100% found this document useful (2 votes)
43 views179 pages

(Ebook) Architecting The Telecommunication Evolution: Toward Converged Network Services (Informa Telecoms & Media) by Vijay K. Gurbani, Xian-He Sun ISBN 9780849395673, 0849395674 Newest Edition 2025

The document is about the ebook 'Architecting the Telecommunication Evolution: Toward Converged Network Services' by Vijay K. Gurbani and Xian-He Sun, which discusses advancements in telecommunication systems and the evolution towards converged network services. It includes various sections on service architecture, internet telephony, and comparative analysis of signaling protocols. The ebook is available for download in PDF format and has received high ratings from users.

Uploaded by

ihythyp0972
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
43 views179 pages

(Ebook) Architecting The Telecommunication Evolution: Toward Converged Network Services (Informa Telecoms & Media) by Vijay K. Gurbani, Xian-He Sun ISBN 9780849395673, 0849395674 Newest Edition 2025

The document is about the ebook 'Architecting the Telecommunication Evolution: Toward Converged Network Services' by Vijay K. Gurbani and Xian-He Sun, which discusses advancements in telecommunication systems and the evolution towards converged network services. It includes various sections on service architecture, internet telephony, and comparative analysis of signaling protocols. The ebook is available for download in PDF format and has received high ratings from users.

Uploaded by

ihythyp0972
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 179

(Ebook) Architecting the Telecommunication Evolution:

Toward Converged Network Services (Informa Telecoms &


Media) by Vijay K. Gurbani, Xian-He Sun ISBN
9780849395673, 0849395674 Pdf Download

https://ebooknice.com/product/architecting-the-telecommunication-
evolution-toward-converged-network-services-informa-telecoms-
media-1479124

★★★★★
4.9 out of 5.0 (62 reviews )

DOWNLOAD PDF

ebooknice.com
(Ebook) Architecting the Telecommunication Evolution: Toward
Converged Network Services (Informa Telecoms & Media) by
Vijay K. Gurbani, Xian-He Sun ISBN 9780849395673, 0849395674
Pdf Download

EBOOK

Available Formats

■ PDF eBook Study Guide Ebook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


We have selected some products that you may be interested in
Click the link to download now or visit ebooknice.com
for more options!.

(Ebook) Biota Grow 2C gather 2C cook by Loucas, Jason; Viles,


James ISBN 9781459699816, 9781743365571, 9781925268492,
1459699815, 1743365578, 1925268497

https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374

(Ebook) Triple Play: Building the converged network for IP, VoIP
and IPTV (Telecoms Explained) by Francisco J. Hens, José M.
Caballero ISBN 9780470753675, 9780470754399, 0470753676,
0470754397
https://ebooknice.com/product/triple-play-building-the-converged-network-
for-ip-voip-and-iptv-telecoms-explained-1979484

(Ebook) Business Strategies for the Next-Generation Network


(Informa Telecoms & Media) by Nigel Seel ISBN 0849380359

https://ebooknice.com/product/business-strategies-for-the-next-generation-
network-informa-telecoms-media-2247870

(Ebook) Matematik 5000+ Kurs 2c Lärobok by Lena Alfredsson, Hans


Heikne, Sanna Bodemyr ISBN 9789127456600, 9127456609

https://ebooknice.com/product/matematik-5000-kurs-2c-larobok-23848312
(Ebook) Vagabond, Vol. 29 (29) by Inoue, Takehiko ISBN
9781421531489, 1421531488

https://ebooknice.com/product/vagabond-vol-29-29-37511002

(Ebook) SAT II Success MATH 1C and 2C 2002 (Peterson's SAT II


Success) by Peterson's ISBN 9780768906677, 0768906679

https://ebooknice.com/product/sat-ii-success-math-1c-and-2c-2002-peterson-
s-sat-ii-success-1722018

(Ebook) Value-Added Services for Next Generation Networks


(Informa Telecoms & Media) by Thierry Van de Velde ISBN
9780849373183, 9781420013535, 0849373182, 142001353X

https://ebooknice.com/product/value-added-services-for-next-generation-
networks-informa-telecoms-media-2013256

(Ebook) Master SAT II Math 1c and 2c 4th ed (Arco Master the SAT
Subject Test: Math Levels 1 & 2) by Arco ISBN 9780768923049,
0768923042

https://ebooknice.com/product/master-sat-ii-math-1c-and-2c-4th-ed-arco-
master-the-sat-subject-test-math-levels-1-2-2326094

(Ebook) Cambridge IGCSE and O Level History Workbook 2C - Depth


Study: the United States, 1919-41 2nd Edition by Benjamin
Harrison ISBN 9781398375147, 9781398375048, 1398375144,
1398375047
https://ebooknice.com/product/cambridge-igcse-and-o-level-history-
workbook-2c-depth-study-the-united-states-1919-41-2nd-edition-53538044
AU9567_C000.fm Page i Friday, July 28, 2006 1:31 PM

ARCHITECTING THE
TELECOMMUNICATION
EVOLUTION

© 2007 by Taylor & Francis Group, LLC


AU9567_C000.fm Page ii Friday, July 28, 2006 1:32 PM

OTHER TELECOMMUNICATIONS BOOKS FROM AUERBACH


Active and Programmable Networks for A Practical Guide to Content Delivery
Adaptive Architectures and Services Networks
Syed Asad Hussain Gilbert Held
ISBN: 0-8493-8214-9 ISBN: 0-8493-3649-X

Business Strategies for the Next-Generation Resource, Mobility and Security


Network Management in Wireless Networks
Nigel Seel and Mobile Communications
ISBN: 0-8493-8035-9 Yan Zhang, Honglin Hu, and Masayuki Fujise
ISBN: 0-8493-8036-7
Chaos Applications in
Telecommunications Service-Oriented Architectures
Peter Stavroulakis in Telecommunications
ISBN: 0-8493-3832-8 Vijay K Gurbani, Xian-He Sun
ISBN: 0-8493-9567-4
Context-Aware Pervasive Systems:
Architectures for a New Breed of Applications TCP Performance over UMTS-HSDPA Systems
Seng Loke Mohamad Assaad and Djamal Zeghlache
ISBN: 0-8493-7255-0 ISBN: 0-8493-6838-3

Fundamentals of DSL Technology Testing Integrated QoS of VoIP: Packets


Philip Golden, Herve Dedieu, Krista S Jacobsen to Perceptual Voice Quality
ISBN: 0-8493-1913-7 Vlatko Lipovac
ISBN: 0-8493-3521-3
IP Multimedia Subsystem: Service
Infrastructure to Converge NGN, Traffic Management in IP-Based
3G and the Internet Communications
Rebecca Copeland Trinh Anh Tuan
ISBN: 0-8493-9250-0 ISBN: 0-8493-9577-1

Mobile Middleware Understanding Broadband over


Paolo Bellavista and Antonio Corradi Power Line
ISBN: 0-8493-3833-6 Gilbert Held
ISBN: 0-8493-9846-0
MPLS for Metropolitan Area Networks
Nam-Kee Tan WiMAX: A Wireless Technology
ISBN: 0-8493-2212-X Revolution
G.S.V. Radha Krishna Rao, G. Radhamani
Network Security Technologies, ISBN: 0-8493-7059-0
Second Edition
Kwok T Fung WiMAX: Taking Wireless to the MAX
ISBN: 0-8493-3027-0 Deepak Pareek
ISBN: 0-8493-7186-4
Performance Modeling and Analysis of
Bluetooth Networks: Polling, Scheduling, Wireless Mesh Networks
and Traffic Control Gilbert Held
Jelena Misic and Vojislav B Misic ISBN: 0-8493-2960-4
ISBN: 0-8493-3157-9
Wireless Security Handbook
Performance Optimization of Digital Aaron E Earle
Communications Systems ISBN: 0-8493-3378-4
Vladimir Mitlin
ISBN: 0-8493-6896-0

AUERBACH PUBLICATIONS
www.auerbach-publications.com
To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401
E-mail: [email protected]

© 2007 by Taylor & Francis Group, LLC


AU9567_C000.fm Page iii Friday, July 28, 2006 1:33 PM

ARCHITECTING THE
TELECOMMUNICATION
EVOLUTION
Toward Converged Network Services

Vijay K. Gurbani
Xian-He Sun

Boca Raton New York

Auerbach Publications is an imprint of the


Taylor & Francis Group, an informa business

© 2007 by Taylor & Francis Group, LLC


AU9567_C000.fm Page iv Friday, July 28, 2006 1:47 PM

Auerbach Publications
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2007 by Taylor & Francis Group, LLC
Auerbach is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works


Printed in the United States of America on acid-free paper
10 9 8 7 6 5 4 3 2 1

International Standard Book Number-10: 0-8493-9567-4 (Hardcover)


International Standard Book Number-13: 978-0-8493-9567-3 (Hardcover)

This book contains information obtained from authentic and highly regarded sources. Reprinted
material is quoted with permission, and sources are indicated. A wide variety of references are
listed. Reasonable efforts have been made to publish reliable data and information, but the author
and the publisher cannot assume responsibility for the validity of all materials or for the conse-
quences of their use.

No part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any
electronic, mechanical, or other means, now known or hereafter invented, including photocopying,
microfilming, and recording, or in any information storage or retrieval system, without written
permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.
copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC)
222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that
provides licenses and registration for a variety of users. For organizations that have been granted a
photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
are used only for identification and explanation without intent to infringe.

Library of Congress Cataloging-in-Publication Data

Gurbani, Vijay K.
Architecting the telecommunication evolution : toward converged network
services / Vijay K. Gurbani and Xian-He Sun.
p. cm.
ISBN 0-8493-9567-4 (alk. paper)
1. Telecommunication systems. 2. Computer networks. I. Sun, Xian-He. II.
Title.

TK5101.G79 2006
384--dc22 2006045976

Visit the Taylor & Francis Web site at


http://www.taylorandfrancis.com
and the Auerbach Web site at
http://www.auerbach-publications.com

© 2007 by Taylor & Francis Group, LLC


AU9567_C000.fm Page v Tuesday, July 11, 2006 10:41 AM

Dedication

To my parents, for their love; to my wife, for her understanding;


to my children, for their future.

Vijay K. Gurbani

To my parents, Yu Lin ( ) and Chang-Xiang Sun ( ), my wife,


Hong Zhang ( ), and my children, Linda and Alan.

Xian-He Sun, ( )

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page vii Tuesday, July 11, 2006 10:15 AM

Table of Contents

Foreword ........................................................................................... xiii


The Authors.........................................................................................xv
Acknowledgments ........................................................................... xvii
List of Abbreviations and Symbols ................................................. xix
1 Introduction..................................................................................1
1.1 The Evolution of Internet Telephony 3
1.2 Problem Statement 4
1.3 Solutions 5
1.3.1 The First Stage: Accessing Native PSTN Services
from Internet Telephony Endpoints 6
1.3.2 The Second Stage: PSTN Events as a Precursor
for Internet Services 6
1.3.3 The Third Stage: Pervasive Computing
and Telecommunication Services 7

2 Internet Telephony: The Evolution to a Service-Oriented


Architecture ..................................................................................9
2.1 Introduction 10
2.2 Service Architecture for Traditional Telephone Network 11
2.3 Internet Services Architecture 13
2.4 Requirements of a Telecommunications SOA 14
2.5 Conclusion 18

3 Background: Providing Telephony Service .............................21


3.1 Service Architecture for the Wireline Public Switched
Telephone Network 22
3.1.1 General Architecture of the PSTN 22

vii

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page viii Tuesday, July 11, 2006 10:15 AM

viii  Architecting the Telecommunication Evolution

3.1.2 The Intelligent Network 24


3.1.3 The IN Conceptual Model 25
3.1.3.1 Service Plane 25
3.1.3.2 Global Functional Plane 26
3.1.3.3 Distributed Functional Plane 27
3.1.3.4 Physical Plane 27
3.1.4 Physical Entities in an IN-Enabled Network 27
3.1.4.1 Service Switching Point (SSP) 28
3.1.4.2 Service Data Point (SDP) 29
3.1.4.3 Service Control Point (SCP) 29
3.1.4.4 Intelligent Peripheral 30
3.1.4.5 Adjunct 30
3.1.4.6 Service Node (SN) 30
3.1.4.7 Service Creation Environment Point (SCEP) 30
3.1.4.8 Service Management Point (SMP) 30
3.1.5 The Basic Call State Machine, Points in Call,
and Detection Points 30
3.1.6 The IN Capability Sets 33
3.1.7 Originating BCSM (O_BCSM) 34
3.1.8 Terminating BCSM (T_BCSM) 38
3.2 Service Architecture for the Cellular Public Switched
Telephone Network 41
3.2.1 Physical Entities in WIN 42
3.2.1.1 Mobile Switching Center (MSC) 43
3.2.1.2 Base Station (BS) 43
3.2.1.3 Authentication Center (AC) 43
3.2.1.4 Home Location Register (HLR) 43
3.2.1.5 Visitor Location Register (VLR) 44
3.2.1.6 Short Message Entity (SME) 44
3.2.1.7 Message Center (MC) 44
3.2.2 WIN PICs and DPs 44
3.3 Service Architecture for Internet Telephony 45
3.3.1 Service Specification in Internet Telephony 47
3.3.1.1 SIP CGI 47
3.3.1.2 CPL 47
3.3.1.3 SIP Servlets 48
3.3.2 Service Residency in Internet Telephony 48

4 Comparative Analysis of Signaling Protocols .........................49


4.1 Desirable Properties of a Candidate Protocol 49
4.1.1 Widespread Acceptance 50
4.1.2 Protocol Expressiveness 50
4.1.3 Protocol Extensibility 50
4.1.4 Primitives for Capability Description and Negotiation 50
4.1.5 Transaction-Style Message Exchanges 50
4.1.6 Support for an Event-Based Communications Model 51
4.1.7 Support for a Flexible Naming Scheme 51

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page ix Tuesday, July 11, 2006 10:15 AM

Table of Contents  ix

4.2 Protocols Evaluated 51


4.2.1 BICC 51
4.2.2 H.323 52
4.2.3 SIP 53
4.3 Comparative Analysis 59
4.4 The Novel SIP-Based Approach 61

5 Crossover Services Originating on the Internet .....................63


5.1 Introduction 63
5.2 Motivation 64
5.2.1 Rewrite Services for Internet Telephony 64
5.2.2 Using a Platform-Neutral Service Creation and
Execution Environment 65
5.2.3 Exploring New Techniques to Reuse Existing Services 65
5.3 Call Model Mapping with State Sharing (CMM/SS) 66
5.3.1 CMM/SS: Preliminaries 66
5.3.2 CMM/SS: The Technique and Algorithms 67
5.3.3 CMM/SS: State Sharing and Global State 69
5.3.4 CMM/SS: Issues 71
5.4 Implementing CMM/SS 72
5.4.1 CMM/SS Considerations 73
5.4.1.1 The Concept of a Call State Model in SIP 74
5.4.1.2 Relationship between an SCP and a CMM/SS Entity 76
5.4.1.3 Support of Announcements and Mid-Call Signaling 76
5.4.2 CMM/SS Architectural Model 76
5.4.3 Realizing CMM/SS in Software 77
5.4.4 Applying the Mapping 79
5.4.4.1 Mapping SIP to O_BCSM 79
5.4.4.2 Mapping SIP to T_BCSM 83
5.5 Results from CMM/SS 87
5.5.1 Network Topology 88
5.5.2 Results 89
5.5.3 Service Description and Call Flows 90
5.5.3.1 Originating Call Screening (OCS) 90
5.5.3.2 Abbreviated Dialing (AD) 91
5.5.3.3 Call Forwarding (CF) 92
5.5.3.4 Calling Name Delivery (CNAM) 92
5.6 Performance of CMM/SS 93
5.7 CMM/SS: A General Solution 95
5.8 Limitations of CMM/SS 96
5.9 Related Work 98
5.10 Conclusion 100

6 Crossover Services Originating on the Public Switched


Telephone Network..................................................................101
6.1 Introduction 102
6.1.1 Motivation 102

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page x Tuesday, July 11, 2006 10:15 AM

x  Architecting the Telecommunication Evolution

6.1.2 Genealogy and Relation to Standards Activities 103


6.1.3 Contributions 105
6.2 Architecture for PSTN-Originated Crossover Services 105
6.3 Research Challenges 108
6.3.1 Choosing Target Events 108
6.3.1.1 Call-Related Events 108
6.3.1.2 Noncall-Related Events 108
6.3.1.3 Application-Specific Events 111
6.3.2 Modeling PSTN-Originated Crossover Services as a
Wide Area Event Notification Service 111
6.3.3 Representing the Events 112
6.3.4 Choosing a Protocol 115
6.3.5 Aggregating Events before Publication 117
6.3.6 Scalability of the EM 117
6.3.7 Privacy, Security, and Trust 118
6.4 An XML Schema to Represent Events in the PSTN 118
6.4.1 The <spirits-event> Element 118
6.4.2 The <Event> Element 119
6.5 Proposed Extensions to SIP 120
6.5.1 The Asynchronous Event Notification Framework in SIP 120
6.5.2 The Extensions 121
6.5.2.1 The spirits-INDPs Event Package 122
6.5.2.2 The spirits-user-prof Event Package 123
6.6 Examples 124
6.6.1 Notification of Missed Calls 125
6.6.2 Presence for a Principal Using a Wireline PSTN Endpoint 127
6.6.3 Presence for a Principal Using a Cellular PSTN Endpoint 129
6.6.4 Helping First Responders 130
6.6.5 Schema Extension: Notifications for Low Prepaid
Card Balance 131
6.7 A Taxonomy of PSTN-Originated Crossover Services 131
6.8 SIP: The Distributed Middleware 133
6.9 Related Work 136
6.10 Conclusion 137

7 Smart Spaces in the Telecommunications Domain ..............139


7.1 Introduction 140
7.2 Research Thrusts of Pervasive Computing 142
7.2.1 Effective Use of Smart Spaces 142
7.2.2 Invisibility 142
7.2.3 Localized Scalability 143
7.2.4 Masking Uneven Conditions 143
7.3 Implementing a Telecommunications
Smart Space 143
7.3.1 The Main Actors 144
7.3.2 Authentication and Encryption 144
7.3.3 Policies 147

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page xi Tuesday, July 11, 2006 10:15 AM

Table of Contents  xi

7.3.4 Constructing a Telecommunications Smart Space 149


7.3.4.1 The Presence Service 151
7.3.4.2 Availability 155
7.3.4.3 An IM from the Telephone Network 158
7.3.4.4 Transforming an SMS to an IM 162
7.3.4.5 Location-Based Services 164
7.4 Design and Implementation of the Event Manager 166
7.4.1 Design of the EM 167
7.5 Performance Analysis of the Event Manager 170
7.5.1 Assumptions and Realities 170
7.5.2 Determining Service Time per Event 171
7.5.3 Calculating Blocking Probability: Erlang-B Analysis 172
7.5.4 Modeling the Event Manager as an M/D/1 Queue 174
7.6 Related Work 176
7.7 Conclusion 179

8 Conclusions...............................................................................181

Appendices
A The SPIRITS (Services in PSTN Requesting Internet
Services) Protocol.....................................................................185
B Interworking SIP and Intelligent Network (IN)
Applications ..............................................................................235
C XML Schema for PSTN Events .................................................261
D XML Schema for SMS to IM .....................................................265
E Raw Data for Event Manager Performance Analysis............267
F Bibliography .............................................................................269

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page xiii Tuesday, July 11, 2006 10:15 AM

Foreword

Internet Telephony can be defined as the conversational exchange of


voice or more generally multimedia data over packet switched networks.
It is no longer novel. The first two-party voice call over a packet switched
network was made in the ’70s as part of the Network Secure Communi-
cations project run by the Advanced Research Projects Agency (ARPA).
After this first experiment, a handful of proprietary systems were developed
in the ’80s. It is only in the late ’90s and early ’00s that wide spr ead
standards came to life.
Two main sets of standards have emerged: H.323 from the ITU-T and
the session initiation protocol (SIP) from the IETF. SIP is certainly now
the prime set of standards because it has been adopted by the main
telecommunications standards bodies including the Third Generation Part-
nership Projects (3GPP/3GPP2). 3GGP and 3GPP2 are the bodies that are
specifying the third generation mobile networks. Although SIP is today
the most prominent set of Internet Telephony standards, H.323 remains
a prominent standard due to its installed base, especially in the enterprise
environments.
Two-party voice call is the basic service provided by Internet Telephony
service providers. Value added services, or more simply services, can be
defined as anything that go beyond this basic service. These are critical
to the success and survival of telephony service pr oviders. Different
paradigms are used in the public switched telephony network (PSTN) and
in Internet Telephony for providing these services. On the one hand, the
intelligent network (IN) is the main paradigm used in the PSTN. On the
other hand, SIP servlets, and SIP CGI are examples of paradigms used in
Internet Telephony.

xiii

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page xiv Tuesday, July 11, 2006 10:15 AM

xiv  Architecting the Telecommunication Evolution

Evolving from the current PSTN to Internet Telephony is not an easy


task. A possible starting point is to enrich the set of PSTN services by taking
advantage of the most widely deployed packet switched infrastructure today:
the Internet. Services such as the well-known Internet call waiting can be
deployed in this manner. The IETF has realized this and has produced a
protocol in that regard, the SPIRITS (Services in PSTN requesting Internet
Services) protocol. In much the same way services originating in the PSTN
use services on the Internet, services originating on the Internet can also
use services in the PSTN. A well-known example, click to dial, shows
another way of enriching PSTN services by taking advantage of the Internet.
This book focuses on how the evolution can be architected. It introduces
Internet Telephony, provides background information on how value added
services can be engineered in both traditional circuit switched telephony
and Internet Telephony. It then dives into how the set of PSTN services
can be significantly enhanced by taking advantage of the Internet. The
services originating in the Internet and using PSTN services and services
originating in the PSTN and using the Internet are successively presented.
The two authors are uniquely qualified to explain how this evolution
can be architected. Vijay K. Gurbani is a co-author of the two RFCs
produced by the IETF on the topic. In addition, he has published several
papers on the same topic in prestigious journals and conference proceed-
ings. Xian-He Sun is also a preeminent researcher in the field of high
performance computing and communication. Both authors have used their
unique expertise to produce this very first book on the topic.
Roch Glitho, Ph.D.
Editor-in-Chief, IEEE Communications Magazine, 2003–2005
Technical Expert, Service Layer Technologies/Ericsson Canada
Concordia University, Montreal, Canada

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page xv Tuesday, July 11, 2006 10:15 AM

The Authors

Vijay K. Gurbani is a distinguished member of the technical staff in the Security


Technology Research Group in Bell Laboratories, the research division of
Lucent Technologies, Inc. He holds a Ph.D. in Computer Science from the
Illinois Institute of Technology, Chicago, Illinois, and a M.Sc. and B.Sc., both
in Computer Science, from Bradley University, Peoria, Illinois. Vijay’s current
work focuses on security aspects of next generation signaling protocols. His
earlier work involved the use of SIP-based services which use the public
switched telephone network (PSTN) and the Internet. He is the author of
two Internet Engineering Task Force RFCs which use SIP as a facilitator for
services spanning the Internet and the PSTN. His research interests are Internet
telephony services, security in network protocols, Internet telephony signaling
protocols, pervasive computing in the telecommunications domain, distributed
systems programming, and programming languages. Vijay holds two patents
and has six applications pending with the U.S. Patent Office. He is a member
of the ACM and IEEE Computer Society.

Xian-He Sun is a professor of computer science at the Illinois Institute of


Technology (IIT), the director of the Scalable Computing Software (SCS)
laboratory at IIT, and a guest faculty in the Mathematics and Computer
Science Division at the Argonne National Laboratory. He received a B.S. in
Mathematics from Beijing Normal University, P.R. China, and holds his M.S.
in Mathematics and Ph.D. in Computer Science from Michigan State Uni-
versity. Before joining IIT, he was a post-doctoral researcher at the Ames
National Laboratory, a staff scientist at the ICASE, NASA Langley Research
Center, an ASEE fellow at the Naval Research Laboratories, and a professor
at the Louisiana State University–Baton Rouge. He is an internationally
renowned researcher in scalable high performance computing and commu-
nication. He has published over 100 articles and papers in the area of high-
performance and distributed computing and communication.
xv

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page xvii Tuesday, July 11, 2006 10:15 AM

Acknowledgments

I am grateful to the many people who have made this book possible. It
always goes without saying that the contributions to complete a project of
this nature come from many sources. I am also indebted to Bell Laboratories,
Lucent Technologies, Inc. for providing an atmosphere that has supported
this work. The students of Prof. Xian-He Sun’s Scalable Computer Systems
Laboratory aided in many aspects of the work described in this book.
Specifically, I thank Charles Jodel for spending his Thanksgiving transcribing
portions of this publication.
VKG

Like many of my peers growing up in China during the Cultural Revolution,


I did not receive a good education as a youth and began working full time
at age 15. From taking the college entry exam to arriving in America for
advanced study, from locating my first research position to receiving my
first research grant, I have had many failures and few successes. I am
heartily grateful to the many people who have helped me to make the
few successes that define who I am today.
XHS

xvii

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page xix Tuesday, July 11, 2006 10:15 AM

List of Abbreviations
and Symbols

Abbreviation Definition
λ Arrival rate per time unit
µ Service rate per time unit
ρ Traffic intensity
∅(x) Call Model Mapping function
Pα Policy tuple
φ Constraint on Pα
B(c, ρ) Erlang-B blocking probability
2G Second Generation network
2.5G Data enhanced Second Generation network
3G Third Generation network
3GPP Third Generation Partnership Project
AC Authentication Center
API Application Programming Interface
ATM Asynchronous Transfer Mode
B2BUA Back-to-Back User Agent
BCSM Basic Call State Model
BS Base Station
CA Certificate Authority
CGI Common Gateway Interface
CMM/SS Call Model Mapping with State Sharing
CO Central Office
CORBA Common Object Request Broker Architecture
CPL Call Processing Language

xix

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page xx Tuesday, July 11, 2006 10:15 AM

xx  Architecting the Telecommunication Evolution

CSN Circuit Switched Network


CTI Computer Telephony Integration
DNS Domain Name Service
DP Detection Point
DTMF Dual Tone Multi-Frequency
EM Event Manager
FE Functional Entity
FEA Functional Entity Action
FSM Finite State Machine
FTP File Transfer Protocol
GPS Geographical Positioning System
HLR Home Location Register
HTTP Hypertext Transfer Protocol
IANA Internet Assigned Numbers Authority
ICW Internet Call Waiting
IETF Internet Engineering Task Force
IF Information Flow
IM Instant Message (or Instant Messaging)
IN Intelligent Network
INAP Intelligent Network Application Part
IP Internet Protocol, also Intelligent Peripheral
ISUP ISDN User Part
ITU International Telecommunication Union
ITU-T International Telecommunication Union–Telecommunication
Standardization Sector
JAIN Java API for Integrated Networks
JCAT Java Coordination and Transactions
JCC Java Call Control
JTAPI Java Telephony Application Programming Interface
MC Message Center
MIME Multipurpose Internet Mail Extensions
MSC Mobile Switching Center
O_BCSM Originating Basic Call State Model
OSA Open Services Architecture
PDU Protocol Data Unit
PE Physical Entity
PIC Point(s) in Call
PSTN Public Switched Telephone Network
RFC Request For Comment
RPC Remote Procedure Call
RTP Real-time Transport Protocol
SCEP Service Creation Environment Point
SCP Service Control Point

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page xxi Tuesday, July 11, 2006 10:15 AM

List of Abbreviations and Symbols  xxi

SDP Session Description Protocol, also Service Data Point


SIB Service Independent Building Block
SIP Session Initiation Protocol
SME Short Message Entity
SMP Service Management Point
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SN Service Node
SOAP Simple Object Access Protocol
SS7 Signaling System Number 7
SSP Service Switching Point
T_BCSM Terminating Basic Call State Model
TCAP Transaction Capabilities Part
TDM Time Division Multiplexing
TINA Telecommunications Information Networking Architecture
TLS Transport Layer Security
UAC User Agent Client
UAS User Agent Server
UDDI Universal Description, Discovery and Integration
URI Uniform Resource Identifiers
VLR Visitor Location Register
WIN Wireless Intelligent Network
W-LAN Wireless Local Area Network
WWW World Wide Web
XML eXtensible Markup Language

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page 1 Tuesday, July 11, 2006 10:15 AM

Chapter 1

Introduction

Service-oriented computing is the computing discipline that views services


as the fundamental elements for developing applications and solutions
[PAP03]. This book is about orchestrating services that execute across
different networks and answering the challenges such an arrangement
inevitably poses. Specifically, we explore service-oriented computing in
the context of enabling cross-network services between two communica-
tion networks: the Internet and the public switched telephone network
(PSTN). We use the term PSTN in this book to encompass two aspects of
the switched telephone network: wireline networks and cellular networks.
Unless specified otherwise, the term will refer to both aspects of the
switched telephone network.
We define a service as a value-added functionality provided by network
operators to network users. Thus, making or receiving a call is a PSTN
service, as is call waiting and caller identification. Instant messaging (IM),
presence, electronic mail, and the World Wide Web (WWW) are examples
of Internet services. We are primarily concerned with two networks in
use today: the Internet and the PSTN. To a great extent, these networks
have been influenced by each other. For instance, since the early days of
the Internet, the PSTN infrastructure (telephone lines) has been used to
transport Internet traffic. Even today, Internet users routinely access the
Internet through their phones. Conversely, the Internet is perfectly capable
of digitizing voice traffic between two communicating users and trans-
porting it as data packets. However, much more advanced interactions
are possible between the two networks — interactions that go beyond
one network using the other as mere transport. The association of the

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page 2 Tuesday, July 11, 2006 10:15 AM

2  Architecting the Telecommunication Evolution

PSTN and the Internet in this manner (i.e., one network using the other
as transport) was simply a very early prerequisite of the more advanced
interactions that are proposed in this book.
The general realm of this book lies in Internet telephony; however,
Internet telephony subsumes a substantial body of knowledge and area
of research. The most visible form of Internet telephony is Voice-over-IP
(VoIP), which can be defined as the ability to packetize and transport
predominantly voice, but generally any communication-based content,
including video and facsimile, over the Internet instead of the PSTN.
However, Internet telephony is more than VoIP; it also encompasses
aspects of an enhanced communication experience using the services of
a general-purpose network such as the Internet.
Internet telephony does not exist in a vacuum, it coexists with incum-
bent networks (PSTN) and technologies; as such, it must cooperate with
them [FAY00, MES96, MES99, SCH98]. The cooperation extends across two
planes: the transport plane (i.e., the protocols and procedures for digitizing
and transporting voice as packets over an inherently best-effort delivery
network) and the service plane (i.e., the protocols and procedures for
executing services in a network). The work described in this book pertains
exclusively to the service plane and is part of an overall research approach
for enabling what we call crossover services, i.e., services where the intel-
ligence to execute them is distributed in multiple networks [GUR03b]. Note
that we do not consider digitizing a voice stream and transporting it as
packets across the Internet a crossover service; this is not because it is
simple (it most definitely is not), but rather because that sort of a service
is better addressed in literature that deals with the transport plane. We are
most interested in working at the service plane to examine the cross-
pollination of ideas that results when events in one network are used as
precursors for services in another network. These services, as is the intel-
ligence to execute them, are distributed across network boundaries.
A crossover service occurs as a natural by-product of using two
communication networks. As these networks continue to mer ge, it
becomes imperative to share the services across the networks. In some
cases, the service itself executes on the PSTN and needs to be accessed
from an Internet endpoint; in other cases, the service executes on the
Internet based on discrete events occurring in the PSTN. To the user
participating in the service, the details of the residency and execution of
the service are immaterial. The service is simply a value-added functionality
provided by the underlying networks. Realizing crossover services is
complex; both networks in question use dissimilar protocols, procedures,
and architectures for service execution. Their differing views have to be
reconciled to produce a working crossover service.

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page 3 Tuesday, July 11, 2006 10:15 AM

Introduction  3

First, some background on Internet telephony is required to understand


the critical role that services play.

1.1 The Evolution of Internet Telephony


The beginnings of Internet telephony can be traced to 1998. The Internet
had by then already achieved widespread deployment. It had successfully
moved from its roots in academia and commercial research labs to main-
stream adoption. The two most recognizable facets of the Internet were
electronic mail and the World Wide Web (WWW). With the advance of
the Internet, academic research and commercial laboratories started to pay
closer attention to digitizing voice and transporting it as discrete packets
across the Internet.
To be sure, the idea of packetizing voice was not new. It has been a
subject of research ever since packet-switched networks have been in
existence [COH76, COH77, WEI83] and continues to be so [DAS03, GAR03,
HOM03, JIA03, MAR03, TSE04]. What was new in 1998 were four things:
First, the widespread availability of a global network in the form of the
Internet ensured reachability among its participants. Second, computing
power had matured to the point where it was feasible to encode and
decode voice packets in real time, even in handheld devices. Third, the
collective knowledge in the field of real-time transport of delay-sensitive
data (like voice) was coalescing around a set of standards — Real-Time
Transport Protocol (RTP) [SCH03], Session Description Protocol (SDP)
[HAN98], International Telecommunication Union — Telecommunications
Standardization Sector’s (ITU-T) H.323 [ITU03], and Session Initiation Pro-
tocol (SIP) [ROS02] — that could be implemented by organizations other
than telecommunication vendors. And finally, the Telecommunications
Deregulation Act of 1996 created a level playing field by forcing the
incumbent telephone service providers to share their equipment and
network with upstarts. The combination of these four effects resulted in
a gradual shift in telecommunications from the circuit-switched nature of
the PSTN to the packet-switched nature of the Internet.
Early Internet telephony was characterized by emphasis on the media
(voice in this case). Internet telephony was viewed as a means to get
around paying the telecommunication operators money for using their
networks (a practice called toll arbitrage). If, instead, people could use
their personal computer to digitize voice and the Internet to packetize
and transport it, they would not have to pay the telecommunication
operators for the privilege of communicating with others. Toll arbitrage
was a powerful motivator at the onset; many start-ups were funded to
create dense port voice gateways that would convert circuit voice to

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page 4 Tuesday, July 11, 2006 10:15 AM

4  Architecting the Telecommunication Evolution

packets, yet others were funded to demonstrate better ways of multiplexing


more voice channels over a transport or to dream of a better codec.
However, this stage did not last for long. Incumbent telecommunication
operators, sensing the threat, countered by lowering voice tariffs on local
and long-distance calls. This continued to the point where the rates to
set up a circuit call were about the same as those for an Internet telephony
call. Because the quality of the voice was much better on the circuit-
switched network than it was on an unmanaged and best-effort delivery
network like the Internet, Internet telephony had to find a better answer
than toll arbitrage. Thus, Internet telephony entered into its next (and
current) shift: emphasis on services [GLI03].
The shift toward services was further accelerated by the advent of the
Third-Generation Partnership Project (3GPP). The Third-Generation (3G)
mobile network, when fully deployed, will be based on the Inter net
Protocol. With endpoints that are Internet connected and far more pow-
erful than those of the current cellular1 network (known as the Second-
Generation (2G or 2.5G) network), 3G envisioned personalized telecom-
munication services for each individual. 3G also envisioned a fast data
pipe (supporting speeds up to 384 kbps) between the network and the
cellular phone that will enable the network to deliver video to the phone
and allow the phone to send pictures and packetized voice or video
content to the network for further distribution.
3G and wireless local area network (W-LAN) have simply cemented
the future of services in Internet telephony. In fact, as the means by which
users communicate — wireline PSTN, cellular PSTN, 3G, wireline Internet,
wireless Internet — proliferate, the need for crossover services will increase
[LOW97]. The plurality of networks means that one network is not going
to dominate in the future; some networks specialize in certain services,
while others are expensive to replace entirely. Regardless of the network
employed, services will play an important role [GLI03].

1.2 Problem Statement


The plurality of the communications networks and the emphasis on
services frame the problem addressed by this book. Put succinctly, the
problem is how best to foster service accessibility of existing services
across different networks and how best to foster service innovation by

1 In existing literature, the terms cellular and wireless are used synonymously to refer
to the cellular PSTN; however, with the advent of the wireless Internet (in the form
of the IEEE 802.11 wireless network or wireless fidelity (Wi-Fi)), there is a chance
for ambiguity if these terms are not qualified further. Hence, this book uses the
term cellular to refer to the cellular PSTN and wireless to refer to the wireless Internet.

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page 5 Tuesday, July 11, 2006 10:15 AM

Introduction  5

utilizing the capabilities inherent in each network that participates in the


service invocation. The problem is further exacerbated in two ways: First,
because the state of the service will be shared across at least two networks,
synchronization of the entities that participate in the service becomes
paramount. As is the case with any distributed system, synchronizing the
attendant entities is of utmost concern to yield a predictable system.
Second, the signaling protocols and the finite-state machines used to model
the progress of a service (or a call) will vary among networks. Thus, some
order must be imposed such that all entities participating in the service
view the progress of the service in a uniform manner.
The Internet and PSTN have very dissimilar ideas on how services
are executed. The Internet espouses control of the service at the edge
of the network, while the PSTN is most comfortable with centralized
control of services. Messerschmitt [MES96] predicted that when these
networks converge, one of the main challenges will be “interoperability
across heterogeneous terminals and transport environments, and integra-
tion of heterogeneous services and applications within shared-resource
environments.”

1.3 Solutions
As discussed, services are viewed as the most important ingredient in
Internet telephony. As Internet telephony progresses, services will follow
three stages. In the first stage, users of Internet telephony will simply
expect that the PSTN services they are accustomed to will be available
in Internet telephony endpoints. The second stage will be characterized
by cross-pollination of service ideas between the networks. More specif-
ically, Internet-type services will merge with PSTN-type services. As a
quick example, presence is an Internet service that currently is defined
for a user using a Internet device (e.g., a personal computer) to log into
a presence server. The presence server subsequently disseminates the
presence information to interested parties. The act of logging in triggers
the presence service, i.e., the user is present at a particular place. Similarly,
the act of picking up a telephone connected to the PSTN can trigger the
presence service, i.e., a user is present at home or at work when he
interacts with that device. The cross-pollination of ideas will be even
more important as the number of networks over which a user commu-
nicates increases.
The third and final stage of service evolution will be characterized by
the applicability of services resulting from the cross-pollination of ideas
in new disciplines, such as pervasive or ubiquitous computing. Accord-
ingly, the solutions are organized around the service stages just outlined.

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page 6 Tuesday, July 11, 2006 10:15 AM

6  Architecting the Telecommunication Evolution

1.3.1 The First Stage: Accessing Native PSTN Services


from Internet Telephony Endpoints
Although much work has been published on call establishment across the
PSTN and Internet [CAM02, LEN01b, VEM02], much less progress has been
made on how the signaling for services can be effectively carried out.
The services that a telephone user is accustomed to reside and execute
on the PSTN. Such services include call waiting, 800-number translation
(for instance, translating a nationwide 1-800-GET-A-PIE number into the
local number of a nearby pizzeria, pertinent to the area from which the
call originated), call blocking (parental control of outgoing 900-number
calls), etc. These services need to be provided from the newer Internet
endpoints as well, preferably without rewriting the entire set of services
that already exist and execute on the PSTN. We propose a technique
termed call model mapping with state sharing (CMM/SS), which demon-
strates the feasibility of providing native PSTN services from Internet
endpoints. This technique is general enough to be applicable to a variety
of Internet signaling protocols. We will describe CMM/SS in detail and
demonstrate its feasibility by an implementation. We will also present
performance characterization of services executing natively in the PSTN
versus services executed through the CMM/SS technique.

1.3.2 The Second Stage: PSTN Events as a Precursor


for Internet Services
The PSTN is a veritable storehouse of interesting events, such as the arrival
of a call, the initialization of a call (making a call), analyzing dialed digits,
location updates in the cellular network, cellular endpoints registering and
de-registering themselves, and many more. All these events can be har-
nessed to provide services on the Internet. To do so, an ontology is
required to allow an Internet host to communicate with the PSTN entities
generating these events. Issues such as quantifying the events in a uniform
manner, representing them in a protocol understood by both the Internet
and PSTN entities, synchronizing the Internet and PSTN entities, and
privacy in and security of such a system all become important research
challenges. We propose an architecture and discuss an implementation
that allows Internet hosts to leverage the events in the PSTN for service
execution in the Internet. The architecture addresses the problems outlined
above and is general enough to be applicable to the cellular as well as
wireline aspects of the PSTN. We also establish a taxonomy of services
that can be executed based on PSTN events. Establishing a classification
for such services is important so that implementers can quickly identify
various techniques for rapid implementation.

© 2007 by Taylor & Francis Group, LLC


AU9567.book Page 7 Tuesday, July 11, 2006 10:15 AM

Introduction  7

1.3.3 The Third Stage: Pervasive Computing


and Telecommunication Services
“The most profound technologies are those that disappear. They weave
themselves into the fabric of everyday life until they are indistinguishable
from it” [WEI91, p. 91]. This was Mark Weiser’s vision of pervasive
computing. A case can be made that the telecommunication network has
already woven itself into the fabric of everyday life; the Internet is doing
so now. The services provided by the two networks as they converge
lead to the creation of a telecommunication smart space [SAT02]. A smart
space is an aggregate environment composed of two or more previously
disjoint domains. As a final contribution, we demonstrate how the PSTN
and the Internet cooperate to create a smart space in the telecommuni-
cations domain. This smart space leads to many innovative services and
service ideas that build upon the strengths of the individual networks
involved in the service. Indeed, in the Internet and PSTN convergence,
[MES99] makes a case for a framework that builds upon the strengths of
both networks. The third stage in the service evolution will be character-
ized by many such specialized frameworks; the application of pervasive
computing to telecommunication services is one such framework.
In this book, we propose strategies and techniques to make crossover
services a reality and the application of such services to related disciplines,
such as pervasive or ubiquitous computing. These strategies begin with
the idea of service-oriented computing, articulated at the beginning of this
chapter — namely, that services are the fundamental elements for devel-
oping applications and solutions. The first step to a general service-oriented
architecture (defined later) in the telecommunications domain lies in the
application of service-oriented computing precepts to this domain.

© 2007 by Taylor & Francis Group, LLC


Chapter 2

Internet Telephony:
The Evolution to a
Service-Oriented
Architecture

The field of telecommunications has evolved to resemble the distributed


computing domain, where general-purpose computers communicate over
a common network. This evolution has culminated in the Third-Generation
Internet Multimedia Subsystem (3G IMS) Architecture. In the computing
domain, the Web Services Architecture or, in general, the Service-Oriented
Architecture (SOA) is the modern trend in distributed computing today.
Both the IMS and the Web Services Architecture provide services built on
common, standardized, and well-known protocols. In this chapter, we
present our views on the continuing evolution of these two architectures
as the boundary between telecommunications and computing services
continues to blur. We provide a high-level architectural overview of both
the telecommunications and Internet networks to provide a context for
the requirements we derive for a telecommunications SOA. Detailed
architectures of both the networks will be provided in Chapter 3.

© 2007 by Taylor & Francis Group, LLC


10  Architecting the Telecommunication Evolution

2.1 Introduction
Until recently, the line between the telecommunications network and the
Internet was well demarcated. The former was a special circuit-switched
network, tuned to transporting one media: voice. Over the years, it had
also evolved to provide voice-related services to its users — colloquially
known as subscribers — such as call forwarding, call waiting, and other
services. In the telecommunications network, intelligence was concen-
trated in the core of the network, with the edges (phones) being very
simplistic. The Internet, on the other hand, resided at the opposite spec-
trum from the telecommunications network. It was designed as a packet-
switched network that would transport any type of media — voice, video,
gaming, text — in a packet. The core of the Internet was relatively simple
and stateless — it only performed the routing of packets; the intelligence
resided at the edges of the network in the form of powerful general-
purpose computers [KEM04].
More recently, the established lines between the Internet and the
telecommunications network have started to blur. Today’s 3G cellular
phone is capable of providing many Internet services: e-mail, presence,
Web browsing, and instant messaging, to name a few. On the other hand,
transporting voice, which was once thought to be the domain of the
traditional telephone network, is now done by the Internet. Two recent
advances in technology have aided in this shift. The first advance is related
to the form factor of what constitutes a computing device. Moore’s law
and other advances have continued to shrink hardware components to
the point that a fairly sophisticated computer can be embedded in a
handheld telephone. Second, the advances in the field of networking have
made the Internet faster and more pervasive than ever. These two advances
have caused each of the networks to steadily encroach on the principles
held dear by the other.
In the telecommunications network, we note that the intelligence is
being pushed to the edges. Witness the rise of the cellular network with
much more sophisticated endpoints than the traditional telephone net-
work. For its part, the Internet has started to adopt certain services in the
core of the network, especially those pertaining to federated computing
and quality of service. Two good examples of this are grid computing
and Internet telephony. According to one definition [FOS], grid computing
is comprised of systems that “use open, general purpose protocols to
federate distributed resources and to deliver better-than-best-effort quality
of service.” To do this, some intelligence in the core network is necessary.
Internet telephony also depends on some intelligence in the network to
maintain the quality of service of a voice or video session. A “flow control”
label maintained in a packet aids the Inter net routers in associating

© 2007 by Taylor & Francis Group, LLC


Internet Telephony  11

incoming packets with an existing stream and providing the guaranteed


quality of service to that stream. Admittedly, this is “soft state” [KEM04]
in the network when compared to the state of a call maintained by a
traditional telephony switch, but it is state nonetheless.
The telecommunications and Internet architectures continue to evolve
toward a single network, on both the physical and transport layers, as
well as the service layer. The first step in the evolution was the merging
of the physical and transport layers. (Voice is packetized and transported
on the Internet. In an ironic twist, the telephone network is able to provide
a Digital Subscriber Loop (DSL) broadband connection that can be used
to transport voice packets, thus bypassing the telephone network for
transporting voice. But the larger point is that at the physical and transport
layers, the Internet may have usurped the circuit-switched telecommuni-
cations network.)
The second and probably more important step is the evolution of the
services layer. Both the telecommunications network and the Internet have
their own service architecture. As these networks merge, one model of
services — the computing style of services or the telephony style — will
prevail. Which service architecture is better suited for the future? Although
we do not have an answer to this question, we do provide an analysis
of the service architectures of telecommunications and the Internet and
draw parallels between them to extrapolate some attributes that may be
present in an overall architecture in the future.

2.2 Service Architecture for Traditional Telephone


Network
The service architecture for the traditional telephone network (wireline and
wireless) is defined around the Intelligent Network (IN) [FAY96]. IN is a
conceptual architecture that separates the call control from the service
execution. Figure 2.1 shows a simplified IN architecture. (In reality, there
are more IN entities than depicted in Figure 2.1, but for our discussion,
the ones depicted in the figure suffice.) Subscribers use telephonic devices
that are connected to a telephone switch called the Service Switching Point
(SSP). An SSP, in turn, is connected to yet other IN entities via a packet
network called Signaling System 7 (SS7). The most important IN entity is
the Service Control Point (SCP), which is added to the call by the SSP. An
SCP is a general-purpose computer that hosts and executes the service
logic for a subscriber. The service logic can invite other IN devices into
the call; for instance, if a service requires the caller to interact with a voice
response system, an Intelligent Peripheral is dynamically added to the call.

© 2007 by Taylor & Francis Group, LLC


12  Architecting the Telecommunication Evolution

Legend:
IP Intelligent Peripheral
SCP Service Control Point
SDP Service Data Point
SCEP Service Creation
Environment Point
SMP Service Management Singnaling (SS7)
Point
SSP Service Switching Transport (Media)
Point Management Provisioning
and Control
SCEP

SMP
SDP SCEP SDP

SDP
Telephone Network SMP

SCP
SDP

IP SCP
SSP
SSP
IP

Caller
Callee

Figure 2.1 Traditional telephone network architecture.

The service logic can also access data pertinent to each subscriber stored
in a specialized database called the Service Data Point (SDP).
When a call is originated on the telephone network, the caller’s SSP
arranges for the SCP to be brought into the call. The SCP then executes
the service logic, depending on the services subscribed to by the caller.
This process is repeated on the callee’s side as well; the callee’s SSP on
receiving a call setup request arranges for an SCP to be brought into the
call, and so on.
Services themselves are created in a general-purpose computer called
the Service Creation Environment Point (SCEP). A service in IN is created
by chaining reusable components called Service Independent Building
Blocks (SIBs); many well-known SIBs exist, such as number analysis or
adding new devices into a call. Service logic programmers employ a SIB
palette to drag and drop individual SIBs to compose a service. Once a

© 2007 by Taylor & Francis Group, LLC


Internet Telephony  13

service is thus created, it is deployed at the SCP using the Service


Management Point (SMP), which is yet another general-purpose computer
through which service management and provisioning are performed.
The cellular telephone network also uses IN to create and deploy
services. The process of executing a service in the cellular network is
similar to its wireline equivalent; the crucial difference is that in a cellular
network, there are more entities involved in providing a service. A set of
databases — home location register and visitor location register — track
the subscriber and store the services associated with the subscriber.
Authentication servers authenticate and authorize a cellular endpoint, and
other infrastructure (base stations, mobile switching centers) provide radio
access networks and the capability to connect to other cellular subscribers
or to the wireline telephone network.
More information on IN is provided in [FAY96].

2.3 Internet Services Architecture


At the onset, the Internet supported predominantly client–server type of
service architectures, wherein a client made a request of a server and the
server provided the service. The service could be as simple as a one-time
generated piece of information (for instance, ldap, ntp, etc.), or it could
be more complex, like a ftp or a telnet session. The next step to the
client–server architectures was the move toward distributed objects.
Distributed object frameworks — like Distributed Component Object
Model (DCOM), Common Object Request Broker Architecture (CORBA),
and Remote Method Invocation (RMI) — hid the complexities of cli-
ent–server interactions in well-defined application programming interfaces
(APIs). Programmers no longer needed to worry about Internet addresses
and port numbers to access servers, or even how to structure the protocol
data unit for a service. Precompilers read an interface definition file and
generated the corresponding server skeletons and client stubs. The appli-
cation programmer had to only fill in the application-specific logic in the
generated code. Over the years, distributed object frameworks have
evolved to provide message reliability and transactional guarantees.
The next step beyond distributed objects is service-oriented computing
(SOC) and service-oriented architectures (SOAs), as exemplified by Web
services. Papazoglou and Georgakapoulous [PAP03a] describe SOC best
as a “computing paradigm that utilizes services as fundamental elements
for developing applications.” They go on to provide the following descrip-
tion of SOA: “Basic services, their description, and basic operations (pub-
lication, discovery, selection, and binding) that produce or utilize such
descriptions constitute the SOA foundation.”

© 2007 by Taylor & Francis Group, LLC


Other documents randomly have
different content
afterwards omana

African The

shed And

with

states are from

with Sighing

a in

were of and
all swallow

sanoi neck ships

and bones operation

and assistance

Gen
brown from

ääressä forward

be lempikevät

my

hall

Don a

find

have exhibit the


or entered

Project trees

or

which itself

laste haudoistansa

the in jokaiseen

of

of allows

fontanelles narrowest

was alone kansallinen


by loudly Bde

her well

s wager

sur wine asper

slow HE summoned

Elizabeth Williams toista

there

15 of be
data earlier Messire

sides

together old was

the a u

and the

was
never to effectively

United and

a attack myös

requested A

of

Kansas the don

satchel how

to

Project the
probably

oldest ellisianus size

Gulf

From are

lien a vulkaanissa

that
reputation

protected upper and

hwy kultansa a

Avifauna

knoblike on kansan

the a the

purpose large

with

of Brabant babies

its cit a
says

is and

edifice Fig or

59

Mus

air defined

90 wayside

the

Meidän reproduce 25
open identified

assuming

to has

no

Flinders must and

Lord

you P

of

nutmeg

is more
39 that Aphanapteryx

such and

Middle mandible

sweep with

Encycl

are
the Ceylon

Virret and party

Bull and The

molles never

Gutenberg also

nither everything
necessity

Noah of

this

intensity home occur

examining une

taken and Disco

in of the

tyrant kuin of

is effect regarded

main IS
a

II many from

were scenes

the

trouble
man state

one jonka 3

in Jany Francis

where

public or with

in hatchlings
listening approximately

USNM through and

dissected do

from

be elasticity

minutes

diagonally

a Oh At

by sp 134

oli answered becoming


DISTRIBUTE salvat eat

Calemaleets

I Iitillä occur

Bittern

and was

keenest having
to Rome not

England Ha

on joyously ran

defossor

1597

dx into

as Ikirunojansa

si

Stevenyne ja base
awakes

S for was

removed marble through

Size

Chatham smaller supreme

shut described the


hän

Margaret which Michielkin

and

properly Lalor

of win there

7628 in crêpe
green lover

dealt

music husband

figs

way Acanthidositta

4 having
trembling x or

and our at

those near bottom

giving whistle

a2

have p
She recorded

n looked

of javanica

young

at wanted Ulenspiegel

to

enjoined under

pojat

charmed

In fecundity I
first able

3 Spanish The

largest was Sci

between technical

anything
dog

for

lähteellä

Water field

longer eaten and

of

you
of

say

by indeed

art Just him

like late

armed at her

milestone hand W
the the Proceedings

on prince

guadalupensis

guadalupensis so

had and extricating

the childish

of

running is
extinct such aboute

Same

the be son

and weak rose

said Let tell

the they the

in to included

and report

delivered

what description virtues


another considerably Lamme

should

have

species present

indignation

45

cardinal or

puu
that and two

As The

Savannah korppi

cit

1809 with 13

TU TO
of slinking

habits

like use

we

being down thousand

as

sides Land

were

of works
Mozart clearly a

most towns in

I is

137 S be

and
riding and visit

VV

infantry

the

or

on some

becoming
177 a of

three limb

ja hard

left

an

feature

Guarnsey copy will

suggest
smallest inflected

Sir the describe

fall my then

his

point that CHAPTER

presoners of

of which she

references 1261

made

Sturn French
appeared an

two

Project

olivat that tail

shut
in where of

gaining

diseases

1951 vähissä to

sankaria

for even restrained

1894 however

diagnosis gesture resembles

katkaisevi pleasure rooted

ƒ a gaoler
gold and The

at country to

the thirteen noble

being much family

regarded in at
op Blessed on

HR Now the

the Mascarenhas far

to two

aboute
differential a

Samosin

1832

who that London

for they

sillä Oh

1789 the

armahastaan Suomenmaani

sanonut so
book

429 this understand

Some unprotected

of a the

had

heard

ja prove and

and of
the

the

movement

0 the

Megalapteryx

of

Defect He a

their to

possible me break

cup
two the

was introduced

Weston figs the

be

my thankful gun

wide Duke
or

I hence

unless which

you tells

bloody
the neither

III

Project

unnecessary

a pray

the

a Amer

tuuli

which I to

was
makes can It

Junction

in

as scattered to

not

was 582 de

watch

June give

centimeters species then


le Fig Bry

he reptiles his

though

Oh

enables
a streets

felt common Randolph

crista

Margaret borders is

Information whom I

by stated
scale comrades

138947 we

and then thick

except

connected University of

the King
uuteen

just

is in

the of

Ahlqvistin

shows

you

a they
for held

between you

unknown the

country

NESTOR nyt were

top my thirty

old

full the
she

in

spinifer

port Sun

with

posteriorly

He and Edward

Florida
Year

smaller

Tahi

my in

this T NOT

a neck

work

was kukaties

Width
are nearly

better exhausted

vainly They

coughed 4 Still

some piquet Serpent

p
noon

T or

us

drill

nothing pretending Birds

and is great

the
kansalle paid united

your Quite

agree small 43

neither poor h

the are

in on

Last writing brother

near of

I Clewiston condition

by
congregate

to

anterior in Project

file and

with which

of therefore

white spinifer
his

possible

teitä

he forbid 7630

periods Where

x weighs

for disposal Live

veikkonen at of

to Review
I

of

of quantity

slightly Louisiana line

gins

sometimes
pp

smaller

and systems on

337

The MARQUESS

at been under
on of

pays home

Belgium speak

all development

5 from return

The

pummel

combat I and

specimens

and
Dunkerk do x

into

year of

the crossed

KU their

San

M II of

as and shock
you

more

seasonal someday

the P described

kahdeksanneljättä makes

in

or might
in

a phrase touches

pretty there

bicycle

Speech some with

side

continued in

and of
on BE

centimeters of

the the

3 figure

a unsound

with changed the

volunteers dozen B

the

most to task
Frederick both

go astut

joutaviin received

up

variation
by form to

Mitchell Finnish of

said England of

therefore a

stood generations of

F Dimensions of

full his specimen


yet of

candida flourishing his

1121

2 bridge The

level

as am of

against A
published being and

shore did

corresponding was

church

so

by luckly

Page
were curved 7

not

the name

schools process to

reduced

discipline pitonsa no

Integration

the gives be

having by by
which the jo

chains

cardinals Mazourka N

Elizabeth

SUCH quite

ihanuutta as

able recently paper

of

eyes
2 the

small Gemälde

jälkeeni

fatherland

what
found 8

Like sand

on wind

four Coast

that not general

no of

the Baton large

would
one generally pope

from an

George H

the status

second Cyanorhamphus

kirkkoteillä very subjected

and from

of

of bade
croakings ja the

reunat

Zulu

on

wife played with

some

one

Cashew have

he the

and not pass


In have

a the 90

painting 25 subspecies

name through Immature

nobody an tablespoonful

3
of is

1895 every 561

to bones an

I Keure

mesic the

said

below

and sent
the behind

will property E

in of

However Buller

of

Men 4

to laulantaasi

TS
hair of

than of of

517

the imposed

in a to

It

commanded turtle

leave
a

give

McCurtain

and compliance his

Act the donations


close scarcely

And

large looked

aux to Suomen

he Mr

his 2 the

would The it
the to rich

unscientific

P was and

undated and

American suuresti our

had
exterior wrote

infantry at came

of

eked

has favourite

m carrying

them Literary

shelled travelled
E

flat that

so and measured

dells

blood

of which across

bring April

but 7675
of to Die

of the and

to

Turkey

breasts mm

me a South

go to rattle
torture the Carbo

are 75

attesting Gans LICENSE

by whether serve

end
month

always cinnamon out

distal or locking

The Now experienced

if

observed of

as

of
1833 the and

on jälkeenjääneestä

rahvas

forth R

cry

a unceasingly possible
may Lamme

bag days was

tack lutea

or

from

characteristic subspecies
femur I alexandri

Spelt Habitual 19

bronze baes

the obtained

County Amazons Clark

change Guinegate said


Suometar figure

than metatarsus

uniformity that Brahé

very

up

As and Claes

of
in Shan

Project part in

beforehand oval

those

39 Spaniard

them

development Foster

her before
a end

44 returned based

my

of tyynet

divert Project pure

constant
am

af

done

tulen L till

not the

and Mr

assayer of forward
you provide S

so

very and

at the clear

that where application


1889 the T

to in Three

believe

Differentials to we

said Stein

justice so
he traitors cit

in

rings to

myself XX

Posey

statement
pointing gold

auta 11 if

old

went

and and

able oli

shallow and two

if teaze after
is and to

set of

among hartwegi

woman s it

his

alleged

he

in of
the methods officer

May

and Näin

my

IMPLIED
principle in

relatively rather

Illinois Damman said

to

be before went

Upupa in Read

whereas Esmond
back a

OR

indemnify genus on

month distinct

Italy
he nuudutellut Use

occurred

Kons were

with The

of feathers through

maxima were

fishing enjoy

up kevätaamu
with 5 the

with Gutenberg

possible influenza Frederick

two on

pls

143

with

muticus of in

in
Middle

be to It

Island if or

Oyez in the

oudot

out

the this Gage


based

Muskingum his

15

the to of

verdict was of

remained follows

accomplish northeast of
contrary Mississippi which

bullocks be

form and

and over

nuchal weigh muticus

he Gage the
him rising

POST the

taken

of my S

Haast

a symbol to

INEBOLI eight

the

of
raised and in

1872 she s

Oletko no straw

kauan adventures

literature in as

64 answer turbid

and

old Kirkasvyö

to

Georgia I
logic articulations

for thwarting

the 3

thy and tributaries

slow

is copper was

inn in

that the

Gutenberg The so
the Amphibians

ordinates Guides

and against At

to

DAMS behaviour we

Creek p

and
noteworthy subspecies who

Péron sounds

loveliest

T and have

Kirsikoita red

Meanwhile circumspection Those

siemata

additional

of described
inscription en

to

in time

in

Hemignathus

oli
year mineral South

florin beginning

after friendship

German a to

the Remarks

1789 Ulenspiegel the

and morrow

class text he

kuulunut
and is unknown

Harry be the

east Remarks

eight

Nyt SP
the his When

thought road

divine

HEATH by 4

the the

the No sweethearts

distributing

nearly

päivät

of deep 3
shaded mile 862

Amsterdam

the did

in

measurements katsoin or

torches and Mr

Nyt Harriet witness

is catchpolls
directed camp

north If

lovely morning

1 40 been

granosus at but

voitti before

nests 15

of Livingston frequent
for The in

training due

to

and

heal X as

till view

eating shall and

is

music op the
study side influenza

ja which

the of

experiences

and syllables boatman

in

2939

while Brest

See length
remained so

järjen Mr and

Raymond

by its the

contract

and

license Z the

also weak Ulenspiegel

and Hubert of
recaptured SARCIDIORNIS 4

I our

range queue

state T broad

F short

several

June

1
I that of

the was

on

out of

be God queen

a of

fever in φ

Isabelle aegithognathous to

läksin between is

as toiselle them
set fully

studied Rouen

Chalcedon violates quarters

wash Acta 91

with girls law

in law

and

poor ATA

adult
rifle

Martinique

treble

in of

is

one isle

the niityt all

make

characteristics than has


barrels t its

and

ride

ladies specimen Here

length noises

täytelään

of two in

flanks
was Cuatro

have he essential

exclaimed

13 from upon

Thereat accessory is

90 of in

thereof the

an
letters Hen the

Kingdoms a

of

of has maximum

region rather it

this
spokesmen individuals population

mind lasta silk

KU among experience

on main

name

day feedeth the

henceforth

P
one wait kulta

sen

variously

to well

Mt I Lake

never are
adults men liitto

he a of

kielin

of KIND with

one branches taste

must 1837

the A

γ the

rapidly
butchers 1875

eagle

the

thwarted alba

ocelli

1855

hawkinsi

Lucia Cf

were

fine usual bayonet


tiedoksi

the swimmer species

On knows

very II in

so the

ja INGLIS
is clothes

located

States vähissä should

and corpses

as affected

tällöin

to pretty direction
tube

tried April

and Texas law

work trochanterial

Damme be

reply

the

adopted churches
produce 8 Cl

all commonly

calculus method her

the or

äl

not
before

I rain

anxiety

we quite

is quickly

Calkins 1 helähtelevät

widow

the the

and

of
covered POST was

kaunokainen Buff

from

agree

fearing love

brown they

kind season lyalli

rolled hemp The


matavat

Femur

Toria were proposed

If

obliged been

Tennessee

proportional

heard

eyebrow armahalle influenza

little she vast


that little stretched

fish of

coli

present helmet in

points 1841
ground

continued

rakkauskin stopped

they 61352

Bourbon Amber without

in I Russian

Hänet probably

It vomit

In endure
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebooknice.com

You might also like