home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Collection of Hack-Phreak Scene Programs
/
cleanhpvac.zip
/
cleanhpvac
/
HOMEWORK.ZIP
/
CPUISDN.TXT
< prev
next >
Wrap
Text File
|
1998-07-25
|
32KB
|
401 lines
What is ISDN?
ISDN, which stands for integrated services digital network, is a system of digitizing phone
networks which has been in the works for over a decade. This system allows audio, video,
and text data to be transmitted simultaneously across the world using end-to-end digital
connectivity.
The original telephone system used analog signals to transmit a signal across telephone
wires. The voice was carried by modulating an electric current with a waveform from a
microphone. The receiving end would then vibrate a speaker coil for the sound to travel back
to the ear through the air. Most telephones today still use this method. Computers, however,
are digital machines. All information stored on them is represented by a bit, representing a
zero or a one. Multiple bits are used to represent characters, which then can represent
words, numbers, programs, etc. The analog signals are just varying voltages sent across the
wires over time. Digital signals are represented and transmitted by pulses with a limited
number of discrete voltage levels. [Hopkins]
The modem was certainly a big breakthrough in computer technology. It allowed computers to
communicate with each other by converting their digital communications into an analog
format to travel through the public phone network. However, there is a limit to the amount
of information that a common analog telephone line can hold. Currently, it is about 28.8
kbit/s. [Hopkins] ISDN allows multiple digital channels to be operated simultaneously
through the same regular phone jack in a home or office. The change comes about when the
telephone company's switches are upgraded to handle digital calls. Therefore, the same
wiring can be used, but a different signal is transmitted across the line. [Hopkins]
Previously, it was necessary to have a phone line for each device you wished to use
simultaneously. For example, one line each for the phone, fax, computer, and live video
conference. Transferring a file to someone while talking on the phone, and seeing their
live picture on a video screen would require several expensive phone lines. [Griffiths]
Using multiplexing (a method of combining separate data signals together on one channel
such that they may be decoded again at the destination), it is possible to combine many
different digital data sources and have the information routed to the proper destination.
Since the line is digital, it is easier to keep the noise and interference out while
combining these signals. [Griffiths] ISDN technically refers to a specific set of services
provided through a limited and standardized set of interfaces. This architecture provides a
number of integrated services currently provided by separate networks.
ISDN adds capabilities not found in standard phone service. The main feature is that instead
of the phone company sending a ring voltage signal to ring the bell in your phone, it sends
a digital package that tells who is calling (if available), what type of call it is
(data/voice), and what number was dialed (if multiple numbers are used for a single line).
ISDN phone equipment is then capable of making intelligent decisions on how to answer the
call. In the case of a data call, baud rate and protocol information is also sent, making
the connection instantaneous. [Griffiths] ISDN Concepts:
With ISDN, voice and data are carried by bearer channels (B channels) occupying a bandwidth
of 64 kbit/s each. A delta channel (D channel) handles signalling at 16 kbit/s or 64
kbit/s. H channels are provided for user information at higher bit rates. [Stallings] There
are two types of ISDN service: Basic Rate ISDN (BRI) and Primary Rate ISDN (PRI).
BRI: consists of two 64 kbit/s B channels and one 16 kbit/s D channel for a total of 144
kbit/s. The basic service is intended to meet the needs of most individual users. PRI:
intended for users with greater capacity requirements. Typically the channel structure is 23
B channels plus one 64 kbit/s D channel for a total of 1.544 Mbit/s. H channels can also be
implemented: H0=384 kbit/s, H11=1536 kbit/s, H12=1920 kbit/s. [Stallings]
In this paper, I will concentrate on defining the specifics of Basic Rate ISDN for local
loop transmission. I will provide an in depth view of ISDN as it relates to layer 1 to 3
of the seven layer OSI model. I will also provide the specification for communication at
the S/T customer interface.
Basic Rate ISDN:
Basic Rate Interface (BRI) - The BRI is the fundamental building block of an ISDN network.
