1、 STDmITU-T RECMN Q.1290-ENGL 1998 W 4862571 Ob51922 634 W INTERNATIONAL TELECOMMUNICATION UN ION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU SERIES Q: SWITCHING AND SIGNALLING Intelligent Network Q.1290 (05198) Glossary of terms used in the definition of intelligent networks ITU-T Recommen
2、dation Q.1290 (Previously CCIlT Recommendation) STD-ITU-T RECMN Q.1290-ENGL 1998 m 4862591 Ob53923 570 m ITU-T Q-SERIES RECOMMENDATIONS SWITCHING AND SIGNALLING SIGNALLING IN THE INTERNATIONAL MANUAL SERVICE INTERNATIONAL AUTOMATIC AND SEMI-AUTOMATIC WORKING FUNCTIONS AND INFORMATION FLOWS FOR SERVI
3、CES IN THE ISDN CLAUSES APPLICABLE TO ITU-T STANDARD SYSTEMS SPECIFICATIONS OF SIGNALLING SYSTEMS No. 4 AND No. 5 SPECIFICATIONS OF SIGNALLING SYSTEM No. 6 SPECIFICATIONS OF SIGNALLiNG SYSTEM R1 SPECIFICATIONS OF SIGNALLING SYSTEM R2 DIGITAL EXCHANGES INTERWORKING OF SIGNALLING SYSTEMS SPECIFICATION
4、S OF SIGNALLING SYSTEM No. 7 DIGITAL SUBSCRIBER SIGNALLING SYSTEM No. 1 PUBLIC LAND MOBILE NETWORK Q.l-Q.3 Q.4-Q.59 Q.60-Q.99 Q.lOO-Q.119 Q. 120-Q.249 Q.250-Q.309 4.31042.399 4.400-4.499 Q.50O-Q.599 4.600-4.699 Q.70O-Q.849 Q.85O-Q.999 Q. lO00-Q. 1099 II INTERWORKING WITH SATELLITE MOBILE SYSTEMS 0.1
5、100-0.1199 - I INTELLIGENT NETWORK Q.1200-Q.1999 Q.2000-Q.2999 Y BRomBANDISDN _ Forhrther details, please refer to ITU-T List of Recommendations. ITU-T RECOMMENDATION Q.1290 GLOSSARY OF TERMS USED IN THE DEFINITION OF INTELLIGENT NETWORKS , Summary This Recommendation provides a glossary of terms an
6、d definitions which have been studied for application in the documentation of intelligent networks. These terms will also be incorporated in Recommendation Q.9, “Vocabulary of Switching and Signalling Terms“. TMN management systems terminology needs to be harmonized with IN terms and is not included
7、 in this version of this Recommendation. The text in this Recommendation is considered to be stable. Companion Recommendations include the Q. 1200 series of Recommendations. Source ITU-T Recommendation Q.1290 was revised by ITU-T Study Group 11 (1997-2000) and was approved under the WTSC Resolution
8、No. 1 procedure on the 15th of May 1998. Recommendation 4.1290 (05/98) 1 STD*ITU-T RECMN d.1iSO-ENGL 1998 W 4862591 Ob51925 343 FOREWORD ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommuni- cations. The IT Telecommunication Standardization
9、 Sector (ITLJ-T) is a permanent organ of the ITU. The ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Conference (WTSC), w
10、hich meets every four years, establishes the topics for study by the ITU-T Study Groups which, in their turn, produce Recommendations on these topics. The approval of Recommendations by the Members of the ITU-T is covered by the procedure laid down in WTSC Resolution No. 1. In some areas of informat
11、ion technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with IS0 and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency.
