SIST EN 300 347-1 V2.2.2:2005
(Main)V interfaces at the digital Local Exchange (LE); V5.2 interface for the support of Access Network (AN); Part 1: V5.2 interface specification
V interfaces at the digital Local Exchange (LE); V5.2 interface for the support of Access Network (AN); Part 1: V5.2 interface specification
Second edition of the V.5.2 interface will align with the second editi on of the V5.1 interface.
Vmesniki V pri digitalnih krajevnih telefonskih centralah (LE) - Vmesnik V5.2 za podporo dostopovnemu omrežju (AN) - 1. del: Specifikacija vmesnika V5.2
General Information
Standards Content (Sample)
SLOVENSKI STANDARD
01-april-2005
Vmesniki V pri digitalnih krajevnih telefonskih centralah (LE) - Vmesnik V5.2 za
podporo dostopovnemu omrežju (AN) - 1. del: Specifikacija vmesnika V5.2
V interfaces at the digital Local Exchange (LE); V5.2 interface for the support of Access
Network (AN); Part 1: V5.2 interface specification
Ta slovenski standard je istoveten z: EN 300 347-1 Version 2.2.2
ICS:
33.040.30 Komutacijski in signalizacijski Switching and signalling
sistem systems
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
ETSI EN 300 347-1 V2.2.2 (1999-12)
European Standard (Telecommunications series)
V interfaces at the digital Local Exchange (LE);
V5.2 interface for the support of Access Network (AN);
Part 1: V5.2 interface specification
2 ETSI EN 300 347-1 V2.2.2 (1999-12)
Reference
REN/SPS-09060-1
Keywords
V interface, V5 interface, LE, AN
ETSI
Postal address
F-06921 Sophia Antipolis Cedex - FRANCE
Office address
650 Route des Lucioles - Sophia Antipolis
Valbonne - FRANCE
Tel.:+33492944200 Fax:+33493654716
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Internet
secretariat@etsi.fr
Individual copies of this ETSI deliverable
can be downloaded from
http://www.etsi.org
If you find errors in the present document, send your
comment to: editor@etsi.fr
Important notice
This ETSI deliverable may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network
drive within ETSI Secretariat.
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 1999.
All rights reserved.
ETSI
3 ETSI EN 300 347-1 V2.2.2 (1999-12)
Contents
Intellectual Property Rights.10
Foreword.10
Introduction .11
1 Scope .13
2 References.14
3 Definitions and abbreviations .15
3.1 Definitions.15
3.2 Abbreviations .17
4 Electrical and physical interface requirements .17
5 Procedural interface requirements .18
5.1 Link control requirements and procedures .18
5.1.1 Link-ID verification.18
5.1.2 Link blocking.18
6 Services and architecture aspects and requirements .19
6.1 On-demand services .19
6.1.1 PSTN .19
6.1.2 ISDN Basic Access (ISDN-BA) .19
6.1.3 ISDN Primary Rate Access (ISDN-PRA).20
6.2 Permanent Line (PL) capability.20
6.3 Semi-permanent leased line.20
6.4 Permanent leased line service.20
7 Control and provisioning.21
7.1 Control principles.21
7.1.1 General requirements and assumptions.21
7.1.2 Control of ISDN-BA user port for the PL capability .23
7.1.3 Control of ISDN-PRA user ports when the PL capability is provided.23
7.1.3.1 Statements and assumptions .23
7.1.3.2 ISDN and PL capability .23
7.2 Provisioning strategy and requirements.24
7.2.1 General.24
7.2.2 Provisioning requirements .24
7.3 Bearer Channel Connection (BCC) .24
7.4 Protection .25
8 Protocol architecture and multiplexing structure.25
8.1 Functional description .25
8.2 Protocol requirements for PSTN and ISDN .26
8.3 Time slots .27
8.4 Time slot allocation for physical communication channels .27
8.4.1 Data types for V5.2 C-paths.28
8.4.2 Communication paths when PSTN is provided on a V5.2 interface .28
8.4.3 Communication paths when ISDN is provided on a V5.2 interface.28
8.5 Layer 2 sublayering and multiplexing on communication channels .29
8.6 Layer 3 multiplexing.29
8.7 Congestion control.29
8.7.1 Flow control end to end .29
8.7.2 Congestion control on the V5.2 interface .29
8.7.3 Blocking of ISDN user ports at layer 2.29
8.7.4 Flow control using LAPV5-DL mechanisms .29
ETSI
4 ETSI EN 300 347-1 V2.2.2 (1999-12)
9 Envelope Function sublayer of LAPV5 (LAPV5-EF) .29
10 Data Link sublayer of LAPV5 (LAPV5-DL).30
10.1 Frame structure for peer-to-peer communication .30
10.2 Invalid frames.30
10.3 Elements of procedures and formats of fields for data link sublayer peer-to-peer communication .30
10.3.1 Link address field format .30
10.3.2 Link address field variables .30
10.3.2.1 Address field extension bit (EA) .30
10.3.2.2 Command/response field bit.30
10.3.2.3 V5DLaddr .30
10.3.3 Control field formats.30
10.3.4 Control field parameters and associated state variables.30
10.3.5 Frame types.31
10.4 Definition of the peer-to-peer procedures of the data link sublayer .31
11 AN frame relay sublayer .31
12 Sublayer-to-sublayer communication and mapping function .31
13 General layer 3 protocol structures .31
13.1 General .31
13.2 Information elements that appear in every message (header) .32
13.2.1 Protocol Discriminator information element.32
13.2.2 Layer 3 Address information element.33
13.2.3 Message Type information element .33
13.3 Other information elements .34
13.4 Protocol message functional definition and information content.34
13.5 Codesets .34
14 PSTN signalling protocol specification and layer 3 multiplexing .34
15 Control requirements and protocol .34
15.1 ISDN-BA user port status indication and control.34
15.2 PSTN user port status indication and control .35
15.3 ISDN primary rate user port status indication and control .35
15.3.1 General aspects .35
15.3.2 Events and function elements relevant for the control of the state machines .36
15.3.3 ISDN-PRA user port FSMs, AN (ISDN port) and LE (ISDN port).38
15.3.3.1 Description of the states .38
15.3.3.2 Definition of port control states.38
15.3.3.2.1 ISDN-PRA user port FSM - AN (ISDN port) .38
15.3.3.2.2 ISDN-PRA user port FSM - LE (ISDN port) .39
15.3.3.3 Principles and procedures .39
15.3.3.3.1 General .39
15.3.3.3.2 Blocking .39
15.3.3.3.3 Blocking request.40
15.3.3.3.4 Co-ordinated unblocking .40
15.3.3.3.5 User failure/network failure indication .40
15.3.3.3.6 Support of the permanent line capability .40
15.3.3.4 ISDN port FSM at the AN.41
15.3.3.5 ISDN port FSM at the LE .42
15.3.4 Performance monitoring aspects.42
15.4 Control protocol .43
15.4.1 Control protocol message definition and content.43
15.4.2 General message format and information element coding .43
15.4.3 State definition of the control protocol .44
15.4.4 Control protocol procedures .44
15.4.5 Accelerated alignment of the port related protocol entities and FSMs .45
15.5 V5.2 re-provisioning procedures .45
16 Link control requirements and protocol.46
16.1 2 048 kbit/s layer 1 link maintenance requirements.47
ETSI
5 ETSI EN 300 347-1 V2.2.2 (1999-12)
16.1.1 Events and failure reports .47
16.1.2 Detection algorithm for events and signals .48
16.1.3 V5.2 interface layer 1 link FSM.48
16.1.4 Requirements and procedures for the additional functions .50
16.2 Link control requirements and procedures .50
16.2.1 The link blocking and unblocking.50
16.2.2 The link identification.51
16.2.3 Events and function elements relevant for the control of the link state machines.52
16.2.4 Link control FSM, AN (link) and LE (link).53
16.2.4.1 Description of the states .53
16.2.4.2 Definition of link control states and general co-ordination requirements.54
16.2.4.2.1 Link control FSM - AN (AN_Link).54
16.2.4.2.2 Link control FSM - LE (LE_Link) .55
16.2.4.3 Principles and procedures .55
16.2.4.3.1 General .55
16.2.4.3.2 Link blocking.56
16.2.4.3.3 Link blocking request .56
16.2.4.3.4 Co-ordinated link unblocking .56
16.2.4.3.5 Link identification .57
16.2.4.4 Link control FSM at the AN.58
16.2.4.5 Link control FSM at the LE .59
16.3 Link control protocol.60
16.3.1 Link control protocol message definition and content .60
16.3.1.1 LINK CONTROL message .60
16.3.1.2 LINK CONTROL ACK message.60
16.3.2 Link control protocol information element definition, structure and coding.61
16.3.2.1 Layer 3 address information element .61
16.3.2.2 Link control function information element.61
16.3.3 Definitions of the link control protocol states.62
16.3.4 Link control protocol procedure .62
16.3.4.1 General.62
16.3.4.2 Start traffic indication.63
16.3.4.2.1 Normal operation.63
16.3.4.2.2 Exceptional procedures.63
16.3.4.3 Stop traffic indication.63
16.3.4.3.1 Normal operation.63
16.3.4.3.2 Exceptional procedures.63
16.3.4.4 Link control layer 3 protocol entity procedure.63
16.3.5 Handling of error conditions.64
16.3.5.1 Protocol discriminator error .64
16.3.5.2 Layer 3 address error.64
16.3.5.3 Message type error .64
16.3.5.4 Repeated information elements .64
16.3.5.5 Mandatory information element missing.64
16.3.5.6 Unrecognized information element .64
16.3.5.7 Content error of mandatory information elements.65
16.3.6 Timers for the link control protocol.65
16.3.7 AN and LE side layer 3 protocol entity state tables.65
17 BCC protocol elements and procedures.66
17.1 General .66
17.2 BCC protocol entity definition .68
17.2.1 Definition of BCC protocol states.68
17.2.1.1 BCC states in the AN .68
17.2.1.2 BCC states in the LE .69
17.2.2 Definition of BCC protocol primitives, messages and timers .70
17.3 BCC protocol message definition and content.71
17.3.1 ALLOCATION message .72
17.3.2 ALLOCATION COMPLETE message .72
17.3.3 ALLOCATION REJECT message .73
17.3.4 DE-ALLOCATION message.73
ETSI
6 ETSI EN 300 347-1 V2.2.2 (1999-12)
17.3.5 DE-ALLOCATION COMPLETE message.74
17.3.6 DE-ALLOCATION REJECT message.74
17.3.7 AUDIT message .74
17.3.8 AUDIT COMPLETE message.75
17.3.9 AN FAULT message .76
17.3.10 AN FAULT ACKNOWLEDGE message.76
17.3.11 PROTOCOL ERROR message.76
17.4 BCC information element definition, structure and coding .77
17.4.1 BCC Reference Number information element .77
17.4.2 Other information elements.77
17.4.2.1 User Port Identification information element .78
17.4.2.2 ISDN Port Time Slot Identification information element.78
17.4.2.3 V5 Time Slot Identification information element.79
17.4.2.4 Multi-Slot Map information element.79
17.4.2.5 Reject Cause information element.80
17.4.2.6 Protocol Error Cause information element.82
17.4.2.7 Connection Incomplete information element.83
17.5 Description of the BCC protocol and the BCC procedures .84
17.5.1 General.84
17.5.2 Bearer channel allocation - normal procedure .84
17.5.3 Bearer channel allocation - exceptional procedures.85
17.5.3.1 Bearer channel allocation.85
17.5.3.2 Bearer channel allocation reject .85
17.5.3.3 Bearer channel allocation abort.85
17.5.3.4 Bearer channel allocation request received for existing connection.86
17.5.3.5 Bearer channel allocation, connection override requested .86
17.5.4 Bearer channel de-allocation - normal procedure .86
17.5.5 Bearer channel de-allocation - exceptional procedures.86
17.5.5.1 Bearer channel de-allocation.86
17.5.5.2 Bearer channel de-allocation reject .87
17.5.5.3 Bearer channel de-allocation process message missing.87
17.5.6 Audit procedure .87
17.5.7 AN internal failure notification procedure.87
17.5.8 Handling of error conditions.88
17.5.8.1 Protocol discriminator error .88
17.5.8.1a BCC Reference Number coding error .89
17.5.8.2 Message type error .89
17.5.8.3 Information element out of sequence .89
17.5.8.4 Repeated mandatory information elements .89
17.5.8.4a Repeated optional information element.90
17.5.8.5 Mandatory information element missing.90
17.5.8.6 Unrecognized information element .90
17.5.8.7 Content error of mandatory information element .91
17.5.8.8 Content error of optional information element.91
17.5.8.9 Unexpected message .91
17.5.8.10 Optional information element not allowed .91
17.6 List of system parameters (timers).92
17.7 LE side and AN side state transition tables .93
18 Protection protocol specification .95
18.1 General .95
18.1.1 Introduction.95
18.1.2 Provisioning of physical and logical C-channels .95
18.1.3 Separation of responsibilities.96
18.1.4 Management of C-channel resources after failure.97
18.1.5 Monitoring functions and detection of failures .98
18.1.5.1 Failure of a 2 048 kbit/s link .98
18.1.5.2 Flag monitoring.98
18.1.5.3 Data link monitoring .98
18.1.6 Functional model for the protection protocol.98
18.2 Other principles .99
ETSI
7 ETSI EN 300 347-1 V2.2.2 (1999-12)
18.3 Protection protocol entity definition.100
18.3.1 Definition of protection protocol states .100
18.3.1.1 States in the AN.100
18.3.1.2 States in the LE .100
18.3.2 Definition of protection protocol events .100
18.4 Protection protocol message definition and content .103
18.4.1 SWITCH-OVER REQ message.103
18.4.2 SWITCH-OVER COM message.103
18.4.3 OS-SWITCH-OVER COM message .104
18.4.4 SWITCH-OVER ACK message .104
18.4.5 SWITCH-OVER REJECT message .104
18.4.6 PROTOCOL ERROR message.105
18.4.7 RESET SN COM message.105
18.4.8 RESET SN ACK message .105
18.5 Protection protocol information element definition, structure and coding .106
18.5.1 Logical C-channel identification information element.106
18.5.2 Sequence-number information element.106
18.5.3 Physical C-channel identification information element.107
18.5.4 Rejection Cause information element .107
18.5.5 Protocol Error Cause information element.108
18.6 Protection protocol procedures.109
18.6.1 General.109
18.6.2 Broadcast of protection protocol messages on the two data links of the primary and secondary link.110
18.6.2.1 Transmission of protection protocol messages.110
18.6.2.2 Receipt of protection protocol messages.110
18.6.2.3 Sequence number reset procedure.110
18.6.2.3.1 Normal procedure.110
18.6.2.3.2 Exceptional procedures.111
18.6.3 Standard protection switch-over procedure initiated by LE-side .111
18.6.3.1 Normal procedure.111
18.6.3.2 Exceptional procedures .112
18.6.3.3 Procedure on expiry of timer TSO1 .112
18.6.4 Dedicated protection switch-over procedure initiated by OS LE.113
18.6.4.1 Normal procedure.113
18.6.4.2 Exceptional procedures .113
18.6.4.3 Procedure on expiry of timer TSO2 .113
18.6.5 Protection switch-over procedure requested by AN-side.114
18.6.5.1 Normal procedure.114
18.6.5.2 Exceptional procedure, AN cannot comply with switch-over command from LE .115
18.6.5.3 Exceptional procedure, LE cannot comply with switch-over request from AN .115
18.6.5.4 Procedure on expiry of timer TSO3 .115
18.6.6 Handling of error conditions.115
18.6.6.1 Protocol discriminator error .116
18.6.6.1a Logical C-Channel identification error.116
18.6.6.2 Message type error .116
18.6.6.3 Repeated mandatory information element.117
18.6.6.4 Mandatory information element missing.117
18.6.6.5 Unrecognized information element .117
18.6.6.6 Content error of mandatory information element .118
18.6.6.7 Unexpected message .118
18.7 List of system parameters .118
18.8 AN and LE side state tables.119
18.8.1 Protection protocol FSM in the AN .119
18.8.2 Protection protocol FSM in the LE.120
ETSI
8 ETSI EN 300 347-1 V2.2.2 (1999-12)
Annex A (normative): Requirements for the support of the PL capability through an
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...