home *** CD-ROM | disk | FTP | other *** search
Text File | 1999-10-14 | 139.2 KB | 3,364 lines |
-
-
-
-
-
-
- Netowrk Working Group H. Lu
- Request for Comments: 2458 Editor
- Category: Informational M. Krishnaswamy
- Lucent Technologies
- L. Conroy
- Roke Manor Research
- S. Bellovin
- F. Burg
- A. DeSimone
- K. Tewani
- AT&T Labs
- P. Davidson
- Nortel
- H. Schulzrinne
- Columbia University
- K. Vishwanathan
- Isochrome
- November 1998
-
-
- Toward the PSTN/Internet Inter-Networking
- --Pre-PINT Implementations
-
- Status of this Memo
-
- This memo provides information for the Internet community. It does
- not specify an Internet standard of any kind. Distribution of this
- memo is unlimited.
-
- Copyright Notice
-
- Copyright (C) The Internet Society (1998). All Rights Reserved.
-
- Abstract
-
- This document contains the information relevant to the development of
- the inter-networking interfaces underway in the Public Switched
- Telephone Network (PSTN)/Internet Inter-Networking (PINT) Working
- Group. It addresses technologies, architectures, and several (but by
- no means all) existing pre-PINT implementations of the arrangements
- through which Internet applications can request and enrich PSTN
- telecommunications services. The common denominator of the enriched
- services (a.k.a. PINT services) is that they combine the Internet and
- PSTN services in such a way that the Internet is used for non-voice
- interactions, while the voice (and fax) are carried entirely over the
- PSTN. One key observation is that the pre-PINT implementations, being
- developed independently, do not inter-operate. It is a task of the
- PINT Working Group to define the inter-networking interfaces that
-
-
-
- Lu, et. al. Informational [Page 1]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- will support inter-operation of the future implementations of PINT
- services.
-
- Table of Contents
-
- 1. Introduction ....................................... 3
- 2. Terminology ....................................... 3
- 3. PINT Services ....................................... 4
- 4. Architectural Overview ............................... 5
- 4.1 Public Switched Telephone Network ............... 5
- 4.2 Pre-PINT Systems ............................... 9
- 5. IN-Based Solutions ............................... 20
- 5.1 The Lucent System ............................... 20
- 5.1.1 Roles of the Web Server, Service Node, and SMS ....... 20
- 5.1.2 A Click-to-Dial-Back Service Scenario ............... 21
- 5.1.3 Web Server-Service Node Interface ............... 22
- 5.1.4 Web Server-SMS Interface and SNMP MIB ............... 24
- 5.1.5 Security Considerations ........................... 26
- 5.2 Siemens Web Call Center ........................... 27
- 5.2.1 Service Description ............................... 27
- 5.2.2 Implementation ................................... 29
- 5.2.3 Derived Requirements/Lessons ..................... 35
- 6. Alternative Solutions ............................... 37
- 6.1 The AT&T System ..................................... 37
- 6.1.1 High Level Architecture ............................ 38
- 6.1.2 IP Client to CallBroker Interface .................. 39
- 6.1.3 Protocol ........................................... 40
- 6.1.4 APIs Exposed to the IP Client ..................... 41
- 6.1.5 Voice-Bridge Control API ........................ 41
- 6.2 Simple Computer Telephony Protocol ............... 41
- 6.2.1 Overview ........................................... 41
- 6.2.2 How SCTP Fits in with the Reference PINT Services .. 42
- 7. Session Initiation Protocol--An Emerging Standard .. 43
- 7.1 Overview ....................................... 43
- 7.2 SIP Protocol ....................................... 44
- 7.3 SIP Entities ....................................... 45
- 7.4 Providing Call Control Functionality ............... 46
- 8. Overall Security Considerations ..................... 47
- 9. Conclusion ....................................... 48
- 10. Acknowledgments ................................... 48
- 11. Appendix ....................................... 49
- 11.1 PSTN/IN 101 ....................................... 49
- 11.1.1 Public Switched Telephone Network ............... 49
- 11.1.2 Intelligent Network ............................... 51
- 11.2 Call Center Features ............................. 54
-
-
-
-
-
-
- Lu, et. al. Informational [Page 2]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 12. References ....................................... 56
- Authors' Addresses ......................................... 57
- Full Copyright Statement .................................. 60
-
- 1. Introduction
-
- This document contains the information relevant to the development of
- the inter-networking interfaces underway in the Public Switched
- Telephone Network (PSTN)/Internet Inter-Networking (PINT) Working
- Group. It addresses technologies, architectures, and several (but by
- no means all) existing pre-PINT implementations of the arrangements
- through which Internet applications can request and enrich PSTN
- telecommunications services. The common denominator of the enriched
- services (a.k.a. PINT services) is that they combine the Internet and
- PSTN services in such a way that the Internet is used for non-voice
- interactions, while the voice (and fax) are carried entirely over the
- PSTN.
-
- The organization of the document is as follows. First, the basic
- terminology and a short "intuitive" description of the PINT services
- are provided. The rest of the information deals, in one way or the
- other, with the pre-PINT support of these services where they are
- used as a benchmark. Thus, an architectural overview common to all
- present solutions is presented. The flow of the document then
- divides into two streams: one is dedicated to the Intelligent Network
- (IN)-based solutions; the other explores alternative means (i.e.,
- CallBroker and Computer-Telephony Integration (CTI) approach). At
- this point, the emerging standards are explored, in particular, the
- Session Initiation Protocol (SIP), which promises an elegant solution
- to the PINT problem. Each of the above developments is addressed in a
- respective section. The final sections of the document contain the
- overall security considerations, conclusion, acknowledgments,
- appendix, and a set of references. The security section summarizes
- the PINT security requirements derived from the pre-PINT experiences
- and the appendix presents a tutorial on the PSTN, IN, and Call Center
- functions.
-
- 2. Terminology
-
- This document uses the following terminology:
-
- Authentication -- verification of the identity of a party.
-
- Authorization -- determination of whether or not a party has the
- right to perform certain activities.
-
- PINT Gateway -- the PSTN node that interacts with the Internet.
-
-
-
-
- Lu, et. al. Informational [Page 3]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- User or Customer -- the person who asks for a service request to be
- issued. In the context of PINT Services, this person will use an
- Internet host to make his or her request. The term "user" is also
- used to describe a host originating the PINT service request on
- behalf of this person.
-
- 3. PINT Services
-
- This document addresses four services initially identified by the
- PINT Working Group and presently supported by pre-PINT
- implementations. These services are: click-to-dial-back, click-to-
- fax, click-to-fax-back and voice-access-to-content.
-
- Note that the word "click" should not be taken literally. It is
- rather used to point out that initiation of the related services
- takes place on the Internet, where point and click are the most
- prevalent user actions. In other words, a service request could
- originate from any type of IP-based platforms. There is no
- implication that these services must be implemented by a device
- within the PSTN or the Internet running a Web server.
-
- The common denominator of the PINT services is that they combine the
- Internet and PSTN services in such a way that the Internet is used
- for non-voice interactions, while the voice (and fax) are carried
- entirely over the PSTN. (An example of such a service is combination
- of a Web-based Yellow Pages service with the ability to initiate PSTN
- calls between customers and suppliers in a manner described in what
- follows.)
-
- Some of the benefits of using the PSTN are high quality of the voice,
- an ability to route the call to different locations depending on
- pre-set criteria (for example, time of the day, day of the week, and
- geographic location), outstanding security and reliability, and
- access to flexible, low cost, and secure billing and charging
- systems. The benefits of using the Internet are the uniform, well-
- defined, and widely-used interfaces available anywhere, anytime.
-
- Click-to-Dial-Back
-
- With this service, a user requests (through an IP host) that the PSTN
- call be established between another party and himself or herself. An
- important pre-requisite for using this service is that the user has
- simultaneous access to both the PSTN and Internet.
-
- One example of an application of this service is on-line shopping: a
- user browsing through an on-line catalogue, clicks a button thus
- inviting a call from a sales representative. Note that (as is the
- case with the all-PSTN Free-Phone, or "800", service) flexible
-
-
-
- Lu, et. al. Informational [Page 4]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- billing arrangements can be implemented here on behalf of the service
- provider. In addition (and also similarly to the Free-Phone/800), the
- PSTN could route the call depending on the time of day, day of week,
- availability of agents in different locations, and so on.
-
- Click-to-Fax
-
- With this service, a user at an IP host requests that a fax be sent
- to a particular fax number. In particular this service is especially
- meaningful when the fax is to be sent to someone who has only a fax
- machine (but no access to the Internet). Consider, as an example, a
- service scenario in which a Web user makes a reservation for a hotel
- room in Beijing from a travel service page containing hotel
- information of major cities around the world. Suppose a specific
- Beijing hotel chosen by the user does not have Internet connection
- but has a fax machine. The user fills out the hotel reservation form
- and then clicks a button sending out the form to the travel service
- provider, which in turn generates a fax request and sends it together
- with the hotel reservation form to the PSTN. Upon receiving the
- request and the associated data, the PSTN translates the data into
- the proper facsimile format and delivers it to the Beijing hotel as
- specified in the fax request.
-
- Click-to-Fax-Back
-
- With this service, a user at an IP host can request that a fax be
- sent to him or her. (Consider the user of the previous example, who
- now requests the confirmation from the Beijing Hotel. Another useful
- application of the service is when size of the information that a
- user intends to get is so large that downloading it to the user's PC
- over the Internet will require a long time and a lot of disk space.)
-
- Voice-Access-to-Content
-
- With this service, a user at an IP host requests that certain
- information on the Internet be accessed (and delivered) in an audio
- form over the PSTN, using the telephone as an informational
- appliance. One application of this service is to provide Web access
- to the blind. (This may require special resources--available in the
- PSTN--to convert the Web data into speech.)
-
- 4. Architectural Overview
-
- 4.1 Public Switched Telephone Network
-
- From an application perspective, Internet nodes are interconnected
- directly, as shown in Figure 1. When two machines are to communicate,
- they will have the address of the destination end system, and will
-
-
-
- Lu, et. al. Informational [Page 5]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- send network level datagrams, assuming that the underlying
- infrastructure will deliver them as required.
-
- _____
- __ _____/ \_____
- [__] / \
- [----]-.-.-.-. Internet .-.
- \_____ _______/ |
- __ \__./ __ .
- [__] / [__] |
- [----]-. [----]-.
-
- Key: .-.-. Internet Access Link
-
- Figure 1
-
- Where all nodes are on the same (broadcast) network, there is no need
- for intervening routers; they can send and deliver packets to one
- another directly. The Internet nodes are responsible for their own
- communications requests, and act as peers in the communication
- sessions that result.
-
- This contrasts with the situation in the PSTN. There, the end systems
- are configured as shown in Figure 2. The end systems tend to be
- specific to a particular type of traffic, so that, for example, the
- majority of terminals are dedicated to carrying speech traffic
- (telephones) or to carrying facsimile data (fax machines). The
- terminals all connect to Central Offices (COs) via access lines, and
- these COs are interconnected into a network.
-
- /--\
- ()/\()__
- /__\ \ .................................
- \ ! ! ! /--\
- __ \ [-!-] [-!-] ! ()/\()
- \ \ \__[CO ]=========[CO ]==\\ ! ___/__\
- [Fax]________[---] [---] \\ [-!-] / __
- \\=======[CO ]____/ \ \
- [---]________[Fax]
- Key: ___ Access Lines
- === Trunk Links (inter-CO user data links)
- ... Inter-CO signaling network links
- CO Central Office (Telephone Exchange)
-
- Figure 2
-
-
-
-
-
-
- Lu, et. al. Informational [Page 6]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- Communications between the terminals are all "circuit switched", so a
- dedicated synchronous data path (or circuit) needs to be placed
- between the end terminals for carrying all communications. Arranging
- for such a circuit to be made or removed (cleared) is the
- responsibility of the Central Offices in the network. A user makes a
- request via his or her terminal, and this request is passed on to the
- "local" Central Office. The relationship between the terminals and
- the local Central Offices to which they are connected is strictly
- Client/Server.
-
- The COs are interconnected using two different types of connections.
- One of these is called a trunk connection (shown as a double line in
- the above figure) and is used to carry the data traffic generated by
- the terminals. The other connection acts as part of a separate
- network (and is shown as a dotted line in the above figure). This is
- the signaling network, and is used by the Central Offices to request
- a connection to be made between themselves and the destination of the
- required circuit. This will be carried across the trunk link to the
- "next" Central Office in the path. The path, once in place through
- the PSTN, always takes the same route. This contrasts with the
- Internet, where the underlying datagram nature of the infrastructure
- means that data packets are carried over different routes, depending
- on the combined traffic flows through the network at the time.
-
- The call set up process can be viewed as having two parts: one in
- which a request for connection is made, and the other in which the
- circuit is made across the PSTN and call data flows between the
- communicating parties. This is shown in the next pair of figures (3a
- and 3b).
