4. Network Hierarchy
IEEE802.1gAP
UMTS/
Beyond 4G
GSM/GPRS WiMax
UE
N
)t(R
N
1Ho
∑=
N
)t(R
N
1Ho
∑=
=Latency
Throughput =
Time average (Speed at different
networks)
Security =
Time Average {High:Medium:Low
(different Network nodes)}
11. Multimode network
2G/2.5G/3G/4G/…
Multimode terminals
Innovative tariff structure
Easily exposed “Data quality”
Infinite service creation
No single killer application
Many Challenges before Operator
12. Content rights
Content &
Application
creation
Aggregation Portal
Service
delivery
Network Terminal Customers
Voice
+
SMS
Network Terminal Customers
BW &
Value chain
Open ground
Uncontrolled
environment
Controlled Environment
Where are
the
compelling
application
s? Challenges in providing End to End
Network testing
QOS
Security
Charging
Shrinking Controlled environment
13. Content rights
Content &
Application
creation
Aggregation Portal
Service
delivery
Network Terminal Customers
Voice
+
SMS
Network Terminal Customers
Voice + Text Services
Voice + Video + Data + Multimedia contents
Narrow
BW
Pipeis
full
Wide BW
How to fill
up with
what
contents?
Voice will
continue to
dominate
Bandwidth Evolution
14. End to End Technology
NSS BSS 21 34 5 687 90# *
Voice,
VAS
(SMS,Simple
data)
End to End Technology
PS
CS
-CN
RNS
Voice,
VAS
(SMS,Simple
data)
Applications(E-commerce,Messaging,
Games,Telemedicine,..
Content Technologies (WML,XML,VoXML,…)
Location technologies (GPS,TOA,E-OTD,..)
Service Technologies
(SMS,WAP,i-mode,.NET,video…)
Challenge:
“Taking control of the
value chain”
Opportunities:
“Growth of Application
developers”
Device
technologies:
Different Micro
browsers and OS
Increasing Value chain
Infrastructure Evolution
15. COST Vs QOSCOST Vs QOS
Delay
Conversational
Class
Streaming
Class
Interactive
Class
Background
Class
InvestmentCosts
Churn
Compromise
16. Charging involves
Radio access time
QOS
Data volume
Bandwidth usage
Contents/Application used
Level of security
External network access
On demand user provisioning
Add/del services as and when required
Customer
Contents
2G/2.5G/3G/4G NW
ISP
Application servers
MVNO services
Strategy:
Careful upgradation /
selection
of the OSS that is scalable and
support multiple technology
Billing/provisioning challenges
18. Security IssuesSecurity Issues
Network access security over different networks involved (I)Network access security over different networks involved (I)
Secure access to services over multiple networksSecure access to services over multiple networks
Protect against attacks on the (radio) access linkProtect against attacks on the (radio) access link
Network domain security (II)Network domain security (II)
Securely exchange signalling data in the provider domainSecurely exchange signalling data in the provider domain
Protect against attacks on the backbone networkProtect against attacks on the backbone network
User domain security (III)User domain security (III)
Secure access to mobile stationsSecure access to mobile stations
Application domain security (IV)Application domain security (IV)
Enable applications in the user and in the provider domain toEnable applications in the user and in the provider domain to
securely exchange messagessecurely exchange messages
Visibility and configurability of securityVisibility and configurability of security
Enable the user to inform himself whether a security feature is inEnable the user to inform himself whether a security feature is in
operation or notoperation or not
Whether the use and provision of services should depend on theWhether the use and provision of services should depend on the
security feature.security feature.
19. Efficient network utilisation
Optimised infrastructure – Optimised CAPEX
Continuous services
Reduced Churn
Transparent QOS
Increased customer base
Converged revenue
Revenues from external service providers
(MVNOs)
Revenues from external networks
Opportunities
20. “Fifteen Years is the average period of probation, and during
that time the INVENTOR, the PROMOTER, and the INVESTOR,
who see a great future, generally lose their shirts…. This is
why the wise capitalist keeps out of exploiting new
inventions and comes in only when the public is ready for
mass demand”
Owen D. Young, a GE executive who carried out the purchase
of American Marconi
21. “If the INVENTOR, the PROMOTER, and the INVESTOR understand
the mass market from different perspective, keeping cost,
complexity and commercialisation in mind from
conceptualisation stage to commercialisation stage will
make a huge traction for the capitalists throughout the
period of probation”
J.Ravikumar
23. “I want to use the applications, not the technology”
Expectations…
User friendly and “worth paying” services
Service provisioning on demand
Excellent QOS
Excellent customer support
High level of data security
Transparent charging
Seamless roaming
End User Perspective
24. Profit, Cash flow – Improving Investor Relations
Increasing MOU and ARPU
Taking control of the end to end network
Customer acquisition and Retention
Network Performance
QOS
Network Security
Competitive Differentiation
How to Win?
More Capacity from present Investment
Technology Migration and Convergence
Consolidation – Acquisition and Merger
Complying with Regulator
Operator Perspective
25. Politics
Country Regulatory Standards
Telecom Infrastructure and tele-density demands
Economic situation and growth status
Customer Demands
Revenue strategies
Deployment strategies
Growth Strategies
Technology Adoption
Voice will continue to dominate in GSM market. 3G networks should be planned in a way that it should be used as a “ Voice traffic relief ” in a CONGESTED GSM environment in the initial stage till the killer applications are identified L everage on 3G network in providing “ Rich voice ” for the dual mode customers.
Voice will continue to dominate in GSM market. 3G networks should be planned in a way that it should be used as a “ Voice traffic relief ” in a CONGESTED GSM environment in the initial stage till the killer applications are identified L everage on 3G network in providing “ Rich voice ” for the dual mode customers.
Voice will continue to dominate in GSM market. 3G networks should be planned in a way that it should be used as a “ Voice traffic relief ” in a CONGESTED GSM environment in the initial stage till the killer applications are identified L everage on 3G network in providing “ Rich voice ” for the dual mode customers.
Voice will continue to dominate in GSM market. 3G networks should be planned in a way that it should be used as a “ Voice traffic relief ” in a CONGESTED GSM environment in the initial stage till the killer applications are identified L everage on 3G network in providing “ Rich voice ” for the dual mode customers.
Voice will continue to dominate in GSM market. 3G networks should be planned in a way that it should be used as a “ Voice traffic relief ” in a CONGESTED GSM environment in the initial stage till the killer applications are identified L everage on 3G network in providing “ Rich voice ” for the dual mode customers.
Voice will continue to dominate in GSM market. 3G networks should be planned in a way that it should be used as a “ Voice traffic relief ” in a CONGESTED GSM environment in the initial stage till the killer applications are identified L everage on 3G network in providing “ Rich voice ” for the dual mode customers.
Voice will continue to dominate in GSM market. 3G networks should be planned in a way that it should be used as a “ Voice traffic relief ” in a CONGESTED GSM environment in the initial stage till the killer applications are identified L everage on 3G network in providing “ Rich voice ” for the dual mode customers.
Voice will continue to dominate in GSM market. 3G networks should be planned in a way that it should be used as a “ Voice traffic relief ” in a CONGESTED GSM environment in the initial stage till the killer applications are identified L everage on 3G network in providing “ Rich voice ” for the dual mode customers.
Voice will continue to dominate in GSM market. 3G networks should be planned in a way that it should be used as a “ Voice traffic relief ” in a CONGESTED GSM environment in the initial stage till the killer applications are identified L everage on 3G network in providing “ Rich voice ” for the dual mode customers.
Voice will continue to dominate in GSM market. 3G networks should be planned in a way that it should be used as a “ Voice traffic relief ” in a CONGESTED GSM environment in the initial stage till the killer applications are identified L everage on 3G network in providing “ Rich voice ” for the dual mode customers. Roaming cost for the operator and the subscriber might become a hindrance in introducing Multi-network roaming Challenges: Common Network that can be completely scalable to adopt to all the services External network that makes the roaming facilitated with additional value added services to justify the roaming. QOS and Security issues are going to stay….
GSM operators so far having an end to end control over their network. Moving forward with data services, the value chain is going out of control from the operator as the majority of the value chain comes from application and contents from external networks. Challenge here is how to take control of the “ Value chain ” that lies in the open ground. Customers will not only belong to the operators, they may sign up with content and application providers.
Voice will continue to dominate in GSM market. 3G networks should be planned in a way that it should be used as a “ Voice traffic relief ” in a CONGESTED GSM environment in the initial stage till the killer applications are identified L everage on 3G network in providing “ Rich voice ” for the dual mode customers.
Challenge is how take over this uncontrolled ladder to go up the Value chain???? Opportunities for the growth of Application developers in Malaysia. How to get the lion share out of Microsoft,AOL etc after having heavily invested in “ Service delivery Network ” …. PS – Packet switched CS – Circuit switched Different microbrowsers that can be Java VM, Ericsson proprietary, Nokia Proprietary, etc.. Different OS that can be EPOC,Palm,Symbian,etc..
Many changes will be required in the current billing,mediation,provisioning and NMS systems. Rating engine will be complicated. Operator should look for a very flexible rating engine as the tariff structure will be varying heavily.
EDGE can offer 384Kbps at 200KHz GSM bandwidth Higher order modulation provides spectral efficiency in terms of bits/Hz High Speed Downlink Packet Access Less robust to Noise, Interference, any other channel impairments An innovative link adaptation techniques are required. Use higher order modulation during better channel conditions with higher C/I or close to the base stations. Use lower order modulation while the user is in the cell edge or experiencing lower C/I… Robust and faster error detection and correction mechaniosms are required --- faster ARQ Fast cell selection, fast scheduling,faster link adaptation will help improve the NG technologies. Multiple antennas at the transmitter and receiver can improve the data rates I strongly believe spectrum efficient technologies will be most successful in the coming years.
EDGE can offer 384Kbps at 200KHz GSM bandwidth Higher order modulation provides spectral efficiency in terms of bits/Hz High Speed Downlink Packet Access Less robust to Noise, Interference, any other channel impairments An innovative link adaptation techniques are required. Use higher order modulation during better channel conditions with higher C/I or close to the base stations. Use lower order modulation while the user is in the cell edge or experiencing lower C/I… Robust and faster error detection and correction mechaniosms are required --- faster ARQ Fast cell selection, fast scheduling,faster link adaptation will help improve the NG technologies. Multiple antennas at the transmitter and receiver can improve the data rates I strongly believe spectrum efficient technologies will be most successful in the coming years.