In Overview

Embed Size (px)

Citation preview

  • 7/29/2019 In Overview

    1/226

    Lucent Technologies ProprietaryThis document contains proprietary information of

    Lucent Technologies and is not to be disclosed or usedexcept in accordance with applicable agreements

    Copyright 1998 Lucent TechnologiesUnpublished and Not for Publication

    All Rights ReservedPrinted in U.S.A.

    Issue 8.2May 1998IN1000

    Intelligent Network Overview

    STUDENT GUIDE

  • 7/29/2019 In Overview

    2/226

    Lucent Technologies ProprietarySee notice on first p age

    NoticeEvery effort was made to ensure that the information in this document was complete and accurate at the time

    of printing. However, information is subject to change.

    Trademarks1A ESS and 4ESS are trademark of Lucent Technologies, Inc.5ESS is a registered trademark of Lucent Technologies, Inc.ANS is a registered trademark of Lucent Technologies, Inc. in the United states and other countries.BaseWorX is a trademark of AT&T.BSD is a trademark of Berkeley Software Design, Inc.Centronics is a registered trademark of Centronics Data Computer Corporation.Comsphere is a registered trademark of AT&T.DiskSuite is a trademark of Sun Microsystems, Inc.DMS is a registered trademark of Northern Telecom Limited.EMX is a registered trademark of Motorola, Inc.ESS is a trademark of Lucent Technologies, Inc.Ethernet is a registered trademark of Xerox Corporation.MAXELL is a trademark of Maxell Corporation of America.MIPS is a registered trademark of MIPS Computer Systems, Inc.NetMinder is a registered trademark of Lucent Technologies in various countries outside the United StatesNonStop V+ is a trademark of Tandem Computers, Inc.

    ODIN is a trademark of Lucent Technologies, Inc.OPEN LOOK is a registered trademark of Novell, Inc.OpenWindows is a trademark of Sun Microsystems, Inc.ORACLE is a registered trademark of Oracle Systems Corporation.Pentium is a registered trademark of Intel Corporation.PostScript is a registered trademark of Adobe Systems, Inc.SEAS is a trademark of Bell Communications Research, Inc. (Bellcore)Solaris is a registered trademark of Sun Microsystems, Inc.Solstice is a trademark of Sun Microsystems, Inc.SPARC is a registered trademark of SPARC International, Inc.SPARCompiler is a trademark of SPARC International, Inc., licensed exclusively to Sun Microsystems, Inc.SPARCworks is a trademark of SPARC International, Inc., licensed exclusively to Sun Microsystems, Inc.SQL Forms is a registered trademark of Oracle Systems Corporation.SQL Plus is a registered trademark of Oracle Systems Corporation.StarServer is a registered trademark of Lucent Technologies, Inc.

    Sun and SunOS are trademarks of Sun Microsystems, Inc.SunPro is a trademark of Sun Microsystems, Inc.SunSoft is a trademark of Sun Microsystems, Inc.Sun Microsystems is a registered trademark of Sun Microsystems, Inc.UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open

    Company Limited.X Window System is a trademark of the Massachusetts Institute of Technology.

    Ordering InformationTo order this document,

    s in countries outside the U.S. and Canada, call your Lucent Technologies Market Manager

  • 7/29/2019 In Overview

    3/226

    Issue 8.2 i

    Lucent Technologies ProprietarySee notice on first p age

    COURSE DESCRIPTION

    This course is designed to provide introductory information on the Lucent Tech-nologies Intelligent Network. Students learn about services and call routing fea-tures provided by the network. Students are introduced to the major elementswithin the network:

    s Signal Transfer Point, Service Control Point (SCP)

    s Signalling Transfer Point (STP)

    s Service Management System (SMS)

    s Service Creation Environment (SCE).

    Students are also introduced to Common Channel Signalling and call routingthrough the Intelligent Network.

    Particular emphasis is given to the way in which services and service featureswork, giving students the broad IN background they will need when selling,building or maintaining services.

  • 7/29/2019 In Overview

    4/226

    ii Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    COURSE OBJECTIVES

    This course is designed to enable students to:s Understand the concepts of Intelligent Networks

    s Understand the fundamentals of IN call processing

    s Name the Lucent Technologies network elements that process calls.

    s Describe the functions of the network elements.

    s Describe Intelligent Network services and features, such as AdvancedRouting Services, Vir tual Private Network (VPN), Televoting and CallingCard. The service features that make up these services will be describedand students will be given a broad understanding of how the services andservice features work.

    s Describe the role that Common Channel Signalling plays in processing anIN call.

    s Describe Call routing procedures common to all Intelligent Network calls.

  • 7/29/2019 In Overview

    5/226

    Issue 8.2 iii

    Lucent Technologies ProprietarySee notice on first p age

    TARGET AUDIENCE

    This course is designed for anyone new to the Lucent Technologies IntelligentNetwork and anyone who needs a general overview of how it works.

  • 7/29/2019 In Overview

    6/226

    iv Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    COURSE CONTENTS

    Lesson 1 INTELLIGENT NETWORK OVERVIEWLesson 2 IN TELLIGENT NETWORK SERVICES

    Lesson 3 NETWORK ELEMENTS

    Lesson 4 IN CCS NO. 7 OVERVIEW

    Appendix A INAP MESSAGES

    Appendix B GLOSSARY

  • 7/29/2019 In Overview

    7/226

    Issue 8.2 1-i

    Lucent Technologies ProprietarySee notice on first p age

    Contents

    1

    INTELLIGENT NETWORKOVERVIEW

    Lesson Overview 1-1

    s Purpose 1-1

    s Objectives 1-1

    s Documentation 1-2

    Users and Providers of IN Services 1-5

    s Users and Providers of IN Services 1-5

    Advantages of IN 1-7

    s Advantages to the network provider 1-7

    Advantages to the service provider 1-9

    Advantages to the service subscriber 1-11

    Advantages to the IN user 1-13

    IN Network Elements 1-15

    Brief History 1-17

    IN Call Example 1-19

    Functional Model 1-21

    Implementation of The Functional Model 1-23

    The Basic Call State Model 1-25

    The BCSM Including Detection Points 1-27

  • 7/29/2019 In Overview

    8/226

    1-ii Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    s Types of Detection Points 1-29

    Arming Static Detection Points 1-31

    s Static DP Criteria Table 1-31

    IN Cal l Example Using the Basic Cal l S tate Model 1-33

    Service Control Function 1-35

    s Definition 1-35

    SCP Deployment 1-37

    s Mated Pairs 1-37

    s Stand Alone SCPs 1-37

    IN Call Example Using the SCF 1-39

    Service Management Function 1-41

    s Definition 1-41

    s Functions 1-41

    Service Creation Environment Function 1-43

    s Definition 1-43

    s Functions 1-43

    s Service Packages 1-43

    Service Creation 1-45

    Example Decision Graph 1-47

    The SRF 1-49

    s Definition 1-49

    s Functions 1-49

    Configuration 1-51

    Operations Support Systems 1-53

    s Functions 1-53

    Summary 1-55

    NOTES 1-56

    Exercise 1-57

  • 7/29/2019 In Overview

    9/226

    Issue 8.2 1-1

    Lucent Technologies ProprietarySee notice on first p age

    1

    INTELLIGENT NETWORKOVERVIEW

    Lesson Overview

    Purpose This lesson provides a high level overview of the Intelligent Network asdefined by the ITU-T and ETSI standardization bodies. The following itemsare discussed:

    s The equipment needed for an Intelligent Network

    s The Intelligent Network functional model

    s The concept of triggering IN calls

    s Intelligent network building blocks

    Objectives On completion of this lesson participants will be able to:

    s state the advantages of Intelligent Networks

    s understand which types of call are processed by an intelligent net-work

    s understand the fundamentals of IN call processing

    s define the IN functional model and its implementation

    s define the concept of a detection point

    s define the concept of a building block

    s list the hardware and related equipment used in an Intelligent Net-work.

    s define the IN functional model and its implementation.

    s define the purpose of the SCF.

    s define the function of Call Gapping.

    s define the function of Mated Pairs.

  • 7/29/2019 In Overview

    10/226

    1-2 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    s define the function of the SCEF.

    s define the purpose of the SMF.

    s define the function of the SRF.

    s define the purpose of a system alarm.

    Documentation s ITU-T Recommendations Q.121x series

    s ETSI Specification ETS 300 374-1

  • 7/29/2019 In Overview

    11/226

    Issue 8.2 1-3

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

  • 7/29/2019 In Overview

    12/226

    1-4 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-1. Users and Providers of IN Services

    s Network Provider

    s Service Provider

    s Service Subscriber

    s Calling Subscriber,

    Calling Party or A-Party

    s Called Party or B-Party

  • 7/29/2019 In Overview

    13/226

    Issue 8.2 1-5

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Users and Providers of IN Services

    The Intelligent Network (IN) is an extension to the existing telephone network.This network is organized so that telephone calls received by the IN are inter-rupted to query a database in order to determine what to do with the call. Thecall can then be re-routed based on a number of predefined conditions such astime of day or day of the week. Alternatively, an announcement can be played orinformation can be collected from the caller.

    Users and

    Providers of IN

    Services

    Throughout this course the following terms are used to refer to the users andproviders of the Intelligent Network:

    s Network Providerthe company that is responsible for the telephony network planning andmaintenance (commonly known as the PTT (Post, Telephone and Tele-graph).

    s Service Providerthe company or institution that purchases IN services from the networkprovider and provides it to Service Subscribers.

    s Service Subscriberthe company, institution or individual that purchases IN services from theservice provider. For some services, such as Calling Card, the servicesubscriber is an individual. For others, such as Televoting or VPN, it is anorganization.

    s Calling Subscriber, Calling Party or A-Partythe person who dials the IN number.

    s Called Party or B-Partythe person who answers the call.

    The Calling Party and Called Party may collectively be referred as users.

  • 7/29/2019 In Overview

    14/226

    1-6 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-2. Advantages of IN

    Advantages to the network provider:

    s Additional network traffic

    s Higher call completion rates

  • 7/29/2019 In Overview

    15/226

    Issue 8.2 1-7

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Advantages of IN

    Because of the structure and implementation of the IN in the existing telephonynetwork, there are advantages to both users and providers of the IN:

    Advantages to

    the network

    provider

    IN services can significantly increase the revenue generating potential of thepublic telephone network. Revenue derived from the IN falls into two general cat-egories:

    s Additional network trafficIN services stimulate the use of the telephone network for new applica-tions. This results in an increase in the number of telephone calls made.

    s Higher call completion ratesIN services target calls to destinations where they are most likely to be

    answered. The result is an increase in the number of telephone calls forwhich revenue is collected.

  • 7/29/2019 In Overview

    16/226

    1-8 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-3. Advantages to the Service Provider

    Advantages to the service provider:

    s Flexible and rapid deployment of newservices

    s Wide range of services

    s New tariffed features

  • 7/29/2019 In Overview

    17/226

    Issue 8.2 1-9

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Advantages to the service provider

    s

    IN gives service providers the flexibility to create, customize and/ordeploy new services rapidly.

    s IN supports a wide range of advanced services, for example CallingCard, Televoting.

  • 7/29/2019 In Overview

    18/226

    1-10 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-4. Advantages to the Service Subscriber

    Advantages to the service subscriber:

    s Flexible charging

    s Call queuing

    s

    Flexibility in who maintains the database

  • 7/29/2019 In Overview

    19/226

    Issue 8.2 1-11

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Advantages to the service subscriber

    s

    Due to the flexible charging capabilities of IN the service subscriber canchoose who pays for a call:

    the calling party

    the called party

    the service subscriber

    a combination of all three

    For example, in the freephone service the called par ty, who happens to bethe service subscriber, pays. In the VPN service, the service subscriberpays.

    s IN has the ability to queue calls within the IN network. This allows the ser-

    vice subscriber to save personnel costs by queuing calls to a small num-ber of personnel.

    s IN allows the service subscriber to maintain their own data in the IN data-base, as well as allowing the service provider to maintain the database forthe service subscriber. If the service subscribers data is dynamic it is dif-ficult for the service provider to keep up with all the changes in the data-base so it is better for the service subscriber to maintain the database.

    s Using IN it is possible to re-route calls that are busy or not answered, byrouting to an alternative destination.

    s The service subscriber also gains all the advantages described for theservice provider.

  • 7/29/2019 In Overview

    20/226

    1-12 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-5. Advantages to the IN User

    Advantages to the IN user:

    s Ease of access

    s Facilities of advanced services

  • 7/29/2019 In Overview

    21/226

    Issue 8.2 1-13

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Advantages to the IN user

    s

    Easy access to service subscribersThe service providers can use one nationwide telephone number and re-route calling subscribers to the actual telephone number of this provider. Ifthe service provider has a number of offices throughout the country, theactual re-routing number can vary depending on for example the geo-graphical location of the calling subscriber.

    s Facilities of advanced servicesThe value of IN is the advanced services it makes available to callers.This is how users perceive the network.

  • 7/29/2019 In Overview

    22/226

    1-14 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-6. IN Network Elements

    SCP

    SCP

    SSP SSP

    SMS

    SCE

    Public Telephone Network

    CCS CCS

    Legend:

    CCS

    SCP

    SMS

    SSP

    = Common Channel Signaling

    = Intelligent Peripheral

    = Service Control Point

    = Service Management System

    = Service Switching Point

    IP

    IP

    SCE = Service Creation Environment

    STP

    STP = Signaling Transfer Point

    = CCS No. 7 Signaling Link

    = Voice Trunk

    X.25

    X.25 = ITU-T X.25 Recommendation

    CCS

  • 7/29/2019 In Overview

    23/226

    Issue 8.2 1-15

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    IN Network Elements

    IN has been in use for many years and is integrated in various ways within thepublic telephone network. Figure 1-6 is an example showing a telephony net-work supporting IN services. The network consists of several network elements.An explanation of these network elements can be found in the following para-graphs.

    SSP - Service Switching PointThe SSP is a telephone exchange that recognizes IN calls. If a call is an IN call,the call is temporarily suspended, and extra information for the call is queriedfrom the SCP.

    SCP - Service Control PointThe SCP controls the database that is queried by the SSP for call information. It

    uses it to decide where the call should be routed to.

    IP - Intelligent PeripheralThe IP is used when interaction between the SCP and the caller who dialed theIN telephone number is needed. It can also interact with the calling party. Theinteraction may be either via the SSF or direct.

    According to the ITU-T specification, the IP is capable of playingannouncements, collecting digits, repeating the collected digits, recognizingvoice and generating tones. The functions actually implemented depend on thesupplier of the IP equipment.

    SCE - Service Creation EnvironmentThe creation of new IN services or modification of existing services is done onthe SCE. The created services are downloaded to the SCP.

    SMS - Service Management SystemThe SMS is used to provision services on the SCP. It provides a platform foradministration and backup of the IN services.

    STP - Signaling Transfer PointThe signaling transfer point is often used as a connection between the differentSSPs and SCPs. The STP provides the capability of transferring signalingmessages between the SSP and SCP.

  • 7/29/2019 In Overview

    24/226

    1-16 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-7. Brief History

    Network element nomenclature mapping

    Mapping old and new

    network element names

    SCP NCP

    SSP ACP

    IP NSCX

  • 7/29/2019 In Overview

    25/226

    Issue 8.2 1-17

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Brief History

    One of the earliest needs for intelligent services was the use of freephone calls.Whenever a freephone number was dialed the number was routed to its destina-tion without the calling party having to pay charges for the call. The intelligenceneeded to recognize a freephone number was available in one of the exchangesused to route the call.

    In later years the need for additional services became evident. The solution tothis problem was the introduction of one of the earliest intelligent networks. Theexchange that recognized an IN call was called the Action Control Point (ACP).The ACP was able to re-route calls either using the information available withinits own database or using information available in a separate, centralizeddatabase called the Network Control Point (NCP). If interaction between theNCP and the calling party was needed, the Network Services Complex

    (NSCX) was used. Whenever the ACP, NCP or NSCX needed to interactsignaling messages were sent. Three of the most commonly used signalingprotocols between the ACP and NCP were DCIS6, ECIS6 and CCS No. 7.

    The New Generation IN covered in this course is defined by the world standardsorganization ITU-T (International Telecommunications Union TelecommunicationStandardization Sector), together with the European standards organizationETSI (European Telecommunications Standards Institute). This new version ofIN does not use the names ACP, NCP or NSCX. The the SSP has replaced theACP, the SCP has replaced the NCP and the IP has replaced NSCX.

    Through the years many terms have been introduced to explain the services

    provided by IN. A few of these services are listed and briefly described below:

    s Basic Freephone ServiceThe Basic Freephone service allows a service subscriber to have an INnumber that routes all calls to one destination. The service subscriberpays for calls. Destination numbers are available on the exchange itself.The SCP is not queried to re-route these calls.

    s Single Destination Number ServiceThe Single Destination Number Service allows a service subscriber tohave an IN number that will be re-routed by the SCP to one single finaldestination.

    s Advanced Freephone Service

    The Advanced Freephone Service allows a service subscriber to have anIN number re-routed by the SCP to one of several different destinations.The number to which this call is re-routed depends on, for example, thetime of day, day of the week, date, or the calling subscribers geographicallocation.

  • 7/29/2019 In Overview

    26/226

    1-18 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-8. IN Call Example

    SCP

    SSP

    Calling Subscriber Service Provider

    PBX

    CP

    34

    0800-123123

    Called N umber

    Request for InformationRe-Routing

    SSP

    Information

    Public Telephone N etwork

    0800-123123

    1

    25

    6

    STP

    022-4566543

    PSTN N umber

  • 7/29/2019 In Overview

    27/226

    Issue 8.2 1-19

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    IN Call Example

    In a country-wide advertising campaign an insurance company is giving a 10%discount to new customers. The company tells everybody to dial 0800-123123and sign up as a customer.

    The insurance company has requested this telephone number from the serviceprovider. The network provider has to translate the 0800-number to the actualtelephone number of the insurance company (022-4566543).

    In Figure 1-8 an example is given of a person who calls the insurance company.The call is divided into the following stages:

    1. The calling subscriber dials 0800-123123.

    2. The call is routed through the Public Switched Telephone Network (PSTN)

    and sent to an exchange where more is known about this 0800-number(this exchange is the SSP).

    3. The SSP exchange recognizes the call as an IN call and queries the SCPfor more information.

    4. The SCP responds by sending re-routing information (022-4566543) tothe SSP.

    5. After receiving this data the SSP connects the calling subscriber to thenew received number using the PSTN.

    6. The PSTN connects the call to the Private Branch Exchange (PBX) of theinsurance company.

    The actual call is connected from the PSTN to the SSP and back again.

  • 7/29/2019 In Overview

    28/226

    1-20 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-9. Functional Model

    SSF

    CCF

    SCF

    SSF

    CCF CCF

    SRF

    SMF

    SCEF

  • 7/29/2019 In Overview

    29/226

    Issue 8.2 1-21

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Functional Model

    ITU-T has defined a standard functional model for the Intelligent Network. Thediagram opposite shows the functional entities and the relationships betweenthem. The terminology of this model is often used in IN system documentation.

    The functional entities are as follows:

    s CCF (Call Control Function)This provides the basic call and connection handling in the exchange. Itestablishes, manipulates and releases a call. It recognizes IN calls andenables the SSF (see below) to take over processing of the call. It repre-sents the functionality of the traditional switch.

    s SSF (Service Switching Function)The SSF enables interaction between the CCF and the SCF. It recognizes

    service control triggers, through which it recognizes IN calls. It also man-ages signaling between the CCF and the SCF.

    s SCF (Service Control Function)The SCF directs call control functions during the processing of an IN call.It contains the IN service call processing logic (or service provider plan)stored in centralized databases which specifies how to handle an IN ser-vice request. It interacts with the SSF and the SRF to obtain information(service or user data) required to process an IN call.

    The SCF and the SSF have a master-slave relationship; the SCF is themaster and the SSF is the slave.

    Sometimes the SCF is split into two functional entities:

    SDF (Service Data Function)the database

    SCF (Service Control Function)Call processing and other logic

    s SRF (Specialized Resource Function)The SRF is used whenever an IN call requires direct interaction with thecalling party in the speech path. It contains the logic and processingcapability to send, receive and convert information. All SRF actions for agiven call are determined by commands received from the SCF via theSSF. Examples of SRF actions are:

    The playing of a standard or customized announcement The collection of digits requested in an announcement (post-dial-

    ing digits)

    s SCEF (Service Creation Environment Function)This function enables service developers to develop service logic.

    s SMF (Service Management Function)This function allows the provision and distribution of databases to theSCF equipment.

  • 7/29/2019 In Overview

    30/226

    1-22 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-10. Implementation of the Functional Model

    SCP

    SSP SSPIP IP

    P S T N

    SCE

    SMS

    SCEF

    SMF

    SCF

    SSF

    CCF

    SRFSRFSSF

    CCF

  • 7/29/2019 In Overview

    31/226

    Issue 8.2 1-23

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Implementation of The Functional

    Model

    The functional model defines the entities in terms of functions and not in terms ofphysical network elements. The network elements which typically correspond tothe different functional entities are as follows:

    SCF SCP (Service Control Point) or NCP (Network Control Point)

    SRF IP (Intelligent Peripheral)

    CCF/SSF SSP (Service Switching Point) or ACP (ACtion Point)

    SCEF SCE (Service Creation Environment)

    SMF SMS (Service Management System)

    More than one of these functional entities may be implemented on one physicalnetwork element. Note that an IN need not consist entirely of equipment from asingle vendor.

    An example network implementation of the IN functional model is shown in thefigure opposite. The SSFs terminate trunks. They communicate with the SCF viaa Common Channel Signaling (CCS) No. 7 network, using INAP (IntelligentNetwork Application Part) message.

  • 7/29/2019 In Overview

    32/226

  • 7/29/2019 In Overview

    33/226

    Issue 8.2 1-25

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    The Basic Call State Model

    Any telephone call goes through a number of different stages, called statesorPoints-in-Call, when it enters or originates in a CCF. For the ITU-T specificationeach originating call follows the Basic Call State Model (BCSM). This is shownin Figure 1-11 and has the following states (the names in italics are the ITU-Tterms, and those in parentheses are Lucent terms):

    1. O_Null and Authorize_Origination_Attempt(Idle state)This is the normal, on-hook state, when no call is being made. This callstate is left when an exchange trunk or line is activated as a result of a callor service request. For ISDN calls line activation implies the receipt of aSETUPmessage. For CCS No. 7 it implies the receipt of an InitialAddress Message(IAM).

    2. Collect_Information(Digit collection)

    The digits sent by the originating party are being collected. This call stateis left when all digits have been received, the originating party abandonsthe call, or an error occurs during digit collection (for example, a time-outoccurred).

    3. Analyse_Information(Digit analysis)The dialed digits are being analyzed. This call state is left when digit anal-ysis is successful, the originating party abandons the call, or an erroroccurs during digit analysis (for example, an invalid dial string is received).

    4. Routing and Alerting(Routing and Terminal Allocation)RTA (Routing and Terminal Allocation) is performed, i.e. the call is routedto the B-Partys phone. This call state is left when:

    the terminating party goes off hook

    the originating party abandons the call

    the RTA fails (for example, due to network congestion),

    authority of the originating party to place the call is denied

    the called party is busy

    the called party does not answer the call within a specified time.

    5. O_Active(Active state)The call is accepted and answered by the terminating party, and the twoparties are talking to each other. This call state is left when a disconnect

    indication (for example, on hook, Q.931 disconnect message or CCS No.7 release message) is received from the originating or terminating party,or a connection failure occurs.

  • 7/29/2019 In Overview

    34/226

  • 7/29/2019 In Overview

    35/226

  • 7/29/2019 In Overview

    36/226

  • 7/29/2019 In Overview

    37/226

  • 7/29/2019 In Overview

    38/226

    1-30 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Conditionally armed static DPs:

    s Static DP criteria:

    Received number

    Calling party number

    Called party nature of address

    Cause value

    Class of service

    ISDN bearer capability

    s Criteria assigned on:

    Individual basis

    Group basis

    Exchange basis

    Unconditionally armed static DPs:

    s No Static DP criteria

    s Assigned on:

    Individual basis

    Group basis

    Exchange

    Figure 1-14. Arming Static Detection Points

  • 7/29/2019 In Overview

    39/226

  • 7/29/2019 In Overview

    40/226

    1-32 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-15. IN Call Example Using the Basic Call State Model

    Dynamic DP

    Arm

    DP5-R

    3. Analyse_Information

    Instruction:

    request for

    DP5-R

    SSFCCF SCF

    Service

    LogicStatic DP

    DP3

    Trigger request

    instructions

    DetectionPoint

    Processing

    New Number

    Event request

    instructionsDP5

    4. Route & Alerting

    DP1

    DP2

    1. O_Null & Auth._Orig._Attempt

    2. Collect_Information

    3. Analyse_Information

    DP3

  • 7/29/2019 In Overview

    41/226

    Issue 8.2 1-33

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    IN Call Example Using the Basic

    Call State Model

    In a previous section an example scenario was given for an IN call to an insur-ance company. In Figure 1-15 the same example is used and expanded. Theinsurance company wants to reroute calls to another destination if the originalnumber is busy. The IN call in Figure 1-15 uses the Basic Call State Model,Static and Dynamic Detection Points.

    The call flow is given in steps 1 to 8:

    1. The originating subscriber dials an 0800-number. The call is routed to anSSF.

    2. The CCF receives the call as an incoming call.

    3. At the moment this call arrives, authorization (BCSM O_Null andAuthorize_Origination_Attempt) checks are done. If these checks do notfail the CCF checks if DP1 is armed. If DP1 is not armed the call contin-ues.

    4. Next the CCF starts collecting the digits dialed by the originating sub-scriber (BCSM Collect_Information). If enough digits are received theCCF checks if DP2 is armed. If DP2 is not armed the call continues asnormal.

    5. When the CCF has received enough digits, the digits can be analyzed(BCSM Analyse_Information). If in the CCF DP3 has been conditionallyarmed so as to cause the CCF to interrupt all calls that start with the digits

    0800 and request further instructions from the SCF, then it will send amessage to the SCF.

    6. The message is received by the SCF, the SCF retrieves the correct desti-nation number from its database. To ensure that the call is answered theSCF can dynamically activate detection point 5 (busy). The new tele-phone number and a request to dynamically arm the detection points aresent back to the CCF.

    7. The request to arm detection point 5 causes the CCF to arm the DP forthis particular call (dynamic). The new received number causes the CCFto return to the Analyse_Informationcall state.

    8. The new number is analyzed and routed (BCSM Routing and Alerting) to

    its final destination. If the destination is busy this causes DP5 to be fired.The CCF sends a message to the SCF again, now indicating that the userwas busy. The SCF accesses the database again to determine what to donext (play an announcement, re-route the call again, disconnect). Steps 6to 8 can be repeated until a telephone number has been found which isnot busy.

  • 7/29/2019 In Overview

    42/226

    1-34 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-16. Service Control Function

    Functions of the SCF:

    s Routing of calls

    s Collecting measurements

    s Sending of status and service maintenancemessages to the SMF

    s Network management controls

    s Sending of billing information to the SSF

  • 7/29/2019 In Overview

    43/226

    Issue 8.2 1-35

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Service Control Function

    Definition The primary purpose of the Service Control Function is to serve as the networkscall routing facility. It contains service control login and a database which storesService Subscriber Records that determine routing for Intelligent Network Ser-vices.

    Other functions are:

    s Traffic and network measurements are collected and sent to the SMF.

    s Status information and service maintenance messages are sent to theSMF.

    s The placement of network management controls on the dialed number orthe number of the calling party, known as the Calling Line Identity (CLI).These controls are sent to the SSF to tell it to limit the number of incomingcalls requiring the SCF. This is called call gapping. The purpose of callgapping is to prevent the SCF from becoming overloaded. This is done byreducing the number of queries sent to it.

    s Sending of Billing Data to the SSF

    The SCF sends billing data to the SSF. The data is recorded at the SSFand later processed before being sent to the billed party.

  • 7/29/2019 In Overview

    44/226

    1-36 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-17. SCP Deployment

    SCP

    STP

    SSP

    SCP

    STP

    SSP

    SCP

    STAND ALONE

    MATED PAIRS

    STP

    SSP

    STP

    SSP

    Primary SCP:0800-1000 to 0800-4999

    Secondary SCP:

    0800-5000 to 0800-9999

    Primary SCP:0800-5000 to 0800-9999

    Secondary SCP:

    0800-1000 to 0800-4999

    A B

    0800-1000 to 0800-9999

  • 7/29/2019 In Overview

    45/226

  • 7/29/2019 In Overview

    46/226

    1-38 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-18. IN Call Example Using the SCF.

    3. Analyse_

    Routing

    SSFCCF SCF

    DP3

    Trigger request

    instructions

    Detection

    Point

    Processing

    New Number

    4. Route & Alerting

    DP1

    DP2

    1. O_Null & Auth_.Orig._Attempt

    2. Collect_

    3. Analyse_

    DP3

    ServiceLogic

    Information

    Information

    Information

    RequestInstructions 09:00

    -17:00

    17:00-

    09:00

    Main

    office

    information

    Local

    office

    Whattimeis it?

    01666832967

    01666832186

  • 7/29/2019 In Overview

    47/226

    Issue 8.2 1-39

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    IN Call Example Using the SCF

    The SCF in an Intelligent Network contains a database which stores the routinglogic for the service and the service subscribers call routing plans. Dependingon the type of service, the call routing plans contain one or more possible routingdestinations. Service features in effect at the time the call routing plan wasaccessed determine how the call is routed. For example, if the Time Of Day ser-vice feature is in effect, the SCF will check the time of day and route the callaccording to the time the call is made. After the SCP has accessed the call rout-ing plan, it sends the routing instructions to the SSF.

    The call flow is as in Figure 1-18 and will not be repeated here. The caller hasdialed a freephone number, 0800-123123, and this has been passed to the SCFas already described. The following explanation only describes what takes placein the SCF.

    1. The message is received by the SCF. The SCF will find the SubscriberRecord for the called party in its database. This will contain the Call Rout-ing Plan for the insurance company subscribing to the Freephone service.

    2. The SCF will check the time of day according to the logic in the Call Rout-ing Plan. In this example, it will route the call to the local office on 01666-832967 between the hours of 08:00 to 17:00, and to the main office on01666-832186 at all other times.

    3. The number is sent back to the SSF and call processing continues asdescribed in the preceding example.

  • 7/29/2019 In Overview

    48/226

    1-40 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-19. Service Management Function

    Functions of the SMF:

    s Applying changes to service data

    s Modification and downloading of service logic

    s Collecting measurements

    s Receiving and logging unsolicited status and servicemaintenance messages from the SCP

    s Producing reports

    s Service data audits

  • 7/29/2019 In Overview

    49/226

    Issue 8.2 1-41

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Service Management Function

    Definition The Service Management Function (SMF) is responsible for provisioning andmanaging Services created by the Service Creation Environment and download-ing services and service-related data to the Service Control Point(s). It holds themaster copy of all service-related databases.

    The SMF is not involved in call processing.

    Functions The primary purpose of the SMF is to provide the information needed to install,configure and manage new services on the SCF. This involves:

    s Applying changes to global (service-wide) or subscriber data and distrib-uting the changed data to all SCFs that require it. This data includes ser-

    vice logic which is specific to individual subscribers.

    s Downloading service logic onto all SCFs that require it.

    s Collection of service subscription measurements.

    s Producing reports on these measurements. The format and content ofthese reports are under the control of the user.

    s Receiving and logging unsolicited status and service maintenance mes-sages from the SCF. For example, if a caller changes their PIN, thechange will be done in the SCF first, and must then be sent to the SMF.

    s Retrieving provisionable data for comparison of the data on the SCF andon the SMF. These comparisons are called service data audits.

    In addition to its facilities for managing subscriber and service data, theSMF also includes a data collection function for accumulating and report-ing on service subscription measurements gathered by a network ele-ment.

  • 7/29/2019 In Overview

    50/226

    1-42 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-20. Service Creation Environment Function

    FUNCTIONS OF THE SCEF:

    s Creation and modification of service logic

    s Downloading of service logic to the SMS

  • 7/29/2019 In Overview

    51/226

    Issue 8.2 1-43

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Service Creation Environment

    Function

    Definition The Service Creation Environment Function (SCEF) is a network element usedto create and modify network database services, for example the Freephone ser-vice. The SCEF allows Lucent Technologies, customer personnel or a third partyvendor to create and customize IN services rapidly.

    Functions The purpose of SCEF is to create service packages (SPs) and to send them tothe SMF for deployment to one or more SCFs on which they will provide service.A Service Package is a container for one or more IN services.

    Service Packages A Service Package contains:

    s service logicThis is the program code which implements the call processing requiredof the service, and all the operational and maintenance functions associ-ated with the service, such as collection of measurements and statistics.

    s service data and service data schemaService data is the data which is needed to run the service. It includesdata which is common to all subscribers and data which is specific to indi-vidual service subscribers. The service data schema specifies the struc-ture of the service data.

    s specification of which data and statistics to collect during service execu-tion.

    The SP contains this information for one or more services, such as theAdvanced Routing service. SPs allow a set of interactive services to beencapsulated into a single SP. A service within a service package can interactwith another service in same the SP. Services within one SP do not interact withservices in any other SPs.

    Some of the benefits of this are:

    s New SPs can be developed and updated independently of existing SPs.

    s The deployment of a new SP to a network element does not interfere withthe execution of pre-existing SPs.

    Multiple versions of the same service can coexist on the same network element.

  • 7/29/2019 In Overview

    52/226

    1-44 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-21. Service Creation

    LANGUAGES:

    s Service Logic Language (SLL)

    text-based programming language

    s Decision Graph Language (DGL)

    graphical language

    standard building blocks

  • 7/29/2019 In Overview

    53/226

    Issue 8.2 1-45

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Service Creation

    The Lucent Technologies Service Creation Environment (SCE) provides servicedevelopers with tools and standard building blocks of functionality for program-ming network services. These tools include Graphical User Interfaces (GUIs),Application Oriented Languages (AOLs), and Service Independent BuildingBlocks (SIBs) that allow the service developer to work in the applicationdomain, focusing specifically on the task at hand rather than on the underlyingdetailed programming steps required to accomplish the job.

    There are two AOLs:

    s Service Logic Language (SLL)

    s Decision Graph Language (DGL)

    Typically, services are written using a combination of both.

    The DGL part of an IN service is made up of a number of SIBs. Each SIBprovides some logic which controls the behavior of the service. For example,there are SIBs which control the routing of calls according to various criteria,such as the time of day, day of week, location of the caller etc. Others sendcharging information to the SSF. This logic is in the SCF.

    Services are built up from SIBs using a graphical editor. SIBs are put together tocreate structures called Decision Graphs (DGs). The graphical editor is calledthe Enhanced Decision Graph Editor (EDGE).

    Additional logic is written in a second AOL, called Service Logic Language(SLL). SLL is more like a traditional programming language, but containsfeatures specific to the writing of telephony services. It provides an efficientmeans of providing the logic needed to link the DGs together.

    ITU-T Recommendation Q.1214 defines a set of standard SIBs. In addition, mostequipment providers define additional ones.

    Lucent Technologies products

    The minimum configuration for an SCE is one SUN SPARC to function as aserver and client workstation, and one PC compile server. A typical configuration

    is one SUN SPARC to function as a server and client workstation, one PCcompile server, and one or more additional SUNs to function as clientworkstations.

  • 7/29/2019 In Overview

    54/226

    1-46 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-22. Example Decision Graph

    Root

    Exit

    Exit

    Connect

    Day_of_Week

    Time_of_Day

    other

    other

    Mon.-Fri.

    0800-1700

    SLL program

    2

    1

    3

    4

    4

  • 7/29/2019 In Overview

    55/226

    Issue 8.2 1-47

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Example Decision Graph

    The decision graph shown opposite provides outgoing call screening. It onlyallows calls to be made between the hours of 08:00 to 17:00 on Mondays to Fri-days. At all other times, the call is disallowed and terminates to an announce-ment.

    Logic in the SLL program has decided that Outgoing Call Screening is required.It therefore initiates the Outgoing Call Screening DG.

    Each numbered box represents a SIB. The logic is as follows:

    1. Check the day of the week

    2. If it is a weekday, check the time of day

    3. If it is between 8:00 and 17:00, connect the caller to the called party4. If either of these checks fails, disallow the call

  • 7/29/2019 In Overview

    56/226

    1-48 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-23. The SRF

    Functions of the SRF:

    s Interact with the calling party, called partyand the SCF

    s Play Announcements

    s Collect Digits

    s Voice Recognition

    s Voice Back

  • 7/29/2019 In Overview

    57/226

    Issue 8.2 1-49

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    The SRF

    Definition The SRF (Specialized Resource Function) serves the SSF whenever an IN callrequires direct interaction with the calling party in the speech path. The SRFcontains the logic necessary to send, receive and convert information. All SRFactions for a given call are determined by commands received from the SCF.

    Functions If the SCF needs interaction with the calling party or the called party, it requeststhe CCF to connect to the SRF. This request is sent via the SSF. Instructions asto what the SRF needs to do may be contained in the SCF request. If they arenot, then the SRF can request instructions directly from the SCF (but only if adirect link is available between the SCF and SRF). When the interaction is fin-ished a message is sent back to indicate this, and the connection between theSRF and the CCF is torn down.

    The SRF has the following functions:

    s Play AnnouncementsAn announcement can be used to inform the calling party that some eventhas occurred (for example: All lines are busy at the moment, please waitfor an operator) or to prompt the calling party to enter digits (for example:Please enter your calling card number followed by your Personal Identifi-cation Number).

    If an announcement is used to prompt the calling party to dial digits, theSCF may allow the announcement to be interrupted. If the announcementis interruptible the calling subscriber is allowed to enter digits while the

    announcement is still playing. At the moment a digit is entered theannouncement is stopped.

    s Collect DigitsWhen the calling party has entered digits, the SRF checks whether thecorrect number of digits have been sent. If enough digits are entered theSRF sends these digits in a message to the SCF (using the SSF/CCF or adirect link).

    s Voice RecognitionIf the SRF has voice recognition, the subscriber can speak to the SRFand the SRF translates the spoken digits to a digit string. For example, acaller is prompted for a PIN. The calling subscriber then speaks the digits

    in the PIN. These are recognized and translated by the SRF to the actualdigits. The SRF then sends these digits in a message to the SCF (usingthe SSF/CCF or a direct link)

    s Voice BackAfter all the digits have been entered by the calling party, the SRF canreplay the digits to the calling party. This allows the user to verify if thecorrect digits have been entered.

  • 7/29/2019 In Overview

    58/226

    1-50 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Integrated SRF, CCF and SSF

    Remote SRF Controlled by the SSF

    Remote SRF Controlled by the SCF

    Figure 1-24. Configuration

    SRFSRFSSF

    CCF

    SCF

    SSF

    CCF

    SRF

    SSF

    CCF

    SCF

    SSF

    CCF

    SRF

    SSFCCF

    SCF

    SSFCCF

  • 7/29/2019 In Overview

    59/226

    Issue 8.2 1-51

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Configuration

    The SRF is designed for maximum flexibility, allowing the network provider todecide how many Intelligent Peripherals (IPs) are needed and where they shouldbe.

    The top diagram on the page opposite shows an example of an SRF in the sameexchange as the SSF and CCF. This configuration is used when the SSP and theIP are combined. This is most likely if there is a lot of interaction between theSSP and the IP. If the SCF wants to communicate with the SRF this is doneusing the SSF and CCF.

    The middle diagram on the page opposite shows an example where the SRFand SSF/CCF are not in the same exchange. This configuration still allows eachSSP to have its own IP, but as shown in the figure a number of SSPs can use

    one IP. If the SCF wants to communicate with the SRF this has to be done usingthe SSF and CCF.

    The bottom diagram on the page opposite shows an example where the SRFand SSF/CCF are not in the same exchange. The difference from the previousexample is that the SCF can communicate directly with the SRF without usingthe SSF. At the moment the SCF needs the SRF to interact with the customer,the SCF requests the SSF to connect to the SRF. As soon as the connection ismade, the SRF queries the SCF using the direct communication link to ask whathas to be done for this call.

    The connection between the SRF and the CCF can be either Integrated

    Services Digital Network (ISDN) or (Common Channel Signaling No. 7 (CCSNo. 7). If the SCF and SRF are connected CCS No. 7 signaling is used. Which ofthese protocols is used depends on the suppliers of the SSP, SCP and IP.

  • 7/29/2019 In Overview

    60/226

    1-52 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-25. Operations Support Systems

    SCP

    SCP

    SSPSSP

    SMS

    SCE

    IP

    STP

    Remote Network

    Operations Center

    FUNCTIONS

    s Monitoring, display and logging of alarms

    s Performance and measurement reportss User programming

    s Network element maintenance

  • 7/29/2019 In Overview

    61/226

    Issue 8.2 1-53

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Operations Support Systems

    An Operations System (OSS) is not actually a part of the intelligent network. Itspurpose is to monitor the health of every network element in the intelligent net-work, and to enable engineers to issue maintenance commands to network ele-ments. An OSS is in a central location, and is linked to every network element.

    Functions The major functions are:

    s monitor, display and log alarms from network elements

    Alarms are a means of telling technicians of high priority events that needto be brought to their attention. They are generated at the site of any net-work element. The OSS, however, gives the network the ability to collectand display them via an audible and visual alarm and/or printout. These

    OSS generated displays will usually be found in work centers away fromthe network element itself.

    An OSS can provide a graphical, interactive display of the network. Usinga point and click system users can display information associated with analarm. Alternatively, a text-based interface can be used.

    s performance and measurement reports - an OSS is able to collectmeasurements from network elements and provide measurement reportson request or on a scheduled basis.

    s user programming - An interface is provided to enable the user or a thirdparty to develop new features.

    s network element maintenance - an OSS provides on-line access to theSSPs STPs, and the SCPs. Authorized users can monitor these networkelements and input maintenance commands. Reports are produced usingdata from the SSP.

    Users can remotely access the 5ESSOffice Dependent Data to performdatabase updates, add and delete lines, trunks, signaling information etc.to the SSPs and STPs via Recent Change. It also allows access to thedisplays at the SSP and SCP, the running of diagnostics and access tothe Emergency Access Interface (EAI) of the SSP and SCP.

