1、Standard ECMA-2022nd Edition - June 1997Standardizing Information and Communication SystemsPhone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http:/www.ecma.ch - Internet: helpdeskecma.chPrivate Integrated Services Network(PISN) -Specification, Functional Model andInformation Flows -Call Intrusi
2、on Supplementary Service.Standard ECMA-2022nd Edition - June 1997Standardizing Information and Communication SystemsPhone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http:/www.ecma.ch - Internet: helpdeskecma.chIW E-202-ii.doc 18-08-97 16,57Private Integrated Services Network(PISN) -Specificati
3、on, Functional Model andInformation Flows -Call Intrusion Supplementary Service(CISD).Brief HistoryThis Standard is one of a series of ECMA Standards defining services and signalling protocols applicable to Private IntegratedServices Networks (PISNs). The series uses ISDN concepts as developed by IT
4、U-T and conforms to the framework ofInternational Standards for Open Systems Interconnection as defined by ISO/IEC. It has been produced under ITSTC workitem M-IT-05 2.2 and under ETSI work item DE/ECMA-00010.This particular Standard specifies the Call Intrusion (CI) supplementary service.This Stand
5、ard is based upon the practical experience of ECMA member companies and the results of their active andcontinuous participation in the work of ISO/IEC JTC1, ITU-T, ETSI and other international and national standardizationbodies. It represents a pragmatic and widely based consensus.Compared to the 1s
6、t Edition of Standard ECMA-202 (published by ECMA in December 1993), this 2nd Edition incorporateschanges in order to achieve complete alignment with International Standard ISO/IEC 14845:1996(E) published by ISO/IEC inSeptember 1996.Adopted as 2nd Edition of Standard ECMA-202 by the General Assembly
7、 of June 1997.- i -Table of contents1 Scope 12 Conformance 13 References (normative) 14 Definitions 24.1 External definitions 24.2 Other definitions 34.2.1 Busy 34.2.2 Conference type connection 34.2.3 Consultation 34.2.4 Consultation timer 34.2.5 Established call 34.2.6 Forced release 34.2.7 Immedi
8、ate invocation 34.2.8 Impending intrusion state 34.2.9 Impending intrusion warning notification 34.2.10 Implementation option 34.2.11 Intruding call 34.2.12 Intrusion state 44.2.13 Intruding call connected notification 44.2.14 Isolation 44.2.15 Path retention 44.2.16 Aerved user 44.2.17 Time to intr
9、usion 44.2.18 User B 44.2.19 User C 44.2.20 Wait on busy state 45 Acronyms 46 SS-CI stage 1 specification 56.1 Description 56.1.1 General description 56.1.2 Qualifications on applicability to telecommunication services 56.2 Procedures 56.2.1 Provision/withdrawal 56.2.2 Normal procedures 66.2.3 Excep
10、tional procedures 86.3 Interactions with other supplementary services and ANFs 96.3.1 Calling Line Identification Presentation (SS-CLIP) 96.3.2 Connected Line Identification Presentation (SS-COLP) 9- ii -6.3.3 Calling/Connected Line Identification Restriction (SS-CLIR) 96.3.4 Calling Name Identifica
11、tion Presentation (SS-CNIP) 96.3.5 Connected Name Identification Presentation (SS-CONP) 96.3.6 Calling/Connected Name Identification Restriction (SS-CNIR) 96.3.7 Completion of Calls to Busy Subscriber (SS-CCBS) 106.3.8 Completion of Calls on No Reply (SS-CCNR) 106.3.9 Call Transfer (SS-CT) 106.3.10
12、Call Forwarding Unconditional (SS-CFU) 106.3.11 Call Forwarding Busy (SS-CFB) 106.3.12 Call Forwarding No Reply (SS-CFNR) 106.3.13 Call Deflection (SS-CD) 116.3.14 Path Replacement (ANF-PR) 116.3.15 Do Not Disturb (DND) 116.3.16 Do Not Disturb Override (DNDO) 116.3.17 Call Offer (CO) 116.4 Interwork
13、ing considerations 116.5 Overall SDL 117 SS-CI stage 2 specification 207.1 Functional model 207.1.1 Functional model description 207.1.2 Description of functional entities 217.1.3 Relationship of functional model to basic call functional model 227.2 Information flows 237.2.1 Definition of informatio
14、n flows 237.2.2 Relationship of information flows to basic call information flows 297.2.3 Examples of information flow sequences 327.3 Functional entity actions 427.3.1 Functional entity actions of FE1 427.3.2 Functional entity actions of FE2 437.3.3 Functional entity actions of FE3 447.3.4 Function
15、al entity actions of FE4 457.3.5 Functional entity actions of FE5 457.4 Functional entity behaviour 457.4.1 Behaviour of FE1 467.4.2 Behaviour of FE2 547.4.3 Behaviour of FE3 647.4.4 Behaviour of FE4 727.4.5 Behaviour of FE5 737.5 Allocation of functional entities to physical equipment 747.6 Interwo
16、rking considerations 741ScopeThis Standard specifies the Call Intrusion supplementary service (SS-CI), which is applicable to various basic servicessupported by Private Integrated Services Networks (PISN). Basic services are specified in ECMA-142.Call Intrusion (SS-CI) is a supplementary service whi
17、ch, on request from the served user, enables the served user toestablish communication with a busy called user (user B) by breaking into an established call between user B and athird user (user C).Supplementary service specifications are produced in three stages, according to the method described in
18、 ETS 300 387.This Standard contains the stage 1 and stage 2 specifications of SS-CI. The stage 1 specification (clause 6) specifiesthe supplementary service as seen by users of PISNs. The stage 2 specification (clause 7) identifies the functionalentities involved in the supplementary service and the
19、 information flows between them.NOTEFor this Standard, stage 2 does not consider the split of functionality between a functional terminal at user B and thelocal PINX. Terminal functions and local PINX functions at user B are included in the same Functional Entity.2 ConformanceIn order to conform to
20、this Standard, a stage 3 standard shall specify signalling protocols and equipment behaviour thatare capable of being used in a PISN which supports the supplementary service specified in this Standard. This meansthat, to claim conformance, a stage 3 standard is required to be adequate for the suppor
21、t of those aspects of clause 6(stage 1) and clause 7 (stage 2) which are relevant to the interface or equipment to which the stage 3 standard applies.3 References (normative)The following standards contain provisions which, through reference in this text, constitute provisions of this Standard.All s
22、tandards are subject to revision, and parties to agreements based on this Standard are encouraged to investigate thepossibility of applying the most recent editions of the standards indicated below.In the case of references to ECMA Standards that are aligned with ISO/IEC International Standards, the
23、 number of theappropriate ISO/IEC International Standard is given in brackets after the ECMA reference.ECMA-142 Private Integrated Services Network - Circuit-mode 64 kbit/s Bearer Services - ServiceDescription, Functional Capabilities and Information Flows (International StandardISO/IEC 11574)ECMA-1
24、48 Private Integrated Services Network - Specification, Functional Model and Information Flows -Identification Supplementary Services (International Standard ISO/IEC 14136)ECMA-163 Private Integrated Services Network - Specification, Functional Model and Information Flows -Name Identification Supple
25、mentary Services (International Standard ISO/IEC 13864)ECMA-173 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Diversion Supplementary Services (International Standard ISO/IEC 13872)ECMA-175 Private Integrated Services Network - Specification, Funct
26、ional Model and Information Flows -Path Replacement Additional Network Feature (International Standard ISO/IEC 13863)ECMA-177 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Transfer Supplementary Service (International Standard ISO/IEC 13865)ECMA-18
27、5 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Completion Supplementary Services (International Standard ISO/IEC 13866)ECMA-191 Private Integrated Services Network - Specification, Functional Model and Information Flows -Call Offer Supplementary S
28、ervice (International Standard ISO/IEC 14841)ECMA-193 Private Integrated Services Network - Specification, Functional Model and Information Flows -Do Not Disturb and Do Not Disturb Override Supplementary Services (International StandardISO/IEC 14842)- 2 -ISO/IEC 11571 Information technology - Teleco
29、mmunications and information exchange between systems -Numbering and sub-addressing in private integrated services networksISO/IEC 11579-1 Information technology - Telecommunications and information exchange between systems -Private Integrated Services Network - Part 1: Reference configuration for P
30、ISN Exchanges(PINX)ETS 300 387 Private Telecommunication Network (PTN); Method for the specification of basic andsupplementary services (1994)ITU-T Rec. I.112 Vocabulary of terms for ISDNs (1993)ITU-T Rec. I.210 Principles of telecommunication services supported by an ISDN and the means to describe
31、them(1993)ITU-T Rec. I.221 Common specific characteristics of services (1993)ITU-T Rec. Z.100 Specification and description language (1993)4 DefinitionsFor the purposes of this Standard, the following definitions apply.4.1 External definitionsThis Standard uses the following terms defined in other d
32、ocuments: Basic service (ITU-T Rec. I.210) Calling Party Name (ECMA-163) Connection (ITU-T Rec. I.112) Integrated Services Digital Network (ITU-T Rec. I.112) Name (ECMA-163) Network Determined User Busy (ITU-T Rec. I.221) Number (ISO/IEC 11571) Private Integrated Services Network (PISN) (ISO/IEC 115
33、79-1) Private Integrated Services Network Exchange (PINX) (ISO/IEC 11579-1) Service (ITU-T Rec. I.112) Signalling (ITU-T Rec. I.112) Subaddress (ISO/IEC 11571) Supplementary Service (ITU-T Rec. I.210) User (ECMA-142) User Determined User Busy (ITU-T Rec. I.221)This Standard refers to the following b
34、asic call functional entity (FEs) defined in ECMA-142: Call Control (CC) Call Control Agent (CCA)This Standard refers to the following basic call inter-FE relationships defined in ECMA-142: r1 r2 r3- 3 -This Standard refers to the following basic call information flows defined in ECMA-142: Disconnec
35、t request/indication Release request/indication Release response/confirmation Setup request/indication Setup response/confirmation.This Standard refers to the following basic call information flow service elements defined in ECMA-142: Destination Number Connection type.This Standard refers to the fo
36、llowing information flow elements defined in ECMA-148: Originating number Originating subaddress.4.2 Other definitions4.2.1 BusyA property of a user for whom either a Network Determined User Busy or User Determined User Busy conditionexists.4.2.2 Conference type connectionA connection between the se
37、rved user, user B and user C, where all users have user information connection witheach other.4.2.3 ConsultationInvocation of SS-CI after the calling user has been informed that a call has failed because of busy at thedestination.4.2.4 Consultation timerA timer governing the time in which the callin
38、g user is allowed to request invocation of SS-CI after beinginformed that a call has failed because of busy at the destination. The duration of the timer is an implementationoption.4.2.5 Established callThe active call that is selected for intruding on.4.2.6 Forced releaseThe release of the establis
39、hed call on request from the served user during the intrusion state.4.2.7 Immediate invocationInvocation of SS-CI as part of the initial call set up.4.2.8 Impending intrusion stateThe condition of an established call and an intruding call after provision of an impending intrusion warningnotification
40、 and before establishment of communication between the served user and user B.4.2.9 Impending intrusion warning notificationA notification provided before communication is established between the served user and user B.4.2.10 Implementation optionAn option for the implementor of the service to inclu
41、de or not to include in the service providing system.4.2.11 Intruding callA call in which the served user requests SS-CI.- 4 -4.2.12 Intrusion stateThe condition of an established call after establishment of communication between the served user and user Band prior to termination of SS-CI or invocat
42、ion of wait on busy.4.2.13 Intruding call connected notificationA notification provided on establishment of communication between the served user and user B.4.2.14 IsolationThe breaking of the user information connection to and from user C during the intrusion state.4.2.15 Path retentionThe retainin
43、g of the network connection between the originating CC and the destination CC so that asupplementary service (such as SS-CI) can be invoked without establishing a new connection.4.2.16 Served userThe user who requests SS-CI.4.2.17 Time to intrusionThe duration of the impending intrusion state.4.2.18
44、 User BThe wanted user that is subject to the call intrusion.4.2.19 User CThe other user in the established call.4.2.20 Wait on busy stateA state that can be entered from the intrusion state and in which the intruding call is disconnected from user Band is waiting for user B to answer the call.5 Acr
45、onymsANF Additional Network FeatureCC Call Control (functional entity)CCA Call Control Agent (functional entity)CCBS Call Completion to Busy SubscriberCCNR Call Completion No ReplyCD Call DeflectionCFB Call Forwarding BusyCFNR Call Forwarding No ReplyCFU Call Forwarding UnconditionalCI Call Intrusio
46、nCICL Call Intrusion Capability LevelCIPL Call Intrusion Protection LevelCLIP Calling Line Identification PresentationCLIR Calling/Connected Line Identification RestrictionCNIP Calling Name Identification PresentationCNIR Calling/Connected Name Identification RestrictionCO Call OfferCOLP Connected L
47、ine Identification Presentation- 5 -CONP Connected Name Identification PresentationCT Call TransferDND Do Not DisturbDNDO Do Not Disturb OverrideFE Functional EntityISDN Integrated Services Digital NetworkNDUB Network Determined User BusyPINX Private Integrated Services Network ExchangePISN Private
48、Integrated Services NetworkSDL Specification and Description LanguageSS Supplementary ServiceTE Terminal EquipmentUDUB User Determined User BusyWOB Wait On Busy6 SS-CI stage 1 specification6.1 Description6.1.1 General descriptionCall Intrusion (SS-CI) is a supplementary service which, on request fro
49、m the served user, enables the served userto establish communication with a busy called user (user B) by breaking into an established call between user Band a third user (user C). On successful intrusion, user C is either connected in a conference type connection withthe served user and user B or disconnected from user B (isolated).An intrusion request is only accepted if the served user has a higher Call Intrusion Capability Level (CICL) thanthe Call Intrusion Protection Level (CIPL) of both user B and user C.There are three implementation options that prov