• Nem Talált Eredményt

The Concept and Model of Unique Name Service for Convergent Networks

N/A
N/A
Protected

Academic year: 2023

Ossza meg "The Concept and Model of Unique Name Service for Convergent Networks"

Copied!
7
0
0

Teljes szövegt

(1)

Abstract—The present paper introduces a novel concept for identifying subscribers in convergent telecommunication networks with a unique identifier. This unique identification is independent of the providers the subscriber is in contract with and can be independent of the services the subscriber uses. The concept is termed as Unique Name Service (UNS) that is an extension of the FMC one-number concept and the generalization of the presently available naming and addressing services such as ENUM and UCI. In contrast to the current naming and addressing services, the UNS does not restrict the format of the unique user identifier i.e. it provides a generic, flexible and future proof service. Beyond the description of the UNS concept, we also define its abstract model, which we use to give design guidelines for the real-life implementation of the UNS.

Index Terms— Addressing, Naming, ENUM, UCI, FMC I. INTRODUCTION

HEheterogeneity in the service and control layers of pre- NGN architectures, that are on the way of convergence, has a direct negative effect on the user experience. A consequence of the heterogeneity is the usage of numerous user IDs with various multimedia services (e.g. telephone numbers, e-mail addresses). As a further consequence, in most cases, one user inherently uses multiple networks with the same subscription, but he does not always receive a single identifier. Fixed Mobile Convergent (FMC) services can be an example.

The present paper concentrates on the service layer of the network architecture and examines its naming, addressing and routing (NAR) problems from the point of view of user identification.

The paper analyses the currently used identifier formats and clarifies the difference between the name and address roles of an identifier. Furthermore, the concept of Unique Name Service (UNS) is introduced, which is a novel theoretical approach to the problem of unique user identification. UML (Unified Modeling Language) notation is

Manuscript received February 29, 2008.

Balázs Gódor is with T-Systems Business Services GmbH, Technical Department, Fixed Mobile Convergence, office: H-1033 Budapest, Hungary, Kórház u. 6-12, (E-mail: balazs.godor@t-systems.com)

Tamás Jakabfy is with T-Systems Business Services GmbH, Technical Department, Fixed Mobile Convergence, office: H-1033 Budapest, Hungary, Kórház u. 6-12, (E-mail: tamas.jakabfy@t-systems.com)

Gyula Sallai is with the Department of Telecommunications and Media Informatics, Budapest University of Technology and Economics. (E-mail:

sallai@tmit.bme.hu)

applied to model the concept. Based on the UNS model we also present design guidelines in this paper, which serve as prerequisites for the UNS implementation.

Our examination focuses on voice services, however, most of the statements (in a generalized version) might also be applied to multimedia services.

The rest of the paper is organized as follows. Section II partitions the identifiers with respect to the roles and functions they fulfill. Section III describes the typical formats of identifiers. Section IV gives examples of the different roles of identifier formats and Section V deals with the formal systematization of identifiers. Section VI introduces the novel concept of Unique Name Service and presents its model together with a few design guidelines for the implementation in real life. Section VII enumerates several practical examples of UNS-like services and concluding remarks are given in Section VIII.

II. SEPARATION OF NAMING AND ADDRESSING ROLES

To be specific we follow the standard ETSI terminology [1]

in this paper, which defines the identifier, address and name in the following ways:

Identifier: a series of digits, characters and symbols used to identify uniquely subscriber(s), user(s), network element(s), function(s) or network entity (entities) providing services/applications. Note: Identifiers can be used for registration or authorization. They can be either public to all networks or private to a specific network (private IDs are normally not disclosed to third parties).

Address: identifier for a specific termination point and used for routing to this termination point.

Name: identifier of an entity (e.g. subscriber, network element) that may be resolved/translated into an address.

In relation with the UNS, we consider the definition of identifiers only for user (subscriber) identification and disregard its interpretation for network entities or functions.

The Concept and Model of Unique Name Service for Convergent Networks

Balázs Gódor, Tamás Jakabfy, Gyula Sallai

T

(2)

III. FORMAT DESCRIPTION OF IDENTIFIERS

This section specifies the most important name and address formats from a practical point of view. Most of these items below can be used both as name format and as address format (cf. Section IV)

A. E.164 numbers

The E.164 numbers specified by the ITU-T [2] were originally addresses. These services are often realized on different platforms (PSTN, PLMN, VoIP, etc.) i.e. this common number type is a key element in their interworking.

