ETS 300 425 : 20001
Current
The latest, up-to-date edition.
PRIVATE TELECOMMUNICATION NETWORK (PTN); SPECIFICATION, FUNCTIONAL MODEL AND INFORMATION FLOWS - CALL INTRUSION SUPPLEMENTARY SERVICE
Hardcopy , PDF
English
1 Scope
2 Conformance
3 References
4 Definitions
4.1 External definitions
4.2 Busy
4.3 Conference type connection
4.4 Consultation
4.5 Consultation timer
4.6 Established call
4.7 Forced release
4.8 Immediate invocation
4.9 Impending intrusion state
4.10 Impending intrusion warning notification
4.11 Implementation option
4.12 Intruding call
4.13 Intrusion state
4.14 Intruding call connected notification
4.15 Isolation
4.16 Path retention
4.17 Served user
4.18 Time to intrusion
4.19 User B
4.20 User C
4.21 WOB state
5 List of acronyms
6 SS-CI stage 1 specification
6.1 Description
6.1.1 General description
6.1.2 Qualifications on applicability to
telecommunication services
6.2 Procedures
6.2.1 Provision and withdrawal
6.2.2 Normal procedures
6.2.2.1 Activation, deactivation,
Interrogation and registration
6.2.2.2 Invocation and operation
6.2.3 Exceptional procedures
6.2.3.1 Activation, deactivation,
registration and interrogation
6.2.3.2 Invocation and operation
6.3 Interactions with other supplementary services
and ANFs
6.3.1 Call Completion to Busy Subscriber (CCBS)
6.3.2 Call Completion No Reply (CCNR)
6.3.3 Do Not Disturb (DND)
6.3.4 Do Not Disturb Override (DNDO)
6.3.5 Calling Line Identification Presentation
(CLIP)
6.3.6 Calling/Connected Line Identification
Restriction (CLIR)
6.3.7 Connected Line Identification
Presentation (COLP)
6.3.8 Calling Name Identification Presentation
(CNIP)
6.3.9 Connected Name Identification Presentation
(CNOP)
6.3.10 Calling/Connected Name Identification
Restriction (CNIR)
6.3.11 Call Forwarding Unconditional (CFU)
6.3.12 Call Forwarding No Reply (CFNR)
6.3.13 Call Forwarding Busy (CFB)
6.3.14 Call Transfer (CT)
6.3.15 Path Replacement (AFN-PR)
6.3.16 Call Offer (CO)
6.4 Interworking considerations
6.5 Overall SDL
7 SS-CI stage 2 specification
7.1 Functional model
7.1.1 Functional model description
7.1.2 Description of the Functional Entities
7.1.2.1 SS-CI requesting entity, FE1
7.1.2.2 Served user's service control
entity FE2
7.1.2.3 Intrusion service control entity
and user's B'S control entity,
FE3
7.1.2.4 User C's control entity, FE4
7.1.2.5 User C agent, FE5
7.1.3 Relationship of functional model to basic
call functional model
7.2 Information flows
7.2.1 Definition of information flows
7.2.1.1 Relationship ra
7.2.1.2 Relationship rb
7.2.1.3 Relationship rc
7.2.1.4 Relationship rd
7.2.2 Relationship of information flows to basic
call information flows
7.2.2.1 Information flows over ra
7.2.2.2 Information flows over rb
7.2.2.3 Information flows over rc
7.2.2.4 Information flows over rd
7.2.2.5 Summary
7.2.3 Information flow sequences
7.2.3.1 Normal operation, consultation,
path retention
7.2.3.2 Normal operation, consultation,
non-retention
7.2.3.3 Normal operation, immediate
invocation, non-retention
7.2.3.4 Normal operation, immediate
invocation, path retention
7.2.3.5 Normal operation, immediate
invocation, path retention, user
C isolated at intrusion
7.2.3.6 Normal operation, immediate
invocation, immediate intrusion,
non-retention
7.2.3.7 Normal operation, immediate
invocation, path retention
7.2.3.8 Normal operation, isolation of
user C
7.2.3.9 Normal operation, Forced Release
of user C
7.2.3.10 Normal operation, user B or user
C releases the established call
7.2.3.11 Normal operation, release of the
intruding call
7.2.3.12 Normal operation, WOB requested
7.2.3.13 Normal operation, new intrusion
during WOB
7.3 Functional Entity actions (FEAs)
7.3.1 Actions of FE1
7.3.2 Actions of FE2
7.3.3 Actions of FE3
7.3.4 Actions of FE4
7.3.5 Actions of FE5
7.4 Functional Entity behaviour
7.4.1 Behaviour of FE1
7.4.2 Behaviour of FE2
7.4.3 Behaviour of FE3
7.4.4 Behaviour of FE4
7.4.5 Behaviour of FE5
7.5 Allocation of Functional Entities to physical
equipment
7.6 Interworking considerations
History
Describes the Call Intrusion supplementary service (SS-CI), which is applicable to basic services supported by Private Telecommunication Networks (PTNs). Basic services are specified in ETS 300 171. This is a supplementary service which enables the user to establish communication with a busy called user (user B) by breaking into an established call between user B and a third user (user C).
Committee |
ECMATC 32
|
DocumentType |
Standard
|
Pages |
89
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
Standards | Relationship |
DIN ETS 300425:1996-04 | Identical |
PN ETS 300 425 : 2005 | Identical |
NBN ETS 300 425 : 1996 | Identical |
ECMA 202 : 2ED 97 | Corresponds |
EG 202 102 : 1.2.2 | PRIVATE INTEGRATED SERVICES NETWORK (PISN) - SERVICE PROFILES OF MOBILE PISN USERS - GENERAL REQUIREMENTS |
ETR 280 : 20001 | BUSINESS TELECOMMUNICATIONS (BTC) - PRIVATE INTEGRATED SERVICES NETWORK (PISN) - PRIVATE USER MOBILITY (PUM) |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.