ITU-T Q 663-1988 Logic procedures for interworking of signalling system No 7 (TUP) to No 6《No 7(电话用户部分(TUP))至No 6信令系统互通的逻辑程序》.pdf

上传人:rimleave225 文档编号:801887 上传时间:2019-02-04 格式:PDF 页数:5 大小:94.04KB
下载 相关 举报
ITU-T Q 663-1988 Logic procedures for interworking of signalling system No 7 (TUP) to No 6《No 7(电话用户部分(TUP))至No 6信令系统互通的逻辑程序》.pdf_第1页
第1页 / 共5页
ITU-T Q 663-1988 Logic procedures for interworking of signalling system No 7 (TUP) to No 6《No 7(电话用户部分(TUP))至No 6信令系统互通的逻辑程序》.pdf_第2页
第2页 / 共5页
ITU-T Q 663-1988 Logic procedures for interworking of signalling system No 7 (TUP) to No 6《No 7(电话用户部分(TUP))至No 6信令系统互通的逻辑程序》.pdf_第3页
第3页 / 共5页
ITU-T Q 663-1988 Logic procedures for interworking of signalling system No 7 (TUP) to No 6《No 7(电话用户部分(TUP))至No 6信令系统互通的逻辑程序》.pdf_第4页
第4页 / 共5页
ITU-T Q 663-1988 Logic procedures for interworking of signalling system No 7 (TUP) to No 6《No 7(电话用户部分(TUP))至No 6信令系统互通的逻辑程序》.pdf_第5页
第5页 / 共5页
亲,该文档总共5页,全部预览完了,如果喜欢就下载吧!
资源描述

1、INTERNATIONAL TELECOMMUNICATION UNION)45G134 1 TELECOMMUNICATIONSTANDARDIZATION SECTOROF ITU).4%27/2+).G0G0/&G0G03).!,).G0G03934%-3,/)#G0G002/#%$52%3G0G0&/2).4%27/2+).G0G0/&G0G03).!,).3934%-G0G0.O G0 G0G0 450G9G0G04/G0G0.O G0 )45G134G0G0RecommendationG0G01 (Extract from the “LUEG0“OOK)NOTES1 ITU-T R

2、ecommendation Q.663 was published in Fascicle VI.6 of the Blue Book. This file is an extract fromthe Blue Book. While the presentation and layout of the text might be slightly different from the Blue Book version, thecontents of the file are identical to the Blue Book version and copyright condition

3、s remain unchanged (see below).2 In this Recommendation, the expression “Administration” is used for conciseness to indicate both atelecommunication administration and a recognized operating agency. ITU 1988, 1993All rights reserved. No part of this publication may be reproduced or utilized in any f

4、orm or by any means, electronic ormechanical, including photocopying and microfilm, without permission in writing from the ITU.Fascicle VI.6 - Rec. Q.663 1Recommendation Q.663Fascicle VI.6 - Rec. Q.663LOGIC PROCEDURES FOR INTERWORKING OF SIGNALLING SYSTEM No. 7 (TUP) TO No. 6Procedures not shownThe following procedure, not directly relevant to interworking, is not shown in the logic:P1- Procedure for repeat attempt.FIGURE 2/Q.663Notes to interworking of Signalling System No. 7 (TUP) to No. 62Fascicle VI.6 - Rec. Q.663Fascicle VI.6 - Rec. Q.6633

展开阅读全文
相关资源
猜你喜欢
  • BS ISO IEC 15944-10-2013 Information technology Business Operational View IT-enabled coded domains as semantic components in business transactions《信息技术 商业运作视图 作为商业交易中语义成分的启用IT编码的领域.pdf BS ISO IEC 15944-10-2013 Information technology Business Operational View IT-enabled coded domains as semantic components in business transactions《信息技术 商业运作视图 作为商业交易中语义成分的启用IT编码的领域.pdf
  • BS ISO IEC 15944-5-2008 Information technology - Business operational view - Identification and referencing of requirements of jurisdictional domains as sources of external constra.pdf BS ISO IEC 15944-5-2008 Information technology - Business operational view - Identification and referencing of requirements of jurisdictional domains as sources of external constra.pdf
  • BS ISO IEC 15944-8-2012 Information technology Business Operational View Identification of privacy protection requirements as external constraints on business transactions《信息技术 商业运.pdf BS ISO IEC 15944-8-2012 Information technology Business Operational View Identification of privacy protection requirements as external constraints on business transactions《信息技术 商业运.pdf
  • BS ISO IEC 15945-2002 Information technology - Security techniques - Specification of TTP services to support the application of digital signatures《信息技术 安全性技术 对数字签字进行支持的TTP服务业务的规范》.pdf BS ISO IEC 15945-2002 Information technology - Security techniques - Specification of TTP services to support the application of digital signatures《信息技术 安全性技术 对数字签字进行支持的TTP服务业务的规范》.pdf
  • BS ISO IEC 15946-5-2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Elliptic curve generation《信息技术 安全技术 基于椭圆曲线的密码技术 椭圆曲线类生成》.pdf BS ISO IEC 15946-5-2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Elliptic curve generation《信息技术 安全技术 基于椭圆曲线的密码技术 椭圆曲线类生成》.pdf
  • BS ISO IEC 15961-1-2013 Information technology Radio frequency identification (RFID) for item management Data protocol Application interface《信息技术 项目管理的射频识别(RFID) 数据协议 应用接口》.pdf BS ISO IEC 15961-1-2013 Information technology Radio frequency identification (RFID) for item management Data protocol Application interface《信息技术 项目管理的射频识别(RFID) 数据协议 应用接口》.pdf
  • BS ISO IEC 15961-2004 Information technology - Radio frequency identification (RFID) for item management - Data protocol - Application interface《信息技术 项目管理的射频识别(RFID) 数据协议 应用接口》.pdf BS ISO IEC 15961-2004 Information technology - Radio frequency identification (RFID) for item management - Data protocol - Application interface《信息技术 项目管理的射频识别(RFID) 数据协议 应用接口》.pdf
  • BS ISO IEC 15961-4-2016 Information technology Radio frequency identification (RFID) for item management Data protocol Application interface commands for battery assist and sensor .pdf BS ISO IEC 15961-4-2016 Information technology Radio frequency identification (RFID) for item management Data protocol Application interface commands for battery assist and sensor .pdf
  • BS ISO IEC 15962-2013 Information technology Radio frequency identification (RFID) for item management Data protocol data encoding rules and logical memory functions《信息技术 项目管理用无线射频.pdf BS ISO IEC 15962-2013 Information technology Radio frequency identification (RFID) for item management Data protocol data encoding rules and logical memory functions《信息技术 项目管理用无线射频.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1