ImageVerifierCode 换一换
格式:PDF , 页数:28 ,大小:774.15KB ,
资源ID:802327      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-802327.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T Q 81 7-1997 Stage 2 Description for Number Identification Supplementary Services Malicious Call Identification (MCID)《恶意呼叫识别(MCID)》.pdf)为本站会员(刘芸)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T Q 81 7-1997 Stage 2 Description for Number Identification Supplementary Services Malicious Call Identification (MCID)《恶意呼叫识别(MCID)》.pdf

1、 STD-ITU-T RECMN Q.81-7-ENGL 1797 H 48b2.591 Ob41007 Ob4 = INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU 4.81.7 (06197) SERIES Q: SWITCHING AND SIGNALLING Functions and information flows for services in the ISDN - Supplementary services Stage 2 descripti

2、on for number identification supplementary services: Malicious call identification (MCID) ITU-T Recommendation Q.81.7 (Previously CCITT Recommendation) STD-ITU-T RECMN Q.BL.7-ENGL 1777 LiBb2571 Ob41010 B8b m ITU-T Q-SERIES RECOMMENDATIONS SWITCHING AND SIGNALLING SIGNALLING IN THE INTERNATIONAL MANU

3、AL SERVICE INTERN ATION AL AUTOMATIC AND SEMI -AUTOMATIC WORK1 N G FUNCTIONS AND INFORMATION FLOWS FOR SERVICES IN THE ISDN Q.l-Q.3 Q.4-Q.59 Q.60-Q.99 Methodology Q. 60-Q .67 Basic services Q -68-Q.79 (1 CLAUSES APPLICABLE TO ITU-T STANDARD SYSTEMS Q.lOO-Q.119 SPECIFICATIONS OF SIGNALLING SYSTEMS No

4、. 4 AND No. 5 SPECIFICATIONS OF SIGNALLING SYSTEM No. 6 SPECIFICATIONS OF SIGNALLING SYSTEM RI SPECIFICATIONS OF SIGNALLING SYSTEM R2 DIGITAL EXCHANGES INTERWORKING OF SIGNALLING SYSTEMS SPECIFICATIONS OF SIGNALLING SYSTEM No. 7 DIGITAL SUBSCRIBER SIGNALLING SYSTEM No. 1 PUBLIC LAND MOBILE NETWORK I

5、NTERWORKING WITH SATELLITE MOBILE SYSTEMS INTELLIGENT NETWORK BROADBAND ISDN Q. 120-Q.249 Q.250-Q.309 Q.310-Q.399 Q.400-(2.499 Q.500-Q .599 Q.600-Q.699 Q. 700-Q 349 Q.850-Q.999 Q. I 000-Q. 1 O99 Q.llOO-Q.1199 Q.1200-Q.1999 Q.2000-Q.2999 For further details, please refer to ITU-T List of Recommendati

6、ons. ITU-T RECOMMENDATION Q.81.7 STAGE 2 DESCRIPTION FOR NUMBER IDENTIFICATION SUPPLEMENTARY SERVICES: MALICIOUS CALL IDENTIFICATION (MCID) Summary This Recommendation defines the stage 2 of the Integrated Services Digital Network (ISDN) as provided by telecommunications operators for the Malicious

7、Call Identification (MCID) supplementary service. Stage 2 identifies the functional capabilities and the information flows needed to support the service description. The stage 2 description also identifies user operations not directly associated with a call. The malicious call identification supplem

8、entary service allows the served user to alert the service provider that a malicious call has been received and requests that the service provider retain the calling information for the purpose of identifjkg the caller. The MCID supplementary service is available to all telecommunications services.

9、Source ITU-T Recommendation 4.81.7 was prepared by ITU-T Study Group 11 (1997-2000) and was approved under the WTSC Resolution No. 1 procedure on the 5th of June 1997. STD-ITU-T RECMN Q.BL-7-ENGL 1777 9 4662591 Ob41012 b59 W FOREWORD ITU (International Telecommunication Union) is the United Nations

10、Specialized Agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the IT. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommuni

11、cations on a worldwide basis. The World Telecommunication Standardization Conference (WTSC), which meets every four years, establishes the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations on these topics. The approval of Recommendations by the Members of the I

12、TU-T is covered by the procedure laid down in WTSC Resolution No. 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conc

13、iseness to indicate both a telecommunication administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS The ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. The ITU take

14、s no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, the ITU hadkad not received notice of intellectual

15、 property, protected by patents, which may be required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. O ITU 1998 All rights reserved. No part of this publica

16、tion may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the ITU. 11 Recommendation Q.81.7 (06/97) STD-ITU-T RECMN Q-81J-ENGL 1997 48b2591 Ob41013 575 W 7 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 7.9 7.1

17、0 CONTENTS Page Malicious Call Identification (MCID) Scope References Definitions Symbols and abbreviations . Description . Derivation of the functional model . 7.6.1 The functional model description 7.6.2 Description of the functional entities 7.6.3 Information flows . Relationship with a basic ser

18、vice 7.7.1 Information flow diagrams 7.7.2 Definitions of individual information flows SDL diagrams for functional entities . 7.8.1 FE1 7.8.2 FE2 7.8.3 FE3 7.8.4 FE4 Functional Entity Actions (FEAs) 7.9.1 FEAs of FE1 7.9.2 FEAs of FE2 7.9.3 FEAs of FE3 7.9.4 FEAs of FE4 Allocation of functional enti

19、ties to physical localities . Annex A . Procedure to be included in the basic call process (Recommendation Q.71 4) 1 1 1 2 2 4 4 7 8 8 9 11 19 19 19 19 20 20 21 22 Recommendation Q.81.7 (06/97) iii - Recommendation 4.81.7 STAGE 2 DESCRIPTION FOR NUMBER IDENTIFICATION SUPPLEMENTARY SERVICES: MALICIOU

20、S CALL IDENTIFICATION (MCID) (Geneva, 1997) 7 Malicious Call Identification (MCID) 7.1 Scope This Recommendation defines the stage 2 of the Integrated Services Digital Network (ISDN) as provided by telecommunications operators for the Malicious Call Identification supplementary service (MCID). Stage

21、 2 identifies the functional capabilities and the information flows needed to support the service description. The stage 2 description also identifies user operations not directly associated with a call (Recommendation I. 130 i). This Recommendation is specified according to the methodology specifie

22、d in Recommendation 4.65 2. This Recommendation does not formally describe the relationship between this supplementary service and the basic call. Where possible this information is included for guidance however. This Recommendation does not speci all users of this Recommendation are therefore encou

23、raged to investigate the possibility of applying the Recommendation 4.81.7 (06/97) 1 most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. il CCITT Recommendation 1.130 (1988), Method for the characte

24、rization of telecommunication sewices supported by an ISDN and network capabilities of an ISDN. 2 CCITT Recommendation 4.65 (1988), Stage 2 of the method for the characterization of services supported by an ISDN. 3 ITU-T Recommendation 1.1 12 (1993), Vocabulary of terms for ISDNs. 4 ITU-T Recommenda

25、tion 4.7 1 (1 993), ISDN circuit mode switched bearer services. 5 ITU-T Recommendation 2.1 O0 (1 993), CCITT SpeciJication and Description Language (SDL). 6 CCITT Recommendation Q.9 (i 988), Vocabulary of switching and signalling terms. 7 ITU-T Recommendation Z. 120 (1 993), Message sequence chart (

26、MSC). 8 CCITT Recommendation 1.25 1.7 (1 992), Number IdentiJcation supplementary services: Malicious Call Identijkation. 7.3 Definitions This Recommendation defines the following terms: - - Integrated Services Digital Network (ISDN): see 2.3h.112 3, definition 308. Service; telecommunications servi

27、ce: see 2.2/I. 1 12 3, definition 201. 7.4 Symbols and abbreviations This Recommendation uses the following symbols and abbreviations: CC CCA CLI Calling Line Identity FE Functional Entity FEA Functional Entity Action ISDN Integrated Services Digital Network LE Local Exchange MCID Malicious Call Ide

28、ntification PNX Private Network Exchange TE Terminal Equipment Call Control, typically a LE Call Control Agent, typically a TE 7.5 Description Not applicable. 2 Recommendation Q.81.7 (06197) - 7.6 Derivation of the functional model 7.6.1 The functional model description The functional model for the

29、MCID supplementary service is shown in Figure 7-1. T11814-96 NOTE 1 - This model recognizes that a PNX (NK!) will require service control functionality (Le. FE2) to be provided by the PNX. For the case where no PNX is involved, e.g. TE directly connected, generally by basic access, neither FE2 nor r

30、elationship rb exists. NOTE 2 - It is assumed that a PNX uses access link clearing procedures independent of the extension clearing procedures. FE2 shall meet the requirements of the stage 1 service description and shall not delay the access throughput. NOTE 3 - FE4 provides CLI, when requested from

31、 FE3. Figure 7-UQ.81.7 7.6.2 The Functional Entities (FES) required by the MCID supplementary service above those of the basic call are as follows: - - - - Description of the functional entities FE1 : MCID agent of the served user; FE2: MCID control of served PNX user; FE3 : MCID control of served u

32、ser; FE4: MCID control of the call originating network entity. Recommendation 4.81.7 (06/97) 3 7.6.3 The relationship to a basic service is shown in Figure 7-2. NOTE - The basic call model is defined in 2.VQ.71 4 with the exception that rl represents an outgoing call relationship from a CCAA and r3

33、represents an incoming call relationship to a CCA. Relationship with a basic service FE5 7 FE7 FET3 T118149O-96 NOTE 1 - For the case where no PNX is involved, e.g. TE directly connected, generally by basic access, neither FEZ nor relationship rb exists NOTE 2 - Information flows between FE4 and FE5

34、 and infomation flows between FE3, FE6 and FE7 are not shown. Figure 7-2/Q.81.7 7.7 Information flows 7.7.1 Information flow diagrams The initiation of functional entity actions at functional entities and the information flow between FES is shown in the following diagrams. 7.7.1.1 See Figure 7-3. En

35、try into the MCID service at FE3 Il FE3 Il SETUP req. 931 i. b 931a 933 934 T1 I4738092 Figure 7-3/Q.81.7 4 Recommendation 4.81.7 (06/97) - 7.7.1.2 Information request towards FE4 upon detection of incomplete SETUP contents for MCID service at FE3 t. . +I req. See Figure 7-4. 934 b 935 341 DISCONNEC

36、T b. 933 req. ra Fa u SETUP req. 241 I. (no CLI) Il 1938 SETUP req. )I. b T11473SU-92 NOTE -Detection of insufficient contents of SETUP for MCID service will prevent basic call from being established across the access until INFORM 3 resp. received or timer Tmcid.2 expire. Timer Tmcid.2 expiry will r

37、esult in call clearing. Timer Tmcid.2 is equivalent to the appropriate network timer T33. Figure 7-4/Q.81.7 7.7.1.3 Functions of FE3 when calling party clears before the served user invokes the MCID service See Figure 7-5. RELEASE 341 I I I T1147400-92 Figure 7-9Q.81.7 Recommendation 4.81.7 (06/97)

38、5 7.7.1.4 See Figure 7-6. Invocation of the MCID supplementary service (directly connected served user) C 91 1 MCID req. 912 I I I MCID req. 1 F FE3 935 933 939 930 - . I I CC MCiD conf. d I914 I MCIDconf. T1147410-92 II NOTE -Depending upon the implementation and the capabilities of the signalling

39、system used, the MCiD supplementary service information may also be printed out at the originating local exchange. Figure 7-6/Q.81.7 7.7.1.5 See Figure 7-7. Invocation of the MCID supplementary service (served user is PNX extension) rb IFEz(.rl. MCID req. MCiD resp. T1147420-92 NOTE -Depending upon

40、the implementation and the capabilities of the signalling system used, the MCID supplementary service information may also be printed out at the originating local exchange. Figure 7-7/Q.81.7 6 Recommendation Q.81.7 (06197) STD-ITU-T RECMN Q-81-7-ENGL 1997 48b259L Ob41020 725 7.7.1.6 Functions of FE2

41、 when calling party clears before served user (PNX extension) invokes the MCID service See Figure 7-8. 341 DISCONNECT . b req. 926 341 RELEASE 341 I. req. 332 RELEASE - ToMCiDFE MFORM 3 T118159M3 (-) Figure 7-20/Q.81.7 - FE4 7.9 Functional Entity Actions (FEAs) The following functional entity action

42、s shall be associated with each FE. 7.9.1 FEAs of FE1 9 1 1 : 9 12: 913: 914: 9 15 : receive the user MCID invoke instructions and respond 9 12. transmit MCID req. towards network. receive MCID resp. from FE2 or FE3 and respond 914. indicate to the user confirmation of successful MCID invocation. re

43、ceive MCID MCID FAILURE INDICATION req. and indicate rejection to user. 7.9.2 FEAs ofFE2 921 : detect a clearing request from network (e.g. RELEASE request or DISCONNECT request from the network) and respond 922,926. I 922: 923: start timer Tmcid.1 (equivalent to network timer T305 or T306). detecti

44、on of MCID req. fi-om FE1 and respond 924. Recommendation Q.81.7 (06/97) 19 STD-ITU-T RECMN Q-BL.7-ENGL 1997 iBb259L Obll1033 383 = 924: 925: 926: 927: 928: 929: NOTE - FE2 need not be present when this service is provided to a TE connected via the “T“ reference point only (i.e. no NT2 or “S“ refere

45、nce point). transmit MCID req. to FE3. detect called party clear request, respond 929, stop timer Tmcid.1 (if running), basic call FEA 342, i.e. normal clearing. delay response of clearing protocol (e.g. delay RELEASE COMPLETE or RELEASE) respond 923 (until expiry of Tmcid.1 then basic call FEA 341,

46、 i.e. normal clearing) and 925. detect MCID resp. and respond 928. transmit MCID resp. to FEI. transmit Called PARTY CLEAR INF. towards FE3. 7.9.3 FEAs ofFE3 93 1 : detect presence or absence of CLI information (basic call FEA 241a) and respond 93 la or 93 1 b. store CLI information as MCID informat

47、ion and respond 93A, 934,933. transmit INFORM 3 req. towards FE4,937,932 requesting CLI information if MCID is subscribed (optional in every case). receive INFORM 3 resp. from FE4, respond 931a and stop Tmcid.2. detect MCID req. and respond 930 and 939. detect calling party clear before MCID req. re

48、ceived from user and respond 935, optionally: respond 930 (automatic invocation). start timer Tmcid. 1 and retain MCID information within store for time period Tmcid. 1, respond 933 (expiry of Tmcid.1 shall result in 936). start timer Tmcid.2 (expiry of timer Tmcid.2 shall result in call clearing).

49、93 la: 93 1 b: 932: 933: 934: 93 5: 937: 938: stop timer Tmcid.2. 939: stop timer Tmcid.1. 930: 930a: 93A: 93B: printout: all stored MCID information and respond 930a. transmit MCID resp. to FE2 or FE1. receive “Alerting received flag = l“, respond 93B. detect “Calling Party cleared flag = 1“ after “Alerting received flag = l“, respond 934. 7.9.4 FEAs ofFE4 941: 942: 943 : receive INFORM 3 (MCID ENCOUNTERED req.) from FE3 and respond 942. gather (short-term store) all available calling party identity information an

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1