    Users of an OSS are typically Operations, Administration, and Mainte-nance personnel. When specific tasks need to be performed, usersaccess a particular network element using the appropriate subsystem.

  • 7/29/2019 In Overview

    62/226

    1-54 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Figure 1-26. Summary

    SCP

    SCP

    SSP SSP

    SMS

    SCE

    Public Telephone Network

    CCS CCS

    Legend:

    CCS

    SCP

    SMS

    SSP

    = Common Channel Signaling

    = Intelligent Peripheral

    = Service Control Point

    = Service Management System

    = Service Switching Point

    IP

    IP

    SCE = Service Creation Environment

    STP

    STP = Signaling Transfer Point

    = CCS No. 7 Signaling Link= Voice Trunk

    X.25

    X.25 = ITU-T X.25 Recommendation

  • 7/29/2019 In Overview

    63/226

    Issue 8.2 1-55

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Summary

    s

    An Intelligent Network gives the network provider, the service subscriberand the calling party a number of benefits.

    s The ITU-T Functional Model provides a generalized description for thefunctional components of an Intelligent Network.

    s The Basic Call State Model is a means of representing the processing ofa call. It consists of a number of call states and detection points. Callstates represent points in a call. Detection points are used to temporarilyhalt call processing pending the sending or receiving of information.

    s An Intelligent Network consists of the following network elements:

    Call Control Function (CCF)

    Service Switching Function (SSF) - SSP Special Resource Function (SRF) - IP

    Service Control Function (SCF) - SCP

    Service Management (SMF) - SMS

    Service Creation Environment Function (SCEF) - SCE

    s An Operations System (OSS) is used to monitor and maintain every net-work element in the IN.

  • 7/29/2019 In Overview

    64/226

    1-56 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    NOTES

  • 7/29/2019 In Overview

    65/226

    Issue 8.2 1-57

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    Exercise

    Answer each question by selecting the most appropriate answer from the list ofalternatives.

    1. Which of the following are advantages of IntelligentNetworks:

    a) The ability to make international calls more cheaply.

    b) The ability to reduce the load on the SCP when call traffic isheavy.

    c) Flexibility in routing and charging for calls.

    d) The ability to play announcements to the caller.

    2. Which of the following hardware and related elements areused in an Intelligent Network?

    a) SSP

    b) STP

    c) SMS

    d) SCE

    e) IP

    f) All of the above

  • 7/29/2019 In Overview

    66/226

  • 7/29/2019 In Overview

    67/226

    Issue 8.2 1-59

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    6.What is the purpose of the SCF:

    a) The detection of IN calls.

    b) Playing announcements.

    c) Setting up of voice connections.

    d) Routing of calls which require the use of advanced services.

    7. What is call gapping:

    a) A means of reducing the load on an SCF by reducing thenumber of queries sent to it.

    b) A means of collecting measurements and statistics on theperformance of the SCF.

    c) A facility for tracing the origin of a call.

    d) None of these.

    8. What is a mated pair of SCPs:

    a) One SCP processing all calls for a service while the other isacting as a hot standby.

    b) One SCP processing all calls for a service while the other isacting as a cold standby.

    c) Two SCPs sharing a load. If one of them fails, the other SCP

    takes the load.

    d) None of the above.

  • 7/29/2019 In Overview

    68/226

    1-60 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    9. What is the SCEF used for:

    a) Provisioning of service databases.

    b) Creation and maintenance of service logic.

    c) Collection of post-dialing digits.

    d) None of these.

    10. What is the purpose of the SMF:

    a) Distributing service logic to all the SCFs.

    b) Collecting measurements, statistics and service maintenancemessages and producing reports.

    c) Provisioning of service databases.

    d) All of the above.

    11. What does the SRF do:

    a) Play announcements and collect digits.

    b) Route IN calls to an SCF.

    c) Initiate network management controls.

    d) Determine how much to charge for an IN call.

  • 7/29/2019 In Overview

    69/226

    Issue 8.2 1-61

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

    12. What is an alarm:

    a) An audible sound that is triggered at an appropriate timeinterval (e.g., change of maintenance shift).

    b) An audible sound that is triggered when the Alarm Relay Unitfails.

    c) A high priority incident or event that needs to be brought to theattention of maintenance staff.

    d) An event that is logged.

  • 7/29/2019 In Overview

    70/226

    1-62 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK OVERVIEW

  • 7/29/2019 In Overview

    71/226

    Issue 8.2 2-i

    Lucent Technologies ProprietarySee notice on first p age

    Contents

    2

    INTELLIGENT N ETWORK SERVICES

    Lesson Overview 2-1

    s Lesson Objectives 2-1

    Introduction to IN Services 2-3

    Service Access 2-5

    Advanced Routing Services 2-7

    Advanced Routing Service Features 2-9

    Call Distribution 2-11

    s Call Forward on Busy / Dont Answer 2-11

    s Call Logging 2-11

    Call Queuing 2-13

    s Call Limiter 2-13

    One Number 2-15

    s Customised Terminating Announcements 2-15

    Origin Dependent Routing 2-17

    s Originating Call Screening 2-17

    Originating User Prompt 2-19

    Time Dependent Routing 2-21

    s Routing by Time of Day 2-21

    s Routing by Day of Week 2-21

  • 7/29/2019 In Overview

    72/226

    2-ii Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    s Routing by Day of Year 2-21

    s Routing by Holiday 2-21

    Single Destination Service 2-23

    Account Card Calling Service 2-25

    s Basic Calling Card 2-25

    s Destination Restricted Calling Card 2-25

    Televoting Service 2-27

    VPN Service 2-29

    VPN Call Processing 2-31

    VPN Tables 2-33

    On-Net Calling 2-35

    s On-Net Call Screening 2-35

    Closed User Groups 2-37

    Off-net Calling 2-39

    s Off-Net Call Screening 2-39

    Abbreviated Dialing 2-41

    Authorization Code 2-43

    Off-Net Access 2-45

    Follow Me Update 2-47

    VPN Attendant 2-49

    s VPN Reports 2-49

    Summary 2-51

    NOTES 2-52

    Exercise 2-53

  • 7/29/2019 In Overview

    73/226

    Issue 8.2 2-1

    Lucent Technologies ProprietarySee notice on first p age

    2

    INTELLIGENT NETWORK SERVICES

    Lesson Overview

    This lesson is designed to give the student an introduction to the IntelligentNetwork services as well as the features that make up these services.

    Lesson Objectives On completion of this lesson participants will be able to:

    s state the function of the Advanced Routing service

    s state the function of the Single Destination service

    s state the function of the Account Card Calling service

    s state the function of the Televoting service

    s state the function of the VPN service

    s Understand some of the features associated with these services:

    Call Distribution

    Origin Dependent Routing

    Originating User Prompt

    Originating User Prompt may be used

    Time Dependent Routing

    VPN On-Net Calling

    Call Screening

    Abbreviated Dialing

  • 7/29/2019 In Overview

    74/226

    2-2 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-1. Introduction to IN Services

    s Advanced Routing services

    s Single Destination service

    s Account Card Calling service

    s Televoting service

    s Virtual Private Network service

  • 7/29/2019 In Overview

    75/226

    Issue 8.2 2-3

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Introduction to IN Services

    The Intelligent Network is a very flexible network for designing, implementingand using services. These different services are built in the SCE.

    IN has been used for many years in many configurations. The most commonlyused services are listed opposite.

    Each Service consists of one or more service features. A service feature is aunit of functionality, for example routing by time of day or call queuing.

    The following sections explain each of the services in more detail, as well as theIN service features used to build these services.

  • 7/29/2019 In Overview

    76/226

    2-4 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-2. Service Access

    0..8..0..0......1..2..3..4

    SAC

  • 7/29/2019 In Overview

    77/226

    Issue 8.2 2-5

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Service Access

    A caller normally accesses a service by dialing a service access code (SAC).For example when a caller dials a Freephone number, they first dial a sequenceof digits such as 0800. This is a commonly used service access code for theFreephone service. Every service has a unique SAC. It is up to the network pro-vider to decide what service access codes to use for each of the services theyprovide. This is a part of the numbering plan used by the network provider.

  • 7/29/2019 In Overview

    78/226

    2-6 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-3. Advanced Routing Services

    s Freephone service

    s Split Charging service

    s Premium Charging service

    s Universal Access service

  • 7/29/2019 In Overview

    79/226

    Issue 8.2 2-7

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Advanced Routing Services

    The Advanced Routing Services can be sub-divided into the following services:s Freephone Service

    Allows the calling party to call an IN service subscriber without incurringany charges. The call is paid for by the service subscriber. This is com-monly used by, for example, insurance and mail order companies to selltheir products.

    s Split Charging ServiceAllows the calling party to call an IN service subscriber with reducedcharges. The call is paid for by the calling subscriber and the service sub-scriber. In the UK, electricity companies use this to reduce nuisancecalls.

    s Premium Charging ServiceAllows the calling party to call an IN service subscriber and pay the costof the call plus additional fees to the service provider for the informationprovided during the call. The calling party pays for the expertise of theservice provider. The calling subscriber readily pays for this service,because the telephone offers easy access to valuable information, forexample financial advice.

    s Universal Access serviceAllows the calling subscriber to dial a country wide access number andbe routed to the appropriate service subscriber. The calling party paysnormal PSTN charges for this call.

  • 7/29/2019 In Overview

    80/226

    2-8 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-4. Advanced Routing Service Features

    s Call Distribution

    s Call Forward on busy/Dont Answer

    s Call Limiter

    s Call Logging

    s Call Queuing

    s Customised Recorded Announcements

    s One Number

    s Origin Dependent Routing

    s Originating Call Screening

    s Originating User Prompt

    s Single Destination Service

    s Time Dependent Routing:

    Routing By Time Of Day

    Routing By Day Of Week

    Routing By Day Of Year

    Routing by Holiday

  • 7/29/2019 In Overview

    81/226

    Issue 8.2 2-9

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Advanced Routing Service Features

    The table shows the service features which can be used by the AdvancedRouting Services services. These features are available for use by otherservices. Again, this is not an exhaustive list, but shows a representative sampleonly. They are described on the next several pages.

  • 7/29/2019 In Overview

    82/226

    2-10 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-5. Call D istribution

    WHATPERCENT

    25%

    MAINOFFICE

    ?

    REGIONALOFFICE

    REGIONALOFFICE

    25%

    50%

  • 7/29/2019 In Overview

    83/226

  • 7/29/2019 In Overview

    84/226

    2-12 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-6. Call Queuing

    ALL LINES ARE BUSY. PLEASESTAY ON THE LINE AND THE NEXTAVAILABLE OPERATOR WILL TAKEYOUR CALL.

  • 7/29/2019 In Overview

    85/226

  • 7/29/2019 In Overview

    86/226

    2-14 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-7. One Number

    01666-456789

    01666-987654

    NORTHERNWAREHOUSE

    SOUTHERNWAREHOUSE

    WHICHWARE-

    HOUSE?0800-123456

  • 7/29/2019 In Overview

    87/226

    Issue 8.2 2-15

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    One Number

    This Service Feature allows subscribers with terminating lines in two or moredestinations to advertise one number by which their customers can reach themfrom anywhere within a defined geographic area.

    This feature is most commonly associated with Universal Access Numberservice.

    Customised

    Terminating

    Announcements

    This Service Feature allows a call to be completed to a customized terminatingannouncement instead of a subscriber destination. The terminatingannouncements can be charged to the service subscriber or to the callerdepending on the information provided in the announcement. For example, acourtesy response indicating that the office is closed for the day or an

    announcement giving important medical or financial advice to a caller.

  • 7/29/2019 In Overview

    88/226

    2-16 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-8. Origin Dependent Routing

    FROM

    AREA?

    ALL POINTS NORTH

    ALL OTHER CALLS

    NORTHERNWAREHOUSE

    SOUTHERNWAREHOUSE

    WHAT

  • 7/29/2019 In Overview

    89/226

    Issue 8.2 2-17

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Origin Dependent Routing

    The Origin Dependent Routing service feature allows service subscribers tospecify different call treatments based on the originating geographical area ofthe caller, and based on whether the call originated nationally or internationally.

    Originating Call

    Screening

    The Originating Call Screening service feature allows a service subscriber to barcalls from certain geographical areas or accept only those calls received fromcertain designated areas.

  • 7/29/2019 In Overview

    90/226

    2-18 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-9. Originating User Prompt

    (NO RESPONSE)

    DIGIT #1

    DIGIT #2

    DIGIT #3

    OPERATOR

    OTHER

    WHATDIGIT?

    FOR FURTHER SERVICE,PLEASE PRESS...

    CATALOG

    ORDERING

    CUSTOMERSERVICE

    BILLING

  • 7/29/2019 In Overview

    91/226

  • 7/29/2019 In Overview

    92/226

    Issue 8.2 2-20

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-10. Time Dependent Routing

    2000 - 0900

    0900 - 1700

    1700 - 2000

    REGIONALOFFICE

    MAINOFFICE

    TERMINATINGANNOUNCEMENT

  • 7/29/2019 In Overview

    93/226

    2-21 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Time Dependent Routing

    Time Dependent Routing allows a service subscriber to route a call based on

    the Time of Day, Day of Week, Day of Year or Holiday.

    Routing by Time of

    Day

    This feature allows the service subscriber to define different call treatmentsbased on the time of day. Intervals are defined in one minute increments andall hours of the day need to be accounted for. The call time is checked againstthe SCP system clock in determining when a call should go to a particulartreatment.

    Routing by Day of

    Week

    This service feature allows the service subscriber to apply different call treat-ments to a call based on the day of the week. A day is defined as a periodfrom midnight to midnight. Call treatments need to be defined for every day of

    the week.

    Routing by Day of

    Year

    This service feature allows the service subscriber to apply different call treat-ments based on the day of the year that the call is placed. Routing alterna-tives must be provided for all day of year groupings, there can be a maximumnumber of 366 branches based on the outcome of this decision.

    Routing by Holiday This service feature allows the service subscriber to apply different call treat-ments based on a holiday. Holidays are defined in a global holiday table.

    The difference between routing by holiday and routing by day of year is that

    routing by holiday allows the service subscriber to apply the same treatmentto a range of holiday days, whereas the routing by day of year feature isunique for each day.

  • 7/29/2019 In Overview

    94/226

    Issue 8.2 2-22

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-11. Single Destination Service

    MALMESBURY

    CHIPPENHAM

  • 7/29/2019 In Overview

    95/226

    2-23 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Single Destination Service

    The Single Destination Service differs from the Advanced Routing Service in

    that it offers one destination (PSTN routing number or announcement) forcalls to a service subscriber. The Single Destination Service may also becalled the Basic Routing Service or Basic Freephone Service.

    The Single Destination Service does not have any service features.

  • 7/29/2019 In Overview

    96/226

    Issue 8.2 2-24

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-12. Account Card Calling Service

    CALLING CARD

    CALLINGCARD

    89339BBB - XX - XXX - LPINN

    BASIC CALLING CARD

    DESTINATION RESTRICTED CALLING CARD

  • 7/29/2019 In Overview

    97/226

    Issue 8.2 2-25

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Account Card Calling Service

    The Account Card Calling service allows a subscriber to bill calls to an account.This card will typically be issued by the telephone administration. There are twotypes of Account Card Calling service: Basic Calling Card and DestinationRestricted Calling Card.

    Basic Calling

    Card

    Basic Calling Card works in the following way:

    1. The caller dials the Calling Card Access number.

    2. The call is routed to the SCP via the SSP. The SCP instructs the SSP tocollect the callers Calling Card number and PIN (Personal Identifier).

    3. The caller enters a Calling Card number and PIN. The number is col-lected by the IP and a validity check on the number of digits dialled takesplace.

    4. If the No. of digits dialled is within range then the digits are forwarded viathe SSP to the SCP. The SCP checks the validity of the Calling CardNumber and PIN combination.

    5. If the combination is valid the caller is prompted (via the SSP) for the des-tination number required.

    6. The caller enters a destination number which is forwarded to the SCP.

    7. The SCP checks that the destination is valid (against a pre-determinedset of disallowed destinations).

    8. If the destination is valid the call is routed to the final destination.

    9. The caller may invoke follow on calling (if the feature is subscribed to)after the call is terminated, by entering a follow on call digit.

    Follow On Calling - allows a caller to make further calls after the first callis finished without having to re-enter his/her Calling Card Number andPIN.

    Invalidation on Reprompt - Allows the service provider to invalidate thecard of a service subscriber after three invalid calling card number andPIN combinations have been attempted. The card can only be re-vali-dated by an operation at the SMS (Service Management System).

    DestinationRestricted

    Calling Card

    Destination Restricted calling card works in a similar way to Basic Calling Cardexcept that after the callers calling card number and PIN are collected the call isrouted to a pre-defined destination.

  • 7/29/2019 In Overview

    98/226

    2-26 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-13. Televoting Service

    YESNO

    1, 2,3........ 24, 25, 26,27..... 1,2,3....

    SCP

    VOTING TONIGHT

    0991 242123 0991 242124

    PSTN

    NoYes

    yes-count

    no-count

    countsto SCP

    filtercommandsfrom SCP

    votes votes

    SSP

    9,10,11,12...

    SMS

    totalcountsto SMS

  • 7/29/2019 In Overview

    99/226

    Issue 8.2 2-27

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Televoting Service

    The Televoting service offers the service subscriber the capability to survey pub-lic opinion using the telephone network. The televoting service subscriber willadvertise IN telephone numbers for each option solicited in the survey, callerswill dial the numbers associated with their opinion.

    During a televoting event, it is not desirable to have the SCP provide routinginstructions for all calls, because the high volume of queries would overload theSCP. Therefore the SCP will send a filter instruction to the SSP effectivelylimiting the number of calls that it receives. All calls filtered at the SSP will becounted and the results sent to the SCP. The SCP sums call counts receivedfrom each SSP and forwards them to the Service Management System.

    Typically, as shown in the figure opposite, callers will call one number to vote

    yes and a different number to vote no. However, as previously stated it ispossible to call up to 20 different numbers and have the votes countedseparately.

  • 7/29/2019 In Overview

    100/226

  • 7/29/2019 In Overview

    101/226

    Issue 8.2 2-29

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    VPN Service

    The Virtual Private Network service allows service subscribers to connecttogether several offices, factories and even home users in one virtual network.The connections between the users can use existing local and toll circuits in thetelephone network.

    This gives the Service Subscriber several distinct advantages:

    s Home users can share the facilities of the VPN.

    s Administration of the network can be accomplished centrally, thereforeusers can be added and deleted with a minimum amount of effort.

    s Telephone charges can be made simpler and more cost effective by hav-ing one billing point.

    s VPN Users can have the ability to make calls from outside the network.s Security checking can be applied.

    The following are some of the features that make up the Virtual Private Network:

    s VPN On-Net Calling

    s VPN Closed User Groups

    s VPN Off-Net Calling

    s VPN Abbreviated dialing

    s VPN Follow Me Diversion

    s VPN Off-Net Access

    s VPN Authorization Code

    s VPN Attendant

    s VPN Call Screening

    Different service subscribers use different features, depending on theirrequirements. Some service subscribers use different names for some features.

    These service features will be explained on the next few pages.

  • 7/29/2019 In Overview

    102/226

    2-30 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-15. VPN Call Processing

    LOOK UP DIALED

    VACANT CODE

    ANNOUNCEMENTYES

    NO

    .OFF-NET

    CALL

    VPN

    ATTENDANT

    CALL

    FOLLOW MEUPDATEDEFAULT

    FOLLOW ME

    UPDATE

    ON-NET

    FOLLOW ME

    UPDATE

    OFF-NET

    PLAY

    DELETE SAC

    FROM DIALED

    DIGITS

    VPN

    IS

    SERVICE KEYCLI OR Recd No?

    ON NET

    FAC POPULATED?

    YES

    ON-NET

    CALL

    CHECK FACTO DETERMINE

    VPN CALL TYPE

    YES

    NO

    DIGITS IN FACTABLE FOR VPN

    ACCOUNT

    CLI

    FAC FOUND?

    GLOBAL

    ABBREV.

    DIALING

    CUSTOM

    ABBREV.

    DIALING

    REMOTE

    CALL

    CLIRECD

    NO.

    ACCESS

  • 7/29/2019 In Overview

    103/226

    Issue 8.2 2-31

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    VPN Call Processing

    The figure opposite represents the initial call flow for the VPN service. The Ser-vice Access Code (SAC) associated with the VPN service will be discarded andthe next few digits will be analyzed. These constitute the Feature Access Code(FAC). If an unsubscribed feature is being requested the call is terminated to anannouncement. If the call is to a subscribed feature then the call flow for the sub-scribed feature will be followed. The next few pages describe the VPN features.

    Most VPN service use the CLI (Calling Line Identity) as the key to determinewhich VPN the caller belongs to.

  • 7/29/2019 In Overview

    104/226

    2-32 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-16. VPN Tables

    Table

    Per VPN or

    Per User D escription

    VPN AccountInformation

    Per VPN This table defines the service features subscribed toby a given VPN subscriber

    Feature AccessCode Table

    Per VPN Defines the Feature Access Codes that will be used toaccess particular service features

    Authentication Table Per User or

    Group

    Defines the VPN account that a given User or Groupof users belongs to and the capabilities associatedwith the user or group

    Authorization Code

    Privileges

    Per VPN Defines Authorization code information for users who

    are able to use this featureOff-Net AccessMapping

    Per VPN Defines privileges associated with the Off-Net Accessfeature

    VPN User Profile Per User Defines call termination permissions of an individualVPN user

    DisallowedDestination Prefix

    Per VPN Defines a set of disallowed destinations that VPNusers are not allowed to call

    CUG permissions Per VPN Defines the permissions associated with each ClosedUser Group

    Abbreviated DialingTables

    Per VPN A set of Global and Custom abbreviated dialing tablesthat define short codes for on-net calling

    Call Screening Per VPN Call Screening tables that define caller restrictions foron-net and off-net calls

  • 7/29/2019 In Overview

    105/226

    Issue 8.2 2-33

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    VPN Tables

    The VPN service uses a set of tables to define per VPN subscriber variables andper VPN user variables. These tables (shown opposite) associates a given Call-ing Line Identity or Off-Net Access number with a given set of privileges or capa-bilities for that user:

  • 7/29/2019 In Overview

    106/226

    2-34 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-17. On-Net Calling

    Telcos

    OFFICE A

    OFFICE B

    Network

    PSTN

    OFFICE C

    HOME USER

  • 7/29/2019 In Overview

    107/226

    Issue 8.2 2-35

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    On-Net Calling

    The On-Net service allows users to call other users within the defined network.

    As its name implies, an On-Net call is a call between one user and another useron the same Virtual Private Network. The VPN users can be located in the samelocation or in a different location, provided that they are both defined on thesame VPN. That location can also be a home user via the PSTN.

    The user dials a VPN code, which may consist of a Feature Access Code +Location Code + Extension (FAC + LOC + EXTN). This is forwarded to the SCP,where it is translated into a Final Routing Number.

    In the example in the figure opposite:

    1. a caller from Office A dials the VPN code of the person he/she wishes toreach.

    2. The call is passed to the network which recognizes it as a VPN On-Netcall, and checks to see if the caller has permission to make this call.

    3. A check is then made to see if the VPN code dialed (in Office B) willaccept calls from this VPN station.

    4. If so, the caller is finally routed to the correct destination code.

    On-Net Call

    Screening

    On-Net calls can be screened against a set of allowed/disallowed userpermissions. If a VPN user, who has On-Net permissions also subscribes to callscreening then calls can be checked against one of two separate criteria:

    s Screening defined in a barred list - The user is allowed to make anyOn-Net calls except those defined in a table containing a set of barredcodes. Barred calls will be sent to a terminating announcement.

    s Screening defined as an allowed list - The user is only allowed to makecalls to On-Net destinations as specified in the allowed list of On-Net des-tinations. Barred calls are sent to a terminating announcement.

  • 7/29/2019 In Overview

    108/226

    2-36 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Figure 2-18. Closed User Groups

    USER C

    USER I

    USER N

    USER E

    USER K

    USER L

    USER D

    USER H

    USER J

    USER B

    USER M

    USER A

    USER G

    USER F

    VPN 123

    ACCOUNTS

    SALES

    SERVICES

    STORES

  • 7/29/2019 In Overview

    109/226

    Issue 8.2 2-37

    Lucent Technologies ProprietarySee notice on first p age

    INTELLIGENT NETWORK SERVICES

    Closed User Groups

    The Closed User Group feature allows the user to be a member of a set of userswho are allowed to make calls only to each other, the advantage being that theService Subscriber can restrict certain users from Off -Net privileges or fromcalling other users in the VPN who are not in the same Closed User Group.

    There are typically up to 16 Closed User Groups per VPN. A user can belong tomore than one CUG and a CUG may contain all users.

    The SCP makes the following checks:

    It determines (from the CLI/CID Privileges table) if the calling party is authorizedto make calls to the called party. If not, the call is terminated to anannouncement.

    It determines (from the VPN User Profile Table) if the called party is authorizedto receive calls from the calling party. If not the call is terminated to anannouncement.

    Closed User Groups can be used for example to prevent calls across geographicboundaries or to prevent calls to Managing Directors or Chief Executives.

    The Closed User Group table defines a list of users associated with each ClosedUser Group.

  • 7/29/2019 In Overview

    110/226

    2-38 Issue 8.2

    Lucent Technologies ProprietarySee notice on first p age