Revenue Analytics for Long Term Evolution (LTE)
|
|
- Imogen Bell
- 8 years ago
- Views:
Transcription
1 Revenue Analytics for Long Term Evolution (LTE) Technical White Paper October, 2012
2
3 cvidya Confidential Proprietary This document and the information contained in it is CONFIDENTIAL INFORMATION of cvidya, and shall not be used, published, disclosed, or disseminated outside cvidya in whole or in part without cvidya's consent. This document contains trade secrets of cvidya. Reverse engineering of any or all of the information in this document is prohibited. The copyright notice does not imply publication of the document. Documented Releases Revision Number Revision Description Revision Date 1.0 Initial release Date month year
4 Contents 1 Revenue Management challenges Service Configuration Usage Billing Revenue management solution Revenue Assurance Fraud Management Revenue Management Control Points About cvidya Table of Figures Figure 1 LTE Phase Figure 2 LTE Phase 2 & Figure 3 LTE Charging... 8 Figure 4 LTE Control Points... 12
5 The introduction of LTE The access technology called LTE (Long Term Evolution) is quickly becoming the network technology of choice for 4G deployments around the world as the consumer demand for higher capacity mobile broad band services continues to rise. LTE is becoming the technology of choice because it provides cost effective, highly responsive and very fast mobile data services. The 4G LTE technology revolutionizes mobile network architecture and the services offered for mobile users. LTE lays the foundations for an all IP environment enabling unified internet based interactions of User s Equipment (UE) with a growing number of high bandwidth offerings. Traditional circuit based voice services can be fully assimilated with the packet data infrastructure thus simplifying access technologies and providing richer integrated voice and data services. LTE technology brings changes to the Radio Access Network (RAN) as well as to the network core, moving it from the dual circuit and packet cores architecture, to a unified Evolved Packet Core (CPE) that serves voice, media and data. LTE provides access to emerging IP Multimedia Subsystem (IMS) networks, which will eventually replace the traditional circuit based mobile voice networks of today with rich multimedia services. In most cases, 3G operators are deploying LTE in a phased process (see figures below): Phase 1 Deploy LTE along with the existing 3.xG network; gradually move the traditional 3G data core (BSC, SGSN, GGSN) to the Evolved Packet Core (EPC) Phase 2 Deploy IP Multimedia Subsystem (IMS) along with the existing 3.xG circuit based voice network; gradually move the traditional 3G Voice core (BSC, MSC, HLR) to IMS with EPC Phase 3 Full EPC + IMS network and service environments
6 3.x G Network Circuit Core MSC SMSC SMSC Voice & Messaging BTS NodeB BSC/ RNC Intelligent Network HLR Radio Access Network SGSN GGSN Packet Core Internet 4G LTE Network MME HSS e NodeB S GW P GW Radio Access Network Evolved Packet Core RCRF SPR Figure 1 LTE Phase 1 4G LTE Network IP Multimedia Subsystem HSS CSCF Application Servers Voice & Messaging MME MGW e NodeB Radio Access Network S GW P GW Evolved Packet Core RCRF SPR Internet Figure 2 LTE Phase 2 & 3
7 1 Revenue Management challenges The transition to LTE affects service types, utilization patterns, and also alters the services and customers information. Furthermore, traffic patterns, especially for data, are changed significantly. LTE enables operators to move from traditional flat charge based data usage to more advanced group bundled & quality dependant charges, thus increasing revenues and differentiation. On the other hand, as with the internet, the all IP LTE technology increases the level of vulnerability to fraudsters and hackers. cvidya s and FraudView solutions address the challenges arising from the introduction of LTE and IMS in two ways. Firstly, from the overall perspective of Revenue Assurance and Fraud management, they address the new configuration, usage patterns and vulnerabilities which LTE brings with it, and secondly, they continue to address the relevant traditional RA and Fraud issues from the pre LTE era. The following paragraphs outline some of the major Revenue Assurance and Fraud Management challenges that LTE raises. 1.1 Service Configuration Customers and Service information in 3G networks is usually stored by and managed across the Home Location Register (HLR) and the Prepaid Intelligent Network platforms. Some aspects of 3G data usage are managed by Radius/AAA platforms. In LTE networks the HLR that manages customers service information, is replaced by the Home Subscribers System (HSS), which is a combination of the HLR and AAA, and responsible for managing the overall data services for the customers. Furthermore, LTE supports Quality of Service (QoS) dependent charging, thus the level of quality of service (bandwidth, guarantied bit rate, etc.) depends on parameters provisioned for each customer. The LTE QoS parameters per customers are stored by the Service Profile Register (SPR) platform. The QoS is actually managed by the Policy Charge Rules Function (PCRF) and the Policy Charge Enforcement Function (PCEF) controlling the Packet Data Network Gateway (P GW). It is imperative that the SPR be synchronized with the HLR and HSS (see figure 3). During phase 1 of the LTE deployment, the operators are managing customers information concurrently across the HLR, HSS and SPR. Customers having 3G data are managed on the HLR while those moved to LTE reside on the HSS and SPR, while their voice services are still managed by the HLR. It is of the utmost importance that the data integrity across the HLR, HSS and SPR for all the registered customers and their services, be maintained. To maintain data integrity, it is essential that duplications and discrepancies be resolved during the overall transit period from phase 1 to 3. It is important to note that LTE service and topology attributes, as well as customers information, impact the information handled by the CRM, Billing and ERP (accounting & logistics) systems. Prepaid customers on 3G networks are also managed by a Prepaid Intelligent Network (IN) platform. Revenue management for 3G maintains integrity by avoiding duplications and discrepancies between the HLR and the IN platforms. The transition to LTE introduces the On Line Charging (OCG) platform which receives usage information, coupled with utilized QoS from the PCEF. For data usage, the OCG initially interacts with the Prepaid IN platform, to determine available credit and report utilized credit. Eventually (phase 3), the Prepaid IN
8 platform will be completely assimilated into the OCG. The PCEF also reports usage of postpaid customers (and visitors) to the Off Line Charging system (retail billing). During phase 1, the OCG functionality can be carried out by the existing prepaid platforms (IN and Prepaid charging gateway). On the other hand, the new OCG can interact with the existing prepaid platforms. Eventually, all related prepaid charging should be assimilated in the OCG. Revenue Management should check the integrity of the OCG vs. the IN Prepaid platform, including prepaid customers information and credit balances. The information residing in the OCG should be checked against that in the HSS. It is essential to maintain data integrity and avoid duplications and discrepancies during the overall transit period from phase 1 to 3. 4G LTE Network MME HSS On Line Charging Off Line Charging e NodeB Radio Access Network S GW P GW RCEF Evolved Packet Core RCRF SPR Figure 3 LTE Charging During phases 2 & 3, the customer information residing in the HLR should be transferred and assimilated in the HSS. The transit period should be monitored by Revenue Management in order to maintain data integrity and avoid duplicates and discrepant configuration records. The customers service information residing in the HSS, SPR and OCG should also be checked on a periodic basis in order to detect Policy Violating service attributes (e.g. customers having service attributes they are not entitled to), and service provisioning misprocesses and latencies. The SPR may be co located with the HSS or separately deployed by other parties (i.e. MVNOs, Wholesale operators). Data residing in the HSS, SPR and OCG may also be exposed to either internal or external (hacking/backdoor) fraudulent activities, aimed at affecting charging or damaging operations. Data integrity controls are therefore necessary on a periodic basis, including strict monitoring of any illegal or policy violating activity (e.g. fraudulent data manipulation) performed on the above service platforms. 1.2 Usage Moving from flat based data usage to QoS/bundled data usage increases the significance of usage data records generated by the LTE network elements (S GW, P GW, PCEF and PCRF). Most of these usage records are partial in nature, requiring the Revenue Management systems (RA and Fraud Management) to process/aggregate them into completed usage
9 records (e.g. a record addressing an overall data session). The sheer number of those partial records requires a capable platform having the ability to collect and process all records. As with 3G networks and services, Revenue Management should check the completeness and integrity of usage records generation (by the relevant network elements), collection (by the data collectors) and processing, in order to detect lost or misprocessed billable events. The Fraud Management solution should detect suspicious traffic patterns, risky services, contract/registration violating usage and more. LTE is an emerging service and in order to manage the technical and service environments and be able to plan ahead, it is important to generate and track usage figures and patterns. The Revenue Management solution should provide the means for traffic and utilizations trends analysis and reports, providing the relevant indications as to suspicious/important deviations. 1.3 Billing LTE facilitates offerings of an increased number of data service types and service derivatives. Furthermore, LTE supports QoS/data bundling dependent charging instead of the flat based charging common to 3G data services. QoS offerings may change dynamically between, and even during, data or media sessions, making the charging process more complex. The increase in the number of service attributes associated with registered customers (post and pre paid), enhances the complexity posed on either prepaid (on line charging) or postpaid (off line charging). Enhanced service offerings may enable a customer to choose which services are prepaid and which are postpaid. It is therefore clear that we must validate the integrity of customers information (static and dynamic) in both on line and off line charging systems. From a charging integrity perspective, the handling of dynamically allocated QoS/data bundled service parameters extends the complexity of both on line and off line charging, thus increasing the probability of errors and misprocessing. It is essential to impose charging integrity controls to check for undercharges, overcharges and miss rates. These integrity checks should be carried out for both on line and off line charging (note: the solution can be implemented across chosen traffic/service samples). As with 3G networks, a Revenue Management system should check that all billable usage events are processed and that all the invoices are handled and delivered in the right manner. The bills generated should be examined periodically in order to detect Policy Violating charges. Data residing in the on line and off line charging platform may also be exposed to either internal or external (hacking/backdoor) fraudulent activities that are aimed at affecting charging or damaging operations. Data integrity controls are therefore necessary on a periodic basis, including strict monitoring of any illegal or policy violating data modification to either of these platforms.
10 2 Revenue management solution The tables below map the relevant Revenue Management process required to address major revenue leakages and fraudulent activities associated with LTE. The tables address only the threats posed by LTE. Classical 3G revenue threats are still relevant, but are not addressed below. The following Revenue Affecting Threats are divided into Revenue Assurance and Fraud Management threats. 2.1 Revenue Assurance Threat Control Solution Platform Integrity of HSS configuration Integrity of SPR configuration Integrity of OCG configuration Completeness of HSS configuration Compare CRM/Billing vs. HSS Compare HSS vs. HLR Compare HSS vs. IN prepaid Compare CRM/Billing vs. SPR Compare SPR vs. HLR Compare SPR vs. IN prepaid Compare CRM/Billing vs. OCG Compare OCG vs. IN prepaid (incl. remaining credit) Latencies in CRM/Billing vs. HSS Completeness of SPR configuration Completeness of OCG configuration Latencies in CRM/Billing vs. HSS Latencies in CRM/Billing vs. HSS Service Policies HSS/SPR/OCG Assure CRM/Billing vs. Service Policies Generated integrity Usage deviations Count & aggregated payloads of PCEF vs. OCG Count & aggregated payloads of PCEF vs. Off line Billing Trend analysis of OCG Trend analysis of Off line Billing On line rating integrity Accuracy of OCG processing (sample) /RBV Off line rating integrity Accuracy of Off Line Billing (sample) /RBV Invoice integrity Accuracy of invoices for LTE customers /RBV LTE billing integrity Billing Service Policies by customer type Completeness of inputs to Off Line billing vs. rated OCG rated records vs. Service Policies Off Line rated records vs. Service Policies
11 2.2 Fraud Management Threat Control Solution Platform Manipulation of HSS data Manipulation of SPR data Manipulation of OCG data Look for fraud characteristics: HSS vs. CRM/Bill HSS vs. Service Policies Look for fraud characteristics: SPR vs. CRM/Bill SPR vs. Service Policies Look for fraud characteristics: OCG vs. CRM/Bill OCG vs. Service Policies OCG vs. IN + FraudView + FraudView + FraudView Unauthorized usage Usage by blocked/non registered users FraudView Illegal usage Usage for non authorized services FraudView Illegal bandwidth utilization Usage with QoS exceeding registered services FraudView Large utilized bandwidth (risk of piggybacking) + FraudView Service Policies violating usage Usage superseding service policies FraudView Suspicious usage Suspicious service configuration (CRM/Billing/HSS/SPR/OCG) Service violating configuration (CRM/Billing/HSS/SPR/OCG) Large usage counts Large usage payloads Large usage during irregular hours/time bands Hot Listed usage Behavior violating usage (large deviations from average usage) Look for non authorized /suspicious access or service configuration Look for non authorized /suspicious access or service configuration FraudView FraudView/Internal fraud FraudView / Internal fraud
12 2.3 Revenue Management Control Points Figure 4 below, outlines the major data sources (or control points) required for both Revenue Assurance and Fraud Management Service Configuration Portal Business Support Systems CRM Billing System Peering & Interconnect Billing IP Multimedia Subsystem Application Servers CSCF MME HSS MGW e NodeB S GW P GW On Line Charging Off Line Charging Radio Access Network RCEF Evolved Packet Core PCRF Represents Subscriber or Service information Represents Usage Records SPR Figure 4 LTE Control Points
13 3 About cvidya cvidya Networks is a global leader of Revenue Analytics solutions for telecom, media and entertainment service providers. Innovative cvidya solutions serve to maximize margins, improve customer experience and optimize ecosystem relationships by encompassing Revenue Assurance, Fraud Management, Operational Risk Management & Compliance, Sales Performance Management and Pricing Analytics. The cvidya experts and consultants have established a stellar track record by achieving rapid ROI and lower TCO for over 150 customers. Operating regional offices worldwide, cvidya has partnered with leading vendors to implement an impressive base of operational solutions. cvidya s customers include British Telecom, Telefonica Group, Vodafone Group, AT&T, O2, MTN and Swisscom. Follow us on Facebook, Linkedin, Twitter or visit us at and YouTube.
Technical white paper. Enabling mobile broadband growth Evolved Packet Core
Technical white paper Enabling mobile broadband growth Evolved Packet Core Contents 3 Enabling mobile broadband growth 4 Enabling migration from current networks to LTE 4 Terminology 5 The demand for cost-effective
More informationLTE Overview October 6, 2011
LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term
More informationWanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture
Wanderlust: Enabling roaming in the LTE era Don Troshynski Vice President, Solutions Architecture Acme Packet Trusted, first-class services and applications Apps & services Session delivery network April
More informationLTE CDMA Interworking
LTE CDMA Interworking ehrpd - Use of a Common Core and a Stepping Stone to LTE Mike Dolan Consulting Member of Technical Staff Alcatel-Lucent Overview ehrpd (evolved High Rate Packet Data*) ehrpd involves
More informationSupporting mobility in the RAN cloud
Supporting mobility in the RAN cloud Michael Fitch BT 23 rd October 2012 Cloud basics On-Demand Self-Service A consumer can provision computing capabilities, such as server time and network storage, automatically
More informationStatus of 3G deployments and interoperability with 4G. Mike Hobby CDMA Data Marketing
Status of 3G deployments and interoperability with 4G Mike Hobby CDMA Data Marketing Value of Existing networks LTE is the technology currently getting significant attention in the press 59 LTE Operator
More informationAmdocs Policy Controller
Amdocs Policy Controller The Amdocs Policy Controller is a highly flexible and scalable policy server specifically designed to help service providers manage the impact of mobile data growth on their networks
More information4G Mobile Networks At Risk
07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis
More informationRevenue Assurance for Electric Utilities
Revenue Assurance for Electric Utilities Introduction The utility industry is undergoing major changes in the way electricity is produced, distributed and consumed. New Smart Grid and Smart Metering technologies
More informationAn Oracle White Paper December 2013. The Time for Diameter Is Now: Why Service Providers Should Implement Diameter Today
An Oracle White Paper December 2013 The Time for Diameter Is Now: Why Service Providers Should Implement Diameter Today Introduction There is little secret about how smartphones and tablets are affecting
More informationUse of MPLS in Mobile Backhaul Networks
Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile
More informationHow to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
More information1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7
Figures and Tables About the Authors Preface Foreword Acknowledgements xi xix xxi xxiii xxv 1 Introduction 1 1.1 Services and Applications for HSPA 3 1.2 Organization of the Book 6 References 7 2 Overview
More informationMNS Viewpoint: LTE EVOLUTION IN AFRICA 1. Introduction
MNS Viewpoint: LTE EVOLUTION IN AFRICA 1. Introduction Wireless communications have evolved rapidly since the emergence of 2G networks. 4G technology (also called LTE), enables to answer the new data market
More informationEvolutionary Trends towards Beyond 3G Mobile Networks
Evolutionary Trends towards Beyond 3G Mobile Networks Cornel Pampu, Cornelia Kappler, Morten Schläger / SN MN PG NT MN 4 November 17th, 2006 The new company Nokia Siemens Networks is expected to start
More informationNokia Siemens Networks Flexi Network Server
Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted
More informationEfficient evolution to all-ip
Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players
More informationNext Generation of Railways and Metros wireless communication systems IRSE ASPECT 2012 Alain BERTOUT Alcatel-Lucent
Next Generation of Railways and Metros wireless communication systems IRSE ASPECT 2012 Alain BERTOUT Alcatel-Lucent Slide 1 Wireless communication: What s at stake for Rail? Some of the key challenges
More informationFT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division
FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division Networks, Carriers and IT France Télécom T vision Networks, Carriers
More informationMobile network evolution A tutorial presentation
Mobile network evolution A tutorial presentation Andy Sutton Principal Design Consultant - Transport Networks Avren Events, Time and Sync in Telecoms, Dublin, Ireland Tuesday 2 nd November 2010 hello About
More informationDelivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
More information1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre
1G to 4G Overview Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre Mobile Networks differentiated from each other by the word Generation 1G, 2G, 2.5G, 2.75G, 3G milestones
More informationDiameter in the Evolved Packet Core
Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband
More informationLTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
More informationPCC. Policy Server. Charging Systems PCEF PDN GW PCEF GGSN. Figure 1 : Generic Policy and Charging Control Architecture
PCC (Policy and Charging Control) Applications EFORT http://www.efort.com In a first EFORT tutorial related to PCC (Policy and Charging Control), the PCC architecture has been described with its entities,
More information29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy
29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses
More informationROC Data Integrity Management - Leased Line Cost Recovery
White Paper powering the ROC ROC Data Integrity Management - Leased Line Cost Recovery Consider this What is your monthly bill for leased lines? Calculate 5% of this amount Now multiply this by 12. Would
More informationHow To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
More informationOverview of the Evolved packet core network
UNIVERSITY OF ALBERTA Overview of the Evolved packet core network Project report submitted to the Faculty of graduate studies and research University of Alberta In partial fulfillment of the requirements
More informationScaleNet Converged Network of the Future
ScaleNet Converged Network of the Future ComNets Workshop 2008, Dr. Bangnan Xu, T-Systems Nov.21.2008 1 What is the deciding factors for the success of networking technologies? Simple Telecom 2.0 WLAN
More informationThe future of mobile networking. David Kessens <david.kessens@nsn.com>
The future of mobile networking David Kessens Introduction Current technologies Some real world measurements LTE New wireless technologies Conclusion 2 The future of mobile networking
More informationOverview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated
3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543
More informationUNDERSTANDING CORE TELECOM SECURITY
SOLUTION BRIEF -TELECOM UNDERSTANDING CORE TELECOM SECURITY If you think you re not affected, consider that a 2013 Congressional survey of more than 150 utility companies revealed more than a dozen utilities
More informationNokia Siemens Networks Flexi Network Gateway. Brochure
Nokia Siemens Networks Flexi Network Gateway Prepare for Mobile Broadband Growth Brochure. 2/14 Brochure Table of Content 1. Towards the flat all-ip Network... 3 2. Preparing the Gateway for Mobile Broadband
More informationNokia Siemens Networks mobile softswitching Taking voice to the next level
Nokia Siemens Networks mobile softswitching Taking voice to the next level Providing an answer for today and tomorrow Evolving technologies Nokia Siemens Networks provides a solid platform for the future
More informationService Delivery Platforms for Network Operators
Service Delivery Platforms for Network Operators 26 Service Delivery Platforms for Network Operators Kansuke Kuroyanagi Yuichi Mori OVERVIEW: SDPs deployed by mobile operators have been successfully growing
More informationImplementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
More informationIntroduction to Evolved Packet Core
S T R A T E G I C W H I T E P A P E R Introduction to Evolved Packet Core This white paper provides a brief introduction to Evolved Packet Core a new mobile core for LTE. Herein, key concepts and functional
More informationIntelligent Policy Enforcement Solutions for Mobile Service Providers
Intelligent Policy Enforcement Solutions for Mobile Service Providers To do more with your wireless network you need to see more. Imagine being able to view network activity down to the granular level,
More informationSynchronization Requirements in Cellular Networks over Ethernet
Synchronization Requirements in Cellular Networks over Ethernet IEEE 802.3 TS Interim, May. 2009 J. Kevin Rhee 1, Kyusang Lee 2, and Seung-Hwan Kim 3 1 KAIST, 2 ACTUS Networks, and 3 ETRI, S. Korea Acknowledgment
More informationLong-Term Evolution. Mobile Telecommunications Networks WMNet Lab
Long-Term Evolution Mobile Telecommunications Networks WMNet Lab Background Long-Term Evolution Define a new packet-only wideband radio with flat architecture as part of 3GPP radio technology family 2004:
More informationMobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
More informationPDF vytvořeno zkušební verzí pdffactory www.fineprint.cz UMTS
UMTS Generations of mobile systems Generation 1 (1980-1995) 2 (1992-2000) 2,5 (1999-2010) 3 (2004-20?) Names NMT (Nordic Mobile Telephone); 450 MHz, 900 MHz AMPS (Advance Mobile Telephone System); USA
More informationMobile Virtual Network Operator. White paper
Mobile Virtual Network Operator White paper 02/12 Mobile Virtual Network Operator Contents 03 Introduction 04 Different approaches to mobile services 04 The Reseller 04 The Service Operator 05 The Full
More informationPractical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions
More informationSS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 akg0x11@gmail.com Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
More informationMobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
More informationSimplified network architecture delivers superior mobile broadband
White paper Simplified network architecture delivers superior mobile broadband Profitable wireless broadband with Internet-HSPA Contents 3 Executive Summary 4 Mobile data traffic is growing strongly 5
More informationAdvanced SIP Series: SIP and 3GPP
Advanced SIP Series: SIP and 3GPP, Award Solutions, Inc Abstract The Session Initiation Protocol has been selected as the main signaling protocol of the Third Generation Partnership Projects IP Multimedia
More informationResearch Report Charging and Billing for the Digital Economy
Research Report Charging and Billing for the Digital Economy Copyright Openet Telecom, 2013 Index Introduction 3 1. The Future for Traditional Billing and Charging 4 2. Innovating and Accelerating Time
More informationBuilding Robust Signaling Networks
ericsson White paper Uen 284 23-3268 July 2015 Building Robust Signaling Networks MEETING THE CHALLENGES OF THE RISING SIGNALING STORM Distributed signaling network robustness that follows the concept
More informationHow To Make Money From Your Cell Phone Business
Security Level: www.huawei.com Monetize IPX with Multimedia interconnection David (Zhaojiang) Fang Core Network Product Line, Sr. Marketing Director May 16 th, 2013 HUAWEI TECHNOLOGIES CO., LTD. Strengthen
More informationIP Multimedia System: general aspects and migration perspectives
IMS TPC EPC IP Multimedia System: general aspects and migration perspectives Dr. Leo Lehmann Federal Office of Communication, Switzerland ITU Workshop on Developments regarding telecommunication network
More informationMobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
More informationSession Border Controllers: Addressing Tomorrow s Requirements
White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction
More informationMigration to LTE: Infrastructure Impact. Maria E. Palamara Director CDMA-LTE Strategy Alcatel-Lucent January, 2009
Migration to LTE: Infrastructure Impact Maria E. Palamara Director CDMA-LTE Strategy Alcatel-Lucent January, 2009 LTE to ehpd/hpd Interworking ehpd Internet Intranet IMS AT: Access Terminal enc: Enhanced
More informationIBM and Comverse BSS/OSS Solution
IBM Telecommunications IBM and Comverse BSS/OSS Solution Based on Comverse ONE Billing and Active Customer Management Today s consumers live an always on lifestyle, driving the need for operators to reach
More informationDialogic BorderNet Session Border Controller Solutions
Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller
More informationTrends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks
Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks Outline 1 Next Generation Mobile Networks 2 New Radio Access Network
More informationApplying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks
BROADBAND UKRAINE: 12th June 2013, Kiev, Ukraine FOKUS Center for Next Generation Network Infrastructures (NGNI) Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile
More informationS-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009
S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need
More informationSecurity Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
More informationSATELLITE MOBILE BACKHAUL: FROM VOICE TO DOMINANT DATA
SATELLITE MOBILE BACKHAUL: FROM VOICE TO DOMINANT DATA Introduction Mobile operators in emerging markets are under pressure to extend their services in rural areas. Either their markets are becoming mature,
More informationGet the best performance from your LTE Network with MOBIPASS
Get the best performance from your LTE Network with MOBIPASS The most powerful, user friendly and scalable enodeb test tools family for Network Equipement Manufacturers and Mobile Network Operators Network
More informationBusiness Case for Juniper Networks Virtualized Mobile Control Gateway
Business Case for Juniper Networks Virtualized Mobile Control Gateway Executive Summary Mobile traffic growth is exploding in response to the worldwide uptake in smartphone sales. At the same time new
More informationInternational Dialing and Roaming: Preventing Fraud and Revenue Leakage
page 1 of 7 International Dialing and Roaming: Preventing Fraud and Revenue Leakage Abstract By enhancing global dialing code information management, mobile and fixed operators can reduce unforeseen fraud-related
More informationEETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: Cellular Overview: 3G and 4G http://lyle.smu.edu/~skangude/eets8316.html Dr. Shantanu Kangude skangude@lyle.smu.edu Third Generation Systems High-speed wireless
More informationAAA, BILLING, CHARGING
University of Athens Communication Networks Laboratory http://www.cnl.di.uoa.gr AAA, BILLING, CHARGING in a Multi-Operator / Multi-Service Provider Environment presented by Maria Koutsopoulou Involved
More informationManaged Services Billing Platform For MVNOs
Managed Platform For MVNOs Search for local partners (MVNEs) One Business Avenue / One Address for Business Development About One Business Avenue One Address for Business Development A business consulting
More informationEE5406 Wireless Network Protocols Network Architectures
EE5406 Wireless Network Protocols Network Architectures Dr. David Wong Tung Chong Email: wongtc@i2r.a-star.edu.sg Website: http://www1.i2r.a-star.edu.sg/~wongtc/course.html Academic Year 2010/2011 Outline
More informationWhitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
More information10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
More informationIncreasing M2M device intelligence drive fast decisions and help new business
Increasing M2M device intelligence drive fast decisions and help new business M2M+ Industry Summit / 19-20 May 2014 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra Wireless M2M Alliance
More informationMRV EMPOWERS THE OPTICAL EDGE.
Packet Solutions MRV EMPOWERS THE OPTICAL EDGE. WE DELIVER PACKET AND OPTICAL SOLUTIONS ORCHESTRATED WITH INTELLIGENT SOFTWARE TO MAKE SERVICE PROVIDER NETWORKS SMARTER. www.mrv.com MRV S OPTISWITCH -
More informationMachine to Machine Communications As a Service
Machine to Machine Communications As a Service Machine-to-Machine (M2M) refers to technologies that allow both wireless and wired systems to communicate with other devices It s the fastest growing Telecom
More informationSecuring Next Generation Mobile Networks
White Paper October 2010 Securing Next Generation Mobile Networks Overview As IP based telecom networks are deployed, new security threats facing operators are inevitable. This paper reviews the new mobile
More informationBusiness aware traffic steering
Nokia Networks Business aware traffic steering Nokia Networks white paper Business aware traffic steering Contents 1. Executive Summary 3 2. Static load or QoS-based traffic steering alone is no longer
More informationCisco Satellite Services Platform Delivering Managed Services over Satellite
Solution Overview Cisco Satellite Services Platform Delivering Managed Services over Satellite With the increase in available bandwidth from the launch of high-throughput satellites, satellite service
More informationLeveraging the RA/FM Platform to Deliver Business Insights to Finance & Marketing
Leveraging the RA/FM Platform to Deliver Business Insights to Finance & Marketing You can never rest on your laurels in this business. People in revenue assurance, fraud management, and similar staff roles
More informationThe Business Case for Caching in 4G LTE Networks
The Business Case for Caching in 4G LTE Networks Prepared for LSI Title Subhead: 14/16 Myriad Pro Regular By Haig Sarkissian - Wireless 20 20 Network inefficiency is a critical issue for today s virtualized
More informationSoftware-defined networking and Network Function Virtualization-based approach for optimizing a carrier network with integrated datacenters
Software-defined networking and Network Function Virtualization-based approach for optimizing a carrier network with integrated datacenters Present-day carrier network operators are faced with the challenge
More informationIs backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure
Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure The LTE backhaul challenge Communication Service Providers (CSPs) are adopting LTE in rapid succession.
