Private Telecommunication Network (PTN); Specification, functional models and information flows; Call intrusion supplementary service

Contains stages 1 and stage 2 description of the intrusion supplementary service. See ECMA DTR/ECMA-0002 (ECMA-TR/SVC) for a description of the intrusion supplementary service. See ENv 41 005 for definition of stages 1 and 2.

Zasebno telekomunikacijsko omrežje (PTN) – Specifikacija, funkcijski model in informacijski pretoki - Dopolnilna storitev: vpad v klic

General Information

Status
Published
Publication Date
30-Apr-2005
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-May-2005
Due Date
01-May-2005
Completion Date
01-May-2005

Buy Standard

Standard
ETS 300 425 E1:2005
English language
89 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

SLOVENSKI STANDARD
SIST ETS 300 425 E1:2005
01-maj-2005
Zasebno telekomunikacijsko omrežje (PTN) – Specifikacija, funkcijski model in
informacijski pretoki - Dopolnilna storitev: vpad v klic
Private Telecommunication Network (PTN); Specification, functional models and
information flows; Call intrusion supplementary service
Ta slovenski standard je istoveten z: ETS 300 425 Edition 1
ICS:
33.040.35 Telefonska omrežja Telephone networks
SIST ETS 300 425 E1:2005 en
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------

SIST ETS 300 425 E1:2005

---------------------- Page: 2 ----------------------

SIST ETS 300 425 E1:2005
EUROPEAN ETS 300 425
TELECOMMUNICATION September 1995
STANDARD
Source: ETSI TC-ECMA Reference: DE/ECMA-00010
ICS: 33.040.10, 33.040.30
PTN, supplementary service
Key words:
Private Telecommunication Network (PTN);
Specification, functional model and information flows
Call intrusion supplementary service
ETSI
European Telecommunications Standards Institute
ETSI Secretariat
F-06921 Sophia Antipolis CEDEX - FRANCE
Postal address:
650 Route des Lucioles - Sophia Antipolis - Valbonne - FRANCE
Office address:
c=fr, a=atlas, p=etsi, s=secretariat - secretariat@etsi.fr
X.400: Internet:
Tel.: +33 92 94 42 00 - Fax: +33 93 65 47 16
Copyright Notification: No part may be reproduced except as authorized by written permission. The copyright and the
foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 1995. All rights reserved.
New presentation - see History box

---------------------- Page: 3 ----------------------

SIST ETS 300 425 E1:2005
Page 2
ETS 300 425: September 1995
Whilst every care has been taken in the preparation and publication of this document, errors in content,
typographical or otherwise, may occur. If you have comments concerning its accuracy, please write to
"ETSI Editing and Committee Support Dept." at the address shown on the title page.

---------------------- Page: 4 ----------------------

SIST ETS 300 425 E1:2005
Page 3
ETS 300 425: September 1995
Contents
Foreword .7
1 Scope .9
2 Conformance.9
3 References.9
4 Definitions.10
4.1 External definitions.10
4.2 Busy .11
4.3 Conference type connection .11
4.4 Consultation.11
4.5 Consultation timer.11
4.6 Established call.11
4.7 Forced release.11
4.8 Immediate invocation.11
4.9 Impending intrusion state.12
4.10 Impending intrusion warning notification.12
4.11 Implementation option .12
4.12 Intruding call.12
4.13 Intrusion state .12
4.14 Intruding call connected notification.12
4.15 Isolation.12
4.16 Path retention.12
4.17 Served user.12
4.18 Time to intrusion .12
4.19 User B.12
4.20 User C.12
4.21 WOB state .12
5 List of acronyms .13
6 SS-CI stage 1 specification .14
6.1 Description.14
6.1.1 General description .14
6.1.2 Qualifications on applicability to telecommunication services.14
6.2 Procedures.14
6.2.1 Provision and withdrawal.14
6.2.2 Normal procedures.15
6.2.2.1 Activation, deactivation, interrogation and registration .15
6.2.2.2 Invocation and operation .15
6.2.2.2.1 Methods of invoking SS-CI .15
6.2.2.2.2 Verification and selection of
compatible call .15
6.2.2.2.3 Actions during impending intrusion
state .16
6.2.2.2.3.1 Impending intrusion state ends.16
6.2.2.2.3.2 Release of intruding call .16
6.2.2.2.3.3 Release of established call.16
6.2.2.2.4 Setting up the connection between
served user, user B and user C.16
6.2.2.2.5 Actions during intrusion state.17
6.2.2.2.5.1 Release of intruding call.17
6.2.2.2.5.2 Release of the established call .17
6.2.2.2.5.3 Forced release.17
6.2.2.2.5.4 Isolation on request from served user .17

