You are on page 1of 99

IFIP IN '95 CONFERENCE

Copenhagen 28.-31.8.1995

TUTORIAL ON INTELLIGENT NETWORKS

Olli Martikainen*, Juha Lipiäinen**,


Kim Molin***

*Telecom Finland, P.O. Box 106, FIN-00511 Helsinki, Finland


Tel. +358 2040 3503, Fax.+358 2040 3251
**Nokia Telecommunications, P.O.Box 33, FIN-02601 Espoo, Finland
Tel. +358 0 5116691, Fax. +358 0 5115595

***Lappeenranta University of Technology, Datacommunication Laboratory,


P.O.Box 20, FIN-53851 Lappeenranta, Finland
Tel. +358 53 624 3613, Fax. +358 53 624 3650

Abstract
The development of telecommunications technology and the need for more advanced services has created
projects on standardization of international Intelligent Networks (IN). The standards of Intelligent Networks
define IN in an abstract point of view, so it leaves the service providers the decisions on their own
implementations. The first standard sets of IN are Bellcore’s AIN.0 and the CCITT’s Capability Set 1 (CS1).
They define the basic services of IN, additional features such as rapid service introduction and a flexible
architecture that provides future expansion to further IN Capability Sets. The standardization organisations,
such as CCITT and ETSI, work hard to help the service providers to implement their IN architecture in order to
be able to provide international IN services. This kind of architecture is better known as Global Intelligent
Network architecture and it should be taken into consideration already in the early implementations of IN. This
paper presents some history of telecommunications technology, an overview of IN and its services and some
additional discussion on the future broadband IN.
Contents

Abbreviations

1. PREFACE 1

2. INTRODUCTION 2

2.1 Early computers and telecommunications 2

2.2 Switching systems development 3

2.3 Turning-points in telecommunications 5


2.3.1 UMTS 6
2.3.2 MEDIA 6

3. COMPUTER CONTROLLED TELECOMMUNICATIONS 8

3.1 CCITT Signalling System No. 7 8


3.1.1 Network Services Part 8
3.1.2 User Part 9
3.1.3 Signalling network structure 9

3.2 Telecommunications Management Network 10


3.2.1 Functional architecture 11
3.2.2 Informational architecture 11
3.2.3 Physical architecture 12

3.3 Intelligent Network 12


3.3.1 The need for IN 12
3.3.2 Definition of Intelligent Network 13

3.4 Numbering and Services 14

4. INTELLIGENT NETWORK ARCHITECTURE 16

4.1 Overview of IN 16
4.1.1. Origins of IN 16
4.1.2. IN standardization 18
4.1.2.1 IN standards bodies 18
4.1.2.1.1 ETSI 18
4.1.2.1.2 CCITT 18
4.1.2.2 Phased standardization 19
4.1.2.3 Structure of CCITT IN standards 19
4.1.2.4 Capability Set 1 20
4.1.2.5 IN CS1 Services 21

4.2 IN Functional Requirements 21


4.2.1 Service Requirements 22
4.2.2. Network Requirements 24

4.3 IN Conceptual Model 26


4.3.1 Physical Plane 28
4.3.1.1 Physical Entities 28
4.3.1.1.1 SSP 29
4.3.1.1.2 NAP 29
4.3.1.1.3 SCP 29
4.3.1.1.4 AD 30
4.3.1.1.5 IP 30
4.3.1.1.6 SN 30
4.3.1.1.7 SSCP 30
4.3.1.1.8 SDP 31
4.3.1.1.9 SMP 31
4.3.1.1.10 SCEP 31
4.3.1.1.11 SMAP 31
4.3.1.2 Interfaces between PEs 31
4.3.1.2.1 SCP-SSP interface 32
4.3.1.2.2 AD-SSP interface 32
4.3.1.2.3 IP-SSP interface 32
4.3.1.2.4 SN-SSP interface 32
4.3.1.2.5 SCP-IP interface 32
4.3.1.2.6 AD-IP interface 32
4.3.1.2.7 SCP-SDP interface 32
4.3.1.2.8 User interfaces 33
4.3.2 Distributed Functional Plane 33
4.3.2.1 Definition of FEs 34
4.3.2.1.1 CCAF 34
4.3.2.1.2 CCF 34
4.3.2.1.3 SSF 35
4.3.2.1.4 SSF/CCF Model 35
4.3.2.1.4.1 BCSM 36
4.3.2.1.4.2 Originating BCSM for CS-1 37
4.3.2.1.5 SCF 39
4.3.2.1.6 SDF 40
4.3.2.1.7 SRF 40
4.3.2.1.8 SCEF 40
4.3.2.1.9 SMAF 40
4.3.2.1.10 SMF 40
4.3.2.1.11 SCF Model and its relations 41
4.3.2.2 Mapping FEs to PEs 41
4.3.3 Global Functional Plane 41
4.3.3.1 SIB 42
4.3.3.1.1 Call Instance Data 43
4.3.3.1.2 Service Support Data 43
4.3.3.1.3 The SIB structure 44
4.3.3.1.3.1 Queue SIB 44
4.3.3.2 Basic Call Process 46
4.3.3.3 Global Service Logic 46
4.3.3.4 Relating the GFP to the DFP 46
4.3.4 Service Plane 46
4.3.4.1 Service Features 47
4.3.4.2 Description of CS1 Service Features 48
4.3.4.3 IN service modelling 51
4.3.4.4 Credit Card Calling 52
4.3.4.5 Virtual Private Network 53
4.3.4.6 Universal Personal Telecommunications 54

4.4 The IN-structured network 54


4.4.1 SCE 54
4.4.2 The function of IN 55
4.4.3 IN Application Protocol 56

4.5 Personal Communications Services 57

4.6 Integration of TMN and IN 58


4.6.1 Comparison of IN planes to TMN planes 59

4.7 Globalizing the IN 60

4.8 Future IN Capability Sets 60


4.9 Current activities of IN 61

5. CHANGES IN BUSINESS 62

5.1 Technology and services 62

5.2 Liberalization, alliances and competition 63

5.3 IN services 64
5.3.1 Benefits of IN 64
5.3.2 Cost structure 65
5.3.2.1 Initial cost of IN 65
5.3.2.2 Operational costs of IN 66
5.3.2.3 Basic call production costs 66
5.3.3 Service portfolio 66
5.3.3.1 Operators capability of offering services 66
5.3.3.2 Sales of service portfolio 66
5.3.3.3 Service development time frames 67

5.4 Evolution of IN capabilities at Telecom Finland 67


5.4.1 Pre-IN 67
5.4.2 Centralized IN 67
5.4.3 Special services 67

5.5 Distribution channels 67

5.6 Changes in enterprises 68

6. BROADBAND INTELLIGENCE AND MEDIA 70

6.1 Broadband networks 70


6.1.1 B-ISDN 70
6.1.1.1 Physical layer 70
6.1.1.2 ATM layer 71
6.1.1.3 ATM Adaption Layer 71
6.1.1.3.1 CBR 72
6.1.1.3.2 VBR 72
6.1.1.3.3 SEAL 72
6.1.1.4 Control plane 72
6.1.1.5 Management of the B-ISDN architecture 72
6.1.2 ATM networks 72
6.1.2.1 Virtual Channelss and Virtual Paths 73

6.2 Applications for the broadband networks 74

7. BROADBAND IN 76

7.1 Introduction 76

7.2 Telecom Finland BIN Project 76

7.3 BIN Architecture 77


7.3.1 Components 77

7.4 BIN and IN 77

7.5 Broadband services categorizing 78

7.6 Functioning of BIN architecture 78


7.6.1 Requirements of ATM network 79

7.7 Course of BIN events 79


7.7.1 Service request phase 79
7.7.2 Service activation phase 80
7.7.3 Service usage phase 80
7.7.4 Service after-usage phase 80

7.8 BINAP 80

7.8.1 BINAP-messages 80

7.8.2 User identification 81

7.9 CUSTOMER SERVICE PALETTE 81


7.9.1 BIN conceptual model 81

7.10 BIN MIB 82

7.11 TMN and BIN 83

7.12 The hardware configuration 83

7.13 Proposed services 84

8. REFERENCES 85
ABBREVIATIONS
AAB Automatic Alternative Billing

ABD Abbreviated Dialling

AC Application Context

ACB Automatic Call Back

ACC Account Card Calling

AD Adjunct

AOD Audio On Demand

AP Application Process

ASE Application Service Element

ASN.1 Abstract Syntax Notation One

ATM Asynchronous Transfer Mode

ATT Attendant

AUC Authentication Center

AUTC Authentication

AUTZ Authorization Code

B-IN Broadband IN

B-ISDN Broadband Integrated Services Digital Network

B-OSF Business OSF

B-SCP Broadband Service Control Point

B-SMS Broadband Service Management System

B-SSP Broadband Service Switching Point

BAF Basic Access Function

BCP Basic Call Process

BER Basic Encoding Rules

BRI Basic Rate Interface

BSF Base Station Function

BTF Basic Transit Function

CBR Continuous Bit Rate

CCAF Call Control Agent Function

CCBS Completion of Call to Busy Subscriber

CCC Credit Card Calling

CCF Call Control Function

CCITT Concultative Committee for International Telephony and Telegraphy

CCS Common Channel Signalling

CCSN Common Channel Signalling Network

CD Call Distribution

CD Compact Disk
CD-ROM Compact Disk-Read Only Memory

CF Call Forwarding

CFC Call Forwarding on BY/DA

CHA Call Hold with Announcement

CID Call Instance Data

CIDFP CID Field Pointer

CLI Calling Line Identity

COC Consultation Calling

CON Conference Calling

CPM Customer Profile Management

CRA Customized Recorded Announcement

CRD Call Rerouting Distribution

CRG Customized Ringing

CS Capability Set

CS1 Capability Set 1

CT2 Cordless Telephone 2

CUG Closed User Group

CW Call Waiting

DC Detection Capability

DCP Destination Point Code

DCR Destination Call Routing

DDD Direct Distance Dialing

DECT Digital European Cordless Telecommunications

DFP Distributed Functional Plane

DTMF Dual Tone Multi-Frequencies

DUP Destinating User Prompter

EC European Community

EF Elementary Function

EIR Equipment Identification Register

ERMES European Radio Message System

ETSI European Telecommunications Standards Institute

FC Functional Component

FE Functional Entity

FEA Functional Entity Action

FIE Facility Information Element

FMD Follow-Me-Diversion

FPH Freephone

GAP Call Gapping


GFP Global Functional Plane

GNS Green Number Service

GSL Global Service Logic

GSM Global System for Mobile communications

Groupe Special Mobile

GUI Graphical User Interface

GUS Gravis UltraSound

HDTV High Definition TeleVision

HLR Home Location Register

HP Hewlett Packard

IN Intelligent Network

INA Intelligent Network Architecture

INAP IN Application Protocol

INCM Intelligent Network Conceptual Model

IP Intelligent Peripheral

ISDN Integrated Services Digital Network

ITU International Telecommunications Union

IVS INRIA Videonconferencing System

LIM Call Limiter

LOG Call Logging

MACF Multiple Association Control Function

MAP Mobile Application Part

MAS Mass Calling

MCI Malicious Call Identification

MIB Management Information Base

MIT Management Information Tree

MMC Meet-Me-Conference

MPEG Moving Pictures Experts Group

MSC Mobile Services Center

MSCF Mobile Switching Center Function

MTP Message Transfer Part

MWC Multi-Way Calling

N-OSF Network OSF

N_ID Network ID

NAF Network Access Function

Ne-OSF Network element OSF

NEF Network Element Function

NNI Network-to-Node Interface


NSP Network Services Part

O-O Object-Oriented

OAM Operations And Maintenance

OC-x Optical Carrier level at x

OCS Originating Call Screening

ODR Origin Dependent Routing

OFA Off Net Access

OMAP Operations, Maintenance, and Administration Part

ONC Off Net Calling

ONE One Number

OSF Operations Systems Function

OSI Open Systems Interconnection

OSIRM OSI Reference Model

OUP Originating User Prompter

PABX Private Access Branch eXchange

PCM Pulse Code Modulation

PCS Personal Communications Services

PDH Plesiochronous Digital Hierarchy

PE Physical Entity

PIN Personal Identification Number

PLMN Public Land Mobile Network

PN Personal Numbering

PNP Private Numbering Plan

POI Point Of Initiation

POR Point Of Return

PRI Primary Rate Interface

PRM Premium Rate

PRMC Premium Charging

PSTN Public Switched Telecommunications Network

PTN Personal Telecommunications Number

PVC Permanent Virtual Channel

QOS Quality of Service

QUE Call Queueing

RACE Research and technology development in Advanced Communications technologies in Europe

RBOC Regional Bell Operating Company

REVC Reverse Charging

rN relationship N

ROSE Remote Operations Service Element


RTP Real-time Transport Protocol

S-OSF Service OSF

S_ID Service ID

SACF Single Association Control Function

SAO Single Association Object

SCCP Signalling Connection Control Part

SCE Service Creation Environment

SCEF Service Creation Environment Function

SCF Service Control Function

SCF Selective Call Forward on Busy/Don’t Answer

SCP Service Control Point

SDF Service Data Function

SDH Synchronous Digital Hierarchy

SEAL Simple and Efficient Adaptation Layer

SEC Security Screening

SF Service Feature

SIB Service-Independent building Block

SIG Special Interest Group

SLP Service Logic Program

SMS Service Management System

SP Service Plane

SPC Stored Program Control

SPL Split Charging

SRF Specialized Resource Function

SS Service Subscriber

SS7 Signalling System no. 7

SSD Service Support Data

SSF Service Switching Function

SSN Subsystem Number

SSP Service Switching Point

STM Synchronous Transport Module

STP Signalling Transfer Point

SVC Switched Virtual Channel

TCAP Transaction Capabilities Application Part

TCP Transmission Control Protocol

TCS Terminating Call Screening

TDR Time Dependent Routing

Telco Telecommunications Operating Company


TINA TMN+IN

TMN Telecommunications Management Network

TP Transact Processing system

TRA Call Transfer

U_ID User ID

UAN Universal Access Number

UDP User Datagram Protocol

UDR User-Define Routing

UMTS Universal Mobile Telecommunications System

UNI User-to-Network Interface

UP User Part

UPT Universal Personal Telecommunications

VBR Variable Bit Rate

VC Virtual Channel

VCC Virtual Channel Connection

VCI Virtual Channel Identifier

VLR Visitor Location Register

VOD Video On Demand

VOT Televoting

VP Virtual Path

VPI Virtual Path Identifier

VPN Virtual Private Network

WSF Work Station Function


Tutorial on Intelligent Networks

changes in the switching systems and some turning-points


in telecommunications are the main concern. The concept
1. Preface
of Computer Controlled Telecommunications is described
in section 3. It also includes signalling network history
This Tutorial on Intelligent Networks has been prepared
and development, management networks for
for the IFIP IN '95 conference in Copenhagen. The first
telecommunications networks, and the need for more
version of this tutorial appeared in the second Winter
advanced services. The Intelligent Network Architecture
School on Telecommunications in Helsinki, March 1994,
(INA) is presented in section 4. from an abstract point of
and was then considerably improved for the IFIP TC-6
view. Also some future plans to expand the architecture
Workshop on Intelligent Networks in Lappeenranta on
are studied, such as Telecommunications Management
August 1994 and later for SEACOMM'94 in Kuala
Network and Intelligent Network integration. In section
Lumpur, Malaysia. After that some corrections and
5. the effects of telecommunications networks
modifications have been added, and the authors express
development to the telecommunications business are
their sincere gratitude for all the help they have obtained.
studied. Some additional discussion of broadband
The tutorial has been written in co-operation with
networks and possible broadband services in Intelligent
Lappeenranta University of Technology and Telecom
Networks is provided in section 6.
Finland, but at present the second author is working with
Nokia Telecommunications. References are given in the text for further reading. For
this reason the references given are not always the
The tutorial considers Intelligent Networks (IN) from
original ones.
user, operator and application points of view. It gives
some history of the development of computers and This tutorial has been given a permission by the authors
telecommunications networks towards more advanced to be used freely in noncommercial educational purposes.
systems and networks that provide additional features, for
example, to the normal telephony services. These
computer controlled telecommunications networks and
architectures that add value to conventional
telecommunications networks are often referred to as
Intelligent Networks. This tutorial provides a presentation
of IN concepts, standards and technologies and gives a
description of the situation today. Also some influential
changes in the area of telecommunications business is
considered. Scenarios of future developments of IN are
provided. The authors of this tutorial are responsible for
the possible errors and mistakes in the text and all critics
and improvements are welcome.

Section 2. describes the history of telecommunications


and its development towards the future techniques. The

Lappeenranta University of Technology and Telecom Finland 1


Tutorial on Intelligent Networks

instrumentation devices. Later on, the process industry


became heavily computer controlled, and the computer
2. Introduction
control of manufacturing was extended largely later in the
1970's. It was also then when the extensive use of
telecommunications networks became possible. This was
2.1 Early computers and telecommunications
supported by digital PCM-transmission technology
It is almost fifty years ago since intelligence first was (PDH-systems) deployed in the 1960´s and 1970's and
introduced in the concept of programmable electronic modems with signalling rates of about 300 bauds. In
calculators. Since then, the development of these those days, the telecommunications networks were still
machines towards computers has been rapid. In 1950’s largely non-digital and did not provide bit errorfree data
computers acted as cenralized ‘batch’ processors and transfer. Bit errors appeared very often and for this reason
there were no computer networks because of the transport protocols at end systems and heavy link and
insufficient network technology. The programming of network protocols between the network nodes were
early computers was very difficult because of low level developed to minimize this unreliability problem.
instructions and primitive user interfaces. However, first
high level languages such as Fortran were introduced
already in 1950's. The batch processor computers worked
in a simple way. They read the paper tapes bit by bit
containing information presented as holes in the paper. So
the Input/Output (I/O) operations of the computers were
far too inefficient to use the analogous
telecommunications network that was provided at that
Figure -1. Transaction processing system.
time. The computers in those days were mainly used to
scientifical calculations that needed no other I/O In 1970’s Transaction Processing systems (TP) were
operations than instruction and data read, and a printout taken in use in the area of banking. These TP’s
function of the calculations. So, early computers were centralized servers located in the main office. The clients
completely in local use. sended requests via the communication network and the
TP answered them with low delay responses. Terminal
The next generation of computer technology followed
networks developed to local area networks (LANs) in the
from the development of time sharing operating systems
1980's and packet switched data networks (X.25) were
in 1960's. Time sharing made it possible to have multiple
introduced in late 1970's (Figure ). TP’s with
I/O-terminals connected to the computer, which was the
communication networks was a remarkable development
origin of local terminal networks with
step and this client-server model is still in use in banking.
datacommunnication protocols. At the same time the use
At day time, these computer systems work as transaction
of computers was started in the process industry, where
processors, but at night they are used in batch processing.
computers removed process measurement and control
This is because of the daytime heavy load of transaction
tasks from humans in the 1960’s. This meant that the I/O
requests (even hundreds of thousands of requests per
operations of the computers had to be developed further
hour) that arrive from several offices simultaneously.
and they could already communicate with other

Lappeenranta University of Technology and Telecom Finland 2


Tutorial on Intelligent Networks

The batch functions are for example realizations of the points. Furthermore, the long development time frames
money transfer requests such as payment of salaries every and the then-available technologies favored producing
month ar any account transfers. These computer systems this new service by slightly rearranging the internal
need to serve the realtime queries and give responses to structure of the switching systems and “squeezing in” the
thousands of locations worldwide. new capability. The end result was that DDD increased
considerable network-related data in the local switches
and also added new functions related to the network
2.2 Switching systems development
connection capabilities into the local switches. On many
From 1870’s to 1950’s, the primary focus of swithing of the existing switches, this involved adding specialized
system development was on producing better “boxes” to correctly interpret the new dialed numbers and
technologies for permitting two people to engage in voice route them to the correct places for proper DDD
communications over larger and larger distances and to connectivity.
make this technology more readily available, cheaper, and
To get some idea of the development of technology
more reliable. During this period the industry moved
associated with the interconnection aspects of the
from local calls being handled by operators with plug
telecommunications at that time, we can look at one of
boards, to step-by-step switches, to panel switches, to
the services we consider basic today. In 1956, the first
crossbar switches and to Stored Program Controlled
undersea cable using repeaters was activated at a cost of
(SPC) switches. It is interesting to remember that in 1925
about $6 million/circuit resulting in a cost of about
one of the most significant breakthroughs was the
$75/minute. By 1976, the cost per circuit was reduced by
separation of the connection control activities from the
a hundredfold, thus permitting later developments to
maintenance of the actual connections during an active
focus more on providing various services beyond
call. This change, over time, allowed the switching
connection. One of the driving forces for more complex
systems to reuse the more complex resources of the
services at this time was the reduction in the cost of the
switch (those used for initiating and setting up a call),
basic connections so that groups of customers with
thus ending an era of having to duplicate these costly
specialized needs came to the market asking for
resources and having them tied up for the entire duration
capabilities beyond simple connectivity. This was the
of a call. One of the major implications of switching
beginning of the transition period in which the structure
systems development during this period was that almost
of the telecommunications industry was changing away
all the information about how connections were to be
from the former connection focus toward a new service
created resided on the individual switches, specifically,
focus. However, the pace of change was slow given the
subscriber data, information about how to provide the
technological problems that still had to be overcome to
limited functions available at that time, and implicit
provide fast and economical connections with high
network information were all contained in each switch
quality. Thus, there was no driving need to reorganize
Benne93.
the basic structure of what existed; nor was there any real
In the 1950’s, Direct Distance Dialing (DDD) began to be guidance as to what kinds of services the customers
deployed as a new service, but this was still a would be willing to purchase as a service marketing was
continuation of the general focus to provide in its infancy Benne93.
telecommunications connections between two fixed

Lappeenranta University of Technology and Telecom Finland 3


Tutorial on Intelligent Networks

During the 1960’s and 1970’s, the requests for additional a large expansion of the types of information being placed
services began to grow, but the pace was rather slow by on the switches, e.g., variations of call models, more
today’s standards since the technology to support these network-related information was brought into the
new services was not readily available on the general switches, and data under the control of the end users was
market. Since the new SPC-exhanges were able to swith moved onto the switches (speed calling lists, centrex data,
64 kbps connections transmitted over digital PDH etc.). As this data was moved onto the switches, the
systems, it was a natural idea to propose this capability as programs to manipulate the data and ensure its integrity
a basis for data communications. This was the birth of also had to be installed in the switches. This resulted in
the ISDN-concept (Integrated Services Digital Network) the switches becoming also very general data control and
where two digital 64 kbps data channels and one digital usage systems Benne93.
16 kbps signalling channel was provided to the
As we entered the 1980’s, the advanced computer
customers. ISDN was an important concept since the
technology started to penetrate from industrial and office
current service-driven thinking was created during its
use also to low end products. Computer technology
development. For example, the other 64 kbps channel
became as an embedded technology in customer
could be used for speech and the other for data
equipments such as faxes and portable phones, and as a
transmission simultaneously. The whole capacity of 128
control technology for the management and intelligent
kbps could also be used for a reasonably high quality
control of networks. The computer technology
compressed real time video connections. The availability
breakthrough was facilitated by the introduction of open
of ISDN growed, however, much slower than was
computer platforms (UNIX and Personal Computers,
expected. The reasons for this were the existing large
PCs), the fast reduction of cost in computing and the
installation base of analogous switching and transmission
networking of PCs, minicomputers and mainframes. The
systems incapable to support digital channels. Once
PCs provided a general platform for digital customer
again, it was more economical and easier to “squeeze” the
premises equipments, capable to communicate via Local
new capabilities into the existing switching systems than
Area Networks and Public Networks. This, in conjunction
to change the switches and have to replace the embedded
with the lowering of transmission and interconnection
base with newer technologies. This slow evolution
service costs, resulted in an exponential growth in the
process was aided by the small market base for the newer
demand for newer and more flexible telecommunications
services.
services. Another major factor driving toward more
For example, the office automation technologies available specialized services was the liberalization and
were not very advanced and did not produce digital data competition in telecommunications business. In the
storage and transfer. Also, the derivative technologies United States the operator competition started with the
associated with the growth of computers, personal breakup of the Bell System and resulting competition,
computers, and microchip technology had not reached a where services were the factor that differentiated one
state where they were demanding telecommunication carrier form another. Furthermore, with diversiture, the
services much beyond classical interconnectivity services. former local operating companies were permitted to make
instructions into one anothers’ traditional service areas
During this period, the efforts to put more and more new
and, to do this effectively, they needed to have something
service capabilities onto the switching systems resulted in
to offer that was not available from the local service

Lappeenranta University of Technology and Telecom Finland 4


Tutorial on Intelligent Networks

provider. All of these changes resulted in customers being UMTS

more aware of what technology provided and demanding GSM MBS


NMT
that the telecommunications industry should meet the
B-ISDN Broadband IN
new requirements for services Benne93. Corporation
networks IN
Packet
The 1990’s and beyond will demand that the data networks MEDIA
Analogous
telecommunications industry change its basic ideas about telephony PC ATM
Modem
service services
the structure of their networks and how they will evolve. ISDN
Batch 'Real' SS7
Up until the 1980’s, network development was driven by
processors computers
the need to provide cheap and efficient interconnections
between two fixed points. There was only minor 1950 1960 1970 1980 1990 2000 Time

emphasis on structuring the switching systems to be


readily adaptable to the rapidly changing service Figure -2. The development of telecommunications.
requirements that have appeared in the last decade. Now
First, the beginning of data transfer by the use of
that cheap, efficient interconnection capabilities are
analogous telephony service was an important stage in the
available, the relative roles of the interconnection
history. This service was not good for use in corporations
capabilities and end-user services will be interchanged.
because of its low data transfer speed. Then, there was a
The demand for more and more customer based services
need for a data transfer service that used billing by data
will continue to grow, and there will be an inceasing
amount while the expences of the analogous telephony
demand for having the new services in shorter and shorter
service consisted mainly of the data transfer time. The
time frames. Thus, the basic structure for the network,
packet switched data networks were developed especially
and especially the structure and function of the switching
for corporations use. Second, CCITT (Consultative
systems, will change to accomodate this need for rapid
Committee for International Telephone and Telegraphy)
deployment of more and more custom oriented services.
introduced its seven layer OSI protocol stack SS7 to
In summary, the telecomunications industry, which has
replace the analogous signalling system. This was the
been interconnection-driven, will, in the future, be
corner-stone for the digital telecommunications
service-driven. In this tutorial we shall discuss these
technology that is used, for instance, in ISDN (Integrated
modern trends more thoroughly..
Services Digital Network). In the late 1980’s radio
signalling technology was advanced enough to provide
2.3 Turning-points in telecommunications digital telephony service. The GSM (Global System for
Mobile communications) mobile phone technology,
Several turning-points can be found in the history of
introduced ito use n 1991, is also suitable for low-speed
telecommunications technology (marked as circles in the
data transfer. The Intelligent Network is an architecture
figure 2) .
capable to integrate all the telecommunications services
mentioned in a flexible way.

