throbber
Perspectives on the AIN
`Architecture
`
`History, architecture, and evolution provide three points from
`which to view the Advanced Intelligent Network.
`
`Roger K. Berman and John H. Brewster
`
`U his article will examine the Advanced
`
`Intelligent Network (AIN) from a
`variety of perspectives: historical, present(cid:173)
`day architecture, and future evolution.
`From a historical perspective, the his(cid:173)
`tory of the AIN is traced from predivestiture 800 and
`calling card service capabilities, through IN/1,
`IN/2, and IN/1 +, leading to the various AIN
`releases. In addition, motivation for, and results from
`processes such as Bellcore's multivendor interac(cid:173)
`tions also are discussed.
`Following the historical perspective, the present(cid:173)
`day view of the AIN architecture is described, includ(cid:173)
`ing the switching system and other network
`systems, as well as operations. The AIN function(cid:173)
`ality supported by this architecture is then
`described from a customer point of view, by
`means of an illustrative service which could be
`provided from an AIN platform. Finally, the next
`steps in the AIN evolution are discussed.
`Intelligent Network History
`During the past 25 years telephone networks have
`greatly expanded in terms of the number of sub(cid:173)
`scribers served and the volume of traffic carried.
`An even more dramatic expansion has occurred
`in. the range of services offered to subscribers.
`The expansion of services has been driven by the
`needs of the increasingly sophisticated business and
`residential subscribers, and has been enabled by
`the widespread deployment of stored program
`control (SPC) technology in the telephone networks.
`The intelligence provided by SPC technology ini(cid:173)
`tiallywas centered in the network switching systems.
`The first such system, in 1965, was AT&T's No.1
`ESS. Residential services such as Call Waiting,
`and business services such as Centrex were intro(cid:173)
`duced early in the No. 1 ESS life cycle.
`During the 1970s, SPC intelligence was begin(cid:173)
`ning to be introduced in systems whose functions
`were to support the network's management and main(cid:173)
`tenance. These systems, collectively known as Oper(cid:173)
`ations Systems (OS), were needed in order to
`deal with the increasing complexity of the net(cid:173)
`work and the services offered to its subscribers. Since
`their initial introduction, the functions provided
`by the OSs have expanded to include every aspect
`
`of network planning, engineering, administration,
`and maintenance.
`Beginning in 1981, network intelligence
`reached a new plateau when AT&T introduced
`the use of centralized databases to support Call(cid:173)
`ing Card and 800 Service. These databases are locat(cid:173)
`ed at network control point (NCP) systems and
`are accessed by SPC switches via the Common Chan(cid:173)
`nel Interoffice Signaling (CCIS) network. This
`centralized approach allows the introduction of some
`services that would otherwise be impractical due
`to the complexity of managing large amounts of
`volatile data at every SPC switch.
`After divestiture of the Bell System, the newly
`formed regional companies deployed centralized
`databases at service control points (SCP) to support
`alternate billing services (ABS) and 800calling.ABS
`provides calling card validation and other line infor(cid:173)
`mation functions for collect and third-party
`billing. Access to the SCPs from switches is provided
`via Signaling System 7 (SS7) networks. The func(cid:173)
`tionality in the switches, SS7 network, SCPs, and OSs
`that support these services is collectively known
`as Intelligent Network 1 (IN/1) [1].
`Recognizing that there was a potentially large
`number of services that might be offered by
`expanding the IN/1 functionality, efforts were under(cid:173)
`taken in Bellcore at the request of the regional
`companies, to define an architecture that could real(cid:173)
`ize that potential. That effort's result was a plan
`for an architecture known as Intelligent Net(cid:173)
`work/2 (IN/2). This architecture included a great(cid:173)
`ly expanded set of switch and SCP capabilities, known
`as functional componepts (FC), and a new sys(cid:173)
`tem, called the intelligent peripheral (IP). The
`FCs defined the atomicfunctionality elements ofthe
`architecture and the IP provided a platform for
`deploying service-assistance capabilities. This archi(cid:173)
`tecture was intended to be capable of supporting
`a wide range of voice and data services, and,
`being telco-programmable, would facilitate rapid
`deployment of those services.
`Based upon analyses by the regional compa(cid:173)
`nies and switch vendors, it was determined that IN/2
`was an overly ambitious proposal which would entail
`unacceptably high risks and could not be imple(cid:173)
`mented in a sufficiently short time frame. Atten-
`
`Roger Berman is district
`manager at Bellcore where he
`is responsible for the
`Advanced Intelligent Network
`(AJN) Project Management
`and Standards.
`
`John Brewster is a district
`manager at Bel/core where he
`is responsible for architecture
`and transition planning for
`the Advanced Intelligent Net(cid:173)
`work.
`
`IEEE Communications Magazine • February 1992
`
`0163-6804/92/$03.00 1992© IEEE
`
`27
`
`AT&T Exhibit 1020
`AT&T v. VoIP, IPR 2017-01384
`Page 1
`
`

`

`tion was then focused on designing an architec(cid:173)
`ture with a subset of the IN/2 functionality which
`could introduce service-independent capabilities to
`the network within a few years. The resulting
`architecture, known as IN/1 +,was described in Bell(cid:173)
`core SR-NPL-001052 ("IN/1 + Network Baseline
`Architecture") in May 1988. Similar to IN/2, it
`also included the use of FCs and IPs, but they
`were limited to a small set of functions needed to
`support voiceband services.
`The switch vendor reactions to IN/1 +general(cid:173)
`ly were supportive, but there was a growing con(cid:173)
`cern that an SCP/SS7-based architecture would
`not be able to provide a sufficient performance level
`to support all the potentially desired services. There
`also was a perception that it would be advanta(cid:173)
`geous to achieve better alignment between the IN
`architecture and the architectures of the network
`switches. Based upon these factors, it was decided
`to stop the IN/1 + effort and to convene a forum,
`called Multi-Vendor Interactions (MVI), encom(cid:173)
`passing Bellcore, the regional companies, and the
`vendor community, with the purpose of collecting
`the best ideas from all these sources to define an
`architecture that would meet the long-term objec(cid:173)
`tives of the regional companies and have the support
`of the vendors.
`The MVI process was initiated by Bellcore
`and the regional companies with a notice in the Octo(cid:173)
`ber 1988 issue of the Bellcore Digest [i]inviting
`participation from telecommunications switching
`and computer hardware and software vendors
`who were willing to provide significant resources
`to the MVI process. Sixteen vendors responded, and
`the MVI forum was launched at the beginning of
`1989. The number of participating vendors grew
`quickly to 22. The technical results from the MVI
`process were published in March 1990 [2].
`The next stage of the IN evolution begun by MVI
`was labeled the Advanced Intelligent Network (AIN).
`An evolutionary path was defined by a series of
`AIN releases. Each release contains additional archi(cid:173)
`tectural attributes and capabilities for supporting
`services. The initial step is AIN Release 0, which was
`
`:'
`
`"~
`
`Operations
`Systems
`
`User
`
`Legend:
`Tl'anepott
`Signaling - - - - - (cid:173)
`OperatiOns .. -
`-
`-
`-
`
`-
`
`• Figure 1. AIN release 1 Architecture
`
`beginning to be deployed in 1991. It is being
`implemented with different architectures in
`accordance with specifications produced inde(cid:173)
`pendently by different regional companies. These
`specifications were produced in parallel with the
`MVI process, and thus were not based on the
`MVI results.
`AIN Release 1, targeted for later deployment,
`encompasses many ofthe concepts from the different
`Release 0 architectures within a single functional
`architecture. AIN capabilities beyond Release 1 are
`in an early planning stage. They will evolve fromAIN
`Release 1 and support an expanded range of
`information networking services. The MVI pro(cid:173)
`cess addressed both the Release 1 and the post(cid:173)
`Release 1 phases of AIN.
`The following description of AIN architecture
`represents the present view of AIN Release 1 [3].
`AIN Architecture
`The AIN architecture was derived from a set
`of functional needs associated with the provision
`of voiceband telecommunications services. To
`support these needs, a call model that includes
`relevant call states and connectivity attributes was
`developed (see companion article on the AIN call
`model). The AIN call model is largely based
`upon results of the MVI call model work.
`A primary feature of the AIN architecture is
`its flexibility regarding its physical realization.
`The physical systems and interfaces included in
`the AIN architecture are illustrated in Fig. 1.
`Not all the systems identified as components
`oftheAIN architecture, however, need to be deployed
`to provide AIN service capabilities. The decision
`concerning which network elements to deploy
`will depend on a variety of factors, including
`existing network characteristics and deployment
`plans, types of services to be deployed, and ubiq(cid:173)
`uity of services to be deployed.
`Although individual network implementations of
`AIN may vary, all share the following characteristics:
`AIN services are provided through interac(cid:173)
`tions between switching systems and the systems
`supporting AIN service logic. The switching sys(cid:173)
`tem detects conditions for AIN service involve(cid:173)
`ment (i.e., it encounters a "trigger"), formulates
`an AIN service request, and responds to call pro(cid:173)
`cessing instructions from the network element in
`which the AIN service logic resides.
`One or more vehicles for providing AIN ser(cid:173)
`vice logic are available in the network. Depend(cid:173)
`ing on implementation considerations and the
`services to be offered, AIN service logic may be
`provided at a service control point (SCP), adjunct
`system, services node, or within a programmable
`platform provided at the switching system.
`Methods exist to allow network interaction
`with users. The interaction may involve the pro(cid:173)
`vision of service-specific announcements to a user
`or the collection of digits input by a user. The
`participant interaction resources may reside in a switch(cid:173)
`ing system or may be provided by an intelligent peri ph(cid:173)
`era! (IP). A services node may be used to provide
`participant interaction capabilities and AIN service
`logic in a single network system.
`Systems and procedures are in place support(cid:173)
`ing service negotiations, backup of customer data,
`trouble detection and recovery, data for traffic
`engineering, billing, and other operations tasks.
`
`28
`
`IEEE Communications Magazine • February 1992
`
`AT&T Exhibit 1020
`AT&T v. VoIP, IPR 2017-01384
`Page 2
`
`

`

`TheAIN
`switching
`system
`capabilities
`maybe
`deployed in
`an access
`tandem,
`local tandem,
`or end office.
`
`Each physical system in the AIN architecture
`shown in Fig. 1 will now be descnbed briefly.
`
`AIN Switching Systems
`The AIN switching system [ 4] is the hub of the
`AIN architecture. The AIN switching system
`identifies calls associated with AIN services, detects
`when conditions for AIN service involvement are
`met, formulates requests for call processing instruc(cid:173)
`tionsfromAINservicelogK;andrespondstotheinstruc(cid:173)
`tions received. The call model provides a framework
`for formulating these requests and getting respons(cid:173)
`es back from AIN service logic. (fhe call model is
`described in more detail in the appendix.)
`The AIN switching system capabilities may be
`deployed in an access tandem, local tandem, or
`end office. If the AIN switching system is acting
`as an access tandem or local tandem, it is able to pro(cid:173)
`vide limited AIN services to users connected to
`subtending switching systems.
`Switching systems which are not equipped
`with the AIN switching system capabilities may or
`may not be equipped with a Network Access
`Point (NAP) capability. (Although not explicitly
`shown in Fig. 1, the NAP capability resides in the
`end office shown.) Those switching systems that
`areNAP-equippedcanprovideaccesstocertainAIN
`originating services for their subtendingsubscribers.
`OndetectingarequestforoneoftheseAINservices,
`the NAP routes the call, along with the signaling
`information necessary to identify the calling user
`and the request for AIN treatment, to theAIN switch(cid:173)
`ing system from which it is served.
`For those switching systems which are equipped
`with neither AIN switchingsystemnornetworkaccess
`point capabilities, only AIN calls that can be
`detected based on existing dialed digits transla(cid:173)
`tion or class of service can be routed to, and rec(cid:173)
`ognized at, the serving AIN switching system.
`Systems Supporting AIN Service Logic
`The SCP [5] invokes Service Logic Programs
`(SLPs) [ 6, 7] in response to external messages
`received from an AIN switching system and inter(cid:173)
`nal messages that originate within the SCP. The Com(cid:173)
`mon Channel Signaling (CCS) network allows SCPs
`to be fully interconnected with AIN switching sys(cid:173)
`tems through one or more signaling transfer
`points (STPs ). Because of this characteristic,
`SCPs are well-suited to support networkservice capa(cid:173)
`bilities such as those required for BOO/Freephone,
`area number calling or person locator services.
`The adjunct has a direct communication link
`to an AIN switching system (as opposed to using
`the CCS network). Since a high-speed interface is
`envisioned for use between the adjunct and the AIN
`switching system, there may be performance con(cid:173)
`siderations which make the adjunct an appropri(cid:173)
`ate system for supporting services requiring quick
`responses to user actions (e.g., services which
`control provision of dial tone or which may result
`in reconfiguration of call connections).
`The SCP and adjunct are key systems which
`provide the AIN programming environment
`allowing for rapid introduction of new subscriber
`services. In particular, these systems support the
`set of functions which define the network capa(cid:173)
`bilities available for use in providing AIN ser(cid:173)
`vices. These functions are defined in a
`service-independent manner so they may be used
`and re-used for a variety of AIN applications, as
`
`defined by the SLPs.
`The services node provides access to AIN
`SLPs and, in the near term, the services node
`may be specialized to support a specific service or
`set of services rather than supporting the full
`range of network functions being defined for the
`SCP and adjunct. The services node communi(cid:173)
`catesdirectlywithanAINswitchingsystemviaiSDN
`access links. The services node, like the IP
`described below, supports the ability for user
`interaction to allow collection of dialed digits or spo(cid:173)
`ken input from users, as well as provision of cus(cid:173)
`tomized announcements to users.
`Participant Interaction Systems
`The intelligent peripheral (IP) [8], is a system
`which controls and manages resources such as
`voice synthesis, announcements, speech recognition,
`anddigitcollection.TheAINswitchingsystemroutes
`a call to an IP as necessary to support the request
`of such resources by AIN service logic. In establishing
`the call connection to an IP, the AIN switching
`systemalsopassesmessageparameterswhichinstruct
`the IP to perform specific user-interaction functions.
`When the IP completes the requested functions,
`it returns any information collected from the user to
`AIN service logic via the AIN switching system.
`In the case of a services node, the identifica(cid:173)
`tion of the need for specific participant interaction
`resources and the actions required to provide the
`user interactions may be provided in a single system.
`Operations Systems
`AINRelease 1 network operations functions pro(cid:173)
`vide memory administration, surveillance, net(cid:173)
`work testing, network traffic management, and
`network data collection [9]. These functions support
`the provisioning, maintenance, and operation of the
`elements of the AIN Release 1 architecture and
`the services that are enabled by it. The opera(cid:173)
`tions functions are located in the network compo(cid:173)
`nents of the architecture, such as the switches,
`and in operations applications (OAs) that reside
`in the OSs. The functions located in the network
`components generally are specific to that compo(cid:173)
`nent, whereas OAs provide functions that transcend
`a single network component. In many cases, the
`OAs will be developed as extensions to currently
`deployed, or replacement OSs. In other cases, however,
`theOAsmaybeinnewOSs,introduredtosupportAIN
`Release 1.
`Interfaces
`The interfaces between AIN network ele(cid:173)
`ments are selected to support standard protocols:
`Interfaces between the switching system and
`SCPsoradjunctswillusetheSS7TransactionCapa(cid:173)
`bilities Application Part (TCAP) as the applica(cid:173)
`tionlayerprotocol[lO];ISDNinterfaceswillbeused
`between the switching system and IPs or services
`nodes; and standard operations interfaces based
`on the X.25 protocol will be used for AlN. End users
`may access AIN services from either convention(cid:173)
`al analog or ISDN interfaces.
`
`Service Example
`Wewillnowpresentanexampleofaservice,called
`Portable Speed Calling List (PSCL ), that could poten(cid:173)
`tially be implemented using theAINRelease 1 archi(cid:173)
`tecture. It is given as anillustrativeexample, to show
`how the elements of the architecture could be used
`
`IEEE Communications Magazine • February 1992
`
`29
`
`AT&T Exhibit 1020
`AT&T v. VoIP, IPR 2017-01384
`Page 3
`
`

`

`to support seJVices.lt is not implied, ~owever, ~at
`any of the regional telephone comparnes are specifi(cid:173)
`calJ,y planning to use AIN Release 1 to deploy PSCL
`The PSCL service can be characterized as
`allowing callers to use speed calling numbers,
`which may be one- or two-digit codes that repre(cid:173)
`sent complete seven- or 10-digit telephone numbers,
`to make calls from telephones other than their
`own. Each PSCL subscriber could have his/her
`ownlistofcodes. TousePSCL, thecallerwouldneed
`to dial an access number, possibly a service code such
`as•SS,enterapersonalidentificationnumber(PIN),
`and thespeed-callirlgnumber. To provide user friend(cid:173)
`liness, the caller could receive interruptible prompts
`and acknowledgments at each step.
`The flow of events and actions that might take
`placeinanAINR,elease 1 implementationofPSCLare
`as descnbed below. The numbers in the text refer to
`the communications paths shown on Fig. 2.
`First, the caller dials the access code for PSCL
`{1). The AIN switch detects a trigger based on
`this access code, which causes a message to be
`sent to an SCP or adjunct (2) to notify it of the trig(cid:173)
`ger,andtowaitforsubsequentprocessinginstructions.
`Second, the SCP/adjunct responds to themes(cid:173)
`sage from the AIN switch by invoking an SLP for
`PSCL. The PSCL SLP analyzes the information
`received from the AIN switch and requests the
`SCP/adjunct to return a message to the switch
`(3), instructing it to connect the caller to an intel(cid:173)
`ligent peripheral (IP), and to inform the IP about
`the resources/procedures to be used on the call.
`Third, the IP allocates resources that provide
`voice prompts to the caller to request that he/she
`enter their PIN and the speed-calling number ( 4).
`Upon receiving the information, the IP returns it
`in a message (5), via the AIN switch, to the PSCL
`SLP in the SCP/adjunct.
`Lastly, the PSCL SLP validates the caller's
`PIN and determines the telephone number corre(cid:173)
`sponding to the speed-<:alling number. The PSCL
`SLP then requests the SCP/adjunct to send a
`message to the AIN switch (6) directing it to set
`upacallfromthecallertotherequestednumber{7).
`In this simple example, it is shown how the
`elements of theAIN Release 1 architecture can work
`together to implement services for telephone net(cid:173)
`workusers.1nevitably, an actual service design would
`be more complex than this example since excep(cid:173)
`tion conditions (such as an invalid PIN) and ser(cid:173)
`vice management functions (such as modification of
`thelistentries)wouldneedtobehandled. The read(cid:173)
`er, however, can easily imagine how the illustrat(cid:173)
`ed techniques can be utilized to provide these
`additional functions.
`TheconceptsbehindAINhavebeenevolvingfor
`more than a decade. A great deal of interaction
`
`• Figure 2: Illustration of PSCL implementation
`via the AIN Release I architecture
`between Bellcore, the regional companies, and ven(cid:173)
`dorparticipants has embellished these concepts, nur(cid:173)
`turing them from the speculative idea stage to a
`set of highly detailed specifications that provide a
`wide range of call processing and operations
`functions. We know, however, that Release 1 is
`not the final chapter of the AIN story. Voiceband
`serviceneedsthatgobeyondtheAINRelease1capa(cid:173)
`bilities are already recognized. For example, to
`support personal communications services, add~­
`tional information flows between the AIN archi(cid:173)
`tectural elements will be required. Broadband
`technology will also usher in additional function(cid:173)
`ality needs that AIN will be called upon to sup(cid:173)
`port TheprocessformanagingtheevolutionofAIN
`in response to these needs is not yet defined, but
`it must certainly rely on the continuing coopera(cid:173)
`tion and commitment of all facets of the industry.
`References
`[1] R. B. Rob rock II, "The Intelligent Network-Changing the Face of
`Telecommunications, • Proc.IEEE, Vol. 79, No.1, pp. 7·20, Jan. 1991.
`[2] Bellcore Special Report SR-TSY-001 629, "Bellcore Multi-Vendor Inter(cid:173)
`actions Compendium of 1989Technical Results,"lssue 1 ,Man:h 1990.
`[3] Bellcore Special Report SR-NPL-001623, "Advanced Intelligent Net(cid:173)
`work Release 1 Network and Operations Plan, "Issue 1, June 1990.
`[4] Bellcore Technical AdvisoryTA-NWT-001 123, "Advanced Intelligent
`Network Release 1 Switching Systems Generic Requirements, •
`Issue 1, May 1991.
`[5] Bellcore Technical Advisory TA-NWT -001 125, • Advanced Intelligent
`Network Release 1 Service Control Point Generic Require(cid:173)
`ments, • Issue 1, May 1 991.
`[6] Bellcore Framework Technical Advisory FA·NWT -001 1 32, • Advanced
`Intelligent Netwo.rk Release 1 Service Logic Program Frame(cid:173)
`work Generic Requirements, • Issue 1, May 1991.
`[7] Bellcore Technical Advisory TA-NWT-001 124, "Advanced Intelligent
`Network Release 1 Service logic Execution Environment Gener(cid:173)
`ic Requirements, • Issue 1. May 1 991.
`[B] Bellcore Technical Advisory TA-NWT-001 129, "Advanced Intelligent
`Network Release 1 lntelligentPeripherallnterfaceGeneric Require(cid:173)
`ments, • Issue 1, September 1 991.
`[9] Bellcore Technical Advisory TA-NWT-001 182, "Advanced Intelligent
`Network Release 1 logical Data Model Generic Requirements,·
`Issue 1, May 1991.
`[10] Bellcore Technical Advisory TA·NWT-001 126, "Advanced Intelli(cid:173)
`gent Network Release 1 Switch-Service O>ntrol Point/Adjunct Appli(cid:173)
`cation Protocol Interface Generic Requirements, "Issue 1, May 1 991
`
`30
`
`IEEE Communications Magazine • February 1992
`
`AT&T Exhibit 1020
`AT&T v. VoIP, IPR 2017-01384
`Page 4
`
`

`

`Appendix:
`IN Call Model
`The purpose of this article, which is a com(cid:173)
`panion to "Perspectives on the AIN Architec(cid:173)
`ture," is to provide more detailed information about
`the AIN Release 1 call model. It is separated
`from the main article because it explores details
`which are not necessary for a basic understanding
`of AIN, but which cannot be avoided when
`describing the AIN Release 1 call model.
`The AIN Release 1 call model builds on the
`current call processing infrastructure of existing dig(cid:173)
`ital switches. The call model is comprised of two
`components, the basic call model (BCM) and the
`connection view (CV). The BCM provides a
`generic model of current call processing for basic
`two-party calls, and describes when in call processing
`AIN switch capabilities can be invoked. The CV
`describes how service logic residing in the
`SCP/adjunct can access these AIN switch capabil(cid:173)
`ities to influence call processing in the switch.
`Basic Call Model (BCM)
`The BCM generically represents basic call
`processing in the AIN switch and when, in call
`processing, service logic residing in the service
`control point (SCP) or adjunct can receive notifi(cid:173)
`cation of call processing events (e.g., information
`collected, route selected, call presented, busy,
`ringing timeout, etc.), so it can influence subsequent
`call processing in the AIN switch.
`The BCM is comprised of an originating BCM
`(associated with the calling party) and a termi(cid:173)
`nating BCM (associated with the called party), as
`shown in Figs. 3 and 4. The points in call (PICs)
`shown in the figures represent the sequence of actions
`the AIN switch performs at each particular point
`in processing a basic two-party call. The trigger check
`points (TCPs), also shown in the figures, identify
`where, in the processing of a call, service logic in
`the SCP /adjunct can receive notification of switch
`events in order to influence subsequent call pro(cid:173)
`cessing in the AIN switch.
`For example, if the AIN switch detects a trig(cid:173)
`ger, it sends a message to service logic (residing
`in the SCP/adjunct), which may request the
`switch to continue processing the call as normal,
`to resume at a different PIC, or to manage some
`interactions with the user. At the completion of AIN
`processing, if the AIN switch then detects that a
`switch-based feature should be engaged, it will invoke
`that feature.
`The TCPs that lead to the box labeled "Excep(cid:173)
`tion" model the call processing of incomplete
`calls and allow the SCP/adjunct to request the
`AIN switch to take special actions. The Exception box
`represents call processing that results when an excep(cid:173)
`tion event such as timeouts or network busy occurs.
`In the originating BCM shown in Fig. 3, the
`PICs model three different stages of call processing:
`call setup (the first six PICs), stable call (PICs
`seven through nine), and call clearing (PIC 10).
`In the terminating BCM shown in Fig. 4, the
`PICs model the same three stages, with call setup
`associated with PICs 11 through 14, stable call
`associated with PICs 15 and 16, and call clearing
`associated with PIC 17.
`
`Connection View
`The connection view (see Fig. 5), on the other
`hand, describes how service logic residing in the
`SCP/adjunct can access the AIN switch capabili(cid:173)
`ties to influence call processing (as modeled by
`theBCM).Italsoprovidesagenericviewofcallpro(cid:173)
`cessing resources in the AIN switch to the
`SCP /adjunct. This view is independent of switch ven(cid:173)
`dor implementation, and represents the essential
`characteristics of call processing resources needed
`byservicelogic,whilehidingtheirpey..icaldetails(which
`may vary by vendor), and their technical complexi(cid:173)
`ty.
`
`These switch characteristics include both call pro(cid:173)
`cessing and connectivity aspects. The call pro(cid:173)
`cessing aspects include setting up and maintaining
`the call (as represented by the BCM). They also
`include the information associated with the call, such
`as dialed digits, routing information, and billinginfor(cid:173)
`mation. The connectivity aspects include the
`communication paths to the parties involved in
`the call, referred to as legs, and the interconnec-
`
`Legend:
`
`• Figure 3. Originating BCM
`
`IEEE Communications Magazine • Fehruary I 992
`
`31
`
`AT&T Exhibit 1020
`AT&T v. VoIP, IPR 2017-01384
`Page 5
`
`

`

`SCP/Adjunct
`
`SCP/Adjunct
`CVrnessages
`
`Switch
`CVITI$$Sages
`
`ASC
`Switch
`
`Connection View
`Processing
`
`• Figure 5. Connection view information flows
`
`Fig. 3), occurs, BCM processing reports this
`event to CV processing.
`When CV processing receives the indication
`reporting a switch event, CV processing reports
`the event and the state of call processing to the
`Service Logic Program residing in the SCP /adjunct.
`Connection view processing in the switch then
`waits fo~ an SCP /adjunct CV message requesting the
`AIN SWitch to perform specific actions.
`When CV processing receives the SCP/adjunct
`~V message, it performs the operation requested
`m the message by sending BCM and/or connec(cid:173)
`tivity control requests, as appropriate.
`When these actions are successfully complet(cid:173)
`ed,orfail tocomplete,BCM processingand/orunder(cid:173)
`lying~ll ~~ingreturn BCM and/or connectivity
`event md1cat1ons to CV processing, reporting the
`ou!come (either success or failure) of these
`actions.
`Based on these outcome event indications CV
`processing then updates the state of call pro~ess­
`mg, and may report the outcome to the Service Logic
`Program.
`
`Biography
`Roger Berman received B.Sc. and M.Sc. degrees in electrical engineer(cid:173)
`Ing from Cornell University, and an M.B.A. degree from New York Uni(cid:173)
`versity. At onetime he was responsible for the Beilcore AIN Multi-Vendor
`Interactions and various AJN generic requirements. Mr. Berman cur(cid:173)
`rentlyisdistrictmanageratBellcorewhereheisresponsiblefortheAdvanced
`Intelligent Network (AIN) Project Management and Standards.
`.
`John Brewster received B.Sc. and M.Sc. degrees in electrical
`eng~neenng from Yale University and New York University, respective(cid:173)
`ly. He was involved in network planning for the BOO Database and
`Alternate Billing Services of Intelligent Network/1. Currently, Mr.
`Brewster IS a diStnct manager at Bellcore where he is responsible for
`archotecture and transition planning for the Advanced Intelligent Network.
`
`o-<;ho<k-(TCP)
`• Figure 4: Terminating BCM
`
`PointlnCa!l(PIC)
`
`j
`
`tion of these paths, referred to as a connection point.
`The CV provides the ability for service logic in
`the SCP /adjunct to influence call processing and con(cid:173)
`nectivity aspects in the switch, thereby influencing
`~e flow of call processing (e.g., to provide serial call(cid:173)
`mg or. to resume call pr~essing at specific PICs),
`changmg call processmg mformation (e.g., to pro(cid:173)
`vide address translation, alternate route selection
`or alternate billing), and changing connectivity
`(e.g., to place parties on hold, to add a third party
`to the two-party call, or to conference call parties).
`The particular information flows related to
`CV processing are highlighted in Fig. 5. Given
`these information flows, CV processing translates
`e;rternal.service losi:c instructions (sent by a Ser(cid:173)
`VIC:C Log1c Program man SCP/adjunct) into oper(cid:173)
`atwns understood by internal AIN switch call
`processing. Connection view processing also
`translates internal call processing events and the state
`ofinternalcall processing resources into reports that
`ca~ ~e unde~tood by external service logic. With
`th1s mformat10n flow model, CV processing can
`be described in a generic manner without an
`act~al implementation of AIN switch call pro(cid:173)
`cessmg.
`Referring to Fig. 5, the following is a typical infor(cid:173)
`mation flow scenario:
`When a call processing event, such as informa(cid:173)
`tion collected or route selected (TCPs e3 or e5 in
`
`32
`
`IEEE Communications Magazine • February 1992
`
`AT&T Exhibit 1020
`AT&T v. VoIP, IPR 2017-01384
`Page 6
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket