{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

e-180-co - ECMA EUROPEAN COMPUTER MANUFACTURERS ASSOCIATION...

Info icon This preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
E C M A EUROPEAN COMPUTER MANUFACTURERS ASSOCIATION STANDARD ECMA-180 PROTOCOL FOR COMPUTER-SUPPORTED TELECOMMUNICATIONS APPLICATIONS (CSTA)
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
June 1992
Image of page 2
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Brief History This Standard defines a Protocol for Computer-Supported Telecommunications Applications (CSTA) for OSI Layer 7 communication between a computing network and a telecommunications network. This Standard, plus its companion Standard ECMA-179 Services for Computer-Supported Telecommunications Applications , reflects agreements of ECMA member companies on the first phase of standards for CSTA. Additional phases are anticipated. This Standard is based on the practical experience of ECMA member companies and represents a pragmatic and widely based consensus. This Standard takes its direction from Technical Report ECMA TR/52 Computer-Supported Telecommunications Applications .
Image of page 4
Adopted as an ECMA Standard by the General Assembly of June 1992.
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
- i - Table of contents Page Section 1 - General 1 1 Scope 1 2 Conformance 1 2.1 Static requirements 1 2.2 Dynamic requirements 1 2.3 PICS requirement 1 3 References 2 4 Definitions 2 Section 2 - Protocol Structure for CSTA 3 5 CSTA service definition model 3 5.1 CSTA application layer structure 3 5.2 Remote operations 3 5.3 The CSTA service response 3 5.4 Cross referencing of event reports 4 5.5 Handling of private data 4 6 Interconnection service boundary 4 7 Security 5 Section 3 - CSTA Protocol 6 8 Association management 6 9 Switching function services 6 9.1 Alternate call 7 9.2 Answer call 8 9.3 Call completion 9 9.4 Clear call 11 9.5 Clear connection 12 9.6 Conference call 14 9.7 Consultation call 16 9.8 Divert call 18 9.9 Hold call 20 9.10 Make call 22 9.11 Make Predictive call 24 9.12 Query device 26 9.13 Reconnect call 28 9.14 Retrieve call 30 9.15 Set feature 32 9.16 Transfer call 34 10 Switching function events 36 10.1 Call events 38
Image of page 6
- ii - 10.1.1 Call cleared 38 10.1.2 Conferenced 40 10.1.3 Connection cleared 41 10.1.4 Delivered 42 10.1.5 Diverted 44 10.1.6 Established 45 10.1.7 Failed 47 10.1.8 Held48 10.1.9 Network reached 49 10.1.10 Originated 50 10.1.11 Queued 51 10.1.12 Retrieved 53 10.1.13 Service initiated 54 10.1.14 Transferred 55 10.2 Feature events 56 10.2.1 Call information 56 10.2.2 Do not disturb 57 10.2.3 Forwarding 58 10.2.4 Message waiting 59 10.3 Agent state events 60 10.3.1 Logged on 60 10.3.2 Logged off 61 10.3.3 Not ready 62 10.3.4 Ready 63 10.3.5 Work not ready 64 10.3.6 Work ready 65 10.4 Maintenance events 66 10.4.1 Back in service 66 10.4.2 Out of service event 67 10.5 Private events 68 11 Computing function services 69 11.1 Route request 70 11.2 Re-route request 72 11.3 Route select request 73 11.4 Route used request 75 11.5 Route end request 76 12 Bidirectional services 77 12.1 Escape service 77 12.2 System status 78 13 Status reporting services 79 13.1 Monitor start 80 13.2 Change monitor filter 82 13.3 Monitor stop 84 13.4 Snapshot device 86
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
- iii - 13.5 Snapshot call 88 14 Switching function errors 90 15 Switching event cause values 93 16 CSTA data types 95 16.1 Switching function objects 96 16.2 Device identifiers 97 16.3 Call and connection identifiers 100 16.4 Connection states 101 16.5 Status reporting 102 16.6 Device and feature types and other parameters 105 16.7 Security service 110 16.8 Common extensions 111
Image of page 8
Section 1 - General 1 Scope
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern