SlideShare a Scribd company logo
1 of 23
Ukrainian Numbering, Naming and Addressing Operation Center
Further development of MNP services in
convergent networks
Moscow, Russia,
1-2 Mar 2018
Yuri Kargapolov
CEO
UNAOC, Consortium
ceo@num.net.ua
http://num.net.ua
ITU ​Regional Workshop on Mobile Number
Portability, Conformance and Interoperability
2
1. Current market situation
2. Convergence
3. Identification
4. Portability
5. Personalization
6. Implementation
3
Current market situation
4
Estimation market "value"
Estimation of the market "value" through the concept of "usefulness and value of the network":
Metcalfe’s law
𝒏 𝟐−𝒏
𝟐
, where not all network's subscribers are linked by equal connections and the
dynamics of the growth of the network's "value", based on the law of Metcalf, gives a distorted picture of the
development of the market potential ... It is proved by the collapse of the dotcom s in the late 1990s.
empirical Zipf's law (2006):
𝟏
𝟏 + 𝒆−𝒓𝒏+𝒌
Taking into account inter-operational interactions for m operators :
𝒊=𝟏
𝒎
𝟏
𝟏 + 𝒆−𝒓 𝒊 𝒏 𝒊 +𝒌
spectrum.ieee.org/computing/networks/metcalfes-law-is-wrong Metcalfe’s Law is Wrong by Bob Briscoe, Andrew Odlyzko and Benjamin Tilly, July, 2006
where n – subscribers' quantity of the operator's network,
r – coefficient characterizing the growth rate of subscriber base,
k – coefficient characterizing the market capacity, i.e. the maximum possible subscribers
quantity within market under the existing conditions.
5
What happens in the market?
0
0.2
0.4
0.6
0.8
1
1.2
1 2 3 4 5 6 7 8 9 10 11 12
“ledge"
r-strategy
k-strategy
R- strategy implies a rapid growth of the
system and rapid "death" of the elements
of the system; the rapid achievement of
the state of the "ledge" with subsequent
lack of growth, stagnation and extinction.
At the same time, there is a rapid return
on investment.
K-strategy implies a slow growth of the
system, a low rate of development and a
long life of the elements of the system;
the slow achievement of the state of the
"ledge", rapid return on investment is
unlikely to be realized.
It is proved by the practice of
TELCOs
6
Proposed solution S-strategy when "ledge" is reached not at the
point of "inevitable death of an element of
system" but is much lower than this level. In this
case the operator ("a system element") has time
for acceptance of decisions during the activity of
realization of strategy, and has a "lag" changing
of circumstances the reach of the "ledge“
situation
𝒊=𝟏
𝒎
𝟏
𝟏 + 𝑺𝒊 ∗ 𝒆−𝒓 𝒊 𝒏 𝒊 +𝒌
where coefficient Si expresses the readiness of the i-
th operator (a "system element") to implement
systemic organizational and technological
innovations, i.e. in our case, the introduction of
systemic organizational and technological
innovations in the public switched
telecommunications network and / or public land
mobile network
0
0.2
0.4
0.6
0.8
1
1.2
1 2 3 4 5 6 7 8 9 10 11 12
“ledge"
S-strategy
itexpert.org.ua/svjaztelekom/item/10561-est-li-predel-u-mechty.html Does the dream has a limit? Yuri Kargapolov, Yuri Honcharuk, January 12, 2012
7
Convergence
8
Convergence paradigm
In move;
at night;
daytime
Outdoors;
inside the room
(away from the computer);
at computer
Between computers;
between people without using a computer;
between a person and a thing
using standard equipment;
between things
Forming the basis of a convergent
environment in which (1) any user in (2)
any time and in (3) any place, using (4)
any own identifier (s) and (5) own
device (s), can receive from ( 6) any
chosen operator the necessary (7)
service "here and now"
5 aspects:
1) Access
2) Interaction & Interconnection
3) NNA
4) Services
5) Rates and Tariffs
Y.2026(12)_F02
Regulation and consumer protection in a converging environment,
Report ITU-D, March 2013
9
Overall functional architecture model
ANI Application Network Interface
USN Ubiquitous Sensor Network
UNI User network interface
SNI Service node interface
NNI Network-to-network interface
IdM ID Management
IdM
Y.2026(12)_F02
10
Identification
11
Principles for identifiers
 Identifiers must be found within any network and any protocols' environment
 Identifiers must respond to multiple requests to ensure compatibility for both open and
proprietary systems
 The identifier must be able to point to geolocation
 Identity procedures must support multi-level access
 Identifiers can be "smart" and "stupid", both must be functionally separated
 The metadata identifiers must be separated from the object itself