The telecommunications networks and wide area


networks used PDH (Plesiochronous Digital Hierarchy)
technology in the physical data transfer. At the

Lappeenranta University of Technology and Telecom Finland 5


Tutorial on Intelligent Networks

introduction of CCITT’s SDH (Synchronous Digital


Hierarchy) technology the physical data transfer rates
increased remarkably. A new technology, ATM
(Asynchronous Transfer Mode), was introduced to use the
available bandwidth efficiently in the 1992. By the
introduction of ATM it was possible to imagine of such
concepts as B-ISDN (Broadband Integrated Services
Digital Network ), broadband mobility and broadband IN.
These technologies will be discussed more accurately
later on. Broadband infrastructure will make it possible
to introduce advanced value added, mobile and media
services (Figure 2-3).

Figure 2-4. Evolution of mobile services and systems.

In the next five years the third generation mobile


networks will be developed called the UMTS (Universal

Figure 2-3. Turnover Value of Service Types Mobile Telecommunications System). UMTS was
researched in the RACE program of EC (European

2.3.1 UMTS Community) and ETSI’s group SGM5, which research


will be continued in the ACTS program of EC. This new
UMTS (Universal Mobile Telecommunications System ) is
generation is based on application and service oriented
intended to be an international standard for global
technology that supports on-demand transmission
telecommunication system. It is a third generation mobile
capacity up to 2 Mbps in various radio environments.
telecommunications system which integrates several
The ultimate goal is to provide seamless end-to-end
second generation mobile systems like cordless
services to the user by using a combination of fixed and
telephones (CT2 (Cordless Telephone 2) and DECT
wireless/mobile access tecnologies, where a mobile phone
(Digital European Cordless Telecommunications)),
could be used at home, office and elsewhere.
mobile telecommunications systems (GSM and PCN) and
radio message systems (ERMES (European Radio UMTS is an open system which is based on TMN and IN
Message System)) Hara93 (Figure 2-4). concepts. The system supports ISDN services and could
be at some degree compatible with B-ISDN with ATM-
switching and possible broadband mobile access. This
system is a very advanced telecommunications system
that supports global mobility and Intelligent Network

Lappeenranta University of Technology and Telecom Finland 6


Tutorial on Intelligent Networks

services and is not expected to be introduced before the technology is also maturing and will provide a cost
year 2000. effective platform for service provision. When the
broadband customer access will be available, interactive
There has also been proposals for still higher speed
business and consumer services based on video and
mobile networks such as MBS (Mobile Broadband
multimedia will become possible. Common to all these
System), which could support bit rates up to 34 Mbps.
developments will be the computer controlled structure of
However, the architectures of these proposed networks
modern telecommunications, where protocols, application
are still open, and they will depend heavily on how the
technology and resource management are key factors.
control of mobility and intelligence will be distributed
over the network.

2.3.2 MEDIA

With media concept we understand here both radio,


television and cinema, and press and publishing
industries. All these will be available in electronic digital
forms either as stored media or interactively from the
distribution network.

In modern telecommunications the emerging competitive


media services market and the new technological
breakthroughs will bring remarkable changes. The
market changes are due to the integration of
telecommunications and information technology, which
brings interactive real time video and multimedia services
available to users. Examples of these services are digital
interactive TV, video on demand services for banking,
shopping and leasure, electronic press and publishing.
The technological requirements for these services are cost
effective broadband transmission and access
technologies, flexible computer based management and
control of services and networks, switching and service
applications and the support of mobility.

In technology substantial new breakthroughs are going


on. The introduction of cellular radio networks and
mobility is probably the most influential one in the next
few years. The broadband transmission and switching

Lappeenranta University of Technology and Telecom Finland 7


Tutorial on Intelligent Networks

Reference Model (OSIRM) in 1980. SS7 is fully digital


and SS7 protocol stack corresponds to the seven layers of
3. Computer Controlled
the OSIRM and includes the Application Services and
Telecommunications
User Parts (UP) (Figure ). The signalling network
structure component of SS7 is the Network Service Part
(NSP), and it consists of the Message Transfer Part
3.1 CCITT Signalling System No. 7
(MTP) and the Signalling Connection Control Part
The word ‘signalling’ ment the transfer of analogous (SCCP). The OSIRM layers 4 - 6 are provided by
signals in a network, for example in the analogous Intermediate Service Part (ISP) and each User Part.
telephony network the activation of nonintelligent
SS7 is quite an advanced protocol stack. It includes
switches, just a few decades ago. In the context of
capabilities for congestion control and overload control. It
modern telecommunications, signalling can be defined as
also includes features for avoiding congestion by
the system that enables Stored Program Control
alternative routing or capacity expansion when heavy
exchanges, network databases, and other “intelligent”
load is detected. With congestion is ment generally,
nodes of the network to exchange messages related to call
shortage of resources, which is caused by an excessive
setup, supervision, teardown (call/connection control
amount of load, or a failure that reduces the installed
information) Modar90, information needed for
capacity of a network element. SS7 also includes
distributed application processing (inter-process
capabilities for sending congestion and overload
query/response, or user-to-user data) and network
indications to the adjacent exchanges or traffic sources.
management information.
M3010
Just a few decades ago (and even today), the
OSI Reference Model SS7 protocol stack
telecommunications networks used analogous signalling, OMAP ASEs
Application
based on frequency tones, between network nodes. Some
TCAP
key attributes of these signalling methods are that they are UP
Presentation
inband (i.e. signalling information is conveyed over the Session ISP

same channel that is used for speech) Modar90; call set- Transport

up times are long (from about 10 to 20 s); limited Network


SCCP

information can be transferred resulting, among other MTP Level 3


Data link MTP Level 2
things, in restrictive network routing capabilities.
Physical MTP Level 1

With the introduction of electronic processors in


Figure -1. SS7 protocol architecture.
switching systems came the possibility of providing
Common Channel Signalling (CCS). This is an out-of-
3.1.1 Network Services Part
band signalling method in which a common data channel
is used to convey signalling information related to a MTP consists of levels 1-3 of the SS7 protocol stack and

number of trunks. Modar90 CCITT published this new it provides a connectionless message transfer system that

signalling protocol stack SS7 (Signalling System No. 7) enables signalling information to be transferred across the

based on CCITT OSI (Open Systems Interconnection) network to its desired destination. Functions are included

Lappeenranta University of Technology and Telecom Finland 8


Tutorial on Intelligent Networks

in MTP that allow system failures to occur in the network 3.1.2 User Part
without adversely affecting the transfer of signalling The User Part forms the most upper layer of the SS7
information. So the overall purpose of MTP is to provide protocol stack that use the services provided by the lower
a reliable transfer and delivery of signalling information layers SCCP and MTP. User Part functions are ISDN-UP,
across the signalling network and to have the ability to TCAP (Transaction Capabilities Application Part) and
react and take necessary actions in response to system and OMAP (Operations, Maintenance, and Administration
network failures to ensure that reliable transfer is Part). The ISDN-UP is not discussed in this paper. TCAP
maintained. The first level of MTP presents the signalling refers to the set of protocols and functions used by a set
data link functions. A signalling data link functon is a of widely distributed applications in a network to
bidirectional transmission path for signalling, consisting communicate with each other. TCAP directly uses the
of two data channel operating together in opposite service of SCCP. Essentially, TCAP provides a set of
directions at the same data rate. It fully complies with the tools in a connectionless environment that can be used by
OSI’s definition of the physical layer. Level 2 of MTP an application at a node to invoke execution of a
presents the signalling link functions. The signalling link procedure at another node and exchange the results of
functions correspond to the OSI’s data link layer. such invocation. As such, it includes protocols and
Together with a signalling data link, the signalling link services to perform remote operations. It is closely related
functions provide a signalling link for the reliable transfer to the OSI Remote Operations Service Element (ROSE).
of signalling messages between two directly connected The OMAP of the SS7 protocol stack provides the
signalling points. The third level of MTP presents the applications protocols and procedures to monitor,
signalling network functions. They correspond to the coordinate, and control all the network resource that make
lower half of the OSI’s network layer, and they provide communications based on SS7 possible. Modar90
the functions and procedures for the transfer of messages
between signalling points, which are the nodes of the
3.1.3 Signalling network structure
signalling network. Modar90

SCCP provides additional functions to MTP for both


connectionless and connection-oriented network services.
SCCP enhances the services of the MTP to provide the
functional equivalent of OSI’s network layer. The
addressing capability of MTP is limited to delivering a
message to a node and using a four-bit service indicator
to distribute messages within the node. SCCP
supplements this capability by providing an addressing
capability that uses DPCs (Destination Point Code) plus
Figure -2. CCITT SS7 network structure.
Subsystem Numbers (SSN). The SSN is local addressing
information used by SCCP to identify each of the SCCP Signalling networks consist of signalling points and

users at a node. Modar90 signalling links connecting the signalling points together.
(Figure ) As alluded to earlier, a signalling point that
transfers messages from one signalling link to another at

Lappeenranta University of Technology and Telecom Finland 9


Tutorial on Intelligent Networks

level 3 is said to be a STP (Signalling Transfer Point). purposes: several network and devices, digital and
Signalling points that are STP’s can also provide analogic transmission systems, circuit- and packet
functions higher than level 3, such as SCCP and other switched data networks, public exchanges and PABX’s
level 4 functions like ISDN-UP. When signalling point (Private Access Branch Exchange).
has an STP capability and also provides level 4 functions
TMN is intended to support different management based
like ISDN-UP, it is commonly said to have an integrated
areas. These five functional areas are:
STP functionality. When the signalling point provides
only STP capability, or STP and SCCP capabilities, it is
Performance management
commonly called a stand-alone STP. Signalling links,
fault management
STP’s (stand-alone and integrated), and signalling points
with level 4 protocol functionality can be combined in configuration management
many different ways to form a signalling network. The
accounting management
SS7 Network Services Part protocol is specified
security management
independent of the underlying signalling network
structure. However, to meet the stringent availability
requirements given below (e.g., signalling route set
The functionality of TMN consists of the following
unavailability is not exceeded ten minutes per year), it is
subjects: Error! Reference source not found.
clear that any network structure must provide
redundancies for the signalling links, which have the ability to exchange management information

unavailabilities measured in many hours per year. In most across the boundary between the telecommunications

cases the STP’s must also have backups. Modar90 environment and the TMN environment.
the ability to convert management information from
The worldwide signalling network is intended to be one format to another so that management
structured into two functionally independent levels: the information flowing within the TMN environment
national and international levels. This allows numbering has a consistent nature
plans network management of the international and the the ability to transfer management information
different national network to be independent of one between locations within the TMN environment
another. A signalling point can be a national signalling the ability to analyse and react appropriately to
point, an international signalling point, or both. If it management information
serves both, it is identified by a specific signalling point the ability to manipulate management information
code in each of the signalling networks. Modar90 into a form which is useful and/or meaningful to the
management information user

3.2 Telecommunications Management Network the ability to deliver management information to the
management information user and to present it with
Telecommunications Management Network (TMN) is a the appropriate representation
generic, management-oriented architecture, intended to be the abilty to ensure secure access to management
used for all kinds of management services. Appel93 It information by authorized management information
has been defined in the CCITT M.3000 series standards. users
According to the concept it intends to meet several

Lappeenranta University of Technology and Telecom Finland 10


Tutorial on Intelligent Networks

contiguous layers or between the OSF and the NEF; the


F-type reference point is between the WSF and the OSF;
In TMN architecture there are mainly three architectural
and the X-type reference points are between OSFs
points of view each of which can be taken into account
belonging to different domains.
when TMN network is designed. These aspects are:
fucntional, informational and physical architectures. Each
of them studies the network architecture from different
apects.

3.2.1 Functional architecture

The TMN functional architecture is described with


functional blocks such as the Network Element Function
(NEF), The Operations Systems Function (OSF) and
Work Station Function (WSF). (Figure ) NEFs model all
entities that form the network to be managed. NEFs are to
be located physically on network elements. OSF provide
the TMN functions for processing, storage and retrieval
of management information. They form the core part of
the TMN. Four different OSFs can be identified
according to a hierarchial partitioning into four layers: the
Figure -3. TMN Operations Systems functional hierarchy.
network element management layer, responsible for the
Appel93
management of a subset of the network elements in the
whole network; the network management layer,
3.2.2 Informational architecture
responsible for the technical provision of services
TMN informational architecture is based on Object-
requested by the upper layer. This layer has an overall
Oriented (O-O) point of view. Management systems
view of the network. The service management layer is
exchange information modelled in terms of managed
responsible for all negotiations and resulting agreements
objects. Managed objects are conceptual views of the
between a customer and the service offered to this
resources that are being managed or may exist to support
customer. The business management layer is responsible
certain management functions (e.g. event forwarding or
for the total enterprise. Therefore, it is possible to identify
event logging). Thus, a managed object is the abstraction
different types of OSFs; the NE-OSF, N-OSF, the S-OSF
of such a resource that represents its properties as seen by
and the B-OSF. WSF represent the functionalities and
(and for the purposes of) management. A managed object
information modelling entities related to the TMN man-
may also represent a relationship between resources or a
machine communications between the management
combination of resources (e.g. a network). Error!
system and the human operator. Appel93
Reference source not found.
Between the function blocks NEFs, OSFs and WSFs
Management of a telecommunications environment is an
there are different kind of reference points: Q-, F- and X-
information processing application. Because the
type. The Q-type reference point is between OSFs of

Lappeenranta University of Technology and Telecom Finland 11


Tutorial on Intelligent Networks

environment being manages is distributed, network and they are specified more entirely with the lower layer
management is a disributed application. This involves the attributes.
exchange of management information between
management processes for the purpose of monitoring and
controlling the various physical and logical networking
resources (switching and trasmission resources). Error!
Reference source not found.

The TMN architecture is based on Manager/Agent


architecture. (Figure ) A manager takes care of the
distributed applications part that issues management
operation directives and receives notifications. The agent
role if the part of the application process that manages the
associated managed objects. The role of the agent will be
to respond to the directives issued by a manager. It will Figure -5. Management Information Tree.
also reflect to the manager a view of these objects and
emit notifications reflecting the behaviour of these 3.2.3 Physical architecture
objects.
NEFs identify all the network elements as physical
entities in TMN. Operations Systems (OS) form the core
part of every TMN domain. The TMN physical
architecture is not discussed more accurately in this
paper.

3.3 Intelligent Network

Figure -4. Interaction between Manager, Agent and 3.3.1 The need for IN
managed objects. In the past few years the development of

In TMN the manager uses polling method to get the telecommunications networks has been rapid. The

information from the agents. The agents store the telecommunications network functions before were

statictics information in their databases that are called controlled mainly by operators. The desire to share data

MIBs (Management Information Base). A MIB is a and distribute application processing among network

conceptual database structure. It represents the set of elements, the need for standard interfaces between them

managed objects within a managed system. The structure Garra93 and user demands for more sophisticated

of the MIB is often showed in the form of a tree. This tree telecommunications services has changed the controlling

is called a Management Information Tree ( MIT). (Figure - of network elements notably. The telecommunications

5) The tree is organized in a hierarchical way. At the network elements today are controlled by the network

upper parts of the tree resides the most meaning attributes operator, the service provider or the customer himself.

Lappeenranta University of Technology and Telecom Finland 12


Tutorial on Intelligent Networks

To integrate the control and management of different 3.3.2 Definition of Intelligent Network
services inside the operator, or to be able to provide third Intelligent Network (IN) is an architectural concept for
party control and management services, control and the operation and provision of new services which is
management interfaces with software support are needed. characterized by [Q1201]:

The development of IN architecture was initiated by - extensive use of information processing techniques;
Bellcore in USA almost ten years ago in order to help the
Regional Bell Operating Companies to become more - efficient use of network resources;

competitive in deregulated telecommunications


- modularization and reusability of network functions;
environment. The original goal was to provide network
operators with the ability to introduce, control and - integrated service creations and implementation by means of
manage services more effectively by using a centralized the modularized reusable network functions;
database in a Service Control Point (SCP) for controlling
and managing the various network services. Lauta93 - flexible allocation of network functions to physical entities;

The objective of IN is to allow the inclusion of additional - portability of network functions among physical entities;

capabilities to facilitate provisioning of service,


- standardized communication between network functions vie
independent of the service or network implementation in
service independent interfaces;
a multi-vendor environment. Service implementation
independence allows service providers to define their own - service subscriber 1) control of some subscriber-specific
services independent of service specific developments by service attributes;
equipment vendors [Q1201].
- service user 2) control of some user-specific service
Network implementation independence allows network attributes;
and service operators to allocate functionality and
resources within their networks and to efficiently manage - standardized management of service logic.

their networks independent of network implementation


IN is applicable to a wide variety of networks, including
specific developments by equipment vendors.
but not limited to: public switched telephone network

The network architectures, so far, have developed almost (PSTN) mobile, packet switched public data network

independently of each other. This point of view, of (PSPDN) and integrated services digital network (ISDN)

course, causes the network operators and service - both narrowband-ISDN (N-ISDN) and broadband-ISDN

providers to provide independently implemented service (B-ISDN).

to customers. The basic idea of IN has been that it


IN supports a wide variety of services, including
facilitates the provisioning of services independently
supplementary services, and utilizes existing and future
from the telecommunications networks and equipment
bearer services (e.g. as those defined in N-ISDN and B-
vendors. So, the IN acts as a distributing and centralizing
ISDN contexts).
framework of the telecommunications services. With this
framework, it is possible to introduce advanced customer
oriented services rapidly and cost effectively.

Lappeenranta University of Technology and Telecom Finland 13


Tutorial on Intelligent Networks

3.4 Numbering and Services USID: User service identifier. A USID uniquely identifies a service

profile on an access interface.


The user identification has mainly been based on the
access points of the telecommunications network. The TID: Terminal identifier. A TID value is unique within a given USID.

users’ access points were separateded from each other If two terminals on an interface subscribe to the same service profile,

with the Network ID (N_ID). This N_ID was at the early then the two terminals will be assigned the same service USID.

telecommunication systems the telephone number that did However, two different TIDs are required to uniquely dentify each of

not support any mobility at all. The introduction of the two terminals.

mobile services and third party media services will create


EID: Endpoint identifier. The endpoint identifier information element
new needs for customer and service identification (Figure
is used for terminal identification. The endpoint identifier parameters
3-6). In Figure 3-6 service identifications can contain
contain a USID and TID and additional information used to interpret
also other service related data than the service or program
them.
identification itself.

In OSI environment there are two naming conventions


that can be applied to services, the Object Identifier
specified in the ASN.1 notation [ISO 8824] and the
Distinguished Name specified in the Directory standard
[ISO9594]. The services can be considered as
Application Entity instances, whose names can be
Figure 3-6. Numbering Types
presented using either Object Identifiers or Relative
The ISDN supplementary services identifications consist Distinguished Names [ISO 7498-3]
of the following identifiers [Q932]:
There can be three main identification types depending on
Service profile: Service profile refers to the information that the
the roles in the network: N_ID’s, S_ID’s (Service ID) and
network maintains for a given user to characterize the service offered
U_ID’s (User ID) (Figure 3-7). S_ID defines the service
by the network to that user. As an example, this may contain the
that is used by the user via the network. U_ID defines
association of feature identifiers to specific supplementary services. A
the exact user irrespective of the network. The relation
service profile may be allocated to an access interface or to a particular
between user and network ID’s in old telephone networks
user equipment or a group of user equipments.
is hence U_IDN_ID. The service identification is
dependent on these three types.
SPID: The service profile identifier is a parameter carried in a service

profile identification information element that is sent from the user to


In the future there can exist several other relations too.
network to allow network assignment of a USID and TID. A user's
For example, the mobility of users and services. The user
SPID should uniquely identify a specific profile of service
can move from N_ID to another and use a service that
characteristics stored within the network. The SPID will allow the
could be either distributed throughout the
network to distinguish between different terminals that would otherwise
telecommunications network or serve the user as a mobile
be indistinguishable (e.g., same N_ID). The SPID value is provided to
service. Also from different U_ID’s can be produced
the user at subscription time.
groups where the telecommunications network is used as
a private network inside the whole telecommunications

Lappeenranta University of Technology and Telecom Finland 14


Tutorial on Intelligent Networks

system. As a more advanced telecommunications system,


GSM uses for mobility the relation where each user with
U_ID is attached to a Base Station channel with invisible
N_ID. This relation is updated in roaming and handovers
that the GSM network manages. The Intelligent Network
differentiates the user, network and service from each
other. This description can manage mobility from each of
its components and even of different Intelligent Networks
when IN uses services from other networks.

Figure 3-7 Different relations between identifications.

Lappeenranta University of Technology and Telecom Finland 15


Tutorial on Intelligent Networks

Create opportunities for non-RBOC service


vendors to offer services that stimulate
4. Intelligent Network Architecture
network usage

4.1 Overview of IN
As with the past telecommunications technology, it was
not desirable to introduce short term services, because of
The term Intelligent Networks (IN) is used to describe an
the long implementation and development period. Now,
architectural concept which is intended to be applicable to
with IN technology it is possible to introduce new
all telecommunications networks and aims to ease the
services rapidly without affecting the available services.
introduction and management of new services.
IN defines a large set of standards that describe the
The objective of IN is to allow the inclusion of additional interfaces between different network control points. With
capabilities to facilitate provisioning of service, only specifying the interfaces IN makes it possible for
independent of the service or network implementation in vendor systems to provide with different products and ,of
a multi-vendor environment. Service implementation course, for operators to use any of these products in their
independence allows service providers to define their own network configuration. IN includes also capabilities for
services independent of service specific developments by other than operators to introduce new services into the
equipment vendors [Q1201]. telecommunications network. This will change the
structure of the telecommunications business, which is
Network implementation independence allows network
the main concern in the section 5 of this paper.
and service operators to allocate functionality and
resources within their networks and to efficiently manage The IN’s main advantage is the ability to control
their networks independent of network implementation switching and service execution from a small set of
specific developments by equipment vendors. Intelligent Network nodes known as Service Control
Points (SCP). SCPs are connected to the network
switches (known as Service Switching Points) via a
4.1.1. Origins of IN
standardized interface; CCITT Signalling System No. 7.
The Intelligent Networks is a telecommunications
The SS7 will facilitate a multi-vendor SCP and SSP
network services control and management architecture.
marketplace, and the standardization of application
In February 1985, Regional Bell Operating Companies
interfaces allows a multi-vendor software marketplace for
(RBOC) submitted a Request For Information (RFI) for a
SCP applications (that is, the service control logic and its
Feature Node concept with the following objectives
related data) (Figure -1). The SSPs detect when the SCP
Ambro89:
should handle a service. The SSP forwards a standardized

Support the rapid introduction of new SS7 (TCAP) message containing relevant service

services in the network information. Via the TCAP message, the service control

Help establish equipment and interface logic in the SCP directs the SSPs to perform the

standards to give the RBOCs the widest individual functions that collectively constitute the

possible choice of vendor products service (such as connecting a subscriber number or an


announcement machine) Ambro89.

Lappeenranta University of Technology and Telecom Finland 16


Tutorial on Intelligent Networks

The IN’s long term goal is the ability to introduce new IN/1 requires updates in the SSP and SCP in order to
services, or change existing services quickly, without support a new service. A typical IN/1 service is the
having to adapt SSP software (only parameters or trigger Green Number Service (GNS) with which a subscriber
updates). The adaptation will be confined to the SCP can call a number free of charge. The SSPs contain
where parameters or stimuli are updated. This goal was triggers (such as the value of the dialed digits) that tell
first planned by Bellcore to be achieved in two stages: the SSP to send a message to an SCP in order to get
IN/1 and IN/2 Ambro89 IN/1 definitions introduced the information about the destination to which the call
term Intelligent Network in 1986 and in 1987 IN/2 should be routed. Migration from IN/1 to IN/2 implies
definitions were introduced. In 1988 IN/2 was delayed significant changes in the SSPs to accomodate new
and IN/1+ was introduced instead. In 1989 Bellcore services.
abandoned IN/1+ for several reasons, some being
problems in the technology and lack of multivendor Stage 1: IN/1

involvement. Instead a MultiVendor Initiative (MVI)


Once IN/2 is in place, no updates need be made to the
was started in 1989 to define Advanced Intelligent
SSPs software when new services are introduced. The
Network (AIN). At the same time CCITT and ETSI
IN/2 triggers advise the SSP whether to complete
started work on IN. The IN basic concepts for a service
execution locally. All SSPs and SCPs contain set of basic
dependent architecture were introduced already in IN/1.
service elements (for example, connect two lines,
The AIN concepts were essentially those of IN/2 defining
disconnect a line). The SCP also contains service
a fully service independent architecture with total
relevant data. These basic service elements are knows as
separation of service logic from the underlying seitching
Functional Components (FC) from which each service
system. These principles were accepted also by CCITT
can be contructed. A customer could conceptualize a new
and ETSI work. The AIN Release 1 and CCITT CS1
service and the network operator, via the SMS/SCP,
were published in 1993. Let us finally summarize early
could construct it quite rapidly. Any successful and
IN/1 and IN/2 outlines.
widely-used service may be downloaded (via the service
logic) to, but transparent to, the SSPs (if this is more
economic or provides a desired higher grade of service).
This facilitates complete rapid service creation. Rapid
service creation and user programmability will take place
in the SCP and the SMS.

Stage 2: IN/2

Lappeenranta University of Technology and Telecom Finland 17


Tutorial on Intelligent Networks

activities were started in 1989's. The first available


publications were the Advanced Intelligent Network
(AIN), and after that CCITT and ETSI provided their
first draft recommendations. Our presentation here is
mainly based on the CCITT, presently ITU-T,
recommendations.

4.1.2. IN standardization

4.1.2.1 IN standards bodies

The IN standards are defined by ETSI and CCITT. Also,


in the USA, the work is being done by Bellcore, which is
not a standards body but provides the major input to the
American National Standards Institute committee TS.1.
Roger90

4.1.2.1.1ETSI

ETSI was created in 1988 and its members are the


European Telcos (Telecommunications Operating
Company), manufacturers, user representatives and
research bodies. ETSI has two purposes. IN belongs to
the latter category. Roger90

to achieve workable versions of international


Figure -1. Intelligent Network overview. Homa92 standards for the European environment

An Intelligent Network is able to separate the to define European standards in areas where quick

specification, creation, and control of telephony services response is required for technical development

from physical switching networks. The key benefit of this


4.1.2.1.2CCITT
capability is that exchange carriers will be able to rapidly
engineer new revenue-producing services, in response to Work on international standards for IN began at CCITT

market opportunities, without having to rely on lenghty in 1989. Study Group XI.4 is responsible of the

cycles for implementing them entirely on switching standardation. CCITT expects that the specification and

fabric. Ultimately, service creation, or at least service deployment of IN will continue over a number of study

customization, can be extended to subscribers Homa92. periods. CCITT name has changed to ITU (International
Telecommunications Union) and there the Special Interest
The original IN concepts IN/1 and IN/2 were not Group (SIG) is T (ITU-T). Its approach to the
considered sufficient to support vendor independence development of IN standards assumes that it is necessary
and open interfaces, and extensive standardization to start with a minimum set of criteria which are

Lappeenranta University of Technology and Telecom Finland 18


Tutorial on Intelligent Networks

sufficiently open ended that they can evolve to meet the Figure -2. Phased standardation of IN.
needs of the long-term concept as this becomes a practical
reality. Roger90 4.1.2.3 Structure of CCITT IN standards

The basic standard that defines the framework of other IN


Both ETSI and ANSI are keen to ensure that CCITT
standards is Q.1200 - Q-Series Intelligent Network
recommendations agree substantially with their own
Recommendations Structure. The standards have been
activities, and collaboration between all three bodies is
numbered so that every new CSx will have a number that
likely to be an important determinant in the rapid
begins with 12x and the description of the CSx
development of realistic IN standards.
recommendation part y will be numbered also
systematically such as 12xy. (Table -1) So, the principles
4.1.2.2 Phased standardization introduction for IN CS2 will be recommendation number
To meet the goals and objectives, CCITT has embarked Q.1221.
on a phased standardation process toward the target IN
00 - General
architecture (INA) [Q1201]. CCITT works on defining a
10 - CS1 1 - Principles Introduction
set of capabilities for each phase and simultaneously on
20 - CS2 2 - Service Plane (not included for
evolving the view of the target IN architecture called the CS1)
long-term capability set (LTCS) (Figure -2) The IN 30 - CS3 3 - Global Functional Plane
subjects of standardization are called Capability Sets 40 - CS4 4 - Distributed Functional Plane
(CS). The Capability Sets involve service creation, 50 - CS5 5 - Physical Plane
management and interaction and also network 60 - CS6 6 - For future use
management, service processing and network 70 - CS7 7 - For future use
internetworking. These CS’s are backwards-compatible 80 - CS8 8 - Interface Recommendations
to the previous CS’s so the standardation and 90 - 9 - Intelligent Network Users Guide
Vocabulary
implementation of the services can be progressed through
a sequence of phases Garra93. Table -1. IN recommendations structure.

4.1.2.4 Capability Set 1

It has been an international and european wide aim to


define the first step of INA. These recommendations are
gathered into a set called IN Capability Set 1 (CS1).
There are two standardation organisations working on
CS1: CCITT and ETSI. CCITT has gathered these
recommendations into the Q.121y -series. (Table -2)
CCITT’s and ETSI’s standards do not substantially differ
from each other.

CCITT Study Group XI, Working Party XI/4 includes


representatives from most of the important

Lappeenranta University of Technology and Telecom Finland 19


Tutorial on Intelligent Networks

telecommunications network operators and equipment given CCITT’s objective of evolving IN from existing
vendors in the world. Study Group XVIII also is involved networks. The latter approach was service-driven and it
in the initial set of IN standards, and is sharing focused on identifying a set of IN CS1 services and
responsibility for the Introductory Recommendations. At Service Features. Then driving these down through the
these meetings, there is an obvious willingness to INCM in order to identify the set of service-independent
strongly focus on achieving a realistic initial set of IN capabilities for IN CS1, evolvable to the target set of IN
capability, which is both technically implementable and capabilities, and verify that this set could be supported by
commercially deployable.Duran92 the functional and physical architectures defined via the
“bottom-up” approach Garra93.
Recommendation Q-Series Intelligent Network
Q.1200 Recommendations Structure
IN CS1 defines capabilities of direct use to both
Recommendation Principles of Intelligent Network
Q.1201 Architecture manufactures and network operators in support of circuit-
Recommendation Intelligent Network - Service switched voice/data services either defined or in the
Q.1202 Plane Architecture
process of being defined by CCITT. The primary
Recommendation Intelligent Network - Global
Q.1203 Functional Plane Architecture characteristic of the target set of IN CS1 services is that

Recommendation Intelligent Network - Distributed they apply during the setup phase of a call or during the
Q.1204 Functional Plane Architecture release phase of a call. CCITT chose this single-ended
Recommendation Intelligent Network - Physical service characteristic to limit the operational,
Q.1205 Plane Architecture
implementation, and control complexity for IN CS1.
Recommendation Intelligent Network - Application
Q.1208 Protocol General Aspects Even with this limitation, it may be expected that
Recommendation Intelligent Network - Introduction equipment suppliers will support interworking of IN CS1
Q.1211 to Intelligent Network Capability
Set 1 capabilities with existing switch-based services, including

Recommendation Intelligent Network - Global more complex services such as those that apply during the
Q.1213 Functional Plane for CS1 active phase of a call. For example, IN CS1 routing,
Recommendation Intelligent Network - Distributed charging, and user interaction capabilities may be used to
Q.1214 Functional Plane for CS1
customize or improve existing switch-based services to
Recommendation Intelligent Network - Physical
Q.1215 Plane for CS1 better satisfy market needs. Garra93
Recommendation Intelligent Network - Intelligent
Q.1218 Network Interface Specifications It is anticipated that CS1 recommendations of CCITT and
Recommendations Intelligent Network Users guide ETSI will be adopted world-wide. This can help to
Q.1219 for Capability Set 1
develop open interfaces between the SSP (Service
Switching Point) and SCP (Service Control Point), thus
Table -2. IN CS1 recommendations.
putting into effect one of the important goals of the IN,
In defining IN CS1, CCITT applied the INCM
namely vendor independence. Lauta93
(Intelligent Network Conceptual Model) using both
“bottom-up” and “top-down” approaches. The former
4.1.2.5 IN CS1 Services
approach focused on modelling the capabilities of
existing networks in terms of functional and physical Allthough, by nature, the IN is a service independent

architectures that could evolve the target IN architecture, architecture, it is relevant to describe the general CS-1

Lappeenranta University of Technology and Telecom Finland 20


Tutorial on Intelligent Networks

Automatic Alternative Mass Calling (MAS)


service capabilities. The services and Service Features Billing (ABB)
that are to be supported by CS-1 are fundamental to the Abbreviated Dialling Malicious Call
CS-1 Service Building Blocks, call processing model and (ABD) Identification (MCI)

service control principles. Account Card Calling Premium Rate (PRM)


(ACC)

The target set of CS-1 defines several services (Table -3) Credit Card Calling Security Screening (SEC)
(CCC)
and service features. A service is a stand-alone
Call Distribution (CD) Selective Call Forward on
commercial offering, characterized by one or more core Busy/Don’t Answer (SCF)
Service Features, and can be optionally enhanced by other Call Forwarding (CF) Split Charging (SPL)
Service Features. A Service Feature is a specific aspect of * Completion of Call to Televoting (VOT)
Busy Subsrciber (CCBS)
a service that can also be used in conjunction with other
* Conference Calling Terminating Call
services/Service Features as part of a commercial (CON) Screening (TCS)
offering. It is either a core part of a service or an optional Call Rerouting User-Defined Routing
part offered as an enhancement to a service. Q1201 The Distribution (CRD) (UDR)

service composition and Service Features will be Destination Call Routing Universal Access Number
(DCR) (UAN)
discussed more precisely later on.
Follow-Me-Diversion Universal Personal
(FMD) Telecommunications
(UPT)
Freephone (FPH) Virtual Private Network
(VPN)

Note: The service indicated with a * may only be partially


supported in CS1, because they require capabilities
beyond those of type A services.

Table -3. Target set of IN CS1 services.

4.2 IN Functional Requirements

IN functional requirements arise as a result of the need to


provide network capabilities for both customer needs
(service requirements) and network operator needs
(network requirements) [Q1201].

A service user is an entity external to the network that


users its services. A service is that which is offered by an
administration to its customers in order to satisfy a
telecommunications requirement. Part of the service used

Lappeenranta University of Technology and Telecom Finland 21


Tutorial on Intelligent Networks

by customers may be provided/managed by other - Network interworking: A process through


customers of the network. These are often called as third which several networks (IN to IN or IN to non-IN)
party services and their providers as 3rd party service cooperate to provide a service.
providers.

4.2.1 Service Requirements


Service requirements will assist in identifying specific
services that are offered to the customer. These service The goal of work for IN is to define a new architectural

capabilities are also referred to as (telecommunication) concept that meets the needs of telecommunication

services: Network requirements span the ability to create, service providers to rapidly, cost effectively, and vendor-

deploy, operate and maintain network capabilities to independently satisfy their existing and potential market

provide services. needs for services, and to improve the quality and reduce
the cost of network service operations and management
Service and network requirements can be identified for Garra93. In [Q1201] the following overall service
the following areas of service/network capabilities: requirements are given when defining the IN architecture:
service creation, service management, network
management, service processing and network - it should be possible to access services by the usual user

interworking. network interface (e.g. POTS, ISDN);

- Service creation: An activity whereby - it should be possible to access services that span multiple

supplementary services are brought into being through networks;

specification phase, development phase and verification


- it should be possible to invoke a service on a call-by-call
phase.
basis or for a period of time, in the latter case the

- Service management: An activity to support the service may be deactivated at the end of the period;

proper operation of a service and the administration of


- it should be possible to perform some access control to a
information relating to the user/customer and/or the
service;
network operator, Service management can support the
following processes: service development, service - it should be easy to define and introduce services;
provisioning, service control, billing and service
monitoring. - it should be possible to support services involving calls

between two or more parties;


- Network management: An activity to support
the proper operation of an IN-structured network. - it should be possible to record service usage in the network

(service supervision, tests, performance information,


- Service processing consists of basic call and charging);
supplementary service processing which are the serial
and/or parallel executions of network functions in a - it should be possible to provide services that imply the use of

coordinated way, such that basic and supplementary functions in several networks;

services are provided to the customers.


- it should be possible to control the interactions between

different invocations of the same service.

Lappeenranta University of Technology and Telecom Finland 22


Tutorial on Intelligent Networks

Service requirements for service creation refer to the providers to define their own services, independent of
network capabilities that are used by network operators service-specific developments by equipment suppliers.
for the provision of service creation services to
CS1 is intended to address services with high commercial
customers.
value, focusing at addressing flexible routing, charging,
Service requirements for service management refer to the and user interaction services. The list of benchmark
network capabilities that are necessary for the provision services and features will be listed later on.
of service management services to customers. Standardization of these services, however, is not
CCITT’s role. An important characteristic is that the
Service requirements for service processing refer to the
services will be technologically feasible and
network capabilities that are necessary for the provision,
understandable, but do not significantly impact existing
from a customer's point of view, of basic and
deployed technology. In this context, services have been
supplementary services by an IN-structured network
categorized by CCITT as follows: Duran92
[Q1201]. The IN is primarily a network concept that
aims for efficient creation, deploynent and management All type A services are invoked on behalf of and
of supplementary services that enhance basic services. directly affect a single user. Most type A services
Hence, from a customers point of view the provision of can be invoked only during call setup of tear down
services is transparent, the customer is unaware whether and fall in the category of “single-user, single-
the service is provided in an IN way. Service processing ended (no requirements for representing end-to-end
requirements can be identified for service and access messaging or control), single point-of-control (no
capabilities. The service capabilities of IN can be applied requirement fro representing interaction points
to the support of supplementary services for the following between multiple service logic programs), and
basic services [Q1201]: single-bearer capability (one media profile)”. Type
A services may be used in conjunction with other
- bearer services including speech, audio and data
services, switch-based or not, of any type, to form
a more complete service package.
- teleservices as telephony, telefax and videotex

- broadband interactive services

- broadband distribution services Type B services can be invoked at any point during
the call. These services may be invoked on behalf
The access capabilities of IN should be applicable to all of and directly impact one or more users. Feature
telecommunications networks, such as Public Switched interaction and arbitration, and topology
telecommunications Networks (PSTN), including manipulation are capabilities that need to be
Integrated Services Digital Networks (ISDN), both addressed to deploy these services. Note that it is
narrowband and broadband, packet-switched public data possible to use type A capabilities to enhance some
networks, and mobile networks. Allthough, IN CS1 existing type B services.
enables only the use of PSTN, PLMN (Public Land
Mobile Network) and ISDN, IN should enable service

Lappeenranta University of Technology and Telecom Finland 23


Tutorial on Intelligent Networks

The services addressed by CS1 fall under type A services. Network requirements for service creation refer to the
The type A category lead to a series of advantages in the network capabilities that are necessary from a network
context of CS1 standardization. First, they represent a operator point of view for the creation of new
wide range of services of proven value. Second, these supplementary services. The service creation process
services depend on well-understood control relationships consists of specification, development and verification
between network components and this represents an steps.
achievable target within required time frame of IN CS1
Network requirements for service management refer to
product deployment in 1993. Finally, complexity in the
the network capabilities that are necessary from a
transition to rapid service delivery process is minimized
network operator point of view to support the proper
both for service provider and for the equipment
operation of services
manufacturer Duran92.

Network requirements for service processing refer to the


4.2.2. Network Requirements network capabilities that are necessary for the provision,

Overall network requirements of IN are stated in [Q1201] from a network operator point of view, of basic and

as follows: supplementary services by an IN-structured network


[Q1201]. The main network requirements for service
- it should be possible to move cost-effectively from existing processing stem from the inability of network operators
network bases to target network bases in a practical and of traditional "non-IN" networks to rapidly create and
flexible manner deploy new supplementary services. To overcome this
inability the IN aims for:
- it should be possible to reduce redundancies among network

functions in physical entities - rapid service implementations by means of


reusable network functions;
- it should be possible to allow for the flexible allocationn of

etwork functions to physical entities - modularization of network functions;

- there is a need for communication protocols that allow - standardized communication between network
flexibility in the allocation of functions functions via service independent interfaces.

- it should be possible to create new services from network To achieve the goal of fast service implementation, the IN
functions in a cost and time efficient manner Service Processing Model is introduced (Figure 4-3), and
will be studied here in some detail.
- it should be possible to quarantee the integrity of the

etwork when new service is being introduced

- it should be possible to manage network elements and

network resources such that quality of service and network

performance can be quaranteed

Lappeenranta University of Technology and Telecom Finland 24


Tutorial on Intelligent Networks

Figure 4-3. IN Service Processing Model. Thus, by changing logic at the service control point and
modifying network data, a new service that uses existing
The three main elements of this model are: the basic call
network capabilities can readily be implemented.
processes, the "hooks" that allow the basic call processes
to interact with IN service logic, and IN service logic that
In addition In service logic can decide to terminate an
can be "programmed" to implement new supplementary
interaction session with the basic call process. The basic
services. For these elements the main principles are
call process will then resume its execution as specified by
described below:
the IN service logic. In order to allow fast service
implementation, the IN service logic should have a
- The basic call process should be available all
logical view of the network resources that constitute the
over the network and is designed to support, with optimal
basic call process and additional (specialised) network
performance, services that do not require special features.
functions. For proper service processing, the following
In order to achieve flexibility in service processing, the
principles apply:
basic call process needs to be modularized into service-
independent sub-processes such that these can be
- it should be possible to distribute resources
executed autonomously (without interference from the
between services in a well balanced way;
outside during execution).
- it should be possible for IN supported services
- "Hooks" are to be added to the basic call process
to share resources with non-IN supported
forming the links between the individual basic call sub-
services;
processes and the service logic. The "hooks" are able to
start an interaction session with the IN service logic. For - it should be possible to provide a different
this it should continuously check the basic call process method of resource data management from the
for the occurrence of conditions on which an interaction current embedded method;
session with IN service logic should be started. During an
- it should be possible to introduce IN supported
interaction session the basic call process can be
services specific resources.
temporarily suspended.

To define an IN architecture including the network


- IN service logic uses a programmable software
elements within this architecture, there is a need for a call
environment that needs to be developed to allow fast
model that describes the real-time behaviour of call
implementation of new supplementary services. New
control capabilities for the provision of basic and
supplementary services can be created by means of
supplementary services. In order to be consistent with the
"programs" containing IN service logic. The IN service
principles of the above-described IN service processing
logic is able, via the "hooks" functionality, to interact
model, the IN call model should cover the following
with the basic call process. In this way IN service logic
aspects:
can control the sub-processes in the basic call process and
the sequencing of these sub-processes.
- it should specify which basic services can be
supported by the model;

Lappeenranta University of Technology and Telecom Finland 25


Tutorial on Intelligent Networks

- it should model the basic call processes (each service implementation independence
individual basic service may require its own IN
basic call process); network implementation independence

- it should describe trigger mechanisms vendor and technology independence

("hooks") that allow the IN basic call process to


interact with service logic;

Each INCM plane represents a different abstract view of


- it should provide a logical view (from the
the capabilities provided by an IN-structured network.
service logic point of view) of call processing
These views address service aspects, global functionality,
functions and network resources, which as a
distributes functionality and physical aspects of an IN (
consequence allows fast service implemen-
tation; Figure ).

- it should specify the mechanisms according to


which an IN-basic call process may interact
with the service logic (e.g. single-ended
interactions, simultaneous interactions, service-
logic initiated interactions, etc.);

- it should be evolvable from the existing


technology base.

The CS1 Call Model is presented in detail later in chapter


4.3.2.1.4 of this tutorial. [Q1204]

4.3 IN Conceptual Model

The IN Conceptual Model (INCM) is defined in the


CCITT Recommendation Q.1201. The conceptual model
is divided into four planes and it forms the basis for the
standardation work. The IN conceptual Model was
designed to serve as a modelling tool for the Intelligent
Network. It is also a tool that can be used to design the
IN architecture to meet the following main objectives
Q1201:

Lappeenranta University of Technology and Telecom Finland 26


Tutorial on Intelligent Networks

view is a global (network-wide) basic call processing


(BCP) SIB, the service independent building blocks
(SIBs), and point of initiation (POI) and point of return
(POR) between the BCP and a chain of SIBs. These are
described in detail in chapter 4.3.3.1.

The Distributed Functional Plane (DFP) models a


distributed view of an IN-structured network. Each
functional entity (FE) may perform a variety of functional
entire actions (FEAs). Any given FEA may be performed
within different functional entities. However, a given
FEA may not be distributed across functional entities.

Within each functional entity, various FEAs may be


performed by one or more elementary functions. The
manner in which elementary functions result in FEAs is
for further study.

Service-independent building blocks (SIBs) are realised


in the distributed functional plane (DFP) by a sequence
of particular FESs performed in the functional entities.
Some of these FEAs result in information flows between
functional entities. The information flows consist of
messages which exhance information between functional
entities. The messages comply with OSI structures and
principles (see chapters 4.3.1.2 and 4.4.3).

Figure 4-4 IN Conceptual Model Error! Reference The Physical Plane models the physical aspects of IN-
source not found. structured networks. The model identifies the different

The Service Plane represents an exclusively service- physical entities and protocols that may exist in real IN-

oriented view. This view contains no information structured networks. It also indicates which functional

whatsoever regarding the implementation of the services entities are implemented in which physical entities.

in the network, e.g. an "IN-type" implementation is not


The entities contained in adjacent planes of the INCM are
visible. All that is perceived is the network's service-
related to each other. The nature of the relationship is as
related behaviour as seen, for example, by a service user.
follows (Q1201):
Services are composed of one or more Service Features
(SFs), which are the "lowest level" of services. - Service plane to GF plane: Service features
within the service plane are realised in the GF plane by a
The Global Functional Plane (GFP) models an IN-
combination of global service logic and SIBs including
structured network as a single entity. Contained in this

Lappeenranta University of Technology and Telecom Finland 27


Tutorial on Intelligent Networks

the basic call process SIBs. This mapping is related to the vendors must be able to develop Physical Entities based
service creation process. on the mapping of Functional Entities and the standard
interfaces. Q1201
- GF plane to distributed functional (DF) plane:
Each SIB identified in the GF plane must be present in at
least one FE in the DF plane. A SIB may be realised in
more than one FE. Thus, cooperation of several FEs may
be needed. The service logic in the GF plane maps onto
one or more DSLs in the DF plane. This mapping is
related to the service creation process.

- DF plane to physical plane: FEs identified in the


DF plane determine the behaviour of the physical entities
(PEs) onto which they are m mapped. Each FE must be
mapped onto one physical entity, but, each PE contains
one or more FEs. Relationships between FEs, identified
in the DF plane, are specified as protocols in the physical
plane. DSLs may be dynamically loaded into physical
entities and this mapping is related to the service
management process.

Let us consider the structures of the INCM planes more


thoroughly starting from the physical plane.

4.3.1 Physical Plane

The physical plane is the lowest layer in the IN


architecture. It takes action of how the network itself is
implemented. It describes the physical architecture
alternatives for an IN-structured network in terms of
potential physical systems, referred to as physical entities
Figure 4-5. IN Physical Plane Architecture.
(PE), in a network, and interfaces between these Physical
Entities (Figure 4-5). One or more Functional Entities
4.3.1.1 Physical Entities
from the Distributed Functonal Plane may be realized in a
Physical Entity on the physical plane, and one or more The CCITT recommendation Q.1215 defines the Physical

relationships from the Distributed Functional Plane may Entities (PE) used by IN. It also describes the interfaces

map into an interface on the physical plane. The physical between PEs and which IN functionalities are included

plane architecture describes how functional architecture into them from the Distributed Functional Plane and

map into Physical Entities and interfaces Garra93. Also which of them are just optional entities.

the requirement for physical plane architecture is that

Lappeenranta University of Technology and Telecom Finland 28


Tutorial on Intelligent Networks

4.3.1.1.1SSP ubiquitous deployment of IN services. This NAP cannot

SSP ( Service Switching Point) is a Physical Entity in the communicate with an SCF, but it has the ability to

Intelligent Network that provides the switching determine when IN processing is required. It must send

functionality. To make IN capabilities available to all calls requiring IN processing to an SSP. Q1201

types of access arrangements, we must develop service


management independently of the access arrangements. 4.3.1.1.3SCP
This separation of service management from network
Functionally, an SCP contains Service Control Function
access would allow the same network-wide, IN
(SCF) and optionally also Service Data Function (SDF).
capabilities to serve a variety of access arrangements,
The SCF is implemented in Service Logic Programs
from analog lines to wireless, and, in the future, to
(SLP). The SCP is connected to SSPs by a signalling
broadband and other high-speed optical links. Wyatt91 In
network. Multiple SCPs may contain the same SLPs and
addition to providing users with access to the network (if
data to improve service reliability and to facilitate load
the SSP is a local exchange) and performing any
sharing between SCPs. In case of external Service Data
necessary switching functionality, the SSP allows access
Point (SDP) the SCF can access data through a signalling
to the set of IN capabilities. The SSP contains Detection
network. The SDP may be in the same network as the
Capability to detect requests for IN services. It also
SCP, or in another network. The SCP can be connected to
contains capabilities to communicate with other PEs
SSPs, and optionally to IPs, through the signalling
containing SCF, such as SCP, and to respond to
network. The SCP can also be connected to an IP via an
instructions from the other PEs. Functionally, an SSP
SSP relay function. Q1201
contains a Call Control Function, a Service Switching
Function, and, if the SSP is a local exchange, a Call The SCP comprises the SCP node, the SCP platform, and
Control Agent Function. It also may optionally contain applications. The node performs functions common to
Service Control Function, and/or a Specialized Resource applications, or independent of any application; it
Function, and/or a Service Data Function. The SSP may provides all functions for handling service-related,
provide IN services to users connected to subtending administrative, and network messages. These functions
Network Access Points. Q1201 include message discrimination, distribution, routing, and
network management and testing. For example, when the
The SSP is usually provided by the traditional switch
SCP node receives a service-related message, it
manufacturers. These switches are programmable and
distributes the incoming message to the proper
they can be implemented using multipurpose processors.
application. In turn, the application issues a response
The main difference of SSP from an ordinary switch is in
message to the node, which routes it to the appropriate
the software where the service control of IN is separated
network elements. Ambro89
from the basic call control.
The SCP node gathers data on all incoming and outgoing
messages to assist in network administration and cost
4.3.1.1.2NAP
allocation. This data is collected at the node, and
A NAP ( Network Access Point) is a PE that includes only
transmitted to an administrative system for processing.
the CCAF and CCF functional entities. It may also be
Ambro89
present in the network. The NAP supports early and

Lappeenranta University of Technology and Telecom Finland 29


Tutorial on Intelligent Networks

The SCP node also measures the frequency of SCP 4.3.1.1.6SN


hardware and software failures, resource usage, overload The Service Node can control IN services and engage in
counts, and so on. It provides information needed to flexible information interactions with users. The SN
perform maintenance procedures, thus minimizing the communicates directly with one or more SSPs, ech with a
impact of failures on system performance. The node may point-to-point signalling and transport connection.
take action to prevent and correct the overload at the node Functionally, the SN contains an SCF, SDF, SRF, and an
or at a particular application. Ambro89 SSF/CCF. This SSF/CCF is closely coupled to the SCF
within the SN, and is not accessible by external SCFs.

4.3.1.1.4AD Q1201

The Adjunct (AD) PE is functionally equivalent to an


In a manner similar to an Adjunct, the SCF in an SN
SCP (i.e. it contains the same functional entities) but it is
receives messages from the SSP, executes SLPs, and
directly connected to and SSP. Communication between
sends messages to the SSP. SLP in an SN may be
and Adjunct and an SSP is supported by a high speed
developed by the same Service Creation Environment
interface. This arrangement may result in differing
used to develop SLPs for SCPs and Adjuncts. The SRF in
performance characteristics for an adjunct and an SCP.
an SN enables the SN to interact with users in a manner
The application layer messages are identical in content to
similar to an IP. An SCF can request the SSF to connect a
those carried by the signalling network to an SCP. Q1201
user to a resource located in an SN that is connected to
An Adjunct may be connected to more than one SSP and
the SSP from which the service request is detected. An
an SSP may be connected to several Adjuncts.
SCF can also request the SSP to connect a user to a
resource located in an SN that is connected to an another
4.3.1.1.5IP SSP. Q1201

The IP provides resources such as customized and


concatenated voice announcements, voice recognition, 4.3.1.1.7SSCP
and Dual Tone Multi-Frequencies (DTMF) digit
The SSCP (Service Switching and Control Point) is a
collection, and contains switching matrix to connect users
combined SCP and SSP in a single node. Functionally, it
to these resources. The IP supports flexible information
contains an SCF, SDF, CCAF, CCF, and SSF. The
interactions between a user and the network.
connection between the SCF/SDF functions and the
Functionally, the IP contains the Special Resource
CCAF/CCF/SSF functions is proprietary and closely
Function. The IP may directly connect to one or more
coupled, but it provides the same service capability as an
SSPs, and/or may connect to the signalling network.
SSP and SCP separately. This node may also contain SRF
Q1201
functionality, i.e. SRF as an optional functionality. The
interfaces between the SSCP and other PEs are the same
An SCP or Adjunct can request an SSP to connect a user
as the interfaces between the SSP and other PEs, and
to a resource located in an IP that is connected to the SSP
therefore will not be explicitly stated. Q1201
from which the service request is detected. An SCP or
Adjunct can also request the SSP to connect a user to a
resource located in an IP that is connected to another SSP.
Q1201

Lappeenranta University of Technology and Telecom Finland 30


Tutorial on Intelligent Networks

4.3.1.1.8SDP subscriber personnel gain interactive messages to the

The SDP contains the customer and network data which system. Ambro89

is accessed during the execution of a service.


Functionally, the SDP contains an SDF. Q1201 It 4.3.1.1.10 SCEP
contains data used by Service Logic Programs to provide
The Service Creation Environment Point is used to
individualized services. Functionally, and SDP contains a
define, develop, and test an IN service, and to input it into
Service Data Function. It can be accessed directly by an
the SMP. Functionally, it contains the Service Creation
SCP and/or SMP, or through the signalling network. It
Environment Function. The SCEP interacts directly with
can also access other SDPs in its own or other networks.
the SMP. Q1201
Q1201

4.3.1.1.11 SMAP
4.3.1.1.9SMP
The Service Management Access Point provides some
The Service Management Point/Service Management
selected users, such as service managers and customers,
System performs service management control, service
with access to the SMP. One possible use of the SMAP is
provision control, and service deployment control.
to provide one single point of access for a given user to
Examples of functions it can perform are database
several SMPs. The SMAP functionally contains a Service
administration, network surveillance and testing, network
Management Access Function. The SMAP directly
traffic management, and network data collection.
interacts with the SMP. Q1201
Functionally, the SMP contains the Service Management
Function and, optionally, the Service Management
4.3.1.2 Interfaces between PEs
Access Function and the Service Creation Environment
Function. The SMP can access all other Physical Entities. In the Physical Plane Architecture several standardized

Q1201 interfaces are stated. These interfaces are: SCP-SSP, AD-


SSP, IP-SSP, SN-SSP, SCP-IP, AD-IP, and SCP-SDP.
A Service Management System is the operations system
through which network operator and service subscriber Existing lower layer protocols are proposed for these

personnel manage SCPs and related service applications candidate interfaces to carry the application layer

(programs and databases) in an IN. More than one SMS messages required by IN services. As such, the focus of

may be associated with the IN; the network operating the standardization effort for CS-1 is on the applications

company may want a separate SMS for each IN service or layer protocols. At the application layer, the message sent

a single SMS for several IN services. Ambro89 that the different interfaces carry should reflect the same
semantic content, even though the application layer
Physically, the SMS resides in a multipurpose computer. message may be encoded or formatted differently. For
Processing power and database size requirements example, the messages between the SSF in an SSP and
normally govern the choice of a specific computer. The the SCF in an SCP, Adjunct or SN should contain the
SMS manages a private network consisting of switched same information. The following sections give some
and leased line connected to a set of keyboard or display proposed protocols for use on these interfaces. Q1201
terminals through which network operator and service

Lappeenranta University of Technology and Telecom Finland 31


Tutorial on Intelligent Networks

4.3.1.2.1SCP-SSP interface Q.931. This possibility provides for the flexibility to

The proposed underlying protocols platform for the convey application layer information without affecting

interface between an SCP and an SSP is Transaction the connection state of the call. Q1201

Capabilities Application Part (TCAP) on Signalling


Connection Control Part (SCCP)/Message Transfer Part 4.3.1.2.4SN-SSP interface
(MTP) of SS7. Q1201 So, the SCP-SSP interface in CS-1
The proposed underlying protocol platform for the
is using CCITT SS7 protocol stack to communicate
interface between an SN and an SSP is ISDN BRI, PRI
(signal) with each other. The interface could also be
(or both). An SN and an SSP exchange application layer
something else at the lowest layer protocols of the SS7 in
messages over an ISDN D-channel using common
order to achieve, for example, high-speed signalling
element procedures of CCITT Recommendations Q.932.
between these PEs. That is why, the IN standardization is
This communication may occur on a separate D-channel
mainly focused on the application layer protocols.
from the channel that carries the common element
procedure messages. These channels may also be
4.3.1.2.2AD-SSP interface separate. Q1201

The proposed underlying protocol platform for the AD-


SSP interface is TCAP. The physical interface has not 4.3.1.2.5SCP-IP interface
been specified, but a number of alternative standard
The proposed underlying protocol platform for an
protocols could be used.
interface between an SCP and an IP is TCAP on
SCCP/MTP of the SS7 protocol stack. Q1201
4.3.1.2.3IP-SSP interface

This interface is used for communications between an IP 4.3.1.2.6AD-IP interface


and an SSP as well as for communication between an IP
The proposed underlying protocol platform between an
and an SCP which is being relayed through an SSP. The
AD and an IP is TCAP. The physical interface has not
proposed underlying protocol platform for the interface
been specified, but a number of alternative standard
between an IP and an SSP is ISDN Basic Rate Interface
protocols could be used. Q1201
(BRI), Primary Rate Interface (PRI) (or both), or SS7.
Q1201
4.3.1.2.7SCP-SDP interface
If a BRI or PRI is used, the ISDN D-channel connecting The proposed underlying protocol platform for the
an IP to an SSP carries application layer information interface between an SCP and an SDP is TCAP on
between an SCF and an SRF, and supports the setup of B- SCCP/MTP of SS7 protocol stack. In existing systems
channel connections to the IP. Information is passed from the SCP - SDP interfaces have been implemented in
an SCF to an SRF (e.g. collected information and billing many proprietary ways, a typical one being a fast remote
measurements) is embedded in the Facility Information operations protocol using a Local Area Network (LAN).
Element (FIE). The FIE can be carried by a number of Q1201
Q.931 messages, like SETUP and DISCONNECT. The
FIE can also be carried by the FACILITY message in

Lappeenranta University of Technology and Telecom Finland 32


Tutorial on Intelligent Networks

4.3.1.2.8User interfaces Functional Entities are referred to as relationships (rN).

A user is an entity external to the IN that uses IN The functional entities are described independently of

capabilities. IN users may employ the access interfaces how the functionality is physically implemented or

described below to invoke various IN service capabilities. deployed in the network. SIB’s on the global functional

For example, users can affect the routing of a call, send plane are realized on the Distributed Functional Plane by

and receive information from the network, screen calls, a sequence of Functional Entity Actions (FEA) and

and update service parameters. Users are served by resulting information flows. Garra93

existing network interfaces. Q1201

It is important to ensure that IN should continue to


support existing services and capabilities. In addition, the
current restrictions imposed by each of the interface
technologies described below must be considered when
deploying IN services. For example, calling party
information may or may not be available at a given
interface and, therefore, may or may not be provided to
the SCF. Q1201

End users are using analogue interface signalling, or


ISDN access signalling arrangements. IN user-network
interactions include providing stimuli, such as off-hook or Figure 4-6. Distributed functional plane architecture.
DTMF digit signalling, which determine further IN The DFP architecture provides flexibility to support a
action. Q1201 large variety of services and facilitates the evolution of IN
by organizing the functional capabilities in an open-ended
Out-of-band (i.e. D_channel) signalling provides ISDN
and modular strtucture to achieve service independence.
users with additional capabilities for accessing potential
The DFP architecture is vendor/implementation
IN services. When originating a call, an ISDN user
independent, thereby providing the flexibility for multiple
identifies the bearer capability to be associated with the
physical networking configuration and placing no
call. IN service logic can use this information to
constraints on national network architecture beyond the
determine how the call should be handled (e.g. how to
network and interface standards which will be developed
route the call). Q1201
for IN structured networks. The definition of the DFP
architecture initially accomodates service execution
4.3.2 Distributed Functional Plane capabilities and will accomodate service creation and
The global Distributed Functional Plane (DFP) is of service and network management capabilities when they
primary interest to network designers and providers. It become available. Q1201
describes the functional architecture of an IN-structured
network in terms of units of network functionality (Figure A Functional Entity is a unique group of functions in a

4-6). These functionalities are referred to as Functional single location and a subset of the total set of functions

Entities (FE). The information that flows between required to provide a service. One or more Functional

Lappeenranta University of Technology and Telecom Finland 33


Tutorial on Intelligent Networks

Entities can be located in the same Physical Entity. 4.3.2.1.2CCF


Different Functional Entities contain different functions, The CCF is the Call Control Function in the network that
and may also contain one or more of the same functions. provides call/connection processing and control. It Q1201
In addition, one Functional Entity cannot be split between
two Physical Entities; the Functional Entity is mapped
entirely within a single Physical Entity. Finally, duplicate
a) establishes, manipulates and releases
instances of a FE can be mapped to different PEs, though
call/connection instances as “requested”
not the same PE. Q1201
by the CCAF;
b) provides the capability to associate and
4.3.2.1 Definition of FEs relate CCAF functional entities that are
This section gives a description of the Functional Entities involved in a particular call and/or
at the Distributed Functional Plane related to IN service connection instance (that may be on SSF
execution and how they are mapped to the Physical Plane requests);
architecture.

4.3.2.1.1CCAF

The CCAF is the Call Control Agent Function that c) manages the relationship between CCAF
provides access for users. It is the interface between user functional entities involved in a call (e.g.
and network call control functions. It has the following supervises the overall perspective of the
characteristics: It Q1201 call and/or connection instance);
d) provides trigger mechanism to access IN
a) provides for user access, interacting
functionality (e.g. passes events to the
with the user to establish, maintain,
SSF);
modify and release, as required, a call or
e) is managed, updated and/or otherwise
instance of service;
administred for its IN-related functions
b) accesses the service-providing
(i.e. trigger mechanisms) by a Service
capabilities of the Call Control
Management Function;
Function, using service requests (e.g.
setup, transfer, hold, etc.) for the 4.3.2.1.3SSF
establishment, manipulation and release The SSF is the Service Switching Function, which,
of a call or instance of service; associated with the CCF, provides the set of functions
c) receives indications relating to the call required for interaction between the CCF and Service
or service from the CCF and relays Control Function. It Q1201
them to the user as required;
d) maintains call/service state information
as perceived by this functional entity;

Lappeenranta University of Technology and Telecom Finland 34


Tutorial on Intelligent Networks

a) extends the logic of the CCF to include provides the SCF with access to SSF/CCF capabilities
recognition of service control triggers and resources. It also detects IN call/connection
and to interact with the SCF; processing events that should be reported to active IN

b) manages signalling between the CCF service logic instances, and manages SSF resources

and the SCF; required to support IN service logic instances. The IN-SM

c) modifies call/connection processing interacts with the FIM/CM as described below.

functions (in the CCF) as required to


c) FIM/CM - The entity in the SSF that provides
process requests for IN provided service
mechanisms to support multiple concurrent instances of
usage under the control of the SCF;
IN service logic instances on a single call. In particular,
d) is managed, updated and/or otherwise
the FIM/CM can prevent multiple instances of IN an
administred by an SMF;
non-IN service logic instances from being invoked. The
ability of the FIM/CM to arbitrate between multiple
instances of IN and non-IN service logic instances is for
further study. The FIM/CM integrates these interactions
mechanisms with the BCM and IN-FM to provide the
4.3.2.1.4SSF/CCF Model SSF with a unified view of call/service processing
The SSF/CCF model described below include the Basic internal to the SSF for a single call.
Call Manager (BCM), the IN-Switching Manager (IN-
d) BCM Relationship to IN-SM - The relationship that
SM), the Feature Interactions Manager (FIM)/Call
encompasses the interaction between the BCM and the
Manager (CM), the relationship of the BCM to the IN-
IN-SM, through the FIM/CM. The information flow
SM, the relationship of the BCM and IN-SM to the
related to this interaction is not externally visible and is
FIM/CM, and the functional separation provided in the
not standardized for CS-1. However, an understanding of
SSF/CCF (Figure 4-7). [Q1214]
this subject is required to identify how basic call and
a) BCM - The entity in the CCF that provides basic call connection processing and IN call/connection processing
and connection control to establish communication paths may interact.
for users and interconnects such communication paths,
e) BCM and IN-SM Relationships to FIM/CM - The
that detects basic call and connection control events that
relationships that encompass the interaction between the
can lead to the invocation of IN service logic instances or
BCM and FIM/CM, and the IN-SM and the FIM/CM.
should be reported to active IN service logic instances,
The information flows related to these interactions are not
and that manages CCF resources required to support basic
externally visible and are not standardized for CS-1.
call and connection control. The BCM interacts with the
However, an understanding of this subject is required in
FIM/CM as described in the FIM/CM description below.
order to unify the BCM, IN-SM and FIM/CM.
b) IN-SM - The entity in the SSF that interacts with the
f) Functional Separation in the SSF/CCF. The functional
SCF in the course of providing IN service features to
separation of processes and resources in the SSF/CCF
users. It provides the SCF with an observable view of
that provides a means of handling service logic instance
SSF/CCF call/connection processing activities, and
interactions for CS-1. This functional separation services

Lappeenranta University of Technology and Telecom Finland 35


Tutorial on Intelligent Networks

to isolate single-ended service logic instances related to representation of CCF activities that can be analysed to
the calling party from single-ended service logic instances determine which aspects of the BCSM will be visible to
related to the called party for the same call. Within the IN service logic instances, if any, and what level of
scope of CS-1, there is no functionality in the SSF for abstraction and granularity is appropriate for this
handling service feature interactions between the separate visibility.
SSF calling party processes and SSF called party
The BCSM identifies points in basic call and connection
processes.
processing when IN service logic instances are permitted
to interact with basic call and connection control
capabilities. In particular, it provides a framework for
SCF
describing basic call and connection events that can lead
SLPI A

to the invocation of IN service logic instances or should


be reported to active IN service logic instances, for

SSF
describing those points in call and connection processing
SCF Access Manager
IN Local
Resource Data
at which these events are detected, and for describing
Manager IN-SM
IN Switching State those points in call and connection processing when the
Model Instance
IN Local
< IN-SSM >
Resource data
> IN-SSM Events > transfer of control can occur.
< REsource Control >
Non-IN Feature
Manager
FIM/CM
Figure 4-8 shows the key components that have been
CCF BCM
Basic Call Manager identified to describe a BCSM, to include: Points in Call
Basic Call
SRF < BCSM >
Resource data
Manager
< Basic Call Triggers >
< Basic Call Events >
(PICs), Detection Points (DPs), transitions, and events.
PICs identify CCF activities required to complete on or
Basic Call
Resource data Bearer Control CCAF
CCAF
more basic call/connection states of interest to IN service
logic instances. DPs indicate points in basic call and
Figure 4-7. SSF/CCF Model connection processing at which transfer of control can
occur. Transitions indicate the normal flow of basic
4.3.2.1.4.1 BCSM call/connection processing from one PIC to another.

The BCSM is a high-level finite state machine description Events cause transitions into and out of PICs.

of CCF activities required to establish and maintain Information Flows [Q1214] (e.g. between SSF/CCF and

communication paths for users. As such, it identifies a set SCF) corresponding to Events and PICs are represented

of basic call and connection activities in a CCF and by Operations [Q1218] and modelled as Application

shows how these activities are joined together to process Service Elements (ASEs), these application protocol

a basic call and connection (i.e., establish and maintain a related concepts are discussed in more detail in chapter

communication path for a user). [Q1214] 4.4.3.

Many aspects of the BCSM are not externally visible to The BCSM for CS-1 should model existing switch

IN service logic instances. However, aspects of BCSM processing of basic two-party calls, and should reflect the

will be the subject of standardization. As such, the BCSM functional separation between the originating and

is primarily an explanatory tool for providing a terminating portions of calls. In addition, though CCAF

Lappeenranta University of Technology and Telecom Finland 36


Tutorial on Intelligent Networks

functionality is not explicitly modelled in the BCSM, a originating half of the BCSM are described below
mapping is required between access signalling events and [Q1214]:
BCSM events, for each access arrangement supported by
1) O_Null&Authorize_Origination_Atempt
CS-1.

Entry Event: Disconnect and clearing of a previous call (DPs 9 -


Since the BSCM is generic, it may describe events that do
0_Disconnect and 10 - O_Abandon), or default handling of exeptions
not apply to certain access arrangements. It is important
by SSF/CCF completed.
to understand and describe how each access arrangement
applies to the BCSM.
Functions:

- Interface (line/trunk) is idled (no call exists, no call reference exists,

etc.) Supervision is being provided.


O_Abandon
1. O_Null & Authorize 6. Exception
10 Origination attempt - Given an indication from an originating party of a desire to place an

outgoing call (e.g., offhook, Q.931 Setup message, ISDN-UP IAM


Orig. Attempt_Authorized
1
message), the authority/ability of the party to place the call with given
2. Collect Info
properties (e.g., bearer capability, line restrictions) is verified. The types

Collected_Info
of authorization to be performed may vary for different types
2

3. Analyze Info of originating resources (e.g., for lines vs. trunks).

Exit Event:
3 Analyzed_Info
4
4. Routing & Alerting
Route_Select_Failure
- Indication of desire to place outgoing call (e.g., offhook, Q.931 Setup
5
O_Disconnect
message, ISDN-UP IAM message) and authority/ability to place
7
O_Called_Party_Busy

5. O_Active
outgoing call verified (DP 1 - Origination_Attempt_Authorized)
9
6
O_No_Answer
8 - Authority/ability to place outgoing call denied (Exception)
O_Mid_Call
Corresponding Q.931 Call State: 0. Null

Key: Transition

Detection Point (DP)


2) Collect_Information
Point in Call (PIC)

Entry Event: Indication of desire to place outgoing call (e.g., offhook,

Q.931 Setup message, ISDN-UP IAM message) and authority/ability to


Figure 4-8. Originating BCSM for CS1
place outgoing call verified (DP1-Origination_Attempt_ Authorized)

4.3.2.1.4.2 Originating BCSM for CS-1 Functions:

As an axample we describe here the originating half of


- Initial information package/dialling string (e.g., service codes,
the BCSM for CS1. It corresponds to that portion of the
prefixes, dialled address digits) being collected from originating party.
BCSM associated with the originating party (see Figure
Information being examined according to dialling plan to determine end
4-8). The description for each of the PICs in the
of collection. No further action may be required if an en bloc signalling

Lappeenranta University of Technology and Telecom Finland 37


Tutorial on Intelligent Networks

method is in use (e.g., an ISDN user using en bloc signalling, an - Routing address and call type being interpreted. The next route is

incoming SS No. 7 trunk). being selected. This may involve sequentially searching a route list,

translating a directory number into physical port address, etc. The


Exit Events:
individual destination resource out of a resource group (e.g., a multi-line

hunt group, a trunk group) is not selected. In some cases (e.g., an


- Availability of complete initial information package/dialling string
analogue line interface), a single resource (not a group) is selected.
from originating party. (This event may have already occurred in the

case of en bloc signalling, in which case the waiting duration in this PIC
- Authority of originating party to place this particular call being
is zero.) (DP 2- Collected_Info)
verified (e.g., checking business group restrictions, toll restrictions,

route restrictions). The types of authorization checks to be performed


- Originating party abandons call. (10 - O_Abandon)
may depend upon the type of originating resource (e.g., line vs. trunk).

- Information collection error has occurred (e.g., invalid dial string


- Call is being processed by the terminating half BCSM. Continued
format, digit collection time-out) (Exception)
processing of call setup (e.g., ringing, audible ring indication) is taking

3) Analyze_Information place. Waiting for indication from terminating half BCSM that the call

has been answered by terminating party.


Entry Event: Availability of complete initial information

package/dialling string from originating party. (DP 2 - Collected_Info) Exit Events:

Function: Information being analysed and/or translated according to - Indication from the terminating half BCSM that the call is accepted

dialling plan to determine routing address and call type (e.g., local and answered by terminating party (e.g., terminating party goes offhook.

exchange call, transit exchange call, international exchange call). Q.931 Connect message received. ISDN-UP Answer message received)

(DP 7 - O_Answer)
Exit Events:

- Unable to select a route (e.g., unable to determine a correct route, no


- Availability of routing address and nature of address. (DP 3 -
more routes on route list) or indication from the terminating half BCSM
Analyzed_Info)
that call cannot be presented to the terminating party (e.g., network

congestion) (DP 4 - Route_Select_Failure)


- Originating party abandons calls. (DP 10 - O_Abandon)

- Indication from the terminating half BSCM that the terminating party
- Unable to analyse and translate dial string in the dialling plan (e.g.,
is busy (DP 5 - O_Called_Party_Busy)
invalid dial string) (Exception)

- Indication from the terminating half BCSM that the terminating party
4) Routing and Alerting
does not answer within a specified time period (DP 6 - O_No_Answer)

(encompasses the following general BCSM PICs: Select_Route,


- Originating party abandons call (DP 10 - O_Abandon)
Authorize_Call_Setup, Call_Sent, and O_Alerting)

- Authority of calling party to place thiscall is denied (e.g., business


Entry Events:
group restriction mismatch, toll restricted calling line) (Exception)

- Availability of routing address and call type. (DP 3 - Analyzed_Info)


Corresponding Q.931 Call State: 4. Call Delivered

Functions:

Lappeenranta University of Technology and Telecom Finland 38


Tutorial on Intelligent Networks

5) O_Active - The SSF/CCF should make use of vendor-specific procedures to

ensure release of resources within the SSF/CCF so that line, trunk, and
Entry Event: Indication from the terminating half BCSM that the call is
other resources are made available for new calls.pt PIC).
accepted and answered by terminating party. (DP 7 - O_Answer)

Exit Event: Default handling of the exception condition by SSF/CCF


Function: Connection established between originating and terminating
completed (Transition to O_Null & Authorize_Origination_Attempt)
party. Message accounting/charging data may be being collected. Call

supervision is being provided.


4.3.2.1.5SCF
Exit Events: The SCF is a function that commands call control
functions in the processing of IN provided and/or custom
- A service/service feature request is received from the originating party
service requests. The SCF may interact with other
(e.g., TDMF, hook flash, ISDN feature activator, Q.931 HOLD or
functional entities to access additional logic or obtain
RETrieve message). (DP 8 - O_Mid_Call)
information (service or user data) required to process a

- A disconnect indication (e.g., onhook, Q.931 Disconnect message, SS7 call/service logic instance. It. Q1201

Release message) is received from the originating party. or received


a) interfaces and interacts with SSF/CCF,
from the terminating party via the terminating half BCSM. (DP -
SRF and SDF functional entities;
O_Disconnect)
b) contains the logic and processing
- A connection failure occurs (Exception) capability required to handle IN
provided service attempts;
6) O_Exception
c) interfaces and interacts with other SCFs,
if necessary;
Entry Event: An exception condition is encountered (as described above
d) is managed, updated and/or otherwise
for each PIC)
administered by an SMF;
Function: Default handling of the exception condition is being provided.