More informationVoice over LTE Telephony on the National Public Safety Broadband Network
Voice over LTE Telephony on the National Public Safety Broadband Network Brian Kassa Head of Technology June 5 th, 2013 1 Nokia Siemens Networks Agenda VoLTE Overview What is VoLTE VoLTE for FirstNet 2
More informationFIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
More informationPenetrating into Mobile Market
Penetrating into Mobile Market A Strategic Proposal James Ni O8/21/2008 Some Facts Wireline Network subscriber population is shrinking Mobile Network will replace Wireline Network Mobile phone is convenience,
More informationAcme Packet Net-Net SIP Multimedia-Xpress
Acme Packet Net-Net SIP Overview Net-Net SIP (SMX) combines IP Multimedia Subsystem (IMS) session management with leading session border control (SBC) functions to reduce the complexity and cost of delivering
More informationNFV & SDN World. Practical Approaches to NFV Orchestration Deployment. Terry McCabe CTO Mobile Business Unit
NFV & SDN World Practical Approaches to NFV Orchestration Deployment Terry McCabe CTO Mobile Business Unit May 2015 Mitel 2 2015 Mitel. Proprietary and Confidential. Mavenir 4G Customer Launches Mavenir
More informationTop 10 Considerations for a Successful 4G LTE Evolved Packet Core Deployment
White Paper Top 10 Considerations for a Successful 4G LTE Evolved Packet Core Deployment As 1800 MHz has emerged as the main band for Long-Term Evolution (LTE) network deployments (LTE1800), LTE is going
More informationSolace s Solutions for Communications Services Providers
Solace s Solutions for Communications Services Providers Providers of communications services are facing new competitive pressures to increase the rate of innovation around both enterprise and consumer
More informationNokia Networks. Nokia Service Quality Manager
Nokia Networks Nokia Service Quality Manager Focus operations on what matters most Enabling mobile broadband growth In today s competitive markets, one challenge is to get a subscriber to sign up; another
More informationTelecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
More informationFixed and Nomadic LTE Services
Saudi Integrated Telecom Company: Fixed and Nomadic LTE Services Dr. Liang Wu CTO, SITC Technology Consultant, PCCW KSA Market Overview KSA General: has a population of approx. 25 million. a high GPP
More informationAlcatel-Lucent Ultimate Wireless Broadband Solution. Re-define the wireless experience with the industry s most comprehensive end-to-end LTE solution
Alcatel-Lucent Ultimate Wireless Broadband Solution Re-define the wireless experience with the industry s most comprehensive end-to-end LTE solution The Ultimate Wireless Broadband End-to-End LTE solution
More informationtrends in mobile malware and importance of network based user protection
trends in mobile malware and importance of network based user protection Sicherheitsnetzwerk München: Praxisforum Anwender und Anbieter im Dialog Mobile Sicherheit im Unternehmen Joachim Lüken, Nokia Networks,
More informationVoice over IP Implementation
Voice over IP Implementation Ruchi Prasad Director, Global CDMA Product Marketing November, 2004 VoIP Objectives Packetizing Traditional Voice Native VoIP On The Device Cost Savings Application Integration
More informationAppendix C-8 IOC / FOC Target Timeline. Special Notice D15PS00295 Nationwide Public Safety Broadband Network (NPSBN)
Appendix C-8 IOC / FOC Target Timeline Special Notice D15PS00295 Nationwide Public Safety Broadband Network (NPSBN) 04/27/2015 Table of Contents 1 Document Overview... 1 2 High Level IOC Timeline... 1
More informationVoice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com
1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested
More informationM2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact?
M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact? M2M + Industry Forum / 13 April 2013 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra Wireless
More informationHIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES
HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES Net Optics solutions dramatically increase reliability,
More informationVirtualization techniques for network functions. Fabrice Guillemin, Orange Labs, OLN/CNC/NCA September 14, 2015
Virtualization techniques for network functions Fabrice Guillemin, Orange Labs, OLN/CNC/NCA September 14, 2015 Introduction Network functions are today hosted by dedicated hardware, typically high performance
More information