The unstoppable LTE and its impact on CSPs operations
|
|
- Neil Lambert
- 6 years ago
- Views:
Transcription
1 The unstoppable LTE and its impact on CSPs operations A WeDo Technologies White Paper MARCH 2012
2 A WeDo Technologies White Paper 2 Table of contents Introduction 3 1. Changes 4 2. Threats, risks and authentication 7 3. Risk management: the role of expert consultancy 8 4. About WeDo Technologies and RAID 9
3 A WeDo Technologies White Paper 3 Introduction How will Long Term Evolution (LTE) change mobile networks? What will be the data security impact of LTE deployments? And what changes will LTE bring to revenue assurance, fraud and security control? These questions have no simple answer. However, there is a simple reason why responses are urgently needed. LTE is the fastest developing mobile system technology ever. LTE had its first commercial launch in August 2011 and by January 2012 there were nearly 300 communication service providers (CSPs) investing in LTE across approximately 85 countries. This pace is bound to quicken. For consumers, at a time of unparalleled smartphone and multiple connected devices growth, the appeal of LTE or as they perceive it, 4G is clear: data transfer speeds of at least 100Mbps downlink and 50Mbps uplink, low latency and generally improved end user experience of wireless broadband. For CSPs, it means an all-ip network model to replace the GPRS core network (see diagram on page 5) with the lower costs that implies greater integration with different access networks, and seamless transfer. These advantages will translate into 300 million users by 2015.
4 A WeDo Technologies White Paper 4 1. Changes For CSPs in particular, LTE will obviously mean major changes to the access network, to the evolved core network and to services, which will probably be based on IMS architecture. We have already mentioned all-ip networks. Other changes include: separation of the services and bearers; the introduction of IPv6; changes in the network core components; the migration of applications from the network core to the mobile device; the integration of services between different access technologies; changes in billing models; and changes in customer authentication. Voice, inevitably, will also be affected by the all-ip environment. Work towards a standard for voice over LTE (VoLTE) is under way. All of these changes will affect network operations in general and from a business risk perspective: revenue assurance, fraud and security control in particular. CSPs moving to LTE will need to embrace these changes and will no doubt benefit from them. But they will also face new challenges. For example there will be a shift from classic security, fraud and revenue assurance activity to a greater focus on IP security issues and abuse. Risk focus will move away from the core of the network to the extremities: devices, for example. There are two types of general risks faced by IP-based telco systems: the threats that come from the Internet itself, of course, but also telecoms-specific risks. Networks will also need to improve the control of different traffic types and test IP routing and control by performing even more penetration testing. Business assurance activities and monitoring systems deployed for fraud, credit control and revenue assurance will have to adapt to compliment, simpler fee structures for IP and services. RA systems will also have to collect log files containing IP security syslog format data alarms. Data feeds from S- GW log files will also contain useful information for fraud and abuse management. There will be an increased requirement to control customer spending and to regularly check a customer s ability to pay. These new and innovate services, or apps, will often reside on the terminal rather than the network. However, they will also need to accommodate variable billing for some value added services. Tools will also need to adapt; the introduction of new IP services affects data volumes, data collection nodes, data analysis and filtering of information and therefore the overall position will become more complex. We have already indicated that all-ip will mean flatter billing structures. But what in reality does this mean for fraud and revenue assurance exposure? Firstly that the cost to actually process a data event may be too high compared to the actual value of the event. At the same time events in the network nodes may not be correlated. These events will need to be built into billable records by some form of mediation system. In view of all these changes, the evolution process for risk professionals requires new strategies to be determined
5 A WeDo Technologies White Paper How will an RA or FM solution be impacted by LTE networks? System changes Taking into consideration the network architecture changes that LTE networks are bringing about, the data requirements to feed systems for both revenue assurance and fraud will certainly be affected. There will remain the basic requirement to collect and process certain information to feed fraud and revenue assurance systems with data, but some of the data will come from systems that generate log files instead of a classic event file system. Revenue assurance systems will need to handle non-correlated information to build this into a data record. This will demand a revenue assurance tool that can provide all the flexibility that an RA Analyst needs to keep autonomous, without requiring to pay an RA system vendor for every change in data set linking. This capability should be in the revenue assurance application and not in the front end data treatment. However, legacy access systems will certainly complicate matters from a revenue assurance perspective and we can expect both the Policy and Charging Rules Function (PCRF) and network mediation device to have a risk array of other information related to such areas as: sessions and their use quality parameters top-up and payment transaction for prepaid-type services authentication and access information dialogues from the HSS session actions like CF and CC commands roaming network location changes. Diagram 1: LTE and GPRS networks - a comparison between equivalent functionalities Image Glossary HLR - Home Location Register SGSN - Service GPRS Support Node GGSN - Gateway GPRS Support Node MME - Mobility Management Entity HSS - Home Subscriber Server SGW - Serving Gateway PGW - Public Gateway PCRF - Control & Routing Functions
