CSPs who have not taken advantage of the media convergence are losing market share. This digitalization wave is asking for more elasticity and flexibility across networks. We offer end-to-end network lifecycle management services including network engineering, platform development, orchestration, assurance, operations, legacy sustenance, and SDN-NFV Transformation. Reimaging Semiconductor Design Simulation.
Challenge Customers have an ever-growing demand for bandwidth intensive content and value added services. If a technology uses more widely available frequency bands, such as Mobile-Fi com- pared to Mobile WiMAX, it can also be considered to be more mobile, as it has the potential to be deployed in more countries. But specic software in the network will prevent such PCO devices to be moved to the next village. Most networks today are wired.
The general technology trend is even to lower the range which the wireless devices have to bridge the wireless reach. Cells can then accommodate more users or deliver more throughput per user, fewer transmission errors, and less power consumption.
Health considerations and the use of unlicensed frequency bands will also force us to reduce power and wireless reach. In this sense, the degree to which networks can be considered to be wireless is decreasing. In developing countries, the demand for wireless access will be stronger due to the relative scarcity of copper wires, coax cables and ber glass.
Technologies which used to cover the three aspects e. DSL technology does not need to consider cellular aspects, WiFi standards are not polluted by mobility, and Mobile IP does not worry about cellular or wireless. Typical mobile procedures such as in-call handover may leave the realm of stan- dardized technology. To perform good in-call WiFi-to-GSM handover may not require a new 3GPP standard, but may require ne real-time analysis of the voice quality, for example. IP rules the world, and uses whatever underlying tech- nology to get to the end user.
Is there a need for more mobility? Well, new demand for mobility could for example come from in-vehicle devices such as car entertainment systems, the on-board computer or the alarm system. Are we going more wireless? For sure, theres a demand for broadband wireless Internet access in emerging markets, but also covering cities, trains, petrol stations and holiday resorts. However, these three aspects can create an on call atmosphere in which com- munication users feel forced to be reachable within the shortest possible time at unpredictable moments and in inconvenient situations.
As a reaction, they might start shutting down their mobile phones, mobile e- mail clients and computers for too long, and might probably after a few bad expe- riences develop a sentiment of anxiety to miss an important communication or piece of information either good or bad news.
In the end, the user may feel unsatised both when the communications device is on and o something all telecommunications and information providers should of course try and avoid at all cost. To counter-balance the sentiment of intrusiveness, the root cause of the trouble, modern communication means should be able to track and take into account the pres- ence, availability and preference of the user on the receiving end.
Hence the caller simply had to try and wait for someone to pick up the horn. Answering machines and Interactive Voice Response IVR systems started taking calls in the s, and people would have them switched on even when they would be around either at home or in the enterprise.
This may be interpreted as an expression of protective attitude against intrusiveness you could delete these unwanted messages, lter out callers not having a customer number, etc. Well address immediate vs. Basic presence is suciently addressed by existing mobile cellular networks, and this convenience has most certainly contributed to their success. Mobile phones may be switched o, set to vibrate and to silent mode. The mobile network can forward incoming calls in case the called person is unreachable, busy, or doesnt answer the call.
Automated or human attendants can limit the intrusiveness. Increasingly, these attendants are able to take into account of calendar information appointments, meetings, holi- days. Call centers are the school example of the practical use of presence and avail- ability information to handle inbound calls. Company e-mail servers allow you can set an automatic reply message, when on holidays.
Web-based e-mail servers usually dont. On the other hand, as with your letter box, your e-mail server cant refuse to take an incoming e-mail. Therefore, lists of senders and keywords can be set up to lter junk e-mail. Instant Messaging programs oer a good view on the presence and availability of buddies in a buddy list, but then again not on their presence on other devices mobile phone, gaming console, IPTV set-top box.
The availability of the user is sometimes discovered by the device itself for example, the availability is set to Away when the keyboard and mouse are not touched for a while. Some IM programs now allow logging in as invisible, which shows that peo- ple are maybe not that willing to show their actual presence anymore.
Other communication means have until now remained presence-, availability- and preference-agnostic: SMS, for example, does not allow the sender to see the destinations presence in advance of sending the message. On the inbound side, SMS does not allow you to set an autoreply, to forward inbound SMSs to another terminal, or to bar messages from some sources. Are presence and availability going to spice up existing communication means?
If your PC detects keystrokes or mouse movements, this could be communi- cated to a presence server in the POTS, assuming that your telephone is on your desk next to your PC. Callers could then hear that you are away, if you didnt use your PC for say 10 minutes. Conversely, if the upgraded, presence-aware xed telephony network detects that you make or receive a call, it might be congured to inform your IM provider, so your IM contacts can now see that you are at work.
Or are presence and availability going to enable completely new communica- tion means? For sure, presence and availability information would pave the way for push ser- vices. Today, most content and services are consulted in pull mode, in which the end user has to take the initiative.
This notify-and-push principle exists in an embryonic format on the Internet, as syndication even though today the RSS Web feeds Really Simple Syndication are in fact a pull technology. Selectiveness and trust are essential; users would be reluctant to let their pres- ence information be notied to all contacts, tribes and applications, for unknown worse: undesired communications and content to be pushed down.
Similarly, today people are rightfully! Obviously this sector will mature, and the presence and availability of informa- tion may be merged into a larger functional entity such as personal homepages, Web-based address books or social networks. Communication service providers should consider presence and availability as one of the healthy ingredients in the cooking recipe for any new communication service. They should inspire the condence that the users will always be able to do the following:.
Make sure that their own presence data will never be watched nor modied by nonauthorized individuals and applications Handle incoming communication based on their presence and availabil- ity data.
We saw that timeliness is essential for genuine communication to take place: a short time span between the production and the reception of information.
When it used to be humans receiving the information, machines e. Humans now have the comfort to read, interpret and react on them later. Communication is deferred, and sometimes buried among stored information requiring no action.
Has it therefore become less genuine? To some extent, yes. In large companies, theres today a noticeable erosion of the value of an e-mail, for example. Senior executives and their assistants receive, skip, archive, interpret and send hundreds of e-mails a day. A certain error rate is accepted by the originators. The expected time of reaction is, after having gone down since the adoption of e-mail and mobility, increasing again.
Senders esca- late by using multiple communication means, which is worsening the problems. How many voicemails start with Hey I sent you an e-mail, and vice versa?
Are users expecting their communication service providers to play a role in improving things, by sending reminders for pending messages or actions? Perhaps, if these notications could be limited and aggregated providing a daily summary instead of a continuous stream. Perhaps someone could also suggest priorities to all these messages, by learning from the priorities we assigned ourselves, our past reaction time to that sender, and so on. As for most basic forces structuring modern communications, value-added ser- vices relying on them will become more successful if they can be provided spanning multiple communication means.
Today this is not the case; you would be notied by your cell phone, your instant messenger, your online game, and so forth. The idea of the communication service provider as a personal Inbound Com- munications Handler ICH will come back throughout this book. Across all communication means, world demand could be estimated to be in the order of 5 EB today. Further demand could arise from storing media in these data centers; that is, if people would be allowed to leave all their e-mails and attachments on the servers, or if video would start prevailing over voice communication, we would be on a steep curve to the ZB.
Whereas this calls for advances in database technology and economies of scale, a second aspect are the networks to access all these messages. Broadband connec- tivity providers are perhaps not connecting users to other users, but users to their message library.
The evolution to deferred communications could end up in a world where mes- sages and multimedia content are stored and universally accessible, and people communicate in terms of links pointers to stored content. A world where know- ing how and where to nd the info is a more precious skill than knowing much or producing much new information.
In that sense it would be useful for people to be able to talk about these pointers; for communication service providers to invent and promote extensions to language. Its a pretty vague statement, so lets pick an example. Newspapers, for example, are available in three modes: on demand at a news- paper outlet, triggered by events such as major catastrophes, or periodically, in subscription mode.
On-demand communications require repeated purchase decisions by the end user, therefore limiting commercial success in the long term, certainly in a world where communication means are abundant and compete with each other. Their benet, on the other hand, is that they look less obtrusive. According to a September report of industry analyst IDC, shipped storage capacity grew. Triggered communications are a relative novelty. SMS, e-mail, IM and RSS are examples where the communication is accomplished when the recipient user sur- faces powers on the device or launches a program.
Dierent events could be imag- ined to trigger such communications, from world news, over stock quote changes, a car accident, to a particular location or mood of the recipient user. The possibilities of such communication means are yet to be explored fully.
What is their degree of perceived obtrusiveness in the long term? Periodic communications are probably the most obtrusive, if established between humans. Even if touted as more acceptable between machines e. Consumers may end up feeling trapped in a sys- tem they subscribed to, with no possibility to cancel.
The periodic mode is probably more suitable for the transfer of stored information, than for true communication services.
Online gaming providers who impose to their end users to be online at certain times of the week could soon discover the negative eects of periodicity. When conceiving new communication means, the on-demand, triggered and periodic aspects need to be evaluated in great detail. The role of the communication service providers could be expanded from grant- ing permissions for on-demand services today calls being made thanks to an exist- ing billing relationship or prepaid account to storing all information regarding triggers and subscriptions to communication and information services, tomorrow.
It is just another weapon in the battle against the growing commoditization of connectivity, communication and information. According to the Mobile Life Report by The Carphone Warehouse, mobile phones have allowed us to return to the more natural and humane communication patterns of preindustrial society, when we lived in small, stable communities and enjoyed frequent communication with a tightly integrated social network of family, neighbours and friends.
These are, however, merely market segments: though these people must certainly have a common usage pattern of mobile phones, they dont necessarily communicate more with people within the same segment. Also, it is dicult to say whether or not these segments are also applicable to dier- ent communication means such as instant messaging.
Through our social life we become members of schools, companies, sports clubs, interest groups, political parties and unions real organizations. Internet era, we subscribe to newsletters, use Web applications banking , cre- ate Web passports and log in to various machines and applications, and become members of Web communities.
The distinction between the former organizations and the new electronic organizations is getting more blurred every day. A generic name for these groups of users could be tribes. Who has never experienced the frustration of transferring the contacts list from an old to a new mobile phone? Or to log in to your companys Web mail portal and discover that you cant send e-mails because your contacts are not in there?
It allows the PCs address book to be synchronized with most mobile devices. As for presence and availability, one can wonder whether this information belongs only within devices or also within the network. Plaxo, for example, oers individuals the opportunity to copy personal contacts to a Web application, and to keep them synchronized.
Web-based e-mail programs rely entirely on Web-based contact lists. People however are not ready for a Web-only contacts list: synchronization can be a tedious task, but it should remain possible to watch the contacts without hav- ing network access. Lets here consider a tribe from the strict communications sense: the list of users of a given service. Today the tribes own member list is maintained in hopefully a set of redun- dant servers. Tribe members themselves have their own schemes from text les to spread- sheets to maintain their personal list of memberships.
There are no standards yet? Higher security services such as Web banking now even require additional physical signature devices. Without local address books, people would make fewer outgoing calls and send fewer text messages from mobile phones. Would it therefore be a fair explanation of todays low success of mobile data services, that theres simply no tribe membership le on todays mobile handsets?
That theres no single sign-on procedure to the services, except maybe to the ser- vices in the walled garden of the connectivity service provider? If these contact lists and tribe memberships are well thought of, it should be possible to organize them in the following ways:. With multiple identities: I may be identied by application X as a company, and by application Y as an individual.
With multiple proles: I may not wish to reveal my personal vCard in a professional context, and vice versa. By category: it is dicult on todays phones to organize contacts in various categories e. With extensible attributes: it should be possible to add future contact details through new communication means e. Relationally: it should be possible to jump from contact to contact, along relationships representing the real structure of our social networks e.
With two-way handshaking: when contact B is added in person As address book, it should be possible to invite person B to add contact A in person Bs own address book. Maybe a new industry will emerge. Alternatively, contact lists and tribes will migrate from the domain of e-mail and telecommunications into the realm of various industries related to authentica- tion, security, identity management and electronic purses. The mobile communications industry has tried to assess which granularity of location information would be required for which services.
For sure, navigation requires the granularity of GPS. Would people be willing to pay a premium to nd the nearest pizza restaurant in Paris an iconic example at GSM congress presentations , rather than just asking someone? Some people started to think about location-based services in mobile networks as a remedy to poor user input interface on the terminal small display : the mobile device would automatically display the map of where I am.
OK, but thats precisely what a GPS navigation system does. Or as input data for push services: walk into the shopping center and receive a targeted advertisement, another example in the same series. A few niche services have been launched, but in general, location based services have not delivered on the promise.
Worse, the market is so immature that an Italian operator saw a sudden decrease of subscriber numbers once their current location became available on the Internet, even if previous permissions had to be granted by the mobile subscriber. People did not even want to enter the debate on whether they would grant the viewing permis- sions or not; they simply cancelled their subscription to get rid of the problem. In the recipe of a new communication service, I would therefore qualify loca- tion as the garlic: excellent for health, deterring to many, and always to be used in extreme moderation.
Chapter 2. Lets consider their assets in terms of strengths and weaknesses, and the oppor- tunities and threats oered by the immediate surroundings of our landing spot. The bandwidth is sucient for many services, and can still be increased, at the cost of huge investments though 3G on the mobile side, VDSL on the xed side. This should enable streaming services such as digital radio, digital TV and video calls to be carried over these packet networks services which put quite stringent requirements on the underlying bit pipes in terms of Quality of Service:.
This transport Quality- of-Service is dicult to oer on copper pairs you dont own, or using unlicensed frequencies. In the xed network, the unbundling of the local loop has allowed Internet Ser- vice Providers ISPs to oer broadband Internet access to the residential and business communities. But the last mile of copper has remained the property of the telephone company. Second, Mobile and Fixed operators share the valuable asset of the E.
New NGNSPs could be tempted to invent a new address space personal nicknames, e-mail addresses, etc which do not allow valuable inbound calls and messages i. If they want to use E. Mobile and Fixed Operators have proven to be able to market messaging services on a per-message basis SMS and MMS; person-to-person, person-to- application and application-to-person as opposed to ISPs and new NGNSPs, which have to let instant messaging services be used for free at least to the end user.
Last but not least, Mobile and Fixed Operators have gained great in-house expe- rience with the core network aspects of IP technology e. Two rating and account management systems are still in place: typically an online IN-based system for prepaid subscribers and an o-line billing system for postpaid subscribers, inter-operator accounting, and many more functions.
Few Operators have gone through the organizational and technical process to rational- ize this situation. The intricate Web of cross-vendor intercon- nections is now becoming an impediment to launch any new application in such an environment. Whereas many Mobile Operators now belong to supranational groups, impor- tant processes such as purchasing, engineering and operations have shown to be too dicult to centralize or to distribute to specialized centers. Finally, the lack of collaboration between Mobile and Fixed operators is a handicap, when facing NGN service providers, for which the distinction between mobile and xed are just access methods i.
Quad play the joint sale of xed and mobile telephony, Internet access and broadcasting should allow increasing revenues, even though NGN technology is not a prerequisite to realize it. Introducing NGN technology is just an additional opportunity to streamline the oer in these three domains e. Virtual Operators low-cost, Web-based, prepaid, targeted at a niche segment is a new way to market telecom services under various brands.
Any new NGN service platform should be conceived to be shared by multiple service providers. The great commercial uptake and natural attraction of residential broadband Internet access is a great opportunity for Fixed Operators in general.
For example, instant messaging users are accustomed to the convenience of avail- ability e. In the next future, they will demand subscription-based and push-type telecom services that take into account their willingness, activities, preferred communication types and devices, calling buddies, location, agenda, time zone, mood, and so on. This personal policy should be stored in an open environment shared by multiple services, companies and even indus- tries. Personal contact pages will entertain and inform the caller with personalized ring-back tones, pictures and animations, selected by the called party.
NGN technology should also allow the Operators to reverse the business model for some services. We will look at this in further detail in this book i.
Further specialization by layer e. A single company will fail. An example of this is presence-based routing of inbound communications, which could also take into account the presence events on POTS side for example, an incoming telephone call currently being answered.
Residential broadband access seems to have been Pandoras Box and the results are unpredictable for the telecom industry as a whole. Seen from the other side, the entertainment industry including TV, movies, music, sports, and so on now has a new do-it-all channel to the end user, called IPTV. The variety of content and richness of user experience on the Internet is staggering, and youth stopped watching TV. Internet communities have huge commercial power, as they are organized by groups of people sharing the same interests.
Telcos do not know their customers so well their knowledge stops at an E. Broadcasters dont know their customers at all except a billing address. But also in their access networks the last mile , Mobile and Fixed Opera- tors will face competition from new entrants using new wireless broadband access technologies WiMAX and OFDM-based in general over unlicensed spectrum.
Please note that the WiMAX specications support both unlicensed. Though this channel is mainly oered by telecom service providers the Incumbent and Com-. Chapter 1. People searching for Gevrey-Chambertin can automatically be considered to be member of. Short-range unlicensed spectrum technologies e. Finally, the third billion mobile users, to be connected before , will yield much lower ARPU average revenue per user than the rst and second one.
If the Operators do not succeed to reduce costs structurally i. But it wont inuence the important new Opportunities or Threats that they are currently facing: these com- mercial battles have to be fought. Multiple industries e. Standardization is a way to create global, successful markets for these industries. Figure 2. It creates the landscape, the battleeld in which the competitors are going to dierentiate themselves with service oers.
The following diagram presents the commercial landscape for connectivity, communication and content services, in a typical, mature market. Consumers and enterprises are willing to pay for content and mobility, but historically, competing technologies and devices had divided the market in very distinct industries such as broadcasting and GSM.
The unied NGN technology will allow addressing new segments literally by undercutting most of todays technologies and communication methods in price, but also by providing a new customer experience across the dierent terminals. On the far left and the far right side of the diagram, communication consum- ers might be willing to give up some services, in return for the broad, horizontally unied user experience.
On the left-hand side for example, the electric power on an analog telephone line, which guarantees emergency calling in all circumstances, might be sacriced in the NGN. On the right-hand side, consumers might be will- ing to sacrice the national coverage of mobile cellular networks, in return for higher wireless speed, content or even social networking at well-located digital media kiosks.
In the next chapter lets review the past and ongoing standardization work for this NGN. Despite our eorts to summarize, interpret and position these standards relative to each other, we have to warn that the next chapter remains the most arid part of this book, and contains the most acronyms. Fasten seat belts! Chapter 3. In this chapter we take a tour through the work of the standards bodies that are currently driving Next Generation Networks.
When a telecommunication technology is successfully standardized, it results in a world market for devices, services and business models. At rst sight, it may seem an arid world of acronyms, architectures, procedures and protocols, driven by strong industrial interests. But people should try and form a personal opinion: not only engineers and managers at communication service providers and their equipment vendors but also the consumers of devices, connectivity and services a large group.
Is it still worth reviewing technology standards from the perspective of a com- munication service provider only? Yes, insofar as these technologies could lead to operational eciencies, better business models and a better end user experience. Yes also if introducing these improves the SWOT-situation of the communication service providers, in general.
Should the car industry adopt communication standards such as SIP today, wait for new ones, or develop their own? Considering their recent and maybe not so successful experience in navigation systems. It helps to look at the new standards from the perspective of past success for- mulas. Are the features still there e.
Are known issues and imitations of past technologies e. Also, uncovering the main drivers behind an organizations work one can shed some light on the usefulness of a technology. But before we dive into the organizations and standards in the area in order of relevance , it is time for some rst attempts to dene a Next Generation Network.
Not too broad, not too narrow. This statement is too trivial; its like dening the Internet as a network in which we use HTTP to browse sites hosted on Web servers which ignores the myriad of other applications on IP.
We will use this new acronym, NGNSP, throughout the book, in analogy with ISP Internet service providers mainly providing connectivity to the Internet but also e-mail, hosting, name servers and other services and CSPs communication service providers providing traditional xed and mobile communication services. Would it help to add the following conditions to the denition? The Media streams will be forced to use a Border Gateway of the same organization as the one charging for the Session establishment.
This NGNSP will take the responsi- bility to deliver adequate Quality-of-Service, according to the codec negotiated for the media stream. Review of the Standardization Work N OK, this would justify the existence of a NGNSP, only if Quality-of-Service QoS turns out to be an issue in peer-to-peer mode and if that issue cannot be resolved by just installing more transmission bandwidth and more IP routing capacity.
Peer-to-peer services are, by the way, very good at consuming a larger portion of the available bandwidth than client-server applications or spoke wheel architectures. Today, an ISP installing additional bandwidth only improves the quality of peer-to-peer services not necessarily that of other applications. The abilities to make outgoing communications to any destination outside of the NGN, or to receive incoming sessions from the outside world, are also not jus- tifying the existence of a NGNSP either.
Sometimes these companies are not even establishing public interconnections or operating media gateways themselves anymore. The ITU-Ts ISDN could be used to set up various types of channels speech, fax, and circuit-switched data such as video which could be considered as media streams. But is the communication service consumer going to care? It could be worth examining whether dierent organizations could deploy the ses- sion control layer and the media and border gateways.
Probably this would lead to economies of scale, but slow down the implementation of QoS enforcement. In conclusion of this little denition exercise, please nd below an overall dia- gram dening the architecture of the NGN, to our best current knowledge. This diagram should allow us to position the work of multiple standards bodies which are active in the telecommunications eld. The Session Control layer, conveying the necessary signaling to let end users establish multimedia communication sessions 3.
The Resource and Admission Control layer, allocating bandwidth resources to individual media streams, and admitting or refusing users to the NGN 4. The Layer 2 Termination, where devices such as a Broadband Remote Access Server are terminating layer 2 tunnels to the customer premises equipment i. Even though that wont be a major point of attention in this book, IP probes containing content lters, policy enforcers, and trac metering functions will need to be integrated in the NGNSPs admission control and billing systems certainly if the NGNSP organization the communication service provider is also playing the role of the ISP Internet service provider.
The interconnection to peer networks and applications deserves special atten- tion, due to the security risks involved. Lets discuss that aspect later, in a dedicated Chapter 4. Chapter 5 will address the charging and rating requirements for communica- tion means in the NGN. We will take a closer look at the Service layer in Chapter 6. More specically, the Internet Area delivers a network layer, which can be used for both session signaling and media transport.
The Real-Time Applications and Infrastructure Area a confusing name stan- dardizes the session and media layers. The Applications Area deals with e-mail, Web authoring, calendar sharing, and so forth, but not specically in relation to an underlying NGN. Therefore, we wont discuss its work in this book. Local mobility involves movements across some administratively and geograph- ically contiguous set of subnets, while global mobility involves movements across broader administrative, geographical and topological domains.
During such movements, at least within a geographic area such as a city or campus, the objective is to preserve the higher-layer communication e. Other objectives are low signaling overhead. The standard for fast handover was named FMIPv6. Previous work in the IETF mip4 and mip6 working groups had focused on the mobility management protocols themselves MIPv4 and MIPv6 , which would allow the devices to announce their current position real IPv4 or IPv6 address to a mobility manager in the network.
However, these protocols have not known enough commercial success on the IP devices wireless or wired. On the contrary, commercial WiFi switches appeared to be capable to track a devices mobility across a set of hot spots, without specic mobility protocols on the device. The device keeps its allocated IP address, and the handover is performed fast enough for advanced communication applications such as voice not to be aected.
So the IETF netlmm working group is now chartered to standardize an approach that has become a de facto market trend. Redirecting the incoming IP packets as fast as possible to the new AR may not be the sole goal of a mobility management solution. Tunneling, for example for remote access to enterprise intranets, also remains a continuous point of attention. RTP implements application-level framing and integrated layer processing, as dened in David D. Clark and David L.
The sequence numbers in RTP allow the receiver to reconstruct the senders packet sequence, or the loca- tion of a packet in a video stream. Hence for example, each participant to an audio conference will periodically multicast a reception report plus the name of its user on the RTCP control port.
Mixers are able to convert media RTP packets from multiple sources into a new out- going RTP stream, with its own timing. Translators are able to receive multicast RTP packets and send out unicast RTP, for example, to go through a company rewall. RFC is not a nal protocol specication and makes no assumption about the media stream being conveyed; for each new media type, RFC needs to be completed with two companion documents:.
RTCP was extended in with the eXtended Report XR message RFC , allowing intermediates and end users to discover new objective metrics for media qual- ity: packet loss and discard, burst, delay, Mean Opinion Scores, and so on.
I would consider them to be the inventors of IP television. Very similar to HTTP, this protocol allows participants to setup, play, pause and teardown media streams within a session. The group drafted RTSP 2. Next, mmusic is preparing a way for clients to announce not only their media capabilities, but also their capabilities to negotiate the media which will be used in a session.
Mmusic is also chartered to deliver an Internet Media Guide IMG : a collection of multimedia session descriptions, comparable to a television program guide. The managers of this mobility are the SIP servers of the domain of that identier e. Some countries e.
But this attempt to attract the E. To allocate number ranges? Worse, to deal with number portability processes? That UAS could then react as one of the following:. N Stateless Proxy: will add itself as a Via: line to the header, will proxy the SIP method onwards, receive all nonnal and nal responses e. XMPP is today a fairly mature standard, correctly dealing with handshaking, privacy and security, and adopted by the open source community Jabber and several IM clients Google Talk.
SIMPLE inher- ited the PIDF from the impp, but extended it to cater for watcher information, contact information, rich presence extensions and timed status information. The success of a technology like GSM is partly due to the facts that nobody ever succeeded to break GSM authentication i. It could benet from a more coherent approach toward mobility manage- ment, though. It now realizes that it could have decoupled the non-device-impacting mobility inside a local area, from whatever mobility protocol in the core of the Internet e.
But the degree of mobility communication consumers are expecting is rapidly increasing anyway: cross-network, cross-technology and with seamless in-session handover. The food description service allows a user to query neighborhood restaurant information, restaurant addresses and phone numbers. These services can be integrated with the click-to-talk function so that a user can talk directly to service representatives e. The above services can be directly deployed in the Internet.
First, the users of these services can be directly identified by telephone numbers and can be authenticated through IMS with telecom-grade security and Quality of Service QoS see [7] for the implementation details. In particular, new IP services can be nicely integrated with existing telecom services through this architecture. Future Internet , 2 2. It also interacts with the Media Server to transfer the contents voice, text, and images from the content servers [e.
The IPTV- CS is a service agent and signal adapter between the UE and other application servers [ 4 and 5 in Figure 1], which consists of four functional modules and a database system. The Back-end Management Module [BMM; Figure 2 a ] performs service access control including user authorization and manages service related data for system notice and service configuration.
Figure 2. If they match, then the authentication is successful. Figure 3. IMS Registration. In our example, the service access number for dining information service is Figure 4 illustrates how location information can be retrieved. The restaurant name is indicated in SDP session information field. Function setCenter new CLatLng X, Y , 9 specifies the restaurant geographic coordinate X, Y translated from the restaurant name by the Media Server, and the radius meters of the map to be retrieved.
At this point, the user can appropriately touch the screen. Step 14 When the user touches the screen e. In the above example, the UE is assumed to be a mobile phone. Figure 4. Location Information Message Flow. Figure 5 shows how the weather forecast service is presented in the UE.
Future Internet , 2 Figure 5. Weather Forecast Service. The BMM parses the received information and stores the results into the database [Figure 2 e ]. Figure 6.
0コメント