
CALL PROCESSOR
5.3.6 KEYBOARD LOCK
The system operator has the ability to lock the keyboard by password control to prevent the unauthorized use of the Call Processor. The password is a single level of control.
5.3.7 LOG OUT/LOG IN
This function allows the operator to log out of Call Processor thereby locking the keyboard from unauthorized usage. Once the Call Processor has been logged out, the function becomes Log In. The log in function will ask for a password. If the password is not correct, access is denied.
5.4 ALARM CONTROLThe alarm control is where errors are time stamped and passed to the activity log function and the message accounting output function.
5.5 SYSTEM ANALYZERThe Call Processor has the ability to perform an analysis on the system. This is a complete handshake (interrogation) of a test mobile in the RF coverage of sites. This verifies the correct operation of the system to and from the mobile. The analysis includes all links including the antenna systems and RF coverage. The system analyzer has the ability to automatically disable channels from the system that do not pass the analysis.
The Call Processor processes Unique ID calls, telephone calls and group site calls (see Call Sequence Appendix B). Normal dispatch call processing is handled independently in the associated modules.
The Call Processor determines if an originated Unique ID call is to be automatically routed or not and routes the call to the appropriate facility, i.e. DIM or SNM. The destination Unique ID call is processed by the Call Processor to determine routing to a DIM or CIM. Both origination and destination calls are accounted for and a message accounting record is generated.
The dialed digits of an incoming telephone call determine the Unique ID requested and the Call Processor routes the call to where the Unique ID is registered. The Call Processor determines if the Unique ID on an outgoing call has the proper permission for the digits dialed, selects the proper trunk, and creates a message accounting message.
The group site call is routed to the site selected on origination and creates a message accounting record.
The Call Processor uses the information from the SSB to validate the use of the system for audio on Home repeater channel, Group ID sets and Unique IDs. If an unauthorized user is detected, the Call Processor intervenes and disconnects the audio being transmitted from the modules or mobiles.