WO2000074325A1 - System and method for proactive performance management in a hybrid communication system - Google Patents

System and method for proactive performance management in a hybrid communication system Download PDF

Info

Publication number
WO2000074325A1
WO2000074325A1 PCT/US2000/015391 US0015391W WO0074325A1 WO 2000074325 A1 WO2000074325 A1 WO 2000074325A1 US 0015391 W US0015391 W US 0015391W WO 0074325 A1 WO0074325 A1 WO 0074325A1
Authority
WO
WIPO (PCT)
Prior art keywords
service
network
call
switch
data
Prior art date
Application number
PCT/US2000/015391
Other languages
French (fr)
Inventor
Michel K. Bowman-Amuah
Original Assignee
Accenture Llp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Accenture Llp filed Critical Accenture Llp
Priority to AU54632/00A priority Critical patent/AU5463200A/en
Publication of WO2000074325A1 publication Critical patent/WO2000074325A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5009Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/04Selecting arrangements for multiplex systems for time-division multiplexing
    • H04Q11/0428Integrated services digital network, i.e. systems for transmission of different types of digitised signals, e.g. speech, data, telecentral, television signals
    • H04Q11/0478Provisions for broadband connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0029Provisions for intelligent networking
    • H04Q3/0045Provisions for intelligent networking involving hybrid, i.e. a mixture of public and private, or multi-vendor systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5625Operations, administration and maintenance [OAM]
    • H04L2012/5626Network management, e.g. Intelligent nets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5629Admission control
    • H04L2012/5631Resource management and allocation

Definitions

  • the present invention relates to hybrid communication networks and more particularly to proactive service level threshold management in a hybrid communication network.
  • the current telecommunication service providers' networks reflect the architecture of the PSTN network as it has evolved over the last 100 years. This is largely based on circuit switched technologies. Initially, all telecommunication services were offered via a wired infrastructure. As the user-base increased and requirements changed over the last few decades, new types of services were created e.g. wireless PSTN, cable video, multi-service (PSTN, video, satellite). The networks that supported these services were created as parallel networks, along-side the existing PSTN network. As technologies matured, there was some convergence (e.g. they shared the same SONET backbone) in the network architecture.
  • Core is a set of parallel networks; PSTN, wireless, satellite, cable, ATM, frame relay, IP. There is some interoperability between the services on these parallel network
  • PSTN public switched telephone
  • wireless wireless
  • telephone calls, data and other multimedia information is routed through a hyb ⁇ d network which includes transfer of information across the internet utilizing telephony routing information and internet protocol address information
  • the hyb ⁇ d network includes a Proactn e Threshold Manager which forewarns service providers of an impending breach of contract
  • the Proactive Threshold Manager sends an alarm to the service provider when the current level of service will miss a service level agreement to maintain a certain level of service
  • FIG. 1A is a block diagram of an exemplary telecommunications system in accordance with a preferred embodiment
  • Figure IB shows a block diagram of the Network Data Management in accordance with a preferred embodiment
  • FIG. 1B-1 is a flowchart illustrating a Network Data Management process m accordance with a preferred embodiment
  • Figure IC shows a block diagram of the Customer Interface Management Process in accordance with a preferred embodiment
  • Figure lC-1 is a flowchart illustrating a Customer Interface Management Process in accordance with a preferred embodiment
  • Figure ID shows a block diagram of the Customer Qua tv of Service Management Process in accordance with a preferred embodiment
  • Figure 1D-1 is a flowchart illustrating a Customer Quality of Service Management Process in accordance with a preferred embodiment
  • Figure IE shows a block diagram of the Service Quality Management in accordance with a preferred embodiment
  • FIG. 1E-1 is a flowchart illustrating a Service Quality Management Process in accordance with a preferred embodiment
  • Figure IF shows a block diagram of the Problem Handling Process in accordance with a preferred embodiment
  • Figure 1F-1 is a flowchart illustrating a Problem Handling Management Process m accordance with a preferred embodiment.
  • Figure 1G shows a block diagram of the Rating and Discounting Process in accordance with a preferred embodiment
  • Figure 1G-1 is a flowchart illustrating Rating and Discounting Process accordance with a preferred embodiment
  • Figure 1H shows a block diagram of the Invoice and Collections Process in accordance with a preferred embodiment
  • Figure 1H-1 is a flowchart illustrating an Invoice and Collections Process in accordance with a preferred embodiment
  • Figure 2A is a flowchart showing illustrating media communication over a hyb ⁇ d network in accordance with a preferred embodiment
  • Figure 2B is a block diagram of an exemplary computer system in accordance with a preferred embodiment.
  • FIG. 3 illustrates the CDR and PNR call record formats in accordance with a preferred embodiment
  • FIGS. 4(A) and 4(B) collectively illustrate the ECDR and EPNR call record formats in accordance with a preferred embodiment
  • FIG. 5 illustrates the OSR and POSR call record formats in accordance with a preferred embodiment
  • Figures 6(A) and 6(B) collectively illustrate the EOSR and EPOSR call record formats in accordance with a preferred embodiment
  • Figure 7 illustrates the SER call record format in accordance with a preferred embodiment
  • FIGS. 8(A) and 8(B) are control flow diagrams illustrating the conditions under which a switch uses the expanded record format in accordance with a preferred embodiment
  • Figure 9 is a control flow diagram illustrating the Change Time command in accordance with a preferred embodiment
  • Figure 10 is a control flow diagram illustrating the Change Daylight Savings Time command in accordance with a preferred embodiment
  • FIG 11 is a control flow diagram illustrating the Network Call Identifier (NCID) switch call processing in accordance with a preferred embodiment
  • Figure 12 is a control flow diagram illustrating the processing of a received Network Call
  • Figure 13(A) is a control flow diagram illustrating the generation of a Network Call Identifier in accordance with a preferred embodiment
  • Figure 13(B) is a control flow diagram illustrating the addition of a Network Call Identifier to a call record in accordance with a preferred embodiment
  • Figure 14 is a control flow diagram illustrating the transport of a call in accordance with a preferred embodiment
  • FIG. 15A is a flowchart showing a Fault Management Process in accordance with a preferred embodiment of the present invention.
  • Figure 15B is a block diagram showing a Fault Management component in accordance with a preferred embodiment of the present invention.
  • Figure 16A is a flowchart showing a Proactive Threshold Management Process in accordance with a preferred embodiment of the present invention
  • Figure 16B is a flowchart showing a Network Sensing Process in accordance with one embodiment of the present invention
  • FIG. 17 is a flowchart showing an Element Management Process in accordance with a preferred embodiment of the present invention.
  • Figure 18 is a flowchart showing a three tiered customer support process in accordance with a preferred embodiment of the present invention.
  • FIG. 19 is a flowchart showing an integrated IP telephony process in accordance with a preferred embodiment of the present invention.
  • FIG. 20 is a flowchart showing a Data Mining Process in accordance with a preferred embodiment of the present invention
  • next generation networks should also have the ability to dynamically reconfigure the network so that it can guarantee a predetermined amount of bandwidth for the requested quality of service (QOS) This includes providing access, performance, fault tolerance and secu ⁇ ty between any specified set of end systems as directed by the network's manager
  • QOS quality of service
  • ATM asynchronous transfer mode
  • Text files and images can be sent over existing packet-based networks because the delivery of this information is not time c ⁇ tical
  • the new traffic (voice and video) is delivery time sensitive— va ⁇ able or excessive latency will degrade the quality of service and can render this information worthless
  • Such networks are generally pomt- to-pomt m nature m that a packet from a single source is directed to a single destination by an address attached to the packet The network responds to the packet address by connecting the packet to the approp ⁇ ate destination
  • Packet switching networks are also used which combine burst type data with the more continuous types of information such as voice, high quality audio, and motion video
  • conferencing capabilities for voice communication also require single source to multiple destination transmission
  • One p ⁇ or packet broadcast arrangement comp ⁇ ses a network consisting of a packet duplication arrangement followed by a packet routing arrangement As a broadcast packet enters this network, packet copies are made in the packet duplicating arrangement until as many copies exist as there are destinations for the packet. A translation table look up is then performed at the duplication arrangement outputs for each of the packet copies to provide a different, single destination address for each copy.
  • packets in the form of units of data are transmitted from a source- such as a user terminal, computer, application program within a computer, or other data handling or data communication device-to a destination, which may be simply another data handling or data communication device of the same character
  • a source such as a user terminal, computer, application program within a computer, or other data handling or data communication device-to a destination, which may be simply another data handling or data communication device of the same character
  • the devices themselves typically are referred to as users, in the context of the network
  • Blocks or frames of data are transmitted over a link along a path between nodes of the network
  • Each block consists of a packet together with control information in the form of a header and a trailer which are added to the packet as it exits the respective node
  • the header typically contains, in addition to the destination address field, a number of subfields such as operation code, source address, sequence number, and length code
  • the trailer is typically a technique for generating redundancy checks, such as a cyclic redundancy code for detecting errors
  • the receiving node st ⁇ ps off the control information, performs the required synchronization and error detection, and reinserts the control information onto the departing packet
  • Packet switching arose, in part, to fulfill the need for low cost data communications in networks developed to allow access to host computers
  • Special purpose computers designated as communication processors have been developed to offload the communication handling tasks which were formerly required of the host
  • the communication processor is adapted to interface with the host and to route packets along the network, consequently, such a processor is often simply called a packet switch
  • Data concentrators have also been developed to interface with hosts and to route packets along the network In essence, data concentrators serve to switch a number of lightly used links onto a smaller number of more heavily used links They are often used in conjunction with, and ahead of, the packet switch
  • packet-switched data transmission is accomplished via predetermined end-to-end paths through the network, in which user packets associated with a great number of users share link and switch facilities as the packets travel over the network
  • the packets may require storage at nodes between transmission links of the network until they may be forwarded along the respective outgoing link for the overall path.
  • connectionless transmission another mode of packet-switched data transmission, no initial connection is required for a data path through the network.
  • the widely-used Telenet public packet switching network routes data using a two-level hierarchy.
  • the hierarchy comp ⁇ ses a long distance-spanning backbone network with a multiplicity of nodes or hubs, each of which utilizes a cluster of backbone switches, and smaller geographic area networks with backbone trunks, access lines and clustered lower level switches connected to each hub Packet-switched data is transmitted through the network via VCs, using CCITT (International Consultative Committee of the International Telecommunications Union) X.75 protocol, which is a compatible enhancement of X.25 protocol.
  • CCITT International Telegraph and Telephone Consultative Committee of the International Telecommunications Union
  • layered communication architectures address the two portions of the communications problem, one being that the delivery of data by an end user to the communication network should be such that the data ar ⁇ ving at the destination is correct and timely, and the other being that the delivered data must be recognizable and in proper form for use.
  • These two portions are handled by protocols, or standard conventions for communication intelligently, the first by network protocols and the second by higher level protocols. Each of these protocols has a se ⁇ es of layers. Examples of layered architectures include the Systems
  • SNA Network Architecture
  • OSI Open Systems Interconnection
  • X.25 is an interface organized as a three-layered architecture for connecting data terminals, computers, and other user systems or devices, generally refereed to as data terminal equipment (DTE), to a packet-switched network through data circuit terminating equipment (DCE) utilized to control the DTE's access to the network.
  • the three layers of the X.25 interface architecture are the physical level, the frame level and the packet level.
  • X.25 is employed for virtual circuit (VC) connections, including the call setup, data transfer, and call clearing phases. Call setup between DTEs connected to the network is established by one
  • DTE issuing an X.25 call-request packet to the related DCE, the packet containing the channel number for the logical connections, the calling and called DTE addresses, parameters specifying the call characteristics, and the data.
  • the destination DCE issues an incoming call packet, which is of the same general format as the call-request packet, to the destination DTE, the latter replying with a call-accepted packet.
  • the calling DCE issues a call-connected packet to its related DTE. At that point the call is established and the data transfer phase may begin by delivery of data packets.
  • the call is compared, i.e., the session is to end. a call-clearing procedure is initiated.
  • Prospective routing paths in the network are initially determined by a network control center, which then transmits these predetermined paths to the backbone switches as routing tables consisting of primary and secondary choices of available links from each hub.
  • the secondary choices are viable only in the event of primary link failures, and the specific secondary link selection is a local decision at the respective hub based principally on current or recent traffic congestion patterns.
  • the unavailability of an outgoing link from a hub at the time of the call setup effects a clearing back of the VC for the sought call to the preceding hub.
  • An alternative link is then selected by that hub, or, if none is available there, the VC circuit is again cleared back to the next preceding hub, and so forth, until an available path is uncovered from the routing tables.
  • Messages concerning link and/or hub failures are communicated immediately to the network control center, and that information is dispatched to the rest of the network by the center.
  • the data processing devices reside in a plurality of cards or boards containing printed circuits or integrated circuits for performing the various functions of the respective device in combination with the system software.
  • the cards are inserted into designated slots in cages within a console, with backplane access to a data bus for communication with one another or to other devices in the network.
  • the VME bus is presently the most popular 16/32-bit backplane bus. References from time to time herein to cards or boards will be understood to mean the various devices embodied in such cards or boards.
  • PDNs public data networks
  • ID identification
  • password password
  • Some data communication networks involve a va ⁇ ety of different customers each of whom makes available a host and one or more databases to its users, and may place a level of secu ⁇ ty on its database which differs from the level placed by other customers on their respective hosts and databases In those instances, it is customary to make the host responsible for secu ⁇ ty and access to itself and its associated database Thus, a user might have access to certain destinations in the network without rest ⁇ ction, but no access to other destinations
  • MNS Managed Networked Services
  • the present invention's overall approach to implementing the NM/MNS market offering is two fold.
  • the cu ⁇ ent opportunity that presents itself is MNS. While this market opportunity for clients is large, they need assistance in understanding data network management - for years they have been solely focused on voice. Additionally, they need to move into this market quickly in order to maintain and grow revenue.
  • the present invention includes a set of assets consisting p ⁇ marily of job aids and software that can greatly reduce our clients lead time for service implementation.
  • the present invention assists service providers by providing them the tools to better manage their carrier data networks - the packet switched networks of the future.
  • the present invention significantly enhances and scales MNS assets to address carrier network management in a data networking world. This solution template enables the convergence of circuit and packet switching network control centers and workforces.
  • the present invention's market offering suggests companies take a graduated approach to delivering MNS.
  • One end of the continuum consists of MNS for current network services, including leased lines, frame relay, and X.25.
  • MNS for current network services, including leased lines, frame relay, and X.25.
  • On the far end is outsourced MNS characterized by long-term contracts, involving hundreds of millions of dollars.
  • the NM/MNS market offering is proposing our clients go beyond the management of the router and the WAN, and into the world of the local area network (LAN), even as far as the desktop and business applications. Service providers have been intimidated by these propositions in the past, since management of the LAN and its equipment and applications has clearly not been their forte.
  • Design and Implementation - Companies may be ready to move to the design and implementation phases of creating an MNS capability Generally, the present invention will confirm that their network meets the requirements to provide the service, then assist the client m the designing and implementing an approp ⁇ ate solution suite
  • NM/MNS In an effort to clearly communicate exactly how we define NM/MNS we have created an online catalog of services
  • the present invention's solution is a continuous cycle that begins with the four major processes associated with NM MNS These processes d ⁇ ve the technology and the people components of the solution Within each of these processes are a number of core functions and sub-functions
  • the MNS Online Catalog contains all of this information, including the supporting process, technology and organizational solutions for each function
  • MNSIS Managed Networked Services Integrated Solution
  • each process should be performed in order to provide a complete NM/MNS solution As mentioned above, each process has a number of associated functions and sub-functions that provide the complete picture of the process The major functions associated with each process are as follows
  • the main goal of the technology solution is to provide access to network information to make informed decisions
  • the present invention includes three layers of management element management, information services management and presentation management Every action starts with an incident Processing is tailored to handling the incident with technology that responds to the unique characte ⁇ stics of each incident
  • the element manager communicates with the network elements to receive alarms and alerts through trapping and polling techniques
  • the element manager is the layer where the p ⁇ mary data reduction functions reside At this layer, events received at the element manager will be filtered, aggregated and correlated to further isolate problems within the network Information that is deemed c ⁇ tical to monitor and manage the network is translated into a standard object format and forwarded to the Information Services
  • An element manager can be, but is not necessa ⁇ ly, software which adheres to open standards such as the Simple Network Management Protocol (SNMP) and the Object Management Group's (OMG) Common Object Request Broker Architecture (CORBA)
  • SNMP Simple Network Management Protocol
  • OMG Object Management Group's
  • CORBA Common Object Request Broker Architecture
  • the information services manager provides the data management and data communications between element managers and presentation managers All information forwarded from the element managers is utilized by the information services manager to provide information to the network operators
  • the information services manager adheres to CORBA standards to provide ubiquitous information access via an Object Request Broker (ORB)
  • ORB allows the information sen. ices manager to share management information stored in dist ⁇ ubbed databases
  • the information services manager stores c ⁇ tical management information into operational (real-time) and analytical (histo ⁇ cal) dist ⁇ ubbed databases These databases provide common data storage so that new products can be easily inserted into the management environment For example, if an event is received at an element manager that is deemed c ⁇ tical to display to a network user, the information services manager will store a copy of the alarm in the operational database and then forward the alarm to the approp ⁇ ate network operator
  • the databases includes online manuals for administrative purposes, as well as for the maintenance specialists to access element specific information
  • the databases also provide procedures, policies and computer based training to network users
  • the information services manager provides requested information (real-time and histo ⁇ cal) to the network users via the presentation manager
  • the presentation manager performs the function its name implies the presentation of the information to an end user Because different locations and job functions require access to different types of information, there are at least two types of display methods The first is for graphic intensive presentations and the second is for nomadic use, such as field technicians The first environment requires a graphic intensive display, such as those provided by X-Wmdows/MOTIF The second environment is potentially bandwidth poor where dial-up or wireless access may be used along with more traditional LAN access
  • the people vision for the NM/MNS include an organization model for customer service support, the corresponding roles and responsibilities for this organization model and a conceptual design for workforce transformation to packet switching Customer Service Support
  • Customer service support provides a single point of contact that is customer focused This single point of contact provides technical expertise in resolving customer incidents, troubles and requests Generally a three tiered support structure is optimal for satisfying customer service needs Each tier, or level, possesses an increasing level of skill, with tasks and responsibilities dist ⁇ aded accordingly Such a structure is as follo s
  • Tier 1 - typically has a broad set of technical skills and is the first level of support to the customer Typically this group is responsible for resolving 60-70 percent of the opened problems
  • Tier 2 - are technical experts and field support personnel who may specialize in specific areas Typically this group is responsible for resolving 30-40 percent of the opened problems
  • Tier 3 - are considered solution experts and often consist of hardware vendors, software vendors or custom application development / maintenance teams (m- depth skills needed to investigate and resolve difficult problems within their area of expertise) They are the last resort for solving the most difficult problems Typically this group is responsible for resolving 5 percent or fewer of the opened problems
  • Tier 1 only logs calls, they do not resoh e calls
  • One advantage of this model is that skilled resources don't have to waste time logging calls
  • the integrated network management solution template consists of a suite of best of breed third party software products that automate problem diagnosis, notification, custom-developed reporting, and IP services monito ⁇ ng This solution template is a great first step in realizing our technology solution vision
  • Web-Based SLA Reporting Tool - is a browser based tool that pro ⁇ ides the personalized SLA reports to customers in both a template and ad-hoc format
  • Data Mining Demonstration Provides the capability to analyze network management data looking for patterns and correlations across multiple dimensions Build models of the behavior of the data in order to predict future growth or problems and facilitate managing the network in a proactive, yet cost-effective manner
  • Service Planning includes both the strategic and tactical planning required to manage dist ⁇ mped environments effectively Although most planning typically occurs du ⁇ ng rollout of the system, certain planning activities must otherwise take place Service Planning ensures that change can be successfully controlled and implemented
  • Systems Management consists of the day-to-day operational functions required to maintain the system (e g fault detection / correction, secu ⁇ ty management and performance management)
  • Service Management controls the overall service to the users of the system It isolates users from how the system is managed, and ensures that users receive the quality support services they need to carry out their daily business activities
  • the present invention includes a system, method, and article of manufacture for providing a hyb ⁇ d circuit switched/packet switched network
  • This hyb ⁇ d network is used as a transitiomng network to transition from old "Core" network architectures to "New Core" networks
  • the details of the NGN transitiomng network will first be set forth after which details relating to specific billing aspects of the present invention will be desc ⁇ bed
  • PSTN, wireless, and cable networks have continued to grow at their organic rates determined by the growth of the vertical services they w ere providing In the beginning, the data networks used a small portion of the backbone SONET bandwidth, while PSTN was still the dominant bandwidth user Due to the exponential growth in IP traffic, the IP based data networks are soon slated to utilize more bandwidth than the PSTN Also huge technical advances in packet technologies have made it possible to carry traditional voice over IP networks This has started a move towards the "Next Generation Network (NGN)" where there will be more sha ⁇ ng of common network infrastructure to provide services, and these services will start to become more interoperable The main thrust of technologies in the "NGN" will be to provide interoperability between the new packet based infrastructure and existing legacy infrastructures Due to the large investments made in the legacy infrastructure, they will continue to exist for some time, but most new innovations will occur on the packet based infrastructure Slowly, the parallel networks that were created to serve distinct services will merge to use a common packet based backbone and only differ in how access is provided (wire-line, wireless, cable
  • the current wire-line "Core” network consists of parallel PSTN, SMDS. ATM, Frame-Relay B/PRI and IP networks
  • the PSTN network has been evolving o ⁇ er the last century and is a mix of old and new circuit switched technologies
  • the PSTN network mainly provides point-to-point interactive two-way voice communication services
  • the service set has evolved to include many intelligent network (IN) service features Du ⁇ ng the late 1980s, Advanced Intelligent Networks (AIN) emerged as the architecture to support new voice based services on the PSTN infrastructure IN requirements and architecture in the current "Core”
  • the major IN requirements include session establishment, advanced call processing, call routing and call treatment (network messages and call termination) Examples of applications and features are the CLASS family of services (Call waiting, Call forwarding, Conference calling, Call rejection), enhanced call routing. Number Portability, Calling Card Services, and Audio delivered Information Services (e g travel, stocks and weather)
  • SCE Service Creation Environment
  • Data networks m the "Core” While the PSTN was grow ing in feature functionality as well as traffic demand, new data networks have been created to support the mter-networking of computing devices These data networks provide interconnection to geographically dispersed computing devices at varying levels of transmission bandwidth (e g 56/64K, T-l/E-1 , T-3/E-3, OC-3/STM-1 )
  • the data networks consist of many technologies e g SMDS, ATM, frame-relay and IP
  • these data networks themselves are parallel net orks, m other cases, they share a common technology in the backbone (e g ATM can be the backbone for frame relay and IP data networks) These data networks share the same SONET based backbone with the PSTN network The services on the PSTN and the data networks are very distinct and non-interoperable (example voice versus web access)
  • NGN While there are components in the NGN that ensure interoperability between "NGN” and PSTN, there are also a huge new set of new services that are built entirely on the NGN components which is provide feature ⁇ ch multimedia (voice, video, data) based communication services as well as enabling many E-Commerce services enabled by IP technologies
  • These components include directo ⁇ es, policies, user authentication, registration, and encryption
  • These components enable services like integrated messaging, multimedia conversations, on-demand multi-point conference, enhanced secu ⁇ ty & authentication, va ⁇ ous classes of media transport services, numerous automations in electronic internet commerce activities e g banking, shopping, customer care, education, etc
  • third party value added service providers will develop IP based services that will combine applications such as electronic commerce (procurement warehousing, distribution and fulfillment) as well as online banking to present the consumer with an integrated boundless shopping expe ⁇ ence Growth of bandwidth in the "NGN"
  • the NGN also employs the use of new wire-line broadband access technologies,
  • New and emerging technologies such as Giga-Bit Ethernet and Wire Speed IP may find their way to the network backbone, but not until Giga-bit Ethernet technology matures to handle a wide array of network services such as connection o ⁇ ented circuit emulation
  • NTN Next Generation Network
  • NGN- IN enablers will provide the next level of intelligence in order to address communication over mixed media types, control of multiple session characte ⁇ stics, collaborative communications needs, ubiquitous network access, "any to any” communications, and multimedia delivered information services Note that these "NGN” components will continue to evolve to provide similar and enhanced capabilities in the "New Core"
  • the Intelligent IP (I 2 P) Network enablers are catego ⁇ zed as follows
  • Session Control (Bandwidth, Switching and Routing) - Media Control (Call Treatment such as media conversion )
  • the components for the "NGN” are desc ⁇ bed as individual functional units but may be combined for practicality on individual network devices as the requirements dictate These components have been designed to operate in a dist ⁇ aded network environment to increase the flexibility of the NGN and New Core
  • the architecture provides a robust, secure and isolated messaging infrastructure for dehve ⁇ ng control plane information to these devices
  • This infrastructure includes a well defined message set for accessing the functions that are provided by these components and data that resides in the rules database
  • the control plane architecture is efficient and has a unique mechanism for sha ⁇ ng service, user and control data without duplication This permits mobile NGN service users to maintain the same expe ⁇ ence and have access to the same information regardless of where or how they access the network
  • the remote session controller m Europe would communicate with the cross network location register and rules database server to identify the subsc ⁇ ber's "home" rules database in order to collect the policies and profile of the subsc ⁇ ber for use in Europe, this is done by using the inter device message sets (command and control ) over the control plane sub network Unlike other mechanisms often employed, this mechanism does not replicate this information onto the local (European) rules database, making long term control data management predictable
  • the design is CORBA compliant and therefore can be interconnected with other standards based networks Rules Database server
  • Session requirements such as Bandwidth, Quality Of Service, Class Of Service - Routing preferences based on P ⁇ o ⁇ ty, Cost, Termination Location
  • Example Tells the intelligent pe ⁇ pheral and protocol converter to separate the Audio stream from the data and video stream on an H 32x call, It may also instruct the protocol converter to process the stream so as to enable this audio stream to be fed to a destination which supports traditional analog voice hence the G 728/9 content from the H 32x session would be converted first to AD/PCM and then sent to a Class 5 circuit based switch and terminated on a circuit switched SS7 network POTS line)
  • Intelligent Peripheral (Media Control) Provides services such as DTMF parsing, Voice prompting, Messaging, Speech recognition, Text to Speech, Text to Fax, etc
  • Session Manager / Event Logger (Session Control)
  • This process or application is c ⁇ tical since it is the "glue" between the end user application and the communications network It is responsible for collection and distnbution of end-user session preferences, application requirements, access device capability and accounting policy information to the required "IN enabling" components. In summary its mam functions are to-
  • This functional component Similar to the Home location register in the wireless / cellular telephony world. This functional component provides the required policies governing users who access third party networks and cross geographical bounda ⁇ es. It keeps in constant contact with other cross network location registers of the geographically dispersed but mter-connected networks, exchanging accounting, service feature profile and control data for local and roaming subsc ⁇ bers. "New Core" Network Architecture
  • the Wireless Data Network Architecture The current wireless "Core” network consists of wireless based access and roaming capabilities that inter-operate with wire-line PSTN "Core” infrastructure to provide interoperable PSTN services.
  • the wireless PSTN access infrastructure will also migrate to connect to "NGN” and “New Core” to provide wireless PSTN access services while utilizing new capabilities in the "NGN” and the “New Core”.
  • There will also be innovations in the wireless end-devices such that they will become IP enabled, and will thus allow a broad range of innovations by allowing mobility to the wire-line IP based service capabilities (e.g. web browsing, e-mail etc.).
  • LMDS is an emerging technology in the local high speed wire-less access, which utilizes the 25- 35 GHz microwave spectrum for point to point and point to multi-point communications.
  • the end users either share an antenna connected to a digital receiver which is connected to a channel bank .
  • the application server be it voice (PBX). video (CODEC), or Data (Router or Switch) interfaces with the NGN via the channel bank.
  • PBX voice
  • CDEC video
  • Router or Switch Data
  • a session originates from the application which interacts with the server to request authentication (AAA), then a session is established between originator and destination application by routing the call through the NGN components such as Gateways and Switches.
  • LEO low earth orbiting satellites
  • Cable networks were developed for mainly broadband broadcast of analog video entertainment services.
  • the current "Core” cable infrastructure is suitable to serve one way video broadcast. Cable service providers are now upgrading their cable infrastructure to support high speed internet access.
  • cable will provide a new access mechanism for IP services, while simultaneously transport video content using the current video broadcast technology.
  • the IP enabled devices attached to the "NGN” cable infrastructure can take advantage of all the new components and capabilities described in the wire-line “NGN”. This will enable seam-less services between devices that are accessing the "NGN' via a wire-line or cable infrastructures.
  • This "NGN” cable infrastructure can provide IP based telephony services using the same components of the wire-line "NGN” that provide IP telephony to wireline IP devices.
  • the digital network segment that interfaces with the "NGN” comprises of a coaxial cable local loop which is connected to a cable data modulator running QAM/DPSK protocols.
  • the coaxial loop is terminated at the customer premise by an Ethernet cable modem which delivers the IP Tone to the applications (Voice, Video, Data) that may reside on a PC or application server.
  • the cable modems used provide users and applications with a wide range of bandwidth options from 2 to lOMbits per second depending on configuration and choice of equipment vendor. With the evolution of the "New Core" in the wire-line, the cable will continue to provide another broadband access mechanism for IP based services.
  • the cable will becomes an entirely EP access mechanism (just like all wire-line access becomes an IP access mechanism).
  • the broadcast video content will be delivered to IP enabled cable attached devices just like any other rich media will be delivered over the IP network.
  • video encoding technologies such as MPEG2 and motion JPEG will be further improved to deliver higher resolution digital media over the cable infrastructure using NGN and CORE delivery mechanisms.
  • the network becomes transparent and the applications and content drive the creativity of the service creation process.
  • the PSTN like services will be delivered to devices connected via cable access just like they are delivered to other wire-line connected devices on the "New Core".
  • the network transformation plan comprises of the following phases - Strategy - Market Trial
  • Market Trial Develop and launch a market trial that would measure and assess the viability of the introduction of the proposed service. Additionally, this trial validates the approach to transform specific parts of the infrastructure towards the "NGN" and "New Core". The market trial provides the entry-exit criteria, metrics, Key Performance Indicators etc. to assess the success of the market trial.
  • Service Launch Develop plan and manage the detailed network, systems, process and program management aspects of the launch of a "New Core” that is applicable for the network based on the strategy developed above. This ensures that the network systems planned and developed will be future-ready.
  • the OSS and back-office systems are be able to support the processes required for service creation and management in the "New Core”.
  • the network creation processes provides the program management tools to ensure that the launch is successfully executed.
  • a typical telecommunication network comprises multiple telecommunication switches located throughout a geographical area. When a user makes a call, the call may be routed through one or more switches before reaching its destination.
  • FIG. 1A illustrates an exemplary telecommunications system 102 across the United States.
  • a caller 104 places a call from Los Angeles, California to a party 112 located in New York City, New York.
  • Such a call is typically transmitted across three (3) switches: the Los Angeles, California switch 106; the Chicago, Illinois switch 108; and the New York City, New York switch 110.
  • the originating switch is the Los Angeles, California switch 106
  • the terminating switch is the New York City, New York switch 110.
  • Each of the switches, 106-110 is connected to two (2) or more Data Access Points (DAP) 116- 120, for instance a primary DAP 116-120 and a backup DAP 116-120.
  • DAP 116-120 is a facility that receives requests for information from the switches 106-110, processes the requests, and returns the requested information back to the requesting switch 106-110.
  • each switch 106-110 When a call passes through one of the switches, 106-110, that switch creates a call record.
  • the call record contains information on the call, including but not limited to: routing, billing, call features, and trouble shooting information.
  • each switch 106-110 that processed the call completes the associated call record.
  • the switches 106-110 combine multiple call records into a billing block.
  • the switch 106-110 When a switch 106-110 fills the billing block, the switch 106-110 sends the billing block to a billing center 114. Thus, the billing center 114 receives one billing block from each switch 106-
  • the billing center 114 searches each billing block and retrieves the call record associated with the call, thereby retrieving one call record per switch 106-110 that handled the call. The billing center 114 then uses one or more of the retrieved call records to generate a billing entry.
  • the billing center 114 is also connected to each DAP 116-120 to retrieve information regarding a switch 106-110 or call record.
  • billing in the present invention is increased because the hybrid network also contains proxy intelligence.
  • FIG. IB shows a block diagram of the Network Data Management 130 in accordance with a preferred embodiment of the present invention
  • Network Data Management 130 encompasses the collection of usage data and events for the purpose of network performance and traffic analysis This data may also be an input to Billing (Rating and Discounting) processes at the Service Management Layer, depending on the service and its architecture
  • the process provides sufficient and relevant information to ve ⁇ fy compliance/ non-compliance to Service Level Agreements (SLA)
  • SLA Service Level Agreements
  • This process ensures that the Network Performance goals are tracked, and that notification is provided when they are not met (threshold exceeded, performance degradation) This also includes thresholds and specific requirements for billing This includes information on capacity, utilization, traffic and usage collection In some cases, changes in traffic conditions may t ⁇ gger changes to the network for the purpose of traffic control Reduced levels of network capacity can result in requests to Network Planning for more resources
  • FIG. 1B-1 is a flowchart illustrating a network data management process in accordance with a preferred embodiment
  • step 150 data is collected relating to usage and events occur ⁇ ng over a hyb ⁇ d network
  • step 152 the data is analyzed to determine a status of the hyb ⁇ d network which in turn, m step 154, is utilized du ⁇ ng management of the hyb ⁇ d network
  • step 156 billing rates and discounts are determined based on the status of the hyb ⁇ d network
  • the present invention also uses a Customer Interface Management process 132, as shown in Figure IC, to directly interact with customers and translate customer requests and inqui ⁇ es into approp ⁇ ate "events" such as, the creation of an order or trouble ticket or the adjustment of a bill
  • This process logs customer contacts, directs inqui ⁇ es to the approp ⁇ ate party, and tracks the status to completion.
  • this process assures consistency of image across systems, and secu ⁇ ty to prevent a customer from harming their network or those of other customers The aim is to provide meaningful and timely customer contact expe ⁇ ences as frequently as the customer requires
  • Figure lC-1 is a flowchart illustrating a Customer Interface Management Process m accordance with a preferred embodiment
  • a service lev el agreement is received for a hyb ⁇ d network customer
  • the service level agreement is stored after which, in step 162, inqui ⁇ es are received from network customers reflecting occurrences related to the hyb ⁇ d network
  • events are generated based on the customer inqui ⁇ es and the service level agreement
  • the Network Data Management 130 and Customer Interface Management process 132 are used to give information to the Customer Quality of Service Management Process 134, as shown m Figure ID
  • the Customer Quality of Service Management Process 134 encompasses monito ⁇ ng, managing and reporting of quality of service as defined in Service Desc ⁇ ptions, Service Level
  • SLA Service-related Agreements
  • SLA Service-related documents
  • This process responds to performance inqui ⁇ es from the customer
  • SLA violations the process supports notifying Problem Handling and for QoS violations, notifying Service Quality Management 136
  • the aim is to provide effective monito ⁇ ng Monito ⁇ ng and reporting must provide SP management and customers meaningful and timely performance information across the parameters of the services provided
  • the aim is also to manage service levels that meet specific SLA commitments and standard service commitments
  • Figure 1D-1 is a flowchart illustrating a Customer Quality of Service Management Process in accordance with a preferred embodiment
  • a hyb ⁇ d network event is received which may include customer inqui ⁇ es, required reports, completion notification, quality of service terms, service level agreement terms, service problem data, quality data, network performance data, and/or network configuration data
  • the system determines customer reports to be generated and, in step 170, generates the customer reports accordingly based on the event received
  • Figure IE shows a block diagram of the Service Quality Management 136 in accordance with a preferred embodiment of the present invention.
  • the Service Quality Management Process 136 supports monito ⁇ ng service or product quality on a service class basis in order to determine
  • This process also encompasses taking approp ⁇ ate action to keep service levels within agreed targets for each service class and to either keep ahead of demand or alert the sales process to slow sales
  • the aim is to provide effective service specific monito ⁇ ng, management and customers meaningful and timely performance information across the parameters of the specific service
  • the aim is also to manage service levels to meet SLA commitments and standard commitments for the specific service
  • FIG. 1E-1 is a flowchart illustrating a Service Quality Management Process in accordance with a preferred embodiment
  • a hyb ⁇ d network event is received that may include forecasts, quality objectives, available capacity, service problem data, quality of service violations, performance trends, usage trends, problem trends, maintenance activity, maintenance progress, and/or credit violations
  • quality management network data is determined and, in step 176, the quality management network data is generated.
  • Such quality management network data may include constraint data, capacity data, service class quality data, service modification recommendations, additional capacity requirements, performance requests. and/or usage requests
  • a network process to which to send the generated data is identified.
  • Figure I F shows a block diagram of the Problem Handling Process 138.
  • the Problem Handling Process receives information from the Customer Interface Management Process 132 and the Customer Quality of service Management Process 134. It is responsible for receiving service complaints from customers, resolve them to the customer's satisfaction and provide meaningful status on repair or restoration activity. This process is also responsible for any service-affecting problems, including
  • This proactive management also includes planned maintenance outages. The aim is to have the largest percentage of problems proactively identified and communicated to the customer, to provide meaningful status and to resolve in the shortest timeframe.
  • FIG. 1F-1 is a flowchart illustrating a Problem Handling Management Process in accordance with a preferred embodiment.
  • a notification of a problem within a hybrid network is received by the system.
  • a resolution for the problem within the hybrid network is determined.
  • the resolution may include a status report, resolution notification, problem reports, service reconfiguration, trouble notification, service level agreement violations, and/or outage notification.
  • the progress of the implementation of the resolution is tracked.
  • This process applies the correct rating rules to usage data on a customer-by-customer basis, as required. It also applies any discounts agreed to as part of the Ordering Process, for promotional discounts and charges, and for outages. In addition, the Rating and Discounting Process 140 applies any rebates due because service level agreements were not met. The aim is to correctly rate usage and to correctly apply discounts, promotions and credits.
  • FIG. 1G-1 is a flowchart illustrating Rating and Discounting Process in accordance with a preferred embodiment.
  • step 185 hybrid network customer usage information is received.
  • step 186 network service level agreement violations are collected, and, in step 187, network quality of service violations are received by the Rating and Discounting system.
  • step 188 rating mles are applied to the network customer usage information.
  • step 189 negotiated discounts are determined based on the network quality of service violations and.
  • rebates are determmed based on the network service level agreement violations Thereafter, in step 191. billing data reflecting the usage information, the negotiated discounts, and the rebates is provided to generate a customer invoice
  • the Invoice and Collections Process 142 creates correct billing information This process encompasses sending invoices to customers, processing their payments and performing payment collections In addition, this process handles customer mqui ⁇ es about bills, and is responsible to resolve billing problems to the customer's satisfaction The aim is to provide a correct bill and, if there is a billing problem, resolve it quicklv with approp ⁇ ate status to the customer An additional aim is to collect monev due the service provider in a professional and customer supportive manner
  • FIG. 1H-1 is a flowchart illustrating an Invoice and Collections Process in accordance with a preferred embodiment
  • customer account inqui ⁇ es and customer payment information is received by the system
  • billing data including discounts due to quality of service violations and rebates due to service level agreement violations
  • customer account invoices are created for distnbution based on the customer payment information and the billing data
  • Mediation and activity tracking are provided by the event logger and event manager
  • the event logger and event manager feed the rating and billing information for degraded service using the personally customized rules database
  • the event d ⁇ ver, collector and manager analyze notification events generated by the system When a notification event is received the system analyzes the event and uses it to identify the customer The notification event is also used to credit the customer if they expe ⁇ ence a non-impactmg event that breaches the customer's contract
  • the customer is also able to notify the provider directly should such an event occur
  • FIG. 2 A is a flowchart illustrating media communication over the hyb ⁇ d network of the present invention
  • the hyb ⁇ d network in a first step 220, transfers the media over the network using IP information to route it to the approp ⁇ ate destination
  • the media transfe ⁇ ed over the network may be telephony data, image data, or any other data capable of packet switched transmission
  • events are generated based on the quality of service of the media transfer As discussed above with reference to Figure 1 D and Figure IE. these events include performance notifications due to SLA violations, and customer generated events from the Customer Interface Management Process 132
  • a third step 224 the events generated in step 222 are utilized to generate a bill for the customer
  • the bill is modified based on events generated du ⁇ ng the media transfer For example, events representing SLA violations are used to credit customers
  • the Problem Handling Process 138 is responsible for receiving service complaints and other service-affecting problems Together with the Network Data Management 130, the Problem Handling Process feeds data to the Discounting Process 140 The Discounting Process
  • the Invoice and Collections Process 142 utilizes the information from the Discounting Process 140 to create customer billing information
  • a telephone call comes into a switch on a transmission line referred to as the o ⁇ ginating port, or trunk
  • the o ⁇ ginatmg port is one of many transmission lines coming into the switch from the same location of o ⁇ gm
  • This group of ports is the o ⁇ ginating trunk group
  • the switch After processing an incoming call, the switch transmits the call to a destination location, which may be another switch, a local exchange earner, or a p ⁇ vate branch exchange
  • the call is transmitted over a transmission line referred to as the terminating port, or trunk.
  • the terminating port is one of a group of ports going from the switch to the same destination This group of ports is the terminating trunk group
  • Contemporary telecommunication networks provide customers with the capability of using the general public network as well as the capability of defining a custom virtual network (VNet) With a VNet, a customer defines a p ⁇ vate dialing plan, including plan telephone numbers.
  • VNet customer is not limited to the default telephone numbers allocated to a public telecommunication system dedicated to a specific geographic region, but can define custom telephone numbers
  • a switch Upon processing a telephone call, a switch must generate a call record large enough to contain all of the needed information on a call The call record, however, must not be so large that the typical call results in the majo ⁇ ty of the record fields in the call record to be unused In such a case, sto ⁇ ng such call records results in large amounts of wasted storage, and transmitting such a call record causes unnecessary transmissions
  • Epoch time is the number of one (1) second increments since a particular date and time in history
  • the billing center requires epoch time for its billing records whereas switch reports and error logs require local switch time
  • each subsystem may require a finer granula ⁇ ty of precision than the current three (3) second increments
  • the switches have passed the burden of translating the time into a usable format to the network subsystems
  • the fixed record format cannot accommodate the va ⁇ ous time pe ⁇ od requirements because it only contains the time pe ⁇ ods in local switch time at a low level of precision Because of its fixed nature, the fixed record format cannot expand to include different time formats, nor to include a finer granula ⁇ ty of precision, such as a one (1) second increment
  • An embodiment solves the problem of providing a flexible and expandable call record format by implementing both a small and a large call record format
  • the embodiment implements a default 32-word call record format, plus an expanded 64-word call record format
  • An embodiment uses a 32-word call record format for the typical telephone call, which comprises the majo ⁇ ty of all telephone calls, and uses a 64-word call record format when additional information is needed regarding the call.
  • This implementation provides the flexibility needed to efficiently manage varying data requirements of a given call record. New call features can be developed and easily incorporated into the va ⁇ able call record format of the present invention.
  • This embodiment also records timepoints m the epoch time format.
  • the embodiment records the origination time of a call in epoch time format, and the remaining timepomts are offsets, or the number of seconds, from that o ⁇ gination time.
  • This embodiment solves the problems associated with converting to and from daylight savings time because daylight savings time is a local time offset and does not affect the epoch time.
  • the timepoints in epoch time format require less space in the call record than they do m local switch time format.
  • the epoch time format may represent coordinated universal time (UTC), as determined at Greenwich, England, which has a time zone of zero (0) local switch time, or any other time. Epoch time is only a format and does not dictate that UTC must be used.
  • the billing time and the local switch time may be in UTC or local time, and the local switch time may not necessa ⁇ ly be the same time that is used for billing Therefore the switch must keep billing time and local switch time separate in order to prevent the problems that occur du ⁇ ng daylight savings time changes
  • NCID network call identifier
  • the o ⁇ ginating switch generates an NCID for each telephone call
  • the NCID accompanies the associated telephone call through the telecommunications network to the termination point at the terminating switch Therefore, at any point of a telephone call in the network, the associated NCID identifies the point and time of origin of the telephone call
  • Each switch through which the telephone call passes records the NCID the call record associated with the call
  • the NCID is small enough to fit in a 32-word call record, thereby reducing the data throughput and storage
  • the NCID provides the billing center and other network subsystems with the ability to match ongmating and terminating call records for a specific telephone call
  • This embodiment also provides the switch capability of discarding a received NCID and generating a new NCID
  • a switch discards a received NCID if the NC D format is invalid or unreliable, thereby ensu ⁇ ng a valid unique identifier to be associated with each call going through the network For instance, an NCID may be unreliable if generated by third party switches in the telecommunications network
  • This embodiment relates to switches of a telecommunication network that generate call records using a flexible and expandable record format
  • the call record formats include a small (preferably 32-word) and a large (preferably 64-word) expanded format It would be readily apparent to one skilled in the relevant art to implement a small and large record format of different sizes
  • the embodiment also relates to switches of a telecommunication network that generate a unique NCID for each telephone call traversing the network
  • the NCED provides a mechanism for matching all of the call records associated with a specific telephone call It would be readily apparent to one skilled in the relevant art to implement a call record identifier of a different format
  • the chosen embodiment is computer software executing within a computer system.
  • Figure 2B shows an exemplary computer system.
  • the computer system 202 includes one or more processors, such as a processor 204
  • the processor 204 is connected to a communication bus 206.
  • the computer system 202 also includes a main memory 208, preferably random access memory (RAM), and a secondary memory 210.
  • the secondary memory 210 includes, for example, a hard disk d ⁇ ve 212 and/or a removable storage d ⁇ ve 214, representing a floppy disk d ⁇ ve, a magnetic tape d ⁇ ve, a compact disk d ⁇ ve, etc.
  • the removable storage d ⁇ ve 214 reads from and/or w ⁇ tes to a removable storage unit 216 in a well known manner
  • Removable storage unit 216 also called a program storage device or a computer program product, represents a floppy disk, magnetic tape, compact disk, etc
  • the removable storage unit 216 includes a computer usable storage medium having therein stored computer software and/or data.
  • Computer programs are stored in mam memory 208 and/or the secondary memory 210 Such computer programs, when executed, enable the computer system 202 to perform the functions of the present invention as discussed herein. In particular, the computer programs, when executed, enable the processor 204 to perform the functions of the present invention. Accordingly, such computer programs represent controllers of the computer system 202
  • Another embodiment is directed to a computer program product comp ⁇ sing a computer readable medium having control logic (computer software) stored therein
  • the control logic when executed by the processor 204, causes the processor 204 to perform the functions as described herein.
  • Another embodiment is implemented p ⁇ marily in hardware using, for example, a hardware state machine.
  • a hardware state machine so as to perform the functions desc ⁇ bed herein will be apparent to persons skilled in the relevant arts.
  • Call Record Format This embodiment provides the switches of a telecommunication network with nine (9) different record formats These records include .
  • OSR Operator Service Record
  • EOSR Expanded Operator Service Record
  • P ⁇ vate Operator Service Record P ⁇ vate Operator Service Record
  • EPOSR Expanded Pnvate Operator Service Record
  • Each record is 32 words in length, and the expanded version of each record is 64 words in length.
  • Example embodiments of the nine (9) call record formats discussed herein are further desc ⁇ bed in Figures 1-5.
  • the embodiments of the call records of the present invention comp ⁇ se both 32- word and 64-word call record formats It would be apparent to one skilled in the relevant art to develop alternative embodiments for call records comp ⁇ sing a different number of words and different field definitions
  • Table 301 of the Appendix contains an example embodiment of the CDR and PNR call record formats.
  • Figure 3 shows a graphical representation of the CDR and PNR call record formats.
  • Table 302 of the Appendix contains an example embodiment of the
  • Figures 4A and 4B show a graphical representation of the ECDR and EPNR call record formats.
  • Table 303 of the Appendix contains an example embodiment of the OSR and POSR call record formats
  • Figure 5 shows a graphical representation of the OSR and POSR call record format.
  • Table 304 of the Appendix contains an example embodiment of the EOSR and EPOSR call record formats.
  • Figures 6(A) and 6(B) show a graphical representation of the EOSR and EPOSR call record formats
  • Table 305 of the Appendix contains an embodiment of the SER record format.
  • Figure 7 shows a graphical representation of the SER record format.
  • the CDR and PNR and thereby the ECDR and EPNR, are standard call record formats and contain information regarding a typical telephone call as it passes through a switch.
  • the CDR is used for a non-VNET customer
  • the PNR is used for a VNET customer and is generated at switches that o ⁇ ginate VNET calls.
  • the fields of these two records are identical except for some field-specific information desc ⁇ bed below.
  • the OSR and POSR, and thereby the EOSR and EPOSR, contain information regarding a telephone call requi ⁇ ng operator assistance and are generated at switches or systems actually equipped with operator positions.
  • a switch completes an OSR for a non- VNET customer and completes a POSR for a private VNET customer.
  • These records are only generated at switches or systems that have the capability of performing operator services or network audio response system (NARS) functions
  • NARS network audio response system
  • a SER is reserved for special events such as the passage of each hour mark, time changes, system recove ⁇ es, and at the end of a billing block
  • the SER record format is also desc ⁇ bed in more detail below
  • FIGS 8(A) and 8(B) collectively illustrate the logic that a switch uses to determine when to use an expanded version of a record format.
  • a call 202 comes into a switch 106-110 (called the current switch for reference purposes; the current switch is the switch that is currently processing the call), at which time that switch 106-110 determines what call record and what call record format (small/default or large/expanded) to use for the call's 802 call record
  • the switch 106-110 makes nine (9) checks for each call 802 that it receives
  • the switch 106-110 uses an expanded record for a call 802 that passes any check as well as for a call 802 that passes any combination of checks
  • the first check 804 determines if the call is involved in a direct termination overflow (DTO) at the current switch 106-110
  • DTO direct termination overflow
  • a DTO occurs when a customer makes a telephone call 802 to an 800 number and the o ⁇ ginal destination of the 800 number is busy. If the o ⁇ ginal destination is busy, the switch overflows the telephone call 802 to a new destination. In this case, the switch must record the o ⁇ ginally attempted destination, the final destination of the telephone call 802, and the number of times of overflow Therefore, if the call 802 is involved in a DTO, the switch 106-110 must complete an expanded record (ECDR, EPNR, EOSR, EPOSR) 816.
  • ECDR expanded record
  • the second check 806 made on a call 802 by a switch 106-110 determines if the calling location of the call 802 is greater than ten (10) digits.
  • the calling location is the telephone number of the location from where the call 802 o ⁇ ginated Such an example is an international call which comp ⁇ ses at least eleven (1 1) digits. If the calling location is greater than ten (10) digits, the switch records the telephone number of the calling location in an expanded record (ECDR, EPNR, EOSR, EPOSR) 816.
  • a switch 106-110 makes a third check 808 on a call 802 to determine if the destination address is greater than seventeen (17) digits.
  • the destination address is the number of the called location and may be a telephone number or trunk group. If the destination is greater than seventeen (17) digits, the switch records the destination in an expanded record (ECDR, EPNR, EOSR, EPOSR) 816
  • a switch 106-110 makes a fourth check 810 on a call 802 to determine if the pre-translated digits field is used with an operated assisted service call
  • the pre-translated digits are the numbers of the call 802 as dialed by a caller if the call 202 must be translated to another number withm the network Therefore, when a caller uses an operator service, the switch 106-110 records the dialed numbers in expanded record (EOSR, EPOSR) 816
  • a switch 106-110 determines if the pre-translated digits of a call 802 as dialed by a caller without operator assistance has more than ten (10) digits If there are more than ten (10) pre-translated digits, the switch 106-110 records the dialed numbers in expanded record (ECDR, EPNR) 816
  • a switch 106-110 determines if more than twenty-two (22) digits, including supplemental data, are recorded in the Autho ⁇ zation Code field of the call record
  • the Autho ⁇ zation Code field indicates a party who gets billed for the call, such as the calling location or a credit card call If the data entry requires more than twenty-two (22) digits, the switch 106-110 records the billing information in an expanded record (ECDR, EPNR, EOSR, EPOSR) 816
  • a switch 106-110 determines if the call 802 is a wideband call
  • a wideband call is one that requires multiple transmission lines, or channels
  • a typical video call requires six (6) transmission channels one (1) for voice and five (5) for the video transmission
  • the more transmission channels used du ⁇ ng a wideband call results in a better quality of reception
  • Contemporary telecommunication systems currently provide up to twenty-four (24) channels Therefore, to indicate which, and how many, of the twenty-four channels is used du ⁇ ng a wideband call, the switch records the channel information in an expanded record (ECDR, EPNR) 828
  • a switch 106-110 determines if the time and charges feature was used by an operator The time and charges feature is typically used in a hotel strig ⁇ o when a hotel guest makes a telephone call using the operator's assistance and charges the call 802 to her room After the call 802 has completed, the operator informs the hotel guest of the charge, or cost, of the call 802 If the time and charges feature was used with a call 802, the switch 106- 110 records the hotel guest's name and room number in an expanded record (EOSR, EPOSR) 832
  • the ninth, and final, check 824 made on a call 802 b ⁇ a switch 106-110 determines if the call 802 is an enhanced voice service/network audio response system (EVS NARS) call
  • EVS NARS is an audio menu system in which a customer makes selections in response to an automated menu via her telephone key pad
  • Such a system includes a NARS switch on which the audio menu system resides Therefore, du ⁇ ng an EVS NARS call 802, the NARS switch 106-110 records the customer's menu selections in an expanded record (EOSR, EPOSR) 832
  • the switch 106-110 uses the default record format (OSR, POSR) 830
  • a sw itch generates and completes the approp ⁇ ate call record
  • Call record data is recorded in binary and Telephone Binarv Coded Decimal (TBCD) format
  • the valid field values are the digits 2-9.
  • Each call record except SER, contains call specific timepoint fields.
  • the timepoint fields are recorded in epoch time format.
  • Epoch time is the number of one second increments from a particular date/time in history.
  • the embodiment of the present invention uses a date/time of midnight (00:00 am UTC) on January 1 , 1976, but this serves as an example and is not a limitation. It would be readily apparent to one skilled in the relevant art to implement an epoch time based on another date/time.
  • Timepoint 1 represents the epoch time that is the origination time of the call 802.
  • the other timepoint stored in the records are the number of seconds after Timepoint 1, that is, they are offsets from Timepoint 1 that a particular timepoint occurred.
  • timepoint fields must be filled in with "O's" prior to any data being recorded. Therefore, if a timepoint occurs, its count is one (1 ) or greater. Additionally, timepoint counters. not including Timepoint 1, do not rollover their counts, but stay at the maximum count if the time exceeds the limits.
  • the switch clock reflects local switch time and is used for all times except billing. Billing information is recorded in epoch time, which in this embodiment is UTC.
  • the Time offset is a number reflecting the switch time relative to the UTC, that is, the offset due to time zones and, if appropriate, daylight savings time changes. There are three factors to consider when evaluating time change relative to UTC. First, there are time zones on both sides of UTC, and therefore there may be both negative and positive offsets. Second, the time zone offsets count down from zero (in Greenwich, England) in an Eastward direction until the International Dateline is reached.
  • the switch records the Time Offset in the SER using a value here one ( 1 ) equals one (1) minute, and computes the Time Offset in seconds and adds this value to each local Timepoint 1 before the call record is recorded For example.
  • Central Standard Time is six (6) hours before UTC
  • the switch multiplies the Time Offset by 60, because there is 60 seconds in each 1 minute increment, and determines whether the offset is positive or negative by checking the Sign Bit
  • equation (n) from above, if the local switch time were midnight, the corresponding epoch time might be, for example, 1 ,200,000,000 Subtracting the Time Offset of -21 ,600 results in a corrected ep
  • Figure 9 illustrates the control flow of the Change Time command 900, which changes the Local Switch Time and the Time Offset
  • the switch enters step 902 and prompts the switch operator for the Local Switch Time and Time Offset from UTC
  • the switch operator enters a new Local Switch Time and Time Offset Continuing to step
  • step 904 the new time and Time Offset are displayed back to the switch operator Continuing to step 906, the switch operator must ve ⁇ fy the entered time and Time Offset before the actual time and offset are changed on the switch If in step 906 the switch operator ve ⁇ fies the changes, the switch proceeds to step 908 and generates a SER with an Event Qualifier equal to two which identifies that the change was made to the Local Switch Time and Time Offset of the switch
  • the billing center uses the SER for its bill processing
  • the switch proceeds to step 910 and exits the command Refer ⁇ ng back to step 906, if the switch operator does not ve ⁇ fy the changes, the switch proceeds to step 910 and exits the command without updating the Local Switch Time and Time Offset
  • Figure 5 Figure 10 illustrates the control flow for the Change Daylight Savings Time command 1000 which is the second command for changing time In Figure 10.
  • step 1002 the switch enters step 1002 and prompts the switch operator to select either a Forward or Backward time change Continuing to step 1004, the switch operator makes a selection In step 1004, if the switch operator selects the Forward option, the switch enters step 1006 In step 1006, the switch sets the Local Switch Time forward one hour and adds one hour (count of 60) to the Time Offset The switch then proceeds to step 1010 Refer ⁇ ng back to step 1004, if the switch operator selects the Backward option, the switch sets the Local Switch Time back one hour and subtract one hour (count of 60) from the Time Offset The switch then proceeds to step 1010
  • step 1010 the switch operator must ve ⁇ fy the forward or backward option and the new Local Switch Time and Time Offset before the actual time change takes place If in step 1010, the switch operator ve ⁇ fies the new time and Time Offset, the switch proceeds to step 1012 and generates a SER with an Event Qualifier equal to nine which changes the Local Switch Time and
  • step 1014 the switch proceeds to step 1014 and exits the command. Refer ⁇ ng back to step 1010, if the switch operator does not ve ⁇ fy the changes, the switch proceeds to step 1014 and exits the command without updating the Local Switch Time and Time Offset
  • the billing records are affected by the new Time Offset
  • This embodiment allows the epoch time, used as the billing time, to increment normally through the daylight savings time change procedure, and not to be affected by the change of Local Switch Time and Time Offset
  • An embodiment provides a unique NCID that is assigned to each telephone call that traverses through the telecommunications network
  • the NCID is a discrete identifier among all network calls
  • the NCID is transported and recorded at each switch that is involved with the telephone call
  • the o ⁇ ginating switch of a telephone call generates the NCID
  • the chosen embodiment of the NCID of the present invention is an eighty-two (82) bit identifier that is comp ⁇ sed of the following subfields:
  • O ⁇ ginating Switch ID 14 bits
  • This field represents the NCS Switch ID as defined in the Office Engineering table at each switch.
  • the SER call record contains an alpha numeric representation of the Switch ID.
  • a switch uses the alphanumeric Switch ID as an index into a database for retrieving the corresponding NCS Switch ID.
  • Originating Trunk Group 14 bits: This field represents the originating trunk group as defined in the 32/64-word call record format described above.
  • Originating Port Number (19 bits) This field represents the originating port number as defined in the 32/64-word call record format described above.
  • Timepoint 1 (32 bits) : This field represents the Timepoint 1 value as defined in the 32/64-word call record format described above.
  • Each switch records the NCID in either the 32 or 64-word call record format.
  • intermediate and terminating switches will record the NCED in the AuthCode field of the 32-word call record if the AuthCode filed is not used to record other information.
  • the Originating Switch ID is the NCS Switch ID, not the alphanumeric Switch ED as recorded in the SER call record. If the AuthCode is used for other information, the intermediate and terminating switches record the NCID in the 64-word call record format. In contrast, originating switches do not use the AuthCode field when storing an NCID in a 32-word call record.
  • Originating switches record the subfields of the NCID in the corresponding separate fields of the 32-word call record. That is, the Originating Switch ID is stored as an alphanumeric Switch ED in the Switch ID field of the SER call record; the Originating Trunk Group is stored in the Originating Trunk Group field of the 32-word call record; the Originating Port Number is stored in the Originating Port field of the 32-word call record; the Timepoint 1 is stored in the Timepoint 1 field of the 32-word call record; the Sequence Number is stored in the NCED Sequence Number field of the 32-word call record.
  • the 32-word call record also includes an NCID Location (NCIDLOC) field to identify when the NCID is recorded in the AuthCode field of the call record.
  • NCIDLOC NCID Location
  • the NCED Location field contains a ' 1
  • the AuthCode field contains the NCID
  • the NCID Location field contains a '0
  • the NCID is stored in its separate sub- fields in the call record Only intermediate and terminating switches set the NCID Location field to a ' 1 ' because o ⁇ ginating switches store the NCID in the separate fields of the 32-word call record
  • the expanded call record includes a separate field, call the NCID field, to store the 82 bits of the NCID This call record is handled the same regardless of whether an o ⁇ ginating, intermediate, or terminating switch stores the NCID.
  • the O ⁇ ginating Switch ID is the NCS Switch ID, not the alphanume ⁇ c Switch ID as recorded in the SER call record
  • FIG 11 illustrates the control flow of the Network Call Identifier switch call processing
  • a call 202 comes into a switch 106-110 (called the current switch for reference purposes; the current switch is the switch that is currently processing the call) at step 1104
  • the current switch receives the call 202 and proceeds to step 1106
  • the current switch accesses a local database and gets the trunk group parameters associated with the o ⁇ ginating trunk group of the call 202 After getting the parameters, the current switch proceeds to step 1108.
  • the current switch determines if it received an NCID with the call 202. If the current switch did not receive an NCID with the call 202, the switch continues to step 1112.
  • step 1112 the switch analyzes the o ⁇ ginating trunk group parameters to determine the o ⁇ ginating trunk group type If the o ⁇ ginating trunk group type is an InterMachine Trunk (IMT) or a release link trunk (RLT), then the switch proceeds to step 1116 An MT is a trunk connecting two normal telecommunication switches, whereas a RLT is a trunk connecting an intelligent services network (ISN) platform to a normal telecommunication switch.
  • ISN intelligent services network
  • step 1116 the current switch analyzes the o ⁇ ginating trunk group parameters to determine whether it is autho ⁇ zed to create an NCID for the call 202.
  • step 1116 if the current switch is not autho ⁇ zed to create an NCED for the call 202, the current switch proceeds to step 1118.
  • the current switch knows that it is not an originating switch, it did not receive an NCID for the call 202, but is not autho ⁇ zed to generate an NCED. Therefore, in step 1118, the current switch writes the call record associated with the call 202 to the local switch database and proceeds to step 1120.
  • the current switch transports the call 202 out through the network with its associated NCID Step 1120 is desc ⁇ bed below m more detail.
  • step 1116 if the current switch is autho ⁇ zed to create an NCID for the call 202, the cu ⁇ ent switch proceeds to step 1114 In step 1114, the current sw itch generates a new NCED for the call 202 before continuing to step 1136 In step 1136, the current switch w ⁇ tes the call record, including the NCID, associated with the call 202 to the local switch database and proceeds to step 1120 In step 1120, the current switch transports the call 202 out through the network with its associated NCID Step 1120 is desc ⁇ bed below in more detail
  • step 1114 the current switch knows that it is an o ⁇ ginating switch and. therefore, must generate a NCID for the call 202
  • Step 1114 is desc ⁇ bed below in more detail
  • the current switch proceeds to step 1136 to write the call record, including the NCID, associated with the call 202 to the local database
  • step 1120 transport the call out through the network with its associated
  • NCED Step 1120 is also desc ⁇ bed below in more detail.
  • step 1110 the current switch processes the received NCID
  • the current switch may decide not to keep the received NCID thereby proceeding from step 1110 to step 1114 to generate a new NCED Step 1110 is desc ⁇ bed below in more detail
  • step 1114 the current switch may generate a new NCED for the call 202 before continuing to step 1136 Step 1114 is also desc ⁇ bed below in more detail
  • step 1136 the current switch w ⁇ tes the call record associated with the call 202 to the local database The current switch then proceeds to step 1120 and transports the call 202 out through the network with its associated NCID Step 1120 is also desc ⁇ bed below in more detail.
  • the current switch may decide to keep the received NCED thereby proceeding from step 1110 to step 1115 In step 1115, the current switch adds the received
  • Steps 1110 and 1115 are desc ⁇ bed below in more detail
  • the current switch continues to step 1136 where it w ⁇ tes the call record associated with the call 202 to the local database.
  • the current switch then proceeds to step 1120 and transports the call 202 out through the network with its associated NCED Step 1120 is also desc ⁇ bed below in more detail
  • Figure 12 illustrates the control logic for step 11 10 w hich processes a received NCID
  • the current switch enters step 1202 of step 1110 when it determines that an NCID was received with the call 202
  • the current switch analyzes the o ⁇ ginating trunk group parameters to determine the o ⁇ ginating trunk group type If the o ⁇ ginating trunk group type is an IMT or
  • step 1212 the current switch knows that it is not an o ⁇ ginating switch and that it received an NCID for the call 202 Therefore, in step 1212, the current switch keeps the received NCID and exits step 1110, thereby continuing to step 1115 in Figure 11 , after which the cu ⁇ ent switch will store the received NCED in the call record and transport the call
  • step 1204 the cu ⁇ ent switch determines if the o ⁇ ginating trunk group type is an Integrated Services User Parts Direct Access Line (ISUP DAL) or an integrated Services Digital Network P ⁇ mary Rate Interface (ISDN PRI)
  • ISUP is a signaling protocol which allows information to be sent from switch to switch as information parameters
  • An ISUP DAL is a trunk group that p ⁇ ma ⁇ ly is shared by multiple customers of the network, but can also be dedicated to a single network customer
  • an ISDN PRI is a trunk group that p ⁇ ma ⁇ ly is dedicated to a single network customer, but can also be shared by multiple network customers
  • a network customer is an entity that leases network resources
  • step 1206 the current switch knows that it received an NCED that
  • step 1204 if the current switch determines that the o ⁇ ginating trunk group type is an ISUP DAL or ISDN PRI, the current switch continues to step 1208 When in step 1204, if the current switch determines that the o ⁇ ginating trunk group type is an ISUP DAL or ISDN PRI, the current switch continues to step 1208 When in step 1204, if the current switch determines that the o ⁇ ginating trunk group type is an ISUP DAL or ISDN PRI, the current switch continues to step 1208 When in step 1204, if the current switch determines that the o ⁇ ginating trunk group type is an ISUP DAL or ISDN PRI, the current switch continues to step 1208 When in step 1204, if the current switch determines that the o ⁇ ginating trunk group type is an ISUP DAL or ISDN PRI, the current switch continues to step 1208 When in step 1204, if the current switch determines that the o ⁇ ginating trunk group type is an ISUP DAL or ISDN PRI, the current switch continues to step 1208 When in step
  • the current switch knows that it received an NCID from a customer trunk group Therefore, the current switch analyzes the o ⁇ gmatmg trunk group parameters to determine whether it is autho ⁇ zed to create a new NCED for the call 202
  • the cu ⁇ ent switch may be autho ⁇ zed to create a new NCED and overw ⁇ te the NCED provided by the customer to ensure that a valid NCED corresponds to the call 202 and is sent through the network
  • the cu ⁇ ent switch proceeds to step 1210 In step 1210.
  • the cu ⁇ ent switch checks the validity of the received NCID, for example, the NCID length If the received NCID is invalid, the cu ⁇ ent switch proceeds to step 1206 In step 1206, the cu ⁇ ent switch discards the invalid NCID From step 1206, the cu ⁇ ent switch exits step 1110, thereby continuing to step 1114 in Figure 11 where the cu ⁇ ent switch will create a new NCID and transport that NCID with the call 202 Refer ⁇ ng again to step 1210, if the cu ⁇ ent switch dete ⁇ nines that the received NCID is valid, the cu ⁇ ent switch proceeds to step 1212 In step 1212 the cu ⁇ ent switch keeps the received NCID and exits step 1110, thereby continuing to step 1115 in Figure 11 where the cu ⁇ ent switch will store the received NCID in the call record and transport the call
  • FIG 13A illustrates the control logic for step 1114 which generates an NCID
  • the cu ⁇ ent switch enters step 1302 when an NCID must be created
  • the cu ⁇ ent switch will calculate a sequence number
  • the sequence number represents the number of calls which have occu ⁇ ed on the same port number with the same Timepoint 1 value
  • the first call has a sequence number value of '0,' after which the sequence number will increase incrementally for each successive call that onginates on the same port number with the same Timepoint 1 value
  • the cu ⁇ ent switch proceeds to step 1304
  • the cu ⁇ ent switch creates a call record for the call202, including in it the call's 202 newly created NCID
  • the cu ⁇ ent switch exits step 1114 and proceeds to step 1136 in Figure 11 where the cu ⁇ ent switch w ⁇ tes the call record to the local switch database
  • Figure 13B illustrates the control logic for step 1115 which adds a received NCID to the call record associated with the call 202 Upon ente ⁇ ng step 1115, the cu ⁇ ent switch enters step
  • step 1306 the cu ⁇ ent switch knows that it has received a valid NCID from an intermediate or terminating switch, or from a customer switch
  • the cu ⁇ ent switch dete ⁇ nines if the AuthCode field of the 32-word call record is available for sto ⁇ ng the NCID If the AuthCode field is available, the cu ⁇ ent switch proceeds to step 1310
  • the current switch stores the NCID in the AuthCode field of the 32-word call record
  • the cu ⁇ ent switch must also set the NCED Location field to the value ' 1 ' which indicates that the NCED is stored in the AuthCode field
  • the cu ⁇ ent switch exits step 1115 and continues to step 1136 in Figure 11 where the cu ⁇ ent switch w ⁇ tes the call record to the local switch database Refer ⁇ ng again to step 1306.
  • step 1308 the cu ⁇ ent switch stores the NCID in the NCID field of the 64-word call record. After step 1308, the cu ⁇ ent switch exits step 1115 and continues to step 1136 in Figure 11 where the cu ⁇ ent switch w ⁇ tes the call record to the local switch database.
  • Figure 14 illustrates the control logic for step 1120 which transports the call from the cu ⁇ ent switch.
  • steps 1402 and 1412. Upon ente ⁇ ng step 1402 from step 1136 on Figure 11, the cu ⁇ ent switch knows that it has created an NCID or has received a valid NCID.
  • the cu ⁇ ent switch accesses a local database and gets the trunk group parameters associated with the terminating trunk group for transporting the call 202. After getting the parameters, the cu ⁇ ent switch proceeds to step 1404.
  • the cu ⁇ ent switch determines the terminating trunk group type. If the terminating trunk is an ISUP trunk, the cu ⁇ ent switch proceeds to step 1408.
  • step 1408 the cu ⁇ ent switch analyzes the parameters associated with the ISUP trunk type to determine whether or not to deliver the NCED to the next switch. If the cu ⁇ ent switch is authorized to deliver the NCID. the cu ⁇ ent switch proceeds to step 1416. In step 1416, the cu ⁇ ent switch transports the call to the next switch along with a SS7 initial address message (IAM). The NCID is transported as part of the generic digits parameter of the IAM. The IAM contains setup information for the next switch which prepares the next switch to accept and complete the call 202. The format of the generic digits parameter is shown below in Table 306 :
  • the cu ⁇ ent switch After transporting the call 202 and the IAM, the cu ⁇ ent switch proceeds to step 1418, thereby exiting the switch processing
  • step 1412 the cu ⁇ ent switch transports the call 202 to the next switch under normal procedures which consists of sending an IAM message to the next switch without the NCED recorded as part of the gene ⁇ c digits parameter After transporting the call 202, the cu ⁇ ent switch proceeds to step 1418, thereby exiting the switch processing
  • step 1406 the cu ⁇ ent switch dete ⁇ nines if the te ⁇ ninating trunk group is an ISDN trunk (the terminating trunk group is dedicated to one network customer). If the terminating trunk group is an ISDN, the cu ⁇ ent switch proceeds to step 1410 In step 1410, the cu ⁇ ent switch analyzes the parameters associated with the ISDN trunk group type to determine whether or not to deliver the NCID to the next switch. If the cu ⁇ ent switch is autho ⁇ zed to deliver the NCID, the cu ⁇ ent switch proceeds to step 1414. In step 1414.
  • the cu ⁇ ent switch transports the call to the next switch along with a setup message.
  • the setup message contains setup information for the next switch which prepares the next switch to accept and complete the call 202
  • the NCID is transported as part of the locking shift codeset 6 parameter of the setup message
  • the format of the locking shift codeset 6 parameter is shown below m Table 307 :
  • the cu ⁇ ent switch After transporting the call 202 and the setup message, the cu ⁇ ent switch proceeds to step 1418, thereby exiting the switch processing
  • step 1412 the cu ⁇ ent switch transports the call 202 to the next switch under normal procedures which consists of sending a setup message to the next switch without the NCID recorded as part of the locking shift codeset 6 parameter After transporting the call 202, the cu ⁇ ent switch proceeds to step 1418, thereby exiting the switch processing
  • step 1412 this step is also entered from step 1118 on Figure 11 when the cu ⁇ ent switch did not receive an NCED, is an intermediate or terminating switch, and is not autho ⁇ zed to create an NCED
  • the cu ⁇ ent switch also transports the call 202 to the next switch under normal procedures which consists of sending an IAM or setup message to the next switch without the NCED recorded as part of the parameter.
  • the cu ⁇ ent switch proceeds to step 1418. thereby exiting the switch processing
  • a system and method for the switches of a telecommunications network to generate call records for telephone calls using a flexible and expandable record format Upon receipt of a telephone call, a switch in the network analyzes the telephone call to determine whether the default call record is sufficiently large to store call record information pertaining to the telephone call, or whether the expanded call record must be used to store the call information pertaining to the telephone call. After determining which call record to use, the switch generates the default or expanded call record. The sw itch sends a billing block, comp ⁇ sed of completed call records, to a billing center upon filling an entire billing block.
  • a callback system is facilitated by a caller accessing a display from a computer and filling out information descnbing the parameters of a call.
  • Information such as the date and time the call should be initiated, billing information, and telephone numbers of parties to participate in the call could be captured.
  • a central or distributed computing facility with access to the hyb ⁇ d network transmits e-mail in a note to each party required for the call copying the other parties to verify participation and calendar the event.
  • the e-mail would include any particulars, such as the password associated with the call and time the call would be commenced.
  • the necessary network facilities would also be reserved to assure the approp ⁇ ate Quality of Service (QOS) would be available, and when the date and time requested amved, the call is initiated by contacting each of the participants whether they be utilizing a telephone attached to a PSTN or a voice capable apparatus (such as a computer or intelligent television) attached to the hybrid network.
  • QOS Quality of Service
  • any party could request operator assistance by selecting that service from the display associated with the call.
  • a custom profile is provided as an extension to the users existing profile information
  • the custom profile allows a user to store frequent conference call participants information
  • the profile contains participant ' s telephone numbers (which could be DDD, IDDD, IP Address or Cellular phone number). E-mail address, paging service, fax number, secretary phone number, location, time zone, working hours and other pertinent information that will be useful for initiating a call
  • Default profiles based on company or organization needs are also enabled and can be tailored to meet the needs of a particular user based on more global information
  • Billing information would also be provided online A user could enter a pre-a ⁇ anged billing number or the ability to bill to a credit card or telephone number If billing to a telephone number, the system treats the call like a collect or third party call to ve ⁇ fy billing
  • profile information were predefined for a particular call strig ⁇ o, then another option would allow an immediate connection of a conference call or single call at the press of a button, much as speed dialing is performed today except that more than one caller could be joined without intervention of the calling party, Internet callers are supported and an operator can be joined as required
  • the Internet is a method of interconnecting physical networks and a set of conventions for using networks that allow the computers they reach to interact Physically, the Internet is a huge, global network spanning over 92 count ⁇ es and comp ⁇ sing 59.000 academic, commercial, government, and military networks, according to the Government Accounting Office (GAO), with these numbers expected to double each year Furthermore, there are about 10 million host computers, 50 million users, and 76,000 World-Wide Web servers connected to the Internet
  • the backbone of the Internet consists of a se ⁇ es of high-speed communication links between major supercomputer sites and educational and research institutions withm the U S. and throughout the world
  • TCP/IP Transmission Control Protocol Internet Protocol
  • RRCs m Requests for Comments
  • T has established numerous standards governing protocols and line encoding for telecommunication devices. Because many of these standards are referenced throughout this document, summaries of the relevant standards are listed below for reference.
  • ITU G.71 1 Recommendation for Pulse Code Modulation of 3kHz Audio Channels.
  • ITU G.722 Recommendation for 7kHz Audio Coding within a 64kbit/s channel.
  • ITU G.723 Recommendation for dual rate speech coder for multimedia communication transmitting at 5.3 and 6.3 kbits.
  • ITU H.225 ITU Recommendation for Media Stream Packetization and Synchronization on non- guaranteed quality of service LANs.
  • ITU H.230 Frame-synchronous Control and Indication Signals for Audiovisual Systems
  • ITU H.242 System for Establishing Communication Between Audiovisual Terminals Using
  • ITU H.321 Visual Telephone Te ⁇ ninals over ATM
  • ITU H.322 Visual Telephone Terminals over Guaranteed Quality of Service LANs
  • ITU H.323 ITU Recommendation for Visual Telephone Systems and Equipment for Local Area Networks which provide a non-guaranteed quality of service
  • ITU H.324 Recommendation for Terminals and Systems for low b ⁇ trate(28.8 Kbps) multimedia communication on dial-up telephone lines
  • ISDN Integrated Services Digital Network the digital communication standard for transmission of voice, video and data on a single communications link.
  • RTP Real-Time Transport Protocol an Internet Standard Protocol for transmission of real-time data like voice and video over unicast and multicast networks
  • IP Internet Protocol an Internet Standard Protocol for transmission and delivery of data packets on a packet switched network of interconnected computer systems
  • TCP/IP Open protocol standards, freely available and developed independently of any hardware or operating system.
  • TCP/IP is capable of being used with different hardware and software, even if Internet communication is not required.
  • TCP/IP can be used over an Ethernet, a token ⁇ ng, a dial-up line, or virtually any other kinds of physical transmission media
  • An understanding of how information travels in communication systems is required to appreciate the recent steps taken by key players in today's Internet backbone business.
  • the traditional type of communication network is circuit switched.
  • the U.S. telephone system uses such circuit switching techniques. When a person or a computer makes a telephone call, the switching equipment within the telephone system seeks out a physical path from the originating telephone to the receiver's telephone.
  • a circuit-switched network attempts to form a dedicated connection, or circuit, between these two points by first establishing a circuit from the originating phone through the local switching office, then across trunk lines, to a remote switching office, and finally to the destination telephone. This dedicated connection exists until the call terminates.
  • the establishment of a completed path is a prerequisite to the transmission of data for circuit switched networks.
  • the microphone captures analog signals, and the signals are transmitted to the Local Exchange Carrier (LEC) Central Office (CO) in analog form over an analog loop.
  • LEC Local Exchange Carrier
  • CO Central Office
  • the analog signal is not converted to digital form until it reaches the LEC Co, and even then only if the equipment is modern enough to support digital information.
  • the analog signals are converted to digital at the device and transmitted to the LEC as digital information.
  • the circuit guarantees that the samples can be delivered and reproduced by maintaining a data path of 64 Kbps (thousand bits per second). This rate is not the rate required to send digitized voice per se. Rather, 64Kbps is the rate required to send voice digitized with the Pulse Code Modulated (PCM) technique. Many other methods for digitizing voice exist, including ADPCM (32Kbps), GSM (13 Kbps), TrueSpeech 8.5 (8.5 Kbps), G.723 (6.4 Kbps or 5.3 Kbps) and Voxware RT29HQ (2.9 Kbps). Furthermore, the 64 Kbps path is maintained from LEC Central Office (CO) Switch to LEC CO, but not from end to end. The analog local loop transmits an analog signal, not 64 Kbps digitized audio. One of these analog local loops typically exists as the "last mile" of each of the telephone network circuits to attach the local telephone of the calling party.
  • PCM Pulse Code Modulated
  • circuit switching has two significant drawbacks.
  • circuit switching infrastructure is built around 64 Kbps circuits.
  • the infrastructure assumes the use of PCM encoding techniques for voice
  • very high quality codecs are available that can encode voice using less than one-tenth of the bandwidth of PCM.
  • the circuit switched network blindly allocates 64 Kbps of bandwidth for a call, end-to-end, even if only one-tenth of the bandwidth is utilized.
  • each circuit generally only connects two parties Without the assistance of conference b ⁇ dging equipment, an entire circuit to a phone is occupied in connecting one party to another party.
  • Circuit switching has no multicast or multipoint communication capabilities, except when used in combination with conference b ⁇ dging equipment
  • connection-o ⁇ ented virtual or physical circuit setup such as circuit switching, requires more time at connection setup time than comparable connectionless techniques due to the end-to-end handshaking required between the conversing parties.
  • Message switching is another switching strategy that has been considered With this form of switching, no physical path is established in advance between the sender and receiver; instead, whenever the sender has a block of data to be sent, it is stored at the first switching office and retransmitted to the next switching point after e ⁇ or inspection.
  • Message switching places no limit on block size, thus requinng that switching stations must have disks to buffer long blocks of data; also, a single block may tie up a line for many minutes, rendenng message switching useless for interactive traffic.
  • Packet switched networks which predominate the computer network industry, divide data into small pieces called packets that are multiplexed onto high capacity mtermachine connections.
  • a packet is a block of data with a stnct upper limit on block size that carnes with it sufficient identification necessary for delivery to its destination
  • Such packets usually contain several hundred bytes of data and occupy a given transmission line for only a few tens of milliseconds Delivery of a larger file via packet switching requires that it be broken into many small packets and sent one at a time from one machine to the other The network hardw are delivers these packets to the specified destination, where the software reassembles them into a single file
  • Packet switching is used by virtually all computer interconnections because of its efficiency m data transmissions
  • Packet switched networks use bandwidth on a circuit as needed, allowing other transmissions to pass through the lines m the inte ⁇ m
  • throughput is increased by the fact that a router or switching office can quickly forward to the next stop any given packet, or portion of a large file, that it receives, long before the other packets of the file have ar ⁇ ved
  • the intermediate router would have to wait until the entire block was delivered before forwarding
  • message switching is no longer used in computer networks because of the supe ⁇ o ⁇ ty of packet switching
  • the Internet is composed of a great number of individual networks, together forming a global connection of thousands of computer systems After understanding that machines are connected to the individual networks, we can investigate how the networks are connected together to form an internetwork, or an internet At this point, internet gateways and internet routers come into play.
  • gateways and routers provide those links necessary to send packets between networks and thus make connections possible Without these links, data communication through the Internet would not be possible, as the information either would not reach its destination or would be incomprehensible upon amval
  • a gateway may be thought of as an entrance to a communications network that performs code and protocol conversion betw een two otherwise incompatible networks For instance, gateways transfer electronic mail and data files between networks over the internet
  • IP Routers are also computers that connect networks and is a newer term prefe ⁇ ed by vendors These routers must make decisions as to how to send the data packets it receives to its destination through the use of continually updated routing tables By analyzing the destination network address of the packets, routers make these decisions importantly, a router does not generally need to decide which host or end user will receive a packet, instead, a router seeks only the destination network and thus keeps track of information sufficient to get to the approp ⁇ ate network, not necessa ⁇ ly the approp ⁇ ate end user Therefore, routers do not need to be huge supercomputing systems and are often just machines with small mam memo ⁇ es and little disk storage
  • the distinction between gateways and routers is slight, and cu ⁇ ent usage blurs the line to the extent that the two terms are often used interchangeably In cu ⁇ ent te ⁇ nmology, a gateway moves data between different protocols and a router moves data between different networks So a system that moves mail between TCP/IP and OSI is a gateway, but
  • each subsc ⁇ ber' s telephone and the end office are called local loops If a subsc ⁇ ber attached to a given end office calls another subsc ⁇ ber attached to the same end office, the switching mechanism within the office sets up a direct elect ⁇ cal connection between the two local loops This connection remains intact for the duration of the call, due to the circuit switching techniques discussed earlier. If the subsc ⁇ ber attached to a given end office calls a user attached to a different end office, more work has to be done in the routing of the call. First, each end office has a number of outgoing lines to one or more nearby switching centers, called toll offices. These lines are called toll connecting trunks. If both the caller's and the receiver's end offices happen to have a toll connecting tmnk to the same toll office, the connection may be established within the toll office.
  • toll office If the caller and the recipient of the call do not share a toll office, then the path will have to be established somewhere higher up in the hierarchy.
  • sectional and regional offices that form a network by which the toll offices are connected.
  • the toll, sectional, and regional exchanges communicate with each other via high bandwidth mter-toll trunks.
  • TCP/IP In addition to the data transfer functionality of the Internet, TCP/IP also seeks to convince users that the Internet is a solitary, virtual network. TCP/EP accomplishes this by providing a universal interconnection among machines, independent of the specific networks to which hosts and end users attach. Besides router interconnection of physical networks, software is required on each host to allow application programs to use the Internet as if it were a single, real physical network.
  • routing is the process of choosing a path over which to send packets.
  • routers are the computers that make such choices. For the routing of information from one host within a network to another host on the same network, the datagrams that are sent do not actually reach the Internet backbone. This is an example of internal routing, which is completely self-contained within the network. The machines outside of the network do not participate in these internal routing decisions.
  • Direct delivery is the transmission of a datagram from one machine across a single physical network to another machine on the same physical network. Such deliveries do not involve routers. Instead, the sender encapsulates the datagram in a physical frame, addresses it, and then sends the frame directly to the destination machine.
  • Indirect delivery is necessary when more than one physical network is involved, in particular when a machine on one network wishes to communicate with a machine on another network.
  • routers are required. To send a datagram, the sender must identify a router to which the datagram can be sent, and the router then forwards the datagram towards the destination network. Recall that routers generally do not keep track of the individual host addresses (of which there are millions), but rather just keeps track of physical networks (of which there are thousands). Essentially, routers in the Internet form a cooperative, interconnected stmcture, and datagrams pass from router to router across the backbone until they reach a router that can deliver the datagram directly.
  • ATM Asynchronous Transfer Mode
  • ATM incorporates features of both packet switching and circuit switching, as it is designed to carry voice, video, and television signals in addition to data. Pure packet switching technology is not conducive to carrying voice transmissions because such transfers demand more stable bandwidth.
  • Frame relay systems use packet switching techniques, but are more efficient than traditional systems. This efficiency is partly due to the fact that they perform less e ⁇ or checking than traditional X.25 packet-switching services. In fact, many intermediate nodes do little or no e ⁇ or checking at all and only deal with routing, leaving the e ⁇ or checking to the higher layers of the system With the greater reliability of today's transmissions, much of the e ⁇ or checking previously performed has become unnecessary Thus, frame relay offers increased performance compared to traditional systems
  • An Integrated Services Digital Network is an "international telecommunications standard for transmitting voice, video, and data over digital lines," most commonly mnnmg at 64 kilobits per second
  • the traditional phone network ns voice at only 4 kilobits per second.
  • an end user or company must upgrade to ISDN terminal equipment, central office hardware, and central office software.
  • the ostensible goals of ISDN include the following:
  • An ISP is composed of several disparate systems. As ISP integration proceeds, formerly independent systems now become part of one larger whole with concomitant increases in the level of analysis, testing, scheduling, and training in all disciplines of the ISP.
  • FIG. 114 A block diagram of the architecture is illustrated in Figure 114 in accordance with a prefe ⁇ ed embodiment.
  • the callback call flow commences when a caller 11412 calls into a local internet service provider 11419 as illustrated in
  • FIG 114 at 11410 The caller addresses the callback server 11414 to access the callback home page 11411 through the internet 11419, shown as an internet cloud labeled Basic Inernet Protocol Platform 11419.
  • IP Internet Protocol
  • the caller enters, sees and/or updates default information such as: callback Internet Protocol (IP) address, call-to phone number (or multiple phone numbers to initiate a conference call) and charge-to method at a minimum.
  • IP Internet Protocol
  • Other information such as one or more numbers comprising entry of a Direct Distance Dialing (DDD), International Direct Distance Dialing (EDDD) or an Internet Protocol (IP) address can be utilized to specify a phone number or internet computer with voice capability.
  • DDD Direct Distance Dialing
  • EDDD International Direct Distance Dialing
  • IP Internet Protocol
  • a date and time can be prea ⁇ anged for staging the callback operation. Additional information that can be captured at the callback server home page 11411 is detailed below in specific examples designed to elaborate and cla ⁇ fy in accordance with a prefe ⁇ ed embodiment
  • the callback server 11414 send a message to the callback switch 11432 with the approp ⁇ ate calling information, and the callback switch 11432 initiates the callback leg as shown by step 11430 of the call through the Public Service Telephony Network (PSTN) 11435 to the destination specified by the caller whereby the callback caller answers the incoming call to 11437
  • PSTN Public Service Telephony Network
  • the callback switch initiates call-to call leg(s) which connect the call through path 11440 through PSTN 11445 to telephone set 11446 and or 11447
  • an exception condition is indicated on the display if it is an IP call, or an audio indicia of the condition is transmitted to the callers if they are utilizing a standard telephony device
  • a change in status could be a caller hanging up or a glitch occur ⁇ ng in the transmission
  • the exception conditions are also captured for quality of service analysis
  • a separate temporary webpage is created which is accessible to all members of the callback via a password selected by the initiator of the callback session While all of the callers are being connected and throughout the duration of the telephony expe ⁇ ence, the status of the call leg changes, and exception conditions, are indicated on the temporary created status webpage, or an audio indicia, where approp ⁇ ate, of the condition is transmitted to the callers if they are utilizing a standard telephony device Then, as callers are connected, removed, or change status, the display is updated to reflect the status of each participant's connection.
  • participants can drag and drop files, video clips or any other information which would be utilized as collaborative mate ⁇ al du ⁇ ng the call. Each participant would be required to move information to their personal computer before the call terminated, since the webpage is temporary and is deleted upon termination of the call.
  • the temporary webpage is password protected to avoid
  • the callback service includes support for one-to-one calling, one-to-many calling (conference calling, fax broadcast, text-to-speech message delivery, voice-to-voice message delivery, conference call reservation whereby the server sends E-mails to call-to participants with the conference call details, the server sends fax to call-to participants, or the server sends a text-to- speech message to call-to participants.
  • ANI and an alphanumeric representation to identify each participant entered by the initiator when a call is "reserved" can be displayed on screen as participants connect to conference. This information is captured as part of the call record set forth earlier and detailed in the appendix.
  • a conference call without callback leg is enabled.
  • a callback customer participates through a Voice Over Network (VON) application utilizing a computer with voice capability, and can initiate a video screen popup on the computer display for manual operator assistance as detailed above in the description of a video operator.
  • VON Voice Over Network
  • the callback caller dials into a local internet service provider 11512. Then, the caller addresses the host server 11514 containing the callback home page 11510 - 11511. At the callback server home page 11511, the caller enters the information described earlier including a callback Internet Protocol (EP) address, call-to phone number (or multiple phone numbers to initiate a conference call) and charge-to method at a minimum. Then, for the callback call flow to initiate the call, the callback server 11514, where the callback server home page 11511 is located, transmits a message to the callback switch 11532 with the necessary calling information generated from the callback home page 11511.
  • EP Internet Protocol
  • the callback switch 11532 establishes an internet voice session with the callback caller utilizing the internet service provider 11512 to establish a voice EP session with the initiating client 11535.
  • the callback switch 11511 then initiates the call-to call leg(s) routing the call 11540 out over the public service telephony network 11541 to a telephone set 11542.
  • An expert system monitors each call in accordance with a prefe ⁇ ed embodiment.
  • the system includes mles that define what logic to execute when an exception occurs.
  • the mles include specialized processing based on whether the call is routed via a PSTN or the internet.
  • the system includes a default connection to a manual operator if no other co ⁇ ection of the connection is available. For example, if a caller hangs up during a teleconference and other callers are still connected, an exception message is sent to each of the still connected callers informing them of the status change.
  • Another aspect of the expert system is to ensure quality of service (QOS) and produce reports indicating both integrity and exceptions.
  • QOS quality of service
  • Scheduling of resources is tied to this expert system, which regulates whether calls can be scheduled based on available or projected resources at the time of the proposed call. For example, since all calls used by this system are initiated by the callback switch (item 11432 in Figure 114 and item 11532 in Figure 115), if there are insufficient outgoing trunk ports during the period of time that a callback subscriber requests, then the callback subscriber is prompted to select another time or denied access to the resources for that time. This is utilized to predict when additional ports and/or resources are required.
  • the NGN operations architecture specifies the points of insertion and collections for network wide events that feed the Fault Management systems. Since the components of the packet portion of the hybrid NGN infrastructure are in most cases manageable by SNMP or some other standard management protocol the major challenges are the following:
  • FIG. 15A is a flowchart showing a Fault Management Process 1550 in accordance with a prefe ⁇ ed embodiment of the present invention
  • the Fault Management Process 1550 begins with a transmitting step 1552
  • data is transmitted over the hyb ⁇ d network.
  • the data transmission generally makes full use of the hyb ⁇ d networks mixed circuit-switched an packet-switched components
  • the hyb ⁇ d net ork includes approximately all the advantages of a packet based network while still making use of the older circuit-switched components already in place
  • the system is able to do this by co ⁇ elating events raised by both the circuit-switched and packet-switch network elements, as discussed later in relation to event and co ⁇ elating steps 1554 and 1556
  • a circuit-switched ev ent gathenng step 1554 an event is obtained from a circuit-switched based network element
  • event gathenng and interpretation is typically performed by custom developed software interfaces which communicate directly w ith the network elements, process raw network events, and sort the events by context pnor to sto ⁇ ng them
  • the events are co ⁇ elated in a co ⁇ elation step 1556
  • a co ⁇ elation step 1556 the event gathered in step 1554 is co ⁇ elated with a second event obtained from a packet-switched network element
  • packet-switched event gathenng and interpretation is typically performed by custom developed software interfaces which communicate directly with the network elements, process raw network events, and sort the events by context pnor to sto ⁇ ng them
  • the co ⁇ elation is preferably provided by a mles based inference engine
  • a fault message is created based on the co ⁇ elated first and second events obtained in steps 1554 and 1556
  • the fault message is created utilizing a comprehensive library of all possible message types and network events which categonzes the numerous messages that the hyb ⁇ d network generates
  • FIG. 15B is a block diagram showing a Fault Management component 1500 in accordance with a prefe ⁇ ed embodiment of the present invention
  • the Fault Management component 1500 records failures and exceptions in network devices (e g network routers or UNIX servers) and performs the following operations 1 ) performs root-cause co ⁇ elation of the failures and exceptions,
  • the Fault Management component 1500 includes the follow ing elements
  • NT Servers 1504 Any NT Server with BMC Patrol clients loaded
  • HP OV Network Node Manager (Collector Component) 1508 - HP OpenView Network Node
  • Manager is one product which performs several functions In this context it is it is responsible for receiving performance information from BMC Patrol clients via BMC Patrol View
  • Seagate NerveCenter 1510 - In a fault management context, Seagate NerveCenter performs root- cause co ⁇ elation of faults and events across the network
  • HP OV Network Node Manager Network Map 1512 - HP OpenView Network Node Manager is one product which performs several functions In this context it is responsible for maintaining and displaying the node level network map of the network the MNSIS architecture monitors
  • HP OV Network Node Manager 1514 - HP OpenView Network Node Manager is one product which performs several functions In this context it is it is responsible for receiving and displaying all events, regardless of their source
  • Netcool HP OV NNM Probe 1516 An Omnibus Netcool probe which is installed on the same system as HP OV Network Node Manager and forwards events to the Omnibus Netcool Object Server.
  • the Omnibus Netcool Object Server is a real-time memory resident database which stores all cu ⁇ ent events (alerts)
  • the ev ents are viewable by operations personnel using a number of event lists and views, all of which are highly customizable by each operator
  • Notification Spooler 1522 - A custom provided sub-component which spools job-files that specify which events have occu ⁇ ed for possible notifications
  • Each spooled job represents a specific ev ent that was received by the Netcool Object Server and may need to result in one or more notification actions
  • Each job is stored as a file in a special notification spool directory
  • Notification Actor 1526 - A custom provided sub-component which determines the alert time, source node, and alert type from the loaded spooled job and initiates notification actions based as specified in the configuration file
  • Notification actions include alphanume ⁇ c pages, trouble tickets, email, and resolution sc ⁇ pts
  • Multiple notification actions can be specified in the configuration files such that different actions are taken for different alert times, source nodes, and/or alert types Default actions are also supported
  • the alphanume ⁇ c page message provides contextual notification of actions to be performed
  • Context can include any information but frequently contains information such as the device name, problem desc ⁇ ption, and p ⁇ o ⁇ ty
  • Electronic Mail Message 1530 An internet mail message send using the UNIX mail utility The mail message is frequently used to provide non-urgent notification of situations or actions automatically performed by the MNSIS architecture along with detailed context
  • Local Sc ⁇ pt Execution 1532 Initiates any local sc ⁇ pt on the machine, which may initiate sc ⁇ pts or applications on other machines
  • Remedy Gateway 1534 The Omnibus Netcool Remedy Gateway automatically reads alerts in the Netcool Object Server and opens tickets within Remedy as customized by the user The Remedy trouble ticket ID is returned to the Omnibus and can be viewed as further reference
  • Oracle Gateway 1538 The Omnibus Netcool Oracle Gateway automatically reads alerts in the Netcool Object Server and logs records within Oracle as customized by the user
  • Oracle 1540 - Oracle is a relational database management system
  • New Time Records 1544 -Time records co ⁇ esponding to new alerts in Netcool Object Server which need to be added to the Oracle time tables
  • the Proactive Threshold Manager is an automated network manager that forewarns service providers of a chance that a service level agreement to maintain a certain level of service is in danger of being breached
  • the Proactive Threshold Manager provides real-time threshold analysis (that is, it continuously monitors for plan thresholds that have been exceeded) using algo ⁇ thms It receives call detail records from the Server and returns alarms which may be ret ⁇ eved and examined using an NGN workstation.
  • the threshold manager resides on an NGN hyb ⁇ d network computer
  • a threshold generally is a number which, when exceeded, generates an alarm in the Proactive Threshold Manager indicating possible breach of a service level agreement Thresholds may be specified for the time of day and/or the day of the week. Furthermore, a threshold may be applied to each category for which the Proactive threshold manager keeps counts, including the number of short-duration calls, long-duration calls, and cumulative minutes When an alarm is generated by the Proactiv e Threshold Manager, it is also p ⁇ ontized The p ⁇ onty is a multiple of the number of times a threshold has been exceeded For example, if the threshold was 10 and the relevant count has reached 50, then the p ⁇ o ⁇ ty of the ala ⁇ n is 5 (50 d ⁇ v l0)
  • Each alarm is available to an NGN hyb ⁇ d network analyst ⁇ la an NGN W orkstation
  • the workstation is a PC with access to a Server and ret ⁇ eves the next available alarm of the highest p ⁇ onty
  • the analyst investigates the alarm data and, if a service level agreement breach is suspected, notifies the provider and suggests approp ⁇ ate actions to stop the breach
  • FIG 16A is a flowchart showing a Proactive Threshold Management Process 1600 in accordance with a prefe ⁇ ed embodiment of the present invention
  • the process begins with a monito ⁇ ng step 1602
  • the Proactive Threshold Manager monitors the NGN hyb ⁇ d network
  • the Proactive Threshold Manager generally monitors the network at all times to ensure proper service is provided to subscnbers of the network, by assisting service providers m maintaining a proper level of service
  • the Proactive Threshold Manager determines the minimum level of service needed to avoid breaching subsc ⁇ ber service level agreements Service level agreement information is generally provided to the Proactive Threshold Manager by the mles database which contains most pertinent subsc ⁇ ber information
  • the Proactive Threshold Manager senses the cu ⁇ ent level of service which is being provided to customers Protocol converters assist the Proactive Threshold
  • the Proactive Threshold Manager compares the cu ⁇ ent level of service, sensed in step 1606, with the minimum level of service, determined in step 1604, to determine where the cu ⁇ ent level of service is in relation to the minimum level service which needs to be provided to subscnbers
  • the Proactive Threshold Manager provides an indication or alarm to the service provider if the cu ⁇ ent level of service is within a predetermined range with respect to the mimmum level of service.
  • the threshold is preferably chosen such that the service provider is allowed enough time to cure the service level problem before the minimum service level is reached and the subscriber's service level agreement breached.
  • FIG. 16B is a flowchart showing a Network Sensing Process 1620 in accordance with one embodiment of the present invention.
  • the Network Sensing Process 1620 begins with an element monitoring step 1622.
  • custom developed element software monitors the individual network elements and generates events based on hardware occu ⁇ ences, such as switch failures.
  • hardware occu ⁇ ences such as switch failures.
  • switch failures typically, the various elements that make up the hybrid network are very different from one another.
  • custom software is generally needed for each network element or group of related network elements.
  • the custom developed software communicates directly with the hardware and generates events when various occu ⁇ ences related to the individual hardware happens. For example, when a hardware element fails, the related element software senses the failure and generates an event indicating the hardware failure and the general nature of the failure. The events are then routed to an element manger to processed.
  • events generated in step 1622 are filtered, aggregated, and co ⁇ elated by an element manager.
  • the element manager is where the primary data reduction functions reside.
  • the element manager filters, aggregates, and co ⁇ elates the events to further isolate problems within the network. Any information that is deemed critical to monitor and manage the network is translated into standard object format in a translation step 1626.
  • a translation step 1626 information from step 1624 that is deemed critical to monitor and manage the network is translated into a standard object format. Generally, typical operational events are only logged and not translated into standard object format. However, critical information, such as hardware failure, is translated and forwarded to the Information Services Manager in an information provisioning step 1628.
  • step 1628 information from step 1626 is received by the Information Services Manager and forwarded to the Proactive Threshold Manager.
  • Information Services Manager provides the data management and data communications between the element manager and other system components.
  • the Information Services Manager adheres to CORBA standards to provide universal information access by an object request broker.
  • the object request broker allows the Information Services Manager to share management information stored in distributed databases.
  • the Proactive Threshold Manager uses the information provided by the Information Services Manger to determine a cu ⁇ ent level of service and compare the cu ⁇ ent level of services with the minimum level of service that the service provider can provide without violating SLAs.
  • the element manager w orks with the Information Services Manager and the Presentation Manager to assist in the management of the hyb ⁇ d network system
  • the three components are bnefly desc ⁇ bed below to provide context for the detailed discussion of the element manager that follows
  • the element manager communicates with the network elements to receive alarms and alerts through trapping and polling techniques
  • the element manager is the la er where the p ⁇ mary data reduction functions reside
  • events received at the element manager will be filtered, aggregated and co ⁇ elated to further isolate problems within the network Information that is deemed c ⁇ tical to monitor and manage the network is translated into a standard object format and forwarded to the Information Services
  • An element manager can be, but is not necessa ⁇ ly, software which adheres to open standards such as the Simple Network Management Protocol (SNMP) and the Object Management Group ' s (OMG) Common Object Request Broker Architecture (CORBA)
  • SNMP Simple Network Management Protocol
  • OMG Object Management Group ' s
  • CORBA Common Object Request Broker Architecture
  • the information services manager provides the data management and data communications between element managers and presentation managers All information forwarded from the element managers is utilized by the information services manager to provide information to the network operators
  • the information services manager adheres to CORBA standards to provide ubiquitous information access via an object request broker (ORB)
  • ORB allows the information services manager to share management information stored m dist ⁇ ubbed databases
  • the information services manager stores c ⁇ tical management information into operational (real-time) and analytical (histo ⁇ cal) dist ⁇ ubbed databases These databases provide common data storage so that new products can be easily inserted into the management environment For example, if an event is received at an element manager that is deemed c ⁇ tical to display to a network user, the information services manager will store a copy of the alarm in the operational database and then forw ard the alarm to the approp ⁇ ate network operator.
  • the databases includes online manuals for administrative purposes, as well as for the maintenance specialists to access element specific information
  • the databases also provide procedures, policies and computer based training to network users
  • the information services manager provides requested information (real-time and histo ⁇ cal) to the network users via the presentation manager
  • the presentation manager performs the function its name implies the presentation of the information to an end user Because different locations and job functions require access to different types of information, there are at least two types of display methods The first is for graphic intensive presentations and the second is for nomadic use, such as field technicians The first environment requires a graphic intensive display, such as those provided by X-
  • the second environment is potentially bandwidth poor where dial-up or wireless access may be used along with more traditional LAN access. This is also where browser technology is employed
  • the Element Management Aspect of the present invention works in conjunction with other components of the system, such as Fault Management, to provide communication between the various network elements of the system.
  • FIG. 17 is a flowchart showing an Element Management Process 1700 in accordance with a prefe ⁇ ed embodiment of the present invention.
  • the Element Management Process 1700 begins with a monito ⁇ ng step 1702.
  • the Element Manager monitors the system for events generated by network elements.
  • the Element Manager continuously monitors the system to translate events for other system components, such as the Fault Management Component.
  • the Element Manager receives events from va ⁇ ous network elements.
  • the events are provided by custom software interfaces which communicate directly with network elements.
  • the software interfaces preferably process the raw network events and sort them by context pnor to providing the events to the Element Manager.
  • a filte ⁇ ng and co ⁇ elating step 1706 the Element Manager filters and co ⁇ elates the events received in step 1704 Preferably the co ⁇ elation is provided by a mles based inference engine
  • the Element Manager performs a translation step 1708
  • the events co ⁇ elated in step 1706 are translated into standard object format
  • a comprehensive library of all message types generated by the hyb ⁇ d system is utilized to translate the co ⁇ elated events into standard object format
  • the organization model for customer service support in the NGN network provides a single point of contact that is customer focused This single point of contact provides technical expertise m resolving customer incidents, troubles and requests Generally a three tiered support stmcture is greatly increases customer satisfaction in service needs. Each tier, or level, possess an increased level of skill, with tasks and responsibilities dist ⁇ ubbed accordingly
  • FIG 18 is a flowchart showing a Three Tiered Customer Support Process 1800 m accordance with a prefe ⁇ ed embodiment of the present invention
  • the Three Tiered Customer Support Process 1800 begins with a First Tier step 1802.
  • a customer with a hyb ⁇ d network problem is provided access to customer support personnel having a broad set of technical skills
  • the broad set of technical skills allows this group to solve about 60-70% of all hyb ⁇ d network problems. If the customers network problem is solved at this stage, the process ends However, if the customers network problem is not solved at this stage, the process continues to a Second Tier step 1804.
  • the customer is provided access to technical experts and field support personnel who may specialize m specific areas.
  • the greater specialized nature of this group allows it to solve many problems the group in step 1802 could not solve This group is generally responsible for solving 30-40% of all hyb ⁇ d network problems. If the customers network problem is solved at this stage, the process ends. However, if the customers network problem is not solved at this stage, the process continues to a Third Tier step 1806.
  • the customer is provided access to solution experts who are often hardware vendors, software vendors, or customer application development and maintenance teems.
  • Solution experts who are often hardware vendors, software vendors, or customer application development and maintenance teems.
  • Customer network problems that get this far m the customer support process 1800 need individuals possessing in-depth skills to investigate and resolve the difficult problems with there area of expertise
  • Solution experts are the last resort for solving the most difficult problems Typically this group solves about 5% of all hyb ⁇ d network problems
  • the above model is generally refe ⁇ ed to as the Skilled Model because personnel at all three tiers are highly skilled
  • This model generally creates a high percentage of calls resolved on the first call
  • Other approaches include a Functional Model, and a Bypass Model In the Functional Model users are requested to contact different areas depending on the nature of the incident Calls are routed to the customer support representative best able to handle the call
  • This model can easily be coupled with the Skill Model above In the Bypass Model First Tier only logs calls, they do not resolve calls
  • One advantage of this model is that skilled resources don't have to waste time logging calls
  • a customer calling a customer support center m is first asked a senes of questions by an interactive voice response (IVR) system or an live operator
  • IVR interactive voice response
  • the customer uses Touch-Tone keys on the telephone to respond to these quenes from the EVR, or responds normally to a live operator
  • the product support engineer can query the customer's computer via support agents for additional information, if necessary
  • the customer spends less time interacting with a product support engineer, and is relieved of many of the responsibilities in diagnosing and resolving problems Automated diagnoses and shorter customer interactions save the product support center time, resources, and money At the same time, the customer receives a better diagnosis and resolution of the problem than could usually be achieved with pnor art product support techniques
  • one embodiment of the present invention makes the Internet a viable alternative to telephone calls as a tool for providing consumer product support
  • Many on-line computer services such as Prodigy and Amenca On-Line, provide, for a fee as a part of their on-line service, software for connecting to and accessing the Internet
  • the Internet access software accesses and "handshakes" with an "Internet Entry Server", which ve ⁇ fies the PEN number, provides the access and times the user's access time
  • the Internet Entry Server is programmed to recognize the PIN number as entitling the user to a limited prepaid or "free" Intemet access time for on-line help services Such a time pe ⁇ od could be for a total time pe ⁇ od such as 1 hour or more, or access to on-line help services can be unlimited for 90 days, 6 months, etc , for example, with the access time paid for by the sponsor/vendor
  • the first time a customer uses the on-line help service the Internet Entry Server performs a registration process which includes a number of
  • the Internet Entry Server prompts the user with one or more of a plurality of options for extending the availability of online help For example, the user can be prompted to enter a credit card number to which on-line help charges can be charged, he or she can be given the opportunity to answer additional survey information in return for additional "free" on-line help, or a 900 subscnber paid telephone access number can be provided through which additional on-line help will be billed via the normal telephone company 900 billing
  • One embodiment of the present invention allows a user of a web application to communicate in an audio fashion in-band without having to pick up another telephone Users can click a button and go to a call center through a hyb ⁇ d network using IP telephony
  • the system invokes an EP telephony session simultaneously with the data session, and uses an active directory lookup whenever a person uses the system
  • FIG 19 is a flowchart showing an integrated EP telephony process 1900 in accordance with a prefe ⁇ ed embodiment of the present invention
  • the IP telephony process 1900 begins with a transmitting step 1902.
  • step 1902 data is transmitted over the hyb ⁇ d network du ⁇ ng a data session
  • This data session is typically a normal Internet browsing session, and is generally initiated by a web browser
  • users begin the data session by performing actions such as searching for web sites or downloading data from Internet sites Du ⁇ ng the data session, the present invention allows users the option to initiate phone calls without the need to use another telephone.
  • a telephony step 1904 the present invention allows users to initiate and continue telephonic communication
  • the telephonic is routed by a user action in step 1906.
  • Telephone numbers are typically included in a telephone directory accessible on screen by the user
  • the directory may include icons which provide a highly recognizable visual mnemonic to allow users to easily recall the information included in a particular directory entry
  • the present invention utilizes the routing information to direct the call.
  • the present invention can provide a seamless integration of the two, to provide virtually simultaneous telephonic and non-telephonic data communication
  • the availability of packet switching elements in the hyb ⁇ d network facilitate this process.
  • packets in the form of units of data are transmitted from a source- such as a user terminal, computer, application program within a computer, or other data handling or data communication device— to a destination, which may be simply another data handling or data communication device of the same character.
  • the devices themselves typically are refe ⁇ ed to as users, in the context of the network.
  • Blocks or frames of data are transmitted over a link along a path between nodes of the network.
  • Each block consists of a packet together with control information in the form of a header and a trailer which are added to the packet as it exits the respective node.
  • the header typically contains, in addition to the destination address field, a number of subfields such as operation code, source address, sequence number, and length code.
  • the trailer is typically a technique for generating redundancy checks, such as a cyclic redundancy code for detecting e ⁇ ors.
  • the receiving node stnps off the control information, performs the required synchronization and e ⁇ or detection, and reinserts the control information onto the departing packet.
  • Packet switching arose, in part, to fulfill the need for low cost data communications in networks developed to allow access to host computers.
  • Special purpose computers designated as communication processors have been developed to offload the communication handling tasks which were formerly required of the host.
  • the communication processor is adapted to interface with the host and to route packets along the network, consequently, such a processor is often simply called a packet switch
  • Data concentrators have also been developed to interface with hosts and to route packets along the network In essence, data concentrators serve to switch a number of lightly used links onto a smaller number of more heavily used links Thev are often used in conjunction with, and ahead of, the packet switch
  • packet-switched data transmission is accomplished via predetermined end-to-end paths through the network, in which user packets associated with a great number of users share link and switch facilities as the packets travel over the network
  • the packets may require storage at nodes between transmission links of the network until they may be forwarded along the respective outgoing link for the ov erall path
  • connectionless transmission another mode of packet-switched data transmission, no initial connection is required for a data path through the network
  • individual datagrams carrying a destination address are routed through the network from source to destination via intermediate nodes, and do not necessanly amve in the order in which they were transmitted
  • the telephonic communication over the hyb ⁇ d network is limited bases on a user profile
  • the user profile is included in a mles database
  • the mles database can provide seamless cross-location registration without the need for duplicate databases located on different networks
  • the computer used to interface with the Intemet includes multimedia equipment such as speakers and a microphone
  • the computer used to interface with the Intemet includes multimedia equipment such as speakers and a microphone Utilizing a multimedia equipped computer allows a user to use telephonic communication with little or no disruption while interfacing with the Internet Multimedia computer speakers are used to receive the telephony audio from the network and the microphone is used to transmit the telephony data to the network
  • the present invention includes data mining capability that provides the capability to analyze network management data looking for patterns and co ⁇ elations across multiple dimensions
  • the system also constmcts models of the behavior of the data in order to predict future growth or problems and facilitate managing the network in a proactive, yet cost-effective manner.
  • a technique called data mining allows a user to search large databases and to discover hidden patterns in that data.
  • Data mining is thus the efficient discovery of valuable, non-obvious information from a large collection of data and centers on the automated discovery of new facts and underlying relationships in the data.
  • the term "data mining” comes from the idea that the raw material is the business data, and the data mining algorithm is the excavator, shifting through the vast quantities of raw data looking for the valuable nuggets of business information.
  • Accurate forecasting relies heavily upon the ability to analyze large amounts of data. This task is extremely difficult because of the sheer quantity of data involved and the complexity of the analyses that must be performed. The problem is exacerbated by the fact that the data often resides in multiple databases, each database having different internal file structures.
  • FIG 20 is a flowchart showing a Data Mining Process 2000 in accordance with a prefe ⁇ ed embodiment of the present invention.
  • the Data Mining Process 2000 begins with an identifying step 2002.
  • the system identifies patterns and co ⁇ elations in the system data over the hybrid communication system.
  • the system data is analyzed across multiple dimensions to provide better future system behavior prediction.
  • a model building step 2004 the system builds a model of the network behavior based on the patterns and co ⁇ elations identified in step 2002.
  • P-?ta mining is a process that uses specific techniques to find patterns in data, allowing a user to conduct a relatively broad search of large databases for relevant information that may not be explicitly stored in the databases.
  • a user initially specifies a search phrase or strategy and the system then extracts patterns and relations co ⁇ espondmg to that strategy from the stored data
  • Such a search system permits searching across multiple databases
  • the extracted patterns and relations can be (1 ) used by the user, or data analyst, to form a prediction model, (2) used to refine an existing model, and/or (3) organized into a summary of the target database, as in predicting step 2006
  • a predicting step 2006 the system predicts future behavior of the network based on the model generated in step 2004
  • Top-down systems are also refe ⁇ ed to as "pattern validation,” “venfication-dnven data mining” and “confi ⁇ natory analysis " This is a type of analysis that allows an analyst to express a piece of knowledge, validate or validate that knowledge, and obtain the reasons for the validation or invalidation
  • the validation step in a top- down analysis requires that data refuting the knowledge as well as data supporting the knowledge be considered
  • Bottom-up systems are also refe ⁇ ed to as "data exploration"
  • Bottom- up systems discover knowledge, generally in the form of patterns, in data
  • the network is managed based on the future behavior of the network
  • Data mining involves the development of tools that analyze large databases to extract useful information from them
  • customer purchasing patterns may be denved from a large customer transaction database by analyzing its transaction records
  • Such purchasing habits can provide invaluable marketing information For example, retailers can create more effective store displays and more effective control inventory than otherwise would be possible if they know consumer purchase patterns As a further example, catalog companies can conduct more effective mass mailings if they know that, given that a consumer has purchased a first item, the same consumer can be expected, with some degree of probability, to purchase a particular second item withm a defined time pe ⁇ od after the first purchase
  • Classification of the data records to extract useful information is an essential part of data mimng
  • a classifier is generated from input data, also called a training set, which consist of multiple records. Each record is identified with a class label
  • the input data is analyzed to develop an accurate desc ⁇ ption, or model, for each class of the records
  • the classifier can then classify future records, refe ⁇ ed to as test data, for which the class labels are unknown.
  • a credit card company which has a large database on its card holders and wants to develop a profile for each customer class that will be used for accepting or rejecting future credit applicants. Assuming that the card holders have been divided into two classes, good and bad customers, based on their credit history. The problem can be solved using classification.
  • a training set consisting of customer data with the assigned classes are provided to a classifier as input.
  • the output from the classifier is a description of each class, i.e., good and bad, which then can be used to process future credit card applicants.
  • Similar applications of classification are also found in other fields such as target marketing, medical diagnosis, treatment effectiveness, and store location search.
  • Another desirable characteristic for a data mining classifier is its short training time, i.e., the ability to constmct the class descriptions from the training set quickly.
  • the methods of the invention are based on a decision-tree classifier.
  • Decision trees are highly developed techniques for partitioning data samples into a set of covering decision mles. They are compact and have the additional advantage that they can be converted into simple classification mles. In addition, they can be easily converted into Stmctured Query language (SQL) statements used for accessing databases, and achieve comparable or better classification accuracy than other classification methods.
  • SQL Stmctured Query language
  • Another data mining classifier technique solves the memory constraint problem and simultaneously improve execution time by partitioning the data into subsets that fit in the memory and developing classifiers for the subsets in parallel. The output of the classifiers are then combined using various algorithms to obtain the final classification. This approach reduces running time significantly. Another method classifies data in batches.

Abstract

According to a broad aspect of a preferred embodiment of the invention, telephone calls, data and other multimedia information is routed through a hybrid network which includes transfer of information across the internet utilizing telephony routing information and internet protocol address information. The hybrid network includes a Proactive Threshold Manager which forewarns service providers of an impending breach of contract. The Proactive Threshold Manager sends an alarm to the service provider when the current level of service will miss a service level agreement to maintain a certain level of service.

Description

SYSTEM AND METHOD FOR PROACTIVE PERFORMANCE MANAGEMENT IN A HYBRID COMMUNICAΗON SYSTEM
FIELD OF THE INVENTION
The present invention relates to hybrid communication networks and more particularly to proactive service level threshold management in a hybrid communication network.
BACKGROUND OF INVENTION
The current telecommunication service providers' networks reflect the architecture of the PSTN network as it has evolved over the last 100 years. This is largely based on circuit switched technologies. Initially, all telecommunication services were offered via a wired infrastructure. As the user-base increased and requirements changed over the last few decades, new types of services were created e.g. wireless PSTN, cable video, multi-service (PSTN, video, satellite). The networks that supported these services were created as parallel networks, along-side the existing PSTN network. As technologies matured, there was some convergence (e.g. they shared the same SONET backbone) in the network architecture. During the late 1980s, with the explosion of data networking and Internet, data networking networks like frame relay and ATM were developed, and later large internet based data networks were constructed in parallel with the existing PSTN infrastructure. These data networks again shared the PSTN infrastructure only at the SONET backbone layer. This state of current networks is called the existing "Core". Thus the "Core" network is a set of parallel networks; PSTN, wireless, satellite, cable, ATM, frame relay, IP. There is some interoperability between the services on these parallel network
(e.g. PSTN, and wireless), but generally these networks are vertically integrated to provide distinct set of non-interoperable services.
SUMMARY OF INVENTION
According to a broad aspect of a preferred embodiment of the invention, telephone calls, data and other multimedia information is routed through a hybπd network which includes transfer of information across the internet utilizing telephony routing information and internet protocol address information The hybπd network includes a Proactn e Threshold Manager which forewarns service providers of an impending breach of contract The Proactive Threshold Manager sends an alarm to the service provider when the current level of service will miss a service level agreement to maintain a certain level of service
DESCRIPTION OF THE DRAWINGS
The foregoing and other objects, aspects and advantages are better understood from the following detailed descπption of a preferred embodiment of the invention with reference to the drawings, in which
Figure 1A is a block diagram of an exemplary telecommunications system in accordance with a preferred embodiment,
Figure IB shows a block diagram of the Network Data Management in accordance with a preferred embodiment,
Figure 1B-1 is a flowchart illustrating a Network Data Management process m accordance with a preferred embodiment,
Figure IC shows a block diagram of the Customer Interface Management Process in accordance with a preferred embodiment,
Figure lC-1 is a flowchart illustrating a Customer Interface Management Process in accordance with a preferred embodiment,
Figure ID shows a block diagram of the Customer Qua tv of Service Management Process in accordance with a preferred embodiment,
Figure 1D-1 is a flowchart illustrating a Customer Quality of Service Management Process in accordance with a preferred embodiment,
Figure IE shows a block diagram of the Service Quality Management in accordance with a preferred embodiment,
Figure 1E-1 is a flowchart illustrating a Service Quality Management Process in accordance with a preferred embodiment,
Figure IF shows a block diagram of the Problem Handling Process in accordance with a preferred embodiment,
Figure 1F-1 is a flowchart illustrating a Problem Handling Management Process m accordance with a preferred embodiment.
Figure 1G shows a block diagram of the Rating and Discounting Process in accordance with a preferred embodiment,
Figure 1G-1 is a flowchart illustrating Rating and Discounting Process accordance with a preferred embodiment,
Figure 1H shows a block diagram of the Invoice and Collections Process in accordance with a preferred embodiment,
Figure 1H-1 is a flowchart illustrating an Invoice and Collections Process in accordance with a preferred embodiment,
Figure 2A is a flowchart showing illustrating media communication over a hybπd network in accordance with a preferred embodiment,
Figure 2B is a block diagram of an exemplary computer system in accordance with a preferred embodiment.
Figure 3 illustrates the CDR and PNR call record formats in accordance with a preferred embodiment,
Figures 4(A) and 4(B) collectively illustrate the ECDR and EPNR call record formats in accordance with a preferred embodiment,
Figure 5 illustrates the OSR and POSR call record formats in accordance with a preferred embodiment,
Figures 6(A) and 6(B) collectively illustrate the EOSR and EPOSR call record formats in accordance with a preferred embodiment, Figure 7 illustrates the SER call record format in accordance with a preferred embodiment;
Figures 8(A) and 8(B) are control flow diagrams illustrating the conditions under which a switch uses the expanded record format in accordance with a preferred embodiment;
Figure 9 is a control flow diagram illustrating the Change Time command in accordance with a preferred embodiment;
Figure 10 is a control flow diagram illustrating the Change Daylight Savings Time command in accordance with a preferred embodiment;
Figure 11 is a control flow diagram illustrating the Network Call Identifier (NCID) switch call processing in accordance with a preferred embodiment;
Figure 12 is a control flow diagram illustrating the processing of a received Network Call
Identifier in accordance with a preferred embodiment;
Figure 13(A) is a control flow diagram illustrating the generation of a Network Call Identifier in accordance with a preferred embodiment;
Figure 13(B) is a control flow diagram illustrating the addition of a Network Call Identifier to a call record in accordance with a preferred embodiment; and
Figure 14 is a control flow diagram illustrating the transport of a call in accordance with a preferred embodiment;
Figure 15A is a flowchart showing a Fault Management Process in accordance with a preferred embodiment of the present invention;
Figure 15B is a block diagram showing a Fault Management component in accordance with a preferred embodiment of the present invention;
Figure 16A is a flowchart showing a Proactive Threshold Management Process in accordance with a preferred embodiment of the present invention; Figure 16B is a flowchart showing a Network Sensing Process in accordance with one embodiment of the present invention,
Figure 17 is a flowchart showing an Element Management Process in accordance with a preferred embodiment of the present invention,
Figure 18 is a flowchart showing a three tiered customer support process in accordance with a preferred embodiment of the present invention,
Figure 19 is a flowchart showing an integrated IP telephony process in accordance with a preferred embodiment of the present invention, and
Figure 20 is a flowchart showing a Data Mining Process in accordance with a preferred embodiment of the present invention
Detailed Description
The following table is used to clarify terms used in the detailed description of the invention.
AAA Authentication, Authorization, Addressing
ADSL Asymmetric Digital Subscriber Line
AIN Advanced Intelligent Networks
AMA Automatic Message Accounting
ATM Asynchronous Transfer Mode
BIM Business Integration Methodology
BSS Business Support System
CDR Call Detail Record
DTMF Dual-Tone Multi-Frequency
GSM Global System for Mobile Communications
IN Intelligent Network
IP Internet Protocol
JPEP Joint Picture Expert Group
LMDS Local Multi-Point Distribution Service
MPEG Moving Picture Expert Group
NGN Next Generation Network
OSS Operational Support Systems
PCM Pulse Code Modulation
PSTN Public Switched Telephone Network
QoS Quality of Service
RAS Remote Access Server
SCE Service Creation Environment
SCP Service Control Point
SMDS Switched Multi Megabit Data Service
SSP Service Switching Point
SONET Synchronous Optical Network
STP Service Transfer Point
TCP Transmission Control Protocol xDSL Generic name for Digital Subscriber Line
(D)WDM (Dense) Wave Division Multiplexing
Data networks today rely heavily on shared medium, packet-based LAN technologies for both access and backbone connections. The use of packet switching systems, such as bridges and routers, to connect these LANs into global internets is now widespread. An internet router must be capable of processing packets based on many different protocols, including IP, IPX, DECNET, AppleTALK, OSI, SNA and others. The complexities of building networks capable of switching packets around the world using these different protocols is challenging to both vendors and users. Standards-based LAN systems work reasonably well at transfer rates up to about 100 Mbps. At transfer rates above 100 Mbps, providing the processing power required b> a packet switch interconnecting a group of networks becomes economically unrealistic for the performance levels desired. This inability to economically "scale up" performance is beginning to cause restπctions in some user's planned network expansions Also, today's data networks do not provide network managers with enough control over bandwidth allocation and user access.
Tomorrow's networks are expected to support "multimedia" applications vv ith their much greater bandwidth and real-time delivery requirements The next generation networks should also have the ability to dynamically reconfigure the network so that it can guarantee a predetermined amount of bandwidth for the requested quality of service (QOS) This includes providing access, performance, fault tolerance and secuπty between any specified set of end systems as directed by the network's manager The concept is to provide network managers with complete "command and control" over the entire network's infrastructure— not just tell them when a failure has occurred.
A new set of technologies known as asynchronous transfer mode (ATM) may provide the best., long-term solution for implementing the requirements of both pπvate and public internets. ATM promises to provide a more economical and scalable set of technologies for implementing the ultra-high-performance information networks that will be required to provide the quality of service users will demand. Thus, over the next 20 years, the network infrastructure may change from packet-based standards to one based on ATM cell switching. While changes in the accompanying network will be dramatic, it would be desirable for users making the transition to be able to retain their most recent equipment investment.
Another expected change in tomorrow's networks is a change in data flow. Data flow in today's network typically follows the client-server computing model. This is where many clients are all transferring data into and out of one or more network servers. Clients do not normally talk to each other; they share data by using the server. While this type of data exchange will continue, much more of the information flow in tomorrow's networks will be peer-to-peer. Since the ultimate goal is a truly distributed computing environment where all systems act as both the client and server, more of the data flow will follow a peer-to-peer model. The network will be required to provide more direct access to all peers wishing to use high-performance backbone internets connecting, for example, the desktop computers. The bulk of information transported in the future will be of digital oπgin This digital information will require a great deal more bandwidth than today's separate voice, fax, and SNA networks which operate with acceptable performance using voice grade telephone lines Voice will shπnk as a percentage of total traffic, while other forms of information including image and video will greatly increase Even when compressing is available, the bandwidth requirements for both inside and outside building networks will need to be greatly expanded
Text files and images can be sent over existing packet-based networks because the delivery of this information is not time cπtical The new traffic (voice and video) is delivery time sensitive— vaπable or excessive latency will degrade the quality of service and can render this information worthless
The usefulness of packet switching networks for the transmission of digital information, particularly burst type information, has long been recognized Such networks are generally pomt- to-pomt m nature m that a packet from a single source is directed to a single destination by an address attached to the packet The network responds to the packet address by connecting the packet to the appropπate destination
Packet switching networks are also used which combine burst type data with the more continuous types of information such as voice, high quality audio, and motion video
Commercialization of voice, video and audio transmission makes it desirable to be able to connect packets to multiple destinations, called packet broadcasting For example, a broadcast video service such as pay-per-view television involves a single source of video packets, each of which is directed to multiple video receivers Similarly, conferencing capabilities for voice communication also require single source to multiple destination transmission
One pπor packet broadcast arrangement compπses a network consisting of a packet duplication arrangement followed by a packet routing arrangement As a broadcast packet enters this network, packet copies are made in the packet duplicating arrangement until as many copies exist as there are destinations for the packet. A translation table look up is then performed at the duplication arrangement outputs for each of the packet copies to provide a different, single destination address for each copy. All of the packet copies with their new packet addresses are then applied to the packet routing arrangement, which connects them to the appropπate network output ports In packet switching networks, packets in the form of units of data are transmitted from a source- such as a user terminal, computer, application program within a computer, or other data handling or data communication device-to a destination, which may be simply another data handling or data communication device of the same character The devices themselves typically are referred to as users, in the context of the network Blocks or frames of data are transmitted over a link along a path between nodes of the network Each block consists of a packet together with control information in the form of a header and a trailer which are added to the packet as it exits the respective node The header typically contains, in addition to the destination address field, a number of subfields such as operation code, source address, sequence number, and length code
The trailer is typically a technique for generating redundancy checks, such as a cyclic redundancy code for detecting errors At the other end of the link, the receiving node stπps off the control information, performs the required synchronization and error detection, and reinserts the control information onto the departing packet
Packet switching arose, in part, to fulfill the need for low cost data communications in networks developed to allow access to host computers Special purpose computers designated as communication processors have been developed to offload the communication handling tasks which were formerly required of the host The communication processor is adapted to interface with the host and to route packets along the network, consequently, such a processor is often simply called a packet switch Data concentrators have also been developed to interface with hosts and to route packets along the network In essence, data concentrators serve to switch a number of lightly used links onto a smaller number of more heavily used links They are often used in conjunction with, and ahead of, the packet switch
In virtual circuit (VC) or connection-oπented transmission, packet-switched data transmission is accomplished via predetermined end-to-end paths through the network, in which user packets associated with a great number of users share link and switch facilities as the packets travel over the network The packets may require storage at nodes between transmission links of the network until they may be forwarded along the respective outgoing link for the overall path. In connectionless transmission, another mode of packet-switched data transmission, no initial connection is required for a data path through the network. In this mode, individual datagrams carrying a destination address are routed through the network from source to destination via intermediate nodes, and do not necessaπly arπve in the order m which they were transmitted The widely-used Telenet public packet switching network routes data using a two-level hierarchy. The hierarchy compπses a long distance-spanning backbone network with a multiplicity of nodes or hubs, each of which utilizes a cluster of backbone switches, and smaller geographic area networks with backbone trunks, access lines and clustered lower level switches connected to each hub Packet-switched data is transmitted through the network via VCs, using CCITT (International Telegraph and Telephone Consultative Committee of the International Telecommunications Union) X.75 protocol, which is a compatible enhancement of X.25 protocol.
For a communication session to proceed between the parties to a connection, it is essential that data be presented in a form that can be recognized and manipulated The sequence of required tasks at each end, such as the format of the data delivered to a party, the rate of delivery of the data, and resequencmg of packets received out of order, is generally handled in an organized manner using layered communication architectures. Such architectures address the two portions of the communications problem, one being that the delivery of data by an end user to the communication network should be such that the data arπving at the destination is correct and timely, and the other being that the delivered data must be recognizable and in proper form for use. These two portions are handled by protocols, or standard conventions for communication intelligently, the first by network protocols and the second by higher level protocols. Each of these protocols has a seπes of layers. Examples of layered architectures include the Systems
Network Architecture (SNA) developed by IBM, and the subsequently developed Open Systems Interconnection (OSI) reference model. The latter has seven layers, three of which are network services oπented including physical, data link, and network layers, and the other four providing services to the end user by means of transport, session, presentation, and application layers, from lowest to highest layer
X.25 is an interface organized as a three-layered architecture for connecting data terminals, computers, and other user systems or devices, generally refereed to as data terminal equipment (DTE), to a packet-switched network through data circuit terminating equipment (DCE) utilized to control the DTE's access to the network. The three layers of the X.25 interface architecture are the physical level, the frame level and the packet level. Although data communication between DCEs of the network is routinely handled by the network operator typically using techniques other than X.25, communication between the individual user system and the respective DCE with which it interfaces to the network is governed by the X.25 or similar protocol. In essence, X.25 establishes procedures for congestion control among users, as well as call setup (or connect) and call clearing (or disconnect) for individual users, handling of errors, and vaπous other packet transmission services within the DTE-DCE interface.
X.25 is employed for virtual circuit (VC) connections, including the call setup, data transfer, and call clearing phases. Call setup between DTEs connected to the network is established by one
DTE issuing an X.25 call-request packet to the related DCE, the packet containing the channel number for the logical connections, the calling and called DTE addresses, parameters specifying the call characteristics, and the data. The destination DCE issues an incoming call packet, which is of the same general format as the call-request packet, to the destination DTE, the latter replying with a call-accepted packet. In response, the calling DCE issues a call-connected packet to its related DTE. At that point the call is established and the data transfer phase may begin by delivery of data packets. When the call is compared, i.e., the session is to end. a call-clearing procedure is initiated.
Prospective routing paths in the network are initially determined by a network control center, which then transmits these predetermined paths to the backbone switches as routing tables consisting of primary and secondary choices of available links from each hub. The secondary choices are viable only in the event of primary link failures, and the specific secondary link selection is a local decision at the respective hub based principally on current or recent traffic congestion patterns. The unavailability of an outgoing link from a hub at the time of the call setup effects a clearing back of the VC for the sought call to the preceding hub. An alternative link is then selected by that hub, or, if none is available there, the VC circuit is again cleared back to the next preceding hub, and so forth, until an available path is uncovered from the routing tables. Messages concerning link and/or hub failures are communicated immediately to the network control center, and that information is dispatched to the rest of the network by the center.
In typical present-day concentrators and packet switches, the data processing devices reside in a plurality of cards or boards containing printed circuits or integrated circuits for performing the various functions of the respective device in combination with the system software. Typically, the cards are inserted into designated slots in cages within a console, with backplane access to a data bus for communication with one another or to other devices in the network. The VME bus is presently the most popular 16/32-bit backplane bus. References from time to time herein to cards or boards will be understood to mean the various devices embodied in such cards or boards. Many public data networks (PDNs) offer little or no secuπty for communications between users and hosts or other data processing devices within the network, in keeping with the "public purpose" of the network and the desire for accessibility by a large number of actual and prospective users Where restπctions on access are necessary or desirable, it is customary to assign each authoπzed user an identification (ID) number or a password, or both, which must be used to gam access to the host More elaborate secuπty measures are necessary where access may be had to highly confidential data
Some data communication networks involve a vaπety of different customers each of whom makes available a host and one or more databases to its users, and may place a level of secuπty on its database which differs from the level placed by other customers on their respective hosts and databases In those instances, it is customary to make the host responsible for secuπty and access to itself and its associated database Thus, a user might have access to certain destinations in the network without restπction, but no access to other destinations
Market Drivers
According to Yankee Group Research, network management costs continue to increase, with network managers spending an average of 45 percent of their budget on ongoing network management, 20 percent on equipment, and 35 percent on network transport services It is a constant battle to reduce these costs yet somehow improve overall service to their customers
Reducing overall network management costs can be very difficult in today's business environment Networks continue to become more complex, with more and more demands being placed on the network managers and planners For example, the exponential growth of remote access has made their jobs more difficult, as the requirement to establish and manage connections for remote offices and telecommuters is often required without additional personnel or budget resources Unfortunately, network managers and planners spend so much time in "firefighting" mode, trying to support their complex networks, that very little time is actually spent planning for network growth and enhancements Combined with this is the fact that it is becoming difficult to keep highly skilled employees given the demand for certain skills in the marketplace, and the premiums that will be paid for those skills So, what is a network manager to do9 More and more, they are looking outside for help
The market for customer network management services is generally referred to as Managed Networked Services (MNS) Yankee Group estimates this market will estimated to grow from $3B to 9B within the next three years. MNS became the focus of service providers in 1995 as they saw revenues for frame relay network services double for two years in a row. What began as a way to boost the popularity of frame relay services by offering to lease and manage routers has blossomed into a diverse set of services that are now closer to those associated with outsourcing. Yankee Group research shows that 37 percent of Fortune 1000 managers are already outsourcing or plan to outsource their ongoing network operations management. In addition, it is the communications provider that is thought of as the most likely provider for one-stop shopping services.
The present invention's overall approach to implementing the NM/MNS market offering is two fold. The cuπent opportunity that presents itself is MNS. While this market opportunity for clients is large, they need assistance in understanding data network management - for years they have been solely focused on voice. Additionally, they need to move into this market quickly in order to maintain and grow revenue. To this end, the present invention includes a set of assets consisting pπmarily of job aids and software that can greatly reduce our clients lead time for service implementation.
Secondly, the present invention assists service providers by providing them the tools to better manage their carrier data networks - the packet switched networks of the future. The present invention significantly enhances and scales MNS assets to address carrier network management in a data networking world. This solution template enables the convergence of circuit and packet switching network control centers and workforces.
The present invention's market offering suggests companies take a graduated approach to delivering MNS. One end of the continuum consists of MNS for current network services, including leased lines, frame relay, and X.25. On the far end is outsourced MNS characterized by long-term contracts, involving hundreds of millions of dollars. The NM/MNS market offering is proposing our clients go beyond the management of the router and the WAN, and into the world of the local area network (LAN), even as far as the desktop and business applications. Service providers have been intimidated by these propositions in the past, since management of the LAN and its equipment and applications has clearly not been their forte.
It is hard to describe a typical MNS engagement because this is such a new. There are three "entry points" in which the present invention can become involved in helping our companies to move into the MNS market: Business Strategy - Companies may look to the present invention for assistance in creating a business strategy for enteπng the MNS market Typically, this type of engagement will defines a company's target market for MNS (small, mid-market, large) and defines the service offeπngs that are best suited for the company to offer These engagements will be followed by analysis, design and implementation projects
Requirements Analysis - Companies may already have developed a concrete business strategy that defines which services they will offer within markets In this case, the present invention's work will begin by helping define the company's network environment requirements This work will be followed by design and implementation projects
Design and Implementation - Companies may be ready to move to the design and implementation phases of creating an MNS capability Generally, the present invention will confirm that their network meets the requirements to provide the service, then assist the client m the designing and implementing an appropπate solution suite
In an effort to clearly communicate exactly how we define NM/MNS we have created an online catalog of services The present invention's solution is a continuous cycle that begins with the four major processes associated with NM MNS These processes dπve the technology and the people components of the solution Within each of these processes are a number of core functions and sub-functions The MNS Online Catalog contains all of this information, including the supporting process, technology and organizational solutions for each function
Our solution is called the Managed Networked Services Integrated Solution (MNSIS) and has been developed using an approach which integrates Process, Technology, and People considerations
Process
At the highest level, there are four major processes that must be performed to manage any network:
• Service Planning
• Managing Change • Operations Management
• Service Management
Each process should be performed in order to provide a complete NM/MNS solution As mentioned above, each process has a number of associated functions and sub-functions that provide the complete picture of the process The major functions associated with each process are as follows
Technology
The main goal of the technology solution is to provide access to network information to make informed decisions The present invention includes three layers of management element management, information services management and presentation management Every action starts with an incident Processing is tailored to handling the incident with technology that responds to the unique characteπstics of each incident
Element Manager
The element manager communicates with the network elements to receive alarms and alerts through trapping and polling techniques The element manager is the layer where the pπmary data reduction functions reside At this layer, events received at the element manager will be filtered, aggregated and correlated to further isolate problems within the network Information that is deemed cπtical to monitor and manage the network is translated into a standard object format and forwarded to the Information Services
Manager An element manager can be, but is not necessaπly, software which adheres to open standards such as the Simple Network Management Protocol (SNMP) and the Object Management Group's (OMG) Common Object Request Broker Architecture (CORBA)
Information Services Manager
The information services manager provides the data management and data communications between element managers and presentation managers All information forwarded from the element managers is utilized by the information services manager to provide information to the network operators The information services manager adheres to CORBA standards to provide ubiquitous information access via an Object Request Broker (ORB) The ORB allows the information sen. ices manager to share management information stored in distπbuted databases
The information services manager stores cπtical management information into operational (real-time) and analytical (histoπcal) distπbuted databases These databases provide common data storage so that new products can be easily inserted into the management environment For example, if an event is received at an element manager that is deemed cπtical to display to a network user, the information services manager will store a copy of the alarm in the operational database and then forward the alarm to the appropπate network operator
Media and textual databases are also provided by the information services manager The databases includes online manuals for administrative purposes, as well as for the maintenance specialists to access element specific information The databases also provide procedures, policies and computer based training to network users
The information services manager provides requested information (real-time and histoπcal) to the network users via the presentation manager
Presentation Manager
The presentation manager performs the function its name implies the presentation of the information to an end user Because different locations and job functions require access to different types of information, there are at least two types of display methods The first is for graphic intensive presentations and the second is for nomadic use, such as field technicians The first environment requires a graphic intensive display, such as those provided by X-Wmdows/MOTIF The second environment is potentially bandwidth poor where dial-up or wireless access may be used along with more traditional LAN access
This is also where browser technology is employed
People
The people vision for the NM/MNS include an organization model for customer service support, the corresponding roles and responsibilities for this organization model and a conceptual design for workforce transformation to packet switching Customer Service Support
Customer service support provides a single point of contact that is customer focused This single point of contact provides technical expertise in resolving customer incidents, troubles and requests Generally a three tiered support structure is optimal for satisfying customer service needs Each tier, or level, possesses an increasing level of skill, with tasks and responsibilities distπbuted accordingly Such a structure is as follo s
Tier 1 - typically has a broad set of technical skills and is the first level of support to the customer Typically this group is responsible for resolving 60-70 percent of the opened problems
Tier 2 - are technical experts and field support personnel who may specialize in specific areas Typically this group is responsible for resolving 30-40 percent of the opened problems
Tier 3 - are considered solution experts and often consist of hardware vendors, software vendors or custom application development / maintenance teams (m- depth skills needed to investigate and resolve difficult problems within their area of expertise) They are the last resort for solving the most difficult problems Typically this group is responsible for resolving 5 percent or fewer of the opened problems
The above model is generally referred to as the Skilled Model because personnel at all three tiers are highly skilled This model generally creates a high percentage of calls resolved on the first call Other approaches include
Functional Model
In this model, users are requested to contact different areas (via VRU) depending on the nature of the incident Calls are routed to the customer support representative best able to handle the call This model can easily be coupled with the Skilled Model, and has been at previous client engagements
Bypass Model In this model. Tier 1 only logs calls, they do not resoh e calls One advantage of this model is that skilled resources don't have to waste time logging calls
Software and Assets
Managed Networked Sewices Integrated Solution- The integrated network management solution template consists of a suite of best of breed third party software products that automate problem diagnosis, notification, custom-developed reporting, and IP services monitoπng This solution template is a great first step in realizing our technology solution vision
Web-Based SLA Reporting Tool - is a browser based tool that pro\ ides the personalized SLA reports to customers in both a template and ad-hoc format
Data Mining Demonstration — Provides the capability to analyze network management data looking for patterns and correlations across multiple dimensions Build models of the behavior of the data in order to predict future growth or problems and facilitate managing the network in a proactive, yet cost-effective manner
Customer to Event Mapping Module - Add-on module to the Managed Networked
Services Integrated Solution which maps network element events, to service offeπngs, to customers This tool allows the Customer Service Representative to proactively address network outages with customers
Process Definitions and Functions
Service Planning
Service Planning includes both the strategic and tactical planning required to manage distπbuted environments effectively Although most planning typically occurs duπng rollout of the system, certain planning activities must otherwise take place Service Planning ensures that change can be successfully controlled and implemented
• Service Management Planning
• Operations Management Planning
• Managing Change Planning
• Strategic Planning Managing Change
Includes processes and procedures for handling necessary changes to systems or the organization in a distπbuted environment
• Change Control
• Testing
• Implementing
• Software Distπbution
Operations Management
Systems Management consists of the day-to-day operational functions required to maintain the system (e g fault detection / correction, secuπty management and performance management)
• Production Control
• Monitoπng and Control
• Fault Management
• Secuπty Management
Service Management
Service Management controls the overall service to the users of the system It isolates users from how the system is managed, and ensures that users receive the quality support services they need to carry out their daily business activities
• SLA/OLA Management
• Help Desk
• Quality Management • Billing and Accounting
The present invention includes a system, method, and article of manufacture for providing a hybπd circuit switched/packet switched network This hybπd network is used as a transitiomng network to transition from old "Core" network architectures to "New Core" networks In the present descπption, the details of the NGN transitiomng network will first be set forth after which details relating to specific billing aspects of the present invention will be descπbed
PSTN, wireless, and cable networks have continued to grow at their organic rates determined by the growth of the vertical services they w ere providing In the beginning, the data networks used a small portion of the backbone SONET bandwidth, while PSTN was still the dominant bandwidth user Due to the exponential growth in IP traffic, the IP based data networks are soon slated to utilize more bandwidth than the PSTN Also huge technical advances in packet technologies have made it possible to carry traditional voice over IP networks This has started a move towards the "Next Generation Network (NGN)" where there will be more shaπng of common network infrastructure to provide services, and these services will start to become more interoperable The main thrust of technologies in the "NGN" will be to provide interoperability between the new packet based infrastructure and existing legacy infrastructures Due to the large investments made in the legacy infrastructure, they will continue to exist for some time, but most new innovations will occur on the packet based infrastructure Slowly, the parallel networks that were created to serve distinct services will merge to use a common packet based backbone and only differ in how access is provided (wire-line, wireless, cable, satellite) The "NGN" is a transition network which will exist duπng the transformation from the current "Core" to the "New Core"
As packet technologies continue to develop rapidly, it will be possible to support what was once a distinct set of services (voice, video, wireless) on separate parallel networks, on one integrated packet based network There will still be separate access technologies (wireless, satellite, cable, wire-lme) to access these services, but the access networks will all use a common "New Core" network and its capabilities The services will be interoperable across vaπous access technologies, and users will freely use services that cross many access technologies, e.g wireless to cable phone services, web browsing from wireless devices etc The present invention maps a course for the network evolution from circuit to packet switched technology using a migratory approach in which the network becomes a hybπd circuit and packet topology o\ er a 3 to 7 year peπod
Next, the network architecture for the wire-line network as it transforms from "Core" to "NGN" to "New Core" will be descπbed Followed by architecture for cable, wireless and satellite based access networks
The Wire-line Network Architecture
"Core" Network Architecture
The current wire-line "Core" network consists of parallel PSTN, SMDS. ATM, Frame-Relay B/PRI and IP networks The PSTN network has been evolving o\ er the last century and is a mix of old and new circuit switched technologies The PSTN network mainly provides point-to-point interactive two-way voice communication services The service set has evolved to include many intelligent network (IN) service features Duπng the late 1980s, Advanced Intelligent Networks (AIN) emerged as the architecture to support new voice based services on the PSTN infrastructure IN requirements and architecture in the current "Core"
The major IN requirements include session establishment, advanced call processing, call routing and call treatment (network messages and call termination) Examples of applications and features are the CLASS family of services (Call waiting, Call forwarding, Conference calling, Call rejection), enhanced call routing. Number Portability, Calling Card Services, and Audio delivered Information Services (e g travel, stocks and weather)
These IN capabilities are enabled by devices such as SCP, STP, SSP and EIP m the AIN environment These devices participate in the execution and completion of an IN service In order to develop, test and launch new IN service applications on the above mentioned components, service providers deploy Service Creation Environment (SCE) platforms, which provide an environment to quickly create new IN services These SCE platforms are closely tied to the runtime environment and therefore with very few exceptions become a major undertaking and a complex coordination effort to launch a new or modified IN service in the "Core" network environment
Data networks m the "Core" While the PSTN was grow ing in feature functionality as well as traffic demand, new data networks have been created to support the mter-networking of computing devices These data networks provide interconnection to geographically dispersed computing devices at varying levels of transmission bandwidth (e g 56/64K, T-l/E-1 , T-3/E-3, OC-3/STM-1 ) The data networks consist of many technologies e g SMDS, ATM, frame-relay and IP
In some cases, these data networks themselves are parallel net orks, m other cases, they share a common technology in the backbone (e g ATM can be the backbone for frame relay and IP data networks) These data networks share the same SONET based backbone with the PSTN network The services on the PSTN and the data networks are very distinct and non-interoperable (example voice versus web access)
With the rapid explosion of the internet, and innovation in packet based technologies, the IP based data network has become the dominant network in terms of user traffic, and its growth is slated to continue exponentially This phenomenon has created a dilemma for traffic planners and engineers of the Core network They have seen traffic grow on the access portions of their networks (PSTN) but have realized very little financial benefits from this usage because third party service providers have been the termination point of these internet data users The incumbents have began to devise intelligent network solutions for this data traffic (example RAS with SS7 gateway) in order to solve two major challenges 1) off loading data traffic from the voice infrastructure to alleviate the congestion issues that face traditional voice customers and 2) collecting revenues from the third party data services providers (ISP's) for access and routing callers to their Points Of Presence
Due to the high growth in IP and other data services, many new service providers have emerged that are building only IP based data networks, and provide only IP based data services Their business strategy is to continue to πde the technological innovation of IP and packet based technologies and build complete suites of services on a packet based infrastructure Because they are investing in only one form of network (as opposed to many parallel networks ), their unit cost of services is low, they are not encumbered by legacy networks and systems, and they can provide cheaper and better services to customers, hence they pose a significant threat to incumbent telecom service providers "Next Generation Network" Architecture
As packet based technologies continue to develop and provide the services that were only available on other networks (e g PSTN, cable), and new (green field) service providers continue to exploit their advantage, it has become necessarv for many incumbent service providers to transition their "Core network to the "Next Generation Network", where they can share the rapid technical advantages of packet technologies, and improve their cost structure, and at the same time offer new services on the "Next Generation Network" New IP based services in the "NGN"
While there are components in the NGN that ensure interoperability between "NGN" and PSTN, there are also a huge new set of new services that are built entirely on the NGN components which is provide feature πch multimedia (voice, video, data) based communication services as well as enabling many E-Commerce services enabled by IP technologies These components (descπbed later in detail) include directoπes, policies, user authentication, registration, and encryption These components enable services like integrated messaging, multimedia conversations, on-demand multi-point conference, enhanced secuπty & authentication, vaπous classes of media transport services, numerous automations in electronic internet commerce activities e g banking, shopping, customer care, education, etc As the NGN matures third party value added service providers will develop IP based services that will combine applications such as electronic commerce (procurement warehousing, distribution and fulfillment) as well as online banking to present the consumer with an integrated boundless shopping expeπence Growth of bandwidth in the "NGN" In addition to new service features, the NGN also employs the use of new wire-line broadband access technologies, notably xDSL Traditional wire-lme access technologies will continue to be deployed at higher and higher speeds, wire-lme access will move from predominantly T-l speeds to T-3 and OC-n speeds These new broadband access technologies will increase the need for higher bandwidth in "NGN" core The "NGN" core continues to use a SONET backbone, but will gradually move to using (D)WDM technologies to provide the bandwidth required to support broadband access
New and emerging technologies such as Giga-Bit Ethernet and Wire Speed IP may find their way to the network backbone, but not until Giga-bit Ethernet technology matures to handle a wide array of network services such as connection oπented circuit emulation
The use of Wire Speed IP technology is suitable for an enterpπse network but lacks the robustness and scalability needed for earner grade backbones. For this reason, there will always be a need for ATM in the backbone The architecture in the "NGN" provides seamless interoperability of services between the packet based network and the traditional PSTN New "NGN" packet based capabilities will be developed to support AIN type features, while inter-operating with legacy PSTN/SS7/AIN Large scale innovation in the IP based IN type capabilities (e g global number transparency, utilization of web based information, πch media communications) will create new services for IP enabled communication devices Innovations on the PSTN will occur slowly, and may be restπcted to maintaining interoperability of legacy PSTN with "NGN" In many cases, legacy PSTN components (e g SSP, SCP) will continue to evolve so that they can use common IP based packet switching technologies (e g IP, TCP, UDP), as opposed to using existing circuit switched technologies (e g
MTP) requirements and architecture in the Next Generation Network (NGN)
Given the huge revenues and global nature of PSTN services, as well as their use of SS7 and AIN technologies, components that allow interoperability between "NGN" and PSTN will need to be developed These will include IP/PSTN Gateways, IP/PSTN address translators, IP/SS7 Gateways, IP enabled SSP's, and IP based Intelligent Peπpherals In addition to IN enablers, new components (as will be descπbe later) with features like directories, policies, user authentication, registration, session encryption, etc will also be developed to enhance the IN capabilities The NGN- IN enablers will provide the next level of intelligence in order to address communication over mixed media types, control of multiple session characteπstics, collaborative communications needs, ubiquitous network access, "any to any" communications, and multimedia delivered information services Note that these "NGN" components will continue to evolve to provide similar and enhanced capabilities in the "New Core"
The following provides a descπption of new components in the "NGN" and the "New Core" that provide enhanced IP based services The Intelligent IP (I2P) Network enablers are categoπzed as follows
Session Control (Bandwidth, Switching and Routing) - Media Control (Call Treatment such as media conversion )
Policy Management (Directory, Access control, Secuπty ) Bandwidth Management (Transport and real time restoration)
The components for the "NGN" are descπbed as individual functional units but may be combined for practicality on individual network devices as the requirements dictate These components have been designed to operate in a distπbuted network environment to increase the flexibility of the NGN and New Core The architecture provides a robust, secure and isolated messaging infrastructure for dehveπng control plane information to these devices
This infrastructure includes a well defined message set for accessing the functions that are provided by these components and data that resides in the rules database The control plane architecture is efficient and has a unique mechanism for shaπng service, user and control data without duplication This permits mobile NGN service users to maintain the same expeπence and have access to the same information regardless of where or how they access the network
Example Assuming a US based NGN service user was roaming in Europe and wanted to access the network but has the use of specific calling information stored in his profile database in the US, how would such a challenge be overcome without replicating the user's data onto every rules database on the NGN to ensure that the user would not be denied access to features and services which the user typically subscπbed Obviously, stonng or replicating this data and then managing synchronicity over a worldwide network would be process intensive, costly and cumbersome This intelligent network architecture addresses these issues efficiently with mechanisms that make remote data available locally for the duration of a session and then caches the information in short term non-volatile memory not in the foreign rules database server In other words although a user's profile may be physically stored in a Rules database in the United States, the user may access the network from Europe and be automatically granted access to the specific services and features that normally would be available duπng his US service expeπence. The remote session controller m Europe would communicate with the cross network location register and rules database server to identify the subscπber's "home" rules database in order to collect the policies and profile of the subscπber for use in Europe, this is done by using the inter device message sets (command and control ) over the control plane sub network Unlike other mechanisms often employed, this mechanism does not replicate this information onto the local (European) rules database, making long term control data management predictable The design is CORBA compliant and therefore can be interconnected with other standards based networks Rules Database server
Determines Subscπber Profile
Session requirements such as Bandwidth, Quality Of Service, Class Of Service - Routing preferences based on Pπoπty, Cost, Termination Location
Media and Application requirements ( Voice Telephone to Video Telephone, Multi-point, text to speech, Fax to E-mail etc )
Content Separation (Example Tells the intelligent peπpheral and protocol converter to separate the Audio stream from the data and video stream on an H 32x call, It may also instruct the protocol converter to process the stream so as to enable this audio stream to be fed to a destination which supports traditional analog voice hence the G 728/9 content from the H 32x session would be converted first to AD/PCM and then sent to a Class 5 circuit based switch and terminated on a circuit switched SS7 network POTS line)
Access Device (Session Control)
Provides connectivity and session termination from customer premises to the NGN Acts as the hub for the vaπous applications ( Video, Voice, Fax, Web Data, Unified Messaging) - Provides systems management and reporting functions
May provide application multiplexing ( allowing simultaneous multi application access )
Intelligent Peripheral (Media Control) - Provides services such as DTMF parsing, Voice prompting, Messaging, Speech recognition, Text to Speech, Text to Fax, etc
Protocol Conversion (Policy Management)
Receives session requirements from Rules database - Selects and executes required filters to enable activation, processing and tear-down of sessions
Interfaces with existing CORE network to process information across NGN / Extended CORE - Filters and Converts signals from SS7 /ISDN to TCP/IP Η.323 Converts Signaling data from one format to another (example G.728/9 to AD/PCM or Vocaltec to Vienna Systems, etc.)
Network Access Control Point (Session Control) - Similar to a switching node on an SS7 circuit switched network
First or Last Access Point in the network
Provides actual call / session handling, routing and processing based on instructions from the Rules Database server
Session Manager / Event Logger (Session Control)
This process or application is cπtical since it is the "glue" between the end user application and the communications network It is responsible for collection and distnbution of end-user session preferences, application requirements, access device capability and accounting policy information to the required "IN enabling" components. In summary its mam functions are to-
Create the AMA /CDR and other usage records Interfaces external 3rd party Network Gateways. Liase with Cleaπng Houses and Cross Network Location Registers Feeds the Financial Infrastructure
Cross Network (Roaming) Location Register (Policy Management)
Similar to the Home location register in the wireless / cellular telephony world. This functional component provides the required policies governing users who access third party networks and cross geographical boundaπes. It keeps in constant contact with other cross network location registers of the geographically dispersed but mter-connected networks, exchanging accounting, service feature profile and control data for local and roaming subscπbers. "New Core" Network Architecture
Most of the attπbutes of the "New Core" will already be in place as part of "NGN". These include all intelligent components of the packet based "NGN" descπbed above. The emergence of "New Core" signals the retirement of legacy PSTN network infrastructure. The traditional PSTN may never get removed from the public network, it may continue to be available as a universally accessible telecommunication service, highly subsidized and regulated by government agencies (AMTRAK model). But for the purposes for business and technical innovation, traditional PSTN network will largely become irrelevant. As the PSTN based access methods go away, entirely IP based access methods will emerge in the "New Core", where all end devices connected to the "New Core" are IP enabled. All existing methods of wire-line based access (xDSL, T-l , T-3, fiber) will continue to provide access to IP based services over the "New Core". New access technologies (e.g. power-line) will emerge, but will still use the same packet based capabilities in the "New Core".
The trends observed in the "NGN" will continue with increased broadband access. Other access methods (cable, satellite, wireless) will also complete their transformation to the "New Core". These will all become IP enabled access technologies that will use the "New Core" for complete set of services, thus really providing seamless services across many different access technologies.
The Wireless Data Network Architecture The current wireless "Core" network consists of wireless based access and roaming capabilities that inter-operate with wire-line PSTN "Core" infrastructure to provide interoperable PSTN services. As the PSTN migrates to "NGN" and "New Core", the wireless PSTN access infrastructure will also migrate to connect to "NGN" and "New Core" to provide wireless PSTN access services while utilizing new capabilities in the "NGN" and the "New Core". There will also be innovations in the wireless end-devices such that they will become IP enabled, and will thus allow a broad range of innovations by allowing mobility to the wire-line IP based service capabilities (e.g. web browsing, e-mail etc.). These wireless access methods to the "New Core" will be restricted to lower speeds due to the legacy nature of this wireless infrastructure while new broadband wireless access may emerge to provide a new set of IP enabled wireless devices that can provide broadband services over wireless/mobile devices. In Europe, significant improvements in technologies such as GSM have provided insight into some NGN and New CORE capabilities such as 300Kilobits of access bandwidth to deliver information to hand-held wireless devices. The potential of such capabilities coupled with the traditional strengths of wireless communications such as roaming and error handling enabled by digitization, at this stage seems limitless when aggregated with the intelligence of the NGN and New CORE backbone.
LMDS is an emerging technology in the local high speed wire-less access, which utilizes the 25- 35 GHz microwave spectrum for point to point and point to multi-point communications. The end users either share an antenna connected to a digital receiver which is connected to a channel bank . The application server be it voice (PBX). video (CODEC), or Data (Router or Switch) interfaces with the NGN via the channel bank. A session originates from the application which interacts with the server to request authentication (AAA), then a session is established between originator and destination application by routing the call through the NGN components such as Gateways and Switches.
The Emerging Satellite Data Network Architecture
In addition to the wireless access infrastructure, new service providers have emerged that are trying to use low earth orbiting satellites (LEOS) to build a new access as well as backbone network infrastructure. The earlier version of these networks were built using traditional PSTN service model, hence they lack the bandwidth scalability for data services. In the "New Core", these will migrate to new packet switched based broadband LEO infrastructure, which will provide both high speed access as well as high speed backbone in the packet based "NGN" and "New Core". A satellite based broadband access mechanism will also be very suitable for multi- point services that will be developed on the "New Core".
The Cable Network Architecture
Cable networks were developed for mainly broadband broadcast of analog video entertainment services. The current "Core" cable infrastructure is suitable to serve one way video broadcast. Cable service providers are now upgrading their cable infrastructure to support high speed internet access. Thus in the "NGN" scenario for cable networks, cable will provide a new access mechanism for IP services, while simultaneously transport video content using the current video broadcast technology. Thus the IP enabled devices attached to the "NGN" cable infrastructure can take advantage of all the new components and capabilities described in the wire-line "NGN". This will enable seam-less services between devices that are accessing the "NGN' via a wire-line or cable infrastructures. This "NGN" cable infrastructure can provide IP based telephony services using the same components of the wire-line "NGN" that provide IP telephony to wireline IP devices.
The digital network segment that interfaces with the "NGN" comprises of a coaxial cable local loop which is connected to a cable data modulator running QAM/DPSK protocols. The coaxial loop is terminated at the customer premise by an Ethernet cable modem which delivers the IP Tone to the applications (Voice, Video, Data) that may reside on a PC or application server. The cable modems used provide users and applications with a wide range of bandwidth options from 2 to lOMbits per second depending on configuration and choice of equipment vendor. With the evolution of the "New Core" in the wire-line, the cable will continue to provide another broadband access mechanism for IP based services. As the "New Core" matures and enhances in capabilities (probably 10 years away), such that it can provide high speed real-time video content (to provide same quality as cable), it can be envisaged that the cable will becomes an entirely EP access mechanism (just like all wire-line access becomes an IP access mechanism). Then the broadcast video content will be delivered to IP enabled cable attached devices just like any other rich media will be delivered over the IP network. It is even conceivable that video encoding technologies such as MPEG2 and motion JPEG will be further improved to deliver higher resolution digital media over the cable infrastructure using NGN and CORE delivery mechanisms. The network becomes transparent and the applications and content drive the creativity of the service creation process. The PSTN like services will be delivered to devices connected via cable access just like they are delivered to other wire-line connected devices on the "New Core".
NGN Creation Strategy
The network transformation plan comprises of the following phases - Strategy - Market Trial
Service Launch
Consolidation and Optimization
Strategy Determine where our current network fits in the evolutionary continuum from CORE to
NGN or New CORE. Having identified the appropriate positioning of the network, select an architectural scenario that best serves business and technical objectives of the engagement.
Market Trial Develop and launch a market trial that would measure and assess the viability of the introduction of the proposed service. Additionally, this trial validates the approach to transform specific parts of the infrastructure towards the "NGN" and "New Core". The market trial provides the entry-exit criteria, metrics, Key Performance Indicators etc. to assess the success of the market trial. Service Launch Develop, plan and manage the detailed network, systems, process and program management aspects of the launch of a "New Core" that is applicable for the network based on the strategy developed above. This ensures that the network systems planned and developed will be future-ready. The OSS and back-office systems are be able to support the processes required for service creation and management in the "New Core". The network creation processes provides the program management tools to ensure that the launch is successfully executed. These include entry and exit criteria for network creation, KPIs for quality management, program planning and management tool-kits. Service Consolidation and Optimization As the network operator moves into operating and maintaining the "NGN", there will be many parallel market driven journeys during which services and capabilities will be developed for the "NGN". The network creation process provides tools to assist the client into improving efficiencies of these parallel journeys. These optimization efforts will include organizational, process and technology driven changes to create efficiency based on consolidation of processes, as well as measurement tools to determine the success of such consolidation. The network architecture roadmap and business blueprint will act as the foundation to ensure that during the consolidation phase the "NGN" maintains the required architecture framework to sustain it for the long term.
Now that the details regarding the NGN have been set forth, information will now be presented concerning billing when the quality of service is degraded.
Degraded Quality of Service and Billing
A typical telecommunication network comprises multiple telecommunication switches located throughout a geographical area. When a user makes a call, the call may be routed through one or more switches before reaching its destination.
Figure 1A illustrates an exemplary telecommunications system 102 across the United States. For purposes of illustration, a caller 104 places a call from Los Angeles, California to a party 112 located in New York City, New York. Such a call is typically transmitted across three (3) switches: the Los Angeles, California switch 106; the Chicago, Illinois switch 108; and the New York City, New York switch 110. In this scenario, the originating switch is the Los Angeles, California switch 106, and the terminating switch is the New York City, New York switch 110. Each of the switches, 106-110, is connected to two (2) or more Data Access Points (DAP) 116- 120, for instance a primary DAP 116-120 and a backup DAP 116-120. A DAP 116-120 is a facility that receives requests for information from the switches 106-110, processes the requests, and returns the requested information back to the requesting switch 106-110. The switches 106-
110 use information from the DAPs 116-120 to process calls through the network.
When a call passes through one of the switches, 106-110, that switch creates a call record. The call record contains information on the call, including but not limited to: routing, billing, call features, and trouble shooting information. After the call is terminated, each switch 106-110 that processed the call completes the associated call record. The switches 106-110 combine multiple call records into a billing block.
When a switch 106-110 fills the billing block, the switch 106-110 sends the billing block to a billing center 114. Thus, the billing center 114 receives one billing block from each switch 106-
110 that handled the call, which in this case would be three billing blocks. The billing center 114 searches each billing block and retrieves the call record associated with the call, thereby retrieving one call record per switch 106-110 that handled the call. The billing center 114 then uses one or more of the retrieved call records to generate a billing entry. The billing center 114 is also connected to each DAP 116-120 to retrieve information regarding a switch 106-110 or call record. However, billing in the present invention is increased because the hybrid network also contains proxy intelligence.
Figure IB shows a block diagram of the Network Data Management 130 in accordance with a preferred embodiment of the present invention Network Data Management 130 encompasses the collection of usage data and events for the purpose of network performance and traffic analysis This data may also be an input to Billing (Rating and Discounting) processes at the Service Management Layer, depending on the service and its architecture
The process provides sufficient and relevant information to veπfy compliance/ non-compliance to Service Level Agreements (SLA) The process provides sufficient usage information for rating and billing
This process ensures that the Network Performance goals are tracked, and that notification is provided when they are not met (threshold exceeded, performance degradation) This also includes thresholds and specific requirements for billing This includes information on capacity, utilization, traffic and usage collection In some cases, changes in traffic conditions may tπgger changes to the network for the purpose of traffic control Reduced levels of network capacity can result in requests to Network Planning for more resources
Figure 1B-1 is a flowchart illustrating a network data management process in accordance with a preferred embodiment First, in step 150, data is collected relating to usage and events occurπng over a hybπd network Next, m step 152, the data is analyzed to determine a status of the hybπd network which in turn, m step 154, is utilized duπng management of the hybπd network Further, in step 156, billing rates and discounts are determined based on the status of the hybπd network
In addition to the Network Data Management 130 generating billing events, the present invention also uses a Customer Interface Management process 132, as shown in Figure IC, to directly interact with customers and translate customer requests and inquiπes into appropπate "events" such as, the creation of an order or trouble ticket or the adjustment of a bill This process logs customer contacts, directs inquiπes to the appropπate party, and tracks the status to completion. In those cases where customers are given direct access to service management systems, this process assures consistency of image across systems, and secuπty to prevent a customer from harming their network or those of other customers The aim is to provide meaningful and timely customer contact expeπences as frequently as the customer requires
Figure lC-1 is a flowchart illustrating a Customer Interface Management Process m accordance with a preferred embodiment First, in step 158, a service lev el agreement is received for a hybπd network customer Next, in step 160. the service level agreement is stored after which, in step 162, inquiπes are received from network customers reflecting occurrences related to the hybπd network Thereafter, in step 164, events are generated based on the customer inquiπes and the service level agreement
The Network Data Management 130 and Customer Interface Management process 132 are used to give information to the Customer Quality of Service Management Process 134, as shown m Figure ID The Customer Quality of Service Management Process 134 encompasses monitoπng, managing and reporting of quality of service as defined in Service Descπptions, Service Level
Agreements (SLA), and other service-related documents It includes network performance, but also performance across all of service parameters, e g , Orders Completed On Time Outputs of this process are standard (predefined) and exception reports, including, dashboards, performance of a service against an SLA, reports of any developing capacity problems, reports of customer usage patterns, etc In addition, this process responds to performance inquiπes from the customer For SLA violations, the process supports notifying Problem Handling and for QoS violations, notifying Service Quality Management 136 The aim is to provide effective monitoπng Monitoπng and reporting must provide SP management and customers meaningful and timely performance information across the parameters of the services provided The aim is also to manage service levels that meet specific SLA commitments and standard service commitments
Figure 1D-1 is a flowchart illustrating a Customer Quality of Service Management Process in accordance with a preferred embodiment First, m step 166, a hybπd network event is received which may include customer inquiπes, required reports, completion notification, quality of service terms, service level agreement terms, service problem data, quality data, network performance data, and/or network configuration data Next, in step 168, the system determines customer reports to be generated and, in step 170, generates the customer reports accordingly based on the event received Figure IE shows a block diagram of the Service Quality Management 136 in accordance with a preferred embodiment of the present invention. The Service Quality Management Process 136 supports monitoπng service or product quality on a service class basis in order to determine
• Whether service levels are being met consistently • Whether there are any general problems with the service or product
• Whether the sale and use of the service is tracking to forecasts
This process also encompasses taking appropπate action to keep service levels within agreed targets for each service class and to either keep ahead of demand or alert the sales process to slow sales The aim is to provide effective service specific monitoπng, management and customers meaningful and timely performance information across the parameters of the specific service The aim is also to manage service levels to meet SLA commitments and standard commitments for the specific service
Figure 1E-1 is a flowchart illustrating a Service Quality Management Process in accordance with a preferred embodiment First, in step 172, a hybπd network event is received that may include forecasts, quality objectives, available capacity, service problem data, quality of service violations, performance trends, usage trends, problem trends, maintenance activity, maintenance progress, and/or credit violations Next, in step 174, quality management network data is determined and, in step 176, the quality management network data is generated. Such quality management network data may include constraint data, capacity data, service class quality data, service modification recommendations, additional capacity requirements, performance requests. and/or usage requests Finally, in step 178, a network process to which to send the generated data is identified.
Figure I F shows a block diagram of the Problem Handling Process 138. The Problem Handling Process receives information from the Customer Interface Management Process 132 and the Customer Quality of service Management Process 134. It is responsible for receiving service complaints from customers, resolve them to the customer's satisfaction and provide meaningful status on repair or restoration activity. This process is also responsible for any service-affecting problems, including
• notifying the customer in the event of a disruption (whether reported by the customer or not),
• resolving the problem to the customer's satisfaction, and
• providing meaningful status on repair or restoration activity. This proactive management also includes planned maintenance outages. The aim is to have the largest percentage of problems proactively identified and communicated to the customer, to provide meaningful status and to resolve in the shortest timeframe.
Figure 1F-1 is a flowchart illustrating a Problem Handling Management Process in accordance with a preferred embodiment. First, in step 180, a notification of a problem within a hybrid network is received by the system. Next, in step 182, a resolution for the problem within the hybrid network is determined. The resolution may include a status report, resolution notification, problem reports, service reconfiguration, trouble notification, service level agreement violations, and/or outage notification. Finally, in step 184, the progress of the implementation of the resolution is tracked.
The Problem Handling Process 138 and the Network Data Management 130 feed information to the Rating and Discounting Process 140, as shown in Figure 1G. This process applies the correct rating rules to usage data on a customer-by-customer basis, as required. It also applies any discounts agreed to as part of the Ordering Process, for promotional discounts and charges, and for outages. In addition, the Rating and Discounting Process 140 applies any rebates due because service level agreements were not met. The aim is to correctly rate usage and to correctly apply discounts, promotions and credits.
Figure 1G-1 is a flowchart illustrating Rating and Discounting Process in accordance with a preferred embodiment. First, in step 185, hybrid network customer usage information is received. In step 186, network service level agreement violations are collected, and, in step 187, network quality of service violations are received by the Rating and Discounting system. Next, in step 188, rating mles are applied to the network customer usage information. Further, in step 189, negotiated discounts are determined based on the network quality of service violations and. m step 190. rebates are determmed based on the network service level agreement violations Thereafter, in step 191. billing data reflecting the usage information, the negotiated discounts, and the rebates is provided to generate a customer invoice
Utilizing information from the Rating and Discounting Process 140. the Invoice and Collections Process 142, as shown in Figure 1H, creates correct billing information This process encompasses sending invoices to customers, processing their payments and performing payment collections In addition, this process handles customer mquiπes about bills, and is responsible to resolve billing problems to the customer's satisfaction The aim is to provide a correct bill and, if there is a billing problem, resolve it quicklv with appropπate status to the customer An additional aim is to collect monev due the service provider in a professional and customer supportive manner
Figure 1H-1 is a flowchart illustrating an Invoice and Collections Process in accordance with a preferred embodiment First, in step 192, customer account inquiπes and customer payment information is received by the system Next, in step 193, billing data, including discounts due to quality of service violations and rebates due to service level agreement violations, is collected and processed Thereafter, in step 194, customer account invoices are created for distnbution based on the customer payment information and the billing data
Mediation and activity tracking are provided by the event logger and event manager The event logger and event manager feed the rating and billing information for degraded service using the personally customized rules database Utilizing an expert system for the tailored capabilities of each customer, the event dπver, collector and manager analyze notification events generated by the system When a notification event is received the system analyzes the event and uses it to identify the customer The notification event is also used to credit the customer if they expeπence a non-impactmg event that breaches the customer's contract In addition to the system itself generating the notification event, the customer is also able to notify the provider directly should such an event occur
Figure 2 A is a flowchart illustrating media communication over the hybπd network of the present invention When a customer initiates a use of the hybπd network, the hybπd network, in a first step 220, transfers the media over the network using IP information to route it to the appropπate destination The media transfeπed over the network may be telephony data, image data, or any other data capable of packet switched transmission
In a second step 222, events are generated based on the quality of service of the media transfer As discussed above with reference to Figure 1 D and Figure IE. these events include performance notifications due to SLA violations, and customer generated events from the Customer Interface Management Process 132
In a third step 224, the events generated in step 222 are utilized to generate a bill for the customer In addition to normal billing for service provided via the hybπd network, the bill is modified based on events generated duπng the media transfer For example, events representing SLA violations are used to credit customers As discussed above with reference to Figures IF, 1G, and 1H, the Problem Handling Process 138 is responsible for receiving service complaints and other service-affecting problems Together with the Network Data Management 130, the Problem Handling Process feeds data to the Discounting Process 140 The Discounting Process
140 applies the correct rating rules on a customer-by-customer basis, and applies discounts for events, such as outages and other SLA violations Finally, the Invoice and Collections Process 142, utilizes the information from the Discounting Process 140 to create customer billing information
To better understand the invention, it is useful to descπbe some additional terminology relating to a telecommunication network A telephone call comes into a switch on a transmission line referred to as the oπginating port, or trunk The oπginatmg port is one of many transmission lines coming into the switch from the same location of oπgm This group of ports is the oπginating trunk group After processing an incoming call, the switch transmits the call to a destination location, which may be another switch, a local exchange earner, or a pπvate branch exchange The call is transmitted over a transmission line referred to as the terminating port, or trunk. Similar to the oπginating port, the terminating port is one of a group of ports going from the switch to the same destination This group of ports is the terminating trunk group
Contemporary telecommunication networks provide customers with the capability of using the general public network as well as the capability of defining a custom virtual network (VNet) With a VNet, a customer defines a pπvate dialing plan, including plan telephone numbers. A VNet customer is not limited to the default telephone numbers allocated to a public telecommunication system dedicated to a specific geographic region, but can define custom telephone numbers
Upon processing a telephone call, a switch must generate a call record large enough to contain all of the needed information on a call The call record, however, must not be so large that the typical call results in the majoπty of the record fields in the call record to be unused In such a case, stoπng such call records results in large amounts of wasted storage, and transmitting such a call record causes unnecessary transmissions
One solution for creating and processing call records is to implement a fixed length call record format, such as a 32-word call record A word is two (2) bytes, or sixteen (16) bits A fixed length record format, however, cannot expand when new call features are implemented More importantly, fixed call record formats cannot handle expanded data fields as the telecommunications network becomes more complex with new features and telephone numbers
Contemporary fixed length record formats include time point fields recording local time m three
(3) second increments where local switch time represents the time of day at a switch The timepoint fields are used by the network switches, billing center, and other network subsystems Each subsystem, however, may require the time peπod for a different use and in a different format, such as in an epoch time format Epoch time is the number of one (1) second increments since a particular date and time in history For example, the billing center requires epoch time for its billing records whereas switch reports and error logs require local switch time
A problem also aπses when using only local switch time in that there is no accommodation for time changes due to daylight savings time In addition, each subsystem may require a finer granulaπty of precision than the current three (3) second increments By providing only local switch time at three (3) second increments, the switches have passed the burden of translating the time into a usable format to the network subsystems The fixed record format cannot accommodate the vaπous time peπod requirements because it only contains the time peπods in local switch time at a low level of precision Because of its fixed nature, the fixed record format cannot expand to include different time formats, nor to include a finer granulaπty of precision, such as a one (1) second increment
Therefore, there is a need for switches of a telecommunications network to store call record information in a flexible and expandable format There is a further need to provide time point fields with one ( 1 ) second granulaπty in a flexible format that easily and efficiently responds to daylight savings time and time zone changes
There is also a need to match all of the call records associated with a specific telephone call. For example, for proper billing and cost control, it is necessary for the billing center to match the oπgmating switch's call record to the terminating switch's call record Also, for troubleshooting and secuπty purposes, it may be necessary to trace a specific telephone call through the network with ease in order to isolate problem areas
Therefore, there is a need for switches of a telecommunications network to uniquely identify each telephone call that traverses the network, thereby uniquely identifying all of the call records associated with a specific telephone call
An Embodiment
Call Record Format An embodiment solves the problem of providing a flexible and expandable call record format by implementing both a small and a large call record format In particular, the embodiment implements a default 32-word call record format, plus an expanded 64-word call record format An embodiment uses a 32-word call record format for the typical telephone call, which comprises the majoπty of all telephone calls, and uses a 64-word call record format when additional information is needed regarding the call. This implementation provides the flexibility needed to efficiently manage varying data requirements of a given call record. New call features can be developed and easily incorporated into the vaπable call record format of the present invention.
This embodiment also records timepoints m the epoch time format. The embodiment records the origination time of a call in epoch time format, and the remaining timepomts are offsets, or the number of seconds, from that oπgination time. This embodiment solves the problems associated with converting to and from daylight savings time because daylight savings time is a local time offset and does not affect the epoch time. Furthermore, the timepoints in epoch time format require less space in the call record than they do m local switch time format.
The epoch time format may represent coordinated universal time (UTC), as determined at Greenwich, England, which has a time zone of zero (0) local switch time, or any other time. Epoch time is only a format and does not dictate that UTC must be used. The billing time and the local switch time may be in UTC or local time, and the local switch time may not necessaπly be the same time that is used for billing Therefore the switch must keep billing time and local switch time separate in order to prevent the problems that occur duπng daylight savings time changes
Network Call Identifier
This embodiment solves the problem of uniquely identifying each telephone call and all of the call records associated with a specific telephone call by providing a unique identifier to each call record It generates a network call identifier (NCID) that is assigned to each call record at the point of call oπgination, that is, the oπginating switch generates an NCID for each telephone call The NCID accompanies the associated telephone call through the telecommunications network to the termination point at the terminating switch Therefore, at any point of a telephone call in the network, the associated NCID identifies the point and time of origin of the telephone call Each switch through which the telephone call passes records the NCID the call record associated with the call The NCID is small enough to fit in a 32-word call record, thereby reducing the data throughput and storage The NCID provides the billing center and other network subsystems with the ability to match ongmating and terminating call records for a specific telephone call
This embodiment also provides the switch capability of discarding a received NCID and generating a new NCID A switch discards a received NCID if the NC D format is invalid or unreliable, thereby ensuπng a valid unique identifier to be associated with each call going through the network For instance, an NCID may be unreliable if generated by third party switches in the telecommunications network
This embodiment relates to switches of a telecommunication network that generate call records using a flexible and expandable record format The call record formats include a small (preferably 32-word) and a large (preferably 64-word) expanded format It would be readily apparent to one skilled in the relevant art to implement a small and large record format of different sizes
The embodiment also relates to switches of a telecommunication network that generate a unique NCID for each telephone call traversing the network The NCED provides a mechanism for matching all of the call records associated with a specific telephone call It would be readily apparent to one skilled in the relevant art to implement a call record identifier of a different format The chosen embodiment is computer software executing within a computer system. Figure 2B shows an exemplary computer system. The computer system 202 includes one or more processors, such as a processor 204 The processor 204 is connected to a communication bus 206.
The computer system 202 also includes a main memory 208, preferably random access memory (RAM), and a secondary memory 210. The secondary memory 210 includes, for example, a hard disk dπve 212 and/or a removable storage dπve 214, representing a floppy disk dπve, a magnetic tape dπve, a compact disk dπve, etc. The removable storage dπve 214 reads from and/or wπtes to a removable storage unit 216 in a well known manner
Removable storage unit 216, also called a program storage device or a computer program product, represents a floppy disk, magnetic tape, compact disk, etc The removable storage unit 216 includes a computer usable storage medium having therein stored computer software and/or data.
Computer programs (also called computer control logic) are stored in mam memory 208 and/or the secondary memory 210 Such computer programs, when executed, enable the computer system 202 to perform the functions of the present invention as discussed herein. In particular, the computer programs, when executed, enable the processor 204 to perform the functions of the present invention. Accordingly, such computer programs represent controllers of the computer system 202
Another embodiment is directed to a computer program product compπsing a computer readable medium having control logic (computer software) stored therein The control logic, when executed by the processor 204, causes the processor 204 to perform the functions as described herein.
Another embodiment is implemented pπmarily in hardware using, for example, a hardware state machine. Implementation of the hardware state machine so as to perform the functions descπbed herein will be apparent to persons skilled in the relevant arts.
Call Record Format This embodiment provides the switches of a telecommunication network with nine (9) different record formats These records include . Call Detail Record (CDR), Expanded Call Detail Record (ECDR), Pπvate Network Record (PNR), Expanded Pπvate Network Record (EPNR). Operator Service Record (OSR), Expanded Operator Service Record (EOSR), Pπvate Operator Service Record (POSR), Expanded Pnvate Operator Service Record (EPOSR), and Switch Event Record
(SER). Each record is 32 words in length, and the expanded version of each record is 64 words in length.
Example embodiments of the nine (9) call record formats discussed herein are further descπbed in Figures 1-5. The embodiments of the call records of the present invention compπse both 32- word and 64-word call record formats It would be apparent to one skilled in the relevant art to develop alternative embodiments for call records compπsing a different number of words and different field definitions Table 301 of the Appendix contains an example embodiment of the CDR and PNR call record formats. Figure 3 shows a graphical representation of the CDR and PNR call record formats. Table 302 of the Appendix contains an example embodiment of the
ECDR and EPNR call record formats. Figures 4A and 4B show a graphical representation of the ECDR and EPNR call record formats Table 303 of the Appendix contains an example embodiment of the OSR and POSR call record formats Figure 5 shows a graphical representation of the OSR and POSR call record format. Table 304 of the Appendix contains an example embodiment of the EOSR and EPOSR call record formats. Figures 6(A) and 6(B) show a graphical representation of the EOSR and EPOSR call record formats Table 305 of the Appendix contains an embodiment of the SER record format. Figure 7 shows a graphical representation of the SER record format.
The CDR and PNR, and thereby the ECDR and EPNR, are standard call record formats and contain information regarding a typical telephone call as it passes through a switch. The CDR is used for a non-VNET customer, whereas the PNR is used for a VNET customer and is generated at switches that oπginate VNET calls. The fields of these two records are identical except for some field-specific information descπbed below.
The OSR and POSR, and thereby the EOSR and EPOSR, contain information regarding a telephone call requiπng operator assistance and are generated at switches or systems actually equipped with operator positions. A switch completes an OSR for a non- VNET customer and completes a POSR for a private VNET customer. These records are only generated at switches or systems that have the capability of performing operator services or network audio response system (NARS) functions The formats of the two (2) records are identical except for some field-specific information descπbed below
A SER is reserved for special events such as the passage of each hour mark, time changes, system recoveπes, and at the end of a billing block The SER record format is also descπbed in more detail below
Figures 8(A) and 8(B) collectively illustrate the logic that a switch uses to determine when to use an expanded version of a record format. A call 202 comes into a switch 106-110 (called the current switch for reference purposes; the current switch is the switch that is currently processing the call), at which time that switch 106-110 determines what call record and what call record format (small/default or large/expanded) to use for the call's 802 call record In this regard, the switch 106-110 makes nine (9) checks for each call 802 that it receives The switch 106-110 uses an expanded record for a call 802 that passes any check as well as for a call 802 that passes any combination of checks
The first check 804 determines if the call is involved in a direct termination overflow (DTO) at the current switch 106-110 For example, a DTO occurs when a customer makes a telephone call 802 to an 800 number and the oπginal destination of the 800 number is busy. If the oπginal destination is busy, the switch overflows the telephone call 802 to a new destination. In this case, the switch must record the oπginally attempted destination, the final destination of the telephone call 802, and the number of times of overflow Therefore, if the call 802 is involved in a DTO, the switch 106-110 must complete an expanded record (ECDR, EPNR, EOSR, EPOSR) 816.
The second check 806 made on a call 802 by a switch 106-110 determines if the calling location of the call 802 is greater than ten (10) digits. The calling location is the telephone number of the location from where the call 802 oπginated Such an example is an international call which compπses at least eleven (1 1) digits. If the calling location is greater than ten (10) digits, the switch records the telephone number of the calling location in an expanded record (ECDR, EPNR, EOSR, EPOSR) 816.
A switch 106-110 makes a third check 808 on a call 802 to determine if the destination address is greater than seventeen (17) digits. The destination address is the number of the called location and may be a telephone number or trunk group. If the destination is greater than seventeen (17) digits, the switch records the destination in an expanded record (ECDR, EPNR, EOSR, EPOSR) 816
A switch 106-110 makes a fourth check 810 on a call 802 to determine if the pre-translated digits field is used with an operated assisted service call The pre-translated digits are the numbers of the call 802 as dialed by a caller if the call 202 must be translated to another number withm the network Therefore, when a caller uses an operator service, the switch 106-110 records the dialed numbers in expanded record (EOSR, EPOSR) 816
In a fifth check 812 on a call 802, a switch 106-110 determines if the pre-translated digits of a call 802 as dialed by a caller without operator assistance has more than ten (10) digits If there are more than ten (10) pre-translated digits, the switch 106-110 records the dialed numbers in expanded record (ECDR, EPNR) 816
In a sixth check 814 on a call 802, a switch 106-110 determines if more than twenty-two (22) digits, including supplemental data, are recorded in the Authoπzation Code field of the call record The Authoπzation Code field indicates a party who gets billed for the call, such as the calling location or a credit card call If the data entry requires more than twenty-two (22) digits, the switch 106-110 records the billing information in an expanded record (ECDR, EPNR, EOSR, EPOSR) 816
In a seventh check 820 on a call 802, a switch 106-110 determines if the call 802 is a wideband call A wideband call is one that requires multiple transmission lines, or channels For example, a typical video call requires six (6) transmission channels one (1) for voice and five (5) for the video transmission The more transmission channels used duπng a wideband call results in a better quality of reception Contemporary telecommunication systems currently provide up to twenty-four (24) channels Therefore, to indicate which, and how many, of the twenty-four channels is used duπng a wideband call, the switch records the channel information in an expanded record (ECDR, EPNR) 828
In an eighth check 822 on a call 802, a switch 106-110 determines if the time and charges feature was used by an operator The time and charges feature is typically used in a hotel scenaπo when a hotel guest makes a telephone call using the operator's assistance and charges the call 802 to her room After the call 802 has completed, the operator informs the hotel guest of the charge, or cost, of the call 802 If the time and charges feature was used with a call 802, the switch 106- 110 records the hotel guest's name and room number in an expanded record (EOSR, EPOSR) 832
The ninth, and final, check 824 made on a call 802 b\ a switch 106-110 determines if the call 802 is an enhanced voice service/network audio response system (EVS NARS) call An EVS NARS is an audio menu system in which a customer makes selections in response to an automated menu via her telephone key pad Such a system includes a NARS switch on which the audio menu system resides Therefore, duπng an EVS NARS call 802, the NARS switch 106-110 records the customer's menu selections in an expanded record (EOSR, EPOSR) 832
If none of the checks 804-824 return a positiv e result, then the switch 106-110 uses the default record format (OSR, POSR) 830
Once the checks have been made on a call, a sw itch generates and completes the appropπate call record Call record data is recorded in binary and Telephone Binarv Coded Decimal (TBCD) format TBCD format is illustrated below 0000 = TBCD-Null
0001 = digit 1
0010 = digit 2
0011 = digit 3 0100 = digit 4 0101 = digit 5
0110 = digit 6
011 1 = digit 7
1000 = digit 8
1001 = digit 9 1010 = digit 0
1011 = special digit 1 (DTMF digit A) 1100 = special digit 2 (DTMF digit B) 1101 = special digit 3 (DTMF digit C) 1110 = special digit 4 (DTMF digit D) 1111 = special digit 5 (Not Used)
All TBCD digit fields must be filled with TBCD-Null, or zero, pπor to data being recorded Where applicable, dialed digit formats conform to these conventions N = digits 2-9 X = digits 0-9 Y = digits 2-8
Thus, if the specification for a call record field contains a N, the valid field values are the digits 2-9.
Each call record, except SER, contains call specific timepoint fields. The timepoint fields are recorded in epoch time format. Epoch time is the number of one second increments from a particular date/time in history. The embodiment of the present invention uses a date/time of midnight (00:00 am UTC) on January 1 , 1976, but this serves as an example and is not a limitation. It would be readily apparent to one skilled in the relevant art to implement an epoch time based on another date/time. In the records. Timepoint 1 represents the epoch time that is the origination time of the call 802. The other timepoint stored in the records are the number of seconds after Timepoint 1, that is, they are offsets from Timepoint 1 that a particular timepoint occurred. All of the timepoint fields must be filled in with "O's" prior to any data being recorded. Therefore, if a timepoint occurs, its count is one (1 ) or greater. Additionally, timepoint counters. not including Timepoint 1, do not rollover their counts, but stay at the maximum count if the time exceeds the limits.
The switch clock reflects local switch time and is used for all times except billing. Billing information is recorded in epoch time, which in this embodiment is UTC. The Time offset is a number reflecting the switch time relative to the UTC, that is, the offset due to time zones and, if appropriate, daylight savings time changes. There are three factors to consider when evaluating time change relative to UTC. First, there are time zones on both sides of UTC, and therefore there may be both negative and positive offsets. Second, the time zone offsets count down from zero (in Greenwich, England) in an Eastward direction until the International Dateline is reached.
At the Dateline, the date changes to the next day, such that the offset becomes positive and starts counting down until the zero offset is reached again at Greenwich. Third, there are many areas of the world that have time zones that are not in exact one-hour increments. For example. Australia has one time zone that has a thirty (30) minute difference from the two time zones on either side of it, and Northern India has a time zone that is fifteen (15) minutes after the one next to it. Therefore, the Time Offset of the call records must account for variations in both negative and positive offsets in fifteen (15) minute increments. The embodiment of the present invention satisfies this requirement by providing a Time Offset representing either positive or negative one minute increments. There are t o formulas used to convert local switch time to epoch time and back 1) Epoch Time + (Sign Bit * Time Offset) = Local Switch Time n) Local Switch Time - (Sign Bit * Time Offset) = Epoch Time
The switch records the Time Offset in the SER using a value here one ( 1 ) equals one (1) minute, and computes the Time Offset in seconds and adds this value to each local Timepoint 1 before the call record is recorded For example. Central Standard Time is six (6) hours before UTC In this case, the Sign Bit indicates "1 " for negative offset and the Time Offset value recorded m the SER would be 360 (6 hours * 60 minutes/hour = 360 minutes) See Figure 5 for more details on the SER record format When recording Timepoint 1 in the call record, the switch multiplies the Time Offset by 60, because there is 60 seconds in each 1 minute increment, and determines whether the offset is positive or negative by checking the Sign Bit This example results in a value of -21 ,600 (-1 * 360 minutes* 60 seconds/minute = -21,600 seconds) Using equation (n) from above, if the local switch time were midnight, the corresponding epoch time might be, for example, 1 ,200,000,000 Subtracting the Time Offset of -21 ,600 results in a corrected epoch time of 1,200,021 ,600 seconds, which is the epoch time for 6 hours after midnight on the next day in epoch time This embodiment works equally as well in switches that are positioned on the East side of Greenwich where the Time Offset has a positive value
Two commands are used when changing time First, Figure 9 illustrates the control flow of the Change Time command 900, which changes the Local Switch Time and the Time Offset In Figure 9, after a switch operator enters the Change Time command, the switch enters step 902 and prompts the switch operator for the Local Switch Time and Time Offset from UTC In step 902 the switch operator enters a new Local Switch Time and Time Offset Continuing to step
904, the new time and Time Offset are displayed back to the switch operator Continuing to step 906, the switch operator must veπfy the entered time and Time Offset before the actual time and offset are changed on the switch If in step 906 the switch operator veπfies the changes, the switch proceeds to step 908 and generates a SER with an Event Qualifier equal to two which identifies that the change was made to the Local Switch Time and Time Offset of the switch
The billing center uses the SER for its bill processing The switch proceeds to step 910 and exits the command Referπng back to step 906, if the switch operator does not veπfy the changes, the switch proceeds to step 910 and exits the command without updating the Local Switch Time and Time Offset For more information on SER, see Figure 5 Figure 10 illustrates the control flow for the Change Daylight Savings Time command 1000 which is the second command for changing time In Figure 10. after a switch operator enters the Change Daylight Savings Time command, the switch enters step 1002 and prompts the switch operator to select either a Forward or Backward time change Continuing to step 1004, the switch operator makes a selection In step 1004, if the switch operator selects the Forward option, the switch enters step 1006 In step 1006, the switch sets the Local Switch Time forward one hour and adds one hour (count of 60) to the Time Offset The switch then proceeds to step 1010 Referπng back to step 1004, if the switch operator selects the Backward option, the switch sets the Local Switch Time back one hour and subtract one hour (count of 60) from the Time Offset The switch then proceeds to step 1010
In step 1010, the switch operator must veπfy the forward or backward option and the new Local Switch Time and Time Offset before the actual time change takes place If in step 1010, the switch operator veπfies the new time and Time Offset, the switch proceeds to step 1012 and generates a SER with an Event Qualifier equal to nine which changes the Local Switch Time and
Time Offset of the switch The switch proceeds to step 1014 and exits the command. Referπng back to step 1010, if the switch operator does not veπfy the changes, the switch proceeds to step 1014 and exits the command without updating the Local Switch Time and Time Offset
After the successful completion of a Change Daylight Savings Time Command, the billing records are affected by the new Time Offset This embodiment allows the epoch time, used as the billing time, to increment normally through the daylight savings time change procedure, and not to be affected by the change of Local Switch Time and Time Offset
Network Call Identifier
An embodiment provides a unique NCID that is assigned to each telephone call that traverses through the telecommunications network Thus, the NCID is a discrete identifier among all network calls The NCID is transported and recorded at each switch that is involved with the telephone call
The oπginating switch of a telephone call generates the NCID The chosen embodiment of the NCID of the present invention is an eighty-two (82) bit identifier that is compπsed of the following subfields:
i) Oπginating Switch ID (14 bits) . This field represents the NCS Switch ID as defined in the Office Engineering table at each switch. The SER call record, however, contains an alpha numeric representation of the Switch ID. Thus, a switch uses the alphanumeric Switch ID as an index into a database for retrieving the corresponding NCS Switch ID.
ii) Originating Trunk Group ( 14 bits) : This field represents the originating trunk group as defined in the 32/64-word call record format described above.
iii) Originating Port Number (19 bits) : This field represents the originating port number as defined in the 32/64-word call record format described above.
iv) Timepoint 1 (32 bits) : This field represents the Timepoint 1 value as defined in the 32/64-word call record format described above.
v) Sequence Number (3 bits) : This field represents the number of calls which have occurred on the same port number with the same Timepoint 1 (second) value. The first telephone call will have a sequence number set to '0.' This value increases incrementally for each successive call which originates on the same port number with the same Timepoint 1 value.
It would be readily apparent to one skilled in the relevant art to create an NCID of a different format. Each switch records the NCID in either the 32 or 64-word call record format. Regarding the 32-word call record format, intermediate and terminating switches will record the NCED in the AuthCode field of the 32-word call record if the AuthCode filed is not used to record other information. In this case, the Originating Switch ID is the NCS Switch ID, not the alphanumeric Switch ED as recorded in the SER call record. If the AuthCode is used for other information, the intermediate and terminating switches record the NCID in the 64-word call record format. In contrast, originating switches do not use the AuthCode field when storing an NCID in a 32-word call record. Originating switches record the subfields of the NCID in the corresponding separate fields of the 32-word call record. That is, the Originating Switch ID is stored as an alphanumeric Switch ED in the Switch ID field of the SER call record; the Originating Trunk Group is stored in the Originating Trunk Group field of the 32-word call record; the Originating Port Number is stored in the Originating Port field of the 32-word call record; the Timepoint 1 is stored in the Timepoint 1 field of the 32-word call record; the Sequence Number is stored in the NCED Sequence Number field of the 32-word call record. The 32-word call record also includes an NCID Location (NCIDLOC) field to identify when the NCID is recorded in the AuthCode field of the call record. If the NCED Location field contains a ' 1 ,' then the AuthCode field contains the NCID If the NCID Location field contains a '0,' then the NCID is stored in its separate sub- fields in the call record Only intermediate and terminating switches set the NCID Location field to a ' 1 ' because oπginating switches store the NCID in the separate fields of the 32-word call record
Regarding the 64-word call record format, the expanded call record includes a separate field, call the NCID field, to store the 82 bits of the NCID This call record is handled the same regardless of whether an oπginating, intermediate, or terminating switch stores the NCID. In the 64-word call record format, the Oπginating Switch ID is the NCS Switch ID, not the alphanumeπc Switch ID as recorded in the SER call record
Figure 11 illustrates the control flow of the Network Call Identifier switch call processing A call 202 comes into a switch 106-110 (called the current switch for reference purposes; the current switch is the switch that is currently processing the call) at step 1104 In step 1104, the current switch receives the call 202 and proceeds to step 1106 In step 1106, the current switch accesses a local database and gets the trunk group parameters associated with the oπginating trunk group of the call 202 After getting the parameters, the current switch proceeds to step 1108. In step 1108, the current switch determines if it received an NCID with the call 202. If the current switch did not receive an NCID with the call 202, the switch continues to step 1112.
In step 1112, the switch analyzes the oπginating trunk group parameters to determine the oπginating trunk group type If the oπginating trunk group type is an InterMachine Trunk (IMT) or a release link trunk (RLT), then the switch proceeds to step 1116 An MT is a trunk connecting two normal telecommunication switches, whereas a RLT is a trunk connecting an intelligent services network (ISN) platform to a normal telecommunication switch. When the current switch reaches step 1116, the current switch knows that it is not an oπginating switch and that it has not received an NCED. In step 1116, the current switch analyzes the oπginating trunk group parameters to determine whether it is authoπzed to create an NCID for the call 202. In step 1116, if the current switch is not authoπzed to create an NCED for the call 202, the current switch proceeds to step 1118. When m step 1118, the current switch knows that it is not an originating switch, it did not receive an NCID for the call 202, but is not authoπzed to generate an NCED. Therefore, in step 1118, the current switch writes the call record associated with the call 202 to the local switch database and proceeds to step 1120. In step 1120, the current switch transports the call 202 out through the network with its associated NCID Step 1120 is descπbed below m more detail. Referπng again to step 1116, if the current switch is authoπzed to create an NCID for the call 202, the cuπent switch proceeds to step 1114 In step 1114, the current sw itch generates a new NCED for the call 202 before continuing to step 1136 In step 1136, the current switch wπtes the call record, including the NCID, associated with the call 202 to the local switch database and proceeds to step 1120 In step 1120, the current switch transports the call 202 out through the network with its associated NCID Step 1120 is descπbed below in more detail
Referπng again to step 1112, if the current switch determines that the oπginating trunk group type is not an IMT or RLT, the current switch proceeds to step 1114 When reaching step 1114, the current switch knows that it is an oπginating switch and. therefore, must generate a NCID for the call 202 Step 1114 is descπbed below in more detail After generating a NCID m step 1114, the current switch proceeds to step 1136 to write the call record, including the NCID, associated with the call 202 to the local database After wπtmg the call record, the current switch proceeds to step 1120 to transport the call out through the network with its associated
NCED Step 1120 is also descπbed below in more detail.
Referπng again to step 1108, if the current switch determines that it received an NCID with the call 202, the current switch proceeds to step 1110 In step 1110, the current switch processes the received NCID In step 1110, there are two possible results First, the current switch may decide not to keep the received NCID thereby proceeding from step 1110 to step 1114 to generate a new NCED Step 1110 is descπbed below in more detail In step 1114, the current switch may generate a new NCED for the call 202 before continuing to step 1136 Step 1114 is also descπbed below in more detail In step 1136, the current switch wπtes the call record associated with the call 202 to the local database The current switch then proceeds to step 1120 and transports the call 202 out through the network with its associated NCID Step 1120 is also descπbed below in more detail.
Referπng again to step 1110, the current switch may decide to keep the received NCED thereby proceeding from step 1110 to step 1115 In step 1115, the current switch adds the received
NCED to the call record associated with the call 202 Steps 1110 and 1115 are descπbed below in more detail After step 1115, the current switch continues to step 1136 where it wπtes the call record associated with the call 202 to the local database. The current switch then proceeds to step 1120 and transports the call 202 out through the network with its associated NCED Step 1120 is also descπbed below in more detail Figure 12 illustrates the control logic for step 11 10 w hich processes a received NCID The current switch enters step 1202 of step 1110 when it determines that an NCID was received with the call 202 In step 1202, the current switch analyzes the oπginating trunk group parameters to determine the oπginating trunk group type If the oπginating trunk group type is an IMT or
RLT, then the cuπent switch proceeds to step 1212 When in step 1212, the current switch knows that it is not an oπginating switch and that it received an NCID for the call 202 Therefore, in step 1212, the current switch keeps the received NCID and exits step 1110, thereby continuing to step 1115 in Figure 11 , after which the cuπent switch will store the received NCED in the call record and transport the call
Referπng again to step 1202, if the oπginating trunk group type is not an IMT or RLT, the current switch proceeds to step 1204 In step 1204, the cuπent switch determines if the oπginating trunk group type is an Integrated Services User Parts Direct Access Line (ISUP DAL) or an integrated Services Digital Network Pπmary Rate Interface (ISDN PRI) ISUP is a signaling protocol which allows information to be sent from switch to switch as information parameters An ISUP DAL is a trunk group that pπmaπly is shared by multiple customers of the network, but can also be dedicated to a single network customer In contrast, an ISDN PRI is a trunk group that pπmaπly is dedicated to a single network customer, but can also be shared by multiple network customers A network customer is an entity that leases network resources In step 1204, if the current switch determines that the trunk group type is not an ISUP DAL or ISDN PRI, the current switch proceeds to step 1206 When in step 1206 the current switch knows that it received an NCED that was not generated by a switch that is part of the telecommunication network or by a switch that is a customer of the network Therefore, in step 1206, the current switch discards the received NCID because it is an unreliable NCID From step 1206, the current switch exits step 1110, thereby continuing to step 1114 in Figure 11 where the current switch will create a new NCID and transport that NCID with the call 202
Referπng back to step 1204, if the current switch determines that the oπginating trunk group type is an ISUP DAL or ISDN PRI, the current switch continues to step 1208 When in step
1208, the current switch knows that it received an NCID from a customer trunk group Therefore, the current switch analyzes the oπgmatmg trunk group parameters to determine whether it is authoπzed to create a new NCED for the call 202 The cuπent switch may be authoπzed to create a new NCED and overwπte the NCED provided by the customer to ensure that a valid NCED corresponds to the call 202 and is sent through the network In step 1208, if the current switch is not authoπzed to create a new NCID for the call 202, the cuπent switch proceeds to step 1210 In step 1210. the cuπent switch checks the validity of the received NCID, for example, the NCID length If the received NCID is invalid, the cuπent switch proceeds to step 1206 In step 1206, the cuπent switch discards the invalid NCID From step 1206, the cuπent switch exits step 1110, thereby continuing to step 1114 in Figure 11 where the cuπent switch will create a new NCID and transport that NCID with the call 202 Referπng again to step 1210, if the cuπent switch deteπnines that the received NCID is valid, the cuπent switch proceeds to step 1212 In step 1212 the cuπent switch keeps the received NCID and exits step 1110, thereby continuing to step 1115 in Figure 11 where the cuπent switch will store the received NCID in the call record and transport the call
Figure 13A illustrates the control logic for step 1114 which generates an NCID The cuπent switch enters step 1302 when an NCID must be created In step 1302, the cuπent switch will calculate a sequence number The sequence number represents the number of calls which have occuπed on the same port number with the same Timepoint 1 value The first call has a sequence number value of '0,' after which the sequence number will increase incrementally for each successive call that onginates on the same port number with the same Timepoint 1 value After creating the sequence number in step 1302, the cuπent switch proceeds to step 1304 In step 1304, the cuπent switch creates a call record for the call202, including in it the call's 202 newly created NCID After the call record has been created, the cuπent switch exits step 1114 and proceeds to step 1136 in Figure 11 where the cuπent switch wπtes the call record to the local switch database
Figure 13B illustrates the control logic for step 1115 which adds a received NCID to the call record associated with the call 202 Upon enteπng step 1115, the cuπent switch enters step
1306 When in step 1306, the cuπent switch knows that it has received a valid NCID from an intermediate or terminating switch, or from a customer switch In step 1306, the cuπent switch deteπnines if the AuthCode field of the 32-word call record is available for stoπng the NCID If the AuthCode field is available, the cuπent switch proceeds to step 1310 In step 1310, the current switch stores the NCID in the AuthCode field of the 32-word call record The cuπent switch must also set the NCED Location field to the value ' 1 ' which indicates that the NCED is stored in the AuthCode field After step 1310, the cuπent switch exits step 1115 and continues to step 1136 in Figure 11 where the cuπent switch wπtes the call record to the local switch database Referπng again to step 1306. if the AuthCode field is not available in the 32-word call record, the cuπent switch proceeds to step 1308. In step 1308, the cuπent switch stores the NCID in the NCID field of the 64-word call record. After step 1308, the cuπent switch exits step 1115 and continues to step 1136 in Figure 11 where the cuπent switch wπtes the call record to the local switch database.
Figure 14 illustrates the control logic for step 1120 which transports the call from the cuπent switch. There are two entry points for this control logic: steps 1402 and 1412. Upon enteπng step 1402 from step 1136 on Figure 11, the cuπent switch knows that it has created an NCID or has received a valid NCID. In step 1402, the cuπent switch accesses a local database and gets the trunk group parameters associated with the terminating trunk group for transporting the call 202. After getting the parameters, the cuπent switch proceeds to step 1404. In step 1404. the cuπent switch determines the terminating trunk group type. If the terminating trunk is an ISUP trunk, the cuπent switch proceeds to step 1408. In step 1408, the cuπent switch analyzes the parameters associated with the ISUP trunk type to determine whether or not to deliver the NCED to the next switch. If the cuπent switch is authorized to deliver the NCID. the cuπent switch proceeds to step 1416. In step 1416, the cuπent switch transports the call to the next switch along with a SS7 initial address message (IAM). The NCID is transported as part of the generic digits parameter of the IAM. The IAM contains setup information for the next switch which prepares the next switch to accept and complete the call 202. The format of the generic digits parameter is shown below in Table 306 :
Generic Digits Parameter Code: 11000001 Type: 0
Figure imgf000058_0001
Figure imgf000059_0001
Table 306
After transporting the call 202 and the IAM, the cuπent switch proceeds to step 1418, thereby exiting the switch processing
Referπng again to step 1408, if the cuπent switch is not authoπzed to deliver the NCED to the next switch in an IAM message, the cuπent switch proceeds to step 1412 In step 1412, the cuπent switch transports the call 202 to the next switch under normal procedures which consists of sending an IAM message to the next switch without the NCED recorded as part of the geneπc digits parameter After transporting the call 202, the cuπent switch proceeds to step 1418, thereby exiting the switch processing
Referπng again to step 1404, if the cuπent switch deteπnines that the teπninating trunk is not an ISUP, the cuπent switch proceeds to step 1406. In step 1406, the cuπent switch deteπnines if the teπninating trunk group is an ISDN trunk (the terminating trunk group is dedicated to one network customer). If the terminating trunk group is an ISDN, the cuπent switch proceeds to step 1410 In step 1410, the cuπent switch analyzes the parameters associated with the ISDN trunk group type to determine whether or not to deliver the NCID to the next switch. If the cuπent switch is authoπzed to deliver the NCID, the cuπent switch proceeds to step 1414. In step 1414. the cuπent switch transports the call to the next switch along with a setup message. The setup message contains setup information for the next switch which prepares the next switch to accept and complete the call 202 The NCID is transported as part of the locking shift codeset 6 parameter of the setup message The format of the locking shift codeset 6 parameter is shown below m Table 307 :
Locking Shift Codeset 6 Parameter : Code: 11000001 Type: 0
Figure imgf000060_0001
Figure imgf000061_0001
Table 307
After transporting the call 202 and the setup message, the cuπent switch proceeds to step 1418, thereby exiting the switch processing
Referπng again to step 1410, if the cuπent switch deteπnines that it does not have authonty to deliver the NCID to the next switch in a setup message, the cuπent switch proceeds to step 1412 In step 1412, the cuπent switch transports the call 202 to the next switch under normal procedures which consists of sending a setup message to the next switch without the NCID recorded as part of the locking shift codeset 6 parameter After transporting the call 202, the cuπent switch proceeds to step 1418, thereby exiting the switch processing
Refemng again to step 1412, this step is also entered from step 1118 on Figure 11 when the cuπent switch did not receive an NCED, is an intermediate or terminating switch, and is not authoπzed to create an NCED In this case, m step 1412, the cuπent switch also transports the call 202 to the next switch under normal procedures which consists of sending an IAM or setup message to the next switch without the NCED recorded as part of the parameter. After transporting the call 202, the cuπent switch proceeds to step 1418. thereby exiting the switch processing
A system and method for the switches of a telecommunications network to generate call records for telephone calls using a flexible and expandable record format. Upon receipt of a telephone call, a switch in the network analyzes the telephone call to determine whether the default call record is sufficiently large to store call record information pertaining to the telephone call, or whether the expanded call record must be used to store the call information pertaining to the telephone call. After determining which call record to use, the switch generates the default or expanded call record. The sw itch sends a billing block, compπsed of completed call records, to a billing center upon filling an entire billing block.
Introduction To A Callback Telephony System in Accordance With A Preterred Embodiment In today's telephony environment, a caller must contact an operator to initiate a conference call and/or have all parties dial a common number to connect into a conference call This requires the cost of a human operator and the inconvenience of dialing a predefined number to be earned as overhead of each conference call. It also makes it very inefficient to schedule a conference call and assure that all parties are available to participate. It also requires a dedicated number for all the parties to access to facilitate the call.
In accordance with a prefeπed embodiment, a callback system is facilitated by a caller accessing a display from a computer and filling out information descnbing the parameters of a call. Information such as the date and time the call should be initiated, billing information, and telephone numbers of parties to participate in the call could be captured. Then, based on the information entered, a central or distributed computing facility with access to the hybπd network transmits e-mail in a note to each party required for the call copying the other parties to verify participation and calendar the event. The e-mail would include any particulars, such as the password associated with the call and time the call would be commenced. The necessary network facilities would also be reserved to assure the appropπate Quality of Service (QOS) would be available, and when the date and time requested amved, the call is initiated by contacting each of the participants whether they be utilizing a telephone attached to a PSTN or a voice capable apparatus (such as a computer or intelligent television) attached to the hybrid network. At any time duπng scheduling, initiation or duration of the call, any party could request operator assistance by selecting that service from the display associated with the call. Thus, a completely automated callback system is provided for call setup and control. For callers that utilize the callback system on a regular basis a custom profile is provided as an extension to the users existing profile information The custom profile allows a user to store frequent conference call participants information The profile contains participant's telephone numbers (which could be DDD, IDDD, IP Address or Cellular phone number). E-mail address, paging service, fax number, secretary phone number, location, time zone, working hours and other pertinent information that will be useful for initiating a call Default profiles based on company or organization needs are also enabled and can be tailored to meet the needs of a particular user based on more global information
Billing information would also be provided online A user could enter a pre-aπanged billing number or the ability to bill to a credit card or telephone number If billing to a telephone number, the system treats the call like a collect or third party call to veπfy billing
If profile information were predefined for a particular call scenaπo, then another option would allow an immediate connection of a conference call or single call at the press of a button, much as speed dialing is performed today except that more than one caller could be joined without intervention of the calling party, Internet callers are supported and an operator can be joined as required
Before descπbing this aspect of the present invention, a descπption of internet environment is presented
Internet
The Internet is a method of interconnecting physical networks and a set of conventions for using networks that allow the computers they reach to interact Physically, the Internet is a huge, global network spanning over 92 countπes and compπsing 59.000 academic, commercial, government, and military networks, according to the Government Accounting Office (GAO), with these numbers expected to double each year Furthermore, there are about 10 million host computers, 50 million users, and 76,000 World-Wide Web servers connected to the Internet The backbone of the Internet consists of a seπes of high-speed communication links between major supercomputer sites and educational and research institutions withm the U S. and throughout the world
Protocols govern the behavior along the Internet backbone and thus set down the key mles for data communication Transmission Control Protocol Internet Protocol (TCP/IP) has an open nature and is available to everyone, meaning that it attempts to create a network protocol system that is independent of computer or network operating system and architectural differences As such, TCP/IP protocols are publicly available m standards documents, particularly m Requests for Comments (RFCs). A requirement for Internet connection is TCP IP, which consists of a large set of data communications protocols, two of which are the Transmission Control Protocol and the Internet Protocol.
The International Telecommunication Union-Telecommunication Standardization Sector ("ITU-
T") has established numerous standards governing protocols and line encoding for telecommunication devices. Because many of these standards are referenced throughout this document, summaries of the relevant standards are listed below for reference.
ITU G.71 1 Recommendation for Pulse Code Modulation of 3kHz Audio Channels.
ITU G.722 Recommendation for 7kHz Audio Coding within a 64kbit/s channel.
ITU G.723 Recommendation for dual rate speech coder for multimedia communication transmitting at 5.3 and 6.3 kbits.
ITU G.728 Recommendation for coding of speech at 16kbit/s using low-delay code excited linear prediction (LD-CELP)
ITU H.221 Frame Stmcture for a 64 to 1920 kbit/s Channel in Audiovisual Teleservices
ITU H.223 Multiplexing Protocols for Low Bitrate Multimedia Terminals
ITU H.225 ITU Recommendation for Media Stream Packetization and Synchronization on non- guaranteed quality of service LANs. ITU H.230 Frame-synchronous Control and Indication Signals for Audiovisual Systems
ITU H.231 Multipoint Control Unit for Audiovisual Systems Using Digital Channels up to 2
Mbit/s
ITU H.242 System for Establishing Communication Between Audiovisual Terminals Using
Digital Channels up to 2Mbits ITU H.243 System for Establishing Communication Between Three or More Audiovisual
Terminals Using Digital Channels up to 2 Mbit/s
ITU H.245 Recommendation for a control protocol for multimedia communication
ITU H.261 Recommendation for Video Coder-Decoder for audiovisual services supporting video resolutions of 352x288 pixels and 176x144 pixels. ITU H.263 Recommendation for Video Coder-Decoder for audiovisual services supporting video resolutions of 128x96 pixels, 176x144 pixels, 352x288 pixels, 704x576 pixels and
1408x1152 pixels.
ITU H.320 Recommendation for Naπow Band ISDN visual telephone systems.
ITU H.321 Visual Telephone Teπninals over ATM ITU H.322 Visual Telephone Terminals over Guaranteed Quality of Service LANs ITU H.323 ITU Recommendation for Visual Telephone Systems and Equipment for Local Area Networks which provide a non-guaranteed quality of service
ITU H.324 Recommendation for Terminals and Systems for low bιtrate(28.8 Kbps) multimedia communication on dial-up telephone lines ITU T.120 Transmission Protocols for Multimedia Data
In addition, several other relevant standards exist including
ISDN Integrated Services Digital Network, the digital communication standard for transmission of voice, video and data on a single communications link.
RTP Real-Time Transport Protocol, an Internet Standard Protocol for transmission of real-time data like voice and video over unicast and multicast networks
IP Internet Protocol, an Internet Standard Protocol for transmission and delivery of data packets on a packet switched network of interconnected computer systems PPP Point-to-Point Protocol
MPEG Motion Pictures Expert Group, a standards body under the International Standards
Organιzatιon(ISO), Recommendations for compression of digital Video and Audio including the bit stream but not the compression algoπthms.
SLIP Seπal Line Internet Protocol RSVP Resource Reservation Setup Protocol
UDP User Datagram Protocol
The populaπty of the TCP/IP protocols on the Internet grew rapidly because they met an important need for worldwide data communication and had several important characteπstics that allowed them to meet this need. These characteπstics, still in use today, include:
1) A common addressing scheme that allows any device running TCP/IP to uniquely address any other device on the Internet.
2) Open protocol standards, freely available and developed independently of any hardware or operating system. Thus, TCP/IP is capable of being used with different hardware and software, even if Internet communication is not required.
Independence from any specific physical network hardware, allows TCP/IP to integrate many different kinds of networks. TCP/IP can be used over an Ethernet, a token πng, a dial-up line, or virtually any other kinds of physical transmission media An understanding of how information travels in communication systems is required to appreciate the recent steps taken by key players in today's Internet backbone business. The traditional type of communication network is circuit switched. The U.S. telephone system uses such circuit switching techniques. When a person or a computer makes a telephone call, the switching equipment within the telephone system seeks out a physical path from the originating telephone to the receiver's telephone. A circuit-switched network attempts to form a dedicated connection, or circuit, between these two points by first establishing a circuit from the originating phone through the local switching office, then across trunk lines, to a remote switching office, and finally to the destination telephone. This dedicated connection exists until the call terminates.
The establishment of a completed path is a prerequisite to the transmission of data for circuit switched networks. After the circuit is in place, the microphone captures analog signals, and the signals are transmitted to the Local Exchange Carrier (LEC) Central Office (CO) in analog form over an analog loop. The analog signal is not converted to digital form until it reaches the LEC Co, and even then only if the equipment is modern enough to support digital information. In an
ISDN embodiment, however, the analog signals are converted to digital at the device and transmitted to the LEC as digital information.
Upon connection, the circuit guarantees that the samples can be delivered and reproduced by maintaining a data path of 64 Kbps (thousand bits per second). This rate is not the rate required to send digitized voice per se. Rather, 64Kbps is the rate required to send voice digitized with the Pulse Code Modulated (PCM) technique. Many other methods for digitizing voice exist, including ADPCM (32Kbps), GSM (13 Kbps), TrueSpeech 8.5 (8.5 Kbps), G.723 (6.4 Kbps or 5.3 Kbps) and Voxware RT29HQ (2.9 Kbps). Furthermore, the 64 Kbps path is maintained from LEC Central Office (CO) Switch to LEC CO, but not from end to end. The analog local loop transmits an analog signal, not 64 Kbps digitized audio. One of these analog local loops typically exists as the "last mile" of each of the telephone network circuits to attach the local telephone of the calling party.
This guarantee of capacity is the strength of circuit-switched networks. However, circuit switching has two significant drawbacks. First, the setup time can be considerable, because the call signal request may find the lines busy with other calls; in this event, there is no way to gain connection until some other connection terminates. Second, utilization can be low while costs are high. In other words, the calling party is charged for the duration of the call and for all of the time even if no data transmission takes place (i.e. no one speaks). Utilization can be low because the time between transmission of signals is unable to be used by any other calls, due to the dedication of the line. Any such unused bandwidth duπng the connection is wasted
Additionally, the entire circuit switching infrastructure is built around 64 Kbps circuits. The infrastructure assumes the use of PCM encoding techniques for voice However, very high quality codecs are available that can encode voice using less than one-tenth of the bandwidth of PCM. However, the circuit switched network blindly allocates 64 Kbps of bandwidth for a call, end-to-end, even if only one-tenth of the bandwidth is utilized. Furthermore, each circuit generally only connects two parties Without the assistance of conference bπdging equipment, an entire circuit to a phone is occupied in connecting one party to another party. Circuit switching has no multicast or multipoint communication capabilities, except when used in combination with conference bπdging equipment
Other reasons for long call setup time include the different signaling networks involved in call setup and the sheer distance causing propagation delay. Analog signaling from an end station to a CO on a low bandwidth link can also delay call setup. Also, the call setup data travels great distances on signaling networks that are not always transmitting data at the speed of light. When the calls are international, the vaπations in signaling networks grows, the equipment handling call setup is usually not as fast as modem setup and the distances are even greater, so call setup slows down even more. Further, in general, connection-oπented virtual or physical circuit setup, such as circuit switching, requires more time at connection setup time than comparable connectionless techniques due to the end-to-end handshaking required between the conversing parties.
Message switching is another switching strategy that has been considered With this form of switching, no physical path is established in advance between the sender and receiver; instead, whenever the sender has a block of data to be sent, it is stored at the first switching office and retransmitted to the next switching point after eπor inspection. Message switching places no limit on block size, thus requinng that switching stations must have disks to buffer long blocks of data; also, a single block may tie up a line for many minutes, rendenng message switching useless for interactive traffic.
Packet switched networks, which predominate the computer network industry, divide data into small pieces called packets that are multiplexed onto high capacity mtermachine connections. A packet is a block of data with a stnct upper limit on block size that carnes with it sufficient identification necessary for delivery to its destination Such packets usually contain several hundred bytes of data and occupy a given transmission line for only a few tens of milliseconds Delivery of a larger file via packet switching requires that it be broken into many small packets and sent one at a time from one machine to the other The network hardw are delivers these packets to the specified destination, where the software reassembles them into a single file
Packet switching is used by virtually all computer interconnections because of its efficiency m data transmissions Packet switched networks use bandwidth on a circuit as needed, allowing other transmissions to pass through the lines m the inteπm Furthermore, throughput is increased by the fact that a router or switching office can quickly forward to the next stop any given packet, or portion of a large file, that it receives, long before the other packets of the file have arπved In message switching, the intermediate router would have to wait until the entire block was delivered before forwarding Today, message switching is no longer used in computer networks because of the supeπoπty of packet switching
To better understand the Internet, a compaπson to the telephone system is helpful The public switched telephone network was designed with the goal of transmitting human voice, in a more or less recognizable form Their suitability has been improved for computer-to-computer communications but remains far from optimal A cable running between two computers can transfer data at speeds in the hundreds of megabits, and even gigabits per second A poor eπor rate at these speeds would be only one eπor per day In contrast, a dial-up line, using standard telephone lines, has a maximum data rate in the thousands of bits per second, and a much higher eπor rate In fact, the combined bit rate times eπor rate performance of a local cable could be 11 orders of magnitude better than a voice-grade telephone line New technology, however, has been improving the performance of these lines
The Internet is composed of a great number of individual networks, together forming a global connection of thousands of computer systems After understanding that machines are connected to the individual networks, we can investigate how the networks are connected together to form an internetwork, or an internet At this point, internet gateways and internet routers come into play.
In terms of architecture, two given networks are connected by a computer that attaches to both of them. Internet gateways and routers provide those links necessary to send packets between networks and thus make connections possible Without these links, data communication through the Internet would not be possible, as the information either would not reach its destination or would be incomprehensible upon amval A gateway may be thought of as an entrance to a communications network that performs code and protocol conversion betw een two otherwise incompatible networks For instance, gateways transfer electronic mail and data files between networks over the internet
IP Routers are also computers that connect networks and is a newer term prefeπed by vendors These routers must make decisions as to how to send the data packets it receives to its destination through the use of continually updated routing tables By analyzing the destination network address of the packets, routers make these decisions importantly, a router does not generally need to decide which host or end user will receive a packet, instead, a router seeks only the destination network and thus keeps track of information sufficient to get to the appropπate network, not necessaπly the appropπate end user Therefore, routers do not need to be huge supercomputing systems and are often just machines with small mam memoπes and little disk storage The distinction between gateways and routers is slight, and cuπent usage blurs the line to the extent that the two terms are often used interchangeably In cuπent teπnmology, a gateway moves data between different protocols and a router moves data between different networks So a system that moves mail between TCP/IP and OSI is a gateway, but a traditional IP gateway (that connects different networks) is a router
Now, it is useful to take a simplified look at routing in traditional telephone systems The telephone system is organized as a highly redundant, multilevel hierarchy Each telephone has two copper wires coming out of it that go directly to the telephone company's nearest end office, also called a local central office The distance is typically less than 10 km, in the U.S alone, there are approximately 20,000 end offices The concatenation of the area code and the first three digits of the telephone number uniquely specify an end office and help dictate the rate and billing structure
The two-wire connections between each subscπber' s telephone and the end office are called local loops If a subscπber attached to a given end office calls another subscπber attached to the same end office, the switching mechanism within the office sets up a direct electπcal connection between the two local loops This connection remains intact for the duration of the call, due to the circuit switching techniques discussed earlier. If the subscπber attached to a given end office calls a user attached to a different end office, more work has to be done in the routing of the call. First, each end office has a number of outgoing lines to one or more nearby switching centers, called toll offices. These lines are called toll connecting trunks. If both the caller's and the receiver's end offices happen to have a toll connecting tmnk to the same toll office, the connection may be established within the toll office.
If the caller and the recipient of the call do not share a toll office, then the path will have to be established somewhere higher up in the hierarchy. There are sectional and regional offices that form a network by which the toll offices are connected. The toll, sectional, and regional exchanges communicate with each other via high bandwidth mter-toll trunks. The number of different kinds of switching centers and their specific topology vanes from country to country, depending on its telephone density
Using Network Level Communication for Smooth User Connection
In addition to the data transfer functionality of the Internet, TCP/IP also seeks to convince users that the Internet is a solitary, virtual network. TCP/EP accomplishes this by providing a universal interconnection among machines, independent of the specific networks to which hosts and end users attach. Besides router interconnection of physical networks, software is required on each host to allow application programs to use the Internet as if it were a single, real physical network.
The basis of Internet service is an underlying, connectionless packet delivery system run by routers, with the basic unit of transfer being the packet. In internets running TCP/EP, such as the Internet backbone, these packets are called datagrams. This section will briefly discuss how these datagrams are routed through the Internet.
In packet switching systems, routing is the process of choosing a path over which to send packets. As mentioned before, routers are the computers that make such choices. For the routing of information from one host within a network to another host on the same network, the datagrams that are sent do not actually reach the Internet backbone. This is an example of internal routing, which is completely self-contained within the network. The machines outside of the network do not participate in these internal routing decisions.
At this stage, a distinction should be made between direct delivery and indirect delivery. Direct delivery is the transmission of a datagram from one machine across a single physical network to another machine on the same physical network. Such deliveries do not involve routers. Instead, the sender encapsulates the datagram in a physical frame, addresses it, and then sends the frame directly to the destination machine.
Indirect delivery is necessary when more than one physical network is involved, in particular when a machine on one network wishes to communicate with a machine on another network.
This type of communication is what we think of when we speak of routing information across the Internet backbone. In indirect delivery, routers are required. To send a datagram, the sender must identify a router to which the datagram can be sent, and the router then forwards the datagram towards the destination network. Recall that routers generally do not keep track of the individual host addresses (of which there are millions), but rather just keeps track of physical networks (of which there are thousands). Essentially, routers in the Internet form a cooperative, interconnected stmcture, and datagrams pass from router to router across the backbone until they reach a router that can deliver the datagram directly.
The changing face of the internet world causes a steady inflow of new systems and technology.
The following three developments, each likely to become more prevalent in the near future, serve as an introduction to the technological arena.
Asynchronous Transfer Mode (ATM) is a networking technology using a high-speed, connection-oriented system for both local area and wide area networks. ATM networks require modern hardware including:
1) High speed switches that can operate at gigabit (trillion bit) per second speeds to handle the traffic from many computers.
2) Optical fibers (versus copper wires) that provide high data transfer rates, with host-to- ATM switch connections running at 100 or 155 Mbps (million bits per second).
3) Fixed size cells, each of which includes 53 bytes.
ATM incorporates features of both packet switching and circuit switching, as it is designed to carry voice, video, and television signals in addition to data. Pure packet switching technology is not conducive to carrying voice transmissions because such transfers demand more stable bandwidth.
Frame relay systems use packet switching techniques, but are more efficient than traditional systems. This efficiency is partly due to the fact that they perform less eπor checking than traditional X.25 packet-switching services. In fact, many intermediate nodes do little or no eπor checking at all and only deal with routing, leaving the eπor checking to the higher layers of the system With the greater reliability of today's transmissions, much of the eπor checking previously performed has become unnecessary Thus, frame relay offers increased performance compared to traditional systems
An Integrated Services Digital Network is an "international telecommunications standard for transmitting voice, video, and data over digital lines," most commonly mnnmg at 64 kilobits per second The traditional phone network ns voice at only 4 kilobits per second. To adopt ISDN, an end user or company must upgrade to ISDN terminal equipment, central office hardware, and central office software. The ostensible goals of ISDN include the following:
1) To provide an internationally accepted standard for voice, data and signaling,
2) To make all transmission circuits end-to-end digital,
3) To adopt a standard out-of-band signaling system; and
4) To bnng significantly more bandwidth to the desktop
An ISP is composed of several disparate systems. As ISP integration proceeds, formerly independent systems now become part of one larger whole with concomitant increases in the level of analysis, testing, scheduling, and training in all disciplines of the ISP.
Internet-Based Callback Architecture
The following information discusses the detailed architecture of an internet-based callback architecture in accordance with a prefeπed embodiment A block diagram of the architecture is illustrated in Figure 114 in accordance with a prefeπed embodiment. The callback call flow commences when a caller 11412 calls into a local internet service provider 11419 as illustrated in
Figure 114 at 11410. The caller addresses the callback server 11414 to access the callback home page 11411 through the internet 11419, shown as an internet cloud labeled Basic Inernet Protocol Platform 11419. At the callback server home page 11411, the caller enters, sees and/or updates default information such as: callback Internet Protocol (IP) address, call-to phone number (or multiple phone numbers to initiate a conference call) and charge-to method at a minimum. Other information, such as one or more numbers comprising entry of a Direct Distance Dialing (DDD), International Direct Distance Dialing (EDDD) or an Internet Protocol (IP) address can be utilized to specify a phone number or internet computer with voice capability. In addition, a date and time can be preaπanged for staging the callback operation. Additional information that can be captured at the callback server home page 11411 is detailed below in specific examples designed to elaborate and claπfy in accordance with a prefeπed embodiment
Then, at 11420, the callback server 11414 send a message to the callback switch 11432 with the appropπate calling information, and the callback switch 11432 initiates the callback leg as shown by step 11430 of the call through the Public Service Telephony Network (PSTN) 11435 to the destination specified by the caller whereby the callback caller answers the incoming call to 11437 Once the caller end of the call is prepared, then the callback switch initiates call-to call leg(s) which connect the call through path 11440 through PSTN 11445 to telephone set 11446 and or 11447 Once all of the callers have been connected, then when the status of the call changes, an exception condition is indicated on the display if it is an IP call, or an audio indicia of the condition is transmitted to the callers if they are utilizing a standard telephony device A change in status could be a caller hanging up or a glitch occurπng in the transmission The exception conditions are also captured for quality of service analysis
When the call is initiated utilizing the information entered into the callback server home page 11411, as part of the initialization of the callback session, a separate temporary webpage is created which is accessible to all members of the callback via a password selected by the initiator of the callback session While all of the callers are being connected and throughout the duration of the telephony expeπence, the status of the call leg changes, and exception conditions, are indicated on the temporary created status webpage, or an audio indicia, where appropπate, of the condition is transmitted to the callers if they are utilizing a standard telephony device Then, as callers are connected, removed, or change status, the display is updated to reflect the status of each participant's connection In addition, as the call progresses, participants can drag and drop files, video clips or any other information which would be utilized as collaborative mateπal duπng the call. Each participant would be required to move information to their personal computer before the call terminated, since the webpage is temporary and is deleted upon termination of the call. The temporary webpage is password protected to avoid unauthoπzed access to the information contained in the webpage
Callback Service Potential
The callback service includes support for one-to-one calling, one-to-many calling (conference calling, fax broadcast, text-to-speech message delivery, voice-to-voice message delivery, conference call reservation whereby the server sends E-mails to call-to participants with the conference call details, the server sends fax to call-to participants, or the server sends a text-to- speech message to call-to participants.
Internet Service Potential
Real-time view of the status of each conference call participant. ANI and an alphanumeric representation to identify each participant entered by the initiator when a call is "reserved" can be displayed on screen as participants connect to conference. This information is captured as part of the call record set forth earlier and detailed in the appendix.
In an alternative embodiment, a conference call without callback leg is enabled. In this embodiment, a callback customer participates through a Voice Over Network (VON) application utilizing a computer with voice capability, and can initiate a video screen popup on the computer display for manual operator assistance as detailed above in the description of a video operator.
Internet-Based Callback Architecture
In an internet based callback architecture as illustrated in Figure 115, the callback caller dials into a local internet service provider 11512. Then, the caller addresses the host server 11514 containing the callback home page 11510 - 11511. At the callback server home page 11511, the caller enters the information described earlier including a callback Internet Protocol (EP) address, call-to phone number (or multiple phone numbers to initiate a conference call) and charge-to method at a minimum. Then, for the callback call flow to initiate the call, the callback server 11514, where the callback server home page 11511 is located, transmits a message to the callback switch 11532 with the necessary calling information generated from the callback home page 11511. Finally, the callback switch 11532, establishes an internet voice session with the callback caller utilizing the internet service provider 11512 to establish a voice EP session with the initiating client 11535. The callback switch 11511 then initiates the call-to call leg(s) routing the call 11540 out over the public service telephony network 11541 to a telephone set 11542.
Self-Regulating System
An expert system monitors each call in accordance with a prefeπed embodiment. The system includes mles that define what logic to execute when an exception occurs. The mles include specialized processing based on whether the call is routed via a PSTN or the internet. In addition, the system includes a default connection to a manual operator if no other coπection of the connection is available. For example, if a caller hangs up during a teleconference and other callers are still connected, an exception message is sent to each of the still connected callers informing them of the status change. Another aspect of the expert system is to ensure quality of service (QOS) and produce reports indicating both integrity and exceptions. Scheduling of resources is tied to this expert system, which regulates whether calls can be scheduled based on available or projected resources at the time of the proposed call. For example, since all calls used by this system are initiated by the callback switch (item 11432 in Figure 114 and item 11532 in Figure 115), if there are insufficient outgoing trunk ports during the period of time that a callback subscriber requests, then the callback subscriber is prompted to select another time or denied access to the resources for that time. This is utilized to predict when additional ports and/or resources are required.
Fault Management
The NGN operations architecture specifies the points of insertion and collections for network wide events that feed the Fault Management systems. Since the components of the packet portion of the hybrid NGN infrastructure are in most cases manageable by SNMP or some other standard management protocol the major challenges are the following:
1. Coπelation of the events from the packet infrastructure with the Core circuit-based network events to provide the operators with a seamless service oriented view of the overall health of the network;
2. Event gathering and interpretation from the Core circuit network elements; and
3. Mediation and standardization of the network messages to aid processing by the network management framework of the NGN.
The network management components of the NGN provide comprehensive solutions to address these challenges. Coπelation is provided by the use of mles based inference engines. Event gathering and interpretation is typically performed by custom development of software interfaces which communicate directly with the network elements, process raw events and sort them by context prior to storing them. For example, alarms versus command responses. The mediation and standardization challenge is addressed by using a comprehensive library of all possible message types and network events categorize the numerous messages that the NGN generates. Figure 15A is a flowchart showing a Fault Management Process 1550 in accordance with a prefeπed embodiment of the present invention The Fault Management Process 1550 begins with a transmitting step 1552 In step 1552, data is transmitted over the hybπd network. including video and mixed audio information The data transmission generally makes full use of the hybπd networks mixed circuit-switched an packet-switched components As discussed above, the hybπd net ork includes approximately all the advantages of a packet based network while still making use of the older circuit-switched components already in place The system is able to do this by coπelating events raised by both the circuit-switched and packet-switch network elements, as discussed later in relation to event and coπelating steps 1554 and 1556
In a circuit-switched ev ent gathenng step 1554, an event is obtained from a circuit-switched based network element As discussed above, event gathenng and interpretation is typically performed by custom developed software interfaces which communicate directly w ith the network elements, process raw network events, and sort the events by context pnor to stoπng them After obtaining the events, the events are coπelated in a coπelation step 1556
In a coπelation step 1556, the event gathered in step 1554 is coπelated with a second event obtained from a packet-switched network element As with circuit-switched network elements, packet-switched event gathenng and interpretation is typically performed by custom developed software interfaces which communicate directly with the network elements, process raw network events, and sort the events by context pnor to stoπng them As discussed above, the coπelation is preferably provided by a mles based inference engine After the events are coπelated, a fault message is created in a fault message step 1558
In a fault message step 1558, a fault message is created based on the coπelated first and second events obtained in steps 1554 and 1556 Preferably the fault message is created utilizing a comprehensive library of all possible message types and network events which categonzes the numerous messages that the hybπd network generates
Figure 15B is a block diagram showing a Fault Management component 1500 in accordance with a prefeπed embodiment of the present invention The Fault Management component 1500 records failures and exceptions in network devices (e g network routers or UNIX servers) and performs the following operations 1 ) performs root-cause coπelation of the failures and exceptions,
2) immediately takes coπective and/or informative actions such as sending a page, logging a help desk ticket, sending an electronic mail message, or calling a resolution scnpt,
3) stores the information into a Database Component for later analysis by the Reporting Component, and
4) allows real time viewing of faults in a network map and network event views The Fault Management component 1500 includes the follow ing elements
UNIX Servers 1502- Any UNIX Server with BMC Patrol clients loaded
NT Servers 1504 - Any NT Server with BMC Patrol clients loaded
SNMP Devices 1506 - Any SNMP manageable device
HP OV Network Node Manager (Collector Component) 1508 - HP OpenView Network Node
Manager is one product which performs several functions In this context it is it is responsible for receiving performance information from BMC Patrol clients via BMC Patrol View
Seagate NerveCenter 1510 - In a fault management context, Seagate NerveCenter performs root- cause coπelation of faults and events across the network
HP OV Network Node Manager Network Map 1512 - HP OpenView Network Node Manager is one product which performs several functions In this context it is responsible for maintaining and displaying the node level network map of the network the MNSIS architecture monitors
HP OV Network Node Manager 1514 - HP OpenView Network Node Manager is one product which performs several functions In this context it is it is responsible for receiving and displaying all events, regardless of their source
Netcool HP OV NNM Probe 1516 - An Omnibus Netcool probe which is installed on the same system as HP OV Network Node Manager and forwards events to the Omnibus Netcool Object Server.
Micromuse Internet Service Monitors 1518- An Omnibus Netcool suite of active probes (momtors) which monitor internet services such as FTP, POP3, SMTP, NNTP, DNS, HTTP, and RADEUS These monitors collect av ilability and performance data and forward the information as alerts to the Omnibus Netcool Object Server
Netcool Obiect Server 1520 - The Omnibus Netcool Object Server is a real-time memory resident database which stores all cuπent events (alerts) The ev ents are viewable by operations personnel using a number of event lists and views, all of which are highly customizable by each operator
Notification Spooler 1522 - A custom provided sub-component which spools job-files that specify which events have occuπed for possible notifications
Spooled Job 1524 - Each spooled job represents a specific ev ent that was received by the Netcool Object Server and may need to result in one or more notification actions Each job is stored as a file in a special notification spool directory
Notification Actor 1526 - A custom provided sub-component which determines the alert time, source node, and alert type from the loaded spooled job and initiates notification actions based as specified in the configuration file Notification actions include alphanumeπc pages, trouble tickets, email, and resolution scπpts Multiple notification actions can be specified in the configuration files such that different actions are taken for different alert times, source nodes, and/or alert types Default actions are also supported
Alphanumeπc Page 1528 - An alphanumeπc page sent using Telamon TelAlert via modem dialing the relevant paging provider The alphanumeπc page message provides contextual notification of actions to be performed Context can include any information but frequently contains information such as the device name, problem descπption, and pπoπty
Electronic Mail Message 1530 - An internet mail message send using the UNIX mail utility The mail message is frequently used to provide non-urgent notification of situations or actions automatically performed by the MNSIS architecture along with detailed context
Local Scπpt Execution 1532 - Initiates any local scπpt on the machine, which may initiate scπpts or applications on other machines Remedy Gateway 1534 - The Omnibus Netcool Remedy Gateway automatically reads alerts in the Netcool Object Server and opens tickets within Remedy as customized by the user The Remedy trouble ticket ID is returned to the Omnibus and can be viewed as further reference
Remedy 1536 - Remedy Action Request System, a trouble ticketing system
Oracle Gateway 1538 - The Omnibus Netcool Oracle Gateway automatically reads alerts in the Netcool Object Server and logs records within Oracle as customized by the user
Oracle 1540 - Oracle is a relational database management system
Generate Time Key Scπpt 1542 - Script which generates New Time Records from alerts in the Netcool Object Server
New Time Records 1544 -Time records coπesponding to new alerts in Netcool Object Server which need to be added to the Oracle time tables
SOL Loader Scπpt 1546 - A custom scπpt which automatically loads records into Oracle via SQL Loader Direct Load
Proactive Threshold Manager
The Proactive Threshold Manager is an automated network manager that forewarns service providers of a chance that a service level agreement to maintain a certain level of service is in danger of being breached
The Proactive Threshold Manager provides real-time threshold analysis (that is, it continuously monitors for plan thresholds that have been exceeded) using algoπthms It receives call detail records from the Server and returns alarms which may be retπeved and examined using an NGN workstation. The threshold manager resides on an NGN hybπd network computer
A threshold generally is a number which, when exceeded, generates an alarm in the Proactive Threshold Manager indicating possible breach of a service level agreement Thresholds may be specified for the time of day and/or the day of the week. Furthermore, a threshold may be applied to each category for which the Proactive threshold manager keeps counts, including the number of short-duration calls, long-duration calls, and cumulative minutes When an alarm is generated by the Proactiv e Threshold Manager, it is also pπontized The pπonty is a multiple of the number of times a threshold has been exceeded For example, if the threshold was 10 and the relevant count has reached 50, then the pπoπty of the alaπn is 5 (50 dιv l0)
Each alarm is available to an NGN hybπd network analyst \ la an NGN W orkstation The workstation is a PC with access to a Server and retπeves the next available alarm of the highest pπonty The analyst investigates the alarm data and, if a service level agreement breach is suspected, notifies the provider and suggests appropπate actions to stop the breach
Figure 16A is a flowchart showing a Proactive Threshold Management Process 1600 in accordance with a prefeπed embodiment of the present invention The process begins with a monitoπng step 1602 In step 1602, the Proactive Threshold Manager monitors the NGN hybπd network The Proactive Threshold Manager generally monitors the network at all times to ensure proper service is provided to subscnbers of the network, by assisting service providers m maintaining a proper level of service
In a minimum level determination step 1604, the Proactive Threshold Manager determines the minimum level of service needed to avoid breaching subscπber service level agreements Service level agreement information is generally provided to the Proactive Threshold Manager by the mles database which contains most pertinent subscπber information
In a sensing step 1606, the Proactive Threshold Manager senses the cuπent level of service which is being provided to customers Protocol converters assist the Proactive Threshold
Manager in communicating with vaπous components of the system Protocol converters are able to translate information between the packet-switched an circuit-switched system components, thus allowing the Proactive Threshold Manager to communicate with all the components of the hybπd system
In a compaπng step 1608, the Proactive Threshold Manager compares the cuπent level of service, sensed in step 1606, with the minimum level of service, determined in step 1604, to determine where the cuπent level of service is in relation to the minimum level service which needs to be provided to subscnbers
In an alarm step 1610, the Proactive Threshold Manager provides an indication or alarm to the service provider if the cuπent level of service is within a predetermined range with respect to the mimmum level of service. The threshold is preferably chosen such that the service provider is allowed enough time to cure the service level problem before the minimum service level is reached and the subscriber's service level agreement breached.
Figure 16B is a flowchart showing a Network Sensing Process 1620 in accordance with one embodiment of the present invention. The Network Sensing Process 1620 begins with an element monitoring step 1622. In step 1622, custom developed element software monitors the individual network elements and generates events based on hardware occuπences, such as switch failures. Typically, the various elements that make up the hybrid network are very different from one another. Thus, custom software is generally needed for each network element or group of related network elements. The custom developed software communicates directly with the hardware and generates events when various occuπences related to the individual hardware happens. For example, when a hardware element fails, the related element software senses the failure and generates an event indicating the hardware failure and the general nature of the failure. The events are then routed to an element manger to processed.
In an event processing step 1624, events generated in step 1622 are filtered, aggregated, and coπelated by an element manager. The element manager is where the primary data reduction functions reside. The element manager filters, aggregates, and coπelates the events to further isolate problems within the network. Any information that is deemed critical to monitor and manage the network is translated into standard object format in a translation step 1626.
In a translation step 1626, information from step 1624 that is deemed critical to monitor and manage the network is translated into a standard object format. Generally, typical operational events are only logged and not translated into standard object format. However, critical information, such as hardware failure, is translated and forwarded to the Information Services Manager in an information provisioning step 1628.
In an information provisioning step 1628, information from step 1626 is received by the Information Services Manager and forwarded to the Proactive Threshold Manager. The
Information Services Manager provides the data management and data communications between the element manager and other system components. Generally, the Information Services Manager adheres to CORBA standards to provide universal information access by an object request broker. The object request broker allows the Information Services Manager to share management information stored in distributed databases. The Proactive Threshold Manager uses the information provided by the Information Services Manger to determine a cuπent level of service and compare the cuπent level of services with the minimum level of service that the service provider can provide without violating SLAs. Element Management
As discussed above, the element manager w orks with the Information Services Manager and the Presentation Manager to assist in the management of the hybπd network system The three components are bnefly descπbed below to provide context for the detailed discussion of the element manager that follows
Element Manager
The element manager communicates with the network elements to receive alarms and alerts through trapping and polling techniques The element manager is the la er where the pπmary data reduction functions reside At this layer, events received at the element manager will be filtered, aggregated and coπelated to further isolate problems within the network Information that is deemed cπtical to monitor and manage the network is translated into a standard object format and forwarded to the Information Services
Manager An element manager can be, but is not necessaπly, software which adheres to open standards such as the Simple Network Management Protocol (SNMP) and the Object Management Group's (OMG) Common Object Request Broker Architecture (CORBA)
Information Services Manager
The information services manager provides the data management and data communications between element managers and presentation managers All information forwarded from the element managers is utilized by the information services manager to provide information to the network operators The information services manager adheres to CORBA standards to provide ubiquitous information access via an object request broker (ORB) The ORB allows the information services manager to share management information stored m distπbuted databases
The information services manager stores cπtical management information into operational (real-time) and analytical (histoπcal) distπbuted databases These databases provide common data storage so that new products can be easily inserted into the management environment For example, if an event is received at an element manager that is deemed cπtical to display to a network user, the information services manager will store a copy of the alarm in the operational database and then forw ard the alarm to the appropπate network operator.
Media and textual databases are also provided by the information services manager The databases includes online manuals for administrative purposes, as well as for the maintenance specialists to access element specific information The databases also provide procedures, policies and computer based training to network users
The information services manager provides requested information (real-time and histoπcal) to the network users via the presentation manager
Presentation Manager
The presentation manager performs the function its name implies the presentation of the information to an end user Because different locations and job functions require access to different types of information, there are at least two types of display methods The first is for graphic intensive presentations and the second is for nomadic use, such as field technicians The first environment requires a graphic intensive display, such as those provided by X-
Windows/MOTIF. The second environment is potentially bandwidth poor where dial-up or wireless access may be used along with more traditional LAN access. This is also where browser technology is employed
The Element Management Aspect of the present invention works in conjunction with other components of the system, such as Fault Management, to provide communication between the various network elements of the system.
Figure 17 is a flowchart showing an Element Management Process 1700 in accordance with a prefeπed embodiment of the present invention. The Element Management Process 1700 begins with a monitoπng step 1702. In step 1702, the Element Manager monitors the system for events generated by network elements. Generally, the Element Manager continuously monitors the system to translate events for other system components, such as the Fault Management Component.
In an event receiving step 1704, the Element Manager receives events from vaπous network elements. Preferably the events are provided by custom software interfaces which communicate directly with network elements. The software interfaces preferably process the raw network events and sort them by context pnor to providing the events to the Element Manager. In a filteπng and coπelating step 1706, the Element Manager filters and coπelates the events received in step 1704 Preferably the coπelation is provided by a mles based inference engine After collecting and coπelating the events, the Element Manager performs a translation step 1708 In step 1708, the events coπelated in step 1706 are translated into standard object format Generally a comprehensive library of all message types generated by the hybπd system is utilized to translate the coπelated events into standard object format Once the events are translated, they are ready for use by other system components, such as Fault Management or Billing
Customer Support Structure
The organization model for customer service support in the NGN network provides a single point of contact that is customer focused This single point of contact provides technical expertise m resolving customer incidents, troubles and requests Generally a three tiered support stmcture is greatly increases customer satisfaction in service needs. Each tier, or level, possess an increased level of skill, with tasks and responsibilities distπbuted accordingly
Figure 18 is a flowchart showing a Three Tiered Customer Support Process 1800 m accordance with a prefeπed embodiment of the present invention The Three Tiered Customer Support Process 1800 begins with a First Tier step 1802. In step 1802, a customer with a hybπd network problem is provided access to customer support personnel having a broad set of technical skills The broad set of technical skills allows this group to solve about 60-70% of all hybπd network problems. If the customers network problem is solved at this stage, the process ends However, if the customers network problem is not solved at this stage, the process continues to a Second Tier step 1804.
In the Second Tier step 1804, the customer is provided access to technical experts and field support personnel who may specialize m specific areas. The greater specialized nature of this group allows it to solve many problems the group in step 1802 could not solve This group is generally responsible for solving 30-40% of all hybπd network problems. If the customers network problem is solved at this stage, the process ends. However, if the customers network problem is not solved at this stage, the process continues to a Third Tier step 1806.
In the Third Tier step 1806, the customer is provided access to solution experts who are often hardware vendors, software vendors, or customer application development and maintenance teems. Customer network problems that get this far m the customer support process 1800 need individuals possessing in-depth skills to investigate and resolve the difficult problems with there area of expertise Solution experts are the last resort for solving the most difficult problems Typically this group solves about 5% of all hybπd network problems
The above model is generally refeπed to as the Skilled Model because personnel at all three tiers are highly skilled This model generally creates a high percentage of calls resolved on the first call Other approaches include a Functional Model, and a Bypass Model In the Functional Model users are requested to contact different areas depending on the nature of the incident Calls are routed to the customer support representative best able to handle the call This model can easily be coupled with the Skill Model above In the Bypass Model First Tier only logs calls, they do not resolve calls One advantage of this model is that skilled resources don't have to waste time logging calls
In more detail, a customer calling a customer support center m accordance with one embodiment of the present invention is first asked a senes of questions by an interactive voice response (IVR) system or an live operator The customer uses Touch-Tone keys on the telephone to respond to these quenes from the EVR, or responds normally to a live operator
When a product support engineer becomes available, the previously gathered information (both from the IVR query responses and the diagnostic information solicited from the system problem handlers and element managers) is available to the product support engineer
After reviewing the situation with the customer, the product support engineer can query the customer's computer via support agents for additional information, if necessary
In systems according to the prefeπed embodiment, the customer spends less time interacting with a product support engineer, and is relieved of many of the responsibilities in diagnosing and resolving problems Automated diagnoses and shorter customer interactions save the product support center time, resources, and money At the same time, the customer receives a better diagnosis and resolution of the problem than could usually be achieved with pnor art product support techniques
In addition, one embodiment of the present invention makes the Internet a viable alternative to telephone calls as a tool for providing consumer product support Many on-line computer services, such as Prodigy and Amenca On-Line, provide, for a fee as a part of their on-line service, software for connecting to and accessing the Internet The Internet access software accesses and "handshakes" with an "Internet Entry Server", which veπfies the PEN number, provides the access and times the user's access time The Internet Entry Server is programmed to recognize the PIN number as entitling the user to a limited prepaid or "free" Intemet access time for on-line help services Such a time peπod could be for a total time peπod such as 1 hour or more, or access to on-line help services can be unlimited for 90 days, 6 months, etc , for example, with the access time paid for by the sponsor/vendor The first time a customer uses the on-line help service, the Internet Entry Server performs a registration process which includes a number of personal questions and custom data gathenng in the form of quenes provided by the sponsor/vendor for response by the user
The pertinent answers are then immediately provided to the sponsor/vendor The Internet Entry
Server then "hot-links" the customer to the sponsor/vendor's Intemet domain or Home Page for a mandatory "guided tour" where the user is exposed to any cuπent product promotion by the sponsor/vendor and can download promotional coupons, product information, etc After this mandatory guided tour is completed, the customer is allowed to enter quenes for help in installing or using the sponsor/vendor's product As an optional promotional service, upon termination of the on-line help session, access to other information on the Internet can be provided Once the "free" on-line help service time or time period is up, the Internet Entry Server prompts the user with one or more of a plurality of options for extending the availability of online help For example, the user can be prompted to enter a credit card number to which on-line help charges can be charged, he or she can be given the opportunity to answer additional survey information in return for additional "free" on-line help, or a 900 subscnber paid telephone access number can be provided through which additional on-line help will be billed via the normal telephone company 900 billing cycles
Integrated IP Telephony User Interface
One embodiment of the present invention allows a user of a web application to communicate in an audio fashion in-band without having to pick up another telephone Users can click a button and go to a call center through a hybπd network using IP telephony The system invokes an EP telephony session simultaneously with the data session, and uses an active directory lookup whenever a person uses the system
Figure 19 is a flowchart showing an integrated EP telephony process 1900 in accordance with a prefeπed embodiment of the present invention The IP telephony process 1900 begins with a transmitting step 1902. In step 1902, data is transmitted over the hybπd network duπng a data session This data session is typically a normal Internet browsing session, and is generally initiated by a web browser Utilizing a web browser, users begin the data session by performing actions such as searching for web sites or downloading data from Internet sites Duπng the data session, the present invention allows users the option to initiate phone calls without the need to use another telephone.
In a telephony step 1904, the present invention allows users to initiate and continue telephonic communication The telephonic is routed by a user action in step 1906. when a user selects a phone number to call. Telephone numbers are typically included in a telephone directory accessible on screen by the user In addition, the directory may include icons which provide a highly recognizable visual mnemonic to allow users to easily recall the information included in a particular directory entry The present invention utilizes the routing information to direct the call. Since both the oπgmal data from the data session and the new IP telephony data use Internet protocol, the present invention can provide a seamless integration of the two, to provide virtually simultaneous telephonic and non-telephonic data communication The availability of packet switching elements in the hybπd network facilitate this process.
In packet switching networks, packets in the form of units of data are transmitted from a source- such as a user terminal, computer, application program within a computer, or other data handling or data communication device— to a destination, which may be simply another data handling or data communication device of the same character. The devices themselves typically are refeπed to as users, in the context of the network. Blocks or frames of data are transmitted over a link along a path between nodes of the network. Each block consists of a packet together with control information in the form of a header and a trailer which are added to the packet as it exits the respective node. The header typically contains, in addition to the destination address field, a number of subfields such as operation code, source address, sequence number, and length code.
The trailer is typically a technique for generating redundancy checks, such as a cyclic redundancy code for detecting eπors. At the other end of the link, the receiving node stnps off the control information, performs the required synchronization and eπor detection, and reinserts the control information onto the departing packet.
Packet switching arose, in part, to fulfill the need for low cost data communications in networks developed to allow access to host computers. Special purpose computers designated as communication processors have been developed to offload the communication handling tasks which were formerly required of the host. The communication processor is adapted to interface with the host and to route packets along the network, consequently, such a processor is often simply called a packet switch Data concentrators have also been developed to interface with hosts and to route packets along the network In essence, data concentrators serve to switch a number of lightly used links onto a smaller number of more heavily used links Thev are often used in conjunction with, and ahead of, the packet switch
In virtual circuit (VC) or connection-oπented transmission, packet-switched data transmission is accomplished via predetermined end-to-end paths through the network, in which user packets associated with a great number of users share link and switch facilities as the packets travel over the network The packets may require storage at nodes between transmission links of the network until they may be forwarded along the respective outgoing link for the ov erall path In connectionless transmission, another mode of packet-switched data transmission, no initial connection is required for a data path through the network In this mode, individual datagrams carrying a destination address are routed through the network from source to destination via intermediate nodes, and do not necessanly amve in the order in which they were transmitted
In a lookup step 1908, the telephonic communication over the hybπd network is limited bases on a user profile Preferably the user profile is included in a mles database By locating the user profile within the mles database, the mles database can provide seamless cross-location registration without the need for duplicate databases located on different networks Using a mles database, a user utilizing the Intemet in Europe can get the same telephony service as provided in the United States, as descπbed above Preferably the computer used to interface with the Intemet includes multimedia equipment such as speakers and a microphone Utilizing a multimedia equipped computer allows a user to use telephonic communication with little or no disruption while interfacing with the Internet Multimedia computer speakers are used to receive the telephony audio from the network and the microphone is used to transmit the telephony data to the network
Data Mining
The present invention includes data mining capability that provides the capability to analyze network management data looking for patterns and coπelations across multiple dimensions The system also constmcts models of the behavior of the data in order to predict future growth or problems and facilitate managing the network in a proactive, yet cost-effective manner.
A technique called data mining allows a user to search large databases and to discover hidden patterns in that data. Data mining is thus the efficient discovery of valuable, non-obvious information from a large collection of data and centers on the automated discovery of new facts and underlying relationships in the data. The term "data mining" comes from the idea that the raw material is the business data, and the data mining algorithm is the excavator, shifting through the vast quantities of raw data looking for the valuable nuggets of business information.
Because data can be stored in such a wide variety of formats and because the data values can have such a wide variety of meanings, data mining applications have in the past been written to perform specific data mining operations, and there has been little or no reuse of code between application programs. Thus, each data mining application is written from scratch, making the development process long and expensive. Although the nuggets of business information that a data mining application discovers can be quite valuable, they are of little use if they are expensive and untimely discovered. Returning to the mining analogy, even if gold is selling for
$900 per ounce, nobody is interested in operating a gold mine if it takes two years and $901 per ounce to get it out of the ground.
Accurate forecasting relies heavily upon the ability to analyze large amounts of data. This task is extremely difficult because of the sheer quantity of data involved and the complexity of the analyses that must be performed. The problem is exacerbated by the fact that the data often resides in multiple databases, each database having different internal file structures.
Rarely is the relevant information explicitly stored in the databases. Rather, the important information exists only in the hidden relationships among items in the databases. Recently, artificial intelligence techniques have been employed to assist users in discovering these relationships and, in some cases, in automatically discovering the relationships.
Figure 20 is a flowchart showing a Data Mining Process 2000 in accordance with a prefeπed embodiment of the present invention. The Data Mining Process 2000 begins with an identifying step 2002. In step 2002, the system identifies patterns and coπelations in the system data over the hybrid communication system. Preferably the system data is analyzed across multiple dimensions to provide better future system behavior prediction.
In a model building step 2004, the system builds a model of the network behavior based on the patterns and coπelations identified in step 2002. P-?ta mining is a process that uses specific techniques to find patterns in data, allowing a user to conduct a relatively broad search of large databases for relevant information that may not be explicitly stored in the databases Typically, a user initially specifies a search phrase or strategy and the system then extracts patterns and relations coπespondmg to that strategy from the stored data Such a search system permits searching across multiple databases The extracted patterns and relations can be (1 ) used by the user, or data analyst, to form a prediction model, (2) used to refine an existing model, and/or (3) organized into a summary of the target database, as in predicting step 2006
In a predicting step 2006, the system predicts future behavior of the network based on the model generated in step 2004 There are two existing forms of data mining top-down, and bottom-up Both forms are separately available on existing systems Top-down systems are also refeπed to as "pattern validation," "venfication-dnven data mining" and "confiπnatory analysis " This is a type of analysis that allows an analyst to express a piece of knowledge, validate or validate that knowledge, and obtain the reasons for the validation or invalidation The validation step in a top- down analysis requires that data refuting the knowledge as well as data supporting the knowledge be considered Bottom-up systems are also refeπed to as "data exploration " Bottom- up systems discover knowledge, generally in the form of patterns, in data
Finally, in a managing step 2008, the network is managed based on the future behavior of the network Data mining involves the development of tools that analyze large databases to extract useful information from them As an application of data mining, customer purchasing patterns may be denved from a large customer transaction database by analyzing its transaction records
Such purchasing habits can provide invaluable marketing information For example, retailers can create more effective store displays and more effective control inventory than otherwise would be possible if they know consumer purchase patterns As a further example, catalog companies can conduct more effective mass mailings if they know that, given that a consumer has purchased a first item, the same consumer can be expected, with some degree of probability, to purchase a particular second item withm a defined time peπod after the first purchase
Classification of the data records to extract useful information is an essential part of data mimng Of importance to the present invention is the construction of a classifier, from records of known classes, for use in classifying other records whose classes are unknown As generally known in the pnor art, a classifier is generated from input data, also called a training set, which consist of multiple records. Each record is identified with a class label The input data is analyzed to develop an accurate descπption, or model, for each class of the records Based on the class descriptions, the classifier can then classify future records, refeπed to as test data, for which the class labels are unknown.
As an example, consider the case where a credit card company which has a large database on its card holders and wants to develop a profile for each customer class that will be used for accepting or rejecting future credit applicants. Assuming that the card holders have been divided into two classes, good and bad customers, based on their credit history. The problem can be solved using classification. First, a training set consisting of customer data with the assigned classes are provided to a classifier as input. The output from the classifier is a description of each class, i.e., good and bad, which then can be used to process future credit card applicants. Similar applications of classification are also found in other fields such as target marketing, medical diagnosis, treatment effectiveness, and store location search.
In data mining applications of classification, very large training sets such as those having several million examples are common. Thus, it is critical in these applications to have a classifier that scales well and can handle training data of this magnitude. As an additional advantage, being able to classify large training data also leads to an improvement in the classification accuracy.
Another desirable characteristic for a data mining classifier is its short training time, i.e., the ability to constmct the class descriptions from the training set quickly. As a result, the methods of the invention are based on a decision-tree classifier. Decision trees are highly developed techniques for partitioning data samples into a set of covering decision mles. They are compact and have the additional advantage that they can be converted into simple classification mles. In addition, they can be easily converted into Stmctured Query language (SQL) statements used for accessing databases, and achieve comparable or better classification accuracy than other classification methods.
Another data mining classifier technique solves the memory constraint problem and simultaneously improve execution time by partitioning the data into subsets that fit in the memory and developing classifiers for the subsets in parallel. The output of the classifiers are then combined using various algorithms to obtain the final classification. This approach reduces running time significantly. Another method classifies data in batches.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of a prefeπed embodiment should not be limited by any of the above described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims

What is claimed is
1 A method for indicating a possibility of a level of service falling below a minimum level in an integrated packet-switched based and circuit-switched based network, compπsing the steps of a) monitoπng a hybπd network, b) determining a minimum level of service, c) sensing a cuπent level of service, d) companng the cuπent level of service with the minimum lev el of service, and e) providing an indication if the cuπent level of service is within a predetermined range with respect to the minimum level of service
2 A method as recited in claim 1 , wherein the minimum level of service is determined by a service level agreement
3 A method as recited in claim 1 , wherein the minimum level of service is determined for a plurality of customers
4 A method as recited in claim 1, wherein the cuπent level of service is determined for a plurality of customers
5 A method as recited m claim 1 , wherein the range is selected so as to provide a forewarning to a service provider that the cuπent level of service is about to fall below the minimum level of service
6 A method as recited m claim 5, wherein the forewarning provides the service provider enough time to cure the service level
7 A method as recited in claim 1, wherein the hybπd network is a wireless data network
8 A system for indicating a possibility of a level of service falling below a minimum level in an integrated packet-switched based and circuit-switched based network, compπsing a) a processor that monitors a hybπd network, b) a processor that determines a minimum level of service; c) a processor that sensing a cuπent level of service; d) logic that compares the cuπent level of service with the minimum level of service; and e) logic that provides an indication if the cuπent level of service is within a predetermined range with respect to the minimum level of service.
9. A system as recited in claim 8, wherein the minimum level of service is determined by a service level agreement.
10. A system as recited in claim 8, wherein the minimum level of service is determined for a plurality of customers.
1 1. A system as recited in claim 8, wherein the cuπent level of service is determined for a plurality of customers.
12. A system as recited in claim 8, wherein the range is selected so as to provide a forewarning to a service provider that the cuπent level of service is about to fall below the minimum level of service.
13. A system as recited in claim 12, wherein the forewarning provides the service provider enough time to cure the service level.
14. A system as recited in claim 8, wherein the hybrid network is a wireless data network.
15. A computer program embodied on a computer readable medium for indicating a possibility of a level of service falling below a minimum level in an integrated packet- switched based and circuit-switched based network, comprising: a) logic that monitors a hybrid network; b) logic that determines a minimum level of service; c) logic that senses a cuπent level of service; d) logic that compares the cuπent level of service with the minimum level of service; and e) logic that provides an indication if the cuπent level of service is within a predetermined range with respect to the minimum level of service
16 A computer program as recited in claim 15, wherein the minimum level of service is determined by a service level agreement
17 A computer program as recited in claim 15, wherein the minimum level of service is determined for a plurality of customers.
18. A computer program as recited in claim 15, wherein the cuπent level of service is determined for a plurality of customers
19 A computer program as recited in claim 15, wherein the range is selected so as to provide a forewarning to a service provider that the cuπent level of service is about to fall below the minimum level of service.
20. A computer program as recited in claim 19, wherein the forewarning provides the service provider enough time to cure the service level.
21. A computer program as recited in claim 15, wherein the hybπd network is a wireless data network
PCT/US2000/015391 1999-06-02 2000-06-02 System and method for proactive performance management in a hybrid communication system WO2000074325A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU54632/00A AU5463200A (en) 1999-06-02 2000-06-02 System and method for proactive performance management in a hybrid communication system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/324,981 1999-06-02
US09/324,981 US6147975A (en) 1999-06-02 1999-06-02 System, method and article of manufacture of a proactive threhold manager in a hybrid communication system architecture

Publications (1)

Publication Number Publication Date
WO2000074325A1 true WO2000074325A1 (en) 2000-12-07

Family

ID=23265933

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/015391 WO2000074325A1 (en) 1999-06-02 2000-06-02 System and method for proactive performance management in a hybrid communication system

Country Status (3)

Country Link
US (1) US6147975A (en)
AU (1) AU5463200A (en)
WO (1) WO2000074325A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100415026C (en) * 2004-08-23 2008-08-27 华为技术有限公司 Single-plate warning monitoring method
US20220358162A1 (en) * 2021-05-04 2022-11-10 Jpmorgan Chase Bank, N.A. Method and system for automated feedback monitoring in real-time

Families Citing this family (173)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6625650B2 (en) * 1998-06-27 2003-09-23 Intel Corporation System for multi-layer broadband provisioning in computer networks
US6657959B1 (en) 1998-06-27 2003-12-02 Intel Corporation Systems and methods for implementing ABR with guaranteed MCR
US6604136B1 (en) 1998-06-27 2003-08-05 Intel Corporation Application programming interfaces and methods enabling a host to interface with a network processor
US6728249B2 (en) 1998-06-27 2004-04-27 Intel Corporation System and method for performing cut-through forwarding in an ATM network supporting LAN emulation
US6735773B1 (en) 1998-06-27 2004-05-11 Intel Corporation Method and apparatus for issuing commands to a network processor configured to provide a plurality of APIs
ATE273538T1 (en) 1998-10-28 2004-08-15 Verticalone Corp APPARATUS AND METHOD FOR AUTOMATIC AGGREGATION AND SUPPLY OF ELECTRONIC PERSONAL INFORMATION OR DATA
US7085997B1 (en) 1998-12-08 2006-08-01 Yodlee.Com Network-based bookmark management and web-summary system
US7672879B1 (en) 1998-12-08 2010-03-02 Yodlee.Com, Inc. Interactive activity interface for managing personal data and performing transactions over a data packet network
US8069407B1 (en) 1998-12-08 2011-11-29 Yodlee.Com, Inc. Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes
US7752535B2 (en) 1999-06-01 2010-07-06 Yodlec.com, Inc. Categorization of summarized information
US6542593B1 (en) 1999-06-02 2003-04-01 Accenture Llp Rules database server in a hybrid communication system architecture
US6442547B1 (en) 1999-06-02 2002-08-27 Andersen Consulting System, method and article of manufacture for information service management in a hybrid communication system
US6556659B1 (en) * 1999-06-02 2003-04-29 Accenture Llp Service level management in a hybrid network architecture
US6484200B1 (en) * 1999-06-11 2002-11-19 Sun Microsystems, Inc. Distinguished name scoping system for event filtering
US6842447B1 (en) 1999-06-14 2005-01-11 Mci, Inc. Internet protocol transport of PSTN-to-PSTN telephony services
US6513129B1 (en) * 1999-06-30 2003-01-28 Objective Systems Integrators, Inc. System and method for managing faults using a gateway
US6453034B1 (en) 1999-07-29 2002-09-17 Mci Worldcom, Inc. Method of and system for extending internet telephony over virtual private network direct access lines
US6735209B1 (en) * 1999-07-29 2004-05-11 Worldcom, Inc. Address definition for IP telephony services
US6542475B1 (en) * 1999-08-09 2003-04-01 At&T Corp. Method and system for providing enhanced call service features at remote locations
US6988249B1 (en) 1999-10-01 2006-01-17 Accenture Llp Presentation service architectures for netcentric computing systems
US6874010B1 (en) 1999-10-01 2005-03-29 Accenture Llp Base service architectures for netcentric computing systems
US7020697B1 (en) 1999-10-01 2006-03-28 Accenture Llp Architectures for netcentric computing systems
WO2001026321A2 (en) 1999-10-01 2001-04-12 Accenture L.L.P. Communication service architectures for netcentric computing systems
US7068680B1 (en) 1999-10-01 2006-06-27 Accenture Llp Communication service architectures for netcentric computing systems
US6857017B1 (en) * 1999-10-11 2005-02-15 I2 Technologies Us, Inc. Customizable notification user window
US6615236B2 (en) 1999-11-08 2003-09-02 Worldcom, Inc. SIP-based feature control
US7860114B1 (en) 1999-11-08 2010-12-28 Verizon Business Global Llc Method and system for dynamic gateway selection in an IP telephony network
US8743892B2 (en) * 1999-11-08 2014-06-03 Verizon Business Global Llc Method and system for dynamic gateway selection in an IP telephony network
US6434143B1 (en) * 1999-11-08 2002-08-13 Mci Worldcom, Inc. Internet protocol telephony voice/video message deposit and retrieval
US9281996B1 (en) 1999-11-08 2016-03-08 Verizon Patent And Licensing Inc. Method and system for dynamic gateway selection in an IP telephony network
US6480588B1 (en) 1999-11-08 2002-11-12 Worldcom, Inc. Methods for providing prepaid telephony service via an internet protocol network system
US7716077B1 (en) 1999-11-22 2010-05-11 Accenture Global Services Gmbh Scheduling and planning maintenance and service in a network-based supply chain environment
US8032409B1 (en) 1999-11-22 2011-10-04 Accenture Global Services Limited Enhanced visibility during installation management in a network-based supply chain environment
US7124101B1 (en) 1999-11-22 2006-10-17 Accenture Llp Asset tracking in a network-based supply chain environment
US7130807B1 (en) 1999-11-22 2006-10-31 Accenture Llp Technology sharing during demand and supply planning in a network-based supply chain environment
US8271336B2 (en) 1999-11-22 2012-09-18 Accenture Global Services Gmbh Increased visibility during order management in a network-based supply chain environment
US6701342B1 (en) * 1999-12-21 2004-03-02 Agilent Technologies, Inc. Method and apparatus for processing quality of service measurement data to assess a degree of compliance of internet services with service level agreements
EP1124195A3 (en) * 2000-02-09 2001-11-28 Hitachi, Ltd. Answer system for technical support, and technical support method
WO2001061564A1 (en) * 2000-02-18 2001-08-23 Cedere Corporation Multiple management system and method
WO2001086543A1 (en) * 2000-05-09 2001-11-15 Yodlee.Com, Inc. System and method for syndicated transactions
US7111163B1 (en) 2000-07-10 2006-09-19 Alterwan, Inc. Wide area network using internet with quality of service
US6745235B2 (en) * 2000-07-17 2004-06-01 Teleservices Solutions, Inc. Intelligent network providing network access services (INP-NAS)
US7058707B1 (en) 2000-08-01 2006-06-06 Qwest Communications International, Inc. Performance modeling in a VDSL network
US7464164B2 (en) * 2000-08-01 2008-12-09 Qwest Communications International, Inc. Linking order entry process to realtime network inventories and capacities
JP4827291B2 (en) * 2000-10-16 2011-11-30 ジーエム・グローバル・テクノロジー・オペレーションズ・インコーポレーテッド Tripod type constant velocity joint
US7197466B1 (en) 2000-11-02 2007-03-27 General Electric Capital Corporation Web-based system for managing software assets
US6925493B1 (en) * 2000-11-17 2005-08-02 Oblicore Ltd. System use internal service level language including formula to compute service level value for analyzing and coordinating service level agreements for application service providers
US6857020B1 (en) * 2000-11-20 2005-02-15 International Business Machines Corporation Apparatus, system, and method for managing quality-of-service-assured e-business service systems
WO2002045322A2 (en) * 2000-11-29 2002-06-06 Pulsent Corporation Method and apparatus for combining dedicated and shared networks for efficient data transmission
US20020091926A1 (en) * 2001-01-10 2002-07-11 The Furukawa Electric Co., Ltd. Multicast authentication method, multicast authentication server, network interconnection apparatus and multicast authentication system
CA2438999A1 (en) * 2001-02-20 2002-08-29 Computer Associates Think, Inc. System and method for monitoring service provider achievements
US7493366B1 (en) * 2001-03-01 2009-02-17 Verizon Laboratories, Inc. System and method for processing customer requests relating to unsolicited commercial email and other service disruptions
US6928465B2 (en) * 2001-03-16 2005-08-09 Wells Fargo Bank, N.A. Redundant email address detection and capture system
US8402129B2 (en) * 2001-03-21 2013-03-19 Alcatel Lucent Method and apparatus for efficient reactive monitoring
US7203198B2 (en) * 2001-04-17 2007-04-10 Conexant, Inc. System and method for switching asynchronous transfer mode cells
CA2450224C (en) 2001-06-14 2012-06-19 Meshnetworks, Inc. Routing algorithms in a mobile ad-hoc network
US7110525B1 (en) 2001-06-25 2006-09-19 Toby Heller Agent training sensitive call routing system
US7072323B2 (en) * 2001-08-15 2006-07-04 Meshnetworks, Inc. System and method for performing soft handoff in a wireless data network
US7206294B2 (en) * 2001-08-15 2007-04-17 Meshnetworks, Inc. Movable access points and repeaters for minimizing coverage and capacity constraints in a wireless communications network and a method for using the same
US7349380B2 (en) * 2001-08-15 2008-03-25 Meshnetworks, Inc. System and method for providing an addressing and proxy scheme for facilitating mobility of wireless nodes between wired access points on a core network of a communications network
US7613458B2 (en) * 2001-08-28 2009-11-03 Meshnetworks, Inc. System and method for enabling a radio node to selectably function as a router in a wireless communications network
US6996393B2 (en) * 2001-08-31 2006-02-07 Nokia Corporation Mobile content delivery system
WO2003028245A1 (en) * 2001-09-25 2003-04-03 Meshnetworks, Inc. A system and method employing algorithms and protocols for optimizing carrier sense multiple access (csma) protocols in wireless networks
WO2003027880A1 (en) * 2001-09-28 2003-04-03 Bellsouth Intellectual Property Corporation Methods and systems for one-stop communications management
US7472187B2 (en) 2001-09-28 2008-12-30 At&T Intellectual Property I, L.P. Communications and information resource manager
US7313617B2 (en) 2001-09-28 2007-12-25 Dale Malik Methods and systems for a communications and information resource manager
US7007085B1 (en) 2001-09-28 2006-02-28 Bellsouth Intellectual Property Corporation Message log for wireline, voice mail, email, fax, pager, instant messages and chat
US6754188B1 (en) 2001-09-28 2004-06-22 Meshnetworks, Inc. System and method for enabling a node in an ad-hoc packet-switched wireless communications network to route packets based on packet content
EP1298840A1 (en) * 2001-09-28 2003-04-02 Siemens Aktiengesellschaft Network performance management
US6768730B1 (en) 2001-10-11 2004-07-27 Meshnetworks, Inc. System and method for efficiently performing two-way ranging to determine the location of a wireless node in a communications network
US20030074434A1 (en) * 2001-10-11 2003-04-17 Jason James L. Determination of message source in network communications
WO2003037009A1 (en) * 2001-10-23 2003-05-01 Meshnetworks, Inc. System and method for providing a congestion optimized address resolution protocol for wireless ad-hoc networks
US6771666B2 (en) 2002-03-15 2004-08-03 Meshnetworks, Inc. System and method for trans-medium address resolution on an ad-hoc network with at least one highly disconnected medium having multiple access points to other media
US6982982B1 (en) 2001-10-23 2006-01-03 Meshnetworks, Inc. System and method for providing a congestion optimized address resolution protocol for wireless ad-hoc networks
DE10153845A1 (en) * 2001-10-24 2003-05-15 Robert Scholderer Quality monitoring of IT services, e.g. hardware and or software maintenance contracts, or out-sourced IT services, using a program for simulating service provision
US7181214B1 (en) 2001-11-13 2007-02-20 Meshnetworks, Inc. System and method for determining the measure of mobility of a subscriber device in an ad-hoc wireless network with fixed wireless routers and wide area network (WAN) access points
US7136587B1 (en) 2001-11-15 2006-11-14 Meshnetworks, Inc. System and method for providing simulated hardware-in-the-loop testing of wireless communications networks
US6728545B1 (en) 2001-11-16 2004-04-27 Meshnetworks, Inc. System and method for computing the location of a mobile terminal in a wireless communications network
US7221686B1 (en) 2001-11-30 2007-05-22 Meshnetworks, Inc. System and method for computing the signal propagation time and the clock correction for mobile stations in a wireless network
US7190672B1 (en) 2001-12-19 2007-03-13 Meshnetworks, Inc. System and method for using destination-directed spreading codes in a multi-channel metropolitan area wireless communications network
US7106707B1 (en) 2001-12-20 2006-09-12 Meshnetworks, Inc. System and method for performing code and frequency channel selection for combined CDMA/FDMA spread spectrum communication systems
US7280545B1 (en) 2001-12-20 2007-10-09 Nagle Darragh J Complex adaptive routing system and method for a nodal communication network
US7180875B1 (en) 2001-12-20 2007-02-20 Meshnetworks, Inc. System and method for performing macro-diversity selection and distribution of routes for routing data packets in Ad-Hoc networks
US6820116B1 (en) 2001-12-21 2004-11-16 Nokia Corporation Mobile browsing booster system
US8099488B2 (en) * 2001-12-21 2012-01-17 Hewlett-Packard Development Company, L.P. Real-time monitoring of service agreements
US7072618B1 (en) 2001-12-21 2006-07-04 Meshnetworks, Inc. Adaptive threshold selection system and method for detection of a signal in the presence of interference
FR2834409B1 (en) * 2002-01-03 2005-01-14 Cit Alcatel SYSTEM FOR MANAGING TRANSPORT NETWORKS BASED ON THE ANALYSIS OF TRENDS OF DATA ACQUIRED ON THE NETWORK
US6674790B1 (en) 2002-01-24 2004-01-06 Meshnetworks, Inc. System and method employing concatenated spreading sequences to provide data modulated spread signals having increased data rates with extended multi-path delay spread
WO2003063429A1 (en) * 2002-01-24 2003-07-31 General Instrument Corporation Method and apparatus for authenticated quality of service reservation
US7058018B1 (en) 2002-03-06 2006-06-06 Meshnetworks, Inc. System and method for using per-packet receive signal strength indication and transmit power levels to compute path loss for a link for use in layer II routing in a wireless communication network
US6617990B1 (en) 2002-03-06 2003-09-09 Meshnetworks Digital-to-analog converter using pseudo-random sequences and a method for using the same
US7372952B1 (en) 2002-03-07 2008-05-13 Wai Wu Telephony control system with intelligent call routing
US6904021B2 (en) 2002-03-15 2005-06-07 Meshnetworks, Inc. System and method for providing adaptive control of transmit power and data rate in an ad-hoc communication network
US6987795B1 (en) 2002-04-08 2006-01-17 Meshnetworks, Inc. System and method for selecting spreading codes based on multipath delay profile estimation for wireless transceivers in a communication network
AU2003228512A1 (en) * 2002-04-10 2003-10-27 Instasolv, Inc. Method and system for managing computer systems
US7107498B1 (en) 2002-04-16 2006-09-12 Methnetworks, Inc. System and method for identifying and maintaining reliable infrastructure links using bit error rate data in an ad-hoc communication network
US6580981B1 (en) 2002-04-16 2003-06-17 Meshnetworks, Inc. System and method for providing wireless telematics store and forward messaging for peer-to-peer and peer-to-peer-to-infrastructure a communication network
US7142524B2 (en) * 2002-05-01 2006-11-28 Meshnetworks, Inc. System and method for using an ad-hoc routing algorithm based on activity detection in an ad-hoc network
US7496655B2 (en) * 2002-05-01 2009-02-24 Satyam Computer Services Limited Of Mayfair Centre System and method for static and dynamic load analyses of communication network
US6970444B2 (en) 2002-05-13 2005-11-29 Meshnetworks, Inc. System and method for self propagating information in ad-hoc peer-to-peer networks
US7284268B2 (en) 2002-05-16 2007-10-16 Meshnetworks, Inc. System and method for a routing device to securely share network data with a host utilizing a hardware firewall
US7016306B2 (en) 2002-05-16 2006-03-21 Meshnetworks, Inc. System and method for performing multiple network routing and provisioning in overlapping wireless deployments
US7106703B1 (en) 2002-05-28 2006-09-12 Meshnetworks, Inc. System and method for controlling pipeline delays by adjusting the power levels at which nodes in an ad-hoc network transmit data packets
WO2003103228A1 (en) * 2002-06-03 2003-12-11 Huawei Technologies Co., Ltd. Interconnecting proxy, system and method of interconnecting networks using different protocols
US6892234B2 (en) * 2002-06-12 2005-05-10 Electronic Data Systems Corporation Multi-tiered enterprise management system and method including a presentation services unit external to the enterprise
US7215638B1 (en) 2002-06-19 2007-05-08 Meshnetworks, Inc. System and method to provide 911 access in voice over internet protocol systems without compromising network security
US20030235281A1 (en) * 2002-06-24 2003-12-25 Bell Canada Method and system for providing secure access to a telephone service
US7072432B2 (en) * 2002-07-05 2006-07-04 Meshnetworks, Inc. System and method for correcting the clock drift and maintaining the synchronization of low quality clocks in wireless networks
US7796570B1 (en) 2002-07-12 2010-09-14 Meshnetworks, Inc. Method for sparse table accounting and dissemination from a mobile subscriber device in a wireless mobile ad-hoc network
US7046962B1 (en) 2002-07-18 2006-05-16 Meshnetworks, Inc. System and method for improving the quality of range measurement based upon historical data
US7304960B2 (en) * 2002-10-31 2007-12-04 At&T Bls Intellectual Property, Inc. Methods and systems for provisioning SONET elements
US7522537B2 (en) 2003-01-13 2009-04-21 Meshnetworks, Inc. System and method for providing connectivity between an intelligent access point and nodes in a wireless network
US9818136B1 (en) 2003-02-05 2017-11-14 Steven M. Hoffberg System and method for determining contingent relevance
US7676034B1 (en) 2003-03-07 2010-03-09 Wai Wu Method and system for matching entities in an auction
KR20050117557A (en) 2003-03-13 2005-12-14 메시네트웍스, 인코포레이티드 A real-time system and method for improving the accuracy of the computed location of mobile subscribers in a wireless ad-hoc network using a low speed central processing unit
WO2004084462A2 (en) 2003-03-14 2004-09-30 Meshnetworks, Inc. A system and method for analyzing the precision of geo-location services in a wireless network terminal
WO2004109475A2 (en) 2003-06-05 2004-12-16 Meshnetworks, Inc. System and method for determining synchronization point in ofdm modems for accurate time of flight measurement
WO2004114690A1 (en) 2003-06-05 2004-12-29 Meshnetworks, Inc. Optimal routing in ad hac wireless communication network
US7215966B2 (en) 2003-06-05 2007-05-08 Meshnetworks, Inc. System and method for determining location of a device in a wireless communication network
US7734809B2 (en) 2003-06-05 2010-06-08 Meshnetworks, Inc. System and method to maximize channel utilization in a multi-channel wireless communication network
KR100823467B1 (en) 2003-06-06 2008-04-21 메시네트웍스, 인코포레이티드 System and method to provide fairness and service differentiation in ad-hoc networks
US7412241B2 (en) 2003-06-06 2008-08-12 Meshnetworks, Inc. Method to provide a measure of link reliability to a routing protocol in an ad hoc wireless network
KR100752947B1 (en) 2003-06-06 2007-08-30 메시네트웍스, 인코포레이티드 MAC protocol for accurately computing the position of wireless devices inside buildings
EP1632044B1 (en) 2003-06-06 2011-10-19 Meshnetworks, Inc. Method to improve the overall performance of a wireless communication network
US7519173B2 (en) * 2003-06-24 2009-04-14 International Business Machines Corporation Method for managing resources in a multi-channeled customer service environment
US20050007991A1 (en) * 2003-07-10 2005-01-13 Dat Ton Bandwidth allocation method and apparatus for fixed wireless networks
US7443965B2 (en) * 2003-11-06 2008-10-28 International Business Machines Corporation Integrated voice and data interoperability platform
US7493103B2 (en) * 2004-07-22 2009-02-17 International Business Machines Corporation Method and apparatus to transfer data and detect weak signals
US8631105B2 (en) * 2004-08-27 2014-01-14 International Business Machines Corporation Apparatus and method to optimize revenue realized under multiple service level agreements
US7730494B1 (en) * 2005-04-20 2010-06-01 At&T Corp. Methods and apparatus for service and network management event correlation
US7167463B2 (en) 2004-10-07 2007-01-23 Meshnetworks, Inc. System and method for creating a spectrum agile wireless multi-hopping network
US7631073B2 (en) * 2005-01-27 2009-12-08 International Business Machines Corporation Method and apparatus for exposing monitoring violations to the monitored application
US20060167891A1 (en) * 2005-01-27 2006-07-27 Blaisdell Russell C Method and apparatus for redirecting transactions based on transaction response time policy in a distributed environment
US7689455B2 (en) * 2005-04-07 2010-03-30 Olista Ltd. Analyzing and detecting anomalies in data records using artificial intelligence
EP1727377B1 (en) * 2005-05-25 2006-12-06 Alcatel Telecommunications services
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US8300798B1 (en) 2006-04-03 2012-10-30 Wai Wu Intelligent communication routing system and method
US9715675B2 (en) * 2006-08-10 2017-07-25 Oracle International Corporation Event-driven customizable automated workflows for incident remediation
US7606752B2 (en) 2006-09-07 2009-10-20 Yodlee Inc. Host exchange in bill paying services
US7984007B2 (en) * 2007-01-03 2011-07-19 International Business Machines Corporation Proactive problem resolution system, method of proactive problem resolution and program product therefor
US7940677B2 (en) * 2007-06-05 2011-05-10 At&T Intellectual Property I, Lp Architecture for optical metro ethernet service level agreement (SLA) management
US9009309B2 (en) * 2007-07-11 2015-04-14 Verizon Patent And Licensing Inc. Token-based crediting of network usage
US10282701B2 (en) * 2007-11-20 2019-05-07 Red Hat, Inc. Web-based technical issue assignments based on technical support groups having handled a highest number of technical requests
US8261334B2 (en) 2008-04-25 2012-09-04 Yodlee Inc. System for performing web authentication of a user by proxy
US8555359B2 (en) 2009-02-26 2013-10-08 Yodlee, Inc. System and methods for automatically accessing a web site on behalf of a client
US9026851B2 (en) 2012-09-05 2015-05-05 Wipro Limited System and method for intelligent troubleshooting of in-service customer experience issues in communication networks
US20140101298A1 (en) * 2012-10-05 2014-04-10 Microsoft Corporation Service level agreements for a configurable distributed storage system
US8966074B1 (en) * 2013-09-13 2015-02-24 Network Kinetix, LLC System and method for real-time analysis of network traffic
US10341375B2 (en) * 2014-12-05 2019-07-02 At&T Intellectual Property I, L.P. Resolving customer communication security vulnerabilities
US10475043B2 (en) * 2015-01-28 2019-11-12 Intuit Inc. Method and system for pro-active detection and correction of low quality questions in a question and answer based customer support system
US10083213B1 (en) 2015-04-27 2018-09-25 Intuit Inc. Method and system for routing a question based on analysis of the question content and predicted user satisfaction with answer content before the answer content is generated
US10755294B1 (en) 2015-04-28 2020-08-25 Intuit Inc. Method and system for increasing use of mobile devices to provide answer content in a question and answer based customer support system
US10134050B1 (en) 2015-04-29 2018-11-20 Intuit Inc. Method and system for facilitating the production of answer content from a mobile device for a question and answer based customer support system
US10447777B1 (en) 2015-06-30 2019-10-15 Intuit Inc. Method and system for providing a dynamically updated expertise and context based peer-to-peer customer support system within a software application
US10147037B1 (en) 2015-07-28 2018-12-04 Intuit Inc. Method and system for determining a level of popularity of submission content, prior to publicizing the submission content with a question and answer support system
US10475044B1 (en) 2015-07-29 2019-11-12 Intuit Inc. Method and system for question prioritization based on analysis of the question content and predicted asker engagement before answer content is generated
US10268956B2 (en) 2015-07-31 2019-04-23 Intuit Inc. Method and system for applying probabilistic topic models to content in a tax environment to improve user satisfaction with a question and answer customer support system
US10394804B1 (en) 2015-10-08 2019-08-27 Intuit Inc. Method and system for increasing internet traffic to a question and answer customer support system
US10242093B2 (en) 2015-10-29 2019-03-26 Intuit Inc. Method and system for performing a probabilistic topic analysis of search queries for a customer support system
US10599699B1 (en) 2016-04-08 2020-03-24 Intuit, Inc. Processing unstructured voice of customer feedback for improving content rankings in customer support systems
US10162734B1 (en) 2016-07-20 2018-12-25 Intuit Inc. Method and system for crowdsourcing software quality testing and error detection in a tax return preparation system
US10467541B2 (en) 2016-07-27 2019-11-05 Intuit Inc. Method and system for improving content searching in a question and answer customer support system by using a crowd-machine learning hybrid predictive model
US10460398B1 (en) 2016-07-27 2019-10-29 Intuit Inc. Method and system for crowdsourcing the detection of usability issues in a tax return preparation system
US10445332B2 (en) 2016-09-28 2019-10-15 Intuit Inc. Method and system for providing domain-specific incremental search results with a customer self-service system for a financial management system
US10572954B2 (en) 2016-10-14 2020-02-25 Intuit Inc. Method and system for searching for and navigating to user content and other user experience pages in a financial management system with a customer self-service system for the financial management system
US10733677B2 (en) 2016-10-18 2020-08-04 Intuit Inc. Method and system for providing domain-specific and dynamic type ahead suggestions for search query terms with a customer self-service system for a tax return preparation system
US10552843B1 (en) 2016-12-05 2020-02-04 Intuit Inc. Method and system for improving search results by recency boosting customer support content for a customer self-help system associated with one or more financial management systems
US10748157B1 (en) 2017-01-12 2020-08-18 Intuit Inc. Method and system for determining levels of search sophistication for users of a customer self-help system to personalize a content search user experience provided to the users and to increase a likelihood of user satisfaction with the search experience
US10922367B2 (en) 2017-07-14 2021-02-16 Intuit Inc. Method and system for providing real time search preview personalization in data management systems
US11093951B1 (en) 2017-09-25 2021-08-17 Intuit Inc. System and method for responding to search queries using customer self-help systems associated with a plurality of data management systems
US11436642B1 (en) 2018-01-29 2022-09-06 Intuit Inc. Method and system for generating real-time personalized advertisements in data management self-help systems
US11269665B1 (en) 2018-03-28 2022-03-08 Intuit Inc. Method and system for user experience personalization in data management systems using machine learning
CN113919036B (en) * 2021-10-26 2022-12-06 山东同圆数字科技有限公司 BIM engine-based digital residence instruction book system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996024210A2 (en) * 1995-02-02 1996-08-08 Cabletron Systems, Inc. Method and apparatus for learning network behavior trends and predicting future behavior of communications networks
US5559527A (en) * 1993-03-01 1996-09-24 Motorola, Inc. Method and apparatus for displaying performance metrics in a communication system
WO1999025085A1 (en) * 1997-11-07 1999-05-20 Visual Networks Technologies, Inc. Method and apparatus for performing service level analysis of communications network performance metrics

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5295244A (en) * 1990-09-17 1994-03-15 Cabletron Systems, Inc. Network management system using interconnected hierarchies to represent different network dimensions in multiple display views
GB2277229B (en) * 1993-04-17 1997-11-26 Northern Telecom Ltd Hybrid network management
US5694548A (en) * 1993-06-29 1997-12-02 International Business Machines Corporation System and method for providing multimedia quality of service sessions in a communications network
US5461611A (en) * 1994-06-07 1995-10-24 International Business Machines Corporation Quality of service management for source routing multimedia packet networks
JP2723097B2 (en) * 1995-12-04 1998-03-09 日本電気株式会社 QOS routing device
US5892754A (en) * 1996-06-07 1999-04-06 International Business Machines Corporation User controlled adaptive flow control for packet networks
US5913036A (en) * 1996-06-28 1999-06-15 Mci Communications Corporation Raw performance monitoring correlated problem alert signals
US5944795A (en) * 1996-07-12 1999-08-31 At&T Corp. Client-server architecture using internet and guaranteed quality of service networks for accessing distributed media sources
US6243398B1 (en) * 1996-10-21 2001-06-05 Vocaltec Communications Ltd. System and method for personal multimedia communication over a packet switched network
US5898668A (en) * 1996-12-13 1999-04-27 Siemens Information And Communication Networks, Inc. Method and system for increasing quality of service at or below a threshold cost
US5864823A (en) * 1997-06-25 1999-01-26 Virtel Corporation Integrated virtual telecommunication system for E-commerce
US6519252B2 (en) * 1997-12-31 2003-02-11 Ericsson Inc. System and method for connecting a call to a mobile subscriber connected to the Internet
US6252857B1 (en) * 1998-03-04 2001-06-26 At&T Corp. Method and apparatus for provisioned and dynamic quality of service in a communications network
US6154776A (en) * 1998-03-20 2000-11-28 Sun Microsystems, Inc. Quality of service allocation on a network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559527A (en) * 1993-03-01 1996-09-24 Motorola, Inc. Method and apparatus for displaying performance metrics in a communication system
WO1996024210A2 (en) * 1995-02-02 1996-08-08 Cabletron Systems, Inc. Method and apparatus for learning network behavior trends and predicting future behavior of communications networks
WO1999025085A1 (en) * 1997-11-07 1999-05-20 Visual Networks Technologies, Inc. Method and apparatus for performing service level analysis of communications network performance metrics

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SAIMIN JIN ET AL: "PERFORMANCE MANAGEMENT IN PACKET SWITCHED NETWORKS: A NEW APPROACH TO DELAY DISTRIBUTION BOUNDING FOR PACKET VOICE SERVICE", PROCEEDINGS OF THE MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS,US,NEW YORK, IEEE, vol. SYMP. 32, 14 August 1989 (1989-08-14), pages 1178 - 1181, XP000139841 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100415026C (en) * 2004-08-23 2008-08-27 华为技术有限公司 Single-plate warning monitoring method
US20220358162A1 (en) * 2021-05-04 2022-11-10 Jpmorgan Chase Bank, N.A. Method and system for automated feedback monitoring in real-time

Also Published As

Publication number Publication date
US6147975A (en) 2000-11-14
AU5463200A (en) 2000-12-18

Similar Documents

Publication Publication Date Title
US6556659B1 (en) Service level management in a hybrid network architecture
US6449588B1 (en) Customer-driven QOS in hybrid communication system
US6195697B1 (en) System, method and article of manufacture for providing a customer interface in a hybrid network
US6147975A (en) System, method and article of manufacture of a proactive threhold manager in a hybrid communication system architecture
US6442547B1 (en) System, method and article of manufacture for information service management in a hybrid communication system
US6081518A (en) System, method and article of manufacture for cross-location registration in a communication system architecture
US6542593B1 (en) Rules database server in a hybrid communication system architecture
US6704303B1 (en) IP/telephony user interface for a hybrid communication system
US6707812B1 (en) System, method and article of manufacture for element management in a hybrid communication system
US6426948B1 (en) Video conferencing fault management in a hybrid network
US6345239B1 (en) Remote demonstration of business capabilities in an e-commerce environment
US6611867B1 (en) System, method and article of manufacture for implementing a hybrid network
US6427132B1 (en) System, method and article of manufacture for demonstrating E-commerce capabilities via a simulation on a network
WO2001017169A9 (en) A system, method and article of manufacture for a network-based predictive fault management system
US8938435B2 (en) Knowledge management tool
US7350138B1 (en) System, method and article of manufacture for a knowledge management tool proposal wizard
US6564209B1 (en) Knowledge management tool for providing abstracts of information
US6900807B1 (en) System for generating charts in a knowledge management tool
US6727927B1 (en) System, method and article of manufacture for a user interface for a knowledge management tool
US6335927B1 (en) System and method for providing requested quality of service in a hybrid network
WO2001017313A1 (en) A system, method and article of manufacture for a high speed multi-tier communication network with increased efficiency
AU2001240010B2 (en) Method of manufacture for a knowledge management tool
WO2000074337A2 (en) System and method for a rules database server in a hybrid communication system
AU2001240010A1 (en) Method of manufacture for a knowledge management tool
EP1192770A1 (en) A system, method and article of manufacture for managing network data in a hybrid network architecture

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK DM DZ EE ES FI GB GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP