Model Name Manual Name


Add to my manuals
161 Pages

advertisement

Model Name Manual Name | Manualzz

SCM Compact (IPX-S300B)

System Description

COPYRIGHT

This manual is proprietary to SAMSUNG Electronics America and is protected by copyright.

No information contained herein may be copied, translated, transcribed or duplicated for any commercial purposes or disclosed to the third party in any form without the prior written consent of SAMSUNG Electronics

America.

TRADEMARKS

Product names mentioned in this manual may be trademarks and/or registered trademarks of their respective companies.

This manual should be read and used as a guideline for properly installing and operating the product.

All reasonable care has been made to ensure that this document is accurate. If you have any comments on

this manual, please contact our documentation center at the following homepage:

Homepage: http://www.we-operations.com

©2015~2017 SAMSUNG Electronics America. All rights reserved.

General User Information

Radio Frequency Interference

This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to FCC Part 15 Rules.

These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.

Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his/her own risk.

FCC Requirements

The IPX-S300B (SCM Compact) equipment complies with FCC Part 68 Rules and requirements adopted by Administrative Council for Terminal Attachment (ACTA).

The FCC Part 68 label is located on the bottom of the chassis. The label contains:

Product Identifier Number

FCC Registration Number

Ringer Equivalence Number (REN)

Telephone Company Interfaces

A plug and jack is used to connect this equipment to the premises wiring and telephone network must comply with the FCC Part 68 rules and requirements adopted by the ACTA.

A compliant telephone cord and modular plug is provided with this product which is designed to connect to a compatible Standard Modular jack.

Connection to the telephone network should be made by using standard modular telephone jacks, type RJ-11C. The RJ-11C plug and/or jacks used must comply with the FCC Part 68 rules.

Unauthorized Modifications

Any change or modifications performed on this equipment that are not expressly approved in writing by SAMSUNG ELECTRONICS AMERICA could cause non-compliance with the FCC rules and void the user’s authority to operate the equipment.

© SAMSUNG Electronics America page 3 of 161

Ringer Equivalence Number

The REN is used to determine the number of devices to be connected to a telephone line.

If the total allowable REN load is exceeded, the phone circuit may fail to ring. In most cases, the total REN for a telephone line should not exceed Five (5).

Contact Local Telephone Company, to be certain about the number of devices connected to a line, which is determined by the total REN.

For earlier products, the REN is separately shown on the label.

Incidence of Harm

The telephone company will notify you in advance about the temporary discontinuation of service, if this equipment is causing harm to the telephone network.

In case advance notification is not feasible, the telephone company will notify the customer as soon as possible and you will also be advised about your right to file a complaint with the FCC, if it is necessary.

Changes to Telephone Company Equipment or Facilities

The telephone company may make changes in its facilities, equipment, operations or procedures that could affect the operation of the equipment.

If this happens, the telephone company will provide advance notice in order for you to make necessary modifications to maintain uninterrupted service.

Service Center

If you need assistance during troubleshooting, please contact out local office SAMSUNG

ELECTRONICS America for repair or warranty information.

If the trouble is causing harm to the telephone network, the telephone company may request you to remove the equipment from the network until the problem is resolved.

Field Repairs

Only technicians certified on the SAMSUNG Communication Manager are authorized by

SAMSUNG ELECTRONICS America to perform system repairs.

Certified technicians may replace modular parts of a system to repair or diagnose trouble.

Defective modular parts can be returned to SAMSUNG ELECTRONICS America for repair.

General

Connection to party line service is subject to state tariffs. Contact the State Public Utility

Commission, Public Service Commission or Corporation Commission for information.

© SAMSUNG Electronics America page 4 of 161

Equal Access Requirements

Through the use of access codes, this equipment is capable of providing user’s access to interstate providers of operator services. Modification of this equipment by call aggregators to block access dialing codes is a violation of the Telephone Operator Consumers Act of

1990.

Electrical Safety Advisory

Parties responsible for equipment requiring AC power should consider including an advisory notice in their customer information suggesting them to use a surge arrestor.

Telephone companies report that electrical surges, typically lightning transients, are very destructive to customer terminal equipment connected to AC power sources. This has been identified as a major nationwide problem.

Music on Hold Warning

In accordance with US copyright laws, a license may be required from the

American Society of Composers, Authors and Publishers (ASCAP) or other similar organizations if copyright music is transmitted through the Music on Hold feature

SAMSUNG ELECTRONICS America hereby disclaims any liability arising out of failure to obtain such a license.

DISA Warnings

The lines used for the DISA feature must have the disconnected Supervision option provided by the telephone company.

As it is impossible to control who may access your DISA line it is suggested that you do not turn this feature on unless you intend to use it. If you do use this feature, it is good practice to frequently change pass codes and periodically review your telephone records for unauthorized use.

Safety Warnings

High touch current earth connection is essential before making telecommunication network connection.

Energy Hazard-careful treatment is needed.

© SAMSUNG Electronics America page 5 of 161

Every wire for communication should be larger than 26 AWG.

Double pole/neutral fusing.

Underwriters Laboratories

The IPX-S300B has been tested to comply with Safety Standards in the United States and

Canada. This system is listed with Underwriters Laboratories. The UL Mark is separately shown on the label.

Installation Safety Guidelines and Warnings

Safety Recommendations

The Safety Warnings that appear in this document (such as the one below) indicate a procedure that can harm you if not done correctly.

Electric hazard exists. Verify the power is turned off. Do not work on energized equipment. Working on energized equipment can result in serious electrical shock.

To avoid electric shock, do not connect Safety Extra-Low Voltage (SELV) circuits

(found in LAN ports) to Telephone-Network Voltage (TNV) circuits (found in WAN ports).

This equipment must be installed and maintained by properly trained service personnel. Make sure the proper electrical service is available before plugging the unit and turning it on. Disconnect the telecommunication lines before unplugging the main power connector.

Cover Panels

Do not operate the IPX-S300B with missing blank faceplates and cover panels.

These covers prevent exposure to hazardous voltages and currents inside the chassis.

They are important to maintaining proper air flow through the chassis. They also prevent electromagnetic interference (EMI) that might disrupt other equipment.

Laser radiation and EMI are present when the router cover panel is open.

© SAMSUNG Electronics America page 6 of 161

Electrostatic Discharge (ESD) Warning

Observe the following guidelines to minimize the potential for Electrostatic Discharge

(ESD) damage, which can cause intermittent or complete component failures.

When handling IPX-S300B or its components, wear grounding wrist straps to avoid ESD damage to the equipment. Do not directly touch the backplane with your hand or any metal tool, or you could shock yourself.

Always use an ESD wrist strap or ankle strap, and verify that it is in direct contact with your skin. Avoid contact between the component and your clothing as it causes ESD damage.

When handling any component that is removed from the chassis, verify that the equipment end of your ESD strap is attached to one of the ESD points on the chassis.

Use care when installing or uninstalling modules or interface cards. Tighten the captive installation screws to ensure a proper connection when inserting modules or interface cards.

When removing or installing a component, always place it component-side up on an antistatic surface, in an antistatic card rack. If you are returning a component, place it in an electrostatic bag before packing it.

© SAMSUNG Electronics America page 7 of 161

INTRODUCTION

Purpose

This document describes the basic overview and features of the SCM Compact system.

The product model name of the SCM Compact system is the IPX-S300B.

Document Content and Organization

This manual consists of the following parts.

CHAPTER 1. IPX-S300B System Overview

This part describes the IPX-S300B network interface and the operation environments and capacity of the IPX-S300B.

CHAPTER 2. IPX-S300B Hardware

This part describes the characteristics of the system hardware.

CHAPTER 3. IP Phones

This part describes the characteristics of the IP Telephone served by IPX-S300B.

CHAPTER 4. System Features

This part describes the characteristics of the IPX-S300B features.

CHAPTER 5. User Features

This part describes the characteristics of the User features.

CHAPTER 6. Application Features

This part describes the characteristics of the application features.

CHAPTER 7. Network Features

This part describes the network features of the system.

© SAMSUNG Electronics America page 8 of 161

CHAPTER 8. SBC Function

This part describes the SBC function of the system.

CHAPTER 9. System Operation

This part describes the operation and management features of the system.

ANNEX A. Supported Specifications and RFC

This part describes the supported specifications and RFC used in the IPX-S300B.

ANNEX B. CDR

This part describes the call log format and CDR format used in the IPX-S300B.

ANNEX C. Open Source Announcement

This part describes the open source announcement.

ABBREVIATION

This part describes the acronyms used in this document.

© SAMSUNG Electronics America page 9 of 161

Conventions

The following types of paragraphs contain special information that must be carefully read and thoroughly understood. Such information may or may not be enclosed in a rectangular box, separating it from the main text, but is always preceded by an icon and/or a bold title.

WARNING

Provides information or instructions that the reader should follow in order to avoid personal injury or fatality.

CAUTION

Provides information or instructions that the reader should follow in order to avoid a service failure or damage to the system.

CHECKPOINT

Provides the operator with checkpoints for stable system operation.

NOTE

Indicates additional information as a reference.

© SAMSUNG Electronics America page 10 of 161

Console Screen Output

The lined box with ‘Courier New’ font will be used to distinguish between the main content and console output screen text.

Bold Courier New’ font will indicate the value entered by the operator on the console screen.

Revision History

VERSION

3.1

2.0

1.0

DATE OF ISSUE

05. 2017.

10. 2016.

10. 2015.

REMARKS

SCM Compact V2.1 S/W upgrade features added.

Align manual version numbers in Korean and English

First Version

© SAMSUNG Electronics America page 11 of 161

TABLE OF CONTENTS

Purpose ...................................................................................................................................................... 8

Document Content and Organization ....................................................................................................... 8

Conventions ............................................................................................................................................. 10

Console Screen Output ........................................................................................................................... 11

Revision History ....................................................................................................................................... 11

CHAPTER 1.

IPX-S300B System Overview 16

1.1

General Description ................................................................................................................ 16

1.2

System Architecture ................................................................................................................ 17

1.2.1

IPX-S300B .................................................................................................................................. 17

1.2.2

Voice Gateways .......................................................................................................................... 17

1.2.3

IP Phones .................................................................................................................................... 17

1.2.4

SCM Administrator ...................................................................................................................... 18

1.2.5

Application Server ....................................................................................................................... 18

1.2.6

External Application Servers ...................................................................................................... 20

1.2.7

Interface between the Network Components ............................................................................ 20

1.3

IPX-S300B Specification ......................................................................................................... 21

1.3.1

Hardware and Software Specification ........................................................................................ 21

1.3.2

IPX-S300B Capacity ................................................................................................................... 22

CHAPTER 2.

IPX-S300B Hardware 24

2.1

Features ................................................................................................................................... 24

2.2

IPX-S300B ................................................................................................................................ 26

2.2.1

IPX-S300B .................................................................................................................................. 26

2.3

Hardware Structure ................................................................................................................. 27

2.3.1

IPX-S300B .................................................................................................................................. 27

2.4

External Interface .................................................................................................................... 33

2.4.1

IPX-S300B .................................................................................................................................. 33

© SAMSUNG Electronics America page 12 of 161

CHAPTER 3.

CHAPTER 4.

CHAPTER 5.

IP Phones (SMT-I series)

System Features

User Features

37

43

64

CHAPTER 6.

Application Features 76

6.1

Application Sever Service Group ...........................................................................................76

6.2

Automatic Call Distribution (ACD)..........................................................................................77

6.3

Conference ...............................................................................................................................79

6.3.1

Conference Features .................................................................................................................. 79

6.3.2

Conference Control .................................................................................................................... 80

6.4

VoiceMail/Auto Attendant (VM/AA) .........................................................................................81

6.4.1

Voice Mail .................................................................................................................................... 81

6.4.2

Auto Attendant ............................................................................................................................ 85

6.4.3

Access Manager ......................................................................................................................... 86

6.4.4

E-mail Server Interface ............................................................................................................... 88

6.5

Call Recording .........................................................................................................................89

6.5.1

Recording Specifications ............................................................................................................ 89

6.6

External Applications ..............................................................................................................90

6.6.1

Samsung Communicator ........................................................................................................... 90

6.6.2

ACD Agent .................................................................................................................................. 91

6.6.3

Third Party Applications .............................................................................................................. 92

6.7

Solution Partner Applications .................................................................................................93

CHAPTER 7.

Network Feature 94

7.1

Network Feature .......................................................................................................................94

CHAPTER 8.

SBC Function 95

8.1

SBC Function ...........................................................................................................................95

CHAPTER 9.

System Operation 96

9.1

Access Control Management ..................................................................................................96

9.2

Process Management ..............................................................................................................96

9.3

Operation Management ...........................................................................................................98

9.3.1

System Configuration ................................................................................................................. 98

© SAMSUNG Electronics America page 13 of 161

9.3.2

System Performance Management ........................................................................................... 99

9.3.3

Announcement Management................................................................................................... 100

9.3.4

Call Management ...................................................................................................................... 100

9.3.5

Database Management ............................................................................................................ 101

9.3.6

User Management .................................................................................................................... 101

9.3.7

Maximum Calls Management .................................................................................................. 102

9.4

Call Detail Records (CDR) Management .............................................................................. 103

9.5

Traffic Reports ....................................................................................................................... 104

9.6

Fault Management ................................................................................................................. 106

9.7

License Management ............................................................................................................ 108

9.7.1

Trial Version License Key ......................................................................................................... 108

9.7.2

Activation Key ........................................................................................................................... 108

9.8

Photo File Management ........................................................................................................ 109

9.9

Installation Features .............................................................................................................. 109

9.9.1

Data File Export/Import ............................................................................................................. 109

9.9.2

Phone Settings .......................................................................................................................... 109

9.9.3

Gateway Settings ...................................................................................................................... 111

ANNEX A.

A.1

A.2

Supported Specifications and RFC 112

SIP ............................................................................................................................... 112

SNMP .......................................................................................................................... 114

ANNEX B.

CDR 115

ANNEX C.

Open Source Announcement 120

© SAMSUNG Electronics America page 14 of 161

LIST OF FIGURES

Figure 1. Organization of SCM Compact’s Solution ....................................................................16

Figure 2. IPX-S300B exterior ......................................................................................................26

Figure 3. IPX-S300B interior .......................................................................................................27

Figure 4. CMU Board ..................................................................................................................28

Figure 5. GWU Board .................................................................................................................28

Figure 6. 4FXS optional module..................................................................................................29

Figure 7. 4FXO optional module .................................................................................................29

Figure 8. 2PRI optional module...................................................................................................30

Figure 9. 1PRI optional module...................................................................................................30

Figure 10. 2BRI optional module .................................................................................................31

Figure 11. VPU optional module .................................................................................................31

Figure 12. IPX-S300B Power Input .............................................................................................32

Figure 13. IPX-S300B FAN .........................................................................................................32

Figure 14. IPX-S300B Interface Front/Rear ................................................................................33

Figure 15. IPX-S300B LED .........................................................................................................34

Figure 16. VPU Option Module LED ...........................................................................................35

Figure 17. User Authentication ....................................................................................................56

Figure 18. SCM Administrator .....................................................................................................98

Figure 19. IPX-S300B Performance Monitor ...............................................................................99

Figure 20. System Viewer .........................................................................................................106

LIST OF TABLES

Table 1. IPX-S300B Hardware Specification ...............................................................................21

Table 2. IPX-S300B Software Specification ................................................................................21

Table 3. IPX-S300B Capacity ......................................................................................................22

Table 4. Performance (UDP/TLS signaling) ................................................................................22

Table 5. Table Capacity ...............................................................................................................23

Table 6. IPX-S300B LED Description ..........................................................................................34

Table 7. VPU LED Description ....................................................................................................35

© SAMSUNG Electronics America page 15 of 161

CHAPTER 1. IPX-S300B System

Overview

1.1 General Description

The SCM Compact (model name: IPX-S300B) provides an IP-based service platform for using a wide range of applications for communications within an enterprise. It is aimed at the SMB market in existing small-scale hybrid PBXs.

The IPX-S300B provides VM/AA and conference functionality as well as trunk/extension and general PBX function in a single box. The highly scalable structure allows easy expansion of VM/AA and conference channel cards when necessary. The product also provides built-in NAT and SBC Lite functions.

The call processing software is installed in the main cabinet, and analog extension/trunk,

PRI and BRI circuits can be expanded using optional card slots.

The total SCM solution organizes IPX-S300B, phone, gateway, SCM Administrator and application as shown following diagram.

Hotel PMS

IM/PS ACD/IVR Recording Billing

3 rd

Party Application

Door Phone UC Apps

OpenTSP/CSTA/JTAPI

OpenTSP CSTA JTAPI MS Outlook MS Lync

External Interface/API

Mobile Client Operator Communicator

ACD VM/AA Conference SBC Lite

Embedded Application

SCM Compact

Wired/Wireless

IP Phone

3 rd

Party SIP Phone

IP Terminal

SPnet

Branch Office

Analog Device

Internet PSTN SIP Trunk

Home Office

Figure 1. SCM Compact Architecture

© SAMSUNG Electronics America page 16 of 161

1.2 System Architecture

As shown in Figure 1, the SCM Compact consists of the IPX-S300B, gateway, IP phone,

SCM Administrator, and application server.

Data network systems such as switches and routers are basic requirements of the SCM

Compact and are not included as system components.

1.2.1 IPX-S300B

The IPX-S300B uses the SIP protocol to provide IP-PBX call processing functionality and uses analog extension (FXS), analog trunk (FXO), ISDN-PRI, ISDN-BRI interfaces, etc. to communicate with the existing voice networks. The product also provides built-in NAT,

DHCP and SBC Lite functions.

1.2.2 Voice Gateways

The voice gateway is responsible for connecting the existing telephone and networks.

It communicates with the existing telephone network (PBX or PSTN) through the PRI interfaces as well as analog interface like FXO.

The voice gateway acts as a media gateway, which performs the conversion between PCM data and packet data. It communicates with IPX-S300B over the standard SIP protocol.

The IPX-G5x0 product series can be used as voice gateway.

1.2.3 IP Phones

IP Phone provides general telephone calls on the IP network. For providing basic calling and supplementary services, IP Phone communicates with SCM Compact (IPX-S300B) using the SIP protocol (Samsung SIP Extension) that is partially extended from the standard.

The following types of IP phones are supported by IPX-S300B.

SMT-i6000 Series

SMT-i5343, SMT-i5243, SMT-i5220S, SMT-i5220, SMT-i5210S, SMT-i5210, SMTi5264

SMT-i3105

IP Video Phone

Video Phone allows voice and video calls over an IP network.

For provision of basic call and additional services, IP Video Phones communicate with the

IPX-S300B using an expanded version of the SIP protocol (Samsung SIP Extension).

Soft Phone

Soft Phone runs on a PC (Personal Computer) as a software program. It allows voice-only calls or voice and video calls over an IP network.

© SAMSUNG Electronics America page 17 of 161

Wi-Fi Phone

Wi-Fi Phone connects to an IP network using the Wi-Fi protocol and allows voice calls.

PDA Phone

PDA Phone connects to an IP network over the Wi-Fi protocol. It is provided as a software program that runs on existing PDAs and allows voice-only calls or voice and video calls.

Analog Phone

The system provides analog voice call service using the FXS port which is an optional card.

1.2.4 SCM Administrator

SCM Administrator is web-based service with a graphical user interface for managing IPX-

S300B. You can use a web browser on a normal PC to access IPX-S300B and execute various IPX-S300B services like Fault Management, Performance Management, Security

Management, Accounting Management and Subscriber Management.

1.2.5 Application Server

The IPX-S300B provides the following built-in services. VM/AA and conference channels can be expanded by adding optional cards.

MOH (Music On Hold) Server

MOH provides the music on hold when a call is put on hold and the voice announcement in the case of errors. It also provides an announcement when a call is queued in the embedded

ACD server. In addition, the MOH server collects DTMFs from the caller while executing the user interaction services such as DISA.

SBC Lite

Normally, an SBC server is required for signaling and media (voice and video) connections when establishing calls between phones in the public IP side and those in the private IP side.

IPX-S300B includes the NAT traversal function which is one of the services of SBC.

© SAMSUNG Electronics America page 18 of 161

Conference Server

Responsible for combining all the individual voice data in calls involving three or more users into one data set. In a conference call, each phone is connected for a 1:1 call with the conference server, but the conference server combines the data from all the different phones into one data set so the parties can hear each other.

The conference server included in IPX-S300B not only provides the normal conference feature with which the caller pages all the parties to include in the conference, but also provides an advanced conference feature with which a conference room can be set up and the parties can voluntarily call to enter the conference room and participate in the conference. The product provides a default conference capacity and services add-on conference. By adding VPU card, IPX-S300B can be expanded channels and can be added conference service (For example, Meet-me conference, Paging on Answer). The Meet-me conference service requires a license.

ACD (Automatic Call Distribution) Server

The ACD server distributes the incoming calls to agents according to the status of the agents. It also collects real-time call statistics on groups and agents and aggregates the information.

IVR (Interactive Voice Response) Server

The IVR server provides the interactive voice response service that collects DTMFs from the caller and provides proper responses according the DTMF.

VM/AA (Voicemail/Auto attendant) Server

The voice mail service, in particular, constitutes a key component of the enterprise communication system by allowing the calling party to be connected to the VM/AA server and leave a voice message in the called party’s mailbox. When there is a new voice mail, the user is notified of by an indicator light on the user’s phone or in a notification email sent to the user’s Outlook account.

The user can then call the VM/AA server to listen to, reply to, send, or delete the voice mail. The product provides a default VM/AA service, which can be expanded with more channels by adding VPU cards. The VM/AA function requires a license.

Mobility Server

The product provides in-house extension phone call service using smartphones. When using both the cellular network and Wi-Fi network, the integrated dialer allows switching between the extension network and cellular network. The Mobile Extension function also allows the smartphone to be used in the same way as an extension phone outside the office.

This service requires a separate license.

© SAMSUNG Electronics America page 19 of 161

1.2.6 External Application Servers

The following application servers are separated in the IPX-S3000B system.

Billing Server

The billing server is a device that receives the billing information (CDR: Call Detailed

Record) that are generated from various call handling systems, extracts the billing data needed for actual operation, and performs the tasks such as various billing related statistics and others. IPX-S300B sends CDR that is generated after the call handling to the Billing server by using the protocols such as TCP or FTP.

1.2.7 Interface between the Network Components

The table below describes the interface between each system component.

Physical Connection Area

IPX-S300B

IP Phone

IPX-S300B

Wi-Fi Phone

IPX-S300B

Soft Phone

IPX-S300B

Management

IPX-S300B

Solution Partner

IPX-S300B

Voice Gateway

IPX-S300B

Media Gateway

LAN

LAN

LAN

LAN

LAN

LAN

PRI/BRI/FXO

SIP

SIP

Protocol

SIP

TCP

SIP/CSTA/TAPI/JTAPI

SIP

PRI/BRI/Loop Start

© SAMSUNG Electronics America page 20 of 161

1.3 IPX-S300B Specification

1.3.1 Hardware and Software Specification

The IPX-S300B has the following hardware and software requirements for operation.

Table 1. IPX-S300B Hardware Specification

Item

IPX-G520S/G540S

Specification

Dimension (W × D × H) 441.5 × 352 × 44 mm

Power AC 110/220 V Input, DC +12 V/5.5 A

Output

IPX-S300B Default 4 Universal Slot, Dual power (option)

Gigabit Ethernet 2 port

USB 1 port, Console 1 port

Option card 4 universal slot

FXS 4 port, FXO 4 port, PRI 2 port, PRI

1 port, BRI 2 port, VPU Card

Remark

1

9” Cabinet Type, 1U

-

-

-

-

No limitation in the its position.

(But, Only 1 VPU Card can be equipped)

RJ-45 connector

50P champ connector Connected up to 6

(240 ports)

FXS 20 port, Dual power (option)

FXS 40 port

Table 2. IPX-S300B Software Specification

OS

DBMS

SNMP

Item Specification

Broadcom Linux (Version: 3.6.11)

PostgreSQL (Version: 8.4.14)

NET-SNMP (Version: 5.5)

© SAMSUNG Electronics America page 21 of 161

1.3.2 IPX-S300B Capacity

Table 3. IPX-S300B Capacity

No. of Telephone

Item

IP Telephone

IP AOM

Analog Phone

Specification

512

64

256

512

Remark

UDP/TLS

-

136 ports in case of Dual

Power

-

No. of Trunk Line

Phone Total

Capacity.

SIP channel

PRI channel

VM/AA Channel

Total Conference

Channels.

BRI channel

FXO port

Trunk Total

Capacity.

Embedded

VPU

Embedded

VPU

Meet-Me Conference

Channels

VPU

Paging Channels VPU

Call Recording Channels VPU

6

32

6

32

32

128

120 (E1 PRI)

92 (T1 PRI)

16

16

256

-

4 ports

8 ports (for only Euro market)

-

-

-

-

-

-

-

SBC

No. of MOH Ch.

Max. No. of Gateway

Embedded

Embedded

-

32

20

128

16

32

-

-

-

-

- Samsung IP Phone: Max.

20 calls

- Others: Max. 10 calls

Table 4. Performance (UDP/TLS signaling)

Item

Max. Registered Users

Max. BLF count

BHCA

Max. Concurrent Calls

CPS

Specification

512

5120

18000

150

5

Remark

600 sec register expires

10 BLFs/phone

60 s/call

-

72 hours, 600 sec register expires

© SAMSUNG Electronics America page 22 of 161

Item

Max. User Group

Max. Ring Plan

Max. Service Group

Max. the Location

Max. End Point

Max. DID Routing

Max. CLI Routing

Max. Number-translation table

Max. Call Restriction List

Max. Call Restriction Table

Max. Service Class

Max. Station Groups

Max. Paging Groups

Max. Station Group Members

Max. Multi-ring Members

Max. Group Call Forwards

Max. ACD Agents

Max. ACD Groups

Max. ACD Group Members

Max. System Speed Dials

Max. Pickup Groups

Max. Multi-lines per Phone

Max. Multi-devices per User

Max. Call Buttons per Phone

BHCA (Busy Hour Call Attempt): Maximum number of outgoing/incoming calls per hour.

CPS (Call Per Second): Maximum number of outgoing/incoming calls per second.

Max. Concurrent Calls: Maximum number of concurrent calls.

Table 5. Table Capacity

Specification

50

128

32

512

1000

64

1024

50

100

32

128

10

10

10

8

64

1000

1000

1024

128

1

20

10

64

Remark

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

© SAMSUNG Electronics America page 23 of 161

CHAPTER 2. IPX-S300B Hardware

This chapter describes the IPX-S300B hardware.

2.1 Features

The IPX-S300B hardware has the following features.

Safety

Materials and components used in hardware are mechanically sturdy and satisfy mechanical and electrical requirements for a communications system.

The hardware complies with industrial standards and has a stable and strong metal plate welded assembly structure.

The hardware does not generate toxic gas or corrosive gas which may be harmful to human health or affect system operation.

The hardware is made of materials with considerations for EMI (Electro-Magnetic

Interference) properties.

The hardware features a safety mechanism for protection from over-voltage.

Ease of Maintenance

The hardware is designed for easy and safe maintenance.

The hardware complies with the standard rack specifications for installation of units that are 482.6 mm in width, and the rack is designed to maintain adequate strength.

External ports are provided on the front panel for easy connection of cables.

Status LED lights are provided on the front for the operator to easily identify system failures and status.

The rear panel of the rack features a grounding hole.

The hardware is designed to protect the electronic components from external elements during installation or maintenance.

© SAMSUNG Electronics America page 24 of 161

Fire Resistance and Heat Processing

Fire-resistant materials and components have been used for protection from fire, and the hardware is designed to prevent the heat of the system from affecting performance.

Heat-generating components of the hardware are isolated from temperature-sensitive components.

Three 40-mm cooling fans are installed to expel air from the inside.

Components installed on the module are laid out in consideration of heat dissipation.

Redundancy of Power

The hardware features redundant power supply.

When one power supply module fails, the other power supply module ensures that services are not interrupted.

Power modules cannot be mounted or unmounted by the operator at the site of operation.

© SAMSUNG Electronics America page 25 of 161

2.2 IPX-S300B

2.2.1 IPX-S300B

IPX-S300B can be mounted on 19-inch (482.6 mm) wide rack and its height is 1.75-inch

(1U). The appearance is like the following.

Front

Front (Dual Power Supply)

Figure 2. IPX-S300B exterior

© SAMSUNG Electronics America page 26 of 161

2.3 Hardware Structure

2.3.1 IPX-S300B

IPX-S300B hardware consists of CMU board, GWU board, optional modules, power supply and 3 fans.

Optinal Modules

- 2PRI

- 4FXO

- 4FXS

- VPU

- 2BRI

- 1PRI

Fans GWU Board Power Supplies CMU Board

Figure 3. IPX-S300B interior

© SAMSUNG Electronics America page 27 of 161

2.3.1.1 CMU Board

The CMU board of IPX-S300B is like the following.

CPU

DDR3 Memory

NAND Flash

Figure 4. CMU Board

2.3.1.2 GWU Board

The GWU board of IPX-S300B is like the following.

Module Connector

Ethernet Block

FPGA

NAND

Flash

© SAMSUNG Electronics America

Figure 5. GWU Board

Ethernet

Switch

CPU DDR2

Memory

page 28 of 161

2.3.1.3 Optional Modules

There are the following optional modules for IPX-S300B.

Figure 6. 4FXS optional module

© SAMSUNG Electronics America

Figure 7. 4FXO optional module

page 29 of 161

Figure 8. 2PRI optional module

© SAMSUNG Electronics America

Figure 9. 1PRI optional module

page 30 of 161

Figure 10. 2BRI optional module

© SAMSUNG Electronics America

Figure 11. VPU optional module

page 31 of 161

2.3.1.4 Power Supply

Power Switch

Power Input

Figure 12. IPX-S300B Power Input

Name

Power Input Connector

Power Switch

Description

The connector to insert power cable

The switch to turn on or off power

2.3.1.5 FAN

IPX-S300B provides 3 embedded fans (40 mm size) and it has holes for the fan on the left side of the system.

Figure 13. IPX-S300B FAN

© SAMSUNG Electronics America page 32 of 161

2.4 External Interface

2.4.1 IPX-S300B

IPX-S300B provides external interfaces like the following.

IPX-S300B Front

USB Port

Reset switch

GbE Port

Power Supply Optional module port

LED

IPX-S300B (Dual Power Supply) Front

System LED Console Port

Optional module port

LED USB Port

Reset switch

GbE Port

Power Supply 1

IPX-S300B Rear

Power Supply 2 System LED Console Port

Optional module 1 Optional module 2 Optional module 3 Optional module 4 Ground

Hole

Figure 14. IPX-S300B Interface Front/Rear

© SAMSUNG Electronics America page 33 of 161

System LED

It provides System LED to display various status of the system. Refer to the following for its meaning.

IPX-S300B

IPX-S300B (Dual Power Supply)

Figure 15. IPX-S300B LED

Table 6. IPX-S300B LED Description

LED State Description

Optional module port

System RUN1

RUN2

GbE1/2

Off

On

Blinking

Blink quickly (50 ms on/off)

Module not mounted or ready to Service

Operating (port in use)

Layer2 link status (1PRI, 2PRI, 2BRI)

Ringing state (4FXS, 4FXO)

Booting, Upgrading, DB Initializing

Blink (250 ms on/off) All Processors are in normal operation

Blink slowly (1000 ms on/off) Fault (Upgrading, DB initialization)

On

Blink quickly

Preparing to boot

Booting

Blink slowly

Off

Normal Operation after booting

LAN disconnected

FAN

On

Blinking

Off

On

PWR1/2 Off

On

LAN connected

Transmitting/Receiving Data

FAN out of order

Normal operation

Power Module is off or out of order

Power module is installed and in normal operation

© SAMSUNG Electronics America page 34 of 161

Optional module port LED

If each Layer 2 of the 1PRI, 2PRI, or 2BRI card is judged to be connected, an

LED on the option module port turns on; as many LEDs on the option module port as the number of the connected links turn on. The dislocation of a cable or a card disconnects the corresponding link, which in turn causes an LED to turn off.

Note that resetting a card disconnects the corresponding Layer 2 connection but not an LED. An LED gets turned off afterwards when the card is rebooted and then turns back on again.

VPU LED

The VPU option module provides LEDs which indicate various status. Refer to the following for its meaning

RUN MC MEM

Console port

Figure 16. VPU Option Module LED

Table 7. VPU LED Description

LED State Description

VPU RUN

MC

MEM

Blink (200 ms on/off)

Off

Blink slowly

On

Each processor operating normally

SSD not equipped

Preparing to boot/being booted (SSD is equipped)

Operating normally after a successful boot

(SSD is equipped)

Blink quickly (200 ms on/off) Access SSD after booting

Off 80 % or less of SSD in use (normal)

On More than 80 % of SSD in use

Blink quickly (200 ms on/off) More than 95 % of SSD in use

Console Port (RS232C)

IPX-S300B provides console port to debug the system or to set basic configuration by CLI.

The baud rate is 38,400 bps.

© SAMSUNG Electronics America page 35 of 161

GbE Port (1 GE UTP)

To connect the network, it provides two 1000 BASE-T UTP ports.

USB Port (Host 2.0)

It provides USB port to update the software of IPX-S300B. It supports general USB memory stick.

Reset Switch

It supports to reset the system by reset switch.

Optional Modules

IPX-S300B supports optional cards such as 4 ports FXO card, 4 ports FXS card, 2 ports

BRI card, 1 port PRI card, 2 ports PRI card, a VPU card.

At first, blank dummies are embedded, so remove them when you install optional modules.

The VPU module must not be equipped or uninstalled during in its operation. It must be performed in additional 5 seconds after the module is completely shut down by pressing the reset button for 10 seconds. The VPU module will restart by pressing the Reset button for a few seconds. (less than 5 seconds).

Following is the distance limitation for connecting either BRI or PRI to another system.

BRI module: 20 m

PRI module: 200 m

© SAMSUNG Electronics America page 36 of 161

CHAPTER 3. IP Phones (SMT-I series)

This chapter describes the types and functions of devices that can be connected to the IPX-

S300B system. Types and functions of devices that can be connected to the IPX-S300B system are the same for all systems.

For details on using each of the devices, see the user manual of the phone.

SMT-i6021

3.2” Mono LCD

HD Voice

Smart Phone Interworking

WiFi Backhaul

Bluetooth Headset

USB Interworking

4 soft keys

24 programmable keys

Navigation keys for easy use of Keyset functions

Keyset Status Indicator

Volume Up/Down keys for digital control of speaker, handset and ringer volume

© SAMSUNG Electronics America page 37 of 161

SMT-i6020

3.2” Mono LCD

HD Voice

Smart Phone Interworking

USB Interworking

4 soft keys

24 programmable keys

Navigation keys for easy use of Keyset functions

Keyset Status Indicator

Volume Up/Down keys for digital control of speaker, handset and ringer volume

SMT-i6011

3.2” Mono LCD

Smart Phone Interworking

WiFi Backhaul

Bluetooth Headset

USB Interworking

4 soft keys

12 programmable keys

Navigation keys for easy use of Keyset functions

Keyset Status Indicator

Volume Up/Down keys for digital control of speaker, handset and ringer volume

© SAMSUNG Electronics America page 38 of 161

SMT-i6010

3.2” Mono LCD

Smart Phone Interworking

USB Interworking

4 soft keys

12 programmable keys

Navigation keys for easy use of Keyset functions

Keyset Status Indicator

Volume Up/Down keys for digital control of speaker, handset and ringer volume

SMT-i5343

4.3” Color TFT LCD

HD Voice

Smart Phone Interworking

WiFi Backhaul

NFC

Bluetooth Headset

Dedicated USB Camera Interworking

5 soft keys/10 line keys

Navigation keys for easy use of Keyset functions

Keyset Status Indicator

Volume Up/Down keys for digital control of speaker, handset and ringer volume

© SAMSUNG Electronics America page 39 of 161

SMT-i5243

4.3” Color LCD

USB Camera Interworking

5 soft keys/5 line keys

14 programmable key

Navigation keys for easy use of Keyset functions

Keyset Status Indicator

Volume Up/Down keys for digital control of speaker, handset and ringer volume

SMT-i5230

3.2” Mono LCD

4 soft keys

7 programmable keys

Navigation keys for easy use of Keyset functions

Keyset Status Indicator

Volume Up/Down keys for digital control of speaker, handset and ringer volume

© SAMSUNG Electronics America page 40 of 161

SMT-i5220/5220S/522D

3.2” Mono LCD

4 soft keys

24 programmable keys

Navigation keys for easy use of Keyset functions

Keyset Status Indicator

Volume Up/Down keys for digital control of speaker, handset and ringer volume

SMT-i5210/5210S

3.2” Mono LCD

3 soft keys

14 programmable keys

Navigation keys for easy use of Keyset functions

Keyset Status Indicator

Volume Up/Down keys for digital control of speaker, handset and ringer volume

© SAMSUNG Electronics America page 41 of 161

SMT-i3100/i3105

2.8” Mono LCD

3 soft keys

5 programmable keys (with LED)

Keyset Status Indicator

Volume Up/Down keys for digital control of speaker, handset and ringer volume

SMT-i5264 IP AOM

IP-AOM (IP based Add On Module) is an accessory-type IP terminal with expansion of key buttons and LED on an IP phone. Each of the key buttons on the IP-AOM can be assigned with various custom functions such as DSS (Direct Station Select), BLF (Busy Lamp Field), and one-touch dial button.

64 Buttons Add On Module

© SAMSUNG Electronics America page 42 of 161

CHAPTER 4. System Features

This chapter describes system features provided by IPX-S300B.

System features are performed according to the configuration of the system, not individual user setting.

Anonymous Call Reject

The anonymous call reject service rejects anonymous incoming trunk calls without caller

IDs.

This function can be enabled or disabled by the operator.

Call Admission Control (CAC)

Since system resources are limited, a service is required to set the maximum number of calls at any one time. The Call Admission Control (CAC) service provided by IPX-S300B includes CAC by call counts, CAC by location bandwidth, CAC by system resources, and

CAC by trunk call counts.

All CAC is independently operated by each node.

CAC by Call Counts

This function rejects calls that exceed the maximum call count supported by the IPX-

S300B.

CAC by System Resources

The CAC by system resources service restricts calls made in excess of the maximum usage ratio set for the system CPU and memory.

CAC by Location Bandwidth

The CAC by location bandwidth service restricts the calls made in excess of the bandwidth set for each location.

When calls are made between users or endpoints in different locations, the system calculates the bandwidth based on the codec used for the calls. Any calls exceeding the maximum bandwidth set for each location are restricted.

CAC by Trunk Call Counts

CAC by trunk call counts restricts calls when the maximum trunk call count supported by IPX-S300B is exceeded. If you don’t set the maximum inbound call or maximum outbound call value, CAC for the trunk call (Inbound call or outbound call) does not work.

© SAMSUNG Electronics America page 43 of 161

Emergency CAC

When CAC by system resource, region or trunk call count is exceeded, the system decides whether the incoming call is an emergency call and, if so, disconnects existing calls and processes the emergency call.

Least Cost Route (LCR)

IPX-300B performs the LCR service in various ways.

LCR by Location

The LCR by location feature allows you to assign one of the three LCR methods

(priority-based LCR, time/rate based LCR, and equally distributed LCR) for each location of the calling party.

Priority Routing

The route sequence feature allows automatic selection of alternative routes when the endpoint set as the default LCR is not available for call connections. Routes are assigned with priorities so that the route with the highest priority among those available is selected.

Time-based Routing

The special route sequence feature allows each service group to use its own route sequence features based on its time and rate conditions.

Load-balanced Routing

The route set feature allows the use of the set routes in an equally distributed manner according to the set ratio. Calls are distributed only between the routes identified as available for calls, and therefore there is no need for configuring alternative routes, as in other LCR methods.

Call Restriction

The IPX-S300B allows restriction of outgoing calls or incoming calls for each user. It is also possible to restrict all outgoing calls and incoming calls. Also, when an external call is placed through a trunk route, usage of the trunk route can be allowed or disallowed.

IPX-S300B supports the following three types of call restriction policies.

Extension Lock

You can restrict outgoing calls or incoming calls for users. You can also restrict both outgoing and incoming calls. This setting is applied to all calls, whether internal or external.

Route Lock

You can specify whether to use a route for external calls coming through the endpoint connected to the route.

Call Restriction Policy

Call restriction policies can be applied by analyzing the calling number or called number when external calls are made to the users or external calls are made by the users through the trunk.

© SAMSUNG Electronics America page 44 of 161

The call restriction tables created and configured in the menu described below can be applied to specific users, service groups, or user groups for call restriction.

If multiple call restriction policies are applied to a user, the policies are applied in the priority of user, service group, and user group.

In Tandem call case, Trunk is restricted by incoming trunk’s restriction policy.

Call Transfer Restriction Policy

If call restriction numbers are set, call restriction policy can be applied by analyzing the caller's number when the user switches to trunk line. Call restriction tables can be assigned to service levels so that call restriction policy is applied when switching to trunk line.

Number Translation

IPX-S300B can translate numbers for inbound and outbound calls.

Number translation by multiple MCN allows to replace particular digits in a first position of the called number for outbound calls. Additionally, deleting digits or adding digits are possible for Inbound and outbound calling/called number.

Call Button

The call button feature allows directing multiple calls to the one phone number when the user’s number is a single device and the call waiting service is in use.

If you are using a phone with programmable buttons, such as a Samsung phone, you can assign up to eight call buttons. If there are ten call buttons, the phone can control up to ten calls simultaneously. If there is no call button on the phone, it is treated as having two call buttons.

Internal CLI Number

Default Internal CLI Number is extension number.

Extension number is unique number within user group, not allow duplicate.

It is used for call for calling/called number.

IPX-S300B also provide another Internal CLI Number for specific use.

Outbound Calling Line Identification (CLI)

The Outbound CLI service provides several ways to express outbound CLI such as phone

CLI, user CLI, service group CLI, user group CLI, and virtual trunk CLI.

Outbound CLI Number

IPX-S300B provides several ways to present user CLI. Multi-Extension Phone can have Virtual Phone CLI to express same CLI for several users of the phone. Each user can have Send CLI Number for outbound calls. Additionally, the members in a group such as Service Group or User Group can use the CLI Number for the group if the users don’t have Send CLI Number in User Configuration. CLI Prefix in Route

Configuration provides CLI prefix for the users who aren’t assigned any CLI Numbers.

© SAMSUNG Electronics America page 45 of 161

Outbound CLI Name

If a SIP ISP requires some specific number for the trunk, Virtual Trunk CLI can be used.

If this option is enabled for outbound call, an original ‘display name’ in From header of INVITE message is replaced with the Virtual Trunk CLI for the Route.

Internal CLI Name

IPX-S300B provides Internal CLI Name, used for inbound trunk call.

It is used for subscriber or service group.

Premium CID

IPX-S300B provides supplementary information of opposite user to a FMC user.

Basically photo is delivered and additional information are possible up to 6 according to a configuration.

Calling Line Identification (CLI)

The Calling Line Identification (CLI) service notifies the user of the caller’s phone number and name for incoming calls.

Calling Line Identification Presentation (CLIP)

The Calling Line Identification Presentation (CLIP) service displays the caller’s phone number and name on the called user’s phone for incoming calls.

Calling Line Identification Restriction (CLIR)

The Calling Line Identification Restriction (CLIR) service restricts display of the caller information for the calls made by the user.

If a user set with CLIR calls another user set with CLIP, the calling user’s information is restricted to the called user, as CLIR has precedence over CLIP.

CLI Routing

The CLI routing feature allows special processing of incoming trunk calls according to the caller number.

When entering a calling number, you can use wild cards (entered by *) to enter multiple numbers at a time.

Incoming trunk calls with caller numbers only and without caller names can be supported by caller name.

Incoming calls from specified callers can be rejected.

Incoming calls from specified callers can be assigned called numbers, regardless of the called DID numbers. Called numbers can also be assigned by time period.

Time periods are defined by ring plans. For more information, see the section on ‘Ring

Plans.’

© SAMSUNG Electronics America page 46 of 161

Direct Inward Dialing (DID)

The Direct Inward Dialing (DID) feature allows incoming trunk calls to be directed to different called numbers according to the DID number.

When entering a DID number, you can use wild cards (entered by X) to enter multiple numbers at a time. The system also performs translation of the DID number so that the DID number can be used as the called number.

The called number according to the DID number can be assigned with the user number, the hunt group number, the ACD group number, and various feature codes, including the VMS access code and access code + external number. They can also be assigned by time period.

Time periods are defined by ring plans. For more information, see the section on ‘Ring

Plans.’

Directory Service

IPX-S300B provides Directory Service that user can search subscriber’s name or number.

If User wants save result in phone-book, IPX-S300B provides that service.

If using name, at least 2 letter input must be required.

If using number, at least 3 letter input must be required.

Directory Service provides Single Phone User, Hunt Group Number, System Speed Dial

Index.

Direct Trunk Selection

IPX-S300B supports Direct Trunk Selection to use a specific trunk, which provides services according to a status of the designated trunk. This is a service only for the FXO of a Gateway.

Emergency Group

If user dials predefined emergency group number in an emergency situation then it is dialed to access code of emergency type automatically. After connecting with the opponent, it is connected to configured managers of emergency group at the same time.

History Log

IPX-S300B provides history logging capability for the events like a SPAM call, call logging, paging on answer call, wakeup call, feature set, registration fail, dispatch call, notice board etc.

Some Logging Services are provided for specific user.

Home Worker Support

IPX-S300B provides the same user services to home workers. The services are provided whether the home worker’s phone is connected to the public IP network or to a private IP network within NAT (an IP router).

For a phone connected to a private IP network on NAT, the source port number used for transmitting SIP messages must be symmetric or can be set as symmetric.

