WO1997022213A1 - Configuration method for auxiliary resources - Google Patents

Configuration method for auxiliary resources Download PDF

Info

Publication number
WO1997022213A1
WO1997022213A1 PCT/SE1996/001611 SE9601611W WO9722213A1 WO 1997022213 A1 WO1997022213 A1 WO 1997022213A1 SE 9601611 W SE9601611 W SE 9601611W WO 9722213 A1 WO9722213 A1 WO 9722213A1
Authority
WO
WIPO (PCT)
Prior art keywords
auxiliary
object class
network
pool
devices
Prior art date
Application number
PCT/SE1996/001611
Other languages
French (fr)
Inventor
Staffan Andersson
Lars Kent Konradsson
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to JP09521981A priority Critical patent/JP2000501911A/en
Priority to EP96941306A priority patent/EP0865708A1/en
Priority to AU10489/97A priority patent/AU1048997A/en
Publication of WO1997022213A1 publication Critical patent/WO1997022213A1/en
Priority to US09/093,075 priority patent/US6163544A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0233Object-oriented techniques, for representation of network management data, e.g. common object request broker architecture [CORBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/0016Arrangements providing connection between exchanges
    • H04Q3/0062Provisions for network management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/42Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker
    • H04Q3/54Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker in which the logic circuitry controlling the exchange is centralised
    • H04Q3/545Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker in which the logic circuitry controlling the exchange is centralised using a stored programme
    • H04Q3/54508Configuration, initialisation
    • H04Q3/54533Configuration data, translation, passwords, databases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/42Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker
    • H04Q3/54Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker in which the logic circuitry controlling the exchange is centralised
    • H04Q3/545Circuit arrangements for indirect selecting controlled by common circuits, e.g. register controller, marker in which the logic circuitry controlling the exchange is centralised using a stored programme
    • H04Q3/54575Software application
    • H04Q3/54583Software development, e.g. procedural, object oriented, software generation, software testing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13057Object-oriented software
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13503Indexing scheme relating to selecting arrangements in general and for multiplex systems object-oriented systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13526Indexing scheme relating to selecting arrangements in general and for multiplex systems resource management

Definitions

  • Prior art telecommunication system models are generally struc ⁇ tured m the manner shown m FIG. 1.
  • System hardware such as communication processors, switching equipment form a hardware layer 1.
  • An operative system 2 comprising a core 3 of basic functions for controlling the communication and a shell 4 of other general operative system functions forms together with the hardware layer 1, a platform 5 on which an application 6, such as POTS (plain old telephony system) executes
  • the application 6 is written in a high level language, such as C++, PLEX, Smalltalk.
  • Auxiliary resources such as echo suppressors, voice prompting devices, tone transmitters, conference bridges and announcement machines are hardware which belong to the hardware layer 1 m the system model. Control and handling of auxiliary resource hardware is closely related to the platform. This presents a problem when for example an existing echo suppressors, implemented m one technique, is replaced with a new one which implemented m another technique. Generally the new one will use an interface which is different from the existing one. This implies that the interface need to be redefined and that the code used at the implementation layer 3 need to be rewritten in order to reflect the new interface. This requires much work.
  • a network operator operates networks. He may or may not own the networks he is operating. With operation is meant traffic supervision, traffic control, fault detection, fault repair, billing and many other tasks, all aiming at providing the network customers, i.e. the subscribers, with connections that are set up quickly, that are stable and error-free once set up and that are released quickly.
  • the network operator creates network descriptions which gives the operator a management view of his network.
  • the management view may be a graphic representation of the network showing the local exchanges, the physical lines extending between the local exchanges, the traffic load on the physical lines, the state of the network elements (local exchanges and physical lines) i.e. whether they are fully operative or have a faulty parts and many other things.
  • the management view comprise information stored in a data base and print outs of information relating to the network and its subscribers.
  • OSS operation and support system
  • the network operator can, from within the OSS, supervise the network's traffic, perform corrective actions and, in modern OSS.s, set up cross connections which are a kind of long term permanent connections of inter-exchange lines.
  • the network operator may manage network elements m a uniform manner dictated by the standards, such as the CCITT X.722 standard.
  • the OSS cannot be used for setting up on demand connections.
  • An on demand connection is set up Py a subscriber by digit dialing on an access unit, such as a telephone instrument.
  • the digits are signaled, over the access network, to a local exchange.
  • various programs within the application 6 will start to interact with the platform 6 m order to set up the requested connection.
  • the platform's shell of operative system functions, referred to as an operation system is not to be confused with an OSS.
  • the connection When the connection is set up it will seize network resources and, sometimes, also auxiliary resources must be seized m order to guarantee a stable, high quality connection.
  • the CCITT M.3100 standard is a generic information model which is used to specialize a transport network information model such as a SDH transport network ( ⁇ synchronous digital Hierarchy) and a SONET transport network.
  • Cf. the CCITT G.774 standard which is a specialization of the CCITT M.3100 standard. It is also used for establishment of cross connections, termination of transport links and fault managements m a transport network.
  • the transport network is the network between local switch offices and does not include the access network, which is the network between subscribers and their respective local switch offices.
  • the CCITT M.3100 standard describes resources of a transport network as managed objects (MO.s) within the transport network.
  • the resources of the transport network are divided into specific fragments.
  • managed objects are switch fabrics, links, termination point pools (Tp-pools) .
  • fragments are cross connection fragment, terirination point fragment .
  • the CCITT M.3100 standard does not comprise any managed objects for auxiliary resources. The reason for this is that is has not been foreseen that auxiliary resources must be handled within the transport network.
  • Network elements m the transport network are configured, controlled and managed using the standardized Q3 interface.
  • the Q3 interface is used also for configuration of networks.
  • the Q3 interface cannot be used for control and management of auxiliary resources.
  • auxiliary resources Another drawback associated with management of auxiliary resources relates to the manner in which the auxiliary resources is described in the information model of the telecommunication system.
  • the exact position of each individual auxiliary resource m the telecommu cation network must be known by an application.
  • the individual positions of each one of the individual auxiliary resources are hard coded m the system platform.
  • An application which needs to use an auxiliary resource, such as an echo suppressor needs to address a particular echo suppressor. Is the addressed echo suppressor already seized, the application must search for another echo suppressor. Seen from an overall network perspective available echo suppressor will thus not be used efficiently. Moreover, it may take long time until a free echo suppressor is found. This m its turn means that it may take unacceptable long time to set up the connection for which the echo suppressor was needed.
  • An object of the invention is to provide a method for handling auxiliary resources in a telecommunication network in a uniform, system independent manner.
  • Another object of the invention is to provide a method for handling auxiliary resources m a telecommunication network allowing for reuse of software, which is related to modeling and control of auxiliary resources, m case the technology used for their implementation is changed.
  • Still another object of the invention is to provide a method for configuration, control and management of auxiliary resources m a telecommunication network from within an operation and support system
  • Another object of the invention is to allow a network operator to set up connections, n particular connections that require the use of auxiliary resources, from within an OSS, using a standardized information model which describe the physical resources of the network in a uniform way.
  • Still another object of the invention is to allow for a centralized management of auxiliary resources. All auxiliary resource of one and the same kind are grouped into a pool, irrespective of their physical sites m the telecommunication network.
  • Sti-1.1 another object of the invention is to make t possible for a network operator to handle and to describe auxiliary resources m a centralized manner.
  • the above objects are achieved by us ⁇ ng standardized concepts for cross connections to create a new generic information model for auxiliary resources configuration, control and management.
  • the new information model is particularly well suited for use m set up of conventional, subscriber initiated, on-demand connections which will need the use of an auxiliary resource.
  • the new information model describes auxiliary resources, control of auxiliary resources and management of auxiliary resources in terms similar to those used in the CCITT M.3100 and CCITT X.722 standards and will benefit from the over all general principles set by the standard.
  • the language which implements the information model will thus be familiar to telecommunication network operators which will have no difficulty to provide their existing network descriptions with functions for configuring, control and management of auxiliary resources. As far as applicant knows this is a novel concept.
  • an application that needs an auxiliary resource of a particular kind requests an auxiliary device
  • in response to the request information is returned that indicates where in the network the pool comprising the requested auxiliary device is situated
  • the pool containing the requested auxiliary devices is analyzed
  • a free auxiliary device is immediately seized and is connected to the connection for which the resource was requested
  • an operation or a sequence of operations in the seized auxiliary device is initiated
  • the seized auxiliary device is returned to the pool.
  • the free auxiliary resources m said pool will be used efficiently and will be seized without undue time delay.
  • the application need not to know the exact positions of the auxiliary resources .
  • Telecommunication network operators using the model according to the invention will thus be provided with a tool that will substantially shorten the lead times for introducing m their networks new types of auxiliary resources. This is so because the network operator, being familiar with a standardized methodology to create a tailor made network description, can use the same methodology to add such new auxiliary resources into his existing network description. As far as applicant knows this is a novel feature, since to day this work (to incorporate new kinds of auxiliary resources into a network description) has to be done by the system vendor.
  • Operation and support applications supporting set up and release of such on demand connections, are built as a shell around an existing general information model. This will make the information model comprehensive to the network operator.
  • Fig. 1 is a block diagram of a telecom system architecture m accordance with prior art
  • Fig. 2 is a block diagram of a modern telecom system architecture m which principles of the present invention are implemented
  • Fig. 3 is a block diagram of an exchange provided with different types of auxiliary devices
  • Fig. 4 is an information model of a telecommunication network in accordance with the present invention.
  • Fig. 5 is a block diagram of a simplified physical telecommunication network and a logical network modeled in accordance with the principles of the present invention to reflect the physical network
  • Fig. 6 are tables that illustrate the method used to local ⁇ ize, seize and connect an auxiliary device m accor ⁇ dance with the invention
  • Fig. 7 is a block diagram illustrating initiation of an operation or of a sequence of operations in an seized auxiliary device by sending messages
  • Fig. 8 is a block diagram illustrating the stopping of sending messages
  • Fig. 9 is a block diagram illustrating how a seized auxiliary device is returned to its pool
  • Fig. 10 is a flow diagram illustrating the operations shown in Figs . 6-9.
  • Fig. 2 the architecture of a modern telecom system is shown.
  • the model in accordance with the present invention is based upon this architecture and therefore it will be described.
  • the telecom system architecture is separated into four major layers; a system component layer 9, a core layer 10, an application platform 11 and an application layer 12.
  • Examples of applications are POTS, VLL (virtual leased lines) , BISDN (broad band mtegrated-services digital network) , GSM
  • Each one of the applications comprises application specific parts such as network access methods, network access equipment, subscriber access methods and subscriber access equipment.
  • An example of a network access equipment is exchange terminals (ET:s)
  • an example of subscriber access equipment is line interface circuits (LIC.s) for analogue connections and digital line interface circuits (DLIC.s) for digital connections.
  • LIC.s line interface circuits
  • DLIC.s digital line interface circuits
  • the application layer 11 contains basic functions which may be utilized by all of the applications. This approach will reduce the number of functions per application and will enable the implementation of application modularity. It is thus possible to re-use a large portion of, or all of the designs, both hardware and software, for ISDN, GSM, POTS and future applications. Examples of basic functions available at the application platform layer are analyze functions for number and routing calculations as described m our PCT-application WO SE 95/01026, charging functions for tariffing, data collection and storage, connection handling functions for ordering various types of connections as requested by the various applications and signaling functions such as common channel signaling system No. 7, dual tone multi frequency (DTMF) signaling.
  • DTMF dual tone multi frequency
  • the core system layer 10 contains the operating system of the communication processors used in the telecom system. Typically the operating system supports various functions for execution, communication, data storage, and operation and maintenance (OSS) . Further, the core system layer 10 comprises a nu her of control and data transport functions which are re-used by different applications. This part of the architecture is assumed to be stable over a long period of time, whereas processors may be replace in pace with technological development.
  • OSS operation and maintenance
  • the system component layer 9 comprises the hardware of the telecom system such as processors and switching equipment.
  • a fundamental interface is a collective concept.
  • a fundamental interface comprises a collection of a number of individual interfaces.
  • a transport network is distinguished from a 20 switched network.
  • a transport network is the infra structure that offers transport capacity of data. To-day a transport network does not offer any services.
  • a typical example of a transport network is a SDH-network (synchronous digital hierarchy) . o r.
  • 35 conventional operation and support activities include notifying the operator of faults that occur m the switching equipment, configuration of logical sub-nets and reconfiguration of existing networks n connection with expansion and contraction of the existing physical network.
  • a switched network also referred to as a service network, is a network that receives, from its subscribers, connection requests.
  • a switched network software residing m the application will send the connection requests to connection handling software that will seize, and release, the resources needed for setting up the requested connection.
  • the model m accordance with the present invention is used in a switched network to handle, seize and release, auxiliary resources.
  • Fig. 3 is a block diagram showing an exchange 16, two exchange terminals (ET:s) 17, 18, a central processor 19 and auxiliary devices 20, 21, 22. Each exchange terminal is connected between the exchange 16 and a respective external line 23 and 24 respectively.
  • auxiliary device 21 is an echo suppressor
  • auxiliary device 22 is a conference equipment
  • auxiliary device 23 is a voice prompting equipment.
  • the units shown in Fig. 3 is an example of a typical physical configura- tion. Note that the auxiliary devices 20, 21 and 22 are shown to be physically connected to the exchange.
  • the abstract model m Fig. 4 is described m terms of object classes using terminology and definitions from CCITT X.722.
  • the model comprises a network object class 25, a managed element object class 26, a fabric object class 27, an auxiliary resource analyze object class 28, an auxiliary resource pool object class 29 and an auxiliary resource CTP class 30 (CTP is defined m the previous paragraph) .
  • An object class is an aggregate of named data elements and a set of operations designed to manipulate said data.
  • An object class may be thought of as a template used to create individual objects.
  • the network object 25 is an object class representing an abstraction of a telecommunication network_and comprises an identification of the telecommunication network.
  • the managed element object class 26 is an abstraction of a physical site of a switch in the telecommunication network, for example the site, in the telecommunication network, of the switch shown m Fig. 3.
  • the managed element object class has a relation to the networkobject class as symbolized by the vertical line Between boxes 25 and 26 in Figure 4.
  • the fabric object class 27 is an abstraction of a switch, for example the switch 16 shown in Fig. 3.
  • the fabric object class describe the physical switches used for switching m the telecommunication network as well as devices connected thereto as shown in Figure 3.
  • the fabric object class has a relation to the managed element object class as symbolized by the vertical line between boxes 26 and 27.
  • the auxiliary resource analyze object class 28 is used to support centralized handling of auxiliary resources m the teleco munication network.
  • the auxiliary resource analyze object class comprises information describing the sites within the telecommunication network where there are pools of auxiliary devices and it has a relation to the network object class. This relation is symbolized by the vertical line between boxes 25 and 28.
  • the auxiliary resource pool object class 29 is an abstract object class used only for inheritance. It contains one or several auxiliary device CTP:s and it represents a specific type of auxiliary service.
  • the auxiliary resource pool object class has a relation to the fabric object class, it comprises identities of specific auxiliary devices and it contains connection termination points of the auxiliary devices.
  • Tne auxiliary resource CTP object class 30 is an abstract object class used for inheritance only. It represents auxiliary devices and contains information on the auxiliary device.
  • the auxiliary resource CTP object class has a relation to the managed element object class 26, it contains information on identified auxiliary devices and operates on identified auxiliary devices. The relation is symbolized by a vertical line between boxes 26 and 30.
  • the auxiliary resource analyze object class 28 and the auxiliary resource pool object class 29 are independent of the physical platform 5.
  • the auxiliary resource pool object class 29 is independent of the physical realization of the auxiliary devices and comprises the identity of an auxiliary device ana a logical address to the non shown memory wnerem it is stored.
  • the auxiliary resource pool object class has a relation to the fabric object class 27 and contains connection termination points of the auxiliary devices.
  • the auxiliary resource CTP object class has a relation to the managed element object class, comprises specific information of an identified auxiliary device and is used to operate on identified auxiliary devices.
  • a physical layer 31 and a logical layer 32 there is shown a physical layer 31 and a logical layer 32.
  • the resources of the physical network such as switches, trunks, links and time slots in links, auxiliary devices, are shared among a number of logical networks.
  • Each logical network is operated by an operator.
  • There may be different operators for different logical networks, fi logical network is a picture of the portions of the physical network allocated to the individual logical network.
  • the physical network comprises three switches 33, 16 and 34 interconnected with physical links 35, 36.
  • the switches are geographically separated.
  • Several tone senders 21 are connected to connected to switch 16 and together for a first tone sender pool 21' .
  • a second tone sender pool 37 comprising tone senders connected to switch 3 .
  • a and B are subscribers having a respective telephone instrument.
  • the logical network 32 comprises a network object 25, a managed element object 26 which manages fabrics 38, 39, 40.
  • a fabric is a logical abstraction of a switch; fabric 38 being the image of switch 33, fabric 39 being the image of switch 16 and fabric 40 the image of switch 34.
  • Termination point pools 41, 42 is the logical abstraction of the link 35 and interconnects fabrics 38 and 39.
  • Auxiliary resource pool objects 45, 46 are logical abstractions of tone sender pools
  • auxiliary resource pool objects 45, 46 correspond to the auxiliary resource pool object 29 of Figure 4.
  • Auxiliary resource CTP objects 47, 48 represent the termination points of the tone sender pools 21 and 37 respectively. In the physical layer the termination points of the pools are indicated by the filled circles at the periphery of the exchange symbols.
  • the auxiliary resource CTP object 47 has a relation to its auxiliary resource pool object 45.
  • the auxiliary resource CTP object 47 has a relation to its auxiliary resource pool object 46.
  • Pool object 45 has a relation to fabric 39 and pool object 46 has a relation to and fabric 40.
  • Each fabric 38, 39 and 40 has a respective relation to managed element 26.
  • Each auxiliary resource CTp object 47 and 48 has also a respective relation to managed element 26.
  • Managed object 26 has a relation to network object 25.
  • the auxiliary resource analyze object 28 has a relation to managed element 26.
  • the logical network 32 is configured by an operator, not shown, which for this purpose uses an operation and support system 50.
  • the operation and support system 50 is used for conventional operation and support and has in accordance with the present invention been extended with a generic information model in accordance with CCITT M.3100 to which there has been addeo the auxiliary resource fragments 45, 46, 47 and 48.
  • the generic information model CCITT M.3100 is conventionally used to setting up cross connection between fabrics within the transport network.
  • an application may request an auxiliary resource to be connected to a connection that the application sets up in the transport network.
  • This is m contrast to the technique used to-day.
  • To- day auxiliary resources used by an application are hard coded m the application software. Should new auxiliary devices, for example produced in new technologies, replace the existing auxiliary devices the application software must be re-coded. Such re-coding requires much work, detailed knowledge of the system on which the application runs, and requires much time.
  • the auxiliary resource analyze object 28 typically comprises a table comprising a number of input entries corresponding to the respective identities of the fabrics m which calls are originated and m which there are no tone senders present. To each input entry there is associated data pointing out for each possible destination switch the tone sender pool to be used for the particular destination switch. Tone sender pools to be used in the alternative may also be associated with an input entry.
  • auxiliary resource pool 45 (named Pl in the table) resident in fabric 39 (named Fl in the table) should be used in the first alternative. If all tone senders m this pool Pl are occupied then the auxiliary resource pool 37 (named P2 m the table) m fabric 40 (named F3 m the table) should be used in the second alternative .
  • the auxiliary resource object 28 communicates the two alterna ⁇ tives to the application software 51 as indicated by arrow 53.
  • the abbreviations for the input and output data m auxiliary resource analyze object 28 refer to the corresponding abbreviations within the symbols used for the objects m Fig. 5.
  • the software 51 will now know where a tone sender can be found in the network.
  • the software must seize a tone sender.
  • a seizure request represented by arrow 54, is sent to the auxiliary resource pool object 29 which comprises a list of ideal tone senders.
  • the auxiliary resource pool object 29 comprises a list of ideal tone senders.
  • the idle list comprises, for each tone sender of the pool the tone sender identity and its termination point.
  • a termination point is a logical address to an auxiliary device.
  • the order to set up this connection is indicated by arrow 57 and is performed by separate application software 58.
  • the tone sender sends a ring tone to subscriber A thus prompting him to dial the B-number .
  • the application software 51 will set up a connection to switch 34, the switch to which B is connected. Subscriber B may either be busy or will not answer or has a call forwarding service activated. If B is busy the application software shall instruct the tone sender to send a busy tone to subscriber A. If B does not answer the call the tone sender should send ring tones to A at regular intervals. If B has activated a call forwarding service then the application software may for example request a voice prompting machine to send a message to subscriber A, this message for example being "please wait while the call is transferred". Should a voice prompting machine be connected then the same procedure as indicated above is applied with reference to a pool of voice prompting auxiliary devices.
  • an auxiliary device is operated upon by sending messages to it, said messages being generated either by the application software 51 or by specific software.
  • application software 51 sends a message to the above discussed seized tone sender by forwarding this message to the auxiliary resource CTP object 30 of the seized resource.
  • This message is represented by arrow 60.
  • the tone sender acknowledges the receipt of the message, arrow 61.
  • the auxiliary device CTp class 30 is independent of the physical implementation of the auxiliary device; the tone sender in the example.
  • the application software 51 When a message should be stopped the application software 51 prepares a stop message and sends it to the auxiliary resource CTP object of the seized resource, in this case the tone sender. Once the tone sender has finished its job a stop message 63 is sent to the application software. This procedure has been illustrated in Figure 8.
  • the procedure used to disconnect a seized resource is shown m Figure 9.
  • subscriber B lifts his receiver in response to the reception of the ring signals.
  • Subscribers A and B start to talk to each other and the seized tone sender should be returned to the pool 21' so it can be used by other calls.
  • the call between subscribers A and B still persists.
  • the application software 51 sends a disconnect order to the auxiliary resource CTP object 30 and the connection between terminal points 58 and 59 is disconnected.
  • the disconnect order is shown at arrow 64 and an acknowledgment 65 is set back to the application software 51.
  • the application software 51 returns the seized tone sender to the pool 21' by sending a corresponding order to the auxiliary resource pool 29.
  • the seized tone sender is again entered into the idle list 29 of free auxiliary resources.
  • An acknowledgement that the previously seized resource has been returned is sent to the application software 51, this acknowledgment being indicated by arrow 67.
  • FIG. 6 is a simplified block diagram showing the software and objects involved m setting up a connection requiring a tone sender. Therefore only the objects concerned with handling of tone senders have been shown. Should for example a connection require the use of a conference equipment, then there is an auxiliary resource analyze object class 28' comprising all pools of conference equipments, an auxiliary resource pool object class 29' comprising a list of idle conference equipments and an auxiliary resource CTP object class 30 comprising the termination points of the conference equipments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A generic information model for configuration, control and management of auxiliary resources within a telecommunication network. The information model comprises a hierarchical structure of object classes: a network object class (25), a managed element object class (26) and a fabric object class (27). The network object class (25) represents the telecommunication network, the managed element object class (26) describes the physical sites of fabric within said network. The fabric object class (27) describes the physical exchanges used for switching in said telecommunication network as well as devices connected to individual exchanges. The inventive idea is to apply the information model for a switched telecommunication network and to provide an auxiliary resource pool class (29) and an auxiliary resource connection termination point object class (30) so as to allow for dynamic handling of auxiliary resources within said switched network. Centralized handling of the auxiliary resources is also completed by the invention.

Description

Configuration method for auxiliary resources
KNOWN TECHNIQUE
Prior art telecommunication system models are generally struc¬ tured m the manner shown m FIG. 1. System hardware, such as communication processors, switching equipment form a hardware layer 1. An operative system 2 comprising a core 3 of basic functions for controlling the communication and a shell 4 of other general operative system functions forms together with the hardware layer 1, a platform 5 on which an application 6, such as POTS (plain old telephony system) executes The application 6 is written in a high level language, such as C++, PLEX, Smalltalk. A number of different interfaces, collectively shown by small circles 7, exist between the operative system 2 and the hardware layer 1. Similarly there is another number of different interfaces, collectively shown at 8, between the application 6 and the platform 5.
Auxiliary resources, such as echo suppressors, voice prompting devices, tone transmitters, conference bridges and announcement machines are hardware which belong to the hardware layer 1 m the system model. Control and handling of auxiliary resource hardware is closely related to the platform. This presents a problem when for example an existing echo suppressors, implemented m one technique, is replaced with a new one which implemented m another technique. Generally the new one will use an interface which is different from the existing one. This implies that the interface need to be redefined and that the code used at the implementation layer 3 need to be rewritten in order to reflect the new interface. This requires much work.
In the prior art it is not unusual that each type ol auxiliary resource has its own interface This means that the above drawback will encounter foi each type oi au/iliaiy le ource
Also, when the platform 5 is changed, for example m 2 consequence of the development of new semiconductor technologies which it is desired to implement m hardware devices m the telecommunication network, the handling of the auxiliary resources needs to be changed. This requires much work m redefining existing interfaces and redesigning the code for the redefined interfaces.
A network operator operates networks. He may or may not own the networks he is operating. With operation is meant traffic supervision, traffic control, fault detection, fault repair, billing and many other tasks, all aiming at providing the network customers, i.e. the subscribers, with connections that are set up quickly, that are stable and error-free once set up and that are released quickly. To his help for achieving this the network operator creates network descriptions which gives the operator a management view of his network. The management view may be a graphic representation of the network showing the local exchanges, the physical lines extending between the local exchanges, the traffic load on the physical lines, the state of the network elements (local exchanges and physical lines) i.e. whether they are fully operative or have a faulty parts and many other things. Further to the graphic representation the management view comprise information stored in a data base and print outs of information relating to the network and its subscribers. With the aid of an operation and support system, referred to as OSS, which interacts with the network descriptions the network operator can, from within the OSS, supervise the network's traffic, perform corrective actions and, in modern OSS.s, set up cross connections which are a kind of long term permanent connections of inter-exchange lines. From within the OSS the network operator may manage network elements m a uniform manner dictated by the standards, such as the CCITT X.722 standard. The OSS cannot be used for setting up on demand connections.
An on demand connection is set up Py a subscriber by digit dialing on an access unit, such as a telephone instrument. The digits are signaled, over the access network, to a local exchange. In response to the reception of the digits at the local station and following digit analyses various programs within the application 6 will start to interact with the platform 6 m order to set up the requested connection. The platform's shell of operative system functions, referred to as an operation system is not to be confused with an OSS. When the connection is set up it will seize network resources and, sometimes, also auxiliary resources must be seized m order to guarantee a stable, high quality connection.
Future trends m telecommunication indicate that a network operator must be able to set up special types of demand connec¬ tions, such as for example so called semi-permanent connections, virtual leased line connections and others. To day the network operator sets up such connections by manually connecting physical entities, such as inter-office trunk lines, to specific switch ports. The procedure is time consuming, expensive and has a long lead time counted from the time a customer orders such a connection and to time the connection actually is set up.
The CCITT M.3100 standard is a generic information model which is used to specialize a transport network information model such as a SDH transport network (^synchronous digital Hierarchy) and a SONET transport network. Cf. the CCITT G.774 standard which is a specialization of the CCITT M.3100 standard. It is also used for establishment of cross connections, termination of transport links and fault managements m a transport network. The transport network is the network between local switch offices and does not include the access network, which is the network between subscribers and their respective local switch offices.
The CCITT M.3100 standard describes resources of a transport network as managed objects (MO.s) within the transport network. The resources of the transport network are divided into specific fragments. Examples of managed objects are switch fabrics, links, termination point pools (Tp-pools) . Examples of fragments are cross connection fragment, terirination point fragment .
The CCITT M.3100 standard does not comprise any managed objects for auxiliary resources. The reason for this is that is has not been foreseen that auxiliary resources must be handled within the transport network.
Network elements m the transport network are configured, controlled and managed using the standardized Q3 interface. The Q3 interface is used also for configuration of networks. The Q3 interface cannot be used for control and management of auxiliary resources.
Another drawback associated with management of auxiliary resources relates to the manner in which the auxiliary resources is described in the information model of the telecommunication system. In particular the exact position of each individual auxiliary resource m the telecommu cation network must be known by an application. In fact, the individual positions of each one of the individual auxiliary resources are hard coded m the system platform. An application which needs to use an auxiliary resource, such as an echo suppressor, needs to address a particular echo suppressor. Is the addressed echo suppressor already seized, the application must search for another echo suppressor. Seen from an overall network perspective available echo suppressor will thus not be used efficiently. Moreover, it may take long time until a free echo suppressor is found. This m its turn means that it may take unacceptable long time to set up the connection for which the echo suppressor was needed.
DESCRIPTION OF THE INVENTION
An object of the invention is to provide a method for handling auxiliary resources in a telecommunication network in a uniform, system independent manner.
Another object of the invention is to provide a method for handling auxiliary resources m a telecommunication network allowing for reuse of software, which is related to modeling and control of auxiliary resources, m case the technology used for their implementation is changed.
Still another object of the invention is to provide a method for configuration, control and management of auxiliary resources m a telecommunication network from within an operation and support system
Another object of the invention is to allow a network operator to set up connections, n particular connections that require the use of auxiliary resources, from within an OSS, using a standardized information model which describe the physical resources of the network in a uniform way.
Still another object of the invention is to allow for a centralized management of auxiliary resources. All auxiliary resource of one and the same kind are grouped into a pool, irrespective of their physical sites m the telecommunication network.
Sti-1.1 another object of the invention is to make t possible for a network operator to handle and to describe auxiliary resources m a centralized manner. In particular it should be possible to select an individual auxiliary resource of a predefined kind from a central pool of auxiliary resources of said predefined kind without knowing the physical site of the pool in the telecommunication network.
The above objects are achieved by us±ng standardized concepts for cross connections to create a new generic information model for auxiliary resources configuration, control and management. The new information model is particularly well suited for use m set up of conventional, subscriber initiated, on-demand connections which will need the use of an auxiliary resource.
The new information model describes auxiliary resources, control of auxiliary resources and management of auxiliary resources in terms similar to those used in the CCITT M.3100 and CCITT X.722 standards and will benefit from the over all general principles set by the standard. The language which implements the information model will thus be familiar to telecommunication network operators which will have no difficulty to provide their existing network descriptions with functions for configuring, control and management of auxiliary resources. As far as applicant knows this is a novel concept.
In accordance with the method of the present invention an application that needs an auxiliary resource of a particular kind requests an auxiliary device, in response to the request information is returned that indicates where in the network the pool comprising the requested auxiliary device is situated, the pool containing the requested auxiliary devices is analyzed, a free auxiliary device is immediately seized and is connected to the connection for which the resource was requested, an operation or a sequence of operations in the seized auxiliary device is initiated, and finally the seized auxiliary device is returned to the pool. In this manner the free auxiliary resources m said pool will be used efficiently and will be seized without undue time delay. Generally, the application need not to know the exact positions of the auxiliary resources .
Telecommunication network operators using the model according to the invention will thus be provided with a tool that will substantially shorten the lead times for introducing m their networks new types of auxiliary resources. This is so because the network operator, being familiar with a standardized methodology to create a tailor made network description, can use the same methodology to add such new auxiliary resources into his existing network description. As far as applicant knows this is a novel feature, since to day this work (to incorporate new kinds of auxiliary resources into a network description) has to be done by the system vendor.
Operation and support applications, supporting set up and release of such on demand connections, are built as a shell around an existing general information model. This will make the information model comprehensive to the network operator.
DESCRIPTION OF THE DRAWINGS
Fig. 1 is a block diagram of a telecom system architecture m accordance with prior art,
Fig. 2 is a block diagram of a modern telecom system architecture m which principles of the present invention are implemented,
Fig. 3 is a block diagram of an exchange provided with different types of auxiliary devices
Fig. 4 is an information model of a telecommunication network in accordance with the present invention,
Fig. 5 is a block diagram of a simplified physical telecommunication network and a logical network modeled in accordance with the principles of the present invention to reflect the physical network, Fig. 6 are tables that illustrate the method used to local¬ ize, seize and connect an auxiliary device m accor¬ dance with the invention,
Fig. 7 is a block diagram illustrating initiation of an operation or of a sequence of operations in an seized auxiliary device by sending messages,
Fig. 8 is a block diagram illustrating the stopping of sending messages,
Fig. 9 is a block diagram illustrating how a seized auxiliary device is returned to its pool, and Fig. 10 is a flow diagram illustrating the operations shown in Figs . 6-9. DETAILED DESCRIPTION OF THE INVENTION
In Fig. 2 the architecture of a modern telecom system is shown. The model in accordance with the present invention is based upon this architecture and therefore it will be described. The telecom system architecture is separated into four major layers; a system component layer 9, a core layer 10, an application platform 11 and an application layer 12.
Examples of applications are POTS, VLL (virtual leased lines) , BISDN (broad band mtegrated-services digital network) , GSM
(Global System for Mobile communication) each of which contains a set of services which are offered to an end user; a subscriber. Each one of the applications comprises application specific parts such as network access methods, network access equipment, subscriber access methods and subscriber access equipment. An example of a network access equipment is exchange terminals (ET:s), an example of subscriber access equipment is line interface circuits (LIC.s) for analogue connections and digital line interface circuits (DLIC.s) for digital connections.
The application layer 11 contains basic functions which may be utilized by all of the applications. This approach will reduce the number of functions per application and will enable the implementation of application modularity. It is thus possible to re-use a large portion of, or all of the designs, both hardware and software, for ISDN, GSM, POTS and future applications. Examples of basic functions available at the application platform layer are analyze functions for number and routing calculations as described m our PCT-application WO SE 95/01026, charging functions for tariffing, data collection and storage, connection handling functions for ordering various types of connections as requested by the various applications and signaling functions such as common channel signaling system No. 7, dual tone multi frequency (DTMF) signaling.
The core system layer 10 contains the operating system of the communication processors used in the telecom system. Typically the operating system supports various functions for execution, communication, data storage, and operation and maintenance (OSS) . Further, the core system layer 10 comprises a nu her of control and data transport functions which are re-used by different applications. This part of the architecture is assumed to be stable over a long period of time, whereas processors may be replace in pace with technological development.
1 0
The system component layer 9 comprises the hardware of the telecom system such as processors and switching equipment.
The different layers 9-12 are separated by fundamental 15 interfaces 13, 14 and 15. A fundamental interface is a collective concept. A fundamental interface comprises a collection of a number of individual interfaces.
In telecom systems a transport network is distinguished from a 20 switched network. A transport network is the infra structure that offers transport capacity of data. To-day a transport network does not offer any services. A typical example of a transport network is a SDH-network (synchronous digital hierarchy) . o r.
Recently some network operators have expressed their interest m a transport network that offers services. Such services, if implemented in an existing transport network, would most certainly bring about handling, such as seizure and release, of
30 auxiliary resources. Such handling would then oe operator dependent. This is where the present invention comes in handy, since the model in accordance with the invention is familiar to an operator; it is similar to the standardized one he uses for the conventional operation and support of his network. Such
35 conventional operation and support activities include notifying the operator of faults that occur m the switching equipment, configuration of logical sub-nets and reconfiguration of existing networks n connection with expansion and contraction of the existing physical network.
A switched network, also referred to as a service network, is a network that receives, from its subscribers, connection requests. In a switched network software residing m the application will send the connection requests to connection handling software that will seize, and release, the resources needed for setting up the requested connection. The model m accordance with the present invention is used in a switched network to handle, seize and release, auxiliary resources.
It is believed to be a novel concept that one and the same model can be used both for switched networks and transport networks.
Fig. 3 is a block diagram showing an exchange 16, two exchange terminals (ET:s) 17, 18, a central processor 19 and auxiliary devices 20, 21, 22. Each exchange terminal is connected between the exchange 16 and a respective external line 23 and 24 respectively. As an example auxiliary device 21 is an echo suppressor, auxiliary device 22 is a conference equipment and auxiliary device 23 is a voice prompting equipment. The units shown in Fig. 3 is an example of a typical physical configura- tion. Note that the auxiliary devices 20, 21 and 22 are shown to be physically connected to the exchange.
In order to minimize implementation aspects of the auxiliary devices an abstract model of the auxiliary devices is proposed. The abstract model based on the managed objects TP Pool
(Termination Point pool) , CTP (Connection Termination Point), Fabric and Managed Element, all described in CCITT M.3100 Generic Network Information Model, is designed and is shown in Fig 4.
The abstract model m Fig. 4 is described m terms of object classes using terminology and definitions from CCITT X.722. The model comprises a network object class 25, a managed element object class 26, a fabric object class 27, an auxiliary resource analyze object class 28, an auxiliary resource pool object class 29 and an auxiliary resource CTP class 30 (CTP is defined m the previous paragraph) . An object class is an aggregate of named data elements and a set of operations designed to manipulate said data. An object class may be thought of as a template used to create individual objects. The network object 25 is an object class representing an abstraction of a telecommunication network_and comprises an identification of the telecommunication network. The managed element object class 26 is an abstraction of a physical site of a switch in the telecommunication network, for example the site, in the telecommunication network, of the switch shown m Fig. 3. The managed element object class has a relation to the networkobject class as symbolized by the vertical line Between boxes 25 and 26 in Figure 4. The fabric object class 27 is an abstraction of a switch, for example the switch 16 shown in Fig. 3. The fabric object class describe the physical switches used for switching m the telecommunication network as well as devices connected thereto as shown in Figure 3. The fabric object class has a relation to the managed element object class as symbolized by the vertical line between boxes 26 and 27. The auxiliary resource analyze object class 28 is used to support centralized handling of auxiliary resources m the teleco munication network. This will be described further down. The auxiliary resource analyze object class comprises information describing the sites within the telecommunication network where there are pools of auxiliary devices and it has a relation to the network object class. This relation is symbolized by the vertical line between boxes 25 and 28. The auxiliary resource pool object class 29 is an abstract object class used only for inheritance. It contains one or several auxiliary device CTP:s and it represents a specific type of auxiliary service. The auxiliary resource pool object class has a relation to the fabric object class, it comprises identities of specific auxiliary devices and it contains connection termination points of the auxiliary devices. Tne auxiliary resource CTP object class 30 is an abstract object class used for inheritance only. It represents auxiliary devices and contains information on the auxiliary device. Examples of information are state information (such as seized or free, busy or not busy) , address information, identity information and capability information. The auxiliary resource CTP object class has a relation to the managed element object class 26, it contains information on identified auxiliary devices and operates on identified auxiliary devices. The relation is symbolized by a vertical line between boxes 26 and 30.
The auxiliary resource analyze object class 28 and the auxiliary resource pool object class 29 are independent of the physical platform 5. The auxiliary resource pool object class 29 is independent of the physical realization of the auxiliary devices and comprises the identity of an auxiliary device ana a logical address to the non shown memory wnerem it is stored. The auxiliary resource pool object class has a relation to the fabric object class 27 and contains connection termination points of the auxiliary devices. The auxiliary resource CTP object class has a relation to the managed element object class, comprises specific information of an identified auxiliary device and is used to operate on identified auxiliary devices.
In Fig. 5 there is shown a physical layer 31 and a logical layer 32. The resources of the physical network, such as switches, trunks, links and time slots in links, auxiliary devices, are shared among a number of logical networks. Each logical network is operated by an operator. There may be different operators for different logical networks, fi logical network is a picture of the portions of the physical network allocated to the individual logical network.
The physical network comprises three switches 33, 16 and 34 interconnected with physical links 35, 36. The switches are geographically separated. Several tone senders 21 are connected to connected to switch 16 and together for a first tone sender pool 21' . Similarly there is a second tone sender pool 37 comprising tone senders connected to switch 3 . A and B are subscribers having a respective telephone instrument.
The logical network 32 comprises a network object 25, a managed element object 26 which manages fabrics 38, 39, 40. A fabric is a logical abstraction of a switch; fabric 38 being the image of switch 33, fabric 39 being the image of switch 16 and fabric 40 the image of switch 34. Termination point pools 41, 42 is the logical abstraction of the link 35 and interconnects fabrics 38 and 39. Similarly Tp-pools 43, 44, representing link 36, interconnect fabric 39 with fabric 40. Auxiliary resource pool objects 45, 46 are logical abstractions of tone sender pools
21' and 37 respectively. These auxiliary resource pool objects 45, 46 correspond to the auxiliary resource pool object 29 of Figure 4. Auxiliary resource CTP objects 47, 48 represent the termination points of the tone sender pools 21 and 37 respectively. In the physical layer the termination points of the pools are indicated by the filled circles at the periphery of the exchange symbols. The auxiliary resource CTP object 47 has a relation to its auxiliary resource pool object 45. Similarly the auxiliary resource CTP object 47 has a relation to its auxiliary resource pool object 46. Pool object 45 has a relation to fabric 39 and pool object 46 has a relation to and fabric 40. Each fabric 38, 39 and 40 has a respective relation to managed element 26. Each auxiliary resource CTp object 47 and 48 has also a respective relation to managed element 26. Managed object 26 has a relation to network object 25. The auxiliary resource analyze object 28 has a relation to managed element 26.
The logical network 32 is configured by an operator, not shown, which for this purpose uses an operation and support system 50. The operation and support system 50 is used for conventional operation and support and has in accordance with the present invention been extended with a generic information model in accordance with CCITT M.3100 to which there has been addeo the auxiliary resource fragments 45, 46, 47 and 48. As described above the generic information model CCITT M.3100 is conventionally used to setting up cross connection between fabrics within the transport network. With the present invention it will now be possible for a network operator to configure auxiliary resource objects in the auxiliary resource fragment by inputting information about the auxiliary resources into the auxiliary resource objects. An application will then use the auxiliary resource objects m run time. For example an application may request an auxiliary resource to be connected to a connection that the application sets up in the transport network. This is m contrast to the technique used to-day. To- day auxiliary resources used by an application are hard coded m the application software. Should new auxiliary devices, for example produced in new technologies, replace the existing auxiliary devices the application software must be re-coded. Such re-coding requires much work, detailed knowledge of the system on which the application runs, and requires much time.
With the present invention the very intimate connection between the application and the auxiliary resources found in the application software is untied. If existing auxiliary resources are to be replaced this will have no impact on the application software. Only the resource objects need to be changed. As an additional advantage with the invention it will be possible to install into the transport network new types of auxiliary devices resource, unknown to-day, using the auxiliary resource fragment in accordance with the invention. Such new types resources will then be possible to connect to connections which are set-up by an operator.
An example of setting up an on-demand connection between subscribers A and B will be described next with reference to Figures 6, 7 and 8. Suppose subscriber A wants to talk with subscriber B. A lifts his receiver. This is detected m a line interface circuit in switch 33. Subscriber A now waits a ring tone n his receiver before he start dialing the B-numbei . A tone sender should now be connected to A:s line. There is no tone sender in switch 33 and therefore software m the application, POTS, requests connection of a tone sender to A:s line. The software sending out this request is schematically shown at 51 m Figure 6. The request together with the identity of the switch m which the call originates is sent to auxiliary resource analyze object 28. The auxiliary resource analyze object 28 typically comprises a table comprising a number of input entries corresponding to the respective identities of the fabrics m which calls are originated and m which there are no tone senders present. To each input entry there is associated data pointing out for each possible destination switch the tone sender pool to be used for the particular destination switch. Tone sender pools to be used in the alternative may also be associated with an input entry. In the example given auxiliary resource pool 45 (named Pl in the table) resident in fabric 39 (named Fl in the table) should be used in the first alternative. If all tone senders m this pool Pl are occupied then the auxiliary resource pool 37 (named P2 m the table) m fabric 40 (named F3 m the table) should be used in the second alternative .
It should be noted that all tone sender pools 21', 37 of the logical network have been grouped together in the central auxiliary resource analyze object class 28. This auxiliary resource analyze object class 28 will thus be independent of the physical realization of the telecommunication network.
The auxiliary resource object 28 communicates the two alterna¬ tives to the application software 51 as indicated by arrow 53. For the sake of clearness the abbreviations for the input and output data m auxiliary resource analyze object 28 refer to the corresponding abbreviations within the symbols used for the objects m Fig. 5.
Accordingly, the software 51 will now know where a tone sender can be found in the network. Next the software must seize a tone sender. To do so a seizure request, represented by arrow 54, is sent to the auxiliary resource pool object 29 which comprises a list of ideal tone senders. In the example it is assumed that there is a free tone sender and this will now be seized by the software 51. Once the tone sender has been seized it will be deleted from the list m the auxiliary list pool object 29. The idle list comprises, for each tone sender of the pool the tone sender identity and its termination point. Generally speaking a termination point is a logical address to an auxiliary device. There is a relation between the logical address and the point m the physical network at which the auxiliary device is connected. In case of the auxiliary device is a tone sender the logical address has a relation to a physical switch port. When a tone sender has been successfully seized this is communicated to the software 51 together with the termination point of the seized tone sender. This communication is symbolically shown by arrow 55.
Finally the application software 51 orders set up of connection between subscriber A's termination point 56, this termination point being fetched from the subscriber data of subscriber A, and the connection termination point 59 of the tone sender m the seized tone sender. This connection termination point CTp=59 is fetched from the idle list which comprises the individual identities of the tone senders and their associated connection termination points CTp. The order to set up this connection is indicated by arrow 57 and is performed by separate application software 58. There has now been established a connection between the termination points 56 and 59 shown m Figure 6, said connection being indicated by a broken line. Next the tone sender sends a ring tone to subscriber A thus prompting him to dial the B-number .
Next the application software 51 will set up a connection to switch 34, the switch to which B is connected. Subscriber B may either be busy or will not answer or has a call forwarding service activated. If B is busy the application software shall instruct the tone sender to send a busy tone to subscriber A. If B does not answer the call the tone sender should send ring tones to A at regular intervals. If B has activated a call forwarding service then the application software may for example request a voice prompting machine to send a message to subscriber A, this message for example being "please wait while the call is transferred". Should a voice prompting machine be connected then the same procedure as indicated above is applied with reference to a pool of voice prompting auxiliary devices.
Generally an auxiliary device is operated upon by sending messages to it, said messages being generated either by the application software 51 or by specific software.
In Figure 7 application software 51 sends a message to the above discussed seized tone sender by forwarding this message to the auxiliary resource CTP object 30 of the seized resource. This message is represented by arrow 60. The tone sender acknowledges the receipt of the message, arrow 61. It should be noted that the auxiliary device CTp class 30 is independent of the physical implementation of the auxiliary device; the tone sender in the example.
When a message should be stopped the application software 51 prepares a stop message and sends it to the auxiliary resource CTP object of the seized resource, in this case the tone sender. Once the tone sender has finished its job a stop message 63 is sent to the application software. This procedure has been illustrated in Figure 8.
The procedure used to disconnect a seized resource is shown m Figure 9. In the above example it is assumed that subscriber B lifts his receiver in response to the reception of the ring signals. Subscribers A and B start to talk to each other and the seized tone sender should be returned to the pool 21' so it can be used by other calls. The call between subscribers A and B still persists. The application software 51 sends a disconnect order to the auxiliary resource CTP object 30 and the connection between terminal points 58 and 59 is disconnected. The disconnect order is shown at arrow 64 and an acknowledgment 65 is set back to the application software 51.
Next the application software 51 returns the seized tone sender to the pool 21' by sending a corresponding order to the auxiliary resource pool 29. In response to this order the seized tone sender is again entered into the idle list 29 of free auxiliary resources. An acknowledgement that the previously seized resource has been returned is sent to the application software 51, this acknowledgment being indicated by arrow 67.
Figure 6 is a simplified block diagram showing the software and objects involved m setting up a connection requiring a tone sender. Therefore only the objects concerned with handling of tone senders have been shown. Should for example a connection require the use of a conference equipment, then there is an auxiliary resource analyze object class 28' comprising all pools of conference equipments, an auxiliary resource pool object class 29' comprising a list of idle conference equipments and an auxiliary resource CTP object class 30 comprising the termination points of the conference equipments.
In Figure 10 the above described process steps are indicated m the form of a flow chart which illustrates the various objects concerned in the information exchange which are required to find an auxiliary resource m the network, seize a particular resource, operate the seized resource and finally return the seized resource to its pool. Although only one operation procedure has been described, i.e. tone sending an auxiliary device may perform many different producers, such as delivering different voice prompting messages.
In the enclosed table 1 there is shown an example of an auxiliary resource object class defined m the C++ program language .
The above described invention may be modified and varied within the scope of the attached claims.
TABLE 1
Comment: {class Aux Analyze ;object class name attribute 1 ID ; k nd of device attribute 2 State ; state of class
(open/locked)
list Aux Pool ID ;lιst with Aux Pool ID.s ID 1 ; identifies different pools
ID z.
Method action Aus Pool ; triggers search of Aux
Joo get Aux Pool ; set configuration ;ιs made for each attribute of list of pool-ID:s create instance ;creates instance of the class delete instance ;deletes instance of the class notification}

Claims

1. A generic information model for configuration, control and management of auxiliary resources within a telecommunication network, said information model comprising a hierarchical structure of object classes, each object class comprising an aggregate of named data elements and a set of operations designed to manipulate said data, said hierarchical structure comprising m a top down direction: a network object class (25), a managed element object class (26) having a relation to the network object class, and a fabric object class (27) having a relation to the managed element object class , said network object class (25) representing an abstraction of the telecommunication network and comprising an identification of the telecommunication network, said managed element object class (26) describing the physical sites of fabrics (38, 40, 48) within said network, said fabric object class (27) descriomg the physical exchanges used for switching in said telecommunication network as well as devices connected to individual switches, characterxzed in that the information model is used for a switched telecommunication network ana that it further comprises an auxiliary resource pool object class (29) and an auxiliary resource connection termination point object class (30) so as to allow for handling of auxiliary resources within said switched network, said auxiliary resource pool object class (a) having a relation to said fabric object class (27), (b) comprising identities of specific auxiliary devices and (c) containing connection termination points of said auxiliary devices, said auxiliary resource connection termination point object class (a) having a relation to said managed element object class, (b) containing information on identified auxiliary devices and (c) operating on identified auxiliary devices.
°. A generic information model in accordance with claim 1, characterized by an auxiliary resource analyze object class (28) which (a) comprises information describing the sites within said telecommunication network where there are pools (21, 37) of auxiliary devices and (b) has a relation to said network object class (25) so as to allow for centralized handling of resources within said telecommunication network.
3. A method of handling auxiliary resources in a telecommunica¬ tion network, wherein said network comprises nodes and trunks interconnecting said nodes, said nodes comprising exchanges and 0 auxiliary devices connected to exchanges, characterized in that sa d auxiliary devices are grouped into centralized pools (21, 37) , each one comprising a respective kind of auxiliary device, that the individual auxiliary devices of a pool are given individual identities, that there is associated with each 5 identity at least one call originating node and one call terminating node, and that for each pool identity there is establisned an idle list listing auxiliary devices that are free .
0 4. A method m accordance with claim 3 characterized by sending an request for seizure of an auxiliary device to the centralized pool corresponding to the kind of the requested auxiliary device, said centralized pool m response to said request returning the physical site and the identity of a pool 5 of devices of the requested type, sending a seizure request to the identified pool of devices, examining said identified pool to see if there is a free device therein, seizing a free auxiliary device m said identified pool and connecting the free auxiliary device to equipment requiring the seized C auxiliary device.
. A method m accordance with claim 4 characterized by discon¬ necting said seized auxiliary device when is no longer any need for it and returning it to said identified pool. AMENDED CLAIMS
[received by the International Bureau on 29 May 1997 (29.05.97); original claims 1-5 replaced by new claims 1-3 (3 pages)]
1. A generic information model for configuration, control and management of auxiliary resources within a telecommunication network, said information model comprising a hierarchical structure of object classes, each object class comprising an aggregate of named data elements and a set of operations designed to manipulate said data, said hierarchical structure comprising m a top down direction: a network object class (25), a managed element object class (26) having a relation to the network object class, and a fabric object class
(27) having a relation to the managed element object class, said network object class (25) representing an abstraction of the telecommunication network and comprising an identification of the telecommunication network, said managed element object class (26) describing the physical sites of fabrics (38, 40,
48) within said network, said fabric object class (27) describing the physical exchanges used for switching m said telecommunication network as well as devices connected to individual switches, characterized in that the information model is used for a switched telecommunication network and that it further comprises an auxiliary resource analyze object class
(28), an auxiliary resource pool object class (29) and an auxiliary resource connection termination point object class
(30) said auxiliary resource analyze object class (28) comprising information describing the cites within said telecommunication network where there are pools (21, 27) of auxiliary devices and a relation to said network object class
(25), said auxiliary resource pool object class (a) having a relation to said fabric object class (27), (b) comprising identities of specific auxiliary devices and (c) containing connection termination points of said auxiliary devices, said auxiliary resource connection termination point object class
a) having a relation to said managed element object class, (b) containing information on identified auxiliary devices and (c) operating on identified auxiliary devices so as to allow for centralized handling of resources within said telecommunication network.
2. A method of handling auxiliary resources in a telecommunication network using a generic information model, said telecommunication network comprising exchanges, auxiliary devices connected to the exchanges and trunks interconnecting the exchanges, said generic information model comprising a hierarchical structure of the following object classes:
(a) a network object class (25) representing an abstraction of the telecommunication network,
(b) a managed element object class (26) with a relation to the network object class, said managed object class describing the physical sites of fabrics within the telecommunication network,
(c) a fabric object class (27) with a relation to the managed element object class, said fabric object class describing said exchanges and devices, auxiliary devices included, connected thereto,
(d) an auxiliary resource analyze object class (28) with a relation to said network object class, said auxiliary resource analyze object class comprising information describing the sites within said telecommunication network where there are pools of auxiliary resources,
(e) an auxiliary resource pool object class (29) with a relation to the network object class, said auxiliary resource pool object class comprising identities of specific auxiliary devices as well as connection termination points of said auxiliary devices,
(f) an auxiliary resource connection termination point object class (30) with a relation to said managed element object class, sa d auxiliary resource connection termination point object class comprising information on identified auxiliary devices and operating on identified auxiliary devices, each one of said object classes comprising an aggregate of named data elements and a set of operations designed to manipulate said data, said method comprising the following steps
(1) a telecommunication application sending to said auxiliary resource analyze object class (28) a request to seize an auxiliary device of an identified type,
(2) said auxiliary resource analyze object class in response to said request returning to said telecommunication application the physical site of a pool of devices of the requested type,
(3) said telecommunication application seizing in said auxiliary resource pool object class (29) a free auxiliary device and receiving therefrom a connection termination point of said seized auxiliary device,
(4) said telecommunication application ordering connection set up application software (58) to set up a connection for which the requested auxiliary device was requested and to connect said seized auxiliary device to said connection.
3. A method in accordance with claim 2, characterized by disconnecting said seized auxiliary device when there is no longer any need for it and returning it to said identified pool .
PCT/SE1996/001611 1995-12-08 1996-12-06 Configuration method for auxiliary resources WO1997022213A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
JP09521981A JP2000501911A (en) 1995-12-08 1996-12-06 How to configure for auxiliary resources
EP96941306A EP0865708A1 (en) 1995-12-08 1996-12-06 Configuration method for auxiliary resources
AU10489/97A AU1048997A (en) 1995-12-08 1996-12-06 Configuration method for auxiliary resources
US09/093,075 US6163544A (en) 1995-12-08 1998-06-08 Configuration method for auxiliary resources

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE9504395A SE508573C2 (en) 1995-12-08 1995-12-08 Generic information model for configuring, controlling and managing auxiliary resources in a telecommunications network
SE9504395-6 1995-12-08

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US09/093,075 Continuation US6163544A (en) 1995-12-08 1998-06-08 Configuration method for auxiliary resources

Publications (1)

Publication Number Publication Date
WO1997022213A1 true WO1997022213A1 (en) 1997-06-19

Family

ID=20400520

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE1996/001611 WO1997022213A1 (en) 1995-12-08 1996-12-06 Configuration method for auxiliary resources

Country Status (5)

Country Link
EP (1) EP0865708A1 (en)
JP (1) JP2000501911A (en)
AU (1) AU1048997A (en)
SE (1) SE508573C2 (en)
WO (1) WO1997022213A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999056475A1 (en) * 1998-04-29 1999-11-04 Telefonaktiebolaget Lm Ericsson (Publ) Resource allocation
GB2344963A (en) * 1998-12-17 2000-06-21 Northern Telecom Ltd Object-oriented network management system
EP1062741A1 (en) * 1998-01-23 2000-12-27 Innovative Communications Technologies, Inc. Capacity allocation system using semi-autonomous network elements to implement and control a transmission schedule
US6333936B1 (en) 1998-04-29 2001-12-25 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for allocating processing resources
WO2002001800A1 (en) * 2000-06-27 2002-01-03 Nokia Corporation Managing composite objects in a network
US6421434B1 (en) 1998-11-25 2002-07-16 Telefonaktiebolaget L M Ericsson (Publ) System for the marketing of telecommunications traffic capacity
WO2006031830A1 (en) 2004-09-14 2006-03-23 Santera Systems Inc. Object-based operation and maintenance (oam) systems and related methods and computer program products
US7742470B2 (en) * 2000-11-20 2010-06-22 Nokia Corporation Network resource reallocation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5220560A (en) * 1990-01-19 1993-06-15 Fujitsu Limited Modem pool system based on a packet communication procedure
EP0658062A2 (en) * 1993-10-12 1995-06-14 AT&T Corp. Service circuit allocation in large networks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5220560A (en) * 1990-01-19 1993-06-15 Fujitsu Limited Modem pool system based on a packet communication procedure
EP0658062A2 (en) * 1993-10-12 1995-06-14 AT&T Corp. Service circuit allocation in large networks

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ITU INTERNATIONAL TELECOMMUNICATION UNION CCITT, Recommendation M. 3100 (10/92), GENERIC NETWORK INFORMATION MODEL, pages 1-27. *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1062741A1 (en) * 1998-01-23 2000-12-27 Innovative Communications Technologies, Inc. Capacity allocation system using semi-autonomous network elements to implement and control a transmission schedule
EP1062741A4 (en) * 1998-01-23 2001-10-04 Innovative Comm Technologies I Capacity allocation system using semi-autonomous network elements to implement and control a transmission schedule
KR100639593B1 (en) * 1998-04-29 2006-10-27 텔레폰악티에볼라겟엘엠에릭슨(펍) Resource allocation
US6333936B1 (en) 1998-04-29 2001-12-25 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for allocating processing resources
AU758060B2 (en) * 1998-04-29 2003-03-13 Telefonaktiebolaget Lm Ericsson (Publ) Resource allocation
WO1999056475A1 (en) * 1998-04-29 1999-11-04 Telefonaktiebolaget Lm Ericsson (Publ) Resource allocation
US6421434B1 (en) 1998-11-25 2002-07-16 Telefonaktiebolaget L M Ericsson (Publ) System for the marketing of telecommunications traffic capacity
GB2344963A (en) * 1998-12-17 2000-06-21 Northern Telecom Ltd Object-oriented network management system
WO2002001800A1 (en) * 2000-06-27 2002-01-03 Nokia Corporation Managing composite objects in a network
US7194727B2 (en) 2000-06-27 2007-03-20 Nokia Corporation Managing composite objects in a network
US7742470B2 (en) * 2000-11-20 2010-06-22 Nokia Corporation Network resource reallocation
WO2006031830A1 (en) 2004-09-14 2006-03-23 Santera Systems Inc. Object-based operation and maintenance (oam) systems and related methods and computer program products
EP1794605A1 (en) * 2004-09-14 2007-06-13 Santera Systems Inc. Object-based operation and maintenance (oam) systems and related methods and computer program products
EP1794605A4 (en) * 2004-09-14 2009-05-13 Santera Systems Inc Object-based operation and maintenance (oam) systems and related methods and computer program products
US7706290B2 (en) 2004-09-14 2010-04-27 Genband Inc. Object-based operation and maintenance (OAM) systems and related methods and computer program products

Also Published As

Publication number Publication date
EP0865708A1 (en) 1998-09-23
SE508573C2 (en) 1998-10-19
SE9504395L (en) 1997-06-09
JP2000501911A (en) 2000-02-15
AU1048997A (en) 1997-07-03
SE9504395D0 (en) 1995-12-08

Similar Documents

Publication Publication Date Title
US6163544A (en) Configuration method for auxiliary resources
US6741610B1 (en) Universal protocol conversion
US6967972B1 (en) Universal protocol conversion
EP0664068B1 (en) Network structure and a signalling protocol for a telecommunication network
EP1413126B1 (en) Network Interface Device for seamless Local Number Portability
USRE43361E1 (en) Telecommunications system having separate switch intelligence and switch fabric
RU2138919C1 (en) Method, system and device to control telephone communication
US5732130A (en) System and method of providing enhanced subscriber services in a multi-node telecommunications network
US5920618A (en) Apparatus and method for managing telephony-based services
US7596131B1 (en) Advanced voice communication feature transparency in a telecommunications network
AU729249B2 (en) Method and system for monitoring the operational status of network element in an advanced intelligent network
US20020059416A1 (en) Management of performance of intelligent network services
JPH10505722A (en) Resource segregation in separate call and connection networks
US5946383A (en) Dynamically associating service script logics to provide a subscriber feature within an advanced intelligent network
WO1997022213A1 (en) Configuration method for auxiliary resources
US6243457B1 (en) Apparatus and method for deploying and updating services in a telephone network
EP1166567B1 (en) Distribution of service execution environments with respect to a centralized service supplier environment
SE508573C3 (en) Generic information model for configuring, controlling and managing help resources in a telecommunications network
JP4729174B2 (en) Programming call processing applications in switching systems
US6577724B1 (en) Method and apparatus in a communication network for switching messages to communication terminal equipment
JP2003515994A (en) Realization of additional functions and service features of call distribution equipment
US8340264B1 (en) System and method for providing segmented applications
US6826274B1 (en) Exchange control method
JP2003515993A (en) Method and communication device for realizing user performance features
KR100340339B1 (en) apparatus and method of automatic call distribution service in switching system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref country code: JP

Ref document number: 1997 521981

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 09093075

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 1996941306

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1996941306

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWW Wipo information: withdrawn in national office

Ref document number: 1996941306

Country of ref document: EP