Home > Articles > Cisco Network Technology > IP Communications/VoIP > Cisco Unity: About Unified Messaging

Cisco Unity: About Unified Messaging

  • Sample Chapter is provided courtesy of Cisco Press.
  • Date: Sep 17, 2004.

Chapter Description

Unified messaging is a wonderful utility for your users, but it can be a headache for administrators. This chapter discusses the challenges associated with unified messaging as a part of the voice data convergence paradigm for the messaging application layer.

Challenges with Unified Messaging in an Organization

As with IP telephony, most businesses, especially Fortune 500 businesses, strongly desire unified messaging. For most organizations, moving toward unified messaging requires a lot of effort. This is of particular concern because of the legacy structure of most IS organizations and their prevalent separation of voice and data (for both technology and the responsibility of managing it). For this reason, UM may not only be challenging to deploy, but it also could be entirely impossible to deploy. One interesting thing about this issue is that it has nothing to do with technical challenges or limitations of the product. Instead, it is mostly organizational. Many organizational issues arise in preparing a given company for unified messaging (although some technical challenges might exist for the organization's network and messaging infrastructure, such as readiness requirements and capacity planning needs). So, without understanding that a given organization's IS structure might prevent the deployment of unified messaging, little progress will be made in trying to deploy a unified messaging solution such as Unity within some companies.


Lack of organizational alignment toward UM is often a primary reason that larger companies choose to deploy Unity in a large-scale, voice mail-only configuration first and then deploy UM later: They want time to take advantage of Unity's technology and features, as well as the time to align organizationally to manage UM. This is fine and doable, but it also incurs a lot of extra work. A lot more work is involved because you must design a dedicated solution for Unity and then also take into consideration how you will migrate to UM. Occasionally, a migration to UM means moving data (subscriber information and possibly messages as well) off the voice messaging-only messaging systems to a newer version of the messaging system (such as migrating from Ex55 to E2K, or from Exchange to Domino). For more information, see the chapters in Part II.

After the organizational challenges are addressed, the technical challenges can be addressed. The organizational challenges actually might take considerably more effort than the technical challenges; it is very important to understand the issues surrounding organizational alignment—or the lack thereof. The following sections discuss the organizational issues that you should address before you deploy a unified messaging solution.

Who Manages the Messaging Topology?

Organizations that want to deploy unified messaging must start with determining who internally manages the messaging topology. The messaging topology includes everything necessary for managing the messaging systems including dependencies. From the perspective of legacy voice messaging, the first response is that the voice team owns the voice-messaging solution. Is this still true with unified messaging? Absolutely. However, because UM focuses on centralizing different types of messages into the same messaging store, the voice team must actively be a part of the group managing the messaging topology.

Having the voice team join the e-mail team is a good start, although this is not perfect. An ideal scenario is one in which voice and electronic messaging skills, roles, and responsibilities are given to both teams as they join together. This might be considered just a certain way to look at the situation, but the emphasis is important. Bringing both groups together or making both groups messaging-centric moves the emphasis from e-mail services and voice-mail services to messaging services.

Figure 1-4 shows a centralized messaging team with the responsibility for all aspects of messaging within a given organization. This includes voice messaging, fax, and e-mail—all parts of unified messaging.

Figure 4Figure 1-4 Organizing a Centralized Messaging Team

So, why is merging the voice-messaging team and the e-mail team so important? It comes down to placing the emphasis on the core expertise required to maintain unified messaging, and it de-emphasizes the core competencies of separate e-mail and voice-mail teams. It is important to note that unified messaging puts new burdens on the e-mail infrastructure that require attention from the e-mail team. Unified messaging also builds a dependency between the voice-mail system and the e-mail system that the voice-messaging team needs to understand and manage. The benefits of merging both teams into one are numerous: Their joint expertise enables the effective support of unified messaging as a convergence technology. Many times, all team members must have IP telephony skills because when IP telephony is part of the deployment, the changes required can fuel changes to the voice-messaging legacy deployment and support team as well. Another benefit is that merging the two teams' expertise prepares this same team for other types of messaging services in the near future, such as video messaging.

This is just one way that a cross-functional organization can be put together to properly support unified messaging. To maintain Unity as an application, the team must understand more than voice messaging: It also needs a core knowledge of the telephony integration methods that Unity uses. Within an organization that emphasizes messaging services—where voice messaging is just as crucial as electronic messaging—it is easier to manage the core competencies of the separate groups and allows them to share commonalities in their areas of responsibility. These common areas include second-tier end-user support, administration, and the common use of the messaging backbone and its directory service by all these different types of messaging.

Managing Perception Issues When Combining Voice Mail with E-mail

Another interesting paradigm to understand is how Unity and unified messaging affect organizations' typical perceptions of the differences between legacy voice mail and e-mail. It is often surprising to note that some companies expect and account for e-mail–based service interruptions on a regular basis. It might be scary to think that regular unscheduled e-mail outages are expected, but they are in some organizations.

In contrast, legacy voice messaging is perceived to always be available and isn't necessarily mission-critical. This seems to be a contradiction, but it might be the result of conditioning: A legacy e-mail system is typically liable to suffer service interruptions, and a legacy voice-messaging system never seems to have them.

One the one hand, for Unity to provide reliable voice messaging for subscribers and outside callers, it must always be available, even though it is not considered mission-critical. On the other hand, when Unity is installed in a messaging environment that is considered mission-critical yet unreliable, just knowing that Unity's service (normal operations) can be disturbed by an occasionally unavailable e-mail server can be enough to prompt the given company to uninstall the system before it even has a chance to provide unified messaging services to subscribers and before the company can realize its benefits.

If this is the case, what is the answer? How can Unity be deployed as a unified messaging solution if the messaging system that it connects to is occasionally unavailable? The answer is twofold. First, the perception must be changed. Reliability for any corporate messaging system (voice or e-mail) is essential to a successful and highly productive organization. So, if there is a concern about whether an electronic-messaging system can support unified messaging because the electronic-messaging system is unreliable, you must address those unreliability issues first. You must achieve the goal of reliability before you introduce Unity and unified messaging. Second, if achieving reliability in your messaging environment requires a redesign, include unified messaging requirements from the start. If it requires just a correction of server hardware or OS, or the resolution of messaging application issues, make sure that Unity can operate reliably in this environment. Part II discusses in detail ways to assess and evaluate whether Unity can achieve normal operations with your messaging environment. Naturally, the emphasis on reliability with Unity includes two points:

  • Ensuring adherence to deployment and design requirements found throughout this book—especially in the deployment section in Part II

  • Focusing on a sustainable Unity solution, one where the loss of access to Unity's dependencies are minimized and Unity servers are placed in failover configurations

The messaging environment can and should be readied for Unity and should be maintained at that same high state of readiness, even after the product is deployed. In this case, a high state of readiness implies Unity's capability to maintain normal operations in an ongoing, persistent fashion. When the messaging infrastructure is readied, the next step is to understand Unity's relationship with and dependencies on this messaging infrastructure. In addition, it is important to understand how service interruptions, planned or unplanned, can affect Unity's capability to provide acceptable voice-messaging services in the same way as a legacy voice-messaging system that never goes down, as well as to voice-enable e-mail playback over the telephone. Ensuring this ongoing state of readiness is the primary way to prevent or minimize the chances of misperceptions of the product's reliability.

Back to organizational alignment to support unified messaging: Another very important argument for organizational alignment (aside from the need for centralized technical expertise) is that, without it, you are guaranteed to experience service interruptions with Unity. Of course, this creates undue perception problems about Unity's capability to provide reliable services to end users. It is easy enough to ignore Unity's messaging requirements for subscribers when it is trying to service their voice-messaging requests. Without properly aligning your messaging services, you are guaranteed to face serviceability issues between Unity and the messaging system that it is trying to service. This is another paradigm shift and is a prime justification for establishing a centralized messaging team that has both voice and e-mail expertise. One might say that this is the same paradigm shift, but so many technical and organizational issues are driven by these perceptions of unified messaging—and, in most cases, misperceptions—that they must be identified individually instead of being considered one in the same paradigm shift. So, because these paradigms are all inter-related, they must all be known, understood, and planned for if unified messaging is to be successful.

