The unstoppable LTE and its impact on CSPs operations

Size: px
Start display at page:

Download "The unstoppable LTE and its impact on CSPs operations"

Transcription

1 The unstoppable LTE and its impact on CSPs operations A WeDo Technologies White Paper MARCH 2012

2 A WeDo Technologies White Paper 2 Table of contents Introduction 3 1. Changes 4 2. Threats, risks and authentication 7 3. Risk management: the role of expert consultancy 8 4. About WeDo Technologies and RAID 9

3 A WeDo Technologies White Paper 3 Introduction How will Long Term Evolution (LTE) change mobile networks? What will be the data security impact of LTE deployments? And what changes will LTE bring to revenue assurance, fraud and security control? These questions have no simple answer. However, there is a simple reason why responses are urgently needed. LTE is the fastest developing mobile system technology ever. LTE had its first commercial launch in August 2011 and by January 2012 there were nearly 300 communication service providers (CSPs) investing in LTE across approximately 85 countries. This pace is bound to quicken. For consumers, at a time of unparalleled smartphone and multiple connected devices growth, the appeal of LTE or as they perceive it, 4G is clear: data transfer speeds of at least 100Mbps downlink and 50Mbps uplink, low latency and generally improved end user experience of wireless broadband. For CSPs, it means an all-ip network model to replace the GPRS core network (see diagram on page 5) with the lower costs that implies greater integration with different access networks, and seamless transfer. These advantages will translate into 300 million users by 2015.

4 A WeDo Technologies White Paper 4 1. Changes For CSPs in particular, LTE will obviously mean major changes to the access network, to the evolved core network and to services, which will probably be based on IMS architecture. We have already mentioned all-ip networks. Other changes include: separation of the services and bearers; the introduction of IPv6; changes in the network core components; the migration of applications from the network core to the mobile device; the integration of services between different access technologies; changes in billing models; and changes in customer authentication. Voice, inevitably, will also be affected by the all-ip environment. Work towards a standard for voice over LTE (VoLTE) is under way. All of these changes will affect network operations in general and from a business risk perspective: revenue assurance, fraud and security control in particular. CSPs moving to LTE will need to embrace these changes and will no doubt benefit from them. But they will also face new challenges. For example there will be a shift from classic security, fraud and revenue assurance activity to a greater focus on IP security issues and abuse. Risk focus will move away from the core of the network to the extremities: devices, for example. There are two types of general risks faced by IP-based telco systems: the threats that come from the Internet itself, of course, but also telecoms-specific risks. Networks will also need to improve the control of different traffic types and test IP routing and control by performing even more penetration testing. Business assurance activities and monitoring systems deployed for fraud, credit control and revenue assurance will have to adapt to compliment, simpler fee structures for IP and services. RA systems will also have to collect log files containing IP security syslog format data alarms. Data feeds from S- GW log files will also contain useful information for fraud and abuse management. There will be an increased requirement to control customer spending and to regularly check a customer s ability to pay. These new and innovate services, or apps, will often reside on the terminal rather than the network. However, they will also need to accommodate variable billing for some value added services. Tools will also need to adapt; the introduction of new IP services affects data volumes, data collection nodes, data analysis and filtering of information and therefore the overall position will become more complex. We have already indicated that all-ip will mean flatter billing structures. But what in reality does this mean for fraud and revenue assurance exposure? Firstly that the cost to actually process a data event may be too high compared to the actual value of the event. At the same time events in the network nodes may not be correlated. These events will need to be built into billable records by some form of mediation system. In view of all these changes, the evolution process for risk professionals requires new strategies to be determined

5 A WeDo Technologies White Paper How will an RA or FM solution be impacted by LTE networks? System changes Taking into consideration the network architecture changes that LTE networks are bringing about, the data requirements to feed systems for both revenue assurance and fraud will certainly be affected. There will remain the basic requirement to collect and process certain information to feed fraud and revenue assurance systems with data, but some of the data will come from systems that generate log files instead of a classic event file system. Revenue assurance systems will need to handle non-correlated information to build this into a data record. This will demand a revenue assurance tool that can provide all the flexibility that an RA Analyst needs to keep autonomous, without requiring to pay an RA system vendor for every change in data set linking. This capability should be in the revenue assurance application and not in the front end data treatment. However, legacy access systems will certainly complicate matters from a revenue assurance perspective and we can expect both the Policy and Charging Rules Function (PCRF) and network mediation device to have a risk array of other information related to such areas as: sessions and their use quality parameters top-up and payment transaction for prepaid-type services authentication and access information dialogues from the HSS session actions like CF and CC commands roaming network location changes. Diagram 1: LTE and GPRS networks - a comparison between equivalent functionalities Image Glossary HLR - Home Location Register SGSN - Service GPRS Support Node GGSN - Gateway GPRS Support Node MME - Mobility Management Entity HSS - Home Subscriber Server SGW - Serving Gateway PGW - Public Gateway PCRF - Control & Routing Functions

6 A WeDo Technologies White Paper 6 Analytical tools and techniques Due to the volume of low financial value records and the increased volume of information generated in the networks, there will be a need to be selective in the records chosen for processing when identifying and detecting issues, revenue loss, fraud or security abuse. This selection process will be required as the cost and hardware size to process all events may exceed the effective cost of processing. Today s systems used for fraud management or revenue assurance are already larger than for some billing and customer care systems and this growth rate may not be economically sustainable. Therefore, systems will need to be able to take a sample of relevant and sufficiently sized data to be statistically meaningful. The sampling approach proposed must be able to detect issues, but be dynamically sized so that the optimum trade-off in data collected can be made dependent on the issues detected. In the case of fraud, detection of issues should be able to trigger a full detection and processing of relevant records from initial fraud indicators identified to ensure all relevant subscriber accounts can be covered. Due to the envisaged change in the needs of CSPs there will be an increased requirement to control customer spending and to continually check a customer s ability to pay as opposed to having incremental billing control. This will require a business assurance tool to include credit management controls based on ensuring initially (at the point of service) and on an on-going basis the ability to pay for the services. This capability will need to be developed in line with existing commercially available products. Identity management Identity management of the customers used in revenue assurance and fraud management systems will be required as there will be an ever-increasing number of access systems and services used by a single customer that will need to be linked in order to enable effective fraud and revenue management of a customer. While there may be a single master key used in one system, such as the MSISDN or IMSI (In GSM) the master key field will need to be linked in many access bearer and service platforms. While in a fully integrated network the HSS will act as both an HLR and AAA and manage all DIAMETER signalling related to authentication, it is unlikely that all authentication and subscriber details will be held by these individual platforms. Therefore, there will be a requirement for the ability in both revenue assurance and fraud systems to flexibly link identities used. This should be configurable by the customer in the system and not in data importation and management in the system. The change in interfaces between networks and the move to an all-ip interconnection where the home network is in control has other implications. There will be a number of CSPs to handle the interconnections and accounting between operators as well as the traffic. Certain established approaches to, say, roaming using clearing houses or TAP/NRTRDE records for example may become unnecessary.

7 A WeDo Technologies White Paper 7 2. Threats, risks and authentication All of the business assurance changes mentioned are to some extent driven by factors linked to greater bandwidth and fully IP networks. But device security management is also changing as manufacturers want to take control of both the device and subscriber authentication. The rise of the apps store means that a lot of services will now be driven by the terminal device application rather than core platforms icloud-based messaging from Apple is an example of this. The future dominance of all-ip networks and new more powerful access technologies means there will be considerably fewer network elements than we see in traditional 2G/3G networks. However, the number of technical connections and interfaces will increase. In short, previously closed communications networks are now more open to the risks associated with the Internet. The move from the established addressing scheme IPv4 to IPv6 may increase the level of risk. The arrival of OTT services like IPTV and VoIP certainly will. However, as CSPs migrate from 2G/3G networks to an all -IP network, some legacy vulnerabilities could be exploited by hackers or affect the operation of the network. of IP connection for the access points means that these are open and exposed to illegal connections or manipulation of traffic and setting back in the core network if there is not adequate security control and monitoring. In a similar way, the exploitation of items like home routers that form part of the 4G network may allow the user to manipulate the device to some extent for, say, man in the middle -type attacks. However, the most critical interfaces in an all-ip network are the interfaces between the differing traffic domains user access planes, signalling planes, control domain, operational domain, provisioning and so forth. A notable case will be offsite connections from the core network either connected to a session border controller (SBC) or signalling gateway (S(P)GW). Here there are issues on the supported secure signalling or media transfer and potential vulnerabilities in the higher level protocols in particular IPv4 and IPv6. Why? Essentially because they can directly access components in the CSPs core network as an entry point to the IP layer, which is visible to most users. It is also the easiest one to attack, due to the large number of readily available tools used for Internet hacking. The radio network will also be under threat. More of the control and monitoring of transmission will be part of the access point base station. This means access points are exposed to more risk than in 2G/ 3G. Also the provision

8 A WeDo Technologies White Paper 8 3. Risk management: the role of expert consultancy Network operational risk management must provide business process mapping and deliver clearly defined process vulnerability and downtime valuation, alongside risk mitigation options and prioritisation. To summarise, the areas of work affected by the changes associated with LTE and NGN services are in many ways considerable. The design of LTE, its all-ip nature and the services it carries imply a number of risk areas. There could also be a carry-over of risk from 2G and 3G networks, cable and fixed areas. Yes, a lot of today s technical security and risk reviews will not differ but the network technology components, configuration and settings definitely will. And working with all-ip (or legacy) networks will also carry risks depending on the player involved. In addition telecommunication signalling protocols and the dedicated telco signalling and media connection will be more open, not just to new players but also to attack. So if we could list the key risk areas derived from LTE access and evolved core networks, what should we consider? The list will not be a short one but a sample would include: Separation of bearers and services and the associated risk caused by the separation Interworking issues of authentication & cyphering protection New configuration of SIMs and interworking with Wi-Fi Configuration of the evolved core network, in particular the S-GW, MME and HSS, and (from a fraud, RA and billing perspective) the PCRF IP network architecture design and differing security domain requirements IP platform management and control Increasing need to define and use Minimum Baseline Security Standards (MBSS), but also to add in elements of business activity needs and security management Weaknesses in the applications or terminal devices both of the OS and applications Terminal device security and application with the key issues of identity management and control Policy, processes and procedure failures relating to the network and handling of the security parameters, security architecture and security policy Implementation issues with IPv6 and cross-working with IPv4 Changes to interconnect and how this will affect transfer of billing records and control of transactions The above envisaged risks means that CSPs must consider what strategy and defence mechanisms will be required from a risk management perspective. For many they will not have the required skill sets in house to assess the levels of LTE risk technical, process and organisational. Therefore, the risk management knowledge and expertise may well need to initially come from external consultancy who have the breadth of skills and expertise to guide and mentor the CSP via performing technical risk assessments, product and service evaluations and risk management training encompassing security, fraud and revenue assurance.

9 A WeDo Technologies White Paper 9 4. About WeDo Technologies and RAID As value shifts from minutes of usage to volumes of data, CSPs need to review the way they address the market with target offers, meet customer expectations and, at the same time, adapt to new charging models capable of monetising these services and increasing their revenues. Billing and rating features capable of processing vast amounts of data related to various transaction types and in various (rule-based) pricing models are mandatory for CSPs that want to capitalise new forms of connectivity. As an innovator in the area of business risk - revenue assurance and fraud management for the telecom market, WeDo Technologies is defining the future of risk management tools for the global telecom market. RAID: Business Assurance software is now a market-leading solution due to its pioneering approach during the release and implementation of risk management controls to GSM, CDMA, 3G CDMA and 3.5G HSDPA, among other network technologies and is now leading the way in 4G and beyond. Using the fundamentals of R&D, at WeDo Technologies we search for ideas and turn them into innovative products and solutions, with the ultimate goal of creating RAID enhancements and new solutions that benefit our internationally based customers. Beginning in 2011, one of the core projects that was led by our vision of business assurance was a patent technology that enables CSPs to manage risk, fraud, security, content control and legal interception. Called Communication System with Distributed Risk Management Solution (DRMS), this solution aims to change the way risk management can be undertaken in networks as risk control begins to migrate to the terminal device with the changing nature of the industry. The WeDo Technologies Worldwide User Group (WUG) further underlines the principle of cooperative-innovation by bringing customers, researchers, developers, and further stakeholders together to show, discuss and demonstrate technological innovation together with the CSPs that rely on WeDo Technologies. RAID is a unique revenue assurance and fraud management solution to tackle CSPs revenue, margin and P&L challenges. Whether we talk about traditional fixed line, mobile, CATV, virtual networks or carriers carriers operators, or the LTE, the RAID: Business Assurance Solution is continually being designed to assist CSPs in assuring customer provisioning, data management, service usage control, account balance validation, billing validation and fraud management, - with RAID already protecting revenues that come from more than 800 million subscribers and growing. Business consulting Besides delivering business assurance software, WeDo Technologies also delivers industry leading risk management consulting services under the Praesidium brand. Praesidium is a global business assurance consultancy. It is an autonomous company focused on managing risk and improving operational performance. Praesidium's consultancy portfolio covers revenue assurance, fraud management, network security, business continuity, margin assurance and operations assurance.

10 A WeDo Technologies White Paper 10 About Præsidium About WeDo Technologies Præsidium is a Global Business Assurance consultancy. Founded in 1997, the company has successfully provided risk management consultancy to more than 100 Communication Service Providers in over 80 countries on 6 continents. Præsidium has gained solid recognition in the market amongst its substantial customer base and among global standards agencies. These include the GSMA Security Group & Fraud Forum, the Telemanagement Forum and ETSI. Offices: United Kingdom Davidson House, Forbury Square, Reading, RG1 3EU, Tel: Fax: Portugal Edifício Picoas Plaza Rua do Viriato, 13E núcleo 6-4º andar Lisbon Tel: Fax: Brazil Torre Rio Sul, Rua Lauro Muller 116; 27º Andar Sala 2701 CEP: Botafogo Rio de Janeiro Tel: Fax: Spain Edifício Cuzco IV Paseo de la Castellana, 141 8ª planta Madrid Tel: Fax: Ireland Maple House,Temple Road, Blackrock, Co. Dublin Tel: (0) Fax: (0) WeDo Technologies is the number one preferred supplier for revenue andbusiness assurance software and services. Present in 15 countries on 5 continents, with more than 100 innovative bluechip customers in 80 countries, the company has a solid and envious project management track record of being on-time and within budget while achieving superior customer satisfaction. Business Assurance RAID, WeDo Technologies flagship software suite covering Revenue Assurance, Fraud Management and Business Processes Control has been implemented in a number of different industries where it has delivered significant business results and powerful return on investment. WeDo Technologies pioneered the telecom revenue assurance space in 2002 and is now breaking new ground in the enlarged business assurance arena in Telecom, while also servicing the Retail, Energy and Finance industries. Offices: Portugal _ Lisbon Portugal _ Braga Australia _ Sydney Brazil _ Rio Janeiro Brazil _ Florianopolis Chile _ Santiago Egypt _ Cairo France _ Paris Ireland _ Dublin Malaysia _ Kuala Lumpur Mexico _ Mexico City Panama _ Panama City Poland _ Poznan Poland _ Warsaw On the Web General Information info@praesidium.com Singapore _ Singapore Spain _ Madrid Spain _ Barcelona UK _ Reading USA _ Chicago

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales Mavenir Keynote Think Smarter Secure communication Innovate Services By Mohamed Issa Regional Head of Africa Sales The New Mavenir: Combining Market Leaders Combing three industry-leading companies to

More information

David Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited.

David Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited. David Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited www.i3forum.org GSM Association Fraud Forum Presentation to i3 Forum David Morrow, Vodafone Document Number Meeting Date

More information

Advances in Regulatory Pricing and Costing in the Digital Economy: VoLTE Interconnection Issues

Advances in Regulatory Pricing and Costing in the Digital Economy: VoLTE Interconnection Issues Advances in Regulatory Pricing and Costing in the Digital Economy: VoLTE Interconnection Issues Advances in Regulatory Pricing and Costing in the Digital Economy: VoLTE Interconnection Issues Victoria

More information

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November

Orange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell

More information

CDG Technology Forum Inter-Technology Networking

CDG Technology Forum Inter-Technology Networking CDG Technology Forum Inter-Technology Networking The Impact of 4G on the Packet Core Network April 30, 2008 Gennady Sirota Vice President, Product Management Safe Harbor Statement This presentation contains

More information

Business Case for the Cisco ASR 5500 Mobile Multimedia Core Solution

Business Case for the Cisco ASR 5500 Mobile Multimedia Core Solution Business Case for the Cisco ASR 5500 Mobile Multimedia Core Solution Executive Summary The scale, use and technologies of mobile broadband networks are changing rapidly. Mobile broadband growth continues

More information

Taking Over Telecom Networks

Taking Over Telecom Networks Taking Over Telecom Networks Hardik Mehta (@hardw00t) Loay Abdelrazek (@sigploit) Taking Over Telecom Networks - Hardik Mehta (@hardw00t) and Loay Abdelrazek (@sigploit) 1 Press Release: some highlights

More information

Diameter, Meet Your Future

Diameter, Meet Your Future , Meet Your Future The Dialogic Helix The Helix (HSC) raises the bar for functionality by combining unparalleled multiprotocol Interworking Functionality (IWF) and high-availability Edge Agent (DEA) and

More information

vepc-based Wireless Broadband Access

vepc-based Wireless Broadband Access With 70 years of experience, Iskratel is the leading European provider of infocommunications solutions and has, its own R&D and manufacturing centres, 900 employees and a local presence in more than 30

More information

Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience

Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience Steve Northridge Email: Steve.Northridge@Oracle.com Twitter: @stevenorthridge 3 Photo Source: Boston Public Library

More information

Integrating Communications Compliance into the Next Generation 4G LTE Network

Integrating Communications Compliance into the Next Generation 4G LTE Network SS8 : WHITEPAPER : INTEGRATING CC INTO THE NEXT GENERATION 4G LTE NETWORK Integrating Communications Compliance into the Next Generation 4G LTE Network All telecommunication providers that currently or

More information

Alcatel-Lucent 1357 ULIS

Alcatel-Lucent 1357 ULIS Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement

More information

A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS

A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Vilnius, October 2005 Page

More information

OTT Services Balancing Innovation, Investment and Competition

OTT Services Balancing Innovation, Investment and Competition OTT Services Balancing Innovation, Investment and Competition Executive Summary CANTO has, in this document, provided a context for understanding the current development where some Caribbean network operators

More information

Mobile School Training International Mobile Communication

Mobile School Training International Mobile Communication Mobile School Training International Mobile Communication INTRODUCTION For over 10 years Rabion Consultancy has been providing Mobile School training. In the past the training was offered as in-house training

More information

The Voice over Mobile Broadband (VoMBB) Market:

The Voice over Mobile Broadband (VoMBB) Market: Brochure More information from http://www.researchandmarkets.com/reports/2155773/ The Voice over Mobile Broadband (VoMBB) Market: 2012 - Description: A relatively new term, Voice over Mobile Broadband

More information

VoLTE: The Next Generation of Voice

VoLTE: The Next Generation of Voice VoLTE: The Next Generation of Voice Introduction Voice over LTE (VoLTE) is no longer just a buzz word in the telecom community but is quickly becoming reality, with implementations appearing around the

More information

4G LTE Technologies: System Concepts

4G LTE Technologies: System Concepts 4G LTE Technologies: System Concepts CK Toh, PhD, Chief Technology Advisor, ALICO Systems Inc., Torrance, CA, US ABSTRACT Recently, we have witnessed the roll out of LTE (Long Term Evolution, or so called

More information

Naresh Soni CTO, InterDigital

Naresh Soni CTO, InterDigital March 5, 2012 WTC 2012 Challenges and Innovations in LTE Deployment Naresh Soni CTO, InterDigital Agenda InterDigital Overview Key Trends Key Challenges in LTE Innovative Solutions for LTE Deployment Summary

More information

Pay-TV and OTT video services in Western Europe: forecasts and analysis

Pay-TV and OTT video services in Western Europe: forecasts and analysis Research Report Pay-TV and OTT video services in Western Europe: forecasts and analysis 2013 2018 August 2013 Cesar Bachelet 2 Contents Slide no. 7. Executive summary 8. Executive summary: We expect 3%

More information

MKG International Telecom Traffic Management & Roaming for Today

MKG International Telecom Traffic Management & Roaming for Today MKG-125 - International Telecom Traffic Management & Roaming for Today Description With increasing pressure on operator revenues, international traffic and roaming can be a significant source of revenue

More information

Interconnection and Roaming

Interconnection and Roaming Interconnection and Roaming Operator Business Slide 1 Importance of Interconnection Operator s perspective Connectivity =>Network effect => Customer satisfaction =>Revenue Slide 2 Types of interconnections

More information

Extensive Training on International Roaming

Extensive Training on International Roaming www.roamconsult.com INTRODUCTION RoamConsult has put together new and extensive training programs on International Roaming, which takes employees that need to learn the roaming business through the complete

More information

Connected & Smart Home Research Package

Connected & Smart Home Research Package TECHNOLOGY, MEDIA & TELECOMMUNICATION KEY COMPONENTS Intelligence Services Real-time access to continually updated market data and forecasts, analyst insights, topical research reports and analyst presentations.

More information

Leverage SDN Principles in LTE to Meet Future Network Demands

Leverage SDN Principles in LTE to Meet Future Network Demands Leverage SDN Principles in LTE to Meet Future Network Demands PLATFORM FOR PROFITABLE GROWTH The Role of SDN in LTE Networks SDN refers to specific technologies considered promising for mobile network

More information

Analysys Mason Research Key Themes for 2013

Analysys Mason Research Key Themes for 2013 Presentation Analysys Mason Research Key Themes for 213 25 October 212 Alexandra Rehak 2 Analysys Mason s research programmes cover key telecoms services and technologies globally Research practices Research

More information

Delivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一

Delivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一 Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS 2. Third Party Voice over IP 3. The IP Multimedia Subsystem 4. Circuit Switched Fallback 5. VoLGA LTE was designed as a data

More information

AAA Authentication: New Use Cases

AAA Authentication: New Use Cases AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf

More information

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum Roaming Service in Sudan improvement & Challenges Zain, MTN & Sudani Content - Telecom

More information

What is NGN? Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011

What is NGN? Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 What is NGN? Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Outlines Next Generation Network (NGN) Definition Applications Requirements Network Architecture QoS Issues 2 What

More information

IP multimedia in 3G. Structure. Author: MartinHarris Orange. Understanding IP multimedia in 3G. Developments in 3GPP. IP multimedia services

IP multimedia in 3G. Structure. Author: MartinHarris Orange. Understanding IP multimedia in 3G. Developments in 3GPP. IP multimedia services IP multimedia in 3G Author: MartinHarris Orange slide 1 Structure Understanding IP multimedia in 3G Developments in 3GPP IP multimedia services IMS challenges and open issues IP multimedia roadmap slide

More information

End-to-End QoS in Mobile Networks

End-to-End QoS in Mobile Networks End-to-End QoS in Mobile Networks an holistic engineering view IEEE ComSoc / IST Paulino Corrêa António Carlos Fernandes 8 th January 2013 Definition ( ) In the field of computer networking and other packet-switched

More information

Voice over Long Term Evolution Migration Strategies

Voice over Long Term Evolution Migration Strategies White Paper Voice over Long Term Evolution Migration Strategies What You Will Learn The evolution of mobile networks to the Voice over Long Term Evolution (VoLTE) all-ip technology standard has generated

More information

Competing with OTT Services: RCS e without IMS. November 15, 2011

Competing with OTT Services: RCS e without IMS. November 15, 2011 Competing with OTT Services: RCS e without IMS November 15, 2011 An Introduction to Interop All Gen Short Message Service Center (SMSC) 4 Series Message Personalization & Control (MPAC) Multimedia Message

More information

E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G. W U G M a l a y s i a

E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G. W U G M a l a y s i a E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G W U G M a l a y s i a 2 0 1 7 CONTACTS NUNO PESTANA FRAUD PROFESSIONAL SERVICES MANAGER +351 939 651 481 nuno.pestana@wedotechnol

More information

OUTLINE. I Overview: the Challenge of NGNs for regulation. Outline

OUTLINE. I Overview: the Challenge of NGNs for regulation. Outline Next Generation Networks and the EU regulatory framework for electronic communications: Applicability of the existing framework and new regulatory issues Alison Birkett European Commission ITU Seminar

More information

Build VoLTE Services using NFV & Cloud Reduce complexity and increase RoI

Build VoLTE Services using NFV & Cloud Reduce complexity and increase RoI Build VoLTE Services using NFV & Cloud Reduce complexity and increase RoI Vivek Bhargava Director, Product Marketing Oracle Communications Oracle In Communications R&D, product strategy, sales and services

More information

LTE TECHNOLOGY. Format: Online Academy. Duration: 7 Modules

LTE TECHNOLOGY. Format: Online Academy. Duration: 7 Modules LTE TECHNOLOGY Format: Online Academy Duration: 7 Modules LTE TECHNOLOGY COURSE OVERVIEW The delegate attending this course will gain a comprehensive appreciation of the architecture and operation of the

More information

ITU Workshop. NGN Regulation and Migration Strategies (13-15 th October, 2010)

ITU Workshop. NGN Regulation and Migration Strategies (13-15 th October, 2010) ITU Workshop NGN Regulation and Migration Strategies (13-15 th October, 2010) Lav Gupta, Principal Advisor, Telecom Regulatory Authority of India, New Delhi Phone :+91-11-23216930, Fax: +91-11-23235270

More information

NGN: The Evolution of Wireless Networks

NGN: The Evolution of Wireless Networks NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.

More information

For personal use only

For personal use only 1 (Thank you Terry) I d like to extend a warm welcome to our shareholders and thank you for coming along today. 2 As Terry mentioned, last year was a productive year for NetComm. Today I would like to

More information

THREATS TO PACKET CORE SECURITY OF 4G NETWORK

THREATS TO PACKET CORE SECURITY OF 4G NETWORK 07 CONTENTS Terms and abbreviations... : main components and protocols...4 Attack scenarios...5 What is necessary for a successful attack...5 Threats to EPC security...7. Fraud...7. Connection hijacking...8.

More information

Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Presented by Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering

More information

Titolo della presentazione 1

Titolo della presentazione 1 GLOBAL FORUM 2003 Introducing stance Rome, November 6th, 2003 2 Why TI Sparkle: to strengthen TI s international position by leveraging on foreign assets and capabilities Introducing Understanding the

More information

Product Brochure Traffix Signaling Delivery Controller (SDC)

Product Brochure Traffix Signaling Delivery Controller (SDC) Product Brochure Traffix Signaling Delivery Controller (SDC) The 4G & Diameter Experts Diameter Signaling Control: The Next Frontier in Network Architecture The mass market penetration of smart phones

More information

Real-time Communications Security and SDN

Real-time Communications Security and SDN Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,

More information

The 5G consumer business case. An economic study of enhanced mobile broadband

The 5G consumer business case. An economic study of enhanced mobile broadband The 5G consumer business case An economic study of enhanced mobile broadband Enhancing today s services for tomorrow 5G has the potential to drive new revenue streams. Much focus has been on the innovative

More information

Why IIJ Seeks to Become a Full MVNO

Why IIJ Seeks to Become a Full MVNO 2. Focused Research (1) Why IIJ Seeks to Become a Full MVNO 2.1 MVNO Business Models In 2018, IIJ finally begins full MVNO services, the biggest challenge we have had since launching our MVNO business

More information

TELECOMS TRAINING SCHEDULE

TELECOMS TRAINING SCHEDULE January December 017 TELECOMS TRAINING SCHEDULE School of Management School of Advanced Communications Technology Contact Us www.telecomsacademy.com + (0)0 7017 1 training@telecomsacademy.com DISTANCE

More information

RAID Roaming. Datasheet. RAID Roaming Datasheet 1

RAID Roaming. Datasheet. RAID Roaming Datasheet 1 RAID Roaming Datasheet RAID Roaming Datasheet 1 2 RAID Roaming Datasheet About RAID Roaming RAID Roaming is a single Central Roaming Management Solution, enabling mobile operators to manage the entire

More information

THE ECONOMIC VALUE OF WI-FI: A GLOBAL VIEW

THE ECONOMIC VALUE OF WI-FI: A GLOBAL VIEW THE ECONOMIC VALUE OF WI-FI: A GLOBAL VIEW A study commissioned by Wi-Fi Alliance Raul L. Katz Telecom Advisory Services, LLC Berlin, Germany November 7, 218 Y IS IT IMPORTANT TO ASSESS THE ECONOMIC VALUE

More information

Gary Bhomer. Director, Telstra Wholesale

Gary Bhomer. Director, Telstra Wholesale Gary Bhomer Director, Telstra Wholesale 1 What services are in demand? What are customers looking for now? 2 How can an operator innovate quickly? Leveraging the strengths of the leading MNO in Australia

More information

Services in the IMS ecosystem

Services in the IMS ecosystem 285 23-3109 Uen Rev A Services in the IMS ecosystem February 2007 White Paper Different services have different demands and require different approaches Contents 1 Executive summary. 3 2 Introduction..

More information

Oracle Communications Diameter Signaling Router

Oracle Communications Diameter Signaling Router Oracle Communications Diameter Signaling Router Centralizing Diameter routing with cloud deployable Oracle Communications Diameter Signaling Router creates a secure signaling architecture that reduces

More information

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,

More information

BT Compute. BT Private Compute. Dedicated cloud infrastructure hosting your IT. BT Compute

BT Compute. BT Private Compute. Dedicated cloud infrastructure hosting your IT. BT Compute BT Compute BT Private Compute Dedicated cloud infrastructure hosting your IT BT Compute IT needs to help organisations be more agile, flexible and efficient, whilst reducing complexity and cost. However,

More information

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status 1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA technology and deployment status The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were

More information

A Perspective on Multi-Access Edge Computing. Frank Rayal. January San Francisco Singapore Dubai Paris

A Perspective on Multi-Access Edge Computing. Frank Rayal. January San Francisco Singapore Dubai Paris A Perspective on Multi-Access Edge Computing Frank Rayal January 2017 San Francisco Singapore Dubai Paris Page 2 Overview The convergence of the Internet and telecommunication networks is igniting a debate

More information

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA 1 SECURING DIGITAL IDENTITY THE KEY TO ASIA S VAST POTENTIAL IN E-COMMERCE We are living through an exciting time for digital commerce in Asia.

More information

TELECOMS TRAINING SCHEDULE

TELECOMS TRAINING SCHEDULE January December 017 TELECOMS TRAINING SCHEDULE School of Telecoms Management School of Advanced Communications Technology Contact Us www.telecomsacademy.com + (0)0 7017 1 training@telecomsacademy.com

More information

GPRS billing: getting ready for UMTS

GPRS billing: getting ready for UMTS GPRS billing: getting ready for UMTS In his first article about UMTS, Lucas Baugé looks into the key challenges of GPRS billing. He seeks to show how solving these challenges will help operators succeed

More information

Huawei Technologies

Huawei Technologies Huawei Technologies 2005.10 8 VOICE FROM OPERATORS T-Mobile Czech: convergence, aggregation and evolution Technology Director of T-Mobile Czech Republic, Frank Meywerk, met with WinWin and explained the

More information

Operator strategies to address the OTT threat

Operator strategies to address the OTT threat Operator strategies to counter the OTT threat MENA Summit 2013: Enabling innovation, driving profitability Operator strategies to address the OTT threat 6 November 2013 Stephen Sale EVENT PARTNERS: Operator

More information

Nokia AirGile cloud-native core: shaping networks to every demand

Nokia AirGile cloud-native core: shaping networks to every demand Nokia AirGile cloud-native core: shaping networks to every demand The future of core networks? Today s networks focus on delivering voice and broadband services to people. Yet the rise of the Internet

More information

Kapsch CarrierCom. Challenging limits

Kapsch CarrierCom. Challenging limits Kapsch CarrierCom Challenging limits The Kapsch Group Challenging Limits globally Four independently operating key entities: Kapsch TrafficCom Kapsch CarrierCom Kapsch BusinessCom Kapsch PublicTransportCom

More information

INDUSTRY GROUP. GSM-R Core Evolution. Jean-Michel Evanghelou Head of Railways Solutions Kapsch CarrierCom. 1

INDUSTRY GROUP. GSM-R Core Evolution. Jean-Michel Evanghelou Head of Railways Solutions Kapsch CarrierCom.  1 GSM-R Core Evolution Jean-Michel Evanghelou Head of Railways Solutions Kapsch CarrierCom 1 Strategy Trend : Evolve GSM-R from TDM to IP Fully Secured Networks R99 to R4 evolution : Packetization of Voice

More information

Pioneer Communications Internet Services Disclosure

Pioneer Communications Internet Services Disclosure Pioneer Communications Internet Services Disclosure Pioneer Communications ( Pioneer ) is the leading Internet service provider for Southwest Kansas communities with a reputation for excellence that goes

More information

Building a Profitable Data Future. Monetizing Data Traffic

Building a Profitable Data Future. Monetizing Data Traffic Building a Profitable Data Future Monetizing Data Traffic Market Introduction Driven by an upsurge in smartphone usage, increased mobile-broadband penetration and enormous growth in video consumption,

More information

MOBILE NETWORK SECURITY

MOBILE NETWORK SECURITY COURSE DESCRIPTION MOBILE NETWORK SECURITY Format: Classroom Duration: 2 Day COURSE SUMMARY HIGHLIGHTS Focused at telecoms professionals that need to assess threats and preparedness of mobile networks

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

The Reality of Delivering 4G <-> 3G Roaming

The Reality of Delivering 4G <-> 3G Roaming As the growth of 4G LTE networks gathers pace many operators are hitting unforeseen challenges as they look to interconnect with legacy networks and ensure their subscribers aren t left hanging when they

More information

LTE : The Future of Mobile Broadband Technology

LTE : The Future of Mobile Broadband Technology LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms

More information

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers 1 BRIDGE TO GLOBAL MARKET FOR MVNOs Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers How to compete with big MNOs on equal terms 2 Your

More information

AdaptiveMobile Security Practice

AdaptiveMobile Security Practice AdaptiveMobile Security Practice Overview & Case Study AdaptiveMobile s Security Practice provide a suite of managed security services undertaking analysis of potential threats in networks and delivering

More information

Embedded SIM Study. September 2015 update

Embedded SIM Study. September 2015 update Embedded SIM Study September 2015 update Executive summary Following a first white paper drawing upon interviews with mobile network operators in 3Q 2014, EY decided to perform a second round of interviews

More information

Fixed Mobile Convergence

Fixed Mobile Convergence Cisco Expo 2006 Fixed Mobile Convergence Business Track Bo Finnemann Cisco DK 2006 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda, Fixed Mobile Convergence Market Perspective What

More information

Delivery of Voice and Text Messages over LTE

Delivery of Voice and Text Messages over LTE Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS 2. Third Party Voice over IP 3. The IP Multimedia Subsystem 4. Circuit Switched Fallback 5. VoLGA Two main approaches to the

More information

Carrier Solution. Carrier Solution. Carrier-class Wi Fi. Highly scalable mobile operator Wi Fi solution

Carrier Solution. Carrier Solution. Carrier-class Wi Fi. Highly scalable mobile operator Wi Fi solution Carrier Solution Carrier Solution Carrier-class Wi Fi Highly scalable mobile operator Wi Fi solution SKSpruce provides a carrier Wi-Fi solution to complement LTE buildout in dense urban environments End-to-end

More information

Real-Time Communications Witout Boundaries. Ribbon Policy Solutions

Real-Time Communications Witout Boundaries. Ribbon Policy Solutions Real-Time Communications Witout Boundaries Ribbon Policy Solutions As SIP session traffic continues to grow a trend accelerated by the rapid adoption of multimedia devices like smartphones and tablets

More information

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast SD-WAN Enabling the Enterprise to Overcome Barriers to Digital Transformation An IDC InfoBrief Sponsored by Comcast SD-WAN Is Emerging as an Important Driver of Business Results The increasing need for

More information

POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ)

POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) POSTAL AND TELECOMMUNICATIONS PERFORMANCE REPORT SECTOR THIRD QUARTER Disclaimer: This report has been prepared based on data provided

More information

Mobile Broadband Evolution. Securing the future of Mobile Broadband for the GSM community LTE White Paper

Mobile Broadband Evolution. Securing the future of Mobile Broadband for the GSM community LTE White Paper LTE White Paper Background The GSM family of technologies including GSM, GPRS, EDGE and UMTS/HSPA accounts for more than 3.6M subscriptions, translating to a global market share in excess of 85%. Founded

More information

IMS Adoption Fueled by the Open IMS Core Project and MySQL

IMS Adoption Fueled by the Open IMS Core Project and MySQL IMS Adoption Fueled by the Open IMS Core Project and MySQL Overview The project was launched in 2006 to promote IMS (IP Multimedia Subsystem) technology adoption in next-generation telecommunications networks,

More information

The Alcatel-Lucent Ultimate Wireless Packet Core

The Alcatel-Lucent Ultimate Wireless Packet Core T E C H N O L O G Y W H I T E P A P E R The Alcatel-Lucent Ultimate Wireless Packet Core A converged packet core that supports the bandwidth and capacity crunch of today and the network evolution of tomorrow

More information

Extensible standards and impact on technology switching costs. Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013

Extensible standards and impact on technology switching costs. Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013 Extensible standards and impact on technology switching costs Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013 Agenda Why standardize? Impact of standardization on adoption

More information

Innovation Technology for Future Convergence Network

Innovation Technology for Future Convergence Network KRnet 2013 Keynote Speech Innovation Technology for Future Convergence Network Jinsung Choi, Ph.D. EVP, Head of ICT R&D Division, SK Telecom Contents I. Key Trends Driving Network Evolution II. Innovation

More information

IPv6 deployment scenarios in mobile networks Jouni Korhonen Netnod Spring Meeting 9-11 March, 2011 Stockholm, Sweden

IPv6 deployment scenarios in mobile networks Jouni Korhonen Netnod Spring Meeting 9-11 March, 2011 Stockholm, Sweden IPv6 deployment scenarios in mobile networks Jouni Korhonen Netnod Spring Meeting 9-11 March, 2011 Stockholm, Sweden 1 Nokia Siemens Networks Foreword This presentation concentrates in most parts to 3GPP

More information

to pay for it) has been waning. The Internet further changed the game.

to pay for it) has been waning. The Internet further changed the game. As the old telephone business models break down and new service paradigm takes over, communication companies must combine voice with the new services of the network. The SCI-Platform (Service Convergence

More information

OTT MVNO. Traditional MVNO Deployments 2 OTT MVNO 4. Comparison of MVNO options 7. Case study: OTT MVNO in the US 7. Conclusion 10

OTT MVNO. Traditional MVNO Deployments 2 OTT MVNO 4. Comparison of MVNO options 7. Case study: OTT MVNO in the US 7. Conclusion 10 OTT MVNO OTT MVNO simpler to launch, requires less investment and meets 100% of customer needs Traditionally, MVNOs were forced to choose between two business models: full and thin. We review both and

More information

Distributed Network Architecture

Distributed Network Architecture 4Motion Distributed Network Architecture Alvarion s Fractalized ASN Approach: A Practical Implementation of Distributed Network Architecture White Paper Abstract One of the key questions operators must

More information

VOLTE and the IP/MPLS Cell Site Evolution

VOLTE and the IP/MPLS Cell Site Evolution AVIAT NETWORKS VOLTE and the IP/MPLS Cell Site Evolution By Eduardo J. Sánchez, Aviat Networks Technical Marketing TABLE OF CONTENTS INTRODUCTION...3 PROBLEM: DEPLOYING VOLTE FOR RELIABLE VOICE AND VIDEO...3

More information

Transform your network and your customer experience. Introducing SD-WAN Concierge

Transform your network and your customer experience. Introducing SD-WAN Concierge Transform your network and your customer experience Introducing SD-WAN Concierge Optimize your application performance, lower your total cost of ownership and simplify your network management. 2X Bandwith

More information

High-Touch Delivery Learning Services

High-Touch Delivery Learning Services Data Sheet High-Touch Delivery Learning Services Implementing Cisco Service Provider Mobility LTE Networks The Implementing Cisco LTE Packet Core Networks (SPLTE) Version 1.0 is an instructor-led course

More information

E vo lu t io n T ech n o lo g y:

E vo lu t io n T ech n o lo g y: Background Long Term Evolution (LTE) is a 4G wireless broadband technology developed by the Third Generation Partnership Project (3GPP), an industry trade group. 3GPP named the technology Long Term Evolution

More information

A Leading Internet Business Enabler

A Leading Internet Business Enabler A Leading Internet Business Enabler How do I manage the network resources effectively and maximize my returns? My guests are bringing too many devices into my network. How do I manage them? I allow my

More information

Addressing Current and Future Wireless Demand

Addressing Current and Future Wireless Demand Addressing Current and Future Wireless Demand Dave Wolter Executive Director Radio Technology AT&T Architecture and Planning Rising Demand and The Need to Innovate in the Network 6,732% growth over 13

More information

The Truth About IoT / M2M Cellular Roaming

The Truth About IoT / M2M Cellular Roaming The Truth About IoT / M2M Cellular Roaming Aeris White Paper www.aeris.com THE TRUTH ABOUT M2M / IOT CELLULAR ROAMING COPYRIGHT 2016, AERIS COMMUNICATIONS, INC. i Let our experts lead the way Table of

More information

THE ULTIMATE RETAILER'S GUIDE TO SD-WAN PART ONE: EXPLAINED

THE ULTIMATE RETAILER'S GUIDE TO SD-WAN PART ONE: EXPLAINED THE ULTIMATE RETAILER'S GUIDE TO SD-WAN PART ONE: SD-WAN EXPLAINED SD-WAN DE-MYSTIFIED IDC predicts that the SD-WAN market will be worth $2.1bn in Europe by 2021*. That s a staggering 92% growth year on

More information

07/08/2016. Sami TABBANE. I. Introduction II. Evolved Packet Core III. Core network Dimensioning IV. Summary

07/08/2016. Sami TABBANE. I. Introduction II. Evolved Packet Core III. Core network Dimensioning IV. Summary Core network and transmission dimensioning Sami TABBANE 1 CONTENTS I. Introduction II. Evolved Packet Core III. Core network Dimensioning IV. Summary 2 1 CONTENTS I. Introduction 3 Introduction LTE Commercialization

More information

Impact of the LTE Migration for MVNOs

Impact of the LTE Migration for MVNOs Impact of the LTE Migration for MVNOs A Whitepaper Converting Diameter to SS7 protocols (CAMEL/SOAP/RADIUS/WIN/GSM MAP) and other proprietary protocols October 2012 By Dan Wonak Director of Marketing Abstract:

More information