You are on page 1of 73

Telecom FINLAND

Telecom research centre


Elimäenkatu 9a
00510 Helsinki
finland

and

Lappeenranta university of technology


department of information technology
lappeenranta

Intelligent Network Tutorial


for the second
winterSchool on telecommunications
march 1994

Abstract

The development of telecommunications techniques and the need for more advanced services has
created projects on standardization of international Intelligent Networks (IN). The standards of
Intelligent Networks define IN in an abstract point of view, so it leaves the service providers the
decisions on their own implementations. The first standard sets of IN are Bellcore’s AIN.0 and
the CCITT’s Capability Set 1 (CS1). They define the basic services of IN and provide some
additional features such as rapid service introduction and a flexible architecture that provides
future expansion to further IN Capability Sets. The standardation organisations, such as CCITT
and ETSI, work hard to help the service providers to implement their IN architecture flexible in
order to be able to provide international IN services. This kind of architecture is better known as
global Intelligent Network architecture and it should be taken into consideration already in the
early implementations of IN. This paper provides some history of telecommunications
technology, an overview of IN and its services and some additional discussion on the future
broadband IN.

Kim Molin Olli Martikainen


Lappeenranta University of technology Telecom research centre
laserkatu 6 sturenkatu 16 helsinki
53850 Lappeenranta, Finland telecom finlanD
E-mail: molinϕ mato.cc.lut.fi
Tel.Int: +358 0 574 3625 Tel.int: +358 0 7098 3503
Contents

Contents

Abbreviations

1. PREFACE 1

2. INTRODUCTION 2

2.1 Early computers and telecommunications 2

2.2 Switching systems development 3

2.3 Turning-points in telecommunications 5


2.3.1 UMTS 5

3. COMPUTER CONTROLLED TELECOMMUNICATIONS 7

3.1 CCITT Signalling System No. 7 7


3.1.1 Network Services Part 8
3.1.2 User Part 8
3.1.3 Signalling network structure 9

3.2 Telecommunications Management Network 9


3.2.1 Functional architecture 10
3.2.2 Informational architecture 11
3.2.3 Physical architecture 12

3.3 The need for IN 12


3.3.1 Mobility and users identification 12

4. INTELLIGENT NETWORK ARCHITECTURE 14

4.1 Overview of IN 14

4.2 IN standardation 16
4.2.1 IN standards bodies 16
4.2.2 Phased standardation 16
4.2.3 Structure of CCITT IN standards 16
4.2.4 Capability Set 1 17
4.2.5 IN CS1 Services 18
4.2.6 CCITT goals and objectives for services 19

4.3 IN Conceptual Model 20


4.3.1 Physical Plane 21
4.3.2 Distributed Functional Plane 26
4.3.3 Global Functional Plane 30
4.3.4 Service Plane 35

4.4 The IN-structured network 38


4.4.1 SCE 38
4.4.2 The function of IN 39
4.4.3 IN Application Protocol 40

4.5 Personal Communications Services 41

4.6 Integration of TMN and IN 42


4.6.1 Comparison of IN planes to TMN planes 43

4.7 Globalizing the IN 44

4.8 Future IN Capability Sets 44

4.9 Current activities of IN 45

5. CHANGES IN BUSINESS 46

5.1 Technology and services 46

5.2 IN services 47
5.2.1 Benefits of IN 47
5.2.2 Cost structure 48
5.2.3 Service portfolio 49

5.3 Evolution of IN capabilities in Telecom Finland 50


5.3.1 Pre-IN 50
5.3.2 Centralized IN 50
5.3.3 Special services 50

6. BROADBAND INTELLIGENCE AND MEDIA 51

6.1 Broadband networks 51


6.1.1 B-ISDN 51
6.1.2 ATM networks 53

6.2 Applications for the broadband networks 55

6.3 Broadband IN 56

6.4 Telecom Finland B-IN project 57


6.4.1 The hardware configuration 57
6.4.2 TMN and B-IN 58

7. REFERENCES 60
ABBREVIATIONS
AAB Automatic Alternative Billing
ABD Abbreviated Dialling
AC Application Context
ACB Automatic Call Back
ACC Account Card Calling
AD Adjunct
AOD Audio On Demand
AP Application Process
ASE Application Service Element
ASN.1 Abstract Syntax Notation One
ATM Asynchronous Transfer Mode
ATT Attendant
AUC Authentication Center
AUTC Authentication
AUTZ Authorization Code
B-IN Broadband IN
B-ISDN Broadband Integrated Services Digital Network
B-OSF Business OSF
B-SCP Broadband Service Control Point
B-SMS Broadband Service Management System
B-SSP Broadband Service Switching Point
BAF Basic Access Function
BCP Basic Call Process
BER Basic Encoding Rules
BRI Basic Rate Interface
BSF Base Station Function
BTF Basic Transit Function
CBR Continuous Bit Rate
CCAF Call Control Agent Function
CCBS Completion of Call to Busy Subscriber
CCC Credit Card Calling
CCF Call Control Function
CCITT Concultative Committee for International Telephony and Telegraphy
CCS Common Channel Signalling
CCSN Common Channel Signalling Network
CD Call Distribution
CD Compact Disk
CD-ROM Compact Disk-Read Only Memory
CF Call Forwarding
CFC Call Forwarding on BY/DA
CHA Call Hold with Announcement
CID Call Instance Data
CIDFP CID Field Pointer
CLI Calling Line Identity
COC Consultation Calling
CON Conference Calling
CPM Customer Profile Management
CRA Customized Recorded Announcement
CRD Call Rerouting Distribution
CRG Customized Ringing
CS Capability Set
CS1 Capability Set 1
CT2 Cordless Telephone 2
CUG Closed User Group
CW Call Waiting
DC Detection Capability
DCP Destination Point Code
DCR Destination Call Routing
DDD Direct Distance Dialing
DECT Digital European Cordless Telecommunications
DFP Distributed Functional Plane
DTMF Dual Tone Multi-Frequencies
DUP Destinating User Prompter
EC European Community
EF Elementary Function
EIR Equipment Identification Register
ERMES European Radio Message System
ETSI European Telecommunications Standards Institute
FC Functional Component
FE Functional Entity
FEA Functional Entity Action
FIE Facility Information Element
FMD Follow-Me-Diversion
FPH Freephone
GAP Call Gapping
GFP Global Functional Plane
GNS Green Number Service
GSL Global Service Logic
GSM Global System for Mobile communications
Groupe Special Mobile
GUI Graphical User Interface
GUS Gravis UltraSound
HDTV High Definition TeleVision
HLR Home Location Register
HP Hewlett Packard
IN Intelligent Network
INA Intelligent Network Architecture
INAP IN Application Protocol
INCM Intelligent Network Conceptual Model
IP Intelligent Peripheral
ITU International Telecommunications Union
IVS INRIA Videonconferencing System
LIM Call Limiter
LOG Call Logging
MACF Multiple Association Control Function
MAP Mobile Application Part
MAS Mass Calling
MCI Malicious Call Identification
MIB Management Information Base
MIT Management Information Tree
MMC Meet-Me-Conference
MPEG Moving Pictures Experts Group
MSC Mobile Services Center
MSCF Mobile Switching Center Function
MTP Message Transfer Part
MWC Multi-Way Calling
N-OSF Network OSF
N_ID Network ID
NAF Network Access Function
Ne-OSF Network element OSF
NEF Network Element Function
NNI Network-to-Node Interface
NSP Network Services Part
O-O Object-Oriented
OAM Operations And Maintenance
OC-x Optical Carrier level at x
OCS Originating Call Screening
ODR Origin Dependent Routing
OFA Off Net Access
OMAP Operations, Maintenance, and Administration Part
ONC Off Net Calling
ONE One Number
OSF Operations Systems Function
OSI Open Systems Interconnection
OSIRM OSI Reference Model
OUP Originating User Prompter
PABX Private Access Branch eXchange
PCS Personal Communications Services
PDH Plesiochronous Digital Hierarchy
PE Physical Entity
PIN Personal Identification Number
PLMN Public Land Mobile Network
PN Personal Numbering
PNP Private Numbering Plan
POI Point Of Initiation
POR Point Of Return
PRI Primary Rate Interface
PRM Premium Rate
PRMC Premium Charging
PSTN Public Switched Telecommunications Network
PTN Personal Telecommunications Number
PVC Permanent Virtual Channel
QOS Quality of Service
QUE Call Queueing
RACE Research and technology development in Advanced Communications
technologies in Europe
RBOC Regional Bell Operating Company
REVC Reverse Charging
rN relationship N
ROSE Remote Operations Service Element
RTP Real-time Transport Protocol
S-OSF Service OSF
S_ID Service ID
SACF Single Association Control Function
SAO Single Association Object
SCCP Signalling Connection Control Part
SCE Service Creation Environment
SCEF Service Creation Environment Function
SCF Service Control Function
SCF Selective Call Forward on Busy/Don’t Answer
SCP Service Control Point
SDF Service Data Function
SDH Synchronous Digital Hierarchy
SEAL Simple and Efficient Adaptation Layer
SEC Security Screening
SF Service Feature
SIB Service-Independent building Block
SIG Special Interest Group
SLP Service Logic Program
SMS Service Management System
SP Service Plane
SPC Stored Program Control
SPL Split Charging
SRF Specialized Resource Function
SS Service Subscriber
SS7 Signalling System no. 7
SSD Service Support Data
SSF Service Switching Function
SSN Subsystem Number
SSP Service Switching Point
STM Synchronous Transport Module
STP Signalling Transfer Point
SVC Switched Virtual Channel
TCAP Transaction Capabilities Application Part
TCP Transmission Control Protocol
TCS Terminating Call Screening
TDR Time Dependent Routing
Telco Telecommunications Operating Company
TINA TMN+IN
TMN Telecommunications Management Network
TP Transact Processing system
TRA Call Transfer
U_ID User ID
UAN Universal Access Number
UDP User Datagram Protocol
UDR User-Define Routing
UMTS Universal Mobile Telecommunications System
UNI User-to-Network Interface
UP User Part
UPT Universal Personal Telecommunications
VBR Variable Bit Rate
VC Virtual Circuit
VCC Virtual Channel Connection
VCI Virtual Channel Identifier
VLR Visitor Location Register
VOD Video On Demand
VOT Televoting
VP Virtual Path
VPI Virtual Path Identifier
VPN Virtual Private Network
WSF Work Station Function
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

(INA) is shown in section 4. from an abstract point of

1. Preface view. Also some future plans to expand the architecture


are studied, such as Telecommunications Management
Network and Intelligent Network integration. In section
This paper is made for the participants of the
5. the affects of telecommunications networks
Proceedings of First Winter School on Intelligent
development to the changes in business are studied.
Networks to be held in Helsinki at Telecom Finland on
Some additional discussion of broadband networks and
March 1994. This tutorial is done in cooperation with
broadband services in Intelligent Networks is provided
Lappeenranta University of Technology and Telecom
in section 6. This section also informs of a research
Finland. This study is supposed to be a tutorial for the
project running at Telecom Finland in 1994.
Intelligent Networks (IN) that studies IN from user,
operator and software points of view. This tutorial gives
some history of the development of computers and
telecommunications networks towards more advanced
systems and networks that provide additional features,
for example, to the normal telephony services. These
networks and architectures that add value to
conventional telecommunications networks are often
referred to as Intelligent Networks (IN). This guide
provides an explanation of IN concepts, standards and
technologies and gives some view concerning the subject
of the situation today. Also some changes in the area of
telecommunications business is concerned. Also some
forecasts to future developments of IN are provided. The
author of this tutorial apologies for the possible mistakes
that exist in this article and remarks that some critics
and notices are welcome concerning the subject.

Section 2. describes the history of telecommunications


and its development towards the future techniques. The
changes in the switching systems and some turning-
points in telecommunications are allthough the main
concern. The concept of Computer Controlled
Telecommunications is described in section 3. Section 3.
also includes signalling network history and
development, management networks for
telecommunications networks, and the need for more
advanced services. The Intelligent Network Architecture

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 1
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

done by modems with signalling rates of about 300

2. Introduction bauds. In those days, the telecommunications networks


did not provide bit errorfree data transfer. Bit errors
appeared very often and it was then when transport
protocols at end systems and heavy link and network
2.1 Early computers and telecommunications
protocols between the network nodes were developed to
Since electronic machines got some kind of intelligence minimize this unreliability problem.
it is almost fifty years ago. Since then, the development
of these machines towards computers has been rapid. In
1950’s there were no data networks because of the
insufficient network technology and the use of them
would have been minimal. In those days, computers
acted as ‘batch’ processors. The programming of them
was very difficult, because they needed paper tapes to
inform the computer of the function needed. These batch
processors work in a simple way. They read the paper
tapes bit by bit containing information presented as
holes in the paper. So the Input/Output (I/O) operations
of the computers was far too inefficient to use the
analogous telecommunications network that was
Figure 0-1. Transaction processing system.
provided at that time. The computers in those days were
only used to scientifical calculations that needed no In 1970’s Transaction Processing (TP) systems were
other I/O operations than instruction and data read, and taken in use in the area of banking. These TP’s located
a printout function of the calculations. So computers in the main office and worked like servers there. The
were completely in local use in those days. clients sended requests via the communication network
and the TP answered them with responses. (Figure )
The next generation of computer technology was the
TP’s and communication networks have developed a lot
appearance of computers into real world use. They had
and this client-server model is still in use in banking. At
more intelligence than the computers just a decade
day time, computer systems work as transaction
before. The first use of computers was in the process
processors, but at night as highly developed batch
industry where computers removed process control tasks
processors. This is because they are incapable of serving
from humans in the 1960’s. This meant that the I/O
the requests (even thousands of requests per hour) that
operations of the computers were more developed and
might come from several offices simultaneously. Such
they could already communicate with other devices.
batch functions are for example the payment of salaries
Later on, the process industry became heavily computer
every month. However, these computer systems need to
controlled. It was also then when the first uses of
telecommunications networks became possible. This was

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 2
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

serve the realtime queries and give responses to frames and the then-available technologies favored
hundreds of locations worldwide. producing this new service by slightly rearranging the
internal structure of the switching systems and
“squeezing in” the new capability. The end result was
2.2 Switching systems development
that DDD moved considerable network-related data into
From 1870’s to 1950’s, the primary focus of swithing the local switches and also added new functions related
system development was on producing better to the network connection capabilities into the local
technologies for permitting two people to engage in switches. On many of the existing switches, this
voice communications over larger and larger distances involved adding specialized “boxes” to correctly
and to make this technology more readily available, interpret the new dialed numbers and route them to the
cheaper, and more reliable. During this period the correct places for proper DDD connectivity. To get some
industry moved from local calls being handled by idea of the technological problems associated only with
operators with plug boards, to step-by-step switches, to the interconnection aspects of the telecommunications at
panel switches, to crossbar switches, to Stores Program that time, we can look at one of the services we consider
Control (SPC) switches. It is interesting to read that in basic today. In 1956, the first undersea cable using
1925 one of the most significant breakthroughs was the repeaters was activated at a cost of about $6
separation of the connection control activities from the million/circuit resulting in a cost of about $75/minute.
maintenance of the actual connections during an active By 1976, the cost per circuit was reduced by a
call. This change, over time, allowed the switching hundredfold, thus permitting later developments to focus
systems to reuse the more complex resources of the more on providing various services beyond connection.
switch (those used for initiating and setting up a call), One of the driving forces for more services at this time
thus ending an era of having to duplicate these costly was the reduction in the cost of the connections so that
resources and having them tied up for the entire smaller groups of people with specialized needs were
duration of a call. One of the major implications of entering the market and asking for capabilities beyond
switching systems development during this period was simple connectivity. This was the beginning of the
that almost all the information about how connections transition period in which the structure of the
were to be created resided on the individual switches, telecommunications industry was changing away from
specifically, subscriber information, information about the former connection focus toward a new service focus.
how to provide the limited functions available at that However, the pace of change was slow given the
time, and implicit network information were all technological problems that still had to be overcome to
contained in each switch. Benne93 provide good, clean and economical connections. Thus,
there was no driving need to reorganize the basic
In the 1950’s, Direct Distance Dialing (DDD) began to
structure of what existed; nor was there any real
be deployed as a new service, but this was still a
guidance as to what kinds of services the customers
continuation of the general focus on providing
would be willing to purchase as a service marketing was
telecommunications connections between fixed points
in its infancy. Benne93
(usually two). Furthermore, the long development time

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 3
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

During the 1960’s and 1970’s, the requests for As we entered the 1980’s, the technologies derived form
additional services began to grow, but the pace was the computer and space industries began to be felt in the
rather leisurely by today’s standards since the general marketplace. This, in conjunction with the
technology to support these new services was not readily lowering of transmission and interconnection service
available on the general market. For example, the fax costs, resulted in an exponential growth in the demand
technologies available were not very advanced and did for newer and more flexible telecommunications
not produce sufficiently high-quality results to enable services. Another major factor driving toward more
people to change their basic methods of operation to specialized services was the breakup, in the United
incorporate faxes into their work as they do today. Also, States, of the Bell System and resulting competition,
the derivative technologies associated with the growth of where services were the factor that differentiated one
computers, personal computers, and microchip carrier form another. Furthermore, with diversiture, the
technology had not reached a state where they were former local operating companies were permitted to
demanding telecommunication services much beyond make instructions into one anothers’ traditional service
classical interconnectivity services. However, the genesis areas and, to do this effectively, they needed to have
of the current service-driven climate occurred during something to offer that was not available from the local
this period as the specialty groups began to experiment service provider. All of these changes resulted in
with new ideas and request new services. Once again, customers being more aware of what technology provide
the pace was such that it was more economical and and demanding that the telecommunications industry
easier to “squeeze” the new capabilities into the existing change to meet the new requirements for services.
switching systems than to change the switches and have Benne93
to replace the embedded base with newer technologies.
The 1990’s and beyond will demand that the
This slow evolution process was aided by the small -
telecommunications industry change its basic ideas
market bse for the newer services. During this period,
about the structure of their networks and how they will
the efforts to put more and more new service capabilities
evolve. Up until the 1980’s, network development was
onto the switching systems resulted in a large expansion
driven by the need to provide cheap, efficient
of the types of information being placed on the switches,
interconnections between fixed points. There was only
e.g., variations of call models proliferated, more
minor emphasis on structuring the switching systems to
network-related information was brought into the
be readily adaptable to the rapidly changing service
switches, and data under the control of the end users
requirements that have appeared in the last decade. Now
was moved onto the switches (speed calling lists, centrex
that cheap, efficient interconnection capabilities are
data, etc.). As this data was moved onto the switches,
available, the relative roles of the interconnection
the programs to manipulate the data and ensure its
capabilities and end-user services will be interchanged.
integrity also had to be moved onto the switches. This
The demans for more and more specialized end-user
resulted in the switches becoming very general data
services will continue to grow, and there will be an
control and usage systems as well as the connection-
inceasing demand for having the new services in shorter
producing systems they had traditionally been. Benne93
and shorter time frames. Thus, the basic structure for the

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 4
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

network, and especially the structure and function of the The telecommunications networks and wide area
switching systems, will change to accomodate this need networks used PDH (Plesiochronous Digital Hierarchy)
for rapid deployment of more and more custom services. technology in the physical data transfer. At the
In summary, the telecomunications industry, which has introduction of CCITT’s SDH (Synchronous Digital
been interconnection-driven, will, in the future, be Hierarchy) technology the physical data transfer rates
service-driven. Benne93 These facts will be discussed increased remarkably. A new technology, ATM
more entirely later in this paper. (Asynchronous Transfer Mode), was introduced to use
the available bandwidth efficiently in the 1992. By the
introduction of ATM it was possible to imagine of such
2.3 Turning-points in telecommunications
concepts as B-ISDN (Broadband Integrated Services
Several turning-points can be found in the history of Digital Network) and broadband IN. These technologies
telecommunications technology (marked as circles in the will be discussed more accurately later on.
figure). (Error! Reference source not found.) First, the
beginning of data transfer by the use of analogous
telephony service was an important stage in the history.
This service was not good for use in corporations
because of its low data transfer ratio. Then, there was a
need for a data transfer service that used billing by data
amount while the expences of the analogous telephony
service consisted mainly of the data transfer time. The
packet data networks were developed especially for
corporative use. Second, CCITT (Concultative
Committee for International Telephone and Telegraphy)
introduced its seven layer OSI protocol stack SS7 to
replace the analogous signalling system. This was the
corner-stone for the digital telecommunications
technology that is used, for instance, in ISDN Figure 0-2. The development of telecommunications.
(Integrated Services Digital Network). In the late 1980’s
radio signalling technology was advanced enough to 2.3.1 UMTS
provide digital telephony service. The GSM (Global UMTS (Universal Mobile Telecommunications System)
System for Mobile communications) mobile phone is intended to be an international standard for global
technology, introduced in 1992, is also suitable for low- telecommunication system. It is a third generation
speed data transfer. The Intelligent Network is an mobile telecommunications system which integrates
architecture ment to integrate all the several second generation mobile systems like cordless
telecommunications services mentioned in a flexible telephones (CT2 (Cordless Telephone 2) and DECT
way. (Digital European Cordless Telecommunications)),
mobile telecommunications systems (GSM and PCN)

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 5
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

and radio message systems (ERMES (European Radio


Message System)). Hara93 (Figure )

UMTS is researched in RACE financed by EC


(European Community) and ETSI’s group SGM5.
UMTS is an advanced systems concept which defines a
mobile communications system where a mobile phone
could be used at home, office and elsewhere. Hara93
UMTS is an open system which is based on TMN and
IN concepts. The system supports ISDN services and
could be at some degree compatible with B-ISDN. This
system is a very advanced telecommunications system
that supports global mobility and Intelligent Network
services and is not expected to be introduced before the
year 2000.

Figure 0-3. Evolution of mobile services and systems.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 6
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

new signalling protocol stack SS7 (Signalling System

3. Computer Controlled No. 7) based on CCITT OSI (Open Systems


Interconnection) Reference Model (OSIRM) in 1980.
Telecommunications
SS7 is fully digital and SS7 protocols correspond to the
first three layers of the OSIRM and includes also
protocols at the application layer. (Figure ) The
3.1 CCITT Signalling System No. 7
signalling network structure component of SS7 is the
The word ‘signalling’ ment the transfer of analogous Network Service Part (NSP), and it consists of the
signals in a network, for example in the analogous Message Transfer Part (MTP) and the Signalling
telephony network the activation of nonintelligent Connection Control Part (SCCP). The upper layer part
switches, just a few decades ago. In the context of of the SS7 protocol architecture consist the User Part
modern telecommunications, signalling can be defined (UP).
as the system that enables Stored Program Control
SS7 is quite an advanced protocol stack. It includes
exchanges, network databases, and other “intelligent”
capabilities for congestion control and overload control.
nodes of the network to exchange messages related to
It also includes features for avoiding congestion by
call setup, supervision, teardown (call/connection
alternative routing or capacity expansion when heavy
control information) Modar90, information needed for
load is detected. With congestion is ment generally,
distributed application processing (inter-process
shortage of resources, which is caused by an excessive
query/response, or user-to-user data) and network
amount of load, or a failure that reduces the installed
management information.
capacity of a network element. SS7 also includes
Just a few decades ago (and even today), the capabilities for sending congestion and overload
telecommunications networks used analogous indications to the adjacent exchanges or traffic sources.
signalling, based on frequency tones, between network Lehti93
nodes. Some key attributes of these signalling methods
are that they are inband (i.e. signalling information is
conveyed over the same channel that is used for speech)
Modar90; call set-up times are long (from about 10 to 20
s); limited information can be transferred resulting,
among other things, in restrictive network routing
capabilities.

With the introduction of electronic processors in


switching systems came the possibility of providing
Common Channel Signalling (CCS). This is an out-of-
band signalling method in which a common data
channel is used to convey signalling information related
to a number of trunks. Modar90 CCITT published this

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 7
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

messages between two directly connected signalling


points. The third level of MTP presents the signalling
network functions. They correspond to the lower half of
the OSI’s network layer, and they provide the functions
and procedures for the transfer of messages between
signalling points, which are the nodes of the signalling
network. Modar90

SCCP provides additional functions to MTP for both


connectionless and connection-oriented network
services. SCCP enhances the services of the MTP to
provide the functional equivalent of OSI’s network

Figure 0-1. SS7 protocol architecture. layer. The addressing capability of MTP is limited to
delivering a message to a node and using a four-bit

3.1.1 Network Services Part service indicator to distribute messages within the node.
SCCP supplements this capability by providing an
MTP consists of levels 1-3 of the SS7 protocol stack and
addressing capability that uses DPCs (Destination Point
it provides a connectionless message transfer system that
Code) plus Subsystem Numbers (SSN). The SSN is local
enables signalling information to be transferred across
addressing information used by SCCP to identify each of
the network to its desired destination. Functions are
the SCCP users at a node. Modar90
included in MTP that allow system failures to occur in
the network without adversely affecting the transfer of
signalling information. So the overall purpose of MTP is 3.1.2 User Part
to provide a reliable transfer and delivery of signalling The User Part forms the most upper layer of the SS7
information across the signalling network and to have protocol stack that use the services provided by the
the ability to react and take necessary actions in lower layers SCCP and MTP. User Part functions are
response to system and network failures to ensure that ISDN-UP, TCAP (Transaction Capabilities Application
reliable transfer is maintained. The first level of MTP Part) and OMAP (Operations, Maintenance, and
presents the signalling data link functions. A signalling Administration Part). The ISDN-UP is not discussed in
data link functon is a bidirectional transmission path for this paper. TCAP refers to the set of protocols and
signalling, consisting of two data channel operating functions used by a set of widely distributed applications
together in opposite directions at the same data rate. It in a network to communicate with each other. TCAP
fully complies with the OSI’s definition of the physical directly uses the service of SCCP. Essentially, TCAP
layer. Level 2 of MTP presents the signalling link provides a set of tools in a connectionless environment
functions. The signalling link functions correspond to that can be used by an application at a node to invoke
the OSI’s data link layer. Together with a signalling execution of a procedure at another node and exchange
data link, the signalling link functions provide a the results of such invocation. As such, it includes
signalling link for the reliable transfer of signalling protocols and services to perform remote operations. It is

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 8
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

closely related to the OSI Remote Operations Service Part protocol is specified independent of the underlying
Element (ROSE). The OMAP of the SS7 protocol stack signalling network structure. However, to meet the
provides the applications protocols and procedures to stringent availability requirements given below (e.g.,
monitor, coordinate, and control all the network signalling route set unavailability is not exceeded ten
resource that make communications based on SS7 minutes per year), it is clear that any network structure
possible. Modar90 must provide redundancies for the signalling links,
which have unavailabilities measured in many hours per
year. In most cases the STP’s must also have backups.
3.1.3 Signalling network structure
Modar90

The worldwide signalling network is intended to be


structured into two functionally independent levels: the
national and international levels. This allows numbering
plans network management of the international and the
different national network to be independent of one
another. A signalling point can be a national signalling
point, an international signalling point, or both. If it
serves both, it is identified by a specific signalling point
code in each of the signalling networks. Modar90

Figure 0-2. CCITT SS7 network structure.


3.2 Telecommunications Management Network
Signalling networks consist of signalling points and
signalling links connecting the signalling points
Telecommunications Management Network (TMN) is a
together. (Figure ) As alluded to earlier, a signalling
generic, management-oriented architecture, intended to
point that transfers messages from one signalling link to
be used for all kinds of management services. Appel93 It
another at level 3 is said to be a STP (Signalling
has been defined in the CCITT M.3000 series standards.
Transfer Point). Signalling points that are STP’s can According to the concept it intends to meet several
also provide functions higher than level 3, such as SCCP purposes: several network and devices, digital and
and other level 4 functions like ISDN-UP. When analogic transmission systems, circuit- and packet
signalling point has an STP capability and also provides switched data networks, public exchanges and PABX’s
level 4 functions like ISDN-UP, it is commonly said to (Private Access Branch Exchange).
have an integrated STP functionality. When the
signalling point provides only STP capability, or STP TMN is intended to support different management based
and SCCP capabilities, it is commonly called a stand- areas. These five functional areas are:
alone STP. Signalling links, STP’s (stand-alone and
• Performance management
integrated), and signalling points with level 4 protocol
functionality can be combined in many different ways to • fault management
form a signalling network. The SS7 Network Services

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 9
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

• configuration management 3.2.1 Functional architecture

• accounting management The TMN functional architecture is described with


functional blocks such as the Network Element Function
• security management
(NEF), The Operations Systems Function (OSF) and
Work Station Function (WSF). (Figure ) NEFs model all

The functionality of TMN consists of the following entities that form the network to be managed. NEFs are

subjects: M3010 to be located physically on network elements. OSF


provide the TMN functions for processing, storage and
• the ability to exchange management information
retrieval of management information. They form the
across the boundary between the telecommunications
core part of the TMN. Four different OSFs can be
environment and the TMN environment.
identified according to a hierarchial partitioning into
• the ability to convert management information
four layers: the network element management layer,
from one format to another so that management
responsible for the management of a subset of the
information flowing within the TMN environment
network elements in the whole network; the network
has a consistent nature
management layer, responsible for the technical
• the ability to transfer management information
provision of services requested by the upper layer. This
between locations within the TMN environment
layer has an overall view of the network. The service
• the ability to analyse and react appropriately to
management layer is responsible for all negotiations and
management information
resulting agreements between a customer and the service
• the ability to manipulate management information
offered to this customer. The business management layer
into a form which is useful and/or meaningful to the
is responsible for the total enterprise. Therefore, it is
management information user
possible to identify different types of OSFs; the NE-OSF,
• the ability to deliver management information to
N-OSF, the S-OSF and the B-OSF. WSF represent the
the management information user and to present it
functionalities and information modelling entities
with the appropriate representation
related to the TMN man-machine communications
• the abilty to ensure secure access to management
between the management system and the human
information by authorized management information
operator. Appel93
users
Between the function blocks NEFs, OSFs and WSFs

In TMN architecture there are mainly three architectural there are different kind of reference points: Q-, F- and

points of view each of which can be taken into account X-type. The Q-type reference point is between OSFs of

when TMN network is designed. These aspects are: contiguous layers or between the OSF and the NEF; the

fucntional, informational and physical architectures. F-type reference point is between the WSF and the OSF;

Each of them studies the network architecture from and the X-type reference points are between OSFs

different apects. belonging to different domains.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 10
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

and controlling the various physical and logical


networking resources (switching and trasmission
resources). M3010

The TMN architecture is based on Manager/Agent


architecture. (Figure ) A manager takes care of the
distributed applications part that issues management
operation directives and receives notifications. The
agent role if the part of the application process that
manages the associated managed objects. The role of the
agent will be to respond to the directives issued by a
manager. It will also reflect to the manager a view of
these objects and emit notifications reflecting the
behaviour of these objects.

Figure 0-3. TMN Operations Systems functional


hierarchy. Appel93

3.2.2 Informational architecture

TMN informational architecture is based on Object-


Oriented (O-O) point of view. Management systems
exchange information modelled in terms of managed
objects. Managed objects are conceptual views of the Figure 0-4. Interaction between Manager, Agent and
resources that are being managed or may exist to managed objects.
support certain management functions (e.g. event
In TMN the manager uses polling method to get the
forwarding or event logging). Thus, a managed object is
information from the agents. The agents store the
the abstraction of such a resource that represents its
statictics information in their databases that are called
properties as seen by (and for the purposes of)
MIBs (Management Information Base). A MIB is a
management. A managed object may also represent a
conceptual database structure. It represents the set of
relationship between resources or a combination of
managed objects within a managed system. The
resources (e.g. a network). M3010
structure of the MIB is often showed in the form of a

Management of a telecommunications environment is an tree. This tree is called a Management Information Tree

information processing application. Because the (MIT). (Figure 0-5) The tree is organized in a

environment being manages is distributed, network hierarchical way. At the upper parts of the tree resides

management is a disributed application. This involves the most meaning attributes and they are specified more

the exchange of management information between entirely with the lower layer attributes.

management processes for the purpose of monitoring

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 11
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

environment. The original goal was to provide network


operators with the ability to introduce, control and
manage services more effectively by using a centralized
database in a Service Control Point (SCP) for
controlling and managing the various network services.
Lauta93

The network architectures, so far, have developed


almost independently of each other. This point of view,
of course, causes the network operators and service
providers to provide independently implemented service
Figure 0-5. Management Information Tree.
to customers. The basic idea of IN has been that it
integrates the services provided by the
3.2.3 Physical architecture
telecommunications networks today and thus, providing
NEFs identify all the network elements as physical
subscribers with more advanced services. So, the IN acts
entities in TMN. Operations Systems (OS) form the core
as a distributing and centralizing unit of the
part of every TMN domain. The TMN physical
telecommunications services provided today. This way,
architecture is not discussed more accurately in this
it is possible to introduce more advanced services
paper.
rapidly and cost effectively.

3.3 The need for IN


3.3.1 Mobility and users identification

In the past few years the development of Before, the users had an identification that was based
telecommunications networks has been rapid. The exactly on the place where their access points to the
telecommunications network technique before was telecommunications network resided. The users’ access
controlled mainly by operators. The desire to share data points were differentiated from each other with the
and distribute application processing among network Network ID (N_ID). This N_ID was at the early
elements, the need for standard interfaces between them telecommunication systems for example the telephone
Garra93 and user demands for more sophisticated number that did not support any mobility at all.
telecommunications services has changed the According to the physical location there are three
controlling of network elements notably. The identification codes: N_ID’s, S_ID’s (Service ID) and
telecommunications network elements today are U_ID’s (User ID). (Figure 0-6) S_ID defines the service
controlled either by or interface with software. that is used by the user and U_ID defines the exact user.
With these acronyms can be described that before the
The development of IN architecture was initiated by
relation between user and network ID’s was like U_ID≡
Bellcore in USA almost ten years ago in order to help
N_ID.
the Regional Bell Operating Companies to become more
competitive in deregulated telecommunications

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 12
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

In the future there can exist several other relations too.


For example, the mobility of users and services. The
user can move from N_ID to another and use a service
that could be either distributed throughout the
telecommunications network or serve the user as a
mobile service. Also from different U_ID’s can be
produced groups where the telecommunications network
is used as a private network inside the whole
telecommunications system. As a little more advanced
telecommunications system, for example, GSM uses for
mobility the relation that an U_ID describes a virtual
channel ID that the GSM network manages. The
Intelligent Network differentiates the user, network and
service from each other. This point of description can
manage mobility from each of its components and even
of different Intelligent Networks when IN uses services
from other IN’s. So, these are the main reasons for the
development of an IN.

Figure 0-6. Different relations between identifications.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 13
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

business which is the main concern in the section 5. of

4. Intelligent Network Architecture this paper.

The IN’s main advantage is the ability to orchestrate


exchange service execution from a small set of
4.1 Overview of IN
Intelligent Network nodes known as Service Control
Points (SCP). SCPs are connected to the network
The IN is a telecommunications network services
exchanges (known as Service Switching Points) via a
control architecture. In February 1985, a Regional Bell
standardized interface; CCITT Signalling System No. 7.
Operating Company (RBOC) submitted a Request For
The SS7 will facilitate a multi-vendor SCP and SSP
Information (RFI) for a Feature Node concept with the
marketplace, and the standardization of application
following objectives: Ambro89
interfaces allows a multi-vendor software marketplace
• Support the rapid introduction of new for SCP applications (that is, the service control logic
services in the network and its related data). (Figure 0-1) The SSPs detect when
• Help establish equipment and interface the SCP should handle a service. The SSP forwards a
standards to give the RBOCs the widest standardized SS7 (TCAP) message containing relevant
possible choice of vendor products service information. Via the TCAP message, the service
• Create opportunities for non-RBOC control logic in the SCP directs the SSPs to perform the
service vendors to offer services that individual functions that collectively constitute the
stimulate network usage service (such as connecting a subscriber number or an
announcement machine). Ambro89

As with the past telecommunications technology, it was The IN’s long term goal is the ability to introduce new
not desirable to introduce short term services, because of services, or change existing services quickly, without
the long implementation and development period. Now, having to adapt SSP software (only parameters or
with IN technology it is possible to introduce new trigger updates). The adaptation will be confined to the
services rapidly without affecting the available services. SCP where parameters or stimuli are updated. This goal
IN defines a great set of standards that describe the will be achieved at first in two stages: IN/1 and IN/2.
interfaces between different network control points. Ambro89 IN/1 will be the first implementations of IN at
With only specifying the interfaces IN makes it possible the beginning of 1990’s and IN/2 will be introduced
for vendor systems to provide with different products perhaps in 1995 because of the delays in the other areas
and ,of course, for operators to use any of these products of telecommunications technology. That is why the
in their network configuration. IN includes also plans have been to introduce stage IN/1+ before the true
capabilities for other than operators to introduce new IN/2 implementation to serve as a bridge between IN/1
services into the telecommunications network. This will and IN/2.
whole a lot change the structure of telecommunications

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 14
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

IN/1 requires updates in the SSP and SCP in order to


support a new service. A typical IN/1 service is the
Green Number Service (GNS) with which a subscriber
can call a number free of charge. The SSPs contain
triggers (such as the value of the dialed digits) that tell
the SSP to send a message to an SCP in order to get
information about the destination to which the call
should be routed. Migration from IN/1 to IN/2 implies
significant changes in the SSPs to accomodate new
services.

Stage 1: IN/1

Once IN/2 is in place, no updates need be made to the


SSPs software when new services are introduced. The
IN/2 triggers advise the SSP whether to complete
execution locally. All SSPs and SCPs contain set of
basic service elements (for example, connect two lines,
disconnect a line). The SCP also contains service
relevant data. These basic service elements are knows as
Functional Components (FC) from which each service
can be contructed. A customer could conceptualize a
new service and the network operator, via the SMS/SCP,
could construct it quite rapidly. Any successful and
widely-used service may be downloaded (via the service
logic) to, but transparent to, the SSPs (if this is more Figure 0-1. Intelligent Network overview. Homa92

economic or provides a desired higher grade of service). An Intelligent Network is able to separate the
This facilitates complete rapid service creation. Rapid specification, creation, and control of telephony services
service creation and user programmability will take from physical switching networks. The key benefit of
place in the SCP and the SMS. There will propably be this capability is that exchange carriers will be able to
one or more interim stages between IN/1 and IN/2, for rapidly engineer new revenue-producing services, in
example IN/1+ where the SSP provides increasing response to market opportunities, without having to rely
flexibility in accomodating rapid service creation. on lenghty cycles for implementing them entirely on
switching fabric. Ultimately, service creation, or at least
. Stage 2: IN/2
service customization, can be extended to subscribers.
Homa92

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 15
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

4.2 IN standardation Both ETSI and ANSI are keen to ensure that CCITT
recommendations agree substantially with their own
activities, and collaboration between all three bodies is
4.2.1 IN standards bodies
likely to be an important determinant in the rapid
The IN standards are defined by ETSI and CCITT. Also,
development of realistic IN standards.
in the USA, the work is being done by Bellcore, which is
not a standards body but provides the major input to the
American National Standards Institute committee TS.1. 4.2.2 Phased standardation

Roger90 To meet the goals and objectives, CCITT has embarked


on a phased standardation process toward the target IN
architecture. CCITT works on defining a set of
4.2.1.1 ETSI
capabilities for each phase and simultaneously on
ETSI was created in 1988 and its members are the
evolving the view of the target INA. (Figure 0-2) The IN
European Telcos (Telecommunications Operating
capabilities are called Capability Sets (CS). The
Company), manufacturers, user representatives and
Capability Sets involve service creation, management
research bodies. ETSI has two purposes. IN belongs to
and interaction and also network management, service
the latter category. Roger90
processing and network internetworking. These CS’s are

• to achieve workable versions of international backwards-compatible to the previous CS’s so the

standards for the European environment standardation and implementation of the services can be

• to define European standards in areas where progressed through phases. Garra93

quick response is required for technical


development

4.2.1.2 CCITT

Work on international standards for IN began at CCITT


in 1989. Study Group XI.4 is responsible of the
standardation. CCITT expects that the specification and
deployment of IN will continue over a number of study
periods. CCITT name has changed to ITU
(International Telecommunications Union) and there the
Special Interest Group (SIG) is I (ITU-I). Its approach to
the development of IN standards assumes that it is
necessary to start with a minimum set of criteria which
are sufficiently open ended that they can evolve to meet
the needs of the long-term concept as this becomes a Figure 0-2. Phased standardation of IN.
practical reality. Roger90

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 16
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

4.2.3 Structure of CCITT IN standards telecommunications network operators and equipment

The basic standard that defines the framework of other vendors in the world. Study Group XVIII also is

IN standards is Q.1200 - Q-Series Intelligent Network involved in the initial set of IN standards, and is sharing

Recommendations Structure. The standards have been responsibility for the Introductory Recommendations. At

numbered so that every new CSx will have a number these meetings, there is an obvious willingness to

that begins with 12x and the description of the Csx strongly focus on achieving a realistic initial set of IN

recommendation part y will be numbered also capability, which is both technically implementable and

systematically such as 12xy. (Table 0-1) So, the commercially deployable.Duran92

principles introduction for IN CS2 will be New Q-Series Intelligent Network


recommendation number Q.1220. Recommendation Recommendations Structure
Q.1200
00 - General Draft Principles of Intelligent Network
10 - CS1 1 - Principles Introduction Recommendation Architecture
Q.1201
20 - CS2 2 - Service Plane (not included for
CS1) Draft Intelligent Network - Service
Recommendation Plane Architecture
30 - CS3 3 - Global Functional Plane Q.1202
40 - CS4 4 - Distributed Functional Plane Draft Intelligent Network - Global
50 - CS5 5 - Physical Plane Recommendation Functional Plane Architecture
Q.1203
60 - CS6 6 - For future use
New Intelligent Network - Distributed
70 - CS7 7 - For future use Recommendation Functional Plane Architecture
Q.1204
80 - CS8 8 - Interface Recommendations
New Intelligent Network - Physical
90 - 9 - Intelligent Network Users
Recommendation Plane Architecture
Vocabulary Guide
Q.1205
New Intelligent Network - Application
Table 0-1. IN recommendations structure.
Recommendation Protocol General Aspects
Q.1208
4.2.4 Capability Set 1 New Intelligent Network -
Recommendation Introduction to Intelligent
It has been an international and european wide aim to Q.1211 Network Capability Set 1
define the first step of INA. These recommendations are New Intelligent Network - Global
gathered into a set called IN Capability Set 1 (CS1). Recommendation Functional Plane for CS1
Q.1213
There are two standardation organisations working on
New Intelligent Network - Distributed
CS1: CCITT and ETSI. CCITT has gathered these Recommendation Functional Plane for CS1
recommendations into the Q.120x -series. (Table 0-2) Q.1214
CCITT’s and ETSI’s standards do not differ from each New Intelligent Network - Physical
Recommendation Plane for CS1
other in any way.
Q.1215
New Intelligent Network - Intelligent
CCITT Study Group XI, Working Party XI/4 includes
Recommendation Network Interface Specifications
representatives from most of the important Q.1218

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 17
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

New Intelligent Network Users guide


It is anticipated that CS1 recommendations of CCITT
Recommendations for Capability Set 1
Q.1219 and ETSI will be adopted world-wide. This will mean
open interfaces between the SSP (Service Switching
Table 0-2. IN CS1 recommendations. Point) and SCP (Service Control Point), thus putting
In defining IN CS1, CCITT applied the INCM into effect one of the most important goals of the IN,
(Intelligent Network Conceptual Model) using both namely vendor independence. Lauta93
“bottom-up” and “top-down” approaches. The former
approach focused on modelling the capabilities of 4.2.5 IN CS1 Services
existing networks in terms of functional and physical
Allthough, by nature, the IN is a service independent
architectures that could evolve the target IN
architecture, it is relevant to describe the general CS-1
architecture, given CCITT’s objective of evolving IN
service capabilities. The services and Service Features
from existing networks. The latter approach was service-
that are to be supported by CS-1 are fundamental to the
driven and it focused on identifying a set of IN CS1
CS-1 Service Building Blocks, call processing model
services and Service Features. Then driving these down
and service control principles.
through the INCM in order to identify the set of service-
independent capabilities for IN CS1, evolvable to the The target set of CS-1 defines several services (Table 0-
target set of IN capabilities, and verify that this set could 3) and service features. A service is a stand-alone
be supported by the functional and physical architectures commercial offering, characterized by one or more core
defined via the “bottom-up” approach. Garra93 Service Features, and can be optionally enhanced by
other Service Features. A Service Feature is a specific
IN CS1 defines capabilities of direct use to both
aspect of a service that can also be used in conjunction
manufactures and network operators in support of
with other services/Service Features as part of a
circuit-switched voice/data services either defined or in
commercial offering. It is either a core part of a service
the process of being defined by CCITT. The primary
or an optional part offered as an enhancement to a
characteristic of the target set of IN CS1 services is that
service. Q1211 The service composition and Service
they apply during the setup phase of a call or during the
Features will be discussed more precisely later on.
release phase of a call. CCITT chose this single-ended
service characteristic to limit the operational,
implementation, and control complexity for IN CS1.
Even with this limitation, it may be expected that
equipment suppliers will support interworking of IN
CS1 capabilities with existing switch-based services,
including more complex services such as those that
apply during the active phase of a call. For example, IN
CS1 routing, charging, and user interaction capabilities
may be used to customize or improve existing switch-
based services to better satisfy market needs. Garra93

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 18
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

Automatic Alternative Mass Calling (MAS)


Networks (PSTN), including Integrated Services Digital
Billing (ABB)
Networks (ISDN), both narrowband and broadband,
Abbreviated Dialling Malicious Call
(ABD) Identification (MCI) packet-switched public data networks, and mobile

Account Card Calling Premium Rate (PRM) networks. Allthough, IN CS1 enables only the use of
(ACC) PSTN, PLMN (Public Land Mobile Network) and ISDN.
Credit Card Calling Security Screening (SEC) IN should enable service providers to define their own
(CCC)
services, independent of service-specific developments
Call Distribution (CD) Selective Call Forward on
Busy/Don’t Answer (SCF) by equipment suppliers.

Call Forwarding (CF) Split Charging (SPL)


CS1 is intended to address services with high
* Completion of Call to Televoting (VOT)
commercial value, focusing at addressing flexible
Busy Subsrciber (CCBS)
routing, charging, and user interaction services. The list
* Conference Calling Terminating Call
(CON) Screening (TCS) of benchmark services and features will be listed later
Call Rerouting User-Defined Routing on. Standardization of these services, however, is not
Distribution (CRD) (UDR)
CCITT’s role. An important characteristic is that the
Destination Call Universal Access Number services will be technologically feasible and
Routing (DCR) (UAN)
understandable, but do not significantly impact existing
Follow-Me-Diversion Universal Personal
(FMD) Telecommunications deployed technology. In this context, services have been
(UPT) categorized by CCITT as follows: Duran92
Freephone (FPH) Virtual Private Network
(VPN) All type A services are invoked on behalf of and

Note: The service indicated with a * may only be directly affect a single user. Most type A services

partially supported in CS1, because they require can be invoked only during call setup of tear down

capabilities beyond those of type A services. and fall in the category of “single-user, single-
ended (no requirements for representing end-to-

Table 0-3. Target set of IN CS1 services. end messaging or control), single point-of-control
(no requirement fro representing interaction points

4.2.6 CCITT goals and objectives for services between multiple service logic programs), and
single-bearer capability (one media profile)”. Type
CCITT has defined goals and objectives for IN. The goal
A services may be used in conjunction with other
of work for IN is to define a new architectural concept
services, switch-based or not, of any type, to form
that meets the needs of telecommunication service
a more complete service package.
providers to rapidly, cost effectively, and differentially
satisfy their existing and potential market needs for
services, and to improve the quality and reduce the cost
of network service operations and management. Garra93
IN should be applicable to all telecommunications
networks, such as Public Switched telecommunications

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 19
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

Type B services can be invoked at any point • service implementation independence


during the call. These services may be invoked on
• network implementation independence
behalf of and directly impact one or more users.
Feature interaction and arbitration, and topology
• vendor and technology independence
manipulation are capabilities that need to be
addressed to deploy these services. Note that it is
possible to use type A capabilities to enhance some
existing type B services.

The services addressed by CS1 fall under type A


services. The type A category lead to a series of
advantages in the context of CS1 standardization. First,
they represent a wide range of services of proven value.
Second, these services depend on well-understood
control relationships between network components and
this represents an achievable target within required time
frame of IN CS1 product deployment in 1993. Finally,
complexity in the transition to rapid service delivery
process is minimized both for service provider and for
the equipment manufacturer. Duran92

4.3 IN Conceptual Model

The IN conceptual model is defined in the CCITT Draft


Recommendation Q.1201. The conceptual model is
divided into four planes and it forms the basis for the
standardation work. (Figure 0-3) The IN conceptual
Model was designed to serve as a modelling tool for the
Intelligent Network. It is also a tool that can be used to
design the IN architecture to meet the following main
objectives: Q1215

Figure 0-3. IN Conceptual Model. Draft91

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 20
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

4.3.1 Physical Plane

The physical plane is the lowest layer in the IN


architecture. It takes action of how the network itself is
implemented. It describes the physical architecture
alternatives for an IN-structured network in terms of
potential physical systems, referred to as physical
entities (PE), in a network, and interfaces between these
Physical Entities. (Figure 0-4)

One or more Functional Entities from the Distributed


Functonal Plane may be realized in a Physical Entity on
the physical plane, and one or more relationships from
the Distributed Functional Plane may map into an
interface on the physical plane. The physical plane
architecture describes how functional architecture map
into Physical Entities and interfaces. Garra93 Also the
requirement for physical plane architecture is that
vendors must be able to develop Physical Entities based
on the mapping of Functional Entities and the standard
interfaces. Q1215

Figure 0-4. IN Physical Plane Architecture.

4.3.1.1 Physical Entities

The CCITT recommendation Q.1215 defines the


Physical Entities (PE) used by IN. It also describes the
interfaces between PEs and which IN functionalities are
included into them from the Distributed Functional
Plane and which of them are just optional entities.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 21
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

4.3.1.1.1 SSP be present in the network. The NAP supports early and

SSP (Service Switching Point) is a Physical Entity in the ubiquitous deployment of IN services. This NAP cannot

telecommunications network that acts like a PABX. To communicate with an SCF, but it has the ability to

make IN capabilities available to all types of access determine when IN processing is required. It must send

arrangements, we must develop service management calls requiring IN processing to an SSP. Q1215

independently of the access arrangements. This


separation of service management from network access 4.3.1.1.3 SCP
would allow the same network-wide, IN capabilities to
The SCP contains the Service Logic Porgrams (SLP)
serve a variety of access arrangements, from analog
and data that are used to provide IN services. The SCP
lines to wireless, and, in the future, to broadband and
is connected to SSPs by a signalling network. Multiple
other high-speed optical links. Wyatt91 In addition to
SCPs may contain the same SLPs and data to improve
providing users with access to the network (if the SSP is
service reliability and to facilitate load sharing between
a local exchange) and performing any necessary
SCPs. Functionally, an SCP contains a Service Control
switching functionality, the SSP allows access to the set
Function and a Service Data Function. The SCF can
of IN capabilities. The SSP contains Detection
access data in an SDP either directly or through a
Capability to detect requests for IN services. It also
signalling network. The SDP may be in the same
contains capabilities to communicate with other PEs
network as the SCP, or in another network. The SCP
containing SCF, such as SCP, and to respond to
can be connected to SSPs, and optionally to IPs, through
instructions from the other PEs. Functionally, an SSP
the signalling network. The SCP can also be connected
contains a Call Control Function, a Service Switching
to an IP via an SSP relay function. Q1215
Function, and, if the SSP is a local exchange, a Call
Control Agent Function. It also may optionally contain The SCP comprises the SCP node, the SCP platform,
Service Control Function, and/or a Specialized Resource and applications. The node performs functions common
Function, and/or a Service Data Function. The SSP may to applications, or independent of any application; it
provide IN services to users connected to subtending provides all functions for handling service-related,
Network Access Points. Q1215 administrative, and network messages. These functions
include message discrimination, distribution, routing,
The SSP is provided by the traditional switch
and network management and testing. For example,
manufacturers. These switches are programmable and
when the SCP node receives a service-related message,
they can be implemented in multipurpose computers.
it distributes the incoming message to the proper
The basic function of SSP is that the software in
application. In turn, the application issues a response
switches separates basic call control from the service
message to the node, which routes it to the appropriate
control of IN.
network elements. Ambro89

The SCP node gathers data on all incoming and


4.3.1.1.2 NAP
outgoing messages to assist in network administration
A NAP (Network Access Point) is a PE that includes
and cost allocation. This data is collected at the node,
only the CCAF and CCF functional entities. It may also

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 22
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

and transmitted to an administrative system for An SCP or Adjunct can request an SSP to connect a user
processing. Ambro89 to a resource located in an IP that is connected to the
SSP from which the service request is detected. An SCP
The SCP node also measures the frequency of SCP
or Adjunct can also request the SSP to connect a user to
hardware and software failures, resource usage, overload
a resource located in an IP that is connected to another
counts, and so on. It provides information needed to
SSP. Q1215
perform maintenance procedures, thus minimizing the
impact of failures on system performance. The node may
4.3.1.1.6 SN
take action to prevent and correct the overload at the
node or at a particular application. Ambro89 The Service Node can control IN services and engage in
flexible information interactions with users. The SN
communicates directly with one or more SSPs, ech with
4.3.1.1.4 AD
a point-to-point signalling and transport connection.
The Adjunct (AD) PE is functionally equivalent to an
Functionally, the SN contains an SCF, SDF, SRF, and
SCP (i.e. it contains the same functional entities) but it
an SSF/CCF. This SSF/CCF is closely coupled to the
is directly connected to and SSP. Communication
SCF within the SN, and is not accessible by external
between and Adjunct and an SSP is supported by a high
SCFs. Q1215
speed interface. This arrangement may result in
differing performance characteristics for an adjunct and In a manner similar to an Adjunct, the SCF in an SN
an SCP. The application layer messages are identical in receives messages from the SSP, executes SLPs, and
content to those carried by the signalling network to an sends messages to the SSP. SLP in an SN may be
SCP. Q1215 An Adjunct may be connected to more than developed by the same Service Creation Environment
one SSP and an SSP may be connected to several used to develop SLPs for SCPs and Adjuncts. The SRF
Adjuncts. in an SN enables the SN to interact with users in a
manner similar to an IP. An SCF can request the SSF to
connect a user to a resource located in an SN that is
4.3.1.1.5 IP
connected to the SSP from which the service request is
The IP provides resources such as customized and
detected. An SCF can also request the SSP to connect a
concatenated voice announcements, voice recognition,
user to a resource located in an SN that is connected to
and Dual Tone Multi-Frequencies (DTMF) digit
an another SSP. Q1215
collection, and contains switching matrix to connect
users to these resources. The IP supports flexible
information interactions between a user and the 4.3.1.1.7 SSCP

network. Functionally, the IP contains the Special The SSCP (Service Switching and Control Point) is a
Resource Function. The IP may directly connect to one combined SCP and SSP in a single node. Functionally,
or more SSPs, and/or may connect to the signalling it contains an SCF, SDF, CCAF, CCF, and SSF. The
network. Q1215 connection between the SCF/SDF functions and the
CCAF/CCF/SSF functions is proprietary and closely

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 23
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

coupled, but it provides the same service capability as an company may want a separate SMS for each IN service
SSP and SCP separately. This node may also contain or a single SMS for several IN services. Ambro89
SRF functionality, i.e. SRF as an optional functionality.
Physically, the SMS resides in a multipurpose computer.
The interfaces between the SSCP and other PEs are the
Processing power and database size requirements
same as the interfaces between the SSP and other PEs,
normally govern the choice of a specific computer. The
and therefore will not be explicitly stated. Q1215
SMS manages a private network consisting of switched
and leased line connected to a set of keyboard or display
4.3.1.1.8 SDP
terminals through which network operator and service
The SDP contains the customer and network data which subscriber personnel gain interactive messages to the
is accessed during the execution of a service. system. Ambro89
Functionally, the SDP contains an SDF. Q1215 It
contains data used by Service Logic Programs to provide
4.3.1.1.10 SCEP
individualized services. Functionally, and SDP contains
The Service Creation Environment Point is used to
a Service Data Function. It can be accessed directly by
define, develop, and test an IN service, and to input it
an SCP and/or SMP, or through the signalling network.
into the SMP. Functionally, it contains the Service
It can also access other SDPs in its own or other
Creation Environment Function. The SCEP interacts
networks. Q1205
directly with the SMP. Q1205

4.3.1.1.9 SMP
4.3.1.1.11 SMAP
The Service Management Point/Service Management
The Service Management Access Point provides some
System performs service management control, service
selected users, such as service managers and customers,
provision control, and service deployment control.
with access to the SMP. One possible use of the SMAP
Examples of functions it can perform are database
is to provide one single point of access for a given user
administration, network surveillance and testing,
to several SMPs. The SMAP functionally contains a
network traffic management, and network data
Service Management Access Function. The SMAP
collection. Functionally, the SMP contains the Service
directly interacts with the SMP. Q1205
Management Function and, optionally, the Service
Management Access Function and the Service Creation
Environment Function. The SMP can access all other 4.3.1.2 Interfaces between PEs
Physical Entities. Q1205 In the Physical Plane Architecture several standardized
interfaces are stated. These interfaces are: SCP-SSP,
A Service Management System is the operations system
AD-SSP, IP-SSP, SN-SSP, SCP-IP, AD-IP, and SCP-
through which network operator and service subscriber
SDP.
personnel manage SCPs and related service applications
(programs and databases) in an IN. More than one SMS Existing lower layer protocols are proposed for these
may be associated with the IN; the network operating candidate interfaces to carry the application layer

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 24
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

messages required by IN services. As such, the focus of (BRI), Primary Rate Interface (PRI) (or both), or SS7.
the standardization effort for CS-1 is on the applications Q1215
layer protocols. At the application layer, the message
If a BRI or PRI is used, the ISDN D-channel connecting
sent that the different interfaces carry should reflect the
an IP to an SSP carries application layer information
same semantic content, even though the application
between an SCF and an SRF, and supports the setup of
layer message may be encoded or formatted differently.
B-channel connections to the IP. Information is passed
For example, the messages between the SSF in an SSP
from an SCF to an SRF (e.g. collected information and
and the SCF in an SCP, Adjunct or SN should contain
billing measurements) is embedded in the Facility
the same information. The following sections give some
Information Element (FIE). The FIE can be carried by a
proposed protocols for use on these interfaces. Q1215
number of Q.931 messages, like SETUP and
DISCONNECT. The FIE can also be carried by the
4.3.1.2.1 SCP-SSP interface
FACILITY message in Q.931. This possibility provides
The proposed underlying protocols platform for the for the flexibility to convey application layer information
interface between an SCP and an SSP is Transaction without affecting the connection state of the call. Q1215
Capabilities Application Part (TCAP) on Signalling
Connection Control Part (SCCP)/Message Transfer Part
4.3.1.2.4 SN-SSP interface
(MTP) of SS7. Q1215 So, the SCP-SSP interface in CS-
The proposed underlying protocol platform for the
1 is using CCITT SS7 protocol stack to communicate
interface between an SN and an SSP is ISDN BRI, PRI
(signal) with each other. The interface could also be
(or both). An SN and an SSP exchange application layer
something else at the lowest layer protocols of the SS7
messages over an ISDN D-channel using common
in order to achieve, for example, high-speed signalling
element procedures of CCITT Recommendations Q.932.
between these PEs. That is why, the IN standardization
This communication may occur on a separate D-channel
is mainly focused on the application layer protocols.
from the channel that carries the common element
procedure messages. These channels may also be
4.3.1.2.2 AD-SSP interface
separate. Q1215
The proposed underlying protocol platform for the AD-
SSP interface is TCAP. The physical interface has not
4.3.1.2.5 SCP-IP interface
been specified, but a number of alternative standard
The proposed underlying protocol platform for an
protocols could be used.
interface between an SCP and an IP is TCAP on
SCCP/MTP of the SS7 protocol stack. Q1215
4.3.1.2.3 IP-SSP interface

This interface is used for communications between an IP


4.3.1.2.6 AD-IP interface
and an SSP as well as for communication between an IP
The proposed underlying protocol platform between an
and an SCP which is being relayed through an SSP. The
AD and an IP is TCAP. The physical interface has not
proposed underlying protocol platform for the interface
between an IP and an SSP is ISDN Basic Rate Interface
Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 25
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

been specified, but a number of alternative standard Out-of-band (i.e. D_channel) signalling provides ISDN
protocols could be used. Q1215 users with additional capabilities for accessing potential
IN services. When originating a call, an ISDN user
identifies the bearer capability to be associated with the
4.3.1.2.7 SCP-SDP interface
call. IN service logic can use this information to
The proposed underlying protocol platform for the
determine how the call should be handled (e.g. how to
interface between an SCP and an SDP is TCAP on
route the call). Q1215
SCCP/MTP of SS7 protocol stack. For SDPs outside the
network (e.g. Credit Card validation data base at Credit
Card company) an interworking unit can be used which 4.3.2 Distributed Functional Plane

is inside the network and performs translation of SS7 The global Distributed Functional Plane (DFP) is of
TCAP to a public or private data transfer protocol (e.g. primary interest to network designers and providers. It
X25). Q1215 describes the functional architecture of an IN-structured
network in terms of units of network functionality.
(Figure 0-5) These functionalities are referred to as
4.3.1.2.8 User interfaces
Functional Entities (FE). The information that flows
A user is an entity external to the IN that uses IN
between Functional Entities are referred to as
capabilities. IN users may employ the access interfaces
relationships (rN). The functional entities are described
described below to invoke various IN service
independently of how the functionality is physically
capabilities. For example, users can affect the routing of
implemented or deployed in the network. SIB’s on the
a call, send and receive information from the network,
global functional plane are realized on the Distributed
screen calls, and update service parameters. Users are
Functional Plane by a sequence of Functional Entity
served by existing network interfaces. Q1215
Actions (FEA) and resulting information flows. Garra93

It is important to ensure that IN should continue to


support existing services and capabilities. In addition,
the current restrictions imposed by each of the interface
technologies described below must be considered when
deploying IN services. For example, calling party
information may or may not be available at a given
interface and, therefore, may or may not be provided to
the SCF. Q1215

End users are using analogue interface signalling, or


ISDN access signalling arrangements. IN user-network
interactions include providing stimuli, such as off-hook
or DTMF digit signalling, which determine further IN
Figure 0-5. Distributed functional plane architecture.
action. Q1215

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 26
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

The DFP architecture provides flexibility to support a 4.3.2.1.1 CCAF


large variety of services and facilitates the evolution of The CCAF is the Call Control Agent Function that
IN by organizing the functional capabilities in an open- provides access for users. It is the interface between user
ended and modular strtucture to achieve service and network call control functions. It has the following
independence. The DFP architecture is characteristics: It Q1204
vendor/implementation independent, thereby providing
the flexibility for multiple physical networking a) provides for user access, interacting
configuration and placing no constraints on national with the user to establish, maintain,
network architecture beyond the network and interface modify and release, as required, a call
standards which will be developed for IN structured or instance of service;
networks. The definition of the DFP architecture b) accesses the service-providing
initially accomodates service execution capabilities and capabilities of the Call Control
will accomodate service creation and service and Function, using service requests (e.g.
network management capabilities when they become setup, transfer, hold, etc.) for the
available. Q1204 establishment, manipulation and release
of a call or instance of service;
A Functional Entity is a unique group of functions in a
c) receives indications relating to the call
single location and a subset of the total set of functions
or service from the CCF and relays
required to provide a service. One or more Functional
them to the user as required;
Entities can be located in the same Physical Entity.
d) maintains call/service state information
Different Functional Entities contain different functions,
as perceived by this functional entity;
and may also contain one or more of the same functions.
In addition, one Functional Entity cannot be split 4.3.2.1.2 CCF
between two Physical Entities; the Functional Entity is The CCF is the Call Control Function in the network
mapped entirely within a single Physical Entity. Finally, that provides call/connection processing and control. It
duplicate instances of a FE can be mapped to different Q1204
PEs, though not the same PE. Q1204

Only the SCEF is not addressed at al in CS1. All other


functions are addressed at either a preliminary stage, or
at a detailed level. Duran92

4.3.2.1 Definition of FEs

This section gives a description of the Functional


Entities at the Distributed Functional Plane related to IN
service execution and how they are mapped to the
Physical Plane architecture.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 27
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

a) establishes, manipulates and releases a) extends the logic of the CCF to include
call/connection instances as “requested” recognition of service control triggers
by the CCAF; and to interact with the SCF;
b) provides the capability to associate and b) manages signalling between the CCF
relate CCAF functional entities that are and the SCF;
involved in a particular call and/or c) modifies call/connection processing
connection instance (that may be on functions (in the CCF) as required to
SSF requests); process requests for IN provided service
c) manages the relationship between usage under the control of the SCF;
CCAF functional entities involved in a d) is managed, updated and/or otherwise
call (e.g. supervises the overall administred by an SMF;
perspective of the call and/or connection
instance); 4.3.2.1.4 SCF

d) provides trigger mechanism to access IN The SCF is a function that commands call control
functionality (e.g. passes events to the functions in the processing of IN provided and/or
SSF); custom service requests. The SCF may interact with

e) is managed, updated and/or otherwise other functional entities to access additional logic or

administred for its IN-related functions obtain information (service or user data) required to

(i.e. trigger mechanisms) by a Service process a call/service logic instance. It. Q1204

Management Function;
a) interfaces and interacts with SSF/CCF,

4.3.2.1.3 SSF SRF and SDF functional entities;


b) contains the logic and processing
The SSF is the Service Switching Function, which,
capability required to handle IN
associated with the CCF, provides the set of functions
provided service attempts;
required for interaction between the CCF and Service
Control Function. It Q1204 c) interfaces and interacts with other
SCFs, if necessary;
d) is managed, updated and/or otherwise
administered by an SMF;

4.3.2.1.5 SDF

The SDF contains customer and network data for real


time access by the SCF in the execution of an IN
provided service. It Q1204

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 28
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

a) interfaces and interacts with SCF as 4.3.2.1.9 SMF


required; This function allows deployment and provision of IN
b) interfaces and interacts with other provided services and allows the support of ongoing
SDFs, if necessary; operation. Particularly, for a given service, it allows
c) is managed, updated and/or otherwise coordination of different SCF and SDF instances, e.g.:.
administered by an SMF; Q1204

4.3.2.1.6 SRF a) billing and statistic information are


The SRF provides the specialized resources required for received from the SCFs, and made
the execution of IN provided services (e.g. digit available to authorized service
receivers, announcements, conference bridges, etc.). It managers through the SMAF;
Q1204 b) modifications in service data are
distributed in SDFs, and it keeps track
a) interfaces and interacts with SCF and of the reference service data values;
SSF (and with the CCF);
b) is managed, updated and/or otherwise
administered by an SMF; The SMF manages, updates and/or administers service

c) may contain the logic and processing related information in SRF, SSF and CCF. Q1204

capability to receive/send and convert


information received from users; 4.3.2.2 Mapping FEs to PEs
d) may contain functionality similar to the
The mapping of Distributed Functional Plane FEs to
CCF to manage bearer connections to
Physical Plane Architecture PEs is described here. Also
the specialized resources;
a typical scenario of such mapping is shown here. (Table
0-4) Q1215
4.3.2.1.7 SCEF

This function allows services provided in Intelligent


Network to be defined, developed, tested an input to
SMF. Output of this function would include service
logic, service management logic, service data template
and service trigger information. Q1204

4.3.2.1.8 SMAF

This function provides an interface between service


managers and the SMF. It allows service managers to
manage their services (through access to the SMF).
Q1204

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 29
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

PE:s SCF SSF/SCF SDF SRF


SCP C • C •
SN C C C C
AD C • C •
SSP O C O O
IP • • • C
SDP • • C •
SSCP C C C O
NAP • C (CCF • •
only)
C: Core
O: Optional
•: Not allowed

Table 0-4. Typical scenarios of FE to PE mapping.

4.3.3 Global Functional Plane

The Global Functional Plane (GFP) is of primary


interest to service designers. Wyatt91 The Global
Functional Plane plane models network functionality
from a global, or network-wide, point of view. As such,
the IN structured network is said to be viewed as a
single entity in the GFP. In this plane, services and
Figure 0-6. Service decomposition.
Service Features are redefined in terms of the broad
network functions required to support them. These
4.3.3.1 SIB
functions are neither service nor Service Feature specific
IN CS1 contains 14 SIB’s that include algorithm,
and are referred to as SIB’s (Service-Independent
charge, compare, translate, basic call process, among
building Block). Q1203
others. In principle many other services described in
Services identified in the service plane are decomposed CCITT Recommendations Q.1211 could be specified.
into their service features then mapped onto one or more Raat93 SIBs are standard reusable networkwide
SIBs in the GFP. Each SIB is similarly mapped onto one capabilities residing in the Global Functional Plane,
or more FEs in the Distributed Functional Plane. Q1203 used to create services. As such they are global in nature
(Figure 0-6) and their locations need not to be considered as the
entire network is regarded as a single entity. A Service
Feature is provided by a combination of one or more
SIBs. SIBs have the following characteristics:

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 30
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

• SIBs are defined completely independent including the BCP, are service independent and cannot
from any physical architecture considerations contain knowledge of subsequent SIBs. Therefore, GSL
is the only element in the GFP which is specifically
• Each SIB has a unified and stable interface,
service dependent.
with one or more inputs an one or more
outputs

• SIBs are reusable, monolithic, building


blocks, describing a single complete activity,
and used by the service designer to create
services

Figure 0-7. Modelling of Global Functional Plane.


A SIB can exist independently, or it can coexist with
other SIBs in the same network element. IN-based In order to chain SIBs together, knowledge of the

services can be distinguished from one another by the connection pattern, decision options, and data required

sequence of SIB functions and by the specific parameters by SIBs must be available. Therefore, the pattern of how

within each SIB. Wyatt91 IN CS1 describes 13 SIBs SIB are chained together must be maintained within the

plus a specialized SIB called Basic Call Process. (Table GFP, and described in the GSL. The GSL described

0-5) subsequential SIB chaining, potential branching, and


where branches rejoin.When an IN supported service is
Algorithm Screen to be invoked, its GSL is laucnhed at the POI by a
Charge Service Data triggering mechanism from the BCP. At the end of
Management chain of SIBs, the GSL also describes returning point to
Compare Status Notification the BCP by indicating the specific POR. For a given
Distribution Translate service or Service Feature at least one POI is required.
Limit User Interaction However, depending upon the logic required to support

Log Call Information Verify the service or Service Feature, multiple PORs may be

Queue defined. Q1203

Table 0-5 The CS1 SIBs. In order to describe Service Features with these generic

Basic Call Process (BCP) identifies the normal call SIBs, some elements of service dependency is needed.

process from which IN services are launched, including Service dependency can be described using data

Points Of Initiation (POI) and Points Of Return (POR) parameters which enable a SIB to be tailored to perform

which provide the interface from the BCP to Global the desired functionality. Data parameters are specified

Service Logic (GSL). The GSL describes how SIBs are independently for each SIB and are made available to

chained together to describe Service Features. The GSL the SIB through GSL. Two types of data parameters are

also describes interaction between the BCP and the SIB required for each SIB, dynamic parameters called Call

chains. Q1203 (Figure 0-7) By definition, SIBs,


Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 31
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

Instance Data (CID) and static parameters called Service Fixed Parameters These are data parameters
Support Data (SSD). Q1203 whose values are fixed for all
call instances. For instance,
the “File Indicator” SSD for
4.3.3.1.1 Call Instance Data
the Translate SIB need to be
Call Instance Data defines dynamic parameters whose
specified uniquely for each
value will change with each call instance. They are used
occurrence of that SIB in a
to specify subscriber specific details like calling or called
given Service Feature. The
line information. This data can be: made available from
“File Indicator” SSD value is
the Basic Call Process SIB (e.g. Calling Line
then said to be fixed, as its
Identification), generated by a SIB (e.g. translated
value is determined by the
number), or entered by the subscriber (e.g. dialled
service/Service Feature
number or a PIN code). Q1203
description, not by the call

Associated with each CID value is a logical name which instance.

is referred to as the CID Field Pointer (CIDFP). If a SIB Field Pointers Field Pointers identify which
requires CID to perform its function, there will be an CID is required by the SIB,
associated CIDFP assigned through SSD. For instance, and in doing so provide a
the Translate SIB’s CID which defines what is to be logical location for that data.
translated is called Information. Q1203 They are signified by “CIDFP-
xxxx” where “xxxx” names
Since the CID value can vary with each call instance, the data required. For instance,
Service Features can be written with data flexibility. In “CIDFP-info” for the Translate
the above Translate SIB example, one Service Feature SIB will specify which CID
may require translation of a calling number, while element is to be translated. If
another Service Feature will require translation of the more than one CID is required
called number. In both cases, the data required by the by a SIB to perform its
SIB is specified by the information Calling Line Identity function, then the SSD data
(CLI), but the CIDFP-info changes. Q1203 parameters will contain
multiple Field Pointers.
4.3.3.1.2 Service Support Data

Service Support Data defines data parameters required


by a SIB which are specific to the Service Feature 4.3.3.1.3 The SIB structure
description. When a SIB is included in the GSL of a A SIB contructs of both input and output parts. (Figure
service description, the GSL will specify the SSD values 0-8) The input part consists of three distinct elements:
for the SIB. SSD consists of the following parts: Q1203 one logical starting point, Service Support Data which
defines parameters which are specified by the service

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 32
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

description, and Call Instance Data which are specific to


that call instance. The output part consist of two distinct
elements: one or more logical end points and CID which
defines data parameters specific to that call instance
which results from the execution of that SIB and are
required by other SIBs or the BCP to complete the call
service instance.

Figure 0-9. The Queue SIB graphic representation.

The input parameters for the Queue SIB has been


described in the Table 0-6. The Queue SIB can be used
everywhere the queueing of calls is needed. The Logical
Figure 0-8. Graphic representation of a SIB. Q1203 Start indicates the execution for the SIB.

The output parameters are also specified in the Q1213.


4.3.3.1.3.1 Queue SIB
The Logical End indicates the result of the execution.
As an example of SIB representation the Queue SIB is
The parameters for Queue SIB are: Resource available,
described. (Figure 0-9) Q1213 The Queue SIB example
Call party abandon, Queue timer expiry, Queue full, and
has been described, because it is a multipurpose SIB
an error. Q1213 The Call Instance Data has the
which can be used in several Service Features at the
following parameters and the meanings of output data:
Service Plane. The task of the Queue SIB is to provide
Time Spent in Queue (identifies the total time that a
sequencing of IN calls to be completed to a called party.
particular call was queued), Error Cause (identifies the
The Queue SIB provides all the processing needed to
specific condition which caused an error during the
provide queueing for a call, and will specifically: pass
operation of the SIB). In Error Cause the following
the call if resources are available, queue the call, play
errors have been identified: Invalid Max Active, Invalid
announcements to a caller on queue, and when resources
Max Number, Invalid Max Time, Invalid
become available, dequeue the call.
Announcement Parameters, and Invalid Call Reference.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 33
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

SSD - Max Active 4.3.3.2 Basic Call Process


Specifies the maximum number of active The Basic Call Process is responsible for providing basic
calls allowed for the resource. call connectivity between parties in the network. The
- Max Number BCP can be viewed as a specialized SIB which then
Specifies the maximum number of calls provides basic call capabilities including connecting call
allowed on queue at a given time. with appropriate disposition; disconnecting calls, with
- Max Time appropriate disposition; and retaining CID for further
- Specifies the maximum time the call may processing of that call instance. Q1203
remain on the queue.
- Announcement Parameters The need for specific POI/POR functionality is that the

Specify the control values for same chain of SIBs may represent a different service if

announcements. The control values which launched from a different point in the BCP. Similarly,

can be specified are: Announcement ID the same chain of SIBs launched from the same point

(specifies which announcement is to be may represent a different service if returned to the BCP

sent), Repetition Requested (specifies if the at a different point. Q1203

announcement is to be repeated),
Repetition Interval (specifies the delay 4.3.3.3 Global Service Logic
period in seconds between repetitions) and
The Global Service Logic can be defined as the “glue”
Maxium Repetitions (specifies the
that defines the order in which SIBs will be chained
maximum number of times the
together to accomplish services. Each instance of global
announcement will be repeated).
service logic is (potentially) unique to each individual
- CIDFP-Resource
call, but uses common elements, comprising specifically:
This CID Field Pointer specifies which
BCP interaction point (POI and POR); SIBs; logical
Call Instance Data identifies the resource.
connections between SIBs, and between SIBs and BCP
- CIDFP-Error
interaction points; input and output data parameters,
This CID Field Pointer specifies where in
service support data and call instance data defined for
output Call Instance Data the error cause
each SIB. Q1203 The GSL will then chain together
will be written.
these elements (SIBs) to provide a specific service.
CID - Call Reference
Identifies the specific call which is a
4.3.3.4 Relating the GFP to the DFP
candidate for queueing.
- Resource This section describes the mapping of the elements of

Specifies the data associated with the the Global Functional Plane to the Distributed

CIDFP-Resource which identifies the Functional Plane. Functions in the GFP are distributed

resource for which the call will be queued. to Functional Entities in the DFP. These FEs are related
by information flows, which are use to send information
Table 0-6 Queue SIB input resources.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 34
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

between FEs. Table 0-7 shows the CS1 SIBs and characterized by one or more core Service Features, and
indicates the FEs involved for each SIB. Q1214 can be optionally enhanced by other Service Features.
Q1202
Functional Entities
SIB SSF/SCF SCF SRF SDF The Service Plane represents an exclusively service-
Algorithm • oriented view. This view contains no information

Charge • • whatsoever regarding the implementation of the services

Compare • in the network (for instance, an IN type of

Distribution • implementation is invisible). All that is perceived is the

Limit • • network’s service-related behaviour as seen, for


example, by a service user. Q1202 In other words, the
Log Call • • •
Service Plane provides users and service providers a
Information
implementation-independent architecture.
Queue • • •
Screen • •
Service Data • • 4.3.4.1 Service Features
Management The services are constructed of Services Features. A
Status • • • Service Feature is a specific aspect of a service that can
notification also be used in conjuntion with other services/Service
Translate • • Features as a part of commercial offering. It is either a
User • • • core part of a service or an optional part offered as an
Interaction enhancement to a service. Q1202 (Table 0-8)
Verify •
Basic Call • •
Process

Table 0-7. Relating the GFP to the DFP.

4.3.4 Service Plane

The Service Plane (SP) is of primary interest to service


users and providers. It describes services and Service
Features from a user perspective, independent of how
the service is implemented or provisioned in the
network. Garra93

The Service Plane illustrates that IN supported services


can be described to the end user or subscriber by means
of a set of generic blocks called Service Features. A
service is a stand-alone commercial offering,
Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 35
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

* Automatic Call Back Closed User Group


SFs can also be used as building blocks in the
(ACB) (CUG)
specification and design of new, more complex services.
* Call Hold with Customer Profile
Announcement (CHA) Management (CPM) SFs are are comprised of one or more SIBs which are

* Call Transfer (TRA) Customized Recorded described in the Global Functional Plane. All individual
Announcement (CRA) telecommunication services identified in the Service
* Call Waiting (CW) Customized Ringing Plane should be described as seen from the user’s
(CRG)
viewpoint without reference how the services are
* Consultation Calling Follow-Me Diversion
(COC) (FMD) implemented in the network (for example, how the

* Meet-Me Conference Mass Calling (MAS) Physical Plane looks like). Q1202
(MMC)
* Multi-Way Calling Originating Call
4.3.4.2 IN service modelling
(MWC) Screening (OCS)
ABbreviated Dialing Off-Net Access (OFA) The idea of IN architecture, especially the Service Plane
(ABD) architecture, is to allow customers to make services for
Attendant (ATT) Off-Net Calling (ONC) his own communications needs with Service Features or
Authentication (AUTC) One Number (ONE) may combine a number of services together. Perhaps the
Authorization Code Origin Dependent user want to make services with additional capabilities,
(AUTZ) Routing (ODR)
use the combination as a means to providing
Call Distribution (CD) Personal Numbering
communications to other parties.
(PN)
Call Forwarding (CF) Premium Charging
In recommendation Q.1211 a lot of services has been
(PRMC)
described for the use of IN Capability Set 1 Intelligent
Call Forwarding in Private Numbering Plan
BY/DA (CFC) (PNP) Network. Some basic servces are Credit Card Calling
Call Gapping (GAP) Reverse Charging (CCC), Virtual Private Network (VPN) and Universal
(REVC) Personal Telecommunications (UPT).
Call Limiter (LIM) Split Charging (SPLC)
Call Logging (LOG) Terminating Call
Screening (TCS) 4.3.4.3 Credit Card Calling

Call Queueing (QUE) Time Dependent Routing The recommendation Q.1211 describes CCC as follows:
(TDR)
Q1211
Note: The service indicated with a * may only be
partially supported in CS1, because they require
capabilities beyond those of type A services.

Table 0-8. Set of Benchmark IN CS1 Service Features.