The IPX-S300B provides a built-in SBC function.

© SAMSUNG Electronics America page 47 of 161

Hotel Service

This is the hotel service function.

Please refer to the ‘SCM Express PMS Interoperability Guide’

PMS Interface

This is the PMS interface function.

Please refer to the ‘SCM Express PMS Interoperability Guide’

Hot Desking

The hot desking feature allows a user to log in from a phone shared by multiple users.

The user can use a phone in the logged out status to enter his/her ID and password to log in and use the phone as his/her own phone until logged out. A logout button is included in

Samsung phones’ soft buttons. Pressing this logs the phone out.

If the user leaves the phone without logging it out, it is automatically logged out after a set period of time, preventing unauthorized users from using the phone. The default login expiration time is 8 hours.

If the user is already logged in through a phone but requests for login again through another phone using the same user ID, the new login request is processed by logging the previous phone out.

Hot Line and Warm Line

The hot line feature allows automatic connection to a specified number when the handset of the selected phone is lifted.

If the call is connected without delay when the handset is lifted, it is called a hot line.

If the call is automatically connected when the handset is lifted but no number is dialed for a set period of time, it is called a warm line.

Hunt Group

The hunt group service directs calls received by the pilot number of a hunt group appropriately within the hunt group using various routing methods.

When calls are received for a hunt group, the available member list excludes members unable to receive calls because they are unavailable, are subject to incoming call restriction policies, have logged out of the system, have user information that is locked out, or do not have their phones connected.

Called parties for calls received for a hunt group are determined in the following four ways.

Sequential

The call is always directed to the first member in the hunt group. The call is directed to the next member only if the previous member is on the line or unavailable.

Circular

When a call is received for the hunt group, the call is directed to the person on the hunt group member list after the one who answered the previous call. If the member to whom the call is directed is on the line or unavailable, the call is directed to the next member.

© SAMSUNG Electronics America page 48 of 161

Parallel or Broadcast

The call is directed to all the members in the hunt group. When one of the members answers the call, the call is canceled for all other members.

Random

The call is randomly directed to one member in the hunt group at random.

Hunt Group Login/Logout

You can temporarily prevent a hunt group member from receiving incoming calls for the hunt group. If a member logs out of his or her hunt group, the member is excluded from the available member list, and incoming hunt group calls are not directed to the member.

If the member logs in again, he or she can receive incoming hunt group calls normally.

Location-based Codec Negotiation

Location

Codec negotiation takes place between two Internet phones when a call is made between them using the SIP protocol. IPX-S300B can change codec priority by intervening in the codec negotiation process.

You can specify the default audio codec, the default video codec, and the announcement codec for each location in order to change the priority of the codec list between the calling phone and the called phone.

As you set Forced Audio Codec, the codec negotiation can be forced with the codec you want within or between locations.

Default Audio Codec

When IPX-S300B receives a sent message, IPX-S300B finds the default audio codec set for the calling phone’s location in the audio codec list of the sent message and moves it to the top-priority position of the list before resending the message.

Codec negotiation is performed as the specified audio codec is selected by the called phone if it can service the codec.

This process is skipped if the default audio codec set for the location is not found in the codec list of the sent message.

Forced Audio Codec

When IPX-S300B receives a sent message, IPX-S300B checks whether the calling phone supports the codec which set as Forced Audio Codec. IPX-S300B send the message to a called phone with only the codec if the calling phone supports that, or rejects the call.

Default Video Codec

When IPX-S300B receives a sent message, IPX-S300B finds the default video codec set for the calling phone’s location in the video codec list of the sent message and moves it to the top-priority position of the list before resending the message.

Codec negotiation is performed as the specified video codec is selected by the called phone if it can service the codec.

This process is skipped if the default video codec set for the location is not found in the codec list of the sent message.

© SAMSUNG Electronics America page 49 of 161

Announcement Codec

IPX-S300B can connect its sound source to the phone put on hold during a call and play an on-hold tone. It can also play an announcement for the phone of the calling party in case of call failure or any other errors.

When IPX-S300B sends a sent message for connecting the sound source to the phone for which an on-hold tone is played while the call is put on hold or an announcement is played for an error, IPX-S300B moves the announcement codec set for the phone’s location to the top-priority position of the audio codec list in the sent message before resending the message.

Codec negotiation is performed as the specified audio codec is selected by the called phone if it can service the codec.

Multiple Appearance

There are the following two multiple appearance services: assigning one phone number to multiple phones, or assigning multiple phone numbers to one phone.

These two services can be set independently or collectively.

Multi-Device

The multi-device service assigns one user (phone number) to multiple devices

(phones).

IPX-S300B performs the service regardless of the phone being used. One phone number can be assigned to maximum of 32 phones regardless of the phone type.

Multi-Number

The multi-number service assigns multiple users (phone numbers) to one device

(phone).

The service is performed collectively by IPX-S300B and by the phone. Since the phone must be able to differentiate the lines and select them, the maximum number of phone numbers allowed varies by the phone type. In case of SMT-i5243, the phone with the most service capacity, up to 10 phone numbers can be assigned per phone.

Music On Hold

When a call is put on hold, IPX-S300B can connect its built-in sound source and play a tone or music for the phone or the trunk.

It is necessary to enable or disable MOH for each user group because there are limited number of channels for IPX-S300B’s built-in sound source device. When there are too many calls put on hold, the MOH may not be played for some of the calls. In this case, it might be better not to play the MOH at all than to have the MOH played for some calls while the MOH is not played for other calls.

Missed Call Display

Missed Call Display is a notice service to the phone to inform the call is answered by other user. IPX-S300B can activate or de-activate the function for the Multi-Device Calls, Hunt

Group, Multi-ring calls and Pickup.

© SAMSUNG Electronics America page 50 of 161

Operator Group

An operator group is a special hunt group made up of members who act as operators.

Different hunt groups can be specified as operator groups by time periods. In general, a user selected as a member of an operator group uses the phone in parallel to a PC application or uses a PC-based soft phone.

Operator Recall

When a call is transferred or parked and then directed back to the original called party but the connection was not established, the operator recall service directs the call back to the operator group.

Calls are redirected to the operator group in the following cases:

Reconnection failure after call transfer failure: When call transfer fails for an incoming call for an extension number, the call is redirected to the extension number. Here, if the call is not answered by the extension number, it is redirected to the operator group.

Reconnection failure after call park: When an incoming call for an extension number is put on hold (call park) and the call is not answered for a set period of time, the call is redirected to the extension number. Here, if the call is not answered by the extension number, it is redirected to the operator group.

Registration management

On the IPX-S300B, you can check the current registration status of phones, trunk routes and applications.

Ring Plans

When processing calls on a PBX, it is often necessary to provide different services for different days of the week or time of the day. Different services also may be required for public holidays. To accommodate such needs, the services are configured for different days of the week, different time of the day, and different dates. But the problem is that the settings become too complicated.

IPX-S300B provides different services for different days of the week, different time of the day, and different dates by utilizing a feature known as ring plans. IPX-S300B supports a total of 11 ring plans, including the 10 ring plans (ring plans 1 through 10) which can be assigned their own dates, days of the week and time of the day, and the default ring plan which is used when none of the former 10 ring plans is applied.

Calendar Exceptions

To use ring plans, IPX-S300B refers the calendar which is made when a user group is created for maximum of 20 years.

Each day assigns to a day type from Monday to Sunday, Weekday and Weekend as a default. For a site, the special day types can be assigned to some days to provide different services according to the day type. IPX-S300B provides four day type,

Holiday1, Holiday2, User1 and User2.

Ring Plan Schedule

A ring plan schedule is a table containing data which specifies ring plans by days of the week, dates, and time of the day.

© SAMSUNG Electronics America page 51 of 161

Holiday Ring Plan Schedule

A holiday ring plan schedule is a table containing data which specifies ring plans by a designated day type for the site.

Ring Plan Override

IPX-S300B provides a manual override service which allows temporary use of a particular ring plan regardless of the current time. When using ring plan override, you can use the override temporarily by specifying an expiration time or use it permanently by not specifying an expiration time.

Group Call Forward

This service is used for forwarding all incoming calls for all the phones in a group to another number according to the ring plan. If Group Call Forward is activated by Feature

Code, it overrides the forward number by ring plan. Group Call Forward can follow the ring plan only when Forced Group Call Forward by Feature Code is deactivated.

Service Group Local Number

Extension Number is a base number to make a call. Service Group Local Number is a kind of shortcut number of the extension number in a specific Service Group. If the extension numbers in a service group starts with a same prefix, the number except the prefix can be used for shortcut number to dial.

System Call Forward

This service performs call forwarding based on the system settings. In case that user sets his Call Forward All and Preset Call Forward All service is set, Call Forward All based on the settings made by User is performed.

Preset Call Forward All

This service performs preset call forward all based on the settings made by the system administrator even if preset call forward busy is not set by users.

When any call is placed on called user, this feature can be used to forward the call to the voice mail system for voice announcement, etc.

If the user has set call forwarding, the user settings have precedence over the system call forward settings. In other words, if the user has set call forward all, the preset call forward all setting is ignored.

Preset Call Forward Busy

This service performs preset call forward busy based on the settings made by the system administrator even if preset call forward busy is not set by users.

When the called user is busy, this feature can be used to forward the call to the voice mail system for voice announcement, etc.

If the user has set call forwarding, the user settings have precedence over the system call forward settings. In other words, if the user has set call forward all or preset call forward busy, the preset call forward busy setting is ignored.

© SAMSUNG Electronics America page 52 of 161

Preset Call Forward No Answer

This service performs preset call forward no answer based on the settings made by the system administrator.

When the called user does not answer a call, this feature can be used to forward the call to the voice mail system for voice announcement, etc.

If the user has set call forwarding, the user settings have precedence over the system call forward settings. In other words, if the user has set preset call forward no answer, the preset call forward no answer setting is ignored.

Preset call forward Unreachable

This service performs preset call forward unreachable based on the settings made by the system administrator.

If the call forward Unreachable service is enabled for a user, all incoming calls for the user are automatically forwarded to a specified number when the user’s phone is not registered, does not respond to signaling, or otherwise unavailable.

If the user has set call forwarding, the user settings have precedence over the system call forward settings. In other words, if the user has set call forward unreachable, the system preset call forward unreachable setting is ignored.

Preset call forward DND

This service performs preset call forward DND based on the settings made by the system administrator even if preset call forward DND is not set by users.

When the called user set up DND service, this feature can be used to forward the call to designated Number by system administrator.

Announcement for Call Forward

When a call set up because of Call Forward, IPX-S300B sends announcement before the real ring back. This service makes the caller knows the call is forwarded.

Default announcement is Announcement ID 1203.

Group Call Forward

IPX-S300B can forward calls for multiple users to one common number by date, day of the week or time of the day according to the system administrator settings.

This is call group call forwarding.

Applying the dates, days of the week, time of the day for group call forwarding is done by ring plans. For more information on ring plans, see the [Ring Plans] section.

System SPAM Call Block Service

The IPX-S300B provides a function to reject incoming trunk calls from the same caller number during a specified period of time.

© SAMSUNG Electronics America page 53 of 161

VoIP Security

Signaling Encryption

The signaling encryption feature encrypts signaling information required for calls such as the SIP protocol. TLS is used in signaling encryption for VoIP connections between

IPX-S300B and SIP phones and between IPX-S300B and endpoints.

Specifications of TLS serviced by IPX-S300B are as follows:

Uses OpenSSL library and supports TLS v1.2.

AES and ARIA are supported as media encryption algorithms.

Key management method is RSA and key length is 1024 bits.

Signaling encryption is not used for calls between phones or endpoints enabled with encryption and phones or endpoints not enabled with encryption.

Media Encryption

The media encryption feature provides encryption for the voice data exchanged between the caller and the callee for calls established with signaling encryption. Media encryption can be enabled to calls between SIP phones or between a phone and an endpoint by applying secure RTP (sRTP), in which case, IPX-S300B performs signaling for sRTP.

IPX-S300B supports media encryption for calls with phones, IPX-S300B’s built-in conference system, IPX-S300B’s built-in voice mail system, and endpoints, but not with IPX-S300B’s built-in MOH system.

IPX-S300B supports AES and ARIA as media encryption algorithms.

ARIA is a block encryption algorithm developed in Korea in 2003 for protection of information for public administration services. This is used as the TLS and sRTP encryption algorithm.

Media encryption is not used for calls between phones or endpoints enabled with encryption and phones or endpoints not enabled with encryption.

Feature Services

Class Of Service (COS)

IPX-S300B allows the administrator to set privileges for each user. Since setting service privileges for all the users individually could be very complicated, Class of

Service can be created with their own set of service privileges and users can be assigned to their appropriate Class of Service.

When a user group is created, a default service group is automatically created for the user group. If you wish to apply a different Class of Service than the default Class of

Service, you can create a new Class of Service and use it.

Each Class of Service can be set with different service privileges. It also supports override levels and privacy levels, whereby a particular service is provided only if the overriding user’s override level is higher than the privacy level of the user being serviced.

© SAMSUNG Electronics America page 54 of 161

The services involving override and privacy levels include the DND override feature and the barge-in with/without tone feature.

Service List

The administrator can assign privileges for Class of Service or individual users for use of the services.

Feature Codes

A user can use features in one of the following four ways:

The administrator enables a feature for the individual user.

The user enables a feature on IPX-S300B Personal Assistant.

The user presses a feature button on the phone.

The user dials a feature code from the phone.

If the user wishes to use a feature temporarily without having it configured in advance, the user must use a feature button or a feature code.

Since IPX-S300B uses a standard protocol between phones and IPX-S300B, arbitrary feature buttons cannot be created. Therefore IPX-S300B uses feature codes when configuring features or when using features temporarily. If you press a feature button on a Samsung phone, IPX-S300B is also designed to process the feature code assigned to the feature button.

Feature codes can be configured for the following service types. When used in pairssuch as for enable and disable, request and cancel, and login and logout-two feature codes are registered.

Feature Code + 1: Feature codes for enable, request, login, etc.

Feature Code + 0: Feature codes for disable, cancel, logout, etc.

© SAMSUNG Electronics America page 55 of 161

User Authentication

IPX-S300B can limit its service to allow only those users who passed a series of authentication process to receive the service. For user authentication, IPX-S300B provides the HTTP Digest Authentication described in RFC3261 and RFC 2617, and Local

Authentication and Remote Authentication methods are provided for the User

Authentication function.

Figure 17. User Authentication

Local Authentication

IPX-S300B performs internal authentication in the following order:

The SIP phone transmits REGISTER without authentication header to IPX-S300B.

IPX-S300B transmits 401 Unauthorized with challenge information to the SIP phone.

SIP phone transmits REGISTER without authentication header to IPX-S300B.

After IPX-S300B executes Digest Authentication, it transmits 200 OK to the SIP phone.

Boss/Secretary

The boss/secretary feature allows a boss and a secretary to share one user number while using their own individual numbers and the intercom feature. Bosses and secretaries can be connected 1:1 or M:N using multi-device and multi-line feature.

Busy Lamp Field (BLF)

IPX-S300B provides the Busy Lamp Field (BLF) service which indicates the status of a particular service or the status of the user number using the LED on the buttons of the phone.

Line Monitoring

This can monitor other parties’ status by mapping the extension of the person to monitor to the button.

© SAMSUNG Electronics America page 56 of 161

When the status is Idle, the call is made to the person by pressing the button.

When the other party’s call is ringing, Direct Pick can be performed by pressing the button.

When the other party is on the phone, can Barge In by pressing the button.

(when having the Barge In authority)

Speed Dial

When pressing the button, a call is made to the registered dial number.

Line

Same to the right line button of a phone. When the button is pressed, the line that is pre-assigned is seized then waits for the user’s dial input.

DTMF Detection Services

During a call between SIP phones on an IP PBX, all data except SIP signaling for call connection is exchanged by the phones. Therefore, the numbers dialed for services-except the phone number included in the INVITE message for call connection-cannot be sent to the system using the standard protocol.

In order to receive the numbers dialed on the phone-except the INVITE message-IPX-

S300B connects the call to its built-in voice announcement system and collects the numbers dialed on the phone according to the voice announcement.

User interaction services provided in this way include account code, call authentication code, and DISA user authentication.

Account Code

This feature allows the user to enter his/her account code in the account information when making an external call through the trunk. Account codes can be entered in the following two ways.

Forced Account Code

When a trunk call is made from a phone set with forced account code input, a registered account code must be entered. The account code entered will be saved in the charging data record (CDR), which can be used for calculating call charges for the user.

Voluntary Account Code

When a trunk call is made from a phone set with voluntary account code input, you can press the account code button and enter an account code in advance before making the call, or you can put your current call on hold, press the account code button, enter an account code, and then reconnect the call on hold. The account code entered will be saved in the charging data record (CDR), which can be used for calculating call charges for the user.

When a trunk call is made on a phone set with forced account code input, actions are performed in the following order:

The user dials an access code and an external number.

If the user’s phone is set with forced account code input, SCM connected the call to its built-in voice announcement system.

The voice announcement system plays an announcement for the user to enter a registered account code.

© SAMSUNG Electronics America page 57 of 161

The user enters an account code as instructed. The voice announcement system verifies that a valid account code has been entered.

If the account code entered is valid, IPX-S300B uses the access code received in step

(1) to select a route and makes a call for the external number specified.

If the account code is invalid, IPX-S300B plays an error announcement and terminates the call.

Authorization Code

Those users restricted from making external calls can make external calls by dialing the number for the built-in voice announcement system which authenticates external calls.

When a user restricted from making external calls attempts to make a trunk call by using a call authentication code, actions are performed in the following order:

The user dials the number for the call authentication system.

IPX-S300B connects the call to the call authentication system.

The voice announcement system plays an announcement for the user to enter a registered call authentication code.

The user enters a call authentication code as instructed. The voice announcement system verifies that a valid call authentication code has been entered.

If the call authentication code entered is valid, IPX-S300B temporarily suspends the external call restriction set for the user.

The user can now dial an access code and an external number and the trunk call will be made.

The authentication code entered will be saved in the charging data record (CDR), which can be used for calculating call charges for the user.

DISA User Authentication

When using the Direct Inward System Access (DISA) feature, the user can call IPX-

S300B from outside to get authenticated as instructed by the voice announcement so that he/she can make a trunk call through the system.

When there is an incoming DISA call, IPX-S300B connects the call to its built-in

DISA user authentication announcement system and plays a voice announcement for the external caller.

System Speed Dial

This feature allows you to assign a two-digit or longer shortcut number to a phone number frequently dialed not by individual users but by all users of the system. If a lengthy phone number is mapped to a System Speed Dial number, users can access the destination just by dialing the shortcut number.

Local Based Number Translation

IPX-S300B provides Local Based Number Translation, between users’ call belonging same location.

In same location, user can uses virtual extension number.

© SAMSUNG Electronics America page 58 of 161

Basic Announcement

IPX-S300B provides basic announcement messages on users such as ‘The dialed number you have dialed is not in service’, and additional services such as notification for the user being unavailable to answer the call, Music On Hold, etc. by using the Built-In MOH function.

Computer Telephony Interface (CTI)

CTI provides call control and event reporting functions through IPX-S300B CSTA

(Computer Supported Telephony Application) interface.

Digit Analysis and Numbering Plan

The digit analysis function is a process of deciding how to handle the incoming call by analyzing the digits dialed. When a call is generated, it first compares the digits dialed with

DN (Directory Number) list of the user. If two numbers match, then the system recognizes the call as an internal call. And if not, the system compares again the dialed number with access code for call routing. If the two numbers match, the system considers it as a service call. And if not, the system compares again the dialed number with access code for call routing. If the dialed digits correspond to the call routing access code, then the call is handled according to the call routing procedures. If the dialed digits don’t match any of mentioned numbers, then the system considers it as an incorrectly made call and rejects the call.

Fax over IP

IPX-S300B supports SIP signaling regarding T.38 Fax.

DTMF

IPX-S300B supports INFO method, NOTIFY method, and RFC2833 to either send or receive DTMF event to/from a user terminal or Voice Gateway system.

Privacy

Privacy operates as a defensive function against DND Override and Barge In services.

When the user’s Privacy level is higher than the Override level of the other users who attempt DND Override or Barge In, both DND Override and Barge In do not occur.

Survivable Telephony Support

IPX-S300B supports the Survivable Telephony function provided in Voice Gateway.

© SAMSUNG Electronics America page 59 of 161

User Group

The User Group Function allows a separate grouping of the system users thus enabling various added services to be used independently among groups. Each User Group has a separate dial plan, and the User numbers allocated for User Groups can be overlapped.

Service Group

In concept, this is a Sub-Group of the User Group, and there are several Sub-Groups within one User Group to use for various added services. The functions using service group include Call Limiting between service groups, Route Occupation Limiting per service group, call statistics per service group, etc.

Inter Service Group Restriction

The operator may limit the calls between service groups by using this function.

If a restriction has been set between service group A and B, a guidance message notifying that the call is restricted is played to a user of group A when he/she is calling a person in group B.

Wireless Enterprise Service

Wireless Enterprise Service is VoIP (Voice over IP) Service in FMC (Fixed Mobile

Convergence) using WiFi of the smartphone user.

Remote Dial

When a WE VoIP subscriber attempts to use the office phone while outside the Wi-Fi network, the WE VoIP subscriber can request the IPX-S300B for remote dialing service over the data channel.

When a remote dialing service request is received, the IPX-S300B calls the WE VoIP subscriber over the 3G network. When the subscriber answers the call, the system places an outgoing call to the number originally entered by the WE VoIP subscriber and connects the call.

Mobile DISA

When the WE VoIP subscriber attempts and fails a mobile remote dialing service, the WE

VoIP subscriber can place the outgoing mobile DISA call over the 3G network to enable the

DISA function.

After ending the outgoing mobile DISA call placed by the WE VoIP subscriber, the IPX-

S300B places an outgoing 3G call to the WE VoIP subscriber's mobile number. When the subscriber answers, the system collects the number and connects the outgoing call.

Call receiving in mVoIP Zone

This function determines whether to allow extension call receiving for WE VoIP subscribers located in mVoIP zones.

© SAMSUNG Electronics America page 60 of 161

Mobile Number Automatic Update

This function determines whether to automatically update the mobile number of the FMC terminal with the mobile number included in the registration message used during terminal registration.

Internal Proxy Function

This function is used for TLS connection management distribution of extension phones using the TLS protocol.

LDAP Server

The LDAP server uses the internal database of the IPX-S300B to provide information to the LDAP client.

LDAP Client

For system load and network management, the IPX-S300B assigns different access privileges to users accessing the LDAP server according to their levels.

System SPAM Call Block Service

The IPX-S300B provides a function to reject incoming trunk calls from the same caller number during a specified period of time.

Changing Distinctive Ringtone

Caller-specific ringtones can be selected from a range of ringtones available for the terminal using Admin.

Unencrypted Communication Restriction

Non-sRTP calls which are not encrypted can be restricted.

