SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
M2M
                                                                     - Connectivity value chain




ASPIDER     M2M,     the     fully   owned     subsidiary   of     switch your SIM’s and customers between different Radio
ASPIDER Solutions, delivers 1-SIM solutions for                    Networks of competing operators.
M2M data connection using global GSM and UMTS                      Support Systems: to support the operations of the
networks. This Whitepaper will give an overview of                 mobile network the support systems will calculate the
the services of ASPIDER M2M, and it will especially                usage      of   each      subscriber,      it   will    together      with
highlight the position of ASPIDER M2M in the Mobile                functionalities       from    the     core      network      police       the
Value Chain. To do so this paper will cover Mobile                 communication network to alert on fraudulent usage or
Network basics, the various type of companies                      malfunctioning devices, it will calculate the bill of each
involved and ASPIDER’s services.                                   SIM or group of SIM’s, and send invoices based on that. It
                                                                   will match incoming payments to invoices sent, alert on
                                                                   late-payments and shut-off connections of defaulting
Mobile Network Basics                                              subscribers.
Antenna’s, SIM’s & support Systems: ASPIDER’s services             Marketing & sales: with the previous three elements
can be best understood by examining            it’s role in the    generating      the    service,     last   element       considers        the
Mobile Value Chain, which can be divided in the following          marketing and sales of the service. Often operated by one
parts: the GSM/UMTS Radio Network, the Core Mobile                 of the divisions of the Mobile Network Operator, often also
Network, the Support Systems and the Marketing & Sales             done with resellers or MVNO’s: organizations buying large
activities. Doing this we will illustrate the difference           volumes of SIM cards and resell to the market, sometimes
between ASPIDER M2M and a MNO (Mobile Network                      under their brand name. MVNO’s are particularly active in
Operator) or MVNO (Mobile Virtual Network Operator),               niche markets, not addressed directly via the mainstream
and the different position ASPIDER M2M has regarding               propositions of the MNO’s.
innovation power.                                                  See figure 1 for a summary of the mobile value chain.
Radio Network: The first component in the Mobile Value
Chain is the Radio Network: the physical antenna’s in the
field, linking a mobile phone or M2M module via the radio
waves from the antenna to the second element: the Core
Network. Typically there are between 2 to 4 Radio
Networks operating in an area, most commonly owned by
a Mobile Network Operator. Typically, a Mobile Network
Operator will not only use the Radio Network for it’s own
use, but will sell capacity to other Network Operators, for
example for international roaming usage, or to resell the
                                                                                                                                                   Mobile Value Chain explained
airtime to MVNO’s or other resellers.                              Figure 1 – the Mobile Value Chain
Core network: the core network connects to the Radio
Network, and provides various critical systems for the             Type of players in the Mobile Communications area
technical operations of mobile connectivity: it knows              MNO (Mobile Network Operators): MNO’s are the
where subscribers are, checks if they are allowed on the           dominant players in the market: they own a Radio
network and routes voice and data traffic to other                 Network, and most commonly fully operate, market and
(mobile-) networks or the internet. To check if a device is        sell at least part of the services they generate. In general
permitted to connect to the radio network, it will compare         MNO’s do sell part of their network capacity in a wholesale
it’s security keys to the key’s present at the Subscriber          model leaving others the opportunity to brand, market
Identification Module, the SIM. It also runs critical security     and sell it to end-customers. This is in general done the
processes preventing fraudulent usage of the mobile                following ways:
network     subscriptions.     To     be     truly   operator      reseller-MVNO: reseller-MVNO’s (Mobile Virtual Network
independent one should own and operate the Core                    Operators) buy large quantities of SIM cards, print their
Mobile Network, as it is this core which enables you to
                                                                  Trademarks and logos are used with permission. Information correct at time