So, the services are comprised of one or more Service


Features. A Service Feature is the smallest part of a
service that can be perceived by the service user. These

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 36
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

1) The CCC service allows subscribers to place 1) This service permits to build a private network
calls from any normal access interface to any by using the public network resources. The
destination number and have the cost of those calls subscriber’s lines, connected on different network
charged to the account specified by the CCC switches, constitute a virtual PABX, including a
number. number of PABX capabilities, such as Private
Numbering Plan, call transfer, call hold, and so on.
2) The service allows the caller to be automatically
charged on a bank card account, for any type of As an option, to each private user, either a class of
outgoing call. The caller has to dial his card service or specific rights and privileges may be
number and a PIN (Personal Identification attributed. As another option, a private user may
Number), then the called number. As an option access his private network from any point in the
forward calls may be allowed, without dialling network keeping, after authentication, his class of
again card number and PIN service or his specific rights and privileges.

2) This service permits the use of public network


4.3.4.4 Virtual Private Network
resources to provide private network capabilities
The private networks allow users to access remote without necessarily using dedicated network
applications that are run by other users or, more resources. The subscriber’s lines, connected to
frequently, by the network operator itself. The VPN different network switches, constitues a virtual
service is based on the public telecommunications private network that may include private network
networks that it uses to contruct the service. CCITT capabilities, such as dialling restrictions, Private
describes VPN service as follows: Numbering Plan (PNP), holl, call transfer, and so
on.

A PNP may provide a group of users the capability


to place call by using digit sequences having
different structures and meaning than provided by
the public numbering plan, or PNP may utilize the
public numbering plan’s digit sequences, structures
and meaning.

3) VPN allows a subscriber to define and use a


PNNP for communication across one or more
networks between nominated user access interfaces.
A PNP provides a group of users the capability to
place calls by using digit sequences having different
structures and meanings than provided by the
public numbering plan.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 37
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

4.3.4.5 Universal Personal Telecommunications networks without affectting traditional network

In fixed telecommunications networks, subscribers are operations or capabilities. Wyatt91

associated with the Network Access Point of the


The Intelligent Network consists of integrated hardware
terminal, the point of attachement (network access or
and software distributed throughout the service
line identification). In mobile telecommunication
providers network. Thanks to the new technologies,
networks, subscribers can move with their terminal and
service providers will be able to create their own
they are associated with the terminal in use (terminal
services. Nerys91 Compared to the convenient
identification). Vande92 The subscriber is then charged
telecommunications network architecture, IN forms an
with the use of a personal identification number. CCITT
excellent and fast way of introducing services.
describes UPT service as follows:

IN promises to change the way vendors, telephone


1) UPT is a mobility service which enables
companies, and customers run their businesses and work
subscribers to make use of telecommunications
with one another. Nerys91 Today, vendors develop a
services on the basis of a unique Personal
product that delivers a certain service, then sell it to
Telecommunications Number (PTN) across
telecommunications operators. With IN, vendors will
multiple networks at any network access. The PTN
develop software “building blocks” Nerys91, then
will be translated to an appropriate destination
deliver these to telephone companies who assemble
number for routing based on the capabilities
them to create new services.
subscribed to by each Service Subscriber (SS).

2) This service provides personal mobility by 4.4.1 SCE


enabling a user to initiate any type of service and The Service Creation Environment capability of IN
receive any type of call on the basis of a unique and enables effective service creation. Service Creation
personal network-independent number, across Environments enable network and service providers to
multiple networks, at any user-network access create new revenue-generating services that are
(fixed, movable or mobile), irrespective of independent of equipment vendor’s deployment
geographic location, limited only by terminal and schedules. Many administrations are asking vendors of
network capabilities. IN equipment to provide them with Service Creation
Environment capabilities. This is also true of large

4.4 The IN-structured network service subscribers, who prefer to control the operation
of their IN-based services. In the current Service
The IN concept is an extension of, rather than a Creation Environment, service subscribers can control
replacement for, traditional service control. Since an IN services using existing capabilities or modifying
primarily affects only the internal service processing of parameters within these capabilities. Current Service
switching systems, it should have little influence on the Creation Environments are user friendly and support
signalling procedures of a traditional network. updates of service control points and service circuit
Therefore, we can place intelligent nodes in existing nodes. The next generation of Service Creation

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 38
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

Environment will also support updates of intelligent Switching Point, Service Circuit Node, or Intelligent
peripherals and Adjuncts. Because SIBs are being Peripheral, based on traffic or customer demands.
defined for the IN, it is now possible to develop a Similarly the Service Control Function can reside in the
Service Creation Environment platform to support new service control point, service circuit node, or the service
services and direct them to appropriate Physical Entities. switching point Wyatt91 In the middle, the signalling
In addition, new SCEs must provide extensive network performs the signalling transfer function.
validations for new IN-based services so they do not
have an adverse effect on the overall operation of the
network or the subscribers services. Wyatt91

The service designers are staff members of the


provider’s company. They have to create new services by
definite and unambiguous descriptions. Such
descriptions are called Service Logic Programs (SLP).
After deployment of a new service in the network, one
can buy or subscribe to such a service. Abram92

The services are determined by single Service Features.


Following the ETSI framework this should be reflected
in the service representation: each SLP should be
composed from SIBs. Abram92 The interface for
composition of new services may differ. The interface
might be an advanced specification language for the
construction of SIBs and their interfaces/(inputs and
outputs). However, it is possible to build a Graphical
User Interface (GUI) on the top of the specification
language and by so ease and speed up the introduction
Figure 0-10. Physical mapping of IN functions.Wyatt91
of new IN services.
With the above capabilities a description of how IN
really functions is made. An example of the Green
4.4.2 The function of IN
Number Service (GNS or freephone) is shown here.
The SSP and SCP communicate via CCITT No.7
signalling links using the services of the TCAP, SCCP A service user dials the number, such as 800-beginning.
and MTP. Lehti93 However, at the top of this protocol While translating the number the local exchange detects
stack is the IN Application Protocol. a trigger in the SSP database telling it that this 800
number (in this example 800-NXX-7800) is a pseudo-
Figure 0-10 shows how network functions can be
number which must be translated Ambro89 by an SCP.
grouped in a physical entity. For example, we can
The 800-based numbers are usually known as IN
package the Service Resource Function in a Service
Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 39
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

numbers. The local exchange (SSP) sends a TCAP The task of a Service Management Station is to manage
message (containing the number dialled and other the IN-services. In the above example the SMS could
information) over the SS7 network to an SCP. The SCP have keeped track of the charging of the service usage.
uses the 800 number to access a database containing the The service user would not have been charged because
800 number’s corresponding directory number. (Figure ) of the freephone capability. Instead, the service would
(This number does not have to be static, but it could have been charged and provided with a charging report
depend on factors like day, time of day, origination, and from the SMS.
so on). After accessing the database, the SCP sends the
directory number (in this example 305-NXX-8800) to
4.4.3 IN Application Protocol
the local exchange in another TCAP message. The local
The IN Application Protocol (INAP) is intended to be
exchange uses the directory number to execute
used between the following four functions: SSF, SCF,
translation and routing to the subscriber called. .
SDF and SRF. The INAP in CS1 is ment to be using the
SS7 protocol stack, but it does not imply that only this
signalling protocol should be used. Q1218

Figure 0-11. IN-based Green Number Service.


Figure 0-12. INAP Protocol Architecture.
This principles of trigger detection and database dialog
are the basis of all proposed IN services. Ambro89 The The INAP protocol architecture is based on the OSI
above example showed also the flexibility of Intelligent Application Layer Structure. (Figure 0-12) A physical
Network architecture. If new 800 numbers are added, entity has either single interactions or multiple co-
updating need only be done in the SCP database. Also ordinated (not discussed here) interactions with other
the possibility of mobility shows that IN-like physical entities. The Single Asociation Control
architecture is quite developed and can handle also the Function provides a co-ordination function using ASE’s,
future needs. which includes the ordering of operations supported by

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 40
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

ASE’s (based on the order of received primitives. The mechanism to pre-arrange the context must be
SAO represent the SACF plus a set of ASE’s to be used supported. Q1218
over a single interaction between a pair of Physical
In the CCITT New Recommendation Q.1218 the INAP
Entities. If there were need for multiple interactions, the
and TCAP messages are specified using the Abstract
use of MACF (Multiple Association Control Function)
Syntax Notation One (ASN.1). The encoding rules
would be acceptable. In this case, MACF would provide
which are applicable to the defined abstract syntax are
a co-ordinating function among several SAO’s, each of
the Basic Encoding Rules (BER).
which interacts with an SAO in a remote PE. Q1218

Also an another IN Application layer protocol is


available there. This application layer protocol handles
and manages the mobility of users and is called the
Mobile Application Part (MAP). The MAP is not
discussed further in this paper.

4.5 Personal Communications Services

PCS (Personal Communications Services) is an


important area of Intelligent Networks. The Service
Control Points maintains the Home Location Register
(HLR), which is the home database for mobile services
user, while the local exchange, serving as a Service
Switching Point, maintains the Mobile Switching Center
and visitor Location Register. Using wireless or wire-
line terminals, subscribers have access to the IN and
Personal Communications Services.
Figure 0-13. Operation description.
Mobile services has been defined, for example, by
Each ASE supports one or more operations. Description
ETSI’s GSM group. The GSM architecture consists of a
of each is tied with the action of corresponding FE
Home Location Register, the Equipment Identification
modelling. Each operation is specified using the
Register (EIR), and the Authentication Center (AUC),
operation macro described in Figure 0-13. The use of
all of which can be maintained at a central node in the
Application Context (AC) negotiation mechanism allows
network. The central node’s master file contains the
the two communicating entities to identify exactly what
wireless customer’s records. Local records for wireless
their capabilities are and also what the capabilities
customers are maintained at the Visitor Location
required on the interface should be. This should be used
Register (VLR). The VLR information can be located in
to allow evolution through Capability Sets. If the
the Mobile Switching Center (MSC) or in the adjunct.
indication of a specific application context is not
Mobility services have strong synergies with evolving IN
supported by a pair of communicating FE’s, some

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 41
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

architecture. An IN control structure offers a robust


platform to support PCS applications. Many of the
conceptual model requirements for the IN apply to PCS.
Integrating PCS services on an IN platform potentiallly
reduces an administration’s operations, maintenance,
and training costs. In addition, we can provide many
new services for PCS using IN service features. Wyatt91

From an IN architectural perspective, we can view


wireless access as a technology (such as ISDN or
Broadband ISDN) that service subscribers can use to
access the network. This network can be fully integrated
with the local exchanges or provided as an overlay
architecture. The IN can flexibly separate call and
connection control from the underlying access
infrastructure. As such, an IN platform also can support
PCS applications. From a network entity viewpoint, the
network access function is conceptually similar to a base
sation system in the mobile communications world. The
service switching functionality could be implemented in
a Mobile Switching Center, allowing that center to Figure 0-14. PCS applications supported by an IN.
interact with service control residing in other network Wyatt91
elements (e.g. HLR that resides in the SCP and VLR
that resides in adjuncts). Wyatt91 (Figure 0-14) 4.6 Integration of TMN and IN

IN is a generic, service-oriented architecture, intended


to be used for all kinds of services (real-time or
management) on top of call-control type services. TMN
is a generic, management-oriented architecture,
intended to be used for all kinds of management
services. Obviously, the IN and TMN architectures
overlap. For instance, one TMN application such as
billing and one IN application such as Freephone must
be tightly related because Freephone billing should be
handled in a consistent way with TMN billing. This
shows that, unless both IN and TMN architectures are
made more consistent, the interconnection of IN and
TMN applications would be difficult. It is not possible to
Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 42
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

support two independent architectures while Intelligent Network manages intelligent


applications on both architectures must interoperate. telecommunications services offered to a user. It
Also, IN is just one part of the whole network, and as includes specialized telecommunications functions, such
such should be managed with TMN. The integration of as customized announcements, voice regognition,
TMN and IN is called TINA. Appel93 encryption, and network reource assignments. At
present, TMN controls telecommunications support for
basic telecommunications network and IN functions. In
the future, TMN will include functions such as service
creation, service provisioning, service deployment, and
service management. Wyatt91

Both in TMN and IN, the challenge is to ensure a global


consistency of all interconnected applications, while
allowing for evolution of some applications. This shows
that while IN and TMN architecture are to be integrated,
they both must evolve towards a unified target
architecture to be more flexible. Appel93

4.6.1 Comparison of IN planes to TMN planes

The IN Conceptual Model represents different points of


view to the users, customers and operators. The TMN
planes describe, however, different management-related
aspects. The correspondence of these architectures is
shown in this section.

Figure 0-15. The TMN and IN concept. Wyatt91 The Service Plane represents the service from the user’s

Figure shows network-related functions required for IN point of view. The TMN architecture does not directly

architecture: the Basic telecommunications network, provide with this kind of aspects. The Global Functional

Intelligent Network, and the Telecommunications Plane represents with the service designer’s point of

Management Network. Wyatt91 view of the services. The TMN architecture does not
directly provide with aspects of Global Functional Plane.
The Basic telecommunications network is commonly Distributed Functional Plane represents the fucntional
known as the Public-Switched Telephone Network parts of the IN architecture and the relations between
(PSTN), this network controls basic telecommunications them. This is quite the same as the TMN architectures
services (for example, local and transit/toll switching, Functional Architecture. The relations between DFP
voice and data calls) offered to a user. It detects whether parts corresponds to the TMN Informational
control of a call should be transferred to the IN. The Architecture. The lowest layer of IN architecture

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 43
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

corresponds straight to the Physical Plane architecture of service over a wide area is essential to guarantee UPT
INCM. (Figure 0-16) users with personal mobility. Also the VPN service plays
an important role in the importance of globalization.
Fujio93

IN has thus far been developed to provide various


enhanced services with proprietary technologies in many
networks. Consequently, many different
implementations of IN are now available in the world.
To provide the same level of service capabilities in
different networks and in the multivendor environment,
however, standardation activities for IN are taking place
in the CCITT and regional organizations. Fujio93

4.8 Future IN Capability Sets

It is not expected that significant capability will be


provided within CS1 for services occurring during the
active phase of call, for multiparty or multimedia
Figure 0-16. Correspondence of IN planes and TMN services, or for services requiring the direct
architecture planes. manipulation of call topology. Such capabilities, as well

In order to avoid multiple definitions of management it as standards for SMF and SCEF capabilities, are

is possible that IN will be managed through TMN expected to be provided in css beyond CS1, starting with

concept. This is very well stated, because TMN has been CS2, on which work should begin in 1992. Duran92

widely accepted as a telecommunications management


Thus, the work beyond CS1 should see support of
concept.
multimedia calling; support of services affecting a call
in the active phases where several subscribers may be
4.7 Globalizing the IN affected (Type B Services); standards for feature
interaction mechanisms; standards for creation,
The standards and research activities for Intelligent
deployment, and management of service logic; and
Networks so far have focused mostly on its provision in
support for complex call topology management.
one closed network, emphasizing the interaction of
Duran92
exchange and service control functions. Fujio93 Take
the UPT service, for example. A UPT user would move Besides multimedia calls, other service examples are
from one location to another inside a network and also advanced, networked conferencing capabilities and
over multiple networks, possibly with different possibly network resource usage reconfiguration during
capabilities. In such a case, coordinated provision of the a call. In order for such capabilities to be realized, the

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 44
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

issues identified earlier, and others, will need to be the use of TMN in managing the Intelligent Network
addressed and solved. Duran92 architecture and the services are under great study.

Beyond the need to support additional capabilities for In Finland, the Telecommunications Operating
types of services more complex than a single-ended, Company of state (Telecom Finland) is studying hard
single point of control category, there will be need to the above areas. The Telecom Finland IN architecture is
specify further interfaces than was possible for CS1. using Bellcore components. The SS7 network is ready
Standardization of a SLEE, in parallel with a SCE, and for use and the SCP architecture will become available
standard representation for service logic and service soon. The problems are still in the management and the
data, also will be required. Duran92 service creation areas. The Intelligent Network will be
in use as to the IN Capability Set 1 quite shortly. The
Future directions of IN include a distributed architecture
independent service creation of customers that require
using the service-independent platform capabilities of
advanced IN capabilities will require quite a lot time.
the IN. This platform should allow us to introduce
When the integration of TMN and IN will be more
emerging technologies and applications transparently
entirely accepted and some TMN applications
into the network. Wyatt91
implemented, will these problems that concern the
customer remotely creatable and configurable services
4.9 Current activities of IN be solved. Another activity in Finland is the co-
operation of Nokia and Hewlett Packard (HP) Finland.
The Intelligent Network concept and innovation is
Nokia will use the components provided by HP and
accepted worldwide. The most innovative country is the
create own software.
United States of America which was the first country to
introduce this kind of telecommunications network
architecture. The IN architecture and services provided
by telcos in USA is almost advanced today. The other
countries in the world are still trying to gather the gap.

