Professional Documents
Culture Documents
Copenhagen 28.-31.8.1995
Abstract
The development of telecommunications technology and the need for more advanced services has created
projects on standardization of international Intelligent Networks (IN). The standards of Intelligent Networks
define IN in an abstract point of view, so it leaves the service providers the decisions on their own
implementations. The first standard sets of IN are Bellcore’s AIN.0 and the CCITT’s Capability Set 1 (CS1).
They define the basic services of IN, additional features such as rapid service introduction and a flexible
architecture that provides future expansion to further IN Capability Sets. The standardization organisations,
such as CCITT and ETSI, work hard to help the service providers to implement their IN architecture in order to
be able to provide international IN services. This kind of architecture is better known as Global Intelligent
Network architecture and it should be taken into consideration already in the early implementations of IN. This
paper presents some history of telecommunications technology, an overview of IN and its services and some
additional discussion on the future broadband IN.
Contents
Abbreviations
1. PREFACE 1
2. INTRODUCTION 2
4.1 Overview of IN 16
4.1.1. Origins of IN 16
4.1.2. IN standardization 18
4.1.2.1 IN standards bodies 18
4.1.2.1.1 ETSI 18
4.1.2.1.2 CCITT 18
4.1.2.2 Phased standardization 19
4.1.2.3 Structure of CCITT IN standards 19
4.1.2.4 Capability Set 1 20
4.1.2.5 IN CS1 Services 21
5. CHANGES IN BUSINESS 62
5.3 IN services 64
5.3.1 Benefits of IN 64
5.3.2 Cost structure 65
5.3.2.1 Initial cost of IN 65
5.3.2.2 Operational costs of IN 66
5.3.2.3 Basic call production costs 66
5.3.3 Service portfolio 66
5.3.3.1 Operators capability of offering services 66
5.3.3.2 Sales of service portfolio 66
5.3.3.3 Service development time frames 67
7. BROADBAND IN 76
7.1 Introduction 76
7.8 BINAP 80
7.8.1 BINAP-messages 80
8. REFERENCES 85
ABBREVIATIONS
AAB Automatic Alternative Billing
AC Application Context
AD Adjunct
AP Application Process
ATT Attendant
AUTC Authentication
B-IN Broadband IN
CD Call Distribution
CD Compact Disk
CD-ROM Compact Disk-Read Only Memory
CF Call Forwarding
CS Capability Set
CW Call Waiting
DC Detection Capability
EC European Community
EF Elementary Function
FC Functional Component
FE Functional Entity
FMD Follow-Me-Diversion
FPH Freephone
HP Hewlett Packard
IN Intelligent Network
IP Intelligent Peripheral
MMC Meet-Me-Conference
N_ID Network ID
O-O Object-Oriented
PE Physical Entity
PN Personal Numbering
rN relationship N
S_ID Service ID
SF Service Feature
SP Service Plane
SS Service Subscriber
U_ID User ID
UP User Part
VC Virtual Channel
VOT Televoting
VP Virtual Path
The batch functions are for example realizations of the points. Furthermore, the long development time frames
money transfer requests such as payment of salaries every and the then-available technologies favored producing
month ar any account transfers. These computer systems this new service by slightly rearranging the internal
need to serve the realtime queries and give responses to structure of the switching systems and “squeezing in” the
thousands of locations worldwide. new capability. The end result was that DDD increased
considerable network-related data in the local switches
and also added new functions related to the network
2.2 Switching systems development
connection capabilities into the local switches. On many
From 1870’s to 1950’s, the primary focus of swithing of the existing switches, this involved adding specialized
system development was on producing better “boxes” to correctly interpret the new dialed numbers and
technologies for permitting two people to engage in voice route them to the correct places for proper DDD
communications over larger and larger distances and to connectivity.
make this technology more readily available, cheaper, and
To get some idea of the development of technology
more reliable. During this period the industry moved
associated with the interconnection aspects of the
from local calls being handled by operators with plug
telecommunications at that time, we can look at one of
boards, to step-by-step switches, to panel switches, to
the services we consider basic today. In 1956, the first
crossbar switches and to Stored Program Controlled
undersea cable using repeaters was activated at a cost of
(SPC) switches. It is interesting to remember that in 1925
about $6 million/circuit resulting in a cost of about
one of the most significant breakthroughs was the
$75/minute. By 1976, the cost per circuit was reduced by
separation of the connection control activities from the
a hundredfold, thus permitting later developments to
maintenance of the actual connections during an active
focus more on providing various services beyond
call. This change, over time, allowed the switching
connection. One of the driving forces for more complex
systems to reuse the more complex resources of the
services at this time was the reduction in the cost of the
switch (those used for initiating and setting up a call),
basic connections so that groups of customers with
thus ending an era of having to duplicate these costly
specialized needs came to the market asking for
resources and having them tied up for the entire duration
capabilities beyond simple connectivity. This was the
of a call. One of the major implications of switching
beginning of the transition period in which the structure
systems development during this period was that almost
of the telecommunications industry was changing away
all the information about how connections were to be
from the former connection focus toward a new service
created resided on the individual switches, specifically,
focus. However, the pace of change was slow given the
subscriber data, information about how to provide the
technological problems that still had to be overcome to
limited functions available at that time, and implicit
provide fast and economical connections with high
network information were all contained in each switch
quality. Thus, there was no driving need to reorganize
Benne93.
the basic structure of what existed; nor was there any real
In the 1950’s, Direct Distance Dialing (DDD) began to be guidance as to what kinds of services the customers
deployed as a new service, but this was still a would be willing to purchase as a service marketing was
continuation of the general focus to provide in its infancy Benne93.
telecommunications connections between two fixed
During the 1960’s and 1970’s, the requests for additional a large expansion of the types of information being placed
services began to grow, but the pace was rather slow by on the switches, e.g., variations of call models, more
today’s standards since the technology to support these network-related information was brought into the
new services was not readily available on the general switches, and data under the control of the end users was
market. Since the new SPC-exhanges were able to swith moved onto the switches (speed calling lists, centrex data,
64 kbps connections transmitted over digital PDH etc.). As this data was moved onto the switches, the
systems, it was a natural idea to propose this capability as programs to manipulate the data and ensure its integrity
a basis for data communications. This was the birth of also had to be installed in the switches. This resulted in
the ISDN-concept (Integrated Services Digital Network) the switches becoming also very general data control and
where two digital 64 kbps data channels and one digital usage systems Benne93.
16 kbps signalling channel was provided to the
As we entered the 1980’s, the advanced computer
customers. ISDN was an important concept since the
technology started to penetrate from industrial and office
current service-driven thinking was created during its
use also to low end products. Computer technology
development. For example, the other 64 kbps channel
became as an embedded technology in customer
could be used for speech and the other for data
equipments such as faxes and portable phones, and as a
transmission simultaneously. The whole capacity of 128
control technology for the management and intelligent
kbps could also be used for a reasonably high quality
control of networks. The computer technology
compressed real time video connections. The availability
breakthrough was facilitated by the introduction of open
of ISDN growed, however, much slower than was
computer platforms (UNIX and Personal Computers,
expected. The reasons for this were the existing large
PCs), the fast reduction of cost in computing and the
installation base of analogous switching and transmission
networking of PCs, minicomputers and mainframes. The
systems incapable to support digital channels. Once
PCs provided a general platform for digital customer
again, it was more economical and easier to “squeeze” the
premises equipments, capable to communicate via Local
new capabilities into the existing switching systems than
Area Networks and Public Networks. This, in conjunction
to change the switches and have to replace the embedded
with the lowering of transmission and interconnection
base with newer technologies. This slow evolution
service costs, resulted in an exponential growth in the
process was aided by the small market base for the newer
demand for newer and more flexible telecommunications
services.
services. Another major factor driving toward more
For example, the office automation technologies available specialized services was the liberalization and
were not very advanced and did not produce digital data competition in telecommunications business. In the
storage and transfer. Also, the derivative technologies United States the operator competition started with the
associated with the growth of computers, personal breakup of the Bell System and resulting competition,
computers, and microchip technology had not reached a where services were the factor that differentiated one
state where they were demanding telecommunication carrier form another. Furthermore, with diversiture, the
services much beyond classical interconnectivity services. former local operating companies were permitted to make
instructions into one anothers’ traditional service areas
During this period, the efforts to put more and more new
and, to do this effectively, they needed to have something
service capabilities onto the switching systems resulted in
to offer that was not available from the local service
Figure 2-3. Turnover Value of Service Types Mobile Telecommunications System). UMTS was
researched in the RACE program of EC (European
services and is not expected to be introduced before the technology is also maturing and will provide a cost
year 2000. effective platform for service provision. When the
broadband customer access will be available, interactive
There has also been proposals for still higher speed
business and consumer services based on video and
mobile networks such as MBS (Mobile Broadband
multimedia will become possible. Common to all these
System), which could support bit rates up to 34 Mbps.
developments will be the computer controlled structure of
However, the architectures of these proposed networks
modern telecommunications, where protocols, application
are still open, and they will depend heavily on how the
technology and resource management are key factors.
control of mobility and intelligence will be distributed
over the network.
2.3.2 MEDIA
same channel that is used for speech) Modar90; call set- Transport
number of trunks. Modar90 CCITT published this new it provides a connectionless message transfer system that
signalling protocol stack SS7 (Signalling System No. 7) enables signalling information to be transferred across the
based on CCITT OSI (Open Systems Interconnection) network to its desired destination. Functions are included
in MTP that allow system failures to occur in the network 3.1.2 User Part
without adversely affecting the transfer of signalling The User Part forms the most upper layer of the SS7
information. So the overall purpose of MTP is to provide protocol stack that use the services provided by the lower
a reliable transfer and delivery of signalling information layers SCCP and MTP. User Part functions are ISDN-UP,
across the signalling network and to have the ability to TCAP (Transaction Capabilities Application Part) and
react and take necessary actions in response to system and OMAP (Operations, Maintenance, and Administration
network failures to ensure that reliable transfer is Part). The ISDN-UP is not discussed in this paper. TCAP
maintained. The first level of MTP presents the signalling refers to the set of protocols and functions used by a set
data link functions. A signalling data link functon is a of widely distributed applications in a network to
bidirectional transmission path for signalling, consisting communicate with each other. TCAP directly uses the
of two data channel operating together in opposite service of SCCP. Essentially, TCAP provides a set of
directions at the same data rate. It fully complies with the tools in a connectionless environment that can be used by
OSI’s definition of the physical layer. Level 2 of MTP an application at a node to invoke execution of a
presents the signalling link functions. The signalling link procedure at another node and exchange the results of
functions correspond to the OSI’s data link layer. such invocation. As such, it includes protocols and
Together with a signalling data link, the signalling link services to perform remote operations. It is closely related
functions provide a signalling link for the reliable transfer to the OSI Remote Operations Service Element (ROSE).
of signalling messages between two directly connected The OMAP of the SS7 protocol stack provides the
signalling points. The third level of MTP presents the applications protocols and procedures to monitor,
signalling network functions. They correspond to the coordinate, and control all the network resource that make
lower half of the OSI’s network layer, and they provide communications based on SS7 possible. Modar90
the functions and procedures for the transfer of messages
between signalling points, which are the nodes of the
3.1.3 Signalling network structure
signalling network. Modar90
users at a node. Modar90 signalling links connecting the signalling points together.
