The only publication dedicated to OSS Volume 1, Issue 7 - November 2004 |
|
A “Telecom General’s” Warning: IP May Be Dangerous to Your HealthStrategies for avoiding a “dumb pipe” fateBy Jonathan Morgan, vice president product marketing, Tatara SystemsIf Telecom had a counterpart to the Surgeon General, the “Telecom General’s” warning would read something like this: IP may be dangerous to carriers’ long term business health. It’s well known that the migration to IP is changing the telecom world, but everyone is so focused on cost-benefit analyses and “cool” applications that we’ve lost sight of one key factor: IP takes control away from the traditional service provider. IP separates network ownership from customer ownership. Any company can offer application services across networks they don’t own, which could relegate the carrier’s offering to nothing more than a connectivity pipe. No More Dumb Pipe Billing in the “extended network” IP world requires a whole new approach to collecting information; one that is client-server based rather than exclusively network-based. Instead of installing network hardware that collects the necessary usage information and transfers it to a billing or mediation system, a software-based client that sits on the end user's device can be used to collect that information and deliver back to a gateway connected to existing mediation or billing platforms. This approach is advantageous because the client software can determine which applications an individual is using, thus allowing a service provider to bill according to application. By examining the IP packets being transferred, the client can determine key data such as which protocols are being used and which sites accessed. For example, if the client detects that SIP packets and real time transport (RTP) are in use, it will recognize a VoIP session. If RTP and real-time streaming protocol (RTSP) are in use, it's a streaming video session. Obtaining such information becomes more challenging when dealing with a VPN. In this case, IP packers can be examined before they reach the VPN. Client software can work in conjunction with an enterprise's security policy to ensure that visibility into the packets does not compromise security. Service providers must also ensure that the information regarding the IP packets is encrypted before being sent to the gateway. Securing the Extended Network
© 2004, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law. |