are responsible for the security of your system, such as
programming and configuring your equipment to prevent unauthorized use. The system
manager is also responsible for reading all installation, instruction, and system
administration documents provided with this product in order to fully understand the
features that can introduce risk of toll fraud and the steps that can be taken to reduce
that risk. Lucent Technologies does not warrant that this product is immune from or will
prevent unauthorized use of common-carrier telecommunication services or facilities
accessed through or connected to it. Lucent Technologies will not be responsible for
any charges that result from such unauthorized use.
Lucent Technologies Fraud Intervention
If you suspect that you are being victimized by toll fraud and you need technical support
or assistance, call the Technical Service Center Toll Fraud Intervention Hotline at 1-800-
643-2353.
Trademarks
Novell, NetWare, the N-Design, MacIPX and the NetWare logotype are registered
trademarks of Novell, Inc. NLM is a trademark of Novell, Inc.
Microsoft, DOS, Windows, and the Microsoft logotype are registered trademarks, and
Windows NT is a trademark of Microsoft Corp.
Apple and Macintosh are registered trademarks and QuickTime is a trademark of Apple,
Inc.
OS/2 and PowerPC are registered trademarks of IBM.
PassageWay, CallVisor®, DEFINITY® and the Lucent Technologies logotype are
registered trademarks of Lucent Technologies.
UnixWare is a registered trademark of The Santa Cruz Operation.
The following abbreviations and conventions are often used in this document:
“DEFINITY Generic 3” or “Generic 3” for DEFINITY Communications System Generic 3,
and “G3PD” for the DEFINITY Generic 3 PBX Driver. The terms “PBX” and “switch” are
used interchangeably to mean “private branch exchange.” All products and company
names are trademarks or registered trademarks of their respective holders.
Disclaimer
Intellectual propert related to this product and registered to AT&T Corporation has been
transferred to Lucent Technologies Incorporated.
Any references within this text to American Telephone and Telegraph Corporation or
AT&T should be interpreted as references to Lucent Technologies. The exception is
cross-references to books published prior to December 31, 1996, which retain their
original AT&T titles.
Heritage
Lucent Technologies − formed as a result of AT&T’s planned restructuring − designs,
builds, and delivers a wide range of public and private networks, communication
systems and software, consumer and business telephone systems, and microelectronic
components. The world-renowned Bell laboratories is the research and development
arm for the company.
Acknowledgment
This document was prepared by the Business Communications Systems Product
Documentation Development Group, Lucent Technologies, Middletown, NJ 07748-1998.
Page i
Contents
1Abstract
2Introduction
Purpose........................................................................................................................................................2-1
Product Architecture....................................................................................................................................2-2
Telephony Services Applications.......................................................................................................2-6
3TSAPI Call Model
Terminology................................................................................................................................................3-1
Definitions .........................................................................................................................................3-1
Acronyms...........................................................................................................................................3-5
Architecture.................................................................................................................................................3-6
Distribution of Computing and Switching Functions.........................................................................3-6
API Services ......................................................................................................................................3-8
Services and Objects..........................................................................................................................3-8
Functions ...........................................................................................................................................3-8
TSAPI Switching Sub-Domain Model...............................................................................................3-9
TSAPI Device ........................................................................................................................3-10
Call.........................................................................................................................................3-13
TSAPI Connections................................................................................................................3-14
Call Status Event Reports.......................................................................................................3-17
TSAPI Call States...................................................................................................................3-18
Dynamic Identifier Management .....................................................................................................3-19
4Control Services
Opening, Closing and Aborting an ACS Stream .........................................................................................4-2
Sending CSTA Requests and Responses.....................................................................................................4-5
Receiving Events.........................................................................................................................................4-6
TSAPI Version Control...............................................................................................................................4-9
Private Data Version Control ....................................................................................................................4-10
评论0