A key system was originally distinguished from a private branch exchange (PBX) in that it allowed the station user to see and control the calls directly, manually, using lighted line buttons, while a private branch exchange operated in a manner similar to the public telephone system, in that the calls were routed to the correct destination by being dialed directly. Technologically, private branch exchanges share lineage with central office telephone systems, and in larger or more complex systems, may rival a central office in capacity and features.
Key systems are primarily defined by their individual line selection buttons for each connected phone line, a feature shared with hybrid systems. New installations of true "key" systems have become less common, as hybrid systems and private branch exchanges of comparable size now have similar costs and greater functionality.
Key systems can be built using three principal architectures: electromechanical shared-control, electronic shared-control, or independent keysets.
The systems marketed in North America as the 1A, 6A, 1A1 and the 1A2 Key System were typical and sold for many decades. The 1A family of Western Electric Company (WECo) key telephone units (KTUs) were in use in the 1950s. 1A equipment was primitive and required at least two KTUs per line; one for line termination and one for station (telephone instrument) termination. The telephone instrument commonly used by 1A systems was the WECo 300-series telephone. In the 1960s, 1A1 key systems simplified wiring with a single KTU for both line and station termination, and increased the features available. As the 1A1 systems became commonplace, requirements for intercom features increased. The original intercom KTUs, WECo Model 207, were wired for a single talk link, that is, a single conversation on the intercom at a time. The WECo 6A dial intercom system provided two talk links and was often installed as the dial intercom in a 1A1 or 1A2 key system. Unfortunately, the 6A systems were complex, troublesome and expensive, and never became popular. The advent of 1A2 technology in the 1970s simplified key system set up and maintenance. These continued to be used throughout the 1980s, when the arrival of electronic key systems with their easier installation and greater features signaled the end of electromechanical key systems.
Two obscure key systems were used at airports for air traffic control communications, the 102 and 302 key systems. These were uniquely designed for communications between the air traffic control tower and radar approach control (RAPCON) or ground control approach (GCA), and included radio line connections.
Automatic Electric Company also sold a family of key telephone equipment, but it never gained the widespread use enjoyed by Western Electric equipment.
Additionally, these more modern systems allowed a vast set of features including:
Features could be added or modified simply using software, allowing easy customization of these systems. The stations were easier to maintain than the previous electromechanical key systems, as they used efficient LEDs instead of incandescent light bulbs for line status indication.
A hybrid system typically has some call appearance buttons that directly correspond to individual lines and/or stations, but may also support directly dialing to extensions or outside lines without selecting a line appearance.
The modern key system is usually fully digital (although analog variants persist) and some systems embrace VOIP. Indeed, key systems now can be considered to have left their humble roots and become small PBXes. Effectively, the aspects that distinguish a PBX from a hybrid key system are the amount, scope and complexity of the features and facilities offered.
Hybrid systems are a common tool in the financial services industry used on trading floors. These advanced hybrid key systems generally only require attached PBXs for interaction with backroom staff and voicemail. These systems commonly have their front end units referred to as Turrets and are notable for their presentation of hoot-n-holler circuits. Multiple Hoots are presented to multiple users over multiplexed speakers to multiple locations.
A private branch exchange (PBX) is a telephone exchange that serves a particular business or office, as opposed to one that a common carrier or telephone company operates for many businesses or for the general public. PBXs are also referred to as:
PBXs make connections among the internal telephones of a private organization—usually a business—and also connect them to the public switched telephone network (PSTN) via trunk lines. Because they incorporate telephones, fax machines, modems, and more, the general term "extension" is used to refer to any end point on the branch.
PBXs are differentiated from "key systems" in that users of key systems manually select their own outgoing lines, while PBXs select the outgoing line automatically. Hybrid systems combine features of both.
Initially, the primary advantage of PBXs was cost savings on internal phone calls: handling the circuit switching locally reduced charges for local phone service. As PBXs gained popularity, they started offering services that were not available in the operator network, such as hunt groups, call forwarding, and extension dialing. In the 1960s a simulated PBX known as Centrex provided similar features from the central telephone exchange.
Two significant developments during the 1990s led to new types of PBX systems. One was the massive growth of data networks and increased public understanding of packet switching. Companies needed packet switched networks for data, so using them for telephone calls was tempting, and the availability of the Internet as a global delivery system made packet switched communications even more attractive. These factors led to the development of the VoIP PBX. (Technically, nothing was being "exchanged" any more, but the abbreviation PBX was so widely understood that it remained in use.)
The other trend was the idea of focusing on core competence. PBX services had always been hard to arrange for smaller companies, and many companies realized that handling their own telephony was not their core competence. These considerations gave rise to the concept of hosted PBX. In a hosted setup, the PBX is located at and managed by the telephone service provider, and features and calls are delivered via the Internet. The customer just signs up for a service, rather than buying and maintaining expensive hardware. This essentially removes the branch from the private premises, moving it to a central location.
PBXs are distinguished from smaller "key systems" by the fact that external lines are not normally indicated or selectable at an individual extension. From a user's point of view, calls on a key system are made by selecting a specific outgoing line and dialing the external number. A PBX, in contrast, has a dial plan. Users dial an escape code (usually a single digit; often the same as the first digit of the local emergency telephone number) that connects them to an outside line (DDCO or Direct Dial Central Office in Bell System jargon), followed by the external number. Some modern number analysis systems allow users to dial internal and external numbers without escape codes by use of a dialplan which specifies how calls to numbers beginning with certain prefixes should be routed.
For some users, the private branch exchange has gone full circle as a term. Originally having started as an organization's manual switchboard or attendant console operated by a telephone operator or just simply the operator, they have evolved into VoIP centres that are hosted by the operators or even hardware manufacturers. These modern IP Centrex systems offer essentially the same service, but they have moved so far from the original concept of the PBX that the term hardly applies at all.
Even though VoIP gets a great deal of press, the old circuit switched network is alive and well, and the already bought PBX's are very competitive in services with modern IP Centrexes. Currently, there are four distinct scenarios in use:
Since in reality people want to call from the IP side to the circuit switched PSTN (SS7/ISUP), the hosted solutions usually have to maneuver in both realms in one way or another. The distinctions are seldom visible to the end user.
The first consumer PBX systems used analog (POTS) telephone lines, typically supporting four private analog and one public analog line. They are the size of a small cigar box. In Europe these systems for analog phones were followed by consumer-grade PBXs for ISDN. Using small PBXs for ISDN is a logical step, since the ISDN basic rate interface provides two logical phone lines (via two ISDN B channels) which can be used in parallel. Small, entry-level systems are also extremely cheap (e.g. US$100). With the adoption of VoIP by consumers, consumer VoIP PBXs have appeared, with PBX functions becoming simple additional software features of consumer-grade routers and switches.
Open source projects have provided PBX-style features since the 1990s. These projects provide extreme flexibility and features, including the means to inspect and change the inner working of a PBX. Lowered entry barriers for new manufacturers created business opportunities for newcomers.
In addition to these basic functions, PBXs offer many other calling features and capabilities, with different manufacturers providing different features in an effort to differentiate their products. Common capabilities include (manufacturers may have a different name for each capability):
Interfaces for connecting PBXs to each other include:
Interfaces for connecting PBXs to trunk lines include:
Interfaces for collecting data from the PBX:
The call records from the PBX are called SMDR, CDR, or CIL. It is possible to use a Voice modem as FXO card.
Instead of buying PBX equipment, users contract for PBX services from a hosted PBX service provider, a particular type of application service provider (ASP). The first hosted PBX service was very feature-rich compared to most premise-based systems of the time. In fact, some PBX functions, such as follow-me calling, appeared in a hosted service before they became available in hardware PBX equipment. Since that introduction, updates and new offerings from several companies have moved feature sets in both directions. Today, it is possible to get hosted PBX service that includes far more features than were available from the first systems of this class, or to contract with companies that provide less functionality for simple needs.
In addition to the features available from premises-based PBX systems, hosted-PBX:
A mobile PBX may exploit the functionality available in smartphones to run custom applications to implement the PBX specific functionality.
In addition, a mobile PBX may create extension identifiers for each handset that allow to dial other cell phones in the PBX via their extension shortcut, instead of a PSTN number.
Category:Telephone exchange equipment Category:Computer telephony integration Category:Telephony equipment
bg:PBX cs:PBX de:Telefonanlage es:PBX fr:Autocommutateur téléphonique privé ko:기업용 전화 시스템 id:PABX it:Private branch exchange lmo:PBX ms:Ibu sawat swacawangan nl:PABX ja:構内交換機 pms:PBX pl:Private Branch Exchange pt:PBX ru:Офисная АТС sv:PBX th:ตู้สาขาโทรศัพท์ uk:Відомча АТС zh:用户交换机This text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.
The World News (WN) Network, has created this privacy statement in order to demonstrate our firm commitment to user privacy. The following discloses our information gathering and dissemination practices for wn.com, as well as e-mail newsletters.
We do not collect personally identifiable information about you, except when you provide it to us. For example, if you submit an inquiry to us or sign up for our newsletter, you may be asked to provide certain information such as your contact details (name, e-mail address, mailing address, etc.).
When you submit your personally identifiable information through wn.com, you are giving your consent to the collection, use and disclosure of your personal information as set forth in this Privacy Policy. If you would prefer that we not collect any personally identifiable information from you, please do not provide us with any such information. We will not sell or rent your personally identifiable information to third parties without your consent, except as otherwise disclosed in this Privacy Policy.
Except as otherwise disclosed in this Privacy Policy, we will use the information you provide us only for the purpose of responding to your inquiry or in connection with the service for which you provided such information. We may forward your contact information and inquiry to our affiliates and other divisions of our company that we feel can best address your inquiry or provide you with the requested service. We may also use the information you provide in aggregate form for internal business purposes, such as generating statistics and developing marketing plans. We may share or transfer such non-personally identifiable information with or to our affiliates, licensees, agents and partners.
We may retain other companies and individuals to perform functions on our behalf. Such third parties may be provided with access to personally identifiable information needed to perform their functions, but may not use such information for any other purpose.
In addition, we may disclose any information, including personally identifiable information, we deem necessary, in our sole discretion, to comply with any applicable law, regulation, legal proceeding or governmental request.
We do not want you to receive unwanted e-mail from us. We try to make it easy to opt-out of any service you have asked to receive. If you sign-up to our e-mail newsletters we do not sell, exchange or give your e-mail address to a third party.
E-mail addresses are collected via the wn.com web site. Users have to physically opt-in to receive the wn.com newsletter and a verification e-mail is sent. wn.com is clearly and conspicuously named at the point of
collection.If you no longer wish to receive our newsletter and promotional communications, you may opt-out of receiving them by following the instructions included in each newsletter or communication or by e-mailing us at michaelw(at)wn.com
The security of your personal information is important to us. We follow generally accepted industry standards to protect the personal information submitted to us, both during registration and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100 percent secure, however. Therefore, though we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.
If we decide to change our e-mail practices, we will post those changes to this privacy statement, the homepage, and other places we think appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.
If we make material changes to our e-mail practices, we will notify you here, by e-mail, and by means of a notice on our home page.
The advertising banners and other forms of advertising appearing on this Web site are sometimes delivered to you, on our behalf, by a third party. In the course of serving advertisements to this site, the third party may place or recognize a unique cookie on your browser. For more information on cookies, you can visit www.cookiecentral.com.
As we continue to develop our business, we might sell certain aspects of our entities or assets. In such transactions, user information, including personally identifiable information, generally is one of the transferred business assets, and by submitting your personal information on Wn.com you agree that your data may be transferred to such parties in these circumstances.