Local Presence Calling
Back to Articles
Tutorial VoIP Caller ID VoIP Switch Telecom Local Presence

Local Presence Calling

April 6, 2018 2 min
Aivis Olsteins

Aivis Olsteins

In one of the previous articles last year we discussed about Local Presence calling (or local touch). The topic is very popular, and I would like to return to it one more time. This time maybe less technical details.

Local presence dialing is a method of assigning caller ID from the same region as where called persons number is. The calls from the same or close region are more likely to be picked up, since people may think that caller is somebody they might know personally. The technique is used by call centers where they use large pool of numbers and select one which is from same are as called party.

Here I would like to explain approach we use in our DTL SAARA software. The idea is following:

  1. If the caller e. g. call center or a company) has a Caller ID (a DID number) in the same area as the called party, we pick the number from that area. That is simple case;
  2. Now, if there is no DID matching the are of the called party, the process is more complex. We keep a map of all dial codes (NANPA codes) in the system, as displayed in top picture. System uses map to measure distance from the point on the map where called party numbers are code is to the point on the map where closest available DID number of the caller is located. this DID is then used as caller ID.

The above simple method is very fast if we use simplified approach to measuring the distance on the map, as we explained in the previous article dedicated to this subject.

Some may argue that geographic distance between points on the map does not always represent how "close" caller IDs are perceived by users. That is true, and for that reason we made the points on the map movable, i. e. operator can artificially make some caller IDs "closer" to each other by simply moving points on the map and save the new state.

The explained method is usable not only in North America with NANPA codes, but can be utilized in any other country or area where phone numbers are distributed geographically.

Share this article

Aivis Olsteins

Aivis Olsteins

An experienced telecommunications professional with expertise in network architecture, cloud communications, and emerging technologies. Passionate about helping businesses leverage modern telecom solutions to drive growth and innovation.

Related Articles

How Voice AI Reduces Agent Burnout and Boosts Satisfaction

How Voice AI Reduces Agent Burnout and Boosts Satisfaction

Reduce Burnout with Voice AI: Offload Repetitive Calls, Real‑Time Agent Assist, 40–80% Less ACW, Calmer Escalations, Healthier Occupancy, Proactive Deflection & PCI‑Safe Flows—Happier Agents, Faster Resolutions, Better Coaching, Faster Ramp

Read Article
Seamless Voice AI Integrations: Salesforce, HubSpot, and ERP Systems

Seamless Voice AI Integrations: Salesforce, HubSpot, and ERP Systems

Seamless Voice AI Integrations with Your Stack: Salesforce & HubSpot CRM + SAP/Oracle/NetSuite/Dynamics ERP; OAuth2 & mTLS Security; Real‑Time Read/Write (Cases, Orders, Payments, Scheduling); Warm Transfers, Context; Audit Logs, SLAs, iPaaS Support

Read Article
Measuring Voice AI Success: The KPIs That Matter—CSAT, Containment, Speed, Accuracy, Reliability, and ROI

Measuring Voice AI Success: The KPIs That Matter—CSAT, Containment, Speed, Accuracy, Reliability, and ROI

Voice AI KPI Scorecard: CSAT/NPS, FCR & Containment, Time‑to‑First‑Word & p95 Latency, Intent/Slot Accuracy & ASR WER, Groundedness, Tool Success (Payments/IDV/Scheduling), Warm Xfers, Uptime/Reliability, Consent/Redact, Cost per Resolution & ROI

Read Article
Sensitive Data in Voice AI: PCI‑Safe Payments, HIPAA‑Compliant PHI, Redaction & Tokenization

Sensitive Data in Voice AI: PCI‑Safe Payments, HIPAA‑Compliant PHI, Redaction & Tokenization

Managing Sensitive Data in Voice AI: PCI‑Safe Payments (DTMF Masking, Tokenization), HIPAA‑Compliant PHI Segregation, Redaction/De‑Identification, End‑to‑End Encryption, Zero‑Trust Access, Residency/Retention, DSAR Deletion, SIEM‑Audited Trails

Read Article

SUBSCRIBE TO OUR NEWSLETTER

Stay up to date with the latest news and updates from our telecom experts