Upload
kamaldeep-singh-dhanota
View
214
Download
0
Embed Size (px)
Citation preview
7/29/2019 In Overview
1/226
Lucent Technologies ProprietaryThis document contains proprietary information of
Lucent Technologies and is not to be disclosed or usedexcept in accordance with applicable agreements
Copyright 1998 Lucent TechnologiesUnpublished and Not for Publication
All Rights ReservedPrinted in U.S.A.
Issue 8.2May 1998IN1000
Intelligent Network Overview
STUDENT GUIDE
7/29/2019 In Overview
2/226
Lucent Technologies ProprietarySee notice on first p age
NoticeEvery effort was made to ensure that the information in this document was complete and accurate at the time
of printing. However, information is subject to change.
Trademarks1A ESS and 4ESS are trademark of Lucent Technologies, Inc.5ESS is a registered trademark of Lucent Technologies, Inc.ANS is a registered trademark of Lucent Technologies, Inc. in the United states and other countries.BaseWorX is a trademark of AT&T.BSD is a trademark of Berkeley Software Design, Inc.Centronics is a registered trademark of Centronics Data Computer Corporation.Comsphere is a registered trademark of AT&T.DiskSuite is a trademark of Sun Microsystems, Inc.DMS is a registered trademark of Northern Telecom Limited.EMX is a registered trademark of Motorola, Inc.ESS is a trademark of Lucent Technologies, Inc.Ethernet is a registered trademark of Xerox Corporation.MAXELL is a trademark of Maxell Corporation of America.MIPS is a registered trademark of MIPS Computer Systems, Inc.NetMinder is a registered trademark of Lucent Technologies in various countries outside the United StatesNonStop V+ is a trademark of Tandem Computers, Inc.
ODIN is a trademark of Lucent Technologies, Inc.OPEN LOOK is a registered trademark of Novell, Inc.OpenWindows is a trademark of Sun Microsystems, Inc.ORACLE is a registered trademark of Oracle Systems Corporation.Pentium is a registered trademark of Intel Corporation.PostScript is a registered trademark of Adobe Systems, Inc.SEAS is a trademark of Bell Communications Research, Inc. (Bellcore)Solaris is a registered trademark of Sun Microsystems, Inc.Solstice is a trademark of Sun Microsystems, Inc.SPARC is a registered trademark of SPARC International, Inc.SPARCompiler is a trademark of SPARC International, Inc., licensed exclusively to Sun Microsystems, Inc.SPARCworks is a trademark of SPARC International, Inc., licensed exclusively to Sun Microsystems, Inc.SQL Forms is a registered trademark of Oracle Systems Corporation.SQL Plus is a registered trademark of Oracle Systems Corporation.StarServer is a registered trademark of Lucent Technologies, Inc.
Sun and SunOS are trademarks of Sun Microsystems, Inc.SunPro is a trademark of Sun Microsystems, Inc.SunSoft is a trademark of Sun Microsystems, Inc.Sun Microsystems is a registered trademark of Sun Microsystems, Inc.UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open
Company Limited.X Window System is a trademark of the Massachusetts Institute of Technology.
Ordering InformationTo order this document,
s in countries outside the U.S. and Canada, call your Lucent Technologies Market Manager
7/29/2019 In Overview
3/226
Issue 8.2 i
Lucent Technologies ProprietarySee notice on first p age
COURSE DESCRIPTION
This course is designed to provide introductory information on the Lucent Tech-nologies Intelligent Network. Students learn about services and call routing fea-tures provided by the network. Students are introduced to the major elementswithin the network:
s Signal Transfer Point, Service Control Point (SCP)
s Signalling Transfer Point (STP)
s Service Management System (SMS)
s Service Creation Environment (SCE).
Students are also introduced to Common Channel Signalling and call routingthrough the Intelligent Network.
Particular emphasis is given to the way in which services and service featureswork, giving students the broad IN background they will need when selling,building or maintaining services.
7/29/2019 In Overview
4/226
ii Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
COURSE OBJECTIVES
This course is designed to enable students to:s Understand the concepts of Intelligent Networks
s Understand the fundamentals of IN call processing
s Name the Lucent Technologies network elements that process calls.
s Describe the functions of the network elements.
s Describe Intelligent Network services and features, such as AdvancedRouting Services, Vir tual Private Network (VPN), Televoting and CallingCard. The service features that make up these services will be describedand students will be given a broad understanding of how the services andservice features work.
s Describe the role that Common Channel Signalling plays in processing anIN call.
s Describe Call routing procedures common to all Intelligent Network calls.
7/29/2019 In Overview
5/226
Issue 8.2 iii
Lucent Technologies ProprietarySee notice on first p age
TARGET AUDIENCE
This course is designed for anyone new to the Lucent Technologies IntelligentNetwork and anyone who needs a general overview of how it works.
7/29/2019 In Overview
6/226
iv Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
COURSE CONTENTS
Lesson 1 INTELLIGENT NETWORK OVERVIEWLesson 2 IN TELLIGENT NETWORK SERVICES
Lesson 3 NETWORK ELEMENTS
Lesson 4 IN CCS NO. 7 OVERVIEW
Appendix A INAP MESSAGES
Appendix B GLOSSARY
7/29/2019 In Overview
7/226
Issue 8.2 1-i
Lucent Technologies ProprietarySee notice on first p age
Contents
1
INTELLIGENT NETWORKOVERVIEW
Lesson Overview 1-1
s Purpose 1-1
s Objectives 1-1
s Documentation 1-2
Users and Providers of IN Services 1-5
s Users and Providers of IN Services 1-5
Advantages of IN 1-7
s Advantages to the network provider 1-7
Advantages to the service provider 1-9
Advantages to the service subscriber 1-11
Advantages to the IN user 1-13
IN Network Elements 1-15
Brief History 1-17
IN Call Example 1-19
Functional Model 1-21
Implementation of The Functional Model 1-23
The Basic Call State Model 1-25
The BCSM Including Detection Points 1-27
7/29/2019 In Overview
8/226
1-ii Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
s Types of Detection Points 1-29
Arming Static Detection Points 1-31
s Static DP Criteria Table 1-31
IN Cal l Example Using the Basic Cal l S tate Model 1-33
Service Control Function 1-35
s Definition 1-35
SCP Deployment 1-37
s Mated Pairs 1-37
s Stand Alone SCPs 1-37
IN Call Example Using the SCF 1-39
Service Management Function 1-41
s Definition 1-41
s Functions 1-41
Service Creation Environment Function 1-43
s Definition 1-43
s Functions 1-43
s Service Packages 1-43
Service Creation 1-45
Example Decision Graph 1-47
The SRF 1-49
s Definition 1-49
s Functions 1-49
Configuration 1-51
Operations Support Systems 1-53
s Functions 1-53
Summary 1-55
NOTES 1-56
Exercise 1-57
7/29/2019 In Overview
9/226
Issue 8.2 1-1
Lucent Technologies ProprietarySee notice on first p age
1
INTELLIGENT NETWORKOVERVIEW
Lesson Overview
Purpose This lesson provides a high level overview of the Intelligent Network asdefined by the ITU-T and ETSI standardization bodies. The following itemsare discussed:
s The equipment needed for an Intelligent Network
s The Intelligent Network functional model
s The concept of triggering IN calls
s Intelligent network building blocks
Objectives On completion of this lesson participants will be able to:
s state the advantages of Intelligent Networks
s understand which types of call are processed by an intelligent net-work
s understand the fundamentals of IN call processing
s define the IN functional model and its implementation
s define the concept of a detection point
s define the concept of a building block
s list the hardware and related equipment used in an Intelligent Net-work.
s define the IN functional model and its implementation.
s define the purpose of the SCF.
s define the function of Call Gapping.
s define the function of Mated Pairs.
7/29/2019 In Overview
10/226
1-2 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
s define the function of the SCEF.
s define the purpose of the SMF.
s define the function of the SRF.
s define the purpose of a system alarm.
Documentation s ITU-T Recommendations Q.121x series
s ETSI Specification ETS 300 374-1
7/29/2019 In Overview
11/226
Issue 8.2 1-3
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
7/29/2019 In Overview
12/226
1-4 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-1. Users and Providers of IN Services
s Network Provider
s Service Provider
s Service Subscriber
s Calling Subscriber,
Calling Party or A-Party
s Called Party or B-Party
7/29/2019 In Overview
13/226
Issue 8.2 1-5
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Users and Providers of IN Services
The Intelligent Network (IN) is an extension to the existing telephone network.This network is organized so that telephone calls received by the IN are inter-rupted to query a database in order to determine what to do with the call. Thecall can then be re-routed based on a number of predefined conditions such astime of day or day of the week. Alternatively, an announcement can be played orinformation can be collected from the caller.
Users and
Providers of IN
Services
Throughout this course the following terms are used to refer to the users andproviders of the Intelligent Network:
s Network Providerthe company that is responsible for the telephony network planning andmaintenance (commonly known as the PTT (Post, Telephone and Tele-graph).
s Service Providerthe company or institution that purchases IN services from the networkprovider and provides it to Service Subscribers.
s Service Subscriberthe company, institution or individual that purchases IN services from theservice provider. For some services, such as Calling Card, the servicesubscriber is an individual. For others, such as Televoting or VPN, it is anorganization.
s Calling Subscriber, Calling Party or A-Partythe person who dials the IN number.
s Called Party or B-Partythe person who answers the call.
The Calling Party and Called Party may collectively be referred as users.
7/29/2019 In Overview
14/226
1-6 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-2. Advantages of IN
Advantages to the network provider:
s Additional network traffic
s Higher call completion rates
7/29/2019 In Overview
15/226
Issue 8.2 1-7
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Advantages of IN
Because of the structure and implementation of the IN in the existing telephonynetwork, there are advantages to both users and providers of the IN:
Advantages to
the network
provider
IN services can significantly increase the revenue generating potential of thepublic telephone network. Revenue derived from the IN falls into two general cat-egories:
s Additional network trafficIN services stimulate the use of the telephone network for new applica-tions. This results in an increase in the number of telephone calls made.
s Higher call completion ratesIN services target calls to destinations where they are most likely to be
answered. The result is an increase in the number of telephone calls forwhich revenue is collected.
7/29/2019 In Overview
16/226
1-8 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-3. Advantages to the Service Provider
Advantages to the service provider:
s Flexible and rapid deployment of newservices
s Wide range of services
s New tariffed features
7/29/2019 In Overview
17/226
Issue 8.2 1-9
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Advantages to the service provider
s
IN gives service providers the flexibility to create, customize and/ordeploy new services rapidly.
s IN supports a wide range of advanced services, for example CallingCard, Televoting.
7/29/2019 In Overview
18/226
1-10 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-4. Advantages to the Service Subscriber
Advantages to the service subscriber:
s Flexible charging
s Call queuing
s
Flexibility in who maintains the database
7/29/2019 In Overview
19/226
Issue 8.2 1-11
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Advantages to the service subscriber
s
Due to the flexible charging capabilities of IN the service subscriber canchoose who pays for a call:
the calling party
the called party
the service subscriber
a combination of all three
For example, in the freephone service the called par ty, who happens to bethe service subscriber, pays. In the VPN service, the service subscriberpays.
s IN has the ability to queue calls within the IN network. This allows the ser-
vice subscriber to save personnel costs by queuing calls to a small num-ber of personnel.
s IN allows the service subscriber to maintain their own data in the IN data-base, as well as allowing the service provider to maintain the database forthe service subscriber. If the service subscribers data is dynamic it is dif-ficult for the service provider to keep up with all the changes in the data-base so it is better for the service subscriber to maintain the database.
s Using IN it is possible to re-route calls that are busy or not answered, byrouting to an alternative destination.
s The service subscriber also gains all the advantages described for theservice provider.
7/29/2019 In Overview
20/226
1-12 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-5. Advantages to the IN User
Advantages to the IN user:
s Ease of access
s Facilities of advanced services
7/29/2019 In Overview
21/226
Issue 8.2 1-13
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Advantages to the IN user
s
Easy access to service subscribersThe service providers can use one nationwide telephone number and re-route calling subscribers to the actual telephone number of this provider. Ifthe service provider has a number of offices throughout the country, theactual re-routing number can vary depending on for example the geo-graphical location of the calling subscriber.
s Facilities of advanced servicesThe value of IN is the advanced services it makes available to callers.This is how users perceive the network.
7/29/2019 In Overview
22/226
1-14 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-6. IN Network Elements
SCP
SCP
SSP SSP
SMS
SCE
Public Telephone Network
CCS CCS
Legend:
CCS
SCP
SMS
SSP
= Common Channel Signaling
= Intelligent Peripheral
= Service Control Point
= Service Management System
= Service Switching Point
IP
IP
SCE = Service Creation Environment
STP
STP = Signaling Transfer Point
= CCS No. 7 Signaling Link
= Voice Trunk
X.25
X.25 = ITU-T X.25 Recommendation
CCS
7/29/2019 In Overview
23/226
Issue 8.2 1-15
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
IN Network Elements
IN has been in use for many years and is integrated in various ways within thepublic telephone network. Figure 1-6 is an example showing a telephony net-work supporting IN services. The network consists of several network elements.An explanation of these network elements can be found in the following para-graphs.
SSP - Service Switching PointThe SSP is a telephone exchange that recognizes IN calls. If a call is an IN call,the call is temporarily suspended, and extra information for the call is queriedfrom the SCP.
SCP - Service Control PointThe SCP controls the database that is queried by the SSP for call information. It
uses it to decide where the call should be routed to.
IP - Intelligent PeripheralThe IP is used when interaction between the SCP and the caller who dialed theIN telephone number is needed. It can also interact with the calling party. Theinteraction may be either via the SSF or direct.
According to the ITU-T specification, the IP is capable of playingannouncements, collecting digits, repeating the collected digits, recognizingvoice and generating tones. The functions actually implemented depend on thesupplier of the IP equipment.
SCE - Service Creation EnvironmentThe creation of new IN services or modification of existing services is done onthe SCE. The created services are downloaded to the SCP.
SMS - Service Management SystemThe SMS is used to provision services on the SCP. It provides a platform foradministration and backup of the IN services.
STP - Signaling Transfer PointThe signaling transfer point is often used as a connection between the differentSSPs and SCPs. The STP provides the capability of transferring signalingmessages between the SSP and SCP.
7/29/2019 In Overview
24/226
1-16 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-7. Brief History
Network element nomenclature mapping
Mapping old and new
network element names
SCP NCP
SSP ACP
IP NSCX
7/29/2019 In Overview
25/226
Issue 8.2 1-17
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Brief History
One of the earliest needs for intelligent services was the use of freephone calls.Whenever a freephone number was dialed the number was routed to its destina-tion without the calling party having to pay charges for the call. The intelligenceneeded to recognize a freephone number was available in one of the exchangesused to route the call.
In later years the need for additional services became evident. The solution tothis problem was the introduction of one of the earliest intelligent networks. Theexchange that recognized an IN call was called the Action Control Point (ACP).The ACP was able to re-route calls either using the information available withinits own database or using information available in a separate, centralizeddatabase called the Network Control Point (NCP). If interaction between theNCP and the calling party was needed, the Network Services Complex
(NSCX) was used. Whenever the ACP, NCP or NSCX needed to interactsignaling messages were sent. Three of the most commonly used signalingprotocols between the ACP and NCP were DCIS6, ECIS6 and CCS No. 7.
The New Generation IN covered in this course is defined by the world standardsorganization ITU-T (International Telecommunications Union TelecommunicationStandardization Sector), together with the European standards organizationETSI (European Telecommunications Standards Institute). This new version ofIN does not use the names ACP, NCP or NSCX. The the SSP has replaced theACP, the SCP has replaced the NCP and the IP has replaced NSCX.
Through the years many terms have been introduced to explain the services
provided by IN. A few of these services are listed and briefly described below:
s Basic Freephone ServiceThe Basic Freephone service allows a service subscriber to have an INnumber that routes all calls to one destination. The service subscriberpays for calls. Destination numbers are available on the exchange itself.The SCP is not queried to re-route these calls.
s Single Destination Number ServiceThe Single Destination Number Service allows a service subscriber tohave an IN number that will be re-routed by the SCP to one single finaldestination.
s Advanced Freephone Service
The Advanced Freephone Service allows a service subscriber to have anIN number re-routed by the SCP to one of several different destinations.The number to which this call is re-routed depends on, for example, thetime of day, day of the week, date, or the calling subscribers geographicallocation.
7/29/2019 In Overview
26/226
1-18 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-8. IN Call Example
SCP
SSP
Calling Subscriber Service Provider
PBX
CP
34
0800-123123
Called N umber
Request for InformationRe-Routing
SSP
Information
Public Telephone N etwork
0800-123123
1
25
6
STP
022-4566543
PSTN N umber
7/29/2019 In Overview
27/226
Issue 8.2 1-19
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
IN Call Example
In a country-wide advertising campaign an insurance company is giving a 10%discount to new customers. The company tells everybody to dial 0800-123123and sign up as a customer.
The insurance company has requested this telephone number from the serviceprovider. The network provider has to translate the 0800-number to the actualtelephone number of the insurance company (022-4566543).
In Figure 1-8 an example is given of a person who calls the insurance company.The call is divided into the following stages:
1. The calling subscriber dials 0800-123123.
2. The call is routed through the Public Switched Telephone Network (PSTN)
and sent to an exchange where more is known about this 0800-number(this exchange is the SSP).
3. The SSP exchange recognizes the call as an IN call and queries the SCPfor more information.
4. The SCP responds by sending re-routing information (022-4566543) tothe SSP.
5. After receiving this data the SSP connects the calling subscriber to thenew received number using the PSTN.
6. The PSTN connects the call to the Private Branch Exchange (PBX) of theinsurance company.
The actual call is connected from the PSTN to the SSP and back again.
7/29/2019 In Overview
28/226
1-20 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-9. Functional Model
SSF
CCF
SCF
SSF
CCF CCF
SRF
SMF
SCEF
7/29/2019 In Overview
29/226
Issue 8.2 1-21
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Functional Model
ITU-T has defined a standard functional model for the Intelligent Network. Thediagram opposite shows the functional entities and the relationships betweenthem. The terminology of this model is often used in IN system documentation.
The functional entities are as follows:
s CCF (Call Control Function)This provides the basic call and connection handling in the exchange. Itestablishes, manipulates and releases a call. It recognizes IN calls andenables the SSF (see below) to take over processing of the call. It repre-sents the functionality of the traditional switch.
s SSF (Service Switching Function)The SSF enables interaction between the CCF and the SCF. It recognizes
service control triggers, through which it recognizes IN calls. It also man-ages signaling between the CCF and the SCF.
s SCF (Service Control Function)The SCF directs call control functions during the processing of an IN call.It contains the IN service call processing logic (or service provider plan)stored in centralized databases which specifies how to handle an IN ser-vice request. It interacts with the SSF and the SRF to obtain information(service or user data) required to process an IN call.
The SCF and the SSF have a master-slave relationship; the SCF is themaster and the SSF is the slave.
Sometimes the SCF is split into two functional entities:
SDF (Service Data Function)the database
SCF (Service Control Function)Call processing and other logic
s SRF (Specialized Resource Function)The SRF is used whenever an IN call requires direct interaction with thecalling party in the speech path. It contains the logic and processingcapability to send, receive and convert information. All SRF actions for agiven call are determined by commands received from the SCF via theSSF. Examples of SRF actions are:
The playing of a standard or customized announcement The collection of digits requested in an announcement (post-dial-
ing digits)
s SCEF (Service Creation Environment Function)This function enables service developers to develop service logic.
s SMF (Service Management Function)This function allows the provision and distribution of databases to theSCF equipment.
7/29/2019 In Overview
30/226
1-22 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-10. Implementation of the Functional Model
SCP
SSP SSPIP IP
P S T N
SCE
SMS
SCEF
SMF
SCF
SSF
CCF
SRFSRFSSF
CCF
7/29/2019 In Overview
31/226
Issue 8.2 1-23
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Implementation of The Functional
Model
The functional model defines the entities in terms of functions and not in terms ofphysical network elements. The network elements which typically correspond tothe different functional entities are as follows:
SCF SCP (Service Control Point) or NCP (Network Control Point)
SRF IP (Intelligent Peripheral)
CCF/SSF SSP (Service Switching Point) or ACP (ACtion Point)
SCEF SCE (Service Creation Environment)
SMF SMS (Service Management System)
More than one of these functional entities may be implemented on one physicalnetwork element. Note that an IN need not consist entirely of equipment from asingle vendor.
An example network implementation of the IN functional model is shown in thefigure opposite. The SSFs terminate trunks. They communicate with the SCF viaa Common Channel Signaling (CCS) No. 7 network, using INAP (IntelligentNetwork Application Part) message.
7/29/2019 In Overview
32/226
7/29/2019 In Overview
33/226
Issue 8.2 1-25
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
The Basic Call State Model
Any telephone call goes through a number of different stages, called statesorPoints-in-Call, when it enters or originates in a CCF. For the ITU-T specificationeach originating call follows the Basic Call State Model (BCSM). This is shownin Figure 1-11 and has the following states (the names in italics are the ITU-Tterms, and those in parentheses are Lucent terms):
1. O_Null and Authorize_Origination_Attempt(Idle state)This is the normal, on-hook state, when no call is being made. This callstate is left when an exchange trunk or line is activated as a result of a callor service request. For ISDN calls line activation implies the receipt of aSETUPmessage. For CCS No. 7 it implies the receipt of an InitialAddress Message(IAM).
2. Collect_Information(Digit collection)
The digits sent by the originating party are being collected. This call stateis left when all digits have been received, the originating party abandonsthe call, or an error occurs during digit collection (for example, a time-outoccurred).
3. Analyse_Information(Digit analysis)The dialed digits are being analyzed. This call state is left when digit anal-ysis is successful, the originating party abandons the call, or an erroroccurs during digit analysis (for example, an invalid dial string is received).
4. Routing and Alerting(Routing and Terminal Allocation)RTA (Routing and Terminal Allocation) is performed, i.e. the call is routedto the B-Partys phone. This call state is left when:
the terminating party goes off hook
the originating party abandons the call
the RTA fails (for example, due to network congestion),
authority of the originating party to place the call is denied
the called party is busy
the called party does not answer the call within a specified time.
5. O_Active(Active state)The call is accepted and answered by the terminating party, and the twoparties are talking to each other. This call state is left when a disconnect
indication (for example, on hook, Q.931 disconnect message or CCS No.7 release message) is received from the originating or terminating party,or a connection failure occurs.
7/29/2019 In Overview
34/226
7/29/2019 In Overview
35/226
7/29/2019 In Overview
36/226
7/29/2019 In Overview
37/226
7/29/2019 In Overview
38/226
1-30 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Conditionally armed static DPs:
s Static DP criteria:
Received number
Calling party number
Called party nature of address
Cause value
Class of service
ISDN bearer capability
s Criteria assigned on:
Individual basis
Group basis
Exchange basis
Unconditionally armed static DPs:
s No Static DP criteria
s Assigned on:
Individual basis
Group basis
Exchange
Figure 1-14. Arming Static Detection Points
7/29/2019 In Overview
39/226
7/29/2019 In Overview
40/226
1-32 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-15. IN Call Example Using the Basic Call State Model
Dynamic DP
Arm
DP5-R
3. Analyse_Information
Instruction:
request for
DP5-R
SSFCCF SCF
Service
LogicStatic DP
DP3
Trigger request
instructions
DetectionPoint
Processing
New Number
Event request
instructionsDP5
4. Route & Alerting
DP1
DP2
1. O_Null & Auth._Orig._Attempt
2. Collect_Information
3. Analyse_Information
DP3
7/29/2019 In Overview
41/226
Issue 8.2 1-33
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
IN Call Example Using the Basic
Call State Model
In a previous section an example scenario was given for an IN call to an insur-ance company. In Figure 1-15 the same example is used and expanded. Theinsurance company wants to reroute calls to another destination if the originalnumber is busy. The IN call in Figure 1-15 uses the Basic Call State Model,Static and Dynamic Detection Points.
The call flow is given in steps 1 to 8:
1. The originating subscriber dials an 0800-number. The call is routed to anSSF.
2. The CCF receives the call as an incoming call.
3. At the moment this call arrives, authorization (BCSM O_Null andAuthorize_Origination_Attempt) checks are done. If these checks do notfail the CCF checks if DP1 is armed. If DP1 is not armed the call contin-ues.
4. Next the CCF starts collecting the digits dialed by the originating sub-scriber (BCSM Collect_Information). If enough digits are received theCCF checks if DP2 is armed. If DP2 is not armed the call continues asnormal.
5. When the CCF has received enough digits, the digits can be analyzed(BCSM Analyse_Information). If in the CCF DP3 has been conditionallyarmed so as to cause the CCF to interrupt all calls that start with the digits
0800 and request further instructions from the SCF, then it will send amessage to the SCF.
6. The message is received by the SCF, the SCF retrieves the correct desti-nation number from its database. To ensure that the call is answered theSCF can dynamically activate detection point 5 (busy). The new tele-phone number and a request to dynamically arm the detection points aresent back to the CCF.
7. The request to arm detection point 5 causes the CCF to arm the DP forthis particular call (dynamic). The new received number causes the CCFto return to the Analyse_Informationcall state.
8. The new number is analyzed and routed (BCSM Routing and Alerting) to
its final destination. If the destination is busy this causes DP5 to be fired.The CCF sends a message to the SCF again, now indicating that the userwas busy. The SCF accesses the database again to determine what to donext (play an announcement, re-route the call again, disconnect). Steps 6to 8 can be repeated until a telephone number has been found which isnot busy.
7/29/2019 In Overview
42/226
1-34 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-16. Service Control Function
Functions of the SCF:
s Routing of calls
s Collecting measurements
s Sending of status and service maintenancemessages to the SMF
s Network management controls
s Sending of billing information to the SSF
7/29/2019 In Overview
43/226
Issue 8.2 1-35
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Service Control Function
Definition The primary purpose of the Service Control Function is to serve as the networkscall routing facility. It contains service control login and a database which storesService Subscriber Records that determine routing for Intelligent Network Ser-vices.
Other functions are:
s Traffic and network measurements are collected and sent to the SMF.
s Status information and service maintenance messages are sent to theSMF.
s The placement of network management controls on the dialed number orthe number of the calling party, known as the Calling Line Identity (CLI).These controls are sent to the SSF to tell it to limit the number of incomingcalls requiring the SCF. This is called call gapping. The purpose of callgapping is to prevent the SCF from becoming overloaded. This is done byreducing the number of queries sent to it.
s Sending of Billing Data to the SSF
The SCF sends billing data to the SSF. The data is recorded at the SSFand later processed before being sent to the billed party.
7/29/2019 In Overview
44/226
1-36 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-17. SCP Deployment
SCP
STP
SSP
SCP
STP
SSP
SCP
STAND ALONE
MATED PAIRS
STP
SSP
STP
SSP
Primary SCP:0800-1000 to 0800-4999
Secondary SCP:
0800-5000 to 0800-9999
Primary SCP:0800-5000 to 0800-9999
Secondary SCP:
0800-1000 to 0800-4999
A B
0800-1000 to 0800-9999
7/29/2019 In Overview
45/226
7/29/2019 In Overview
46/226
1-38 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-18. IN Call Example Using the SCF.
3. Analyse_
Routing
SSFCCF SCF
DP3
Trigger request
instructions
Detection
Point
Processing
New Number
4. Route & Alerting
DP1
DP2
1. O_Null & Auth_.Orig._Attempt
2. Collect_
3. Analyse_
DP3
ServiceLogic
Information
Information
Information
RequestInstructions 09:00
-17:00
17:00-
09:00
Main
office
information
Local
office
Whattimeis it?
01666832967
01666832186
7/29/2019 In Overview
47/226
Issue 8.2 1-39
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
IN Call Example Using the SCF
The SCF in an Intelligent Network contains a database which stores the routinglogic for the service and the service subscribers call routing plans. Dependingon the type of service, the call routing plans contain one or more possible routingdestinations. Service features in effect at the time the call routing plan wasaccessed determine how the call is routed. For example, if the Time Of Day ser-vice feature is in effect, the SCF will check the time of day and route the callaccording to the time the call is made. After the SCP has accessed the call rout-ing plan, it sends the routing instructions to the SSF.
The call flow is as in Figure 1-18 and will not be repeated here. The caller hasdialed a freephone number, 0800-123123, and this has been passed to the SCFas already described. The following explanation only describes what takes placein the SCF.
1. The message is received by the SCF. The SCF will find the SubscriberRecord for the called party in its database. This will contain the Call Rout-ing Plan for the insurance company subscribing to the Freephone service.
2. The SCF will check the time of day according to the logic in the Call Rout-ing Plan. In this example, it will route the call to the local office on 01666-832967 between the hours of 08:00 to 17:00, and to the main office on01666-832186 at all other times.
3. The number is sent back to the SSF and call processing continues asdescribed in the preceding example.
7/29/2019 In Overview
48/226
1-40 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-19. Service Management Function
Functions of the SMF:
s Applying changes to service data
s Modification and downloading of service logic
s Collecting measurements
s Receiving and logging unsolicited status and servicemaintenance messages from the SCP
s Producing reports
s Service data audits
7/29/2019 In Overview
49/226
Issue 8.2 1-41
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Service Management Function
Definition The Service Management Function (SMF) is responsible for provisioning andmanaging Services created by the Service Creation Environment and download-ing services and service-related data to the Service Control Point(s). It holds themaster copy of all service-related databases.
The SMF is not involved in call processing.
Functions The primary purpose of the SMF is to provide the information needed to install,configure and manage new services on the SCF. This involves:
s Applying changes to global (service-wide) or subscriber data and distrib-uting the changed data to all SCFs that require it. This data includes ser-
vice logic which is specific to individual subscribers.
s Downloading service logic onto all SCFs that require it.
s Collection of service subscription measurements.
s Producing reports on these measurements. The format and content ofthese reports are under the control of the user.
s Receiving and logging unsolicited status and service maintenance mes-sages from the SCF. For example, if a caller changes their PIN, thechange will be done in the SCF first, and must then be sent to the SMF.
s Retrieving provisionable data for comparison of the data on the SCF andon the SMF. These comparisons are called service data audits.
In addition to its facilities for managing subscriber and service data, theSMF also includes a data collection function for accumulating and report-ing on service subscription measurements gathered by a network ele-ment.
7/29/2019 In Overview
50/226
1-42 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-20. Service Creation Environment Function
FUNCTIONS OF THE SCEF:
s Creation and modification of service logic
s Downloading of service logic to the SMS
7/29/2019 In Overview
51/226
Issue 8.2 1-43
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Service Creation Environment
Function
Definition The Service Creation Environment Function (SCEF) is a network element usedto create and modify network database services, for example the Freephone ser-vice. The SCEF allows Lucent Technologies, customer personnel or a third partyvendor to create and customize IN services rapidly.
Functions The purpose of SCEF is to create service packages (SPs) and to send them tothe SMF for deployment to one or more SCFs on which they will provide service.A Service Package is a container for one or more IN services.
Service Packages A Service Package contains:
s service logicThis is the program code which implements the call processing requiredof the service, and all the operational and maintenance functions associ-ated with the service, such as collection of measurements and statistics.
s service data and service data schemaService data is the data which is needed to run the service. It includesdata which is common to all subscribers and data which is specific to indi-vidual service subscribers. The service data schema specifies the struc-ture of the service data.
s specification of which data and statistics to collect during service execu-tion.
The SP contains this information for one or more services, such as theAdvanced Routing service. SPs allow a set of interactive services to beencapsulated into a single SP. A service within a service package can interactwith another service in same the SP. Services within one SP do not interact withservices in any other SPs.
Some of the benefits of this are:
s New SPs can be developed and updated independently of existing SPs.
s The deployment of a new SP to a network element does not interfere withthe execution of pre-existing SPs.
Multiple versions of the same service can coexist on the same network element.
7/29/2019 In Overview
52/226
1-44 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-21. Service Creation
LANGUAGES:
s Service Logic Language (SLL)
text-based programming language
s Decision Graph Language (DGL)
graphical language
standard building blocks
7/29/2019 In Overview
53/226
Issue 8.2 1-45
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Service Creation
The Lucent Technologies Service Creation Environment (SCE) provides servicedevelopers with tools and standard building blocks of functionality for program-ming network services. These tools include Graphical User Interfaces (GUIs),Application Oriented Languages (AOLs), and Service Independent BuildingBlocks (SIBs) that allow the service developer to work in the applicationdomain, focusing specifically on the task at hand rather than on the underlyingdetailed programming steps required to accomplish the job.
There are two AOLs:
s Service Logic Language (SLL)
s Decision Graph Language (DGL)
Typically, services are written using a combination of both.
The DGL part of an IN service is made up of a number of SIBs. Each SIBprovides some logic which controls the behavior of the service. For example,there are SIBs which control the routing of calls according to various criteria,such as the time of day, day of week, location of the caller etc. Others sendcharging information to the SSF. This logic is in the SCF.
Services are built up from SIBs using a graphical editor. SIBs are put together tocreate structures called Decision Graphs (DGs). The graphical editor is calledthe Enhanced Decision Graph Editor (EDGE).
Additional logic is written in a second AOL, called Service Logic Language(SLL). SLL is more like a traditional programming language, but containsfeatures specific to the writing of telephony services. It provides an efficientmeans of providing the logic needed to link the DGs together.
ITU-T Recommendation Q.1214 defines a set of standard SIBs. In addition, mostequipment providers define additional ones.
Lucent Technologies products
The minimum configuration for an SCE is one SUN SPARC to function as aserver and client workstation, and one PC compile server. A typical configuration
is one SUN SPARC to function as a server and client workstation, one PCcompile server, and one or more additional SUNs to function as clientworkstations.
7/29/2019 In Overview
54/226
1-46 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-22. Example Decision Graph
Root
Exit
Exit
Connect
Day_of_Week
Time_of_Day
other
other
Mon.-Fri.
0800-1700
SLL program
2
1
3
4
4
7/29/2019 In Overview
55/226
Issue 8.2 1-47
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Example Decision Graph
The decision graph shown opposite provides outgoing call screening. It onlyallows calls to be made between the hours of 08:00 to 17:00 on Mondays to Fri-days. At all other times, the call is disallowed and terminates to an announce-ment.
Logic in the SLL program has decided that Outgoing Call Screening is required.It therefore initiates the Outgoing Call Screening DG.
Each numbered box represents a SIB. The logic is as follows:
1. Check the day of the week
2. If it is a weekday, check the time of day
3. If it is between 8:00 and 17:00, connect the caller to the called party4. If either of these checks fails, disallow the call
7/29/2019 In Overview
56/226
1-48 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-23. The SRF
Functions of the SRF:
s Interact with the calling party, called partyand the SCF
s Play Announcements
s Collect Digits
s Voice Recognition
s Voice Back
7/29/2019 In Overview
57/226
Issue 8.2 1-49
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
The SRF
Definition The SRF (Specialized Resource Function) serves the SSF whenever an IN callrequires direct interaction with the calling party in the speech path. The SRFcontains the logic necessary to send, receive and convert information. All SRFactions for a given call are determined by commands received from the SCF.
Functions If the SCF needs interaction with the calling party or the called party, it requeststhe CCF to connect to the SRF. This request is sent via the SSF. Instructions asto what the SRF needs to do may be contained in the SCF request. If they arenot, then the SRF can request instructions directly from the SCF (but only if adirect link is available between the SCF and SRF). When the interaction is fin-ished a message is sent back to indicate this, and the connection between theSRF and the CCF is torn down.
The SRF has the following functions:
s Play AnnouncementsAn announcement can be used to inform the calling party that some eventhas occurred (for example: All lines are busy at the moment, please waitfor an operator) or to prompt the calling party to enter digits (for example:Please enter your calling card number followed by your Personal Identifi-cation Number).
If an announcement is used to prompt the calling party to dial digits, theSCF may allow the announcement to be interrupted. If the announcementis interruptible the calling subscriber is allowed to enter digits while the
announcement is still playing. At the moment a digit is entered theannouncement is stopped.
s Collect DigitsWhen the calling party has entered digits, the SRF checks whether thecorrect number of digits have been sent. If enough digits are entered theSRF sends these digits in a message to the SCF (using the SSF/CCF or adirect link).
s Voice RecognitionIf the SRF has voice recognition, the subscriber can speak to the SRFand the SRF translates the spoken digits to a digit string. For example, acaller is prompted for a PIN. The calling subscriber then speaks the digits
in the PIN. These are recognized and translated by the SRF to the actualdigits. The SRF then sends these digits in a message to the SCF (usingthe SSF/CCF or a direct link)
s Voice BackAfter all the digits have been entered by the calling party, the SRF canreplay the digits to the calling party. This allows the user to verify if thecorrect digits have been entered.
7/29/2019 In Overview
58/226
1-50 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Integrated SRF, CCF and SSF
Remote SRF Controlled by the SSF
Remote SRF Controlled by the SCF
Figure 1-24. Configuration
SRFSRFSSF
CCF
SCF
SSF
CCF
SRF
SSF
CCF
SCF
SSF
CCF
SRF
SSFCCF
SCF
SSFCCF
7/29/2019 In Overview
59/226
Issue 8.2 1-51
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Configuration
The SRF is designed for maximum flexibility, allowing the network provider todecide how many Intelligent Peripherals (IPs) are needed and where they shouldbe.
The top diagram on the page opposite shows an example of an SRF in the sameexchange as the SSF and CCF. This configuration is used when the SSP and theIP are combined. This is most likely if there is a lot of interaction between theSSP and the IP. If the SCF wants to communicate with the SRF this is doneusing the SSF and CCF.
The middle diagram on the page opposite shows an example where the SRFand SSF/CCF are not in the same exchange. This configuration still allows eachSSP to have its own IP, but as shown in the figure a number of SSPs can use
one IP. If the SCF wants to communicate with the SRF this has to be done usingthe SSF and CCF.
The bottom diagram on the page opposite shows an example where the SRFand SSF/CCF are not in the same exchange. The difference from the previousexample is that the SCF can communicate directly with the SRF without usingthe SSF. At the moment the SCF needs the SRF to interact with the customer,the SCF requests the SSF to connect to the SRF. As soon as the connection ismade, the SRF queries the SCF using the direct communication link to ask whathas to be done for this call.
The connection between the SRF and the CCF can be either Integrated
Services Digital Network (ISDN) or (Common Channel Signaling No. 7 (CCSNo. 7). If the SCF and SRF are connected CCS No. 7 signaling is used. Which ofthese protocols is used depends on the suppliers of the SSP, SCP and IP.
7/29/2019 In Overview
60/226
1-52 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-25. Operations Support Systems
SCP
SCP
SSPSSP
SMS
SCE
IP
STP
Remote Network
Operations Center
FUNCTIONS
s Monitoring, display and logging of alarms
s Performance and measurement reportss User programming
s Network element maintenance
7/29/2019 In Overview
61/226
Issue 8.2 1-53
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Operations Support Systems
An Operations System (OSS) is not actually a part of the intelligent network. Itspurpose is to monitor the health of every network element in the intelligent net-work, and to enable engineers to issue maintenance commands to network ele-ments. An OSS is in a central location, and is linked to every network element.
Functions The major functions are:
s monitor, display and log alarms from network elements
Alarms are a means of telling technicians of high priority events that needto be brought to their attention. They are generated at the site of any net-work element. The OSS, however, gives the network the ability to collectand display them via an audible and visual alarm and/or printout. These
OSS generated displays will usually be found in work centers away fromthe network element itself.
An OSS can provide a graphical, interactive display of the network. Usinga point and click system users can display information associated with analarm. Alternatively, a text-based interface can be used.
s performance and measurement reports - an OSS is able to collectmeasurements from network elements and provide measurement reportson request or on a scheduled basis.
s user programming - An interface is provided to enable the user or a thirdparty to develop new features.
s network element maintenance - an OSS provides on-line access to theSSPs STPs, and the SCPs. Authorized users can monitor these networkelements and input maintenance commands. Reports are produced usingdata from the SSP.
Users can remotely access the 5ESSOffice Dependent Data to performdatabase updates, add and delete lines, trunks, signaling information etc.to the SSPs and STPs via Recent Change. It also allows access to thedisplays at the SSP and SCP, the running of diagnostics and access tothe Emergency Access Interface (EAI) of the SSP and SCP.
Users of an OSS are typically Operations, Administration, and Mainte-nance personnel. When specific tasks need to be performed, usersaccess a particular network element using the appropriate subsystem.
7/29/2019 In Overview
62/226
1-54 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Figure 1-26. Summary
SCP
SCP
SSP SSP
SMS
SCE
Public Telephone Network
CCS CCS
Legend:
CCS
SCP
SMS
SSP
= Common Channel Signaling
= Intelligent Peripheral
= Service Control Point
= Service Management System
= Service Switching Point
IP
IP
SCE = Service Creation Environment
STP
STP = Signaling Transfer Point
= CCS No. 7 Signaling Link= Voice Trunk
X.25
X.25 = ITU-T X.25 Recommendation
7/29/2019 In Overview
63/226
Issue 8.2 1-55
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Summary
s
An Intelligent Network gives the network provider, the service subscriberand the calling party a number of benefits.
s The ITU-T Functional Model provides a generalized description for thefunctional components of an Intelligent Network.
s The Basic Call State Model is a means of representing the processing ofa call. It consists of a number of call states and detection points. Callstates represent points in a call. Detection points are used to temporarilyhalt call processing pending the sending or receiving of information.
s An Intelligent Network consists of the following network elements:
Call Control Function (CCF)
Service Switching Function (SSF) - SSP Special Resource Function (SRF) - IP
Service Control Function (SCF) - SCP
Service Management (SMF) - SMS
Service Creation Environment Function (SCEF) - SCE
s An Operations System (OSS) is used to monitor and maintain every net-work element in the IN.
7/29/2019 In Overview
64/226
1-56 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
NOTES
7/29/2019 In Overview
65/226
Issue 8.2 1-57
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
Exercise
Answer each question by selecting the most appropriate answer from the list ofalternatives.
1. Which of the following are advantages of IntelligentNetworks:
a) The ability to make international calls more cheaply.
b) The ability to reduce the load on the SCP when call traffic isheavy.
c) Flexibility in routing and charging for calls.
d) The ability to play announcements to the caller.
2. Which of the following hardware and related elements areused in an Intelligent Network?
a) SSP
b) STP
c) SMS
d) SCE
e) IP
f) All of the above
7/29/2019 In Overview
66/226
7/29/2019 In Overview
67/226
Issue 8.2 1-59
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
6.What is the purpose of the SCF:
a) The detection of IN calls.
b) Playing announcements.
c) Setting up of voice connections.
d) Routing of calls which require the use of advanced services.
7. What is call gapping:
a) A means of reducing the load on an SCF by reducing thenumber of queries sent to it.
b) A means of collecting measurements and statistics on theperformance of the SCF.
c) A facility for tracing the origin of a call.
d) None of these.
8. What is a mated pair of SCPs:
a) One SCP processing all calls for a service while the other isacting as a hot standby.
b) One SCP processing all calls for a service while the other isacting as a cold standby.
c) Two SCPs sharing a load. If one of them fails, the other SCP
takes the load.
d) None of the above.
7/29/2019 In Overview
68/226
1-60 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
9. What is the SCEF used for:
a) Provisioning of service databases.
b) Creation and maintenance of service logic.
c) Collection of post-dialing digits.
d) None of these.
10. What is the purpose of the SMF:
a) Distributing service logic to all the SCFs.
b) Collecting measurements, statistics and service maintenancemessages and producing reports.
c) Provisioning of service databases.
d) All of the above.
11. What does the SRF do:
a) Play announcements and collect digits.
b) Route IN calls to an SCF.
c) Initiate network management controls.
d) Determine how much to charge for an IN call.
7/29/2019 In Overview
69/226
Issue 8.2 1-61
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
12. What is an alarm:
a) An audible sound that is triggered at an appropriate timeinterval (e.g., change of maintenance shift).
b) An audible sound that is triggered when the Alarm Relay Unitfails.
c) A high priority incident or event that needs to be brought to theattention of maintenance staff.
d) An event that is logged.
7/29/2019 In Overview
70/226
1-62 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK OVERVIEW
7/29/2019 In Overview
71/226
Issue 8.2 2-i
Lucent Technologies ProprietarySee notice on first p age
Contents
2
INTELLIGENT N ETWORK SERVICES
Lesson Overview 2-1
s Lesson Objectives 2-1
Introduction to IN Services 2-3
Service Access 2-5
Advanced Routing Services 2-7
Advanced Routing Service Features 2-9
Call Distribution 2-11
s Call Forward on Busy / Dont Answer 2-11
s Call Logging 2-11
Call Queuing 2-13
s Call Limiter 2-13
One Number 2-15
s Customised Terminating Announcements 2-15
Origin Dependent Routing 2-17
s Originating Call Screening 2-17
Originating User Prompt 2-19
Time Dependent Routing 2-21
s Routing by Time of Day 2-21
s Routing by Day of Week 2-21
7/29/2019 In Overview
72/226
2-ii Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
s Routing by Day of Year 2-21
s Routing by Holiday 2-21
Single Destination Service 2-23
Account Card Calling Service 2-25
s Basic Calling Card 2-25
s Destination Restricted Calling Card 2-25
Televoting Service 2-27
VPN Service 2-29
VPN Call Processing 2-31
VPN Tables 2-33
On-Net Calling 2-35
s On-Net Call Screening 2-35
Closed User Groups 2-37
Off-net Calling 2-39
s Off-Net Call Screening 2-39
Abbreviated Dialing 2-41
Authorization Code 2-43
Off-Net Access 2-45
Follow Me Update 2-47
VPN Attendant 2-49
s VPN Reports 2-49
Summary 2-51
NOTES 2-52
Exercise 2-53
7/29/2019 In Overview
73/226
Issue 8.2 2-1
Lucent Technologies ProprietarySee notice on first p age
2
INTELLIGENT NETWORK SERVICES
Lesson Overview
This lesson is designed to give the student an introduction to the IntelligentNetwork services as well as the features that make up these services.
Lesson Objectives On completion of this lesson participants will be able to:
s state the function of the Advanced Routing service
s state the function of the Single Destination service
s state the function of the Account Card Calling service
s state the function of the Televoting service
s state the function of the VPN service
s Understand some of the features associated with these services:
Call Distribution
Origin Dependent Routing
Originating User Prompt
Originating User Prompt may be used
Time Dependent Routing
VPN On-Net Calling
Call Screening
Abbreviated Dialing
7/29/2019 In Overview
74/226
2-2 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-1. Introduction to IN Services
s Advanced Routing services
s Single Destination service
s Account Card Calling service
s Televoting service
s Virtual Private Network service
7/29/2019 In Overview
75/226
Issue 8.2 2-3
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Introduction to IN Services
The Intelligent Network is a very flexible network for designing, implementingand using services. These different services are built in the SCE.
IN has been used for many years in many configurations. The most commonlyused services are listed opposite.
Each Service consists of one or more service features. A service feature is aunit of functionality, for example routing by time of day or call queuing.
The following sections explain each of the services in more detail, as well as theIN service features used to build these services.
7/29/2019 In Overview
76/226
2-4 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-2. Service Access
0..8..0..0......1..2..3..4
SAC
7/29/2019 In Overview
77/226
Issue 8.2 2-5
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Service Access
A caller normally accesses a service by dialing a service access code (SAC).For example when a caller dials a Freephone number, they first dial a sequenceof digits such as 0800. This is a commonly used service access code for theFreephone service. Every service has a unique SAC. It is up to the network pro-vider to decide what service access codes to use for each of the services theyprovide. This is a part of the numbering plan used by the network provider.
7/29/2019 In Overview
78/226
2-6 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-3. Advanced Routing Services
s Freephone service
s Split Charging service
s Premium Charging service
s Universal Access service
7/29/2019 In Overview
79/226
Issue 8.2 2-7
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Advanced Routing Services
The Advanced Routing Services can be sub-divided into the following services:s Freephone Service
Allows the calling party to call an IN service subscriber without incurringany charges. The call is paid for by the service subscriber. This is com-monly used by, for example, insurance and mail order companies to selltheir products.
s Split Charging ServiceAllows the calling party to call an IN service subscriber with reducedcharges. The call is paid for by the calling subscriber and the service sub-scriber. In the UK, electricity companies use this to reduce nuisancecalls.
s Premium Charging ServiceAllows the calling party to call an IN service subscriber and pay the costof the call plus additional fees to the service provider for the informationprovided during the call. The calling party pays for the expertise of theservice provider. The calling subscriber readily pays for this service,because the telephone offers easy access to valuable information, forexample financial advice.
s Universal Access serviceAllows the calling subscriber to dial a country wide access number andbe routed to the appropriate service subscriber. The calling party paysnormal PSTN charges for this call.
7/29/2019 In Overview
80/226
2-8 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-4. Advanced Routing Service Features
s Call Distribution
s Call Forward on busy/Dont Answer
s Call Limiter
s Call Logging
s Call Queuing
s Customised Recorded Announcements
s One Number
s Origin Dependent Routing
s Originating Call Screening
s Originating User Prompt
s Single Destination Service
s Time Dependent Routing:
Routing By Time Of Day
Routing By Day Of Week
Routing By Day Of Year
Routing by Holiday
7/29/2019 In Overview
81/226
Issue 8.2 2-9
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Advanced Routing Service Features
The table shows the service features which can be used by the AdvancedRouting Services services. These features are available for use by otherservices. Again, this is not an exhaustive list, but shows a representative sampleonly. They are described on the next several pages.
7/29/2019 In Overview
82/226
2-10 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-5. Call D istribution
WHATPERCENT
25%
MAINOFFICE
?
REGIONALOFFICE
REGIONALOFFICE
25%
50%
7/29/2019 In Overview
83/226
7/29/2019 In Overview
84/226
2-12 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-6. Call Queuing
ALL LINES ARE BUSY. PLEASESTAY ON THE LINE AND THE NEXTAVAILABLE OPERATOR WILL TAKEYOUR CALL.
7/29/2019 In Overview
85/226
7/29/2019 In Overview
86/226
2-14 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-7. One Number
01666-456789
01666-987654
NORTHERNWAREHOUSE
SOUTHERNWAREHOUSE
WHICHWARE-
HOUSE?0800-123456
7/29/2019 In Overview
87/226
Issue 8.2 2-15
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
One Number
This Service Feature allows subscribers with terminating lines in two or moredestinations to advertise one number by which their customers can reach themfrom anywhere within a defined geographic area.
This feature is most commonly associated with Universal Access Numberservice.
Customised
Terminating
Announcements
This Service Feature allows a call to be completed to a customized terminatingannouncement instead of a subscriber destination. The terminatingannouncements can be charged to the service subscriber or to the callerdepending on the information provided in the announcement. For example, acourtesy response indicating that the office is closed for the day or an
announcement giving important medical or financial advice to a caller.
7/29/2019 In Overview
88/226
2-16 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-8. Origin Dependent Routing
FROM
AREA?
ALL POINTS NORTH
ALL OTHER CALLS
NORTHERNWAREHOUSE
SOUTHERNWAREHOUSE
WHAT
7/29/2019 In Overview
89/226
Issue 8.2 2-17
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Origin Dependent Routing
The Origin Dependent Routing service feature allows service subscribers tospecify different call treatments based on the originating geographical area ofthe caller, and based on whether the call originated nationally or internationally.
Originating Call
Screening
The Originating Call Screening service feature allows a service subscriber to barcalls from certain geographical areas or accept only those calls received fromcertain designated areas.
7/29/2019 In Overview
90/226
2-18 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-9. Originating User Prompt
(NO RESPONSE)
DIGIT #1
DIGIT #2
DIGIT #3
OPERATOR
OTHER
WHATDIGIT?
FOR FURTHER SERVICE,PLEASE PRESS...
CATALOG
ORDERING
CUSTOMERSERVICE
BILLING
7/29/2019 In Overview
91/226
7/29/2019 In Overview
92/226
Issue 8.2 2-20
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-10. Time Dependent Routing
2000 - 0900
0900 - 1700
1700 - 2000
REGIONALOFFICE
MAINOFFICE
TERMINATINGANNOUNCEMENT
7/29/2019 In Overview
93/226
2-21 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Time Dependent Routing
Time Dependent Routing allows a service subscriber to route a call based on
the Time of Day, Day of Week, Day of Year or Holiday.
Routing by Time of
Day
This feature allows the service subscriber to define different call treatmentsbased on the time of day. Intervals are defined in one minute increments andall hours of the day need to be accounted for. The call time is checked againstthe SCP system clock in determining when a call should go to a particulartreatment.
Routing by Day of
Week
This service feature allows the service subscriber to apply different call treat-ments to a call based on the day of the week. A day is defined as a periodfrom midnight to midnight. Call treatments need to be defined for every day of
the week.
Routing by Day of
Year
This service feature allows the service subscriber to apply different call treat-ments based on the day of the year that the call is placed. Routing alterna-tives must be provided for all day of year groupings, there can be a maximumnumber of 366 branches based on the outcome of this decision.
Routing by Holiday This service feature allows the service subscriber to apply different call treat-ments based on a holiday. Holidays are defined in a global holiday table.
The difference between routing by holiday and routing by day of year is that
routing by holiday allows the service subscriber to apply the same treatmentto a range of holiday days, whereas the routing by day of year feature isunique for each day.
7/29/2019 In Overview
94/226
Issue 8.2 2-22
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-11. Single Destination Service
MALMESBURY
CHIPPENHAM
7/29/2019 In Overview
95/226
2-23 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Single Destination Service
The Single Destination Service differs from the Advanced Routing Service in
that it offers one destination (PSTN routing number or announcement) forcalls to a service subscriber. The Single Destination Service may also becalled the Basic Routing Service or Basic Freephone Service.
The Single Destination Service does not have any service features.
7/29/2019 In Overview
96/226
Issue 8.2 2-24
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-12. Account Card Calling Service
CALLING CARD
CALLINGCARD
89339BBB - XX - XXX - LPINN
BASIC CALLING CARD
DESTINATION RESTRICTED CALLING CARD
7/29/2019 In Overview
97/226
Issue 8.2 2-25
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Account Card Calling Service
The Account Card Calling service allows a subscriber to bill calls to an account.This card will typically be issued by the telephone administration. There are twotypes of Account Card Calling service: Basic Calling Card and DestinationRestricted Calling Card.
Basic Calling
Card
Basic Calling Card works in the following way:
1. The caller dials the Calling Card Access number.
2. The call is routed to the SCP via the SSP. The SCP instructs the SSP tocollect the callers Calling Card number and PIN (Personal Identifier).
3. The caller enters a Calling Card number and PIN. The number is col-lected by the IP and a validity check on the number of digits dialled takesplace.
4. If the No. of digits dialled is within range then the digits are forwarded viathe SSP to the SCP. The SCP checks the validity of the Calling CardNumber and PIN combination.
5. If the combination is valid the caller is prompted (via the SSP) for the des-tination number required.
6. The caller enters a destination number which is forwarded to the SCP.
7. The SCP checks that the destination is valid (against a pre-determinedset of disallowed destinations).
8. If the destination is valid the call is routed to the final destination.
9. The caller may invoke follow on calling (if the feature is subscribed to)after the call is terminated, by entering a follow on call digit.
Follow On Calling - allows a caller to make further calls after the first callis finished without having to re-enter his/her Calling Card Number andPIN.
Invalidation on Reprompt - Allows the service provider to invalidate thecard of a service subscriber after three invalid calling card number andPIN combinations have been attempted. The card can only be re-vali-dated by an operation at the SMS (Service Management System).
DestinationRestricted
Calling Card
Destination Restricted calling card works in a similar way to Basic Calling Cardexcept that after the callers calling card number and PIN are collected the call isrouted to a pre-defined destination.
7/29/2019 In Overview
98/226
2-26 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-13. Televoting Service
YESNO
1, 2,3........ 24, 25, 26,27..... 1,2,3....
SCP
VOTING TONIGHT
0991 242123 0991 242124
PSTN
NoYes
yes-count
no-count
countsto SCP
filtercommandsfrom SCP
votes votes
SSP
9,10,11,12...
SMS
totalcountsto SMS
7/29/2019 In Overview
99/226
Issue 8.2 2-27
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Televoting Service
The Televoting service offers the service subscriber the capability to survey pub-lic opinion using the telephone network. The televoting service subscriber willadvertise IN telephone numbers for each option solicited in the survey, callerswill dial the numbers associated with their opinion.
During a televoting event, it is not desirable to have the SCP provide routinginstructions for all calls, because the high volume of queries would overload theSCP. Therefore the SCP will send a filter instruction to the SSP effectivelylimiting the number of calls that it receives. All calls filtered at the SSP will becounted and the results sent to the SCP. The SCP sums call counts receivedfrom each SSP and forwards them to the Service Management System.
Typically, as shown in the figure opposite, callers will call one number to vote
yes and a different number to vote no. However, as previously stated it ispossible to call up to 20 different numbers and have the votes countedseparately.
7/29/2019 In Overview
100/226
7/29/2019 In Overview
101/226
Issue 8.2 2-29
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
VPN Service
The Virtual Private Network service allows service subscribers to connecttogether several offices, factories and even home users in one virtual network.The connections between the users can use existing local and toll circuits in thetelephone network.
This gives the Service Subscriber several distinct advantages:
s Home users can share the facilities of the VPN.
s Administration of the network can be accomplished centrally, thereforeusers can be added and deleted with a minimum amount of effort.
s Telephone charges can be made simpler and more cost effective by hav-ing one billing point.
s VPN Users can have the ability to make calls from outside the network.s Security checking can be applied.
The following are some of the features that make up the Virtual Private Network:
s VPN On-Net Calling
s VPN Closed User Groups
s VPN Off-Net Calling
s VPN Abbreviated dialing
s VPN Follow Me Diversion
s VPN Off-Net Access
s VPN Authorization Code
s VPN Attendant
s VPN Call Screening
Different service subscribers use different features, depending on theirrequirements. Some service subscribers use different names for some features.
These service features will be explained on the next few pages.
7/29/2019 In Overview
102/226
2-30 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-15. VPN Call Processing
LOOK UP DIALED
VACANT CODE
ANNOUNCEMENTYES
NO
.OFF-NET
CALL
VPN
ATTENDANT
CALL
FOLLOW MEUPDATEDEFAULT
FOLLOW ME
UPDATE
ON-NET
FOLLOW ME
UPDATE
OFF-NET
PLAY
DELETE SAC
FROM DIALED
DIGITS
VPN
IS
SERVICE KEYCLI OR Recd No?
ON NET
FAC POPULATED?
YES
ON-NET
CALL
CHECK FACTO DETERMINE
VPN CALL TYPE
YES
NO
DIGITS IN FACTABLE FOR VPN
ACCOUNT
CLI
FAC FOUND?
GLOBAL
ABBREV.
DIALING
CUSTOM
ABBREV.
DIALING
REMOTE
CALL
CLIRECD
NO.
ACCESS
7/29/2019 In Overview
103/226
Issue 8.2 2-31
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
VPN Call Processing
The figure opposite represents the initial call flow for the VPN service. The Ser-vice Access Code (SAC) associated with the VPN service will be discarded andthe next few digits will be analyzed. These constitute the Feature Access Code(FAC). If an unsubscribed feature is being requested the call is terminated to anannouncement. If the call is to a subscribed feature then the call flow for the sub-scribed feature will be followed. The next few pages describe the VPN features.
Most VPN service use the CLI (Calling Line Identity) as the key to determinewhich VPN the caller belongs to.
7/29/2019 In Overview
104/226
2-32 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-16. VPN Tables
Table
Per VPN or
Per User D escription
VPN AccountInformation
Per VPN This table defines the service features subscribed toby a given VPN subscriber
Feature AccessCode Table
Per VPN Defines the Feature Access Codes that will be used toaccess particular service features
Authentication Table Per User or
Group
Defines the VPN account that a given User or Groupof users belongs to and the capabilities associatedwith the user or group
Authorization Code
Privileges
Per VPN Defines Authorization code information for users who
are able to use this featureOff-Net AccessMapping
Per VPN Defines privileges associated with the Off-Net Accessfeature
VPN User Profile Per User Defines call termination permissions of an individualVPN user
DisallowedDestination Prefix
Per VPN Defines a set of disallowed destinations that VPNusers are not allowed to call
CUG permissions Per VPN Defines the permissions associated with each ClosedUser Group
Abbreviated DialingTables
Per VPN A set of Global and Custom abbreviated dialing tablesthat define short codes for on-net calling
Call Screening Per VPN Call Screening tables that define caller restrictions foron-net and off-net calls
7/29/2019 In Overview
105/226
Issue 8.2 2-33
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
VPN Tables
The VPN service uses a set of tables to define per VPN subscriber variables andper VPN user variables. These tables (shown opposite) associates a given Call-ing Line Identity or Off-Net Access number with a given set of privileges or capa-bilities for that user:
7/29/2019 In Overview
106/226
2-34 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-17. On-Net Calling
Telcos
OFFICE A
OFFICE B
Network
PSTN
OFFICE C
HOME USER
7/29/2019 In Overview
107/226
Issue 8.2 2-35
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
On-Net Calling
The On-Net service allows users to call other users within the defined network.
As its name implies, an On-Net call is a call between one user and another useron the same Virtual Private Network. The VPN users can be located in the samelocation or in a different location, provided that they are both defined on thesame VPN. That location can also be a home user via the PSTN.
The user dials a VPN code, which may consist of a Feature Access Code +Location Code + Extension (FAC + LOC + EXTN). This is forwarded to the SCP,where it is translated into a Final Routing Number.
In the example in the figure opposite:
1. a caller from Office A dials the VPN code of the person he/she wishes toreach.
2. The call is passed to the network which recognizes it as a VPN On-Netcall, and checks to see if the caller has permission to make this call.
3. A check is then made to see if the VPN code dialed (in Office B) willaccept calls from this VPN station.
4. If so, the caller is finally routed to the correct destination code.
On-Net Call
Screening
On-Net calls can be screened against a set of allowed/disallowed userpermissions. If a VPN user, who has On-Net permissions also subscribes to callscreening then calls can be checked against one of two separate criteria:
s Screening defined in a barred list - The user is allowed to make anyOn-Net calls except those defined in a table containing a set of barredcodes. Barred calls will be sent to a terminating announcement.
s Screening defined as an allowed list - The user is only allowed to makecalls to On-Net destinations as specified in the allowed list of On-Net des-tinations. Barred calls are sent to a terminating announcement.
7/29/2019 In Overview
108/226
2-36 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Figure 2-18. Closed User Groups
USER C
USER I
USER N
USER E
USER K
USER L
USER D
USER H
USER J
USER B
USER M
USER A
USER G
USER F
VPN 123
ACCOUNTS
SALES
SERVICES
STORES
7/29/2019 In Overview
109/226
Issue 8.2 2-37
Lucent Technologies ProprietarySee notice on first p age
INTELLIGENT NETWORK SERVICES
Closed User Groups
The Closed User Group feature allows the user to be a member of a set of userswho are allowed to make calls only to each other, the advantage being that theService Subscriber can restrict certain users from Off -Net privileges or fromcalling other users in the VPN who are not in the same Closed User Group.
There are typically up to 16 Closed User Groups per VPN. A user can belong tomore than one CUG and a CUG may contain all users.
The SCP makes the following checks:
It determines (from the CLI/CID Privileges table) if the calling party is authorizedto make calls to the called party. If not, the call is terminated to anannouncement.
It determines (from the VPN User Profile Table) if the called party is authorizedto receive calls from the calling party. If not the call is terminated to anannouncement.
Closed User Groups can be used for example to prevent calls across geographicboundaries or to prevent calls to Managing Directors or Chief Executives.
The Closed User Group table defines a list of users associated with each ClosedUser Group.
7/29/2019 In Overview
110/226
2-38 Issue 8.2
Lucent Technologies ProprietarySee notice on first p age