(Figure ) As alluded to earlier, a signalling point that
transfers messages from one signalling link to another at
level 3 is said to be a STP (Signalling Transfer Point). purposes: several network and devices, digital and
Signalling points that are STP’s can also provide analogic transmission systems, circuit- and packet
functions higher than level 3, such as SCCP and other switched data networks, public exchanges and PABX’s
level 4 functions like ISDN-UP. When signalling point (Private Access Branch Exchange).
has an STP capability and also provides level 4 functions
TMN is intended to support different management based
like ISDN-UP, it is commonly said to have an integrated
areas. These five functional areas are:
STP functionality. When the signalling point provides
only STP capability, or STP and SCCP capabilities, it is
Performance management
commonly called a stand-alone STP. Signalling links,
fault management
STP’s (stand-alone and integrated), and signalling points
with level 4 protocol functionality can be combined in configuration management
many different ways to form a signalling network. The
accounting management
SS7 Network Services Part protocol is specified
security management
independent of the underlying signalling network
structure. However, to meet the stringent availability
requirements given below (e.g., signalling route set
The functionality of TMN consists of the following
unavailability is not exceeded ten minutes per year), it is
subjects: Error! Reference source not found.
clear that any network structure must provide
redundancies for the signalling links, which have the ability to exchange management information
unavailabilities measured in many hours per year. In most across the boundary between the telecommunications
cases the STP’s must also have backups. Modar90 environment and the TMN environment.
the ability to convert management information from
The worldwide signalling network is intended to be one format to another so that management
structured into two functionally independent levels: the information flowing within the TMN environment
national and international levels. This allows numbering has a consistent nature
plans network management of the international and the the ability to transfer management information
different national network to be independent of one between locations within the TMN environment
another. A signalling point can be a national signalling the ability to analyse and react appropriately to
point, an international signalling point, or both. If it management information
serves both, it is identified by a specific signalling point the ability to manipulate management information
code in each of the signalling networks. Modar90 into a form which is useful and/or meaningful to the
management information user
3.2 Telecommunications Management Network the ability to deliver management information to the
management information user and to present it with
Telecommunications Management Network (TMN) is a the appropriate representation
generic, management-oriented architecture, intended to be the abilty to ensure secure access to management
used for all kinds of management services. Appel93 It information by authorized management information
has been defined in the CCITT M.3000 series standards. users
According to the concept it intends to meet several
environment being manages is distributed, network and they are specified more entirely with the lower layer
management is a disributed application. This involves the attributes.
exchange of management information between
management processes for the purpose of monitoring and
controlling the various physical and logical networking
resources (switching and trasmission resources). Error!
Reference source not found.
Figure -4. Interaction between Manager, Agent and 3.3.1 The need for IN
managed objects. In the past few years the development of
In TMN the manager uses polling method to get the telecommunications networks has been rapid. The
information from the agents. The agents store the telecommunications network functions before were
statictics information in their databases that are called controlled mainly by operators. The desire to share data
MIBs (Management Information Base). A MIB is a and distribute application processing among network
conceptual database structure. It represents the set of elements, the need for standard interfaces between them
managed objects within a managed system. The structure Garra93 and user demands for more sophisticated
of the MIB is often showed in the form of a tree. This tree telecommunications services has changed the controlling
is called a Management Information Tree ( MIT). (Figure - of network elements notably. The telecommunications
5) The tree is organized in a hierarchical way. At the network elements today are controlled by the network
upper parts of the tree resides the most meaning attributes operator, the service provider or the customer himself.
To integrate the control and management of different 3.3.2 Definition of Intelligent Network
services inside the operator, or to be able to provide third Intelligent Network (IN) is an architectural concept for
party control and management services, control and the operation and provision of new services which is
management interfaces with software support are needed. characterized by [Q1201]:
The development of IN architecture was initiated by - extensive use of information processing techniques;
Bellcore in USA almost ten years ago in order to help the
Regional Bell Operating Companies to become more - efficient use of network resources;
The objective of IN is to allow the inclusion of additional - portability of network functions among physical entities;
The network architectures, so far, have developed almost (PSTN) mobile, packet switched public data network
independently of each other. This point of view, of (PSPDN) and integrated services digital network (ISDN)
course, causes the network operators and service - both narrowband-ISDN (N-ISDN) and broadband-ISDN
3.4 Numbering and Services USID: User service identifier. A USID uniquely identifies a service
users’ access points were separateded from each other If two terminals on an interface subscribe to the same service profile,
with the Network ID (N_ID). This N_ID was at the early then the two terminals will be assigned the same service USID.
telecommunication systems the telephone number that did However, two different TIDs are required to uniquely dentify each of
not support any mobility at all. The introduction of the two terminals.
4.1 Overview of IN
As with the past telecommunications technology, it was
not desirable to introduce short term services, because of
The term Intelligent Networks (IN) is used to describe an
the long implementation and development period. Now,
architectural concept which is intended to be applicable to
with IN technology it is possible to introduce new
all telecommunications networks and aims to ease the
services rapidly without affecting the available services.
introduction and management of new services.
IN defines a large set of standards that describe the
The objective of IN is to allow the inclusion of additional interfaces between different network control points. With
capabilities to facilitate provisioning of service, only specifying the interfaces IN makes it possible for
independent of the service or network implementation in vendor systems to provide with different products and ,of
a multi-vendor environment. Service implementation course, for operators to use any of these products in their
independence allows service providers to define their own network configuration. IN includes also capabilities for
services independent of service specific developments by other than operators to introduce new services into the
equipment vendors [Q1201]. telecommunications network. This will change the
structure of the telecommunications business, which is
Network implementation independence allows network
the main concern in the section 5 of this paper.
and service operators to allocate functionality and
resources within their networks and to efficiently manage The IN’s main advantage is the ability to control
their networks independent of network implementation switching and service execution from a small set of
specific developments by equipment vendors. Intelligent Network nodes known as Service Control
Points (SCP). SCPs are connected to the network
switches (known as Service Switching Points) via a
4.1.1. Origins of IN
standardized interface; CCITT Signalling System No. 7.
The Intelligent Networks is a telecommunications
The SS7 will facilitate a multi-vendor SCP and SSP
network services control and management architecture.
marketplace, and the standardization of application
In February 1985, Regional Bell Operating Companies
interfaces allows a multi-vendor software marketplace for
(RBOC) submitted a Request For Information (RFI) for a
SCP applications (that is, the service control logic and its
Feature Node concept with the following objectives
related data) (Figure -1). The SSPs detect when the SCP
Ambro89:
should handle a service. The SSP forwards a standardized
Support the rapid introduction of new SS7 (TCAP) message containing relevant service
services in the network information. Via the TCAP message, the service control
Help establish equipment and interface logic in the SCP directs the SSPs to perform the
standards to give the RBOCs the widest individual functions that collectively constitute the
The IN’s long term goal is the ability to introduce new IN/1 requires updates in the SSP and SCP in order to
services, or change existing services quickly, without support a new service. A typical IN/1 service is the
having to adapt SSP software (only parameters or trigger Green Number Service (GNS) with which a subscriber
updates). The adaptation will be confined to the SCP can call a number free of charge. The SSPs contain
where parameters or stimuli are updated. This goal was triggers (such as the value of the dialed digits) that tell
first planned by Bellcore to be achieved in two stages: the SSP to send a message to an SCP in order to get
IN/1 and IN/2 Ambro89 IN/1 definitions introduced the information about the destination to which the call
term Intelligent Network in 1986 and in 1987 IN/2 should be routed. Migration from IN/1 to IN/2 implies
definitions were introduced. In 1988 IN/2 was delayed significant changes in the SSPs to accomodate new
and IN/1+ was introduced instead. In 1989 Bellcore services.
abandoned IN/1+ for several reasons, some being
problems in the technology and lack of multivendor Stage 1: IN/1
Stage 2: IN/2
4.1.2. IN standardization
4.1.2.1.1ETSI
An Intelligent Network is able to separate the to define European standards in areas where quick
specification, creation, and control of telephony services response is required for technical development
market opportunities, without having to rely on lenghty in 1989. Study Group XI.4 is responsible of the
cycles for implementing them entirely on switching standardation. CCITT expects that the specification and
fabric. Ultimately, service creation, or at least service deployment of IN will continue over a number of study
customization, can be extended to subscribers Homa92. periods. CCITT name has changed to ITU (International
Telecommunications Union) and there the Special Interest
The original IN concepts IN/1 and IN/2 were not Group (SIG) is T (ITU-T). Its approach to the
considered sufficient to support vendor independence development of IN standards assumes that it is necessary
and open interfaces, and extensive standardization to start with a minimum set of criteria which are
sufficiently open ended that they can evolve to meet the Figure -2. Phased standardation of IN.
needs of the long-term concept as this becomes a practical
reality. Roger90 4.1.2.3 Structure of CCITT IN standards
telecommunications network operators and equipment given CCITT’s objective of evolving IN from existing
vendors in the world. Study Group XVIII also is involved networks. The latter approach was service-driven and it
in the initial set of IN standards, and is sharing focused on identifying a set of IN CS1 services and
responsibility for the Introductory Recommendations. At Service Features. Then driving these down through the
these meetings, there is an obvious willingness to INCM in order to identify the set of service-independent
strongly focus on achieving a realistic initial set of IN capabilities for IN CS1, evolvable to the target set of IN
capability, which is both technically implementable and capabilities, and verify that this set could be supported by
commercially deployable.Duran92 the functional and physical architectures defined via the
“bottom-up” approach Garra93.
Recommendation Q-Series Intelligent Network
Q.1200 Recommendations Structure
IN CS1 defines capabilities of direct use to both
Recommendation Principles of Intelligent Network
Q.1201 Architecture manufactures and network operators in support of circuit-
Recommendation Intelligent Network - Service switched voice/data services either defined or in the
Q.1202 Plane Architecture
process of being defined by CCITT. The primary
Recommendation Intelligent Network - Global
Q.1203 Functional Plane Architecture characteristic of the target set of IN CS1 services is that
Recommendation Intelligent Network - Distributed they apply during the setup phase of a call or during the
Q.1204 Functional Plane Architecture release phase of a call. CCITT chose this single-ended
Recommendation Intelligent Network - Physical service characteristic to limit the operational,
Q.1205 Plane Architecture
implementation, and control complexity for IN CS1.
Recommendation Intelligent Network - Application
Q.1208 Protocol General Aspects Even with this limitation, it may be expected that
Recommendation Intelligent Network - Introduction equipment suppliers will support interworking of IN CS1
Q.1211 to Intelligent Network Capability
Set 1 capabilities with existing switch-based services, including
Recommendation Intelligent Network - Global more complex services such as those that apply during the
Q.1213 Functional Plane for CS1 active phase of a call. For example, IN CS1 routing,
Recommendation Intelligent Network - Distributed charging, and user interaction capabilities may be used to
Q.1214 Functional Plane for CS1
customize or improve existing switch-based services to
Recommendation Intelligent Network - Physical
Q.1215 Plane for CS1 better satisfy market needs. Garra93
Recommendation Intelligent Network - Intelligent
Q.1218 Network Interface Specifications It is anticipated that CS1 recommendations of CCITT and
Recommendations Intelligent Network Users guide ETSI will be adopted world-wide. This can help to
Q.1219 for Capability Set 1
develop open interfaces between the SSP (Service
Switching Point) and SCP (Service Control Point), thus
Table -2. IN CS1 recommendations.
putting into effect one of the important goals of the IN,
In defining IN CS1, CCITT applied the INCM
namely vendor independence. Lauta93
(Intelligent Network Conceptual Model) using both
“bottom-up” and “top-down” approaches. The former
4.1.2.5 IN CS1 Services
approach focused on modelling the capabilities of
existing networks in terms of functional and physical Allthough, by nature, the IN is a service independent
architectures that could evolve the target IN architecture, architecture, it is relevant to describe the general CS-1
The target set of CS-1 defines several services (Table -3) Credit Card Calling Security Screening (SEC)
(CCC)
and service features. A service is a stand-alone
Call Distribution (CD) Selective Call Forward on
commercial offering, characterized by one or more core Busy/Don’t Answer (SCF)
Service Features, and can be optionally enhanced by other Call Forwarding (CF) Split Charging (SPL)
Service Features. A Service Feature is a specific aspect of * Completion of Call to Televoting (VOT)
Busy Subsrciber (CCBS)
a service that can also be used in conjunction with other
* Conference Calling Terminating Call
services/Service Features as part of a commercial (CON) Screening (TCS)
offering. It is either a core part of a service or an optional Call Rerouting User-Defined Routing
part offered as an enhancement to a service. Q1201 The Distribution (CRD) (UDR)
service composition and Service Features will be Destination Call Routing Universal Access Number
(DCR) (UAN)
discussed more precisely later on.
Follow-Me-Diversion Universal Personal
(FMD) Telecommunications
(UPT)
Freephone (FPH) Virtual Private Network
(VPN)
capabilities are also referred to as (telecommunication) concept that meets the needs of telecommunication
services: Network requirements span the ability to create, service providers to rapidly, cost effectively, and vendor-
deploy, operate and maintain network capabilities to independently satisfy their existing and potential market
provide services. needs for services, and to improve the quality and reduce
the cost of network service operations and management
Service and network requirements can be identified for Garra93. In [Q1201] the following overall service
the following areas of service/network capabilities: requirements are given when defining the IN architecture:
service creation, service management, network
management, service processing and network - it should be possible to access services by the usual user
- Service creation: An activity whereby - it should be possible to access services that span multiple
- Service management: An activity to support the service may be deactivated at the end of the period;
coordinated way, such that basic and supplementary functions in several networks;
Service requirements for service creation refer to the providers to define their own services, independent of
network capabilities that are used by network operators service-specific developments by equipment suppliers.
for the provision of service creation services to
CS1 is intended to address services with high commercial
customers.
value, focusing at addressing flexible routing, charging,
Service requirements for service management refer to the and user interaction services. The list of benchmark
network capabilities that are necessary for the provision services and features will be listed later on.
of service management services to customers. Standardization of these services, however, is not
CCITT’s role. An important characteristic is that the
Service requirements for service processing refer to the
services will be technologically feasible and
network capabilities that are necessary for the provision,
understandable, but do not significantly impact existing
from a customer's point of view, of basic and
deployed technology. In this context, services have been
supplementary services by an IN-structured network
categorized by CCITT as follows: Duran92
[Q1201]. The IN is primarily a network concept that
aims for efficient creation, deploynent and management All type A services are invoked on behalf of and
of supplementary services that enhance basic services. directly affect a single user. Most type A services
Hence, from a customers point of view the provision of can be invoked only during call setup of tear down
services is transparent, the customer is unaware whether and fall in the category of “single-user, single-
the service is provided in an IN way. Service processing ended (no requirements for representing end-to-end
requirements can be identified for service and access messaging or control), single point-of-control (no
capabilities. The service capabilities of IN can be applied requirement fro representing interaction points
to the support of supplementary services for the following between multiple service logic programs), and
basic services [Q1201]: single-bearer capability (one media profile)”. Type
A services may be used in conjunction with other
- bearer services including speech, audio and data
services, switch-based or not, of any type, to form
a more complete service package.
- teleservices as telephony, telefax and videotex
- broadband distribution services Type B services can be invoked at any point during
the call. These services may be invoked on behalf
The access capabilities of IN should be applicable to all of and directly impact one or more users. Feature
telecommunications networks, such as Public Switched interaction and arbitration, and topology
telecommunications Networks (PSTN), including manipulation are capabilities that need to be
Integrated Services Digital Networks (ISDN), both addressed to deploy these services. Note that it is
narrowband and broadband, packet-switched public data possible to use type A capabilities to enhance some
networks, and mobile networks. Allthough, IN CS1 existing type B services.
enables only the use of PSTN, PLMN (Public Land
Mobile Network) and ISDN, IN should enable service
The services addressed by CS1 fall under type A services. Network requirements for service creation refer to the
The type A category lead to a series of advantages in the network capabilities that are necessary from a network
context of CS1 standardization. First, they represent a operator point of view for the creation of new
wide range of services of proven value. Second, these supplementary services. The service creation process
services depend on well-understood control relationships consists of specification, development and verification
between network components and this represents an steps.
achievable target within required time frame of IN CS1
Network requirements for service management refer to
product deployment in 1993. Finally, complexity in the
the network capabilities that are necessary from a
transition to rapid service delivery process is minimized
network operator point of view to support the proper
both for service provider and for the equipment
operation of services
manufacturer Duran92.
Overall network requirements of IN are stated in [Q1201] from a network operator point of view, of basic and
- there is a need for communication protocols that allow - standardized communication between network
flexibility in the allocation of functions functions via service independent interfaces.
- it should be possible to create new services from network To achieve the goal of fast service implementation, the IN
functions in a cost and time efficient manner Service Processing Model is introduced (Figure 4-3), and
will be studied here in some detail.
- it should be possible to quarantee the integrity of the
Figure 4-3. IN Service Processing Model. Thus, by changing logic at the service control point and
modifying network data, a new service that uses existing
The three main elements of this model are: the basic call
network capabilities can readily be implemented.
processes, the "hooks" that allow the basic call processes
to interact with IN service logic, and IN service logic that
In addition In service logic can decide to terminate an
can be "programmed" to implement new supplementary
interaction session with the basic call process. The basic
services. For these elements the main principles are
call process will then resume its execution as specified by
described below:
the IN service logic. In order to allow fast service
implementation, the IN service logic should have a
- The basic call process should be available all
logical view of the network resources that constitute the
over the network and is designed to support, with optimal
basic call process and additional (specialised) network
performance, services that do not require special features.
functions. For proper service processing, the following
In order to achieve flexibility in service processing, the
principles apply:
basic call process needs to be modularized into service-
independent sub-processes such that these can be
- it should be possible to distribute resources
executed autonomously (without interference from the
between services in a well balanced way;
outside during execution).
- it should be possible for IN supported services
- "Hooks" are to be added to the basic call process
to share resources with non-IN supported
forming the links between the individual basic call sub-
services;
processes and the service logic. The "hooks" are able to
start an interaction session with the IN service logic. For - it should be possible to provide a different
this it should continuously check the basic call process method of resource data management from the
for the occurrence of conditions on which an interaction current embedded method;
session with IN service logic should be started. During an
- it should be possible to introduce IN supported
interaction session the basic call process can be
services specific resources.
temporarily suspended.
- it should model the basic call processes (each service implementation independence
individual basic service may require its own IN
basic call process); network implementation independence
Figure 4-4 IN Conceptual Model Error! Reference The Physical Plane models the physical aspects of IN-
source not found. structured networks. The model identifies the different
The Service Plane represents an exclusively service- physical entities and protocols that may exist in real IN-
oriented view. This view contains no information structured networks. It also indicates which functional
whatsoever regarding the implementation of the services entities are implemented in which physical entities.
the basic call process SIBs. This mapping is related to the vendors must be able to develop Physical Entities based
service creation process. on the mapping of Functional Entities and the standard
interfaces. Q1201
- GF plane to distributed functional (DF) plane:
Each SIB identified in the GF plane must be present in at
least one FE in the DF plane. A SIB may be realised in
more than one FE. Thus, cooperation of several FEs may
be needed. The service logic in the GF plane maps onto
one or more DSLs in the DF plane. This mapping is
related to the service creation process.
relationships from the Distributed Functional Plane may Entities (PE) used by IN. It also describes the interfaces
map into an interface on the physical plane. The physical between PEs and which IN functionalities are included
plane architecture describes how functional architecture into them from the Distributed Functional Plane and
map into Physical Entities and interfaces Garra93. Also which of them are just optional entities.
SSP ( Service Switching Point) is a Physical Entity in the communicate with an SCF, but it has the ability to
Intelligent Network that provides the switching determine when IN processing is required. It must send
functionality. To make IN capabilities available to all calls requiring IN processing to an SSP. Q1201
4.3.1.1.4AD Q1201
The SDP contains the customer and network data which system. Ambro89
4.3.1.1.11 SMAP
4.3.1.1.9SMP
The Service Management Access Point provides some
The Service Management Point/Service Management
selected users, such as service managers and customers,
System performs service management control, service
with access to the SMP. One possible use of the SMAP is
provision control, and service deployment control.
to provide one single point of access for a given user to
Examples of functions it can perform are database
several SMPs. The SMAP functionally contains a Service
administration, network surveillance and testing, network
Management Access Function. The SMAP directly
traffic management, and network data collection.
interacts with the SMP. Q1201
Functionally, the SMP contains the Service Management
Function and, optionally, the Service Management
4.3.1.2 Interfaces between PEs
Access Function and the Service Creation Environment
Function. The SMP can access all other Physical Entities. In the Physical Plane Architecture several standardized
personnel manage SCPs and related service applications candidate interfaces to carry the application layer
(programs and databases) in an IN. More than one SMS messages required by IN services. As such, the focus of
may be associated with the IN; the network operating the standardization effort for CS-1 is on the applications
company may want a separate SMS for each IN service or layer protocols. At the application layer, the message sent
a single SMS for several IN services. Ambro89 that the different interfaces carry should reflect the same
semantic content, even though the application layer
Physically, the SMS resides in a multipurpose computer. message may be encoded or formatted differently. For
Processing power and database size requirements example, the messages between the SSF in an SSP and
normally govern the choice of a specific computer. The the SCF in an SCP, Adjunct or SN should contain the
SMS manages a private network consisting of switched same information. The following sections give some
and leased line connected to a set of keyboard or display proposed protocols for use on these interfaces. Q1201
terminals through which network operator and service
The proposed underlying protocols platform for the convey application layer information without affecting
interface between an SCP and an SSP is Transaction the connection state of the call. Q1201
A user is an entity external to the IN that uses IN The functional entities are described independently of
capabilities. IN users may employ the access interfaces how the functionality is physically implemented or
described below to invoke various IN service capabilities. deployed in the network. SIB’s on the global functional
For example, users can affect the routing of a call, send plane are realized on the Distributed Functional Plane by
and receive information from the network, screen calls, a sequence of Functional Entity Actions (FEA) and
and update service parameters. Users are served by resulting information flows. Garra93
4-6). These functionalities are referred to as Functional single location and a subset of the total set of functions
Entities (FE). The information that flows between required to provide a service. One or more Functional
4.3.2.1.1CCAF
The CCAF is the Call Control Agent Function that c) manages the relationship between CCAF
provides access for users. It is the interface between user functional entities involved in a call (e.g.
