Vous êtes sur la page 1sur 11

Information

Internet Supplementary Services


Subscriber Controlled Input via Internet
(ISCI)
A30828-X1140-L203-2-7629

Subscriber Controlled Input via Internet (ISCI)

Information
Internet Supplementary Services

Trademarks:
All designations used in this document can be trademarks, the use of which by third parties for their
own purposes could violate the rights of their owners.

Copyright (C) Siemens AG 2000


Issued by the Information and Communication Networks Group
Hofmannstrae 51
D-81359 Mnchen
Technical modifications possible.
Technical specifications and features are binding only insofar as
they are specifically and expressly agreed upon in a written contract.

A30828-X1140-L203-2-7629

Information
Internet Supplementary Services

Subscriber Controlled Input via Internet (ISCI)

This document consists of a total of 11 pages. All pages are issue 2.

Contents
1

Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Mode of operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

User procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Call charge registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

A30828-X1140-L203-2-7629

Subscriber Controlled Input via Internet (ISCI)

Information
Internet Supplementary Services

A30828-X1140-L203-2-7629

Information
Internet Supplementary Services

Subscriber Controlled Input via Internet (ISCI)

1 Definition
The Internet supplementary service Subscriber Controlled Input via Internet (ISCI),
allows subscribers with an Internet connection to administrate and check their telephone
subscriber services on the PC by means of a Web browser. This function is implemented
by a special ISCI server in the Internet, which communicates with the Internet user by
means of standard Internet protocols. Using JAVA servlets the ISCI server analyses the
Internet users instructions and transforms them into an ISCI container, which is sent to
the EWSD.
The subscriber can access the Internet supplementary service ISCI from any PC with a
newer version of a standard Web browser via the Internet. This Internet supplementary
service is valid for analog, ISDN and GeoCENTREX subscribers.
ISCI
server

EWSD
network
node

PoP

any
PoP
Intranet

Internet

SS7/TCAP
EWSD
local
network
node

ISCI
user

Operator benefits
analog, ISDN and GeoCENTREX telephony features are rendered more attractive
acceptance results in higher revenue
innovative Internet supplementary service that can be administrated by the subscriber
Subscriber benefits
subscribers can administrate their telephony features easily via a modern graphical
user interface
subscribers do not need a special terminal at home, a PC with a standard
Web browser is adequate
simplified subscriber controlled input for complex features
no need to study manuals
Market opportunities
business customers
residential customers

A30828-X1140-L203-2-7629

Subscriber Controlled Input via Internet (ISCI)

Information
Internet Supplementary Services

2 Mode of operation
The Internet supplementary service Subscriber Controlled Input via Internet (ISCI)
allows Internet users to administrate the subscriber features for their telephone line using a Web browser. Via a graphical user interface (GUI), the Internet user receives online information about all subscriber features that are authorized for ISCI. In addition to
this, the data assigned to the individual features, such as stored directory numbers, is
displayed. Internet users can modify the data via the Web browser and update it immediately in the database of the EWSD network node to which they are connected with
their telephone line.
In order to access the feature data, the Internet subscriber sets up an IP connection to
the ISCI service via the Internet, using the standard dial-in procedure. The ISCI server
authenticates the subscriber by means of a password. The password that is entered
must match the password stored in the EWSD. With the aid of HTML forms containing
JAVA scripts the subscriber can modify administration data such as directory numbers
or feature activations.
The ISCI server process analyses the entered request and transforms it into an ISCI
container. Then the container is sent to the PoP using the UDP/IP protocol. The PoP
sends the modified data to the gateway EWSD. Using global title translation (GTT) the
EWSD network node addresses the local network node of the Internet user (via Signaling System No. 7, SS7 / transaction capabilities application part, TCAP) and so makes
sure that the Internet supplementary services are updated immediately.
The communication interfaces between the subscriber and the ISCI server, and between the ISCI server and EWSD, are protected against misuse. The ISCI server supports the latest standards for secure Internet data transmission (hypertext transmission
protocol secure (HTTPS) socket layer.

A30828-X1140-L203-2-7629

Information
Internet Supplementary Services

Subscriber Controlled Input via Internet (ISCI)

HTML page

EWSD
network node
any
PoP
Internet

Feature x

ISCI
server
GTT

prop.
PoP

SS7/
TCAP

Intranet

EWSD
local
network node

database

Fig. 2.1

A30828-X1140-L203-2-7629

Operation of the Internet supplementary service ISCI

Subscriber Controlled Input via Internet (ISCI)

Information
Internet Supplementary Services

3 User procedure
The Internet supplementary service ISCI provides SCI access via Web browser for the
following features:
Abbreviated Dialing (ABBD)
Alarm Call Service (ACS)
Anonymous Call Rejection (ACR)
Call Barring (OCB)
Call Forwarding to a Fixed Announcement (CFFA)
Call Forwarding to a Group of Announcements (CFGA)
Call Forwarding to a Voice Mail Service (CF-VMS)
Call Forwarding to an Operator (CFO)
Call Forwarding to Any Number (CFAN)
Call Waiting (CW)
Call Waiting Deluxe (CWD)
Called Line Identification Restriction (CALR)
Calling Line Identification Restriction (CLIR)
Carrier Access Code (CAC)
Detailed Billing
Distinctive Ringing (DR)
Do not Disturb (DND)
Fixed Destination Call
General Facility Reset (GFR)
Keyword (PIN)
Malicious Call Identification (MCI)
Rejection of Forwarded Calls (RFC)
Selective Call Acceptance (SCA)
Selective Call Forwarding (SCF)
Selective Call Originating (SCO)
Selective Call Waiting (SCW)
Selective Ringing (SR)
Voice Data Protection (VDP)
The user has the possibility to reset all features to default values. In this case data entered by the user are not deleted but deactivated and stored in EWSD.
Subscriber controlled input via Internet is done via a self-explaining graphical user interface (GUI) (for example see Fig. 3.1). The following figure is just an example of how the
display could look on the PC screen. The page layout can be changed to suit individual
customer requirements.

A30828-X1140-L203-2-7629

Information
Internet Supplementary Services

Fig. 3.1

Subscriber Controlled Input via Internet (ISCI)

Login page of the subscriber controlled input via Internet feature

4 Call charge registration


The network operator specifies by means of an MML command whether charge-relevant
data is to be recorded for subscriber controlled input for other features via Internet.
A flat rate can be charged for the period of authorization.
Automatic message accounting (AMA)
A data record can be generated
when the operators assigns authorization or withdraws it, and
when the subscriber or the administration activates or deactivates other features.
The AMA data records are available for post processing for billing purposes.
Charges for feature input and feature usage
The Internet user is charged for successful operator inputs, successful subscriber controlled input and service usage.
The following table shows the different call charge registration options:
Operator input (FAIO)
Subscriber controlled input (FAIS)
Feature usage (FAU)

A30828-X1140-L203-2-7629

Subscriber Controlled Input via Internet (ISCI)

Information
Internet Supplementary Services

Actions

FAIO

FAIS

FAU

activate

---

---

---

deactivate

---

---

---

assign

---

---

remove

---

---

request status, request data

---

---

---

use

---

---

X = possible, --- = impossible


Tab. 4.1

Call charge registration options

5 Administration
The operator can perform all administration functions on the NetManager by means of
user-friendly applications or MML commands.
Service authorization
The network operator assigns authorization for the service when requested by the subscriber.
Subscriber access types
The Internet supplementary service can be used with the following types of subscriber
access:
Analog
Main station
GeoCENTREX user
GeoCENTREX basic attendant
ISDN
Basic access
GeoCENTREX user
GeoCENTREX basic attendant
GeoCENTREX attendant console (MAC)
Call charge registration
For information on call charge administration please refer to OMN:EXCH-TA.
System administration
For information on system administration please refer to OMN:EXCH-SY.
Subscriber administration
For information on subscriber administration please refer to OMN:EXCH-SU.

10

A30828-X1140-L203-2-7629

Information
Internet Supplementary Services

Subscriber Controlled Input via Internet (ISCI)

6 Requirements
Hardware
Point of presence (PoP)
ISCI server
Software
Standard Web browser (Netscape 4.5 or Internet Explorer 4.0)
Signaling
between Internet user and PoP
DSS1 protocol
between PoP and ISCI server
hypertext transfer protocol secured (HTTPS)
between ISCI server and EWSD network node
user datagram protocol (UDP) / Internet protocol (IP)
between EWSD network node and EWSD local network node
Signaling System No. 7 (SS7) / transaction capabilities application part (TCAP)
Subscriber interfaces
The following interfaces for subscriber access are required:
any processor in the Internet
the subscribers own PC, via modem or ISDN card
DLU
V5.1 interface
V5.2 interface
Firewalls
For security reasons and for protection against unauthorized access from outside, it is
advisable to use firewalls.

A30828-X1140-L203-2-7629

11

Vous aimerez peut-être aussi