12、 INTELLECTUAL PROPERTY RIGHTS The ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. The ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Prope
13、rty Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, the ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However,
14、 implementors are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. O ITU 1998 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, includi
15、ng photocopying and microfilm, without permission in writing from the ITU. 11 Recommendation 4.1290 (0598) STD.ITU-T RECMN QeL29Q-ENGL 1798 YB62593 0653726 2BT 9 CONTENTS Page . 1 General 1 1.1 Introduction 1 1.2 Conventions 1 2 Terms and definitions (listed alphabetically) 1 . Annex A - Acronyms 14
16、 Recommendation Q.1290 (05798) . 111 STD-ITU-T RECMN d.1290-ENGL 1998 m 4862593 Ob53927 136 m Recommendation 4.1290 GLOSSARY OF TERMS USED IN THE DEFINITION OF INTELLIGENT NETWORKS (revised in 1998) 1 General 1.1 Introduction This Recommendation provides a glossary of terms and definitions which hav
17、e been studied for application in the documentation of intelligent networks. These terms will also be incorporated in Recommendation Q.9, “Vocabulary of Switching and Signalling Terms“. To the extent practicable, terms that have been defined previously are used unchanged and reference to the source
18、of the definition is shown next to the term in parenthesis. The definitions that have been changed to make them appropriate for this application are considered to be new definitions; however, reference to the source definition is also shown in parenthesis. 1.2 Conventions The following notations and
19、 styles are used in the text of this Recommendation as appropriate: The names of IN SIBS are written with each component word capitalized and spaces between the words (e.g. LOG CALL INFORMATION). The names of IN information flows are written with each component word capitalized and spaces between th
20、e words and the appropriate type descriptor is included (e.g. Call Information Report req.ind.). The names of information elements in IN information flows are written with each component word capitalized and spaces between the words (e.g. Request Infomation). The abbreviation for the word identity i
21、n an IN information element is written ID. The names of IN detection points are written with each component word capitalized and underscores between the words (e.g. O-Disconnect). Other names defined are not capitalized (e.g. detection points). The names of information flows defined in Recommendatio
22、n Q.71 are written in upper case and the appropriate type descriptor is included (e.g. SETUP req.ind). The names of the personal mobility procedures defined in draft Recommendation F.851 are written as in InCail, OutCaIl and AllCall registration and deregistration. Terms and definitions (listed alph
23、abetically) For the purpose of this Recommendation, the following definitions apply: 2.1 access: A means of interaction between a user and a network. 2.2 specified characteristics, provided at the user-network interface. access channel (Q.9 - 0008, 1.112 - 414): A designated part of the information
24、transfer capability having 2.3 access code: A code(s) for “customized numbering plan“: attendant access, escapes to public network, etc. Recommendation 4.1290 (05/98) 1 2.4 access function: A set of processes in a network that provide for interaction between the user and a network. 2.5 is directly c
25、onnected to a service switching point. Adjunct (AD): An entity in the intelligent network that is functionally equivalent to a service control point but 2.6 both a telecommunications Administration and a recognized operating agency. Administration: In this Recommendation, the expression “Administrat
26、ion” is used for conciseness to indicate 2.7 agent: Entity acting on behalf of another. 2.8 dation Q.931 refers. alerting pattern: a specific pattern used to alert a subscriber (e.g. distinctive ringing, tones etc.). Recommen- 2.9 for display on suitably equipped analog terminals. Analogue Display S
27、ervice Interface (ADSI) server: A network element capable of sending textual messages 2.10 application: Refer to Fascicle 1.3 of the Blue Book. 2.1 1 Application Context (AC): Refer to Recommendation X.207. 2.12 determines which set of user protocol ASES will be potentially exchanged during a transa
28、ction. Application Context Negotiation (ACN): The process of negotiation at the beginning of a transaction that 2.13 Application Entity (AE) (Q.9 - 2156 modified): The set of system-independent application activities that are made available as application services to the application agent, e.g. a se
29、t of application service elements which together perform all or part of the communication aspects of an application process. 2.14 communication functions that comprise the AE-type. Application Entity Invocation (AEI): The actual “run-time” program that performs all, or a subset, of the 2.15 Applicat
30、ion Protocol Data Unit (APDU): A PDU carrying application layer control information and data. 2.16 Application Service Element (ASE): Refer to Recommendation X.207. 2.17 attribute: Refer to 8.lBc.501 2.18 understandable form. Automatic Speech Recognition (ASR): The function of converting the spoken
31、word into a machine 2.19 features. basic call: A call between two users that consists of communication only, and does not include additional 2.20 call. Basic Call Process (BCP): The sequence of activities used in establishing, maintaining and releasing a basic 2.21 Basic Call State Model (BCSM): A h