Simultaneous Ring Delay for Desktop Phone

When WE VoIP, 3G mobile phone, and desktop phone are set to ring simultaneously, it is possible that the call is answered in proxy even before the WE VoIP or 3G mobile phone starts ringing because the desktop phone starts ringing earlier.

This function makes the desktop phone start ringing later.

Speed Dial ID Display

This function displays the personal speed dial name on the caller's phone when placing an outgoing trunk call.

© SAMSUNG Electronics America page 61 of 161

Extension Group Member Service

When there is an incoming call for users in an extension group through the representative number, all call forwarding, multi-ring and group call forwarding settings are ignored and the call is put through.

Ring Plan

The IPX-S300B supports creation of up to 20 ring plan schedules, each of which can have up to 16 ring plans in total including 15 ring plans that are assigned by date, day of week, or hour (ring plans 1-15) and a default ring plan that is used in hours not covered by any other ring plan.

Other User MWI

This function allows the user to check for new voice mails in the inbox of another extension number and even connect to the inbox and listen to the voice mails by pressing the button.

User Timer Option

This function allows the operator to change the current configuration status of each individual user's service timer.

Call Restriction by IP Range

This function allows call restriction of subscriber calls originating from a specified IP range through the SBC interface.

Changing Distinctive Ringtone

This function allows caller-specific ringtones to be selected from a range of built-in ringtones supported by the terminal.

GW Channel Display

The gateway channel information display function displays gateway channel information of the current user.

Move to Mobile

The current call can be transferred to another phone without putting it on hold for continuous call conversation.

Call move using soft menu

Call move using phone button

Call move using call move button

Fetching moved call

© SAMSUNG Electronics America page 62 of 161

No Ring

The no ring function prevents the phone from ringing when there is an incoming call.

This service is useful for keeping some of the phones silent when multiple phones are ringing simultaneously due to multi-ring or multi-device functions.

Multicast Paging

It provides a paging feature using multicast. In the case of internal paging through a previously existing conference server, a maximum of 128 people per group is supported.

Now, it supports a maximum of 512 people.

The multicast paging host can be broadcasted by pressing the multicast code and the group number. The service by pressing only the group number is also supported.

In IPX-S300B, if a member is taking a call and could not receive the multicast paging request, the member can receive the multicast paging after the call is ended. Also, when more than one multicast paging is on hold, the multicast paging requested first will be received. The telephone version must be checked for this.

System Information Display on Device

It offers a feature to check the system information on an IP phone.

Supporting device model: SMT-i6000 Series

The system Information that can be checked on an IP phone is as follows.

The version of the system by each module is displayed.

The network setting information of the system is displayed.

The setting type and the card status of the system by each slot are displayed.

The registration status of telephones and gateways, which are interworking with the system, are displayed.

Additional information of the system is displayed.

E911 Service

It provides the PSAP (Public Safety Answering Point) with the caller ID in an emergency call so that they can identify the location of the emergency caller.

© SAMSUNG Electronics America page 63 of 161

CHAPTER 5. User Features

A user service is only available to the users authorized to that service. The authorization to a service is described in the format of Class of Service. The Class of Service can be assigned to a user and the user can use the services defined in it.

A user can set his or her services using SCM Personal Assistant.

Absence

The absence feature is used for notifying that the user is absent. If the absence feature is enabled, when there is an incoming call, an announcement is played to notify the caller of the absence status and the call is terminated.

Auto Answer

The auto answer feature is used when the user wishes to have his/her incoming calls answered automatically. If the auto answer feature is enabled, when there is an incoming call, the speaker will be turned on and the call will be answered automatically.

Automatic Retry

When the user makes an outgoing trunk call but the called party is busy or does not answer the call, the automatic retry service can be used to automatically redial the number after a set period of time. If the automatic retry is enabled, the phone’s speaker is automatically turned on at a set interval and the last dialed number is dialed again.

Barge-In

This feature allows you to intrude into a user’s current call for a three-way conference call.

The Barge In feature is also known as Call Intrusion or Call Override.

The Barge In feature is provided with warning or without warning depending on whether the user is notified that the call has been intruded into. IPX-S300B services both types of the feature.

IPX-S300B uses its VPU option card for three way conference calls. IPX-S300B does not support the barge in feature though its built-in conference system.

© SAMSUNG Electronics America page 64 of 161

Therefore, the basic settings for using the VPU conference must be configured.

Barge-In with Tone

When you intrude into a call and establish a three-way conference, this service periodically plays a tone to notify the user being intruded into that the call has been intruded into.

Barge-In without Tone

When a three-way conference call is established by intruding into a call, the user being intruded into is not given any notification and the intruding user’s voice is muted so that the call can be monitored in secret.

Change Password

The change password feature is used when the user wishes to change his/her password for using function.

Call Forward

When there is an incoming call, this feature is used for forwarding the call to another number specified by the user.

Call Forward All

If the call forward all feature is enabled for a user, all incoming calls for the user are automatically forwarded to a specified number.

Even if the user has not enabled call forward all, the administrator can configure all incoming calls for the user in specific time periods to be forwarded to another number.

For more information, see the ‘System Call Forward-Group Call Forward’ section of

‘4. System Features.’

Call Forward Busy

If the call forward busy feature is enabled for a user, incoming calls for the user while the user is busy are automatically forwarded to a specified number.

Even if the user has not enabled call forward busy, the administrator can configure the incoming calls for the user while the user is busy to be forwarded to another number.

For more information, see the ‘System Call Forward-Preset call forward Busy’ section of ‘4. System Features.’

Call Forward No Answer

If the call forward no answer feature is enabled for a user, the incoming calls for the user which are not answered for a specified period of time are automatically forwarded to a specified number.

Even if the user has not enabled call forward no answer, the administrator can configure the incoming calls not answered by the user to be forwarded to another number. For more information, see the ‘System Call Forward-Preset call forward No

Answer’ section of ‘4. System Features.’

You can use PWP to set the time period for each user which is used by the call forward no answer service to determine the user’s an incoming call as an unanswered call and forward it to a specified number. If call forward no answer is enabled by pressing the feature code on the phone, the default time of 15 seconds is used.

© SAMSUNG Electronics America page 65 of 161

Call Forward Unreachable

If the call forward Unreachable service enabled for a user, all incoming calls for the user are automatically forwarded to a specified number when the user’s phone is not registered, does not respond to signaling, or otherwise unavailable.

Selective Call Forward

This service only forwards a user’s incoming calls from specified numbers. Selective call forward can be serviced in the following two ways.

Selective Call Forward Allowance

If this feature is enabled, only the calls from specified numbers are forwarded and calls from unspecified numbers are not forwarded.

Selective Call Forward Restriction

If this feature is enabled, the calls from specified numbers are not forwarded and calls from unspecified numbers are forwarded.

Call Hold

Call hold and Retrieve function allows a user to hold the call that is currently on line, attempt to make a new call and also reconnect to the original call. If the person on the other line is using specific services, (Ex.: call hold, conference, etc.) the call hold function cannot be used.

Call Park

The call park feature allows the user to park the current call so that it can be picked up on another phone by pressing the button or the feature code.

A park ID is a key to distinguish each call, so that the call can be identified when picked up.

There are the following two types of call park service depending on the park ID input method.

Park Extension

The park extension service can be used by using an extension number as the park ID.

Since an extension number is used as the park ID, only one call can be parked per extension number.

Park Orbit

The park orbit service can be used by using an independent orbit park number as the park ID. Since independent numbers are used as the park ID, multiple calls can be parked for each extension number. Therefore, this feature is useful for users who need to park many calls, such as operators.

Parked Call Pick-up

This feature allows a parked call to be reconnected on the phone for it had been parked or on another phone.

© SAMSUNG Electronics America page 66 of 161

Park Recall

This feature allows a parked call to be redirected to the user who parked the call if the call is not picked up after a specified period of time.

In case of a trunk call, if the redirected call is not answered, the call is redirected to the operator. For more information, see the ‘Operator Group-Operator Recall’ section of ‘4.

System Features.’

Call Pick-up

This feature allows the user to answer another user’s incoming call. Call pick-up can be serviced in the following two ways.

Direct Call Pick-up

This feature allows you to pick-up another user’s incoming call by specifying the user’s number.

The user can press the direct call pick-up feature code + the number of the user whose phone is ringing to pick-up the other user’s incoming call which is currently ringing.

Group Call Pick-up

If this feature is enabled, you can specify a call pick-up group number (instead of a user number) for which an incoming call is ringing to pick-up the current incoming call for the selected group. You can also pick-up an incoming call ringing for your own call pick-up group.

The user can press the group call pick-up feature code + the number of the call pick-up group whose phone is ringing to pick-up the group’s incoming call which is currently ringing. Or, the user can dial just the group call pick-up feature code without a call pick-up group number to pick-up the current incoming call for his/her own call pickup group.

Outbound Call Lock

The Outbound Call Lock feature allows a user to request for restriction of outbound trunk calls from his/her own number.

Call Transfer

The call transfer feature allows the user to put on hold the current call and transfer it to another number. If call transfer fails, the call is reconnected to the user who transferred the call.

Transfer Type

The user can transfer calls in the following three ways.

Blind Transfer

This feature allows the user to transfer the call directly to another number without hold it. Although IPX-S300B and Samsung SIP phones support blind transfer, this has the same effect as semi-blind transfer from the user’s point of view.

Therefore no separate feature code is defined.

© SAMSUNG Electronics America page 67 of 161

Semi-Blind Transfer

This feature allows the user to put on hold the current call by pressing the transfer button, call another number, and then transfer the call by pressing the transfer button while the phone is ringing.

Consultative Transfer

This feature allows the user to put on hold the current call by pressing the transfer button, call another number, and then transfer the call by pressing the transfer button again after the call is established.

Transfer Recall

This feature allows the transferred call to be redirected to the user who transferred the call when call transfer fails or when the transferred call is not answered.

If the user to whom the call is transferred does not answer the call during this period of time, the call is redirected to the user who transferred the call.

If the redirected call is not answered, the call is redirected to the operator. For more information, see the ‘Operator Group-Operator Recall’ section of ‘4. System Features.’

Call Waiting

If the call waiting feature is enabled, when there is an incoming call while the user is already engaged, the call is not terminated as a call when busy, but instead the user is notified that a call is waiting so that the user can park or end the previous call and pick-up the new call.

If there is an incoming call while the user is already engaged, a brief call waiting tone will be played for the user. If the user presses the call button to answer the new call, the previous call is automatically held.

If the call waiting feature is enabled for a phone, the phone can receive all the calls it can accommodate. But if the call waiting feature is not enabled, all incoming calls while the phone is engaged are terminated as calls when busy.

If the call waiting feature is enabled for a phone, the phone can accommodate as many calls as the call buttons configured. If no call button is configured, all incoming calls while the phone is engaged are treated as calls when busy.

Call Intercept

Call Intercept can be provided under the 3-way conference by the Barge-In service. A User can make 2-way call with the party which is barged in by pressing Call Intercept soft key.

Forced Call Release

Forced Call Release can be provided under the 3-way conference by the Barge-In service.

By pressing Force Call Release soft key, a user can make 2-way call by releasing the party barged in.

© SAMSUNG Electronics America page 68 of 161

Callback

When a user calls another user but if the called party is busy or does not answer, the caller can enable the callback feature so that when the called party becomes available, the caller’s phone will ring, and if the caller answers the phone, the called party number is redialed.

Callback Busy

The Callback Busy function is for connecting the calling and called users by generating a call to both parties when the called user for whom the IPX-S300B is scheduled becomes idle after the calling user has requested a callback to the called user whose line was busy in the first instance.

Callback No Answer

The Callback No Answer function is used for connecting the calling and the called users by generating a call to the both parties when the line status of the called user for whom the IPX-S300B is scheduled becomes busy then returns to idle after the calling user has requested a callback to the called user who did not answer in the first instance.

CLI Control

Temporary CID Restriction

The temporary CID restriction feature allows the user to request that his/her number is not shown to the called party for a particular call.

When making a call, the user can dial the temporary CID restriction feature code + called party number to request temporary CID restriction.

Distinctive Ring by CLI

The distinctive ring by CLI feature allows incoming calls to be distinguished by ringing different rings depending on the caller numbers.

Do Not Disturb (DND)

When Do Not Disturb (DND) feature is enabled for a user, IPX-S300B rejects all incoming calls for the user. When there is an incoming call for a user with DND, an announcement is played to notify the caller of the DND status and the call is terminated.

DND White List

When there is an incoming call for a user with DND, this service prevents the call from getting rejected if the call originates from one of the caller numbers specified in advance.

The user can use the [DND White List] menu on SCM Personal Assistant to register a list of caller numbers to exclude from the DND service.

DND Override

When there is an incoming call for a user with DND, this service allows the caller, while listening to the DND announcement, to ignore the DND status and have his/her call connected.

To use the DND override feature, both ‘Override Level’ and ‘Privacy Level’ must be defined in Class of Service. DND override is allowed only when the override level is higher than the privacy level. The override level is applied to the user overriding DND and the privacy level is applied to the user with DND.

© SAMSUNG Electronics America page 69 of 161

Follow Me

When the caller has temporarily moved to another location, this service allows the caller to answer all incoming calls to his number by using another phone.

Individual Speed Dial

A user can register one-digit Individual Speed Dial IDs as shortcut numbers to frequently dialing numbers. By dialing these IDs, a user can dial to the destinations.

Intercom

When a call is made between the users for whom intercom is enabled, the call is automatically answered through the speaker. When using the manager/secretary feature, the intercom feature is used together.

Language Selection

This service allows the user to change the language displayed on their phone.

The user can use the [My Info] menu on SCM Personal Assistant to change his/her language.

Last Call Redial

The last call redial feature allows the user to redial the caller or the called party number of the most recent call.

Last Outgoing Redial

The last outgoing redial service allows redialing the called number of the last outgoing call.

Last Incoming Redial

The last incoming redial service allows redialing the called number of the last incoming call.

No Ring

The no ring feature prevents the phone from ringing when there is an incoming call for the user. This service is applied to prevent some phones from ringing when multiple phones are configured to ring at the same time by features such as multi-ring and multi-device.

Multi-Ring

If the multi-ring feature is enabled, when there is an incoming call for the user, the call is directed to multiple phones at the same time, and when the call is answered by one of the phones, the call is connected to the phone and the ring on other phones are canceled.

This service is useful for incoming calls to ring the landline and the mobile phone to ring at the same time.

© SAMSUNG Electronics America page 70 of 161

Mobile Extension (MOBEX)

The mobile extension (MOBEX) feature allows incoming calls to be directed not only to the landlines and mobiles phones registered with IPX-S300B but also to external phone numbers. This is one example of the multi-ring service.

The service also allows the user to answer the call with his/her mobile phone and then when the user returns to the office, the call can be transferred to the landline in the office and be picked up for continued conversation.

Call Pick-up on Desk Phone

This service allows the call answered with an external mobile phone by the multi-ring feature to be transferred to the landline in the office and picked up for continued conversation.

The user can dial the call pick-up on desk phone feature code on the master phone enabled with multi-ring to pick up the call from the mobile phone.

After answering an incoming call with a mobile phone enabled with multi-ring, the user can press the ‘MOBEX on Desk Pick up’ feature code on his/her master phone during the call to transfer the call to the master phone.

Transfer to Mobile Phone

This service allows the user to transfer a call to an external mobile phone specified as a multi-ring member without parking the call. It works in the same way as blind transfer.

The user can dial press the transfer button on the master phone enabled with multi-ring during a call to transfer the current call to the mobile phone.

To transfer a call, press the transfer button and a mobile phone number on the master phone during the call and end the call.

Remote Office

The remote office feature allows automatic forwarding of all incoming calls for a user to an internal number or an external number specified.

The remote office feature works in the same way as Call Forward feature but it is defined for remote use. It is also similar to the Follow Me feature but it is different in that the calls can be forwarded to phone numbers outside the system.

Wake-Up Call

The wake-up call feature allows the user’s phone to ring at a wake-up time specified by the user. If the user answers the call, an announcement is played to notify that it is the wake-up time.

© SAMSUNG Electronics America page 71 of 161

Voice Mail Integration

IPX-S300B’s built-in voice mail system is utilized for providing the basic voice mail services including deflection to voice mail, and transfer to voice mail.

Message Waiting Indication (MWI)

This is the function used to notify that there is an unread message by lighting the MWI lamp of the user’s extension phone when the message is saved in the user’s VM mail box.

Transfer to Voicemail

This feature allows the current call to be connected to a specified mailbox in the voice mail system so that the caller can leave a message.

If the current call is transferred to the voice mail system by a normal method, the voice mail system asks for the service code, mailbox number, password, etc. But if the transfer to voice mail feature is used for transferring the call, this step is skipped so that the caller can leave a voice message without entering anything.

When the user dials the transfer to voice mail feature code + a mailbox number during a call and ends the call, the call will be transferred to the voice mail system and the caller will be allowed to leave a voice mail in the selected mailbox.

With VPU option card, more channels and advanced services are supported. It provides basic services utilized by built-in voice mail system as well as advanced services such as answering machine emulation and call recording.

Answering machine emulation and call recording services are provided as three-way conference calls. IPX-S300B utilizes its VPU option card for establishing three-way conference calls.

Deflect to Voicemail

This service forwards allows the currently ringing call to be forwarded to the voice mail system by using the call forward no answer feature.

The voice mail system answers the call immediately and plays the no answer announcement so that the caller can leave a voice mail.

If the user presses the deflect to voice mail button on the phone which is ringing, the call will be processed for call forward no answer and be connected to the voice mail system.

Answering Machine Emulation (AME)

If the AME feature is enabled, when there is an incoming call, the call is automatically answered by the voice mail system and the caller’s message is recorded in the mailbox.

The voice mail system announcement and the caller’s voice message are heard over the phone’s speaker.

The Answering Machine Emulation (AME) feature allows a user to listen to a caller leaving a message in his/her voice mail box. It operates like a home answering machine. The AME Enable button is used to turn this feature On/Off.

© SAMSUNG Electronics America page 72 of 161

AME Auto Start

This method allows the incoming calls to be connected to AME by configuring the

AME feature in advance.

If the AME auto start feature is enabled, when there is an incoming call and the call is not answered, the call forward no answer feature is used for forwarding the call to the voice mail system to automatically start the AME.

AME Manual Start

This method allows the incoming calls to be connected to AME without configuring the AME feature in advance.

When the user’s phone rings, the user can press the ‘AME-Manual Start’ button to process the call with call forward no answer and connect the call to the voice mail system.

The user can press the ‘AME-Manual Stop’ button on the phone while AME is in action, the caller will be connected to the user and AME will stop.

Call Recording

This feature allows the call conversation to be recorded during a call.

When call recording begins, the ‘Recording’ message will be shown on the phone display, and the CANCEL, PAUSE, and STOP soft menus will be displayed for use.

Auto Call Record

If call recording feature is enabled, this service automatically records calls whenever they are started.

When a user for whom the auto call record feature is enabled is on a call, a threeway conference call will automatically be connected to the voice mail system and the call will be recorded.

When enabling the auto call record feature, you can specify a type of calls to record selectively.

Manual Call Record

This feature allows the call conversation to be recorded during a call by pressing the call record button.

If the user presses the ‘Call Record’ button + the mailbox number during a call, a three-way conference call will be established with the voice mail system and the call will be recorded in the selected mailbox. If a mailbox number is not entered, the call will be recorded in the user’s mailbox.

Personal SPAM Number

IPX-S300B denies incoming calls which calling number is registered in SPAM list.

Pause Digit

In some cases, specific digits should be entered after making a call, It can be used for authentication. These digits can be assigned in speed dial menu after pause digits.

IPX-S300B makes a call and sends digits after pause delay time. Pause delay time depends on the number of pause digits (‘p’ or ‘P’)

© SAMSUNG Electronics America page 73 of 161

This feature is served with the following services.

Hot Line

Speed Dial

Call Forward

Multi-Ring

Paging on Answer

Predefined Conference

Call Bridge

This feature allows the gateway FXS user to join the conversion of bridged user by hookoff. After that, if bridged user is hook-off, FXS user has a continued conversation.

If bridged user is not busy status, the gateway FXS user listens dial-tone and makes a call.

Move to Mobile

The conversation can be continued through other phone. But there is no need to hold the call. It is the difference between Call Transfer and Call Moved to the other multi-device member, if a user selects the menu.

Manual Handover Service

If WE VoIP subscribers move out of WIFI network during a call, you can switch WIFI call to 3G call by manually before it goes out from the WIFI network.

Smart Handover Service

If WE VoIP subscribers move out of WIFI network during a call, WIFI call is switched to

3G call by automatically.

Smart handover is divided into two functions as follows.

Smart Handover-Out: WIFI call is switched to 3G call automatically.

Smart Handover-In: 3G call is switched to WIFI call automatically. However, it is served only if call is on Smart Handover-Out.

Simultaneous Ring Delay for Desktop Phone

When WE VoIP, 3G mobile phone, and desktop phone are set to ring simultaneously, the desktop phone can be set to start ringing later.

Ring Deflect

The Ring Deflect is a feature to transfer receiving calls to another number.

Although the call forward always operates automatically under predetermined conditions, the Ring Deflect is useful when the user forwards calls selectively.

© SAMSUNG Electronics America page 74 of 161

Ringing Preference

You can choose to answer a call or dial a number when the receiver is picked up or the speaker key is pressed while receiving calls by the Ringing Preference setting.

It is initially set to ‘ENABLE’, and answers receiving calls.

© SAMSUNG Electronics America page 75 of 161

CHAPTER 6. Application Features

This part describes the applications provided by IPX-S300B and how to configure them.

IPX-S300B includes a basic conference system and a basic ACD server. IPX-S300B

Express also includes an advanced conference system and a voice mail system.

6.1 Application Sever Service Group

Application server service groups must be created and assigned in order to support server interface for various applications for each user service.

In addition to using application servers, the servers must be grouped so that they can be assigned to different service groups or users. If application server service groups are not assigned, application server calls cannot work.

Servers that can be assigned to application server service groups must be available for userspecific services. The following server types are supported.

Voice mail server

Call Recording server

Paging Conference server

Meet-Me conference server

One-step conference server

Add-on conference server

External ring back tone server

© SAMSUNG Electronics America page 76 of 161

6.2 Automatic Call Distribution (ACD)

The Automatic Call Distribution (ACD) service is useful when there are more incoming calls than the people available to answer them. If the ACD feature is enabled, callers do not need to hear the busy tone for a long time or get delayed in getting their calls answered.

When a call is connected while the ACD group is busy, the call is put in waiting status until an agent becomes available, and a waiting announcement is played for the caller so that the caller can wait until an agent answers the call.

Creating ACD Agents

Regardless of system extension number, an agent ID can be assigned.

The agent can answer incoming calls for the ACD group from any phone by logging in using the agent's ID and password.

Configuring ACD Group

The method of distributing incoming calls for the ACD groups among agents and the method of playing standby announcement can be configured.

ACD Group Basic Information

Basic information of the ACD group, such as the list of agents logging into the ACD group and the method of distributing incoming calls among agents, can be configured.