As an example, if your IS or IT organization is not aligned as previously discussed, it may not have all the information that it needs to work efficiently. If the e-mail teamtakes the messaging system out of service without telling the voice-messaging team to prepare for the same outage, you end up with a scheduled e-mail outage and an unscheduled voice-messaging outage. Both outages will affect the same end users, but in different ways. The users will know that the e-mail system will be unavailable during a certain period of time, but they will still expect to retrieve and leave voice messages and will be disappointed when they cannot. So, without the organizational alignment, the end-user community suffers, propagating the perception that unified messaging is not suitable for its needs.

Another perception issue regarding unified messaging products in general is the expectation that features and functionality found in some legacy voice-messaging systems will transfer to unified messaging without any change in the behavior of those features or alteration of their functionality. This might or might not be the case. To address this concern and overcome the perception that this traditional functionality is lost, you absolutely must identify the functionality that is most critical for migrating to unified messaging. You do this by performing a usage analysis of your existing legacy voice-messaging systems and surveying your end users. In fact, end-user involvement is at the heart of a usage analysis: This analysis cannot be considered valid without end-user input and active participation in the migration to unified messaging. This usage analysis yields a considerable amount of data on everything you need to do to prepare for your migration. This includes what features of your legacy voice-messaging systems are most important to your end users, as well as a gap analysis between the legacy system and Unity. For more information on performing an end-user usage analysis, see Part II, especially Chapter 8, "Deployment Methodology;" Chapter 9, "Planning;" and Chapter 11, "Designing a Unity Solution."

An example of legacy voice-messaging functionality that is "lost" when moving to UM is deleting voice messages automatically that are reserved for a short period of time. Some of the most popular legacy voice-messaging systems offer a feature that enables users to store messages for a certain number of days before they are deleted. Subscribers depend upon this feature and use the system with an eye toward the eventual deletion of their stored messages. They know that the messages will be deleted and do not have to worry about maintaining their messages; thus, they do not have to worry about managing the size of the mailbox. This can be considered a nice convenience, but it is sorely lacking in unified messaging. For example, Unity uses a messaging system, such as Exchange or Domino, as its off-box store; it does not have the type of control necessary to delete old messages that have been left in a subscriber's e-mail box after a matter of days. Could it have that type of control programmatically through code? Absolutely.

Often an organization puts out an RFP stating that the UM system must delete voice messages after 12 or 14 or 16 days. At the same time, however, the organization does not want a product such as Unity to have that type of automated control over the messaging environment. So, it is possible to automate the management of voice messages in Exchange, for instance, but it is certainly considered too risky to enable Unity or any other unified messaging product to do this safely and without error. Most e-mail administrators are reluctant to enable any application to sit on top of their e-mail system and manage specific activities in this way, especially activities that include deleting messages periodically. So, even though it is desirable to have Unity delete messages after a certain number of days—and it would be useful to adhere to it—in the end, it is not practical for Unity have this type of capability within a messaging system, even if it is programmatically possible. Doing so gives Unity the liability for managing its subscribers' voice messages stored in the e-mail system.

Ease of installation and use are often differentiators between a legacy VM system and a UM system such as Unity. This major difference is the result of two primary reasons. First, most companies do not install their own legacy voice-mail systems. They typically have the maker of the product or one of their service's partners do the installation. With Unity, you must install it or have a Cisco partner install it. The second difference is that, during the installation operations, uncertainty arises concerning how the product actually should be installed. Unity has the same familiar, seemingly easy-to-use installation interfaces as other software-based products that use Microsoft technologies and APIs. However, you cannot just sit down and install it without having some knowledge of what the product is doing (or, in some cases, significant knowledge and access rights to the corporate directory and mail store). Thus, learning about what Unity does or is supposed to do is a key step in the installation process—and it is too often ignored. Do you want to stay out of trouble when installing Unity? Make sure that you know what it is supposed to do. Also do a few dry runs (in a lab) before you actually install it into your environment, regardless of the size of your environment.

Usage and New Security Issues

When voice messaging is introduced to the data environment, a whole set of new security issues arises. Understanding these issues and how to address them is crucial to a successful transition from legacy voice messaging to unified messaging. Ignoring these security issues and others like them will prevent you from realizing the finer benefits of unified messaging. It should be considered a best practice to address these issues during the planning and design process for any given Unity deployment:

  • Privacy and confidentiality in voice messaging across an e-mail enterprise.

  • Privacy and confidentiality in text to the speech of electronic mail through the telephone.

  • Encrypted messages for the end user regardless if they're using their GUI e-mail client or the Unity TUI.

  • Encrypted calls from Unity to CallManager and then from Unity to the messaging system it services.

These issues are presented in the following sections so that the awareness of them is raised from the start.

Privacy and Confidentiality in Voice Messaging Across an E-mail Enterprise

In a legacy voice-messaging system, messages do not have the freedom to travel in such an "out-of-control" way as what you might see with an e-mail message. Thus, a confidential voice message left for a voice-mail subscriber is heard only by that person—no one else. Not many options are available for forwarding confidential messages to just anyone, and users do not have the freedom to edit the contents of the confidential voice message and resend it as if it came from the same original sender.

When voice messaging is introduced to a legacy e-mail environment, such as Exchange or Domino, confidentiality parameters must be addressed in the legacy e-mail or messaging environment. To prevent messages marked as confidential from being sent to just anyone, these confidentiality flags (marking a message confidential) must be used and maintained in your messaging environment. Without the support of and use of such confidentiality flags, voice messages can be sent to a wide number of people rapidly, without any capability to control who can receive the messages.

Privacy and Confidentiality in Text to Speech of E-mail Through the Telephone

With unified messaging, new functionality is present that does not exist in a legacy voice-messaging environment. Unified messaging has the capability to "voice-enable" a legacy e-mail environment, enabling the subscriber to play back voice messages and e-mail messages over the telephone. To play back e-mail messages over the telephone, text-to-speech (TTS) technology is used. This certainly sounds like a good idea, but what happens now that an outside caller can dial into a unified messaging system, log in as someone else—say, the CEO—and play back that person's confidential e-mail messages over the telephone? What happens is a very unhappy CEO.

Fortunately for Unity, it can support two-factor authentication that can then be tied to a class of service that supports TTS for subscribers. This means that subscribers who have the capability to play back their messages can do so only if they authenticate over the telephone using two-factor authentication. In Unity's case, this is the subscriber's extension and SecureID pass code entered from the subscriber's token or FOB. Without a pass code, Unity denies access into the system and prevents unwanted intrusion into mailboxes that have the capability to play back TTS. For more information about Unity's support for two-factor authentication, see the Unity Administration Guide on the Cisco website at http://www.cisco.com.

So, here is another paradigm shift. In a legacy voice-messaging environment, an intruder can call into the system and access the CEO's voice mail if that person can figure out his or her password. This has been an ongoing issue that seems to have been ignored or "played down" in its level of criticality to a business's daily operations. However, if you have a unified messaging solution and the same intruder accesses the CEO's voice mail, the issue is considered quite critical because the intruder also has a chance to listen to e-mail messages over the phone (if this feature is enabled). Both issues should be considered critical and they merit equal attention and care. In essence, by adding two-factor authentication capabilities to your unified messaging system, you alleviate both problems equally. As a subscriber, you must use your subscriber ID and SecureID pass code to access the system, whether you are checking voice mail or playing back e-mail. From an authentication standpoint, both are now more secure. This means that, when it is applied, Unity's support of two-factor authentication for unified messaging is a far more suitable solution for playing back any type of message over the phone. If you will not use two-factor security, you can best keep your e-mail secure by not using TTS for subscribers to check their e-mail messages over the TUI.

Encrypted Messages, Encrypted Calls

If you resolve the issue of e-mail playback using TTS by implementing two-factor authentication, you take care of limiting security issues surrounding authentication. However, there are other forms of access, such as eavesdropping on the over-the-wire phone session. Thus, phones are not secure if the call between the phone and the switch that it is connected to is not encrypted. If all phone calls were encrypted, you would not have to worry about any eavesdropping: If eavesdroppers accessed the audio portion of the call, they would hear only the noise of encrypted audio.

Encrypted calls are out of the scope of Unity's capability. Nevertheless, they are always brought up as an issue when discussing message playback. Surprisingly, some organizations mention this issue during product evaluation more with message playback than with over-the-phone conversations.

Storing Voice Messages

The next question asked with any UM system such as Unity is, "Okay, so where are the voice messages stored, really?" The answer, of course, is that they are stored in the e-mail message store. This is actually a hard concept for people to accept. Are the voice messages stored somewhere on Unity? The answer is no. The voice messages are deposited in the Unity Messaging Repository (UMR); as long as the messaging system that Unity services is still online when the message is left there, it is delivered right away. A message stays on the Unity server only if the message system is unavailable. Should voice messages be stored on Unity or in both places, just in case? Possibly. They likely will be in the future—but not because Unity has to have any control over them. Unity eventually will need to consider its dependency on the messaging store to be essential but also behave in a benign way (that is, to minimize the impact the loss of this dependency on its normal operations) so that subscribers who simply want to dial in and check for new messages or manage old voice messages can do so, even if the message store is unavailable to them.

The important thing to note here is that Unity 3.1x and 4.0x can temporarily store messages (in the UMR) left by a subscriber or outside caller if the message cannot be delivered to an unavailable message store.

Another concern arises about storing voice messages with e-mail centers on the size of voice messages. Voice messages are created essentially as wave file attachments to an e-mail message. To play back the message, subscribers must use either the telephone or the VMO snap-in for Exchange or DUC client for Domino in the e-mail client. These snap-ins for the e-mail client recognize the voice message and enable subscribers to interface with the voice-messaging system so that they can record voice messages from their e-mail client (GUI) and send to others.

If voice messages are just wave file attachments to e-mail messages, then how big are the messages? That depends on two things: the codec or codecs used to encode the voice messages, and the average size of the message. Does this mean that voice messages have an impact on an e-mail system? Absolutely! You cannot migrate your entire legacy voice-messaging system onto your e-mail system without affecting it in at least three ways:

  • An increase in the number of messages

  • An increase in the average size of a message

  • An increase in the overall disk storage

Any unified messaging system also affects the load of your messaging systems—some worse than others. Unity's load on an existing messaging system varies, depending upon feature/function usage, the number of subscribers, and the number of messages submitted and retrieved. Be prepared to understand the effects that Unity has on your messaging systems. These effects are not a bad thing, but it is important to be realistic about the potential impact. They can become a bad thing if you are unprepared for them or don't manage them.

To learn more about Unity's use of codecs, see Chapter 7, "Components and Subsystems: Features;" Chapter 13, "Unity with Microsoft Exchange;" and Chapter 14, "Unity with Lotus Domino." To learn about capacity planning for your message store, see Chapter 9.

Remote Users, End Users, and Accessibility

Unified messaging represents a change for your end users. It represents a change in the way they communicate and interact with fellow coworkers or outside callers. With unified messaging, the end user now has the capability to review a voice message—say, from an outside caller—and then forward the message to that outside caller's e-mail address and respond to it using text (see Figure 1-5).

Having the capability to respond to voice messages using text or text messages using voice seem trivial and of no consequence. However, it is a means for end users to enhance or even improve upon their productivity, especially if it saves them time in communicating with one another.

Figure 5Figure 1-5 Responding to a Voice Message with Text

With unified messaging, there is a contrast in conveniences for the different types of end users. End users who work in a corporate office every day will appreciate the convenience of unified messaging in their GUI interface. They can maintain a high level of productivity by staying at the computer and not being bothered with changing from computer to telephone to check for different types of messages. Telephone Record and Playback (TRaP) is the capability to use a media control in your messaging GUI client to record and play back your messages by having the control call your phone to use as a microphone or speaker. With this technology, a subscriber will still use a phone, but the phone is a part of the GUI experience. Of course, this means that users spend less time on the phone walking through conversations (listening to and responding to prompts played to them over the phone) and checking and responding to messages. In addition, end users can set their special phone settings, such as greetings and notification devices, through the Cisco Personal Communications Assistant (CPCA).