32、igh-level finite state machine model of call processing for basic call control (i.e. a two-party non-IN call). The model might only cover a portion of a call attempt, e.g. an originating BCSM or terminating BCSM, or the whole attempted call connection, Originating user to terminating user. 2.22 Basi
33、c Rate Interface (BRI): Refer to Recommendation Q.9. 2.23 bearer control: The set of functions used to direct the low layer (common) means of transmission. 2.24 bind: A mechanism used during Association Control for authentication. Refer to Recommendation X.500. 2.25 business group: A logical groupin
34、g of service subscribers, who share a set of service properties. 2 Recommendation 4.1290 (05198) 2.26 callingkalled party, e.g. group-based services. Business Group Identity (BGID): The Basic Business Group or Multiswitch Business Group Identity of the 2.27 and/or service). call (Q.9 - 0009-2): The
35、use, or possible use, of one or more connections set up between two or more users 2.28 maintain and release connections). call control The set of functions used to process a call (e.g. provide service features and establish, supervise, 2.29 for users, interacting with call control functional entitie
36、s in providing services. Call Control Agent Functional Entity (CCAF): A functional entity that provides network access functions 2.30 Call Control Function (CCF): The application process that provides calkonnection processing and control. I 2.31 processing functions. call control functional entity:
37、Functional entities which cooperate with each other to provide network call 2.32 switching capabilities and a call reference to exist within the SSP. call related: Service interaction(s) performed by the network on behalf of an end user, which require 2.33 call unrelated: Service interaction(s) perf
38、ormed by the network on behalf of an end user, which do not require switching capabilities in the SSP. Also the interaction(s) do not require that a call reference exist within the SSP. Also referred to as non-call related. 2.34 called partyher: The entity which receives a call. 2.35 calling partyhs
39、er: The entity which initiates a call. 2.36 called party business group ID: Identifies the business group associated with the called party. 2.37 beyond the S/T reference point. called party subaddress: Address information additional to the called party that identifies a specific CPE 2.38 any. call g
40、apping encountered: Indicates the type of gapping the request for instructions have been subjected to, if 2.39 calling facility group: Identifier for incoming trunks or private facilities. 2.40 calling facility group member: Identifier for individual member of a facility group. 2.41 calling party bu
41、siness group ID: Identifies the business group associated with the calling party. 2.42 calling party subaddress: the subaddress information identifying the calling party. 2.43 call model: A representation of functions involved in processing a call. 2.44 call party handling: A description of a networ
42、ks ability to manipulate individual parties to a call independently. 2.45 a service request. calllservice processing: The execution of logic by a switching or control function to advance a call attempt or 2.46 Call Segment (CS): A grouping of all the legs connected to a particular connection point.
43、2.47 Call Segment Model (CSM): A representation of the processing of a call in terms of call segments. Recommendation 4.1290 (05798) 3 STD-ITU-T RECMN QmL290-ENGL 1998 m Y862591 Ob51930 700 m 2.48 particular release. Capability Set (CS): A coherent and consistent set of network capabilities which ha
44、ve been standardized in a 2.49 Carrier Access Code (CAC): A code used to select a carrier. 2.50 carrier (commercial telecommunications): The organization whose function is to provide the particular service, e.g. an agent of a private networWfacility, intra-serving area, or a specific inter-exchange
45、carrier or international carrier. 2.51 carrier identification code: Identifies the carrier. 2.52 carrier selection: The act or ability to select or choose between telecommunications service providers. 2.53 charge number: The number that identifies the entity to be charged for the call. 2.54 Class of
46、 Service. It may refer to either originating or terminating accesses. class of service: This is either a Customer Class of Service, a Trunk Class of Service, or a Private-Facility 2.55 called party number. collected address information: An interpretation of the dialled digits specifying the nature o
47、f address and the 2.56 collected digits: A variable number of digits collected. 2.57 Common Management Information System (CMIS): See Recommendation X.700. 2.58 unauthorized individuals, entities or processes. confidentiality (ITU-T X.800): The property that information is not made available or disc
48、losed to 2.59 connection: Refer to Recommendation Q.9. 2.60 between two or more users or a user and a network entity, e.g. a dual tone multi-frequency receiver. connection control: The set of functions used for setting up, maintaining and releasing a communication path 2.61 catalogue of Connection V
49、iew States. connection view state: The set of Call Party Handling functionality supported by an SSF can be defined as a 2.62 CSA, that allows information to flow between legs. connection point: A connection point is a representation of the interconnection of legs, as viewed from the 2.63 consumer: Refer to Recommendation X.880. 2.64 control: To exercise a directing influence. 2.65 controlling leg: For IN CS-2, the controlling leg is the leg that represents the local access interface at local exchange or the remote access interface at transit exchange (