ACD Announcement (Greeting Message)

When there is an incoming call for the ACD group, a short moment is allowed for the caller to hear the ring back tone, and then the announcement system of the IPX-S300B is connected to play the announcement. Subsequently, if there is an agent available, the call is connected to the agent. If not, the call remains in the ACD group and the announcement and the MOH are played alternately.

ACD Overflow

When there is an incoming call for the ACD group, if there is an agent available, the call is connected to the agent. If not, the call remains in the ACD group and the announcement and the MOH are played alternately. If no agent becomes available even after a long time, the call can be transferred to another ACD group, etc.

ACD Agent Status

Since incoming calls for the ACD group are distributed according to the status of agents, it must be possible to retrieve the status of agents.

An agent can be in any of the following three status modes.

Logged in: The agent is participating as a member to answer calls for the ACD group.

Wrap-up: The agent is wrapping up after ending a call for the ACD group.

Break: The agent is taking a break.

© SAMSUNG Electronics America page 77 of 161

ACD Statistics

The IPX-S300B provides statistics on processing of incoming calls for the ACD group and

ACD calls processed by each agent.

ACD Agent Program

While it is possible for ACD agents to process ACD calls by just using the phone, they can also process ACD calls more conveniently using a dedicated agent program.

Requiring a separate license, the dedicated ACD agent program has many useful features such as real time monitoring of pending calls for the ACD group.

© SAMSUNG Electronics America page 78 of 161

6.3 Conference

IPX-S300B provides Conference service. It has the Internal Conference service witch provides Add-on conference. VPU card can be installed to provide advanced conference services.

6.3.1 Conference Features

The Internal Conference service provides Add-On Conference only. Other services are provided by VPU card.

Add-On Conference

During a call (including a conference call), the call can be put on hold and a new call is made to another attendee. If the new attendee answers the call, the conference button can be pressed to include the new attendee in the conference.

Conference On Answer (COA)

Similar to the Add-On method, a call is made to an attendee and when the called party answers the call, the called party is automatically included in the conference.

Predefined Conference

The service allows a voice conference to be conducted with pre-assigned groups.

The master of conference prepares the list of the group and members in advance by using the SCM Administrator. Also, the system calls each member using the list identifier for the conference then delivers the voices to each member after mixing the voice signals of each member into one voice signal.

Intercom Conference

Initiate a conference by dialing feature code + a hunt group number. The phones registered in the hunt group answer automatically to join the conference.

Dispatch Conference

This feature is provided for the CSTA applications to initiate a conference using its own conference group. It is not available from a phone.

Meet-Me Conference

The master prepares a conference room in advance, and then the members who participate in the conference input the conference ID to join. When each member tries to participate, the Conference server receives the conference ID and passcode through the voice guidance and DTMF before deciding whether to allow the entry to the conference.

© SAMSUNG Electronics America page 79 of 161

Station Paging

When extension numbers are registered to a paging group number in advance, the entire paging group can be paged. The call is automatically answered by the phones paged so that the subscribers can listen to the moderator’s announcement.

Paging On Answer

When the telephone numbers are registered to a paging on answer group number in advance, the entire group can be paged. When the called party answers, he can listen to the moderator’s announcement.

Conference Member Eject

A member joined in a conference can be deleted by another member. The feature permission is allowed to conference owner or a user which setup the conference.

6.3.2 Conference Control

The conference control function provides a monitoring function for conference status by the master of the conference call, voice level control (mute of a participant’s voice), and removing a participant from the conference room functions.

Conference Monitoring

The master can view the current conference status.

He/she can view the participating members, mute, or eject members, lock the conference, terminate the conference

Conference Group Management

A user can view, create, change or delete the pre-define conference groups.

Conference Room Lock/Unlock

The master may lock/unlock his/her own conference rooms. If a conference is locked, no more member can attend the conference.

Sole Participant Audio

This is the function that plays music (or a tone) if a participant is in the conference room by him/herself.

Adaptive Codec Negotiation

It is the function that actively negotiates the codec according to the system load.

IPX-S300B supported following audio CODECs: G.711a, G.711u, G.729.

© SAMSUNG Electronics America page 80 of 161

6.4 VoiceMail/Auto Attendant (VM/AA)

VM/AA provided by IPX-S300B refers to the integrated messaging system interfacing with

IP interface within IPX-S300B. In other words, it provides voice mail, automatic repeater, e-mail server interface, and other functions to users. The IPX-S300B provides voice mail service over 6 channels. The system supports up to 32 channels which can be added by adding VPU cards in the optional slots.

6.4.1 Voice Mail

The Voice Mail function is the service provided when the number called is unavailable.

In this case, the caller may be connected directly to the voice mail or connection to the voice mail after ringing may be selected. The call is connected to voice mail according to various status (busy, no answer, and busy/no answer).

The system answers the call with the user’s pre-recorded message and then the caller may leave a message.

The user can access the voice mail then listens to the messages received from anywhere.

Various options are available for handling the messages.

Answering Machine Emulation (AME)

This function allows monitoring of calls made to the voice mail by using a phone speaker, and is similar to a home answering machine. (It is only provided by VPU card.)

Auto Conversation Recording

This function is used to record the phone conversation made between calling and receiving parties in the voice mail of the receiver. The recording starts automatically upon the beginning of the conversation and ends with the phone hanging up. Then the recording contents can be checked in the voice mail. (It is only provided by VPU card.)

Auto Forward

This function forwards the voice message automatically to the mail box of another phone if the message left in the voice mail is not played within a certain amount of time. The Delay time can be set by the user, and the forwarded message can either be kept or deleted.

(It is only provided by VPU card.)

Auto Login

This function automatically logs into the voice mail without inputting the pin number and the authentication process. (It is only provided by VPU card.)

Auto Message Play

This function automatically plays new messages that arrive in the voice mail when the user is logging in, and it can minimize the unnecessary operation of selecting digits to input.

© SAMSUNG Electronics America page 81 of 161

Broadcasting

This function sends a voice message to all users of the system at once that can be performed by the user with the manager’s authority. (It is only provided by VPU card.)

Call Back

This function calls the sender who sent a voice message by pressing a button while listening to the message and can call both the extension and the office line. To call an office line, the Call ID should be available.

Call Forwarding to Voice Mail

This function forwards all incoming calls to the voice mail when the user’s line is busy or cannot answer.

Call Record

This function records the contents of the phone conversation currently being made and saves it in the voice mail by pressing a button. (It is only provided by VPU card.)

Call Back Requested Message

A caller may select the Call Back Request option when leaving a message, and once the number to receive the call back has input, the user is notified that the call back has been requested when playing the message. At this time, the user can call the caller directly by pressing a button.

Date and Time Stamp

This function notifies the accurate message arrival time when the user has logged in the voice mail then playing a new message.

Quick Memo

This function allows a caller to leave a message more conveniently with other users.

Distribution Lists

This function leaves a voice message to multiple users simultaneously. The list can include not only the users’ phone numbers but also the lists containing the users’ phone number.

When a message is left on a list, the message is saved in all phones of the users who are on that list.

External Number Notification

This function gives notification of a voice message to a pre-registered home phone number, cell phone, or other phone when it is received by the user’s voice mail.

(It is only provided by VPU card.)

© SAMSUNG Electronics America page 82 of 161

Message Scheduled Delivery

When a user leaves a message with another user, the function allows the delivery time of the message to be set.

Message Grouping

This function is used to listen to the voice messages received by a user’s voice mail per type (emergency, Callback, Fax, Reply Requested, Memo, etc.) in groups.

Individualized Voice Mail Greeting

This function is for a user to record a greeting message for his/her voice mail. When a caller is accessing the voice mail to leave a message, the recorded voice mail greeting can be played.

Individualized Voice Mail Name

It is the function of linking each voice mail to the name that is recorded by the user’s own voice.

Message Address Verification

This function is used to play back the numbers pressed by the user. This is so that he can make sure they are correct when he leaves a voice message.

Message Delivery Options

When a voice message is left in a user’s voice mail, this function notifies it to a preregistered home phone number, cell phone, or other phone only at the registered time.

Message Alert Notification Schedule

This is the function to set options for sending a voice message, and the options are

Emergency Message, Callback Request, Reply Request, Secret Message, Receive

Notification, etc.

(It is only provided by VPU card.)

Message Listening Option

The function is used for setting options for listening to the voice messages in voice mail, and functions such as replay, save, delete, rewind, fast forward, and pause can be used.

Message Forward With Append

When forwarding a voice message received by a user, this function allows additional information to be recorded onto the original voice message and sends it together.

© SAMSUNG Electronics America page 83 of 161

Message Length Control Option

It is the function of setting the length of a voice message received by a user’s voice mail.

Message Delivery Cancellation

This is the function that allows the cancellation of the voice message left in a voice mail by the caller if the message has not been played by the called person.

Message Reply

This is the function of immediately sending a voice mail to the caller by pressing a button while the user is listening to the voice message received.

Message Scan

This is the function of partially listening to the beginning parts of all messages in the voice mail of a user and scanning for a message.

Message Skip

This is the function of skipping the message that is saved in the voice mail to the next one instead of listening to the end of the message.

Message Undelete

This is the function used to either listen or save a message in a voice mail after a user has listened and deleted the message.

Message Waiting Light Indication

When a voice message has arrived in the voice mail, the function notifies it to the user by blinking the phone lamp.

Multiple User Mailboxes Login

It is the function of several users accessing one mail box simultaneously then listening to a message. However, one message cannot be listened to by several users at the same time, and the message being played for a user becomes unavailable for other users.

Multiple User Mailboxes

Generally, the same number is used for both Mailbox and Extension, but different numbers can be used also for the each or using a Mailbox without an Extension is also possible.

One Touch Access

This is the function of logging in by using just one button or logging in with the Admin authority.

© SAMSUNG Electronics America page 84 of 161

Reminder

This function is for the user to leave a self memo such as a schedule or other items that need to be recorded.

6.4.2 Auto Attendant

Auto Attendant (AA) function is the function whereby VM/AA answers a caller automatically and plays a voice guidance message or messages according to the caller’s dialing command. The caller may appoint a person or group by pressing the number.

AA answers the caller with a pre-recorded prompt and also plays several options that the caller may choose (selecting the number to transfer, connecting to the voice mail or Auto

Attendant, accessing the pre-recorded information, etc.).

Multiple Alphabetic Directory

When a user does not know the phone number of the person to call, the function allows the system to search the phone number just with partial letters of the name then either connects to the person or to the voice mail.

Also, the system directory service is available to use by pressing ‘9’ on AA after calling on the office line. When the name of the called person is input through the key pad, the call is connected to the person when the search result is one person or plays the names that are searched if two or more names are resulted where the caller can choose one name.

Auto Attendant Route

Automatic repeater is the function to either route or transfer a call according to the number the caller is pressing. By using the function, a call can be either transferred to a specific user or connected to a voice mail in VM/AA and also can interworking with functions such as Fax sending/receiving or E-mail receiving.

Direct to Mailbox

This is the function of providing only the mailbox without a linked phone number (Station).

This function is ideal in situations where there are few workers working in the office while many are working outside of the office.

Holiday and Special Events

This is the function for playing a special prompt to callers who made calls on holidays or certain company holidays.

Interruptible Voice Prompts

This is the function to select a desired service while a prompt is being played instead of listening to the end of the voice guidance or prompt.

© SAMSUNG Electronics America page 85 of 161

Multi Call Handling

This function handles multiple calls simultaneously.

Multi Language Support

Supports multiple languages.

Operator Access

A caller may connect to an operator who is in ready state by pressing ‘0’ at any time.

Single Digit Call Routing

The menu processor can be set to perform a routing in a specific routine by recognizing one number. For instance, it can be set to connect to the number 2001 of Sales Department when the number ‘1’ is pressed on menu.)

6.4.3 Access Manager

Access Manager Function can individually manage the callers connecting the users.

The mail box owner can set his/her extension number to not ringing, connect a call to other extension number within the phone system, or search the call before answering.

These conditions can be set for specific times. VM/AA can be set to ‘Find Me’ to allow connection to the users in different places.

(It is only provided by VPU card.)

Call Blocking

While Call Blocking is set by a user, VM/AA does not connect callers to the user’s extension. Instead, the call blocking greeting prompt is played immediately to the caller.

If the call blocking prompt has not been recorded, VM/AA plays the user’s existing no answer prompt. If the no answer prompt has not been recorded either, VM/AA plays the guidance prompt to the caller saying that the called number is currently not available and suggest other options.

The user sets call blocking using the access manager service. After setting call blocking, the user can set the blocking period. This function can be set to be activated for certain time periods such as until the end of today’s business hours, until the start of the next business hours, until one day of the next week, from Monday to Sunday, until a certain date, until a specified time, or for certain hours; from 1 hour to 9 hours.

© SAMSUNG Electronics America page 86 of 161

Call Forwarding

Callers are connected to an internal extension number. (cannot connect to an office line.)

When the call is being connected to an extension, the prompt of ‘You are being connected to A of B department. Calls are connected to C.’ is played to the caller. Then when the called person answers the call, he will hear an automated announcement giving the information of the caller.

This function can be activated for between 1 and 9 hours, until the end of current business hours, until the beginning of the next business hours, until one day in the next week, from

Monday to Sunday, or until a certain date.

Day/Night Personal Greeting

The Night Personal Greeting works in conjunction with the user’s Weekly Availability

Schedule. During the defined availability period, the VM/AA will automatically play the

Primary No-Answer Greeting to callers, unless the user is busy on another call and has recorded a Busy Greeting or Call Blocking is set active, and a Call Blocking Greeting is recorded. During the time periods a user is not scheduled available to take calls, and does not have Call Blocking activated, the VM/AA plays the user’s Night Greeting if recorded.

Find me

When this function is activated, the VM/AA attempts to deliver a call to a place designated by the user. The VM/AA first finds the user in the location designated by the user then makes the call to each of the user’s saved phone numbers if necessary until all numbers are called. This function can be activated for between 1 and 9 hours, until the end of current business hours, until the beginning of the next business hours, until one day next week, from Monday to Sunday, or until a certain date.

Follow Me

A user can pick up a call that is automatically forwarded to a designated location. This is called the user’s location designation. The location designation can be set for both internal extension and external phone number. This function can be activated for several hours from

1 to 9 hours, until the end of current business hours, until the beginning of the next business hour, until the day of the next week, from Monday to Sunday, or until a certain date.

Hold for Busy Station

VM/AA allows the caller to be placed on hold during a call. When a caller makes this choice, VM/AA puts the caller on hold. If another caller reaches the busy extension, the caller is put on hold with an on-hold notification and the expected waiting time until connection. Meanwhile, the called person is informed of a new incoming call.

© SAMSUNG Electronics America page 87 of 161

Multiple Personal Greeting

When a user cannot receive a call, the VM/AA answers the call. VM/AA categorizes the user’s reasons (5 categories) for being unable to pick up the call, and different greeting messages can be used for each reason. VM/AA provides several (1 to 9) greeting recording functions to users, and a user can use different greetings according to the situations.

Park and Overhead Paging

The VM/AA provides park and paging function for users who are frequently out of office.

When a user is not answering a call and caller selects ‘Park & Page,’ the VM/AA notifies the user by turning on the speaker phones that are registered by the user.

Telephone Number Storing

This function is used to save the phone numbers that are frequently used by a user.

Weekly Schedule of Call Availability

This function registers a time of a day when the user can generally receive calls, and

VM/AA plays a proper guidance message if the user cannot receive calls during that time.

6.4.4 E-mail Server Interface

An integrated messaging system can be configured by interfacing voice message through the E-mail server interface function.

Especially through the MS Outlook interface function, considerations have been given to existing E-mail users to use VM/AA more conveniently by allowing existing Outlook users for the service. Also, the integrated messaging system can be configured by interfacing with external servers (example: Exchange Server).

(It is only provided by VPU card.)

Outlook Interface

Users of VM/AA can send/receive all voice messages to/from the voice mail by using the

Outlook.

Interface with E-mail Server

By interfacing (IMAP) with E-mail server, VM/AA can integrate and manage voice messages

© SAMSUNG Electronics America page 88 of 161

6.5 Call Recording

Since IPX-S300B V2.0, new recording feature is supported. Unlike recording supported in the previous VM, it consolidates and manages recorded files, and it is easy to listen, download, and backup recorded files.

To use this feature, a VPU card must be installed.

6.5.1 Recording Specifications

VPU Number

Two VPU’s can be installed: one for VM/Conf and one for Recording. Two VPU’s cannot be installed for a single purpose.

Recording Channel Number

A maximum of 10 for conference recording and a maximum of 20 for telephone recording are supported. When both are used, the available number decreases in the ratio of one conference recording to two telephone recording. In addition, this can be limited by the license entered.

Recording Time

A maximum of 500 hours of recording files can be saved to the VPU. However, it can continue to record, overwriting old files or deleting old files after backup. The maximum recording time per call is limited to 24 hours.

Recording File List

The recording file list can store up to 100,000 and oldest ones will be deleted after exceeding 100,000.

Recording File Type

Recorded files are saved to the VPU as G.711 8000 Hz Mono 64 kbps, and also transmitted to the backup device in this format. However, when playing and downloading in the SCM

Administrator, it is downloaded after converted to WAV.

© SAMSUNG Electronics America page 89 of 161

6.6 External Applications

6.6.1 Samsung Communicator

The Samsung Communicator is Unified Communications Client software running on a client PC that takes the functionality commonly used and understood on our telephones and puts it at your finger tips and Screens on your PC. The Samsung Communicator can be run in three different Modes. The Samsung Communicator can be a stand alone device when in the Soft Phone Mode, when in UC Phone Mode it can work in connection to a UC phone

(SMT-i Series) device. Also, when in Desk phone Mode it can work in connection to a UC phone (SMT-iSeries) and other 3 rd

party SIP Phone via CTI I/F of IPX-S300B. All of which empowering the user, when connected, to make/receive calls to/from anywhere in the world as authorized by the organization.

The Samsung Communicator is an integrated client communications application that brings together two devices; your business PC and your business telephone. This enables users/users on the same phone system to communicate via Voice and Video.

Soft Phone Mode (PC Phone Integration Device)

The Soft Phone Mode is also known as a PC Phone device. In this mode, the

Communicator Soft Phone is the device the user uses to make/receive all their calls.

The Communicator Soft Phone is a software device that emulates a Samsung business telephone. The Communicator Soft Phone is registered to the Samsung switch installed at the Corporate office empowering the user, when connected, to make/receive calls to/from anywhere in the world as authorized by the organization, all through their PC and PC’s

Multi-Media functionality (PC MUST be equipped with Internal or external Mic and

Speakers and/or headset).

UC Phone Mode (Samsung SMT-i Series Device Integration Only)

In this mode, the Samsung Communicator interoperates directly with a telephone device such as the SMT-i5343 terminal. In this mode, telephone functionality can be performed from either the PC or telephone device. However unlike the Communicator Soft Phone

Mode while in UC Phone Mode you MUST use the SMT-i Series device to talk with the caller.

Desk phone Mode (Samsung SMT-i Series and other SIP Phones Integration)

In this mode, the Samsung Communicator controls the call of your phone in interoperation with the PBX via CSTA I/F

Answering/Making Calls

Call Control: (Transfer, Hold, Forwarding, Speed Dial, etc…)

Call/Missed Call Logs

Dial from Outlook Contact List(s)

Free Dial

© SAMSUNG Electronics America page 90 of 161

Missed Call Notification

Phonebook

Schedule

Screen Pop Contact List (both from Communicator Phonebook and Outlook)

SMS/Text Messages

Video Calls

And more…

For more details, see the Samsung Communicator User Guide.

6.6.2 ACD Agent

ACD Agent Desktop is the Windows-based Client Application that resides on the agent’s computer. With Agent ACD, you can control calls with your computer.

The ACD Agent allows you to:

Call Control

Make Calls

Answer Calls

Transfer Calls

Conference Calls

Monitoring

Provides the real time status information of the ACD Group where the Agent belongs.

Number of wait calls: Currently waiting for the call distribution.

Number of Logged-in Agents

Longest ACD wait time (current): Waiting time of the call that has waited for the longest time among the calls currently waiting

Number of IDLE Agents: Agents that the call distribution service has available.

© SAMSUNG Electronics America page 91 of 161

6.6.3 Third Party Applications

IPX-S300B can interface with external SIP Conference Server, SIP VMS, SIP UMS, SIP

IVR (AA Server), and Legacy (PSTN) VMS, and can be categorized as shown below according to the interface type.

Using Standard SIP

IPX-S300B provides the interface function by using standard SIP protocols with application servers such as SIP Conference Server, SIP VMS Server, SIP UMS Server, and

SIP IVR.

Using Standard CSTA

IPX-S300B provides the interface function using standard CSTA Phase-II protocol.

For more details, see the IPX-S300B CSTA Interoperability Guide.

© SAMSUNG Electronics America page 92 of 161

6.7 Solution Partner Applications

Ring Back Tone Server

The ring back tone server provides the ring back tone service. When the ring back tone server is connected, the caller can hear the ring back tone while the call is being connected.

Voice Mail System (VMS) Server

Working together with the voice mail call processing system, this application provides services for transferring calls to the user's number with voice announcement (auto attendant), taking voice mail when the user is unavailable, etc.

Transcription Server

Currently, only IP packet mirroring type transcription servers can be connected.

Using an IP packet mirroring type transcription server requires configuring the IP network equipment. No additional configuration is needed on the IPX-S300B.

Standard SIP Method

The IPX-S300B uses the standard SIP protocol to provide interfacing with application servers such as SIP conference server, SIP VMS server, SIP IVR, and SIP UMS server.

Standard CSTA Method

The IPX-S300B uses the standard CSTA Phase-II protocols to provide interfacing with any external application servers such as ACD server and IP relay server.

For more details, see the IPX-S300B CSTA Interoperability Guide

© SAMSUNG Electronics America page 93 of 161

CHAPTER 7. Network Feature

7.1 Network Feature

WAN Interface

The gateway supports two GbE interfaces, each of which can be connected to WAN and

LAN.

LAN Redundancy

When connecting LAN only to the two GbE interfaces of the gateway, the LAN connection can be configured in redundancy.

NAT

When both WAN and LAN are connected to the gateway, the external network and the internal network are isolated as separate networks, with the NAT function automatically converting addresses and exchanging packets between the two.

Port Forwarding

By specifying external network ports on the gateway, packets can be forwarded according to internal addresses, ports and protocols.

QoS

When VoIP packets and data packets are present at the same time, VoIP packets can be served on priority.

DHCP Server

The DHCP server of the gateway can automatically assign IP addresses to the internal boards and other devices connected on the LAN interface.

© SAMSUNG Electronics America page 94 of 161

CHAPTER 8. SBC Function

8.1 SBC Function

Signaling and Media Control

SIP signaling and media can be transferred between the inside and the outside.

UDP, TCP, and TLS transport are all supported, with support for conversion transfer.

SIP signaling and media can be transferred for SIP entities under NAT of the external network.

