- 5G Reimagined: A North American Perspective (Issue 2)
- 5G Reimagined: A North American Perspective
- An Analysis of the SPDY Protocol and the SPDY Proxy
- An Architectural Risk Analysis for Internet of Things (IoT) Services
- ATIS—A Critical Force in Shaping 5G to Meet Service Providers’ Market Needs
- Best Practices for Obtaining Mobile Device Identifiers for Mobile Device Theft Prevention (MDTP)
- Big Data Analytics Focus Group: BDA Data Value Chain Reference Model & Use Cases
- Context-Aware Identity Management Framework
- Calling Party Spoofing Mechanisms and Mitigation Techniques
- Cloud Services Impacts on Lawful Interception Study
- Cybersecurity Architectural Risk Analysis Process
- Data Sharing Framework for Smart Cities
- Developing a Roadmap for the Migration of Public Safety Applications during the All IP Transition
- Developing Calling Party Spoofing Mitigation Techniques: ATIS’ Role
- Emerging Opportunities for Leveraging Network Intelligence
- Evolution to an Artificial Intelligence-Enabled Network
- Evolution to Content Optimized Networks
- Evolution to Content Optimized Networks, Issue 2
- Feasibility Study for Earthquake Early Warning System
- Feasibility Study for LTE WEA Message Length
- Feasibility Study for WEA Cell Broadcast Geo-Targeting
- Feasibility Study for WEA Supplemental Text
- GPS Vulnerability
- Improving Vehicle Cybersecurity: ICT Industry Experience and Perspectives
- Intelligent Programmatic Peering Summary Report
- Interoperability Standards Between Next Generation Networks (NGN) for Signature-Based Handling of Asserted information Using Tokens (SHAKEN)
- The Interoperability Enabler for the Entire M2M and IoT Ecosystem
- IP Services Interconnect Technical Report: Assessment of Requirements and Specifications
- Joint ATIS/SIP Forum Technical Report - IP Interconnection Routing
- Joint ATIS/SIP Forum Technical Report - IP NNI Profile
- Operational Opportunities and Challenges of SDN/NFV Programmable Infrastructure
- Optimizing User Experience in 5G
- Neutral Host Solutions for 5G Multi-Operator Deployments in Managed Spaces
- NFV Forum Use Cases
- NFV Infrastructure Metrics for Monitoring Virtualized Network Deployments
- PSTN Transition Focus Group Assessment and Recommendations
- Reliability Implications of Emerging Technologies/Services
- Securing Internet of Things (IoT) Services Involving Network Operators
- Signature-Based Handling of Asserted Information Using toKENs (SHAKEN)
- Signature-Based Handling of Asserted Information Using toKENs (SHAKEN): Governance Model and Certificate Management
- Smart Cities Technology Roadmap
- Subscriptionless Devices and Services
- Support for UAV Communications in 3GPP Cellular Standards
- Technical Report on a Framework for Display of Verified Caller ID
- Technical Report on a Nationwide Number Portability Study
- Technical Report on Operational and Management Considerations for SHAKEN STI Certification Authorities and Policy Administrators
- Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server
- Testbeds Focus Group – Test Plans and Observed Results
- Testbeds Landscape Team - Assessment and Next Steps, Version 2
- Trust and Identity (T&I) Focus Group White Paper
- Unmanned Aerial Vehicle (UAV) Utilization of Cellular Services: Enabling Scalable and Safe Operation
- Use of Cellular Communications to Support Unmanned Aerial Vehicle (UAV) Flight Operations
- Use of UVAs for Restoring Communications in Emergency Situations
Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server (ATIS-100082)
This document provides a Technical Report on a SHAKEN APIs used to support a Centralized Signing and Signature Validation Server. These APIs provide a means for multiple and/or disparate network elements to use an HTTP-based RESTful interface to access SHAKEN Signing and Signature Validation servers.
Technical Report on a Framework for Display of Verified Caller ID (ATIS-100081)
This technical report provides a framework for signaling verified Caller ID information from the network to a User Equipment (UE) and displaying the information on the UE in a uniform manner, independent of technology. The main goal is to provide display guidelines that help empower consumers in managing their calls, as per the Robocalling Strike Force recommendations.
