Retaining the customer profile

B. Andrew
{"title":"Retaining the customer profile","authors":"B. Andrew","doi":"10.1109/INW.2000.868161","DOIUrl":null,"url":null,"abstract":"This article consists of a collection of slides from the author's conference presentation. Currently, the circuit switched network operator has control of his customers profiles and interfaces. This has given the network operator an advantage in service delivery over 'edge of network' Value Added Service providers. The reason the customer profile is in the hands of the operator is due to the manner in which the fixed and mobile networks have evolved and the regulatory environment. This control over the customers' profile seems to be a key factor in retaining service revenues within the network operators' domain. As we move towards the next generation of IP/ATM networks and therefore open interfaces, there will be an increasing trend towards the migration of intelligence out of the network and into intelligent CPE and edge of network servers. We are told that communications between sucrequipmentswill make use of end-to-end protocols, and may use only basic network call control for routing. As more and more applications become viable at the edge, the ownership and location of the customers profile also comes into question. We must seriously consider this as a real threat to the network operators ability to provide value added services which could ultimately result in the network operators role being reduced to that of a 'Bit' carrier. Its therefore worth looking at issues surrounding the positioning of these applications and services.","PeriodicalId":430457,"journal":{"name":"Proceedings 2000 IEEE Intelligent Network Workshop","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 2000 IEEE Intelligent Network Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INW.2000.868161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

This article consists of a collection of slides from the author's conference presentation. Currently, the circuit switched network operator has control of his customers profiles and interfaces. This has given the network operator an advantage in service delivery over 'edge of network' Value Added Service providers. The reason the customer profile is in the hands of the operator is due to the manner in which the fixed and mobile networks have evolved and the regulatory environment. This control over the customers' profile seems to be a key factor in retaining service revenues within the network operators' domain. As we move towards the next generation of IP/ATM networks and therefore open interfaces, there will be an increasing trend towards the migration of intelligence out of the network and into intelligent CPE and edge of network servers. We are told that communications between sucrequipmentswill make use of end-to-end protocols, and may use only basic network call control for routing. As more and more applications become viable at the edge, the ownership and location of the customers profile also comes into question. We must seriously consider this as a real threat to the network operators ability to provide value added services which could ultimately result in the network operators role being reduced to that of a 'Bit' carrier. Its therefore worth looking at issues surrounding the positioning of these applications and services.
保留客户档案
本文由作者在会议上的演讲幻灯片组成。目前,电路交换网络操作员可以控制他的客户配置文件和接口。这使得网络运营商在服务交付方面比“网络边缘”增值服务提供商更有优势。客户资料掌握在运营商手中的原因是由于固定和移动网络的发展方式以及监管环境。这种对客户资料的控制似乎是网络运营商保持服务收入的关键因素。随着我们向下一代IP/ATM网络和因此开放的接口迈进,智能从网络向智能CPE和网络边缘服务器迁移的趋势将越来越大。我们被告知,不同设备之间的通信将使用端到端协议,并且可能仅使用基本的网络呼叫控制进行路由。随着越来越多的应用程序在边缘变得可行,客户配置文件的所有权和位置也成为问题。我们必须认真考虑,这对网络运营商提供增值服务的能力构成了真正的威胁,最终可能导致网络运营商的角色沦为“比特”运营商。因此,围绕这些应用程序和服务的定位问题值得关注。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信