ECMA 202-1997 Private Integrated Services Network (PISN) - Specification Functional Model and Information Flows - Call Intrusion Supplementary Service (CISD)《专用综合业务网络(PISN) 规范 功能模型.pdf

上传人:terrorscript155 文档编号:704670 上传时间:2019-01-03 格式:PDF 页数:88 大小:740.94KB
下载 相关 举报
ECMA 202-1997 Private Integrated Services Network (PISN) - Specification Functional Model and Information Flows - Call Intrusion Supplementary Service (CISD)《专用综合业务网络(PISN) 规范 功能模型.pdf_第1页
第1页 / 共88页
ECMA 202-1997 Private Integrated Services Network (PISN) - Specification Functional Model and Information Flows - Call Intrusion Supplementary Service (CISD)《专用综合业务网络(PISN) 规范 功能模型.pdf_第2页
第2页 / 共88页
ECMA 202-1997 Private Integrated Services Network (PISN) - Specification Functional Model and Information Flows - Call Intrusion Supplementary Service (CISD)《专用综合业务网络(PISN) 规范 功能模型.pdf_第3页
第3页 / 共88页
ECMA 202-1997 Private Integrated Services Network (PISN) - Specification Functional Model and Information Flows - Call Intrusion Supplementary Service (CISD)《专用综合业务网络(PISN) 规范 功能模型.pdf_第4页
第4页 / 共88页
ECMA 202-1997 Private Integrated Services Network (PISN) - Specification Functional Model and Information Flows - Call Intrusion Supplementary Service (CISD)《专用综合业务网络(PISN) 规范 功能模型.pdf_第5页
第5页 / 共88页
点击查看更多>>
资源描述

1、Standard ECMA-2022nd Edition - June 1997Standardizing Information and Communication SystemsPhone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http:/www.ecma.ch - Internet: helpdeskecma.chPrivate Integrated Services Network(PISN) -Specification, Functional Model andInformation Flows -Call Intrusi

2、on Supplementary Service.Standard ECMA-2022nd Edition - June 1997Standardizing Information and Communication SystemsPhone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http:/www.ecma.ch - Internet: helpdeskecma.chIW E-202-ii.doc 18-08-97 16,57Private Integrated Services Network(PISN) -Specificati

3、on, Functional Model andInformation Flows -Call Intrusion Supplementary Service(CISD).Brief HistoryThis Standard is one of a series of ECMA Standards defining services and signalling protocols applicable to Private IntegratedServices Networks (PISNs). The series uses ISDN concepts as developed by IT

4、U-T and conforms to the framework ofInternational Standards for Open Systems Interconnection as defined by ISO/IEC. It has been produced under ITSTC workitem M-IT-05 2.2 and under ETSI work item DE/ECMA-00010.This particular Standard specifies the Call Intrusion (CI) supplementary service.This Stand

5、ard is based upon the practical experience of ECMA member companies and the results of their active andcontinuous participation in the work of ISO/IEC JTC1, ITU-T, ETSI and other international and national standardizationbodies. It represents a pragmatic and widely based consensus.Compared to the 1s

6、t Edition of Standard ECMA-202 (published by ECMA in December 1993), this 2nd Edition incorporateschanges in order to achieve complete alignment with International Standard ISO/IEC 14845:1996(E) published by ISO/IEC inSeptember 1996.Adopted as 2nd Edition of Standard ECMA-202 by the General Assembly

7、 of June 1997.- i -Table of contents1 Scope 12 Conformance 13 References (normative) 14 Definitions 24.1 External definitions 24.2 Other definitions 34.2.1 Busy 34.2.2 Conference type connection 34.2.3 Consultation 34.2.4 Consultation timer 34.2.5 Established call 34.2.6 Forced release 34.2.7 Immedi

8、ate invocation 34.2.8 Impending intrusion state 34.2.9 Impending intrusion warning notification 34.2.10 Implementation option 34.2.11 Intruding call 34.2.12 Intrusion state 44.2.13 Intruding call connected notification 44.2.14 Isolation 44.2.15 Path retention 44.2.16 Aerved user 44.2.17 Time to intr

9、usion 44.2.18 User B 44.2.19 User C 44.2.20 Wait on busy state 45 Acronyms 46 SS-CI stage 1 specification 56.1 Description 56.1.1 General description 56.1.2 Qualifications on applicability to telecommunication services 56.2 Procedures 56.2.1 Provision/withdrawal 56.2.2 Normal procedures 66.2.3 Excep

10、tional procedures 86.3 Interactions with other supplementary services and ANFs 96.3.1 Calling Line Identification Presentation (SS-CLIP) 96.3.2 Connected Line Identification Presentation (SS-COLP) 9- ii -6.3.3 Calling/Connected Line Identification Restriction (SS-CLIR) 96.3.4 Calling Name Identifica

11、tion Presentation (SS-CNIP) 96.3.5 Connected Name Identification Presentation (SS-CONP) 96.3.6 Calling/Connected Name Identification Restriction (SS-CNIR) 96.3.7 Completion of Calls to Busy Subscriber (SS-CCBS) 106.3.8 Completion of Calls on No Reply (SS-CCNR) 106.3.9 Call Transfer (SS-CT) 106.3.10

12、Call Forwarding Unconditional (SS-CFU) 106.3.11 Call Forwarding Busy (SS-CFB) 106.3.12 Call Forwarding No Reply (SS-CFNR) 106.3.13 Call Deflection (SS-CD) 116.3.14 Path Replacement (ANF-PR) 116.3.15 Do Not Disturb (DND) 116.3.16 Do Not Disturb Override (DNDO) 116.3.17 Call Offer (CO) 116.4 Interwork

13、ing considerations 116.5 Overall SDL 117 SS-CI stage 2 specification 207.1 Functional model 207.1.1 Functional model description 207.1.2 Description of functional entities 217.1.3 Relationship of functional model to basic call functional model 227.2 Information flows 237.2.1 Definition of informatio

14、n flows 237.2.2 Relationship of information flows to basic call information flows 297.2.3 Examples of information flow sequences 327.3 Functional entity actions 427.3.1 Functional entity actions of FE1 427.3.2 Functional entity actions of FE2 437.3.3 Functional entity actions of FE3 447.3.4 Function

15、al entity actions of FE4 457.3.5 Functional entity actions of FE5 457.4 Functional entity behaviour 457.4.1 Behaviour of FE1 467.4.2 Behaviour of FE2 547.4.3 Behaviour of FE3 647.4.4 Behaviour of FE4 727.4.5 Behaviour of FE5 737.5 Allocation of functional entities to physical equipment 747.6 Interwo

16、rking considerations 741ScopeThis Standard specifies the Call Intrusion supplementary service (SS-CI), which is applicable to various basic servicessupported by Private Integrated Services Networks (PISN). Basic services are specified in ECMA-142.Call Intrusion (SS-CI) is a supplementary service whi

17、ch, on request from the served user, enables the served user toestablish communication with a busy called user (user B) by breaking into an established call between user B and athird user (user C).Supplementary service specifications are produced in three stages, according to the method described in

18、 ETS 300 387.This Standard contains the stage 1 and stage 2 specifications of SS-CI. The stage 1 specification (clause 6) specifiesthe supplementary service as seen by users of PISNs. The stage 2 specification (clause 7) identifies the functionalentities involved in the supplementary service and the

19、 information flows between them.NOTEFor this Standard, stage 2 does not consider the split of functionality between a functional terminal at user B and thelocal PINX. Terminal functions and local PINX functions at user B are included in the same Functional Entity.2 ConformanceIn order to conform to

20、this Standard, a stage 3 standard shall specify signalling protocols and equipment behaviour thatare capable of being used in a PISN which supports the supplementary service specified in this Standard. This meansthat, to claim conformance, a stage 3 standard is required to be adequate for the suppor

21、t of those aspects of clause 6(stage 1) and clause 7 (stage 2) which are relevant to the interface or equipment to which the stage 3 standard applies.3 References (normative)The following standards contain provisions which, through reference in this text, constitute provisions of this Standard.All s

22、tandards are subject to revision, and parties to agreements based on this Standard are encouraged to investigate thepossibility of applying the most recent editions of the standards indicated below.In the case of references to ECMA Standards that are aligned with ISO/IEC International Standards, the

23、 number of theappropriate ISO/IEC International Standard is given in brackets after the ECMA reference.ECMA-142 Private Integrated Services Network - Circuit-mode 64 kbit/s Bearer Services - ServiceDescription, Functional Capabilities and Information Flows (International StandardISO/IEC 11574)ECMA-1

24、48 Private Integrated Services Network - Specification, Functional Model and Information Flows -Identification Supplementary Services (International Standard ISO/IEC 14136)ECMA-163 Private Integrated Services Network - Specification, Functional Model and Information Flows -Name Identification Supple

25、mentary Services (International Standard ISO/IEC 13864)ECMA-173 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Diversion Supplementary Services (International Standard ISO/IEC 13872)ECMA-175 Private Integrated Services Network - Specification, Funct

26、ional Model and Information Flows -Path Replacement Additional Network Feature (International Standard ISO/IEC 13863)ECMA-177 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Transfer Supplementary Service (International Standard ISO/IEC 13865)ECMA-18

27、5 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Completion Supplementary Services (International Standard ISO/IEC 13866)ECMA-191 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Offer Supplementary S

28、ervice (International Standard ISO/IEC 14841)ECMA-193 Private Integrated Services Network - Specification, Functional Model and Information Flows -Do Not Disturb and Do Not Disturb Override Supplementary Services (International StandardISO/IEC 14842)- 2 -ISO/IEC 11571 Information technology - Teleco

29、mmunications and information exchange between systems -Numbering and sub-addressing in private integrated services networksISO/IEC 11579-1 Information technology - Telecommunications and information exchange between systems -Private Integrated Services Network - Part 1: Reference configuration for P

30、ISN Exchanges(PINX)ETS 300 387 Private Telecommunication Network (PTN); Method for the specification of basic andsupplementary services (1994)ITU-T Rec. I.112 Vocabulary of terms for ISDNs (1993)ITU-T Rec. I.210 Principles of telecommunication services supported by an ISDN and the means to describe

31、them(1993)ITU-T Rec. I.221 Common specific characteristics of services (1993)ITU-T Rec. Z.100 Specification and description language (1993)4 DefinitionsFor the purposes of this Standard, the following definitions apply.4.1 External definitionsThis Standard uses the following terms defined in other d

32、ocuments: Basic service (ITU-T Rec. I.210) Calling Party Name (ECMA-163) Connection (ITU-T Rec. I.112) Integrated Services Digital Network (ITU-T Rec. I.112) Name (ECMA-163) Network Determined User Busy (ITU-T Rec. I.221) Number (ISO/IEC 11571) Private Integrated Services Network (PISN) (ISO/IEC 115

33、79-1) Private Integrated Services Network Exchange (PINX) (ISO/IEC 11579-1) Service (ITU-T Rec. I.112) Signalling (ITU-T Rec. I.112) Subaddress (ISO/IEC 11571) Supplementary Service (ITU-T Rec. I.210) User (ECMA-142) User Determined User Busy (ITU-T Rec. I.221)This Standard refers to the following b

34、asic call functional entity (FEs) defined in ECMA-142: Call Control (CC) Call Control Agent (CCA)This Standard refers to the following basic call inter-FE relationships defined in ECMA-142: r1 r2 r3- 3 -This Standard refers to the following basic call information flows defined in ECMA-142: Disconnec

35、t request/indication Release request/indication Release response/confirmation Setup request/indication Setup response/confirmation.This Standard refers to the following basic call information flow service elements defined in ECMA-142: Destination Number Connection type.This Standard refers to the fo

