SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
DOI : 10.5121/ijcnc.2014.6204 39
A COMPARATIVE ANALYSIS OF NUMBER
PORTABILITY ROUTING SCHEMES
Suman Deswal , Anita Singhrova
Computer Science and Engg. Deptt., DCRUST, Murthal.
ABSTRACT
To reap the benefits of liberalized telecom market, the implementation of number portability (NP) is utmost
important. NP allows end user to retain their telephone number in case of change of geographical location
or service type or service provider. This paper describes the various number portability routing schemes
namely, All Call Query, Query on Release, Call Dropback and Onward routing. The comparative analysis
between these routing schemes on various parameters is presented here. The issues pertaining to NP have
also been described.
KEYWORDS
Number portability, Query on Release, All Call Query, Call Dropback, Onward routing.
1. INTRODUCTION
Number portability (NP) is a circuit-switch telecommunications network feature that enables end
users to retain their telephone numbers when changing service providers, service types and
geographical locations. Earlier, in absence of NP, customers had to change their numbers with
change of service provider, service types or geographic locations. The paradigm shift to a
“consumer-centric” number ownership model, rather than the “carrier-centric” number ownership
model has resulted in number portability. Number Portability is beneficial to the user as it does
not require the need of informing others of number change and it has increased the competition in
the telecommunication market which has resulted in lower prices and greater customer
satisfaction. Further, once implemented by all the wireline and wireless service providers, it will
significantly reduce the switching cost for customers.
1.1 Types of Number Portability
Three types of number portability have been identified.
a) Service provider portability: It is the ability of users of telecommunications services to
retain, at the same location, existing telecommunications numbers without impairment of quality,
reliability, or convenience when switching from one telecommunications carrier to another.
b) Location Portability: It is the ability of users of telecommunications services to retain
existing directory numbers without impairment of quality, reliability, or convenience when
moving from one physical location to another.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
40
c) Service Portability: It is the ability of users of telecommunications services to retain
existing directory numbers without impairment of quality, reliability, or convenience when
switching from one service to another service provided by the same carrier. For example from
mobile to fixed and from fixed to mobile.
Since there are multiple service providers now a days at the same geographical location, this
paper discusses service provider portability in detail.
1.2 Call routing process:
The call routing process is dependent upon the service provider of both, the host and the
destination nodes. Before discussing the call routing process let us define some terms used in the
paper:
• Serving Network: The serving network is the network that served the number before it was
ported to the new serving network.
• Recipient Network: A recipient network is a network that a subscriber’s number is ported to
when the subscriber switches the service provider.
• Donor Network: It is a network that user subscribed to initially. Since a subscriber can
switch service provider any number of times, the old service provider is not necessarily the same
as the donor network.
There can be two different cases for call routing:
(i) The host and destination are in the same service provider network:
Since host and destination are in same service provider network so the call is directly routed by
the serving exchange in the serving network as shown in Figure 1..
Figure 1. Call routing process in same network
(ii) The host and destination are in the different service provider network:
When host and destination nodes are in different networks then (1) host makes a call to the
serving network and then (2) the serving network provides information to route to a
database(within the recipient network or which is accessed by the recipient network) which
provides the subsequent routing information to be used by recipient exchange ,(3) to connect to
customer’s interface as shown in Figure 2.
The remainder of this paper is structured as follows: Section II summarizes work related to
number portability. Section III discusses various service provider number portability schemes.
Comparative analysis for various number portability routing schemes is presented in section IV.
Main issues related to number portability are presented in section V followed by conclusion in
section VI.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
41
Figure 2. Call routing process in different networks
2. LITERATURE SURVEY
In [1] authors describe the impact of Mobile number portability (MNP) on mobile telephony retail
prices using international time-series cross-section data. The results indicate that average prices
are reduced when the switching process is rapid. In [2] the author discusses that Mobile customers
want to switch operators in return for better quality of service and/or call rates, are benefited by
the MNP facility as they do not incur costs to update their networks about a number change. The
importance of having a dynamic market and as many willing operators as possible is presented in
[3]. This will help regulators to work with a group of determined individuals ideally pushing for
the facility. In [4] the author argues that the introduction of MNP generates various competitive
effects that are of potential interest to regulatory authorities. It provides an analytical framework
for studying the economic costs associated with a reduction in tariff transparency that may result
if the prefix of a mobile telephone number no longer indicates its network assignment. The
introduction of mobile number portability divides the mobile operators into two groups as the new
mobile operators are benefitted and the old ones loose. Effects on mobile customers are also
ambiguous [4]. The necessity of mobile number portability into the developing telecom markets
of South Asia has been explored in [5]. In [6] the authors study that MNP has a positive effect on
customers because in order to retain customers, the service providers give more beneficial
schemes to customers. The only thing that needs attention is the time and cost for switching.
3. TYPES OF CALL ROUTING SCHEMES
When the destination node moves to a new service provider network, the call can be routed using
different ways. The database of ported number is NPDB (Number Portability Database ). The
NPDB provides the LNP (Local Number Portability) association between the called party and the
carrier RN (Routing Number), identifying the switch to which the call should be routed. NPDB is
maintained using either centralized or distributed approach [7,8].
(i) Centralized approach
In centralized approach, there is a centralized database. All service providers have a well defined
interaction with the centralized database administrator for processing the request for porting a
number. There is no direct interface between two service providers. Any porting request is
processed by the administrator, which after taking clearance from the current service provider
broadcasts the porting information to all the service providers.
(ii) Distributed Approach
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
42
In distributed approach, there is a direct interfacing between two service providers. One service
provider can have interfacing with many other service providers. Therefore, this has the
disadvantage of becoming complex as the number of service providers in a country increases.
The different schemes for routing of ported numbers are explained below:
a. All Call query (ACQ)
Upon receiving a call, the originating network sends a query to a centrally administered NPDB. It
returns a Routing Number (RN) associated with the dialled number. The RN number is used by
the originating network to route the call to the recipient network. This is also called direct routing
[8]. The flow of call routing is shown in Figure. 3.
Originating n/w
Is
RN
avail
able
?
Call transferred
to recipient n/w
by originating
n/w
Search NPDB
call
No
Yes
RN
Figure 3. Flow chart for ACQ
b. Query on release (QoR)
The originating network sends the call to the donor network. It then detects that the called number
has been ported out to another network. It thereafter releases the call with a special indication
telling that called number is ported out. The originating network then sends a query to its own
Number Portability Database (NPDB). The NPDB returns the routing number (RN) associated
with the dialled number. The originating number then routes the call to the new servicing
network[8]. The flow of call routing is shown in Figure 4.
c. Onward Routing
The originating network sends the call to the donor network. The donor network checks the
Number Portability Database (NPDB) and finds that the number has moved out of donor switch.
The donor network makes a query to NPDB. NPDB returns the routing number associated with
the dialled number. The donor network uses the routing number to forward the call to new
network[8]. This is also called call forwarding and is shown in Figure 5.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
43
Originating n/w
Is
RN
avail
able
?
Is
no. in
donor
?
NPDB
Call transferred
to recipient n/w
by originating
n/w
Call
Yes
No
No
Yes
RN
Figure 4. Flow chart for QoR
Originating n/w
RN
avail
able
?
Call transferred
to recipient n/w
by originating
n/w
Query donor
n/w
Search donor
internal DB
call
Yes
No
RN
Figure 5. Flow chart for Onward Routing
d. Call Dropback
The originating network sends the call to the donor network. The donor network checks its
internal database. On non availability of the number, the donor network makes a query to NPDB
and finds the routing number associated with the dialled number. It returns the routing number to
the originating network. The originating network then routes the call to the new servicing
network using the routing number as shown in Figure 6 [9].
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
44
Originating n/w
Is
RN
avail
able
?
Call transferred
to recipient n/w
by donor n/w
Query donor
n/w
Search donor
internal DB
Call
Yes
No
RN
Figure 6. Flow chart for Call Dropback
4. ISSUES RELATED TO NUMBER PORTABILITY
4.1 Porting time
Porting time is the time needed to port a number from one subscriber to another. It should be as
minimum as possible because if the porting time increases there is a tendency to refrain from
porting.
4.2 Cost
Setup cost: It leads to increase in cost for the service providers which includes the cost of
additional infrastructure, both hardware and software, required to enable appropriate rerouting of
calls made to subscribers who have switched networks.
Operational cost: The operators also need to invest in the setting up of Number Portability
database either centrally administered or operator specific. This includes the initial cost of
development and an ongoing cost of operation and maintenance.
Administrative cost: The administrative process of porting a number involves cost for the
recipient network operator, donor network operator and the operator of a number database. All
these can pass on the administrative cost to the user requesting the port. The switching of identity
also causes significant costs to users as mobile number is used as an identifier for many
applications on mobile [10]. These prices should be regulated to ensure that the subscribers are
not overcharged.
4.3 Data transmission
For ported number, the data transmission in case of SMS and MMS poses greater challenge as
both the sender and the receiver may be unaware of the loss of data. Therefore, messaging
requires urgent attention when the number has been ported to a new service provider.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
45
5. COMPARISON OF ROUTING SCHEMES
Table 1. Comparative Analysis of call routing Schemes
Parameters ACQ QoR Call Dropback Onward
NPDB
searched
originating n/w
searches
centralized
NPDB once
originating n/w
searches
centralized
NPDB once
Donor n/w
searches its
internal database
once
Donor n/w
searches its
internal database
once
Search
Complexity for
routing
number(RN)
Less (makes a
direct query to
NPDB for RN)
More (makes a
query to donor
n/w prior to
NPDB for RN)
