Anna university results

Monday 1 June 2015

INTELLIGENT NETWORK Architecture

INTELLIGENT NETWORK
5.1       Overview of Intelligent Network Architecture
Over the last thirty years, one of the major changes in the implementation of Public Switched Telephone Networks (PSTNs) has been the migration from analogue to digital switches. Coupled with this change has been the growth of intelligence in the switching nodes. From a customer's and network provider's point of view this has meant that new features could be offered and used.
Since the feature handling functionality was resident in the switches, the way in which new features were introduced into the network was by introducing changes in all the switches. This was time consuming and fraught with risk of malfunction because of proprietary feature handling in the individual switches.
To overcome these constraints the Intelligent Network architecture was evolved both as a network and service architecture.
In the IN architecture, the service logic and service control functions are taken out of the individual switches and centralized in a special purpose computer. The interface between the switches and the central computer is standardised. The switches utilize the services of the specialized computer whenever a call involving a service feature is to be handled. The call is switched according to the advice received by the requesting switch from the computer. For normal call handling, the switches do not have to communicate with the central computer.
5.2       Objectives of the Intelligent Network
The main objectives of the IN are the introduction and modification of new services in a manner which leads to substantial reduction in lead times and hence development costs, and to introduce more complex network functions.
An objective of IN is also to allow the inclusion of the additional capabilities and flexibility to facilitate the provisioning of services independent of the underlying network's details. Service independence allows the service providers to define their own services independent of the basic call handling implementation of the network owner.
The key needs that are driving the implementation of IN are :
                  *    Rapid Service Deployment
Most business today require faster response from their suppliers, including telecommunication operators. By separating the service logic from the underlying switch call processing software, IN enables operator to provide new services much more rapidly.
            *    Reduced Deployment Risk
Prior to IN, the risk associated with the deployment of new services was substantial. Major investments had to be made in developing the software for the services and then deploying them in all of the switches.
With the service creation environment available, the IN services can be prototyped, tested and accessed by multiple switches simultaneously. The validated services can then be rolled out to other networks as well.
            *    Cost Reduction
Because the IN services are designed from the beginning to be reusable, many new services can be implemented by building on or modifying an existing service. Reusability reduces the overall cost of developing services. Also, IN is an architecture independent concept, i.e. it allows a network operator to choose suitable development hardware without having to redevelop a service in the event that the network configuration changes.
            *    Customization
Prior to IN, due to complexity of switch based feature handling software, the considerable time frame required for service development prevented the provider from easily going back to redefine the service after the customer started to use it. With IN, the process of modifying the service or customization of service for a specific customer is much less expensive and time consuming.
The customization of services is further facilitated by the integration of advanced peripherals in the IN through standard interfaces. Facilities such as voice response system, customized announcements and text to speech converters lead to better call completion rate and user-friendliness of the services.
5.3       IN Architecture
Building upon the discussion in the previous section, one can envisage that an IN would consist of the following nodes :
·         Specialized computer system for – holding service logic, feature control, service creation, customer data, and service management.
·         Switching nodes for basic call handling.
·         Specialized resources node.
The physical realization of the various nodes and the functions inherent in them is flexible. This accrues form the "open" nature of IN interfaces.
Let us now look at the nodes that are actually to be found in an IN implementation.
The service logic is concentrated in a central node called the Service Control Point (SCP).
The switch with basic call handling capability and modified call processing model for querying the SCP is referred to as the Service Switching Point (SSP).
Intelligent Peripheral (IP) is also a central node and contains specialized resources required for IN service call handling. It connects the requested resource towards a SSP upon the advice of the SCP.
Service Management Point (SMP) is the management node which manages services logic, customers data and traffic and billing data. The concept of SMP was introduced in order to prevent possible SCP malfunction due to on-the-fly service logic or customer data modification. These are first validated at the SMP and then updated at the SCP during lean traffic hours. The user interface to the SCP is thus via the SMP.
All the nodes communicate via standard interfaces at which protocols have been defined by international standardization bodies. The distributed functional architecture, which is evident from the above discussion, and the underlying physical entities are best described in terms of layers or planes. The following sections are dedicated to the discussion of the physical and functional planes.
5.3.1    Physical Plane
 Service Switching Point (SSP)
The SSP serves as an access point for IN services. All IN services calls must first be routed through the PSTN to the "nearest" SSP. The SSP identifies the incoming call as an IN service call by analysing the initial digits (comprising the "Service Key") dialled by the calling subscriber and launches a Transaction Capabilities Application Part (TCAP) query to the SCP after suspending further call processing. When a TCAP response is obtained from the SCP containing advice for further call processing, SSP resumes call processing.
The interface between the SCP and the SSP is G.703 digital trunk. The MTR, SCCP, TCAP and INAP protocols of the CCS7 protocol stack are defined in this interface.
 Service Control Point (SCP)
The SCP is a fault-tolerant online computer system. It communicates with the SSPs and the IP for providing guidelines on handling IN service calls. The physical interface to the SSPs is G.703 digital trunk. It communicates with the IP via the requesting SSP for connecting specialized resources.
SCP stores large amounts of data concerning the network, service logic, and the IN customers. For this, secondary storage and I/O devices are supported.

As has been commented before, the service programs and the data at the SCP are updated from the SMP.
 Service Management Point (SMP)
The SMP, which is a computer system, is the front-end to the SCP and provides the user interface. It is sometimes referred to as the Service Management System (SMS). It updates the SCP with new data and programs (service logic) and collects statistics from it. The SMP also enables the service subscriber to control his own service parameters via a remote terminal connected through dial-up connection or X.25 PSPDN. This modification is filtered or validated by the network operator before replicating it on the SCP.
The SMP may contain the service creation environment as well. In that case the new services are created and validated first on the SMP before downloading to the SCP.
One SMP may be used to manage more than one SCPs.
 Intelligent Peripheral (IP)
The IP provides enhanced services to all the SSPs in an IN under the control of the SCP. It is centralized since it is more economical for several users to share the specialized resources available in the IP which may be too expensive to replicate in all the SSPs. The following are examples of resources that may be provided by an IP:
·                     Voice response system
·                     Announcements
·                     Voice mail boxes
·                     Speech recognition system
·                     Text-to-speech converters
The IP is switch based or is a specialized computer. It interfaces to the SSPs via ISDN Primary Rate Interface or G.703 interface at which ISUP, INAP, TCAP, SCCP and MTP protocols of the CCS7 protocol stack are defined.
The IN architecture is depicted in Fig.1


 Fig 1 IN Architecture

 


5.3.2      Distributed Functional Plane
Functional model of IN contains nine functional entities (FE's) which are distributed over various physical entities (PE's) described in the previous section. A functional entity is a set of unique functions. Brief description of the FE's is given below :
 CCAF
Call Control Agent Function, gives users access to the network.
 CCF
Call Control Function provides the basic facility for connecting the transport (e.g. speech). It involves the basic switching function and trigger function for handling the criteria relating to the use of IN.
 SSF
Service Switching Function is used to switch calls based on the advice of the SCF at the SCP. This function provides a service independent interface.
 SCF
It contains the service logic components and advises the SSF at SSP on further call handling.
 SDF
Service Data Function contains the user related data and data internal to the network.
             SRF
Specialized Resources Function covers all types of specialized resources other than the connection resources that are in the exchange (e.g. recorded announcements, tones, conference bridges, etc.).
 SCEF
Service Creation Environment Function specifies, develops, tests and deploys the services on the network.
 SMAF
Service Management Access Function provides an interface between service management function and the service manager who may be an operator.
SMF
Service Management Function enables a service to be deployed and used on IN. Fig. 2 depicts the distribution and interconnection of the various functional entities.

 Fig. 2 Distributed Functional Entities
The distribution of functional entities over the physical entities and their inter-connection is summarized in Table 1 and 2 below. It may be noted that all the physical entities may not be present in all INs as the choice of functional entities to be provisioned is entirely up to the service provider.
Table 1
Distribution of FE's over PE's
Physical Entity
Possible Functional Entities
SSP
CCF, SSF, CCAF
SCP
SCF, SDF
SMP
SCEF, SMF, SMAF
IP
SRF

Table 2
FE-FE Relationship to PE-PE Relationship
FE-FE
PE-PE
Protocol
SSF-SCF
SSP-SCP
INAP, TCAP, SCCP and MTP
SCF-SDF
SCP-SDP
X.25 or Proprietary
SCF-SRF
SCP-IP
SCP-SSP-IP
INAP, TCAP, SCCP and MTP
ISUP, INAP, TCAP, SCCP and MTP
SRF-SSF
SSP-IP
ISUP and MTP

5.4     IN  Services

The IN services proposed to be introduced in Indian network have been derived from ITU-T recommendations. Q.1211 (April ’92). This document briefly gives the description of 25 services mentioned in Capability set no. 1 (CS1) of above mentioned ITU-T recommendations. CS1 basically deals with single ended services (which ITU-T calls as Type-A services). Single needed services apply to only one party in the call.
      1 ABD – Abbreviated dialing
The subscriber can register a short dialing code and use the same for access to any PSTN Number.
2        ACC – Account Card Calling
·                     A special telephone instrument is required.
·                     User dials an access code and gets acceptance tone.
·                     Then he dials a PIN (personal identification no.) code and dials the called no. The Exchange reads the account number from card.
·                     The Billing is debited to an account number (Telephone no.) as defined by the card.
·                     In another variation of the service, the account number can be given through DTMF telephone instrument.
·                     The follow-on feature facilitates the subscriber to dial another number without disconnecting the call and without need to dial PIN and account number again.
3        AAB – Automatic Alternative Billing
·                     Call can be initiated by any user and any instrument.
·                     The call charges are billed in user’s account and that account need not be a calling or a called party.
·                     The user first dials access code.
·                     Receives an announcement to dial account code and PIN(which is given by management).
·                     The account code and PIN are validated to check its correctness and expired credit limit.
·                     On getting acceptance tone the user dials the called number.
·                     In another variation of the service, the called party may be billed based on his concurrence.
4        CD – Call Distribution
§  This service allows subscribers to have I/C calls routed to different destinations according to allocation law specified by management (The Subscriber has multiple installations).
§  Three types of laws exist :
§  Uniform load distribution
§  % Load distribution
§  Priority list distribution
§  In case of congestion or fault the alternative over flow is specified.
5        CFU – Call Forwarding Unconditional
The subscriber can forward all incoming calls to a specified destination number. Optionally an alerting ring/reminder ring can be given to the forwarding subscriber whenever there is an incoming call.
6        CRD – Call Rerouting Distribution
·   Calls are rerouted as per conditions encountered, e.g. busy or no reply (time specified) or overload or call limiter.
·   Then as per selected condition the call is rerouted to predefined choice, e.g. paper, vocal box, announcement or queue.
                                                              i.      Completion of calls to busy subscriber
The service cannot be fully implemented with CSI capability since the status of called party need to be known.

·         The calls are completed when subscriber who is busy becomes free.
·         On getting busy tone – user dials a code.
·         The user disconnects.
·         On called party becoming free, call is made by the exchange first to originating then to terminating subscriber (without any call attempt by the user).
                                                                  ii.CON – Conference Calling
The service cannot be fully implemented with CSI capability. In adding or dropping the parties concerned it is not possible to check the authenticity of the parties. This service requires a special transmission bridge to allow conversation among multiple subscribers.

CON-Add-ON-Conference Calling
·         User reserves the CON resources in advance indicating date, time of conference and duration.
·         Controlled by user.
·         In active phase of conference parties can be added, deleted, isolated again reattached or split the group of parties.
CON-Meet-ME – Conference calling meet me
·         User reserve the resource same as 8A.
·         Each participant dials a special number at specific time (specified at the time of booking of conference) and reach the conference bridge.
                                                                iii.CCC – Credit Card Calling
·                     The Credit Card Calling service allows subscribers to place calls from any normal access interface to any destination number and have the cost of these calls charged to account specified by the CCC number.
·                     A special instrument is not required. The caller has to dial card number and PIN using DTMF instrument.
·                     Follow-on feature may be provided optionally.
                                                          iv.      DCR – Destination Call Routing
The call is routed to destination pertaining to following conditions :
·                     Time of day, day of week
·                     Area of call originating
·                     Calling identity of customer
·                     Services attributes (non payment charges against subscriber)
·                     Priority
·                     Charge rates applicable for destination
·                     Proportional routing of traffic
·                     Optionally the subscribers can be provided with traffic details
                                                            v.      FMD – Follow me Diversion
·                     A subscriber can remotely control the call forwarding capabilities.
·                     It can be done from any point in the network using a password.
·                     It is required if subscriber moves from place to place in a day.
·                     The service subscriber will pay for diverted portion of the call.
                                                          vi.      FPH – Free Phone
·                     The called subscriber is charged for active phase of a call.
·                     For the calling user, no charging is done.
·                     The called subscriber can have multiple destinations and have DCR facility.
                                                        vii.      MCI – Malicious Call Indication
·                     The subscriber requests the Administration to register his number for MCI.
·                     Administration registers the subscriber for MCI.
·                     The called subscriber (who has registered this service) invokes the service during the active phase of the call if he feels that the call is malicious.
·                     The call is logged in the network with calling and called party number and Date and time of invoking the service.
·                     Optionally, the network can log unanswered calls also.
·                     Optionally, the facility to HOLD the connection may be provided.
                                                         viii.   MAS – Mass Calling
·                     It involves high volume of traffic.
·                     Calls can be routed to one or multiple destinations depending on geographical location or time of day.
·                     Mainly used in Televoting.
·                     The network operator allots a service number.
·                     The user dials this number to register his vote.
·                     The user is played an announcement and asked to give his choice.
·                     At the end of the service, the network operator provides the call details and the count on various preferences.
·                     After the service the same number can be reallocated to another subscriber.
·                     Calls made to this MAS number may be charged differently.
                                                                ix.OCS – Originating Call Screening
·                     This helps subscriber to screen outgoing call as per day and time.
·                     The screening list may be managed by subscriber.
·                     The restriction of screening list may be override by PIN or password. Three call cases are possible :
-                      Call screened and allowed
-                      Call screened and rejected
-                      Call passed by using override option
                                                                  x.PRM – Premium Rate
·                     The local call is charged at a higher (premium) rate.
·                     This service is used by service providers for value added information services, e.g. jobs, fortune, forecast, etc.
·                     The revenue is shared between network operator and service provider.
·                     The network operator allots a specific number to service provider, which can be reached from any point in the network.
·                     The provision exists for multiple site provider, in order to achieve minimum expenditure on actual call.
                                                                xi.SEC – Security Screening
·                     This capability allows security screening to be performed in the network before an end user gains access to subscriber’s network, systems or application.
·                     It detects the invalid access attempts : how many, over what time period, by whom and from where.
·                     It provides an added layer of security.
                                                              xii.SCF – Selected Call Forwarding (Busy/Don’t answer)
·                     This facility is used for a group of 5 to 10 subscribers.
·                     A list of SCF is prepared by a subscriber.
·                     The list contains the choices as per conditions and calling subscribers  of the group.
·                     A call from outside the group is forwarded to default telephone number.
·                     The variation in SCF list can be done as per time of the day.
                                                            xiii.SPL – Split Charging
·                     It allows service subscriber to share the call charges with calling party on per call basis.
                                                            xiv.SOT - Televoting
·                     It is used to survey the public opinion by different agencies.
·                     The network operator allocates a single telephone number to surveyor.
·                     Each time user makes a call he can get access to televoting.
·                     An announcement asks him to input further choice digits as per preference.
·                     As the user presses the digits the choice counter is incremented.
·                     After voting is ceased the service subscriber is supplied the results.
                                                              xv.TCS – Terminating Call Screening
·                     The incoming calls are screened as per screening list.
·                     Calls are allowed as per list and time of the day.
                                                            xvi.UAN – Universal Access Number
·                     National number is published by the subscriber.
·                     The subscriber may specify the incoming calls to be routed to number of different destinations based on geographical locations of caller.
                                                          xvii.UPT – Universal Personal Telecommunications
·                     A universal number is defined.
·                     Whenever subscriber changes the destination, he inputs that number from telephone.
·                     When a call comes, UPT number is translated to actual number.
·                     This number can be accessed across various multiple networks, e.g. mobile and fixed.
·                     It can be accessed from any user network access.
                                                        xviii.UDR – User Defined Routing
·                     The user is allowed to define the routing of outgoing calls through different network such as private, public, virtual or mixed network.
·                     As per time of the day, for example the call is routed to either public or private network whichever is cheaper.
·                     For example, outstation calls can have different routes at different times of the day.
                                                            xix.VPN – Virtual Private Network
·                     A private network is built using public network resources.
·                     A virtual PABX is created using different switches.
·                     A PNP (private numbering plan) can be incorporated on those numbers.
·                     Facilities such as CT, CH, dialed restrictions and other supplementary services can be provided within the network.
·                     Each line or user is assigned a class of service and specific rights in the network.
·                     To access the VPN from outside by one of VPN user, he is required to dial a password.
·                     Screening feature can be used to put restriction on outgoing and incoming calls.
·                     Call charges are assigned to VPN service subscriber.
·                     Additional Account Codes are assigned to service subscriber to analyse the costline wise.

5.     Charging
The IN services can be broadly divided into three categories for charging purposes :
-        No charging for calling user
-        Charging of calling user as per local call
-        Charging of calling user at higher rates

5.1    No charging for calling user : FPH, VCC and VPN services fall under this category. Level ‘160’ is free at present and is proposed to be allotted to such services. Local exchanges need to analyse only ‘160’ and route the call to SSP. This level has to be created as charge free. New services of this type can be introduced in future without any requirement of further modification in local exchanges.

5.2       Charging of calling user as per local call :UN (local) falls under this category. Level ‘190’ is free at present and is proposed to be allotted to such services. Local exchanges need to analyse only ‘190’ and route the call to SSP. This level has to be created as local charge. New services of this type can be introduced in future without any requirement of further modification in local exchanges.

5.3                 Charging of calling user at higher rates : PRM and UN (long distance) falls under this category. Since the charging is at higher rate it is proposed that prefix ‘0’ may be used to have barring facility. Level ‘090’ may be used for such purpose. Local exchange will analyse ‘090’ and route the call to SSP. This level has to be created as ‘charge on junction pulses’. New services of this type can be introduced in future without any requirement of further modification in local exchanges.


The access code of various IN services as proposed is as follows :

No charging for calling user :
FPH                                          1600
VCC                                         1601
Password change for VCC       1602
VPN                                         1603

Charging of calling user as per local call :
UN (local)                                 1901
Televoting                                 1902

Charging of calling user at higher rates :
PRM                                         0900
UN (Long distance)                 0901

CDOT IN System

First system(SCP) was deployed at Kolkata in December 1998 and subsequently at Bangalore, Ahemedabad and Lucknow. The capacity of CDOT-IN system is 1 Lakh BHCA and 10 Lakh VCC data. Number of CDoT SSP (MBM or SBM) is 200 nos. The services supported are

·      Virtual Card Calling VCC(ITC).

·      Account Card Calling ACC.

·      Free Phone Service FPH.

·      Premium Rate Number PRM.

·      Virtual Private Network VPN.

·      Televoting VOT.



Present traffic status in CDoT IN systems


SCP(C-DOT)
BHCA
IT card data
Kolkata
1.25 lakh
0.89 Million
Bangalore
1.2 Lakh
0.95 Million
Lucknow
1.15 Lakh
0.76 Million
Ahmedabad
0.85 Lakh
0.83 Million

Limitations of CDoT IN System


Following are the limitations of CDOT-IN systems:

·              Low and fixed SCP and SSP BHCA capacity.

·              Non-upgradable and scalable.

·              Low VCC Data capacity.

·              Limited resources for Announcement, DTMF, etc.

·              SSP functionality of switches not utilised.

·              Network based charging.

·              Additional services not available.

·              Limited Charging categories.

Alcatel IN System

The salient features of Alcatel IN systems are:

·        SCP capacity of 4 Lakhs BHCA which can grow upto 12 Lakhs BHCA.

·        50 Lakhs VCC Data storage capacity.

·        Integrated solution utilising the SSP capabilities of large capacity digital switches.

·        More features on IN services and management options.

·        SCP based charging.

·        Can be upgraded in terms of capacity and additional IN services.

·        Separate IP for independent resource management.

Types of IN Platform procured by BSNL from M/s. Alcatel

·        General Purpose IN Platform (GPIN).

SCP located at Kolkata, Lucknow, Ahmedabad and Bangalore catering to East, North, West and South zone Circles respectively.

·        Mass Calling IN Platform (MCIN).

SCP located at Hyderabad catering to Whole of India.


IN Services provided by Alcatel IN Platform

The services provided by Alcatel IN Platform are:

·            Account Card Calling (ACC).

·            Free Phone (FPH).

·            Universal Access Number (UAN).

·            Virtual Private Number (VPN).

·            Televoting (VOT).

·            Premium Rate (PRM).

·            Virtual Card Calling (VCC).

·            Universal Personal Number (UPN). - NEW

·            Number Portability (NP). – NEW

Virtual Card Calling (VCC)

·            This service is similar to the ACC. Here subscriber has to dial 16-digit card number to place a valid call.

·             Cards of fixed amount will be sold. The card number will be invalid after expiry of the amount or validation period. This account cannot be renewed.

·             No detailed bill will be provided to the subscriber.



Call Placement using VCC card

·         Dial 1602 345.

·         You will be prompted to dial your card number.

·         You will be prompted the balance amount in the account followed by request to dial the destination number.

·         A VCC Call: 1602 345<A><10 digit card No.> <A><Destination No.>

VCC Features


The features of VCC are as follows:

  • Multiple Language Choices- New
  • Profile Concept
  • Credit Limit- New
    • Minimum Credit to use the service
    • Minimum credit to make a call
    • Real Time Credit Supervision
    • Warning Tone- New
  • Follow On Calls
    • Called Party On Hook
    • Called Party No Reply
    • Called Party Busy
·                     Black List- New
·                     Predefined Promotional Number- New
·                     National/International Call Restriction
·                     Call log
·                     Payphone restrictions- New
·                     16 digit secret number will be used

Free Phone (FPH) Service

·              Here the concept of reverse charging is applied with additional features.

·              The service subscriber will have one logical number against more than one PSTN no. distributed all over the network.

·              He can have his own routing plan using Time Dependent Routing, Origin Dependent Routing facilities.

FPH Access

In other words, this service allows users to make calls to a free phone number    for which the called party has agreed to pay for the complete cost of the call.

§Access code: 1600 345

§Free phone number: XXXX (4 digits)

§Access can be from any Telephone and it will not be charged.

§  Dial 1600 345 XXXX





SAC and SK for services at Kolkata

 

Sl. No.
Service Name
SAC
SK
Sl. No.
Service Name
SAC
SK
1
VCC
1602345
1
7
UAN (MGMT)
1903345
5
2
ACC
1604345
2
8
UPN
0902345
6
3
FPH
1600345
3
9
UPN (MGMT)
1607345
6
4
PRM
0900345
4
10
VPN
1601345
9
5
UAN (LOCAL)
1901345
5
11
VOT
1902424 (Local charge)
7
6
UAN (LONG DISTANCE)
0901345
5
12
VOT
1603424 (no charge)
7

 



No comments:

Post a Comment