Sunteți pe pagina 1din 48

TRAINING REPORT

STUDY OF VARIOUS FUNCTIONS OF


MOBILE SWITCHING AND INTELLIGENT NETWORK
OF MTNL-CDMA

Submitted in partial fulfillment for the award of the degree in


Electronics and communication engineering

Under the guidance of: Submitted by:


Mr. Kaushal Kassi. Alok Abhinav.
(Training In charge, MTNL) (0631022806)

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING.


AMITY SCHOOL OF ENGINEERING AND TECHNOLOGY

AFFILIATED TO
GURU GOVIND SINGH INDRAPRASTHA UNIVERSITY,DELHI
ACKNOWLEDGEMENT

With a deep sense of gratitude, I take this opportunity to express my gratefulness


to MTNL for offering me a chance to work and interact freely with numerous experts
and highly qualified officers in branch of MTNL.

During the entire period of my training in MTNL ,I received endless help from Mr.
Kaushal Kassi(training in charge, MTNL, Harinagar) .he provided me with his timely
suggestions, constant encouragement and invaluable guidance in the successful
completion of the training thank him for the endeavor and zeal he filled me with
throughout the work.

A profound sense of gratitude is due to Ms. Jayna Chawla, for her valuable suggestion
and corporation for the report preparation.

Finally, a heartfelt appreciation to those countless trainees who offered unconditional


support whenever asked for.

Alok Abhinav.
(0631022806)
IV year(VII sem.)
Electronics and Communication Engineering
ABSTRACT
LIST OF FIGURES
LIST OF TABLES
CONTENT
CHAPTER-1. INTRODUCTION
1.1. Company Profile
About MAHANAGAR TELEPHONE NIGAM LIMITED

MTNL is company that provides total telecom solution at affordable prices


.MTNL since its inception nearly two decades ago has been providing the best of
services to its customers in Delhi and Mumbai at most affordable prices With 58000
strong workforce, 492 state of the art digital exchanges and 1375.05 kms. of optical
fiber. the company has unparallel infrastructure in Delhi and Mumbai. It has become one
of the Asia’s largest telecommunication company and first Indian PSU to be listed at
NYSE.

1.2. MTNL provides following popular services:


1.2.1. Basic Landline services

1.2.2. Internet service : It includes wide spectrum of Internet related services


from Dial up Internet access to broadband Internet access services.

1.2.3. Internet Telephony Service : IP based Internet telephony Bol Anmol


service is provided by MTNL for making International Telephone calls.

1.2.4. ISDN : Integrated Services Digital Network (ISDN) is a state-of-the-art


Public Switched Digital Network provisioning of different services–voice,
data & image transmission over the telephone line through the telephone
network. It is used for video conferencing , teleconferencing and high speed
internet.

1.2.5. Intelligent Network: Through this network MTNL provides Toll Free
phone service, Premium rate Service (PRM) e.g. KBC2 etc. , Virtual Card
Calling Service (VCC) etc.

1.2.6. I-NET : It provides high speed connectivity between


computers/terminals.

1.2.7. Dolphin Mobile : GSM based mobile service.


1.2.8. Garuda 1x WLL :
1.2.9. Answering machine (VMS) : In this service anyone can call and leave a
message in total secrecy. The VMS subscriber can then retrieve these
recorded messages.

1.2.10. Leased circuits: A leased circuit is a dedicated link provided between


two fixed locations for exclusive use by the customer. A leased circuit may
be a speech circuit, a data circuit or a telegraph circuit.

Mahanagar Telephone Nigam Limited is making its entry in the field of


M-commerce too, which will enable the customers to transact business with the help of
his mobile phone or similar hand held devices. A pilot project is going on.
For providing improved connectivity, coverage and congestion free network to its GSM
customers, MTNL is adding nearly 450 more Base Transceiver Stations (BTS) to
existing 270 BTS in Delhi and Mumbai. The company is also adding four lac lines each
in Delhi and Mumbai, for GSM and same number of lines for CDMA each in Delhi and
Mumbai.MTNL is moving towards realizing its vision of becoming global telecom
company with total telecom solutions at affordable prices. The first phase of services of
a joint venture of MTNL and Nepal has already become operational. In Mauritius too,
where company has been awarded license for fixed, GSM and International Long
Distance services, a quick roll out is being planned. CDMA service has been launched
for one lakh subscriber base.MTNL to take informed managerial decisions has Board of
Directors. Key information are being reported to and are placed before the Board of
Directors.At present, MTNL Board comprises of four non-executive Directors, apart
from three full time Directors viz. Director (Tech), Director (Fin) & Director (HR) and
two ex-officio Directors on Board. There are two Govt. nominees on the Board. The
meetings of the Board are held regularly, as per the agenda and their importance.
Besides regular Board Meeting, emergency Board meetings are held as and when
required.Company has to report its monthly, quarterly and yearly achievements in terms
of financial and physical parameters to DoT and Department of Public Enterprises
(DPE).
CHAPTER-2. DESCRIPTION OF TRAINING
CHAPTER-3. CODE DIVISION MULTIPLE ACCESS (CDMA)

Code division multiple access (CDMA) is a radically new concept in


wireless communications. It has gained widespread international acceptance by cellular
radio system operators as an upgrade that will dramatically increase both their system
capacity and the service quality. It has likewise been chosen for deployment by the
majority of the winners of the United States Personal Communications System spectrum
auctions.This site is provided in an effort to dispel some of the mystery and to
disseminate at least a basic level of knowledge about the technology. CDMA is a form
of spread-spectrum , a family of digital communication techniques that have been used
in military applications for many years. The core principle of spread spectrum is the use
of noise-like carrier waves, and, as the name implies, bandwidths much wider than that
required for simple point-to-point communication at the same data rate. Originally there
were two motivations: either to resist enemy efforts to jam the communications (anti-
jam, or AJ), or to hide the fact that communication was even taking place, sometimes
called low probability of intercept (LPI). It has a history that goes back to the early days
of World War II. The use of CDMA for civilian mobile radio applications is novel. It
was proposed theoretically in the late 1940's, but the practical application in the civilian
marketplace did not take place until 40 years later. Commercial applications became
possible because of two evolutionary developments. One was the availability of very
low cost, high density digital integrated circuits, which reduce the size, weight, and cost
of the subscriber stations to an acceptably low level. The other was the realization that
optimal multiple access communication requires that all user stations regulate their
transmitter powers to the lowest that will achieve adequate signal quality. CDMA
changes the nature of the subscriber station from a predominately analog device to a
predominately digital device. Old-fashioned radio receivers separate stations or channels
by filtering in the frequency domain. CDMA receivers do not eliminate analog
processing entirely, but they separate communication channels by means of a pseudo-
random modulation that is applied and removed in the digital domain, not on the basis of
frequency. Multiple users occupy the same frequency band. This universal frequency
reuse is not fortuitous.
3.1. CDMA is altering the face of cellular and PCS communication by:

• Dramatically improving the telephone traffic capacity


• Dramatically improving the voice quality and eliminating the audible effects of
multipath fading
• Reducing the incidence of dropped calls due to handoff failures
• Providing reliable transport mechanism for data communications, such as
facsimile and internet traffic
• Reducing the number of sites needed to support any given amount of traffic
• Simplifying site selection
• Reducing deployment and operating costs because fewer cell sites are needed
• Reducing average transmitted power
• Reducing interference to other electronic devices
• Reducing potential health risks

Commercially introduced in 1995, CDMA quickly became one of the world's fastest-
growing wireless technologies. In 1999, the International Telecommunications Union
selected CDMA as the industry standard for new "third-generation" (3G) wireless
systems. Many leading wireless carriers are now building or upgrading to 3G CDMA
networks in order to provide more capacity for voice traffic, along with high-speed data
capabilities.

3.2. Spread Spectrum communications is distinguished by three key


elements:

3.2.1. The signal occupies a bandwidth much greater than that which is necessary to
send the information. This results in many benefits, such as immunity to interference and
jamming and multi-user access, which we'll discuss later on.

3.2.2. The bandwidth is spread by means of a code which is independent of the data. The
independence of the code distinguishes this from standard modulation schemes in which
the data modulation will always spread the spectrum somewhat.
3.2.3. The receiver synchronizes to the code to recover the data. The use of an
independent code and synchronous reception allows multiple users to access the same
frequency band at the same time.

In order to protect the signal, the code used is pseudo-random. It appears random, but is
actually deterministic, so that the receiver can reconstruct the code for synchronous
detection. This pseudo-random code is also called pseudo-noise (PN).

There are three ways to spread the bandwidth of the signal:

• Frequency hopping. The signal is rapidly switched between different frequencies


within the hopping bandwidth pseudo-randomly, and the receiver knows before
hand where to find the signal at any given time.
• Time hopping. The signal is transmitted in short bursts pseudo-randomly, and the
receiver knows beforehand when to expect the burst.
• Direct sequence. The digital data is directly coded at a much higher frequency.
The code is generated pseudo-randomly, the receiver knows how to generate the
same code, and correlates the received signal with that code to extract the data.

3.3. Spread Spectrum working:

Spread Spectrum uses wide band, noise-like signals. Because Spread Spectrum signals
are noise-like, they are hard to detect. Spread Spectrum signals are also hard to Intercept
or demodulate. Further, Spread Spectrum signals are harder to jam (interfere with) than
narrowband signals. These Low Probability of Intercept (LPI) and anti-jam (AJ) features
are why the military has used Spread Spectrum for so many years. Spread signals are
intentionally made to be much wider band than the information they are carrying to
make them more noise-like. Spread Spectrum signals use fast codes that run many times
the information bandwidth or data rate. These special "Spreading" codes are called
"Pseudo Random" or "Pseudo Noise" codes. They are called "Pseudo" because they are
not real Gaussian noise. Spread Spectrum transmitters use similar transmit power levels
to narrow band transmitters. Because Spread Spectrum signals are so wide, they transmit
at a much lower spectral power density, measured in Watts per Hertz, than narrowband
transmitters. This lower transmitted power density characteristic gives spread signals a
big plus. Spread and narrow band signals can occupy the same band, with little or no
interference. This capability is the main reason for all the interest in Spread Spectrum
today.

3.4. Difference between CDMA and GSM

In cellular service there are two main competing network technologies: Global
System for Mobile Communications (GSM) and Code Division Multiple Access
(CDMA). Cellular carriers including Sprint PCS, Cingular Wireless, Verizon and T-
Mobile use one or the other. Understanding the difference between GSM and CDMA
will allow you to choose a carrier that uses the preferable network technology for your
needs.The GSM Association is an international organization founded in 1987, dedicated
to providing, developing, and overseeing the worldwide wireless standard of GSM.
CDMA, a proprietary standard designed by Qualcomm in the United States, has been the
dominant network standard for North America and parts of Asia. However, GSM
networks continue to make inroads in the United States, as CDMA networks make
progress in other parts of the world. There are camps on both sides that firmly believe
either GSM or CDMA architecture is superior to the other. That said, to the non-invested
consumer who simply wants bottom line information to make a choice, the following
considerations may be helpful.

3.4.1. Coverage: The most important factor is getting service in the areas you will be
using your phone. Upon viewing competitors' coverage maps you may discover that
only GSM or CDMA carriers offer cellular service in your area. If so, there is no
decision to be made, but most people will find that they do have a choice.

3.4.2. Data Transfer Speed: With the advent of cellular phones doing double and triple
duty as streaming video devices, podcast receivers and email devices, speed is important
to those who use the phone for more than making calls. CDMA has been traditionally
faster than GSM, though both technologies continue to rapidly leapfrog along this path.
Both boast "3G" standards, or 3rd generation technologies. EVDO, also known as
CDMA2000, is CDMA's answer to the need for speed with a downstream rate of about 2
megabits per second, though some reports suggest real world speeds are closer to 300-
700 kilobits per second (kbps). This is comparable to basic DSL. As of fall 2005, EVDO
is in the process of being deployed. It is not available everywhere and requires a phone
that is CDMA2000 ready. GSM's answer is EDGE (Enhanced Data Rates for GSM
Evolution), which boasts data rates of up to 384 kbps with real world speeds reported
closer to 70-140 kbps. With added technologies still in the works that include UMTS
(Universal Mobile Telephone Standard) and HSDPA (High Speed Downlink Packet
Access), speeds reportedly increase to about 275—380 kbps. This technology is also
known as W-CDMA, but is incompatible with CDMA networks. An EDGE-ready phone
is required.In the case of EVDO, theoretical high traffic can degrade speed and
performance, while the EDGE network is more susceptible to interference. Both require
being within close range of a cell to get the best speeds, while performance decreases
with distance.

3.4.3. Subscriber Identity Module (SIM) cards: In the United States only GSM
phones use SIM cards. The removable SIM card allows phones to be instantly activated,
interchanged, swapped out and upgraded, all without carrier intervention. The SIM itself
is tied to the network, rather than the actual phone. Phones that are card-enabled can be
used with any GSM carrier.

The CDMA equivalent, a R-UIM card, is only available in parts of Asia but remains on
the horizon for the U.S. market. CDMA carriers in the U.S. require proprietary handsets
that are linked to one carrier only and are not card-enabled. To upgrade a CDMA phone,
the carrier must deactivate the old phone then activate the new one. The old phone
becomes useless.

3.4.4. Roaming: For the most part, both networks have fairly concentrated coverage in
major cities and along major highways. GSM carriers, however, have roaming contracts
with other GSM carriers, allowing wider coverage of more rural areas, generally
speaking, often without roaming charges to the customer. CDMA networks may not
cover rural areas as well as GSM carriers, and though they may contract with GSM cells
for roaming in more rural areas, the charge to the customer will generally be
significantly higher.

3.4.5. International Roaming: If we need to make calls to other countries, a GSM


carrier can offer international roaming, as GSM networks dominate the world market. If
you travel to other countries you can even use your GSM cell phone abroad, providing it
is a quad-band phone (850/900/1800/1900 MHz). By purchasing a SIM card with
minutes and a local number in the country you are visiting, you can make calls against
the card to save yourself international roaming charges from your carrier back home.
CDMA phones that are not card-enabled do not have this capability, however there are
several countries that use CDMA networks. Check with your CDMA provider for your
specific requirements.According CDG.org, CDMA networks support over 270 million
subscribers worldwide, while GSM.org tallies up their score at over 1 billion. As CDMA
phones become R-UIM enabled and roaming contracts between networks improve,
integration of the standards might eventually make differences all but transparent to the
consumer. The chief GSM carriers in the United States are Cingular Wireless, recently
merged with AT&T Wireless, and T-Mobile USA. Major CDMA carriers are Sprint
PCS, Verizon and Virgin Mobile. There are also several smaller cellular companies on
both networks

3.5. GARUDA: CDMA 2000 based service


BTS (base transceiving station) radiates EM waves which are received by mobile
station. And mobile station also radiates EM waves which are received by BTS.there are
two radio links between BTS and mobile station. The link from BTS to mobile station is
called forward link (down link). The link from mobile station to BTS is called reverse
link (up link).
Fig 3.1. A typical CDMA network
CHAPTER-4. RATING AND BILLING

As a provider of rating systems companies often have to explain the difference


between rating and billing. First, company used the following diagram to illustrate the
different parts in the flow of usage events into bills and the different kinds of
relationships between rating and billing software.

Figure 4.1. The major functions in rating and billing

The terms rating, re-rating, billing, and invoice formatting are left without boundaries
above. They are in time-order but different business models change the amount of work
that these functions perform.

4.1. The Importance of the Aggregate

There is an important distinction that defines the boundaries between rating and
billing. The fundamental distinction is whether we have aggregate information available
to you. Aggregate information includes the sum of the customer's spending, minutes of
usage, bandwidth transported or other total amounts for the billing period. This
aggregate information is needed to calculate volume-based discounts and it is often
necessary when calculating taxes.

Figure 4.2. The conventional situation with unit rating


4.2. Unit Rating

Rating is the calculation of charges for the customer that can be performed
without knowledge of the aggregate. If a usage event can be priced without knowledge
of any other usage event, this is Unit Rating. Each transaction can be rated as an
independent unit. It also refers to the computers of the 1940's and 1950's where
transactions were processed on unit record machines. Each transaction was a punched
paper card. Telephone charges are largely unit rated. You can rate these in any order and
at any time during the billing cycle with the results ending up the same. Each chargeable
event stands alone.

4.3. The Most Common Scenario

Unit rating above is the most common scenario. Most telecommunications


businesses rate their transactions and then after the billing period has ended, they
perform the billing portion of the work. That portion includes charging for monthly
recurring fees, volume-based discounts, cross-product discounts, taxes, and any other
governmental fees. For one innovative service provider, Working Assets, this also
includes collecting additional money from customer that is pooled together to support
political or social causes. All of these "billing" tasks are done with the knowledge of the
aggregate information for the billing period.

4.4. Aggregate Rating

As rating is done without the aggregate information, there is immediately an


exception. In North American wireless telephony (probably in other places, too) a
prepaid airtime allocation(free minutes) is included in the monthly recurring charge for
the phone. The charge for airtime of a phone call depends on whether the airtime for the
call is a part of the free minutes. If the call's airtime minutes are included in your free
minutes allocation, then the airtime is free. If the airtime consumed prior to the call is
greater than or equal to the free airtime allocation, the airtime is rated.Maybe we should
say that each call is rated in order, but that the charge varies according to the knowledge
of the previous transactions for the billing period. In this case, the order in which you
rate the calls affects their prices.

Figure 4.3. Example with aggregate rating processes

Here we have the aggregate traveling forward along with each usage event. The final
aggregate plays a part in the volume discounting and taxing and the like, but an
intermediate aggregate is used to rate each event. The rating result is now dependent on
the order in which you process the usage events. This is Aggregate Rating. The
aggregate needed is just the total usage of the resource being rated.Most service
providers unit rate the airtime and then back out the charges at the end of the billing
period, but the above is the most streamlined method of rating.

Figure 4.4. The scenario in prepaid services

4.5. Prepaid Services

In a prepaid services environment we have have the final aggregate after every
event. The taxes and other fees must either be included in the rating of every transaction
or handled by some other process (i.e. taxes are included in the price for services). In
this case rating and billing are done after each usage event. We even collect payment
from the customer by reducing their deposit balance.

4.6. Re-Rating

On occasion a service provider wants their volume discounts distributed back to


the original usage events from which the aggregate totals were created. The usage events
are re-rated based on the knowledge of the undiscounted aggregate information. New
aggregate information results and the rest of the billing process can proceed.

Figure 4.5. The use of re-rating minimizes loss of business to price comparisons

This re-rating scenario has occurred when a service provider is losing business based on
price comparisons where the competitor offers to compare the cost of a portion of the
calls from the customer's bill. The competitor comes back with call-by-call comparisons
showing the incumbent service provider is priced higher, but the results are false. The
competitor has discounted their base rate. The incumbent provider is discounting the
total bill based on usage, but this discount doesn't affect the price shown for any single
usage event. In this environment, the service provider protects itself from this unfair
comparison by re-rating calls based on volume discounts.
M o b ile Base
TE BSC MSC PCF PDSN/ R A D IU S /
S t a t io n S t a t io n
R A D I U S c lie n t A A A s e r v e r

O r ig in a t e
c a ll O r ig in a t io n M essage
C M S e r v ic e
R equest
A s s ig n m e n t
C h a n n e l A s s ig n m e n t M eRs es qa ug e s t O v e r t h e a ir
(C A M /E C A M ) c a ll s e t u p
d e la y
S e r v ic e C o n n e c t M e s s a g e
(S C M )

S e r v ic e C o n n e c t C o m p le t io n
M essage A 9 - S e tu p - A 8
A 9 - C onnect - A 8

L C P C o n f ig u r e R e q u e s t
L C P C o n f ig u r e R e q u e s t
L C P C o n f ig u r e A c k
L C P C o n f ig u r e A c k P P P d e la y

P A P / C H A P R e q u e s t - S e r v ic e L a y e r A u t h e n t ic a tio n R A D IU S - A c c e s s
M S I D @ d o m a in . c o m ( N e t w o r k A c c e s s I d e n t if ie r ) R equest S e r v ic e
P A P /C H A P re s p o n s e R A D IU S - A c c e s s
L a y e r A u th
A ccept
I P C P C o n f ig u r e R e q u e s t d e la y
I P C P C o n f ig u r e R e q u e s t
I P C P C o n f ig u r e A c k
I P C P C o n f ig u r e A c k

Fig 4.6. Evaluation Indexes of CDMA20001X Data Service


Fig 4.7. A typical Billing diagram
CGO Router Hari nagar E1 Rohini E1 Rohini E1
172.15.14.19 CGO E1 172.15.14.1 10.196.43.1 10.196.43.2
172.15.14.3 255.255.255.252 255.255.255.252
255.255..255.240 255.255.255.240
255.255.255.240
1721 7206 Rohini E1
10.196.43.6
CGO CGO E1 Rohini E1 255.255.255.252
MSC CGO Router 172.15.14.4 Hari nagar E1 10.196.43.5
172.15.14.20 255.255.255.240 172.15.14.2 255.255.255.252
255.255.255.240 255.255.255.240

1721 Billing Hari nagar


router Area Router
172.14.14.35
255.255.0.0

Hari Hari Hari Hari Hari Hari


nagar nagar nagar nagar nagar nagar
MSC HLR WIN PDSN SMSC VMS

STR-3

STR-2

2950 SW-2
3510
2950 SW-2 PUBLIC NETWORK Storage
172.14.14.33 172.14.14.5
STR-1

2950 SW-1
2950 SW-1
172.14.14.30

SAN-1
172.14.14.9

SAN-2
172.14.14.10

PUBLIC NETWORK

WAN LINK
Tcerminal Concentrator
172.14.14.4 TC Cable

Fiber cable

ce2 172.14.14.132
Fiber cable
ce2:1 172.14.14.6
LTBB01
ce0 172.14.14.1
ce0:1 172.14.14.131

CE1 172.14.14.22

CE2 172.14.14.134
LTAPPS
LTBB02
CE0 172.14.14.19 ce0 172.14.14.3
ce0:1 172.14.14.133

CE1 172.14.14.23

CLUSTER INTERCONNECT
3COM SWITCH
LTBATCH
CE0 172.14.14.20 BMS-DELHI
CE2 172.14.14.136
ce2:1 172.14.14.7
CE1 172.14.14.24

LTRATING ce0 172.14.14.2


ce0 172.14.14.135

CE0 172.14.14.21
CHAPTER-5. SECURITY OF CDMA NETWORKS

The security protocols with CDMA-IS-41 networks are among the best in the
industry. By design, CDMA technology makes eavesdropping very difficult, whether
intentional or accidental.Unique to CDMA systems, is the 42-bit PN (Pseudo-Random
Noise) Sequence called “Long Code” to scramble voice and data. On the forward link
(network to mobile), data is scrambled at a rate of 19.2 Kilo symbols per second (Ksps)
and on the reverse link, data is scrambled at a rate of 1.2288 Mega chips per second
(Mcps). CDMA network security protocols rely on a 64-bit authentication key (A-Key)
and the Electronic Serial Number (ESN) of the mobile. A random binary number called
RANDSSD, which is generated in the HLR/AC, also plays a role in the authentication
procedures. The A-Key is programmed into the mobile and is stored in the
Authentication Center (AC) of the network. In addition to authentication, the A-Key is
used to generate the sub-keys for voice privacy and message encryption.CDMA uses the
standardized CAVE (Cellular Authentication and Voice Encryption) algorithm to
generate a 128-bit sub-key called the “Shared Secret Data” (SSD). The A-Key, the ESN
and the network-supplied RANDSSD are the inputs to the CAVE that generates SSD.
The SSD has two parts: SSD_A (64 bit), for creating authentication signatures and
SSD_B (64 bit), for generating keys to encrypt voice and signaling messages. The SSD
can be shared with roaming service providers to allow local authentication.

5.1.Authentication
In CDMA networks, the mobile uses the SSD_A and the broadcast RAND* as inputs to
the CAVE algorithm to generate an 18-bit authentication signature
AUTH_SIGNATURE), and sends it to the base station. This signature is then used by
the base station to verify that the subscriber is legitimate. Both Global Challenge (where
all mobiles are challenged with same random number) and Unique Challenge (where a
specific RAND is used for each requesting mobile) procedures are available to the
operators for authentication. The Global Challenge method allows very rapid
authentication. Also, both the mobile and the network track the Call History Count (a 6-
bit counter). This provides a way to detect cloning, as the operator gets alerted if there is
a mismatch.
Chapter-6. Electronic Exchanges:

6.1. Facilities provided by Electronic Exchanges

Facilities offered by electronic exchanges can be categorized in three arts.

(I) Facilities to the Subscribers.


(ii) Facilities to the Administration.
(iii) Facilities to the Maintenance Personnel,

6.1. 1.Facilities to the Subscribers:

6.1.1.1. MFCPush-button Dialing. All subscribers in an electronic exchange can use


push-button telephones, which use Dual Tone Multi- frequency, for sending the dialed
digits. Sending of eleven digits per second is possible, thus increasing the dialing
speed.

6.1.1.2. Priority Subscriber Lines. Priority Subscribers lines may be provided in


electronic exchanges. These subscribers are attended to, according to their priority level,
by the central processor, even during heavy congestion or emergency.

6.1.1.3. Toll (Outgoing Call) Restriction. The facility of toll restriction or blocking of
subscriber line for specific types of outgoing traffic, viz., long distance STD calls, can
be availed of by all subscribers. This can be easily achieved by keying-in certain service
codes.

6.1.1.4. Service Interception. Incoming calls to a subscriber can be automatically


forwarded during his absence, to a customer service position or a recorded
announcement. The customer service position answers the calls and forwards any
message meant for the subscriber.

6.1.1.5. Abbreviated Dialing. Most subscribers very often call only limited group of
telephone numbers. By dialing only prefix digit followed by two selection digits,
subscribers can call up to 100 predetermined subscribers connected to any automatic
exchange. This shortens the process of dialing all the digits.
6.1.1.6. Call Forwarding. The subscriber having the call forwarding facility can keep
his telephone in the transfer condition in case he wishes his incoming calls to be
transferred to another telephone number during his absence.

6.1.1.7. Do Not Disturb.This service enables the subscriber to free himself from
attending to his incoming calls. In such a case, the incoming calls are routed to an
operator position or a talking machine. This position or machine informs the caller that
called subscriber is temporarily inaccessible.

6.1.1.8. Conference Calls. Subscribers can set up connections to more than one
subscriber and conduct telephone conferences under the provision of this facility.

6.1.1.9. Camp On Busy. Incoming call to a busy subscriber can be “Camped on” until
the called subscriber gets free. This avoids wastage of time in redialing a busy telephone
number.

6.1.1.10. Call Waiting. The ‘Call Waiting’ service notifies the already busy subscriber
of a third party calling him. He is fed with a special tone during his conversation. It is
purely his choice either to ignore the third party or to interrupt the existing connection
and have a conversation with the third party while holding the first party on the line.

6.1.1.11. Call Repetition. Instead of camp on busy a call can automatically be


repeated. The calling party can replace his hand set after receiving the busy tone. A
Periodic check is carried out on the called party’s status. When idle status is ascertained,
the connection is set up and ringing current fed to both the parties.

6.1.1.12. Third party Inquiry. This system permits consultation and the transfer of call
to other subscribers. Consultation can be initiated by means of a special signal from the
subscriber telephone and by dialing the directory number of the desired subscriber
without disconnecting the previous connection.

6.1.1.13. Priority of calls to Emergency Positions. Emergency calls such as


ambulance, fire, etc., are processed in priority to other calls.
6.1.1.14. Subscriber charge Indicator. By placing a charge indicator at the subscriber’s
premises the charges of each call made can be ascertained by him.

6.1.1.15. Call Charge printout or immediate Billing. The subscriber can request
automatic post call charge notification in the printout form for individual calls or for all
calls. The information containing called number, date and time, and the charges can be
had on a Tele-type-write.

6.1.1.16. Malicious Call Identification. Malicious Call Identification is done


immediately and the information is obtained in the printout from either automatically or
by dialing an identification code.

6.1.1.17. Interception or Announcement. In the following conditions, an


announcement is automatically conveyed to calling subscribers.

(i) Change of a particular number of transferred subscriber.


(ii) Dialing of an unallocated cods.
(iii) Dialing of an unobtainable number.
(iv) Route congested or out of order.
(v) Subscriber’s line temporarily out of order.
(vi) Suspension of service due to non-payment.

6.1.1.18. Connection without Dialing. This allows the subscribers to have a specific
connection set up, after lifting the handset, without dialing. If the subscriber wishes to
dial another number, then he has to start dialing within a specified time period, say 10
seconds, after lifting the handset.

6.1.1.19. Automatic Wake Up. Automatic wake up service or morning alarm is


possible, without any human intervention.

6.1.1.20. Hot Line or Private Wire. Hot line service enables the subscriber to talk to a
specific subscriber by only lifting the handset. This service cannot be used. along with
normal dialing facility. The switching starts as soon as the receiver is lifted.
6.1.1.21. Denied Incoming Call. A Subscriber may desire that no incoming call should
come on a particular line. He can ask for such a facility so that he can use the line for
making only outgoing calls.

6.1.1.22. Instrument Locking. A few subscribers may like to have their telephone sets
locked up against any misuse. Dialing of a secret code will extend such a facility to
them.

6.1.1.23. Free of charge Calls. Calls free of charge are possible on certain special
services such as booking of complaints , booking of telegrams, etc.

6.1.1.24. Collect call. If so desired, the incoming subscriber is billed for all the calls
made to him, instead of the calling subscriber.

6.1.2. Facilities to the Administration:

6.1.2.1. Reduced Switch Room Accommodation. Reduction in switch room


accommodation to about 1/6th to 1/4th as compared to Cross-bar system is possible.

6.1.2.2. Faster installation and Easy Extension. The reduced volume of equipment,
plug-in assemblies for interconnecting cables, printed cards and automatic testing of
exchange equipment result in faster installation (about six months for a 10,000 line
exchange) Due to modular structure, the expansion is also easier and quicker.

6.1.2.3. Economic Consideration. The switching speed being much faster as compared
to Cross-bar system, the use of principle of full availability of trunk circuits and other
equipment makes the system economically superior to electromechanical systems.

6.1.2.4. Automatic test of Subscriber line. Routine testing of subscriber lines for
Insulation, capacitance, foreign potential, etc., are automatically carried out during night.
The results of the testing can be obtained in the printout form, the next day.

6.1.3.Maintenance Facilities

6.1.3.1. Fault Processing. Automatic fault processing facility is available for checking
all hardware components and complete internal working of the exchange. Changeover
from a faulty sub-system to stand-by sub-system is automatically affected without any
human intervention. Only information is given out so that the maintenance staff is able
to attend to the faulty sub-system.

6.1.3.2. Diagnostics. Once a fault is reported by the system, ‘on demand’ programs are
available which help the maintenance staff to localize the fault, who can replace the
defective printed card and restore the faulty sub-system. The faulty card is attended at a
centralized maintenance centre specifically equipped for this purpose.

6.1.3.3. Statistical programs. Statistical programs are available to gather information


about the traffic conditions and trunks occupancy rate to assess and plan the solutions in
cases of anticipated problems. This facility helps the maintenance and administration
personnel to maintain a specified level of grade of service.

6.1.3.4. Blocking. In case of congestion or breakdown of a specific route, facility of


blocking such routes is available in modes, such as
(i) Blocking of a specified percentage of calls in such a route either automatically
or manually.
(ii) Blocking a specific category of subscribers.

6.1.4. Overloading Security

Overloading of central processor in an electronic exchange can lead to disastrous


results. To prevent this, central processor occupancy is measured automatically
periodically, when it exceeds a specified percentage, audio-visual alarms are activated,
in addition to printing out the message. Maintenance personnel have the following
options.

(i) Block some of the facilities temporarily, or

(ii) Reduce the load by blocking some of the congested routes.


6.2. CONSTRAINTS OF ELECTRONIC EXCHANGES

Though there are a number of definite advantages of Electronic exchanges, over


the electromechanical exchanges, there are certain constraints, which should be
considered, at the planning stage for deciding between the two systems.

6.2.1. Traffic Handling Capacity. Apparently, the traffic handling capacity of an


exchange is limited by the number of subscriber lines and trunks connected to the
switching network, and the number of simultaneous paths available through the
switching network. However, in electronic exchanges, the prime limitation is the number
of simultaneous calls, which can be handled by the control equipment, as it has to
execute a number of instructions depending on the type of the call. Therefore the extent
of loading of the exchange will be guided solely by the amount of processor loading.
Moreover, the facilities to the subscribers will also have to be limited accordingly.

6.2.2. Power Supply. The power supply should be highly stable for trouble free
operation as the components are sensitive to variations beyond +10%. It is almost
essential to have a stand-by power supply arrangement.

6.2.3. Total Protection from Dust. All possible precautions should be observed for
ensuring dust-free environment.

6.2.4. Temperature and Humidity Control. Due to the presence of quiescent current
in the components and because of their compactness., heat generated per unit volume is
highest in electronic exchanges. Moreover, as the component characteristics drift
substantially with the temperature and humidity, the air-conditioning load is higher.
Obviously, the air-conditioning system should be highly reliable and preferably there
should be a stand-by arrangement. The installation is also carried out in air-conditioned
environment.

6.2.5.Static Electricity and Electromagnetic interference. Due to the presence of


static electricity on the body of persons handling the equipment, the stored data may get
vitiated. Handling of PCB’s therefore, should be done with utmost care and should be
minimised care should also be taken to protect the cards from exposure to stray
electromagnetic fields.

6.2.6. PCB Repair. The repair of PCB’s is extremely complicated and sophisticated
equipments are required for diagnosing the faults. This results in having costly
inventory and a costly repair centre. With the frequent improvement and changes in the
cards, proper documentation of cards becomes essential.

6.2.7.Faster Obsolescence. The changes in the field of electronics are almost


revolutionary with the very fast improvements. Hence, the current technology becomes
obsolete at a very fast rate. The equipment becomes obsolete before it can possibly
complete one third of its life and it might be impossible to get spare parts for the entire
currency of the life of the system.
CHAPTER-7. INTELLIGENT NETWORK

7.1. Overview of Intelligent Network Architecture


Over the last thirty years, one of the major changes in the implementation of
Public Switched Telephone Networks (PSTNs) has been the migration from analogue to
digital switches. Coupled with this change has been the growth of intelligence in the
switching nodes. From a customer's and network provider's point of view this has meant
that new features could be offered and used.Since the feature handling functionality was
resident in the switches, the way in which new features were introduced into the network
was by introducing changes in all the switches. This was time consuming and fraught
with risk of malfunction because of proprietary feature handling in the individual
switches. To overcome these constraints the Intelligent Network architecture was
evolved both as a network and service architecture. In the IN architecture, the service
logic and service control functions are taken out of the individual switches and
centralized in a special purpose computer. The interface between the switches and the
central computer is standardized. The switches utilize the services of the specialized
computer whenever a call involving a service feature is to be handled. The call is
switched according to the advice received by the requesting switch from the computer.
For normal call handling, the switches do not have to communicate with the central
computer.

7.2. Objectives of the Intelligent Network

The main objectives of the IN are the introduction and modification of new
services in a manner which leads to substantial reduction in lead times and hence
development costs, and to introduce more complex network functions. An objective of
IN is also to allow the inclusion of the additional capabilities and flexibility to facilitate
the provisioning of services independent of the underlying network's details. Service
independence allows the service providers to define their own services independent of
the basic call handling implementation of the network owner.
The key needs that are driving the implementation of IN are :

• Rapid Service Deployment


Most business today require faster response from their suppliers, including
telecommunication operators. By separating the service logic from the
underlying switch call processing software, IN enables operator to provide new
services much more rapidly.

• Reduced Deployment Risk


Prior to IN, the risk associated with the deployment of new services was
substantial. Major investments had to be made in developing the software for the
services and then deploying them in all of the switches. With the service creation
environment available, the IN services can be prototyped, tested and accessed by
multiple switches simultaneously. The validated services can then be rolled out
to other networks as well.

• Cost Reduction
Because the IN services are designed from the beginning to be reusable, many
new services can be implemented by building on or modifying an existing
service. Reusability reduces the overall cost of developing services. Also, IN is
an architecture independent concept, i.e. it allows a network operator to choose
suitable development hardware without having to redevelop a service in the
event that the network configuration changes.

• Customization
With IN, the process of modifying the service or customization of service for a
specific customer is much less expensive and time consuming.The customization
of services is further facilitated by the integration of advanced peripherals in the
IN through standard interfaces. Facilities such as voice response system,
customized announcements and text to speech converters lead to better call
completion rate and user-friendliness of the services.
7.3. IN Architecture
Building upon the discussion in the previous section, one can envisage that an IN
would consist of the following nodes :

• Specialized computer system for – holding service logic, feature control, service
creation, customer data, and service management.

• Switching nodes for basic call handling.

• Specialized resources node.

The physical realization of the various nodes and the functions inherent in them
is flexible. This accrues form the "open" nature of IN interfaces. Let us now look at the
nodes that are actually to be found in an IN implementation. The service logic is
concentrated in a central node called the Service Control Point (SCP0. The switch with
basic call handling capability and modified call processing model for querying the SCP
is referred to as the Service Switching Point (SSP). Intelligent Peripheral (IP) is also a
central node and contains specialized resources required for IN service call handling. It
connects the requested resource towards a SSP upon the advice of the SCP. Service
Management Point (SMP) is the management node which manages services logic,
customers data and traffic and billing data. The concept of SMP was introduced in order
to prevent possible SCP malfunction due to on-the-fly service logic or customer data
modification. These are first validated at the SMP and then updated at the SCP during
lean traffic hours. The user interface to the SCP is thus via the SMP. All the nodes
communicate via standard interfaces at which protocols have been defined by
international standardization bodies. The distributed functional architecture, which is
evident from the above discussion, and the underlying physical entities are best
described in terms of layers or planes. The following sections are dedicated to the
discussion of the physical and functional planes.
Fig 14.IN Architecture
7.4. Physical Plane

7.4.1. Service Switching Point (SSP). The SSP serves as an access point for IN
services. All IN services calls must first be routed through the PSTN to the "nearest"
SSP. The SSP identifies the incoming call as an IN service call by analysing the initial
digits (comprising the "Service Key") dialled by the calling subscriber and launches a
Transaction Capabilities Application Part (TCAP) query to the SCP after suspending
further call processing. When a TCAP response is obtained from the SCP containing
advice for further call processing, SSP resumes call processing. The interface between
the SCP and the SSP is G.703 digital trunk. The MTR, SCCP, TCAP and INAP
protocols of the CCS7 protocol stack are defined in this interface.

7.4.2. Service Control Point (SCP).


The SCP is a fault-tolerant online computer system. It communicates with the SSPs and
the IP for providing guidelines on handling IN service calls. The physical interface to the
SSPs is G.703 digital trunk. It communicates with the IP via the requesting SSP for
connecting specialized resources. SCP stores large amounts of data concerning the
network, service logic, and the IN customers. For this, secondary storage and I/O
devices are supported. For more details refer to the chapter on the "SCP Architecture".
As has been commented before, the service programs and the data at the SCP are
updated from the SMP.

7.4.3. Service Management Point (SMP)


The SMP, which is a computer system, is the front-end to the SCP and provides the user
interface. It is sometimes referred to as the Service Management System (SMS). It
updates the SCP with new data and programs (service logic) and collects statistics from
it. The SMP also enables the service subscriber to control his own service parameters via
a remote terminal connected through dial-up connection or X.25 PSPDN. This
modification is filtered or validated by the network operator before replicating it on the
SCP. The SMP may contain the service creation environment as well. In that case the
new services are created and validated first on the SMP before downloading to the SCP.
One SMP may be used to manage more than one SCPs.

7.4.4. Intelligent Peripheral (IP)

The IP provides enhanced services to all the SSPs in an IN under the control of the SCP.
It is centralized since it is more economical for several users to share the specialized
resources available in the IP which may be too expensive to replicate in all the SSPs.
The following are examples of resources that may be provided by an IP:
• Voice response system
• Announcements
• Voice mail boxes
• Speech recognition system
• Text-to-speech converters

The IP is switch based or is a specialized computer. It interfaces to the SSPs via


ISDN Primary Rate Interface or G.703 interface at which ISUP, INAP, TCAP, SCCP
and MTP protocols of the CCS7 protocol stack are defined.

7.4.5. Distributed Functional Plane


Functional model of IN contains nine functional entities (FE's) which are distributed
over various physical entities (PE's) described in the previous section. A functional
entity is a set of unique functions. Brief description of the FE's is given below :
7.4.5.1. CCAF.Call Control Agent Function, gives users access to the network.
7.4.5.2. CCF. Call Control Function provides the basic facility for connecting the
transport (e.g. speech). It involves the basic switching function and trigger
function for handling the criteria relating to the use of IN.
7.4.5.3. SSF. Service Switching Function is used to switch calls based on the advice of
the SCF at the SCP. This function provides a service independent interface.
7.4.5.4. SCF. It contains the service logic components and advises the SSF at SSP on
further call handling.
7.4.5.5. SDF.Service Data Function contains the user related data and data internal to the
network.
7.4.5.6. SRF. Specialized Resources Function covers all types of specialized resources
other than the connection resources that are in the exchange (e.g. recorded
announcements, tones, conference bridges, etc.).
7.4.5.7. SCEF.Service Creation Environment Function specifies, develops, tests and
deploys the services on the network.
7.4.5.8. SMAF. Service Management Access Function provides an interface between
service management function and the service manager who may be an operator.
7.4.5.9. SMF. Service Management Function enables a service to be deployed and used
on IN.

Fig. 15.Distributed Functional Entities


The distribution of functional entities over the physical entities and their inter-
connection is summarized in Table 1 and 2 below. It may be noted that all the physical
entities may not be present in all INs as the choice of functional entities to be
provisioned is entirely up to the service provider.

Distribution of FE's over PE's

Physical Entity Possible Functional Entities


SSP CCF, SSF, CCAF
SCP SCF, SDF
SMP SCEF, SMF, SMAF
IP SRF

FE-FE Relationship to PE-PE Relationship

FE-FE PE-PE Protocol


SSF-SCF SSP-SCP INAP, TCAP, SCCP and MTP
SCF-SDF SCP-SDP X.25 or Proprietary
SCF-SRF SCP-IP INAP, TCAP, SCCP and MTP
SCP-SSP-IP ISUP, INAP, TCAP, SCCP and
MTP
SRF-SSF SSP-IP ISUP and MTP

IN Services

The IN services proposed to be introduced in Indian network have been derived


from ITU-T recommendations. Q.1211 (April ’92). This document briefly gives the
description of 25 services mentioned in Capability set no. 1 (CS1) of above mentioned
ITU-T recommendations. CS1 basically deals with single ended services (which ITU-T
calls as Type-A services). Single needed services apply to only one party in the call.

(1) ABD – Abbreviated dialing


The subscriber can register a short dialing code and use the same for access to any PSTN
Number.
(2) ACC – Account Card Calling
• A special telephone instrument is required.
• User dials an access code and gets acceptance tone.
• Then he dials a PIN (personal identification no.) code and dials the called
no. The Exchange reads the account number from card.
• The Billing is debited to an account number (Telephone no.) as defined
by the card.
• In another variation of the service, the account number can be given
through DTMF telephone instrument.
• The follow-on feature facilitates the subscriber to dial another number
without disconnecting the call and without need to dial PIN and account
number again.

(3) AAB – Automatic Alternative Billing


• Call can be initiated by any user and any instrument.
• The call charges are billed in user’s account and that account need not be
a calling or a called party.
• The user first dials access code.
• Receives an announcement to dial account code and PIN (which is given
by management).
• The account code and PIN are validated to check its correctness and
expired credit limit.
• On getting acceptance tone the user dials the called number.
• In another variation of the service, the called party may be billed based
on his concurrence.

(4) CD – Call Distribution


• This service allows subscribers to have I/C calls routed to different
destinations according to allocation law specified by management (The
Subscriber has multiple installations).
• Three types of laws exist :
- Uniform load distribution
- % Load distribution
- Priority list distribution
• In case of congestion or fault the alternative over flow is specified.

(5) CFU – Call Forwarding Unconditional


The subscriber can forward all incoming calls to a specified destination number.
Optionally an alerting ring/reminder ring can be given to the forwarding subscriber
whenever there is an incoming call.

(6) CRD – Call Rerouting Distribution


• Calls are rerouted as per conditions encountered, e.g. busy or no reply
(time specified) or overload or call limiter.
• Then as per selected condition the call is rerouted to predefined choice,
e.g. paper, vocal box, announcement or queue.

(7) Completion of calls to busy subscriber


The service cannot be fully implemented with CSI capability since the status of called
party need to be known.
• The calls are completed when subscriber who is busy becomes free.
• On getting busy tone – user dials a code.
• The user disconnects.
• On called party becoming free, call is made by the exchange first to
originating then to terminating subscriber (without any call attempt by the
user).

(8) CON – Conference Calling


The service cannot be fully implemented with CSI capability. In adding or dropping the
parties concerned it is not possible to check the authenticity of the parties. This service
requires a special transmission bridge to allow conversation among multiple subscribers.
CON-Add-ON-Conference Calling
• User reserves the CON resources in advance indicating date, time of
conference and duration.
• Controlled by user.
• In active phase of conference parties can be added, deleted, isolated again
reattached or split the group of parties.
• CON-Meet-ME – Conference calling meet me
• User reserve the resource same as 8A.
• Each participant dials a special number at specific time (specified at the
time of booking of conference) and reach the conference bridge.

(9) CCC – Credit Card Calling


• The Credit Card Calling service allows subscribers to place calls from
any normal access interface to any destination number and have the cost
of these calls charged to account specified by the CCC number.
• A special instrument is not required. The caller has to dial card number
and PIN using DTMF instrument.
• Follow-on feature may be provided optionally.

(10) DCR – Destination Call Routing


The call is routed to destination pertaining to following conditions :
• Time of day, day of week
• Area of call originating
• Calling identity of customer
• Services attributes (non payment charges against subscriber)
• Priority
• Charge rates applicable for destination
• Proportional routing of traffic
• Optionally the subscribers can be provided with traffic details

(11) FMD – Follow me Diversion


• A subscriber can remotely control the call forwarding capabilities.
• It can be done from any point in the network using a password.
• It is required if subscriber moves from place to place in a day.
• The service subscriber will pay for diverted portion of the call.

(12) FPH – Free Phone


• The called subscriber is charged for active phase of a call.
• For the calling user, no charging is done.
• The called subscriber can have multiple destinations and have DCR
facility.

(13) MCI – Malicious Call Indication


• The subscriber requests the Administration to register his number for
MCI.
• Administration registers the subscriber for MCI.
• The called subscriber (who has registered this service) invokes the
service during the active phase of the call if he feels that the call is
malicious.
• The call is logged in the network with calling and called party number
and Date and time of invoking the service.
• Optionally, the network can log unanswered calls also.
• Optionally, the facility to HOLD the connection may be provided.

(14) MAS – Mass Calling


• It involves high volume of traffic.
• Calls can be routed to one or multiple destinations depending on
geographical location or time of day.
• Mainly used in Televoting.
• The network operator allots a service number.
• The user dials this number to register his vote.
• The user is played an announcement and asked to give his choice.
• At the end of the service, the network operator provides the call details
and the count on various preferences.
• After the service the same number can be reallocated to another
subscriber.
• Calls made to this MAS number may be charged differently.

(15) OCS – Originating Call Screening


• This helps subscriber to screen outgoing call as per day and time.
• The screening list may be managed by subscriber.
• The restriction of screening list may be override by PIN or password.
Three call cases are possible :
- Call screened and allowed
- Call screened and rejected
- Call passed by using override option

(16) PRM – Premium Rate


• The local call is charged at a higher (premium) rate.
• This service is used by service providers for value added information
services, e.g. jobs, fortune, forecast, etc.
• The revenue is shared between network operator and service provider.
• The network operator allots a specific number to service provider, which
can be reached from any point in the network.
• The provision exists for multiple site provider, in order to achieve
minimum expenditure on actual call.

(17) SEC – Security Screening


• This capability allows security screening to be performed in the network
before an end user gains access to subscriber’s network, systems or
application.
• It detects the invalid access attempts : how many, over what time period,
by whom and from where.
• It provides an added layer of security.

(18) SCF – Selected Call Forwarding (Busy/Don’t answer)


• This facility is used for a group of 5 to 10 subscribers.
• A list of SCF is prepared by a subscriber.
• The list contains the choices as per conditions and calling subscribers of
the group.
• A call from outside the group is forwarded to default telephone number.
• The variation in SCF list can be done as per time of the day.

(19) SPL – Split Charging


• It allows service subscriber to share the call charges with calling party on
per call basis.

(20) VOT - Televoting


• It is used to survey the public opinion by different agencies.
• The network operator allocates a single telephone number to surveyor.
• Each time user makes a call he can get access to televoting.
• An announcement asks him to input further choice digits as per
preference.
• As the user presses the digits the choice counter is incremented.
• After voting is ceased the service subscriber is supplied the results.

(21) TCS – Terminating Call Screening


• The incoming calls are screened as per screening list.
• Calls are allowed as per list and time of the day.

(22) UAN – Universal Access Number


• National number is published by the subscriber.
• The subscriber may specify the incoming calls to be routed to number of
different destinations based on geographical locations of caller.
(23) UPT – Universal Personal Telecommunications
• A universal number is defined.
• Whenever subscriber changes the destination, he inputs that number from
telephone.
• When a call comes, UPT number is translated to actual number.
• This number can be accessed across various multiple networks, e.g.
mobile and fixed.
• It can be accessed from any user network access.

(24) UDR – User Defined Routing


• The user is allowed to define the routing of outgoing calls through
different network such as private, public, virtual or mixed network.
• As per time of the day, for example the call is routed to either public or
private network whichever is cheaper.
• For example, outstation calls can have different routes at different times
of the day.

(25) VPN – Virtual Private Network


• A private network is built using public network resources.
• A virtual PABX is created using different switches.
• A PNP (private numbering plan) can be incorporated on those numbers.
• Facilities such as CT, CH, dialed restrictions and other supplementary
services can be provided within the network.
• Each line or user is assigned a class of service and specific rights in the
network.
• To access the VPN from outside by one of VPN user, he is required to
dial a password.
• Screening feature can be used to put restriction on outgoing and incoming
calls.
• Call charges are assigned to VPN service subscriber.
• Additional Account Codes are assigned to service subscriber to analyse
the costline wise.

Charging

The IN services can be broadly divided into three categories for charging purposes :
- No charging for calling user
- Charging of calling user as per local call
- Charging of calling user at higher rates
No charging for calling user : FPH, VCC and VPN services fall under this category.
Level ‘160’ is free at present and is proposed to be allotted to such services. Local
exchanges need to analyse only ‘160’ and route the call to SSP. This level has to be
created as charge free. New services of this type can be introduced in future without any
requirement of further modification in local exchanges
Charging of calling user as per local call : UN (local) falls under this category. Level
‘190’ is free at present and is proposed to be allotted to such services. Local exchanges
need to analyse only ‘190’ and route the call to SSP. This level has to be created as local
charge. New services of this type can be introduced in future without any requirement of
further modification in local exchanges.
Charging of calling user at higher rates : PRM and UN (long distance) falls under this
category. Since the charging is at higher rate it is proposed that prefix ‘0’ may be used to
have barring facility. Level ‘090’ may be used for such purpose. Local exchange will
analyse ‘090’ and route the call to SSP. This level has to be created as ‘charge on
junction pulses’. New services of this type can be introduced in future without any
requirement of further modification in local exchanges.
The access code of various IN services as proposed is as follows :
No charging for calling user :
FPH 1600
VCC 1601
Password change for VCC 1602
VPN 1603
Charging of calling user as per local call :
UN (local) 1901
Televoting 1902
Charging of calling user at higher rates :
PRM 0900
UN (Long distance) 0901

SUMMARY AND CONCLUSION

Rating and billing

Most usage transactions in the world are processed in a unit rating environment. Even
the "aggregate rated" wireless phone calls are usually unit rated and then the free
minutes allocation are used to back out charges at the time of billing. The choice of unit
rating is a choice that reduces complexity and reduces the costs of processing
transactions. It also the traditional method of implementation.
REFERENCES

S-ar putea să vă placă și