---------------------- Page: 5 ----------------------

SIST ETS 300 425 E1:2005
Page 4
ETS 300 425: September 1995
6.2.2.2.5.5 Transition from intrusion state to WOB
state. 17
6.2.2.2.6 Actions during WOB state. 17
6.2.2.2.6.1 Served user releases . 17
6.2.2.2.6.2 User B answers the waiting call . 18
6.2.2.2.6.3 Re-intrusion request. 18
6.2.2.2.6.4 User B becomes not busy . 18
6.2.3 Exceptional procedures . 18
6.2.3.1 Activation, deactivation, registration and interrogation. 18
6.2.3.2 Invocation and operation. 18
6.3 Interactions with other supplementary services and ANFs . 18
6.3.1 Call Completion to Busy Subscriber (CCBS). 19
6.3.2 Call Completion No Reply (CCNR). 19
6.3.3 Do Not Disturb (DND). 19
6.3.4 Do Not Disturb Override (DNDO) . 19
6.3.5 Calling Line Identification Presentation (CLIP) . 19
6.3.6 Calling/Connected Line Identification Restriction (CLIR). 19
6.3.7 Connected Line Identification Presentation (COLP). 19
6.3.8 Calling Name Identification Presentation (CNIP). 19
6.3.9 Connected Name Identification Presentation (CONP) . 20
6.3.10 Calling/Connected Name Identification Restriction (CNIR) . 20
6.3.11 Call Forwarding Unconditional (CFU) . 20
6.3.12 Call Forwarding No Reply (CFNR). 20
6.3.13 Call Forwarding Busy (CFB) . 20
6.3.14 Call Transfer (CT). 20
6.3.15 Path Replacement (ANF-PR) . 21
6.3.16 Call Offer (CO). 21
6.4 Interworking considerations . 21
6.5 Overall SDL. 21
7 SS-CI stage 2 specification. 30
7.1 Functional model. 30
7.1.1 Functional model description. 30
7.1.2 Description of the Functional Entities . 31
7.1.2.1 SS-CI requesting entity, FE1. 31
7.1.2.2 Served user's service control entity, FE2. 31
7.1.2.3 Intrusion service control entity and user B's control entity,
FE3. 32
7.1.2.4 User C's control entity, FE4 . 32
7.1.2.5 User C agent, FE5 . 32
7.1.3 Relationship of functional model to basic call functional model. 33
7.2 Information flows . 33
7.2.1 Definition of information flows. 33
7.2.1.1 Relationship ra . 33
7.2.1.1.1 INFORM . 33
7.2.1.1.2 CI_INV. 33
7.2.1.1.3 WARNING. 34
7.2.1.1.4 ISOLATE . 34
7.2.1.1.5 FORCE_REL. 34
7.2.1.1.6 EST_TERM . 34
7.2.1.1.7 REQUEST_WOB . 35
7.2.1.1.8 B_ALERTING. 35
7.2.1.1.9 B_ANSWER. 35
7.2.1.2 Relationship rb . 35
7.2.1.2.1 CI_ACT . 35
7.2.1.2.2 ISOLATE . 36
7.2.1.2.3 WARNING. 36
7.2.1.2.4 FORCE_REL. 36
7.2.1.2.5 EST_TERM . 36
7.2.1.2.6 REQUEST_WOB . 37
7.2.1.2.7 CI_AVAIL. 37
7.2.1.2.8 CI_INV. 37
7.2.1.2.9 B_ALERTING. 38
7.2.1.2.10 B_ANSWER. 38

---------------------- Page: 6 ----------------------

SIST ETS 300 425 E1:2005
Page 5
ETS 300 425: September 1995
7.2.1.3 Relationship rc.38
7.2.1.3.1 INFO_REQ .38
7.2.1.3.2 WARNING .38
7.2.1.3.3 C_INTR.38
7.2.1.3.4 C_ISOLATED .38
7.2.1.3.5 C_FORCED_REL .38
7.2.1.3.6 INTR_TERM .38
7.2.1.4 Relationship rd.39
7.2.1.4.1 WARNING .39
7.2.1.4.2 C_INTR.39
7.2.1.4.3 C_ISOLATED .39
7.2.1.4.4 C_FORCED_REL .39
7.2.1.4.5 INTR_TERM .39
7.2.2 Relationship of information flows to basic call information flows.40
7.2.2.1 Information flows over ra .40
7.2.2.2 Information flows over rb .41
7.2.2.3 Information flows over rc .42
7.2.2.4 Information flows over rd .42
7.2.2.5 Summary .42
7.2.3 Information flow sequences .44
7.2.3.1 Normal operation, consultation, path retention.44
7.2.3.2 Normal operation, consultation, non-retention.45
7.2.3.3 Normal operation, immediate invocation, non-retention.46
7.2.3.4 Normal operation, immediate invocation, path retention .47
7.2.3.5 Normal operation, immediate invocation, path retention,
user C isolated at intrusion .48
7.2.3.6 Normal operation, immediate invocation, immediate
intrusion, non-retention.49
7.2.3.7 Normal operation, immediate invocation, path retention .50
7.2.3.8 Normal operation, isolation of user C .51
7.2.3.9 Normal operation, Forced Release of user C.51
7.2.3.10 Normal operation, user B or user C releases the
established call .52
7.2.3.11 Normal operation, release of the intruding call .52
7.2.3.12 Normal operation, WOB requested .53
7.2.3.13 Normal operation, new intrusion during WOB .54
7.3 Functional Entity actions (FEAs).54
7.3.1 Actions of FE1.54
7.3.2 Actions of FE2.55
7.3.3 Actions of FE3.56
7.3.4 Actions of FE4.58
7.3.5 Actions of FE5.58
7.4 Functional Entity behaviour.58
7.4.1 Behaviour of FE1.58
7.4.2 Behaviour of FE2.67
7.4.3 Behaviour of FE3.77
7.4.4 Behaviour of FE4.85
7.4.5 Behaviour of FE5.86
7.5 Allocation of Functional Entities to physical equipment .87
7.6 Interworking considerations .87
History.89

---------------------- Page: 7 ----------------------

SIST ETS 300 425 E1:2005
Page 6
ETS 300 425: September 1995
Blank page

---------------------- Page: 8 ----------------------

SIST ETS 300 425 E1:2005
Page 7
ETS 300 425: September 1995
Foreword
This European Telecommunication Standard (ETS) has been produced by the European Computer
Manufacturers Association (ECMA) on behalf of its members and those of the European
Telecommunications Standards Institute (ETSI).
This ETS is one of a series of standards defining services and signalling protocols applicable to
Private Telecommunication Networks (PTNs). The series uses the ISDN concepts as developed by
the ITU-T (formerly CCITT) and is also within the framework of standards for open systems
interconnection as defined by ISO.
This ETS specifies the Call Intrusion supplementary service.
The ETS is based upon the practical experience of ECMA member companies and the results of
their active and continuous participation in the work of ISO, ITU-T, ETSI and other international and
national standardization bodies. It represents a pragmatic and widely based consensus.
This ETS was produced by ECMA using the ECMA guidelines for the production of standards and
using the ECMA stylesheet. In order to avoid undue delays in the approval process for this ETS it
has been agreed that this ETS will not be converted to the ETSI stylesheet.

---------------------- Page: 9 ----------------------

SIST ETS 300 425 E1:2005
Page 8
ETS 300 425: September 1995
Blank page

---------------------- Page: 10 ----------------------

SIST ETS 300 425 E1:2005
Page 9
ETS 300 425: September 1995
1 Scope
This European Telecommunication Standard (ETS) specifies the Call Intrusion
supplementary service (SS-CI), which is applicable to basic services supported by Private
Telecommunication Networks (PTNs). Basic services are specified in ETS 300 171.
Call Intrusion (SS-CI) is a supplementary service which, on request from the served user,
enables the served user to establish communication with a busy called user (user B) by
breaking into an established call between user B and a third user (user C).
Service specifications are produced in three stages, according to the method described in
ETS 300 387. This ETS contains the stage 1 and stage 2 specifications of SS-CI. The stage
1 specification (clause 6) specifies the supplementary service as seen by users of PTNs. The
stage 2 specification (clause 7) identifies the Functional Entities involved in the
supplementary service and the information flows between them.
The purpose of the stage 1 and stage 2 specifications is to guide and constrain the work on
signalling protocols at stage 3. Stage 3, the definition of the network and access layer 3
signalling protocols to support the supplementary service, is defined in separate standards.
NOTE 1
For this ETS, stage 2 does not consider the split of functionality between a functional TE at user B
and the local PTNX. TE functions and local PTNX functions at user B are included in the same
Functional Entity.
2 Conformance
In order to conform to this ETS, a stage 3 standard shall specify signalling protocols and
equipment behaviour that are capable of being used in a PTN which supports the
supplementary service specified in this ETS. This means that, to claim conformance, a stage
3 standard is required to be adequate for the support of those aspects of clause 6 (stage 1)
and clause 7 (stage 2) which are relevant to the interface or equipment to which the stage 3
standard applies.
3 References
ETS 300 171 Private Telecommunication Network (PTN); Specification,
functional models and information flows; Control aspects of
circuit mode basic services (1992)
ETS 300 173 Private Telecommunication Network (PTN); Specification,
functional models and information flows; Identification
supplementary services (ISSD) (1992)
ETS 300 189 Private Telecommunication Network (PTN); Addressing (1992)
ETS 300 237 Private Telecommunication Network (PTN); Specification,
functional models and information flows; Name identification
supplementary services (1993)
ETS 300 256 Private Telecommunication Network (PTN); Specification,
functional models and information flows; Diversion
supplementary services (1993)
ETS 300 258 Private Telecommunication Network (PTN); Specification,
functional models and information flows; Path replacement
additional network feature (1993)
ETS 300 260 Private Telecommunication Network (PTN); Specification,
functional models and information flows; Call transfer
supplementary service (1993)

---------------------- Page: 11 ----------------------

SIST ETS 300 425 E1:2005
Page 10
ETS 300 425: September 1995
ETS 300 361 Private Telecommunication Network (PTN); Specification,
functional model and information flows; Call offer supplementary
service (1994)
ETS 300 363 Private Telecommunication Network (PTN); Specification,
functional model and information flows; Do not disturb and do
not disturb override supplementary services (1994)
ETS 300 365 Private Telecommunication Network (PTN); Specification,
functional model and information flows; Call completion
supplementary services (1994)
ETS 300 387 Private Telecommunications Network (PTN); Method for the
specification of basic and supplementary services (1994)
ETS 300 415 Private Telecommunication Network (PTN); Terms and
definitions (1995)
CCITT Recommendation I.112 Vocabulary of terms for ISDNs (1988)
CCITT Recommendation I.210 Principles of telecommunication services supported by an
ISDN
and the means to describe them (1988)
CCITT Recommendation I.221 Common specific characteristics of services (1988)
CCITT Recommendation Z.100 Specification and Description Language (SDL) (1988)
4 Definitions
For the purpose of this ETS the following definitions apply:
4.1 External definitions
This ETS uses the following terms defined in other documents:
− Basic Service (CCITT Rec. I.210)
− Calling Party Name ETS 300 237
− Connection (CCITT Rec. I.112)
− Integrated Services Digital Network (CCITT Rec. I.112)
− Name ETS 300 237
− Network Determined User Busy (CCITT Rec. I.221)
− Number ETS 300 189
− Private Telecommunication Network Exchange (PTNX) (ETS 300 415)
− Public (ETS 300 415)
− Service (CCITT Rec. I.112)
− Signalling (CCITT Rec. I.112)
− Subaddress ETS 300 189
− Supplementary Service (CCITT Rec. I.210)
− Private Telecommunication Network (ETS 300 415)
− Terminal Equipment (ETS 300 415)
− User (ETS 300 171)
− User Determined User Busy (CCITT Rec. I.221)

---------------------- Page: 12 ----------------------

SIST ETS 300 425 E1:2005
Page 11
ETS 300 425: September 1995
This ETS refers to the following basic call Functional Entities (FEs) defined in
ETS 300 171:
− Call Control (CC)
− Call Control Agent (CCA)
This ETS refers to the following basic call inter-FE relationships defined in ETS 300 171:
− r1
− r2
− r3
This ETS refers to the following basic call information flows defined in ETS 300 171:
− DISCONNECT request/indication
− RELEASE request/indication
− RELEASE response/confirmation
− SETUP request/indication
− SETUP response/confirmation
This ETS refers to the following basic call information flow elements defined in
ETS 300 171:
− Destination number
− Connection type
This ETS refers to the following information flow elements defined in ETS 300 173:
− Originating number
− Originating subaddress
4.2 Busy
A property of a user for whom either a Network Determined User Busy or User Determined
User Busy condition exists.
4.3 Conference type connection
A connection between the served user, user B and user C, where all users have user
information connection with each other.
4.4 Consultation
Invocation of SS-CI after the calling user has been informed that a call has failed because
of busy at the destination.
4.5 Consultation timer
A timer governing the time in which the calling user is allowed to request invocation of SS-
CI after being informed that a call has failed because of busy at the destination. The
duration of the timer is an implementation option.
4.6 Established call
The active call that is selected for intruding on.
4.7 Forced release
The release of the established call on request from the served user during the intrusion
state.
4.8 Immediate invocation
Invocation of SS-CI as part of the initial call set up.

---------------------- Page: 13 ----------------------

SIST ETS 300 425 E1:2005
Page 12
ETS 300 425: September 1995
4.9 Impending intrusion state
The condition of an established call and an intruding call after provision of an impending
intrusion warning notification and before establishment of communication between the
served user and user B.
4.10 Impending intrusion warning notification
A notification provided before communication is established between the served user and
user B.
4.11 Implementation option
An option for the implementor of the service to include or not to include in the service
providing system.
4.12 Intruding call
A call in which the served user requests SS-CI.
4.13 Intrusion state
The condition of an established call after establishment of communication between the
served user and user B and prior to termination of SS-CI or invocation of Wait On Busy
(WOB).
4.14 Intruding call connected notification
A notification provided on establishment of communication between the served user and
user B.
4.15 Isolation
The breaking of the user information connection to and from user C during the intrusion
state.
4.16 Path retention
The retaining of the network connection between the originating CC and the destination CC
so that a supplementary service (such as SS-CI) can be invoked without establishing a
new connection.
4.17 Served user
The user who requests SS-CI.
4.18 Time to intrusion
The duration of the impending intrusion state.
4.19 User B
The wanted user that is subject to the call intrusion.
4.20 User C
The other user in the established call.
4.21 WOB state
A state that can be entered from the intrusion state and in which the intruding call is
disconnected from user B and is waiting for user B to answer the call.

---------------------- Page: 14 ----------------------

SIST ETS 300 425 E1:2005
Page 13
ETS 300 425: September 1995
5 List of acronyms
ANF Additional Network Feature
CC Call Control (Functional Entity)
CCA Call Control Agent (Functional Entity)
CCBS Call Completion to Busy Subscriber
CCNR Call Completion No Reply
CFB Call Forwarding Busy
CFNR Call Forwarding No Reply
CFU Call Forwarding Unconditional
CI Call Intrusion
CICL Call Intrusion Capability Level
CIPL Call Intrusion Protection Level
CLIP Calling Line Identification Presentation
CLIR Calling/Connected Line Identification Restriction
CNIP Calling Name Identification Presentation
CNIR Calling/Connected Name Identification Restriction
CO Call Offer
COLP Connected Line Identification Presentation
CONP Connected Name Identification Presentation
CT Call Transfer
DND Do Not Disturb
DNDO Do Not Disturb Override
FE Functional Entity
ISDN Integrated Services Digital Network
NDUB Network Determined User Busy
PTN Private Telecommunication Network
PTNX Private Telecommunication Network Exchange
SDL Specification and Description Language
SS Supplementary Service
TE Terminal Equipment
UDUB User Determined User Busy
WOB Wait On Busy

---------------------- Page: 15 ----------------------

SIST ETS 300 425 E1:2005
Page 14
ETS 300 425: September 1995
6 SS-CI stage 1 specification
6.1 Description
6.1.1 General description
Call Intrusion (SS-CI) is a supplementary service which, on request from the served
user, enables the served user to establish communication with a busy called user (user
B) by breaking into an established call between user B and a third user (user C). On
successf
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.