Dimensioning network resources for IN services

Download Dimensioning network resources for IN services

Post on 21-Jun-2016

213 views

Category:

Documents

1 download

Embed Size (px)

TRANSCRIPT

<ul><li><p>and </p><p>ISDN SYSTEMS ELSEVIER Computer Networks and ISDN Systems 28 (1996) 627-633 </p><p>Dimensioning network resources for IN services </p><p>James Yan * BNR, P.O. Box 3511, Station C, Ottawa, Canada KlY 4H7 </p><p>Abstract </p><p>As Intelligent Network (IN) services are deployed globally, there is a need to ensure that IN network resources are cost-effectively dimensioned. Within the framework of a constrained optimization problem, this paper highlights and discusses the issues that must be considered in formulating the IN network dimensioning problem. The discussion will focus on those new aspects which distinguish the IN network dimensioning problem from the traditional dimensioning problem of circuit-switched telephone voice networks. </p><p>Keywords: Intelligent networks; Dimensioning; Network design; Network performance; Network performance modeling </p><p>1. Introduction </p><p>Globally, the public telephone networks are undergoing a major shift as they evolve towards the Intelligent Network (IN) and offer new ser- vices based on this new architecture. Telecom operators in Europe, North America and Japan have now implemented aspects of IN and are offering IN-based commercial services such as Freephone, virtual private networks (VPN) and calling card services [l-3]. </p><p>Fig. 1 shows the physical architecture of IN. IN services can be accessed either directly at the Service Switching Point (SSP) or through an End Office. Service logic, essentially the combined software/hardware implementing the service, can be resident in either the Service Control Point (SCP) or the Adjunct (ADJ). The SSP communi- </p><p>* E-mail: jimyan@bnr.ca. </p><p>cates with the SCP via the Signal Transfer Point (STP) signaling network using the SS7 signaling protocol. </p><p>The connection between the SSP and the ADJ is typically a direct high-speed communication link. The SCP is a centralized database well suited for services that involve a geographically dis- persed subscriber community and which need network-wide access, usage status and routing information. Because of its high-speed interface to the SSP, the ADJ may be more appropriate for providing quick responses to user actions as well as for service logic local to the SSP. </p><p>Both the Service Node (SN) and the Intelli- gent Peripheral (IP) are systems for providing and managing resources required for user inter- actions. These resources may be for: voice synthe- sis, announcements, voice recognition, and digit collection. Besides supporting user interactions, the SN can also realize some service logic. Typi- cally, the SN is used for specific services rather </p><p>0169-7552/96/$15.00 0 1996 Elsevier Science B.V. All rights reserved SSDZ 0169-7552(95)00069-O </p></li><li><p>628 J. Yan /Computer Network and ISDN Systems 28 (19%) 627433 </p><p>than for the whole range of IN services offered by the SCP or the ADJ. Not shown in Fig. 1, but an important part of IN, is the Service Creation Environment (SCE), a modular programming fa- cility, and the reIated Service Management Sys- tem (SMS) used to create and deploy new IN services. </p><p>The IN dimensioning problem is essentially to determine how many, where, when, and how to deploy the SSPs, STPs, SCPs, SNs and IPs in the networks. Because IN is a new paradigm for delivering telecommunications services, the di- mensioning problem associated with IN services needs to take into account the new aspects of how IN services will use network resources. </p><p>Why is it important to solve the IN network dimensioning problem? Network operators worldwide are aggressively introducing network services based on IN. Solving the dimensioning problem will determine how much of each type of network resources would be required. Such knowledge is useful in two ways: - Knowing the resource requirements early in </p><p>the service planning stage will influence the way services are designed and will be of signifi- cant use to service designers in making trade- offs on how to implement the services. </p><p>- The solution to the problem will reduce the cost of network deployment. Recognizing the importance of the IN network </p><p>dimensioning problem, EURESCOM now has an active project on IN dimensioning [4]. </p><p>The purpose of this paper is to identify and discuss these aspects unique to IN services. To discuss the new requirements in formulating the IN network dimensioning problem, the frame- work of a constrained optimization problem is used to structure the discussion. </p><p>2. Problem definition </p><p>The goal of network dimensioning is to mini- mize, over a planning period, the costs of the network resources in a given network architec- ture. The network dimensioning problem can be defined as a constrained optimization problem. Specifically, for an expected traffic demand T on network resources, we wish to minimize the re- source costs C over a set D of design options. Formally, the problem can be stated as:For ex- pected traffic T, minimize Resource Costs Ouer design set D (1) such that </p><p>Network performance P 2 Target Pti,, (la) Resource utilization R I Capacity R,, . (lb) </p><p>In achieving the minimum costs, at least two sets of constraints must be satisfied. The first is </p><p>Fl SCP </p><p>SSP I Servlw Switching Polnt </p><p>SN = ServlwNode </p><p>IP - Intelligent Peripheral </p><p>ADJ = Adjunct STP = Signal Transfer Point </p><p>SCP I Service Control Point </p><p>Fig. 1. IN network architecture. </p></li><li><p>J. Yan /Computer Networks and ISDN Systems 28 (1996) 627-633 629 </p><p>that the performance of the network P is at least as good as the target minimum performance level. The second is that the utilization of each network resource is within the resources capacity limit. Casting this loosely stated problem into specific terms will require doing the following: . Characterize the traffic T of the planned IN </p><p>services. . Establish the minimum performance targets </p><p>pmin- . Develop the network resource capacity models </p><p>for calculating the utilization R. * Formulate and model the network design alter- </p><p>natives. . Select the appropriate realistic cost functions </p><p>The unique IN aspects of each of these will be discussed in the subsequent sections. </p><p>3. Traffic characterization </p><p>Traffic characterization has to be sufficiently detailed to quantify the traffic demands on the various IN network resources as well as to de- scribe the community of interest among the users. The traffic characterization involves mapping the </p><p>forecast service demands into resource demands. The impact of user behavior has to be incorpo- rated. The biggest challenge under traffic charac- terization is the mapping of forecast service de- mands to resource demands. Typical examples of IN services are Freephone, virtual private net- work, personal communication services. To char- acterize the service demands, there is a need to have a service model. A service model gives the description of what the service features are, an understanding of the network architecture, how these features are provided in the network, how some of the features will generate demands on the network resources. The service model should include information such as: * how the network resources will be used, * the features of the service and their penetra- </p><p>tion, . the geographical coverage of the service, * the expected number of subscribers, * the growth rate, etc. </p><p>To illustrate the service model, consider the Personal Number service. This service is intended to use a single directory number to provide per- sonal mobility of subscribers within the wireline network. The service will use the network as follows (see Fig. 21: </p><p>Fl SCP </p><p>Fig. 2. Simplified message flow in the Personal Number service. </p></li><li><p>630 J. Yan / Computer Networks and ISDN Systems 28 (1996) 627-633 </p><p>1. Any subscriber A calls the Personal Number service subscriber B whose home location is Switch 3. </p><p>2. The SSP serving subscriber B sends a query, via the STP signaling network, to the SCP to find out the current location of B. </p><p>3. The SCP replies that the current location is Switch 2. </p><p>4. The call is routed to Switch 2. Some features of the service are: (1) Follow </p><p>Me in which the call is routed to wherever the subscriber is, (2) Schedule in which the destina- tion is changed according to the time of the day and is predetermined, (3) Do Not Disturb in which the call is forwarded to the voice mail box of the subscriber. Feature penetration refers to the percentage of the service subscriber who will use each feature and the frequency of using them. The geographical coverage may be metropolitan in some cities only, national or international. Part of the service model is to project the initial ex- pected number of subscribers and the growth pattern over the time period of interest. </p><p>Characterizing the service, however, is not suf- ficient for dimensioning. There is still the need to translate the service model into traffic parame- ters which are meaningful for dimensioning the network resources. Examples of these parameters are: * call attempt rate, * signaling messages, - SCP query rate, - non-call associated processing load, * community of interest (CO0 matrix. </p><p>The importance of these parameters depends on the resources being dimensioned. If, for in- stance, the goal is to determine the minimum number and location of SCPs, then the SCP query traffic and the CO1 matrix are of great interest. </p><p>IN-based services will introduce non-call asso- ciated traffic demands. These traffic streams will consume network resources but do not require connections set up. A good example of this type of traffic in the Personal Number service is the traffic generated by the subscriber to update the SCP of the subscribers new location, to change the times in the Schedule feature, or to turn on or off the Do Not Disturb feature. All these </p><p>interactions do not require end-to-end connec- tion set up, but do use real-time processing re- source. </p><p>4. Performance targets </p><p>The next issue to consider is the minimum performance targets which have to be satisfied. This issue has three parts: (1) What performance metrics should be used? (2) What are the end-to- end numerical objective for each metric? (3) How much of the end-to-end targets should be allo- cated to each network resource? </p><p>One of the key impact of IN services on tele- traffic engineering [4] is that new service perfor- mance metrics need to be defined in order to capture the subscribers expectations from the service. For example, in IN-based services, during the time period between receiving the call re- quest message and providing the requested ser- vice, the subscriber may have to interact with the network a few times, or several network elements may have to interact with each other. In regular voice telephone calls, this time period is the post-dialing delay. For IN services, the signifi- cance of post-dialing delay as a measure of for gauging subscribers waiting time does not apply. A new metric such as Service Completion Time [51 may be more appropriate than the traditional post-dialing delay. </p><p>Performance metrics and their numerical ob- jectives are usually set in industry standards fo- rums such as ITU-T. Currently, IN-related per- formance standards are being actively considered in ITU-T Study Group 2. As IN performance standards are still being formulated, network op- erators need to set interim performance objec- tives in order to proceed with deployment plan- ning. In setting these objectives, user expectations need to be factored into these numerical objec- tives [6]. </p><p>Establishing service end-to-end objectives is necessary but not sufficient for network dimen- sioning. There is still the need to allocate the end-to-end targets to the network elements of the architecture being considered. The end-to-end performance targets have to be translated into </p></li><li><p>.I. Yan /Computer Networks and ISDN Systems 28 (I 956) 627-633 631 </p><p>specific objectives which are then allocated to the individual resource. For example, in a Freephone call, the post-~dialing delay is a key metric. The total performance target is a mean of 3.5s. This target has to be allocated to the processing delay in the SSP, the transit delay in the SS7 network and the delay encountered due to query process- ing in the SCF. </p><p>Another key issue in defining the minimum performance targets is the time period for which the targets apply. The issue is, of course, tightly coupled to the traffic characteristics of the ser- vices being considered. For services with traffic reasonably distributed over time, the traditional busy hour concept may still be used. However, for non-homogeneous traffic such as televoting, a much shorter time period may have to be used to capture the performance expected for the service. </p><p>5. Capacity and performance models </p><p>To ascertain that the performance and capac- ity constraints are met, the utilization and perfor- mance of the network resources (SSP, STP SS7 signaling network, SCP, Adjuncts, etc.) need to be modeled. For each resource type, the models need to represent the architecture of the product being considered. The models must capture the impact of the IN service demands on the products utilization and performance. </p><p>Generally speaking, one can expect that IN services will require more processing per call attempt, increase the STP SS7 network traffic, and make the SCP as the potential bottleneck as more services will require each IN call to launch queries to the SCP. To capture these expected behavior, the required models include: (1) SSP model relatin,g call traffic to delay and processor utilization, (2:) a model of the STP network link- ing call traffic to message load, network utiliza- tion and delay, and (3) SCP model relating call traffic to query traffic, SCP utilization and delay. </p><p>From a methodology perspective, the issue here is the level of details which need to be included in .the models. There is obviously a trade-off between accuracy and complexity. One </p><p>criterion important for resolving the trade-off is the type of decision which will rely on the results of solving the dimensioning problem. If, for ex- ample, the purpose is to know how many SCPs are required, the models of the SSP may not be that detailed. However, if the objective is to de- termine how to distribute the software of the service logic, then more detailed models have to be used. </p><p>6. Network design alternatives </p><p>The network design alternatives have to be identified and then modeled in order to quantify how the network resources will be used in each alternative. The design set can be defined at two levels. The first is at the strategy level. At this level, we wish to assess broad approaches such as . whether an overlay should be built or whether </p><p>the existing network should be evolved, + whether a centralized approach relying only </p><p>SCPs should be used or a hybrid solution in- volving SCPs and adjuncts should be adopted. Depending on the option, a different network </p><p>and cost model may be required. The second level focuses on implementation </p><p>optimization. This class of dimensioning prob- lems involves the problems of optimal location, clustering,...</p></li></ul>