The only publication dedicated to OSS     Volume 1, Issue 7 - November 2004
Current Issue
  Cover Page
  Consolidation I
  Consolidation II
  OSS Leap
  Gen's Warning
  Q&A: HP
News Brief
Subscribe
About Us
Archives
Ed-Opps
Ad-Opps
Advertisers
Sponsors

A “Telecom General’s” Warning: IP May Be Dangerous to Your Health Download and print this article

Strategies for avoiding a “dumb pipe” fate

By Jonathan Morgan, vice president product marketing, Tatara Systems

If Telecom had a counterpart to the Surgeon General, the “Telecom General’s” warning would read something like this: IP may be dangerous to carriers’ long term business health. It’s well known that the migration to IP is changing the telecom world, but everyone is so focused on cost-benefit analyses and “cool” applications that we’ve lost sight of one key factor: IP takes control away from the traditional service provider. IP separates network ownership from customer ownership. Any company can offer application services across networks they don’t own, which could relegate the carrier’s offering to nothing more than a connectivity pipe.

No More Dumb Pipe
Major telcos around the world are turning to content offerings to avoid a dump pipe fate. Remember that traditional carriers are just as able to enter the IP applications game as any new competitor. This means they'll need a way to track and bill for their content, particularly when they do not own or control the network that physically serves the customer.

Billing in the “extended network” IP world requires a whole new approach to collecting information; one that is client-server based rather than exclusively network-based. Instead of installing network hardware that collects the necessary usage information and transfers it to a billing or mediation system, a software-based client that sits on the end user's device can be used to collect that information and deliver back to a gateway connected to existing mediation or billing platforms.

This approach is advantageous because the client software can determine which applications an individual is using, thus allowing a service provider to bill according to application. By examining the IP packets being transferred, the client can determine key data such as which protocols are being used and which sites accessed. For example, if the client detects that SIP packets and real time transport (RTP) are in use, it will recognize a VoIP session. If RTP and real-time streaming protocol (RTSP) are in use, it's a streaming video session.

Obtaining such information becomes more challenging when dealing with a VPN. In this case, IP packers can be examined before they reach the VPN. Client software can work in conjunction with an enterprise's security policy to ensure that visibility into the packets does not compromise security. Service providers must also ensure that the information regarding the IP packets is encrypted before being sent to the gateway.

Securing the Extended Network
Because delivering applications rather than just connectivity requires that private information be exchanged constantly, security is necessary throughout the user experience. For enterprises, the only way to truly maintain security control is to adopt a client-server solution that insures that user credentials and usage information are never exposed to third parties. Even consumer-based carriers are implementing more complex systems to offer subscribers identity security and peace of mind.

 

Send Comment

 

Subscribe   About Us   Archives   Editorial Opportunities
Advertising Opportunities   News Brief   Advertisers   Sponsors

© 2004, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law.