This includes general actions necessary to ensure no resources remain 4.3.2.1.6SDF

inappropriately allocated, such as The SDF contains customer and network data for real
time access by the SCF in the execution of an IN
- If any relationships exist between the SSF and SCF(s), send an Error
provided service. It Q1201
information flow to the SCF(s) closing the relationships and indicating

that any outstanding call handling instructions will not run to

completion (e.g., see Annex B).3

- If an SCF previously requested that call parameters be provided at the

end of the call (see the Call Information Request information flow in

section 6), these should be included in the Error information flow.

Lappeenranta University of Technology and Telecom Finland 39


Tutorial on Intelligent Networks

a) interfaces and interacts with SCF as 4.3.2.1.10 SMF


required; This function allows deployment and provision of IN
b) interfaces and interacts with other SDFs, provided services and allows the support of ongoing
if necessary; operation. Particularly, for a given service, it allows the
c) is managed, updated and/or otherwise coordination of different SCF and SDF instances Q1201.
administered by an SMF;
a) billing and statistic information are
4.3.2.1.7SRF received from the SCFs, and made

The SRF provides the specialized resources required for available to authorized service managers

the execution of IN provided services (e.g. digit receivers, through the SMAF;

announcements, conference bridges, etc.). It Q1201 b) modifications in service data are


distributed in SDFs, and it keeps track
of the reference service data values;

a) interfaces and interacts with SCF and


SSF (and with the CCF); The SMF manages, updates and/or administers service
b) is managed, updated and/or otherwise related information in SRF, SSF and CCF Q1201.
administered by an SMF;

4.3.2.1.11 SCF Model and its relations

c) may contain the logic and processing The model of the Service Conrol Function and its relation

capability to receive/send and convert to other functional entities is shown in Figure 4-9. The

information received from users; prime function of SCF is the execution of Service Logic

d) may contain functionality similar to the provided in the form ofService Logic Processing

CCF to manage bearer connections to programs (SLPs), and it includes also the SLP execution

the specialized resources; supporting functions, such as Service Logic


selection/interaction management, functional entity
4.3.2.1.8SCEF access management and SLP provisioning managemant.
This function allows services provided in Intelligent [Q1214]
Network to be defined, developed, tested an input to
The SCF platform provides a Service Logic Execution
SMF. Output of this function would include service logic,
Environment (SLEE) on which the SLPs run to provide
service management logic, service data template and
service processing. An SLP is a service application
service trigger information. Q1201
program invoked by the SLEE and is used to realize
service processing under the control of of thr SLEE. The
4.3.2.1.9SMAF Service Logic Execution Manager (SLEM) is the
This function provides an interface between service functionality of SLEE that handles and controls the
managers and the SMF. It allows service managers to service logic execution action. It contains the SLP
manage their services (through access to the SMF).
Q1201

Lappeenranta University of Technology and Telecom Finland 40


Tutorial on Intelligent Networks

Instances (SLPIs), Service Logic Selection/Interaction PE:s SCF SSF/CCF SDF SRF
Manager and Resource Manager. SCP C C
SN C C C C
SLPI is a service application program instance invoked
AD C C
by the SLEE and is used to realize service processing.
SSP O C O O
SLPI is a dynamic entity that actively controls the flow of
IP C
service execution and invokes other SCF functional
SDP C
routines. Functional routines are the functionality of SCF
to cause a sequence of Functional Entity Actions. This SSCP C C C O

sequence of Functional Entity Actions provides the NAP C (CCF

functionality defined for a Service Independent Building only)


C: Core
Block (SIB) on the Global Functional Plane. The SIB O: Optional
: Not allowed
concept will be discussed in more detail in chapter
4.3.3.1. Table -4. Typical scenarios of FE to PE mapping.

SCF
4.3.3 Global Functional Plane
SLP Library

The Global Functional Plane (GFP) is of primary interest


Service Logic Execution Environment (SLEE) to service designers. Wyatt91 The Global Functional
SLP Manager

Service Logic Execution Manager


Functional
Routine Mgr
Functional
Routine Lib.
Plane plane models network functionality from a global,
Serv. Logic
Selection/
SLP Instances or network-wide, point of view. As such, the IN
Interaction SCF Data Access Manager
+ SD Obj.Lib + Ntw Res.Data
Manager Resource Manager structured network is said to be viewed as a single entity

Functional Entity Access Manager in the GFP. In this plane, services and Service Features
are redefined in terms of the broad network functions
required to support them. These functions are neither
SMF SSF SRF SDF service nor Service Feature specific and are referred to as
SIB’s (Service-Independent building Block). Q1201
Figure 4-9. SCF Model
Services identified in the service plane are decomposed

4.3.2.2 Mapping FEs to PEs into their service features then mapped onto one or more
SIBs in the GFP. Each SIB is similarly mapped onto one
The mapping of Distributed Functional Plane FEs to
or more FEs in the Distributed Functional Plane Q1201
Physical Plane Architecture PEs is described here. Also a
(Figure 4-10).
typical scenario of such mapping is shown here. (Table -
4) Q1201

Lappeenranta University of Technology and Telecom Finland 41


Tutorial on Intelligent Networks

SIBs are defined completely independent from


any physical architecture considerations

Each SIB has a unified and stable interface,


with one or more inputs an one or more outputs

SIBs are reusable, monolithic, building blocks,


describing a single complete activity, and used
by the service designer to create services

A SIB can exist independently, or it can coexist with


other SIBs in the same network element. IN-based
services can be distinguished from one another by the
sequence of SIB functions and by the specific parameters
within each SIB. IN CS1 describes 13 SIBs plus a
specialized SIB called Basic Call Process (Table -5).

Algorithm Screen
Charge Service Data Management
Compare Status Notification
Distribution Translate
Limit User Interaction
Log Call Information Verify
Queue
Figure 4-10. Service decomposition.
Table -5 The CS1 SIBs.

4.3.3.1 SIB Basic Call Process (BCP) identifies the normal call
process from which IN services are launched, including
IN CS1 contains 14 SIB’s that include algorithm, charge,
Points Of Initiation (POI) and Points Of Return (POR)
compare, translate, basic call process, among others. In
which provide the interface from the BCP to Global
principle many other services described in CCITT
Service Logic (GSL). The GSL describes how SIBs are
Recommendations Q.1211 could be specified. Raat93
chained together to describe Service Features. The GSL
SIBs are standard reusable networkwide capabilities
also describes interaction between the BCP and the SIB
residing in the Global Functional Plane, used to create
chains. Q1201 (Figure 4-11) By definition, SIBs,
services. As such they are global in nature and their
including the BCP, are service independent and cannot
locations need not to be considered as the entire network
contain knowledge of subsequent SIBs. Therefore, GSL
is regarded as a single entity. A Service Feature is
is the only element in the GFP which is specifically
provided by a combination of one or more SIBs. SIBs
service dependent.
have the following characteristics:

Lappeenranta University of Technology and Telecom Finland 42


Tutorial on Intelligent Networks

to specify subscriber specific details like calling or called


line information. This data can be: made available from
the Basic Call Process SIB (e.g. Calling Line
Identification), generated by a SIB (e.g. translated
number), or entered by the subscriber (e.g. dialled number
or a PIN code). Q1201

Figure 4-11. Modelling of Global Functional Plane. Associated with each CID value is a logical name which

In order to chain SIBs together, knowledge of the is referred to as the CID Field Pointer (CIDFP). If a SIB

connection pattern, decision options, and data required by requires CID to perform its function, there will be an

SIBs must be available. Therefore, the pattern of how SIB associated CIDFP assigned through SSD. For instance,

are chained together must be maintained within the GFP, the Translate SIB’s CID which defines what is to be

and described in the GSL. The GSL described translated is called Information. Q1201

subsequential SIB chaining, potential branching, and


Since the CID value can vary with each call instance,
where branches rejoin.When an IN supported service is to
Service Features can be written with data flexibility. In
be invoked, its GSL is laucnhed at the POI by a triggering
the above Translate SIB example, one Service Feature
mechanism from the BCP. At the end of chain of SIBs,
may require translation of a calling number, while another
the GSL also describes returning point to the BCP by
Service Feature will require translation of the called
indicating the specific POR. For a given service or
number. In both cases, the data required by the SIB is
Service Feature at least one POI is required. However,
specified by the information Calling Line Identity (CLI),
depending upon the logic required to support the service
but the CIDFP-info changes. Q1201
or Service Feature, multiple PORs may be defined.
Q1201
4.3.3.1.2Service Support Data
In order to describe Service Features with these generic
Service Support Data defines data parameters required by
SIBs, some elements of service dependency is needed.
a SIB which are specific to the Service Feature
Service dependency can be described using data
description. When a SIB is included in the GSL of a
parameters which enable a SIB to be tailored to perform
service description, the GSL will specify the SSD values
the desired functionality. Data parameters are specified
for the SIB. SSD consists of the following parts: Q1201
independently for each SIB and are made available to the
SIB through GSL. Two types of data parameters are
required for each SIB, dynamic parameters called Call
Instance Data (CID) and static parameters called Service
Support Data (SSD). Q1201

4.3.3.1.1Call Instance Data

Call Instance Data defines dynamic parameters whose


value will change with each call instance. They are used

Lappeenranta University of Technology and Telecom Finland 43


Tutorial on Intelligent Networks

Fixed Parameters These are data parameters one or more logical end points and CID which defines
whose values are fixed for all data parameters specific to that call instance which results
call instances. For instance, the from the execution of that SIB and are required by other
“File Indicator” SSD for the SIBs or the BCP to complete the call service instance.
Translate SIB need to be
specified uniquely for each
occurrence of that SIB in a
given Service Feature. The
“File Indicator” SSD value is
then said to be fixed, as its
value is determined by the
service/Service Feature
description, not by the call
Figure 4-12. Graphic representation of a SIB. Q1201
instance.
Field Pointers Field Pointers identify which
4.3.3.1.3.1 Queue SIB
CID is required by the SIB, and
As an example of SIB representation the Queue SIB is
in doing so provide a logical
described (Figure 4-12). Q1201 The Queue SIB example
location for that data. They are
has been described, because it is a multipurpose SIB
signified by “CIDFP-xxxx”
which can be used in several Service Features at the
where “xxxx” names the data
Service Plane. The task of the Queue SIB is to provide
required. For instance,
sequencing of IN calls to be completed to a called party.
“CIDFP-info” for the Translate
The Queue SIB provides all the processing needed to
SIB will specify which CID
provide queueing for a call, and will specifically: pass the
element is to be translated. If
call if resources are available, queue the call, play
more than one CID is required
announcements to a caller on queue, and when resources
by a SIB to perform its
become available, dequeue the call.
function, then the SSD data
parameters will contain
multiple Field Pointers.

4.3.3.1.3The SIB structure

A SIB contructs of both input and output parts (Figure 4-


11). The input part consists of three distinct elements: one
logical starting point, Service Support Data which defines
parameters which are specified by the service description,
and Call Instance Data which are specific to that call
instance. The output part consist of two distinct elements:

Lappeenranta University of Technology and Telecom Finland 44


Tutorial on Intelligent Networks

Figure 4-13. The Queue SIB graphic representation. SSD - Max Active
Specifies the maximum number of active
The input parameters for the Queue SIB has been
calls allowed for the resource.
described in the Table -6. The Queue SIB can be used
- Max Number
everywhere the queueing of calls is needed. The Logical
Specifies the maximum number of calls
Start indicates the execution for the SIB.
allowed on queue at a given time.
The output parameters are also specified in the Q1201. - Max Time
The Logical End indicates the result of the execution. The - Specifies the maximum time the call may
parameters for Queue SIB are: Resource available, Call remain on the queue.
party abandon, Queue timer expiry, Queue full, and an - Announcement Parameters
error. Q1201 The Call Instance Data has the following Specify the control values for
parameters and the meanings of output data: Time Spent announcements. The control values which
in Queue (identifies the total time that a particular call can be specified are: Announcement ID
was queued), Error Cause (identifies the specific (specifies which announcement is to be
condition which caused an error during the operation of sent), Repetition Requested (specifies if the
the SIB). In Error Cause the following errors have been announcement is to be repeated), Repetition
identified: Invalid Max Active, Invalid Max Number, Interval (specifies the delay period in
Invalid Max Time, Invalid Announcement Parameters, seconds between repetitions) and Maxium
and Invalid Call Reference. Repetitions (specifies the maximum number
of times the announcement will be
repeated).
- CIDFP-Resource
This CID Field Pointer specifies which Call
Instance Data identifies the resource.
- CIDFP-Error
This CID Field Pointer specifies where in
output Call Instance Data the error cause
will be written.
CID - Call Reference
Identifies the specific call which is a
candidate for queueing.
- Resource
Specifies the data associated with the
CIDFP-Resource which identifies the
resource for which the call will be queued.

Table -6 Queue SIB input resources.

Lappeenranta University of Technology and Telecom Finland 45


Tutorial on Intelligent Networks

4.3.3.2 Basic Call Process Functional Entities

The Basic Call Process is responsible for providing basic SIB SSF/SCF SCF SRF SDF

call connectivity between parties in the network. The Algorithm


BCP can be viewed as a specialized SIB which then Charge
provides basic call capabilities including connecting call Compare
with appropriate disposition; disconnecting calls, with Distribution
appropriate disposition; and retaining CID for further Limit
processing of that call instance. Q1201 Log Call
Information
The need for specific POI/POR functionality is that the
Queue
same chain of SIBs may represent a different service if
Screen
launched from a different point in the BCP. Similarly, the
Service Data
same chain of SIBs launched from the same point may
Management
represent a different service if returned to the BCP at a
different point. Q1201 Status
notification
Translate
4.3.3.3 Global Service Logic
User
The Global Service Logic can be defined as the “glue”
Interaction
that defines the order in which SIBs will be chained
Verify
together to accomplish services. Each instance of global
Basic Call
service logic is (potentially) unique to each individual
Process
call, but uses common elements, comprising specifically:
BCP interaction point (POI and POR); SIBs; logical Table -7. Relating the GFP to the DFP.

connections between SIBs, and between SIBs and BCP


interaction points; input and output data parameters, 4.3.4 Service Plane

service support data and call instance data defined for The Service Plane (SP) is of primary interest to service
each SIB. Q1201 The GSL will then chain together these users and providers. It describes services and Service
elements (SIBs) to provide a specific service. Features from a user perspective, independent of how the
service is implemented or provisioned in the network.
Garra93
4.3.3.4 Relating the GFP to the DFP

This section describes the mapping of the elements of the The Service Plane illustrates that IN supported services
Global Functional Plane to the Distributed Functional can be described to the end user or subscriber by means
Plane. Functions in the GFP are distributed to Functional of a set of generic blocks called Service Features. A
Entities in the DFP. These FEs are related by information service is a stand-alone commercial offering,
flows, which are use to send information between FEs. characterized by one or more core Service Features, and
Table -7 shows the CS1 SIBs and indicates the FEs can be optionally enhanced by other Service Features.
involved for each SIB. Q1201 Q1201

Lappeenranta University of Technology and Telecom Finland 46


Tutorial on Intelligent Networks

* Automatic Call Back Closed User Group


The Service Plane represents an exclusively service- (ACB) (CUG)
oriented view. This view contains no information * Call Hold with Customer Profile
whatsoever regarding the implementation of the services Announcement (CHA) Management (CPM)

in the network (for instance, an IN type of * Call Transfer (TRA) Customized Recorded
Announcement (CRA)
implementation is invisible). All that is perceived is the
* Call Waiting (CW) Customized Ringing
network’s service-related behaviour as seen, for example, (CRG)
by a service user. Q1201 In other words, the Service * Consultation Calling Follow-Me Diversion
(COC) (FMD)
Plane provides users and service providers a
* Meet-Me Conference Mass Calling (MAS)
implementation-independent architecture.
(MMC)
* Multi-Way Calling Originating Call
(MWC) Screening (OCS)
4.3.4.1 Service Features
ABbreviated Dialing Off-Net Access (OFA)
The services are constructed of Services Features. A (ABD)
Service Feature is a specific aspect of a service that can Attendant (ATT) Off-Net Calling (ONC)
also be used in conjuntion with other services/Service Authentication (AUTC) One Number (ONE)
Features as a part of commercial offering. It is either a Authorization Code Origin Dependent
(AUTZ) Routing (ODR)
core part of a service or an optional part offered as an
Call Distribution (CD) Originating User
enhancement to a service Q1201 (Table -8). Prompter (OUP)
Call Hold with Personal Numbering
Announcement (CHA) (PN)
Call Forwarding (CF) Premium Charging
(PRMC)
Call Forwarding in Private Numbering Plan
BY/DA (CFC) (PNP)
Call Gapping (GAP) Reverse Charging
(REVC)
Call Limiter (LIM) Split Charging (SPLC)
Call Logging (LOG) Terminating Call
Screening (TCS)
Call Queueing (QUE) Time Dependent Routing
(TDR)

Note: The service indicated with a * may only be partially


supported in CS1, because they require capabilities
beyond those of type A services.

Table -8. Set of Benchmark IN CS1 Service Features.

So, the services are comprised of one or more Service


Features. A Service Feature is the smallest part of a

Lappeenranta University of Technology and Telecom Finland 47


Tutorial on Intelligent Networks

service that can be perceived by the service user. These Attendant (ATT)

SFs can also be used as building blocks in the


This service feature allows VPN users to access an attendant
specification and design of new, more complex services.
position within the VPN for providing VPN service information
SFs are are comprised of one or more SIBs which are
(e.g., VPN numbers). The attendant(s) can be accessed by dialling a
described in the Global Functional Plane. All individual
special access code.
telecommunication services identified in the Service
Plane should be described as seen from the user’s
Authentication (AUTC)
viewpoint without reference how the services are
implemented in the network (for example, how the This service feature allows for the verification that a user is

Physical Plane looks like) Q1201. The Service Features allowed to exercise certain options in a telephone network. In other

are described in detail in the next chapter. words, the request made by the user is authentic and should be

granted.

4.3.4.2 Description of CS1 Service Features


Authorization Code (AUTZ)
The CS1 Service Features are described in [Q1211] as
follows: This service feature allows a VPN user to override calling

restrictions of the VPN station from which the call is made.


Abbreviated Dialling (ABD) Different sets of calling privileges can be assigned to different

authorization codes and a given authorization code can be shared


Description No.1
by multiple users.

This feature allows the definition of abbreviated dialling


Automatic Call Back (ACB)
numbers with a VPN. For the users of the VPN, the abbreviated

dialling numbers are not subjected to call restrictions, e.g., a VPN This service feature allows the called party to automatically
user may not be allowed to access the Off-net Calling service call back the calling party of the last call directed to the called
feature but can reach an off-net number via this feature. party.

Description No. 2 Call Distribution (CD)

This feature allows the definition of abbreviated dialling digit This service feature allows the served user to specify the
sequences to represent the actual dialling digit sequence, i.e., a two percentage of calls to be distributed among two or more
digit sequence may represent a complete dialling sequence for a destinations. Other criteria may also apply to the distribution of
private or public numbering plan. calls to each destination.

Description No. 3 Call Forwarding (CF)

This service feature is an originating line feature that allows This service feature allows the user to have his incoming
business subscribers to dial others in their company using a short calls addressed to another number, no matter what the called party
numbering, even if the calling user's line and the called user's line line status may be.
are served by different switches.
Call Forwarding on Busy/Don't answer (CFC)

Lappeenranta University of Technology and Telecom Finland 48


Tutorial on Intelligent Networks

This service feature allows the called user to forward Call Logging (LOG)

particular calls if the called user is busy or does not answer within a
This service feature allows for a record to be prepared each
specified number of rings.
time that a call is received to a specified telephone number.

Call Gapping (GAP)


Call Queueing (QUE)

Description No. 1
Description No. 1

This service feature allows the service provider to


This service feature allows a served user to have calls
automatically restrict the number of calls to be routed to the
meeting busy at the scheduled destination to be placed in a queue
subscriber.
and connected as soon as free condition is detected. Upon entering

Description No. 2 the queue, the caller hears an initial announcement informing the

caller that the call will be answered when a line is available.


This service feature allows to restrict the number of calls to a

served user to prevent congestion of the network. Description No. 2

Call Hold with Announcement (CHA) This service feature enables the subscriber, when a call

encounters a terminating trigger such as a busy condition or a


The Call Hold with Announcement service feature allows a
specified number of rings to queue that call, a specific
subscriber to place a call on hold with options to play music or
announcement being sent to the calling party.
customized announcements to the held party.

Call Transfer (TRA)


Call Limiter (LIM)

The Call Transfer service feature allows a subscriber to place


Description No. 1
a call a hold and transfer the call to another location.

This service feature allows a served user to specify the


Call Waiting (CW)
maximum number of simultaneous calls to a served user's

destination. If the destination is busy, the call may be routed to an This service feature allows the called party to receive a

alternative destination. notification that another party is trying to reach his number while he

is busy talking to another calling party.


Description No. 2

Closed User Group (CUG)


This service feature enables to count the sunning calls to the

subscriber and to reject all the new calls when a threshold of This service feature allows the user to be a member of a set

simultaneous calls is reached. As an option, this threshold may be of VPN users who are normally authorized to make and/or receive

real-time managed by the subscriber. calls only within the group. A user can belong to more than one

CUG. In this way a CUG can be defined so that certain users are
Associated with Call Volume Distribution or Call
allowed wither to make calls outside the CUG, or to receive calls
Distribution, it allows the rerouting of the new calls.
from outside the CUG, or both.

Consultation Calling (COC)

Lappeenranta University of Technology and Telecom Finland 49


Tutorial on Intelligent Networks

The Consultation Calling service feature allows a subscriber the user will be presented to this terminal access. A registration for

to place a call on hold, in order to initiate a new call for incoming calls will cancel any previous registration. Several users

consultation. may register for incoming calls to the same terminal access

simultaneously. The user may also explicitly de register for


Customer Profile Management (CPM)
incoming calls.

This service feature allows the subscriber to real-time


Mass Calling (MAS)
manage his service profile, i.e., terminating destinations,

announcements to be played, call distribution, an so on. This service feature allows processing of huge numbers of

incoming calls. generated by broadcasted advertisings or games.


Customized Recorded Announcement (CRA)

Meet-Me Conference (MMC)


This service feature allows a call to be completed to a

(customized) terminating announcement instead of a subscriber This service feature allows the user to reserve a conference

line. The served user may define different announcements for resource for making a multi-party call. indicating the date, time, and

unsuccessful call completions due to different reasons (e.g., caller conference duration. At the specified date and time, each participant

outside business hours, all lines are busy). in the conference has to dial a designated number which has been

assigned to the reserved conference resource, in order to have


Customized ringing (CRG)
access to that resource, and therefore, the conference.

This service feature allows the subscriber to allocate a


Multiway Calling (MWC)
distinctive ringing to a list of calling parties.

This service feature allows the user to establish multiple,


Destinating User Prompter (DUP)
simultaneous telephone calls with other parties.

This service feature enables to prompt the called party with a


Off-Net Access (OFA)
specific announcement. Such an announcement may ask the called

party to enter an extra numbering, e.g., through Dual-Tone Multi- This service feature allows a VPN user to access his or her

Frequency (DTMF), or a voice instruction that can be used by the VPN from any non-VPN station in the PSTN by using a Personal

service logic to continue to process the call. Identification Number (PIN). Different sets of calling privileges can

be assigned to different PINs, and a given PIN can be shared by


Follow-Me Diversion (FMD)
multiple users.

Description No. 1
Off-Net Calling (ONC)

This service feature allows a VPN user to change the routing


This service feature allows the user to call outside the VPN
number of his/her VPN code via a DTMF phone. The updated
network. Calls from one VPN to another are also considered off-
number can be another VPN code or a PSTN number.
net.

Description No. 2
One Number (ONE)

With this service feature, a user may register for incoming

calls to any terminal access. When registered, all incoming calls to

Lappeenranta University of Technology and Telecom Finland 50


Tutorial on Intelligent Networks

This feature allows a subscriber with two or more This service feature supports a UPT number that uniquely

terminating lines in any number of locations to have a single identifies each UPT user and is used by the caller to reach that UPT

telephone number. This allows businesses to advertise just one user. A UPT user may have more than one UPT number for

telephone number throughout their market area and to maintain different applications (e.g., a business UPT number for business

their operations in different locations to maximize efficiency. The calls and a private UPT number for private calls), however, a UPT

subscriber can specify which calls are to be terminated on which user will have only one UPT number per charging account.

terminating lines based on the area the calls originate.


Premium Charging (PRMC)

Origin Dependent Routing (ODR)


This service feature allows for the pay back of the part of the

This service feature enables the subscriber to accept or reject cost of a call to the called party, when he is considered as a value

a call, and in case of acceptance, to route this call, according to the added service provider.

calling party geographical location. This service feature allows the


Private Numbering Plan (PNP)
served user to specify the destination installation(s) according to the

geographical area from which the call was originated.


This service feature allows the subscriber to maintain a

numbering plan within his private network, which is separate from


Originating Call screening (OCS)
the public numbering plan.

This service feature allows the served user to bar calls from
Reverse Charging (REVC)
certain areas based on the District Code of the area from which the

call is originated.
This service feature allows the service subscriber <(e.g.,

freephone) to accept to receive calls at its expense and be charged


Originating User Prompter (OUP)
for the entire cost of the call.

Description No. 1
Split Charging (SPLC)

This service feature allows a served user to provide an


This service feature allows for the separation of charges for a
announcement which will request the caller to enter a digit or series
specific call, the calling and called party each being charged for one
of digits via a Dual-Tone Multi-Frequency (DTMF) phone or
part of the call.
generator. The collected digits will provide additional information

that can be used for direct routing or as a security check during call
Description No. 1
processing.

This service feature enables the subscriber to accept or reject


Description No. 2
a call, and in case of acceptance, to route this call, according to the

time,
This service feature enables to prompt the calling party with

a specific announcement. Such an announcement may ask the


Description No. 2
calling party to enter an extra numbering (e.g., through DTMF) or a

voice instruction that can be used by the service logic to continue to This service feature allows the-served user to apply different

process the call. call treatments based on time of day, day of week, day of

year, holiday, etc.


Personal Numbering (PN)

Lappeenranta University of Technology and Telecom Finland 51


Tutorial on Intelligent Networks

4.3.4.3 IN service modelling Note: The service indicated with a * may only be partially

The idea of IN architecture, especially the Service Plane supported in CS1, because they require capabilities

architecture, is to allow customers to make services for beyond those of type A services.

his own communications needs with Service Features or


may combine a number of services together. Perhaps the Table 4-9. IN CS1 Services

user want to make services with additional capabilities, Let us consider the following basic servces in detail:
use the combination as a means to providing Credit Card Calling (CCC), Virtual Private Network
communications to other parties. (VPN) and Universal Personal Telecommunications
(UPT). These services are mapped to service features
In recommendation Q.1211 a the following services have
according to Table 4-10 [Q1211].
been described for the use of IN Capability Set 1
Intelligent Network (Table 4-9):

Abbreviated Dialling ABD


CCC VPN UPT
Account Card Calling ACC
ABD o o
Automatic Alternative Billing AAB ATTC o
Call Distribution CD AUTZ C o C
AUT o
Call Forwarding CF CD o
Call Rerouting Distribution CRD LOG o o o
QUE o
* Completion of Call to Busy Subscriber CCBS TRA o
* Conference Calling CON CUG o
COC o
Credit Card Calling CCC CPM o o
Destination Call Routing DCR CRA o o
CRG o
Follow-Me Diversion FMD DUP o
Freephone FPH FMD o C
OFA o
Malicious Call Identification MCI ONC o
Mass Calling MAS OUP C o o
PN C
Originating Call Screening OCS PNP C
Premium Rate PRM SPLC C
TDR o o
Security Screening SEC
Selective Call Forward on Busy/Don't Answer SCF
C= Core Service Feature
Split Charging SPL
o = Optional Service Feature
Televoting VOT
Terminating Call Screening TCS Table 4-10. Service Mappings
Universal Access Number UAN
Universal Personal Telecommunications UPT
User-Defined Routing UDR
Virtual Private Network VPN

Lappeenranta University of Technology and Telecom Finland 52


Tutorial on Intelligent Networks

4.3.4.4 Credit Card Calling 1) This service permits to build a private network by

The recommendation Q.1211 describes CCC as follows using the public network resources. The subscriber’s

Q1201: lines, connected on different network switches,


constitute a virtual PABX, including a number of
PABX capabilities, such as Private Numbering Plan,
call transfer, call hold, and so on.
1) The CCC service allows subscribers to place calls
from any normal access interface to any destination As an option, to each private user, either a class of
number and have the cost of those calls charged to service or specific rights and privileges may be
the account specified by the CCC number. attributed. As another option, a private user may
access his private network from any point in the
2) The service allows the caller to be automatically
network keeping, after authentication, his class of
charged on a bank card account, for any type of
service or his specific rights and privileges.
outgoing call. The caller has to dial his card number
and a PIN (Personal Identification Number), then 2) This service permits the use of public network
the called number. As an option forward calls may resources to provide private network capabilities
be allowed, without dialling again card number and without necessarily using dedicated network
PIN resources. The subscriber’s lines, connected to
different network switches, constitues a virtual
private network that may include private network
capabilities, such as dialling restrictions, Private
4.3.4.5 Virtual Private Network Numbering Plan (PNP), holl, call transfer, and so

The private networks allow users to access remote on.

applications that are run by other users or, more


A PNP may provide a group of users the capability
frequently, by the network operator itself. The VPN
to place call by using digit sequences having
service is based on the public telecommunications
different structures and meaning than provided by
networks that it uses to contruct the service. CCITT
the public numbering plan, or PNP may utilize the
describes VPN service as follows:
public numbering plan’s digit sequences, structures
and meaning.

3) VPN allows a subscriber to define and use a


PNNP for communication across one or more
networks between nominated user access interfaces.
A PNP provides a group of users the capability to
place calls by using digit sequences having different
structures and meanings than provided by the public
numbering plan.

Lappeenranta University of Technology and Telecom Finland 53


Tutorial on Intelligent Networks

4.3.4.6 Universal Personal Telecommunications without affectting traditional network operations or

In fixed telecommunications networks, subscribers are capabilities. Wyatt91

associated with the Network Access Point of the terminal,


The Intelligent Network consists of integrated hardware
the point of attachement (network access or line
and software distributed throughout the service providers
identification). In mobile telecommunication networks,
network. Thanks to the new technologies, service
subscribers can move with their terminal and they are
providers will be able to create their own services.
associated with the terminal in use (terminal
Nerys91 Compared to the convenient
identification). Vande92 The subscriber is then charged
telecommunications network architecture, IN forms an
with the use of a personal identification number. CCITT
excellent and fast way of introducing services.
describes UPT service as follows:

IN promises to change the way vendors, telephone


1) UPT is a mobility service which enables
companies, and customers run their businesses and work
subscribers to make use of telecommunications
with one another. Nerys91 Today, vendors develop a
services on the basis of a unique Personal
product that delivers a certain service, then sell it to
Telecommunications Number (PTN) across multiple
telecommunications operators. With IN, vendors will
networks at any network access. The PTN will be
develop software “building blocks” Nerys91, then deliver
translated to an appropriate destination number for
these to telephone companies who assemble them to
routing based on the capabilities subscribed to by
create new services.
each Service Subscriber (SS).

2) This service provides personal mobility by 4.4.1 SCE


enabling a user to initiate any type of service and The Service Creation Environment capability of IN
receive any type of call on the basis of a unique and enables effective service creation. Service Creation
personal network-independent number, across Environments enable network and service providers to
multiple networks, at any user-network access create new revenue-generating services that are
(fixed, movable or mobile), irrespective of independent of equipment vendor’s deployment
geographic location, limited only by terminal and schedules. Many administrations are asking vendors of IN
network capabilities. equipment to provide them with Service Creation
Environment capabilities. This is also true of large service
subscribers, who prefer to control the operation of their
IN-based services. In the current Service Creation
4.4 The IN-structured network Environment, service subscribers can control services
using existing capabilities or modifying parameters
The IN concept is an extension of, rather than a
within these capabilities. Current Service Creation
replacement for, traditional service control. Since an IN
Environments are user friendly and support updates of
primarily affects only the internal service processing of
service control points and service circuit nodes. The next
switching systems, it should have little influence on the
generation of Service Creation Environment will also
signalling procedures of a traditional network. Therefore,
support updates of intelligent peripherals and Adjuncts.
we can place intelligent nodes in existing networks

Lappeenranta University of Technology and Telecom Finland 54


Tutorial on Intelligent Networks

Because SIBs are being defined for the IN, it is now service circuit node, or the service switching point
possible to develop a Service Creation Environment Wyatt91 In the middle, the signalling network performs
platform to support new services and direct them to the signalling transfer function.
appropriate Physical Entities. In addition, new SCEs must
provide extensive validations for new IN-based services
so they do not have an adverse effect on the overall
operation of the network or the subscribers services.
Wyatt91

The service designers are staff members of the provider’s


company. They have to create new services by definite
and unambiguous descriptions. Such descriptions are
called Service Logic Programs (SLP). After deployment
of a new service in the network, one can buy or subscribe
to such a service. Abram92

The services are determined by single Service Features.


Following the ETSI framework this should be reflected in
the service representation: each SLP should be composed
from SIBs. Abram92 The interface for composition of
new services may differ. The interface might be an
advanced specification language for the construction of
SIBs and their interfaces/(inputs and outputs). However,
it is possible to build a Graphical User Interface (GUI) on
Figure 4-14. Physical mapping of IN functions.Wyatt91
the top of the specification language and by so ease and
speed up the introduction of new IN services. With the above capabilities a description of how IN really
functions is made. An example of the Green Number
Service (GNS or freephone) is shown here.
4.4.2 The function of IN

The SSP and SCP communicate via CCITT No.7 A service user dials the number, such as 800-beginning.
signalling links using the services of the TCAP, SCCP While translating the number the local exchange detects a
and MTP. M3010 However, at the top of this protocol trigger in the SSP database telling it that this 800 number
stack is the IN Application Protocol (INAP). (in this example 800-NXX-7800) is a pseudo-number
which must be translated Ambro89 by an SCP. The 800-
Figure 4-14 shows how network functions can be grouped
based numbers are usually known as IN numbers. The
in a physical entity. For example, we can package the
local exchange (SSP) sends a TCAP message (containing
Service Resource Function in a Service Switching Point,
the number dialled and other information) over the SS7
Service Circuit Node, or Intelligent Peripheral, based on
network to an SCP. The SCP uses the 800 number to
traffic or customer demands. Similarly the Service
access a database containing the 800 number’s
Control Function can reside in the service control point,

Lappeenranta University of Technology and Telecom Finland 55


Tutorial on Intelligent Networks

corresponding directory number (Figure 4-15). (This been charged and provided with a charging report from
number does not have to be static, but it could depend on the SMS.
factors like day, time of day, origination, and so on).
After accessing the database, the SCP sends the directory
4.4.3 IN Application Protocol
number (in this example 305-NXX-8800) to the local
The IN Application Protocol (INAP) is intended to be
exchange in another TCAP message. The local exchange
used between the following four functions: SSF, SCF,
uses the directory number to execute translation and
SDF and SRF. The INAP in CS1 is ment to be using the
routing to the subscriber called. .
SS7 protocol stack, but it does not imply that only this
signalling protocol should be used. Q1201

Figure 4-15. IN-based Green Number Service. Figure 4-16. INAP Protocol Architecture.

This principles of trigger detection and database dialog The INAP protocol architecture is based on the OSI
are the basis of all proposed IN services. Ambro89 The Application Layer Structure (Figure 4-16). A physical
above example showed also the flexibility of Intelligent entity has either single interactions or multiple co-
Network architecture. If new 800 numbers are added, ordinated (not discussed here) interactions with other
updating need only be done in the SCP database. Also the physical entities. The Single Asociation Control Function
possibility of mobility shows that IN-like architecture is provides a co-ordination function using Application
quite developed and can handle also the future needs. Service Elements (ASEs), which includes the ordering of
operations supported by ASE’s (based on the order of
The task of a Service Management Station is to manage received primitives) [Q1218]. The SAO represent the
the IN-services. In the above example the SMS could SACF plus a set of ASE’s to be used over a single
have keeped track of the charging of the service usage. interaction between a pair of Physical Entities. If there
The service user would not have been charged because of were need for multiple interactions, the use of MACF
the freephone capability. Instead, the service would have (Multiple Association Control Function) would be
acceptable. In this case, MACF would provide a co-

Lappeenranta University of Technology and Telecom Finland 56


Tutorial on Intelligent Networks

ordinating function among several SAO’s, each of which Description of each operation is tied with the action of
interacts with an SAO in a remote PE. Q1201 corresponding FE modelling. Each operation is specified
using the operation macro described in Figure 4-17. The
use of Application Context (AC) negotiation mechanism
allows the two communicating entities to identify exactly
what their capabilities are and also what the capabilities
required on the interface should be. This should be used
to allow evolution through Capability Sets. If the
indication of a specific application context is not
supported by a pair of communicating FE’s, some
mechanism to pre-arrange the context must be supported.
Q1201

In the CCITT New Recommendation Q.1218 the INAP


and TCAP messages are specified using the Abstract
Syntax Notation One (ASN.1). The encoding rules which
are applicable to the defined abstract syntax are the Basic
Encoding Rules (BER).

Also an another IN Application layer protocol is available


Figure 4-17. Operation description. there. This application layer protocol handles and
Each ASE supports one or more operations. Information manages the mobility of users and is called the Mobile
flows of [Q1214] are in principle mapped one to one with Application Part (MAP). The MAP is not discussed
operations. For example, the operations corresponding to further in this paper.
the information flows of the Originating BCSM for CS1
(Figure 4-8) are the following: 4.5 Personal Communications Services

- Origination Attempt Authorized PCS (Personal Communications Services) is an important


- Collect Information area of Intelligent Networks. The Service Control Points
- Collected Information maintains the Home Location Register (HLR), which is
- Analyze Information the home database for mobile services user, while the
- Analyzed Information local exchange, serving as a Service Switching Point,
- Route Select Failure maintains the Mobile Switching Center and visitor
- OCalled party Busy Location Register. Using wireless or wire-line terminals,
- O_No Answer subscribers have access to the IN and Personal
- ODisconnect Communications Services.
- OAnswer
- O_Mid Call Mobile services has been defined, for example, by ETSI’s
GSM group. The GSM architecture consists of a Home

Lappeenranta University of Technology and Telecom Finland 57


Tutorial on Intelligent Networks

Location Register, the Equipment Identification Register


(EIR), and the Authentication Center (AUC), all of which
can be maintained at a central node in the network. The
central node’s master file contains the wireless
customer’s records. Local records for wireless customers
are maintained at the Visitor Location Register (VLR).
The VLR information can be located in the Mobile
Switching Center (MSC) or in the adjunct. Mobility
services have strong synergies with evolving IN
architecture. An IN control structure offers a robust
platform to support PCS applications. Many of the
conceptual model requirements for the IN apply to PCS.
Integrating PCS services on an IN platform potentiallly
reduces an administration’s operations, maintenance, and
training costs. In addition, we can provide many new
services for PCS using IN service features. Wyatt91

From an IN architectural perspective, we can view


wireless access as a technology (such as ISDN or
Broadband ISDN) that service subscribers can use to Figure 4-18. PCS applications supported by an IN.
access the network. This network can be fully integrated Wyatt91
with the local exchanges or provided as an overlay
architecture. The IN can flexibly separate call and 4.6 Integration of TMN and IN
connection control from the underlying access
infrastructure. As such, an IN platform also can support IN is a generic, service-oriented architecture, intended to

PCS applications. From a network entity viewpoint, the be used for all kinds of services (real-time or

network access function is conceptually similar to a base management) on top of call-control type services. TMN is

sation system in the mobile communications world. The a generic, management-oriented architecture, intended to

service switching functionality could be implemented in a be used for all kinds of management services. Obviously,

Mobile Switching Center, allowing that center to interact the IN and TMN architectures overlap. For instance, one

with service control residing in other network elements TMN application such as billing and one IN application

(e.g. HLR that resides in the SCP and VLR that resides in such as Freephone must be tightly related because

adjuncts) Wyatt91 (Figure 4-18). Freephone billing should be handled in a consistent way
with TMN billing. This shows that, unless both IN and
TMN architectures are made more consistent, the
interconnection of IN and TMN applications would be
difficult. It is not possible to support two independent
architectures while applications on both architectures
must interoperate. Also, IN is just one part of the whole

Lappeenranta University of Technology and Telecom Finland 58


Tutorial on Intelligent Networks

network, and as such should be managed with TMN. The encryption, and network reource assignments. At present,
integration of TMN and IN can be considered as an TMN controls telecommunications support for basic
evolution path to TINA Appel93. telecommunications network and IN functions. In the
future, TMN will include functions such as service
creation, service provisioning, service deployment, and
service management. Wyatt91

Both in TMN and IN, the challenge is to ensure a global


consistency of all interconnected applications, while
allowing for evolution of some applications. This shows
that while IN and TMN architecture are to be integrated,
they both must evolve towards a unified target
architecture to be more flexible. Appel93

4.6.1 Comparison of IN planes to TMN planes

The IN Conceptual Model represents different points of


view to the users, customers and operators. The TMN
planes describe, however, different management-related
aspects. The correspondence of these architectures is
shown in this section.

The Service Plane represents the service from the user’s


point of view. The TMN architecture does not directly
Figure 4-19. The TMN and IN concept. Wyatt91 provide with this kind of aspects. The Global Functional

Figure 4-19 shows network-related functions required for Plane represents with the service designer’s point of view

IN architecture: the Basic telecommunications network, of the services. The TMN architecture does not directly

Intelligent Network, and the Telecommunications provide with aspects of Global Functional Plane.

Management Network. Wyatt91 Distributed Functional Plane represents the fucntional


parts of the IN architecture and the relations between
The Basic telecommunications network is commonly them. This is quite the same as the TMN architectures
known as the Public-Switched Telephone Network Functional Architecture. The relations between DFP parts
(PSTN), this network controls basic telecommunications corresponds to the TMN Informational Architecture. The
services (for example, local and transit/toll switching, lowest layer of IN architecture corresponds straight to the
voice and data calls) offered to a user. It detects whether Physical Plane architecture of INCM (Figure 4-20).
control of a call should be transferred to the IN. The
Intelligent Network manages intelligent
telecommunications services offered to a user. It includes
specialized telecommunications functions, such as
customized announcements, voice regognition,

Lappeenranta University of Technology and Telecom Finland 59


Tutorial on Intelligent Networks

IN has thus far been developed to provide various


enhanced services with proprietary technologies in many
networks. Consequently, many different implementations
of IN are now available in the world. To provide the same
level of service capabilities in different networks and in
the multivendor environment, however, standardation
activities for IN are taking place in the CCITT and
regional organizations. Fujio93

4.8 Future IN Capability Sets

The main CS1 capabilities support flexible routing,


flexible charging and flexible user interaction [Q1211].
Only limited mid-call interruption facilities are supported.
It is not expected that significant capability will be
provided within CS1 for services occurring during the
Figure 4-20. Correspondence of IN planes and TMN active phase of call, for multiparty or multimedia
architecture planes. services, for services requiring the direct manipulation of

In order to avoid multiple definitions of management it is call topology such as mobility or conference calling or

possible that IN will be managed through TMN concept. non call associated signalling as needed in mobility.

This is very well stated, because TMN has been widely Such capabilities, as well as standards for SMF and SCEF

accepted as a telecommunications management concept. capabilities, are expected to be provided in CSs beyond
CS1, starting with CS2, on which work began in 1992.
Refinements of CS1 will continue during 1994. The CS2
4.7 Globalizing the IN
with non-call associated signalling, SDF and management

The standards and research activities for Intelligent interfaces will be available in 1995. CS3 providing

Networks so far have focused mostly on its provision in terminal mobility is to be completed in 1997.

one closed network, emphasizing the interaction of


Thus, the work beyond CS1 will provide support of
exchange and service control functions Fujio93. Take the
mobility, multimedia calling; support of services affecting
UPT service, for example. A UPT user would move from
a call in the active phases where several subscribers may
one location to another inside a network and also over
be affected (Type B Services); standards for feature
multiple networks, possibly with different capabilities. In
interaction mechanisms; standards for creation,
such a case, coordinated provision of the service over a
deployment, and management of service logic; and
wide area is essential to guarantee UPT users with
support for complex call topology management.
personal mobility. Also the VPN service plays an
However, it seems to be so that CS2 will continue to
important role in the importance of globalization Fujio93.
address only Type A services.

Lappeenranta University of Technology and Telecom Finland 60


Tutorial on Intelligent Networks

Besides multimedia calls, other service examples are Telecommunications Operating Companies are making
advanced, networked conferencing capabilities and software for IN components, such as SCP. Also the TMN
possibly network resource usage reconfiguration during a architecture and its implementation, and the use of TMN
call. In order for such capabilities to be realized, the in managing the Intelligent Network architecture and the
issues identified earlier, and others, will need to be services are under development.
addressed and solved. Duran92
In Finland, the state owned Telecommunications
Beyond the need to support additional capabilities for Operating Company (Telecom Finland Ltd) is doing
types of services more complex than a single-ended, much work in the above areas. The Telecom Finland
single point of control category, there will be need to Intelligent Network architecture has been using Bellcore
specify further interfaces than was possible for CS1. components, and the CS1 upgrade is coming shortly. The
Standardization of a SLEE, in parallel with a SCE, and SS7 network is ready for use and the Open SCP
standard representation for service logic and service data, architecture will become available soon. The problems
which is needed for multivendor implementability, also are still in the management and the service creation areas.
will be required. Duran92 The independent service creation by customers that
require advanced IN capabilities will require quite a lot
Future directions of IN include a distributed architecture
time. When the integration of TMN and IN will be more
using the service-independent platform capabilities of the
entirely accepted and TMN applications management
IN. This platform should allow us to introduce emerging
implemented, the problems concerning remotely creatable
technologies and applications transparently into the
and configurable services by the customer will be
network. Wyatt91
solvable. For this purpose R&D co-operation with
operators and hardware and software manufacturers will
4.9 Current activities of IN be needed.

The Intelligent Network concept and innovation is


accepted worldwide. The early innovativions came from
the United States of America which was the first country
to introduce this kind of telecommunications network
architecture. The IN architecture and services provided by
Telcos in USA have been most advanced. The other
countries in the world are still trying to gather the gap.

The hardware manufacturers have provided the


telecommunications operating companies with IN
components. These components are as the base for
current and future IN architecture. A typical scenario of
this is the digitalization of switches in the telephone
network. The use of Common Channel Signalling System
No.7 becoming common. The software providers or

Lappeenranta University of Technology and Telecom Finland 61


Tutorial on Intelligent Networks

was obvious that the life cycles of the services were quite
large and not much customer orientation was possible.
5. Changes in business
An example of hardware changes in telecommunications
is the cable technology. The average bandwidth of the
5.1 Technology and services
transmission systems seem to multiply by factor 10 in a
decade. The copper cables that were used by past
The most important trends in the area of business are the
telecommmunications systems needed a lot of
increased use of computers in business and globalization
replacement when runned out of capacity. The situation is
of the markets. The telecommunications industry can be
however different when optical fiber is used. Optical fiber
divided into telecommunications hardware suppliers and
is a flexible transmission media that can be several times
the providers of telecommunications services (operators,
reconfigured, because the bandwidth can be increased
software houses, etc.). The development of tele-
only by changing the active devices that use the fiber. The
communications business depends on changes in the
physical raw bandwidth provided by optical cables will
industry, changes in the telecommunications technology
be far beyond reach in the near future. Optical fiber also
and the development of telecommunications services
provides expences that are almost independent of the
Martik93.
bandwidth.
There has been several major changes in the development
of telecommunications technology. The development of
mobility and higher interconnection bandwidth between
network nodes play an essential role in the changes of
networks and their services. In the eaely
telecommunications, the most important need for the
telecommunications networks was the analogical
telephony service. Later on, at the end of 1980's, with the
use of optical fiber in the transmission systems, the
available bandwidth increased and the customer expences
decreased. Telecommunications networks are becoming
multiservice networks, as already has been specified with Figure -1. Technology transform. Martik93

ISDN, and will provide advanced services based on Faster changes of markets have decreased the life cycle of
mobility and broadband in addition to the digital products. The corporations have to spend more money on
telephony service. product development than before and to seek for partners
to share the expences in the product development.
The past telecommunications technology was mainly
[Martik93] The need for more versatile services is
based on dedicated devices with nonflexible architecture.
obvious.
At the time of reconfiguration of these devices several
changes had to be made to the architecture (programs and The Intelligent Network telecommunications structure
possibly also hardware). As these changes were costly, it will change the market areas. As the computer prices go
down relative to the performance of the unit, the IN nodes

Lappeenranta University of Technology and Telecom Finland 62


Tutorial on Intelligent Networks

and components will be mainly based on computer services that are provided by the telecommunications
architectures than dedicated electronic devices, which networks are called internationally Advanced Services.
was a great market area in the 'past' telecommunications The voice and data traffic will integrate together with the
business. The selling of hardware will not be the most broadband services and Intelligent Networks. However,
important area of business in telecommunications rather the Advanced Services need broadband networks while
the selling of intelligent nodes, which consist of cost the mobile communications networks today do not
effective standard hardware technology, but running a provide enough bandwidth for these services. That is why
high-technology service oriented software. So software these services will be first introduced at the wireless
will propably become the largest area of business within telecommunications systems and in radio technology after
telecommunications. The service management area of the the demanded bandwidth resources are available.
IN will become an important area of business to the
The main benefits of the IN architecture are the
service providers and operators. These things will change
possibilities to improve the quantity, and to develop new
the market views in computers and software.
sources, of revenue. This is particularly desirable in an
environment with a high penetration of available services
per capita. For most environments, the IN will be a

advanced stimulation or basis for revenue generation, both the short


services
and long term. Ambro89
data
personal
speech mobile communication
5.2 Liberalization, alliances and competition

1980 1990 2000 2010 The most important trends in the area of business are the
increased use of computers in business and globalization

Figure -2. The development of the telecommunications of the markets. Martik93 This means that the use of

service business. telecommunications networks will be growing a lot in the


future within domestic markets and also a great deal
Today about 80% of the telecommunications services are
within international markets. The organizations need
telephony traffic and other services, such as data
more and more the services provided by
transmission and value added services, about 20% of the
telecommunications networks eg. in order to
turnover. It has been expected that 50% of the
communicate with computers from one subsidiary to
telecommunications services value are telephony traffic
another. The liberalization of telecommunications
and the rest advanced services in the year 2010.
business in several countires will increase the life cycle of
Martik93
services and decrease the price that is taken from the so

The main part of the future data traffic will be produced called 'hardware' level services, such as telephony service

by the LAN’s (Local Area Network) where multimedia or simple data transfer service. The formation of

(e.g. video, voice and data integration) data is transmitted. continental and intercontinental alliances, for example, in

Some of the voice traffic today will move to multimedia Europe has driven down the prices of services in several

data traffic between workstations. The multimedia countries.

Lappeenranta University of Technology and Telecom Finland 63


Tutorial on Intelligent Networks

The competition with telecommunications services will going to pay more and more for the contents or data
certainly increase. Service providers in the past inside the service than for the technology itself and the
introduced quite similar services, because the rigid expences that has accumulated in the technological
technology enabled just non-value added services and Research & Development period.
there was hardly any tools for differentiation. Broadband
switched transmission and access by ATM leave quite
5.3 IN services
much differentiation space for the services, and the value
is transferred from the pure interconnection to the mobile,
5.3.1 Benefits of IN
value added and media services (Figure 5-3).
The concept of Intelligent Networks has been developed
to achieve some major goals. These are:

Rapid service introduction, which for the


operator means an ability to meet a market
window, niche market or to adapt to specific
customer requirements. This goal is targeted
for revenue growth.
Figur Standard interfaces, which for the operator
e 5-3. Value addition of services. means multi-vendor capability. This goal is
more related to cost efficiency and high profit
The prices of raw interconection service in the past were
rather than revenue.
dominant. They have decreased very rapidly in the past
Flexible network architecture , which could
couple years. Such kind of a decrease, according to my
allow operators to configure and develop their
opinion, will happen to every non-value adding
networks more freely to meet market
telecommunications service. They can be said to become
requirements, bypassing dominant vendors.
a 'every man's' tool. IN adds quite much value to the
Integrated management integrating the needs
telephony service and the services of it will be quite
of the service management into a single logical
highly-priced at the beginnning. ATM itself does not add
network management.
any value to conventional data transfer except speed, but
broadband IN itself makes possible to create fast and
effectively broadband services. (Figure 5-3). In future it In business terms the above things are expected to happen
seems to be that the non-value added services become after introducing IN: Increase in revenues, through a
very cheap. It could also happen that the prices would be capability to offer new services to the customers; lower
the same as we have for using roads, where the fees are level of investments, when standard products are
taken as taxes in each country. The use of available from several sources; and decrease of
telecommunications networks fees would be perhaps per operational cost, due to the integrated management of
year basis fixed costs, not per minute as variable costs as services and networks impacting on the number of human
we are used to now. Instead, the value-added services will resources required to operate the network.
fill the place of former interconnection services. We are

Lappeenranta University of Technology and Telecom Finland 64


Tutorial on Intelligent Networks

In reality these goals are very hard to achieve. IN is not IN element (60 - 70 % of total investment)
the answer for the management problems, nor will it This includes necessary basic hardware and software
automatically generate new revenue. It can be part of the components which are required for IN, and is
solution, but there is much to do before these goals can be around 50-60 % of total purchasing expences. Most
met. Too often required enhancements in other of this is needed for software, concentional
information systems, and redesigning of the operations hardware is minor part of investment. The cost
and organizational structure are neglected or at least are structure of IN element consists of hardware and
not taken into account, when IN investment/introduction basic software (20%; basic SSP including hardware
is planned. and software (typically a switch), IN application in
SSP, SCP and SMS including basic hardware and

5.3.2 Cost structure software, and other equipment and software required
for operating IN), and IN specific software (40%;
5.3.2.1 Initial cost of IN SCP and SMS applications).

The level of investment required for introducing IN Project expences (30 - 40 % of total investment)

network concepts into the network is a relative issue. For Project expences are higher than usual. This is due

large international operators IN investment can normally to the complicated nature of IN concept

be justified based of a cost/benefit calculations made for implementation commonly taking more resources

one service only. For a smaller operator IN is usually a for integration than traditional network development

major investment, which may be critical to do. If IN is projects. The project expences can include: project

introduced as a major network concept through the management, system specification, system

network, IN will have a significant impact on the integration, system testing, and system deployment.

operators on the level of the investment, which is required Integration expences (? % of total investment)
for network development. This part of expences depends on the size of IN
system, its planned level of integration with other
Initial IN investments/expences can be broken down as
systems and so forth. The level of these expences in
follows:
the initial introductory phase of IN is generally
difficult to estimate. Often, integration issues such
as: integration of IN with current network
management systems and integration of IN with
current customer service systems are handled only
after the first IN application is taken into use.

It is difficult to give a formula on how to define exact


portions of these expences for IN projects. IN expences
tend to always be a specific case which is dependent on
the operators market, techical, economical and other
environmental issues. The most significant point is that

Lappeenranta University of Technology and Telecom Finland 65


Tutorial on Intelligent Networks

with currently available IN products, portion of based services automatically generate new traffic and
investment which consist of standard hardware and revenue.
software components is relatively low and the major part
of the investment consists of special/tailored software and
5.3.3.1 Operators capability of offering services
project running expences.
That in IN has made it possible to offer new services to
the customers cannot be denied. But one has to remember
5.3.2.2 Operational costs of IN that the possibility of utilizing switches as service
When examining operational costs, attention shall be paid platforms still exists. An operator’s capability to
to those operational costs which are directly related to introduce new services, which are based on IN
operations and management of IN platform components, technology is largely dependent on the operator’s
comprising of hardware and software maintenance capability to manage the complex composition of IN
charges and other operational costs. software and how an IN implementation supports the
flexible management of data in the system. It can be
Associated operational costs are significant portion of the
questioned, if operators have made a good choice in
total costs. The main parts of these costs are marketing,
coming dependent of software houses, as has typically
sales, R&D for the customer end of the product and the
happened, rather than switch vendors what concerns their
costs for supporting systems.
service development capabilities.

How capable the operators are in the services arena is


5.3.2.3 Basic call production costs
heavily dependent on the software strategy which is
IN services need local loop, trunk transmission and the
adopted when decision of building IN facilities has been
switching machinery in operation before IN based
made. Again in this respect operators vary largely.
revenue generation can be put into operation. The
operator/services provider have to include these expences
until it is possible to calculate the total IN call production 5.3.3.2 Sales of service portfolio

costs, which then have to be covered by incoming cash Cannibalism still exists and this is especially common
flow to be able to run financially successful operation. within telecom service sector. Voice services offered by
Telco’s have not developed significantly since the 1960’s.
It can be assumed that basic demand for the utilization of
5.3.3 Service portfolio
telephones has always existed. IN has facilitated in
IN seems to be the only vehicle, which offers operators
packaging service features in new combinations. These
new tools to provide extended call handling capabilities.
combinations have been developed to standard IN
The capabilities may be regarded as a basic element of
services such as Premium Rate, Freephone, Calling Card,
the modern products concept. IN makes it possible to add
UPT, VPN and so forth. But have these IN services
value to basic call handling. These more flexible network
generated new revenues ? Definitely to some extent, but
services may be packaged to suit for different market
all the credit can be given to the IN concept, and when
segments relatively easily. In this respect IN has proven
evaluating the economical impact of IN, this matter has to
to be a useful concept. However, it is not evident that IN
be considered.

Lappeenranta University of Technology and Telecom Finland 66


Tutorial on Intelligent Networks

5.3.3.3 Service development time frames provide more sophisticated management and a greater

Inmaterial nature of the telecommunications service capacity for IN services. At the beginning of 1990’s

allows better interaction with the consumers when Telecom Finland made a contract to purchase a real IN

developing the service products compared with, for solution, which consisted of dedicated SSP, SCP and

example, manufactuing industry. In this respect, IN has SMS elements. At this time all the business indicators

great potential. Utilization of this potential requires a justified investments of this size. Altogether the IN

comprehensive SCE environment. Useful SCE project lasted for three years and it was a risky project

environments have been on the market only a short while financially.

and unfortunately these products typically support a


restricted range of products from a single source. 5.4.3 Special services

The start of open competition put pressure on Telecom


Service development life cycles have shortened and there
Finland to speed up the development of IN services. This
are products available in the market, which make it
challenge was met with purchasing more IN capabilities
possible to take an experimential approach to service
and developing competance inside Telecom Finland to
development.
rapidly develop new services. For the special services an
additional node with SCE capabilities was purchased.
5.4 Evolution of IN capabilities at Telecom
With this investment, Telecom Finland was able to reduce
Finland
time for services development down to acceptable level.
Limited new services can now be developed in days,
5.4.1 Pre-IN more sophisticated ones in months.

Telecom Finland was one of the first operators in Europe


to offer IN-type services to its customers. The first 5.5 Distribution channels
services (Freephone, Premium Rate) were developed on
switch based solutions in mid of the 1980’s. Successful There has been a major change in accomodities'

implementation of these services was based on the distribution. Here we however, refer to services.

expertise Telecom Finland has in digital switching. Telecommunications organizations today and in the past

Through the early implementations Telecom Finland has used to distribute the so called raw services via

been able to gain a dominent position in the enhanced telecommunications networks. They created their revenue

services market in Finland. In this first phase services according to the amount of telephony calls were dialled in

were developed in close co-operation with the customers their network, where they served as operators. What is

of Telecom Finland. Switches were used as service important to notice is that the service provider actually

platforms to avoid unnecessary investments of IN. Some was located in the different place than the paying

of these early implementations are still deployed. customer. Telecommunications can such gain quite
effective and cheap distribution channel, if the prices of
raw data transfer goes noticeably down.
5.4.2 Centralized IN

Soon after the first IN implementations Telecom Finland The same approach as above can also be brought to the
started to investigate potential IN concepts, which could broadband services eg. high-speed image transfer. Think

Lappeenranta University of Technology and Telecom Finland 67


Tutorial on Intelligent Networks

about the following medical situation: a nurse is taking 5.6 Changes in enterprises
photos of a patient. The nurse itself does not have the
The major changes of organizational structures in this
skills or knowledge to appraise the condition of the
century will also be reflected in network and service
patient. She could use a doctor who is residing 100
operator structures (Figure 5-4). At the beginning of the
kilometres away from the medical centre to give some
20th century there was emphasis in the production of raw
advice. The only thing is that the doctor would have to
materials and agriculture. Then the society became more
take a flight to that centre (expensive) or the nurse would
industrialized and the industrial organizations grew up to
have to send it by post (too slow). One solution for this
vertically integrated firms. The large scale mass
problem, in the future, would be the use of high-speed
production and product differentiation were the main
data transfer to transfer the digitized images to the
paradigms since the 1930's. The growth was sought from
organization, where the doctor actually works. The
diversification to new synergic areas.
broadband networks would also enable some
videotelephony calls or videoconferencing with the
experts that are more aware of the problem. special

The above was just an example to describe the changes in


distribution channels. The facts that telecommunications
networks provide to telecommunications service
organizations are that: their services are better available basic Basic

for customer (any time of day and in the future anywhere 1900-1950 1970: 1990:
globally), they are fast reachable (customers don't have to Vertical Integration Diversification Networks of Enterprises

wait eg. for the slow post service) and they are quite
Figure 5-4. Changes in enterprise structure.
cheap reachable or at least the variable expences that are
included in the service usage (the same can not be said of The present and future organizations are more like

the fixed part eg. the equipment to have broadband data networks of enterprises, where the main organization

transfer and the service platforms). This kind of itself is broken up into smaller units and they utilize

distribution channel stimulates the professionals on the external firms as subcontractors and distribution channels.

market to market new types of services and this way to This kind of business structure is typically found in many

have an effect to the price that the customer needs to pay. design and high-technology industries. The organizations
have to focus into their strongest areas to be able to be
The problems today are that the technology is not yet competitive. Since there must be both cost advantage of
quite advanced in order to make these kinds of services mass production and market based differentiation present,
possible in massive or wanted scale. Some pilot research the areas outside the company focus must be obtained
projects have been made or are being made on these from partners, who provide their part of the final concept.
areas, but any broadband services are actually So, the value obtained by the end user is combined from
implemented yet. the different value attributes provided by a network of
several companies.

Lappeenranta University of Technology and Telecom Finland 68


Tutorial on Intelligent Networks

The telecommunications industry is based on high-


technology development and also much subcontracting
are used nowadays. The number of subcontractors used
will increase in the future. An telecommunications
service organization could actually be like the following:
It uses networks operators to provide digital access to the
customers and large service and media providers as
contractors to produce the services. It rents the needed
physical computer and network equipments itself and
uses own computer programmer's to program the wanted
logic for customer and service management. The
organization itself would just co-ordinate and design the
service provision and distribution and keep the functions
alive. The structure would be a network of enterprises,
each enterprise specialising on its most qualified areas.

Lappeenranta University of Technology and Telecom Finland 69


Tutorial on Intelligent Networks

stage. More innotation on the standardization work has


been shown from the ATM Forum. The ATM Forum
6. Broadband intelligence and
consists of members of several existing enterprises in the
media
area of telecommunications and regional telephony
operators.

6.1 Broadband networks

The emergence of optical transmission technique has


provided more higher transfer rates and reliable transfer
for the networks. The bit error propability has moved
approximately from 10 −6 in the copper based signalling
technique to 10 −9 and even better in the optical
transmission technique. This has started projects on
defining new applications based on optical transmission
media. Figure -1. B-ISDN reference model.

B-ISDN concept is based on the integration of different


Just a few years ago the telecommunications systems
kind of services. The reference model describes several
used mainly PDH technique in the transmission systems.
layers: physical, ATM, AAL (ATM Adaption Layer)
This technique did not enable high-speed data transfer
layers and the upper layer protocols. B-ISDN uses out-of-
and would have caused several problems when used in
band signalling to separate the user and signalling data.
high-speed data transmission. With CCITT's new SDH
technique these problems can be bypassed. SDH
technique provides a synchronous digital data transfer 6.1.1.1 Physical layer
based on optical transmission media, where one bit can be The physical layer involves the packetization of the user
exactly pointed at the destination station from the media data into the physical medium slots. In Europe, CCITT’s
stream and also in the switches between the link. The SDH (Synchronous Digital Hierarchy) technique is used,
switches can then process the frames in SDH at real-time while ANSI’s (American National Standards Institute)
(In practice with only a few bits delay) and forward them. SONET (Synchronous Optical NETwork) is used in the
This is one reason why SDH technique is used in many USA. However, SDH and SONET do not differentiate by
broadband networks at the physical layer of their protocol their contents. The transmission technique is based on
stacks. synchronous data transfer in optical cable and several
transmission speeds are specified. SONET describes the

6.1.1 B-ISDN different speed levels as OC-x’s (Optical Carrier level at


x) while STM-x’s (Synchronous Transport Module) are
B-ISDN (Broadband Integrated Services Digital
specified in SDH. These levels are multipliants of the
Network) is a concept specified by CCITT. The lower
basic level OC-1 (51.840 Mbit/s) and STM-1 (155.520
parts of the B-ISDN reference model layers are
Mbit/s).
standardized, but the user and network management parts
of the B-ISDN appear to be on the whole at the draft

Lappeenranta University of Technology and Telecom Finland 70


Tutorial on Intelligent Networks

Today the level OC-3 is used and ATM equipments for


the speed of approximately 622 Mbit/s (OC-12) will be
introduced in the very near future (some switches already
available in 1994). The gigabit transmission speeds, such Figure -2. ATM cell structure.
as 2.488 Gbit/s (OC-48), will first be used in backbone
networks and SONET standards are scalable up to almost 6.1.1.3 ATM Adaption Layer
10 Gbit/s transmission rates, which are expected to be in
AAL provides with more advanced functionalities than
use in the future.
ATM layer to the user. For instance, a checksum is
provided for the whole ATM packet.
6.1.1.2 ATM layer
Inserting payload data into the 48-byte information field
ATM is defined in the standard I.121 and is based on the
of the ATM cell is accomplished by the ATM Adaption
fast packet switching technique. It mixes the good effects
Layer. The AAL is what gives ATM the flexibility to
of the conventional circuit switching and the packet
carry entirely different types of services within the same
switching tehcnique used in data packet networks. This
frame format. It is important to understand that the AAL
new technique is called cell transmission. Cell
is not a network process but instead is performed by the
transmission uses short, fixed length packets and in ATM
network terminating equipment. Thus, the network’s task
the cell structure of 5 bytes of header and 48 bytes of data
is only to route the cell from one point to another,
is used. While ATM relies on the optical transmission
depending on its header information. It should be noted
technique, only a cheksum that notices one sequentially
that up to four bytes may be used by the adaptation
appearing error is provided for the header part. The use of
process itself with some AAL types, leaving 44 bytes for
such short cells enable shorter delays in the network
payload information. Forum93
switching nodes than the use of variable length long
packets. And, so can the applications of the ATM Several AAL layers have been standardized: CBR
networks get smaller changes in the arrival times between (Constant Bit Rate) services, connection-oriented and
the packets at the destination (known as jitter). This is connectionless VBR (Variable Data Transfer) data
quite obvious in the use of isochronous data streams transfer, and Simple and Efficient Adaptation Layer
produced by applications, such as video conferencing (SEAL). Forum93
(realtime digitized uncompressed images + voice). So the
task of ATM layer is to split the upper layer data in to There are very widely spread protocol architectures, such

such 48 byte cells and add the needed 5 bytes in the as TCP/IP, in use today. The existing UDP (User

header, which include the destination address and some Datagram Protocol), TCP (Transmission Control

other functionalities not described in this paper. Protocol) and the newest RTP (Real-time Transport
Protocol) (under research in the Internet organization)
will not be thrown away until a very advanced solution is
readily available. One candidate solution would be the
HSTP (High-Speed Transfer Protocol) that is provided by
CCITT, but it has just received the draft stage. Some
major conclusions can be drawn from the charasteristics

Lappeenranta University of Technology and Telecom Finland 71


Tutorial on Intelligent Networks

of HSTP. It uses flexible flow control methods eg. signalling necessary to set up, supervise and release calls
different type of flow control method to different and connections. I321 In other words, ATM uses
situation, it supports quite efficiently parallel signalling protcol to make up the virtual path from the
implementation of the protocol itself and it is in several source to the destination. It is the same way the
ways optimized to high-speed data transfer. So, it is likely conventional telecommunications network, such as
that AAL will not be used at the beginning of ATM era. telephony network, handles the connection opening.
AAL will be used when there are sophisticated user Every component (ATM switches) along the virtual path
interfaces available for AAL data transfer. is indicated of the connection opening so no enhanced
routing has to be done at the network nodes.

6.1.1.3.1CBR

CBR is a service is type 1. (AAL1) service of AAL. It 6.1.1.5 Management of the B-ISDN architecture

handles traffic where there is strong timing relation This part of B-ISDN are has not yet been standardized.
between the source and the destination. Examples include CCITT has made some approaches to B-ISDN
PCM-encoded voice traffic, contant bit rate video, and the management point of view.
emulation of public network ciruits (e.g. the transport for
The management plane provides two types of functions,
E1 links).
namely Layer Management and Plane Management
functions. The Plane Management performs management
6.1.1.3.2VBR
functions related to a system as a whole and provides co-
VBR defines the AAL3/4 service. It is fairly complex ordination between all the planes. Plane Management has
layer that can handle VBR (i.e. bursty) data both with and no layered structure. Layer Management performs
without pre-establishing an ATM link. Examples for the management functions (e.g. meta-signalling) relating to
connection-oriented type include large file transfers like resources and parameters residing in its protocol entities.
CAD files or data backup. The connectionless type is Layer Management handles the Operation And
intended for short, highly bursty transfers as might be Maintenance (OAM) information flows specific layer
generated by LANs. concerned. I321

6.1.1.3.3SEAL 6.1.2 ATM networks


SEAL defines the AAL5 service. It may be looked at as a The ATM networks will be based on a hierarchial basis,
simplified version of AAL3/4 that is designed to meet the such as the conventional telecommunications networks.
requirements of local, high-speed LAN implementations. The layout of the architecture seems to be like the normal
AAL5 is intended for connectionless or connection- telephony network, but the technology is able to provide
oriented VBR services. with some very enhanced services not applicable in the
conventional telephony network.

6.1.1.4 Control plane


A very much simplified example for the structure of an
This plane has a layered structure and perform the call
ATM network is shown here. (Figure ) It is important to
control and connection control functions. It deals with the
understand that the various UNI (User-to-Network

Lappeenranta University of Technology and Telecom Finland 72


Tutorial on Intelligent Networks

Interface) and NNI (Network-to-Node Interface) A VCC is a connection between two communicating
connections could be carried via different physical media, ATM end entities. It may consist of a concatenation of
such as the existing Plesiochronous Digital Hierarchy several ATM VC links. All communication proceeds
(PDH) layers or the new SDH. Several standards have along this same VCC which preserves cell sequence and
been defined on how to interface the physical layers, and provides a certain Quality Of Service (QOS). Note that
work is continuing to specify additional physical layers to the Virtual Channel Identifier in the ATM cell header is
be used to transport ATM cells. Forum93 (Figure 6-3) assigned per network entity-to-entity link, i.e. it may
change across the network within the same Forum93
VCC.
ATM ATM
switch switch

VP1
VC1 VC1 VC1 VC1 VC1 VC1

VC2 VC2 VC2 VC2 VC2 VC2


ATM
switch VC3 VC3 VC3 VC3 VC3 VC3

VC4 VC4 VC4 VC4 VC4 VC4


VP1
VC5 VC5 VC5 VC5 VC5 VC5
VP2
VC6 VC6 VC6 VC6 VC6 VC6

VC7 VC7 VC7 VC7 VC7 VC7

Figure -3. ATM network architecture.


Figure -4. Virtual Channels and Virtual Paths.

6.1.2.1 Virtual Channels and Virtual Paths A Virtual Path groups VCs carried between two ATM

The concepts Virtual Channel ( VC) and Virtual Path (VP) entities and may also involve many ATM VP links. The

are affected when ATM cells are transported through the VCs associated with a VP are globally switched without

entire network. (Figure 6-4) unbundling or processing the individual VC in any way
or changing their VCI numbers. Thus, the cell sequence
A VC is mostly known as VCC (Virtual Channel of each VC is still preserved, and the QOS of the VP
Connection). A VCC is set up between any source and depends on that of its most demanding VC. As the cell
any destination in the ATM network, regardless of the address mechanism uses both the VCI and the VPI,
way it is being routed across the network. Fundamentally, different VPs may also use the same VCI without
ATM is a connection-oriented technology. The way the conflict. A cell may also not be associated with any VP.
network sets up the connection is therefore by means of In this case, it would have a null VPI and only a unique
signalling, i.e. by transmitting a set-up request, which VCI. Forum93
passes across the network to the destination. If the
destination agrees to form a connection, the VCC is set By means of VCs and VPs, virtual circuits can be set up

up between the two end-systems. A mapping is defined either permanently (by using so-called ‘Permanent

between the Virtual Channel Identifiers (VCI)/ Virtual Virtual Channel’ (PVC)) or on demand (‘Switched

Path Identifiers (VPI) of both UNIs, and between the Virtual Channel’ (SVC)). It is likely that VPs will be used

appropriate input link and the corresponding output link mostly between switches (i.e. across NNIs) to carry

of all intermediate switches. Forum93 across large numbers of virtual circuits. In any case, all

Lappeenranta University of Technology and Telecom Finland 73


Tutorial on Intelligent Networks

the ATM switch has to do is to identify, on the basis of It is also expectable that TV companies will not just
the cell’s VPI, VCI or both, which output a received cell broadcast TV programs in the future. With high-capacity
needs to be routed to, and what the new VPI/VCI on this broadband networks TV corporations can then multicast
output link is. The operation of an ATM network is digital (such as HDTV (High Definition TeleVision))
therefore very simple and inherently can scale to very programs to the customers. This will provide the
high speeds. Forum93 customers to independently of each other to subscribe TV
programs from the TV companies. The greatest advantage
ATM network technique may look quite simple at the
for the customers will be that the charging can be done
first look. Actually what makes the ATM netowork more
according to watched programs eg. 'on demand basis'.
complex is the network management. ATM is
connection-oriented virtual circuit network, which uses Movies on demand that is often called Video On Demand
signalling links to establish a ATM connection between (VOD). The solution for people not knowing how to
source and destinations stations. The signalling schemes program their VCRs is that they don’t have to anymore;
in the UNI and NNI become quite complex. What is more the telecable companies - the result of the telephone and
complex is the management of the high-speed data cable company mergers - download whatever program
stream. The ATM network supports QoS-concept for the people want to watch. People buy or rent movies from
users. These mechanisms come quite complex if they are the infotainment service providers LAN94. The
fully implemented. difference between the TV multicasting is that VOD
provides a service that can unicast movies to the
customers. Both of these services belong to the category
6.2 Applications for the broadband networks
of Pay-per-View. So, the videorent corporations no
The explosive growth of available link bandwidth for further have to keep video cassettes in the store, but a
applications has changed and will change even more the large store capacity of data, such as CD-ROMs (Compact
nature of the computer applications. The applications will Disk-Read Only Memory), etc.
be even more parallelized, and concerning the multimedia
Some additional services might be provided to the
applications, several multimedia servers will be located in
customers, such as video shopping, interactive games,
the highly distributed network architecture.
education, and information publishing. In videoshopping
Just a few broadband applications to mention, it is quite people interact directly with the video catalogs, checking
sure that hundreds of them will exist in the future. (Figure availability and pricing with the stores’ databases.
6-5) First applications could perhaps be high-quality LAN94 The network’s high-speed nature makes it
visual telephones that use just a slight compression practical and close to realistic to play interactive VR
technique to pack the moving high-quality images. (Virtual Reality) games, which are particularly popular
Because of the large available bandwidth it is possible to and need a lot of computer capacity. In education the
send images with no compression at all. Of course, the high-speed networks bring classes and research materials
normal telephony service can be provided in broadband to people everywhere. With interactive information
networks. publishing, you can find as little or as much information
as you want just by asking your navigation software for
help.

Lappeenranta University of Technology and Telecom Finland 74


Tutorial on Intelligent Networks

Telephony This service is just the normal


telephony service via the ATM
network. It uses an
audiograbber to encode the
voice at both of the stations.
Video telephony This service is an advanced
telephony service mixed with
video. It uses the videocameras
and a videograbber to grab the
moving videoimage.
Audio On Demand This service (AOD) would act
like as listening to a
conventional CD player. The
customer requests the server
for a CD audio sample and
then the server begins sending
the digitized audio samples to
client. The service would
include PLAY and STOP
functions.
Figure -5. Some broadband network applications.
Video On Demand VOD is similar to AOD, but in
addition to voice also moving
picture is transferred. In future,
it might be competing with the
video rent business. The
service would include PLAY
and STOP functions.
Video This service is almost the same
Conferencing as the video telephony service,
but this needs multicasting
capabilities, where video
telephony needed only
unicasting.

Table -1. Some possible broadband services.

Lappeenranta University of Technology and Telecom Finland 75


Tutorial on Intelligent Networks

to use BIN services he connects to a specified BIN


service number eg. ATM address via the ATM interface
7. Broadband IN
and waits for the control unit to make the service ready
for use. If the service reach model would be as in
conventional IN, then the switching point would notice a
7.1 Introduction
BIN call and forward with a message to the control unit.
The Intelligent Network concept now involves with However, a different vie to this is brought in the Telecom
narrowband ISDN and other slow speed networks. Finland BIN project.
Broadband IN (BIN) is a concept for the use of high-
speed transmission technique in the Intelligent Network
7.2 Telecom Finland BIN Project
structure. This is possible in IN because of its flexible
architecture. IN provides computer controlled Telecom Finland and Lappeenranta University of
telecommunications and in B-IN, IN controls, for Technology ( LUT) has started on a project to research
example, the function of ATM switches. The standards broadband, ATM-based, Intelligent Network oriented
for the IN&B-ISDN access has not yet been introduced, architecture Broadband Intelligent Network. The research
so BIN focuses just on controlling the high-speed considers the future broadband multimedia services and
switches theoretically. their designed implementation according to this
architecture. BIN has not been standardized or even
DB
implemented yet but being now in the pilot design phase.
BIN is a name for the project, which started in march
1994 at Telecom Finland.
DB DB DB
Service
ATM Signalling provider The objects of the project refer quite much to the
protocol Q.2391
conventional narrowband IN ie. fast service introduction
ATM
network
and decrease the resources needed to implement
access
broadband services. The main objects concerning the
User
station architecture have been centralized customer charging
techniques and multiservice offerings at single service
ATM
network
points. The goal of BIN of user point of view is that the
access
ATM ATM
switch switch user does not have to be aware of the technical
implementation of the service used.

Figure 7-1. The Broadband IN concept.

The Broadband IN is a concept where the Intelligent


Network structure is used to manage and control high-
speed network technologies, such as ATM switches.
(Figure 7-1) The user is accessed via a high-speed
interface, such as an ATM interface. When the user wants

Lappeenranta University of Technology and Telecom Finland 76


Tutorial on Intelligent Networks

7.3 BIN Architecture Intelligent Networks have centralized service


management architecture, whereby components can be
distributed from each other. The objective of this project
7.3.1 Components
is to have a centralized model, where the users (BSS)
BIN components are BSSs (Broadband Service
could use services provided by BSPs and have a
Subscriber), BSPs (Broadband Service Provider), BSCPs
centralized service management system. The BSS station
(Broadband Service Control Point), BSMPs (Broadband
itself would be a sophisticated computer or programmable
Service Management Point) and BSSPs (Broadband
device with appropriate resources to use the broadband
Service Switching Point) (Figure 7-2). BSSs, BSPs and
multimedia data.
BSCPs are connected to BSSPs, which form the ATM-
network. BSMP is connected to BSCP and is not tied to BSMP contains customer identification and charging
any physical implementation technique. information, a list of BSPs known to it and possibly a

BSMP BSP identification Charging customer service palette. In BSCP are the general

User identification Service Logics (SL) also existing in conventional IN,


MIB Directory
Generic Service Multimediadata
List of BSP:s UPT Logics structure which can be used in several services, such as broadband
MIB
CC
equivalents of CC (Credit Calling), NTS (Number
DB DB
Service
palettes NTS Translation Service ), and UPT (Universal Personal
MIB
BSCP Telecommunications). In addition, broadband services
Icon Icon
manager manager
have SLs for controlling icons and QoS (Quality of
Broadband specific
Service Logics Icons Service) -parameters, and SL for a connection initializer.
Connect BSP MIB

QoS
BSSP
management
Home- BSS has possibly an own customer service palette, icon
shop
User service palette manager Provider Work-
manager, SL for BSCP, and a screen handler for showing
MIB
“UPT”- station
parameters
the multimedia data. In BSP lie the actual multimedia
BSP
databases (DB) and icon databases. Also the SLPs for
User Work-
station BSSP
AOD broadband services are located there.
Hyper-
media
lib.
BSS BSSP D-HDTV
VOD

BSSP 7.4 BIN and IN


BSCP BSP Service Logics
Icon SL

Screen manager In conventional narrowband IN the user has a simple


BSSP
F interface to the network ie. either from the SSP (Service
igure 7-2. BIN Architecture. Switching Point) or the NAP (Network Access Point ). The
highly simplified function of CS1 (Capability Set 1) IN is
Several service providers, which would use different
that the user is connected via SSP or NAP to the SS7
protocols and managing architectures, could be designed.
(Signalling System No. 7) network, which forms the
If done this way, every service provider should
signalling network of the IN. The user dials a phone
implement their own mechanisms of charging and
number, which is then generated to a message and
managing services. One advantage of this architecture
transferred to the nearest SSP. If the number begins with
would be quite simple interface to the end user and one
a 0700 or 0800, SSP knows that the user chose an IN
disadvantage quite complex service introduction.
number. In this case, SSP triggers an IN call, otherwise

Lappeenranta University of Technology and Telecom Finland 77


Tutorial on Intelligent Networks

the call setup procedure is just as for a normal call. SSP 7.5 Broadband services categorizing
forms the intelligent part of conventional IN. SSP triggers
In fact the few services shown in table 7-1 are in a way
the IN call and forwards an INAP (Intelligent Network
quite similar to each other. They could be grouped into
Application Protocol) message to the SCP (Service
1
three different categories: controlled file transfer based
Control Point) via the SS7 network using the services of
2
AOD and VOD, hypermedia database based
TCAP (Transaction Capabilities Application Part). SCP
hypermedia library and homeshopping, and single- or
then have control on the next step eg. sends a control
3
multi-party calls. By doing this controlling of the
message to SSP.
services can be done in a similar way. There does not
In BIN the function of BSCP is different from SSP and have to be different controlling mechanisms for every
SCP. The BSSP (Broadband Service Switching Point) service provided. The controlling mechanism (BINAP) of
(here ATM switch) does not notice the BIN service BIN services will be discussed later on.
request and send it to the B-SCP (Broadband Service
AOD
Control Point) as it would, if the BIN would operate as a
conventional IN.
VOD

BSSP is in point of fact a simple high-speed switch


Hypermedia
architecture eg. ATM-switch. The functions of such a
library
switch is to route the 53-byte cell from input end to
output end according to the Virtual Circuit Identifiers Homeshopping
(VCI) and Virtual Path Identifiers (VPI) and the
Videotelephony
information that has been configured in its routing tables.
The switch is not intelligent like conventional IN switch,
Videoconf-
because it does not trigger an IN call. It handles any data
erencing
in the cells transparently. Compared to the SS7 network's
64 Kbit/s capacity ATM-network forwards cells at a
Table 7-1. Some broadband services.
much higher rate ie. 155 Mbit/s.

7.6 Functioning of BIN architecture


SSP solutions are mainly based on hardware solutions.
They can not be programmed as easily as computers. In
The main idea of BIN architecture is that the user does
BIN however, BSSP performs all the functions needed to
not directly communicate with the service provider with
create broadband services. While BSSP being simple, the
BINAP messages. BSCP, which forms the controlling
BSCP has to be quite complex. The end nodes, BSS and
part of the BIN, processes the BINAP message sent to it,
BSP, are thus also quite complicated. This means that
makes statistics, and controls other points by sending
application layer protocol BINAP is tranferred between
BINAP messages to them. The advantage of this kind of
all the end nodes unlike in conventional IN, where INAP
architecture is that the end systems (BSS and BSP) do not
is mainly used between SSP and SCP.
have to be as complex as the controlling systems. The
main intelligence of a service lies in BSCP and BSP,
where are the BSLs (Broadband Service Logic). BSS has

Lappeenranta University of Technology and Telecom Finland 78


Tutorial on Intelligent Networks

mainly the intelligence of requesting a service and 7.7 Course of BIN events
interpretating BINAP messages sent to it.
Let us consider the event flow of BIN events.
BIN consists of two data streams: the management data
stream and multimedia data stream. BSS communicates Directory browsing
Service activation
only with BSCP, but BSCP is responsible for
Icon creation
communicating with all the other components. Below the
transport layer BSS does communicate with the BSP, but
Service palette
it gives upwards only data indications. (Figure 7-3) User identification Icon browsing Icon activation Conn. synchron. Service logic Charging
process

User
BSCP BIN Service Logic
DB

Figure 7-4. Course of BIN events.

BSS BSP
Transport
layer 7.7.1 Service request phase

User identification:
Transport Transport
layer layer The user sends a BINAP message to BSCP and gives
ATM sufficient identification information of him/herself. The
user has to know the ATM-address (CCITT NSAP
Management
Data stream (Network Service Access Point), 20 bytes) of BSCP.
BSCP then fetches more accurate information about the
Figure 7-3. Management and data stream separated. user, whereby the location of the customer service palette
is also found. If the user information is not found in the

7.6.1 Requirements of ATM network BSMP in case, the user must give the address of his/her
Home BSCP (HBSCP). This enables usage of broadband
The signalling protocol itself is not quite developed yet as
services from mobile stations.
it should be in order to establish BIN architecture using
ATM. The BSS uses the ATM signalling protocol Directory browsing:
(Q.2391) to set up the path to the destination, which is
BSCP or it could use the PVCs that are available to In case of a new user, requesting of a service is proceeded
BSCP. However, the BIN architecture suggests to use via directory browsing. BSCP knows one or more BSPs.
BSCP to establish the path between BSP and BSS. BSCP sends a BINAP message to BSS, which contains a
Q.2931 signalling protocol does not define these kind of hypermedia document with links to BSPs. (Figure 7-5)
functions. Q.2931 UNI version 3.0 does not define a third The first level of the hypermedia document contains the
parties connection setup as it should be. UNI 4.0, which BSPs (located at BSCP) and next levels contain all the
should be introduced in late 1994, should contain the information the BSP has to offer, which are fetched by
third party connection setup function defined. BSCP from the BSP in case. BSCP does not have to
know all the services every BSP has to offer, but knowing
the addresses of the BSPs is sufficient. By using the

Lappeenranta University of Technology and Telecom Finland 79


Tutorial on Intelligent Networks

identification information of the user, the BSCP may the user has too little network capacity, the BSP might
filter the information given to the user. reject the service usage. The QoS-parameters could be the
limit values with what BSS could possibly function.
The hypermedia documents residing in BSPs contain
structured information about the type of service. The
7.7.3 Service usage phase
types are controlled file transfer, hypermedia database or
single- and multiparty calls. This phase is highly dependent of the type of service
requested. For example, controlled file transfer type of
BSCP-ROOT_id
service could have the functions of PLAY and STOP.
During the service execution phase the QoS-manager is
Nokia HPY Telecom Finland Sony BIN Services Inc. responsible for the quality parameters of the service. The
parties inform BSCP of the changes in service quality,
Media DB
which then tries to restore the values.
VOD AOD Xmosaic

Action Comedy Jazz Rock 7.7.4 Service after-usage phase

Stallone Schwarznegger Elvis Michael Jackson After the service has been used, the user should inform
Real services BSCP of the connection closing. BSCP then starts the
Cobra Rocky 1 Terminator
F controlled connection close phase. BSCP has stored the
igure 7-5. The structure of directory tree. necessary information about the service usage eg. actual
usage time and ability to perform with the requested QoS-
Service palette process :
parameters. The actual time here means eg. in controlled

When the user has chozen the 'real' service, an icon can file transfer the time between PLAY and STOP functions

be created to the customer service palette either to BSMP summed through the whole session. The charging

or BSS. When such a service palette exists containing information is then added to the MIB (Management

icons and an accurate description of the parameters of the Information Base) in the BSMP of the user.

service, may the service be executed via icon browsing


and activation. This enables much simpler and faster 7.8 BINAP
usage of broadband services, because of icons' graphical
presentation and short-way execution process.
7.8.1 BINAP-messages

7.7.2 Service activation phase BIN uses BINAP application protocol to communicate
with the external parties of BSCP. BINAP-messages have
After activation of the icon or 'real' service BSS informs
been categorized into the following subclasses:
BSCP of it, which sends BSP a BINAP message
containing sufficient information about the icon or 'real'
service. In BSP the BSL for the service is executed. In
BSCP the QoS-manager is initialized for this connection,
which has received the QoS-parameters from the BSS.
The QoS-parameters are also negotiated with BSP and if

Lappeenranta University of Technology and Telecom Finland 80


Tutorial on Intelligent Networks

INITIALIZATION: ServiceSubscribe ::= PRIVATE 1


SEQUENCE {
User identification
serviceUser
Customer service palette
USERTYPE

Directory handling
}

SERVICE USAGE:
USERTYPE ::= SEQUENCE {

Service type dependent control


name 0 NAME,
messages during the service
usage hbscp 1
HBSCPLOCATION,
QoS-messages
account 2
SERVICE CLOSE:
ACCOUNTNUMBER
OPTIONAL
Controlled closing messages

}
Customer charging

NAME ::= SEQUENCE {

forname 0 OCTET
STRING( SIZE(30)),
7.8.2 User identification
surname 1 OCTET
An example of an ASN.1 coded BINAP-message is given
STRING( SIZE(30))
here of the user identification, which BSS sends to BSCP
as the first message: }

.
.
.

7.9 CUSTOMER SERVICE PALETTE

7.9.1 BIN conceptual model

The BIN conceptual model does not correspond with the


conventional IN conceptual model and it is divided into
to three planes: user, network and service planes. (Figure
7-6) The user plane contains the information about the

Lappeenranta University of Technology and Telecom Finland 81


Tutorial on Intelligent Networks

user. The network plane defines all the possible networks is better known as a MIB. This MIB would contain all his
that the user system can interface with. The service plane BIN service parameters and they could be configured
indicates all the possible services that the user can make with the use of TMN at any time. Such parameters, in for
use of. The BIN conceptual model shows the correllations instance the videoconferencing service, would be the
of the three planes. The correlation between user and names of the members of the conferencing group and
network planes is such that the user has allowed networks their corresponding network addresses in the lower layer
which can be accessed. The user and service plane of MIB tree hierarchy. So, the customer BIN service
correllation defines the services that the user have parameters could be described in the structure of a MIB
subscribed or installed. The network and service plane tree.
correllation defines the services that can be provided in
the networks that the user is allowed to access.

USER PLANE USER

Customer ID

NETWORK PLANE ATM ISDN POTS PLMN

VOD Videoconferencing

Mike 546546
James Bond
VOD Videotel. AOD CC UPT
SERVICE PLANE Jack 8797896
Cliffhanger
Cape Fear Sue 12325432

HDTV
H.261

Figure 7-6. BIN conceptual model.

7.10 BIN MIB


Figure 7-7. Visio of BIN MIB.
BIN MIB is the customer personal service palette and it
should be structured according to BIN conceptual model. Actually the icons form the basis of this BIN MIB

(Figure 7-7) The location of such a database can be either framework. They contain all the information of the

in BSS itself or in HBSCP's BSMP. service that has to be known by BSCP in order to be able
to execute the service. They include for example in VOD,
This section just provides with a visio of the Broadband the BSP and its address, used picture formats and used
IN Management Information Base (MIB) structure. The network. On the other hand, the allowed networks are
idea is such that the customer will be provided with the also listed with necessary parameters eg. transmission
capability of remotely to configure his own service speed. (Figure 7-8)
palette that in telecommunications management language

Lappeenranta University of Technology and Telecom Finland 82


Tutorial on Intelligent Networks

BIN MIB is designed to be managed with TMN Figure 7-9. The use of TMN in BIN.
(Telecommunications Management Network) architecture.
USERPLANE
USER
7.12 The hardware configuration

SERVICE PLANE
ICONS NETWORKS
NETWORK PLANE
The hardware configuration will consist of three Intel
386/486 (Linux) workstations (at first only one; without
Homeshop AOD VOD ATM PSTN ISDN IP GSM

ICONS
the ATM network). Two of the workstations have a

Anttila Stockmann BSP-x BSP-x videocamera with a videograbber and a Gravis


ADPCM ISDN MPEG H.261 ATM 8 Mbit/s 9.6 kbit/s 64 kbit/s 2 Mbit/s 9.6 kbit/s
UltraSound (GUS) audiograbber. In the near future these
BSP-x BSP-x
ISDN Address NSAP Address
ATM IP workstation will also have an adapter to ATM network
NSAP Address IP Address (i.e. an ATM card). A special videosoftware will be
driven in the two workstations, for instance IVS (INRIA
Figure 7-8. A framework of BIN MIB. Videoconferencing System). The third workstation will be
kept as a Broadband Intelligent Network component B-

7.11 TMN and BIN SCP, where the control software in driven. (Figure 7-10)
One of the workstations would contain the ATM network
In the previous sections were discussed about the simulator, which would forward cells with the aid of
Broadband IN services. The services were static services VCIs. The network simulator would be static eg. use
which could not be configured by the customer. The PVCs and no signalling configurations could be 'on the
meaning of this stage was just to have a view of BIN and flight'.
its possibilities. The next step is to have a remotely
configurable service database where the customer could

Gr avis Ultr aso u nd


B-SCP Server
configure, for instance his VOD service table, remotely Client
Gr avis Ultr as o u nd

AT Madapter

Videogr abber
AT Madapt er

Vi deo gr abb er

and get the true VOD service capabilities. The aim of this Linux workstation
Camera
stage is to have a TMN configurable BIN service Camera
icr op ho ne

Q.2391
parameters. The customer’s configure would affect the
icrop ho ne

BSCP database (MIB) and naturally also the BSMS,


M

ATM
ATM switch
because of the charging. (Figure 7-9)
Linux workstation
Linux workstation
B-SSP
- Video On
DB Demand
.

B-IN MIB
Figure 7-10. The BIN hardware configuration.

7.13 Proposed services


TMN

ATM VOD The aim of this project is to provide (server part) an


Customer Home shopping
switch
ordinary customer (client part) with BIN services. The
services in table 7.1 will at least be able to be provided.
Service
providers The easisest one is the ordinary telephony service, and the

Lappeenranta University of Technology and Telecom Finland 83


Tutorial on Intelligent Networks

difficultest is the videoconferencing which would need


multicasting capabilities from the Linux kernel and some
changes in the IVS videosoftware. The user interface
would such be implemented with the aid of 'old' software.
The BINAP messages would be implemented with CASN
ASN.1 compiler and the programming itself with the
CVOPS (C-language based Virtual OPerating System)
and later with the object-oriented telecommunications
software tool OVOPS (Object Virtual Operations
System). Here are some designed implementation
methods of certain services.

Videotelepho The IVS software is used to


ny encode and decode the audio and
video stream according to the
H.261 standard. The Graphical
User Interface is used to show the
moving images on to the screen.

VOD It would be using the IVS


videosoftware where the client
would request the B-SCP with a
service (a video) and the server
would then send it along the
ATM network to the client either
encoded with H.261 or MPEG
(Moving Pictures Experts
Group).

Lappeenranta University of Technology and Telecom Finland 84


Tutorial on Intelligent Networks

Hara93 Hara, Veikko, 1651 Siirtyvä tietoliikenne


(Mobile Communications), A course
8. References
held at Lappeenranta University of
Technology, 1993
Abram92 Abramowski, St., et al., A Service
Creation Environment for Intelligent Homa92 Homa, Jonathan, Intelligent Network
Networks, Philips Research Laboratiories Requirements for Personal
Aachen, 1992 Communications Services, IEEE
Communications Magazine, Vol 1., 2,
Ambro89 Ambrosch, W., The Intelligent Network ,
1992
A joint study by Bell Atlantic, IBM and
Siemens, Germany, 1989 I321 CCITT Study Group XVIII, B-ISDN
Protocol Reference Model and its
Appel93 Appeldorn, Menso, Kung, Roberto, et al.,
Application, Geneva, 1991
TMN + IN = TINA, IEEE
Communications Magazine, April, 1993 ISO 7498 Information Processing Systems, Open
Systems Interconnection, Basic Reference
Benne93 Bennett, Ronnie Lee, Switching Systems
Model, Part 3: Naming and Addressing
in the 21st Century, IEEE
Communications Magazine, Vol. 31, 3, ISO 8824 Information Processing Systems, Open
1993 Systems Interconnection, Specification of
Abstract Syntax Notation One (ASN.1)
Duran92 Duran, Jose, International Standards for
International Networks, IEEE ISO 9594 Information Processing Systems, Open
Communications Magazine, February, Systems Interconnection, The Directory
1992
LAN94 LAN Magazine Editors, 2010: The
Forum93 ATM Forum, Introduction to ATM, The Future Networks, LAN Magazine, 1994
ATM Forum, 1993
Lauta93 Lautanala, Kari, Veijalainen, Kari,
Fujio93 Fujioka, Masanobu, Kikuta, Hiroyuki, et Intelligent Network Architecture and
al., Globalizing IN for the New Age, Services with the DX200 Switching
IEEE Communications Magazine, April, System, Workshop proceedings:
1993 Workshop on Intelligent Networks,
Lappeenranta University of Technology,
Garra93 Garrahan, James, Russo, Peter, et al.,
1993
Intelligent Network Overview, IEEE
Communications Magazine, March, 1993

Lappeenranta University of Technology and Telecom Finland 85


Tutorial on Intelligent Networks

Lehti93 Lehtinen, Pekka, Performance and Q932 CCITT Recommendation Q.932,


Overload Modelling of SCP and SSPS Generic Procedures for the Control of
of an IN, Workshop proceedings: ISDN Supplementary Services, CCITT
Workshop on Intelligent Networks, 1992
Lappeenranta University of Technology,
Q1201 CCITT Recommendation I.312/Q.1201,
1993
Principles of Intelligent Network
M3010 CCITT Study Group IV, M.3010: Architecture, CCITT, 1992
Principles for a Telecommunications
Q1202 CCITT Recommendation Q.1202:
Management Network, 1993
Intelligent Network Service Plane
Martik93 Martikainen, Olli, Telecommunications architecture, October, 1992
‘93 (In Finnish), Telecom Finland, 1993
Q1203 CCITT Recommendation Q.1203:
Modar90 Modaressi, Abdi, Skoog, Ronald, Intelligent Network Global Functional
Signalling System No: 7: A Tutorial, Plane architecture, October, 1992
IEEE Communications Magazine, July,
Q1204 CCITT Recommendation Q.1204:
1990
Intelligent Network Distributed
[Molin] Molin, K., Martikainen, O., Intelligent Functional Plane architecture, COM
Network Tutorial, Lappeenranta XI-R 208-E, April, 1992
University of Technology & Telecom
Q1205 CCITT ITU-T Recommendation
Finland, Proceedings of the Second
Q.1205: Intelligent Network Physical
Winterschool on Telecommunications,
Plane architecture, March, 1993
March, 1994

Q1211 CCITT Recommendation Q.1211:


Nerys91 Nerys, C., Operations Systems For
Introduction to Intelligent Network
Intelligent Networks, AT&T
Capability Set 1, COM XI-R 210-E,
Technology, vol. 6, no. 2, 1991
April, 1992
[Pfyff94] Pfyffer, H.K., Standardizations activities
Q1213 CCITT Recommendation Q.1213:
relevant to advanced communications
Global Functional Plane for Intelligent
and services, RMC-meeting 8th March,
Network CS1, COM XI-R 211-E, April,
1994
1992
Q931 CCITT Recommendation Q.931, ISDN
Q1214 CCITT Recommendation Q.1214 &5:
USer-Network Interface layer 3
Distributed Functional Plane for
Specification for Basic Call Control,
Intelligent Network CS1, COM XI-R
CCITT 1992
213-E, April, 1992

Lappeenranta University of Technology and Telecom Finland 86


Tutorial on Intelligent Networks

Q1215 CCITT Recommendation Q.1215:


Physical plane for Intelligent Network
CS-1, COM XI-R 216-E, April, 1992

Q1218 CCITT Recommendation Q.1218:


Interface Recommendation for
Intelligent Network CS1, COM XI-R
217-E, April, 1992

Q2931 ITU-T Draft Recommendation Q.2931:


Broadband Integrated Services Digital
Network (B-ISDN), Digital Subscriber
Signalling No. 2 (DSS 2), User Network
Interface Layer 3 Specification for
Basic Call/Connection Control, 1993.

Raat93 Raatikainen, Kimmo, A Framework for


Evaluating the Performance of IN
Services, Workshop proceedings:
Workshop on Intelligent Networks,
Lappeenranta University of Technology,
1993

Roger90 Rogerson, David, The Intelligent


Network: Market Strategies, Ovum
Ltd., 1990

Vande92 Vandenameele, UPT, a new dimension


in telecommunications provided by IN,
1992

Wyatt91 Wyatt, George, Barshefsky, Alvin, et al.,


The Evolution of Global Intelligent
Network Architecture, AT&T Techical
journal, Summer 1991

Lappeenranta University of Technology and Telecom Finland 87

You might also like