SlideShare uma empresa Scribd logo
1 de 7
lobal Software Group              LLC




                 No Country for Old Networks -
                    Consumers Drive Network Change
                                       White Paper
                                      February 2009

                                   Stephen Chen, Partner




Global Software Group LLC
21218 Saint Andrews Blvd, #750
Boca Raton, FL 33433
+1-877-GSG-4450
www.globalsoftwaregroupllc.com


© 2009 Global Software Group LLC
No Country for Old Networks                                                                       2


Introduction
Today’s mobile networks have been and continue to be built around the network model of a subscriber,
an abstract entity that subscribes to network services from the network operator. With a subscriber,
once service options are selected, they are difficult to change and cannot be selected on a per usage
basis. In contrast, internet content and applications providers have introduced a “MY” service option to
the web experience. Here, a consumer can select from a wide variety of options and can dynamically
change as often as desired. On handsets, consumers warmly embraced the intuitive touch screen
interface made popular by Apple’s iPhone and the new Google Android phones. The combination of a
“myWeb” and a touch screen experience has created a new paradigm in terms of expectations for the
mobile device. As a result, significant pressure has been placed on incumbent service providers and
mobile device manufacturers to make such interfaces standard. Implicit in this expectation is a need for
operators and manufacturers to “open up” their offerings to permit a greater array of services, features,
and applications. Moreover, as “over the top” operators (those firms offering services directly to the
consumer) proliferate, and unregulated wireless broadband services become available, the pressure to
change is impossible to ignore.
In this paper, we present the case for a “consumer-centric” network model that allows both traditional
and new operators to survive and potentially flourish. A new architectural layer, Consumer-centric
Services, is proposed to provide functions that can be delivered through a variety of access networks. At
the core of our argument is a need for all major stakeholders, including network operators, applications
and content providers, and device manufacturers, to proactively pursue standards for APIs and metadata.
This will enable the sharing of consumer-centric information and provide consumers with the tools to
manage a personalized experience. The winners will be those offering the most choices with the highest
“bang for the buck”.

Subscriber -centric Networks
Traditional mobile network operators typically offer a small fixed set of services from which the subscriber
picks during an enrollment process. Although some changes may be made subsequently, these initial
choices remain until the subscriber cancels service. In order to attract customers, mobile operators
constantly offer promotions either in the form of a discounted mobile device or a low-cost services
contract. Not surprisingly, when the contract expires, subscribers do not renew but shop for the latest
attractive promotion often from a competitor. Since existing subscribers are not given much choice or
flexibility in services, there is little incentive to stay with the same operator. One of our hypotheses is
that “stickiness” can be created if a compelling and personalizable set of services were offered.

In a direct challenge to the subscriber-centric model, “over-the-top” service providers are creating a
distinction between service provider and network operator, where, in the days of voice and limited data
communications, these terms were synonymous [Reedy, 2008]. These new operators include mobile
device manufacturers (e.g. Apple’s iPhone, RIM’s Blackberry, and Google’s Android) and portal operators
(e.g. Yahoo, Google, and AOL). It is noteworthy that the user interface offered by these companies
provides the “stickiness” that has eluded the network operators. Moreover, the consumer regards the
application and not the service plan as driving his/her choice of provider.

The subscriber-centric network model is slowly devolving and the operators’ traditional “walled gardens”,
where only services and applications “certified” by the operator are available, are crumbling. Momentum
is shifting towards a Consumer-centric network model where the consumer selects and often defines the
services he/she wants. Table 1 offers a high-level view of differences between the two network models.

Characteristics              Subscriber-centric Networks          Consumer-centric Networks
User Experience              Operator defined                     Consumer defined
QoS, Security, Privacy       Fixed by operator                    Consumer chooses



January 2009                                                           © 2009 Global Software Group LLC
No Country for Old Networks                                                                       3


Billing Method               Static, once chosen by consumer      Consumer chooses based on
                                                                  application
Content                      Operator controlled                  Consumer chooses
Network Agreements           Operator roaming agreements          Consumer chooses based on location,
                                                                  context
Calling Networks             “Friends” on the same network        Social network independent of
                                                                  operator
Applications                 Operator controlled                  Consumer chooses

                             Table 1 – Subscriber/Consumer-centric Networks

The key observation from the table is the amount of control the consumer has in determining service
parameters. The challenges for service providers center on how to provision and deliver “mass
customization”. The popular “MyWebPage” offered by many web portals (eg. Yahoo, AOL), content
providers (e.g. Wall Street Journal Online, MySpace, Flckr) and Application Providers (e.g. Mapquest,
GoogleOffice), are raising expectations that the mobile internet should also be personalizable in a similar
way.


Subscriber-centric networks are often deployed using a Service Delivery Platform (SDP) as shown in
Figure 1. This platform consists of Operations Systems and a Core Infrastructure to provide such
functions as fault tolerance, database management, infrastructure tools, network monitoring, network
services for voice calling, storage, an execution environment, and security. These functions are typically
provided to application developers through standard APIs or a web services interface.




                          Figure 1 – Subscriber-centric Service Delivery Platform


Most application service/content providers who have developed services find working with the operators’
SDPs to be a difficult and expensive process. Development kits, simulators, testing systems vary in
quality and are often very complicated to use. The business models are heavily weighted towards the



January 2009                                                            © 2009 Global Software Group LLC
No Country for Old Networks                                                                     4


operators (typically, 20-60% of revenues flow to the developers). Small wonder that the number of
applications delivered by the operators has failed to meet expectations.

Consumer-centric Networks
Consumer-centric networks require a significant paradigm shift in how services are delivered to
consumers. New service providers offer services directly to consumers with or without “permission” of
the network operators. These so-called “over-the-top” operators deliver their services through a mobile
or web portal. Hence, the browser on the mobile device directly interfaces to these applications. Yahoo
and Google Mobile are examples of such services. Often, these services are delivered via SMS text
messaging since many consumers do not have smart phones or phones with browsers.




                         Figure 2 – Consumer-centric Service Delivery Platform

Figure 2 proposes an augmented view of an SDP for Consumer-centric Networks. In this case, a layer
has been added to allow consumers to manage policies, content, context and information. Clearly, much
of this data needs to be persistent and any implementation will require an architecture that optimizes
data stores across mobile devices, personal gateways, network gateways, and service provider storage.
The proposed Consumer-centric Services layer provides a set of common core functions for both
applications and content providers.

               Consumer Policy Management includes components for managing personalized policies
           •
               (e.g. Opt in/opt out choices and QoS for each service, access to personal content, social
               network access privileges), ad engines, preference engines, and local search engines. A




January 2009                                                         © 2009 Global Software Group LLC
No Country for Old Networks                                                                         5


                particularly difficult challenge in policy management is the issue of identity, privacy, and
                security.
                Consumer Content Management includes components for content upload/download
            •
                across device domains, synchronization engines, content dispatchers, interfaces to social
                networking sites for content updates, and playlist managers.
                Consumer Context and Information Management components for gathering usage
            •
                information, a dashboard collector and information manager, recommendation engines,
                context aggregators and rules engines, and consumer backup storage.

Clearly, the functions described above are a first approximation of what is required. Detailed analysis
and design will likely result in modified and additional functionality. Moreover, as personalized services
become commercially available, standards and de facto interfaces will emerge. The determination of
where in the end-to-end ecosystem, components of the Consumer-centric Services layer reside is a
challenging and poorly understood problem. Device manufacturers will be incented to provide as much
of the functionality in the device as possible. Similarly, the network operators will try to offer these
services through the network, and applications and content providers will attempt to keep key
information on their private data stores. Indeed, Amazon, Google and Yahoo are prominent players in
this space today and have written components to provide many of the functions listed in our Consumer-
centric Services layer for their respective applications. The mobile operators are protective of their
franchise and in addition to certifying all applications, require that all services billing be done by them.
This is obviously a key control point. In partnership with the operators, Apple, Nokia and RIM offer
server-based applications with recurring revenue streams.

Currently, there are no widely available devices for consumers to manage their own services. Some of
the entertainment gateways and IPTV systems provide modest control over cable offerings. Home
networking systems that allow computers and peripherals to communicate are available. Finally,
specialized equipment to allow VoIP, landline, and cellular services to be selected based on least-cost
routing is being introduced into the enterprise and home markets. However, all these systems are
“stand-alone” and are not integrated into a consumer-centric personal network.

We finally note that at the heart of a consumer-centric SDP is an open platform. If a true ecosystem is to
exist for delivering personalized services, device manufacturers, mobile network operators, and
applications and content providers will need to agree to a set of standard APIs and protocols to share
information across domains. Additionally, in order to spur third party development and innovation, the
platforms must provide development kits, simulators, and testing environments, all built using open
standards and interfaces. Although standards are emerging for SDPs (e.g. Parlay and XML), adoption has
been slow and the operators’ commitment to IMS is problematical [Wsky, 2005]. The danger of moving
too slowly in adopting open standards has claimed Microsoft as a victim and more nimble players, such as
Jamcracker, are succeeding in the SDP space [Lght, 2008].

Consumer-centric Networks - Opportunities
Mobile Network Operators
The current environment represents significant challenges for the incumbent mobile operators.
Consumers, given more choices, are no longer reluctant to change carriers as soon as their contracts are
due for renewal. The high churn experienced by AT&T’s competitors when the iPhone was introduced is
a harbinger of what has become common. Consumer loyalty can no longer be taken for granted.

Assuming they can make the transition to a customer-centric network, a potential benefit to the
operators is the growth of a large and profitable applications services business. Their stated fear is to
avoid becoming “dumb pipe” providers. Hence, they face a dilemma of how to deliver value over and
above the provision of network transport services. As opposed to a “one-stop shop”, there are certain



January 2009                                                             © 2009 Global Software Group LLC
No Country for Old Networks                                                                     6


services that can be offered naturally by them. These include billing, federated identity, security,
bandwidth on demand, digital rights management for copyrighted content, and contextual data (e.g.
location and presence). Under this scenario, the operators will need to provide open interfaces to these
capabilities and offer flexible, compelling and easy-to-use development and testing environments.

