Mobile Application Development-Android and It’s Tools
The next stage of the mnp service development in convergence environment
1. Ukrainian Numbering, Naming and Addressing Operation Center
Further development of MNP services in
convergent networks
Moscow, Russia,
1-2 Mar 2018
Yuri Kargapolov
CEO
UNAOC, Consortium
ceo@num.net.ua
http://num.net.ua
ITU Regional Workshop on Mobile Number
Portability, Conformance and Interoperability
4. 4
Estimation market "value"
Estimation of the market "value" through the concept of "usefulness and value of the network":
Metcalfe’s law
𝒏 𝟐−𝒏
𝟐
, where not all network's subscribers are linked by equal connections and the
dynamics of the growth of the network's "value", based on the law of Metcalf, gives a distorted picture of the
development of the market potential ... It is proved by the collapse of the dotcom s in the late 1990s.
empirical Zipf's law (2006):
𝟏
𝟏 + 𝒆−𝒓𝒏+𝒌
Taking into account inter-operational interactions for m operators :
𝒊=𝟏
𝒎
𝟏
𝟏 + 𝒆−𝒓 𝒊 𝒏 𝒊 +𝒌
spectrum.ieee.org/computing/networks/metcalfes-law-is-wrong Metcalfe’s Law is Wrong by Bob Briscoe, Andrew Odlyzko and Benjamin Tilly, July, 2006
where n – subscribers' quantity of the operator's network,
r – coefficient characterizing the growth rate of subscriber base,
k – coefficient characterizing the market capacity, i.e. the maximum possible subscribers
quantity within market under the existing conditions.
5. 5
What happens in the market?
0
0.2
0.4
0.6
0.8
1
1.2
1 2 3 4 5 6 7 8 9 10 11 12
“ledge"
r-strategy
k-strategy
R- strategy implies a rapid growth of the
system and rapid "death" of the elements
of the system; the rapid achievement of
the state of the "ledge" with subsequent
lack of growth, stagnation and extinction.
At the same time, there is a rapid return
on investment.
K-strategy implies a slow growth of the
system, a low rate of development and a
long life of the elements of the system;
the slow achievement of the state of the
"ledge", rapid return on investment is
unlikely to be realized.
It is proved by the practice of
TELCOs
6. 6
Proposed solution S-strategy when "ledge" is reached not at the
point of "inevitable death of an element of
system" but is much lower than this level. In this
case the operator ("a system element") has time
for acceptance of decisions during the activity of
realization of strategy, and has a "lag" changing
of circumstances the reach of the "ledge“
situation
𝒊=𝟏
𝒎
𝟏
𝟏 + 𝑺𝒊 ∗ 𝒆−𝒓 𝒊 𝒏 𝒊 +𝒌
where coefficient Si expresses the readiness of the i-
th operator (a "system element") to implement
systemic organizational and technological
innovations, i.e. in our case, the introduction of
systemic organizational and technological
innovations in the public switched
telecommunications network and / or public land
mobile network
0
0.2
0.4
0.6
0.8
1
1.2
1 2 3 4 5 6 7 8 9 10 11 12
“ledge"
S-strategy
itexpert.org.ua/svjaztelekom/item/10561-est-li-predel-u-mechty.html Does the dream has a limit? Yuri Kargapolov, Yuri Honcharuk, January 12, 2012
8. 8
Convergence paradigm
In move;
at night;
daytime
Outdoors;
inside the room
(away from the computer);
at computer
Between computers;
between people without using a computer;
between a person and a thing
using standard equipment;
between things
Forming the basis of a convergent
environment in which (1) any user in (2)
any time and in (3) any place, using (4)
any own identifier (s) and (5) own
device (s), can receive from ( 6) any
chosen operator the necessary (7)
service "here and now"
5 aspects:
1) Access
2) Interaction & Interconnection
3) NNA
4) Services
5) Rates and Tariffs
Y.2026(12)_F02
Regulation and consumer protection in a converging environment,
Report ITU-D, March 2013
9. 9
Overall functional architecture model
ANI Application Network Interface
USN Ubiquitous Sensor Network
UNI User network interface
SNI Service node interface
NNI Network-to-network interface
IdM ID Management
IdM
Y.2026(12)_F02
11. 11
Principles for identifiers
Identifiers must be found within any network and any protocols' environment
Identifiers must respond to multiple requests to ensure compatibility for both open and
proprietary systems
The identifier must be able to point to geolocation
Identity procedures must support multi-level access
Identifiers can be "smart" and "stupid", both must be functionally separated
The metadata identifiers must be separated from the object itself
14. 14
Why "identification" and "portability"?
Interconnection
Rates &
prices
Access
Services
5 aspects of convergence
Support for all types of subscriber identification at any time and in any
place using any technology for any chosen service:
tel, H.323, SIP, SMS, MMS, XMPP, Email, UNIMSG, iCall etc.
Support for non-geographic and nomadic numbers
Support for personal numbers
Support for symmetric transformations and transfers:
DNS IPv4/IPv6 ENUM ENUM Hosting ENUM
Personal E.164 (MSISDN) IMSI IMEI MAC
Different identifiers by formats and operational properties, for example,
E.164 vs IPv4
The effect of IDs on traffic routing and passing: NPDI, roaming, transfer of
geolocation data, etc., for example:
1) Routing Number для CKC-7 = {global-hex-digits} / {1*hex-phonedigit
rn-context} (for example, with respect to the parameters IAM ISUP CdPN)
2) Routing Number для IP = {local-part@domain-part}
NNA
15. 15
Portability formation
Formation of the basis of a convergent environment, in which :
(1) any user in
(2) any time in
(3) any place, using
(4) any own identifier (s) and
(5) own device (devices), can receive from
(6) any chosen operator the necessary
(7) service "here and now"
MNP
PSP
17. 17
Personalization as a services development trend
Service Profile
Managing
Identification,
Authentication,
and Authorization (AAA)
Device Profile
Managing
Geolocation
Management
Mobility
Portability Personalization
Differentiated QoS
Connection &
Connectivity
Management
MNP
IMEI
PSP Personalized
Services
Portability
The operator's and infrastructure ENUM
IP
SS7
The user’s ENUM
Subscriber
Profile
Managing
BPS
Behavior
Prediction
System
18. 18
Problems
Development of the system on administration and management of personalized identification
of the network's digital objects
Digital objects are identified by a large number of different identifiers
Identification systems are not harmonized with each other, which creates the prerequisites for the difficulty of
using technological methods of indexing during organizing the digital objects search
Development of a system on predicting the behavior and the properties appearance of the
digital objects
A huge data array about digital object often can not help solve the problem formation the actual (in conditions of
the time and place) both static and dynamic profile of the digital object. This fact is makes difficult to work for "here
and now" conditions and create the premise for non-actual conclusions about the digital object, as well as rise the
dropped possibility use of services in the current electronic communication environment
Development of the system on administration and management of the personalization of
services
Personalization of services involves the formation of a new ecosystem of electronic communications with new
properties and stakeholders. Such an ecosystem assumes: (1) the implementation of functions to support of the
existing subscriber services, (2) involves the modernization of decision-making management regarding the
choice of relevant service situations, (3) subscribers' number resource management and regulation, (4)
management of the access to the operator networks, (5) management of both access to stored data, and direct
storage of data etc.
20. 20
3.0G systems on management of the digital objects identity
Only the basic function of the MNP and the fight against
counterfeiting, smuggling and fraud
There are advanced functions for processing complex transactions
(npdi, dynamic number portability correction) within mobile and fixed
networks, roaming and geolocation, support for non-geographic and
nomadic numbers.
Creation of a unified and integrated data environment and decision-
making policy using prediction algorithms, support for all types of
subscriber's IDs at any time and in any place, including personal
numbers in a truly unlimited personalized set of subscriber services
Formation of the basis of a convergent environment in which any user
at any time and in any place, using his any own ID (s) and his own
device (s), can receive from any chosen operator the necessary service
"here and now"
1st G
2nd G
3.0 G