51
Intelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like computers, they could be programmed, making it possible to introduce intelligent services, such as call forwarding, call block- ing, freephone, and premium rate numbers, into the network. At first, these services were programmed in assembler-like languages, and had to be installed manually in each switch. Installing a new service meant reprogramming the switch and manually resolving the interac- tions with the service programs already run- ning on it. The process of defining the service, specifying, implementing, testing, and finally deploying it would typically take between 2 and 4 years. The management of these services was obviously inefficient, as even the smallest patch required going to each switch in turn and reinstalling the new software. It was soon recognized that it would be much more convenient if services could be designed in more high-level lan- guage, and could be deployed and managed from one point rather than separately in each switch. 23 Contents 2.1 SS7 2.2 IN standards 2.3 Service plane 2.4 Global functional plane 2.5 Distributed functional plane 2.6 Physical plane 2.7 CS-2 2.8 CS-3 and CS-4 2.9 Implementing IN 2 CHAPTER

Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

Embed Size (px)

Citation preview

Page 1: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

Intelligent networks

As the majority of switches became digital in

the 1980s, vendors and operators saw that,

like computers, they could be programmed,

making it possible to introduce intelligent

services, such as call forwarding, call block-

ing, freephone, and premium rate numbers,

into the network.

At first, these services were programmed

in assembler-like languages, and had to be

installed manually in each switch. Installing

a new service meant reprogramming the

switch and manually resolving the interac-

tions with the service programs already run-

ning on it. The process of defining the

service, specifying, implementing, testing,

and finally deploying it would typically take

between 2 and 4 years. The management of

these services was obviously inefficient, as

even the smallest patch required going to

each switch in turn and reinstalling the

new software. It was soon recognized that it

would be much more convenient if services

could be designed in more high-level lan-

guage, and could be deployed and managed

from one point rather than separately in

each switch.

23

Contents

2.1 SS7

2.2 IN standards

2.3 Service plane

2.4 Global functionalplane

2.5 Distributedfunctional plane

2.6 Physical plane

2.7 CS-2

2.8 CS-3 and CS-4

2.9 Implementing IN

2C H A P T E R

Page 2: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

The introduction of SS7 in the early 1980s was a leap forward. SS7 is

a metanetwork for signaling. It provides reliable signaling links that are

independent of the bearer connections. The SS7 protocols1

have a high

degree of flexibility for supporting new features and are still state of the

art today, more than 20 years after AT&T introduced the concept.

After the breakup of AT&T, it was Telcordia (formerly Bellcore) that

first proposed the advanced intelligent networks (AIN) concept using the

protocols of SS7. The purpose of AIN was to allow the regional Bell oper-

ating companies (the Baby Bells) to simplify the deployment and man-

agement of value-added services in the network by centralizing their

control.

Based on the success of the Telcordia design, the International Tele-

communication Union (ITU) began the process of standardizing INs in

the late 1980s. After 4 years of standardization efforts, the first IN stan-

dard was published in 1993 as the ITU Q.1200 series. Although numer-

ous improvements and extensions have been made since then, today’s

IN standards and products are still largely based on the first ITU

standards.

2.1 SS7

SS7 is such an important milestone in the development of switched

telephony networks that it would require a whole book to do it justice. In

fact, many books were dedicated entirely to this signaling system, which

today still rules our telephony network.

It is difficult to understand the birth of IN without seeing it in the

context of SS7. In this section we take a bird’s-eye view of SS7 and see

how it led to the invention of IN.

As electronic switches became widespread in the 1970s the need

arose for modernizing the signaling protocols. AT&T defined SS7 in 1975,

using data network technology. SS7 is a metanetwork for out-of-band

signaling, as opposed to in-band signaling systems that use the same

24 Next Generation Intelligent Networks

1. In its most general definition, a protocol is a well-defined set of messages and rules to

make two or more entities communicate. Protocols are used in hardware as well as in

software. Complex systems like computers and telecommunications systems are usually

divided up into several components or layers, each with its own set of protocols. This is

done because it is easier to design, test, and debug a system with simple protocols for

each task than a system consisting of one overarching protocol.

Page 3: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

connections for voice and signaling messages. SS7 is designed in such a

way that it guarantees reliable signaling links. In 1980 the ITU started

standardizing SS7, and in 1984 it issued the SS7 standard as the famous

red book. Since then, the ITU maintains and updates the standards regu-

larly.

Unfortunately, there is not one SS7 standard. The ANSI and ITU ver-

sions of SS7 are slightly different, and there are several different versions

of SS7 deployed around the world. There are, however, gateways that

interface between the different protocols.

An SS7 network contains three kinds of elements:

1. Signaling points (SPs): network equipment that can send or receive

signaling messages;

2. Signaling links (SLs): links that carry signaling messages (in SS7 they

are either 56-Kbps or 64-Kbps data connections);

3. Signaling transfer points (STPs): intermediate nodes that route sig-

naling messages from one place to another.

Figure 2.1 shows a typical SS7 configuration for two connected net-

works. STPs are usually configured in pairs to ensure high reliability. The

Intelligent networks 25

SL

SL

SL SL

SL SL

SL

SL

SL

SL

SL

Network 1 Network 2

Bearer connection

STP

STP

SL

SP

SP

SP

SP

STP

STP

SLSL

Figure 2.1 SS7 network elements.

Page 4: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

SS7 protocols ensure that when an STP or SL goes down, the messages

are automatically rerouted over links that are still operational.

To ensure secure and flexible signaling connections, the SS7 protocol

architecture is layered. It roughly follows the seven-layer open-systems

interconnection (OSI) model, which was popular when SS7 was defined.

The main idea of the OSI model is to make complex telecommunications

protocols more manageable by dividing them up into layers. Each layer

provides certain services to the layer above it, and uses the services of the

layer below. This results in a modular protocol stack in which each layer

encapsulates a well-defined set of functions.

Figure 2.2 shows the SS7 protocol stack, which is made up of the fol-

lowing protocols:

◗ Message Transfer Part 1 (MTP1) represents the physical layer, consist-

ing of hardware and firmware resources such as network cards,

transceivers, and cables.

◗ Message Transfer Part 2 (MTP2) is responsible for the secure transmis-

sion of messages between two signaling (transfer) points.

26 Next Generation Intelligent Networks

Message Transfer Part (MTP) 3

Message Transfer Part (MTP) 1

Message Transfer Part (MTP) 2

Signaling Connection Control Part (SCCP)

Transaction Capabilities ApplicationPart (TCAP)

Ori

en

tati

on

,A

dm

inis

tra

tio

n,a

nd

Ma

na

ge

me

nt

Pa

rt(O

AM

P)

Mo

bil

eA

pp

lic

ati

on

Pa

rt(M

AP

)

InA

pp

lic

ati

on

Pa

rt(I

NA

P)

ISD

NU

ser

Pa

rt(I

SU

P)

Te

lep

ho

ny

Use

rP

art

(TU

P)

Figure 2.2 SS7 protocols.

Page 5: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

◗ Message Transfer Part 3 (MTP3) takes care of routing a message from

one point in the SS7 network to another, passing through intermedi-

ate signaling transfer points.

◗ Telephony User Part (TUP) describes the signaling messages for the

setup of calls and connections in analog telephony networks. This

protocol is used in older telephony networks that still use electrome-

chanical or analog electronic switches.

◗ ISDN User Part (ISUP) describes the signaling messages for the setup

of calls and connections in digital networks. Despite the name, ISUP

is used in all digital telephony networks, not only ISDN.

◗ Signaling Connection Control Part (SCCP) sets up and manages signaling

connections, using MTP3 to route messages reliably from one node

to another. In fact, SCCP supports both connection-oriented and

connectionless signaling contexts. SCCP also carries the information

that STPs need to perform global title translation. This transla-

tion allows global titles (dialed numbers) to be translated into

destination-point codes (network addresses). This is needed for

translating 800 numbers, number portability, and other services in

which the dialed number must be translated to a different destina-

tion address.

◗ Transaction Capabilities Application Part (TCAP) allows signaling nodes

to do transactions. Transactions are groups of actions that must be

performed as one indivisible action. They are typically used for

accessing network databases, for example databases that map 800

numbers to their destination address. A TCAP message contains

two types of information: the transaction portion is for starting and

ending transactions, and maintains the state of the dialog; the com-

ponent portion carries the actual protocol queries and responses.

A TCAP message is a kind of container that can carry the signaling

messages of other protocols in the component portion. Some of the pro-

tocols that have been defined include the following:

◗ Operation, Administration, and Management Part (OAMP). Still only

partly defined, this protocol is intended for verifying network rout-

ing databases and diagnosing link problems.

Intelligent networks 27

Page 6: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

◗ Mobile Application Part (MAP). The protocol for mobility management

GSM networks, it describes the messages that are exchanged

between a subscriber’s home and visited network when he or she is

roaming. We will discuss MAP in more detail in Chapter 4.

◗ IN Application Part (INAP). This is the protocol defined for IN; we

will discuss it in more detail later in this chapter.

The fact that SS7 provides a secure data network for signaling mes-

sages meant that it was easy to add special processing nodes in the net-

work for call processing. Telcordia called these processing nodes service

control points (SCPs), and this is how IN was born. Figure 2.3 illustrates

how SCPs were added in SS7 networks for special call processing.

The SCP allows an operator to install and manage services like call

forwarding and call blocking more easily than when they had to be pro-

grammed in the switch. Consider the example of call forwarding. When a

call is made, the call setup signaling message is routed first to the SCP.

The SCP looks at the dialed number, and if it is to be forwarded, it substi-

tutes this number with the new destination number. The resulting modi-

fied signaling message is then sent on into the SS7 network to complete

the call.

The introduction of the SCP in SS7 amounted to the first step toward

what would be called IN. The next section discusses how IN was further

developed and standardized.

28 Next Generation Intelligent Networks

Bearer connection

SP

SCP

SPSTP

STP

SP

Figure 2.3 Introduction of service control points in SS7 networks.

