欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T Q 951 7-1997 Stage 3 Description for Number Identification Supplementary Services Using DSS 1 Malicious Call Identification (MCID) - Sereis Q Switching and Signalling DigitalDe.pdf

    • 资源ID:802608       资源大小:678.17KB        全文页数:17页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T Q 951 7-1997 Stage 3 Description for Number Identification Supplementary Services Using DSS 1 Malicious Call Identification (MCID) - Sereis Q Switching and Signalling DigitalDe.pdf

    1、INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Q.951.7 SERIES Q: SWITCHING AND SIGNALLING Digital subscriber Signalling System No. 1 - Stage 3 description for supplementary services using DSS I (06197) Stage 3 description for number identification supplem

    2、entary services using DSS I : Malicious Call Identification (MCID) ITU-T Recommendation Q.951.7 (Previously CCITT Recommendation) ITU-T Q-SERIES RECOMMENDATIONS SWITCHING AND SIGNALLING SIGNALLING IN THE INTERNATIONAL MANUAL SERVICE INTERNATIONAL AUTOMATIC AND SEMI-AUTOMATIC WORKING FUNCTIONS AND IN

    3、FORMATION FLOWS FOR SERVICES IN THE ISDN SPECIFICATIONS OF SIGNALLING SYSTEMS No. 4 AND No. 5 SPECIFICATIONS OF SIGNALLING SYSTEM No. 6 SPECIFICATIONS OF SIGNALLING SYSTEM RI SPECIFICATIONS OF SIGNALLING SYSTEM R2 DIGITAL EXCHANGES INTERWORKING OF SIGNALLING SYSTEMS SPECIFICATIONS OF SIGNALLING SYST

    4、EM No. 7 DIGITAL SUBSCRIBER SIGNALLING SYSTEM No. 1 CLAUSES APPLICABLE TO ITU-T STANDARD SYSTEMS General Data link layer Network layer User-network management Stage 3description for supplementary services using DSS I PUBLIC LAND MOBILE NETWORK INTERWORKING WITH SATELLITE MOBILE SYSTEMS INTELLIGENT N

    5、ETWORK BROADBAND ISDN Q. I -Q. 3 Q .4-Q . 59 Q.60-Q.99 Q. 1 OO-Q. 1 19 Q. 120-Q.249 Q.250-Q.309 Q. 31 O-Q .399 Q.400-Q.499 Q. 500-Q. 599 Q.600-Q.699 Q.700-Q.849 Q.850-Q.999 Q.850-Q.919 QI 920-Q. 929 Q.930-Q.939 Q. 940-Q. 949 Q.950-Q.999 Q. 1000-Q. 1 O99 Q.11 OO-Q. 1 199 Q. 1200-Q. 1999 Q.2000-Q.2999

    6、 For further details, please refer to ITU-T List of Recommendations. STD-ITU-T RECMN Q-951-7-ENGL 1997 48b259L Ob39b08 T43 ITU-T RECOMMENDATION 4.951.7 STAGE 3 DESCRIPTION FOR NUMBER IDENTIFICATION SUPPLEMENTARY SERVICES USING DSS 1: MALICIOUS CALL IDENTIFICATION (MCID) Summary The Malicious Call Id

    7、entification (MCID) supplementary service enables a user to request that the source of an incoming call is identified and registered in the network. Source ITU-T Recommendation Q.951.7 was prepared by ITU-T Study Group 11 (1997-2000) and was approved under the WTSC Resolution No. 1 procedure on the

    8、5th of June 1997. I FOREWORD ITU (International Telecommunication Union) is the United Nations Specialized Agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of the ITU. The ITU-T is responsible for studying technical, operating a

    9、nd tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Conference (WTSC), which meets every four years, establishes the topics for study by the ITU-T Study Groups which, in their turn,

    10、produce Recommendations on these topics. The approval of Recommendations by the Members of the ITU-T is covered by the procedure laid down in WTSC Resolution No. 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis

    11、 with IS0 and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a I telecommunication administration and a recognized operating agency. INTELLECTUAL PROPERTY RIGHTS The ITU draws attention to the possibility that the practice or implementation

    12、 of this Recommendation may involve the use of a claimed Intellectual Property Right. The ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Propery Rights, whether asserted by ITU members or others outside of the Recommendation development process. As o

    13、f the date of approval of this Recommendation, the ITU hadhad not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementors are cautioned that this may not represent the latest information and are therefore strongly

    14、urged to consult the TSB patent database. O ITU 1997 All rights reserved. No part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the ITU. II Recommendation Q.951.7 (06/9

    15、7) I STD-ITU-T RECMN Q.951-7-ENGL 1997 D 48b259L Ob39bLO bTL D 7 7.1 7.2 7.3 7.4 7.5 7.6 CONTENTS Page Malicious Call Identification (MCID) Scope References Definitions Abbreviations . Description . Operational requirements . 7.6.1 Provisiodwithdrawal 7.6.2 Requirements on the originating network si

    16、de 7.6.3 Requirements on the terminating network side . 7.7 Coding requirements 7.9 Signalling requirements 7.9.1 Activatioddeactivatiodregistration 7.9.2 Invocation and operation . Procedures for intenvorking with private ISDNs . 7.8 State definitions 7.1 O 7.1 1 Interactions with other networks 7.

