By Topic

Intelligent Network Workshop, 1997. IN '97., IEEE

Date 4-7 May 1997

Go

Filter Results

Displaying Results 1 - 19 of 19
  • IEEE Intelligent Network Workshop In '97 Proceedings Volume 3 [front matter]

    Publication Year: 1997, Page(s):0_3 - 0_8
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • Conference provision via IN: a performance study

    Publication Year: 1997
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB)

    The diffusion of new and complex services, such as multiparty and multimedia services, drives the evolution of signalling systems. One of the main issues discussed in the standardisation bodies is the interworking and the integration of the IN functionalities in the B-ISDN. This is the subject of the ACTS European project named INSIGNIA in which the work presented has been done. One of the most ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unbundling The AIN: Is Nothing Sacred?

    Publication Year: 1997, Page(s):1_59 - 1_68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB)

    The article consists of a PowerPoint presentation on Advanced lntelllgent Networks (AIN) . The specific areas/topics discussed include: FCC Order 96-98; Network Interconnection & Unbundling Scenarios; and Issues to be faced by Resale and Unbundling of AIN. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object Oriented Service Modeling

    Publication Year: 1997, Page(s):1_129 - 1_142
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (501 KB)

    The article consists of a PowerPoint presentation on object oriented (OO) service modeling. The specific areas/topics discussed include: IN (intelligent network) standardisation status; SIB model deficiencies; the OO service model; Mapping on SIBs; and final Conclusions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Meeting subscriber and operator needs with wireless IN

    Publication Year: 1997, Page(s): 1_150
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (62 KB)

    Summary form only given, as follows. Successful operators in a hyper-competitive marketplace will be those who meet their subscribers?? needs by applying the right technology, at the right time, at the right cost, and in the right place. Subscriber mobility adds the dimension of service "export and import" to the wirless business. Wireless IN represents the infrasturcture of choice for making the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Working WIN into ITU-T

    Publication Year: 1997, Page(s): 1_150
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (62 KB)

    Summary form only given, as follows. Intelligent Network concepts for wireless are being worked in the Wireless Intelligent Network Task Group within TR45.2. These concepts expand the current IN requirements found in ITU-T, both in IN-CS-2 and in FPLMTS. It is important to integrate these ideas into the IN community at an international level since wireless networks are growing all around the globe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CAMEL And The Success Of IN For Wireless

    Publication Year: 1997, Page(s): 1_150
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (62 KB)

    Summary form only given, as follows. To date, Intelligent Network (IN) solutions have not seen widespread implementations in wireless networks. What are the problems that Wireless IN must overcome, and how can CAMEL help solve those problems for GSM based networks. Conversely, the marriage of wirless and IN brings several new service opportunities for CAMEL to exploit. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differentiating services through the wireless Intelligent Network

    Publication Year: 1997, Page(s): 1_151
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Summary form only given, as follows. The wireless market has seen unprecedented growth in the last year alone. Customers are signing on for wireless service at the rate of 20,000 perday. New entrants, such as PCS service providers, are changing the market by focusing on enhanced services to increase airtime. Incumbent cellular service provider a leg-up on their competition? PCS providers must deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How SBC Is Implementing Wireless AIN

    Publication Year: 1997, Page(s): 1_151
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Summary form only given, as follows. SBC is implementing Wireless IN concepts in its wireless network service offering. This discussion will relate to the obstacles and opportunities incumbent with this integration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Intelligent Network market

    Publication Year: 1997, Page(s): 1_151
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB)

    Summary form only given, as follows. Wireless service providers are deploying Intelligent Network technology in their networks to facilitate mobility management and to offer a variety of enhanced services to subscribers. Technical Marketing Services has recently completed a study showing that spending on Wireless Intelligent Networks is likely to be a good investment. The results of this study and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biographical texts

    Publication Year: 1997, Page(s):1_152 - 1_166
    Request permission for commercial reuse | PDF file iconPDF (1754 KB)
    Freely Available from IEEE
  • The hybrid SSP-IP approach for Call Party Handling

    Publication Year: 1997
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Call Party Handling (CPH) is the manipulation of the individual connections to end users participating in a multi-party call. A subset of the CPH capabilities defined for the SSP (switch) by IN CS-2 can be used in a hybrid manner with an IP to implement CPH services. The hybrid approach provides flexibility for the service developer in combining proven capabilities of switches in making stable cal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based model of a distributed IN platform

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    This paper presents an agent-based model for a distributed intelligent network platform. The aim is to present a general model and then to illustrate the applicability of the general model through a case study involving a set of specific IN services. The following IN targeted services are chosen: call waiting (CW); call forwarding; originating call screening (OCS); terminating call screening (TCS)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service logic program generation method using specification supplementing techniques

    Publication Year: 1997
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Specification supplementing techniques used to efficiently create service logic programs (SLPs) are discussed. Our techniques significantly reduce the volume of service specifications that need to be described by supplementing both the specifications that can be automatically determined from other specification information, and those that have default values or procedures. Our experimental results... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance simulation investigation of TINA networks

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    The paper discusses the performance of TINA (Telecommunications Information Networking Architecture). The TINA architecture allows both multiple service vendors and multiple network providers. It is developed by a consortium which includes network operators and telecommunication and computer equipment suppliers. The foundation of TINA is object orientation and distributed computing. A computationa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Connection View State approach to IN CS-2 Call Party Handling: flexible control of multi-party calls

    Publication Year: 1997
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    Industry has made significant contributions over the years to the understanding of how intelligent network (IN) control may be applied to multi-party calls. This work has finally come to fruition in the ITU-T Recommendations for IN Capability Set 2 (CS-2), which support Call Party Handling (CPH), the ability of IN to manage stable calls with two or more parties. CPH makes possible more flexible an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of a multiprocessor SCP

    Publication Year: 1997
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    The intelligent network (IN) architecture promises easy development and fast deployment of sophisticated communication services. However, the centralization of service logic programs used to provide IN call processing and other house-keeping functions performed at the service control point (SCP) may create bottleneck problems. In this work, we develop queuing models for the SCP and introduce a two... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent network security-how to secure user access and the communication between IN components

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    The paper discusses an approach for an intelligent network security architecture. It considers issues such as: standardization activities; potential threats to IN; security requirements for IN; lawful interception; UPT strong one-pass authentication; IC cards and card reading terminals View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network security architecture for intelligent networks

    Publication Year: 1997
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1180 KB)

    This paper focuses on a network security architecture and the requirements of such an architecture. These requirements are necessary to attain a level of security that meaningfully protects its operators, end users, and itself, while maintaining a reasonable level of security-transparency. Those requirements are: registration; identification and authentication; data integrity and confidentiality; ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.