Rethinking Mobile Telephony with the IMP

Total Page:16

File Type:pdf, Size:1020Kb

Rethinking Mobile Telephony with the IMP Rethinking Mobile Telephony with the IMP M. DeYoung, N. Henke, G.Wai and J. M. Smith University of Pennsylvania Abstract : The recent widespread deployment of 3GPP and 3GPP2 phones resemble Internet terminals, wireless LAN technology raises the question of how but use a managed guaranteed bandwidth network. a mobile telephony system might instead be architected to use wireless LAN access points and Device Mobile Access Bearer the Internet to achieve similar services. In this Type Infrastructure Service paper, we examine an end-to-end architecture for Infrastructure mobile telephony, with a strong focus on endpoint Cellular Wireless Circuit- issues. Telephone Circuit- Switched We have designed, implemented, and have Switched (VOIP core?) experience using devices we call Internet Mobile Internet Wireless IP packet Phones or IMPs. The IMP system provides Mobile Phone Packet-Switched switched encrypted wireless voice communication over (IMP) IP 802.11B LANs. IMPs run Linux on a lightweight Table I: Switching and Roles in Voice Services single-board computer running customized voice over IP software; data is encrypted with 128-bit One timely question is whether the growing Internet Blowfish. infrastructure is well-suited to providing a mobile The paper reports on our design decisions and the telephony service, now that wireless access through resulting implementation of the IMPs, with 802.11b LANS is increasingly common, and often sufficient detail to reproduce the devices. We report publicly accessible. our experiences with using them for several months While a widespread IP telephony infrastructure in a laboratory environment, and close with is now being developed and deployed with various proposals for future experiments to investigate scale Voice Over IP (VOIP) protocols, reproducing various and extensibility. features of handheld wireless voice devices intended to behave as mobile telephones presented an interesting 1. Introduction design exercise. In addition, since features are added at the endpoints in the IP architecture, design choices The increasing ubiquity of Internet communication existed for privacy protections unavailable to the and wireless access points has made universal Internet traditional cellular telephone user. These protections access increasingly convenient. There are clearly are particularly attractive in the context of wireless barriers to this vision of accessing a device by its VOIP services. address such as NAT boxes, firewalls and for-pay services, but social factors and technologies such as 1.1. Experimental Goals IPv6 favor its long-term growth. A potentially important consequence of this infrastructure is the Our hypothesis was that a handheld mobile 802.11 ability to utilize the Internet for new applications, some device using IP as a bearer service would provide of which are enabled simply by the availability of new indications that an alternative architecture for mobile edge devices [6] and the addition of some software telephony was possible if not today, then in the very “glue” to achieve interoperability with the existing near future. Our experimental methodology was the Internet infrastructure. implementation of a system, largely centered around The cellular telephone system provides widespread the design of the endpoint (as the end-to-end argument wireless voice service, and is integrated with the [21] would suggest is the appropriate design objective) traditional telephony system. This enjoys excellent we call the Internet Mobile Phone, or IMP. An “network externalities”, as the first deployed cellular operational IMP which emulates circuit-based telephone is part of a network with extensive telephony over wireless access to IP presents an connectivity. Cellular telephones are now evolving objective demonstration of the strength of a purely-IP towards computers, but the basic bearer architecture based mobile telephony approach. has remained one of telephony. Table I illustrates the Our high level design goals for the IMP were as design choices for infrastructures for mobile telephony, follows: with access and bearer architectures on one axis and 1. Design and implement a user device which would some common devices on the other. The traditional serve as a portable personal 802.11b client. mobile phone system uses circuit-switched access and a 2. Implement a fully capable IP host on the device, circuit-switched bearer architecture. While provision of that given an IP address would be able to interact VOIP bearer services is underway in the telephony with any other, including another such device industry, and portions of it such as SS7 or SCTP 3. Provide a simple Voice Over IP (VOIP) service signaling are packet-switched, deployed mobile telephony access infrastructure is circuit-switched. 4. Provide as much of the ad-hoc, unregulated “feel” Internet, typically via DHCP. IP transport can be used of a walkie-talkie as possible, while providing a for both the control and data planes of the system. reasonable mobile telephony service Security criteria can be modeled as CIA – 5. Provide a secure channel establishment protocol Confidentiality, Integrity and Availability. Any and encryption of the data on the VOIP channel broadcast network can be disrupted by transmission- for privacy protection. based attacks (such as jamming or flooding) which would inhibit availability. Thus we did not make 1.2. Outline of this paper availability a security goal, but did set confidentiality and integrity as major goals. The use of cryptography This paper is not about the number of such devices seemed obvious; the question is at where in the design that can be supported by an 802.11b access point, nor it would be employed. In brief, we chose an end-to-end is it about the quality of service required [1] or voice strategy and encrypted voice before transporting it via quality achievable. It is not about audio for desktop use conventional IP. Some privacy goals (such as on a LAN [23,24,25]. Instead, we sought to prototype knowledge of who is talking to whom) are sacrificed in a working secure IP mobile telephony system that met the service of sensible layering, although use of an IP- our high level goals, and was realizable at a reasonable based service allows one to employ very sophisticated cost in both time and money. We believe we have schemes (such as those based on IPsec tunnels [28] or achieved that, as we used the devices to communicate onion routing) if so required. at what, by virtue of our many conversations we judge The IMP establishes logically peer-to-peer to be reasonable voice quality, at least as good as the connections to transmit voice data. Since dynamic IP commercial cellular telephones we use. As an aside, addressing is used, and IP communication between since some of the conversations were about the system, peers requires at a minimum reciprocal knowledge of it might be argued that it helped bootstrap itself into addresses, we maintain a list of the IP addresses of all existence. connected users. When a user logs on to the system the The next section, Section 2, provides a more authentication system will store the IP address assigned detailed discussion of the design goals for an IMP. to the user and allow the user to retrieve IP address of Section 3 describes the hardware realization of our other connected users. This has the flavor of a “buddy handset, including a parts list for those interested in list” or simply an on-line directory. A variety of other reproducing our experiment (one of our long-term schemes are possible under various assumptions about research goals is to build a user community to test how addresses are managed, such as per-device static scalability issues – see Section 8). Section 4 discusses IP addresses; beaconing with ring search for IP address the software environment, which required substantial discovery using fast broadcast [7]; or the “home engineering of device support software and integration address” concepts used in Mobile IP [11]. These issues of encryption and VOIP. Section 5 describes the are not central to the architectural question and while implementation and evaluation of the security features technically fascinating are beyond the scope of this of our system. Section 6 describes our experience paper. using the system. Section 7 concludes the paper with There are a variety of Voice Over IP (VOIP) our assessments of the contributions of this work and platforms. One such platform, the Nautilus [4] open desirable directions for follow-on work. source system includes encryption, provides a good basis for securing a peer-to-peer voice channel, using Diffie-Hellman [3] key exchange for each 2. Detailed Design Goals conversational session. We note in passing that Diffie- Hellman key exchange requires no external method of An Internet Mobile Phone is a mobile voice key management. communication device that uses the increasingly Easy implementation of the prototype suggested a prevalent wireless LAN access to IP. An IMP general purpose computing platform with a familiar experimental prototype must address the following programming environment, especially as much of the design issues: work required in integrating the components of the • IP based wireless networking system would be done in software. The wide range of devices supported by Linux, the availability of the • Security Architecture and Authentication Nautilus system, and a variety of embedded versions • Voice Communication System appropriate for single-board computer (SBC) • Device Operating Environment implementation motivated our choice. Among other • Hardware and packaging tasks to be detailed in Section 4, the software manages the bootstrap, authentication/contact lists, user IP based networking is a central design goal as it interface, call setup and teardown, networking, the allows us to address the larger hypothesis of the paper, voice codec and encryption. that wireless LAN technology provides a natural Our hardware design goals were first to use as many transition from circuit-centric to IP-centric mobile off-the-shelf components as possible, and to compose telephony.
Recommended publications
  • SOP 202 Iridium Satellite Phone Provisioning
    Standard Operating Procedure Updated: Apr 27, 2017 DOCUMENT NUMBER: SOP202 TITLE: Iridium Satellite Phone Provisioning PURPOSE: This document describes the provisioning and testing of Iridium Satellite phones. It is intended for all Greenland and Alaska field site personnel. BACKGROUND: A satellite telephone, satellite phone, or satphone is a type of mobile phone that connects to orbiting satellites instead of terrestrial cell sites. They provide similar functionality to terrestrial mobile telephones; voice, short messaging service and low-bandwidth internet access are supported through most systems. Depending on the architecture of a particular system, coverage may include the entire Earth or only specific regions. DETAILS: Components Required for Testing • Activated sim chips with phone number labels from IT&C staff • Preconditioned and charged batteries • External iridium egg antenna deployed outside in order to receive satellite signal inside the building • Updated Iridium phone number cheat sheet and Quick use guide Iridium Satellite Phone Testing Procedures • Insert activated SIM chip into satphone • Insert a preconditioned and charged battery into the satphone.. • Place battery cover on the satphone • Connect the satphone being tested to the external iridium egg antenna using a stubby antenna connector • Turn on the satphone and allow the registration process to complete Page 1 of 3 Standard Operating Procedure Updated: Apr 27, 2017 • Make a phone call using the satphone to a known number (ie your cellphone number, land line or a known working Iridium phone) • Make a phone call using your cellphone number, land line or a known working Iridium phone to the satphone being tested. • Adjust the iridium phone audio speaker to highest volume • Set the iridium phone to Ringer only and adjust the ringer to the highest volume • Turn call Forwarding off • Per each phone, adhere the phone number label to the front of the Iridium phone • If above test passed, continue onto next section.
    [Show full text]
  • Handover Parameters Optimisation Techniques in 5G Networks
    sensors Article Handover Parameters Optimisation Techniques in 5G Networks Wasan Kadhim Saad 1,2,*, Ibraheem Shayea 2, Bashar J. Hamza 1, Hafizal Mohamad 3, Yousef Ibrahim Daradkeh 4 and Waheb A. Jabbar 5,6 1 Engineering Technical College-Najaf, Al-Furat Al-Awsat Technical University (ATU), Najaf 31001, Iraq; [email protected] 2 Electronics and Communication Engineering Department, Faculty of Electrical and Electronics Engineering, Istanbul Technical University (ITU), Istanbul 34467, Turkey; [email protected] 3 Faculty of Engineering and Built Environment, Universiti Sains Islam Malaysia, Bandar Baru Nilai, Nilai 71800, Malaysia; hafi[email protected] 4 Department of Computer Engineering and Networks, College of Engineering at Wadi Addawasir, Prince Sattam Bin Abdulaziz University, Al Kharj 11991, Saudi Arabia; [email protected] 5 Faculty of Electrical & Electronics Engineering Technology, Universiti Malaysia Pahang, Pekan 26600, Malaysia; [email protected] 6 Center for Software Development & Integrated Computing, Universiti Malaysia Pahang, Gambang 26300, Malaysia * Correspondence: [email protected] Abstract: The massive growth of mobile users will spread to significant numbers of small cells for the Fifth Generation (5G) mobile network, which will overlap the fourth generation (4G) network. A tremendous increase in handover (HO) scenarios and HO rates will occur. Ensuring stable and reliable connection through the mobility of user equipment (UE) will become a major problem in future mobile networks. This problem will be magnified with the use of suboptimal handover control parameter (HCP) settings, which can be configured manually or automatically. Therefore, Citation: Saad, W.K.; Shayea, I.; the aim of this study is to investigate the impact of different HCP settings on the performance Hamza, B.J.; Mohamad, H.; of 5G network.
    [Show full text]
  • Title: Communicating with Light: from Telephony to Cell Phones Revision
    Title: Communicating with Light: From Telephony to Cell Phones Revision: February 1, 2006 Authors: Jim Overhiser, Luat Vuong Appropriate Physics, Grades 9-12 Level: Abstract: This series of six station activities introduces the physics of transmitting "voice" information using electromagnetic signals or light. Students explore how light can be modulated to encode voice information using a simple version of Bell's original photophone. They observe the decrease of the intensity of open-air signals by increasing the distance between source and receiver, and learn the advantage of using materials with different indices of refraction to manipulate and guide light signals. Finally, students are introduced to the concept of bandwidth by using two different wavelengths of light to send two signals at the same time. Special Kit available on loan from CIPT lending library. Equipment: Time Required: Two 80-minute periods NY Standards 4.1b Energy may be converted among mechanical, electromagnetic, Met: nuclear, and thermal forms 4.1j Energy may be stored in electric or magnetic fields. This energy may be transferred through conductors or space and may be converted to other forms of energy. 4.3b Waves carry energy and information without transferring mass. This energy may be carried by pulses or periodic waves. 4.3i When a wave moves from one medium into another, the waves may refract due a change in speed. The angle of refraction depends on the angle of incidence and the property of the medium. 4.3h When a wave strikes a boundary between two media, reflection, transmission, and absorption occur. A transmitted wave may be refracted.
    [Show full text]
  • IP Telephony Fundamentals: What You Need to Know to “Go to Market”
    IP Telephony Fundamentals: What You Need to Know to “Go To Market” Ken Agress Senior Consultant PlanNet Consulting What Will Be Covered • What is Voice over IP? • VoIP Technology Basics • How Do I Know if We’re Ready? • What “Real” Cost Savings Should I Expect? • Putting it All Together • Conclusion, Q&A 2 What is Voice Over IP? • The Simple Answer – It’s your “traditional” voice services transported across a common IP infrastructure. • The Real Answer – It’s the convergence of numerous protocols, components, and requirements that must be balanced to provide a quality voice experience. 3 Recognize the Reality of IP Telephony • IP is the catalyst for convergence of technology and organizations • There are few plan templates for convergence projects • Everybody seems to have a strong opinion • Requires an educational investment in the technology (learning curve) – Requires an up-front investment in the technology that can be leveraged for subsequent deployments • Surveys indicate deployment is usually more difficult than anticipated • Most implementations are event driven (that means there is a broader plan) 4 IP Telephony vs. VoIP • Voice over IP – A broad technology that encompasses many, many facets. • IP Telephony – What you’re going to implement to actually deliver services across your network – Focuses more on features than possibilities – Narrows focus to specific implementations and requirements – Sets appropriate context for discussions 5 Why Does Convergence Matter? • Converged networks provide a means to simplify support structures and staffing. • Converged networks create new opportunities for a “richer” communications environment – Improved Unified Messaging – Unified Communications – The Promise of Video • Converged networks provide methods to reduce costs (if you do things right) 6 The Basics – TDM (vs.
    [Show full text]
  • An Assessment of Claims Regarding Health Effects of 5G Mobile Telephony Networks
    An Assessment of Claims regarding Health Effects of 5G Mobile Telephony Networks C R Burger, Z du Toit, A A Lysko, M T Masonta, F Mekuria, L Mfupe, N Ntlatlapa and E Suleman Contact: Dr Moshe Masonta [email protected] 2020-05-11 Contents Preamble .............................................................................................................................. 2 1. Overview of 5G Networks .............................................................................................. 3 1.1 What are 5G networks? ............................................................................................... 3 1.2 What are the health effects of mobile networks? .......................................................... 6 1.3 What can we expect from 5G networks?...................................................................... 7 2. Summary Technical Data on 5G .................................................................................... 9 2.1 Which frequencies will be used for 5G in South Africa? .......................................... 9 2.2 A Brief Comparison of 4G and 5G ......................................................................... 11 3. Summary notes ............................................................................................................ 12 Preamble This document was produced by a team of researchers from the Next Generation Enterprises and Institutions, and Next Generation Health clusters of the CSIR. It is a response to media claims of links between 5G mobile telephone networks
    [Show full text]
  • What Is the Impact of Mobile Telephony on Economic Growth?
    What is the impact of mobile telephony on economic growth? A Report for the GSM Association November 2012 Contents Foreword 1 The impact of mobile telephony on economic growth: key findings 2 What is the impact of mobile telephony on economic growth? 3 Appendix A 3G penetration and economic growth 11 Appendix B Mobile data usage and economic growth 16 Appendix C Mobile telephony and productivity in developing markets 20 Important Notice from Deloitte This report (the “Report”) has been prepared by Deloitte LLP (“Deloitte”) for the GSM Association (‘GSMA’) in accordance with the contract with them dated July 1st 2011 plus two change orders dated October 3rd 2011 and March 26th 2012 (“the Contract”) and on the basis of the scope and limitations set out below. The Report has been prepared solely for the purposes of assessing the impact of mobile services on GDP growth and productivity, as set out in the Contract. It should not be used for any other purpose or in any other context, and Deloitte accepts no responsibility for its use in either regard. The Report is provided exclusively for the GSMA’s use under the terms of the Contract. No party other than the GSMA is entitled to rely on the Report for any purpose whatsoever and Deloitte accepts no responsibility or liability or duty of care to any party other than the GSMA in respect of the Report or any of its contents. As set out in the Contract, the scope of our work has been limited by the time, information and explanations made available to us.
    [Show full text]
  • A Novel View on Universal Mobile Telecommunication System (UMTS) in the Wireless and Mobile Communication Environment
    Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2010|No.1(24) A Novel View on Universal Mobile Telecommunication System (UMTS) in the Wireless and Mobile Communication Environment Dr.S.S.Riaz Ahamed Principal, Sathak Institute of Technology, Ramanathapuram,TamilNadu, India-623501. Email:[email protected] Abstract The Universal Mobile Telecommunication System (UMTS) is a third generation (3G) mobile communications system that provides a range of broadband services to the world of wireless and mobile communications. The UMTS delivers low-cost, mobile communications at data rates of up to 2 Mbps. It preserves the global roaming capability of second generation GSM/GPRS networks and provides new enhanced capabilities. The UMTS is designed to deliver pictures, graphics, video communications, and other multimedia information, as well as voice and data, to mobile wireless subscribers. UMTS also addresses the growing demand of mobile and Internet applications for new capacity in the overcrowded mobile communications sky. The new network increases transmission speed to 2 Mbps per mobile user and establishes a global roaming standard. UMTS allows many more applications to be introduced to a worldwide base of users and provides a vital link between today’s multiple GSM systems and the ultimate single worldwide standard for all mobile telecommunications, International Mobile Telecommunications–2000 (IMT–2000). Keywords: Code Division Multiple Access (CDMA), Radio Access Network (RAN), Base Station Subsystem (BSS),Network and Switching Subsystem (NSS), Operations Support System (OSS),Base Station Controller (BSC), Base Transceiver Station (BTS), Transcoder and Rate Adapter Unit (TRAU), Operation and Maintenance Centers (OMCS), Packet Data Networks (PDNS), Virtual Home Environment (VHE), Radio Network Systems (RNSS), Transmission Power Control (TPC), Subscriber Identity Module (SIM) 1.
    [Show full text]
  • International Mobile Roaming Agreements”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (2013-06-03), “International Mobile Roaming Agreements”, OECD Digital Economy Papers, No. 223, OECD Publishing, Paris. http://dx.doi.org/10.1787/5k4559fzbn5l-en OECD Digital Economy Papers No. 223 International Mobile Roaming Agreements OECD Unclassified DSTI/ICCP/CISP(2012)2/FINAL Organisation de Coopération et de Développement Économiques Organisation for Economic Co-operation and Development 03-Jun-2013 ___________________________________________________________________________________________ English - Or. English DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Unclassified DSTI/ICCP/CISP(2012)2/FINAL Working Party on Communication Infrastructures and Services Policy INTERNATIONAL MOBILE ROAMING AGREEMENTS English - Or. English JT03340780 Complete document available on OLIS in its original format This document and any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. DSTI/ICCP/CISP(2012)2/FINAL FOREWORD The Working Party on Communication Infrastructures and Services Policy (CISP) discussed this paper in June 2012. It agreed to recommend the paper for declassification to the Committee for Information, Computer and Communications Policy (ICCP). The ICCP Committee agreed to its declassification in October 2012. The document was prepared by Mr. Tony Shortall, Director of Telage. It is published
    [Show full text]
  • Satellite Phone Store Presentation
    SATELLITE PHONE STORE Voice, messaging and internet data anywhere on the globe SATELLITE BROADBAND SOLUTIONS GLOBAL XPRESS SYSTEMS The GX system has been designed to support global coverage and enable global mobility. The system includes the space segment and ground segment to provide complete GEO-visible earth connectivity. GX 5075 Fly-Away VSAT GX 3075 Fly-Away VSAT • Automatic antenna pointing system • Manual pointing Antenna System • High Speed portable satellite internet • High Speed portable satellite internet • Deploy anywhere in the world • Deploy anywhere in the world • Fly-Away Transport in 2 pelican boxes • Fly-Away Transport in 2 pelican boxes • Speed up to 8Mbps up / 4Mbps down • Speed up to 8Mbps up / 4Mbps down Operating in the resilient Ka-band, while integrating seamlessly with our proven L-band network, Global Xpress allows customers across aviation, maritime, enterprise and government sectors to have reliable and assured access to high-throughput communications. GLOBAL XPRESS SYSTEMS GLOBAL XPRESS AND FLEET XPRESS COVERAGE Kymeta KyWay™ Kymeta KyWay™ u7 Ku-band satellite terminals address the need for lightweight, low-profile, and high-throughput communication systems that out perform any mechanical system fixed and on-the-move making connecting nearly any vehicle, vessel, or fixed platform easier and more reliable than ever before. Kymeta KYWAY U7 8W / 16W Kymeta KyWay™ Go • Capable of transmitting • Fastest and easiest to deploy high and receiving data while speed satellite terminal on the on the move market "plug
    [Show full text]
  • Voice Over Internet Protocol (VOIP): Overview, Direction and Challenges 1 U
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by International Institute for Science, Technology and Education (IISTE): E-Journals Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.4, 2013 Voice over Internet Protocol (VOIP): Overview, Direction And Challenges 1 U. R. ALO and 2 NWEKE HENRY FIRDAY Department of Computer Science Ebonyi State University Abakaliki, Nigeria 1Email:- [email protected] 2Email: [email protected] ABSTRACT Voice will remain a fundamental communication media that cuts across people of all walks of life. It is therefore important to make it cheap and affordable. To be reliable and affordable over the common Public Switched Telephone Network, change is therefore inevitable to keep abreast with the global technological change. It is on this basis that this paper tends to critically review this new technology VoIP, x-raying the different types. It further more discusses in detail the VoIP system, VoIP protocols, and a comparison of different VoIP protocols. The compression algorithm used to save network bandwidth in VoIP, advantages of VoIP and problems associated with VoIP implementation were also critically examined. It equally discussed the trend in VoIP security and Quality of Service challenges. It concludes by reiterating the need for a cheap, reliable and affordable means of communication that would not only maximize cost but keep abreast with the global technological change. Keywords: Voice over Internet Protocol (VoIP), Public Switched Telephone Network (PSTN), Session Initiation Protocol (SIP), multipoint control unit 1. Introduction Voice over Internet Protocol (VoIP) is a technology that makes it possible for users to make telephone calls over the internet or intranet networks.
    [Show full text]
  • Telecommunications Electronics Technician Competency Listing
    Telecommunications Electronics Technician Competency Listing Telecommunications Electronics Technician - TCM Competency Requirements Telecommunications electronics technicians are expected to obtain knowledge of wired and wireless communications basic concepts which are then applicable to various types of voice, data and video systems. Once the CET has acquired these skills, abilities and knowledge, he or she will be able to enter employment in any part of the telecommunications field. With minimal training in areas unique to specific products, the CET should become a profitable and efficient part of the electronics-communications workforce. Telecommunications Electronics Technicians must be knowledgeable and have abilities in the following technical areas: 1.0 CABLES AND CABLING 1.1 Describe unshielded twisted pair (UTP) - List common usage locations and capabilities 1.2 Demonstrate installation and troubleshooting of RJ45/48 telephone connectors and fittings 1.3 CAT 5 wiring—Explain the differences vs.: single twisted pair and where it is most used 1.4 10 base T-explain where it is commonly used and its frequency capabilities 1.5 Describe the T568A / T568B standards 1.6 Explain how Cable TV wiring is used for data and voice services 1.7 Explain the differences between coax types RG 58, RG 59 and RG 6 1.8 Describe required grounding of electronics equipment 1.10 Describe the differences in Single and Multi-mode fiber optics 2.0 ANALOG TELEPHONY 2.1. Give a brief history of the telephone industry 2.2 Explain how basic phone systems work 2.3 Define POTS, DID, OPX, tie lines and WATS lines 2.4 Explain the benefits and usage of multiple phone lines 2.5 Define PBX and explain basic switching method 2.6 Sketch a local loop map 2.7 Define Key service units 2.8 Define Central Office and list it purposes 2.9 Explain the terms and usage of tones, loop start, ground start and wink start 2.10 Define CO, CPE.
    [Show full text]
  • Prospects for Improving Competition in Mobile Roaming
    WIK Wissenschaftliches Institut für Kommunikationsdienste GmbH Prospects for improving competition in mobile roaming Ulrich Stumpf Paper prepared for the 29th TPRC 2001, 27 - 29 October 2001, Alexandria, Va. Prospects for improving competition in mobile roaming I Contents Abstract II 1 Introduction 1 2 Basics of international roaming 2 3 Supply-side of wholesale roaming markets 7 3.1 Small number of suppliers and high market concentration 8 3.2 Spectrum scarcity and second-mover disadvantages 9 3.3 Imperfect substitutes to wholesale roaming 12 3.4 Transparency of competitors’ IOTs 13 4 Demand-side of wholesale roaming markets 13 4.1 Lack of competitive pressure in downstream retail roaming markets 14 4.2 Customer ignorance, insufficient control over network selection, and demand externalities 17 5 Conclusions and implications for application of non-discrimination rules 21 References 23 Prospects for improving competition in mobile roaming II Abstract The ability to make international roaming calls is of increasing importance to customers. However, there are various complaints that prices of retail roaming are intransparent, rigid and at levels that are unrelated to the cost of carriage. The focus if the paper is on wholesale roaming, which is the prime determinant of retail roaming prices. The paper analyses the structural conditions of wholesale roaming markets that have impaired incentives to competition, namely (1) high combined market share of the two leading operators combined with second mover disadvantages, and (2) demand externalities associated with customer ignorance and lack of control over network selection. The paper argues that a number of developments are under way that are likely to modify this situation in the future.
    [Show full text]