Page 7: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

2.2 IN standards

When Telcordia successfully implemented its AIN architecture in the late

1980s, the idea caught on with the international community and stan-

dardization efforts began in the ITU. The ITU took 4 years to publish the

first IN standard in 1992, and by that time the first products were already

coming onto the market. It comes as no surprise that the early IN imple-

mentations, for example those by Telcordia, Ericsson, and Alcatel, were

still mostly proprietary and only superficially respected the standards.

Today, however, the level of standardization has much improved.

The main philosophy behind the ITU standardization process was to

standardize service capabilities, but not services. This is very important in

understanding the IN architecture. Many people talk about IN services,

but it is important to realize that these in fact do not exist. What does

exist are services that can be implemented with IN, but there is no such

thing as a service standardized by IN. It is a subtle difference, but it

matters.

2.2.1 Standardization bodies

IN is a framework for implementing value-added in telecommunications

networks. It is not a set of services and it is more than an architecture

alone. Today there are several groups involved in the standardization of

IN. The most important group is undoubtedly the ITU Telecommunica-

tion Standardization Sector (ITU-T). In Europe ETSI is contributing to IN

standardization by endorsing the ITU standard and by proposing a

number of extensions such as core-INAP and CAMEL.

Though not a standardizations body, Eurescom did a great deal of

work on IN, both on paper and in prototyping. Eurescom is a cooperative

research and development organization founded in 1991 by Europe’s

leading network operators; it publishes requirements and feedback on

standards as seen from the operator’s viewpoint.

In the United States, IN started as a de facto standard promoted by

Telcordia. Even today’s ITU-T standards for IN resemble those of the

original Telcordia model, but the Telcordia and ITU-T protocols have

been diverging over time. The differences between the American and

international IN standards manifest themselves more on the protocol

level than in concept.

Apart from Telcordia, the T1S1 group of the American National Stan-

dards Institute (ANSI) has contributed to the American standardization of

IN. There are also industrial groups that are not standards bodies, but that

Intelligent networks 29

Page 8: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

do play a role in promoting IN standards. The most significant of these is

the Value-Added Services Alliance (VASA). Other industry groups that

have relevance to IN are Sun’s JAIN group, Parlay, and the Third Genera-

tion Partnership Program (3GPP). In this book we will discuss the contri-

butions of all of these groups.

2.2.2 Standardization cycles

One of the problems that the ITU had to cope with is the standardization

of a framework that is by nature expanding all the time, in an environ-

ment that is changing all the time. Telephony switches offer more and

more features, with every release and new network. Technologies such

as GSM and the Internet are constantly changing the environment that

IN operates in.

The ITU therefore decided to standardize IN in a continuous process,

and to freeze the standards at regular intervals. These interval specifica-

tions are called capability sets (CSs). As the name suggests, a CS defines a

set of service capabilities out of which services can be created. These sets

are upward compatible; in other words, each new CS adds new features

while the existing ones remain valid.

The first CS, standardized in 1992, was CS-1. As IN was new at the

time and there were few implementations around to validate the con-

cept, it was necessary to polish the definition in 1995, resulting in the

revised CS-1 (CS-1 R). Since then, the ITU has frozen CS-2 in 1997 and

CS-3 in 1999. The most recent version, CS-4, was issued in 2001.

As explained in the previous section, there are some differences

between the U.S. and the international IN standards. The U.S. standards

are also defined in releases, but the timing of these is slightly different

from that of the ITU CSs. All IN CSs are built on the same foundation, the

IN conceptual model. The following section explains this model and how

it structures the IN standards.

2.2.3 IN conceptual model

There are several ways to explain what IN is about. One of the ways to

look at IN is simply as an add-on to the existing switching architecture. If

we look at it this way, then IN is just a collection of dedicated computers

that perform special control functions. Another way of looking at IN is to

consider it as a software architecture that runs services, much like an

operating system runs applications. If we look at it this way, IN is not as

much a set of nodes as it is a software framework.

30 Next Generation Intelligent Networks

Page 9: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

The ITU standards combine these different views in an elegant IN

conceptual model (INCM). The INCM reconciles the different physical

and logical views of the IN architecture.

The INCM defines four different views of IN: the service plane (SP),

the global functional plane (GFP), the distributed functional plane (DFP),

and the physical plane (PP). At first sight it may seem that these four

planes are like different protocol layers, but they are not. Many people

mistake the INCM for the IN architecture itself. The INCM is however just

a convenient way of looking at IN from different angles.

The INCM is defined in the ITU recommendations2

Q.1200, Q.1201

to Q.1205, Q.1208, and Q.1290, as shown in Table 2.1.

The INCM can be seen as the foundation for IN and provides the

structure for defining each CS. Each CS is described in the same way:

CS-x is described by recommendations Q.12x0, Q.12x1–Q.12x5, Q.12x8,

and Q.12x9, where x = 1, 2, 3, and so on. Table 2.2 shows the numbering

scheme for IN CS-x recommendations.

In the following sections we will take a closer look at the different

planes of the INCM, the foundation of all IN capability sets. After that we

can compare the different capability sets.

2.3 Service plane

The service plane is the top plane of the INCM. It describes services from

the user’s point of view. The service plane describes what features a

Intelligent networks 31

Table 2.1

ITU-T Recommendations Defining the INCM

Number Recommendation

Q.1200 General Series IN Recommendations Structure

Q.1201 Principles of the IN Architecture

Q.1202 IN Service Plane Architecture

Q.1203 IN Global Functional Plane Architecture

Q.1204 IN Distributed Functional Plane Architecture

Q.1205 IN Physical Plane Architecture

Q.1208 General Aspects of the IN Application Protocol

Q.1290 Glossary of Terms Used in the Definition of IN

2. ITU refers to its standards as recommendations.

Page 10: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

service is composed of, but not how they are implemented in the net-

work. A feature in the service plane can be seen as a reusable unit of

functionality. The freephone service, for example, consists of two

features:

1. One-number feature: routes incoming calls to a single external

number to different telephones;

2. Reverse charging: reverses charging on calls to the freephone

number, so that the owner of the freephone number pays instead

of the caller.

Figure 2.4 illustrates the IN service plane concept.

32 Next Generation Intelligent Networks

Featu

reA

Featu

reA

Service 1

Service 2Fe

ature

B

Featu

reC

Figure 2.4 IN service plane.

Table 2.2

Structure of ITU-T Recommendations, Series Q.1200

Number Recommendation

Q.12x0 Structure of IN CS-x

Q.12x1 Introduction to IN CS-x

Q.12x2 IN Service Plane Architecture for CS-x (not for CS-1)

Q.12x3 IN Global Functional Plane Architecture for CS-x

Q.12x4 IN Distributed Functional Plane Architecture for CS-x

Q.12x5 IN Physical Plane Architecture for CS-x

Q.12x8 IN Interface Recommendations for CS-x

Q.12x9 IN User Guide for CS-x

Page 11: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

The concept of services being composed of features is essential to IN.

The key philosophy behind IN is that it standardizes reusable service fea-

tures rather than services. The composition of services out of features is

up to the network operator, and is limited only by the imagination.

The main features defined in CS-1 are shown in Table 2.3. In this

chapter we will not discuss each feature in detail, since the idea is only to

understand how the INCM works. Many of the features shown in

Table 2.3 may look familiar, as they are similar to features found in pri-

vate branch exchanges (PBXs).

Of course, in practice the available features determine to a large

extent the kind of services that can be deployed. The features defined for

CS-1 are few and rather simple. They correspond closely to PBX services

and to existing supplementary services, such as call forwarding, that were

programmed directly in the switch before IN was introduced. As IN

evolves, however, the amount of features increases and with them the

possible ways of combining them into new services.

2.4 Global functional plane

Whereas the service plane describes how services are composed from fea-

tures from the user’s viewpoint, the GFP looks at services from the

Intelligent networks 33

Table 2.3

Features Defined in the CS-1 Service Plane

Feature Group Features

Numbering Abbreviated dialing, one number, personal number,

private numbering plan

Routing Call forwarding, follow-me diversion, time-dependent routing,

origin-dependent routing, call distribution

Charging Premium rate, reverse, split

Access Authentication, authorization code, off-net access

Restriction Call limiter, call gapping, closed user group, originating call

screening, terminating call screening

Customization Customer profile management, customer recorded announcement,

customized ringing

User interaction Originating user prompting, destination user prompting, attendant,

consultation calling

Other features Call waiting, automatic call-back, call hold with announcement, call

logging, call queuing, call transfer, mass calling, meet-me conference

Page 12: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

service provider’s viewpoint. The GFP describes the software components

that a service provider must deploy in order to assemble services. These

components are called SIBs. Depending on what you grew up with, the

easiest way to envision SIBs is as LEGO, Meccano, or Tinkertoy parts out

of which you can build structures by simply clicking one part onto

another.

A feature defined in the SP is implemented by one or more SIBs in

the GFP. Figure 2.5 illustrates this relationship between the SP and the

GFP.

2.4.1 SIBs

SIBs are software components that can be composed into service scripts.

Each SIB has one logical starting point and several logical ends. The logi-

cal start and ends are where the SIB is connected into the control flow.

Multiple logical ends allow each SIB to be used as a decision point in the

service script.

The SIB acts on call-instance data (CID). This is the call-dependent

data, and includes the originator’s address, the dialed number, and the

destination routing address. Furthermore, the SIB may need service

34 Next Generation Intelligent Networks

Featu

reA Fe

ature

B

Featu

reC Fe

ature

AService 1

Service 2

BCPChargeSIB Queue

SIB

ScreenSIB

TranslateSIB

Service plane

Global functional plane

Figure 2.5 Mapping from service plane to global functional plane.

Page 13: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

support data, which is independent of the call. Examples of SSD are a

call-screening list (black list), a call-forwarding table, or a charging

scheme. Figure 2.6 shows the structure of a SIB with its parameters.

The global functional plane for IN CS-1 describes a total of 14 SIBs,

which are summarized in Table 2.4 (in alphabetical order).

As this table shows, the functionality of SIBs is elementary, although

the granularity varies somewhat between SIBs. For example, the user

interaction SIB is more complex than the screen or algorithm SIB.

The IN standard describes for each SIB exactly what the logical start,

the logical ends, the SSD, and CID are. Figure 2.7 shows a simplified dia-

gram of the parameters for the screen SIB. This SIB can take the dialed

number as CID input parameter, and uses a screening list (typically a

black list or white list of telephone numbers) as SSD against which to

check the number. Depending on the outcome of this check, the screen

SIB returns either at the in-list or the not-in-list logical end.

The screen SIB is typically used to implement services such as

originating-call screening (OCS) and terminating-call screening (TCS). In

the case of OCS, the dialed number is screened at the originating end of

the call (as in the screen SIB of Figure 2.7). This service is mostly

intended for limiting international calls or calls to premium rate numbers

from certain telephones.

In the case of TCS, the identity of the calling line is screened at the

receiving end of the call. This service is typically used to block unwanted

incoming calls, for example malicious calls or calls from telemarketers.

Of course, Figure 2.7 is a simplified diagram; in reality the parame-

ters are more complex. The logical ends usually also include an error

Intelligent networks 35

Service independentbuilding block (SIB)

Logical start Logical ends

Service support data (SSD)

Call instance data (CID)

Input Output

Figure 2.6 A SIB.

Page 14: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

clause for cases in which there is a syntactical error in one of the inputs.

Figure 2.7 does not show such details. The important thing for now is to

understand the mechanism whereby the SIBs are defined.

2.4.2 Basic call process

Among the SIBs there is one special building block that represents the call

itself. This SIB is called the basic call process (BCP). The BCP describes the

36 Next Generation Intelligent Networks

Table 2.4

SIBs Defined in the CS-1 Global Functional Plane

SIB Description

Algorithm Applies an algorithm to the CID or SSD (the algorithm to

be applied is specified as a parameter of the SIB)

Authenticate Verifies a user’s privilege to place and receive calls and to

access particular service logic and data

Charge Initiates special charging treatment, that is, any charging

different from the standard charging of a call by the SSP;

special charging treatment to be applied is a parameter of

the SIB

Compare Performs a comparison of the input parameter against a

specified reference value

Distribution Distributes the treatment of calls on the basis of specified

parameters

Log call

information

Writes detailed call information into a file; information is

intended for off-line use, not within the context of the call

Queue Queues calls for completion to a specific network address

Screen Compares the input parameter against a list of data

Service data

management

Enables the retrieval, storage, deletion and modification of

service data in the database

Service filter Accepts or rejects calls according to specified parameters;

SIB initially called LIMIT in the 1992 version of IN CS-1

because it was mostly used for call limiting (to prevent

network overloads)

Translate Translates input parameter value into output parameter

value, based on a specified algorithm or table

User interaction Allows information to be exchanged between the network

and a call party, for example by playing an announcement

or by receiving DTMF tones from a party

Verify Performs a syntactic check on the input parameter,

according to a given syntax

Basic call

process

Basic SIB which represents the setting up of a

point-to-point call

Page 15: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

phases of setting up a telephone call from one user to another. At each of

these phases it is possible to interrupt the call setup process and to start

executing a service program.

The points at which the call processing can be interrupted are the

points of initiation (POIs). When a service is started at a POI, we say that

the service is triggered; for this to happen it is necessary to arm a trigger

at the POI beforehand so that the BCP knows it must suspend processing.

At the time of triggering, the BCP passes the CID to the first SIB in the

chain to be executed. The SIBs that make up the service can then change

the CID as required by the service. In the case of call forwarding, for

example, they can change the destination address.

After finishing the processing of the service, the last SIB hands back

control to the BCP. The service can order a jump to any point in the BCP

call processing; it does not have to be at the same point that the service

was invoked.

The point at which control is handed back to the BCP is called the

point of return (POR), and at this point the BCP can be instructed to han-

dle the call in a specific way. Table 2.5 show the POIs (on the left) and the

parameters that can be passed to the BCP with the POI (on the right).

To illustrate how a service is described at the global functional plane,

we will now consider the example of a call made with a calling card.

Intelligent networks 37

ScreenStartIn list

Service support data

Call instance dataInput: dialed number

Not in list

Screening list

Figure 2.7 Parameters of the screen SIB.

Page 16: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

Figure 2.8 shows how this service could be implemented with three

SIBs. The example is of course oversimplified, and only serves to further

an understanding of how services are defined with SIBs. Figure 2.8 shows

only the logical flow of SIBs. All SIB parameters (CID and SSD) have

been omitted for simplicity’s sake.

According to Figure 2.8, the service could be implemented as follows.

Imagine that the user dials a special number corresponding to the

calling-card-call service. The following would then take place:

38 Next Generation Intelligent Networks

Table 2.5

POIs and PORs of the CS-1 BCP

POIs PORs

Call originated

Address collected

Address analyzed

Call arrival

Busy

No answer

Call acceptance

Active state

End of call

Handle as transit

Continue with existing data

Proceed with new data

Provide call-party handling

Initiate call

Clear call

Basic call process

Userinteraction

Service datamanagement

Charge

POI POR POR

Addresscollected

Not OK

OK

Calling-card service

Continue with new data Clear call

(1)

(2) (3)

(4)

(5)

Figure 2.8 Calling-card-call service defined at GFP level (simplified).

Page 17: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

1. At the address-collected POI, the BCP immediately recognizes that

the dialed number is special and triggers the calling-card-call

service.

2. The first SIB to be executed is the user-interaction SIB. This SIB

plays a message to the user: Please enter your card number, PIN

code, and the number you want to dial. It collects the DTMF tones

from the user and converts them to numbers.

3. The next SIB in sequence, service data management, uses these

numbers to look up the calling card for this user and check the PIN

code.

4. If the card exists and the PIN code is correct (the OK branch), then

the charge SIB starts charging the call to this calling card. After this,

control is passed back to the BCP at the same point at which call

control was suspended. The POR carries the instruction continue

with new data, causing the call to proceed with the destination

number input by the user.

5. If the card number or the PIN code is incorrect (the not-OK

branch), then the service instructs the BCP to terminate the call

immediately by jumping to the clear-call POR.

This is of course a simplified example. Real-life services can take up to

1,000 SIBs, although most of the service logic is usually for error han-

dling. Services like the calling card call have to take into account any pos-

sible error: wrong card number, incorrect PIN, invalid destination

number, time-out of user response, and so on. Service providers say that

as much as 80% of the service logic can be spent on error handling.

2.5 Distributed functional plane

Whereas the GFP helps to identify the building blocks out of which to

construct services, its view of the network is simplistic. In reality we can-

not manage the network as if it were one machine with a single BCP for

each call. In practice, the network has a complex layered structure and

consists of many specialized elements. Things get even more complicated

if we think about calls that start in one operator’s network and end in

another’s. The GFP does not give us any clues as to how to actually

implement the services in the network.

Intelligent networks 39

Page 18: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

The purpose of the DFP is to provide a more realistic view of the net-

work, reflecting the distribution of functions. In reality, the setup of a

telephony call is not a centralized function, as the GFP assumes. It is the

result of interactions between switches that use protocols to decide how

to route the call from source to destination. To reflect this reality, the DFP

distinguishes different functions in the network.

2.5.1 Functional entities

The DFP identifies the different functional entities (FEs) that make up the

telephony network. FEs are distributed network functions that run the

BCP and the other SIBs defined at the GFP. A single SIB can map onto

more than one FE.

The DFP also describes the information flows between FEs. They

define what information must be exchanged between the different func-

tional entities to implement each SIB. The information flows are specified

in the specification and development language (SDL)3

and with message

sequence charts (MSC). Both are ITU-standardized languages for the for-

mal description of distributed systems. Figure 2.9 illustrates how the

implementation of SIBs is distributed over FEs.

The most important FEs defined in CS-1 are as follows:

◗ Call control function (CCF): keeps the state of a call, such as alerting or

terminating line busy;

◗ Service switching function (SSF): takes care of controlling the bearer

connections in a call, typically voice circuits;

◗ Service control function (SCF): contains the programs that control serv-

ices. Such programs are called service logic in IN;

◗ Service data function (SDF): represents the databases that keep the

service support data, for example number translation tables or pre-

paid account credit data;

◗ Service management function (SMF): contains all management func-

tions, such as installing new services, adding or deleting service sub-

scribers, and updating service data;

40 Next Generation Intelligent Networks

3. The SDL and MSC standards are defined in ITU recommendation Z.100.

Page 19: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

◗ Special resource function (SRF): represents special functions in the

network that could be needed to realize services, such as playing

announcements, playing tones, generating special ringing patterns,

or bridging and mixing of conference calls.

The difference between the CCF and SSF should be noted. It is natu-

ral to wonder why there are two separate functions to represent the set-

ting up of telephone calls. From the user perspective, the call and the

connection are the same thing: Wouldn’t it be sufficient to have the SSF

alone represent the functionality of the switch?

Remember that SS7 already separates signaling from connections. In

other words, the signaling involved in setting up a call is carried on a dif-

ferent network than the voice connections themselves. Taking this a step

further, we could imagine a call as being not just a connection from A to

B, but a general concept that associates parties (users placing or receiving

the call) with connections and network resources during a delimited

period of time.

Intelligent networks 41

BCPChargeSIB

QueueSIB

ScreenSIB

TranslateSIB

Global functional plane

Distributed functional plane

CCF

SSF

SRF

SCF

SDF

SMF

Figure 2.9 Distributed functional plane.

Page 20: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

There are important advantages to distinguishing between calls and

connections. Such separation allows for the concept of the call to extend

naturally to conferences, multimedia communications, and even Internet

connections. And it allows service logic programs (like IN) to control the

adding and dropping of connections within the context of a single call. It

is especially for this reason that IN separates the CCF from the SSF.

2.5.2 Half call

The DFP provides a more detailed representation of the basic call process.

The most important refinement is that the DFP takes into account the dis-

tributed nature of a call. At the DFP level, the call is no longer seen as a

single abstract process, but a distinction is made between call processing

for the originating (calling) party and for the terminating (called) party.