6 A WeDo Technologies White Paper 6 Analytical tools and techniques Due to the volume of low financial value records and the increased volume of information generated in the networks, there will be a need to be selective in the records chosen for processing when identifying and detecting issues, revenue loss, fraud or security abuse. This selection process will be required as the cost and hardware size to process all events may exceed the effective cost of processing. Today s systems used for fraud management or revenue assurance are already larger than for some billing and customer care systems and this growth rate may not be economically sustainable. Therefore, systems will need to be able to take a sample of relevant and sufficiently sized data to be statistically meaningful. The sampling approach proposed must be able to detect issues, but be dynamically sized so that the optimum trade-off in data collected can be made dependent on the issues detected. In the case of fraud, detection of issues should be able to trigger a full detection and processing of relevant records from initial fraud indicators identified to ensure all relevant subscriber accounts can be covered. Due to the envisaged change in the needs of CSPs there will be an increased requirement to control customer spending and to continually check a customer s ability to pay as opposed to having incremental billing control. This will require a business assurance tool to include credit management controls based on ensuring initially (at the point of service) and on an on-going basis the ability to pay for the services. This capability will need to be developed in line with existing commercially available products. Identity management Identity management of the customers used in revenue assurance and fraud management systems will be required as there will be an ever-increasing number of access systems and services used by a single customer that will need to be linked in order to enable effective fraud and revenue management of a customer. While there may be a single master key used in one system, such as the MSISDN or IMSI (In GSM) the master key field will need to be linked in many access bearer and service platforms. While in a fully integrated network the HSS will act as both an HLR and AAA and manage all DIAMETER signalling related to authentication, it is unlikely that all authentication and subscriber details will be held by these individual platforms. Therefore, there will be a requirement for the ability in both revenue assurance and fraud systems to flexibly link identities used. This should be configurable by the customer in the system and not in data importation and management in the system. The change in interfaces between networks and the move to an all-ip interconnection where the home network is in control has other implications. There will be a number of CSPs to handle the interconnections and accounting between operators as well as the traffic. Certain established approaches to, say, roaming using clearing houses or TAP/NRTRDE records for example may become unnecessary.
7 A WeDo Technologies White Paper 7 2. Threats, risks and authentication All of the business assurance changes mentioned are to some extent driven by factors linked to greater bandwidth and fully IP networks. But device security management is also changing as manufacturers want to take control of both the device and subscriber authentication. The rise of the apps store means that a lot of services will now be driven by the terminal device application rather than core platforms icloud-based messaging from Apple is an example of this. The future dominance of all-ip networks and new more powerful access technologies means there will be considerably fewer network elements than we see in traditional 2G/3G networks. However, the number of technical connections and interfaces will increase. In short, previously closed communications networks are now more open to the risks associated with the Internet. The move from the established addressing scheme IPv4 to IPv6 may increase the level of risk. The arrival of OTT services like IPTV and VoIP certainly will. However, as CSPs migrate from 2G/3G networks to an all -IP network, some legacy vulnerabilities could be exploited by hackers or affect the operation of the network. of IP connection for the access points means that these are open and exposed to illegal connections or manipulation of traffic and setting back in the core network if there is not adequate security control and monitoring. In a similar way, the exploitation of items like home routers that form part of the 4G network may allow the user to manipulate the device to some extent for, say, man in the middle -type attacks. However, the most critical interfaces in an all-ip network are the interfaces between the differing traffic domains user access planes, signalling planes, control domain, operational domain, provisioning and so forth. A notable case will be offsite connections from the core network either connected to a session border controller (SBC) or signalling gateway (S(P)GW). Here there are issues on the supported secure signalling or media transfer and potential vulnerabilities in the higher level protocols in particular IPv4 and IPv6. Why? Essentially because they can directly access components in the CSPs core network as an entry point to the IP layer, which is visible to most users. It is also the easiest one to attack, due to the large number of readily available tools used for Internet hacking. The radio network will also be under threat. More of the control and monitoring of transmission will be part of the access point base station. This means access points are exposed to more risk than in 2G/ 3G. Also the provision
8 A WeDo Technologies White Paper 8 3. Risk management: the role of expert consultancy Network operational risk management must provide business process mapping and deliver clearly defined process vulnerability and downtime valuation, alongside risk mitigation options and prioritisation. To summarise, the areas of work affected by the changes associated with LTE and NGN services are in many ways considerable. The design of LTE, its all-ip nature and the services it carries imply a number of risk areas. There could also be a carry-over of risk from 2G and 3G networks, cable and fixed areas. Yes, a lot of today s technical security and risk reviews will not differ but the network technology components, configuration and settings definitely will. And working with all-ip (or legacy) networks will also carry risks depending on the player involved. In addition telecommunication signalling protocols and the dedicated telco signalling and media connection will be more open, not just to new players but also to attack. So if we could list the key risk areas derived from LTE access and evolved core networks, what should we consider? The list will not be a short one but a sample would include: Separation of bearers and services and the associated risk caused by the separation Interworking issues of authentication & cyphering protection New configuration of SIMs and interworking with Wi-Fi Configuration of the evolved core network, in particular the S-GW, MME and HSS, and (from a fraud, RA and billing perspective) the PCRF IP network architecture design and differing security domain requirements IP platform management and control Increasing need to define and use Minimum Baseline Security Standards (MBSS), but also to add in elements of business activity needs and security management Weaknesses in the applications or terminal devices both of the OS and applications Terminal device security and application with the key issues of identity management and control Policy, processes and procedure failures relating to the network and handling of the security parameters, security architecture and security policy Implementation issues with IPv6 and cross-working with IPv4 Changes to interconnect and how this will affect transfer of billing records and control of transactions The above envisaged risks means that CSPs must consider what strategy and defence mechanisms will be required from a risk management perspective. For many they will not have the required skill sets in house to assess the levels of LTE risk technical, process and organisational. Therefore, the risk management knowledge and expertise may well need to initially come from external consultancy who have the breadth of skills and expertise to guide and mentor the CSP via performing technical risk assessments, product and service evaluations and risk management training encompassing security, fraud and revenue assurance.
9 A WeDo Technologies White Paper 9 4. About WeDo Technologies and RAID As value shifts from minutes of usage to volumes of data, CSPs need to review the way they address the market with target offers, meet customer expectations and, at the same time, adapt to new charging models capable of monetising these services and increasing their revenues. Billing and rating features capable of processing vast amounts of data related to various transaction types and in various (rule-based) pricing models are mandatory for CSPs that want to capitalise new forms of connectivity. As an innovator in the area of business risk - revenue assurance and fraud management for the telecom market, WeDo Technologies is defining the future of risk management tools for the global telecom market. RAID: Business Assurance software is now a market-leading solution due to its pioneering approach during the release and implementation of risk management controls to GSM, CDMA, 3G CDMA and 3.5G HSDPA, among other network technologies and is now leading the way in 4G and beyond. Using the fundamentals of R&D, at WeDo Technologies we search for ideas and turn them into innovative products and solutions, with the ultimate goal of creating RAID enhancements and new solutions that benefit our internationally based customers. Beginning in 2011, one of the core projects that was led by our vision of business assurance was a patent technology that enables CSPs to manage risk, fraud, security, content control and legal interception. Called Communication System with Distributed Risk Management Solution (DRMS), this solution aims to change the way risk management can be undertaken in networks as risk control begins to migrate to the terminal device with the changing nature of the industry. The WeDo Technologies Worldwide User Group (WUG) further underlines the principle of cooperative-innovation by bringing customers, researchers, developers, and further stakeholders together to show, discuss and demonstrate technological innovation together with the CSPs that rely on WeDo Technologies. RAID is a unique revenue assurance and fraud management solution to tackle CSPs revenue, margin and P&L challenges. Whether we talk about traditional fixed line, mobile, CATV, virtual networks or carriers carriers operators, or the LTE, the RAID: Business Assurance Solution is continually being designed to assist CSPs in assuring customer provisioning, data management, service usage control, account balance validation, billing validation and fraud management, - with RAID already protecting revenues that come from more than 800 million subscribers and growing. Business consulting Besides delivering business assurance software, WeDo Technologies also delivers industry leading risk management consulting services under the Praesidium brand. Praesidium is a global business assurance consultancy. It is an autonomous company focused on managing risk and improving operational performance. Praesidium's consultancy portfolio covers revenue assurance, fraud management, network security, business continuity, margin assurance and operations assurance.
10 A WeDo Technologies White Paper 10 About Præsidium About WeDo Technologies Præsidium is a Global Business Assurance consultancy. Founded in 1997, the company has successfully provided risk management consultancy to more than 100 Communication Service Providers in over 80 countries on 6 continents. Præsidium has gained solid recognition in the market amongst its substantial customer base and among global standards agencies. These include the GSMA Security Group & Fraud Forum, the Telemanagement Forum and ETSI. Offices: United Kingdom Davidson House, Forbury Square, Reading, RG1 3EU, Tel: Fax: Portugal Edifício Picoas Plaza Rua do Viriato, 13E núcleo 6-4º andar Lisbon Tel: Fax: Brazil Torre Rio Sul, Rua Lauro Muller 116; 27º Andar Sala 2701 CEP: Botafogo Rio de Janeiro Tel: Fax: Spain Edifício Cuzco IV Paseo de la Castellana, 141 8ª planta Madrid Tel: Fax: Ireland Maple House,Temple Road, Blackrock, Co. Dublin Tel: (0) Fax: (0) WeDo Technologies is the number one preferred supplier for revenue andbusiness assurance software and services. Present in 15 countries on 5 continents, with more than 100 innovative bluechip customers in 80 countries, the company has a solid and envious project management track record of being on-time and within budget while achieving superior customer satisfaction. Business Assurance RAID, WeDo Technologies flagship software suite covering Revenue Assurance, Fraud Management and Business Processes Control has been implemented in a number of different industries where it has delivered significant business results and powerful return on investment. WeDo Technologies pioneered the telecom revenue assurance space in 2002 and is now breaking new ground in the enlarged business assurance arena in Telecom, while also servicing the Retail, Energy and Finance industries. Offices: Portugal _ Lisbon Portugal _ Braga Australia _ Sydney Brazil _ Rio Janeiro Brazil _ Florianopolis Chile _ Santiago Egypt _ Cairo France _ Paris Ireland _ Dublin Malaysia _ Kuala Lumpur Mexico _ Mexico City Panama _ Panama City Poland _ Poznan Poland _ Warsaw On the Web General Information info@praesidium.com Singapore _ Singapore Spain _ Madrid Spain _ Barcelona UK _ Reading USA _ Chicago
Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales
Mavenir Keynote Think Smarter Secure communication Innovate Services By Mohamed Issa Regional Head of Africa Sales The New Mavenir: Combining Market Leaders Combing three industry-leading companies to
More informationDavid Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited.
David Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited www.i3forum.org GSM Association Fraud Forum Presentation to i3 Forum David Morrow, Vodafone Document Number Meeting Date
More informationAdvances in Regulatory Pricing and Costing in the Digital Economy: VoLTE Interconnection Issues
Advances in Regulatory Pricing and Costing in the Digital Economy: VoLTE Interconnection Issues Advances in Regulatory Pricing and Costing in the Digital Economy: VoLTE Interconnection Issues Victoria
More informationOrange Smart Cities. Smart Metering and Smart Grid : how can a telecom operator contribute? November
Orange Smart Cities Smart Metering and Smart Grid : how can a telecom operator contribute? November 5 2012 Nathalie Leboucher Vice President Smart Cities Program Orange 1 the Orange Group in a nutshell
More informationCDG Technology Forum Inter-Technology Networking
CDG Technology Forum Inter-Technology Networking The Impact of 4G on the Packet Core Network April 30, 2008 Gennady Sirota Vice President, Product Management Safe Harbor Statement This presentation contains
More informationBusiness Case for the Cisco ASR 5500 Mobile Multimedia Core Solution
Business Case for the Cisco ASR 5500 Mobile Multimedia Core Solution Executive Summary The scale, use and technologies of mobile broadband networks are changing rapidly. Mobile broadband growth continues
More informationTaking Over Telecom Networks
Taking Over Telecom Networks Hardik Mehta (@hardw00t) Loay Abdelrazek (@sigploit) Taking Over Telecom Networks - Hardik Mehta (@hardw00t) and Loay Abdelrazek (@sigploit) 1 Press Release: some highlights
More informationDiameter, Meet Your Future
, Meet Your Future The Dialogic Helix The Helix (HSC) raises the bar for functionality by combining unparalleled multiprotocol Interworking Functionality (IWF) and high-availability Edge Agent (DEA) and
More informationvepc-based Wireless Broadband Access
With 70 years of experience, Iskratel is the leading European provider of infocommunications solutions and has, its own R&D and manufacturing centres, 900 employees and a local presence in more than 30
More informationLeveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience
Leveraging Wi-Fi Calling To Reduced Operator Costs and Improve the Customer Experience Steve Northridge Email: Steve.Northridge@Oracle.com Twitter: @stevenorthridge 3 Photo Source: Boston Public Library
More informationIntegrating Communications Compliance into the Next Generation 4G LTE Network
SS8 : WHITEPAPER : INTEGRATING CC INTO THE NEXT GENERATION 4G LTE NETWORK Integrating Communications Compliance into the Next Generation 4G LTE Network All telecommunication providers that currently or
More informationAlcatel-Lucent 1357 ULIS
Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement
More informationA MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Vilnius, October 2005 Page
More informationOTT Services Balancing Innovation, Investment and Competition
OTT Services Balancing Innovation, Investment and Competition Executive Summary CANTO has, in this document, provided a context for understanding the current development where some Caribbean network operators
More informationMobile School Training International Mobile Communication
Mobile School Training International Mobile Communication INTRODUCTION For over 10 years Rabion Consultancy has been providing Mobile School training. In the past the training was offered as in-house training
More informationThe Voice over Mobile Broadband (VoMBB) Market:
Brochure More information from http://www.researchandmarkets.com/reports/2155773/ The Voice over Mobile Broadband (VoMBB) Market: 2012 - Description: A relatively new term, Voice over Mobile Broadband
More informationVoLTE: The Next Generation of Voice
VoLTE: The Next Generation of Voice Introduction Voice over LTE (VoLTE) is no longer just a buzz word in the telecom community but is quickly becoming reality, with implementations appearing around the
More information4G LTE Technologies: System Concepts
4G LTE Technologies: System Concepts CK Toh, PhD, Chief Technology Advisor, ALICO Systems Inc., Torrance, CA, US ABSTRACT Recently, we have witnessed the roll out of LTE (Long Term Evolution, or so called
More informationNaresh Soni CTO, InterDigital
March 5, 2012 WTC 2012 Challenges and Innovations in LTE Deployment Naresh Soni CTO, InterDigital Agenda InterDigital Overview Key Trends Key Challenges in LTE Innovative Solutions for LTE Deployment Summary
More informationPay-TV and OTT video services in Western Europe: forecasts and analysis
Research Report Pay-TV and OTT video services in Western Europe: forecasts and analysis 2013 2018 August 2013 Cesar Bachelet 2 Contents Slide no. 7. Executive summary 8. Executive summary: We expect 3%
More informationMKG International Telecom Traffic Management & Roaming for Today
MKG-125 - International Telecom Traffic Management & Roaming for Today Description With increasing pressure on operator revenues, international traffic and roaming can be a significant source of revenue
More informationInterconnection and Roaming
Interconnection and Roaming Operator Business Slide 1 Importance of Interconnection Operator s perspective Connectivity =>Network effect => Customer satisfaction =>Revenue Slide 2 Types of interconnections
More informationExtensive Training on International Roaming
www.roamconsult.com INTRODUCTION RoamConsult has put together new and extensive training programs on International Roaming, which takes employees that need to learn the roaming business through the complete
More informationConnected & Smart Home Research Package
TECHNOLOGY, MEDIA & TELECOMMUNICATION KEY COMPONENTS Intelligence Services Real-time access to continually updated market data and forecasts, analyst insights, topical research reports and analyst presentations.
More informationLeverage SDN Principles in LTE to Meet Future Network Demands
Leverage SDN Principles in LTE to Meet Future Network Demands PLATFORM FOR PROFITABLE GROWTH The Role of SDN in LTE Networks SDN refers to specific technologies considered promising for mobile network
More informationAnalysys Mason Research Key Themes for 2013
Presentation Analysys Mason Research Key Themes for 213 25 October 212 Alexandra Rehak 2 Analysys Mason s research programmes cover key telecoms services and technologies globally Research practices Research
More informationDelivery of Voice and Text Messages over LTE 13 年 5 月 27 日星期 一
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS 2. Third Party Voice over IP 3. The IP Multimedia Subsystem 4. Circuit Switched Fallback 5. VoLGA LTE was designed as a data
More informationAAA Authentication: New Use Cases
AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf
More informationITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum
ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum Roaming Service in Sudan improvement & Challenges Zain, MTN & Sudani Content - Telecom
More informationWhat is NGN? Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011
What is NGN? Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Outlines Next Generation Network (NGN) Definition Applications Requirements Network Architecture QoS Issues 2 What
More informationIP multimedia in 3G. Structure. Author: MartinHarris Orange. Understanding IP multimedia in 3G. Developments in 3GPP. IP multimedia services
IP multimedia in 3G Author: MartinHarris Orange slide 1 Structure Understanding IP multimedia in 3G Developments in 3GPP IP multimedia services IMS challenges and open issues IP multimedia roadmap slide
More informationEnd-to-End QoS in Mobile Networks
End-to-End QoS in Mobile Networks an holistic engineering view IEEE ComSoc / IST Paulino Corrêa António Carlos Fernandes 8 th January 2013 Definition ( ) In the field of computer networking and other packet-switched
More informationVoice over Long Term Evolution Migration Strategies
White Paper Voice over Long Term Evolution Migration Strategies What You Will Learn The evolution of mobile networks to the Voice over Long Term Evolution (VoLTE) all-ip technology standard has generated
More informationCompeting with OTT Services: RCS e without IMS. November 15, 2011
Competing with OTT Services: RCS e without IMS November 15, 2011 An Introduction to Interop All Gen Short Message Service Center (SMSC) 4 Series Message Personalization & Control (MPAC) Multimedia Message
More informationE N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G. W U G M a l a y s i a
E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G W U G M a l a y s i a 2 0 1 7 CONTACTS NUNO PESTANA FRAUD PROFESSIONAL SERVICES MANAGER +351 939 651 481 nuno.pestana@wedotechnol
More informationOUTLINE. I Overview: the Challenge of NGNs for regulation. Outline
Next Generation Networks and the EU regulatory framework for electronic communications: Applicability of the existing framework and new regulatory issues Alison Birkett European Commission ITU Seminar
More informationBuild VoLTE Services using NFV & Cloud Reduce complexity and increase RoI
Build VoLTE Services using NFV & Cloud Reduce complexity and increase RoI Vivek Bhargava Director, Product Marketing Oracle Communications Oracle In Communications R&D, product strategy, sales and services
More informationLTE TECHNOLOGY. Format: Online Academy. Duration: 7 Modules
LTE TECHNOLOGY Format: Online Academy Duration: 7 Modules LTE TECHNOLOGY COURSE OVERVIEW The delegate attending this course will gain a comprehensive appreciation of the architecture and operation of the
More informationITU Workshop. NGN Regulation and Migration Strategies (13-15 th October, 2010)
ITU Workshop NGN Regulation and Migration Strategies (13-15 th October, 2010) Lav Gupta, Principal Advisor, Telecom Regulatory Authority of India, New Delhi Phone :+91-11-23216930, Fax: +91-11-23235270
More informationNGN: The Evolution of Wireless Networks
NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.
