MDC.pngAbstract – Worldwide predictions on Mobile Data usage are hinting towards more and more demand. The demand for mobile device data is many folds higher compared than PC or laptop demand which clearly proves mobile broadband traffic is increasing. Mobile network operators (MNOs) have to find new ways and means to lower the operating costs of their networks in order to deliver innovative, faster & high revenue-generating services to their subscribers. This article is focused on this subject along with other issues on voice revenue being depleted from MNOs financial statements.

Possible solutions to these challenges are described in the main story part below. Integrate the applications needed to optimize and monetize a mobile network into the mobile gateway or provision each application on separate standalone servers. Mobile Data, Bundled packages, Mobile Money, Mobile Banking, Mobile Payments, OTT services like Facebook, Whatsapp and internet packages are the core business for many players with all other possible overlay services.

Introduction – There are millions of solutions and solution providers around the globe for refining the issues of mobile data attributes like speed, cost, capping issues, what should be charged, what should be free rated and what should be blended with data bunddles. Solutions to handle problems of revenue going down on almost all MNO service offerings through OTT players eating into voice revenue etc. Time started for MNO to take charge and start innovating in order to survive. They also realise that they themselves are responsible for cannibalising their own voice revenue by encouraging revenue share based VAS services from VAS service providers rather than affiliating with OTT players.

Learnings and new streams to be open for their future and retirement plans rather then just choking and getting extinct like dinosaurs. These days, everyone is talking about Greece and Puerto Rico who plainly pose danger to themselves. Their stories diverge in the danger they pose to others. This story can be easily put to the MNOs face where the MNO can be called the Greece of today and their whole problem can be compared to the current economic situation of Greece. The risk of contagion remains at the heart of the MNO crisis.

Main Story  – Wireless access to Internet data services is getting increasingly popular, thanks to the deployment of 3G/4G cellular networks. Mobile Network Operators are facing two challenges: how to optimize and monetize their networks as voice revenue continues on a south bound journey. As per the Google research, mobile broadband traffic is projected to increase by up to 35 times from its 2011 size by 2015, the response to these two issues could mean the difference between significantly growing your business over the next five years or falling behind the competition. As mentioned before many of the MNOs have, in search of revenue actually cannibalised their own voice revenue by encouraging revenue share based VAS services from VAS service providers as usage on the network remain the same at 1 to 10 USD on average.

As per expectation, in the shortest possible time, mobile broadband networks will take up 40 exabytes (1 billion gigabytes) annually, up from a total of 1.08 exabytes in all of 2009. Policy based Charging Control i.e. PCRF system, Deep Packet Inspection (DPI) and a simplified architecture are the baseline elements needed to monetized a mobile broadband network and reduce overall capital expenditures and operational expenses, yet increase performance. Bring VAS services in house or engage third party vendors on the condition of delta ARPU which can be increased by VAS partners and not eat into your voice revenue and converting it to VAS. The PCRF interfaces with the main packet gateway and takes charging enforcement decisions on its behalf.

When it comes to optimizing performance and making Revenue Assurance (REVA) team happy, the most important uses of DPI today are around internally facing network optimization and control as a practice MNO has data bundles & social media bundles, which are very useful and high on demand at sales. Solutions designed for security detection, mitigation and QoS prioritization needs to be on mind at all times but not at cost of revenue or by making REVA team unhappy for example Whatsapp bundles which are normally unlimited might cost 2 USD per month but now if DPI is not implemented to stop the revenue loss, subscribers will share audio, video and pictures on the same bundle cost which will result in a huge loss to the MNO. While MNOs may not readily be transparent to the subscriber base at all times, this enables operators to maximize on revenue.

DPI in combination with applications that further optimize the network and monetization – such as content filtering, firewall, payload compression, application detection, content charging, and others – form a foundation for PCRF and other services that will address the business needs of mobile network operators now and into the future. In a PCRF environment, the centralized device can act as a policy decision point (PDP) for the wireless operator and gets as granular as individual subscribers.  Policy and Charging Control has a key role and importance in this game and the purpose of the PCC rule is to detect a packet belonging to a service data flow. The service data flow filters within the PCC rule are used for selection of downlink IP. CAN bearers and Service data flow filters within the PCC rule are used for the enforcement that uplink IP flows are transported in the correct IP CAN bearer

  • Identify the service data flow contributes to
  • Provide applicable charging parameters for a service data flow
  • Provide policy control for a service data flow

How DPI and PCRF helps to ensure security & revenue leakage: attackers are usually looking for ways to obtain free mobile data services. Without a doubt these worms do exist and always find loopholes in the charging policy. Operators allow free data service for certain data flow, but usually forget or do-not enforce that the transmitted packets indeed belong to the designated free flow. Even worse, no effective mechanism is implemented to limit the traffic volume going through this free ride. Consequently, these loopholes can be exploited to enable any form of mobile data services for free. The 3G standards offer the operators flexibility to define their own charging policies. Unfortunately, their policies and implementations may contain serious flaws.

