At the time it's got permission, the terminal can ship the gatekeeper an e-mail address, alias string or cellphone extension with the terminal it wants to get in touch with, which can be in another zone. If important, a gatekeeper will poll other gatekeepers in other zones to take care of an IP tackle.Inferring - generating an "educated guess" abou