1、INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF TU 1.251.9 (07196) SERIES I: INTEGRATED SERVICES DIGITAL NETWORK Service capabilities - Supplementary services in ISDN Number identification supplementary services: calling name identif ication presentation ITU-T
2、 Recommendation 1.251.9 (Previously CCITT Recommendation) STD-ITU-T RECMN 1.251-7-ENGL 177b 48b2571 Ob21335 UT2 ITU-T 1 SERIES RECOMMENDATIONS INTEGRATED SERVICES DIGITAL NETWORK ;ENERAL STRUCTURE Terminology Description of ISDNs General modelling methods Telecommunication network and service attrib
3、utes General description of asynchronous transfer mode Scope General aspects of services in ISDN Common aspects of services in the ISDN Bearer services supported by an ISDN Teleservices supported by an ISDN SUPP es in ISDN Network functional principles Reference models Numbering, addressing and rout
4、ing Connection types Performance objectives Protocol layer requirements General network requirements and functions ;ERVICE CAPABILITIES 3VERALL NETWORK ASPECTS AND FUNCTIONS ISDN USER-NETWORK INTERFACES I. 100-1.1 99 1.110-1.119 I. 120-1.129 1.130-1.139 I. 140-1.149 I. I 50-1.1 99 I .200-1.299 I .20
5、0-1.209 1.210-1.219 I .220-1.229 I .230-1.239 1.240-1.249 1.250-1.299 I. 300-1.399 1.310-1.319 1.320-1.329 I. 3304.339 I. 3404.349 1.350-1.359 1.360-1.369 I .370-l. 399 1.400-1.499 Application of I-series Recommendations to ISDN user-network interfaces Layer 1 Recommendations Layer 2 Recommendations
6、 Layer 3 Recommendations Multiplexing, rate adaption and support of existing interfaces Aspects of ISDN affecting terminal requirements INTERNETWORK INTERFACES MAINTENANCE PRINCIPLES B-ISDN EQUIPMENT ASPECTS ATM equipment Management of ATM equipment 1.420-1.429 I .430-1.439 1.440-1.449 1.450-1.459 I
7、 .460-1.469 I .470-1.499 1.500-1.599 I .600-1.699 I .700-l. 799 I .730-l. 749 I .750-l. 799 For further details, please refer to ITU-T List of Recommendations ITU-T RECOMMENDATION 1.251.9 NUMBER IDENTIFICATION SUPPLEMENTARY SERVICES: CALLING NAME IDENTIFICATION PRESENTATION Source PU-T Recommendatio
8、n 1.251.9 was prepared by ITU-T Study Group 1 (1993-1996) and was approved under the WTSC Resolution No 1 procedure on the 19th of July 1996. STD-ITU-T RECMN 1-251*9-ENGL 199b = 48bZ.591 Ob21337 775 W FOREWORD ITU (International Telecommunication Union) is the United Nations Specialized Agency in th
9、e field of telecommunications. The JTU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. Some 179 member countries, 84 telecom operating entities, 145 scientific and industrial organizations and 38 international organizations participate in ITU-T which is the body whi
10、ch sets world telecommunications standards (Recommendations). The approval of Recommendations by the Members of FU-T is covered by the procedure laid down in WTSC Resolution No. 1 (Helsinki, 1993). In addition, the World Telecommunication Standardization Conference (WTSC), which meets every four yea
11、rs, approves Recommendations submitted to it and establishes the study programme for the following period. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. NOTE In this Recommendation, the expres
12、sion “Administration” is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. O ITU 1996 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
13、 and microfilm, without permission in writing from the ITU. 11 Recommendation 1.251.9 (07196) STD-ITU-T RECMN 1-251.7-ENGL 177b iBb2571 Ob21338 BOL 1 2 2.1 2.2 3 3.1 3.2 3.3 4 5 5.1 5.2 6 6.1 6.2 6.3 6.4 6.5 6.6 6.7 CONTENTS Definition . Description . General description Specific terminology Procedu
14、res Provision/withdraw al . Normal procedures . 3.2.1 Activatiotddeactivatiordregistration . 3.2.2 Invocation and operation Exceptional procedures Network capabilities for charging . lnterworking considerations . lnterworking with non-ISDNs lnterworking with private ISDNs . Interactions with other s
15、upplementary services . Advice of charge services 6.1.1 Charging information at call set-up time (AOC-S) 6.1.2 Charging information during the call (AOC-D) . 6.1.3 Charging information at the end of the call (AOC-E) Call hold (HOLD) Call transfer services 6.3.1 Explicit Call Transfer (ECT) 6.3.2 Nor
16、mal Call Transfer (NCT) Call Waiting (CW) . Closed User Group (CUG) . Completion of calls services 6.6.1 Completion of Calls on No Reply (CCNR) 6.6.2 Completion of Calls to Busy Subscribers (CCBS) . Conference services 6.7.1 Conference calling (CONF) 6.7.2 Meet-Me Conference (MMC) . 6.7.3 Preset Con
17、ference Calling (PCC) . 6.7.4 Three-Party Service (3PTY) . Recommendation 1.251.9 (07/96) Page 1 1 2 3 3 3 3 3 4 . 111 6.8 6.9 6.10 6.1 1 6.12 6.13 6.14 6.15 6.16 6.17 6.18 6.19 6.20 6.2 1 6.22 6.23 7 Diversion services 6.8.1 Call Deflection (CD) 6.8.2 6.8.3 6.8.4 6.8.5 Call Forwarding Busy (CFB) Ca
18、ll Forwarding No Reply (CFNR) Call Forwarding Unconditional (CFU) . Selective Call Forwarding (SCF) Direct-Dialling-In (DDI) Incall Modification (IM) ISDN Freephone Service (IFS) Line Hunting (LH) . Malicious Call Identification (MCID) . Multi-Level Precedence and Preemption (MLPP) . Multiple Subscr
19、iber Number (MSN) . Name identification services 6.16.1 Calling Name Identification Presentation (CNIP) 6.16.2 Calling Name Identification Restriction (CNIR) Number identification services 6.17.1 Calling Line Identification Presentation (CLIP) . 6.17.2 Calling Line Identification Restriction (CLIR)
20、. 6.17.3 Connected Line Identification Presentation (COLP) 6.17.4 Connected Line Identification Restriction (COLR) Outgoing Call Barring (OCB) Reverse charging (REV) Sub-addressing (SUB) . Support of Private Numbering Plan (SPNP) Terminal Portability (TP) . User-to-User Signalling (UUS) SDL descript
21、ion . Page 5 5 5 5 5 5 5 5 6 6 6 6 6 6 6 6 6 6 6 6 6 7 7 7 7 7 7 7 iv Recommendation 1.251.9 (07/96) STD-ITU-T RECMN 1.251-9-ENGL 177b = 48b2571 Ob21340 qbT Recommendation 1.251.9 NUMBER IDENTIFICATION SUPPLEMENTARY SERVICES: CALLING NAME IDENTIFICATION PRESENTATION (Geneva, 1996) 1 Definition calli
22、ng name identification presentation (CNIP) is a supplementary service offered to the called party which provides name information associated with the calling party to the called party. 2 Description 2.1 General description Calling name identification presentation service provides name information (t
23、he calling party name or an indication of privacy or unavailability) to the called party. The storage and delivery of the calling party name are network functions. The calling party takes no action to activate, initiate, or in any manner provide calling name identification presentation. The called p
24、arty, when subscribed to calling name identification presentation, automatically receives the name information when the presentation service is active. Delivery of a calling name may be affected by a subscriber of the calling name identification restriction service (for example, a subscriber of call
25、ing name identification restriction who invokes “privacy“ when initiating a call would cause an indication of “private“ to be delivered to a calling name identification presentation subscriber). 2.2 Specific terminology For the purposes of this Recommendation, the following definitions apply. 2.2.1
26、calling name: Information associated with a specific calling party number. The maximum length is at least 15 characters and may be up to 50 characters. The exact length, format and character set (e.g. T.5 1, T.52) of the calling name to be delivered is a service provider option. 2.2.2 calling name i
27、dentification user: This is the party who subscribes to the calling name identification presentation service and is the called party and has calling name identification presentation activated. 2.2.3 name information: The calling name, if available, or an indication of privacy or an indication of una
28、vailability. In addition to the name, the character set used shall be identified to enable the correct presentation of special characters, etc. to the user. 2.2.4 network: In this description, network refers to all the ISDN telecommunications equipment that has any part in processing a call or a sup
29、plementary service for the user referred to. It does not include the ISDN terminal. 2.2.5 service provider: This is a company, organization, administration, business, etc. that sells, administers, charges for, etc. the service. The service provider may or may not be the provider of the network. Reco
30、mmendation 1.251.9 (07/96) 1 3 Procedures Subscription options Calling name identification presentation 3.1 Provision/withdrawal The calling name identification presentation service can be provided on a subscription basis, or as a service provider option, can be provided to some or all users without
31、 subscription. The calling name identification presentation service can be withdrawn for administrative reasons or at the request of the subscriber. Values Yes Yes and able to activate/deactivate No As a service provider option, the calling name identification presentation service can be offered wit
32、h several subscription options. The options apply separately to each ISDN number, per ISDN number and bearer service, or per interface as listed in Table 1. The service provider may not differentiate between 3.1 kHz audio and speech bearer capabilities for the purpose of assigning subscription optio
33、ns. If the calling name identification presentation service is provided to all users without subscription, the service provider shall assign subscription values. TABLE M.25 1.9 Subscription options for the calling name identification presentation service (per ISDN number, per ISDN number and bearer
34、service, or per interface) 3.2 Normal procedures 3.2.1 Activation/deactivation/registration The activation and deactivation of calling name identification presentation can be done in two ways based on a subscription option: 1) If the user intends that name information be delivered for all calls, the
35、n the service is always active when provisioned and remains active until the service provider withdraws the service. 2) If the user requires the capability to activate and deactivate calling name identification presentation, then the service is active when the user indicates activation to the networ
36、k and deactivated when the user indicates deactivation to the network. 3.2.2 Invocation and operation If the served user is subscribed to the calling name identification presentation service, the called party will receive name information at the same time as receiving a call establishment request. 3
37、.3 Exceptional procedures The calling name identification presentation user will be sent an indication that name information is unavailable if the network does not have name information for a specific caller. There are two cases where the calling name is not presented to the served user: 1) If the n
38、etwork has been unable to determine the appropriate name information to deliver to the called party (e.g. due to interworking with a non-ISDN network), then name information with an indication of unavailability shall be delivered. 2 Recommendation 1.251.9 (07/96) STD-ITU-T RECMN 1*25L*9-ENGL L77b =
39、Li8b257L Ob2L3Li2 232 2) When the calling party has an arrangement (see definition of calling name identification restriction) whereby presentation of calling name is not allowed, in which case an indication of privacy shall be delivered. The calling name identification presentation user may be sent
40、 name information that is unrecognizable since the network does not check for validity of transmitted name information. 4 Network capabilities for charging This Recommendation does not cover charging principles. Future Recommendations in the D-series are expected to contain that information. It shal
41、l be possible for the service provider to charge the subscriber accurately for this service. 5 lnterworking considerations In the case where the calling and called users networks use different character sets there may be a possibility to perform translation. This function is outside the scope of thi
42、s Recommendation. 5.1 lnterworking with non-ISDNs When the served users network supports a smaller maximum calling name length than that of the calling user, and the length of the calling name supplied exceeds this maximum, then the name shall be truncated and characters in excess of this maximum sh
43、all not be presented. 5.2 lnterworking with private ISDNs Calls originating in private ISDNs may include the calling name identification. If this information is missing, then the private network calling line identification is used to determine the associated calling name. 6 Interactions with other s
44、upplementary services 6.1 Advice of charge services 6.1.1 No impact, i.e. neither supplementary service affects the operation of the other supplementary service. Charging information at call Set-up time (AOC-S) 6.1.2 No impact, i.e. neither supplementary service affects the operation of the other su
45、pplementary service. Charging information during the call (AOC-D) 6.1.3 No impact, i.e. neither supplementary service affects the operation of the other supplementary service. Charging information at the end of the call (AOC-E) 6.2 Call hold (HOLD) No impact, i.e. neither supplementary service affec
46、ts the operation of the other supplementary service. Recommendation 1.251.9 (07/96) 3 6.3 Call transfer services Each call in the context of call transfer is treated separately for calling name identification presentation, Each called party would receive the calling partys name information during th
47、e alerting phase of each call. 6.3.1 Explicit Call Transfer (ECT) No impact, i.e. neither supplementary service affects the operation of the other supplementary service. 6.3.2 Normal Call Transfer (NCT) No impact, i.e. neither supplementary service affects the operation of the other supplementary se
48、rvice. 6.4 Call Waiting (CW) No impact, i.e. neither supplementary service affects the operation of the other supplementary service. Therefore, when an end user, who subscribes to calling name identification presentation has call waiting service active, the name information should be delivered when
49、the call is offered to the end user. 6.5 Closed User Group (CUG) No impact, i.e. neither supplementary service affects the operation of the other supplementary service. 6.6 Completion of calls services 6.6.1 No impact, i.e. neither supplementary service affects the operation of the other supplementary service. NOTE - If user A accepts a CCNR recall, the resulting call is a normal call and destination B may Completion of Calls on No Reply (CCNR) receive calling name identification presentation. 6.6.2 No impact, i.e. neither supplementary service affects the operation of the other
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1