The hardware manufacturers have provided the


telecommunications operating companies with IN
components. These components are as the base for
current and future IN architecture. A typical scenario of
this is the digitalization of switches in the telephone
network. The use of Common Channel Signalling
System No.7 is under great study. The software
providers or Telecommunications Operating Companies
are making software for IN components, such as SCP.
Also the TMN architecture and its implementation, and

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 45
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

services is obvious. The past telecommunications

5. Changes in business technology was a lot based on dedicated devices that


provided an architecture that was nonflexible. At the
time of reconfiguration of these devices several changes
had to be made to the architecture (programs and
5.1 Technology and services
possibly also hardware). As these changes caused great
The most important trends in the area of business are financies, it was obvious that the life cycle of these
the increased use of computers in business and services were big. An example of true hardware changes
globalization of the markets. The telecommunications are the cables used by telecommunications. The
industry can be divided into telecommunications bandwidth of the transmission systems seem to multiply
hardware suppliers and the providers of by factor 10 in a decade. The copper cables that were
telecommunications services (operators, software used by past telecommmunications systems needed a lot
houses, etc.). The development of telecommunications of replacement when runned out of capacity. The
business depends on changes in the industry, changes in situation is however different when optical fiber is used.
the telecommunications technology and the development Optical fiber is a flexible transmission media that can be
of telecommunications services. Martik93 several times reconfigured, because the bandwidth can
be increased only by changing the active devices that use
There has been several major changes in the
the fiber. Optical fiber also provides expences that are
development of telecommunications technology. First,
almost independent of the bandwidth.
the development of raw bandwidth speed between
network nodes plays an essential role in the changes of
networks and their services. In the era of
telecommunications, the most important need for the
telecommunications networks was the analogous
telephony service. Later on, at the end of 1980's, with
the use of optical fiber in the transmission systems of the
networks, available bandwidth increased and the
customer expences decreased. Telecommunications
networks are becoming multiservice networks, such as
ISDN, which will provide some advanced services such
as data and in some extent also broadband data along Figure 0-1. Technology transform. Martik93
with the digital telephony service.
The Intelligent Network telecommunications structure
Faster changes of markets have decreased the life cycle will change the market areas. As the computer prices go
of products. The corporation has to spend more money down relative to the performance of the unit, the IN
on product development than before and to seek for nodes and components will be mainly based on
partners to share the expences in the product computer architectures than dedicated electronic devices
development. [Martik93] The need for more versatile which was a great market area in the past

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 46
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

telecommunications business. The selling of hardware multimedia services that are provided by the
will not be the most important area of business in telecommunications networks are called internationally
telecommunications rather the selling of intelligent Advanced Services. The voice and data traffic will
nodes which consist of cost effective hardware integrate together with the broadband services and
technology, but running a high-tech software. So Intelligent Networks. However, the Advanced Services
software selling will propably be the greatest area of need broadband networks while the mobile
business in telecommunications. The service communications networks today do not provide enough
management part of the IN will be the greatest area of bandwidth for these services. That is why these services
business to the service providers and operators. These will first be introduced at the static telecommunications
things will change the market views in computer and systems and in radio technology after the demanded
software. bandwidth resources are available.

The main benefit of the IN architecture is the possibility


to improve the quantity, and to develop new sources, of
revenue. This is particularly desirable in an environment
with a high penetration of available services per capita.
For most environments, the IN will be a stimulation or
basis for revenue generation, both the short and long
term. Ambro89

5.2 IN services

Figure 0-2. The development of the telecommunications 5.2.1 Benefits of IN


service business.
The concept of Intelligent Networks has been developed
Today about 90% of the telecommunications services are to achieve some major goals. These are:
telephony traffic and other services, such as data
transmission and value added services, about 10% of the Rapid service introduction, which for the

turnover. It has been expected that 50% of the operator means an ability to meet a market

telecommunications services value are telephony traffic window, niche market or to adapt to specific

and the rest advanced services in the year 2010. customer requirements. This goal is targeted

Martik93 for revenue growth.


Standard interfaces, which for the operator
The main part of the future data traffic will be produced means multi-vendor capability. This goal is
by the LAN’s (Local Area Network) where multimedia more related to cost efficiency and high profit
(e.g. video, voice and data integration) data is rather than revenue.
transmitted. Some of the voice traffic today will move to
multimedia data traffic between workstations. The

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 47
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

Flexible network architecture, which could usually a major investment, which may be critical to do.
allow operators to configure and develop their If IN is introduced as a major network concept through
networks more freely to meet market the network, IN will have a significant impact on the
requirements, bypassing dominant vendors. operators on the level of the investment, which is
Integrated management integrating the needs required for network development.
of the service management into a single logical
Initial IN investments/expences can be broken down as
network management.
follows:

IN element (60 - 70 % of total investment)


In business terms the above things are expected to
This includes necessary basic hardware and
happen after introducing IN: Increase in revenues,
software components which are required for IN,
thgourgh a capability to offer new services to the
and is around 50-60 % of total purchasing
customers; lower level of investments, when standard
expences. Most of this is needed for software,
products are available form several sources; and
concentional hardware is minor part of
decrease of operational cost, due to the integrated
investment. The cost structure of IN element
management of services and networks impacting on the
consists of hardware and basic software
number of human resources required to operate the
(20%; basic SSP including hardware and
network.
software (typically a switch), IN application in
In reality these goals are very hard to achieve. IN is not SSP, SCP and SMS including basic hardware
the answer for the management problems, nor will it and software, and other equipment and software
automatically generate new revenue. It can be part of the required for operating IN), and IN specific
solution, but there is much to do before these goals can software (40%; SCP and SMS applications).
be met. Too often required enhancements in other Project expences (30 - 40 % of total
information systems, and redesigning of the operations investment)
and organizational structure are neglected or at least are Project expences are higher than usual. This is
not taken into account, when IN investment/introduction due to the complicated nature of IN concept
is planned. implementation commonly taking more
resources for integration than traditional
network development projects. The project
5.2.2 Cost structure
expences can include: project management,

5.2.2.1 Initial cost of IN system specification, system integration, system


testing, and system deployment.
The level of investment required for introducing IN
network concepts into the network is a relative issue. Integration expences (? % of total

For large international operators IN investment can investment)

normally be justified based of a cost/benefit calculations


made for one service only. For a smaller operator IN is

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 48
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

This part of expences depends on the size of IN 5.2.2.3 Basic call production costs
system, its planned level of integration with IN services need local loop, trunk transmission and the
other systems and so forth. The level of these switching machinery in operation before IN based
expences in the initial introductory phase of IN revenue generation can be put into operation. The
is generally difficult to estimate. Often, operator/services provider have to include these
integration issues such as: integration of IN expences until it is possible to calculate the total IN call
with current network management systems and production costs, which then have to be covered by
integration of IN with current customer service incoming cash flow to be able to run financially
systems are handled only after the first IN successful operation.
application is taken into use.

5.2.3 Service portfolio

It is difficult to give a formula on how to define exact IN seems to be the only vehicle, which offers operators
portions of these expences for IN projects. IN expences new tools to provide extended call handling capabilities.
tend to always be a specific case which is dependent on The capabilities may be regarded as a basic element of
the operators market, techical, economical and other the modern products concept. IN makes it possible to
environment issues. The most significant point is that add value to basic call handling. These more flexible
with currently available IN products, portion of network services may be packaged to suit for different
investment which consist of standard hardware and market segments relatively easily. In this respect IN has
software components is relatively low and the major part proven to be a useful concept. However, it is not evident
of the investment consists of special/tailored software that IN based services automatically generate new traffic
and project running expences. and revenue.

5.2.2.2 Operational costs of IN 5.2.3.1 Operators capability of offering services

When examining operational costs, attention shall be That in IN has made it possible to offer new services to
paid to those operational costs which are directly related the customers cannot be denied. But one has to
to operations and management of IN platform remember that the possibility of utilizing switches as
components, comprising of hardware and software service platforms still exists. An operator’s capability to
maintenance charges and other operational costs. introduce new services which are based on IN
technology is largely dependent on the operator’s
Associated operational costs are significant portion of capability to manage the complex composition of IN
the total costs. The main parts of these costs are software and how an IN implementation supports the
marketing, sales, R&D for the customer end of the flexible management of data in the system. It can be
product and the costs for supporting systems. questioned if operators have made a good choice in
coming dependent of software houses, as has typically

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 49
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

happened, rather than switch vendors what concerns it possible to take an experimential approach to service
their service development capabilities. development.

How capable the operators are in the services arena is


5.3 Evolution of IN capabilities in Telecom
heavily dependent on the software strategy which is
Finland
adopted when decision of building IN facilities has been
made. Again in this respect operators vary largely.
5.3.1 Pre-IN

5.2.3.2 Sales of service portfolio Telecom Finland was one of the first operators in
Europe to offer IN-type services to its customers. The
Cannibalism still exists and this is especially common
first services (Freephone, Premium Rate) were
within telecom service sector. Voice services offered by
developed on switch based solutions in mid of the
Telco’s have not developed significantly since the
1980’s. Successful implementation of these services was
1960’s. It can be assumed that basic demand for the
based on the expertise Telecom Finland has in digital
utilization of telephones has always existed. IN has
switching. Through the early implementations Telecom
facilitated in packaging service features in new
Finland has been able to gain a dominent position in the
combinations. These combinations have been developed
enhanced services market in Finland. In this first phase
to standard IN services such as Premium Rate,
services were developed in close co-operation with the
Freephone, Calling Card, UPT, VPN and so forth. But
customers of Telecom Finland. Switches were used as
have these IN services generated new revenues ?
service platforms to avoid unnecessary investments of
Definitely to some extent, but all the credit can be given
IN. Some of these early implementations are still
to the IN concept, and when evaluating the economical
deployed.
impact of IN, this matter has to be considered.

5.3.2 Centralized IN
5.2.3.3 Service development time frames
Soon after the first IN implementations Telecom
Inmaterial nature of the telecommunications service
Finland started to investigate potential IN concepts
allows better interaction with the consumers when
which could provide more sophisticated management
developing the service products compared with, for
and a greater capacity for IN services. In the beginning
example, manufactuing industry. In this respect, IN has
of 1990’s Telecom Finland made a contract to purchase
great potential. Utilization of this potential requires a
a real IN solution, which consisted of dedicated SSP,
comprehensive SCE environment. Useful SCE
SCP and SMS elements. At this time all the business
environments have been on the marketonly a short while
indicators justified investments of this size. Altogether
and unfortunately these products typically support a
the IN project lasted for three years and it was a risky
restricted range of products from a single source.
project financially.
Service development life cycles have shortened and
there are products available in the market, which make

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 50
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

5.3.3 Special services

The start of open competition put pressure on Telecom


Finland to speed up the development of IN services.
This challenge was met with purchasing more IN
capabilities and developing competance inside Telecom
Finland to rapidly develop new services. For the special
services an additional node with SCE capabilities was
purchased. With this investment, Telecom Finland was
able to reduce time for services development down to
acceptable level. Limited new services can now be
developed in days, more sophisticated ones in months.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 51
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

draft stage. More innotation on the standardation work

6. Broadband intelligence and has been shown from the ATM Forum. The ATM
Forum consists of members of several existing
media
enterprises in the area of telecommunications.

6.1 Broadband networks

The emergence of optical transmission techique has


provided more higher transfer rates and reliable transfer
for the networks. The bit error propability has moved
approximately from 10−6 in the copper based signalling
technique to 10 −9 and even better in the optical
transmission techique. This has started projects on
defining new applications based on optical transmission Figure 0-1. B-ISDN reference model.
media.
B-ISDN concept is based on the integration of different
kind of services. The reference model describes several
Just a few year s ago the telecommunications systems
layers: physical, ATM, AAL (ATM Adaption Layer)
used mainly PDH techinique in the transmission
layers and the upper layer protocols. B-ISDN uses out-
systems. This technique did not enable high-speed data
of-band signalling to separate the user and signalling
transfer and would have caused several problems when
data.
used in high-speed data transmission. With SDH
techique these problems can be bypassed. SDH
technique provides a synchronous digital data transfer 6.1.1.1 Physical layer
based on optical transmission media where one bit can The physical layer involves the packetization of the user
be exactly pointed at the destination station and also in data into the physical medium slots. In Europe,
the switches between the link. The switches can then CCITT’s SDH (Synchronous Digital Hierarchy)
process the frames in SDH at real-time (In practice with technique is used, while ANSI’s (American National
only a few bits delay) and forward them. This is one Standards Institute) SONET (Synchronous Optical
reason why SDH technique is used in many broadband NETwork) is used in the USA. However, SDH and
networks at the physical layer of their protocol stacks. SONET do not differentiate by the contents. The
transmission technique is based on synchronous data

6.1.1 B-ISDN transfer in optical cable and several transmission speeds


are specified. SONET describes the different speed
B-ISDN (Broadband Integrated Services Digital
levels as OC-x’s (Optical Carrier level at x) while
Network) is a concept specified by CCITT. The lower
STM-x’s (Synchronous Transport Module) are specified
parts of the B-ISDN reference model layers are
in SDH. These levels are multiplants of the basic level
standardized, but the user and network management
OC-1 (51.840 Mbit/s) and STM-1 (155.520 Mbit/s).
parts of the B-ISDN appear to be on the whole at the

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 52
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

Today the level OC-3 is used and ATM equipments for Figure 0-2. ATM cell structure.
the speed of approximately 622 Mbit/s (OC-12) will be
introduced in the very near future (some switches 6.1.1.3 ATM Adaption Layer
already available in 1994). The gigabit transmission AAL provides with more advanced functionalities than
speeds, such as 2.488 Gbit/s (OC-48), will first be used ATM layer to the user. For instance, a checksum is
at backbone networks and SONET standards are provided for the whole ATM packet.
scalable up to almost 10 Gbit/s transmission rates which
are expected to be in use in the future. Inserting payload data into the 48-byte information field
of the ATM cell is accomplished by the ATM Adaption
Layer. The AAL is what gives ATM the flexibility to
6.1.1.2 ATM layer
carry entirely different types of services within the same
ATM is defined in the standard I.121 and is based on
frame format. It is important to understand that the
the fast packet switching technique. It mixes the good
AAL is not a network process but instead is performed
effects of the conventional circuit switching and the
by the network terminating equipment. Thus the
packet switching tehcnique used in data packet
network’s task is only to route the cell from one point to
networks. This new technique is called cell
another, depending on its header information. It should
transmission. Cell transmission uses short, fixed length
be noted that up to four bytes may be used by the
packets and in ATM the cell structure of 5 bytes of
adaptation process itself with some AAL types, leaving
header and 48 bytes of data is used. While ATM relies
44 bytes for payload information. Forum93
on the optical transmission technique, only a cheksum
that notices one sequentially appearing error is provided Several AAL layers have been standardized: CBR
for the header part. The use of such short cells enable (Constant Bit Rate) services, connection-oriented and
shorter delays in the network switching nodes than the connectionless VBR (Variable Data Transfer) data
use of variable length long packets. And, so can the transfer, and Simple and Efficient Adaptation Layer
applications of the ATM networks get smaller changes (SEAL). Forum93
in the arrival times between the packets at the
There are very widely spread protocol architectures,
destination (known as jitter). This is quite obvious in the
such as TCP/IP, in use today. The existing UDP (User
use of isochronous data streams produces by
Datagram Protocol), TCP (Transmission Control
applications, such as video conferencing (realtime
Protocol) and the newest RTP (Real-time Transport
digitized uncompressed images + voice). So the task of
Protocol) (under research in the Internet organization)
ATM layer is to split the upper layer data in to such 48
will not be thrown away until a very advanced solution
byte cells and add the needed 5 bytes in the header,
is readily available. So, it is likely that AAL will not be
which include the destination address and some other
used at the beginning of ATM era.
functionalities not described in this paper.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 53
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

6.1.1.3.1 CBR is indicated of the connection opening so no enhanced

CBR is a service is type 1. (AAL1) service of AAL. It routing has to be done at the network nodes.

handles traffic where there is strong timing relation


between the source and the destination. Examples 6.1.1.5 Management of the B-ISDN architecture
include PCM-encoded voice traffic, contant bit rate
This part of B-ISDN are has not yet been standardized.
video, and the emulation of public network ciruits (e.g.
CCITT has made some approaches to B-ISDN
the transport for E1 links).
management point of view.

The management plane provides two types of functions,


6.1.1.3.2 VBR
namely Layer Management and Plane Management
VBR defines the AAL3/4 service. It is fairly complex
functions. The Plane Management performs
layer that can handle VBR (i.e. bursty) data both with
management functions related to a system as a whole
and without pre-establishing an ATM link. Examples
and provides coordination between all the planes. Plane
for the connection-oriented type include large file
Management has no layered structure. Layer
transfers like CAD files or data backup. The
Management performs management functions (e.g.
connectionless type is intended for short, highly bursty
meta-signalling) relating to resources and parameters
transfers as might be generated by LANs.
residing in its protocol entities. Layer Management
handles the Operation And Maintenance (OAM)
6.1.1.3.3 SEAL information flows specific layer concerned. I321
SEAL defines the AAL5 service. It may be looked at as
a simplified version of AAL3/4 that is designed to meet
6.1.2 ATM networks
the requirements of local, high-speed LAN
The ATM networks will be based on a hierarchial basis
implementations. AAL5 is intended for connectionless
such as the conventional telecommunications networks.
or connection-oriented VBR services.
The layout of the architecture seems to be like the
normal telephony network, but the technology is able to
6.1.1.4 Control plane provide with some very enhanced services not applicable
This plane has a layered structure and perform the call in the conventional telephony network.
control and connection control functions. It deals with
A very much simplified example for the structure of an
the signalling necessary to set up, supervise and release
ATM network is shown here. (Figure ) It is important to
calls and connections. I321 In other words, ATM uses
understand that the various UNI (User-to-Network
signalling protcol to make up the virtual path from the
Interface) and NNI (Network-to-Node Interface)
source to the destination. It is the same way the
connections could be carried via different physical
conventional telecommunications network, such as
media, such as the existing Plesiochronous Digital
telephony network, handles the connection opening.
Hierarchy (PDH) layers or the new SDH. Several
Every component (ATM switches) along the virtual path
standards have been defined on how to interface the
physical layers, and work is continuing to specify

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 54
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

additional physical layers to be used to transport ATM A VCC is a connection between two communicating
cells. Forum93 ATM end entities. It may consist of a concatenation of
several ATM VC links. All communication proceeds
along this same VCC which preserves cell sequence and
provides a certain Quality Of Service (QOS). Note that
the Virtual Channel Identifier in the ATM cell header is
assigned per network entity-to-entity link, i.e. it may
change across the network within the same VCC.
Forum93

Figure 0-3. ATM network architecture.

6.1.2.1 Virtual Circuits and Virtual Paths

The concepts Virtual Circuit (VC) and Virtual Path (VP)


are affected when ATM cells are transported through the
entire network. (Figure )

A VC is mostly knowns as VCC (Virtual Channel


Connection). A VCC is set up between any source and
Figure 0-4. Virtual Channels and Virtual Paths.
any destination in the ATM network, regardless of the
way it is being routed across the network. A Virtual Path groups VCs carried between two ATM

Fundamentally, ATM is a connection-oriented entities and may also involve many ATM VP links. The

technology. The way the network sets up the connection VCs associated with a VP are globally switched without

is therefore by means of signalling, i.e. by transmitting a unbundling or processing the individual VC in any way

set-up request which passes across the network to the or changing their VCI numbers. Thus, the cell sequence

destination. If the destination agrees to form a of each VC is still preserved, and the QOS of the VP

connection, the VCC is set up between the two end- depends on that of its most demanding VC. As the cell

systems. A mapping is defined between the Virtual address mechanism uses both the VCI and the VPI,

Channel Identifiers (VCI)/ Virtual Path Identifiers (VPI) different VPs may also use the same VCI without

of both UNIs, and between the appropriate input link conflict. A cell may also not be associated with any VP.

and the corresponding output link of all intermediate In this case, it would have a null VPI and only a unique

switches. Forum93 VCI. Forum93

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 55
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

By means of VCs and VPs, virtual circuits can be set up subscribe TV programs from the TV companies. The
either permanently (by using so-called ‘Permanent greatest advantage for the customers will be that the
Virtual Channel’ (PVC)) or on demand (‘Switched charging can be done according to watched programs.
Virtual Channel’ (SVC)). It is likely that VPs will be
Movies on demand that is often called Video On
used mostly between switches (i.e. across NNIs) to carry
Demand (VOD), much to channel surfer’s delight and
across large numbers of virtual circuits. In any case, all
convenience. The solution for people not knowing how
the ATM switch has to do is to identify, on the basis of
to program their VCRs is that they don’t have to
the cell’s VPI, VCI or both, which output a received cell
anymore; the telecable companies - the fruiton of the
needs to be routed to, and what the new VPI/VCI on this
telephone and cable company merger mania - download
output link is. The operation of an ATM network is
whatever program people want to watch. People buy or
therefore very simple and inherently can scale to very
rent movies from the infotainment providers. LAN94
high speeds. Forum93
The difference between the TV multicating is that VOD
provides a service that can unicast movies to the
6.2 Applications for the broadband networks
customers. Both of these services belong to the category
of Pay-per-View. So, the videorent corporations no
The explosive growth of available link bandwidth for
further have to keep video cassettes in the store, but a
applications has changed and will change even more the
large store capacity of data, such as CD-ROMs
nature of the computer applications. The applications
(Compact Disk-Read Only Memory), etc.
will be even more parallelized, and concerning the
multimedia applications, several multimedia servers will
Some additional services might be provided to the
be located in the highly distributed network architecture.
customers, such as video shopping, interactive games,
education, and information publishing. In
Just a few broadband applications to mention, it is quite
videoshopping people interact directly with the video
sure that hundreds of them will exist in the future.
catalogs, checking availability and pricing with the
(Figure ) First applications could perhaps be high-
stores’ databases. LAN94 The network’s high-speed
quality visual telephones that use just a slight
nature makes it practical and close to realistic to play
compression technique to pack the moving images.
interactive VR (Virtual Reality) games, which are
Because of the large available bandwidth it is possible to
particularly popular and need a lot of computer capacity.
send images with no compression at all. Of course, the
In education the high-speed networks bring classes and
normal telephony service can be provided in broadband
research materials to people everywhere. With
networks.
interactive information publishing, you can find as little
It is also expectable that TV companies will not just or as much information as you want just by asking your
broadcast TV programs in the future. With high- navigation software for help.
capacity broadband networks TV corporations can then
multicast digital (such as HDTV (High Definition
TeleVision)) programs to the customers. This will
provide the customers to independently of each other to

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 56
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

Figure 0-6. The Broadband IN concept.

The Broadband IN is a concept where the Intelligent


Network structure is used to manage and control high-
speed network technologies, such as ATM switches.
(Figure ) The user is accessed via a high-speed interface,
such as an ATM interface. When the user wants to use
B-IN services he connects to a specified B-IN service
Figure 0-5. Some broadband network applications.
number via the ATM interface. The B-SSP (Broadband
Service Switching Point) (here ATM switch) then
6.3 Broadband IN
notices the B-IN service request and sends it to the B-

The Intelligent Network concept involves with narrow SCP (Broadband Service Control Point). Then B-SCP

band ISDN and other slow speed networks. Broadband gives as a response the real number (here the virtual

IN (B-IN) is a concept for the use of high-speed circuit and path) where the service is located to the B-

transmission technique in the Intelligent Network SSP. The B-SSP then uses the ATM signalling protocol

structure. This is possible in IN because of its flexible (Q.2391) to set up the path to the destination and starts

architecture. IN provides computer controlled the service. The goal of B-IN is that the user does not

telecommunications and in B-IN, IN controls, for have to be aware of the technical implementation of the

example, the function of ATM switches. The standards service used.

for the IN-B-ISDN access has not yet been introduced,


so B-IN focuses just on controlling the high-speed
switches.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 57
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

6.4 Telecom Finland B-IN project Telephony This service is just the normal
telephony service via the ATM
The Telecom Finland has launched a project (February
network. It uses the GUS
1994) on researching of Broadband Intelligent
audiograbber to encode the
Networks. Its aim is to make an application (a real B-IN
voice at both of the stations.
service) which would use the existing network
Video telephony This service is an advanced
technology and in the very near future also the ATM
telephony service mixed with
technology in the service execution.
video. It uses the videocameras
and the videograbber to grab
6.4.1 The hardware configuration the moving videoimage. The
The hardware configuration will consist of three Intel IVS software is used to encode
386/486 (Linux) workstations (at first only one; without and decode the audio and
the ATM network). Two of the workstations have a video stream according to the
videocamera with a videograbber and a Gravis H.261 standard.
UltraSound (GUS) audiograbber. In the near future these Audio On Demand This service (AOD) would act
workstation will also have an adapter to ATM network like as listening to a
(i.e. an ATM card). A special videosoftware will be conventional CD player. The
driven in the two workstations, for instance IVS (INRIA customer requests the server
Videoconferencing System). The third workstation will for a CD audio sample and
be kept as a Broadband Intelligent Network component then the server begins sending
B-SCP where the control software in driven. (Figure ) the digitized audio samples to
client.
Video On Demand This service would be a
primitive VOD service. It
would be using the IVS
videosoftware where the client
would request the B-SCP with
a service (a video) and the
server would then send it
along the ATM network to the
client either encoded with
H.261 or MPEG (Moving
Pictures Experts Group).

Figure 0-7. The B-IN hardware configuration.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 58
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

Video This service is almost the


Conferencing same as the video telephony
service, but this needs
multicasting capabilities,
where video telephony needed
only unicasting.

Table 0-1. The Telecom Finland B-IN services.

The aim of this project is to provide (server) an ordinary


customer (client) with B-IN services. The services in
Error! Reference source not found. will at least be
able to be provided. The easisest one is the ordinary
telephony service, and the difficultest is the
Figure 0-8. The use of TMN in B-IN.
videoconferencing which would need multicasting
capabilities from the Linux kernel and some changes in
6.4.2.1 B-IN MIB
the IVS videosoftware.

6.4.2 TMN and B-IN

In the previous section was discussed about the


Broadband IN services. The services were static services
which could not be configured by the customer. The
meaning of this stage was just to have a view of B-IN
and its possibilities. The next step is to have a remotely
configurable service database where the customer could
configure, for instance his VOD service table, remotely
and get the true VOD service capabilities. The aim of
this stage is to have a TMN configurable B-IN service
parameters. The customer’s configure would affect the
B-SCP database (MIB) and naturally also the B-SMS,
because of the charging. (Figure )

Figure 0-9. A visio of B-IN MIB concept.

This section just provides with a visio of the Broadband


IN Management Information Base (MIB) structure. The
idea is such that the customer will be provided with the
capability of remotely to configure his own service

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 59
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

palette that in telecommunications management


language is better known as a MIB. This MIB would
contain all his B-IN service parameters and they could
be configured with the use of TMN at any time. (Figure
) Such parameters, in for instance the videoconferencing
service, would be the names of the members of the
conferencing group and their corresponding network
addresses in the lower layer of MIB tree hierarchy. So,
the customer B-IN service parameters could be described
in the structure of a MIB tree.

This section was just a visio of what the B-IN could


make it possible. The exact description of MIB and the
TMN and B-IN interface were not considered entirely at
the time of writing this tutorial. The documents of this
project in the future will concentrate more on these
subjects.

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 60
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

[Garra93] Garrahan, James, Russo, Peter, et al.,

7. References Intelligent Network Overview, IEEE


Communications Magazine, March, 1993

[Abram92] Abramowski, St., et al., A Service [Hara93] Hara, Veikko, 1651 Siirtyvä
Creation Environment for Intelligent tietoliikenne (Mobile Communications),
Networks, Philips Research Laboratiories A course held at Lappeenranta University
Aachen, 1992 of Technology, 1993

[Ambro89] Ambrosch, W., The Intelligent Network, [Homa92] Homa, Jonathan, Intelligent Network
A joint study by Bell Atlantic, IBM and Requirements for Personal
Siemens, Germany, 1989 Communications Services, IEEE
Communications Magazine, Vol 1., 2,
[Appel93] Appeldorn, Menso, Kung, Roberto, et al.,
1992
TMN + IN = TINA, IEEE
Communications Magazine, April, 1993 [I321] CCITT Study Group XVIII, B-ISDN
Protocol Reference Model and its
[Benne93] Bennett, Ronnie Lee, Switching Systems
Application, Geneva, 1991
in the 21st Century, IEEE
Communications Magazine, Vol. 31, 3, [LAN94] LAN Magazine Editors, 2010: The
1993 Future Networks, LAN Magazine, 1994

[Draft91] Draft Recommendation I.312/Q.1201, [Lauta93] Lautanala, Kari, Veijalainen, Kari,


Principles of Intelligent Network Intelligent Network Architecture and
Architecture, CCITT, 1991 Services with the DX200 Switching
System, Workshop proceedings:
[Duran92] Duran, Jose, International Standards
Workshop on Intelligent Networks,
for International Networks, IEEE
Lappeenranta University of Technology,
Communications Magazine, February,
1993
1992
[Lehti93] Lehtinen, Pekka, Performance and
[Forum93] ATM Forum, Introduction to ATM, The
Overload Modelling of SCP and SSPS
ATM Forum, 1993
of an IN, Workshop proceedings:
Workshop on Intelligent Networks,
[Fujio93] Fujioka, Masanobu, Kikuta, Hiroyuki, et
Lappeenranta University of Technology,
al., Globalizing IN for the New Age,
1993
IEEE Communications Magazine, April,
1993

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 61
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

[M3010] CCITT Study Group IV, M.3010: [Q1211] CCITT Study Group XI, Q.1211:
Principles for a Telecommunications Introduction to Intelligent Network
Management Network, 1993 Capability Set 1, COM XI-R 210-E,
April, 1992
[Martik93] Martikainen, Olli, Tietoliikenne ‘93,
Telecom Finland, 1993 [Q1213] CCITT Study Group XI, New
Recommnedation Q.1213: Global
[Modar90] Modaressi, Abdi, Skoog, Ronald,
Functional Plane for Intelligent
Signalling System No: 7: A Tutorial,
Network CS1, COM XI-R 211-E, April,
IEEE Communications Magazine, July,
1992
1990
[Q1214] CCITT Study Group XI, New
[Nerys91] Nerys, C., Operations Systems For
Recommnedation Q.1214 &5:
Intelligent Networks, AT&T
Distributed Functional Plane for
Technology, vol. 6, no. 2, 1991
Intelligent Network CS1, COM XI-R
213-E, April, 1992
[Q1202] CCITT Study Group XI,
Recommnedation Q.1202: Intelligent
[Q1215] CCITT Study Group XI, New
Network Service Plane architecture,
Recommnedation Q.1215: Physical
October, 1992
plane for Intelligent Network CS-1,
COM XI-R 216-E, April, 1992
[Q1203] CCITT Study Group XI,
Recommnedation Q.1203: Intelligent
[Q1218] CCITT Study Group XI, New
Network Global Functional Plane
Recommnedation Q.1213: Interface
architecture, October, 1992
Recommendation for Intelligent
Network CS1, COM XI-R 217-E, April,
[Q1204] CCITT Study Group XI, New
1992
Recommnedation Q.1204: Intelligent
Network Distributed Functional Plane
[Raat93] Raatikainen, Kimmo, A Framework for
architecture, COM XI-R 208-E, April,
Evaluating the Performance of IN
1992
Services, Workshop proceedings:
Workshop on Intelligent Networks,
[Q1205] CCITT Study Group XI, ITU-T
Lappeenranta University of Technology,
Recommendation Q.1205: Intelligent
1993
Network Physical Plane architecture,
March, 1993
[Roger90] Rogerson, David, The Intelligent
Network: Market Strategies, Ovum
Ltd., 1990

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 62
25th February 1994
IN - Tutorial for the Proceedings of the First Winter School on Intelligent Networks in Helsinki at Telecom Finland

[Vande92] Vandenameele, UPT, a new dimension


in telecommunications provided by IN,
1992

[Wyatt91] Wyatt, George, Barshefsky, Alvin, et al.,


The Evolution of Global Intelligent
Network Architecture, AT&T Techical
journal, Summer 1991

Lappeenranta University of Technology & Telecom Finland Kim Molin, Olli Martikainen 63
25th February 1994

You might also like