For mobile users, access to and use of the phone is essential, especially while they are in transit. With unified messaging, mobile users can receive and respond to voice messages, e-mail messages, and fax messages, and can maintain a higher level of productivity while they are out of the office. This benefit of unified messaging becomes important as usage increases over time.

Remote users benefit using either the GUI or the TUI, depending upon what is more convenient at the time. In some cases, especially with remote locations that have lower bandwidth, it might be more convenient for end users to use the TUI for accessing both e-mail and voice mail. When ample bandwidth is available, the GUI might be the only preferred method of access. In this case, both options are available to the end user.

All three examples show how different types of workers—office, mobile, and remote—can benefit from the use of unified messaging to improve their daily productivity.

Voice Mail and UM Coexistence

Another reasonable request is to integrate unified messaging with voice messaging. This just means that often it is desirable to have some subscribers use unified messaging and other subscribers use voice messaging only. So how is this performed? Because Unity uses an existing messaging system, it is necessary to configure the Unity unified messaging servers and the Unity voice-messaging servers to use the same e-mail organization instead of separate ones. For Exchange, this means the same organization name; for Domino, it means the same domain name. In this case, a messaging organization is the topmost messaging boundary established by the respective messaging systems when you first install them. The organizational boundary typically means the same address book and shared directory information.

With Cisco Unity, it is possible to have subscribers in one Unity server address messages to subscribers on other Unity servers. This is traditionally called digital networking; it is also called Unity networking.

This creates a challenge because now you have voice mail-only subscribers in your global address list. To keep unified messaging subscribers from sending e-mail to voice mail-only subscribers, it is necessary to hide their address in the global address book. Otherwise, they will receive e-mail messages that they cannot read.


Subscribers can play back e-mail over the phone by using text-to-speech. However, this is not considered a voice-mail feature and, therefore, is not available with a voice mail-only license. It is only available with a UM license.

So, although it is possible to mix voice mail-only subscribers and unified messaging subscribers within the same organization, the users must be separated on different servers because of licensing. To keep unified messaging subscribers from sending e-mail messages to voice mail-only subscribers, the voice mail-only subscribers must be hidden in the global address list.

Integrating Fax

Earlier versions of Unity contained a fax solution called Active Fax that was built into the Unity product offering as a separate server. Active Fax offered unified administration, and that was the biggest advantage of using it. Since Unity 3.0, Active Fax is no longer offered as a fax solution. However, Unity does have the capability to integrate with different fax vendors, depending upon the following:

  • The offering is currently available on Exchange only.

  • The fax vendor must use an Exchange message class to identify the message as a fax.

Solutions and Deployment

When you understand the paradigm shifts associated with unified messaging, you can begin to work on your solution and deployment. To develop your solution, you must understand how to define and execute the tasks necessary to transition or shift your organization to unified messaging. Then you must address the technical issues described throughout this book. When developing your solution, it is important to have an excellent understanding of Unity's capabilities. See the end of this chapter for a brief walkthrough of the different sections in the book, to make sure you understand the importance of each one. Play close attention to the Part II and Part III, "Solutions, Systems Management, and Administration," so that you can understand how to deploy Unity and also how to manage both it and your subscribers as you move to unified messaging.

Part II provides you with an in-depth look at how to plan for, design, and implement a Unity solution, regardless of the size of your deployment. Initially, it might seem complicated, but this will be easier when you understand how to identify the tasks associated with deploying Unity under various configurations.

Cross-Departmental Participation

One of the things you can do to address the seemingly large set of complicated issues is to give yourself an opportunity to openly identify the issues and features that are most important to your end users, regardless of where they are in the organizational structure. Some might frown upon this idea, but you simply cannot expect your end users to easily accept something as different as unified messaging without involving them in the process. In a nutshell, it is easier for end users to accept the change that any new product brings with it, especially one as capable as Unity, if they can participate in the process.

