Revenue Analytics for Long Term Evolution (LTE) - Technical White Paper October, 2012
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Revenue Analytics for Long Term Evolution (LTE) Technical White Paper October, 2012 | www.cvidya.com | info@cvidya.com
Title Document Type cVidya Confidential Proprietary This document and the information contained in it is CONFIDENTIAL INFORMATION of cVidya, and shall not be used, published, disclosed, or disseminated outside cVidya in whole or in part without cVidya's consent. This document contains trade secrets of cVidya. Reverse engineering of any or all of the information in this document is prohibited. The copyright notice does not imply publication of the document. Documented Releases Revision Number Revision Description Revision Date 1.0 Initial release Date–month‐year | www.cvidya.com | info@cvidya.com
Title Document Type Contents 1 Revenue Management challenges .................................................................. 7 1.1 Service Configuration ................................................................................................. 7 1.2 Usage ......................................................................................................................... 8 1.3 Billing......................................................................................................................... 9 2 Revenue management solution .................................................................... 10 2.1 Revenue Assurance .................................................................................................. 10 2.2 Fraud Management .................................................................................................. 11 2.3 Revenue Management Control Points ...................................................................... 12 3 About cVidya ................................................................................................ 13 Table of Figures Figure 1 – LTE Phase 1 .................................................................................................. 6 Figure 2 – LTE Phase 2 & 3 ............................................................................................ 6 Figure 3 – LTE Charging................................................................................................. 8 Figure 4 – LTE Control Points ...................................................................................... 12 | www.cvidya.com | info@cvidya.com
Title Document Type The introduction of LTE The access technology called LTE (Long Term Evolution) is quickly becoming the network technology of choice for 4G deployments around the world as the consumer demand for higher capacity mobile broad band services continues to rise. LTE is becoming the technology of choice because it provides cost‐effective, highly responsive and very fast mobile data services. The 4G LTE technology revolutionizes mobile network architecture and the services offered for mobile users. LTE lays the foundations for an all‐IP environment enabling unified internet based interactions of User’s Equipment (UE) with a growing number of high bandwidth offerings. Traditional circuit based voice services can be fully assimilated with the packet data infrastructure thus simplifying access technologies and providing richer integrated voice and data services. LTE technology brings changes to the Radio Access Network (RAN) as well as to the network core, moving it from the dual circuit and packet cores architecture, to a unified Evolved Packet Core (CPE) that serves voice, media and data. LTE provides access to emerging IP Multimedia Subsystem (IMS) networks, which will eventually replace the traditional circuit based mobile voice networks of today with rich multimedia services. In most cases, 3G operators are deploying LTE in a phased process (see figures below): Phase 1 Deploy LTE along with the existing 3.xG network; gradually move the traditional 3G data core (BSC, SGSN, GGSN) to the Evolved Packet Core (EPC) Phase 2 Deploy IP Multimedia Subsystem (IMS) along with the existing 3.xG circuit based voice network; gradually move the traditional 3G Voice core (BSC, MSC, HLR) to IMS with EPC Phase 3 Full EPC + IMS network and service environments | www.cvidya.com | info@cvidya.com
Title Document Type 3.x G Network Circuit Core SMSC Voice & Messaging MSC SMSC BTS BSC/ RNC Intelligent HLR NodeB Network Radio Access Network SGSN GGSN Packet Core Internet 4G ‐ LTE Network MME HSS e‐NodeB S‐GW P‐GW Radio Access Network Evolved Packet Core RCRF SPR Figure 1 – LTE Phase 1 4G ‐ LTE Network IP Multimedia Subsystem Application Servers Voice & Messaging HSS CSCF MME MGW e‐NodeB S‐GW P‐GW Radio Access Network Evolved Packet Core RCRF SPR Internet Figure 2 – LTE Phase 2 & 3 | www.cvidya.com | info@cvidya.com
Title Document Type 1 Revenue Management challenges The transition to LTE affects service types, utilization patterns, and also alters the services’ and customers’ information. Furthermore, traffic patterns, especially for data, are changed significantly. LTE enables operators to move from traditional flat charge based data usage to more advanced group bundled & quality dependant charges, thus increasing revenues and differentiation. On the other hand, as with the internet, the all‐IP LTE technology increases the level of vulnerability to fraudsters and hackers. cVidya’s MoneyMap and FraudView solutions address the challenges arising from the introduction of LTE and IMS in two ways. Firstly, from the overall perspective of Revenue Assurance and Fraud management, they address the new configuration, usage patterns and vulnerabilities which LTE brings with it, and secondly, they continue to address the relevant traditional RA and Fraud issues from the pre‐LTE era. The following paragraphs outline some of the major Revenue Assurance and Fraud Management challenges that LTE raises. 1.1 Service Configuration Customers and Service information in 3G networks is usually stored by and managed across the Home Location Register (HLR) and the Prepaid Intelligent Network platforms. Some aspects of 3G data usage are managed by Radius/AAA platforms. In LTE networks the HLR that manages customers’ service information, is replaced by the Home Subscribers System (HSS), which is a combination of the HLR and AAA, and responsible for managing the overall data services for the customers. Furthermore, LTE supports Quality of Service (QoS) dependent charging, thus the level of quality of service (bandwidth, guarantied bit rate, etc.) depends on parameters provisioned for each customer. The LTE QoS parameters per customers are stored by the Service Profile Register (SPR) platform. The QoS is actually managed by the Policy Charge Rules Function (PCRF) and the Policy Charge Enforcement Function (PCEF) controlling the Packet Data Network Gateway (P‐GW). It is imperative that the SPR be synchronized with the HLR and HSS (see figure 3). During phase 1 of the LTE deployment, the operators are managing customers’ information concurrently across the HLR, HSS and SPR. Customers having 3G data are managed on the HLR while those moved to LTE reside on the HSS and SPR, while their voice services are still managed by the HLR. It is of the utmost importance that the data integrity across the HLR, HSS and SPR for all the registered customers and their services, be maintained. To maintain data integrity, it is essential that duplications and discrepancies be resolved during the overall transit period from phase 1 to 3. It is important to note that LTE service and topology attributes, as well as customers’ information, impact the information handled by the CRM, Billing and ERP (accounting & logistics) systems. Prepaid customers on 3G networks are also managed by a Prepaid Intelligent Network (IN) platform. Revenue management for 3G maintains integrity by avoiding duplications and discrepancies between the HLR and the IN platforms. The transition to LTE introduces the On‐ Line Charging (OCG) platform which receives usage information, coupled with utilized QoS from the PCEF. For data usage, the OCG initially interacts with the Prepaid IN platform, to determine available credit and report utilized credit. Eventually (phase 3), the Prepaid IN | www.cvidya.com | info@cvidya.com
Title Document Type platform will be completely assimilated into the OCG. The PCEF also reports usage of postpaid customers (and visitors) to the Off‐Line Charging system (retail billing). During phase 1, the OCG functionality can be carried out by the existing prepaid platforms (IN and Prepaid charging gateway). On the other hand, the new OCG can interact with the existing prepaid platforms. Eventually, all related prepaid charging should be assimilated in the OCG. Revenue Management should check the integrity of the OCG vs. the IN Prepaid platform, including prepaid customers information and credit balances. The information residing in the OCG should be checked against that in the HSS. It is essential to maintain data integrity and avoid duplications and discrepancies during the overall transit period from phase 1 to 3. 4G ‐ LTE Network MME HSS On‐Line Off‐Line Charging Charging e‐NodeB S‐GW P‐GW Radio Access Network RCEF Evolved Packet Core RCRF SPR Figure 3 – LTE Charging During phases 2 & 3, the customer’ information residing in the HLR should be transferred and assimilated in the HSS. The transit period should be monitored by Revenue Management in order to maintain data integrity and avoid duplicates and discrepant configuration records. The customers’ service information residing in the HSS, SPR and OCG should also be checked on a periodic basis in order to detect Policy Violating service attributes (e.g. customers having service attributes they are not entitled to), and service provisioning misprocesses and latencies. The SPR may be co‐located with the HSS or separately deployed by other parties (i.e. MVNOs, Wholesale operators). Data residing in the HSS, SPR and OCG may also be exposed to either internal or external (hacking/backdoor) fraudulent activities, aimed at affecting charging or damaging operations. Data integrity controls are therefore necessary on a periodic basis, including strict monitoring of any illegal or policy violating activity (e.g. fraudulent data manipulation) performed on the above service platforms. 1.2 Usage Moving from flat based data usage to QoS/bundled data usage increases the significance of usage data records generated by the LTE network elements (S‐GW, P‐GW, PCEF and PCRF). Most of these usage records are “partial” in nature, requiring the Revenue Management systems (RA and Fraud Management) to process/aggregate them into “completed” usage | www.cvidya.com | info@cvidya.com
Title Document Type records (e.g. a record addressing an overall data session). The sheer number of those “partial” records requires a capable platform having the ability to collect and process all records. As with 3G networks and services, Revenue Management should check the completeness and integrity of usage records generation (by the relevant network elements), collection (by the data collectors) and processing, in order to detect lost or misprocessed billable events. The Fraud Management solution should detect suspicious traffic patterns, risky services, contract/registration violating usage and more. LTE is an emerging service and in order to manage the technical and service environments and be able to plan ahead, it is important to generate and track usage figures and patterns. The Revenue Management solution should provide the means for traffic and utilizations trends analysis and reports, providing the relevant indications as to suspicious/important deviations. 1.3 Billing LTE facilitates offerings of an increased number of data service types and service derivatives. Furthermore, LTE supports QoS/data bundling dependent charging instead of the flat based charging common to 3G data services. QoS offerings may change dynamically between, and even during, data or media sessions, making the charging process more complex. The increase in the number of service attributes associated with registered customers (post and pre paid), enhances the complexity posed on either prepaid (on‐line charging) or postpaid (off‐line charging). Enhanced service offerings may enable a customer to choose which services are prepaid and which are postpaid. It is therefore clear that we must validate the integrity of customers’ information (static and dynamic) in both on‐line and off‐line charging systems. From a charging integrity perspective, the handling of dynamically allocated QoS/data bundled service parameters extends the complexity of both on‐line and off‐line charging, thus increasing the probability of errors and misprocessing. It is essential to impose charging integrity controls to check for undercharges, overcharges and miss rates. These integrity checks should be carried out for both on‐line and off‐line charging (note: the solution can be implemented across “chosen” traffic/service samples). As with 3G networks, a Revenue Management system should check that all billable usage events are processed and that all the invoices are handled and delivered in the right manner. The bills generated should be examined periodically in order to detect Policy Violating charges. Data residing in the on‐line and off‐line charging platform may also be exposed to either internal or external (hacking/backdoor) fraudulent activities that are aimed at affecting charging or damaging operations. Data integrity controls are therefore necessary on a periodic basis, including strict monitoring of any illegal or policy violating data modification to either of these platforms. | www.cvidya.com | info@cvidya.com
Title Document Type 2 Revenue management solution The tables below map the relevant Revenue Management process required to address major revenue leakages and fraudulent activities associated with LTE. The tables address only the threats posed by LTE. Classical 3G revenue threats are still relevant, but are not addressed below. The following Revenue Affecting Threats are divided into Revenue Assurance and Fraud Management threats. 2.1 Revenue Assurance Threat Control Solution Platform Integrity of HSS configuration Compare CRM/Billing vs. HSS MoneyMap Compare HSS vs. HLR Compare HSS vs. IN prepaid Integrity of SPR configuration Compare CRM/Billing vs. SPR MoneyMap Compare SPR vs. HLR Compare SPR vs. IN prepaid Integrity of OCG configuration Compare CRM/Billing vs. OCG MoneyMap Compare OCG vs. IN prepaid (incl. remaining credit) Completeness of HSS Latencies in CRM/Billing vs. HSS MoneyMap configuration Completeness of SPR Latencies in CRM/Billing vs. HSS MoneyMap configuration Completeness of OCG Latencies in CRM/Billing vs. HSS MoneyMap configuration Service Policies ‐ HSS/SPR/OCG Assure CRM/Billing vs. Service Policies MoneyMap Generated CDRs integrity Count & aggregated payloads of CDRs PCEF vs. MoneyMap OCG Count & aggregated payloads of CDRs PCEF vs. Off‐line Billing Usage deviations Trend analysis of OCG CDRs MoneyMap Trend analysis of Off‐line Billing CDRs On‐line rating integrity Accuracy of OCG processing (sample) MoneyMap/RBV Off‐line rating integrity Accuracy of Off‐Line Billing (sample) MoneyMap/RBV Invoice integrity Accuracy of invoices for LTE customers MoneyMap/RBV LTE billing integrity Completeness of inputs to Off‐Line billing vs. MoneyMap rated CDRs Billing Service Policies by OCG rated records vs. Service Policies MoneyMap customer type Off‐Line rated records vs. Service Policies | www.cvidya.com | info@cvidya.com
Title Document Type 2.2 Fraud Management Threat Control Solution Platform Manipulation of HSS data Look for fraud characteristics: MoneyMap + HSS vs. CRM/Bill FraudView HSS vs. Service Policies Manipulation of SPR data Look for fraud characteristics: MoneyMap + SPR vs. CRM/Bill FraudView SPR vs. Service Policies Manipulation of OCG data Look for fraud characteristics: MoneyMap + OCG vs. CRM/Bill FraudView OCG vs. Service Policies OCG vs. IN Unauthorized usage Usage CDRs by blocked/non registered users FraudView Illegal usage Usage CDRs for non authorized services FraudView Illegal bandwidth utilization Usage CDRs with QoS exceeding registered FraudView services Large utilized bandwidth (risk of MoneyMap + piggybacking) FraudView Service Policies violating usage Usage superseding service policies FraudView Suspicious usage Large usage counts FraudView Large usage payloads Large usage during irregular hours/time bands “Hot Listed” usage “Behavior” violating usage (large deviations from average usage) Suspicious service configuration Look for “non authorized”/suspicious access FraudView/Internal (CRM/Billing/HSS/SPR/OCG) or service configuration fraud Service violating configuration Look for “non authorized”/suspicious access FraudView / Internal (CRM/Billing/HSS/SPR/OCG) or service configuration fraud | www.cvidya.com | info@cvidya.com
Title Document Type 2.3 Revenue Management Control Points Figure 4 below, outlines the major data sources (or control points) required for both Revenue Assurance and Fraud Management Business Support Systems Conf. Conf. Conf. Service Billing Configuration CRM Portal System CDRs Conf. Peering & IP Multimedia Interconnect CDRs Billing Subsystem CDRs Conf. Application CDRs Servers CSCF Conf. HSS MGW CDRs MME Conf. Conf. CDRs On‐Line Off‐Line e‐NodeB Charging Charging S‐GW P‐GW CDRs Radio Access Network RCEF CDRs Evolved Packet Core PCRF Conf. Conf. Represents Subscriber or Service information SPR Conf. CDRs Represents Usage Records Figure 4 – LTE Control Points | www.cvidya.com | info@cvidya.com
Title Document Type 3 About cVidya cVidya Networks is a global leader of Revenue Analytics solutions for telecom, media and entertainment service providers. Innovative cVidya solutions serve to maximize margins, improve customer experience and optimize ecosystem relationships by encompassing Revenue Assurance, Fraud Management, Operational Risk Management & Compliance, Sales Performance Management and Pricing Analytics. The cVidya experts and consultants have established a stellar track record by achieving rapid ROI and lower TCO for over 150 customers. Operating regional offices worldwide, cVidya has partnered with leading vendors to implement an impressive base of operational solutions. cVidya’s customers include British Telecom, Telefonica Group, Vodafone Group, AT&T, O2, MTN and Swisscom. Follow us on Facebook, Linkedin, Twitter or visit us at www.cvidya.com and YouTube. | www.cvidya.com | info@cvidya.com
You can also read