SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Cellular Operators Must Recall the Main Objective of Network Offloading
(Disponible en Español)
Posted by jguzmanolaya on Sep 17, 2012 3:23:54 AM

When the usage of mobile Internet started to rise dramatically due to the enhanced capabilities of
smartphones, along with the increasing development of innovative applications and ecosystems around
wireless devices, Mobile Network Operators AKA Wireless Internet Services Providers, started to search
options to handle the huge increase in traffic that was not only affecting the quality of the data service,
but was also eroding the revenues due to costly expansions to allow the access to services that weren’t
even provided by WISPs. The costliest resource is the spectrum, it must not only carry the user traffic,
but the signaling that controls the access to the service; a big part of popular mobile applications use
today, need the exchange of tremendous amounts of signaling that summed to user traffic deplete the
available spectrum in the access part of the network and causes choke points in the core part. But the
plot thickens; the most popular and globally adopted cellular technologies do not make an efficient use
of the cellular spectrum, and as widely known now by MNOs, the devices producing the heavy traffic are
devices not exactly mobile, but nomadic! These and other issues are shifting the original objective of
offloading as a solution.

The Offloading Options for WSIP/MNO




The offload move is a critical maneuver in rugby. Image taken from:
http://www.rugbystoreblog.co.uk/2011/08/02/all-blacks-vs-south-africa-the-game-in-photos/

Before addressing the offloading issues, I would like to name briefly the options for MNO at the moment
of this blog realization; I separate them into two categories; Core techniques and Access Techniques.

Core Techniques:
1. Direct Tunnel: Is a technique that allows the user traffic to bypass the SGSN but the traffic of
       control signaling continues to cross such element.

    2. Gateway offloading: Takes advantage of network access protocol analysis and an additional
       network element to bypass user and control traffic that is intended to go directly to the Internet
       without any possibility of value addition by the WISP, here not only the SGSN but the GGSN is
       beneficiated.

    3. Traffic/Policy shaping: Uses complex algorithms, and deep user traffic inspection to apply
       procedures of content manipulation, like compression and catching to alleviate the choke points
       in the core.

Access Techniques:

    1. WiFi: Latest implementations use SIM based authentication protocols that eliminate the need of
       User/Password introduction.

    2. Femto and Pico Cells: These small versions of base stations use wired Internet access as
       backhaul to provide a smaller but closer and hence faster service.

    3. WiMax: This access technology can be used either to provide rural coverage or to target specific
       devices like USB dongles even as a mean to provide backhaul to WiFi AP’s.

KT (Korea Telecom) corporation is operating a 3W network integrated by WCDMA, WiFi and WiBRO
(Wireless Broadband using WiMAX) networks, this network operator has an interesting strategy of usage
and offloading policies that should be studied an adapted by other WISPs.

The rise of WiFi

A recent blog written by Stuart Taylor, highlights several findings from his study on the matter, the
document displays how this access technology is becoming the preferred option for several devices and
not only that, but the technology holds an incredible and favorable reputation among users, who sees it
as a cheaper, faster, easier, more reliable and even more secure when compared to cellular access, I was
really surprised about the perception of security. It was believed manual user and password
authentication would become an adoption obstacle, but current state of usage has proven otherwise,
plus the Wi-Fi Certified Passpoint program promises to transform the technology into a really seamless
and reliable access, so it will be logical that mobile device users begin to spend more time on the WiFi
access than in the cellular network, additionally if coverage continues to grow and the current tendency
of OEM to widen the offer of Wi-Fi only devices like tablets and portable readers that have a clearly
market advantage since can be sold without contract ties of permanence and costly cancelation fees,
then you’ll quickly end up with a substitute service in your hands.

A Network Built For a Rare User

In another document, Mr. Taylor and his colleagues concluded that mobile Internet access is nomadic,
and specifically is located at home, very different from the fully mobile Internet access that a cellular
network tries to provide. On the other hand and as mentioned previously, device availability is
contributing on the election of the network access, normally the first device acquired is an smartphone,
and so is very unlikely that mobile devices purchased later be tied to contracts or permanence clauses of
cellular providers, these devices obviously will be connected to the open not limited and faster Wi-Fi,
even more considering that tethering allows an easy way of sharing Internet access among devices.
Going Back to Basics

If the original objective was to provide a better service to the user then is time to start configuring it,
whether you are a cellular operator or a WISP using a mixture of access technologies, the increase of
data usage will always represent a risk for your service, and quick action must be taken understanding
that offloading is more a workaround and not a definitive solution, once offloading is in place the Mobile
Service Provider must:

    1. Speed up the adoption and/or usage of standardized technologies or available tools to use the
       available spectrum in a more efficient way.

    2. Evaluate the convenience of multiple access technology integration to the network architecture
       to take advantage of the inherent features of each one (E.G. KT 3W network)

    3. Not charge for Internet access that today is free or somewhat free; innovative revenue models
       must be created, even new ways to add value to the service (E.G QoS).

    4. Find a balance between Core offloading and Access offloading techniques.

    5. Ensure that its paid option of Internet access not only is secure but faster when compared to the
       free option used to offload.

    6. Ensure that enough value aggregated services, quality applications, new apealing but cellular
       dependable devices or engaging ecosystems are in place for the paid option in case faster access
       cannot be offered.

       For more discussion on everything mobile, visit the Service Provider Mobility Community at
                                www.cisco.com/go/mobilitycommunity.

Mais conteúdo relacionado

Mais de Cisco Service Provider Mobility

Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)Cisco Service Provider Mobility
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiCisco Service Provider Mobility
 
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...Cisco Service Provider Mobility
 
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperSimulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperCisco Service Provider Mobility
 
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Cisco Service Provider Mobility
 
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Cisco Service Provider Mobility
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)Cisco Service Provider Mobility
 
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Cisco Service Provider Mobility
 
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Cisco Service Provider Mobility
 
El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica Cisco Service Provider Mobility
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Cisco Service Provider Mobility
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Cisco Service Provider Mobility
 
Next-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptNext-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptCisco Service Provider Mobility
 

Mais de Cisco Service Provider Mobility (20)

Cisco quantum policy suite
Cisco quantum policy suiteCisco quantum policy suite
Cisco quantum policy suite
 
Cisco Use Case: Location-Based Advertising
Cisco Use Case: Location-Based AdvertisingCisco Use Case: Location-Based Advertising
Cisco Use Case: Location-Based Advertising
 
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-Fi
 
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
 
Defining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-FiDefining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-Fi
 
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperSimulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
 
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
 
SP Wi-Fi Monetization Thought Leadership
SP Wi-Fi Monetization Thought LeadershipSP Wi-Fi Monetization Thought Leadership
SP Wi-Fi Monetization Thought Leadership
 
Small Cells in the Enterprise
Small Cells in the EnterpriseSmall Cells in the Enterprise
Small Cells in the Enterprise
 
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)
 
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
 
5G: Your Questions Answered
5G: Your Questions Answered5G: Your Questions Answered
5G: Your Questions Answered
 
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
 
El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica
 
MATE Design (Data Sheet)
MATE Design (Data Sheet)MATE Design (Data Sheet)
MATE Design (Data Sheet)
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
 
Next-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptNext-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – Transcript
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Cellular Operators Must Recall the Main Objective of Network Offloading

  • 1. Cellular Operators Must Recall the Main Objective of Network Offloading (Disponible en Español) Posted by jguzmanolaya on Sep 17, 2012 3:23:54 AM When the usage of mobile Internet started to rise dramatically due to the enhanced capabilities of smartphones, along with the increasing development of innovative applications and ecosystems around wireless devices, Mobile Network Operators AKA Wireless Internet Services Providers, started to search options to handle the huge increase in traffic that was not only affecting the quality of the data service, but was also eroding the revenues due to costly expansions to allow the access to services that weren’t even provided by WISPs. The costliest resource is the spectrum, it must not only carry the user traffic, but the signaling that controls the access to the service; a big part of popular mobile applications use today, need the exchange of tremendous amounts of signaling that summed to user traffic deplete the available spectrum in the access part of the network and causes choke points in the core part. But the plot thickens; the most popular and globally adopted cellular technologies do not make an efficient use of the cellular spectrum, and as widely known now by MNOs, the devices producing the heavy traffic are devices not exactly mobile, but nomadic! These and other issues are shifting the original objective of offloading as a solution. The Offloading Options for WSIP/MNO The offload move is a critical maneuver in rugby. Image taken from: http://www.rugbystoreblog.co.uk/2011/08/02/all-blacks-vs-south-africa-the-game-in-photos/ Before addressing the offloading issues, I would like to name briefly the options for MNO at the moment of this blog realization; I separate them into two categories; Core techniques and Access Techniques. Core Techniques:
  • 2. 1. Direct Tunnel: Is a technique that allows the user traffic to bypass the SGSN but the traffic of control signaling continues to cross such element. 2. Gateway offloading: Takes advantage of network access protocol analysis and an additional network element to bypass user and control traffic that is intended to go directly to the Internet without any possibility of value addition by the WISP, here not only the SGSN but the GGSN is beneficiated. 3. Traffic/Policy shaping: Uses complex algorithms, and deep user traffic inspection to apply procedures of content manipulation, like compression and catching to alleviate the choke points in the core. Access Techniques: 1. WiFi: Latest implementations use SIM based authentication protocols that eliminate the need of User/Password introduction. 2. Femto and Pico Cells: These small versions of base stations use wired Internet access as backhaul to provide a smaller but closer and hence faster service. 3. WiMax: This access technology can be used either to provide rural coverage or to target specific devices like USB dongles even as a mean to provide backhaul to WiFi AP’s. KT (Korea Telecom) corporation is operating a 3W network integrated by WCDMA, WiFi and WiBRO (Wireless Broadband using WiMAX) networks, this network operator has an interesting strategy of usage and offloading policies that should be studied an adapted by other WISPs. The rise of WiFi A recent blog written by Stuart Taylor, highlights several findings from his study on the matter, the document displays how this access technology is becoming the preferred option for several devices and not only that, but the technology holds an incredible and favorable reputation among users, who sees it as a cheaper, faster, easier, more reliable and even more secure when compared to cellular access, I was really surprised about the perception of security. It was believed manual user and password authentication would become an adoption obstacle, but current state of usage has proven otherwise, plus the Wi-Fi Certified Passpoint program promises to transform the technology into a really seamless and reliable access, so it will be logical that mobile device users begin to spend more time on the WiFi access than in the cellular network, additionally if coverage continues to grow and the current tendency of OEM to widen the offer of Wi-Fi only devices like tablets and portable readers that have a clearly market advantage since can be sold without contract ties of permanence and costly cancelation fees, then you’ll quickly end up with a substitute service in your hands. A Network Built For a Rare User In another document, Mr. Taylor and his colleagues concluded that mobile Internet access is nomadic, and specifically is located at home, very different from the fully mobile Internet access that a cellular network tries to provide. On the other hand and as mentioned previously, device availability is contributing on the election of the network access, normally the first device acquired is an smartphone, and so is very unlikely that mobile devices purchased later be tied to contracts or permanence clauses of cellular providers, these devices obviously will be connected to the open not limited and faster Wi-Fi, even more considering that tethering allows an easy way of sharing Internet access among devices.
  • 3. Going Back to Basics If the original objective was to provide a better service to the user then is time to start configuring it, whether you are a cellular operator or a WISP using a mixture of access technologies, the increase of data usage will always represent a risk for your service, and quick action must be taken understanding that offloading is more a workaround and not a definitive solution, once offloading is in place the Mobile Service Provider must: 1. Speed up the adoption and/or usage of standardized technologies or available tools to use the available spectrum in a more efficient way. 2. Evaluate the convenience of multiple access technology integration to the network architecture to take advantage of the inherent features of each one (E.G. KT 3W network) 3. Not charge for Internet access that today is free or somewhat free; innovative revenue models must be created, even new ways to add value to the service (E.G QoS). 4. Find a balance between Core offloading and Access offloading techniques. 5. Ensure that its paid option of Internet access not only is secure but faster when compared to the free option used to offload. 6. Ensure that enough value aggregated services, quality applications, new apealing but cellular dependable devices or engaging ecosystems are in place for the paid option in case faster access cannot be offered. For more discussion on everything mobile, visit the Service Provider Mobility Community at www.cisco.com/go/mobilitycommunity.