This is the only ID format that can be dialed from PSTN/PLMN. The structure of the format is given in Fig. 1.

CC: Country Code for geographic areas NDC: National Destination Code

SN: Subscriber Number

n: Number of digits in the country code

CC NDC SN

1 to 3 digits

Max. (15-n) digits National (significant) number Max. 15 digits

International E.164 number for geographic areas

Fig. 1. Typical structure of an E.164 number

B. SIP URIs

The SIP (Session Initiation Protocol) URI (Universal Resource Identifier) [3] [4] [8] is the SIP naming and addressing schema. It is typically used in real-time multimedia IP networks. The SIP URI resembles an e-mail address and is written in the following format:

sip:<user>[:<password>]@<host>[:<port>][;<uri- parameters>][?<headers>]

Examples:

1. sip:john.smith@providerx.com

This URI points to a user called john.smith who is the subscriber of providerx and can be reached in the providerx.com domain.

2. sip:+36-1-234567@gateway.com;user=phone This URI is a SIP address of a phone, which can be reached through the gateway.com domain.

3. sips:john.smith@providerx.com

This is the secure version of the first example (SIPS URI [3]). A call made to a SIPS URI guarantees that secure, encrypted transport (namely TLS) is used to carry all SIP messages from the caller to the domain of the callee.

C. Tel URIs

A Tel URI [4] [5] describes resources identified by telephone numbers. The "tel:" URI is a globally unique identifier (name) only; it does not describe the steps necessary to reach a particular number and does not imply dialing semantics. Furthermore, it does not refer to a specific physical device, only to a telephone number. It is typically used in VoIP networks. The exact structure of the Tel URI is described in [5]; we only give the essence of the format as follows:

tel:<phone-num-digits> [;<paramname>[=<paramvalue>]

[;<paramname>[=<paramvalue>]] …]

Examples:

1. tel:+36-1-439-30-51

This URI points to a phone number in Hungary. The hyphens are included to make the number more human readable; they separate country, area code and subscriber number.

2. tel:4444;phone-context=example.com

The URI describes a local phone number valid within the context "example.com".

3. tel:30-51;phone-context=+36-1-439

The URI describes a local phone number that is valid within a particular phone prefix.

D. Universal Communication Identifier (UCI)

The specification of the framework of UCI was elaborated in the ETSI [6]. UCI provides a (lifelong) unique personal identifier. It is service, location and operator independent and used for NAR functions in IP networks. The ID is associated with the users and not with lines, VCs, etc.

The user identifiers in the UCI framework have a record format and are constructed in the following way.

<alphanumeric label>

<globally unique numeric identifier>

<additional information field>

Example:

‘John Smith‘

3614817600 b7;a44;d112;m2

The first field of the structure is an alphanumeric part, which is in practice the first name and surname of the user this ID belongs to. This is followed by a numeric part, which is usually an E.164 number, a telephone number of the user. The last field is a hexadecimal part, which can be used to transfer additional information, e.g. for the purpose of authentication, routing optimization, etc.

(3)

E. Proprietary and other formats

Since SIP, as the most wide-spread VoIP signaling protocol, has a client-server architecture, therefore, VoInet (Voice over Internet) providers with pure peer-to-peer architectures typically do not use it. The majority of these providers applies proprietary signaling protocols, proprietary names (for the users) and typically does not use end-to-end L7 addresses;

they rely on the addressing system of lower layers (e.g. IP addresses in the network layer).

Although we have listed the most widespread identifier formats, there are other types of standard URIs, like H.323 URL [9] as well. A further example of the ‘other formats’

category is the number format used in UNUM (Unique Number Mapping) [10]. UNUM is the extension of ENUM [11] with respect to its architecture.

IV. NAME AND ADDRESS ROLES IN PRACTICE

Most of the format examples mentioned in the previous section can represent both names and addresses. For this reason we explain here some cases to illustrate the difference between the usage of these two identifier types in certain roles.

A. Case 1: E.164 numbers in VoIP services

Most of the VoInet providers allocate E.164 numbers to the subscribers to make them reachable also from PSTN/PLMN.

In PSTN-VoIP call scenarios, however, E.164 numbers themselves do not always carry enough information to accomplish the call routing. Often, database queries have to be initiated (e.g. ENUM) to obtain the proper routing information to accomplish the call. These E.164 numbers identify the users unambiguously, therefore, they are considered as names in these cases.

B. Case 2: Number portability (NP)

In the early ages of PSTN an E.164 telephone number was considered as an address because call routing to a subscriber was always possible using exclusively the information represented by this number. With number portability, this is not the case anymore. Telephone numbers do not provide routing information in all cases; a database must be queried to get the proper routing code. Number portability transforms the role of E.164 numbers: they become names (that identify users or network elements) instead of addresses (that are bases of call routing). This might apply not only for PSTN/PLMN but also for IP-based voice services.

C. Case 3: Value-added services and special numbers Value-added (toll-free, shared cost, premium rate, etc.) and special number based (short numbers, access codes, etc.) services are implemented as IN services in legacy networks.

Since these special numbers (which are names) are inadequate for call routing, the IN translates them to routable addresses.

D. Case 4: UCI operation

This section gives an overview of the UCI framework and its way of operation. The major characteristics of a UCI name are the following:

• it is a unique identifier for a person, role or organization;

• it allows a label to be used as a "user-friendly"

name that describes the originator and/or recipient of a communication;

• it allows important additional information to be available to anybody through the hexadecimal part, such as preferred language, authentication information, etc;

• it allows the originator or recipient of a communication to claim authenticity for their identifier;

• it is independent of services and networks;

• it is independent of service provider.

There are two major logical elements in the UCI framework, Personal User Agent (PUA) and Service Agent (SA).

Personal User Agent (PUA)

A PUA is a functional entity with a one-to-one relationship to a specific UCI. It stores or has access to information on all of a person's communication services and their service identifiers. The PUA also stores or has access to current status and personal preferences information in relation to these services (e.g. mobile phone switched on and reachable, not able to access home telephone, does not wish to receive emails at this time, etc.).

Service Agent (SA)

An SA is a functional entity that is linked to a communication network/service and may centralize the network/service control. It would typically be provided by a network/service provider. An SA is the link between the UCI and networks/services. It participates in communication with PUAs, other SAs and its own network/service.

The SA provides a consistent interface to the PUA irrespective of the internal architecture of its network/service.

Where the network/service already has entities that provide a common point of control, the SA merely provides an interface to these control functions. Where the network/service does not provide such a common point of control, the SA must also provide additional functionality that interfaces with the distributed control mechanisms within the network/service [6].

(4)

PUA Provider 2

P U A

P U A

P U A

P U A

P U A

Network Infrastructure

Service Provider / Network Operator 1

User 1/

Terminal A PUA Provider 1

P U A

P U A

P U A

P U A

P U A

P U A

User 4/

Terminal B User 2/

Terminal A User 3/

Terminal A 2

1 43

User 4/

Terminal A

Network Infrastructure Network

Infrastructure Service

Agent

Service Agent Service

Agent P

U A

Service Provider / Network Operator 2

Service Provider / Network Operator 3

Fig. 2. UCI context model

Fig. 2. above shows the physical relationship between PUAs, SAs, users and terminals. It demonstrates how one user can have a single PUA that helps the user to manage communication involving a number of terminals that are associated with a range of networks and services (c.f. Fig. 2.

User 4). It also shows how SAs are related to a communication network/service and that PUAs may be provided by a number of different PUA Provider organizations.

V. FORMAL SYSTEMATIZATION OF IDENTIFIERS,

NAMES AND ADDRESSES

Incorporating the identifier, address and name concepts into a model, we obtain the following class diagram (Fig. 3.), using the UML [7] notation.

Name

type: AddrFormat Address Identifier

value : string type: IDFormat

Role

Fig. 3. Formalized (inheritance) relation between Identifier, Name and Address with UML Notation.

IDFormat and AddrFromat in Fig. 3. are defined in Fig. 4.

as follows.

AddrFormat

<<enumerated>>

E.164 SIP URI Tel URI UCI

proprietary structures future structures other structures

IDFormat

<<enumerated>>

E.164 SIP URI Tel URI

Fig. 4. IDFormat and AddrFormat as enumerated types

In conformity with the UML inheritance link both the Name and Address classes (in Fig. 3.) inherit the value and type attributes of the Identifier class. The Name class seems to be empty in Fig. 3. but it is not due to the inherited Identifier (type and value) attributes. The type is redefined in the Address class with the purpose of format restriction, since the set of available routable addresses is smaller then the set of ID and name formats.

Table I gives an overview about a few presently used IDs and classifies them according to their roles and formats.

TABLEI

NAME AND ADDRESS FORMATS AND ROLES

ID value Format Role Comment

Not ported geographical

number

E.164 Address PSTN Telephone number (line ID) Ported

geographical number

E.164 Name

IMPI (IMS Private User Identity)

SIP URI Address

The Private User Identity is assigned by the home network operator, and used, for example, for

Registration, Authorisation, Administration, and Accounting purposes [12]

IMPU (IMS Public User Identity)

SIP URI Name

The Public User Identity/identities are used by any user for requesting communications to other

users. For example, this might be included on a

business card [12]

IMPU Tel URI Name

VoInet login

name Proprietary Name Reachable from the whole Internet, points to the user User ENUM

number E.164 Name

UCI ID UCI record Name Points to the user Toll-

free/premium rate number

E.164 Name Points to the service Short codes E.164 Name Points to the service

(5)

VI. CONCEPT OF THE UNIQUE NAME SERVICE (UNS) This section introduces the concept of UNS and describes its generic theoretical model. UNS is a generic framework, which suggests a solution for the problem of unique user identification. To bring this theory closer to the reality, some design guidelines are also presented to facilitate the real-life implementation of UNS.

A. Model of the UNS

The UML class diagram below systematizes the UNS elements and represents the environment the UNS is in contact with. Fig. 5. focuses on the classes themselves and on the links between them without displaying the attributes and methods of the classes.

*

VSDs

IVSD

IVSD EVSDEVSD Voice Service

Domain

Name

Name AddressAddress

ID ID

Caller Caller

SignProto SignProto

Subscriber Subscriber* *

*

UNSSubscribers NameSpace

resolves_to

Unique Name Service

carries

1 1 Person Person

*

EVSDSubscribers

IVSDSubscribers * AddressSpace

0..1 1..*

1 2

3 0..1

1

4

0..1

1

0..1

1..*

Fig. 5. Model of the UNS

The UNS model is composed of a NameSpace (link 1 in Fig. 5.), a list of Subscribers (UNSSubscribers, link 2 in Fig.

5.), several Voice Service Domains (VSDs, link 3 in Fig. 5.) and a signaling protocol (SignProto, link 4 in Fig. 5.). The NameSpace represents the set of names, which can be allocated to the UNS subscribers (cf. link 2) as unique and personal telecommunication names.

Beyond the subscription to the UNS, the subscriber has also a contract with a voice or multimedia service provider, which provides him telecommunication service. To obtain this voice (or multimedia) service, the subscriber has to be able to reach the corresponding Voice Service Domain. A VSD can be either ingress or egress VSD represented by the IVSD and EVSD classes, respectively. The reason for this separation is that the call setup towards a UNS subscriber is initiated in an IVSD, it goes through the UNS domain and it terminates in an EVSD. In conformity with this setup path, callers (instances of the Caller class in Fig. 5.) are in contract with an IVSD and subscribers (instances of the Subscriber class in Fig. 5.) with an EVSD. The Subscriber instances have UNS subscriptions, the Caller instances do not. An IVSD and an EVSD can

represent two different voice or multimedia service providers.

Examples of instances of IVSD and EVSD can be the PSTN/PLMN or any VoIP network.

The ID, Name and Address triplet in Fig. 5. is the same as is described in Fig. 3.

The task of the UNS in the call setup procedure is to resolve the name to addresses and to discover the proper egress VSDs based on these addresses. Instances of the SignProto class carry the IDs irrespective of being addresses or names.

The unique characteristic of the UNS is highlighted by the model as well, since exactly one instance of Name belongs to one instance of Subscriber and vice versa. A Name instance can be resolved to many Address instances (cf. resolves_to link in Fig. 5.).

B. Design guidelines for the implementation of UNS In this subsection, we give some design guidelines for the practical implementation of a UNS. To realize such a service, a new organizational unit must be introduced, UNS Provider (UNSP), which operates a system with the following minimal functional architecture in Fig. 6. Note, the UNSP may apply multiple IGFs and EGFs according to the diversity of IVSDs and EVSDs.

Proxy

IVSD1 IGF

IP1, IAF1

IVSD2

IP2=P, IAF2=NF

P, NF EGF

Unique Name Service Provider domain

EVSD1 EP1, EAF1

EVSD2 P, EAF1

EP2=P, EAF2 NRF

Database

Fig. 6. Functional architecture of a typical UNSP domain

The functional elements on Fig. 6. are the following:

1. IVSD (Ingress Voice Service Domain), described by its protocol (IP=Ingress Protocol) and address format (IAF=Ingress Address Format).

2. IGF (Ingress Gateway function) translates (if necessary) IP and IAF to the Protocol (P) and Name Format (NF) used within the UNSP domain.

3. NRF (Name Resolution Function) resolves names to addresses via database queries and produces an address (or more addresses) in Egress Address Format (EAF). NRF can typically be part of a proxy function, which handles the signaling messages.

4. EGF (Egress Gateway Function) translates P to the Egress Protocol (EP) if necessary. EP and EAF are used in the Egress Voice Service Domain (EVSD).

5. IGF and EGF are optional elements depending on the protocol and addressing environment (c.f.

Fig.6.). In case of protocol translation IGF and EGF operate in B2BUA mode.

(6)

IP1, IP2, P, EP1 and EP2 (in Fig. 6.) are instances of SignProto in Fig. 5. IVSDs and EVSDs (in Fig. 6.) are instances of IVSD and EVSD classes, respectively. IAFs and EAFs are of type AddrFormat (in Fig. 4.). NF is of type NameFormat (in Fig. 4.)

There are four major tasks of an UNSP:

1. To allocate names in a predefined format (NF) to the subscribers.

2. To operate a name to address resolution infrastructure (Database and NRF).

3. To keep the user address database up-to-date.

Addresses must come from EVSDs in the corresponding EAF format.

4. In case of an incoming call from any IVSD, the provider

a. converts the signaling protocol if needed (IP to P, if IP≠P);

b. discovers the name of the called party if needed;

c. resolves the name to address(es) (NF to EAF);

d. transfers the call to the proper EVSD according to the subscriber’s preferences.

Call origination with a UNS identifier may be an extension of the tasks above, but it is out of the scope of the present paper.

When aiming to design the system of an UNSP the IP, IAF parameters for all IVSDs and EP, EAF parameters for all EVSDs are given (because of their external nature). NF, P, IGF, NRF and EGF must be designed, considering the following constraints:

- P can carry NF and all EAFs.

- IGF can translate IP to P and can produce the proper name in NF from an input in IAF.

- NRF can produce the proper user address(es) in EAF from the user name in NF.

- EGF can translate P to EP.

- We recommend selecting NF to be associatable with E.164 numbers, because recently E.164 numbers have been the most general and wide-spread identifiers and in certain networks only this format can be dialed. At present, IAF is most likely to be an E.164 number.

To sum up the constraints above, the UNSP has to design its internal parameters (P, NF, and NRF) and external interfaces (IGF, EGF) carefully. There are two options to design P and NF. The first option is that a common name format (NF) is chosen, which can be carried by any protocol. The other option is that a common, flexible signaling protocol (P) is introduced in the UNSP domain, which is able to carry the chosen NF and all of the EAFs. NRF is a name resolution infrastructure that can be a proprietary or a standard solution.

IGF and EGF are optional functions depending on the involved IVSDs and EVSDs, respectively. Any instance of IGF and EGF has to match the protocol conversion demands.

VII. CASE STUDIES AND PRACTICAL APPROACHES

In this section we detail some competing, innovative services available on the market, which implement some UNS functions. Most of these services are IP-based running in the public Internet domain but some of them are carrier-grade solutions offered to residential and business customers.

A. B2BUA mode UNS provider

The provider allocates lifelong E.164 phone numbers to its subscribers (one personal number per subscriber acting as a name). The subscriber can assign several PSTN/PLMN numbers (and a VoInet account) to his personal number via a web-based management interface. If a call is initiated from PSTN/PLMN (that are IVSD instances) to that personal number, the call signaling is terminated in the UNSP network.

The UNSP parallel rings a subset of the corresponding addresses, based on the subscriber preferences (filtering e.g.

for calling number, time of the day and registration status).

The call is routed through the packet domain as long as it is possible. This architecture also allows some enhanced features like one voicemail box, call recording and click to call.

B. An FMC service with one corporate identity

There is another signaling termination based commercial service available for business customers. This is a pure circuit switched solution with PBX integration (e.g. extension calling) for both fixed and mobile clients (the IP-based version is on the roadmap). The service offers ’one corporate identity’

for business customers. It means that the employees are available via one (fixed) number regardless of the (PSTN or GSM) network they are attached to. It is also valid for outgoing calls; always the same number is presented independently of the network from which the call is initiated.

C. A common client handling more subscriptions

In this case, a common client is applied, which is able to register the user into different VoInet services. Such clients are available both for PC and mobile platforms. The user needs to have subscriptions with some of the covered VoInet providers. All account details have to be configured into the common client in advance. Afterwards, the user is accessible from all VoInet domains through his VoInet accounts. The developer of the aforementioned common client possesses almost all means to become a UNSP. The only missing link is the unique name allocation.

(7)

VIII. CONCLUSION

The motivation to develop the concept of Unique Name Service was the shortage of such a service, which is able to allocate (multimedia) service provider independent unique names to subscribers.

The result of the paper is a generic UNS model framework, which neither restricts the subscriber name format nor excludes any existing address formats. This flexibility allows to create unique names even with special formatting. UNS makes the communication setup more personal and enables the attachment of value added services (e.g. parallel ringing, seamless handover). The design guidelines we suggest present a few constraints and rules, which need to be followed when planning the implementation of UNS.

There are only few initiatives (some of them are available as commercial services), which cover parts of the UNS, however, there is no such service that would offer the full scope of the Unique Name Service as is described in this paper.

IX. ACKNOWLEDGMENT

Balázs Gódor and Tamás Jakabfy thank for the support from Bruno Röser and Helmut Merl, T-Systems Business Services GmbH, Technical Department, Fixed Mobile Convergence.

REFERENCES [1] ETSI TS 184 002, Identifiers for NGN, Oct.2006.

[2] ITU-T Recommendation E.164 (05/97) The International Public Telecommunications Numbering Plan

[3] RFC 3261, SIP: Session Initiation Protocol. J. Rosenberg, H.

Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M.

Handley, E. Schooler. June 2002. (Format: TXT=647976 bytes) (Obsoletes RFC2543) (Updated by RFC3265, RFC3853, RFC4320, RFC4916) (Status: PROPOSED STANDARD)

[4] RFC 3986, Uniform Resource Identifier (URI): Generic Syntax. T.

Berners-Lee, R. Fielding, L. Masinter. January 2005. (Format:

TXT=141811 bytes) (Obsoletes RFC2732, RFC2396, RFC1808) (Updates RFC1738) (Also STD0066) (Status: STANDARD)

[5] RFC 3966, The tel URI for Telephone Numbers. H. Schulzrinne.

December 2004. (Format: TXT=40783 bytes) (Obsoletes RFC2806) (Status: PROPOSED STANDARD)

[6] ETSI EG 202 067, Universal Communication Identifier (UCI); System Framework, Sept. 2002

[7] Object Management Group Unified Modeling Language (OMG UML), Infrastructure, v.2.1.2

[8] RFC 3969, The Internet Assigned Number Authority (IANA) Uniform Resource Identifier (URI) Parameter Registry for the Session Initiation Protocol (SIP). G. Camarillo. December 2004. (Format: TXT=12119 bytes) (Updates RFC3427) (Also BCP0099) (Status: BEST CURRENT PRACTICE)

[9] RFC3508, H.323 Uniform Resource Locator (URL) Scheme Registration. O. Levin. April 2003. (Format: TXT=10983 bytes) (Status:

INFORMATIONAL)

[10] B. Gódor, World-wide User Identification in Seven Characters with Unique Number Mapping, 12th International Telecommunications Network Strategy and Planning Symposium, 2006, New Delhi, India [11] RFC 3761, The E.164 to Uniform Resource Identifiers (URI) Dynamic

Delegation Discovery System (DDDS) Application (ENUM). P.

Faltstrom, M. Mealling. April 2004. (Format: TXT=41559 bytes) (Obsoletes RFC2916) (Status: PROPOSED STANDARD)

[12] 3GPP TS 23.228 (2007-03) Technical Specification Group Services and System Aspects;IP Multimedia Subsystem (IMS);Stage 2 (Release 6)

Balázs Gódor was born on 17 March 1979. He received his MSc degree in Technical Informatics, Budapest University of Technology and Economics (BME), Budapest, Hungary, 2002. He was PhD student at the Department of Telecommunication and Media Informatics of the BME, 2004-2007. His PhD project is: Addressing Structures of Convergent Telecommunications Networks.

He was senior development manager at the Voice Service Development Department of PKI Telecommunications Development Institute, T-Com, Magyar Telekom, Hungary, 2002-2007. He represented the interests of Magyar Telekom at the ETSI and took part regularly in international R&D projects (e.g. EURESCOM projects). One of his major projects was the introduction of the IMS architecture and services in the network of Magyar Telekom. He has been with T-Systems Business Services GmbH, Technical Department, Fixed Mobile Convergence since May 2007. He is responsible for server and client side IMS and FMC related planning and development.

Tamás Jakabfy was born on 17 March 1979. He received his MSc degree in Applied Mathematics, Eötvös Loránd University (ELTE), Budapest, Hungary, 2002. He was PhD student at the Department of Telecommunication and Media Informatics of the BME, 2002-2005.

He was research fellow at Ericsson Research Hungary, 2002-2006.

Afterwards, he was Mobile Network Engineer at Huawei Technologies in Hungary, 2006-2007. His major project was the introduction of a complete IMS control and service architecture in the network of Magyar Telekom, T- Mobile Hungary. Since June 2007 he has been FMC expert with T-Systems Business Services GmbH, Technical Department, Fixed Mobile Convergence.

He is responsible for development of FMC products and for IMS.

Gyula Sallai received MSc degree from the Budapest University of Technology and Economics (BME) in 1968, PhD and DSc degrees from the Hungarian Academy of Sciences (MTA) in 1976 and 1989 resp., all in telecommunications.

He was senior researcher in telecommunication network planning, then research director, strategic executive director, later deputy CEO responsible for telecommunication services with the Hungarian Telecom Company; then international vice president, after that executive vice president for the ICT regulation and scarce resource management with the Communication Authority of Hungary. Recently he is full-professor and the head of the Department of Telecommunications and Media Informatics, as well as the vice-rector of the BME.

Dr. Sallai is the chairman of the Telecommunication Committee of the MTA and the president of the Hungarian Scientific Association for Infocommunications. He is also a member of the Hungarian Academy of Engineering. Recently his main research area is the ICT strategic and regulatory issues. He was awarded with several medals, inter alia the Order of the Republic.

Hivatkozások

KAPCSOLÓDÓ DOKUMENTUMOK

Although the flexible service types (S 1 and S 2 ) are similar to current taxi services, not the combination of distance- and duration-based tariff applied by current

Keywords: folk music recordings, instrumental folk music, folklore collection, phonograph, Béla Bartók, Zoltán Kodály, László Lajtha, Gyula Ortutay, the Budapest School of

Az archivált források lehetnek teljes webhelyek, vagy azok részei, esetleg csak egyes weboldalak, vagy azok- ról letölthet ő egyedi dokumentumok.. A másik eset- ben

A WayBack Machine (web.archive.org) – amely önmaga is az internettörténeti kutatás tárgya lehet- ne – meg tudja mutatni egy adott URL cím egyes mentéseit,

Ennek eredménye azután az, hogy a Holland Nemzeti Könyvtár a hollandiai webtér teljes anya- gának csupán 0,14%-át tudja begy ű jteni, illetve feldolgozni.. A

In this article, I discuss the need for curriculum changes in Finnish art education and how the new national cur- riculum for visual art education has tried to respond to

By examining the factors, features, and elements associated with effective teacher professional develop- ment, this paper seeks to enhance understanding the concepts of

Usually hormones that increase cyclic AMP levels in the cell interact with their receptor protein in the plasma membrane and activate adenyl cyclase.. Substantial amounts of