SlideShare a Scribd company logo
1 of 10
Download to read offline
The communications technology journal since 1924 2014 • 7
Communications as a cloud service:
a new take on telecoms
July 22, 2014
Communications as a cloud
service: a new take on telecoms
Modern mobile networks are complex systems built with an increasingly broad variety of technologies
to serve a wide base of devices that provide an ever-greater range of services. These developments
create interesting business opportunities for operators. But they also bring challenges, as new
technologies and new expectations need to be managed with the same staff and budget.
of multi-tenancy capabilities to NFV
makesthisapproachparticularlyinter-
esting for global operators, who have a
presence in several countries and man-
agearangeofnetworksthroughvarious
operatingcompanies.
Apart from addressing the strain on
internal resources, NFV opens up the
opportunityforoperatorstoprovideser-
vices, like VoLTE, to other communi-
cation service providers. By deploying
the necessary IMS network functions
forservicesinacentralvirtualizeddata
center, and by adopting a SaaS model,
operators can unlock the potential of
their infrastructure beyond their own
portfolios.Virtualizedservicescanthen
be offered to smaller second and third
tier affiliates or MVNOs at a lower cost,
withreducedrisk,andwithinashorter
time frame than is normally associ-
ated with the introduction of new ser-
vicesusingtraditionaltelecombusiness
models.
The SaaS business model allows
an operator’s partners to circumvent
lengthy hardware procurement cycles.
This way, the burden of costs and com-
plexities associated with owning a
completely new and technologically
advanced communications system can
be removed. Simply by signing up as a
tenanttotheexistingfacilitiesofahost
operator’s data center, partners will
be able to provide services quickly and
cost-efficiently.
Onceinplace,NFVprovidesaflexible
telecom-gradeplatformonwhichavari-
ety of communication services can be
offered to people and organizations, in
alow-cost,low-impactfashion.Services
can be quickly and easily trialed,
launched,scaledupordownanddecom-
missionedinlinewithmarketdemand,
the billions of new connected devices
that are emerging to support applica-
tions like smart homes and connected
vehicles. In short, this is a complex eco-
systembasedonconstantdevelopment,
which can be difficult to predict and
consequently challenging to plan for
andbudget.
The introduction of 4G LTE net-
works, for example, brought with it a
major overhaul of voice services in core
networks – in the move from circuit-
switched to IMS. For many, especially
nicheoperators,thistypeoftechnology
upgrade threatens to stretch organiza-
tional capabilities to the limit, even to
the point where business profitability
isatstake.
Tocounterthischallenge,manyoper-
atorshaveturnedtoNetworkFunctions
Virtualization (NFV). By placing core
networks in large concentrated data
centers, NFV is a way to rationalize and
simplify operations as well as speed-
ing up innovation cycles1
. The addition
BART JELLEMA AND MARC VORWERK
BOX A  Terms and abbreviations
ARPU	 average revenue per user
CRM	 customer relationship management
CSCF	 Call Session Control Function
HSS	 Home Subscriber Server
IMS	 IP Multimedia Subystem
LI	 Lawful Interception
MRFP	 Media Resource Function 		
	Processor
MSC	 mobile switching center
MTAS	 Multimedia Telephony Application
	Server
MVNO	 mobile virtual network operator
NFV	 Network Functions 	Virtualization
NPV	 net present value
OM	 operations and maintenance
OSS	 operations support systems
OVF	 Open Virtualization Format
P-CSCF	 proxy call session control function
SaaS	 software as a service
SBG	 Session Border Gateway
SLA	 Service Level Agreement
SRVCC	 single radio voice call continuity
TCO	 total cost of ownership
VLAN	 virtual local area network
VM	 virtual machine
VoLTE	 voice over LTE
Software as a service (SaaS)
is a promising solution for
overcoming the challenges of
implementing and managing new
network technologies. The SaaS
approach can provide substantial
savings in terms of cost and lead
time, and create a new source of
revenue for those adopting the
role of service provider.
Thisarticlesharessomeofthetechnical
andeconomicalinsightsandknow-how
gained from a proof of concept study
conducted at Ericsson to explore the
implementationof VoLTEasaservice.
Whyanewtakeontelecoms?
Today’s networks support several tech-
nology generations, from 2G to 4G, and
as research for 5G is well underway,
the next generation is on the commer-
cial horizon. The types of devices con-
nected to networks vary from feature
phones to smartphones and tablets to
Proof of concept for VoLTE as a service
2
ERICSSON REVIEW • JULY 22, 2014
Proof of concept for VoLTE as a service
presenting an operator-branded and
guaranteed alternative to the many
third-party over-the-top solutions that
operateinboththeconsumerandenter-
prisecommunicationspace.
Concept–headingfortheclouds
Today,thepurchasingprocessforanew
IMS system can take several months
from order placement to an opera-
tional system. Once an order is placed,
the network system vendor initiates
the production process for the node.
On completion, the node is then inte-
grated and packaged together with the
necessary software elements, tested,
shipped,installedatthedesignatedcen-
tral office site, integrated into the net-
work,testedagain,acceptedandfinally
put into operation. Once the system is
functional the operator is responsible
foroperationsandmaintenance(OM),
oftenwiththesupportofthevendor.
With a SaaS deployment, operators
canpurchaseavirtualizedIMSnetwork
slicethatiscustom-initializedforthem
inalargedatacenter.Networkslicescan
be tied into existing radio and packet
core networks over a remote link – as
Figure 1illustrates.
Working in this way, operators will
no longer need to purchase, install or
own any hardware, or invest in train-
ing staff on a new system. The SaaS
approach removes the need to manage
software licenses, and reduces system
integration from a complete IMS solu-
tion to just the points of interconnect
with the access network. Ownership
and operational details are instead
takencareofbytheserviceproviderand
operators will pay as they go using sim-
ple, predictable price models, such as a
flat service fee per subscriber. The ben-
efits:nolargeupfrontinvestments,lim-
ited technical and business risks, and
muchshortertimetorevenue.
VoLTEasaservice
In2013,Ericsson’sRDandITdivisions
carried out a joint project to develop a
proof of concept implementation for
VoLTE as a service. The objective was
to gain an understanding of the tech-
nical and economic implications of
offering a complex communications
solutionlikeVoLTEasaservice.Fortele-
com applications, SaaS is a relatively
new business model that needs to
Traditional node deployment
Software as a service
EPC
IMS
LTE RAN
EPC
IMS
LTE RAN
FIGURE 1  The SaaS concept
Cloud-based
multi-tenant
VoLTE system
Tenant X
Tenant Y
Tenant X
Tenant Y
HSS
MSP
PGM
MTAS
SCC-AS
SBG
P-CSCF
CSCF
BGCF
DNS/
ENUM
MRFP
EMA MM
BSS MSC-S
MGCF
SMS-C
CRM MGw
BGF
EPC LTE
BSS MSC-S
MGCF
SMS-C
CRM MGw
BGF
EPC LTE
FIGURE 2  VoLTE as a service – architecture
3
ERICSSON REVIEW • JULY 22, 2014
take into consideration the tough
requirements of the underlying cloud
infrastructure.
From the start of the project, it was
clear that turning VoLTE as a service
into a viable business proposition, with
competitivepricelevelsandsoundmar-
gins,wouldrequiretheonboardingand
servingofnewtenantstobesimple,effi-
cientandeasilyrepeated.
Through virtualization techniques,
thehostingserviceprovidercandeploy
multiple VoLTE systems on the same
shared data center hardware, while
still guaranteeing each tenant their
own dedicated, logically separated vir-
tualnetwork.Suchamulti-tenantcloud
infrastructuremakesitpossibleforser-
vice providers not only to share hard-
wareamongtenants,butalsoOMand
engineering staff. The resulting econ-
omy of scale is much more significant
than any individual small-scale instal-
lationcouldachieve.
To improve repeatability, a high
degree of business process automation
(auto-deployment and auto-scaling)
reduces the time and effort needed to
operateservices,whichinturnreduces
costs. And to ensure that customers get
what they pay for, the provision of rel-
evant network statistics is essential for
billing and to provide proof of Service
LevelAgreement(SLA)conformance.
Ablueprintforthearchitecture
So how is this done? As shown in
Figure 2, the operator’s radio and
packet core networks as well as their
legacy circuit-switched network are
connected to a remote virtualized IMS
networkwithinaclouddatacenterover
standardized interfaces for signaling,
OMandmedia.
As illustrated in Figure 3, next gen-
eration systems will normally be fully
implemented as software without
any strong hardware dependencies.
Consequently,IMSserver-typenetwork
functionslikeCSCFandMTASarenatu-
ralcandidatesforcloudplacement.
To optimize use of bandwidth, most
media handling will most likely con-
tinue to take place in the tenant net-
work,withthepossibleexceptionofthe
MRFP.Certainnetworkfunctions,such
asHSS,canbeplacedeitherinthecloud
orinthetenantnetwork,dependingon
operator preference or to comply with
Core
router
Edge router
EMS
Hosted
managed
servicesControl plane elements, CSCF, MSC
Gateways and appliances
Home networking
Fixed
access
Radio
access
OSS, BSS
Distributed cloud
Real time OSS/BSS
Media distribution network
Home appliances
Value
High
Low
LowHigh Risk
(Technology maturity, performance requirements)
FIGURE 3  Network Functions Virtualization – portfolio migration
Tenant 1
network
Tenant 1
network
Tenant 1 IMS networkTenant 1 IMS network
OMOM
SignalingSignaling
MediaMedia
OMOM
SignalingSignaling
MediaMedia
Tenant 2 IMS networkTenant 2 IMS network
NOCNOC
OMOM StorageStorage
Central
storage
AccessAccessAccessAccess
CoreCore
Tenant1Tenant1Tenant2Tenant2
Tenant 2
network
Tenant 2
network
vRtrvRtr
SBGSBG
DC
switch
/FW
DC
switch
/FW
vRtrvRtr vRtrvRtr
CSCF
cluster
CSCF
cluster
HSS
cluster
HSS
cluster
MTAS
cluster
MTAS
cluster
MFRPMFRPIDNSIDNSPGMPGM
vRtrvRtr vRtrvRtr vRtrvRtr
CSCF
cluster
CSCF
cluster
HSS
cluster
HSS
cluster
MTAS
cluster
MTAS
cluster
MFRPMFRPiDNSiDNSPGMPGM
FIGURE 4  IP design
Proof of concept for VoLTE as a service
4
ERICSSON REVIEW • JULY 22, 2014
Proof of concept for VoLTE as a service
local regulatory requirements with
respecttouserdatabases.
To integrate with the operator’s vari-
ousbusinesssupport,customercareand
other IT systems, the virtualized IMS
network will provide billing and provi-
sioningcapabilities.
When another operator becomes a
tenant, a copy of the virtualized IMS
networkcanbeinstantiatedinthedata
center and the whole onboarding pro-
cesssimplyrepeated.
For commercial deployment, at least
two data center locations are needed to
providegeo-redundancy.Alternatively,
the tenant could operate a single non-
redundantsystemintheirownnetwork
andrelyonasecondaryvirtualizedsys-
tem as an overflow and failover mech-
anism–geo-redundancyasaservice.
Asanadditionaloffering,servicepro-
viders can include smaller regional sat-
ellitesitesthathosttheIMSmediaplane
nodes. In such topologies, the satellite
centers can be used to house not just
media gateways but also network func-
tions like Lawful Interception for IMS
(LI-IMS), an anchor MSC for SRVCC and
/or an SBG/P-CSCF. Providing media-
plane nodes in this way reduces the
impact of introducing IMS to an opera-
tor’sexistingcorenetworktopractically
nothing. Taking a coverage area the
size of North America as an example,
approximately 24 regional sites would
berequiredtoprovidethisservice.
Asignificantchange
By the end of December 2015, roaming
fees within the European Union will
no longer exist; rates for voice calls and
data transmission will be the same as
in the subscriber’s home market2
. This
drastic change for consumers is likely
to stimulate traffic and motivate oper-
ators across Europe to centralize their
core network infrastructures – as phys-
ical location will no longer influence
billingrates.
Hardware
From a hardware perspective, data
centers will need to be equipped with
enough servers to host virtualized ver-
sions of the number of tenant IMS net-
works anticipated. In addition, high
capacity physical IP switches and cen-
tralstoragewillbeneeded.Ashardware
is completely decoupled from software
through virtualization middleware,
service providers have the freedom to
select the x86-based hardware of their
choice, as long as it meets the set target
specificationsintermsofperformance,
bandwidth and memory of the virtu-
alized network functions – including
somevirtualizationoverhead.
Operationsandmaintenance
AsshowninFigure 4,theIPplanneeds
to be designed so that each tenant has
their own set of dedicated VLANs – at
least for OM, signaling and media –
that are separated from all the other
tenantstoavoidinterferenceandmain-
tainsecurity.
For OM, the service provider’s back
office can perform tasks such as con-
figuration management, performance
management, fault management
and network inventory management
through a managed services portal.
Thisissimilartothewaynetworkman-
agement works in the service provid-
er’s own IMS network. The front office
can process work orders and change
requests received from tenants, tickets
from field engineers, and take care of
invoicingandSLAreporting.
As shown in Figure 5, tenants will
be provided with OM access rights to
their specific network for provision-
ing subscribers and retrieving detail
records for charging. This access will
connect to the tenant’s back-end IT sys-
temslikeCRMandbillingsystems,and
adashboardfunctionwillallowtheten-
ant to view key performance statistics
fortheirnetwork.
Northbound interfaces from the
different virtualized network func-
tions are generally not affected by
virtualization.
TheexactimplementationoftheIMS
network – its internal structure, what
software and which release is used – is
entirely at the discretion of the service
provider. In other words, the imple-
mentationistransparentandofnoreal
concern to the tenant. Their only con-
cern lies with the behavior of the ser-
vice, the agreed service level and the
interfaces exposed at the points of
interconnection.
Features–underthehood
Multi-tenancy
Modern server blades house multiple
processor cores on which virtual
Network
management
Node manager
OS
Hypervisor
Hardware
Dashboard Mediation
Service
activation
DC back office NOC front office Tenant
Tenant
provisioning
vIMS
Cloud manager, including:
• SLA resolution
• Auto-deployment
• Auto-scaling
CDRs
Work orders, tickets,
and change requests
SLA report,
invoicing
Subscriber data
Subscriber
provisioning
Subscriber
billing
SLA monitoring,
service metering
TM
CM
PM
FM
NIM
FIGURE 5  Operations and maintenance view
BOX B   
Legend for
Figure 5
CM – configuration
management
DC – data center
FM – fault
management
NIM – network
inventory
management
NOC – network
operations center
PM – performance
management
TM – ticket
management
5
ERICSSON REVIEW • JULY 22, 2014
machines (VMs) can be placed.
Virtualized IMS network functions
like CSCF or HSS use a number of vir-
tual machines for traffic processing, as
showninFigure 6,whichactmuchlike
a physical node with several blades as
part of a cluster. As illustrated, these
virtual machines should be spread hor-
izontally over multiple blades, so that
thefailureofonebladewillneverbring
downanentirenode.
Theremainingcorescanthenbeused
for other network functions or even
othertenants.
Auto-deployment
Onboarding a new tenant sets a deploy-
mentfunctionintomotion.Asshownin
Figure 7,thisfunctionexecutesanIMS
network deployment sequence using a
cloudorchestrationtoolincombination
with scripts that parse the customer-
specificenvironmentsettings.Anynec-
essary adaptations are executed inside
thedeployedVMs.
To save time during the onboarding
process, tenant VLANs can and should
be prepared ahead of time. Software
images for each virtualized network
function are built and uploaded (in
advance) to the cloud manager in, for
example, Open Virtualization Format
(OVF)3
, and are kept in storage. From
there, the deployment function can
instantly clone network functions for
newtenants.
Toconnectthemtotheirpre-assigned
VLANs,thevirtualmachinesarelinked
totheappropriateportgroupsandpow-
eredon.Thedeploymentfunctionloads
a data transcript onto the VMs to cre-
ate an operational virtualized network
functionandconfigurestheapplication
interfaces, so that they form an inte-
gratedIMSnetwork.Allofthispost-con-
figurationworkcanbescripted;andany
data transcript common to all tenants
canbeincludedinthesoftwareimage.
Once all the network functions and
connections between them are estab-
lished,thenextstepistoconnectthevir-
tual IMS network to the tenant’s access
network and IT systems before provi-
sioning the first users. The high degree
of preparation and process automa-
tion,togetherwiththeuseofhardware
capacityavailableinthedatacenter,and
prestorageofsoftwareimages,resultsin
drastically reduced installation times.
The complete software installation for
an IMS network can be fulfilled in just
afewhours,comparedwiththeseveral
days it would normally take to set up a
traditional central office environment
with physical nodes. Time to revenue
from contract signing to commercial
launch could be reduced to a matter of
weeks,ratherthanmonths.
Auto-scaling
The ability to scale networks is a key
business enabler. In the proof of con-
cept project, the Ericsson team devel-
oped a controller function that worked
inconjunctionwiththecloudmanager
todeterminewhenandwherenetworks
needtobescaled.AsshowninFigure 8,
the controller continuously monitors
the average processor load on each of
the virtualized network functions, by
reading the load figures from the guest
operating system. This approach has
proven to be more accurate than using
the measurements provided by the
hypervisor, as the hypervisor cannot,
forexample,determinethepriorityand
necessity of currently executed tasks
fromtheoutside.
When the load for a particular net-
work function like CSCF exceeds its
set upper limit, which can happen for
example during traffic peaks, the con-
troller requests the cloud manager
to scale out. The cloud manager pow-
ers up another CSCF virtual machine,
2. Post-config
DNS/
ENUM HSS HSS
EMA
MTAS MTASCSCF
Deployment
function
Cloud
manager
CSCF
vAPP
HSS
vAPP
CSCF
vRouter
vRoutervRouter
1. Clone from
template
FIGURE 7  Auto-deployment
VM VM (CSCF)
(HSS)
(MTAS)
vRouter vRoutervRouter
vRouter vRoutervRouter
vRouter vRoutervRouter
VM VM VM VM VM VM VM
VMVM VM VM VM VM VM VM VM VM VM
VMVM VM VM VM VM VM VM (DNS) (PGM) (MRFP)
VMVM VM VM VM VM VM VM VM VM VM
VMVM VM VM VM VM VM VM VM VM VM
VMVM VM VM VM VM VM VM
VMVM VM VM VM VM VM VM
VMVM VM VM VM VM VM VM VM VM VM
VMVM VM VM VM VM VM VM
HypHyp Hyp Hyp Hyp Hyp Hyp Hyp Hyp Hyp Hyp Hyp
#2#1 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12
TenantZTenantYTenantX
12 blades
FIGURE 6  Multi-tenancy
6
ERICSSON REVIEW • JULY 22, 2014
Proof of concept for VoLTE as a service
which then joins the existing cluster
and rebalances the traffic. Similarly, a
node can be scaled in during periods of
lowtraffic.
The user interface for the controller
allowsengineeringstaffinthedatacen-
tertosetupperandlowerprocessor-load
thresholds for scaling in and out of net-
workfunctions.Additionalparameters,
such as the minimum and maximum
number of traffic processors, can also
be set so that a node has a guaranteed
minimumredundancywithoutmonop-
olizing more than its fair share of avail-
ableresources.
Figure 9 shows an example time
series taken from a test session carried
outduringtheproofofconceptproject.
The scaling mechanism for the CSCF
kicked in just before the 12:58 time
stamp, as the processor load exceeded
the set maximum (indicated by the red
line). Three minutes later, at approxi-
mately 13:01, the CSCF was running on
a cluster of five instead of the original
fourtrafficprocessors.
Depending on the existing traffic
load, it takes between five and 10 min-
utes to add capacity automatically (by
scaling a virtualized network func-
tion out by one traffic processor) to a
live node in a virtualized data center.
Incontrast,addingaphysicalhardware
board to a live physical node on such a
timescaleisunimaginable.
Service-levelmonitoring
SLAsarehighlyvariedinnature,cover-
ingdifferentaspectsofaservicesuchas
customerticketturn-aroundtimesand
otherlogisticalmatters.Asfarastechni-
calcontentisconcerned,SLAsbetween
service providers and tenants are best
keptsimpleandtransparent.Manynet-
work statistics can be made available
forinformationpurposes,whichisfine,
butthelistofcontractedKPIsthatcarry
financial implications are best kept as
simpleaspossible(seeTable 1).
In its simplest form, billing ten-
ants for the use of VoLTE as a service
can be based on the actual number of
active users during a given time period
– assuming a certain maximum traf-
fic volume. The volume can be defined
in terms of the maximum number of
simultaneous sessions (the current
licensing model) or by average voice
minutes per subscriber. As voice
100
12:42 12:44 12:46 12:48 12:50 12:52 12:54 12:56 12:58 13:00
Time: 13:00:44
Finished scaling out
Number of TPs: 5
51 PL7
PL8
PL6
PL5
PL4
PL3
52 50 49 38 off
Processorload(%)
%
80
60
40
20
0
CSCF-CBA-012 load
Number of traffic processors
Time
FIGURE 9  Example time series
Table 1: SLA reporting
ServiceMetering
Tenantgetsbilledpernumberofusers+
premiumfor trafficcoverage
ServiceLevelMonitoring
TenantgetscreditedincaseoffailuretomeetSLA
Keyperformanceindicators Keyperformanceindicators
Numberofusers
Systemavailability(%)
IMSregistrationtime(msec)
Trafficvolume
(averagesessiondurationand/or
numberofconcurrentsessions
IMSregistrationsuccessratio(%)
VoLTEsetupsuccessratio(%)
1. Measure
load
3. Join cluster
2. Power on VM
Controller
Cloud
manager
CSCF CSCF CSCF
vRouter
FIGURE 8  Auto-scaling
7
ERICSSON REVIEW • JULY 22, 2014
minutesreadilytranslatetothepay-
ment plans offered by most operators,
thismodelisprobablypreferableforthe
majority of tenants. Similar consump-
tionindicatorsalignedwithoperator-to-
consumer price models can be created
forallotherservices.
While threshold limits are good for
SLAs and planning, service providers
are not likely to cut off traffic when
an agreed maximum for a tenant is
reached – as long as continued service
doesnotoverloadthesystemorinfringe
on other tenants. However, a premium
maybecharged.
Tokeepservicelevelmonitoringrela-
tivelystraightforward,theproofofcon-
ceptprojectcreatedexamplereportsfor
system availability, registration time,
registration success rate and call estab-
lishment success rate. If any of these
resources underperformed during a
billingperiod,thetenantwouldreceive
creditontheirnextpayment.
All of these counters and statistics
are already available in today’s typical
IMS products. By collecting, filtering
andcombiningthemintoacustomized
businessintelligencereport,theycanbe
easily communicated and turned into
actionabledata.
In a commercial setup, this data
would be fed from the OSS into a spe-
cializedSLAmanagementtool,inwhich
KPI values are continuously compared
againstpredefinedthresholdstodetect
and record SLA violations. A number
of approach warning levels are usually
defined below the critical level, so that
OMstaffcanbealertedandtakeappro-
priateactionsbeforeanyimpactonbusi-
nessisfelt.
Financials–whereisthemoney?
In the traditional system-sales model,
total cost of ownership (TCO) is defined
as the initial purchase price including
relatedprojectcosts,plusrecurringrun-
ning costs such as support agreements,
OM staff, rent and power. In the SaaS
model, this will be replaced by a single
line item – service fees – under opex.
Unfortunately, estimating a reason-
able price level for VoLTE as a service –
one that the tenant can afford and that
keepstheserviceproviderinbusiness–
isnotasimpletask.
One potential pricing model (shown
in Figure 10) is based on the tradi-
tionaltotalcostofownershipforathree-
year period, amortized over 36 equal
monthly payments. Payback times of
less than three years tend to result in a
servicethatistooexpensivefortheten-
ant,andcalculatingoverlongerperiods
tends to make the model unattractive
forserviceproviders. 
Parameters like operator size and
runningcosts–rents,engineersalaries
and electricity – vary greatly from one
part of the world to another, and so the
economy of scale and benefit to opera-
tors in different markets will vary. In
conjunction with the proof of concept
project, a study aimed to estimate the
service price for VoLTE for a typical sec-
ondorthirdtieroperatorwithbetween
100,000andonemillionsubscribers.
Thestudyestimatedandadjustedfor
netpresentvalue(NPV)andtherequired
initial capex and opex over three years
to own, deploy and run an IMS system
for VoLTE. The resulting estimation set
thefeeforVoLTEasaservicetobesome-
where between USD 1 and USD 5 per
subscriber per month. An example of
thetypeofcalculationusedinthestudy
is given in Table 2 for a mock tenant
with200,000subscribers.
To match the price points for a ser-
vicewiththeaveragecostpersubscriber
incurred by operators at different ends
of the scale, some sort of tiered price
model is needed – a suggested model is
showninFigure 11.
If the average revenue for voice ser-
vices is assumed to be USD 40 per sub-
scriber per month, a fee of USD 1-5 per
subscriberpermonthforVoLTEasaser-
vice is between 2.5 and 12.5 percent of
the corresponding ARPU it generates,
whichisafairbusinesscase.
opex
opex
opex
capex 3-year system TCO
(amoritized over 36 months)
Year 1 Year 2 Year 3
FIGURE 10  Pricing model
Table 2: TCO comparison – an example in USD thousands
system capex opex asaservice capex opex
Hardware 2,400 1,000 Setup fee 450
Software 3,300 2,500 Service fee* 24,098
Systems Integration 1,600
Project 900
Staff 4,300
Facilities 500
Utilities 200
Lab costs 5,000
3yearTCO 21,700 3yearTCO 24,548
NPV 20,791 NPV 20,791
*36 months x 200,000 subscribers x USD 3.35
8
ERICSSON REVIEW • JULY 22, 2014
Proof of concept for VoLTE as a service
Looking at the addressable market,
thenumberofsubscribersconnectedto
secondandthirdtieroperatorsamounts
to22millioninNorthAmericaalone.
Evolution–beyondthehorizon
As illustrated in Figure 12, rolling
out VoLTE might be the initial motiva-
tion for a second or third tier operator
to switch to the software as a service
model.Doingsowouldallowsuchoper-
ators to roll out VoLTE in the same time
frame (2014-2015) as their larger com-
petitors–andsecuretheirmarketshare.
Subsequently, operators could
broaden the scope of their offerings to
include customized services for enter-
prises, the retail industry and many
otherverticals.TheSaaSplatformcould
be further utilized by opening it up to
internet-application and web develop-
ers to create a whole new range of con-
vergedservices.
Second and third tier operators are
the most obvious first adopters of this
type of business model for voice – or
rather VoLTE. Once rooted, adoption is
likely to rise up the food chain. Many
operators, both big and small, have
optedforthemanagedserviceapproach
for their voice networks, gaining effi-
ciencyandfreeingupresourcestofocus
on customers and on improving opera-
torbrandvalue.
Operators already include unlimited
voice and unlimited text in their data
plans, rendering these services to the
levelofacommodity,orafundamental
product that cannot really be charged
for,butneithercantheybetakenoutof
theserviceoffering.Andsosoftwareas
a service – the ultimate form of a man-
aged service – is the most natural evo-
lutionpath.
Conclusion
By following this route, service provid-
ers will be able to offer all managed
networks from the same platform and
housed under the same roof. For opera-
tors,theabilitytooutsourcetherespon-
sibility for voice shifts price pressure
on to a third party who can provide the
rightexpertise,efficiencyandscale.
6
Price point in USD
5
4
3
2
1
0
1–100 101–200 201–500 501–1000 1000+
Thousands of subscribers
FIGURE 11  Tiered price model
Mobile Enterprise Cable/internet
Capture
VoLTE-aaS
RCS-aaS
BusCom-aaS
VisualCom-aaS
UC-aaS
WebRTC
Service
enablement
Grow Innovate
FIGURE 12  Service evolution
1.	 Ericsson, February 2014, White Paper, The real-time cloud – combining cloud,
NFV and service provider SDN, available at:
http://www.ericsson.com/news/140220-the-real-time-cloud_244099438_c
2.	 European Commission, Digital agenda for Europe, Roaming, available at:
https://ec.europa.eu/digital-agenda/en/roaming
3.	 DMTF, Open Virtualization Format, available at:
http://www.dmtf.org/standards/ovf
References
ETSI, Network Functions Virtualisation, available at: http://www.etsi.org/
technologies-clusters/technologies/nfv
Additional reading
BOX C   
Legend for
Figure 12
aaS – as a service
BusCom –
business
communication
RCS – Rich
Communication
Suite
UC –unified
communication
VisualCom	 –
visual
communication
WebRTC – Refers
to standardization
for real-time
browser
capabi ities.
9
ERICSSON REVIEW • JULY 22, 2014
To bring you the
best of Ericsson’s
research world, our
employees have been
writing articles for
Ericsson Review –
our communications
technology journal
– since 1924. Today,
Ericsson Review
articles have a two-to-
five year perspective
and our objective is
to provide you with up-to-date insights on how
things are shaping up for the Networked Society.
Address :
Ericsson
SE-164 83 Stockholm, Sweden
Phone: +46 8 719 00 00
Publishing:
Ericsson Review articles and additional material
are published on: www.ericsson com/review.
Use the RSS feed to stay informed of the latest
updates.
Ericsson Technology Insights
All Ericsson Review articles are available on
the Ericsson Technology Insights app available
for Android and iOS devices. The ink for your
device is on the Ericsson Review
website:www.ericsson.com/review.
If you are viewing this digitally, you
can:
download from Google Play or
download from the App Store
Publisher: U f Ewaldsson
Editorial board:
Hans Antvik, Ulrika Bergström, Joakim Cerwall,
Stefan Dahlfort, Åsa Degermark,
Deirdre P. Doyle, Dan Fahrman, Anita Frisell,
Geoff Hol ingworth, Jonas Högberg,
Patrick Jestin, Cenk Kirbas, Sara Kullman,
Börje Lundwall, Hans Mickelsson, U f Olsson,
Patrik Regårdh, Patrik Roséen, Gunnar Thrysin
and Tonny Uhlin.
Editor:
Deirdre P. Doyle
deirdre doyle@jgcommunication.se
Subeditors:
John Ambrose, Nathan Hegedus
and Ian Nicholson
Art director and layout:
Carola Pilarz
Illustrations:
Claes-Göran Andersson
ISSN: 0014-0171
Volume: 91, 2014
Bart Jellema
joined Ericsson in 1989.
He has held several
system and product
management roles in
Canada, Germany and the Netherlands.
He currently works with the core
networks architecture and technology
team in the area of cloud and NFV, and
is involved in the establishment of
Ericsson’s new global ICT centers. He
has been active in standardization,
holds several patents and is a speaker
for Ericsson at innovation events. He
holds a B.Sc. in electrical engineering
from the University of Applied
Sciences, Eindhoven, the Netherlands.
Marc Vorwerk
joined Ericsson in 2000.
Today, he is a senior
specialist for cloud
computing, and has
previously worked on multi-access, IMS
and media-plane management
research – developing early prototypes
and participating in European research
projects. He began utilizing
virtualization and cloud over six years
ago, and has been an evangelist within
Ericsson to promote the benefits of
these technologies. Today as a senior
specialist he is a team leader, an
innovation event presenter and
provides customer-engagement
support. He holds an M.Sc. in electrical
engineering from RWTH Aachen
University, Germany.
Ericsson
SE-164 83 Stockholm, Sweden
Phone: + 46 10 719 0000
ISSN 0014-0171
284 23-3227 | Uen
© Ericsson AB 2014

More Related Content

What's hot

Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeRebekah Rodriguez
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)3G4G
 
PCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional AnalysisPCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional AnalysisBiju M R
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Evolution of Core Networks
Evolution of Core NetworksEvolution of Core Networks
Evolution of Core NetworksSarp Köksal
 
VoLTE Flows and CS network
VoLTE Flows and CS networkVoLTE Flows and CS network
VoLTE Flows and CS networkKarel Berkovec
 
MNO, MVNO, MVNA, MVNE: Different types of mobile operators
MNO, MVNO, MVNA, MVNE: Different types of mobile operatorsMNO, MVNO, MVNA, MVNE: Different types of mobile operators
MNO, MVNO, MVNA, MVNE: Different types of mobile operators3G4G
 
introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training SumanPramanik7
 
5G NR System Information
5G NR System Information5G NR System Information
5G NR System InformationPushkarBandi
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTEmanish_sapra
 
5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_ModesAalekh Jain
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flowassinha
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architectureVikas Shokeen
 
wimax Ppt for seminar
wimax Ppt for seminarwimax Ppt for seminar
wimax Ppt for seminarPratik Anand
 
Ericsson 5G Core System
Ericsson 5G Core SystemEricsson 5G Core System
Ericsson 5G Core SystemEricsson
 

What's hot (20)

Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)Advanced: 5G Service Based Architecture (SBA)
Advanced: 5G Service Based Architecture (SBA)
 
PCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional AnalysisPCRF-Policy Charging System-Functional Analysis
PCRF-Policy Charging System-Functional Analysis
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Evolution of Core Networks
Evolution of Core NetworksEvolution of Core Networks
Evolution of Core Networks
 
VoLTE Flows and CS network
VoLTE Flows and CS networkVoLTE Flows and CS network
VoLTE Flows and CS network
 
MNO, MVNO, MVNA, MVNE: Different types of mobile operators
MNO, MVNO, MVNA, MVNE: Different types of mobile operatorsMNO, MVNO, MVNA, MVNE: Different types of mobile operators
MNO, MVNO, MVNA, MVNE: Different types of mobile operators
 
VoLTE flows - basics
VoLTE flows - basicsVoLTE flows - basics
VoLTE flows - basics
 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
 
introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training introduction to lte 4g lte advanced bsnl training
introduction to lte 4g lte advanced bsnl training
 
IMS + VoLTE Overview
IMS + VoLTE OverviewIMS + VoLTE Overview
IMS + VoLTE Overview
 
5G NR System Information
5G NR System Information5G NR System Information
5G NR System Information
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTE
 
5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes
 
Initial LTE call Setup Flow
Initial LTE call Setup FlowInitial LTE call Setup Flow
Initial LTE call Setup Flow
 
cloud computing
cloud computingcloud computing
cloud computing
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architecture
 
Cs fallback feature
Cs fallback featureCs fallback feature
Cs fallback feature
 
wimax Ppt for seminar
wimax Ppt for seminarwimax Ppt for seminar
wimax Ppt for seminar
 
Ericsson 5G Core System
Ericsson 5G Core SystemEricsson 5G Core System
Ericsson 5G Core System
 

Similar to Ericsson Review: Communications as a cloud service: a new take on telecoms

Xura NFV and Messaging Infrastructure_WP_1.0
Xura NFV and Messaging Infrastructure_WP_1.0Xura NFV and Messaging Infrastructure_WP_1.0
Xura NFV and Messaging Infrastructure_WP_1.0Graham McInnes
 
Virtualizing network services
Virtualizing network servicesVirtualizing network services
Virtualizing network servicesBootcamp SCL
 
Whitepaper nfv sdn-available-now
Whitepaper nfv sdn-available-nowWhitepaper nfv sdn-available-now
Whitepaper nfv sdn-available-nowmilao999
 
Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?idrajeev
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperMarc Curtis
 
Xura Cloud Services for the Telecommunications Market White Paper v1
Xura Cloud Services for the Telecommunications Market White Paper v1Xura Cloud Services for the Telecommunications Market White Paper v1
Xura Cloud Services for the Telecommunications Market White Paper v1Graham McInnes
 
Telco Global Connect 4
Telco Global Connect 4Telco Global Connect 4
Telco Global Connect 4Sadiq Malik
 
SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...Cisco Service Provider
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud Juniper Networks
 
Sb wireless-mobile
Sb wireless-mobileSb wireless-mobile
Sb wireless-mobile佳钐 赵
 
Container ecosystem based PaaS solution for Telco Cloud Analysis and Proposal
Container ecosystem based PaaS solution for Telco Cloud Analysis and ProposalContainer ecosystem based PaaS solution for Telco Cloud Analysis and Proposal
Container ecosystem based PaaS solution for Telco Cloud Analysis and ProposalKrishna-Kumar
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloudEricsson Latin America
 
Ims Competitive Note
Ims Competitive NoteIms Competitive Note
Ims Competitive Notealokhom
 
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Petr Nemec
 
Nexus nortel umts_whitepaper_v2_0
Nexus nortel umts_whitepaper_v2_0Nexus nortel umts_whitepaper_v2_0
Nexus nortel umts_whitepaper_v2_0Nguyen Le
 
vmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdfvmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdfAsitSwain5
 
Nokia_Delivering_virtual_services_faster_with_Nokia_CloudBand_Case_Study_EN.pdf
Nokia_Delivering_virtual_services_faster_with_Nokia_CloudBand_Case_Study_EN.pdfNokia_Delivering_virtual_services_faster_with_Nokia_CloudBand_Case_Study_EN.pdf
Nokia_Delivering_virtual_services_faster_with_Nokia_CloudBand_Case_Study_EN.pdfEduardo591675
 

Similar to Ericsson Review: Communications as a cloud service: a new take on telecoms (20)

Xura NFV and Messaging Infrastructure_WP_1.0
Xura NFV and Messaging Infrastructure_WP_1.0Xura NFV and Messaging Infrastructure_WP_1.0
Xura NFV and Messaging Infrastructure_WP_1.0
 
Virtuora Catalog_lowres
Virtuora Catalog_lowresVirtuora Catalog_lowres
Virtuora Catalog_lowres
 
Virtualizing network services
Virtualizing network servicesVirtualizing network services
Virtualizing network services
 
Whitepaper nfv sdn-available-now
Whitepaper nfv sdn-available-nowWhitepaper nfv sdn-available-now
Whitepaper nfv sdn-available-now
 
Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?Why Network Functions Virtualization sdn?
Why Network Functions Virtualization sdn?
 
5 g core
5 g core5 g core
5 g core
 
SD_WAN_NFV_White_Paper
SD_WAN_NFV_White_PaperSD_WAN_NFV_White_Paper
SD_WAN_NFV_White_Paper
 
Xura Cloud Services for the Telecommunications Market White Paper v1
Xura Cloud Services for the Telecommunications Market White Paper v1Xura Cloud Services for the Telecommunications Market White Paper v1
Xura Cloud Services for the Telecommunications Market White Paper v1
 
Telco Global Connect 4
Telco Global Connect 4Telco Global Connect 4
Telco Global Connect 4
 
SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...SDN and NFV Value in Business Services: Innovations in Network Monetization a...
SDN and NFV Value in Business Services: Innovations in Network Monetization a...
 
Virtualization
VirtualizationVirtualization
Virtualization
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Sb wireless-mobile
Sb wireless-mobileSb wireless-mobile
Sb wireless-mobile
 
Container ecosystem based PaaS solution for Telco Cloud Analysis and Proposal
Container ecosystem based PaaS solution for Telco Cloud Analysis and ProposalContainer ecosystem based PaaS solution for Telco Cloud Analysis and Proposal
Container ecosystem based PaaS solution for Telco Cloud Analysis and Proposal
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloud
 
Ims Competitive Note
Ims Competitive NoteIms Competitive Note
Ims Competitive Note
 
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
 
Nexus nortel umts_whitepaper_v2_0
Nexus nortel umts_whitepaper_v2_0Nexus nortel umts_whitepaper_v2_0
Nexus nortel umts_whitepaper_v2_0
 
vmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdfvmw-nokia-registers-vcloud-nfv-solution-overview.pdf
vmw-nokia-registers-vcloud-nfv-solution-overview.pdf
 
Nokia_Delivering_virtual_services_faster_with_Nokia_CloudBand_Case_Study_EN.pdf
Nokia_Delivering_virtual_services_faster_with_Nokia_CloudBand_Case_Study_EN.pdfNokia_Delivering_virtual_services_faster_with_Nokia_CloudBand_Case_Study_EN.pdf
Nokia_Delivering_virtual_services_faster_with_Nokia_CloudBand_Case_Study_EN.pdf
 

More from Ericsson

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020Ericsson
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN OrchestrationEricsson
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
 

More from Ericsson (20)

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN Orchestration
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
 

Recently uploaded

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Ericsson Review: Communications as a cloud service: a new take on telecoms

  • 1. The communications technology journal since 1924 2014 • 7 Communications as a cloud service: a new take on telecoms July 22, 2014
  • 2. Communications as a cloud service: a new take on telecoms Modern mobile networks are complex systems built with an increasingly broad variety of technologies to serve a wide base of devices that provide an ever-greater range of services. These developments create interesting business opportunities for operators. But they also bring challenges, as new technologies and new expectations need to be managed with the same staff and budget. of multi-tenancy capabilities to NFV makesthisapproachparticularlyinter- esting for global operators, who have a presence in several countries and man- agearangeofnetworksthroughvarious operatingcompanies. Apart from addressing the strain on internal resources, NFV opens up the opportunityforoperatorstoprovideser- vices, like VoLTE, to other communi- cation service providers. By deploying the necessary IMS network functions forservicesinacentralvirtualizeddata center, and by adopting a SaaS model, operators can unlock the potential of their infrastructure beyond their own portfolios.Virtualizedservicescanthen be offered to smaller second and third tier affiliates or MVNOs at a lower cost, withreducedrisk,andwithinashorter time frame than is normally associ- ated with the introduction of new ser- vicesusingtraditionaltelecombusiness models. The SaaS business model allows an operator’s partners to circumvent lengthy hardware procurement cycles. This way, the burden of costs and com- plexities associated with owning a completely new and technologically advanced communications system can be removed. Simply by signing up as a tenanttotheexistingfacilitiesofahost operator’s data center, partners will be able to provide services quickly and cost-efficiently. Onceinplace,NFVprovidesaflexible telecom-gradeplatformonwhichavari- ety of communication services can be offered to people and organizations, in alow-cost,low-impactfashion.Services can be quickly and easily trialed, launched,scaledupordownanddecom- missionedinlinewithmarketdemand, the billions of new connected devices that are emerging to support applica- tions like smart homes and connected vehicles. In short, this is a complex eco- systembasedonconstantdevelopment, which can be difficult to predict and consequently challenging to plan for andbudget. The introduction of 4G LTE net- works, for example, brought with it a major overhaul of voice services in core networks – in the move from circuit- switched to IMS. For many, especially nicheoperators,thistypeoftechnology upgrade threatens to stretch organiza- tional capabilities to the limit, even to the point where business profitability isatstake. Tocounterthischallenge,manyoper- atorshaveturnedtoNetworkFunctions Virtualization (NFV). By placing core networks in large concentrated data centers, NFV is a way to rationalize and simplify operations as well as speed- ing up innovation cycles1 . The addition BART JELLEMA AND MARC VORWERK BOX A Terms and abbreviations ARPU average revenue per user CRM customer relationship management CSCF Call Session Control Function HSS Home Subscriber Server IMS IP Multimedia Subystem LI Lawful Interception MRFP Media Resource Function Processor MSC mobile switching center MTAS Multimedia Telephony Application Server MVNO mobile virtual network operator NFV Network Functions Virtualization NPV net present value OM operations and maintenance OSS operations support systems OVF Open Virtualization Format P-CSCF proxy call session control function SaaS software as a service SBG Session Border Gateway SLA Service Level Agreement SRVCC single radio voice call continuity TCO total cost of ownership VLAN virtual local area network VM virtual machine VoLTE voice over LTE Software as a service (SaaS) is a promising solution for overcoming the challenges of implementing and managing new network technologies. The SaaS approach can provide substantial savings in terms of cost and lead time, and create a new source of revenue for those adopting the role of service provider. Thisarticlesharessomeofthetechnical andeconomicalinsightsandknow-how gained from a proof of concept study conducted at Ericsson to explore the implementationof VoLTEasaservice. Whyanewtakeontelecoms? Today’s networks support several tech- nology generations, from 2G to 4G, and as research for 5G is well underway, the next generation is on the commer- cial horizon. The types of devices con- nected to networks vary from feature phones to smartphones and tablets to Proof of concept for VoLTE as a service 2 ERICSSON REVIEW • JULY 22, 2014 Proof of concept for VoLTE as a service
  • 3. presenting an operator-branded and guaranteed alternative to the many third-party over-the-top solutions that operateinboththeconsumerandenter- prisecommunicationspace. Concept–headingfortheclouds Today,thepurchasingprocessforanew IMS system can take several months from order placement to an opera- tional system. Once an order is placed, the network system vendor initiates the production process for the node. On completion, the node is then inte- grated and packaged together with the necessary software elements, tested, shipped,installedatthedesignatedcen- tral office site, integrated into the net- work,testedagain,acceptedandfinally put into operation. Once the system is functional the operator is responsible foroperationsandmaintenance(OM), oftenwiththesupportofthevendor. With a SaaS deployment, operators canpurchaseavirtualizedIMSnetwork slicethatiscustom-initializedforthem inalargedatacenter.Networkslicescan be tied into existing radio and packet core networks over a remote link – as Figure 1illustrates. Working in this way, operators will no longer need to purchase, install or own any hardware, or invest in train- ing staff on a new system. The SaaS approach removes the need to manage software licenses, and reduces system integration from a complete IMS solu- tion to just the points of interconnect with the access network. Ownership and operational details are instead takencareofbytheserviceproviderand operators will pay as they go using sim- ple, predictable price models, such as a flat service fee per subscriber. The ben- efits:nolargeupfrontinvestments,lim- ited technical and business risks, and muchshortertimetorevenue. VoLTEasaservice In2013,Ericsson’sRDandITdivisions carried out a joint project to develop a proof of concept implementation for VoLTE as a service. The objective was to gain an understanding of the tech- nical and economic implications of offering a complex communications solutionlikeVoLTEasaservice.Fortele- com applications, SaaS is a relatively new business model that needs to Traditional node deployment Software as a service EPC IMS LTE RAN EPC IMS LTE RAN FIGURE 1 The SaaS concept Cloud-based multi-tenant VoLTE system Tenant X Tenant Y Tenant X Tenant Y HSS MSP PGM MTAS SCC-AS SBG P-CSCF CSCF BGCF DNS/ ENUM MRFP EMA MM BSS MSC-S MGCF SMS-C CRM MGw BGF EPC LTE BSS MSC-S MGCF SMS-C CRM MGw BGF EPC LTE FIGURE 2 VoLTE as a service – architecture 3 ERICSSON REVIEW • JULY 22, 2014
  • 4. take into consideration the tough requirements of the underlying cloud infrastructure. From the start of the project, it was clear that turning VoLTE as a service into a viable business proposition, with competitivepricelevelsandsoundmar- gins,wouldrequiretheonboardingand servingofnewtenantstobesimple,effi- cientandeasilyrepeated. Through virtualization techniques, thehostingserviceprovidercandeploy multiple VoLTE systems on the same shared data center hardware, while still guaranteeing each tenant their own dedicated, logically separated vir- tualnetwork.Suchamulti-tenantcloud infrastructuremakesitpossibleforser- vice providers not only to share hard- wareamongtenants,butalsoOMand engineering staff. The resulting econ- omy of scale is much more significant than any individual small-scale instal- lationcouldachieve. To improve repeatability, a high degree of business process automation (auto-deployment and auto-scaling) reduces the time and effort needed to operateservices,whichinturnreduces costs. And to ensure that customers get what they pay for, the provision of rel- evant network statistics is essential for billing and to provide proof of Service LevelAgreement(SLA)conformance. Ablueprintforthearchitecture So how is this done? As shown in Figure 2, the operator’s radio and packet core networks as well as their legacy circuit-switched network are connected to a remote virtualized IMS networkwithinaclouddatacenterover standardized interfaces for signaling, OMandmedia. As illustrated in Figure 3, next gen- eration systems will normally be fully implemented as software without any strong hardware dependencies. Consequently,IMSserver-typenetwork functionslikeCSCFandMTASarenatu- ralcandidatesforcloudplacement. To optimize use of bandwidth, most media handling will most likely con- tinue to take place in the tenant net- work,withthepossibleexceptionofthe MRFP.Certainnetworkfunctions,such asHSS,canbeplacedeitherinthecloud orinthetenantnetwork,dependingon operator preference or to comply with Core router Edge router EMS Hosted managed servicesControl plane elements, CSCF, MSC Gateways and appliances Home networking Fixed access Radio access OSS, BSS Distributed cloud Real time OSS/BSS Media distribution network Home appliances Value High Low LowHigh Risk (Technology maturity, performance requirements) FIGURE 3 Network Functions Virtualization – portfolio migration Tenant 1 network Tenant 1 network Tenant 1 IMS networkTenant 1 IMS network OMOM SignalingSignaling MediaMedia OMOM SignalingSignaling MediaMedia Tenant 2 IMS networkTenant 2 IMS network NOCNOC OMOM StorageStorage Central storage AccessAccessAccessAccess CoreCore Tenant1Tenant1Tenant2Tenant2 Tenant 2 network Tenant 2 network vRtrvRtr SBGSBG DC switch /FW DC switch /FW vRtrvRtr vRtrvRtr CSCF cluster CSCF cluster HSS cluster HSS cluster MTAS cluster MTAS cluster MFRPMFRPIDNSIDNSPGMPGM vRtrvRtr vRtrvRtr vRtrvRtr CSCF cluster CSCF cluster HSS cluster HSS cluster MTAS cluster MTAS cluster MFRPMFRPiDNSiDNSPGMPGM FIGURE 4 IP design Proof of concept for VoLTE as a service 4 ERICSSON REVIEW • JULY 22, 2014 Proof of concept for VoLTE as a service
  • 5. local regulatory requirements with respecttouserdatabases. To integrate with the operator’s vari- ousbusinesssupport,customercareand other IT systems, the virtualized IMS network will provide billing and provi- sioningcapabilities. When another operator becomes a tenant, a copy of the virtualized IMS networkcanbeinstantiatedinthedata center and the whole onboarding pro- cesssimplyrepeated. For commercial deployment, at least two data center locations are needed to providegeo-redundancy.Alternatively, the tenant could operate a single non- redundantsystemintheirownnetwork andrelyonasecondaryvirtualizedsys- tem as an overflow and failover mech- anism–geo-redundancyasaservice. Asanadditionaloffering,servicepro- viders can include smaller regional sat- ellitesitesthathosttheIMSmediaplane nodes. In such topologies, the satellite centers can be used to house not just media gateways but also network func- tions like Lawful Interception for IMS (LI-IMS), an anchor MSC for SRVCC and /or an SBG/P-CSCF. Providing media- plane nodes in this way reduces the impact of introducing IMS to an opera- tor’sexistingcorenetworktopractically nothing. Taking a coverage area the size of North America as an example, approximately 24 regional sites would berequiredtoprovidethisservice. Asignificantchange By the end of December 2015, roaming fees within the European Union will no longer exist; rates for voice calls and data transmission will be the same as in the subscriber’s home market2 . This drastic change for consumers is likely to stimulate traffic and motivate oper- ators across Europe to centralize their core network infrastructures – as phys- ical location will no longer influence billingrates. Hardware From a hardware perspective, data centers will need to be equipped with enough servers to host virtualized ver- sions of the number of tenant IMS net- works anticipated. In addition, high capacity physical IP switches and cen- tralstoragewillbeneeded.Ashardware is completely decoupled from software through virtualization middleware, service providers have the freedom to select the x86-based hardware of their choice, as long as it meets the set target specificationsintermsofperformance, bandwidth and memory of the virtu- alized network functions – including somevirtualizationoverhead. Operationsandmaintenance AsshowninFigure 4,theIPplanneeds to be designed so that each tenant has their own set of dedicated VLANs – at least for OM, signaling and media – that are separated from all the other tenantstoavoidinterferenceandmain- tainsecurity. For OM, the service provider’s back office can perform tasks such as con- figuration management, performance management, fault management and network inventory management through a managed services portal. Thisissimilartothewaynetworkman- agement works in the service provid- er’s own IMS network. The front office can process work orders and change requests received from tenants, tickets from field engineers, and take care of invoicingandSLAreporting. As shown in Figure 5, tenants will be provided with OM access rights to their specific network for provision- ing subscribers and retrieving detail records for charging. This access will connect to the tenant’s back-end IT sys- temslikeCRMandbillingsystems,and adashboardfunctionwillallowtheten- ant to view key performance statistics fortheirnetwork. Northbound interfaces from the different virtualized network func- tions are generally not affected by virtualization. TheexactimplementationoftheIMS network – its internal structure, what software and which release is used – is entirely at the discretion of the service provider. In other words, the imple- mentationistransparentandofnoreal concern to the tenant. Their only con- cern lies with the behavior of the ser- vice, the agreed service level and the interfaces exposed at the points of interconnection. Features–underthehood Multi-tenancy Modern server blades house multiple processor cores on which virtual Network management Node manager OS Hypervisor Hardware Dashboard Mediation Service activation DC back office NOC front office Tenant Tenant provisioning vIMS Cloud manager, including: • SLA resolution • Auto-deployment • Auto-scaling CDRs Work orders, tickets, and change requests SLA report, invoicing Subscriber data Subscriber provisioning Subscriber billing SLA monitoring, service metering TM CM PM FM NIM FIGURE 5 Operations and maintenance view BOX B   Legend for Figure 5 CM – configuration management DC – data center FM – fault management NIM – network inventory management NOC – network operations center PM – performance management TM – ticket management 5 ERICSSON REVIEW • JULY 22, 2014
  • 6. machines (VMs) can be placed. Virtualized IMS network functions like CSCF or HSS use a number of vir- tual machines for traffic processing, as showninFigure 6,whichactmuchlike a physical node with several blades as part of a cluster. As illustrated, these virtual machines should be spread hor- izontally over multiple blades, so that thefailureofonebladewillneverbring downanentirenode. Theremainingcorescanthenbeused for other network functions or even othertenants. Auto-deployment Onboarding a new tenant sets a deploy- mentfunctionintomotion.Asshownin Figure 7,thisfunctionexecutesanIMS network deployment sequence using a cloudorchestrationtoolincombination with scripts that parse the customer- specificenvironmentsettings.Anynec- essary adaptations are executed inside thedeployedVMs. To save time during the onboarding process, tenant VLANs can and should be prepared ahead of time. Software images for each virtualized network function are built and uploaded (in advance) to the cloud manager in, for example, Open Virtualization Format (OVF)3 , and are kept in storage. From there, the deployment function can instantly clone network functions for newtenants. Toconnectthemtotheirpre-assigned VLANs,thevirtualmachinesarelinked totheappropriateportgroupsandpow- eredon.Thedeploymentfunctionloads a data transcript onto the VMs to cre- ate an operational virtualized network functionandconfigurestheapplication interfaces, so that they form an inte- gratedIMSnetwork.Allofthispost-con- figurationworkcanbescripted;andany data transcript common to all tenants canbeincludedinthesoftwareimage. Once all the network functions and connections between them are estab- lished,thenextstepistoconnectthevir- tual IMS network to the tenant’s access network and IT systems before provi- sioning the first users. The high degree of preparation and process automa- tion,togetherwiththeuseofhardware capacityavailableinthedatacenter,and prestorageofsoftwareimages,resultsin drastically reduced installation times. The complete software installation for an IMS network can be fulfilled in just afewhours,comparedwiththeseveral days it would normally take to set up a traditional central office environment with physical nodes. Time to revenue from contract signing to commercial launch could be reduced to a matter of weeks,ratherthanmonths. Auto-scaling The ability to scale networks is a key business enabler. In the proof of con- cept project, the Ericsson team devel- oped a controller function that worked inconjunctionwiththecloudmanager todeterminewhenandwherenetworks needtobescaled.AsshowninFigure 8, the controller continuously monitors the average processor load on each of the virtualized network functions, by reading the load figures from the guest operating system. This approach has proven to be more accurate than using the measurements provided by the hypervisor, as the hypervisor cannot, forexample,determinethepriorityand necessity of currently executed tasks fromtheoutside. When the load for a particular net- work function like CSCF exceeds its set upper limit, which can happen for example during traffic peaks, the con- troller requests the cloud manager to scale out. The cloud manager pow- ers up another CSCF virtual machine, 2. Post-config DNS/ ENUM HSS HSS EMA MTAS MTASCSCF Deployment function Cloud manager CSCF vAPP HSS vAPP CSCF vRouter vRoutervRouter 1. Clone from template FIGURE 7 Auto-deployment VM VM (CSCF) (HSS) (MTAS) vRouter vRoutervRouter vRouter vRoutervRouter vRouter vRoutervRouter VM VM VM VM VM VM VM VMVM VM VM VM VM VM VM VM VM VM VMVM VM VM VM VM VM VM (DNS) (PGM) (MRFP) VMVM VM VM VM VM VM VM VM VM VM VMVM VM VM VM VM VM VM VM VM VM VMVM VM VM VM VM VM VM VMVM VM VM VM VM VM VM VMVM VM VM VM VM VM VM VM VM VM VMVM VM VM VM VM VM VM HypHyp Hyp Hyp Hyp Hyp Hyp Hyp Hyp Hyp Hyp Hyp #2#1 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 TenantZTenantYTenantX 12 blades FIGURE 6 Multi-tenancy 6 ERICSSON REVIEW • JULY 22, 2014 Proof of concept for VoLTE as a service
  • 7. which then joins the existing cluster and rebalances the traffic. Similarly, a node can be scaled in during periods of lowtraffic. The user interface for the controller allowsengineeringstaffinthedatacen- tertosetupperandlowerprocessor-load thresholds for scaling in and out of net- workfunctions.Additionalparameters, such as the minimum and maximum number of traffic processors, can also be set so that a node has a guaranteed minimumredundancywithoutmonop- olizing more than its fair share of avail- ableresources. Figure 9 shows an example time series taken from a test session carried outduringtheproofofconceptproject. The scaling mechanism for the CSCF kicked in just before the 12:58 time stamp, as the processor load exceeded the set maximum (indicated by the red line). Three minutes later, at approxi- mately 13:01, the CSCF was running on a cluster of five instead of the original fourtrafficprocessors. Depending on the existing traffic load, it takes between five and 10 min- utes to add capacity automatically (by scaling a virtualized network func- tion out by one traffic processor) to a live node in a virtualized data center. Incontrast,addingaphysicalhardware board to a live physical node on such a timescaleisunimaginable. Service-levelmonitoring SLAsarehighlyvariedinnature,cover- ingdifferentaspectsofaservicesuchas customerticketturn-aroundtimesand otherlogisticalmatters.Asfarastechni- calcontentisconcerned,SLAsbetween service providers and tenants are best keptsimpleandtransparent.Manynet- work statistics can be made available forinformationpurposes,whichisfine, butthelistofcontractedKPIsthatcarry financial implications are best kept as simpleaspossible(seeTable 1). In its simplest form, billing ten- ants for the use of VoLTE as a service can be based on the actual number of active users during a given time period – assuming a certain maximum traf- fic volume. The volume can be defined in terms of the maximum number of simultaneous sessions (the current licensing model) or by average voice minutes per subscriber. As voice 100 12:42 12:44 12:46 12:48 12:50 12:52 12:54 12:56 12:58 13:00 Time: 13:00:44 Finished scaling out Number of TPs: 5 51 PL7 PL8 PL6 PL5 PL4 PL3 52 50 49 38 off Processorload(%) % 80 60 40 20 0 CSCF-CBA-012 load Number of traffic processors Time FIGURE 9 Example time series Table 1: SLA reporting ServiceMetering Tenantgetsbilledpernumberofusers+ premiumfor trafficcoverage ServiceLevelMonitoring TenantgetscreditedincaseoffailuretomeetSLA Keyperformanceindicators Keyperformanceindicators Numberofusers Systemavailability(%) IMSregistrationtime(msec) Trafficvolume (averagesessiondurationand/or numberofconcurrentsessions IMSregistrationsuccessratio(%) VoLTEsetupsuccessratio(%) 1. Measure load 3. Join cluster 2. Power on VM Controller Cloud manager CSCF CSCF CSCF vRouter FIGURE 8 Auto-scaling 7 ERICSSON REVIEW • JULY 22, 2014
  • 8. minutesreadilytranslatetothepay- ment plans offered by most operators, thismodelisprobablypreferableforthe majority of tenants. Similar consump- tionindicatorsalignedwithoperator-to- consumer price models can be created forallotherservices. While threshold limits are good for SLAs and planning, service providers are not likely to cut off traffic when an agreed maximum for a tenant is reached – as long as continued service doesnotoverloadthesystemorinfringe on other tenants. However, a premium maybecharged. Tokeepservicelevelmonitoringrela- tivelystraightforward,theproofofcon- ceptprojectcreatedexamplereportsfor system availability, registration time, registration success rate and call estab- lishment success rate. If any of these resources underperformed during a billingperiod,thetenantwouldreceive creditontheirnextpayment. All of these counters and statistics are already available in today’s typical IMS products. By collecting, filtering andcombiningthemintoacustomized businessintelligencereport,theycanbe easily communicated and turned into actionabledata. In a commercial setup, this data would be fed from the OSS into a spe- cializedSLAmanagementtool,inwhich KPI values are continuously compared againstpredefinedthresholdstodetect and record SLA violations. A number of approach warning levels are usually defined below the critical level, so that OMstaffcanbealertedandtakeappro- priateactionsbeforeanyimpactonbusi- nessisfelt. Financials–whereisthemoney? In the traditional system-sales model, total cost of ownership (TCO) is defined as the initial purchase price including relatedprojectcosts,plusrecurringrun- ning costs such as support agreements, OM staff, rent and power. In the SaaS model, this will be replaced by a single line item – service fees – under opex. Unfortunately, estimating a reason- able price level for VoLTE as a service – one that the tenant can afford and that keepstheserviceproviderinbusiness– isnotasimpletask. One potential pricing model (shown in Figure 10) is based on the tradi- tionaltotalcostofownershipforathree- year period, amortized over 36 equal monthly payments. Payback times of less than three years tend to result in a servicethatistooexpensivefortheten- ant,andcalculatingoverlongerperiods tends to make the model unattractive forserviceproviders.  Parameters like operator size and runningcosts–rents,engineersalaries and electricity – vary greatly from one part of the world to another, and so the economy of scale and benefit to opera- tors in different markets will vary. In conjunction with the proof of concept project, a study aimed to estimate the service price for VoLTE for a typical sec- ondorthirdtieroperatorwithbetween 100,000andonemillionsubscribers. Thestudyestimatedandadjustedfor netpresentvalue(NPV)andtherequired initial capex and opex over three years to own, deploy and run an IMS system for VoLTE. The resulting estimation set thefeeforVoLTEasaservicetobesome- where between USD 1 and USD 5 per subscriber per month. An example of thetypeofcalculationusedinthestudy is given in Table 2 for a mock tenant with200,000subscribers. To match the price points for a ser- vicewiththeaveragecostpersubscriber incurred by operators at different ends of the scale, some sort of tiered price model is needed – a suggested model is showninFigure 11. If the average revenue for voice ser- vices is assumed to be USD 40 per sub- scriber per month, a fee of USD 1-5 per subscriberpermonthforVoLTEasaser- vice is between 2.5 and 12.5 percent of the corresponding ARPU it generates, whichisafairbusinesscase. opex opex opex capex 3-year system TCO (amoritized over 36 months) Year 1 Year 2 Year 3 FIGURE 10 Pricing model Table 2: TCO comparison – an example in USD thousands system capex opex asaservice capex opex Hardware 2,400 1,000 Setup fee 450 Software 3,300 2,500 Service fee* 24,098 Systems Integration 1,600 Project 900 Staff 4,300 Facilities 500 Utilities 200 Lab costs 5,000 3yearTCO 21,700 3yearTCO 24,548 NPV 20,791 NPV 20,791 *36 months x 200,000 subscribers x USD 3.35 8 ERICSSON REVIEW • JULY 22, 2014 Proof of concept for VoLTE as a service
  • 9. Looking at the addressable market, thenumberofsubscribersconnectedto secondandthirdtieroperatorsamounts to22millioninNorthAmericaalone. Evolution–beyondthehorizon As illustrated in Figure 12, rolling out VoLTE might be the initial motiva- tion for a second or third tier operator to switch to the software as a service model.Doingsowouldallowsuchoper- ators to roll out VoLTE in the same time frame (2014-2015) as their larger com- petitors–andsecuretheirmarketshare. Subsequently, operators could broaden the scope of their offerings to include customized services for enter- prises, the retail industry and many otherverticals.TheSaaSplatformcould be further utilized by opening it up to internet-application and web develop- ers to create a whole new range of con- vergedservices. Second and third tier operators are the most obvious first adopters of this type of business model for voice – or rather VoLTE. Once rooted, adoption is likely to rise up the food chain. Many operators, both big and small, have optedforthemanagedserviceapproach for their voice networks, gaining effi- ciencyandfreeingupresourcestofocus on customers and on improving opera- torbrandvalue. Operators already include unlimited voice and unlimited text in their data plans, rendering these services to the levelofacommodity,orafundamental product that cannot really be charged for,butneithercantheybetakenoutof theserviceoffering.Andsosoftwareas a service – the ultimate form of a man- aged service – is the most natural evo- lutionpath. Conclusion By following this route, service provid- ers will be able to offer all managed networks from the same platform and housed under the same roof. For opera- tors,theabilitytooutsourcetherespon- sibility for voice shifts price pressure on to a third party who can provide the rightexpertise,efficiencyandscale. 6 Price point in USD 5 4 3 2 1 0 1–100 101–200 201–500 501–1000 1000+ Thousands of subscribers FIGURE 11 Tiered price model Mobile Enterprise Cable/internet Capture VoLTE-aaS RCS-aaS BusCom-aaS VisualCom-aaS UC-aaS WebRTC Service enablement Grow Innovate FIGURE 12 Service evolution 1. Ericsson, February 2014, White Paper, The real-time cloud – combining cloud, NFV and service provider SDN, available at: http://www.ericsson.com/news/140220-the-real-time-cloud_244099438_c 2. European Commission, Digital agenda for Europe, Roaming, available at: https://ec.europa.eu/digital-agenda/en/roaming 3. DMTF, Open Virtualization Format, available at: http://www.dmtf.org/standards/ovf References ETSI, Network Functions Virtualisation, available at: http://www.etsi.org/ technologies-clusters/technologies/nfv Additional reading BOX C   Legend for Figure 12 aaS – as a service BusCom – business communication RCS – Rich Communication Suite UC –unified communication VisualCom – visual communication WebRTC – Refers to standardization for real-time browser capabi ities. 9 ERICSSON REVIEW • JULY 22, 2014
  • 10. To bring you the best of Ericsson’s research world, our employees have been writing articles for Ericsson Review – our communications technology journal – since 1924. Today, Ericsson Review articles have a two-to- five year perspective and our objective is to provide you with up-to-date insights on how things are shaping up for the Networked Society. Address : Ericsson SE-164 83 Stockholm, Sweden Phone: +46 8 719 00 00 Publishing: Ericsson Review articles and additional material are published on: www.ericsson com/review. Use the RSS feed to stay informed of the latest updates. Ericsson Technology Insights All Ericsson Review articles are available on the Ericsson Technology Insights app available for Android and iOS devices. The ink for your device is on the Ericsson Review website:www.ericsson.com/review. If you are viewing this digitally, you can: download from Google Play or download from the App Store Publisher: U f Ewaldsson Editorial board: Hans Antvik, Ulrika Bergström, Joakim Cerwall, Stefan Dahlfort, Åsa Degermark, Deirdre P. Doyle, Dan Fahrman, Anita Frisell, Geoff Hol ingworth, Jonas Högberg, Patrick Jestin, Cenk Kirbas, Sara Kullman, Börje Lundwall, Hans Mickelsson, U f Olsson, Patrik Regårdh, Patrik Roséen, Gunnar Thrysin and Tonny Uhlin. Editor: Deirdre P. Doyle deirdre doyle@jgcommunication.se Subeditors: John Ambrose, Nathan Hegedus and Ian Nicholson Art director and layout: Carola Pilarz Illustrations: Claes-Göran Andersson ISSN: 0014-0171 Volume: 91, 2014 Bart Jellema joined Ericsson in 1989. He has held several system and product management roles in Canada, Germany and the Netherlands. He currently works with the core networks architecture and technology team in the area of cloud and NFV, and is involved in the establishment of Ericsson’s new global ICT centers. He has been active in standardization, holds several patents and is a speaker for Ericsson at innovation events. He holds a B.Sc. in electrical engineering from the University of Applied Sciences, Eindhoven, the Netherlands. Marc Vorwerk joined Ericsson in 2000. Today, he is a senior specialist for cloud computing, and has previously worked on multi-access, IMS and media-plane management research – developing early prototypes and participating in European research projects. He began utilizing virtualization and cloud over six years ago, and has been an evangelist within Ericsson to promote the benefits of these technologies. Today as a senior specialist he is a team leader, an innovation event presenter and provides customer-engagement support. He holds an M.Sc. in electrical engineering from RWTH Aachen University, Germany. Ericsson SE-164 83 Stockholm, Sweden Phone: + 46 10 719 0000 ISSN 0014-0171 284 23-3227 | Uen © Ericsson AB 2014