OASIS SOA TC

22
Nortel Confidential Information 1 1 OASIS SOA TC John Storrie – CTO Technology Field Office

description

OASIS SOA TC. John Storrie – CTO Technology Field Office. 1. Telco Business Model. Telco Owned Products. Telco Sourced Third Party Products. Current Telco Business Model. Costs. Revenues. Network Termination Charges. Residential Subscriber. Government. Content Providers. $. - PowerPoint PPT Presentation

Transcript of OASIS SOA TC

Nortel Confidential Information1

1

OASIS SOA TC

John Storrie – CTO Technology Field Office

Nortel Confidential Information

Telco Business Model

Nortel Confidential Information3

Current Telco Business Model

Telco Owned

Products

Telco Sourced

ThirdParty

Products

Residential Subscriber

Government

Enterprise

SMB

Network TerminationCharges

Content Providers

Device Providers

Application Providers

$$

Costs Revenues

Nortel Confidential Information4

Future Multi-sided Business Model

Telco Owned

Products

ThirdParty

Products

$$

Multi-SectorsMulti-subscribers

Developers

Retail Sector

ISV

Advertisers

Content Owners

Virtual Operator

Nortel Confidential Information

Voice 2.0

Use Cases

Nortel Confidential Information6

Enhanced Find Me

• User requests connection to another party

• The system checks the end users terminal status to determine if they can be reached

• If this status is acceptable then the users presence information is requested to determine if they will accept a connection from the calling party

• If this is acceptable then the called party is contacted

• Once the session terminates then the charging data is collected

• If the presence or location information indicates the called party cannot be contacted then the caller would be connected to the called party’s message system

Nortel Confidential Information7

Enhanced Find Me: Service Model Flow

Enhanced Find Me Web Service Instance

Message Bus

Terminal StatusTS 29.199-08

Terminal StatusSupplier

PresenceSupplier

PresenceTS 29.199-14

Third Party CallSupplier

Third Party CallTS 29.199-02

PaymentSupplier

PaymentTS 29.199-06

Nortel Confidential Information8

• Some Representative Use Cases• Monitoring and Compliance

• Orchestration• System2System

• Internet • Security• Dynamic Configuration• Communications stack in public domain

• Communications Switcher • Multi-Functional Application• Composition

• Text Cross Modal • Multi-Modal• Disability

Use Cases

Nortel Confidential Information9

• Mike creates analytics application on corporate application server that needs to observe calls or conferences that are active for a given set of user types. System will store time, length and known parties of the conversations in communications data mart.

• If certain key words are detected in conversations of these user types, the system will automatically start recording the conference and tagging time, length and parties records.

• In conversation the application will monitor the status (talking, muted …) of all users on that conference.

• A week later, Mike decides to change application processing workflow to also look for same key words in e-mail traffic.

• Changes workflow for notifications are sent to compliance officer for high suspect communications

• Record multi-modal type conversations saving tags and conversation to data mart.• Compliance officer looks at communication analytics

• Communications preferences based on certain types of communication interactions• Potential compliance breaches based on key work event activations

Monitoring Application

Nortel Confidential Information10

• Mike is on public internet browser at customer site. Mike links thru web to system. Communications toolbar w/ add-ons allowing for rich desktop/ web interaction (i.e. drag and drop) between shipping application and communication application

• Mike sets up call to Pete. Clicks on toolbar, open contact list and see if Pete is available by voice or video. Note: download toolbar figured out characteristics of local device and provided this to system

• Mike places video call to video, browser opens up with video widget. • Customer want trial on supplier/ shipping site as a test for a week long trial. • Mike goes to sales system and configures a guest account with users and capability.

• Virtual boundaries are set up across company boundaries.• Workflow and widgets created for capability to be embedded into application(s)

• Users go to site, a tool bar and browser page is opened displaying instructions and flash demo.

• User opts in, signs up and is auto configured in system. • At the end of the week, those that opted in were surveyed, a report was created to

see the actual usage pattern of the test set of people.

Public - Internet Scenario

Nortel Confidential Information11

• Mike needs to get in touch with Alice• Mike’s and Alice’s active sessions are determined • The preferred and allowable modes of communication and device characteristics are

accessed• System places call from Mike’s mobile to Alice’s desktop• Alice accepts, call is connected. • Alice needs to run and wants to transfer call to mobile. • Alice tells application to switch call to her mobile. System informs Alice that this is

possible. • Alice switches call.• Alice wants to add Stanley to call, selects monitoring option

• System searches for Stanley’s availability. System locates Stanley at his mobile – establishes conference.

• Alice ask Stanley a question. • Stanley hangs up. Alice looks for status of Stanley on conference to confirm

disconnect. • Alice continues with conversation with Mike

Communication Switcher

Nortel Confidential Information12

• Mike needs to get in touch with Alice• Mike’s and Alice’s active sessions are determined• The allowable modes of communication and device

characteristics are accessed. Alice is hearing impaired.

• System looks Alice’s availability with device characteristics supporting voice and TTS.

• Alice is available by web phone with linked TTS Application for hearing impaired

• Call is made to Alice and system directs to appropriate device

• Alice answers call and web page pops up indicating Mike’s call transcribing Mike’s voice to text.

Disability - Cross-Modal Use Case

Nortel Confidential Information

SOA Adoption - Mobility

Nortel Confidential Information14

WiMAX vs. SIP perspective in SOA

• WiMAX Forum is looking at using a model based upon Web Services to expose the network capabilities to the application space, via the USI, Universal Service Interface

• Discussion is on-going as to the best model to achieve this given the existence of standards such as OMA OWSER, Parlay-X, OASIS and others• Liaison statements exchanged between USI and OMA ARC,

the current owner of Parlay-X specifications

• Current defined USI enablers do map to the majority of the current OMA Parlay-X interfaces

Nortel Confidential Information15

SOA solutions: SIP and non-SIP models

• SOA applications need to interact with multiple network protocols, SIP being just one of these

• In many cross network applications SIP based services may end up being converted into a legacy signalling protocol • SIP to SS7• SIP to AIN/INAP/MAP

• An SOA solution running via WSDL/REST can map to any signalling protocol as required by the network

Nortel Confidential Information16

Open Mobile Alliance (OMA)

Nortel Confidential Information

Real Time Composition/Orchestration

Nortel Confidential Information18

Real Time Composition/Orchestration

• SOA provides capabilities for application consumption

• Capabilities can come from multiple providers

• Each service may consume multiple capabilities

• WSDL interfaces can return information for application decision making

• There may be multiple application layers each with different latency tolerances

• Orchestration has to be performed in a latency model suitable for the telecommunication protocol state machines

• The lower in the network the orchestration occurs the tighter the latency tolerances become

Nortel Confidential Information19

BPEL

• BPEL originally designed for IT application space

• Purpose: integrate long running inter-machine business processes

• Evolution to include BPEL4People to provide human time frame interactions rather than machine speed

• Current benchmarks show 80 TPS on dual Xeon cpu• Baseline HLR runs 5500 TPS (Telecom One TM1 benchmark)

• Basic SIP B2BUA is 10+ network transactions

“I feel the need for speed!”

Nortel Confidential Information20

Parlay-X

• Parlay-X API co-ordination is at the WSDL level

• Designed to be incorporated into WSDL tooling

• API’s moved from 3GPP to the OMA enabler model providing capabilities that can be co-ordinated as per the SOA model rather than bulking out each API to do everything

• OMA ARC API’s are evolving to include “correlation” to allow composition of API’s into WSDL based service

• Some Parlay-X API’s are synchronous and some are asynchronous

Nortel Confidential Information21

Orchestration Approaches

• SIP servlets

• Service Component Architecture

• JAIN SLEE

• CDL – Choreography Description Language

• BPML – Business Process Management Language

Nortel Confidential Information22