-
-
- /--\
- () ()
- --____
- /++\ \
- /----\ \
- A \ [-!-]
- \->[CO ]
- [---]
- Time = 13:55
-
- Figure 3a
-
-
- Key: ___ Access Lines
- === Trunk Links (inter-CO user data links)
- ... Inter-CO signaling network links
- CO Central Office (Telephone Exchange)
-
-
-
- Lu, et. al. Informational [Page 7]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- /--\
- () ()
- -- .................................
- / \<--- ^ ! ! /--\
- /----\ \ ! v ! () ()
- A' \ [-!-] [-!-] ! --
- \__[CO ]=========[CO ]==\\ v ->-/ \
- [---] [---] \\ [-!-] / /----\
- \\=======[CO ]____/ B'
- Time = 14:00 [---]
-
- Figure 3b
-
- Figure 3 shows a particular kind of service that can be provided;
- call booking. With this service, a request is sent for a connection
- to be made between the A and B telephones at a specified time. The
- telephone is then replaced (the request phase is terminated). At the
- specified time, the CO will make a connection across the network in
- the normal way, but will, first, ring the "local" or A' telephone to
- inform the user that his or her call is now about to be made.
-
- For more complex services, the requesting telephone is often
- connected via its "local" CO to a Service Node (SN), where the user
- can be played prompts and can specify the parameters of his or her
- request in a more flexible manner. This is shown below, in Figures
- 4a and 4b. For more details of the operation of the Service Node (and
- other Intelligent Network units), see the Appendix.
-
- When the SN is involved in the request and in the call setup process,
- it appears, to the CO, to be another PSTN terminal. As such, the
- initial request is routed to the Service Node, which, as an end
- system, then makes two independent calls "out" to A' and B'.
-
- /--\ [---]
- () () [SN ]
- --___ [|--]
- /++\ \ |
- /----\ \ |
- \ |
- A \ [|-!]
- \->[CO ]
- [---]
- Time = 13:55
-
- Figure 4a
-
-
-
-
-
-
- Lu, et. al. Informational [Page 8]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- Key: ___ Access Lines
- === Trunk Links (inter-CO user data links)
- ... Inter-CO signaling network links
- CO Central Office (Telephone Exchange)
- SN Service Node
-
-
- /--\ [---]
- () () [SN ]
- -- [|--] /--\
- / \<-- | ............................... () ()
- /----\ \ | ^ ! ! --
- \ | / v v / \
- A' \ [|-!] [-!-] [-!-] ->-/----\
- \--[CO ] [CO ] [CO ] /
- [---] [---] [---]___/ B'
- Time = 14:00
-
- Figure 4b
-
- Note that in both cases as shown in Figures 3 and 4 a similar service
- can be provided in which the B' telephone is replaced by an
- Intelligent Peripheral (or an Special Resource Functional entity
- within a Service Node), playing an announcement. This allows a "wake
- up" call to be requested, with the Intelligent Peripheral or Service
- Node Special Resource playing a suitable message to telephone A' at
- the specified time. Again, for more details of the operation of the
- Special Resources (and other Intelligent Network units), see the
- Appendix.
-
- 4.2 Pre-PINT Systems
-
- Although the pre-PINT systems reported here (i.e., those developed by
- AT&T, Lucent, Siemens and Nortel) vary in the details of their
- operation, they exhibit similarities in the architecture. This
- section highlights the common features. Specific descriptions of
- these systems will follow.
-
- All of the systems can be seen as being quite similar to that shown
- in the following diagram. In each case, the service is separated into
- two parts; one for the request and another for execution of the
- service. Figure 5 summarizes the process.
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 9]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- _____
- __ _____/ \_____
- [__] / \
- [-++-]-.-.>.-. Internet .-.-
- \_____ _______/ .
- \___/ v
- [----] .
- [PINT]-.-
- [----]
- %
- v
- [---]
- [SN ]
- [|--]
-
- Figure 5a
-
- Key: CO Central Office (Telephone Exchange)
- SN Service Node
- PINT PSTN/Internet Gateway
- .-.-. Internet Access Link
- %%% Gateway/Service Node Link
- ___ PSTN Access Lines
- === PSTN Trunk Links (inter-CO user data links)
- ... Inter-CO signaling network links
-
- _____
- __ _____/ \_____
- [__] / \
- [----]-.-.-.-. Internet .-.-
- \_____ _______/ .
- \___/ |
- [----] .
- [PINT]-.-
- [-%--]
- %
- %
- /--\ [-%-]
- () () [SN ]
- -- [|--] /--\
- / \<-- | .................... () ()
- /----\ \ | ^ ! ! --
- \ | / v v / \
- A' \ [|-!] [-!-] [-!-] ->-/----\
- \--[CO ]=======[CO ]======[CO ] /
- [---] [---] [---]__/ B'
-
- Figure 5b
-
-
-
- Lu, et. al. Informational [Page 10]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- Comparing Figure 4a with Figure 5a, the differences lie in the way
- that the information specifying the request is delivered to the
- Service Node. In the PSTN/IN method shown in the earlier diagram, the
- user connects to the SN from the telephone labeled A, with the
- connection being routed via the CO. In the latter case, the request
- is delivered from an Internet node, via the PINT gateway, and thence
- to the Service Node over a "private" link. The effect is identical,
- in that the request for service is specified (although the actual
- parameters used to specify the service required may differ somewhat).
-
- The figures depicting the respective service execution phases
- (Figures 4b and 5b) show that the operation, from the IN/PSTN
- perspective, is again identical. The Service Node appears to initiate
- two independent calls "out" to telephones A' and B'.
-
- The alternative systems developed by AT&T and by Nortel allow another
- option to be used in which the PINT Gateway does not have to connect
- to the PSTN via a Service Node (or other Intelligent Network
- component), but can instead connect directly to Central Offices that
- support the actions requested by the gateway. In these alternatives,
- the commands are couched at a "lower level", specifying the call
- states required for the intended service connection rather than the
- service identifier and the addresses involved (leaving the
- Intelligent Network components to coordinate the details of the
- service call on the gateway's behalf). In this way the vocabulary of
- the commands is closer to that used to control Central Offices. The
- difference really lies in the language used for the services
- specification, and all systems can use the overall architecture
- depicted in Figure 5; the only question remains whether the
- Intelligent Network components are actually needed in these other
- approaches.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 11]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- The following diagram (Figure 6) shows the interface architecture
- involved in providing the kind of service mentioned above.
-
-
- Internet __ __
- Server [__] _______ [__]
- [W3S-]-. ___/ .-.-.-[W3C-] Internet
- _________________|/.-.-.-.-. \ Terminal
- / .. . \
- | Internet / . \ |
- \___________ . . . /
- \/___|____\_________/
- . . .
- / | \
- (A) (B) (E)
- . . .
- _|_ _|_ _|_
- [SN ]<-(D)--[SMS]--(H)->[SCP]
- [|-|] --- [-!-]
- / \ !
- (C) (I) ...........(F)...!.(G).
- / \ ! !
- [--|] [|-!] [-!-]
- [CO ] [MSC] [SSP]
- [---] [---] \|/ [---]
- /--\ | |____| | /--\
- ()/\() | | ()/\()
- /--\___| 1 |___/--\
- Fixed PSTN Terminal [] Fixed PSTN Terminal
- Mobile Terminal
-
- Key: W3S HTTP (Web) Server
- W3C HTTP (Web) Client/Browser
- CO Central Office (Telephone Exchange)
- MSC Mobile Switching Center (Mobile Network Telephone
- Exchange)
- SN Service Node
- SSP Service Switching Point
- SCP Service Control Point
- SMS Service Management System
- .-.-. Internet relationship
- ___ PSTN Access relationship
- ... PSTN "core" signaling relationship
-
- Figure 6
-
-
-
-
-
-
- Lu, et. al. Informational [Page 12]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- The interfaces are:
-
- A The interface over which Internet requests for service are
- delivered to the Service Node
- B The interface over which Service Management requests are sent
- from the Internet to the Service Management System
- C The interface over which the Service Node sends call control
- requests to a connected Central Office
- D The interface over which the Service Management System manages
- the Service Node
- E The interface over which Internet requests for service are
- delivered to the Service Control Point
- F The interface over which the Service Control Point sends service
- call control requests to the Mobile Switching Center
- G The interface over which the Service Control Point sends service
- control requests to the Service Switching Point
- H The interface over which the Service Management System manages
- the Service Control Point
- I The interface over which the Service Node sends service call
- control requests to the Mobile Switching Center
-
- In practice, a number of the interfaces have very similar purposes to
- one another. The means by which these purposes are achieved differ,
- in that some of the interfaces (C and I) reflect access arrangements,
- whilst others (F and G) imply a "core" signaling relationship.
- However, it is possible to categorize them in terms of the "intent"
- of messages sent across the interfaces.
-
- For example, Interfaces A and E are similar; one of the main aims of
- PINT work is to ensure that they are the same. Similarly, Interfaces
- D and H imply similar actions and are likely to carry similar
- messages. Interfaces C, F, G, and I are all used to request that a
- call be initiated, albeit via access or core signaling relationships.
-
- The interfaces can also be viewed in terms of the kind of components
- that are involved and the bodies by which they are codified.
- Interfaces A, B, and E are all going to be realized as Internet
- Protocols. All of the others use existing protocols in the PSTN/IN.
- Traditionally, these have been codified by different groups, and this
- is likely to be the case in the PINT work.
-
- The general arrangements for the different systems are shown below
- (Figures 7, 8, 9, and 10). They differ in the details of their
- configurations, but the main tasks they perform are very similar, and
- so the overall operation is similar to the generic architecture shown
- in Figures 5 and 6.
-
-
-
-
-
- Lu, et. al. Informational [Page 13]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- Key for following diagrams:
-
- Components:
-
- W3C World Wide Web Client
- W3S World Wide Web Server
- WSA Web Server "Back End Program" Interface (CGI or Servlet
- interface)
- Srvlt Servlet "back end" program/objects
- FS Finger Server
- SCTPC Simple Computer Telephony Protocol Client
- SCTPS Simple Computer Telephony Protocol Server
- CBC CallBroker Client
- CBS CallBroker Server
- SSTPC Service Support Transport Protocol Client
- SSF Service Switching Function
- SCF Service Control Function
- SRF Special Resource Function
- CO Central Office/ Public Telephone Exchange
- SSP Service Switching Point
- SCP Service Control Point
- SR/I.IP Special Resource/ "Internet" Intelligent Peripheral
- SMS Service Management System
- INAPAd Intelligent Network Application Part Adaptor
- PktFlt Packet Filter (Firewall)
- SNMPAg Simple Network Management Protocol Agent
-
- Protocols:
-
- P0 HyperText Transfer Protocol
- P1 HTTP Server <-> "Back End Program" internal protocol
- P2 CallBroker Client <-> CallBroker Server protocol (AT&T system),
- or SCTP Client <-> Server protocol (Nortel system)
- P3 PINT User Agent <-> PINT Gateway protocol
- P4 Intra-Intelligent Network protocol (e.g., INAP)
- P5 Proprietary (INAP-based) Gateway-> I.IP protocol
- P6 Finger protocol
- P7 Digital Subscriber Signaling 1 protocol
- P8 Simple Network Management Protocol
- P9 SMS <-> Service Control Point/Service Node protocol
-
-
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 14]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- _____ _______ _____
- |[W3C]|----(p0)-->| [W3S] |<--(p0)----|[W3C]|
- |[---]| | [WSA] | |[FS.]|
- |-----| | ! | |[-!-]|
- | (p1) | |--\--|
- | ! | ^
- | ! | (p6)
- | ! | \
- | (p1) | \
- | ! | \
- |[Srvlt]| \
- |___!___| \
- ! \
- (p3) \
- Internet ! !
- .+.+.+.+.+.+.+.+.+.+.+. v .+.+.+.+.+.+.+.+.+.+.+.+.+.!.+.+.+.+.+.
- PSTN/IN _______________!_________________ ____!_____ __________
- |I [PktFlt] I| |[PktFlt]| |[PktFlt]|
- |N Gateway N| | ! | | ! |
- |A ___________________________ A| | ! | | ! |
- |P | | P| | ! | |[SNMPAg]|
- -(p4)-- |A | <-(p4)-> [SCP] <-(p4)-> | A|-(p5)->|[SR/IIP]| | [SMS] |
- \ |d | [-^-] | d| |[------]| | [-^-] |
- \ |__| ! |__| |________| |___!____|
- \ ! !
- [-v-] !-----------------(p9)-----------------!
- [SSP]
- [---]
- ___| |______
- | |
- | /--\ | /--\
- | ()/\() | ()/\()
- |__/__\ |____/__\
-
-
- Figure 7: The Siemens Web Call Center
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 15]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- _____ _______
- |[W3C]|----(p0)-->| [W3S] |
- |[---]| | [WSA] |
- |-----| | ! |
- | (p1) |
- | ! |
- | ! |
- | ! |
- | (p1) |
- | ! |
- |[SSTPC]|-<----------------------------------
- |___!___| !
- ! (p8)
- (p3) !
- Internet ! v
- .+.+.+.+.+.+.+.+.+.+.+. v .+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+. ! .+.+
- PSTN/IN _______________!__________________________________ ____!_____
- | [PktFlt] Service [PktFlt]| |[PktFlt]|
- | ! Node | | ! |
- | [SCF Adaptor] | | ! |
- | ! | |[SNMPAg]|
- |[SSF]<-(p4)->[SCF] <-------(p4)--------> [SRF] | | [SMS] |
- |[|--] [-^-] [---] | | [-^-] |
- |_|_____________!________________________________| |___!____|
- | ! !
- [-v-] (p7) !-----------------(p9)-----------------!
- [CO.]____|
- [---]
- ___| |_______
- | |
- | /--\ | /--\
- | ()/\() | ()/\()
- |__/__\ |____/__\
-
- Figure 8: The Lucent System
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 16]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- _____ ________
- |[W3C]|----(p0)-->| [W3S] |
- |[---]| | [WSA] |
- |-----| | ! |
- | (p1) |
- | ! |
- |[WS/CBS]|
- |[Adaptr]|
- |___!____|
- ^
- (p2)
- _____ ___v____
- |[CBC]| | [CBS] |
- |[---]|<---(p2)-->| [---] |-<---------------------------------
- |-----| |___!____| !
- ! (p8)
- (p3) !
- Internet ! v
- .+.+.+.+.+.+.+.+.+.+.+. v .+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+. ! .+.+
- PSTN/IN _______________!__________________________________ ____!_____
- | [PktFlt] Service [PktFlt]| |[PktFlt]|
- | ! Node | | ! |
- | [SCF Adaptor] | | ! |
- | ! | |[SNMPAg]|
- |[SSF]<-(p4)->[SCF] <-------(p4)--------> [SRF] | | [SMS] |
- |[|--] [-^-] [---] | | [-^-] |
- |_|_____________!________________________________| |___!____|
- | ! !
- [---] (p7) !-----------------(p9)-----------------!
- [CO.]____|
- [---]
- ___| |_______
- | |
- | /--\ | /--\
- | ()/\() | ()/\()
- |__/__\ |____/__\
-
- Figure 9: The AT&T System
-
-
-
-
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 17]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- _____ ________
- |[W3C]|----(p0)-->| [W3S] |
- |[---]| | [WSA] |
- |-----| | ! |
- | (p1) |
- | ! |
- |[WS/ ]|
- |[ SCTPS]|
- |[Adaptr]|
- |___!____|
- ^
- (p2)
- _______ ___v___
- |[SCTPC]| |[SCTPS]|
- |[-----]| <-(p2)--> |[-----]|-<----------------------------------
- |-------| |___!___| !
- ! (p8)
- (p3) !
- Internet ! v
- .+.+.+.+.+.+.+.+.+.+.+. v .+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+.+. ! .+.+.
- PSTN/IN _______________!__________________________________ ____!_____
- | [PktFlt] Service [PktFlt]| |[PktFlt]|
- | ! Node | | ! |
- | [SCF Adaptor] | | ! |
- | ! | |[SNMPAg]|
- |[SSF]<-(p4)->[SCF] <-------(p4)--------> [SRF] | | [SMS] |
- |[|--] [-^-] [---] | | [-^-] |
- |_|_____________!________________________________| |___!____|
- | ! !
- [---] (p7) !-----------------(p9)-----------------!
- [CO.]____|
- [---]
- ___| |_______
- | |
- | /--\ | /--\
- | ()/\() | ()/\()
- |__/__\ |____/__\
-
- Figure 10: The Nortel System
-
- As these are independent systems developed by different groups, the
- names of the components, unsurprisingly, don't match. Some features
- are offered by one of the systems, while they aren't by others.
- However, there are a number of common features. All of the systems
- provide a Web-based interface (at least as an option), using "back
- end" programs to construct protocols to pass onwards to the
- Intelligent Network system.
-
-
-
-
- Lu, et. al. Informational [Page 18]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- Several Intelligent Network Functional Entities are combined into a
- Service Node in the Lucent, AT&T , and Nortel systems, while in the
- Siemens scheme they are separate units. However, this is not
- particularly important for the provision of the services they offer.
-
- The main difference lies in whether or not the SCF is "aware" of the
- Internet interface and has been modified to be "complicit" in
- supporting these Internet requests. The Siemens approach was to re-
- use an existing SCP, providing a gateway function to translate as
- needed. The Lucent system used a "lighter weight" SCF adapter to
- terminate the Internet protocols, as the SCF was modified to support
- the Internet interface directly.
-
- The AT&T CallBroker and Nortel SCTP Servers introduce an intermediate
- protocol (labeled p2) that allows an alternative to the Web based
- interface supported by the others. This protocol matches the
- "CallBroker Client API", or the "SCTP Client API". These options
- provide for a bi-directional protocol, with indications sent from the
- Call Broker or SCTP Server to the Client as needed. This is not
- easily possible using an HTTP-based scheme (and in the Siemens case,
- a dedicated Finger client/server pair was used to emulate such an
- interface)
-
- The protocol between the Internet server and the Intelligent Network
- (labeled p3 in the above diagrams) differs in each of the systems.
- One of the main aims of future work will be to develop a common
- protocol that will support the services offered, so that the p3
- interface will allow different implementations to inter-operate. In
- the Lucent, Siemens, and Nortel systems, this was an "internal"
- protocol, as it was carried between entities within the Service Node
- or Gateway.
-
- Other contrasts between the systems lie in the support for Internet
- access to Service Management, and access to the Internet by Special
- Resources. Internet Management access was most developed in the
- Lucent system, in which a Simple Network Management Protocol (SNMP)
- agent was provided to allow inter-operation with the SMS controlling
- the Service Node. In the Siemens scheme, the SMS had no direct
- Internet access; any management actions were carried out within the
- normal PSTN management activities. As for Internet access to special
- resources, this was only required by the Siemens system as part of
- its support for Call Center agent notification. Equivalent
- functionality would be provided in the AT&T and Nortel systems as
- mentioned above, and this would in turn be associated with event
- notifications being sent as part of their (p3) Internet/IN protocol.
- These differences reflect the different emphases in the products as
- they were developed; again, future work will have to ensure that
- common protocols can be used to support the chosen services fully.
-
-
-
- Lu, et. al. Informational [Page 19]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 5. IN-Based Solutions
-
- 5.1 The Lucent System
-
- Figure 11 depicts the overall interconnection architecture of the
- Lucent prototype in support of the four PINT services. The IN-based
- architecture utilizes the Service Node and Service Management System
- in addition to the Web server, which enables Web-based access to the
- PINT services. This section summarizes the roles of these elements
- (complemented by a click-to-dial-back service scenario), outlines the
- interfaces of Web Server-Service Node and Web Server-Service
- Management System (i.e., the interfaces A & B), and addresses the
- common security concerns.
-
- 5.1.1 Roles of the Web Server, Service Node, and Service Management
- System
-
- Web Server
-
- The Web Server stores the profiles of content providers as well as
- pre-registered users. The content provider profile contains
- information such as content provider ID, telephone number, and fax
- number. In addition, the profile may also include service logic that
- specifies, for example, the telephone (or fax) number to be reached
- based on time of the day, day of the week, or geographical location
- of the user, and the conditions to accept the charge of the calls.
-
- Similar to the content provider profile, the pre-registered user
- profile contains information such as user name, password, telephone
- number, and fax number. The last two pieces of information can also
- be linked to time of the day and day of the week so the user can be
- reached at the appropriate telephone (or fax) number accordingly.
-
- Service Node
-
- Situated in the PSTN, the SN, like the SCP, performs the service
- control function [1, 2, 3]. It executes service logic and instructs
- switches on how to complete a call. The SN also performs certain
- switching functions (like bridging of calls) as well as a set of
- specialized functions (like playing announcements, voice recognition
- and text-to-speech conversion).
-
- Service Management System
-
- The SMS performs administration and management of service logic and
- customer-related data on the SN. It is responsible for the
- replication of content provider profiles and provision of these data
- on the SN. These functions are non-real time.
-
-
-
- Lu, et. al. Informational [Page 20]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- Web Users
- ____________
- O -------------------------- | Internet |-------------------
- ------------ |
- |
- |
- ---------------- -------------- ------------
- | Service Node | D | Service | B |Web Server|
- | (SN) |------------| Management |---------------| |
- | | |System (SMS)| | |
- | | A -------------- | |
- | |-----------------------------------------| |
- ---------------- ------------
- | |
- | I | C
- | |
- ----------- ---------
- |Mobile | |Central|
- |Switching| |Office |
- | Center | ---------
- ----------- |
- | |
- | |
- O O
-
- Mobile Wireline PSTN
- Users Users
-
- Figure 11: Overall Interconnection Architecture of the Lucent System
-
- 5.1.2 A Click-to-Dial-Back Service Scenario
-
- A Web user, who has simultaneous access to the Web and telephone
- services (this can be achieved, for example, by having an ISDN
- connection), is browsing through a sales catalogue and deciding to
- speak to a sales representative.
-
- When the Web user clicks a button inviting a telephone call from the
- sales office, the Web Server sends a message to the SN over the A
- interface, thus crossing the Internet-to-PSTN boundary. By matching
- the information received from the Web Server with the content
- provider profile that had been previously loaded and activated by the
- SMS over the D interface, the SN recognizes the signal.
-
- At this point, the SN calls the Web user. The user answers the call,
- hears an announcement, e.g., "Please wait, while we are connecting
- you to the sale agent", and is waiting to be connected to the sale
- agent. Then the SN invokes service logic as indicated in the profile.
-
-
-
- Lu, et. al. Informational [Page 21]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- The execution of this logic selects an appropriate sales agent to
- call based on the time of the day. It is 8 P.M. in New York where
- the Web user is located, and the New York sales office has closed.
- The San Francisco office, however, is still open, and so the SN makes
- a call to an agent in that office. Finally, the SN bridges the two
- calls and establishes a two-party call between the sales agent and
- the Web user.
-
- 5.1.3 Web Server-Service Node Interface
-
- Lucent developed the Service Support Transfer Protocol (SSTP) for
- communications between the SN and Web Server. SSTP is of a
- request/response type running on top of a reliable transport layer,
- such as TCP. The Web Server sends a request to the SN to invoke a
- service and the SN responds with a message indicating either success
- or failure. Note that SSTP engages only the service control function
- [1, 2, 3] of the SN.
-
- 5.1.3.1 Web Server to Service Node
-
- In this direction, three kinds of messages may be sent: the
- Transaction Initiator message, the Data Message, and the End of Data
- message.
-
- The latter two messages are needed if the service to be invoked
- involves data (such as the case in click-to-fax, click-to-fax-back
- and voice-access-to-content). This was so designed to handle the
- varying size of data and to ensure that the size of each stream is
- within the allowable size of the underlying transport packet data
- unit (imposed by some implementations of TCP/IP).
-
- a. Transaction Initiator
-
- This message provides all the necessary information but data for
- invoking a service. It includes the following information elements:
-
- + Transaction ID, which uniquely specifies a service request. The
- same transaction ID should be used for all the accompanying data-
- related messages, if the service request involves data. One way for
- generating unique transaction IDs is to concatenate the information:
- date, time, Web Server ID (uniquely assigned for each one connected
- to the SN), and transaction sequence number (a cyclic counter
- incremented for each service request).
-
- + Service ID, which specifies the service to be invoked. The service
- may be click-to-dial-back, click-to-fax, click-to-fax-back or voice-
- access-to-content.
-
-
-
-
- Lu, et. al. Informational [Page 22]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- + Content Provider ID, which uniquely represents the content
- provider. This information is the key to accessing the content
- provider's service logic and data on the SN.
-
- + Content Provider Directory Number, which is the telephone or fax
- number of the content provider to be called through the PSTN.
-
- + User Directory Number, which is the telephone or fax number of the
- user requesting the service.
-
- + Billed Party, which specifies the party (either the user or content
- provider), to be billed.
-
- In addition, optional parameters may be sent from the Web Server to
- the SN. For example, a retry parameter may be sent to specify the
- number of times the SN will attempt to complete a service request
- upon failure before the transport connection times out.
-
- b. Data Message
-
- This message provides the (encapsulated) user data part of a service
- request. For example, in the case of click-to-fax-back such data are
- the content to be faxed to the user. Each message is composed of the
- transaction ID and a data segment. The transaction ID must be the
- same as that of the transaction initiator part first invoking the
- service.
-
- c. End of Data Message
-
- This message contains the transaction ID and the end of data
- delimiter. The transaction ID is the same as that of the relevant
- transaction initiator message.
-
- 5.1.3.2 Service Node to Web Server
-
- The SN must respond to a service request from the Web Server. The
- response message consists of the information elements:
-
- transaction ID, service type, result, time, and error code.
-
- + Transaction ID, which is the same as that of the original service
- request.
-
- + Service Type, which is the same as that of the original service
- request.
-
- + Result, which is either success or failure.
-
-
-
-
- Lu, et. al. Informational [Page 23]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- + Time, which indicates the time of the day completing the request.
-
- + Error Code, which gives the reason for failure. Possible reasons
- for failure are content provider telephone (or fax) busy, content
- provider telephone (or fax) no answer, user telephone busy, user
- refusal to complete, user no answer, nuisance control limit reached,
- and content provider telephone (or fax) not in the SN database.
-
- 5.1.3.3 Usage Scenarios: Click-to-Fax and Click-to-Fax-Back
-
- For the click-to-fax and click-to-fax-back services, the Lucent
- system implemented only the case where the data to be sent as
- facsimile reside in the Web server. There are at least three messages
- that need to be sent from the Web server to the Service Node for
- these services.
-
- The first message is the Transaction Initiator that identifies the
- service type as well as a unique Transaction ID. It also includes the
- sender/receiver fax number.
-
- The next is one or more messages of the data to be faxed. Each
- message carries the same unique Transaction ID as the above.
-
- Last comes the end of message. It consists of the Transaction ID
- (again, the same as that of the messages preceding it) and the end of
- data delimiter.
-
- Upon receiving these messages, the Service Node, equipped with the
- special resource of a fax card, converts the data into the G3 format,
- calls the receiver fax, and sends back the result to the Web server
- immediately. Note that the receiver fax busy or no answer is
- interpreted as failure. Further, while the receiver fax answering the
- call is interpreted as success, it does not necessarily mean that the
- fax would go through successfully.
-
- 5.1.4 Web Server-SMS Interface and SNMP MIB
-
- This interface is responsible for uploading the content provider
- profile from the Web Server to the SMS and for managing the
- information against any possible corruption. The SN verifies the
- Content Provider ID and the Content Provider Directory Number sent by
- the Web Server with the content provider profile pre-loaded from the
- SMS.
-
- The content provider profile was based on ASN.1 [4] structure and
- SNMP [5] was used to set/get the object identifiers in the SMS
- database.
-
-
-
-
- Lu, et. al. Informational [Page 24]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- Following is an example of the simple MIB available on the SMS.
-
- inwebContProviderTable OBJECT-TYPE
- SYNTAX SEQUENCE OF InwebContProviderEntry
- MAX-ACCESS not-accessible
- STATUS current
- DESCRIPTION
- " A table containing Content Provider profiles "
- := { inweb 1}
-
- inwebContProviderEntry OBJECT-TYPE
- SYNTAX InwebContProviderEntry
- MAX-ACCESS not-accessible
- STATUS current
- DESCRIPTION
- " A conceptual row of the inweb. Each row
- contains profile of one Content Provider"
- INDEX { inwebSmsNumber }
- := { inwebContProviderTable 1 }
-
- InwebContProviderEntry := SEQUENCE {
- inwebSmsNumber Integer32,
- inwebContentProviderId Integer32,
- inwebContentProviderPhoneNumber Integer32,
- inwebContentProviderFaxNumber Integer32
- }
-
- inwebSmsNumber OBJECT-TYPE
- SYNTAX Integer32
- MAX-ACCESS read-only
- STATUS current
- DESCRIPTION
- " Serial number of the SMS - used for SNMP indexing "
- := { inwebContProviderEntry 1 }
-
- inwebContentProviderId OBJECT-TYPE
- SYNTAX Integer32
- MAX-ACCESS read-create
- STATUS current
- DESCRIPTION
- " A number that uniquely identifies each Content
- Provider "
- := { inwebContProviderEntry 2 }
-
- inwebContentProviderPhoneNumber OBJECT-TYPE
- SYNTAX Integer32
- MAX-ACCESS read-create
- STATUS current
-
-
-
- Lu, et. al. Informational [Page 25]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- DESCRIPTION
- " Content Provider's Phone Number "
- := { inwebContProviderEntry 3 }
-
- inwebContentProviderFaxNumber OBJECT-TYPE
- SYNTAX Integer32
- MAX-ACCESS read-create
- STATUS current
- DESCRIPTION
- " Content Provider's Fax Number "
- := { inwebContProviderEntry 4 }
-
- 5.1.5 Security Considerations
-
- The Lucent prototype addressed the security issues concerning the
- interface between the Web Server and the SN. Those concerning the
- interface between the Web Server and SMS, which was based in SNMP,
- were handled by the built-in security features of SNMP.
-
- + Secure Communication Links
-
- If the Network Operator (PSTN provider) is also the Web Service
- provider, the Web Server and SN/SMS will communicate over a corporate
- intranet. This network is almost always protected by the
- corporation's firewall and so can be deemed secure. This was the case
- handled by the Lucent prototype.
-
- Nevertheless, if different corporations serve as the Network Operator
- and the Web Service Provider, then it is likely that there may not
- exist a dedicated secure communication link between the Web Server
- and SN/SMS. This raises serious security considerations. One possible
- solution is to use Virtual Private Networks (VPN). VPN features
- support authentication of the calling and called parties and
- encryption of the messages sent over insecure links (such as those on
- the Internet).
-
- + Non-Repudiation
-
- All transactions were logged on both the Web Server and the Service
- Node to account for all operations in case of doubt or dispute. The
- log information on the SN may also be used to generate bills.
-
- + Malicious Requests of Users
-
- A user may make repeated requests to a content provider directory
- number maliciously. This scenario was handled by setting a Nuisance
- Control Limit (NCL) on either the SN or the Web Server or both. The
- NCL has two parameters: one defining the number of requests from a
-
-
-
- Lu, et. al. Informational [Page 26]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- user and the other the period over which these requests takes place.
-
- A user may also attempt to request a call from a directory number
- other than that of a content provider. This scenario was handled by
- verifying the directory number (and the content provider ID) against
- the database on the SN containing all the content provider
- information. If the directory number (or the content provider ID) was
- not in the database, the request would be rejected.
-
- 5.2 Siemens Web Call Center
-
- 5.2.1 Service Description
-
- The Web Call Center is an Intelligent Network System that accepts
- requests from Internet nodes for services to be provided on the PSTN.
- As the name suggests, it was designed to support a cluster of
- services that, taken together, provide a subset of the features of a
- Call Center, with almost all user interactions provided via World
- Wide Web requests and responses. See the appendix for a background
- description of Call Center Features.
-
- From an Intelligent Network perspective, there are a number of
- services that, when combined, provide the Call Center features. The
- Call Center features as implemented supported the scenario in which a
- customer makes a request to be called back by an agent at a time of
- the customer's choosing to discuss an item of interest to him or her.
- The agent will be selected based on his or her availability and
- expertise in this topic; the agent will be told whom he or she is
- calling and the topic of interest, and then the agent will be
- connected to the customer.
-
- In addition, the individual services that were deployed to support
- this scenario provided support for management of the list of
- available agents as well. This involved allowing the agent to "log
- into" and "out of" the system and to indicate whether the agent was
- then ready to handle calls to the customer. The list of services, as
- seen from a user perspective, follows.
-
- The services support:
-
- i) Customer Request service - the customer explores a corporate Web
- site, selects a link that offers to request an agent to call the
- customer back and then is redirected to the Web Call Center server.
- This presents customer with a form asking for name, the telephone
- number at which he or she wishes to be called, and the time at which
- the call is to be made. Note will also be made of the page to which
- the customer was referred to when he or she was redirected. Once the
- form has been returned, the customer receives an acknowledgment page
-
-
-
- Lu, et. al. Informational [Page 27]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- listing the parameters he or she has entered.
-
- ii) Agent Registration/Logon - An agent requests a "login" page on
- the Web Call Center server. The service checks whether it has a
- record of an agent present at the Internet node from which th call is
- made. If not, then the caller will be sent a form allowing him or her
- to enter the service identity, the company's agent identifier and
- password. On return, the service identity and company agent
- identifier will be checked against a list of known identities. If
- found, the password will be checked, and if this matches the record
- held by the service then a new session record is made of this
- identity and the Internet node from which the call has been made.
-
- NB: This is very similar to the Universal Personal Telecommunications
- (UPT) service feature "register for incoming calls". It implies that
- the identified person has exclusive use of the Internet node from
- that point onwards, so messages for them can be directed there.
-
- iii) Agent Ready - an agent who has already logged on can indicate
- that he or she is ready by requesting an appropriate "ready" page on
- the Web Call Center Server. The service will match the agent by the
- Internet node Identifier and Agent Identity passed along with the Web
- request against its list of "active" agents. It will mark them as
- being ready to handle calls in its list of available agents (with
- their pre-defined skill set).
-
- iv) Agent Not Ready - an agent can request an appropriate "ready"
- page on the Web Call Center Server to indicate that he or she is
- temporarily not ready to handle calls.
-
- v) Agent Logoff - an agent can request an appropriate "Logout" page
- on the Web Call Center Server to indicate that he or she is no longer
- associated with a particular Internet node. The service will match
- the agent by the Internet Node Identifier and Agent Identity passed
- along with the Web request against its list of "active" agents. Once
- found, the session record for that agent is removed and the caller is
- notified of this with an acknowledgment page.
-
- NB: This is very similar to the UPT "unregister" service feature.
-
- vi) Call Center Agent Selection and Notification - When the time
- that the customer selected has arrived and an available agent with
- the right skills has been selected from the appropriate list, this
- service will send a notification to the Internet node associated with
- that agent. A dedicated server is assumed to be running on the
- agent's machine that, on receiving the notification, triggers the
- agent's browser into requesting a "Agent Call In" page from the Web
- Call Center Server. Once the agent's machine has made this request,
-
-
-
- Lu, et. al. Informational [Page 28]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- he or she will be told that there is a customer to call.
-
- NB: This is similar to a "Message Waiting" or "Wake Up Call" service.
-
- Note: As implemented, the agent is led automatically into the
- following service (the returned Web page includes an automatic reload
- command).
-
- vii) Agent Instruction - a selected agent makes a request of the
- "Customer Processing" page on the Web Call Center Server. The
- Internet node Identifier and Agent Identity the agent uses will be
- matched against a list of agents expected to handle calls, and the
- instructions for the calls will be returned to the agent.
-
- NB: This is similar to a "Voice Mail Replay" message service, but in
- this case the message is automatically generated; there is no
- associated voice mail record feature accessible.
-
- Note: As implemented, the instructions page will include a number of
- buttons, allowing the agent to view the page the customer was looking
- at when he or she made the request, and to trigger the customer
- callback (as described next).
-
- ix) Agent/Customer Telephony Callback - the agent will make a
- request of a "dial-back" page on the Web Call Center Server. The
- Internet node Identifier and Agent Identity he or she uses will be
- matched against a list of agents expected to handle calls, and, when
- the appropriate records have been found, the service will make the
- telephone call through to the customer and then connect the agent to
- this telephone call (using the telephone number registered in the
- respective Call Center service record).
-
- 5.2.2 Implementation
-
- 5.2.2.1 Introduction
-
- The Siemens Web Call Center used an existing IN system and service
- logic that supported Call Center features. The scenario it supports
- is very similar to the Siemens IN-based Call Center on which it was
- based; one of the goals was to minimize changes to the service
- offered. It is also virtually identical to the service "Internet
- Requested Telephony Dial-back" provided by the Lucent system.
-
- As provided via the Internet, the services involved are mostly the
- same as those provided via the PSTN and IN alone. The main
- differences lie in the use of the World Wide Web as an interface to
- the services rather than a telephone, SSP, and Intelligent
- Peripheral. Also, the feature by which a telephone call is made
-
-
-
- Lu, et. al. Informational [Page 29]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- between the agent and the customer is implemented within the IN
- system in a different way; this is the only element in which the PSTN
- is involved.
-
- 5.2.2.2 Web Call Center Configuration
-
- The general arrangement for the Web Call Center system is shown in
- Figure 7. The components that were added to an existing IN system to
- deal with the Internet interface are described next.
-
- In addition to the SCP, SSP and SMS that were part of the original
- IN-based system, another unit was included to send notification
- messages to agents; in the IN system the agents were sent "wake up"
- telephone calls when they were required to handle their next
- customers' call back. This unit is called the "Internet Intelligent
- Peripheral", and its use is described later under "Non-World Wide Web
- Interactions".
-
- As there was a need to re-use as many of the existing IN components
- unchanged, a Gateway unit to deal with the interface between the
- Internet and the SCP was provided. This injected INAP (Intelligent
- Network Application Protocol) messages into the SCP, making it think
- that it had received an Initial DP trigger from an SSP. It also
- intercepted the "Connect To Resource" and "Prompt and Collect" INAP
- messages sent from the SCP, acting on these to return the parameters
- generated by the Internet users when they filled in the forms that
- triggered the service transaction. It also translated the "Play
- Announcement" message sent to the Intelligent Peripheral into a form
- that it could use. Finally, it passed on the INAP message used by
- the SCP to trigger SSP into making the telephone call back.
-
- 5.2.2.3 User Interaction
-
- In the IN/PSTN-based system, the services have contact with the
- customers and agents via their telephones, SSPs, and Intelligent
- Peripherals programmed to play announcements to them and to capture
- their responses. These responses are indicated by DTMF tones sent by
- pressing keys on the telephones.
-
- In this case, almost all interactions are provided via World Wide Web
- requests and responses. The sequence of announcements and responses
- for each service are "collapsed" into individual form filling
- transactions, and the requests are not limited to digits (or "star"
- and "hash"). The implications of the use of forms on service
- operation are covered in more detail later (under HTTP/IN Service
- mapping).
-
-
-
-
-
- Lu, et. al. Informational [Page 30]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 5.2.2.4 Service/Caller Identifiers
-
- When provided via the IN/PSTN-based system, the services are passed
- the Calling Line Identity (CLI) of the caller and the number the
- caller dials (the DN). The CLI value is used extensively to identify
- the caller and (in the case of the agent) to index into service data
- tables to decide what to do next. While an equivalent value to the
- DN is passed to the Web-based transactions as the requested Universal
- Resource Locator (URL), the CLI cannot be given reliably. The nearest
- equivalent caller identifier is the IP Address of the customer or
- agent's machine. However, the use of HTTP proxies means that this
- "original" Internet node Address may not be available; if a proxy is
- used then its IP Address will be associated with the request.
-
- In providing these Call Center features the customer only has one
- Web-based transaction; that of providing the initial request for a
- PSTN telephone callback. To do so he or she will have to fill in a
- form so as to specify not only the time to be called back, but also
- the telephone number to be reached. These values can be used if
- needed to identify the customer, and so the problem of originating
- Internet Node ambiguity is not relevant.
-
- With the agents, however, there are sequences of coupled
- transactions, and the particular sequence must be identified. There
- will be a number of such transactions being carried out at once, and
- there needs to be some identifier to show which agent is being
- handled in each case.
-
- Such an identifier is not part of a sequence of basic Web
- transactions. In a Web transaction, the HTTP Client/Web Browser makes
- a request, and the HTTP Server will respond to this, normally
- including some content in its reply message that will be processed by
- the browser, after which it closes the TCP connection. That's the end
- of the transaction; the HTTP client and server cannot normally
- maintain state information beyond this point. Any sequence is reduced
- to a set of unrelated transactions.
-
- A result of this simple pattern is that any state information
- reflecting longer or more complex interactions must be stored (at
- least partially) in the client system. One approach is the use of
- cookies [6]. These can be set by HTTP servers as part of their
- response to a request, and will be sent back with all subsequent
- requests for appropriate URLs as extra HTTP headers. These cookies
- allow the HTTP server to identify the client in the following
- requests, so that it can continue an extended session with the
- client.
-
-
-
-
-
- Lu, et. al. Informational [Page 31]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- Cookies are used in providing the Internet Call Center. Persistent
- cookies are installed into the Web Browser on machines that are to be
- used by call center agents as a service management (pre-service)
- task. The cookie value is unique to the machine and is used to index
- into a list of machine IP addresses that is stored as part of the
- service data.
-
- Also, a session cookie is stored onto the agent's machine when the
- agent registers, and is cleared when he or she de-registers. This is
- used to identify the agent and so the IP address of the node with
- which the agent is associated (and from which the agent's subsequent
- requests should originate). The services that interact with Call
- Center agents use the agent session cookie value as an identifier; in
- principle this is unnecessary but it does simplify the session data
- lookup procedure. The rest of the services use the persistent machine
- identifier in place of the CLI, indexing into their service data
- using it. Both cookies are sent with each agent request; if they are
- not present, then the request is redirected to other services (for
- example to the agent Logon service).
-
- 5.2.2.5 Mapping from HTTP Transactions to IN-Based Service Features
-
- All of the client-initiated services require user interaction. With
- the IN/PSTN-based system, the majority of the services are typified
- by the callers being connected to an announcement unit that plays
- them a list of choices and captures their selection. The caller can
- pre-dial the digits needed; in this case the prompts are not needed
- and are not made.
-
- The pattern of operation is somewhat different in the Internet case,
- as the initial HTTP request returns a response, after which the Web
- transaction has ended. Where that initial response returns a form to
- be filled in by the caller, subsequently submitting the form
- initiates a new HTTP transaction. This is all part of one instance
- of service, however. The service consists of two request/response
- pairs in tandem.
-
- Although it is possible to design a service to handle this pair of
- Web transactions as a single unit, it may be better to reconfigure
- it. The design of a service that deals with two Web exchanges as a
- single extended transaction is quite complex. It must maintain state
- across the pair of Web exchanges, and it has to handle a number of
- failure cases including dealing with time-outs and "out of time"
- submission of forms. The alternative is to split the service into two
- sub-features. The first of these reflects the initial request and
- delivery of the form by return, with the second one dealing with
- processing of the submitted form and returning any confirmation by
- reply.
-
-
-
- Lu, et. al. Informational [Page 32]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- The services offered don't all require form-filling, and so can be
- treated as a single IN feature. There are two cases where forms are
- required. The first of these is the Customer Request service, while
- the other one is the "Agent Registration" service. In both cases the
- initial Web transaction (by which the form is requested and returned
- to the client) need not involve specific service logic processing;
- the initial delivery of the form to a customer or agent can be
- handled by a "normal" Web Server. In both cases the service logic is
- only triggered when the form is submitted; this means that, again,
- each of the services can be treated as a single IN feature.
-
- The IN service logic that deals with these requests has a general
- pattern of action. An HTTP request is received, and this triggers the
- IN service logic into action. The service logic "sees" this as an
- Initial DP message and starts its processing as if it had been sent
- from an SSF. The SCF uses what appears to it to be an Intelligent
- Peripheral to collect the parameters of the request, and then to send
- back final announcements to the requesting entity.
-
- The main difference, from the perspective of the IN service logic
- running on the SCF, is that the service does not need to instruct the
- SSF to make a temporary connection to the Intelligent Peripheral. It
- is as if this connection had already been made. Similarly, there is
- no need to close the service transaction by sending an explicit
- "Continue Execution" message to the SSF.
-
- The sequence of "prompt/collect" instructions used to collect service
- parameters from a caller in an IN service maps quite well to a
- sequence of requests to extract a data value from the HTTP request,
- based on a tag. This is a fairly standard feature of Web Server CGI
- or Servlet processing. Using this mapping minimizes the changes to
- the service design, in that the service logic "sees" an Intelligent
- Peripheral to which it sends normal "Request Report Prompt & Collect"
- messages, and from which it receives data values in response.
-
- All services have to fit in with the underlying HTTP interaction
- pattern, and so will be expected to send a final "Announce"
- instruction to the Intelligent Peripheral at the end of the service;
- this is done in many IN services anyway and in all of the service
- features described here. These announcements form the content
- returned to the Web Client.
-
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 33]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 5.2.2.6 Non-World Wide Web Interactions
-
- There are two exceptions to the sole use of the World Wide Web for
- interaction. The first one occurs in the "Message Waiting"/"Wake Up
- Call" service by which the selected agent is informed of a callback
- request. World Wide Web transactions are very simple; the client
- browser makes a request for content associated with a particular HTTP
- URL, and the server sends a response, marking the end of the
- transaction. The server cannot make a spontaneous association with a
- client; it must be initiated by the client request.
-
- While it would be possible for the server to defer closing an earlier
- transaction (by not sending back all of the content specified and
- leaving the TCP connection open) it was decided that an alternative
- scheme would be more convenient. The "wake up call" was arranged by
- an "Internet Intelligent Peripheral" sending a request to a daemon
- process running on the selected agent's machine, using the Finger
- protocol [7]. The daemon sent back a standard response, but in
- addition the Web Browser on the agent's machine was triggered into
- making a further HTTP request of the server. In this way the "Agent
- Instruction" transaction is started automatically, while still
- allowing it to use a normal HTTP request/response pattern.
-
- The second exception occurs in the final "Agent/Customer Telephony
- Callback" service. While this transaction is initiated by the agent
- selecting a link on the "call instructions page" returned to them,
- and includes a "confirmation" page being sent back to them in an HTTP
- response, the purpose of this service is to make a telephone
- connection via the PSTN between the agent's telephone and the
- customer's telephone. It is the only service element that involves
- the PSTN directly. From an IN/PSTN perspective, the resulting
- telephone connection is different from that provided in the scheme
- using the IN and PSTN alone. In this case, a PSTN call is made out to
- the agent's telephone, another call is made out to the customer's
- telephone, and these calls are bridged. This differs from the earlier
- scheme, in which the agent originated a call to the voice mail replay
- system, and this call was redirected to a new destination (the
- customer's telephone). As this feature differs in purpose from the
- other services, and it requires a different implementation within the
- IN and PSTN system, it was organized as a separate service in this
- case.
-
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 34]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 5.2.2.7 Security Considerations
-
- In the case of this system, assumptions were made that the interface
- presented to requesting agents and customers was provided via a fire
- wall to deal with most attacks on the IN components. The interface
- appeared as a Web Server, and there was no direct access to the HTTP
- documents served, nor to the servlets providing the service logic.
-
- The Callback service was deemed to have simpler security requirements
- than other IN services as it was akin to a free phone "1-800" service
- access number; the agents work for the service subscriber and are not
- charged directly. Similarly, the requesting customer is not charged
- for his or her request, nor for the resulting call back. Service
- subscribers would be willing to pay the costs of telephone calls
- generated as a result of this cluster of services, and the costs of
- running the agent services could be charged directly to them. As such
- the authorization for service is defined by the contract between the
- service subscriber and the service provider.
-
- Authentication of agents was seen as a problem. As an interim
- measure, cookies were used, but this scheme delivers the cookie data
- as a plain text item (a header of the Web request). Secure Socket
- Layer connections were required for communication with the agent
- services, and this had an impact on the performance of the IN system.
-
- 5.2.3 Derived Requirements/Lessons
-
- Security is seen as a major issue. A firewall was used to control
- access to the IN Components. Similarly, SSL was used for
- communication with the Agents, so as to protect the cookie values
- that they were sending with their requests.
-
- For other services, it is likely that the entity from which requests
- appear to originate will be charged for the service to be rendered.
- This has implications in terms of authentication and authorization of
- service provision at the time of the request. It is necessary for the
- service to be authorized in such a way that non-repudiation is
- ensured; this is likely to mean that a certificate of identity be
- provided from the person making the request, and that this can be
- tied in with a financial account that that person has with the
- service provider. The certificate can then be stored as part of the
- billing record. While the process of electronic commerce is outside
- of the scope of this work, the mechanism by which a request for
- confirmation of identity is passed out to the requesting user and is
- delivered back to the service logic must be considered.
-
-
-
-
-
-
- Lu, et. al. Informational [Page 35]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- When changing from a "pure" IN/PSTN system to one supporting requests
- via the Internet, the differences in the way that clients interacted
- with the services meant that the service logic had to be redesigned.
- It was realized that maintaining the state of a service during its
- processing was going to be a problem; this problem was side-stepped
- by re-engineering the services as form processors, allowing them to
- deal with fully specified requests as a single (Web) transaction. In
- addition, a "normal" Web Server was used to deliver the forms to the
- users. This is a change from the IN system, where the equivalent of
- the form (the prompts) were sent in sequence as part of the same
- service process.
-
- The Call Center features provided suited this change. However, this
- may not be the case for other IN services. It is quite common for
- services to be designed such that the user is prompted for a
- response, and the service continues dependent on this response. The
- Web form presents all of the options at once, so this kind of variant
- prompt/collect sequence is not possible. From this, it is difficult
- to see how an IN service could be reused without some degree of
- modification.
-
- An intermediate "gateway" system was provided to "cocoon" the service
- logic as far as possible from the details of the components with
- which it was working. Where needed, this unit translated calls from
- the service logic into commands that operated with the Internet (and
- the Web Server that acted as the interface). Our experience was that
- an SCP could be "spoofed" into thinking that it was operating with
- other IN components in the normal way. Within the limits of the
- service used, this proved simpler than was originally expected.
-
- Selecting this simple approach still allows a considerable range of
- services to be provided while maintaining any investment in existing
- IN systems. Modification of existing IN service logic was also
- easier than feared. All of the services examined provided
- announcements at the end of the service transaction, and this could
- be used to trigger a Web response to be sent back to the requesting
- Internet user. The changes to the Call Center service logic turned
- out to be minor; it took as long to analyze the service and see how
- it could be arranged as a sequence of "form processing" transactions
- as it did to make the changes to the service logic.
-
- In the Siemens Web Call Center, the "Internet Intelligent Peripheral"
- with which the service logic communicated was running as a separate
- program on the same node. Where more complex behavior is required of
- it (such as conversion of text to speech data and interface with the
- PSTN) then it would almost certainly be on a separate node. If data
- is transferred from the Internet in such a scheme, any intermediate
- gateway would be involved in relaying the data to this node.
-
-
-
- Lu, et. al. Informational [Page 36]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 6. Alternative Solutions
-
- 6.1 The AT&T System
-
- AT&T developed a framework for controlling voice and voice-band data
- (e.g., fax) and for providing PINT services. Key to the framework is
- CallBroker, a logical entity that acts on behalf of a user to set up
- sessions and make requests for PSTN resources. The sessions typically
- include initiation of calls between two or more end points specified
- by the user. In addition to its interactions with the PSTN for call
- setup, the CallBroker is responsible for other functions, when
- necessary, such as authentication and usage recording.
-
- This section briefly discusses the protocol at the two interfaces
- that need to be defined and the corresponding APIs to provide the
- above services. The two interfaces are (1) the one between the
- CallBroker (or Web Server) and the Service Control Function in the
- Service Node in the PSTN and (2) the one between the IP client and
- the CallBroker. The latter interface, in particular, will enable
- service providers to extend the architecture defined here to serve as
- a platform for other advanced/value-added services (to be identified
- later). In addition, the view taken here is that the IP client is
- more general, and implements a protocol for communication with the
- CallBroker that allows full two-way communications. For example, this
- is required for the cases where a called party hangs up and an
- indication may be necessary to be given to the IP Client about this
- status/progress. This is also necessary when conferencing to give an
- indication/status of various parties joining the call.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 37]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 6.1.1 High Level Architecture
-
- A high level architecture depicting various logical entities and the
- Interfaces among these logical Entities and the IP Client is shown in
- Figure 12.
-
- ________________
- /
- 1 _____ / 2 _____
- /|________________| |________| | PSTN
- |____| \ |____|
- Call \ / SCF\
- Broker \ / SN \
- \_____________
- / \
- / \
- / \
- __ __
- /\ /\
-
- Calling Participant
- Party (Called Party)
-
-
- Figure 12: The CallBroker Architecture
-
- The CallBroker, in addition to the initiation and control of calls on
- behalf of the user, performs additional functions. These functions
- include authenticating the IP Client, usage recording, and management
- of the session for the IP Client for the telephony call. The notion
- of the session requires that a client state machine be maintained in
- the CallBroker. This also helps in notifying the IP Client about the
- status/progress of the requests generated from the IP Client.
-
- From the perspective of the IP Client, the logical entities needed
- for the above functions are within the CallBroker and are as shown in
- Figure 13 below. These correspond to the functions already
- discussed: Usage Recording Function, Session Management Function,
- Voice Bridge, and the Authentication Function. The fact that some of
- these functions may be physically separate from the CallBroker (such
- as the Voice Bridge being in the PSTN) is not inconsistent with the
- general view adopted here. Thus, the CallBroker Model mediates
- requests for network services and enables us to define various value
- added services in the future.
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 38]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- llllllllllllllll
- l l
- l Call Broker l Authentication
- l Server l Function
- l ______ l Interface 2a ______
- l | |x x xlx x x x x x x x x | |
- l |______|x l |____|
- l x x l
- l x xl Interface 2b
- lSession State lx
- l Mnmgt. x l x Usage Recording
- l Function l x Function
- l _______ x l x ______
- l | | l x x x | |
- l |_____| xl |____|
- llllllllllllllll
- x
- x Interface 2c
- x
- _______
- | |
- |_____|
-
- Bridge
-
-
- Figure 13: Functional Entities in the Call Broker
-
- Various interfaces (i.e., 2a, 2b, 2c in Figure 13) between different
- functional entities in the CallBroker may also be standardized. The
- Session State Management Function may be physically realized as part
- of the CallBroker Server.
-
- 6.1.2 IP Client to CallBroker Interface
-
- Communication on the IP Client to CallBroker Interface (Interface 1
- in Figure 12) is a simple ASCII based protocol running directly on
- TCP. The messages on this interface are primarily requests from the
- client to the CallBroker, responses from the CallBroker to the IP
- client responding to the requests and unsolicited events from the
- CallBroker to the IP client. Since the communication is not strictly
- transaction oriented, traditional encapsulation protocols like HTTP
- cannot be used. There has been some ongoing work attempting to use
- multiple concurrent HTTP POST requests to support event delivery but,
- without too much difficulty, the ASCII protocol specified here can
- easily be mapped to the POST payload of the HTTP protocol.
-
-
-
-
-
- Lu, et. al. Informational [Page 39]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 6.1.3 Protocol
-
- Basic Format
-
- The basic format of the protocol is as follows:
-
- [header]<<LF>
- <<LF>
- [body]<<LF>
- <<LF>
- <<LF>
-
- The header and body of the protocol are separated by 2 line feed
- characters. The format of the header and the body is described
- below. Line feed characters in the header or body will be escaped
- using simple URL encoding.
-
- Header
-
- [session-id | 0]<<LF>
- [message-id]<<LF>
- [version-info]<<LF>
-
- All CallBroker transactions are identified by sessions. A session
- does not necessarily correspond one-to-one to a TCP session. If the
- IP client is attempting to initiate a new session with the CallBroker
- the session-id field is populated with '0' to indicate session
- creation request. Every session request needs to be accompanied by
- sufficient information regarding authentication for the CallBroker to
- create the session.
-
- Message-id represents the operation of the message.
-
- Version-info contains optional version information of the protocol.
- This is to aid possible version mismatch detection and graceful error
- recovery.
-
- Body
-
- The body of the protocol messages consists of name value pairs. These
- name-value pairs are interpreted with reference to the message-id
- which signifies the operation to be performed by the CallBroker.
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 40]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 6.1.4 APIs Exposed to the IP Client
-
- The APIs of the CallBroker exposed to the IP client are distinct and
- different from the APIs that the CallBroker uses from the different
- supporting subsystems including the authentication subsystem and the
- usage recording subsystem. The IP client APIs enable clients to
- effectively control voice conferencing.
-
- 6.1.5 Voice-Bridge Control API
-
- The Voice Bridge Control API is used by CallBroker applications to
- access voice bridging functionality. The API distinguishes between
- sessions and calls. Calls represent actual voice calls placed from/to
- the voice bridge. These calls can be grouped together in sessions.
- All the calls that belong to a session are bridged. Calls have a
- significance outside the scope of sessions. Every call can be
- associated with multiple sessions with different weights at the same
- time. The advantage of this approach is the ability to support
- concepts like whispering in a conference call. Calls can also be
- dropped from a conference session and bridged together in a new
- session to give the notion of a sub-conference. These calls can later
- be re-added to the main conference session.
-
- 6.2 Simple Computer Telephony Protocol
-
- 6.2.1 Overview
-
- The Simple Computer Telephony Protocol (SCTP) is a third party call
- control protocol and as such does not comply with the PINT charter.
- SCTP is described in this section to show how PINT services could be
- implemented using SCTP, and where SCTP fits into the PINT
- architecture.
-
- In addition to third party call control, SCTP also provides
- subscriber (i.e., user) feature management (e.g., allows a user to
- set do not disturb, call forwarding parameters), and subscriber
- monitoring of terminal, line and address status. SCTP is strictly
- client/server-based. It has no provisions for peer to peer
- communications. SCTP runs as a TCP application protocol. It is
- ASCII-based and uses sockets. The SCTP Server is usually connected to
- a switch via a CTI (Computer-Telephony Integration) connection.
- Because of this, feature interactions are limited to those within the
- context of a single call, and not between PSTN services. The SCTP
- Server within a PINT Gateway could also be connected to an SN, or an
- SCP. See figures below. SCTP does NOT carry media.
-
-
-
-
-
-
- Lu, et. al. Informational [Page 41]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 6.2.2 How SCTP Fits in with the Reference PINT Services
-
- SCTP Client as Part of a Web Server
-
- +------+ +--------+ +--------+ +------+
- | | | | SCTP | | | |
- | |----| |-------| |----| |
- | | | | | | | |
- +------+ +--------+ +--------+ +------+
- User's PC Web Server/ PINT Gateway SN/SCP/Switch
- CGI
-
- Figure 14: SCTP Client as Part of a Web Server
-
- In this architecture, the SCTP Client is embedded in the Web Server.
- It is there for the specific purpose of initiating calls to the PSTN
- based on user requests. The SCTP Server is within the PINT Gateway.
- We go through the classic PINT examples:
-
- Click-to-dial-back: The SCTP Client issues an SCTP MakeCall to the
- SCTP Server with the calling number supplied by Web page, and called
- number supplied by the user.
-
- Click-to-fax-back: SCTP Client issues an SCTP MakeCall to the SCTP
- Server with called number set to user's fax machine, and calling
- number set to Web Server's fax machine, and treatment set to the URI
- for the file to be faxed. The SCTP Server takes the file and feeds
- it into the call just as a fax machine would.
-
- Click-to-fax: SCTP Client issues an SCTP MakeCall with calling number
- set to user's fax machine, and called number set to Web Server's fax
- machine. How the file is supplied to the user's fax machine is
- outside the scope of SCTP.
-
- Voice-access-to-content: SCTP Client issues an SCTP MakeCall with
- called number set to user's telephone number, and calling number set
- to Web Server and treatment set to a URI for the file of the
- particular Web page to be read to the called number. The SCTP Server
- takes care of the file to voice conversion and this is fed into the
- call as if it were voice.
-
- In all of the above cases, the SCTP Client can generate a variety of
- different Web pages to send to the Web Server via CGI (Common Gateway
- Interface). The content of these pages is based on the call
- completion status of the CallMake SCTP action.
-
-
-
-
-
-
- Lu, et. al. Informational [Page 42]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- SCTP Client Running on the User's PC
-
-
- +------+
- HTML | | INTERNET
- +-----+ /--------------| |
- | |---/ +------+
- | | Web Server
- | |---\
- +-----+ \
- User's PC \ SCTP +------+ +------+
- \------------| |-------| | PSTN
- | | | |
- +------+ +------+
- PINT Gateway SN/SCP/Switch
-
-
- Figure 15: SCTP Client Running on the User's PC
-
- In this architecture, the user has an SCTP Client co-located with it.
- If the user is using the telephone line for connection to a Web
- Server and there is an incoming call, then the SCTP Server in the
- PINT Gateway will post this event to the SCTP Client. A window will
- pop up on the user's screen with options available to the user for
- handling of the incoming call. The user can choose to take the call,
- send it to voice mail, or send it to another number.
-
- For the Fax back service, for example, if the user had a separate fax
- machine from his or her PC, then the SCTP Server would tell the SCTP
- Client there is an incoming fax. The user would end or suspend his or
- her Internet connection, the fax would come in, and the user could
- then resume the Internet connection.
-
- 7. Session Initiation Protocol--An Emerging Standard
-
- 7.1 Overview
-
- SIP, the Session Initiation Protocol, is a simple signaling protocol
- for Internet conferencing and telephony. It is currently under
- development within the IETF MMUSIC (Multiparty Multimedia Session
- Control) Working Group.
-
- SIP provides the necessary mechanisms to support the following
- services:
-
- - call forwarding, including the equivalent of 700-, 800- and 900-
- type calls;
- - call-forwarding no answer;
-
-
-
- Lu, et. al. Informational [Page 43]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- - call-forwarding busy;
- - call-forwarding unconditional;
- - other address-translation services;
- - callee and calling "numbers" delivery, where the numbers can be of
- any (preferably unique) naming scheme;
- - personal mobility, i.e., the ability to reach a called party under
- a single, location-independent address, even when the user changes
- terminals;
- - terminal-type negotiation and selection: a caller can be given a
- choice of how to reach a party, e.g., via Internet telephony,
- mobile, phone, and an answering service;
- - caller and callee authentication;
- - blind and supervised call transfer;
- - user location; and
- - invitation to multicast conferences.
-
- Extensions of SIP to allow third-party signaling (e.g., for click-
- to-dial-back services, fully meshed conferences and connections to
- Multipoint Control Units (MCUs), as well as mixed modes and the
- transition between those) have been specified.
-
- SIP addresses (URLs) can be embedded in Web pages. SIP is
- addressing-neutral, with addresses expressed as URLs of various types
- such as SIP, H.323 or telephone (E.164). A purely representational
- example of a SIP URL might be sip:+12125551212@foo.example.com, where
- foo.example.com is the host serving as a gateway into the PSTN.
-
- SIP is independent of the packet layer and only requires an
- unreliable datagram service, as it provides its own reliability
- mechanism. While SIP typically is used over UDP or TCP, it could,
- without technical changes, be run over IPX, or carrier pigeons, ATM
- AAL5 or X.25, in rough order of desirability.
-
- SIP can set up calls "out-of-band". For example, while the SIP
- protocol exchanges use IP, plus UDP or TCP, the actual data transport
- can take place via the PSTN. This feature makes it possible to use
- SIP to control a PBX or send requests to a Service Control Point. The
- PINT services make use of this flexibility.
-
- 7.2 SIP Protocol
-
- SIP is a textual client-server protocol, similar in syntax to HTTP
- and RTSP. Requests consist of a method (INVITE, BYE, ACK, or
- REGISTER), a list of parameter-value pairs describing the request and
- an optional request body. Parameters include the origin and
- destination of the call and a unique call identifier. They may
- indicate the caller's organization as well as the call's subject and
- priority. The request body contains a description of the call to be
-
-
-
- Lu, et. al. Informational [Page 44]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- established or the conference to be joined. The description format is
- not prescribed by SIP; SDP is one possibility being standardized
- within the IETF. For the purposes of providing PINT services, an
- additional phone number address format is to be added to SDP.
-
- Responses indicate whether a request is still being processed, was
- successful, can possibly be satisfied by another node or failed. When
- a call is redirected, the response indicates the name of the node to
- be tried. Unsuccessful calls may also return a better time to try
- again.
-
- In a typical successful call, the caller sends an INVITE request to
- the callee. The callee accepts the call by returning a response code
- to the callee, which then confirms the receipt of that acceptance
- with an ACK request. Either side can terminate the call by sending a
- BYE request.
-
- Requests can be authenticated using standard HTTP password and
- challenge-response mechanisms. Requests and responses may also be
- signed and encrypted.
-
- 7.3 SIP entities
-
- SIP distinguishes three kinds of entities:
-
- User agents receive and initiate calls and may forward the call.
-
- A proxy server is an intermediary program that acts as both a server
- and a client for the purpose of making requests on behalf of other
- clients. Requests are serviced internally or by passing them on,
- possibly after translation, to other servers. A proxy must interpret,
- and, if necessary, rewrite a request message before forwarding it. A
- proxy server may, for example, locate a user and then attempt one or
- more possible network addresses.
-
- Redirect server accepts a SIP request, maps the address into zero or
- more new addresses and returns these addresses to the client. Unlike
- a proxy server, it does not initiate its own SIP request. Unlike a
- user agent server, it does not accept calls.
-
- Proxy and redirect servers may make use of location servers that
- determine the current likely location of the callee.
-
- A PSTN gateway initiates phone calls between two parties. This may be
- a server that sends requests to an SCP in an IN environment or it may
- be a CTI-controlled PBX.
-
- A SIP call may traverse one or more proxy servers.
-
-
-
- Lu, et. al. Informational [Page 45]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- The servers that control a PBX or an SCP act as user agents. A Web
- server may also act as a SIP user agent.
-
- 7.4 Providing Call Control Functionality
-
- The SIP for PINT specification provides details on how to use SIP to
- initiate phone calls between two PSTN end points. (SIP can also
- initiate calls between Internet end points and between an Internet
- and PSTN end point, but this is beyond the scope of this document.)
-
- It should be noted that the SIP client for initiating such phone
- calls can be either at the user's location (his/her workstation) or
- can be a Web server that calls up a SIP client via a CGI program.
- There is no difference in operation or functionality, except that the
- owner of the Web server may be legally responsible for the calls
- made.
-
- A SIP client needs to convey two addresses to the PSTN gateway: the
- party making the call and the party to be called. (The party to be
- billed also needs to be identified; this can either be done by a SIP
- header or by having the server look up the appropriate party based on
- the two parties. This aspect is for further study.)
-
- Described below are three ways these addresses can be conveyed in
- SIP. In the example, the address of party A is +1-212-555-1234 and
- that of party B is +1-415-555-1200. (The URL types in this and other
- examples are representational; they may but do not have to exist.)
-
- (1) The two PSTN addresses are contained in the To header (and
- request-URI) and an Also header. For example:
-
- INVITE sip:+1-212-555-1234@pbx.example.com SIP/2.0
- To: phone:1-212-555-1234
- From: sip:j.doe@example.com
- Content-type: application/sdp
- Call-ID: 19970721T135107.25.181@foo.bar.com
- Also: phone:+1-415-555-1200
-
- v=0
- o=user1 53655765 2353687637 IN IP4 128.3.4.5
- c=PSTN E.164 +1-415-555-1200
- t=0 0
- m=audio 0 RTP/AVP 0
-
- In that case, the gateway first connects to party A and then party B,
- but without waiting for A to accept the call before calling B.
-
-
-
-
-
- Lu, et. al. Informational [Page 46]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- (2) Parties A and B are indicated by separate invitations. This
- allows the gateway to make sure that party A is indeed available
- before calling party B. After calling party A, the gateway could
- play an announcement indicating that the call is being connected
- using, for example, RTSP with appropriate Conference header
- indicating the call.
-
- INVITE sip:+1-212-555-1234@pbx.example.com SIP/2.0
- To: phone:1-212-555-1234
- From: sip:j.doe@example.com
- Content-type: application/sdp
- Call-ID: 19970721T135107.25.181@foo.bar.com
- ...
- INVITE sip:+1-415-555-1200@pbx.example.com SIP/2.0
- To: phone:+1-415-555-1200
- From: sip:j.doe@example.com
- Content-type: application/sdp
- Call-ID: 19970721T135107.25.181@foo.bar.com
- ...
-
- (3) The two PSTN addresses are conveyed in the To header of the SIP
- request and the address in the SDP media description. Thus, a request
- may look as follows:
-
- INVITE sip:+1-212-555-1234@pbx.example.com SIP/2.0
- To: phone:1-212-555-1234
- From: sip:j.doe@example.com
- Content-type: application/sdp
- Call-ID: 19970721T135107.25.181@foo.bar.com
-
- v=0
- o=user1 53655765 2353687637 IN IP4 128.3.4.5
- c=PSTN E.164 +1-415-555-1200
- t=0 0
- m=audio 0 RTP/AVP 0
-
- Here, pbx.example.com is the name of the PSTN gateway; the call will
- be established between 1-212-555-1234 and +1-415-555-1200.
-
- Users can be added to an existing call by method (1) or (2).
-
- 8. Overall Security Considerations
-
- Inter-networking of the Internet and PSTN necessitates the
- introduction of new interfaces (e.g., the A, B and E interfaces in
- Figure 6). To ensure that their use does not put the networks, in
- particular the PSTN, at additional security risk, these interfaces
- need to be designed with proper security considerations. Sections
-
-
-
- Lu, et. al. Informational [Page 47]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 5.1.5 and 5.2.2.7 describe how two of the pre-PINT implementations,
- the Lucent and Siemens systems, handle the security aspect,
- respectively.
-
- Worth noting are the security requirements suggested by pre-PINT
- experiences. They are:
-
- +Peer entity authentication to allow a communicating entity to prove
- its identity to another in the network (e.g., the requesting IP-host
- to the PINT gateway, and the PINT gateway to the PSTN node providing
- the service control function).
-
- +Authorization and access control to verify if a network entity
- (e.g., the requesting IP-host) is allowed to use a network resource
- (e.g., requesting services from the PINT gateway).
-
- +Non-repudiation to account for all operations in case of doubt or
- dispute.
-
- +Confidentiality to avoid disclosure of information (e.g., the end
- user profile information and data) without the permission of its
- owner.
-
- In the course of the PINT interface development, additional
- requirements are likely to arise. It is imperative that the resultant
- interfaces include specific means to meet all the security
- requirements.
-
- 9. Conclusion
-
- This document has provided the information relevant to the
- development of inter-networking interfaces between the PSTN and
- Internet for supporting PINT services. Specifically, it addressed
- technologies, architectures, and several existing pre-PINT
- implementations of the arrangements through which Internet
- applications can request and enrich PSTN telecommunications services.
- One key observation is that the pre-PINT implementations, being
- developed independently, do not inter-operate. It is a task of the
- PINT Working Group to define the inter-networking interfaces that
- will support inter-operation of the future implementations of PINT
- services.
-
- 10. Acknowledgments
-
- The authors would like to acknowledge Scott Bradner, Igor Faynberg,
- Dave Oran, Scott Petrack, Allyn Romanow for their insightful comments
- presented to the discussions in the PINT Working Group that lead to
- the creation of this document.
-
-
-
- Lu, et. al. Informational [Page 48]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 11. Appendix
-
- 11.1 PSTN/IN 101
-
- 11.1.1 Public Switched Telephone Network
-
- What is normally considered as "the Telephone Network" consists of a
- set of interconnected networks. Potentially, each of these networks
- could be owned by a different Network Operator. The official name for
- such a network is Public Switched Telecommunications Network (PSTN).
- A simple PSTN consists of a set of Switches (called Central Offices
- or Telephone Exchanges) with links interconnecting them to make up
- the network, along with a set of access connections by which
- terminals are attached. The PSTN is used to deliver calls between
- terminals connected to itself or to other PSTNs with which it is
- interconnected. Calls on the PSTN are circuit switched; that is, a
- bi-directional connection is made between the calling and called
- terminals for the duration of the call. In PSTNs the connection is
- usually carried through the network in digital format occupying a
- fixed bandwidth; this is usually 56 or 64 Kbps. The overall
- configuration of the PSTN is shown in Figure 16.
-
- /--\
- ()/\()__
- /__\ \ .................................
- \ ! ! ! /--\
- __ \ [-!-] [-!-] ! ()/\()
- \ \ \__[CO ]=========[CO ]==\\ ! ___/__\
- [Fax]________[---] [---] \\ [-!-] / __
- \\=======[CO ]____/ \ \
- [---]________[Fax]
- Key: ___ Access Lines
- === Trunk Links (inter-CO user data links)
- ... Inter-CO signaling network links
-
- Figure 16
-
- Messages are sent between the Switches to make and dissolve
- connections through the network on demand and to indicate the status
- of terminals involved in a call; these "signaling" messages are
- carried over a separate (resilient) data network dedicated to this
- purpose. This signaling network is also known as the Common Channel
- Signaling (CCS) or Signaling System Number 7 (or SS7) network after
- the names of the signaling protocol suite used.
-
- As yet, the majority of access connections to a PSTN carry analogue
- signals, with simple (analogue) telephones or Facsimile machines as
- terminals. Call requests are indicated to the Central Office to which
-
-
-
- Lu, et. al. Informational [Page 49]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- a telephone is connected either by a sequence of pulses or tone pairs
- being sent. Notifications on the status of the request are sent back
- to the telephone in the form of tones. Indication from a Central
- Office that a call is being offered to a telephone is arranged by
- sending an alternating voltage down the access connection which in
- turn causes the ringer in the telephone to sound. These access lines
- have a unique address associated with them and can support a single
- call.
-
- However, with analogue or digital multi-line connections, or
- Integrated Service Digital Network (ISDN) Basic or Primary Rate
- Interfaces (BRI or PRI), several concurrent calls are possible and a
- set of addresses are associated with them. The new ISDN access
- connections are designed so that data exchanged with the network is
- in multiplexed digital form, and there is an individual channel for
- each of the potential connections, together with a separate channel
- dedicated to sending and receiving call request and call alert data
- as well as carrying packet switched user data. These call request and
- call alert messages act as the equivalent of the pulses or tones that
- are sent when dialing, and the ringing signal that is sent to a
- telephone when a call is being made to it.
-
- The operation of the call request is fairly simple in most cases and
- is shown in Figure 17.
-
- /--\
- () ()
- --____
- /++\ \ ................................. /--\
- /----\ \ ^ v ! () ()
- A \ [-!-] [-!-] ! --
- \->[CO ]=========[CO ]==\\ v ->-/ \
- [---] [---] \\ [-!-] / /----\
- \\=======[CO ]____/ B
- [---]
- Key: ___ Access Lines
- === Trunk Links (inter-CO user data links)
- ... Inter-CO signaling network links
- CO Central Office (Telephone Exchange)
-
- Figure 17
-
- The user presses a sequence of numbers on a telephone handset
- (labeled A), and the telephone passes a sequence of digits (either as
- pulses or tone pairs) to the Central Office via the access line. The
- Central Office contains a processor that will be notified that the
- user has made a request and the digit string that is the sole
- parameter of the request. This digit string is taken to be the unique
-
-
-
- Lu, et. al. Informational [Page 50]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- address of an access line connected either to itself or to another
- Central Office. There is a hierarchical addressing scheme, so that
- the digit string can be parsed easily. A call request to a terminal
- (labeled B) connected to a remote Central Office can be routed by
- examining the digit string passed; the Central Office will extract
- the part of the passed address that corresponds to the remote Central
- Office in question, and can route the request onward, forming an
- inter-Switch call request and passing it via the signaling network.
- At the same time it will allocate one of its available transmission
- channels towards the remote Central Office.
-
- 11.1.2 Intelligent Network
-
- This scheme has been used since the 1950s, and suffices for the
- majority of calls. However, there are a range of other services that
- can be (and have been) provided, enhancing this basic call
- processing. Freephone or Premium Rate services (1-800 or 1-900
- services) are good examples of the supplementary services that have
- been introduced. Apart from the important feature that the cost of
- these calls is varied so that the caller does not pay for a free-
- phone call, or pays an extra charge for a premium rate call, they
- have the similarity that the number dialed must be translated to
- arrive at the "real" address of the destination terminal. They are
- known as number translation services, and make up the bulk of all
- supplementary services delivered today.
-
- These were originally programmed into each Central Office, but the
- complexity of maintaining the data tables on each processor grew
- cumbersome, so a more general solution was sought. After a
- considerable gestation period, the eventual solution was the
- Intelligent Network. This takes the separation of Central Offices and
- the network links interconnecting them a stage further.
-
- The Central Offices are considered to provide the Call Control
- Function (CCF). In addition, the Service Switching Function (SSF) is
- provided to "enhance" the operation of these Switches by detecting
- when a particular request has been made (such as by dialing 1-800).
- If this pattern is detected, the equipment implementing the SSF will
- send a specialized request message over the signaling network to a
- separate computer that implements the Service Control Function (SCF).
- This entity is responsible for querying service specific data (held
- in a unit providing the Service Data Function, or SDF), performing
- any digit translations necessary, and sending the details of how to
- proceed back to the SSF, where they are obeyed and the call is put
- through to the "real" destination. In many implementations, the SDF
- is closely coupled to the SCF. This configuration is shown in Figure
- 18.
-
-
-
-
- Lu, et. al. Informational [Page 51]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- [---] [---] [---]
- /--\ [SRF] [SCF] [SDF]
- ()/\()__ [|-!] [-!-] [-!-]
- /__\ \ || \.............!......!........
- \ || / ! ! /--\
- __ \ [|-!] [-!-] ! ()/\()
- \ \ \__[SSF] [CCF] ! ___/__\
- [Fax]________[CCF]=========[---]==\\ [!--] / __
- \\========[CCF]__/ \ \
- [---]_______[Fax]
- Key: ___ access relationship
- === trunk relationship
- ... signaling relationship
-
-
- Figure 18
-
- The advantage is that there can be a much smaller number of physical
- units dedicated to the SCF, and as they are connected to the
- signaling network they can be contacted by, and can send instructions
- back to, all of the units providing the SSF and thus the CCF.
-
- In another enhancement, a separate entity called the Special Resource
- Function (SRF) was defined. Equipment implementing this function
- includes announcement units to play recorded messages (for example,
- prompts to enter digits) to callers. It will also include the tone
- decoders needed to capture any digits pressed by the caller in
- response to the prompts. It is connected to the rest of the PSTN
- usually via trunk data links. It will also include a signaling
- connection (directly or indirectly) back to the SCF, via the PSTN's
- core signaling network.
-
- As an example of the way that these different functional entities
- interact, the SCF can ask an SSF handling a call to route the caller
- temporarily through to an SRF. In response to instructions sent to it
- from the SCF over the signaling network, the SRF can play
- announcements and can collect digits that the user presses on their
- terminal in response to prompts they are played. Once these digits
- have been collected they can be passed on to the SCF via a signaling
- message for further processing. In normal operation, the SCF would
- then ask the SSF to dissolve the temporary connection between the
- user's terminal and the SRF. This allows the collection of account
- numbers or passwords (or PINs) and forms the heart of many "Calling
- Card" services.
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 52]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- This pattern of user interaction is also used in a wide variety of
- other services where extra account information and PINs are needed.
- They are collected as just described and can be checked against the
- correct values stored in the service database prior to allowing the
- call to proceed.
-
- The Intelligent Network functional entities can be realized as
- physical units in a number of different combinations. A common
- configuration is shown in Figure 19.
-
-
- [---] [---] [---] [---]
- /--\ [I.P] [SCP] [SDP] [SN ]
- ()/\()__ [|-!] [-!-] [-!-] [--|]
- /__\ \ || \.............!.....!..... |
- \ || / ! \ | /--\
- __ \ [|-!] [-!-] \ | ()/\()
- \ \ \__[SSP]=========[CO ]==\\ \ | ___/__\
- [Fax]________[---] [---] \\ [!-|] / __
- \\=======[CO ]__/ \ \
- [---]_______[Fax]
-
- Key: ___ Access Lines
- === Trunk Links (inter-CO user data links)
- ... Inter-CO signaling network links
- SSP Service Switching Point - a unit that implements the
- Service Switching Function
- CCP Call Control Point - a unit that performs call control
- functions.
- This is normally a kind of Central Office (shown as CO
- above)
- SCP Service Control Point - a unit implementing the Service
- Control Function. NOTE that this is connected to the SS7
- Network and uses this connection for all of its
- communications.
- I.P Intelligent Peripheral - a unit that contains specialized
- resources (like announcement units, tone decoders).
- In effect, it implements Special Resource Functions.
- SN Service Node
-
- Figure 19
-
- This diagram also shows a unit called a Service Node, or SN. This
- contains components that realize all of the operational Intelligent
- Network functions (SSF, SCF, SDF, and SRF). It is sometimes more
- convenient to have all of these elements in one node (for example,
- for operations and maintenance reasons), particularly within smaller
- PSTNs or where there is a relatively low level of requests for
-
-
-
- Lu, et. al. Informational [Page 53]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- particular services. Another difference is that, as they are all co-
- located, proprietary protocols can be used for internal
- communication, rather than the full Intelligent Network Application
- Part (INAP) protocol used over the core signaling network between
- discrete units. It also differs from the "unbundled" approach in that
- it is connected to the COs within a PSTN as a peripheral, having only
- an access connection to a Central Office; there is no connection to
- the core signaling network. Other than this, it operates in a similar
- way, and can provide the same kinds of services. Information on the
- specification of the Intelligent Network can be found in the ITU
- recommendations [1], while two books ([2] and [3]) describe the
- system, its history, operation, and the philosophy behind it.
-
- 11.2 Call Center Features
-
- A Call Center is a system that allows a company to be organized with
- a group of similar individuals (agents), all of whom can either make
- calls to, or take calls from, customers. The system distributes
- incoming calls to the agents based on their availability and
- automates the placement of outgoing calls, selecting an agent to
- handle the call and routing the call to them only once the call
- request has been made of the PSTN.
-
- The incoming call distribution feature ("automatic call
- distribution", or ACD) is usually coupled with a call queuing scheme.
- In this scheme, the callers are connected temporarily with an
- announcement unit that normally plays music. The calls are treated in
- sequence so that (once the caller is at the front of the queue) the
- ACD system selects the next available agent and routes the call
- through to them.
-
- Another feature connects a customer making an incoming call to a unit
- that asks them for some information on the purpose of their call,
- selecting the agent to handle the call based on the particular area
- of expertise needed; to do this, the agents are further categorized
- by their knowledge (or "Skill Set"). If this skill set categorization
- is used then by implication there will be separate queues for each of
- the skill sets. This user selection scheme can be used independently
- of the others. For example these so-called "voice navigation systems"
- can be used to select a particular department extension number, based
- on the function required by the customer; as such, they can automate
- the job of company telephone receptionist in routing incoming calls.
-
- Where possible, the information gleaned from the customer can be
- provided to the selected agent, usually via a separate networked
- computer connection. Similarly, if an outgoing call is being made to
- one of a list of customers, information on the customer and the
- purpose of the call can be provided to the agent selected to handle
-
-
-
- Lu, et. al. Informational [Page 54]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- the call. Such configurations are generally called "Computer
- Telephony Integration" or CTI systems. Strictly, a CTI system can be
- arranged to handle routing of incoming calls and automation of
- outgoing calls only (also known as computer integrated telephony
- features), without the agents having access to a network of
- computers. However, the business case for combining the telephony
- functions of the call center with provision to the agents of
- computers with customer information can be compelling.
-
- This is often further combined with a company's order and service
- processing computer system. In this case, a call is treated as part
- of a business transaction, with the information to be exchanged
- captured as fields of a computer form. While such a computer system
- is not, strictly, part of a call center, integrating the company
- computer system with the call center is very common. This allows the
- details of the call to be stored on a centralized database, allowing
- further automated order processing, for example. It also allows the
- call to be transferred from one agent to another where needed,
- ensuring that the new agent has the information already captured.
- This might be useful if someone with a different area of expertise
- were to be needed to handle the customer's requirements.
-
- Traditionally, Call Centers have been used to support teams of agents
- working at a single site (or a small number of sites, with private
- telephony trunks interconnecting them). The site Private Automatic
- Branch eXchange (PABX) was integrated with a computer system to
- provide these features to people at that site. There can be a
- business case for provision of such features to distributed teams of
- workers as well. In particular, the possibility of providing support
- for people working from home has been seen as important. Some of the
- Call Center features have been incorporated into public telephone
- exchanges or Central Offices (COs) from many manufacturers as part of
- their "Centrex" service offerings.
-
- There are practical limitations in providing such features on COs.
- Apart from the procedures needed to configure these features for any
- telephone line that is to use them, the basic requirement that every
- agent must have a connection to the supporting CO can limit its
- usefulness. Another approach is to provide Call Center features via
- the Intelligent Network. The features might thus be provided over a
- Telephone Operator's entire network, and would mean that the Call
- Center could be configured centrally while still allowing agents to
- be located anywhere within the telephone network. It also means that
- the supported company can pay for the Call Center features "as they
- go" rather than having a high "up front" cost.
-
-
-
-
-
-
- Lu, et. al. Informational [Page 55]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- 12. References
-
- [1] ITU-T Q.12xx Recommendation Series, Geneva, 1995.
-
- [2] I. Faynberg, L. R. Gabuzda, M. P. Kaplan, and N. J. Shah, "The
- Intelligent Network Standards, their Application to Services",
- McGraw-Hill, 1996.
-
- [3] T. Magedanz and R. Popesku-Zeletin, "Intelligent Networks: Basic
- Technology, Standards and Evolution", Intl. Thomson Computer
- Press, 1996.
-
- [4] Information processing systems - Open Systems Interconnection -
- Specification of Abstract Syntax Notation One (ASN.1),
- International Organization for Standardization, International
- Standard 8824, December, 1987.
-
- [5] McCloghrie, K., Editor, "Structure of Management Information for
- Version 2 of the Simple Network Management Protocol (SNMPv2)",
- RFC 1902, January 1996.
-
- [6] Kristol, D. and L. Montulli, "HTTP State Management Mechanism",
- RFC 2109, February 1997.
-
- [7] Zimmerman, D., "The Finger User Information Protocol", RFC 1288
- December 1991.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 56]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- Authors' Addresses
-
- Steve Bellovin
- AT&T Labs
- Room E-215
- 180 Park Ave. Bldg. 103
- Florham Park, NJ 07932-0000
- USA
-
- Phone: +1 973 360 8656
- Fax: +1 973 360 8077
- EMail: smb@research.att.com
-
-
- Fred M. Burg
- AT&T Labs
- Room 1N-117
- 307 Middletown Lincroft Road
- Lincroft, NJ 07738
- USA
-
- Phone: +1 732 576 4322
- Fax: +1 732 576 4317
- EMail: fburg@hogpb.att.com
-
-
- Lawrence Conroy
- Roke Manor Research Limited
- IT&N-INIA Group
- Roke Manor, Old Salisbury Lane,
- Romsey, Hampshire SO51 0ZN
- U.K.
-
- Phone: +44 1794 833666
- Fax: +44 1794 833434
- EMail: lwc@roke.co.uk
-
-
- Paul Davidson
- Nortel
- P.O.Box 3511 Station "C"
- Mail Stop 242
- Ottawa, Ontario, Canada K1Y 4H7
-
- Phone: +1 613 763 4234
- EMail: pauldav@nortel.ca
-
-
-
-
-
- Lu, et. al. Informational [Page 57]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- A. DeSimone
- Lucent Technologies
- Room 6H510
- 600-700 Mountain Avenue
- Murray Hill, NJ 07974-0636
- USA
-
- Phone: +1 908 582 2382
- Fax: +1 908 582 1086
- E-Mail:tds@lucent.com
-
-
- Murali Krishnaswamy
- Bell Laboratories
- Lucent Technologies
- Room 2G-527a
- 101 Crawfords Corner Road
- Holmdel, NJ 07733-3030
- USA
-
- Phone: +1 732 949 3611
- Fax: +1 732 949 3210
- EMail: murali@bell-labs.com
-
-
- Hui-Lan Lu
- Bell Laboratories
- Lucent Technologies
- Room 4K-309
- 101 Crawfords Corner Road
- Holmdel, NJ 07733-3030
- USA
-
- Phone: +1 732 949 0321
- Fax: +1 732 949 1196
- EMail: hui-lan.lu@bell-labs.com
-
-
- Henning Schulzrinne
- Dept. of Computer Science
- Columbia University
- New York, NY 10027
- USA
-
- Phone: +1 212 939 7042 (@Bell Labs: 732 949 8344)
- Fax: +1 212 666 0140
- EMail: schulzrinne@cs.columbia.edu
-
-
-
-
- Lu, et. al. Informational [Page 58]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- Kamlesh T. Tewani
- AT&T Labs
- Room 1K-334
- 101, Crawfords Corner Rd.
- Holmdel, NJ 07733
- USA
-
- Phone: +1 732 949 5369
- Fax: +1 732 949 8569
- EMail: tewani@att.com
-
-
- Kumar Vishwanathan
- Isochrone
- EMail: kumar@isochrone.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 59]
-
- RFC 2458 Pre-PINT Implementations November 1998
-
-
- Full Copyright Statement
-
- Copyright (C) The Internet Society (1998). All Rights Reserved.
-
- This document and translations of it may be copied and furnished to
- others, and derivative works that comment on or otherwise explain it
- or assist in its implementation may be prepared, copied, published
- and distributed, in whole or in part, without restriction of any
- kind, provided that the above copyright notice and this paragraph are
- included on all such copies and derivative works. However, this
- document itself may not be modified in any way, such as by removing
- the copyright notice or references to the Internet Society or other
- Internet organizations, except as needed for the purpose of
- developing Internet standards in which case the procedures for
- copyrights defined in the Internet Standards process must be
- followed, or as required to translate it into languages other than
- English.
-
- The limited permissions granted above are perpetual and will not be
- revoked by the Internet Society or its successors or assigns.
-
- This document and the information contained herein is provided on an
- "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
- TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
- BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
- HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
- MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Lu, et. al. Informational [Page 60]
-
-