Call Routing

Routing adjustment can be done based on the source address in the SIP signaling message.

Subscriber call routing can be done according to the registration message.

Security

SIP signaling from unauthorized IP addresses can be rejected.

Topology for SIP messages can be hidden.

Redundancy

In the case of SIP entity validation (using ping or options messages) or problems, alternative routes can be used.

QoS Marking

QoS settings can be enabled.

© SAMSUNG Electronics America page 95 of 161

CHAPTER 9. System Operation

This section describes the features required for system management.

9.1 Access Control Management

SCM Administrator can control access for operators (Engineering, Technician and

Customer-3 Levels supported).

Administrator can manage operators’ IDs, passwords, levels, classes, login timeout password duration, forced password change, etc.

Administrator can use control access by entering user terminal information.

9.2 Process Management

Multiple processes (programs) run organically on the IPX-S300B.

Naturally, the IPX-S300B features a process manager which manages such processes by performing the following functions.

Starting and stopping the IPX-S300B

Process management

Starting and stopping individual processes by operator command

Retrieving process version information

Starting and Stopping IPX-S300B

IPX-S300B automatic start

When you configure the database and IP settings after installing the IPX-S300B, the system restarts and the IPX-S300B starts automatically. Also, when you power on the

IPX-S300B server, the IPX-S300B starts automatically.

IPX-S300B manual start and stop

To manually start or stop the IPX-S300B, you should connect the console port of the

IPX-S300B and execute the reboot command.

Or you can reboot system in SCM Administrator.

© SAMSUNG Electronics America page 96 of 161

Process Management

Process monitoring

The IPX-S300B process manager monitors the status of all processes at all times.

When a process is down, the process manager automatically restarts the process.

If the restarted process continues to terminate abnormally, the process manager does not restart the process any more. This is because the process manager thinks that the process would terminate abnormally again when restarted.

Process status

Each process of the IPX-S300B can be in any of the following status: NORMAL,

ALIVE, WAIT or FAIL.

Process level (priority)

The IPX-S300B categorizes its processes into Critical, Major, and Normal levels depending on the impact on the system and applies different management policies accordingly.

Starting and stopping individual processes

The IPX-S300B operator can stop a running process or start a stopped process.

Processes can be stopped or started using the [Performance > System Management

> Process Management] menu.

Click the Activate button, select a stopped process, and click the Activate button again to start the process.

Click the Deactivate button, select a running process, and click the Deactivate button again to stop the process.

Retrieving process version information

Each process of the IPX-S300B has information for its version, creation date and creation time.

© SAMSUNG Electronics America page 97 of 161

9.3 Operation Management

9.3.1 System Configuration

To view or change the system configuration, log into SCM Administrator and click the

[CONFIGURATION] icon on the main menu.

The Configuration menu contains various sub-level menu items including Location, User

Group, User, Trunk Routing, Time Schedule, Service, Application, Phone Setting,

Announcement, Miscellaneous and gateway.

Figure 18. SCM Administrator

© SAMSUNG Electronics America page 98 of 161

9.3.2 System Performance Management

To check the current IPX-S300B system performance status including CPU, memory, and disk utilization, watches the right side of the main monitor. Also, it can check the system and process resource usage activity.

Figure 19. IPX-S300B Performance Monitor

System Resource Monitoring

IPX-S300B monitors the system resources in five second intervals and displays the information in IPX-S300B Administrator. Also, when a specific resource’s usage increases, alarms are generated in the order of Minor Major Critical to notify the administrator of any system problems.

The system resources monitored by IPX-S300B include CPU, memory and hard disk drives.

Viewing System Resource Information

The Chart of Right Side display CPU, memory, and hard disk. Also, CPU, memory and hard disk usage in the System Viewer screen in the bottom left corner.

If a network card stops working, it generates an alarm, which is cleared when the problem is rectified.

Viewing Resources by Processes

When a specific process’s CPU usage increases, alarms are generated in the order of Minor

Major Critical to notify the administrator of any system problems.

© SAMSUNG Electronics America page 99 of 161

9.3.3 Announcement Management

IPX-S300B’s built-in sound source system can play voice announcements and system tones when necessary.

Release Announcements

This service plays voice announcements when calls are not processed normally due to errors, etc.

Select an announcement and click the Play button to have the selected announcement play through the PC’s sound device.

Service Announcements

Voice announcements can be played when using call processing services.

Select an announcement and click the Play button to have the selected announcement play through the PC’s sound device.

Music On Hold (MOH)

This Service manages the system tones for the music and tones played when calls are put on hold or forwarded. You can also register different sound sources required for the site and service them.

Select a MOH and click the Play button to have the selected MOH play through the PC’s sound device.

Language Settings

IPX-S300B supports announcements in multiple languages. However, due to the complexity of settings to configure different conditions for different languages, only one language is serviced at a time.

9.3.4 Call Management

IPX-S300B provides a feature for viewing the information of currently processed calls. It also allows the administrator to terminate currently processed calls by different criteria such as unusually long calls or illegitimate calls. IPX-S300B also provides the trace feature which allows the administrator to trace calls or protocol messages.

Call Management

You can view the currently processed calls. Click the Search button to view the list of currently processed calls.

You can filter the call list displayed by entering advanced conditions such as caller numbers, called party numbers and call durations.

Select a call from the list and click the Delete button to terminate the selected call.

© SAMSUNG Electronics America page 100 of 161

Signaling Trace

IPX-S300B supports a protocol tracing feature (SIP signaling trace) for calls.

Create a protocol trace item in the [PERFORMANCE > Call Trace] menu to view protocol messages by call stages in Job Monitor.

Following three types of protocol tracing is supported based on the call type.

Call Trace: All protocol messages from the call initialization stage to the call termination stage are traced for a call for a user’s extension number.

Route Trace: All protocol messages from the call initialization stage to the call termination stage are traced for a call for a route.

Protocol Trace: All protocol messages sent to and received from a specific IP address are traced.

9.3.5 Database Management

IPX-S300B provides a feature for backing up the database during operation.

When upgrading IPX-S300B to a newer version, you can back up the database, upgrade the version, and then restore the database for use.

Database Space

IPX-S300B provides a feature for displaying the current size of the database.

The maximum allowed database size is shown in KB.

Database Backup

You can configure periodical database backup to backup the database periodically or perform an immediate database backup.

9.3.6 User Management

IPX-S300B provides a feature for managing IPX-S300B users including phones, routes, gateways, and applications.

Extension Management

IPX-S300B manages extension users by adding, deleting or changing extension users in the database. Extension user information can be either phone information with physical properties or user information with logical properties.

Trunk Management

IPX-S300B manages trunk users by adding, deleting or changing trunk users in the database. Trunk user information can be either endpoint information with physical properties or route information with logical properties.

© SAMSUNG Electronics America page 101 of 161

Registration Management

IPX-S300B manages the registration status of the users-including phones, routes, gateways, and applications-which provide services by performing SIP registration with IPX-S300B and displays their current status.

Authentication Management

IPX-S300B can authenticate registration of the users-including phones, routes, gateways, and applications-which provide services by performing SIP registration with IPX-S300B.

Also, when an extension user makes a call, IPX-S300B provides a service for allowing the call to be made after obtaining an external server’s authentication.

Service Allowance Management

IPX-S300B can allow each individual extension user to use different sets of features by assigning them to service classes.

9.3.7 Maximum Calls Management

On an IP-based PBX, it is not possible to limit the number of phones physically connected or the number of calls made simultaneously. However, since system resources are limited, a service is required to limit the maximum number of calls at any one time.

IPX-S300B provides the Call Admission Control (CAC) feature which limits the maximum number of calls allowed. The CAC service provided by IPX-S300B includes CAC by call counts, CAC by location based bandwidth, and CAC by system resources.

© SAMSUNG Electronics America page 102 of 161

9.4 Call Detail Records (CDR) Management

Account information includes Call Detail Records (CDR). Whenever a call starts or ends,

IPX-S300B records the call information according to the account data recording method defined for each user group. Account data can be recorded by Local, FTP or TCP. Names of the files saved and their directory names are determined by the recording method used.

Local Store (Saving Account Information in IPX-S300B)

The CDR files generated are backed up and saved in the IPX-S300B hard disk without interoperating with any external account systems.

FTP Send (FTP Interoperation for Accounting System)

The CDR files generated are transferred to the external accounting system interoperating by FTP protocol.

TCP Send (TCP Interoperation for Accounting System)

IPX-S300B interoperates with the external accounting system over a native TCP method.

Whenever CDR data is generated, the CDR data is transferred to the TCP server. CDR files are also backed up in IPX-S300B.

Billing Output by Call Types

This is a function that the CDR data is created by call types

Billing Delete Length

This is a function that deletes access code of trunk in the ‘connect number’ of CDR

© SAMSUNG Electronics America page 103 of 161

9.5 Traffic Reports

The IPX-S300B provides hourly, daily, and monthly statistics for calls and alarms in the system.

Maximum periods for hourly statistics, daily statistics, and monthly statistics are 7 days, 90 days, and 365 days respectively. Also, hourly statistics and daily statistics can only be retrieved for the last 30 days and 365 days respectively.

Call Traffic Reports

IPX-S300B provides statistical information for calls generated in the system by hours, dates and months.

System Statistics

Internal Calls: Calls were attempted between internal users.

Outbound Calls: Calls internal users attempted to call external users.

Inbound Calls: Calls external users attempted to call internal users.

Tandem Calls: Calls external users attempted to call other external users through

IPX-S300B.

Call Failures: All failed calls including unknown calls.

All Calls: This shows the statistical information for all calls.

Failure Reasons Calls: All failure reasons.

User Group Statistics

Outgoing: Counts users of user group attempted to make outgoing calls.

Incoming: Counts attempted for users of the user group

Service Group Statistics

Outgoing: Counts users of service group attempted to make outgoing calls.

Incoming: Counts incoming calls were attempted for users of the service Group

Route Statistics

Inbound: Counts incoming calls were attempted for internal users through the route.

Outbound: Counts internal users attempted to call external users through the route.

Hunt Group Statistics

Incoming: Counts incoming calls were attempted for users of the hunt group.

User Statistics

Outgoing: Counts the user attempted to make outgoing calls.

Incoming: Counts incoming calls were attempted for the user.

System Service Statistics

Mobile Remote Dial: Counts the system attempted the make mobile remote dial.

Smart Routing: Counts the system attempted the make all smart routing.

Smart Routing (Internal): Counts the system attempted the make internal smart routing.

Smart Routing (External): Counts the system attempted the make inter IPX-S300B smart routing.

Smart Handover: Counts the system attempted the make smart handover.

Mobile Call: Counts Samsung mobile phone attempted the make calls.

© SAMSUNG Electronics America page 104 of 161

Phone Usage by Type Statistics

Internal Outgoing Usage: Counts outgoing calls were attempted between internal users

Internal Incoming Usage: Counts incoming calls were attempted between internal users

Outbound Usage: Counts internal users attempted to call external users.

Inbound Usage: Counts incoming calls were attempted for internal users.

Total Usage: This shows the statistical information for all calls.

Phone Registration by Type Statistics

To Reg: Counts state change from unregistration to registration

To Unreg: Counts state change from registration to unregistration

Registration Average: Averages state is registration.

ACD Group Statistics

System Summary: All system-wide ACD calls.

Group Summary: All calls for the ACD group.

Overflow: Overflow occurred for ACD group.

ACD Agent Statistics

Summary: all agents’ calls.

Utilization: all agents’ level of contribution.

Activity: all agents’ activities.

Resources

CPU statistics

Shows statistics for system CPU.

Memory statistics

Shows statistics for system memory.

System Alarm Statistics

Shows statistics for system alarms, failures and status.

Emergency Call History Statistics

Shows statistics on emergency call history.

© SAMSUNG Electronics America page 105 of 161

9.6 Fault Management

This section describes various settings and methods for handling system events. Events are generated as alarms, faults or status whenever there is a problem with the system or a specific status changes. You can configure the profile for such events.

Alarms, faults and status serviced by IPX-S300B are categorized in the following way:

Alarm: A critical problem such as network failure or process termination has occurred and it can be cleared.

Fault: A critical problem such as database backup failure has occurred and it cannot be cleared.

Status: A status change, such as redundancy status change, which is not an alarm or a fault has occurred.

In the bottom left corner of the IPX-S300B Administrator screen is the System Viewer window which displays the number of alarms generated in the IPX-S300B system. When an alarm is generated in IPX-S300B, the System Viewer window displays the number of alarms generated for each level.

Figure 20. System Viewer

Setting

A setting contains detailed information for alarms, faults and status generated in IPX-

S300B.

The administrator can use this information to configure how IPX-S300B Administrator displays the alarm, fault and status information.

Viewers

Event Viewer provides real-time monitoring of alarms, faults, status, and alarm clear information in the IPX-S300B system.

Viewer-Event displays alarm, fault, status, and alarm clear information simultaneously in the order of alarms > faults > status > alarm clear from the top.

Viewer-Alarm provides real-time monitoring of alarms generated and then cleared in the

IPX-S300B system.

Alarms are highlighted in different colors depending on the levels: red for critical, orange for major, yellow for minor, and green for normal. When an alarm is cleared, it is highlighted in green for normal level.

© SAMSUNG Electronics America page 106 of 161

History

This feature allows you to manage the history of alarm, faults and status information generated in IPX-S300B.

Email Notification

The alarm, fault, and status information generated in IPX-S300B can be notified to the administrator by email. To allow this, the email field in the alarm profile, fault profile or status profile must be set to Enable and the required settings for the email server must be configured in email settings.

SMS Notification

The alarm, fault, and status information generated in IPX-S300B can be notified to the administrator by SMS. To allow this, the SMS field in the setting-alarm, setting fault or setting status must be set to Enable and the required settings for the SMS server must be configured in email settings.

© SAMSUNG Electronics America page 107 of 161

9.7 License Management

9.7.1 Trial Version License Key

The IPX-S300B provides a trial version license for trying out phone user count settings, scheduled conference and VM function, ACD function, CSTA interface function, etc.

The trial version license can be used for up to one month from system installation.

User License

The user license management screen is provided where the manager can input the license key that is based on the server equipment information where IPX-S300B is installed and also check the result.

Embedded Application License

The embedded application License management screen is provided where the manager can input the license key required for starting Voice Mail of Meet-me Conference that is based on the equipment information of the server where IPX-S300B is installed and also check the result.

External Application License

The external application license management screen is provided for external servers where the manager can input the license key for starting external application that is based on the external server’s equipment information and also check the result.

9.7.2 Activation Key

IPX-S300B supports management of activation key for call handling, UMS/MCS users and the ACD to be installed in other server.

IPX-S300B Package

The activation key management screen is provided where the manager can input the activation key that is based on the server equipment information where IPX-S300B is installed and also check the result.

© SAMSUNG Electronics America page 108 of 161

9.8 Photo File Management

The purpose of the photo file management is to check photo files which are used in IPX-

S300B and to provide tools such as Compress, Delete and Adjust. Also, Upload and download of batch file can be provide through this menu.

The functions are as follow.

Search: show the count and the size of photo files which is stored in IPX-S300B

Command: provide Compress/Delete/Adjust processing.

Upload: can change several photo files with a batch file formatted in TAR.

Download: can get the stored photo files in IPX-S300B

9.9 Installation Features

This section describes the procedures for using the essential management tools (including the tools for installing phones, installing gateways, and batch importing or exporting largevolume information) for operating the IPX-S300B system.

9.9.1 Data File Export/Import

IPX-S300B Administrator’s data file export/import feature allows exporting information from some of the IPX-S300B Administrator menu items into an Excel spreadsheet, which can then be edited offline and be imported back.

When editing the Excel spreadsheet offline, you can edit the information for each field and also add or delete lists. IPX-S300B can be updated with any changes made in the Excel spreadsheet.

9.9.2 Phone Settings

PNP Installation

This feature allows a phone to be registered with IPX-S300B when powered on so that it becomes available for service. If a MAC address is registered when creating the device, sec_{mac address}.xml is created in /tftpboot/sec_mac/. If a phone uses PNP, the phone reads this file to acquire the required information and automatically requests IPX-S300B for registration.

If PNP is not used, you can register the phone by manually entering the profile ID, password and the IP address of the IPX-S300B on the phone.

If PNP is used, it means that an IP address is automatically allocated to the phone by the

DHCP server and the phone is automatically informed of the IP address of the profile server. Therefore, the IP address of the profile server must be included in Option 43 of the

DHCP server. You may configure IPX-S300B to as a profile server without installing a separate profile server, but this is not recommended for IPX-S300B Enterprise.

© SAMSUNG Electronics America page 109 of 161

Phone Profile Information

A service profile is applied to all phones in a user group. It includes definitions of available services. It includes information on feature codes, etc.

A line profile is applied to each phone number. It includes definitions of features available for each number. It includes information on call forward settings, etc.

Phone Update

This service allows the administrator to update profiles. Service profiles, user profiles, and line profiles can be updated.

If necessary, phones can be upgraded. Multiple phones can be set for upgrades at a specified time.

Manual Phone Update

Phones can be updated manually in the following ways:

Profile Update

This method sends an SIP Notify message which notifies profile changing to a phone.

Although this message is sent automatically when changing profile, you can have force it to be sent when necessary.

The following profile types are possible.

Service Profile

Line Profile

User Profile

Phone Profile

Model Update

This method is used for upgrading the phone software.

‘Model Update User Group’ method updates all phones of a specified model in a user group. When this method is used, phones of the selected model are updated starting from the start device, a specified number of phones at a time and at a specified time interval.

Reboot

This method is used simply for restarting the phone.

‘Reboot User Group’ method restarts all the phones in a user group at once. This method processes 40 phones each second. If you use this method to update phones, the system may slow down due to overload. Always use the model update user group feature when updating phones

User Profile

You can configure the phone version, the secondary NTP server and the refresh time.

When using NAT, you can configure the secondary NTP used on the public IP network.

When the settings are changed, sec_boot.xml and sec_user_XXX.xml are changed, and a

Notify message is sent to all phones.

© SAMSUNG Electronics America page 110 of 161

Dial Plan

When dialing a phone number on the phone, if the number entered matches a specified rule, the phone can be set to send a sent message immediately to IPX-S300B without waiting for the next number or timeout. IPX-S300B can set dial plans to be used by phones and send them to all phones.

Automatic Phone Update

IPX-S300B can automatically upgrade the phone software.

Load the package on a selected profile server and reboot the phone to have the phone upgraded automatically.

During automatic upgrade (if the version information in sec_boot.xml is different from the version on the phone), the phone software is automatically updated according to the

<upgrade_server> IP address and the protocol (tftp or http) defined in sec_boot.xml.

When the update is complete, sec_boot.xml is loaded again for the rest of the procedure.

In a large-scale IPX-S300B system, a separate profile server should be installed to reduce load and upgrade time. (including sec_boot.xml)

The TFTP server and the upgrade server are included in IPX-S300B by default.

If necessary, you can have separate servers for these functions

9.9.3 Gateway Settings

IPX-S300B provides the survivable telephony support service, whereby, when an IP phone is disconnected from IPX-S300B, the phone is connected to the gateway for minimum

PBX features. The survival feature really works by the gateway and the IP phone and not by IPX-S300B. Generally, it is usually used not when there is a problem with IPX-S300B but when the IP network between the IP phone and IPX-S300B experiences a trouble, especially when the phone and IPX-S300B are in different locations.

© SAMSUNG Electronics America page 111 of 161

ANNEX A. Supported Specifications and RFC

A.1 SIP

RFC on SIP protocol and related RFCs being supported in IPX-S300B is as follows.

RFC Description

RFC2246 The TLS Protocol Version 1.0

RFC2327 Session Description Protocol

RFC2833 RTP Payload for DTMF Digits, Telephony Tones and Telephony

RFC2976 The SIP INFO Method

RFC3261 Session Initiation Protocol

RFC3262 Reliability of Provisional Responses in SIP

RFC3263 SIP: Locating SIP Servers

RFC3264 An Offer/Answer Model with SDP

RFC3265 SIP-Specific Event Notification

RFC3311 The SIP UPDATE Method

RFC3323 A Privacy Mechanism for the SIP

RFC3325 Private Extensions to the SIP for Asserted Identity within Trusted Networks

RFC3326 The Reason Header Field for the SIP

RFC3428 SIP Extension for Instant Messaging

RFC3515 The SIP Refer Method

RFC3581 An Extension to the SIP for Symmetric Response Routing

RFC3665 SIP Basic Call Flow Examples

RFC3711 The Secure Real-time Transport Protocol (SRTP)

RFC3725 Best Current Practices for 3PCC in the SIP

RFC3824 Using E.164 numbers with the SIP

RFC3842 A Message Summary and Message Waiting Indication Event Package for the

Session Initiation Protocol (SIP)

RFC3891 The SIP Replaces Header

© SAMSUNG Electronics America page 112 of 161

RFC Description

RFC3960 Early Media and Ringing Tone Generation in the Session Initiation Protocol (SIP)

RFC4028 Session Timers in SIP

RFC4492 Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security

(TLS)

RFC5246 The Transport Layer Security (TLS) Protocol Version 1.2

RFC5359 Session Initiation Protocol Service Examples

© SAMSUNG Electronics America page 113 of 161

A.2 SNMP

Standards related to the SNMP protocol being supported in IPX-S300B are as follows.

SNMP v1, v2

© SAMSUNG Electronics America page 114 of 161

ANNEX B. CDR

Call Log Format

No. Parameter Description

Header

1 Sequence Number 00000000-99999999

The sequence number when recording in Call log File.

This increases by 1 when CDR is generated.

Reset when new log file is generated.

CDR creating point (Sending/Receiving)

Call Identifier

2

3

Number

4

5

6

7

DP Type

Call ID

Calling Number

Current Calling Number

Calling Name

Dialed Number

8

9

Connect Number

Connect Name

10 Billed Number

Usage (Time)

11 Attempt Time

Calling Only

The last number used to be connected to sending

The last name used to be connected to sending

The number input by user or received from incoming

(number before the number conversion)

The last number used to be connected to receiving

The last name used to be connected to sending

Bill Number (User’s accounting code)

Time when the call is attempted

12 Call Duration

13 Answer Time

14 Disconnect Time

Call Forwarding Information

15 Call Forwarding Flag

Call Duration Time (Disconnect Time-Answer Time)

Time when the call is connected

Call End Time

16 Call Forwarding Count

17 Original Called Number

Call Forwarding status

- 0: Call Forwarding not used

- 1: Call Forwarding used

Number of Call Forwarding Attempts

Initial Called Number

Calling Information in the IPX-S300B

18 Calling Type Caller Type

© SAMSUNG Electronics America page 115 of 161

No. Parameter Description

24

25

26

27

19

20

21

22

Calling IP

Calling SIP URI

Calling User Group

Incoming Route

Called Information in the IPX-S300B

- 0: Unknown

- 1: User

- 2: Service

- 3: Trunk (End Point Type)

- 4: Application Server Type

Calling IP Address

Calling SIP URI

User Group to which the caller belongs

Incoming Route Number

23 Called Type

Called IP

Called SIP URI

Called User Group

Outgoing Route

Disconnect Reason

28 SIP Status Code

Called Type

- 0: Unknown

- 1: User

- 2: Service

- 3: Trunk (End Point Type)

- 4: Application Server Type

Called IP Address

Called SIP URI

User Group the called belongs

Outgoing Route Number

29 Q850 Release Cause

30 Internal Fail Code

CDR Format

SIP Status Code

Q850 Release Cause

Internal Fail Code

No. Parameter

Header

1 Sequence Number

Description

00000000-99999999

The sequence number when recording in Call log File.

