DE/SPS-03003.2

Signalizacijski protokoli in komutacija (SPS) - Vmesniki "V" pri digitalnih krajevnih centralah (LE) - Vmesnik V5.2 za podporo dostopovnega omrežja (AN) - 1. del: Specifikacija vmesnika V5.2

General Information

Status
Published
Publication Date
29-Sep-1994
Technical Committee
Current Stage
12 - Completion
Due Date
23-Aug-1994
Completion Date
30-Sep-1994

Buy Standard

Standard
ETS 300 347-1:1997
English language
271 pages
world standards week 20% off
Preview
world standards week 20% off
Preview

e-Library read for
1 day

Standards Content (sample)

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Signalizacijski protokoli in komutacija (SPS) - Vmesniki "V" pri digitalnih krajevnih centralah (LE) - Vmesnik V5.2 za podporo dostopovnega omrežja (AN) - 1. del: Specifikacija vmesnika V5.2Signalling Protocols and Switching (SPS) - V interfaces at the digital Local Exchange (LE); V5.2 interface for the support of Access Network (AN); Part 1: V5.2 interface specification33.040.30Komutacijski in signalizacijski sistemSwitching and signalling systemsICS:Ta slovenski standard je istoveten z:ETS 300 347-1 Edition 1SIST ETS 300 347-1:1997en01-november-1997SIST ETS 300 347-1:1997SLOVENSKI

STANDARD
SIST ETS 300 347-1:1997

EUROPEANETS 300 347-1TELECOMMUNICATIONSeptember 1994STANDARDSource: ETSI TC-SPSReference: DE/SPS-03003.2ICS:33.020, 33.080Key words:V interface, V5 interface, LE, ANSignalling Protocols and Switching (SPS);V interfaces at the digital Local Exchange (LE)V5.2 interface for the support of Access Network (AN)Part 1: V5.2 interface specificationETSIEuropean Telecommunications Standards InstituteETSI SecretariatPostal address: F-06921 Sophia Antipolis CEDEX - FRANCEOffice address: 650 Route des Lucioles - Sophia Antipolis - Valbonne - FRANCEX.400: c=fr, a=atlas, p=etsi, s=secretariat - Internet: secretariat@etsi.frTel.: +33 92 94 42 00 - Fax: +33 93 65 47 16Copyright Notification: No part may be reproduced except as authorized by written permission. The copyright and theforegoing restriction extend to reproduction in all media.© European Telecommunications Standards Institute 1994. All rights reserved.SIST ETS 300 347-1:1997New presentation - see History box

Page 2ETS 300 347-1: September 1994Whilst every care has been taken in the preparation and publication of this document, errors in content,typographical or otherwise, may occur. If you have comments concerning its accuracy, please write to"ETSI Editing and Committee Support Dept." at the address shown on the title page.SIST ETS 300 347-1:1997

Page 3ETS 300 347-1: September 1994ContentsForeword.....................................................................................................................................................11Introduction..................................................................................................................................................111Scope................................................................................................................................................152Normative references........................................................................................................................163Definitions, symbols and abbreviations.............................................................................................173.1Definitions..........................................................................................................................173.2Symbols and abbreviations................................................................................................184Electrical and physical interface requirements..................................................................................195Procedural interface requirements....................................................................................................195.1Link control requirements and procedures........................................................................195.1.1Link-ID verification.........................................................................................195.1.2Link blocking..................................................................................................206Services and architecture aspects and requirements.......................................................................206.1On-demand services..........................................................................................................216.1.1PSTN.............................................................................................................216.1.2ISDN Basic Access (ISDN-BA).....................................................................216.1.3ISDN Primary Rate Access (ISDN-PRA).......................................................216.2Permanent Line (PL) capability..........................................................................................216.3Semi-permanent leased line..............................................................................................216.4Permanent leased line service...........................................................................................217Control and provisioning....................................................................................................................227.1Control principles...............................................................................................................227.1.1General requirements and assumptions.......................................................227.1.2Control of ISDN-BA user port for the PL capability.......................................247.1.3Control of ISDN-PRA user ports when the PL capability is provided............247.1.3.1Statements and assumptions..............................................247.1.3.2ISDN and PL capability........................................................247.2Provisioning strategy and requirements.............................................................................257.2.1General..........................................................................................................257.2.2Provisioning requirements.............................................................................257.3Bearer Channel Connection (BCC)....................................................................................267.4Protection...........................................................................................................................268Protocol architecture and multiplexing structure...............................................................................268.1Functional description........................................................................................................268.2Protocol requirements for PSTN and ISDN.......................................................................278.3Time slots..........................................................................................................................288.4Time slot allocation for physical communication channels................................................288.4.1Data types for V5.2 C-paths..........................................................................298.4.2Communication paths when PSTN is provided on a V5.2 interface..............298.4.3Communication paths when ISDN is provided on a V5.2 interface...............298.5Layer 2 sublayering and multiplexing on communication channels...................................308.6Layer 3 multiplexing...........................................................................................................308.7Congestion control.............................................................................................................308.7.1Flow control end to end.................................................................................308.7.2Congestion control on the V5.2 interface......................................................308.7.3Blocking of ISDN user ports at layer 2..........................................................30SIST ETS 300 347-1:1997

Page 4ETS 300 347-1: September 19949Envelope Function sublayer of LAPV5 (LAPV5-EF).........................................................................3010Data Link sublayer of LAPV5 (LAPV5-DL).......................................................................................3110.1Frame structure for peer-to-peer communication.............................................................3110.2Invalid frames....................................................................................................................3110.3Elements of procedures and formats of fields for data link sublayer peer-to-peercommunication..................................................................................................................3110.3.1Link address field format..............................................................................3110.3.2Link address field variables..........................................................................3110.3.2.1Address field extension bit (EA)..........................................3110.3.2.2Command/response field bit...............................................3110.3.2.3V5DLaddr............................................................................3110.4Definition of the peer-to-peer procedures of the data link sublayer..................................3111AN frame relay sublayer...................................................................................................................3212Sublayer-to-sublayer communication and mapping function............................................................3213General layer 3 protocol structures...................................................................................................3213.1General..............................................................................................................................3213.2Information elements that appear in every message (header).........................................3313.2.1Protocol Discriminator information element..................................................3313.2.2Layer 3 Address information element...........................................................3313.2.3Message Type information element.............................................................3413.3Other information elements...............................................................................................3513.4Protocol message functional definition and information content.......................................3513.5Codesets...........................................................................................................................3514PSTN signalling protocol specification and layer 3 multiplexing.......................................................3515Control requirements and protocol...................................................................................................3515.1ISDN-BA user port status indication and control...............................................................3515.2PSTN user port status indication and control....................................................................3515.3ISDN primary rate user port status indication and control.................................................3615.3.1General aspects............................................................................................3615.3.2Events and function elements relevant for the control of the statemachines......................................................................................................3715.3.3ISDN-PRA user port FSMs, AN (ISDN port) and LE (ISDN port).................3915.3.3.1Description of the states.....................................................3915.3.3.2Definition of port control states...........................................4015.3.3.2.1ISDN-PRA user port FSM - AN (ISDNport)......................................................4015.3.3.2.2ISDN-PRA user port FSM - LE (ISDNport)......................................................4015.3.3.3Principles and procedures..................................................4115.3.3.3.1General.................................................4115.3.3.3.2Blocking................................................4115.3.3.3.3Blocking request...................................4115.3.3.3.4Co-ordinated unblocking......................4215.3.3.3.5User failure/network failure indication..4215.3.3.3.6Support of the permanent linecapability..............................................4215.3.3.4ISDN port FSM at the AN....................................................4315.3.3.5ISDN port FSM at the LE....................................................4415.3.4Performance monitoring aspects..................................................................4515.4Control protocol.................................................................................................................4515.5V5.2 re-provisioning procedures.......................................................................................4516Link control requirements and protocol............................................................................................4616.12 048 kbit/s layer 1 link maintenance requirements..........................................................4716.1.1Events and failure reports.............................................................................4716.1.2Detection algorithm for events and signals...................................................4816.1.3V5.2 interface layer 1 link FSM.....................................................................48SIST ETS 300 347-1:1997

Page 5ETS 300 347-1: September 199416.1.4Requirements and procedures for the additional functions...........................5016.2Link control requirements and procedures........................................................................5016.2.1The link blocking and unblocking..................................................................5016.2.2The link identification.....................................................................................5116.2.3Events and function elements relevant for the control of the link statemachines.......................................................................................................5216.2.4Link control FSM, AN (link) and LE (link)......................................................5316.2.4.1Description of the states......................................................5316.2.4.2Definition of link control states and general co-ordinationrequirements........................................................................5416.2.4.2.1Link control FSM - AN (AN_Link)..........5416.2.4.2.2Link control FSM - LE (LE_Link)...........5516.2.4.3Principles and procedures...................................................5616.2.4.3.1General.................................................5616.2.4.3.2Link blocking.........................................5616.2.4.3.3Link blocking request............................5616.2.4.3.4Co-ordinated link unblocking................5716.2.4.3.5Link identification..................................5716.2.4.4Link control FSM at the AN..................................................5916.2.4.5Link control FSM at the LE..................................................6016.3Link control protocol...........................................................................................................6116.3.1Link control protocol message definition and content...................................6116.3.1.1LINK CONTROL message..................................................6116.3.1.2LINK CONTROL ACK message..........................................6116.3.2Link control protocol information element definition, structure and coding...6216.3.2.1Layer 3 address information element..................................6216.3.2.2Link control function information element............................6216.3.3Definitions of the link control protocol states.................................................6316.3.4Link control protocol procedure.....................................................................6316.3.4.1General................................................................................6316.3.4.2Start traffic indication...........................................................6416.3.4.2.1Normal operation..................................6416.3.4.2.2Exceptional procedures........................6416.3.4.3Stop traffic indication...........................................................6416.3.4.3.1Normal operation..................................6416.3.4.3.2Exceptional procedures........................6416.3.4.4Link control layer 3 protocol entity procedure......................6416.3.5Handling of error conditions..........................................................................6516.3.5.1Protocol discriminator error.................................................6516.3.5.2Layer 3 address error..........................................................6516.3.5.3Message type error..............................................................6516.3.5.4Repeated information elements...........................................6516.3.5.5Mandatory information element missing..............................6616.3.5.6Unrecognized information element......................................6616.3.5.7Content error of mandatory information elements...............6616.3.6Timers for the link control protocol................................................................6616.3.7AN and LE side layer 3 protocol entity state tables.......................................6717BCC protocol elements and procedures...........................................................................................6817.1General..............................................................................................................................6817.2BCC protocol entity definition.............................................................................................7017.2.1Definition of BCC protocol states..................................................................7017.2.1.1BCC states in the AN...........................................................7017.2.1.2BCC states in the LE...........................................................7017.2.2Definition of BCC protocol primitives, messages and timers........................7117.3BCC protocol message definition and content...................................................................7317.3.1ALLOCATION message................................................................................7317.3.2ALLOCATION COMPLETE message...........................................................7417.3.3ALLOCATION REJECT message.................................................................7417.3.4DE-ALLOCATION message..........................................................................7517.3.5DE-ALLOCATION COMPLETE message.....................................................7517.3.6DE-ALLOCATION REJECT message...........................................................7617.3.7AUDIT message............................................................................................76SIST ETS 300 347-1:1997

Page 6ETS 300 347-1: September 199417.3.8AUDIT COMPLETE message......................................................................7717.3.9AN FAULT message.....................................................................................7717.3.10AN FAULT ACKNOWLEDGE message.......................................................7817.3.11PROTOCOL ERROR message....................................................................7817.4BCC information element definition, structure and coding................................................7817.4.1BCC Reference Number information element..............................................7917.4.2Other information elements..........................................................................8017.4.2.1User Port Identification information element.......................8017.4.2.2ISDN Port Time Slot Identification information element......8117.4.2.3V5 Time Slot Identification information element.................8117.4.2.4Multi-Slot Map information element....................................8217.4.2.5Reject Cause information element......................................8317.4.2.6Protocol Error Cause information element..........................8617.4.2.7Connection Incomplete information element......................8717.5Description of the BCC protocol and the BCC procedures...............................................8817.5.1General.........................................................................................................8817.5.2Bearer channel allocation - normal procedure..............................................8917.5.3Bearer channel allocation - exceptional procedures.....................................8917.5.3.1Bearer channel allocation....................................................8917.5.3.2Bearer channel allocation reject..........................................8917.5.3.3Bearer channel allocation abort..........................................9017.5.3.4Bearer channel allocation request received for existingconnection...........................................................................9017.5.3.5Bearer channel allocation, connection override requested.9017.5.4Bearer channel de-allocation - normal procedure........................................9117.5.5Bearer channel de-allocation - exceptional procedures................................9117.5.5.1Bearer channel de-allocation..............................................9117.5.5.2Bearer channel de-allocation reject....................................9117.5.5.3Bearer channel de-allocation process message missing....9217.5.6Audit procedure............................................................................................9217.5.7AN internal failure notification procedure......................................................9217.5.8Handling of error conditions..........................................................................9317.5.8.1Protocol discriminator error.................................................9417.5.8.2Message type error.............................................................9417.5.8.3Information element out of sequence.................................9417.5.8.4Repeated information elements..........................................9417.5.8.5Mandatory information element missing.............................9517.5.8.6Unrecognized information element.....................................9517.5.8.7Content error of mandatory information element................9617.5.8.8Content error of optional information element.....................9617.5.8.9Unexpected message.........................................................9617.5.8.10Optional information element not allowed...........................9717.6List of system parameters (timers)....................................................................................9717.7LE side and AN side state transition tables.......................................................................9818Protection protocol specification.......................................................................................................9918.1General..............................................................................................................................9918.1.1Introduction...................................................................................................9918.1.2Provisioning of physical and logical C-channels.........................................10018.1.3Separation of responsibilities......................................................................10118.1.4Management of C-channel resources after failure.....................................10218.1.5Monitoring functions and detection of failures............................................10318.1.5.1Failure of a 2 048 kbit/s link..............................................10318.1.5.2Flag monitoring.................................................................10318.1.5.3Data link monitoring..........................................................10318.1.6Functional model for the protection protocol..............................................10318.2Other principles...............................................................................................................10418.3Protection protocol entity definition.................................................................................10518.3.1Definition of protection protocol states........................................................10518.3.1.1States in the AN................................................................10518.3.1.2States in the LE.................................................................10518.3.2Definition of protection protocol events.......................................................10618.4Protection protocol message definition and content.......................................................108SIST ETS 300 347-1:1997

