System information

Next, start Asterisk on the second server and run jabber show buddies on that server.
The output will contain more information, since the second server will see the first
server online:
*CLI> jabber show buddies
Jabber buddy lists
Client: server2@jabber.shifteight.org/astvoip2
Buddy: server1@jabber.shifteight.org
Resource: astvoip1
node: http://www.asterisk.org/xmpp/client/caps
version: asterisk-xmpp
Jingle capable: yes
Status: 1
Priority: 0
Buddy: server1@jabber.shifteight.org/astvoip1
Resource: None
At this point, you should be ready to test out the distribution of device states. The
procedure is the same as that for testing device states over AIS, which can be found in
“Testing device state changes” on page 313.
Shared Line Appearances
In Asterisk, Shared Line Appearances (SLA)—sometimes also referred to in the industry
as Bridged Line Appearances (BLA)—can be used. This functionality can be used to
satisfy two primary use cases, which include emulating a simple key system and creating
shared extensions on a PBX.
Building key system emulation is the use case for which these applications were pri-
marily designed. In this environment, you have some small number of trunks coming
into the PBX, such as analog phone lines, and each phone has a dedicated button for
calls on that trunk. You may refer to these trunks as line 1, line 2, and line 3, for example.
The second primary use case is for creating shared extensions on your PBX. This use
case seems to be the most common these days. There are many reasons you might want
to do this. One example is that you may want an extension to appear on both the phones
of an executive and her administrative assistant. Another example would be if you want
the same extension to appear on all of the phones in the same lab.
While these use cases are supported to an extent, there are limitations. There is still
more work to be done in Asterisk to make these features work really well for what
people want to do with them. These limitations are discussed in “Limita-
tions” on page 328.
Installing the SLA Applications
The SLA applications are built on two key technologies in Asterisk. The first is device
state processing, and the second is conferencing. Specifically, the conferencing used by
318 | Chapter 14:Device States