This increases by 1 when CDR is generated. Reset when new log file is generated.

CDR creating point (Sending/Receiving) 2 DP Type

Number

3

4

5

Calling Number

Current Calling Number

Calling Name

6 Dialed Number

Calling Only

The last number used to be connected to sending

The last name used to be connected to sending

The number input by user or received from incoming

(number before the number conversion)

© SAMSUNG Electronics America page 116 of 161

No. Parameter Description

7

8

Connect Number

Connect Name

9 Billed Number

Usage (Time)

10 Attempt Time

The last number used to be connected to receiving

The last name used to be connected to sending

Bill Number (User’s accounting code)

Time when the call is attempted

11 Call Duration

12 Answer Time

Call Duration Time (Disconnect Time-Answer Time)

Time when the call is connected

13 Disconnect Time Call End Time

Calling Information in the IPX-S300B

14 Calling Type Caller Type

- 0: Unknown

- 1: User

- 2: Service

- 3: Trunk (End Point Type)

- 4: Application Server Type

15 Calling IP

16 Calling User Group

Calling IP Address

User Group to which the caller belongs

17 Incoming Route

Called Information in the IPX-S300B

Incoming Route Number

18 Called Type Called Type

- 0: Unknown

- 1: User

- 2: Service

- 3: Trunk (End Point Type)

- 4: Application Server Type

19 Called IP

20 Called User Group

21 Outgoing Route

Called IP Address

User Group the called belongs

Outgoing Route Number

Disconnect Reason

22 SIP Status Code

23 Q850 Release Cause

24 Internal Fail Code

SIP Status Code

Q850 Release Cause

IPX-S300B Internal Fail Code

System Node Information (optional-only used in Active-Active Mode)

25 System Node ID

26

27

Inter-Node Data

GMT Offset

System Node ID

- 0: system node 0

- 1: system node 1

-

0: My Node’s Data

-

1: Peer Node’s Data

Peer Node’s Data can be ignored

GMT offset Time

© SAMSUNG Electronics America page 117 of 161

No. Parameter Description

Additional Information (optional)

Refer to [MANAGEMENT > CDR Storage Options > CDR Option > CDR Format].

28 Route Type Code of route type

- VOIP: FF00

- PSTN: 0000

29

30

31

32

Pilot Billed Number

Forward Type

Route Access Code

Calling Dev Type

Pilot Billed Number

Forward Call

- 0: Non Forward Call

- 1: Forward Call

Route(Trunk) Access Code

33 Called Dev Type

Calling device Type

0 = SAMSUNG_SIP

1 = SAMSUNG_SOFT

2 = SAMSUNG_MOBILE

3 = SAMSUNG_PC_ATTCON

4 = 3RD_SIP

5 = FXS

6 = FMS null = Call From route

Called device Type

0 = SAMSUNG_SIP

1 = SAMSUNG_SOFT

2 = SAMSUNG_MOBILE

3 = SAMSUNG_PC_ATTCON

4 = 3RD_SIP

5 = FXS

6 = FMS null = call to route

34

35

User Digit

Pick up

36

37

38

Smart Routing

Transferer

Service Type

Digit pressed by user

Pick up

- 0: Normal Call

- 1: Pickup Call

- 1:internal IPX-S300B Smart Routing Call

- 2:inter-IPX-S300B Smart Routing Call

User Number who transfers the call

39

40

Auth Code

Calling Reg Location

Service Type which is applied to the call

Refer to ‘IPX-S300B _CDR Interoperability Guide’.

Authorization code used for outgoing call

Calling Subscriber Register Location

- 1: Internal Wi-Fi

- 2: External Wi-Fi

- 3: mVoIP

© SAMSUNG Electronics America page 118 of 161

No. Parameter

41 Called Reg Location

42 Reserved field

43 Reserved field

44 Reserved field

45 Reserved field

46 Reserved field

47 Reserved field

48 Reserved field

49 Reserved field

50 Reserved field

Description

Called Subscriber Register Location

- 1: Internal Wi-Fi

- 2: External Wi-Fi

- 3: mVoIP

Reserved field for CDR expansion

Reserved field for CDR expansion

Reserved field for CDR expansion

Reserved field for CDR expansion

Reserved field for CDR expansion

Reserved field for CDR expansion

Reserved field for CDR expansion

Reserved field for CDR expansion

Reserved field for CDR expansion

© SAMSUNG Electronics America page 119 of 161

ANNEX C. Open Source

Announcement

Some software components of this product incorporate source code covered under the GNU General Public License (GPL), the GNU Lesser

General Public License (LGPL) and BSD License etc.

Acknowledgement:

This product includes software developed by the Apache Software Foundation ( http://www.apache.org/ ).

This product includes software developed by the OpenSymphony Group (http://www.opensymphony.com/).

This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. ( http://www.openssl.org/ )

This product includes cryptographic software written by Eric Young ([email protected])

The software included in this product contains copyrighted software that is licensed under the GPL/LGPL. You may obtain the complete

Corresponding Source code from us for a period of three years after our last shipment of this product by sending email to: [email protected]

This offer is valid to anyone in receipt of this information.

Below is the list of components covered under GNU General Public License, the GNU Lesser General Public License and BSD License etc.

Component

Free Marker

Apache Commons Codec

Apache Commons IO

Apache Commons Logging

Fluent API for Apache HttpClient

HttpClient

Apache HttpClient Cache

Apache HttpCore

Apache HttpClient Mime

Apache POI

Apache XMLBeans

DWR-Easy AJAX for Java

Apache Jakarta Taglibs

Apache Jakarta Commons BeanUtils

Apache Jakarta Commons Digester

Apache Commons FileUpload

Apache Log4j

Apache Struts

Tiles-API

Tiles-Core Library

Tiles-JSP support

Apache HTTP Server

Apache Tomcat

Apache

UW-IMAP 2007f

Postgresql JDBC Driver

Java Tutorial

CyoEncode libnet-dev

The libpcap project net-snmp libsrtp

NetBSD com.oreilly.servlet

DOM4J

BusyBox

License

Apache License 1.1

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

Apache License 2.0

BSD 3-clause "New" or "Revised" License

BSD 3-clause "New" or "Revised" License

BSD 3-clause "New" or "Revised" License

BSD 3-clause "New" or "Revised" License

BSD 3-clause "New" or "Revised" License

BSD 3-clause "New" or "Revised" License

BSD 3-clause "New" or "Revised" License

BSD 3-clause "New" or "Revised" License com.oreilly.servlet License dom4j License

GNU General Public License v2.0 only

© SAMSUNG Electronics America page 120 of 161

memtest

MemTest86 memtester

Linux Kernel

OpenJDK libgtop

IPwatchD

GNU C Library

Das U-boot

Ext2 Filesystems Utilities

Stress util-unix-ng watch-dog driver wolfsonmicro

A Java library for reading/writing Excel libspopc procps proctab stream libiberty

GNU Libiconv Library

Iozone

ISC DHCP jquery jquery ui ares ezXML

OGNL

X Work

OpenSSL pcre postgreSQL md5

JavaMail API

UW-IMAP 2002d

Tiny XML zlib

GNU General Public License v2.0 only

GNU General Public License v2.0 only

GNU General Public License v2.0 only

GNU General Public License v2.0 only

GNU General Public License v2.0 only

GNU General Public License v2.0 or later

GNU General Public License v2.0 or later

GNU General Public License v2.0 or later

GNU General Public License v2.0 or later

GNU General Public License v2.0 or later

GNU General Public License v2.0 or later

GNU General Public License v2.0 or later

GNU General Public License v2.0 or later

GNU General Public License v2.0 or later

GNU Lesser General Public License v2.1 or later

GNU Lesser General Public License v2.1 or later

GNU Library General Public License v2 or later

GNU Library General Public License v2 or later

GNU Library General Public License v2 or later

GNU Library General Public License v2 or later

Iozone License

ISC License

MIT License

MIT License

MIT License

MIT License

Open Symphony 1.1 License

Open Symphony 1.1 License

OpenSSL Combined License

PCRE 5 License

PostgreSQL License

RSA Data Security

Common Development and Distribution License

(CDDL) v1.1 and GNU General Public License

(GPL) v2 with Classpath Exeption

University of Washington's Free-Fork License zlib License zlib License

© SAMSUNG Electronics America page 121 of 161

Apache Software License

Version 1.1

Copyright (c) 2000 The Apache Software Foundation. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. The end-user documentation included with the redistribution, if any, must include the following acknowledgment:

"This product includes software developed by the Apache Software Foundation (http://www.apache.org/)."

Alternately, this acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments normally appear.

4. The names "Apache" and "Apache Software Foundation" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected].

5. Products derived from this software may not be called "Apache", nor may "Apache" appear in their name, without prior written permission of the Apache Software Foundation.

THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE

IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT

SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,

SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE

GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY

THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING

IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This software consists of voluntary contributions made by many individuals on behalf of the Apache Software Foundation. For more information on the Apache Software Foundation, please see <http://www.apache.org/>.

Portions of this software are based upon public domain software originally written at the National Center for Supercomputing Applications,

University of Illinois, Urbana-Champaign.

Apache License

Version 2.0, January 2004 http://www.apache.org/licenses/

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

1. Definitions.

"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.

"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.

"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.

"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.

"Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files.

"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.

© SAMSUNG Electronics America page 122 of 161

"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).

"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the

Work and Derivative Works thereof.

"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or

Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or

Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."

"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work.

2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.

3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a

Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.

4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:

You must give any other recipients of the Work or Derivative Works a copy of this License; and

You must cause any modified files to carry prominent notices stating that You changed the files; and

You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and

If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such thirdparty notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License.

You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.

5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such

Contributions.

6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.

7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A

PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.

8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the

© SAMSUNG Electronics America page 123 of 161

use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.

9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such

Contributor by reason of your accepting any such warranty or additional liability.

END OF TERMS AND CONDITIONS

APPENDIX: How to apply the Apache License to your work

To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format.

We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives.

Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES

OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

© SAMSUNG Electronics America page 124 of 161

BSD 3-clause "New" or "Revised" License

Copyright (c) <YEAR>, <OWNER>

All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

Neither the name of the <ORGANIZATION> nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED

WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A

PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR

ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,

PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)

HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING

NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE

POSSIBILITY OF SUCH DAMAGE.

© SAMSUNG Electronics America page 125 of 161

COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL)Version 1.1

1. Definitions.

1.1. “Contributor” means each individual or entity that creates or contributes to the creation of Modifications.

1.2. “Contributor Version” means the combination of the Original Software, prior Modifications used by a Contributor (if any), and the

Modifications made by that particular Contributor.

1.3. “Covered Software” means (a) the Original Software, or (b) Modifications, or (c) the combination of files containing Original Software with files containing Modifications, in each case including portions thereof.

1.4. “Executable” means the Covered Software in any form other than Source Code.

1.5. “Initial Developer” means the individual or entity that first makes Original Software available under this License.

1.6. “Larger Work” means a work which combines Covered Software or portions thereof with code not governed by the terms of this License.

1.7. “License” means this document.

1.8. “Licensable” means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein.

1.9. “Modifications” means the Source Code and Executable form of any of the following:

A. Any file that results from an addition to, deletion from or modification of the contents of a file containing Original Software or previous

Modifications;

B. Any new file that contains any part of the Original Software or previous Modification; or

C. Any new file that is contributed or otherwise made available under the terms of this License.

1.10. “Original Software” means the Source Code and Executable form of computer software code that is originally released under this

License.

1.11. “Patent Claims” means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor.

1.12. “Source Code” means (a) the common form of computer software code in which modifications are made and (b) associated documentation included in or with such code.

1.13. “You” (or “Your”) means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License. For legal entities, “You” includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition,

“control” means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.

2. License Grants.

2.1. The Initial Developer Grant.

Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, the Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license:

(a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer, to use, reproduce, modify, display, perform, sublicense and distribute the Original Software (or portions thereof), with or without Modifications, and/or as part of a Larger Work; and

(b) under Patent Claims infringed by the making, using or selling of Original Software, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Software (or portions thereof).

(c) The licenses granted in Sections 2.1(a) and (b) are effective on the date Initial Developer first distributes or otherwise makes the Original

Software available to a third party under the terms of this License.

(d) Notwithstanding Section 2.1(b) above, no patent license is granted: (1) for code that You delete from the Original Software, or (2) for infringements caused by: (i) the modification of the Original Software, or (ii) the combination of the Original Software with other software or devices.

2.2. Contributor Grant.

Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license:

(a) under intellectual property rights (other than patent or trademark) Licensable by Contributor to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof), either on an unmodified basis, with other

Modifications, as Covered Software and/or as part of a Larger Work; and

(b) under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone and/or in combination with its Contributor Version (or portions of such combination), to make, use, sell, offer for sale, have made, and/or otherwise dispose of: (1)

Modifications made by that Contributor (or portions thereof); and (2) the combination of Modifications made by that Contributor with its

Contributor Version (or portions of such combination).

© SAMSUNG Electronics America page 126 of 161

(c) The licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first distributes or otherwise makes the

Modifications available to a third party.

(d) Notwithstanding Section 2.2(b) above, no patent license is granted: (1) for any code that Contributor has deleted from the Contributor

Version; (2) for infringements caused by: (i) third party modifications of Contributor Version, or (ii) the combination of Modifications made by that Contributor with other software (except as part of the Contributor Version) or other devices; or (3) under Patent Claims infringed by

Covered Software in the absence of Modifications made by that Contributor.

3. Distribution Obligations.

3.1. Availability of Source Code.

Any Covered Software that You distribute or otherwise make available in Executable form must also be made available in Source Code form and that Source Code form must be distributed only under the terms of this License. You must include a copy of this License with every copy of the Source Code form of the Covered Software You distribute or otherwise make available. You must inform recipients of any such

Covered Software in Executable form as to how they can obtain such Covered Software in Source Code form in a reasonable manner on or through a medium customarily used for software exchange.

3.2. Modifications.

The Modifications that You create or to which You contribute are governed by the terms of this License. You represent that You believe Your

Modifications are Your original creation(s) and/or You have sufficient rights to grant the rights conveyed by this License.

3.3. Required Notices.

You must include a notice in each of Your Modifications that identifies You as the Contributor of the Modification. You may not remove or alter any copyright, patent or trademark notices contained within the Covered Software, or any notices of licensing or any descriptive text giving attribution to any Contributor or the Initial Developer.

3.4. Application of Additional Terms.

You may not offer or impose any terms on any Covered Software in Source Code form that alters or restricts the applicable version of this

License or the recipients' rights hereunder. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Software. However, you may do so only on Your own behalf, and not on behalf of the Initial

Developer or any Contributor. You must make it absolutely clear that any such warranty, support, indemnity or liability obligation is offered by

You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer.

3.5. Distribution of Executable Versions.

You may distribute the Executable form of the Covered Software under the terms of this License or under the terms of a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable form does not attempt to limit or alter the recipient's rights in the Source Code form from the rights set forth in this

License. If You distribute the Covered Software in Executable form under a different license, You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or Contributor. You hereby agree to indemnify the Initial

Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of any such terms You offer.

3.6. Larger Works.

You may create a Larger Work by combining Covered Software with other code not governed by the terms of this License and distribute the

Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Software.

4. Versions of the License.

4.1. New Versions.

Oracle is the initial license steward and may publish revised and/or new versions of this License from time to time. Each version will be given a distinguishing version number. Except as provided in Section 4.3, no one other than the license steward has the right to modify this License.

4.2. Effect of New Versions.

You may always continue to use, distribute or otherwise make the Covered Software available under the terms of the version of the License under which You originally received the Covered Software. If the Initial Developer includes a notice in the Original Software prohibiting it from being distributed or otherwise made available under any subsequent version of the License, You must distribute and make the Covered

Software available under the terms of the version of the License under which You originally received the Covered Software. Otherwise, You may also choose to use, distribute or otherwise make the Covered Software available under the terms of any subsequent version of the

License published by the license steward.

4.3. Modified Versions.

When You are an Initial Developer and You want to create a new license for Your Original Software, You may create and use a modified version of this License if You: (a) rename the license and remove any references to the name of the license steward (except to note that the license differs from this License); and (b) otherwise make it clear that the license contains terms which differ from this License.

© SAMSUNG Electronics America page 127 of 161

5. DISCLAIMER OF WARRANTY.

C

OVERED SOFTWARE IS PROVIDED UNDER THIS LICENSE ON AN “AS IS” BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER

EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, WARRANTIES THAT THE COVERED SOFTWARE IS FREE OF

DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE OR NON-INFRINGING. THE ENTIRE RISK AS TO THE QUALITY AND

PERFORMANCE OF THE COVERED SOFTWARE IS WITH YOU. SHOULD ANY COVERED SOFTWARE PROVE DEFECTIVE IN ANY

RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY

SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE.

NO USE OF ANY COVERED SOFTWARE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER.

6. TERMINATION.

6.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. Provisions which, by their nature, must remain in effect beyond the termination of this

License shall survive.

6.2. If You assert a patent infringement claim (excluding declaratory judgment actions) against Initial Developer or a Contributor (the Initial

Developer or Contributor against whom You assert such claim is referred to as “Participant”) alleging that the Participant Software (meaning the Contributor Version where the Participant is a Contributor or the Original Software where the Participant is the Initial Developer) directly or indirectly infringes any patent, then any and all rights granted directly or indirectly to You by such Participant, the Initial Developer (if the Initial

Developer is not the Participant) and all Contributors under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively and automatically at the expiration of such 60 day notice period, unless if within such 60 day period You withdraw

Your claim with respect to the Participant Software against such Participant either unilaterally or pursuant to a written agreement with

Participant.

6.3. If You assert a patent infringement claim against Participant alleging that the Participant Software directly or indirectly infringes any patent where such claim is resolved (such as by license or settlement) prior to the initiation of patent infringement litigation, then the reasonable value of the licenses granted by such Participant under Sections 2.1 or 2.2 shall be taken into account in determining the amount or value of any payment or license.

6.4. In the event of termination under Sections 6.1 or 6.2 above, all end user licenses that have been validly granted by You or any distributor hereunder prior to termination (excluding licenses granted to You by any distributor) shall survive termination.

7. LIMITATION OF LIABILITY.

UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR

OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED

SOFTWARE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL,

INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF

GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR

LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF

LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTY'S NEGLIGENCE

TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR

LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.

8. U.S. GOVERNMENT END USERS.

The Covered Software is a “commercial item,” as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of “commercial computer software” (as that term is defined at 48 C.F.R. § 252.227-7014(a)(1)) and “commercial computer software documentation” as such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S.

Government End Users acquire Covered Software with only those rights set forth herein. This U.S. Government Rights clause is in lieu of, and supersedes, any other FAR, DFAR, or other clause or provision that addresses Government rights in computer software under this

License.

9. MISCELLANEOUS.

This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by the law of the jurisdiction specified in a notice contained within the Original Software (except to the extent applicable law, if any, provides otherwise), excluding such jurisdiction's conflict-of-law provisions. Any litigation relating to this License shall be subject to the jurisdiction of the courts located in the jurisdiction and venue specified in a notice contained within the Original Software, with the losing party responsible for costs, including, without limitation, court costs and reasonable attorneys' fees and expenses. The application of the United Nations Convention on

Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall

© SAMSUNG Electronics America page 128 of 161

be construed against the drafter shall not apply to this License. You agree that You alone are responsible for compliance with the United

States export administration regulations (and the export control laws and regulation of any other countries) when You use, distribute or otherwise make available any Covered Software.

10. RESPONSIBILITY FOR CLAIMS.

As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability.

NOTICE PURSUANT TO SECTION 9 OF THE COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL)

The code released under the CDDL shall be governed by the laws of the State of California (excluding conflict-of-law provisions). Any litigation relating to this License shall be subject to the jurisdiction of the Federal Courts of the Northern District of California and the state courts of the State of California, with venue lying in Santa Clara County, California.

The GNU General Public License (GPL) Version 2, June 1991

Copyright (C) 1989, 1991 Free Software Foundation, Inc.

59 Temple Place, Suite 330, Boston, MA 02111-1307 USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General

Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.

To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.

For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have.

You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.

Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software.

If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.

Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.

The precise terms and conditions for copying, distribution and modification follow.

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term

"modification".) Each licensee is addressed as "you".

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the

Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program

(independent of having been made by running the Program). Whether that is true depends on what the Program does.

1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you

© SAMSUNG Electronics America page 129 of 161

conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.

You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty

(or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.

Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.

In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of

Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of

Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with

Subsection b above.)

The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.

4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.

7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and

© SAMSUNG Electronics America page 130 of 161

any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.

If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.

It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.

This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free

Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the

Free Software Foundation.

10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

NO WARRANTY

11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT

PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER

PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,

BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE

ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE

DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY

OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR

DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR

INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE

OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER

PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS

How to Apply These Terms to Your New Programs

If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.

To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found.

One line to give the program's name and a brief idea of what it does.

Copyright (C) <year> <name of author>

This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the

Free Software Foundation; either version 2 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of

MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation,

Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA

Also add information on how to contact you by electronic and paper mail.

If the program is interactive, make it output a short notice like this when it starts in an interactive mode:

© SAMSUNG Electronics America page 131 of 161

Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details.

The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program.

You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names:

Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James

Hacker. signature of Ty Coon, 1 April 1989

Ty Coon, President of Vice

This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library

General Public License instead of this License.

"CLASSPATH" EXCEPTION TO THE GPL VERSION 2

Certain source files distributed by Oracle are subject to the following clarification and special exception to the GPL Version 2, but only where

Oracle has expressly included in the particular source file's header the words "Oracle designates this particular file as subject to the

"Classpath" exception as provided by Oracle in the License file that accompanied this code."

Linking this library statically or dynamically with other modules is making a combined work based on this library. Thus, the terms and conditions of the GNU General Public License Version 2 cover the whole combination.

As a special exception, the copyright holders of this library give you permission to link this library with independent modules to produce an executable, regardless of the license terms of these independent modules, and to copy and distribute the resulting executable under terms of your choice, provided that you also meet, for each linked independent module, the terms and conditions of the license of that module. An independent module is a module which is not derived from or based on this library. If you modify this library, you may extend this exception to your version of the library, but you are not obligated to do so. If you do not wish to do so, delete this exception statement from your version.

cos License

Copyright (C) 2001-2002 by Jason Hunter, [email protected].

All rights reserved.

The source code, object code, and documentation in the com.oreilly.servlet package is copyright and owned by Jason Hunter.

