in tutorial

Upload: anthigone

Post on 30-May-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 In Tutorial

    1/73

    Telecom FINLAND

    Telecom research centre

    Elimenkatu 9a

    00510 Helsinki

    finland

    and

    Lappeenranta university of technology

    department of information technology

    lappeenranta

    Intelligent Network Tutorial

    for the secondwinterSchool on telecommunications

    march 1994

    Abstract

    The development of telecommunications techniques and the need for more advanced services hascreated projects on standardization of international Intelligent Networks (IN). The standards of

    Intelligent Networks define IN in an abstract point of view, so it leaves the service providers thedecisions on their own implementations. The first standard sets of IN are Bellcores AIN.0 and

    the CCITTs Capability Set 1 (CS1). They define the basic services of IN and provide someadditional features such as rapid service introduction and a flexible architecture that provides

    future expansion to further IN Capability Sets. The standardation organisations, such as CCITTand ETSI, work hard to help the service providers to implement their IN architecture flexible in

    order to be able to provide international IN services. This kind of architecture is better known asglobal Intelligent Network architecture and it should be taken into consideration already in theearly implementations of IN. This paper provides some history of telecommunications

    technology, an overview of IN and its services and some additional discussion on the futurebroadband IN.

    Kim MolinLappeenranta University of technology

    laserkatu 653850 Lappeenranta, Finland

    E-mail: molinmato.cc.lut.fiTel.Int: +358 0 574 3625

    Olli MartikainenTelecom research centre

    sturenkatu 16 helsinkitelecom finlanD

    Tel.int: +358 0 7098 3503

  • 8/14/2019 In Tutorial

    2/73

    Contents

    Contents

    Abbreviations

    1. PREFACE 1

    2. INTRODUCTION 2

    2.1 Early computers and telecommunications 2

    2.2 Switching systems development 3

    2.3 Turning-points in telecommunications 5

    2.3.1 UMTS 5

    3. COMPUTER CONTROLLED TELECOMMUNICATIONS 7

    3.1 CCITT Signalling System No. 7 7

    3.1.1 Network Services Part 8

    3.1.2 User Part 8

    3.1.3 Signalling network structure 9

    3.2 Telecommunications Management Network 9

    3.2.1 Functional architecture 10

    3.2.2 Informational architecture 11

    3.2.3 Physical architecture 12

    3.3 The need for IN 12

    3.3.1 Mobility and users identification 12

    4. INTELLIGENT NETWORK ARCHITECTURE 14

    4.1 Overview of IN 14

    4.2 IN standardation 16

    4.2.1 IN standards bodies 16

  • 8/14/2019 In Tutorial

    3/73

    4.2.2 Phased standardation 16

    4.2.3 Structure of CCITT IN standards 16

    4.2.4 Capability Set 1 17

    4.2.5 IN CS1 Services 18

    4.2.6 CCITT goals and objectives for services 19

    4.3 IN Conceptual Model 20

    4.3.1 Physical Plane 21

    4.3.2 Distributed Functional Plane 26

    4.3.3 Global Functional Plane 30

    4.3.4 Service Plane 35

    4.4 The IN-structured network 38

    4.4.1 SCE 38

    4.4.2 The function of IN 39

    4.4.3 IN Application Protocol 40

    4.5 Personal Communications Services 41

    4.6 Integration of TMN and IN 42

    4.6.1 Comparison of IN planes to TMN planes 43

    4.7 Globalizing the IN 44

    4.8 Future IN Capability Sets 44

    4.9 Current activities of IN 45

    5. CHANGES IN BUSINESS 46

    5.1 Technology and services 46

    5.2 IN services 475.2.1 Benefits of IN 47

    5.2.2 Cost structure 48

    5.2.3 Service portfolio 49

    5.3 Evolution of IN capabilities in Telecom Finland 50

    5.3.1 Pre-IN 50

  • 8/14/2019 In Tutorial

    4/73

    5.3.2 Centralized IN 50

    5.3.3 Special services 50

    6. BROADBAND INTELLIGENCE AND MEDIA 51

    6.1 Broadband networks 51

    6.1.1 B-ISDN 51

    6.1.2 ATM networks 53

    6.2 Applications for the broadband networks 55

    6.3 Broadband IN 56

    6.4 Telecom Finland B-IN project 57

    6.4.1 The hardware configuration 57

    6.4.2 TMN and B-IN 58

    7. REFERENCES 60

  • 8/14/2019 In Tutorial

    5/73

    ABBREVIATIONS

    AAB Automatic Alternative Billing

    ABD Abbreviated Dialling

    AC Application Context

    ACB Automatic Call Back

    ACC Account Card Calling

    AD Adjunct

    AOD Audio On Demand

    AP Application Process

    ASE Application Service Element

    ASN.1 Abstract Syntax Notation One

    ATM Asynchronous Transfer Mode

    ATT AttendantAUC Authentication Center

    AUTC Authentication

    AUTZ Authorization Code

    B-IN Broadband IN

    B-ISDN Broadband Integrated Services Digital Network

    B-OSF Business OSF

    B-SCP Broadband Service Control Point

    B-SMS Broadband Service Management System

    B-SSP Broadband Service Switching Point

    BAF Basic Access Function

    BCP Basic Call Process

    BER Basic Encoding Rules

    BRI Basic Rate Interface

    BSF Base Station Function

    BTF Basic Transit Function

    CBR Continuous Bit Rate

    CCAF Call Control Agent FunctionCCBS Completion of Call to Busy Subscriber

    CCC Credit Card Calling

    CCF Call Control Function

    CCITT Concultative Committee for International Telephony and Telegraphy

    CCS Common Channel Signalling

    CCSN Common Channel Signalling Network

  • 8/14/2019 In Tutorial

    6/73

    CD Call Distribution

    CD Compact Disk

    CD-ROM Compact Disk-Read Only Memory

    CF Call Forwarding

    CFC Call Forwarding on BY/DA

    CHA Call Hold with Announcement

    CID Call Instance Data

    CIDFP CID Field Pointer

    CLI Calling Line Identity

    COC Consultation Calling

    CON Conference Calling

    CPM Customer Profile Management

    CRA Customized Recorded AnnouncementCRD Call Rerouting Distribution

    CRG Customized Ringing

    CS Capability Set

    CS1 Capability Set 1

    CT2 Cordless Telephone 2

    CUG Closed User Group

    CW Call Waiting

    DC Detection Capability

    DCP Destination Point Code

    DCR Destination Call Routing

    DDD Direct Distance Dialing

    DECT Digital European Cordless Telecommunications

    DFP Distributed Functional Plane

    DTMF Dual Tone Multi-Frequencies

    DUP Destinating User Prompter

    EC European Community

    EF Elementary FunctionEIR Equipment Identification Register

    ERMES European Radio Message System

    ETSI European Telecommunications Standards Institute

    FC Functional Component

    FE Functional Entity

    FEA Functional Entity Action

  • 8/14/2019 In Tutorial

    7/73

    FIE Facility Information Element

    FMD Follow-Me-Diversion

    FPH Freephone

    GAP Call Gapping

    GFP Global Functional Plane

    GNS Green Number Service

    GSL Global Service Logic

    GSM Global System for Mobile communications

    Groupe Special Mobile

    GUI Graphical User Interface

    GUS Gravis UltraSound

    HDTV High Definition TeleVision

    HLR Home Location RegisterHP Hewlett Packard

    IN Intelligent Network

    INA Intelligent Network Architecture

    INAP IN Application Protocol

    INCM Intelligent Network Conceptual Model

    IP Intelligent Peripheral

    ITU International Telecommunications Union

    IVS INRIA Videonconferencing System

    LIM Call Limiter

    LOG Call Logging

    MACF Multiple Association Control Function

    MAP Mobile Application Part

    MAS Mass Calling

    MCI Malicious Call Identification

    MIB Management Information Base

    MIT Management Information Tree

    MMC Meet-Me-ConferenceMPEG Moving Pictures Experts Group

    MSC Mobile Services Center

    MSCF Mobile Switching Center Function

    MTP Message Transfer Part

    MWC Multi-Way Calling

    N-OSF Network OSF

  • 8/14/2019 In Tutorial

    8/73

    N_ID Network ID

    NAF Network Access Function

    Ne-OSF Network element OSF

    NEF Network Element Function

    NNI Network-to-Node Interface

    NSP Network Services Part

    O-O Object-Oriented

    OAM Operations And Maintenance

    OC-x Optical Carrier level at x

    OCS Originating Call Screening

    ODR Origin Dependent Routing

    OFA Off Net Access

    OMAP Operations, Maintenance, and Administration PartONC Off Net Calling

    ONE One Number

    OSF Operations Systems Function

    OSI Open Systems Interconnection

    OSIRM OSI Reference Model

    OUP Originating User Prompter

    PABX Private Access Branch eXchange

    PCS Personal Communications Services

    PDH Plesiochronous Digital Hierarchy

    PE Physical Entity

    PIN Personal Identification Number

    PLMN Public Land Mobile Network

    PN Personal Numbering

    PNP Private Numbering Plan

    POI Point Of Initiation

    POR Point Of Return

    PRI Primary Rate InterfacePRM Premium Rate

    PRMC Premium Charging

    PSTN Public Switched Telecommunications Network

    PTN Personal Telecommunications Number

    PVC Permanent Virtual Channel

    QOS Quality of Service

  • 8/14/2019 In Tutorial

    9/73

    QUE Call Queueing

    RACE Research and technology development in Advanced Communications

    technologies in Europe

    RBOC Regional Bell Operating Company

    REVC Reverse Charging

    rN relationship N

    ROSE Remote Operations Service Element

    RTP Real-time Transport Protocol

    S-OSF Service OSF

    S_ID Service ID

    SACF Single Association Control Function

    SAO Single Association Object

    SCCP Signalling Connection Control PartSCE Service Creation Environment

    SCEF Service Creation Environment Function

    SCF Service Control Function

    SCF Selective Call Forward on Busy/Dont Answer

    SCP Service Control Point

    SDF Service Data Function

    SDH Synchronous Digital Hierarchy

    SEAL Simple and Efficient Adaptation Layer

    SEC Security Screening

    SF Service Feature

    SIB Service-Independent building Block

    SIG Special Interest Group

    SLP Service Logic Program

    SMS Service Management System

    SP Service Plane

    SPC Stored Program Control

    SPL Split ChargingSRF Specialized Resource Function

    SS Service Subscriber

    SS7 Signalling System no. 7

    SSD Service Support Data

    SSF Service Switching Function

    SSN Subsystem Number

  • 8/14/2019 In Tutorial

    10/73

    SSP Service Switching Point

    STM Synchronous Transport Module

    STP Signalling Transfer Point

    SVC Switched Virtual Channel

    TCAP Transaction Capabilities Application Part

    TCP Transmission Control Protocol

    TCS Terminating Call Screening

    TDR Time Dependent Routing

    Telco Telecommunications Operating Company

    TINA TMN+IN

    TMN Telecommunications Management Network

    TP Transact Processing system

    TRA Call TransferU_ID User ID

    UAN Universal Access Number

    UDP User Datagram Protocol

    UDR User-Define Routing

    UMTS Universal Mobile Telecommunications System

    UNI User-to-Network Interface

    UP User Part

    UPT Universal Personal Telecommunications

    VBR Variable Bit Rate

    VC Virtual Circuit

    VCC Virtual Channel Connection

    VCI Virtual Channel Identifier

    VLR Visitor Location Register

    VOD Video On Demand

    VOT Televoting

    VP Virtual Path

    VPI Virtual Path IdentifierVPN Virtual Private Network

    WSF Work Station Function

  • 8/14/2019 In Tutorial

    11/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    1

    1. Preface

    This paper is made for the participants of the

    Proceedings of First Winter School on Intelligent

    Networks to be held in Helsinki at Telecom Finland on

    March 1994. This tutorial is done in cooperation with

    Lappeenranta University of Technology and Telecom

    Finland. This study is supposed to be a tutorial for the

    Intelligent Networks (IN) that studies IN from user,

    operator and software points of view. This tutorial gives

    some history of the development of computers and

    telecommunications networks towards more advanced

    systems and networks that provide additional features,for example, to the normal telephony services. These

    networks and architectures that add value to

    conventional telecommunications networks are often

    referred to as Intelligent Networks (IN). This guide

    provides an explanation of IN concepts, standards and

    technologies and gives some view concerning the subject

    of the situation today. Also some changes in the area of

    telecommunications business is concerned. Also some

    forecasts to future developments of IN are provided. The

    author of this tutorial apologies for the possible mistakes

    that exist in this article and remarks that some critics

    and notices are welcome concerning the subject.

    Section 2. describes the history of telecommunications

    and its development towards the future techniques. The

    changes in the switching systems and some turning-

    points in telecommunications are allthough the main

    concern. The concept of Computer Controlled

    Telecommunications is described in section 3. Section 3.

    also includes signalling network history and

    development, management networks for

    telecommunications networks, and the need for more

    advanced services. The Intelligent Network Architecture

    (INA) is shown in section 4. from an abstract point of

    view. Also some future plans to expand the architecture

    are studied, such as Telecommunications Management

    Network and Intelligent Network integration. In section

    5. the affects of telecommunications networks

    development to the changes in business are studied.

    Some additional discussion of broadband networks and

    broadband services in Intelligent Networks is provided

    in section 6. This section also informs of a research

    project running at Telecom Finland in 1994.

  • 8/14/2019 In Tutorial

    12/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    2

    2. Introduction

    2.1 Early computers and telecommunications

    Since electronic machines got some kind of intelligence

    it is almost fifty years ago. Since then, the development

    of these machines towards computers has been rapid. In

    1950s there were no data networks because of the

    insufficient network technology and the use of them

    would have been minimal. In those days, computers

    acted as batch processors. The programming of them

    was very difficult, because they needed paper tapes to

    inform the computer of the function needed. These batch

    processors work in a simple way. They read the paper

    tapes bit by bit containing information presented as

    holes in the paper. So the Input/Output (I/O) operations

    of the computers was far too inefficient to use the

    analogous telecommunications network that was

    provided at that time. The computers in those days were

    only used to scientifical calculations that needed no

    other I/O operations than instruction and data read, and

    a printout function of the calculations. So computers

    were completely in local use in those days.

    The next generation of computer technology was the

    appearance of computers into real world use. They had

    more intelligence than the computers just a decade

    before. The first use of computers was in the process

    industry where computers removed process control tasks

    from humans in the 1960s. This meant that the I/Ooperations of the computers were more developed and

    they could already communicate with other devices.

    Later on, the process industry became heavily computer

    controlled. It was also then when the first uses of

    telecommunications networks became possible. This was

    done by modems with signalling rates of about 300

    bauds. In those days, the telecommunications networks

    did not provide bit errorfree data transfer. Bit errors

    appeared very often and it was then when transport

    protocols at end systems and heavy link and network

    protocols between the network nodes were developed to

    minimize this unreliability problem.

    Figure 0-1. Transaction processing system.

    In 1970s Transaction Processing (TP) systems were

    taken in use in the area of banking. These TPs locatedin the main office and worked like servers there. The

    clients sended requests via the communication network

    and the TP answered them with responses. (Figure )

    TPs and communication networks have developed a lot

    and this client-server model is still in use in banking. At

    day time, computer systems work as transaction

    processors, but at night as highly developed batch

    processors. This is because they are incapable of serving

    the requests (even thousands of requests per hour) that

    might come from several offices simultaneously. Such

    batch functions are for example the payment of salaries

    every month. However, these computer systems need to

  • 8/14/2019 In Tutorial

    13/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    3

    serve the realtime queries and give responses to

    hundreds of locations worldwide.

    2.2 Switching systems development

    From 1870s to 1950s, the primary focus of swithing

    system development was on producing better

    technologies for permitting two people to engage in

    voice communications over larger and larger distances

    and to make this technology more readily available,

    cheaper, and more reliable. During this period the

    industry moved from local calls being handled by

    operators with plug boards, to step-by-step switches, to

    panel switches, to crossbar switches, to Stores Program

    Control (SPC) switches. It is interesting to read that in

    1925 one of the most significant breakthroughs was the

    separation of the connection control activities from the

    maintenance of the actual connections during an active

    call. This change, over time, allowed the switching

    systems to reuse the more complex resources of the

    switch (those used for initiating and setting up a call),

    thus ending an era of having to duplicate these costly

    resources and having them tied up for the entire

    duration of a call. One of the major implications of

    switching systems development during this period was

    that almost all the information about how connections

    were to be created resided on the individual switches,

    specifically, subscriber information, information about

    how to provide the limited functions available at that

    time, and implicit network information were all

    contained in each switch. Benne93

    In the 1950s, Direct Distance Dialing (DDD) began to

    be deployed as a new service, but this was still a

    continuation of the general focus on providing

    telecommunications connections between fixed points

    (usually two). Furthermore, the long development time

    frames and the then-available technologies favored

    producing this new service by slightly rearranging the

    internal structure of the switching systems and

    squeezing in the new capability. The end result was

    that DDD moved considerable network-related data into

    the local switches and also added new functions related

    to the network connection capabilities into the local

    switches. On many of the existing switches, this

    involved adding specialized boxes to correctly

    interpret the new dialed numbers and route them to the

    correct places for proper DDD connectivity. To get some

    idea of the technological problems associated only with

    the interconnection aspects of the telecommunications at

    that time, we can look at one of the services we consider

    basic today. In 1956, the first undersea cable using

    repeaters was activated at a cost of about $6

    million/circuit resulting in a cost of about $75/minute.

    By 1976, the cost per circuit was reduced by a

    hundredfold, thus permitting later developments to focus

    more on providing various services beyond connection.

    One of the driving forces for more services at this time

    was the reduction in the cost of the connections so that

    smaller groups of people with specialized needs were

    entering the market and asking for capabilities beyond

    simple connectivity. This was the beginning of the

    transition period in which the structure of the

    telecommunications industry was changing away from

    the former connection focus toward a new service focus.

    However, the pace of change was slow given the

    technological problems that still had to be overcome to

    provide good, clean and economical connections. Thus,

    there was no driving need to reorganize the basic

    structure of what existed; nor was there any real

    guidance as to what kinds of services the customers

    would be willing to purchase as a service marketing was

    in its infancy. Benne93

  • 8/14/2019 In Tutorial

    14/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    4

    During the 1960s and 1970s, the requests for

    additional services began to grow, but the pace was

    rather leisurely by todays standards since the

    technology to support these new services was not readily

    available on the general market. For example, the fax

    technologies available were not very advanced and did

    not produce sufficiently high-quality results to enable

    people to change their basic methods of operation to

    incorporate faxes into their work as they do today. Also,

    the derivative technologies associated with the growth of

    computers, personal computers, and microchip

    technology had not reached a state where they were

    demanding telecommunication services much beyond

    classical interconnectivity services. However, the genesis

    of the current service-driven climate occurred during

    this period as the specialty groups began to experiment

    with new ideas and request new services. Once again,

    the pace was such that it was more economical and

    easier to squeeze the new capabilities into the existing

    switching systems than to change the switches and have

    to replace the embedded base with newer technologies.

    This slow evolution process was aided by the small -

    market bse for the newer services. During this period,

    the efforts to put more and more new service capabilities

    onto the switching systems resulted in a large expansion

    of the types of information being placed on the switches,

    e.g., variations of call models proliferated, more

    network-related information was brought into the

    switches, and data under the control of the end users

    was moved onto the switches (speed calling lists, centrex

    data, etc.). As this data was moved onto the switches,

    the programs to manipulate the data and ensure its

    integrity also had to be moved onto the switches. This

    resulted in the switches becoming very general data

    control and usage systems as well as the connection-

    producing systems they had traditionally been. Benne93

    As we entered the 1980s, the technologies derived form

    the computer and space industries began to be felt in the

    general marketplace. This, in conjunction with the

    lowering of transmission and interconnection service

    costs, resulted in an exponential growth in the demand

    for newer and more flexible telecommunications

    services. Another major factor driving toward more

    specialized services was the breakup, in the United

    States, of the Bell System and resulting competition,

    where services were the factor that differentiated one

    carrier form another. Furthermore, with diversiture, the

    former local operating companies were permitted to

    make instructions into one anothers traditional service

    areas and, to do this effectively, they needed to have

    something to offer that was not available from the local

    service provider. All of these changes resulted in

    customers being more aware of what technology provide

    and demanding that the telecommunications industry

    change to meet the new requirements for services.

    Benne93

    The 1990s and beyond will demand that the

    telecommunications industry change its basic ideas

    about the structure of their networks and how they will

    evolve. Up until the 1980s, network development was

    driven by the need to provide cheap, efficient

    interconnections between fixed points. There was only

    minor emphasis on structuring the switching systems to

    be readily adaptable to the rapidly changing service

    requirements that have appeared in the last decade. Now

    that cheap, efficient interconnection capabilities are

    available, the relative roles of the interconnectioncapabilities and end-user services will be interchanged.

    The demans for more and more specialized end-user

    services will continue to grow, and there will be an

    inceasing demand for having the new services in shorter

    and shorter time frames. Thus, the basic structure for the

  • 8/14/2019 In Tutorial

    15/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    5

    network, and especially the structure and function of the

    switching systems, will change to accomodate this need

    for rapid deployment of more and more custom services.

    In summary, the telecomunications industry, which has

    been interconnection-driven, will, in the future, be

    service-driven. Benne93 These facts will be discussed

    more entirely later in this paper.

    2.3 Turning-points in telecommunications

    Several turning-points can be found in the history of

    telecommunications technology (marked as circles in the

    figure). (Error! Reference source not found.) First, the

    beginning of data transfer by the use of analogous

    telephony service was an important stage in the history.

    This service was not good for use in corporations

    because of its low data transfer ratio. Then, there was a

    need for a data transfer service that used billing by data

    amount while the expences of the analogous telephony

    service consisted mainly of the data transfer time. The

    packet data networks were developed especially for

    corporative use. Second, CCITT (Concultative

    Committee for International Telephone and Telegraphy)

    introduced its seven layer OSI protocol stack SS7 to

    replace the analogous signalling system. This was the

    corner-stone for the digital telecommunications

    technology that is used, for instance, in ISDN

    (Integrated Services Digital Network). In the late 1980s

    radio signalling technology was advanced enough to

    provide digital telephony service. The GSM (Global

    System for Mobile communications) mobile phone

    technology, introduced in 1992, is also suitable for low-

    speed data transfer. The Intelligent Network is an

    architecture ment to integrate all the

    telecommunications services mentioned in a flexible

    way.

    The telecommunications networks and wide area

    networks used PDH (Plesiochronous Digital Hierarchy)

    technology in the physical data transfer. At the

    introduction of CCITTs SDH (Synchronous Digital

    Hierarchy) technology the physical data transfer rates

    increased remarkably. A new technology, ATM

    (Asynchronous Transfer Mode), was introduced to use

    the available bandwidth efficiently in the 1992. By the

    introduction of ATM it was possible to imagine of such

    concepts as B-ISDN ( Broadband Integrated Services

    Digital Network) and broadband IN. These technologies

    will be discussed more accurately later on.

    Figure 0-2. The development of telecommunications.

    2.3.1 UMTS

    UMTS (Universal Mobile Telecommunications System)

    is intended to be an international standard for global

    telecommunication system. It is a third generation

    mobile telecommunications system which integrates

    several second generation mobile systems like cordless

    telephones (CT2 (Cordless Telephone 2) and DECT

    ( Digital European Cordless Telecommunications)),

    mobile telecommunications systems (GSM and PCN)

  • 8/14/2019 In Tutorial

    16/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    6

    and radio message systems (ERMES (European Radio

    Message System)). Hara93 (Figure )

    UMTS is researched in RACE financed by EC

    ( European Community) and ETSIs group SGM5.

    UMTS is an advanced systems concept which defines a

    mobile communications system where a mobile phone

    could be used at home, office and elsewhere. Hara93

    UMTS is an open system which is based on TMN and

    IN concepts. The system supports ISDN services and

    could be at some degree compatible with B-ISDN. This

    system is a very advanced telecommunications system

    that supports global mobility and Intelligent Network

    services and is not expected to be introduced before the

    year 2000.

    Figure 0-3. Evolution of mobile services and systems.

  • 8/14/2019 In Tutorial

    17/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    7

    3. Computer Controlled

    Telecommunications

    3.1 CCITT Signalling System No. 7

    The word signalling ment the transfer of analogous

    signals in a network, for example in the analogous

    telephony network the activation of nonintelligent

    switches, just a few decades ago. In the context of

    modern telecommunications, signalling can be defined

    as the system that enables Stored Program Control

    exchanges, network databases, and other intelligent

    nodes of the network to exchange messages related to

    call setup, supervision, teardown (call/connection

    control information) Modar90, information needed for

    distributed application processing (inter-process

    query/response, or user-to-user data) and network

    management information.

    Just a few decades ago (and even today), the

    telecommunications networks used analogous

    signalling, based on frequency tones, between network

    nodes. Some key attributes of these signalling methods

    are that they are inband (i.e. signalling information is

    conveyed over the same channel that is used for speech)

    Modar90; call set-up times are long (from about 10 to 20

    s); limited information can be transferred resulting,

    among other things, in restrictive network routing

    capabilities.

    With the introduction of electronic processors in

    switching systems came the possibility of providing

    Common Channel Signalling (CCS). This is an out-of-

    band signalling method in which a common data

    channel is used to convey signalling information related

    to a number of trunks. Modar90 CCITT published this

    new signalling protocol stack SS7 (Signalling System

    No. 7) based on CCITT OSI (Open Systems

    Interconnection) Reference Model (OSIRM) in 1980.

    SS7 is fully digital and SS7 protocols correspond to the

    first three layers of the OSIRM and includes also

    protocols at the application layer. (Figure ) The

    signalling network structure component of SS7 is the

    Network Service Part (NSP), and it consists of the

    Message Transfer Part (MTP) and the Signalling

    Connection Control Part (SCCP). The upper layer part

    of the SS7 protocol architecture consist the User Part

    (UP).

    SS7 is quite an advanced protocol stack. It includes

    capabilities for congestion control and overload control.It also includes features for avoiding congestion by

    alternative routing or capacity expansion when heavy

    load is detected. With congestion is ment generally,

    shortage of resources, which is caused by an excessive

    amount of load, or a failure that reduces the installed

    capacity of a network element. SS7 also includes

    capabilities for sending congestion and overload

    indications to the adjacent exchanges or traffic sources.

    Lehti93

  • 8/14/2019 In Tutorial

    18/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    8

    Figure 0-1. SS7 protocol architecture.

    3.1.1 Network Services Part

    MTP consists of levels 1-3 of the SS7 protocol stack and

    it provides a connectionless message transfer system that

    enables signalling information to be transferred across

    the network to its desired destination. Functions are

    included in MTP that allow system failures to occur in

    the network without adversely affecting the transfer of

    signalling information. So the overall purpose of MTP is

    to provide a reliable transfer and delivery of signalling

    information across the signalling network and to have

    the ability to react and take necessary actions in

    response to system and network failures to ensure that

    reliable transfer is maintained. The first level of MTP

    presents the signalling data link functions. A signalling

    data link functon is a bidirectional transmission path for

    signalling, consisting of two data channel operating

    together in opposite directions at the same data rate. It

    fully complies with the OSIs definition of the physical

    layer. Level 2 of MTP presents the signalling link

    functions. The signalling link functions correspond to

    the OSIs data link layer. Together with a signalling

    data link, the signalling link functions provide a

    signalling link for the reliable transfer of signalling

    messages between two directly connected signalling

    points. The third level of MTP presents the signalling

    network functions. They correspond to the lower half of

    the OSIs network layer, and they provide the functions

    and procedures for the transfer of messages between

    signalling points, which are the nodes of the signalling

    network. Modar90

    SCCP provides additional functions to MTP for both

    connectionless and connection-oriented network

    services. SCCP enhances the services of the MTP to

    provide the functional equivalent of OSIs network

    layer. The addressing capability of MTP is limited to

    delivering a message to a node and using a four-bit

    service indicator to distribute messages within the node.SCCP supplements this capability by providing an

    addressing capability that uses DPCs (Destination Point

    Code) plus Subsystem Numbers (SSN). The SSN is local

    addressing information used by SCCP to identify each of

    the SCCP users at a node. Modar90

    3.1.2 User Part

    The User Part forms the most upper layer of the SS7protocol stack that use the services provided by the

    lower layers SCCP and MTP. User Part functions are

    ISDN-UP, TCAP (Transaction Capabilities Application

    Part) and OMAP (Operations, Maintenance, and

    Administration Part). The ISDN-UP is not discussed in

    this paper. TCAP refers to the set of protocols and

    functions used by a set of widely distributed applications

    in a network to communicate with each other. TCAP

    directly uses the service of SCCP. Essentially, TCAP

    provides a set of tools in a connectionless environment

    that can be used by an application at a node to invoke

    execution of a procedure at another node and exchange

    the results of such invocation. As such, it includes

    protocols and services to perform remote operations. It is

  • 8/14/2019 In Tutorial

    19/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    9

    closely related to the OSI Remote Operations Service

    Element (ROSE). The OMAP of the SS7 protocol stack

    provides the applications protocols and procedures to

    monitor, coordinate, and control all the network

    resource that make communications based on SS7

    possible. Modar90

    3.1.3 Signalling network structure

    Figure 0-2. CCITT SS7 network structure.

    Signalling networks consist of signalling points and

    signalling links connecting the signalling points

    together. (Figure ) As alluded to earlier, a signalling

    point that transfers messages from one signalling link to

    another at level 3 is said to be a STP (Signalling

    Transfer Point). Signalling points that are STPs can

    also provide functions higher than level 3, such as SCCP

    and other level 4 functions like ISDN-UP. When

    signalling point has an STP capability and also provides

    level 4 functions like ISDN-UP, it is commonly said to

    have an integrated STP functionality. When the

    signalling point provides only STP capability, or STP

    and SCCP capabilities, it is commonly called a stand-

    alone STP. Signalling links, STPs (stand-alone and

    integrated), and signalling points with level 4 protocol

    functionality can be combined in many different ways to

    form a signalling network. The SS7 Network Services

    Part protocol is specified independent of the underlying

    signalling network structure. However, to meet the

    stringent availability requirements given below (e.g.,

    signalling route set unavailability is not exceeded ten

    minutes per year), it is clear that any network structure

    must provide redundancies for the signalling links,

    which have unavailabilities measured in many hours per

    year. In most cases the STPs must also have backups.

    Modar90

    The worldwide signalling network is intended to be

    structured into two functionally independent levels: the

    national and international levels. This allows numbering

    plans network management of the international and the

    different national network to be independent of oneanother. A signalling point can be a national signalling

    point, an international signalling point, or both. If it

    serves both, it is identified by a specific signalling point

    code in each of the signalling networks. Modar90

    3.2 Telecommunications Management Network

    Telecommunications Management Network (TMN) is a

    generic, management-oriented architecture, intended to

    be used for all kinds of management services. Appel93 It

    has been defined in the CCITT M.3000 series standards.

    According to the concept it intends to meet several

    purposes: several network and devices, digital and

    analogic transmission systems, circuit- and packet

    switched data networks, public exchanges and PABXs

    (Private Access Branch Exchange).

    TMN is intended to support different management based

    areas. These five functional areas are:

    Performance management

    fault management

  • 8/14/2019 In Tutorial

    20/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    10

    configuration management

    accounting management

    security management

    The functionality of TMN consists of the following

    subjects: M3010

    the ability to exchange management information

    across the boundary between the telecommunications

    environment and the TMN environment.

    the ability to convert management information

    from one format to another so that management

    information flowing within the TMN environment

    has a consistent nature

    the ability to transfer management information

    between locations within the TMN environment

    the ability to analyse and react appropriately to

    management information

    the ability to manipulate management information

    into a form which is useful and/or meaningful to the

    management information user

    the ability to deliver management information to

    the management information user and to present it

    with the appropriate representation

    the abilty to ensure secure access to management

    information by authorized management information

    users

    In TMN architecture there are mainly three architectural

    points of view each of which can be taken into account

    when TMN network is designed. These aspects are:

    fucntional, informational and physical architectures.

    Each of them studies the network architecture from

    different apects.

    3.2.1 Functional architecture

    The TMN functional architecture is described with

    functional blocks such as the Network Element Function

    (NEF), The Operations Systems Function (OSF) and

    Work Station Function (WSF). (Figure ) NEFs model all

    entities that form the network to be managed. NEFs areto be located physically on network elements. OSF

    provide the TMN functions for processing, storage and

    retrieval of management information. They form the

    core part of the TMN. Four different OSFs can be

    identified according to a hierarchial partitioning into

    four layers: the network element management layer,

    responsible for the management of a subset of the

    network elements in the whole network; the network

    management layer, responsible for the technical

    provision of services requested by the upper layer. This

    layer has an overall view of the network. The service

    management layer is responsible for all negotiations and

    resulting agreements between a customer and the service

    offered to this customer. The business management layer

    is responsible for the total enterprise. Therefore, it is

    possible to identify different types of OSFs; the NE-OSF,

    N-OSF, the S-OSF and the B-OSF. WSF represent thefunctionalities and information modelling entities

    related to the TMN man-machine communications

    between the management system and the human

    operator. Appel93

    Between the function blocks NEFs, OSFs and WSFs

    there are different kind of reference points: Q-, F- and

    X-type. The Q-type reference point is between OSFs of

    contiguous layers or between the OSF and the NEF; the

    F-type reference point is between the WSF and the OSF;

    and the X-type reference points are between OSFs

    belonging to different domains.

  • 8/14/2019 In Tutorial

    21/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    11

    Figure 0-3. TMN Operations Systems functional

    hierarchy. Appel93

    3.2.2 Informational architecture

    TMN informational architecture is based on Object-

    Oriented (O-O) point of view. Management systems

    exchange information modelled in terms of managed

    objects. Managed objects are conceptual views of the

    resources that are being managed or may exist to

    support certain management functions (e.g. event

    forwarding or event logging). Thus, a managed object is

    the abstraction of such a resource that represents its

    properties as seen by (and for the purposes of)

    management. A managed object may also represent a

    relationship between resources or a combination of

    resources (e.g. a network). M3010

    Management of a telecommunications environment is an

    information processing application. Because the

    environment being manages is distributed, network

    management is a disributed application. This involves

    the exchange of management information between

    management processes for the purpose of monitoring

    and controlling the various physical and logical

    networking resources (switching and trasmission

    resources). M3010

    The TMN architecture is based on Manager/Agent

    architecture. (Figure ) A manager takes care of the

    distributed applications part that issues management

    operation directives and receives notifications. The

    agent role if the part of the application process that

    manages the associated managed objects. The role of the

    agent will be to respond to the directives issued by a

    manager. It will also reflect to the manager a view of

    these objects and emit notifications reflecting the

    behaviour of these objects.

    Figure 0-4. Interaction between Manager, Agent and

    managed objects.

    In TMN the manager uses polling method to get the

    information from the agents. The agents store the

    statictics information in their databases that are called

    MIBs ( Management Information Base). A MIB is a

    conceptual database structure. It represents the set of

    managed objects within a managed system. The

    structure of the MIB is often showed in the form of a

    tree. This tree is called a Management Information Tree

    (MIT). (Figure 0-5) The tree is organized in a

    hierarchical way. At the upper parts of the tree resides

    the most meaning attributes and they are specified more

    entirely with the lower layer attributes.

  • 8/14/2019 In Tutorial

    22/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    12

    Figure 0-5. Management Information Tree.

    3.2.3 Physical architecture

    NEFs identify all the network elements as physical

    entities in TMN. Operations Systems (OS) form the core

    part of every TMN domain. The TMN physical

    architecture is not discussed more accurately in this

    paper.

    3.3 The need for IN

    In the past few years the development of

    telecommunications networks has been rapid. Thetelecommunications network technique before was

    controlled mainly by operators. The desire to share data

    and distribute application processing among network

    elements, the need for standard interfaces between them

    Garra93 and user demands for more sophisticated

    telecommunications services has changed the

    controlling of network elements notably. The

    telecommunications network elements today are

    controlled either by or interface with software.

    The development of IN architecture was initiated by

    Bellcore in USA almost ten years ago in order to help

    the Regional Bell Operating Companies to become more

    competitive in deregulated telecommunications

    environment. The original goal was to provide network

    operators with the ability to introduce, control and

    manage services more effectively by using a centralized

    database in a Service Control Point (SCP) for

    controlling and managing the various network services.

    Lauta93

    The network architectures, so far, have developed

    almost independently of each other. This point of view,

    of course, causes the network operators and service

    providers to provide independently implemented service

    to customers. The basic idea of IN has been that it

    integrates the services provided by the

    telecommunications networks today and thus, providing

    subscribers with more advanced services. So, the IN actsas a distributing and centralizing unit of the

    telecommunications services provided today. This way,

    it is possible to introduce more advanced services

    rapidly and cost effectively.

    3.3.1 Mobility and users identification

    Before, the users had an identification that was based

    exactly on the place where their access points to thetelecommunications network resided. The users access

    points were differentiated from each other with the

    Network ID (N_ID). This N_ID was at the early

    telecommunication systems for example the telephone

    number that did not support any mobility at all.

    According to the physical location there are three

    identification codes: N_IDs, S_IDs (Service ID) and

    U_IDs (User ID). (Figure 0-6) S_ID defines the service

    that is used by the user and U_ID defines the exact user.

    With these acronyms can be described that before the

    relation between user and network IDs was like U_ID

    N_ID.

  • 8/14/2019 In Tutorial

    23/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    13

    In the future there can exist several other relations too.

    For example, the mobility of users and services. The

    user can move from N_ID to another and use a service

    that could be either distributed throughout the

    telecommunications network or serve the user as a

    mobile service. Also from different U_IDs can be

    produced groups where the telecommunications network

    is used as a private network inside the whole

    telecommunications system. As a little more advanced

    telecommunications system, for example, GSM uses for

    mobility the relation that an U_ID describes a virtual

    channel ID that the GSM network manages. The

    Intelligent Network differentiates the user, network and

    service from each other. This point of description can

    manage mobility from each of its components and even

    of different Intelligent Networks when IN uses services

    from other INs. So, these are the main reasons for the

    development of an IN.

    Figure 0-6. Different relations between identifications.

  • 8/14/2019 In Tutorial

    24/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    14

    4. Intelligent Network Architecture

    4.1 Overview of IN

    The IN is a telecommunications network services

    control architecture. In February 1985, a Regional Bell

    Operating Company (RBOC) submitted a Request For

    Information (RFI) for a Feature Node concept with the

    following objectives: Ambro89

    Support the rapid introduction of new

    services in the network

    Help establish equipment and interfacestandards to give the RBOCs the widest

    possible choice of vendor products

    Create opportunities for non-RBOC

    service vendors to offer services that

    stimulate network usage

    As with the past telecommunications technology, it was

    not desirable to introduce short term services, because of

    the long implementation and development period. Now,

    with IN technology it is possible to introduce new

    services rapidly without affecting the available services.

    IN defines a great set of standards that describe the

    interfaces between different network control points.

    With only specifying the interfaces IN makes it possible

    for vendor systems to provide with different products

    and ,of course, for operators to use any of these products

    in their network configuration. IN includes also

    capabilities for other than operators to introduce new

    services into the telecommunications network. This will

    whole a lot change the structure of telecommunications

    business which is the main concern in the section 5. of

    this paper.

    The INs main advantage is the ability to orchestrate

    exchange service execution from a small set of

    Intelligent Network nodes known as Service Control

    Points (SCP). SCPs are connected to the network

    exchanges (known as Service Switching Points) via a

    standardized interface; CCITT Signalling System No. 7.

    The SS7 will facilitate a multi-vendor SCP and SSP

    marketplace, and the standardization of application

    interfaces allows a multi-vendor software marketplace

    for SCP applications (that is, the service control logic

    and its related data). (Figure 0-1) The SSPs detect when

    the SCP should handle a service. The SSP forwards astandardized SS7 (TCAP) message containing relevant

    service information. Via the TCAP message, the service

    control logic in the SCP directs the SSPs to perform the

    individual functions that collectively constitute the

    service (such as connecting a subscriber number or an

    announcement machine). Ambro89

    The INs long term goal is the ability to introduce new

    services, or change existing services quickly, without

    having to adapt SSP software (only parameters or

    trigger updates). The adaptation will be confined to the

    SCP where parameters or stimuli are updated. This goal

    will be achieved at first in two stages: IN/1 and IN/2.

    Ambro89 IN/1 will be the first implementations of IN at

    the beginning of 1990s and IN/2 will be introduced

    perhaps in 1995 because of the delays in the other areas

    of telecommunications technology. That is why the

    plans have been to introduce stage IN/1+ before the true

    IN/2 implementation to serve as a bridge between IN/1

    and IN/2.

  • 8/14/2019 In Tutorial

    25/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    15

    IN/1 requires updates in the SSP and SCP in order to

    support a new service. A typical IN/1 service is the

    Green Number Service (GNS) with which a subscriber

    can call a number free of charge. The SSPs contain

    triggers (such as the value of the dialed digits) that tell

    the SSP to send a message to an SCP in order to getinformation about the destination to which the call

    should be routed. Migration from IN/1 to IN/2 implies

    significant changes in the SSPs to accomodate new

    services.

    Stage 1: IN/1

    Once IN/2 is in place, no updates need be made to the

    SSPs software when new services are introduced. The

    IN/2 triggers advise the SSP whether to complete

    execution locally. All SSPs and SCPs contain set of

    basic service elements (for example, connect two lines,

    disconnect a line). The SCP also contains service

    relevant data. These basic service elements are knows as

    Functional Components (FC) from which each service

    can be contructed. A customer could conceptualize a

    new service and the network operator, via the SMS/SCP,

    could construct it quite rapidly. Any successful and

    widely-used service may be downloaded (via the service

    logic) to, but transparent to, the SSPs (if this is more

    economic or provides a desired higher grade of service).

    This facilitates complete rapid service creation. Rapid

    service creation and user programmability will take

    place in the SCP and the SMS. There will propably be

    one or more interim stages between IN/1 and IN/2, for

    example IN/1+ where the SSP provides increasing

    flexibility in accomodating rapid service creation.

    . Stage 2: IN/2

    Figure 0-1. Intelligent Network overview. Homa92

    An Intelligent Network is able to separate the

    specification, creation, and control of telephony services

    from physical switching networks. The key benefit of

    this capability is that exchange carriers will be able to

    rapidly engineer new revenue-producing services, in

    response to market opportunities, without having to relyon lenghty cycles for implementing them entirely on

    switching fabric. Ultimately, service creation, or at least

    service customization, can be extended to subscribers.

    Homa92

  • 8/14/2019 In Tutorial

    26/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    16

    4.2 IN standardation

    4.2.1 IN standards bodies

    The IN standards are defined by ETSI and CCITT. Also,

    in the USA, the work is being done by Bellcore, which is

    not a standards body but provides the major input to the

    American National Standards Institute committee TS.1.

    Roger90

    4.2.1.1 ETSI

    ETSI was created in 1988 and its members are the

    European Telcos (Telecommunications Operating

    Company), manufacturers, user representatives and

    research bodies. ETSI has two purposes. IN belongs to

    the latter category. Roger90

    to achieve workable versions of international

    standards for the European environment

    to define European standards in areas where

    quick response is required for technical

    development

    4.2.1.2 CCITT

    Work on international standards for IN began at CCITT

    in 1989. Study Group XI.4 is responsible of the

    standardation. CCITT expects that the specification and

    deployment of IN will continue over a number of study

    periods. CCITT name has changed to ITU

    (International Telecommunications Union) and there the

    Special Interest Group (SIG) is I (ITU-I). Its approach to

    the development of IN standards assumes that it isnecessary to start with a minimum set of criteria which

    are sufficiently open ended that they can evolve to meet

    the needs of the long-term concept as this becomes a

    practical reality. Roger90

    Both ETSI and ANSI are keen to ensure that CCITT

    recommendations agree substantially with their own

    activities, and collaboration between all three bodies is

    likely to be an important determinant in the rapid

    development of realistic IN standards.

    4.2.2 Phased standardation

    To meet the goals and objectives, CCITT has embarked

    on a phased standardation process toward the target IN

    architecture. CCITT works on defining a set of

    capabilities for each phase and simultaneously on

    evolving the view of the target INA. (Figure 0-2) The IN

    capabilities are called Capability Sets (CS). The

    Capability Sets involve service creation, management

    and interaction and also network management, service

    processing and network internetworking. These CSs are

    backwards-compatible to the previous CSs so the

    standardation and implementation of the services can be

    progressed through phases. Garra93

    Figure 0-2. Phased standardation of IN.

  • 8/14/2019 In Tutorial

    27/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    17

    4.2.3 Structure of CCITT IN standards

    The basic standard that defines the framework of other

    IN standards is Q.1200 - Q-Series Intelligent Network

    Recommendations Structure. The standards have been

    numbered so that every new CSx will have a number

    that begins with 12x and the description of the Csxrecommendation part y will be numbered also

    systematically such as 12xy. (Table 0-1) So, the

    principles introduction for IN CS2 will be

    recommendation number Q.1220.

    00 - General

    10 - CS1 1 - Principles Introduction

    20 - CS2 2 - Service Plane (not included forCS1)

    30 - CS3 3 - Global Functional Plane

    40 - CS4 4 - Distributed Functional Plane

    50 - CS5 5 - Physical Plane

    60 - CS6 6 - For future use

    70 - CS7 7 - For future use

    80 - CS8 8 - Interface Recommendations

    90 -Vocabulary

    9 - Intelligent Network UsersGuide

    Table 0-1. IN recommendations structure.

    4.2.4 Capability Set 1

    It has been an international and european wide aim to

    define the first step of INA. These recommendations are

    gathered into a set called IN Capability Set 1 (CS1).

    There are two standardation organisations working on

    CS1: CCITT and ETSI. CCITT has gathered these

    recommendations into the Q.120x -series. (Table 0-2)

    CCITTs and ETSIs standards do not differ from each

    other in any way.

    CCITT Study Group XI, Working Party XI/4 includes

    representatives from most of the important

    telecommunications network operators and equipment

    vendors in the world. Study Group XVIII also is

    involved in the initial set of IN standards, and is sharing

    responsibility for the Introductory Recommendations. At

    these meetings, there is an obvious willingness to

    strongly focus on achieving a realistic initial set of IN

    capability, which is both technically implementable and

    commercially deployable.Duran92

    New

    RecommendationQ.1200

    Q-Series Intelligent Network

    Recommendations Structure

    Draft

    RecommendationQ.1201

    Principles of Intelligent Network

    Architecture

    Draft

    RecommendationQ.1202

    Intelligent Network - Service

    Plane Architecture

    DraftRecommendation

    Q.1203

    Intelligent Network - GlobalFunctional Plane Architecture

    NewRecommendationQ.1204

    Intelligent Network - DistributedFunctional Plane Architecture

    New

    RecommendationQ.1205

    Intelligent Network - Physical

    Plane Architecture

    New

    RecommendationQ.1208

    Intelligent Network - Application

    Protocol General Aspects

    NewRecommendation

    Q.1211

    Intelligent Network -Introduction to Intelligent

    Network Capability Set 1

    NewRecommendation

    Q.1213

    Intelligent Network - GlobalFunctional Plane for CS1

    NewRecommendation

    Q.1214

    Intelligent Network - DistributedFunctional Plane for CS1

    NewRecommendationQ.1215

    Intelligent Network - PhysicalPlane for CS1

    New

    RecommendationQ.1218

    Intelligent Network - Intelligent

    Network Interface Specifications

  • 8/14/2019 In Tutorial

    28/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    18

    NewRecommendations

    Q.1219

    Intelligent Network Users guidefor Capability Set 1

    Table 0-2. IN CS1 recommendations.

    In defining IN CS1, CCITT applied the INCM

    ( Intelligent Network Conceptual Model) using bothbottom-up and top-down approaches. The former

    approach focused on modelling the capabilities of

    existing networks in terms of functional and physical

    architectures that could evolve the target IN

    architecture, given CCITTs objective of evolving IN

    from existing networks. The latter approach was service-

    driven and it focused on identifying a set of IN CS1

    services and Service Features. Then driving these down

    through the INCM in order to identify the set of service-

    independent capabilities for IN CS1, evolvable to the

    target set of IN capabilities, and verify that this set could

    be supported by the functional and physical architectures

    defined via the bottom-up approach. Garra93

    IN CS1 defines capabilities of direct use to both

    manufactures and network operators in support of

    circuit-switched voice/data services either defined or in

    the process of being defined by CCITT. The primary

    characteristic of the target set of IN CS1 services is that

    they apply during the setup phase of a call or during the

    release phase of a call. CCITT chose this single-ended

    service characteristic to limit the operational,

    implementation, and control complexity for IN CS1.

    Even with this limitation, it may be expected that

    equipment suppliers will support interworking of IN

    CS1 capabilities with existing switch-based services,

    including more complex services such as those that

    apply during the active phase of a call. For example, IN

    CS1 routing, charging, and user interaction capabilities

    may be used to customize or improve existing switch-

    based services to better satisfy market needs. Garra93

    It is anticipated that CS1 recommendations of CCITT

    and ETSI will be adopted world-wide. This will mean

    open interfaces between the SSP (Service Switching

    Point) and SCP (Service Control Point), thus putting

    into effect one of the most important goals of the IN,

    namely vendor independence. Lauta93

    4.2.5 IN CS1 Services

    Allthough, by nature, the IN is a service independent

    architecture, it is relevant to describe the general CS-1

    service capabilities. The services and Service Features

    that are to be supported by CS-1 are fundamental to the

    CS-1 Service Building Blocks, call processing model

    and service control principles.

    The target set of CS-1 defines several services (Table 0-

    3) and service features. A service is a stand-alone

    commercial offering, characterized by one or more core

    Service Features, and can be optionally enhanced by

    other Service Features. A Service Feature is a specific

    aspect of a service that can also be used in conjunction

    with other services/Service Features as part of a

    commercial offering. It is either a core part of a serviceor an optional part offered as an enhancement to a

    service. Q1211 The service composition and Service

    Features will be discussed more precisely later on.

  • 8/14/2019 In Tutorial

    29/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    19

    Automatic AlternativeBilling (ABB)

    Mass Calling (MAS)

    Abbreviated Dialling

    (ABD)

    Malicious Call

    Identification (MCI)

    Account Card Calling(ACC)

    Premium Rate (PRM)

    Credit Card Calling

    (CCC)

    Security Screening (SEC)

    Call Distribution (CD) Selective Call Forward on

    Busy/Dont Answer (SCF)

    Call Forwarding (CF) Split Charging (SPL)

    * Completion of Call toBusy Subsrciber (CCBS)

    Televoting (VOT)

    * Conference Calling(CON)

    Terminating CallScreening (TCS)

    Call Rerouting

    Distribution (CRD)

    User-Defined Routing

    (UDR)

    Destination CallRouting (DCR)

    Universal Access Number(UAN)

    Follow-Me-Diversion

    (FMD)

    Universal Personal

    Telecommunications(UPT)

    Freephone (FPH) Virtual Private Network (VPN)

    Note: The service indicated with a * may only be

    partially supported in CS1, because they require

    capabilities beyond those of type A services.

    Table 0-3. Target set of IN CS1 services.

    4.2.6 CCITT goals and objectives for services

    CCITT has defined goals and objectives for IN. The goal

    of work for IN is to define a new architectural concept

    that meets the needs of telecommunication service

    providers to rapidly, cost effectively, and differentiallysatisfy their existing and potential market needs for

    services, and to improve the quality and reduce the cost

    of network service operations and management. Garra93

    IN should be applicable to all telecommunications

    networks, such as Public Switched telecommunications

    Networks (PSTN), including Integrated Services Digital

    Networks (ISDN), both narrowband and broadband,

    packet-switched public data networks, and mobile

    networks. Allthough, IN CS1 enables only the use of

    PSTN, PLMN (Public Land Mobile Network) and ISDN.

    IN should enable service providers to define their own

    services, independent of service-specific developments

    by equipment suppliers.

    CS1 is intended to address services with high

    commercial value, focusing at addressing flexible

    routing, charging, and user interaction services. The list

    of benchmark services and features will be listed later

    on. Standardization of these services, however, is not

    CCITTs role. An important characteristic is that theservices will be technologically feasible and

    understandable, but do not significantly impact existing

    deployed technology. In this context, services have been

    categorized by CCITT as follows: Duran92

    All type A services are invoked on behalf of and

    directly affect a single user. Most type A services

    can be invoked only during call setup of tear down

    and fall in the category of single-user, single-

    ended (no requirements for representing end-to-

    end messaging or control), single point-of-control

    (no requirement fro representing interaction points

    between multiple service logic programs), and

    single-bearer capability (one media profile). Type

    A services may be used in conjunction with other

    services, switch-based or not, of any type, to form

    a more complete service package.

  • 8/14/2019 In Tutorial

    30/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    20

    Type B services can be invoked at any point

    during the call. These services may be invoked on

    behalf of and directly impact one or more users.

    Feature interaction and arbitration, and topology

    manipulation are capabilities that need to be

    addressed to deploy these services. Note that it ispossible to use type A capabilities to enhance some

    existing type B services.

    The services addressed by CS1 fall under type A

    services. The type A category lead to a series of

    advantages in the context of CS1 standardization. First,

    they represent a wide range of services of proven value.

    Second, these services depend on well-understood

    control relationships between network components and

    this represents an achievable target within required time

    frame of IN CS1 product deployment in 1993. Finally,

    complexity in the transition to rapid service delivery

    process is minimized both for service provider and for

    the equipment manufacturer. Duran92

    4.3 IN Conceptual Model

    The IN conceptual model is defined in the CCITT Draft

    Recommendation Q.1201. The conceptual model is

    divided into four planes and it forms the basis for the

    standardation work. (Figure 0-3) The IN conceptual

    Model was designed to serve as a modelling tool for the

    Intelligent Network. It is also a tool that can be used to

    design the IN architecture to meet the following main

    objectives: Q1215

    service implementation independence

    network implementation independence

    vendor and technology independence

    Figure 0-3. IN Conceptual Model. Draft91

  • 8/14/2019 In Tutorial

    31/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    21

    4.3.1 Physical Plane

    The physical plane is the lowest layer in the IN

    architecture. It takes action of how the network itself is

    implemented. It describes the physical architecture

    alternatives for an IN-structured network in terms of

    potential physical systems, referred to as physicalentities (PE), in a network, and interfaces between these

    Physical Entities. (Figure 0-4)

    One or more Functional Entities from the Distributed

    Functonal Plane may be realized in a Physical Entity on

    the physical plane, and one or more relationships from

    the Distributed Functional Plane may map into an

    interface on the physical plane. The physical plane

    architecture describes how functional architecture map

    into Physical Entities and interfaces. Garra93 Also the

    requirement for physical plane architecture is that

    vendors must be able to develop Physical Entities based

    on the mapping of Functional Entities and the standard

    interfaces. Q1215

    Figure 0-4. IN Physical Plane Architecture.

    4.3.1.1 Physical Entities

    The CCITT recommendation Q.1215 defines the

    Physical Entities (PE) used by IN. It also describes the

    interfaces between PEs and which IN functionalities areincluded into them from the Distributed Functional

    Plane and which of them are just optional entities.

  • 8/14/2019 In Tutorial

    32/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    22

    4.3.1.1.1 SSP

    SSP (Service Switching Point) is a Physical Entity in the

    telecommunications network that acts like a PABX. To

    make IN capabilities available to all types of access

    arrangements, we must develop service management

    independently of the access arrangements. Thisseparation of service management from network access

    would allow the same network-wide, IN capabilities to

    serve a variety of access arrangements, from analog

    lines to wireless, and, in the future, to broadband and

    other high-speed optical links. Wyatt91 In addition to

    providing users with access to the network (if the SSP is

    a local exchange) and performing any necessary

    switching functionality, the SSP allows access to the set

    of IN capabilities. The SSP contains Detection

    Capability to detect requests for IN services. It also

    contains capabilities to communicate with other PEs

    containing SCF, such as SCP, and to respond to

    instructions from the other PEs. Functionally, an SSP

    contains a Call Control Function, a Service Switching

    Function, and, if the SSP is a local exchange, a Call

    Control Agent Function. It also may optionally contain

    Service Control Function, and/or a Specialized ResourceFunction, and/or a Service Data Function. The SSP may

    provide IN services to users connected to subtending

    Network Access Points. Q1215

    The SSP is provided by the traditional switch

    manufacturers. These switches are programmable and

    they can be implemented in multipurpose computers.

    The basic function of SSP is that the software in

    switches separates basic call control from the service

    control of IN.

    4.3.1.1.2 NAP

    A NAP ( Network Access Point) is a PE that includes

    only the CCAF and CCF functional entities. It may also

    be present in the network. The NAP supports early and

    ubiquitous deployment of IN services. This NAP cannot

    communicate with an SCF, but it has the ability to

    determine when IN processing is required. It must send

    calls requiring IN processing to an SSP. Q1215

    4.3.1.1.3 SCP

    The SCP contains the Service Logic Porgrams (SLP)

    and data that are used to provide IN services. The SCP

    is connected to SSPs by a signalling network. Multiple

    SCPs may contain the same SLPs and data to improve

    service reliability and to facilitate load sharing between

    SCPs. Functionally, an SCP contains a Service Control

    Function and a Service Data Function. The SCF can

    access data in an SDP either directly or through a

    signalling network. The SDP may be in the same

    network as the SCP, or in another network. The SCP

    can be connected to SSPs, and optionally to IPs, through

    the signalling network. The SCP can also be connected

    to an IP via an SSP relay function. Q1215

    The SCP comprises the SCP node, the SCP platform,

    and applications. The node performs functions commonto applications, or independent of any application; it

    provides all functions for handling service-related,

    administrative, and network messages. These functions

    include message discrimination, distribution, routing,

    and network management and testing. For example,

    when the SCP node receives a service-related message,

    it distributes the incoming message to the proper

    application. In turn, the application issues a response

    message to the node, which routes it to the appropriate

    network elements. Ambro89

    The SCP node gathers data on all incoming and

    outgoing messages to assist in network administration

    and cost allocation. This data is collected at the node,

  • 8/14/2019 In Tutorial

    33/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    23

    and transmitted to an administrative system for

    processing. Ambro89

    The SCP node also measures the frequency of SCP

    hardware and software failures, resource usage, overload

    counts, and so on. It provides information needed to

    perform maintenance procedures, thus minimizing the

    impact of failures on system performance. The node may

    take action to prevent and correct the overload at the

    node or at a particular application. Ambro89

    4.3.1.1.4 AD

    The Adjunct (AD) PE is functionally equivalent to an

    SCP (i.e. it contains the same functional entities) but it

    is directly connected to and SSP. Communication

    between and Adjunct and an SSP is supported by a high

    speed interface. This arrangement may result in

    differing performance characteristics for an adjunct and

    an SCP. The application layer messages are identical in

    content to those carried by the signalling network to an

    SCP. Q1215 An Adjunct may be connected to more than

    one SSP and an SSP may be connected to several

    Adjuncts.

    4.3.1.1.5 IP

    The IP provides resources such as customized and

    concatenated voice announcements, voice recognition,

    and Dual Tone Multi-Frequencies (DTMF) digit

    collection, and contains switching matrix to connect

    users to these resources. The IP supports flexible

    information interactions between a user and thenetwork. Functionally, the IP contains the Special

    Resource Function. The IP may directly connect to one

    or more SSPs, and/or may connect to the signalling

    network. Q1215

    An SCP or Adjunct can request an SSP to connect a user

    to a resource located in an IP that is connected to the

    SSP from which the service request is detected. An SCP

    or Adjunct can also request the SSP to connect a user to

    a resource located in an IP that is connected to another

    SSP. Q1215

    4.3.1.1.6 SN

    The Service Node can control IN services and engage in

    flexible information interactions with users. The SN

    communicates directly with one or more SSPs, ech with

    a point-to-point signalling and transport connection.

    Functionally, the SN contains an SCF, SDF, SRF, and

    an SSF/CCF. This SSF/CCF is closely coupled to the

    SCF within the SN, and is not accessible by external

    SCFs. Q1215

    In a manner similar to an Adjunct, the SCF in an SN

    receives messages from the SSP, executes SLPs, and

    sends messages to the SSP. SLP in an SN may be

    developed by the same Service Creation Environment

    used to develop SLPs for SCPs and Adjuncts. The SRF

    in an SN enables the SN to interact with users in amanner similar to an IP. An SCF can request the SSF to

    connect a user to a resource located in an SN that is

    connected to the SSP from which the service request is

    detected. An SCF can also request the SSP to connect a

    user to a resource located in an SN that is connected to

    an another SSP. Q1215

    4.3.1.1.7SSCP

    The SSCP (Service Switching and Control Point) is a

    combined SCP and SSP in a single node. Functionally,

    it contains an SCF, SDF, CCAF, CCF, and SSF. The

    connection between the SCF/SDF functions and the

    CCAF/CCF/SSF functions is proprietary and closely

  • 8/14/2019 In Tutorial

    34/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    24

    coupled, but it provides the same service capability as an

    SSP and SCP separately. This node may also contain

    SRF functionality, i.e. SRF as an optional functionality.

    The interfaces between the SSCP and other PEs are the

    same as the interfaces between the SSP and other PEs,

    and therefore will not be explicitly stated. Q1215

    4.3.1.1.8 SDP

    The SDP contains the customer and network data which

    is accessed during the execution of a service.

    Functionally, the SDP contains an SDF. Q1215 It

    contains data used by Service Logic Programs to provide

    individualized services. Functionally, and SDP contains

    a Service Data Function. It can be accessed directly by

    an SCP and/or SMP, or through the signalling network.

    It can also access other SDPs in its own or other

    networks. Q1205

    4.3.1.1.9 SMP

    The Service Management Point/Service Management

    System performs service management control, service

    provision control, and service deployment control.Examples of functions it can perform are database

    administration, network surveillance and testing,

    network traffic management, and network data

    collection. Functionally, the SMP contains the Service

    Management Function and, optionally, the Service

    Management Access Function and the Service Creation

    Environment Function. The SMP can access all other

    Physical Entities. Q1205

    A Service Management System is the operations system

    through which network operator and service subscriber

    personnel manage SCPs and related service applications

    (programs and databases) in an IN. More than one SMS

    may be associated with the IN; the network operating

    company may want a separate SMS for each IN service

    or a single SMS for several IN services. Ambro89

    Physically, the SMS resides in a multipurpose computer.

    Processing power and database size requirements

    normally govern the choice of a specific computer. The

    SMS manages a private network consisting of switched

    and leased line connected to a set of keyboard or display

    terminals through which network operator and service

    subscriber personnel gain interactive messages to the

    system. Ambro89

    4.3.1.1.10 SCEP

    The Service Creation Environment Point is used to

    define, develop, and test an IN service, and to input it

    into the SMP. Functionally, it contains the Service

    Creation Environment Function. The SCEP interacts

    directly with the SMP. Q1205

    4.3.1.1.11 SMAP

    The Service Management Access Point provides some

    selected users, such as service managers and customers,

    with access to the SMP. One possible use of the SMAP

    is to provide one single point of access for a given user

    to several SMPs. The SMAP functionally contains a

    Service Management Access Function. The SMAP

    directly interacts with the SMP. Q1205

    4.3.1.2 Interfaces between PEs

    In the Physical Plane Architecture several standardized

    interfaces are stated. These interfaces are: SCP-SSP,

    AD-SSP, IP-SSP, SN-SSP, SCP-IP, AD-IP, and SCP-

    SDP.

    Existing lower layer protocols are proposed for these

    candidate interfaces to carry the application layer

  • 8/14/2019 In Tutorial

    35/73

    IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

    Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen

    25th February 1994

    25

    messages required by IN services. As such, the focus of

    the standardization effort for CS-1 is on the applications

    layer protocols. At the application layer, the message

    sent that the different interfaces carry should reflect the

    same semantic content, even though the application

    layer message may be encoded or formatted differently.

    For example, the messages between the SSF in an SSP

    and the SCF in an SCP, Adjunct or SN should contain

    the same information. The following sections give some

    proposed protocols for use on these interfaces. Q1215

    4.3.1.2.1 SCP-SSP interface

    The proposed underlying protocols platform for the

    interface between an SCP and an SSP is Transaction

    Capabilities Application Part (TCAP) on Signalling

    Connection Control Part (SCCP)/Message Transfer Part

    (MTP) of SS7. Q1215 So, the SCP-SSP interface in CS-

    1 is using CCITT SS7 protocol stack to communicate

    (signal) with each other. The interface could also be

    something else at the lowest layer protocols of the SS7

    in order to achieve, for example, high-speed signalling

    between these PEs. That is why, the IN standardization

    is mainly focused on the application layer protocols.

    4.3.1.2.2 AD-SSP interface

    Th