Support of Third Generation Services using UMTS in a Converging

Transcription

Support of Third Generation Services using UMTS in a Converging
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Report 14 from the UMTS Forum
Support of Third
Generation Services
using UMTS in a
Converging Network
Environment
 UMTS Forum, 2002
i
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
This report has been produced by the UMTS Forum, an association of
telecommunications operators, manufacturers and regulators. The UMTS Forum
comprises IT and media industries interested in broadband mobile multimedia that are
active both in Europe and other parts of the world and who share the vision of UMTS
(Universal Mobile Telecommunications System). These are key industry members of
the Forum and have contributed significantly to this report. In terms of a technology
platform UMTS will move mobile communications forward from today’s environment to
the Information Society incorporating third generation mobile services that will deliver
speech, data, pictures, graphics, video communication and other wideband
information direct to people on the move. UMTS UTRA (Universal Terrestrial Radio
Access) is a member of the IMT-2000 family of standards.
This report has been generated by one of the UMTS Forum Working Groups, the
Information and Communication Technologies Group (ICTG), which addresses the
issues of Services and Applications, Devices, Billing & Charging and Content for the
deployment of UMTS / Third Generation networks.
Report 14 is one of the family members of UMTS Forum reports. It deals with “Support
of Third Generation Services using UMTS in a Converging Network Environment”.
Other outputs from the Forum cover technical aspects, economic conditions, and
licensing issues.
The views and conclusions in this Report are purely those found and expressed
during the work of creating this document and exempts National Administrations who
are UMTS Forum members from being bound to them.
Version 11
Copyright  UMTS Forum, 2002. All rights reserved. Reproductions of this publication in part
for non-commercial use are allowed if the source is stated. For other use, please contact the
UMTS Forum Secretariat, Russell Square House, 10-12 Russell Square, London WC1B 5EE,
UK; Telephone +44 20 7331 2020. Web: www.umts-forum.org
All possible care has been taken to assure that the information in this report is accurate.
However, no warranty of any kind can be given with regard to this material. The UMTS Forum
shall not be liable for any errors contained in the report or for incidental consequential
damages in connection with the use of the material.
 UMTS Forum, 2002
ii
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
TABLE OF CONTENTS
1.
EXECUTIVE SUMMARY......................................................................................... VII
1.1
2.
BACKGROUND .........................................................................................................1
2.1
2.2
3.
SERVICE CONCEPTS AND APPLICATIONS ...................................................................... VII
CONVERGENCE OF TECHNOLOGY AND SERVICES ...........................................................1
A MARKET PERSPECTIVE OF A FUTURE CONVERGING W ORLD ........................................1
CONTENT FRAMEWORK ARCHITECTURE ...........................................................4
3.1 SERVICE TYPES ............................................................................................................4
3.2 CONTENT QUALIFIERS...................................................................................................4
3.3 CONTENT AGGREGATION, DISSEMINATION AND CONSUMPTION ARCHITECTURE ...............5
3.4 FROM DESCRIPTIONS TO CONTENT................................................................................6
3.5 THE USE OF METADATA ................................................................................................7
3.6 PRESENCE TECHNOLOGY ..............................................................................................9
3.7 PRESENCE AND ITS EVOLUTION ...................................................................................10
3.8 MULTIMEDIA CODECS..................................................................................................12
3.8.1 Multimedia Architectures ..................................................................................12
3.8.2 General Multimedia Codecs.............................................................................12
3.8.3 Web Codecs.....................................................................................................13
3.8.4 Multimedia CD-ROM and Presentation Codecs ..............................................13
3.8.5 Hardware and Capture Codecs........................................................................13
3.8.6 Audio Codecs ...................................................................................................14
4.
ACCESS AND NETWORK ASPECTS ....................................................................15
4.1 MOBILE NETWORKS ....................................................................................................15
4.2 FIXED W IRELESS NETWORKS ......................................................................................16
4.3 BROADCAST NETWORKS .............................................................................................16
4.4 SHORT RANGE SYSTEMS ............................................................................................16
4.5 NETWORK SCENARIOS ................................................................................................20
4.5.1 Introduction.......................................................................................................20
4.5.2 Content Sharing ...............................................................................................20
4.5.3 A Return Channel using UMTS........................................................................21
4.5.4 Network Sharing and Terminal Integration.......................................................23
4.5.5 DxB as an Extension to UMTS/3G...................................................................23
4.6 LEGAL ASPECTS .........................................................................................................23
4.6.1 Legal Aspects for Cellular-Broadcasting Convergence ...................................23
4.6.2 Questions Raised on Terminals .......................................................................24
5.
APPLICATIONS AND SERVICES...........................................................................25
5.1 THE COMPONENTS OF A 3G APPLICATION....................................................................25
5.1.1 Basic Elements.................................................................................................25
5.1.2 Privacy and Security.........................................................................................27
5.1.3 Authentication, Authorisation and Accounting .................................................31
5.2 EXISTING STANDARDISATION W ORK ............................................................................33
5.2.1 Main Standardisation Bodies and Specification Providers...............................35
5.2.2 Open Items in Standardisation.........................................................................38
5.2.3 High-Level Requirements on Standards ..........................................................38
5.3 APPLICATION REQUIREMENTS .....................................................................................39
5.3.1 Application Platforms........................................................................................39
5.3.2 Operating Systems...........................................................................................40
5.3.3 Design and User Interface ...............................................................................40
6.
APPLICATION AND CONTENT DELIVERY MODELLING ....................................44
 UMTS Forum, 2002
iii
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
6.1 INTRODUCTION ...........................................................................................................44
6.2 SAMPLE APPLICATION MODELS FOR A MUSIC-ON-DEMAND SERVICE .............................44
6.3 PROPOSAL FOR A REFINEMENT OF THE ANALYTICAL APPROACH....................................47
6.3.1 Levels of Signalling ..........................................................................................47
6.3.2 Differentiation between Audio and Visual Content...........................................49
6.4 3G TRAFFIC ASYMMETRY............................................................................................49
7.
LOCATION-BASED SERVICES..............................................................................52
7.1 INTRODUCTION ...........................................................................................................52
7.2 VALUE AND INFORMATION CHAINS ...............................................................................52
7.3 MULTIPLICITY OF POSITIONING METHODS ....................................................................54
7.4 IMPACT ON NETWORKS ...............................................................................................57
7.5 IMPACT ON TERMINALS................................................................................................58
7.6 RELATIONSHIP BETWEEN POSITIONING TECHNOLOGIES AND SERVICES .........................59
7.7 STANDARDISATION REQUIREMENTS FOR INTERFACES ...................................................60
7.8 SERVICE CLASSIFICATION ...........................................................................................61
7.8.1 Mobile Equipment-Initiated Location Services .................................................62
7.8.2 Third Party-Initiated Services ...........................................................................62
7.9 SERVICE USAGE SCENARIOS .......................................................................................63
7.9.1 General User Perceptions ................................................................................63
7.9.2 Usage Scenario for Navigation Services..........................................................63
7.9.3 Usage Scenario for Friend Finder Service .......................................................64
7.10 CHARGING MODELS ....................................................................................................65
7.11 LEGAL FRAMEWORK FOR 3G LOCATION SERVICES .......................................................66
8.
BILLING & CHARGING ...........................................................................................67
8.1 INTRODUCTION ...........................................................................................................67
8.2 CHARGING AND BILLING PRINCIPLES ............................................................................67
8.2.1 What are the Services that UMTS will Enable? ...............................................67
8.2.2 What are the Charging Attributes to be Used? ................................................69
8.2.3 When is the User Notified of the Charge?........................................................72
8.2.4 What are the Bundling Options? ......................................................................73
8.2.5 How are the Payments Made?.........................................................................74
8.2.6 How is the Revenue Distributed?.....................................................................77
8.3 MOBILE RETAILING (M-TAILING) ...................................................................................77
8.3.1 Introduction.......................................................................................................77
8.3.2 Processes.........................................................................................................78
8.3.3 Value Chain......................................................................................................83
8.3.4 Rating and Charging Attributes ........................................................................84
8.3.5 Standardisation Requirements.........................................................................85
8.4 LOCATION-BASED SERVICES .......................................................................................85
8.4.1 Introduction.......................................................................................................85
8.4.2 Processes.........................................................................................................86
8.4.3 Value Chain......................................................................................................87
8.4.4 Rating and Charging Attributes ........................................................................87
8.5 BROADCASTING ..........................................................................................................88
8.5.1 Introduction.......................................................................................................88
8.5.2 Processes.........................................................................................................88
8.5.3 Value Chain......................................................................................................92
8.5.4 Rating and Charging Attributes ........................................................................93
9.
ABBREVIATIONS AND GLOSSARY......................................................................94
10.
BIBLIOGRAPHY ....................................................................................................106
 UMTS Forum, 2002
iv
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
LIST OF FIGURES
Figure 1.1: Service Scenarios........................................................................................................ viii
Figure 2.1: The Gateway Concept for Service Delivery Convergence ............................................ 1
Figure 3.1: Examples of UMTS Service Types................................................................................ 4
Figure 3.2: Content Aggregation, Dissemination and Consumption Architecture ........................... 6
Figure 4.1: Comparison of Bit Rates and Delivery Mechanisms ................................................... 15
Figure 4.2: Content Sharing and Re-Purposing............................................................................. 21
Figure 4.3: Return Channel with Integrated Terminal.................................................................... 22
Figure 4.4: Return Channel with Separate Terminals ................................................................... 22
Figure 5.1: Main Standardisation Bodies....................................................................................... 35
Figure 5.2: Organisational Relationships in Standardisation......................................................... 39
Figure 6.1: MP3 Downloads in Europe .......................................................................................... 44
Figure 6.2: Music-on-Demand – Streaming Mode......................................................................... 45
Figure 6.3: Levels of Signalling...................................................................................................... 49
Figure 7.1: Information Chain for Location-Based Services .......................................................... 53
Figure 7.2: Role of the Locator ...................................................................................................... 54
Figure 7.3: Classification of Positioning Methods .......................................................................... 56
Figure 7.4: Standardised and Non-Standardised Interfaces ......................................................... 61
Figure 7.5: High-Level Procedures for Friend Finder Service ....................................................... 65
Figure 8.1: Vending Communication via UMTS Network .............................................................. 79
Figure 8.2: Vending Process.......................................................................................................... 80
Figure 8.3: Vending Communication with the Mobile Device via a Local Network........................ 82
Figure 8.4: Vending Machine Scenario.......................................................................................... 83
Figure 8.5: Vending Machine Scenario Value Chain ..................................................................... 84
Figure 8.6: Restaurant Locator Process Example ......................................................................... 86
Figure 8.7: Location-Based Services Value Chain ........................................................................ 87
Figure 8.8: Broadcast Processes................................................................................................... 89
Figure 8.9: Pay per View Scenario ................................................................................................ 90
Figure 8.10: Pay per Session Scenario ......................................................................................... 91
Figure 8.11: Recurring Charge Scenario ....................................................................................... 92
Figure 8.12: Broadcast Value Chain.............................................................................................. 93
 UMTS Forum, 2002
v
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
LIST OF TABLES
Table 1.1: UMTS/3G Service Categories ........................................................................................ix
Table 3.1: The Six Dimensions of UMTS Content Qualifiers........................................................... 5
Table 3.2: Multimedia Codecs ....................................................................................................... 13
Table 4.1: Bluetooth Profiles.......................................................................................................... 18
Table 4.2: Comparison of Key Technical Parameters for Bluetooth, IEEE 802.11 and HomeRF
(SWAP) ........................................................................................................................ 19
Table 5.1: European Standards Development Organisations ....................................................... 33
Table 6.1: Requirements of Content Delivery Models ................................................................... 47
Table 6.2: Estimates of Traffic Asymmetry in UMTS Networks..................................................... 51
Table 7.1: Advantages and Disadvantages of Positioning Methods ............................................. 57
Table 7.2: Relationship between Positioning Technology and Services ....................................... 60
Table 8.1: Broadcast Payment Models .......................................................................................... 92
 UMTS Forum, 2002
vi
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
1. EXECUTIVE SUMMARY
1.1
SERVICE CONCEPTS AND APPLICATIONS
In the near future, any content will be able to reach cellular, Internet or broadcasting
users regardless of the transport path and delivery mechanism. This will create a
single, seamless mass medium that will combine the reach, quality and emotion of
information with the needs of the network user. Increased agility for multimedia
services including those offered on the Internet and other third party sources is what
people are looking for. The challenge is driving multiple data streams over
complementary networks to different types of devices.
Much of the emphasis in this Report is on the convergence of technologies and the
impact on Services, Applications, Content, Devices and Charging. A single killer
application has not yet been identified but it is probable that there are a large number
of them in the market. It is up to the network operator to find the unique one – if at all.
There are two different aspects to future media convergence:
!
New, enhanced services and applications that may be enabled not only by the
joint use of telecommunications and broadcasting networks but also by seamless
and overlapping environments (remote office and virtual homes);
!
Co-operation of broadcasting and telecommunications networks including its
impact on technical, economic, commercial and regulatory aspects.
The same applies to convergence technologies in the access area. Content of
services must appeal to price-insensitive users, but the price must also make them
affordable and attractive to a significant number of price-sensitive consumers. Current
business models for value capture have assumed traditional services that flow linearly
from the network to the user and revenues that flow in the opposite direction. Pricing
(the price the “end customer” pays), charging (the consolidated overall cost of the
product or service to be billed for) and rating (the application and location of product or
service charges, varied by parameters derived independently from both user and
service-specific variables) are going to develop in new and perhaps unexpected ways.
Young people who have grown up surrounded by digital information think about and
seek information differently than their parents. They expect interfaces to be intuitive.
They are accustomed to pointing and clicking, not typing. They want the answers in
packets that are concise, intelligent, and readable from their devices. So information
needs to be smart, concise and loaded with value!
The trend of re-purposing information also means that copyright, as we know it, is
going to get stretched and pulled far beyond its current shape. How do we deal with a
generation of information consumers that is accustomed to freely sharing audio files,
open-source code, and shareware? Do we insert a digital watermark on all data and
then hope to surface it later, when material has been incorporated into an entirely
unanticipated application? Do we try to limit access to copyrighted material? Some of
these issues have been addressed in this Report but a number of questions remain to
be answered.
Compelling services and applications will add value, embed many useful features, and
 UMTS Forum, 2002
vii
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
be easy to use. All this should be immediately apparent to any consumer. Services
and applications also need to be seamless, intuitive, universal and intelligent. Again,
over-expectation should be avoided.
UMTS should not be an embarrassing over-estimation of both technical capabilities
and consumer appetite.
With the help of a few examples the feasibility of services is described in this Report.
The aim is to stimulate discussion and raise issues in all areas in order to be well
prepared for the mass deployment of UMTS services and the future co-operation
between networks.
The UMTS Forum recently published a new Market Study (UMTS Forum Report 13)
which indicates that there are revenue opportunities of up to US$1 trillion
(approximately Euro 1.15 trillion) to be made in UMTS/3G over the next decade. This
cannot happen overnight and will have to be well planned for a graceful ramp-up,
starting with a few common services and gradually moving to the ultimate offerings.
2.5 G
2G
√
√
√
√
√
√
√
UMTS
√
√
Unified
Communications
Instant/Unified
Communications
Ap
pli
Interactive
Se
catGames
rvi
ion
Interactive
s ce
Multimedia
& s
√
Advertising
√
LocationBased
Services
√
Source: UMTS Forum
Figure 1.1: Service Scenarios
The current delivery speeds and tariff rates of GPRS services might not be
appropriate for many future applications. The mobile operator must be able to deliver
an appropriate package of services that will work in a roaming environment, both
nationally and across borders. It’s about being first to develop an end-to-end system,
ultimately targeting mobile devices, which allows provisioning of previously
unavailable services and content to an extraordinary growth market. Most market
studies are based on today’s knowledge combined with a forecast of future
opportunities. It is therefore, important to analyse services, applications and content to
ensure that network capabilities and resources can cope with the delivery of the
predicted services.
It is very important that the evolution from 2G/2.5G to 3G (Figure 1.1) incorporates:
!
A minimum set of services that will work;
 UMTS Forum, 2002
viii
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
!
Revision levels of software across different networks to guarantee interoperability;
!
A sound understanding of rating and charging challenges with appropriate
systems installed.
The UMTS Forum Market Study results show that service offerings will depend on
country specifics and cultural differences. It is important to understand not only how
each market embraces technology but also its approach towards work and lifestyle.
The main service categories identified in the market study are presented in Table 1.1.
Service Category
Rich Voice Simple
Rich Voice Enhanced
Location-Based Services
Multimedia Messaging Service
(Business)
Multimedia Messaging Service
(Consumer)
Mobile Internet Access
Mobile Internet / Extranet Access
Customised Infotainment
Segmentation
Data in:
Business + Consumer
B+C
B+C
B
UMTS Forum Report 13
UMTS Forum Report 13
UMTS Forum Report 9
UMTS Forum Report 13
C
UMTS Forum Report 9
C
B
C
UMTS Forum Report 13
UMTS Forum Report 9
UMTS Forum Report 9
Source: UMTS Forum
Table 1.1: UMTS/3G Service Categories
This report covers four important categories of service offerings and looks at a
framework from which service capabilities could derive. It is not meant to predict the
benefits of any one service or application over another. The intention is to allow for
space to further develop these areas until a better understanding of the market has
been achieved. Two services have been used as examples: 1) Location-based
services, and 2) Broadcasting content. These two give a comprehensive overview that
is relevant to other service offerings as well.
 UMTS Forum, 2002
ix
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
2. BACKGROUND
2.1
CONVERGENCE OF TECHNOLOGY AND SERVICES
Convergence between telecommunications, media, entertainment, IT and computing
is being driven by the undisputed importance of the Internet to the running of business
in the 21st Century. What is less certain is the pace of convergence and the degree to
which it will take place. One can perceive two distinct types of convergence.
The first is understood to be largely due to the rapid convergence between computing,
content and consumer electronics. But it also involves creating new requirements for
the different network platforms that carry the various types of content, for example,
voice, data, audio or video. This convergence within the market place will have an
associated impact on technology, leading to a functional divergence in the core
entities and both functional and technological convergence to some extent over time
in the access area.
Several access and delivery technologies are evolving and emerging in addition to
second and third generation mobile communications systems. Broadband WLAN
systems such as HiperLAN2 and IEEE 802.11x as well as broadcasting systems such
as DAB and DVB exist or are becoming available.
The second convergence type is understood to be on a purely service level, since
heavy network investments have been made in infrastructure and operators and
enterprises will be reluctant to abandon their investments until they have been fully
recovered. However, to be successful in providing converged communications
services, service providers must be able to combine the best of all worlds in terms of
up-time, connectivity, reliability and high quality of service. Both seamless services
and highly competitive tariffs need to be offered.
In all cases major challenges lie in the development and availability of devices. The
process of technological and service convergence in telecommunications, information
technology, and the broadcasting and multimedia industries also poses a number of
significant regulatory challenges.
From a user perspective the main advantage is service delivery at an affordable cost
by the most appropriate available network. Relevant factors include speed of delivery,
content and ease of use.
This Report considers some of the elements required to enable the delivery of mobile
multimedia, services and applications in an increasingly convergent environment. The
report first outlines some of the network environments under consideration. It then
goes on to discuss specific areas, highlighting both technical and legal challenges.
2.2
A MARKET PERSPECTIVE OF A FUTURE CONVERGING WORLD
Driven by the fact that multimedia-capable UMTS/3G networks will be inseparable
from rapid growth in data traffic, operators will seek revenue density to offset capital
costs. As well as enhanced services and applications playing an important role in 3G,
there will also be third party sources of content that meet users’ needs.
 UMTS Forum, 2002
1
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Today, telecommunications and broadcast technologies are very successful and both
are playing an important role in society. The media industry is working towards
content distribution over all possible networks and the emerging UMTS/3G network
could be one of them. If UMTS/3G were to offer the wireless return channel then
Terrestrial Digital Video Broadcasting (DVB-T) and UMTS would be complementary in
terms of service offerings.
However, only a specific set of services could be properly supported. In economic
terms, using cellular networks for multicasting or broadcasting networks for unicasting
may not be an optimal solution. Regulations in certain regions may not allow
unicasting to mobile devices within current broadcast spectrum allocations. The merits
of DVB-T lie in dense areas where it enables efficient usage of spectrum and fixed
networks. In low density areas, it can help in delivering personal services at a limited
deployment cost. This implies that regulations may need to evolve to allow DVB-T
broadcasters to transmit to mobile devices and so enable the delivery of personal
services in low density areas.
Figure 2.1 illustrates an example of a
level between DVB-T and UMTS/3G
Gateway connected to existing content
format to either delivery network. The
other functionality such as:
•
•
•
•
•
•
•
first step towards convergence on a service
networks. With the use of a Convergence
platforms, content could be linked in the right
gateway could also be upgraded to support
Protocol translators and re-purposing of formats (MPEG-2, MPEG-7, MPEG-21);
QoS brokers;
Security, including digital rights management;
Scalability;
Encryption and decryption;
Signalling and positioning (terminal profile);
Screening of content.
The user devices for receiving the DVB-T and UMTS content could be separate but
linked devices.
A further enhancement could be DAB services directly connected to the gateway. This
offers a unique combination and an opportunity for all parties involved to ramp-up their
revenue stream.
 UMTS Forum, 2002
2
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
Content
Aggregation
LBS
User
DxB
UMTS
Forum
UMTS
Convergence
Gateway
MHP
Portals
Internet
Source: UMTS Forum
Figure 2.1: The Gateway Concept for Service Delivery Convergence
 UMTS Forum, 2002
3
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
3. CONTENT FRAMEWORK ARCHITECTURE
3.1
SERVICE TYPES
UMTS networks will be used for many different content types and purposes. The
mind-map diagram in Figure 3.1 shows a non-exhaustive list of possible areas in
which UMTS devices and services may be deployed.
Guide me to
a place
Getting
somewhere
Plam a
route for me
bank
transaction
Vitual Private
Networks
voice call
private
Politics
company
Sports
beacon
Weather
News
manage
bank
accounts
personal
finance
ticketing
price hunt
Emergency
General
Information
mcommerce
shopping
parking fee
automatic
payment
Tourism
information
Book
making
Weather
Local
News
Content types suitable
for mobile devices
drive-in
shopping
FInance
Points of
Interest
Hotels
Traffic
data
transmission
charging toll
Commer
-cial Info
Commer
-cial Info
Local
Information
Tourism
Traffic
Ticketing
Public
Transport
Timetable
have fun
communicate
News
Info
real-time
delayed
voice call
Intenet life
messages
e-mail
video call
listen to
music
SMS
Fax
playing
games
Surfing
voice mail
broadcast
stream
Internet
chat
listen to words
Karaoke
watching video
download
broadcast
stream
Source: UMTS Forum
Figure 3.1: Examples of UMTS Service Types
3.2
CONTENT QUALIFIERS
In order to derive requirements for head-ends, devices and services, it is essential to
categorise service content types in technical terms. Such a categorisation of content
qualifiers involves six dimensions (Table 3.1):
1.
Firstly, services will use different content types, such as video, general audio,
voice-only audio, formatted text, unformatted text, still pictures or a combination.
2.
This will lead to the second dimension: the choice of an appropriate coding
scheme or codec.
3.
A third dimension is the quality of the service, which depends not only on the
service and content types but also on the codec used. For example a “high”
quality for general audio material can be achieved by using MPEG-1 Layer 3
(MP3) at 128 kbit/s or MPEG-2 Advanced Audio Coding at 96 kbit/s or less. For a
video coding scheme, the quality of the service could be described by the
 UMTS Forum, 2002
4
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
resolution (x times y pixels), the frame rate, the colour depth and the compression
factor, resulting in a bit rate.
4.
A fourth dimension is how much delay can be accepted before the service
becomes unusable or, even, unpleasant. For example an emergency call will
need to be handled immediately whereas an off-line email can be allowed to
travel for some time.
5.
The fifth important dimension of content qualifiers is the question of whether rights
are governing the content or service and which digital rights management (DRM)
system is used to enforce these rights.
6.
Finally, the sixth dimension is the scalability of content information.
Qualifier
1.
Content Type
2.
Coding Scheme
(codec)
3.
Content
(Quality of Service)
4.
Acceptable Delay
5.
DRM
6.
Scalability
Examples
General audio
Voice-only audio
Still pictures
Moving pictures
Unformatted text
Formatted text.
MPEG-1 Audio Layer 3 (MP3, for audio)
MPEG-2 Advanced Audio Coding (for general audio) and AAC3
HTML (for formatted text)
JPEG-2000 (for still pictures)
MPEG-4 Visual Main Profile (for moving pictures)
MPEG-7 (for metadata)
MPEG-21 (Streaming Framework).
Bit rate 100 kbit/s (for audio and video material)
Frame rate 25 fps (for moving pictures)
Picture size 100 x 200 pixel (for still and moving pictures)
Colour depth: 24 bit (for still and moving pictures)
Mono (for general and voice-only audio only).
Immediate / real-time
Delay < 3 seconds
Delay < 1 minute
Delay > 1 hour
Content may be lost without much harm.
No rules attached
Rules attached, no technical enforcement
Rules attached, technical enforcement
Regional coding.
Zooming of data information between the users and the server (vector
graphics)
Scalability of images irrespective of source type
Bit map and vector formats that allow scalability of level of detail of the
presentation.
Source: UMTS Forum
Table 3.1: The Six Dimensions of UMTS Content Qualifiers
3.3
CONTENT AGGREGATION, DISSEMINATION AND CONSUMPTION ARCHITECTURE
Figure 3.2 shows a generic Content Aggregation, Dissemination and Consumption
 UMTS Forum, 2002
5
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Architecture. In order for a service to be deployed a service provider needs to ensure
all elements of this framework are working together seamlessly. Some important
aspects of this architecture are:
1. Content authoring — encoding the content into formats understood by mobile
devices and providing the content for streaming and downloading;
2. Content asset management — acquiring metadata for the content elements (e.g.
descriptive metadata and rights associated with the content) and offering such
data to the end user (or his intelligent automated agents);
3. Content re-purposing — automatically selecting the right content elements for the
right device (e.g. selecting a black and white film for a monochrome device while a
device with a colour display will, at the same time, receive a multi-chrome version
of the same content);
4. Edge network delivery — sending the content from the service head-end to the
mobile device and back and asserting that streams are delivered on time;
5. Interaction with content on the mobile device — rendering the content in
accordance with content rights, capabilities and end-user preferences;
6. Digital rights management — ensuring that content is always used in accordance
Edge Network Delivery
Re-Purposing
Asset Management
Content
Content Authoring
with the rules that content owners have established.
Interaction
on Mobile
Device
Digital Rights Management
Source: UMTS Forum
Figure 3.2: Content Aggregation, Dissemination and Consumption Architecture
3.4
FROM DESCRIPTIONS TO CONTENT
MPEG-4 is a standard for multimedia applications that supports the creation of rich,
reusable, interactive, and transport-transparent multimedia content. MPEG-4 enables
the coding of (pictorial) objects and provides a better quality at low bit rates, compared
 UMTS Forum, 2002
6
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
with MPEG-2. MPEG-4 provides authors with standardised tools for creating content
with far greater reusability. It provides network service providers with transparent
information that can be interpreted and translated into the appropriate native signalling
messages of each network with the help of relevant standards bodies; and it provides
users with higher levels of interaction with content, within the limits set by the author.
MPEG-4 XMT provides a textual representation of MPEG-4 content, easing the
presentation using Synchronised Multimedia Integration Language, Extended Virtual
Reality Modelling Language and MPEG-4 players.
3.5
THE USE OF METADATA
In a telephone call, for example, Calling Line Identification (CLI) is a type of metadata;
encoded and transmitted in various and differing ways, with various controls on the
type of information sent and received. CLI is a good way of showing how the provision
of metadata can itself become an important driver that changes the user experience in
the day to day usage of a system. With the advent of IP telephony, and the ongoing
work towards text-based addressing, common user profiles and profile servers,
location-based services, and online directory services, the need for rich and extensible
meta-information at the call set-up phase is becoming more and more important. CLI
within the UMTS environment could take a metadata-driven approach where
information can be provided by the caller, extended or modified by the network, and
provided to the end-user’s handset.
The ongoing work in the MPEG-7 standard to create a system of content descriptions
is about enriching the content with metadata – information about the information that
is being provided to the user to describe the context of the information. The MP3
standard, for example, provides a metadata structure allowing the user to see the
name, album, year, track number, licensing information, comments and other
additional information provided as a part of the MP3 ID metadata.
Taking existing content and providing this to millions of users over a network such as
the Internet, for example, is easy. But finding relevant information has become more
difficult. Search engines usually offer thousands of query results if a user provides
popular or generic keywords; a large part of that problem is that it is still rare for
individuals to describe HTML-page or multimedia content adequately. Data about the
information in a resource, also called metadata, can allow the proper search and
processing of web pages. Metadata shifts the description of the content from the
string-matching level, where one can’t make decisions about a resource’s relevance,
to a conceptual level, where users can semantically describe what they are actually
looking for.
If the user wishes to make further decisions then rich metadata allows the user
interface to provide context and meaning, and deliver additional information. It is vital,
therefore, to ensure that the three fundamental purposes behind providing metadata
are present at every level of UMTS to ensure that content is easily searched for, easily
discovered, and easily identified.
So, metadata, or meta-information, can be defined as information about information. It
can be used for:
•
Abstracting and/or summarising the meaning of data,
 UMTS Forum, 2002
7
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
•
•
•
•
UMTS
Forum
Providing out-of-band information that can be used to allow users to search for the
data,
Allowing users to determine if the data is what they want,
Giving information that affects the use of data (legal, conditions, size, age, etc.),
Indicating relationship with other resources.
When talking about metadata, it’s important to talk about two different aspects. The
first, and most difficult part of the task is ensuring that metadata can be embedded at
every level of operation. There are standards for metadata encoding; for example, the
W3C has developed the Resource Description Framework (RDF), a type of XML
document, which can be used to describe an information object. The RDF format, a
simple and straightforward way of describing what is known as a “directed graph”, is
one of many formats used to store metadata. From this have come applications of
RDF technology such as RSS, a content format allowing the viewer to get “headlines”
from major websites using RDF-enabled applications without actually going to that
website with their web browser. RDF is flexible, adaptable, easily parsed and easily
generated.
The integration of metadata, however, is often technology specific. MP3, being a
binary format, allows for the introduction of information blocks. In this case, metadata
is stored in what is known as an IDv3 block – a metadata structure that, like RDF, is
expandable, but which exists at the beginning of the MP3 to allow for the metainformation to be sent first during streaming, before the audio data. It is specific to
audio and can contain lyrical and various other forms of information.
Unlike RDF, which is a generic technology used to encode any meta-information, the
IDv3 format is both a technical solution and a vocabulary of standard metadata fields.
The second and most important part of the task is to describe the metadata
information required; metadata is inherently application-driven. In order for metadata
to be successful, applications have to know which metadata they can process and
what the intended use of that information is. In the case of standards such as the MP3
IDv3 tags, the information encoded there is specific to audio, and tailored towards
providing interoperability, standardisation, and ubiquity. In a broader sense, one of the
most important initiatives on this front has been the Dublin Core Metadata Initiative1 –
expressible in a wide range of technologies. The Dublin Core is a foundation of
descriptors universal to many types of content and standardised across many different
areas. Information from the title, creator, publisher, down to language and rights
information are a part of the standard ‘dictionary’ of metadata elements and are
designed to be the core foundation behind any content-specific metadata initiative.
Ratification of a standard for using the Dublin Core elements within an RDF document
is imminent.
In the case of call set-up, for example, the caller could provide information as to his
name, company, job title or other personal information (such as that supplied in a
vcard), or supply the public key of the calling individual during authenticated calls. A
text-based addressing system might pass on not only the caller’s number and/or
1
www.dublincore.org
 UMTS Forum, 2002
8
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
location, but also the address text which the user actually dialled, allowing calling
systems to process and act on that information in a context-sensitive manner. The
many applications of metadata represent an important and fundamental improvement
in the usability of UMTS.
Like call set-up, each application within the UMTS environment should be examined to
discover and describe which types of metadata are applicable and useful. It is advised
that UMTS functionality, applications, services, and content use a uniform metadata
standard that can be interpreted and used by the end user in a reliable way. Doing this
means examining each of the protocols and services in use and deciding upon how
metadata information can best be provided, transported, and preserved (in the case of
persistent content).
Creating a standard for all metadata descriptors (the content fields themselves) as
well as the technologies used to deliver that metadata to handsets and the end user
must be immediately undertaken to ensure that delivery of meta-information is
possible within all UMTS functionality.
It is recommended that, wherever possible, RDF be used to represent content to
ensure forward and backward compatibility with schema changes. Where RDF cannot
be used easily, standard formats should be preferred which allow for forward and
backward compatibility of information.
It is recommended that standard metadata schema be created for each application
grouping to ensure that a broad set of standard metadata is available from every
application and handset.
MPEG-7 aims at normalising audio-visual (AV) content description in order to facilitate
information search (by query and/or by filtering). MPEG-7 compliant descriptions are
associated with the content they describe, to allow fast and efficient searching for and
filtering of material that is of interest to the user.
MPEG-7 and MPEG-21 standards will be used for content and description
representation, however, there is a need for further description tools (description of
synthetic objects) in order to provide new functionality allowing the authoring of more
generic and powerful content.
MPEG-J is a set of APIs by which MPEG-4 media players can inter-operate with Java
programs. The idea is that content creators should be able to embed programs with
their media data to enhance the audio-visual session, much as scripts are now
embedded in web pages.
3.6
PRESENCE TECHNOLOGY
Presence Technology is seen as one of the key technologies of the future. Beyond the
rudimentary notion of “on/off” presence associated with Instant Messaging (IM), “Rich
Presence” is technically defined as the subscription to and notification of changes in
the dynamically changing state of a user. The user state consists of the device state
and capabilities, communication addresses, willingness to communicate and
preferences, and the location and status of the user. The concept of Rich Presence
can bring about the ultimate personalisation in communication and has the potential to
 UMTS Forum, 2002
9
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
radically change the way we have communicated for hundreds of years. The following
sections describe the state of Presence Technology.
Rich Presence will represent a disruptive technology in the immediate future.
3.7
PRESENCE AND ITS EVOLUTION
In technical terms, “Presence” is defined as the subscription to and notification of
changes in communication states of a user, where the communication states consist
of a set of communication means, such as communication addresses, willingness,
preferences and the status of the user. As indicated in the previous section, Presence
was first introduced as a necessary prerequisite of IM.
However, capturing a user’s communication state in one network and communicating
it to other networks became a major issue due to the lack of interoperability between
IM vendors. This was one of the main reasons why the IM vendors realised the
necessity for a common and standardised protocol for communicating presence and
related session initiation information. During the last two years several initiatives have
been created to ensure IM interoperability, of which the following four are noteworthy.
!
SIMPLE – SIP for Instant Messaging and Presence Leveraging (SIMPLE) is a
working group formed in May 2001 within the Internet Engineering Task Force
(IETF). SIMPLE is dedicated to producing interoperable standards for services
compatible with the Session Initiation Protocol (SIP) and Common Presence and
Instant Messaging (CPIM). SIP was initially proposed by the IETF group for real
time VoIP activities, such as initiating auto-conferencing between telephones and
computers, and forwarding phone calls to multiple devices including IP devices
such as laptops. Recently SIP was identified to be also used for communicating
presence information by enhancing the SIP standard.
!
PAM Forum – Lucent, Bell Labs and Novell formed this consortium in March 2000
with the objective of establishing and promoting the Presence and Availability
Management (PAM) Forum as an industry standard enabling advanced
communications and messaging services seamlessly across various telephony
and IP networks.
!
IMUnified – IMUnified is a coalition formed in July 2000 to generate a technical
specification to enable functional interoperability and open standards for IM. The
founding members include AT&T, OpenWave, Odigo, Yahoo!, Prodigy and MSN.
The coalition intends to support the IETF developed protocols such as SIP.
!
Wireless Village – The Wireless Village initiative was formed in April 2001 by
Nokia, Ericsson and Motorola to build a community around mobile Instant
Messaging and Presence Services (IMPS). The focus of this initiative is to ensure
definition and interoperability of wireless messaging services. The Wireless Village
initiative wants to support the IETF drafts and build upon the IETF’s work.
It is important to point out that although these forums were all formed with messaging
related interoperability issues in mind, the emphasis on presence technology
increased chronologically with each effort. The IETF concentrates on the protocol
definition that can leverage presence, whereas the PAM forum is focused on the
Application Programming Interface (API) definition for presence, keeping privacy and
availability in mind. IMUnified wants to define the functional interoperability between
 UMTS Forum, 2002
10
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
IM vendors and Wireless Village is dedicated to mobile messaging and presence
technology, including location-based services.
Some companies in the presence space have begun to extend the work of these
organisations with the concept of “Rich Presence,” which is distinguished from the
more rudimentary form of “on/off” presence associated with IM. Rich Presence is
critical to effective communications. In its fullest sense, Rich Presence represents the
aggregation and manifestation of the many attributes of changing user state over fixed
and mobile networks and over many different kinds of communication terminals (e.g.
PCs, PDAs, cell phones, pagers, STBs, ITVs) for use by a host of different
applications (e.g. IM, alerts, interactive gaming, location-based services and unified
communications).
Analysing industry trends in presence, the following conclusions are emerging:
!
!
Rich presence Is critical – With the growing number of devices per user, for
example PCs, PDAs, cell phones, and the choice of communication means, for
example email, SMS, IM, voice calls, rich presence is becoming essential. In short,
the following are some of the main characteristics of rich presence:
− Providing dynamic user state across multiple networks and multiple devices;
− Interfaces with mobility related applications and management systems;
− Automatic sensing and update of user state and subscription information;
− Ensuring privacy and user control;
− Attaining carrier class scalability and maintainability across a large number of
devices and subscribers;
− Assembling the elements and capturing the context of a user.
Presence is unnoticed – Presence is an enabler of applications such as IM, unified
communications and location-based services. The focus of the companies that
own these applications is on the application itself, rather than the infrastructure
that enables it. Most companies do not notice presence, or ignore it because they
consider it as a threat.
!
Presence has the potential to answer the fundamentals – Science is all about
finding answers to six main questions in life: Who, What, Where, When, How and
Why. Today presence technology is attracting attention because it attempts to
answer all these six questions in the communications arena. From the
characteristics described in the previous section, it can be concluded that rich
presence information manifests itself through the elements of user preferences,
profiles, access control, device contacts, dynamic buddy lists and willingness to
communicate.
!
The abstraction capability – Presence has tremendous applicability besides
messaging services and next generation communications. In fact, in the future,
presence technology will influence most aspects of our day-to-day life because of
its power to sense and signal the context, state and willingness to communicate.
This potential of being abstracted and reused across several applications is one of
the key characteristics of any disruptive technology.
!
Rich Presence is the ultimate personalisation in communications – As described
above, Rich Presence provides its biggest value in finding the right person to
communicate with, and the right type of content to communicate, at the right time
 UMTS Forum, 2002
11
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
and in the right format. This maximises personalised communication mechanisms
far beyond any existing technology.
3.8
MULTIMEDIA CODECS
There is no single set of standardised solutions for multimedia distribution. Multimedia
distribution takes place:
•
•
On-line – such as broadcasting, on-line on-demand over various discrete
telecommunication systems or over the Internet.
Off-line – such as tape, CD, DVD or minidisk.
Many of the distribution technologies require their own solutions for content coding
and compression. The technologies in use are partly official standards, partly
proprietary solutions. Some of the technologies most used are listed below. Hopefully
market forces will select a small number of solutions, which will simplify the design of
multimedia devices.
3.8.1 Multimedia Architectures
!
QuickTime: multi-platform, industry standard, multimedia software architecture. To
synchronise video, audio, graphics, text, VR and 3D media for distribution over the
Internet, CD, DVD, etc.
!
RealSystem (RealAudio, RealVideo, RealPlayer): focusing on delivering media
over the Internet.
!
Microsoft Windows Media, DirectShow/ActiveMovie, Video for Windows:
− Windows Media: system for media delivery over the Internet;
− DirectShow: built on DirectX architecture for playback over the Internet, CD
and DVD;
− Video for Windows (AVI): primarily for playback of CD-ROM.
MPEG: as MPEG-1, MPEG-2.
!
!
TrueMotion (VP3): client/server media distribution and streaming technology
(broadband Internet).
3.8.2 General Multimedia Codecs
Table 3.2 lists the various types of multimedia codecs.
 UMTS Forum, 2002
12
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
ITU-T H.323 (v3, 9/1999)
Packet-based multimedia communication systems
(see also H.225 and H.245)
ITU-T H.225.0 (v3, 9/1999)
Call signalling protocols and media stream
packetisation for packet based multimedia
communication systems
ITU-T H.245 (v5, 9/1999)
Control protocol for multimedia communication
ITU-T H.261
Low-quality videoconferencing
ITU-T H.263 / I.263
Medium-quality videoconferencing
Y.poif (ITU-T draft) Global Information Infrastructure Reference Points for Interconnection Framework
(GII)
ITU-T H.450.1 (1998)
Generic functional protocol for the support of
supplementary services in H.323
ITU-T H.450.2-6 (1998-9)
Supplementary services for H.323 (call hold, call
transfer, call waiting, …)
MPEG-4
High-quality and low-quality video and audio
VP3
High-quality variable bit rate video
JPEG
Photographic images (also used in DV standard in
sequential form)
Source: UMTS Forum
Table 3.2: Multimedia Codecs
3.8.3 Web Codecs
!
Sorensen Video: high-quality www video;
!
RealVideo: primary video codec for RealNetwork format;
!
Windows Media Video: primary video codec for Windows Media;
!
ITU-T H.261: low-quality videoconferencing;
!
ITU-T H.263, (I.263): medium-quality videoconferencing (and multimedia);
!
ISO/IEC MPEG-4: high-quality (www) video;
!
VP3: high-quality variable bit rate video;
!
ISO/IEC Photo JPEG: photographic images.
3.8.4 Multimedia CD-ROM and Presentation Codecs
!
Cinepak: medium-quality CD-ROM video (works on older computers as well);
!
Sorensen Video: high-quality CD-ROM video, requires fast computers;
!
Indeo 3: medium-quality CD-ROM video (works on older computers as well);
!
Indeo Video Active (4.5): high-quality CD-ROM, requires fast computers;
!
MPEG-1: high-quality CD-ROM video, requires special hardware or fast
computers;
!
MPEG-2: high-quality CD-ROM video, requires special hardware or fast
computers.
3.8.5 Hardware and Capture Codecs
!
Media 100: codec allows files to be used without capture hardware;
!
VideoVision Studio: codec allows files to be used without capture hardware;
 UMTS Forum, 2002
13
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
!
Avid Media Composer: codec allows files to be used without capture hardware;
!
Truevision: codec allows files to be used without capture hardware;
!
DV: new format where digitising is done by the camera or A/D converter and
software;
!
Apple Component Video: for capture on systems without JPEG hardware;
!
MJPEG (Motion-JPEG): general-purpose video editing and storage.
3.8.6 Audio Codecs
!
MP3 (MPEG layer III audio): high-quality (e.g. www) music;
!
Qdesign Music Codec: high-quality (e.g. www) music at low data rates;
!
RealAudio: several inter-related codecs for www audio;
!
Windows Media Audio: high-quality www music;
!
IMA: 4:1 compression (CD-ROM);
!
Qualcomm PureVoice: speech at 14.4 kbit/s modem data rates;
!
ITU-T G.723: standards-based speech for videoconferencing.
 UMTS Forum, 2002
14
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
4. ACCESS AND NETWORK ASPECTS
Available wireless networks can be categorised into four main areas: mobile networks,
fixed wireless networks, broadcast networks and local wireless networks, here called
short range systems. In many ways these could all be considered as candidates for
co-operative and complementary working.
- Portable & Mobile Pla tforms
DA B
Hi gh
mobil ity
Medium
to low
mobility
DV B-T
Mobility
GSM
DV B-S
Portable
to
residential
GPRS
GSM Edge
3G
DECT
WL AN
802.11
BlueTooth
10
100
1000
10000
100000 kbi t/s
Source: ITU WP8F
Figure 4.1: Comparison of Bit Rates and Delivery Mechanisms
Figure 4.1 shows the relationship between mobility and bit rates in the different
networks. Different networks are suitable for different situations. No one network
covers all situations.
There is a case for considering the options for co-operation between mobile networks,
fixed wireless networks, broadcast networks and short range systems to achieve the
best service to the user with the most cost-effective delivery mechanism to the
operator.
The different categories of networks are considered below.
4.1
MOBILE NETWORKS
This category contains networks such as GSM, PCS and IMT-2000/UMTS. These
networks are licensed networks. They have the ability to offer one-to-one connections
with mobility. They have limited cell broadcast mechanisms, one-to-many. Where
personalised information is required, these networks offer an excellent way of
providing this information. However, where large amounts of data are required or
where the same sort of data is required by many people, these types of network may
not offer the most efficient delivery mechanism.
 UMTS Forum, 2002
15
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Currently 3GPP is specifying enhancements to the UMTS Terrestrial Radio Access
Network (UTRAN) collectively known as High Speed Download Packet Access
(HSDPA). These have the goal of enabling packet data transmission in the downlink
at theoretical speeds of up to 10 Mbit/s. Different methods are under discussion, such
as Advanced Modulation and Coding Schemes (AMCS) or using multiple antennas to
improve signal quality and thus increase achievable data rates. Since some HSDPA
methods are being specified as part of Release 5, it is likely that a commercial
deployment would occur in the 2005-2007 time frame.
HSDPA will have a significant impact on terminals and networks and may be more
feasible in larger devices such as PDAs and laptops. The most likely deployment
scenario will be in hot spots in pico- and microcells.
4.2
FIXED WIRELESS NETWORKS
Wireless local loop, fixed-to-multipoint and point-to-point are some of the networks
that fall into this category. There may be some scope for co-operation between these
networks and UMTS, particularly where UMTS offers a return path.
4.3
BROADCAST NETWORKS
In some countries broadcast systems could have a complementary part to play in the
delivery of content, and UMTS, in turn, could offer a wideband interactive back
channel. Digital broadcast networks will provide distribution services not only for video
and audio (e.g. TV), but also for data (e.g. electronic newspapers, electronic
programme guides, enhanced Videotext).
Migration to digital broadcasting will be a major trend worldwide over the next 10
years. Both digital television and digital radio networks are now available in a number
of countries. Being digital networks, they are capable of delivering a wide range of
content to end users. Depending on the transport medium, high data rates can be
achieved over these networks, for mobile use up to about 15 Mbit/s in 8 MHz.2 They
can deliver to fixed or mobile receivers. Broadcasting networks have generally been
engineered for distribution, i.e. delivering the same content to many users. They may
not, therefore, be effective for use in delivering highly personalised information to a
user in a specific location which requires the addition of a return channel.
4.4
SHORT RANGE SYSTEMS
HiperLAN, Bluetooth, HomeRF, etc. are also seen to be adjunct technologies for
UMTS. Some of these short-range wireless technologies (especially wireless LANs
such as IEEE 802.11x) have sometimes been seen as a competing and sometimes as
a complementary method to UMTS.
Even though WLAN base stations (rather known as “access points”) are inexpensive,
significant acceptance problems by the general population are already merging.
2
For wide area coverage, however, more spectrum would be required for interference-free reception.
 UMTS Forum, 2002
16
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Additionally, WLANs operate in licence-exempt spectrum (e.g. the ISM band at
2.45 GHz), meaning that any operator would need to share the available spectrum
with any other operator, impacting issues such as quality of service and billing.
Furthermore, usage of licence-exempt spectrum for commercial purposes might
require review by regulators.
Wireless LANs are likely to be complementary to UMTS rather than competitive.
Such short-range wireless networks also allow users to intelligently forward voice and
data calls to multiple devices (i.e. ad hoc), including fax machines, voice mailboxes,
and email boxes depending on the user’s location.
Bluetooth technology provides instant wireless connections among devices including
mobile phones, handhelds, laptops and desktop computers. Originally designed as a
cable replacement technology, it has become much more. While wireless phones are
not necessarily part of a Bluetooth network, they fit well, acting as the network
connectivity link (from the briefcase, for example, while the laptop sits on the table). In
the initial Bluetooth phase, the consumer can expect to see wireless data transfer
between mobile phones, PDAs, headsets, MP3 players, game consoles, cameras,
and in-car systems, to name but a few. In the future, Bluetooth will enable consumers
to “hot-wire” their home, office and car to allow constant wireless data transfer and
synching between devices. This means that the user will be able to automatically
access information on a preferred device in a specific location, be it the television
while in the living room, the in-car system while driving to work, the pocket PC while
standing in the elevator, the desktop while in the office, or the wireless earplug while
running in the park. Bluetooth is a natural fit with m-commerce and digital wallet
models as well.
The technology operates in the 2.45 GHz frequency band, designated for Industrial,
Scientific, Medical (ISM) applications and non-industrial applications, which has
become an almost globally available band for short-range licence-exempt operation.
Bluetooth technology is able to transfer data at speeds of up to 721 kbit/s in a
10 metre radius and is designed to avoid interference with other wireless technologies
by implementing high speed hopping schemes (1600 hops/s) and associated power
level control. However, observations at trade shows have indicated conflicts with
802.11 and 802.11b networks.
Bluetooth supports three power levels:3 the lowest power level covers a very small
area around devices (connection between PC and keyboard, mouse, scanner, etc.).
The medium power level provides a range within a room and a higher power level
covers a broader area such as a house. A single Bluetooth network is known as a
“piconet” which consists of a “master” device and up to seven “slave” devices.
Individual piconets can join together to form scatternets in environments such as
airport lounges. But short-range wireless security protocols do not exist and risks of
3
Bluetooth specifies three different classes for transmitting power. Class 1 allows +20dBm maximum output power
and provides up to ≅ 100m reachable distance. Class 2 allows +4dBm maximum output power and provides up to ≅
10m range. Class 3 allows 0dBm maximum output power and provides 1~2m range. Most Bluetooth chipsets support
Class 2 and 3 output power without an external power amplifier. For Class 1, an additional power amplifier is required.
 UMTS Forum, 2002
17
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
viruses and “promiscuous” networks are real.
There are currently 13 profiles defined for specific Bluetooth applications with an
additional 13 under development (Table 4.1).
Profiles already available
Generic Access Profile (GAP)
Service Discovery Profile (SDP)
Intercom
Cordless Telephony
Serial Port
Headset
Dial-Up Networking
Fax
LAN Access
Generic Object Exchange
Object Push
File Transfer
Synchronisation
Profiles under development
Radio2
Automotive
Personal Area Network (PAN)
Wireless LAN (WLAN)
Audio-visual
Still image
Printing
Extended SDP
Local Positioning
Unrestricted Digital Use
Wake Up
Human Input Device (HID)
Video Streaming
Source: UMTS Forum
Table 4.1: Bluetooth Profiles
Bluetooth carries the potential risk that the full system performance cannot be
guaranteed due to the possibility of causing interference amongst all devices in the
ISM band.
The IEEE 802.11 specification is a wireless on-premises LAN standard developed to
specify over-the air connectivity between a mobile device and an access point, and
connectivity among mobile devices. Like Bluetooth, 802.11b operates in the 2.45 GHz
frequency band (ISM), but is capable of providing speeds of up to 11 Mbit/s over a
radius of 50 to 100 metres. Access points are small radio base stations through which
users wirelessly connect to standard networks, and thus to Internet and intranet
content. The access point provides the same functionality as a base station in a
traditional cellular network, but is much smaller and usually only provides coverage of
50 to 100 metres. The form factor for 802.11b devices is currently limited to either a
PCI card or Type II PCMCIA card. In ad hoc networks, mobile devices are brought
together “on-the-fly” without connection to a wired backbone.
These technologies are based on best effort delivery and as such are very difficult to
bill.
Operators willing to use wireless LANs as extensions to UMTS may do so in licensed
bands to guarantee QoS. In this case licence conditions and spectrum allocations
would need urgent regulatory action.
HomeRF focuses on standardising communications between PCs and consumer
electronic devices and has developed the Shared Wireless Access Protocol (SWAP),
a specification for wireless connectivity within a home environment. It is based on a
combination of protocols from DECT for voice communication and IEEE 802.11 for
data communication. SWAP enables users to set up a wireless home network to
share voice and data among PCs, peripherals, PC-enhanced cordless phones and
 UMTS Forum, 2002
18
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
new devices such as portable, remote display pads. The technology is capable of
providing theoretical data rates of up to 11 Mbit/s within a range of 50 to 100 metres.
HomeRF SWAP operates in the 2.45 GHz frequency band (ISM) and uses frequency
hopping spread spectrum technology with 50 hops per second (compared with
Bluetooth at 1,600 hops/second). SWAP network technology can either be configured
on the fly as an ad hoc network of mobile devices or as an infrastructure network with
a fixed connection point that provides the gateway to the PSTN. In an ad hoc network,
only data communication is supported and all devices are considered peers, with
control of the network distributed based on demand and availability. At any point in
time, a HomeRF network can support up to 127 devices consisting of a mixture of
connection points, data devices, and combined voice and data devices.
A summary of the key technical parameters for Bluetooth, IEEE 802.11 and HomeRF
(SWAP) is presented in Table 4.2.
Parameter
Peak data transfer rate
Frequency band
Modulation scheme
Dedicated voice channel
Peak transfer distance
Peak power or current
consumption
Primary modulation
Access control scheme
Security architecture
Bluetooth
IEEE802.11
HomeRF
(SWAP)
1 Mbit/s (effectively
721 kbit/s)
2.45 GHz
Frequency hopping
spread spectrum
(1600 hops/s)
Yes (CVSD or
logarithmic PCM
encoding)
~100m (Class 1)
~10m (Class 2)
1-2m (Class 3)
30mA (TX), 0.3mA
(standby)4
GFSK (Gaussian
frequency shift keying)
None
Standard (certification,
encryption)
2 Mbit/s (11 Mbit/s in
IEEE 802.11b)
2.45 GHz
Direct spread and frequency
hopping spread spectrum
0.8 Mbit/s and
1.6 Mbit/s
2.45 GHz
Frequency hopping
spread spectrum
(50 hops/s)
Yes (ADPCM
based on DECT)
None
~100m (~30m in IEEE
802.11b)
~50m
1W maximum
Not disclosed
BPSK/QPSK and GFSK
GFSK
CSMA/CA
Optional
CSMA/CA, TDMA
Standard
(encryption)
Source: UMTS Forum
Table 4.2: Comparison of Key Technical Parameters for Bluetooth, IEEE 802.11 and
HomeRF (SWAP)
Bluetooth, HomeRF and IEEE 802.11 all work in the 2.45 GHz band, which may
become a bit crowded due to unlicensed general purpose spectrum usage. An
alternative for this problem is the 5 GHz band. Different allocations in the 5 GHz band
have been assigned in different countries around the world. The openness of the
unlicensed spectrum to any user makes interference a serious problem, one not faced
by systems operating in clean licensed bands.
If future convergence is to take place the uncertainties and regulatory issues both in
4
The consumption is based on a Class 3 device.
 UMTS Forum, 2002
19
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
licensing and spectrum may need examination.
4.5
NETWORK SCENARIOS
4.5.1 Introduction
To illustrate the issues surrounding the various types of convergence and network cooperation a number of network scenarios are considered below. These are based on
broadcast networks, however the scenarios could equally apply to other networks.
Many scenarios can be considered for the co-operation between UMTS and DxB5
networks. These range from the simple sharing of content through to the sharing of
spectrum. The following scenarios are considered:
!
Content sharing (broadcast content over UMTS);
!
UMTS as back channel for interactive broadcast services (TV, data);
!
Network sharing and terminal integration;
!
DxB as an extension to UMTS.
4.5.2 Content Sharing
Content providers are usually, or are becoming, agnostic over what technologies and
networks their content is distributed over. The main drivers for this have been the
encoding of much content into digital format and the growth in the number of
distribution channels available to them. Broadcasters are, in many cases, major
content providers themselves. The sharing of content amongst networks is the most
fundamental level at which convergence or co-operation takes place. From a technical
perspective the main area of consideration is the re-purposing of content so that it is
appropriate to the network requesting it. Figure 4.2 shows this type of scenario.
5
Digital Audio Broadcasting and Digital Video Broadcasting.
 UMTS Forum, 2002
20
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
Content
Repurposing
UMTS
Forum
DxB
UMTS
Content
Provision
Return
Channel
Network
Request
Processing
Source: UMTS Forum
Figure 4.2: Content Sharing and Re-Purposing
4.5.3 A Return Channel using UMTS
The use of UMTS as a return channel offers a relatively high bandwidth mobile
interactive channel. ETSI has already specified a number of return channels for DxB
networks; these are GSM, PSTN and ISDN supporting interactive broadcast services.
Work has also been carried out on return channels based on UHF return paths, for
example the return channel terrestrial (RCT).
In this scenario, the UMTS channel allows the user to respond to the information
received via a DxB network. This does not necessarily have to be within the same
terminal. For example, the user may wish to send a short video of themselves for
inclusion in a programme being transmitted via DVB-T or they may wish to take part in
a music vote, via their 3G terminal, taking place on a DAB radio station. Another way
that users interact with programme content is for the broadcast programmes to include
URLs to websites for the viewer to follow. Although the DxB receiver and terminal
could be integrated into the 3G terminal it would equally be possible to enable these
applications on separate receivers. These two scenarios are shown in figures 4.3 and
4.4.
 UMTS Forum, 2002
21
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
Broadcast
Network
Content
UMTS
Forum
DV
B- T
Mobile Network
Operator
S
M T Integrated DVB-T –
-U
UMTS Terminal
G
3
Return Channel
Processing
Source: UMTS Forum
Figure 4.3: Return Channel with Integrated Terminal
Content
Broadcast
Network
DVB-T
Mobile Network
Operator
3G - UMTS
Return Channel
Processing
Source: UMTS Forum
Figure 4.4: Return Channel with Separate Terminals
A UMTS/3G return channel has a number of advantages over other return channels:
!
It has a relatively high bandwidth; this allows the user to send back multimedia
content if desired.
!
It is an always-on service; this avoids the need for call set-up and allows for
instantaneous interaction.
 UMTS Forum, 2002
22
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
!
UMTS
Forum
It is mobile; the mobile nature of the service allows for a user to interact with DxB
services wherever they are received.
Figure 4.3 shows the case where UMTS/3G and DxB services have been integrated
into a single terminal. Aspects of terminal integration are discussed in UMTS Forum
Report 15.
4.5.4 Network Sharing and Terminal Integration
Applications can be designed in such a way as to share the resources of a UMTS
network and a broadcast network. UMTS is used for all personalised information
(point-to-point communication, return channel), whereas the broadcast network is
used for that information which is suited for distribution (one-to-many). In principle,
broadcast networks can also be used for unicasting (download for one of multiple
users) as well, however the DxB resources for unicasting are limited. This would allow
valuable UMTS resources to be available for other revenue earning opportunities.
4.5.5 DxB as an Extension to UMTS/3G
There are a number of ways of looking at this area. DxB (especially DVB-T) could be
considered as an extension of UMTS, where it provides information download that is
in high demand by users, for example this could be electronic newspapers, software,
guidebooks or maps. This would relieve the demand for resources within UTRA.
Another scenario is for the UMTS/3G and DxB networks to share spectrum.
In the extension case, bandwidth intensive information could be routed via a DxB
network for download to a terminal. There are no differences between this scenario
and Figures 4.3 and 4.4. In both cases there is co-operation between the two
networks, but the air interfaces remain separate.
In the spectrum sharing case, the mobile operator would deploy DxB technology
within its network.
4.6
LEGAL ASPECTS
When discussing co-operation between traditional broadcasting services and
forthcoming 3G applications under convergence aspects, complex legal issues need
to be given consideration. Such issues and the potential solutions for legal problems
may differ greatly from one country to another. The UMTS Forum has initiated
respective studies with the aim to provide guidance for consideration and possible
solutions. It will publish the resulting material in due course.
4.6.1 Legal Aspects for Cellular-Broadcasting Convergence
If the two networks, DxB and 3G two-way, are properly co-ordinated, one can say that
from the user's point of view, there is only one service provided. However, from the
regulatory point of view, the two networks were granted two different service
 UMTS Forum, 2002
23
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
authorisations.6 There could also be two infrastructure and two spectrum
authorisations. There is a potential risk that the characteristics of these authorisations
do not fit with the unforeseen new service.
If the 3G return channel were to be used for requesting a point-to-point video the
service rendered to the user should be considered as VoD and therefore considered
outside broadcasting. However, such a VoD mechanism does not seem to be what is
sought for in present convergent services.
If the 3G return channel is simply employed by the user to send a short personal clip
or a vote to the broadcasting entity, this does not seem to modify the broadcasting
nature of the downlink service. Also, clip senders, once their clip has been broadcast
by the broadcasting entity, cannot reasonably be viewed as a broadcaster although
they provided content which, in the end, was broadcast in the downlink.
Although the broadcasting nature of the DxB network is unchanged, in theory some of
the rights or obligations it carries as a broadcaster could be called into question. A
check of the usual categories of provisions in broadcasting authorisation regimes
against those of telecommunications shows that many points require further study.
The conjunction of the broadcasting legal regime and the cellular regime could leave
unsolved, or improperly solved, issues affecting the newly created hybrid service and
the two associated networks. This should be studied further.
4.6.2 Questions Raised on Terminals
Pure broadcasting receivers may have a regulatory regime different from
telecommunications (two-way) terminals, both concerning their placing on the market
and their use. However, in the case of separation the broadcasting receiver is still a
broadcasting receiver, and the two-way radio terminal is still a two-way radio terminal.
So no regulatory problem should arise.
6
These could be either explicit individual service authorisations ("individual licence"), or implicit authorisations under
which, on the one hand, nothing is requested for starting installation or operations, but which on the other hand,
impose various obligations and grant rights to the operating entities ("general authorisations" in EU law).
 UMTS Forum, 2002
24
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
5. APPLICATIONS AND SERVICES
The UMTS architecture supports a wider range of content types and distributed
content provisioning architectures than was previously practical or viable for 2G or
even 2.5G networks. This is achieved mainly through exploitation of the higher data
capacities available to the user and the associated service offerings available in 3G
networks. This enables 3G mobile devices to access network-connected applications
with levels of performance and interaction not possible with previous networks. It is
also reasonable to expect that 3G devices will be able to process and present richer
content through the use of improved device technology, processing performance,
displays, codecs, batteries, etc. While the processing of this content will mostly be
done locally within the device, some media re-purposing or transcoding may be
provided by a network service, often in conjunction with third-party services, thereby
allowing for multiple versions or quality levels of applications to be provided to end
users.
Some of the rich content that will be delivered to third generation devices has
traditionally been delivered over broadcast mechanisms. Some of this content,
especially pay-per-view and subscription services, has been protected by various
means to ensure only subscribers to that particular service can access the content.
The emerging network-based “electronic distribution” of audio and video as
alternatives to the purchase of CDs and tapes, etc., has led to the control of access by
the content owner or originator being investigated through control mechanisms such
as Digital Rights Management (DRM). In traditional 2G and 2.5G solutions,
applications have been mainly user managed, though the emergence of WAP
services and network portals has led to service provider controlled or influenced
content for users.
5.1
THE COMPONENTS OF A 3G APPLICATION
5.1.1 Basic Elements
The device – without these there are no users. The device may be a simple phone or
a smartphone or a data access device for much more sophisticated end-user
terminals like notebook computers or PDAs. The capabilities of handheld devices
such as notebook computers, PDAs, smartphones and phones is increasing rapidly
and shows little signs of slowing down. More information is provided in UMTS Forum
Report 15.
The application service – comprising some form of application server and any other
components necessary to deliver the service’s content such as databases, access to
location information, live information or streamed content.
The network connection between the device and the application service – this
includes many elements, for example:
•
•
•
Over-the-air wireless link;
Network fixed backbone;
Network core components, e.g. MSC, SGSN + GGSN;
 UMTS Forum, 2002
25
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
•
UMTS
Forum
Fixed network between network core and service environment, which may include
one or more intranet or Internet segments.
There are also secondary elements that support the provision of services to users:
•
•
•
•
•
•
•
•
•
Authentication (e.g. HLR/VLR or AAA (Authentication, Authorisation and
Accounting) functions);
Authorisation (e.g. HLR/VLR or AAA functions);
Accounting (AAA or billing subsystem components);
Security;
QoS management;
Location-aware services;
Media gateways;
NATs;
Proxies.
The first four secondary elements are discussed in more detail later in this section. Let
us consider the remainder.
QoS management mainly concentrates on the over-the-air (OTA) segment, the
wireless network backbone, and the Internet or intranet segments of the line between
the device and the application or content server. In practice all of these are required.
The mechanisms to establish QoS through the wireless or fixed network elements are
either well known or being specified.
There is a need to perform some QoS management of applications, application
services and device QoS capabilities.
Location-aware services are considered a significant business opportunity not only for
3G networks but also 2G and 2.5G networks. Location can be determined by a variety
of methods including device only (e.g. GPS), network only (e.g. triangulation), and a
combination of the two (e.g. GPS combined with sensing of multiple base stations
using network services to resolve conflicts). Regardless of the technical mechanisms
for achieving location there are number of non-technical issues. These mainly involve
privacy and preclude network operators or other organisations that determine a user’s
position from freely giving that information away to third parties without the user’s
express permission. The same rules might even apply to the use of location
information by the party determining the position.
The implementation of an abstraction layer at the point of translation of addressing
information at edge network boundaries allows new services to be constructed which
operate by inspecting information about the caller – position, metadata, customer
profile or supplied destination – and supply an appropriate address. This kind of
implementation, which has enabled much of the functionality end users see today on
the Internet through load-balancing, scalability, and content distribution, could be used
tomorrow to provide new kinds of location-based services, alphanumeric or text-based
addressing, and provides a foundation for constructing new services. Standardising on
an abstraction layer for translating a call request through an application which then
provides the actual data to be used to the end user (in a clean API which is simple to
understand and use) will empower application developers to construct new
 UMTS Forum, 2002
26
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
applications and use addressing in new ways.
The field of text-based addressing, currently being pursued by several players, is one
of the most important areas in which abstraction technology can be used to provide a
unique experience to users. This will enable next-generation services, in the same
way that modern content distribution systems utilise the ability of DNS-like servers to
provide an abstraction layer between physical addressing and end-user addressing.
Media gateways are used to convert from one media to another. The most common
media gateway would be a voice codec (e.g. conversion from analogue to digital or
inter-digital standards) or redefining video, etc. from the source standards to those
suitable for the device. There are many other types that either exist today or will
emerge.
The possible use of IPv4 in initial 3G networks and the requirement to be able to fall
back to 2.5G networks, which may also use IPv4, will raise the issue of the use of
NAT (Name and Address Translation) devices. While initially these do not seem to
present application sensitive issues, they have knock-on effects for applications in that
they manifest a consistent mobile device identification since the NAT hides the
device’s real identity. Some embodiments of end-to-end transport layer security are
problematic if not impossible with NATs. The alternative is the use of Proxies but
these have to be application specific, the most commonly deployed proxies being for
Internet traffic using HTTP.
5.1.2 Privacy and Security
5.1.2.1 Privacy
Privacy is defined as “the state of being private and undisturbed” or “a person’s right
to being private and undisturbed” or “freedom from intrusion of public attention.”
Privacy is a right in many cultures, and one that is increasingly being covered by
legislation. The legislation aims to protect a person from other people or organisations
collecting information about that person and using it or giving it away without consent.
It would also cover any information held for the user as this information is considered
private and therefore can only be released with the user’s consent.
Network operators and service providers have the ability to collect significant amounts
of information about users, some of which is needed for the services they provide.
This might include what phone calls were made, to where and when, how much data
was consumed, and perhaps which services were used. Collecting data to determine
improvements in services through data mining techniques demands care unless it is
done anonymously. Using the information for other purposes without express
permission from the user may fall foul of one or more aspects of privacy legislation.
For example the location of a user is considered private information and so the use of
a user’s position to target unsolicited information such as adverts is likely to be
problematic. Similar considerations apply to the release of position information to a
service provider without the user’s authorisation.
Privacy legislation is not universal. The EU, USA, Australia and others have enacted
legislation in this area. The implications for local operators are obvious but for roamed
 UMTS Forum, 2002
27
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
users they are less easy to determine.
Privacy is relevant to 3G operators, service providers associated with operators and
any other service provider that can be reached via the network. The scope of control
for the network covers all the information that the operator of that network holds about
the user.
Privacy and security are often confused. Data being sent between two end points can
be secure (e.g. by the use of encryption) but the fact that data is passing between the
two is not private if the addresses of the end point can be determined. Hence even a
user’s phone number is considered private information and only released with
consent, even if that consent is the default when a user subscribed to a service (e.g.
phone directory listings, calling line ID). IP host names and addresses can be resolved
which could jeopardise a user’s identity or location and many other items can be
considered private when discussing privacy in the context of 3G or any other network.
Standards organisations are working on specifications to meet the needs of privacy
legislation. These come in two parts: the privacy enforcement mechanisms
themselves and the enforcement of policy using those mechanisms. Organisations
such as the W3C, the P3P effort, and others (e.g. XNS) are working on means to
achieve privacy for content but it will be up to network operators and service providers
to ensure that policies meeting local and roamed users’ rights are implemented and
enforced.
5.1.2.2 Security
The provision of security (e.g. encryption of data) is a requirement whenever there is a
need to provide confidentiality.
There are a number of means to achieve the confidentiality or security of transmitted
data including hop-by-hop security and end-to-end security.
5.1.2.2.1 Hop-by-hop security
Hop-by-hop security is security applied to one or several of the hops from device to
application server and to any additional service processes in between such as location
servers. Consider the sort of security that may be available in any part of the chain
from device to application service:
Device – A device may maintain security of content by requiring a PIN for access and
may require further user identification and authentication at other times. Today’s
mobile phones usually require a simple PIN to gain access to the device – the
equivalent of a power-on password. However a notebook computer or PDA often has
further security to identify a user, thereby permitting multiple users or a single user
with multiple personas to use a single device.
Clearly in the first case all information and data stored on the device is considered to
be owned by the device and therefore available to any user or persona with access to
the device. In the latter case the information is much more selective.
There may also be information in the device itself, pertinent to the manufacturer or
 UMTS Forum, 2002
28
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
network or service operator, which should not be accessible by device users.
It is anticipated that 3G devices will emerge supporting all these options.
Over-the-air – Radio link encryption is a means of achieving confidentiality for all
information transmitted between network elements such as base stations, base station
controllers or even the core network and the device. Clearly this is desirable to stop
miscreants from eavesdropping on over-the-air communications.
Network – Within the network (e.g. the backbone, within core functions, inter-roaming
links and right up to the edge-of-network interfaces) there is a need to provide
confidentiality of content wherever there is cause for concern from miscreant
eavesdropping. Many protocols used within network elements avail themselves to the
use of transport level security through mechanisms such as tunnels.
Network to host / origin server / services – The communications between the edge-ofnetwork and the services may also need security. This can be achieved using security
established for user access or, more likely, through the establishment of secure
tunnels of adequate capacity to allow all user traffic to flow in the tunnel between
network and services.
Host / origin server / services – A services environment, whether a single host or
origin server or even a complex of machines providing the service, needs to be secure
from attack by miscreants from both outside and within the service environment. Often
the weakest link is easy access to service machines and the information they contain
by people entrusted with access. Clearly having the means to achieve and audit
access control to vital information is key. Protecting content from miscreant attack or
even accidental change is a given.
Hop-by-hop security needs to be applied wherever there is a need but it is not a
substitute for end-to-end security. There are well known examples of hop-by-hop
security not meeting the needs of businesses for whom security and risk aversion is a
priority, for example applications provided by financial institutions. Any holes in end-toend security will not satisfy the requirements of such users and so end-to-end security
is often if not always required in addition to any hop-by-hop security.
5.1.2.2.2 End-to-end security
End-to-end security is the only way to provide the security levels demanded by the
most critical services, usually those where financial transactions are undertaken such
as applications provided by financial institutions or medium to high value online
purchases. Consider the following options:
Transport layer security – Transport layer security is exemplified by TLS and SSL for
access to content over the Internet. Here a secure interface is provided for
applications at both end points (client and application server) and all content streamed
through this interface is encrypted and transported between the two end points.
Irrespective of the infrastructure between the two end points the data is secure and
any keys exchanged or used to establish the encrypted link are known only to the two
end points. While it is possible for a miscreant to monitor the initial exchange of
information used to establish the tunnel, this should not in itself be enough to
compromise security especially when sophisticated means are used such as
 UMTS Forum, 2002
29
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Kerberos.
Transport layer security may be used by the device and application server or for the
establishment of tunnels for other parts of the link where hop-by-hop security is
provided, even in addition to the end-to-end encryption.
Tunnels are used for at least two common purposes. Firstly they are used to secure a
single hop. The two end points will establish the secure session and all traffic sent
through the tunnel will be encrypted regardless of whether it was already encrypted.
Where a tunnel is being used to carry multiple user traffic the users’ data packets are
wrapped by the packet structure of the tunnel and the payload is encrypted. The
receiving end simply decrypts and removes the wrapper before sending the packet to
its destination.
Secondly the term is used to describe the operation of an HTTP proxy when being
used to handle HTTPS requests on behalf of clients. The standard operation of a
proxy is to take the request, make the resulting HTTP fetch for the client, then return
the response to the client. It is considered important to do this, firstly because this can
be a means to allow users of an intranet to access the Internet, shielding the intranet
from attack when used in conjunction with a firewall. Secondly, because the fetched
content might be cached for performance reasons. However such a process is
undesirable for secure content and so HTTPS directs the proxy not to use its standard
behaviour but to tunnel the data between client and server without alteration. Hence a
client can establish a secure and unique connection to the server through a proxy and
firewall.
PKI – Public Key Infrastructure is a means of providing certificate management and
verification for services. PKI is a complex process. By using PKI and the managed
issuing and verification of certificates a client can verify the server is who it claims to
be and vice versa. This is becoming an increasingly important ingredient of
transactions involving payment or non-repudiation.
IPSec is a technology for encrypting IP packets. It differs slightly from the transport
layer security described above which presumed the TLS or SSL was using TCP/IP.
IPSec can therefore be used by any service operating over a UDP/IP or TCP/IP
transport and offers similar security. IPSec is an additional feature for IPv4 but a
standard feature of IPv6. IPSec has a requirement for an associated PKI.
Issues on end to end security – There are some issues associated with the
establishment of end-to-end security using various network elements.
The use of NATs has well documented strengths and weaknesses. The weaknesses
arise from the scalability and impact of end-to-end security.
While proxies are widely used as an alternative to NATs to permit access to the
Internet from intranets guarded by firewalls they are application specific. Hence HTTP
proxies are common but equivalent proxies for other protocols such as Telnet or
SMTP are less common. HTTP proxies have the capability for secure communications
using HTTPS while the secure versions of other protocols are either not specified or
not widely deployed.
 UMTS Forum, 2002
30
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
5.1.3 Authentication, Authorisation and Accounting
Authentication, Authorisation and Accounting (AAA) servers have been used in
networks for many years, often being used to fulfil functions with other names such as
HLR. 3G networks will see widespread deployment of AAA servers but the function
may become split or become proxied if the scalability of the network is to cope with
the predicted volumes. This is most likely as the need to combine the complexity and
granularity of the users’ preferences, the management of service access rights, and
charging for services, time and data volume becomes more apparent.
5.1.3.1 Authentication
Authentication is the process of verifying that a user or entity is who they claim to be.
For example a user verifies his or her identity to a SIM using a power-on PIN. The
phone or device is authenticated to the network using the IMSI, etc. So why go to all
this trouble?
Users and operators would not want a device to be used by anyone other than the
owner or a person trusted by the owner, mainly for reasons of billing accountability.
The network operator would not want too many calls repudiated by users. The
power-on PIN achieves this. However the PIN is not sufficient to identify a persona or
user identity. This is beyond most current wireless network and device technology
specifications. So there is a need for authentication beyond the simple relationship
between the device and the PIN.
Authentication is necessary to establish the identity of the user unequivocally for the
purposes of accountability and non-repudiation. Authentication may be needed for the
following cases:
!
User – The identity of the user may be required. This may be assumed to be the
current situation with the presumption of a one-to-one relationship between device
and user. Clearly the user identity is required for subscribing to services,
especially personalised services.
!
Caller – This may be the person calling the user of a mobile device from outside
the network. There may be good reasons for identifying callers but issues of
privacy may preclude this.
!
Persona – A user’s persona may depend on where they are at any given time, for
example at work or at leisure. For many users there may be a single one-to-one
relationship between user and user persona. But for users of more intelligent
wireless devices there may be at least two persona, for example work and leisure
with PIM, address books and many other functions including services and access
to VPNs, depending on the active persona. Again, identifying the persona being
used is critical for subscription and delivery of personalised services.
!
Pre-subscribed – Pre-subscribed access to network and content services may be
directly related to authentication. For example, any user belonging to a user group,
whether closed or open for general subscription, may have a set of services
available as a direct consequence of belonging to that user group.
!
Organisation – This is very similar to the pre-subscribed case except the
‘organisation’ establishes a set of services for all members of that organisation, for
 UMTS Forum, 2002
31
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
example access to the organisational intranet or VPN. Such cases do not preclude
the ability to use the same subscriber management systems to enable additional
general services outside those of the organisational intranet or VPN. When there
are multiple personas or identities and organisational issues to be managed there
needs to be a means to switch from one to another. For example, in normal
working hours it may be reasonable to have a ‘working’ persona established. But if
the user is out of context, say in working hours but not at work, then there may be
several options such as working but away from the normal location, on holiday, or
away sick. The switch from one to another may be by:
− Locale – for example at the office, away from the office, near home or
somewhere remote. It is possible that a network agent can be used to help
manage this based on profiles.
− Time – for example working hours or outside working hours.
− Active selection – the user may choose to switch from one identity to another.
5.1.3.2 Authorisation
Authentication involves checking the identity of the user. Authorisation involves giving
express permission for a user to use one or more services.
For example, mobile users normally require the ability to make and receive voice calls.
When a user wants to make a call his authorisation to do so is checked before the call
is processed. Similarly a user may elect not to receive incoming calls for some reason.
An incoming call to the user’s number could be checked to see whether the user has
authorised this in a profile before the call is established. Similarly for data calls or
sessions.
As networks become more content services centric rather than bearer services centric
similar authorisation becomes necessary for these services. Service level
authorisation may be on a per-service basis, or a per-service destination basis (e.g.
URL domain) or any one of many other options.
Where quality of service is deployed the user may be authorised every time a request
for a demanded quality of service level is given by the user’s device. The authorisation
may depend on available capacity, the user’s tariff basis or status (e.g. low tariff basis
but a loyal and trusted user) or any other criteria.
Authorisation may be used to achieve both affirmation of availability of service to the
user or to block or screen a particular service from a user, for example gambling from
under-age users or those who have expressed a desire to have such services
blocked.
While authorisation is likely to be mostly applied to a user’s request to access services
it can also be applied in reverse, for example a service confirming a user’s access or
continued access to available services.
There may be situations where an operator or an agent does not apply authorisation,
such as for services provided with a default authorisation for all users. However the
general case for higher value services is expected to involve authorisation and where
the services involve third parties there may be several authorisation processes, for
example user to access the service provided by the service provider or service
 UMTS Forum, 2002
32
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
provider to network operator to ensure payment for such services.
As mentioned in the section on authentication it is the authenticated user that is
authorised and not the device. This allows differentiation between different persona
and billing for services through the knowledge of the persona and the billing
information.
5.1.3.3 Accounting
The Accounting portion of the AAA, or its equivalent function, is vital as it collects the
usage information in readiness for billing.
With authentication and authorisation taking place the scope for repudiated usage is
remote. However, accounting records that generate good audit trails will minimise
risks still further. Of course the accounting function involves storing a user’s usage,
which is personal information and therefore subject to privacy legislation discussed
earlier.
Where services are identified by URLs it is important that these are checked during
the authorisation process as it is possible for miscreants to intercept addresses
resolved using names alone. This is one reason for the best practice of using real IP
addresses in URLs for critical purposes even though this has its drawbacks in terms of
service flexibility.
Roaming is an issue especially where the AAA of the visited network is being used for
accounting purposes and then these records are transferred to the home network.
Services may be charged differently depending on whether they were completed
successfully, partially completed, not completed at all or reverse charged. An example
might be a Yellow Pages directory lookup. The cost for no service may be nothing, the
cost for a successful lookup in the directory but with no hits matching the user’s
criteria may be an apportioned charge, and for a completely successful search a full
charge may apply. Reverse charging may result from an advertisement sent to a user
of a particular service or could be used as a mechanism to credit the operator from the
service provider where such business models are employed. Using such approaches
the same accounting portion of the AAA can service all the operator’s accounting for
service billing and crediting for users or service providers.
5.2
EXISTING STANDARDISATION WORK
This section focuses on global Standards Development Organisations (SDOs).
Regional organisations are mentioned only when there is no appropriate reference to
a global body. The official regional standards development organisations in Europe
are listed in Table 5.1 with reference to the appropriate global body.
European SDO
ETSI
CENELEC
CEN
Relevant global body
ITU-T/R
IEC
ISO
Source: UMTS Forum
Table 5.1: European Standards Development Organisations
 UMTS Forum, 2002
33
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
ETSI allows for direct company membership and participation, whereas CEN and
CENELEC only allow national standards organisations to participate, whose delegates
are mostly people from the industry.
Technical development and specification provision is increasingly performed by fora
and consortia that submit specifications to standards development organisations for
the final standards making process.
Standards are generally technical specifications that the relevant market players have
mutually agreed to use. In most cases this is to ensure interoperability between
various networks and services. GSM and UMTS fall into this category. A number of
other standards are in place to avoid disturbance between services and to ensure
safety of use.
In traditional telecommunications systems for voice and data all standards were based
on standardisation work done in ITU-T/R and regional standards bodies. These
systems were mainly based on point-to-point communication of voice and data. The
standards basically included specifications on transport, signalling, management and
voice coding with well-specified quality of service. Standards for data transport over
the voice communications systems were also developed. A data transport standard
generally includes references to all standards in the end-to-end solution.
In the media distribution world of radio and TV, better known as broadcasting, a much
broader standardisation work was necessary. This included chromatography,
photography, various signal coding and compression systems, and standards for a
number of different distribution systems and receiver equipment. The standardisation
work was not confined to one standards body but involved almost all standards
organisations.
The Internet is a new transport system that has its own, different standards. These are
mainly developed in IETF and W3C.
Figure 5.1 shows the main standardisation bodies in the media end-to-end system.
 UMTS Forum, 2002
34
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
ISO
JT C1
IEC
(ITU)
ISO
JTC1
IEC
JTC1
ISO
IEC
IT U
W3C
WAP
MHP
IEO/JTC1
ITU
IET F
DVB
DA B
JTC1
ISO
IEC
ITU
IEEE
ITU
IETF
D VB
D AB
UMTS
Forum
ITU
IET F
DVB
DA B
Tr an sp ort
Vid eo
C opy righ t
Billin g
Ch ar gin g
Priv acy
Ot her
“da ta ”
Inte grity
Serv ice
Inte r face
In tern et
GSM
HT ML
U MT S
WA P
TV
XM L
Rad io
Qu ick T im e
F ixed W
Loca l
Are a
N etw ork
Blu eto oth
WLA N
Us er
Inter face
Co din g
Pic ture
G ra phic
Co m p re ss ion
Sec urity
Saf ety
Us er
E q uip me nt
Au dio
P ow e rl.
1 3 94 P OF
Et c .
F ixe d WL
Power l.= power line
Source: UMTS Forum
Figure 5.1: Main Standardisation Bodies
5.2.1 Main Standardisation Bodies and Specification Providers
5.2.1.1 Telecommunications
The ITU is the global body for telecommunications standardisation. The main regions
of the world have their own standardisation bodies, such as ETSI for Europe. In
general a telecommunications standard includes the full end-to-end system with
interworking standards for the various carriers. The necessary codecs are often
specified by the ITU although available standards from bodies such as ISO, JTC1 and
IEC may be adopted. These are often given their own ITU numbers but with a
reference to the original.
In order to create a global set of 3G standards, where commonalities and
harmonisation are considered as far as possible, the regional standardisation bodies
have set up a joint development platform; 3GPP – The Third Generation Partnership
Project.
5.2.1.2 Broadcasting
Standardisation work in the broadcasting and audio-visual sectors often specifies the
entire end-to-end system. There may be many components related to various types of
content in one data stream, for example video, audio, service information related data
and other data. The reference list may become rather large in such cases.
The reference standards are often from content pick-up, the data and transport signal
processing, the transport itself and the receiver specification. Due to multiple service
 UMTS Forum, 2002
35
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
modes, a standard generally consists of a set of standards for the various options.
Global interoperability standards have been developed to ensure global content
distribution and exchange of source material between content creation, wholesale
servers and broadcast content service provision.
5.2.1.3 Content-related standardisation
A number of standards have been developed to ensure portability of content.
Standards on basic technologies such as cinematography, photography and acoustics
are developed and standardised by ISO.
Digital media uses a number of signal coding, compression and presentation systems
and technologies, which are developed by the ISO/IEC Joint Technical Committee,
JTC1. JPEG, MPEG, MHEG are examples of these. Standards for magnetic media,
optical disc systems and interconnection of IT equipment are other examples.
5.2.1.4 Internet-related standards
The Internet is, in general, not officially standardised. Internet specifications are
developed in a number of groups. The Internet Engineering Task Force develops the
various Internet data transport mechanisms, content and data processing parameters,
etc. The specifications are issued as RFCs (Request For Comments). If they prove to
be accepted they achieve a fixed status, otherwise they are usually cancelled.
Users normally access the Internet via a graphical user interface. Standards groups
such as W3C and the WAP Forum develop the techniques and standards for handling
content from the Internet and its presentation to the user. Examples of such standards
are HTML, XML and SyncML.
The International Corporation for Assigned Names and Numbers organisation
(ICANN) deals with the distribution of Internet related names and numbers. Each
region has its own agency related to ICANN and most countries have a national
organisation, NIC, for dealing with the distribution of such names and numbers.
5.2.1.5
General standards
There are a numerous standards that are non-technical by nature. Examples are
ergonomics (ISO) and graphical symbols (IEC).
5.2.1.6 Transaction-related standardisation
Transaction-related standardisation includes data security and privacy standards.
Electronic data transport, Edifact, electronic signatures, etc. fall within the ISO
domain. In addition to CEN there is an open workshop structure, ISSS, open to all
market players to participate in creating new technologies, mostly related to the CEN
working area.
 UMTS Forum, 2002
36
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
5.2.1.7
UMTS
Forum
Components and subsystems
A number of standards related to components and sub-assemblies are in the IEC
domain such as LCD, CRT, fibre optic components and systems, and connectors.
5.2.1.8
Receivers, recording and related equipment and audio subsystems
A large number of standards are available for terminals, recording systems, audiovisual subsystems, cable systems, colorimetry, etc.
5.2.1.9
Programming languages, operating systems and APIs
5.2.1.9.1 Programming languages
Many programming languages are in use today. Some of these languages such as
Java are standardised. Most of this category of standardisation work belongs within
ISO.
5.2.1.9.2 Operating systems
In principle there are no standardised operating systems. Most products use
proprietary operating systems, but an increasing number of systems are based on
open source code, which allows for proprietary operating systems based on open
source. In order to run applications independent of the operating system, standardised
service-specified APIs are used, which again may be standardised. An example is the
DVB MHP.
5.2.1.9.3 APIs
For joint utilisation of services and networks, a number of new standardised APIs and
interworking systems have to be developed. These are often related to data transport
across network boundaries and hence belong to the ITU/ETSI domain. In some cases
they only specify the data conversion but for more complex systems they also include
content scalability and conversion specifications.
5.2.1.10 Regulatory use of standards
At the time they are adopted by standardisation bodies standards are applied on a
purely voluntary basis. However, once adopted, some standards can be made
mandatory by regulatory authorities. For example, the TV Directive states that when a
fully digital television system is used it has to comply with a standard adopted by a
recognised European standardisation body.
Other standards on products, while not made mandatory by any authority, can have a
"regulatory use" in the following sense: If a product is conformant to the standard the
product is automatically assumed by authorities to be conformant to the regulatory
requirements. An example is the RTTE Directive which sets the regulatory
requirements of radio or telecommunications terminal equipment in non-technical
terms (in natural language) and creates a mechanism for formally referencing a
number of technical standards translating these "high level" requirements in precise
technical terms.
 UMTS Forum, 2002
37
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
However, in principle, manufacturers are allowed to design their own proprietary ways
of fulfilling the directive level requirements, provided they establish a convincing
technical file and consult the relevant authorities.
At the world level, IEC-65 is an example of technical requirements on electrical safety
for consumer electronics products. IEC-950 performs the same role for IT equipment.
Another example is standards for EMC and immunity, including specifications on
measuring methods. These standards have been adopted by ETSI and CENELEC
and are now European Norms labelled EN-50065, 50950, 50013 and 50020.
5.2.2 Open Items in Standardisation
In addition to sector specific standardisation there is a need to specify requirements
set by the convergent use of services over and across different networks such as
UMTS, DVB, DAB, WLANs and home bus systems. Standards for content, local
storage systems, etc. also need to be considered.
5.2.3 High-Level Requirements on Standards
The convergence and joint utilisation of multimedia capable networks and services
requires new approaches in technical development and standardisation in order to
allow for seamless service portability and end-to-end interoperability.
Requirements have to be set for content and service scalability to match user
equipment requirements, seamless multimedia roaming between different networks,
and new approaches to optimise spectrum usage for joint utilisation.
Top level dialogue between relevant market players needs to be established involving
participation by organisations such as the European Commission, regulatory
authorities, UMTS Forum, GSM Association, DigiTAG, EBU, DVB Project and EICTA.
Global aspects must be taken into consideration as services become more global.
This is also true for the rapidly growing use of the Internet and other IP-based
solutions, where IP issues urgently need to be addressed.
The organisational relationships between the different standardisation organisations
are illustrated in Figure 5.2.
 UMTS Forum, 2002
38
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
BCDF
W3C
IETF
Standards
Organisation
- ISO
- IEC
- JTC1
UMTS Forum
DAB
DVB
3GPP
Media technologies
WAP
Forum
MPEG
MHEG
MHP
Applications/
service
industry
User equipment
manufacturer
MSF
Infrastructure
manufacturer
- ITU-T/R
- ETSI
- ARIB/TTC
- ANSI T1
etc.
MWIF
Network/
telecom service
operators
Billing
E-commerce
Copyright
Safety
etc.
Products / Applications
Internet technologies
Source: UMTS Forum
Figure 5.2: Organisational Relationships in Standardisation
5.3
APPLICATION REQUIREMENTS
5.3.1 Application Platforms
The new generation of cellular systems, UMTS, will not achieve the same coverage as
existing cellular infrastructure overnight. For a period of time there will be gaps in the
coverage offered by the new UMTS service. To alleviate this problem many device
manufactures will adopt a hybrid solution incorporating a combination of GSM, GPRS
and UMTS technologies within the same product.
Adopting this solution will provide a viable means of filling the gaps in the coverage of
UMTS. This solution will have some impact on power consumption, complexity and
size of devices. However, during this time period proof of concept for data services
(applications) utilising GSM or GPRS can take place while UMTS completes coverage
and deployment of higher data rates.
To provide these data applications an applications processing environment must exist.
There are several approaches that can be adopted. One is to use a proprietary
software solution.
A second approach would be to use a de facto standard approach such as Java
(J2ME). Java can provide an easy route to application development, an element of
hardware independence and a wide base of application developers to create
applications programs.
Too many application platforms will lead to a less rich choice of services for the
 UMTS Forum, 2002
39
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
consumer.
5.3.2 Operating Systems
The Operating System (OS) is the core of a wireless device. The operating system
software runs at the lowest level, integrating applications and hardware much the
same way as a Windows NT or Unix system integrates a desktop computer's
hardware with its software applications. The operating system provides six main
functions:
!
Control of the display;
!
Control of the keyboard or keypad;
!
Integration of applications and application programming interface (API);
!
Power management;
!
Allocation of memory resources;
!
Provisioning of processor time.
While there are several operating system players on the market, three major vendors
are driving development and amassing dominant market share. Microsoft is promoting
its WinCE operating system targeting handheld PCs, PDAs, and auto PCs, while Palm
remains focused on its proprietary Palm OS platform for PDAs and smartphones.
Symbian, a joint venture between Ericsson, Nokia, Motorola, Matsushita (Panasonic),
and Psion Software is promoting its EPOC OS targeting smartphones, communicators
and PDA devices.
As devices start to converge we expect competition in the operating system
marketplace to increase – and ultimately far greater standardisation as the industry
matures. Heterogeneity at the operating system level has so far contributed to the
slower-than-expected adoption of mass-market wireless data services. Yet the
operating system is only a low value add on compared with the applications that run
on it. Again, the key in the operating system marketplace is to develop a robust
standardised platform with a well-defined API that will spur the emergence of broad
support from third-party application developers.
5.3.3
Design and User Interface
There are three key functions that are critical to an engaging user experience on a
mobile device: the operating system, the display and the manner of user interaction.
The operating system is at the core of the device and manages performance and
applications integration. The display is probably the most essential component to the
user, in terms of screen size, graphics, and the ability to run full-colour applications.
The last critical element is the user interface, which includes voice, keyboard, mouse
or track wheel, and/or stylo pen.
5.3.3.1 Application execution platform
Requirements for transportable application environments (write once, use many times)
include provisions to allow basic security, PKI, inclusion of a privacy environment,
multimedia support, graphic and audio loaders, support for personal information
 UMTS Forum, 2002
40
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
managers and synchronisation software.
5.3.3.2 Operating systems
Real time operating systems and non-real time operating (threading) systems for
application software (EPOC, Palm OS, WinCE, etc.) must support user application
software whilst managing the complex real time UMTS processes. This means that it
is unlikely that a real time operating system could cope in the early phase of discrete
terminal construction.
5.3.3.3 Content rendering (xHTML, XML, etc.)
HTML is focused on displaying documents not manipulating data. Just as HTML
“made the web the world’s library,” eXtensible Markup Language7 (XML) is proving to
be the language of choice for m-commerce software development and is particularly
powerful in applications with the following characteristics:
•
•
•
Requiring data to be constructed once and presented in multiple formats for
different devices;
Requiring heterogeneous databases and operating systems to communicate in
EAI, transactions, and messaging;
Requiring detailed search results.
Given the pervasive influence of enterprise IT spending on network and applications
build out, and given that personalised, location-specific mass market m-commerce will
at some stage explode across the data landscape within the next couple of years –
XML adoption is a critical component to the wireless build out.
The ability to query databases and manipulate information in XML makes it key to ecommerce. Unlike HTML, content in XML documents is flexible and can be displayed
in multiple ways. This is because content structure in XML is separated from
presentation – an XML document only describes content or sets its structure. The
ability to give meaning to content distinct from its presentation is a key advantage of
XML over HTML. By identifying content through XML’s more descriptive tags (or with
new, customised tags), content is effectively given meaning and can then be more
usefully stored, transmitted and filtered by databases. An adjoining file called a style
sheet determines XML’s formatting. Two types of style sheet languages can be used –
CSS (Cascading Style Language) which is more versatile and only used with XML, or
SGML. Once a style sheet is attached to an XML file it can be translated to HTML and
displayed over the web.
The ability to create and define new tags makes XML a meta-language like its parent,
SGML. As a result, different sectors such as the financial and automotive industries
can decide on customised XML tags specifically used to describe their own products.
Putting this in the right context to run over a network and be delivered to a user’s
satisfaction on his device is a major challenge.
7
A markup language presents data or content through a series of tags, which are essentially presentation instructions.
Tags are used to “mark up” content, through which content can be identified and formatted.
 UMTS Forum, 2002
41
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
!
Some schemes allow existing Internet material created for use in the current
Internet hardwired world to be reused in the wireless world on terminals with
different display characteristics. The microbrowser is similar to a Netscape
Communicator or a Microsoft Explorer but different in that it is optimised for
handheld devices with limited power, memory, and processing resources. While
most operating systems generally provide a related microbrowser, the trend
towards open standards has forced manufacturers to allow different browsers to
run on their platform. There are currently four main manufacturers of
microbrowsers: Openwave, Microsoft, Nokia and Neomar – three of which also
provide a wireless Internet gateway in conjunction with WAP services. The
existence of different microbrowsers raises the issue of limited, segmented mobile
content. This in turn is linked to the limitations of WAP and the interim status of
stripped-down wireless markup languages such as WML, HDML, and c-HTML,
whilst the broader Internet is being driven by sophisticated e-commerce demands
into the more powerful XML. A number of exciting enterprise-oriented private
companies are moving to an XML/Java platform.
!
The biggest question at this point in the microbrowser wars is whether to focus on
traditional Internet-based standards such as HTTP and HTML or something else.
Currently xHTML provides a bridge to an XML-based functionality.
!
VoiceXML or VXML (Voice eXtensible Markup Language) is a markup language
designed to make resources on the web accessible by phone. A content developer
could use VXML to retrieve an audio file and play it. The basic idea is to let users
query web servers and access web content using phones and their voices. One
dials into sites and uses a voice browser to interact with Internet or intranet
applications hosted on web servers. The browser uses speech recognition in order
to interpret the request, which it then translates into the relevant URL. The web
server responds with a VXML page, the browser interprets this page and plays the
relevant audio file.
5.3.3.4 DxB related applications
Digital Audio Broadcasting and Digital Video Broadcasting form the basis of the next
generations of radio and television systems. 3G cellular systems could provide a
mobile return path to enable interactive TV or radio adding the dimension of ecommerce.
5.3.3.5 Automotive applications
3G cellular systems have the capability to provide not just voice and data
communications links to vehicles but also positional information. Many services could
be provided to subscribers.
5.3.3.6 Applications-enabled plug-in devices
The use of PC cards or other plug-in peripherals can provide additional functionality
and enable new services and applications to be created.
5.3.3.7 Toolkits
There are many toolkits available and this does not satisfy the overall objective of
 UMTS Forum, 2002
42
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
having a harmonised user interface. The use of standardised toolkits could make life
easier.
5.3.3.8 Input / output capabilities
5.3.3.8.1 Ad hoc or intermittent connectivity
Terminals will require the synchronisation of information with existing office and
personal data. Access can be provided through a variety of technologies and the use
of personal information management (PIM) application programs.
5.3.3.8.2 Peer to peer
In the future it will be possible to share information and resources with other cellular
users in the network and with those connected to the Internet or intranet using peer to
peer techniques. Local peering could use IrDA, Bluetooth and wireless LAN to share
with other non-wireless devices.
 UMTS Forum, 2002
43
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
6. APPLICATION AND CONTENT DELIVERY MODELLING
6.1
INTRODUCTION
It is important to understand the different possible mechanisms for the implementation
of applications and the delivery of content in order to advocate a range of rich
applications and services.
Many different models can be thought of for giving end users control over applications
and content. Specific business models may drive some of these models; in any case,
they will place varying requirements on device capabilities and on signalling protocols
used for communications between the terminal and the UMTS network.
The following example is used to help clarify this point.
6.2
SAMPLE APPLICATION MODELS FOR A MUSIC-ON-DEMAND SERVICE
The UMTS Forum has identified entertainment and in particular, music on demand, as
one possible application to be offered over UMTS.
Many handset vendors are toying with ways to include MP3 download capabilities in
terminals. Figure 6.1 illustrates that this is seen as a potential source of revenue.
40%
37%
2,5
33%
32%
32%
Number of music downloads via Internet
in Europe in millions
2,2
1,2
0,6
24%
1,4
23%
Surfers in percentage
9,5
20%
18%
0,7
14%
1,9
1,9
2,0
2,1
Spain
Russia
Portugal
Sweden
Germany
Poland
Holland
Italy
France
UK
Source: 20/01/Focus
Figure 6.1: MP3 Downloads in Europe
When designing how such a music-on-demand service could be offered to the end
user the following options for content delivery could be considered:
1.
The user has only the ability to listen to a music clip and does not have the ability
to store it in his device. The user could be charged a very small usage fee or
 UMTS Forum, 2002
44
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
could retrieve the clip free of charge in exchange for listening to an
advertisement. The content delivery model described here could be denoted as a
"streaming mode" since data is only streaming into the terminal and is not being
stored permanently.
2.
The user has the ability to download music clips and to store them permanently in
his terminal. In this case the user would pay a price that is equivalent to the value
of a clip on a CD (e.g. 2 Euro8). This can be considered a normal mobile
commerce transaction and the content delivery model could be denoted as a
"download mode". The user could perhaps listen to the clip while it is being
downloaded although this would be a device-specific feature.
3.
Another option would be for the end user to purchase the clip via a normal
transaction but to leave the music file on the service provider's server. The
purchased clip could either be retrieved later at the user’s convenience or could
be stored permanently with the service provider being always available wherever
the user is located. The delivery model is a "streaming" mode in this case but the
business model is clearly different to the one identified in option 1 ("purchasing"
instead of "renting").
4.
The last model is a combination of options 1 and 2. A user-friendly feature of a
music-on-demand service could be to allow the end user to listen to extracts of a
music clip or to listen to the entire clip free-of-charge (but only once). While the
user is listening to samples of music clips, the streaming model applies. The
device does not permanently store the music files and is not allowed to do so.
Once the user has chosen a clip and paid for it the download model applies; the
device is then allowed to store the file permanently.
Listen Only
Service Model
Streaming
Business Model
Downloading
Rent
Free-of-charge
Free-of-charge
Buy
Select Clip
Terminal Authentication
(I assure that I shall not store your data)
Audio Stream
Source: UMTS Forum
Figure 6.2: Music-on-Demand – Streaming Mode
8
20.00 Euro could be considered a typical price for a CD. If a CD contains 10 titles then the price for one title (or one
clip) is 2.00 Euro.
 UMTS Forum, 2002
45
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
These different delivery models and combinations have different requirements on
technologies and standards:
1.
The pure streaming mode illustrated in Figure 6.2 has a low requirement on the
device's storage capability. However, the streaming model must somehow be
"enforced"; in other words, some form of device authentication is required
whereby the device asserts to the network that it will not permanently store the
music file. This is a very specific application-driven requirement on signalling
protocols used between the terminal and the network.
2.
The download mode may have large requirements on the storage capacity of the
device. The device would probably need to signal to the server how much storage
capacity it has. This would allow the server to revert to option 3 (storage in the
server for later retrieval) if the user's device should have insufficient capacity.
Here the signalling of very specific device-related information to the network is
required. Even though this is application-level signalling, such signalling must be
standardised in order to allow the user to choose different content providers
(much as it is easily possible today to tune into different radio stations).
3.
The third model has the least requirements on devices and signalling. Once the
user has purchased a clip he can listen to it whenever he wants and the device
does not need to worry whether it is running out of capacity or not. Furthermore,
the requirements on the local storage capability of the device are comparatively
low.
4.
The fourth and last model has the most complex requirements. At first, when the
device is operating in streaming mode only, the device must assert to the server
(via a form of device authentication) that it will not permanently store the incoming
music file. Furthermore, the user himself must be authenticated to the server (e.g.
based on the user's IMSI) in order to ensure that the user is not abusing the
service (listening to a sample several times). Next, the server must be able to
inform the device when it must operate in streaming mode and when it is allowed
to operate in download mode. Finally, the device must have the ability to inform
the server that it is running out of local storage capacity and to revert into a
"server-based storage mode".
Table 6.1 summarises these special requirements. In the table, macro-payment refers
to the purchase of a product (eventually via credit card), whereas micro-payment
refers to the payment of very small amounts (of the order of cents) which would be too
expensive as credit card transactions for the service provider.
These are very different models for the delivery of content which depend on the
business models being pursued by service providers. If service providers cannot
agree on a common model to use (which is very likely), a specific signalling of the
content delivery model to the device will be required.
 UMTS Forum, 2002
46
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
Feature / Model
Terminal
Authentication
User
Authentication
Capacity Limit
Signalling
Macro-Payment
Micro-Payment
Streaming Mode
Download Mode
Model 1:
"Listen Only"
Model 2:
"Buy and
download"
Model 3:
"Buy and don't
download"
UMTS
Forum
Model 4:
"Try and buy"
Mandatory
-
-
Mandatory
-
-
-
Mandatory
-
Optional
-
Optional
Mandatory
Mandatory
-
Mandatory
Optional
Mandatory
Mandatory
Mandatory
-
Mandatory
Mandatory
Mandatory
Source: UMTS Forum
Table 6.1: Requirements of Content Delivery Models
The content delivery models used by service providers could very well depend on the
capabilities of devices for the first generation of devices. As an example, it may be
expected initially that lower cost terminals will have only limited local storage capacity,
which would mandate a streaming mode delivery model (options 1 and 3). Over time,
as terminal capabilities and audio compression technologies improve, service
providers may evolve into more complex forms of content delivery such as the one
described in option 4.
Current devices are designed for voice and data is being ‘forced’ on them. It can be
expected that devices will change in nature and become more of a platform either with
resident applications or just enough logic to trigger or download what is required. The
next generation of devices will become much more powerful in their capabilities.
Issues that have an impact on the application and content delivery models being
considered include display size (pixels) and power consumption. Such device-specific
parameters will also influence which client/server models to adopt (should the device
be a thin or fat client, and how thin or fat should it be?) and the operating system or
middleware platform necessary in order to realise the applications.
The way streaming applications are being implemented today on the Internet is
unlikely to be applicable to the "mobile Internet" world. Within the confines of the fixed
Internet a multitude of proprietary applications exist for the delivery of multimedia
content. These require dedicated plug-ins loaded into the fixed user's browser
software (e.g. Real Network's RealPlayer, Vivo Player, Microsoft's Media Player).
Certain applications (e.g. audio streaming) require a basic set of features that need to
be standardised. Any additional application-specific features could be downloaded
onto the device, for example in the form of appropriate Java applets.
6.3
PROPOSAL FOR A REFINEMENT OF THE ANALYTICAL APPROACH
6.3.1 Levels of Signalling
Different levels of signalling protocols can be identified which have a varying impact
on standardisation requirements. Specifically the following levels can be identified:
 UMTS Forum, 2002
47
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
!
Network-level signalling refers to communications between the device and the
network that are necessary for transmission of data, for example setting up radio
bearers or specifying the QoS to be used over the air interface. Standardisation
work at this level is primarily undertaken by 3GPP.
!
Application-level signalling refers to the signalling necessary between the mobile
device and an application server residing in the network. Note that at this level, the
application server could be owned and managed by the mobile operator or it could
be owned by a third party content or service provider (e.g. a bank in the case of a
mobile banking service). At this level, the signalling could either be standardised
or proprietary. The latter option would be facilitated by the fact that applications
may be downloaded onto the device via a 3G network. The terminal could
download an application from the network that has been specifically developed by
the content or service provider; the communications between the client and the
server would and could then be proprietary. In this case, it would be important for
the application to be able to access device and network-specific information via
standardised APIs.
For individual functions the required signalling could be proprietary or
standardised. Under such circumstances it may be desirable to have a common
application execution environment.
!
GUI (Graphical User Interface) control refers to service features which can be
directly controlled by the end user, for example via interaction over a web page
using an appropriate GUI. As an example, "indication of charge" is a feature that
could be stored as part of the user's personal profile to enable the user to receive
charging information. This is a feature that could (and should) be enabled and
disabled by the user. This could be done via specific buttons implemented on a
web page. This form of control does not require any specific standardisation since
the control information being transmitted from the mobile device to the application
server is embedded as a payload in standard HTTP messages (or whatever
application layer protocol for content transport is being used).
In a similar way other types of signalling can be foreseen for content QoS and
interoperability.
Application and network-level signalling are hidden from the user whereas the user
can control user-level signalling. Application-level signalling might require
standardisation whereas user-level signalling does not require standardisation in
general. See Figure 6.3.
 UMTS Forum, 2002
48
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Application Server
[+ Content Database]
GUI control
GUI
Application-level signalling
(standardised/proprietary)
Application
APIs
Network
UMTS
Network-level
signalling
Source: UMTS Forum
Figure 6.3: Levels of Signalling
The following question needs to be answered for every feature in order to determine
the specific level of signalling required: "Is feature xyz a feature that the user should
be able to control, or is this a feature that must be under the control of the network or
application server?"
6.3.2 Differentiation between Audio and Visual Content
Most future 3G services will be data services and will require the display of content in
visual format (text, pictures, video) via an appropriate GUI in order to enable the user
to interact with the service. However, some 3G services could be offered in voice-only
format (including delivery of web-based content using new forms of content formatting
such as VoiceXML) which would be more appropriate for drivers of vehicles for
example. The level of control a user can exercise over service features using audioonly control is likely initially to be more limited than by using visual means. This leads
to the necessity for differentiation of both forms of content delivery while analysing
signalling requirements. The following concrete example demonstrates this.
Translation services (including translation of web-based content) will be a key feature
of future mobile Internet services, especially relevant for roaming users. A user
logging on to a foreign network for the first time could be offered several language
options. Such an approach is hardly feasible for an audio-only service. To improve the
chance of the user understanding the audio content, the application server of the
foreign network could determine the user's origination country using their IMSI. This
would require the application server to gain access to network specific information.
While the first option does not require standardisation (the choice of language is
implemented via "GUI control") the second option may (e.g. definition of an API that
allows application logic stored in the terminal to access the user's IMSI and to
communicate it to the application server).
6.4
3G TRAFFIC ASYMMETRY
3G environments enable a wide range of applications, which have very different data
 UMTS Forum, 2002
49
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
traffic profiles. 3G systems allow asymmetric services far beyond those possible in
previous systems. The symmetry and capacity demand for these services will also
vary from market to market and network to network in different regions. Knowledge of
3G traffic asymmetry will assist in refining future spectrum utilisation calculations and
will also give industry guidance on new compression and software optimisation
techniques required. Signalling, delay tolerance, resource management and QoS in
the network and transmission paths also need to be taken into consideration.
Some examples of 3G data traffic:
!
Messaging – conventional simple messaging applications such as SMS text,
through to full multimedia messaging applications;
!
Internet Browsing – access to Internet content from established WAP or basic
HTML browsers can be extended to the rich experience of the workstation or PC
with the limiting factor being that of the device’s user interface.
The number and range of applications, coupled with the richness of user experience
available for those applications, gives a wide range of likely data rates and volumes
that are required. Many of these applications are very asymmetric. There are
scenarios for typical envisioned applications, which can be evaluated with respect to
data traffic flows. Many applications described have a very high ratio of data traffic to
the device but very low data traffic from the device. Knowing this ratio, and the likely
distribution of applications with similar traffic patterns, is important for network element
capacity planning and may also have handset design implications.
Traffic associated with originated or received data is not the only data traffic that must
be considered. If security and authentication mechanisms become common in usage,
complex, and possibly verbose this may well add to the data traffic profile and affect
the up/down ratio. Estimates of traffic asymmetry in UMTS networks are presented in
Table 6.2.
 UMTS Forum, 2002
50
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
Application
description
Richness
Messaging
Browsing
Examples of typical data up /
down for each application
Simple text
M*160 chars / N*160 chars; M, N low
for most applications / messages
Rich text
<2 Kbytes / <5 Kbytes / message e.g.
email
Multimedia
< 1 Kbytes / <10 Kbytes / or vice versa
per message e.g. email + attached
small thumbnail image etc.
<1 Kbytes / 1.5 Kbytes per
transaction; <0.5 transaction / sec;
text browsing
WAP v2
Simple HTML
<1 Kbytes / 10 Kbytes per transaction;
<0.5 transaction / sec; text + limited
graphics
Rich HTML
<1 Kbytes / 30 Kbytes per transaction,
< 0.5 transaction / sec; text + graphics
Sound download
e.g. MP3
<1 Kbytes / 1 Mbytes/min of sound,
typically 2.5-3.5 MB for pop music
Multimedia clips
Simple
< 1 Kbytes / 75 Kbytes; consumption
of ~5Kbytes/sec
Rich
<1 Kbytes / 300 Kbytes; consumption
~ 20 Kbytes/s
Low quality
<10 kbit/s / <10 kbit/s
High quality
>40 kbit/s / >40 kbit/s
Basic
(whiteboard, etc.)
Very dependent on mode of
collaborative working.
Estimate: between low quality and
high quality video format
Videophone
Collaborative
working
UMTS
Forum
Asymmetry up /
down; rate
1:1 typical;
Expected range 0.2:1
- 5:1
Rate: low
~0.4:1
Rate: low
Range 1:10 < 10:1
Rate: low
1:1.5
Rate: frequent during
session
1:10
Rate: moderately
frequent during
session
1:30
Rate: moderately
frequent during
session
1:2500+
streamed content or
download
1:75 via download or
streaming
Rate: infrequent
1:300 via download or
streaming.
Rate: infrequent
1:1
Rate: infrequent –
continuous during
video format sessions
1:1
Rate infrequent –
continuous during
video format sessions
1:1
Rate: infrequent –
approaching
continuous during
sessions
Source: UMTS Forum
Table 6.2: Estimates of Traffic Asymmetry in UMTS Networks
 UMTS Forum, 2002
51
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
7. LOCATION-BASED SERVICES
7.1
INTRODUCTION
Previous sections have covered general capabilities such as security and content
coding that UMTS applications will need to provide. A large number of future 3G
applications will make use of additional network capabilities, the most prominent being
the use of location information. The wide range of possible location-based services
and the complexity of the implementation of such services warrant specific
consideration, which is the scope of this section.
According to research from numerous market analysts, location will be among the key
functionalities supporting future GPRS and 3G service offerings. 3GPP has done
some work in identifying possible methods to enable networks and terminals to
acquire positioning information. However, current standards are still far from being
able to provide a complete solution from which location-based services can be built.
This is especially the case when independent third-party service providers provide
location-based services, since 3GPP's work is rather network operator focused.
This chapter highlights the negative impact different co-existing positioning
technologies is likely to have on networks, devices and services, and the benefits to
all parties of global standardisation of positioning technologies and the interfaces
between the various parties involved.
7.2
VALUE AND INFORMATION CHAINS
For long-term success, UMTS will need to provide the same level of open access to
services as the Internet currently does for fixed services. Freedom of choice has been
a major success factor of the Internet, as well as a strategic choice made by NTT
DoCoMo when launching its i-mode service. This lesson should also be applied to the
way location-based services are enabled by network operators.
While operators might offer their own location-based services (including applications
that have been developed in-house), they will find that selling positioning information
to third-party service providers could represent an additional source of revenue.
Indeed, some operators may opt not to provide such services themselves, because
they lack the necessary resources and skills, and may choose to outsource service
delivery to an external provider and agree on appropriate revenue sharing schemes.
The value of location information (i.e. its 'price') delivered to service providers will be
influenced by the enhanced value of the service as well as by the cost of substitute
technologies such as more expensive GPS-enabled handsets or street-level
positioning based on information entered by users themselves.
Usage of location information by network operators for commercial purposes must
abide by local regulation. Some regulatory environments require the user to give
consent to the network operator for such use of location information. End users could
be motivated to give their consent by being offered “special deals” such as reduced
tariffs for voice calls or other services.
 UMTS Forum, 2002
52
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
#
Location-based
content/service
Bearer
Services
Location
Information
Locator
'
%
$
UMTS
Forum
Service
provision
Network
Operation
&
Billing/Usage of
network resources
Source: UMTS Forum
Figure 7.1: Information Chain for Location-Based Services
The value chain for location-based services (sale of location information from network
operator to service provider) focuses on revenue streams between the different
participants. The information chain depicted in Figure 7.1 highlights what type of
information needs to be exchanged between the participants of that value chain.
In Figure 7.1 content provision and aggregation are understood to be within the
service provision domain. The information chain should be interpreted mainly from a
functional perspective; for example, network operation and service provision could be
performed by one and the same commercial entity. The interfaces required within the
service provision 'domain' are not specific to location-based services, but locationbased services do place specific requirements on the interfaces between mobile
equipment, network operation, service provision and locator.
Whereas the network operation function provides bearer services to the mobile
equipment, the service provision function provides the actual content or service. The
information chain also contains an element specific to location-based services, the
locator function. This function is responsible for performing the necessary radiospecific measurements (and therefore requires access to elements of the network
infrastructure) and provides the results of the computation of these measurements to
the service provision function in the form of location information.
Traditionally, it would be expected that the locator function is embedded into the
network infrastructure and is therefore part of the network operation function.
However, the locator function could be implemented as a separate commercial entity.
Such a company would install and manage additional hardware in several mobile
networks and sell the positioning information to the associated network operators.
This would have the advantage that several base stations from different network
operators could be used for positioning measurements (sharing of infrastructure) and
network operators would negotiate the delivery of location information with one single
company. This locator function would be particularly relevant for the OTDOA9
positioning method, since in Assisted GPS and Cell ID one base station is sufficient
9
Observed Time Difference of Arrival.
 UMTS Forum, 2002
53
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
for the provision of the service.10
Network
Operator 2
Locator
Network
Operator 1
Network
Operator 3
Source: UMTS Forum
Figure 7.2: Role of the Locator
An open access model to services requires the definition of interfaces and message
flows between the various participants of the information chain – illustrated in Figure
7.2. Procedures such as authorisation and charging are required between the
operator and the provider, whereas exchange of location and measurement
information may be required between the terminal and network. The specific
requirements on standardisation are detailed in Section 7.6.2.
The open distributed model described in this section might raise some concerns with
regards to the handling of users’ privacy rights. Sophisticated mechanisms might need
to be put into place to ensure that the end-user’s privacy is not breached.
7.3
MULTIPLICITY OF POSITIONING METHODS
UMTS Forum Report 11 discusses a number of technologies by which the position of
a mobile terminal can be obtained. Positioning generally consists of two main
functions:11
!
Measurement Function (MF) – whereby either the terminal or a number of base
stations measure radio-link specific parameters (e.g. signal strength, time of
arrival); alternatively, the terminal may scan for and detect GPS signals and
extract required information from the beacons of at least four GPS satellites.
10
A-GPS uses one base station to provide differential data to the mobile terminal, whereas the position of the terminal
in Cell ID is determined based on the ID of one cell, i.e. base station.
11
Note that these functions are generally irrelevant to Cell ID, since positioning based on Cell ID is an intrinsic feature
of cellular networks.
 UMTS Forum, 2002
54
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
!
UMTS
Forum
Position Calculation Function (PCF) – where some functional entity either in the
network or in the terminal uses the signal measurements to produce a position
estimate of the terminal.
The multitude of methods that are being proposed, promoted by individual companies,
and standardised generally can be classified according to where signal measurements
and position calculations are executed. This leads to the following categories of
positioning methods (Figure 7.3):
!
Mobile Station (MS)-based – the terminal performs both signal measurements and
position calculations and so is able to determine its position independently of any
network operator. Examples of terminal-based positioning methods include GPS
and Assisted GPS (A-GPS); in the latter case, the required assistance data is
provided over a non-3G network (e.g. the information could be broadcast as part
of Non Programme Associated Data (NPAD) in a DAB "ensemble"12).
!
Network-assisted – most of the position determination process is implemented in
the terminal, however, the terminal gets support from the network. An example is
Assisted GPS where the terminal receives correctional data via the network from a
reference GPS receiver; this data enables the terminal to take into account the
deviation of the terminal's internal clock from the clocks in the GPS satellites in
order to improve positioning accuracy. Another example is OTDOA (Observed
Time Difference of Arrival) where the network provides the terminal with the
necessary information to account for the fact that internal clocks of different base
stations may not be synchronised.
!
MS-assisted – the position calculation function is implemented in the network and
signal measurements are performed by the terminal. Typical examples are E-OTD
(Enhanced Observed Time Difference) for GSM and OTDOA (Observed Time
Difference of Arrival) for UMTS.
!
Network-based – all functions related to positioning are implemented in the
network. The best known example is Cell ID, which actually does not require
signal measurements since it is an intrinsic feature of mobile networks. The
accuracy of Cell ID decreases with increasing cell size from several 100 metres to
several kilometres. The location accuracy of Cell ID may be improved by using
sectorised antennas. Some location-based services such as location-based billing
have already been implemented using Cell ID. Another example of a networkbased method is TOA (Time Of Arrival) where the time of arrival of access bursts
from a terminal are measured at three different base stations.
12
A DAB ensemble contains audio programmes, data related to the audio programme (PAD – Programme Associated
Data) and optionally other data services (NPAD – Non Programme Associated Data).
 UMTS Forum, 2002
55
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
Terminal
MS-based
Network -assisted
MF
MS-assisted
MF
UMTS
Forum
Network
GPS, A-GPS
OTDOA, E-OTD
PCF
Network-based
MF
PCF
TDOA
PCF
TDOA, Cell ID, AOA
MF: Measurement Function
PCF: Position Calculation Function
Source: UMTS Forum
Figure 7.3: Classification of Positioning Methods
Many different ways exist for determining the position of a terminal and many methods
show similar performance in terms of accuracy. As discussed in Section 7.5, some
methods have significant impact on terminal complexity and hardware. Other methods
have a more significant impact on network infrastructure (Section 7.4). The existence
of a multiplicity of positioning methods is likely to be an inhibitor rather than an enabler
of the market for location-based services, for the following reasons:
•
•
Unless manufacturers and operators agree on common standards, which should
preferably minimise the number of solutions, the multitude of different methods will
not enable manufacturers to achieve the economies of scale necessary to be able
to offer low-cost solutions to consumers. As a result, positioning technologies will
either not be deployed or will be deployed for niche markets, due to the high cost
of the technology.
True global roaming will be inhibited if too many solutions exist in the market. A
frequently quoted example of a typical location-based service is the "Tourist
Guide" service. Naturally, it can be assumed that most users of the Tourist Guide
service will come from a foreign network. If the visited network does not support
the same technologies as the home network, and the user has a terminal
implementing only those solutions deployed in the home network, the user
logically will not be able to use the Tourist Guide service. Global roaming will
therefore be inhibited.
It should be further noted that most UMTS networks are likely to provide only limited
national coverage. This has an impact on the way location services are delivered
since a close relationship exists between the positioning technologies deployed and
the radio access technology used. Service continuity between 2G and 3G networks
has been recognised by standardisation bodies as a key requirement that needs to be
fulfilled. This should also be applied to location-based services.
The future success of location-based services will depend strongly on agreement
within the industry (mainly manufacturers and operators) on a common set of
solutions for positioning.
In the market for location-based services two scenarios will exist. In the first scenario,
operators and manufacturers agree on a common solution for positioning which
means that some technologies will ultimately lose. In the second scenario the
multiplicity of solutions will remain, which will mean that most players in the market for
 UMTS Forum, 2002
56
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
location-based services will lose. The second scenario will require these players to
provide services designed for multiple positioning methods, thereby incurring
additional development costs or delivering different quality of service.
7.4
IMPACT ON NETWORKS
All the positioning methods described above have advantages and disadvantages,
which are listed in Table 7.1 for those methods that have been identified by 3GPP as
valid options for UMTS.
Method
Cell ID
OTDOA
A-GPS
Advantages
Disadvantages
Minimum upgrades required in the
network.
Eventually no upgrades required in the
terminal.
Cheap way of getting reasonable accuracy
in pico-cells.
Operator has full control on ownership of
location information.
Higher accuracy possible than with Cell ID.
Minimum impact on terminal (mainly
additional software required).
Network operator has stronger control over
ownership of location information than in
A-GPS case.
High accuracy when line-of-sight with GPS
satellites is possible (outdoor).
From users’ and third-party service
providers’ perspective, position information
is not owned by network operator.
Accuracy decreases with increasing cell sizes,
and may vary typically between a few hundred
metres to several kilometres.
Significant upgrades required in the mobile
network infrastructure.
Variable accuracy depending upon location of
base stations, location of the user and timevariable radio propagation effects.
Operator has no control over ownership of
location information.
Increased complexity in mobile terminals.
Low accuracy in indoor environments.
Accuracy may also be limited in urban areas
with high-rise buildings.
GPS may not always be free-of-charge or
available.
Source: UMTS Forum
Table 7.1: Advantages and Disadvantages of Positioning Methods
!
Cell ID has the lowest impact on networks since it is already a feature of cellular
networks. Upgrades may only be required to establish the necessary applications
architecture to handle the cell-ID-based location services. Its most significant
disadvantage is its low accuracy compared with other methods. Note, however,
that many location-based services (particularly general information services) might
not require high positioning accuracy (see also Table 7.2). Note also that 3G cells
will be smaller than GSM900 cells and could even be deployed as pico-cells with
coverage of a few hundred metres to provide access in areas of high traffic density
(hot spots).
!
Observed Time Difference of Arrival (OTDOA) has a more significant impact on
networks. In many cases, software upgrades will be required in almost every 3G
network element. In some cases new hardware might also be required, such as
Location Measurement Units (LMUs) to measure time of arrival at a reference
receiver located at a known position and Gateway Mobile Location Centres
(GMLCs) to handle positioning requests from outside the 3G network (e.g. from a
third-party service provider). However, OTDOA enables the operator to better
control what happens with positioning information than in the case of A-GPS.
 UMTS Forum, 2002
57
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
!
UMTS
Forum
Assisted GPS (A-GPS) has the highest degree of accuracy, as long as the user
has direct line-of-sight with at least four GPS satellites. Accuracy reduces
dramatically in indoor environments. The impact on the network is also minimised.
Operators might only have to install a few reference GPS receivers to produce the
correctional data required by the terminals and upgrade software to handle the
signalling required to transfer this information to the terminals.
But the operator has less control over what happens with the positioning
information. Once the terminal has determined its position using the correctional
data, it could transmit it transparently (i.e. without the knowledge of the operator)
to a third-party service provider for further processing. "Selling" correctional GPS
data might not be a workable business model, since this data could be also gained
– eventually free-of-charge – by other means (e.g. using DAB).
7.5
IMPACT ON TERMINALS
Positioning methods based on GPS have the most impact on terminals. GPS
integrated terminals are already available in Japan. Most of these do not contain a
separate GPS antenna but use the cellular antenna to receive GPS signals. If there is
a requirement for an extra antenna (for reception of signals being broadcast in the
L-band at 1.2 GHz and 1.5 GHz) costs will increase.
The need for an extra GPS chipset has the following impact on terminals:
!
Higher cost – with a current average price of 25 to 30 Euro per GPS chipset the
cost of a 3G terminal could easily increase by 100 Euro to include GPS receiver
functionality.
If the chipset includes GPS core architecture the cost increase will be less. Cost
increases of less than 5 Euro have been predicted, especially if the chipsets are
produced in volume.
!
More space is required to embed the GPS chipset into the terminal.
The space issue will become less important as chipsets increasingly integrate key
architectures. Power consumption is the biggest issue.
!
Higher battery consumption resulting from the need to scan the GPS satellite
signals and power the GPS receiver. Higher battery consumption may lead to the
need for a larger battery, which again would increase the size of the terminal.
Higher power consumption will require more sophisticated battery technology with
higher cell density and longer battery lifetime. The battery industry is expected to
come up with new battery technologies.
!
The risk that the GPS system could be switched off by the satellite operator should
be considered.
Should a dedicated GPS antenna be necessary it would have serious implications on
the design of handsets. An additional antenna for receiving GPS signals could be
required since the handset might be communicating with the network while it is
 UMTS Forum, 2002
58
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
scanning for GPS signals. This would lead to requirements for a minimum separation
between antennas to reduce inductive effects.13 Such a requirement can impact the
usability of the handset.
Network-based positioning methods such as cell ID and OTDOA clearly have less of
an impact on terminal hardware and mostly require additional software capabilities.
The impact of cell ID on terminals is minimal, even non-existent.
A standard WAP browser may be sufficient to access many location-based
information services.14 Such services could also easily be provided using SMS as a
bearer.
3G terminals with a GPS receiver are likely to address high-end users in the medium
term. The cell ID and OTDOA location methods will address the mass market in the
near and medium-terms, respectively.
7.6
RELATIONSHIP BETWEEN POSITIONING TECHNOLOGIES AND SERVICES
The existence of multiple positioning technologies and their likely future co-existence
will have a major impact on the way location-based services are being offered by third
party providers, unless some very strong standardisation efforts are made at a global
industry level.
There are two main aspects to be highlighted when considering the relationship
between different positioning technologies and services.
!
Certain services can only be offered if a minimum level of accuracy is available.
Even if the same location-based service can be offered via different positioning
technologies, that service, its quality of service and its perception by the end user
are clearly influenced by the positioning technology being used.
!
In order to enable the availability of services across multiple network operators
and platforms, interoperability between network operators’ and service providers’
infrastructure is a necessity. This leads to the need for a standardised protocol
between service provision and the locating entity15 covering functions such as
exchange of location information, authorisation and billing.
Some classes of services have clear requirements on location quality of service (such
as accuracy) and so can only be enabled by specific positioning technologies (see
Table 7.2). Even if the same location-based service can be offered via different
positioning technologies, the service's quality and the end-users’ perception of the
service will be influenced by the technology used. For some services, the higher
precision of a positioning method may lead to a higher perceived value of the service
13
The electromagnetic field of a sending antenna induces an electrical current in the neighbouring antenna, leading to
a disturbance of the received signal in the second antenna.
14
W@P 2.0 or later version will replace the present version in order to improve the quality (accuracy and reliability) of
location-based information services.
15
The locating entity could be part of the 2G/3G network, or in the terminal, or could be operated by a separate
commercial entity (e.g. for infrastructure sharing for location services, as discussed in Section 7.2).
 UMTS Forum, 2002
59
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
by the end user. On the other hand, some positioning technologies are not adequate
at all for certain services.
Cell ID
Tourist Guide
Yellow Pages
People Management
Traffic Information
Weather Information
Localised Advertising
Friend Finder
Maps
Navigation
Pet Finder
Employee Safety
Family Safety
Anti-theft
Road Assistance
16
H
H
H
H
H
H
L
H
L
OTDOA
A-GPS
H
H
H
H
H
H
H
H
L
H
H
H
H
L
H
H
L
L
H
H
H
L
H
L
H
17
Source: UMTS Forum
Legend: H: Service supported in most cases by the technology; L: Service supported only with restrictions.
Table 7.2: Relationship between Positioning Technology and Services
In some cases service providers can overcome the limitations of positioning
technologies by actively involving the end user in the positioning process. For
example, in the case of proximity searches,18 users may play an active role by
determining themselves which is the nearest POI (Point of Interest) to which they are
close. Location-based service providers can then provide very accurate proximity
searches since the location of POIs are known with precision and certitude. This selfdetermining approach to positioning can be performed by users at an early stage of
the location-based service (i.e. as soon as they access the service) or after the
proximity search has been performed, as part of a refinement process.
7.7
STANDARDISATION REQUIREMENTS FOR INTERFACES
The fact that multiple positioning methods exist (and are expected to co-exist) will
require service providers as well as all other participants in the value chain – device
manufacturers, network operators and infrastructure providers – to cope with such
diversity, including all the associated costs. Such diversity generates the need for
defining a location protocol for the interface between the locator and the service
provider that is agreed at an industry level; this protocol should enable multiple
networks, service providers and devices to inter-operate effectively. This requirement,
in addition to other requirements for further standardised interfaces, is illustrated in
16
Cell ID can be more precise when the cells are smaller, especially in urban areas.
17
A-GPS is available within buildings either with significantly reduced accuracy or not at all (due to signal attenuation).
18
Proximity searches, also called spatial searches, identify items of interest in the service provider's database based
on user-specific criteria in an area around the user's position, based on end-user input (e.g. street name, house
number). The size of the area is generally defined by the service provider, sometimes with the assistance of the end
user.
 UMTS Forum, 2002
60
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Figure 7.4.
Locator
Service
provision
Network
Operation
Standardised
Not Standardised
Source: UMTS Forum
Figure 7.4: Standardised and Non-Standardised Interfaces
The interface between the device and service provision function need not be
standardised since the required communications will depend on the service usage
contract between the service provider and the subscriber. In any case, access to
location-based services could be performed by already available standardised
information retrieval systems (e.g. WAP browser) or by special programs such as
Java applets implementing the necessary communications with the provider's
application server. Since Java applets can be downloaded to the terminal there is no
need for standardisation of communications between device and service provider.
7.8
SERVICE CLASSIFICATION
3GPP has identified the following categories of location-based services:
•
•
•
•
Value-added services which could be provided by an independent third-party
provider. This category includes information, navigation and tracking services.
PLMN operator (internal) services whereby the operator uses location information
to perform internal tasks, including network management, traffic and network
planning, and optimised handover.
Emergency services.
Lawful interception services.
Value-added services will represent the biggest part of the location services market,
since they are the actual revenue generators. Individual services possible within this
category are limited only by the human imagination. They can range from simple
services such as local yellow pages using cell ID to services as complex as navigation
assistance. A more thorough classification of value-added location services is
necessary to identify requirements on standards.
Generally, this category of services can be subdivided into two major sub-categories,
depending upon the source of the invocation of a location-based service. This leads to
the following classification:
•
Mobile equipment-initiated services – including information and navigation
services.
 UMTS Forum, 2002
61
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
•
UMTS
Forum
Third party-initiated services – including value-added services such as tracing and
tracking services, and location-based advertising.
These services are described in more detail in the following sections and are followed
by usage scenarios for some of the identified services.
7.8.1 Mobile Equipment-Initiated Location Services
7.8.1.1 Information services
The user requests information about specific items close to his current location, for
example restaurants or cinemas that are located in the vicinity. Eventually, this could
be implemented as a map showing the user's current location as well as the location
of items requested by the user. The implementation of such a service could be
considered comparatively straightforward, especially if cell ID is used as the basis for
position estimates. Typical content will include geographical mapping information as
well as yellow pages information (company names, phone numbers, addresses).
Location-based information services could also be augmented by information on
specific items of interest, for example the history of the building right in front of the
user.
7.8.1.2 Navigation services
Navigation services cover the case where a user wishes to be guided by his terminal
to a specific destination. This could be implemented by providing directions to the user
or by displaying the user's current location on his terminal (e.g. a blinking point on a
map). In either case, navigation services may require delivery of the user's position to
his terminal at regular intervals, and maybe also to the service provider, until the user
has reached his destination.
Note that the usage scenarios and the requirements on standards might be different
depending upon whether the service is being used by pedestrians or by car drivers.
Generally, not even A-GPS could provide the required accuracy for car drivers
travelling at high speeds; in this case, additional information might need to be supplied
by the car's telemetry and navigation systems.
In current systems, in-car navigation systems consist of a GPS receiver, a local
database containing mapping information (stored on one or more CD-ROMs) and an
MMI displaying the user's location on a map.
However, the value of providing a location-based service to car drivers using the
location determining capabilities of the UMTS network might be rather limited.
7.8.2 Third Party-Initiated Services
7.8.2.1 Tracing and tracking
Tracing and tracking value-added services generally allow a third party – a physical
user or maybe an application server – to track the current location of a mobile user or
to trace the user's past movements within the network based on location information
 UMTS Forum, 2002
62
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
that has been stored in an LCS server. The following sample services fall into this
category:
•
•
7.9
Fleet management – whereby a company is always aware of the current location
of a fleet of vehicles. This application has already been implemented using GPS
as a positioning method and does not necessarily require high bandwidths.
Find friends – whereby friends find each other by locating each other on a map.
SERVICE USAGE SCENARIOS
The analysis of service usage scenarios is an important first step in identifying specific
requirements on protocols and interfaces. These scenarios depict the most likely
sequence of events a user might undergo to achieve a specific end by using a service.
The service usage analysis can be extended to identifying high-level procedures
required within the network to fulfil the user's requirements.
7.9.1 General User Perceptions
In order to ensure end-user satisfaction, the users’ perception of a service must be a
critical factor in service creation and in the evaluation of appropriate positioning
methods and their impact on services.
Positioning accuracy depends not only on the positioning method but also on factors
such as the topology of the landscape, the precise position and distance of base
stations available for signal measurements to the mobile terminal, and whether the
user is located inside a building or not. Accuracy therefore depends on the user's
actual location as well as on other time-variable radio propagation effects. The service
should be designed in such a way that the quality of service is influenced by the
variation in accuracy only in exceptional cases.
7.9.2 Usage Scenario for Navigation Services
In general there are two methods by which navigation information can be supplied to
the user:
1.
Voice – for example a spoken message such as "at the next crossing, turn left";
2.
Information displayed via a Graphical User Interface (GUI) – for example the
user's location highlighted on a map.
A combination of both interaction mechanisms is also likely – the user selects a
destination via a GUI and is guided by voice messages. In the case of the voice
interface, once the user has defined his destination he will proceed according to the
information that is being delivered to him by voice. This information is delivered as
soon as new information is required (after he has "reached the next crossing", he
needs to "turn left"). Since the information is delivered automatically, the network must
track the user's position at regular intervals to determine when new guiding
information needs to be delivered.
In the case of the GUI-only interface, the usage scenario is different. First, the user
will determine his current position by requesting a map and his location on that map.
Once the user has selected a destination, he will choose a direction according to the
 UMTS Forum, 2002
63
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
information he has interpreted from the map. He will proceed and check his position at
possibly irregular intervals on the map to make sure he is on the right track – the
irregularity stems from the simple fact that the user cannot keep his eye constantly
fixed on the GUI! In this scenario, it does not make much sense for the network to
regularly send position updates to the terminal, since the user may not be looking at
the GUI just at these times. Instead, it would make more sense for the user to simply
press a "refresh" button that triggers the network to inform him of his current location.
From a technical standpoint this usage scenario is very similar to the usage scenario
for a location-based information service, with the exception that information on local
amenities is not delivered to the terminal (only a local map).
In some other service models the network may want to determine the terminal's
position at regular intervals even when the user is using only a GUI as means of
interaction, which may require dedicated communications with the terminal. One
service model could consist of providing the user with current information about local
events occurring while the user is walking along. If an accident occurs two blocks
away, leading to a closure of the road, the service provider could warn the user via an
acoustic signal, and display on the user's terminal his current location as well as the
location of the unexpected event.
From this analysis of usage scenarios, the following requirements can be derived:
•
•
Voice-based user interfaces for navigation require regular position updates.
GUI-based user interfaces for navigation may require regular position updates,
depending on the service model being implemented.
If the terminal is able and has been configured to determine its location with minimum
support from the network (i.e. signal measurements and location calculations are
performed in the terminal), then the terminal will be required in this “local events”
service model to communicate its position estimate at regular intervals to the service
provider. This leads to the following requirement:
•
Appropriate signalling mechanisms will need to be put in place to enable the
service provider to communicate specific requirements to the terminal in terms of
information the terminal needs to deliver to the service provider ("service
configuration signalling"). Whether such signalling mechanisms need to be
standardised or not needs to be studied.
7.9.3 Usage Scenario for Friend Finder Service
In a configuration phase, a user who wishes to be located by his friends will need to
update his personal privacy exception list, essentially instructing the network about the
phone numbers or email addresses of users that are allowed to track his location.
3GPP has already identified the need to cater for the privacy needs of end users and
has identified the requirement to establish a privacy exception list to be stored in the
3G network (as part of the LCS server functionality). The privacy exception list
identifies which LCS clients are allowed to request position estimates to locate the
user.
Once a group of friends have updated their lists (which could be presented in a userfriendly fashion as a "buddy list", similar to AOL's instant messenger software) a user
may request his service provider to determine whether his friends are close by (e.g. by
 UMTS Forum, 2002
64
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
pressing a button "find friend xx"). The service provider would typically send back a
map of the local area of the user and would be responsible for determining the
location of the other users, who may be located in different networks than the first
user's home network (see Figure 7.5). For this purpose, the service provider will issue
a location request to the appropriate networks according to the procedures defined by
3GPP and will act as an 'external LCS client'. Once position information has been
delivered to the service provider, this information will be forwarded further to the user
who issued the original request. The positions of the user's friends could then be
displayed on the local map as dots or areas with names, as graphical items or even as
small pictures of his friends (depending on the application).
F3
Network
Operator 2
$ LocationRequest/Response [F2, F3]
F2
Content
Database
Network Operator 1
Service Provider
F1
# FindFriends [F2, F3]
$ LocationRequest /Response[F1]
% Content: XML[Map + Position of F1 - F3]
Source: UMTS Forum
Figure 7.5: High-Level Procedures for Friend Finder Service
Positioning information sent from the service provider to the user who initiated the
positioning request should in general be transferred transparently through the
network. Usually this would be information formatted in an appropriate markup
language. XML appears to be particularly advantageous, as the service provider
would need to send only the positioning information to the user, instead of sending an
entire map formatted in HTML together with the description of the location of the
user's friends. This would be especially useful if the user already has a current map of
the local area stored in his terminal and only requires updated information on the
location of his friends.
Note for clarification that there are essentially two ways by which the terminal may
gain access to positioning information:
•
•
Directly from the network – for which an appropriate API function needs to be
defined to allow the application to gain access to this information.
Directly from the service provider – which would mean that some other form of
information formatting would be required. This is the application scenario where
the use of XML would appear to be advantageous.
7.10 CHARGING MODELS
There is no benefit to a network operator in providing positioning information free-ofcharge to a third-party provider. Therefore, a specific issue that needs to be resolved
is when and for what the operator should charge the service provider when providing
location information.
 UMTS Forum, 2002
65
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
One approach would be for the operator to charge the service provider for every
position information update being sent to the service provider during a navigation
service session. This would be particularly feasible in the following cases:
•
•
For pure information services where location information is delivered only once per
usage session.
For navigation services that require regular position updates but whose frequency
is controlled by the users. Whenever the user wishes to view his current location
on his map, he would accept a small (eventually very small) fee for this service.
There are some issues to consider, however, which may render this charging option
rather unattractive when regular position updates are required for the provision of the
service (e.g. in the case of a voice-based navigation service):
•
•
This approach could slow down the response time of the location-dependent
service. Whenever the terminal or the service provider's application software
requests an update of the terminal's position from the network operator, the
delivery of this information would have to be preceded by a charging transaction
between service provider and network operator. This would contribute to the
overall delay in providing this information to the terminal and service provider. This
delay might become obtrusive if the user has to wait a noticeable amount of time
until his new position has been updated on the map displayed on his terminal.
It would become very difficult for the end user or service provider to control the
cost of the service. If every location information update were to be charged, the
same service would be more expensive for users requiring more frequent position
updates. Of course, in the case that regular position updates are required, the
frequency of updates could be an end-user controlled parameter. However, this
would reduce the user friendliness of the service.
From this discussion, some design criteria for message flows and protocols between
the various entities of the value chain can be identified.
One major design criteria for message flows and protocols should be to minimise the
response time of the service, i.e. the duration from the request for the service until the
content has been displayed on the user's terminal. Minimising response time will help
improve the end-user's experience of the service and improve the user's overall
satisfaction with the service. Another design criteria should be to reduce the amount of
required signalling over the air interface.
7.11 LEGAL FRAMEWORK FOR 3G LOCATION SERVICES
When discussing location-based services complex legal issues need to be given
consideration. The UMTS Forum has initiated respective studies with the aim to
provide guidance for consideration and possible solutions. It will publish the resulting
material in due course.
 UMTS Forum, 2002
66
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
8. BILLING & CHARGING
8.1
INTRODUCTION
This chapter concentrates on the Charging, Billing and Payment aspects of 3G
services. Charging, billing and payment cannot be divorced from the technology used,
nor the business models in place, so the chapter is structured to take account of these
aspects.
The first section deals with the generic principles of charging and billing and discusses
the types of services, charging attributes, timing considerations and payment options.
To illustrate these principles, three major types of services have been chosen to
explain the processes required, the value chain, and how the charging and payments
will take place. These examples are by no means exhaustive but are chosen to
highlight the major charging and billing issues. They represent examples of the six
major service categories identified in UMTS Forum Reports 9 and 13. The examples
chosen are:
!
Mobile Retailing (M-Tailing) – an example of the issues of transaction-based
services.
!
Location-Based Services – an example of the issues related to the position of the
user and business partner relationship management.
!
Broadcasting – an example of services converging with UMTS services.
8.2
CHARGING AND BILLING PRINCIPLES
8.2.1 What are the Services that UMTS will Enable?
UMTS brings several new enabling facilities to the mobile world. The main areas are:
!
The use of packets – enabling data to be sent efficiently over the networks. This
makes mobile networks an extension of any IP network, be it the Internet or
corporate intranets or extranets.
!
Increasing bandwidth – enabling new types of services that require the
transmission of large amounts of data to be transmitted such as high-resolution
pictures, graphics and video.
!
International roaming – so that these new services can be accessed anywhere in
the world in which the UMTS networks are available.
!
Personalisation – in the new world each individual will want to tailor their services
to the specific ones they are interested in and only pay for those specific services.
So in the UMTS world, mobile telecommunications will be used not only as a
communications device, but also as a personal gateway to order or consume a large
proportion of the products and services available. Predominantly this will not be by
voice but by the use of data transfer. The way that the user pays for each of these
products or services will vary, not only by the type or service but also by the personal
preference of the user.
 UMTS Forum, 2002
67
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Some examples of the types of services that could be offered, with some ideas on
how they may be charged and paid for, are discussed below.
8.2.1.1 Communications
Voice calls – these might still be paid for by the minute but could be included as
subscription services.
Messaging – for example email and SMS. Email will be much more than just text and
become more like ‘electronic postcards’, sometimes called Multimedia Messaging
Services (MMS). So these may not only be charged by subscription or event but also
on the volume of data transmitted.
8.2.1.2 Videoconferencing
Videoconferencing requires high bandwidths so may be charged by ‘quality of service’
parameters such as peak or average bandwidth and latency, as well as by duration.
8.2.1.3 Gaming
A different type of ‘communication’ where users interact with a third-party content
source to play games with any other user, wherever they are in the world. A simple
form would be a ‘chat room’. Charging is likely to be by subscription and application
usage.
8.2.1.4 E-commerce
Using the mobile as a means of initiating a transaction – for example buying a book or
CD or shares, or booking a concert or theatre ticket. Further examples include placing
a bet or making a deposit on a holiday. Here there is not much data being sent. It is
the value of the transaction that is important. There may be many different business
models deployed here, ranging from deferring the risk to the credit card companies,
through to the UMTS operator billing the user and making a margin on the transaction.
8.2.1.5 Information retrieval
Examples include Internet surfing, use of search engines, yellow pages, directories
and maps. Information retrieval is likely to be charged on subscription plus usage.
Simple forms of information retrieval such as access to sports results and news
headlines are likely to be charged on a subscription basis. Some services will include
location-based services such as ‘where is the nearest garage?’
8.2.1.6 ‘Push’ services
For example, changes in share price, or offers or information based on your location –
such as local weather or traffic reports. Probably charged on subscription.
A variation on the above is the transmission of marketing messages. As the user
enters a shopping mall they may be sent offers or discounts on merchandise in some
 UMTS Forum, 2002
68
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
of the shops there. This would not be charged to the user but to the marketing
company or shop.
8.2.1.7 Advertising
The user may be sent various type of advertising, based on his profile or his location
or his preferences. It is unlikely that the subscriber will pay for this. The network
operator will charge the marketing or supplier company.
8.2.1.8 Streaming services
For example listening to MP3 music or video clips. Potentially there could be many
charges made in this example. The user may be charged either directly or indirectly
for the content. He may also be charged for the use of the network for the delivery of
the service, based on duration or quality of service parameters. The network operator
may collect the money on behalf of the content provider and pay it back less a margin.
The content provider may have to pay royalties for use of the material.
8.2.1.9 Downloading
Data transfer, for example music, video, spreadsheets or pictures – anything to be
used later or transferred later to other devices. Likely to be based on the volume of
data transmitted but some quality of service parameters, for example latency, do not
apply here.
A subset of this may be ring tones or cartoons. These do not require a large
bandwidth so may be very cheap. The cost may well be by event but for very small
amounts of money (micro-payments). They are unlikely to be shown individually on
any type of bill or statement.
The above examples are just some of the types of services that will become available.
There will be many more types. But these examples serve to illustrate the diversity of
services and products that have to be supported as well as the diversity of charging
and payment options that will be required. The various types of rating, charging and
payment options are explored in the following sections.
8.2.2 What are the Charging Attributes to be Used?
The main parameters used to determine the price for the service, or delivery of the
service, are discussed below.
8.2.2.1 Subscription
Many of the services will be subscription based – payment of a recurring charge that
gives unlimited access to a specific service. This is normally a straightforward monthly
charge made in advance but can include pro-rating for services provided for part of
the month.
 UMTS Forum, 2002
69
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
8.2.2.2 Duration
This is a rate applied to a length of time associated with the delivery of a service.
Duration charging is very easily understood by the user and is used predominantly in
circuit-switched networks. It may still be relevant where a high bandwidth is required,
for example with videoconferencing.
8.2.2.3 Destination
Destination charging is the application of different rates depending on where the
access is ‘terminated’. This is used in circuit-based networks to charge higher rates for
long distance or international calls – it is unlikely to be used in UMTS data
communications. However, where the access is to third party content the destination
may well be used as a differentiator – for example by Access Point Node (APN) or by
Uniform Resource Locator (URL).
8.2.2.4 Location
Location is essentially the ‘cell identifier’ of where the access to the network is being
made. There can be a range of these as the user may well be travelling through many
cells as the access is being carried out. Location charging can be used to give
preferential (or non-preferential) rates to access in certain areas, for example in city
centres or near a user’s home.
8.2.2.5 Volume
Volume will become one of the most important parameters. Any service that utilises
the transfer of significant amounts of data may be subject to charging by the volume of
data transmitted. For example streaming services and downloads. The ‘volume’ figure
to be used is open to discussion. It could be number of packets, but these can be of
various sizes. It could be number of bits or bytes or octets, but these can include
header and routing information and can include re-transmitted packets.
Whereas ‘volume’ is well understood in the corporate market this is not true in the
residential market. A user downloading a video clip will understand the concept of an
‘event charge’ for doing this, but not necessarily the fact that it was a transmission of a
number of megabytes.
8.2.2.6 Network
A UMTS user should be able to roam in many networks. Not all will offer the same
services and some may not be UMTS networks at all. There may well be different
rates applied by the particular network being accessed.
8.2.2.7 Device capabilities
Billing systems should be able to allow service providers to charge based on the
capabilities of devices, especially with regard to the amount of data the terminals can
typically download.
 UMTS Forum, 2002
70
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
8.2.2.8 Quality of service
Quality of service can mean different things to different people. A simplified definition
of the network version of ‘quality of service’ contains five elements:
1.
Peak Bandwidth – the maximum bandwidth achieved.
2.
Average Bandwidth – the average bandwidth achieved.
3.
Delay (Latency) – how quickly the packets arrive after each other.
4.
Reliability / Error Rate – how much had to be re-transmitted.
5.
Priority / Precedence – whether packets received priority over other users.
Different services require different levels of these quality of service parameters. An
‘email’ requires low error rate. ‘Voice’ requires a low latency but not necessarily high
bandwidth. ‘File transfers’ of significant volumes require a high average bandwidth but
not necessarily a high peak bandwidth. ‘Videoconferencing’ requires high peak and
average bandwidth, low latency, low error rate and high priority.
These quality of service parameters may not only be applied at the time of usage, but
also at the time of provisioning. For example the user may be charged for a quality of
service that can support videoconferencing, and be given a rebate if this wasn’t
achieved.
8.2.2.9 Service termination indicator
There will be instances where a service is terminated abnormally. The user could then
be given a rebate, or as a minimum, a customer service representative could be made
aware of the termination. An example of this is when a user moves out of network
range. So it is important to collect information where an abnormal termination of
service occurred.
8.2.2.10 Event
Many new services will be supplied as an event. This may be an email, a short
message, or a short sequence of communications that result in an order being made.
Some of these events may be major ones involving significant value to the user – see
transaction type, value and content below. Others may be minor – for example short
messages or downloads of ring tones – where the user can be charged based on the
number of each type of event.
8.2.2.11 Transaction type
The rating of a service by the ‘type of transaction’ brings us more into the area of
rating by value than by cost. The purchase of a number of shares over a secure link in
an agreed time frame may well be worth more to the user than the purchase of a
book. So where transactions are being charged by ‘event’ there may be the need to
differentiate what types of transaction are being priced, typically by the third party
being accessed.
 UMTS Forum, 2002
71
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
8.2.2.12 Transaction value
Especially in e-commerce usage, the ‘value’ of the transaction can be used as a rating
parameter. This is particularly true where the network operator is billing on behalf of a
third-party content provider. The main example is where a user buys goods over the
UMTS network and is billed for the goods by the UMTS operator. Either the network
operator will receive a wholesale charge from the content provider and mark this up as
a retail charge, or will receive and bill a retail charge and retain a margin. There may
well be volume discounts received by the UMTS operator here.
8.2.2.13 Content
Probably the most challenging parameter involves the use of the actual content being
accessed as a rating parameter. For example, in downloading an MP3 file there may
be a variable charge based on the artist; or a user may pay more for a share price
less than five minutes old rather than 20 minutes old. In both examples the amount of
data transmitted, the quality of service, and probably all other parameters are identical
– it is the actual content of the information being sent that is a differentiator.
8.2.3 When is the User Notified of the Charge?
Whatever the method of rating for a particular service or product, the rates may need
to be applied at various times within a transaction or session. There are basically
three types as outlined below.
8.2.3.1 Before the service or product is purchased
This is particularly appropriate for high value services. For example, if the user is
buying a holiday, a set of concert tickets, or about to start a long conference call, there
is an element of risk that the user will not pay. Different business models will mitigate
this risk in different ways – there are two main ones:
•
•
The UMTS network operator takes no part in the transaction other than delivery –
all the risk is put back to the content provider on a credit card.
The UMTS operator takes the risk, either by billing on behalf of the content
provider, or because the transaction is pure network usage (as in the
videoconference example).
Either way, whoever takes the risk will want to ensure that adequate funds are
available before the service is consumed. This will involve ensuring that the identity of
the user is confirmed and ensuring that the user is authorised to consume the service.
In addition the user may want to confirm that they are willing to spend the price
presented (for high value purchases), for example by signing a digital certificate or
similar. Finally, the risk needs to be offset either by the authentication of a credit or
debit card, or by ensuring funds are available with either a pre-paid balance or an
agreed credit limit.
8.2.3.2 During the consumption of the service or product
This applies where extensive use is made of the network, either with voice or
videoconferencing, data downloads, or streaming services.
 UMTS Forum, 2002
72
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
There are normally five aspects:
1.
Evidence that sufficient funds are available to start the service – either pre-paid or
a credit limit.
2.
Management of simultaneous services – for example there may be a voice call,
an Internet access and a purchase all taking place at the same time.
3.
Monitoring of the service against the balance – this requires the ‘rating’ of the
service as it is being consumed and regular balance checking.
4.
The trigger of alarms as the balance becomes ‘low’ – this could be via voice
messages, email or SMS.
5.
Termination of the service if the balance available is exhausted.
This is analogous to pre-paid voice systems in circuit-switch based systems like GSM.
One of the challenges to the UMTS operator will be how to deploy this type of
charging when the service is downloading an MP3 or video clip, where receiving half
the transmission may be worthless.
8.2.3.3 After the event
This is akin to the rating of the service prior to the creation of a post-paid invoice or
bill. In the UMTS world this is unlikely to be in paper form. More likely it will be
electronic presentation available on the Internet either by fixed or mobile. This can be
either directly to the UMTS operator or via billing consolidation suppliers. In all cases,
a user will want to be presented with usage summaries on a regular basis.
8.2.4 What are the Bundling Options?
UMTS services will not be ‘standard’ services where the user is offered a set of
services and products on a ‘take it or leave it’ basis. Increasingly, users will be
demanding personalised services allied to their own preferences and requirements.
UMTS providers will also want to be seen as a provider of many types of service, not
simply access ones. So we can expect a whole host of bundling and discounting
options; some are outlined below.
These options can be offered individually or as combinations.
8.2.4.1 Bundling of various services
We can expect the subscriber to be offered a series of services when subscribing to a
UMTS operator. For example, one bundle may be for access charges only, another for
access plus use of a variety of content services.
8.2.4.2 Included usage
In the same way that a usage amount is often bundled into today’s circuit services, we
can expect this to be continued into the use of UMTS networks. The difference is that
today this is offered as a number of minutes, in the future it may be for minutes, data,
quality of service, etc.
 UMTS Forum, 2002
73
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
8.2.4.3 Third-party discounts
We can expect the UMTS operator to work together with third parties to provide
innovative discounts. For example, a subscriber may by offered a discount ‘voucher’
on his device as he enters a mall for a particular clothes shop. Or vice versa be
offered ‘cyber currency’ to use on the UMTS network when buying goods in a
supermarket.
8.2.4.4 Volume discounts
One would expect that to encourage usage, there will be options to decrease the rate
for charges as usage increases. This will become complex. For example there may be
a certain rate for the first n megabytes of data transferred, then a smaller rate for the
next m megabytes. Or it could be by money – a certain rebate if the total charge or a
defined subset of the charge exceeds a specified limit. Or discounts, rebates or
refunds depending on the number of times a specific content or service is accessed.
Combinations of these and many others are possible.
8.2.4.5 Cross-product discounts
There may be considerable collaboration between UMTS operators and content
providers and part of this could be in the provision of discounts between products and
services. For example, half-price cinema tickets if more than n megabytes are
transferred in a month.
8.2.4.6 Loyalty discounts
Churn will be as common in the UMTS world as it is today. There are likely to be more
licences granted than today and we will see the rise of ‘virtual’ operators. So expect to
see many loyalty plans, covering discounts once a particular period of subscription
has been reached, or loyalty schemes giving ‘air miles’, ‘beanz’, etc.
8.2.5 How are the Payments Made?
Just as users will demand personalised services, so will they demand various ways to
pay for these services. Some of the options are covered below.
8.2.5.1 From a pre-paid account
Pre-paid is where the services are only supplied providing there are funds already
paid in advance. In most countries this is already the most popular way of buying
circuit-based switched voice services and there seems no reason why this shouldn’t
also apply to data or content services. It is used where a residential subscriber wishes
to be anonymous, but also increasingly for budgetary use, for example parents paying
for children or companies authorising some private use for employees.
There are two components to pre-paid which will continue into the UMTS world:
•
The first is a way of moving funds into a balance account prior to using services.
This can be by direct debit, by credit card, or by voucher or ‘scratch’ card. This will
continue with UMTS using whatever banking facilities become available.
 UMTS Forum, 2002
74
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
•
UMTS
Forum
More difficult is the service logic to rate the consumption of services and prevent
access to the service if funds are unavailable. With circuit-based switched services
where rating is usually based on duration this can be handled by IN or service
node solutions, where the relevant calls can be controlled from the switch in real
time. As the call progresses, triggers are raised as the balance becomes smaller
and is finally exhausted – the call can then be terminated. There are already
problems with this method with short messages or GPRS – these services are
currently CDR-based. Hence there may be a significant amount of rated usage
after the pre-paid balance is exhausted. Over UMTS there will be many new types
of rating and some of the services will be used simultaneously. So to handle prepaid, it becomes essential to add real-time rating servers to the network that will
be able to raise alarms and terminate service as the pre-paid balances diminish.
8.2.5.2 Credit account (post-paid)
Post-paid is currently the traditional method of payment when the service is
consumed; it is rated and invoiced and presented to the subscriber as a bill. The bill is
paid by direct debit, credit card, cheque or cash depending as much on the culture of
the country as anything else.
Post-paid will be a valid payment option in the UMTS world. Factors that need to be
considered include:
•
•
•
The content of the bill – as described elsewhere in this report, there may be many
types of service billed by the UMTS operator, ranging from network usage through
to third-party services and content.
Bill presentation – paper bills are likely to be phased out and be replaced by
electronic invoicing. Residential and company bills will be posted on a network, for
example the Internet, and viewed and paid by fixed or mobile access. The ‘site’
where the bill is posted will be either that of the UMTS operator or third parties –
for example ‘bill consolidators’.
Balance management – increasingly, where UMTS operators are using post-paid
billing they will want to monitor the charges being made, to prevent fraud. Credit
limits may be assigned to subscribers or groups of subscribers and services
terminated when this limit is reached. This then becomes an identical scenario to
that of pre-paid, but with an initial threshold of the credit limit, rather than zero. So
similar systems as for pre-paid need to be in place.
8.2.5.3 Credit and debit cards
The use of credit and debit cards will continue to be a significant payment method in
areas where the UMTS operator wishes to defer the risk, or where the subscriber
chooses this method as a personal preference. Credit and debit cards can be used in
any of the payment scenarios, normally where the value of the service is ‘significant’.
So they could be used for topping up a pre-paid account, paying a bill, or for paying
for a high value service on-line before the service is consumed.
8.2.5.4 e-purse and e-wallet
An e-purse or e-wallet is in some ways similar to a pre-paid account, where funds are
transferred to a separate account and this account used to pay for services
 UMTS Forum, 2002
75
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
consumed. There are two main differences:
•
•
Micro-payments – the e-purse or e-wallet is likely to be used to pay for very small
amounts, where other forms of payment are not sensible. For example, the
subscriber may be charged a few pence for downloading a cartoon or ring tone
and neither the UMTS operator nor the subscriber is interested in seeing every
individual transaction itemised on an invoice. It is analogous to paying small
amounts by cash in a shop for newspapers or confectionery.
Storage of the balance – could be in many forms. On a server similar to pre-paid
but held by a third party. Or within the mobile device or USIM card (as used by
early forms of pre-paid). There could also be ‘smart’ cards, which hold a balance
and can be topped up through credit or debit cards at ATM machines or whatever.
We could also see the use of technologies such as Bluetooth, where mobile
devices and shop teller machines are connected at the point of sale and most of
the payment processing conducted in real time between network devices.
8.2.5.5 ‘Cyber currencies’
We are already in a world where goods and services can be bought using elements
other than money. Examples are ‘air miles’ that are given free when consumers buy
certain goods or use a particular credit card for payment of goods. Another is the
concept of ‘beanz’, which are given typically when consumers purchase goods on
specific Internet sites. In the UMTS world we could see a proliferation of this concept,
where there are many types of ‘counters’ given away as incentives to buy, and
subsequently used to pay for other services.
An overriding concept in how the subscriber pays is that of subscriber choice. The
UMTS operator is likely to offer many different ways for the subscriber to pay for
services, depending largely on the value of the service. The variety of these options
will be a differentiator between operators and will affect which operator a subscriber
chooses. On the other hand, the subscriber will want to decide himself how he wishes
to pay, and this can be dependent on many things:
•
•
•
•
The subscriber – some will prefer credit cards, some pre-paid, some post-paid
The service – ‘cheap’ services may be paid by e-wallet, ‘normal’ services by bill
and ‘expensive’ ones by credit card.
Company or private – a subscriber may pay for personal services by pre-paid but
company service on a company credit card or bill.
Others – there can be many other options. A subscriber may pay for goods by
buying pre-paid vouchers early in the month but switch to credit card later in the
month as he runs out of money prior to getting his monthly salary.
So we may have a subscriber using his UMTS network for several uses in a single
context and paying for each service differently. He may send several emails and pay
these as part of his subscription. He may buy a concert ticket and charge this to his
personal credit card. He may download a large business file and charge this to his
company credit card. He may make several voice calls and charge these to his prepaid account. He may call a videoconference and have this charged to him or his
company on a bill. He may play some shooting games and use some ‘cyber currency’
 UMTS Forum, 2002
76
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
to buy more bullets.
8.2.6 How is the Revenue Distributed?
As the UMTS operator offers a single point for offering many different types of service,
many from third-party content providers, he will also ‘bill’ for many of these services.
Much of the revenue collected will not be his to keep but will be distributed to many
others. Some examples are as follows:
8.2.6.1 Billing on behalf of others
A UMTS operator may offer services from a third party but charge the subscriber
himself. A subscriber buying a book or CD using the UMTS network could be charged
by the UMTS operator using his pre-paid account or via a post-paid bill. Here the
UMTS operator will collect the retail charge and pay the wholesale charge back to the
book or CD vendor. This gives rise to a variety of new business models, some of
which are described in more detail within this report.
8.2.6.2 Revenue sharing
The UMTS operator may provide a service himself but have to pay back some of the
money to a third party that owns some of the intellectual property rights of the service.
For example, royalty payments may be payable for some musical ring tones.
8.2.6.3 Taxes
The application of taxes becomes complex. Taxes are normally applied and charged
to a subscriber by a vendor and paid back to the vendor’s local government. Normally
the services are consumed or paid for in the vendor’s country but there are many
exceptions. We can have scenarios where a subscriber subscribes to a network in
one country, roams in another, uses a service provided by a content provider
registered in a third and provided by a server in a fourth. This is a specialised area
and is not covered in this report.
There are numerous other scenarios where a UMTS operator will either make
payments or receive payments from a third party. For example giving volume
discounts to content providers or charging for advertising. These all depend on the
business models being used and some are covered in other areas of this report.
8.3
MOBILE RETAILING (M-TAILING)
8.3.1 Introduction
M-commerce is a name applied to a whole host of commercial transactions that are
carried out using a mobile device. Here we give a specific example to illustrate the
major concepts. We have chosen an m-tailing example.
M-tailing includes commerce scenarios such as:
 UMTS Forum, 2002
77
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
!
Obtaining a consumable product from a vending machine using value (money or
other value measure) which has been derived from the mobile device;
!
Receiving a service (such as shoe polishing or haircut) from a provider and paying
by transferring value to them through a mobile device which reports receipt of
payment to the provider’s mobile device;
!
Obtaining a set of physical goods from an e-tailer (such as clothes or hard-copy
books) using the mobile device for user authentication, authorisation and payment;
!
Exchange of content or software, such as e-pets, between handsets, which is
settled at an agreed amount by e-cash. The e-cash is transferred between the
mobile handsets.
The transfer of value (or “payment”) will be delivered through one of many payment
options (or methods).
The following lists some of the specific options in m-tailing that could be used to “pay”
for the service or commodity delivered:
•
•
•
•
•
Users’ service provider managed balance (either pre-paid or post-paid);
Service providers’ bonus or loyalty points;
Global, but non-monetary, unit such as Internet ‘beanz’, directly from bank (debit)
account;
Credit card account;
E-cash from users’ remote or device based smartcard.
There are many parties involved in these transactions and money of some form will
flow between them.
The options available for payment and for revenue collection will depend on a number
of factors. These include the type and capability of the mobile devices, the payment
options offered by the service provider and the ability of the provider to receive value
via many and different third parties. For example, the end customer may wish to pay
using the network operator’s reward points or bundles or simply by a credit card.
In any one complete transaction, such as a person obtaining a can of drink from a
vending machine, there will be multiple parties and multiple transactions involved.
None of these transactions should be considered as having greater priority in the
m-tailing operation than the others. The parties involved in this value chain must
therefore all agree on the principles involved if any one of the transactions fails. What
happens if goods are rejected or returned or if the quality of the goods or the delivery
fails to meet service level agreements or understanding? This section does not
discuss in detail the processes of the multi-party settlement nor the information that
might be required to fulfil the settlement of revenues or costs.
8.3.2 Processes
The following two examples refer to the purchase of items from a vending machine
using a UMTS device. They only show the transaction between the handset (retail
customer) and the service retail vendor. The settlements which take place between
the vendor and the network operator, product manufacturer or distributor are not
 UMTS Forum, 2002
78
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
shown.
Each scenario is depicted as, firstly, a set of remote stations or servers that need to
communicate and secondly, as flows of information between the stations with their
sequence. Lastly, the processes undertaken by each station are briefly explained.
8.3.2.1 Example 1: Vending communication via UMTS network
In this example illustrated in Figures 8.1 and 8.2 the UMTS network is used for the
following activities:
•
•
•
•
•
•
•
•
Selecting the service vendor;
Viewing the options and prices on offer;
Selecting a product or service;
Selecting an available payment method and unit of payment;
Authentication of the user’s request (including a credit check against the enduser’s mobile account);
Instructions to the vending server to deliver the goods and return the status of the
action;
Advising the billing or e-commerce server of the completed (or part completed)
actions (may be via fixed line only);
Billing and statementing the end user.
Vendy
Vending Options and Price
Advice of Charge
Item Order
Order
Delivery Success/Fail
UMTS
Order
Fixed IP
Network
Network
Service Authorisation
Service delivered
Vendor’s
Application-
Menu & Prices
Authorisation
S erver
Charge Advice
E-commerce / B illing
Platform
Source: UMTS Forum
Figure 8.1: Vending Communication via UMTS Network
 UMTS Forum, 2002
79
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Sequence
Service Request
Services, Prices
and Payment Options
Service Order
and Payment Opt.
Authorisation Request
Authorisation Response
Actual (discounted) price
Discounted / bundle
Cost
Authorisation fail
Notice
Payment Option
Change Request
Service Delivery
Delivery Status
Confirmation of
Delivery and Basic Price
Accounting Record or transaction
(or part of)
Invoice and discounted cost to user
(may include statement of bundle or points status)
Mobile
Handset
Vending
Provider’s
ApplicationServer
Vending
Machine
E-commerce
Billing Server
Source: UMTS Forum
Figure 8.2: Vending Process
The mobile handset or end user is, generally, the initiator of the service. The user
decides that a service is required and searches for the required service or service
provider. This might require looking up the particular vendor and vending machine that
is available close-by or entering the address of the vendor that is displayed by a
vending machine. This display could be a physical one or be delivered by a local
connection such as Bluetooth. In the latter case the transaction could be initiated (in a
loose sense) by the vending server.
The Application (“Order”) Server displays the options, such as a product list, available
to the user and lists the base prices. The end user then selects an option and orders
the service. The order server then requests authorisation for the delivery of this
service from the e-commerce (billing) server, which is able to confirm the end-user’s
credit status. The e-commerce server is able to look at the end-user’s product and
discount plans and can therefore return to the server not only an acceptance or
rejection but also the actual price that the user will be charged. An end user could
have a 10% discount on all m-tailing transactions with this vendor or have a plan that
gives 15% off the first fifty Euros of business each month. If the user has selected to
use a non-monetary or pre-pay balance then the resulting balance on the account
could also be delivered.
If the end-user’s credit is not sufficient then a message will be displayed explaining the
problem and requesting the user to select a different method of payment. If the m-
 UMTS Forum, 2002
80
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
commerce account has reached the user’s credit limit the user may still be able to
select payment by credit card or through the use of reward points.
Having delivered the goods then the vending server must indicate a successful
completion by informing the order server. If the sale fails because the machine is
faulty or an empty stock item is selected then the server informs the order server of
this fact.
An accounting record is created by the order server and sent to the e-commerce or
billing server for collection and onward settlement. The user will be billed and debited
by their chosen method. If the method of payment selected is the post-paid billing
account of the service vendor or network operator then the account is debited and a
bill is produced on the customer’s bill date. This will be paid by the end-user’s normal
method, maybe from a bank debit account or credit (card) account.
Settlement records required for paying third parties for use of the network and the
products sold may be generated and used for payment or collection with the third
parties in the value chain. These records must be fully accounted for by the whole
end-to-end process to ensure that no records are incorrectly created or unknowingly
lost.
8.3.2.2 Example 2: Vending communication with the mobile device via a local
network
The example illustrated in Figures 8.3 and 8.4 differs from the one above in that the
selection of the service and display of the available options and prices is handled by a
local communication network such as Bluetooth.
The UMTS network is used for the following tasks and communication requirements:
!
Authorisation of the user’s request (including credit checks against the end-user’s
mobile account);
!
Authentication challenge and response (if required);
!
Advising the billing or e-commerce server of the completed (or part completed)
actions;
!
Billing and statementing the end user.
Depending on the sophistication of the vending server some of the above facilities
(e.g. the ability to display to the end user the fully discounted price of the transaction)
may not be available. For simplicity, it is assumed here that the vending server has a
highly limited communication method with the e-commerce or billing server.
 UMTS Forum, 2002
81
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
Vending Options and Price
UMTS
Forum
Vendy
Item Order
Advice of Charge
Authorisation
Delivery Success/Fail
UMTS
Fixed IP
Network
Network
Service Authorisation
Service delivered
Authorisation Response
E-commerce / B illing
Platform
Source: UMTS Forum
Figure 8.3: Vending Communication with the Mobile Device via a Local Network
 UMTS Forum, 2002
82
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Sequence
Service Request
Services, Prices
and Payment Options
Service Order
and Payment Opt.
Authorisation Request
Authentication
Challenge
Authentication
Challenge
Challenge
response
Challenge
response
Authorisation Response
Actual (discounted) price
Authorisation fail
Notice
Payment Option
Change Request
Accounting Record or
transaction (or part of)
Invoice and discounted cost to user
(may include statement of bundle or points status)
Mobile
Handset
Vending
Machine
E-commerce
Billing Server
Source: UMTS Forum
Figure 8.4: Vending Machine Scenario
In this scenario the initial communication is via Bluetooth and so the first UMTS
communication is for an authorisation request. If the vending server is unsophisticated
then the response will be an acceptance or rejection only. For low value transactions it
is probably sufficient to use the fact that the end user has already established a
connection with the UMTS service provider to accept the end user as the “known”
party.
In higher value transactions or where fraud is suspected it may be necessary to
request additional hidden transmission of a known secret. This secret might be sent
encrypted over the network and either communicated directly to the e-commerce
server or sent via the vending server. Alternatively a method such as the IETF CHAP
(Challenge Handshake Authentication Protocol) might be used. In this case the ecommerce server issues a challenge string. This is modified by the end user using a
secret key known only to the end user. The detailed security methods are not
discussed here.
8.3.3 Value Chain
Figure 8.5 shows the potential flow of “value”, for example revenue, between multiple
parties. The flow may use different value “units” within the chain. The end user might
pay for an item from the service provider using loyalty points whereas the product
distributor is paid in currency units.
 UMTS Forum, 2002
83
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
End-User
Service Provider
Service Supplier/
Distributor
Network Operator
Product Manufacturer/
Distributor
Source: UMTS Forum
Figure 8.5: Vending Machine Scenario Value Chain
8.3.4 Rating and Charging Attributes
The following list of attributes indicates the types of information that are required to be
communicated across the interfaces:
8.3.4.1 Product or service
•
•
•
•
Identifier;
Name;
Basic price;
Price unit.
8.3.4.2 Authorisation
•
•
•
Price of product or service;
Value after discounting (returned);
Authorisation ID.
8.3.4.3 Transaction details
•
•
•
•
•
Date and time;
Value of transaction;
Value unit;
Payment method;
Tax and tax rate (optionally pre-assessed);
 UMTS Forum, 2002
84
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
•
•
UMTS
Forum
Tax jurisdiction;
Final status (e.g. completed, aborted, delivery failed).
8.3.4.4 End-user identification
•
•
•
IMSI or user ID + password;
Mobile station IP address;
Unique ID or session ID.
8.3.5 Standardisation Requirements
The following interfaces require standardisation for the complete model above to be
delivered across multiple vendor and service provider servers:
•
•
•
Authorisation request and response (including payment option);
Authentication challenge and response;
Accounting record information.
M-tailing usually involves the partnership of many trading partners. This means that
controls need to be in place to audit the transactions made and to reconcile
transactions against payments. Some of this will be similar to Interconnect
Accounting, others will be on ´trust` – for example counting the number of advertising
pages viewed.
8.4
LOCATION-BASED SERVICES
8.4.1 Introduction
For location-based services, industry leaders are working to make the various location
determination technologies interoperable and to define standards for new network
elements for location services.
The industry has been faced with the problem of defining the services that would use
this technology. There is now more or less a consensus of the kind of services that will
exist. As discussed in section 7.8, 3GPP has defined four main categories of locationbased services:
•
•
•
•
Value-added services;
PLMN operator-based services;
Emergency services;
Lawful interception services.
The value-added services are further classified into:
−
−
−
−
Information services;
Navigation services;
Tracking services;
Advertising services.
The scenarios involving these services are very complex. The different parties
involved range from network operators to consumers, application providers, content
 UMTS Forum, 2002
85
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
providers and infrastructure providers. They also involve different bearers and network
elements ranging from SMS to application servers, MMS, GSM, GPRS, UMTS, GPS
and IP.
The major issues are illustrated by the example of an end user new in town wishing to
find the nearest Italian restaurant.
8.4.2 Processes
Several entities are involved in a typical mobile location service as shown in Figure
8.6. The typical process flow would be:
•
•
•
•
•
•
The end user sends a request to the service provider to be connected to an
application to list Italian restaurants near to his current location.
The application requests the location of the user. This could involve various
techniques (e.g. GPS or triangulation of cell ID from base stations).
The application finds a list of local Italian restaurants from a database.
The application uses the user’s location and the location of the restaurants to
define a map showing all the locations.
Before transmitting the information back, the mobile operator adds an
advertisement from “typical restaurants” and sends it back to the user.
The end user looks for Italian restaurants but also becomes interested in “typical
restaurants” and calls the “typical restaurants” call centre.
Typical
Restaurants
(Advertiser)
Voice
Information
Provider
Mobile
Portal
Text
Image
Video
Audio
Application
Server
Mapping
Application
Location
Server
Source: UMTS Forum
Figure 8.6: Restaurant Locator Process Example
Standardisation issues raised by such a process flow include:
 UMTS Forum, 2002
86
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
•
•
•
UMTS
Forum
Standard facilities to determine the location of the user;
Standardised location Indicators on all geographic-based data;
Standard interfaces to Geographic Information Systems.
8.4.3 Value Chain
Many entities, services and media types are involved even in a very simple locationbased service configuration (Figure 8.7). The values shared amongst the various
entities will depend critically on the service used.
In general, 3G services involve revenue sharing between an increasing number of
chargeable parties. Location-based services add still further to the number of parties
involved in revenue sharing. Location-based services introduce parties such as
location service providers, location application providers and location-based
advertisers. For some services the costs may be shared between subscribers and
wireless advertisers. The business models and value chains are quite unclear in such
scenarios.
End-User
Advertiser
Service Provider
Mapping Service
Provider
Network Operator
Italian Restaurant
Information
Provider
Source: UMTS Forum
Figure 8.7: Location-Based Services Value Chain
8.4.4 Rating and Charging Attributes
New strategies for billing based on location information can be envisaged.
Certain parameters directly related to location services can be extracted from the
network and could be used for billing:
 UMTS Forum, 2002
87
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
•
•
•
UMTS
Forum
User location can be used as a billing parameter. Services may be more
expensive in a large city or when roaming in other countries.
Accuracy of location information can be a billable parameter.
Specific location information can be billed according to the kind of media used
such as text, image, video, audio or voice.
Other parameters, not related to the example used here, include:
•
•
•
8.5
Response time options of location information, which could vary from no delay to
delay tolerant. Delay tolerant applications could be priced lower.
Privacy and security given to the location-based service could be another billable
parameter.
The priority given to the application requesting location information can be a
valuable billing parameter.
BROADCASTING
8.5.1 Introduction
Broadcasters can use UMTS for offering their services and as a return channel for
charging information. The issues are addressed here using the example of Terrestrial
Digital Video Broadcasting (DVB-T). The spectrum used for DVB-T services is not the
same as that used for UMTS.
Charging principles are illustrated in this chapter using the example of requesting and
paying for a broadcast video film. The requesting process and back channel use the
UMTS network but the film is viewed via DVB-T. There may be a single terminal
device for the complete transaction or there may be linked UMTS and DVB-T devices
– in the examples this is transparent. There are three different payment scenarios.
8.5.2 Processes
8.5.2.1 Introduction
Several processes are involved in the broadcast delivery. In general we can identify
the following main processes:
•
•
•
•
•
•
•
•
•
The user makes a request to view broadcast video films;
Identification of the user takes place;
The user is offered a menu of choices of films he is allowed to see;
The user views trailers from the three films he likes best;
The user makes a selection of the video he wants to see;
The user selects the payment model;
There is authorisation that funds are available;
The broadcast server delivers a decryption key to the user;
The user then views the broadcast video.
The sequence of these processes is given in Figure 8.8.
 UMTS Forum, 2002
88
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Sequence
Request
User
Identified
Menu
Pre-view
Selection
Trailer
Selection /
Payment
Model
Key delivery
MS
Application
Server
Authorization Payment
Server
Identification
Broadcast
Server
Source: UMTS Forum
Figure 8.8: Broadcast Processes
8.5.2.2 Payment scenarios
The following sections discuss the three different payment scenarios.
8.5.2.2.1 Pay per view scenario
A UMTS user accesses a page on the application server and selects a video he wants
to see. The user selects the pay per view payment model (Figure 8.9). He receives a
broadcast decryption key that is valid for the selected video and a payment rate
(perhaps Euro 0.10 per 3 minutes).
 UMTS Forum, 2002
89
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
Encrypted
content
DxB
B roadcas ter
Log in
Decryption key
+ R ate
X Euro/Min
UMTS
Confirmation
Application S erver
Us er ID / IM S I / credit card #
Payment S erver
Log -file
Decryption key is valid for one s es s ion
Source: UMTS Forum
Figure 8.9: Pay per View Scenario
The payment server collects payment events at regular intervals. At the end of the
video, or after say 10 minutes of not receiving any more payment events, the amount
due will be sent to a credit card server or to the telecommunication operator’s billing
support system.
A broadcaster could make the price (per event) dependent on the quality of service. In
principle quality of service could be measured at two points. The first is at the
broadcast transmitter and the second at the receiver in the mobile. The second case
provides the only way to measure the quality of service perceived by the user.
Appropriate measurements could be the signal to noise ratio or the number of lines or
frames missing. Fair models need to be defined and standardised.
8.5.2.2.2 Pay per session scenario
In this case the user selects a per session (per video) payment model at the
application server’s page (Figure 8.10). Even if the user views the video for only five
minutes they still have to pay for the whole video. The price could be dependent on
the level of advertisements accepted by the user.
 UMTS Forum, 2002
90
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
DxB
Encrypted
content
S ig n-up
Decryption key
UMTS
Forum
B roadcas ter
UMTS
Application S erver
Us er ID / IM S I / credit card #
Log -file
Decryption key is valid for one s es s ion
Source: UMTS Forum
Figure 8.10: Pay per Session Scenario
This model is similar to that available nowadays in hotels.
8.5.2.2.3 Recurring charge scenario
The recurring charge payment scenario (Figure 8.11) is well accepted nowadays for
broadcast analogue video and audio. In general quality of service is not taken into
consideration. The video and audio are regularly interrupted by commercials.
The UMTS channel is used for making periodic payments.
 UMTS Forum, 2002
91
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
DxB
Encrypted
content
S ig n-up
Decryption key
UMTS
Forum
B roadcas ter
UMTS
Application S erver
Us er ID / IM S I / credit card #
Log -file
Decryption key is valid for a period
Source: UMTS Forum
Figure 8.11: Recurring Charge Scenario
8.5.2.3 Evaluation of the payment models
The advantages and disadvantages of these different payment models are
summarised in Table 8.1.
Payment
Model
Pay per
view
Pay per
session
Recurring
charge
Advantage
Disadvantage
You only pay for what you view
No subscription fee required
Simple model
No subscription fee required
Payment server needs to accumulate events
Broadcaster’s income is difficult to predict
Broadcaster’s income is difficult to predict
Customer representative has to deal with QoS
issues.
Customer representative has to deal with QoS
issues
A contract is required
Lots of commercials
Simple model
The broadcaster receives fees in
advance
Similar model to pay TV
Source: UMTS Forum
Table 8.1: Broadcast Payment Models
Pay per session and pay per period models are the least complicated. Most
broadcasters will offer both models, aimed at different target groups.
8.5.3 Value Chain
Figure 8.12 shows the potential parties involved in the value chain. A broadcaster can
receive revenue from two different parties, the advertiser and the end user, and often
also acts as a content aggregator.
 UMTS Forum, 2002
92
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
End-User
UMTS
Forum
Advertiser
Service Provider
Broadcaster
Network Operator
Content Producer/
Aggregator
Source: UMTS Forum
Figure 8.12: Broadcast Value Chain
8.5.4 Rating and Charging Attributes
Charging parameters should be delivered to the billing system in a standardised way.
A number of different charging parameters can be identified:
Content
− Name,
− Price.
Identification
− IMSI or user ID,
− Device or USIM IP address,
− Unique ID or session ID.
Payment per
− View, rate (Euro/minute),
− Session,
− Period.
Other
−
−
−
−
−
−
Transport method (DxB, cable, xDSL),
Requested QoS,
Accumulated price,
Timestamp, duration,
Device type or terminal capabilities,
Accepted level of advertisements.
 UMTS Forum, 2002
93
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
9. ABBREVIATIONS AND GLOSSARY
2G
Second Generation
2G+ or 2.5G
Second Generation Enhanced
3G
Third Generation
3GPP
Third Generation Partnership
Project
AAA
Authentication, Authorisation and
Accounting (as specified by the
IETF)
A/D or ADC
Analogue-Digital Converter
ADPCM
A-GPS
AMCS
Adaptive Differential Pulse Code
Modulation
Assisted GPS
Advanced Modulation and Coding
Schemes
ANSI T1
American National Standards
Institute T1 Committee
API
Application Program Interface
APN
Access Point Node
www.ansi.org
www.t1.org
An API (sometimes called application
programming interface) is the specific method
prescribed by a computer operating system or
by an application program by which a
programmer writing an application program
can make requests of the operating system or
another application.
An applet is a program that runs inside another
application such as a web browser. The
program starts when the page within which it is
contained is downloaded.
Applets are often used to create features
including news bars (tickers) or more
sophisticated interfaces than those supported
by the HTML standard.
Java is an example of a coding language in
which applets can be created.
Applet
ARIB
ATIS
AV
AVI
Generic name for second generation networks,
for example GSM.
Name given to 2G networks enhanced with
GPRS or EDGE.
Generic name for third generation networks,
for example UMTS.
A co-operation between regional standards
bodies to ensure global interworking.
www.3gpp.org
Authentication: The act of verifying a claimed
identity, in the form of a pre-existing label from
a mutually known name space, as the
originator of a message (message
authentication) or as the end-point of a
channel (entity authentication).
Authorisation: The act of determining if a
particular right, such as access to some
resource, can be granted to the presenter of a
particular credential. The act of collecting
information on resource usage for the purpose
of trend analysis, auditing, billing, or cost
allocation.
A functional block or circuit section to convert
analogue signal to digital signal.
Association of Radio Industries and
Businesses
Alliance for Telecommunications
Industry Solutions
Audio-visual
Audio Video Interleave
 UMTS Forum, 2002
94
www.arib.or.jp
Focus on e.g. SHDSL, HDSL2, HDSL4,
modems etc. www.atis.org
Generic abbreviation for audio-visual content.
Extension for Microsoft video format files.
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
BCDF
Broadband Content Delivery Forum
Beanz
TM
Bluetooth
Wireless standard
BPSK
Binary Phase Shift Keying
Broadcast
Content distribution to all in a
region/area
CC
Cellular-Cellular
CD
Compact Disc
CDR
Call Data Record
CD-ROM
Compact Disc – Read Only Memory
CEN
Comité Européen de Normalisation
CENELEC
The European Committee for
Electrotechnical Standardisation
c-HTML
Compact-HTML
 UMTS Forum, 2002
UMTS
Forum
The BCD Forum is a unique collaborative
effort of leading infrastructure, content and
service providers that are developing business
models and standards that accelerate the
deployment of broadband content over the
Internet – enabling business and residential
customers to receive high-quality, multimedia
content anytime, anywhere.
www.bcdforum.org
An example of e-money or money which only
exists in the virtual domain. "Beanz.com"
provides a facility for electronic payment in an
on-line currency called "Beanz" which can be
used in the purchase of goods or services from
co-operating sites or businesses. Individuals in
this case, receive "Beanz" for visiting websites,
for undertaking transactions on websites and
so on. Importantly the management of the
transaction and of individual client and supplier
accounts are done electronically and are free
to the user, through the "Beanz" site (and back
office).
Short-range radio link standard. Uses
unlicensed spectrum @ 2.45 GHz to provide
1 Mbit/s.
A delivery system where a copy of a given
packet is transmitted simultaneously to all
receivers on a network.
95
Initially used to store music, now used for data
and increasingly movies.
Records produced by network entities, i.e.
switches, to provide information to billing
systems.
Initially used to store music, now used for data
and increasingly movies.
A body coordinating standardisation activities
in the EEC (European Economic Community)
and EFTA (European Free Trade Area)
countries.
A body developing electrotechnical standards
for the Single European Market / European
Economic Area in order to reduce internal
frontiers and trade barriers for electrotechnical
products, systems and services. CENELEC's
19 member countries and 11 affiliate countries
aim to adopt and implement the required
standards, which are mostly identical to the
International Electrotechnical Commission
(IEC) standards. CENELEC works in cooperation with Comité Européen de
Normalisation (CEN) and European
Telecommunications Standards Institute
(ETSI).
A Hypertext document format used on the
world-wide web. Built on top of SGML. "Tags"
are embedded in the text. A tag consists of a
"<", a "directive" (case insensitive), zero or
more parameters and a ">". Matched pairs of
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
directives, like "<TITLE>" and "</TITLE>" are
used to delimit text which is to appear in a
special place or style.
CLI
CN
Calling Line Identification
Physical infrastructure linking wireless base
stations. Predominantly circuit switched, core
networks will increasingly become packet
switched.
Core Network
CSS
Common Presence and Instant
Messaging
Cathode Ray Tube
Carrier Sense Multiple Access with
Collision Avoidance
Cascading Style Language
CVSD
Continuous Variable Slope Delta
DAB
Digital Audio Broadcasting
DECT
Digital Enhanced Cordless
Telecommunications
DigiTAG
Digital Terrestrial TV Action Group
DNS
Domain Name Server
DRM
Digital Rights Management
DV
Digital Video
DVB
Digital Video Broadcasting
DVB-C
Digital Video Broadcast – Cable
DVB Project
Digital Video Broadcast Project
DVB-S
DVB-T
Digital Video Broadcast – Satellite
Digital Video Broadcast –Terrestrial
DVD
Digital Video Disc
CPIM
CRT
CSMA/CA
DxB
EAI
Generic term used for Digital
Video/Audio Broadcast (DVB and
DAB)
Enterprise Application Integration
 UMTS Forum, 2002
96
A voice codec that is used for Bluetooth voice
connection.
A digital radio technology used for radio
broadcasting in a number of countries.
A wireless technology used for short range
communications, for example cordless
telephones.
Forum to promote and harmonise digital
terrestrial TV. DigiTAG covers various systems
for interoperability and harmonisation of
technologies for interactive terrestrial digital TV
services. www.digital.org
Internet name resolution server.
DRM is a type of server software developed to
enable secure distribution – and perhaps more
importantly, to disable illegal distribution – of
paid content over the web. DRM technologies
are being developed as a means of protection
against the online piracy of commercially
marketed material, which has proliferated
through the widespread use of peer-to-peer file
exchange programs.
A plug-in circuit cartridge required by some
games consoles in order to play MPEG video
material. Digital camcorder format. Moving
JPEG compression factor 5:1
A digital radio technology used for television
broadcasting in a number of countries.
DVB standard for cable distribution.
Consortium developing DVB technologies.
Standardisation by ETSI and CENELEC.
www.dvb.org
DVB standard for satellite distribution.
DVB standard for terrestrial distribution.
An acronym that officially stands for nothing,
but is often expanded as Digital Video Disc or
Digital Versatile Disc. The audio / video / data
storage system based on 12- and 8-cm optical
discs.
Not technology related.
A method for connecting multiple systems
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
EBU
European Broadcasting Union
e-commerce
Electronic Commerce
EDGE
Enhanced Data rates for Global
Evolution
Edifact
Electronic Data Interchange For
Administration, Commerce and
Transport
EICTA
EMC
E-OTD
together in a flexible way.
www.ebu.ch
Term used to describe transactions that take
place on-line where the buyer and seller are
remote from each other.
A further enhancement to TDMA systems that
allows for data speeds to 384 kbit/s.
A set of internationally agreed syntax
standards, directories and guidelines for the
structuring and exchange between
independent computer systems of data that
can be generated in character format.
Information technology, consumer electronics
and telecommunications industry association
www.eicta.org
See www.cenelec.doc
European Information and
Communications Technology
Industry Association
ElectroMagnetic Compatibility
Enhanced Observed Time
Difference
An operating system designed for small,
portable computer-telephones with wireless
access to phone and other information
services.
EPOC
ETSI
EU
GFSK
GGSN
GMLC
European Telecommunications
Standards Institute
European Union
Gaussian Frequency Shift Keying
Gateway GPRS Support Node
Gateway Mobile Location Centre
GPRS
General Packet Radio Service
GPS
Global Positioning System
Global System for Mobile
communications
GSM
GSM
Association
GUI
The community of European nations.
www.gsmworld.com
Graphical User Interface
The ITU-T standard for sending voice (audio)
and video using IP on the Internet and within
intranets. H.323 is sponsored by the IMTC's
Conferencing over IP Activity Group.
Handheld Device Markup Language
HiperLAN
High-Performance Radio Local
Area Network
HLR
HomeRF
Home Location Register
Home RF network system
HSDPA
The standards body for Europe. www.etsi.org
Technique used to upgrade current TDMA
networks. Allows a subscriber to gain up to
eight 14.4 kbit/s channels. Also introduces
packet switching.
A satellite-based positioning system.
The most popular standard for 2G mobile
networks.
H.323
HDML
UMTS
Forum
An ETSI standard that operates at up to
54 Mbit/s in the 5 GHz RF band. HiperLAN2 is
compatible with 3G WLAN systems for
sending and receiving data, images, and voice
communications.
Currently 3GPP is specifying enhancements to
the UMTS Terrestrial Radio Access Network
(UTRAN) collectively known as HSDPA with
the goal to enable packet data transmission in
the downlink at speeds of theoretically up to 10
Mbit/s and increase achievable data rates.
High Speed Download Packet
Access
 UMTS Forum, 2002
97
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
HTML
Hypertext Markup Language
HTTP
HyperText Transfer Protocol
IAB
Internet Architecture Board
International Corporation for
Assigned Names and Numbers
Information and Communication
Technologies Group
Identity
ICANN
ICTG
ID
Hypertext is any text that cross-references
other textual information with hyperlinks.
www.ietf.org
www.icann.org
A working group of the UMTS Forum.
IDv3
A set of TAG definitions embedded
in MP3 files. With the use of these
TAGS one can dtermine the Artist,
Title, Album etc.
IEC
International Electrotechnical
Commission
IEC TC-100
IEEE
Multimedia Systems and
Equipments Standardisation
Committee
Institute of Electrical and
Electronics Engineers
IEEE 802.11x
IEEE standard
IETF
Internet Engineering Task Force
IM
Instant Messaging
IMSI
IMT-2000
The audio format MPEG layer I, layer II and
layer III (MP3) has no native way of saving
information about the contents, except for
some simple yes/no parameters like "private",
"copyrighted" and "original home" (meaning
this is the original file and not a copy). A
solution to this problem was introduced with
the program "Studio3" by Eric Kemp alias
NamkraD in 1996. By adding a small chunk of
extra data in the end of the file one could get
the MP3 file to carry information about the
audio and not just the audio itself. www.id3.org
Global standardisation body at the same level
as ISO. Deals with e.g. electrical safety, EMC,
multimedia systems and equipment, recording
systems etc. www.iec.ch
www.iec.ch
US-based technology development forum.
www.ieee.org
A family of IEEE standards for wireless LAN
technology.
A standards orientated group that works on
specifying and developing Internet standards.
Mobile information service offered by NTT
DoCoMo in Japan.
i-mode
IMPS
UMTS
Forum
Instant Messaging and Presence
Services
International Mobile Subscriber
Identity
International Mobile
Telecommunications
ITU initiative for a global standard 3G wireless
data network.
IMUnified is a coalition formed in July 2000 to
generate a technical specification to enable
functional interoperability and open standards
for IM.
Term used to describe the entities that go to
make up a network which exhibits some form
of embedded intelligence allowing services
such as number portability and pre pay.
The dominant network layer protocol used with
the TCP/IP protocol suite.
A technology for encrypting IP packets. An
additional feature for IPv4 but a standard
feature of IPv6.
The version of IP in common use today.
IMUnified
IN
Intelligent Network
IP
Internet Protocol
IPSec
Internet Protocol Security
IPv4
Internet Protocol version 4
 UMTS Forum, 2002
98
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
The emerging standard, which aims to rectify
some of the problems seen with IPv4, not least
the address space.
An industry-sponsored organisation set up in
1993 to create international standards for the
hardware and software used in infrared
communication links.
A telephone service that offers high speed
digital services for devices connected to a
telecommunication network.
Frequency bands in the radio spectrum that
are unlicensed, meaning they can be used for
a variety of applications without specific FCC
permission. The bands are used traditionally
for in-building and system applications such as
bar code scanners and wireless LANs.
Because there is no licensing requirement, the
potential for interference exists. Therefore,
spread spectrum technology is often used to
protect the integrity of data transmission.
IPv6
Internet Protocol version 6
IrDA
Infrared Data Association
ISDN
Integrated Services Digital Network
ISM Band
Industrial Scientific & Medical Band
ISO
International Standards
Organisation
www.iso.ch
ISSS
Information Society Standardisation
System
Provides market players with a comprehensive
and integrated range of standardisationoriented services and products.
www.cenorm.be
IT
Information Technology
ITU
International Telecommunication
Union
ITV
International Telecommunication
Union – Radiocommunications
sector
International Telecommunication
Union – Telecommunications
standardisation sector
Interactive TV
J2ME
Java 2 Micro Edition
ITU-R
ITU-T
An international organisation within the United
Nations System where governments and the
private sector co-ordinate global telecom
networks and services.
www.itu.int
www.itu.int
Java
JPEG
Joint Photographic Expert Group
JTC1
ISO/IEC Joint Technical Committee
on Information Technology 1
Kerberos
LAN
Local Area Network
 UMTS Forum, 2002
99
Java for small devices with limited
computational capabilities
Java is a programming language expressly
designed for use in the distributed environment
of the Internet.
A picture format. Standard for the compression
of still pictures. www.jtc1.org
Main activity areas are signal compression and
presentation technologies such as MPEG. See
www.jtc1.org or www.cselt.it/mpeg or
http:mpeg.telecomitalialab.com/
The authentication system of MIT's Project
Athena. It is based on symmetric key
cryptography. Adopted by OSF as the basis of
security for DME.
A data communications network which is
geographically limited (typically to a 1 km
radius) allowing easy interconnection of
terminals, microprocessors and computers
within adjacent buildings. Ethernet and FDDI
are examples of standard LANs. Because the
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
network is known to cover only a small area,
optimisations can be made in the network
signal protocols that permit data rates up to
100 Mbit/s.
LBS
Location-Based Service
LCD
Liquid Crystal Display
LCS
LoCation-based Services
LED
Light Emitting Diode
LMU
Mb
MB
Local Microwave Distribution
System
Location Measurement Unit
Mega bits
Mega bytes
m-commerce
Mobile Commerce
LMDS
LCD is the technology used for displays in
notebook and other electronics devices. LCDs
allow displays to be much thinner than cathode
ray tube (CRT) technology. LCDs consume
much less power than LED and gas-display
displays because they work on the principle of
blocking light rather than emitting it.
Terminology used in standardisation work.
A special type of diode that emits light when
electricity is applied to its anode and cathode.
Mbit/s = Mega bits per second
Metadata
MHEG
MHEG is the standard for multimedia data (stills, audio, text and
video)
MHP
Multimedia Home Platform
MJPEG
Moving JPEG
MMI
Man Machine Interface
MMS
Multimedia Messaging Service
MP3
Music Player
 UMTS Forum, 2002
Similar to e-commerce but the term is usually
applied to the emerging transaction activity in
mobile networks .
Metadata is structured data which describes
the characteristics of a resource. It shares
many similar characteristics to the cataloguing
that takes place in libraries, museums and
archives. The term "meta" derives from the
Greek word denoting a nature of a higher
order or more fundamental kind. A metadata
record consists of a number of pre-defined
elements representing specific attributes of a
resource, and each element can have one or
more values.
MHEG is an ISO standard-to-be that defines
the representation and encoding of multimedia
and hypermedia objects. It does so with a
platform-independent object model that is
tailored to support real-time interchange of
multimedia information between various kinds
of servers, set tops, and computers. Although
MHEG does not depend on a particular
operating system or hardware, it does imply an
MHEG software engine that interprets
incoming communications and prepares
outgoing messages according to MHEG
syntax. www.jtc1.org
MHP consists of the home terminal set top
box, TV, PC, its peripherals and the in-home
digital network. It offers enhanced
broadcasting interactive services and Internet
access. www.dvb.org
www.jtc1.org
A term used to describe the environment that
encompasses the activities surrounding a user
and their interaction with a device.
The term has become synonymous with the
MP3 player that delivers CD quality music. It is
100
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
MPEG
Moving Picture Expert Group
MS
Mobile Station
the MPEG-2 audio layer 3. www.cselt.it/mpeg
Standard for compression of moving pictures
and sound. MPEG-4 and MPEG-2 are both in
use. www.cselt.it/mpeg
Sometimes called Mobile Telephone Switching
Office (MTSO), the MSC is the sophisticated
central computer (“switch”) that controls the
operation of a wireless system and acts as an
interface between the wireless network and
the PSTN. It establishes and monitors all
wireless calls, tracks the location of all mobile
telephone users in the system, conducts handoffs, and records billing data.
MSC
Mobile Switching Centre
MSF
Multiple Switching Forum
m-tailing
Mobile tailing
Multicast
Transmission feature: one-to-many
MWIF
NAT
NIC
Mobile Wireless Internet Forum
Name and Address Translation
Network Interface Card
NO
Network Operator
NPAD
OS
Non Programme Associated Data
Operating System
Expression used in the Billing and Charging
environment for mobile retailing.
A form of communication whereby a single
information flow can be directed to multiple
receivers simultaneously.
www.mwif.org
The organisation responsible for the operation
of the infrastructure that forms a wireless
network, who could also be a service provider.
The umbrella term for the seven-layer network
architecture model and a series of nonproprietary protocols and specifications
developed by ISO as a framework for
international standards in heterogeneous
computer network architectures.
OSI
Open System Interconnection
OTA
OTDOA
Over-The-Air
Observed Time Difference of Arrival
P3P
Platform for Privacy Preferences
Project
PAD
Programme Associated Data
 UMTS Forum, 2002
UMTS
Forum
101
The Platform for Privacy Preferences Project
developed by the World Wide Web Consortium
(W3C) is emerging as an industry standard
providing a simple, automated way for users to
gain more control over the use of personal
information on web sites they visit. At its most
basic level, P3P is a standardised set of
multiple-choice questions, covering all the
major aspects of a website's privacy policies.
Taken together, they present a clear snapshot
of how a site handles personal information
about its users. P3P-enabled websites make
this information available in a standard,
machine-readable format. P3P enabled
browsers can "read" this snapshot
automatically and compare it to the
consumer's own set of privacy preferences.
P3P enhances user control by putting privacy
policies where users can find them, in a form
users can understand, and, most importantly,
enables users to act on what they see.
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
PAN
Presence and Availability
Management Forum
Personal Area Network
PC
Personal Computer
PCI
PCM
Protocol Connection Identifier
Pulse Code Modulation
Personal Computer Memory Card
International Association
Personal Communications Services
Personal Digital Assistant
Personal Information Management
Personal Identification Number
PAM Forum
PCMCIA
PCS
PDA
PIM
PIN
PKI
Public Key Infrastructure
PLMN
POI
Public Land Mobile Network
Point of Interest
Consortium formed by Lucent, Bell Labs and
Novell in March 2000.
Common term to describe the personal
computer, usually based on a common
architecture.
A PKI enables users of a basically insecure
public network such as the Internet to securely
and privately exchange data and money
through the use of a public and a private
cryptographic key pair that is obtained and
shared through a trusted authority.
A technique for substituting identity to accept
similar functionality or power of substitute and
responsibility to act for another.
The network, or groups of networks, consisting
of switches and transmission that provide the
bulk of switched services to the general public.
Subjective and objective metric sets that
quantify the performance of a network and its
suitability for use with some applications and
services.
Proxy
PSTN
Public Switched Telephone
Network
QoS
Quality of Service
QPSK
R&D
RCT
Quaternary Phase Shift Keying
Research & Development
Return Channel Terrestrial
RDF
Resource Description Framework
Release 4
Standards Release from 3GPP
Release 5
Standards Release from 3GPP
Release 99
Standards Release from 3GPP
RFC
RSS
Request For Comments
Radio Sub-System
www.dvb.org
A type of XML document, which can be used
to describe an information object.
Term applied to the group of standards
released by 3GPP in March 2001 that
concentrate on the core network. Previously
known as Release 00. www.3gpp.org
The release that will introduce the IP
multimedia subsystem into the network.
www.3gpp.org
Term applied to the group of standards
forming the first phase of standards released
by 3GPP in December 1999 mainly
concentrating on the radio access network.
www.3gpp.org
IETF procedure for standards specification.
Directive 99/5/EC of The European Parliament
and of the Council of 9 March 1999 on radio
equipment and telecommunications terminal
equipment and the mutual recognition of their
conformity.
RTTE Directive
 UMTS Forum, 2002
UMTS
Forum
102
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
SDO
SGML
SGSN
SIM
SIMPLE
SIP
Standards Development
Organisation
Standard Generalized Markup
Language
Serving GPRS Support Node
Subscriber Identity Module
SIP for Instant Messaging and
Presence Leveraging
Session Initiation Protocol
A working group formed in May 2001 within
the Internet Engineering Task Force (IETF).
The system that enables the sending and
receiving of short text messages, 160
characters. This system has proved
phenomenally successful.
A protocol designed for the seamless
transmission of electronic mail across an
internetwork using email servers and clients.
SMS
Short Message System
SMTP
Simple Mail Transfer Protocol
SP
SSL
Service Provider
Secure Socket Layer
STB
Set top box
SWAP
Shared Wireless Access Protocol
SyncML
An open industry standard for
universal synchronisation of remote
data and personal information
across multiple networks, platforms
and devices
TCP
Transmission Control Protocol
TDMA
TDOA
TLS
TOA
Transmission Control Protocol/
Internet Protocol
Time Division Multiple Access
Time Difference Of Arrival
Transport Layer Security
Time Of Arrival
TV
Television
TX
UDP
Transmitter
User Datagram Protocol
Universal Mobile
Telecommunications System
TCP/IP
UMTS
UMTS Forum
The box that connects to the television set and
acts as an interface to the broadband network.
A specification for wireless connectivity within
the HomeRF environment.
SyncML is a common language for
synchronising all devices and applications over
any network. SyncML leverages Extensible
Markup Language (XML), making SyncML a
truly future-proof platform. With SyncML,
networked information can be synchronised
with any mobile device, and mobile information
can be synchronised with any networked
applications.
SyncML minimises the use of bandwidth and
can deal with the special challenges of
wireless synchronisation such as the relatively
low reliability of the connection and high
network latency. SyncML also enables
synchronisation over fixed networks, infrared,
cable or Bluetooth.
A transport layer protocol that offers
connection orientated, reliable stream services
between two hosts. This is the primary
transport protocol used by TCP/IP
applications.
www.ietf.org
WAP security layer.
General term used to describe broadcast and
reception of video and audio.
Internet distribution protocol. www.ietf.org
ETSI specified standard for 3G.
Non profit, independent forum that gives
guidance to standards and other bodies in
Cross industry body
 UMTS Forum, 2002
UMTS
Forum
103
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
terms of market requirements and issues to be
solved to allow for a smooth deployment of
UMTS. www.umts-forum.org
Unicast
URL
vcard
VLR
VoD
Point-to-point communications
Uniform Resource Locator
Universal Subscriber Identity
Module
UMTS Terrestrial Radio Access
UMTS Terrestrial Radio Access
Network
Virtual Card
Visitor Location Register
Video on Demand
VoIP
Voice over IP
USIM
UTRA
UTRAN
The module that identifies, and is unique to,
the mobile subscriber.
Electronic business card.
The generic term used to describe the
techniques used to carry voice traffic over IP.
High-quality variable bit rate video.
A network that can exist discretely on a
physical infrastructure consisting of multiple
VPNs.
VP3
VPN
Virtual Private Network
VR
Virtual Reality
VXML
Voice eXtensible Markup Language
W3C
Worldwide Web Consortium
A markup language designed to make
resources on the web accessible by phone.
WAP
Wireless Application Protocol
Used to allow the transmission of simple web
pages in 2G networks. Consists of a protocol
stack that covers layers 4 to 7 of the OSI
model. Uses IP but replaces TCP and HTTP
with UDP. Web pages are written in WML.
WAP Forum
Wireless Application Protocol
Forum
www.WAP
WinCE
Windows CE is based on the Microsoft
Windows operating system but is designed for
including or embedding in mobile and other
space-constrained devices.
Initiative formed in April 2001 by Nokia,
Ericsson and Motorola to build a community
around mobile Instant Messaging and
Presence Services (IMPS).
Windows CE
Wireless Village
WLAN
WML
Wireless Local Area Network
Wireless Markup Language
xDSL
Digital Subscriber Line
xHTML
extensible Hypertext Markup
Language
XML
eXtensible Markup Language
 UMTS Forum, 2002
A group of technologies that allow higher
speed access over standard connections to a
telecommunications network, for example
ADSL, which offers up to 512 kbit/s in one
direction and up to 8 Mbit/s in the other.
www.adsl.com or www.dslforum.org
Defines a single namespace for html:
http://www.w3.org/1999/xhtml. Relies on
HTML 4.01 for the semantics and data types of
elements and attributes. Defines XHML 1.0
DTDs corresponding to HTML4's strict,
transitional and frameset DTDs. Provides
guidelines for authoring XHTML documents for
delivery to existing web browsers. Existing
HTML can be trivially converted to XHTML
using W3C's Open Source HTML Tidy utility.
An open standard for describing data from the
104
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
W3C. HTML was created as an application of
SGML – the Standard Generalized Markup
Language (ISO 8879:1986). XML is a
descendant of SGML which is easier to
implement.
XMT
XNS
eXtensible MPEG-4 Textual Format
This is a protocol the provides an open
platform for establishing and managing Web
identity, a foundational element of web
services architectures. XNS-based identity
solutions meet the following architectural
requirements for web identity:
-Open standard with published technical
specifications,
-Federated identity management,
-Platform-independent, vendor-independent,
-Interoperable with existing standards.
Extensible Name Service
 UMTS Forum, 2002
105
Report 14
Support of Third Generation Services using UMTS in a Converging
Network Environment
UMTS
Forum
10. BIBLIOGRAPHY
“UMTS Market Forecast Study”, Final Report for EC DG XIII, Analysys/Intercai. Including Annex AB, February 1997.
UMTS Forum Report No. 1: “A Regulatory Framework for UMTS”, June 1997.
UMTS Forum Report No. 2: “The Path towards UMTS Technologies for the Information Society”,
September 1998.
UMTS Forum Report No. 3: “The impact of licence cost levels on the UMTS business case”, October
1998.
UMTS Forum Report No. 4: “Considerations of Licensing Conditions for UMTS Network Operations”,
September 1998.
UMTS Forum Report No. 5: “Minimum spectrum demand per public terrestrial UMTS operator in the
initial phase”, September 1998.
UMTS Forum Report No. 6: “UMTS/IMT-2000 Spectrum”, December 1998.
UMTS Forum Report No. 7: “Report on Candidate Extension Bands for UMTS/IMT-2000 Terrestrial
Component”, March 1999.
UMTS Forum Report No. 8: “The Future Mobile Market”, March 1999.
UMTS Forum Report No. 9: “The UMTS Third Generation Market – Structuring the Service Revenue
Opportunities”, September 2000.
UMTS Forum Report No. 10: “Shaping the Mobile Multimedia Future”, September 2000.
UMTS Forum Report No. 11:"Enabling UMTS/Third Generation Services and Applications”, October
2000.
UMTS Forum Report No. 12: "Numbering and Addressing”, January 2001.
UMTS Forum Report No. 13: "The UMTS Third Generation Market – Phase II: Structuring the Service
Revenue Opportunities”, April 2001.
 UMTS Forum, 2002
106
Report 14