USE RIGHTS

Permission is granted to use the com.oreilly.servlet.* packages in the development of any non-commercial project. For this use you are granted a non-exclusive, non-transferable limited license at no cost.

For a commercial project, permission is granted to use the com.oreilly.servlet.* packages provided that every person on the development team for that project owns a copy of the book Java Servlet Programming (O'Reilly) in its most recent edition. The most recent edition is currently the 2nd Edition, available in association with Amazon.com at http://www.amazon.com/exec/obidos/ASIN/0596000405/jasonhunter.

Other (sometimes cheaper) license terms are available upon request; please write to [email protected] for more information.

© SAMSUNG Electronics America page 132 of 161

REDISTRIBUTION RIGHTS

Commercial redistribution rights of the com.oreilly.servlet.* packages are available by writing [email protected].

Non-commercial redistribution is permitted provided that:

1. You redistribute the package in object code form only (as Java .class files or a .jar file containing the .class files) and only as part of a product that uses the classes as part of its primary functionality.

2. The product containing the package is non-commercial in nature.

3. The public interface to the classes in the package, and the public interface to any classes with similar functionality, is hidden from end users when engaged in normal use of the product.

4. The distribution is not part of a software development kit, operating system, other library, or a development tool without written permission from the copyright holder.

5. The distribution includes copyright notice as follows: "The source code, object code, and documentation in the com.oreilly.servlet package is copyright and owned by Jason Hunter." in the documentation and/or other materials provided with the distribution.

6. You reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.

7. Licensor retains title to and ownership of the Software and all enhancements, modifications, and updates to the Software.

Note that the com.oreilly.servlet package is provided "as is" and the author will not be liable for any damages suffered as a result of your use.

Furthermore, you understand the package comes without any guarantee of technical support.

You can always find the latest version of the com.oreilly.servlet package at http://www.servlets.com.

THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT

LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.

IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,

EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR

SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF

LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY

WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Thanks,

Jason Hunter

[email protected]

© SAMSUNG Electronics America page 133 of 161

dom4j License

Copyright 2001-2005 (C) MetaStuff, Ltd. All Rights Reserved.

Redistribution and use of this software and associated documentation ("Software"), with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain copyright statements and notices. Redistributions must also contain a copy of this document.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. The name "DOM4J" must not be used to endorse or promote products derived from this Software without prior written permission of MetaStuff, Ltd. For written permission, please contact [email protected].

4. Products derived from this Software may not be called "DOM4J" nor may "DOM4J" appear in their names without prior written permission of MetaStuff, Ltd. DOM4J is a registered trademark of MetaStuff, Ltd.

5. Due credit should be given to the DOM4J Project - http://www.dom4j.org

THIS SOFTWARE IS PROVIDED BY METASTUFF, LTD. AND CONTRIBUTORS "AS IS" AND ANY EXPRESSED OR IMPLIED

WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A

PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL METASTUFF, LTD. OR ITS CONTRIBUTORS BE LIABLE FOR ANY

DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,

PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)

HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING

NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE

POSSIBILITY OF SUCH DAMAGE.

© SAMSUNG Electronics America page 134 of 161

GNU GENERAL PUBLIC LICENSE

Version 2, June 1991

Copyright (C) 1989, 1991 Free Software Foundation, Inc.

51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General

Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.

To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

We protect your rights with two steps:

(1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software.

If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.

Finally, any free program is threatened constantly by software patents.

We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.

The precise terms and conditions for copying, distribution and modification follow.

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

0) This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The “Program”, below, refers to any such program or work, and a “work based on the

Program” means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term “modification”.) Each licensee is addressed as “you”.

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program

(independent of having been made by running the Program). Whether that is true depends on what the Program does.

1) You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

2) You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part

© SAMSUNG Electronics America page 135 of 161

thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)

These requirements apply to the modified work as a whole.

If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.

Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.

In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

3) You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of

Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of

Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)

The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.

4) You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

5) You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

6) Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.

7) If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.

If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the

Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.

If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.

© SAMSUNG Electronics America page 136 of 161

It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.

This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

8) If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

9) The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and

“any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the

Free Software Foundation.

If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software

Foundation.

10) If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

NO WARRANTY

11) BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT

PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR

OTHER PARTIES PROVIDE THE P

ROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,

INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR

PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE

PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

12) IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY

OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR

DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR

INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED

INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY

OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH

DAMAGES.

END OF TERMS AND CONDITIONS

How to Apply These Terms to Your New Programs

If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.

To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found.

<one line to give the program's name and a brief idea of what it does.>

Copyright (C) <year> <name of author>

This program is free software; you can redistribute it and/or modify it under the terms of the GNU General

Public License as published by the Free Software Foundation; either version 2 of the License, or(at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

© SAMSUNG Electronics America page 137 of 161

See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

Also add information on how to contact you by electronic and paper mail.

If the program is interactive, make it output a short notice like this when it starts in an interactive mode:

Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO

WARRANTY; for details type ‘show w’.

This is free software, and you are welcome to redistribute it under certain conditions; type ‘show c’ for details.

© SAMSUNG Electronics America page 138 of 161

GNU LESSER GENERAL PUBLIC

LICENSE

Version 2.1, February 1999

Copyright (C) 1991, 1999 Free Software Foundation, Inc.

51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

[This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.]

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public

Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.

This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free

Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below.

When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things.

To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights.

These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it.

For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code.

If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights.

We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library.

To protect each distributor, we want to make it very clear that there is no warranty for the free library.

Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others.

Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.

Most GNU software, including some libraries, is covered by the ordinary GNU General Public License.

This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General

Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs.

When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library.

We call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Public

License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.

For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the

Lesser General Public License.

In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.

Although the Lesser General Public License is Less protective of the users’ freedom, it does ensure that the user of a program that is linked

© SAMSUNG Electronics America page 139 of 161

with the Library has the freedom and the wherewithal to run that program using a modified version of the Library.

The precise terms and conditions for copying, distribution and modification follow. Pay cl ose attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

0) This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser Gen eral Public License (also called “this License”). Each licensee is addressed as “you”.

A “library” means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables.

The “Library”, below, refers to any such software library or work which has been distributed under these terms. A “work based on the

Library” means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term “modification”.)

“Source code” for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library.

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the

Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does.

1) You may copy and distribute verbatim copies of the Library’s complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library.

You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

2) You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.

But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

3) You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy.

This option is useful when you wish to copy part of the code of the Library into a program that is not a library.

4) You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the

© SAMSUNG Electronics America page 140 of 161

terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange.

If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.

5) A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.

However, linking a “work that uses the Library” with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a “work that uses the library”.

The executable is therefore covered by this License. Section 6 states terms for distribution of such executables.

When a “work that uses the Library” uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law.

If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions

(ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.)

Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself.

6) As an exception to the Sections above, you may also combine or link a “work that uses the Library” with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer’s own use and reverse engineering for debugging such modifications.

You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the

Library, with the complete machinereadable “work that uses the Library”, as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the required form of the “work that uses the Library” must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.

7) You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.

8) You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt

© SAMSUNG Electronics America page 141 of 161

otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this

License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

9) You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.

10) Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License.

11) If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.

It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

12) If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

13) The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and

“any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the

Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the

Free Software Foundation.

14) If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software

Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

NO WARRANTY

15) BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT

PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR

OTHER PARTIES PROVIDE THE LIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,

INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR

PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE

LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

16) IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY

OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR

DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR

INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE

OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER

SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS

© SAMSUNG Electronics America page 142 of 161

How to Apply These Terms to Your New Libraries

If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License).

To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found. one line to give the library’s name and an idea of what it does.

Copyright (C) year name of author

This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser

General Public License as published by the Free Software Foundation; either version 2.1 of the License, or

(at your option) any later version.

This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

See the GNU Lesser General Public License for more details.

You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.

Also add information on how to contact you by electronic and paper mail.

You should also get your employer (if you work as a programmer) or your school, if any, to sign a “copyright disclaimer” for the library, if necessary. Here is a sample; alter the names:

Yoyodyne, Inc., hereby disclaims all copyright interest in the library ‘Frob’ (a library for tweaking knobs) written by James Random Hacker.

Signature of Ty Coon, 1 April 1990 Ty Coon, President of Vice

That’s all there is to it!

GNU Library General Public License

Version 2, June 1991

Copyright (C) 1991 Free Software Foundation, Inc.

59 Temple Place, Suite 330, Boston, MA 02111-1307 USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

[This is the first released version of the Library GPL. It is numbered 2 because it goes with version 2 of the ordinary GPL.]

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public

Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.

This license, the Library General Public License, applies to some specially designated Free Software Foundation software, and to other libraries whose authors who decide to use it. You can use it for your libraries too.

© SAMSUNG Electronics America page 143 of 161

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.

To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library, or if you modify it.

For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link a program with the library, you must provide complete object files to the recipients so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights.

Our method of protecting your rights has two steps: (1) copyright the library, and (2) offer you this license, which gives you legal permission to copy, distribute and/or modify the library.

Also, for each distributor's protection, we want to make certain that everyone understands that there is no warranty for this free library. If the library is modified by someone else and passed on, we want its recipients to know that what they have is not the original version, so that any problems introduced by others will not reflect on the original authors' reputations.

Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that companies distributing free software will individually obtain patent licenses, thus in effect transforming the program into proprietary software. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.

Most GNU software, including some libraries, is covered by the ordinary GNU General Public License, which was designed for utility programs. This license, the GNU Library General Public License, applies to certain designated libraries. This license is quite different from the ordinary one; be sure to read it in full, and don't assume that anything in it is the same as in the ordinary license.

The reason we have a separate public license for some libraries is that they blur the distinction we usually make between modifying or adding to a program and simply using it. Linking a program with a library, without changing the library, is in some sense simply using the library, and is analogous to running a utility program or application program. However, in a textual and legal sense, the linked executable is a combined work, a derivative of the original library, and the ordinary General Public License treats it as such.

Because of this blurred distinction, using the ordinary General Public License for libraries did not effectively promote software sharing, because most developers did not use the libraries. We concluded that weaker conditions might promote sharing better.

However, unrestricted linking of non-free programs would deprive the users of those programs of all benefit from the free status of the libraries themselves. This Library General Public License is intended to permit developers of non-free programs to use free libraries, while preserving your freedom as a user of such programs to change the free libraries that are incorporated in them. (We have not seen how to achieve this as regards changes in header files, but we have achieved it as regards changes in the actual functions of the Library.) The hope is that this will lead to faster development of free libraries.

The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, while the latter only works together with the library.

Note that it is possible for a library to be covered by the ordinary General Public License rather than by this special one.

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

0. This License Agreement applies to any software library which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Library General Public License (also called "this License"). Each licensee is addressed as

"you".

A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables.

© SAMSUNG Electronics America page 144 of 161

The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".)

"Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library.

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the

Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does.

1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library.

You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful.

(For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application.

Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.)

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.

Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.

In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices.

© SAMSUNG Electronics America page 145 of 161

Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy.

This option is useful when you wish to copy part of the code of the Library into a program that is not a library.

4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange.

If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code.

5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.

However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables.

When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law.

If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.)

Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself.

6. As an exception to the Sections above, you may also compile or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.

You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this

License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. c) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. d) Verify that the user has already received a copy of these materials or that you have already sent this user a copy.

© SAMSUNG Electronics America page 146 of 161

For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.

7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.

8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License.

However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.

10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.

11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library.

If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.

It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.

This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

© SAMSUNG Electronics America page 147 of 161

13. The Free Software Foundation may publish revised and/or new versions of the Library General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free

Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free

Software Foundation.

14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

NO WARRANTY

15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT

PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER

PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT

NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE

RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU

ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY

OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR

DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR

INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR

LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE),

EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS

How to Apply These Terms to Your New Libraries

If you develop a new library, and you want it to be of the greatest possible use to the public, we recommend making it free software that everyone can redistribute and change. You can do so by permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public License).

To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. one line to give the library's name and an idea of what it does.

Copyright (C) year name of author

This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public

License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.

This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of

MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU

Library General Public License for more details.

You should have received a copy of the GNU Library General Public

License along with this library; if not, write to the Free Software

© SAMSUNG Electronics America page 148 of 161

Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA

Also add information on how to contact you by electronic and paper mail.

You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the library, if necessary. Here is a sample; alter the names:

Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs) written by James Random Hacker. signature of Ty Coon, 1 April 1990

Ty Coon, President of Vice

That's all there is to it!

IOzone License

Copyright 1991, 1992, 1994, 1998, 1999, 2002 William D. Norcott

© SAMSUNG Electronics America page 149 of 161

License to freely use and distribute this software is hereby granted by the author, subject to the condition that this copyright notice remains intact. The author retains the exclusive right to publish derivative works based on this work, including, but not limited to, revised versions of this work.

THIS SOFTWARE IS PROVIDED BY DON CAPPS AND THE IOZONE CREW "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,

INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR

PURPOSE ARE DISCLAIMED.

IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,

EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR

SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF

LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY

WAY OUT OF THE USE OF THIS SOFTWARE.

ISC License (ISCL)

Copyright (c) 4-digit year, Company or Person's Name

Permission to use, copy, modify, and/or distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE

INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR

ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS

OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT

OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

© SAMSUNG Electronics America page 150 of 161

The MIT License

Copyright (c) <year> <copyright holders>

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the

"Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED

TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT

SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN

ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE

OR OTHER DEALINGS IN THE SOFTWARE.

© SAMSUNG Electronics America page 151 of 161

The OpenSymphony Software License, Version 1.1

(this license is derived and fully compatible with the Apache Software License - see http://www.apache.org/LICENSE.txt)

Copyright (c) 2001-2004 The OpenSymphony Group. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. The end-user documentation included with the redistribution, if any, must include the following acknowledgment:

"This product includes software developed by the OpenSymphony Group (http://www.opensymphony.com/)." Alternately, this acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments normally appear.

4. The names "OpenSymphony" and "The OpenSymphony Group" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected] .

5. Products derived from this software may not be called "OpenSymphony" or "OSCache", nor may "OpenSymphony" or "OSCache" appear in their name, without prior written permission of the OpenSymphony Group.

6.

THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE

IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT

SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,

SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE

GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY

THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)

ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

LICENSE ISSUES

==============

The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact [email protected].

© SAMSUNG Electronics America page 152 of 161

OpenSSL License

---------------

====================================================================

Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgment:

"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"

4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected].

5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.

6. Redistributions of any form whatsoever must retain the following acknowledgment:

"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING,

BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE

DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,

INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF

SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND

ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR

OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH

DAMAGE.

====================================================================

This product includes cryptographic software written by Eric Young ([email protected]). This product includes software written by Tim

Hudson ([email protected]).

Original SSLeay License

-----------------------

Copyright (C) 1995-1998 Eric Young ([email protected])

All rights reserved.

This package is an SSL implementation written by Eric Young ([email protected]).

The implementation was written so as to conform with Netscapes SSL.

This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson ([email protected]). Copyright remains Eric

Young's, and as such any Copyright notices in the code are not to be removed.

If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used.

This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgement:

"This product includes cryptographic software written by Eric Young ([email protected])"

The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-).

4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson ([email protected])"

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT

LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.

IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,

EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR

SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF

LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY

© SAMSUNG Electronics America page 153 of 161

WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]

PCRE 5 LICENCE

------------

PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5 language.

Release 5 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the

"doc" directory, is distributed under the same terms as the software itself.

Written by: Philip Hazel {[email protected]}

University of Cambridge Computing Service,

Cambridge, England. Phone: +44 1223 334714.

Copyright (c) 1997-2004 University of Cambridge

All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

Neither the name of the University of Cambridge nor the names of its contributors may be used to endorse or promote products

 derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED

WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A

PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR

ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,

PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)

HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING

NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE

POSSIBILITY OF SUCH DAMAGE.

End

PostgreSQL Database Management System

(formerly known as Postgres, then as Postgres95)

Portions Copyright (c) 1996-2002, The PostgreSQL Global Development Group

Portions Copyright (c) 1994, The Regents of the University of California

© SAMSUNG Electronics America page 154 of 161

Permission to use, copy, modify, and distribute this software and its documentation for any purpose, without fee, and without a written agreement is hereby granted, provided that the above copyright notice and this paragraph and the following two paragraphs appear in all copies.

IN NO EVENT SHALL THE UNIVERSITY OF CALIFORNIA BE LIABLE TO ANY PARTY FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL,

OR CONSEQUENTIAL DAMAGES, INCLUDING LOST PROFITS, ARISING OUT OF THE USE OF THIS SOFTWARE AND ITS

DOCUMENTATION, EVEN IF THE UNIVERSITY OF CALIFORNIA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

THE UNIVERSITY OF CALIFORNIA SPECIFICALLY DISCLAIMS ANY WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED

WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS

ON AN "AS IS" BASIS, AND THE UNIVERSITY OF CALIFORNIA HAS NO OBLIGATIONS TO PROVIDE MAINTENANCE, SUPPORT,

UPDATES, ENHANCEMENTS, OR MODIFICATIONS

RSA Data Security

Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.

License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function.

License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc.

MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work.

RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind.

These notices must be retained in any copies of any part of this documentation and/or software.

© SAMSUNG Electronics America page 155 of 161

University of Washington's Free-Fork License

University of Washington IMAP toolkit

Version 2003 of IMAP toolkit

Copyright 1988-2003 University of Washington

This University of Washington Distribution (code and documentation) is made available to the open source community as a public service by the University of Washington. Contact the University of Washington at [email protected] for information on other licensing arrangements (e.g. for use in proprietary applications).

Under this license, this Distribution may be modified and the original version and modified versions may be copied, distributed, publicly displayed and performed provided that the following conditions are met:

(1) modified versions are distributed with source code and documentation and with permission for others to use any code and documentation

(whether in original or modified versions) as granted under this license;

(2) if modified, the source code, documentation, and user run-time elements should be clearly labeled by placing an identifier of origin (such as a name, initial, or other tag) after the version number;

(3) users, modifiers, distributors, and others coming into possession or using the Distribution in original or modified form accept the entire risk as to the possession, use, and performance of the Distribution;

(4) this copyright management information (software identifier and version number, copyright notice and license) shall be retained in all versions of the Distribution;

(5) the University of Washington may make modifications to the Distribution that are substantially similar to modified versions of the

Distribution, and may make, use, sell, copy, distribute, publicly display, and perform such modifications, including making such modifications available under this or other licenses, without obligation or restriction;

(6) modifications incorporating code, libraries, and/or documentation subject to any other open source license may be made, and the resulting work may be distributed under the terms of such open source license if required by that open source license, but doing so will not affect this

Distribution, other modifications made under this license or modifications made under other University of Washington licensing arrangements;

(7) no permission is granted to distribute, publicly display, or publicly perform modifications to the Distribution made using proprietary materials that cannot be released in source format under conditions of this license;

(8) the name of the University of Washington may not be used in advertising or publicity pertaining to Distribution of the software without specific, prior written permission.

This software is made available "as is", and

THE UNIVERSITY OF WASHINGTON DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, WITH REGARD TO THIS SOFTWARE,

© SAMSUNG Electronics America page 156 of 161

INCLUDING WITHOUT LIMITATION ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR

PURPOSE, AND IN NO EVENT SHALL THE UNIVERSITY OF WASHINGTON BE LIABLE FOR ANY SPECIAL, INDIRECT OR

CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER

IN AN ACTION OF CONTRACT, TORT (INCLUDING NEGLIGENCE) OR STRICT LIABILITY, ARISING OUT OF OR IN CONNECTION

WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

The zlib/libpng License

Copyright (c) <year> <copyright holders>

This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.

Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:

1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.

2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.

3. This notice may not be removed or altered from any source distribution.

© SAMSUNG Electronics America page 157 of 161

ABBREVIATION

A

AA

AAR

ACD

ACL

AME

APC

AR

Auto Attendant

Automatic Alternative Routing

Automatic Call Distribution

Access Control List

Answering Machine Emulation

Access Point Controller

Alternative Route

B

BHCA

BLF

Busy Hour Call Attempt

Busy Lamp Field

C

CAC

CDR

CID

CLI

CLIR

COA

COS

CPS

CSTA

CTI

Call Admission Control

Call Detailed Record

Caller Information Data

Calling Line Identification

Calling Line Identification Restriction

Change of Address

Class of Service

Call Per Second

Computer Supported Telephony Application

Computer Telephony Interface

D

DID

DISA

DN

DND

DOD

DR

DTMF

DTS

Direct Inward Dial

Direct Inward System Access

Directory Number

Do Not Disturb

Direct Outward Dial

Direct Route

Dual Tone Multi-Frequency

Direct Trunk Select

© SAMSUNG Electronics America page 158 of 161

F

FMS

FTP

FXO

FXS

G

GW

H

HTTP

HTTP

I

iBG

ICMP iES

IGMP

ITSP

IVR

L

M

LDAP

MCN

MCS

MOBEX

MOH

MP

MPEG

MPS

MWI

N

NAT

NFC

NMS

NTP

© SAMSUNG Electronics America

Fixed Mobile Substitution

File Transfer Protocol

Foreign Exchange Official

Foreign Exchange Station

Gateway

Hyper Text Transport Protocol

Hyper Text Transport Protocol over Secure Sockets Layer integrated Business Gateway

Internet control message protocol integrated Ethernet Switch

Internet Group Management Protocol

Internet Telephony Service Provider

Interactive Voice Response

Lightweight Directory Access Protocol

Modification Calling & Called Number

Multimedia Conference System

Mobile Extension

Music On Hold

Main Processor

Moving Picture Experts Group

Media Proxy Service

Message Waiting Indication

Network Address Translation

Near Field Communication

Network Management System

Network Time Protocol

page 159 of 161

P

PBX

PMS

PNP

PSTN

R

RADIUS

RFC

RST

RTP

S

T

TCP

TFTP

TLS

U

UC

UMS

UPnP

V

W

VM

VMS

VoIP

WE

WiFi

SBC

SCM

SIO

SIP

SMDR

SMS

SNMP

SNTP

SRTP

© SAMSUNG Electronics America

Private Branch eXchange

Property Management System

Plug and Play

Public Switched Telephone Network

Remote Authentication Dial In User Service

Request For Comments

Reset

Real Time Protocol

Single Board Computer

Samsung Communication Manager

Serial Input and Output

Session Initiation Protocol

Station message detailed record

Short Message Service

Simple Network Management Protocol

Simple Network Time Protocol

Secure Real-time Transport Protocol

Transmission Control Protocol

Trivial File Transfer Protocol

Transport Layer Security

Unified Communication

Unified Messaging System

Universal Plug and Play

Voice Mail

Voice Mailing System

Voice over Internet Protocol

Wireless Enterprise

Wireless Fidelity

page 160 of 161

© SAMSUNG Electronics America

SCM Compact (IPX-S300B)

System Description

©2015~2017 Samsung Electronics America.

All rights reserved.

Information in this manual is proprietary to SAMSUNG

Electronics America.

No information contained here may be copied, translated, transcribed or duplicated by any form without the prior written consent of SAMSUNG.

Information in this manual is subject to change without notice.

page 161 of 161

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals