The present invention relates generally to methods and systems for providing services in communications networks, and more particularly to a method of and system for processing requests for services in a telecommunications network.
In the public switched telephone network, calls among subscribers who are connected to different end offices are routed via trunk lines, and sometimes through intermediate tandem switching offices and interexchange switches as well. Traditionally, a call is routed based upon a portion of the dialed number. For example, in the United States, a local dialed number consists of seven digits, of which the first three digits (the so-called “NXX” portion) identifies the destination exchange.
When a caller picks up a telephone receiver, the caller becomes actively connected to an end office, as evidenced by a dial tone. After a caller dials a destination telephone number, the end office receiving the digits, i.e., the originating exchange, examines the dialed number to extract the destination exchange. If the destination exchange is different from the originating exchange, the call must be routed toward the destination exchange over one of the many trunk groups connected to the originating exchange. In order to direct a call along an appropriate trunk group leading to the correct destination exchange, a routing table is configured within each switch. The routing table contains a preset list of trunk groups pertaining to each destination exchange. The routing table is consulted to map the logical intent of reaching the destination number through the physical reality of which trunk lines connect to which other switches.
Commonly, the routing table contains an ordered list of preferred and alternate trunk groups for each destination exchange. For example, a preferred trunk group may be those directly connected to the destination exchange whereas alternate trunk groups might connect indirectly through tandem switches. In the course of routing a call, a preferred trunk group will be searched first for an available line and channel. If no available lines and channels are found within the preferred trunk group, then an alternate trunk group will be searched for available lines. A fixed number of trunk groups is searched in the preference order recorded in the routing table.
The contents of each routing table and each switch in a network is dependent upon the topology of the network and must be changed if nodes are added, deleted, or logically rearranged. Moreover, the routing tables are interpreted locally and populated differently for each switch. Changes must be coordinated among all switches to keep the network functioning properly. Any time an NXX or switch is added or the telephone network is otherwise logically rearranged, then the contents of every routing table and every switch in every network must be updated in a coordinated fashion. In the U.S., a private sector entity maintains a local exchange routing guide upon which all network owners base their routing tables.
Although the traditional routing table approach has sufficed for traditional telephone use under normal conditions, it has become inadequate to accommodate new types of services and traffic. The traditional routing table approach is based upon the assumptions of slow change and network configuration and homogeneity among both traffic types and network paths. More specifically, the traditional routing table approach is inflexible. The traditional routing table approach is cumbersome to maintain and it cannot accommodate rapid changes in the network configuration, such as those arising from network growth, or sudden changes in traffic, such as those arising from emergencies and the like. The traditional routing table approach does not provide an opportunity to perform intelligent routing on a per-call basis and it cannot take into account other factors such as class of services, bandwidth, or priority associated with the originator or the network service being invoked. Instead, the route selection algorithm is implicit in the routing tables and is specified in a very constrained manner by the organization of data in the tables. Moreover, the traditional routing table approach does not lend itself to the rapid implementation of new services.
U.S. Pat. No. 5,226,075 discloses a method and apparatus by which a telephone call is routed differently through an interexchange network based upon called number, calling number, and origination data such as a requested class of service. A database is used to map these parameters into a destination switch number. A call might be routed differently, even to different terminating switches, based upon the dialed number or, at best, a bandwidth or quality level as inferred for a given call. The system of the '075 patent is directed by the relatively fixed contents of database tables. The database tables take into account only a few origination parameters, can choose only from a relatively few different paths, and can take actions only as preplanned by whoever populates the database tables. Changes to the physical network may require re-engineering of the contents of the tables.
The approach of the '075 patent cannot optimize the path subject to instantaneous changes in the network or based upon per-resource cost metrics. More generally, the '075 patent continues to confound service and addressing functions within a single database. As in traditional telephony, there is no recognition of the need to segregate service logic and addressing data. Furthermore, the approach of the '075 patent cannot effectively serve new types of traffic or services that may require flexible allocation of intervening resources, such as store-and-forward devices.
There is a need for a flexible routing technique in a telecommunications network that encompasses more than a fixed mapping of numbers to trunk groups, or a fixed mapping of origination information to network resources. A new routing technique is required that takes into account many factors in routing a call and it can be applied in a multi-purpose communications network, rather than just for telephony.
The present invention provides a method of and a system for providing services in a communications network. The system includes a service processing function, a universal directory function, and a resource manager. The service processing function receives service requests, formulates requests for interworking functions based upon service requests, and formulates resource requests based upon service requests and interworking functions. The universal directory function receives logical addresses from the service processing function and returns interworking functions based upon addresses. The resource manager receives resource requests and allocates resources to the service processing function in response to resource requests. The resource manager accesses and updates a resource database that includes an entry corresponding to each network resource managed by the resource manager.
Each entry of the resource database includes a resource identifier, a set of static attributes, and a set of dynamic attributes. A resource identifier uniquely identifies a resource. Static attributes are relatively stable data about the type and configuration of the resource. Dynamic attributes are changing data about the resource that are tracked by the resource manager, including such data as whether the resource is being used, and if so, by whom. If a resource is allocated, the dynamic attribute of the resources will include an indicator on how to find the priority of the allocation. This is because the priority of an allocation could be dynamic, i.e., the function owning a resource may assign varying priority during the duration of the allocation, or static, i.e., the priority is determined at allocation time and is fixed, so that it can be stored in the resource.
A resource request includes a selection function. The resource manager uses the selection function to search the attributes of the resource database to locate a set of candidate resources. The selection function may be used to search both the static attributes and the dynamic attributes. A selection function preferably includes a priority criterion, which indicates the priority level assigned to the request or requester. If the requestor's priority criterion is higher than the priority attribute of an allocated resource, that resource is deemed to be eligible for selection.
A resource request also includes an evaluation function. The resource manager uses the evaluation function to evaluate the attributes of the set of candidate resources to determine a best candidate resource. The resource manager sorts or ranks the candidate resources according to the evaluation function. The resource manager allocates the best candidate resource to the requesting service processing function and indicates the identity and priority of the requesting service processing function. The resource manager then configures the best candidate in preparation for fulfilling the request.
Preferably, the evaluation function ranks un-allocated candidate resources higher than allocated candidate resources. However, occasionally the best candidate may already be allocated to a lower priority service processing function. In those situations, the resource manager de-allocates the best candidate resource and notifies the earlier service processing function that its use of the resource has been preempted. Then the resource manager reconfigures the resource and allocates the resource to the higher priority service processing function.
Every resource manager has a domain, which is the set of resources managed by the resource manager. The domain of a nodal resource manager is the set of resources available to a network node, as the network is currently configured. The system of the present invention may include a network resource manager, whose domain is all connective resources of the network. The network resource manager can reconfigure the network and allocate additional network resources to a nodal resource manager. In the event a nodal resource manager cannot satisfy a resource request, the nodal resource manager may request additional resources from the network resource manager.
Referring now to the drawings, and first to
Referring now to the
Node 13 includes a nodal resource manager 23. Nodal resource manager 23 serves as the only gate keeper to all of the resources belonging to its particular domain. The domain of nodal resource manager 23 is determined by the configuration of network 11. According to the present invention, node resources include all communication ports, and devices, such as voice response units, store and forward devices, multiplexers, modems, and the like, that are used in providing network services. Network services are provided by allocating and configuring appropriate network resources.
The resources of the domain managed by nodal resource manager 23 are tracked in a nodal resource database 25. Each resource within the domain of nodal resource manager 23 is identified by a resource identifier, which uniquely identifies an individual resource. The attributes of each resource includes static attributes, which are relatively stable data about the configuration of the resource, including the type of resource and the capabilities of the resource. The attributes of each resource also include dynamic attributes, which are changing information about the resource that is tracked by the nodal resource manager, such as whether the resource is in service or out of service, available for use, or in use, and by whom.
According to the present invention, the provision of network services, such as routing, occurs as an interaction among service processing function 19, universal directory function 21, and nodal resource manager 23. Rather than having service and addressing mixed together and hard coded within tables, the present invention provides services by allocating network resources in response to user requests. In the preferred embodiment, a prioritization scheme is applied to all network resources and to all user requests. The prioritization scheme allows for the displacement of low priority requests in favor of high priority requests, only when warranted and with consideration for the collective costs involved. Thus, low priority traffic may be preempted in order to make capacity available for high priority traffic. The prioritization scheme of the present invention thus allows radical reconfiguration of the network in the event of natural disasters and the like.
As shown in
A resource request may be either a singular resource request or a composite resource request. A singular resource request is made when only a single resource is needed to provide the requested service. A composite resource request is used when a set of resources is required to accomplish the intended task. There are many situations in which two or more resources are required to provide a particular service. Only one resource without the other is useless. Allocating resources one by one can lead to deadlocks and composite resource requests avoid the deadlock problem by preventing contention among partially allocated requests.
A resource request is composed of a number of parameters, some of which may be simple values and others of which may be algorithms. A resource request includes a selection function, which nodal resource manager 23 uses to select a set of candidate resources. The selection function preferably includes a priority criterion so that nodal resource manager 23 may select lower priority resources as candidate resources. A selection request also includes an evaluation function, which nodal resource manager 23 uses to sort or rank the candidates to find a best candidate resource. The evaluation function may also include a sufficiency criterion so that resource manager does not continue to search after finding a candidate resource that is good enough to satisfy the request. A resource request finally includes the identity of the requester and a queuing duration, which specifies how long a nodal resource manager may search for a best candidate resource.
Terminating object 29 dispatches a resource request to nodal resource manager 23. Nodal resource manager 23 executes the selection and evaluation functions and returns a result to terminating object 29. The result is either that the resource or resources were or were not allocated. Terminating object 29 completes its configuration based upon the result received from nodal resource manager 23. After configuration, terminating object 29 notifies the universal directory function 21 that it has completed configuration and universal directory function 21 returns the identity of terminating object 29 to originating object 27. At this point, originating object 27 and terminating object 29 can start exchanging events necessary to provide the requested service.
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
Block 79 processing may be performed in a serial fashion in which the selection function is applied to locate a set of all candidate resources and then the evaluation function is applied to the set of candidate resources to locate a best candidate resource. Alternatively, block 79 processing may be performed in a parallel fashion in which the evaluation function is applied as candidate resources are located according to the selection function. Preferably, the resource request includes a sufficiency criterion, which defines a minimum acceptable level for a best candidate. When the resource manager finds a candidate resource that satisfies the sufficiency criterion, that candidate resource is declared to be the best candidate and block 79 processing ends. Block 79 processing continues until a best candidate is found or the timer times out.
The nodal resource manager determines, at decision block 81, if a best candidate has been located. If so, the nodal resource manager tests, at decision block 83, if the best candidate is already allocated. If not, the nodal resource manager allocates and configures the best candidate resource and returns the resource to the requesting service processing function terminating object, at block 85. If, at decision block 83, the best candidate resource is already allocated, then the nodal resource manager sends a preempt message to the applicable service processing function terminating object, and deallocates and idles the best candidate resource, at block 87. Then, processing continues at block 85.
If, at decision block 81, the nodal resource manager does not locate a best candidate, then the nodal resource manager requests a new resource from the network resource manager and waits for response, at block 89. If, at decision block 91, a new resource is received, then processing continues at decision block 83. If, at decision block 91, a new resource is not received, then the nodal resource manager sends a resource not available message to the applicable service processing function terminating object, at block 93.
>From the foregoing it may be seen that the method and system of the present invention are well adapted to overcome the shortcomings of the prior art. Additional resources can be added to the network without having to recode routing tables. A service architect can design and implement a new service by writing a new service processing function that specifies the necessary resources, without know the identity of specific resources. Thus, the present Invention enables new services to be provided quickly with a minimum of recoding. For example, new services may be created based upon different priorities. The prioritization scheme of the present invention allows network resources to be dynamically reserved.
The present application is a continuation of U.S. patent application Ser. No. 09/885,337 now U.S. Pat. No. 6,636,597 filed Jun. 20, 2001 which is a continuation of U.S. patent application Ser. No. 09/089,890 now U.S. Pat. No. 6,332,023 filed on Jun. 4, 1998, which are hereby incorporated by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
4201891 | Lawrence et al. | May 1980 | A |
4665514 | Ching et al. | May 1987 | A |
4685125 | Zave | Aug 1987 | A |
4713806 | Oberlander et al. | Dec 1987 | A |
4747130 | Ho | May 1988 | A |
4821034 | Anderson et al. | Apr 1989 | A |
4872157 | Hemmady et al. | Oct 1989 | A |
4893302 | Hemmady et al. | Jan 1990 | A |
5042027 | Takase et al. | Aug 1991 | A |
5157390 | Yoshie et al. | Oct 1992 | A |
5195085 | Bertsch et al. | Mar 1993 | A |
5226075 | Funk | Jul 1993 | A |
5272749 | Masek | Dec 1993 | A |
5327486 | Wolff et al. | Jul 1994 | A |
5329520 | Richardson | Jul 1994 | A |
5390335 | Stephan et al. | Feb 1995 | A |
5418844 | Morrisey et al. | May 1995 | A |
5422940 | Endo et al. | Jun 1995 | A |
5434852 | La Porta et al. | Jul 1995 | A |
5455821 | Schafer et al. | Oct 1995 | A |
5469500 | Satter et al. | Nov 1995 | A |
5475817 | Waldo et al. | Dec 1995 | A |
5483585 | Parker et al. | Jan 1996 | A |
5513127 | Gard et al. | Apr 1996 | A |
5530852 | Meske, Jr. et al. | Jun 1996 | A |
5548726 | Pettus | Aug 1996 | A |
5551035 | Arnold et al. | Aug 1996 | A |
5572581 | Sattar et al. | Nov 1996 | A |
5572583 | Wheeler, Jr. et al. | Nov 1996 | A |
5583920 | Wheeler, Jr. | Dec 1996 | A |
5603085 | Shedlo | Feb 1997 | A |
5608446 | Carr et al. | Mar 1997 | A |
5610976 | Uota et al. | Mar 1997 | A |
5619557 | Van Berkum | Apr 1997 | A |
5619562 | Maurer et al. | Apr 1997 | A |
5655007 | McAllister | Aug 1997 | A |
5661782 | Bartholomew et al. | Aug 1997 | A |
5664102 | Faynberg | Sep 1997 | A |
5694463 | Christie et al. | Dec 1997 | A |
5703940 | Sattar et al. | Dec 1997 | A |
5712908 | Brinkman et al. | Jan 1998 | A |
5715304 | Nishida et al. | Feb 1998 | A |
5724406 | Juster | Mar 1998 | A |
5724419 | Harbuziuk et al. | Mar 1998 | A |
5742905 | Pepe et al. | Apr 1998 | A |
5748468 | Noteboom et al. | May 1998 | A |
5761290 | Farris et al. | Jun 1998 | A |
5781624 | Mitra et al. | Jul 1998 | A |
5784617 | Greenstein et al. | Jul 1998 | A |
5787160 | Chaney et al. | Jul 1998 | A |
5802157 | Clarke et al. | Sep 1998 | A |
5812533 | Cox et al. | Sep 1998 | A |
5818921 | Vander Meiden et al. | Oct 1998 | A |
5822727 | Garberg et al. | Oct 1998 | A |
5825869 | Brooks et al. | Oct 1998 | A |
5826268 | Shaefer et al. | Oct 1998 | A |
5838970 | Thomas | Nov 1998 | A |
5848143 | Andrews et al. | Dec 1998 | A |
5881134 | Foster | Mar 1999 | A |
5903641 | Tonisson | May 1999 | A |
5915008 | Dulman | Jun 1999 | A |
5940616 | Wang | Aug 1999 | A |
5958016 | Chang et al. | Sep 1999 | A |
5966434 | Schafer et al. | Oct 1999 | A |
6018567 | Dulman | Jan 2000 | A |
6035028 | Ward et al. | Mar 2000 | A |
6041109 | Cardy et al. | Mar 2000 | A |
6041117 | Androski | Mar 2000 | A |
6049545 | Stephenson et al. | Apr 2000 | A |
6098094 | Barnhouse et al. | Aug 2000 | A |
6104803 | Weser et al. | Aug 2000 | A |
6134433 | Joong et al. | Oct 2000 | A |
6144647 | Lopez-Torres | Nov 2000 | A |
6161128 | Smyk | Dec 2000 | A |
6169735 | Allen, Jr. et al. | Jan 2001 | B1 |
6175618 | Shah et al. | Jan 2001 | B1 |
6181703 | Christie et al. | Jan 2001 | B1 |
6222919 | Hollatz et al. | Apr 2001 | B1 |
6260067 | Barnhouse et al. | Jul 2001 | B1 |
6301350 | Henningson et al. | Oct 2001 | B1 |
6332023 | Porter et al. | Dec 2001 | B1 |
6333980 | Hollatz et al. | Dec 2001 | B1 |
6393476 | Barnhouse et al. | May 2002 | B1 |
6418461 | Barnhouse et al. | Jul 2002 | B1 |
6480890 | Lee et al. | Nov 2002 | B1 |
6560646 | Barnhouse et al. | May 2003 | B2 |
6636597 | Porter et al. | Oct 2003 | B2 |
6690788 | Bauer et al. | Feb 2004 | B1 |
6704410 | McFarlane et al. | Mar 2004 | B1 |
6891945 | Porter et al. | May 2005 | B2 |
Number | Date | Country |
---|---|---|
0559979 | Sep 1993 | EP |
0812089 | Dec 1997 | EP |
9529564 | Nov 1995 | WO |
9620448 | Jul 1996 | WO |
Number | Date | Country | |
---|---|---|---|
20050123122 A1 | Jun 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10447252 | May 2003 | US |
Child | 11034699 | US | |
Parent | 09885337 | Jun 2001 | US |
Child | 10447252 | US | |
Parent | 09089890 | Jun 1998 | US |
Child | 09885337 | US |