Signature-Based Handling of Asserted Information Using toKENs (SHAKEN): Governance Model and Certificate Management (ATIS-1000080-E)
Signature-based Handling of Asserted information using toKENs (SHAKEN) is an industry framework for managing and deploying Secure Telephone Identity (STI) technologies with the purpose of providing end-to-end cryptographic authentication and verification of the telephone identity and other information in an IP-based service provider voice network. This Errata contains an update to ATIS-1000080 and expands the SHAKEN framework, introducing a governance model and defining X.509 certificate management procedures. Certificate management provides mechanisms for validation of a certificate and verification of the associated digital signature, allowing for the identification of illegitimate use of national telecommunications infrastructure. The original ATIS-1000080 is contained in this .zip file.
Signature-Based Handling of Asserted Information Using toKENs (SHAKEN) (ATIS-1000074-E)
Signature-based Handling of Asserted information using toKENs (SHAKEN) is an industry framework for managing the deployment of Secure Telephone Identity (STI) technologies withthe purpose of providing end-to-end cryptographic authentication and verification of the telephone identity and other information in an Internet Protocol (IP)-based service provider voice network. This Errata contains an update to ATIS-1000074 and defines the framework for telephone service providers to create signatures in Session Initiation Protocol (SIP) and validate initiators of signatures. It defines the various classes of signers and how the verification of a signature can be used toward the mitigation and identification of illegitimate use of national telecommunications infrastructure and to protect its users. The original ATIS-1000074 is contained in this .zip file.
This Errata contains an update to ATIS-1000084 and provides operational and management considerations for the Certification Authorities with the SHAKEN Governance Model and Certificate Management framework. It introduces considerations for the STI Policy Administrator in managing the list of valid STI CAs and authorized Service Providers, as well as general operational and policy considerations for PKI. This document introduces those aspects which are unique to the SHAKEN use of PKI. The original ATIS-1000084 is contained in this .zip file.
This document is intended to provide Next Generation Network (NGN) telephone service providers (SPs) with a framework and guidance for interoperability as calls process through their networks implementing Signature-Based Handling of Asserted Information Using Tokens (SHAKEN) technologies to ensure the validation as well as the completion of legitimate calls and the mitigation of illegitimate spoofing of telephone identities.
Nationwide Number Portability (NNP)
Technical Report on Assessment of Nationwide Number Portability (ATIS-1000083)
This Technical Report (TR) provides further technical assessment of the potential approaches to Nationwide Number Portability (NNP) identified in the 2016 Technical Report on a Nationwide Number Portability Study (ATIS-1000071). This TR includes an analysis of these potential NNP solutions with the goal of providing additional information on the technical and systems-related impacts needed to support NNP. This TR does not modify or amend any of the technical characteristics in any of the approaches that had been detailed in ATIS-1000071. This TR will also identify any new standards or changes to existing standards/solutions that would be necessary to implement NNP, as well as implications for existing networks, in particular circuit-switched networks.
Technical Report on a Nationwide Number Portability Study (ATIS-1000071)
This Technical Report (TR) outlines the characteristics of the current U.S. local number portability implementation based on use of the Location Routing Number (LRN) method and explores different approaches for implementing Nationwide Number Portability (NNP) and their impacts.
Use of Cellular Communications to Support Unmanned Aerial Vehicle (UAV) Flight Operations
This report addresses the use of cellular communications to address Unmanned Aerial Vehicle (UAV) flight operations in the areas of:
- The Command and Control (C2) interface
- UAV Traffic Management (UTM)
- Remote UAV Identification (ID)
- Detect and Avoid (DAA)
Today, when deploying small cells within a managed space such as an enterprise office, a shopping mall, or a stadium, the landlord controls access to infrastructure. Visitors to the space will subscribe to many different wireless network providers. Thus, to get uniform cellular coverage for all employees, customers and guests, small cells from all major providers must be deployed in addition to Wi-Fi and other unlicensed access technologies.
Furthermore, 5G mmWave technologies will often be deployed in dense configurations to provide adequate coverage given the Radio Frequency (RF) propagation challenges in mmWave spectrum. Similar to managed space environments noted above, it is likely that all major providers will need to deploy in the same areas. Particularly in outdoor deployments, infrastructure and regulatory constraints may limit the number, and location of cell site placement.
These scenarios represent a high-cost and complex arrangement involving deployment of multiple infrastructures. A potentially more attractive arrangement is to have one common infrastructure system deployed that could be used by all service providers. Thus, a third-party provider (such as an independent access provider, a landlord, or delegate) becomes a neutral (not aligned with any specific provider) host for small cell coverage. This paper examines and analyzes neutral host solutions assessing the technical and logistical implications.
An Architectural Risk Analysis for Internet of Things (IoT) Services
This report uses the ATIS Security Architectural Risk Analysis (ARA)1 to establish a framework for assessing a generic IoT asset’s cybersecurity risk. That asset might be an application, a service, or something else. Its primary function might be to collect and manipulate data, or it might be to perform some task, simple or complicated. It might be a standalone device, or it might work in coordinated fashion with a few or many other applications, services, or machines. It might be a low-level spoke in a wheel, or it might be a critical component of some vast mechanism. As an IoT “thing,” it could be nearly anything, and for the purpose of this analysis, exactly what it is does not matter. It is simply “the asset.”
Use of UAVs for Restoring Communications in Emergency Situations
This report introduces some of the ways in which UAVs are being used and explains the technical and logistical considerations. This report may be used by emergency planners and organizations that provide UAV-based communication services during disasters to assist with preparation and execution of disaster recovery.
Context-Aware Identity Management Framework
This report assesses how the emerging market for context-aware information can be applied to solve future identity management needs. It proposes a framework for contextaware identity management that builds upon existing and future authentication and authorization infrastructure to deliver a more robust set of solutions for network providers, enterprises, IT operations and consumer-based services. It also addresses the role of context-aware identity management in supporting the need of federated authentication and authorization processes when the context management functions reside in a different domain.
Support for UAV Communications in 3GPP Cellular Standards
This report is written to help a broad audience, including experts in UAV operations and regulation, understand the technical features of the 3GPP standard that equips mobile cellular networks to support UAV communication needs. It will also help experts focused on only one part of the 3GPP standard to gain a broad appreciation of the whole scope of 3GPP activities related to UAVs.
Evolution to an Artificial Intelligence-Enabled Network
Artificial intelligence (AI) and machine learning (ML) have been active areas of research and development since the 1950s. Over time, enthusiasm has waxed and waned as AI has struggled to insert itself into mainstream commercial applications. However, in recent years, advances in processing power, the availability of large amounts of data, research advances and a healthy community of open source developers have enabled AI technologies to become an essential part of many industries. In recognition of this success, this report explores how AI and ML can be leveraged to address the pressing challenges facing the ICT industry today.
Testbeds Focus Group – Test Plans and Observed Results
ATIS Technology and Operations Council (TOPS) Testbeds Focus Group was originally formed as a Landscape Team in 2015. At that time, a preliminary assessment was undertaken to evaluate existing testbed activities, as well as to identify common requirements that would be relevant to a range of test scenarios. The group completed its Phase 1 objectives with the 2015 publication of a report entitled, “Testbeds Assessment and Next Steps.” By launching Phase 2 as a Focus Group in 2016, efforts turned to: assessing the functional use of components of existing test plans such as those from the MultiService Forum; developing detailed test plans; identifying dependencies for each test case; assessing any additional requirements for components or protocols; and evaluating the feasibility of conducting tests in phases.
Optimizing User Experience in 5G
Providing a superior user experience (Ux) for wireless customers has become an important consideration for network operators offering competitive wireless services. ATIS’ 5G initiative considers unique approaches to the delivery and optimization of services for wireless customers. The report outlines breakthrough use cases related to optimized user experiences and addressees service and ecosystem models that enable them to be delivered. This report also introduces a solution-based approach to enable implementation and delivery of the capabilities identified here. This approach includes end-user opt-in/opt-out and control functions to insure end-user privacy and awareness of how personal data may be used.
Reliability Implications of Emerging Technologies/Services
This report identifies emerging technologies that have the potential to significantly impact service availability or the way that availability is measured or modeled. It does not attempt to quantify the impact of the technologies but will instead provide a qualitative assessment to understand the broad impact (positive/negative/neutral) of a technology on service availability.
Evolution to Content Optimized Networks, Issue 2
eCON Value Assessment Report A Comparative Study of ICN versus Conventional Approaches provides the reader with an in-depth analysis of ICN-based solutions (compared to IP-centric architectures) from the perspective of a network architect or network planner. The value assessment is intended to convey an understanding of the design choices and their impacts on network performance and application enablement, as they relate to market-impacting use cases that are on the horizon for most network operators. While ICN is still in a developmental and experimental phase, early results at both a quantitative and qualitative level are presented in this report. These results are then applied to develop a set of early findings that can assist in making informed network evolution choices.
Data Sharing Framework for Smart Cities
As Smart City projects continue to expand and evolve, data sharing sits at the intersection of business opportunities and technology developments. Cities can certainly benefit from data sharing across Smart City applications and sectors, but sharing among cities, as well as the development of data exchanges and marketplaces, will signal that Smart Cities are moving to the next level of value creation for citizens and local government.
This report assesses data sharing alternatives for Smart Cities and proposes a blueprint for a common framework, a set of critical components and an evolutionary path from data collection to data monetization.
NFV Infrastructure Metrics for Monitoring Virtualized Network Deployments
Service Providers are adopting advanced network virtualization technologies like SDN and NFV to benefit from time-to-market flexibility and service agility. Virtual Network Functions (VNFs) may be deployed across diverse, multi-vendor execution environments with variable configuration options and capabilities impacting performance and capacity. This report presents an overview of existing performance metrics/KPIs to assist in dimensioning the NFV infrastructure to meet the needs of the NFV applications it supports.
Subscriptionless Devices and Services
The emergence of Internet of Things (IoT)-based services is expected to create explosive demand for new devices and applications. Although a large percentage of IoT devices will ride Over The Top (OTT) of existing network subscriptions, many devices must still acquire network access from public (typically paid) Wide Area Networks (WANs)and, traditionally, must have a subscription with the network operator to do this.
This paper explores a variety of subscriptionless device models that benefit both the user and the network operator. For many IoT users, the direct IoT device connectivity subscription cost structure is often higher than the willingness to pay, given the utility of the device in question. Additionally, many end users have a desire to connect to their network of choice for “occasional” data without having to maintain an ongoing subscription. The subscriptionless device model can potentially reduce the cost and complexity for network operators as the network operator may not need to bear the full cost of maintaining “billions” of subscriptions for devices that may attach only occasionally to their network. Rather, operating models are described where the network operator’s primary relationship is with a 3rd party authentication or application service provider instead of the device itself.
The telecommunications industry requires reliable delivery of precision timing signals to enable operation of cellular networks. This report notes the telecommunications industry’s dependence on the Global Positioning System (GPS) and highlights GPS vulnerabilities of concern to the communications sector.
Unmanned Aerial Vehicle (UAV) Utilization of Cellular Services: Enabling Scalable and Safe Operation
This whitepaper addresses how mobile cellular networks can support the adoption of Unmanned Aerial Vehicles (UAVs) as well as provide services that can help address areas of concern in a convenient and technically feasible way. This whitepaper shows how the synergy and effective use of the combination of UAVs and mobile cellular services technologies will offer mutual benefits.
Improving Vehicle Cybersecurity: ICT Industry Experience and Perspectives
This whitepaper addresses how the Information and Communication Technology (ICT) industry can share lessons learned to assist the vehicle Original Equipment Manufacturers (OEMs) with improving vehicle cyber security, and how the ICT industry and vehicle OEMs can benefit from working together.
Cybersecurity Architectural Risk Analysis Process
ATIS members, who consist of leading service providers and vendors in the Information and Communications Technology (ICT) industry, have collaborated on a Cybersecurity Ad Hoc. Launched in July 2015, one of the group’s objectives is to create tools and practices to help organizations manage cybersecurity risk in the ICT industry. One outcome of the Cybersecurity Ad Hoc’s work has been to create a process for performing an Architectural Risk Analysis (ARA) on ICT solutions for the purpose of enabling the proactive development of cybersecurity risk management steps for these solutions. This process includes procedures to determine security goals, identify and assess potential risks, and develop proactive steps to mitigate identified risks. The ARA Process explained in this document relies upon industry cybersecurity best practices to support many of the details involved in executing the process. This document also includes an illustrative example of the use of the process for a hypothetical health monitoring device and associated services which are delivered in an ICT service provider-managed context. Finally, some potential areas for additional work are identified to broaden the scope of the ARA Process and to further simplify its application.
Securing Internet of Things (IoT) Services Involving Network Operators
The adoption of Internet of Things (IoT) services is rapidly growing. IoT services can provide significant advantages to consumers, enterprises, and government institutions. It is important that as IoT services are designed and delivered, full account is taken of the security considerations both to protect the IoT service itself and to prevent IoT equipment becoming a source of attacks against other service users.
In some cases, the network operator’s role in delivering IoT services is simply to provide connectivity and there is no direct technical or business partnering between the operator and the IoT service provider. In other cases, the network operator may take a more active role where the IoT service includes technical and business aspects under the control of the network operator. In this report, several different scenarios are introduced that characterize different relationships and levels of partnering that may exist between a network operator and an IoT service provider. In these scenarios, shared responsibility for securing the service may exist and consequences of security failures may be felt by both the network operator and the IoT service provider. The security implications of the various scenarios are discussed and practices that can be used to proactively address security in these scenarios are provided.
No part of this document should be taken as normative. Its purpose is to document practices that may be helpful to the development of good solution security. As each situation is different, it is necessary for the security approach to be chosen by the parties involved appropriately for their service, priorities, and circumstances.
Smart Cities Technology Roadmap
Cities and communities are deeply immersed in the assessment and planning of Smart Cities projects, as transformative applications and solutions are impacting the market. The pathway from powerful Smart Cities projects to comprehensive Smart Cities plans is a significant leap, given the diverse set of needs, applications, and solutions that are shaping each city’s vision. The ATIS Technology Roadmap is focused on the key technological developments that will enhance the long-term planning for Smart Cities. It is targeted to the Smart Cities’ planners, technology advisors, and key decision-makers who are faced with developing comprehensive long-term visions for their municipalities and citizens.
Evolution to Content Optimized Networks
The ongoing research, development, and standardization of named content networking solutions will offer network operators, and the larger content ecosystem, an opportunity to fundamentally change the current paradigm for how content is discovered, delivered, and consumed by devices, people, and things. Over the last few decades, IP networks have leveraged a broad range of IP point solutions and overlays to meet the growing demands of mobility, content delivery, and new applications. From a practical standpoint, the evolution to Content Optimized Networks (eCON) could be achieved through a number of different deployment paths, timelines, architectural approaches, and technology choices. This report summarizes a technology assessment undertaken by the Alliance for Telecommunications Industry Solutions (ATIS) and provides a basis for understanding the current network challenges, drivers for evolution, architectural alternatives, and target opportunities for early deployment.
5G Reimagined: A North American Perspective (Issue 2)
The purpose of this white paper is to understand, define, and advance North American requirements for 5G. Deployment scenarios and use cases for 5G networks are analyzed from a North American perspective. These use cases include both traditional and more disruptive service scenarios. The scope of the use cases is not limited to narrowly defined mobile network, and includes interactions with other components.
The white paper identifies unique characteristics of the North American network and regulatory requirements. Although the focus is on the North American market, it is considered in a global context to leverage synergies wherever possible, and to only identify new requirements where necessary.
Cloud Services Impacts on Lawful Interception Study
The purpose of this study is to identify and analyze:
- The challenges, impacts, and obstacles of meeting LI requirements for cloud services.
- The extent to which existing ATIS LI standards meet these requirements.
- The deltas that may exist between existing and needed LI capabilities.
- What new work may be required to achieve a fuller set of LI capabilities.
Intelligent Programmatic Peering Summary Report
The TOPS Council’s Intelligent Programmatic Peering Landscape Team (IPLT) completed an assessment of several possible near-term mechanisms that would enable automated service provider coordination across peering interfaces to quickly mitigate the impact of Distributed Denial of Service (DDoS) attacks. Possible operational limitations were discussed, and potential protocol work identified.
Developing Calling Party Spoofing Mitigation Techniques: ATIS’ Role
ATIS is central to much of the coordinated industry work on solutions to prevent and reduce the impact of Caller ID spoofing and related robocalling. Illegitimate Caller ID spoofing increases the impact of fraudulent robocalls and undermines techniques to prevent unwanted calls. This report highlights the practical mitigation techniques the industry is developing to provide the consumer with useful tools to reduce unwanted robocalls, and concludes that a layered approach, similar to that used in cybersecurity efforts, provides the flexibility to respond to these evolving threats.
Calling Party Spoofing Mechanisms and Mitigation Techniques
The impact of illegitimate uses of Caller ID Spoofing and robocalling presents unique challenges for the industry in addressing consumer concerns with unwanted and fraudulent calls. This paper outlines practical mitigation techniques being developed, and emphasizes Caller ID spoofing is not a static problem that can be solved with a single solution. Rather, a flexible, layered approach (similar to addressing cybersecurity risks) is needed to respond to these evolving threats.
ATIS—A Critical Force in Shaping 5G to Meet Service Providers’ Market Needs
From the development of an overarching vision to the delivery of specific requirements, ATIS plays a pivotal role in the communications industry’s advancement of the concept, objectives and capabilities for 5G systems. In 2015, ATIS produced the white paper "5G Reimagined: A North American Perspective," which defines a vision of 5G incorporating both incremental and innovative aspects of the 5G network—how 5G will evolve from the current network and what its potential will be. Both incremental and innovative perspectives are crucially important in terms of positioning network operators to leverage 5G to advance their business models. In 2016, ATIS is fast-tracking its work to develop detailed 5G specifications. ATIS is defining the industry requirements that will direct 5G's eventual technical capabilities and provide the basis for all subsequent 5G standardization. How will the new 5G radio access technologies work? How will the 5G transition take place? What will Quality of Experience mean in a future in which communications technology is even more deeply embedded into the social fabric than it is today? This briefing provides insight into these questions, and covers some of the areas in which ATIS is working to ensure 5G’s success.
Feasibility Study for WEA Cell Broadcast Geo-Targeting
The scope of this document is a feasibility study of the geo-targeting of Wireless Emergency (WEA) Messages to address recommendations from the Federal Communications Commission (FCC) Communications Security, Reliability & Interoperability Council (CSRIC).
Feasibility Study for WEA Supplemental Text
This feasibility study performs a technical analysis on supplemental information for Wireless Emergency Alert (WEA) Messages. This feasibility study is in response to Recommendations 5.1 and 5.2 of the December 2014 Federal Communications Commission (FCC) Communications Security, Reliability & Interoperability Council (CSRIC) Working Group 2 Wireless Emergency Alerts final report of December 3, 2014.
5G Reimagined: A North American Perspective
The scope of this white paper is to understand, define, and advance North American requirements for 5G. It describes use cases which show, from a North American perspective, possible scenarios for 5G networks. These use cases include both commonly recognized baseline requirements and also more disruptive service examples representing a more challenging conception of aspects of 5G. The scope of the use cases is not limited to just the narrowly defined mobile network. Many of these cases include interactions with other elements, including some not normally standardized, such as content provider applications/ networks, operational systems within a carrier network and traffic scheduling and steering algorithms. Based on the documented use cases, the white paper identifies unique characteristics of the North American network and regulatory requirements. Although the focus is on North American requirements, these are considered in a global context to leverage synergies wherever possible, and to identify new requirements only where necessary.
Best Practices for Obtaining Mobile Device Identifiers for Mobile Device Theft Prevention (MDTP)
This specification defines best practices for obtaining the device identifiers (e.g., International Mobile Equipment Identity [IMEI]) from mobile devices even if the mobile device is locked or disabled. This best practices specification was developed in response to Recommendation 1.5 of the December 4, 2014 Federal Communications Commission (FCC) Technological Advisory Council (TAC) report on Mobile Device Theft Prevention (MDTP).
Feasibility Study for LTE WEA Message Length
This feasibility study performs a technical analysis of the proposed maximum length of displayable characters in a Long Term Evolution (LTE) Wireless Emergency Alert (WEA) message in response to Recommendation 2.1 of the December 2014 Federal Communications Commission (FCC) Communications Security, Reliability & Interoperability Council (CSRIC) Working Group 2 Wireless Emergency Alerts final report of December 3, 2014.
Testbeds Landscape Team Assessment and Next Steps, Version 2
This report is the result of a voluntary effort by ATIS member companies and reflects the consensus view of those participating. The use case recommendations and testbed(s) specifications are not intended as mandates; participation in this effort does not indicate any obligation or intention by specific members to purchase or implement any capability or method described in this report. Decisions regarding the implementation of, or compliance with, these specifications will appropriately be made by individual companies. Finally, it should be noted that the recommendations and specifications are not intended for use in certifying equipment and/or services.
Developing a Roadmap for the Migration of Public Safety Applications during the All IP Transition
This paper provides useful information regarding the roadmap of IP-enabled solutions that could support the transition of specific public safety applications to a wide range of IP media, products, and services. This assessment, conducted by the Alliance for Telecommunications Industry Solutions (ATIS), is based on a collection of public safety requirements by sector, an assessment of current and future solutions available across the industry, and a summary of findings. These findings include specific details of IP-based solutions, as well as new capabilities that could be provided to the public safety industry as the transition to all-IP takes place. Additional information is provided to allow emergency management agencies and others in the industry to obtain more detailed data regarding each solution, as well as to allow manufacturers and network operators to contribute new developments in the future regarding their products and services.
Feasibility Study for Earthquake Early Warning System
This feasibility study evaluates the feasibility of the commercial LTE cellular networks in supporting public earthquake notifications as part of the proposed California Earthquake Early Warning System (EEWS). Although this feasibility study is initially targeted to California, it is applicable to other earthquake warning systems that may be deployed anywhere in the United States and its territories.
Joint ATIS/SIP Forum Technical Report - IP NNI Profile (ATIS-1000063)
This document specifies an NNI profile applicable to the interface between the home network of the originating party and the home network of the terminating party; or between the home network of either party, and a transit network. The interface between the home and visited network of a roaming mobile user is out of scope.
Joint ATIS/SIP Forum Technical Report - IP Interconnection Routing (ATIS-1000062)
Technical Report on IP Interconnection Routing Alliance for Telecommunications Industry Solutions Approved May, 2015 Abstract: As Service Providers introduce and expand IP-based service offerings, there is increasing interest in identifying the opportunities for the industry to facilitate IP routing of Voice over IP (VoIP) traffic using E.164 addresses. The ATIS/SIP Forum IP-Network-to-Network (NNI) Task Force to ok on the initiative to develop a Technical Document and is publishing a report to describe the candidate proposa ls for circulation and comment. Recognizing that IP traffic exchange is developing as an overlay to existing Time-Division Multiplexing (TDM) interconnection and will be implemented by different service providers with varyi ng timelines, the purpose of this draft report is to:
- Provide an overview of in-use and proposed architectu res with the provisioning processes and calls flows to facilitate the exchange of VoIP traffic associated with IP-based services using E.164 addresses.
- Present comparative characteristics that may be useful in understanding the approaches.
- Consider how such in-use and proposed solution(s) may be adopted and/or coexist, and evolve for transition to a future integrated registry envisioned at the FCC Numbering Testbed Workshop.
NFV Forum Use Cases
Network Functions Virtualization (NFV) and Software Defined Networking (SDN) are part of a sweeping evolution that is moving the ICT industry from integrated, hardware - centric solutions to modular, hardware - agnostic frameworks by abstracting the hardw are resources into a consistent operating environment for the software. This Document defines priority use cases, such as virtual network operator, that emphasize the benefits of NFV in a multi - administrative domain environment and requ ire improved service integration and portability between network operators, web scale companies, and enterprises.
The Interoperability Enabler for the Entire M2M and IoT Ecosystem
Market projections for the growth of Machine-to-Machine (M2M) communications and the Internet of Things (IoT) are unrealistic without the emergence of a global standardised platform. This industry will not take off without significant consolidation and the economies of scale that standardisation can bring. Rationalisation needs to occur although disparity will continue on the device and connectivity level.
oneM2M is a set of specifications that will enable users to build platforms, regardless of existing sector or industry solutions. The intention is not to discard or ignore existing industry-specific standards but to work with them to provide value by extending their reach.
Emerging Opportunities for Leveraging Network Intelligence
Service provider networks possess a wealth of information (network intelligence) relative to subscribers, applications and network state. Attempts to leverage this intelligence have, in the past, fallen short. The potential gain associated with network intelligence is significant. Additionally, new network technologies such as NFV and SDN, provide new possibilities for network and application optimization.
This focus group report has taken a “use case” approach in analyzing how network intelligence can be better leveraged in the network. Eleven different use cases have been analyzed. For each use case, both the network data inputs as well as potential outputs/network actions were considered to better leverage network intelligence.
IP Services Interconnect Technical Report: Assessment of Requirements and Specifications
The objective of the focus group is to define a strategy for developing an IP services interconnect specification suitable for all service provider types (wireless, wireline, and cable), encompassing basic, advanced, and future services. The scope includes forward-looking services such as HD Voice, Video, Messaging, and Data. Requirements are identified for a set of interconnection profiles built on existing standards to enable these services and to deliver a consistent user experience across all types of networks (e.g., Wireless, Fixed, and Cable). This analysis is complementary to a joint effort with the SIP Forum (the ATIS/SIP Forum IP-NNI Task Force) to develop a fully specified IP-NNI for voice services.
An Analysis of the SPDY Protocol and the SPDY Proxy
In a bid to enhance the speed and security of the web, browser and application developers are implementing new protocols and using end-to-end encryption. Google’s SPDY, described as “an experimental protocol for a faster web”, is one of the new protocols being introduced. To accelerate adoption of the protocol, SPDY proxy services offer some of the benefits of SPDY even when downloading content from web servers that have not yet implemented the SPDY protocol. However, by bundling and encrypting all web traffic for a user inside a single connection, the SPDY proxy hides the true source of the content and breaks content distribution and network management.
Operational Opportunities and Challenges of SDN/NFV Programmable Infrastructure
This document identifies operational issues and opportunities associated with increasing programmability of the infrastructure. For example, this includes OSS/BSS impacts, reliability/fault detection, and administration, as well as maintenance issues over the network element, and service life cycles of IP-infrastructure-based network elements. The FG will also identify likely changes in operational procedures and staffing skill sets required to support increasing programmability.
Big Data Analytics Focus Group: BDA Data Value
Chain Reference Model & Use Cases
This document defines such a model to both enable network operators to monetize customer data through big data analytics and share data with third parties. Each data sharing partner, in the data value chain, provides additional value by combining related data from third parties and monetizing the results for consumption by other third party partners throughout the data value chain.
Trust and Identity (T&I) Focus Group White Paper
This whitepaper identifies functions that meet all three criteria, and recommends next steps. It is not this Focus Group’s intent to redesign mature architectures such as IMS, but rather to identify existing assets that ATIS member companies can leverage, as well as areas where ATIS is positioned to help address identified business requirements.
PSTN Transition Focus Group Assessment and Recommendations
The infrastructure of the Public Switched Telecommunications Network (PSTN) is transitioning from TDM (time division multiplex) technology to IP (Internet Protocol). The TDM single-purpose voice connection to the consumer, is being replaced by a multi-purpose broadband IP connection. It is important for the industry to evaluate the impact of this transition on processes and regulation, and make changes and recommendations where necessary. This document assesses the impact on services, access, transport, and numbering, providing conclusions and recommendations for each topic.