1 General
2
Overview of the generic protocols and of their scope
2.1 Three generic protocols
2.1.1 Stimulus protocols
2.1.2 Functional protocol
3
Coexistence of protocols supported by a network
4
Keypad protocol
4.1 General
4.2 Messages used in the Keypad protocol
4.3 Coding of the Keypad facility information element
4.4 Elements of procedure
4.4.1
General
4.5 Procedures at the invocation interface
4.5.1 User procedures
4.5.2 Network procedures
4.6 Procedures at the remote interface
5
Feature key management protocol
5.1 Messages
5.2 Procedures
5.2.1 Assumptions and restrictions
5.2.2 Invocation of supplementary services
5.2.3 Network responses
5.2.4 General aspects
5.2.5 Error conditions
6
Functional protocol
6.1 General
6.1.1 Introduction
6.1.2 Scope of the procedures
6.1.3 Categories of procedures
6.1.4 Supplementary service functions
6.2 Separate messages category
6.2.1 Hold and Retrieve functions
6.2.2 Hold procedures
6.2.3 Retrieve procedures
6.2.4 Collision of messages
6.2.5 Parameter values (Timers)
6.2.6 Clearing of a held call
6.3 Common information element category
6.3.1 Call related supplementary service
procedures
6.3.2 Bearer connection independent
supplementary service procedures
6.3.3 Responses to multiple supplementary
service invocations
6.3.4 Coding of the call reference
6.3.5 Formal definition of data types
6.3.6 Error procedures
6.4 Network side channel reservation function
6.4.1 Implicit reservation
6.4.2 Explicit reservation
6.4.3 Effect of reservation on channel
selection for a new call
7
Message functional definition and content
7.1 Messages for supplementary service control
7.1.1 FACILITY
7.1.2
HOLD
7.1.3 HOLD ACKNOWLEDGE
7.1.4 HOLD REJECT
7.1.5 REGISTER
7.1.6 RETRIEVE
7.1.7 RETRIEVE ACKNOWLEDGE
7.1.8 RETRIEVE REJECT
7.2 Messages for Call Independent, Connection-Oriented Signalling
7.2.1 CALL PROCEEDING
7.2.2 CONNECT
7.2.3 CONNECT ACKNOWLEDGE
7.2.4 FACILITY
7.2.5 RELEASE
7.2.6 RELEASE COMPLETE
7.2.7 SETUP
7.2.8 STATUS
7.2.9 STATUS ENQUIRY
8
General message format and information element coding
8.1 Message type
8.2 Other information elements
8.2.1 Call state
8.2.2 Endpoint identifier
8.2.3 Facility
8.2.4 Extended facility information element
8.2.5 Feature activation
8.2.6 Feature indication
8.2.7 Information request
8.2.8 Notification indicator
8.2.9 Service profile identification
8.2.10
Bearer capability
8.2.11 Channel identification
9
Generic notification procedures
9.1 General
9.1.1 Introduction
9.1.2 Scope of the procedures
9.1.3
Categories of procedures
9.2 Call related notifications
9.2.1 Introduction
9.2.2 Procedures
9.3 Call independent notifications
9.3.1 Introduction
9.3.2 Procedures
9.4 Extension of the Notification indicator information element
10 Call Independent Signalling
Control Procedures
10.1 Point-to-point Networked connection-oriented call independent
component transport mechanism
10.1.1 Connection establishment at the
originating interface
10.1.2 Connection establishment at the
destination interface
10.1.3 Connection clearing
10.1.4 Interaction with restart procedure
10.1.5 Interaction with call rearrangements
10.1.6 Handling of error conditions
10.1.7 Protocol timer values
10.2 Broadcast Networked connection-oriented call independent
component transport mechanism
Annex A – User service profiles and terminal identification
A.1 Introduction
A.2 User service profiles
A.3 Terminal identification
A.4 Initialization
A.4.1 Terminal requested initialization
A.4.2 Network solicited initialization
A.4.3 Collision
A.5 Identification procedures
Annex B – SDL diagrams for Hold/Retrieve functions
B.1 Introduction
Annex C – Definition of address types
Annex D – Enhancements for Virtual Private Networks
D.1 Introduction
D.1.1 Acronyms used in this Annex
D.2 Additional messages and content
D.2.1
SETUP message
D.3 Additional information elements and coding
D.3.1 Called party number
D.3.2 Calling party number
D.3.3 Connected number
D.3.4 Transit
counter
D.3.5 VPN indicator
D.3.6 Facility
D.4 Additional procedures for the control of supplementary
services using the common information element approach
D.4.1 General
D.4.2 Procedures applicable in a public network
context
D.4.3 Procedures applicable in a VPN context
D.5 Generic notification procedures
D.5.1 Categories of notifications
D.5.2 Non-standardized notifications
D.5.3 Protocol control requirements
D.5.4 GFT-Control requirements
D.6 Flow control and related notifications
D.6.1 Flow control capabilities
D.6.2 Indications related to flow control
Appendix I – Illustration of the application of the three protocol types
I.1 Introduction
I.2 Example use of the Keypad protocol
I.3 Example of use of the Feature key management protocol
I.4 Examples of use of the Functional protocol
I.4.1 Call related supplementary service
procedures
I.4.2 Call independent supplementary service
procedures
Appendix II – Functional reference model for the operation of supplementary
services
Appendix III – General description of component encoding rules
III.1 General component structure
III.2 Tag
III.2.1 Tag class
III.2.2 Form of the data element
III.2.3 Tag code
III.3 Length of the contents
III.4 Contents
Appendix IV – Definition of operations, errors and data types
IV.2 Components
IV.2.1
Length of each component or of their data elements
IV.2.2 Component type tag
IV.2.3 Component identifier tags
IV.3 Operation value tag
IV.4 Error value tag
IV.5 Problem tag
IV.6 Parameters
Appendix V – List of object identifiers defined in
Recommendation Q.932
V.1 Acronyms used in this Recommendation
V.2 References