Less(donor n/w
makes a query
to its internal
database)
less(donor n/w
makes a query to
its internal
database)
Efficiency in
terms of
network
resources used
High(does not
involve donor
n/w to route a
call to recipient
n/w)
Less(involves
both donor n/w
& centralized
NPDB)
Less(donor n/w
sends the RN to
originating n/w
which then
forwards the call
to recipient n/w)
Moderate(donor
n/w forwards the
call to recipient
n/w)
Dedicated
signalled
circuit b/w
originating n/w
and donor n/w
No( no donor
n/w)
Yes(donor n/w
replies back to
the originating
n/w)
Yes(donor n/w
replies back to
the originating
n/w)
No (call is
forwarded
directly to
recipient n/w by
the donor n/w)
Call routing
Cost
Low High High Moderate
Acceptance of
government
regulations by
Service
provider
Yes Yes Yes Yes
Maintenance
of portability
information by
donor n/w
Not required Not required Required Required
Increase in
Network
traffic per call
Low High High Moderate
Approach for
Database
maintenance
Centralized Centralized Distributed Distributed
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
46
Table 1 shows the comparison of different call routing schemes. By virtue of their
implementations various routing schemes exhibit different behaviour for different parameters.
Routing of a call is done directly from originating n/w to the correct recipient n/w in ACQ by
deriving RN from NPDB whereas all other routing schemes require donor n/w to determine RN.
This involvement of donor n/w in QoR, Call Dropback and Onward routing increases search
complexity, cost and reduces efficiency. Dedicated signalled circuit is required between
originating n/w and donor n/w in QoR and Call Dropback as call is made by originating n/w
after receiving RN. To and fro movement of RN increases network traffic per call in case of
QoR and Call Dropback.
ACQ is best suited in terms of cost whereas Onward routing is the simplest routing method to
implement. The costs and complexity associated with the other two methods lie between those
of all call query and onward routing.
6. CONCLUSION
The increased usage of mobile phones by the users has led to the implementation of mobile
number portability. This will not only allow the users to change the location/service provider
without changing their number but would also enforce the healthy competition amongst the
service providers. As the service providers would be desperate to retain their high revenue
customers, they would reduce overall cost, improve QoS and provide add on services in
addition.
This paper discusses the various routing schemes in detail. Thorough comparison carried out on
various parameters such as cost, complexity, search time etc. on all the routing schemes
revealed that ACQ is best suited in terms of cost Whereas Onward routing is the simplest
routing method to implement. The costs and complexity associated with the other two methods
lie between those of all call query and onward routing.
REFERENCES
[1] Sean Lyons,(2010) “Measuring the effects of mobile number portability on service prices” Journal
of Telecommunications Management, Vol. 2, No.4, pp. 357 – 368.
[2] Buehler, S., Dewenter, R. and Haucap, J, (2006) “Mobile Number Portability in Europe”
Telecommunications Policy, Vol. 30, No. 7, pp. 385-399.
[3] Gans, J.S. and S.P. King (2000), “Mobile network competition, customer ignorance and fixed-to-
mobile call prices, Information Economics and Policy”, Elsevier, Vol. 12, No.4, pp. 301-327.
[4] Stefan Buehler, Justus Haucap (2004), “Mobile Number Portability”, Journal of Industry,
Competition, and Trade, Vol. 4, No. 3, pp. 223-238.
[5] Tahani Iqbal (2011), “Mobile Number Portability in South Asia”, Proceedings of the 5th ACORN-
REDECOM Conference. Lima.
[6] Sanjeet Singh, Gagan Deep Sharma, Gurbhej Singh (2011), “Customer Perception and Expectation
of Mobile Number Portability”, e-Journal on Telecommunications and Regulated Industries,
doi:10.2139/ssrn.1852019.
[7] Atiya Faiz Khan (2010), “Mobile Number Portability: Challenges and solutions”, Journal of
Emerging Trends in Computing and Information Sciences, Vol. 2.
[8] Sánchez, B. U., and Asimakopoulos, G. (2012),” Regulation and competition in the European
mobile communications industry: An examination of the implementation of mobile number
portability” telecommunication policy , Elsevier, Vol. 36, No. 3, pp. 187-196.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014
47
[9] A.Gallant (2000), “The Number Portability Supplement to ITU-T Recommendation E.164”, <draft-
ietf-enum-e164s2-np-00.txt>.
[10] Cho, D., Ferreira, P., & Telang, R. (2012), “ The impact of Mobile Number Portability on Switching
cost and Pricing Strategy”. Paper presented at the 40th Research Conference on Communication,
Information and Internet Policy, Arlington, VA.
Suman Deswal, Assistant professor, Dept. of Computer Science and Engg., DCR
University of Science and Technology, Sonepat, India. Suman Deswal has completed
her M.Tech (Computer Science and engineering) from Kurukshetra University,
Kurukshetra, India and B.Tech (Computer Science & Engineering) from DCRUST,
Murthal, India (erstwhile CRSCE Murthal) in 2009 and 1998 respectively. Currently,
She is enrolled for Ph.D. and working on mobility in Heterogeneous Networks. She has
13 years of teaching experience. Her research areas include Mobile computing and heterogeneous
networks. She has contributed in various research papers in various National and International journals.
Anita Singhrova, Professor, Dept. of Computer Science and Engg., DCR University of
Science and Technology, Sonepat, India. She holds a Ph.D degree from GGS Indraprastha
University, Delhi, India. She has completed M.E (Computer Science & Engg.) from
Punjab Engineering College, Chandigarh, India and B.Tech(Computer Science) from
T.I.T&S, Bhiwani, India 2006 and 1993 respectively. She has also been certified as Java
Programmer by Sun Microsystems. She possesses seventeen years of teaching experience
and is presently working as Professor in the department of Computer Science and Engg. at DCR
University of Science and Technology, Sonepat, India. Her research interests include network security,
Mobile computing and heterogeneous networks. She has contributed in various research papers and
articles in various National and International journals and conferences.

