Revenue Analytics for Long Term Evolution (LTE)



Similar documents
Technical white paper. Enabling mobile broadband growth Evolved Packet Core

LTE Overview October 6, 2011

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture

LTE CDMA Interworking

Supporting mobility in the RAN cloud

Status of 3G deployments and interoperability with 4G. Mike Hobby CDMA Data Marketing

Amdocs Policy Controller

4G Mobile Networks At Risk

Revenue Assurance for Electric Utilities

Use of MPLS in Mobile Backhaul Networks

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

1 Introduction Services and Applications for HSPA Organization of the Book 6 References 7

MNS Viewpoint: LTE EVOLUTION IN AFRICA 1. Introduction

Evolutionary Trends towards Beyond 3G Mobile Networks

Nokia Siemens Networks Flexi Network Server

Efficient evolution to all-ip

Next Generation of Railways and Metros wireless communication systems IRSE ASPECT 2012 Alain BERTOUT Alcatel-Lucent

FT networks, services and IS evolution perspectives towards convergence Patrice COLLET France Télécom Network, Carrier and IT Division

Mobile network evolution A tutorial presentation

Delivery of Voice and Text Messages over LTE

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre

Diameter in the Evolved Packet Core

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

PCC. Policy Server. Charging Systems PCEF PDN GW PCEF GGSN. Figure 1 : Generic Policy and Charging Control Architecture

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

ROC Data Integrity Management - Leased Line Cost Recovery

How To Understand The Gsm And Mts Mobile Network Evolution

Overview of the Evolved packet core network

ScaleNet Converged Network of the Future

The future of mobile networking. David Kessens

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

UNDERSTANDING CORE TELECOM SECURITY

Nokia Siemens Networks Flexi Network Gateway. Brochure

Nokia Siemens Networks mobile softswitching Taking voice to the next level

Service Delivery Platforms for Network Operators

Implementing LTE International Data Roaming

Introduction to Evolved Packet Core

Intelligent Policy Enforcement Solutions for Mobile Service Providers

Synchronization Requirements in Cellular Networks over Ethernet

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

PDF vytvořeno zkušební verzí pdffactory UMTS

Mobile Virtual Network Operator. White paper

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

SS7 & LTE Stack Attack

Mobility and cellular networks

Simplified network architecture delivers superior mobile broadband

Advanced SIP Series: SIP and 3GPP

Research Report Charging and Billing for the Digital Economy

Building Robust Signaling Networks

How To Make Money From Your Cell Phone Business

IP Multimedia System: general aspects and migration perspectives

Mobile Wireless Overview

Session Border Controllers: Addressing Tomorrow s Requirements

Migration to LTE: Infrastructure Impact. Maria E. Palamara Director CDMA-LTE Strategy Alcatel-Lucent January, 2009

IBM and Comverse BSS/OSS Solution

Dialogic BorderNet Session Border Controller Solutions

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks

Applying Software Defined Networks and Virtualization Concepts for Next Generation Mobile Broadband Networks

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

SATELLITE MOBILE BACKHAUL: FROM VOICE TO DOMINANT DATA

Get the best performance from your LTE Network with MOBIPASS

Business Case for Juniper Networks Virtualized Mobile Control Gateway

International Dialing and Roaming: Preventing Fraud and Revenue Leakage

EETS 8316 Wireless Networks Fall 2013

AAA, BILLING, CHARGING

Managed Services Billing Platform For MVNOs

EE5406 Wireless Network Protocols Network Architectures

Whitepaper. 10 Metrics to Monitor in the LTE Network. blog.sevone.com

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

Increasing M2M device intelligence drive fast decisions and help new business

Machine to Machine Communications As a Service

Securing Next Generation Mobile Networks

Business aware traffic steering

Cisco Satellite Services Platform Delivering Managed Services over Satellite

Leveraging the RA/FM Platform to Deliver Business Insights to Finance & Marketing

