CJK 7 th Plenary: NGN-WG (IPv6 based NGN) IPv6 based NGN (NGNv6)
NGN Service Exposure: Web 2.0 Meets Telco - IEEE CQRcqr2008.ieee-cqr.org/Day 2/Session 5/3 Eric...
Transcript of NGN Service Exposure: Web 2.0 Meets Telco - IEEE CQRcqr2008.ieee-cqr.org/Day 2/Session 5/3 Eric...
![Page 1: NGN Service Exposure: Web 2.0 Meets Telco - IEEE CQRcqr2008.ieee-cqr.org/Day 2/Session 5/3 Eric Burger.pdf · NGN Service Exposure: Web 2.0 Meets Telco Eric Burger A-GM, BEA Comm.](https://reader033.fdocuments.us/reader033/viewer/2022050308/5f70e7ed87d7c94d8e1f5fa9/html5/thumbnails/1.jpg)
NGN Service Exposure: Web 2.0 Meets Telco
Eric BurgerA-GM, BEA Comm. Prod. DivisionDeputy CTO, BEA SystemsChairman, SIP Forum
![Page 2: NGN Service Exposure: Web 2.0 Meets Telco - IEEE CQRcqr2008.ieee-cqr.org/Day 2/Session 5/3 Eric Burger.pdf · NGN Service Exposure: Web 2.0 Meets Telco Eric Burger A-GM, BEA Comm.](https://reader033.fdocuments.us/reader033/viewer/2022050308/5f70e7ed87d7c94d8e1f5fa9/html5/thumbnails/2.jpg)
Killer Application versus Killer Environment
2BEA Confidential
http://www.widgetbox.com/widget/baby-ticker
http://appget.com/im/pc/apview_027103.htm
![Page 3: NGN Service Exposure: Web 2.0 Meets Telco - IEEE CQRcqr2008.ieee-cqr.org/Day 2/Session 5/3 Eric Burger.pdf · NGN Service Exposure: Web 2.0 Meets Telco Eric Burger A-GM, BEA Comm.](https://reader033.fdocuments.us/reader033/viewer/2022050308/5f70e7ed87d7c94d8e1f5fa9/html5/thumbnails/3.jpg)
Service Exposure
3BEA Confidential© 2006 BEA Systems, Inc. | 3
Personal Services
SIPHTTPDiameter
LIF/MLPMM7/SMPPSS7(INAP/TCAP/MAP)
Core JEE Platform + SIP Servlet APIShared
DataFabric
RT ServicesTelco 2.0 Web Services
PolicyEngineService
Orch
Authentication and Network Protection
Work Non-Work
Person
Enterprise ServicesIT
Telco
SOAWeb 2.0
![Page 4: NGN Service Exposure: Web 2.0 Meets Telco - IEEE CQRcqr2008.ieee-cqr.org/Day 2/Session 5/3 Eric Burger.pdf · NGN Service Exposure: Web 2.0 Meets Telco Eric Burger A-GM, BEA Comm.](https://reader033.fdocuments.us/reader033/viewer/2022050308/5f70e7ed87d7c94d8e1f5fa9/html5/thumbnails/4.jpg)
4Copyright © 2007, BEA Systems, Inc.
Users of the Network Create Applications
Many may look like (or become) companiesMany will be companiesMany will be enterprises: SOX, HIPPA, BASEL II
What if we let ANYONE create applications?What does this mean for guaranteed quality and reliability?What about customer service?
The interesting application is:
Ability of user to create their own application, to use or share
![Page 5: NGN Service Exposure: Web 2.0 Meets Telco - IEEE CQRcqr2008.ieee-cqr.org/Day 2/Session 5/3 Eric Burger.pdf · NGN Service Exposure: Web 2.0 Meets Telco Eric Burger A-GM, BEA Comm.](https://reader033.fdocuments.us/reader033/viewer/2022050308/5f70e7ed87d7c94d8e1f5fa9/html5/thumbnails/5.jpg)
Great Theory – What is the Practice
5BEA Confidential
![Page 6: NGN Service Exposure: Web 2.0 Meets Telco - IEEE CQRcqr2008.ieee-cqr.org/Day 2/Session 5/3 Eric Burger.pdf · NGN Service Exposure: Web 2.0 Meets Telco Eric Burger A-GM, BEA Comm.](https://reader033.fdocuments.us/reader033/viewer/2022050308/5f70e7ed87d7c94d8e1f5fa9/html5/thumbnails/6.jpg)
Summary
6BEA Confidential
Products bridge gap between IT and TelecomCarrier-scale and reliability point solutions
Operator infrastructure not designed for exposureNeed to expose network infrastructure in a secure, manageable, scalable, billable manner
Part of EcosystemCarrier as participant in market (through, not over)
Leverage Existing InfrastructureExposure of more than just IMS: SS7, AIN, etc.