1
Scope
2 Normative
references
3 Definitions,
symbols and abbreviations
3.1 Definitions
3.2 Symbols and
abbreviations
4 Electrical and
physical interface requirements
5 Procedural interface
requirements
5.1 Link control
requirements and procedures
5.1.1 Link-ID verification
5.1.2 Link blocking
6 Services and
architecture aspects and requirements
6.1 On-demand services
6.1.1 PSTN
6.1.2 ISDN Basic Access (ISDN-BA)
6.1.3 ISDN Primary Rate Access (ISDN-PRA)
6.2 Permanent Line
(PL) capability
6.3 Semi-permanent
leased line
6.4 Permanent leased
line service
7 Control and
provisioning
7.1 Control
principles
7.1.1 General requirements and assumptions
7.1.2 Control of ISDN-BA user port for the PL capability
7.1.3 Control of
ISDN-PRA user ports when the PL capability is provided
7.2 Provisioning
strategy and requirements
7.2.1 General
7.2.2 Provisioning requirements
7.3 Bearer Channel
Connection (BCC)
7.4 Protection
8 Protocol
architecture and multiplexing structure
8.1 Functional
description
8.2 Protocol
requirements for PSTN and ISDN
8.3 Time slots
8.4 Time slot
allocation for physical communication channels
8.4.1 Data types for V5.2 C-paths
8.4.2 Communication paths when PSTN is provided on a V5.2 interface
8.4.3 Communication paths when ISDN is provided on a V5.2 interface
8.5 Layer 2
sublayering and multiplexing on communication channels
8.6 Layer 3
multiplexing
8.7 Congestion
control
8.7.1 Flow control end to end
8.7.2 Congestion control on the V5.2 interface
8.7.3 Blocking of ISDN user ports at layer 2
8.7.4 Flow control using LAPV5-DL mechanisms
9 Envelope Function
sublayer of LAPV5 (LAPV5-EF)
10 Data Link sublayer of LAPV5 (LAPV5-DL)
10.1 Frame structure
for peer-to-peer communication
10.2 Invalid frames
10.3 Elements of
procedures and formats of fields for data link sublayer peer-to-peer communication
10.3.1 Link address field format
10.3.2 Link address field variables
10.3.3 Control field formats
10.3.4 Control field parameters and associated state variables
10.3.5 Frame types
10.4 Definition of the
peer-to-peer procedures of the data link sublayer
11 AN frame relay sublayer
12 Sublayer-to-sublayer communication and
mapping function
13 General layer 3 protocol structures
13.1 General
13.2 Information
elements that appear in every message (header)
13.2.1 Protocol Discriminator information element
13.2.2 Layer 3 Address information element
13.2.3 Message Type information element
13.3 Other information
elements
13.4 Protocol message
functional definition and information content
13.5 Codesets
14 PSTN signalling protocol specification
and layer 3 multiplexing
15 Control requirements and protocol
15.1 ISDN-BA user port
status indication and control
15.2 PSTN user port
status indication and control
15.3 ISDN primary rate
user port status indication and control
15.3.1 General aspects
15.3.2 Events and function elements relevant for the control of the state
machines
15.3.3 ISDN‑PRA user port FSMs, AN (ISDN port) and LE (ISDN port)
15.3.4 Performance monitoring aspects
15.4 Control protocol
15.4.1 Control protocol message definition and content
15.4.2 General message format and information element coding
15.4.3 State definition of the control protocol
15.4.4 Control protocol procedures
15.4.5 Accelerated alignment of the port related protocol entities and FSMs
15.5 V5.2-re-provisioning
procedures
16 Link control requirements and protocol
16.1 2048 kbit/s
layer 1 link maintenance requirements
16.1.1 Events and failure reports
16.1.2 Detection algorithm for events and signals
16.1.3 V5.2-interface layer 1 link FSM
16.1.4 Requirements and procedures for the additional functions
16.2 Link control
requirements and procedures
16.2.1 The link blocking and unblocking
16.2.2 The link identification
16.2.3 Events and function elements relevant for the control of the link
state machines
16.2.4 Link control FSM, AN (link) and LE (link)
16.3 Link control
protocol
16.3.1 Link control
protocol message definition and content
16.3.2 Link control protocol information element definition, structure and
coding
16.3.3 Definitions of the link control protocol states
16.3.4 Link control
protocol procedure
16.3.5 Handling of error conditions
16.3.6 Timers for the link control protocol
16.3.7 AN and LE side layer 3 protocol entity state tables
17 BCC protocol elements and procedures
17.1 General
17.2 BCC protocol
entity definition
17.2.1 Definition of BCC protocol states
17.2.2 Definition of BCC protocol primitives, messages and timers
17.3 BCC protocol
message definition and content
17.3.1
ALLOCATION message
17.3.2 ALLOCATION COMPLETE message
17.3.3 ALLOCATION REJECT message
17.3.4 DE-ALLOCATION message
17.3.5 DE-ALLOCATION COMPLETE message
17.3.6 DE-ALLOCATION REJECT message
17.3.7 AUDIT message
17.3.8 AUDIT COMPLETE message
17.3.9 AN FAULT message
17.3.10 AN FAULT ACKNOWLEDGE message
17.3.11
PROTOCOL ERROR message
17.4 BCC information
element definition, structure and coding
17.4.1 BCC Reference Number information element
17.4.2 Other information elements
17.5 Description of
the BCC protocol and the BCC procedures
17.5.1 General
17.5.2 Bearer channel allocation – Normal procedure
17.5.3 Bearer channel
allocation – Exceptional procedures
17.5.4 Bearer channel de-allocation – Normal procedure
17.5.5 Bearer channel de-allocation –
Exceptional procedures
17.5.6 Audit procedure
17.5.7 AN internal failure notification procedure
17.5.8 Handling of error conditions
17.6 List of system
parameters (timers)
17.7 LE side and AN
side state transition tables
18 Protection protocol specification
18.1 General
18.1.1 Introduction
18.1.2 Provisioning of physical and logical C-channels
18.1.3 Separation of responsibilities
18.1.4 Management of
C-channel resources after failure
18.1.5 Monitoring functions and detection of failures
18.1.6 Functional model for the protection protocol
18.2 Other principles
18.3 Protection protocol entity definition
18.3.1 Definition of protection protocol states
18.3.2 Definition of protection protocol events
18.4 Protection
protocol message definition and content
18.4.1 SWITCH-OVER REQ
message
18.4.2 SWITCH-OVER COM message
18.4.3 OS-SWITCH-OVER COM message
18.4.4 SWITCH-OVER ACK message
18.4.5 SWITCH-OVER REJECT message
18.4.6 PROTOCOL ERROR message
18.4.7 RESET SN COM message
18.4.8 RESET SN ACK message
18.5 Protection
protocol information element definition, structure and coding
18.5.1 Logical C-channel identification information element
18.5.2 Sequence-number information element
18.5.3 Physical C-channel identification information element
18.5.4 Rejection Cause information element
18.5.5 Protocol Error Cause information element
18.6 Protection
protocol procedures
18.6.1 General
18.6.2 Broadcast of protection protocol messages on the two data links of
the primary and secondary link
18.6.3 Standard protection switch-over procedure initiated by LE-side
18.6.4 Dedicated protection switch-over procedure initiated by OS LE
18.6.5 Protection switch-over procedure requested by AN-side
18.6.6 Handling of error conditions
18.7 List of system
parameters
18.8 AN and LE side
state tables
18.8.1 Protection protocol FSM in the AN
18.8.2 Protection protocol FSM in the LE
Annex A – Service scenarios, architecture and
functional definition of access
arrangements with AN at the LE
A.1 Conclusions on
multiple V5-interface applications
A.2 Conclusions on architecture aspects
A.3 Implementation of
QAN
A.4 Requirements for
the support of the PL capability through an ISDN basic access
A.5 Requirements for
the support of the PL capability through an ISDN primary rate access
A.6 Assumptions and
requirements for the support of semi-permanent leased lines
A.6.1 General
A.6.2 Signalling associated to semi-permanent leased lines
A.6.3
User ports
A.6.4 Requirements for non-ISDN user ports for semi-permanent leased lines
A.7 Example of AN and
LE configuration
Annex B – Use of the protocol information elements for
national PSTN protocols
Annex C – Basic requirements of the system management
functions in the AN and the LE
C.1 Procedure for the
ISDN basic access continuity test
C.2 Port Blocking
C.3 Collision between
primitives
C.4 AN detection of
hard failure and unacceptable performance
C.5 Port Unblocking
C.6 Control and
Provisioning
C.7 Verification of
Port State
C.8 Permanent
Activation of ISDN lines
C.9 Coordination of
FSMs
C.10 Error performance
of Digital Section
C.11 Provisioning
verification
C.12 Re-provisioning
synchronization
C.13 System startup
C.14 PSTN restart
procedure
C.15 Data link
activation procedure
C.16 Data link reset
C.17 Data link failure
C.18 Control protocol
layer 3 protection mechanism error
C.19 Timers in the
system management entity
C.20 Application of
link identification procedure
C.21 Reaction on
result of link identification
C.22 Link blocking and
re-provisioning
C.23 Single link
configuration and protection mechanism
C.24 Re-establishment
of data links after protection switching
C.25 V5.2 initialization
and protocol data
C.26 The treatment of
BCC allocation rejections by system management
C.27 Link control
protocol layer 3 protection mechanism error
C.28 Accelerated
alignment procedures
C.29 Handling of
timers TC8 and TC9
C.30 Handling of timer
TV1
C.31 Alignment of
blocking/unblocking between PSTN and Control protocols
C.32 Handling of timer
TC10
Annex D – Protocol architecture for PSTN and ISDN (BA and
PRA) user port control
D.1 Scope
D.2 ISDN-BA port status control
D.3 ISDN-PRA user
port status control
D.3.1 Functional split between LE and AN
D.3.2 Information transfer between LE and AN
D.3.3 Activation/deactivation
D.4 PSTN user port control
Annex E – Frame structures, message codepoints and
addressing scheme for V5.2
Annex F – The concept and requirements for the upgrade
of a V5.1 interface to a V5.2
Annex G – AN requirements for pulse dialling
Annex H – Layer 3 error detection procedures
Annex J –
Protection protocol – Explanatory notes and information flow
J.1 Additional
information on the principles of the protection protocol
J.2 Information flow
Annex K – BCC protocol application principles
K.1 Introduction
K.2 Time slot
usability
K.3 Time slot
allocation and de-allocation rules
K.3.1 General
K.3.2 Multi-slot
connections
K.3.3 Override capability
K.4 Audit procedure
rules
K.5 AN internal
failure notification rules
K.6 AN internal
failure rules
K.7 BCC protocol
errors
K.8 Arrow diagrams –
Examples of BCC protocol and DSS1 coordination
K.8.1 ISDN call initiated by the subscriber
K.8.2 ISDN call initiated by the network
K.8.3 ISDN call release initiated by the subscriber
K.8.4 ISDN call release initiated by the network
K.8.5 Terminal portability supplementary service support
K.9 Arrow diagrams –
Examples of BCC and PSTN protocol coordination
K.9.1 PSTN call initiated by the subscriber
K.9.2 PSTN call initiated by the network
K.9.3 Call collision
K.9.4 Call release
K.10 Link failure
rules
Annex L – Examples for an implementation with high
interoperability
L.1 Locally
unsupported procedures
L.2 Remotely
unsupported procedures
L.3 Cooperative
design in general
Appendix I – Bibliography