Page 7ETS 300 347-1: September 199418.4.1SWITCH-OVER REQ message..................................................................10818.4.2SWITCH-OVER COM message.................................................................10918.4.3OS-SWITCH-OVER COM message...........................................................10918.4.4SWITCH-OVER ACK message..................................................................10918.4.5SWITCH-OVER REJECT message............................................................11018.4.6PROTOCOL ERROR message..................................................................11018.4.7RESET SN COM message.........................................................................11118.4.8RESET SN ACK message..........................................................................11118.5Protection protocol information element definition, structure and coding........................11118.5.1Logical C-channel identification information element..................................11218.5.2Sequence-number information element......................................................11218.5.3Physical C-channel identification information element................................11318.5.4Rejection Cause information element.........................................................11318.5.5Protocol Error Cause information element..................................................11418.6Protection protocol procedures........................................................................................11518.6.1General........................................................................................................11518.6.2Broadcast of protection protocol messages on the two data links of theprimary and secondary link.........................................................................11618.6.2.1Transmission of protection protocol messages.................11618.6.2.2Receipt of protection protocol messages..........................11618.6.2.3Sequence number reset procedure...................................11718.6.2.3.1Normal procedure...............................11718.6.2.3.2Exceptional procedures......................11818.6.3Standard protection switch-over procedure initiated by LE-side.................11818.6.3.1Normal procedure..............................................................11818.6.3.2Exceptional procedures.....................................................11818.6.3.3Procedure on expiry of timer TSO1...................................11918.6.4Dedicated protection switch-over procedure initiated by OS LE.................11918.6.4.1Normal procedure..............................................................11918.6.4.2Exceptional procedures.....................................................12018.6.4.3Procedure on expiry of timer TSO2...................................12018.6.5Protection switch-over procedure requested by AN-side............................12118.6.5.1Normal procedure..............................................................12118.6.5.2Exceptional procedure, AN cannot comply withswitch-over command from LE..........................................12218.6.5.3Exceptional procedure, LE cannot comply withswitch-over request from AN.............................................12218.6.5.4Procedure on expiry of timer TSO3...................................12218.6.6Handling of error conditions........................................................................12218.6.6.1Protocol discriminator error...............................................12318.6.6.2Message type error............................................................12318.6.6.3Repeated information elements.........................................12318.6.6.4Mandatory information element missing............................12418.6.6.5Unrecognized information element....................................12418.6.6.6Content error of mandatory information element...............12418.6.6.7Unexpected message........................................................12518.7List of system parameters................................................................................................12518.8AN and LE side state tables.............................................................................................12618.8.1Protection protocol FSM in the AN..............................................................12618.8.2Protection protocol FSM in the LE...............................................................127Annex A (normative):Requirements for the support of the PL capability through an ISDN port........128A.1Requirements for the support of the PL capability through an ISDN basic access.........................128A.2Requirements for the support of the PL capability through an ISDN primary rate access..............128Annex B (normative):Assumptions and requirements for the support of semi-permanent leasedlines..................................................................................................................129B.1General............................................................................................................................................129B.2Signalling associ

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.