and network call control functions. It has the following supervises the overall perspective of the
characteristics: It Q1201 call and/or connection instance);
d) provides trigger mechanism to access IN
a) provides for user access, interacting
functionality (e.g. passes events to the
with the user to establish, maintain,
SSF);
modify and release, as required, a call or
e) is managed, updated and/or otherwise
instance of service;
administred for its IN-related functions
b) accesses the service-providing
(i.e. trigger mechanisms) by a Service
capabilities of the Call Control
Management Function;
Function, using service requests (e.g.
setup, transfer, hold, etc.) for the 4.3.2.1.3SSF
establishment, manipulation and release The SSF is the Service Switching Function, which,
of a call or instance of service; associated with the CCF, provides the set of functions
c) receives indications relating to the call required for interaction between the CCF and Service
or service from the CCF and relays Control Function. It Q1201
them to the user as required;
d) maintains call/service state information
as perceived by this functional entity;
a) extends the logic of the CCF to include provides the SCF with access to SSF/CCF capabilities
recognition of service control triggers and resources. It also detects IN call/connection
and to interact with the SCF; processing events that should be reported to active IN
b) manages signalling between the CCF service logic instances, and manages SSF resources
and the SCF; required to support IN service logic instances. The IN-SM
to isolate single-ended service logic instances related to representation of CCF activities that can be analysed to
the calling party from single-ended service logic instances determine which aspects of the BCSM will be visible to
related to the called party for the same call. Within the IN service logic instances, if any, and what level of
scope of CS-1, there is no functionality in the SSF for abstraction and granularity is appropriate for this
handling service feature interactions between the separate visibility.
SSF calling party processes and SSF called party
The BCSM identifies points in basic call and connection
processes.
processing when IN service logic instances are permitted
to interact with basic call and connection control
capabilities. In particular, it provides a framework for
SCF
describing basic call and connection events that can lead
SLPI A
SSF
describing those points in call and connection processing
SCF Access Manager
IN Local
Resource Data
at which these events are detected, and for describing
Manager IN-SM
IN Switching State those points in call and connection processing when the
Model Instance
IN Local
< IN-SSM >
Resource data
> IN-SSM Events > transfer of control can occur.
< REsource Control >
Non-IN Feature
Manager
FIM/CM
Figure 4-8 shows the key components that have been
CCF BCM
Basic Call Manager identified to describe a BCSM, to include: Points in Call
Basic Call
SRF < BCSM >
Resource data
Manager
< Basic Call Triggers >
< Basic Call Events >
(PICs), Detection Points (DPs), transitions, and events.
PICs identify CCF activities required to complete on or
Basic Call
Resource data Bearer Control CCAF
CCAF
more basic call/connection states of interest to IN service
logic instances. DPs indicate points in basic call and
Figure 4-7. SSF/CCF Model connection processing at which transfer of control can
occur. Transitions indicate the normal flow of basic
4.3.2.1.4.1 BCSM call/connection processing from one PIC to another.
The BCSM is a high-level finite state machine description Events cause transitions into and out of PICs.
of CCF activities required to establish and maintain Information Flows [Q1214] (e.g. between SSF/CCF and
communication paths for users. As such, it identifies a set SCF) corresponding to Events and PICs are represented
of basic call and connection activities in a CCF and by Operations [Q1218] and modelled as Application
shows how these activities are joined together to process Service Elements (ASEs), these application protocol
a basic call and connection (i.e., establish and maintain a related concepts are discussed in more detail in chapter
Many aspects of the BCSM are not externally visible to The BCSM for CS-1 should model existing switch
IN service logic instances. However, aspects of BCSM processing of basic two-party calls, and should reflect the
will be the subject of standardization. As such, the BCSM functional separation between the originating and
is primarily an explanatory tool for providing a terminating portions of calls. In addition, though CCAF
functionality is not explicitly modelled in the BCSM, a originating half of the BCSM are described below
mapping is required between access signalling events and [Q1214]:
BCSM events, for each access arrangement supported by
1) O_Null&Authorize_Origination_Atempt
CS-1.
Collected_Info
of authorization to be performed may vary for different types
2
Exit Event:
3 Analyzed_Info
4
4. Routing & Alerting
Route_Select_Failure
- Indication of desire to place outgoing call (e.g., offhook, Q.931 Setup
5
O_Disconnect
message, ISDN-UP IAM message) and authority/ability to place
7
O_Called_Party_Busy
5. O_Active
outgoing call verified (DP 1 - Origination_Attempt_Authorized)
9
6
O_No_Answer
8 - Authority/ability to place outgoing call denied (Exception)
O_Mid_Call
Corresponding Q.931 Call State: 0. Null
Key: Transition
method is in use (e.g., an ISDN user using en bloc signalling, an - Routing address and call type being interpreted. The next route is
incoming SS No. 7 trunk). being selected. This may involve sequentially searching a route list,
case of en bloc signalling, in which case the waiting duration in this PIC
- Authority of originating party to place this particular call being
is zero.) (DP 2- Collected_Info)
verified (e.g., checking business group restrictions, toll restrictions,
3) Analyze_Information place. Waiting for indication from terminating half BCSM that the call
Function: Information being analysed and/or translated according to - Indication from the terminating half BCSM that the call is accepted
dialling plan to determine routing address and call type (e.g., local and answered by terminating party (e.g., terminating party goes offhook.
exchange call, transit exchange call, international exchange call). Q.931 Connect message received. ISDN-UP Answer message received)
(DP 7 - O_Answer)
Exit Events:
- Indication from the terminating half BSCM that the terminating party
- Unable to analyse and translate dial string in the dialling plan (e.g.,
is busy (DP 5 - O_Called_Party_Busy)
invalid dial string) (Exception)
- Indication from the terminating half BCSM that the terminating party
4) Routing and Alerting
does not answer within a specified time period (DP 6 - O_No_Answer)
Functions:
ensure release of resources within the SSF/CCF so that line, trunk, and
Entry Event: Indication from the terminating half BCSM that the call is
other resources are made available for new calls.pt PIC).
accepted and answered by terminating party. (DP 7 - O_Answer)
- A disconnect indication (e.g., onhook, Q.931 Disconnect message, SS7 call/service logic instance. It. Q1201
inappropriately allocated, such as The SDF contains customer and network data for real
time access by the SCF in the execution of an IN
- If any relationships exist between the SSF and SCF(s), send an Error
provided service. It Q1201
information flow to the SCF(s) closing the relationships and indicating
end of the call (see the Call Information Request information flow in
The SRF provides the specialized resources required for available to authorized service managers
the execution of IN provided services (e.g. digit receivers, through the SMAF;
c) may contain the logic and processing The model of the Service Conrol Function and its relation
capability to receive/send and convert to other functional entities is shown in Figure 4-9. The
information received from users; prime function of SCF is the execution of Service Logic
d) may contain functionality similar to the provided in the form ofService Logic Processing
CCF to manage bearer connections to programs (SLPs), and it includes also the SLP execution
Instances (SLPIs), Service Logic Selection/Interaction PE:s SCF SSF/CCF SDF SRF
Manager and Resource Manager. SCP C C
SN C C C C
SLPI is a service application program instance invoked
AD C C
by the SLEE and is used to realize service processing.
SSP O C O O
SLPI is a dynamic entity that actively controls the flow of
IP C
service execution and invokes other SCF functional
SDP C
routines. Functional routines are the functionality of SCF
to cause a sequence of Functional Entity Actions. This SSCP C C C O
SCF
4.3.3 Global Functional Plane
SLP Library
Functional Entity Access Manager in the GFP. In this plane, services and Service Features
are redefined in terms of the broad network functions
required to support them. These functions are neither
SMF SSF SRF SDF service nor Service Feature specific and are referred to as
SIB’s (Service-Independent building Block). Q1201
Figure 4-9. SCF Model
Services identified in the service plane are decomposed
4.3.2.2 Mapping FEs to PEs into their service features then mapped onto one or more
SIBs in the GFP. Each SIB is similarly mapped onto one
The mapping of Distributed Functional Plane FEs to
or more FEs in the Distributed Functional Plane Q1201
Physical Plane Architecture PEs is described here. Also a
(Figure 4-10).
typical scenario of such mapping is shown here. (Table -
4) Q1201
Algorithm Screen
Charge Service Data Management
Compare Status Notification
Distribution Translate
Limit User Interaction
Log Call Information Verify
Queue
Figure 4-10. Service decomposition.
Table -5 The CS1 SIBs.
4.3.3.1 SIB Basic Call Process (BCP) identifies the normal call
process from which IN services are launched, including
IN CS1 contains 14 SIB’s that include algorithm, charge,
Points Of Initiation (POI) and Points Of Return (POR)
compare, translate, basic call process, among others. In
which provide the interface from the BCP to Global
principle many other services described in CCITT
Service Logic (GSL). The GSL describes how SIBs are
Recommendations Q.1211 could be specified. Raat93
chained together to describe Service Features. The GSL
SIBs are standard reusable networkwide capabilities
also describes interaction between the BCP and the SIB
residing in the Global Functional Plane, used to create
chains. Q1201 (Figure 4-11) By definition, SIBs,
services. As such they are global in nature and their
including the BCP, are service independent and cannot
locations need not to be considered as the entire network
contain knowledge of subsequent SIBs. Therefore, GSL
is regarded as a single entity. A Service Feature is
is the only element in the GFP which is specifically
provided by a combination of one or more SIBs. SIBs
service dependent.
have the following characteristics:
Figure 4-11. Modelling of Global Functional Plane. Associated with each CID value is a logical name which
In order to chain SIBs together, knowledge of the is referred to as the CID Field Pointer (CIDFP). If a SIB
connection pattern, decision options, and data required by requires CID to perform its function, there will be an
SIBs must be available. Therefore, the pattern of how SIB associated CIDFP assigned through SSD. For instance,
are chained together must be maintained within the GFP, the Translate SIB’s CID which defines what is to be
and described in the GSL. The GSL described translated is called Information. Q1201
Fixed Parameters These are data parameters one or more logical end points and CID which defines
whose values are fixed for all data parameters specific to that call instance which results
call instances. For instance, the from the execution of that SIB and are required by other
“File Indicator” SSD for the SIBs or the BCP to complete the call service instance.
Translate SIB need to be
specified uniquely for each
occurrence of that SIB in a
given Service Feature. The
“File Indicator” SSD value is
then said to be fixed, as its
value is determined by the
service/Service Feature
description, not by the call
Figure 4-12. Graphic representation of a SIB. Q1201
instance.
Field Pointers Field Pointers identify which
4.3.3.1.3.1 Queue SIB
CID is required by the SIB, and
As an example of SIB representation the Queue SIB is
in doing so provide a logical
described (Figure 4-12). Q1201 The Queue SIB example
location for that data. They are
has been described, because it is a multipurpose SIB
signified by “CIDFP-xxxx”
which can be used in several Service Features at the
where “xxxx” names the data
Service Plane. The task of the Queue SIB is to provide
required. For instance,
sequencing of IN calls to be completed to a called party.
“CIDFP-info” for the Translate
The Queue SIB provides all the processing needed to
SIB will specify which CID
provide queueing for a call, and will specifically: pass the
element is to be translated. If
call if resources are available, queue the call, play
more than one CID is required
announcements to a caller on queue, and when resources
by a SIB to perform its
become available, dequeue the call.
function, then the SSD data
parameters will contain
multiple Field Pointers.
Figure 4-13. The Queue SIB graphic representation. SSD - Max Active
Specifies the maximum number of active
The input parameters for the Queue SIB has been
calls allowed for the resource.
described in the Table -6. The Queue SIB can be used
- Max Number
everywhere the queueing of calls is needed. The Logical
Specifies the maximum number of calls
Start indicates the execution for the SIB.
allowed on queue at a given time.
The output parameters are also specified in the Q1201. - Max Time
The Logical End indicates the result of the execution. The - Specifies the maximum time the call may
parameters for Queue SIB are: Resource available, Call remain on the queue.
party abandon, Queue timer expiry, Queue full, and an - Announcement Parameters
error. Q1201 The Call Instance Data has the following Specify the control values for
parameters and the meanings of output data: Time Spent announcements. The control values which
in Queue (identifies the total time that a particular call can be specified are: Announcement ID
was queued), Error Cause (identifies the specific (specifies which announcement is to be
condition which caused an error during the operation of sent), Repetition Requested (specifies if the
the SIB). In Error Cause the following errors have been announcement is to be repeated), Repetition
identified: Invalid Max Active, Invalid Max Number, Interval (specifies the delay period in
Invalid Max Time, Invalid Announcement Parameters, seconds between repetitions) and Maxium
and Invalid Call Reference. Repetitions (specifies the maximum number
of times the announcement will be
repeated).
- CIDFP-Resource
This CID Field Pointer specifies which Call
Instance Data identifies the resource.
- CIDFP-Error
This CID Field Pointer specifies where in
output Call Instance Data the error cause
will be written.
CID - Call Reference
Identifies the specific call which is a
candidate for queueing.
- Resource
Specifies the data associated with the
CIDFP-Resource which identifies the
resource for which the call will be queued.
The Basic Call Process is responsible for providing basic SIB SSF/SCF SCF SRF SDF
service support data and call instance data defined for The Service Plane (SP) is of primary interest to service
each SIB. Q1201 The GSL will then chain together these users and providers. It describes services and Service
elements (SIBs) to provide a specific service. Features from a user perspective, independent of how the
service is implemented or provisioned in the network.
Garra93
4.3.3.4 Relating the GFP to the DFP
This section describes the mapping of the elements of the The Service Plane illustrates that IN supported services
Global Functional Plane to the Distributed Functional can be described to the end user or subscriber by means
Plane. Functions in the GFP are distributed to Functional of a set of generic blocks called Service Features. A
Entities in the DFP. These FEs are related by information service is a stand-alone commercial offering,
flows, which are use to send information between FEs. characterized by one or more core Service Features, and
Table -7 shows the CS1 SIBs and indicates the FEs can be optionally enhanced by other Service Features.
involved for each SIB. Q1201 Q1201
in the network (for instance, an IN type of * Call Transfer (TRA) Customized Recorded
Announcement (CRA)
implementation is invisible). All that is perceived is the
* Call Waiting (CW) Customized Ringing
network’s service-related behaviour as seen, for example, (CRG)
by a service user. Q1201 In other words, the Service * Consultation Calling Follow-Me Diversion
(COC) (FMD)
Plane provides users and service providers a
* Meet-Me Conference Mass Calling (MAS)
implementation-independent architecture.
(MMC)
* Multi-Way Calling Originating Call
(MWC) Screening (OCS)
4.3.4.1 Service Features
ABbreviated Dialing Off-Net Access (OFA)
The services are constructed of Services Features. A (ABD)
Service Feature is a specific aspect of a service that can Attendant (ATT) Off-Net Calling (ONC)
also be used in conjuntion with other services/Service Authentication (AUTC) One Number (ONE)
Features as a part of commercial offering. It is either a Authorization Code Origin Dependent
(AUTZ) Routing (ODR)
core part of a service or an optional part offered as an
Call Distribution (CD) Originating User
enhancement to a service Q1201 (Table -8). Prompter (OUP)
Call Hold with Personal Numbering
Announcement (CHA) (PN)
Call Forwarding (CF) Premium Charging
(PRMC)
Call Forwarding in Private Numbering Plan
BY/DA (CFC) (PNP)
Call Gapping (GAP) Reverse Charging
(REVC)
Call Limiter (LIM) Split Charging (SPLC)
Call Logging (LOG) Terminating Call
Screening (TCS)
Call Queueing (QUE) Time Dependent Routing
(TDR)
service that can be perceived by the service user. These Attendant (ATT)
Physical Plane looks like) Q1201. The Service Features allowed to exercise certain options in a telephone network. In other
are described in detail in the next chapter. words, the request made by the user is authentic and should be
granted.
dialling numbers are not subjected to call restrictions, e.g., a VPN This service feature allows the called party to automatically
user may not be allowed to access the Off-net Calling service call back the calling party of the last call directed to the called
feature but can reach an off-net number via this feature. party.
This feature allows the definition of abbreviated dialling digit This service feature allows the served user to specify the
sequences to represent the actual dialling digit sequence, i.e., a two percentage of calls to be distributed among two or more
digit sequence may represent a complete dialling sequence for a destinations. Other criteria may also apply to the distribution of
private or public numbering plan. calls to each destination.
This service feature is an originating line feature that allows This service feature allows the user to have his incoming
business subscribers to dial others in their company using a short calls addressed to another number, no matter what the called party
numbering, even if the calling user's line and the called user's line line status may be.
are served by different switches.
Call Forwarding on Busy/Don't answer (CFC)
This service feature allows the called user to forward Call Logging (LOG)
particular calls if the called user is busy or does not answer within a
This service feature allows for a record to be prepared each
specified number of rings.
time that a call is received to a specified telephone number.
Description No. 1
Description No. 1
Description No. 2 the queue, the caller hears an initial announcement informing the
Call Hold with Announcement (CHA) This service feature enables the subscriber, when a call
destination. If the destination is busy, the call may be routed to an This service feature allows the called party to receive a
alternative destination. notification that another party is trying to reach his number while he
subscriber and to reject all the new calls when a threshold of This service feature allows the user to be a member of a set
simultaneous calls is reached. As an option, this threshold may be of VPN users who are normally authorized to make and/or receive
real-time managed by the subscriber. calls only within the group. A user can belong to more than one
CUG. In this way a CUG can be defined so that certain users are
Associated with Call Volume Distribution or Call
allowed wither to make calls outside the CUG, or to receive calls
Distribution, it allows the rerouting of the new calls.
from outside the CUG, or both.
The Consultation Calling service feature allows a subscriber the user will be presented to this terminal access. A registration for
to place a call on hold, in order to initiate a new call for incoming calls will cancel any previous registration. Several users
consultation. may register for incoming calls to the same terminal access
announcements to be played, call distribution, an so on. This service feature allows processing of huge numbers of
(customized) terminating announcement instead of a subscriber This service feature allows the user to reserve a conference
line. The served user may define different announcements for resource for making a multi-party call. indicating the date, time, and
unsuccessful call completions due to different reasons (e.g., caller conference duration. At the specified date and time, each participant
outside business hours, all lines are busy). in the conference has to dial a designated number which has been
party to enter an extra numbering, e.g., through Dual-Tone Multi- This service feature allows a VPN user to access his or her
Frequency (DTMF), or a voice instruction that can be used by the VPN from any non-VPN station in the PSTN by using a Personal
service logic to continue to process the call. Identification Number (PIN). Different sets of calling privileges can
Description No. 1
Off-Net Calling (ONC)
Description No. 2
One Number (ONE)
This feature allows a subscriber with two or more This service feature supports a UPT number that uniquely
terminating lines in any number of locations to have a single identifies each UPT user and is used by the caller to reach that UPT
telephone number. This allows businesses to advertise just one user. A UPT user may have more than one UPT number for
telephone number throughout their market area and to maintain different applications (e.g., a business UPT number for business
their operations in different locations to maximize efficiency. The calls and a private UPT number for private calls), however, a UPT
subscriber can specify which calls are to be terminated on which user will have only one UPT number per charging account.
This service feature enables the subscriber to accept or reject cost of a call to the called party, when he is considered as a value
a call, and in case of acceptance, to route this call, according to the added service provider.
This service feature allows the served user to bar calls from
Reverse Charging (REVC)
certain areas based on the District Code of the area from which the
call is originated.
This service feature allows the service subscriber <(e.g.,
Description No. 1
Split Charging (SPLC)
that can be used for direct routing or as a security check during call
Description No. 1
processing.
time,
This service feature enables to prompt the calling party with
voice instruction that can be used by the service logic to continue to This service feature allows the-served user to apply different
process the call. call treatments based on time of day, day of week, day of
4.3.4.3 IN service modelling Note: The service indicated with a * may only be partially
The idea of IN architecture, especially the Service Plane supported in CS1, because they require capabilities
architecture, is to allow customers to make services for beyond those of type A services.
user want to make services with additional capabilities, Let us consider the following basic servces in detail:
use the combination as a means to providing Credit Card Calling (CCC), Virtual Private Network
communications to other parties. (VPN) and Universal Personal Telecommunications
(UPT). These services are mapped to service features
In recommendation Q.1211 a the following services have
according to Table 4-10 [Q1211].
been described for the use of IN Capability Set 1
Intelligent Network (Table 4-9):
4.3.4.4 Credit Card Calling 1) This service permits to build a private network by
The recommendation Q.1211 describes CCC as follows using the public network resources. The subscriber’s
Because SIBs are being defined for the IN, it is now service circuit node, or the service switching point
possible to develop a Service Creation Environment Wyatt91 In the middle, the signalling network performs
platform to support new services and direct them to the signalling transfer function.
appropriate Physical Entities. In addition, new SCEs must
provide extensive validations for new IN-based services
so they do not have an adverse effect on the overall
operation of the network or the subscribers services.
Wyatt91
The SSP and SCP communicate via CCITT No.7 A service user dials the number, such as 800-beginning.
signalling links using the services of the TCAP, SCCP While translating the number the local exchange detects a
and MTP. M3010 However, at the top of this protocol trigger in the SSP database telling it that this 800 number
stack is the IN Application Protocol (INAP). (in this example 800-NXX-7800) is a pseudo-number
which must be translated Ambro89 by an SCP. The 800-
Figure 4-14 shows how network functions can be grouped
based numbers are usually known as IN numbers. The
in a physical entity. For example, we can package the
local exchange (SSP) sends a TCAP message (containing
Service Resource Function in a Service Switching Point,
the number dialled and other information) over the SS7
Service Circuit Node, or Intelligent Peripheral, based on
network to an SCP. The SCP uses the 800 number to
traffic or customer demands. Similarly the Service
access a database containing the 800 number’s
Control Function can reside in the service control point,
corresponding directory number (Figure 4-15). (This been charged and provided with a charging report from
number does not have to be static, but it could depend on the SMS.
factors like day, time of day, origination, and so on).
After accessing the database, the SCP sends the directory
4.4.3 IN Application Protocol
number (in this example 305-NXX-8800) to the local
The IN Application Protocol (INAP) is intended to be
exchange in another TCAP message. The local exchange
used between the following four functions: SSF, SCF,
uses the directory number to execute translation and
SDF and SRF. The INAP in CS1 is ment to be using the
routing to the subscriber called. .
SS7 protocol stack, but it does not imply that only this
signalling protocol should be used. Q1201
Figure 4-15. IN-based Green Number Service. Figure 4-16. INAP Protocol Architecture.
This principles of trigger detection and database dialog The INAP protocol architecture is based on the OSI
are the basis of all proposed IN services. Ambro89 The Application Layer Structure (Figure 4-16). A physical
above example showed also the flexibility of Intelligent entity has either single interactions or multiple co-
Network architecture. If new 800 numbers are added, ordinated (not discussed here) interactions with other
updating need only be done in the SCP database. Also the physical entities. The Single Asociation Control Function
possibility of mobility shows that IN-like architecture is provides a co-ordination function using Application
quite developed and can handle also the future needs. Service Elements (ASEs), which includes the ordering of
operations supported by ASE’s (based on the order of
The task of a Service Management Station is to manage received primitives) [Q1218]. The SAO represent the
the IN-services. In the above example the SMS could SACF plus a set of ASE’s to be used over a single
have keeped track of the charging of the service usage. interaction between a pair of Physical Entities. If there
The service user would not have been charged because of were need for multiple interactions, the use of MACF
the freephone capability. Instead, the service would have (Multiple Association Control Function) would be
acceptable. In this case, MACF would provide a co-
ordinating function among several SAO’s, each of which Description of each operation is tied with the action of
interacts with an SAO in a remote PE. Q1201 corresponding FE modelling. Each operation is specified
using the operation macro described in Figure 4-17. The
use of Application Context (AC) negotiation mechanism
allows the two communicating entities to identify exactly
what their capabilities are and also what the capabilities
required on the interface should be. This should be used
to allow evolution through Capability Sets. If the
indication of a specific application context is not
supported by a pair of communicating FE’s, some
mechanism to pre-arrange the context must be supported.
Q1201
PCS applications. From a network entity viewpoint, the be used for all kinds of services (real-time or
network access function is conceptually similar to a base management) on top of call-control type services. TMN is
sation system in the mobile communications world. The a generic, management-oriented architecture, intended to
service switching functionality could be implemented in a be used for all kinds of management services. Obviously,
Mobile Switching Center, allowing that center to interact the IN and TMN architectures overlap. For instance, one
with service control residing in other network elements TMN application such as billing and one IN application
(e.g. HLR that resides in the SCP and VLR that resides in such as Freephone must be tightly related because
adjuncts) Wyatt91 (Figure 4-18). Freephone billing should be handled in a consistent way
with TMN billing. This shows that, unless both IN and
TMN architectures are made more consistent, the
interconnection of IN and TMN applications would be
difficult. It is not possible to support two independent
architectures while applications on both architectures
must interoperate. Also, IN is just one part of the whole
network, and as such should be managed with TMN. The encryption, and network reource assignments. At present,
integration of TMN and IN can be considered as an TMN controls telecommunications support for basic
evolution path to TINA Appel93. telecommunications network and IN functions. In the
future, TMN will include functions such as service
creation, service provisioning, service deployment, and
service management. Wyatt91
Figure 4-19 shows network-related functions required for Plane represents with the service designer’s point of view
IN architecture: the Basic telecommunications network, of the services. The TMN architecture does not directly
Intelligent Network, and the Telecommunications provide with aspects of Global Functional Plane.
In order to avoid multiple definitions of management it is call topology such as mobility or conference calling or
possible that IN will be managed through TMN concept. non call associated signalling as needed in mobility.
This is very well stated, because TMN has been widely Such capabilities, as well as standards for SMF and SCEF
accepted as a telecommunications management concept. capabilities, are expected to be provided in CSs beyond
CS1, starting with CS2, on which work began in 1992.
Refinements of CS1 will continue during 1994. The CS2
4.7 Globalizing the IN
with non-call associated signalling, SDF and management
The standards and research activities for Intelligent interfaces will be available in 1995. CS3 providing
Networks so far have focused mostly on its provision in terminal mobility is to be completed in 1997.
Besides multimedia calls, other service examples are Telecommunications Operating Companies are making
advanced, networked conferencing capabilities and software for IN components, such as SCP. Also the TMN
possibly network resource usage reconfiguration during a architecture and its implementation, and the use of TMN
call. In order for such capabilities to be realized, the in managing the Intelligent Network architecture and the
issues identified earlier, and others, will need to be services are under development.
addressed and solved. Duran92
In Finland, the state owned Telecommunications
Beyond the need to support additional capabilities for Operating Company (Telecom Finland Ltd) is doing
types of services more complex than a single-ended, much work in the above areas. The Telecom Finland
single point of control category, there will be need to Intelligent Network architecture has been using Bellcore
specify further interfaces than was possible for CS1. components, and the CS1 upgrade is coming shortly. The
Standardization of a SLEE, in parallel with a SCE, and SS7 network is ready for use and the Open SCP
standard representation for service logic and service data, architecture will become available soon. The problems
which is needed for multivendor implementability, also are still in the management and the service creation areas.
will be required. Duran92 The independent service creation by customers that
require advanced IN capabilities will require quite a lot
Future directions of IN include a distributed architecture
time. When the integration of TMN and IN will be more
using the service-independent platform capabilities of the
entirely accepted and TMN applications management
IN. This platform should allow us to introduce emerging
implemented, the problems concerning remotely creatable
technologies and applications transparently into the
and configurable services by the customer will be
network. Wyatt91
solvable. For this purpose R&D co-operation with
operators and hardware and software manufacturers will
4.9 Current activities of IN be needed.
was obvious that the life cycles of the services were quite
large and not much customer orientation was possible.
5. Changes in business
An example of hardware changes in telecommunications
is the cable technology. The average bandwidth of the
5.1 Technology and services
transmission systems seem to multiply by factor 10 in a
decade. The copper cables that were used by past
The most important trends in the area of business are the
telecommmunications systems needed a lot of
increased use of computers in business and globalization
replacement when runned out of capacity. The situation is
of the markets. The telecommunications industry can be
however different when optical fiber is used. Optical fiber
divided into telecommunications hardware suppliers and
is a flexible transmission media that can be several times
the providers of telecommunications services (operators,
reconfigured, because the bandwidth can be increased
software houses, etc.). The development of tele-
only by changing the active devices that use the fiber. The
communications business depends on changes in the
physical raw bandwidth provided by optical cables will
industry, changes in the telecommunications technology
be far beyond reach in the near future. Optical fiber also
and the development of telecommunications services
provides expences that are almost independent of the
Martik93.
bandwidth.
There has been several major changes in the development
of telecommunications technology. The development of
mobility and higher interconnection bandwidth between
network nodes play an essential role in the changes of
networks and their services. In the eaely
telecommunications, the most important need for the
telecommunications networks was the analogical
telephony service. Later on, at the end of 1980's, with the
use of optical fiber in the transmission systems, the
available bandwidth increased and the customer expences
decreased. Telecommunications networks are becoming
multiservice networks, as already has been specified with Figure -1. Technology transform. Martik93
ISDN, and will provide advanced services based on Faster changes of markets have decreased the life cycle of
mobility and broadband in addition to the digital products. The corporations have to spend more money on
telephony service. product development than before and to seek for partners
to share the expences in the product development.
The past telecommunications technology was mainly
[Martik93] The need for more versatile services is
based on dedicated devices with nonflexible architecture.
obvious.
At the time of reconfiguration of these devices several
changes had to be made to the architecture (programs and The Intelligent Network telecommunications structure
possibly also hardware). As these changes were costly, it will change the market areas. As the computer prices go
down relative to the performance of the unit, the IN nodes
and components will be mainly based on computer services that are provided by the telecommunications
architectures than dedicated electronic devices, which networks are called internationally Advanced Services.
was a great market area in the 'past' telecommunications The voice and data traffic will integrate together with the
business. The selling of hardware will not be the most broadband services and Intelligent Networks. However,
important area of business in telecommunications rather the Advanced Services need broadband networks while
the selling of intelligent nodes, which consist of cost the mobile communications networks today do not
effective standard hardware technology, but running a provide enough bandwidth for these services. That is why
high-technology service oriented software. So software these services will be first introduced at the wireless
will propably become the largest area of business within telecommunications systems and in radio technology after
telecommunications. The service management area of the the demanded bandwidth resources are available.
IN will become an important area of business to the
The main benefits of the IN architecture are the
service providers and operators. These things will change
possibilities to improve the quantity, and to develop new
the market views in computers and software.
sources, of revenue. This is particularly desirable in an
environment with a high penetration of available services
per capita. For most environments, the IN will be a
1980 1990 2000 2010 The most important trends in the area of business are the
increased use of computers in business and globalization
Figure -2. The development of the telecommunications of the markets. Martik93 This means that the use of
The main part of the future data traffic will be produced called 'hardware' level services, such as telephony service
by the LAN’s (Local Area Network) where multimedia or simple data transfer service. The formation of
(e.g. video, voice and data integration) data is transmitted. continental and intercontinental alliances, for example, in
Some of the voice traffic today will move to multimedia Europe has driven down the prices of services in several
The competition with telecommunications services will going to pay more and more for the contents or data
certainly increase. Service providers in the past inside the service than for the technology itself and the
introduced quite similar services, because the rigid expences that has accumulated in the technological
technology enabled just non-value added services and Research & Development period.
there was hardly any tools for differentiation. Broadband
switched transmission and access by ATM leave quite
5.3 IN services
much differentiation space for the services, and the value
is transferred from the pure interconnection to the mobile,
5.3.1 Benefits of IN
value added and media services (Figure 5-3).
The concept of Intelligent Networks has been developed
to achieve some major goals. These are:
In reality these goals are very hard to achieve. IN is not IN element (60 - 70 % of total investment)
the answer for the management problems, nor will it This includes necessary basic hardware and software
automatically generate new revenue. It can be part of the components which are required for IN, and is
solution, but there is much to do before these goals can be around 50-60 % of total purchasing expences. Most
met. Too often required enhancements in other of this is needed for software, concentional
information systems, and redesigning of the operations hardware is minor part of investment. The cost
and organizational structure are neglected or at least are structure of IN element consists of hardware and
not taken into account, when IN investment/introduction basic software (20%; basic SSP including hardware
is planned. and software (typically a switch), IN application in
SSP, SCP and SMS including basic hardware and
5.3.2 Cost structure software, and other equipment and software required
for operating IN), and IN specific software (40%;
5.3.2.1 Initial cost of IN SCP and SMS applications).
The level of investment required for introducing IN Project expences (30 - 40 % of total investment)
network concepts into the network is a relative issue. For Project expences are higher than usual. This is due
large international operators IN investment can normally to the complicated nature of IN concept
be justified based of a cost/benefit calculations made for implementation commonly taking more resources
one service only. For a smaller operator IN is usually a for integration than traditional network development
major investment, which may be critical to do. If IN is projects. The project expences can include: project
introduced as a major network concept through the management, system specification, system
network, IN will have a significant impact on the integration, system testing, and system deployment.
operators on the level of the investment, which is required Integration expences (? % of total investment)
for network development. This part of expences depends on the size of IN
system, its planned level of integration with other
Initial IN investments/expences can be broken down as
systems and so forth. The level of these expences in
follows:
the initial introductory phase of IN is generally
difficult to estimate. Often, integration issues such
as: integration of IN with current network
management systems and integration of IN with
current customer service systems are handled only
after the first IN application is taken into use.
with currently available IN products, portion of based services automatically generate new traffic and
investment which consist of standard hardware and revenue.
software components is relatively low and the major part
of the investment consists of special/tailored software and
5.3.3.1 Operators capability of offering services
project running expences.