Application Service/Content Providers
Amazon, MySpace, Facebook, Apple, Yahoo, and Google, among many others, provide open and flexible
development environments for third party applications developers. Microsoft has its own proprietary
environment but because of its market power, .NET is a de facto standard, at least, in the enterprise.
Operating mainly as “over-the-top” providers, these firms interact directly with consumers through the
mobile device. However, depending on customized client software, the user experience varies widely
depending on the device. Apple’s iPhone and Google’s Android phones represent the current high end,
whereas applications built on SMS are at the other end of the spectrum.
Among the key opportunities for applications and content providers is designing an open architecture to
allow consumers to manage and distribute content and metadata across providers. Several firms such as
ShoZu (social networking) and Nero (digital media) aggregate web sites and content, respectively, and
provide it directly to consumers. However, their protocols are proprietary and closed. Similarly, Apple,
Nokia, and Microsoft offer published interfaces that are proprietary. Google’s Android is one of the first
open development ecosystems for mobile devices.
A controversial but powerful technology has been employed by many content providers to perform file
sharing. Peer to peer (P2P) protocols such as BitTorrent, eDonkey, and Skype are being used to harness
the power of computing and communications devices to decentralize the transmission of large data files
and to share bandwidth and computing power. Currently, P2P traffic is second only to video streaming in
terms of overall internet usage [Odly, 2008]. The promise offered by P2P is that applications can
communicate directly with other peer devices and avoid a centralized server. eBay exemplifies this usage
by bringing buyers and sellers together using their Skype technology.
What is needed, of course, is a set of metadata standards that define how content and information can
be exchanged between applications providers, device manufacturers, and network operators. Lacking
such standards, the current and near-term approach is to provide the “transcoding” explicitly using
customized devices and software.

Device Manufacturers
Since the mobile phone has become a powerful computing and communications device, manufacturers
have been competing in a “features” war. The mobile phone is no longer just a phone. It is a camera,
music player, FM radio, TV screen, transcription device, messaging and emailing device, navigation and
gaming device, and web browser. Soon it will be a projector and remote control for home security and
entertainment systems. The addition of these capabilities significantly increases the complexity of the
hardware and especially, the software in the device. Moreover, service provisioning, over-the-air
updates, and remote maintenance become increasingly critical functions. Security is also an issue with
several high profile “hacks” into devices owned by celebrities. Given these trends, device manufacturers
face enormous challenges but also can enjoy potentially huge opportunities to provide rich user
experiences. In order to deliver on this promise, several key changes need to be made. They include:
    •   Greater access to the mobile device’s functionality
    •   Standard interfaces to mobile and internet devices from different manufacturers
    •   Standard APIs to be used by third party developers and providers
    •   Allowance for “thin” clients where processor=intensive applications (e.g. graphics and video
        encoding) can be off-loaded to a server and only rendering activity occurs on the device




January 2009                                                          © 2009 Global Software Group LLC
No Country for Old Networks                                                                       7


Conclusion
The decades-long promise of communications and computing convergence is upon us but not in the way
that the original forecasters predicted. At the time, technology futurists believed that telephone networks
and computing would combine into a wired superstructure where supercomputers and superswitches
would dominate. Few envisioned the rise of wireless and fewer foresaw that it would overtake wired
communications as the most prevalent form of telecommunications in the world. With the advent of true
broadband wireless, convergence may be at hand.
However, in order to realize this attractive vision, significant changes in how networks deliver services to
consumers are required. In this paper, we have argued for Consumer-centric Networks which place the
consumer, and not the subscriber, in the middle. A proposal for a new layer in the Service Delivery
Platform is presented. This layer will necessitate proactive participation by network operators, application
and content providers, and device manufacturers for definition and implementation. Openness and a
common vision are characteristics of this new ecosystem and success will come to those who embrace
these concepts.



Acknowledgements
The author is grateful for the insightful comments and suggestions made by Drs. John Waclawsky and
Jacques Meekel.

References

[Reedy, 2008] Reedy, Sarah, “Telephony Live: Redefining Tomorrow’s Service Provider”, Telephony
Online, 9/30/2008, http://telephonyonline.com/wireless/news/service-providers-0930/

[Wsky, 2005] Waclawsky, John G., “IMS 101: What You Need to Know Now”, Business
Communications Review, June, 2005, pp 18-23

[Lght, 2008]    Light Reading, “Microsoft Kills its SDP”, 12/2/2008,
http://www.lightreading.com/document.asp?doc_id=168726

[Odly, 2008]   Odlyko, Andrew, Minnesota Internet Traffic Studies (MINTS),
http://www.dtc.umn.edu/mints/home.php




January 2009                                                           © 2009 Global Software Group LLC

Mais conteúdo relacionado

Mais procurados

Taking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadTaking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadVideoBeet.TV
 
Managing Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLanManaging Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLanGreen Packet
 
