• There are no items in your cart

ETS 300 425 : 20001

Current

Current

The latest, up-to-date edition.

PRIVATE TELECOMMUNICATION NETWORK (PTN); SPECIFICATION, FUNCTIONAL MODEL AND INFORMATION FLOWS - CALL INTRUSION SUPPLEMENTARY SERVICE

Available format(s)

Hardcopy , PDF

Language(s)

English

1 Scope
2 Conformance
3 References
4 Definitions
   4.1 External definitions
   4.2 Busy
   4.3 Conference type connection
   4.4 Consultation
   4.5 Consultation timer
   4.6 Established call
   4.7 Forced release
   4.8 Immediate invocation
   4.9 Impending intrusion state
   4.10 Impending intrusion warning notification
   4.11 Implementation option
   4.12 Intruding call
   4.13 Intrusion state
   4.14 Intruding call connected notification
   4.15 Isolation
   4.16 Path retention
   4.17 Served user
   4.18 Time to intrusion
   4.19 User B
   4.20 User C
   4.21 WOB state
5 List of acronyms
6 SS-CI stage 1 specification
   6.1 Description
        6.1.1 General description
        6.1.2 Qualifications on applicability to
               telecommunication services
   6.2 Procedures
        6.2.1 Provision and withdrawal
        6.2.2 Normal procedures
               6.2.2.1 Activation, deactivation,
                        Interrogation and registration
               6.2.2.2 Invocation and operation
        6.2.3 Exceptional procedures
               6.2.3.1 Activation, deactivation,
                        registration and interrogation
               6.2.3.2 Invocation and operation
   6.3 Interactions with other supplementary services
        and ANFs
        6.3.1 Call Completion to Busy Subscriber (CCBS)
        6.3.2 Call Completion No Reply (CCNR)
        6.3.3 Do Not Disturb (DND)
        6.3.4 Do Not Disturb Override (DNDO)
        6.3.5 Calling Line Identification Presentation
               (CLIP)
        6.3.6 Calling/Connected Line Identification
               Restriction (CLIR)
        6.3.7 Connected Line Identification
               Presentation (COLP)
        6.3.8 Calling Name Identification Presentation
               (CNIP)
        6.3.9 Connected Name Identification Presentation
               (CNOP)
        6.3.10 Calling/Connected Name Identification
               Restriction (CNIR)
        6.3.11 Call Forwarding Unconditional (CFU)
        6.3.12 Call Forwarding No Reply (CFNR)
        6.3.13 Call Forwarding Busy (CFB)
        6.3.14 Call Transfer (CT)
        6.3.15 Path Replacement (AFN-PR)
        6.3.16 Call Offer (CO)
   6.4 Interworking considerations
   6.5 Overall SDL
7 SS-CI stage 2 specification
   7.1 Functional model
        7.1.1 Functional model description
        7.1.2 Description of the Functional Entities
               7.1.2.1 SS-CI requesting entity, FE1
               7.1.2.2 Served user's service control
                        entity FE2
               7.1.2.3 Intrusion service control entity
                        and user's B'S control entity,
                        FE3
               7.1.2.4 User C's control entity, FE4
               7.1.2.5 User C agent, FE5
        7.1.3 Relationship of functional model to basic
               call functional model
   7.2 Information flows
        7.2.1 Definition of information flows
               7.2.1.1 Relationship ra
               7.2.1.2 Relationship rb
               7.2.1.3 Relationship rc
               7.2.1.4 Relationship rd
        7.2.2 Relationship of information flows to basic
               call information flows
               7.2.2.1 Information flows over ra
               7.2.2.2 Information flows over rb
               7.2.2.3 Information flows over rc
               7.2.2.4 Information flows over rd
               7.2.2.5 Summary
        7.2.3 Information flow sequences
               7.2.3.1 Normal operation, consultation,
                        path retention
               7.2.3.2 Normal operation, consultation,
                        non-retention
               7.2.3.3 Normal operation, immediate
                        invocation, non-retention
               7.2.3.4 Normal operation, immediate
                        invocation, path retention
               7.2.3.5 Normal operation, immediate
                        invocation, path retention, user
                        C isolated at intrusion
               7.2.3.6 Normal operation, immediate
                        invocation, immediate intrusion,
                        non-retention
               7.2.3.7 Normal operation, immediate
                        invocation, path retention
               7.2.3.8 Normal operation, isolation of
                        user C
               7.2.3.9 Normal operation, Forced Release
                        of user C
               7.2.3.10 Normal operation, user B or user
                        C releases the established call
               7.2.3.11 Normal operation, release of the
                        intruding call
               7.2.3.12 Normal operation, WOB requested
               7.2.3.13 Normal operation, new intrusion
                        during WOB
   7.3 Functional Entity actions (FEAs)
        7.3.1 Actions of FE1
        7.3.2 Actions of FE2
        7.3.3 Actions of FE3
        7.3.4 Actions of FE4
        7.3.5 Actions of FE5
   7.4 Functional Entity behaviour
        7.4.1 Behaviour of FE1
        7.4.2 Behaviour of FE2
        7.4.3 Behaviour of FE3
        7.4.4 Behaviour of FE4
        7.4.5 Behaviour of FE5
   7.5 Allocation of Functional Entities to physical
        equipment
   7.6 Interworking considerations
History

Describes the Call Intrusion supplementary service (SS-CI), which is applicable to basic services supported by Private Telecommunication Networks (PTNs). Basic services are specified in ETS 300 171. This is a supplementary service which enables the user to establish communication with a busy called user (user B) by breaking into an established call between user B and a third user (user C).

Committee
ECMATC 32
DocumentType
Standard
Pages
89
PublisherName
European Telecommunications Standards Institute
Status
Current

Standards Relationship
DIN ETS 300425:1996-04 Identical
PN ETS 300 425 : 2005 Identical
NBN ETS 300 425 : 1996 Identical
ECMA 202 : 2ED 97 Corresponds

EG 202 102 : 1.2.2 PRIVATE INTEGRATED SERVICES NETWORK (PISN) - SERVICE PROFILES OF MOBILE PISN USERS - GENERAL REQUIREMENTS
ETR 280 : 20001 BUSINESS TELECOMMUNICATIONS (BTC) - PRIVATE INTEGRATED SERVICES NETWORK (PISN) - PRIVATE USER MOBILITY (PUM)

View more information
US$46.84
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.