Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Wireless Intelligent Networking

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

WIRELESS INTELLIGENT

NETWORKING
(WIN)

FATİH ERTÜRK
2010514027
• Today's wireless subscribers are much more sophisticated telecommunications users
than they were five years ago. No longer satisfied with just completing a clear call,
today's subscribers demand innovative ways to use the wireless phone. They want
multiple services that allow them to handle or select incoming calls in a variety of
ways.Wireless Intelligent network is developed to drive intelligent network
capabilities such as service independence, separation of basic switching functions
from service and application functions and independence of applications from lower-
level communication details into wireless networks. The primary weapon for
empowering providers to deliver distinctive services with enhanced flexibility is
Wireless Intelligent Networks (WINs).
• In the 1980s it was considered a rare to see someone walking down the street and
talking on a wireless phone. The connections were not great but consumers were
thrilled with the new capability. Today it is more unusual when someone does not
have a cellular phone.
INTRODUCTION TO WIN

• (WIN) is a concept being developed by the Telecommunications Industry Association


(TIA) Standards Committee TR45.2. The charter of this committee is to drive intelligent
network (IN) capabilities, based on interim standard (IS)-41, into wireless networks. IS-41
is a standard currently being embraced by wireless providers because it facilitates
roaming. Basing WIN standards on this protocol enables a graceful evolution to an IN
without making current network infrastructure obsolete.
• Enhanced services are very important to wireless customers. They have come to expect,
for instance, services such as caller ID and voice messaging bundled in the package
when they buy and activate a cellular or personal communications service (PCS) phone.
Whether prepaid, voice/data messaging, Internet surfing, or location-sensitive billing,
enhanced services will become an important differentiator in an already crowded,
competitive service-provider market.
• Enhanced services will also entice potentially new subscribers to sign up for service
and will drive up airtime through increased usage of PCS or cellular services. As the
wireless market becomes increasingly competitive, rapid deployment of enhanced
services becomes critical to a successful wireless strategy.
• Intelligent network (IN) solutions have revolutionized wireline networks. Rapid
creation and deployment of services has become the hallmark of a wireline network
based on IN concepts. Wireless intelligent network (WIN) will bring those same
successful strategies into the wireless networks.
BENEFITS OF INTELLIGENT NETWORKS

• The main benefit of intelligent networks is the ability to improve existing services
and develop new sources of revenue. To meet these objectives, providers require the
ability to accomplish the following:

1)Introduce new services rapidly


IN provides the capability to provision new services or modify existing services throughout
the network with physical intervention
2) Provide service customization
• Service providers require the ability to change the service logic rapidly and
efficiently. Customers are also demanding control of their own services to meet their
individual needs.
3) Establish vendor independence
• A major criterion for service providers is that the software must be developed
quickly and inexpensively. To accomplish this, suppliers must integrate commercially
available software to create the applications required by service providers.
4) Create open interfaces
• Open interfaces allow service providers to introduce network elements quickly for
individualized customer services. AIN technology uses the embedded base of stored
program-controlled switching systems and the SS7 network. The AIN technology also
allows for the separation of service-specific functions and data from other network
resources. This feature reduces the dependency on switching system vendors for
software development and delivery schedules. Service providers have more freedom
to create and customize services.
WIN SERVICES

• WIN services are related to AIN services. AIN was first introduced for the wireline
industry in late 1980’s. The best known AIN application is the "800 service" which opened
the door to a host of new services offered on a platform other than the switch. WIN,
enhancing the AIN concept with the mobility management aspect of wireless
communication, will offer services consistent with what wireline AIN offers. Furthermore,
WIN still needs to address:
• Personal and terminal mobility,
• Internetwork handoff,
• Security,
• Fraud prevention and detection.
1. HANDS-FREE, VOICE-CONTROLLED
SERVICES
• Voice-controlled services employ voice-recognition technology to allow the wireless
user to control features and services using spoken commands, names, and numbers.
There are two main types of automatic speech recognition (ASR). Speaker-dependent
requires specific spoken phrases unique to an individual user. Each user is required
to train the ASR system by recording samples of each specific phrase. The other is
speaker-independent ASR, which requires the use of specific spoken phrases that are
independent of the speaker. The individual user need not train the system.
2. VOICE CONTROLLED DIALING (VCD)

• VCD allows a subscriber to originate calls by dialing digits using spoken commands
instead of the keypad. VCD may be used during call origination or during the call
itself.
3. VOICE-CONTROLLED FEATURE CONTROL
(VCFC)
• VCFC permits a calling party to call a special VCFC directory number, identify the
calling party as an authorized subscriber with a mobile directory number and
personal identification number (PIN), and specify feature operations via one or more
feature-control strings. This service is similar to remote feature control (RFC) except
that the subscriber is allowed to dial feature-control digits or commands using
spoken words and phrases instead of keypad digits.
4. VOICE-BASED USER IDENTIFICATION (VUI)

• VUI permits a subscriber to place restrictions on access to services by using VUI to


validate the identity of the speaker. VUI employs a form of ASR technology to validate
the identity of the speaker rather than determine what was said by the speaker. VUI
requires that the subscriber register the service by training the ASR system by
recording a word or phrase. When a user attempts to access a service, the ASR
system prompts the user to say the special phrase.
5. INCOMING CALL-RESTRICTION/CONTROL

• Incoming calls to a subscriber may be given one of the following termination


treatments: the call is terminated normally to the subscriber with normal or
distinctive alerting; it is forwarded to voice mail or to another number; it is routed to a
subscriber-specific announcement; or it is blocked. These kinds of services help
subscribers control incoming calls and their monthly airtime bills. From a marketing
standpoint, they entice cost-conscious customers who might not want unlimited
access from callers.
FUNCTIONAL COMPONENTS OF WIRELESS
INTELLIGENT NETWORKS
• The wireless intelligent network mirrors the wire line IN mode. But the distinction
between the wireless and wire line network is that many of the wire line call activities
are associated with movement, not just with the actual phone call.
THE COMPONENTS OF WIRELESS INTELLIGENT
NETWORK ARE SHOWN IN THE DIAGRAM

MSC: - The mobile switching center used for switching function portion of the network.
SCP: - Provides a centralized element in the network.
IP: - Gets information directly from the subscribes. PSTN:-Public Switching Telephone Network
STP: - packet switching in the signaling network. BSC:-Base Station controller
EXAMPLES OF WIRELESS INTELLIGENT
NETWORKING SERVICES
• Enhanced services are increasing in popularity. At this point, various carriers within
different servicing areas are implementing them using available IN protocols and
concepts. Some of them are:

• Hands Free, Voice Control Services (VCS)


• Voice Control Feature Control (VCFC)
• Voice Based User Identification (VUI)
• Incoming call restriction
• Calling Name Presentation
PROTOCOLS IN WIRELESS INTELLIGENT
NETWORK
SS7 PROTOCOL STACK
MTP (MESSAGE TRANSFER PART) 1, 2, 3

MTP level 1 defines the physical electrical and functional characteristic of the
digital signal.
MTP level 2 implements flow control message sequence validation and error
checking.
MTP level 3 specifies a path between signaling point in the SS7 network. It
diverts the routes from the failed lengths when congestion occur.
ISDN USER PART(ISUP) AND TELEPHONE
USER PART(TUP)
• TUP and ISUP both performs the signaling required to set up and tear down
telephone calls.TUP support only plain old telephone service (pots) calls. SUP
supports both pots and ISDN calls.
SIGNALING CONNECTION CONTROL
PORT(SCCP)
• It is used to connect the radio related components in cellular network and for inter
ssp communication supporting class services. SCCP translates the global title
address into a destination point code and subsystem number.
*Global Title (GT) is an address used in the SCCP protocol for routing signaling
messages on telecommunications networks. In theory, a global title is a unique address
which refers to only one destination, though in practice destinations can change over
time.
* Point code :An SS7 point code is similar to an IP address in an IP network
TRANSACTION CAPABILITIES APPLICATION
PART(TCAP)
• Its primary purpose is to facilitate multiple concurrent dialogs between the same
sub-systems on the same machines, using Transaction IDs to differentiate these,
similar to the way TCP ports facilitate multiplexing connections between the same IP
addresses on the Internet.
ATTACKS IN WIRELESS INTELLIGENT
NETWORK
• BLACK HOLE ATTACK

• WORMHOLE ATTACK
BLACK HOLE ATTACK

• Black hole attack is also an important and suspicious attack in wireless intelligent
networks. It sends false routing information to the source node that it has fresh
routing path from source to destination. In this attack a malicious node gives illusion
for having shortest path to the node whose packet it wants to intercept.
WORMHOLE ATTACK

• Wormhole attack is a silent and severe type of attack since it simply copies the
packet at one location and replays them at different location or within the same
network.

• So, in wormhole attack, there are two neighbour nodes. They copy the packet at one
location and replay the same packets without any changes in the content at different
location or within the same network.
PREVENTION FOR THE ATTACKS

• Trust Model

• Wormhole Evasion
TRUST MODEL

• Accuracy and sincerity of immediate neighboring nodes are being monitored by


each node in this model. The sending node verifies the integrity of the accepting
node, if succeed the data is sent otherwise data is sent via other path.
WORMHOLE EVASION

• When the search is made for a route, firstly we check cache that any route is available
or not if it is available the Dijkstra's algorithm is used to find the shortest path among
available nodes, otherwise search algorithm is executed to find the routes with
maximum trust level. If search algorithm finds any wormhole nodes the cost of that
node is set to infinity. This ensures that wormholes nodes are avoided in all future
data connections.
SECURITIES USING WIRELESS
INTELLIGENT NETWORKS
• Wireless CCTV technology reduces cost and increases safety for towns and citizens
• Prevent unauthorized access to resources in schools and colleges using highly secure
WiMAX wireless networking solutions
• Use mobile cameras to increase security and reduce vandalism on public transport
• Deliver real-time images from any, even remote, locations
CONCLUSION

• Wireless Intelligent Networking allows the service provider to rapidly introduce new
services. Mobile Pre-Pay is a common application. There are two overall standards
employed today – CAMEL and WIN.
Maintaining and monitoring the Common Channel Signaling (CCS) network is critical to
its success. Understanding and troubleshooting the SS7 protocol is a key part of that
success.
This article covered the different technologies to increase the safety. SAFE WIMAX
techniques can be used to counter the risks of accessibility.
*CAMEL(Customised Applications for Mobile networks Enhanced Logic)
*WiMAX (Worldwide Interoperability for Microwave Access) is a family
of wireless communications standards initially designed to provide 30 to 40 megabit-per-
second data rates,
REFERENCES

• http://www.teletopix.org/gsm/advantages-of-intelligent-network-in/
• http://www.teletopix.org/category/news-telecom/
• http://bits.blogs.nytimes.com/2014/08/30/getting-a-clear-picture-of-a-computer-
networks-security/?_php=true&_type=blogs&_r=1
• https://tr.scribd.com/doc/98544205/WIN-Wireless-Intelligent-Network-Full-Report
• http://www.slideshare.net/ijimit/win-47398350
• https://en.wikipedia.org/wiki/Wireless_Intelligent_Network
• https://en.wikipedia.org/wiki/Global_Title
• https://en.wikipedia.org/wiki/Point_code

You might also like