Place IdM in the general architecture
12
13
Portability
14
Why "identification" and "portability"?
Interconnection
Rates &
prices
Access
Services
5 aspects of convergence
Support for all types of subscriber identification at any time and in any
place using any technology for any chosen service:
tel, H.323, SIP, SMS, MMS, XMPP, Email, UNIMSG, iCall etc.
Support for non-geographic and nomadic numbers
Support for personal numbers
Support for symmetric transformations and transfers:
DNS IPv4/IPv6 ENUM ENUM Hosting ENUM
Personal E.164 (MSISDN) IMSI IMEI MAC
Different identifiers by formats and operational properties, for example,
E.164 vs IPv4
The effect of IDs on traffic routing and passing: NPDI, roaming, transfer of
geolocation data, etc., for example:
1) Routing Number для CKC-7 = {global-hex-digits} / {1*hex-phonedigit
rn-context} (for example, with respect to the parameters IAM ISUP CdPN)
2) Routing Number для IP = {local-part@domain-part}
NNA
15
Portability formation
Formation of the basis of a convergent environment, in which :
(1) any user in
(2) any time in
(3) any place, using
(4) any own identifier (s) and
(5) own device (devices), can receive from
(6) any chosen operator the necessary
(7) service "here and now"
MNP
PSP
16
Personalization
17
Personalization as a services development trend
Service Profile
Managing
Identification,
Authentication,
and Authorization (AAA)
Device Profile
Managing
Geolocation
Management
Mobility
Portability Personalization
Differentiated QoS
Connection &
Connectivity
Management
MNP
IMEI
PSP Personalized
Services
Portability
The operator's and infrastructure ENUM
IP
SS7
The user’s ENUM
Subscriber
Profile
Managing
BPS
Behavior
Prediction
System
18
Problems
 Development of the system on administration and management of personalized identification
of the network's digital objects
Digital objects are identified by a large number of different identifiers
Identification systems are not harmonized with each other, which creates the prerequisites for the difficulty of
using technological methods of indexing during organizing the digital objects search
 Development of a system on predicting the behavior and the properties appearance of the
digital objects
A huge data array about digital object often can not help solve the problem formation the actual (in conditions of
the time and place) both static and dynamic profile of the digital object. This fact is makes difficult to work for "here
and now" conditions and create the premise for non-actual conclusions about the digital object, as well as rise the
dropped possibility use of services in the current electronic communication environment
 Development of the system on administration and management of the personalization of
services
Personalization of services involves the formation of a new ecosystem of electronic communications with new
properties and stakeholders. Such an ecosystem assumes: (1) the implementation of functions to support of the
existing subscriber services, (2) involves the modernization of decision-making management regarding the
choice of relevant service situations, (3) subscribers' number resource management and regulation, (4)
management of the access to the operator networks, (5) management of both access to stored data, and direct
storage of data etc.
19
Implementation
20
3.0G systems on management of the digital objects identity
 Only the basic function of the MNP and the fight against
counterfeiting, smuggling and fraud
 There are advanced functions for processing complex transactions
(npdi, dynamic number portability correction) within mobile and fixed
networks, roaming and geolocation, support for non-geographic and
nomadic numbers.
 Creation of a unified and integrated data environment and decision-
making policy using prediction algorithms, support for all types of
subscriber's IDs at any time and in any place, including personal
numbers in a truly unlimited personalized set of subscriber services
 Formation of the basis of a convergent environment in which any user
at any time and in any place, using his any own ID (s) and his own
device (s), can receive from any chosen operator the necessary service
"here and now"
1st G
2nd G
3.0 G
21
22
Are you ready to discuss about
challenges and issues?
UNOC2016, UNOC ©
Ukrainian Numbering, Naming and Addressing Operation Center
Thanks!
Questions?
Yuri Kargapolov
CEO
UNAOC, Consortium
ceo@num.net.ua
http://num.net.ua

More Related Content

What's hot

What's hot (16)

Blockchain an introduction
Blockchain an introduction Blockchain an introduction
Blockchain an introduction
 
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
 
IoT protocols overview part 2- Tethered protocols
IoT protocols overview  part 2- Tethered protocolsIoT protocols overview  part 2- Tethered protocols
IoT protocols overview part 2- Tethered protocols
 
Global Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic frameworkGlobal Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic framework
 
3i techso project title
3i techso project title3i techso project title
3i techso project title
 
The most relevant platforms overview for blockchain developers in 2020
The most relevant platforms overview for blockchain developers in 2020The most relevant platforms overview for blockchain developers in 2020
The most relevant platforms overview for blockchain developers in 2020
 
Blockchain voting
Blockchain votingBlockchain voting
Blockchain voting
 
Opportunistic cyberphysical services: A novel paradigm for the future Interne...
Opportunistic cyberphysical services: A novel paradigm for the future Interne...Opportunistic cyberphysical services: A novel paradigm for the future Interne...
Opportunistic cyberphysical services: A novel paradigm for the future Interne...
 
Blockchain for Digital Transformation in Telco
Blockchain for Digital Transformation in TelcoBlockchain for Digital Transformation in Telco
Blockchain for Digital Transformation in Telco
 
Clsb 2020 cfp
Clsb 2020 cfpClsb 2020 cfp
Clsb 2020 cfp
 
Be ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copy
Be  ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copyBe  ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copy
Be ieee 2015-16 java projects @ dreamweb techno solutions-trichy - copy - copy
 
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -
 
Latest mca projects 2013
Latest mca projects 2013Latest mca projects 2013
Latest mca projects 2013
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
 

Similar to The next stage of the mnp service development in convergence environment

Internet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptxInternet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptx
EhabRushdy1
 
Mobile Provisioning Enterprise Network PON-Revisi-Final - English
Mobile Provisioning Enterprise Network PON-Revisi-Final - EnglishMobile Provisioning Enterprise Network PON-Revisi-Final - English
Mobile Provisioning Enterprise Network PON-Revisi-Final - English
Muharam Cahyadi
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
Dr. Amarjeet Singh
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
Dr. Amarjeet Singh
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 

Similar to The next stage of the mnp service development in convergence environment (20)

Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
 
Internet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptxInternet of Things – Technical landscape (1).pptx
Internet of Things – Technical landscape (1).pptx
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
A Smart ITS based Sensor Network for Transport System with Integration of Io...
A Smart ITS based Sensor Network for Transport System with Integration of  Io...A Smart ITS based Sensor Network for Transport System with Integration of  Io...
A Smart ITS based Sensor Network for Transport System with Integration of Io...
 
Iot Report
Iot ReportIot Report
Iot Report
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
 
Mobile Provisioning Enterprise Network PON-Revisi-Final - English
Mobile Provisioning Enterprise Network PON-Revisi-Final - EnglishMobile Provisioning Enterprise Network PON-Revisi-Final - English
Mobile Provisioning Enterprise Network PON-Revisi-Final - English
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 
Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer Evolution
 
User Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless NetworksUser Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless Networks
 
IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
 
inteross-iot.pdf
inteross-iot.pdfinteross-iot.pdf
inteross-iot.pdf
 
A Blockchain-Based Architecture and Framework for Cybersecure Smart Cities.docx
A Blockchain-Based Architecture and Framework for Cybersecure Smart Cities.docxA Blockchain-Based Architecture and Framework for Cybersecure Smart Cities.docx
A Blockchain-Based Architecture and Framework for Cybersecure Smart Cities.docx
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 

Recently uploaded

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
AS
 

Recently uploaded (9)

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pureBromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
 
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
原版定制英国伦敦大学金史密斯学院毕业证原件一模一样
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Abortion pills in Riyadh+966572737505 cytotec jeddah
Abortion pills in Riyadh+966572737505 cytotec jeddahAbortion pills in Riyadh+966572737505 cytotec jeddah
Abortion pills in Riyadh+966572737505 cytotec jeddah
 
Mobile Application Development- Configuration and Android Installation
Mobile Application Development- Configuration and Android InstallationMobile Application Development- Configuration and Android Installation
Mobile Application Development- Configuration and Android Installation
 
Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 

The next stage of the mnp service development in convergence environment

  • 1. Ukrainian Numbering, Naming and Addressing Operation Center Further development of MNP services in convergent networks Moscow, Russia, 1-2 Mar 2018 Yuri Kargapolov CEO UNAOC, Consortium ceo@num.net.ua http://num.net.ua ITU ​Regional Workshop on Mobile Number Portability, Conformance and Interoperability
  • 2. 2 1. Current market situation 2. Convergence 3. Identification 4. Portability 5. Personalization 6. Implementation
  • 4. 4 Estimation market "value" Estimation of the market "value" through the concept of "usefulness and value of the network": Metcalfe’s law 𝒏 𝟐−𝒏 𝟐 , where not all network's subscribers are linked by equal connections and the dynamics of the growth of the network's "value", based on the law of Metcalf, gives a distorted picture of the development of the market potential ... It is proved by the collapse of the dotcom s in the late 1990s. empirical Zipf's law (2006): 𝟏 𝟏 + 𝒆−𝒓𝒏+𝒌 Taking into account inter-operational interactions for m operators : 𝒊=𝟏 𝒎 𝟏 𝟏 + 𝒆−𝒓 𝒊 𝒏 𝒊 +𝒌 spectrum.ieee.org/computing/networks/metcalfes-law-is-wrong Metcalfe’s Law is Wrong by Bob Briscoe, Andrew Odlyzko and Benjamin Tilly, July, 2006 where n – subscribers' quantity of the operator's network, r – coefficient characterizing the growth rate of subscriber base, k – coefficient characterizing the market capacity, i.e. the maximum possible subscribers quantity within market under the existing conditions.
  • 5. 5 What happens in the market? 0 0.2 0.4 0.6 0.8 1 1.2 1 2 3 4 5 6 7 8 9 10 11 12 “ledge" r-strategy k-strategy R- strategy implies a rapid growth of the system and rapid "death" of the elements of the system; the rapid achievement of the state of the "ledge" with subsequent lack of growth, stagnation and extinction. At the same time, there is a rapid return on investment. K-strategy implies a slow growth of the system, a low rate of development and a long life of the elements of the system; the slow achievement of the state of the "ledge", rapid return on investment is unlikely to be realized. It is proved by the practice of TELCOs
  • 6. 6 Proposed solution S-strategy when "ledge" is reached not at the point of "inevitable death of an element of system" but is much lower than this level. In this case the operator ("a system element") has time for acceptance of decisions during the activity of realization of strategy, and has a "lag" changing of circumstances the reach of the "ledge“ situation 𝒊=𝟏 𝒎 𝟏 𝟏 + 𝑺𝒊 ∗ 𝒆−𝒓 𝒊 𝒏 𝒊 +𝒌 where coefficient Si expresses the readiness of the i- th operator (a "system element") to implement systemic organizational and technological innovations, i.e. in our case, the introduction of systemic organizational and technological innovations in the public switched telecommunications network and / or public land mobile network 0 0.2 0.4 0.6 0.8 1 1.2 1 2 3 4 5 6 7 8 9 10 11 12 “ledge" S-strategy itexpert.org.ua/svjaztelekom/item/10561-est-li-predel-u-mechty.html Does the dream has a limit? Yuri Kargapolov, Yuri Honcharuk, January 12, 2012
  • 8. 8 Convergence paradigm In move; at night; daytime Outdoors; inside the room (away from the computer); at computer Between computers; between people without using a computer; between a person and a thing using standard equipment; between things Forming the basis of a convergent environment in which (1) any user in (2) any time and in (3) any place, using (4) any own identifier (s) and (5) own device (s), can receive from ( 6) any chosen operator the necessary (7) service "here and now" 5 aspects: 1) Access 2) Interaction & Interconnection 3) NNA 4) Services 5) Rates and Tariffs Y.2026(12)_F02 Regulation and consumer protection in a converging environment, Report ITU-D, March 2013
  • 9. 9 Overall functional architecture model ANI Application Network Interface USN Ubiquitous Sensor Network UNI User network interface SNI Service node interface NNI Network-to-network interface IdM ID Management IdM Y.2026(12)_F02
  • 11. 11 Principles for identifiers  Identifiers must be found within any network and any protocols' environment  Identifiers must respond to multiple requests to ensure compatibility for both open and proprietary systems  The identifier must be able to point to geolocation  Identity procedures must support multi-level access  Identifiers can be "smart" and "stupid", both must be functionally separated  The metadata identifiers must be separated from the object itself
  • 12. Place IdM in the general architecture 12
  • 14. 14 Why "identification" and "portability"? Interconnection Rates & prices Access Services 5 aspects of convergence Support for all types of subscriber identification at any time and in any place using any technology for any chosen service: tel, H.323, SIP, SMS, MMS, XMPP, Email, UNIMSG, iCall etc. Support for non-geographic and nomadic numbers Support for personal numbers Support for symmetric transformations and transfers: DNS IPv4/IPv6 ENUM ENUM Hosting ENUM Personal E.164 (MSISDN) IMSI IMEI MAC Different identifiers by formats and operational properties, for example, E.164 vs IPv4 The effect of IDs on traffic routing and passing: NPDI, roaming, transfer of geolocation data, etc., for example: 1) Routing Number для CKC-7 = {global-hex-digits} / {1*hex-phonedigit rn-context} (for example, with respect to the parameters IAM ISUP CdPN) 2) Routing Number для IP = {local-part@domain-part} NNA
  • 15. 15 Portability formation Formation of the basis of a convergent environment, in which : (1) any user in (2) any time in (3) any place, using (4) any own identifier (s) and (5) own device (devices), can receive from (6) any chosen operator the necessary (7) service "here and now" MNP PSP
  • 17. 17 Personalization as a services development trend Service Profile Managing Identification, Authentication, and Authorization (AAA) Device Profile Managing Geolocation Management Mobility Portability Personalization Differentiated QoS Connection & Connectivity Management MNP IMEI PSP Personalized Services Portability The operator's and infrastructure ENUM IP SS7 The user’s ENUM Subscriber Profile Managing BPS Behavior Prediction System
  • 18. 18 Problems  Development of the system on administration and management of personalized identification of the network's digital objects Digital objects are identified by a large number of different identifiers Identification systems are not harmonized with each other, which creates the prerequisites for the difficulty of using technological methods of indexing during organizing the digital objects search  Development of a system on predicting the behavior and the properties appearance of the digital objects A huge data array about digital object often can not help solve the problem formation the actual (in conditions of the time and place) both static and dynamic profile of the digital object. This fact is makes difficult to work for "here and now" conditions and create the premise for non-actual conclusions about the digital object, as well as rise the dropped possibility use of services in the current electronic communication environment  Development of the system on administration and management of the personalization of services Personalization of services involves the formation of a new ecosystem of electronic communications with new properties and stakeholders. Such an ecosystem assumes: (1) the implementation of functions to support of the existing subscriber services, (2) involves the modernization of decision-making management regarding the choice of relevant service situations, (3) subscribers' number resource management and regulation, (4) management of the access to the operator networks, (5) management of both access to stored data, and direct storage of data etc.
  • 20. 20 3.0G systems on management of the digital objects identity  Only the basic function of the MNP and the fight against counterfeiting, smuggling and fraud  There are advanced functions for processing complex transactions (npdi, dynamic number portability correction) within mobile and fixed networks, roaming and geolocation, support for non-geographic and nomadic numbers.  Creation of a unified and integrated data environment and decision- making policy using prediction algorithms, support for all types of subscriber's IDs at any time and in any place, including personal numbers in a truly unlimited personalized set of subscriber services  Formation of the basis of a convergent environment in which any user at any time and in any place, using his any own ID (s) and his own device (s), can receive from any chosen operator the necessary service "here and now" 1st G 2nd G 3.0 G
  • 21. 21
  • 22. 22 Are you ready to discuss about challenges and issues?
  • 23. UNOC2016, UNOC © Ukrainian Numbering, Naming and Addressing Operation Center Thanks! Questions? Yuri Kargapolov CEO UNAOC, Consortium ceo@num.net.ua http://num.net.ua