It is composed of a single 16 kbit/s "D-channel" which is used for call setup and control
and two 64 kbit/s "B-channels". The B-channels can be used to carry voice and both circuit
mode and packet mode data traffic. The D-channel may also be used to carry X.25 packet
traffic if the network supports that option. [Griffiths]
Basic Rate Interface D Channel - In the analog world, a telephone call is controlled
in-band. Tones and voltages are sent across lines for signalling conditions. ISDN does
away with this. The D channel becomes the vehicle for signalling. This signalling is
called common channel since a separate channel for signalling is used by two or more bearer
channels. [Hopkins]
User - Network protocols define how users interact with ISDN networks. Between the user
equipment and network equipment is a set of defined interfaces. The U interface is between
the central office and the customer premise. This interface carries information on the
twisted pair of wires between the customer and the central office. At the S/T interface
located at the customer location, two pairs of wires (one for transmitting, one for
receiving) are used. The intermediate device between the U and the S/T interface is known
as an NT1. The NT1 is a hybrid that converts from four wire to two wire and also
transforms the 2B+D signal into a different bit stream format. [Griffiths]
ISDN and the OSI Model - The OSI (Open Systems Interconnect) seven layer protocol was
developed to promote interoperability in the data world. ISDN, which followed OSI, was
designed to be a network technology inhabiting the lower three layers of the OSI model.
Consequently, an OSI end system that implements an OSI seven layer stack can contain ISDN at
the lower layers. Also, services such as TCP/IP (Internet Transmission Control Protocol)
can use the ISDN network. [Griffiths]
Layer 1 of User-Network Interface:
Layer 1 protocols provide the details that describe how the signals (electrical or optical)
are encoded onto the physical medium. These protocols describe how the user data and
signalling bits are transformed into line signals, then back again into user data bits.
The ISDN layer 1 protocol supports the functions outlined below. [ITU-T, I.430] ( B Channel
Transmission ( D Channel Transmission ( D Channel Access Procedure
B Channel Transmission - Layer 1 must support for each direction of transmission, two
independent 64 kbit/s B channels. The B channels contain user data which is switched by the
network to provide the end-to-end transmission source. There is no error correction
provided by the network on these channels. [ITU-T, I.430]
D Channel Transmission - Layer 1 must support for each direction of transmission, a 16
kbit/s channel for the signalling information. In some networks user packet data may also
be supported on the D channel. [ITU-T, I.430]
D Channel Access Procedure - This procedure ensures that in the case of two or more
terminals, on a point to multipoint configuration, attempting to access the D Channel
simultaneously, one terminal will always successfully complete the transmission of
information. [ITU-T, I.430]
Binary Organization of Layer 1 frame - The structures of Layer 1 frames across the interface
are different in each direction of transmission. Both structures are shown in figure 1
below. [Griffiths]
A frame is 48 bits long and lasts 250(s. The bit rate is therefore 192 kbit/s and each bit
is approximately 5.2(s long. Figure 1 also shows that there is a 2-bit offset between
transmit and receive frames. This is the delay between frame start at the receiver of a
terminal and the frame start of the transmitted signal. [Griffiths] Figure 1 also
illustrates that the line coding used is AMI (Alternate Marks Inversion); a logical 1 is
transmitted as zero volts and a logical 0 as a positive or negative pulse. Note that this
convention is the inverse of that used on line transmission systems. The nominal pulse
amplitude is 750mV. [Griffiths] A frame contains several L bits. These are balance bits to
prevent a build up of DC on the line. For the direction TE to NT, where each B-channel may
come from a different terminal, each terminal's output contains an L bit to form a balanced
block. [ITU-T, I.430] Examining the frame in the NT to TE direction, the first bits of the
frame are the F/L pair, which is used in the frame alignment procedure. The start of a new
frame is signalled by the F/L pair violating the AMI rules. Once a violation has occurred
there must be a second violation to restore correct polarity before the next frame. This
takes place with the first mark after the F/L pair. The FA bit ensures this second
violation occurs should there not be a mark in the B1, B2, D, E, or A channels. The E
channel is an echo channel in which D-channel bits arriving at the NT are echoed back to
the TEs. There is a 10 bit offset between the D channel leaving a terminal, traveling to
the NT and being echoed back in the E channel. [ITU-T, I.430] The A bit is used in the
activation procedure to indicate to the terminals that the system is in synchronization.