The DFP introduces the concept of a half call: the BCP is now split

into two parts, called the originating basic-call-state model (O-BCSM)

and the terminating basic-call-state model (T-BCSM). The O-BCSM

describes the procedure for initiating a call, while the T-BCSM describes

the process of receiving one. Both the O-BCSM and T-BCSM can trigger

services in the SCF, as Figure 2.10 illustrates.

It is obvious why the DFP distinguishes between O-BCSM and

T-BCSM: There exist IN services that deal with outgoing calls (for exam-

ple, abbreviated dialing) and services that deal with incoming calls (for

example, blocking of malicious calls). Apart from this, the caller and

42 Next Generation Intelligent Networks

O-BCSM T-BCSM

SCF

SSF

Called partyCalling party

TriggerTrigger

Figure 2.10 The half-call concept as defined in the DFP.

Page 21: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

called party are not necessarily connected to the same switch or even to

the same network, so one cannot assume that there is one global process

that has control over the whole call.

2.5.3 Detection points

The O-BCSM and T-BCSM can both be seen as more detailed versions of

(half of) the BCP of the GFP. Both the O-BCSM and T-BCSM are repre-

sented as state-transition diagrams that describe the call-processing states

and transitions between them. The states are called points in call (PIC),

and the transitions are caused by events, such as taking the phone off the

hook, dialing a number, putting the phone on the hook, or flashing

(swiftly pushing) the hook.

An event can have a detection point (DP) associated with it. DPs can

be seen as implementations of the POIs defined at the GFP: They are

points at which the SSF can suspend call processing and hand over con-

trol to the SCF. Figure 2.11 shows the PICs and DPs of the O-BCSM and

T-BCSM.

Each large dark box in Figure 2.11 represents a PIC. The lines and

arrows represent events, and the small lighter boxes represent DPs. The

PICs and DPs are rather self-explanatory, apart from a few odd names such

as O_Null_and_Authorize_Origination_Attempt, T_Null_and_

Authorize_Termination_Attempt, and Route_Select_Failure. The

DPs can imply different courses of action, depending on the kind of service

requested and the DP that requests it, as follows:

◗ Trigger detection points (TDPs): set statically at the time of deployment

of a service or when a user subscribes to it;

◗ Event detection points (EDPs): set dynamically by service logic during

the course of a call.

For example, one would use a TDP for a static service such as freephone,

but an EDP would have to be dynamically set to realize a service such as

automatic callback on busy.

When the O-BCSM or T-BCSM encounters a detection point, two

kinds of action are possible:

1. Notification. The BCSM only sends information to the SCF and con-

tinues without waiting for a response.

Intelligent networks 43

Page 22: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

44 Next Generation Intelligent NetworksO

-BC

SM

T-B

CS

M

O_N

ull

an

d_A

uth

ori

zeO

rig

ina

tio

n_a

tte

mp

t

Co

lle

ct_

Info

An

aly

ze_In

fo

Ro

uti

ng

&A

lert

ing

O_A

ba

nd

on

Co

lle

cte

d_In

fo

An

aly

zed

_In

fo

O_A

nsw

er

O_N

o_A

nsw

er

O_M

id_C

all

O_D

isc

on

ne

ct

O_Exception

Ori

gin

ati

ng

_A

tte

mp

t_A

uth

ori

zed

O_A

cti

ve

Ro

ute

_S

ele

ct_

Fa

ilu

re

O_C

all

ed

_P

art

y_B

usy

_T

_N

ull

_a

nd

_A

uth

ori

ze_

term

ina

tio

n_A

tte

mp

t

Se

lec

t_Fa

cil

ity

an

dp

rese

nt

ca

ll

T_A

cti

ve

T_A

ba

nd

on

T_D

isc

on

ne

ct

T_A

lert

ing

T_A

nsw

er

T_M

id_C

all

T_N

o_A

nsw

er

T_Exception

Te

rmin

ati

ng

_A

tte

mp

t_A

uth

ori

zed

T_C

all

ed

_P

art

y_B

usy

Fig

ure

2.1

1B

CS

Ms

for

ori

gin

ati

ng

an

dte

rmin

ati

ng

sid

es.

Page 23: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

2. Request. The BCSM suspends call processing, hands control to the

SCF, and awaits a response before continuing, possibly with modi-

fied call parameters.

The call-forwarding service, for example, can be started only as a request,

because call processing must wait for the number to be translated. On the

other hand, a televoting service may only need information to be sent to

the SCF without suspending the call.

Depending on whether a detection point is a TDP or an EDP, a notifi-

cation or a request, there are four possibilities, as shown in Table 2.6.

2.5.4 Trigger processing

The SSF must have a mechanism for handling DPs when they are

encountered during the processing of a call. In practice, this is usually a

table that lists which DPs are armed and whether they are TDP-N, TDP-R,

EDP-N, or EDP-R. The IN standards also define a function in the SSF that

detects and resolves conflicts between different services triggered on the

same call, the feature interaction manager (FIM).

Figure 2.12 shows an example of the DP processing mechanism in

the SSF. It makes no difference in this example whether we are looking

at an O-BCSM or T-BCSM, since DP processing is the same for both.

Figure 2.12 shows the following sequence of events and triggers:

1. The first DP encountered by the BCSM is not armed, and the

BCSM is instructed to continue.

2. The next DP is armed as TDP-N, meaning that only a notification is

sent to the SCF, and the BCSM immediately resumes without

waiting for a response. Before relaying the TDP-N to the SCF, the

FIM checks for interactions with other services activated on the

same call.

Intelligent networks 45

Table 2.6

Detection Point Types

Trigger Detection Point Event Detection Point

NotificationTrigger detection

point—notification

(TDP-N)

Event detection

point—notification (EDP-N)

Request Trigger detection

point—request (TDP-R)

Event detection

point—request (EDP-R)

Page 24: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

46 Next Generation Intelligent Networks

PIC

DP

PIC

DP

PIC

DP

DP

pro

ce

ssin

gFe

atu

re-

inte

rac

tio

nm

an

ag

er

no

ta

rme

d

Re

sum

e

TD

P-N

!

PIC

DP

SS

FS

CF

Pro

ce

ssn

oti

fic

ati

on

TD

P-N

Re

sum

e

TD

P-R

!P

roc

ess

req

ue

st

TD

P-R

arm

DP

arm

ED

P-R

ED

PR

!C

he

ck

co

nfl

icts

Ch

ec

kc

on

flic

ts

Ch

ec

kc

on

flic

ts

Pro

ce

ssre

qu

est

TD

P-R

Re

sum

ere

spo

nse

BC

SM

Se

rvic

e-

log

icp

rog

ram

(1)

(2)

(3)

(4)

Re

sum

e

Fig

ure

2.1

2D

Pp

roc

essin

ga

nd

fea

ture

inte

rac

tio

nm

an

ag

er.

Page 25: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

3. The third DP encountered is armed as a TDP-R. This time it is a

request, so call processing is suspended and the request is sent via

the FIM to the service logic. In this example, the service logic

responds with a command to arm an EDP-R further on in the

BCSM. This command is passed back to the DP processing module,

which takes care of arming the EDP-R. Then it instructs the BCSM

to resume.

4. The last DP encountered in this example is the one previously

armed by the service logic. This is an EDP-R, which means that call

processing is also suspended until the SCF returns a response, for

example a translated number.

In this example, the BCSM resumes at the next PIC. It is important to

note that the service logic may instruct an event to be armed at any DP in

the BCSM, and that call processing can resume at any point in the BCSM.

In other words, it is unnecessary that call processing always resume at the

next PIC. For example, in a service in which a PIN code is checked, it

makes sense to jump directly to the end of the BCSM and release the call

if the PIN is entered incorrectly.

From the discussion in this section, it is obvious that the distributed

functional plane is significantly more complex than the global functional

plane, but also more realistic in its modeling of call processing and the

ways in which control can be passed to the SCF.

2.6 Physical plane

The DFP takes into account the distributed nature of the network, but

only in a superficial way. The DFP recognizes the difference between the

calling and called party, and between service switching and service con-

trol, but does not go so far as to allocate functions to physical locations or

machines. This is done in the physical plane.

2.6.1 Physical entities

The physical plane allows for different mappings of IN functions onto

physical nodes. The simplest mapping simply allocates a distinct node, as

follows, for each function:

Intelligent networks 47

Page 26: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

◗ Service switching point (SSP): contains the switch, but typically also

holds the CCF and SSF.

◗ Service control point (SCP): contains the SCF.

◗ Service data point (SDP): contains the database or databases that make

up the SDF.

◗ Service management point (SMP): hosts the SMF.

◗ Intelligent peripheral (IP): implements the SRF.

Figure 2.13 illustrates this straightforward mapping of functional entities

onto physical ones.

It is clear that the mapping of Figure 2.13 would require at least four

or five machines to implement an IN system. In smaller networks or in

cases in which there are few services or few service subscribers, the

number of machines can be reduced by colocating certain DFP functions

on the same physical node. For performance reasons, the SCP very often

also hosts the service databases. In other words, the SCF and SDF are

often combined into one SCP. This is shown in Figure 2.14.

The configuration requiring the least hardware is one in which the

SCF, SDF, and IP are located together on one machine. Such a configura-

tion is often referred to as a service node. Many switch vendors actually

48 Next Generation Intelligent Networks

SSF

CCF

SRF

SCF SMF

SDF

SSP SCP

IP

SDP

SMP

SDP

Physical plane

Distributed functional plane

Figure 2.13 IN physical plane.

Page 27: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

combine these functions with the switch itself, and in this case the service

node even includes the SSF. Figure 2.15 illustrates the service node

concept.

Intelligent networks 49

SSF

CCF

SRF

SCF SMF

SDF

SSP SCP

IP

SMP

Physical plane

Distributed functional plane

Figure 2.14 Colocation of SCF and SDF at the physical plane.

SSF

CCF

SRF

SCF SMF

SDF

ServiceNode

Physical plane

SMP

Distributed functional plane

Figure 2.15 Colocation of IN functions in a service node.

Page 28: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

In practice, one can find all of these configurations on the market.

Obviously it is more difficult to support high throughput with a service

node implemented on a single machine than with a multimachine con-

figuration. Service nodes therefore tend to be used in smaller networks,

or in networks with few value-added services. Nevertheless, service

nodes represent an important market, and some vendors concentrate

completely on this business segment.

Many manufacturers support a range of configurations and adapt

their offer to the operator’s requirements and budget. The INCM allows IN

to be built in a modular way, by creating a software module for each FE.

This allows the manufacturer to distribute FEs over physical machines

according to the customer’s needs.

2.6.2 IN application protocol

The INCM is useful in understanding IN, but in the end, building an IN

system comes down to implementing protocols. The protocol used for

communications between FEs is INAP. This protocol is called an applica-

tion protocol because in terms of the seven-layer OSI model, it is situated

in the uppermost application layer (layer 7). We will not discuss OSI in

any further detail here, because it is of little relevance in understanding

IN.

Strictly speaking, INAP is not defined as part of the physical plane,

but is described in separate documents (Q.1208, Q.1218, and Q.1228).

But since INAP is about implementing IN, we will cheat a little and dis-

cuss it here.

INAP messages contain the information exchanged between func-

tional entities, in particular between the SSF and SCF and between

the SCF and SRF. The communication between the SCF and SDF is a

special case, since it is not defined by INAP but is based on the Direc-

tory Access Protocol (DAP), also specified by the ITU in its X.500

recommendations.

INAP is not just a collection of stand-alone messages, but messages

that when sent must follow a certain order, called a dialogue. These dia-

logues implement the information flows defined in the distributed func-

tional plane. Figure 2.16 shows a simple example of such a dialogue for

the freephone service. The procedure is as follows:

1. When the BCSM recognizes the number dialed by the user as a

freephone number, this triggers a TDP-R.

50 Next Generation Intelligent Networks

Page 29: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

Intelligent networks 51

O_

Nu

lla

nd

Au

tho

rize

Ori

gin

ati

on

Att

em

pt

SS

FS

CF

SD

F

An

aly

ze_

Info

Co

lle

cte

d_

Info

O_

Ac

tiv

e

O_

Dis

co

nn

ec

t

TD

P-R

TD

P-N

TD

P-R

init

ialD

P(c

all

id,d

iale

dn

um

be

r,‘f

ree

ph

on

e’)

,re

qu

est

Info

(fre

ep

ho

ne

DB

,d

iale

dn

um

be

r)

req

ue

stIn

foR

esp

on

se

(de

stin

ati

on

id)

co

nn

ec

t(c

all

id,d

est

ina

tio

nid

);re

qu

est

Re

po

rt(O

_A

nsw

er,

O_

Dis

co

nn

ec

t)

ev

en

tRe

po

rt(c

all

id,

O_

An

swe

r,ti

me

sta

mp

)

ev

en

tRe

po

rt(c

all

id,

O_

Dis

co

nn

ec

t,ti

me

sta

mp

)

Sta

rtre

ve

rse

ch

arg

ing

Sto

pre

ve

rse

ch

arg

ing

BC

SM

(1)

(2)

(3)

(4)

(5)

(6)

(7)

Lo

ok

up

dia

led

nu

mb

er

infr

ee

ph

on

ed

ata

ba

se

O_

An

swe

r

Fig

ure

2.1

6S

imp

lifi

ed

INA

Pd

ialo

gu

efo

rfr

ee

ph

on

ese

rvic

e.

Page 30: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

2. As a result, the SSF sends an initialDP message to the SCF with

the calling line identifier, dialed number, and service identifier as

parameters. The meaning of the initialDPmessage is to start the

service processing in the SCF. As explained before, a service is

defined as a sequence of SIBs in the GFP. In the DFP these SIBs

map to programs in the FEs that communicate by sending mes-

sages to each other.

3. In this example, the service program in the SCF first queries the

database in the SDF to find out where to route this call. It does this

by sending a requestInfo message to the SDF.

4. The SDF looks up the dialed freephone number in the database,

finds the corresponding destination network address, and returns

it to the SCF in a requestInfoResponse message.

5. The SCF then orders the SSF to connect the calling party to the des-

tination address, using the connect message. The SCF also

requests the SSF to be notified when the connection is actually

established and stopped. For this it sends a requestReport mes-

sage to the SSF, indicating the DPs where it wants to be notified (in

this case O_Answerwhen the call is accepted, and O_Disconnect

when the call is disconnected).

6. When the destination party answers the call, the SSF sends an

eventReport message with a time stamp. As a result, the SCF

starts reverse charging the call to the destination address (remem-

ber, this is a freephone service; the caller does not pay).

7. Finally, when one of the parties releases the call, the SSF sends

another eventReport message to the SCP, causing the SCP to

stop charging and terminate the freephone service processing.

Of course, this example is oversimplified. In reality the dialogues are

much longer and the messages have many more parameters. In fact, the

INAP specifications are hundreds of pages long and grow with each capa-

bility set. But what is important here is to understand the basic mecha-

nism: dialogues of INAP messages implement the information flows

between FEs, which in turn implement the SIBs, the building blocks out

of which services are developed.

52 Next Generation Intelligent Networks

Page 31: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

INAP carries only the information directly related to information

exchange between IN FEs. It does not take care of the correct transmis-

sion of messages, error corrections, or keeping track of the state of a dia-

logue. All this is taken care of by the SS7 protocols situated below INAP,

shown in Figure 2.2 in Section 2.1.

INAP messages are transported within TCAP messages. As explained

in Section 2.1, TCAP is a protocol for establishing dialogues and keeping

track of transaction states. A TCAP message contains two parts: the trans-

action portion for managing the transaction, and the component portion

for carrying protocol messages. INAP messages are carried in the compo-

nent portion of a TCAP message, as part of a TCAP-managed dialogue.

The syntax of INAP is formally specified in the abstract syntax nota-

tion 1 (ASN.1). ASN.1 is a complex language and that can be difficult to

read, but the bottom line is that the grammar of INAP is unambiguously

defined. The standard is also very precise about what data types can be

exchanged; for example, a series of digits is different from a number or a

string.

Now that we are familiar with the basic concepts of IN, in the next

section we will look at the extensions that have been made over the years

in CS-2 and CS-3.

2.7 CS-2

The first IN standards were defined at a time when telecommunications

operators were still mostly state-owned monopolies, the Internet was a

tool only for the research community, and GSM was in the embryonic

stage. In fact GSM was standardized more or less in the same time frame

as IN CS-1 (that is, between 1988 and 1992), but IN and GSM standardi-

zation were quite different activities.

IN was initially designed for fixed voice telephony networks gov-

erned by a single operator. The IN CS-1 standard was powerful and sim-

ple, but by the time IN platforms were being deployed in real networks in

the 1990s, the world was undergoing radical changes. Telecommunica-

tions markets were deregulated and opened to competition. Even within

the same country, calls could now initiate in one operator’s network and

terminate in another’s. To stimulate competition, many regulatory bodies

began requiring number portability, allowing customers to change opera-

tors without changing their number.

Intelligent networks 53

Page 32: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

The second half of the 1990s was also the era of the mobile phone

and the Internet. All this contributed to a true explosion of complexity in

the network. Even in the first years that IN was being deployed, between

1992 and 1995, it became clear that the CS-1 standard was already out of

date. Some of the limitations of the CS-1 standard were as follows:

◗ The CS-1 specifications assume that the network is controlled by a

single operator and does not provide for adequate mechanisms to

provide services over operator boundaries (so-called internetwork-

ing services).

◗ CS-1 deals with point-to-point telephone calls and does not offer

sufficient features for multiparty and multimedia communications

(such as videoconferences).

◗ CS-1 has only limited features for mobility. A particular problem

with CS-1 is that user interactions can take place only when a call

is set up first. In mobile networks, however, many procedures take

place outside the context of a call, for example user authentication

or location updating.

The target for CS-2 was to lift some of these limitations while

remaining backward compatible with CS-1. The extensions to CS-1 that

were made in CS-2 (and maintained in CS-3) can be summarized as

follows:

◗ CS-2 allows communications from one SCF to another and from

one SDF to another. This means that service logic and data can be

distributed and that services can be controlled across operator

domains.

◗ CS-2 can handle calls between more than two parties. In technical

terms this means that one service logic instance in the SCF can con-

trol more than one BCSM at a time.

◗ CS-2 allows user interactions to take place outside the context of a

call, by creating a basic call-unrelated process (BUCP) in addition to

the BCP in the GFP. Likewise, CS-2 defines a basic call-unrelated

state model (BCUSM) at DFP level as a call-unrelated counterpart of

the BCSM.

54 Next Generation Intelligent Networks

Page 33: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

◗ CS-2 allows call-related and call-unrelated user interactions to use

out-channel signaling connections (i.e., signaling connections that

are not related to the call or even the telephony network; for exam-

ple, a GSM short message or a TCP/IP connection).

◗ CS-2 generalizes the service-creation concept. By refining the con-

cept of SIBs and making it recursive, it becomes more of a true com-

ponent model.

◗ Service management guidelines are better defined in CS-2 than they

were in CS-1.

◗ CS-2 contains guidelines for service-interaction processing, neces-

sary for resolving conflicts between incompatible services.

Straightforward as they may appear at first sight, these points require

complex changes in the global functional plane, the distributed func-

tional plane, and in the definition of the INAP protocol. We will now take

a closer look at how CS-2 refines the INCM.

2.7.1 CS-2 service plane

The IN service plane was first properly defined in CS-2. Although the

INCM was defined with the CS-1 specifications, the service plane was not

formally defined for CS-1. According to the Q.1200 series recommenda-

tion structure explained in Section 2.2.3, recommendation Q.1212

should define the CS-1 service plane. In reality, this document was never

produced.

The first IN specifications were an evolution from existing network

features that were until then programmed in the switch. These supple-

mentary services were widely known and were not unique to IN, and ITU

never bothered to specify them. CS-2, on the other hand, does define a

service plane, because it introduces new features that provide for more

than the classic switch-based services.

It is important to keep in mind that IN does not standardize services.

The CS-2 service plane only provides a benchmark for the minimal set of

services and features that can be implemented in CS-2. It does not say

that these are the CS-2 services, but rather that this is the minimal set of

features and services that you should be able to implement in CS-2.

The CS-2 service plane is backward compatible with the CS-1 serv-

ices, but adds features for internetworking, call-party handling (CPH),

out-channel user interactions, service management, and service creation.

Intelligent networks 55

Page 34: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

2.7.2 CS-2 global functional plane

An important change in the GFP is the addition of BCUP. This is a special

SIB much like the BCP, except that it describes the process of call-

unrelated user interaction. A typical case of such call-unrelated user inter-

action is the registration of a user to a network or terminal. Such interac-

tions are common in GSM networks, for example when a user switches

on a mobile or moves between radio cells. The BCUP models such authen-

tication and registration procedures outside the context of a call.

CS-2 also provides more points of control in a call by extending the

BCP with new POIs and PORs. It introduces new POIs for midcall inter-

ruptions, like a hook flash or pushing the special R button on the phone.

The new PORs are mostly related to the individual handling of connec-

tions between call parties. In CS-1 this type of control was not possible.

In CS-2 a service process does not have to be a single chain of SIBs as

in CS-1, but can involve multiple processes.4

During its execution, a serv-

ice logic program can create new processes that run in parallel and can

communicate between each other by messages.

The CS-2 global functional plane redefines some of the CS-1 SIBs and

includes a number of new ones. The user interaction SIB is extended so

that it also handles out-channel and call-unrelated user interactions.

Apart from the special BCUP, the new SIBs are for the following:

◗ CPH: to manage the attachment and detachment of parties within a

call;

◗ Process management: to manage the creation and destruction of par-

allel service processes and the communication between them.

Without going into detail, Table 2.7 summarizes the new CS-2 SIBs and

their functions.

CS-2 also extends the mechanism by which services are created out

of SIBs. CS-1 defined a fixed set of SIBs that cannot be modified or

extended. In CS-1, it is not possible to create reusable components out of

groups of SIBs, something that can be very useful in practice. CS-1

proved to be too rigid and in practice many manufacturers ended up

implementing their own nonstandard SIBs.

CS-2 refines the SIB concept by defining a recursive service-creation

model:

56 Next Generation Intelligent Networks

4. These processes can be compared with threads in some programming languages.

Page 35: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

◗ A SIB operation represents an atomic operation that cannot be

divided into smaller components.

◗ A high-level SIB (HLSIB) is a component that can be composed

out of SIB operations, SIBs, or other HLSIBs, as illustrated in

Figure 2.17.

Intelligent networks 57

Table 2.7

New SIBs in CS-2

Basic Call-Unrelated Process

BCUP Describes user interactions that take

place outside the context of a call (e.g.,

authentication, registration, location

update)

SIBS for Call-Party Handling

Split Detaches one or more call parties from

an existing call, and attaches them to

another call

Join Attaches one or more call parties to a call

SIBs for Process Management

Initiate

service

process

Starts a new service process to be run in

parallel

End Ends a service process

Message handler Sends a message to, or receives a

message from, another service process

SIB

SIBoperation

SIBoperation

High-levelSIB

High-levelSIB

High-level SIB

Logicalstart

Logicalends

Figure 2.17 CS-2 high-level SIB concept.

Page 36: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

This new definition of SIBs is quite powerful and allows for service com-

ponents to be specified at any desired level of granularity. To make CS-2

backward compatible with CS-1, the original notion of SIBs was kept in

CS-2. This is why the definition of HLSIBs also allows the possibility of

including normal SIBs. A CS-2 service logic program can be composed out

of any combination of SIB operations, CS-1 or CS-2 SIBs, and HLSIBs.

2.7.3 CS-2 distributed functional plane

The CS-2 DFP describes the FEs and the information flows between

them, following the rules of the INCM. It is backward compatible with

the CS-1 DFP, so it maintains the CCF, SSF, SCF, SDF, SMF, and SRF and

extends them with new functionality. CS-2 also introduces a number of

new FEs:

◗ Call-unrelated service function (CUSF) processes events from call-

unrelated user interactions, and can trigger service processing in

the SCF. The CUSF is like the SSF, but for call-unrelated events.

◗ Service control user agent function (SCUAF) represents the call-unrelated

user interface that allows a user to communicate with the CUSF.

Although the SCUAF does not have a real counterpart in CS-1, one

could argue that its function is similar to that of the SRF except for

call-unrelated interactions.

◗ Service management access function (SMAF) provides a user interface for

external access to the SMF, for example through the Internet.

◗ Intelligent access function (IAF) is an interworking function that

allows an SCF to control non-IN equipment.

In addition to these new FEs, CS-2 defines three functions for mobile net-

works: the call-related radio access control function (CRACF), call-

unrelated radio access control function (CURACF), and radio control

function (RCF). As the control of radio access is not a major concern for

CS-2, however, these FEs and their information flows have only an infor-

mative status in the standard.

Apart from defining new FEs, CS-2 also introduces new information

flows between existing FEs that did not exist in CS-1. CS-2 allows SCFs to

communicate directly with each other and service control to be distrib-

uted. CS-2 also lets data be distributed over SDFs. This is illustrated in

Figure 2.18.

58 Next Generation Intelligent Networks

Page 37: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

The possibility of distributing service control and data is particularly

useful in cases in which services must be delivered across service provider

domains. An example is the international virtual private network (IVPN),

in which an international company may have employees and terminals

distributed over different networks.

The CS-2 O-BCSM and T-BCSM contain new PICs and DPs that are

refinements of those defined for CS-1. Table 2.8 shows how the CS-2

PICs relate to the CS-1 PICs shown in Figure 2.11.

As Table 2.8 shows, many PICs have remained the same, but some,

such as O_Null&Authorize_Origination_Attempt, Routing&

Alerting, and Select_Facility&Present_Call were split up in

finer PICs. There are two new PICs in CS-2 that did not exist in CS-1:

O_Suspended and T_Suspended. These new PICs represent a half call

that is neither active nor released (for example, when a party is put on

hold). CS-2 also defines new DPs for the new PICs where service logic can

be triggered.

Apart from the O-BCSM and T-BCSM, CS-2 defines a new BCUSM

that represents user interactions taking place outside the context of a call.

The BCUSM has a simple structure and is shown in Figure 2.19. The states

and transitions of the BCUSM represent the activation and release of a sig-

naling channel for user interaction, and the reception of user data in the

form of components. All this takes place outside the context of a call.

One of the most important new features in CS-2 is CPH. In CS-1 it

was only possible to set up and release a call between two parties. The call

Intelligent networks 59

CS-1

CS-1

CS-1

CS-1CS-2

CS-2SDF

SDF

SCF

SCF

SSF

SSF

Network 1

Network 2

Figure 2.18 New relationships between FEs in CS-2.

Page 38: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

and the connection set up as the result of the call were the same thing. In

CS-2 it is possible to manipulate the individual parties in a call and their

connections. Within the context of a call, CS-2 lets you add or drop call

parties and connections. This means that the call and the connection are

no longer the same thing: The configuration of connections set up within

a call can change as parties are added and dropped.

It was necessary to add CPH in CS-2 to control services like confer-

ence calls where there are more than two parties involved in the commu-

nication. But CPH is also required to realize more elementary services

such as call waiting.

The addition of CPH makes CS-2 much more complex than CS-1. At

the level of the GFP, this complexity is not so apparent; there are only

60 Next Generation Intelligent Networks

Table 2.8

Comparison of CS-1 and CS-2 PICs

CS-1 PIC CS-2 PIC

O-BCSM

O_Null&Authorize_Origination_

Attempt

O_Null

Authorize_Origination_Attempt

Collect_Info Collect_Information

Analyze_Info Analyze_Information

Routing&Alerting Route Select

Authorize_Call_Setup

Send Call

O_Alerting O_Alerting

O_Active O_Active

O_Exception O_Exception

— O_Suspended

T-BCSM

T_Null&Authorize_Termination_

Attempt

T_Null

Authorize_Termination_Attempt

Select Facility&Present Call Select Facility

Present Call

T_Alerting T_Alerting

T_Active T_Active

T_Exception T_Exception

— T_Suspended

Page 39: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

two new SIBs: split and join. At the network equipment level, the story is

quite different: CHP requires connections to be associated to a call, and

could involve special resources like audio bridges.

One of the most important requirements is that the service logic in

the SCF must always have a consistent view of the configuration of the

connections in a call. When the SCF loses track of who is connected to

the call, the service gets into an inconsistent state and the effect of a join

or split operation becomes unpredictable. For this reason, CS-2 defines a

formal model for describing the state of connections in a call. This is

called the connection view state (CVS) model.

The main elements in a CVS are as follows:

◗ Call segment (CS) describes a half call as explained in Section 2.5.2,

but in CS-2 a half call can also apply to multiparty calls. A CS is

described in terms of legs and connection points.

◗ Connection point (CP) is a joint between two or more legs or between

just one leg and the network. The notion of a CP is generic; it can be a

switched connection, but it can also be an audio bridge or a media

distribution point.

Intelligent networks 61

Active

Release

Release

Activationfailed

ReleaseReleased

Componentreceived

Activation receivedand authorized

Association releaserequested

Idle and authorizeactivation/association req.

Figure 2.19 BCUSM.

Page 40: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

◗ Leg represents a part of the communication path between parties in a

call. A leg can be controlling or passive, depending on whether serv-

ice logic was invoked for this leg or whether it receives instructions

passively.

◗ Call segment association (CSA) is the group of all call segments that are

involved in a given service and that are controlled by the SCF. In

principle a call segment can be made out of any combination of legs

and connection points, but not all combinations are meaningful.

CS-2 identifies 14 specific configurations that are found in the most

common services.

The CS-2 standard uses a graphical notation to describe CVS. The dia-

grams for call segments show a connection point and the legs attached to

it. For each leg it is indicated whether it is controlling (indicated by the

letter c) or passive (indicated by the letter p). The diagram also shows

whether the leg has actually been set up (called joined) or whether it is

still in the phase of being set up (called pending).

To show how the CVS represents the state of the connections in a

call, we will now consider the very simple example of the follow-on call

feature. This feature is used for example in credit card calls and allows a

user to make several calls without putting the telephone on-hook and

entering the credit card details every time. Figure 2.20 shows a simplified

version of the information flows between the SCF and SSF for the

follow-on call feature, and the resulting CVS.

The information flow for the follow-on call leads to the following

connection view states:

1. When the user places the first call, the O-BCSM in the SSF detects a

trigger and sends the initialDP message to the SCF.

2. The SCF instructs the SSF to connect the originating and destina-

tion parties, and requests the SSF to report any midcall events.

3. When the user ends the first call and wishes to make a follow-on

call, he or she does not put the telephone on the hook, but simply

flashes the hook. This causes a midcall event to be reported to the

SCF.

4. As a result, the follow-on call service logic does not terminate the

call, but only disconnects the leg to the destination party.

62 Next Generation Intelligent Networks

Page 41: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

Intelligent networks 63S

SF

SC

F

init

ialD

P(c

all

id,d

iale

dn

um

be

r‘f

ree

ph

on

e’)

ev

en

tRe

po

rt(O

_M

id_C

all

,O

_S

wit

ch

ed

_H

oo

k_F

lash

_Im

me

dia

te)

Co

nn

ec

tio

nst

ate

vie

w

dis

co

nn

ec

tLe

g(l

eg

id)

co

nn

ec

tTo

Re

sou

rce

(SR

F)

pro

mp

t&C

oll

ec

tUse

rIn

form

ati

on

(me

ssa

ge

id)

pro

mp

t&C

oll

ec

tUse

rIn

form

ati

on

_R

esu

lt

dis

co

nn

ec

tFo

rwa

rdC

on

ne

cti

on

(SR

F)

co

nn

ec

t(c

all

id,n

ew

de

stin

ati

on

id)

O-B

CS

M

cp

O-B

CS

M

cp

O-B

CS

M

c

O-B

CS

M

c

SR

F

Ori

gin

ati

ng

setu

p

Sta

ble

2-p

art

y

1-p

art

y

Fo

rwa

rdc

on

ne

cti

on

O-B

CS

M

c

1-p

art

y

O-B

CS

M

cp

Sta

ble

2-p

art

y

(1)

(2)

(3)

(4)

(5)

(6)

(7)

(8)

Joined

Joined

Joined

Joined

JoinedJoined

Joined

Joined

Pending

co

nn

ec

t(c

all

id,d

est

ina

tio

nid

);re

qu

est

Re

po

rt(O

_M

id_C

all

)

Fig

ure

2.2

0C

on

ne

cti

on

-sta

tev

iew

sfo

rfo

llo

w-o

nc

all

.

Page 42: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

5. Next, the SCF instructs the SSF to establish a connection to the

SRF.

6. The SCF instructs the SRF to play an announcement message and

prompt the user to dial the number for the follow-on call.

7. When the SCF has received the digits for the next call, it orders the

disconnection from the SRF.

8. Finally, the SCF sets up the connection to the new call destination

specified by the user.

This scenario was taken from recommendation Q.1229. Of course, the

example is simplified; the INAP messages between the SSF and SCF are

more complex in reality. What is important is an understanding of the

principle: The CVS represents how the SCF sees the connections in the

SSF. When a command from the SCF to the SSF changes the connections

in a call, the CVS changes accordingly.

CVSs can become very complex, and in practice it is difficult to read

and interpret them in the standards. This is because IN CS-2 tries to

implement multiparty communications by using classic switching tech-

nology intended only for point-to-point telephone calls. This is like trying

to map a complex three-dimensional model to a two-dimensional picture

without losing any detail.

2.7.4 Implementing CS-2

Although CS-2 does not introduce significant new network elements at

the physical plane, the new CS-2 functionality does have its impact on

the definition of INAP. The most important extensions made to INAP in

CS-2 are those for CPH, call-unrelated interactions, and communication

between SCFs that share control of a call.

CS-2 is significantly more complex than CS-1, both conceptually and

in terms of the INAP protocol. As it turns out, the CS-2 standard contains

a certain amount of ambiguities and errors that proved a stumbling block

for a quick introduction into commercial platforms. For this reason CS-1

has remained the most frequently used capability set even years after

CS-2 was published (and it continues to be widely used today).

For CS-2 to become truly usable, it was necessary to resolve certain

problems with the specifications. Rather than producing a new version of

CS-2, these necessary revisions were made during the specification of

64 Next Generation Intelligent Networks

Page 43: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

CS-3. As a result of this, CS-3 should probably be considered more as the

updated and extended version of CS-2 than as a new capability set.

The CS-3 recommendation respecifies INAP, but does not revise the

service plane, global functional plane, distributed functional plane, and

physical plane. One could say that CS-3 is to CS-2 what CS-1 R (version

1995) is to CS-1 (version 1992). In the following section, we will take a

brief look at CS-3 and its successor, CS-4.

2.8 CS-3 and CS-4

When standardization of CS-3 started, manufacturers and operators were

still struggling with the consolidation of CS-2. CS-2 introduced a new

level of complexity and with that, new ambiguities and problems with

the interpretation of the standards. Many of the necessary refinements

and corrections to the CS-2 standards were actually made during the

specification of CS-3. As a result, CS-3 should be regarded more as an

updated version of CS-2 than as a new capability set in its own right.

2.8.1 CS-3 features

CS-3 does not introduce new concepts in the INCM. For this reason the

ITU recommendations for IN CS-3 do not include documents

Q.1232–Q.1235, which would have specified the CS-3 SP, GFP, DFP, and

PP (see Table 2.2 in Section 2.2.3).

CS-3 does improve the CS-2 facilities for interworking with mobile

networks, broadband and narrowband ISDN, and the Internet. For this

reason the CS-3 standard includes two new documents:

1. Q.1236 is a document that describes a high-level management

information model for IN CS-3. In fact, one can hardly speak of it as

a standard; it is more of an informative document that presents

some considerations on service management.

2. Q.1237 gives a description of the extensions made in CS-3 to sup-

port broadband ISDN.

The most important part of the CS-3 standard is the redefinition of

the INAP protocol in document Q.1238. This document has seven parts,

each describing the interaction between specific functional entities.

Intelligent networks 65

Page 44: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

CS-3 provides a couple of new facilities with respect to its predecessor

CS-2, such as support for number portability. Number portability means

that a subscriber can keep his or her telephone number when changing

operators or even when moving to a new geographical location. By now

this has been declared mandatory by regulatory bodies in most countries.

At first sight number portability does not seem difficult, because it

simply involves a number translation. This was possible even in CS-1.

The problem is that many operators started with non-IN implementations

for number portability. In many countries number portability requires

access to an external database managed by the national regulator. CS-3

offers the mechanisms for interworking with such hybrid systems.

A new technical feature of CS-3 is to allow multiple points of control.

This is a fundamental departure from CS-2, which allows only a single

point of control. In CS-2 only one service logic instance can control a call

segment at a time, whereas CS-3 allows several service logic instances to

control the same call segment at a time. This means that there must be

some way to arbitrate between service logic instances that try to execute

incompatible requests.

An example of a conflict that can arise with multiple points of control

is when two SCFs try to join and disconnect the same call leg at the same

time. CS-3 describes some mechanisms to detect and resolve such feature

interactions, although more work on this is still needed.

2.8.2 ETSI improvements in CS-2 and CS-3

Although the ITU standards can be seen as the master specification of IN,

the role of ETSI has proven crucial for the development of CS-2 and

CS-3. The ETSI group involved in the standardization of IN was the Serv-

ices and Protocols for Advanced Networks, Group 3 (SPAN 3).

Because the ITU CS-1 and CS-2 standards contain certain ambigui-

ties, many manufacturers ended up implementing IN with their own pro-

prietary version of INAP. In the mid-1990s it was practically impossible to

connect one vendor’s IN system to another’s for this reason. The different

manufacturers’ protocols simply were not compatible, although they

were all called INAP.

ETSI recognized this problem and specified core INAP, a simplified

version of INAP stripped of unnecessary complexity and a kind of com-

mon denominator of the INAPs in the market. Today many manufactur-

ers have core INAP-compatible IN systems.

Another important contribution of ETSI SPAN 3 was to specify the

entire distributed functional plane of CS-2 and CS-3 in SDL. ITU already

66 Next Generation Intelligent Networks

Page 45: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

described the DFP information flows in SDL, but used the language rather

informally.

SDL is a formal language that allows for protocols and systems to be

specified unambiguously as communicating finite state machines. As

such, SDL provides a formal framework for validation, simulation, and

conformance testing. SDL can be used at various degrees of formality,

however, and the ITU specifications were not rigorous enough to serve as

a true conformance framework.

ETSI sharpened the SDL specifications to the point where they are

formal enough to allow for the automatic generation of test scenarios.

ETSI used the SDL models to specify protocol implementation confor-

mance statements (PICS) that can be used as formal references for IN

implementations. With this formal approach, ETSI also revealed and

resolved a number of ambiguities in the original ITU standards.

Although the ITU provided the ignition for the definition of IN, it is

fair to say that ETSI made some decisive contributions to IN during the

second half of the 1990s.

2.8.3 New additions in CS-4

While time pressure resulted in CS-3 being little more than a revised

version of CS-2, many new requirements for IN were delayed to CS-4.

Internet, mobile networks, and deregulation were changing the tele-

communications scene in a dramatic way, and object-oriented program-

ming was becoming the industry standard in computing. Against this

backdrop CS-4 was expected to introduce important innovations in the

INCM.

CS-4 was to accommodate the communications of the new era:

voice, video, multimedia, data communications, possibly involving multi-

ple parties, possibly involving mobile terminals, and using packet-based

transmission rather than switched connections. CS-4 was also expected

to provide an object-oriented model for services and service components,

up-to-date with industry standards.

The specification of CS-4 started in the summer of 1999 and was

completed in 2001. It has already become clear that CS-4 fulfills only part

of its promises. The ITU recommendations for CS-4 are little more than

another update of the INAP protocol.

The dominant part of the CS-4 standard is recommendation Q.1248,

a revision of the seven-volume CS-3 INAP specification. The only part of

the INCM updated in CS-4 is the DFP, defined in recommendation

Q.1244.

Intelligent networks 67

Page 46: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

The most important new feature in CS-4 is its support for communi-

cations over the Internet. The CS-4 DFP introduces the session manager

(SM), a new FE for handling voice and multimedia sessions on the Inter-

net. The SM can set up and receive voice and multimedia calls over the

Internet using either of the two well-known protocols H.323 or SIP.5

From the Internet point of view, the SM looks like an H.323 gate-

keeper or SIP proxy and communicates with other H.323 gatekeepers

and SIP proxies. On the IN side, it looks like a special kind of telephone

exchange that can trigger services through the SSF. Figure 2.21 gives a

simplified view of the SM in the CS-4 DFP.

Figure 2.21 is somewhat simplified with respect to the standard. In

reality the standard describes two scenarios, one for H.323 and one for

SIP. For simplicity, Figure 2.21 collapses these views into one, and omits

FEs such as the CUSF, SMF, and SMAF that were already defined in CS-2

and CS-3.

CS-4 also includes protocols for the integration of telephony services

and Internet. The most important are the following:

◗ PINT: a protocol to set up IN calls from Web sites;

◗ SPIRITS: a protocol for Internet call waiting, a service that notifies

users connected to the Internet of incoming telephone calls.

68 Next Generation Intelligent Networks

Internet

SIPproxy

H.323gatekeeper

IN-IP gateway

SSF

SSF SM

SCF

SRF

SDF

Figure 2.21 CS-4 distributed functional plane (partial view).

5. See Sections 3.2.2, 3.2.3, and 3.2.4 for details on H.323 and SIP.

Page 47: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

The PINT and SPIRITS protocols were proposed by the IETF. We will

study them in detail in Chapter 3.

While the expectations for CS-4 were high, in reality its standardiza-

tion has been slow and cumbersome. The industry has been unable to

come up with an IN that provides simple models for Internet, mobile net-

works, and object-oriented programming. Instead the CS-4 specifications

have been an attempt to stuff more functionality into an already overly

complex model.

The IN model begins manifesting itself as a telephony-centered cor-

set that resists the modeling of other types of communication and soft-

ware creation. Even during the specification of CS-4, the industry was

experimenting with new, alternative models for delivering value-added

services. Some analysts doubt whether CS-4 will ever make it into

products.

2.8.4 Beyond CS-4

It looks like CS-4 is the end of the line for IN standardization. The ITU has

not expressed any intentions to produce a CS-5 standard, no doubt a con-

sequence of the disappointing results of CS-3 and CS-4 standardization.

The Internet, mobile networks, liberalization of the markets, and

new programming technologies are challenging the IN concept. A sur-

prising number of ad hoc groups have sprung up in industry, not only to

try and solve technical problems but to push certain commercial and stra-

tegic interests. Examples of such industry groups and their initiatives are

as follows:

◗ JAIN, which promotes a Java framework for implementing value-

added services;

◗ Parlay, which produces interfaces for opening up network control to

third-party software;

◗ OSA, 3GPP, and ETSI’s proposed service architecture for third-

generation (3G) mobile networks;

◗ TINA, a complete telecommunications architecture built on distrib-

uted object-oriented middleware.

This book is dedicated to the forces that are shaping the next genera-

tion of network intelligence solutions, and in the chapters that follow we

will be taking a closer look at all of these new initiatives.

Intelligent networks 69

Page 48: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

In spite of industry initiatives, IN is alive and kicking and will remain

that way for the foreseeable future. Although limited in scope to teleph-

ony, IN is a proven concept. No matter how many new industry groups

come up with new ideas, there does not appear to be a satisfactory alter-

native to IN, at least for good old telephony.

2.9 Implementing IN

So far we have been investigating the definition of IN as it appears in the

standards. But what do the products based on these standards actually

look like? How do Lucent, Alcatel, Ericsson, and other telecommunica-

tions manufacturers implement the IN standards? And is it possible to

connect an SSP from one manufacturer to an SCP from another?

In this section we will consider a practical example: the Alcatel IN

platform. The choice of Alcatel is arbitrary; we could have chosen any

other manufacturer’s product. The choice is simply motivated by the fact

that Alcatel’s product offer is complete, state-of-the-art, and typical of IN

products on the market.

2.9.1 Alcatel IN

Alcatel, like most manufacturers, does not have a single IN product, but a

line of products that can be configured into many different IN configura-

tions. Alcatel’s IN uses hardware and software that is commercially avail-

able from third parties: Compaq and Sun processors, Unix operating

system, and Oracle database.

An example Alcatel SCP configuration is shown in Figure 2.22. This

is a typical configuration sold to customers with high traffic require-

ments, although if necessary the SCP can be scaled up even further.

The Alcatel SCP can consist of several machines. A typical SCP con-

figuration consists of two front-end processors (FEPs) and two to four

back-end processors (BEPs). The FEPs are the machines that terminate

the SS7 connections and run the SS7 protocols. They are effectively SS7

signaling points.

The BEPs run the actual service software and can be considered the

heart of the SCP. The FEP-BEP configuration was chosen for three

reasons:

1. Performance. Separating the SS7 protocol processing from the serv-

ice processing gives the configuration better performance. The

70 Next Generation Intelligent Networks

Page 49: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

FEPs can also balance the load between BEPs, thus avoiding the

possibility that the machines will become overloaded.

2. Scalability. If you need more processing power, you simply add a

BEP.

3. Reliability. The FEPs and BEPs are always paired for redundancy. If

a machine goes down, the other still guarantees that the system

continues functioning.

The FEPs and BEPs are interconnected by a fast Ethernet, which can also

be duplicated to ensure system reliability. The BEPs contain a database

that is kept completely in memory for reasons of performance. The data-

bases of the BEPs are synchronized periodically with a master database

on disk, which resides in the SMP. The BEPs can be synchronized

between each other by a memory channel, a fast connection that allows

memory to be shared among machines.

Intelligent networks 71

BEP BEP BEP BEP

FEP FEP

SS7 network

DB

Ethernet

Memory channel

Service control point

Figure 2.22 Alcatel SCP architecture.

Page 50: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

When the IN platform is deployed, the SCPs are usually deployed in

mated pairs in hot switchover mode. In other words, if one of the two

SCPs goes down, the other automatically takes over. It is easy to imagine

that such an IN platform can become very costly: Each SCP can consist of

several physical machines plus software and infrastructure.

Alcatel offers a range of smaller configurations for different needs.

The Alcatel Service Node is intended for the smallest operators and con-

tains all the IN functions in a single physical box: The SSF, SCF, SMF,

SDF, and SRF are colocated in one physical node.

Alcatel also sells intermediate platforms in which the SCF, SMF, SDF,

and SRF are colocated in the same machine, but separate from the SSF.

Figure 2.22 corresponds to the full IN solution: SSF, SCF, SMF are all

separate machines.

These different configurations actually run the same software; they

differ only in processing power. It is possible to use the same services

developed, for example, for the service node and run them on the full IN

platform discussed above, and vice versa. This allows operators to grow

with their markets without having to reimplement services.

The Alcatel IN platform includes an SCE for producing service logic

programs from SIBs. Figure 2.23 shows a screen shot of this SCE: It offers

a palette of SIBs and a work area in which the service creator can drag

and drop SIBs and connect them together.

72 Next Generation Intelligent Networks

Figure 2.23 Screen shot of the Alcatel SCE.

Page 51: Contents Intelligent networks - Instytut …mareks/ute/in-zuidweg.pdfIntelligent networks As the majority of switches became digital in the 1980s, vendors and operators saw that, like

The Alcatel SCE (A8695) currently includes more than 100 SIBs,

many more than the 14 specified in the CS-1 standard. Many of these

SIBs represent functionality that can be reused in different services (for

example, time- or origin-dependent routing), but for which no basic SIB

exists in CS-1. This strongly illustrates the need for HLSIBs (see Section

2.7.2) that can be composed from more elementary components.

Like many other manufacturers, Alcatel effectively splits the service-

creation function in two levels: service engineering and service customi-

zation. The screen shot shown in Figure 2.23 comes from the service

engineering tool: This tool is normally only used by skilled engineers who

know about the network. The service customization tool allows operators

to tune their services and can be used by nonspecialists. It lets the user

decide how to complete or filter a call depending on its origin, the dialed

number, date, and time, but it does not allow the creation of new serv-

ices. Alcatel calls this tool the light SCE.

Other manufacturers, such as Fujitsu, Ericsson, Lucent, Nec, Nokia,

Nortel, Siemens, Telcordia, and others, offer similar IN platforms. Most of

these share similar characteristics, especially when it comes to the SCE:

Most offer rich palettes of tens or even hundreds of SIBs. There is now

also a growing business of smaller manufacturers that build service nodes

and IN platforms, like Teligent (Sweden) and Comverse (the United

States).

Recently, Alcatel began using the name Open Service Platform (OSP)

for its IN product line, and the company is adding new components that

are not exclusively IN. An important extension is the Parlay-OSA6

gate-

way, which opens the platform to third-party service provisioning. This

move is typical (many other vendors are doing the same) and shows that

IN CS-3 and CS-4 have failed to keep up with the industry’s requirements.

2.9.2 Multivendor IN products

In theory it is possible to connect an SSP from one manufacturer (for

example, Lucent) that speaks standard INAP to an SCP from another

manufacturer (for example, Nokia). Unfortunately, in practice this is not

the case.

Although the syntax of INAP was unambiguously defined in the IN

standards, there was much confusion about how to interpret the mean-

ing of the different messages. Many manufacturers also tried to make

Intelligent networks 73

6. More about Parlay and OSA can be found in Chapter 5.