21.11.2012 Views

Wireless Future - Telenor

Wireless Future - Telenor

Wireless Future - Telenor

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

110<br />

Box 1 – The Open Service Architecture (OSA)<br />

3GPP has standardized an Open Service Architecture. This<br />

architecture defines an open API for design, implementation,<br />

control and execution and application provided by network<br />

operators and third party providers.<br />

Applications can be network/server centric or terminal centric.<br />

Terminal centric applications reside in the Mobile Station. Network/server<br />

centric applications are running outside the core<br />

network and make use of service capability features offered<br />

through the OSA API. (Note that applications may belong to the<br />

network operator domain although running outside the core network.<br />

Being outside the core network means that the applications<br />

are executed in Application Servers that are physically<br />

separated from the core network entities.)<br />

discovery<br />

Open<br />

Service<br />

Access<br />

framework User<br />

Location<br />

Overview of the Open Service Architecture<br />

Call<br />

Control<br />

OSA internal API HLR CSE WGW<br />

WPP<br />

The SCSs provide their features to applications in Service Capability<br />

Features (SCFs). For Rel’99 the following Network SCFs<br />

are defined: Call Control, Data Session, User Location, User<br />

Status, Terminal Capabilities and Message Transfer. Note that<br />

call control only supports one-to-one calls and the applications<br />

cannot initiate a call.<br />

Administering the VT<br />

Read usage statistics<br />

Read mailbox<br />

uses<br />

extends<br />

Defining/deleting<br />

a device<br />

Registering/<br />

deregistering<br />

a device<br />

Figure 6 Use case diagram for administering the Virtual Terminal<br />

The Open Service Architecture (OSA) defines an architecture<br />

that enables operator and third party applications to make use<br />

of network functionality through an open standardised API (the<br />

OSA API). OSA thus provides the glue between applications and<br />

service capabilities provided by the network, and applications<br />

become independent of the underlying network technology. The<br />

applications constitute the top level of the Open Service Architecture<br />

(OSA). This level is connected to the Service Capability<br />

Servers (SCSs) via the OSA API. The SCSs map the OSA API<br />

into the underlying telecom specific protocols (e.g. MAP, CAP,<br />

etc.), and are therefore hiding the network complexity from the<br />

applications.<br />

Service capability server(s)<br />

Servers<br />

E.g. Location server<br />

MExE server<br />

SAT server<br />

Application<br />

server<br />

Application<br />

OSA API<br />

Interface<br />

class<br />

All interfaces are specified in OMG IDL, which makes OSA API<br />

independent of programming language, platform and Operating<br />

System. It is up to the implementers to map the OSA API to<br />

other proprietary protocols like H.323 and SIP.<br />

Current Release of OSA is Release 4 and the specification and<br />

IDL files are available for free download at www.3gpp.org.<br />

Accessing profile<br />

Authentication &<br />

access control<br />

4.5 Administering the Virtual<br />

Terminal<br />

This article identifies five extensions of this use<br />

case: accessing profile (which allows the user to<br />

read and make changes to his profile), defining/<br />

deleting a device (where the user specifies which<br />

devices to be constituents of the Virtual Terminal,<br />

i.e. which devices are known by the Virtual<br />

Terminal and hence can be used for future sessions),<br />

registering/deregistering a device (where<br />

the user can specify for any given time which<br />

specific device to be registered at), reading mailbox<br />

and reading usage statistics. Admission to<br />

the Virtual Terminal should be restricted to the<br />

user only. This means that all of the five use<br />

cases extending Administering the Virtual Terminal<br />

mentioned above involve a use case<br />

authentication and access control. These use<br />

cases are shown in Figure 6.<br />

Telektronikk 1.2001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!