In normal audit we can easily find loopholes to implement this free-DNS policy in reality. First, there is almost no enforcement mechanism to ensure that the packets going through free DNS-reserved port are indeed DNS messages or call it as free fake DNS loophole. Second, there is no effective mechanism to limit the traffic volume going through free rated port or no volume-check loophole.

Gx (An offline charging interface) reference point is located between the Policy Control and Charging Rules Function (PCRF) and the Policy and Charging Enforcement Function (PCEF). The Gx reference point is used for provisioning and removal of Policy and Charging Control (PCC) rules from the PCRF to the PCEF and the transmission of traffic plane events from the PCEF to the PCRF. The Gx reference point can be used for charging control, policy control or both by applying AVPs relevant to the application. The PCEF (Policy and Charging Enforcement Function) select a PCC rule for each received packet by evaluating received packets against service data flow filters of PCC rules in the order of the precedence of the PCC rules. When a packet matches a service data flow filter, the packet matching process for that packet is completed, and PCC rule for that filter shall be applied.

Policy Control and Charging Rules Function (PCRF) – Dedicated policy equipment standardize in 3GPP that enables the policy function for bandwidth and charging on multimedia networks. PCRF is a fairly new term, introduced in late 2007 (As per Internet findings from various web sites but I don’t take any responsibility in case its not true) so take it as perception when standards for the 3GPP Policy Charging Control (PCC) architecture were published. The PCRF function is part of the larger PCC architecture, which also includes the Proxy Call Session Control Function (P-CSCF) and the Policy and Charging Enforcement Function (PCEF). Combined, the elements of the PCC provide access, resource, and quality-of-service (QoS) control.

Functional element that comprises flow based charging control and policy control decision functionalities. The PCRF stipulates network control regarding the service data flow detection, gating, QoS and flow based charging (except credit management) towards the PCEF. PCRF receives session and media related information from the Application Function and informs Application Function for data traffic. The PCEF (Policy and Charging Enforcement Function) is the functional element that encompasses policy enforcement and follow based charging functionalities.

Conclusion:  To step up as one single team, exploit technology and leverage on existing MNO infrastructure to acquire customers, enrich use cases, lower costs and increase revenue especially in markets where regulators play a dominant role. Customers are funny enough and real quick to blame the service provider for over charging (Though there is non and will never complain about under charging or free usage) for an instance if you move your network from 2G to 3G or from 3G to 4G and tell your customer to use the faster connection and enjoy speedy data next day customer will complain that you (Service provider) stolen his money and would never realise that his/her data now would not last for 30 days due to speed it may vanish in 15 days as package bought was on the total data amount not unlimited data under time bound package. When customer use 1GB data on 2G network it may take 30 days (Just for argument sake) and on 3G it might vanish in 22 days and on 4G it might take just 10 days to be consumed and customer says whaaaatttt ….. where is my data ….. crying….crying… and will say you stole my data / money.

DPI, PCRF supporting Mobile data in a big way as the Internet is going wireless and mobile. Two driving forces for this trend have been the explosive growth of smartphones and the rapid deployment of 3G/4G infrastructure. Unlike the wired Internet, cellular networks have implemented usage-based charging, rather than the simpler flat charging. The 3G/4G standards stipulate the accounting architecture, yet provide freedom for the MNO to define their own charging policy. In this work, if we conduct experiments on operational 3G networks to study the security implication of such an architecture and practice. We will find and surely discover loopholes and simple attacks, which can be validated by experiments over operational networks.

 

====================== About the Author =================================

Read about Author  at : About Me   

Thank you all, for spending your time reading this post. Please share your feedback / comments / critics / agreements or disagreement.  Remark for more details about posts, subjects and relevance please read the disclaimer.

FacebookPage                Twitter                          ContactMe                          LinkedinPage    ==========================================================================

Advertisements

Posted by V Sharma

Specialised in Financial Technology(FinTech), Artificial Intelligence for Fintech. Mobile Financial Services (Cross Border Remittances, Mobile Money, Mobile Banking, Mobile Payments), Data Science, IT Service Management, Machine Learning, Neural Networks and Deep Learning techniques in FinTech. Mobile Data and Billing & Prepaid Charging Services (IN, OCS & CVBS) with over 15 years experience. Led start ups & new business units successfully at local and international levels with Hands-on Engineering & Business Strategy.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s