Next is a byte of the B2 channel, a bit of the E channel and a bit of the D channel,
followed by an M bit. This is used for multiframing. The M bit identifies some FA bits
which can be stolen to provide a management channel. [ITU-T, I.430] The B1, B2, D, and E
channels are then repeated along with the S bit which is a spare bit. [ITU-T, I.430]
Layer 1 D Channel Contention Procedure - This procedure ensures that, even in the case of
two or more terminals attempting to access the D channel simultaneously, one terminal will
always successfully complete the transmission of information by first gaining control of the
D channel and then retransmitting its information. The procedure relies on the fact that
the information to be transmitted consists of layer 2 frames delimited by flags consisting
of the binary pattern 01111110. Layer 2 applies a zero bit insertion algorithm to prevent
flag imitation by a layer 2 frame. The interframe time fill consists of binary 1s which are
represented by zero volts. The zero volt line signal is generated by the TE transmitter
going high impedance. This means a binary 0 from a parallel terminal will overwrite as
binary 1. Detection of collision is done by the terminal monitoring the E channel (D
channel echoed from the NT). [ITU-T, I.430]
To access the D channel a terminal looks for the interframe time fill by counting the
number of consecutive binary 1s in the D channel. Should a binary 0 be received the count
is reset. When the number of consecutive 1s reaches a predetermined value (which is
greater than the number of consecutive 1s possible in a frame because of the zero bit
insertion algorithm) the counter is reset and the terminal may access the D channel. When
a terminal has just completed transmitting a frame the value of the count needed to be
reached before another frame may be transmitted is incremented by 1. This gives other
terminals a chance to access the channel. Hence an access and priority mechanism is
established. [ITU-T, I.430] There is still the possibility of collision between two
terminals of the same priority. This is detected and resolved by each terminal comparing
its last transmitted bit with the next E bit. If they are the same the terminal continues
to transmit. If, however, they are different the terminal detecting the difference ceases
transmission immediately and returns to the D channel monitoring state leaving the other
terminal to continue transmission. [ITU-T, I.430]
Layer 1 Activation/Deactivation Procedure - This procedure permits activation of the
interface from both the terminal and network side, but deactivation only from the network
side. This is because of the multi-terminal capability of the interface. Activation and
deactivation information is conveyed across the interface by the use of line signals called
'Info signals'. [ITU-T, I.430]
Info 0 is the absence of any line signal; this is the idle state with neither terminals nor
the NT working. [ITU-T, I.430] Info 1 is flags transmitted from a terminal to the NT to
request activation. Note this signal is not synchronized to the network. [ITU-T, I.430]
Info 2 is transmitted from the NT to the TEs to request their activation or to indicate
that the NT has activated as a response to receiving an Info 1. An Info 2 consists of
Layer 1 frames with a high density of binary zeros in the data channels which permits fast
synchronization of the terminals. [ITU-T, I.430] Info 2 and Info 4 are frames containing
operational data transmitted from the TE and NT respectively.[ITU-T, I.430] The principal
activation sequence is commenced when a terminal transmits an Info 1. The NT activates the
local transmission system which indicates to the exchange that the customer is activating.
The NT1 responds to the terminals with an Info 2 to which the TEs synchronize. The TEs
respond with an Info 3 containing operational data and the NT is then in a position to send
Info 4 frames. Note that all terminals activate in parallel; it is not possible to have
just one terminal activated in a multi-terminal configuration. The network activates the
bus by the exchange activating the local network transmission system. Deactivation occurs
when the exchange deactivates the local network transmission system. [ITU-T, I.430]
Layer 2 of User-Network Interface:
The Layer 2 recommendation describes the high level data link (HDLC) procedures commonly
referred to as the Link Access Procedure for a D channel or LAP D. The objective of Layer
2 is to provide a secure, error-free connection between two endpoints connected by a
physical medium. Layer 3 call control information is carried in the information elements
of Layer 2 frames and it must be delivered in sequence and without error. Layer 2 also has
the responsibility for detecting and retransmitting lost frames.
LAP D was based originally on LAP B of the X.25 Layer 2 recommendation. However, certain
features of LAP D give it significant advantages. The most striking difference is the
possibility of frame multiplexing by having separate addresses at Layer 2 allowing many LAPs
to exist on the same physical connection. It is this feature that allows up to eight
terminals to share the signalling channel in the passive bus arrangement. [ITU-T, Q.920]
Each Layer 2 connection is a separate LAP and the termination points for the LAPs are
within the terminals at one end and at the periphery of the exchange at the other. Layer 2
operates as a series of frame exchanges between the two communicating, or peer entities.
The frames consist of a sequence of eight bit elements and the elements in the sequence
define their meaning as shown in Figure 2 below. [ITU-T, Q.920]
A fixed pattern called a flag is used to indicate both the beginning and end of a frame.
