ImageVerifierCode 换一换
格式:PDF , 页数:88 ,大小:740.94KB ,
资源ID:704670      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-704670.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ECMA 202-1997 Private Integrated Services Network (PISN) - Specification Functional Model and Information Flows - Call Intrusion Supplementary Service (CISD)《专用综合业务网络(PISN) 规范 功能模型.pdf)为本站会员(terrorscript155)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ECMA 202-1997 Private Integrated Services Network (PISN) - Specification Functional Model and Information Flows - Call Intrusion Supplementary Service (CISD)《专用综合业务网络(PISN) 规范 功能模型.pdf

1、Standard ECMA-2022nd Edition - June 1997Standardizing Information and Communication SystemsPhone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http:/www.ecma.ch - Internet: helpdeskecma.chPrivate Integrated Services Network(PISN) -Specification, Functional Model andInformation Flows -Call Intrusi

2、on Supplementary Service.Standard ECMA-2022nd Edition - June 1997Standardizing Information and Communication SystemsPhone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http:/www.ecma.ch - Internet: helpdeskecma.chIW E-202-ii.doc 18-08-97 16,57Private Integrated Services Network(PISN) -Specificati

3、on, Functional Model andInformation Flows -Call Intrusion Supplementary Service(CISD).Brief HistoryThis Standard is one of a series of ECMA Standards defining services and signalling protocols applicable to Private IntegratedServices Networks (PISNs). The series uses ISDN concepts as developed by IT

4、U-T and conforms to the framework ofInternational Standards for Open Systems Interconnection as defined by ISO/IEC. It has been produced under ITSTC workitem M-IT-05 2.2 and under ETSI work item DE/ECMA-00010.This particular Standard specifies the Call Intrusion (CI) supplementary service.This Stand

5、ard is based upon the practical experience of ECMA member companies and the results of their active andcontinuous participation in the work of ISO/IEC JTC1, ITU-T, ETSI and other international and national standardizationbodies. It represents a pragmatic and widely based consensus.Compared to the 1s

6、t Edition of Standard ECMA-202 (published by ECMA in December 1993), this 2nd Edition incorporateschanges in order to achieve complete alignment with International Standard ISO/IEC 14845:1996(E) published by ISO/IEC inSeptember 1996.Adopted as 2nd Edition of Standard ECMA-202 by the General Assembly

7、 of June 1997.- i -Table of contents1 Scope 12 Conformance 13 References (normative) 14 Definitions 24.1 External definitions 24.2 Other definitions 34.2.1 Busy 34.2.2 Conference type connection 34.2.3 Consultation 34.2.4 Consultation timer 34.2.5 Established call 34.2.6 Forced release 34.2.7 Immedi

8、ate invocation 34.2.8 Impending intrusion state 34.2.9 Impending intrusion warning notification 34.2.10 Implementation option 34.2.11 Intruding call 34.2.12 Intrusion state 44.2.13 Intruding call connected notification 44.2.14 Isolation 44.2.15 Path retention 44.2.16 Aerved user 44.2.17 Time to intr

9、usion 44.2.18 User B 44.2.19 User C 44.2.20 Wait on busy state 45 Acronyms 46 SS-CI stage 1 specification 56.1 Description 56.1.1 General description 56.1.2 Qualifications on applicability to telecommunication services 56.2 Procedures 56.2.1 Provision/withdrawal 56.2.2 Normal procedures 66.2.3 Excep

10、tional procedures 86.3 Interactions with other supplementary services and ANFs 96.3.1 Calling Line Identification Presentation (SS-CLIP) 96.3.2 Connected Line Identification Presentation (SS-COLP) 9- ii -6.3.3 Calling/Connected Line Identification Restriction (SS-CLIR) 96.3.4 Calling Name Identifica

11、tion Presentation (SS-CNIP) 96.3.5 Connected Name Identification Presentation (SS-CONP) 96.3.6 Calling/Connected Name Identification Restriction (SS-CNIR) 96.3.7 Completion of Calls to Busy Subscriber (SS-CCBS) 106.3.8 Completion of Calls on No Reply (SS-CCNR) 106.3.9 Call Transfer (SS-CT) 106.3.10

12、Call Forwarding Unconditional (SS-CFU) 106.3.11 Call Forwarding Busy (SS-CFB) 106.3.12 Call Forwarding No Reply (SS-CFNR) 106.3.13 Call Deflection (SS-CD) 116.3.14 Path Replacement (ANF-PR) 116.3.15 Do Not Disturb (DND) 116.3.16 Do Not Disturb Override (DNDO) 116.3.17 Call Offer (CO) 116.4 Interwork

13、ing considerations 116.5 Overall SDL 117 SS-CI stage 2 specification 207.1 Functional model 207.1.1 Functional model description 207.1.2 Description of functional entities 217.1.3 Relationship of functional model to basic call functional model 227.2 Information flows 237.2.1 Definition of informatio

14、n flows 237.2.2 Relationship of information flows to basic call information flows 297.2.3 Examples of information flow sequences 327.3 Functional entity actions 427.3.1 Functional entity actions of FE1 427.3.2 Functional entity actions of FE2 437.3.3 Functional entity actions of FE3 447.3.4 Function

15、al entity actions of FE4 457.3.5 Functional entity actions of FE5 457.4 Functional entity behaviour 457.4.1 Behaviour of FE1 467.4.2 Behaviour of FE2 547.4.3 Behaviour of FE3 647.4.4 Behaviour of FE4 727.4.5 Behaviour of FE5 737.5 Allocation of functional entities to physical equipment 747.6 Interwo

16、rking considerations 741ScopeThis Standard specifies the Call Intrusion supplementary service (SS-CI), which is applicable to various basic servicessupported by Private Integrated Services Networks (PISN). Basic services are specified in ECMA-142.Call Intrusion (SS-CI) is a supplementary service whi

17、ch, on request from the served user, enables the served user toestablish communication with a busy called user (user B) by breaking into an established call between user B and athird user (user C).Supplementary service specifications are produced in three stages, according to the method described in

18、 ETS 300 387.This Standard contains the stage 1 and stage 2 specifications of SS-CI. The stage 1 specification (clause 6) specifiesthe supplementary service as seen by users of PISNs. The stage 2 specification (clause 7) identifies the functionalentities involved in the supplementary service and the

19、 information flows between them.NOTEFor this Standard, stage 2 does not consider the split of functionality between a functional terminal at user B and thelocal PINX. Terminal functions and local PINX functions at user B are included in the same Functional Entity.2 ConformanceIn order to conform to

20、this Standard, a stage 3 standard shall specify signalling protocols and equipment behaviour thatare capable of being used in a PISN which supports the supplementary service specified in this Standard. This meansthat, to claim conformance, a stage 3 standard is required to be adequate for the suppor

21、t of those aspects of clause 6(stage 1) and clause 7 (stage 2) which are relevant to the interface or equipment to which the stage 3 standard applies.3 References (normative)The following standards contain provisions which, through reference in this text, constitute provisions of this Standard.All s

22、tandards are subject to revision, and parties to agreements based on this Standard are encouraged to investigate thepossibility of applying the most recent editions of the standards indicated below.In the case of references to ECMA Standards that are aligned with ISO/IEC International Standards, the

23、 number of theappropriate ISO/IEC International Standard is given in brackets after the ECMA reference.ECMA-142 Private Integrated Services Network - Circuit-mode 64 kbit/s Bearer Services - ServiceDescription, Functional Capabilities and Information Flows (International StandardISO/IEC 11574)ECMA-1

24、48 Private Integrated Services Network - Specification, Functional Model and Information Flows -Identification Supplementary Services (International Standard ISO/IEC 14136)ECMA-163 Private Integrated Services Network - Specification, Functional Model and Information Flows -Name Identification Supple

25、mentary Services (International Standard ISO/IEC 13864)ECMA-173 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Diversion Supplementary Services (International Standard ISO/IEC 13872)ECMA-175 Private Integrated Services Network - Specification, Funct

26、ional Model and Information Flows -Path Replacement Additional Network Feature (International Standard ISO/IEC 13863)ECMA-177 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Transfer Supplementary Service (International Standard ISO/IEC 13865)ECMA-18

27、5 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Completion Supplementary Services (International Standard ISO/IEC 13866)ECMA-191 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Offer Supplementary S

28、ervice (International Standard ISO/IEC 14841)ECMA-193 Private Integrated Services Network - Specification, Functional Model and Information Flows -Do Not Disturb and Do Not Disturb Override Supplementary Services (International StandardISO/IEC 14842)- 2 -ISO/IEC 11571 Information technology - Teleco

29、mmunications and information exchange between systems -Numbering and sub-addressing in private integrated services networksISO/IEC 11579-1 Information technology - Telecommunications and information exchange between systems -Private Integrated Services Network - Part 1: Reference configuration for P

30、ISN Exchanges(PINX)ETS 300 387 Private Telecommunication Network (PTN); Method for the specification of basic andsupplementary services (1994)ITU-T Rec. I.112 Vocabulary of terms for ISDNs (1993)ITU-T Rec. I.210 Principles of telecommunication services supported by an ISDN and the means to describe

31、them(1993)ITU-T Rec. I.221 Common specific characteristics of services (1993)ITU-T Rec. Z.100 Specification and description language (1993)4 DefinitionsFor the purposes of this Standard, the following definitions apply.4.1 External definitionsThis Standard uses the following terms defined in other d

32、ocuments: Basic service (ITU-T Rec. I.210) Calling Party Name (ECMA-163) Connection (ITU-T Rec. I.112) Integrated Services Digital Network (ITU-T Rec. I.112) Name (ECMA-163) Network Determined User Busy (ITU-T Rec. I.221) Number (ISO/IEC 11571) Private Integrated Services Network (PISN) (ISO/IEC 115

33、79-1) Private Integrated Services Network Exchange (PINX) (ISO/IEC 11579-1) Service (ITU-T Rec. I.112) Signalling (ITU-T Rec. I.112) Subaddress (ISO/IEC 11571) Supplementary Service (ITU-T Rec. I.210) User (ECMA-142) User Determined User Busy (ITU-T Rec. I.221)This Standard refers to the following b

34、asic call functional entity (FEs) defined in ECMA-142: Call Control (CC) Call Control Agent (CCA)This Standard refers to the following basic call inter-FE relationships defined in ECMA-142: r1 r2 r3- 3 -This Standard refers to the following basic call information flows defined in ECMA-142: Disconnec

35、t request/indication Release request/indication Release response/confirmation Setup request/indication Setup response/confirmation.This Standard refers to the following basic call information flow service elements defined in ECMA-142: Destination Number Connection type.This Standard refers to the fo

36、llowing information flow elements defined in ECMA-148: Originating number Originating subaddress.4.2 Other definitions4.2.1 BusyA property of a user for whom either a Network Determined User Busy or User Determined User Busy conditionexists.4.2.2 Conference type connectionA connection between the se

37、rved user, user B and user C, where all users have user information connection witheach other.4.2.3 ConsultationInvocation of SS-CI after the calling user has been informed that a call has failed because of busy at thedestination.4.2.4 Consultation timerA timer governing the time in which the callin

38、g user is allowed to request invocation of SS-CI after beinginformed that a call has failed because of busy at the destination. The duration of the timer is an implementationoption.4.2.5 Established callThe active call that is selected for intruding on.4.2.6 Forced releaseThe release of the establis

39、hed call on request from the served user during the intrusion state.4.2.7 Immediate invocationInvocation of SS-CI as part of the initial call set up.4.2.8 Impending intrusion stateThe condition of an established call and an intruding call after provision of an impending intrusion warningnotification

40、 and before establishment of communication between the served user and user B.4.2.9 Impending intrusion warning notificationA notification provided before communication is established between the served user and user B.4.2.10 Implementation optionAn option for the implementor of the service to inclu

41、de or not to include in the service providing system.4.2.11 Intruding callA call in which the served user requests SS-CI.- 4 -4.2.12 Intrusion stateThe condition of an established call after establishment of communication between the served user and user Band prior to termination of SS-CI or invocat

42、ion of wait on busy.4.2.13 Intruding call connected notificationA notification provided on establishment of communication between the served user and user B.4.2.14 IsolationThe breaking of the user information connection to and from user C during the intrusion state.4.2.15 Path retentionThe retainin

43、g of the network connection between the originating CC and the destination CC so that asupplementary service (such as SS-CI) can be invoked without establishing a new connection.4.2.16 Served userThe user who requests SS-CI.4.2.17 Time to intrusionThe duration of the impending intrusion state.4.2.18

44、 User BThe wanted user that is subject to the call intrusion.4.2.19 User CThe other user in the established call.4.2.20 Wait on busy stateA state that can be entered from the intrusion state and in which the intruding call is disconnected from user Band is waiting for user B to answer the call.5 Acr

45、onymsANF Additional Network FeatureCC Call Control (functional entity)CCA Call Control Agent (functional entity)CCBS Call Completion to Busy SubscriberCCNR Call Completion No ReplyCD Call DeflectionCFB Call Forwarding BusyCFNR Call Forwarding No ReplyCFU Call Forwarding UnconditionalCI Call Intrusio

46、nCICL Call Intrusion Capability LevelCIPL Call Intrusion Protection LevelCLIP Calling Line Identification PresentationCLIR Calling/Connected Line Identification RestrictionCNIP Calling Name Identification PresentationCNIR Calling/Connected Name Identification RestrictionCO Call OfferCOLP Connected L

47、ine Identification Presentation- 5 -CONP Connected Name Identification PresentationCT Call TransferDND Do Not DisturbDNDO Do Not Disturb OverrideFE Functional EntityISDN Integrated Services Digital NetworkNDUB Network Determined User BusyPINX Private Integrated Services Network ExchangePISN Private

48、Integrated Services NetworkSDL Specification and Description LanguageSS Supplementary ServiceTE Terminal EquipmentUDUB User Determined User BusyWOB Wait On Busy6 SS-CI stage 1 specification6.1 Description6.1.1 General descriptionCall Intrusion (SS-CI) is a supplementary service which, on request fro

49、m the served user, enables the served userto establish communication with a busy called user (user B) by breaking into an established call between user Band a third user (user C). On successful intrusion, user C is either connected in a conference type connection withthe served user and user B or disconnected from user B (isolated).An intrusion request is only accepted if the served user has a higher Call Intrusion Capability Level (CICL) thanthe Call Intrusion Protection Level (CIPL) of both user B and user C.There are three implementation options that prov

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1