Conferencing between clusters

need some haelp have 2 cucm clusters a 6.1.5 and a 9.1.1 have 40 sites on new cluster 100 on old cluster they all work fine for dn pstn etc.
we have ict trunks in between as part of the migration to new cluster if we conference on either cluster that is phones on new or old cluster that all works fine but when we conference between clusters it dosent work dial plan si sine as far as we can see just wondering if anyone knows how cross cluter conferencing works i have involved tac and they said on the ict enable mtp which i did and reset the trunks still dosent work.....
Any ideas ???????????
MRGL and MRG are sufficent on each cluster

Yes, it does work, it comes down really to MRG/MRGL on all devices that require it.
No special config, it will work the same as if this was a PSTN call. Same logic applies.
HTH
java
if this helps, please rate
www.cisco.com/go/pdihelpdesk

Similar Messages

  • Replication between clusters

    I've seen the code examples for replication between clusters, while in my view, that's really should be a feature provided by coherence. Customers always feel amazing that have to be done by coding:( . Does coherence have any plan to provide that feature?
    thanks,
    michael

    Have a look at the new incubator area: http://coherence.oracle.com/display/INCUBATOR/Home
    Regards, Paul

  • Video conferencing between CCM and CCME

    Hi,
    We are having CCM4.1(3)at central location.In branch location we are having CCME 4.0(2).Both the locations are connected through leased circuit. We enabled Video on IP Phone which is registered to CCM and also we configured CCME for video. When we start doing video conferencing between these two location, it's not happenning. In VT advantage it is showing local image on Local & Remote screen. I don't know what is the problem.
    Can you guys please tell me wheather Video Conferencing will work between CCM & CCME over the leased circuit using VT Advantage.
    If it works, please tell me what are configuration parameters i need to configure on CCM & CCME.
    Thanks & Regards

    By default all IP traffic is permitted through a VPN tunnel except broadcast and multicast traffic. It basically is a matter of how the video software you are using works. If it is a multicast application then it will not work through an ipsec tunnel, if it is a unicast application then it should be able to work.
    Also if this video is on the Internet tries to enable split tunnel on the VPN endpoint. Now if the issue is with a video that is on the PC, this might be because a software corruption of the OS, so try reinstalling the VPN Client software

  • Difference between Clustering and Load balancing

              What is the difference between Clustering and Load balancing?
              For example, We use Cisco Arrowpoint to do load balancing and it works fine for 3
              Sun solaris boxes/WebLogic 6.1 SP1.
              So what is the value addition to buy clustering license?
              Thanks
              Selvaraj
              

    Hi.
              Among other things, clustering allows you to share app data (such as http session
              data) across cluster members, allowing you to failover should one cluster member
              crash.
              If your app is stateless then this doesn't mean much - load balancing alone would
              probably be ok for you.
              Regards,
              Michael
              Selvaraji wrote:
              > What is the difference between Clustering and Load balancing?
              >
              > For example, We use Cisco Arrowpoint to do load balancing and it works fine for 3
              > Sun solaris boxes/WebLogic 6.1 SP1.
              >
              > So what is the value addition to buy clustering license?
              >
              > Thanks
              >
              > Selvaraj
              Michael Young
              Developer Relations Engineer
              BEA Support
              

  • What are differences between clustering and partitioning?

    Thank you for reading my post
    Can some one let me know what is different between clustering and partitioning?
    What i think is as follow:
    In clustering we have one storage (one hard disk for example) and several instances which use that storage to server the applications
    in partitioning, we have multiple instances and each of them has its own storage (hard disk) but all of these instances and hard disks serve one application.

    The word "cluster" has different meanings in Oracle.
    Another kind of cluster is a database object where
    master and detail rows are stored together in the
    same block. Table joins are very efficient, but
    reading data from one table and not another tends to
    take longer. These kinds of clusters are vary rarely
    used.Do not forget single table sorted hash cluster!

  • Wat is the exact differences between clustered table and pooled table

    hi,
       can you tell me ravi...wat is the exact differences between clustered table and pooled table
    with regards//
    anilreddyg

    Hi Anil Reddy
    Pooled Tables, Table Pools, Cluster Tables, and Table Clusters
    These types of tables are not transparent in the sense that they are not legible or manageable directly using the underlying database system tools. They are managed from within the R/3 environment from the ABAP dictionary and also at runtime when they are loaded into application memory.Pool and cluster tables are logical tables. Physically, these logical tables are arranged as records of transparent tables. The pool and cluster tables are grouped together in other tables, which are of the transparent type. The tables that group together pool tables are known as table pools, or just pools; similarly, table clusters, or just
    clusters, are the tables which group cluster tables.Not all operations that can be performed over transparent tables can be executed over pool or cluster tables.
    For instance, you can manage these tables using Open SQL calls from ABAP, but not Native SQL.These tables are meant to be buffered and loaded in memory, because they are commonly used for storing internal control information and other types of data with no external (business) relevance. SAP recommends that tables of pool or cluster type be used exclusively for control information such as
    program parameters, documentation, and so on. Transaction and application data should be stored in transparent tables.
    Table Pools
    From the point of view of the underlying DBMS as from the point of view of the ABAP dictionary, a table pool is a transparent table containing a group of pooled tables which, when created, were assigned to this table pool.
    Field Type Description
    TABNAME CHAR(10) Table name
    VARKEY CHAR(n) Maximum key length n =< 110
    DATALN INT2(5) Length of the VARDATA record returned
    VARDATA RAW(m) Maximum length of the data varies according to DBMS
    Table Clusters
    Similarly to pooled tables, cluster tables are logical tables which, when created, are assigned to a table cluster. Therefore, a table cluster, or just cluster, groups together several tables of type clusters.Several logical rows from different cluster tables are brought together in a single physical record. The records
    from the cluster tables assigned to a cluster are thus stored in a single common table in the database.A cluster contains a transparent cluster key which must be located at the start of the key of all logical cluster tables to be included in the cluster. As well, a cluster contains a long field (VARDATA), which contains the
    data of the cluster tables for this key. If the data does not fit into a field, continuation records are created.
    Field Type Description
    CLKEY1 CHAR(*) First key fields
    CLKEY2 CHAR(*) Second key field
    CLKEYN CHAR(*) nth key field
    PAGENO INT2(5) Number of the next page
    TIMESTMP CHAR(14) Time stamp
    PAGELG INT2(5) Length of the VARDATA record returned
    VARDATA RAW(*) Maximum length of the data section; varies according to database system
    Working with Tables
    The dictionary includes many functions for working with tables. There are five basic operations you can perform on tables: display, create, delete, modify, copy. Please do not confuse displaying a table with displaying the table entries (table contents). In order to display a table, it must previously exist; otherwise the system will display an error message in the status bar. For the following example, the table TABNA is used. To display this table, from the main dictionary screen, enter the table name in the Object name
    input field with the radio button selected next to Tables. Then, click on the Display button at the bottom of the screen, or press the F7 function key, or, alternatively,
    select Dictionary object Display from the menu.
    In this screen, you can see table information such as
    ¨ Table type, shown next to the name of the object. In the example, it is a transparent table.
    ¨ Short text description.
    ¨ Name of the user who made the last change, and the date of the change.
    ¨ Master language.
    ¨ Table status. On the screen, you can see this table is saved and active.
    ¨ Development class. For information on development classes, refer to Chap. 6.
    Delivery class, which sets the maintenance group for the table. It controls how tables will behave during client copy procedures, upgrades, and so forth.¨
    Tab. Maint. Allowed flag, which indicates whether you can generate a screen for maintaining table entries.
    ¨Then, on the lower part of the screen, you can see the table fields with all associated characteristics such as:
    ¨ Field name.
    ¨ Key indicator. When set, this field is the primary key, or part of it.
    ¨ Data element.
    ¨ Basic data type.
    ¨ Length.
    ¨ Check table.
    ¨ Short text, describing the field.
    Additional information about the table can be displayed by selecting the corresponding functions from the menu or directly from the application toolbar, such as keys, indexes, or technical settings
    Standard table:
    The key access to a standard table uses a sequential search. The time required for an access is linearly dependent on the number of entries in the internal table.
    You should usually access a standard table with index operations.
    Sorted table:
    The table is always stored internally sorted by its key. Key access to a sorted table can therefore use a binary search. If the key is not unique, the entry with the lowest index is accessed. The time required for an access is logarithmically dependent on the number of entries in the internal table.
    Index accesses to sorted tables are also allowed. You should usually access a sorted table using its key.
    Hash table:
    The table is internally managed with a hash procedure. All the entries must have a unique key. The time required for a key access is constant, that is it does not depend on the number of entries in the internal table.
    You cannot access a hash table with an index. Accesses must use generic key operations (SORT, LOOP, etc.).
    Index table:
    The table can be a standard table or a sorted table.
    Index access is allowed to such an index table. Index tables can be used to define the type of generic parameters of a FORM (subroutine) or a function module.
    Just have a look at these links:
    http://help.sap.com/saphelp_nw04/helpdata/en/90/8d7304b1af11d194f600a0c929b3c3/frameset.htm
    http://help.sap.com/saphelp_nw04/helpdata/en/74/83015785d811d295a800a0c929b3c3/frameset.htm
    Regards
    Sreeni