More informationFor personal use only
1 (Thank you Terry) I d like to extend a warm welcome to our shareholders and thank you for coming along today. 2 As Terry mentioned, last year was a productive year for NetComm. Today I would like to
More informationTHREATS TO PACKET CORE SECURITY OF 4G NETWORK
07 CONTENTS Terms and abbreviations... : main components and protocols...4 Attack scenarios...5 What is necessary for a successful attack...5 Threats to EPC security...7. Fraud...7. Connection hijacking...8.
More informationTalk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Presented by Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering
More informationTitolo della presentazione 1
GLOBAL FORUM 2003 Introducing stance Rome, November 6th, 2003 2 Why TI Sparkle: to strengthen TI s international position by leveraging on foreign assets and capabilities Introducing Understanding the
More informationProduct Brochure Traffix Signaling Delivery Controller (SDC)
Product Brochure Traffix Signaling Delivery Controller (SDC) The 4G & Diameter Experts Diameter Signaling Control: The Next Frontier in Network Architecture The mass market penetration of smart phones
More informationReal-time Communications Security and SDN
Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,
More informationThe 5G consumer business case. An economic study of enhanced mobile broadband
The 5G consumer business case An economic study of enhanced mobile broadband Enhancing today s services for tomorrow 5G has the potential to drive new revenue streams. Much focus has been on the innovative
More informationWhy IIJ Seeks to Become a Full MVNO
2. Focused Research (1) Why IIJ Seeks to Become a Full MVNO 2.1 MVNO Business Models In 2018, IIJ finally begins full MVNO services, the biggest challenge we have had since launching our MVNO business
More informationTELECOMS TRAINING SCHEDULE
January December 017 TELECOMS TRAINING SCHEDULE School of Management School of Advanced Communications Technology Contact Us www.telecomsacademy.com + (0)0 7017 1 training@telecomsacademy.com DISTANCE
More informationRAID Roaming. Datasheet. RAID Roaming Datasheet 1
RAID Roaming Datasheet RAID Roaming Datasheet 1 2 RAID Roaming Datasheet About RAID Roaming RAID Roaming is a single Central Roaming Management Solution, enabling mobile operators to manage the entire
More informationTHE ECONOMIC VALUE OF WI-FI: A GLOBAL VIEW
THE ECONOMIC VALUE OF WI-FI: A GLOBAL VIEW A study commissioned by Wi-Fi Alliance Raul L. Katz Telecom Advisory Services, LLC Berlin, Germany November 7, 218 Y IS IT IMPORTANT TO ASSESS THE ECONOMIC VALUE
More informationGary Bhomer. Director, Telstra Wholesale
Gary Bhomer Director, Telstra Wholesale 1 What services are in demand? What are customers looking for now? 2 How can an operator innovate quickly? Leveraging the strengths of the leading MNO in Australia
More informationServices in the IMS ecosystem
285 23-3109 Uen Rev A Services in the IMS ecosystem February 2007 White Paper Different services have different demands and require different approaches Contents 1 Executive summary. 3 2 Introduction..
More informationOracle Communications Diameter Signaling Router
Oracle Communications Diameter Signaling Router Centralizing Diameter routing with cloud deployable Oracle Communications Diameter Signaling Router creates a secure signaling architecture that reduces
More informationHybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure
Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,
More informationBT Compute. BT Private Compute. Dedicated cloud infrastructure hosting your IT. BT Compute
BT Compute BT Private Compute Dedicated cloud infrastructure hosting your IT BT Compute IT needs to help organisations be more agile, flexible and efficient, whilst reducing complexity and cost. However,
More informationCOPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status
1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA technology and deployment status The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were
More informationA Perspective on Multi-Access Edge Computing. Frank Rayal. January San Francisco Singapore Dubai Paris
A Perspective on Multi-Access Edge Computing Frank Rayal January 2017 San Francisco Singapore Dubai Paris Page 2 Overview The convergence of the Internet and telecommunication networks is igniting a debate
More informationDIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA
DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA 1 SECURING DIGITAL IDENTITY THE KEY TO ASIA S VAST POTENTIAL IN E-COMMERCE We are living through an exciting time for digital commerce in Asia.
More informationTELECOMS TRAINING SCHEDULE
January December 017 TELECOMS TRAINING SCHEDULE School of Telecoms Management School of Advanced Communications Technology Contact Us www.telecomsacademy.com + (0)0 7017 1 training@telecomsacademy.com
More informationGPRS billing: getting ready for UMTS
GPRS billing: getting ready for UMTS In his first article about UMTS, Lucas Baugé looks into the key challenges of GPRS billing. He seeks to show how solving these challenges will help operators succeed
More informationHuawei Technologies
Huawei Technologies 2005.10 8 VOICE FROM OPERATORS T-Mobile Czech: convergence, aggregation and evolution Technology Director of T-Mobile Czech Republic, Frank Meywerk, met with WinWin and explained the
More informationOperator strategies to address the OTT threat
Operator strategies to counter the OTT threat MENA Summit 2013: Enabling innovation, driving profitability Operator strategies to address the OTT threat 6 November 2013 Stephen Sale EVENT PARTNERS: Operator
More informationNokia AirGile cloud-native core: shaping networks to every demand
Nokia AirGile cloud-native core: shaping networks to every demand The future of core networks? Today s networks focus on delivering voice and broadband services to people. Yet the rise of the Internet
More informationKapsch CarrierCom. Challenging limits
Kapsch CarrierCom Challenging limits The Kapsch Group Challenging Limits globally Four independently operating key entities: Kapsch TrafficCom Kapsch CarrierCom Kapsch BusinessCom Kapsch PublicTransportCom
More informationINDUSTRY GROUP. GSM-R Core Evolution. Jean-Michel Evanghelou Head of Railways Solutions Kapsch CarrierCom. 1
GSM-R Core Evolution Jean-Michel Evanghelou Head of Railways Solutions Kapsch CarrierCom 1 Strategy Trend : Evolve GSM-R from TDM to IP Fully Secured Networks R99 to R4 evolution : Packetization of Voice
More informationPioneer Communications Internet Services Disclosure
Pioneer Communications Internet Services Disclosure Pioneer Communications ( Pioneer ) is the leading Internet service provider for Southwest Kansas communities with a reputation for excellence that goes
More informationBuilding a Profitable Data Future. Monetizing Data Traffic
Building a Profitable Data Future Monetizing Data Traffic Market Introduction Driven by an upsurge in smartphone usage, increased mobile-broadband penetration and enormous growth in video consumption,
More informationMOBILE NETWORK SECURITY
COURSE DESCRIPTION MOBILE NETWORK SECURITY Format: Classroom Duration: 2 Day COURSE SUMMARY HIGHLIGHTS Focused at telecoms professionals that need to assess threats and preparedness of mobile networks
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationThe Reality of Delivering 4G <-> 3G Roaming
As the growth of 4G LTE networks gathers pace many operators are hitting unforeseen challenges as they look to interconnect with legacy networks and ensure their subscribers aren t left hanging when they
More informationLTE : The Future of Mobile Broadband Technology
LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms
More informationBRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers
1 BRIDGE TO GLOBAL MARKET FOR MVNOs Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers How to compete with big MNOs on equal terms 2 Your
More informationAdaptiveMobile Security Practice
AdaptiveMobile Security Practice Overview & Case Study AdaptiveMobile s Security Practice provide a suite of managed security services undertaking analysis of potential threats in networks and delivering
More informationEmbedded SIM Study. September 2015 update
Embedded SIM Study September 2015 update Executive summary Following a first white paper drawing upon interviews with mobile network operators in 3Q 2014, EY decided to perform a second round of interviews
More informationFixed Mobile Convergence
Cisco Expo 2006 Fixed Mobile Convergence Business Track Bo Finnemann Cisco DK 2006 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda, Fixed Mobile Convergence Market Perspective What
More informationDelivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS 2. Third Party Voice over IP 3. The IP Multimedia Subsystem 4. Circuit Switched Fallback 5. VoLGA Two main approaches to the
More informationCarrier Solution. Carrier Solution. Carrier-class Wi Fi. Highly scalable mobile operator Wi Fi solution
Carrier Solution Carrier Solution Carrier-class Wi Fi Highly scalable mobile operator Wi Fi solution SKSpruce provides a carrier Wi-Fi solution to complement LTE buildout in dense urban environments End-to-end
More informationReal-Time Communications Witout Boundaries. Ribbon Policy Solutions
Real-Time Communications Witout Boundaries Ribbon Policy Solutions As SIP session traffic continues to grow a trend accelerated by the rapid adoption of multimedia devices like smartphones and tablets
More informationSD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast
SD-WAN Enabling the Enterprise to Overcome Barriers to Digital Transformation An IDC InfoBrief Sponsored by Comcast SD-WAN Is Emerging as an Important Driver of Business Results The increasing need for
More informationPOSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ)
POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) POSTAL AND TELECOMMUNICATIONS PERFORMANCE REPORT SECTOR THIRD QUARTER Disclaimer: This report has been prepared based on data provided
More informationMobile Broadband Evolution. Securing the future of Mobile Broadband for the GSM community LTE White Paper
LTE White Paper Background The GSM family of technologies including GSM, GPRS, EDGE and UMTS/HSPA accounts for more than 3.6M subscriptions, translating to a global market share in excess of 85%. Founded
More informationIMS Adoption Fueled by the Open IMS Core Project and MySQL
IMS Adoption Fueled by the Open IMS Core Project and MySQL Overview The project was launched in 2006 to promote IMS (IP Multimedia Subsystem) technology adoption in next-generation telecommunications networks,
More informationThe Alcatel-Lucent Ultimate Wireless Packet Core
T E C H N O L O G Y W H I T E P A P E R The Alcatel-Lucent Ultimate Wireless Packet Core A converged packet core that supports the bandwidth and capacity crunch of today and the network evolution of tomorrow
More informationExtensible standards and impact on technology switching costs. Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013
Extensible standards and impact on technology switching costs Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013 Agenda Why standardize? Impact of standardization on adoption
More informationInnovation Technology for Future Convergence Network
KRnet 2013 Keynote Speech Innovation Technology for Future Convergence Network Jinsung Choi, Ph.D. EVP, Head of ICT R&D Division, SK Telecom Contents I. Key Trends Driving Network Evolution II. Innovation
More informationIPv6 deployment scenarios in mobile networks Jouni Korhonen Netnod Spring Meeting 9-11 March, 2011 Stockholm, Sweden
IPv6 deployment scenarios in mobile networks Jouni Korhonen Netnod Spring Meeting 9-11 March, 2011 Stockholm, Sweden 1 Nokia Siemens Networks Foreword This presentation concentrates in most parts to 3GPP
More informationto pay for it) has been waning. The Internet further changed the game.
As the old telephone business models break down and new service paradigm takes over, communication companies must combine voice with the new services of the network. The SCI-Platform (Service Convergence
More informationOTT MVNO. Traditional MVNO Deployments 2 OTT MVNO 4. Comparison of MVNO options 7. Case study: OTT MVNO in the US 7. Conclusion 10
OTT MVNO OTT MVNO simpler to launch, requires less investment and meets 100% of customer needs Traditionally, MVNOs were forced to choose between two business models: full and thin. We review both and
More informationDistributed Network Architecture
4Motion Distributed Network Architecture Alvarion s Fractalized ASN Approach: A Practical Implementation of Distributed Network Architecture White Paper Abstract One of the key questions operators must
More informationVOLTE and the IP/MPLS Cell Site Evolution
AVIAT NETWORKS VOLTE and the IP/MPLS Cell Site Evolution By Eduardo J. Sánchez, Aviat Networks Technical Marketing TABLE OF CONTENTS INTRODUCTION...3 PROBLEM: DEPLOYING VOLTE FOR RELIABLE VOICE AND VIDEO...3
More informationTransform your network and your customer experience. Introducing SD-WAN Concierge
Transform your network and your customer experience Introducing SD-WAN Concierge Optimize your application performance, lower your total cost of ownership and simplify your network management. 2X Bandwith
More informationHigh-Touch Delivery Learning Services
Data Sheet High-Touch Delivery Learning Services Implementing Cisco Service Provider Mobility LTE Networks The Implementing Cisco LTE Packet Core Networks (SPLTE) Version 1.0 is an instructor-led course
More informationE vo lu t io n T ech n o lo g y:
Background Long Term Evolution (LTE) is a 4G wireless broadband technology developed by the Third Generation Partnership Project (3GPP), an industry trade group. 3GPP named the technology Long Term Evolution
More informationA Leading Internet Business Enabler
A Leading Internet Business Enabler How do I manage the network resources effectively and maximize my returns? My guests are bringing too many devices into my network. How do I manage them? I allow my
More informationAddressing Current and Future Wireless Demand
Addressing Current and Future Wireless Demand Dave Wolter Executive Director Radio Technology AT&T Architecture and Planning Rising Demand and The Need to Innovate in the Network 6,732% growth over 13
More informationThe Truth About IoT / M2M Cellular Roaming
The Truth About IoT / M2M Cellular Roaming Aeris White Paper www.aeris.com THE TRUTH ABOUT M2M / IOT CELLULAR ROAMING COPYRIGHT 2016, AERIS COMMUNICATIONS, INC. i Let our experts lead the way Table of
More informationTHE ULTIMATE RETAILER'S GUIDE TO SD-WAN PART ONE: EXPLAINED
THE ULTIMATE RETAILER'S GUIDE TO SD-WAN PART ONE: SD-WAN EXPLAINED SD-WAN DE-MYSTIFIED IDC predicts that the SD-WAN market will be worth $2.1bn in Europe by 2021*. That s a staggering 92% growth year on
More information07/08/2016. Sami TABBANE. I. Introduction II. Evolved Packet Core III. Core network Dimensioning IV. Summary
Core network and transmission dimensioning Sami TABBANE 1 CONTENTS I. Introduction II. Evolved Packet Core III. Core network Dimensioning IV. Summary 2 1 CONTENTS I. Introduction 3 Introduction LTE Commercialization
More informationImpact of the LTE Migration for MVNOs
Impact of the LTE Migration for MVNOs A Whitepaper Converting Diameter to SS7 protocols (CAMEL/SOAP/RADIUS/WIN/GSM MAP) and other proprietary protocols October 2012 By Dan Wonak Director of Marketing Abstract:
More information