                                                                  of print. E&OE. All rights reserved. © ASPIDER 2010. 10/2008 version 1.0
M2M
                                                                    - Connectivity value chain




brand name on it and market and sell the service to end-          core mobile network via one of the antenna’s of the Radio
customers.                                                        Network. Having the bits and bytes finding their entry into
light-MVNO’s: just as reseller-MVNO’s they resell SIM             the mobile network via the Radio Network (the antenna’s)
cards although they do part of the support and operations         the device will connect with the Core Mobile Network
of the support systems themselves. In M2M, they typically         components to gain actual access to the network, and to
buy SIM cards from MNO’s, resell them under their own             see its connection being terminated to the internet or
brand and do part of the billing themselves, supported            other (mobile-) networks. See figure 3 for an overall
with a Control Centre typically build in front of the existing    picture of the data and information flows from an M2M
support systems of the Mobile Network Operator.                   device connected to the network.
full-MVNO: in case of a full-MVNO, the MVNO does run a
full Core Mobile Network and all necessary support
systems. Most often such a full-MVNO has it’s own Mobile
Network code and Radio Network Access contracts,
providing the full service. There are various voice full-
MVNO’s, although globally there is at the moment only
one full-MVNO for M2M applications: ASPIDER M2M.
MVNE: a Mobile Virtual Network Enabler (MVNE) provides
                                                                  Figure 3 – overview of M2M connectivity service
outsourcing operations, meaning it will engineer and
operate parts of the services for the Mobile Network
                                                                  Where M2M devices connect with
Operators or for MVNOs, either in-house on operator
                                                                  As can also be seen in figure 3 is that M2M data is being
equipment or on its own core network and support
                                                                  passed via the GSM antenna to the core network where it
systems. ASPIDER Solutions is such a company, providing
                                                                  is redirected to customer networks or the internet. The
mobile core network and the support systems, mostly on
                                                                  core-network then passes on information about het usage
its company owned and operated core mobile network and
                                                                  to    the     support    systems,      which     will   provide     usage
support systems. In general MVNE’s act as cost-savers for
                                                                  information and billing services to the customer who did
Mobile Network Operators and MVNOs. See figure 2 for
                                                                  deploy the M2M unit.
the place of MNO’s and MVNO’s in the value chain, and
                                                                  It should be noted here that the GSM antennas act as just
ASPIDER Solutions and ASPIDER M2M.
                                                                  a layer to route the traffic to the core network: support of
                                                                  the connection is managed by the core mobile network
                                                                  and    it’s    support     systems,      a.o.    the    Authentication,
                                                                  Authorization and Accounting functions, Critical security
                                                                  features like fraud management and security are managed
                                                                                                                                              Mobile Value Chain explained
                                                                  by the core mobile network and support systems.


                                                                  Innovation power
                                                                  To innovate on billing concepts, SIM solutions and fraud
                                                                  management and safety features, control over the core
                                                                  mobile network is essential. It is in the core mobile
                                                                  network and the support systems the core mobile network
                                                                  interfaces with, where unique features can be developed.
Figure 2: MNO’s, MVNO’s and ASPIDER in the Value Chain
                                                                  For example SIM cards or other SIM solutions are serving
                                                                  as a Subscriber Identification Module for the core network,
M2M devices and the Mobile Network
                                                                  to authenticate the rightful access to the network.
Deploying M2M devices, the M2M device will (most
                                                                  Innovating on this, for example by introducing different
probably using a GSM module or modem) connect to the
                                                                  SIM form factors, or new solutions like software SIM’s

                                                                 Trademarks and logos are used with permission. Information correct at time

                                                                 of print. E&OE. All rights reserved. © ASPIDER 2010. 10/2008 version 1.0
M2M
                                                                             - Connectivity value chain