  • Data affinity between clusters separated via WAN

    Hi,
    I need your help, again! :)
    In the scenario where I have two clusters separated via WAN, I want to know if it is possible to create data affinity to each cluster.
    That is, this scenario is not the same as Push Replication Pattern solve, because I want to avoid the data management conflict between the updates on the both clusters. If I create data affinity to each cluster, the Cluster A is responsible for data objects X and Y (and the same data object in the other cluster is considered as secondary/backup) and Cluster B is responsible for data objects W and Z (also has a backup on Cluster A).
    Thanks.
    Regards,
    André

    Hi ggleyzer,
    Thanks for the help.
    But, how can I routing different keys to different caches, if I want to have two clusters with the same information and caches due to possible disaster recover scenario?
    The scenario that I imagine is almost the same as Push Replication Pattern - Active-Active. (http://coherence.oracle.com/display/INCUBATOR/Auction+Site+Demo+1.0.0)
    I want to have 2 Clusters (e.g. "A" and "B") and have exactly the same information in each one. However, I want to create affinity of objects to each Cluster, for example, the objects X and Y are processed by "ClusterA" (even the request arrive to "ClusterB") but still have of copy of them in "ClusterB" (X' and Y', just for the case of disaster). So: can I specify the namedCache of "ClusterA" to objects X and Y (having a copy of that objects on "ClusterB") and assure that all processing of this type of objects are done by "ClusterA"?
    If it's possible, do you think that approach is more suitable than Push Replication Pattern? A problem that occurs with this pattern is the Conflit Resolver. However, I don't know which problems I will face with the other. Maybe the main disadvantage is the information crossed over the WAN, because "ClusterB" can send processing to objects that has affinity to "ClusterA".
    Thanks,
    Regards,
    André

  • Callback feature between clusters

    Hello,
    Could you please help me to make the callback feature available between two clusters using Inter-cluster trunk ?
    Thanks in advance.
    Abdelatif.

    if you have your ICT configured and operating properly, then the callBack feature only needs a few things in place to operate:
    1) css/partition of the ICT must have access on both sides to the phones/DNs that you wish to have callBack feature working for.
    2) each cluster must have the dial plan updated for all phones on each side of the ICT that wish to be able to communicate across the ICT.
    example:
    cluster1/phone1/DN=8855
    - needs a route pattern on cluster2 using the ICT as its gateway
    (ie: cluster2/routePattern=8855; gateway=ICT)
    cluster2/phone1/DN=7855
    - needs a route pattern on cluster1 using the ICT as its gateway
    (ie: cluster1/routePattern=7855; gateway=ICT)
    the cluster1 ICT needs css/partition access to the cluster2/phone1/DN=7855
    the cluster2 ICT needs css/partition access to the cluster1/phone1/DN=8855

  • Communication between Clusters Problem

    Hi all
              1. Is it possible for a bean, being hosted in a cluster to call a bean which is hosted in another cluster?
              We have a problem with the role information, which gets wrong at every second call.
              We have the following setup:
              - A cluster called "web-cluster" consists of two machines with one weblogic 9.2 server per machine.
              - We have another cluster called "ID-Cluster" with the same setup (2 Machines, 2 WLS).
              - In the "Web-Cluster" we have a bean deployed called "SecurityProxy".
              - In the "Web-Cluster" we have a Web-Application ("WebApp") deployed which use the "SecurityProxy"
              - In the ID-Cluster we have a Bean called "SecurityBean". - The SecurityProxy makes a login to the ID-Cluster with a technical user, role "techSecurityProxy".
              - Calls from SecurityProxy to SecurityBean alternate with each call.
              Problem:
              User logs in to the "WebApp" and gets role "customer" associated.
              First call from SecurityProxy to SecurityBean: call is done with the correct role "techSecurityProxy" second call is done with the role "customer" !?! It seams as if the security context gets propageted...
              We have no trust defined between the clusters and we have no runas configured in den deployment descriptors. Can anyone help?

    <p>Frank, the security context is propagted between the JVM's. I have asked BEA support to specify if this can be configured or turned off to resolve another issue I have but to date I have not had a response.</p>
              <p>In your case can you not add the new principle like -useProxy to authenticated users which allows them to use the proxy once they are authenticated?</p>
              <p>
              Hussein Badakhchani
              London Middleware
              </p>

  • Shared Corporate directory between clusters

    Hello All,
    Is it possible to share a single corporate directory between two clusters, without using a 3rd party software or external server ?
    Cluster A is 8.0(3) and Cluster B is 8.6(2). I have a working intercluster trunk at this time, all 1xxx DN are on cluster B and all the 2-9xxx are on cluster A.

    Hello!
    There is no way to configure shared directory without using 3rd party software (AD as example).
    You can try to configure to use corporate directory from one cluster from another.
    Regards,
    Kirill

  • Migrate VM between clusters added to the same SCVMM

    Is it possible to migrate VMs between two Cluster ( from 2012 SP1 cluster to 2012R2 cluster) that added
    to the same SCVMM?

    Yes this is possible. Make sure that the networks selected for live migration is available on both clusters, and that the name of the logical switch in both environments are identical.
    The key here is that VMM must be managing both environments.
    -kn
    Kristian (Virtualization and some coffee: http://kristiannese.blogspot.com )

  • Is there a difference in behaviour between clustered systems vs. standalone

    OpenVMS, MessageQ (could not find another place to ask :().
    Suppose 2 nodes, same DMQ bus.
    Node 1: Application X starts up, binds to group Y (not yet existing and so creates connection)
    Node 2: Application X starts up, binds to group Y.
    If node1 and node2 are in one VMS cluster, Node2::X would now be unable to do anyting since group Y is now owned by Node1::X and so node2::X will get into a wait state, to become active only if, for whatever reason, Node1::X gives up.
    But what happens if node1 and node2 are stand-alone systems, only connected using a DECNet (or TCPIP) connetcion:
    1: Node2::X waits until Node1::X stops and group Y is released (as if the systems were clustered)
    2: Node2::X will startup and access group Y so does not enter a wait state. If so, can this be forced to a wait (like (1))?
    (You may assume that the DMQ configuration is correct)

    Most people either use one app or the other, and have very limited knowledge of the one they don't use.  But from what I can find from a quick look round the web, they seem to be the same.
    Review: Photoshop Elements 13 gets Photomerge and content-aware fill | Macworld

  • Firewall configuration between clusters

              We are planning our web infrastructure as follows:
              internet ----> firewall(1)+HD loadbalancer -----> Weblogic
              cluster (servlet/JSP) ----> firewall (2) ----> Weblogic
              cluster (EJBs)
              The reason we want to put a firewall between servlet clsuter
              and EJB cluster is that anything goes wrong in the front
              presentation cluster, our mission critical business cluster
              is not to be touched.
              Now, what are the requirement for the configuration of firewall
              2. I have the following question in mind:
              1:) I seem to remember reading on the document that we must
              bind the DNS name to the naming lookup directory, TRUE?
              2:) As this is a pure JAVA environment, I assume the communiation
              between servlet and EJBs will occcur through RMI. Does
              Weblogic use a specific port to listen to RMI request on
              server side (EJB cluster)? If so, how do I find out what
              it is?
              3:) Is it sufficient enough to just allow the above mentioned
              port open in my firewall 2 to enable the Serlvet/EJB
              connection?
              What if I have multiple Servlets talking to multiple EJBs
              at the same time? Do all these communication go through
              the same port?
              Thanks
              

    Danny,
              > 1:) I seem to remember reading on the document that we must
              > bind the DNS name to the naming lookup directory, TRUE?
              In the document it spends 90% of the time talking about DNS. Needless to
              say, you typically don't have to make any DNS settings at all.
              > 2:) As this is a pure JAVA environment, I assume the communiation
              > between servlet and EJBs will occcur through RMI. Does
              > Weblogic use a specific port to listen to RMI request on
              > server side (EJB cluster)? If so, how do I find out what
              > it is?
              If I understand correctly, Weblogic often uses RMI over T3 (their own RMI
              implemetation). That would use 7001 by default.
              > 3:) Is it sufficient enough to just allow the above mentioned
              > port open in my firewall 2 to enable the Serlvet/EJB
              > connection?
              Yes.
              Just remember, if your servlets can get through the firewall to your ejb
              servers, then so can anything else that gets there.
              Cameron Purdy
              Tangosol, Inc.
              http://www.tangosol.com
              +1.617.623.5782
              WebLogic Consulting Available
              "Danny" <[email protected]> wrote in message
              news:[email protected]...
              >
              > We are planning our web infrastructure as follows:
              >
              > internet ----> firewall(1)+HD loadbalancer -----> Weblogic
              > cluster (servlet/JSP) ----> firewall (2) ----> Weblogic
              > cluster (EJBs)
              >
              > The reason we want to put a firewall between servlet clsuter
              > and EJB cluster is that anything goes wrong in the front
              > presentation cluster, our mission critical business cluster
              > is not to be touched.
              >
              > Now, what are the requirement for the configuration of firewall
              > 2. I have the following question in mind:
              >
              > 1:) I seem to remember reading on the document that we must
              > bind the DNS name to the naming lookup directory, TRUE?
              >
              > 2:) As this is a pure JAVA environment, I assume the communiation
              > between servlet and EJBs will occcur through RMI. Does
              > Weblogic use a specific port to listen to RMI request on
              > server side (EJB cluster)? If so, how do I find out what
              > it is?
              >
              > 3:) Is it sufficient enough to just allow the above mentioned
              > port open in my firewall 2 to enable the Serlvet/EJB
              > connection?
              >
              > What if I have multiple Servlets talking to multiple EJBs
              > at the same time? Do all these communication go through
              > the same port?
              >
              > Thanks
              

  • Forwarding voicemails between clusters

    We have 2 separate clusters. We need to forward voice mails to users on the other cluster. Is there a way to do this, besides unified messaging and forward via emails? Thanks.

    There's no way to forward a users personal voice mail.
    The solution you mentioned works - creating a work group for each agent and using over flow. Why don't you do that for the all the agents? That could get out of had if yo had a lot of agents.
    The best solution, if possible, is not to use personal voice mail but to use group voice mail. If it really is a situation where another person could handle the voice mail.
    Another solution would be to train agents to update their voice mail message before they leave to let callers know they are gone.

  • Video conferencing between iChat 4.0.2. and AIM Pro (on PC)

    My girlfriend lives in Iowa and just bought a brand new Dell with Windows Vista. She has AIM Pro and I'm wondering if it is possible to video chat with her, using my new macbook and her new Dell. I've read many posts about this and there doesn't seem to be a clear answer. We haven't tried it yet because I don't want to have her buy a camera and then have it not work. Any help would be greatly appreciated.

    Same attempt here, last night.
    I had not messed with iChat or with chatting in general to begin with.
    My MBP/iChat >>> Windows Visa machine/AIM (NOT the Pro version I assume). Seems that we were soon enough able to IM between the two machines, but video/no audio took a while longer: and even then rather uncertain. We briefly got video between the two machines ONCE (I have no idea if we did something different though), and the rest of the time had "buddy authentification" issues. Seems that the two machines were acknowledging one another easily enough in the meantine.
    i have checked around about iChat and learn somewhere that file sharing should be suspended while doing video/audio chatting.
    But, in the end, what caught my attention is the following link:
    http://robrohan.com/2007/11/30/trying-to-video-chat-between-mac-and-windows/
    Seems explanatory enough. I have and use skype. I'll hae to have by Windows/Vista buddy install it and then we;ll try again!
    Roger T

Maybe you are looking for