Two octets are needed for the Layer 2 address and carry a service identifier (SAPI), a
terminal identifier (TEI) and a command /response bit. The control field is one or two
octets depending on the frame type and carries information that identifies the frame and
the Layer 2 sequence numbers used for link control. The information element is only
present in frames that carry Layer 3 information and the Frame Check Sequence (FCS) is used
for error detection. A detailed breakdown of the individual elements is given in Figures 3
and 4 below. [ITU-T, Q.920] What cannot be shown in the diagrams is the procedure to avoid
imitation of the flag by the data octets. This is achieved by examining the serial stream
between flags and inserting an extra 0 after any run of five 1 bits. The receiving Layer 2
entity discards a 0 bit if it is preceded by five 1's. [ITU-T, Q.920]
Layer 2 Addressing - Layer 2 multiplexing is achieved by employing a separate Layer 2
address for each LAP in the system. To carry the LAP identity the address is two octets
long and identifies the intended receiver of a command frame and the transmitter of a
response frame. The address has only local significance and is known only to the two
end-points using the LAP. No use can be made of the address by the network for routing
purposes and no information about its value will be held outside the Layer 2 entity. [ITU-T,
Q.921]
The Layer 2 address is constructed as shown in Figure 3. The Service Access Identifier
(SAPI) is used to identify the service intended for the signalling frame. An extension of
the use of the D channel is to use it for access to a packet service as well as for
signalling. Consider the case of digital telephones sharing a passive bus with packet
terminals. The two terminal types will be accessing different services and possibly
different networks. It is possible to identify the service being invoked by using a
different SAPI for each service. This gives the network the option of handling the
signalling associated with different services in separate modules. In a multi-network ISDN
it allows Layer 2 routing to the appropriate network. The value of the SAPI is fixed for a
given service. [ITU-T, Q.921] The Terminal Endpoint Identifier (TEI) takes a range of
values that are associated with terminals on the customer's line. In the simplest case
each terminal will have a single unique TEI value. The combination of TEI and SAPI
identify the LAP and provide a unique Layer 2 address. A terminal will use its Layer 2
address in all transmitted frames and only frames received carrying the correct address
will be processed. [ITU-T, Q.921] In practice a frame originating from telephony call
control has a SAPI that identifies the frame as 'telephony' and all telephone equipment
examine this frame. Only the terminal whose TEI agrees with that carried by the frame will
pass it to the Layer 2 and Layer 3 entities for processing. There is also a SAPI
identified in standards for user data packet communication. [ITU-T, Q.921] Since it is
important that no two TEIs are the same, the network has a special TEI management entity
which allocates TEI on request and ensures their correct use. The values that TEIs can
take fall into the ranges:
0-63 Non-Automatic Assignment TEIs
64-126 Automatic Assignment TEIs
127 Global TEI [ITU-T, Q.921]
Non-Automatic TEIs are selected by the user; their allocation is the responsibility of the
user. Automatic TEIs are selected by the network; their allocation is the responsibility
of the network. The global TEI is permanently allocated and is referred to as the
broadcast TEI. [ITU-T, Q.921] Terminals which use TEIs in the range of 0-63 need not
negotiate with the network before establishing a Layer 2 connection. Terminals which use
TEIs in the range 64-126 cannot establish a Layer 2 connection until they have requested a
TEI from the network. In this case it is the responsibility of the network not to allocate
the same TEI more than once at any given time. The global TEI is used to broadcast
information to all terminals within a given SAPI; for example a broadcast message to all
telephones, offering an incoming telephone call. [ITU-T, Q.921]
Layer 2 Operation - The function of Layer 2 is to deliver Layer 3 frames, across a Layer 1
interface, error free and in sequence. It is necessary for a Layer 2 entity to interface
both Layer 1 and Layer 3. To highlight the operation of Layer 2 we will consider the
operation of a terminal as it attempts to signal with the network. [ITU-T, Q.921]
It is the action to establish a call that causes protocol exchange between terminal and
network. If there has been no previous communication it is necessary to activate the
interface in a controlled way. A request for service from the customer results in Layer 3
requesting a service from Layer 2. Layer 2 cannot offer a service unless Layer 1 is
available and so a request is made to Layer 1. Layer 1 then initiates its start-up
procedure and the physical link becomes available for Layer 2 frames. Before Layer 2 is
ready to offer its services to Layer 3 it must initiate the Layer 2 start-up procedure
known as 'establishing a LAP'. [ITU-T, Q.921] LAP establishment is achieved by the exchange
of Layer 2 frames between the Layer 2 handler in the terminal and the corresponding Layer 2
handler in the network. The purpose of this exchange is to align the state variables that
will be used to ensure the correct sequencing of information frames. Before the LAP has
been established the only frames that may be transmitted are unnumbered frames. The
establishment procedure requires one end-point to transmit a Set Asynchronous Balanced Mode
Extended (SABME) and the far end to acknowledge it with an Unnumbered Acknowledgment (UA).
[ITU-T, Q.921] Once the LAP is established Layer 2 is able to carry the Layer 3 information
and is said to be the 'multiple frame established state'. In this state Layer 2 operates
its frame protection mechanisms. Figure 5 below shows a normal Layer 2 frame exchange.
[ITU-T, Q.921]
Once established the LAP operates an acknowledged service in which every information frame
must be responded to by the peer entity. The most basic response is the Receiver Ready
(RR) response frame. Figure 5 shows the LAP establishment and the subsequent I frame RR
exchanges. The number of I frames allowed to be outstanding without an acknowledgment is
defined as the window size and can vary between 1 and 127. For telephony signalling
applications the window size is 1 and after transmitting an I frame the Layer 2 entity will
await a response from the corresponding peer entity before attempting to transmit the next
I frame. Providing there are no errors all that would be observed on the bus would be the
exchange of I frames and RR responses. However Layer 2 is able to maintain the correct
flow of information in the face of many different error types. [ITU-T, Q.921]
Layer 2 Error Control - It is unlikely that a frame will disappear completely but it is
possible for frames to be corrupted by noise at Layer 1. Corrupted frames will be received
with invalid Frame Check Sequence (FCS) values and consequently discarded. [ITU-T, Q.920]
The frame check sequence is generated by dividing the bit sequence starting at the address
up to (but not including) the start of the frame check sequence by the generator polynomial
X16 + X12 + X5 + 1. In practical terms this is done by a shift register as shown in figure
6. All registers are preset to 1 initially. At the end of the protected bits the shift
register contains the remainder from the division. The 1's complement of the remainder is
the FCS. At the receiver the same process is gone through , but this time the FCS is
included in the division process. In the absence of transmission errors the remainder
should always be 1101 0000 1111. [ITU-T, Q.920]
The method for recovering from a lost frame is based on the expiration of a timer. A timer
is started every time a command frame is transmitted and is stopped when the appropriate
response is received. This single timer is thus able to protect both the command and
response as the loss of either will cause it to expire. [ITU-T, Q.920] When the timer
expires it is not possible to tell which of the two frames has been lost and the action
taken is the same in both cases. Upon the timer expiring, Layer 2 transmits a command with
the poll bit set. This frame forces the peer to transmit a response that indicates the
value held by the state variables. It is possible to tell from the value carried by the
response frame whether or not the original frame was received. If the first frame was
received, the solicited response frame will be the same as the lost response frame and is
an acceptable acknowledgment. If however the original frame was lost, the solicited
response will not be an appropriate acknowledgment and the Layer 2 entity will know that a
retransmission is required.
It is possible for the same frame to be lost more than once and Layer 2 will restransmit the
frame three times. If after three transmissions of the frame the correct response has not
been received , Layer 2 will assume that the connection has failed and will attempt to
re-establish the LAP. [ITU-T, Q.921]
Another possible protocol error is the arrival of an I frame with an invalid send sequence
number N(S). This error is more likely to occur when the LAP is operating with a window
size greater than one. If, for example, the third frame in the sequence of four is lost
the receiving Layer 2 entity will know that a frame has been lost from the discontinuity in
the sequence numbers. The Layer 2 must not acknowledge the fourth frame as this will imply
acknowledgment of the lost third frame. The correction operation is to send a Reject (REJ)
frame with the receive sequence number N(R) equal to N(S) + 1 where N(S) is the send
variable of the last correctly received I frame, in this case I frame 2. This does two
things; first it acknowledges all the outstanding I frames up to and including the second I
frame, and secondly it causes the sending end to retransmit all outstanding I frames
starting with the lost third frame. [ITU-T, Q.920] The receipt of a frame with an out of
sequence, or invalid, N(R) does not indicate a frame loss and cannot be corrected by
retransmissions. It is necessary in this case to re-establish the LAP to realign the state
variables at each end of the link. [ITU-T, Q.920] The Receiver Not Ready (RNR) frame is
used to inhibit the peer Layer 2 from transmitting I frames. The reasons for wanting to do
this are not detailed in the specification but it is possible to imagine a situation where
Layer 3 is only one of many functions to be serviced by a microprocessor and a job of
higher priority requires that no Layer 3 processing is performed. [ITU-T, Q.920] Another
frame specified in Layer 2 is the FRaMe Reject frame (FRMR). This frame may be received by
a Layer 2 entity but may not be transmitted. It is included in the recommendation to
preserve alignment between LAP D and LAP B. After the detection of a frame reject
condition the data link is reset. [ITU-T, Q.920]
Disconnecting the LAP - After Layer 3 has released the call it informs Layer 2 that it no
longer requires a service. Layer 2 then performs its own disconnection procedures so that
ultimately Layer 1 can disconnect and the transmission systems associated with the local
line and the customer's bus can be deactivated. [ITU-T, Q.921]
Layer 2 disconnection is achieved when the frames disconnect (DISC) and UA are exchanged
between peers. At this point the LAP can no longer support the exchange of I frames and
supervisory frames. [ITU-T, Q.921] The last frame type to be considered is the Disconnect
Mode (DM) frame. This frame is an unnumbered acknowledgment and may be used in the same
way as a UA frame. It is used as a response to a SABME if the Layer 2 entity is unable to
establish the LAP, and a response to a DISC if the Layer 2 entity has already disconnected
the LAP. [ITU-T, Q.921]
TEI Allocation - Because each terminal must operate using a unique TEI, procedures have been
defined in a Layer 2 management entity to control their use. The TEI manager has the
ability to allocate, remove, check, and verify TEIs that are in use on the customer's bus.
As the management entity is a separate service point all messages associated with TEI
management are transmitted with a management SAPI. [ITU-T, Q.921]
TEI management procedures must operate regardless of the Layer 2 state and so the
unnumbered information frame (UI) is used for all management messages. The UI frames have
no Layer 2 response and protection of the frame content is achieved by multiple
transmissions of the frame.
In order to communicate with terminals which have not yet been allocated TEIs a global TEI
is used. All management frames are transmitted on a broadcast TEI which is associated with
a LAP that is always available. All terminals can transmit and receive on the broadcast TEI
as well as their own unique TEI. All terminals on the customer's line will process all
management frames. To ensure that only one terminal acts upon a frame a unique reference
number is passed between the terminal and the network. This reference number is contained
within an element in the UI frame and is either a number randomly generated by the terminal,
or 0 is the TEI of the terminal, depending on the exact situation. Figure 7 below shows the
frame exchange required for a terminal to be allocated a TEI and establish its data link
connection. [ITU-T, Q.921]
Layer 3 of User-Network Interface:
This layer effects the establishment and control of connections. It is carried in Layer 2
frames as can be seen in figure 8. [ITU-T, Q.930]
The first octet contains a protocol discriminator which gives the D channel the capability
of simultaneously supporting additional communications protocols in the future. The bits
shown in figure 8 are the standard for user-network call control messages. [ITU-T, Q.930]
The call reference value in the third octet is used to identify the call with which a
particular message is associated. Thus a call can be identified independently of the
communications channel on which it is supported.
The message type coded in the fourth octet describes the intention of the message (e.g. a
SETUP message to request call establishment). These are listed in Table 1 at the end of
this paper. A number of other information elements may be included following the message
type code in the fourth octet. The exact contents of a message are dependent on the message
type. [ITU-T, Q.931]
The message sequence for call establishment is shown in figure 9. In order to make an
outgoing call request, a user must send all of the necessary call information to the
network. Furthermore, the user must specify the particular bearer service required for the
call (i.e. Speech, 64 kbit/s/s unrestricted, or 3.1 kHz Audio) and any terminal
compatibility information which must be checked at the destination. [ITU-T, Q.931]
The initial outgoing call request may be made in an en bloc or overlap manner. Figure 9
illustrates the call establishment procedures. If overlap sending is used then the SETUP
message must contain the bearer service request but the facility requests and called party
number information may be segmented and conveyed in a sequence of INFORMATION messages as
shown. Furthermore if a speech bearer service is requested and no call information is
contained in the SETUP message, then the network will return in-band dial tone to the user
until the first INFORMATION message has been received. [ITU-T, Q.931] Following the receipt
of sufficient information for call establishment , the network returns a call PROCEEDING