Mais conteúdo relacionado

Mais procurados

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Editor Jacotech
 
Unit 3 it6601 presentation
Unit 3 it6601 presentationUnit 3 it6601 presentation
Unit 3 it6601 presentationraja744
 
Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...ijma
 
Evaluation of CSSR with Direct TCH Assignment in Cellular Networks
Evaluation of CSSR with Direct TCH Assignment in Cellular NetworksEvaluation of CSSR with Direct TCH Assignment in Cellular Networks
Evaluation of CSSR with Direct TCH Assignment in Cellular NetworksIJERA Editor
 
Digital switching system ppt
Digital switching system pptDigital switching system ppt
Digital switching system pptGopalakrishnaM4
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
 
Quality of service improvement, Handoff Prioritization and Channel utilizatio...
Quality of service improvement, Handoff Prioritization and Channel utilizatio...Quality of service improvement, Handoff Prioritization and Channel utilizatio...
Quality of service improvement, Handoff Prioritization and Channel utilizatio...IJERA Editor
 
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...Georgios Giannakopoulos
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...acijjournal
 
IET_Estimating_market_share_through_mobile_traffic_analysis linkedin
IET_Estimating_market_share_through_mobile_traffic_analysis linkedinIET_Estimating_market_share_through_mobile_traffic_analysis linkedin
IET_Estimating_market_share_through_mobile_traffic_analysis linkedinAsoka Korale
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
 
2 gsm network structure
2 gsm network structure2 gsm network structure
2 gsm network structurekeyvan storer
 

Mais procurados (18)

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK ...
 
Unit 3 it6601 presentation
Unit 3 it6601 presentationUnit 3 it6601 presentation
Unit 3 it6601 presentation
 
Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Evaluation of CSSR with Direct TCH Assignment in Cellular Networks
Evaluation of CSSR with Direct TCH Assignment in Cellular NetworksEvaluation of CSSR with Direct TCH Assignment in Cellular Networks
Evaluation of CSSR with Direct TCH Assignment in Cellular Networks
 
Ch6
Ch6Ch6
Ch6
 
RP_Presentation1
RP_Presentation1RP_Presentation1
RP_Presentation1
 
Digital switching system ppt
Digital switching system pptDigital switching system ppt
Digital switching system ppt
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
 
Quality of service improvement, Handoff Prioritization and Channel utilizatio...
Quality of service improvement, Handoff Prioritization and Channel utilizatio...Quality of service improvement, Handoff Prioritization and Channel utilizatio...
Quality of service improvement, Handoff Prioritization and Channel utilizatio...
 
Jg3416751681
Jg3416751681Jg3416751681
Jg3416751681
 
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
 
4 ijcse-01218
4 ijcse-012184 ijcse-01218
4 ijcse-01218
 
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...Downlink beamforming and admissin control for spectrum sharing cognitive radi...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
 
IET_Estimating_market_share_through_mobile_traffic_analysis linkedin
IET_Estimating_market_share_through_mobile_traffic_analysis linkedinIET_Estimating_market_share_through_mobile_traffic_analysis linkedin
IET_Estimating_market_share_through_mobile_traffic_analysis linkedin
 
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
 
2 gsm network structure
2 gsm network structure2 gsm network structure
2 gsm network structure
 
Unit 3
Unit 3Unit 3
Unit 3
 

Destaque

On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
 
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIJCNCJournal
 
Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobileIJCNCJournal
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...IJCNCJournal
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified goldenIJCNCJournal
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)IJCNCJournal
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintainingIJCNCJournal
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rswIJCNCJournal
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsIJCNCJournal
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...IJCNCJournal
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect ofIJCNCJournal
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocolIJCNCJournal
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...IJCNCJournal
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutionsIJCNCJournal
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
 

Destaque (19)

On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
 
Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobile
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rsw
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdns
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect of
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...
 

Semelhante a A comparative analysis of number portability routing schemes

2mobile number portability
2mobile number portability2mobile number portability
2mobile number portabilityjaaneha
 
MOBILE NUMBER PORTABILITY
MOBILE NUMBER PORTABILITYMOBILE NUMBER PORTABILITY
MOBILE NUMBER PORTABILITYShivam Yadav
 
Mobile number portability with IEEE Material
Mobile number portability with IEEE MaterialMobile number portability with IEEE Material
Mobile number portability with IEEE MaterialSachin Saini
 
MOBILE NUMBER PORTABILITY--MNP
MOBILE NUMBER PORTABILITY--MNPMOBILE NUMBER PORTABILITY--MNP
MOBILE NUMBER PORTABILITY--MNPVipul Buchade
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
mobile-number-portability
mobile-number-portabilitymobile-number-portability
mobile-number-portabilityamitachouliger
 
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...IOSR Journals
 
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...Editor IJMTER
 
Mobile number-portability
Mobile number-portabilityMobile number-portability
Mobile number-portabilityjasscheema
 
Intelligent Networks
Intelligent NetworksIntelligent Networks
Intelligent NetworksSusma S
 
Segregtion of telecom network operation and service provision
Segregtion of telecom network operation and service provisionSegregtion of telecom network operation and service provision
Segregtion of telecom network operation and service provisionAbraham Paul
 

Semelhante a A comparative analysis of number portability routing schemes (20)

2mobile number portability
2mobile number portability2mobile number portability
2mobile number portability
 
Mobile number portability1
Mobile number portability1Mobile number portability1
Mobile number portability1
 
MOBILE NUMBER PORTABILITY
MOBILE NUMBER PORTABILITYMOBILE NUMBER PORTABILITY
MOBILE NUMBER PORTABILITY
 
Mobile number portability with IEEE Material
Mobile number portability with IEEE MaterialMobile number portability with IEEE Material
Mobile number portability with IEEE Material
 
Mobile number portability
Mobile number portabilityMobile number portability
Mobile number portability
 
mahimappt-170222161714.pdf
mahimappt-170222161714.pdfmahimappt-170222161714.pdf
mahimappt-170222161714.pdf
 
MOBILE NUMBER PORTABILITY--MNP
MOBILE NUMBER PORTABILITY--MNPMOBILE NUMBER PORTABILITY--MNP
MOBILE NUMBER PORTABILITY--MNP
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
mobile-number-portability
mobile-number-portabilitymobile-number-portability
mobile-number-portability
 
In
InIn
In
 
Mobile Number Portability.pptx
Mobile Number Portability.pptxMobile Number Portability.pptx
Mobile Number Portability.pptx
 
A01230105
A01230105A01230105
A01230105
 
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
Handoff Management protocols MIPV6 and HMIPV6 Comparative analysis in 4G wire...
 
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
 
Aaa
AaaAaa
Aaa
 
Mobile number-portability
Mobile number-portabilityMobile number-portability
Mobile number-portability
 
Intelligent Networks
Intelligent NetworksIntelligent Networks
Intelligent Networks
 
Ngn
NgnNgn
Ngn
 
Segregtion of telecom network operation and service provision
Segregtion of telecom network operation and service provisionSegregtion of telecom network operation and service provision
Segregtion of telecom network operation and service provision
 
Ain overview
Ain overviewAin overview
Ain overview
 

Mais de IJCNCJournal

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 

Mais de IJCNCJournal (20)