It is possible to enable end users to participate and still allow them to be productive with their normal duties. Participation does not mean that they should be required to spend every working hour on the project. Aside from being directly involved, end users can participate by attending presentations and demonstrations of the product, by having access to the product in their area so they have a chance to understand what it does and how it does it, or by asking them to fill out surveys or questionnaires on the product's features and functionality. Other options include creating focus groups or working groups from different departments or divisions that can provide direct input into the product and how it might be used.

Adapting the User Community to Unified Messaging

So, how do you adapt the user community to unified messaging? when you involve users in the process, it is easier. You can do a few things to ensure that the end-user community has a chance to adapt to the technology:

  • Offering training

  • Easing in features over time

  • Being aware of the changes in end-user behavior that might affect the system's performance (also known as the turnpike effect)


Without a doubt, Unity's TUI conversation is different than others in the industry—no two conversations are exactly alike. Many of the key presses and conversation statements might be exactly the same or similar, but without including training in your deployment effort, you certainly will have significant support overhead. It might not be worth deploying a technology such as unified messaging if you cannot train your end users on how to be Unity subscribers. Make sure that you provide the necessary training for the end users.

Easing in Features Over Time

It is not necessary to turn on every feature or make every feature available to all end users at the time of deployment. As a matter of fact, you might find that doing so overwhelms the end users so much that they will not want to even use the product. Instead, limit the number of features and functionality. For instance, it is not necessary to grant every subscriber TTS access. This can be managed by planning your class of service settings and making sure that some of your class of service groups do not have TTS access available. Another example is the web interface. Although it is functional, it might seem like too much to remember right from the start. Instead, give the subscribers some time to learn how to use the Unity TUI, and then phase in additional features over time. Doing so ensures a more pleasant end-user experience and makes your job easier in the long run. Your help desk will appreciate it as well.

Changes in End-User Behavior (the Turnpike Effect)

When trying to determine how to map features and functionality from your legacy voice-messaging system to unified messaging, consider a few important facts. First, to ease the transition, it is a good idea to attempt to closely match functionality between your legacy voice-messaging system and Unity. When you do, you can identify the gaps or differences in Unity's functionality with that of your legacy system. The gaps are areas where you will identify key training points for all end users.

In addition, end users might not be familiar with new features and functionality. These new features and functionality are the strict UM characteristics; they include technologies such as TRaP, TTS, and the capability to access personal settings (including settings such as notification devices and greetings) over the web. When subscribers begin using some or all of these features frequently, you will see a change in the performance of your solution. Thus, it is important to be aware of this up front so that you can plan for it. You can end up with a turnpike effect: End users might access the system more than they used to. So, at the beginning you might see the subscribers using the phone more often, or using the phone to record and play back messages using TRaP because controlling the phone from the computer is an exciting and new opportunity to use old technology. In this scenario, it is important to monitor port usage and call volume so that you can adjust accordingly. Again, as with all the critical issues listed in this chapter, do not ignore the possibility of the turnpike affect. Doing so can spell disaster for your new deployment.

Of course, you might find a complete change of habit over time. It is possible that phone usage will drop off drastically as subscribers become familiar with using the GUI interface to manage all their messages (see Figure 1-6).

Does this means that the subscribers will stop using the phone altogether? No, but it might mean that they will stop using the phone in the same way they used it previously, when the legacy voice-messaging system was in place. Figure 1-7 shows the difference between TRaP usage and legacy phone usage.

Figure 6Figure 1-6 Phone Usage Over Time

Figure 7Figure 1-7 Different Types of Phone Usage Over Time

Administrative, Management, and Help Desk Considerations

Part II discusses how to plan for supporting your end users. The process that accompanies this planning is called an end-user feature/function analysis, and it includes identifying the feature differences between the legacy voice-messaging systems and Unity. This becomes the basis for support along with the new functionality that is provided to the subscribers over time.

On top of determining how to put a support structure in place, there are other considerations for administration and management of the unified messaging infrastructure. Most of these considerations are addressed in Part III, "Solutions, System Management and Administration," and include how to administrate multiple Unity servers and also how to do so programmatically. Take a look at the chapters in Part III to understand how you might build your support and administration structure around a new Unity deployment.

4. Messaging Technologies | Next Section Previous Section

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020