3cx pbx sync windows service, DOT NET Programming

Assignment Help:

Project Description:

 You require access to a commercial version of the 3CX PBX system in order to be able to program the API

You need sufficient technical knowledge about PBX systems, particularly 3CX and its configuration

A Windows Background Service requires checking regular (via a call to an intranet REST Web service) if some data has changed. The details of the data are also given via the REST Call. Based on what has changed it needs to do some API call's to a 3CX software telephone system (PBX) (3CX API call's) in order to:

1) Create/update/ Remove a contact (Delete/Update also by Extension Nr.)

2) Create/Remove a contact group (Delete also by Extension Nr.)

3) Put/Remove Contacts in groups

4) Get every contact details

5) Get every Contact group details

6) Get every contact in a group

7) Create/Remove/Update a Ring group

8) Put contacts in a ring group

9) Simply add new functions to the service ourselves

You can use the 3CX Call API (3cx.com/blog/docs/take-control-of-calls-on-3cx-with-the-call-control-api/)

When you prepare an extension (a phone number) this can be a soft phone or a physical device where you need to submit the MAC address and configuration template information in order to sustain auto provisioning.

The REST service where the service may get its data is not yet developed or designed; we will be developing this REST service. For test purpose you can have to create a minimal REST service (.Net WebApi 2) to get static test data from the REST service to test de functionality of the 3CX Sync Service.

The version of the 3CX PBX software is version

We may use and include the written code in our complete software package.

Your Job:

* Make a technical analysis that would cover the needs

* Program and Design the Test REST Service in .NET WebAPI2

* Program and Design the Sync Service in .NET 4.5

* Code must be documented in source

* Document the installation, technical workings, and configuration / Diagrams (Word Document)

Skills required:

.NET, SQL, Software Architecture


Related Discussions:- 3cx pbx sync windows service

What are the different types of workflow in wf, What are the different type...

What are the different types of workflow in WF? In WF 4.0, the following two types of workflows are used: Flowchart workflows - Helps you to make workflows using the commo

What is cyclomatic complexity and why is it important, What is cyclomatic c...

What is cyclomatic complexity and why is it important? Cyclomatic complexity is a computer science metric (measurement) developed by Thomas McCabe used to generally calculate t

What is asp.net ajax, What is ASP.NET AJAX? ASP.NET AJAX, mostly called...

What is ASP.NET AJAX? ASP.NET AJAX, mostly called AJAX, is a set of extensions of ASP.NET. It is developed by Microsoft to execute AJAX functionalities in Web applications. ASP

Unity 4 ios pro developer to prepare link.xml, Unity 4 iOS Pro Developer to...

Unity 4 iOS Pro Developer to prepare link.xml Project Description: I'm seeking an iOS developer with a Unity 4 iOS Pro license to prepare a link.xml file that will let my pro

Want c# single user login per session, Want C# Single User Login per sessio...

Want C# Single User Login per session Project Description: I need to save simulatenious logins for one account such as one user has a spottily premium account and someone tri

Automate installation setup, Automate installation setup Project Descrip...

Automate installation setup Project Description: The steps are: Clicking four times accept and the setup goes to tray, I do not want to block the mouse or the keyboard. Sk

Post cache substitution, What is Post Cache substitution? The Post cach...

What is Post Cache substitution? The Post cache substitution is used when we want to cache the complete page but also require some of the dynamic region inside that cached page

Data hiding and encryption would be done on images, Data hiding and encrypt...

Data hiding and encryption would be done on images. Both these process should have a data hiding key and an encryption key correspondingly. Another user should be able to decrypt t

Value types and reference types, What are Value types and Reference types ...

What are Value types and Reference types The Value types directly contain their data which are either allocated on the stack or allocated in-  Line in a  structure. The Refe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd