(Ebook) Architecting the Telecommunication Evolution:
Toward Converged Network Services (Informa Telecoms &
Media) by Vijay K. Gurbani, Xian-He Sun ISBN
9780849395673, 0849395674 Pdf Download
https://ebooknice.com/product/architecting-the-telecommunication-
evolution-toward-converged-network-services-informa-telecoms-
media-1479124
★★★★★
4.9 out of 5.0 (62 reviews )
DOWNLOAD PDF
ebooknice.com
(Ebook) Architecting the Telecommunication Evolution: Toward
Converged Network Services (Informa Telecoms & Media) by
Vijay K. Gurbani, Xian-He Sun ISBN 9780849395673, 0849395674
Pdf Download
EBOOK
Available Formats
■ PDF eBook Study Guide Ebook
EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME
INSTANT DOWNLOAD VIEW LIBRARY
We have selected some products that you may be interested in
Click the link to download now or visit ebooknice.com
for more options!.
(Ebook) Biota Grow 2C gather 2C cook by Loucas, Jason; Viles,
James ISBN 9781459699816, 9781743365571, 9781925268492,
1459699815, 1743365578, 1925268497
https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374
(Ebook) Triple Play: Building the converged network for IP, VoIP
and IPTV (Telecoms Explained) by Francisco J. Hens, José M.
Caballero ISBN 9780470753675, 9780470754399, 0470753676,
0470754397
https://ebooknice.com/product/triple-play-building-the-converged-network-
for-ip-voip-and-iptv-telecoms-explained-1979484
(Ebook) Business Strategies for the Next-Generation Network
(Informa Telecoms & Media) by Nigel Seel ISBN 0849380359
https://ebooknice.com/product/business-strategies-for-the-next-generation-
network-informa-telecoms-media-2247870
(Ebook) Matematik 5000+ Kurs 2c Lärobok by Lena Alfredsson, Hans
Heikne, Sanna Bodemyr ISBN 9789127456600, 9127456609
https://ebooknice.com/product/matematik-5000-kurs-2c-larobok-23848312
(Ebook) Vagabond, Vol. 29 (29) by Inoue, Takehiko ISBN
9781421531489, 1421531488
https://ebooknice.com/product/vagabond-vol-29-29-37511002
(Ebook) SAT II Success MATH 1C and 2C 2002 (Peterson's SAT II
Success) by Peterson's ISBN 9780768906677, 0768906679
https://ebooknice.com/product/sat-ii-success-math-1c-and-2c-2002-peterson-
s-sat-ii-success-1722018
(Ebook) Value-Added Services for Next Generation Networks
(Informa Telecoms & Media) by Thierry Van de Velde ISBN
9780849373183, 9781420013535, 0849373182, 142001353X
https://ebooknice.com/product/value-added-services-for-next-generation-
networks-informa-telecoms-media-2013256
(Ebook) Master SAT II Math 1c and 2c 4th ed (Arco Master the SAT
Subject Test: Math Levels 1 & 2) by Arco ISBN 9780768923049,
0768923042
https://ebooknice.com/product/master-sat-ii-math-1c-and-2c-4th-ed-arco-
master-the-sat-subject-test-math-levels-1-2-2326094
(Ebook) Cambridge IGCSE and O Level History Workbook 2C - Depth
Study: the United States, 1919-41 2nd Edition by Benjamin
Harrison ISBN 9781398375147, 9781398375048, 1398375144,
1398375047
https://ebooknice.com/product/cambridge-igcse-and-o-level-history-
workbook-2c-depth-study-the-united-states-1919-41-2nd-edition-53538044
AU9567_C000.fm Page i Friday, July 28, 2006 1:31 PM
ARCHITECTING THE
TELECOMMUNICATION
EVOLUTION
© 2007 by Taylor & Francis Group, LLC
AU9567_C000.fm Page ii Friday, July 28, 2006 1:32 PM
OTHER TELECOMMUNICATIONS BOOKS FROM AUERBACH
Active and Programmable Networks for A Practical Guide to Content Delivery
Adaptive Architectures and Services Networks
Syed Asad Hussain Gilbert Held
ISBN: 0-8493-8214-9 ISBN: 0-8493-3649-X
Business Strategies for the Next-Generation Resource, Mobility and Security
Network Management in Wireless Networks
Nigel Seel and Mobile Communications
ISBN: 0-8493-8035-9 Yan Zhang, Honglin Hu, and Masayuki Fujise
ISBN: 0-8493-8036-7
Chaos Applications in
Telecommunications Service-Oriented Architectures
Peter Stavroulakis in Telecommunications
ISBN: 0-8493-3832-8 Vijay K Gurbani, Xian-He Sun
ISBN: 0-8493-9567-4
Context-Aware Pervasive Systems:
Architectures for a New Breed of Applications TCP Performance over UMTS-HSDPA Systems
Seng Loke Mohamad Assaad and Djamal Zeghlache
ISBN: 0-8493-7255-0 ISBN: 0-8493-6838-3
Fundamentals of DSL Technology Testing Integrated QoS of VoIP: Packets
Philip Golden, Herve Dedieu, Krista S Jacobsen to Perceptual Voice Quality
ISBN: 0-8493-1913-7 Vlatko Lipovac
ISBN: 0-8493-3521-3
IP Multimedia Subsystem: Service
Infrastructure to Converge NGN, Traffic Management in IP-Based
3G and the Internet Communications
Rebecca Copeland Trinh Anh Tuan
ISBN: 0-8493-9250-0 ISBN: 0-8493-9577-1
Mobile Middleware Understanding Broadband over
Paolo Bellavista and Antonio Corradi Power Line
ISBN: 0-8493-3833-6 Gilbert Held
ISBN: 0-8493-9846-0
MPLS for Metropolitan Area Networks
Nam-Kee Tan WiMAX: A Wireless Technology
ISBN: 0-8493-2212-X Revolution
G.S.V. Radha Krishna Rao, G. Radhamani
Network Security Technologies, ISBN: 0-8493-7059-0
Second Edition
Kwok T Fung WiMAX: Taking Wireless to the MAX
ISBN: 0-8493-3027-0 Deepak Pareek
ISBN: 0-8493-7186-4
Performance Modeling and Analysis of
Bluetooth Networks: Polling, Scheduling, Wireless Mesh Networks
and Traffic Control Gilbert Held
Jelena Misic and Vojislav B Misic ISBN: 0-8493-2960-4
ISBN: 0-8493-3157-9
Wireless Security Handbook
Performance Optimization of Digital Aaron E Earle
Communications Systems ISBN: 0-8493-3378-4
Vladimir Mitlin
ISBN: 0-8493-6896-0
AUERBACH PUBLICATIONS
www.auerbach-publications.com
To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401
E-mail: [email protected]
© 2007 by Taylor & Francis Group, LLC
AU9567_C000.fm Page iii Friday, July 28, 2006 1:33 PM
ARCHITECTING THE
TELECOMMUNICATION
EVOLUTION
Toward Converged Network Services
Vijay K. Gurbani
Xian-He Sun
Boca Raton New York
Auerbach Publications is an imprint of the
Taylor & Francis Group, an informa business
© 2007 by Taylor & Francis Group, LLC
AU9567_C000.fm Page iv Friday, July 28, 2006 1:47 PM
Auerbach Publications
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2007 by Taylor & Francis Group, LLC
Auerbach is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Printed in the United States of America on acid-free paper
10 9 8 7 6 5 4 3 2 1
International Standard Book Number-10: 0-8493-9567-4 (Hardcover)
International Standard Book Number-13: 978-0-8493-9567-3 (Hardcover)
This book contains information obtained from authentic and highly regarded sources. Reprinted
material is quoted with permission, and sources are indicated. A wide variety of references are
listed. Reasonable efforts have been made to publish reliable data and information, but the author
and the publisher cannot assume responsibility for the validity of all materials or for the conse-
quences of their use.
No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any
electronic, mechanical, or other means, now known or hereafter invented, including photocopying,
microfilming, and recording, or in any information storage or retrieval system, without written
permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.
copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC)
222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that
provides licenses and registration for a variety of users. For organizations that have been granted a
photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
are used only for identification and explanation without intent to infringe.
Library of Congress Cataloging-in-Publication Data
Gurbani, Vijay K.
Architecting the telecommunication evolution : toward converged network
services / Vijay K. Gurbani and Xian-He Sun.
p. cm.
ISBN 0-8493-9567-4 (alk. paper)
1. Telecommunication systems. 2. Computer networks. I. Sun, Xian-He. II.
Title.
TK5101.G79 2006
384--dc22 2006045976
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the Auerbach Web site at
http://www.auerbach-publications.com
© 2007 by Taylor & Francis Group, LLC
AU9567_C000.fm Page v Tuesday, July 11, 2006 10:41 AM
Dedication
To my parents, for their love; to my wife, for her understanding;
to my children, for their future.
Vijay K. Gurbani
To my parents, Yu Lin ( ) and Chang-Xiang Sun ( ), my wife,
Hong Zhang ( ), and my children, Linda and Alan.
Xian-He Sun, ( )
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page vii Tuesday, July 11, 2006 10:15 AM
Table of Contents
Foreword ........................................................................................... xiii
The Authors.........................................................................................xv
Acknowledgments ........................................................................... xvii
List of Abbreviations and Symbols ................................................. xix
1 Introduction..................................................................................1
1.1 The Evolution of Internet Telephony 3
1.2 Problem Statement 4
1.3 Solutions 5
1.3.1 The First Stage: Accessing Native PSTN Services
from Internet Telephony Endpoints 6
1.3.2 The Second Stage: PSTN Events as a Precursor
for Internet Services 6
1.3.3 The Third Stage: Pervasive Computing
and Telecommunication Services 7
2 Internet Telephony: The Evolution to a Service-Oriented
Architecture ..................................................................................9
2.1 Introduction 10
2.2 Service Architecture for Traditional Telephone Network 11
2.3 Internet Services Architecture 13
2.4 Requirements of a Telecommunications SOA 14
2.5 Conclusion 18
3 Background: Providing Telephony Service .............................21
3.1 Service Architecture for the Wireline Public Switched
Telephone Network 22
3.1.1 General Architecture of the PSTN 22
vii
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page viii Tuesday, July 11, 2006 10:15 AM
viii Architecting the Telecommunication Evolution
3.1.2 The Intelligent Network 24
3.1.3 The IN Conceptual Model 25
3.1.3.1 Service Plane 25
3.1.3.2 Global Functional Plane 26
3.1.3.3 Distributed Functional Plane 27
3.1.3.4 Physical Plane 27
3.1.4 Physical Entities in an IN-Enabled Network 27
3.1.4.1 Service Switching Point (SSP) 28
3.1.4.2 Service Data Point (SDP) 29
3.1.4.3 Service Control Point (SCP) 29
3.1.4.4 Intelligent Peripheral 30
3.1.4.5 Adjunct 30
3.1.4.6 Service Node (SN) 30
3.1.4.7 Service Creation Environment Point (SCEP) 30
3.1.4.8 Service Management Point (SMP) 30
3.1.5 The Basic Call State Machine, Points in Call,
and Detection Points 30
3.1.6 The IN Capability Sets 33
3.1.7 Originating BCSM (O_BCSM) 34
3.1.8 Terminating BCSM (T_BCSM) 38
3.2 Service Architecture for the Cellular Public Switched
Telephone Network 41
3.2.1 Physical Entities in WIN 42
3.2.1.1 Mobile Switching Center (MSC) 43
3.2.1.2 Base Station (BS) 43
3.2.1.3 Authentication Center (AC) 43
3.2.1.4 Home Location Register (HLR) 43
3.2.1.5 Visitor Location Register (VLR) 44
3.2.1.6 Short Message Entity (SME) 44
3.2.1.7 Message Center (MC) 44
3.2.2 WIN PICs and DPs 44
3.3 Service Architecture for Internet Telephony 45
3.3.1 Service Specification in Internet Telephony 47
3.3.1.1 SIP CGI 47
3.3.1.2 CPL 47
3.3.1.3 SIP Servlets 48
3.3.2 Service Residency in Internet Telephony 48
4 Comparative Analysis of Signaling Protocols .........................49
4.1 Desirable Properties of a Candidate Protocol 49
4.1.1 Widespread Acceptance 50
4.1.2 Protocol Expressiveness 50
4.1.3 Protocol Extensibility 50
4.1.4 Primitives for Capability Description and Negotiation 50
4.1.5 Transaction-Style Message Exchanges 50
4.1.6 Support for an Event-Based Communications Model 51
4.1.7 Support for a Flexible Naming Scheme 51
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page ix Tuesday, July 11, 2006 10:15 AM
Table of Contents ix
4.2 Protocols Evaluated 51
4.2.1 BICC 51
4.2.2 H.323 52
4.2.3 SIP 53
4.3 Comparative Analysis 59
4.4 The Novel SIP-Based Approach 61
5 Crossover Services Originating on the Internet .....................63
5.1 Introduction 63
5.2 Motivation 64
5.2.1 Rewrite Services for Internet Telephony 64
5.2.2 Using a Platform-Neutral Service Creation and
Execution Environment 65
5.2.3 Exploring New Techniques to Reuse Existing Services 65
5.3 Call Model Mapping with State Sharing (CMM/SS) 66
5.3.1 CMM/SS: Preliminaries 66
5.3.2 CMM/SS: The Technique and Algorithms 67
5.3.3 CMM/SS: State Sharing and Global State 69
5.3.4 CMM/SS: Issues 71
5.4 Implementing CMM/SS 72
5.4.1 CMM/SS Considerations 73
5.4.1.1 The Concept of a Call State Model in SIP 74
5.4.1.2 Relationship between an SCP and a CMM/SS Entity 76
5.4.1.3 Support of Announcements and Mid-Call Signaling 76
5.4.2 CMM/SS Architectural Model 76
5.4.3 Realizing CMM/SS in Software 77
5.4.4 Applying the Mapping 79
5.4.4.1 Mapping SIP to O_BCSM 79
5.4.4.2 Mapping SIP to T_BCSM 83
5.5 Results from CMM/SS 87
5.5.1 Network Topology 88
5.5.2 Results 89
5.5.3 Service Description and Call Flows 90
5.5.3.1 Originating Call Screening (OCS) 90
5.5.3.2 Abbreviated Dialing (AD) 91
5.5.3.3 Call Forwarding (CF) 92
5.5.3.4 Calling Name Delivery (CNAM) 92
5.6 Performance of CMM/SS 93
5.7 CMM/SS: A General Solution 95
5.8 Limitations of CMM/SS 96
5.9 Related Work 98
5.10 Conclusion 100
6 Crossover Services Originating on the Public Switched
Telephone Network..................................................................101
6.1 Introduction 102
6.1.1 Motivation 102
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page x Tuesday, July 11, 2006 10:15 AM
x Architecting the Telecommunication Evolution
6.1.2 Genealogy and Relation to Standards Activities 103
6.1.3 Contributions 105
6.2 Architecture for PSTN-Originated Crossover Services 105
6.3 Research Challenges 108
6.3.1 Choosing Target Events 108
6.3.1.1 Call-Related Events 108
6.3.1.2 Noncall-Related Events 108
6.3.1.3 Application-Specific Events 111
6.3.2 Modeling PSTN-Originated Crossover Services as a
Wide Area Event Notification Service 111
6.3.3 Representing the Events 112
6.3.4 Choosing a Protocol 115
6.3.5 Aggregating Events before Publication 117
6.3.6 Scalability of the EM 117
6.3.7 Privacy, Security, and Trust 118
6.4 An XML Schema to Represent Events in the PSTN 118
6.4.1 The <spirits-event> Element 118
6.4.2 The <Event> Element 119
6.5 Proposed Extensions to SIP 120
6.5.1 The Asynchronous Event Notification Framework in SIP 120
6.5.2 The Extensions 121
6.5.2.1 The spirits-INDPs Event Package 122
6.5.2.2 The spirits-user-prof Event Package 123
6.6 Examples 124
6.6.1 Notification of Missed Calls 125
6.6.2 Presence for a Principal Using a Wireline PSTN Endpoint 127
6.6.3 Presence for a Principal Using a Cellular PSTN Endpoint 129
6.6.4 Helping First Responders 130
6.6.5 Schema Extension: Notifications for Low Prepaid
Card Balance 131
6.7 A Taxonomy of PSTN-Originated Crossover Services 131
6.8 SIP: The Distributed Middleware 133
6.9 Related Work 136
6.10 Conclusion 137
7 Smart Spaces in the Telecommunications Domain ..............139
7.1 Introduction 140
7.2 Research Thrusts of Pervasive Computing 142
7.2.1 Effective Use of Smart Spaces 142
7.2.2 Invisibility 142
7.2.3 Localized Scalability 143
7.2.4 Masking Uneven Conditions 143
7.3 Implementing a Telecommunications
Smart Space 143
7.3.1 The Main Actors 144
7.3.2 Authentication and Encryption 144
7.3.3 Policies 147
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page xi Tuesday, July 11, 2006 10:15 AM
Table of Contents xi
7.3.4 Constructing a Telecommunications Smart Space 149
7.3.4.1 The Presence Service 151
7.3.4.2 Availability 155
7.3.4.3 An IM from the Telephone Network 158
7.3.4.4 Transforming an SMS to an IM 162
7.3.4.5 Location-Based Services 164
7.4 Design and Implementation of the Event Manager 166
7.4.1 Design of the EM 167
7.5 Performance Analysis of the Event Manager 170
7.5.1 Assumptions and Realities 170
7.5.2 Determining Service Time per Event 171
7.5.3 Calculating Blocking Probability: Erlang-B Analysis 172
7.5.4 Modeling the Event Manager as an M/D/1 Queue 174
7.6 Related Work 176
7.7 Conclusion 179
8 Conclusions...............................................................................181
Appendices
A The SPIRITS (Services in PSTN Requesting Internet
Services) Protocol.....................................................................185
B Interworking SIP and Intelligent Network (IN)
Applications ..............................................................................235
C XML Schema for PSTN Events .................................................261
D XML Schema for SMS to IM .....................................................265
E Raw Data for Event Manager Performance Analysis............267
F Bibliography .............................................................................269
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page xiii Tuesday, July 11, 2006 10:15 AM
Foreword
Internet Telephony can be defined as the conversational exchange of
voice or more generally multimedia data over packet switched networks.
It is no longer novel. The first two-party voice call over a packet switched
network was made in the ’70s as part of the Network Secure Communi-
cations project run by the Advanced Research Projects Agency (ARPA).
After this first experiment, a handful of proprietary systems were developed
in the ’80s. It is only in the late ’90s and early ’00s that wide spr ead
standards came to life.
Two main sets of standards have emerged: H.323 from the ITU-T and
the session initiation protocol (SIP) from the IETF. SIP is certainly now
the prime set of standards because it has been adopted by the main
telecommunications standards bodies including the Third Generation Part-
nership Projects (3GPP/3GPP2). 3GGP and 3GPP2 are the bodies that are
specifying the third generation mobile networks. Although SIP is today
the most prominent set of Internet Telephony standards, H.323 remains
a prominent standard due to its installed base, especially in the enterprise
environments.
Two-party voice call is the basic service provided by Internet Telephony
service providers. Value added services, or more simply services, can be
defined as anything that go beyond this basic service. These are critical
to the success and survival of telephony service pr oviders. Different
paradigms are used in the public switched telephony network (PSTN) and
in Internet Telephony for providing these services. On the one hand, the
intelligent network (IN) is the main paradigm used in the PSTN. On the
other hand, SIP servlets, and SIP CGI are examples of paradigms used in
Internet Telephony.
xiii
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page xiv Tuesday, July 11, 2006 10:15 AM
xiv Architecting the Telecommunication Evolution
Evolving from the current PSTN to Internet Telephony is not an easy
task. A possible starting point is to enrich the set of PSTN services by taking
advantage of the most widely deployed packet switched infrastructure today:
the Internet. Services such as the well-known Internet call waiting can be
deployed in this manner. The IETF has realized this and has produced a
protocol in that regard, the SPIRITS (Services in PSTN requesting Internet
Services) protocol. In much the same way services originating in the PSTN
use services on the Internet, services originating on the Internet can also
use services in the PSTN. A well-known example, click to dial, shows
another way of enriching PSTN services by taking advantage of the Internet.
This book focuses on how the evolution can be architected. It introduces
Internet Telephony, provides background information on how value added
services can be engineered in both traditional circuit switched telephony
and Internet Telephony. It then dives into how the set of PSTN services
can be significantly enhanced by taking advantage of the Internet. The
services originating in the Internet and using PSTN services and services
originating in the PSTN and using the Internet are successively presented.
The two authors are uniquely qualified to explain how this evolution
can be architected. Vijay K. Gurbani is a co-author of the two RFCs
produced by the IETF on the topic. In addition, he has published several
papers on the same topic in prestigious journals and conference proceed-
ings. Xian-He Sun is also a preeminent researcher in the field of high
performance computing and communication. Both authors have used their
unique expertise to produce this very first book on the topic.
Roch Glitho, Ph.D.
Editor-in-Chief, IEEE Communications Magazine, 2003–2005
Technical Expert, Service Layer Technologies/Ericsson Canada
Concordia University, Montreal, Canada
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page xv Tuesday, July 11, 2006 10:15 AM
The Authors
Vijay K. Gurbani is a distinguished member of the technical staff in the Security
Technology Research Group in Bell Laboratories, the research division of
Lucent Technologies, Inc. He holds a Ph.D. in Computer Science from the
Illinois Institute of Technology, Chicago, Illinois, and a M.Sc. and B.Sc., both
in Computer Science, from Bradley University, Peoria, Illinois. Vijay’s current
work focuses on security aspects of next generation signaling protocols. His
earlier work involved the use of SIP-based services which use the public
switched telephone network (PSTN) and the Internet. He is the author of
two Internet Engineering Task Force RFCs which use SIP as a facilitator for
services spanning the Internet and the PSTN. His research interests are Internet
telephony services, security in network protocols, Internet telephony signaling
protocols, pervasive computing in the telecommunications domain, distributed
systems programming, and programming languages. Vijay holds two patents
and has six applications pending with the U.S. Patent Office. He is a member
of the ACM and IEEE Computer Society.
Xian-He Sun is a professor of computer science at the Illinois Institute of
Technology (IIT), the director of the Scalable Computing Software (SCS)
laboratory at IIT, and a guest faculty in the Mathematics and Computer
Science Division at the Argonne National Laboratory. He received a B.S. in
Mathematics from Beijing Normal University, P.R. China, and holds his M.S.
in Mathematics and Ph.D. in Computer Science from Michigan State Uni-
versity. Before joining IIT, he was a post-doctoral researcher at the Ames
National Laboratory, a staff scientist at the ICASE, NASA Langley Research
Center, an ASEE fellow at the Naval Research Laboratories, and a professor
at the Louisiana State University–Baton Rouge. He is an internationally
renowned researcher in scalable high performance computing and commu-
nication. He has published over 100 articles and papers in the area of high-
performance and distributed computing and communication.
xv
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page xvii Tuesday, July 11, 2006 10:15 AM
Acknowledgments
I am grateful to the many people who have made this book possible. It
always goes without saying that the contributions to complete a project of
this nature come from many sources. I am also indebted to Bell Laboratories,
Lucent Technologies, Inc. for providing an atmosphere that has supported
this work. The students of Prof. Xian-He Sun’s Scalable Computer Systems
Laboratory aided in many aspects of the work described in this book.
Specifically, I thank Charles Jodel for spending his Thanksgiving transcribing
portions of this publication.
VKG
Like many of my peers growing up in China during the Cultural Revolution,
I did not receive a good education as a youth and began working full time
at age 15. From taking the college entry exam to arriving in America for
advanced study, from locating my first research position to receiving my
first research grant, I have had many failures and few successes. I am
heartily grateful to the many people who have helped me to make the
few successes that define who I am today.
XHS
xvii
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page xix Tuesday, July 11, 2006 10:15 AM
List of Abbreviations
and Symbols
Abbreviation Definition
λ Arrival rate per time unit
µ Service rate per time unit
ρ Traffic intensity
∅(x) Call Model Mapping function
Pα Policy tuple
φ Constraint on Pα
B(c, ρ) Erlang-B blocking probability
2G Second Generation network
2.5G Data enhanced Second Generation network
3G Third Generation network
3GPP Third Generation Partnership Project
AC Authentication Center
API Application Programming Interface
ATM Asynchronous Transfer Mode
B2BUA Back-to-Back User Agent
BCSM Basic Call State Model
BS Base Station
CA Certificate Authority
CGI Common Gateway Interface
CMM/SS Call Model Mapping with State Sharing
CO Central Office
CORBA Common Object Request Broker Architecture
CPL Call Processing Language
xix
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page xx Tuesday, July 11, 2006 10:15 AM
xx Architecting the Telecommunication Evolution
CSN Circuit Switched Network
CTI Computer Telephony Integration
DNS Domain Name Service
DP Detection Point
DTMF Dual Tone Multi-Frequency
EM Event Manager
FE Functional Entity
FEA Functional Entity Action
FSM Finite State Machine
FTP File Transfer Protocol
GPS Geographical Positioning System
HLR Home Location Register
HTTP Hypertext Transfer Protocol
IANA Internet Assigned Numbers Authority
ICW Internet Call Waiting
IETF Internet Engineering Task Force
IF Information Flow
IM Instant Message (or Instant Messaging)
IN Intelligent Network
INAP Intelligent Network Application Part
IP Internet Protocol, also Intelligent Peripheral
ISUP ISDN User Part
ITU International Telecommunication Union
ITU-T International Telecommunication Union–Telecommunication
Standardization Sector
JAIN Java API for Integrated Networks
JCAT Java Coordination and Transactions
JCC Java Call Control
JTAPI Java Telephony Application Programming Interface
MC Message Center
MIME Multipurpose Internet Mail Extensions
MSC Mobile Switching Center
O_BCSM Originating Basic Call State Model
OSA Open Services Architecture
PDU Protocol Data Unit
PE Physical Entity
PIC Point(s) in Call
PSTN Public Switched Telephone Network
RFC Request For Comment
RPC Remote Procedure Call
RTP Real-time Transport Protocol
SCEP Service Creation Environment Point
SCP Service Control Point
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page xxi Tuesday, July 11, 2006 10:15 AM
List of Abbreviations and Symbols xxi
SDP Session Description Protocol, also Service Data Point
SIB Service Independent Building Block
SIP Session Initiation Protocol
SME Short Message Entity
SMP Service Management Point
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SN Service Node
SOAP Simple Object Access Protocol
SS7 Signaling System Number 7
SSP Service Switching Point
T_BCSM Terminating Basic Call State Model
TCAP Transaction Capabilities Part
TDM Time Division Multiplexing
TINA Telecommunications Information Networking Architecture
TLS Transport Layer Security
UAC User Agent Client
UAS User Agent Server
UDDI Universal Description, Discovery and Integration
URI Uniform Resource Identifiers
VLR Visitor Location Register
WIN Wireless Intelligent Network
W-LAN Wireless Local Area Network
WWW World Wide Web
XML eXtensible Markup Language
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page 1 Tuesday, July 11, 2006 10:15 AM
Chapter 1
Introduction
Service-oriented computing is the computing discipline that views services
as the fundamental elements for developing applications and solutions
[PAP03]. This book is about orchestrating services that execute across
different networks and answering the challenges such an arrangement
inevitably poses. Specifically, we explore service-oriented computing in
the context of enabling cross-network services between two communica-
tion networks: the Internet and the public switched telephone network
(PSTN). We use the term PSTN in this book to encompass two aspects of
the switched telephone network: wireline networks and cellular networks.
Unless specified otherwise, the term will refer to both aspects of the
switched telephone network.
We define a service as a value-added functionality provided by network
operators to network users. Thus, making or receiving a call is a PSTN
service, as is call waiting and caller identification. Instant messaging (IM),
presence, electronic mail, and the World Wide Web (WWW) are examples
of Internet services. We are primarily concerned with two networks in
use today: the Internet and the PSTN. To a great extent, these networks
have been influenced by each other. For instance, since the early days of
the Internet, the PSTN infrastructure (telephone lines) has been used to
transport Internet traffic. Even today, Internet users routinely access the
Internet through their phones. Conversely, the Internet is perfectly capable
of digitizing voice traffic between two communicating users and trans-
porting it as data packets. However, much more advanced interactions
are possible between the two networks — interactions that go beyond
one network using the other as mere transport. The association of the
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page 2 Tuesday, July 11, 2006 10:15 AM
2 Architecting the Telecommunication Evolution
PSTN and the Internet in this manner (i.e., one network using the other
as transport) was simply a very early prerequisite of the more advanced
interactions that are proposed in this book.
The general realm of this book lies in Internet telephony; however,
Internet telephony subsumes a substantial body of knowledge and area
of research. The most visible form of Internet telephony is Voice-over-IP
(VoIP), which can be defined as the ability to packetize and transport
predominantly voice, but generally any communication-based content,
including video and facsimile, over the Internet instead of the PSTN.
However, Internet telephony is more than VoIP; it also encompasses
aspects of an enhanced communication experience using the services of
a general-purpose network such as the Internet.
Internet telephony does not exist in a vacuum, it coexists with incum-
bent networks (PSTN) and technologies; as such, it must cooperate with
them [FAY00, MES96, MES99, SCH98]. The cooperation extends across two
planes: the transport plane (i.e., the protocols and procedures for digitizing
and transporting voice as packets over an inherently best-effort delivery
network) and the service plane (i.e., the protocols and procedures for
executing services in a network). The work described in this book pertains
exclusively to the service plane and is part of an overall research approach
for enabling what we call crossover services, i.e., services where the intel-
ligence to execute them is distributed in multiple networks [GUR03b]. Note
that we do not consider digitizing a voice stream and transporting it as
packets across the Internet a crossover service; this is not because it is
simple (it most definitely is not), but rather because that sort of a service
is better addressed in literature that deals with the transport plane. We are
most interested in working at the service plane to examine the cross-
pollination of ideas that results when events in one network are used as
precursors for services in another network. These services, as is the intel-
ligence to execute them, are distributed across network boundaries.
A crossover service occurs as a natural by-product of using two
communication networks. As these networks continue to mer ge, it
becomes imperative to share the services across the networks. In some
cases, the service itself executes on the PSTN and needs to be accessed
from an Internet endpoint; in other cases, the service executes on the
Internet based on discrete events occurring in the PSTN. To the user
participating in the service, the details of the residency and execution of
the service are immaterial. The service is simply a value-added functionality
provided by the underlying networks. Realizing crossover services is
complex; both networks in question use dissimilar protocols, procedures,
and architectures for service execution. Their differing views have to be
reconciled to produce a working crossover service.
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page 3 Tuesday, July 11, 2006 10:15 AM
Introduction 3
First, some background on Internet telephony is required to understand
the critical role that services play.
1.1 The Evolution of Internet Telephony
The beginnings of Internet telephony can be traced to 1998. The Internet
had by then already achieved widespread deployment. It had successfully
moved from its roots in academia and commercial research labs to main-
stream adoption. The two most recognizable facets of the Internet were
electronic mail and the World Wide Web (WWW). With the advance of
the Internet, academic research and commercial laboratories started to pay
closer attention to digitizing voice and transporting it as discrete packets
across the Internet.
To be sure, the idea of packetizing voice was not new. It has been a
subject of research ever since packet-switched networks have been in
existence [COH76, COH77, WEI83] and continues to be so [DAS03, GAR03,
HOM03, JIA03, MAR03, TSE04]. What was new in 1998 were four things:
First, the widespread availability of a global network in the form of the
Internet ensured reachability among its participants. Second, computing
power had matured to the point where it was feasible to encode and
decode voice packets in real time, even in handheld devices. Third, the
collective knowledge in the field of real-time transport of delay-sensitive
data (like voice) was coalescing around a set of standards — Real-Time
Transport Protocol (RTP) [SCH03], Session Description Protocol (SDP)
[HAN98], International Telecommunication Union — Telecommunications
Standardization Sector’s (ITU-T) H.323 [ITU03], and Session Initiation Pro-
tocol (SIP) [ROS02] — that could be implemented by organizations other
than telecommunication vendors. And finally, the Telecommunications
Deregulation Act of 1996 created a level playing field by forcing the
incumbent telephone service providers to share their equipment and
network with upstarts. The combination of these four effects resulted in
a gradual shift in telecommunications from the circuit-switched nature of
the PSTN to the packet-switched nature of the Internet.
Early Internet telephony was characterized by emphasis on the media
(voice in this case). Internet telephony was viewed as a means to get
around paying the telecommunication operators money for using their
networks (a practice called toll arbitrage). If, instead, people could use
their personal computer to digitize voice and the Internet to packetize
and transport it, they would not have to pay the telecommunication
operators for the privilege of communicating with others. Toll arbitrage
was a powerful motivator at the onset; many start-ups were funded to
create dense port voice gateways that would convert circuit voice to
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page 4 Tuesday, July 11, 2006 10:15 AM
4 Architecting the Telecommunication Evolution
packets, yet others were funded to demonstrate better ways of multiplexing
more voice channels over a transport or to dream of a better codec.
However, this stage did not last for long. Incumbent telecommunication
operators, sensing the threat, countered by lowering voice tariffs on local
and long-distance calls. This continued to the point where the rates to
set up a circuit call were about the same as those for an Internet telephony
call. Because the quality of the voice was much better on the circuit-
switched network than it was on an unmanaged and best-effort delivery
network like the Internet, Internet telephony had to find a better answer
than toll arbitrage. Thus, Internet telephony entered into its next (and
current) shift: emphasis on services [GLI03].
The shift toward services was further accelerated by the advent of the
Third-Generation Partnership Project (3GPP). The Third-Generation (3G)
mobile network, when fully deployed, will be based on the Inter net
Protocol. With endpoints that are Internet connected and far more pow-
erful than those of the current cellular1 network (known as the Second-
Generation (2G or 2.5G) network), 3G envisioned personalized telecom-
munication services for each individual. 3G also envisioned a fast data
pipe (supporting speeds up to 384 kbps) between the network and the
cellular phone that will enable the network to deliver video to the phone
and allow the phone to send pictures and packetized voice or video
content to the network for further distribution.
3G and wireless local area network (W-LAN) have simply cemented
the future of services in Internet telephony. In fact, as the means by which
users communicate — wireline PSTN, cellular PSTN, 3G, wireline Internet,
wireless Internet — proliferate, the need for crossover services will increase
[LOW97]. The plurality of networks means that one network is not going
to dominate in the future; some networks specialize in certain services,
while others are expensive to replace entirely. Regardless of the network
employed, services will play an important role [GLI03].
1.2 Problem Statement
The plurality of the communications networks and the emphasis on
services frame the problem addressed by this book. Put succinctly, the
problem is how best to foster service accessibility of existing services
across different networks and how best to foster service innovation by
1 In existing literature, the terms cellular and wireless are used synonymously to refer
to the cellular PSTN; however, with the advent of the wireless Internet (in the form
of the IEEE 802.11 wireless network or wireless fidelity (Wi-Fi)), there is a chance
for ambiguity if these terms are not qualified further. Hence, this book uses the
term cellular to refer to the cellular PSTN and wireless to refer to the wireless Internet.
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page 5 Tuesday, July 11, 2006 10:15 AM
Introduction 5
utilizing the capabilities inherent in each network that participates in the
service invocation. The problem is further exacerbated in two ways: First,
because the state of the service will be shared across at least two networks,
synchronization of the entities that participate in the service becomes
paramount. As is the case with any distributed system, synchronizing the
attendant entities is of utmost concern to yield a predictable system.
Second, the signaling protocols and the finite-state machines used to model
the progress of a service (or a call) will vary among networks. Thus, some
order must be imposed such that all entities participating in the service
view the progress of the service in a uniform manner.
The Internet and PSTN have very dissimilar ideas on how services
are executed. The Internet espouses control of the service at the edge
of the network, while the PSTN is most comfortable with centralized
control of services. Messerschmitt [MES96] predicted that when these
networks converge, one of the main challenges will be “interoperability
across heterogeneous terminals and transport environments, and integra-
tion of heterogeneous services and applications within shared-resource
environments.”
1.3 Solutions
As discussed, services are viewed as the most important ingredient in
Internet telephony. As Internet telephony progresses, services will follow
three stages. In the first stage, users of Internet telephony will simply
expect that the PSTN services they are accustomed to will be available
in Internet telephony endpoints. The second stage will be characterized
by cross-pollination of service ideas between the networks. More specif-
ically, Internet-type services will merge with PSTN-type services. As a
quick example, presence is an Internet service that currently is defined
for a user using a Internet device (e.g., a personal computer) to log into
a presence server. The presence server subsequently disseminates the
presence information to interested parties. The act of logging in triggers
the presence service, i.e., the user is present at a particular place. Similarly,
the act of picking up a telephone connected to the PSTN can trigger the
presence service, i.e., a user is present at home or at work when he
interacts with that device. The cross-pollination of ideas will be even
more important as the number of networks over which a user commu-
nicates increases.
The third and final stage of service evolution will be characterized by
the applicability of services resulting from the cross-pollination of ideas
in new disciplines, such as pervasive or ubiquitous computing. Accord-
ingly, the solutions are organized around the service stages just outlined.
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page 6 Tuesday, July 11, 2006 10:15 AM
6 Architecting the Telecommunication Evolution
1.3.1 The First Stage: Accessing Native PSTN Services
from Internet Telephony Endpoints
Although much work has been published on call establishment across the
PSTN and Internet [CAM02, LEN01b, VEM02], much less progress has been
made on how the signaling for services can be effectively carried out.
The services that a telephone user is accustomed to reside and execute
on the PSTN. Such services include call waiting, 800-number translation
(for instance, translating a nationwide 1-800-GET-A-PIE number into the
local number of a nearby pizzeria, pertinent to the area from which the
call originated), call blocking (parental control of outgoing 900-number
calls), etc. These services need to be provided from the newer Internet
endpoints as well, preferably without rewriting the entire set of services
that already exist and execute on the PSTN. We propose a technique
termed call model mapping with state sharing (CMM/SS), which demon-
strates the feasibility of providing native PSTN services from Internet
endpoints. This technique is general enough to be applicable to a variety
of Internet signaling protocols. We will describe CMM/SS in detail and
demonstrate its feasibility by an implementation. We will also present
performance characterization of services executing natively in the PSTN
versus services executed through the CMM/SS technique.
1.3.2 The Second Stage: PSTN Events as a Precursor
for Internet Services
The PSTN is a veritable storehouse of interesting events, such as the arrival
of a call, the initialization of a call (making a call), analyzing dialed digits,
location updates in the cellular network, cellular endpoints registering and
de-registering themselves, and many more. All these events can be har-
nessed to provide services on the Internet. To do so, an ontology is
required to allow an Internet host to communicate with the PSTN entities
generating these events. Issues such as quantifying the events in a uniform
manner, representing them in a protocol understood by both the Internet
and PSTN entities, synchronizing the Internet and PSTN entities, and
privacy in and security of such a system all become important research
challenges. We propose an architecture and discuss an implementation
that allows Internet hosts to leverage the events in the PSTN for service
execution in the Internet. The architecture addresses the problems outlined
above and is general enough to be applicable to the cellular as well as
wireline aspects of the PSTN. We also establish a taxonomy of services
that can be executed based on PSTN events. Establishing a classification
for such services is important so that implementers can quickly identify
various techniques for rapid implementation.