The Business Case for Caching in 4G LTE Networks

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure

Voice over LTE Telephony on the National Public Safety Broadband Network

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

Acme Packet Net-Net SIP Multimedia-Xpress

NFV & SDN World. Practical Approaches to NFV Orchestration Deployment. Terry McCabe CTO Mobile Business Unit

Top 10 Considerations for a Successful 4G LTE Evolved Packet Core Deployment

Solace s Solutions for Communications Services Providers

Nokia Networks. Nokia Service Quality Manager

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Fixed and Nomadic LTE Services

Alcatel-Lucent Ultimate Wireless Broadband Solution. Re-define the wireless experience with the industry s most comprehensive end-to-end LTE solution

trends in mobile malware and importance of network based user protection

Voice over IP Implementation

Appendix C-8 IOC / FOC Target Timeline. Special Notice D15PS00295 Nationwide Public Safety Broadband Network (NPSBN)

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT

M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact?

HIGH-PERFORMANCE SOLUTIONS FOR MONITORING AND SECURING YOUR NETWORK A Next-Generation Intelligent Network Access Guide OPEN UP TO THE OPPORTUNITIES

Virtualization techniques for network functions. Fabrice Guillemin, Orange Labs, OLN/CNC/NCA September 14, 2015

Transcription:

Revenue Analytics for Long Term Evolution (LTE) Technical White Paper October, 2012

cvidya Confidential Proprietary This document and the information contained in it is CONFIDENTIAL INFORMATION of cvidya, and shall not be used, published, disclosed, or disseminated outside cvidya in whole or in part without cvidya's consent. This document contains trade secrets of cvidya. Reverse engineering of any or all of the information in this document is prohibited. The copyright notice does not imply publication of the document. Documented Releases Revision Number Revision Description Revision Date 1.0 Initial release Date month year

Contents 1 Revenue Management challenges... 7 1.1 Service Configuration... 7 1.2 Usage... 8 1.3 Billing... 9 2 Revenue management solution... 10 2.1 Revenue Assurance... 10 2.2 Fraud Management... 11 2.3 Revenue Management Control Points... 12 3 About cvidya... 13 Table of Figures Figure 1 LTE Phase 1... 6 Figure 2 LTE Phase 2 & 3... 6 Figure 3 LTE Charging... 8 Figure 4 LTE Control Points... 12

The introduction of LTE The access technology called LTE (Long Term Evolution) is quickly becoming the network technology of choice for 4G deployments around the world as the consumer demand for higher capacity mobile broad band services continues to rise. LTE is becoming the technology of choice because it provides cost effective, highly responsive and very fast mobile data services. The 4G LTE technology revolutionizes mobile network architecture and the services offered for mobile users. LTE lays the foundations for an all IP environment enabling unified internet based interactions of User s Equipment (UE) with a growing number of high bandwidth offerings. Traditional circuit based voice services can be fully assimilated with the packet data infrastructure thus simplifying access technologies and providing richer integrated voice and data services. LTE technology brings changes to the Radio Access Network (RAN) as well as to the network core, moving it from the dual circuit and packet cores architecture, to a unified Evolved Packet Core (CPE) that serves voice, media and data. LTE provides access to emerging IP Multimedia Subsystem (IMS) networks, which will eventually replace the traditional circuit based mobile voice networks of today with rich multimedia services. In most cases, 3G operators are deploying LTE in a phased process (see figures below): Phase 1 Deploy LTE along with the existing 3.xG network; gradually move the traditional 3G data core (BSC, SGSN, GGSN) to the Evolved Packet Core (EPC) Phase 2 Deploy IP Multimedia Subsystem (IMS) along with the existing 3.xG circuit based voice network; gradually move the traditional 3G Voice core (BSC, MSC, HLR) to IMS with EPC Phase 3 Full EPC + IMS network and service environments

3.x G Network Circuit Core MSC SMSC SMSC Voice & Messaging BTS NodeB BSC/ RNC Intelligent Network HLR Radio Access Network SGSN GGSN Packet Core Internet 4G LTE Network MME HSS e NodeB S GW P GW Radio Access Network Evolved Packet Core RCRF SPR Figure 1 LTE Phase 1 4G LTE Network IP Multimedia Subsystem HSS CSCF Application Servers Voice & Messaging MME MGW e NodeB Radio Access Network S GW P GW Evolved Packet Core RCRF SPR Internet Figure 2 LTE Phase 2 & 3

1 Revenue Management challenges The transition to LTE affects service types, utilization patterns, and also alters the services and customers information. Furthermore, traffic patterns, especially for data, are changed significantly. LTE enables operators to move from traditional flat charge based data usage to more advanced group bundled & quality dependant charges, thus increasing revenues and differentiation. On the other hand, as with the internet, the all IP LTE technology increases the level of vulnerability to fraudsters and hackers. cvidya s and FraudView solutions address the challenges arising from the introduction of LTE and IMS in two ways. Firstly, from the overall perspective of Revenue Assurance and Fraud management, they address the new configuration, usage patterns and vulnerabilities which LTE brings with it, and secondly, they continue to address the relevant traditional RA and Fraud issues from the pre LTE era. The following paragraphs outline some of the major Revenue Assurance and Fraud Management challenges that LTE raises. 1.1 Service Configuration Customers and Service information in 3G networks is usually stored by and managed across the Home Location Register (HLR) and the Prepaid Intelligent Network platforms. Some aspects of 3G data usage are managed by Radius/AAA platforms. In LTE networks the HLR that manages customers service information, is replaced by the Home Subscribers System (HSS), which is a combination of the HLR and AAA, and responsible for managing the overall data services for the customers. Furthermore, LTE supports Quality of Service (QoS) dependent charging, thus the level of quality of service (bandwidth, guarantied bit rate, etc.) depends on parameters provisioned for each customer. The LTE QoS parameters per customers are stored by the Service Profile Register (SPR) platform. The QoS is actually managed by the Policy Charge Rules Function (PCRF) and the Policy Charge Enforcement Function (PCEF) controlling the Packet Data Network Gateway (P GW). It is imperative that the SPR be synchronized with the HLR and HSS (see figure 3). During phase 1 of the LTE deployment, the operators are managing customers information concurrently across the HLR, HSS and SPR. Customers having 3G data are managed on the HLR while those moved to LTE reside on the HSS and SPR, while their voice services are still managed by the HLR. It is of the utmost importance that the data integrity across the HLR, HSS and SPR for all the registered customers and their services, be maintained. To maintain data integrity, it is essential that duplications and discrepancies be resolved during the overall transit period from phase 1 to 3. It is important to note that LTE service and topology attributes, as well as customers information, impact the information handled by the CRM, Billing and ERP (accounting & logistics) systems. Prepaid customers on 3G networks are also managed by a Prepaid Intelligent Network (IN) platform. Revenue management for 3G maintains integrity by avoiding duplications and discrepancies between the HLR and the IN platforms. The transition to LTE introduces the On Line Charging (OCG) platform which receives usage information, coupled with utilized QoS from the PCEF. For data usage, the OCG initially interacts with the Prepaid IN platform, to determine available credit and report utilized credit. Eventually (phase 3), the Prepaid IN

platform will be completely assimilated into the OCG. The PCEF also reports usage of postpaid customers (and visitors) to the Off Line Charging system (retail billing). During phase 1, the OCG functionality can be carried out by the existing prepaid platforms (IN and Prepaid charging gateway). On the other hand, the new OCG can interact with the existing prepaid platforms. Eventually, all related prepaid charging should be assimilated in the OCG. Revenue Management should check the integrity of the OCG vs. the IN Prepaid platform, including prepaid customers information and credit balances. The information residing in the OCG should be checked against that in the HSS. It is essential to maintain data integrity and avoid duplications and discrepancies during the overall transit period from phase 1 to 3. 4G LTE Network MME HSS On Line Charging Off Line Charging e NodeB Radio Access Network S GW P GW RCEF Evolved Packet Core RCRF SPR Figure 3 LTE Charging During phases 2 & 3, the customer information residing in the HLR should be transferred and assimilated in the HSS. The transit period should be monitored by Revenue Management in order to maintain data integrity and avoid duplicates and discrepant configuration records. The customers service information residing in the HSS, SPR and OCG should also be checked on a periodic basis in order to detect Policy Violating service attributes (e.g. customers having service attributes they are not entitled to), and service provisioning misprocesses and latencies. The SPR may be co located with the HSS or separately deployed by other parties (i.e. MVNOs, Wholesale operators). Data residing in the HSS, SPR and OCG may also be exposed to either internal or external (hacking/backdoor) fraudulent activities, aimed at affecting charging or damaging operations. Data integrity controls are therefore necessary on a periodic basis, including strict monitoring of any illegal or policy violating activity (e.g. fraudulent data manipulation) performed on the above service platforms. 1.2 Usage Moving from flat based data usage to QoS/bundled data usage increases the significance of usage data records generated by the LTE network elements (S GW, P GW, PCEF and PCRF). Most of these usage records are partial in nature, requiring the Revenue Management systems (RA and Fraud Management) to process/aggregate them into completed usage

records (e.g. a record addressing an overall data session). The sheer number of those partial records requires a capable platform having the ability to collect and process all records. As with 3G networks and services, Revenue Management should check the completeness and integrity of usage records generation (by the relevant network elements), collection (by the data collectors) and processing, in order to detect lost or misprocessed billable events. The Fraud Management solution should detect suspicious traffic patterns, risky services, contract/registration violating usage and more. LTE is an emerging service and in order to manage the technical and service environments and be able to plan ahead, it is important to generate and track usage figures and patterns. The Revenue Management solution should provide the means for traffic and utilizations trends analysis and reports, providing the relevant indications as to suspicious/important deviations. 1.3 Billing LTE facilitates offerings of an increased number of data service types and service derivatives. Furthermore, LTE supports QoS/data bundling dependent charging instead of the flat based charging common to 3G data services. QoS offerings may change dynamically between, and even during, data or media sessions, making the charging process more complex. The increase in the number of service attributes associated with registered customers (post and pre paid), enhances the complexity posed on either prepaid (on line charging) or postpaid (off line charging). Enhanced service offerings may enable a customer to choose which services are prepaid and which are postpaid. It is therefore clear that we must validate the integrity of customers information (static and dynamic) in both on line and off line charging systems. From a charging integrity perspective, the handling of dynamically allocated QoS/data bundled service parameters extends the complexity of both on line and off line charging, thus increasing the probability of errors and misprocessing. It is essential to impose charging integrity controls to check for undercharges, overcharges and miss rates. These integrity checks should be carried out for both on line and off line charging (note: the solution can be implemented across chosen traffic/service samples). As with 3G networks, a Revenue Management system should check that all billable usage events are processed and that all the invoices are handled and delivered in the right manner. The bills generated should be examined periodically in order to detect Policy Violating charges. Data residing in the on line and off line charging platform may also be exposed to either internal or external (hacking/backdoor) fraudulent activities that are aimed at affecting charging or damaging operations. Data integrity controls are therefore necessary on a periodic basis, including strict monitoring of any illegal or policy violating data modification to either of these platforms.

2 Revenue management solution The tables below map the relevant Revenue Management process required to address major revenue leakages and fraudulent activities associated with LTE. The tables address only the threats posed by LTE. Classical 3G revenue threats are still relevant, but are not addressed below. The following Revenue Affecting Threats are divided into Revenue Assurance and Fraud Management threats. 2.1 Revenue Assurance Threat Control Solution Platform Integrity of HSS configuration Integrity of SPR configuration Integrity of OCG configuration Completeness of HSS configuration Compare CRM/Billing vs. HSS Compare HSS vs. HLR Compare HSS vs. IN prepaid Compare CRM/Billing vs. SPR Compare SPR vs. HLR Compare SPR vs. IN prepaid Compare CRM/Billing vs. OCG Compare OCG vs. IN prepaid (incl. remaining credit) Latencies in CRM/Billing vs. HSS Completeness of SPR configuration Completeness of OCG configuration Latencies in CRM/Billing vs. HSS Latencies in CRM/Billing vs. HSS Service Policies HSS/SPR/OCG Assure CRM/Billing vs. Service Policies Generated integrity Usage deviations Count & aggregated payloads of PCEF vs. OCG Count & aggregated payloads of PCEF vs. Off line Billing Trend analysis of OCG Trend analysis of Off line Billing On line rating integrity Accuracy of OCG processing (sample) /RBV Off line rating integrity Accuracy of Off Line Billing (sample) /RBV Invoice integrity Accuracy of invoices for LTE customers /RBV LTE billing integrity Billing Service Policies by customer type Completeness of inputs to Off Line billing vs. rated OCG rated records vs. Service Policies Off Line rated records vs. Service Policies

2.2 Fraud Management Threat Control Solution Platform Manipulation of HSS data Manipulation of SPR data Manipulation of OCG data Look for fraud characteristics: HSS vs. CRM/Bill HSS vs. Service Policies Look for fraud characteristics: SPR vs. CRM/Bill SPR vs. Service Policies Look for fraud characteristics: OCG vs. CRM/Bill OCG vs. Service Policies OCG vs. IN + FraudView + FraudView + FraudView Unauthorized usage Usage by blocked/non registered users FraudView Illegal usage Usage for non authorized services FraudView Illegal bandwidth utilization Usage with QoS exceeding registered services FraudView Large utilized bandwidth (risk of piggybacking) + FraudView Service Policies violating usage Usage superseding service policies FraudView Suspicious usage Suspicious service configuration (CRM/Billing/HSS/SPR/OCG) Service violating configuration (CRM/Billing/HSS/SPR/OCG) Large usage counts Large usage payloads Large usage during irregular hours/time bands Hot Listed usage Behavior violating usage (large deviations from average usage) Look for non authorized /suspicious access or service configuration Look for non authorized /suspicious access or service configuration FraudView FraudView/Internal fraud FraudView / Internal fraud

2.3 Revenue Management Control Points Figure 4 below, outlines the major data sources (or control points) required for both Revenue Assurance and Fraud Management Service Configuration Portal Business Support Systems CRM Billing System Peering & Interconnect Billing IP Multimedia Subsystem Application Servers CSCF MME HSS MGW e NodeB S GW P GW On Line Charging Off Line Charging Radio Access Network RCEF Evolved Packet Core PCRF Represents Subscriber or Service information Represents Usage Records SPR Figure 4 LTE Control Points

3 About cvidya cvidya Networks is a global leader of Revenue Analytics solutions for telecom, media and entertainment service providers. Innovative cvidya solutions serve to maximize margins, improve customer experience and optimize ecosystem relationships by encompassing Revenue Assurance, Fraud Management, Operational Risk Management & Compliance, Sales Performance Management and Pricing Analytics. The cvidya experts and consultants have established a stellar track record by achieving rapid ROI and lower TCO for over 150 customers. Operating regional offices worldwide, cvidya has partnered with leading vendors to implement an impressive base of operational solutions. cvidya s customers include British Telecom, Telefonica Group, Vodafone Group, AT&T, O2, MTN and Swisscom. Follow us on Facebook, Linkedin, Twitter or visit us at www.cvidya.com and YouTube.