    17、1 1.1 Interactions with non-ISDNs . 7.12 Interactions with other supplementary services 7.12.1 Call waiting . 7.12.2 Explicit call transfer 7.12.3 Connected line identification presentation 7.12.4 Connected line identification restriction . 7.12.5 Calling line identification presentation . 7.12.6 Ca

    18、lling line identification restriction . 7.12.7 Closed user group 7.12.8 Conference calling . 7.12.9 Direct dialling in 7.12.1 O Call diversion (call forwarding) services 7.12.1 1 Line hunting 7.12.12 Three-Party service 7.12.13 User-to-user signalling 7.12.14 Multiple subscriber number 7.12.16 Advic

    19、e of charge . 7.12.17 Subaddressing . 7.12.15 Call hold Recommendation 4.951.7 (06/97) 2 3 3 3 3 3 3 3 4 4 4 4 5 5 5 5 5 6 6 6 6 6 6 6 6 6 7 7 7 7 7 7 7 . III STD-ITU-T RECMN Q.951-7-ENGL 1997 D 48b2591 Ob39b11 538 = . 7.12.18 - 7.12.19 7.12.20 7.12.21 7.12.22 7.12.23 7.12.24 7.12.25 i erminai porta

    20、mity . Completion of calls to busy subscribers Malicious call identification Reverse charging . Multilevel precedence and preemption . Support of private numbering plan International telecommunication charge card . Global virtual network services . 7.13 Parameter values (timers) . 7.14 Dynamic descr

    21、iption (SDLs) Appendix I . Signalling flows . iv Recommendation 4.951.7 (06/97) Page 7 7 7 7 7 8 8 8 8 8 9 Recommendation Q.951.7 STAGE 3 DESCRIPTION FOR NUMBER IDENTIFICATION SUPPLEMENTARY SERVICES USING DSS 1: MALICIOUS CALL IDENTIFICATION (MCID) (Geneva, 1997) 7 Malicious Call Identification (MCI

    22、D) 7.1 Scope This Recommendation specifies the stage 3 of the Malicious Call Identification (MCID) supplementary service for the Integrated Services Digital Network (ISDN) at the T reference point or coincident S and T reference point (as defined in Recommendation 1.41 1 i) by means of the Digital S

    23、ubscriber Signalling System No. 1 (DSS 1) protocol. Stage 3 identifies the protocol procedures and switching functions needed to support a telecommunications service (see Recommendation I. 130 In addition, this Recommendation specifies the protocol requirements at the T reference point where the ser

    24、vice is provided to the user via a private ISDN. This Recommendation does not specifj the additional protocol requirements where the service is provided to the user via a telecommunications network that is not an ISDN. This supplementary service enables a user to request that the source of an incomi

    25、ng call is identified and registered in the network. The MCID supplementary services is applicable to all circuit-switched telecommunication services. This Recommendation is applicable to equipment, supporting the MCID supplementary service, to be attached at either side of a T reference point or co

    26、incident S and T reference point when used as an access to the public ISDN. 21). 7.2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions in

    27、dicated were valid. All Recommendations and other references are subject to revision; all users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid I

    28、TU-T Recommendations is regularly published. i ITU-T Recommendation 1.41 1 (1 993), ISDN user-network interfaces - Reference 2 CCITT Recommendation I. 130 (1 988), Method for the characterization of 3 4 5 configurations. telecommunication services supported by an ISDN and network capabilities of an

    29、ISDN. ITU-T Recommendation I. 1 12 (1 993), Vocabulary of terms for ISDNs. ITU-T Recommendation 1.2 1 O (1 993), Principles of telecommunication services supported by an ISDN and the means to describe them. CCITT Recommendation 1.330 (1988), ISDN numbering and addressingprinciples. Recommendation 4.

    30、951.7 (06/97) 1 ITU-T Recommendation Q.932 (1993), Generic procedures for the control of ISDN supplementary services. CCITT Recommendation X.2 19 (1 988), Remote operations: Model, notation and service definition. ITU-T Recommendation Q.93 1 (1 993), Digital Subscriber Signalling System No, 1 (DSS I

    31、) ISDN user-network interface layer 3 specjkation for basic call control. CCITT Recommendation X.208 (1 988), Specification of Abstract Syntax Notation One (ASN. I). CCITT Recommendation 1.25 1.7 (1 992), Malicious call identification. ITU-T Recommendation Q.81.7 (1997), Stage 2 description for numb

    32、er identzjcation supplementary services: Malicious Call Identification (MCID). ITU-T Recommendation 4.73 1.7 (1 997), Stage 3 description for number identzjkation supplementary services using Signalling System No. 7: Malicious Call Identification (MCID). ITU-T Recommendation Z. 1 O0 (1 993), CCITT S

    33、peciJication and Description Language (SDL). Definitions This Recommendation defines the following terms 7.3.1 call information: Call information consists of the called party number, the calling party number, the time and the date of the request, and as a network option, the calling party subaddress

    34、, if provided by the calling user. 7.3.2 calling party number: This a public network provided number which identifies either the calling partys number or at least the access into the public network of the call from the calling party. 7.3.3 network: The DSS 1 protocol entity at the network side of th

    35、e user-network interface. 7.3.4 user: The DSS 1 protocol entity at the user side of the user-network interface. 7.3.5 integrated service digital network (ISDN): See 2.3/I.112 3, definition 308. 7.3.6 service; telecommunication service: See 2.2I.112 3, definition 201. 7.3.7 supplementary service: See

    36、 2.4I.21 O 4. 7.3.8 subaddress: See 5.44.330 5. 7.3.9 invoke component: See 6.3/Q.932 6 for the application of this component as defined in Recommendation X.219 7. Where reference is made to xxxx“ invoke component, an invoke component is meant with its operation value set to the value of the operati

    37、on “xxxx“. 7.3.10 return result component: See 6.314.932 6 for the application of this component as defined in Recommendation X.219 7. Where reference is made to “xxxx“ return result component, a return result component is meant which is related to an “xxxx“ invoke component. 7.3.11 return error com

    38、ponent: See 6.3Q.932 6 for the application of this component as defined in Recommendation X.2 19 7. Where reference is made to “xxxx“ return error component, a return error component is meant which is related to an “xxxx“ invoke component. 7.3.12 reject component: See 6.3Q.932 6 for the application

    39、of this component as defined in Recommendation X.219 7. 2 Recommendation Q.951.7 (06/97) STD.ITU-T RECMN d-951J-ENGL I997 48b257L Ob39bL4 247 m 7.3.13 no impact: The interaction between the two identified supplementary services contains no requirements for the protocol over and above the requirement

    40、s of the Recommendation for each individual supplementary service. NOTE - Other aspects of interactions that do not affect the DSS 1 protocol are covered in the service description for the relevant supplementary services. 7.3.14 not applicable: The interaction between the two identified supplementar

    41、y services is outside the scope of this Recommendation, e.g. the interaction is between the supplementary service and itself, and is therefore covered in the Recommendation for the individual supplementary service. 7.4 Abbreviations This Recommendation uses the following abbreviations: ASN. 1 Abstra

    42、ct Syntax Notation One DSS 1 Digital Subscriber Signalling System No. 1 ISDN Integrated Services Digital Network MCID Malicious Call Identification SDL Specification and Description Language 7.5 Description The malicious call identification supplementary service gives the possibility for the called

    43、user to obtain, by an appropriate request, the storage and registration of the call information. 7.6 Operational requirements 7.6.1 Provisionlwithdrawal This service shall be provided and withdrawn after prearrangement with the service provider in accordance with national legal requirements. 7.6.2 N

    44、ot applicable. Requirements on the originating network side 7.6.3 Not applicable. Requirements on the terminating network side 7.7 Coding requirements Table 7-1 shows the definition of the operations required for MCID supplementary service using ASN.1 as specified in Recommendation X.208 9 and using

    45、 the OPERATION macro as defined in Figure 4X.219 1171. Recommendation Q.951.7 (06/97) 3 STD-ITU-T RECMN Q.95L.7-ENGL 1997 m 48b259L Ob39bL5 183 Table 7-VQ.951.7 - Definitions of operations ncidoperations (itu recommendation q 951 mcid (7) operations-and-errors (1) IEFINITIONS := 3EGIN EXPORTS McidRe

    46、quest; IMPORTS OPERATION FROM Remote-Operation-Notation Ijoint-iso-ccitt remote-operations(4) notation(0) notAvailable, UserNotSubscribed, invalidCallState, notIncomingCall, supplementaryServiceInteractionNot Allowed, FROM General-Error-List tu recommendation q 950 general-error-list (i); McidReques

    47、t := OPERATION RESULT ERRORS( notAvailable, UserNotSubscribed, invalidCallState, supplementary ServiceInteractionNotAllowed notIncomingCall mcidRequest McidRequest :=3 END 7.8 State definitions The call states as specified in 2.UQ.931 SI shall apply. 7.9 Signalling requirements 7.9.1 Activation/deac

    48、tivation/registration Not applicable. 7.9.2 Invocation and operation 7.9.2.1 Normal operation To invoke the MCID supplementary service, the called user shall send a McidRequest invoke component carried by a Facility information element in a FACILITY message. This invocation can only be sent during t

    49、he Active state (N10) or during the Disconnect Indication state (N12). To indicate that the service invocation has been accepted, the network shall send a McidRequest return result component carried by a Facility information element in a FACILITY message. The FACILITY message shall be sent using a call reference as used for the previous call control messages for the call for which the MCID service is to be invoked. 4 Recommendation Q.951.7 (06/97) STD-ITU-T RECMN 8.951-7-ENGL 1997 4b259L Ob39blb OLT 7.9.2.2 Except


    注意事项

    本文(ITU-T Q 951 7-1997 Stage 3 Description for Number Identification Supplementary Services Using DSS 1 Malicious Call Identification (MCID) - Sereis Q Switching and Signalling DigitalDe.pdf)为本站会员(王申宇)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开