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 

Último

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

A comparative analysis of number portability routing schemes

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 DOI : 10.5121/ijcnc.2014.6204 39 A COMPARATIVE ANALYSIS OF NUMBER PORTABILITY ROUTING SCHEMES Suman Deswal , Anita Singhrova Computer Science and Engg. Deptt., DCRUST, Murthal. ABSTRACT To reap the benefits of liberalized telecom market, the implementation of number portability (NP) is utmost important. NP allows end user to retain their telephone number in case of change of geographical location or service type or service provider. This paper describes the various number portability routing schemes namely, All Call Query, Query on Release, Call Dropback and Onward routing. The comparative analysis between these routing schemes on various parameters is presented here. The issues pertaining to NP have also been described. KEYWORDS Number portability, Query on Release, All Call Query, Call Dropback, Onward routing. 1. INTRODUCTION Number portability (NP) is a circuit-switch telecommunications network feature that enables end users to retain their telephone numbers when changing service providers, service types and geographical locations. Earlier, in absence of NP, customers had to change their numbers with change of service provider, service types or geographic locations. The paradigm shift to a “consumer-centric” number ownership model, rather than the “carrier-centric” number ownership model has resulted in number portability. Number Portability is beneficial to the user as it does not require the need of informing others of number change and it has increased the competition in the telecommunication market which has resulted in lower prices and greater customer satisfaction. Further, once implemented by all the wireline and wireless service providers, it will significantly reduce the switching cost for customers. 1.1 Types of Number Portability Three types of number portability have been identified. a) Service provider portability: It is the ability of users of telecommunications services to retain, at the same location, existing telecommunications numbers without impairment of quality, reliability, or convenience when switching from one telecommunications carrier to another. b) Location Portability: It is the ability of users of telecommunications services to retain existing directory numbers without impairment of quality, reliability, or convenience when moving from one physical location to another.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 40 c) Service Portability: It is the ability of users of telecommunications services to retain existing directory numbers without impairment of quality, reliability, or convenience when switching from one service to another service provided by the same carrier. For example from mobile to fixed and from fixed to mobile. Since there are multiple service providers now a days at the same geographical location, this paper discusses service provider portability in detail. 1.2 Call routing process: The call routing process is dependent upon the service provider of both, the host and the destination nodes. Before discussing the call routing process let us define some terms used in the paper: • Serving Network: The serving network is the network that served the number before it was ported to the new serving network. • Recipient Network: A recipient network is a network that a subscriber’s number is ported to when the subscriber switches the service provider. • Donor Network: It is a network that user subscribed to initially. Since a subscriber can switch service provider any number of times, the old service provider is not necessarily the same as the donor network. There can be two different cases for call routing: (i) The host and destination are in the same service provider network: Since host and destination are in same service provider network so the call is directly routed by the serving exchange in the serving network as shown in Figure 1.. Figure 1. Call routing process in same network (ii) The host and destination are in the different service provider network: When host and destination nodes are in different networks then (1) host makes a call to the serving network and then (2) the serving network provides information to route to a database(within the recipient network or which is accessed by the recipient network) which provides the subsequent routing information to be used by recipient exchange ,(3) to connect to customer’s interface as shown in Figure 2. The remainder of this paper is structured as follows: Section II summarizes work related to number portability. Section III discusses various service provider number portability schemes. Comparative analysis for various number portability routing schemes is presented in section IV. Main issues related to number portability are presented in section V followed by conclusion in section VI.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 41 Figure 2. Call routing process in different networks 2. LITERATURE SURVEY In [1] authors describe the impact of Mobile number portability (MNP) on mobile telephony retail prices using international time-series cross-section data. The results indicate that average prices are reduced when the switching process is rapid. In [2] the author discusses that Mobile customers want to switch operators in return for better quality of service and/or call rates, are benefited by the MNP facility as they do not incur costs to update their networks about a number change. The importance of having a dynamic market and as many willing operators as possible is presented in [3]. This will help regulators to work with a group of determined individuals ideally pushing for the facility. In [4] the author argues that the introduction of MNP generates various competitive effects that are of potential interest to regulatory authorities. It provides an analytical framework for studying the economic costs associated with a reduction in tariff transparency that may result if the prefix of a mobile telephone number no longer indicates its network assignment. The introduction of mobile number portability divides the mobile operators into two groups as the new mobile operators are benefitted and the old ones loose. Effects on mobile customers are also ambiguous [4]. The necessity of mobile number portability into the developing telecom markets of South Asia has been explored in [5]. In [6] the authors study that MNP has a positive effect on customers because in order to retain customers, the service providers give more beneficial schemes to customers. The only thing that needs attention is the time and cost for switching. 3. TYPES OF CALL ROUTING SCHEMES When the destination node moves to a new service provider network, the call can be routed using different ways. The database of ported number is NPDB (Number Portability Database ). The NPDB provides the LNP (Local Number Portability) association between the called party and the carrier RN (Routing Number), identifying the switch to which the call should be routed. NPDB is maintained using either centralized or distributed approach [7,8]. (i) Centralized approach In centralized approach, there is a centralized database. All service providers have a well defined interaction with the centralized database administrator for processing the request for porting a number. There is no direct interface between two service providers. Any porting request is processed by the administrator, which after taking clearance from the current service provider broadcasts the porting information to all the service providers. (ii) Distributed Approach
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 42 In distributed approach, there is a direct interfacing between two service providers. One service provider can have interfacing with many other service providers. Therefore, this has the disadvantage of becoming complex as the number of service providers in a country increases. The different schemes for routing of ported numbers are explained below: a. All Call query (ACQ) Upon receiving a call, the originating network sends a query to a centrally administered NPDB. It returns a Routing Number (RN) associated with the dialled number. The RN number is used by the originating network to route the call to the recipient network. This is also called direct routing [8]. The flow of call routing is shown in Figure. 3. Originating n/w Is RN avail able ? Call transferred to recipient n/w by originating n/w Search NPDB call No Yes RN Figure 3. Flow chart for ACQ b. Query on release (QoR) The originating network sends the call to the donor network. It then detects that the called number has been ported out to another network. It thereafter releases the call with a special indication telling that called number is ported out. The originating network then sends a query to its own Number Portability Database (NPDB). The NPDB returns the routing number (RN) associated with the dialled number. The originating number then routes the call to the new servicing network[8]. The flow of call routing is shown in Figure 4. c. Onward Routing The originating network sends the call to the donor network. The donor network checks the Number Portability Database (NPDB) and finds that the number has moved out of donor switch. The donor network makes a query to NPDB. NPDB returns the routing number associated with the dialled number. The donor network uses the routing number to forward the call to new network[8]. This is also called call forwarding and is shown in Figure 5.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 43 Originating n/w Is RN avail able ? Is no. in donor ? NPDB Call transferred to recipient n/w by originating n/w Call Yes No No Yes RN Figure 4. Flow chart for QoR Originating n/w RN avail able ? Call transferred to recipient n/w by originating n/w Query donor n/w Search donor internal DB call Yes No RN Figure 5. Flow chart for Onward Routing d. Call Dropback The originating network sends the call to the donor network. The donor network checks its internal database. On non availability of the number, the donor network makes a query to NPDB and finds the routing number associated with the dialled number. It returns the routing number to the originating network. The originating network then routes the call to the new servicing network using the routing number as shown in Figure 6 [9].
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 44 Originating n/w Is RN avail able ? Call transferred to recipient n/w by donor n/w Query donor n/w Search donor internal DB Call Yes No RN Figure 6. Flow chart for Call Dropback 4. ISSUES RELATED TO NUMBER PORTABILITY 4.1 Porting time Porting time is the time needed to port a number from one subscriber to another. It should be as minimum as possible because if the porting time increases there is a tendency to refrain from porting. 4.2 Cost Setup cost: It leads to increase in cost for the service providers which includes the cost of additional infrastructure, both hardware and software, required to enable appropriate rerouting of calls made to subscribers who have switched networks. Operational cost: The operators also need to invest in the setting up of Number Portability database either centrally administered or operator specific. This includes the initial cost of development and an ongoing cost of operation and maintenance. Administrative cost: The administrative process of porting a number involves cost for the recipient network operator, donor network operator and the operator of a number database. All these can pass on the administrative cost to the user requesting the port. The switching of identity also causes significant costs to users as mobile number is used as an identifier for many applications on mobile [10]. These prices should be regulated to ensure that the subscribers are not overcharged. 4.3 Data transmission For ported number, the data transmission in case of SMS and MMS poses greater challenge as both the sender and the receiver may be unaware of the loss of data. Therefore, messaging requires urgent attention when the number has been ported to a new service provider.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 45 5. COMPARISON OF ROUTING SCHEMES Table 1. Comparative Analysis of call routing Schemes Parameters ACQ QoR Call Dropback Onward NPDB searched originating n/w searches centralized NPDB once originating n/w searches centralized NPDB once Donor n/w searches its internal database once Donor n/w searches its internal database once Search Complexity for routing number(RN) Less (makes a direct query to NPDB for RN) More (makes a query to donor n/w prior to NPDB for RN) Less(donor n/w makes a query to its internal database) less(donor n/w makes a query to its internal database) Efficiency in terms of network resources used High(does not involve donor n/w to route a call to recipient n/w) Less(involves both donor n/w & centralized NPDB) Less(donor n/w sends the RN to originating n/w which then forwards the call to recipient n/w) Moderate(donor n/w forwards the call to recipient n/w) Dedicated signalled circuit b/w originating n/w and donor n/w No( no donor n/w) Yes(donor n/w replies back to the originating n/w) Yes(donor n/w replies back to the originating n/w) No (call is forwarded directly to recipient n/w by the donor n/w) Call routing Cost Low High High Moderate Acceptance of government regulations by Service provider Yes Yes Yes Yes Maintenance of portability information by donor n/w Not required Not required Required Required Increase in Network traffic per call Low High High Moderate Approach for Database maintenance Centralized Centralized Distributed Distributed
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 46 Table 1 shows the comparison of different call routing schemes. By virtue of their implementations various routing schemes exhibit different behaviour for different parameters. Routing of a call is done directly from originating n/w to the correct recipient n/w in ACQ by deriving RN from NPDB whereas all other routing schemes require donor n/w to determine RN. This involvement of donor n/w in QoR, Call Dropback and Onward routing increases search complexity, cost and reduces efficiency. Dedicated signalled circuit is required between originating n/w and donor n/w in QoR and Call Dropback as call is made by originating n/w after receiving RN. To and fro movement of RN increases network traffic per call in case of QoR and Call Dropback. ACQ is best suited in terms of cost whereas Onward routing is the simplest routing method to implement. The costs and complexity associated with the other two methods lie between those of all call query and onward routing. 6. CONCLUSION The increased usage of mobile phones by the users has led to the implementation of mobile number portability. This will not only allow the users to change the location/service provider without changing their number but would also enforce the healthy competition amongst the service providers. As the service providers would be desperate to retain their high revenue customers, they would reduce overall cost, improve QoS and provide add on services in addition. This paper discusses the various routing schemes in detail. Thorough comparison carried out on various parameters such as cost, complexity, search time etc. on all the routing schemes revealed that ACQ is best suited in terms of cost Whereas Onward routing is the simplest routing method to implement. The costs and complexity associated with the other two methods lie between those of all call query and onward routing. REFERENCES [1] Sean Lyons,(2010) “Measuring the effects of mobile number portability on service prices” Journal of Telecommunications Management, Vol. 2, No.4, pp. 357 – 368. [2] Buehler, S., Dewenter, R. and Haucap, J, (2006) “Mobile Number Portability in Europe” Telecommunications Policy, Vol. 30, No. 7, pp. 385-399. [3] Gans, J.S. and S.P. King (2000), “Mobile network competition, customer ignorance and fixed-to- mobile call prices, Information Economics and Policy”, Elsevier, Vol. 12, No.4, pp. 301-327. [4] Stefan Buehler, Justus Haucap (2004), “Mobile Number Portability”, Journal of Industry, Competition, and Trade, Vol. 4, No. 3, pp. 223-238. [5] Tahani Iqbal (2011), “Mobile Number Portability in South Asia”, Proceedings of the 5th ACORN- REDECOM Conference. Lima. [6] Sanjeet Singh, Gagan Deep Sharma, Gurbhej Singh (2011), “Customer Perception and Expectation of Mobile Number Portability”, e-Journal on Telecommunications and Regulated Industries, doi:10.2139/ssrn.1852019. [7] Atiya Faiz Khan (2010), “Mobile Number Portability: Challenges and solutions”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 2. [8] Sánchez, B. U., and Asimakopoulos, G. (2012),” Regulation and competition in the European mobile communications industry: An examination of the implementation of mobile number portability” telecommunication policy , Elsevier, Vol. 36, No. 3, pp. 187-196.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.2, March 2014 47 [9] A.Gallant (2000), “The Number Portability Supplement to ITU-T Recommendation E.164”, <draft- ietf-enum-e164s2-np-00.txt>. [10] Cho, D., Ferreira, P., & Telang, R. (2012), “ The impact of Mobile Number Portability on Switching cost and Pricing Strategy”. Paper presented at the 40th Research Conference on Communication, Information and Internet Policy, Arlington, VA. Suman Deswal, Assistant professor, Dept. of Computer Science and Engg., DCR University of Science and Technology, Sonepat, India. Suman Deswal has completed her M.Tech (Computer Science and engineering) from Kurukshetra University, Kurukshetra, India and B.Tech (Computer Science & Engineering) from DCRUST, Murthal, India (erstwhile CRSCE Murthal) in 2009 and 1998 respectively. Currently, She is enrolled for Ph.D. and working on mobility in Heterogeneous Networks. She has 13 years of teaching experience. Her research areas include Mobile computing and heterogeneous networks. She has contributed in various research papers in various National and International journals. Anita Singhrova, Professor, Dept. of Computer Science and Engg., DCR University of Science and Technology, Sonepat, India. She holds a Ph.D degree from GGS Indraprastha University, Delhi, India. She has completed M.E (Computer Science & Engg.) from Punjab Engineering College, Chandigarh, India and B.Tech(Computer Science) from T.I.T&S, Bhiwani, India 2006 and 1993 respectively. She has also been certified as Java Programmer by Sun Microsystems. She possesses seventeen years of teaching experience and is presently working as Professor in the department of Computer Science and Engg. at DCR University of Science and Technology, Sonepat, India. Her research interests include network security, Mobile computing and heterogeneous networks. She has contributed in various research papers and articles in various National and International journals and conferences.