Solved

Meet Me

Posted on 2014-12-11
5
180 Views
Last Modified: 2014-12-12
We have 1 pub and two subs.  All located across Oklahoma. We had a meet me this morning and 95 % of streams when through 1 sub.  They should have went through CM2 locally here but went to CM3 which is not where they should have went. In RTMT, out of 88 streams only 6 went to CM2. The meet me call had a lot of qos issues and I suspect this is part of the issue. Can anyone tell my how its decided which call manager handles the meet me?   The person who initiated the call is registered in CM2.

THanks, John
0
Comment
Question by:Jobeethemage
  • 3
  • 2
5 Comments
 

Author Comment

by:Jobeethemage
ID: 40494814
Also, we are on SIP trunks.
0
 
LVL 20

Accepted Solution

by:
José Méndez earned 500 total points
ID: 40495257
Not sure what you are referring to by "streams", maybe you can clarify what you were looking at in RTMT.

MeetMe conferences are handled by one conference bridge at a time. The way that bridge is selected works like this: The person who initiates the conference using the Meetme softkey invokes the conference feature, and CM looks within the MRGL configured on that device to see which MRGs it contains. IF there is no MRGL then the MRGL of the device pool is used.

CM searches within each MRG in order, top to bottom trying to find a suitable conference bridge, BUT, if there are multiple options within an MRG, it selects one randomly. If nothing found within the first MRG, it moves to the following.

So if all the participants in that conference were local to the conference bridge that the Meetme initiator invoked, you want to make sure that within the MRGL of the phone invoking the feature, the only resources in the first MRG are the local ones.
0
 

Author Comment

by:Jobeethemage
ID: 40496523
0
 

Author Closing Comment

by:Jobeethemage
ID: 40496589
As always willywilburwonka has the answer.  He was correct.  The media resource group was using the wrong CB.
0
 
LVL 20

Expert Comment

by:José Méndez
ID: 40497410
Glad to hear it helped
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now