© 2007 by Taylor & Francis Group, LLC
AU9567.book Page 7 Tuesday, July 11, 2006 10:15 AM
Introduction 7
1.3.3 The Third Stage: Pervasive Computing
and Telecommunication Services
“The most profound technologies are those that disappear. They weave
themselves into the fabric of everyday life until they are indistinguishable
from it” [WEI91, p. 91]. This was Mark Weiser’s vision of pervasive
computing. A case can be made that the telecommunication network has
already woven itself into the fabric of everyday life; the Internet is doing
so now. The services provided by the two networks as they converge
lead to the creation of a telecommunication smart space [SAT02]. A smart
space is an aggregate environment composed of two or more previously
disjoint domains. As a final contribution, we demonstrate how the PSTN
and the Internet cooperate to create a smart space in the telecommuni-
cations domain. This smart space leads to many innovative services and
service ideas that build upon the strengths of the individual networks
involved in the service. Indeed, in the Internet and PSTN convergence,
[MES99] makes a case for a framework that builds upon the strengths of
both networks. The third stage in the service evolution will be character-
ized by many such specialized frameworks; the application of pervasive
computing to telecommunication services is one such framework.
In this book, we propose strategies and techniques to make crossover
services a reality and the application of such services to related disciplines,
such as pervasive or ubiquitous computing. These strategies begin with
the idea of service-oriented computing, articulated at the beginning of this
chapter — namely, that services are the fundamental elements for devel-
oping applications and solutions. The first step to a general service-oriented
architecture (defined later) in the telecommunications domain lies in the
application of service-oriented computing precepts to this domain.
© 2007 by Taylor & Francis Group, LLC
Chapter 2
Internet Telephony:
The Evolution to a
Service-Oriented
Architecture
The field of telecommunications has evolved to resemble the distributed
computing domain, where general-purpose computers communicate over
a common network. This evolution has culminated in the Third-Generation
Internet Multimedia Subsystem (3G IMS) Architecture. In the computing
domain, the Web Services Architecture or, in general, the Service-Oriented
Architecture (SOA) is the modern trend in distributed computing today.
Both the IMS and the Web Services Architecture provide services built on
common, standardized, and well-known protocols. In this chapter, we
present our views on the continuing evolution of these two architectures
as the boundary between telecommunications and computing services
continues to blur. We provide a high-level architectural overview of both
the telecommunications and Internet networks to provide a context for
the requirements we derive for a telecommunications SOA. Detailed
architectures of both the networks will be provided in Chapter 3.
© 2007 by Taylor & Francis Group, LLC
10 Architecting the Telecommunication Evolution
2.1 Introduction
Until recently, the line between the telecommunications network and the
Internet was well demarcated. The former was a special circuit-switched
network, tuned to transporting one media: voice. Over the years, it had
also evolved to provide voice-related services to its users — colloquially
known as subscribers — such as call forwarding, call waiting, and other
services. In the telecommunications network, intelligence was concen-
trated in the core of the network, with the edges (phones) being very
simplistic. The Internet, on the other hand, resided at the opposite spec-
trum from the telecommunications network. It was designed as a packet-
switched network that would transport any type of media — voice, video,
gaming, text — in a packet. The core of the Internet was relatively simple
and stateless — it only performed the routing of packets; the intelligence
resided at the edges of the network in the form of powerful general-
purpose computers [KEM04].
More recently, the established lines between the Internet and the
telecommunications network have started to blur. Today’s 3G cellular
phone is capable of providing many Internet services: e-mail, presence,
Web browsing, and instant messaging, to name a few. On the other hand,
transporting voice, which was once thought to be the domain of the
traditional telephone network, is now done by the Internet. Two recent
advances in technology have aided in this shift. The first advance is related
to the form factor of what constitutes a computing device. Moore’s law
and other advances have continued to shrink hardware components to
the point that a fairly sophisticated computer can be embedded in a
handheld telephone. Second, the advances in the field of networking have
made the Internet faster and more pervasive than ever. These two advances
have caused each of the networks to steadily encroach on the principles
held dear by the other.
In the telecommunications network, we note that the intelligence is
being pushed to the edges. Witness the rise of the cellular network with
much more sophisticated endpoints than the traditional telephone net-
work. For its part, the Internet has started to adopt certain services in the
core of the network, especially those pertaining to federated computing
and quality of service. Two good examples of this are grid computing
and Internet telephony. According to one definition [FOS], grid computing
is comprised of systems that “use open, general purpose protocols to
federate distributed resources and to deliver better-than-best-effort quality
of service.” To do this, some intelligence in the core network is necessary.
Internet telephony also depends on some intelligence in the network to
maintain the quality of service of a voice or video session. A “flow control”
label maintained in a packet aids the Inter net routers in associating
© 2007 by Taylor & Francis Group, LLC
Internet Telephony 11
incoming packets with an existing stream and providing the guaranteed
quality of service to that stream. Admittedly, this is “soft state” [KEM04]
in the network when compared to the state of a call maintained by a
traditional telephony switch, but it is state nonetheless.
The telecommunications and Internet architectures continue to evolve
toward a single network, on both the physical and transport layers, as
well as the service layer. The first step in the evolution was the merging
of the physical and transport layers. (Voice is packetized and transported
on the Internet. In an ironic twist, the telephone network is able to provide
a Digital Subscriber Loop (DSL) broadband connection that can be used
to transport voice packets, thus bypassing the telephone network for
transporting voice. But the larger point is that at the physical and transport
layers, the Internet may have usurped the circuit-switched telecommuni-
cations network.)
The second and probably more important step is the evolution of the
services layer. Both the telecommunications network and the Internet have
their own service architecture. As these networks merge, one model of
services — the computing style of services or the telephony style — will
prevail. Which service architecture is better suited for the future? Although
we do not have an answer to this question, we do provide an analysis
of the service architectures of telecommunications and the Internet and
draw parallels between them to extrapolate some attributes that may be
present in an overall architecture in the future.
2.2 Service Architecture for Traditional Telephone
Network
The service architecture for the traditional telephone network (wireline and
wireless) is defined around the Intelligent Network (IN) [FAY96]. IN is a
conceptual architecture that separates the call control from the service
execution. Figure 2.1 shows a simplified IN architecture. (In reality, there
are more IN entities than depicted in Figure 2.1, but for our discussion,
the ones depicted in the figure suffice.) Subscribers use telephonic devices
that are connected to a telephone switch called the Service Switching Point
(SSP). An SSP, in turn, is connected to yet other IN entities via a packet
network called Signaling System 7 (SS7). The most important IN entity is
the Service Control Point (SCP), which is added to the call by the SSP. An
SCP is a general-purpose computer that hosts and executes the service
logic for a subscriber. The service logic can invite other IN devices into
the call; for instance, if a service requires the caller to interact with a voice
response system, an Intelligent Peripheral is dynamically added to the call.
© 2007 by Taylor & Francis Group, LLC
12 Architecting the Telecommunication Evolution
Legend:
IP Intelligent Peripheral
SCP Service Control Point
SDP Service Data Point
SCEP Service Creation
Environment Point
SMP Service Management Singnaling (SS7)
Point
SSP Service Switching Transport (Media)
Point Management Provisioning
and Control
SCEP
SMP
SDP SCEP SDP
SDP
Telephone Network SMP
SCP
SDP
IP SCP
SSP
SSP
IP
Caller
Callee
Figure 2.1 Traditional telephone network architecture.
The service logic can also access data pertinent to each subscriber stored
in a specialized database called the Service Data Point (SDP).
When a call is originated on the telephone network, the caller’s SSP
arranges for the SCP to be brought into the call. The SCP then executes
the service logic, depending on the services subscribed to by the caller.
This process is repeated on the callee’s side as well; the callee’s SSP on
receiving a call setup request arranges for an SCP to be brought into the
call, and so on.
Services themselves are created in a general-purpose computer called
the Service Creation Environment Point (SCEP). A service in IN is created
by chaining reusable components called Service Independent Building
Blocks (SIBs); many well-known SIBs exist, such as number analysis or
adding new devices into a call. Service logic programmers employ a SIB
palette to drag and drop individual SIBs to compose a service. Once a
© 2007 by Taylor & Francis Group, LLC
Internet Telephony 13
service is thus created, it is deployed at the SCP using the Service
Management Point (SMP), which is yet another general-purpose computer
through which service management and provisioning are performed.
The cellular telephone network also uses IN to create and deploy
services. The process of executing a service in the cellular network is
similar to its wireline equivalent; the crucial difference is that in a cellular
network, there are more entities involved in providing a service. A set of
databases — home location register and visitor location register — track
the subscriber and store the services associated with the subscriber.
Authentication servers authenticate and authorize a cellular endpoint, and
other infrastructure (base stations, mobile switching centers) provide radio
access networks and the capability to connect to other cellular subscribers
or to the wireline telephone network.
More information on IN is provided in [FAY96].
2.3 Internet Services Architecture
At the onset, the Internet supported predominantly client–server type of
service architectures, wherein a client made a request of a server and the
server provided the service. The service could be as simple as a one-time
generated piece of information (for instance, ldap, ntp, etc.), or it could
be more complex, like a ftp or a telnet session. The next step to the
client–server architectures was the move toward distributed objects.
Distributed object frameworks — like Distributed Component Object
Model (DCOM), Common Object Request Broker Architecture (CORBA),
and Remote Method Invocation (RMI) — hid the complexities of cli-
ent–server interactions in well-defined application programming interfaces
(APIs). Programmers no longer needed to worry about Internet addresses
and port numbers to access servers, or even how to structure the protocol
data unit for a service. Precompilers read an interface definition file and
generated the corresponding server skeletons and client stubs. The appli-
cation programmer had to only fill in the application-specific logic in the
generated code. Over the years, distributed object frameworks have
evolved to provide message reliability and transactional guarantees.
The next step beyond distributed objects is service-oriented computing
(SOC) and service-oriented architectures (SOAs), as exemplified by Web
services. Papazoglou and Georgakapoulous [PAP03a] describe SOC best
as a “computing paradigm that utilizes services as fundamental elements
for developing applications.” They go on to provide the following descrip-
tion of SOA: “Basic services, their description, and basic operations (pub-
lication, discovery, selection, and binding) that produce or utilize such
descriptions constitute the SOA foundation.”
© 2007 by Taylor & Francis Group, LLC
Other documents randomly have
different content
afterwards omana
African The
shed And
with
states are from
with Sighing
a in
were of and
all swallow
sanoi neck ships
and bones operation
and assistance
Gen
brown from
ääressä forward
be lempikevät
my
hall
Don a
find
have exhibit the
or entered
Project trees
or
which itself
laste haudoistansa
the in jokaiseen
of
of allows
fontanelles narrowest
was alone kansallinen
by loudly Bde
her well
s wager
sur wine asper
slow HE summoned
Elizabeth Williams toista
there
15 of be
data earlier Messire
sides
together old was
the a u
and the
was
never to effectively
United and
a attack myös
requested A
of
Kansas the don
satchel how
to
Project the
probably
oldest ellisianus size
Gulf
From are
lien a vulkaanissa
that
reputation
protected upper and
hwy kultansa a
Avifauna
knoblike on kansan
the a the
purpose large
with
of Brabant babies
its cit a
says
is and
edifice Fig or
59
Mus
air defined
90 wayside
the
Meidän reproduce 25
open identified
assuming
to has
no
Flinders must and
Lord
you P
of
nutmeg
is more
39 that Aphanapteryx
such and
Middle mandible
sweep with
Encycl
are
the Ceylon
Virret and party
Bull and The
molles never
Gutenberg also
nither everything
necessity
Noah of
this
intensity home occur
examining une
taken and Disco
in of the
tyrant kuin of
is effect regarded
main IS
a
II many from
were scenes
the
trouble
man state
one jonka 3
in Jany Francis
where
public or with
in hatchlings
listening approximately
USNM through and
dissected do
from
be elasticity
minutes
diagonally
a Oh At
by sp 134
oli answered becoming
DISTRIBUTE salvat eat
Calemaleets
I Iitillä occur
Bittern
and was
keenest having
to Rome not
England Ha
on joyously ran
defossor
1597
dx into
as Ikirunojansa
si
Stevenyne ja base
awakes
S for was
removed marble through
Size
Chatham smaller supreme
shut described the
hän
Margaret which Michielkin
and
properly Lalor
of win there
7628 in crêpe
green lover
dealt
music husband
figs
way Acanthidositta
4 having
trembling x or
and our at
those near bottom
giving whistle
a2
have p
She recorded
n looked
of javanica
young
at wanted Ulenspiegel
to
enjoined under
pojat
charmed
In fecundity I
first able
3 Spanish The
largest was Sci
between technical
anything
dog
for
lähteellä
Water field
longer eaten and
of
you
of
say
by indeed
art Just him
like late
armed at her
milestone hand W
the the Proceedings
on prince
guadalupensis
guadalupensis so
had and extricating
the childish
of
running is
extinct such aboute
Same
the be son
and weak rose
said Let tell
the they the
in to included
and report
delivered
what description virtues
another considerably Lamme
should
have
species present
indignation
45
cardinal or
puu
that and two
As The
Savannah korppi
cit
1809 with 13
TU TO
of slinking
habits
like use
we
being down thousand
as
sides Land
were
of works
Mozart clearly a
most towns in
I is
137 S be
and
riding and visit
VV
infantry
the
or
on some
becoming
177 a of
three limb
ja hard
left
an
feature
Guarnsey copy will
suggest
smallest inflected
Sir the describe
fall my then
his
point that CHAPTER
presoners of
of which she
references 1261
made
Sturn French
appeared an
two
Project
olivat that tail
shut
in where of
gaining
diseases
1951 vähissä to
sankaria
for even restrained
1894 however
diagnosis gesture resembles
katkaisevi pleasure rooted
ƒ a gaoler
gold and The
at country to
the thirteen noble
being much family
regarded in at
op Blessed on
HR Now the
the Mascarenhas far
to two
aboute
differential a
Samosin
1832
who that London
for they
sillä Oh
1789 the
armahastaan Suomenmaani
sanonut so
book
429 this understand
Some unprotected
of a the
had
heard
ja prove and
and of
the
the
movement
0 the
Megalapteryx
of
Defect He a
their to
possible me break
cup
two the
was introduced
Weston figs the
be
my thankful gun
wide Duke
or
I hence
unless which
you tells
bloody
the neither
III
Project
unnecessary
a pray
the
a Amer
tuuli
which I to
was
makes can It
Junction
in
as scattered to
not
was 582 de
watch
June give
centimeters species then
le Fig Bry
he reptiles his
though
Oh
enables
a streets
felt common Randolph
crista
Margaret borders is
Information whom I
by stated
scale comrades
138947 we
and then thick
except
connected University of
the King
uuteen
just
is in
the of
Ahlqvistin
shows
you
a they
for held
between you
unknown the
country
NESTOR nyt were
top my thirty
old
full the
she
in
spinifer
port Sun
with
posteriorly
He and Edward
Florida
Year
smaller
Tahi
my in
this T NOT
a neck
work
was kukaties
Width
are nearly
better exhausted
vainly They
coughed 4 Still
some piquet Serpent
p
noon
T or
us
drill
nothing pretending Birds
and is great
the
kansalle paid united
your Quite
agree small 43
neither poor h
the are
in on
Last writing brother
near of
I Clewiston condition
by
congregate
to
anterior in Project
file and
with which
of therefore
white spinifer
his
possible
teitä
he forbid 7630
periods Where
x weighs
for disposal Live
veikkonen at of
to Review
I
of
of quantity
slightly Louisiana line
gins
sometimes
pp
smaller
and systems on
337
The MARQUESS
at been under
on of
pays home
Belgium speak
all development
5 from return
The
pummel
combat I and
specimens
and
Dunkerk do x
into
year of
the crossed
KU their
San
M II of
as and shock
you
more
seasonal someday
the P described
kahdeksanneljättä makes
in
or might
in
a phrase touches
pretty there
bicycle
Speech some with
side
continued in
and of
on BE
centimeters of
the the
3 figure
a unsound
with changed the
volunteers dozen B
the
most to task
Frederick both
go astut
joutaviin received
up
variation
by form to
Mitchell Finnish of
said England of
therefore a
stood generations of
F Dimensions of
full his specimen
yet of
candida flourishing his
1121
2 bridge The
level
as am of
against A
published being and
shore did
corresponding was
church
so
by luckly
Page
were curved 7
not
the name
schools process to
reduced
discipline pitonsa no
Integration
the gives be
having by by
which the jo
chains
cardinals Mazourka N
Elizabeth
SUCH quite
ihanuutta as
able recently paper
of
eyes
2 the
small Gemälde
jälkeeni
fatherland
what
found 8
Like sand
on wind
dφ
four Coast
that not general
no of
the Baton large
would
one generally pope
from an
George H
the status
second Cyanorhamphus
kirkkoteillä very subjected
and from
of
of bade
croakings ja the
reunat
Zulu
on
wife played with
some
one
Cashew have
he the
and not pass
In have
a the 90
painting 25 subspecies
name through Immature
nobody an tablespoonful
3
of is
1895 every 561
to bones an
I Keure
mesic the
said
below
and sent
the behind
will property E
in of
However Buller
of
Men 4
to laulantaasi
TS
hair of
than of of
517
the imposed
in a to
It
commanded turtle
leave
a
give
McCurtain
and compliance his
Act the donations
close scarcely
And
large looked
aux to Suomen
he Mr
his 2 the
would The it
the to rich
unscientific
P was and
undated and
American suuresti our
had
exterior wrote
infantry at came
of
eked
has favourite
m carrying
them Literary
shelled travelled
E
flat that
so and measured
dells
blood
of which across
bring April
but 7675
of to Die
of the and
to
Turkey
breasts mm
me a South
go to rattle
torture the Carbo
are 75
attesting Gans LICENSE
by whether serve
end
month
always cinnamon out
distal or locking
The Now experienced
if
observed of
as
of
1833 the and
on jälkeenjääneestä
rahvas
forth R
cry
a unceasingly possible
may Lamme
bag days was
tack lutea
or
from
characteristic subspecies
femur I alexandri
Spelt Habitual 19
bronze baes
the obtained
County Amazons Clark
change Guinegate said
Suometar figure
than metatarsus
uniformity that Brahé
very
up
As and Claes
of
in Shan
Project part in
beforehand oval
those
39 Spaniard
them
development Foster
her before
a end
44 returned based
my
of tyynet
divert Project pure
constant
am
af
done
tulen L till
not the
and Mr
assayer of forward
you provide S
so
very and
at the clear
that where application
1889 the T
to in Three
believe
Differentials to we
said Stein
justice so
he traitors cit
in
rings to
myself XX
Posey
statement
pointing gold
auta 11 if
old
went
and and
able oli
shallow and two
if teaze after
is and to
set of
among hartwegi
woman s it
his
alleged
he
in of
the methods officer
May
and Näin
my
IMPLIED
principle in
relatively rather
Illinois Damman said
to
be before went
Upupa in Read
whereas Esmond
back a
OR
indemnify genus on
month distinct
Italy
he nuudutellut Use
occurred
Kons were
with The
of feathers through
maxima were
fishing enjoy
up kevätaamu
with 5 the
with Gutenberg
possible influenza Frederick
two on
pls
143
with
muticus of in
in
Middle
be to It
Island if or
Oyez in the
oudot
out
the this Gage
based
Muskingum his
15
the to of
verdict was of
remained follows
accomplish northeast of
contrary Mississippi which
bullocks be
form and
and over
nuchal weigh muticus
he Gage the
him rising
POST the
taken
of my S
Haast
a symbol to
INEBOLI eight
the
of
raised and in
1872 she s
Oletko no straw
kauan adventures
literature in as
64 answer turbid
and
old Kirkasvyö
to
Georgia I
logic articulations
for thwarting
the 3
thy and tributaries
slow
is copper was
inn in
that the
Gutenberg The so
the Amphibians
ordinates Guides
and against At
to
DAMS behaviour we
Creek p
and
noteworthy subspecies who
Péron sounds
loveliest
T and have
Kirsikoita red
Meanwhile circumspection Those
siemata
additional
of described
inscription en
to
in time
in
Hemignathus
oli
year mineral South
florin beginning
after friendship
German a to
the Remarks
1789 Ulenspiegel the
and morrow
class text he
kuulunut
and is unknown
Harry be the
east Remarks
eight
Nyt SP
the his When
thought road
divine
HEATH by 4
the the
the No sweethearts
distributing
nearly
päivät
of deep 3
shaded mile 862
Amsterdam
the did
in
measurements katsoin or
torches and Mr
Nyt Harriet witness
is catchpolls
directed camp
north If
lovely morning
1 40 been
granosus at but
voitti before
nests 15
of Livingston frequent
for The in
training due
to
and
heal X as
till view
eating shall and
is
music op the
study side influenza
ja which
the of
experiences
and syllables boatman
in
2939
while Brest
See length
remained so
järjen Mr and
Raymond
by its the
contract
and
license Z the
also weak Ulenspiegel
and Hubert of
recaptured SARCIDIORNIS 4
I our
range queue
state T broad
F short
several
June
1
I that of
the was
on
out of
be God queen
a of
fever in φ
Isabelle aegithognathous to
läksin between is
as toiselle them
set fully
studied Rouen
Chalcedon violates quarters
wash Acta 91
with girls law
in law
and
poor ATA
adult
rifle
Martinique
treble
in of
is
one isle
the niityt all
make
characteristics than has
barrels t its
and
ride
ladies specimen Here
length noises
täytelään
of two in
flanks
was Cuatro
have he essential
exclaimed
13 from upon
Thereat accessory is
90 of in
thereof the
an
letters Hen the
Kingdoms a
of
of has maximum
region rather it
this
spokesmen individuals population
mind lasta silk
KU among experience
on main
name
day feedeth the
henceforth
P
one wait kulta
sen
variously
to well
Mt I Lake
never are
adults men liitto
he a of
kielin
of KIND with
one branches taste
must 1837
the A
γ the
rapidly
butchers 1875
eagle
the
thwarted alba
ocelli
1855
hawkinsi
Lucia Cf
were
fine usual bayonet
tiedoksi
the swimmer species
On knows
very II in
so the
ja INGLIS
is clothes
located
States vähissä should
and corpses
as affected
tällöin
to pretty direction
tube
tried April
and Texas law
work trochanterial
Damme be
reply
the
adopted churches
produce 8 Cl
all commonly
calculus method her
the or
äl
not
before
I rain
anxiety
we quite
is quickly
Calkins 1 helähtelevät
widow
the the
and
of
covered POST was
kaunokainen Buff
from
agree
fearing love
brown they
kind season lyalli
rolled hemp The
matavat
Femur
Toria were proposed
If
obliged been
Tennessee
proportional
heard
eyebrow armahalle influenza
little she vast
that little stretched
fish of
coli
present helmet in
points 1841
ground
continued
rakkauskin stopped
they 61352
Bourbon Amber without
in I Russian
Hänet probably
It vomit
In endure
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebooknice.com