embedded in the module firmware, require full control and                  150 GSM networks in 60 countries, it has the unmatched
ownership of the core network solution.                                    capability to offer connectivity in its whole footprint with
                                                                           one single SIM card.
Technical stability                                                        More importantly, having our roots in telecom network
As the M2M devices directly interact to the core mobile                    engineering we know the importance of good engineering
network, and the management of the service including                       practices – ensuring your technical solution is met with
fraud management and billing are managed by or via this                    the right and sound technical features. In addition to this,
core mobile network, the stability of the connection and                   ASPIDER did take          advantage of its technical capabilities
the services surrounding it are mainly dependent on the                    combined with its long experience in the M2M market to
core mobile network and its support systems. Therefore                     innovate a unique and unmatched feature set. The bottom
one should test a solution for each type of core mobile                    line is: ASPIDER is not afraid of being ‘just’ the bitpipe for
network it connects with. As ASPIDER M2M does connect                      M2M applications. Since we are convinced we build the
to Radio Networks around the globe using its own core                      most intelligent, the most stable and the most cost
mobile network using ASPIDER SIM cards, devices using                      efficient bitpipe in the market including a wide set of
an ASPIDER SIM will –around the globe- always connect                      Value Added Services as centralized, smart data-collection
with one and the same core mobile network. Not only                        and smart data-management.
does this relieve you from re-testing the solution in case
of new geographical deployments, it also ensures you will                  ASPIDER’s services for connectivity resellers
only have one billing and support contact for worldwide                    Having our roots in providing the services and operations
deployment. Bringing you an identical feature set over                     to enable others to sell connectivity, this is still the main
multiple operators, multiple countries                                     go-to-market approach for ASPIDER M2M. Being a volume
                                                                           player      on      providing       connectivity        and      platform
ASPIDER Solutions:                                                         functionality, we actively reach out to companies wishing
Outsourced Telecom Engineering and Operations                              to re-sell, cross-sell or embed mobile connectivity in or
ASPIDER M2M has its roots in ASPIDER Solutions: the                        with their offering.
leader        in     Telecom     Engineering       and     Operations      Are you in the possession of a brand-name and/or sales
Outsourcing.          Its   offerings    include   engineering     and     force reaching potential M2M connectivity customers?
operations of core mobile networks as well as the various                  Reach out to ASPIDER M2M to discuss opportunities of
support systems (both operational and business support                     adding connectivity to you portfolio. Having our roots in
systems)           needed   to   run     mobile    telecommunication       doing this, we have the operational and business support
services. Its customers include Tier-1 Mobile Network                      systems required to enable you in making your brand
Operators like T-Mobile and Vodafone, and includes                         mobile or let you sales force sell mobile data. Services
                                                                                                                                                        Mobile Value Chain explained
services ranging from full handling of mobile connectivity                 range     from     comprehensive         real-time     billing    engines
on     the    ASPIDER       owned       and   operated    core   mobile    eliminating credit-risk and providing out-of-the box billing
network, to operating the call-center handling customer                    solutions     to    manage        billing   relationships        to   your
inquiries.                                                                 customers.         Our    services      range       from      white-label
In short: ASPIDER Solutions business has always been                       connectivity for established M2M MVNO’s or module
that     of        empowering      either     operators     or    other    manufacturers to ASPIDER M2M branded connectivity for
organizations (reseller MVNO’s) to market and sell the                     embedded hardware resellers.
connectivity we engineer and operate.


ASPIDER M2M: 1 core-network, worldwide coverage
Benefiting from the ASPIDER Solutions core asset of
efficient      and     innovative       Telecom    Engineering     and
operations, ASPIDER M2M is for already 10 years active in
the M2M market. With global connectivity now spanning
                                                                          Trademarks and logos are used with permission. Information correct at time

                                                                          of print. E&OE. All rights reserved. © ASPIDER 2010. 10/2008 version 1.0
M2M
                                                - Connectivity value chain




Figure 4 – Summary of ASPIDER M2M Services




For more information please visit
www.aspidersolutions.com

                                                                                                                          Mobile Value Chain explained
Contact details:


EMEA (HQ)
Wipmolenlaan 1                                Americas

3447 GJ Woerden                               81 Washington Street

The Netherlands                               Salem, Boston

T: + 31 (0) 348-500400                        MA 01970, USA

F: + 31 (0) 348-501103                        Phone: +1 781 820 4424

M: info@aspidersolutions.com                  Fax: +1 781 574 4474

W: www.aspidersolutions.com                   Email: david.traynor@aspidersolutions.com




                                             Trademarks and logos are used with permission. Information correct at time

                                             of print. E&OE. All rights reserved. © ASPIDER 2010. 10/2008 version 1.0

Mais conteúdo relacionado

Mais procurados

System Introduction
System IntroductionSystem Introduction
System IntroductionSokunth Che
 
Wirelessstandards2009 08-19final
Wirelessstandards2009 08-19finalWirelessstandards2009 08-19final
Wirelessstandards2009 08-19finalzimran02
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationRotract CLUB of BSAU
 
Student -gsm_architecturesahan
Student  -gsm_architecturesahanStudent  -gsm_architecturesahan
Student -gsm_architecturesahanasalet9999
 
Implementation Of Bss And Nss In Mobile Communication
Implementation Of Bss And Nss In Mobile CommunicationImplementation Of Bss And Nss In Mobile Communication
Implementation Of Bss And Nss In Mobile CommunicationRajan Kumar
 
Mesh radio based ami solution robulink
Mesh radio based ami solution robulinkMesh radio based ami solution robulink
Mesh radio based ami solution robulinkjessie968
 
Mobile Broadband World (Neutral Host Networks) Al Davidson
Mobile Broadband World (Neutral Host Networks) Al DavidsonMobile Broadband World (Neutral Host Networks) Al Davidson
Mobile Broadband World (Neutral Host Networks) Al Davidsonstephen_arnold
 
Understanding lte guide
Understanding lte guideUnderstanding lte guide
Understanding lte guideGreg Reyes
 
Machines are doing most of the talking
Machines are doing most of the talkingMachines are doing most of the talking
Machines are doing most of the talkingRSComponentsTCC
 
Paper
PaperPaper
Paperboraq
 

Mais procurados (16)

System Introduction
System IntroductionSystem Introduction
System Introduction
 
GSM ARCHITECTURE
GSM ARCHITECTUREGSM ARCHITECTURE
GSM ARCHITECTURE
 
Wirelessstandards2009 08-19final
Wirelessstandards2009 08-19finalWirelessstandards2009 08-19final
Wirelessstandards2009 08-19final
 
Security model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentationSecurity model evaluation of 3 g wireless network1 paper presentation
Security model evaluation of 3 g wireless network1 paper presentation
 
Student -gsm_architecturesahan
Student  -gsm_architecturesahanStudent  -gsm_architecturesahan
Student -gsm_architecturesahan
 
Implementation Of Bss And Nss In Mobile Communication
Implementation Of Bss And Nss In Mobile CommunicationImplementation Of Bss And Nss In Mobile Communication
Implementation Of Bss And Nss In Mobile Communication
 
Mesh radio based ami solution robulink
Mesh radio based ami solution robulinkMesh radio based ami solution robulink
Mesh radio based ami solution robulink
 
PID3902073
PID3902073PID3902073
PID3902073
 
Mobile Broadband World (Neutral Host Networks) Al Davidson
Mobile Broadband World (Neutral Host Networks) Al DavidsonMobile Broadband World (Neutral Host Networks) Al Davidson
Mobile Broadband World (Neutral Host Networks) Al Davidson
 
170 176
170 176170 176
170 176
 
Sp am iand_beyond
Sp am iand_beyondSp am iand_beyond
Sp am iand_beyond
 
Understanding lte guide
Understanding lte guideUnderstanding lte guide
Understanding lte guide
 
20111207 smartsynch english
20111207 smartsynch english20111207 smartsynch english
20111207 smartsynch english
 
Machines are doing most of the talking
Machines are doing most of the talkingMachines are doing most of the talking
Machines are doing most of the talking
 
Paper
PaperPaper
Paper
 
Ch09
Ch09Ch09
Ch09
 

Destaque

Opportunity Analysis and Strategy Development for smartphone mobile medical a...
Opportunity Analysis and Strategy Development for smartphone mobile medical a...Opportunity Analysis and Strategy Development for smartphone mobile medical a...
Opportunity Analysis and Strategy Development for smartphone mobile medical a...Damon Gjording
 
Monetization - The Right Business Model for Your Digital Assets
Monetization - The Right Business Model for Your Digital AssetsMonetization - The Right Business Model for Your Digital Assets
Monetization - The Right Business Model for Your Digital AssetsApigee | Google Cloud
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysisDipesh Sharma
 
Target Corporation - Strategic Analysis
Target Corporation - Strategic AnalysisTarget Corporation - Strategic Analysis
Target Corporation - Strategic AnalysisKyle Brown
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysisMonish rm
 

Destaque (6)

Mobile app value
Mobile app valueMobile app value
Mobile app value
 
Opportunity Analysis and Strategy Development for smartphone mobile medical a...
Opportunity Analysis and Strategy Development for smartphone mobile medical a...Opportunity Analysis and Strategy Development for smartphone mobile medical a...
Opportunity Analysis and Strategy Development for smartphone mobile medical a...
 
Monetization - The Right Business Model for Your Digital Assets
Monetization - The Right Business Model for Your Digital AssetsMonetization - The Right Business Model for Your Digital Assets
Monetization - The Right Business Model for Your Digital Assets
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysis
 
Target Corporation - Strategic Analysis
Target Corporation - Strategic AnalysisTarget Corporation - Strategic Analysis
Target Corporation - Strategic Analysis
 
Value chain analysis
Value chain analysisValue chain analysis
Value chain analysis
 

Semelhante a Aspider M2M In The Mobile Value Chain Jan 2011

Report on gsm vodafone
Report on gsm vodafoneReport on gsm vodafone
Report on gsm vodafoneRohit Sharma
 
M2M industry overview 2012
M2M industry overview 2012M2M industry overview 2012
M2M industry overview 2012Ahmad Yokasano
 
M2M Market Analysis, SDP Global Summit
M2M Market Analysis, SDP Global Summit M2M Market Analysis, SDP Global Summit
M2M Market Analysis, SDP Global Summit Alan Quayle
 
Module 2 M2M, SDN, VNF.pptx...............
Module 2 M2M, SDN, VNF.pptx...............Module 2 M2M, SDN, VNF.pptx...............
Module 2 M2M, SDN, VNF.pptx...............spreya772
 
Mvno types and best practices (2)
Mvno types and best practices (2)Mvno types and best practices (2)
Mvno types and best practices (2)Fatemeh Mehdibarzi
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptxhazhamina
 
M2 m trends marceli passoni_webinar
M2 m trends marceli passoni_webinarM2 m trends marceli passoni_webinar
M2 m trends marceli passoni_webinarRafael Junquera
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft systemAshu0711
 
An Introduction to GSM
An Introduction to GSM An Introduction to GSM
An Introduction to GSM sabumt
 
Student -gsm_architecture
Student  -gsm_architectureStudent  -gsm_architecture
Student -gsm_architectureHaval Sharafany
 
Gsm energy meter
Gsm energy meterGsm energy meter
Gsm energy meterikm104
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAshu0711
 
5 g network-slicing-report
5 g network-slicing-report5 g network-slicing-report
5 g network-slicing-reportermnas2482
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )Joanna Paulsen
 

Semelhante a Aspider M2M In The Mobile Value Chain Jan 2011 (20)

Report on gsm vodafone
Report on gsm vodafoneReport on gsm vodafone
Report on gsm vodafone
 
M2M industry overview 2012
M2M industry overview 2012M2M industry overview 2012
M2M industry overview 2012
 
M2M Market Analysis, SDP Global Summit
M2M Market Analysis, SDP Global Summit M2M Market Analysis, SDP Global Summit
M2M Market Analysis, SDP Global Summit
 
01362503
0136250301362503
01362503
 
Lightweight M2M
Lightweight M2MLightweight M2M
Lightweight M2M
 
Module 2 M2M, SDN, VNF.pptx...............
Module 2 M2M, SDN, VNF.pptx...............Module 2 M2M, SDN, VNF.pptx...............
Module 2 M2M, SDN, VNF.pptx...............
 
Mvno types and best practices (2)
Mvno types and best practices (2)Mvno types and best practices (2)
Mvno types and best practices (2)
 
6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx6_2019_04_17!05_57_06_AM.pptx
6_2019_04_17!05_57_06_AM.pptx
 
M2 m trends marceli passoni_webinar
M2 m trends marceli passoni_webinarM2 m trends marceli passoni_webinar
M2 m trends marceli passoni_webinar
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft system
 
Managing the Internet of Things
Managing the Internet of ThingsManaging the Internet of Things
Managing the Internet of Things
 
An Introduction to GSM
An Introduction to GSM An Introduction to GSM
An Introduction to GSM
 
Student -gsm_architecture
Student  -gsm_architectureStudent  -gsm_architecture
Student -gsm_architecture
 
Gsm energy meter
Gsm energy meterGsm energy meter
Gsm energy meter
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 final
 
5 g network-slicing-report
5 g network-slicing-report5 g network-slicing-report
5 g network-slicing-report
 
M2M Day Two
M2M Day TwoM2M Day Two
M2M Day Two
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )
 
MVNO
MVNOMVNO
MVNO
 

Aspider M2M In The Mobile Value Chain Jan 2011

  • 1. M2M - Connectivity value chain ASPIDER M2M, the fully owned subsidiary of switch your SIM’s and customers between different Radio ASPIDER Solutions, delivers 1-SIM solutions for Networks of competing operators. M2M data connection using global GSM and UMTS Support Systems: to support the operations of the networks. This Whitepaper will give an overview of mobile network the support systems will calculate the the services of ASPIDER M2M, and it will especially usage of each subscriber, it will together with highlight the position of ASPIDER M2M in the Mobile functionalities from the core network police the Value Chain. To do so this paper will cover Mobile communication network to alert on fraudulent usage or Network basics, the various type of companies malfunctioning devices, it will calculate the bill of each involved and ASPIDER’s services. SIM or group of SIM’s, and send invoices based on that. It will match incoming payments to invoices sent, alert on late-payments and shut-off connections of defaulting Mobile Network Basics subscribers. Antenna’s, SIM’s & support Systems: ASPIDER’s services Marketing & sales: with the previous three elements can be best understood by examining it’s role in the generating the service, last element considers the Mobile Value Chain, which can be divided in the following marketing and sales of the service. Often operated by one parts: the GSM/UMTS Radio Network, the Core Mobile of the divisions of the Mobile Network Operator, often also Network, the Support Systems and the Marketing & Sales done with resellers or MVNO’s: organizations buying large activities. Doing this we will illustrate the difference volumes of SIM cards and resell to the market, sometimes between ASPIDER M2M and a MNO (Mobile Network under their brand name. MVNO’s are particularly active in Operator) or MVNO (Mobile Virtual Network Operator), niche markets, not addressed directly via the mainstream and the different position ASPIDER M2M has regarding propositions of the MNO’s. innovation power. See figure 1 for a summary of the mobile value chain. Radio Network: The first component in the Mobile Value Chain is the Radio Network: the physical antenna’s in the field, linking a mobile phone or M2M module via the radio waves from the antenna to the second element: the Core Network. Typically there are between 2 to 4 Radio Networks operating in an area, most commonly owned by a Mobile Network Operator. Typically, a Mobile Network Operator will not only use the Radio Network for it’s own use, but will sell capacity to other Network Operators, for example for international roaming usage, or to resell the Mobile Value Chain explained airtime to MVNO’s or other resellers. Figure 1 – the Mobile Value Chain Core network: the core network connects to the Radio Network, and provides various critical systems for the Type of players in the Mobile Communications area technical operations of mobile connectivity: it knows MNO (Mobile Network Operators): MNO’s are the where subscribers are, checks if they are allowed on the dominant players in the market: they own a Radio network and routes voice and data traffic to other Network, and most commonly fully operate, market and (mobile-) networks or the internet. To check if a device is sell at least part of the services they generate. In general permitted to connect to the radio network, it will compare MNO’s do sell part of their network capacity in a wholesale it’s security keys to the key’s present at the Subscriber model leaving others the opportunity to brand, market Identification Module, the SIM. It also runs critical security and sell it to end-customers. This is in general done the processes preventing fraudulent usage of the mobile following ways: network subscriptions. To be truly operator reseller-MVNO: reseller-MVNO’s (Mobile Virtual Network independent one should own and operate the Core Operators) buy large quantities of SIM cards, print their Mobile Network, as it is this core which enables you to Trademarks and logos are used with permission. Information correct at time of print. E&OE. All rights reserved. © ASPIDER 2010. 10/2008 version 1.0
  • 2. M2M - Connectivity value chain brand name on it and market and sell the service to end- core mobile network via one of the antenna’s of the Radio customers. Network. Having the bits and bytes finding their entry into light-MVNO’s: just as reseller-MVNO’s they resell SIM the mobile network via the Radio Network (the antenna’s) cards although they do part of the support and operations the device will connect with the Core Mobile Network of the support systems themselves. In M2M, they typically components to gain actual access to the network, and to buy SIM cards from MNO’s, resell them under their own see its connection being terminated to the internet or brand and do part of the billing themselves, supported other (mobile-) networks. See figure 3 for an overall with a Control Centre typically build in front of the existing picture of the data and information flows from an M2M support systems of the Mobile Network Operator. device connected to the network. full-MVNO: in case of a full-MVNO, the MVNO does run a full Core Mobile Network and all necessary support systems. Most often such a full-MVNO has it’s own Mobile Network code and Radio Network Access contracts, providing the full service. There are various voice full- MVNO’s, although globally there is at the moment only one full-MVNO for M2M applications: ASPIDER M2M. MVNE: a Mobile Virtual Network Enabler (MVNE) provides Figure 3 – overview of M2M connectivity service outsourcing operations, meaning it will engineer and operate parts of the services for the Mobile Network Where M2M devices connect with Operators or for MVNOs, either in-house on operator As can also be seen in figure 3 is that M2M data is being equipment or on its own core network and support passed via the GSM antenna to the core network where it systems. ASPIDER Solutions is such a company, providing is redirected to customer networks or the internet. The mobile core network and the support systems, mostly on core-network then passes on information about het usage its company owned and operated core mobile network and to the support systems, which will provide usage support systems. In general MVNE’s act as cost-savers for information and billing services to the customer who did Mobile Network Operators and MVNOs. See figure 2 for deploy the M2M unit. the place of MNO’s and MVNO’s in the value chain, and It should be noted here that the GSM antennas act as just ASPIDER Solutions and ASPIDER M2M. a layer to route the traffic to the core network: support of the connection is managed by the core mobile network and it’s support systems, a.o. the Authentication, Authorization and Accounting functions, Critical security features like fraud management and security are managed Mobile Value Chain explained by the core mobile network and support systems. Innovation power To innovate on billing concepts, SIM solutions and fraud management and safety features, control over the core mobile network is essential. It is in the core mobile network and the support systems the core mobile network interfaces with, where unique features can be developed. Figure 2: MNO’s, MVNO’s and ASPIDER in the Value Chain For example SIM cards or other SIM solutions are serving as a Subscriber Identification Module for the core network, M2M devices and the Mobile Network to authenticate the rightful access to the network. Deploying M2M devices, the M2M device will (most Innovating on this, for example by introducing different probably using a GSM module or modem) connect to the SIM form factors, or new solutions like software SIM’s Trademarks and logos are used with permission. Information correct at time of print. E&OE. All rights reserved. © ASPIDER 2010. 10/2008 version 1.0
  • 3. M2M - Connectivity value chain embedded in the module firmware, require full control and 150 GSM networks in 60 countries, it has the unmatched ownership of the core network solution. capability to offer connectivity in its whole footprint with one single SIM card. Technical stability More importantly, having our roots in telecom network As the M2M devices directly interact to the core mobile engineering we know the importance of good engineering network, and the management of the service including practices – ensuring your technical solution is met with fraud management and billing are managed by or via this the right and sound technical features. In addition to this, core mobile network, the stability of the connection and ASPIDER did take advantage of its technical capabilities the services surrounding it are mainly dependent on the combined with its long experience in the M2M market to core mobile network and its support systems. Therefore innovate a unique and unmatched feature set. The bottom one should test a solution for each type of core mobile line is: ASPIDER is not afraid of being ‘just’ the bitpipe for network it connects with. As ASPIDER M2M does connect M2M applications. Since we are convinced we build the to Radio Networks around the globe using its own core most intelligent, the most stable and the most cost mobile network using ASPIDER SIM cards, devices using efficient bitpipe in the market including a wide set of an ASPIDER SIM will –around the globe- always connect Value Added Services as centralized, smart data-collection with one and the same core mobile network. Not only and smart data-management. does this relieve you from re-testing the solution in case of new geographical deployments, it also ensures you will ASPIDER’s services for connectivity resellers only have one billing and support contact for worldwide Having our roots in providing the services and operations deployment. Bringing you an identical feature set over to enable others to sell connectivity, this is still the main multiple operators, multiple countries go-to-market approach for ASPIDER M2M. Being a volume player on providing connectivity and platform ASPIDER Solutions: functionality, we actively reach out to companies wishing Outsourced Telecom Engineering and Operations to re-sell, cross-sell or embed mobile connectivity in or ASPIDER M2M has its roots in ASPIDER Solutions: the with their offering. leader in Telecom Engineering and Operations Are you in the possession of a brand-name and/or sales Outsourcing. Its offerings include engineering and force reaching potential M2M connectivity customers? operations of core mobile networks as well as the various Reach out to ASPIDER M2M to discuss opportunities of support systems (both operational and business support adding connectivity to you portfolio. Having our roots in systems) needed to run mobile telecommunication doing this, we have the operational and business support services. Its customers include Tier-1 Mobile Network systems required to enable you in making your brand Operators like T-Mobile and Vodafone, and includes mobile or let you sales force sell mobile data. Services Mobile Value Chain explained services ranging from full handling of mobile connectivity range from comprehensive real-time billing engines on the ASPIDER owned and operated core mobile eliminating credit-risk and providing out-of-the box billing network, to operating the call-center handling customer solutions to manage billing relationships to your inquiries. customers. Our services range from white-label In short: ASPIDER Solutions business has always been connectivity for established M2M MVNO’s or module that of empowering either operators or other manufacturers to ASPIDER M2M branded connectivity for organizations (reseller MVNO’s) to market and sell the embedded hardware resellers. connectivity we engineer and operate. ASPIDER M2M: 1 core-network, worldwide coverage Benefiting from the ASPIDER Solutions core asset of efficient and innovative Telecom Engineering and operations, ASPIDER M2M is for already 10 years active in the M2M market. With global connectivity now spanning Trademarks and logos are used with permission. Information correct at time of print. E&OE. All rights reserved. © ASPIDER 2010. 10/2008 version 1.0
  • 4. M2M - Connectivity value chain Figure 4 – Summary of ASPIDER M2M Services For more information please visit www.aspidersolutions.com Mobile Value Chain explained Contact details: EMEA (HQ) Wipmolenlaan 1 Americas 3447 GJ Woerden 81 Washington Street The Netherlands Salem, Boston T: + 31 (0) 348-500400 MA 01970, USA F: + 31 (0) 348-501103 Phone: +1 781 820 4424 M: info@aspidersolutions.com Fax: +1 781 574 4474 W: www.aspidersolutions.com Email: david.traynor@aspidersolutions.com Trademarks and logos are used with permission. Information correct at time of print. E&OE. All rights reserved. © ASPIDER 2010. 10/2008 version 1.0