La convergence fixe/mobile au coeur des communications unifiees
La convergence fixe/mobile au coeur des communications unifieesLa convergence fixe/mobile au coeur des communications unifiees
La convergence fixe/mobile au coeur des communications unifieesJavier Sanz-Blasco
 
Positioning WiMAX As The Personal Broadband Technology
Positioning WiMAX As The Personal Broadband TechnologyPositioning WiMAX As The Personal Broadband Technology
Positioning WiMAX As The Personal Broadband TechnologyGreen Packet
 
What WiFi Offload Don't Reveal
What WiFi Offload Don't RevealWhat WiFi Offload Don't Reveal
What WiFi Offload Don't RevealGreen Packet
 
towards flexible mobile payment via mediator-based service model
towards flexible mobile payment via mediator-based service modeltowards flexible mobile payment via mediator-based service model
towards flexible mobile payment via mediator-based service modelBoni
 
Maximizing your vas services with mobile marketing
Maximizing your vas services with mobile marketing Maximizing your vas services with mobile marketing
Maximizing your vas services with mobile marketing BSP Media Group
 
4 g mobilecommunications
4 g mobilecommunications4 g mobilecommunications
4 g mobilecommunicationsjsharath
 
Mobile Network Capacity Issues
Mobile Network Capacity IssuesMobile Network Capacity Issues
Mobile Network Capacity IssuesPhilip Corsano
 
Managing data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlanManaging data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlanJustus @GreenPacket
 
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 Wi-Fi Offload Authentication & Security through EAP based approach - White P... Wi-Fi Offload Authentication & Security through EAP based approach - White P...
Wi-Fi Offload Authentication & Security through EAP based approach - White P...Green Packet
 
Evaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldEvaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldGENBANDcorporate
 
Idc consumers and cloud services
Idc consumers and cloud servicesIdc consumers and cloud services
Idc consumers and cloud servicesthriceBOX
 
Shahriar Khaled 062473056
Shahriar Khaled 062473056Shahriar Khaled 062473056
Shahriar Khaled 062473056mashiur
 
חברות ישראליות בברצלונה 2010
חברות ישראליות בברצלונה 2010חברות ישראליות בברצלונה 2010
חברות ישראליות בברצלונה 2010Elad Cohen
 

Mais procurados (20)

B plan ssm_2012
B plan ssm_2012B plan ssm_2012
B plan ssm_2012
 
Taking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond OffloadTaking Wi-Fi Beyond Offload
Taking Wi-Fi Beyond Offload
 
Managing Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLanManaging Data Offloading Securely Over WLan Access Networks With I-WLan
Managing Data Offloading Securely Over WLan Access Networks With I-WLan
 
La convergence fixe/mobile au coeur des communications unifiees
La convergence fixe/mobile au coeur des communications unifieesLa convergence fixe/mobile au coeur des communications unifiees
La convergence fixe/mobile au coeur des communications unifiees
 
Positioning WiMAX As The Personal Broadband Technology
Positioning WiMAX As The Personal Broadband TechnologyPositioning WiMAX As The Personal Broadband Technology
Positioning WiMAX As The Personal Broadband Technology
 
What WiFi Offload Don't Reveal
What WiFi Offload Don't RevealWhat WiFi Offload Don't Reveal
What WiFi Offload Don't Reveal
 
Vodafone ar business
Vodafone ar businessVodafone ar business
Vodafone ar business
 
WiFi data offloading whitepaper
WiFi data offloading whitepaperWiFi data offloading whitepaper
WiFi data offloading whitepaper
 
towards flexible mobile payment via mediator-based service model
towards flexible mobile payment via mediator-based service modeltowards flexible mobile payment via mediator-based service model
towards flexible mobile payment via mediator-based service model
 
Maximizing your vas services with mobile marketing
Maximizing your vas services with mobile marketing Maximizing your vas services with mobile marketing
Maximizing your vas services with mobile marketing
 
Securewify - Eximuis 2015
Securewify - Eximuis 2015Securewify - Eximuis 2015
Securewify - Eximuis 2015
 
4 g mobilecommunications
4 g mobilecommunications4 g mobilecommunications
4 g mobilecommunications
 
Mobile Network Capacity Issues
Mobile Network Capacity IssuesMobile Network Capacity Issues
Mobile Network Capacity Issues
 
Managing data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlanManaging data offload over wlan access networks with iwlan
Managing data offload over wlan access networks with iwlan
 
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 Wi-Fi Offload Authentication & Security through EAP based approach - White P... Wi-Fi Offload Authentication & Security through EAP based approach - White P...
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 
Evaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP WorldEvaluating Monetization Strategies in an All IP World
Evaluating Monetization Strategies in an All IP World
 
Idc consumers and cloud services
Idc consumers and cloud servicesIdc consumers and cloud services
Idc consumers and cloud services
 
Shahriar Khaled 062473056
Shahriar Khaled 062473056Shahriar Khaled 062473056
Shahriar Khaled 062473056
 
חברות ישראליות בברצלונה 2010
חברות ישראליות בברצלונה 2010חברות ישראליות בברצלונה 2010
חברות ישראליות בברצלונה 2010
 
Pimrc 2010 sniri
Pimrc 2010 sniriPimrc 2010 sniri
Pimrc 2010 sniri
 

Destaque

Psali jste Ježíškovi...
Psali jste Ježíškovi...Psali jste Ježíškovi...
Psali jste Ježíškovi...prosebe.cz
 
Předhonil slovenský tygr českého lva?
Předhonil slovenský tygr českého lva?Předhonil slovenský tygr českého lva?
Předhonil slovenský tygr českého lva?prosebe.cz
 
České Vánoce
České VánoceČeské Vánoce
České Vánoceprosebe.cz
 
Entrepreneurship & Innovation 2006 -Agenda & Planner
Entrepreneurship & Innovation 2006 -Agenda & PlannerEntrepreneurship & Innovation 2006 -Agenda & Planner
Entrepreneurship & Innovation 2006 -Agenda & PlannerArturo Pelayo
 
조정원 Portfolio
조정원 Portfolio조정원 Portfolio
조정원 PortfolioChoJungWon
 

Destaque (8)

Psali jste Ježíškovi...
Psali jste Ježíškovi...Psali jste Ježíškovi...
Psali jste Ježíškovi...
 
Předhonil slovenský tygr českého lva?
Předhonil slovenský tygr českého lva?Předhonil slovenský tygr českého lva?
Předhonil slovenský tygr českého lva?
 
A4e
A4eA4e
A4e
 
A4e Brief Presentation
A4e   Brief PresentationA4e   Brief Presentation
A4e Brief Presentation
 
České Vánoce
České VánoceČeské Vánoce
České Vánoce
 
Entrepreneurship & Innovation 2006 -Agenda & Planner
Entrepreneurship & Innovation 2006 -Agenda & PlannerEntrepreneurship & Innovation 2006 -Agenda & Planner
Entrepreneurship & Innovation 2006 -Agenda & Planner
 
Who is a Mexican?
Who is a Mexican?Who is a Mexican?
Who is a Mexican?
 
조정원 Portfolio
조정원 Portfolio조정원 Portfolio
조정원 Portfolio
 

Semelhante a No Country for Old Networks

Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3Justus @GreenPacket
 
The case for application specific qos
The case for application specific qosThe case for application specific qos
The case for application specific qosIPeak Networks
 
Wi-Fi New Service Models For Next Generation Networks
Wi-Fi New Service Models For Next Generation NetworksWi-Fi New Service Models For Next Generation Networks
Wi-Fi New Service Models For Next Generation NetworksGreen Packet
 
Hotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesHotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesDr. Mazlan Abbas
 
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...accenture
 
Whitepaper: From LTE Network Launch to Monetization
Whitepaper: From LTE Network Launch to MonetizationWhitepaper: From LTE Network Launch to Monetization
Whitepaper: From LTE Network Launch to MonetizationBroadSoft
 
Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Justus @GreenPacket
 
Mobile Data Revolution
Mobile Data RevolutionMobile Data Revolution
Mobile Data RevolutionZiv Baum
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1Roger Snook
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication ServicesChetan Kumar S
 
Ericsson, programmable networks
Ericsson, programmable networksEricsson, programmable networks
Ericsson, programmable networksSalman Ali
 
Mobile Performance Testing Approaches and Challenges
Mobile Performance Testing Approaches and ChallengesMobile Performance Testing Approaches and Challenges
Mobile Performance Testing Approaches and ChallengesNous Infosystems
 
Nokia 3g application_aware_ran_whitepaper
Nokia 3g application_aware_ran_whitepaperNokia 3g application_aware_ran_whitepaper
Nokia 3g application_aware_ran_whitepaperbahareh jalali farahani
 

Semelhante a No Country for Old Networks (20)

Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3Data Offload Survival Guide - Part 3
Data Offload Survival Guide - Part 3
 
The case for application specific qos
The case for application specific qosThe case for application specific qos
The case for application specific qos
 
Wi-Fi New Service Models For Next Generation Networks
Wi-Fi New Service Models For Next Generation NetworksWi-Fi New Service Models For Next Generation Networks
Wi-Fi New Service Models For Next Generation Networks
 
Hotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesHotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and Challenges
 
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...
The Challenge of Wi-Fi: Providing a Consistent Customer Experience over Unlic...
 
Whitepaper: From LTE Network Launch to Monetization
Whitepaper: From LTE Network Launch to MonetizationWhitepaper: From LTE Network Launch to Monetization
Whitepaper: From LTE Network Launch to Monetization
 
Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2
 
Roadmap 1 12-02
Roadmap 1 12-02Roadmap 1 12-02
Roadmap 1 12-02
 
Mobile Data Revolution
Mobile Data RevolutionMobile Data Revolution
Mobile Data Revolution
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1IBM Mobile Quality Assurance - Open Beta Study Group Session 1
IBM Mobile Quality Assurance - Open Beta Study Group Session 1
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
PCRF Market Research
PCRF Market ResearchPCRF Market Research
PCRF Market Research
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
 
Bgg Mobile: Top 10 Tech Trends 2014
Bgg Mobile:  Top 10 Tech Trends 2014Bgg Mobile:  Top 10 Tech Trends 2014
Bgg Mobile: Top 10 Tech Trends 2014
 
Ericsson, programmable networks
Ericsson, programmable networksEricsson, programmable networks
Ericsson, programmable networks
 
Mobile Performance Testing Approaches and Challenges
Mobile Performance Testing Approaches and ChallengesMobile Performance Testing Approaches and Challenges
Mobile Performance Testing Approaches and Challenges
 
Smarter Apps for Smarter phones - see me at bit.ly/1ezHj0c
Smarter Apps for Smarter phones - see me at bit.ly/1ezHj0cSmarter Apps for Smarter phones - see me at bit.ly/1ezHj0c
Smarter Apps for Smarter phones - see me at bit.ly/1ezHj0c
 
Nokia 3g application_aware_ran_whitepaper
Nokia 3g application_aware_ran_whitepaperNokia 3g application_aware_ran_whitepaper
Nokia 3g application_aware_ran_whitepaper
 

Último

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Último (20)

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

No Country for Old Networks

  • 1. lobal Software Group LLC No Country for Old Networks - Consumers Drive Network Change White Paper February 2009 Stephen Chen, Partner Global Software Group LLC 21218 Saint Andrews Blvd, #750 Boca Raton, FL 33433 +1-877-GSG-4450 www.globalsoftwaregroupllc.com © 2009 Global Software Group LLC
  • 2. No Country for Old Networks 2 Introduction Today’s mobile networks have been and continue to be built around the network model of a subscriber, an abstract entity that subscribes to network services from the network operator. With a subscriber, once service options are selected, they are difficult to change and cannot be selected on a per usage basis. In contrast, internet content and applications providers have introduced a “MY” service option to the web experience. Here, a consumer can select from a wide variety of options and can dynamically change as often as desired. On handsets, consumers warmly embraced the intuitive touch screen interface made popular by Apple’s iPhone and the new Google Android phones. The combination of a “myWeb” and a touch screen experience has created a new paradigm in terms of expectations for the mobile device. As a result, significant pressure has been placed on incumbent service providers and mobile device manufacturers to make such interfaces standard. Implicit in this expectation is a need for operators and manufacturers to “open up” their offerings to permit a greater array of services, features, and applications. Moreover, as “over the top” operators (those firms offering services directly to the consumer) proliferate, and unregulated wireless broadband services become available, the pressure to change is impossible to ignore. In this paper, we present the case for a “consumer-centric” network model that allows both traditional and new operators to survive and potentially flourish. A new architectural layer, Consumer-centric Services, is proposed to provide functions that can be delivered through a variety of access networks. At the core of our argument is a need for all major stakeholders, including network operators, applications and content providers, and device manufacturers, to proactively pursue standards for APIs and metadata. This will enable the sharing of consumer-centric information and provide consumers with the tools to manage a personalized experience. The winners will be those offering the most choices with the highest “bang for the buck”. Subscriber -centric Networks Traditional mobile network operators typically offer a small fixed set of services from which the subscriber picks during an enrollment process. Although some changes may be made subsequently, these initial choices remain until the subscriber cancels service. In order to attract customers, mobile operators constantly offer promotions either in the form of a discounted mobile device or a low-cost services contract. Not surprisingly, when the contract expires, subscribers do not renew but shop for the latest attractive promotion often from a competitor. Since existing subscribers are not given much choice or flexibility in services, there is little incentive to stay with the same operator. One of our hypotheses is that “stickiness” can be created if a compelling and personalizable set of services were offered. In a direct challenge to the subscriber-centric model, “over-the-top” service providers are creating a distinction between service provider and network operator, where, in the days of voice and limited data communications, these terms were synonymous [Reedy, 2008]. These new operators include mobile device manufacturers (e.g. Apple’s iPhone, RIM’s Blackberry, and Google’s Android) and portal operators (e.g. Yahoo, Google, and AOL). It is noteworthy that the user interface offered by these companies provides the “stickiness” that has eluded the network operators. Moreover, the consumer regards the application and not the service plan as driving his/her choice of provider. The subscriber-centric network model is slowly devolving and the operators’ traditional “walled gardens”, where only services and applications “certified” by the operator are available, are crumbling. Momentum is shifting towards a Consumer-centric network model where the consumer selects and often defines the services he/she wants. Table 1 offers a high-level view of differences between the two network models. Characteristics Subscriber-centric Networks Consumer-centric Networks User Experience Operator defined Consumer defined QoS, Security, Privacy Fixed by operator Consumer chooses January 2009 © 2009 Global Software Group LLC
  • 3. No Country for Old Networks 3 Billing Method Static, once chosen by consumer Consumer chooses based on application Content Operator controlled Consumer chooses Network Agreements Operator roaming agreements Consumer chooses based on location, context Calling Networks “Friends” on the same network Social network independent of operator Applications Operator controlled Consumer chooses Table 1 – Subscriber/Consumer-centric Networks The key observation from the table is the amount of control the consumer has in determining service parameters. The challenges for service providers center on how to provision and deliver “mass customization”. The popular “MyWebPage” offered by many web portals (eg. Yahoo, AOL), content providers (e.g. Wall Street Journal Online, MySpace, Flckr) and Application Providers (e.g. Mapquest, GoogleOffice), are raising expectations that the mobile internet should also be personalizable in a similar way. Subscriber-centric networks are often deployed using a Service Delivery Platform (SDP) as shown in Figure 1. This platform consists of Operations Systems and a Core Infrastructure to provide such functions as fault tolerance, database management, infrastructure tools, network monitoring, network services for voice calling, storage, an execution environment, and security. These functions are typically provided to application developers through standard APIs or a web services interface. Figure 1 – Subscriber-centric Service Delivery Platform Most application service/content providers who have developed services find working with the operators’ SDPs to be a difficult and expensive process. Development kits, simulators, testing systems vary in quality and are often very complicated to use. The business models are heavily weighted towards the January 2009 © 2009 Global Software Group LLC
  • 4. No Country for Old Networks 4 operators (typically, 20-60% of revenues flow to the developers). Small wonder that the number of applications delivered by the operators has failed to meet expectations. Consumer-centric Networks Consumer-centric networks require a significant paradigm shift in how services are delivered to consumers. New service providers offer services directly to consumers with or without “permission” of the network operators. These so-called “over-the-top” operators deliver their services through a mobile or web portal. Hence, the browser on the mobile device directly interfaces to these applications. Yahoo and Google Mobile are examples of such services. Often, these services are delivered via SMS text messaging since many consumers do not have smart phones or phones with browsers. Figure 2 – Consumer-centric Service Delivery Platform Figure 2 proposes an augmented view of an SDP for Consumer-centric Networks. In this case, a layer has been added to allow consumers to manage policies, content, context and information. Clearly, much of this data needs to be persistent and any implementation will require an architecture that optimizes data stores across mobile devices, personal gateways, network gateways, and service provider storage. The proposed Consumer-centric Services layer provides a set of common core functions for both applications and content providers. Consumer Policy Management includes components for managing personalized policies • (e.g. Opt in/opt out choices and QoS for each service, access to personal content, social network access privileges), ad engines, preference engines, and local search engines. A January 2009 © 2009 Global Software Group LLC
  • 5. No Country for Old Networks 5 particularly difficult challenge in policy management is the issue of identity, privacy, and security. Consumer Content Management includes components for content upload/download • across device domains, synchronization engines, content dispatchers, interfaces to social networking sites for content updates, and playlist managers. Consumer Context and Information Management components for gathering usage • information, a dashboard collector and information manager, recommendation engines, context aggregators and rules engines, and consumer backup storage. Clearly, the functions described above are a first approximation of what is required. Detailed analysis and design will likely result in modified and additional functionality. Moreover, as personalized services become commercially available, standards and de facto interfaces will emerge. The determination of where in the end-to-end ecosystem, components of the Consumer-centric Services layer reside is a challenging and poorly understood problem. Device manufacturers will be incented to provide as much of the functionality in the device as possible. Similarly, the network operators will try to offer these services through the network, and applications and content providers will attempt to keep key information on their private data stores. Indeed, Amazon, Google and Yahoo are prominent players in this space today and have written components to provide many of the functions listed in our Consumer- centric Services layer for their respective applications. The mobile operators are protective of their franchise and in addition to certifying all applications, require that all services billing be done by them. This is obviously a key control point. In partnership with the operators, Apple, Nokia and RIM offer server-based applications with recurring revenue streams. Currently, there are no widely available devices for consumers to manage their own services. Some of the entertainment gateways and IPTV systems provide modest control over cable offerings. Home networking systems that allow computers and peripherals to communicate are available. Finally, specialized equipment to allow VoIP, landline, and cellular services to be selected based on least-cost routing is being introduced into the enterprise and home markets. However, all these systems are “stand-alone” and are not integrated into a consumer-centric personal network. We finally note that at the heart of a consumer-centric SDP is an open platform. If a true ecosystem is to exist for delivering personalized services, device manufacturers, mobile network operators, and applications and content providers will need to agree to a set of standard APIs and protocols to share information across domains. Additionally, in order to spur third party development and innovation, the platforms must provide development kits, simulators, and testing environments, all built using open standards and interfaces. Although standards are emerging for SDPs (e.g. Parlay and XML), adoption has been slow and the operators’ commitment to IMS is problematical [Wsky, 2005]. The danger of moving too slowly in adopting open standards has claimed Microsoft as a victim and more nimble players, such as Jamcracker, are succeeding in the SDP space [Lght, 2008]. Consumer-centric Networks - Opportunities Mobile Network Operators The current environment represents significant challenges for the incumbent mobile operators. Consumers, given more choices, are no longer reluctant to change carriers as soon as their contracts are due for renewal. The high churn experienced by AT&T’s competitors when the iPhone was introduced is a harbinger of what has become common. Consumer loyalty can no longer be taken for granted. Assuming they can make the transition to a customer-centric network, a potential benefit to the operators is the growth of a large and profitable applications services business. Their stated fear is to avoid becoming “dumb pipe” providers. Hence, they face a dilemma of how to deliver value over and above the provision of network transport services. As opposed to a “one-stop shop”, there are certain January 2009 © 2009 Global Software Group LLC
  • 6. No Country for Old Networks 6 services that can be offered naturally by them. These include billing, federated identity, security, bandwidth on demand, digital rights management for copyrighted content, and contextual data (e.g. location and presence). Under this scenario, the operators will need to provide open interfaces to these capabilities and offer flexible, compelling and easy-to-use development and testing environments. Application Service/Content Providers Amazon, MySpace, Facebook, Apple, Yahoo, and Google, among many others, provide open and flexible development environments for third party applications developers. Microsoft has its own proprietary environment but because of its market power, .NET is a de facto standard, at least, in the enterprise. Operating mainly as “over-the-top” providers, these firms interact directly with consumers through the mobile device. However, depending on customized client software, the user experience varies widely depending on the device. Apple’s iPhone and Google’s Android phones represent the current high end, whereas applications built on SMS are at the other end of the spectrum. Among the key opportunities for applications and content providers is designing an open architecture to allow consumers to manage and distribute content and metadata across providers. Several firms such as ShoZu (social networking) and Nero (digital media) aggregate web sites and content, respectively, and provide it directly to consumers. However, their protocols are proprietary and closed. Similarly, Apple, Nokia, and Microsoft offer published interfaces that are proprietary. Google’s Android is one of the first open development ecosystems for mobile devices. A controversial but powerful technology has been employed by many content providers to perform file sharing. Peer to peer (P2P) protocols such as BitTorrent, eDonkey, and Skype are being used to harness the power of computing and communications devices to decentralize the transmission of large data files and to share bandwidth and computing power. Currently, P2P traffic is second only to video streaming in terms of overall internet usage [Odly, 2008]. The promise offered by P2P is that applications can communicate directly with other peer devices and avoid a centralized server. eBay exemplifies this usage by bringing buyers and sellers together using their Skype technology. What is needed, of course, is a set of metadata standards that define how content and information can be exchanged between applications providers, device manufacturers, and network operators. Lacking such standards, the current and near-term approach is to provide the “transcoding” explicitly using customized devices and software. Device Manufacturers Since the mobile phone has become a powerful computing and communications device, manufacturers have been competing in a “features” war. The mobile phone is no longer just a phone. It is a camera, music player, FM radio, TV screen, transcription device, messaging and emailing device, navigation and gaming device, and web browser. Soon it will be a projector and remote control for home security and entertainment systems. The addition of these capabilities significantly increases the complexity of the hardware and especially, the software in the device. Moreover, service provisioning, over-the-air updates, and remote maintenance become increasingly critical functions. Security is also an issue with several high profile “hacks” into devices owned by celebrities. Given these trends, device manufacturers face enormous challenges but also can enjoy potentially huge opportunities to provide rich user experiences. In order to deliver on this promise, several key changes need to be made. They include: • Greater access to the mobile device’s functionality • Standard interfaces to mobile and internet devices from different manufacturers • Standard APIs to be used by third party developers and providers • Allowance for “thin” clients where processor=intensive applications (e.g. graphics and video encoding) can be off-loaded to a server and only rendering activity occurs on the device January 2009 © 2009 Global Software Group LLC
  • 7. No Country for Old Networks 7 Conclusion The decades-long promise of communications and computing convergence is upon us but not in the way that the original forecasters predicted. At the time, technology futurists believed that telephone networks and computing would combine into a wired superstructure where supercomputers and superswitches would dominate. Few envisioned the rise of wireless and fewer foresaw that it would overtake wired communications as the most prevalent form of telecommunications in the world. With the advent of true broadband wireless, convergence may be at hand. However, in order to realize this attractive vision, significant changes in how networks deliver services to consumers are required. In this paper, we have argued for Consumer-centric Networks which place the consumer, and not the subscriber, in the middle. A proposal for a new layer in the Service Delivery Platform is presented. This layer will necessitate proactive participation by network operators, application and content providers, and device manufacturers for definition and implementation. Openness and a common vision are characteristics of this new ecosystem and success will come to those who embrace these concepts. Acknowledgements The author is grateful for the insightful comments and suggestions made by Drs. John Waclawsky and Jacques Meekel. References [Reedy, 2008] Reedy, Sarah, “Telephony Live: Redefining Tomorrow’s Service Provider”, Telephony Online, 9/30/2008, http://telephonyonline.com/wireless/news/service-providers-0930/ [Wsky, 2005] Waclawsky, John G., “IMS 101: What You Need to Know Now”, Business Communications Review, June, 2005, pp 18-23 [Lght, 2008] Light Reading, “Microsoft Kills its SDP”, 12/2/2008, http://www.lightreading.com/document.asp?doc_id=168726 [Odly, 2008] Odlyko, Andrew, Minnesota Internet Traffic Studies (MINTS), http://www.dtc.umn.edu/mints/home.php January 2009 © 2009 Global Software Group LLC