That in IN has made it possible to offer new services to
the customers cannot be denied. But one has to remember
5.3.2.2 Operational costs of IN that the possibility of utilizing switches as service
When examining operational costs, attention shall be paid platforms still exists. An operator’s capability to
to those operational costs which are directly related to introduce new services, which are based on IN
operations and management of IN platform components, technology is largely dependent on the operator’s
comprising of hardware and software maintenance capability to manage the complex composition of IN
charges and other operational costs. software and how an IN implementation supports the
flexible management of data in the system. It can be
Associated operational costs are significant portion of the
questioned, if operators have made a good choice in
total costs. The main parts of these costs are marketing,
coming dependent of software houses, as has typically
sales, R&D for the customer end of the product and the
happened, rather than switch vendors what concerns their
costs for supporting systems.
service development capabilities.
costs, which then have to be covered by incoming cash Cannibalism still exists and this is especially common
flow to be able to run financially successful operation. within telecom service sector. Voice services offered by
Telco’s have not developed significantly since the 1960’s.
It can be assumed that basic demand for the utilization of
5.3.3 Service portfolio
telephones has always existed. IN has facilitated in
IN seems to be the only vehicle, which offers operators
packaging service features in new combinations. These
new tools to provide extended call handling capabilities.
combinations have been developed to standard IN
The capabilities may be regarded as a basic element of
services such as Premium Rate, Freephone, Calling Card,
the modern products concept. IN makes it possible to add
UPT, VPN and so forth. But have these IN services
value to basic call handling. These more flexible network
generated new revenues ? Definitely to some extent, but
services may be packaged to suit for different market
all the credit can be given to the IN concept, and when
segments relatively easily. In this respect IN has proven
evaluating the economical impact of IN, this matter has to
to be a useful concept. However, it is not evident that IN
be considered.
5.3.3.3 Service development time frames provide more sophisticated management and a greater
Inmaterial nature of the telecommunications service capacity for IN services. At the beginning of 1990’s
allows better interaction with the consumers when Telecom Finland made a contract to purchase a real IN
developing the service products compared with, for solution, which consisted of dedicated SSP, SCP and
example, manufactuing industry. In this respect, IN has SMS elements. At this time all the business indicators
great potential. Utilization of this potential requires a justified investments of this size. Altogether the IN
comprehensive SCE environment. Useful SCE project lasted for three years and it was a risky project
implementation of these services was based on the distribution. Here we however, refer to services.
expertise Telecom Finland has in digital switching. Telecommunications organizations today and in the past
Through the early implementations Telecom Finland has used to distribute the so called raw services via
been able to gain a dominent position in the enhanced telecommunications networks. They created their revenue
services market in Finland. In this first phase services according to the amount of telephony calls were dialled in
were developed in close co-operation with the customers their network, where they served as operators. What is
of Telecom Finland. Switches were used as service important to notice is that the service provider actually
platforms to avoid unnecessary investments of IN. Some was located in the different place than the paying
of these early implementations are still deployed. customer. Telecommunications can such gain quite
effective and cheap distribution channel, if the prices of
raw data transfer goes noticeably down.
5.4.2 Centralized IN
Soon after the first IN implementations Telecom Finland The same approach as above can also be brought to the
started to investigate potential IN concepts, which could broadband services eg. high-speed image transfer. Think
about the following medical situation: a nurse is taking 5.6 Changes in enterprises
photos of a patient. The nurse itself does not have the
The major changes of organizational structures in this
skills or knowledge to appraise the condition of the
century will also be reflected in network and service
patient. She could use a doctor who is residing 100
operator structures (Figure 5-4). At the beginning of the
kilometres away from the medical centre to give some
20th century there was emphasis in the production of raw
advice. The only thing is that the doctor would have to
materials and agriculture. Then the society became more
take a flight to that centre (expensive) or the nurse would
industrialized and the industrial organizations grew up to
have to send it by post (too slow). One solution for this
vertically integrated firms. The large scale mass
problem, in the future, would be the use of high-speed
production and product differentiation were the main
data transfer to transfer the digitized images to the
paradigms since the 1930's. The growth was sought from
organization, where the doctor actually works. The
diversification to new synergic areas.
broadband networks would also enable some
videotelephony calls or videoconferencing with the
experts that are more aware of the problem. special
for customer (any time of day and in the future anywhere 1900-1950 1970: 1990:
globally), they are fast reachable (customers don't have to Vertical Integration Diversification Networks of Enterprises
wait eg. for the slow post service) and they are quite
Figure 5-4. Changes in enterprise structure.
cheap reachable or at least the variable expences that are
included in the service usage (the same can not be said of The present and future organizations are more like
the fixed part eg. the equipment to have broadband data networks of enterprises, where the main organization
transfer and the service platforms). This kind of itself is broken up into smaller units and they utilize
distribution channel stimulates the professionals on the external firms as subcontractors and distribution channels.
market to market new types of services and this way to This kind of business structure is typically found in many
have an effect to the price that the customer needs to pay. design and high-technology industries. The organizations
have to focus into their strongest areas to be able to be
The problems today are that the technology is not yet competitive. Since there must be both cost advantage of
quite advanced in order to make these kinds of services mass production and market based differentiation present,
possible in massive or wanted scale. Some pilot research the areas outside the company focus must be obtained
projects have been made or are being made on these from partners, who provide their part of the final concept.
areas, but any broadband services are actually So, the value obtained by the end user is combined from
implemented yet. the different value attributes provided by a network of
several companies.
such 48 byte cells and add the needed 5 bytes in the as TCP/IP, in use today. The existing UDP (User
header, which include the destination address and some Datagram Protocol), TCP (Transmission Control
other functionalities not described in this paper. Protocol) and the newest RTP (Real-time Transport
Protocol) (under research in the Internet organization)
will not be thrown away until a very advanced solution is
readily available. One candidate solution would be the
HSTP (High-Speed Transfer Protocol) that is provided by
CCITT, but it has just received the draft stage. Some
major conclusions can be drawn from the charasteristics
of HSTP. It uses flexible flow control methods eg. signalling necessary to set up, supervise and release calls
different type of flow control method to different and connections. I321 In other words, ATM uses
situation, it supports quite efficiently parallel signalling protcol to make up the virtual path from the
implementation of the protocol itself and it is in several source to the destination. It is the same way the
ways optimized to high-speed data transfer. So, it is likely conventional telecommunications network, such as
that AAL will not be used at the beginning of ATM era. telephony network, handles the connection opening.
AAL will be used when there are sophisticated user Every component (ATM switches) along the virtual path
interfaces available for AAL data transfer. is indicated of the connection opening so no enhanced
routing has to be done at the network nodes.
6.1.1.3.1CBR
CBR is a service is type 1. (AAL1) service of AAL. It 6.1.1.5 Management of the B-ISDN architecture
handles traffic where there is strong timing relation This part of B-ISDN are has not yet been standardized.
between the source and the destination. Examples include CCITT has made some approaches to B-ISDN
PCM-encoded voice traffic, contant bit rate video, and the management point of view.
emulation of public network ciruits (e.g. the transport for
The management plane provides two types of functions,
E1 links).
namely Layer Management and Plane Management
functions. The Plane Management performs management
6.1.1.3.2VBR
functions related to a system as a whole and provides co-
VBR defines the AAL3/4 service. It is fairly complex ordination between all the planes. Plane Management has
layer that can handle VBR (i.e. bursty) data both with and no layered structure. Layer Management performs
without pre-establishing an ATM link. Examples for the management functions (e.g. meta-signalling) relating to
connection-oriented type include large file transfers like resources and parameters residing in its protocol entities.
CAD files or data backup. The connectionless type is Layer Management handles the Operation And
intended for short, highly bursty transfers as might be Maintenance (OAM) information flows specific layer
generated by LANs. concerned. I321
Interface) and NNI (Network-to-Node Interface) A VCC is a connection between two communicating
connections could be carried via different physical media, ATM end entities. It may consist of a concatenation of
such as the existing Plesiochronous Digital Hierarchy several ATM VC links. All communication proceeds
(PDH) layers or the new SDH. Several standards have along this same VCC which preserves cell sequence and
been defined on how to interface the physical layers, and provides a certain Quality Of Service (QOS). Note that
work is continuing to specify additional physical layers to the Virtual Channel Identifier in the ATM cell header is
be used to transport ATM cells. Forum93 (Figure 6-3) assigned per network entity-to-entity link, i.e. it may
change across the network within the same Forum93
VCC.
ATM ATM
switch switch
VP1
VC1 VC1 VC1 VC1 VC1 VC1
6.1.2.1 Virtual Channels and Virtual Paths A Virtual Path groups VCs carried between two ATM
The concepts Virtual Channel ( VC) and Virtual Path (VP) entities and may also involve many ATM VP links. The
are affected when ATM cells are transported through the VCs associated with a VP are globally switched without
entire network. (Figure 6-4) unbundling or processing the individual VC in any way
or changing their VCI numbers. Thus, the cell sequence
A VC is mostly known as VCC (Virtual Channel of each VC is still preserved, and the QOS of the VP
Connection). A VCC is set up between any source and depends on that of its most demanding VC. As the cell
any destination in the ATM network, regardless of the address mechanism uses both the VCI and the VPI,
way it is being routed across the network. Fundamentally, different VPs may also use the same VCI without
ATM is a connection-oriented technology. The way the conflict. A cell may also not be associated with any VP.
network sets up the connection is therefore by means of In this case, it would have a null VPI and only a unique
signalling, i.e. by transmitting a set-up request, which VCI. Forum93
passes across the network to the destination. If the
destination agrees to form a connection, the VCC is set By means of VCs and VPs, virtual circuits can be set up
up between the two end-systems. A mapping is defined either permanently (by using so-called ‘Permanent
between the Virtual Channel Identifiers (VCI)/ Virtual Virtual Channel’ (PVC)) or on demand (‘Switched
Path Identifiers (VPI) of both UNIs, and between the Virtual Channel’ (SVC)). It is likely that VPs will be used
appropriate input link and the corresponding output link mostly between switches (i.e. across NNIs) to carry
of all intermediate switches. Forum93 across large numbers of virtual circuits. In any case, all
the ATM switch has to do is to identify, on the basis of It is also expectable that TV companies will not just
the cell’s VPI, VCI or both, which output a received cell broadcast TV programs in the future. With high-capacity
needs to be routed to, and what the new VPI/VCI on this broadband networks TV corporations can then multicast
output link is. The operation of an ATM network is digital (such as HDTV (High Definition TeleVision))
therefore very simple and inherently can scale to very programs to the customers. This will provide the
high speeds. Forum93 customers to independently of each other to subscribe TV
programs from the TV companies. The greatest advantage
ATM network technique may look quite simple at the
for the customers will be that the charging can be done
first look. Actually what makes the ATM netowork more
according to watched programs eg. 'on demand basis'.
complex is the network management. ATM is
connection-oriented virtual circuit network, which uses Movies on demand that is often called Video On Demand
signalling links to establish a ATM connection between (VOD). The solution for people not knowing how to
source and destinations stations. The signalling schemes program their VCRs is that they don’t have to anymore;
in the UNI and NNI become quite complex. What is more the telecable companies - the result of the telephone and
complex is the management of the high-speed data cable company mergers - download whatever program
stream. The ATM network supports QoS-concept for the people want to watch. People buy or rent movies from
users. These mechanisms come quite complex if they are the infotainment service providers LAN94. The
fully implemented. difference between the TV multicasting is that VOD
provides a service that can unicast movies to the
customers. Both of these services belong to the category
6.2 Applications for the broadband networks
of Pay-per-View. So, the videorent corporations no
The explosive growth of available link bandwidth for further have to keep video cassettes in the store, but a
applications has changed and will change even more the large store capacity of data, such as CD-ROMs (Compact
nature of the computer applications. The applications will Disk-Read Only Memory), etc.
be even more parallelized, and concerning the multimedia
Some additional services might be provided to the
applications, several multimedia servers will be located in
customers, such as video shopping, interactive games,
the highly distributed network architecture.
education, and information publishing. In videoshopping
Just a few broadband applications to mention, it is quite people interact directly with the video catalogs, checking
sure that hundreds of them will exist in the future. (Figure availability and pricing with the stores’ databases.
6-5) First applications could perhaps be high-quality LAN94 The network’s high-speed nature makes it
visual telephones that use just a slight compression practical and close to realistic to play interactive VR
technique to pack the moving high-quality images. (Virtual Reality) games, which are particularly popular
Because of the large available bandwidth it is possible to and need a lot of computer capacity. In education the
send images with no compression at all. Of course, the high-speed networks bring classes and research materials
normal telephony service can be provided in broadband to people everywhere. With interactive information
networks. publishing, you can find as little or as much information
as you want just by asking your navigation software for
help.
BSMP BSP identification Charging customer service palette. In BSCP are the general
QoS
BSSP
management
Home- BSS has possibly an own customer service palette, icon
shop
User service palette manager Provider Work-
manager, SL for BSCP, and a screen handler for showing
MIB
“UPT”- station
parameters
the multimedia data. In BSP lie the actual multimedia
BSP
databases (DB) and icon databases. Also the SLPs for
User Work-
station BSSP
AOD broadband services are located there.
Hyper-
media
lib.
BSS BSSP D-HDTV
VOD
the call setup procedure is just as for a normal call. SSP 7.5 Broadband services categorizing
forms the intelligent part of conventional IN. SSP triggers
In fact the few services shown in table 7-1 are in a way
the IN call and forwards an INAP (Intelligent Network
quite similar to each other. They could be grouped into
Application Protocol) message to the SCP (Service
1
three different categories: controlled file transfer based
Control Point) via the SS7 network using the services of
2
AOD and VOD, hypermedia database based
TCAP (Transaction Capabilities Application Part). SCP
hypermedia library and homeshopping, and single- or
then have control on the next step eg. sends a control
3
multi-party calls. By doing this controlling of the
message to SSP.
services can be done in a similar way. There does not
In BIN the function of BSCP is different from SSP and have to be different controlling mechanisms for every
SCP. The BSSP (Broadband Service Switching Point) service provided. The controlling mechanism (BINAP) of
(here ATM switch) does not notice the BIN service BIN services will be discussed later on.
request and send it to the B-SCP (Broadband Service
AOD
Control Point) as it would, if the BIN would operate as a
conventional IN.
VOD
mainly the intelligence of requesting a service and 7.7 Course of BIN events
interpretating BINAP messages sent to it.
Let us consider the event flow of BIN events.
BIN consists of two data streams: the management data
stream and multimedia data stream. BSS communicates Directory browsing
Service activation
only with BSCP, but BSCP is responsible for
Icon creation
communicating with all the other components. Below the
transport layer BSS does communicate with the BSP, but
Service palette
it gives upwards only data indications. (Figure 7-3) User identification Icon browsing Icon activation Conn. synchron. Service logic Charging
process
User
BSCP BIN Service Logic
DB
BSS BSP
Transport
layer 7.7.1 Service request phase
User identification:
Transport Transport
layer layer The user sends a BINAP message to BSCP and gives
ATM sufficient identification information of him/herself. The
user has to know the ATM-address (CCITT NSAP
Management
Data stream (Network Service Access Point), 20 bytes) of BSCP.
BSCP then fetches more accurate information about the
Figure 7-3. Management and data stream separated. user, whereby the location of the customer service palette
is also found. If the user information is not found in the
7.6.1 Requirements of ATM network BSMP in case, the user must give the address of his/her
Home BSCP (HBSCP). This enables usage of broadband
The signalling protocol itself is not quite developed yet as
services from mobile stations.
it should be in order to establish BIN architecture using
ATM. The BSS uses the ATM signalling protocol Directory browsing:
(Q.2391) to set up the path to the destination, which is
BSCP or it could use the PVCs that are available to In case of a new user, requesting of a service is proceeded
BSCP. However, the BIN architecture suggests to use via directory browsing. BSCP knows one or more BSPs.
BSCP to establish the path between BSP and BSS. BSCP sends a BINAP message to BSS, which contains a
Q.2931 signalling protocol does not define these kind of hypermedia document with links to BSPs. (Figure 7-5)
functions. Q.2931 UNI version 3.0 does not define a third The first level of the hypermedia document contains the
parties connection setup as it should be. UNI 4.0, which BSPs (located at BSCP) and next levels contain all the
should be introduced in late 1994, should contain the information the BSP has to offer, which are fetched by
third party connection setup function defined. BSCP from the BSP in case. BSCP does not have to
know all the services every BSP has to offer, but knowing
the addresses of the BSPs is sufficient. By using the
identification information of the user, the BSCP may the user has too little network capacity, the BSP might
filter the information given to the user. reject the service usage. The QoS-parameters could be the
limit values with what BSS could possibly function.
The hypermedia documents residing in BSPs contain
structured information about the type of service. The
7.7.3 Service usage phase
types are controlled file transfer, hypermedia database or
single- and multiparty calls. This phase is highly dependent of the type of service
requested. For example, controlled file transfer type of
BSCP-ROOT_id
service could have the functions of PLAY and STOP.
During the service execution phase the QoS-manager is
Nokia HPY Telecom Finland Sony BIN Services Inc. responsible for the quality parameters of the service. The
parties inform BSCP of the changes in service quality,
Media DB
which then tries to restore the values.
VOD AOD Xmosaic
Stallone Schwarznegger Elvis Michael Jackson After the service has been used, the user should inform
Real services BSCP of the connection closing. BSCP then starts the
Cobra Rocky 1 Terminator
F controlled connection close phase. BSCP has stored the
igure 7-5. The structure of directory tree. necessary information about the service usage eg. actual
usage time and ability to perform with the requested QoS-
Service palette process :
parameters. The actual time here means eg. in controlled
When the user has chozen the 'real' service, an icon can file transfer the time between PLAY and STOP functions
be created to the customer service palette either to BSMP summed through the whole session. The charging
or BSS. When such a service palette exists containing information is then added to the MIB (Management
icons and an accurate description of the parameters of the Information Base) in the BSMP of the user.
7.7.2 Service activation phase BIN uses BINAP application protocol to communicate
with the external parties of BSCP. BINAP-messages have
After activation of the icon or 'real' service BSS informs
been categorized into the following subclasses:
BSCP of it, which sends BSP a BINAP message
containing sufficient information about the icon or 'real'
service. In BSP the BSL for the service is executed. In
BSCP the QoS-manager is initialized for this connection,
which has received the QoS-parameters from the BSS.
The QoS-parameters are also negotiated with BSP and if
Directory handling
}
SERVICE USAGE:
USERTYPE ::= SEQUENCE {
}
Customer charging
forname 0 OCTET
STRING( SIZE(30)),
7.8.2 User identification
surname 1 OCTET
An example of an ASN.1 coded BINAP-message is given
STRING( SIZE(30))
here of the user identification, which BSS sends to BSCP
as the first message: }
.
.
.
user. The network plane defines all the possible networks is better known as a MIB. This MIB would contain all his
that the user system can interface with. The service plane BIN service parameters and they could be configured
indicates all the possible services that the user can make with the use of TMN at any time. Such parameters, in for
use of. The BIN conceptual model shows the correllations instance the videoconferencing service, would be the
of the three planes. The correlation between user and names of the members of the conferencing group and
network planes is such that the user has allowed networks their corresponding network addresses in the lower layer
which can be accessed. The user and service plane of MIB tree hierarchy. So, the customer BIN service
correllation defines the services that the user have parameters could be described in the structure of a MIB
subscribed or installed. The network and service plane tree.
correllation defines the services that can be provided in
the networks that the user is allowed to access.
Customer ID
VOD Videoconferencing
Mike 546546
James Bond
VOD Videotel. AOD CC UPT
SERVICE PLANE Jack 8797896
Cliffhanger
Cape Fear Sue 12325432
HDTV
H.261
(Figure 7-7) The location of such a database can be either framework. They contain all the information of the
in BSS itself or in HBSCP's BSMP. service that has to be known by BSCP in order to be able
to execute the service. They include for example in VOD,
This section just provides with a visio of the Broadband the BSP and its address, used picture formats and used
IN Management Information Base (MIB) structure. The network. On the other hand, the allowed networks are
idea is such that the customer will be provided with the also listed with necessary parameters eg. transmission
capability of remotely to configure his own service speed. (Figure 7-8)
palette that in telecommunications management language
BIN MIB is designed to be managed with TMN Figure 7-9. The use of TMN in BIN.
(Telecommunications Management Network) architecture.
USERPLANE
USER
7.12 The hardware configuration
SERVICE PLANE
ICONS NETWORKS
NETWORK PLANE
The hardware configuration will consist of three Intel
386/486 (Linux) workstations (at first only one; without
Homeshop AOD VOD ATM PSTN ISDN IP GSM
ICONS
the ATM network). Two of the workstations have a
7.11 TMN and BIN SCP, where the control software in driven. (Figure 7-10)
One of the workstations would contain the ATM network
In the previous sections were discussed about the simulator, which would forward cells with the aid of
Broadband IN services. The services were static services VCIs. The network simulator would be static eg. use
which could not be configured by the customer. The PVCs and no signalling configurations could be 'on the
meaning of this stage was just to have a view of BIN and flight'.
its possibilities. The next step is to have a remotely
configurable service database where the customer could
AT Madapter
Videogr abber
AT Madapt er
Vi deo gr abb er
and get the true VOD service capabilities. The aim of this Linux workstation
Camera
stage is to have a TMN configurable BIN service Camera
icr op ho ne
Q.2391
parameters. The customer’s configure would affect the
icrop ho ne
ATM
ATM switch
because of the charging. (Figure 7-9)
Linux workstation
Linux workstation
B-SSP
- Video On
DB Demand
.
B-IN MIB
Figure 7-10. The BIN hardware configuration.