36、llowing information flow elements defined in ECMA-148: Originating number Originating subaddress.4.2 Other definitions4.2.1 BusyA property of a user for whom either a Network Determined User Busy or User Determined User Busy conditionexists.4.2.2 Conference type connectionA connection between the se

37、rved user, user B and user C, where all users have user information connection witheach other.4.2.3 ConsultationInvocation of SS-CI after the calling user has been informed that a call has failed because of busy at thedestination.4.2.4 Consultation timerA timer governing the time in which the callin

38、g user is allowed to request invocation of SS-CI after beinginformed that a call has failed because of busy at the destination. The duration of the timer is an implementationoption.4.2.5 Established callThe active call that is selected for intruding on.4.2.6 Forced releaseThe release of the establis

39、hed call on request from the served user during the intrusion state.4.2.7 Immediate invocationInvocation of SS-CI as part of the initial call set up.4.2.8 Impending intrusion stateThe condition of an established call and an intruding call after provision of an impending intrusion warningnotification

40、 and before establishment of communication between the served user and user B.4.2.9 Impending intrusion warning notificationA notification provided before communication is established between the served user and user B.4.2.10 Implementation optionAn option for the implementor of the service to inclu

41、de or not to include in the service providing system.4.2.11 Intruding callA call in which the served user requests SS-CI.- 4 -4.2.12 Intrusion stateThe condition of an established call after establishment of communication between the served user and user Band prior to termination of SS-CI or invocat

42、ion of wait on busy.4.2.13 Intruding call connected notificationA notification provided on establishment of communication between the served user and user B.4.2.14 IsolationThe breaking of the user information connection to and from user C during the intrusion state.4.2.15 Path retentionThe retainin

43、g of the network connection between the originating CC and the destination CC so that asupplementary service (such as SS-CI) can be invoked without establishing a new connection.4.2.16 Served userThe user who requests SS-CI.4.2.17 Time to intrusionThe duration of the impending intrusion state.4.2.18

44、 User BThe wanted user that is subject to the call intrusion.4.2.19 User CThe other user in the established call.4.2.20 Wait on busy stateA state that can be entered from the intrusion state and in which the intruding call is disconnected from user Band is waiting for user B to answer the call.5 Acr

45、onymsANF Additional Network FeatureCC Call Control (functional entity)CCA Call Control Agent (functional entity)CCBS Call Completion to Busy SubscriberCCNR Call Completion No ReplyCD Call DeflectionCFB Call Forwarding BusyCFNR Call Forwarding No ReplyCFU Call Forwarding UnconditionalCI Call Intrusio

46、nCICL Call Intrusion Capability LevelCIPL Call Intrusion Protection LevelCLIP Calling Line Identification PresentationCLIR Calling/Connected Line Identification RestrictionCNIP Calling Name Identification PresentationCNIR Calling/Connected Name Identification RestrictionCO Call OfferCOLP Connected L

47、ine Identification Presentation- 5 -CONP Connected Name Identification PresentationCT Call TransferDND Do Not DisturbDNDO Do Not Disturb OverrideFE Functional EntityISDN Integrated Services Digital NetworkNDUB Network Determined User BusyPINX Private Integrated Services Network ExchangePISN Private

48、Integrated Services NetworkSDL Specification and Description LanguageSS Supplementary ServiceTE Terminal EquipmentUDUB User Determined User BusyWOB Wait On Busy6 SS-CI stage 1 specification6.1 Description6.1.1 General descriptionCall Intrusion (SS-CI) is a supplementary service which, on request fro

49、m the served user, enables the served userto establish communication with a busy called user (user B) by breaking into an established call between user Band a third user (user C). On successful intrusion, user C is either connected in a conference type connection withthe served user and user B or disconnected from user B (isolated).An intrusion request is only accepted if the served user has a higher Call Intrusion Capability Level (CICL) thanthe Call Intrusion Protection Level (CIPL) of both user B and user C.There are three implementation options that prov

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1